Security Network δημόσια
[search 0]
Περισσότερα
Download the App!
show episodes
 
Artwork

1
Security Weekly Podcast Network (Audio)

Security Weekly Productions

Unsubscribe
Unsubscribe
Καθημερινά
 
Welcome to the Security Weekly Podcast Network, your all-in-one source for the latest in cybersecurity! This feed features a diverse lineup of shows, including Application Security Weekly, Business Security Weekly, Paul's Security Weekly, Enterprise Security Weekly, and Security Weekly News. Whether you're a cybersecurity professional, business leader, or tech enthusiast, we cover all angles of the cybersecurity landscape. Tune in for in-depth panel discussions, expert guest interviews, and ...
  continue reading
 
A brief daily summary of what is important in information security. The podcast is published every weekday and designed to get you ready for the day with a brief, usually 5 minutes long summary of current network security related events. The content is late breaking, educational and based on listener input as well as on input received by the SANS Internet Storm Center. You may submit questions and comments via our contact form at https://isc.sans.edu/contact.html .
  continue reading
 
Welcome to the Security Weekly Podcast Network, your all-in-one source for the latest in cybersecurity! This feed features a diverse lineup of shows, including Application Security Weekly, Business Security Weekly, Paul's Security Weekly, Enterprise Security Weekly, and Security Weekly News. Whether you're a cybersecurity professional, business leader, or tech enthusiast, we cover all angles of the cybersecurity landscape. Tune in for in-depth panel discussions, expert guest interviews, and ...
  continue reading
 
Artwork

1
Network Security

University of Twente

Unsubscribe
Unsubscribe
Μηνιαία
 
Through following this course, students will gain a basic understanding of the principles behind network security and the working of the main protocols, mechanisms and techniques in the area of security. The course consists of three parts: security mechanisms within network protocols, systems security and lab sessions. In the first part (security mechanisms within network protocols), the following topics will be discussed: IPSec, SSH, SSL, HTTPS and security for wireless networks. The second ...
  continue reading
 
RADIO FOR THE HEALTHCARE INDUSTRY Healthcare NOW Radio and Podcast Network offers discussions on the latest developments and trends impacting the industry including: health tech, health IT, healthcare innovation, healthcare policy, healthcare data security, telehealth, interoperability, biotech, med tech, value-based care, pharma, healthcare compliance, and much more. Shows are hosted by industry thought leaders. Guests are a "who's who" across the healthcare spectrum. The listening audience ...
  continue reading
 
Loading …
show series
 
This week, the cybersecurity industry's most basic assumptions under scrutiny. Following up our conversation with Wolfgang Goerlich, where he questions the value of phishing simulations, we discuss essays that call into question: the maturity of the industry the supposed "talent gap" with millions of open jobs despite complaints that this industry …
  continue reading
 
Host Gil Bashe and Gregg Masters welcome Stefano Bini, MD., Professor, UCSF, Arthritis & Joint Replacement, Orthopaedic Institute. Dr. Bini curates 'DOCSF' (Digital Orthopaedics Conference San Francisco). They discuss the challenges of implementing transformational change or redesign in U.S. health systems, writ large. Dr. Bini sees overexpressed '…
  continue reading
 
Shroombots, pagers, Tor, Raptor Train, GRU, Blue Light, Aaran Leyland, and More on the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-415
  continue reading
 
Fake GitHub Notices; More Iventi CVS Vulns; Deanonymizing Tor; iPhone Unlockers; Fake GitHub Site Targeting Developers https://isc.sans.edu/diary/Fake%20GitHub%20Site%20Targeting%20Developers/31282 Ivanti CSA 4.6 Advisory https://forums.ivanti.com/s/article/Security-Advisory-Ivanti-CSA-4-6-Cloud-Services-Appliance-CVE-2024-8963?language=en_US Germa…
  continue reading
 
In this episode, we explore some compelling reasons for transitioning from traditional SOAR tools to next-generation SOAR platforms. Discover how workflow automation and orchestration offers unparalleled speed and flexibility, allowing organizations to stay ahead of evolving security threats. We also delve into how advancements in AI are driving th…
  continue reading
 
A month ago, my friend Wolfgang Goerlich posted a hot take on LinkedIn that is less and less of a hot take these days. He posted, "our industry needs to kill the phish test",and I knew we needed to have a chat, ideally captured here on the podcast. I've been on the fence when it comes to phishing simulation, partly because I used to phish people as…
  continue reading
 
A month ago, my friend Wolfgang Goerlich posted a hot take on LinkedIn that is less and less of a hot take these days. He posted, "our industry needs to kill the phish test",and I knew we needed to have a chat, ideally captured here on the podcast. I've been on the fence when it comes to phishing simulation, partly because I used to phish people as…
  continue reading
 
Host Matt Fisher talks to Daryl Todd, Chief Strategy Officer at Kalderos about the origin and history of 340B program, mechanics of how 340B operates, concerns with deviation from intended benefits, and the opportunity for change through trust.To stream our Station live 24/7 visit www.HealthcareNOWRadio.com or ask your Smart Device to “….Play Healt…
  continue reading
 
Gain insights into the CISA KEV straight from one of the folks at CISA, Tod Beardsley, in this episode of Below the Surface. Learn how KEV was created, where the data comes from, and how you should use it in your environment. This segment is sponsored by Eclypsium. Visit https://securityweekly.com/eclypsium to learn more about them! Show Notes: htt…
  continue reading
 
Apple drops a lawsuit to avoid exposing secrets, what does it mean for the security industry if MS locks down the kernel?, exploding pagers, more things from the past: Adobe Flash exploits, robots get rid of your data, PKFail is still a thing, Android TV malware is back: now with conspiracy theories, DMA attacks, gamers are not nation-state attacke…
  continue reading
 
Apple drops a lawsuit to avoid exposing secrets, what does it mean for the security industry if MS locks down the kernel?, exploding pagers, more things from the past: Adobe Flash exploits, robots get rid of your data, PKFail is still a thing, Android TV malware is back: now with conspiracy theories, DMA attacks, gamers are not nation-state attacke…
  continue reading
 
Python Infostealer Targeting Exodus; Service Now KB Leaks; GitLab Patch; Aruba Patch; Python Infostealer Patching Windows Exodus App https://isc.sans.edu/diary/Python%20Infostealer%20Patching%20Windows%20Exodus%20App/31276 Service Now Knoledge Bases Data Exposures https://appomni.com/ao-labs/servicenow-knowledge-bases-data-exposures-uncovered/ Gitl…
  continue reading
 
CO 252 Denials: A Growing Challenge and How to Stay AheadUnderstand the growing trend of CO252 denials. Learn what’s driving this surge and Kristeen Coronado’s approach to managing these denials. Brought to you by www.infinx.com.Find all of our network podcasts on your favorite podcast platforms and be sure to subscribe and like us. Learn more at w…
  continue reading
 
A takeover of the MOBI TLD for $20, configuring an LLM for a CTF, firmware flaw in an SSD, Microsoft talks kernel resilience, six truths of cyber risk quantification, and more! Show Notes: https://securityweekly.com/asw-299
  continue reading
 
Python Exfiltration; VMWare VCenter Patch; macOS Calendar Exploit; 23:59, Time to Exfiltrate! https://isc.sans.edu/diary/23%3A59%2C%20Time%20to%20Exfiltrate!/31272 Critical VMWare VCenter Vulnerability https://blogs.vmware.com/cloud-foundation/2024/09/17/vmsa-2024-0019-questions-answers/ Zero-Click Calendar invite - Critical zero-click vulnerabilit…
  continue reading
 
Host Ramesh Kumar sits down with Paul Ashley, CEBS a Vice President and Consultant at NFP. Paul has 22 years of experience managing health plans for upper- to middle-market employers. During the podcast, we talked about the various ways that organizations can improve transparency and reduce their pharmacy costs, as well as examining the latest tren…
  continue reading
 
Intentionality in the Workplace: Discussing Workforce Shifts with Inovalon’s Chief People OfficerThe return to in-office work following the COVID-19 pandemic has not been a linear process.Organizations across healthcare and beyond have taken various steps to encourage in-office work, from mandatory requirements to flexible hybrid models. On this ep…
  continue reading
 
When a conference positioned as a day of security for developers has to be canceled due to lack of interest from developers, it's important to understand why there was so little interest and why appsec should reconsider its approach to awareness. Dustin Lehr discusses how appsec can better engage and better deliver security concepts in a way that m…
  continue reading
 
When a conference positioned as a day of security for developers has to be canceled due to lack of interest from developers, it's important to understand why there was so little interest and why appsec should reconsider its approach to awareness. Dustin Lehr discusses how appsec can better engage and better deliver security concepts in a way that m…
  continue reading
 
Back to the office serfs, Void Banshee, ServiceNow, Taiwan, Dlink, C++, Aaran Leyland, and more on this Edition of the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-414
  continue reading
 
Cybersecurity is complex. We have threats, vulnerabilities, incidents, controls, risks, etc. But how do they all connect together to drive a cyber risk program? As an industry, we've struggled for 20+ years trying to boil this ocean. Maybe we've been going about it the wrong way. Padraic O'Reilly, Founder and Chief Innovation Officer at CyberSaint,…
  continue reading
 
In the leadership and communications segment, Why Companies Should Consolidate Tech Roles in the C-Suite, End of an era: Security budget growth slows down, Global cybersecurity workforce growth flatlines, stalling at 5.5M pros, and more! Show Notes: https://securityweekly.com/bsw-364
  continue reading
 
PE Overlays; Apple Updates; Ivanti EOL Issue; MSFT Patch Tuesday Revision; DLink Vulns; Managing PE Files with Overlays https://isc.sans.edu/forums/diary/Managing%20PE%20Files%20With%20Overlays/31268/ Apple Updates https://support.apple.com/en-us/100100 Ivanti EOL Cloud Service Appliances https://www.cisa.gov/news-events/alerts/2024/09/13/ivanti-re…
  continue reading
 
Host Ericka Adler is joined by fellow Roetzel attorney Christina Kuta to discuss the latest developments in the FTC’s attempt to ban non-competition provisions. Ericka and Christina examine new developments since the previous episode, including a Texas court issuing an injunction preventing the FTC rule from going into effect nationally and the cur…
  continue reading
 
121. Enhancing Flexible Endoscope Reprocessing: The Role of Borescopes and AIEvery reprocessing professional that has worked with flexible endoscopes knows one irrefutable fact...Flexible endoscopes are complex devices that are difficult to clean. In this episode, they speak with Harry Oussoren to discuss the importance of tools like borescopes to …
  continue reading
 
Leading a Digital Transformation: The Pivot to Digital Care at LifeBridge HealthOn this episode, Chief Information and Digital Officer Tressa Springmann, shares how LifeBridge Health is leading the charge with their digital initiatives with host Ben Hilmes. She highlights real-world examples of how strategic IT alignment can drive better patient ou…
  continue reading
 
Pioneering Care Delivery Transformation: Reducing Avoidable Hospitalizations and Driving Value-Based CareHost: Megan AntonelliGuest: Amy BoutwellJoin host Megan Antonelli for an insightful interview with Dr. Amy Boutwell, a leading expert in healthcare delivery transformation. As a practicing physician with deep experience in public policy, process…
  continue reading
 
Cybersecurity is complex. We have threats, vulnerabilities, incidents, controls, risks, etc. But how do they all connect together to drive a cyber risk program? As an industry, we've struggled for 20+ years trying to boil this ocean. Maybe we've been going about it the wrong way. Padraic O'Reilly, Founder and Chief Innovation Officer at CyberSaint,…
  continue reading
 
Loading …

Οδηγός γρήγορης αναφοράς