Search a title or topic

Over 20 million podcasts, powered by 

Player FM logo
show episodes
 
Artwork

1
Compiler

Red Hat

icon
Unsubscribe
icon
Unsubscribe
Monthly
 
When it comes to technology, you may have questions. So do we. Every other week, we demystify the tech industry, one answer at a time. Join us as we bring together a chorus of perspectives from within Red Hat to break down the big, emerging ideas that matter both today and beyond. Compiler is hosted by Angela Andrews and Brent Simoneaux. Learn more about our show at redhat.com/en/compiler-podcast
  continue reading
 
The Practical 365 Podcast is a fortnightly newscast on all things Microsoft 365 including Microsoft Teams, Azure AD, Exchange, SharePoint, OneDrive, Windows, Intune and any hot topics that are worth a deep-dive to help you learn more and get the real-world view. Your hosts are Microsoft MVPs Steve Goodman, Paul Robichaux and Quest's Bastiaan Verdonk, who will share their expert opinions on the talk of the week, and Q&A with special guests.
  continue reading
 
Artwork

1
Knee-deep in Tech

Alexander Arvidsson, Simon Binder, Heini Ilmarinen

icon
Unsubscribe
icon
Unsubscribe
Monthly+
 
Knee-Deep In Tech is a bi-weekly(-ish) podcast covering IT and technology, focusing on the Microsoft stack. We are three MVPs and Microsoft Certified Trainers with between us over 35 years of IT infrastructure experience. Hosted on Acast. See acast.com/privacy for more information.
  continue reading
 
Artwork

1
Linux Out Loud

TuxDigital Network

icon
Unsubscribe
icon
Unsubscribe
Monthly+
 
Linux Out Loud is a community powered podcast. We take conversations from the Community from places like the Discourse Forums, Telegram group, Discord server and more. We also take topics from other shows around the network to give our takes. Linux Out Loud podcast is brought to you by the TuxDigital Network (https://tuxdigital.com/)!
  continue reading
 
Go from monotonous to autonomous IT operations with this series. Hosts from Automox, the IT automation platform for modern organizations, will cover the latest IT trends; Patch Tuesday remediations; ways to save time with Worklets (pre-built scripts); reduce risk; slash complexity; and automate OS, third-party, and configuration updates on all your Windows, macOS, and Linux endpoints. Automate confidence everywhere with Automox.
  continue reading
 
Artwork

1
TCS+

TechCentral

icon
Unsubscribe
icon
Unsubscribe
Monthly+
 
TechCentral's TCS+ is a business technology show that brings you interviews with leaders in South Africa's technology industry - and further afield. It showcases the latest products and services available to businesses large and small. In short, it offers in a window into what's possible. Episodes of TCS+ are sponsored.
  continue reading
 
Artwork

1
CyberWire Daily

N2K Networks

icon
Unsubscribe
icon
Unsubscribe
Daily
 
The daily cybersecurity news and analysis industry leaders depend on. Published each weekday, the program also includes interviews with a wide spectrum of experts from industry, academia, and research organizations all over the world.
  continue reading
 
In this podcast ArticHost will show you how to get started with Virtual Private Servers, and then take you through setting them up under our platform. We will go through Windows VPS and Linux VPS instant setup. Our goal is to provide our customers, and general Virtual Server users with knowledge to get started. https://www.artichost.com/ Also check out the review blog https://techstat.net/
  continue reading
 
Artwork

1
The ITidiots Show

ITidiots.TV

icon
Unsubscribe
icon
Unsubscribe
Monthly
 
Humorous technology demonstrations tackling design, implementation, and support of IT infrastructures. Presented by our resident geeks using video and screencasting. Nicky Curtis an IT consultant, and Microsoft Certified Trainer specialises in enterprise technologies. Nicholas Hill introduces alternative open source solutions.
  continue reading
 
Artwork

1
HowTo Linux OGG

Jupiter Broadcasting

icon
Unsubscribe
icon
Unsubscribe
Monthly
 
HowTo Linux will guide you through the amazing world of Linux. From switching to Windows, to building the ultimate home theater, firewall, office file server, and just about anything else.
  continue reading
 
Artwork

1
HowTo Linux MP3

Jupiter Broadcasting

icon
Unsubscribe
icon
Unsubscribe
Monthly
 
HowTo Linux will guide you through the amazing world of Linux. From switching to Windows, to building the ultimate home theater, firewall, office file server, and just about anything else.
  continue reading
 
Artwork
 
Iron Sysadmin is a podcast about being a sysadmin, with a healthy dose of paranoia. We talk about IT news, and have a tendancy toward information security, as it applies to Operations. Our hosts have decades of experience in the field, from desktop support, networking, architecture, network engineering, windows, linux, and even some industrial automation.
  continue reading
 
Artwork

1
Rob Lilleness

Rob Lilleness

icon
Unsubscribe
icon
Unsubscribe
Monthly+
 
Robert Lilleness, also known as Rob Lilleness, is a prominent figure in the technology industry, renowned for his transformative leadership and impressive track record. He began his tech career at Microsoft, contributing to the development of Windows NT Server. Over the years, Lilleness has held executive and board roles, leaving a significant impact on companies like Panopto and Cremo Company.
  continue reading
 
Artwork

1
TechSNAP Large Video

Jupiter Broadcasting

icon
Unsubscribe
icon
Unsubscribe
Monthly
 
An in-depth analysis of tech issues and topics. Hosted by Chris Fisher and Allan Jude, with over 20+ years in the technology industry. Tune in and get engaged by deep critical analysis and conversation around technologies’ milestones.
  continue reading
 
Artwork

1
TechSNAP Mobile Video

Jupiter Broadcasting

icon
Unsubscribe
icon
Unsubscribe
Monthly
 
An in-depth analysis of tech issues and topics. Hosted by Chris Fisher and Allan Jude, with over 20+ years in the technology industry. Tune in and get engaged by deep critical analysis and conversation around technologies’ milestones.
  continue reading
 
Artwork

1
TechSNAP in HD

Jupiter Broadcasting

icon
Unsubscribe
icon
Unsubscribe
Monthly
 
An in-depth analysis of tech issues and topics. Hosted by Chris Fisher and Allan Jude, with over 20+ years in the technology industry. Tune in and get engaged by deep critical analysis and conversation around technologies’ milestones.
  continue reading
 
Artwork
 
Welcome to the Security Weekly Podcast Network, your all-in-one source for the latest in cybersecurity! This feed features a diverse lineup of shows, including Application Security Weekly, Business Security Weekly, Paul's Security Weekly, Enterprise Security Weekly, and Security Weekly News. Whether you're a cybersecurity professional, business leader, or tech enthusiast, we cover all angles of the cybersecurity landscape. Tune in for in-depth panel discussions, expert guest interviews, and ...
  continue reading
 
Artwork

1
Unpacking Software

Chocolatey Software, Inc.

icon
Unsubscribe
icon
Unsubscribe
Monthly
 
Join our monthly Unpacking Software livestream to hear about the latest news, chat and opinion on packaging, software deployment and lifecycle management! Ask your question in the #ama-questions channel of our Community Hub Discord at https://ch0.co/community.
  continue reading
 
Artwork

1
Cloudy SH

supporthost

icon
Unsubscribe
icon
Unsubscribe
Monthly
 
We Cloudy SH doing our Episodes to distribute awareness of Latest Cloud Technologies available in the Industry and Doing interview of entrepreneur having Business In Cloud Hosting industry. We also do Cloud Orchestration Automation and Consulting based on Popular Cloud Service Providers like AWS, Azure and GCP. We steadily grown from the last couple of years of experience and Publishing Technical Articles, videos related to Cloud Hosting. It will be useful and interesting for those New at Cl ...
  continue reading
 
Loading …
show series
 
Microsoft issues emergency updates for Windows Server. Apple releases emergency security updates to patch two zero-days. CISA averts a CVE program disruption. Researchers uncover Windows versions of the BrickStorm backdoor. Atlassian and Cisco patch several high-severity vulnerabilities. An Oklahoma cybersecurity CEO is charged with hacking a local…
  continue reading
 
In today’s ever-evolving business landscape, organizations face diverse risks, including cyber risks, that can significantly affect their operations and overall prosperity. Aligning risk management strategies with organizational objectives is crucial for effectively mitigating these potential threats and fostering sustainable growth. Easier said th…
  continue reading
 
So what does modern work look like today? Richard talks to Karoliina Kettukari about her new role as the Head of Modern Work for a financial services company in Finland, and what modern work has evolved. Karoliina talks about how the pandemic accelerated modern work, such as being able to work anywhere and collaborating with whomever you need to. P…
  continue reading
 
RSAC 2025 is well under way, and Kevin the Intern files his first report. Authorities say Spain and Portugal’s massive power outage was not a cyberattack. Concerns are raised over DOGE access to classified nuclear networks. The FS-ISAC launches the Cyberfraud Prevention Framework. Real-time deepfake fraud is here to stay. On today’s Threat Vector, …
  continue reading
 
In this live recording from BSidesSF we explore the factors that influence a secure design, talk about how to avoid the bite of UX dragons, and why designs should put classes of vulns into dungeons. But we can't threat model a secure design forever and we can't oversimplify guidance for a design to be "more secure". Kalyani Pawar and Jack Cable joi…
  continue reading
 
Spring is in the air, and it’s time to give your IT environment the deep clean it deserves! In this episode of Hands-On IT, host Landon Miles shares nine essential spring cleaning tips to help IT pros declutter, optimize, and future-proof their systems. From cleaning workspaces and dusting off hardware to reviewing patch policies, auditing backups,…
  continue reading
 
This is the first part of a two-part series, where the trio dive into the ups and downs of life in IT, through the lens of Simon’s brain and personal journey. Topics that are explored include the role of goals (or lack of them), FOMO, and the ever-elusive work/life balance when juggling family, calendars, and careers. The conversation gets real abo…
  continue reading
 
A massive power outage strikes the Iberian Peninsula. Iran says it repelled a “widespread and complex” cyberattack targeting national infrastructure. Researchers find hundreds of SAP NetWeaver systems vulnerable to a critical zero-day. A British retailer tells warehouse workers to stay home following a cyberattack. VeriSource Services discloses a b…
  continue reading
 
As organizations embrace hybrid work, SaaS sprawl, and employee-owned devices, traditional Identity and Access Management (IAM) tools are failing to keep up. The rise of shadow IT, unmanaged applications, and evolving cyber threats have created an "Access-Trust Gap", a critical security challenge where IT lacks visibility and control over how emplo…
  continue reading
 
Please enjoy this encore episode of Career Notes. CEO and co-founder of Sternum, Natali Tshuva shares how she took her interest in science and technology and made a career and company out of it. Beginning her computer science undergraduate degree at age 14 through a special program in Israel, Natali says it opened up a new world for her. Her requir…
  continue reading
 
Welcome to the Microsoft for Startups Spotlight, brought to you by N2K CyberWire and Microsoft. In this episode, we are shining a light on innovation, ambition, and the tech trailblazers building the future right from the startup trenches. This episode is part of our exclusive RSAC series where we dive into the real world impact of the Microsoft fo…
  continue reading
 
Today we are joined by Crystal Morin, Cybersecurity Strategist from Sysdig, as she is sharing their work on "UNC5174’s evolution in China’s ongoing cyber warfare: From SNOWLIGHT to VShell." UNC5174, a Chinese state-sponsored threat actor, has resurfaced with a stealthy cyber campaign using a new arsenal of customized and open-source tools, includin…
  continue reading
 
Beating the AI Game, Ripple (not that one), Numerology, Darcula, Special Guests, and More, on this edition of the Security Weekly News. Special Guests from Hidden Layer to talk about this article: https://www.forbes.com/sites/tonybradley/2025/04/24/one-prompt-can-bypass-every-major-llms-safeguards/ Visit https://www.securityweekly.com/swn for all t…
  continue reading
 
The Defense Department is launching a new fast-track software approval process. A popular employee monitoring tool exposes over 21 million real-time screenshots. The U.S. opens a criminal antitrust investigation into router maker TP-Link. A pair of health data breaches affect over six million people. South Korea’s SK Telecom confirms a cyberattack.…
  continue reading
 
The crosswalk is talking to me man!, don't block my website without due process, Florida is demanding encryption backdoors, attacking boilers and banning HackRF Ones, time to update your flipper zero, using AI to create working exploits, what happens when you combine an RP2350 and an ESP32? Hopefully good hackery things!, more evidence that patchin…
  continue reading
 
Verizon and Mandiant call for layered defenses against evolving threats. Cisco Talos describes ToyMaker and Cactus threat actors. Researchers discover a major Linux security flaw which allows rootkits to bypass traditional detection methods. Ransomware groups are experimenting with new business models. Deputy Assistant Director Cynthia Kaiser from …
  continue reading
 
In this episode of Automox Insiders, host Maddie Regis chats with Adam Whitman, Manager of Solutions Engineering at Automox, about all things IT spring cleaning. From patch management and software audits to business continuity planning and endpoint hygiene, Adam shares practical, real-world tips for tidying up your tech stack and staying ahead of I…
  continue reading
 
We're sharing a episode from another N2K show we thought you might like. It's the second episode of the new season of the show CISO Perspectives with Kim Jones. Enjoy! Show Notes: Cybersecurity has an identity problem where the industry as a whole is struggling to determine whether it is a trade or a profession. In this episode of CISO Perspectives…
  continue reading
 
AI is notorious for making stuff up. But it doesn’t always tell you when it does. That’s a problem for users who may not realize hallucinations are possible. This episode of Compiler investigates the persistent problem of AI Hallucination. Why does AI lie? Do these AI models know they’re hallucinating? What can we do to minimize hallucinations—or a…
  continue reading
 
The White House’s shift of cybersecurity responsibilities to the states is met with skepticism. Baltimore City Public Schools suffer a ransomware attack. Russian state-backed hackers target Dutch critical infrastructure. Microsoft resolves multiple Remote Desktop issues. A new malware campaign is targeting Docker environments for cryptojacking. A n…
  continue reading
 
AI Governance, the next frontier for AI Security. But what framework should you use? ISO/IEC 42001 is an international standard that specifies requirements for establishing, implementing, maintaining, and continually improving an Artificial Intelligence Management System (AIMS) within organizations. It is designed for entities providing or utilizin…
  continue reading
 
What can agentic AI do for you? Richard talks to Tim Warner about his work utilizing next generation agentic AI technologies to help with sysadmin tasks. Tim talks about the early lead that Cursor AI took with AI agents capable of writing and executing scripts on your behalf - as opposed to just creating code you can cut-and-paste. Today, GitHub Co…
  continue reading
 
The Russian Proton66 is tied to cybercriminal bulletproof hosting services. A new Rust-based botnet hijacks vulnerable routers. CISA budget cuts limit the use of popular analysis tools. A pair of healthcare providers confirm ransomware attacks. Researchers uncover the Scallywag ad fraud network. The UN warns of cyber-enabled fraud in Southeast Asia…
  continue reading
 
Steve Goodman and Paul Robichaux dissect the latest Microsoft news, focusing on the sting of rising on-premises licensing costs. The team also explores Copilot Studio and the Model Context Protocol (MCP). Plus, Steve Goodman and Bastiaan Verdonk interview Microsoft's Janice Ricketts, to unravel the complexities of Global Secure Access (GSA) and Zer…
  continue reading
 
In this episode, Ashley chats with Casey Merritt from Right Systems about how he manages patching and automation across both internal systems and MSP clients using Automox. Casey shares how he transitioned into IT, took ownership of Automox at his company, and now uses Worklets to streamline software removal, automate reporting, and reduce onboardi…
  continue reading
 
Secrets end up everywhere, from dev systems to CI/CD pipelines to services, certificates, and cloud environments. Vlad Matsiiako shares some of the tactics that make managing secrets more secure as we discuss the distinctions between secure architectures, good policies, and developer friendly tools. We've thankfully moved on from forced 90-day user…
  continue reading
 
In this news episode, the trio uncovers some hidden PaaS costs in Databricks and breaks down a few subtle but impactful updates in Microsoft Fabric. The recent Oracle Cloud breach and how it was handled gets some attention. They also cover the latest improvements to Autopatch and LAPS, including reporting and capabilities bringing added flexibility…
  continue reading
 
Adversary nations are using ClickFix in cyber espionage campaigns. Japan’s Financial Services Agency issues an urgent warning after hundreds of millions in unauthorized trades. The critical Erlang/OTP’s SSH vulnerability now has public exploits. A flawed rollout of a new Microsoft Entra app triggers widespread account lockouts. The alleged operator…
  continue reading
 
In this interview, we're excited to speak with Pravi Devineni, who was into AI before it was insane. Pravi has a PhD in AI and remembers the days when machine learning (ML) and AI were synonymous. This is where we'll start our conversation: trying to get some perspective around how generative AI has changed the overall landscape of AI in the enterp…
  continue reading
 
Please enjoy this encore episode of Career Notes. Chief Technology Officer of ActiveNav Rich Hale takes us through his career aspirations of board game designer (one he has yet to realize), through his experience with the Royal Air Force to the commercial sector where his firm works to secure dark data. During his time in the Air Force, Rich was fo…
  continue reading
 
This week, we are joined by Nick Cerne, Security Consultant from Bishop Fox, to discuss "Rust for Malware Development." In pursuit of simulating real adversarial tactics, this blog explores the use of Rust for malware development, contrasting it with C in terms of binary complexity, detection evasion, and reverse engineering challenges. The author …
  continue reading
 
A critical vulnerability in Erlang/OTP SSH allows unauthenticated remote code execution. There’s a bipartisan effort to renew a key cybersecurity info sharing law. A newly discovered Linux kernel vulnerability allows local attackers to escalate privileges. A researcher uncovers 57 risky Chrome extensions with a combined 6 million users. AttackIQ sh…
  continue reading
 
We're sharing a episode from another N2K show we thought you might like. It's the first episode of the new season of the show CISO Perspectives with Kim Jones. Enjoy! Show Notes: The cyber talent ecosystem faces severe indigestion, which has stifled growth and closed doors to new talent. In this episode of CISO Perspectives, host Kim Jones sits dow…
  continue reading
 
Is your tech stack getting out of hand? In this episode, Automox General Counsel Paul Shoning joins Evan Kiely to unpack the legal and strategic risks of IT tool consolidation. From budgeting overlap to vendor lock-in, learn how to clean up your stack without making a mess.By Automox
  continue reading
 
The CVE program gets a last-minute reprieve. A federal whistleblower alleges a security breach at the NLRB. Texas votes to spin up their very own Cyber Command. BreachForums suffers another takedown. A watchdog group sues the federal government over SignalGate allegations. The SEC Chair reveals a 2016 hack. ResolverRAT targets the healthcare and ph…
  continue reading
 
Zero Trust isn't a new concept, but not one easily implemented. How do organizations transform cybersecurity from a "default allow" model, where everything is permitted unless blocked, to a "default deny" model? Danny Jenkins, Co-founder and CEO at ThreatLocker, joins Business Security Weekly to discuss this approach. Deny by default means all acti…
  continue reading
 
Are some of your team members starting to hate PowerShell? Richard talks to Barbara Forbes about her experiences with teams frustrated by PowerShell. Barbara talks about overcomplicating PowerShell scripts—the kind the most senior folks can create but no one else can maintain. Eventually, nobody will want to touch those scripts. Then there is the q…
  continue reading
 
Loading …
Listen to this show while you explore
Play