Search a title or topic

Over 20 million podcasts, powered by 

Player FM logo

5 Bytes Podcast

show episodes
 
Artwork

1
Prepare4Growth

Richard Outram

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Viral wisdom bytes that elevate and prioritize conscious leadership, humanity, learning and purpose. The views, thoughts, and opinions expressed by guests on the Prepare4Growth podcast are solely their own and do not necessarily reflect the views, positions, or policies of the host, Richard Outram, or the Prepare4Growth platform. All information presented is for educational and informational purposes only. Richard Outram bears no legal liability for any actions taken, decisions made, or outc ...
  continue reading
 
Artwork

1
Lectionary Bytes

Hasse Memorial Library

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Lectionary Bytes is a podcast with short episodes featuring professors and students from Concordia Seminary in Saint Louis, narrowing in on an insight or two from the assigned scripture readings throughout the church year. Brought to you by the Hasse Memorial Library.
  continue reading
 
Artwork
 
👋 Hello everyone, welcome to Take a Byte by Accton In this show, we discuss IT, networking technology, and industry news in a relaxed, conversational style. 🎙️ Each episode features the latest tech trends and practical technical knowledge. Whether you’re a professional or just curious about technology, there’s content for you here. 🌐 We bring you interesting stories, the latest in the world of networking, and easy-to-understand technical explanations. Take a Byte is not just a show; it’s an ...
  continue reading
 
Artwork

1
CyberBites Podcast

Nick Sturgeon

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
With cybersecurity becoming more complex and the threats even more dangerous… knowing what to do to protect yourself can seem like an impossible task. That is until now, welcome to the CyberBites Podcast. The Podcast where we help you filter through the noise one byte at a time.
  continue reading
 
Welcome to Bytes of Bio, a podcast where we explain Bioinformatics, an effective combination between Computer Science and Biology. We're May and Allamanda or Allie for short. Welcome to our show! So glad to have you here! We upload every 3 weeks on Sundays. Hope to see you then!
  continue reading
 
Artwork

51
Biblical Bytes Podcast

Adam Van Arsdale and Alison Howell

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Welcome to Biblical Bytes, a podcast dedicated to equipping and inspiring Christians to deepen their relationship with the word of God. Join hosts Adam van Arsdale and Alison Howell as they share their passion for biblical literacy and provide practical tips and techniques for personal Bible study. Whether you're a seasoned Bible student or just starting your journey, this podcast is for you. Join us on our mission to reduce biblical illiteracy and grow in your understanding of God's word. S ...
  continue reading
 
Artwork

1
Bits Bytes & Beyond

Michael Herman, Andrew Schultz & Aaron Keele

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
Welcome to Bits, Bytes, and Beyond, the podcast that fuels your passion for gaming, technology, and automotive adventures! Join us as we explore the latest in cutting-edge tech, the thrilling world of video games, and the ever-evolving landscape of the automotive industry. With a blend of insightful commentary, personal anecdotes, and expert insights, Bits, Bytes, and Beyond is your go-to source for all things tech and automotive. Tune in and join us on this journey as we uncover the interse ...
  continue reading
 
Keyword on the Street is an Australian podcast presenting the latest developments in the world of digital marketing and SEO. Listen in for actionable advice on boosting search rankings, nailing your keyword research, optimising your content strategy and making the most of website traffic. Stretched for time? We get that keeping up with the ever-changing digital landscape is hard. So tune into Quick Byte episodes for a 5-minute dose of the tech news and marketing tips you need to know about. ...
  continue reading
 
Artwork

1
Wrestling With The Locals

Divine And Jerry

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Our Podcast is here to bring back the best stories from the old days,share the history of the business we once loved and capture memories in sound bytes. We want to entertain you with our stories and the stories of all the legends, to introduce you to the way things were and still auto-be. allow you to learn about up and coming talent and shows as well as just review stories, pay per views and enjoy our show. Support this podcast: https://podcasters.spotify.com/pod/show/dale-troutman/support
  continue reading
 
Artwork

1
Bridges and Bytes

Bridges and Bytes

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Welcome to the Bridges and Bytes Podcast, from the UCD College of Engineering and Architecture. Season 1 is a six-part series on the 'Student Voice on AI and Assessment'. Each episode was produced and hosted by groups of UCD Engineering and Architecture Students, and covers a different types of assessment. The Season is topped and tailed with a trailer and a review episode. Credits This season was supported by an award by the UCD Faculty Partnership Programme to Jennifer Keenahan and Mairead ...
  continue reading
 
Varrlyn is a consultancy firm established in 2010 and based in Amsterdam, The Netherlands. At Varrlyn, we are trained to think ahead. With advanced digital tools, we enjoy turning any obstacle into a chance to thrive. It’s all about thinking in terms of opportunities, together. With our four Valuestreams we help you propelling your dreams forward with ambition and excellence. Finance & Risk Asset Management Digital services Dealing room & Sustainability services Get ready to improve your cos ...
  continue reading
 
Artwork

1
Tip Top Tech

Switch Break Media

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Welcome to Tip Top Tech, a tech news podcast by three college friends with a passion for exploring the wonders of the technological age we live in and the news that comes out of it. Find us on Twitter at www.twitter.com/TipTopTechCast !
  continue reading
 
Artwork

1
Boomer Bytes Podcast - Host Agi Anderson

Agi Anderon, ProAge Baby Boomer

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Why Bytes? Originally, a byte was any string of more than one bit that made up a simple piece of information. My goal is to provide a bit of information that supports, helps and inspires baby boomers to live their best life via my Boomer Bytes Podcast. We “Baby Boomers” were born between 1946 and 1964. We are known for our core values of optimism, team orientation, personal gratification, health and wellness, personal growth, youth (I have a mouthful to say about the pressure of looking 4-Ev ...
  continue reading
 
Artwork

1
Cyber Security Interviews

Douglas A. Brush | Weekly Interviews w/ InfoSec Pros

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
There is “no one way” to start and stay in the field of cyber security. Whether you are involved from the military, law enforcement, consulting, or IT services, it doesn’t matter. I have had countless discussions for years with other professionals online, at conferences, or over drinks, which have changed the way I think about cyber security. That is where this podcast comes in. What if I can capture those moments and frank discussions? I want to share the stories from other cyber security l ...
  continue reading
 
Loading …
show series
 
DLLs & TLS Callbacks As a follow-up to last week's diary about DLL Entrypoints, Didier is looking at TLS ( Thread Local Storage ) and how it can be abused. https://isc.sans.edu/diary/DLLs%20%26%20TLS%20Callbacks/32580 FreeBSD Remote code execution via ND6 Router Advertisements A critical vulnerability in FreeBSD allows for remote code execution. Bu…
  continue reading
 
Fake Life versus reality, which do you live? How do you manage to stay true to yourself in today's increasingly AI-generated world? Is opposition relevant to the life of a society? Should every society encourage the voice of opposition? Leave a comment, share this episode with someone and join us in the next episode. "What's on Your Mind" is LIVE e…
  continue reading
 
Positive trends related to public IP range from the year 2025 Fewer ICS systems, as well as fewer systems with outdated SSL versions, are exposed to the internet than before. The trend isn t quite clean for ISC, but SSL2 and SSL3 systems have been cut down by about half. https://isc.sans.edu/diary/Positive%20trends%20related%20to%20public%20IP%20ra…
  continue reading
 
Kubernetes is a popular container orchestration platform. Today’s IPv6 Buzz episode explores the benefits of using IPv6 in Kubernetes, and how Kubernetes uses IP addresses in both the control plane and data plane.We also address why the adoption rate is estimated to be so low, from default configurations to issues with non-IPv6-aware applications i…
  continue reading
 
Maybe a Little Bit More Interesting React2Shell Exploit Attackers are branching out to attack applications that initial exploits may have missed. The latest wave of attacks is going after less common endpoints and attempting to exploit applications that do not have Next.js exposed. https://isc.sans.edu/diary/Maybe%20a%20Little%20Bit%20More%20Intere…
  continue reading
 
Ned Bellavance and Kyler Middleton are joined by Rachel Stephens, Research Director at RedMonk, to discuss the state of DevOps and the impact of AI. They explore the distinction between developer productivity and development productivity, underlined by a DORA report finding that while AI dramatically boosts individual developer productivity, it oft…
  continue reading
 
Today Eric Chou dives deep into network automation and operational simplicity with guest Hardik Ajmera, VP of Product Management at Extreme Networks. In this sponsored episode, they talk about the ‘network fabric’, Extreme Platform ONE, and, of course, what’s next with AI in the world of enterprise networking. Hardik also shares how customers in co…
  continue reading
 
Beyond RC4 for Windows authentication Microsoft outlined its transition plan to move away from RC4 for authentication and published guidance and tools to facilitate this change. https://www.microsoft.com/en-us/windows-server/blog/2025/12/03/beyond-rc4-for-windows-authentication FortiCloud SSO Login Vuln Exploited Arctic Wolf observed exploit attemp…
  continue reading
 
On this episode, I cover some of the issues and fallout from the recent Windows Updates, I talk a little about Windows 11 26H1, multiple security related stories and of course even more AI news!Reference Links: https://www.rorymon.com/blog/concerning-notepad-incident-december-updates-woes-festive-tech-calendar/…
  continue reading
 
Our final news roundup for 2025 is a holiday sampler of tasty, chewy (and a few yucky) confections. We look at a years-long exploit campaign that used browser extensions to steal credentials, inject malicious content, and track behavior; tracks ongoing exploits using the React2Shell vulnerability; and debates whether a surveillance camera maker’s p…
  continue reading
 
Your next security teammate might not be a traditional hire — it could be a Digital Security Teammate (DST),” says Secure.com CEO Uzair Gadit. In this sponsored episode, Uzair explains the concept of a DST and how it differs from an AI SOC. He highlights the operational and business benefits of deploying DST, including improved... Read more »…
  continue reading
 
Today we delve into Wi-Fi HaLow, 802.11ah. Wi-Fi HaLow offers a more extended range than traditional Wi-Fi. We talk with David Rice, Principle Field Application Engineer and Arien Judge, Open Source Platforms Manager both from Morse Micro. Morse Micro makes chips to deliver energy-efficient wireless communication with extended range in the sub-1 GH…
  continue reading
 
More React2Shell Exploits CVE-2025-55182 Our honeypots continue to detect numerous React2Shell variants. Some using slightly modified exploits https://isc.sans.edu/diary/More%20React2Shell%20Exploits%20CVE-2025-55182/32572 The Fragile Lock: Novel Bypasses For SAML Authentication SAML is a tricky protocol to implement correctly, in particular if dif…
  continue reading
 
Take a Network Break! We close out 2025 with a look back at some of the stories and trends that captured our attention this year. We start with the top five vendors with the worst track records in 2025 for zero-days in critical enterprise infrastructure. On the news front, we discuss the insanity of the... Read more »…
  continue reading
 
Abusing DLLs EntryPoint for the Fun DLLs will not just execute code when some of their functions are called, but also as they are loaded. https://isc.sans.edu/diary/Abusing%20DLLs%20EntryPoint%20for%20the%20Fun/32562 Apple Patches Everything: December 2025 Edition Apple released patches for all of its operating systems, fixing two already exploited…
  continue reading
 
Len Bosack, co-founder of Cisco Systems and the CEO of XKL, sits down for a discussion with Scott Robohn. Len shares how he went from a mathematician to being responsible for pioneering the widespread commercialization of LAN technology. We also get to hear his firsthand account of building the first multi-protocol routers at Stanford and... Read m…
  continue reading
 
Is the ideal IT employee just leaving college or a veteran with years of experience? Russ White joins Ethan Banks and Drew Conry-Murray to discuss the complexities of this question. Younger professionals just out of college are more willing to work longer hours or unpopular shifts, learn new tools and skills, and take risks. Older... Read more »…
  continue reading
 
Using AI Gemma 3 Locally with a Single CPU Installing AI models on modes hardware is possible and can be useful to experiment with these models on premise https://isc.sans.edu/diary/Using%20AI%20Gemma%203%20Locally%20with%20a%20Single%20CPU%20/32556 Mystery Google Chrome 0-Day Vulnerability Google released an update for Google Chrome fixing a vulne…
  continue reading
 
AJ Murray joins Kevin and Alexis to share his unique journey into tech, pivoting away from aviation maintenance into networking. Together they explore the importance of person-to-person networking and building a community in order to be successful. They also talk about the reality of burnout, which ultimately led AJ to step away from his podcast...…
  continue reading
 
Possible exploit variant for CVE-2024-9042 (Kubernetes OS Command Injection) We observed HTTP requests with our honeypot that may be indicative of a new version of an exploit against an older vulnerability. Help us figure out what is going on. https://isc.sans.edu/diary/Possible%20exploit%20variant%20for%20CVE-2024-9042%20%28Kubernetes%20OS%20Comma…
  continue reading
 
In this year-end episode, William and Eyvonne recap their experiences at AutoCon 4 in Austin, Texas. They discuss the conference’s new multi-track format, including Eyvonne’s presentation in the leadership track on why technical projects fail. The conversation dives into how AI tools like Google Gemini can augment – not replace – human creativity, …
  continue reading
 
Let’s hear from the next generation of network engineers. Eric Chou sits down with Sem Eyob and Damon Hoody, two early-career network engineers, to talk about how they got into the profession and where they hope to go. They share their views on AI and its effect on their generation, their struggles finding entry level... Read more »…
  continue reading
 
As AI tools and agentic AI become part of how applications are developed, delivered, and managed, application performance monitoring and observability have to adapt. Ned Bellavance sits down with Drew Flowers and Jacob Yackenovich from IBM Instana about where these fields sit today, and the potential impacts of AI. They detail the challenges of app…
  continue reading
 
Microsoft Patch Tuesday Microsoft released its regular monthly patch on Tuesday, addressing 57 flaws. https://isc.sans.edu/diary/Microsoft%20Patch%20Tuesday%20December%202025/32550 Adobe Patches Adobe patched five products. The remote code execution in ColdFusion, as well as the code execution issue in Acrobat, will very likely see exploits soon. h…
  continue reading
 
On this episode, I cover the latest Patch Tuesday news, give an update on the LNK vulnerability from earlier in the year, talk about another healthcare provider getting breach and much more!Reference Links:https://www.rorymon.com/blog/price-changes-for-microsoft-365-patch-tuesday-news-openai-declares-code-red/…
  continue reading
 
Cloud-based workspaces such as Google Workspace are often the backbone of an organization. But they also face threats from spam and phishing, account takeovers, and illicit access to sensitive documents and files. On today’s Packet Protector we talk with sponsor Material Security about how it brings additional layers of protection to Google Workspa…
  continue reading
 
As you wind down 2025, what should you be planning to do for 2026? The Heavy Strategy team breaks it down for you with eight resolutions for the new year. From setting an AI strategy to cloud optimization, Johna and John can help you enter the new year prepared for what’s next. Other resolutions include... Read more »…
  continue reading
 
Loading …
Copyright 2025 | Privacy Policy | Terms of Service | | Copyright
Listen to this show while you explore
Play