Every single podcast we publish in one convenient feed. This is a LOT of content. Hours of audio each week.
…
continue reading
Adopting Zero Trust Podcasts
Adopting Zero Trust offers an ongoing conversation that elevates cybersecurity conversations that encourages you to rethink how you build strategies, defend against threat actors, and implement new technology. We go beyond the millions in marketing budgets fueled by VCs, and chat with practitioners like you who want to make a difference (or hack the planet, which ever happens first).
…
continue reading
Tech Tomorrow is your front-row seat to the conversations redefining the future. Each episode explores one big question about data, AI, or emerging tech, giving leaders clear, focused answers they can trust. If you're navigating complex innovation, from AI-augmented delivery to sustainability, this show helps you cut through the noise, connect cross-disciplinary trends, and lead with confidence in a rapidly evolving landscape. Previously known as Data Today, this podcast has examined how out ...
…
continue reading
The Defender’s Log Podcast: Stories from the Cybersecurity Frontlines The Defender’s Log is your front-row seat to the real-world battles shaping today’s cybersecurity landscape. Hosted by seasoned professionals, each episode brings you face-to-face with the sharpest minds in digital defense, MSP/MSSP founders, CISOs, threat researchers, and architects, who are redefining what it means to secure our connected world. From zero-trust frameworks to ransomware takedowns, from DNS hardening to in ...
…
continue reading
The UK Investor Magazine provides analysis and insight into the world of investing, covering shares, funds, private equity and alternatives. Hear from UK-listed business leaders and the professionals at the forefront of the UK investment industry. Hosted on Acast. See acast.com/privacy for more information.
…
continue reading
1
Software Engineering Institute (SEI) Podcast Series
Members of Technical Staff at the Software Engineering Institute
The SEI Podcast Series presents conversations in software engineering, cybersecurity, and future technologies.
…
continue reading
1
NAN107: How AI is Changing the Networking Landscape
1:06:19
1:06:19
Play later
Play later
Lists
Like
Liked
1:06:19The world of networking is changing at lightning speed thanks to AI. Today Eric sits down with Chris Kane to explore this new reality for network engineers. Together, they dive deeper into some of the changes that will be coming next, breaking down the technical demands and mindset shifts of intellectual curiosity and humility necessary... Read mor…
…
continue reading
1
Investing in the UK's leading AI adopters with Finsbury Growth & Income's Nick Train
44:35
44:35
Play later
Play later
Lists
Like
Liked
44:35The UK Investor Magazine was thrilled to welcome Nick Train, Fund Manager of the Finsbury Growth & Income trust, for an enthralling discussion about Finsbury Growth & Income and his focus on data-rich companies successfully deploying AI. Find out more about Finsbury Growth & Income Fund manager Nick Train discusses his investment strategy for the F…
…
continue reading
1
TCG063: Constraint Drives Innovation with John Capobianco
53:28
53:28
Play later
Play later
Lists
Like
Liked
53:28Recorded live at AutoCon4, William Collins and Eyvonne Sharp join forces with John Capobianco for some in the moment thoughts and reflections on the AutoCon experience – from the in-person connections to the workshops to the stage presentations. John gives us the inside story on his very own workshop and the latest version releases in... Read more …
…
continue reading
1
PP088: How Fortinet Delivers Web App Security in the AI Era (Sponsored)
44:32
44:32
Play later
Play later
Lists
Like
Liked
44:32Web applications have always been tricky to protect. They’re meant to be accessible over the Internet, which exposes them to malicious actors, they’re designed to take end-user inputs, which can be manipulated for malicious purposes, and they often handle sensitive data. Then the rise of public cloud and microservices architectures added new layers…
…
continue reading
1
HS118: Bricking the Company – Discussing Existential Threats with Leadership
35:05
35:05
Play later
Play later
Lists
Like
Liked
35:05AI and other technologies are increasingly capable of delivering company-ending events. How do you have “the conversation” with senior leadership–the one about the existential risks your organization faces, and the steps needed for remediation–in a way that ensures that your company is maximally protected, and that you get the resources you need? A…
…
continue reading
1
Non-invasive disease detection through a scan of the eye with Occuity
24:02
24:02
Play later
Play later
Lists
Like
Liked
24:02The UK Investor Magazine was thrilled to welcome Dan Daly, Founder & CEO of Occuity, and CCO Mark Jenkins to delve into Occuity’s eye scanning disease detection technology. Find out more about Occuity on Republic here. Occuity is developing handheld, non-contact devices that use the eye as a window to the body’s health. The company’s patented optic…
…
continue reading
1
Can executives balance AI innovation with societal responsibility with Lord Clement-Jones
27:26
27:26
Play later
Play later
Lists
Like
Liked
27:26As artificial intelligence continues to redefine industries, the question isn’t just what we can build, but what we should. In a world of accelerating automation and algorithmic decision-making, can leaders harness innovation without losing public trust? In this episode of Tech Tomorrow, David Elliman speaks with Lord Clement-Jones, Liberal Democra…
…
continue reading
1
NB553: Palo Alto Networks Acquires Chronosphere; New Agentic AI Products for Orchestration and Networking
47:22
47:22
Play later
Play later
Lists
Like
Liked
47:22Take a Network Break! We start with a relative path traversal vulnerability in Fortinet’s FortiWeb. We’ll move on to an acquisition by Palo Alto Networks, another hiccup from our friends at Cloudflare, some AI announcements by Itential and Gluware, and finish with first quarter 2026 fiscal results from Palo Alto Networks. AdSpot Sponsor: Itential .…
…
continue reading
1
Tech Bytes: How IBM SevOne Delivers App-Centric Network Observability (Sponsored)
24:23
24:23
Play later
Play later
Lists
Like
Liked
24:23A lot of network monitoring tools allow you to say, “It’s not the network,” but a more useful tool would not only tell you that it’s not the network, but also what the problem actually is. Today our guest is Brandon Hale, CTO at IBM SevOne. He is here to give us an overview of... Read more »By Packet Pushers
…
continue reading
1
TNO050: Resiliency and Transparency with Andy Lapteff
57:59
57:59
Play later
Play later
Lists
Like
Liked
57:59Today Scott interviews Andy Lapteff. He opens up about his non-linear career path, starting from a working class background and his physical jobs in telecom to becoming a senior product marketing manager and podcaster. Join us as Andy shares candid stories of how he developed his resilience and the heartwarming origin story for the Art... Read more…
…
continue reading
Unit testing is a software development practice for checking that an individual component of code works before integrating that unit with other components in a larger program. A new open source project called Network Unit Testing System, or NUTS, brings the same concept to network automation. The big idea is that by incorporating unit tests into...…
…
continue reading
1
IPB188: IPv6 Adoption for an Entire Country
35:54
35:54
Play later
Play later
Lists
Like
Liked
35:54What does it take for an entire country to adopt IPv6? Our guest today is Tenanoia (Noia) Simona, CEO of Tuvalu Telecommunications Corporation, the country’s sole telecommunications provider. She’s here to walk us through the difficulties of connecting the many islands of Tuvalu and their journey to achieving one of the world’s highest IPv6 adoptio…
…
continue reading
1
N4N043: Redundancy vs. High Availability Part 1
1:00:28
1:00:28
Play later
Play later
Lists
Like
Liked
1:00:28In today’s chat, Holly and Ethan consider a question from listener Douglas who asks, “How do you approach designing a network for high availability and redundancy?” They start by defining differences between redundancy and high availability, and talk about Holly’s experience with her own customers. Then they share examples of how to achieve redunda…
…
continue reading
Ever wonder what it takes to level up your career in data science? Senior Data Scientist Darya Petrashka joins Ned and Kyler to share her personal journey from management and linguistics into data science, the real difference between a junior and a senior role, and helps us get under the “data science umbrella” to see... Read more »…
…
continue reading
1
HW065: Using Orb to Monitor the Quality of Your Internet Connections
32:26
32:26
Play later
Play later
Lists
Like
Liked
32:26With the help of Josh Hardy, Co-Founder and CTO of Orb, we introduce Orb. Orb is a suite app for OS, Android, macOS, Windows, Linux that is a new way to look at your internet connectivity. Josh gives us a little background on why and how Orb was created, He then goes into more detail... Read more »By Packet Pushers
…
continue reading
1
PP087: Why SBOMs Are Cooler and More Useful Than You Think
46:08
46:08
Play later
Play later
Lists
Like
Liked
46:08Just what’s inside that commercial software you bought? Does it contain open-source components, NPM packages, or other third-party code? How could you find out? The answer is a Software Bill of Materials, or SBOM, a machine-readable inventory of a finished piece of software. Why should you care about SBOMs? Our guest, Natalie Somersall, is here... …
…
continue reading
1
HS117: Environmental, Social and Governance Initiatives: What That Means for Your Organization (Sponsored)
34:13
34:13
Play later
Play later
Lists
Like
Liked
34:13Environmental, Social, Governance (ESG) initiatives aren’t just “the right thing to do”, they can also save companies real dollars, particularly if they’re investing in data centers and other infrastructure. Join Jonathan Ciccio, Continuous Improvement Manager for The Siemon Company, as we discuss The Siemon Company’s ESG initiatives. The Siemon Co…
…
continue reading
1
NB552: Nokia Switches On AI Ops; IBM Seeks a Quantum of Advantage
44:58
44:58
Play later
Play later
Lists
Like
Liked
44:58Take a Network Break! Red Hat Samba server has a remote command execution vulnerability, and we cover some follow-up on fusion as a viable energy source (still a work in progress). On the news front, we search for signs in SoftBank’s sale of its Nividia stake, Mplify debuts a new certificate on carrier Ethernet for... Read more »…
…
continue reading
1
Tech Bytes: Monitoring AI Agents and MCP Servers with Cisco ThousandEyes (Sponsored)
17:38
17:38
Play later
Play later
Lists
Like
Liked
17:38If you’re building, testing, or using AI agents and services, how can you get network visibility into, and ensure performance of, these tools? On today’s Tech Bytes podcast, we talk with sponsor Cisco ThousandEyes about how to monitor and measure performance of AI agents, AI models and services, and Model Context Protocol servers. We’ll get... Read…
…
continue reading
1
The Smarter Web Company: compounding the utility of Bitcoin ownership
10:15
10:15
Play later
Play later
Lists
Like
Liked
10:15Jesse Myers, Bitcoin Strategy Consultant of The Smarter Web Company, joins Jeremy Naylor as part of the UK Investor Magazine Aquis Showcase Series running up to the event on 19th November. Please register for the Aquis Showcase here using the code ‘UKINVEST’ for a 20% discount The Smarter Web Company provides web design, development and online mark…
…
continue reading
1
HN805: The Past, Present, and Future of NANOG
47:46
47:46
Play later
Play later
Lists
Like
Liked
47:46NANOG, or the North American Network Operation Group, is an organization committed to the continuing advancement of an open, secure, and robust Internet. At the NANOG Conference 95 in late October 2025, Ethan Banks chatted with Steve Feldman, a member of NANOG’s Board of Directors. Steve has been involved with NANOG since the very first... Read mor…
…
continue reading
1
Inside DNS Threat Intelligence: Tim Adams on Privacy, Security & Innovation
51:22
51:22
Play later
Play later
Lists
Like
Liked
51:22In this episode of The Defender’s Log, host David Redekop sits down with Tim Adams, DNS threat intelligence expert and founder of ScoutDNS, to uncover the evolving world of DNS security. From his early days running a wireless network integrator to building a resilient DNS resolver service, Tim shares lessons in innovation, resilience, and the art o…
…
continue reading
1
LIU004: From Fast Food to Leading Operations at an ISP
1:02:07
1:02:07
Play later
Play later
Lists
Like
Liked
1:02:07Think you need a degree or a ton of certificates to succeed in tech? Think again. Matthew Oborne joins our hosts Alexis Bertholf and Kevin Nanns to discuss how he went from working fast food to leading operations at an ISP. Your starting point doesn’t define your ceiling; resilience, adaptability, and a willingness to learn... Read more »…
…
continue reading
1
TCG062: The Tech Expertise Deficit with Russ White
48:01
48:01
Play later
Play later
Lists
Like
Liked
48:01Today we delve into the tech expertise deficit and why technical depth and decades of doing the work matter more than social media followers and content creation hype. Our guest is Russ White, engineer, author, teacher, and certification developer. We begin with current events in AI, and then investigate the differences between career and influence…
…
continue reading
1
NAN106: Unimus: Network Automation By and For Network Engineers (Sponsored)
44:49
44:49
Play later
Play later
Lists
Like
Liked
44:49Tomas Kirnak, CEO of Unimus, joins Eric Chou in this sponsored episode to introduce Unimus, an on-premise network configuration management system built by network engineers to solve real-world problems. In this deep dive they discuss Unimus’ proprietary “Behavioral Tree” for automatic device discovery, the platform’s vendor support, the 70/30 rule,…
…
continue reading
1
HS116: Nth-Party Risk May Put You on the (Block) Chain Gang
32:57
32:57
Play later
Play later
Lists
Like
Liked
32:57The evolution of the modern, Internet-driven economy has created the conditions for essentially unbounded Nth-party risks (that is, risks from your suppliers, and risks from your suppliers’ suppliers, and risks from your suppliers’ suppliers’ suppliers, ad infinitum). Nth party risks exist in public clouds, SaaS, software and hardware supply chains…
…
continue reading
1
PP086: Using Let’s Encrypt and the ACME Protocol for Domain Validation Certificates
44:39
44:39
Play later
Play later
Lists
Like
Liked
44:39Certificates are the socks of IT—everyone needs them, and you always lose track of a few. On today’s show we dive into the ACME protocol, an IETF standard to help automate how a domain owner gets a domain validation certificate from a Certificate Authority (CA). Our guest, Ed Harmoush, a former network engineer with AWS... Read more »…
…
continue reading
1
Newbury Racecourse: building income streams beyond the track
15:24
15:24
Play later
Play later
Lists
Like
Liked
15:24Shaun Hinds, CEO of Newbury Racecourse, joins Jeremy Naylor as part of the UK Investor Magazine Aquis Showcase Series running up to the event on 19th November. Please register for the Aquis Showcase here using the code ‘UKINVEST’ for a 20% discount Newbury Racecourse, established in 1904, has been publicly listed since 1982. The venue hosts 28 hors…
…
continue reading
1
Will AI and digital twins make animal testing in drug discovery obsolete with Professor Julie Frearson
23:32
23:32
Play later
Play later
Lists
Like
Liked
23:32AI and digital twins are redrawing the boundaries of drug discovery. Once defined by lab benches, animal studies, and years of trial and error, the field is now embracing virtual methodologies that promise faster, safer, and more precise innovation. But could these technologies ever make animal testing obsolete? In this episode of Tech Tomorrow, Da…
…
continue reading
1
From Data to Performance: Understanding and Improving Your AI Model
26:42
26:42
Play later
Play later
Lists
Like
Liked
26:42Modern data analytic methods and tools—including artificial intelligence (AI) and machine learning (ML) classifiers—are revolutionizing prediction capabilities and automation through their capacity to analyze and classify data. To produce such results, these methods depend on correlations. However, an overreliance on correlations can lead to predic…
…
continue reading
1
NB551: Cisco Adds AI to Tech Support; Cryptography Hits a Post-Quantum Milestone
28:59
28:59
Play later
Play later
Lists
Like
Liked
28:59Take a Network Break! We start with a critical vulnerability in Cisco’s Unified Contact Center Express. On the news front it’s a Cisco triple play: the company brings AI to professional services and tech support with Cisco IQ, debuts converged infrastructure for the AI edge, and launches a new cert geared for running AI data... Read more »…
…
continue reading
1
AI jitters, the Budget playbook and FTSE 100 housebuilders with Tradu
20:18
20:18
Play later
Play later
Lists
Like
Liked
20:18Join us for an insightful conversation with Russell Shor, Senior Market Strategist at Tradu, as we delve into UK interest rates, the bond market, the FTSE 100, and the gyrations in US AI stocks. Find out more about Tradu here. In this episode, we dive deep into the Bank of England’s latest interest rate decision and its unexpected implications, exp…
…
continue reading
1
HN804: How Prisma SASE Builds on Public Clouds for Scale, Resiliency (Sponsored)
56:07
56:07
Play later
Play later
Lists
Like
Liked
56:07How do you architect a Secure Access Service Edge (SASE) to provide critical security services to millions of endpoints distributed across the planet? How do you build such a service for scale, performance, and resiliency? One option is to build your own PoPs or use colocation facilities, run your own infrastructure stack, and connect everything...…
…
continue reading
1
TNO049: Automated Network Testing and Validation
52:50
52:50
Play later
Play later
Lists
Like
Liked
52:50What does network testing and validation really mean? How do testing and validation fit within an automation workflow? Is it possible to run meaningful tests without coding skills? Dan Wade from BlueAlly answers these questions and offers practical insights into building trust in automation through test environments, using AI for ideation and probl…
…
continue reading
Today the IPv6 Buzz crew provides updates on the latest in IPv6 standards, RFCs, and best practices. They break down the recent discussions around RFC 6052, explore the options for RFC 8215, and share Nick’s spin on the now defunct testipv6.com site. Episode Links: RFC 6052 RFC 8215 RFC 6598 IPv6.army…
…
continue reading
MACsec is a protocol for encrypting Ethernet frames on a local (though not always local) network. Ethan Banks and Holly Metlitzky have an ELI5 (explain like I’m 5) discussion as to what exactly is MACsec and how it differs from IPsec. They talk about when and whether you need to implement MACsec with all the... Read more »…
…
continue reading
1
Time to Act: building exciting cleantech and renewables SMEs
17:28
17:28
Play later
Play later
Lists
Like
Liked
17:28Chris Heminway, Executive Chairman of Time to Act, joins the UK Investor Magazine as part of the Aquis Showcase Series running up to the event on 19th November. Please register for the Aquis Showcase here using the code ‘UKINVEST’ for a 20% discount Time to Act is an Aquis-listed aggregator platform that builds and acquires businesses in the SME cl…
…
continue reading
1
D2DO286: Scaling Kubernetes Across Clouds – Identity, DNS, and Security
40:39
40:39
Play later
Play later
Lists
Like
Liked
40:39If you think managing Kubernetes clusters is hard, what about managing Kubernetes clusters across three different public clouds? We dive into the challenges that arises from running multi-cloud Kubernetes workloads. These challenges include workload identity, DNS query resolutions, and security. Here to help us navigate this complexity and offer po…
…
continue reading
1
PP085: News Roundup – Naked Satellite Signals, Account Recovery Buddies, Busting Ghost Networks
52:28
52:28
Play later
Play later
Lists
Like
Liked
52:28Did you know college students are snooping on satellite transmissions? On today’s news roundup we discuss new research in which university investigators use off-the-shelf equipment to intercept traffic from geostationary satellites and discover that a lot of it is unencrypted. We also dig into the credential hygiene lessons we can learn from a corp…
…
continue reading
1
NAN105: Campus Network Automation, Powered by Cisco Agentic Workflows (Sponsored)
44:30
44:30
Play later
Play later
Lists
Like
Liked
44:30Cisco Workflows is a new platform that makes network automation easier, smarter, and safer. On today’s episode, sponsored by Cisco, we get introduced to Cisco Workflows by Stephen Orr, Distinguished Solutions Engineer; and Reid Butler, Director of Product Management. They break down how Workflows helps you ditch repetitive tasks, roll out changes f…
…
continue reading
1
The case for high-quality UK smaller companies with Rights & Issues Investment Trust
29:01
29:01
Play later
Play later
Lists
Like
Liked
29:01In this episode, we sit down with Matt Cable, Fund Manager at Rights & Issues Investment Trust, to explore his investment strategy and approach to UK smaller companies. Find out more about the Rights & Issues Investment Trust here. Matt discusses what sets his fund apart from peers, the practical implications of being style agnostic, and his views …
…
continue reading
nOversight is a Wi-Fi analysis app from Numerous Networks for iOS and Mac iOS that helps both end users and professionals do a better job of understanding how their Wi-Fi is running and how it’s working on their individual devices. Today we talk to Ben Toner, the creator of nOversight to give us the details... Read more »…
…
continue reading
1
NB550: A Cornucopia of AI Switches; DNS Strikes Again
29:38
29:38
Play later
Play later
Lists
Like
Liked
29:38Take a Network Break! We start with some educational content on Small Modular Nuclear Reactors, and sound the alarm about a sandbox escape affecting the Firefox browser. On the news front, a DNS issue triggers a major Azure outage that affected numerous services and caused problems around the globe, Palo Alto Networks announces enhancements to... R…
…
continue reading
1
Defending the Digital Frontline: Ransomware, AI, and Real-World Lessons | Alexander Rau
43:47
43:47
Play later
Play later
Lists
Like
Liked
43:47In this gripping episode of The Defender’s Log, host David Redekop sits down with Alexander Rau, Partner in Cybersecurity at KPMG, to explore the intense world of cyber incident response. From ransomware attacks and business email compromises to AI-driven ransom negotiations, Alexander shares firsthand experiences from the cyber frontlines, reveali…
…
continue reading
1
TNO048: Ops to Orchestrated: An Architect’s Automation Journey
42:09
42:09
Play later
Play later
Lists
Like
Liked
42:09On today’s show, sponsored by Itential, we talk about automation in the real world. Guest Jesse Ford is an automation architect at Itential. We talk about his career journey, how he got into network automation, how he decides which is the best tool for a job, and why tool diversity isn’t the same as chaos.... Read more »…
…
continue reading
On today’s episode, we take a break from one’s and zero’s for a discussion about starting a networking meetup. Our guest is Steinn “Steinzi” Örvar, who recently founded the ISNOG, a network operators’ group in Iceland. We quiz Steinzi about what worked and what didn’t. We also pick his brain for the nitty-gritty details about... Read more »…
…
continue reading
1
What Could Possibly Go Wrong? Safety Analysis for AI Systems
36:14
36:14
Play later
Play later
Lists
Like
Liked
36:14How can you ever know whether an LLM is safe to use? Even self-hosted LLM systems are vulnerable to adversarial prompts left on the internet and waiting to be found by system search engines. These attacks and others exploit the complexity of even seemingly secure AI systems. In our latest podcast from the Carnegie Mellon University Software Enginee…
…
continue reading
1
LIU003: A Chat With ‘The Cloud Therapist’
44:24
44:24
Play later
Play later
Lists
Like
Liked
44:24Your background and experiences outside of tech can become a significant factor in your tech career. Guest Chris Williams is a good example; he talks about how his undergraduate and graduate studies in psychology influenced his work as a Developer Relations Manger at Hashicorp. Hosts Alexis Bertholf and Kevin Nanns chat with him about how... Read m…
…
continue reading