This Week in Enterprise Tech explores the complex, cutting edge world of enterprise technology. Hosted by Lou Maresca, TWiET features IT professionals explaining the ins and outs of enterprise solutions. Although the show is no longer in production, you can enjoy episodes from our archives.
…
continue reading
18% science, 27% irreverence, 22% current events, 56% geek life, 13% non-sequiturs and $19 of ranting. That's the formula for Padre's Corner – A show that's not necessarily about tech news, but created by those who love news about tech. Join Padre each week as he picks up the stories that fall through the cracks and geeks out with your favorite folks from around the Interwebz. Although the show is currently on hiatus, you can enjoy episodes from the TWiT Archives.
…
continue reading
18% science, 27% irreverence, 22% current events, 56% geek life, 13% non-sequiturs and $19 of ranting. That's the formula for Padre's Corner – A show that's not necessarily about tech news, but created by those who love news about tech. Join Padre each week as he picks up the stories that fall through the cracks and geeks out with your favorite folks from around the Interwebz. Although the show is currently on hiatus, you can enjoy episodes from the TWiT Archives.
…
continue reading

1
TWiET 573: DNS Deep Dive Part 3: Exploring Internal DNS and AD - KV-Botnet, Internal DNS Security, and Farewell Episode
1:15:07
1:15:07
Play later
Play later
Lists
Like
Liked
1:15:07The TWiET crew delves into botnets, securing hybrid work environments, the future of DNS architecture, and more. News Blips: Researchers uncover sophisticated IoT botnet named "K- Botnet" targeting US entities; linked to Chinese state-aligned hackers AI startup Vanta (a TWiT.tv Sponsor) launches AI suite to automate repetitive security and complian…
…
continue reading

1
TWiET 572: DNS Deep Dive Part 2: External Authoritative DNS - Journey into the Heart of the Domain Name System
1:13:10
1:13:10
Play later
Play later
Lists
Like
Liked
1:13:10Proxy trojan targets macOS users for traffic redirection Indoor navigation has had a slow start Krasue RAT uses cross-kernel Linux rootkit to attack telecoms U.S. approves first gene-editing treatment, Casgevy, for sickle cell disease The DNS Deep-Drive continues with guests Josh Kuo, DNS expert, and Ross Gibson, Principal Solutions Architect of In…
…
continue reading

1
TWiET 571: DNS Deep Dive Part 1: Demystifying DNS - Enterprise DNS basics
1:08:10
1:08:10
Play later
Play later
Lists
Like
Liked
1:08:10Hackers Can Easily Extract ChatGPT Training Data Cheebert's prediction about VDI just came true Big Tech jobs are not as immune to layoffs as we thought Siemens PLCs are Still Vulnerable to Stuxnet-like Cyberattacks Josh Kuo, DNS Expert and Ross Gibson, Principal Solutions Architect of Infoblox join Brian Chee and Curt Franklin for part 1 of a 3 pa…
…
continue reading

1
TWiET 570: Well-Placed Friction - EU's NIS2 Directive, better UX for DevOps w/ LaunchDarkly
1:11:11
1:11:11
Play later
Play later
Lists
Like
Liked
1:11:11Ransomware group reports a victim company to the SEC for failing to promptly disclose a breach. Shadowy hack-for-hire group behind sprawling web of global cyberattacks Electrical arc detection devices that can prevent dangerous home fires caused by faulty wiring. The worst passwords of 2023 The NIS2 Directive: The first piece of EU-wide legislation…
…
continue reading

1
TWiET 569: Are Your Patches trackd? - Bridging the cybersecurity skills gap, vulnerability and patch management with TrackD
1:13:00
1:13:00
Play later
Play later
Lists
Like
Liked
1:13:00CISA Alerts: High-Severity SLP Vulnerability currently being exploited. ChatGPT outages attributed to DDoS activity. Gen Z and Millennial employees are a bigger cybersecurity risk than older employees. Security firm finds highly invasive malware hidden in software developer tools. Strategies for bridging the cybersecurity skills gap. Mike Star, CEO…
…
continue reading

1
TWiET 568: Find the Gap Before You $pend - President Biden's AI Executive Order, Software TCO with Olive
1:05:07
1:05:07
Play later
Play later
Lists
Like
Liked
1:05:07Okta customer data exposed in support breach impacting 134 companies. Biden requests $3.1B more for FCC's "rip-and-replace" program to remove insecure equipment from federal networks, targeting Huawei and ZTE equipment. Kaspersky finds Android spyware targeting WhatsApp users, reusing malware from Telegram cyber attacks. U.S. Immigration and Custom…
…
continue reading

1
TWiET 567: Lost in Translation - Boosting security hygiene, DNS security with Infoblox
1:16:01
1:16:01
Play later
Play later
Lists
Like
Liked
1:16:01iLeakage gives hackers access passwords and sensitive data on iOS and macOS browsers. 0ktapus is "one of the world's most dangerous financial criminal groups" says Microsoft. Apple backs national right-to-repair bill. Pro-Russia hackers exploiting 0-day in Roundcube webmail software. 9 innovative ways to boost security hygiene for Cyber Awareness M…
…
continue reading

1
TWiET 566: DevOps Culture Vulture - Reimagining DevOps with System Initiative
1:17:27
1:17:27
Play later
Play later
Lists
Like
Liked
1:17:27This info-packed episode of TWiET dives into the hidden dangers of Google hosted ads with malware. Guest Adam Jacob shares his vision for a "second wave" of DevOps to achieve better collaboration and outcomes. Patch Winrar right now The most used IT Admin passwords Cisco reports 10,000 network devices backdoored with unpatched 0-day The global chip…
…
continue reading

1
TWiET 565: Cheebert's MDM Dreams - Adobe's Content Credentials, programmable MDM with Fleet
1:12:03
1:12:03
Play later
Play later
Lists
Like
Liked
1:12:03On This Week in Enterprise Tech, Lou, Curt, and Brian dive into how remote console devices are empowering IT pros, the future of digital trust and content authenticity, and the evolving landscape of endpoint management security. Jeff Marraccini from Altair explains how air console devices allow him to remotely access noisy server racks to diagnose …
…
continue reading

1
TWiET 564: Data Is Bigger In Texas - Cybersecurity Recruitment, Edge Computing, Hyperscale Cloud With Involta
1:10:40
1:10:40
Play later
Play later
Lists
Like
Liked
1:10:40This episode of This Week In Enterprise Tech discusses the major cybersecurity recruitment challenges organizations face today and dives into the world of enterprise edge computing and the future of hyperscale cloud services with Scott Evers of Involta. News Blips: The hosts discuss a severe vulnerability in Atlassian's Confluence Server that allow…
…
continue reading

1
TWiET 563: Don't Drop Your File Drawers - SASE in the Enterprise, document archiving & file management
1:06:09
1:06:09
Play later
Play later
Lists
Like
Liked
1:06:09This episode of This Week in Enterprise Tech covers the convergence of networking and security with the emergence of SASE (secure access service edge), tips for navigating the document and file management landscape, and more enterprise tech stories. A new Chrome 0-day is sending the Internet into a new chapter of Groundhog Day DHS Calls Into Questi…
…
continue reading

1
TWiET 562: Who Woulda Thunk Splunk? - Cisco to aquire Splunk, Intel's new neural processors
1:05:36
1:05:36
Play later
Play later
Lists
Like
Liked
1:05:36This episode of This Week in Enterprise Tech packs in analysis on Cisco's shocking $25 billion acquisition of Splunk and what it means for the cybersecurity ecosystem. Plus, Intel VP of Sales & Marketing Jason Kimrey joins to decode the company's groundbreaking new neural processors and innovations in chip design, and accelerating AI processing at …
…
continue reading

1
TWiET 561: That Cloud Looks Like A Llama - Moving on from old protocols, accessible machine learning with Predibase
1:14:14
1:14:14
Play later
Play later
Lists
Like
Liked
1:14:14This week on TWiET, Lou Maresca, Brian Chee, and Curt Franklin talk with Dev Rishi, Co-Founder and CEO at Predibase, discussing the hurdles of moving large language models into production environments and how privacy concerns factor into that decision. Guest Dev Rishi of Predibase explains why many organizations say they can't use commercial LLMs, …
…
continue reading

1
TWiET 560: Vishing for compliments - Out-of-Band Management, Voice Network Security w/ Mutare
1:10:01
1:10:01
Play later
Play later
Lists
Like
Liked
1:10:01On This Week in Enterprise Tech, Lou Maresca, Brian Chee, and Curtis Franklin dive into how the SEC's proposed cybersecurity rules could reshape how corporations handle disclosures and risk management. Guest Brian McDonald from Mutare also shares insights on securing voice communications against rising cyber threats. Plus Brian Chee explains out-of…
…
continue reading

1
TWiET 559: Salesforcing AI - ISPs want Big Tech to fund broadband construction, AI for CRM with Salesforce
1:04:00
1:04:00
Play later
Play later
Lists
Like
Liked
1:04:00UK's Online Safety Bill compromises end-to-end encryption and could result in systemic security risks Cybercriminal gangs are trafficing cybercrime workers Pros and Cons of JAVA programing AirBnb accounts hacked using stealers malware and stolen cookies Should Big Tech firms help pay for broadband contruction? Ketan Karkhanis, executive vice presid…
…
continue reading

1
TWiET 558: You Got Your AI In My Enterprise - 2023 Black Hat and DefCon report, AI data analytics with Virtualitics
1:08:45
1:08:45
Play later
Play later
Lists
Like
Liked
1:08:45This week on This Week in Enterprise Tech, host Lou Maresca and co-hosts Curt Franklin and Brian Chee explore the key takeaways from the 2023 Black Hat and DEF CON cybersecurity conferences. They discuss the proliferation of AI, especially in relation to security. Guest Michael Amori, CEO of Virtualitics, talks about how AI is impacting data analyt…
…
continue reading

1
TWiET 557: How Lucid Are Your Collaboration Tools? - ChatGPT copyright issues, visual collaboration with Lucid Software
1:03:37
1:03:37
Play later
Play later
Lists
Like
Liked
1:03:37This episode of This Week in Enterprise Tech discusses the latest issues around AI, including legal implications, security concerns, and practical applications. Lucid Software Chief Product Officer Dan Lawyer joins hosts Curt Franklin, Brian Chee, and Oliver Rist to explain how Lucid's visual collaboration tools aim to improve teamwork through inte…
…
continue reading

1
TWiET 556: Smart SaaS - Facial Recognition Lawsuit, AI-generated Fake Books, SaaS Management with Zylo
1:06:34
1:06:34
Play later
Play later
Lists
Like
Liked
1:06:34Facial Recognition Lawsuit, AI-generated Fake Books, SaaS Management with Zylo, and more. How fame-seeking teenagers hacked some of the world's biggest targets Innocent pregnant woman jailed amid faulty facial recognition trend XWorm, Remcos RAT evade EDRs to infect critical infrastructure Homage to Lahaina Author discovers AI-generated counterfeit…
…
continue reading

1
TWiET 555: AR and VR Grow Up Into XR - White House's National Cyber Workforce Strategy, Spatial Computing with IQXR
1:12:23
1:12:23
Play later
Play later
Lists
Like
Liked
1:12:23Researchers strengthen defenses against denial-of-service attack Cult of the Dead Cow Hacktivists Give Life to 'Privacy-First' App Framework Photoshop can now use generative AI to expand images Text prompts for AI are also available in over 100 languages. US military battling cyber threats from within and without White House Cyber Workforce Strateg…
…
continue reading

1
TWiET 554: Is AI The Next Spell Checker? - SEC wants cybersecurity experts in corporations, Erudit: AI for workplace wellbeing
1:15:11
1:15:11
Play later
Play later
Lists
Like
Liked
1:15:11Cloudflare Radar's new BGP origin hijack detection system TSA Updates Pipeline Cybersecurity Requirements AT&T and Verizon's ancient lead cables have US lawmakers demanding action EFF: FBI Seizure of Mastodon Server Data is a Wakeup Call to Fediverse Users and Hosts to Protect their Users Companies Must Have Corporate Cybersecurity Experts, SEC Say…
…
continue reading

1
TWiET 553: The Holy Grail of SaaS Security - The White House's Cybersecurity Label, SaaS Security with DoControl
1:02:18
1:02:18
Play later
Play later
Lists
Like
Liked
1:02:18Rootkit Attack Detections Increase at UAE Businesses White House, Big Tech Ink Commitments to Secure AI Firmware vulnerabilities in millions of computers could give hackers superuser status The Biden administration is tackling smart devices with a new cybersecurity label Adam Gavish, CEO and Co-Founder of DoControl talks about how you and your orga…
…
continue reading

1
TWiET 552: Keyless is the Key - White House National Cybersecurity Strategy, digital identity management with Veridas
1:14:57
1:14:57
Play later
Play later
Lists
Like
Liked
1:14:57AWS Lambda proactively warms things up WormGPT Cybercrime Tool Heralds an Era of AI Malware vs. AI Defenses DirectorStorage on Windows now works for consumers and games White House Fills in Details of National Cybersecurity Strategy Hackers Say Generative AI Unlikely to Replace Human Cybersecurity Skills According to Bugcrowd Survey Alfonso Santos …
…
continue reading

1
TWiET 551: Humans -The Problem in IT - Verizon's 2023 Data Breach Report, Data Security with Sentra
1:04:19
1:04:19
Play later
Play later
Lists
Like
Liked
1:04:19336,000 servers remain unpatched against critical Fortigate vulnerability Patchless Cisco flaw breaks cloud encryption for ACI traffic Google changed its privacy policy to reflect Bard AI's data collecting Top 10 cybersecurity findings from Verizon's 2023 data breach report Ron Reiter, Co-Founder and CTO of Sentra talks data security and improving …
…
continue reading

1
TWiET 550: Shine a Light on Dark Data - Minimizing Dark Data Risk, Advanced ERP systems with Oracle NetSuite
1:06:52
1:06:52
Play later
Play later
Lists
Like
Liked
1:06:52TSMC confirms data breach after LockBit cyberattack on third-party supplier Red Hat Says "Bye Bye CentOS" Cybercriminals Hijacking Vulnerable SSH Servers in New Proxyjacking Campaign ChatGPT's Still a Baby and It's Already Getting Sued Minimizing Dark Data Risk Ranga Bodla, Vice President of Field Engagement and Marketing at Oracle NetSuite talks a…
…
continue reading

1
TWiET 549: Aerospike's Real-Time Data Platform - Power meter vulnerabilities, USB drive spyware, Processing Real-Time Data with Aerospike
1:08:27
1:08:27
Play later
Play later
Lists
Like
Liked
1:08:27AWS launches $100M program to fund generative AI initiatives Smaller firms aim to consolidate security tools Schneider power meter vulnerability opens door to power outages Satellite-based laser communication: A rival to fibre networks? USB drives spread spyware as China's Mustang Panda APT goes global Lenley Hensarling, Chief Product Officer of Ae…
…
continue reading