Search a title or topic

Over 20 million podcasts, powered by 

Player FM logo

Certificate Automation Podcasts

show episodes
 
Network Automation Nerds is for network engineers and infrastructure professionals eager to learn more about automation. Join host Eric Chou as he explores how to take advantage of modern network programmability to automate tasks, build robust systems, and get more done in less time. You’ll hear from a lineup of seasoned engineers, avid learners, industry leaders, and tool creators as they share tips, best practices, and hard-won advice.
  continue reading
 
Get exam-ready with the BareMetalCyber Audio Course, your on-demand guide to conquering the CompTIA Cloud+ (CV0-003). Each episode transforms complex topics like cloud design, deployment, security, and troubleshooting into clear, engaging lessons you can apply immediately. Produced by BareMetalCyber.com, where you’ll also find more prepcasts, books, and tools to fuel your certification success.
  continue reading
 
As digital threats intensify and compliance requirements grow more demanding, Trust.ID Talk is your critical source for mastering digital identity and PKI management. Brought to you by GlobalSign, this podcast targets the real-world challenges faced by IT security leaders, cybersecurity managers, and tech executives in industries like finance, healthcare, education, government and insurance. Each episode offers a front-row seat to conversations with industry pioneers, thought leaders, and su ...
  continue reading
 
The IOFM Podcast is the leading on-the-go resource for the latest news, skill-sharpeners and strategies in the world of Accounts Payable and Procure-to-Pay. Tune in for interviews and insights from top AP professionals and thought leaders as they dig in to what’s new in automation, tax and regulatory compliance, and industry benchmarks, plus hear case studies and listen in on Q&A with experts helping your peers in AP solve their toughest challenges. This podcast is presented by IOFM, the lea ...
  continue reading
 
Artwork

1
Embedded Executive Podcast

Rich Nass, Embedded Computing Design

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
Each week, Embedded Computing Design’s EVP Rich Nass speaks to an executive in the embedded industry to understand what’s happening with the latest products, standards, and trends. The frank discussions reveal the real, behind the scenes issues, so the design community knows what’s coming down the pike. Topics covered in artificial intelligence, machine learning, embedded systems, internet of things, industrial automation, automotive applications, open source and more.
  continue reading
 
Artwork

1
Pool Chasers Podcast

Greg & Justin, Swimming Pool

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
Whether you own a business, service, repair, build, design, or market swimming pools, this is the podcast for you. We interview swimming pool industry business owners, entrepreneurs, pool service and repair companies, builders, manufactures, marketing and social media experts, as well as many others that can help progress, inspire and entertain us all.
  continue reading
 
Artwork

1
The Anti-Doping Podcast

Dr. Marie McNeely and the Partnership for Clean Competition

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
Want to stay up to date on important issues in anti-doping research, technology, law, policy, and more? This podcast presented by the Partnership for Clean Competition covers important topics in the anti-doping field through interviews with experts including scientists, sport organizations, athletes, and other clean sport champions. The Partnership for Clean Competition is a global non-profit organization that is protecting the integrity of sport and public health by engaging and supporting ...
  continue reading
 
What is Cybersecurity? What are the available roles? How do you get started? What industry certifications should I pursue? Dr. Jeff Colburn has 30 years of experience in the Information Technology industry. For the past 11 years, he has been teaching his students how to start careers in this field within 6 months without a college degree and without any experience.
  continue reading
 
Loading …
show series
 
Every IoT device should comply with the Connectivity Standard Alliance (CSA) Matter standard, but we know that’s not the case. For some developers, doing that is a no-brainer. However, there are some developers who struggle with the process. For that latter group, the CSA recently released a Matter-compliant platform certification that should help …
  continue reading
 
Russian state hackers replace burned malware with new tools Recent Windows updates cause login issues on some PCs Sophisticated campaign targets servers of high-profile organizations Huge thanks to our sponsor, ThreatLocker Imagine having the power to decide exactly what runs in your IT environment — and blocking everything else by default. That’s …
  continue reading
 
How do you become a cybersecurity expert? While at Cybersecurity Intersection in Orlando, Richard chatted with Paula Januszkiewicz about her career in cybersecurity. Paula talks about insatiable curiosity to understand how things work the way they do - why an exploit happens and following the twists and turns that lead to root cause and permanent s…
  continue reading
 
In this episode of Cisco Champion Radio, we dive into the future of meeting room technology and the innovations reshaping hybrid collaboration. From the shift to AV over IP and the power of Cisco Vision PTZ to the AI-driven features in RoomOS 26, Cisco is redefining what’s possible in modern meeting spaces. Discover how AI enhances audio and video …
  continue reading
 
DNS failure leads to AWS outage China accuses NSA of hacking national time center Chrome store flooded with high-risk WhatsApp automation Huge thanks to our sponsor, ThreatLocker Cybercriminals don’t knock — they sneak in through the cracks other tools miss. That’s why organizations are turning to ThreatLocker. As a zero-trust endpoint protection p…
  continue reading
 
In this episode, Monika Vezse and Dr. Lee Williams joined us to talk about their work at Biotage, a global supplier and solutions partner to a wide range of customers within drug discovery, drug development, and analytical testing. The company's portfolio includes products and solutions that are critical for anti-doping laboratories and scientists …
  continue reading
 
In this episode of Cisco Champion Radio, we dive into the future of meeting room technology and the innovations reshaping hybrid collaboration. From the shift to AV over IP and the power of Cisco Vision PTZ to the AI-driven features in RoomOS 26, Cisco is redefining what’s possible in modern meeting spaces.Discover how AI enhances audio and video e…
  continue reading
 
Europol dismantles 49 million fake account SIM farm Envoy Air confirms Oracle E-Business Suite compromise Cybercrime group Everest claims Collins Aerospace hack Huge thanks to our sponsor, ThreatLocker Imagine having the power to decide exactly what runs in your IT environment — and blocking everything else by default. That’s what ThreatLocker deli…
  continue reading
 
Link to episode page This week’s Cyber Security Headlines – Week in Review is hosted by Rich Stroffolino with guests Tom Hollingsworth, networking technology advisor, The Futurum Group, as well as on BlueSky, and Brett Conlon, CISO, American Century Investments Thanks to our show sponsor, Vanta What’s your 2 AM security worry? Is it “Do I have the …
  continue reading
 
Sotheby’s suffers cyberattack Hackers exploit Cisco SNMP flaw in “Zero Disco’ attacks Microsoft revokes more than 200 certificates to disrupt ransomware campaign Huge thanks to our sponsor, Vanta What's your 2 AM security worry? Is it “Do I have the right controls in place?” Or “Are my vendors secure?” ....or the really scary one: "how do I get out…
  continue reading
 
MANGO discloses data breach Threat group 'Jewelbug' infiltrates Russian IT network F5 discloses breach tied to nation-state threat actor Huge thanks to our sponsor, Vanta What's your 2 AM security worry? Is it “Do I have the right controls in place?” Or “Are my vendors secure?” ....or the really scary one: "how do I get out from under these old too…
  continue reading
 
We’re thrilled to welcome Tim McConnaughy back to the podcast. Tim is a hybrid cloud network architect, author, and co-host of the Cables to Cloud podcast. He recently wrote a 5-part blog series titled ‘Goodbye, Yellow Brick Road’ that reflects on his career path, including his decision to leave a startup. We discuss the impetus... Read more »…
  continue reading
 
Compilers and ADAS aren’t often used in the same sentence. For developers, that anomaly can represent a design challenge, as compilers in general are not designed for this particular application, which also happens to be at the top of the safety and security checklist. To understand how these compilers should be tested and implemented, I spoke to S…
  continue reading
 
Legacy Windows protocols still expose theft Fortra admits exploitation of GoAnywhere defect Taiwan claims surge in Chinese attack efforts Huge thanks to our sponsor, Vanta What's your 2 AM security worry? Is it “Do I have the right controls in place?” Or “Are my vendors secure?” ....or the really scary one: "how do I get out from under these old to…
  continue reading
 
It's time to retire NTLM - but how? Richard chats with Steve Syfuhs about the need and challenge of retiring an ubiquitous authentication protocol first used in the 1990s. While guidance to move away from NTLM has been available since 2010, it has only become feasible in the past couple of years, and Microsoft is now providing tooling to make the t…
  continue reading
 
Millions of records exposed in Salesforce data leak SimonMed breach grows from hundreds to over a million Dutch government freezes Chinese-owned chipmaker Huge thanks to our sponsor, Vanta What's your 2 AM security worry? Is it “Do I have the right controls in place?” Or “Are my vendors secure?” ....or the really scary one: "how do I get out from u…
  continue reading
 
 Tune into Tech Unscripted for an unfiltered discussion on digital resilience with leaders from WWE, Carnival Cruise Lines, and Customers Bank. This episode explores how organizations stay securely up and running amidst disruptions, covering everything from managing unexpected outages and third-party challenges to leveraging automation, data analyt…
  continue reading
 
Huge thanks to our sponsor, Vanta What's your 2 AM security worry? Is it “Do I have the right controls in place?” Or “Are my vendors secure?” ....or the really scary one: "how do I get out from under these old tools and manual processes? Enter Vanta. Vanta automates manual work, so you can stop sweating over spreadsheets, chasing audit evidence, an…
  continue reading
 
Link to episode page This week’s Cyber Security Headlines - Week in Review is hosted by Rich Stroffolino with guests Mike Lockhart, CISO Eagleview, and Dustin Sachs, chief technologist at CyberRisk collaborative, and author of Behavioral Insights in Cybersecurity Thanks to our show sponsor, ThreatLocker Cybercriminals don’t knock — they sneak in th…
  continue reading
 
Azure outage blocks access to Microsoft 365 services and admin portals Major U.S. law firm suffers cyberattack Hacktivists aiming for critical infrastructure get pwned Huge thanks to our sponsor, ThreatLocker Imagine having the power to decide exactly what runs in your IT environment — and blocking everything else by default. That’s what ThreatLock…
  continue reading
 
In this episode of Trust.ID Talk: The Digital Certificate and Identity Security Podcast, host Michelle Davidson is joined by Giles Thornton, Head of Information Security at The Premier League, to explore why security teams feel like they’re constantly firefighting and how to break free. Giles shares insights into security perfectionism and complian…
  continue reading
 
Google DeepMind’s AI agent finds and fixes vulnerabilities California law lets consumers universally opt out of data sharing China-Nexus actors weaponize 'Nezha' open source tool Huge thanks to our sponsor, ThreatLocker Cybercriminals don’t knock — they sneak in through the cracks other tools miss. That’s why organizations are turning to ThreatLock…
  continue reading
 
In this episode of Cisco Champion Radio, we spotlight Cybersecurity Awareness Month and the resources available to help you strengthen your skills and defenses in an evolving threat landscape. With cyberattacks growing more sophisticated and the industry facing a global shortage of 4 million professionals, the need for education and training has ne…
  continue reading
 
Sustainability is no longer a “nice to have”—it’s quickly becoming a priority for businesses, boards, and communities across the globe. In this episode of Cisco Champion Radio, we explore how IT is playing a central role in driving sustainable outcomes and reshaping the future of buildings, products, and customer experiences.Our experts unpack Cisc…
  continue reading
 
From AI-powered robots to autonomous vehicles and data-hungry cameras, the next generation of connected assets is pushing wireless networks to their limits. While Wi-Fi 6E and Wi-Fi 7 deliver leaps in speed, bandwidth, and capacity, some applications demand even more—ultra-low latency, higher reliability, and seamless connectivity.In this episode, …
  continue reading
 
In this episode of Cisco Champion Radio, we dive into the ever-evolving security landscape, with a focus on the rise of identity-based attacks, third-party risk, and the challenges of integrating security tools in modern operations.Join security experts and Champions as they unpack how cybercriminals are bypassing traditional defenses—exploiting us…
  continue reading
 
The tech landscape never stops evolving — and neither does Cisco's commitment to keeping IT professionals ahead of the curve. In this episode of Cisco Champion Radio, we dive deep into the latest updates to the Cisco Certification Portfolio, designed to better align with the skills, roles, and technologies shaping the future of networking.Join us a…
  continue reading
 
AI at the endpoint gets yet another boost from EMASS, a fabless semiconductor company that recently emerged from stealth mode. Having your processing at the endpoint presents a few significant challenges, namely the amount of processing that can be made available and the ability to run from a battery. EMASS has come up with a way to do this a littl…
  continue reading
 
ParkMobile 2021 data breach class action suit concludes UK government study suggests secondary schools larger target than businesses Zimbra Collaboration Suite flaw used in calendar attacks Huge thanks to our sponsor, ThreatLocker Imagine having the power to decide exactly what runs in your IT environment — and blocking everything else by default. …
  continue reading
 
Link to episode page This week’s Cyber Security Headlines – Week in Review is hosted by Nick Espinosa, nationally syndicated host of The Deep Dive Radio Show, with guest Steve Zalewski, co-host, Defense in Depth Thanks to our show sponsor, Nudge Security Here’s the thing: your employees are signing up for new apps, sharing data, and connecting tool…
  continue reading
 
Government shutdown furloughs most CISA staff Microsoft Defender bug triggers erroneous BIOS update alerts Motility RV software company suffers cyberattack Huge thanks to our sponsor, Nudge Security Here's the thing: your employees are signing up for new apps, sharing data, and connecting tools together, often without anyone knowing. And, AI adopti…
  continue reading
 
In this episode of Cisco Champion Radio, we spotlight Cybersecurity Awareness Month and the resources available to help you strengthen your skills and defenses in an evolving threat landscape. With cyberattacks growing more sophisticated and the industry facing a global shortage of 4 million professionals, the need for education and training has ne…
  continue reading
 
Breach notification letters set to flood North America's mailboxes New bug in classic Outlook only fixed via Microsoft support Air Force admits SharePoint privacy issue over breach Huge thanks to our sponsor, Nudge Security AI notetakers like Otter AI spread fast. In fact, one Nudge Security customer discovered 800 new accounts created in only 90 d…
  continue reading
 
As AI becomes more integrated into the IT landscape, developers, engineers, and operators are looking for practical ways to use these new tools. Joining us today is Ryan Booth; he’s built a career around network automation, giving him a unique perspective on how network engineering, operations, software development, and AI intersect. We explore the…
  continue reading
 
No matter what your end device is, be it a light bulb or a driver’s license, it needs to be secure. I don’t think we need to go through the reasons why it needs to be secure. How you do that is becoming increasingly more difficult. And you may be looking at protecting millions of devices, where each one needs its own unique identity. To get a handl…
  continue reading
 
Loading …
Copyright 2025 | Privacy Policy | Terms of Service | | Copyright
Listen to this show while you explore
Play