Network Automation Nerds is for network engineers and infrastructure professionals eager to learn more about automation. Join host Eric Chou as he explores how to take advantage of modern network programmability to automate tasks, build robust systems, and get more done in less time. You’ll hear from a lineup of seasoned engineers, avid learners, industry leaders, and tool creators as they share tips, best practices, and hard-won advice.
…
continue reading
Certificate Automation Podcasts
Get exam-ready with the BareMetalCyber Audio Course, your on-demand guide to conquering the CompTIA Cloud+ (CV0-003). Each episode transforms complex topics like cloud design, deployment, security, and troubleshooting into clear, engaging lessons you can apply immediately. Produced by BareMetalCyber.com, where you’ll also find more prepcasts, books, and tools to fuel your certification success.
…
continue reading
As digital threats intensify and compliance requirements grow more demanding, Trust.ID Talk is your critical source for mastering digital identity and PKI management. Brought to you by GlobalSign, this podcast targets the real-world challenges faced by IT security leaders, cybersecurity managers, and tech executives in industries like finance, healthcare, education, government and insurance. Each episode offers a front-row seat to conversations with industry pioneers, thought leaders, and su ...
…
continue reading
The IOFM Podcast is the leading on-the-go resource for the latest news, skill-sharpeners and strategies in the world of Accounts Payable and Procure-to-Pay. Tune in for interviews and insights from top AP professionals and thought leaders as they dig in to what’s new in automation, tax and regulatory compliance, and industry benchmarks, plus hear case studies and listen in on Q&A with experts helping your peers in AP solve their toughest challenges. This podcast is presented by IOFM, the lea ...
…
continue reading
Daily stories from the world of information security. To delve into any daily story, head to CISOseries.com.
…
continue reading
Tastier than a bucket of kittens
…
continue reading
RunAs Radio is a weekly Internet Audio Talk Show for IT Professionals working with Microsoft products.
…
continue reading
Each week, Embedded Computing Design’s EVP Rich Nass speaks to an executive in the embedded industry to understand what’s happening with the latest products, standards, and trends. The frank discussions reveal the real, behind the scenes issues, so the design community knows what’s coming down the pike. Topics covered in artificial intelligence, machine learning, embedded systems, internet of things, industrial automation, automotive applications, open source and more.
…
continue reading
Whether you own a business, service, repair, build, design, or market swimming pools, this is the podcast for you. We interview swimming pool industry business owners, entrepreneurs, pool service and repair companies, builders, manufactures, marketing and social media experts, as well as many others that can help progress, inspire and entertain us all.
…
continue reading
Want to stay up to date on important issues in anti-doping research, technology, law, policy, and more? This podcast presented by the Partnership for Clean Competition covers important topics in the anti-doping field through interviews with experts including scientists, sport organizations, athletes, and other clean sport champions. The Partnership for Clean Competition is a global non-profit organization that is protecting the integrity of sport and public health by engaging and supporting ...
…
continue reading
What is Cybersecurity? What are the available roles? How do you get started? What industry certifications should I pursue? Dr. Jeff Colburn has 30 years of experience in the Information Technology industry. For the past 11 years, he has been teaching his students how to start careers in this field within 6 months without a college degree and without any experience.
…
continue reading

1
Embedded Executive: Matter Certification Just Got Easier | CSA
13:56
13:56
Play later
Play later
Lists
Like
Liked
13:56Every IoT device should comply with the Connectivity Standard Alliance (CSA) Matter standard, but we know that’s not the case. For some developers, doing that is a no-brainer. However, there are some developers who struggle with the process. For that latter group, the CSA recently released a Matter-compliant platform certification that should help …
…
continue reading

1
Russian hackers replace malware with new tools, Windows updates cause login issues, campaign targets high-profile servers
8:03
8:03
Play later
Play later
Lists
Like
Liked
8:03Russian state hackers replace burned malware with new tools Recent Windows updates cause login issues on some PCs Sophisticated campaign targets servers of high-profile organizations Huge thanks to our sponsor, ThreatLocker Imagine having the power to decide exactly what runs in your IT environment — and blocking everything else by default. That’s …
…
continue reading

1
Becoming a Cybersecurity Expert with Paula Januszkiewicz
38:22
38:22
Play later
Play later
Lists
Like
Liked
38:22How do you become a cybersecurity expert? While at Cybersecurity Intersection in Orlando, Richard chatted with Paula Januszkiewicz about her career in cybersecurity. Paula talks about insatiable curiosity to understand how things work the way they do - why an exploit happens and following the twists and turns that lead to root cause and permanent s…
…
continue reading

1
S12|E12 Bringing AVoIP to Life: The Future of Meeting Room Tech with Cisco Vision PTZ
52:44
52:44
Play later
Play later
Lists
Like
Liked
52:44In this episode of Cisco Champion Radio, we dive into the future of meeting room technology and the innovations reshaping hybrid collaboration. From the shift to AV over IP and the power of Cisco Vision PTZ to the AI-driven features in RoomOS 26, Cisco is redefining what’s possible in modern meeting spaces. Discover how AI enhances audio and video …
…
continue reading

1
AWS outage, NSA hacking accusations, High risk WhatsApp automation
8:19
8:19
Play later
Play later
Lists
Like
Liked
8:19DNS failure leads to AWS outage China accuses NSA of hacking national time center Chrome store flooded with high-risk WhatsApp automation Huge thanks to our sponsor, ThreatLocker Cybercriminals don’t knock — they sneak in through the cracks other tools miss. That’s why organizations are turning to ThreatLocker. As a zero-trust endpoint protection p…
…
continue reading

1
160 - Biotage's Role In Protecting Clean Sport in the EMEA Region - Monika Vezse and Dr. Lee Williams
33:07
33:07
Play later
Play later
Lists
Like
Liked
33:07In this episode, Monika Vezse and Dr. Lee Williams joined us to talk about their work at Biotage, a global supplier and solutions partner to a wide range of customers within drug discovery, drug development, and analytical testing. The company's portfolio includes products and solutions that are critical for anti-doping laboratories and scientists …
…
continue reading
In this episode of Cisco Champion Radio, we dive into the future of meeting room technology and the innovations reshaping hybrid collaboration. From the shift to AV over IP and the power of Cisco Vision PTZ to the AI-driven features in RoomOS 26, Cisco is redefining what’s possible in modern meeting spaces.Discover how AI enhances audio and video e…
…
continue reading

1
Europol dismantles SIM farm, Envoy Air compromised, Everest claims Collins hack
8:34
8:34
Play later
Play later
Lists
Like
Liked
8:34Europol dismantles 49 million fake account SIM farm Envoy Air confirms Oracle E-Business Suite compromise Cybercrime group Everest claims Collins Aerospace hack Huge thanks to our sponsor, ThreatLocker Imagine having the power to decide exactly what runs in your IT environment — and blocking everything else by default. That’s what ThreatLocker deli…
…
continue reading

1
Week in Review: Velociraptor pushes LockBit, Hartman loses nomination, Sotheby’s cyberattack
36:07
36:07
Play later
Play later
Lists
Like
Liked
36:07Link to episode page This week’s Cyber Security Headlines – Week in Review is hosted by Rich Stroffolino with guests Tom Hollingsworth, networking technology advisor, The Futurum Group, as well as on BlueSky, and Brett Conlon, CISO, American Century Investments Thanks to our show sponsor, Vanta What’s your 2 AM security worry? Is it “Do I have the …
…
continue reading

1
Sotheby’s suffers cyberattack, Cisco “Zero Disco’ attacks, Microsoft revokes ransomware certificates
8:34
8:34
Play later
Play later
Lists
Like
Liked
8:34Sotheby’s suffers cyberattack Hackers exploit Cisco SNMP flaw in “Zero Disco’ attacks Microsoft revokes more than 200 certificates to disrupt ransomware campaign Huge thanks to our sponsor, Vanta What's your 2 AM security worry? Is it “Do I have the right controls in place?” Or “Are my vendors secure?” ....or the really scary one: "how do I get out…
…
continue reading

1
MANGO discloses data breach, Jewelbug infiltrates Russian IT network, nation-state behind F5 attack?
8:50
8:50
Play later
Play later
Lists
Like
Liked
8:50MANGO discloses data breach Threat group 'Jewelbug' infiltrates Russian IT network F5 discloses breach tied to nation-state threat actor Huge thanks to our sponsor, Vanta What's your 2 AM security worry? Is it “Do I have the right controls in place?” Or “Are my vendors secure?” ....or the really scary one: "how do I get out from under these old too…
…
continue reading

1
NAN103: The Evolution of Multi-Cloud Networking
47:47
47:47
Play later
Play later
Lists
Like
Liked
47:47We’re thrilled to welcome Tim McConnaughy back to the podcast. Tim is a hybrid cloud network architect, author, and co-host of the Cables to Cloud podcast. He recently wrote a 5-part blog series titled ‘Goodbye, Yellow Brick Road’ that reflects on his career path, including his decision to leave a startup. We discuss the impetus... Read more »…
…
continue reading

1
Embedded Executive: Tune Your Compiler for ADAS | Solid Sands
11:12
11:12
Play later
Play later
Lists
Like
Liked
11:12Compilers and ADAS aren’t often used in the same sentence. For developers, that anomaly can represent a design challenge, as compilers in general are not designed for this particular application, which also happens to be at the top of the safety and security checklist. To understand how these compilers should be tested and implemented, I spoke to S…
…
continue reading

1
Legacy Windows protocols expose theft, Fortra admits GoAnywhere defect, Taiwan claims surge in Chinese attacks
7:43
7:43
Play later
Play later
Lists
Like
Liked
7:43Legacy Windows protocols still expose theft Fortra admits exploitation of GoAnywhere defect Taiwan claims surge in Chinese attack efforts Huge thanks to our sponsor, Vanta What's your 2 AM security worry? Is it “Do I have the right controls in place?” Or “Are my vendors secure?” ....or the really scary one: "how do I get out from under these old to…
…
continue reading
It's time to retire NTLM - but how? Richard chats with Steve Syfuhs about the need and challenge of retiring an ubiquitous authentication protocol first used in the 1990s. While guidance to move away from NTLM has been available since 2010, it has only become feasible in the past couple of years, and Microsoft is now providing tooling to make the t…
…
continue reading

1
Salesforce data leak, SimonMed breach, Chipmaker vs. Dutch government
8:38
8:38
Play later
Play later
Lists
Like
Liked
8:38Millions of records exposed in Salesforce data leak SimonMed breach grows from hundreds to over a million Dutch government freezes Chinese-owned chipmaker Huge thanks to our sponsor, Vanta What's your 2 AM security worry? Is it “Do I have the right controls in place?” Or “Are my vendors secure?” ....or the really scary one: "how do I get out from u…
…
continue reading
By Jason Edwards
…
continue reading
Tune into Tech Unscripted for an unfiltered discussion on digital resilience with leaders from WWE, Carnival Cruise Lines, and Customers Bank. This episode explores how organizations stay securely up and running amidst disruptions, covering everything from managing unexpected outages and third-party challenges to leveraging automation, data analyt…
…
continue reading

1
Velociraptor pushes LockBit, Spain dismantles crime group, SonicWall SSL VPN breach
8:40
8:40
Play later
Play later
Lists
Like
Liked
8:40Huge thanks to our sponsor, Vanta What's your 2 AM security worry? Is it “Do I have the right controls in place?” Or “Are my vendors secure?” ....or the really scary one: "how do I get out from under these old tools and manual processes? Enter Vanta. Vanta automates manual work, so you can stop sweating over spreadsheets, chasing audit evidence, an…
…
continue reading

1
Week in Review: Crowdsourced ransomware campaign, Windows 10 woes, California opts out
38:50
38:50
Play later
Play later
Lists
Like
Liked
38:50Link to episode page This week’s Cyber Security Headlines - Week in Review is hosted by Rich Stroffolino with guests Mike Lockhart, CISO Eagleview, and Dustin Sachs, chief technologist at CyberRisk collaborative, and author of Behavioral Insights in Cybersecurity Thanks to our show sponsor, ThreatLocker Cybercriminals don’t knock — they sneak in th…
…
continue reading

1
Microsoft Azure outage, law firm cyberattack, Russian hacktivists pwned
8:34
8:34
Play later
Play later
Lists
Like
Liked
8:34Azure outage blocks access to Microsoft 365 services and admin portals Major U.S. law firm suffers cyberattack Hacktivists aiming for critical infrastructure get pwned Huge thanks to our sponsor, ThreatLocker Imagine having the power to decide exactly what runs in your IT environment — and blocking everything else by default. That’s what ThreatLock…
…
continue reading

1
From Firefighting to Strategizing IT Security with Giles Thornton
16:06
16:06
Play later
Play later
Lists
Like
Liked
16:06In this episode of Trust.ID Talk: The Digital Certificate and Identity Security Podcast, host Michelle Davidson is joined by Giles Thornton, Head of Information Security at The Premier League, to explore why security teams feel like they’re constantly firefighting and how to break free. Giles shares insights into security perfectionism and complian…
…
continue reading

1
DeepMind fixes vulnerabilities, California offers data opt-out, China-Nexus targets open-source tool
7:46
7:46
Play later
Play later
Lists
Like
Liked
7:46Google DeepMind’s AI agent finds and fixes vulnerabilities California law lets consumers universally opt out of data sharing China-Nexus actors weaponize 'Nezha' open source tool Huge thanks to our sponsor, ThreatLocker Cybercriminals don’t knock — they sneak in through the cracks other tools miss. That’s why organizations are turning to ThreatLock…
…
continue reading
In this episode of Cisco Champion Radio, we spotlight Cybersecurity Awareness Month and the resources available to help you strengthen your skills and defenses in an evolving threat landscape. With cyberattacks growing more sophisticated and the industry facing a global shortage of 4 million professionals, the need for education and training has ne…
…
continue reading
Sustainability is no longer a “nice to have”—it’s quickly becoming a priority for businesses, boards, and communities across the globe. In this episode of Cisco Champion Radio, we explore how IT is playing a central role in driving sustainable outcomes and reshaping the future of buildings, products, and customer experiences.Our experts unpack Cisc…
…
continue reading
From AI-powered robots to autonomous vehicles and data-hungry cameras, the next generation of connected assets is pushing wireless networks to their limits. While Wi-Fi 6E and Wi-Fi 7 deliver leaps in speed, bandwidth, and capacity, some applications demand even more—ultra-low latency, higher reliability, and seamless connectivity.In this episode, …
…
continue reading
In this episode of Cisco Champion Radio, we dive into the ever-evolving security landscape, with a focus on the rise of identity-based attacks, third-party risk, and the challenges of integrating security tools in modern operations.Join security experts and Champions as they unpack how cybercriminals are bypassing traditional defenses—exploiting us…
…
continue reading
The tech landscape never stops evolving — and neither does Cisco's commitment to keeping IT professionals ahead of the curve. In this episode of Cisco Champion Radio, we dive deep into the latest updates to the Cisco Certification Portfolio, designed to better align with the skills, roles, and technologies shaping the future of networking.Join us a…
…
continue reading

1
Embedded Executive: AI At the Endpoint | EMASS
11:56
11:56
Play later
Play later
Lists
Like
Liked
11:56AI at the endpoint gets yet another boost from EMASS, a fabless semiconductor company that recently emerged from stealth mode. Having your processing at the endpoint presents a few significant challenges, namely the amount of processing that can be made available and the ability to run from a battery. EMASS has come up with a way to do this a littl…
…
continue reading

1
North Korean attackers steal crypto. Who's sending UK phones to China? Avnet confirms data breach
7:35
7:35
Play later
Play later
Lists
Like
Liked
7:35
…
continue reading
By Amy Norris, Richard Campbell
…
continue reading

1
159 - The 13-Year Battle for Olympic Bronze and the Impacts of Doping on Clean Athletes - Shannon Rowbury
53:38
53:38
Play later
Play later
Lists
Like
Liked
53:38By Partnership for Clean Competition and Dr. Marie McNeely
…
continue reading

1
Unity vulnerability, Oracle zero-day patched, Discord user info exposed
8:31
8:31
Play later
Play later
Lists
Like
Liked
8:31
…
continue reading

1
Not Your Parents’ Better Business Bureau: Top BBB Tools to Stop Fraud
22:43
22:43
Play later
Play later
Lists
Like
Liked
22:43
…
continue reading

1
ParkMobile breach settlement, UK schools vulnerable, Zimbra calendar attacks
8:03
8:03
Play later
Play later
Lists
Like
Liked
8:03ParkMobile 2021 data breach class action suit concludes UK government study suggests secondary schools larger target than businesses Zimbra Collaboration Suite flaw used in calendar attacks Huge thanks to our sponsor, ThreatLocker Imagine having the power to decide exactly what runs in your IT environment — and blocking everything else by default. …
…
continue reading

1
Week in Review: Shutdown furloughs CISA, DoD risk framework, Oracle extortion problem
30:25
30:25
Play later
Play later
Lists
Like
Liked
30:25Link to episode page This week’s Cyber Security Headlines – Week in Review is hosted by Nick Espinosa, nationally syndicated host of The Deep Dive Radio Show, with guest Steve Zalewski, co-host, Defense in Depth Thanks to our show sponsor, Nudge Security Here’s the thing: your employees are signing up for new apps, sharing data, and connecting tool…
…
continue reading

1
Shutdown furloughs CISA, Defender BIOS bug, Motilily dealership cyberattack
7:42
7:42
Play later
Play later
Lists
Like
Liked
7:42Government shutdown furloughs most CISA staff Microsoft Defender bug triggers erroneous BIOS update alerts Motility RV software company suffers cyberattack Huge thanks to our sponsor, Nudge Security Here's the thing: your employees are signing up for new apps, sharing data, and connecting tools together, often without anyone knowing. And, AI adopti…
…
continue reading

1
S12|E11 Cybersecurity Awareness Month: Training, Resources, and Updates from Learn with Cisco
37:18
37:18
Play later
Play later
Lists
Like
Liked
37:18In this episode of Cisco Champion Radio, we spotlight Cybersecurity Awareness Month and the resources available to help you strengthen your skills and defenses in an evolving threat landscape. With cyberattacks growing more sophisticated and the industry facing a global shortage of 4 million professionals, the need for education and training has ne…
…
continue reading

1
Breaches set for North America, Outlook bug needs Microsoft support, Air Force admits SharePoint issue
8:25
8:25
Play later
Play later
Lists
Like
Liked
8:25Breach notification letters set to flood North America's mailboxes New bug in classic Outlook only fixed via Microsoft support Air Force admits SharePoint privacy issue over breach Huge thanks to our sponsor, Nudge Security AI notetakers like Otter AI spread fast. In fact, one Nudge Security customer discovered 800 new accounts created in only 90 d…
…
continue reading

1
NAN102: Practical Applications for AI in Network Automation
1:00:01
1:00:01
Play later
Play later
Lists
Like
Liked
1:00:01As AI becomes more integrated into the IT landscape, developers, engineers, and operators are looking for practical ways to use these new tools. Joining us today is Ryan Booth; he’s built a career around network automation, giving him a unique perspective on how network engineering, operations, software development, and AI intersect. We explore the…
…
continue reading

1
Embedded Executive: The Same Level of Security Is Needed Whether You Have One Device or Millions | Infineon and CommScope
19:30
19:30
Play later
Play later
Lists
Like
Liked
19:30No matter what your end device is, be it a light bulb or a driver’s license, it needs to be secure. I don’t think we need to go through the reasons why it needs to be secure. How you do that is becoming increasingly more difficult. And you may be looking at protecting millions of devices, where each one needs its own unique identity. To get a handl…
…
continue reading