This Week in Enterprise Tech explores the complex, cutting edge world of enterprise technology. Hosted by Lou Maresca, TWiET features IT professionals explaining the ins and outs of enterprise solutions. Although the show is no longer in production, you can enjoy episodes from our archives.
…
continue reading

1
TWiET 573: DNS Deep Dive Part 3: Exploring Internal DNS and AD - KV-Botnet, Internal DNS Security, and Farewell Episode
1:15:07
1:15:07
Play later
Play later
Lists
Like
Liked
1:15:07The TWiET crew delves into botnets, securing hybrid work environments, the future of DNS architecture, and more. News Blips: Researchers uncover sophisticated IoT botnet named "K- Botnet" targeting US entities; linked to Chinese state-aligned hackers AI startup Vanta (a TWiT.tv Sponsor) launches AI suite to automate repetitive security and complian…
…
continue reading

1
TWiET 572: DNS Deep Dive Part 2: External Authoritative DNS - Journey into the Heart of the Domain Name System
1:13:10
1:13:10
Play later
Play later
Lists
Like
Liked
1:13:10Proxy trojan targets macOS users for traffic redirection Indoor navigation has had a slow start Krasue RAT uses cross-kernel Linux rootkit to attack telecoms U.S. approves first gene-editing treatment, Casgevy, for sickle cell disease The DNS Deep-Drive continues with guests Josh Kuo, DNS expert, and Ross Gibson, Principal Solutions Architect of In…
…
continue reading

1
TWiET 571: DNS Deep Dive Part 1: Demystifying DNS - Enterprise DNS basics
1:08:10
1:08:10
Play later
Play later
Lists
Like
Liked
1:08:10Hackers Can Easily Extract ChatGPT Training Data Cheebert's prediction about VDI just came true Big Tech jobs are not as immune to layoffs as we thought Siemens PLCs are Still Vulnerable to Stuxnet-like Cyberattacks Josh Kuo, DNS Expert and Ross Gibson, Principal Solutions Architect of Infoblox join Brian Chee and Curt Franklin for part 1 of a 3 pa…
…
continue reading

1
TWiET 570: Well-Placed Friction - EU's NIS2 Directive, better UX for DevOps w/ LaunchDarkly
1:11:11
1:11:11
Play later
Play later
Lists
Like
Liked
1:11:11Ransomware group reports a victim company to the SEC for failing to promptly disclose a breach. Shadowy hack-for-hire group behind sprawling web of global cyberattacks Electrical arc detection devices that can prevent dangerous home fires caused by faulty wiring. The worst passwords of 2023 The NIS2 Directive: The first piece of EU-wide legislation…
…
continue reading

1
TWiET 569: Are Your Patches trackd? - Bridging the cybersecurity skills gap, vulnerability and patch management with TrackD
1:13:00
1:13:00
Play later
Play later
Lists
Like
Liked
1:13:00CISA Alerts: High-Severity SLP Vulnerability currently being exploited. ChatGPT outages attributed to DDoS activity. Gen Z and Millennial employees are a bigger cybersecurity risk than older employees. Security firm finds highly invasive malware hidden in software developer tools. Strategies for bridging the cybersecurity skills gap. Mike Star, CEO…
…
continue reading

1
TWiET 568: Find the Gap Before You $pend - President Biden's AI Executive Order, Software TCO with Olive
1:05:07
1:05:07
Play later
Play later
Lists
Like
Liked
1:05:07Okta customer data exposed in support breach impacting 134 companies. Biden requests $3.1B more for FCC's "rip-and-replace" program to remove insecure equipment from federal networks, targeting Huawei and ZTE equipment. Kaspersky finds Android spyware targeting WhatsApp users, reusing malware from Telegram cyber attacks. U.S. Immigration and Custom…
…
continue reading

1
TWiET 567: Lost in Translation - Boosting security hygiene, DNS security with Infoblox
1:16:01
1:16:01
Play later
Play later
Lists
Like
Liked
1:16:01iLeakage gives hackers access passwords and sensitive data on iOS and macOS browsers. 0ktapus is "one of the world's most dangerous financial criminal groups" says Microsoft. Apple backs national right-to-repair bill. Pro-Russia hackers exploiting 0-day in Roundcube webmail software. 9 innovative ways to boost security hygiene for Cyber Awareness M…
…
continue reading

1
TWiET 566: DevOps Culture Vulture - Reimagining DevOps with System Initiative
1:17:27
1:17:27
Play later
Play later
Lists
Like
Liked
1:17:27This info-packed episode of TWiET dives into the hidden dangers of Google hosted ads with malware. Guest Adam Jacob shares his vision for a "second wave" of DevOps to achieve better collaboration and outcomes. Patch Winrar right now The most used IT Admin passwords Cisco reports 10,000 network devices backdoored with unpatched 0-day The global chip…
…
continue reading

1
TWiET 565: Cheebert's MDM Dreams - Adobe's Content Credentials, programmable MDM with Fleet
1:12:03
1:12:03
Play later
Play later
Lists
Like
Liked
1:12:03On This Week in Enterprise Tech, Lou, Curt, and Brian dive into how remote console devices are empowering IT pros, the future of digital trust and content authenticity, and the evolving landscape of endpoint management security. Jeff Marraccini from Altair explains how air console devices allow him to remotely access noisy server racks to diagnose …
…
continue reading

1
TWiET 564: Data Is Bigger In Texas - Cybersecurity Recruitment, Edge Computing, Hyperscale Cloud With Involta
1:10:40
1:10:40
Play later
Play later
Lists
Like
Liked
1:10:40This episode of This Week In Enterprise Tech discusses the major cybersecurity recruitment challenges organizations face today and dives into the world of enterprise edge computing and the future of hyperscale cloud services with Scott Evers of Involta. News Blips: The hosts discuss a severe vulnerability in Atlassian's Confluence Server that allow…
…
continue reading

1
TWiET 563: Don't Drop Your File Drawers - SASE in the Enterprise, document archiving & file management
1:06:09
1:06:09
Play later
Play later
Lists
Like
Liked
1:06:09This episode of This Week in Enterprise Tech covers the convergence of networking and security with the emergence of SASE (secure access service edge), tips for navigating the document and file management landscape, and more enterprise tech stories. A new Chrome 0-day is sending the Internet into a new chapter of Groundhog Day DHS Calls Into Questi…
…
continue reading

1
TWiET 562: Who Woulda Thunk Splunk? - Cisco to aquire Splunk, Intel's new neural processors
1:05:36
1:05:36
Play later
Play later
Lists
Like
Liked
1:05:36This episode of This Week in Enterprise Tech packs in analysis on Cisco's shocking $25 billion acquisition of Splunk and what it means for the cybersecurity ecosystem. Plus, Intel VP of Sales & Marketing Jason Kimrey joins to decode the company's groundbreaking new neural processors and innovations in chip design, and accelerating AI processing at …
…
continue reading

1
TWiET 561: That Cloud Looks Like A Llama - Moving on from old protocols, accessible machine learning with Predibase
1:14:14
1:14:14
Play later
Play later
Lists
Like
Liked
1:14:14This week on TWiET, Lou Maresca, Brian Chee, and Curt Franklin talk with Dev Rishi, Co-Founder and CEO at Predibase, discussing the hurdles of moving large language models into production environments and how privacy concerns factor into that decision. Guest Dev Rishi of Predibase explains why many organizations say they can't use commercial LLMs, …
…
continue reading

1
TWiET 560: Vishing for compliments - Out-of-Band Management, Voice Network Security w/ Mutare
1:10:01
1:10:01
Play later
Play later
Lists
Like
Liked
1:10:01On This Week in Enterprise Tech, Lou Maresca, Brian Chee, and Curtis Franklin dive into how the SEC's proposed cybersecurity rules could reshape how corporations handle disclosures and risk management. Guest Brian McDonald from Mutare also shares insights on securing voice communications against rising cyber threats. Plus Brian Chee explains out-of…
…
continue reading

1
TWiET 559: Salesforcing AI - ISPs want Big Tech to fund broadband construction, AI for CRM with Salesforce
1:04:00
1:04:00
Play later
Play later
Lists
Like
Liked
1:04:00UK's Online Safety Bill compromises end-to-end encryption and could result in systemic security risks Cybercriminal gangs are trafficing cybercrime workers Pros and Cons of JAVA programing AirBnb accounts hacked using stealers malware and stolen cookies Should Big Tech firms help pay for broadband contruction? Ketan Karkhanis, executive vice presid…
…
continue reading

1
TWiET 558: You Got Your AI In My Enterprise - 2023 Black Hat and DefCon report, AI data analytics with Virtualitics
1:08:45
1:08:45
Play later
Play later
Lists
Like
Liked
1:08:45This week on This Week in Enterprise Tech, host Lou Maresca and co-hosts Curt Franklin and Brian Chee explore the key takeaways from the 2023 Black Hat and DEF CON cybersecurity conferences. They discuss the proliferation of AI, especially in relation to security. Guest Michael Amori, CEO of Virtualitics, talks about how AI is impacting data analyt…
…
continue reading

1
TWiET 557: How Lucid Are Your Collaboration Tools? - ChatGPT copyright issues, visual collaboration with Lucid Software
1:03:37
1:03:37
Play later
Play later
Lists
Like
Liked
1:03:37This episode of This Week in Enterprise Tech discusses the latest issues around AI, including legal implications, security concerns, and practical applications. Lucid Software Chief Product Officer Dan Lawyer joins hosts Curt Franklin, Brian Chee, and Oliver Rist to explain how Lucid's visual collaboration tools aim to improve teamwork through inte…
…
continue reading

1
TWiET 556: Smart SaaS - Facial Recognition Lawsuit, AI-generated Fake Books, SaaS Management with Zylo
1:06:34
1:06:34
Play later
Play later
Lists
Like
Liked
1:06:34Facial Recognition Lawsuit, AI-generated Fake Books, SaaS Management with Zylo, and more. How fame-seeking teenagers hacked some of the world's biggest targets Innocent pregnant woman jailed amid faulty facial recognition trend XWorm, Remcos RAT evade EDRs to infect critical infrastructure Homage to Lahaina Author discovers AI-generated counterfeit…
…
continue reading

1
TWiET 555: AR and VR Grow Up Into XR - White House's National Cyber Workforce Strategy, Spatial Computing with IQXR
1:12:23
1:12:23
Play later
Play later
Lists
Like
Liked
1:12:23Researchers strengthen defenses against denial-of-service attack Cult of the Dead Cow Hacktivists Give Life to 'Privacy-First' App Framework Photoshop can now use generative AI to expand images Text prompts for AI are also available in over 100 languages. US military battling cyber threats from within and without White House Cyber Workforce Strateg…
…
continue reading

1
TWiET 554: Is AI The Next Spell Checker? - SEC wants cybersecurity experts in corporations, Erudit: AI for workplace wellbeing
1:15:11
1:15:11
Play later
Play later
Lists
Like
Liked
1:15:11Cloudflare Radar's new BGP origin hijack detection system TSA Updates Pipeline Cybersecurity Requirements AT&T and Verizon's ancient lead cables have US lawmakers demanding action EFF: FBI Seizure of Mastodon Server Data is a Wakeup Call to Fediverse Users and Hosts to Protect their Users Companies Must Have Corporate Cybersecurity Experts, SEC Say…
…
continue reading

1
TWiET 553: The Holy Grail of SaaS Security - The White House's Cybersecurity Label, SaaS Security with DoControl
1:02:18
1:02:18
Play later
Play later
Lists
Like
Liked
1:02:18Rootkit Attack Detections Increase at UAE Businesses White House, Big Tech Ink Commitments to Secure AI Firmware vulnerabilities in millions of computers could give hackers superuser status The Biden administration is tackling smart devices with a new cybersecurity label Adam Gavish, CEO and Co-Founder of DoControl talks about how you and your orga…
…
continue reading

1
TWiET 552: Keyless is the Key - White House National Cybersecurity Strategy, digital identity management with Veridas
1:14:57
1:14:57
Play later
Play later
Lists
Like
Liked
1:14:57AWS Lambda proactively warms things up WormGPT Cybercrime Tool Heralds an Era of AI Malware vs. AI Defenses DirectorStorage on Windows now works for consumers and games White House Fills in Details of National Cybersecurity Strategy Hackers Say Generative AI Unlikely to Replace Human Cybersecurity Skills According to Bugcrowd Survey Alfonso Santos …
…
continue reading

1
TWiET 551: Humans -The Problem in IT - Verizon's 2023 Data Breach Report, Data Security with Sentra
1:04:19
1:04:19
Play later
Play later
Lists
Like
Liked
1:04:19336,000 servers remain unpatched against critical Fortigate vulnerability Patchless Cisco flaw breaks cloud encryption for ACI traffic Google changed its privacy policy to reflect Bard AI's data collecting Top 10 cybersecurity findings from Verizon's 2023 data breach report Ron Reiter, Co-Founder and CTO of Sentra talks data security and improving …
…
continue reading

1
TWiET 550: Shine a Light on Dark Data - Minimizing Dark Data Risk, Advanced ERP systems with Oracle NetSuite
1:06:52
1:06:52
Play later
Play later
Lists
Like
Liked
1:06:52TSMC confirms data breach after LockBit cyberattack on third-party supplier Red Hat Says "Bye Bye CentOS" Cybercriminals Hijacking Vulnerable SSH Servers in New Proxyjacking Campaign ChatGPT's Still a Baby and It's Already Getting Sued Minimizing Dark Data Risk Ranga Bodla, Vice President of Field Engagement and Marketing at Oracle NetSuite talks a…
…
continue reading

1
TWiET 549: Aerospike's Real-Time Data Platform - Power meter vulnerabilities, USB drive spyware, Processing Real-Time Data with Aerospike
1:08:27
1:08:27
Play later
Play later
Lists
Like
Liked
1:08:27AWS launches $100M program to fund generative AI initiatives Smaller firms aim to consolidate security tools Schneider power meter vulnerability opens door to power outages Satellite-based laser communication: A rival to fibre networks? USB drives spread spyware as China's Mustang Panda APT goes global Lenley Hensarling, Chief Product Officer of Ae…
…
continue reading

1
TWiET 548: Encrypted Christmas Ornaments - Global Hack, AI-Generated Art, Todd Johnson
1:11:33
1:11:33
Play later
Play later
Lists
Like
Liked
1:11:33Chinese spies breached hundreds of public, private networks, security firm says Millions of Americans' personal data exposed in global hack Nature bans AI-generated art from its 153-year-old science journal Shady Chinese firm's encryption chips got inside the US Navy, NATO, and NASA Use of Multifactor Authentication (MFA) nearly doubles since 2020,…
…
continue reading

1
TWiET 547: DROOLCON 5 - Avoiding cybersecurity worker burnout, Hybrid Cloud solutions with IBM Cloud
1:11:38
1:11:38
Play later
Play later
Lists
Like
Liked
1:11:38Google to crack down on office attendance, asks remote workers to reconsider CIOp gang sat on exploit for MOVEit flaw for nearly 2 years Hawaii's Kilauea volcano erupts... again.. and again... U.S. Congress to consider two new bills on artificial intelligence Ways to help cybersecurity's essential workers avoid burnout Jason McGee, GM and CTO of IB…
…
continue reading

1
TWiET 546: The ChatGPT Balancing Act - AI Challenges, human fallibility, maintaining data agility with Talend
1:13:58
1:13:58
Play later
Play later
Lists
Like
Liked
1:13:58AI challenges, addressing human fallibility, maintaining data agility with Talend, and more. Triangulation Spyware hits iPhones Jetpack WordPress plug-in API bug triggers mass updates Lawyer cited 6 fake cases made up by ChatGPT; judge calls it "unprecedented" Team sets new speed record for industry-standard optical fiber Using IR spectroscopy for …
…
continue reading

1
TWiET 545: AI FUD - China-backed cyber attacks, AI's impact on cybersecurity with ManageEngine
1:11:08
1:11:08
Play later
Play later
Lists
Like
Liked
1:11:08China-Backed cyber attacks, AI automation a savior or job-stealer? AI's impact on cybersecurity with ManageEngine, and more. How three US teenagers built Mirai, a DDoS botnet that exploited IoT devices, and avoided prison by helping the FBI with cybercrime and cybersecurity matters. Volt Typhoon' breaks fresh ground for China-backed cyber campaigns…
…
continue reading

1
TWiET 544: Polly Wants Self-Sovereign Identity - Improving Incident Response w/ Security Testing, Taking Control of Your Digital Identity w/ Indicio
1:11:21
1:11:21
Play later
Play later
Lists
Like
Liked
1:11:21KeePass Vulnerability Imperils Master Passwords 3 Common Initial Attack Vectors Account for Most Ransomware Campaigns Montana becomes 1st state to ban TikTok Rapid prototyping for the years to come Sit and Surf: High-tech benches bridge digital divide 5 ways security testing can aid incident response Heather Dahl, CEO of Indicio talks about taking …
…
continue reading

1
TWiET 543: Bare Metal Mojo - Chatbots taking your Drive-Through order, Bringing the Mojo Platform to MLB.
1:12:12
1:12:12
Play later
Play later
Lists
Like
Liked
1:12:12Google expands TensorFlow open-source tooling for accelerated machine learning development CISA addresses 'Cyber Poor' small biz, local government Wendy's drive-through orders to be taken by a chatbot The future of real-world evidence and data analytics - self-service mode Ex-Ubiquiti engineer behind "breathtaking" data theft gets 6-year prison ter…
…
continue reading

1
TWiET 542: Technology is Easy, People are Hard - Are Passkeys the solution to passwords? Security awareness with Terranova Security
1:05:01
1:05:01
Play later
Play later
Lists
Like
Liked
1:05:01Data leakage is becoming a bigger issue for chipmakers. New White House AI initiatives include AI software-vetting event at DEF CON Hotels at risk from bug in Oracle property management software Fresh GDPR ruling says even 'minor anxiety' could mean payouts for EU folks Do Passkeys fix the problems with passwords? Lise Lapointe of Terranova Securit…
…
continue reading

1
TWiET 541: A Spreadsheet For Tracking Your Spreadsheets - NSA: Buckle Up for Generative AI, Supercharge Spreadsheets with Coherent
1:08:16
1:08:16
Play later
Play later
Lists
Like
Liked
1:08:16NSA Cybersecurity Director Says 'Buckle Up' for Generative AI As sea levels rise, the East Coast is also sinking Russian Bank Releases a ChatGPT Rival Google's New Cloud-Based Authentication Isn't End-to-End Encrypted Yet The FDA's Medical Device Cybersecurity Overhaul Has Real Teeth, Experts Say High-Severity SLP Flaw Can Amplify DDoS Attacks up t…
…
continue reading

1
TWiET 540: Checks Without Borders - Consumers fed up with passwords, protecting data with Protegrity
1:12:17
1:12:17
Play later
Play later
Lists
Like
Liked
1:12:17iOS 17 to support app sideloading to comply with European regulations GhostToken opens Google accounts to permanent infection Over half of the enterprise routers researchers bought secondhand hadn't been wiped IT companions instead of managers Consumers are fed up with passwords, according to 1Password research Paul Mountford, CEO of Protegrity, ta…
…
continue reading

1
TWiET 539: .001% Trust - Properly terminating employee accounts, implementing zero-trust with Ericom
1:10:13
1:10:13
Play later
Play later
Lists
Like
Liked
1:10:13Over 1 million WordPress sites were infected by Balada injector malware campaign Western Digital Hackers Demand 8-Figure Ransom Payment for Data NY Senator Chuck Schumer calls for bipartisan legislation to slow down AI Hackers flood NPM with bogus packages causing a DoS attack Almost half of former employees say their passwords still work Dr. Chase…
…
continue reading

1
TWiET 538: Paving the Mobile Security Potholes - Designing effective Tabletop exercises, secure and trustworthy IoT with Kigen
1:10:26
1:10:26
Play later
Play later
Lists
Like
Liked
1:10:26Amazon Web Services and Microsoft Azure face antitrust probe. Cybercriminals 'CAN' steal your car, using novel IoT hack Romance Scams: Authorities claw back funds from "Pig-butchering" cybercrime ring EU Chips act likely to get the green light on April 18 Designing Tabletop exercises that actually thwart attacks Vincent Korstanje, CEO of Kigen, tal…
…
continue reading

1
TWiET 537: Day of the Dongle - The future of AI in the Enterprise, building trust and fighting fraud in the Metaverse
1:14:09
1:14:09
Play later
Play later
Lists
Like
Liked
1:14:09Cylance Ransomware strain emerges. BEC Fraudsters Expand to Snatch Real-World Goods in Commodities Twist Bitwarden Announces Secrets Management With a Combination of Open Source, End-to-End Encryption, and Ease of Use Leaked IT contractor files detail the Kremlin's stockpile of cyber-weapons GPT and Enterprise Impact - Edge Tech, Services, and Soft…
…
continue reading

1
TWiET 536: You Break It You WhatFix It - Malicious ChatGPT extentions, Exploding USB Drives, Digital Adoption Platforms
1:07:26
1:07:26
Play later
Play later
Lists
Like
Liked
1:07:26Hackers drain bitcoin ATMs of $1.5 million by exploiting a 0-day bug Malicious ChatGPT Extensions Add to Google Chrome Woes Journalists Targeted by USB Drives That Explode When Inserted Into PCs Stanford sends 'hallucinating' Alpaca AI model out to pasture over safety, cost Attackers Are Probing for Zero-Day Vulnerabilities in Edge Infrastructure P…
…
continue reading

1
TWiET 535: Clouds Materialize - PayPal Data Breach, Copyright of AI Content, Streaming Databases With Materialize
1:18:12
1:18:12
Play later
Play later
Lists
Like
Liked
1:18:12PayPal data breach, copyright of AI content, streaming databases with Materialize, and more. PayPal data breach exposes personal information of 35,000 users Low-budget 'Winter Vivern' APT awakens after 2-Year hibernation Moon-gate: Samsung fans are mad about AI-processed photos of the moon Making deepfakes gets cheaper and easier thanks to AI Autho…
…
continue reading

1
TWiET 534: Never Cross The Shards - Malware that survives firmware updates, Biden FCC nominee withdraws, database scalability with PlanetScale
1:09:47
1:09:47
Play later
Play later
Lists
Like
Liked
1:09:47Malware infecting widely used security appliance survives firmware updates IceFire Ransomware Portends a Broader Shift From Windows to Linux Thousands scammed by AI voices mimicking loved ones in emergencies Personal details of U.S. House members exposed in health data breach Biden FCC nominee withdraws, blaming cable lobby and "unlimited dark mone…
…
continue reading

1
TWiET 533: Quantifiable Risk - Storing the world's music collection on quartz wafers, implementing DevSecOps
1:14:32
1:14:32
Play later
Play later
Lists
Like
Liked
1:14:32Pernicious Permissions: How Kubernetes Cryptomining Became an AWS Cloud Data Heist CISA, MITRE Look to Take ATT&CK Framework Out of the Weeds Meta unveils a new large language model that can run on a single GPU BlackLotus bootkit bypasses UEFI Secure Boot on patched Windows 11 Microsoft to Store World's Music Collection on Quartz Wafers Andre Keart…
…
continue reading

1
TWiET 532: Render Time Is Money - Nvidia's $10K AI chip, auth management, observability with Catchpoint
1:13:40
1:13:40
Play later
Play later
Lists
Like
Liked
1:13:40Nvidia's $10K AI chip, authentication management, monitoring & observability with Catchpoint, and more. Voicemod tools up with $14.5M to ride the generative AI (sonic)boom 'New Class of Bugs' in Apple Devices Opens the Door to Complete Takeover The big reuse: 25 MWh of ex-car batteries go on the grid in California Meet the $10,000 Nvidia chip power…
…
continue reading

1
TWiET 531: How Akamai Are You About DDoS? - Hospitals violate HIPAA because of Meta Ad-tracking, the evolution of DDoS
1:07:56
1:07:56
Play later
Play later
Lists
Like
Liked
1:07:56Health info for 1 million patients stolen using critical GoAnywhere vulnerability ESXi Ransomware Update Outfoxes CISA Recovery Script Comcast gave false map data to FCC—and didn't admit it until Ars got involved Atlassian and Envoy briefly blame each other for the data breach Hospitals Sued for Using Meta's Ad-Tracking Code, Violating HIPAA Steve …
…
continue reading

1
TWiET 530: The Death of "The Password" - Have PLC's overstayed their welcome? Passwordless options with Cloudflare
1:06:44
1:06:44
Play later
Play later
Lists
Like
Liked
1:06:44CISA releases recovery script for ESXiArgs ransomware victims MagicWeb mystery highlights Nobelium attacker's sophistication Challenges facing Bing, Bard and AI search in the future Amazon secures key FCC approval to deploy its Project Kuiper broadband satellites Have PLC's overstayed their welcome? John Engates, Field Chief Technology Officer from…
…
continue reading

1
TWiET 529: MDM'ing Your MAC - Can Google compete with ChatGPT? Trusting appliances on your network, managing Apple devices in the enterprise.
1:11:21
1:11:21
Play later
Play later
Lists
Like
Liked
1:11:21Can Google Compete with ChatGPT? Rising 'Firebrick Ostrich' BEC Group Launches Industrial-Scale Cyberattacks iOS 16.3 and macOS Ventura 13.2 add hardware security key support MIT Engineers Invent Vertically Stacked MicroLEDs With Highest-Ever Pixel Density Appliance makers sad that 50% of customers won't connect smart appliances Welden Dodd, SVP of…
…
continue reading

1
TWiET 528: ChatGPT... Take My Job... Please! - Deep faking signatures, Is this the year of derivative AI? AI in the hiring process.
1:12:51
1:12:51
Play later
Play later
Lists
Like
Liked
1:12:51Deep faking signatures and handwriting means digital signatures are safer Critical RCE Lexmark Printer Bug Has Public Exploit Right to repair: Farmers can fi their own John Deere tractors Reverse your heart age by 10 years with a bit of gene therapy Is this the year of derivative AI? Dan Finnigan, former CEO of Jobvite and current CEO of Filtered t…
…
continue reading

1
TWiET 527: Better Fonts in the Breach Letters - T-Mobile data breach, Ridge Ventures on enterprise VC
1:11:33
1:11:33
Play later
Play later
Lists
Like
Liked
1:11:33T-Mobile data breach, auto industry rife with vulnerabilities, Ridge Ventures on enterprise VC space, and more. Mailchimp says it was hacked — again Critical manufacturing sector in the bull's-eye 1-in-3 organizations do not provide any cybersecurity training to remote workers despite a majority of employees having access to critical data T-Mobile …
…
continue reading

1
TWiET 526: Snowstorm of Data - Cyberattackers targeting enterprise tools, the year of AI? Snow Software
1:09:23
1:09:23
Play later
Play later
Lists
Like
Liked
1:09:23Founder sued by JP Morgan for faking customers Cyberattackers targeting enterprise tools CircleCI, Lastpass, Okta, and Slack FAA giving airlines another year to fix altimeters incompatible with 5G signals Critical flight safety system grounds airlines ChatGPT - disrupter or parlor trick? Becky Trevino, Executive Vice President of product for Snow S…
…
continue reading

1
TWiET 525: Old Infrastructure Locked in the Closet - CircleCI security incident, API security, the state of service mesh
1:08:21
1:08:21
Play later
Play later
Lists
Like
Liked
1:08:21CircleCI security incident, making API's secure, the state of service mesh with William Morgan CircleCI warns of security breach PurpleUrchin Gang embraces DevOps Biden tries to end 2 years of deadlock at FCC by renominating Gigi Sohn from ARS Technica The Guardian ransomware attack hits week two as staff told to work from home What are some ways t…
…
continue reading

1
TWiET 524: Making a List, Checksumming It Twice - Apple search engine, $300M robocall fine, Okta data breach
1:19:54
1:19:54
Play later
Play later
Lists
Like
Liked
1:19:54Apple search engine, FCC's $300M robocall fine, host's enterprise wishlist, and more. Apple 'at least four years away' from launching Google search competitor Biden signs post-quantum cybersecurity guidelines into law Robocall company may receive the largest FCC fine ever Okta says source code for Workforce Identity Cloud service was copied Apple's…
…
continue reading