Search a title or topic

Over 20 million podcasts, powered by 

Player FM logo

Cisco Learning Network Podcasts

show episodes
 
Artwork

1
The Cisco Learning Network

The Cisco Learning Network

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Jump-start your use of the Cisco Learning Network's dynamic features and vibrant community offerings. Here you will find technical information and professional networking opportunities, which will help advance your certification goals. By joining the Cisco Learning Network you will be a part of the community, prepare for success, interact with professionals, mentor, share, and achieve.
  continue reading
 
Network Automation Nerds is for network engineers and infrastructure professionals eager to learn more about automation. Join host Eric Chou as he explores how to take advantage of modern network programmability to automate tasks, build robust systems, and get more done in less time. You’ll hear from a lineup of seasoned engineers, avid learners, industry leaders, and tool creators as they share tips, best practices, and hard-won advice.
  continue reading
 
Artwork
 
Welcome to the Security Weekly Podcast Network, your all-in-one source for the latest in cybersecurity! This feed features a diverse lineup of shows, including Application Security Weekly, Business Security Weekly, Paul's Security Weekly, Enterprise Security Weekly, and Security Weekly News. Whether you're a cybersecurity professional, business leader, or tech enthusiast, we cover all angles of the cybersecurity landscape. Tune in for in-depth panel discussions, expert guest interviews, and ...
  continue reading
 
A brief daily summary of what is important in information security. The podcast is published every weekday and designed to get you ready for the day with a brief, usually 5 minutes long summary of current network security related events. The content is late breaking, educational and based on listener input as well as on input received by the SANS Internet Storm Center. You may submit questions and comments via our contact form at https://isc.sans.edu/contact.html .
  continue reading
 
Artwork
 
This is The Internet Report, a podcast uncovering what’s working and what’s breaking on the Internet—and why. Tune in to hear ThousandEyes’ Internet experts dig into some of the most interesting outage events from the past couple weeks, discussing what went awry—was it the Internet, or an application issue? Plus, learn about the latest trends in ISP outages, cloud network outages, collaboration network outages, and more.
  continue reading
 
Artwork
 
Welcome to AI News Daily, brought to you by Brief! Our AI selects the latest stories and top headlines and then delivers them to you each day in less than ten minutes (for more details, visit www.brief.news/how-it-works). Tune in to get your daily news about machine learning, robotics, automation, natural language processing, AI ethics, and more. Whether you're a tech enthusiast, AI researcher, or simply curious about the future of technology, this podcast is your go-to source for AI news. T ...
  continue reading
 
The Campus Technology Insider podcast explores current trends and issues impacting technology leaders in higher education. Listen in as Executive Editor Rhea Kelly chats with ed tech experts and practitioners about their work, ideas and experiences.
  continue reading
 
Loading …
show series
 
Learn how Ethical Hackers think Cisco’s new Certificate in Ethical Hacking is designed to teach just that, combining offensive security techniques with immersive Capture the Flag challenges that help learners validate their knowledge in real-world scenarios.In this episode, Jozef Janitor, Product Manager with Cisco Networking Academy, joins Busines…
  continue reading
 
Optical networks are an essential component of networking, but don’t get much attention. Today we shine a spotlight on the intersection of optical networks and the software that automates them. My guest is Michal Pecek, consultant and teacher in optical communication, whose work has transformed organizations including Google and Alcatel-Lucent (now…
  continue reading
 
(0:10): Google DeepMind's Genie 3: A Leap Forward in Real-Time 3D AI Simulations (2:29): US Government Approves AI Vendors, Paves Way for Federal AI Integration (4:54): SoftBank Triples Nvidia Stake as AI Boom Fuels Strategic Rebalancing Amid Regulatory Challenges (7:34): ElevenLabs Unveils AI Music Tool with Licensing to Protect Artist Rights (9:5…
  continue reading
 
Recent findings of AI ecosystem insecurities and attacks show the importance of needing AI governance in the supply chain. And this supply chain is rapidly expanding to include not only open-source software but also collaborative platforms where custom models, agents, prompts, and other AI resources are used. And with this expansion of third-party …
  continue reading
 
Stealing Machinekeys for fun and profit (or riding the SharePoint wave) Bojan explains in detail how .NET uses Machine Keys to protect the VIEWSTATE, and how to abuse the VIEWSTATE for code execution if the Machine Keys are lost. https://isc.sans.edu/diary/Stealing%20Machine%20Keys%20for%20fun%20and%20profit%20%28or%20riding%20the%20SharePoint%20wa…
  continue reading
 
SANS Stormcast Wednesday, August 6th, 2025: Machinekeys and VIEWSTATEs; Perplexity Unethical Learning; SonicWall Updates Stealing Machinekeys for fun and profit (or riding the SharePoint wave) Bojan explains in detail how .NET uses Machine Keys to protect the VIEWSTATE, and how to abuse the VIEWSTATE for code execution if the Machine Keys are lost.…
  continue reading
 
(0:10): Google Partners with Utilities to Cut AI Data Center Power Use Amid Heat Wave (2:18): Cloudflare Accuses AI Startup Perplexity of Stealth Crawling in Content Scraping Controversy (4:42): APEC Meeting Commits to Responsible AI for Growth, Eyes $4.8 Trillion Market by 2033 (7:07): Tencent Unveils Hunyuan AI Models for Smart Devices and Consum…
  continue reading
 
Maintaining code is a lot more than keeping dependencies up to date. It involved everything from keeping old code running to changing frameworks to even changing implementation languages. Jonathan Schneider talks about the engineering considerations of refactoring and rewriting code, why code maintenance is important to appsec, and how to build con…
  continue reading
 
Daily Trends Report A new trends report will bring you daily data highlights via e-mail. https://isc.sans.edu/diary/New%20Feature%3A%20Daily%20Trends%20Report/32170 NVidia Triton RCE Wiz found an interesting information leakage vulnerability in NVidia s Triton servers that can be leveraged to remote code execution. https://www.wiz.io/blog/nvidia-tr…
  continue reading
 
SANS Stormcast Tuesday, August 05, 2025: Daily Trends Report; NVidia Triton RCE; Cursor AI Misconfiguration Daily Trends Report A new trends report will bring you daily data highlights via e-mail. https://isc.sans.edu/diary/New%20Feature%3A%20Daily%20Trends%20Report/32170 NVidia Triton RCE Wiz found an interesting information leakage vulnerability …
  continue reading
 
(0:10): Meta Retreats on Open-Source AI Amid Chinese Competition and Safety Concerns (2:10): Big Tech's $330 Billion AI Spend Sparks Investor Concerns Over Sustainability and Growth (4:44): Google Appoints First Chief AI Architect to Propel Gemini AI Integration Across All Products (6:45): Revolutionary Optical AI System Outpaces Traditional Comput…
  continue reading
 
The Weekly Enterprise News (segments 1 and 2) This week, we’ve had to make some last minute adjustments, so we’re going to do the news first, split into two segments. This week, we’re discussing: Some interesting funding Two acquisitions - one picked up for $250M, the other slightly larger, at $25 BILLION Interesting new companies! On the 1 year an…
  continue reading
 
Scans for pop3user with guessable password A particular IP assigned to a network that calls itself Unmanaged has been scanning telnet/ssh for a user called pop3user with passwords pop3user or 123456 . I assume they are looking for legacy systems that either currently run pop3 or ran pop3 in the past, and left the user enabled. https://isc.sans.edu/…
  continue reading
 
SANS Stormcast Sunday, August 03, 2025: Legacy Protocols; Sonicwall SSL VPN Possible 0-Day; Scans for pop3user with guessable password A particular IP assigned to a network that calls itself “Unmanaged” has been scanning telnet/ssh for a user called “pop3user” with passwords “pop3user” or “123456”. I assume they are looking for legacy systems that …
  continue reading
 
Pipes, Thorium, Excel, Weird Ports, ATM Hillbilly Cannibal Attack, Lambdas, National Guard, AIs, Aaran Leyland, and More on this episode of the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-499
  continue reading
 
In this episode of Campus Technology Insider Podcast Shorts, Rhea Kelly brings you the latest in education technology. Discover OpenAI's new study mode for ChatGPT, designed for step-by-step concept mastery, and Google's enhanced AI Mode in Search, offering new learning features and real-time interactions. Additionally, learn about the expanded par…
  continue reading
 
(0:10): AI Threatens Millions of Jobs: Microsoft Study Reveals 40 Professions at High Risk (2:26): Samsung Unveils AI-Powered Galaxy Book 4 Edge in India: Innovative Features at Rs. 59,990 with Cashback (4:54): OpenAI's Revenue Soars to $12 Billion Amid Explosive AI Market Growth (7:08): Anaconda Raises $150M to Boost AI in Enterprises, Expands Glo…
  continue reading
 
Scattered Spider Related Domain Names A quick demo of our domain feeds and how they can be used to find Scattered Spider related domains https://isc.sans.edu/diary/Scattered+Spider+Related+Domain+Names/32162 Excel External Workbook Links to Blocked File Types Will Be Disabled by Default Excel will discontinue allowing links to dangerous file types …
  continue reading
 
SANS Stormcast Friday, August 1st, 2025: Scattered Spider Domains; Excel Blocking Dangerous Links; CISA Releasing Thorium Platform Scattered Spider Related Domain Names A quick demo of our domain feeds and how they can be used to find Scattered Spider related domains https://isc.sans.edu/diary/Scattered+Spider+Related+Domain+Names/32162 Excel Exter…
  continue reading
 
In the security news: Hacking washing machines, good clean fun! Hacking cars via Bluetooth More Bluetooth hacking with Breaktooth Making old vulnerabilities great again: exploiting abandoned hardware Clorox and Cognizant point fingers AI generated Linux malware Attacking Russian airports When user verification data leaks Turns out you CAN steal car…
  continue reading
 
(0:10): Pakistan Unveils First AI Policy to Boost Innovation, Economy, and Inclusivity (2:30): Google DeepMind Unveils AlphaEarth: AI Revolutionizes Real-Time Earth Mapping and Environmental Monitoring (4:56): AI Breakthrough Detects Infections Days Before Symptoms, Revolutionizing Early Healthcare Intervention (7:06): Amazon Backs Fable Studio's A…
  continue reading
 
Securing Firebase: Lessons Re-Learned from the Tea Breach Inspried by the breach of the Tea app, Brendon Evans recorded a video to inform of Firebase security issues https://isc.sans.edu/diary/Securing%20Firebase%3A%20Lessons%20Re-Learned%20from%20the%20Tea%20Breach/32158 WebKit Vulnerability Exploited before Apple Patch A WebKit vulnerablity patch…
  continue reading
 
SANS Stormcast Thursday July 31st, 2025: Firebase Security; WebKit Vuln Exploited; Scattered Spider Update Securing Firebase: Lessons Re-Learned from the Tea Breach Inspried by the breach of the Tea app, Brendon Evans recorded a video to inform of Firebase security issues https://isc.sans.edu/diary/Securing%20Firebase%3A%20Lessons%20Re-Learned%20fr…
  continue reading
 
In this episode of the Campus Technology Insider Podcast, Rhea Kelly is joined by Stephanie Reeves from WGU Labs to discuss a comprehensive survey on Western Governors University students' views on AI. They explore students' engagement with AI tools, equity gaps, comfort with AI applications, and the importance of transparency. Key findings include…
  continue reading
 
(0:10): Anthropic Introduces Rate Limits for AI Services, Sparking User Backlash and Industry Debate (2:20): Pope Leo XIV Calls on Catholic Influencers to Uphold Human Dignity Amid AI Rise (4:36): Linux Foundation Embraces AGNTCY for AI Agent Collaboration, Backed by Tech Giants (6:49): Pearson and HCLTech Join Forces to Revolutionize AI-Driven Lea…
  continue reading
 
In the leadership and communications section, The CISO code of conduct: Ditch the ego, lead for real, The books shaping today’s cybersecurity leaders, How to Succeed in Your Career When Change Is a Constant, and more! Visit https://www.securityweekly.com/bsw for all the latest episodes! Show Notes: https://securityweekly.com/bsw-406…
  continue reading
 
Apple Updates Everything: July 2025 Edition Apple released updates for all of its operating systems patching 89 different vulnerabilities. Many vulnerabilities apply to multiple operating systems. https://isc.sans.edu/diary/Apple%20Updates%20Everything%3A%20July%202025/32154 Python Triage A quick python script by Xavier to efficiently search throug…
  continue reading
 
SANS Stormcast Wednesday July 30th, 2025: Apple Updates; Python Triage; Papercut Vuln Exploited Apple Updates Everything: July 2025 Edition Apple released updates for all of its operating systems patching 89 different vulnerabilities. Many vulnerabilities apply to multiple operating systems. https://isc.sans.edu/diary/Apple%20Updates%20Everything%3…
  continue reading
 
In this episode of Cisco Champion Radio, we dive into the ever-evolving security landscape, with a focus on the rise of identity-based attacks, third-party risk, and the challenges of integrating security tools in modern operations.Join security experts and Champions as they unpack how cybercriminals are bypassing traditional defenses—exploiting us…
  continue reading
 
A successful strategy in appsec is to build platforms with defaults and designs that ease the burden of security choices for developers. But there's an important difference between expecting (or requiring!) developers to use a platform and building a platform that developers embrace. Julia Knecht shares her experience in building platforms with an …
  continue reading
 
(0:10): TCS Announces 2% Layoffs Amid 'Great Tech Recalibration' Focused on AI and Digital Transformation (2:29): China Forms AI Alliances, Aims for Self-Sufficiency Amid U.S. Chip Sanctions (5:13): NiCE Acquires Cognigy to Revolutionize AI-Driven Customer Service, Eyes Major Growth by 2026 (7:18): China's Zhipu Unveils GLM-4.5: A 355 Billion Param…
  continue reading
 
Parasitic SharePoint Exploits We are seeing attacks against SharePoint itself and attempts to exploit backdoors left behind by attackers. https://isc.sans.edu/diary/Parasitic%20Sharepoint%20Exploits/32148 Cisco ISE Vulnerability Exploited A recently patched vulnerability in Cisco ISE is now being exploited. The Zero Day Initiative has released a bl…
  continue reading
 
SANS Stormcast Tuesday, July 29th, 2025:Parasitic Exploits; Cisco ISE Exploit; MyASUS Vuln Parasitic SharePoint Exploits We are seeing attacks against SharePoint itself and attempts to exploit backdoors left behind by attackers. https://isc.sans.edu/diary/Parasitic%20Sharepoint%20Exploits/32148 Cisco ISE Vulnerability Exploited A recently patched v…
  continue reading
 
Interview Segment - Lessons Learned from the tj-actions GitHub Action Supply Chain Attack with Dimitri Stiliadis Breach analysis is one of my favorite topics to dive into and I’m thrilled Dimitri is joining us today to reveal some of the insights he’s pulled out of this GitHub Actions incident. It isn’t an overstatement to say that some of the less…
  continue reading
 
Loading …
Copyright 2025 | Privacy Policy | Terms of Service | | Copyright
Listen to this show while you explore
Play