Search a title or topic

Over 20 million podcasts, powered by 

Player FM logo

Cloud Backup Podcasts

show episodes
 
Artwork

1
Sudo Show

TuxDigital Network

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
The Sudo Show covers topics ranging from Open Source in business to deep dives into complex technoloyg. The Sudo Show is a proud member of the TuxDigital Network (https://tuxdigital.com/)!
  continue reading
 
Welcome to the eFolder Channel Chat. These short, unscripted conversations are real stories from real channel partners moderated by Ted Hulsy, VP Marketing eFolder. eFolder is a leading supplier of cloud data protection, business continuity, cloud file sync solutions, and cloud to cloud backup for MSPs, cloud service providers, system integrators, and VARs. Delivered as wholesale services to the channel, eFolder enables its partners to provide branded data protection and file sync services a ...
  continue reading
 
Blueprint Synergy Solutions proudly offers premium Managed IT Services in Denver, CO, designed to help businesses thrive in an increasingly digital world. Whether you're a small business or an enterprise-level organization, our IT solutions are built to scale with your needs while maintaining peak performance, security, and compliance. We provide 24/7 proactive monitoring, real-time threat detection, and seamless system updates to ensure your infrastructure is always secure and operational. ...
  continue reading
 
Beyond Downtime: The Verito Advantage is the podcast for tax and accounting professionals who refuse to let IT issues interrupt their business. Hosted by the experts behind Verito.com, each episode explores the real risks behind "good enough" technology and how to build a firm that just works. Securely. Join us as we dive into real-world stories, compliance must-knows (like the FTC Safeguards Rule, IRS Pub 4557, WISP), and emerging tech shaping the future of financial practices. From ransomw ...
  continue reading
 
Stay ahead of cyberthreats with expert insights and practical security . Led by an ensemble cast of industry thought leaderss offering in-depth analysis and practical advice to fortify your organization's defenses.
  continue reading
 
On The Workflow Show, CHESA's Jason Whetstone and Ben Kilburg offer media workflow therapy and address overarching trends and specific tech topics to help guide you through these challenging yet exciting times of unprecedented change within the realm of digital workflows. CHESA is a full-service provider of technology systems and solutions that specializes in optimizing media workflows from creation to distribution and preservation. CHESA’s expert architects design pioneering asset managemen ...
  continue reading
 
Artwork
 
Trilio Insights delves into the dynamic world of data protection and cloud-native technologies. In addition to Trilio experts, we will bring together practitioners, innovators, and visionaries to explore the evolving landscape of data protection, backup, and recovery. From unraveling the complexities of multi-cloud environments to navigating the challenges of data governance, each episode of Trilio Insights serves to share expertise and experience for Product Engineering, It Ops, Dev Ops, Ar ...
  continue reading
 
Artwork

1
House of I.T

House of I.T

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
IT Support Services relied by world industry leaders. Our IT support specialist and technical support engineer can deliver IT solutions to businesses. Our Products - Managed services - Backup and disaster recovery, - Cloud computing - Sofware/system selection, - IT consulting - IT security - IT support - IT upgrades and migrations - Maintenance and monitoring - Network installation and upgrades - Server and desktop virtualisation - Server and network documentation - CargoWise EDI data entry ...
  continue reading
 
Artwork

1
Speaking in Tech

Melissa Gurney Greene

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Speaking in Tech: "Where Enterprise Tech meets Consumer Tech...". Speaking in Tech is hosted by Peter Smallbone, Josh Atwell and Melissa Gurney Greene. Topics include popular tech, data storage, cloud computing, networking, storage virtualization, server virtualization, backup, disaster recovery and anything else interesting in the tech world. Disclosure: Speaking in tech does not receive support directly or indirectly from vendors or guests. Vendor relationships are disclosed on the podcast.
  continue reading
 
LogiCast, brought to you by Logicata, is a weekly AWS News podcast hosted by Karl Robinson, CEO and Co-Founder of Logicata, and Jon Goodall, Lead Cloud Engineer. Each week we hand-pick a selection of news articles on Amazon Web Services (AWS) - we look at what’s new, technical how-to, and business-related news articles and take a deep dive, giving commentary, opinion, and a sprinkling of humor. Please note this is the audio only version of Logicast. If you would like the video version, pleas ...
  continue reading
 
The Business of Fatherhood is hosted by author, speaker, and Dad coach Ben Killoy. A five-day-a-week daily dad podcast inspiring and helping busy dads get excited about pulling into the driveway of their home. I help dads grow through generational trauma, redefine the parameters for living, and create a lasting legacy of change. Schedule your free call > https://www.benkilloy.com/breakthecycle
  continue reading
 
Welcome to Hostinghome.in We are the number one web hosting company in India. We are providing cheapest hosting services like shared hosting, VPS hosting, dedicated server, cloud hosting with GSuite. Dedicated hosting starts from only Rs 2699/- per month Providing Free Managed Support, Free Firewall Protection with Free D Dos Protection, Free Backup, Free instant WhatsApp Support, Chat Support, Email Support and Ticket Support.
  continue reading
 
Artwork
 
This is Explain IT, a show for IT professionals by IT professionals; offering insight, knowledge, experience and opinion on a variety of enterprise tech topics. With new episodes out regularly, follow the podcast in your favourite app and you'll get notified with every new release. Hosted on Acast. See acast.com/privacy for more information.
  continue reading
 
Artwork
 
Welcome to the Security Weekly Podcast Network, your all-in-one source for the latest in cybersecurity! This feed features a diverse lineup of shows, including Application Security Weekly, Business Security Weekly, Paul's Security Weekly, Enterprise Security Weekly, and Security Weekly News. Whether you're a cybersecurity professional, business leader, or tech enthusiast, we cover all angles of the cybersecurity landscape. Tune in for in-depth panel discussions, expert guest interviews, and ...
  continue reading
 
Artwork

1
Application Hero Podcast

Brian Henderson & Neil Salamack

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
High tech, IT education made easy for Microsoft DBA’s and application owners. Learn about the latest trends in technology and how to improve your application performance and availability. Topics include virtualization, backup, disaster recovery, SAN, and much more. If you run Microsoft Exchange or Microsoft SQL Server, on VMware or Hyper-V - please subscribe today!
  continue reading
 
Tune in for lively, insightful discussion of topics important to the mainframe community, from DevOps to security and staffing. 2020 & 2024 winner of the DevOps Dozen Award for Best DevOps-Related Podcast Series.
  continue reading
 
Welcome to the Security Weekly Podcast Network, your all-in-one source for the latest in cybersecurity! This feed features a diverse lineup of shows, including Application Security Weekly, Business Security Weekly, Paul's Security Weekly, Enterprise Security Weekly, and Security Weekly News. Whether you're a cybersecurity professional, business leader, or tech enthusiast, we cover all angles of the cybersecurity landscape. Tune in for in-depth panel discussions, expert guest interviews, and ...
  continue reading
 
Artwork

1
The Tech Savvy Lawyer

Michael D.J. Eisenberg

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
The Tech Savvy Lawyer interviews Judges, Lawyers, and other professionals discussing utilizing technology in the practice of law. It may springboard an idea and help you in your own pursuit of the business we call "practicing law". Please join us for interesting conversations enjoyable at any tech skill level!
  continue reading
 
Artwork

1
Gartner Events Video Podcast

Gartner Events On Demand

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
This video podcast offers sample trailers of recorded presentations from recent Gartner Events. At Gartner Events, information technology experts provide raw insight, strategy, advice and research in a conference environment. Visit "gartner.com/events" to find an event that's right for you and your role. Gartner, Inc. (NYSE: IT) is the world's leading information technology research and advisory company. We deliver the technology-related insight necessary for our clients to make the right de ...
  continue reading
 
Felicia King is an internationally recognized CISO and considered to be one of the top network layer security strategists in the U.S. Since launching in 2004 on the WGTD network, her Breakfast Bytes podcast has focused on information security risk management and the issues business leaders need to be aware of to benefit from the challenges others have faced. Learn about the most effective approaches, what you can do to mitigate risk, and how to protect your most valuable assets, your data, a ...
  continue reading
 
Author commentary for the Star Wars anthology book, From A Certain Point of View: The Empire Strikes Back. Listen to the contributors discuss the inspiration and creative process behind their short stories with members of the Star Wars Books editorial team! The perfect companion to your From a Certain Point of View experience. Note: Spoilers ahead! We encourage listeners to read the book before diving into this audio companion.
  continue reading
 
Employing an outside company to handle all payroll-related duties is known as outsourcing payroll services in a business. The main reasons for using payroll management services are to cut costs and free up time when handling payroll-related financial operations. Employing a third party to handle payroll operations frees up a company from having to recruit and educate a sizable in-house payroll team, buy suitable payroll software, and keep up with complicated tax regulations. All business typ ...
  continue reading
 
Loading …
show series
 
Hey everyone, welcome to this bonus episode! As you know, in this podcast we explore the future of law through engaging interviews with lawyers, judges, and legal tech professionals on the cutting edge of legal innovation. As part of our Labs initiative, I am experimenting with AI-generated discussions—this episode features two Google Notebook.AI h…
  continue reading
 
Open-VSX Flaw Puts Developers at Risk A flaw in the open-vsx extension marketplace could have let to the compromise of any extension offered by the marketplace. https://blog.koi.security/marketplace-takeover-how-we-couldve-taken-over-every-developer-using-a-vscode-fork-f0f8cf104d44 Bluetooth Vulnerability Could Allow Eavesdropping A vulnerability i…
  continue reading
 
This conversation explores the intersection of cybersecurity and emerging technologies, focusing on innovative hacking techniques, the evolution of vulnerability management, and the critical importance of asset discovery. The discussion also delves into the implications of cyber warfare, the persistent threat of default passwords, and the integrati…
  continue reading
 
"The thing to challenge is the fact that fraud prevention is a vertical by itself," says Guido Ronchetti, CTO at XTN Cognitive Security. He stresses that recent fraudulent trends exhibit "no real separation between fraud, cybersecurity, and AML.” In this episode of The Security Strategist podcast, Jonathan Care discusses fraud prevention with Ronch…
  continue reading
 
NetScaler ADC and NetScaler Gateway Security Bulletin for CVE-2025-6543 Citrix patched a memory overflow vulnerability leading to unintended control flow and denial of service. https://support.citrix.com/support-home/kbsearch/article?articleNumber=CTX694788 Remote code execution in CentOS Web Panel - CVE-2025-48703 An arbitrary file upload vulnerab…
  continue reading
 
In this episode, Mandy Logan, Summer Craze Fowler, Jason Albuquerque, and Jeff Pollard of Forrester discuss the challenges and strategies for CISOs in navigating volatility in the security landscape. They emphasize the importance of building relationships within the organization, particularly with the CFO, to manage budgets effectively. The convers…
  continue reading
 
Quick Password Brute Forcing Evolution Statistics After collecting usernames and passwords from our ssh and telnet honeypots for about a decade, I took a look back at how scans changed. Attackers are attempting more passwords in each scans than they used to, but the average length of passwords did not change. https://isc.sans.edu/diary/Quick%20Pass…
  continue reading
 
How do you get more from GitHub in your work routine? Richard chats with April Yoho about how sysadmins can take advantage of more GitHub features to make better quality scripts and more! April discusses the capabilities of GitHub Copilot to assist administrators in comprehending the intricacies of source management, including branching and merging…
  continue reading
 
In this episode of Security Weekly News, Doug White discusses various cybersecurity threats, including the Salt Typhoon and Spark Kitty malware, the implications of Microsoft's decision to drop support for old hardware drivers, and the potential increase in cyber threats from Iran. The conversation also covers the alarming 16 billion password leak …
  continue reading
 
Our next guest is Matthew Veale, a European patent attorney and Patsnap's Professional Systems team member. He introduces the AI-powered innovation intelligence platform, Patsnap. Matthew explains how Patsnap supports IP and R&D professionals through tools for patent analytics, prior art searches, and strategic innovation mapping. Furthermore, Matt…
  continue reading
 
Fuzzing has been one of the most successful ways to improve software quality. And it demonstrates how improving software quality improves security. Artur Cygan shares his experience in building and applying fuzzers to barcode scanners, smart contracts, and just about any code you can imagine. We go through the useful relationship between unit tests…
  continue reading
 
Blueprint Synergy Solutions proudly offers premium Managed IT Services in Denver, CO, designed to help businesses thrive in an increasingly digital world. Whether you're a small business or an enterprise-level organization, our IT solutions are built to scale with your needs while maintaining peak performance, security, and compliance. We provide 2…
  continue reading
 
How secure is your supply chain? With the recent swathe of supply chain cyber attacks on big name brands, now more than ever it’s important to protect your supply chain. On this edition of Explain IT, we’re talking about recent breaches and how that is affecting customers. We're also delving into the question of 'who are these threat actors?', and …
  continue reading
 
Scans for Ichano AtHome IP Cameras A couple days ago, a few sources started scanning for the username super_yg and the password 123. This is associated with Ichano IP Camera software. https://isc.sans.edu/diary/Scans%20for%20Ichano%20AtHome%20IP%20Cameras/32062 Critical Netscaler Security Update CVE-2025-5777 CVE 2025-5777 is a critical severity vu…
  continue reading
 
"What we're seeing now is a lot of the vendors that were traditionally one of the identity pillars are kind of expanding into other pillars,” says Kevin Converse, Vice President, Identity and Access Management, GuidePoint Security. In this episode of The Security Strategist podcast, Richard Stiennon speaks with Converse, VP at GuidePoint Security. …
  continue reading
 
In Season 4, Episode 25, Karl and Jon are joined by AWS Community Hero Stephen Sennett. They discuss recent AWS security enhancements and active defense measures, including the introduction of exportable public SSL/TLS certificates from AWS Certificate Manager, the enforcement of 100% MFA for AWS root users, and Amazon Inspector’s new code security…
  continue reading
 
In fast-paced, shared device environments like healthcare, manufacturing, and other critical industries, traditional access management approaches are falling short, quietly eroding both security and productivity. This episode explores how outdated methods, like shared credentials and clunky logins, create friction, increase risk, and undermine comp…
  continue reading
 
ADS & Python Tools Didier explains how to use his tools cut-bytes.py and filescanner to extract information from alternate data streams. https://isc.sans.edu/diary/ADS%20%26%20Python%20Tools/32058 Enhanced security defaults for Windows 365 Cloud PCs Microsoft announced more secure default configurations for its Windows 365 Cloud PC offerings. https…
  continue reading
 
How Long Until the Phishing Starts? About Two Weeks After setting up a Google Workspace and adding a new user, it took only two weeks for the new employee to receive somewhat targeted phishing emails. https://isc.sans.edu/diary/How%20Long%20Until%20the%20Phishing%20Starts%3F%20About%20Two%20Weeks/32052 Scammers hijack websites of Bank of America, N…
  continue reading
 
This week: * The true details around Salt Typhoon are still unknown * The search for a portable pen testing device * Directories named "hacker2" are suspicious * Can a $24 cable compete with a $180 cable? * Hacking Tesla wall chargers * Old Zyxel exploits are new again * Hacking Asus drivers * Stealing KIAs - but not like you may think * Fake artic…
  continue reading
 
In this episode of Business Security Weekly, Mandy Logan, along with guests Peter Hedberg, Summer Craze Fowler, and Ben Carr, delve into the complexities of cyber insurance and the empowerment of Chief Information Security Officers (CISOs). The discussion covers the evolving landscape of cyber insurance, the critical role of underwriting, and the i…
  continue reading
 
Here comes SQL Server 2025! While at Build, Richard chatted with Bob Ward about releasing a preview version of SQL Server 2025. Bob discusses SQL Server 2025 as an AI-ready enterprise database with numerous capabilities specifically tailored to your organization's AI needs, including a new vector data type. This includes making REST API calls to Az…
  continue reading
 
In Season 4, Episode 24, Karl and Jon are joined by Randall Hunt, CTO of Caylent, for a dynamic and insightful conversation that blends cutting-edge cloud developments with a dash of humor. They dive into some of the latest updates from AWS, including the launch of on-demand key rotation for imported keys via AWS Key Management Service, new applica…
  continue reading
 
What makes a threat modeling process effective? Do you need a long list of threat actors? Do you need a long list of terms? What about a short list like STRIDE? Has an effective process ever come out of a list? Farshad Abasi joins our discussion as we explain why the answer to most of those questions is No and describe the kinds of approaches that …
  continue reading
 
What makes a threat modeling process effective? Do you need a long list of threat actors? Do you need a long list of terms? What about a short list like STRIDE? Has an effective process ever come out of a list? Farshad Abasi joins our discussion as we explain why the answer to most of those questions is No and describe the kinds of approaches that …
  continue reading
 
Extracting Data From JPEGs Didier shows how to efficiently extract data from JPEGs using his tool jpegdump.py https://isc.sans.edu/diary/A%20JPEG%20With%20A%20Payload/32048 Windows Recall Export in Europe In its latest insider build for Windows 11, Microsoft is testing an export feature for data stored by Recall. The feature is limited to European …
  continue reading
 
Segment 1 - Interview with Rob Allen from ThreatLocker This segment is sponsored by ThreatLocker. Visit https://www.securityweekly.com/threatlocker to learn more about them! Segment 2 - Topic: Growing Trend - Edge Computing and Hybrid Cloud Segment 3 - Interviews from RSAC 2025 Cyera Cyera is the fastest-growing data security company in history, em…
  continue reading
 
Segment 1 - Interview with Rob Allen from Threatlocker Segment 2 - Topic: Growing Trend - Edge Computing and Hybrid Cloud Segment 3 - Interviews from RSAC 2025 Cyera Cyera is the fastest-growing data security company in history, empowering companies to classify, secure, and manage their data, wherever it is, and leverage the power of the industry’s…
  continue reading
 
Katz Stealer in JPG Xavier found some multistage malware that uses an Excel Spreadsheet and an HTA file to load an image that includes embeded a copy of Katz stealer. https://isc.sans.edu/diary/More+Steganography/32044 https://unit42.paloaltonetworks.com/malicious-javascript-using-jsfiretruck-as-obfuscation/ JavaScript obfuscated with JSF*CK is bei…
  continue reading
 
Automated Tools to Assist with DShield Honeypot Investigations https://isc.sans.edu/diary/Automated%20Tools%20to%20Assist%20with%20DShield%20Honeypot%20Investigations%20%5BGuest%20Diary%5D/32038 EchoLeak: Zero-Click Microsoft 365 Copilot Data Leak Microsoft fixed a vulnerability in Copilot that could have been abused to exfiltrate data from Copilot…
  continue reading
 
This week: You got a Bad box, again Cameras are expose to the Internet EU and connected devices Hydrophobia NVRAM variables Have you heard about IGEL Linux? SSH and more NVRAM AI skeptics are nuts, and AI doesn't make you more efficient Trump Cybersecurity orders I think I can root my Pixel 6 Decentralized Wordpres plugin manager Threat actor namin…
  continue reading
 
This week: You got a Bad box, again Cameras are expose to the Internet EU and connected devices Hydrophobia NVRAM variables Have you heard about IGEL Linux? SSH and more NVRAM AI skeptics are nuts, and AI doesn't make you more efficient Trump Cybersecurity orders I think I can root my Pixel 6 Decentralized Wordpres plugin manager Threat actor namin…
  continue reading
 
Quasar RAT Delivered Through Bat Files Xavier is walking you through a quick reverse analysis of a script that will injection code extracted from a PNG image to implement a Quasar RAT. https://isc.sans.edu/diary/Quasar%20RAT%20Delivered%20Through%20Bat%20Files/32036 Delayed Windows 11 24H2 Rollout Microsoft slightly throttled the rollout of windows…
  continue reading
 
This week, it’s time for security money. The index is up, but the previous quarterly results were brutal. In the leadership and communications segment, Get out of the audit committee: Why CISOs need dedicated board time, Quietly Burning Out? What To Do When Your Leadership Starts Lacking, How to rethink leadership to energize disengaged employees, …
  continue reading
 
This week, it’s time for security money. The index is up, but the previous quarterly results were brutal. In the leadership and communications segment, Get out of the audit committee: Why CISOs need dedicated board time, Quietly Burning Out? What To Do When Your Leadership Starts Lacking, How to rethink leadership to energize disengaged employees, …
  continue reading
 
Microsoft Patch Tuesday Microsoft today released patches for 67 vulnerabilities. 10 of these vulnerabilities are rated critical. One vulnerability has already been exploited and another vulnerability has been publicly disclosed before today. https://isc.sans.edu/diary/Microsoft%20Patch%20Tuesday%20June%202025/32032 Adobe Vulnerabilities Adobe relea…
  continue reading
 
How can modern telemetry solutions help you? While at NDC in Melbourne, Richard chatted with Liz Fong-Jones of Honeycomb about her approach to educating leadership on creating great telemetry solutions for organizations. Liz discusses the importance of being able to answer questions about reliability issues without causing problems, as opposed to r…
  continue reading
 
Loading …
Copyright 2025 | Privacy Policy | Terms of Service | | Copyright
Listen to this show while you explore
Play