Practical DevSecOps (a Hysn Technologies Inc. company) offers vendor-neutral and hands-on DevSecOps and Product Security training and certification programs for IT Professionals. Our online training and certifications are focused on modern areas of information security, including DevOps Security, AI Security, Cloud-Native Security, API Security, Container Security, Threat Modeling, and more.
…
continue reading
Cloud Security Podcasts
We will discuss all things Cloud with an emphasis on Cloud Security.
…
continue reading
Cloud Security Podcast by Google focuses on security in the cloud, delivering security from the cloud, and all things at the intersection of security and cloud. Of course, we will also cover what we are doing in Google Cloud to help keep our users' data safe and workloads secure. We're going to do our best to avoid security theater, and cut to the heart of real security questions and issues. Expect us to question threat models and ask if something is done for the data subject's benefit or ju ...
…
continue reading
Learn Cloud Security in Public Cloud the unbiased way from CyberSecurity Experts solving challenges at Cloud Scale. We can be honest because we are not owned by Cloud Service Provider like AWS, Azure or Google Cloud. We aim to make the community learn Cloud Security through community stories from small - Large organisations solving multi-cloud challenges to diving into specific topics of Cloud Security. We LIVE STREAM interviews on Cloud Security Topics every weekend on Linkedin, YouTube, Fa ...
…
continue reading
Dive deep into AI's accelerating role in securing cloud environments to protect applications and data. In each episode, we showcase its potential to transform our approach to security in the face of an increasingly complex threat landscape. Tune in as we illuminate the complexities at the intersection of AI and security, a space where innovation meets continuous vigilance.
…
continue reading
Weekly information security podcast airing Monday mornings hosted by Oscar Minks and Brad Nigh. In a unique focus on protecting personal information, Oscar and Brad discuss information security as an issue that includes cyber security, physical security, as well as administrative controls. Oscar is the CTO of FRSecure and heads technical services and operations at the company. Brad is the Principal Security Consultant and a 20+ year veteran of the industry.
…
continue reading
Ctrl+Alt+Azure offers weekly conversations on Microsoft Azure, cloud strategy, security, identity, and generative AI - focused on what matters for architects, developers, CIOs, and CISOs. Hosted by industry experts Tobias Zimmergren and Jussi Roine.
…
continue reading
The BCM Daily Cyber News brings you clear, timely updates on threats, breaches, patches, and trends every day. Stay informed in minutes with focused audio built for busy professionals. Learn more and explore at BareMetalCyber.com.
…
continue reading
Get exam-ready with the BareMetalCyber Audio Course, your on-demand guide to conquering the CompTIA Cloud+ (CV0-003). Each episode transforms complex topics like cloud design, deployment, security, and troubleshooting into clear, engaging lessons you can apply immediately. Produced by BareMetalCyber.com, where you’ll also find more prepcasts, books, and tools to fuel your certification success.
…
continue reading
Human-curated AI podcast for a lightweight technology discussion. I am a Network Engineer with two decades of experience working with Fortune 500 enterprise clients and tier 1 service providers. I also, operate a YouTube channel called SDN Tech Forum, where I share my knowledge and expertise on the latest networking technologies. My channel covers various topics, including Cisco SDA, SD-WAN,, Meraki, Thousandeyes, AWS, IoT, Cybersecurity, and more.
…
continue reading
Cyber Security can be a difficult field to not only understand but to also navigate. Joe South is here to help with over a decade of experience across several domains of security. With this podcast I hope to help more people get into IT and Cyber Security as well as discussing modern day Cyber Security topics you may find in the daily news. Come join us as we learn and grow together!
…
continue reading
Join hosts Ned Bellavance and Kyler Middleton as they dive deep into the challenges of DevOps from the perspective of seasoned practitioners. You'll hear from expert guests—technical leaders, trainers, and consultants with years of hands-on experience—discussing the nuances of DevOps. From AWS to Azure, networking to security, automation to modern cloud environments, each weekly episode equips you with the insights to confidently address tech and business challenges such as resilience, cost ...
…
continue reading
Cloud Do You Do? is a podcast full of interviews about cloud and IT related topics with special guests from the world of startups and corporates. When you build or scale business everything seems more important than IT infrastructure. We show you the opposite is the truth. Get comfy in the cloud with us. Powered by Revolgy.
…
continue reading
Explore the life of a security leader with NetSPI Field Chief Information Security Officer (CISO) Nabil Hannan. Hear how CISOs with diverse expertise tackle the challenges and opportunities that come with life on the frontlines of cybersecurity.
…
continue reading
Valorem Reply, part of the Reply Group companies, is a business innovation and transformation firm focused on driving change with unique digital solutions, strategic technology investments and design-led user experiences. Through the expertise of our people and power of Microsoft technologies, our innovative strategies and solutions securely and rapidly transform the way our clients do business. Follow our podcast to get insights on the latest digital transformation trends & updates on Micro ...
…
continue reading
CDW Canada Tech Talks: Discussing the Latest Technology Innovations Experts from CDW and our partners tackle hot topics including generative AI, FinOps, the new cybersecurity landscape and more.
…
continue reading
Welcome to "Crying Out Cloud," the monthly podcast that keeps you up to date with the latest cloud security news. Hosted by experts Eden Naftali and Amitai Cohen, each episode provides in-depth coverage of the most important vulnerabilities and incidents from the previous month. Tune in for insightful analysis and expert recommendations to help you safeguard your cloud infrastructure.
…
continue reading
Smooth Scaling: System Design for High Traffic focuses on all things scalability, reliability, and performance. Tune in for expert advice on how to scale systems, control costs, boost availability, optimize performance, and get the most out of your tech stack. Host Jose Quaresma is the VP of Technical Engagement at Queue-it, working on the frontlines with some of the world’s biggest businesses on their busiest days, from Ticketmaster to Zalando to Home Office U.K. He’ll be joined by experts ...
…
continue reading
Welcome to Behind the Binary, the podcast that introduces you to the fascinating people, technology, and tools driving the world of reverse engineering. Join your host, Josh Stroschein, a reverse engineer with the FLARE team at Google, and someone passionate about sharing knowledge and shedding light on the art of reverse engineering, as he sits down with intriguing guests to explore the human side of this profession. Behind the Binary goes beyond the code, sharing the stories, motivations, ...
…
continue reading
This Week in Health Tech podcast is a health technology podcast. Podcast features Vik Patel, a health technology veteran and CEO of Tido Inc. (A Trusted Tech Partner for Healthcare Organizations) and industry experts. Our shows provide commentary, news, and perspective on the latest trends in health tech and features seasoned experienced industry experts. All of our shows are free. TWIHT is supported by advertising. We limit the number of ads on each show, and we only accept advertising from ...
…
continue reading
Your Microsoft Cloud News from a couple of IT Pros
…
continue reading
…
continue reading
Gain unparalleled access to the minds of industry-leading CIOs, CTOs, and CISOs. Enjoy episodes filled with expert insights, inspiring stories, and trend analysis, all brought to you by the people shaping the future of technology. Whether you're an IT professional, aspiring tech leader, or general tech enthusiast, IT Visionaries has something for everyone. Don't miss out on the chance to learn from the best – subscribe now! Produced by the team at Mission.org and brought to you by Brightspot.
…
continue reading
A podcast for Salesforce Admins who are solving problems in the cloud.
…
continue reading
Welcome to the Security Intelligence Podcast, where we discuss cyber security industry analysis, tips and success stories. Join co-hosts Pam Cobb and David Moulton, security thought leaders and industry professionals as they discuss their experiences and expertise on the latest trends and developments in enterprise security. For even more security content, visit https://securityintelligence.com. 095940
…
continue reading
Cloud Ace is your go-to podcast for in-depth expert discussions on all topics that touch cloud security. Information security professionals can tune in for fresh perspectives on building and managing secure cloud infrastructure, platforms, and applications. The insight shared by our experts on this podcast transcends cloud, making it valuable for professionals across all fields of cyber security. Brought to you by SANS Institute, Cloud Ace podcast delivers actionable insight through intervie ...
…
continue reading
The Practical 365 Podcast is a fortnightly show covering all things Microsoft 365, Copilot, AI, MIcrosoft Teams, Exchange & Cybersecurity plus any hot technology topics that are worth a deep-dive to help you learn more and get the real-world view. Your hosts are Microsoft MVPs Steve Goodman, Paul Robichaux and Quest's Bastiaan Verdonk, who will share their expert opinions on the talk of the week, and Q&A with special guests.
…
continue reading
Tresorit's own produced podcast, bringing you biweekly insights on business, security and technology. If you have any questions or feedback, please write to us at [email protected].
…
continue reading
Define your digital roadmap. Weekly podcasts featuring specialists from across the S&P Global Market Intelligence research team offer deep insights into what's new and what's next in technology, industries and companies as they design and implement digital infrastructure. To learn more, visit: https://www.spglobal.com/marketintelligence/en/topics/tmt-news-insights
…
continue reading
In this podcast, networking guru Mattias Fridström, Chief Evangelist at Arelion and industry experts discuss all things Internet, networks, cloud and connectivity.
…
continue reading
Join us for Simply Defensive, a podcast dedicated to exploring the world of defensive cybersecurity through the lens of real-world experts. In each episode, we'll interview leading professionals from the cybersecurity industry, delving into their experiences, challenges, and innovative solutions. Whether you're a seasoned cybersecurity veteran or just starting to learn about the field, Simply Defensive offers valuable insights and practical advice to help you stay ahead of the curve. Tune in ...
…
continue reading
The Official AWS Podcast is a podcast for developers and IT professionals looking for the latest news and trends in storage, security, infrastructure, serverless, and more. Join Simon Elisha and Hawn Nguyen-Loughren for regular updates, deep dives, launches, and interviews. Whether you’re training machine learning models, developing open source projects, or building cloud solutions, the Official AWS Podcast has something for you.
…
continue reading
DTX Unplugged delves into the major challenges and innovations shaping business transformation, embodying our event's focus on the critical intersection of people, process, and technology. While rooted in the DTX ethos, this will be an industry-focused platform, tackling key issues, spotlighting groundbreaking innovations, and raising awareness for important topics across the sector.
…
continue reading
Regular cybersecurity news updates from the Risky Business team...
…
continue reading
Cybersecurity Innovation Podcast is the show that experts in their field share the lessons they've learned, the tactics they use, and all other things that are driving innovation in the field.
…
continue reading
The purpose of "FounderStoriez Channel" is to interview Entrepreneurs from around the world to share their story, experience, and wisdom with you so you can learn from them and be inspired.
…
continue reading
Welcome to IGEL Weekly, the podcast that explores the future of endpoint management and cloud workspaces. Hosted by XenTegra, this show dives deep into IGEL’s next-generation edge OS solutions. Discover how IGEL delivers extreme hardware cost savings, reduced operating expenses, and a more secure, streamlined platform for endpoint management across nearly any x86 device. Each week, we’ll unpack the latest industry trends, IGEL updates, and actionable insights to help you optimize your IT env ...
…
continue reading
Join us on Distilled Security as we delve into the fascinating world of cybersecurity. Each episode, we break down intriguing topics, analyze the latest news, and engage in in-depth conversations with our hosts and invited guests. Whether you're a seasoned professional or just curious about cybersecurity, our podcast offers valuable insights and thought-provoking discussions to keep you informed and entertained. Tune in and stay ahead of the curve in the ever-evolving landscape of cybersecurity.
…
continue reading
Struggling to keep pace with the ever-changing world of technology? For experienced tech professionals, making sense of this complexity to find real strategic advantages is key. This series offers a clear path, featuring insightful, casual conversations with leading global experts, innovators, and key voices from Red Hat, all cutting through the hype. Drawing from Red Hat's deep expertise in open source and enterprise innovation, each discussion delves into new and emerging technologies-- fr ...
…
continue reading
Join Chris and Tim as they delve into the Cloud Networking world! The goal of this podcast is to help Network Engineers with their Cloud journey. Follow us on Twitter @Cables2Clouds | Co-Hosts Twitter Handles: Chris - @bgp_mane | Tim - @juangolbez
…
continue reading
Sync Up is your one-stop shop for all things OneDrive. Join hosts, Stephen Rice and Arvind Mishra, as they shed light on how OneDrive connects you to all of your files in Microsoft and enables you to share and work together from anywhere, and any device! Hear from experts behind the design and development of OneDrive, as well as customers and Microsoft MVPs! Each episode will give you news and announcements, tips and best practices for your OneDrive experience, and some fun and humor!
…
continue reading
The daily cybersecurity news and analysis industry leaders depend on. Published each weekday, the program also includes interviews with a wide spectrum of experts from industry, academia, and research organizations all over the world.
…
continue reading
Stay up to date with the Nextcloud community!
…
continue reading
🌟 **Unlock the Power of the Cloud! 🚀** Join us for an exhilarating new season focused on mastering cloud computing and AWS security. This series will cover essential certification topics, provide expert insights, and offer hands-on practices to enhance your skills each week. Whether you are a novice or seeking to deepen your understanding, this program is tailored for you. Season 1 Episodes 1-14: CompTIA Security+ 601 Episodes 15-52: Certified Cloud Security Professional (CCSP) Season 2 Epis ...
…
continue reading
We are two brothers focusing 100% on Amazon Web Services (AWS). Every other week, one of us prepares the topic of the podcast. The topic is not known to the other one, which results in surprising conversations about all things AWS. Typically, we are covering the following topics: DevOps, Serverless, Container, Security, Infrastructure as Code, Container, Continuous Deployment, S3, EC2, RDS, VPC, IAM, VPC, and many more.
…
continue reading
Security Boulevard – A Futurum Podcast is The Futurum Group’s weekly cybersecurity show and the companion to SecurityBoulevard.com. It’s hosted by Tom Hollingsworth of Tech Field Day, Mitch Ashley and Fernando Montenegro of The Futurum Group, and Alan Shimel of the Techstrong Group. New episodes post every Tuesday on the Security Boulevard YouTube channel, podcast applications, the Security Boulevard website, Techstrong.TV, and the Techstrong TV app.
…
continue reading
HashiCast is a podcast about the world of DevOps and cloud technology produced by HashiCorp, an IBM company.
…
continue reading
1
EP20 Windows Under the Hood: Kernel Design, EDRs, and the Shift to VBS with Pavel Yosifovich
1:10:25
1:10:25
Play later
Play later
Lists
Like
Liked
1:10:25In this episode, we get a unique look at the history of Windows through the eyes of one of its leading experts, Pavel Yosifovich. We delve into his fascinating origin story, including the "fluke" that led him to become the author of the legendary Windows Internals series, and why he describes himself as a developer who "hates security." The convers…
…
continue reading
1
Securing AI Agents: How to Stop Credential Leaks and Protect Non‑Human Identities with Idan Gour
33:07
33:07
Play later
Play later
Lists
Like
Liked
33:07Cast your vote for Cyber Sentries as Best Technology Podcast here! Bridging the AI Security Gap—Inside the Rise of Non‑Human Identities In this episode of Cyber Sentries from CyberProof, host John Richards sits down with Idan Gour, co-founder and president of Astrix Security, to unpack one of today’s fastest-emerging challenges: securing AI agents …
…
continue reading
1
Risky Bulletin: Linux adds PCIe encryption to help secure cloud servers
4:37
4:37
Play later
Play later
Lists
Like
Liked
4:37Linux adds PCIe encryption to help secure cloud servers, Europol cracks down on Violence-as-a-Service providers, the International Criminal Court prepares for cyber-enabled genocide, and Cambodia busts a warehouse full of SMS blasters. Show notes Risky Bulletin: Linux adds PCIe encryption to help secure cloud servers…
…
continue reading
1
How to secure your AI Agents: A CISOs Journey
54:52
54:52
Play later
Play later
Lists
Like
Liked
54:52Transitioning a mature organization from an API-first model to an AI-first model is no small feat. In this episode, Yash Kosaraju, CISO of Sendbird, shares the story of how they pivoted from a traditional chat API platform to an AI agent platform and how security had to evolve to keep up. Yash spoke about the industry's obsession with "Zero Trust,"…
…
continue reading
1
Cloud Security Challenges & Strategies for Modern Teams | Security Boulevard Ep. 11
35:06
35:06
Play later
Play later
Lists
Like
Liked
35:06Cloud security keeps shifting under everyone’s feet, and organizations are scrambling to keep up. In Ep. 11 of the Security Boulevard Podcast, Tom Hollingsworth, Fernando Montenegro, and Mitch Ashley dig into what modern teams actually face: expanding attack surfaces, tangled interdependencies, regulatory pressure, and the constant need for better …
…
continue reading
1
EP255 Separating Hype from Hazard: The Truth About Autonomous AI Hacking
29:34
29:34
Play later
Play later
Lists
Like
Liked
29:34Guest: Heather Adkins, VP of Security Engineering, Google Topic: The term "AI Hacking Singularity" sounds like pure sci-fi, yet you and some other very credible folks are using it to describe an imminent threat. How much of this is hyperbole to shock the complacent, and how much is based on actual, observed capabilities today? Can autonomous AI age…
…
continue reading
1
Live Talk: Security Minds from Google Cloud, AWS & Wiz
22:18
22:18
Play later
Play later
Lists
Like
Liked
22:18In this live episode from Wizdom NYC, Eden hosts a fast-paced discussion with leaders from AWS, Google Cloud, and Wiz on how AI is transforming today’s threat landscape. Featuring: • Ryan Nolette - AWS • John Miller - Google Cloud • Alon Schindel - Wiz What we cover: • How AI changes attacker behavior • The rise of AI-generated “slop reports” • Why…
…
continue reading
1
95-Talking Cloud Podcast with Jim LaRoe, CEO at Symphion, Inc.
1:01:38
1:01:38
Play later
Play later
Lists
Like
Liked
1:01:38In this episode, I sit down with Jim LaRoe to discuss the alarming rise of cyber threats, particularly focusing on how hackers can exploit everyday devices like printers to gain access to networks. Jim emphasizes the importance of understanding these threats and implementing protective measures to safeguard digital environments. I hope you enjoy it…
…
continue reading
1
Episode 416 – Microsoft Sentinel, Security, and Ignite with Henrik Wojcik
32:38
32:38
Play later
Play later
Lists
Like
Liked
32:38Welcome to Episode 416 of the Microsoft Cloud IT Pro Podcast. In this week’s episode, Ben finally has a chance to sit down with Henrik Wojcik. Henrik has been a long-time listener as well as a fellow Microsoft MVP in Security and we finally had the chance to sit down and record an episode together, something we’ve talked about doing for years. As t…
…
continue reading
Patch Tuesday. Federal prosecutors charge a Houston man with smuggling Nvidia chips to China, a Ukrainian woman for targeting critical infrastructure, and an Atlanta activist for wiping his phone. The power sector sees cyber threats doubling. The new Spiderman phishing kit slings its way across the dark web. Our guest is Dick O'Brien, Principal Int…
…
continue reading
1
When the Systems Go Silent: Building Clinical Resilience Before the Outage
41:29
41:29
Play later
Play later
Lists
Like
Liked
41:29Send us a text Imagine a hospital corridor lined with open doors and a chorus of hotel bells, each ring a patient hoping to be found. That’s the picture Julie Derringer Smith paints from real stories of downtime, the moments when networks collapse, call systems fail, and teams fight to deliver safe care without the tools they rely on. Julie brings …
…
continue reading
1
D2DO289: Instana: Leading the Future of Observability (Sponsored)
37:16
37:16
Play later
Play later
Lists
Like
Liked
37:16As AI tools and agentic AI become part of how applications are developed, delivered, and managed, application performance monitoring and observability have to adapt. Ned Bellavance sits down with Drew Flowers and Jacob Yackenovich from IBM Instana about where these fields sit today, and the potential impacts of AI. They detail the challenges of app…
…
continue reading
In this week's episode, we look at recent Microsoft Tech updates. By popular request, we're expanding the scope beyond just Azure to include Microsoft 365, Power Platform, and similar Microsoft platforms and capabilities. What's new? What's interesting? What's retiring? (00:00) - Intro and catching up. (04:25) - Show content starts. Show links - Ag…
…
continue reading
1
Sonic OS Unlocked: The Future of Open Networking in the Cloud
12:35
12:35
Play later
Play later
Lists
Like
Liked
12:35Ever wondered how hyperscale data centers like Microsoft’s run their networks with unmatched flexibility and control? Meet Sonic (Software for Open Networking in the Cloud)—the open-source network operating system (NOS) that’s revolutionizing modern networking by breaking free from vendor lock-in and monolithic systems. In this deep-dive breakdown,…
…
continue reading
Organizations worldwide scramble to address the critical React2Shell vulnerability. Major insurers look to exclude artificial intelligence risks from corporate policies. Three Chinese hacking groups converge on the same Sharepoint flaws. Ransomware crews target hypervisors. A UK hospital asks the High Court to block publication of data stolen by th…
…
continue reading
The worlds of IT security and operations are being pulled together and AI is a catalyst that's making it happen. The focus on observability that's been part of the DevOps movement, is playing an important role in improving security effectiveness and Scott Crawford, Mark Ehr and Mike Fratto return to look at how this is happening with host Eric Hans…
…
continue reading
In this episode, host Kim Jones examines the rapid rise of enterprise AI and the tension between innovation and protection, sharing an RSA anecdote that highlights both excitement and concern. He outlines the benefits organizations hope to gain from AI while calling out often-overlooked risks like data quality, governance, and accountability. Kim i…
…
continue reading
How might Trump’s new National Security Strategy impact cyber? The UK’s NCSC warns LLMs may never get over prompt injection. At least 18 U.S. universities were hit by a months-long phishing campaign. Russia blocks FaceTime. A bipartisan group of senators reviving efforts to strengthen protections across the health sector. Portugal provides legal sa…
…
continue reading
1
Power Without Stealth: Should America Flex In Cyberspace Or Starve Cartels Online
1:13:48
1:13:48
Play later
Play later
Lists
Like
Liked
1:13:48Send us a text We trace Jake’s unlikely route from journalism to the White House, how DEF CON’s Voting Village began, and why imposter syndrome can be a secret advantage when paired with relentless learning. Then we pull apart cyber strategy, Stuxnet’s signal value, and a plan to choke fentanyl through targeted offensive operations against cartels’…
…
continue reading
1
Cloudflare Outage, AI-Powered Attacks & The Rise of GRC Engineering | Distilled Security Podcast
2:12:09
2:12:09
Play later
Play later
Lists
Like
Liked
2:12:09In this episode, we break down a major Cloudflare outage, explore how a nation-state used AI agents to automate a cyberattack, and discuss the growing risks around MCP integrations. We also highlight why GRC Engineering is becoming essential to modern security programs and wrap up with key regulatory updates, including CMMC changes affecting thousa…
…
continue reading
1
Risky Bulletin: APTs go after the React2Shell vulnerability within hours
8:18
8:18
Play later
Play later
Lists
Like
Liked
8:18APTs go after the React2Shell vulnerability just hours after public disclosure. CISA remains without a director after the nomination stalls again, NSA is down 2,000 staff this year, and Intellexa is still active despite sanctions. Show notes
…
continue reading
1
Jon DiMaggio: Two roads diverged. [Strategy] [Career Notes]
9:19
9:19
Play later
Play later
Lists
Like
Liked
9:19Please enjoy this encore of Career Notes. Chief security strategist from Analyst1, Jon DiMaggio shares his story on how he grew to become a part of the cybersecurity world. He describes different jobs that paved the way to the knowledge he has in the industry right now, and he even shares about an experience that led him to a path that split and wh…
…
continue reading
1
When macOS gets frostbite. [Research Saturday]
24:40
24:40
Play later
Play later
Lists
Like
Liked
24:40Jaron Bradley, Director of Jamf Threat Labs, is sharing their work on "ChillyHell: A Deep Dive into a Modular macOS Backdoor." Jamf Threat Labs uncovers a newly notarized macOS backdoor called ChillyHell, tied to past UNC4487 activity and disguised as a legitimate applet. The malware showcases robust host profiling, multiple persistence mechanisms,…
…
continue reading
1
Unsecurity Episode 252: Bridging the Gap Between CISO & CFO - Executive Panel
29:11
29:11
Play later
Play later
Lists
Like
Liked
29:11A live panel from Hacks & Hops featuring FRSecure's CFO, Vanae Pearson, Information Security Consultant, Greg Cloon, and Director of IT at Miner's Inc., Tyree Johnson. Veterans in the field discuss consulting, translating security needs to executive teams, and advocating for the best budget practices. Like, subscribe, and share with your network to…
…
continue reading
1
China’s quiet crawl into critical networks.
30:13
30:13
Play later
Play later
Lists
Like
Liked
30:13Chinese threat actors deploy Brickstorm malware. The critical React2Shell vulnerability is under active exploitation. Cloudflare’s emergency patch triggered a brief global outage. Phishing kits pivot to fake e-commerce sites. The European Commission fines X(Twitter) €120 million for violating the Digital Services Act. Predator spyware has a new bag…
…
continue reading
It is the end of re:Invent! Simon and Jillian share some updates and also take a moment to reflect on 2025.By Amazon Web Services
…
continue reading
CISA staff may see pay cuts in 2026. Threat actors advertise a full chain zero-day exploit for iOS. A US-led international coalition releases joint guidance on integrating AI into operational technology. Microsoft lowers sales growth targets for its agentic AI products. A major fintech provider suffers a ransomware-linked breach. Arizona’s Attorney…
…
continue reading
1
AI-First Vulnerability Management: Should CISOs Build or Buy?
1:01:30
1:01:30
Play later
Play later
Lists
Like
Liked
1:01:30Thinking of building your own AI security tool? In this episode, Santiago Castiñeira, CTO of Maze, breaks down the realities of the "Build vs. Buy" debate for AI-first vulnerability management. While building a prototype script is easy, scaling it into a maintainable, audit-proof system is a massive undertaking requiring specialized skills often mi…
…
continue reading
1
How Admins Build Confidence with Agentforce
21:22
21:22
Play later
Play later
Lists
Like
Liked
21:22Today on the Salesforce Admins Podcast, we talk to Kate Lessard, Lead Admin Evangelist at Salesforce. Join us as we chat about how the Admin Adoption Framework can help you build confidence with Agentforce and her new video series, “Kate Clicks Through It.” You should subscribe for the full episode, but here are a few takeaways from our conversatio…
…
continue reading
1
The AI Security Blind Spots Every Company Should Fix Now
1:02:44
1:02:44
Play later
Play later
Lists
Like
Liked
1:02:44Security used to be a headache. Now it is a growth engine. In this episode of IT Visionaries, host Chris Brandt sits down with Taylor Hersom, Founder and CEO of Eden Data and former CISO, to break down how fast growing companies can turn cybersecurity and compliance into a true competitive advantage. Taylor explains why frameworks like SOC 2, ISO 2…
…
continue reading
1
Srsly Risky Biz: When cyber campaigns cross a line
16:18
16:18
Play later
Play later
Lists
Like
Liked
16:18Tom Uren and Patrick Gray discuss a new report proposing a framework for deciding when cyber operations raise red flags. It suggests seven red flags and could help clarify thinking about how to respond to different operations. They also discuss Anthropic testifying to Congress and Iran using cyber intelligence to target missile strikes including by…
…
continue reading
1
#749: re:Invent 2025 - Swami Sivasubramanian Keynote
27:07
27:07
Play later
Play later
Lists
Like
Liked
27:07Simon and Jillian catch you up on the highlights from today's keynote PLUS all the "pre:Invent" announcements that took place prior to the event!By Amazon Web Services
…
continue reading
1
Just another day of scamming and jamming.
29:53
29:53
Play later
Play later
Lists
Like
Liked
29:53The DOJ shuts down another scam center in Myanmar. OpenAI confirms a Mixpanel data breach. A new phishing campaign targets company executives. A bipartisan bill looks to preserve the State and Local Cybersecurity Grant Program. Universities suffer Oracle EBS data breaches. India reports GPS jamming at eight major airports. Kaiser Permanente settles…
…
continue reading
1
D2DO288: Technology, Career, and Finding a Purpose with Deana Solis
47:29
47:29
Play later
Play later
Lists
Like
Liked
47:29Ned and Kyler sit down with Deana Solis, a freelance FinOps engineer and mentor. They discuss the undervalued skills of communication, look at the inherent biases and misplaced confidence of AI models, and offer guidance for those starting their careers. Deana also talks about her journey to discover the intersection of technology, career, and find…
…
continue reading
1
Top Technology Trends and Predictions for 2026
41:04
41:04
Play later
Play later
Lists
Like
Liked
41:04In this episode KJ Burke discusses the technology trends of 2025 and predictions for 2026. He covers the maturation of AI, the importance of treating data as a product, innovations at the edge, managing cross-cloud environments, building business resiliency and automating the skills gap. Looking ahead, he highlights key trends for 2026, including A…
…
continue reading
1
319 - Hello there, new Microsoft Defender for Cloud!
27:09
27:09
Play later
Play later
Lists
Like
Liked
27:09In this episode, we unpack what's new with Microsoft Defender for Cloud. During Ignite 2025, Microsoft announced that the public preview of MDC would be available shortly, and it has arrived now. We'll take a look at what changed, what didn't, and why you should care. (00:00) - Intro and catching up. (03:52) - Show content starts. Show links - Defe…
…
continue reading
1
Bots, Bursts, And Bare Metal: Because The Internet Wanted Drama
32:56
32:56
Play later
Play later
Lists
Like
Liked
32:56Send us a text We break down Cloudflare’s outage, why a small config change caused big waves, and what better guardrails could look like. We then unpack AWS and Google’s cross‑cloud link, Megaport’s move into bare metal and GPUs, Webex adding deepfake defenses, and a new startup aiming to tune AI networks at microsecond speed. • Cloudflare outage r…
…
continue reading
This is today’s cyber news for December third, 2025. Attackers are turning hacked home cameras, developer tools, and mobile phones into powerful surveillance and access channels that traditional controls struggle to cover. Leaders who understand these overlaps can better prioritize resilience, privacy, and vendor risk. Listeners will hear about sma…
…
continue reading
Enjoy this episode of Cyber things from Armis. Catch the next episode on your favorite podcast app on December 15th. Welcome to Cyber Things, a special edition podcast produced in partnership by Armis and N2K CyberWire that plunges into the hidden world beneath our connected reality. Inspired by Stranger Things, we explore the digital realm's own U…
…
continue reading
1
Become an AI Security Engineer in 8 Weeks - Fast-Track Guide & Roadmap
13:43
13:43
Play later
Play later
Lists
Like
Liked
13:43Cybercrime drains trillions of dollars globally each year. Today's threat landscape is defined by smart, adaptable adversaries: 40% of all cyberattacks use AI to find hidden weaknesses, and nearly all companies (93%) now face these advanced threats daily. The Certified AI Security Professional (CAISP) course compresses the typical 2–4 years needed …
…
continue reading
1
Platform engineering for AI agents ft. Tushar Katarki
28:05
28:05
Play later
Play later
Lists
Like
Liked
28:05A decade ago, the shift from monolithic applications to microservices created an explosion of complexity that only Kubernetes could tame. Today, the enterprise is facing a similar inflection point. We are moving beyond simple chatbots to "Agentic AI"—autonomous systems capable of planning, tool calling, and executing complex workflows. But with thi…
…
continue reading
1
#748: re:Invent 2025 - Matt Garman Keynote
39:14
39:14
Play later
Play later
Lists
Like
Liked
39:14In this episode, Matt Garman's 2025 re:Invent keynote unveils exciting AI advancements, including Amazon Nova to Lite, a cost-effective reasoning model, and Amazon Nova 2 Sonic, a new speech-to-text model. The keynote also covers Security, Storage, Compute, Networking, and a whole lot more!By Amazon Web Services
…
continue reading
ShadyPanda plays the long game. India mandates tracking software on mobile devices. Korea weighs punitive damages after a massive breach. Qualcomm patches a critical boot flaw impacting millions. OpenAI patches a Codex CLI vulnerability. Google patches Android zero-days. Cybersecurity issues prompt an FDA permanent recall for an at-home ventilator …
…
continue reading
1
Service Outages & Cybersecurity Failures — Lessons from Cloudflare | Security Boulevard Ep. 10
34:09
34:09
Play later
Play later
Lists
Like
Liked
34:09In Episode 10 of the Security Boulevard Podcast, Tom Hollingsworth, Fernando Montenegro, and Mitch Ashley break down the real impact of major service outages — including recent failures at Cloudflare — and what they reveal about modern cybersecurity challenges. The discussion covers why resilience matters, how economic pressures shape security deci…
…
continue reading
1
SIEM vs. Data Lake: Why We Ditched Traditional Logging?
46:53
46:53
Play later
Play later
Lists
Like
Liked
46:53In this episode, Cliff Crosland, CEO & co-founder of Scanner.dev, shares his candid journey of trying (and initially failing) to build an in-house security data lake to replace an expensive traditional SIEM. Cliff explains the economic breaking point where scaling a SIEM became "more expensive than the entire budget for the engineering team". He de…
…
continue reading
This is today’s cyber news for December 2nd, 2025. The brief highlights how everyday tools like browsers, developer extensions, mobile apps, and public Wi Fi are being bent into silent surveillance and credential theft channels that hit both consumers and enterprises. Listeners will hear how popular browser extensions turned into spying implants, h…
…
continue reading