We will discuss all things Cloud with an emphasis on Cloud Security.
…
continue reading
Cloud Security Podcasts
Exploring the practical and exciting alternate realities that can be unleashed through cloud driven transformation and cloud native living and working. Each episode, our hosts Dave, Esmee & Rob talk to Cloud leaders and practitioners to understand how previously untapped business value can be released, how to deal with the challenges and risks that come with bold ventures and how does human experience factor into all of this? They cover Intelligent Industry, Customer Experience, Sustainabili ...
…
continue reading
Unsupervised Learning is about ideas and trends in Cybersecurity, National Security, AI, Technology, and Culture—and how best to upgrade ourselves to be ready for what's coming.
…
continue reading
Get exam-ready with the BareMetalCyber Audio Course, your on-demand guide to conquering the CompTIA Cloud+ (CV0-003). Each episode transforms complex topics like cloud design, deployment, security, and troubleshooting into clear, engaging lessons you can apply immediately. Produced by BareMetalCyber.com, where you’ll also find more prepcasts, books, and tools to fuel your certification success.
…
continue reading
Learn Cloud Security in Public Cloud the unbiased way from CyberSecurity Experts solving challenges at Cloud Scale. We can be honest because we are not owned by Cloud Service Provider like AWS, Azure or Google Cloud. We aim to make the community learn Cloud Security through community stories from small - Large organisations solving multi-cloud challenges to diving into specific topics of Cloud Security. We LIVE STREAM interviews on Cloud Security Topics every weekend on Linkedin, YouTube, Fa ...
…
continue reading
Cloud Security Podcast by Google focuses on security in the cloud, delivering security from the cloud, and all things at the intersection of security and cloud. Of course, we will also cover what we are doing in Google Cloud to help keep our users' data safe and workloads secure. We're going to do our best to avoid security theater, and cut to the heart of real security questions and issues. Expect us to question threat models and ask if something is done for the data subject's benefit or ju ...
…
continue reading
Practical DevSecOps (a Hysn Technologies Inc. company) offers vendor-neutral and hands-on DevSecOps and Product Security training and certification programs for IT Professionals. Our online training and certifications are focused on modern areas of information security, including DevOps Security, AI Security, Cloud-Native Security, API Security, Container Security, Threat Modeling, and more.
…
continue reading
Dive deep into AI's accelerating role in securing cloud environments to protect applications and data. In each episode, we showcase its potential to transform our approach to security in the face of an increasingly complex threat landscape. Tune in as we illuminate the complexities at the intersection of AI and security, a space where innovation meets continuous vigilance.
…
continue reading
Weekly information security podcast airing Monday mornings hosted by Oscar Minks and Brad Nigh. In a unique focus on protecting personal information, Oscar and Brad discuss information security as an issue that includes cyber security, physical security, as well as administrative controls. Oscar is the CTO of FRSecure and heads technical services and operations at the company. Brad is the Principal Security Consultant and a 20+ year veteran of the industry.
…
continue reading
The BCM Daily Cyber News brings you clear, timely updates on threats, breaches, patches, and trends every day. Stay informed in minutes with focused audio built for busy professionals. Learn more and explore at BareMetalCyber.com.
…
continue reading
Explore the life of a security leader with NetSPI Field Chief Information Security Officer (CISO) Nabil Hannan. Hear how CISOs with diverse expertise tackle the challenges and opportunities that come with life on the frontlines of cybersecurity.
…
continue reading
Cyber Security can be a difficult field to not only understand but to also navigate. Joe South is here to help with over a decade of experience across several domains of security. With this podcast I hope to help more people get into IT and Cyber Security as well as discussing modern day Cyber Security topics you may find in the daily news. Come join us as we learn and grow together!
…
continue reading
Welcome to IGEL Weekly, the podcast that explores the future of endpoint management and cloud workspaces. Hosted by XenTegra, this show dives deep into IGEL’s next-generation edge OS solutions. Discover how IGEL delivers extreme hardware cost savings, reduced operating expenses, and a more secure, streamlined platform for endpoint management across nearly any x86 device. Each week, we’ll unpack the latest industry trends, IGEL updates, and actionable insights to help you optimize your IT env ...
…
continue reading
This is the Ctrl+Alt+Azure podcast. We talk about all things Microsoft, including Microsoft Azure, and share our experiences and thoughts on the way. Your hosts are Tobias Zimmergren and Jussi Roine.
…
continue reading
CDW Canada Tech Talks: Discussing the Latest Technology Innovations Experts from CDW and our partners tackle hot topics including generative AI, FinOps, the new cybersecurity landscape and more.
…
continue reading
DTX Unplugged delves into the major challenges and innovations shaping business transformation, embodying our event's focus on the critical intersection of people, process, and technology. While rooted in the DTX ethos, this will be an industry-focused platform, tackling key issues, spotlighting groundbreaking innovations, and raising awareness for important topics across the sector.
…
continue reading
🌟 **Unlock the Power of the Cloud! 🚀** Join us for an exhilarating new season focused on mastering cloud computing and AWS security. This series will cover essential certification topics, provide expert insights, and offer hands-on practices to enhance your skills each week. Whether you are a novice or seeking to deepen your understanding, this program is tailored for you. Season 1 Episodes 1-14: CompTIA Security+ 601 Episodes 15-52: Certified Cloud Security Professional (CCSP) Season 2 Epis ...
…
continue reading
Stay up to date with the Nextcloud community!
…
continue reading
Welcome to Behind the Binary, the podcast that introduces you to the fascinating people, technology, and tools driving the world of reverse engineering. Join your host, Josh Stroschein, a reverse engineer with the FLARE team at Google, and someone passionate about sharing knowledge and shedding light on the art of reverse engineering, as he sits down with intriguing guests to explore the human side of this profession. Behind the Binary goes beyond the code, sharing the stories, motivations, ...
…
continue reading
Welcome to Hot or Hype, the podcast where hosts Olivia Storelli and Andrew Stevens break down the latest trends in cloud computing, data engineering, AI, and cybersecurity - and decide whether they're game-changing innovations or just industry buzz. In each episode, we dive into topics like AI-driven predictive analytics, cloud-native architectures, zero trust security, data mesh, and more, giving you real-world insights from practitioners who know what works and what doesn't. No fluff. No h ...
…
continue reading
Interviews from Bret Fisher's live show with co-host Nirmal Mehta. Topics cover container and cloud topics like Docker, Kubernetes, Swarm, Cloud Native development, DevOps, SRE, GitOps, DevSecOps, platform engineering, and the full software lifecycle. Full show notes and more info available at https://podcast.bretfisher.com
…
continue reading
Valorem Reply, part of the Reply Group companies, is a business innovation and transformation firm focused on driving change with unique digital solutions, strategic technology investments and design-led user experiences. Through the expertise of our people and power of Microsoft technologies, our innovative strategies and solutions securely and rapidly transform the way our clients do business. Follow our podcast to get insights on the latest digital transformation trends & updates on Micro ...
…
continue reading
A twice-monthly podcast dedicated to all things relating to Security, Privacy, Compliance and Reliability on the Microsoft Cloud Platform. Hosted by Microsoft security experts, Michael Howard, Sarah Young, Gladys Rodriguez and Mark Simos. https://aka.ms/azsecpod ©2020-2025 Michael Howard, Sarah Young, Gladys Rodriquez, and Mark Simos.
…
continue reading
The podcast that tells true stories about the people making and breaking our digital world. We take listeners into the world of cyber and intelligence without all the techie jargon. Every Tuesday and Friday, former NPR investigations correspondent Dina Temple-Raston and the team draw back the curtain on ransomware attacks, mysterious hackers, and the people who are trying to stop them.
…
continue reading
The Bare Metal Cyber CCISO Audio Course is your complete, executive-level training companion for mastering the Certified Chief Information Security Officer (CCISO) certification. Built for experienced cybersecurity professionals and strategic leaders, this Audio Course delivers over seventy focused episodes covering every domain, concept, and competency area tested on the official EC-Council exam. From governance, risk, and compliance to strategic planning, vendor oversight, and technical co ...
…
continue reading
…
continue reading
Gain unparalleled access to the minds of industry-leading CIOs, CTOs, and CISOs. Enjoy episodes filled with expert insights, inspiring stories, and trend analysis, all brought to you by the people shaping the future of technology. Whether you're an IT professional, aspiring tech leader, or general tech enthusiast, IT Visionaries has something for everyone. Don't miss out on the chance to learn from the best – subscribe now! Produced by the team at Mission.org and brought to you by Brightspot.
…
continue reading
Cloud Ace is your go-to podcast for in-depth expert discussions on all topics that touch cloud security. Information security professionals can tune in for fresh perspectives on building and managing secure cloud infrastructure, platforms, and applications. The insight shared by our experts on this podcast transcends cloud, making it valuable for professionals across all fields of cyber security. Brought to you by SANS Institute, Cloud Ace podcast delivers actionable insight through intervie ...
…
continue reading
Ready to earn your AWS Certified Cloud Practitioner credential? Our Audio Course is your ultimate guide to mastering the fundamentals of AWS Cloud, including security, cost management, core services, and cloud economics. Whether you're new to IT or looking to expand your cloud knowledge, this series will help you confidently prepare for the exam and take the next step in your career. Produced by BareMetalCyber.com, your trusted resource for expert-driven cybersecurity education.
…
continue reading
We are two brothers focusing 100% on Amazon Web Services (AWS). Every other week, one of us prepares the topic of the podcast. The topic is not known to the other one, which results in surprising conversations about all things AWS. Typically, we are covering the following topics: DevOps, Serverless, Container, Security, Infrastructure as Code, Container, Continuous Deployment, S3, EC2, RDS, VPC, IAM, VPC, and many more.
…
continue reading
Welcome to the Security Intelligence Podcast, where we discuss cyber security industry analysis, tips and success stories. Join co-hosts Pam Cobb and David Moulton, security thought leaders and industry professionals as they discuss their experiences and expertise on the latest trends and developments in enterprise security. For even more security content, visit https://securityintelligence.com. 095940
…
continue reading
Define your digital roadmap. Weekly podcasts featuring specialists from across the S&P Global Market Intelligence research team offer deep insights into what’s new and what’s next in technology, industries and companies as they design and implement digital infrastructure. To learn more, visit: https://www.spglobal.com/marketintelligence/en/topics/tmt-news-insights
…
continue reading
Join us for Simply Defensive, a podcast dedicated to exploring the world of defensive cybersecurity through the lens of real-world experts. In each episode, we'll interview leading professionals from the cybersecurity industry, delving into their experiences, challenges, and innovative solutions. Whether you're a seasoned cybersecurity veteran or just starting to learn about the field, Simply Defensive offers valuable insights and practical advice to help you stay ahead of the curve. Tune in ...
…
continue reading
Your Microsoft Cloud News from a couple of IT Pros
…
continue reading
Cybersecurity Innovation Podcast is the show that experts in their field share the lessons they've learned, the tactics they use, and all other things that are driving innovation in the field.
…
continue reading
Sync Up is your one-stop shop for all things OneDrive. Join hosts, Stephen Rice and Arvind Mishra, as they shed light on how OneDrive connects you to all of your files in Microsoft and enables you to share and work together from anywhere, and any device! Hear from experts behind the design and development of OneDrive, as well as customers and Microsoft MVPs! Each episode will give you news and announcements, tips and best practices for your OneDrive experience, and some fun and humor!
…
continue reading
Join Chris and Tim as they delve into the Cloud Networking world! The goal of this podcast is to help Network Engineers with their Cloud journey. Follow us on Twitter @Cables2Clouds | Co-Hosts Twitter Handles: Chris - @bgp_mane | Tim - @juangolbez
…
continue reading
Join Scott Hanselman every Friday as he engages one-on-one with the engineers who build the services that power Microsoft Azure as they demo capabilities, answer Scott's questions, and share their insights. Follow us at: friday.azure.com.
…
continue reading
Welcome to "Crying Out Cloud," the monthly podcast that keeps you up to date with the latest cloud security news. Hosted by experts Eden Naftali and Amitai Cohen, each episode provides in-depth coverage of the most important vulnerabilities and incidents from the previous month. Tune in for insightful analysis and expert recommendations to help you safeguard your cloud infrastructure.
…
continue reading
This is a weekly podcast on cyber security domains. We discuss, dissect and demystify the world of security by providing an in-depth coverage on the cybersecurity topics that matter most. All these in plain easy to understand language. Like it, share it, and most importantly enjoy it!
…
continue reading
Tresorit's own produced podcast, bringing you biweekly insights on business, security and technology. If you have any questions or feedback, please write to us at [email protected].
…
continue reading
Welcome to Perimeter Perspective, the podcast where we explore the strategies, challenges, and innovations shaping the future of cybersecurity and IT management. Hosted by the experts at Next Perimeter, this show dives into zero trust principles, cloud-first solutions, and the evolving role of technology in modern businesses. Whether you’re an IT leader, business owner, or tech enthusiast, Perimeter Perspective offers actionable insights and engaging discussions to help you secure your digit ...
…
continue reading
Den offisielle podkast siden til de gretne gamle gubbene i "BlåSkjerm Brødrene" (BluesScreen Brothers), sett på scener rundt omkring i verden på diverse IT- konferanser. Brødrene er Olav Tvedt (@OlavTwitt), Alexander Solaat Rødland [@AlexSolaat], Pål-Erik Winther (@PeWinther) og Marius Solbakken (@mariussmellum). Dukker også opp forskjellige gjester av varierende kvalitet ;-) Hosted on Acast. See acast.com/privacy for more information.
…
continue reading
Struggling to keep pace with the ever-changing world of technology? For experienced tech professionals, making sense of this complexity to find real strategic advantages is key. This series offers a clear path, featuring insightful, casual conversations with leading global experts, innovators, and key voices from Red Hat, all cutting through the hype. Drawing from Red Hat's deep expertise in open source and enterprise innovation, each discussion delves into new and emerging technologies-- fr ...
…
continue reading
In this podcast, networking guru Mattias Fridström, Chief Evangelist at Arelion and industry experts discuss all things Internet, networks, cloud and connectivity.
…
continue reading
The daily cybersecurity news and analysis industry leaders depend on. Published each weekday, the program also includes interviews with a wide spectrum of experts from industry, academia, and research organizations all over the world.
…
continue reading
1
EP249 Data First: What Really Makes Your SOC 'AI Ready'?
30:37
30:37
Play later
Play later
Lists
Like
Liked
30:37Guest: Monzy Merza, co-founder and CEO at Crogl Topics: We often hear about the aspirational idea of an "IronMan suit" for the SOC—a system that empowers analysts to be faster and more effective. What does this ideal future of security operations look like from your perspective, and what are the primary obstacles preventing SOCs from achieving it t…
…
continue reading
1
92-Talking Cloud Podcast with Tamir Hardof, Chief Marketing Officer, Nucleus Security
38:02
38:02
Play later
Play later
Lists
Like
Liked
38:02In this episode, I talk with Tamir Hardof, CMO of Nucleus Security, discussing the evolution of cybersecurity, the impact of AI, and the challenges in the job market. We explore Nucleus Security's unique approach to vulnerability management, the importance of automation, and the changing landscape of marketing in the tech industry. The conversation…
…
continue reading
1
EP17 What Lurks Beneath: Building a Robust Network at Black Hat with Mark Overholser
1:09:36
1:09:36
Play later
Play later
Lists
Like
Liked
1:09:36In this episode, we're asking the question: "What Lurks Beneath?" We're joined by Mark Overholser, a Technical Marketing Engineer at Corelight who's part of the team running the Black Hat Network Operations Center (NOC). We discuss the incident during Black Hat 2025 that introduced us and revealed the team's proactive approach to protecting every g…
…
continue reading
1
Can You Build an AI SOC with Claude Code? The Reality vs. Hype
47:39
47:39
Play later
Play later
Lists
Like
Liked
47:39Can you just use Claude Code or another LLM to "vibe code" your way into building an AI SOC? In this episode, Ariful Huq, Co-Founder and Head of Product at Exaforce spoke about the reality being far more complex than the hype suggests. He explains why a simple "bolt-on" approach to AI in the SOC is insufficient if you're looking for real security o…
…
continue reading
1
Domain 4 is On, Authentication using AWS IAM
27:25
27:25
Play later
Play later
Lists
Like
Liked
27:25🌟 Unlock the Power of the Cloud! 🚀 Join us for an exhilarating new season focused on mastering cloud computing and AWS security. This series will cover essential certification topics, provide expert insights, and offer hands-on practices to enhance your skills each week. In this episode, I started domain 4 for the AWS Security specialty examination…
…
continue reading
1
Detection Engineering Tutorial: Cloud Security, Kubernetes Logging & SOC Career Path
34:44
34:44
Play later
Play later
Lists
Like
Liked
34:44In this episode of Simply Defensive, we sit down with JB, a Senior Cybersecurity Engineer working in detection engineering. JB shares his journey from SOC analyst to detection engineer, diving deep into the challenges of cloud-native security, Kubernetes logging, and building a sustainable career in cybersecurity. What We Cover: What detection engi…
…
continue reading
1
AI Governance Essentials: Navigating Security and Compliance in Enterprise AI with Walter Haydock
31:05
31:05
Play later
Play later
Lists
Like
Liked
31:05AI Governance in an Era of Rapid Change In this episode of Cyber Sentries, John Richards talks with Walter Haydock, founder of StackAware, about navigating the complex landscape of AI governance and security. Walter brings unique insights from his background as a Marine Corps intelligence officer and his extensive experience in both government and …
…
continue reading
There are many ways to frame conversations around cyber security. They can take on many aspects of security, ranging across the technical to the human. With the press towards platform consolidation, it’s critical to reconsider the interaction between the human and technical elements and research director Scott Crawford and Javvad Malik, CISO adviso…
…
continue reading
When Big Tech brought plans for a giant data center to St. Charles, Missouri, one college student decided to fight back. And it raises a question small towns all over the US are asking: what happens when the cloud touches ground? Learn about your ad choices: dovetail.prx.org/ad-choicesBy Recorded Future News
…
continue reading
1
The impact of data privacy on cyber. [CISO Perspectives]
42:04
42:04
Play later
Play later
Lists
Like
Liked
42:04Privacy is one of the most universally valued rights. Yet, despite its importance, data breaches exposing millions of people's sensitive information have become routine. Many have come to assume that their personal data has already been, or inevitably will be, compromised. Despite this reality, prioritizing privacy is more important than ever. In t…
…
continue reading
1
The UN’s big push for global cybercrime rules.
24:41
24:41
Play later
Play later
Lists
Like
Liked
24:41The UN launches the world’s first global treaty to combat cybercrime. A House Democrats’ job portal left security clearance data exposed online. A new data leak exposes 183 million email addresses and passwords. Threat actors target Discord users with an open-source red-team toolkit. A new campaign targets unpatched WordPress plugins. The City of G…
…
continue reading
This is today’s cyber news for October 27th, 2025. We cover an emergency push by Microsoft to protect Windows Server Update Services from active attacks, Amazon’s explanation for a Domain Name System failure inside Amazon Web Services that rippled across major apps, and a cache-poisoning risk in BIND that threatens the trust behind logins and payme…
…
continue reading
1
Inside Offensive AI: From MCP Servers To Real Security Risks
1:06:01
1:06:01
Play later
Play later
Lists
Like
Liked
1:06:01Send us a text Security gets sharper when we stop treating AI like magic and start treating it like an untrusted user. We sit down with Eric Galinkin to unpack the real-world ways red teams and defenders are using language models today, where they fall apart, and how to build guardrails that hold up under pressure. From MCP servers that look a lot …
…
continue reading
Bli med når Olav Tvedt får besøk av Simon Skotheimsvik fra Cloudway – direkte fra konferanse i Nashville til MP Dagen i Oslo! I denne episoden får du høre om hvordan Intune og moderne enhetsadministrasjon har utviklet seg, hvorfor gamle rutiner ikke holder lenger, og hvilke klassiske feil de fleste gjør når de tror de er «ferdig» med Intune. Simon …
…
continue reading
1
Derek Manky: Putting the rubber to the road. [Threat Intelligence] [Career Notes]
9:38
9:38
Play later
Play later
Lists
Like
Liked
9:38Please enjoy this encore of Career Notes. Chief Security Strategist and VP of Global Threat Intelligence at FortiGuard Labs, Derek Manky, shares his story from programmer to cybersecurity and how it all came together. Derek started his career teaching programming because he had such a passion for it. When he joined Fortinet, Derek said putting wher…
…
continue reading
1
A look behind the lens. [Research Saturday]
24:30
24:30
Play later
Play later
Lists
Like
Liked
24:30Noam Moshe, Claroty’s Vulnerability Research Team Lead, joins Dave to discuss Team 82's work on "Turning Camera Surveillance on its Axis." Team82 disclosed four vulnerabilities in Axis.Remoting—deserialization, a MiTM “pass-the-challenge” NTLMSSP flaw, and an unauthenticated fallback HTTP endpoint—that enable pre-auth remote code execution against …
…
continue reading
A former defense contractor is charged with attempting to sell trade secrets to Russia. Researchers uncover critical vulnerabilities in TP-Link routers. Microsoft patches a critical Windows Server Update Service flaw. CISA issues eight new ICS advisories. “Shadow Escape” targets LLMs database connections. Halloween-themed scams spike. Our guest is …
…
continue reading
1
Unsecurity Episode 249: Navigating Holiday Threats with AI and VPN Vulnerabilities w/ Pinky
37:04
37:04
Play later
Play later
Lists
Like
Liked
37:04In this episode of the Unsecurity Podcast, hosted by Megan Larkins and Brad Nigh from FRSecure, we are joined by Pinky from the IR team to dive deep into the pressing cybersecurity challenges as the holiday season approaches. From early breaches to the increasing sophistication of AI in phishing attacks, discover how attackers are evolving their ta…
…
continue reading
1
Weekly Cyber News Rollup, October 24th, 2025
17:03
17:03
Play later
Play later
Lists
Like
Liked
17:03This is the Friday Rollup for October twentieth through October twenty-fourth, twenty twenty-five. A turbulent week put resilience and identity under the microscope: a broad Amazon Web Services disruption rippled through logins and checkouts, while a Windows change broke authentication on cloned machines with duplicate S I Ds. We saw active exploit…
…
continue reading
This is today’s cyber news for October 24th, 2025. We lead with an actively exploited flaw in a popular endpoint management tool that can hand attackers domain-level control if left unpatched. Retailers face session hijacking on Magento, while Microsoft is closing a quiet NTLM credential-leak path in File Explorer. An ill-timed agent update knocked…
…
continue reading
As the Trump administration pressures Apple and Google to remove apps that track ICE activity from their stores, locals are going old-school. Francisco Chavo Romero, an LA-based activist, explains how it works. Learn about your ad choices: dovetail.prx.org/ad-choicesBy Recorded Future News
…
continue reading
CISA Layoffs threaten U.S. cyber coordination with states, businesses, and foreign partners. Google issues its second emergency Chrome update in a week, and puts Privacy Sandbox out of its misery. OpenAI’s new browser proves vulnerable to indirect prompt injection. SpaceX disables Starlink devices used by scam compounds. Reddit sues alleged data sc…
…
continue reading
1
Episode 413 – Simplifying Azure Files with a new file share-centric management model
36:23
36:23
Play later
Play later
Lists
Like
Liked
36:23Welcome to Episode 413 of the Microsoft Cloud IT Pro Podcast. Microsoft has introduced a new file share-centric management model for Azure Files, aiming to eliminate the complexity of managing storage accounts. This model treats file shares as top-level Azure resources, allowing for easier automation, granular access control, and independent scalin…
…
continue reading
This is today’s cyber news for October 23rd, 2025. Attackers are raiding Magento stores, China-linked actors are revisiting SharePoint, and a Rust TAR parser flaw raises fresh supply-chain worries. We also cover why common AI agents can be tricked into running commands and how an MCP registry issue exposed thousands of servers and keys. The middle …
…
continue reading
AI was supposed to make life easier. So why are tech teams more burned out than ever? In this episode of IT Visionaries, host Chris Brandt and guest co-host Lacey Peace unpack the real reasons behind the burnout crisis sweeping through tech and cybersecurity teams in 2025. From the “do more with less” culture to the false promise of AI automation, …
…
continue reading
1
CR113: Bridging the digital skills gap in a complex world with Mike Nayler, AWS
36:14
36:14
Play later
Play later
Lists
Like
Liked
36:14The skills we teach today will decide the world we live in tomorrow but the digital skills gap is something we've been dealing with for decades, but it’s growing faster than ever, it starts with kids and stretches all the way into late IT careers, and now we're finally taking a more connected, lifelong approach to closing it. This week, Dave, Esmee…
…
continue reading
A foreign threat actor breached a key U.S. nuclear weapons manufacturing site. The cyberattack on Jaguar Land Rover is the most financially damaging cyber incident in UK history. A new report from Microsoft’ warns that AI is reshaping cybersecurity at an unprecedented pace. The ToolShell vulnerability fuels Chinese cyber operations across four cont…
…
continue reading
In this week's episode, we look at recent Microsoft Tech updates. By popular request, we're expanding the scope beyond just Azure to include Microsoft 365, Power Platform, and similar Microsoft platforms and capabilities. What's new? What's interesting? What's retiring? (00:00) - Intro and catching up. (04:40) - Show content starts. Show links - Pu…
…
continue reading
1
Tech Evangelism and Making Networking Cool Again with Alexis Bertholf
34:56
34:56
Play later
Play later
Lists
Like
Liked
34:56Send us a text If the network is the backbone of modern tech, why did it fade into the background while cloud, AI, and security stole the spotlight? We sit down with technical evangelist Alexis Berthoff to pull the curtain back on the real work of making complex systems understandable, usable, and resilient. Alexis shares how she acts as a translat…
…
continue reading
1
Nextcloud AIO: The easiest way to self-host Nextcloud with Simon Lindner
43:34
43:34
Play later
Play later
Lists
Like
Liked
43:34In this episode, we meet Simon Lindner, software engineer at Nextcloud, the developer and main maintainer of Nextcloud All-in-One (AIO). Back in 2021, Simon joined the Nextcloud team as a working student. Already a seasoned Nextcloud contributor and home user, he had a vision to make self-hosting Nextcloud more accessible to users by simplifying de…
…
continue reading
This is today’s cyber news for October 22nd, 2025. A major AWS outage reminded everyone how fragile single-cloud strategies can be, while a Windows update snag locked out cloned PCs with duplicate SIDs. CISA pressed urgency on an exploited Oracle E-Business Suite flaw, and a critical TP-Link Omada bug exposed small-business gateways to takeover. Re…
…
continue reading
1
Neurodiversity, Gaming, and the Next Generation of Cybersecurity
26:35
26:35
Play later
Play later
Lists
Like
Liked
26:35In this episode, Fergus Hay, CEO & Co-Founder of The Hacking Games explores the fascinating overlap between gaming, cybersecurity, and the power of neurodivergent minds. Recorded live at DTX London 2025, join Fergus and DTX Unplugged hosts Ollie Pickup and Sabrina Berko in solving one of today’s biggest challenges - the cyber talent gap. From shock…
…
continue reading
CISA warns a Windows SMB privilege escalation flaw is under Active exploitation. Microsoft issues an out of band fix for a WinRE USB input failure. Nation state hackers had long term access to F5. Envoy Air confirms it was hit by the zero-day in Oracle’s E-Business Suite. A nonprofit hospital system in Massachusetts suffers a cyberattack. Russian’s…
…
continue reading
1
Episode 075 - Why “Scan, Find, Patch” Is No Longer Enough - Mark Goldenberg
25:44
25:44
Play later
Play later
Lists
Like
Liked
25:44The traditional "scan, find, patch" method is falling short against today’s threat landscape. In this episode, Mark Goldenberg, Sr. Security Solutions Architect at Defy Security, outlines a modern approach to vulnerability management. Tune in to learn how to level-up your proactive security efforts by focusing on risk prioritization, fostering coll…
…
continue reading
This is today’s cyber news for October 21st, 2025. An AWS regional outage exposed hidden single-region dependencies, while CISA’s newest KEV entries pushed Oracle E-Business Suite to the front of many patch queues. We cover a supply-chain hit on developer ecosystems via “GlassWorm,” thousands of exposed WatchGuard firewalls, and a Windows SMB flaw …
…
continue reading
When the Trump administration began rounding up immigrants, a new kind of resistance took shape — digital, crowdsourced, and built for the smartphone era. Activists used apps and social media to keep watch on the government. But before long, the government started watching back. Learn about your ad choices: dovetail.prx.org/ad-choices…
…
continue reading
1
Regulation takeaways with Ethan Cook. [CISO Perspectives]
41:23
41:23
Play later
Play later
Lists
Like
Liked
41:23On this episode, host Kim Jones is joined by Ethan Cook, N2K’s lead analyst and editor, for a deeper, more reflective conversation on cybersecurity regulation, privacy, and the future of policy. This episode steps back from the news cycle to connect the dots and explore where the regulatory landscape is heading — and why it matters. Ethan, who will…
…
continue reading
The enthusiasm for AI has been impressive and it’s leading to the inevitable questions about whether or not all of it is warranted. Melissa Otto CFA, head of S&P Global’s Visible Alpha research team, returns to discuss concerns about an AI bubble with host Eric Hanselman. Defining what actually indicates a bubble might be the trickiest aspect of th…
…
continue reading
This week on Azure Friday, Scott Hanselman meets with Jordan Selig to learn about resiliency on Azure App Service and discover how quick and easy it is to add intelligent, connected agents to new and existing Azure App Service apps. Chapters 00:00 - Introduction 01:14 - Zone redundancy on Azure App Service 04:24 - Add agents to your apps 08:17 - De…
…
continue reading