The daily cybersecurity news and analysis industry leaders depend on. Published each weekday, the program also includes interviews with a wide spectrum of experts from industry, academia, and research organizations all over the world.
…
continue reading
Computer Security Podcasts
Welcome to the Security Weekly Podcast Network, your all-in-one source for the latest in cybersecurity! This feed features a diverse lineup of shows, including Application Security Weekly, Business Security Weekly, Paul's Security Weekly, Enterprise Security Weekly, and Security Weekly News. Whether you're a cybersecurity professional, business leader, or tech enthusiast, we cover all angles of the cybersecurity landscape. Tune in for in-depth panel discussions, expert guest interviews, and ...
…
continue reading
Listen to talk about computer forensic analysis, techniques, methodology, tool reviews and more.
…
continue reading
For the latest in computer security news, hacking, and research! We sit around, drink beer, and talk security. Our show will feature technical segments that show you how to use the latest tools and techniques. Special guests appear on the show to enlighten us and change your perspective on information security. Note: This is only Paul's Security Weekly, a 2-hour show recorded once per week.
…
continue reading
Every single podcast we publish in one convenient feed. This is a LOT of content. Hours of audio each week.
…
continue reading
This is the replay of my monthly CompTIA Security+ Study Group. You can also watch a video version of this podcast from my website at http://www.professormesser.com.
…
continue reading
Cybermidnight Club– Hackers, Cyber Security and Cyber Crime is a trailblazing podcast by Alberto Daniel Hill, an expert in cybersecurity and the first person in Uruguay to serve prison for a computer-related crime. A crime he isn’t guilty of, perhaps one which never happened. Join Alberto as he dives deep into the world of hackers and cybersecurity in his riveting podcast. In this series, Alberto provides firsthand insights into the dark web and expert analysis of cybersecurity issues that a ...
…
continue reading
Exploring the practical and exciting alternate realities that can be unleashed through cloud driven transformation and cloud native living and working. Each episode, our hosts Dave, Esmee & Rob talk to Cloud leaders and practitioners to understand how previously untapped business value can be released, how to deal with the challenges and risks that come with bold ventures and how does human experience factor into all of this? They cover Intelligent Industry, Customer Experience, Sustainabili ...
…
continue reading
DIY Cyber Guy, hosted by David W. Schropfer, offers a approachable exploration of cybersecurity, emerging technologies (like AI and Quantum Computing) for all knowledge levels. Through dynamic podcasts, expert interviews, and engaging blog posts, DIY Cyber Guy provides practical, easy-to-apply tips to stay ahead of tech trends and protect your digital world. Whether you’re curious about cutting-edge tech or looking to secure your online life, DIY Cyber Guy makes complex topics both fun and a ...
…
continue reading
Der Chaos Computer Club ist die größte europäische Hackervereinigung, und seit über 25 Jahren Vermittler im Spannungsfeld technischer und sozialer Entwicklungen.
…
continue reading
Host Noel Bradford teams up with cybersecurity experts to deliver essential tech insights for UK small businesses and consumers. Cutting through jargon with wit and authority, each episode tackles real-world cyber threats, updates, and digital security challenges that actually matter to your business. From patch management to data protection, get actionable advice that doesn't require a computer science degree.Where cybersecurity meets practicality.
…
continue reading
A Podcast on Computer Security & Privacy for Non-Techies
…
continue reading
Redefining CyberSecurity Podcast Hosted by Sean Martin, CISSP Have you ever thought that we are selling cybersecurity insincerely, buying it indiscriminately, and deploying it ineffectively? For cybersecurity to be genuinely effective, we must make it consumable and usable. We must also bring transparency and honesty to the conversations surrounding the methods, services, and technologies upon which businesses rely. If we are going to protect what matters and bring value to our companies, ou ...
…
continue reading
Stay ahead of cyberthreats with expert insights and practical security . Led by an ensemble cast of industry thought leaderss offering in-depth analysis and practical advice to fortify your organization's defenses.
…
continue reading
Cyber Security can be a difficult field to not only understand but to also navigate. Joe South is here to help with over a decade of experience across several domains of security. With this podcast I hope to help more people get into IT and Cyber Security as well as discussing modern day Cyber Security topics you may find in the daily news. Come join us as we learn and grow together!
…
continue reading
A brief daily summary of what is important in information security. The podcast is published every weekday and designed to get you ready for the day with a brief, usually 5 minutes long summary of current network security related events. The content is late breaking, educational and based on listener input as well as on input received by the SANS Internet Storm Center. You may submit questions and comments via our contact form at https://isc.sans.edu/contact.html .
…
continue reading
Bringing you the latest news on the Cyber Security and initiatives that focus on development of the Cyber Security economics.
…
continue reading
Consumer Technology News & Views About The Hosts: Marsha Collier is an award winning tech author who has sold over a million books. Learn about her at www.marshacollier.com. Marc Cohen Has Spent 30 Years Informing Southern Californians About Technology. Show Contact Info: [email protected] Twitter #techradio @MarshaCollier & @realmarccohen
…
continue reading
Get your tech week started right! Weekly tech news show recorded live, with audience interactions and gadget Q&A!
…
continue reading
The Security Table is four cybersecurity industry veterans from diverse backgrounds discussing how to build secure software and all the issues that arise!
…
continue reading
The Tech+ PrepCast is a complete audio study companion for the CompTIA Tech+ (FC0-U71) certification exam, designed to guide learners through every domain and objective. Each episode delivers clear explanations, practical examples, and exam-focused insights to help you build confidence and technical readiness. Whether you are new to IT or preparing for your first certification, this PrepCast provides structured support from start to finish.
…
continue reading
The IT Business Podcast is a show for MSPs (Managed Service Providers) and IT Professionals providing business network support and managed services. The podcast aims to provide actionable advice and tips that help IT businesses survive and grow in the competitive tech industry. The podcast features guest interviews with seasoned IT professionals, business owners, vendors and industry leaders who share their experiences, insights, and strategies for success. These discussions often cover topi ...
…
continue reading
RunAs Radio is a weekly Internet Audio Talk Show for IT Professionals working with Microsoft products.
…
continue reading
IT and Cybersecurity news geared towards people involved in the IT industry including vendors, VARs, MSPs, MSSPs, SOCs, NOCs, Resellers, and other industry professionals. Our topics cover industry news, partner programs, cybersecurity, AI and more.
…
continue reading
Valorem Reply, part of the Reply Group companies, is a business innovation and transformation firm focused on driving change with unique digital solutions, strategic technology investments and design-led user experiences. Through the expertise of our people and power of Microsoft technologies, our innovative strategies and solutions securely and rapidly transform the way our clients do business. Follow our podcast to get insights on the latest digital transformation trends & updates on Micro ...
…
continue reading
Welcome to Act on Tech, the podcast that empowers you to harness technology to boost your productivity and simplify your life. Hosted by tech enthusiast and entrepreneur Alex, each episode dives into actionable tips, tools, and insights to help you stay ahead in the digital age. Discover practical advice, expert opinions, and cutting-edge trends, all while learning about Alex Custom Tech, a leading MSP dedicated to providing personalized IT solutions for business and residential customers. T ...
…
continue reading
Software Engineering Radio is a podcast targeted at the professional software developer. The goal is to be a lasting educational resource, not a newscast. SE Radio covers all topics software engineering. Episodes are either tutorials on a specific topic, or an interview with a well-known character from the software engineering world. All SE Radio episodes are original content — we do not record conferences or talks given in other venues. Each episode comprises two speakers to ensure a lively ...
…
continue reading
Join Chris and Tim as they delve into the Cloud Networking world! The goal of this podcast is to help Network Engineers with their Cloud journey. Follow us on Twitter @Cables2Clouds | Co-Hosts Twitter Handles: Chris - @bgp_mane | Tim - @juangolbez
…
continue reading
CDW Canada Tech Talks: Discussing the Latest Technology Innovations Experts from CDW and our partners tackle hot topics including generative AI, FinOps, the new cybersecurity landscape and more.
…
continue reading
Fox updates on the latest trends, gadgets and news in the world of technology.
…
continue reading
Welcome to Digital Detectives. We'll discuss computer forensics, electronic discovery and information security issues and what's really happening in the trenches. It's not theory, but practical information that you can use in your law practice on the Legal Talk Network.
…
continue reading
This is a podcast all about quantum computing news, basic concepts, and what people in the field are doing. Quantum computing is serious stuff and we talk about serious science, but I try to not take myself too seriously. With that being said, quantum computing is rad as heck. Oh and here's the obligatory phrase " quantum computing podcast " so search engines pick this up. Follow me on Minds to get updates on what I'm working on: https://www.minds.com/1ethanhansen?referrer=1ethanhansen Shoot ...
…
continue reading
MamraMic - Podcast by Mamram Alumni Association. For 4 years now we have been telling you the success stories of the graduates of the Mamram unit, the IDF’s first computer unit. Keep listening to stories about entrepreneurship, technology, good people, and everything in between. Have fun!
…
continue reading
Tim Harford and the More or Less team try to make sense of the statistics which surround us. From BBC Radio 4
…
continue reading
Each week, Embedded Computing Design’s EVP Rich Nass speaks to an executive in the embedded industry to understand what’s happening with the latest products, standards, and trends. The frank discussions reveal the real, behind the scenes issues, so the design community knows what’s coming down the pike. Topics covered in artificial intelligence, machine learning, embedded systems, internet of things, industrial automation, automotive applications, open source and more.
…
continue reading
Get exam-ready with the BareMetalCyber PrepCast, your on-demand guide to conquering the CompTIA Cloud+ (CV0-003). Each episode transforms complex topics like cloud design, deployment, security, and troubleshooting into clear, engaging lessons you can apply immediately. Produced by BareMetalCyber.com, where you’ll also find more prepcasts, books, and tools to fuel your certification success.
…
continue reading
Welcome to Hot or Hype, the podcast where hosts Olivia Storelli and Andrew Stevens break down the latest trends in cloud computing, data engineering, AI, and cybersecurity - and decide whether they're game-changing innovations or just industry buzz. In each episode, we dive into topics like AI-driven predictive analytics, cloud-native architectures, zero trust security, data mesh, and more, giving you real-world insights from practitioners who know what works and what doesn't. No fluff. No h ...
…
continue reading
Hosted on the www.embeddedcomputing.com website, the Embedded Insiders Podcast is a fun electronics talk show for hardware design engineers, software developers, and academics. Organized by Tiera Oliver, Assistant Managing Editor, and Ken Briodagh, Editor-in-Chief of Embedded Computing Design, each episode highlights embedded industry veterans who tackle trends, news, and new products for the embedded, IoT, automotive, security, artificial intelligence, edge computing, and other technology m ...
…
continue reading
Inside Java is a podcast for Java Developers brought to you directly from the people that make Java at Oracle. We'll discuss the language, the JVM, OpenJDK, platform security, innovation projects like Loom and Panama, and everything in between.
…
continue reading
Kaspersky Lab’s security experts discuss recent news and give their advice on the topics of computer and smartphone protection.
…
continue reading
This is daily Apple news. Monday through Friday, Ken Ray brings a short shot of tech happenings to your day. If it's Apple news, Apple-related news, or news related to Apple-related news, you'll hear about it here. News you'll like... this is Mac OS Ken.
…
continue reading

1
Liberen a Vlady: Ciberseguridad y derecho en Uruguay.
13:51
13:51
Play later
Play later
Lists
Like
Liked
13:51Las fuentes presentan discusiones con un hacker llamado Gob.eth y otros participantes con respecto al arresto y encarcelamiento de un asociado de 18 años, Vlady , en Uruguay. Gob.eth afirma que Vlady está acusado erróneamente de múltiples delitos de piratería informática, alegando que sus acciones fueron principalmente desfiguraciones de sitios web…
…
continue reading
This week, we are joined by Jamie Levy, Director of Adversary Tactics at Huntress, who is discussing their work on "Active Exploitation of SonicWall VPNs." Huntress has released an urgent threat advisory on active exploitation of SonicWall VPNs, with attackers bypassing MFA, pivoting to domain controllers, and ultimately deploying Akira ransomware.…
…
continue reading

1
Are self-driving cars safer than cars with drivers?
8:58
8:58
Play later
Play later
Lists
Like
Liked
8:58Fully autonomous cars are here. In a handful of cities across the US and China, robotaxis are transporting human passengers around town, but with no human behind the wheel. Loyal Listener Amberish wrote in to More or Less to ask about a couple of safety statistics he’d seen regarding these self-driving cars on social media. These claimed that Waymo…
…
continue reading

1
Watchman Privacy Podcast: Guests and Credibility Analysis.
19:23
19:23
Play later
Play later
Lists
Like
Liked
19:23This episode covers the The Watchman Privacy podcast, hosted by Gabriel Custodiet, focusing on its mission to help listeners understand and escape the "Technocracy". It examines Custodiet's background in cybersecurity and finance, which underpins the podcast's credibility and consistent editorial focus. A significant portion of the report details t…
…
continue reading

1
El panorama de la ciberseguridad en Uruguay: un análisis experto.
22:32
22:32
Play later
Play later
Lists
Like
Liked
22:32Los textos proporcionados ofrecen un examen multifacético del panorama de la ciberseguridad de Uruguay, destacando tanto sus ambiciones digitales como sus vulnerabilidades significativas. Una narrativa central se centra en Alberto Daniel Hill, un hacker ético que fue encarcelado injustamente, convirtiéndose en un ejemplo conmovedor de la desconexió…
…
continue reading

1
Dexer's Anonymous: A Hacktivist's Atonement.
28:54
28:54
Play later
Play later
Lists
Like
Liked
28:54Alberto Daniel Hill introduces and reflects on a publication titled "My Life in Anonymous: An Atonement" by a former hacktivist known as Dexer. The discussion traces Dexer's decade-long journey from an observer to an active member of Anonymous, detailing his group's efforts to legitimize themselves in information security. It highlights the movemen…
…
continue reading

1
Versión en español: Misterios Cibernéticos Mexicanos: De Grinberg a los Hackeos del Cartel
17:04
17:04
Play later
Play later
Lists
Like
Liked
17:04Los textos proporcionados describen el podcast Cyber Midnight Club, presentado por el experto uruguayo en ciberseguridad Alberto Daniel Hill, que explora temas como la piratería, el cibercrimen y la privacidad digital, a menudo con eventos del mundo real y su defensa de la justicia. Una parte significativa del contenido del podcast se centra en el …
…
continue reading
American Online says it is ending dial-up internet service after 34 years. Learn more about your ad choices. Visit podcastchoices.com/adchoicesBy FOX News Podcasts
…
continue reading

1
Astro Oblivion, FreePBX, GitHub, OWASP, Promptlock, Claude Aaran Leyland - SWN #507
35:51
35:51
Play later
Play later
Lists
Like
Liked
35:51Porn bombing the celestial zoom room and Astro Oblivion, FreePBX, GitHub, OWASP, Promptlock, Claude Aaran Leyland, and More, on this edition of the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-507
…
continue reading
A suspected ransomware attack disrupts hundreds of Swedish municipalities. Google warns Gmail users of emerging cyberattacks tied to the ShinyHunters group. A malicious supply chain attack hits the npm registry. Senators press AFLAC for answers following a data breach. Law enforcement takedowns splinter the ransomware ecosystem. The FBI and Dutch p…
…
continue reading

1
Mexican Cyber Mysteries: From Grinberg to Cartel Hacks
42:44
42:44
Play later
Play later
Lists
Like
Liked
42:44This briefing synthesizes information from "Cyber Midnight Club: Mexico's Digital Underbelly" and "Héctor López & Alberto Daniel Hill: Cybersecurity Collaboration" with the podcast "Jacobo Grinberg, El PENTAGONO Y CHINA; Hacker EXPONE VERDADES — Héctor López." It provides a detailed overview of the key themes, prominent figures, and critical insigh…
…
continue reading

1
HN794: How the Bundle Protocol Enables Interplanetary Networking
1:03:33
1:03:33
Play later
Play later
Lists
Like
Liked
1:03:33How might we get network traffic from Earth to a lunar base? Or Mars? Or to spaceships carrying astronauts or probes exploring space? And how do we get it back? The problem, among other things, is latency. The answer isn’t TCP/IP. The answer is…complicated. On today’s Heavy Networking we explore the challenges of getting packets... Read more »…
…
continue reading

1
TNO040: From ARPANET to the Stars: Vint Cerf on the Past and Future of the Internet
1:14:22
1:14:22
Play later
Play later
Lists
Like
Liked
1:14:22Vint Cerf, widely recognized as one of the fathers of the Internet, is today’s special guest on Total Network Operations. He currently serves as Vice President and Chief Internet Evangelist at Google. His pioneering work began back in the 1960’s when he was involved in the ARPANET project. Alongside Bob Kahn, Vint co-invented the TCP/IP... Read mor…
…
continue reading

1
Apple Warns UK Over Proposed Regulation - MOSK: 08.29.2025
13:24
13:24
Play later
Play later
Lists
Like
Liked
13:24- Apple Warns Against EU-Style App Store and Hardware Regulations in UK - Eddy “the Buyer”? Cue Said to Champion M&A for A.I. Inside Apple - Apple Subsidiary Beats Teases Fall Launch for Powerbeats Fit Earbuds - BBC Picks Up First Three Seasons of Apple TV+ Comedy “Trying” - Sponsored by Insta360 Go Ultra - A tiny, hands-free 4K camera. Go Ultra to…
…
continue reading
Matt Mulcahy shares the blueprint for launching MSP Cyber in 2025. We cover what it really costs, what tools matter, where MSPs are going wrong with value, and why combining IT with digital marketing is a game-changer. Why Listen: Learn the real startup costs of an MSP today Why Miami’s IT market is still wide open Shifting value away from just hel…
…
continue reading

1
SANS Stormcast Friday, August 29th, 2025: Scans for ZIP Files; FreePBX 0-Day; Passwordstate Patch (#)
5:46
5:46
Play later
Play later
Lists
Like
Liked
5:46SANS Stormcast Friday, August 29th, 2025: Scans for ZIP Files; FreePBX 0-Day; Passwordstate Patch Increasing Searches for ZIP Files Attackers are scanning our honeypots more and more for .zip files. They are looking for backups of credential files and the like left behind by careless administrators and developers. https://isc.sans.edu/diary/Increas…
…
continue reading
Robomart will soon start testing self-driving electric vehicles for retail deliveries in Austin, Texas. Learn more about your ad choices. Visit podcastchoices.com/adchoicesBy FOX News Podcasts
…
continue reading

1
Hackers Steal Your Car and Vulnerabilities - Rob Allen - PSW #889
2:10:12
2:10:12
Play later
Play later
Lists
Like
Liked
2:10:12Rob Allen joins us to discuss the importance of security research teams, and some cool stuff they've worked on. Then, in the Security News: Flipper Zero, unlocking cars: The saga continues The one where they stole the vulnerabilities ESP32 Bus Pirates AI will weaponize everything, maybe What are in-the-wild exploits? Docker and security boundaries,…
…
continue reading

1
Hackers Steal Your Car and Vulnerabilities - Rob Allen - PSW #889
2:10:12
2:10:12
Play later
Play later
Lists
Like
Liked
2:10:12Rob Allen joins us to discuss the importance of security research teams, and some cool stuff they've worked on. Then, in the Security News: Flipper Zero, unlocking cars: The saga continues The one where they stole the vulnerabilities ESP32 Bus Pirates AI will weaponize everything, maybe What are in-the-wild exploits? Docker and security boundaries,…
…
continue reading

1
Uruguay's Cybersecurity Landscape: An Expert Analysis.
52:16
52:16
Play later
Play later
Lists
Like
Liked
52:16As your thought partner, I can help you quickly understand and analyze the provided information to formulate strategic recommendations for senior leadership. I will provide clear, concise, and well-supported answers, drawing on the details in the sources. The knowledge base you've provided includes extensive insights into Uruguay's cybersecurity la…
…
continue reading

1
IPB182: IPv6 Transition Technology Options
27:30
27:30
Play later
Play later
Lists
Like
Liked
27:30Transitioning from IPv4 to IPv6, or at least IPv6-mostly, is no easy task. Today’s show provides some education and advice about IPv6 transition mechanisms. We cover options such as NAT64, DNS64, PREF64, and more, as well as use cases. Also, if your technology vendors aren’t offering some of these mechanisms, ask for them – you’re... Read more »…
…
continue reading

1
SE Radio 683: Artie Shevchenko on Programmers as Code Health Guardians
57:31
57:31
Play later
Play later
Lists
Like
Liked
57:31Artie Shevchenko, author of Code Health Guardian, speaks with host Jeff Doolittle about the crucial role of human programmers in the AI era, emphasizing that humans must excel at managing code complexity. Shevchenko discusses these concepts and key takeaways from his book, including the three problems caused by complexity: change amplification, cog…
…
continue reading
It’s time to talk crypto. No, not the Bitcoin kind. Ethan and Holly introduce the basics of IPsec, the protocol that authenticates and encrypts traffic between endpoints. They discuss what it is, how it provides trustworthiness and secrecy to IP traffic, and common use cases. They review the different types of IPsec protocols and modes,... Read mor…
…
continue reading

1
TuneIn, Turn On, Sign Up - MOSK: 08.28.2025
15:20
15:20
Play later
Play later
Lists
Like
Liked
15:20- IDC Raises 2025 Smartphone Shipment Expectations Thanks to iPhone - Apple Revokes Notarization for iTorrent in EU’s AltStore PAL - Google Intros Notarization-Style Verification for Android Apps Outside Play Store - Columbia Pursues Probe into Alleged Anticompetitive Behavior from Apple - Apple Music Radio Stations Turn Up on TuneIn - Apple TV+ Dr…
…
continue reading
The FBI shares revelations on Salt Typhoon’s reach. Former NSA and FBI directors sound alarm on infrastructure cybersecurity gaps. Google is launching a new cyber “disruption unit”. A new report highlights cyber risks to the maritime industry. A Pennsylvania healthcare provider suffers a data breach affecting over six hundred thousand individuals. …
…
continue reading

1
SANS Stormcast Thursday, August 28th, 2025: Launching Shellcode; NX Compromise; Volt Typhoon Report (#)
6:39
6:39
Play later
Play later
Lists
Like
Liked
6:39SANS Stormcast Thursday, August 28th, 2025: Launching Shellcode; NX Compromise; Volt Typhoon Report Interesting Technique to Launch a Shellcode Xavier came across malware that PowerShell and the CallWindowProcA() API to launch code. https://isc.sans.edu/diary/Interesting%20Technique%20to%20Launch%20a%20Shellcode/32238 NX Compromised to Steal Wallet…
…
continue reading

1
White House Launches Presidential AI Challenge
1:45
1:45
Play later
Play later
Lists
Like
Liked
1:45First Lady Melania Trump announces that the White House is encouraging kids to use artificial intelligence to address a problem within their community. Learn more about your ad choices. Visit podcastchoices.com/adchoicesBy FOX News Podcasts
…
continue reading
A whistle-blower claims DOGE uploaded a sensitive Social Security database to a vulnerable cloud server. Allies push back against North Korean IT scams. ZipLine is a sophisticated phishing campaign targeting U.S.-based manufacturing. Researchers uncover a residential proxy network operating across at least 20 U.S. states. Flock Safety license plate…
…
continue reading

1
D2DO280: Architect for Your AI Success With F5 and MinIO (Sponsored)
34:33
34:33
Play later
Play later
Lists
Like
Liked
34:33In the changing landscape of AI data infrastructure, F5 and MinIO are partnering on a solution that brings together the best of each company. This solution bookends the AI stack—it uses F5 for reliable, secure, and observable data delivery and MinIO’s AIStor for storage of all data types. The goal is to help organizations be... Read more »…
…
continue reading

1
Embedded Executive: Quantum Cryptography Must Be Part of Your Vocabulary | Infineon
11:49
11:49
Play later
Play later
Lists
Like
Liked
11:49We’re in the era of quantum computing. That brings with it a lot of great things. But at the same time, it brings some not so good things. Once again, we’re in a race to stay ahead of the bad guys to keep our systems secure. Folks like the experts at Infineon are doing what they can to do just that. And the best part is that they are trying to insu…
…
continue reading

51
The Global Cyber Threat Landscape 2024-2025.
6:31
6:31
Play later
Play later
Lists
Like
Liked
6:31The provided report offers an extensive overview of the global cyber threat landscape for 2024-2025, emphasizing the professionalization of cybercrime and its increasing entanglement with geopolitical motives. It highlights the rise of Ransomware-as-a-Service (RaaS) models and the evolution of multi-extortion tactics, which have significantly impac…
…
continue reading

1
Cloud Networking Basics: VPC - AWS vs Azure vs Google Cloud
40:54
40:54
Play later
Play later
Lists
Like
Liked
40:54Send us a text What happens when three major cloud providers each reimagine network design from scratch? You get three completely different approaches to solving the same fundamental problem. The foundation of cloud networking begins with the virtual containers that hold your resources: AWS's Virtual Private Clouds (VPCs), Azure's Virtual Networks …
…
continue reading

1
Windows 11 Update: Why Your SSD Might Be Slowing Down
22:31
22:31
Play later
Play later
Lists
Like
Liked
22:31Noticing your computer running slower after a recent Windows 11 update? You’re not alone. In this episode of Act on Tech, Alex explains how a recent Windows 11 patch has been causing SSD performance issues—leading to longer boot times, sluggish apps, and slower file transfers. Learn what’s behind the slowdown, how to check if your system is affecte…
…
continue reading

1
Apple Announces "Awe Dropping" Media Event - MOSK: 08.27.2025
16:09
16:09
Play later
Play later
Lists
Like
Liked
16:09- Apple’s Next Media Event Set for 9 September - Expectations for Apple’s “Awe Dropping” Event - Apple Sets “Awe Dropping” Placeholder on YouTube - “Awe Dropping” Art Goes Interactive on Apple Site - BofA: Investors Not Super Excited About iPhone Air - Germany Says Apple Can’t Call Apple Watch “Carbon Neutral” - Apple Opening Two Stores in India Ne…
…
continue reading

1
vCISO Benefits as the CISO Becomes Strategic and the Board's Responsible for Security - Brian Haugli - BSW #410
59:29
59:29
Play later
Play later
Lists
Like
Liked
59:29Securing top-tier cybersecurity leadership is not just a necessity but a significant challenge, especially when working within budget constraints. Should you hire a full-time CISO or outsource to a vCISO provider? Brian Haugli, CEO at SideChannel, joins BSW to discuss how organizations can hire a Virtual CISO (vCISO) to benefit from their expertise…
…
continue reading

1
A Reunion After 18 Months: Cybersecurity and Human Connections on TWITTER SPACES.
5:47
5:47
Play later
Play later
Lists
Like
Liked
5:47The provided sources offer a multifaceted conversation exploring challenges in the digital age, particularly concerning online platforms and free speech. They highlight personal struggles and emotional reunions among friends, alongside the pervasive influence of Artificial Intelligence in both its beneficial and harmful applications. A significant …
…
continue reading
Ever been told, “You’re too expensive”? Yeah, me too. In this episode, I share how I deal with prospects who quote me lower rates from “their guy” — and why I never match those prices. Instead, I focus on flipping the conversation to value, downtime costs, and the trust that keeps clients with me for decades. Why Listen: Learn why I never match low…
…
continue reading
What are common mistakes folks are making with their Azure tenant(s)? While at the Kansas City Developers Conference, Richard chatted with Scott Sauber to run down his top ten list of issues he checks on for all his customers using Azure. From tenant ownership to naming conventions, policies, identities, and cost controls - there are a lot of thing…
…
continue reading