Search a title or topic

Over 20 million podcasts, powered by 

Player FM logo

CrowdStrike Podcasts

show episodes
 
Modern adversaries are relentless. Today’s threat actors target organizations around the world with sophisticated cyberattacks. Who are they? What are they after? And most importantly, how can you defend against them? Welcome to the Adversary Universe podcast, where CrowdStrike answers all of these questions — and more. Join our hosts, a pioneer in adversary intelligence and a specialist in cybersecurity technology, as they unmask the threat actors targeting your organization.
  continue reading
 
Artwork

1
YusufOnSecurity.com

YusufOnSecurity.Com

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
This is a weekly podcast on cyber security domains. We discuss, dissect and demystify the world of security by providing an in-depth coverage on the cybersecurity topics that matter most. All these in plain easy to understand language. Like it, share it, and most importantly enjoy it!
  continue reading
 
Artwork

1
(mis)Conduct, Money & Reputation

Lansons Team Farner, Katten

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
A series by reputation specialist Lansons Team Farner and law firm Katten. Join asset management experts David Masters (Lansons), Neil Robson (Katten) and guests as they dissect the top stories and misconduct cases across the industry, impacting reputation, brand trust and integrity.
  continue reading
 
Scaling a business isn’t just about strategy—it’s about navigating chaos, making fast but sound decisions, and keeping teams aligned under pressure. The Business Emergency Room helps leaders, founders, and decision-makers sharpen their decision-making mechanics, master people dynamics, and build resilience in uncertain markets. Host Maartje van Krieken shares battle-tested frameworks to eliminate bottlenecks, avoid analysis paralysis, and turn turbulence into traction. Tune in weekly for rea ...
  continue reading
 
Artwork

1
Causality

The Engineered Network

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Chain of Events. Cause and Effect. We analyse what went right and what went wrong as we discover that many outcomes can be predicted, planned for and even prevented.
  continue reading
 
Artwork

4
IT Ops Query

Informa TechTarget

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
This podcast distills the signal from the noise about enterprise IT digital transformation and operations in the era of Agile, DevOps and distributed applications. Interviews feature expert guests in conversation with IT journalism veteran Beth Pariseau, Senior News Writer at Informa TechTarget.
  continue reading
 
Accounting Matters lives up to its title, covering vital accounting topics that actually matter to professionals in the accounting trenches. We start with a new topic and definition every episode, then highlight and discuss the key areas, from evaluation to reporting. Accounting Matters is hosted by public accounting veterans Adam Olsen & Nicole Harger from advisory firm Embark. LinkedIn - https://hubs.ly/H0XgZnG0 Instagram - https://hubs.ly/H0XgYNZ0 Twitter - https://hubs.ly/H0Xg-dz0 Facebo ...
  continue reading
 
The State of Enterprise IT Security is the show for technology leaders looking for actionable and approachable guidance in the security landscape. The show features Brad Bussie, the CISO of e360, a premier technology solutions provider. In each episode, Brad covers 3 timely topics in each episode impacting the enterprise security landscape.
  continue reading
 
Artwork

1
Unpacking Software

Chocolatey Software, Inc.

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Join our monthly Unpacking Software livestream to hear about the latest news, chat and opinion on packaging, software deployment and lifecycle management! Ask your question in the #ama-questions channel of our Community Hub Discord at https://ch0.co/community.
  continue reading
 
Artwork

1
Data Center Therapy

IVOXY Consulting

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
IT talk with a healthy dose of empathy: Hosts Matt Yette & Matt Cozzolino draw on their combined 40+ years of infrastructure experience as they discuss the ever-changing technology landscape – from virtualization to storage, security to networking, and everything in between.
  continue reading
 
Artwork

1
Kopec Explains Software

David Kopec, Rebecca Kopec

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
We make software-related technical topics intelligible. We aim to help you develop an intuitive understanding of each subject, instead of emphasizing formal definitions. Join us as we learn about the wide world of software.
  continue reading
 
Artwork

1
The Register Kettle

Chris Williams, The Register, Nicole Hemsoth Prickett, Tobias Mann, Iain Thomson, Brandon Vigliarolo, Tom Claburn

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
What's a kettle, you ask? Why a group of vultures in flight, of course. News, insights, analysis, and overall chatter around what's happening in the broader world of IT. With hosts Iain Thomson, Chris Williams, Brandon Vigliarolo, Nicole Hemsoth Prickett, and more....
  continue reading
 
Artwork

1
What the Shell?

John Kordis

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Welcome to ”What the Shell?” where I dive into major hacks and vulnerabilities in a way meant to be accessible by anyone. Come with me as we look at each incident through an exciting lens of curiosity. Join us on our discord if you‘d like to participate in discussions with myself and our guests! https://discord.gg/bJauPBBhHn
  continue reading
 
Artwork

1
UnWired...Podcast

SpaceAge Consulting LLC

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Robert, of SpaceAge Consulting LLC, gets Unwired and talks about the technology behind Audio and Video Production. He and his guests "Take the Technical and make it Understandable". Tune in weekly to hear more tech and tips about all things AV.
  continue reading
 
Artwork
 
The Testing Show explores, pokes and prods anything and everything related to testing, with new episodes released every other Wednesday. Our hosts, Matt Heusser and Michael Larsen, will analyze tried and true methodologies and practices against on trend and emerging topics. We have a range of guest contributors from Qualitest as well as industry experts from around the world to share insights, knowledge and personal experience. So take minute to find out what others are saying in the testing ...
  continue reading
 
Artwork

1
Cybberssecurity Podcast

Nathanael Dick and Andrew Nuxoll

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Join us on a cybersecurity journey like no other! In our podcast, we dive into the dynamic world of cybersecurity, exploring the latest topics and trends. We blend insightful discussions with a touch of humor and real-world anecdotes to keep you informed, entertained, and one step ahead of the cyber threats lurking out there. Tune in for a unique blend of cybersecurity insights and a dash of 'BS' – because learning about security doesn't have to be dry and boring!
  continue reading
 
Artwork

1
The Nonintuitive Bits

Viacheslav Kovalevskyi, Zain Rizvi

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Two and a half engineers, three different viewpoints. At the intersection of technology, business, gaming and psychology, get a second opinion about the issues of the day in the tech industry. Each opinion is held only the host sharing it (and not by our employers). *Warning:* The host may no longer hold that opinion by the end of the episode.
  continue reading
 
Artwork

4
Seed to Scale

Eniac Ventures

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Welcome to Seed to Scale. The podcast where Eniac Ventures sits down with founders, investors, and influencers to discuss all things startups and seed stage. Each episode will be hosted by an Eniac General Partner - Hadley Harris, Nihal Mehta, Tim Young or Vic Singh - to talk about the ups and downs of building an early-stage company, securing funding and what it takes to build a lasting business. Send topics or guest suggestions to [email protected] or @seedtoscale, and please subscribe, ...
  continue reading
 
Artwork

1
The Cyber Tap

Purdue cyberTAP

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Join George and Jim from cyberTAP at Purdue University for a fun and informative discussion. Listen as they unpack cybersecurity news, conduct interviews with industry experts, and dish the latest tech, tools, tips and tricks...as long as they stay focused.
  continue reading
 
Artwork

1
The Cybersecurity Digest

The Cybersecurity Digest LLC

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
In the ever-evolving world of cybersecurity, keeping updated on the latest developments is crucial. The Cybersecurity Digest is your curated source for the most recent cybersecurity updates. Our goal is to bring you a comprehensive roundup of news, ensuring you’re well-informed and ahead of the curve. Stay Informed to Stay Secure.
  continue reading
 
There's a lot on the line for developers. Writing clean code, tracking down and removing bugs, AND shipping features to millions of customers? It's a lot—and devs are people too! The Dev Morning Show (At Night) shares the human side of software development with interviews that start lighthearted but get to the heart of what it takes to perform in the delightfully weird world of software. Join us on the journey!
  continue reading
 
Artwork

1
A Formula For Success

A Formula For Success Podcast

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
CrowdStrike are the global leaders in cybersecurity whose innovative technology and mission to keep their customers protected from attack is disrupting the industry. A Formula For Success features leaders from across the globe discussing their journey to success and how they build a winning culture within their organizations. We sit down with leaders to talk about the technological innovations that are driving their industries as well as diving deeper into what drives these individuals to su ...
  continue reading
 
Cyber Security happens all over the world. This podcast is focused on Cyber Security from the Asian perspective. Listen to interviews, discussions, insights and get to the issues that matters most, affecting business from the cyber perspective around the region. The episodes on this podcast is shorter than your drive home!
  continue reading
 
All areas of an organization, even those still in the analog world, are being transformed by technology. This shift isn't just modernizing manual processes with digital tools, but changing the fabric of an organization to support a new way of thinking. So while it may be a buzzword, digital transformation is happening and we're here to unpack it with you. Between big ideas and tiny details is the ten thousand foot view. Join the technology consultants from Vervint as we discuss the changing ...
  continue reading
 
Artwork

1
The X

Bryan McClain and Demetrius Madrigal

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
The X – The Experience – is singlehandedly the most important factor in the success of products, services and entire businesses. The X is hosted by Silicon Valley veterans and product innovation strategists Bryan McClain and Demetrius Madrigal, who bring a combined 30+ years of experience studying human behavior and technology. They’ve been behind the scenes with everyone from unfunded startups to technology giants and have a unique perspective on current events, how they are shaped by the h ...
  continue reading
 
Artwork
 
The Ungrowth Show is a captivating podcast that explores the real-world challenges and triumphs of businesses. Hosted by TrellisPoint, each episode dives into the complex battles companies face, from overcoming market hurdles to achieving breakthrough successes. With expert commentary and engaging storytelling, we dissect these business stories to reveal valuable lessons and insights that help others avoid making mistakes. Whether you’re navigating your own business journey or simply interes ...
  continue reading
 
Artwork

1
David vs. Goliath

Dolman Law Group Accident Injury Lawyers

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
After an accident, minutes matter. Your words and actions matter even more. You need help and you need it now. This is David vs. Goliath, brought to you by Dolman Law Group Accident Injury Lawyers, a boutique personal injury law firm with a reputation for going head-to-head with the insurance company giants and putting people over profits. With 15 offices in Florida; Clearwater, St. Petersburg, New Port Richey, Sarasota/University Park, Aventura, Boca Raton, North Miami, Fort Lauderdale, Dor ...
  continue reading
 
Loading …
show series
 
A single line of flawed code grounded planes, shuttered hospitals, and crashed cash registers… What would your business do if the emergency was already underway? One year after launching this podcast in the middle of real-life chaos, Maartje breaks down the CrowdStrike debacle that exposed just how fragile even the biggest systems can be, and why m…
  continue reading
 
Enjoying the content? Let us know your feedback! Today, we’re focusing on the critical lessons from one of the most disruptive IT failures in recent memory: the global outage triggered by a CrowdStrike software update on July 19, 2024. While the headlines focused on grounded flights and downed systems, the real story lies in what this incident reve…
  continue reading
 
A startup with cutting-edge tech and global momentum collapsed in under four years because no one stopped to build the structure needed to sustain it. In this episode, Maartje van Krieken reflects on the rise and fall of Hyzon Motors, a hydrogen fuel cell startup that looked like a sure thing. The technology was solid. The market was ready. The com…
  continue reading
 
Summary In this episode, Adam Brewer and Andy Jaw discuss recent SharePoint vulnerabilities, the importance of data protection and governance, and the implications of the Clorox cyber attack. They explore the challenges of managing insider threats in IT, emphasizing the need for robust security measures and proactive communication with customers. T…
  continue reading
 
Watch my NEW SPECIAL 'Honorary Jones' 👉 https://youtu.be/G1EbecGkomk TOUR DATES: https://punchup.live/zoltan/tickets Aug 1-2 | Rochester, NY Aug 3 | Albany, NY Aug 14-16 | Timonium, MD Aug 21-23 | Appleton, WI Sep 4-6 | Fort Wayne, IN Sep 7 | Liberty Township, OH Sep 17 | Hoover, AL Sep 18 | Huntsville, AL Sep 19-20 | Chattanooga, TN Oct 2-3 | Tuls…
  continue reading
 
Scaling looks like success, until your product hits every shelf and you’re still bleeding cash. In this episode, Maartje van Krieken talks with food and beverage strategist Debbie Wildrick about what really happens when growth gets ahead of structure. With decades of experience across the CPG world, from startup brands to overseeing billions in ret…
  continue reading
 
Summary In this episode of the Blue Security Podcast, hosts Andy and Adam discuss the vulnerabilities in solar technology, particularly focusing on smart inverters and their implications for power grids. They delve into the cybersecurity landscape, emphasizing China's role in technology transfer and its impact on national security. The conversation…
  continue reading
 
Watch my NEW SPECIAL 'Honorary Jones' 👉 https://youtu.be/G1EbecGkomk TOUR DATES: https://punchup.live/zoltan/tickets Jul 25-26 | Austin, TX Aug 1-2 | Rochester, NY Aug 3 | Albany, NY Aug 14-16 | Timonium, MD Aug 21-23 | Appleton, WI Sep 4-6 | Fort Wayne, IN Sep 7 | Liberty Township, OH Sep 17 | Hoover, AL Sep 18 | Huntsville, AL Sep 19-20 | Chattan…
  continue reading
 
Enjoying the content? Let us know your feedback! In this week's episode, we talk through the technical details of CI/CD (Continuous Integration/Continuous Development) pipelines: what they are, how they work, the jargon around them, and the potential security risks organizations need to be aware of. Finally, we’ll bust a persistent myth in software…
  continue reading
 
This week we're talking to Martha Dimitratou from ReproUncensored, and PI's own Sarah Simms about the international landscape for reproductive rights, and including barriers to access to reproductive healthcare, including abortion; and how big tech are collaborating with or supporting tactics to make access to healthcare harder. Links - Learn more …
  continue reading
 
They never really left — they just got quieter, faster, and bolder. In this episode of the Adversary Universe podcast, Adam and Cristian trace the resurgence of SCATTERED SPIDER, one of today’s most aggressive and sophisticated adversary groups. Once known for SIM swapping and gaming community exploits, SCATTERED SPIDER has evolved into a high-spee…
  continue reading
 
Insider trading, money laundering, and reputational risk in asset management take centre stage in this episode, featuring the recent conviction of Redinel and Oerta Korfuzi. David Masters and Neil Robson examine how confidential market information was exploited, how the FCA uncovered the scheme, and why the asset manager involved avoided lasting re…
  continue reading
 
Summary In this episode of the Blue Security Podcast, hosts Andy and Adam discuss significant updates from Microsoft, focusing on security enhancements, the evolution of the blue screen of death, and new options for consumers regarding extended security updates. They also explore a new update orchestration platform aimed at improving the user exper…
  continue reading
 
Enjoying the content? Let us know your feedback! Today’s episode takes you through three intersecting stories revealing how technology shapes both our vulnerabilities and our digital identity—from the sprawling and adaptable threat of AsyncRAT malware, to critical Bluetooth vulnerabilities threatening millions of vehicles globally, and finally to a…
  continue reading
 
Public sector leaders are quietly mastering the kind of complex, human-centered change most businesses struggle to get right. Maartje van Krieken is joined by Vijay K. Luthra, a former civil servant and transformation strategist, to talk about why public sector transformation deserves more attention from business leaders facing turbulence. Vijay dr…
  continue reading
 
Summary In this episode of the Blue Security Podcast, hosts Andy and Adam discuss the recent layoffs at Microsoft and the broader implications for the tech industry. They share personal experiences and insights on navigating job loss, the randomness of layoffs, and the importance of preparation. The conversation also covers practical advice for job…
  continue reading
 
In this episode, Brad Bussie and field CISO Mark Aksel explore how AI is transforming manufacturing, from predictive maintenance to advanced supply chain strategies. They break down the real impacts of tariffs and share how companies can future-proof operations with smarter AI-driven decisions. ## Topics Covered * Using AI for predictive maintenanc…
  continue reading
 
You asked, and we answered. This episode of the Adversary Universe podcast takes a deep dive into questions from our listeners. What did you want to know? Well, a lot about adversaries, but also about career paths and the threat intel space. Tune in to hear the answers to questions like: • How did you break into the threat intelligence space? • Who…
  continue reading
 
AI isn’t some future threat on the horizon. It’s already changing how businesses operate, and the question is whether you’re keeping up or falling behind. In this 50th episode of The Business Emergency Room, Maartje van Krieken gets real about “AI FOMO” and why so many leaders are stuck thinking instead of doing. Most companies say they’re explorin…
  continue reading
 
Summary In this episode of the Blue Security Podcast, hosts Andy and Adam delve into the intricacies of Entra External ID, a customer identity and access management solution. They discuss the importance of security considerations in application development, the risks associated with customer-facing technologies, and the need for effective authentic…
  continue reading
 
Watch my NEW SPECIAL 'Honorary Jones' 👉 https://youtu.be/G1EbecGkomk TOUR DATES: https://punchup.live/zoltan/tickets Jul 9 | Doral (Miami), FL Jul 10 | Dania Beach, FL Jul 11-13 | Naples, FL Jul 18 | Soboba, CA Jul 25-26 | Austin, TX Aug 1-2 | Rochester, NY Aug 3 | Albany, NY Aug 14-16 | Timonium, MD Aug 21-23 | Appleton, WI Sep 4-6 | Fort Wayne, I…
  continue reading
 
Enjoying the content? Let us know your feedback! This week on YusufOnSecurity, we’re diving into a topic that’s become increasingly critical as our world grows more connected: the security of the Internet of Things, or IoT. From smart thermostats and wearable fitness trackers to industrial sensors and connected cars, IoT devices are now woven into …
  continue reading
 
The leader of search, observability, and cloud operations at Amazon Web Services outlines her strategic perspective on monitoring AI agent systems such as Amazon Bedrock Agents. Ultimately, she envisions unified visibility, including security, across AI workflows, from silicon to application, both inside and outside AWS. Featuring: Nandini Ramani, …
  continue reading
 
Most leadership failures don’t happen because of bad strategy. They happen because we overlook how human we all are when the pressure’s on. Maartje van Krieken is joined by German author, speaker, and former airline pilot Peter Brandl, who brings a pilot’s perspective into the world of business leadership. With years of experience training flight c…
  continue reading
 
Summary In this episode of the Blue Security Podcast, hosts Andy and Adam discuss the emerging concept of AI agents, their implications for security, and how Microsoft is integrating these technologies into their solutions. They explore the evolution of AI from simple prompt-response interactions to autonomous agents capable of making decisions and…
  continue reading
 
Enjoying the content? Let us know your feedback! In today’s interconnected world, the security of our digital infrastructure relies heavily on cryptography—the science of protecting information by transforming it into unreadable formats for unauthorized users. But how do we know the cryptographic solutions we use are truly secure? That’s where stan…
  continue reading
 
Physical security and IT security have gone hand in hand for a long time. While cybersecurity teams are rightfully focused on protecting their virtual environments, they should also have an eye on whether an adversary is walking through the front door. “Anytime there’s a physical boundary, an adversary is going to look to cross over that — whether …
  continue reading
 
Experienced IT practitioners offer their predictions for how AI will change observability, the role of the site reliability engineer and incident management within enterprise organizations, from best-case scenarios to pitfalls and risks. Come for the 40 combined years of IT ops expertise, stay for the "Highlander" references and football analogies.…
  continue reading
 
Most businesses won’t survive their next big disruption. Not because the crisis is too big, but because their business continuity plan (BCP) was either half-baked or never tested. Maartje van Krieken makes the case for recovery planning that actually works. What would happen if your leadership team was unreachable? If your systems went down? If you…
  continue reading
 
Summary In this episode of the Blue Security Podcast, hosts Andy and Adam discuss the implications of JP Morgan's open letter to SaaS vendors, emphasizing the need for improved security practices in the software industry. They explore the challenges posed by the SaaS model, the importance of collaboration among security practitioners, and Microsoft…
  continue reading
 
Enjoying the content? Let us know your feedback! In today’s episode is about a seismic shift in the world of cyber threats. The emergence of AI-powered malware. We’ll unpack how this new breed of malware works, the science behind it, real-world incidents, and what the latest academic research reveals. We will also look at the latest news that some …
  continue reading
 
This week we speak to Jen Persson, Director of Defend Digital Me, about the technologies being deployed in schools in England and Wales. Links: Read more from Defend Digital Me: https://defenddigitalme.org/research/ PI's work on Securitising Education: https://privacyinternational.org/campaigns/securitising-education 25 Years old - The Database Sta…
  continue reading
 
Ameet Talwalkar joined observability vendor Datadog in February to lead a new AI research lab at the company. He is also an Associate Professor at Carnegie Mellon University. One of the first projects from the lab was released to open source in May – Toto, a foundation model trained on real-world observability data. Talwalkar discusses how Toto cou…
  continue reading
 
Join hosts Nicole Harger and Adam Olsen as they explore the intricacies of accounting for R&D costs. This episode covers the current U.S. GAAP treatment, challenges in the life sciences sector, and differences with IFRS. Discover potential changes from FASB and gain insights into how these accounting principles impact financial statements across in…
  continue reading
 
Most boards don’t fail because of bad people. They fail because the right people aren’t at the table when it counts. Maartje van Krieken sits down with Dr. Keith Dorsey, the founder of Boardroom Journey, to talk about what makes a board truly effective, and why board composition strategy should never be an afterthought. If your company is scaling f…
  continue reading
 
Summary In this episode of the Blue Security Podcast, hosts Andy and Adam discuss the formation and function of the Cybersecurity Governance Council at Microsoft, highlighting the roles of various deputy CISOs and their focus on specific security areas. They delve into misconceptions in cybersecurity, the importance of shared responsibility, and th…
  continue reading
 
Watch my NEW SPECIAL 'Honorary Jones' 👉 https://youtu.be/G1EbecGkomk TOUR DATES: https://punchup.live/zoltan/tickets 2025 DATES👇 Jun 6-7 | New Brunswick, NJ Jun 13-15 | Jacksonville, FL Jun 20-22 Fort Collins, CO Jun 26-28 | Tampa, FL June 29 | Orlando, FL Jul 9 | Doral, FL Jul 10 | Dania Beach, FL Jul 11-13 | Naples, FL Jul 18 | Soboba, CA Jul 25-…
  continue reading
 
Enjoying the content? Let us know your feedback! Today, we’ll answer a pressing question in cybersecurity: Is UTM still relevant in 2025? We’ll trace the origins of UTM, explain why it was created, break down its core features, compare it to newer technologies, and finish by busting a common cybersecurity myth. Before we dive into our main topic, l…
  continue reading
 
Would you rather have an adversary profile you based on your AI chat history or tell your AI chatbot to forget everything it knows about you? That’s one of many questions Adam and Cristian explore in this episode on how adversaries are integrating AI into cyberattacks. These days, it seems AI is everywhere — and that includes the adversary’s toolbo…
  continue reading
 
Steve Koelpin is a seasoned engineer and award-winning data strategist who specializes in observability, logging, and data pipelines at high scale. In his experience, generative AI in observability tools can help reduce the time it takes to resolve IT incidents, but can also foment dependence on a 'black box' tool. There's also the matter of feedin…
  continue reading
 
A jailbreak in New Orleans becomes a sharp metaphor for what happens when creeping dysfunction goes unchecked inside a business. In this episode, Maartje van Krieken unpacks the hidden costs of ignoring early warning signs in organizations. Broken locks. Budget cuts. Communication breakdowns. The kind of slow decay that builds quietly until a major…
  continue reading
 
Summary In this episode of the Blue Security Podcast, hosts Andy and Adam delve into the critical aspects of Windows security, focusing on the recently published Windows 11 security book. They discuss various security features, including hardware security, operating system enhancements, application security, identity protection, privacy features, a…
  continue reading
 
Watch my NEW SPECIAL 'Honorary Jones' 👉 https://youtu.be/G1EbecGkomk TOUR DATES: https://punchup.live/zoltan/tickets 2025 DATES👇 Jun 6-7 | New Brunswick, NJ Jun 13-15 | Jacksonville, FL Jun 20-22 Fort Collins, CO Jun 26-28 | Tampa, FL June 29 | Orlando, FL Jul 9 | Doral, FL Jul 10 | Dania Beach, FL Jul 11-13 | Naples, FL Jul 18 | Soboba, CA Jul 25-…
  continue reading
 
Enjoying the content? Let us know your feedback! In this week's episode, we get into some detailed exploration of an up and coming malware. Looking at it closer, it is one of the most advanced post-exploitation code families shaping the cybersecurity landscape in 2025. Over the time we have together, we’ll unravel what this malware is, how it works…
  continue reading
 
Nancy Gohring is a senior research director at IDC, focused on big picture trends related to enterprise AI adoption, including business, organizational and technology architecture transformation in the context of AI and GenAI. In this wide-ranging interview, Gohring gives the big-picture view of the challenges and changes GenAI represents for enter…
  continue reading
 
Sales problems rarely start loud. They build quietly through messy processes, wishful thinking in the pipeline, the wrong people in key roles, and pricing that no longer makes sense. Maartje van Krieken is joined by Nicholas Loise, the founder of Sales Performance Team, to discuss what really drags sales down, and what it takes to turn things aroun…
  continue reading
 
Today’s adversaries are increasingly operating in the cloud — and Sebastian Walla, Deputy Manager of Emerging Threats at CrowdStrike, is watching them. In this episode, he joins Adam and Cristian to dive into the latest cloud attack techniques and the adversaries behind them. So, who are they? SCATTERED SPIDER and LABYRINTH CHOLLIMA are two of the …
  continue reading
 
Summary In this episode of the Blue Security Podcast, hosts Andy and Adam discuss various Microsoft news topics, including the upcoming end of life for Windows 10 and the options for extended security updates. They also delve into the exciting news of the Windows Subsystem for Linux becoming open source, the discontinuation of password autofill in …
  continue reading
 
Loading …
Copyright 2025 | Privacy Policy | Terms of Service | | Copyright
Listen to this show while you explore
Play