Cybersecurity guru Steve Gibson joins Leo Laporte every Tuesday. Steve and Leo break down the latest cybercrime and hacking stories, offering a deep understanding of what's happening and how to protect yourself and your business. Security Now is a must listen for security professionals every week. Records live every Tuesday at 4:30pm Eastern / 1:30pm Pacific / 21:30 UTC.
…
continue reading
Cyber Security Certifications Podcasts
The DailyCyber Podcast and New Live Stream every Wednesday at 1:00 pm EDT is focused on providing the truth into the Cyber Security industry. Discussions on Cyber Security trends, technologies, solutions, news, education, certifications, careers and interviews with leading Cyber Security experts on various Cyber Security topics. Subscribe today to make sure you don't miss an episode. IMPORTANT: The views, information and/or opinions expressed on this podcast/stream are solely those of Brando ...
…
continue reading
Cybersecurity guru Steve Gibson joins Leo Laporte every Tuesday. Steve and Leo break down the latest cybercrime and hacking stories, offering a deep understanding of what's happening and how to protect yourself and your business. Security Now is a must listen for security professionals every week. Records live every Tuesday at 4:30pm Eastern / 1:30pm Pacific / 21:30 UTC.
…
continue reading
Mastering Cybersecurity is your narrated audio guide to the essential building blocks of digital protection. Each 10–15 minute episode turns complex security concepts into clear, practical lessons you can apply right away—no jargon, no fluff. From passwords and phishing to encryption and network defense, every topic is designed to strengthen your understanding and confidence online. Whether you’re new to cybersecurity or refreshing your knowledge, this series makes learning simple, smart, an ...
…
continue reading
GDPR Now! is brought to you by Data Protection 4 Business and focuses on Data Protection regulations and all issues related to data security and privacy. Our goal is to discuss important topics which help businesses comply with data protection regulations while protecting their business interests in a practical and pragmatic way. Our episodes provide insightful information for business leaders and privacy professionals alike. The hosts are joined by a range of specialists who discuss the lat ...
…
continue reading
Learn how to break into cybersecurity, build new skills and move up the career ladder. Each week on the Cyber Work Podcast, host Chris Sienko sits down with thought leaders from Carbon Black, IBM, CompTIA and others to discuss the latest cybersecurity workforce trends.
…
continue reading
The Bare Metal Cyber CISM Audio Course is your comprehensive, exam-focused audio companion for mastering the Certified Information Security Manager (CISM) certification. Designed to guide aspiring security leaders through all four domains of the CISM exam, this prepcast translates complex risk, governance, and incident response concepts into clear, structured, and easy-to-follow episodes. Whether you're transitioning from a technical role or already managing security programs, the series off ...
…
continue reading
Every single podcast we publish in one convenient feed. This is a LOT of content. Hours of audio each week.
…
continue reading
THEOS CyberNova is a cutting-edge podcast that explores the dynamic world of cybersecurity, hosted by THEOS Cyber CEO Paul Jackson. Each episode delves into the latest trends, challenges, and innovations shaping the cybersecurity landscape, featuring insights from industry experts, thought leaders, and technologists. Paul brings his expertise and passion for cyber security to engaging discussions on topics ranging from emerging threats and data privacy to the future of AI in cyber defense. W ...
…
continue reading
Overcoming impostor syndrome - Practical tips for combating feelings of not belonging in the cyber workplace provided by distinguished guests within the cyber security field
…
continue reading
What is Cybersecurity? What are the available roles? How do you get started? What industry certifications should I pursue? Dr. Jeff Colburn has 30 years of experience in the Information Technology industry. For the past 11 years, he has been teaching his students how to start careers in this field within 6 months without a college degree and without any experience.
…
continue reading
Phillip Wylie interviews cybersecurity industry experts on offensive security and techniques around penetration testing and red teaming.
…
continue reading
Strictly Cyber is your go-to podcast for cutting through the jargon and making cyber security simple, practical and relevant. Whether you’re a business owner, manager or just someone looking to understand how to protect your digital world, we’ve got you covered. Each episode breaks down key cyber security concepts, real-world threats and practical solutions in a clear, approachable way. From certifications like Cyber Essentials to the latest in cyber hygiene and threat prevention, Strictly C ...
…
continue reading
Certified - Security+ 701 is your completely free audio companion for mastering the CompTIA Security+ SY0-701 certification exam. Developed by BareMetalCyber.com, this immersive Audio Course transforms every domain of the official exam objectives into clear, practical, and exam-ready lessons you can learn anywhere—whether commuting, exercising, or studying at home. Each episode delivers focused explanations, real-world examples, and proven study strategies designed to build confidence and he ...
…
continue reading
**Framework** is your go-to podcast for mastering the **NIST Cybersecurity Framework (CSF)**—the foundational model for building and improving organizational security programs. This series breaks down every function, category, and subcategory within the CSF, helping professionals, educators, and leaders understand how to apply the framework in real-world environments. Each episode delivers clear, practical explanations that connect framework concepts to daily security operations, governance, ...
…
continue reading
Cyber security focused discussions geared towards students, early professionals and individuals moving into the cyber security profession. I use my ~30 years' experience in industry and provide examples, stories, suggestions and answer questions. This podcast is designed to help listeners learn, grown and advance in the cyber security profession. Recognized by Million Podcasts in their top 100 Cyber Security Podcasts.
…
continue reading
The Bare Metal Cyber CCISO Audio Course is your complete, executive-level training companion for mastering the Certified Chief Information Security Officer (CCISO) certification. Built for experienced cybersecurity professionals and strategic leaders, this Audio Course delivers over seventy focused episodes covering every domain, concept, and competency area tested on the official EC-Council exam. From governance, risk, and compliance to strategic planning, vendor oversight, and technical co ...
…
continue reading
The CYSA+ Audio Course is your complete, exam-focused companion for mastering the CompTIA Cybersecurity Analyst (CYSA+) certification. Designed for learners who are always on the move, this Audio Course transforms the official exam objectives into clear, structured, and easy-to-follow lessons. Each episode helps you understand, retain, and apply key cybersecurity analysis skills—covering threat detection, vulnerability management, security architecture, and incident response. Whether you’re ...
…
continue reading
93% of organizations experienced an identity-related breach within the last year. What were they missing? How could they have avoided it? Welcome to "Smells Like Identity Hygiene," the podcast for IT professionals, cybersecurity enthusiasts and anyone looking for a better way to protect their organization's most critical assets from risk. - Stay up-to-date with cybersecurity trends, news and industry best practices - Reduce cyber insurance costs, maintain compliance and prevent revenue loss ...
…
continue reading
The A+ Audio Course is your full-spectrum audio study guide for the CompTIA A+ certification (Core 1 and Core 2). Whether you're brand new to IT or brushing up before exam day, this Audio Course breaks down every topic in the official exam objectives into clear, structured, and accessible episodes. Each lesson focuses on what matters most, helping you understand, retain, and apply essential IT concepts—from hardware and networking to operating systems, security, troubleshooting, and professi ...
…
continue reading
Welcome to The Bare Metal Cyber CISSP Audio Course—your comprehensive companion for mastering the Certified Information Systems Security Professional (CISSP) certification. Built for serious cybersecurity professionals and aspiring leaders alike, this Audio Course transforms the eight domains of the CISSP Common Body of Knowledge into clear, structured, and engaging lessons you can learn anytime, anywhere. Each episode blends real-world context, expert insight, and exam-focused explanations ...
…
continue reading
Secure Ninja TV is a weekly source of updates, insights, opinions and overviews of the Information Security and IT industry. Through interviews with industry leaders and cutting-edge IT instructors, Secure Ninja TV will empower you to attack network threats and security vulnerabilities with the most valuable tool at your disposal...knowledge.
…
continue reading
At Tanium, we live, dream, and debate cybersecurity 24/7. Now, with TANIUM PODCAST, you’re in on the conversation. Go behind the scenes with our team leaders, partners, and customers in the U.S., UK, Europe, Asia, and elsewhere around the globe. We’ll discuss the latest products, perspectives, and success stories at Tanium, an innovator in security software and the first to make autonomous endpoint management (AEM) a reality.
…
continue reading
Security certificates are a great way to show you know your stuff, but now what? You want to get into the field, and it seems impossible at times to even get to the prescreening phase of an interview when you've never had a security role you're chasing. In this podcast, local professionals in the industry spill all to the tips and shortcuts they've used in securing their roles. https://isc2la.org/joinus The ISC2 Los Angeles chapter wants to see you succeed as the security professional you we ...
…
continue reading
1
NB552: Nokia Switches On AI Ops; IBM Seeks a Quantum of Advantage
44:58
44:58
Play later
Play later
Lists
Like
Liked
44:58Take a Network Break! Red Hat Samba server has a remote command execution vulnerability, and we cover some follow-up on fusion as a viable energy source (still a work in progress). On the news front, we search for signs in SoftBank’s sale of its Nividia stake, Mplify debuts a new certificate on carrier Ethernet for... Read more »…
…
continue reading
1
Tech Bytes: Monitoring AI Agents and MCP Servers with Cisco ThousandEyes (Sponsored)
17:38
17:38
Play later
Play later
Lists
Like
Liked
17:38If you’re building, testing, or using AI agents and services, how can you get network visibility into, and ensure performance of, these tools? On today’s Tech Bytes podcast, we talk with sponsor Cisco ThousandEyes about how to monitor and measure performance of AI agents, AI models and services, and Model Context Protocol servers. We’ll get... Read…
…
continue reading
1
HN805: The Past, Present, and Future of NANOG
47:46
47:46
Play later
Play later
Lists
Like
Liked
47:46NANOG, or the North American Network Operation Group, is an organization committed to the continuing advancement of an open, secure, and robust Internet. At the NANOG Conference 95 in late October 2025, Ethan Banks chatted with Steve Feldman, a member of NANOG’s Board of Directors. Steve has been involved with NANOG since the very first... Read mor…
…
continue reading
1
LIU004: From Fast Food to Leading Operations at an ISP
1:02:07
1:02:07
Play later
Play later
Lists
Like
Liked
1:02:07Think you need a degree or a ton of certificates to succeed in tech? Think again. Matthew Oborne joins our hosts Alexis Bertholf and Kevin Nanns to discuss how he went from working fast food to leading operations at an ISP. Your starting point doesn’t define your ceiling; resilience, adaptability, and a willingness to learn... Read more »…
…
continue reading
1
TCG062: The Tech Expertise Deficit with Russ White
48:01
48:01
Play later
Play later
Lists
Like
Liked
48:01Today we delve into the tech expertise deficit and why technical depth and decades of doing the work matter more than social media followers and content creation hype. Our guest is Russ White, engineer, author, teacher, and certification developer. We begin with current events in AI, and then investigate the differences between career and influence…
…
continue reading
1
NAN106: Unimus: Network Automation By and For Network Engineers (Sponsored)
44:49
44:49
Play later
Play later
Lists
Like
Liked
44:49Tomas Kirnak, CEO of Unimus, joins Eric Chou in this sponsored episode to introduce Unimus, an on-premise network configuration management system built by network engineers to solve real-world problems. In this deep dive they discuss Unimus’ proprietary “Behavioral Tree” for automatic device discovery, the platform’s vendor support, the 70/30 rule,…
…
continue reading
1
1. Data Security. Getting to Grips with Strategy.
30:01
30:01
Play later
Play later
Lists
Like
Liked
30:01Welcome!...to 'Getting to Grips with Data Security' our podcast for anyone interested in learning more about how to 'beat the hackers' using the best types of information security controls. This new 5 part series covers all aspects of data security for businesses where we discuss: Ep 1: Strategy; Ep 2: Cloud Controls; Ep 3: People Risk; Ep 4: Using…
…
continue reading
1
SN 1051: Amazon sues Perplexity - Nevada's Ransomware Comeback
2:44:03
2:44:03
Play later
Play later
Lists
Like
Liked
2:44:03Amazon is taking Perplexity AI to court over its agentic browser that shops on your behalf, raising urgent questions about who controls your online buying experience when bots do the heavy lifting. FFmpeg teaching assembly language for performance. The state of Nevada recovers after not paying ransom. A "rounding error" nets a clever attacker $128 …
…
continue reading
1
SN 1051: Amazon sues Perplexity - Nevada's Ransomware Comeback
2:58:34
2:58:34
Play later
Play later
Lists
Like
Liked
2:58:34Amazon is taking Perplexity AI to court over its agentic browser that shops on your behalf, raising urgent questions about who controls your online buying experience when bots do the heavy lifting. FFmpeg teaching assembly language for performance. The state of Nevada recovers after not paying ransom. A "rounding error" nets a clever attacker $128 …
…
continue reading
1
HS116: Nth-Party Risk May Put You on the (Block) Chain Gang
32:57
32:57
Play later
Play later
Lists
Like
Liked
32:57The evolution of the modern, Internet-driven economy has created the conditions for essentially unbounded Nth-party risks (that is, risks from your suppliers, and risks from your suppliers’ suppliers, and risks from your suppliers’ suppliers’ suppliers, ad infinitum). Nth party risks exist in public clouds, SaaS, software and hardware supply chains…
…
continue reading
1
OT and ICS Pentesting and Security with Mike Holcomb
32:44
32:44
Play later
Play later
Lists
Like
Liked
32:44In this episode of Simply Offensive, Phillip Wylie interviews Mike Holcomb, an expert in Operational Technology (OT) and Industrial Control Systems (ICS) cybersecurity. Mike discusses the importance of OT security, the types of attacks that have targeted critical infrastructure, and the evolving landscape of cybersecurity threats. He shares insight…
…
continue reading
1
PP086: Using Let’s Encrypt and the ACME Protocol for Domain Validation Certificates
44:39
44:39
Play later
Play later
Lists
Like
Liked
44:39Certificates are the socks of IT—everyone needs them, and you always lose track of a few. On today’s show we dive into the ACME protocol, an IETF standard to help automate how a domain owner gets a domain validation certificate from a Certificate Authority (CA). Our guest, Ed Harmoush, a former network engineer with AWS... Read more »…
…
continue reading
The Cyber Insights podcast breaks down NIST Cybersecurity Framework 2.0 in plain English so first-time learners and busy leaders can act with confidence. In this episode, we translate the big shifts—especially the new Govern function—into everyday decisions: who owns risk, how to map what the business relies on, and how to turn outcomes into habits…
…
continue reading
1
NB551: Cisco Adds AI to Tech Support; Cryptography Hits a Post-Quantum Milestone
28:59
28:59
Play later
Play later
Lists
Like
Liked
28:59Take a Network Break! We start with a critical vulnerability in Cisco’s Unified Contact Center Express. On the news front it’s a Cisco triple play: the company brings AI to professional services and tech support with Cisco IQ, debuts converged infrastructure for the AI edge, and launches a new cert geared for running AI data... Read more »…
…
continue reading
1
Ask Me Anything: vCISO Strategy, IR, and Cyber Leadership | DailyCyber 279 ~ Watch Now ~
1:00:04
1:00:04
Play later
Play later
Lists
Like
Liked
1:00:04Ask Me Anything: vCISO Strategy, IR, and Cyber Leadership | DailyCyber 279 ~ Watch Now ~ In this AMA edition of DailyCyber, we go deep on what’s actually happening in cybersecurity leadership today. From emotional regulation in the SOC to unapproved AI tools in the workplace, this episode unpacks the real conversations CISOs and vCISOs are having b…
…
continue reading
1
HN804: How Prisma SASE Builds on Public Clouds for Scale, Resiliency (Sponsored)
56:07
56:07
Play later
Play later
Lists
Like
Liked
56:07How do you architect a Secure Access Service Edge (SASE) to provide critical security services to millions of endpoints distributed across the planet? How do you build such a service for scale, performance, and resiliency? One option is to build your own PoPs or use colocation facilities, run your own infrastructure stack, and connect everything...…
…
continue reading
1
TNO049: Automated Network Testing and Validation
52:50
52:50
Play later
Play later
Lists
Like
Liked
52:50What does network testing and validation really mean? How do testing and validation fit within an automation workflow? Is it possible to run meaningful tests without coding skills? Dan Wade from BlueAlly answers these questions and offers practical insights into building trust in automation through test environments, using AI for ideation and probl…
…
continue reading
Today the IPv6 Buzz crew provides updates on the latest in IPv6 standards, RFCs, and best practices. They break down the recent discussions around RFC 6052, explore the options for RFC 8215, and share Nick’s spin on the now defunct testipv6.com site. Episode Links: RFC 6052 RFC 8215 RFC 6598 IPv6.army…
…
continue reading
MACsec is a protocol for encrypting Ethernet frames on a local (though not always local) network. Ethan Banks and Holly Metlitzky have an ELI5 (explain like I’m 5) discussion as to what exactly is MACsec and how it differs from IPsec. They talk about when and whether you need to implement MACsec with all the... Read more »…
…
continue reading
1
D2DO286: Scaling Kubernetes Across Clouds – Identity, DNS, and Security
40:39
40:39
Play later
Play later
Lists
Like
Liked
40:39If you think managing Kubernetes clusters is hard, what about managing Kubernetes clusters across three different public clouds? We dive into the challenges that arises from running multi-cloud Kubernetes workloads. These challenges include workload identity, DNS query resolutions, and security. Here to help us navigate this complexity and offer po…
…
continue reading
1
PP085: News Roundup – Naked Satellite Signals, Account Recovery Buddies, Busting Ghost Networks
52:28
52:28
Play later
Play later
Lists
Like
Liked
52:28Did you know college students are snooping on satellite transmissions? On today’s news roundup we discuss new research in which university investigators use off-the-shelf equipment to intercept traffic from geostationary satellites and discover that a lot of it is unencrypted. We also dig into the credential hygiene lessons we can learn from a corp…
…
continue reading
1
NAN105: Campus Network Automation, Powered by Cisco Agentic Workflows (Sponsored)
44:30
44:30
Play later
Play later
Lists
Like
Liked
44:30Cisco Workflows is a new platform that makes network automation easier, smarter, and safer. On today’s episode, sponsored by Cisco, we get introduced to Cisco Workflows by Stephen Orr, Distinguished Solutions Engineer; and Reid Butler, Director of Product Management. They break down how Workflows helps you ditch repetitive tasks, roll out changes f…
…
continue reading
1
SN 1050: Here Come the AI Browsers - Scareware Blockers
3:20:21
3:20:21
Play later
Play later
Lists
Like
Liked
3:20:21AI-powered web browsers are hitting the scene fast, but Steve and Leo unpack why these smart assistants could usher in an era of security chaos most users aren't ready for. Brace yourself for the wild risks, real-world scams, and the privacy questions no one else is asking. Secret radios discovered in Chinese-made busses. Edge & Chrome introduce LL…
…
continue reading
1
SN 1050: Here Come the AI Browsers - Scareware Blockers
3:20:21
3:20:21
Play later
Play later
Lists
Like
Liked
3:20:21AI-powered web browsers are hitting the scene fast, but Steve and Leo unpack why these smart assistants could usher in an era of security chaos most users aren't ready for. Brace yourself for the wild risks, real-world scams, and the privacy questions no one else is asking. Secret radios discovered in Chinese-made busses. Edge & Chrome introduce LL…
…
continue reading
nOversight is a Wi-Fi analysis app from Numerous Networks for iOS and Mac iOS that helps both end users and professionals do a better job of understanding how their Wi-Fi is running and how it’s working on their individual devices. Today we talk to Ben Toner, the creator of nOversight to give us the details... Read more »…
…
continue reading
In this episode of Simply Offensive, Phillip Wylie interviews Danny Jenkins, CEO and founder of ThreatLocker. Danny shares his unique journey from corporate IT to ethical hacking, discussing his innovative approach to penetration testing and cybersecurity. He emphasizes the importance of understanding technology and security configurations, the rol…
…
continue reading
1
NB550: A Cornucopia of AI Switches; DNS Strikes Again
29:38
29:38
Play later
Play later
Lists
Like
Liked
29:38Take a Network Break! We start with some educational content on Small Modular Nuclear Reactors, and sound the alarm about a sandbox escape affecting the Firefox browser. On the news front, a DNS issue triggers a major Azure outage that affected numerous services and caused problems around the globe, Palo Alto Networks announces enhancements to... R…
…
continue reading
1
TNO048: Ops to Orchestrated: An Architect’s Automation Journey
42:09
42:09
Play later
Play later
Lists
Like
Liked
42:09On today’s show, sponsored by Itential, we talk about automation in the real world. Guest Jesse Ford is an automation architect at Itential. We talk about his career journey, how he got into network automation, how he decides which is the best tool for a job, and why tool diversity isn’t the same as chaos.... Read more »…
…
continue reading
On today’s episode, we take a break from one’s and zero’s for a discussion about starting a networking meetup. Our guest is Steinn “Steinzi” Örvar, who recently founded the ISNOG, a network operators’ group in Iceland. We quiz Steinzi about what worked and what didn’t. We also pick his brain for the nitty-gritty details about... Read more »…
…
continue reading
1
LIU003: A Chat With ‘The Cloud Therapist’
44:24
44:24
Play later
Play later
Lists
Like
Liked
44:24Your background and experiences outside of tech can become a significant factor in your tech career. Guest Chris Williams is a good example; he talks about how his undergraduate and graduate studies in psychology influenced his work as a Developer Relations Manger at Hashicorp. Hosts Alexis Bertholf and Kevin Nanns chat with him about how... Read m…
…
continue reading
1
PP084: Inside the CVE Process With Cisco (Sponsored)
44:50
44:50
Play later
Play later
Lists
Like
Liked
44:50CVEs, or Common Vulnerabilities and Exposures, are such a routine aspect of tech that most IT pros probably take them for granted. But like many things we take for granted, the CVE process takes some serious organizational infrastructure to function. On today’s Packet Protector, sponsored by Cisco, we talk about the organizations and processes that…
…
continue reading
Join William Collins and Evyonne Sharp as they catch up on all things AI. They discuss the AI bubble and how it relates to venture capital, stock, and company evaluations. They talk about the AI experience for the average person, the adoption rate of AI tools, and how the AI infrastructure buildout might affect the... Read more »…
…
continue reading
1
NAN104: The Art and Science of Writing a Network Automation Book
57:53
57:53
Play later
Play later
Lists
Like
Liked
57:53Host Eric Chou talks with Jeff Kala, co-author of the newly released “Network Automation Cookbook 2nd Edition,” to discuss his book and the experiences that led him from networking to network automation author. They discuss Jeff’s learning style and why it was helpful when working on his book. Lastly, they dig into Jeff’s predictions on... Read mor…
…
continue reading
1
SN 1049: DNS Cache Poisoning Returns - Ransomware Payments Plummet
2:55:51
2:55:51
Play later
Play later
Lists
Like
Liked
2:55:51Just when you thought DNS cache poisoning was a thing of the past, Steve and Leo reveal why this 17-year-old bug is making a dramatic comeback—and why most DNS resolvers still can't manage high-quality random numbers after all this time. The unsuspected sucking power of a Linux-based robot vacuum. Russia to follow China's vulnerability reporting la…
…
continue reading
1
SN 1049: DNS Cache Poisoning Returns - Ransomware Payments Plummet
2:55:52
2:55:52
Play later
Play later
Lists
Like
Liked
2:55:52Just when you thought DNS cache poisoning was a thing of the past, Steve and Leo reveal why this 17-year-old bug is making a dramatic comeback—and why most DNS resolvers still can't manage high-quality random numbers after all this time. The unsuspected sucking power of a Linux-based robot vacuum. Russia to follow China's vulnerability reporting la…
…
continue reading
1
HS115: Cyber-Risk Assessment and Cybersecurity Budgeting: You’re (Probably) Doing It Wrong
36:15
36:15
Play later
Play later
Lists
Like
Liked
36:15To understand how much to spend on cybersecurity, you have to accurately assess or quantify your risks. Too many people still peg their cybersecurity spend to their IT budget; that is, they’ll look at what they’re spending on IT, and then allocate a percentage of that to cybersecurity. That may have made some sense when... Read more »…
…
continue reading
1
Unlocking Advanced Penetration Testing with Greg Hatcher & John Stigerwalt
28:56
28:56
Play later
Play later
Lists
Like
Liked
28:56In this episode of Simply Offensive, Phillip Wylie is joined by Greg Hatcher and John Stigerwalt from White Knight Labs. They discuss their backgrounds in cybersecurity, the importance of advanced penetration testing, and the unique offerings of their training courses. The conversation covers various aspects of cybersecurity, including ransomware s…
…
continue reading
1
NB549: Startups Take on Switch, ASIC Incumbents; Google Claims Quantum Advantage
49:32
49:32
Play later
Play later
Lists
Like
Liked
49:32Take a Network Break! Companies spying on…I mean, monitoring…their employees via software called WorkExaminer should be aware of a login bypass that needs to be locked down. On the news front, we opine on whether it’s worth trying to design your way around AWS outages, and speculate on the prospects of a new Ethernet switch... Read more »…
…
continue reading
1
Tech Bytes: Why Equinix Should Be Part of Your AI Network Strategy (Sponsored)
18:40
18:40
Play later
Play later
Lists
Like
Liked
18:40AI infrastructure conversations tend to be dominated by GPUs, data center buildouts, and power and water consumption. But networks also play a crucial role, whether to support huge file transfers to a compute cluster, stream telemetry from edge locations to feed AI pipelines, or provide high-speed, low latency connectivity for AI agents. On today’s…
…
continue reading
1
Ask Me Anything: vCISO Strategy, IR, and Cyber Leadership | DailyCyber 278 ~ Watch Now ~
53:06
53:06
Play later
Play later
Lists
Like
Liked
53:06In this AMA edition of DailyCyber, I explore the challenges and opportunities defining the next wave of cybersecurity leadership. From AI threats to emotional intelligence, this session breaks down what’s shaping 2025’s security landscape — and how to stay ahead. 🔥 What We’ll Cover: 1️⃣ AI-Driven Threats & Deepfakes – How attackers are using AI to …
…
continue reading
1
HN802: Unifying Networking and Security with Fortinet SASE: Architecture, Reality, and Lessons Learned (Sponsored)
58:39
58:39
Play later
Play later
Lists
Like
Liked
58:39The architecture and tech stack of a Secure Access Service Edge (SASE) solution will influence how the service performs, the robustness of its security controls, and the complexity of its operations. Sponsor Fortinet joins Heavy Networking to make the case that a unified offering, which integrates SD-WAN and SSE from a single vendor, provides a... …
…
continue reading