Search a title or topic

Over 20 million podcasts, powered by 

Player FM logo
show episodes
 
Beyond Downtime: The Verito Advantage is the podcast for tax and accounting professionals who refuse to let IT issues interrupt their business. Hosted by the experts behind Verito.com, each episode explores the real risks behind "good enough" technology and how to build a firm that just works. Securely. Join us as we dive into real-world stories, compliance must-knows (like the FTC Safeguards Rule, IRS Pub 4557, WISP), and emerging tech shaping the future of financial practices. From ransomw ...
  continue reading
 
Artwork

1
The Backup Wrap-Up

W. Curtis Preston (Mr. Backup)

icon
Unsubscribe
icon
Unsubscribe
Weekly
 
Formerly known as "Restore it All," The Backup Wrap-up podcast turns unappreciated backup admins into cyber recovery heroes. After a brief analysis of backup-related news, each episode dives deep into one topic that you can use to better protect your organization from data loss, be it from accidents, disasters, or ransomware. The Backup Wrap-up is hosted by W. Curtis Preston (Mr. Backup) and his co-host Prasanna Malaiyandi. Curtis' passion for backups began over 30 years ago when his employe ...
  continue reading
 
Artwork

1
Powered Services Podcast

Dan Tomaszewski of Kaseya

icon
Unsubscribe
icon
Unsubscribe
Monthly
 
Hosted by Dan Tomaszewski, The Powered Services Pro podcast is your high-voltage source for all the cutting-edge trends and electrifying information you need to supercharge your MSP. Plug into vital industry strategies and insights while diving into the hottest topics shaping the channel—whether it's tapping into new markets, leveraging advanced tools, or adopting forward-thinking strategies. Tune in to power up your MSP!
  continue reading
 
Artwork
 
Trilio Insights delves into the dynamic world of data protection and cloud-native technologies. In addition to Trilio experts, we will bring together practitioners, innovators, and visionaries to explore the evolving landscape of data protection, backup, and recovery. From unraveling the complexities of multi-cloud environments to navigating the challenges of data governance, each episode of Trilio Insights serves to share expertise and experience for Product Engineering, It Ops, Dev Ops, Ar ...
  continue reading
 
Artwork

1
Microsoft Mechanics Podcast

Microsoft Mechanics

icon
Unsubscribe
icon
Unsubscribe
Weekly
 
Made for tech enthusiasts and IT professionals. Expanded coverage of your favorite technologies across Microsoft; including Office, Azure, Windows and Data Platforms. We'll even bring you broader topics such as device innovation with Surface, machine learning, and predictive analytics.
  continue reading
 
NBTV: Your Money; Your Data; Your Life. Welcome to the worlds of Digital Privacy, Tech, Scientific Innovation, and Cryptocurrency. NBTV is hosted by Naomi Brockwell: tech journalist, producer for 19-times emmy award-winning journalist John Stossel, and host of Coindesk daily show "The Hash".
  continue reading
 
Felicia King is an internationally recognized CISO and considered to be one of the top network layer security strategists in the U.S. Since launching in 2004 on the WGTD network, her Breakfast Bytes podcast has focused on information security risk management and the issues business leaders need to be aware of to benefit from the challenges others have faced. Learn about the most effective approaches, what you can do to mitigate risk, and how to protect your most valuable assets, your data, a ...
  continue reading
 
Artwork

1
Speaking in Tech

Melissa Gurney Greene

icon
Unsubscribe
icon
Unsubscribe
Monthly
 
Speaking in Tech: "Where Enterprise Tech meets Consumer Tech...". Speaking in Tech is hosted by Peter Smallbone, Josh Atwell and Melissa Gurney Greene. Topics include popular tech, data storage, cloud computing, networking, storage virtualization, server virtualization, backup, disaster recovery and anything else interesting in the tech world. Disclosure: Speaking in tech does not receive support directly or indirectly from vendors or guests. Vendor relationships are disclosed on the podcast.
  continue reading
 
Employing an outside company to handle all payroll-related duties is known as outsourcing payroll services in a business. The main reasons for using payroll management services are to cut costs and free up time when handling payroll-related financial operations. Employing a third party to handle payroll operations frees up a company from having to recruit and educate a sizable in-house payroll team, buy suitable payroll software, and keep up with complicated tax regulations. All business typ ...
  continue reading
 
Welcome to the eFolder Channel Chat. These short, unscripted conversations are real stories from real channel partners moderated by Ted Hulsy, VP Marketing eFolder. eFolder is a leading supplier of cloud data protection, business continuity, cloud file sync solutions, and cloud to cloud backup for MSPs, cloud service providers, system integrators, and VARs. Delivered as wholesale services to the channel, eFolder enables its partners to provide branded data protection and file sync services a ...
  continue reading
 
Artwork

1
The Tech Savvy Lawyer

Michael D.J. Eisenberg

icon
Unsubscribe
icon
Unsubscribe
Monthly+
 
The Tech Savvy Lawyer interviews Judges, Lawyers, and other professionals discussing utilizing technology in the practice of law. It may springboard an idea and help you in your own pursuit of the business we call "practicing law". Please join us for interesting conversations enjoyable at any tech skill level!
  continue reading
 
Artwork

1
Lenovo Support +1(415)547-0376

Lenovo Support +1(415)547-0376

icon
Unsubscribe
icon
Unsubscribe
Daily+
 
Lenovo Customer Care +1(415)547-0376 Support Phone Number Facing any problem while dealing with your Lenovo device? Want to know various services provided by Lenovo? Or Want to access Lenovo Support Service? Click here!! Lenovo Support In today’s world of cut and throw competition, any firm which is ruling the market will keep ruling till their customers were satisfied. And having a satisfied customer is only possible with two things, i.e., Good Quality Product and best Customer Support Serv ...
  continue reading
 
"Hello, We are introduce to our Diamond Scientific Comapny and their product Biogas GEM™5000 With H2S | Portable Methane Detector located in cocoa, florida, in USA. Best technology in the world to measure gas Competitive pricing Service and 35+ years of experience company. The Portable Biogas Analyzer 5000 With H2S is used for The Accurate Gas Monitoring. BIOGAS 5000 Methane Detectors have A Robust, High Quality Design which can be Fitted easily And are extremely Easy To Use In Laboratory, F ...
  continue reading
 
Artwork

1
Think2 Design Studio

think2 design studio

icon
Unsubscribe
icon
Unsubscribe
Monthly
 
Welcome to the news and podcast section of Geelong's friendliest design studio. This is the page we host our podcast on. Make sure you never miss a show by subscribing! (links are all over the page to do so.) What are your thoughts? Like to comment? Or just want to chew the cudd? then drop us a line. Make sure you check out our news for some of the latests developments!
  continue reading
 
Artwork

1
Application Hero Podcast

Brian Henderson & Neil Salamack

icon
Unsubscribe
icon
Unsubscribe
Monthly
 
High tech, IT education made easy for Microsoft DBA’s and application owners. Learn about the latest trends in technology and how to improve your application performance and availability. Topics include virtualization, backup, disaster recovery, SAN, and much more. If you run Microsoft Exchange or Microsoft SQL Server, on VMware or Hyper-V - please subscribe today!
  continue reading
 
We discuss different topics all across the IT landscape; spanning from Data and Information Security to Software Development and Complex Systems. We want to share our knowledge to help you understand IT better and assist in building up our community of tech wizards.
  continue reading
 
Artwork
 
Tech Transformation with Evan Kirstel: A podcast exploring the latest trends and innovations in the tech industry, and how businesses can leverage them for growth, diving into the world of B2B, discussing strategies, trends, and sharing insights from industry leaders! With over three decades in telecom and IT, I've mastered the art of transforming social media into a dynamic platform for audience engagement, community building, and establishing thought leadership. My approach isn't about per ...
  continue reading
 
Artwork

1
House of I.T

House of I.T

icon
Unsubscribe
icon
Unsubscribe
Monthly
 
IT Support Services relied by world industry leaders. Our IT support specialist and technical support engineer can deliver IT solutions to businesses. Our Products - Managed services - Backup and disaster recovery, - Cloud computing - Sofware/system selection, - IT consulting - IT security - IT support - IT upgrades and migrations - Maintenance and monitoring - Network installation and upgrades - Server and desktop virtualisation - Server and network documentation - CargoWise EDI data entry ...
  continue reading
 
Artwork

1
Powering SMB

XenTegra ONE

icon
Unsubscribe
icon
Unsubscribe
Monthly
 
Welcome to "Powering SMB," the ultimate podcast dedicated to empowering small to medium-sized businesses (SMBs) with the knowledge, tools, and inspiration they need to thrive in today's competitive landscape. Hosted by XenTegra One, a leader in SMB-focused technology solutions, this podcast brings you insightful conversations with industry experts, thought leaders, and successful entrepreneurs who have mastered the art of powering SMBs to new heights. In each episode, we dive deep into the c ...
  continue reading
 
Artwork

1
All Things Secured | Online Privacy & Security on Odysee

All Things Secured | Online Privacy & Security

icon
Unsubscribe
icon
Unsubscribe
Monthly+
 
All Things Secured is dedicated to helping you hack-proof your digital life. Get tips and tutorials on how to lock down your social profiles, use a password manager, connect to a virtual private network (VPN), use an identity monitoring service and much, much more. Now more than ever, it's important to keep yourself safe and secure online. We all tend to know this is true, and yet we rarely do anything about it. Now, you can change that. With the Internet of Things creeping into our daily li ...
  continue reading
 
Artwork

1
Hashan Kodituwakku

Hashan Kodituwakku

icon
Unsubscribe
icon
Unsubscribe
Monthly
 
Hashan Kodituwakku is a successful IT professional with over 15 years of progressive experience in IT services and security organizations, multiple degrees and professional development in computer services and information systems, deep knowledge of programming languages and operating systems, and an excellent record of work in infrastructure, software development and security systems
  continue reading
 
Artwork

1
Gartner Events Video Podcast

Gartner Events On Demand

icon
Unsubscribe
icon
Unsubscribe
Monthly
 
This video podcast offers sample trailers of recorded presentations from recent Gartner Events. At Gartner Events, information technology experts provide raw insight, strategy, advice and research in a conference environment. Visit "gartner.com/events" to find an event that's right for you and your role. Gartner, Inc. (NYSE: IT) is the world's leading information technology research and advisory company. We deliver the technology-related insight necessary for our clients to make the right de ...
  continue reading
 
Loading …
show series
 
Dr. Assaf Natanzon, VP and Chief Architect at Eon, joins host Demetrius to reveal how modern backups can go beyond storage and recovery to become a true source of insight. Hear how one company uncovered 20,000+ forgotten snapshots—and massive hidden costs—just by switching to Eon. Learn how AI-powered classification, policy-driven protection, and q…
  continue reading
 
Dr. Assaf Natanzon, VP and Chief Architect at Eon, joins host Demetrius to reveal how modern backups can go beyond storage and recovery to become a true source of insight. Hear how one company uncovered 20,000+ forgotten snapshots—and massive hidden costs—just by switching to Eon. Learn how AI-powered classification, policy-driven protection, and q…
  continue reading
 
In this deep dive episode, we break down the StoneFly DR 365V, an all-in-one backup and disaster recovery solution that addresses data protection, compliance, and scalability. Whether you're a small business or managing enterprise-level data, this episode explores the key features of the DR 365V, including its hardware options, SCVM software, Veeam…
  continue reading
 
https://youtu.be/tzTtF3vOiq0 https://odysee.com/@NaomiBrockwell:4/dont-migrate-from-backup:f Every time we upgrade our devices, we face a choice: migrate everything from the old one or start fresh. While transferring data may seem convenient, it also means hauling along unnecessary ‘digital exhaust’—outdated apps, clutter, and potential privacy ris…
  continue reading
 
Streamline your day with new, user-focused updates to Microsoft 365 Copilot. Jump into work faster with a redesigned layout that puts Chat, Search, and your agents front and center. New Copilot Search lets you yse natural language to find files, emails, and conversations—even if you don’t remember exact keywords—and get instant summaries and previe…
  continue reading
 
Join Felicia King in this eye-opening episode of Breakfast Bytes as she unravels the concept of third-party information security risk management. Felicia highlights the growing debates around software as a service (SaaS) platforms and the complexities they entail, raising poignant questions about security, backups, and risk. Dive deep into the intr…
  continue reading
 
Interested in being a guest? Email us at [email protected] Cyber resilience has become the new frontier in enterprise storage, transforming how organizations protect their most critical data assets. In this illuminating conversation with Eric Herzog, CMO at Infinidat, we explore how modern storage systems have evolved beyond traditional reliabi…
  continue reading
 
Interested in being a guest? Email us at [email protected] Cybersecurity is racing against time. In his compelling keynote, Nikesh Arora reveals that cyber attackers now need less than an hour from targeting to data exfiltration—a timeline that renders traditional security approaches dangerously obsolete. The stakes couldn't be higher. Tech gia…
  continue reading
 
So what does modern work look like today? Richard talks to Karoliina Kettukari about her new role as the Head of Modern Work for a financial services company in Finland, and what modern work has evolved. Karoliina talks about how the pandemic accelerated modern work, such as being able to work anywhere and collaborating with whomever you need to. P…
  continue reading
 
In our debut episode of Beyond Downtime: The Verito Advantage, we take you back to Thomson Reuters SYNERGY 2024, where industry leaders gathered to discuss the future of tax and accounting technology. Recorded live at last year’s event, this conversation is packed with more relevant insights than ever, from preparing your firm for the FTC Safeguard…
  continue reading
 
Stay in control with Microsoft Defender. You can identify which AI apps and cloud services are in use across your environment, evaluate their risk levels, and allow or block them as needed—all from one place. Whether it's a sanctioned tool or a shadow AI app, you're equipped to set the right policies and respond fast to emerging threats. Defender X…
  continue reading
 
Interested in being a guest? Email us at [email protected] The world of identity management is experiencing a revolutionary transformation, and Frontegg stands at the forefront of this change. During this enlightening conversation at RSA Conference, Frontegg CTO Aviad Mizrachi reveals how their solution is empowering SaaS providers with just fi…
  continue reading
 
Telmo Silva, CEO of ClicData, uncovers the hidden truths about the next wave of data privacy regulations—including the EU Data Act, GDPR updates, and the new AI Act. Telmo shares how smaller SaaS companies can prepare without drowning in legal confusion, how AI is becoming a vital tool for compliance, and why simply knowing Python won’t future-proo…
  continue reading
 
Telmo Silva, CEO of ClicData, uncovers the hidden truths about the next wave of data privacy regulations—including the EU Data Act, GDPR updates, and the new AI Act. Telmo shares how smaller SaaS companies can prepare without drowning in legal confusion, how AI is becoming a vital tool for compliance, and why simply knowing Python won’t future-proo…
  continue reading
 
In this episode of The Backup Wrap-up, W. Curtis Preston breaks down the key VeeamON announcements from the VeeamON 2025 conference in San Diego. He highlights Veeam's focus on security and ransomware defense, including their new CrowdStrike integration and data resilience maturity model developed with McKinsey and MIT. Curtis shares his excitement…
  continue reading
 
NosillaCast 20th Anniversary Shirts Macstock Conference Coupon Code CES 2025: Neoplants Natural Air Purifier Philips Hue Light Strips CES 2025: Lotus Wearable Ring for Home Device Control Twelve South PlugBug Travel 120W CES 2025: WYBOT Solar Powered Robotic Pool Cleaner Support the Show Transcript of NC_2025_04_27 Join the Conversation: allison@po…
  continue reading
 
Interested in being a guest? Email us at [email protected] The cybersecurity landscape has fundamentally shifted from prevention to resilience. Gone are the days when organizations could reasonably expect to prevent all breaches. Now, the question isn't if you'll be breached, but when—and how quickly you can recover. Rubrik stands at the forefr…
  continue reading
 
Protect your Microsoft 365 data and stay in control with Microsoft 365 Backup —whether managing email, documents, or sites across Exchange, OneDrive, and SharePoint. Define exactly what you want to back up and restore precisely what you need to with speeds reaching 2TB per hour at scale. With flexible policies, dynamic rules, and recovery points up…
  continue reading
 
Interested in being a guest? Email us at [email protected] Cyber resilience has evolved from an IT concern to a boardroom priority, and for good reason. As Andy Fernandez, Senior Director of Product Marketing at HYCU explains, while organizations have fortified their on-premises defenses, their cloud and SaaS environments remain dangerously exp…
  continue reading
 
Interested in being a guest? Email us at [email protected] Security conferences are notorious for their overwhelming noise – hundreds of vendors competing for attention, media rushing between briefings, and an endless stream of press releases hitting inboxes. How do cybersecurity brands actually break through? My conversation with Ariel from PA…
  continue reading
 
Interested in being a guest? Email us at [email protected] Connectivity isn't just a convenience anymore—it's a baseline expectation that impacts everything from daily operations to property valuation. This eye-opening conversation with Mark from Dense Air reveals why in-building cellular coverage has reached a critical inflection point in comm…
  continue reading
 
Learn the secrets behind how data brokers work in this deep dive conversation between Josh and DeleteMe CEO Rob Shavell. Your data is being collected and sold without your consent and often without your knowledge. How is this possible and what can you do about it? Get 20% off DeleteMe: https://www.joindeleteme.com/allthingssecured ▶ My Experience U…
  continue reading
 
What can agentic AI do for you? Richard talks to Tim Warner about his work utilizing next generation agentic AI technologies to help with sysadmin tasks. Tim talks about the early lead that Cursor AI took with AI agents capable of writing and executing scripts on your behalf - as opposed to just creating code you can cut-and-paste. Today, GitHub Co…
  continue reading
 
Mark Cusack, CTO of Yellowbrick Data unpacks the evolving data protection landscape. We explore the shift from cloud-first to cloud-optimized strategies, the power of private LLMs, the resurgence of data sovereignty, and how hybrid cloud is shaping enterprise resilience. Mark breaks down the critical role of Kubernetes, data governance, and the gro…
  continue reading
 
Mark Cusack, CTO of Yellowbrick Data unpacks the evolving data protection landscape. We explore the shift from cloud-first to cloud-optimized strategies, the power of private LLMs, the resurgence of data sovereignty, and how hybrid cloud is shaping enterprise resilience. Mark breaks down the critical role of Kubernetes, data governance, and the gro…
  continue reading
 
Use Microsoft Purview and Microsoft 365 Copilot together to build a secure, enterprise-ready foundation for generative AI. Apply existing data protection and compliance controls, gain visibility into AI usage, and reduce risk from oversharing or insider threats. Classify, restrict, and monitor sensitive data used in Copilot interactions. Investigat…
  continue reading
 
DOGE and GSA recently made headlines with a tweet claiming $1 million annual savings by converting 14,000 magnetic tapes to "permanent modern digital records." In this episode, W. Curtis Preston and Prasanna Malaiyandi analyze whether this claim is possible – although they cannot actually validate it due to lack of information. They discuss that DO…
  continue reading
 
Macstock Conference Coupon Code CES 2025: Brisk It AI-Powered BBQ Grill Twelve South Book Arc and Book Arc Flex Kagi CES 2025: Wireless Power Consortium Ki Standard Twelve South Curve Riser CES 2025: Sign-Speak Sign Language AI Support the Show Security Bits Transcript of NC_2025_04_20 Join the Conversation: [email protected] podfeet.com/slack Su…
  continue reading
 
Interested in being a guest? Email us at [email protected] The digital communications landscape has exploded, creating both massive challenges and exciting opportunities for financial institutions. What happens when you take the communications data you're already required to capture and apply advanced AI to extract genuine business value? Jeff …
  continue reading
 
https://youtu.be/11P6DdI8HOo https://odysee.com/@NaomiBrockwell:4/Extensions:6 You installed them to make life easier. But some browser extensions are doing a lot more than blocking ads or autofilling passwords. They’re reading every keystroke. Tracking every site. Harvesting your data—and in some cases, handing it over to foreign governments or dr…
  continue reading
 
Interested in being a guest? Email us at [email protected] Financial data is money—yet most enterprises struggle to ensure its integrity across the numerous systems they use. Every CFO faces the challenge of validating transactions that flow through billing, ERP, payroll, spend management, and other platforms, often relying on manual processes …
  continue reading
 
When it comes to protecting your data, not all backup strategies are created equal. In this episode, we dig deep into the evolution of backup best practices — starting with the tried-and-true 3-2-1 method, moving to the more resilient 3-2-1-1-0, and finally unpacking the enterprise-grade 4-3-2 model. We’ll explore why each strategy was created, wha…
  continue reading
 
Interested in being a guest? Email us at [email protected] When ose Herrera and his co-founders first surveyed the customer support landscape, they noticed something troubling: outsourced partners weren't prioritizing employees or truly embodying their clients' brand values. This gap between what brands needed and what traditional BPOs offered …
  continue reading
 
Take control of your workday—summarize long emails instantly, turn meeting transcripts into actionable plans, and build strategic documents in seconds using your own data with Microsoft 365 Copilot. Instead of chasing down context, ask natural prompts and get clear, detailed results complete with tone-matched writing, visual recaps, and real-time c…
  continue reading
 
In this episode, we break down four of the most talked-about cybersecurity technologies—EDR (Endpoint Detection and Response), MDR (Managed Detection and Response), XDR (Extended Detection and Response), and NDR (Network Detection and Response). You’ll learn: How EDR tools provide real-time endpoint visibility and behavioral analytics to detect mal…
  continue reading
 
Are some of your team members starting to hate PowerShell? Richard talks to Barbara Forbes about her experiences with teams frustrated by PowerShell. Barbara talks about overcomplicating PowerShell scripts—the kind the most senior folks can create but no one else can maintain. Eventually, nobody will want to touch those scripts. Then there is the q…
  continue reading
 
Loading …
Listen to this show while you explore
Play