Search a title or topic

Over 20 million podcasts, powered by 

Player FM logo

F5 Project Podcasts

show episodes
 
Artwork

1
F5 Radio

F5 Radio

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
After his fifth felony, Adam Martin thought, “There must be more to life than this.” That was the beginning of pursuing change in his own life. Because of his shared experiences, he became a resource for other individuals coming out of jail by providing personalized support to incarcerated individuals to deter repeat offenses. F5 Project Recovery podcast Kirsten, Ricky and Adam launch a new radio show wrapped around recovery, mental health, politics, much much more.
  continue reading
 
Artwork

1
Security Weekly Podcast Network (Audio)

Security Weekly Productions

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Daily
 
Welcome to the Security Weekly Podcast Network, your all-in-one source for the latest in cybersecurity! This feed features a diverse lineup of shows, including Application Security Weekly, Business Security Weekly, Paul's Security Weekly, Enterprise Security Weekly, and Security Weekly News. Whether you're a cybersecurity professional, business leader, or tech enthusiast, we cover all angles of the cybersecurity landscape. Tune in for in-depth panel discussions, expert guest interviews, and ...
  continue reading
 
In 10 minutes daily, The Business of Tech delivers the latest IT services and MSP-focused news and commentary. Curated to stories that matter with commentary answering 'Why Do We Care?', channel veteran Dave Sobel brings you up to speed and provides resources to go deeper. With insights and analysis, this focused podcast focuses on the knowledge you need to be effective, profitable, and relevant.
  continue reading
 
Loading …
show series
 
For OT systems, uptime is paramount. That's a hard rule that makes maintaining, upgrading, and securing them a complex struggle. Tomas "Data" Owens and James Cotter discuss how Tennessee is tackling the organizational and technical challenges that come with hardening OT systems across the state. Those challenges range from old technology (like RS-2…
  continue reading
 
Small businesses in the U.S. are facing rising costs and job losses, with 70% of owners citing inflation as their primary concern, according to a recent Bank of America study. Despite this, 75% of small business owners remain optimistic about revenue growth in the coming year. However, the disparity in employment trends is stark, as small firms she…
  continue reading
 
Live from InfoSec World 2025, this episode of Enterprise Security Weekly features six in-depth conversations with leading voices in cybersecurity, exploring the tools, strategies, and leadership approaches driving the future of enterprise defense. From configuration management and AI-generated threats to emerging frameworks and national standards, …
  continue reading
 
The episode discusses the increasing complexity of endpoint security, driven by the rapid proliferation of devices due to remote work, BYOD policies, and the rise of shadow IT. Data indicates that shadow IT has surged by 59% since remote work became mainstream, with nearly half of cyberattacks linked to these unauthorized applications. Managed Serv…
  continue reading
 
Are you walking around with a phone in your hand? Probably, are ready for the day when it gets grabbed and disappears. Aaran, Doug, and Josh talk about phone strategies on this episode of the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-533…
  continue reading
 
Tune in for some hands-on tips on how to use Claude code to create some amazing and not-so-amazing software. Paul will walk you through what worked and what didn't as he 100% vibe-coded a Python Flask application. The discussion continues with the crew discussing the future of vibe coding and how AI may better help in creating and securing software…
  continue reading
 
A German court has ruled that OpenAI's training of its GPT-4 and GPT-4.0 models involved copyright infringement, requiring the company to disclose the frequency of usage of specific song lyrics in its training data. This ruling, initiated by GEMA, a German copyright collective, has significant implications for copyright holders, particularly in the…
  continue reading
 
The Security Weekly 25 index is back near all time highs as the NASDAQ hits another record high. Funding and acquisitions have shifted to AI as the security industry continues to evolve. We also had a new IPO, Netskope. They will replace CyberArk once the Palo Alto Networks acquisition closes, allowing the index to survive another public company ac…
  continue reading
 
The United States, United Kingdom, and Australia have imposed sanctions on the Russian hosting provider MediaLand due to its facilitation of ransomware operations. MediaLand has been linked to various cybercrime activities, including support for groups like LockBit and BlackSuit, and has been identified as a provider for cybercrime marketplaces. Th…
  continue reading
 
What are your favorite resources for secure code? Co-hosts John Kinsella and Kalyani Pawar talk about the reality of bringing security into a business. We talk about the role of the OWASP Top 10 and the OWASP ASVS in crafting security programs. And balance that with a discussion in what's the best use of everyone's time -- developers and appsec fol…
  continue reading
 
Cloud managed services are experiencing rapid growth, with the market projected to expand from approximately $50.62 billion in 2025 to $120 billion by 2035, reflecting a compound annual growth rate of 8.16%. This growth is driven by organizations across various sectors, including finance and healthcare, seeking to enhance their cloud operations and…
  continue reading
 
Interview with Ravid Circus Ravid will discuss why security and engineering misalignment is the biggest barrier to fast, effective remediation, using data from Seemplicity’s 2025 Remediation Operations Report. This is costing some teams days of unnecessary exposure, which can lead to major security implications for organizations. Segment Resources:…
  continue reading
 
The discussion centers on the book "Rewiring Democracy," authored by Bruce Schneier and Nathan E. Sanders, which explores the implications of artificial intelligence (AI) on governance, power distribution, and democratic principles. The authors highlight the risks associated with AI, particularly the concentration of power among a few corporations,…
  continue reading
 
MSP events are experiencing a notable shift, with a growing preference for smaller, localized gatherings over traditional mega-conferences. Jessica Davis, Principal Analyst at Omdia, highlights that this trend is driven by factors such as increased travel costs and a desire for more meaningful community interactions. Research indicates that MSPs ar…
  continue reading
 
Cyberattacks against U.S. government employees surged by 85% during the recent government shutdown, with projections estimating over 555 million attacks by the end of November 2025. These attacks, characterized as targeted digital assaults rather than generic phishing attempts, exploit vulnerabilities during periods of financial stress, particularl…
  continue reading
 
Google has launched its latest AI model, Gemini 3, which is designed to enhance multimodal processing capabilities by simultaneously handling text, images, and audio. This model, particularly the Gemini 3 Pro version, aims to improve the accuracy and reasoning capabilities of AI systems, positioning Google to compete more effectively with OpenAI in…
  continue reading
 
In the security news: Cloudflare was down, it was not good Logitech breached The largest data breach in history? Fortinet Fortiweb - the saga continues Hacking Linux through your malware scanner, oh the irony I never stopped hating systemd The ASUS exploit that never existed If iRobot fails, can we deploy our own hacker bot army? Firmware encryptio…
  continue reading
 
Microsoft has launched Agent 365, a management platform designed for overseeing AI agents within enterprise environments. This platform, now available in early access, includes features such as the Microsoft Entra Registry for managing agent identities, risk-based access policies, and performance measurement tools. The introduction of Agent 365 sig…
  continue reading
 
It's a topic we discuss often on Business Security Weekly: CISO Burnout. It's real, but how should you manage it? Dr. Yonesy Núñez, Global Cybersecurity Executive at Chain Bridge Bank and former Managing Director, Chief Cybersecurity Risk Officer, and Chief Information Security Officer at The Depository Trust & Clearing Corporation (DTCC), joins Bu…
  continue reading
 
The rise of artificial intelligence (AI) in cyber attacks is prompting small and medium-sized businesses (SMBs) to adopt managed detection and response (MDR) services and explore autonomous security operations centers (SOCs). Research from TechAisle indicates that awareness of MDR among SMBs increased from 39% in 2023 to 61% in 2025, with 89% of mi…
  continue reading
 
Secure code should be grounded more in concepts like secure by default and secure by design than by "spot the vuln" thinking. Matias Madou shares his experience in secure coding training and the importance of teaching critical thinking. He also discusses why critical thinking is so closely related to threat modeling and how LLMs can be a tool for h…
  continue reading
 
The recent partnership between OpenAI and Search Kings, a digital marketing firm, aims to provide ChatGPT services to small and medium-sized businesses (SMBs), particularly in the home services sector. This collaboration is designed to facilitate the integration of artificial intelligence into SMB operations, addressing the challenges these busines…
  continue reading
 
Segment 1: Interview with Rob Allen It’s the Year of the (Clandestine) Linux Desktop! As if EDR evasions weren’t enough, attackers are now employing yet another method to hide their presence on enterprise systems: deploying tiny Linux VMs. Attackers are using Hyper-V and/or WSL to deploy tiny (120MB disk space and 256MB memory) Linux VMs to host a …
  continue reading
 
Richardson Dackam, a solo developer known for rapidly creating AI-first SaaS products, shared insights into his development process during a recent episode of the Business of Tech. Dackam emphasizes the importance of identifying manageable problems that can be solved quickly, which he refers to as "done for you ideas." His approach involves extensi…
  continue reading
 
AI proof-of-concept projects are facing high failure rates, with a recent Omdia survey indicating that nearly one-third of companies report complete failures in these initiatives. Only 9% of firms successfully transition more than half of their AI projects into operational use, while 46% manage to move over 10% into production. The primary reason f…
  continue reading
 
Augustus De Morgan, Doordash, Fortiweb, Typosquatting, Vista, Ransomware, AI, Josh, Rob, Aaran, Jason, Dr. Scott, Rocky, Uh., and More on this edition of the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-529
  continue reading
 
New research indicates that the use of artificial intelligence (AI) is expanding beyond established guidelines, with significant implications for IT leadership and security. A study from UpGuard reveals that over 80% of employees in sectors like finance and healthcare are utilizing unauthorized AI tools, often referred to as shadow AI. This trend r…
  continue reading
 
This week: Minecraft on your lightbulb Sonicwall breached, who's next? Ditch Android, install Linux Hacking your face Thermostat freedom Pen test fails HackRF hacking times 2 Going around EDR Hackers in your printer Chinese data breach NFC relays and PCI Constructive construction hacks FlipperZero firmware update ICS, PLCs, and attacks Bayesian Swi…
  continue reading
 
The expiration of the Cybersecurity Information Sharing Act (CISA) on September 30, 2025, has resulted in a notable decline in U.S. cyber defense capabilities, with a reported drop of over 70% in the sharing of threat indicators. This lapse has created a legal and operational vacuum, leading to increased delays in alert dissemination and a rise in …
  continue reading
 
As AI revolutionizes how we work, it has created a new attack surface with new technologies. One of those new technologies is Model Context Protocol (MCP). MCP has emerged as the standard for connecting AI to external tools, but its flexibility has created security challenges. How do we secure MCP? Rahul Parwani, Head of Product, Security Solutions…
  continue reading
 
ChatGPT and Microsoft CoPilot are leading the enterprise AI adoption race, with 67% and 58% of businesses utilizing these tools, respectively, according to a study by the Wharton Human AI Research Program. This trend highlights a significant gap between these dominant players and competitors like Claude, Perplexity, and DeepSeek, which have much lo…
  continue reading
 
Miles Davis, Jimmy Buffet, 10/8 time, Lost Phones, Phishing, Whisper Leak, Quantum Route Redirect, AI Galore, Rob Allen, and more on the Security Weekly News. Segment Resources: https://www.bleepingcomputer.com/news/security/how-a-ransomware-gang-encrypted-nevada-governments-systems/ This segment is sponsored by ThreatLocker. Visit https://security…
  continue reading
 
Just how bad can things get if someone clicks on a link? Rob Allen joins us again to talk about ransomware, why putting too much attention on clicking links misses the larger picture of effective defenses, and what orgs can do to prepare for an influx of holiday-infused ransomware targeting. Segment resources https://www.bleepingcomputer.com/news/s…
  continue reading
 
The U.S. job market is experiencing a gradual slowdown, with the unemployment rate rising to 4.36% in October 2025, according to estimates from the Chicago Federal Reserve. Despite an increase in layoff announcements, initial unemployment claims remain low at 229,000, indicating some stability. Major companies like Amazon, UPS, and Target have anno…
  continue reading
 
Segment 1: OT Security Doesn’t Have to be a Struggle OT/ICS/SCADA systems are often off limits to cybersecurity folks, and exempt from many controls. Attackers don’t care how fragile these systems are, however. For attackers aiming to disrupt operations, fragile but critical systems fit criminals’ plans nicely. In this interview, we discuss the cha…
  continue reading
 
Brantley Pearce, Chief Technology Officer at RJ Young, discussed the integration of IT services, workflow automation, and workplace technology within the managed services sector. RJ Young, a 70-year-old organization with approximately 700 employees, has been providing managed services since 2012 and has seen significant growth, now generating $12 b…
  continue reading
 
AI adoption is accelerating among small and mid-sized businesses (SMBs), with 87% of executives believing it will transform their operations within a year. However, only 29% feel their teams are prepared to implement AI effectively. This gap highlights a significant challenge for organizations that have invested in AI without seeing tangible return…
  continue reading
 
ConnectWise has announced enhancements to its Ozzio platform, which now includes expanded third-party patching for over 7,000 applications, improvements to the professional services automation (PSA) user experience, and advanced robotic process automation (RPA) capabilities. These updates aim to address security vulnerabilities in widely exploited …
  continue reading
 
Amazon has initiated legal action against Perplexity AI, alleging that the startup's AI browser improperly accesses Amazon customer accounts by mimicking human browsing behavior. The lawsuit, filed in the U.S. District Court for the Northern District of California, raises concerns about security risks associated with Perplexity's Comet browser. Ama…
  continue reading
 
This week: Reversing keyboard firmware Ghost networks Invasion of the face changers Ghost tapping and whole lot of FUD AI doesn't code securely, but Aardvark can secure code De-Googling Thermostats Dodgy Android TV boxes can run Debian HackRF vs. Honda Cyberslop AI paper Turning to the darkside Poisoning the watering hole Nagios vulnerabilities VPN…
  continue reading
 
The Pentagon is preparing to enforce the Cybersecurity Maturity Model Certification (CMMC) requirements for small businesses, with compliance becoming mandatory in contracts starting November 10, 2025. Nearly 500 organizations have already achieved Level 2 certification, and the Defense Department is actively surveying small businesses to assess th…
  continue reading
 
What's the biggest attack vector for breaches besides all of the human related ones (i.e., social engineering, phishing, compromised credentials, etc.)? You might think vulnerabilities, but it's actually misconfiguration. The top breach attack vectors are stolen or compromised credentials, phishing, and misconfigurations, which often work together.…
  continue reading
 
The managed service provider (MSP) market has surpassed $305 billion and is projected to reach $571 billion by 2033, indicating a strong trend toward consolidation within the sector. In the second quarter of 2025 alone, there were 92 announced mergers and acquisitions, as companies aim to enhance their cybersecurity capabilities and automate operat…
  continue reading
 
Pull requests are a core part of collaboration, whether in open or closed source. GitHub has documented some of the security consequences of misconfiguring how PRs can trigger actions. But what happens when repo owners don't read the docs? Bar Kaduri and Roi Nisimi walk through their experience in reading docs, finding vulns, demonstrating exploits…
  continue reading
 
AI infrastructure spending is rapidly increasing, with major technology companies such as Google, Microsoft, and Amazon projected to invest over $300 billion by the end of 2025. This surge is primarily driven by the demand for data centers and GPU capacity to support artificial intelligence initiatives. While the Federal Reserve indicates that curr…
  continue reading
 
Loading …
Copyright 2025 | Privacy Policy | Terms of Service | | Copyright
Listen to this show while you explore
Play