Search a title or topic

Over 20 million podcasts, powered by 

Player FM logo

Identity And Access Management Podcasts

show episodes
 
The Accidental CEO Podcast is where high-performing entrepreneurs come to scale beyond themselves. Hosted by Nata Salvatori—business coach, multi-business owner, and identity-shifter-in-chief—this show is your space to evolve from over-involved operator to embodied CEO. You won’t find hustle hype or beginner tips here. This is about real leadership, strategic freedom, and the inner work it takes to grow a business that no longer runs on your burnout. Each episode blends sharp strategy with e ...
  continue reading
 
Artwork

1
Identity at the Center

Identity at the Center

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
Identity at the Center is a weekly podcast all about identity security in the context of identity and access management (IAM). With decades of real-world IAM experience, hosts Jim McDonald and Jeff Steadman bring you conversations with news, topics, and guests from the identity management industry. Do you know who has access to what?
  continue reading
 
For many of us, the workplace is more than a single building or facility. That’s what makes workforce IAM so powerful. By managing security through something we all take wherever we go — our identities — it gives users the flexibility they need to stay productive and enables administrators to quickly detect and address risks. HID’s robust, flexible workforce identity and access management solutions provide your workforce with seamless access to the resources they need — no matter where they are.
  continue reading
 
Securing the Win takes listeners inside how one of the most successful and advanced teams in Formula 1® protects its competitive edge, where performance excellence meets digital resilience. Hosted by former Red Bull Racing mechanic Calum Nicholas, the series brings together Oracle Red Bull Racing drivers, engineers, and technology leaders to explore what it takes to stay secure and win at the highest level of competition. Through exclusive stories of leadership, innovation, and cybersecurity ...
  continue reading
 
Artwork

1
Risky Business

Patrick Gray

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
Risky Business is a weekly information security podcast featuring news and in-depth interviews with industry luminaries. Launched in February 2007, Risky Business is a must-listen digest for information security pros. With a running time of approximately 50-60 minutes, Risky Business is pacy; a security podcast without the waffle.
  continue reading
 
Artwork

1
Verify This

Condatis Group Limited

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
We're connecting with leading experts across the industry to shed light on all things digital identity. We're talking trending issues, lessons learned and priorities for the future within verification and authentication. Join us across the series with/in our quickfire chats whilst you enjoy a coffee or make your way to work. Sit back, relax and listen in as we verify this, and that. #TrustMatters
  continue reading
 
Stay ahead of cyberthreats with expert insights and practical security . Led by an ensemble cast of industry thought leaderss offering in-depth analysis and practical advice to fortify your organization's defenses.
  continue reading
 
What if you could get a no-nonsense look at security solutions in just 15 minutes? Security You Should Know, the latest podcast from the CISO Series, does just that. Hosted by Rich Stroffolino, each episode brings together one security vendor and two security leaders to break down a real-world problem and the solution trying to fix it. Expect straight answers on: How to explain the issue to your CEO What the solution actually does (and doesn't do) How the pricing model works Then, our securi ...
  continue reading
 
Artwork

1
Security Sutra – Cybersecurity Startups and Venture Capital by Startuprad.io™

Startuprad.io – Europe’s Startup & VC Podcast Network

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
ChatGPT: Perfect clarification — that’s important for compliance and metadata consistency. Let’s correct the Security Sutra entry accordingly (removing ™ from all but Startuprad.io™) and reissue the final, publication-ready version. 🎙️ Security Sutra – Cybersecurity Startups and Venture Capital by Startuprad.io™ 🧠 Optimized Title 👉 Security Sutra: Cybersecurity, Startups & Venture Capital by Startuprad.io™ ✅ Complies with your trademark structure ✅ Keeps Apple/Spotify-friendly keyword balanc ...
  continue reading
 
How can Fintech contribute to building a better world? In Season 4 of Fintech Files, we’re turning our focus to where financial technology meets social impact. This season, we explore financial inclusion, sustainable investing, and decarbonization with some of the brightest minds in the industry. As financial services touch every aspect of our lives, the opportunity to drive positive change is enormous. About Fintech Files: Join us on Fintech Files from BCG Platinion as we explore the cuttin ...
  continue reading
 
Russ Branzell, President & CEO of the College of Healthcare Information Management Executives (CHIME), interviews leaders in Digital Health from around the world. These thought leaders share their knowledge, challenges, best practices, and ideas for helping to transform health and care on a global level.
  continue reading
 
Marketing, Mindset & Visibility for Online Mompreneurs. Inspiring Your Shine is the podcast for faith-driven women ready to rise into their calling and build a business that reflects their purpose. Hosted by brand strategist Rebecca Keselburg, this show helps online entrepreneurs simplify marketing, grow their visibility, and create a business that works for them, not the other way around. Whether you're launching or scaling, you'll gain strategies to clarify your message, overcome mindset b ...
  continue reading
 
Welcome to The Bare Metal Cyber CISSP Audio Course—your comprehensive companion for mastering the Certified Information Systems Security Professional (CISSP) certification. Built for serious cybersecurity professionals and aspiring leaders alike, this Audio Course transforms the eight domains of the CISSP Common Body of Knowledge into clear, structured, and engaging lessons you can learn anytime, anywhere. Each episode blends real-world context, expert insight, and exam-focused explanations ...
  continue reading
 
Certified - Security+ 701 is your completely free audio companion for mastering the CompTIA Security+ SY0-701 certification exam. Developed by BareMetalCyber.com, this immersive Audio Course transforms every domain of the official exam objectives into clear, practical, and exam-ready lessons you can learn anywhere—whether commuting, exercising, or studying at home. Each episode delivers focused explanations, real-world examples, and proven study strategies designed to build confidence and he ...
  continue reading
 
Artwork

1
CMAJ Podcasts

Canadian Medical Association Journal

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
CMAJ Podcasts: Exploring the latest in Canadian medicine from coast to coast to coast with your hosts, Drs. Mojola Omole and Blair Bigham. CMAJ Podcasts delves into the scientific and social health advances on the cutting edge of Canadian health care. Episodes include real stories of patients, clinicians, and others who are impacted by our health care system.
  continue reading
 
The podcast connecting identity and business. Each episode features an in-depth conversation with an identity management leader, focusing on industry hot topics and stories. Join Oscar Santolalla and his special guests as they discuss what’s current and what’s next for digital identity. Produced by Ubisecure.
  continue reading
 
Cybersecurity weekly podcast series featuring industry thought leaders discussing security solutions, best practices, threat intel, and more. Our primary topics within InfoSec include: Application Security; Artificial Intelligence; Blockchain; Career Development; Cloud Security; Encryption / DLP; Endpoint / Mobile / IoT Security; GRC; Incident Response / SIEM; Identity and Access Management; Network Security; Privacy; Ransomware / Malware; and Security Awareness.
  continue reading
 
Hosted by Nyedis CIO and co-founder Adam Callen, the Nyedis Anarchy Series gives expert insight into Identity and Access Management, enterprise cloud security, web3, and much more. Callen, who previously went by the IDM Rockstar, gives practical advice on every episode dealing with cutting edge technologies, real world experiences from his clients, and truly unbiased vendor reviews. Callen chats with other leading names in the field and invites questions from the audience on how they can be ...
  continue reading
 
Artwork

1
Small Nonprofit: Fundraising Tips, Leadership Strategies, and Community-Centric Solutions

Further Together: Fundraising Strategies for Nonprofit Organizations

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
Welcome to Small Nonprofit, the podcast designed for leaders, fundraisers, and advocates in the nonprofit sector who want to create real change. We provide small nonprofit organizations with strategies to enhance their fundraising campaigns, improve nonprofit governance, and implement ethical fundraising practices that resonate with today’s values-driven donors. Hosted by an experienced nonprofit consultant, Maria Rio, this show delves into the unique challenges of nonprofit fundraising and ...
  continue reading
 
Artwork
 
Over the last near decade, Gerry DeFilippo has trained THOUSANDS of athletes from the youth to pro level across all major team-sports. Gerry started his gym and brand, Challenger Strength, as an ambitious 22 year old still finishing his college degree. In the time since, he has built his facility and following into a nationally recognized performance company training thousands of athletes both in-person and online. Gerry brings guests across all areas of sports and performance training, givi ...
  continue reading
 
Artwork

1
CodingCat.dev Podcast

CodingCat.dev Podcast

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
CodingCat.dev Podcast is a web development podcast made by developers for developers. Learning how to be a developer is hard, CodingCat.dev will show you how to grow as a developer bit by bit. Links 🎥 YouTube: https://youtube.com/codingcatdev 🌎 Site: https://codingcat.dev/
  continue reading
 
People create a recognizable and useful data wake as they navigate through the choppy waters of the American healthcare system. Healthcare DataWake is a healthcare podcast that dives deep into thought-leader discussions and insights to recognize uniqueness as well as similarities so we can become more proactive in care management, clinic trials, operations and deliver better health outcomes for all.
  continue reading
 
Artwork
 
We interview cybersecurity professionals for tips and advice on how to break into a cybersecurity career. Explore how to think and take action to be successful as an IT Security professional. Learn about roles in IT Audit, Risk Management, Pentesting, DevSecOps, Cloud Security and certifications.
  continue reading
 
Confused about the latest cybercrime in the news? Overwhelmed by trying to figure out if an incident applies to you? Want to learn simple, actionable steps to keep you and your family safe online? Introducing Bee Cyber Fit, a podcast for the Yale University community and beyond. We’ll cut through the cyber mumbo jumbo and make cybersecurity awareness easy to digest. Every two weeks we’ll share compelling cyber stories, make sense of buzzwords and share a simple call to action. Scammers are e ...
  continue reading
 
Artwork

51
Web Pro Savvy

Cathy Sirvatka

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Web Pro Savvy is a podcast for freelance web designers and developers, hosted by Cathy Sirvatka. You'll hear interviews with experienced freelance web pros about their business operations, the services they offer, and the types of clients they work with. They openly share their stories and pull back the curtain on how they achieve success so that you can boost your own business. Cathy also shares her own experiences and insights that help other freelancers skip past the trials to achieve sat ...
  continue reading
 
Artwork

1
This Anthro Life

Anthrocurious, LLC

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
This Anthro Life is the premiere go-to Anthropology Podcast that fuses human insights with cultural storytelling. We equip you with a deep understanding of the human experience to revolutionize your decision-making strategies and social impact. Head over to https://www.thisanthrolife.org to learn more. Spearheaded by acclaimed Anthropologist Dr. Adam Gamwell, This Anthro Life equips leaders, individuals, and organizations to shape a more compassionate future. We aim to broaden perspectives a ...
  continue reading
 
Have you ever imagined listening to your favorite IT security expert discuss the ways you can enhance the security posture of your environment on-the go? Now you can! We're thrilled to announce the launch of our weekly podcast series where our security experts will present their take on a wide range of IT security topics.
  continue reading
 
In the world of stock trading, finding a platform that offers both ease of use and robust features is key to success. Dhan App is one such platform designed for individuals and traders who want to experience seamless trading, from equities to futures and options. If you're a newcomer or an experienced trader, Dhan App provides a wide range of tools to meet your needs. By using the Dhan App Referral Code "ASAR14", you can unlock a 500 Rs bonus to kickstart your trading journey. This article w ...
  continue reading
 
Loading …
show series
 
In this episode, we tackle one of the most pressing questions organizations face today: how do you measure the ROI of physical identity and access management (PIAM)? Join host Matthew Lewis alongside experts Phil Buck and Don Campbell as they break down the tangible and intangible benefits of PIAM across industries—from healthcare to oil and gas to…
  continue reading
 
Nation-State Attack or Compromised Government? [Guest Diary] An IP address associated with the Indonesian Government attacked one of our interns' honeypots. https://isc.sans.edu/diary/Nation-State%20Attack%20or%20Compromised%20Government%3F%20%5BGuest%20Diary%5D/32536 React Update Working exploits for the React vulnerability patched yesterday are n…
  continue reading
 
What Keeps You Up at Night? – Tales from the Digital Frontier The Case for Audacity in AI and Capacity Management Strategy Russ Branzell welcomes Erik Barnett, Health Partner at Guidehouse and leader of the Health Technology Consulting Practice, for a candid discussion on the realities of AI adoption in healthcare. Drawing on his experience as both…
  continue reading
 
This week, our hosts ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Dave Bittner⁠⁠⁠⁠⁠⁠⁠⁠⁠, ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Joe Carrigan⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠, and ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Maria Varmazis⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ (also host of the ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠T-Minus⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ Space Daily show) are sharing the latest in social engin…
  continue reading
 
Attempts to Bypass CDNs Our honeypots recently started receiving scans that included CDN specific headers. https://isc.sans.edu/diary/Attempts%20to%20Bypass%20CDNs/32532 React Vulnerability CVE-2025-55182 React patched a critical vulnerability in React server components. Exploitation is likely imminent. https://react.dev/blog/2025/12/03/critical-se…
  continue reading
 
This episode is sponsored by Aembit. Visit aembit.io/idac to learn more. Jeff and Jim welcome David Goldschlag, CEO and Co-founder of Aembit, to discuss the rapidly evolving world of non-human access and workload identity. With the rise of AI agents in the enterprise, organizations face a critical challenge: how to secure software-to-software conne…
  continue reading
 
This one’s for the founder who’s done all the “right” things—built the business, hit the revenue goals—but still feels stuck doing too much, too often, with too little joy. Holly Haynes, host of Crush the Rush, joins me for a conversation about what it really takes to grow a life-first business that lasts. A former corporate strategist, Holly start…
  continue reading
 
SmartTube Android App Compromise The key a developer used to sign the Android YouTube player SmartTube was compromised and used to publish a malicious version. https://github.com/yuliskov/SmartTube/issues/5131#issue-3670629826 https://github.com/yuliskov/SmartTube/releases/tag/notification Two Years, 17K Downloads: The NPM Malware That Tried to Gas…
  continue reading
 
In this week’s show Patrick Gray and Adam Boileau discuss the week’s cybersecurity news. It’s a quiet week with Thanksgiving in the US, but there’s always some cyber to talk about: Airbus rolls out software updates after a cosmic ray bitflips an A320 into a dive Krebs tracks down a Scattered Lapsus$ Hunters teen through the usual poor opsec… … as W…
  continue reading
 
What does it take to create payment infrastructure from the ground up in one of the world’s fastest-growing fintech regions? Recorded at Money 20/20 in Riyadh, PayTabs CEO and Founder, Abdulaziz Al Jouf, reflects on how the company helped establish one of the Middle East’s earliest fintechs. We explore the challenges of launching in a cash-reliant …
  continue reading
 
Send us a text There's a reason some fundraising stories feel easier to tell than others. Stories about animals, "grateful" clients, and non-political solutions raise money quickly because they tap into what donors already believe about who deserves help. But what happens when those easy stories erase the complexity and humanity of the people you a…
  continue reading
 
Welcome in! You’ve entered, Only Malware in the Building. Wrap yourself in a warm blanket, pour your favorite mug of tea, and join us each month as we unwrap the season’s juiciest cyber mysteries. Your host is ⁠⁠⁠⁠⁠Selena Larson⁠⁠⁠⁠⁠, ⁠⁠⁠⁠⁠Proofpoint⁠⁠⁠⁠⁠ intelligence analyst and host of their podcast ⁠⁠⁠⁠⁠DISCARDED⁠⁠⁠⁠⁠. Inspired by the residents …
  continue reading
 
Please enjoy this encore of Word Notes. Software designed to prevent cheating in video games. CyberWire Glossary link: ⁠https://thecyberwire.com/glossary/anti-cheat-software⁠ Audio reference link: “⁠The BIG Problem with Anti-Cheat⁠,” by Techquickie, YouTube, 5 June 2020 Learn more about your ad choices. Visit megaphone.fm/adchoices…
  continue reading
 
Hunting for SharePoint In-Memory ToolShell Payloads A walk-through showing how to analyze ToolShell payloads, starting with acquiring packets all the way to decoding embedded PowerShell commands. https://isc.sans.edu/diary/%5BGuest%20Diary%5D%20Hunting%20for%20SharePoint%20In-Memory%20ToolShell%20Payloads/32524 Android Security Bulletin December 20…
  continue reading
 
All links and images can be found on CISO Series. Traditional identity systems authenticate credentials and devices, but they can't verify who's actually behind them. Attackers use AI-generated IDs and deepfake videos to pass background checks, then clone voices to reset MFAs at the help desk. Identity has become the primary attack surface, and exi…
  continue reading
 
In this episode of The Identity at the Center Podcast, hosts Jim McDonald and Jeff Steadman catch up with John Tolbert, Director of Cybersecurity Research at KuppingerCole Analysts, to talk about the rapidly evolving world of Fraud Reduction Intelligence Platforms (FRIP). They explore: The six capabilities of modern fraud reduction systems How AI a…
  continue reading
 
Celiac disease affects between one and two percent of Canadians, yet many patients wait years before receiving a clear diagnosis. On this episode of the CMAJ Podcast, the hosts speak with two contributors to the CMAJ review article Diagnosis and management of celiac disease about the condition’s diverse clinical presentations, appropriate testing s…
  continue reading
 
Fake adult websites pop realistic Windows Update screen to deliver stealers via ClickFix The latest variant of ClickFix tricks users into copy/pasting commands by displaying a fake blue screen of death. https://www.acronis.com/en/tru/posts/fake-adult-websites-pop-realistic-windows-update-screen-to-deliver-stealers-via-clickfix/ B2B Guest Access Cre…
  continue reading
 
Overcome the fear of failure, the unknown, and of being uncomfortable to take action and make your dreams come true. Simple tactics to help you overcome yourself and face your fear. Are you ready to break free from fear and finally take action on your dreams? In this episode, you'll discover why taking action is the key to success, how to get comfo…
  continue reading
 
Please enjoy this encore of Hacking Humans. On Hacking Humans, ⁠Dave Bittner⁠, ⁠Joe Carrigan⁠, and ⁠Maria Varmazis⁠ (also host of N2K's daily space podcast, T-Minus), are once again sharing the latest in social engineering scams, phishing schemes, and criminal exploits that are making headlines to help our audience become aware of what is out there…
  continue reading
 
Europe's startup narrative is changing fast — from apps and valuations to sovereignty, infrastructure and resilience. In this month's DACH Startup News, we unpack the moves that made European tech sovereignty the defining theme of 2025. What you’ll learn: – Why sovereign cloud is becoming foundational for startups and enterprise buyers – How AI, ro…
  continue reading
 
Ever wish you could eavesdrop on a candid conversation among seasoned podcasters? I recently participated in a roundtable discussion at Mic Check Retreat with an incredible group of podcasters. We jumped into the real stories behind our shows—the triumphs, the hurdles, and the unexpected lessons that come with the territory. In this honest, heartwa…
  continue reading
 
In this week’s show Patrick Gray and Adam Boileau discuss the week’s cybersecurity news, including: Salesforce partner Gainsight has customer data stolen Crowdstrike fires insider who gave hackers screenshots of internal systems Australian Parliament turns off wifi and bluetooth in fear of of visiting Chinese bigwigs Shai-Hulud npm/Github worm is b…
  continue reading
 
Spyware Allows Cyber Threat Actors to Target Users of Messaging Applications Spyware attacks messaging applications in part by triggering vulnerabilities in messaging applications but also by deploying tools like keystroke loggers and screenshot applications. https://www.cisa.gov/news-events/alerts/2025/11/24/spyware-allows-cyber-threat-actors-targ…
  continue reading
 
Modern enterprises face a growing challenge in managing thousands of devices, applications, and identities across increasingly complex IT environments. Unmanaged assets, shadow IT, and inconsistent processes can quietly create security gaps that expose organisations to significant risk. In this episode of Security Strategist, Syed Ali, Chief Execut…
  continue reading
 
Send us a text What happens when the money your organization needs comes with a muzzle attached? In this bold and necessary conversation, Maria and Caitlin tackle one of the most uncomfortable truths in the nonprofit sector: funders using their financial power to silence organizational advocacy and control community narratives. On this week's episo…
  continue reading
 
Please enjoy this encore of Word Notes. Malware, in the guise of ransomware, that destroys data rather than encrypts. CyberWire Glossary link: ⁠https://thecyberwire.com/glossary/pseudoransomware⁠ Audio reference link: “⁠Some Men Just Want to Watch the World Burn | the Dark Knight⁠,” by YouTube, 2 November 2019. Learn more about your ad choices. Vis…
  continue reading
 
Conflicts between URL mapping and URL based access control. Mapping different URLs to the same script, and relying on URL based authentication at the same time, may lead to dangerous authentication and access control gaps. https://isc.sans.edu/diary/Conflicts%20between%20URL%20mapping%20and%20URL%20based%20access%20control./32518 Sha1-Hulud, The Se…
  continue reading
 
Jim McDonald and Jeff Steadman sit down with Mike Reiring of RSM at InfoSec World 2025 to explore how managed service providers are reshaping IT and identity operations. They dig into the differences between MSPs and MSSPs, how to choose the right partner, and how AI is transforming help desks, problem management, and security monitoring. The conve…
  continue reading
 
Use of CSS stuffing as an obfuscation technique? Phishing sites stuff their HTML with benign CSS code. This is likely supposed to throw of simple detection engines https://isc.sans.edu/diary/Use%20of%20CSS%20stuffing%20as%20an%20obfuscation%20technique%3F/32510 Critical Oracle Identity Manager Flaw Possibly Exploited as Zero-Day Early exploit attem…
  continue reading
 
Curious about GenAI for engineers? Learn what's real, what's not, and what's next in AI. Watch for expert insights and share your thoughts below!https://codingcat.dev/podcast/genai-for-engineers-what-s-real-what-s-not-and-what-s-coming00:00 Introduction02:21 Startup Journey10:13 GenAI Evolution13:24 Engineering Excellence16:44 AI Job Impact25:11 Ne…
  continue reading
 
Curious about OAuth, MCP servers, and building cool ChatGPT apps? Hear from Max of Stytch as we dive deep, break down the tech, and build a Tamagotchi together! Drop your thoughts and share if you enjoyed it.https://codingcat.dev/podcast/how-oauth-mcp-and-the-openai-apps-sdk-power-the-next-generation-of-interactive-ai-experiences00:00 Meet Stytch &…
  continue reading
 
Discover Firebase Data Connect with Tyler Crowe! Dive into SQL, GraphQL, AI, and live demos to supercharge your app's data. Share your thoughts below!https://codingcat.dev/podcast/firebase-sql-with-data-connect00:00 Data Connect Overview04:29 AI Features & Vertex13:13 SQL Views & Raw SQL15:45 Downloading SDKs24:37 Full Text Search30:32 Vector Searc…
  continue reading
 
Curious about AI identity and MCP servers? Join us as Tobin South breaks down securing agents, fine-grained access, and the future of AI identity. Share your thoughts below!https://codingcat.dev/podcast/identity-access-management-for-agents-with-tobin-south00:00 Meet Tobin South06:11 MCP Security Challenges13:28 Agent to Agent Future24:28 MCP Serve…
  continue reading
 
Oracle Identity Manager Exploit Observation from September (CVE-2025-61757) We observed some exploit attempts in September against an Oracle Identity Manager vulnerability that was patched in October, indicating that exploitation may have occurred prior to the patch being released. https://isc.sans.edu/diary/Oracle%20Identity%20Manager%20Exploit%20…
  continue reading
 
What if the biggest cyber risk inside your company wasn’t malware — but identity? In this episode, I sit down with Santhosh Jayaprakash, founder & CEO of UnoSecur, to unpack one of the fastest-moving transformations in cybersecurity: the rise of identity as the new perimeter. Attackers don’t break in anymore — they log in. And with AI agents, LLM w…
  continue reading
 
What Keeps You Up at Night? – Tales from the Digital Frontier Empowering Providers and Platforms: How Digital Health Must Evolve Host and Guest: Russ Branzell, CHIME President & CEO Bob Segert, Chairman & Chief Executive Officer, Athenahealth Russ Branzell, President and CEO of CHIME, sits down with Bob Segert, Chairman and CEO of athenahealth, for…
  continue reading
 
In this sponsored Soap Box edition of the podcast, Andrew Morris joins Patrick Gray to talk about how Greynoise can often get a 90 day heads up on serious vulnerabilities. Whether it’s malicious actors doing reconnaissance or the affected vendors trying to understand the scope of the problem, it seems that mass scanning activity lines up pretty nic…
  continue reading
 
This week, our hosts ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Dave Bittner⁠⁠⁠⁠⁠⁠⁠⁠, ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Joe Carrigan⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠, and ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Maria Varmazis⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ (also host of the ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠T-Minus⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ Space Daily show) are sharing the latest in social engineering s…
  continue reading
 
Loading …
Copyright 2025 | Privacy Policy | Terms of Service | | Copyright
Listen to this show while you explore
Play