Search a title or topic

Over 20 million podcasts, powered by 

Player FM logo

Identity And Access Management Podcasts

show episodes
 
Dive into the heart of creativity and business with the Accidental CEO Podcast, your go-to audio hangout for turning passion into a thriving business. Hosted by Nata Salvatori, a seasoned wedding photographer and savvy business educator, this podcast peels back the curtain on the accidental journey from creative professional to CEO. Whether you stumbled upon the role of entrepreneur or have always dreamt of leading your own venture, this podcast is crafted for you. Each episode is a blend of ...
  continue reading
 
Artwork

1
Identity at the Center

Identity at the Center

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
Identity at the Center is a weekly podcast all about identity security in the context of identity and access management (IAM). With decades of real-world IAM experience, hosts Jim McDonald and Jeff Steadman bring you conversations with news, topics, and guests from the identity management industry. Do you know who has access to what?
  continue reading
 
Artwork
 
Over the last near decade, Gerry DeFilippo has trained THOUSANDS of athletes from the youth to pro level across all major team-sports. Gerry started his gym and brand, Challenger Strength, as an ambitious 22 year old still finishing his college degree. In the time since, he has built his facility and following into a nationally recognized performance company training thousands of athletes both in-person and online. Gerry brings guests across all areas of sports and performance training, givi ...
  continue reading
 
For many of us, the workplace is more than a single building or facility. That’s what makes workforce IAM so powerful. By managing security through something we all take wherever we go — our identities — it gives users the flexibility they need to stay productive and enables administrators to quickly detect and address risks. HID’s robust, flexible workforce identity and access management solutions provide your workforce with seamless access to the resources they need — no matter where they are.
  continue reading
 
Artwork
 
Welcome to the Security Weekly Podcast Network, your all-in-one source for the latest in cybersecurity! This feed features a diverse lineup of shows, including Application Security Weekly, Business Security Weekly, Paul's Security Weekly, Enterprise Security Weekly, and Security Weekly News. Whether you're a cybersecurity professional, business leader, or tech enthusiast, we cover all angles of the cybersecurity landscape. Tune in for in-depth panel discussions, expert guest interviews, and ...
  continue reading
 
Artwork

1
Verify This

Condatis Group Limited

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
We're connecting with leading experts across the industry to shed light on all things digital identity. We're talking trending issues, lessons learned and priorities for the future within verification and authentication. Join us across the series with/in our quickfire chats whilst you enjoy a coffee or make your way to work. Sit back, relax and listen in as we verify this, and that. #TrustMatters
  continue reading
 
Artwork

1
Microsoft Mechanics Podcast

Microsoft Mechanics

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
Made for tech enthusiasts and IT professionals. Expanded coverage of your favorite technologies across Microsoft; including Office, Azure, Windows and Data Platforms. We'll even bring you broader topics such as device innovation with Surface, machine learning, and predictive analytics.
  continue reading
 
Artwork

1
Enterprise Security Weekly (Audio)

Security Weekly Productions

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
News, analysis, and insights into enterprise security. We put security vendors under the microscope, and explore the latest trends that can help defenders succeed. Hosted by Adrian Sanabria. Co hosts: Katie Teitler-Santullo, Ayman Elsawah, Jason Wood, Jackie McGuire.
  continue reading
 
Artwork

1
Enterprise Security Weekly (Video)

Security Weekly Productions

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly+
 
News, analysis, and insights into enterprise security. We put security vendors under the microscope, and explore the latest trends that can help defenders succeed. Hosted by Adrian Sanabria. Co hosts: Katie Teitler-Santullo, Ayman Elsawah, Jason Wood, Jackie McGuire.
  continue reading
 
Artwork

1
Crucial Tech

Lou Covey

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
Unraveling the technology that affects us all but that few of us understand, in a format to give you a basic understanding in the time it takes to drive to and from the grocery store.
  continue reading
 
The podcast connecting identity and business. Each episode features an in-depth conversation with an identity management leader, focusing on industry hot topics and stories. Join Oscar Santolalla and his special guests as they discuss what’s current and what’s next for digital identity. Produced by Ubisecure.
  continue reading
 
Artwork
 
Cybersecurity weekly podcast series featuring industry thought leaders discussing security solutions, best practices, threat intel, and more. Our primary topics within InfoSec include: Application Security; Artificial Intelligence; Blockchain; Career Development; Cloud Security; Encryption / DLP; Endpoint / Mobile / IoT Security; GRC; Incident Response / SIEM; Identity and Access Management; Network Security; Privacy; Ransomware / Malware; and Security Awareness.
  continue reading
 
Hosted by Nyedis CIO and co-founder Adam Callen, the Nyedis Anarchy Series gives expert insight into Identity and Access Management, enterprise cloud security, web3, and much more. Callen, who previously went by the IDM Rockstar, gives practical advice on every episode dealing with cutting edge technologies, real world experiences from his clients, and truly unbiased vendor reviews. Callen chats with other leading names in the field and invites questions from the audience on how they can be ...
  continue reading
 
Fintech is eating the world. Join Peter Renton, Co-Founder of Fintech Nexus, every week as he interviews the fintech leaders who are leading the transformation of financial services. If you want to understand what the future will look like for lending, payments, digital banking and more tune in to Fintech One•On•One (formerly the Lend Academy Podcast).
  continue reading
 
Artwork

1
Blue Square Security

Greg Wartes, Michael Vitale, Simon Strain

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
"Blue Square Security" is a Microsoft Security focused podcast that explores the latest trends and best practices in cybersecurity, led by the Microsoft Digital Security team including in-depth discussions with experts from multiple industry experts and Microsoft partners. Each episode will delve into a different topic, such as cloud security, threat intelligence, or identity and access management, providing listeners with practical insights and actionable advice to help them better protect ...
  continue reading
 
How can Fintech contribute to building a better world? In Season 4 of Fintech Files, we’re turning our focus to where financial technology meets social impact. This season, we explore financial inclusion, sustainable investing, and decarbonization with some of the brightest minds in the industry. As financial services touch every aspect of our lives, the opportunity to drive positive change is enormous. About Fintech Files: Join us on Fintech Files from BCG Platinion as we explore the cuttin ...
  continue reading
 
Artwork

1
This Anthro Life

Anthrocurious, LLC

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
This Anthro Life is the premiere go-to Anthropology Podcast that fuses human insights with cultural storytelling. We equip you with a deep understanding of the human experience to revolutionize your decision-making strategies and social impact. Head over to https://www.thisanthrolife.org to learn more. Spearheaded by acclaimed Anthropologist Dr. Adam Gamwell, This Anthro Life equips leaders, individuals, and organizations to shape a more compassionate future. We aim to broaden perspectives a ...
  continue reading
 
Confused about the latest cybercrime in the news? Overwhelmed by trying to figure out if an incident applies to you? Want to learn simple, actionable steps to keep you and your family safe online? Introducing Bee Cyber Fit, a podcast for the Yale University community and beyond. We’ll cut through the cyber mumbo jumbo and make cybersecurity awareness easy to digest. Every two weeks we’ll share compelling cyber stories, make sense of buzzwords and share a simple call to action. Scammers are e ...
  continue reading
 
Artwork
 
We interview cybersecurity professionals for tips and advice on how to break into a cybersecurity career. Explore how to think and take action to be successful as an IT Security professional. Learn about roles in IT Audit, Risk Management, Pentesting, DevSecOps, Cloud Security and certifications.
  continue reading
 
Marketing, Mindset & Visibility for Online Mompreneurs. Inspiring Your Shine is the podcast for faith-driven women ready to rise into their calling and build a business that reflects their purpose. Hosted by brand strategist Rebecca Keselburg, this show helps online entrepreneurs simplify marketing, grow their visibility, and create a business that works for them, not the other way around. Whether you're launching or scaling, you'll gain strategies to clarify your message, overcome mindset b ...
  continue reading
 
Artwork

1
Web Pro Savvy

Cathy Sirvatka

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Web Pro Savvy is a podcast for freelance web designers and developers, hosted by Cathy Sirvatka. You'll hear interviews with experienced freelance web pros about their business operations, the services they offer, and the types of clients they work with. They openly share their stories and pull back the curtain on how they achieve success so that you can boost your own business.
  continue reading
 
If you are planning to start trading on Binance Futures, using a Binance Futures referral code can offer you significant advantages. The Binance Futures referral code ”K6O8CPLG” provides new users with a 10% discount on all futures trading fees and gives you the opportunity to earn up to $600 in welcome bonuses. This is an excellent way to start your trading journey with extra benefits, maximizing your initial deposits and reducing trading costs right from the beginning. What is Binance Futu ...
  continue reading
 
Have you ever imagined listening to your favorite IT security expert discuss the ways you can enhance the security posture of your environment on-the go? Now you can! We're thrilled to announce the launch of our weekly podcast series where our security experts will present their take on a wide range of IT security topics.
  continue reading
 
Loading …
show series
 
Join Jeff and Jim in this special episode of the Identity at the Center podcast as they celebrate crossing 1 million downloads. The hosts share a major announcement, thank their supporters, and discuss the journey and future of the podcast. They also delve into the world of Identity and Access Management (IAM) with guest Anthony Viggiano, covering …
  continue reading
 
Interview with Harish Peri from Okta Oktane Preview: building frameworks to secure our Agentic AI future Like it or not, Agentic AI and protocols like MCP and A2A are getting pushed as the glue to take business process automation to the next level. Giving agents the power and access they need to accomplish these lofty goals is going to be challengi…
  continue reading
 
Interview with Harish Peri from Okta Oktane Preview: building frameworks to secure our Agentic AI future Like it or not, Agentic AI and protocols like MCP and A2A are getting pushed as the glue to take business process automation to the next level. Giving agents the power and access they need to accomplish these lofty goals is going to be challengi…
  continue reading
 
Interview with Harish Peri from Okta Oktane Preview: building frameworks to secure our Agentic AI future Like it or not, Agentic AI and protocols like MCP and A2A are getting pushed as the glue to take business process automation to the next level. Giving agents the power and access they need to accomplish these lofty goals is going to be challengi…
  continue reading
 
The end of an era: Properly formatted IP addresses in all of our data. When initiall designing DShield, addresses were zero padded , an unfortunate choice. As of this week, datafeeds should no longer be zero padded . https://isc.sans.edu/diary/The%20end%20of%20an%20era%3A%20Properly%20formated%20IP%20addresses%20in%20all%20of%20our%20data./32228 .d…
  continue reading
 
Humans wiped out by 2040, Okta, Elastic, Bad Bots, Berserk Bear, Siemens, Philip K. Dick, Aaran Leyland, and More, on this edition of the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-505
  continue reading
 
I got a pitch from Reality Defender (deepfake video detection) about a partnership with ValidSoft (deepfake voice) last week. We don’t generally cover partnership agreements because, well, we get a handful every week and they just aren’t news. But the pitch threw out a few statistics that seemed a bit off. After some research, I found out how off t…
  continue reading
 
In this episode, I sit down with Jason Guss, CEO and co-founder of Octane Lending, to discuss how the company became the #1 powersports lender in the country. The conversation covers Octane's early pivot from lender aggregator to direct lender, their dominance in niche markets, and strategies for thriving in challenging interest rate environments. …
  continue reading
 
Don't Forget The "-n" Command Line Switch Disabling reverse DNS lookups for IP addresses is important not just for performance, but also for opsec. Xavier is explaining some of the risks. https://isc.sans.edu/diary/Don%27t%20Forget%20The%20%22-n%22%20Command%20Line%20Switch/32220 watchTowr releases details about recent Commvault flaws Users of the …
  continue reading
 
This segment is sponsored by Flashpoint. Visit https://securityweekly.com/flashpoint to learn more about them! Recent leaks tied to LockBit and Black Basta have exposed the inner workings of two of the most notorious ransomware groups—revealing their tactics, negotiation strategies, and operational infrastructure. For defenders, this rare window in…
  continue reading
 
Airtel Router Scans and Mislabeled Usernames A quick summary of some odd usernames that show up in our honeypot logs https://isc.sans.edu/diary/Airtel%20Router%20Scans%2C%20and%20Mislabeled%20usernames/32216 Apple Patches 0-Day CVE-2025-43300 Apple released an update for iOS, iPadOS and MacOS today patching a single, already exploited, vulnerabilit…
  continue reading
 
This episode is sponsored by P0 Security. Visit p0.dev/idac to learn why P0 is the easiest and fastest way to implement just-in-time, short-lived, and auditable access to your entire infrastructure stack, like servers, databases, Kubernetes clusters, cloud consoles, and cloud services, for users as well as non-human identities. In this sponsor spot…
  continue reading
 
The industry is obsessed with vulnerabilities. From vulnerability assessment to vulnerability management to exposure management and even zero days, we love to talk about vulnerabilities. But what about misconfiguration? By definition it's a vulnerability or weakness, but it doesn't have a CVE (common vulnerability enumeration). Should we ignore it?…
  continue reading
 
Time management is not about squeezing more into your day — it’s about doing the right things at the right time. In this episode, Nata Salvatori reveals her personal system for running multiple businesses without living in overwhelm. You’ll hear why delegation is the first step in her process, how she keeps track of every recurring task, and the ex…
  continue reading
 
Send us your questions, or thoughts on today's episode! In Episode 252 of Muscles and Management, Gerry welcomes Dr. Ismael Gallo—former professional baseball player, physical therapist, and founder of Baseball Flows—for a wide-ranging conversation on athlete development through movement, not gimmicks. Gallo brings a unique blend of experience from…
  continue reading
 
Increased Elasticsearch Recognizance Scans Our honeypots noted an increase in reconnaissance scans for Elasticsearch. In particular, the endpoint /_cluster/settings is hit hard. https://isc.sans.edu/diary/Increased%20Elasticsearch%20Recognizance%20Scans/32212 Microsoft Patch Tuesday Issues Microsoft noted some issues deploying the most recent patch…
  continue reading
 
Build AI agents to automate complex workflows—like project planning and go-to-market strategies—without writing code, all with Microsoft Copilot Studio. Use triggers to launch processes from signals like approval emails, connect to the right data with Model Context Protocol (MCP) for faster, more accurate responses, and coordinate multiple agents t…
  continue reading
 
A smaller attack surface should lead to a smaller list of CVEs to track, which in turn should lead to a smaller set of vulns that you should care about. But in practice, keeping something like a container image small has a lot of challenges in terms of what should be considered minimal. Neil Carpenter shares advice and anecdotes on what it takes to…
  continue reading
 
Keeping an Eye on MFA Bombing Attacks Attackers will attempt to use authentication fatigue by bombing users with MFA authentication requests. Rob is talking in this diary about how to investigate these attacks in a Microsoft ecosystem. https://isc.sans.edu/diary/Keeping+an+Eye+on+MFABombing+Attacks/32208 Critical Cisco Secure Firewall Management Ce…
  continue reading
 
Join hosts Jeff Steadman and Jim McDonald as they explore the critical intersection of attack surface management (ASM) and digital identity with Dan Lauritzen, Director with RSM Defense - RSM’s Managed Security Team. This episode dives deep into how identity has become a key component of your organization's attack surface and why breaking down silo…
  continue reading
 
Interview with Snehal Antani - Rethinking Risk-Based Vulnerability Management Vulnerability management is broken. Organizations basically use math to turn a crappy list into a slightly less crappy list, and the hardest part of the job as a CIO is deciding what NOT to fix. There has to be a better way, and there is... Segment Resources: https://hori…
  continue reading
 
Interview with Snehal Antani - Rethinking Risk-Based Vulnerability Management Vulnerability management is broken. Organizations basically use math to turn a crappy list into a slightly less crappy list, and the hardest part of the job as a CIO is deciding what NOT to fix. There has to be a better way, and there is... Segment Resources: https://hori…
  continue reading
 
Interview with Snehal Antani - Rethinking Risk-Based Vulnerability Management Vulnerability management is broken. Organizations basically use math to turn a crappy list into a slightly less crappy list, and the hardest part of the job as a CIO is deciding what NOT to fix. There has to be a better way, and there is... Segment Resources: https://hori…
  continue reading
 
SNI5GECT: Sniffing and Injecting 5G Traffic Without Rogue Base Stations Researchers from the Singapore University of Technology and Design released a new framework, SNI5GECT, to passively sniff and inject traffic into 5G data streams, leading to DoS, downgrade and other attacks. https://isc.sans.edu/diary/SNI5GECT%3A%20Sniffing%20and%20Injecting%20…
  continue reading
 
Welcome to episode 29 of the NAHAM Connections Podcast, highlighting the latest trends and insights shaping the world of Patient Access. In this episode, host Susan Milligan, CHAM, CRCR, is joined by Sean Buzzard, a certified QPR expert and behavioral health response specialist with Ensemble Health Partners, for a timely discussion on managing work…
  continue reading
 
AI and Faster Attack Analysis A few use cases for LLMs to speed up analysis https://isc.sans.edu/diary/AI%20and%20Faster%20Attack%20Analysis%20%5BGuest%20Diary%5D/32198 Proxyware Malware Being Distributed on YouTube Video Download Site Popular YouTube download sites will attempt to infect users with proxyware. https://asec.ahnlab.com/en/89574/ Xero…
  continue reading
 
Violet Abtahi is the CEO and Founder of Platonic, a company developing blockchain infrastructure to solve counterparty risk and privacy challenges in financial markets. With over a decade of experience in both traditional finance and blockchain technology, Violet transitioned from a mathematics background on Wall Street to building next-generation …
  continue reading
 
We kick things off with a deep dive into the Hackberry PI and how to build one. Then in the security news: Will Perplexity buy Chrome? ESP32 Bus Pirates Poisoned telemetry Docker image security Fully Open Source Quantum Sensors Securing your car, Flippers, and show me the money Bringing your printer and desktop to Starbucks Paying a ransom? You nee…
  continue reading
 
CVE-2017-11882 Will Never Die The (very) old equation editor vulnerability is still being exploited, as this recent sample analyzed by Xavier shows. The payload of the Excel file attempts to download and execute an infostealer to exfiltrate passwords via email. https://isc.sans.edu/diary/CVE-2017-11882%20Will%20Never%20Die/32196 Windows Kerberos El…
  continue reading
 
As brands grow more digital, the threats grow more personal. Attackers impersonate executives, spin up fake websites, and leak sensitive data — hurting business reputations and breaking customer trust. How do you defend your organization's reputation and customers' trust? Santosh Nair, Co-Founder and CTO at Styx Intelligence, joins Business Securit…
  continue reading
 
In a world that’s constantly online, are we losing what it means to truly connect? This week, Nata sits down with Sam and Elliot Archuleta, hosts of Something More Human and creators of the Return to Real Life event series—a growing movement that invites people to put down their phones and rediscover authentic human interaction. In this conversatio…
  continue reading
 
Send us your questions, or thoughts on today's episode! In Episode 251 of Muscles and Management, Gerry welcomes Travis Hash, Director of Strength and Conditioning and owner of Absolute Sports Performance, for a deep dive into what it really takes to run an effective athlete training program. From the logistics of scaling individualized programs in…
  continue reading
 
Microsoft Patch Tuesday https://isc.sans.edu/diary/Microsoft%20August%202025%20Patch%20Tuesday/32192 https://cymulate.com/blog/zero-click-one-ntlm-microsoft-security-patch-bypass-cve-2025-50154/ libarchive Vulnerability A libarchive vulnerability patched in June was upgraded from a low CVSS score to a critical one. Libarchive is used by compression…
  continue reading
 
We are starting out the 11th season of Crucial Tech is a bang. I am completing an article on a significant security hole in AI agents that shows how the tech industry makes security an afterthought every, damn, time. One of the companies pitching a solution is Teleport, which manages identity access and I had a friendly but contentious conversation…
  continue reading
 
Open source software is a massive contribution that provides everything from foundational frameworks to tiny single-purpose libraries. We walk through the dimensions of trust and provenance in the software supply chain with Janet Worthington. And we discuss how even with new code generated by LLMs and new terms like slopsquatting, a lot of the most…
  continue reading
 
Erlang OTP SSH Exploits A recently patched and easily exploited vulnerability in Erlang/OTP SSH is being exploited. Palo Alto collected some of the details about this exploit activity that they observed. https://unit42.paloaltonetworks.com/erlang-otp-cve-2025-32433/ WinRAR Exploited WinRAR vulnerabilities are actively being exploited by a number of…
  continue reading
 
In this episode of the Identity at the Center podcast, hosts Jeff and Jim dive into an enriching discussion with Shawna Hofer, Chief Information Security Officer at St. Luke's Health System in Idaho. Discover the vital link between cybersecurity and patient safety, the evolving role of AI in healthcare, and the challenges of integrating new technol…
  continue reading
 
Topic Segment - What's new at Black Hat? We're coming live from hacker summer camp 2025, so it seemed appropriate to share what we've seen and heard so far at this year's event. Adrian's on vacation, so this episode is featuring Jackie McGuire and Ayman Elsawah! News Segment Then, in the enterprise security news, Tons of funding! SentinelOne picks …
  continue reading
 
Topic Segment - What's new at Black Hat? We're coming live from hacker summer camp 2025, so it seemed appropriate to share what we've seen and heard so far at this year's event. Adrian's on vacation, so this episode is featuring Jackie McGuire and Ayman Elsawah! News Segment Then, in the enterprise security news, Tons of funding! SentinelOne picks …
  continue reading
 
Topic Segment - What's new at Black Hat? We're coming live from hacker summer camp 2025, so it seemed appropriate to share what we've seen and heard so far at this year's event. Adrian's on vacation, so this episode is featuring Jackie McGuire and Ayman Elsawah! News Segment Then, in the enterprise security news, Tons of funding! SentinelOne picks …
  continue reading
 
Google Paid Ads for Fake Tesla Websites Someone is setting up fake Tesla lookalike websites that attempt to collect credit card data from unsuspecting users trying to preorder Tesla products. https://isc.sans.edu/diary/Google%20Paid%20Ads%20for%20Fake%20Tesla%20Websites/32186 Compromising USB Devices for Persistent Stealthy Access USB devices, like…
  continue reading
 
Loading …
Copyright 2025 | Privacy Policy | Terms of Service | | Copyright
Listen to this show while you explore
Play