Search a title or topic

Over 20 million podcasts, powered by 

Player FM logo
show episodes
 
Cybersecurity guru Steve Gibson joins Leo Laporte every Tuesday. Steve and Leo break down the latest cybercrime and hacking stories, offering a deep understanding of what's happening and how to protect yourself and your business. Security Now is a must listen for security professionals every week. Records live every Tuesday at 4:30pm Eastern / 1:30pm Pacific / 20:30 UTC.
  continue reading
 
Artwork

1
IoT Security Podcast

Phosphorus Cybersecurity

icon
Unsubscribe
icon
Unsubscribe
Monthly
 
The IoT Security Podcast is powered by Phosphorus Cybersecurity. Join the conversation for the IoT Security Podcast — where xIoT meets Security. Learn more at https://phosphorus.io/podcast What is IoT Security Podcast? The IoT Security Podcast explores the Security of Things. The Internet of Things (IoT) is a giant network of over 50 billion connected devices, and it’s transforming the way we live and work. But a breakdown in security will prevent this IoT transformation. Join our host, Phil ...
  continue reading
 
Artwork

1
You Gotta Hack That

You Gotta Hack That

icon
Unsubscribe
icon
Unsubscribe
Monthly
 
Felix explores Internet of Things (IoT) and Operational Technology cyber security. Perfect for project managers, developers, and those learning about penetration testing in this niche area. Email Felix using [email protected] Get more information at the website: yougottahackthat.com Find You Gotta Hack That on LinkedIn and X @gotta_hack
  continue reading
 
Nozomi Networks security experts discuss topics that are important to the OT and IoT security community. This includes current cybersecurity threat intelligence, trends, news, and challenges. If you work in security or operations, or if you are a researcher, you’ll find episodes of interest.
  continue reading
 
Cybersecurity guru Steve Gibson joins Leo Laporte every Tuesday. Steve and Leo break down the latest cybercrime and hacking stories, offering a deep understanding of what's happening and how to protect yourself and your business. Security Now is a must listen for security professionals every week. Records live every Tuesday at 4:30pm Eastern / 1:30pm Pacific / 20:30 UTC.
  continue reading
 
Artwork
 
Welcome to the Security Weekly Podcast Network, your all-in-one source for the latest in cybersecurity! This feed features a diverse lineup of shows, including Application Security Weekly, Business Security Weekly, Paul's Security Weekly, Enterprise Security Weekly, and Security Weekly News. Whether you're a cybersecurity professional, business leader, or tech enthusiast, we cover all angles of the cybersecurity landscape. Tune in for in-depth panel discussions, expert guest interviews, and ...
  continue reading
 
Artwork

1
Next in Tech

S&P Global Market Intelligence

icon
Unsubscribe
icon
Unsubscribe
Weekly
 
Define your digital roadmap. Weekly podcasts featuring specialists from across the S&P Global Market Intelligence research team offer deep insights into what’s new and what’s next in technology, industries and companies as they design and implement digital infrastructure. To learn more, visit: https://www.spglobal.com/marketintelligence/en/topics/tmt-news-insights
  continue reading
 
Artwork
 
מפגשים עם האנשים בחזית הגנת הסייבר לתעשייה ותשתיות קריטיות Meetings with the people at the forefront of cyber defense for industry and critical infrastructure ICS SCADA OT IoT
  continue reading
 
Sync Up is your one-stop shop for all things OneDrive. Join hosts, Stephen Rice and Arvind Mishra, as they shed light on how OneDrive connects you to all of your files in Microsoft and enables you to share and work together from anywhere, and any device! Hear from experts behind the design and development of OneDrive, as well as customers and Microsoft MVPs! Each episode will give you news and announcements, tips and best practices for your OneDrive experience, and some fun and humor!
  continue reading
 
Nexus is a cybersecurity podcast hosted by Claroty Editorial Director Mike Mimoso. Nexus will feature discussions with cybersecurity leaders, researchers, innovators, and influencers, discussing the topics affecting cybersecurity professionals in OT, IoT, and IoMT environments. Nexus is formerly known as Aperture.
  continue reading
 
Artwork

1
Security Weekly News (Audio)

Security Weekly Productions

icon
Unsubscribe
icon
Unsubscribe
Weekly+
 
Concise, bi-weekly reviews of the most significant security stories, including malware, threats, government actions, and other cybersecurity topics. Hosted by Dr. Doug White. Co hosts: Josh Marpet, Aaran Leyland.
  continue reading
 
Artwork

1
Connect

Axis Communications

icon
Unsubscribe
icon
Unsubscribe
Monthly
 
Technology continues to advance at an increasingly rapid pace, so how can you stay on top of it? Learn from those who are pioneering new technologies and promoting entrepreneurial spirit! The Connect podcast encourages people to join prominent thought leaders as they explore today’s most timely and important topics around technology and network solutions. Connect brings listeners an engaging program featuring luminaries and trailblazers—from private industry, the public sector, and professio ...
  continue reading
 
Artwork

1
IoT Leaders

Nick Earle, CEO Eseye

icon
Unsubscribe
icon
Unsubscribe
Monthly
 
IoT Leaders is a podcast from Eseye that shares real IoT stories from the field about digital transformation swings and misses, lessons learned, and innovation strategies that work.In each episode, you’ll hear our conversations with top digitization leaders on how IoT is changing the world for the better. Let IoT Leaders be your guide to IoT, digital transformation, and innovation. Hosted on Acast. See acast.com/privacy for more information.
  continue reading
 
Artwork
 
SAM is the leading provider of cloud-native security and intelligence services for unmanaged networks and IoTs, covering upwards of 500 million connected devices globally. With its powerful and intuitive AI technology, SAM addresses the challenges of our hyperconnected world, in which an explosion of IoT devices exposes potential attack surfaces for companies and consumers alike. SAM's device-agnostic software provides deep ​network visibility to not only protect against sophisticated cyber- ...
  continue reading
 
Human-curated AI podcast for a lightweight technology discussion. I am a Network Engineer with two decades of experience working with Fortune 500 enterprise clients and tier 1 service providers. I also, operate a YouTube channel called SDN Tech Forum, where I share my knowledge and expertise on the latest networking technologies. My channel covers various topics, including Cisco SDA, SD-WAN,, Meraki, Thousandeyes, AWS, IoT, Cybersecurity, and more.
  continue reading
 
Artwork

1
The IOT Review

Industrial IOT Podcast by IrecaMedia

icon
Unsubscribe
icon
Unsubscribe
Monthly
 
We live in an era where businesses are digitally disrupted almost on a daily basis. The Industrial Internet of Things (IoT) is a unique framework to enable businesses exploit the power of digital innovations and emerge as disruptors (and winners). The IOT Review is a podcast specifically designed to empower business decision makers and IT practitioners with highly relevant technology and strategic insights that's needed to integrate IoT in their business models... to gain in-depth know-how o ...
  continue reading
 
Artwork

1
Emerging Cyber Risk

Max Aulakh & Joel Yonts

icon
Unsubscribe
icon
Unsubscribe
Monthly
 
Thought leaders and experts Max Aulakh (Ignyte) and Joel Yonts (Secure Robotics) cover subjects such as the development of AI, cyber security and the how the future looks in terms of cyber risk.
  continue reading
 
The Conversations of Things podcast series is hosted by Joe Dugandzic and features interesting guests from inside and outside the technology world, discussing everything from the smart home to general tech to all of the connected gadgets in our lives. Where is all of this technology taking us? Is it helpful or harmful in the long run? And, of course, discussions on recent tech news and the latest must-have devices.
  continue reading
 
Artwork

1
Security Boulevard Chat

Security Boulevard

icon
Unsubscribe
icon
Unsubscribe
Monthly
 
Security Boulevard is the destination for the security community to stay up on the latest news, discussion and analysis. Home of the Security Bloggers Network, Security Boulevard has more security related content than anywhere else on the web.
  continue reading
 
Artwork

1
IoT on Tap

Randy Pitcher, Chris Herrera

icon
Unsubscribe
icon
Unsubscribe
Monthly
 
IoT on Tap is a weekly podcast focusing on the Internet of Things from a developers perspective. Chris Herrera and Randy Pitcher from Hashmap, Inc will be talking about how someone can reasonably go from the "hello world" of IoT to actually doing advanced analytics and machine learning on their device data. Music: https://www.bensound.com
  continue reading
 
Artwork

1
Security Weekly News (Video)

Security Weekly Productions

icon
Unsubscribe
icon
Unsubscribe
Weekly+
 
Concise, bi-weekly reviews of the most significant security stories, including malware, threats, government actions, and other cybersecurity topics. Hosted by Dr. Doug White. Co hosts: Josh Marpet, Aaran Leyland.
  continue reading
 
A monthly podcast for physical security professionals to hear from leading figures and influencers in the industry and gain valuable insight into the sector’s latest trends and initiatives, as well as the many challenges facing the profession and how they can be overcome. On the agenda will be everything from security technology, such as video surveillance and access control, through to risk management strategies and building a holistic security organisational culture – and plenty more!
  continue reading
 
Speaking of Service uncovers practical ways to grow service revenue, control costs, and improve customer satisfaction. If you’re looking to innovate, gain a competitive edge, or just learn about the latest service trends, you’ve come to the right place! Also check: www.ptc.com/speakingofservice
  continue reading
 
Artwork

1
Embedded Executive Podcast

Rich Nass, Embedded Computing Design

icon
Unsubscribe
icon
Unsubscribe
Weekly
 
Each week, Embedded Computing Design’s EVP Rich Nass speaks to an executive in the embedded industry to understand what’s happening with the latest products, standards, and trends. The frank discussions reveal the real, behind the scenes issues, so the design community knows what’s coming down the pike. Topics covered in artificial intelligence, machine learning, embedded systems, internet of things, industrial automation, automotive applications, open source and more.
  continue reading
 
Valorem Reply, part of the Reply Group companies, is a business innovation and transformation firm focused on driving change with unique digital solutions, strategic technology investments and design-led user experiences. Through the expertise of our people and power of Microsoft technologies, our innovative strategies and solutions securely and rapidly transform the way our clients do business. Follow our podcast to get insights on the latest digital transformation trends & updates on Micro ...
  continue reading
 
Welcome to "Analyze Happy: Crafting Your Modern Data Estate", the podcast where data meets delight! Dive into the world of modern data estate tools and discover how to harness advanced analytics, data governance, and AI transformation to accelerate growth in your organization. With a spotlight on the Microsoft ecosystem—think Fabric, Azure Databricks, Power Platform, IoT Edge, and Real-Time Intelligence—we’ll explore best practices, actionable insights, and the latest innovations to build a ...
  continue reading
 
Artwork

1
Embedded Insiders

Embedded Computing Design

icon
Unsubscribe
icon
Unsubscribe
Monthly
 
Hosted on the www.embeddedcomputing.com website, the Embedded Insiders Podcast is a fun electronics talk show for hardware design engineers, software developers, and academics. Organized by Tiera Oliver, Associate Editor, and Rich Nass, EVP, of Embedded Computing Design, each episode highlights embedded industry veterans who tackle trends, news, and new products for the embedded, IoT, automotive, security, artificial intelligence, edge computing, and other technology marketplaces in a light ...
  continue reading
 
Artwork

1
The BLC Connection

Ben Lomand Connect

icon
Unsubscribe
icon
Unsubscribe
Monthly
 
The BLC Connection Podcast is a fun and informative show from Ben Lomand Connect that answers your questions about the internet, Wi-Fi, home security and more, and brings you information on the stories and events in “Ben Lomand Country.” Bryan, Karen and Micah take you behind the scenes of Ben Lomand Connect, where the cooperative connects Middle Tennessee with the latest in communications technology and with businesses that are making a difference in our service territory. The BLC Connectio ...
  continue reading
 
Artwork

1
Elevate the Edge

Maribel Lopez & Jo Peterson

icon
Unsubscribe
icon
Unsubscribe
Monthly
 
Elevate the Edge helps companies understand what edge computing is and how the market will evolve. The podcast will help technology leaders build successful strategies that deliver business value by learning what works from the masters and how to avoid pitfalls. ElevateTheEdge.com
  continue reading
 
Artwork
 
Hacked Off demystifies the world of cybersecurity. Hosted by Secarma's Managing Director, Holly Grace Williams, it features weekly interviews delving beneath the headlines of the latest hacks, breaches and vulnerabilities, providing expert advice on how to stay safe online. This podcast is brought to you by global cybersecurity and penetration testing company, Secarma.
  continue reading
 
Artwork
 
Join us at the intersection of networking and security! Whether you’re fending off ransomware attacks, securing remote workers, hunting for rogue IoT devices, or gearing up for your latest compliance audit, Packet Protector provides practical information that IT and infrastructure pros can put to work. Every episode covers the latest security headlines and then drills into essential topics to provide technical and strategic insights on wired and wireless network security, access control, clo ...
  continue reading
 
Artwork

1
City of Tomorrow

We Empower Innovators

icon
Unsubscribe
icon
Unsubscribe
Monthly
 
Going “smart” is an aspiration of many cities around the world. Today, smart technology solutions are connecting citizens to their communities in new ways, solving issues to do with efficiency, sustainability and security. The City of Tomorrow Podcast series explores how different stakeholders in the Smart City ecosystem can come together to build safer, more efficient and sustainable cities of the future. Led by Digital Transformation Expert, Manuela Krull, who is also the Managing Director ...
  continue reading
 
Loading …
show series
 
CISA, Microsoft warn of Windows zero-day used in attack on ‘major’ Turkish defense org 40K IoT cameras worldwide stream secrets to anyone with a browser Marks & Spencer begins taking online orders again, out for seven weeks due to cyberattack Huge thanks to our sponsor, Vanta Is your manual GRC program slowing you down? There’s something more effic…
  continue reading
 
Hash Salehi, Reserve Engineer and Founder of RECESSIM, joins host Philip Wylie to demystify the world of hardware hacking and security, highlighting niche but critical vulnerability research in IoT and embedded devices. Through recounting his own experiences, from customizing low-cost fault injection attacks on automotive microprocessors to reverse…
  continue reading
 
Link to episode page This week’s Cyber Security Headlines – Week in Review is hosted by Rich Stroffolino with guest Christina Shannon, CIO, KIK Consumer Products Thanks to our show sponsor, Vanta Is your manual GRC program slowing you down? There’s something more efficient than spreadsheets, screenshots, and manual processes — Vanta. With Vanta, GR…
  continue reading
 
Send us a text n this episode, we dive deep into SAP’s strategic integration with Databricks—powered by SAP Business Data Cloud (BDC)—to explore how enterprises are unlocking AI, machine learning, and real-time analytics on top of their most critical business data without costly data replication. We’ll break down: What SAP Business Data Cloud is an…
  continue reading
 
Send us a text In this episode, we explore the evolving landscape of healthcare data governance and regulatory compliance. From HIPAA and GDPR to emerging cybersecurity mandates, we unpack the critical frameworks shaping how patient data is protected in mid-sized to enterprise healthcare organizations. Tune in to learn: What HIPAA, HITECH, GDPR, an…
  continue reading
 
Send us a text In this deep-dive episode, we unpack the technical and strategic implications of integrating Databricks with Microsoft Fabric. As enterprises increasingly operate across hybrid data ecosystems, ensuring seamless interoperability between platforms is critical. This episode covers the full landscape—OneLake mounting techniques, Delta S…
  continue reading
 
Send us a text In this episode, we dive deep into how Microsoft Fabric stacks up against Azure Databricks' Unity Catalog when managing confidential and highly regulated data like Personally Identifiable Information (PII). You'll learn: The current state of Fabric's governance features, including Purview integration, access control via Azure AD, and…
  continue reading
 
Send us a text In this episode, we unpack what it truly means to be AI-ready in today’s enterprise landscape. While many companies rush into “shiny AI use cases,” we go deeper—breaking down the three pillars of readiness: data quality, infrastructure maturity, and human capital. But that’s just the starting point. Drawing from the latest Cisco AI R…
  continue reading
 
Hackers attacks target Microsoft Entra ID accounts using pentesting tool Google Cloud and Cloudflare outages reported House Homeland Chairman Mark Green announces his departure Huge thanks to our sponsor, Vanta Is your manual GRC program slowing you down? There’s something more efficient than spreadsheets, screenshots, and manual processes — Vanta.…
  continue reading
 
This week: You got a Bad box, again Cameras are expose to the Internet EU and connected devices Hydrophobia NVRAM variables Have you heard about IGEL Linux? SSH and more NVRAM AI skeptics are nuts, and AI doesn't make you more efficient Trump Cybersecurity orders I think I can root my Pixel 6 Decentralized Wordpres plugin manager Threat actor namin…
  continue reading
 
Send us a text In this episode of Embedded Insiders, we’re joined by RISC-V’s newest CEO, Andrea Gallo, who outlines his vision for the company’s future. From accelerating ecosystem growth to his expectations for current architectures, Gallo shares his strategy to shape the next chapter of RISC-V. Later, Rich and Vin return with another Dev Talk, f…
  continue reading
 
Want a quick download of the latest releases, updates, and tips for Microsoft 365 Copilot? With ongoing updates and new releases, it can be hard to keep up with all the great things you can do in M365 Copilot. Valorem Reply’s Modern Work experts are offering a Microsoft 365 Copilot Newsroom series where we compile the most important news and learni…
  continue reading
 
Want a quick download of the latest releases, updates, and tips for Microsoft 365 Copilot? With ongoing updates and new releases, it can be hard to keep up with all the great things you can do in M365 Copilot. Valorem Reply’s Modern Work experts are offering a Microsoft 365 Copilot Newsroom series where we compile the most important news and learni…
  continue reading
 
הנגשת נושא הסייבר להנהלה בכירה ודירקטוריון היא נושא מורכב, נדרשות יכולות לגשר בין היעדים העסקיים של הארגון, הפערים בשפה והשינוי בתרבות הארגונית על מנת להגן על הארגון בצורה מיטבית הדס תמם בן אברהם סגנית הדיקן בקריה האקדמית אונו ונחשון פינקו מייסד ובעלים בניאטק סייבר סקיורטי ואוונגליסט סייבר בשיחה עם יפעת גודינר הבעלים של גודירקט. יפעת משמשת כיועצת ל…
  continue reading
 
Zero-click data leak flaw in Copilot Operation Secure targets infostealer operations FIN6 targets recruiters Huge thanks to our sponsor, Vanta Is your manual GRC program slowing you down? There’s something more efficient than spreadsheets, screenshots, and manual processes — Vanta. With Vanta, GRC can be so. much. easier—while also strengthening yo…
  continue reading
 
ISO 8800 is a standard aimed at functional safety in automotive applications, pertaining to artificial intelligence. It provides the guidelines for integrating AI systems into any safety-related functions of road vehicles. In full disclosure, I wasn’t aware of this standard, and I was frankly surprised I wasn’t. To remedy the situation, I invited J…
  continue reading
 
This week, it’s time for security money. The index is up, but the previous quarterly results were brutal. In the leadership and communications segment, Get out of the audit committee: Why CISOs need dedicated board time, Quietly Burning Out? What To Do When Your Leadership Starts Lacking, How to rethink leadership to energize disengaged employees, …
  continue reading
 
In memoriam: Bill Atkinson Meta native apps & JavaScript collude for a localhost local mess. The EU rolls out its own DNS4EU filtered DNS service. Ukraine DDoS's Russia's Railway DNS ... and... so what? The Linux Foundation creates an alternative Wordpress package manager. Court tells OpenAI it must NOT delete ANYONE's chats. Period! :( A CVSS 10.0…
  continue reading
 
In memoriam: Bill Atkinson Meta native apps & JavaScript collude for a localhost local mess. The EU rolls out its own DNS4EU filtered DNS service. Ukraine DDoS's Russia's Railway DNS ... and... so what? The Linux Foundation creates an alternative Wordpress package manager. Court tells OpenAI it must NOT delete ANYONE's chats. Period! :( A CVSS 10.0…
  continue reading
 
הרשתות והקבוצות מלאות בפוסטים על ג'וניורים שמנסים להשתלב בשוק ההייטק בכלל והסייבר בפרט, מצב לא פשוט בשוק רווי במחפשי עבודה. הפודקאסט נולד אחרי שאורלי קטבי ואיתי טוראס פנו אלי באחד הכנסים ורצו לדבר על נושא הג'וניורים, שניהם מאוד פעילים בנושא ונראה לי טבעי שבמקום שאנחנו מדברים עם מנהלים בכירים תהיה התייחסות גם לאלו שעושים את צעדיהם הראשונים בתחום. הד…
  continue reading
 
Our security news roundup discusses the compromise of thousands of ASUS routers and the need to perform a full factory reset to remove the malware, why Microsoft allows users to log into Windows via RDP using revoked passwords, and the ongoing risk to US infrastructure from “unexplained communications equipment” being found in Chinese-made electric…
  continue reading
 
CISA has been championing Secure by Design principles. Many of the principles are universal, like adopting MFA and having opinionated defaults that reduce the need for hardening guides. Matthew Rogers talks about how the approach to Secure by Design has to be tailored for Operational Technology (OT) systems. These systems have strict requirements o…
  continue reading
 
Brute forcing phone numbers linked to Google accounts The Guardian launches Secure Messaging service United Natural Foods hit by cyberattack Huge thanks to our sponsor, Vanta Is your manual GRC program slowing you down? There’s something more efficient than spreadsheets, screenshots, and manual processes — Vanta. With Vanta, GRC can be so. much. ea…
  continue reading
 
A set of questions are being asked about whether the velocity of datacenter build outs is wavering. Analyst Dan Thompson returns to the podcast to explore the realities of the market with host Eric Hanselman. There are some facts that raised the questions, including Microsoft demurring on some datacenter projects, and they have fueled concerns that…
  continue reading
 
Live from the M365 Community Conference in Las Vegas, Stephen and Arvind break down the biggest announcements in OneDrive, SharePoint, and Microsoft 365—from mind-blowing Copilot demos to Sync deployment best practices. Plus, guest Vlad Catrinescu shares insights on governance, Copilot readiness, and the power of community. Whether you’re an admin,…
  continue reading
 
Segment 1 - Enterprise Security News, Live at IDV This week, in the enterprise security news, Acquisitions potential IPOs Terminator Salvation in real life First $1B one-employee business? Mikko puts in his notice Pitch Black in real life, and more! Segment 2 - Interview with Dr. Tina Srivastava The #1 cause of data breaches is stolen credentials. …
  continue reading
 
Presidential cyber executive order signed Neuberger warns of U.S. infrastructure’s cyberattack weakness Mirai botnet infects TBK DVR devices Huge thanks to our sponsor, Vanta Is your manual GRC program slowing you down? There’s something more efficient than spreadsheets, screenshots, and manual processes — Vanta. With Vanta, GRC can be so. much. ea…
  continue reading
 
Loading …
Copyright 2025 | Privacy Policy | Terms of Service | | Copyright
Listen to this show while you explore
Play