Clear To Send is a podcast about wireless engineering where we educate you on WiFi technology, talk about design tips, troubleshooting, interviews, and the tools.
…
continue reading
Network Engineering Podcasts
Join Chris and Tim as they delve into the Cloud Networking world! The goal of this podcast is to help Network Engineers with their Cloud journey. Follow us on Twitter @Cables2Clouds | Co-Hosts Twitter Handles: Chris - @bgp_mane | Tim - @juangolbez
…
continue reading
Join us as we explore the world of Network Engineering! In each episode, we explore new topics, talk about technology, and interview people in our industry. We peek behind the curtain and get insights into what it's like being a network engineer - and spoiler alert - it's different for everyone! For more information check out our website https://artofnetworkengineering.com | Be sure to follow us on Twitter and Instagram as well @artofneteng | Co-Host Twitter Handle: Andy @andylapteff
…
continue reading
Chain of Events. Cause and Effect. We analyse what went right and what went wrong as we discover that many outcomes can be predicted, planned for and even prevented.
…
continue reading
Deception, influence, and social engineering in the world of cyber crime.
…
continue reading
Gain unparalleled access to the minds of industry-leading CIOs, CTOs, and CISOs. Enjoy episodes filled with expert insights, inspiring stories, and trend analysis, all brought to you by the people shaping the future of technology. Whether you're an IT professional, aspiring tech leader, or general tech enthusiast, IT Visionaries has something for everyone. Don't miss out on the chance to learn from the best – subscribe now! Produced by the team at Mission.org and brought to you by Brightspot.
…
continue reading
Fire Engineering Magazine’s been devoted to the training interests of firefighters since 1877. Listen to our lineup of podcasts featuring hosts from around the fire service.
…
continue reading
Pragmatic is a discussion show contemplating the practical application of technology. Exploring the real world trade offs we look at how great ideas are transformed into products and services that can change our lives. Nothing is as simple as it seems.
…
continue reading
Join us at the intersection of networking and security! Whether you’re fending off ransomware attacks, securing remote workers, hunting for rogue IoT devices, or gearing up for your latest compliance audit, Packet Protector provides practical information that IT and infrastructure pros can put to work. Every episode covers the latest security headlines and then drills into essential topics to provide technical and strategic insights on wired and wireless network security, access control, clo ...
…
continue reading
Helping you fall asleep. Let me talk to you. Just for a few moments
…
continue reading
This is a podcast for people who want to learn more about Network Automation, Python, and Network Engineering in general.
…
continue reading
Occasional podcast series featuring many of the biggest personalities from the world of Scottish business. Originally launched, produced and hosted by Fraser Allen, and now run by the Scottish Business Network.
…
continue reading
How people connect and learn has evolved in the 50+ years since ACPE was formed. But our mission and ethos haven’t: (1) increasing collaboration and professional development opportunities and (2) fostering long-lasting relationships among our members. We’re eager to keep diversifying ways to connect, learn, and have fun together. The Plugged In podcast is a place for us to amplify the voices of our colleagues and celebrate the work we do in education technology. Join hosts Marc Elliott and R ...
…
continue reading
Honest Conversations about working & succeeding in the tech industry.
…
continue reading
Technical interviews about software topics.
…
continue reading
Welcome to the Security Weekly Podcast Network, your all-in-one source for the latest in cybersecurity! This feed features a diverse lineup of shows, including Application Security Weekly, Business Security Weekly, Paul's Security Weekly, Enterprise Security Weekly, and Security Weekly News. Whether you're a cybersecurity professional, business leader, or tech enthusiast, we cover all angles of the cybersecurity landscape. Tune in for in-depth panel discussions, expert guest interviews, and ...
…
continue reading
Wireless Network Engineering Podcast
…
continue reading
Interviews with Neuroscientists about their New Books Support our show by becoming a premium member! https://newbooksnetwork.supportingcast.fm/neuroscience
…
continue reading
Exploring the intersection of digital infrastructure and the humans who depend on it. https://underlay.show
…
continue reading
Josh Tomar is Agent Conroy, a former operative on the run from a dangerous, secret organization called Redwood Bureau. The Bureau researches and captures supernatural entities usually at the cost of human lives, and Agent Conroy is here to leak their reports to the public. New episodes every other Tuesday.
…
continue reading
Retired Navy SEAL, Jocko Willink and Director, Echo Charles discuss discipline and leadership in business, war, relationships and everyday life.
…
continue reading
The first podcast on control theory. inControl shop: https://incontrolpodcast.myshopify.com/
…
continue reading
Introducing The Techtual Talk - the ultimate podcast for exploring the exciting world of technology and promoting diversity in the industry! Join us as we delve into the many avenues available in tech, including non-technical roles, and shine a spotlight on the representation of African Americans and other people of color in this space. We believe that every child, regardless of their background, should have the opportunity to discover and pursue a fulfilling career in technology. With The T ...
…
continue reading
Welcome to the Security Weekly Podcast Network, your all-in-one source for the latest in cybersecurity! This feed features a diverse lineup of shows, including Application Security Weekly, Business Security Weekly, Paul's Security Weekly, Enterprise Security Weekly, and Security Weekly News. Whether you're a cybersecurity professional, business leader, or tech enthusiast, we cover all angles of the cybersecurity landscape. Tune in for in-depth panel discussions, expert guest interviews, and ...
…
continue reading
The Nuclear Leadership Network was established to fill a gap in leadership development. By the time leaders hit a certain level in their path, it becomes more and more difficult to know what development steps to take to ready yourself for a shot at the top executive leadership roles in the Nuclear Industry. As you climb the ladder the number of people available to help you on your path become fewer and fewer, and your journey becomes a much more personal one. There will always be a need to c ...
…
continue reading
Your Station For All Things Geek
…
continue reading
The Ciena Network Insights Podcast brings together thought leaders, subject matter experts, and tech influencers to discuss the innovations and trends shaping our digital world. Join us every month for engaging conversations on telecom networks, digital transformation, sustainability, and more.
…
continue reading
We discuss everything that is, was, or might be in the world of Doctor Who. Discussing Who features interviews, reviews, news, and more about our favorite Time Lord. It’s an adventure in space and time, and you’re invited! Discussing Who is part of the Discussing Network. Hosted by Kyle Jones, Clarence Brown, and Lee Shackleford.
…
continue reading
The daily cybersecurity news and analysis industry leaders depend on. Published each weekday, the program also includes interviews with a wide spectrum of experts from industry, academia, and research organizations all over the world.
…
continue reading
Learn how to become a World-Class Playback Engineer. Hosted by Ableton Live Certified Trainer Will Doggett. New Episodes every Monday @ 10AM ET.
…
continue reading
A brief daily summary of what is important in information security. The podcast is published every weekday and designed to get you ready for the day with a brief, usually 5 minutes long summary of current network security related events. The content is late breaking, educational and based on listener input as well as on input received by the SANS Internet Storm Center. You may submit questions and comments via our contact form at https://isc.sans.edu/contact.html .
…
continue reading
The pod dedicated to the hardworking network operators who keep the bitpipes running smoothly. We focus on sharing best practices, the operations tool stack, and engage with vendors and solution providers to get insights into new technologies and tools so you can make informed decisions for your ops environment. Hosted by your friendly neighborhood internet plumber, Scott Robohn.
…
continue reading
Part of Rowan's Profcasts network, everyday engineering is a technical based podcast based around some of the hosts hobbies as well as popular culture.
…
continue reading
The aviation aftermarket is a complicated, fragmented, global business. Listen in as Aviation Week’s MRO editors explore the ins and outs of the industry.
…
continue reading
We're a conversational podcast, bringing you an array of highly interesting topics from all fields. We're also starting a podcasting network, __ for non __, and are looking for podcasters who might be interested in joining us.
…
continue reading
The Handmade programming community has a different perspective on software development. In this show, we sit down with Handmade programmers and let them show off their work and share what they've been learning.
…
continue reading
Created by Professor Patrick Zoro The podcast aims to capture the latest trends in Data analytics, Asset Management, Blockchain, Risk Management. Patrick Zoro is also the program manager of the Master of Financial Engineering program at Lehigh University https://cbe.lehigh.edu/academics/graduate/master-analytical-finance
…
continue reading
Technical interviews about software topics.
…
continue reading

1
Fireground Strategies: Heat, Hydration, and The Human Factor
1:08:17
1:08:17
Play later
Play later
Lists
Like
Liked
1:08:17Fireground Strategies: Heat, Hydration, and The Human Factor In this episode of Fireground Strategies, hosts Jim Duffy and Anthony Avillo cover the critical challenges firefighters face battling extreme heat. They explore how scorching temperatures and high humidity impact operational effectiveness and safety, emphasizing the strain on cardiovascul…
…
continue reading

1
Perspectives on Leadership: Advocacy, Connection, and Succession with Lindsay Judah
57:03
57:03
Play later
Play later
Lists
Like
Liked
57:03Perspectives on Leadership: Advocacy, Connection, and Succession with Lindsay Judah In this insightful episode of Perspectives on Leadership, host Steve Shaw welcomes Lindsay Judah to explore the multifaceted responsibilities that define modern fire service leadership. Judah shares her extensive journey from firefighter to rescue chief and consulta…
…
continue reading

1
Episode 102: Stephen O’Donnell on Engineering, Enterprise, and Giving Back
46:24
46:24
Play later
Play later
Lists
Like
Liked
46:24In this insightful episode of the Scottish Business Network Podcast, host Ewan Dunbar is joined by Stephen O’Donnell, Chief Operating Officer of the Scottish Business Network, whose remarkable career spans engineering, global tech leadership, private equity, and now philanthropy.Stephen shares a deeply personal and inspiring journey—from humble beg…
…
continue reading

1
CTS 363: Mobility Field Day 13 – Arista Networks
13:38
13:38
Play later
Play later
Lists
Like
Liked
13:38In this episode, we dive into Arista Networks’ bold moves in the campus networking space, where they’re seeing a wave of customers migrating from legacy vendors due to lack of visibility, complex management, and poor support. Arista’s differentiators—like a tri-band multifunction radio, client simulation for network assurance, integrated WIPS, and …
…
continue reading

1
International Student Networking for Quant Jobs in the U.S
46:36
46:36
Play later
Play later
Lists
Like
Liked
46:36In this insightful episode, I sit down with Edson Bope, a master’s student from Zimbabwe studying Financial Engineering in Pennsylvania, who shares his journey navigating the competitive U.S. job market in search of quantitative finance roles.Edson opens up about the unique challenges international students face, from visa constraints to cultural d…
…
continue reading

1
North Korea, ransomware, social engineering, AI, Apple, Drugs & Iran - SWN #491
28:50
28:50
Play later
Play later
Lists
Like
Liked
28:50North Korea, ransomware, social engineering, AI, Apple, Drugs & Iran on this edition of the Security Weekly News! Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-491
…
continue reading
Send us a text Drowning in digital clutter? You're not alone. In this practical deep-dive, Andy and Jeff share the productivity systems that have transformed their professional lives as network engineers. We explore how Asana's Kanban-style boards create visual workflow management that prevents important tasks from falling through the cracks. Wheth…
…
continue reading

1
ByteDance’s Container Networking Stack with Chen Tang
47:57
47:57
Play later
Play later
Lists
Like
Liked
47:57ByteDance is a global technology company operating a wide range of content platforms around the world, and is best known for creating TikTok. The company operates at a massive scale, which naturally presents challenges in ensuring performance and stability across its data centers. It has over a million servers running containerized applications, an…
…
continue reading

1
SANS Stormcast Friday, June 27th, 2025: Open-VSX Flaw; Airoha Bluetooth Vulnerablity; Critical Cisco Identity Service Engine Vuln; (#)
6:48
6:48
Play later
Play later
Lists
Like
Liked
6:48SANS Stormcast Friday, June 27th, 2025: Open-VSX Flaw; Airoha Bluetooth Vulnerablity; Critical Cisco Identity Service Engine Vuln; Open-VSX Flaw Puts Developers at Risk A flaw in the open-vsx extension marketplace could have let to the compromise of any extension offered by the marketplace. https://blog.koi.security/marketplace-takeover-how-we-coul…
…
continue reading

1
Network engineers already understand Kubernetes better than they think.
38:10
38:10
Play later
Play later
Lists
Like
Liked
38:10Send us a text The invisible threads connecting Kubernetes and networking infrastructure form the backbone of today's cloud-native world. In this revealing conversation with Marino Wijay from Kong, we unravel the complex relationship between traditional networking concepts and modern container orchestration. Marino brings a unique perspective as so…
…
continue reading

1
Kevin J. Tracey, "The Great Nerve: The New Science of the Vagus Nerve and How to Harness Its Healing Reflexes" (Penguin, 2025)
32:55
32:55
Play later
Play later
Lists
Like
Liked
32:55The vagus nerve is fundamental to our health and vitality, coordinating critical functions from the precise heartbeat we need to exercise or rest to the balance of appetite and digestion. Made up of 200,000 fibers, the vagus nerve sends thousands of electrical signals every second between your brain and your most important organs. Yet despite its e…
…
continue reading

1
MK Palmore: Lead from where you stand. [CISO] [Career Notes]
9:10
9:10
Play later
Play later
Lists
Like
Liked
9:10Please enjoy this encore of Career Notes. Director of Google Cloud's Office of the CISO, MK Palmore, dedicated much of his life to public service and now brings his experience working for the greater good to the private sector. A graduate of the US Naval Academy, including the Naval Academy Prep School that he calls the most impactful educational e…
…
continue reading
Today we are joined by Selena Larson, Threat Researcher at Proofpoint, and co-host of Only Malware in the Building, as she discusses their work on "Amatera Stealer - Rebranded ACR Stealer With Improved Evasion, Sophistication." Proofpoint researchers have identified Amatera Stealer, a rebranded and actively developed malware-as-a-service (Maa…
…
continue reading

1
The Training Officer: Leadership, Legacy, and Mental Health with Danny Arroyo
1:36:28
1:36:28
Play later
Play later
Lists
Like
Liked
1:36:28The Training Officer: Leadership, Legacy, and Mental Health with Danny Arroyo In this episode of The Training Officer, Danny Arroyo of Perth Amboy, NJ, shares candid insights from his 23-year career in the fire service. As a battalion chief and training officer, Arroyo discusses the critical balance of leading training divisions, managing seasonal …
…
continue reading

1
Tapjacking, ZuChe, PerfektBlue, McHacking, OT in the IT, Add Ons, Josh Marpet... - SWN #493
33:42
33:42
Play later
Play later
Lists
Like
Liked
33:42Tapjacking, ZuChe, PerfektBlue, McHacking, OT in the IT, Add Ons, Josh Marpet, and More on this episode of the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-493
…
continue reading
Fortinet patches a critical flaw in its FortiWeb web application firewall. Hackers are exploiting a critical vulnerability in Wing FTP Server. U.S. Cyber Command’s fiscal 2026 budget includes a new AI project. Czechia’s cybersecurity agency has issued a formal warning about Chinese AI company DeepSeek. The DoNot APT group targets Italy’s Ministry o…
…
continue reading

1
Rebecca Lemov, "The Instability of Truth: Brainwashing, Mind Control, and Hyper-Persuasion" (Norton, 2025)
37:42
37:42
Play later
Play later
Lists
Like
Liked
37:42Because brainwashing affects both the world and our observation of the world, we often don’t recognize it while it’s happening—unless we know where to look. As Rebecca Lemov writes in The Instability of Truth, “Brainwashing erases itself.” What we call brainwashing is more common than we think; it is not so much what happens to other people as what…
…
continue reading

1
SANS Stormcast Friday, July 11th, 2025: SSH Tunnel; FortiWeb SQL Injection; Ruckus Unpatched Vuln; Missing Motherboard Patches; (#)
5:49
5:49
Play later
Play later
Lists
Like
Liked
5:49SANS Stormcast Friday, July 11th, 2025: SSH Tunnel; FortiWeb SQL Injection; Ruckus Unpatched Vuln; Missing Motherboard Patches; SSH Tunneling in Action: direct-tcp requests Attackers are compromising ssh servers to abuse them as relays. The attacker will configure port forwarding direct-tcp connections to forward traffic to a victim. In this partic…
…
continue reading

1
Citrixbleed 2, Hardware Hacking, and Failed Bans - PSW #882
2:06:05
2:06:05
Play later
Play later
Lists
Like
Liked
2:06:05This week in the security news: Citrixbleed 2 and so many failures Ruckus leads the way on how not to handle vulnerabilities When you have no egress Applocker bypass So you bought earbuds from TikTok More gadgets and the crazy radio Cheap drones and android apps Best Mario Kart controller ever VSCode: You're forked Bluetooth earbuds and vulnerabili…
…
continue reading
UK police make multiple arrests in the retail cyberattack case. French authorities arrest a Russian basketball player at the request of the U.S. A German court declares open season on Meta’s tracking pixels. The European Union unveils new rules to regulate artificial intelligence. London’s Iran International news confirms cyberattacks from Banished…
…
continue reading

1
Episode 87: How Meta Reimagined OOB Management in the Data Center
19:04
19:04
Play later
Play later
Lists
Like
Liked
19:04On this episode, Mike “MJ” Joseph, who manages the infrastructure network engineering team at Meta, joins Ciena's Mark Bieberich to discuss innovation in out-of-band (OOB) management networks, which are essential for initial device commissioning, disaster recovery, remote troubleshooting, and secure lifecycle management. MJ and Mark explore Meta's …
…
continue reading
Wiz is a cloud security platform that helps organizations identify and remediate risks across their cloud environments. The company’s platform scans layers of the cloud stack, including virtual machines, containers, and serverless configurations, to detect vulnerabilities and misconfigurations in context. The Model Context Protocol, or MCP, is emer…
…
continue reading
Wiz is a cloud security platform that helps organizations identify and remediate risks across their cloud environments. The company’s platform scans layers of the cloud stack, including virtual machines, containers, and serverless configurations, to detect vulnerabilities and misconfigurations in context. The Model Context Protocol, or MCP, is emer…
…
continue reading
Wiz is a cloud security platform that helps organizations identify and remediate risks across their cloud environments. The company’s platform scans layers of the cloud stack, including virtual machines, containers, and serverless configurations, to detect vulnerabilities and misconfigurations in context. The Model Context Protocol, or MCP, is emer…
…
continue reading

1
Turning 90 Years of Data into AI-Powered Insights
37:03
37:03
Play later
Play later
Lists
Like
Liked
37:03Discover how to turn decades of data into a competitive edge, build lasting customer relationships beyond the first click, and apply AI in ways that truly drive impact. Joining us is Vineet Mahajan, CTO of US News & World Report, who shares how he’s led the 90-year-old brand through a sweeping digital transformation. From rearchitecting infrastruct…
…
continue reading
This week, our hosts Dave Bittner, Joe Carrigan, and Maria Varmazis (also host of the T-Minus Space Daily show) are back sharing the latest in social engineering scams, phishing schemes, and criminal exploits that are making headlines. We start with a ton of follow-up—from a sextortio…
…
continue reading

1
SANS Stormcast Thursday, July 10th, 2025: Internal CA with ACME; TapJacking on Android; Adobe Patches; (#)
5:18
5:18
Play later
Play later
Lists
Like
Liked
5:18SANS Stormcast Thursday, July 10th, 2025: Internal CA with ACME; TapJacking on Android; Adobe Patches; Setting up Your Own Certificate Authority for Development: Why and How. Some tips on setting up your own internal certificate authority using the smallstep CA. https://isc.sans.edu/diary/Setting%20up%20Your%20Own%20Certificate%20Authority%20for%20…
…
continue reading
Patch Tuesday. An Iranian ransomware group puts a premium on U.S. and Israeli targets. Batavia spyware targets Russia’s industrial sector. HHS fines a Texas Behavioral Health firm for failed risk analysis. The Anatsa banking trojan targets financial institutions in the U.S. and Canada. Hackers abuse a legitimate commercial evasion framework to pack…
…
continue reading

1
How To Interview With a Tech Giant: Part 3
34:32
34:32
Play later
Play later
Lists
Like
Liked
34:32Send us a text Cloud network engineering interviews at tech giants require specialized knowledge beyond traditional networking – particularly when it comes to cloud-native services. In this final installment of our interview preparation series with Kam Agahian, we explore the specialized networking services that frequently appear in technical asses…
…
continue reading

1
SolarWinds Settlement, Upgrade Your Leadership Instincts to Build Your Legacy - BSW #403
51:58
51:58
Play later
Play later
Lists
Like
Liked
51:58SEC settles with SolarWinds. We react! In the leadership and communications section, The Skills and Habits Aspiring CEOs Need to Build, Why People Really Quit — And How Great Managers Make Them Want to Stay, The Small Actions That Become Your Legacy, and more! Visit https://www.securityweekly.com/bsw for all the latest episodes! Show Notes: https:/…
…
continue reading

1
SolarWinds Settlement, Upgrade Your Leadership Instincts to Build Your Legacy - BSW #403
51:58
51:58
Play later
Play later
Lists
Like
Liked
51:58SEC settles with SolarWinds. We react! In the leadership and communications section, The Skills and Habits Aspiring CEOs Need to Build, Why People Really Quit — And How Great Managers Make Them Want to Stay, The Small Actions That Become Your Legacy, and more! Show Notes: https://securityweekly.com/bsw-403…
…
continue reading

1
498: Regardless of the Distractions, You Know What To Do. Do It.
1:29:53
1:29:53
Play later
Play later
Lists
Like
Liked
1:29:53>Join Jocko Underground< >Explore Jocko Store< Exploring deeper themes from the Marine Corps Institute’s Leadership Credo. Leadership isn’t about rank—it’s about earning trust through action. True leadership requires understanding human will, stress, fear, and mission focus. The will to fight is central in combat—and in life. Emotional control, bot…
…
continue reading

1
SANS Stormcast Wednesday, July 9th, 2025: Microsoft Patches; Opposum Attack; (#)
7:44
7:44
Play later
Play later
Lists
Like
Liked
7:44SANS Stormcast Wednesday, July 9th, 2025: Microsoft Patches; Opposum Attack; Microsoft Patch Tuesday, July 2025 Today, Microsoft released patches for 130 Microsoft vulnerabilities and 9 additional vulnerabilities not part of Microsoft's portfolio but distributed by Microsoft. 14 of these are rated critical. Only one of the vulnerabilities was discl…
…
continue reading

1
Spying on your kids, Bank Robberies, Qantas, LOTL, sudo, Hunters, Aaran Leyland... - SWN #492
33:26
33:26
Play later
Play later
Lists
Like
Liked
33:26Spying on your kids, Bank Robberies, Qantas, LOTL, sudo, Hunters, Aaran Leyland, and more on the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-492
…
continue reading

1
Spying on your kids, Bank Robberies, Qantas, LOTL, sudo, Hunters, Aaran Leyland... - SWN #492
33:25
33:25
Play later
Play later
Lists
Like
Liked
33:25Spying on your kids, Bank Robberies, Qantas, LOTL, sudo, Hunters, Aaran Leyland, and more on the Security Weekly News. Show Notes: https://securityweekly.com/swn-492
…
continue reading
Researchers release proof-of-concept exploits for CitrixBleed2. Grafana patches four high-severity vulnerabilities. A hacker claims to have breached Spanish telecom giant Telefónica. Italian police arrest a Chinese man wanted by U.S. authorities for alleged industrial espionage. Beware of a new ransomware group called Bert. Call of Duty goes offlin…
…
continue reading