THEOS CyberNova is a cutting-edge podcast that explores the dynamic world of cybersecurity, hosted by THEOS Cyber CEO Paul Jackson. Each episode delves into the latest trends, challenges, and innovations shaping the cybersecurity landscape, featuring insights from industry experts, thought leaders, and technologists. Paul brings his expertise and passion for cyber security to engaging discussions on topics ranging from emerging threats and data privacy to the future of AI in cyber defense. W ...
…
continue reading
Network Firewall Podcasts
A brief daily summary of what is important in information security. The podcast is published every weekday and designed to get you ready for the day with a brief, usually 5 minutes long summary of current network security related events. The content is late breaking, educational and based on listener input as well as on input received by the SANS Internet Storm Center. You may submit questions and comments via our contact form at https://isc.sans.edu/contact.html .
…
continue reading
RunAs Radio is a weekly Internet Audio Talk Show for IT Professionals working with Microsoft products.
…
continue reading
Every IT professional could use more knowledge about network security, but who has time to study? Grab some knowledge on the go with Radio Free Security, the network security podcast produced by WatchGuard LiveSecurity Service reporters.
…
continue reading
Network Break keeps you informed with fast, focused analysis of IT news, products, tech trends, and business outcomes. Blending sharp commentary with a touch of humor, hosts Drew Conry-Murray & Johna Till Johnson sift through the weekly landslide of press announcements, product launches, financial reports, and marketing decks to find the stories worth talking about. You come away with the information and context to make smart decisions in your organization and career … all in the span of a ( ...
…
continue reading
Risky Business is a weekly information security podcast featuring news and in-depth interviews with industry luminaries. Launched in February 2007, Risky Business is a must-listen digest for information security pros. With a running time of approximately 50-60 minutes, Risky Business is pacy; a security podcast without the waffle.
…
continue reading
Heavy Networking is an unabashedly nerdy dive into all things networking. Described by one listener as "verbal white papers," the weekly episodes feature network engineers, industry experts, and vendors sharing useful information to keep your professional knowledge sharp and your career growing. Hosts Ethan Banks & Drew Conry-Murray cut through the marketing spin to explore what works—and what doesn't—in networking today, while keeping an eye on what's ahead for the industry. On air since 20 ...
…
continue reading
Brought to you by IT Audit Labs. Trusted cyber security experts and their guests discuss common security threats, threat actor techniques and other industry topics. IT Audit Labs provides organizations with the leverage of a network of partners and specialists suited for your needs. We are experts at assessing security risk and compliance, while providing administrative and technical controls to improve our clients’ data security. Our threat assessments find the soft spots before the bad g ...
…
continue reading
Daily cybersecurity news for practitioners. Vulnerabilities, defenses, threats, network security insight, research and more to make you sound smarter as you get to the office in the morning. New each weekday.
…
continue reading
SecurityGen
…
continue reading
An online network about educating, entertaining and encouraging your dance with Technology!
…
continue reading
Through following this course, students will gain a basic understanding of the principles behind network security and the working of the main protocols, mechanisms and techniques in the area of security. The course consists of three parts: security mechanisms within network protocols, systems security and lab sessions. In the first part (security mechanisms within network protocols), the following topics will be discussed: IPSec, SSH, SSL, HTTPS and security for wireless networks. The second ...
…
continue reading
Interviews with Scholars of China about their New Books Support our show by becoming a premium member! https://newbooksnetwork.supportingcast.fm/chinese-studies
…
continue reading
Welcome to Beyond The Firewall: The Business Bytecast, where cybersecurity meets business strategy and IT innovation powers success. Designed for C-suite executives and managers, this podcast explores how cutting-edge technology, from cyber risk management to outsourced IT services and fractional CTO leadership, transforms organizations. We tackle the challenges of securing your business in a digital world and highlight the opportunities that IT solutions like on-demand support bring to the ...
…
continue reading
A series of interviews with authors of new books from Princeton University Press
…
continue reading
Interviews with Scholars of the Law about their New Books Support our show by becoming a premium member! https://newbooksnetwork.supportingcast.fm/law
…
continue reading
With nearly 30+ years of combined network marketing experience, this dynamic father/son duo has literally rewritten the blueprint & cracked the code of building teams in depth. Combining the power & speed of the digital revolution with proven "old school" fundamentals and principals that have stood the test of time, Chris & Dale McNelly will not only show you how to build your business at lightning speed, but also how to keep that team together for true passive income, & a legacy organization.
…
continue reading
SearchSecurity.com's Security Wire Weekly podcast recaps the week's top IT security news. Learn about the latest virus, worm, Trojan, phishing or identity theft scam. Find out the latest strategies for keeping your network and company data secure. Hear what industry experts recommend you watch for in the weeks ahead.
…
continue reading
Founded in 2022, securitygen is a global start-up focused on telecom security.
…
continue reading
Fortinet’s cybersecurity podcast provides highlights and commentary about securing the largest enterprise, service provider, and government organizations around the world. Join Fortinet’s top experts as they discuss today’s most important cybersecurity topics. The Fortinet Security Fabric platform addresses the most critical security challenges and protect data across the entire digital infrastructure, whether in networked, application, multi-cloud or edge environments. Both a technology com ...
…
continue reading

1
SANS Stormcast Tuesday, August 19th, 2025: MFA Bombing; Cisco Firewall Management Vuln; F5 Access for Android Vuln; (#)
5:11
5:11
Play later
Play later
Lists
Like
Liked
5:11SANS Stormcast Tuesday, August 19th, 2025: MFA Bombing; Cisco Firewall Management Vuln; F5 Access for Android Vuln; Keeping an Eye on MFA Bombing Attacks Attackers will attempt to use authentication fatigue by “bombing” users with MFA authentication requests. Rob is talking in this diary about how to investigate these attacks in a Microsoft ecosyst…
…
continue reading

1
NB539: Boom Times for Arista; SonicWall Offers $200K Firewall Warranty
31:03
31:03
Play later
Play later
Lists
Like
Liked
31:03Take a Network Break! We start with critical vulnerabilities in Cisco Secure Firewall Management Center and Fortinet’s FortiSIEM. On the news front, SonicWall announces Gen8 firewalls plus a $200,000 warranty for customers that sign on to SonicWall’s Managed Protection Security Suite. IBM Cloud suffers its fourth major outage since May of this year…
…
continue reading

1
Laura Garbes, "Listeners Like Who?: Exclusion and Resistance in the Public Radio Industry" (Princeton UP, 2025)
42:07
42:07
Play later
Play later
Lists
Like
Liked
42:07Why is radio so white? In Listeners Like Who? Exclusion and Resistance in the Public Radio Industry (Princeton UP, 2025) Laura Garbes, a Sociologist and Assistant Professor at the University of Minnesota - Twin Cities, explores the history of public radio, theorising it as a white institutional space. Alongside the rich history and theoretical fram…
…
continue reading

1
HN796: The Why and How of Making Your Infrastructure Quantum-Safe (Sponsored)
53:33
53:33
Play later
Play later
Lists
Like
Liked
53:33Your production IT operations are almost certainly using cryptography libraries that are not quantum-safe, and the time to begin planning a cryptography overhaul is now. But this is likely to be a daunting project because it touches everything: clients, servers, apps, network devices, middleboxes, and so on. Daunting, but doable. We talk with Richu…
…
continue reading

1
Rose Casey, "Aesthetic Impropriety: Property Law and Postcolonial Style" (Fordham UP, 2025)
52:20
52:20
Play later
Play later
Lists
Like
Liked
52:20Aesthetic Impropriety: Property Law and Postcolonial Style (Fordham UP, 2025) analyzes vanguard legal actions and literary innovations to reveal contemporary reforms to property law that are undoing law’s colonial legacies. Casey traces precise legal histories across distinct jurisdictions throughout the anglophone world, revealing the connection b…
…
continue reading

1
Mick Moran: CSAM as the Insider Threat Missing from Your Playbook
40:52
40:52
Play later
Play later
Lists
Like
Liked
40:52Disclaimer: This episode discusses child sexual abuse material (CSAM) and includes references that some listeners may find distressing. For Mick Moran, child sexual abuse material (CSAM) is not just a law enforcement issue; it is a cybersecurity blind spot. As CEO of the Irish Internet Hotline and a former INTERPOL Assistant Director, he argues tha…
…
continue reading

1
SANS Stormcast Friday, September 12th, 2025: DShield SIEM Update; Another Sonicwall Warning; Website Keystroke Logging
6:38
6:38
Play later
Play later
Lists
Like
Liked
6:38DShield SIEM Docker Updates Guy updated the DShield SIEM which graphically summarizes what is happening inside your honeypot. https://isc.sans.edu/diary/DShield%20SIEM%20Docker%20Updates/32276 Again: Sonicwall SSL VPN Compromises The Australian Government s Signals Directorate noted an increase in compromised Sonicwall devices. https://www.cyber.go…
…
continue reading

1
SANS Stormcast Friday, September 12th, 2025: DShield SIEM Update; Another Sonicwall Warning; Website Keystroke Logging (#)
6:39
6:39
Play later
Play later
Lists
Like
Liked
6:39SANS Stormcast Friday, September 12th, 2025: DShield SIEM Update; Another Sonicwall Warning; Website Keystroke Logging DShield SIEM Docker Updates Guy updated the “DShield SIEM” which graphically summarizes what is happening inside your honeypot. https://isc.sans.edu/diary/DShield%20SIEM%20Docker%20Updates/32276 Again: Sonicwall SSL VPN Compromises…
…
continue reading

1
SANS Stormcast Thursday, September 11th, 2025: BASE64 in DNS; Google Chrome, Ivantii and Sophos Patches; Apple Memory Integrity Feature
7:12
7:12
Play later
Play later
Lists
Like
Liked
7:12BASE64 Over DNS The base64 character set exceeds what is allowable in DNS. However, some implementations will work even with these invalid characters. https://isc.sans.edu/diary/BASE64%20Over%20DNS/32274 Google Chrome Update Google released an update for Google Chrome, addressing two vulnerabilities. One of the vulnerabilities is rated critical and…
…
continue reading

1
SANS Stormcast Thursday, September 11th, 2025: BASE64 in DNS; Google Chrome, Ivantii and Sophos Patches; Apple Memory Integrity Feature (#)
7:12
7:12
Play later
Play later
Lists
Like
Liked
7:12SANS Stormcast Thursday, September 11th, 2025: BASE64 in DNS; Google Chrome, Ivantii and Sophos Patches; Apple Memory Integrity Feature BASE64 Over DNS The base64 character set exceeds what is allowable in DNS. However, some implementations will work even with these “invalid” characters. https://isc.sans.edu/diary/BASE64%20Over%20DNS/32274 Google C…
…
continue reading

1
Andrea Louise Campbell, "Taxation and Resentment: Race, Party, and Class in American Tax Attitudes" (Princeton UP, 2025)
57:32
57:32
Play later
Play later
Lists
Like
Liked
57:32Why Americans favor progressive taxation in principle but not in practice Most Americans support progressive taxation in principle, and want the rich to pay more. But the specific tax policies that most favor are more regressive than progressive. What is behind such a disconnect? In Taxation and Resentment: Race, Party, and Class in American Tax At…
…
continue reading

1
Anna Strhan and Rachael Shillitoe, "Growing Up Godless: Non-Religious Childhoods in Contemporary England" (Princeton UP, 2025)
38:05
38:05
Play later
Play later
Lists
Like
Liked
38:05What do children believe in? In Growing Up Godless: Non-Religious Childhoods in Contemporary England (Princeton UP, 2025) Anna Strhan, a Reader in the Department of Sociology at the University of York and Rachael Shillitoe, a senior social scientist in the UK civil service and honorary fellow in the Department of Sociology at the University of York…
…
continue reading

1
Risky Business #806 -- Apple's Memory Integrity Enforcement is a big deal
51:42
51:42
Play later
Play later
Lists
Like
Liked
51:42On this week’s show Patrick Gray and Adam Boileau discuss the week’s cybersecurity news, including: Apple ruins exploit developers’ week with fresh memory corruption mitigations Feross Aboukhadijeh drops by to talk about the big, dumb npm supply chain attack Salesloft says its GitHub was the initial entry point for its compromise Sitecore says peop…
…
continue reading

1
SANS Stormcast Wednesday, September 10th, 2025: Microsoft Patch Tuesday;
8:25
8:25
Play later
Play later
Lists
Like
Liked
8:25Microsoft Patch Tuesday As part of its September patch Tuesday, Microsoft addressed 177 different vulnerabilities, 86 of which affect Microsoft products. None of the vulnerabilities has been exploited before today. Two of the vulnerabilities were already made public. Microsoft rates 13 of the vulnerabilities are critical. https://isc.sans.edu/diary…
…
continue reading
How do you get your organization trained up to use AI tools? Richard talks to Stephanie Donahue about her work implementing AI tools at Avanade and with Avanade's customers. Stephanie discusses how many workers are bringing their own AI tools, such as ChatGPT, to work and the risks that represent to the organization. Having an approved set of tools…
…
continue reading

1
SANS Stormcast Wednesday, September 10th, 2025: Microsoft Patch Tuesday; (#)
8:26
8:26
Play later
Play later
Lists
Like
Liked
8:26SANS Stormcast Wednesday, September 10th, 2025: Microsoft Patch Tuesday; Microsoft Patch Tuesday As part of its September patch Tuesday, Microsoft addressed 177 different vulnerabilities, 86 of which affect Microsoft products. None of the vulnerabilities has been exploited before today. Two of the vulnerabilities were already made public. Microsoft…
…
continue reading

1
Maria R. Montalvo, "Enslaved Archives: Slavery, Law, and the Production of the Past" (Johns Hopkins UP, 2024)
1:21:01
1:21:01
Play later
Play later
Lists
Like
Liked
1:21:01Explores the relationship between the production of enslaved property and the production of the past in the antebellum United States. It is extraordinarily difficult for historians to reconstruct the lives of individual enslaved people. Records--where they exist--are often fragmentary, biased, or untrue. In Enslaved Archives: Slavery, Law, and the …
…
continue reading

1
SANS Stormcast Tuesday, September 9th, 2025: Major npm compromise; HTTP Request Signature
8:44
8:44
Play later
Play later
Lists
Like
Liked
8:44Major npm compromise A number of high-profile npm libraries were compromised after developers fell for a phishing email. This compromise affected libraries with a total of hundreds of millions of downloads a week. https://bsky.app/profile/bad-at-computer.bsky.social/post/3lydioq5swk2y https://github.com/orgs/community/discussions/172738 https://git…
…
continue reading

1
SANS Stormcast Tuesday, September 9th, 2025: Major npm compromise; HTTP Request Signature (#)
8:44
8:44
Play later
Play later
Lists
Like
Liked
8:44SANS Stormcast Tuesday, September 9th, 2025: Major npm compromise; HTTP Request Signature Major npm compromise A number of high-profile npm libraries were compromised after developers fell for a phishing email. This compromise affected libraries with a total of hundreds of millions of downloads a week. https://bsky.app/profile/bad-at-computer.bsky.…
…
continue reading

1
NB542: Hollow Core Fiber Outshines Glass; Broadcom Bags Big AI Bucks
24:57
24:57
Play later
Play later
Lists
Like
Liked
24:57Take a Network Break! We shine a red light on an AnyShare Service Agent API vulnerability and an active exploit against FreePBX. SASE vendor Cato Networks makes first-ever acquisition with purchase of AI security startup AIM, Microsoft researchers tout hollow core fiber tests that out-perform glass core fiber optics, and Wi-Fi 7 helps drive up... R…
…
continue reading

1
Healthcare Ransomware: When Cyberattacks Turn Deadly
32:08
32:08
Play later
Play later
Lists
Like
Liked
32:08When ransomware hits a hospital, it's not just data that's at stake—patients are dying. Ed Gaudet, CEO of Censinet, reveals the shocking research proving what healthcare security professionals feared: cyberattacks on hospitals directly increase mortality rates and disrupt life-saving care. But Ed's biggest concern? The eerie quiet before what he be…
…
continue reading

1
Snake Oilers: Nebulock, Vali Cyber and Cape
46:33
46:33
Play later
Play later
Lists
Like
Liked
46:33In this edition of the Snake Oilers podcasts, three vendors pop in to pitch you all on their wares: Automated, AI-powered threat hunting with Nebulock Damien Lewke from Nebulock joins the show to talk about how its agentic AI platform can surface attacker activity out of all those “low” and “informational” findings your detection team doesn’t have …
…
continue reading

1
SANS Stormcast Monday, September 8th, 2025: YARA to Debugger Offsets; SVG JavaScript Phishing; FreePBX Patches;
5:34
5:34
Play later
Play later
Lists
Like
Liked
5:34From YARA Offsets to Virtual Addresses Xavier explains how to convert offsets reported by YARA into offsets suitable for the use with debuggers. https://isc.sans.edu/diary/From%20YARA%20Offsets%20to%20Virtual%20Addresses/32262 Phishing via JavaScript in SVG Files Virustotal uncovered a Colombian phishing campaign that takes advantage of JavaScript …
…
continue reading

1
SANS Stormcast Monday, September 8th, 2025: YARA to Debugger Offsets; SVG JavaScript Phishing; FreePBX Patches; (#)
5:35
5:35
Play later
Play later
Lists
Like
Liked
5:35SANS Stormcast Monday, September 8th, 2025: YARA to Debugger Offsets; SVG JavaScript Phishing; FreePBX Patches; From YARA Offsets to Virtual Addresses Xavier explains how to convert offsets reported by YARA into offsets suitable for the use with debuggers. https://isc.sans.edu/diary/From%20YARA%20Offsets%20to%20Virtual%20Addresses/32262 Phishing vi…
…
continue reading

1
Sarah McLaughlin, "Authoritarians in the Academy: How the Internationalization of Higher Education and Borderless Censorship Threaten Free Speech" (Johns Hopkins UP, 2025)
41:51
41:51
Play later
Play later
Lists
Like
Liked
41:51In an era of globalized education, where ideals of freedom and inquiry should thrive, an alarming trend has emerged: foreign authoritarian regimes infiltrating American academia. In Authoritarians in the Academy, Sarah McLaughlin exposes how higher education institutions, long considered bastions of free thought, are compromising their values for f…
…
continue reading
Monitoring and troubleshooting latency can be tricky. If it’s in the network, was it the IP stack? A NIC? A switch buffer? A middlebox somewhere on the WAN? If it’s the application, can you, the network engineer, bring receipts to the app team? And what if you need to build and operate a network that’s... Read more »…
…
continue reading

1
Karen Bartlett, "Escape from Kabul: The Afghan Women Judges Who Fled the Taliban and Those They Left Behind" (New Press, 2025)
1:01:03
1:01:03
Play later
Play later
Lists
Like
Liked
1:01:03In this episode, New Books Network Host Nina Bo Wagner speaks with Karen Bartlett about The Escape From Kabul: A True Story of Sisterhood and Defiance (The New Press and Duckworth, 2025). The book follows Afghan women judges who fought for justice in the courtroom, then fought to escape with their lives. Across twenty years of U.S.-backed governmen…
…
continue reading

1
Tim McNulty – The Anatomy of Crisis Management: Preparation, Communication, and People
38:54
38:54
Play later
Play later
Lists
Like
Liked
38:54For Group Chief Security Officer Tim McNulty, crisis management is not firefighting; it is foresight. Preparation, horizon scanning, and above all, communication are what turn chaos into resilience. His rule is simple: communicate up, communicate internally, communicate externally. Tim also reflects on the human side of crisis leadership. He explai…
…
continue reading

1
SANS Stormcast Friday, September 5th, 2025: Cloudflare Response to 1.1.1.1 Certificate; AI Modem Namespace Reuse; macOS Vulnerability Allowed Keychain Decryption
8:18
8:18
Play later
Play later
Lists
Like
Liked
8:18Unauthorized Issuance of Certificate for 1.1.1.1 Cloudflare published a blog post with more details regarding the bad 1.1.1.1 certificate that was issued by Fina. https://blog.cloudflare.com/unauthorized-issuance-of-certificates-for-1-1-1-1/ AI Model Namespace Reuse Deleted accounts on Huggingface can be taken over by other entities unrelated to th…
…
continue reading

1
SANS Stormcast Friday, September 5th, 2025: Cloudflare Response to 1.1.1.1 Certificate; AI Modem Namespace Reuse; macOS Vulnerability Allowed Keychain Decryption (#)
8:19
8:19
Play later
Play later
Lists
Like
Liked
8:19SANS Stormcast Friday, September 5th, 2025: Cloudflare Response to 1.1.1.1 Certificate; AI Modem Namespace Reuse; macOS Vulnerability Allowed Keychain Decryption Unauthorized Issuance of Certificate for 1.1.1.1 Cloudflare published a blog post with more details regarding the bad 1.1.1.1 certificate that was issued by Fina. https://blog.cloudflare.c…
…
continue reading