Explore the life of a security leader with NetSPI Field Chief Information Security Officer (CISO) Nabil Hannan. Hear how CISOs with diverse expertise tackle the challenges and opportunities that come with life on the frontlines of cybersecurity.
…
continue reading
Shamus McGillicuddy, VP of Research, Network Infrastructure and Operations, at Enterprise Management Associates (EMA) discusses the latest trends in network management.
…
continue reading
Welcome to the Security Weekly Podcast Network, your all-in-one source for the latest in cybersecurity! This feed features a diverse lineup of shows, including Application Security Weekly, Business Security Weekly, Paul's Security Weekly, Enterprise Security Weekly, and Security Weekly News. Whether you're a cybersecurity professional, business leader, or tech enthusiast, we cover all angles of the cybersecurity landscape. Tune in for in-depth panel discussions, expert guest interviews, and ...
…
continue reading
Security Visionaries is a podcast all about the world of cyber, data, and tech infrastructure, bringing together experts from around the world and across domains. In each episode, your hosts Emily Wearmouth and Max Havey dig into the hot topics and burning questions that are preoccupying industry conversations.
…
continue reading
Deception, influence, and social engineering in the world of cyber crime.
…
continue reading
A brief daily summary of what is important in information security. The podcast is published every weekday and designed to get you ready for the day with a brief, usually 5 minutes long summary of current network security related events. The content is late breaking, educational and based on listener input as well as on input received by the SANS Internet Storm Center. You may submit questions and comments via our contact form at https://isc.sans.edu/contact.html .
…
continue reading
As cars become smarter and more connected, the demand for top-tier automotive cyber security has never been higher. With expert insights from PlaxidityX, a leading automotive cyber security company, we’ll guide you through the challenges and solutions protecting millions of vehicles worldwide. Whether you’re an industry expert or just curious about how cars are secured in the digital age, this podcast comprehensively looks at how cyber defenses are developed, tested, and deployed. We don’t j ...
…
continue reading
Jump-start your use of the Cisco Learning Network's dynamic features and vibrant community offerings. Here you will find technical information and professional networking opportunities, which will help advance your certification goals. By joining the Cisco Learning Network you will be a part of the community, prepare for success, interact with professionals, mentor, share, and achieve.
…
continue reading
Gain unparalleled access to the minds of industry-leading CIOs, CTOs, and CISOs. Enjoy episodes filled with expert insights, inspiring stories, and trend analysis, all brought to you by the people shaping the future of technology. Whether you're an IT professional, aspiring tech leader, or general tech enthusiast, IT Visionaries has something for everyone. Don't miss out on the chance to learn from the best – subscribe now! Produced by the team at Mission.org and brought to you by Brightspot.
…
continue reading
Redefining CyberSecurity Podcast Hosted by Sean Martin, CISSP Have you ever thought that we are selling cybersecurity insincerely, buying it indiscriminately, and deploying it ineffectively? For cybersecurity to be genuinely effective, we must make it consumable and usable. We must also bring transparency and honesty to the conversations surrounding the methods, services, and technologies upon which businesses rely. If we are going to protect what matters and bring value to our companies, ou ...
…
continue reading
The daily cybersecurity news and analysis industry leaders depend on. Published each weekday, the program also includes interviews with a wide spectrum of experts from industry, academia, and research organizations all over the world.
…
continue reading
…
continue reading
This is the Ctrl+Alt+Azure podcast. We talk about all things Microsoft, including Microsoft Azure, and share our experiences and thoughts on the way. Your hosts are Tobias Zimmergren and Jussi Roine.
…
continue reading
This is Explain IT, a show for IT professionals by IT professionals; offering insight, knowledge, experience and opinion on a variety of enterprise tech topics. With new episodes out regularly, follow the podcast in your favourite app and you'll get notified with every new release. Hosted on Acast. See acast.com/privacy for more information.
…
continue reading
Story
…
continue reading
Welcome to the Security Weekly Podcast Network, your all-in-one source for the latest in cybersecurity! This feed features a diverse lineup of shows, including Application Security Weekly, Business Security Weekly, Paul's Security Weekly, Enterprise Security Weekly, and Security Weekly News. Whether you're a cybersecurity professional, business leader, or tech enthusiast, we cover all angles of the cybersecurity landscape. Tune in for in-depth panel discussions, expert guest interviews, and ...
…
continue reading
Welcome to Act on Tech, the podcast that empowers you to harness technology to boost your productivity and simplify your life. Hosted by tech enthusiast and entrepreneur Alex, each episode dives into actionable tips, tools, and insights to help you stay ahead in the digital age. Discover practical advice, expert opinions, and cutting-edge trends, all while learning about Alex Custom Tech, a leading MSP dedicated to providing personalized IT solutions for business and residential customers. T ...
…
continue reading
Listen, Learn, Leverage! This Palo Alto Networks podcast offers insights to help you build knowledge, maximize investment, and improve your company’s cybersecurity posture.
…
continue reading
Join us for thought provoking conversations on surveillance, digital privacy, and cybersecurity law and policy in the information age. Each week, hosts Dave Bittner and Ben Yelin break down the headlines, legal cases, and policy battles that matter most.
…
continue reading
THEOS CyberNova is a cutting-edge podcast that explores the dynamic world of cybersecurity, hosted by THEOS Cyber CEO Paul Jackson. Each episode delves into the latest trends, challenges, and innovations shaping the cybersecurity landscape, featuring insights from industry experts, thought leaders, and technologists. Paul brings his expertise and passion for cyber security to engaging discussions on topics ranging from emerging threats and data privacy to the future of AI in cyber defense. W ...
…
continue reading
The Dynamist, a podcast by the Foundation for American Innovation, brings together the most important thinkers and doers to discuss the future of technology, governance, and innovation. The Dynamist is hosted by Evan Swarztrauber, former Policy Advisor at the Federal Communications Commission. Subscribe now!
…
continue reading
Periodically news, events, or interviews don't fit into our regular slate of podcasts. That's where our AVNation Specials come in.
…
continue reading
Join us at the intersection of networking and security! Whether you’re fending off ransomware attacks, securing remote workers, hunting for rogue IoT devices, or gearing up for your latest compliance audit, Packet Protector provides practical information that IT and infrastructure pros can put to work. Every episode covers the latest security headlines and then drills into essential topics to provide technical and strategic insights on wired and wireless network security, access control, clo ...
…
continue reading
Level up your business with technology solutions to increase productivity, improve client service, and uncover opportunities for growth. Osaic's technology podcast offers best practices to help you learn, adapt, and implement technology to thrive as an independent financial professional. Visit http://www.osaic.com for additional information. Securities and investment advisory services are offered through the firms: Osaic Wealth, Inc., Triad Advisors, LLC, Osaic Institutions, Inc., and Woodbu ...
…
continue reading
Daily cybersecurity news for practitioners. Vulnerabilities, defenses, threats, network security insight, research and more to make you sound smarter as you get to the office in the morning. New each weekday.
…
continue reading
Love is more than you think. From the creators of Criminal. New episodes twice a month. Part of the Vox Media Podcast Network.
…
continue reading
The number one podcast for those involved or just interested in the production of beef animals and dairy herds. A comedy podcast by Benjamin Partridge.
…
continue reading
Jake Voll brings security industry professionals together to discuss best practices, challenges, and opportunities.
…
continue reading
Every IT professional could use more knowledge about network security, but who has time to study? Grab some knowledge on the go with Radio Free Security, the network security podcast produced by WatchGuard LiveSecurity Service reporters.
…
continue reading
Learn how to break into cybersecurity, build new skills and move up the career ladder. Each week on the Cyber Work Podcast, host Chris Sienko sits down with thought leaders from Carbon Black, IBM, CompTIA and others to discuss the latest cybersecurity workforce trends.
…
continue reading
"Expedient: The Podcast" is your gateway to the inner workings of technology and innovation, presented with unparalleled clarity and expertise. Each episode is an invitation to join the luminaries of Expedient along with special guests from the forefront of the tech industry. We delve into the latest advancements in cloud computing, the evolution of data centers, cybersecurity trends, and groundbreaking developments in AI and machine learning. This podcast strips away the complexity of the t ...
…
continue reading
The pod dedicated to the hardworking network operators who keep the bitpipes running smoothly. We focus on sharing best practices, the operations tool stack, and engage with vendors and solution providers to get insights into new technologies and tools so you can make informed decisions for your ops environment. Hosted by your friendly neighborhood internet plumber, Scott Robohn.
…
continue reading
Brought to you by IT Audit Labs. Trusted cyber security experts and their guests discuss common security threats, threat actor techniques and other industry topics. IT Audit Labs provides organizations with the leverage of a network of partners and specialists suited for your needs. We are experts at assessing security risk and compliance, while providing administrative and technical controls to improve our clients’ data security. Our threat assessments find the soft spots before the bad g ...
…
continue reading
Risky Business is a weekly information security podcast featuring news and in-depth interviews with industry luminaries. Launched in February 2007, Risky Business is a must-listen digest for information security pros. With a running time of approximately 50-60 minutes, Risky Business is pacy; a security podcast without the waffle.
…
continue reading
The Browsing Security podcast by LayerX Security: Learn from the biggest influencers in cybersecurity about browser security risks, challenges and solutions, in a casual and fun setting
…
continue reading
Security Boulevard is the destination for the security community to stay up on the latest news, discussion and analysis. Home of the Security Bloggers Network, Security Boulevard has more security related content than anywhere else on the web.
…
continue reading
Heavy Networking is an unabashedly nerdy dive into all things networking. Described by one listener as "verbal white papers," the weekly episodes feature network engineers, industry experts, and vendors sharing useful information to keep your professional knowledge sharp and your career growing. Hosts Ethan Banks & Drew Conry-Murray cut through the marketing spin to explore what works—and what doesn't—in networking today, while keeping an eye on what's ahead for the industry. On air since 20 ...
…
continue reading
Obituaries for the Damned
…
continue reading
Through following this course, students will gain a basic understanding of the principles behind network security and the working of the main protocols, mechanisms and techniques in the area of security. The course consists of three parts: security mechanisms within network protocols, systems security and lab sessions. In the first part (security mechanisms within network protocols), the following topics will be discussed: IPSec, SSH, SSL, HTTPS and security for wireless networks. The second ...
…
continue reading
…
continue reading
Secure Talk reviews the latest threats, tips, and trends on security, innovation, and compliance. Host Justin Beals interviews leading privacy, security and technology executives to discuss best practices related to IT security, data protection and compliance. Based in Seattle, he previously served as the CTO of NextStep and Koru, which won the 2018 Most Impactful Startup award from Wharton People Analytics. He is the creator of the patented Training, Tracking & Placement System and the auth ...
…
continue reading
An online network about educating, entertaining and encouraging your dance with Technology!
…
continue reading
America’s premier Sunday morning public affairs program. For nearly 70 years, Face the Nation has sought to help audiences understand how current events affect their lives. Today, that mission remains the same. Hear moderator Margaret Brennan’s illuminating and informative interviews with elected officials, policy experts and foreign leaders. Face the Nation airs Sundays at 10:30 AM, ET on the CBS Television Network and at 12 PM, ET on the CBS News Streaming Network. Face the Nation is also ...
…
continue reading

1
The enterprise security news, more secure by removing credentials, & RSAC interviews - Marty Momdjian, Amit Saha, Dr. Tina Srivastava - ESW #410
1:38:02
1:38:02
Play later
Play later
Lists
Like
Liked
1:38:02Segment 1 - Enterprise Security News, Live at IDV This week, in the enterprise security news, Acquisitions potential IPOs Terminator Salvation in real life First $1B one-employee business? Mikko puts in his notice Pitch Black in real life, and more! Segment 2 - Interview with Dr. Tina Srivastava The #1 cause of data breaches is stolen credentials. …
…
continue reading

1
SANS Stormcast June, June 9th, 2025: Extracting PNG Data; GlueStack Packages Backdoor; MacOS targeted by Clickfix; INETPUB restore script (#)
5:43
5:43
Play later
Play later
Lists
Like
Liked
5:43SANS Stormcast June, June 9th, 2025: Extracting PNG Data; GlueStack Packages Backdoor; MacOS targeted by Clickfix; INETPUB restore script Extracting With pngdump.py Didier extended his pngdump.py script to make it easier to extract additional data appended to the end of the image file. https://isc.sans.edu/diary/Extracting%20With%20pngdump.py/32022…
…
continue reading

1
Elsa, Redline, ChaosRat, iMessage, Bladed Feline , Aaran Leyland, and More... - SWN #483
34:00
34:00
Play later
Play later
Lists
Like
Liked
34:00Elsa, Redline, ChaosRat, iMessage, Bladed Feline , Aaran Leyland, and More on this episode of the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-483
…
continue reading

1
Network Security With Colin Birney | The Road To InfoComm 2025
4:36
4:36
Play later
Play later
Lists
Like
Liked
4:36InfoComm 2025 takes place in sunny Orlando 7-11 for showing off products, but the whole week offers a deluge of education for integrators and AV specialists. The video version of this preview can be found here. We talk to Colin Birney about two sessions he is teaching during the show. First about security pitfalls in networks deployments, and the s…
…
continue reading

1
Keyboards, 3am, TikTok, LummaC2, Cityworks, Honeypots, Fancy Bear, Aaran Leyland... - SWN #479
33:37
33:37
Play later
Play later
Lists
Like
Liked
33:37Keyboards, 3 am, TikTok, LummaC2, Cityworks, Honeypots, Fancy Bear, Aaran Leyland, and More, on this edition of the Security Weekly News. Show Notes: https://securityweekly.com/swn-479
…
continue reading

1
Steganography, RICO, CMMC, End of 10, AI is coming for you, Aaran Leyland and More... - SWN #477
33:54
33:54
Play later
Play later
Lists
Like
Liked
33:54Steganography, RICO, CMMC, End of 10, AI is coming for you, Aaran Leyland and More, on this edition of the Security Weekly News. Show Notes: https://securityweekly.com/swn-477
…
continue reading

1
SANS Stormcast June, June 9th, 2025: Extracting PNG Data; GlueStack Packages Backdoor; MacOS targeted by Clickfix; INETPUB restore script
5:43
5:43
Play later
Play later
Lists
Like
Liked
5:43Extracting With pngdump.py Didier extended his pngdump.py script to make it easier to extract additional data appended to the end of the image file. https://isc.sans.edu/diary/Extracting%20With%20pngdump.py/32022 16 React Native Packages for GlueStack Backdoored Overnight 16 npm packages with over a million weekly downloads between them were compro…
…
continue reading

1
Dept. of Homeland Security Secretary Kristi Noem, Senator Amy Klobuchar, Rep. Tony Gonzales, National Economic Council Director Kevin Hassett
54:43
54:43
Play later
Play later
Lists
Like
Liked
54:43This week on Face the Nation, immigration protests in Southern California turn violent as federal authorities ramp up their nationwide effort to round up those who could be in the country illegally. President Trump's mandate to escalate detentions and potentially deportations set the scene for violent protests in Los Angeles this weekend, and he no…
…
continue reading

1
Ell Marquez: It's okay to be new. [Linux] [Career Notes]
9:52
9:52
Play later
Play later
Lists
Like
Liked
9:52Please enjoy this encore of Career Notes. Linux and Security Advocate at Intezer Ell Marquez shares her journey from the family ranch to security. Needing a life change due to a bunch of circumstances that had occurred that left her almost homeless, Ell found out about a six week Linux boot camp that took her down the path toward technology. She fe…
…
continue reading

1
Comprehensive Financial Planning Includes Long Term Care Insurance
26:53
26:53
Play later
Play later
Lists
Like
Liked
26:53Hans and Robby are back again this week with a brand new episode! This week, they discuss how extensive financial planning can include long term care insurance. Don’t forget to get your copy of “The Complete Cardinal Guide to Planning for and Living in Retirement” on Amazon or on CardinalGuide.com for free! You can contact Hans and Cardinal by emai…
…
continue reading

1
A new stealer hiding behind AI hype. [Research Saturday]
25:08
25:08
Play later
Play later
Lists
Like
Liked
25:08This week, we are joined by Michael Gorelik, Chief Technology Officer from Morphisec, discussing their work on "New Noodlophile Stealer Distributes Via Fake AI Video Generation Platforms." A new threat dubbed Noodlophile Stealer is exploiting the popularity of AI-powered content tools by posing as fake AI video generation platforms, luring users in…
…
continue reading
The DOJ files to seize over $7 million linked to illegal North Korean IT workers. The FBI warns of BADBOX 2.0 malware targeting IoT devices. Researchers uncover a major security flaw in Chrome extensions. ESET uncovers Iranian hackers targeting Kurdish and Iraqi government officials. Hitachi Energy, Acronis and Cisco patch critical vulnerabilities.…
…
continue reading

1
Bring Your Own Meeting With Mersive | The Road To InfoComm 2025
3:41
3:41
Play later
Play later
Lists
Like
Liked
3:41InfoComm 2025 comes to sunny Orlando June 11-13, showcasing some of the most innovative technology in the AV industry. We are taking a look at what's going to be on the floor at the Orange County Convention Center in the coming days of the show. The video version of this preview can be found here. We talk to Joel Carroll, great dresser & EVP of Glo…
…
continue reading

1
HN784: Accelerate Your Network Automation With Gluware Labs and New Ansible Collection (Sponsored)
59:07
59:07
Play later
Play later
Lists
Like
Liked
59:07Network automation is today’s topic with sponsor Gluware. Gluware provides a network automation platform that targets both network engineers and automation builders. On today’s Heavy Networking, we discuss how Gluware supports these two constituencies. We also talk about a recent product announcement, Gluware Labs. Gluware Labs includes a free Comm…
…
continue reading

1
Q-SYS Is In The Business of Creating Experiences | The Road To InfoComm 2025
5:49
5:49
Play later
Play later
Lists
Like
Liked
5:49InfoComm 2025 comes to sunny Orlando June 11-13, showcasing some of the most innovative technology in the AV industry. We are taking a look at what's going to be on the floor at the Orange County Convention Center in the coming days of the show. The video version of this preview can be found here. AVNation is a news outlet made by and for audiovisu…
…
continue reading

1
SANS Stormcast Friday, June 6th, 2025: Fake Zoom Clients; Python tarfile vulnerability; HPE Insight Remote Support Patch
5:01
5:01
Play later
Play later
Lists
Like
Liked
5:01Be Careful With Fake Zoom Client Downloads Miscreants are tricking victims into downloading fake Zoom clients (and likely other meeting software) by first sending them fake meeting invites that direct victims to a page that offers malware for download as an update to the Zoom client. https://isc.sans.edu/diary/Be%20Careful%20With%20Fake%20Zoom%20Cl…
…
continue reading

1
SANS Stormcast Friday, June 6th, 2025: Fake Zoom Clients; Python tarfile vulnerability; HPE Insight Remote Support Patch (#)
5:01
5:01
Play later
Play later
Lists
Like
Liked
5:01SANS Stormcast Friday, June 6th, 2025: Fake Zoom Clients; Python tarfile vulnerability; HPE Insight Remote Support Patch Be Careful With Fake Zoom Client Downloads Miscreants are tricking victims into downloading fake Zoom clients (and likely other meeting software) by first sending them fake meeting invites that direct victims to a page that offer…
…
continue reading

1
Updating & Protecting Linux Systems - PSW #877
1:05:23
1:05:23
Play later
Play later
Lists
Like
Liked
1:05:23Two parts to this episode: Tech Segment: Updating Linux Systems - Beyond apt-get upgrade * Custom scripts for ensuring your Linux systems are up-to-date * topgrade - tutorial for using topgrade to update Linux systems on various Linux distributions Discussion Topic: Anti-Malware and/or EDR on Linux Platforms * PCI calls for scanning Linux systems *…
…
continue reading

1
China’s largest data leak exposes billions.
33:43
33:43
Play later
Play later
Lists
Like
Liked
33:43Researchers discover what may be China’s largest ever data leak. CrowdStrike cooperates with federal authorities following last year’s major software bug. A researcher discovers over half a million sensitive insurance documents exposed online. Microsoft offers free cybersecurity programs to European governments. The FBI chronicles the Play ransomwa…
…
continue reading

1
PowerSoft's Powerful Little NOTA | The Road To InfoComm 2025
4:50
4:50
Play later
Play later
Lists
Like
Liked
4:50InfoComm 2025 comes to sunny Orlando June 11-13, showcasing some of the most innovative technology in the AV industry. We are taking a look at what's going to be on the floor at the Orange County Convention Center in the coming days of the show. The video version of this preview can be found here. We talk to Tom Knesel, General Manager for PowerSof…
…
continue reading

1
AI in Content Management | Opportunities and Challenges
52:56
52:56
Play later
Play later
Lists
Like
Liked
52:56Feeling buried under content chaos? You're not alone. Ravi Singh, President and Chief Product Officer at Brightspot, joins us to break down how IT leaders can regain control, cut through AI-generated noise, and build scalable, secure content systems. He shares the secrets behind Brightspot’s success with some of the world’s biggest brands, explains…
…
continue reading
This week on Caveat, Ben’s got the story of Texas becoming the second—and largest—state to pass a law requiring Apple and Google to verify users' ages on app stores and get parental consent before kids and teens can download apps or make purchases, signaling a broader push toward stricter online age checks. Dave dives into the story of President Tr…
…
continue reading
This week, our hosts Joe Carrigan, and Maria Varmazis (also host of the T-Minus Space Daily show) are sharing the latest in social engineering scams, phishing schemes, and criminal exploits that are making headlines. We start with some follow-up from a listener on class action settlements: they’re a class action attorney …
…
continue reading

1
SANS Stormcast Thursday, June 5th, 2025: Phishing Comment Trick; AWS default logging mode change; Cisco Backdoor Fixed; Infoblox Vulnerability Details Released
5:26
5:26
Play later
Play later
Lists
Like
Liked
5:26Phishing e-mail that hides malicious links from Outlook users Jan found a phishing email that hides the malicious link from Outlook users. The email uses specific HTML comment clauses Outlook interprets to render or not render specific parts of the email s HTML code. Jan suggests that the phishing email is intented to not expose users of https://is…
…
continue reading

1
SANS Stormcast Thursday, June 5th, 2025: Phishing Comment Trick; AWS default logging mode change; Cisco Backdoor Fixed; Infoblox Vulnerability Details Released (#)
5:26
5:26
Play later
Play later
Lists
Like
Liked
5:26SANS Stormcast Thursday, June 5th, 2025: Phishing Comment Trick; AWS default logging mode change; Cisco Backdoor Fixed; Infoblox Vulnerability Details Released Phishing e-mail that hides malicious links from Outlook users Jan found a phishing email that hides the malicious link from Outlook users. The email uses specific HTML comment clauses Outloo…
…
continue reading

1
Appetite for tracking: A feast on private data.
37:00
37:00
Play later
Play later
Lists
Like
Liked
37:00Researchers uncover a major privacy violation involving tracking scripts from Meta and Yandex. A compliance automation firm discloses a data breach. PumaBot stalks vulnerable IoT devices. The Ramnit banking trojan gets repurposed for ICS intrusions. The North Face suffers a credential stuffing attack. Kaspersky says the Black Owl team is a cyber th…
…
continue reading

1
Unifying Liberty CX | The Road To InfoComm 2025
4:41
4:41
Play later
Play later
Lists
Like
Liked
4:41InfoComm 2025 comes to sunny Orlando June 11-13, showcasing some of the most innovative technology in the AV industry. We are taking a look at what's going to be on the floor at the Orange County Convention Center in the coming days of the show. The video version of this preview can be found here. We talk to Warren Clark from Liberty about what the…
…
continue reading
Meet Chris Brandt, the new host of IT Visionaries. In this special episode, outgoing host Albert Chou passes the mic to Chris—a seasoned Technology Strategist with a passion for connecting bold ideas to real business outcomes. Chris’s career spans startups to global enterprises, from building an EMP-shielded data center deep underground to deployin…
…
continue reading

1
Unifying Products Under LynTec | The Road To InfoComm 2025
5:05
5:05
Play later
Play later
Lists
Like
Liked
5:05InfoComm 2025 comes to sunny Orlando June 11-13, showcasing some of the most innovative technology in the AV industry. We are taking a look at what's going to be on the floor at the Orange County Convention Center in the coming days of the show. The video version of this preview can be found here. We talk to Mark Bishop, Owner of LynTec, about what…
…
continue reading
The future of generative AI might very well be agentic workloads. Fresh from Build 2025, we take a look at Agent IDs in Entra ID. What are they, and why would even need to know how they work? What's the difference from Enterprise Applications? We consider compliance, reporting, licensing and other aspects on Agent IDs. (00:00) - Intro and catching …
…
continue reading

1
Cybersecurity for MSPs: Securing the Protectors
31:35
31:35
Play later
Play later
Lists
Like
Liked
31:35In this episode of Act on Tech, Alex dives into the critical role Managed Service Providers (MSPs) play in protecting businesses—and why MSPs themselves are now prime targets for cyberattacks. From weak internal practices to poor RMM configurations, one mistake can open the door to a supply chain disaster. Learn the essential cybersecurity strategi…
…
continue reading

1
Regain Control of Business Risks, Your Leadership Habits, and Being Present - Alla Valente - BSW #398
1:18:17
1:18:17
Play later
Play later
Lists
Like
Liked
1:18:17During times of volatility, business leaders often don’t know what they are able to change or even what they should change. At precisely these times, business leaders become risk leaders and need to quickly learn how to identify what is within their control and what isn’t — to not only survive but thrive. Alla Valente, Principal Analyst at Forreste…
…
continue reading
In 1963, Jeanne and Alan Abel traveled to Washington, DC to picket in front of the White House. They said they were part of a campaign that wanted to put clothes on animals — including the first lady’s horse. Jenny Abel and her husband, Jeff Hockett, made a documentary about her parents called Abel Raises Cain. Say hello on Facebook and Instagram. …
…
continue reading

1
Risky Business #794 -- Psychic Panda outgunned by Fluffy Lizard and UNC56728242
58:22
58:22
Play later
Play later
Lists
Like
Liked
58:22On this week’s show Patrick Gray and Adam Boileau discuss the week’s cybersecurity news: Cyber firms agree to deconflict and cross-reference hacker group names Russian nuclear facility blueprints gathered from public procurement websites Someone audio deepfaked the White House Chief of Staff, but for the dumbest reasons Germany identifies the Trick…
…
continue reading