Defense in Depth promises clear talk on cybersecurity's most controversial and confusing debates. Once a week we choose one controversial and popular cybersecurity debate and use the InfoSec community's insights to lead our discussion.
…
continue reading
Network Security Podcasts
A brief daily summary of what is important in information security. The podcast is published every weekday and designed to get you ready for the day with a brief, usually 5 minutes long summary of current network security related events. The content is late breaking, educational and based on listener input as well as on input received by the SANS Internet Storm Center. You may submit questions and comments via our contact form at https://isc.sans.edu/contact.html .
…
continue reading
Explore the life of a security leader with NetSPI Field Chief Information Security Officer (CISO) Nabil Hannan. Hear how CISOs with diverse expertise tackle the challenges and opportunities that come with life on the frontlines of cybersecurity.
…
continue reading
Security Visionaries is a podcast all about the world of cyber, data, and tech infrastructure, bringing together experts from around the world and across domains. In each episode, your hosts Emily Wearmouth, Bailey Harmon, and Max Havey dig into the hot topics and burning questions that are preoccupying industry conversations.
…
continue reading
Welcome to the Security Weekly Podcast Network, your all-in-one source for the latest in cybersecurity! This feed features a diverse lineup of shows, including Application Security Weekly, Business Security Weekly, Paul's Security Weekly, Enterprise Security Weekly, and Security Weekly News. Whether you're a cybersecurity professional, business leader, or tech enthusiast, we cover all angles of the cybersecurity landscape. Tune in for in-depth panel discussions, expert guest interviews, and ...
…
continue reading
THEOS CyberNova is a cutting-edge podcast that explores the dynamic world of cybersecurity, hosted by THEOS Cyber CEO Paul Jackson. Each episode delves into the latest trends, challenges, and innovations shaping the cybersecurity landscape, featuring insights from industry experts, thought leaders, and technologists. Paul brings his expertise and passion for cyber security to engaging discussions on topics ranging from emerging threats and data privacy to the future of AI in cyber defense. W ...
…
continue reading
Deception, influence, and social engineering in the world of cyber crime.
…
continue reading
The BCM Daily Cyber News brings you clear, timely updates on threats, breaches, patches, and trends every day. Stay informed in minutes with focused audio built for busy professionals. Learn more and explore at BareMetalCyber.com.
…
continue reading
Gain unparalleled access to the minds of industry-leading CIOs, CTOs, and CISOs. Enjoy episodes filled with expert insights, inspiring stories, and trend analysis, all brought to you by the people shaping the future of technology. Whether you're an IT professional, aspiring tech leader, or general tech enthusiast, IT Visionaries has something for everyone. Don't miss out on the chance to learn from the best – subscribe now! Produced by the team at Mission.org and brought to you by Brightspot.
…
continue reading
Redefining CyberSecurity Podcast Hosted by Sean Martin, CISSP Have you ever thought that we are selling cybersecurity insincerely, buying it indiscriminately, and deploying it ineffectively? For cybersecurity to be genuinely effective, we must make it consumable and usable. We must also bring transparency and honesty to the conversations surrounding the methods, services, and technologies upon which businesses rely. If we are going to protect what matters and bring value to our companies, ou ...
…
continue reading
Join us for thought provoking conversations on surveillance, digital privacy, and cybersecurity law and policy in the information age. Each week, hosts Dave Bittner and Ben Yelin break down the headlines, legal cases, and policy battles that matter most.
…
continue reading
The daily cybersecurity news and analysis industry leaders depend on. Published each weekday, the program also includes interviews with a wide spectrum of experts from industry, academia, and research organizations all over the world.
…
continue reading
Shamus McGillicuddy, VP of Research, Network Infrastructure and Operations, at Enterprise Management Associates (EMA) discusses the latest trends in network management.
…
continue reading
…
continue reading
Story
…
continue reading
Welcome to the Security Weekly Podcast Network, your all-in-one source for the latest in cybersecurity! This feed features a diverse lineup of shows, including Application Security Weekly, Business Security Weekly, Paul's Security Weekly, Enterprise Security Weekly, and Security Weekly News. Whether you're a cybersecurity professional, business leader, or tech enthusiast, we cover all angles of the cybersecurity landscape. Tune in for in-depth panel discussions, expert guest interviews, and ...
…
continue reading
Welcome to Act on Tech, the podcast that empowers you to harness technology to boost your productivity and simplify your life. Hosted by tech enthusiast and entrepreneur Alex, each episode dives into actionable tips, tools, and insights to help you stay ahead in the digital age. Discover practical advice, expert opinions, and cutting-edge trends, all while learning about Alex Custom Tech, a leading MSP dedicated to providing personalized IT solutions for business and residential customers. T ...
…
continue reading
This is Explain IT, a show for IT professionals by IT professionals; offering insight, knowledge, experience and opinion on a variety of enterprise tech topics. With new episodes out regularly, follow the podcast in your favourite app and you'll get notified with every new release. Hosted on Acast. See acast.com/privacy for more information.
…
continue reading
The Dynamist, a podcast by the Foundation for American Innovation, brings together the most important thinkers and doers to discuss the future of technology, governance, and innovation. The Dynamist is hosted by Evan Swarztrauber, former Policy Advisor at the Federal Communications Commission. Subscribe now!
…
continue reading
Join us at the intersection of networking and security! Whether you’re fending off ransomware attacks, securing remote workers, hunting for rogue IoT devices, or gearing up for your latest compliance audit, Packet Protector provides practical information that IT and infrastructure pros can put to work. Every episode covers the latest security headlines and then drills into essential topics to provide technical and strategic insights on wired and wireless network security, access control, clo ...
…
continue reading
Daily cybersecurity news for practitioners. Vulnerabilities, defenses, threats, network security insight, research and more to make you sound smarter as you get to the office in the morning. New each weekday.
…
continue reading
Level up your business with technology solutions to increase productivity, improve client service, and uncover opportunities for growth. Osaic's technology podcast offers best practices to help you learn, adapt, and implement technology to thrive as an independent financial professional. Visit http://www.osaic.com for additional information. Securities and investment advisory services are offered through the firms: Osaic Wealth, Inc., Triad Advisors, LLC, Osaic Institutions, Inc., and Woodbu ...
…
continue reading
Human-curated AI podcast for a lightweight technology discussion. I am a Network Engineer with two decades of experience working with Fortune 500 enterprise clients and tier 1 service providers. I also, operate a YouTube channel called SDN Tech Forum, where I share my knowledge and expertise on the latest networking technologies. My channel covers various topics, including Cisco SDA, SD-WAN,, Meraki, Thousandeyes, AWS, IoT, Cybersecurity, and more.
…
continue reading
The Defence & Security Podcast Network hosts a unique series of podcasts, featuring discussions with key enablers from across the Australian defence and security industry. The podcasts provide the perfect blend of business intelligence and insights from a range of guests, which include government officials, ADF personnel, industry stakeholders, and members of the academic community. By aligning ourselves with the ADF and the Commonwealth government, we are uniquely placed to deliver a dynami ...
…
continue reading
Heavy Networking is an unabashedly nerdy dive into all things networking. Described by one listener as "verbal white papers," the weekly episodes feature network engineers, industry experts, and vendors sharing useful information to keep your professional knowledge sharp and your career growing. Hosts Ethan Banks & Drew Conry-Murray cut through the marketing spin to explore what works—and what doesn't—in networking today, while keeping an eye on what's ahead for the industry. On air since 20 ...
…
continue reading
Every IT professional could use more knowledge about network security, but who has time to study? Grab some knowledge on the go with Radio Free Security, the network security podcast produced by WatchGuard LiveSecurity Service reporters.
…
continue reading
Barry Bobrow partners with the Secured Finance Network to produce a series of video and audio podcasts focused on important trends and developments in secured lending. The In the Know podcasts will be a series of conversations with compelling thought leaders on important topics impacting the finance and secured lending markets. These brief and engaging discussions will give you information and perspectives critical to being more successful in your businesses by keeping you In The Know. State ...
…
continue reading
Retired Navy SEAL, Jocko Willink and Director, Echo Charles discuss discipline and leadership in business, war, relationships and everyday life.
…
continue reading
Obituaries for the Damned
…
continue reading
Security Boulevard is the destination for the security community to stay up on the latest news, discussion and analysis. Home of the Security Bloggers Network, Security Boulevard has more security related content than anywhere else on the web.
…
continue reading
Ctrl+Alt+Azure offers weekly conversations on Microsoft Azure, cloud strategy, security, identity, and generative AI - focused on what matters for architects, developers, CIOs, and CISOs. Hosted by industry experts Tobias Zimmergren and Jussi Roine.
…
continue reading
Podcast by Virginia REALTORS® Podcast Network
…
continue reading
Tresorit's own produced podcast, bringing you biweekly insights on business, security and technology. If you have any questions or feedback, please write to us at [email protected].
…
continue reading
Every fortnight, host Hazel Burton brings on a new guest from Talos or the broader Cisco Security world to break down a complicated security topic. We cover everything from breaking news to attacker trends and emerging threats.
…
continue reading
Through following this course, students will gain a basic understanding of the principles behind network security and the working of the main protocols, mechanisms and techniques in the area of security. The course consists of three parts: security mechanisms within network protocols, systems security and lab sessions. In the first part (security mechanisms within network protocols), the following topics will be discussed: IPSec, SSH, SSL, HTTPS and security for wireless networks. The second ...
…
continue reading
Podcast by Alex Wood & Robb Reck
…
continue reading
An online network about educating, entertaining and encouraging your dance with Technology!
…
continue reading
Our most popular pods in one fat feed! Too much technology would never be enough. Includes Heavy Networking, Network Break, Day Two DevOps, Packet Protector, and Network Automation Nerds. Plus new shows when they launch so you know about fresh awesomeness.
…
continue reading
Join Chris and Tim as they delve into the Cloud Networking world! The goal of this podcast is to help Network Engineers with their Cloud journey. Follow us on Twitter @Cables2Clouds | Co-Hosts Twitter Handles: Chris - @bgp_mane | Tim - @juangolbez
…
continue reading
Dr. Jack Rasmus will focus on today’s continuing crisis in the U.S. and global economies.
…
continue reading
1
Internal threats are the hole in Cybersecurity’s donut - Frank Vukovits - ESW #438
1:57:05
1:57:05
Play later
Play later
Lists
Like
Liked
1:57:05Interview with Frank Vukovits: Focusing inward: there lie threats also External threats get discussed more than internal threats. There’s a bit of a streetlight effect here: external threats are more visible, easier to track, and sharing external threat intelligence doesn’t infringe on any individual organization’s privacy. That’s why we hear the i…
…
continue reading
1
Internal threats are the hole in Cybersecurity's donut - Frank Vukovits - ESW #438
1:57:05
1:57:05
Play later
Play later
Lists
Like
Liked
1:57:05Interview with Frank Vukovits: Focusing inward: there lie threats also External threats get discussed more than internal threats. There's a bit of a streetlight effect here: external threats are more visible, easier to track, and sharing external threat intelligence doesn't infringe on any individual organization's privacy. That's why we hear the i…
…
continue reading
1
CYBER UNCUT: Bondi shooting misinformation, ShinyHunters returns, and how to stay cyber safe while travelling
45:49
45:49
Play later
Play later
Lists
Like
Liked
45:49This week, for the last Cyber Uncut of 2025, David Hollingworth and Daniel Croft talk about Grok's spreading of misinformation regarding the tragic Bondi terror attack, OpenAI's admission of "high cyber risk", the re-emergence of ShinyHunters with a string of possible extortion attempts, ransomware attacks on medical centres, and important tips for…
…
continue reading
1
SANS Stormcast Monday, December 22nd, 2025: TLS Callbacks; FreeBSD RCE; NIST Time Server Issues (#)
6:01
6:01
Play later
Play later
Lists
Like
Liked
6:01SANS Stormcast Monday, December 22nd, 2025: TLS Callbacks; FreeBSD RCE; NIST Time Server Issues DLLs & TLS Callbacks As a follow-up to last week's diary about DLL Entrypoints, Didier is looking at TLS ("Thread Local Storage") and how it can be abused. https://isc.sans.edu/diary/DLLs%20%26%20TLS%20Callbacks/32580 FreeBSD Remote code execution via ND…
…
continue reading
1
Auld Lang Syne, Ghostpairing, Centerstack, WAFS, React2Shell, Crypto, Josh Marpet... - SWN #539
32:10
32:10
Play later
Play later
Lists
Like
Liked
32:10Auld Lang Syne, Ghostpairing, Centerstack, OneView, WAFS, React2Shell Redux, Crypto, Josh Marpet, and More, on the Security Weekly News. Show Notes: https://securityweekly.com/swn-539
…
continue reading
1
SANS Stormcast Friday, December 5th, 2025: Compromised Govt System; React Vuln Update; Array Networks VPN Attacks
4:35
4:35
Play later
Play later
Lists
Like
Liked
4:35Nation-State Attack or Compromised Government? [Guest Diary] An IP address associated with the Indonesian Government attacked one of our interns' honeypots. https://isc.sans.edu/diary/Nation-State%20Attack%20or%20Compromised%20Government%3F%20%5BGuest%20Diary%5D/32536 React Update Working exploits for the React vulnerability patched yesterday are n…
…
continue reading
NATO suspects Russia is developing a new anti-satellite weapon to disrupt the Starlink network. A failed polygraph sparks a DHS probe and deepens turmoil at CISA. A look back at Trump’s cyber policy shifts. MacSync Stealer adopts a stealthy new delivery method. Researchers warn a popular open-source server monitoring tool is being abused. Cyber cri…
…
continue reading
1
SANS Stormcast Monday, December 22nd, 2025: TLS Callbacks; FreeBSD RCE; NIST Time Server Issues
6:00
6:00
Play later
Play later
Lists
Like
Liked
6:00DLLs & TLS Callbacks As a follow-up to last week's diary about DLL Entrypoints, Didier is looking at TLS ( Thread Local Storage ) and how it can be abused. https://isc.sans.edu/diary/DLLs%20%26%20TLS%20Callbacks/32580 FreeBSD Remote code execution via ND6 Router Advertisements A critical vulnerability in FreeBSD allows for remote code execution. Bu…
…
continue reading
1
Eric Escobar: Collaboration is key. [Pen tester] [Career Notes]
8:42
8:42
Play later
Play later
Lists
Like
Liked
8:42Please enjoy this encore of Career Notes. Principal consultant and pen tester at Secureworks, Eric Escobar, shares his career path translating his childhood favorite Legos to civil engineering and pivoting to cybersecurity. Eric was always headed toward engineering and got both his bachelor and master degrees in civil engineering. Upon breaking int…
…
continue reading
1
The lies that let AI run amok. [Research Saturday]
24:36
24:36
Play later
Play later
Lists
Like
Liked
24:36Darren Meyer, Security Research Advocate at Checkmarx, is sharing their work on "Bypassing AI Agent Defenses with Lies-in-the-Loop." Checkmarx Zero researchers introduce “lies-in-the-loop,” a new attack technique that bypasses human‑in‑the‑loop AI safety controls by deceiving users into approving dangerous actions that appear benign. Using examples…
…
continue reading
1
Auld Lang Syne, Ghostpairing, Centerstack, WAFS, React2Shell, Crypto, Josh Marpet... - SWN #539
32:10
32:10
Play later
Play later
Lists
Like
Liked
32:10Auld Lang Syne, Ghostpairing, Centerstack, OneView, WAFS, React2Shell Redux, Crypto, Josh Marpet, and More, on the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-539
…
continue reading
Trump signs the National Defense Authorization Act for 2026. Danish intelligence officials accuse Russia of orchestrating cyberattacks against critical infrastructure. LongNosedGoblin targets government institutions across Southeast Asia and Japan. A new Android botnet infects nearly two million devices. WatchGuard patches its Firebox firewalls. Am…
…
continue reading
1
Alternative Visions - 2025 US Economy Review
58:00
58:00
Play later
Play later
Lists
Like
Liked
58:00Today's show reviews the performance of the US economy the past year. Topics covered include actual inflation, jobs and likely GDP numbers. Special focus on Trump's 2 main economic initiatives: the $5 trillion tax cut package and Trump tariffs offensive. What have been the actual impact of both thus far? Likely impact in 2026 and beyond? Trump mone…
…
continue reading
1
SANS Stormcast Friday, December 19th, 2025: Less Vulnerabie Devices; Critical OneView Vulnerablity; Trufflehog finds JWTs
4:37
4:37
Play later
Play later
Lists
Like
Liked
4:37Positive trends related to public IP range from the year 2025 Fewer ICS systems, as well as fewer systems with outdated SSL versions, are exposed to the internet than before. The trend isn t quite clean for ISC, but SSL2 and SSL3 systems have been cut down by about half. https://isc.sans.edu/diary/Positive%20trends%20related%20to%20public%20IP%20ra…
…
continue reading
1
Geert Baudewijns: Inside Ransomware Negotiations and the Ethics of Paying
39:16
39:16
Play later
Play later
Lists
Like
Liked
39:16What really happens when a company negotiates with ransomware groups? In this episode of THEOS Cybernova, Paul Jackson speaks with Geert Baudewijns, founder of Secutec and a veteran ransomware negotiator with over 500 real-world cases. Geert explains how ransomware negotiations actually work, from verifying stolen data and confirming the real threa…
…
continue reading
This week in the security news: Linux process injection Threat actors need training too A Linux device "capable of practically anything" The Internet of webcams Hacking cheap devices Automating exploitation with local AI models Lame C2 Smallest SSH backdoor Your RDP is on the Internet These are not the high severity bugs you were looking for Low ha…
…
continue reading
This week in the security news: Linux process injection Threat actors need training too A Linux device "capable of practically anything" The Internet of webcams Hacking cheap devices Automating exploitation with local AI models Lame C2 Smallest SSH backdoor Your RDP is on the Internet These are not the high severity bugs you were looking for Low ha…
…
continue reading
Hewlett Packard Enterprise patches a maximum-severity vulnerability in its OneView infrastructure management software. Cisco warns a critical zero-day is under active exploitation. An emergency Chrome update fixes two high-severity vulnerabilities. French authorities make multiple arrests. US authorities dismantle an unlicensed crypto exchange accu…
…
continue reading
1
SANS Stormcast Friday, December 19th, 2025: Less Vulnerabie Devices; Critical OneView Vulnerablity; Trufflehog finds JWTs (#)
4:38
4:38
Play later
Play later
Lists
Like
Liked
4:38SANS Stormcast Friday, December 19th, 2025: Less Vulnerabie Devices; Critical OneView Vulnerablity; Trufflehog finds JWTs Positive trends related to public IP range from the year 2025 Fewer ICS systems, as well as fewer systems with outdated SSL versions, are exposed to the internet than before. The trend isn't quite clean for ISC, but SSL2 and SSL…
…
continue reading
1
Hardware Requirements for Now and into the New Year
13:08
13:08
Play later
Play later
Lists
Like
Liked
13:08Listen as Technology Solutions Consultant Eric Baumgardner talks about the hardware requirements that will keep you moving into 2026. Eric discusses several topics that will help you and your financial practice. Topics include VPN, Windows, MacOS, desktops versus laptops, docking stations, memory and even AI tools.…
…
continue reading
1
N4N045: Audience Follow Up & 2026 Preview
59:01
59:01
Play later
Play later
Lists
Like
Liked
59:01If you’re curious as to what Ethan and Holly have in store for 2026, they give you a sneak peak on today’s episode. Hint: Some of these topics might include letters like B, G, P, Q, o, S, A and I. They also take time in this episode to answer listener questions, ranging from how... Read more »By Packet Pushers
…
continue reading
1
2015 vs 2025: What the Last Decade of Threats Taught Us
45:20
45:20
Play later
Play later
Lists
Like
Liked
45:20In this special, end-of-year episode (and Hazel’s final show as host) Talos Takes goes on a time-travel adventure: What would a defender from 2015 think of the cybersecurity realities of 2025? Joined by Talos teammates Pierre Cadieux, Alex Ryan, and Joe Marshall, we compare the threats, tools, and challenges of 2015 with those of 2025. The team rec…
…
continue reading
All links and images can be found on CISO Series. Check out this post by Binoy Koonammavu of Secusy AI for the discussion that is the basis of our conversation on this week's episode co-hosted by David Spark, the producer of CISO Series, and Edward Contreras, senior evp and CISO, Frost Bank. Joining them is best-selling cybersecurity author Peter G…
…
continue reading
1
When AI Pretends to Be Your CEO: How Companies Stay Secure
1:00:42
1:00:42
Play later
Play later
Lists
Like
Liked
1:00:42If your business relies on video calls, messaging apps, or mobile devices, you are at risk for a new kind of attack. In this episode of IT Visionaries, host Chris Brandt sits down with Christine Gadsby, Chief Security Officer at BlackBerry, to explore how AI, deepfakes, and weakened telecom infrastructure are reshaping the modern threat landscape. …
…
continue reading
On today’s episode, we welcome back cybersecurity expert Caleb Barlow. Caleb joins us to explore lessons learned from conflicts in Ukraine and Gaza, with a focus on emerging threats to GPS systems and how they could impact security, military operations, and critical infrastructure. While this show covers legal topics, and Ben is a lawyer, the views…
…
continue reading
This week, our hosts Dave Bittner, Joe Carrigan, and Maria Varmazis (also host of the T-Minus Space Daily show) are sharing the latest in social engineering scams, p…
…
continue reading
1
SANS Stormcast Thursday, December 18th, 2025: More React2Shell; Donicwall and Cisco Patch; Updated Chrome Advisory
6:10
6:10
Play later
Play later
Lists
Like
Liked
6:10Maybe a Little Bit More Interesting React2Shell Exploit Attackers are branching out to attack applications that initial exploits may have missed. The latest wave of attacks is going after less common endpoints and attempting to exploit applications that do not have Next.js exposed. https://isc.sans.edu/diary/Maybe%20a%20Little%20Bit%20More%20Intere…
…
continue reading
1
Radicalisation and national security after the Bondi Beach terror attack, with Dr Levi West
49:10
49:10
Play later
Play later
Lists
Like
Liked
49:10In this episode of the Defence Connect Podcast, host Robert Dougherty is joined by Dr Levi West, an Australian National University Research Fellow (radicalisation, extremism, terrorism) and former director of terrorism studies at the Australian Graduate School of Policing and Security. The pair take an in-depth look at the national security and cou…
…
continue reading
1
SANS Stormcast Thursday, December 18th, 2025: More React2Shell; Donicwall and Cisco Patch; Updated Chrome Advisory (#)
6:11
6:11
Play later
Play later
Lists
Like
Liked
6:11SANS Stormcast Thursday, December 18th, 2025: More React2Shell; Donicwall and Cisco Patch; Updated Chrome Advisory Maybe a Little Bit More Interesting React2Shell Exploit Attackers are branching out to attack applications that initial exploits may have missed. The latest wave of attacks is going after less common endpoints and attempting to exploit…
…
continue reading
Researchers detail a years-long Russian state-sponsored cyber espionage campaign. Israel’s cyber chief warns against complacency. Vulnerabilities affect products from Fortinet and Hitachi Energy. Studies show AI models are rapidly improving at offensive cyber tasks. MITRE expands its D3FEND cybersecurity ontology to cover operational technology. Te…
…
continue reading
1
Episode 077 – What Security Leaders Do for Fun
15:59
15:59
Play later
Play later
Lists
Like
Liked
15:59From Spartan races to culinary arts, discover the hobbies and passions that keep CISOs balanced and inspired in this behind-the-scenes edition of Agent of Influence. Welcome to a special edition of the Agent of Influence podcast! In this episode, we step away from the usual cybersecurity deep dives to explore the personal side of security leaders, …
…
continue reading
1
D2DO290: AI’s Impact on Developer Productivity Vs. Development Productivity
46:12
46:12
Play later
Play later
Lists
Like
Liked
46:12Ned Bellavance and Kyler Middleton are joined by Rachel Stephens, Research Director at RedMonk, to discuss the state of DevOps and the impact of AI. They explore the distinction between developer productivity and development productivity, underlined by a DORA report finding that while AI dramatically boosts individual developer productivity, it oft…
…
continue reading
1
321 - Three free tools to help you with Azure and Entra ID
28:56
28:56
Play later
Play later
Lists
Like
Liked
28:56In this episode, we take a look at three interesting - and free - tools to help you manage and secure Azure and Entra ID. We take each tool for a spin and reflect on the findings and usage. (00:00) - Intro and catching up. (03:15) - Show content starts. Show links ‑ ScEntra ‑ azqr - Azure Quick Review ‑ EntraExporter - Give us feedback!…
…
continue reading
1
NAN109: Simplify Your Network Operations with Extreme (Sponsored)
49:28
49:28
Play later
Play later
Lists
Like
Liked
49:28Today Eric Chou dives deep into network automation and operational simplicity with guest Hardik Ajmera, VP of Product Management at Extreme Networks. In this sponsored episode, they talk about the ‘network fabric’, Extreme Platform ONE, and, of course, what’s next with AI in the world of enterprise networking. Hardik also shares how customers in co…
…
continue reading
Send us a text A bus-powered hackathon, a $100K prize for a gloriously “useless” app, and keynotes that said AI so many times you could turn it into a supercut—re:Invent 2025 brought energy, irony, and real signals hiding in the noise. We’re joined by AWS Hero Chris Williams to unpack what actually matters: where AI is genuinely useful, where it’s …
…
continue reading