News, analysis, and insights into enterprise security. We put security vendors under the microscope, and explore the latest trends that can help defenders succeed. Hosted by Adrian Sanabria. Co hosts: Katie Teitler-Santullo, Ayman Elsawah, Jason Wood, Jackie McGuire, Sean Metcalf.
…
continue reading
Ot Security Podcasts
News, analysis, and insights into enterprise security. We put security vendors under the microscope, and explore the latest trends that can help defenders succeed. Hosted by Adrian Sanabria. Co hosts: Katie Teitler-Santullo, Ayman Elsawah, Jason Wood, Jackie McGuire, Sean Metcalf.
…
continue reading
The Watchers is a profile in the people who are looking out for the rest of us. From national security to cybersecurity, regulators to military operators, these are the people who are on the wall for us.
…
continue reading
Nozomi Networks security experts discuss topics that are important to the OT and IoT security community. This includes current cybersecurity threat intelligence, trends, news, and challenges. If you work in security or operations, or if you are a researcher, you’ll find episodes of interest.
…
continue reading
Simply ICS Cyber podcast features veteran OT security experts Don and Tom, delivering practical insights on securing critical infrastructure and industrial automation systems. With episodes covering essential topics from ICS fundamentals to advanced security frameworks, our show reaches a dedicated audience of operators, security professionals, and decision-makers actively implementing industrial cybersecurity control solutions. Connect with your ideal customers through targeted sponsorships ...
…
continue reading
מפגשים עם האנשים בחזית הגנת הסייבר לתעשייה ותשתיות קריטיות Meetings with the people at the forefront of cyber defense for industry and critical infrastructure ICS SCADA OT IoT
…
continue reading
Felix explores Internet of Things (IoT) and Operational Technology cyber security. Perfect for project managers, developers, and those learning about penetration testing in this niche area. Email Felix using [email protected] Get more information at the website: yougottahackthat.com Find You Gotta Hack That on LinkedIn and X @gotta_hack
…
continue reading
A lively discussion of the threats affecting supply chain, specifically focused on firmware and low-level code that is a blind spot for many organizations. This podcast will feature guests from the cybersecurity industry discussing the problems surrounding supply chain-related issues and potential solutions.
…
continue reading
There are great stories in the security industry that aren’t being told. Fascinating people who fly below the radar and aren’t being heard. We know because we encounter them in hallways, hotel lobbies and just about everywhere imaginable across the globe. Everytime we think “I wish I had recorded that conversation so that everyone could hear it…” Our goal with Security Voices is to provide a place for clear-headed dialogue with great people that’s unencumbered by the hyperbole and shouting t ...
…
continue reading
Welcome to the Security Weekly Podcast Network, your all-in-one source for the latest in cybersecurity! This feed features a diverse lineup of shows, including Application Security Weekly, Business Security Weekly, Paul's Security Weekly, Enterprise Security Weekly, and Security Weekly News. Whether you're a cybersecurity professional, business leader, or tech enthusiast, we cover all angles of the cybersecurity landscape. Tune in for in-depth panel discussions, expert guest interviews, and ...
…
continue reading
The Critical Assets Podcast covers important OT and ICS security topics with an eye toward standards and regulation to keep you ahead of your adversaries... and your auditors. Ampyx Cyber. Securing your world. See our other content such as blogs, cybersecurity news and more at www.ampyxcyber.com
…
continue reading
SecurityWeek podcast series. Hear from cybersecurity industry experts and visionaries. Easy listening, great insights..
…
continue reading
Nexus is a cybersecurity podcast hosted by Claroty Editorial Director Mike Mimoso. Nexus will feature discussions with cybersecurity leaders responsible for the security and protection of cyber-physical systems. Guests include cybersecurity researchers, executives, innovators, and influencers, discussing the topics affecting cybersecurity professionals in OT, IoT, and IoMT environments.
…
continue reading
Shaping Cybersecurity Leadership: Today, Tomorrow, Together.
…
continue reading
Ctrl+Alt+Manufacturing, from WTWH Media, explores the technologies and people driving smart manufacturing. Hosts Gary Cohen and Stephanie Neil discuss automation, AI, and digital transformation shaping the industry’s next era.
…
continue reading
Despite the growing attention on industrial cybersecurity, there is still much work to be done to keep pace with the increasing risks. To mature and comprehensively protect against cyber threats to operational technology (OT), it will take collaboration among key players from various sectors and industries. The PrOTect OT Cybersecurity podcast brings together experts in the field of cybersecurity for critical infrastructure and industrial organizations. Join Aaron Crow, the Chief Technology ...
…
continue reading
Phillip Wylie interviews cybersecurity industry experts on offensive security and techniques around penetration testing and red teaming.
…
continue reading
We bring you manufacturing news, insights, discuss opportunities, and cutting edge technologies. Our goal is to inform, educate, and inspire leaders and workers in manufacturing, automation, and related fields.
…
continue reading
Security veterans Joe Patti and Adam Roth welcome a diverse lineup of cybersecurity and information security experts to share their insights at the virtual bar. From cutting edge topics like AI and Operational Technology (OT) to the realities of careers and mental health, you'll get the inside view of what's happening across the industry and what it's really like to work in these fields, from the people who do it every day. Reach us at [email protected] or @SecCocktailHour on ...
…
continue reading
Welcome to The OT Life: A careers podcast from the OTs of Cygnet Health Care. We created The OT Life for OTs around the country who are interested in hearing from people who share the same passion for Occupational Therapy.We chat all things OT from our opinions about the profession, our role in health and social care, stories and experiences, and career advice.This is the place to help you make the most of the profession you love.https://join.cygnethealth.co.uk/ot-life/
…
continue reading
Dale Peterson interviews the innovators in ICS / SCADA cyber security as well as the top talent in related fields. It is the podcast for those who want more information similar to what is presented at the annual S4 event each January in Miami South Beach.
…
continue reading
Join us at the intersection of networking and security! Whether you’re fending off ransomware attacks, securing remote workers, hunting for rogue IoT devices, or gearing up for your latest compliance audit, Packet Protector provides practical information that IT and infrastructure pros can put to work. Every episode covers the latest security headlines and then drills into essential topics to provide technical and strategic insights on wired and wireless network security, access control, clo ...
…
continue reading
Industrial Cybersecurity Insider offers a thorough look into the field of industrial cybersecurity for manufacturing and critical infrastructure. The podcast delves into key topics, including industry trends, policy changes, and groundbreaking innovations. Each episode will feature insights from key influencers, policy makers, and industry leaders. Subscribe and tune in weekly to stay in the know on everything important in the industrial cybersecurity world!
…
continue reading
Tune in to hear thought leaders discuss the latest trends and best practices for IT/OT convergence and industrial connectivity.
…
continue reading
In this podcast, we delve into various aspects of cybersecurity, inviting global security leads to discuss trends, the impact of new concepts and regulations, talent retention, and more through one-on-one discussions.
…
continue reading
Interviews, conversations, and content from professionals in the cybersecurity industry providing you with valuable tips, tools, techniques, training, and resources to make you a top cyber pro.Connect with more from Top Cyber Pro at: Website: https://topcyberpro.com/ Facebook: https://www.facebook.com/TopCyberPro/ Instagram: https://www.instagram.com/topcyberpro/ Twitter: https://twitter.com/TopCyberPro TikTok: https://www.tiktok.com/@topcyberpro LinkedIn: https://www.linkedin.com/company/to ...
…
continue reading
SC Media is proud to present this month's CISO Stories program, where CISOs share tales from the trenches and unpack leadership lessons learned along the way. Hosted by Jessica Hoffman.
…
continue reading
Error Code is a biweekly narrative podcast that provides you both context and conversation with some of the best minds working today toward code resilience and dependability. Work that can lead to autonomous vehicles and smart cities. It’s your window in the research solving tomorrow’s code problems today.
…
continue reading
SC Media is proud to present this month's CISO Stories program, where CISOs share tales from the trenches and unpack leadership lessons learned along the way. Hosted by Jessica Hoffman.
…
continue reading
The Business of Cybersecurity is a podcast from the Tech Talks Network that explores where security and business strategy converge. Hosted by Neil C. Hughes, creator of the Tech Talks Daily Podcast, this series examines how today’s enterprises are managing cyber risk while still moving fast and innovating. Through insightful conversations with industry leaders, CISOs, product strategists, and security architects, the podcast brings clarity to the real-world decisions shaping cybersecurity in ...
…
continue reading
Control System Cyber Security Association International, or (CS)²AI, is the premier global non-profit workforce development organization supporting professionals of all levels charged with securing control systems. With over 34,000 members worldwide, we provide the platform for members to help members, foster meaningful peer-to-peer exchange, continue professional education, and directly support OT and ICS cyber security professional development in every way. Our founder, Derek Harp, intervi ...
…
continue reading
Hosted by former TSN 1200 morning show host Steve Warne, now the site editor for The Hockey News Ottawa, the Sens Nation Podcast keeps you up to date on everything Ottawa Senators. Steve, alongside The Coach, Gregg Kennedy, delivers insightful, knowledgeable, and sometimes brutally honest analysis of the Sens’ latest news and developments. Tune in for exclusive interviews, in-depth features, and commentary on player performances, team strategy, and the future of the franchise. The Sens Natio ...
…
continue reading
We know it can be challenging to secure your business, especially when you have limited time. The Get Cyber Resilient Show, brought to you by Mimecast, is the perfect way to stay up-to-date with the latest cyber developments across Australia and New Zealand. From cyber security to cyber awareness, your hosts Daniel McDermott, Garrett O'Hara and Vinh Nguyen will bring you insights and real stories from IT and Security Leaders, just like you. Don’t get angry at downtime and data breaches, Get ...
…
continue reading
Electricity. Finance. Transportation. Our water supply. In Hack the Plant, podcast host Bryson Bort looks for answers to the question: Does connecting these systems, and others, to the internet leaves us more vulnerable to attacks by our enemies? We often take these critical infrastructure systems for granted, but they’re all becoming increasingly dependent on the internet to function. From the ransomware threats of Colonial Pipeline to the failure of the Texas power grid, it is clear our in ...
…
continue reading
Brent Gunning and former Toronto Maple Leafs GM Gord Stellick provide the most insightful Maple Leafs pre- and post-game show with Leafs Nation.
…
continue reading
Visionary leaders from industrial companies share their insights on technology, innovation, and leadership. This podcast is for industrial business leaders who are looking to make data-driven decisions and learn from those who have experienced similar challenges.
…
continue reading
Theology Central is a podcast dedicated to deep theological analysis, critical sermon reviews, and doctrinal clarity in an age of confusion. Each episode explores Scripture through a confessional, law and gospel lens—rejecting celebrity-driven faith and focusing on truth, not trends. From exegetical teaching to historical theology and cultural critique, this podcast challenges mainstream assumptions and calls the church back to serious, Scripture-centered thinking. Expect honest engagement w ...
…
continue reading
1
Reduce Cyber Risk Podcast - Cyber Security Made Simple
Shon Gerber, vCISO, CISSP, Cyber Security Consultant, Author and Entrepreneur
Shon Gerber from the Reduce Cyber Risk podcast provides valuable insights, guidance, and training to you each week that only a senior cyber security expert and vCISO can perform. Shon has over 23+ years of experience in cyber security from large corporations, government, and as a college professor. Shon provides you the information, knowledge, and training needed to help protect your company from cyber security threats. Shon weekly provides cyber security training topics covering: Insider Th ...
…
continue reading
Royal College of Occupational Therapists is the professional membership body for occupational therapy staff in the UK. This is the home for our podcast series. www.rcot.co.uk/podcasts
…
continue reading
Welcome to the Methods podcast! Methods are the UK’s leading independent transformation partner for public services. We apply our skills in innovation and collaboration from across the Methods Group, to deliver end-to-end business and technical solutions that are people-centered, safe, and designed for the future. You can find out more about the Methods group at www.methods.co.uk.
…
continue reading
Dave Kittle, DPT of www.CashBasedPhysicalTherapy.org discuss Physical Therapy and Technology in this podcast. Full VIDEO versions of each episode can be found at https://www.youtube.com/PTTechTalk Dave Kittle also owns www.ConciergePainRelief.com (Home Physical Therapy) serving New York City, Long Island, NJ, and CT.
…
continue reading
Introducing Left to Our Own Devices - the podcast dedicated to everything product security. Every other week, we will be talking with a different cybersecurity policymaker, engineer, or industry leader to hear their war stories and get their insider tips for surviving the product security jungle. From Medical SBOMs, to WP. 29 and the latest industrial security threats, this is your place to catch up and learn from the pros. Hosted & produced by: *David Leichner, CMO at Cybellum - https://www ...
…
continue reading
1
When IT Meets OT, Can Endpoint Security Hold The Line
23:35
23:35
Play later
Play later
Lists
Like
Liked
23:35How do you protect factory floors, utilities, and critical infrastructure when IT and OT finally run on the same nervous system? That is the challenge at the heart of my latest conversation with John Walsh, Field CTO at IGEL Technology, recorded live at the IGEL Now and Next event in Frankfurt. Back in March in Miami, John and I talked about zero t…
…
continue reading
1
OT and ICS Pentesting and Security with Mike Holcomb
32:44
32:44
Play later
Play later
Lists
Like
Liked
32:44In this episode of Simply Offensive, Phillip Wylie interviews Mike Holcomb, an expert in Operational Technology (OT) and Industrial Control Systems (ICS) cybersecurity. Mike discusses the importance of OT security, the types of attacks that have targeted critical infrastructure, and the evolving landscape of cybersecurity threats. He shares insight…
…
continue reading
1
OT Security Doesn't Have to be a Struggle, Spotting Red Flags, Enterprise News - Joshua Hay, Todd Peterson - ESW #432
1:38:17
1:38:17
Play later
Play later
Lists
Like
Liked
1:38:17Segment 1: OT Security Doesn’t Have to be a Struggle OT/ICS/SCADA systems are often off limits to cybersecurity folks, and exempt from many controls. Attackers don’t care how fragile these systems are, however. For attackers aiming to disrupt operations, fragile but critical systems fit criminals’ plans nicely. In this interview, we discuss the cha…
…
continue reading
1
When IT Security Meets OT Reality: Why One Size Doesn't Fit All
35:14
35:14
Play later
Play later
Lists
Like
Liked
35:14What happens when IT cybersecurity practices collide with OT operational realities? In this episode, Jim and Dino expose the costly mistakes organizations make when applying IT security playbooks to manufacturing environments. Discover why zero trust architectures can halt production, how shadow IT thrives on every plant floor, and why remote acces…
…
continue reading
1
S2 E7: ICS/OT Security Operations Centers
25:56
25:56
Play later
Play later
Lists
Like
Liked
25:56The growing need for visibility and response in industrial environments is driving more organizations to consider ICS/OT Security Operations Centers — but what does that actually look like for small and medium-sized operations? In this episode of Simply ICS Cyber, Don and Tom sit down with Dan Gunter, CEO and founder of Insane Cyber, to discuss how…
…
continue reading
1
Ctrl+Alt+Mfg: Ep. 3: Rethinking OT Security With Leah and Jeremy Dodson, Piqued Solutions
49:02
49:02
Play later
Play later
Lists
Like
Liked
49:02Cybersecurity isn’t just an IT issue — it’s a manufacturing issue. In this episode of Ctrl+Alt+Mfg, hosts Gary Cohen and Stephanie Neil talk with Leah and Jeremy Dodson, co-founders of Piqued Solutions, about the evolving threats facing operational technology (OT) environments. From the myth of the “air gap” to the rise of AI-driven defenses, the D…
…
continue reading
We conclude our review of a sermon on Luke 20:27-40By Theology Central Media | Confessional Theology & Critical Analysis
…
continue reading
Heading into Thanksgiving week, many feel unseen, overwhelmed, or alone. Psalm 56:8 gives this comfort: God counts your wanderings and keeps your tears. In this episode, we explore the tear that God bottles—the tear He refuses to forget.By Theology Central Media | Confessional Theology & Critical Analysis
…
continue reading
1
Greg Garcia on the Sector Mapping and Risk Toolkit for Healthcare
36:56
36:56
Play later
Play later
Lists
Like
Liked
36:56Greg Garcia, Executive Director of the Health Sector Coordinating Council Cybersecurity Working Group, joins the Nexus Podcast to discuss the recent publication of the working group’s Sector Mapping and Risk Toolkit. The SMART toolkit is a methodology that helps healthcare providers visualize key services that support workflows in the industry and …
…
continue reading
I start a review of a sermon on Luke 20:27–40By Theology Central Media | Confessional Theology & Critical Analysis
…
continue reading
1
Luke 1:67-79: Observational Outline
1:00:55
1:00:55
Play later
Play later
Lists
Like
Liked
1:00:55We build an observational outline of Luke 1:67-79By Theology Central Media | Confessional Theology & Critical Analysis
…
continue reading
My confusion leads me to look into a famous devotional by J.C. PhilpotBy Theology Central Media | Confessional Theology & Critical Analysis
…
continue reading
I am confused by a devotional on Luke 1:74-75By Theology Central Media | Confessional Theology & Critical Analysis
…
continue reading
1
Emoticons, Sonicwall, Global Protect, Pop ups, WhatsApp, 7Zip, Roblox, Josh Marpet... - SWN #531
33:56
33:56
Play later
Play later
Lists
Like
Liked
33:56Emoticons, Sonicwall, Global Protect, Pop-ups, WhatsApp, 7Zip, Roblox, Josh Marpet, and More on the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-531
…
continue reading
We continue our study of Luke 20:27-40By Theology Central Media | Confessional Theology & Critical Analysis
…
continue reading
1
Give Me Liberty or Linux, Badge Hacking Interview - Bryce Owen - PSW #901
2:09:41
2:09:41
Play later
Play later
Lists
Like
Liked
2:09:41In the security news: Cloudflare was down, it was not good Logitech breached The largest data breach in history? Fortinet Fortiweb - the saga continues Hacking Linux through your malware scanner, oh the irony I never stopped hating systemd The ASUS exploit that never existed If iRobot fails, can we deploy our own hacker bot army? Firmware encryptio…
…
continue reading
We begin our study of Luke 20:27-40By Theology Central Media | Confessional Theology & Critical Analysis
…
continue reading
1
Ep. 235 - How to Build and Run a Systems Integration Company in Manufacturing
1:23:16
1:23:16
Play later
Play later
Lists
Like
Liked
1:23:16This episode takes you inside the reality of becoming a systems integrator and growing a technical services business from the ground up. Vlad and Dave share their personal experiences launching and running integration companies, the lessons they learned as engineers moving into business ownership, and the challenges that come with finding customers…
…
continue reading
1
J. Assaf Turner Founder & CEO @Maya Security on CxO & regulators' cyber dilemmas not limited to ICS
46:39
46:39
Play later
Play later
Lists
Like
Liked
46:39עֲקַבְיָא בֶּן מַהֲלַלְאֵל אוֹמֵר, הִסְתַּכֵּל בִּשְׁלֹשָׁה דְּבָרִים וְאֵין אַתָּה בָּא לִידֵי עֲבֵרָה. דַּע מֵאַיִן בָּאתָ וּלְאָן אַתָּה הוֹלֵךְ וְלִפְנֵי מִי אַתָּה עָתִיד לִתֵּן דִּין וְחֶשְׁבּוֹן.“ (משנה, מסכת אבות – פרק ג, משנה א) ללא הידיעה אין אפשרות לנהל סיכונים, עצם הידיעה נותנת את האפשרות לקבל החלטות מושכלות החל מהעובד הזוטר ועד ההנהלה …
…
continue reading
Why don't we learn? Why do we fail again and again? Today we begin examining a sermon that builds everything on that question—and asks us to look squarely at our own repeated patterns of collapse.By Theology Central Media | Confessional Theology & Critical Analysis
…
continue reading
Why don't we learn? Why do we fail again and again? Today we begin examining a sermon that builds everything on that question—and asks us to look squarely at our own repeated patterns of collapse.By Theology Central Media | Confessional Theology & Critical Analysis
…
continue reading
In this episode of Simply ICS Cyber, Don and Tom welcome Sam Blaney, retired Chief Warrant Officer (CW3) from the Georgia National Guard and current cybersecurity professor at the University of North Georgia. Sam shares insights from his career building and leading Cyber Protection Team 170, his transition into teaching, and his continued work help…
…
continue reading
1
Health and Wellness of the CISO as They Crack Under Pressure and Need a BISO to Scale - Dr. Yonesy Núñez - BSW #422
56:46
56:46
Play later
Play later
Lists
Like
Liked
56:46It's a topic we discuss often on Business Security Weekly: CISO Burnout. It's real, but how should you manage it? Dr. Yonesy Núñez, Global Cybersecurity Executive at Chain Bridge Bank and former Managing Director, Chief Cybersecurity Risk Officer, and Chief Information Security Officer at The Depository Trust & Clearing Corporation (DTCC), joins Bu…
…
continue reading
Why don't we learn? Why do we fail again and again? Today we begin examining a sermon that builds everything on that question—and asks us to look squarely at our own repeated patterns of collapse.By Theology Central Media | Confessional Theology & Critical Analysis
…
continue reading
Just a few minutes to take a breath and resetBy Theology Central Media | Confessional Theology & Critical Analysis
…
continue reading
1
Cloudflare, Gh0stRAT, npm, North Koreans, Arch, Steam, Documentaries, Aaran Leyland.. - SWN #530
35:24
35:24
Play later
Play later
Lists
Like
Liked
35:24Cloudflare, Gh0stRAT, npm, North Korean Employees, Arch Linux Steam Machine, Documentaries, Aaran Leyland, and more on the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-530
…
continue reading
The Self We Think We Are" looks at Peter's bold claim and Jesus' sobering correction in John 13:37–38. This episode confronts our spiritual self-deception, the church culture that encourages it, and the Gospel reality that Christ knows us better than we know ourselves—and loves us anyway.By Theology Central Media | Confessional Theology & Critical Analysis
…
continue reading
1
PP087: Why SBOMs Are Cooler and More Useful Than You Think
46:08
46:08
Play later
Play later
Lists
Like
Liked
46:08Just what’s inside that commercial software you bought? Does it contain open-source components, NPM packages, or other third-party code? How could you find out? The answer is a Software Bill of Materials, or SBOM, a machine-readable inventory of a finished piece of software. Why should you care about SBOMs? Our guest, Natalie Somersall, is here... …
…
continue reading
1
You've Got to Build Some Labs with Daniel Lowrie
30:41
30:41
Play later
Play later
Lists
Like
Liked
30:41In this episode of Simply Offensive, Phillip Wylie interviews Daniel Lowrie, who shares his extensive background in IT and cybersecurity, particularly in penetration testing and education. Daniel discusses his journey from IT to teaching, effective learning strategies for aspiring pen testers, the importance of hands-on experience, and engaging tea…
…
continue reading
1
The Silver Tsunami: Manufacturing's Talent and Knowledge Retirement Crisis
31:20
31:20
Play later
Play later
Lists
Like
Liked
31:20In this milestone 100th episode, Craig and Dino tackle the critical intersection of workforce retirement and industrial cybersecurity knowledge in manufacturing. They explore how 82% of manufacturing workforce exits are due to retirement, creating a dangerous knowledge vacuum as decades of plant expertise walk out the door. The conversation reveals…
…
continue reading
1
Secure Coding as Critical Thinking Instead of Vulnspotting - Matias Madou - ASW #357
1:03:41
1:03:41
Play later
Play later
Lists
Like
Liked
1:03:41Secure code should be grounded more in concepts like secure by default and secure by design than by "spot the vuln" thinking. Matias Madou shares his experience in secure coding training and the importance of teaching critical thinking. He also discusses why critical thinking is so closely related to threat modeling and how LLMs can be a tool for h…
…
continue reading
1
Ctrl+Alt+Mfg: Ep. 4: Making Digital Transformation Real With Alicia Lomas, Lomas Manufacturing
38:13
38:13
Play later
Play later
Lists
Like
Liked
38:13Digital transformation is everywhere — but what does it really mean for manufacturers? In this episode of Ctrl+Alt+Mfg, hosts Gary Cohen and Stephanie Neil sit down with Alicia Lomas, founder of Lomas Manufacturing, to talk about the practical side of Industry 4.0. From connecting data and building smarter control rooms to bridging IT and OT teams,…
…
continue reading
Is this the dramatic conclusion?By Theology Central Media | Confessional Theology & Critical Analysis
…
continue reading
1
Cybersecurity at Nanosecond Speed | Securing High Frequency Trading
59:58
59:58
Play later
Play later
Lists
Like
Liked
59:58In this episode of the Security Cocktail Hour, guest Jatin Mannepalli introduces co-hosts Joe Patti and Adam Roth the high-speed, high stakes world of high frequency trading (HFT) and its many security challenges. The conversation delves into the intricacies of high frequency trading, the stress of incident response, and the importance of redundanc…
…
continue reading
1
Pinto Signs Four-Year Extension, Impact of Chabot Injury, Tkachuk's New Podcast
45:12
45:12
Play later
Play later
Lists
Like
Liked
45:12In this episode, we discuss the Senators' recent news, including Shane Pinto's four-year extension and whether it's the right deal for both sides. We talk about the lack of depth on the left side of the blue line, which got worse last week with the injury to Thomas Chabot. We also touch on Brady Tkachuk's injury and his new podcast, Claude Giroux's…
…
continue reading
I have the transcripts!By Theology Central Media | Confessional Theology & Critical Analysis
…
continue reading
1
Year of the (Clandestine) Linux Desktop, topic, and the news - Rob Allen - ESW #433
1:56:49
1:56:49
Play later
Play later
Lists
Like
Liked
1:56:49Segment 1: Interview with Rob Allen It’s the Year of the (Clandestine) Linux Desktop! As if EDR evasions weren’t enough, attackers are now employing yet another method to hide their presence on enterprise systems: deploying tiny Linux VMs. Attackers are using Hyper-V and/or WSL to deploy tiny (120MB disk space and 256MB memory) Linux VMs to host a …
…
continue reading
1
Year of the (Clandestine) Linux Desktop, topic, and the news - Rob Allen - ESW #433
1:56:49
1:56:49
Play later
Play later
Lists
Like
Liked
1:56:49Segment 1: Interview with Rob Allen It's the Year of the (Clandestine) Linux Desktop! As if EDR evasions weren't enough, attackers are now employing yet another method to hide their presence on enterprise systems: deploying tiny Linux VMs. Attackers are using Hyper-V and/or WSL to deploy tiny (120MB disk space and 256MB memory) Linux VMs to host a …
…
continue reading
1
Year of the (Clandestine) Linux Desktop, topic, and the news - Rob Allen - ESW #433
1:56:50
1:56:50
Play later
Play later
Lists
Like
Liked
1:56:50Segment 1: Interview with Rob Allen It's the Year of the (Clandestine) Linux Desktop! As if EDR evasions weren't enough, attackers are now employing yet another method to hide their presence on enterprise systems: deploying tiny Linux VMs. Attackers are using Hyper-V and/or WSL to deploy tiny (120MB disk space and 256MB memory) Linux VMs to host a …
…
continue reading
We finish listening to a discussion/debate about Matthew 24By Theology Central Media | Confessional Theology & Critical Analysis
…
continue reading
1
Christopher Frenz on Evidence-Based Security
29:30
29:30
Play later
Play later
Lists
Like
Liked
29:30O'Reilly coauthor of Evidence-Based Security and longtime healthcare CISO Christopher Frenz joins the Nexus podcast to describe his organization's approach to cybersecurity that is rooted in transforming security from an artform to a science. Frenz discusses how this process through how he tests the efficacy of controls in his environment, and how …
…
continue reading
1
Augustus De Morgan, Doordash, Fortiweb, Typosquatting, Vista, Ransomware, AI, More... - SWN #529
28:45
28:45
Play later
Play later
Lists
Like
Liked
28:45Augustus De Morgan, Doordash, Fortiweb, Typosquatting, Vista, Ransomware, AI, Josh, Rob, Aaran, Jason, Dr. Scott, Rocky, Uh., and More on this edition of the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-529
…
continue reading
1
Bill Cameron on partner nation cybersecurity, and cyberspace escalation
1:33:25
1:33:25
Play later
Play later
Lists
Like
Liked
1:33:25Retired Navy officer and cybersecurity leader Bill Cameron joins Andy Sauer to discuss the evolving landscape of cyber conflict. From flying helicopters in the Cold War to advising U.S. presidents, Bill shares lessons in leadership, resilience, and mission focus. He explains why partner nations’ vulnerable networks matter to U.S. security, how adve…
…
continue reading
This week: Minecraft on your lightbulb Sonicwall breached, who's next? Ditch Android, install Linux Hacking your face Thermostat freedom Pen test fails HackRF hacking times 2 Going around EDR Hackers in your printer Chinese data breach NFC relays and PCI Constructive construction hacks FlipperZero firmware update ICS, PLCs, and attacks Bayesian Swi…
…
continue reading
We continue listening to a discussion/debate about Matthew 24By Theology Central Media | Confessional Theology & Critical Analysis
…
continue reading
1
Ep. 234 - What Students Learn When They Build Ignition Projects in Seventy Two Hours
30:54
30:54
Play later
Play later
Lists
Like
Liked
30:54In this conversation recorded at the Ignition Community Conference, Vlad, Dave, and their guest David Grussenmeyer from Inductive Automation explore one of the most important and inspiring stories in the world of industrial automation education. David leads the Educational Engagement Program at Inductive Automation and has spent the last several ye…
…
continue reading
Today for the Sermon Audio Daily, I point everyone to Christ Bible Church in Kingpsort, Tennessee. Check them out here: https://www.sermonaudio.com/br...By Theology Central Media | Confessional Theology & Critical Analysis
…
continue reading
We continue listening to a discussion/debate about Matthew 24By Theology Central Media | Confessional Theology & Critical Analysis
…
continue reading