Shielded: The Last Line of Cyber Defense is your definitive guide to navigating the quantum era of cybersecurity. Hosted by experts from PQShield, a global leader in post-quantum cryptography (PQC), this podcast explores how industries can future-proof their defences against the imminent threat of quantum computing. Each episode brings you actionable insights, real-world case studies, and expert interviews with cryptographers, industry leaders, and policymakers shaping the future of cybersec ...
…
continue reading
Post Quantum Cryptography Podcasts
If every company is now a tech company and digital transformation is a journey rather than a destination, how do you keep up with the relentless pace of technological change? Every day, Tech Talks Daily brings you insights from the brightest minds in tech, business, and innovation, breaking down complex ideas into clear, actionable takeaways. Hosted by Neil C. Hughes, Tech Talks Daily explores how emerging technologies such as AI, cybersecurity, cloud computing, fintech, quantum computing, W ...
…
continue reading
The Quantum State," is a podcast exploring the latest research and innovation in quantum computing. Join us as we dive into groundbreaking breakthroughs, trends, and news shaping the quantum landscape. Discover the cutting-edge developments pushing the boundaries of computing technology. Through insightful discussions, expert interviews, and in-depth analysis, we unravel the intricate theories and real-world applications driving this transformative field. "The Quantum State" also offers upda ...
…
continue reading
Every single podcast we publish in one convenient feed. This is a LOT of content. Hours of audio each week.
…
continue reading
Introducing the new podcast series from the National Cyber Security Centre (NCSC). Join us as we dive deep into the ever-evolving world of cyber security, bringing you discussions on topical issues, emerging trends, and expert insights from our in-house experts and external guests. Each episode offers a comprehensive exploration of a specific topic, providing listeners with valuable knowledge and actionable advice. Visit ncsc.gov.uk to find out more about the topics discussed, access additio ...
…
continue reading
The Ciena Network Insights Podcast brings together thought leaders, subject matter experts, and tech influencers to discuss the innovations and trends shaping our digital world. Join us every month for engaging conversations on telecom networks, digital transformation, sustainability, and more.
…
continue reading
Human-curated AI podcast for a lightweight technology discussion. I am a Network Engineer with two decades of experience working with Fortune 500 enterprise clients and tier 1 service providers. I also, operate a YouTube channel called SDN Tech Forum, where I share my knowledge and expertise on the latest networking technologies. My channel covers various topics, including Cisco SDA, SD-WAN,, Meraki, Thousandeyes, AWS, IoT, Cybersecurity, and more.
…
continue reading
Our most popular pods in one fat feed! Too much technology would never be enough. Includes Heavy Networking, Network Break, Day Two DevOps, Packet Protector, and Network Automation Nerds. Plus new shows when they launch so you know about fresh awesomeness.
…
continue reading
Network Break keeps you informed with fast, focused analysis of IT news, products, tech trends, and business outcomes. Blending sharp commentary with a touch of humor, hosts Drew Conry-Murray & Johna Till Johnson sift through the weekly landslide of press announcements, product launches, financial reports, and marketing decks to find the stories worth talking about. You come away with the information and context to make smart decisions in your organization and career … all in the span of a ( ...
…
continue reading
A security podcast is hosted by Professor William (Bill) Buchanan OBE, a world-renowned Information security professional and educator. Join Bill as he interviews and discusses the state-of-the-art with esteemed guests from all corners of the security industry. From cryptologists to technologists, each guest shares a wealth of experience and knowledge.
…
continue reading
The internet is broken—but it doesn’t have to be. If you’re concerned about how surveillance, online advertising, and automated content moderation are hurting us online and offline, the Electronic Frontier Foundation’s How to Fix the Internet podcast offers a better way forward. EFF has been defending your rights online for over thirty years and is behind many of the biggest digital rights protections since the invention of the internet. Through curious conversations with some of the leading ...
…
continue reading
What's in the SOSS? features the sharpest minds in security as they dig into the challenges and opportunities that create a recipe for success in making software more secure. Get a taste of all the ingredients that make up secure open source software (SOSS) and explore the latest trends at the intersection of AI and security, vulnerability management, and threat assessments. Each episode of What's in the SOSS? is packed with valuable insight designed to foster collaboration and promote stron ...
…
continue reading
Welcome to The International Risk Podcast — the premier destination for high-level insights into global risk dynamics. Hosted by Dominic Bowen, an accomplished senior advisor, each episode delivers expert analysis and actionable intelligence on today’s most pressing international risks. From geopolitical tensions and economic upheavals to cybersecurity threats and environmental challenges, we bring clarity to the complex risks shaping our world. Tailored for CEOs, Board Members, senior manag ...
…
continue reading
The world of technology is fascinating! But it's not accessible to a lot of people. In this podcast, Amit Sarkar & Rinat Malik talk about the various technologies, their features, practical applications and a lot more. Please follow us to hear about a popular or upcoming technology every week. #Tech #Technology #Podcast Find us at Amit Sarkar - https://amitsarkar.tech/ Rinat Malik - https://rinatmalik.com/ Contact us at - https://forms.gle/AauF6eic2CQv2Lvn9 Review us at - https://www.podchas ...
…
continue reading
1
NB551: Cisco Adds AI to Tech Support; Cryptography Hits a Post-Quantum Milestone
28:59
28:59
Play later
Play later
Lists
Like
Liked
28:59Take a Network Break! We start with a critical vulnerability in Cisco’s Unified Contact Center Express. On the news front it’s a Cisco triple play: the company brings AI to professional services and tech support with Cisco IQ, debuts converged infrastructure for the AI edge, and launches a new cert geared for running AI data... Read more »…
…
continue reading
1
TCG062: The Tech Expertise Deficit with Russ White
48:01
48:01
Play later
Play later
Lists
Like
Liked
48:01Today we delve into the tech expertise deficit and why technical depth and decades of doing the work matter more than social media followers and content creation hype. Our guest is Russ White, engineer, author, teacher, and certification developer. We begin with current events in AI, and then investigate the differences between career and influence…
…
continue reading
1
NAN106: Unimus: Network Automation By and For Network Engineers (Sponsored)
44:49
44:49
Play later
Play later
Lists
Like
Liked
44:49Tomas Kirnak, CEO of Unimus, joins Eric Chou in this sponsored episode to introduce Unimus, an on-premise network configuration management system built by network engineers to solve real-world problems. In this deep dive they discuss Unimus’ proprietary “Behavioral Tree” for automatic device discovery, the platform’s vendor support, the 70/30 rule,…
…
continue reading
1
NAN106: Unimus: Network Automation By and For Network Engineers (Sponsored)
44:49
44:49
Play later
Play later
Lists
Like
Liked
44:49Tomas Kirnak, CEO of Unimus, joins Eric Chou in this sponsored episode to introduce Unimus, an on-premise network configuration management system built by network engineers to solve real-world problems. In this deep dive they discuss Unimus’ proprietary “Behavioral Tree” for automatic device discovery, the platform’s vendor support, the 70/30 rule,…
…
continue reading
1
3483: Cisco and Presidio Unite to Build the AI Ready Network of the Future
36:54
36:54
Play later
Play later
Lists
Like
Liked
36:54*]:pointer-events-auto [content-visibility:auto] supports-[content-visibility:auto]:[contain-intrinsic-size:auto_100lvh] scroll-mt-[calc(var(--header-height)+min(200px,max(70px,20svh)))]" dir="auto" tabindex="-1" data-turn-id= "request-WEB:742e9866-c0c2-4dd5-9a5d-a4d6d43ed055-7" data-testid= "conversation-turn-16" data-scroll-anchor="false" data-tu…
…
continue reading
1
Episode 284: Eyes on the Earth, Power in Orbit: Climate Intelligence and the New Geography of Geopolitical Risk with Sabrina Alam
29:21
29:21
Play later
Play later
Lists
Like
Liked
29:21Today, Dominic Bowen hosts Sabrina Alam on The International Risk Podcast to explore the intersection of Earth observation, ESG verification, and the geopolitics of space-based data. They discuss how satellites have become central to sustainability reporting, climate monitoring, and economic decision-making, while also forming part of critical infr…
…
continue reading
1
HS116: Nth-Party Risk May Put You on the (Block) Chain Gang
32:57
32:57
Play later
Play later
Lists
Like
Liked
32:57The evolution of the modern, Internet-driven economy has created the conditions for essentially unbounded Nth-party risks (that is, risks from your suppliers, and risks from your suppliers’ suppliers, and risks from your suppliers’ suppliers’ suppliers, ad infinitum). Nth party risks exist in public clouds, SaaS, software and hardware supply chains…
…
continue reading
1
PP086: Using Let’s Encrypt and the ACME Protocol for Domain Validation Certificates
44:39
44:39
Play later
Play later
Lists
Like
Liked
44:39Certificates are the socks of IT—everyone needs them, and you always lose track of a few. On today’s show we dive into the ACME protocol, an IETF standard to help automate how a domain owner gets a domain validation certificate from a Certificate Authority (CA). Our guest, Ed Harmoush, a former network engineer with AWS... Read more »…
…
continue reading
1
PP086: Using Let’s Encrypt and the ACME Protocol for Domain Validation Certificates
44:39
44:39
Play later
Play later
Lists
Like
Liked
44:39Certificates are the socks of IT—everyone needs them, and you always lose track of a few. On today’s show we dive into the ACME protocol, an IETF standard to help automate how a domain owner gets a domain validation certificate from a Certificate Authority (CA). Our guest, Ed Harmoush, a former network engineer with AWS... Read more »…
…
continue reading
1
3482: IGEL CEO Klaus Oestermann on Why the Endpoint Is the Forgotten Link in Cybersecurity
28:02
28:02
Play later
Play later
Lists
Like
Liked
28:02What if the real weakness in enterprise cybersecurity isn't the cloud or the network, but the endpoint sitting on every desk? In this episode, Klaus Oestermann, CEO of IGEL Technology, joins me at the Now and Next event in Frankfurt to discuss why he calls the endpoint the forgotten link in digital transformation. Klaus explains how decades of dete…
…
continue reading
1
NB551: Cisco Adds AI to Tech Support; Cryptography Hits a Post-Quantum Milestone
28:59
28:59
Play later
Play later
Lists
Like
Liked
28:59Take a Network Break! We start with a critical vulnerability in Cisco’s Unified Contact Center Express. On the news front it’s a Cisco triple play: the company brings AI to professional services and tech support with Cisco IQ, debuts converged infrastructure for the AI edge, and launches a new cert geared for running AI data... Read more »…
…
continue reading
1
NB551: Cisco Adds AI to Tech Support; Cryptography Hits a Post-Quantum Milestone
28:59
28:59
Play later
Play later
Lists
Like
Liked
28:59Take a Network Break! We start with a critical vulnerability in Cisco’s Unified Contact Center Express. On the news front it’s a Cisco triple play: the company brings AI to professional services and tech support with Cisco IQ, debuts converged infrastructure for the AI edge, and launches a new cert geared for running AI data... Read more »…
…
continue reading