Search a title or topic

Over 20 million podcasts, powered by 

Player FM logo
show episodes
 
Artwork

1
ISACA Podcast

ISACA Podcast

icon
Unsubscribe
icon
Unsubscribe
Monthly
 
The ISACA Podcast gives you insight into the latest regulations, trends and threats experienced by information systems auditors and governance and security professionals. Whether you are beginning your career or have decades of experience, the ISACA Podcast can help you be better equipped to address industry challenges and embrace opportunities.
  continue reading
 
The Cloud Wars franchise, part of the Acceleration Economy Network, analyzes the major cloud vendors from the perspective of business customers. In Cloud Wars Live, Bob Evans talks with both sides about these profoundly transformative technologies, and with monthly All-Star guests from across the business community about the trends impacting how the world lives, works, plays, and dreams. Visit https://accelerationeconomy.com/category/cloud-wars/ for more.
  continue reading
 
Want to hear what industry experts really think about the cyber threats they face? ShadowTalk is a weekly cybersecurity podcast, made by practitioners for practitioners, featuring analytical insights on the latest cybersecurity news and threat research. Threat Intelligence Analyst Kim Bromley brings over 15 years of experience in threat intelligence across the public and private sectors. Kim and her guests provide practical perspectives on the week’s top cybersecurity news and share knowledg ...
  continue reading
 
Welcome to "Crying Out Cloud," the monthly podcast that keeps you up to date with the latest cloud security news. Hosted by experts Eden Naftali and Amitai Cohen, each episode provides in-depth coverage of the most important vulnerabilities and incidents from the previous month. Tune in for insightful analysis and expert recommendations to help you safeguard your cloud infrastructure.
  continue reading
 
Artwork

1
HRchat Podcast

The HR Gazette

icon
Unsubscribe
icon
Unsubscribe
Weekly+
 
Listen to the HRchat Podcast by HR Gazette to get insights and tips from HR leaders, influencers and tech experts. Topics covered include HR Tech, HR, AI, Leadership, Talent, Recruitment, Employee Engagement, Recognition, Wellness, DEI, and Company Culture. Hosted by Bill Banham, Bob Goodwin, Pauline James, and other HR enthusiasts, the HRchat show publishes interviews with influencers, leaders, analysts, and those in the HR trenches 2-4 times each week. The show is approaching 1000 episodes ...
  continue reading
 
A Federal Security & Compliance career is a very rewarding career - we get the honor and privilege of protecting some of the most guarded assets of our great country. However, it doesn’t come without a cost. We often take the brunt of the beating when it comes to the regulations that are impeding innovation. Join federal security professional Max Aulakh as he distills the challenges facing our career field, pulling back the curtain on culture, emerging technical knowledge, ATOs, CMMC and var ...
  continue reading
 
State of the CIO features senior IT professionals from leading organizations across America. Talking points on the show include the role of the CIO in business transformation, innovative AI implementation, and consumer engagement as a path to growth. Tune in every week to hear insights from the leading lights of enterprise Information Technology.
  continue reading
 
The traditional enterprise go-to-market motion is undergoing a transformational shift. B2B buyers are more sophisticated than ever, and operational efficiency is a key focus for every organization. One key function possesses a unique opportunity to shape the future of revenue generation: enablement. On this podcast, we’re bringing you the secrets, strategies, and tactics that successful enablement leaders are using to drive meaningful impact. The Enablement Edge is the go-to resource for sal ...
  continue reading
 
Insights from the tech industry's top leaders in this podcast about Cloud, IT Modernization, and Digital Transformation - hosted by Alex Raul and sponsored by Rackner. Listen to find out how organizations large and small are using cloud technologies to further their mission. Topics discussed include Cloud Native technologies like Kubernetes, DevSecOps, Serverless, Cybersecurity, Hybrid Cloud, Private Cloud, AWS, Azure, GCP, Open Source and much more. The Cloud Native Show is presented by Rac ...
  continue reading
 
Today, software is the power that moves society. To stay in control over their intellectual property and remain competitive on the market software publishers and intelligent device manufacturers need to integrate top-notch protections against counterfeiting, reverse engineering, and tampering and implement an orchestration of license models that fully respond to the customer’s needs on a global scale. CodeMeter by Wibu-Systems is a comprehensive and award-winning suite of hardware-, software ...
  continue reading
 
Loading …
show series
 
Meet the woman who understands how robots think and more importantly, how we think about them. Professor Kerstin Fischer brings over 20 years of research expertise to this fascinating exploration of human-robot interaction and what it means for our workplaces. The conversation delves into a critical distinction most of us miss: the power of embodim…
  continue reading
 
Extracting With pngdump.py Didier extended his pngdump.py script to make it easier to extract additional data appended to the end of the image file. https://isc.sans.edu/diary/Extracting%20With%20pngdump.py/32022 16 React Native Packages for GlueStack Backdoored Overnight 16 npm packages with over a million weekly downloads between them were compro…
  continue reading
 
Be Careful With Fake Zoom Client Downloads Miscreants are tricking victims into downloading fake Zoom clients (and likely other meeting software) by first sending them fake meeting invites that direct victims to a page that offers malware for download as an update to the Zoom client. https://isc.sans.edu/diary/Be%20Careful%20With%20Fake%20Zoom%20Cl…
  continue reading
 
Phishing e-mail that hides malicious links from Outlook users Jan found a phishing email that hides the malicious link from Outlook users. The email uses specific HTML comment clauses Outlook interprets to render or not render specific parts of the email s HTML code. Jan suggests that the phishing email is intented to not expose users of https://is…
  continue reading
 
Resources: https://linktr.ee/ReliaQuestShadowTalk Join host Kim along with intelligence analysts Joey and Alex as they discuss: Scattered Spider's Focus on Tech Vendors How APT41 Abuses Google Calendar for C2 The SentinelOne Outage A New Void Blizzard Espionage Campaign Kim Bromley: Senior Cyber Threat Intelligence Analyst on the ReliaQuest Threat …
  continue reading
 
In this episode, ISACA's Lisa Cook engages with Yakir Golan, Executive Officer (CEO) and Co-Founder of Kovrr, to explore the critical role of Cyberrisk Quantification (CRQ) in enhancing organizational financial resilience. They discuss how CRQ solutions provide objective assessments of an organization's cybersecurity posture, enabling leaders to ma…
  continue reading
 
vBulletin Exploits CVE-2025-48827, CVE-2025-48828 We do see exploit attempts for the vBulletin flaw disclosed about a week ago. The flaw is only exploitable if vBulltin is run on PHP 8.1, and was patched over a year ago. However, vBulltin never disclosed the type of vulnerability that was patched. https://isc.sans.edu/diary/vBulletin%20Exploits%20%…
  continue reading
 
What does it take to create a unified culture when your team spans 50 countries and includes thousands of employees? Sue Quackenbush, Chief People Officer at Dynatrace, reveals the secret sauce behind their "real vibes, real people" approach that keeps their global workforce connected. With 33% of Dynatrace's 4,000+ employees working fully remotely…
  continue reading
 
Simple SSH Backdoor Xavier came across a simple SSH backdoor taking advantage of the ssh client preinstalled on recent Windows systems. The backdoor is implemented via an SSH configuration file that instructs the SSH client to connect to a remote system and forward a shell on a random port. This will make the shell accessible to anybody able to con…
  continue reading
 
A PNG Image With an Embedded Gift Xavier shows how Python code attached to a PNG image can be used to implement a command and control channel or a complete remote admin kit. https://isc.sans.edu/diary/A+PNG+Image+With+an+Embedded+Gift/31998 Cisco IOS XE WLC Arbitrary File Upload Vulnerability (CVE-2025-20188) Analysis Horizon3 analyzed a recently p…
  continue reading
 
Alternate Data Streams: Adversary Defense Evasion and Detection Good Primer of alternate data streams and how they are abused, as well as how to detect and defend against ADS abuse. https://isc.sans.edu/diary/Alternate%20Data%20Streams%20%3F%20Adversary%20Defense%20Evasion%20and%20Detection%20%5BGuest%20Diary%5D/31990 Connectwise Breach Affects Scr…
  continue reading
 
🎙️ Just dropped: Dr. Anton Chuvakin from Google Cloud, with legendary insights (and cloud security jokes).Eden Koby Naftali & Amitai Cohen sat down with Dr. Anton Chuvakin, Google Cloud's Office of the CISO, and the guy who made SIEM cool!What they got into ⬇️ 1) Why SOCs are broken (and full of toil)2) How to actually apply AI in security3) Why cl…
  continue reading
 
Exploring a Use Case of Artificial Intelligence Assistance with Understanding an Attack Jennifer Wilson took a weird string found in a recent honeypot sample and worked with ChatGPT to figure out what it is all about. https://isc.sans.edu/diary/%5BGuest%20Diary%5D%20Exploring%20a%20Use%20Case%20of%20Artificial%20Intelligence%20Assistance%20with%20U…
  continue reading
 
Resources: https://linktr.ee/ReliaQuestShadowTalk Join host Kim along with intelligence analysts Joey and Alex as they discuss: Factors Driving Russian Market's Popularity Attackers' Favorite Infostealers Infostealer Attack Paths Main Types and Exclusivity of Stolen Logs Kim Bromley: Senior Cyber Threat Intelligence Analyst on the ReliaQuest Threat…
  continue reading
 
SSH authorized_keys File One of the most common techniques used by many bots is to add rogue keys to the authorized_keys file, implementing an SSH backdoor. Managing these files and detecting unauthorized changes is not hard and should be done if you operate Unix systems. https://isc.sans.edu/diary/Securing%20Your%20SSH%20authorized_keys%20File/319…
  continue reading
 
In this episode, Bill Banham talks with Marina Farthouat, the new Vice President, People at Oyster - the global employment platform that enables companies to hire, pay, and care for distributed teams. Marina brings a refreshing perspective to the HRchat Show about transforming workplace norms through remote and distributed teams. Drawing from her d…
  continue reading
 
Assist, Accelerate, Transform The Big Themes: Workday’s Agent System of Record: Workday's Agent System of Record manages the emerging digital agent ecosystem. It provides structure and governance to what could otherwise become a chaotic sprawl of AI agents. By embedding agent management into existing organizational hierarchies, Workday ensures that…
  continue reading
 
SVG Steganography Steganography is not only limited to pixel-based images but can be used to embed messages into vector-based formats like SVG. https://isc.sans.edu/diary/SVG%20Steganography/31978 Fortinet Vulnerability Details CVE-2025-32756 Horizon3.ai shows how it was able to find the vulnerability in Fortinet s products, and how to possibly exp…
  continue reading
 
Resilient Secure Backup Connectivity for SMB/Home Users Establishing resilient access to a home network via a second ISP may lead to unintended backdoors. Secure the access and make sure you have the visibility needed to detect abuse. https://isc.sans.edu/diary/Resilient%20Secure%20Backup%20Connectivity%20for%20SMB%20Home%20Users/31972 BadSuccessor…
  continue reading
 
The Big Themes: SAP’s Flywheel Strategy: SAP introduced a compelling flywheel model that integrates applications, data, and AI to drive enterprise momentum. The idea is that integrated applications generate structured data, which then feeds a robust AI layer. As these layers build on one another, they create a self-reinforcing cycle of productivity…
  continue reading
 
New Variant of Crypto Confidence Scam Scammers are offering login credentials for what appears to be high value crypto coin accounts. However, the goal is to trick users into paying for expensive VIP memberships to withdraw the money. https://isc.sans.edu/diary/New%20Variant%20of%20Crypto%20Confidence%20Scam/31968 Malicious Chrome Extensions Malici…
  continue reading
 
Resources: https://linktr.ee/ReliaQuestShadowTalk Join host Joey along with intelligence analysts John and Hayden as they discuss: ReliaQuest's investigation into hijacked routers and SEO poisoning fueling payroll heists Nation-state actors leveraging the SAP NetWeaver vulnerability en masse A new "Defendnot" tool that tricks Windows Defender into …
  continue reading
 
Curtis Vincent, CHRO at The Estate Registry, offers a fascinating look at how digital estate management is transforming employee benefits packages and addressing a critical gap in financial wellness programs. The days of the fireproof lockbox stuffed with important papers are long behind us. As Curtis explains, modern employees lead increasingly co…
  continue reading
 
Researchers Scanning the Internet A newish RFC, RFC 9511, suggests researchers identify themselves by adding strings to the traffic they send, or by operating web servers on machines from which the scan originates. We do offer lists of researchers and just added three new groups today https://isc.sans.edu/diary/Researchers%20Scanning%20the%20Intern…
  continue reading
 
RAT Dropped By Two Layers of AutoIT Code Xavier explains how AutoIT was used to install a remote admin tool (RAT) and how to analyse such a tool https://isc.sans.edu/diary/RAT%20Dropped%20By%20Two%20Layers%20of%20AutoIT%20Code/31960 RVTools compromise confirmed Robware.net, the site behind the popular tool RVTools now confirmed that it was compromi…
  continue reading
 
In this episode of the HRchat Show, Bill Banham talks with Douglas Leach about the upcoming Disrupt London and HR Analytics Summits. Doug's journey to founding the HR Analytics Summit reads like a masterclass in entrepreneurial resilience. Launching his venture in October 2019 - mere months before a global pandemic would shut down in-person events …
  continue reading
 
xorsearch.py: Python Functions Didier s xorsearch tool now supports python functions to filter output https://isc.sans.edu/diary/xorsearch.py%3A%20Python%20Functions/31858 Pwn2Own Berlin 2025 Last weeks Pwn2Own contest in Berlin allowed researchers to demonstrate a number of new exploits with a large focus on privilege escalation and virtual machin…
  continue reading
 
Ever wondered what makes the Association for Talent Development (ATD) a key player in the world of HR and professional development? This episode pulls back the curtain as Bill Banham talks with Mallory Flynn, Content Manager for Career Development, Organization Development, and Talent Management Communities at ATD. Mallory walks us through three ga…
  continue reading
 
Join us for a thrilling addition to our 80th anniversary VE Day episode. We uncover the extraordinary tale of Joseph “Jumpin’ Joe” Beyrle, a WWII paratrooper whose courage defined a generation. From heart-pounding D-Day jumps with the 101st Airborne to a remarkable chapter fighting alongside the Soviet Red Army. Beyrle’s rare WWII dual service make…
  continue reading
 
Web Scanning SonicWall for CVE-2021-20016 - Update Scans for SonicWall increased by an order of magnitude over the last couple of weeks. Many of the attacks appear to originate from Global Host , a low-cost virtual hosting provider. https://isc.sans.edu/diary/Web%20Scanning%20SonicWall%20for%20CVE-2021-20016%20-%20Update/31952 Google Update Patches…
  continue reading
 
Ransomware remains one of the most formidable cybersecurity threats facing organizations worldwide. In this episode of the ISACA Podcast, host Chris McGowan speaks with Netwrix endpoint protection expert Jeremy Moskowitz, who explains how ransomware infiltrates and cripples desktop environments. He explains cybercriminals' tactics to exploit social…
  continue reading
 
Ever wondered what Formula One racing and career websites have in common? More than you might think, according to Bryan Adams, CEO and founder of Happydance, who recently joined Bill Banham on the HRchat Show to discuss an innovative new campaign that's bringing F1-inspired competition to the talent acquisition space. The "Careers Site Grand Prix" …
  continue reading
 
Another day, another phishing campaign abusing google.com open redirects Google s links from it s maps page to hotel listings do suffer from an open redirect vulnerability that is actively exploited to direct users to phishing pages. https://isc.sans.edu/diary/Another%20day%2C%20another%20phishing%20campaign%20abusing%20google.com%20open%20redirect…
  continue reading
 
Resources: https://linktr.ee/ReliaQuestShadowTalk Join host Kim along with intelligence analysts Joey and Hayden as they discuss: ReliaQuest's Forecast for How US Policy will Impact Russia-linked Cyber Threats Infostealers Spread by Fake AI Video Generators Kickidler Abuse by Ransomware Groups FBI Takedown of Huge Botnet Kim Bromley: Senior Cyber T…
  continue reading
 
Parisa Tabriz is vice president and general manager for Google Chrome, the world’s leading browser platform. She leads efforts to make Chrome a secure and essential enterprise workspace, integrating AI and advanced cybersecurity to meet evolving business needs. In this episode, Parisa joins Bob to explore how Chrome is redefining the browser as a p…
  continue reading
 
🎙️ All you need to know from Ransomware to CVE Programs!☁️ Join Amitai Cohen and Eden Naftali as they break down the top stories in the cloud:- UK Retail Sector Hit by Ransomware (DragonForce & Scattered Spider)- SAP NetWeaver Vulnerability Exploited in the Wild- CVE Program Faces Major Backlog and Trust Issues…
  continue reading
 
The workplace has fundamentally transformed, dramatically increasing the emotional demands on leaders at all levels. From managing virtual teams to navigating workforce polarization, today's leaders face unprecedented challenges that require a new set of emotional skills to thrive. Executive coach and leadership strategist Dina Denham-Smith joins B…
  continue reading
 
Microsoft Patch Tuesday Microsoft patched 70-78 vulnerabilities (depending on how you count them). Five of these vulnerabilities are already being exploited. In particular, a remote code execution vulnerability in the scripting engine should be taken seriously. It requires the Microsoft Edge browser to run in Internet Explorer mode. https://isc.san…
  continue reading
 
Apple Updates Everything Apple patched all of its operating systems. This update ports a patch for a recently exploited vulnerability to older versions of iOS and macOS. https://isc.sans.edu/diary/31942 It Is 2025, And We Are Still Dealing With Default IoT Passwords And Stupid 2013 Router Vulnerabilities Versions of the Mirai botnet are attacking d…
  continue reading
 
Highlights Google Cloud’s AI Revolution and Customer Success (00:10) Renner talks about how, for Google Cloud, delivering great outcomes for customers must come before achieving returns. Efforts are underway to push brainpower and expertise directly to customers, while simplifying the sales process by infusing more industry-specific knowledge. Cust…
  continue reading
 
Steganography Challenge Didier revealed the solution to last weekend s cryptography challenge. The image used the same encoding scheme as Didier described before, but the columns and rows were transposed. https://isc.sans.edu/forums/diary/Steganography%20Challenge%3A%20My%20Solution/31912/ FBI Warns of End-of-life routers The FBI is tracking larger…
  continue reading
 
What makes an HR conference truly exceptional? According to veteran attendee Jackye Clayton, it's the willingness to tackle tough issues while maintaining a human-centered approach - precisely what sets Workhuman Live apart from the crowd. In this conversation with HRchat host Bill Banham, Jackye shares her enthusiasm for the upcoming Workhuman Liv…
  continue reading
 
What happens when artificial intelligence meets human connection in the workplace? Jesse Harriott, Executive Director of Workhuman iQ, reveals a groundbreaking approach to workplace analytics that's transforming how organizations understand their people and culture. Dive into the Human Intelligence 2025 release from Workhuman, which leverages recog…
  continue reading
 
Scramble the squad with Lefty and the Lead Head Brigade for a full-throttle tribute to VE Day’s 80th anniversary, celebrating the Allied smackdown of Nazi Germany on May 8, 1945. In Smashing Hitler at 80: VE Day’s Firepower & Grit, we tear through the battles, weapons, and heroes that obliterated Hitler’s war machine. Joseph Collins (WWII Airborne …
  continue reading
 
No Internet Access: SSH to the Rescue If faced with restrictive outbound network access policies, a single inbound SSH connection can quickly be turned into a tunnel or a full-blown VPN https://isc.sans.edu/diary/No%20Internet%20Access%3F%20SSH%20to%20the%20Rescue!/31932 SAMSUNG magicINFO 9 Server Flaw Still exploitable The SAMSUNG magicINFO 9 Serv…
  continue reading
 
🎙️ Listen to the biggest insights of bug bounty hunting with Justin Gardner 🚨 In this episode, Amitai Cohen and Eden Naftali are joined by none other than Justin, renowned bug bounty hunter and host of the Creative Thinking podcast (ctbbpodcast). Justin unpacks some of today's 🔥 topics: - Bug bounty disclosure challenges & trends - Security stories…
  continue reading
 
Example of Modular Malware Xavier analyzes modular malware that downloads DLLs from GitHub if specific features are required. In particular, the webcam module is inspected in detail. https://isc.sans.edu/diary/Example%20of%20%22Modular%22%20Malware/31928 Sysaid XXE Vulnerabilities IT Service Management Software Sysaid patched a number of XXE vulner…
  continue reading
 
Resources: https://linktr.ee/ReliaQuestShadowTalk Join host Kim along with intelligence analyst John and threat hunter Tristan as they discuss: Scattered Spider Attacks UK Retail Orgs Bring Your Own Installer SentinelOne Bypass Hunting for North Korean Insiders Kim Bromley: Senior Cyber Threat Intelligence Analyst on the ReliaQuest Threat Research …
  continue reading
 
Loading …
Copyright 2025 | Privacy Policy | Terms of Service | | Copyright
Listen to this show while you explore
Play