Search a title or topic

Over 20 million podcasts, powered by 

Player FM logo

Secure Remote Access Podcasts

show episodes
 
Artwork

1
Talos Takes

Cisco Talos

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
Every fortnight, host Hazel Burton brings on a new guest from Talos or the broader Cisco Security world to break down a complicated security topic. We cover everything from breaking news to attacker trends and emerging threats.
  continue reading
 
Artwork

1
Packet Protector

Packet Pushers

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
Join us at the intersection of networking and security! Whether you’re fending off ransomware attacks, securing remote workers, hunting for rogue IoT devices, or gearing up for your latest compliance audit, Packet Protector provides practical information that IT and infrastructure pros can put to work. Every episode covers the latest security headlines and then drills into essential topics to provide technical and strategic insights on wired and wireless network security, access control, clo ...
  continue reading
 
Sound like a tech pro, even if you’re not! Award-winning popular host Kim Komando is your secret weapon. Kim is in a class all her own. Her widely successful radio show is heard on over 500 stations in the United States and internationally in 175 different countries. Kim has millions of fans who love her down-to-earth, deeply relatable, and easy-to-understand way of talking about consumer tech. Every episode is loaded with the scoop about the latest gadgets, online security, social media tre ...
  continue reading
 
Ledger is the gold standard of security in the crypto space. Our hardware wallets are essential for anyone wanting to take control of their digital value. At the heart of this ecosystem, Ledger connects you with everything in the digital assets space, providing access to services and freedom from compromise on security, ownership or user experience. On 'The Ledger Podcast', we have conversations with some of the most interesting thought leaders in crypto, cybersecurity and culture to discuss ...
  continue reading
 
Artwork
 
מפגשים עם האנשים בחזית הגנת הסייבר לתעשייה ותשתיות קריטיות Meetings with the people at the forefront of cyber defense for industry and critical infrastructure ICS SCADA OT IoT
  continue reading
 
The cloudbrink Podcast explores the future of remote/hybrid work, cybersecurity, and network performance. Each episode features expert insights, tech breakdowns, and conversations on how Cloudbrink is reshaping secure access with personal SASE, zero trust, and edge-native solutions.From tackling zero-day vulnerabilities to challenging legacy systems like VPNs and firewalls, Cloudbrink Edgecast brings you the people, ideas, and innovations driving the next generation of enterprise connectivity.
  continue reading
 
Artwork

1
5G 6G Wave

Modi Daryani

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Welcome to "5G 6G Wave" - Riding the Next G Wave of Connectivity. Your ultimate source for everything related to the groundbreaking world of 5G 6G technology. Hosted by Modi Daryani, this podcast delves into the latest advancements, trends, and innovations in 5G, exploring its transformative impact across various industries and everyday life. Each episode of "5G 6G Wave" features in-depth discussions on key topics such as the evolution of mobile networks, the integration of 5G with AI and Io ...
  continue reading
 
Artwork

1
Ativion Pulse

Ativion Podcast Team

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Daily+
 
Ativion Pulse is a podcast exploring the dynamic world of education technology and the critical role of secure remote access in today's learning environments. Join us as we delve into the latest trends, challenges, and best practices in ed-tech, featuring insightful conversations with industry experts, educators, and technology leaders. We'll discuss topics such as: Securing student data: Protecting sensitive information in a remote and increasingly digital world. Improving remote learning e ...
  continue reading
 
Beyond Downtime: The Verito Advantage is the podcast for tax and accounting professionals who refuse to let IT issues interrupt their business. Hosted by the experts behind Verito.com, each episode explores the real risks behind "good enough" technology and how to build a firm that just works. Securely. Join us as we dive into real-world stories, compliance must-knows (like the FTC Safeguards Rule, IRS Pub 4557, WISP), and emerging tech shaping the future of financial practices. From ransomw ...
  continue reading
 
The Project+ PrepCast is a complete audio series built around the CompTIA Project+ PK0-005 exam objectives. Each episode delivers clear explanations, practical examples, and glossary coverage to help you understand project management concepts, tools, life cycle phases, and IT governance. Produced by BareMetalCyber.com, it’s designed to guide you from orientation through exam readiness with professional, exam-focused instruction.
  continue reading
 
In a rapidly evolving industrial world, the demand for intelligent and secure communication tools has never been higher. This episode focuses on what’s ahead for the intrinsically safe phone—how innovation is driving the future of workplace safety, and what that means for businesses and workers alike. Visit us: https://infinity-ex.com/ With the rise of automation, AI, and IoT, the intrinsically safe mobile phone is no longer just a tool for calls and texts. It’s a smart device that integrate ...
  continue reading
 
On The Workflow Show, CHESA's Jason Whetstone and Ben Kilburg offer media workflow therapy and address overarching trends and specific tech topics to help guide you through these challenging yet exciting times of unprecedented change within the realm of digital workflows. CHESA is a full-service provider of technology systems and solutions that specializes in optimizing media workflows from creation to distribution and preservation. CHESA’s expert architects design pioneering asset managemen ...
  continue reading
 
Intro – Hi, my names Kyle Aitken and this is a short documentary about the problems of Cyber Security at work. Interview 1 – Hello my names Neil Martin, I don’t know wither that’s the first thing I shouldn’t be saying, given the fact were talking about security. But since you don’t know where I am or where I live, we should be ok at that level. I work as an internet and security specialist, em, I work in mainly the financial sector, but also in various other business areas. Em, I specialize ...
  continue reading
 
Artwork

1
WebInnovationX

Dr. Rachel Yager

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
WebInnovationX Web Innovation Center is a Global Think Tank in Digital Transformation of Businesses, the Study of the Social and Economic Impacts of the World Wide Web, and home to the World Wide Web Consortium W3C NY Metro Chapter. Join Our Thought Leaders at SymposiumX CertificationX AccelerationX. Meet the Experts and Get Inspired on Innovation Thought Leadership, Strategy, and Tactics. Powered by FortuneTimes Group.
  continue reading
 
Artwork

1
The Daily Threat

QIT Solutions

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly+
 
Welcome to "The Daily Threat" podcast, your daily dose of curated content around cybersecurity news, advice, and best practices. With the increasing frequency of cyber attacks and data breaches, it's more important than ever to stay informed and prepared. This podcast provides you with the latest updates on cybersecurity threats and trends, along with expert insights and practical advice to help you protect yourself and your organization. Our team of cybersecurity experts scours the latest n ...
  continue reading
 
Loading …
show series
 
אני יכול להגיד בביטחון שמרבית אנשי הסייבר שעוסקים במערכות תפעוליות מגיעים ממערכות המידע ולמדו את תחום הבקרה, ללא הבנה של תחום הבקרה לעומק ההגנות יהיו מתוך התפיסה של מערכות מידע טעות מוכרת של הרבה מנהלי מערכות מידע ומנהלי אבטחת מידע בסביבות תפעוליות. משב רוח מרענן הם אנשי בקרה שנכנסו גם לתחום הסייבר, במסגרת המסע שלי למציאת פתרונות גישה מאובטחת מרחוק…
  continue reading
 
Is any publicity good publicity? On today’s News Roundup we talk about how Salesloft, which makes the Drift chat agent that’s been used as a jumping-off point for credential harvesting and data breach attacks against a bunch of big-name companies, is testing that proposition. We also discuss bugs affecting industrial refrigeration controllers, and …
  continue reading
 
Please enjoy this encore of Word Notes. A knowledge base of adversary tactics, techniques, and procedures established and maintained by the MITRE Corporation. CyberWire Glossary link: ⁠https://thecyberwire.com/glossary/mitre-attck⁠ Audio reference link: “⁠Attack Frameworks - SY0-601 CompTIA Security+ : 4.2⁠,” Professor Messer, YouTube, 29 April 202…
  continue reading
 
What sounds like the plot of a horror novel is already real life. Social media apps like Facebook, TikTok, and Instagram are designed to hook children in minutes, sparking mood swings, depression, and full-blown addiction. Here’s what every parent and grandparent needs to know. Learn more about your ad choices. Visit megaphone.fm/adchoices…
  continue reading
 
לראייתי כול קובץ שנכנס לארגון דורש בדיקה והלבנה, בעידן שמערכות הלבנה מסוגלות לבצע בדיקה ללא לייטנסי ומבלי לעכב את המשתמש כול קובץ צריך לעבור סניטציה. אחת ולתמיד מה ההבדל בין מערכת הלבנת קבצים לבין בדיקת וירוסים (נוזקות)? בתחילת הדרך המשמעות של הלבנה הייתה בדיקה של הקבצים ע"י מספר מנועי אנטי וירוס בד"כ 3-5 בו זמנית ו"הצבעה" ביניהם על תקינות הקובץ אם…
  continue reading
 
This week, our hosts⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Dave Bittner⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠, ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Joe Carrigan⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠, and ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Maria Varmazis⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ (also host of the ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠T-Minus⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ Space Daily show) are sharing the latest in social engineering scams, phishing schemes, and criminal exploits t…
  continue reading
 
How do you build and defend a network where attacks are not just expected-they're part of the curriculum? In this episode, Hazel talks with Jessica Oppenheimer, Director of Security Operations at Cisco, about the ten years she's spent in the Black Hat Network Operations Center (NOC). Explore the technical challenges of segmenting and monitoring a n…
  continue reading
 
S2: Episode 10: Welcome to 5G 6G Wave, the podcast that takes you beyond the hype and deep into the technologies shaping our hyper-connected future. Hosted by tech visionary Modi Daryani, each episode explores the cutting edge of wireless innovation, from the global race to 6G and AI-native networks, to satellite communications, terahertz speeds, a…
  continue reading
 
Our airwaves are alive with radio frequencies (RF). Right now billions of devices around the world are chattering invisibly over Wi-Fi, Bluetooth, Zigbee, and other protocols you might not have heard of. On today’s show we peer into the invisible world to better understand the RF threat environment. Our guest is Brett Walkenhorst, CTO of... Read mo…
  continue reading
 
Welcome in! You’ve entered, Only Malware in the Building — but this time, it’s not just another episode. This is a special edition you won’t want to miss. For the first time, our hosts are together in-studio — and they’re turning up the heat. Literally. Join ⁠⁠⁠⁠⁠⁠Selena Larson⁠⁠⁠⁠⁠⁠, ⁠⁠⁠⁠⁠⁠Proofpoint⁠⁠⁠⁠⁠⁠ intelligence analyst and host of their po…
  continue reading
 
Please enjoy this encore of Word Notes. The set of people, process, technology, and cultural norms that integrates software development and IT operations into a system-of-systems. CyberWire Glossary link: ⁠https://thecyberwire.com/glossary/devops⁠ Audio reference link: "⁠10+ Deploys Per Day: Dev and Ops Cooperation at Flickr⁠," by John Allspaw and …
  continue reading
 
In this episode, Star Link Communication introduces the Bio Lynx Attendance Device, a breakthrough in centralized remote enrollment technology. Designed for enterprises managing employees across multiple locations, Bio Lynx eliminates the need for HR or IT teams to physically visit sites for employee enrollment. The episode explains how the system …
  continue reading
 
Loading …
Copyright 2025 | Privacy Policy | Terms of Service | | Copyright
Listen to this show while you explore
Play