Deception, influence, and social engineering in the world of cyber crime.
…
continue reading
Secure Remote Access Podcasts
Every fortnight, host Hazel Burton brings on a new guest from Talos or the broader Cisco Security world to break down a complicated security topic. We cover everything from breaking news to attacker trends and emerging threats.
…
continue reading
Star Link emphasizes in providing corporate organizations with all types of biometric attendance system & access control system and all most all types of softwares to speed up HRs, Admin & Top Most Management with smooth an effective workflow.
…
continue reading
Join us at the intersection of networking and security! Whether you’re fending off ransomware attacks, securing remote workers, hunting for rogue IoT devices, or gearing up for your latest compliance audit, Packet Protector provides practical information that IT and infrastructure pros can put to work. Every episode covers the latest security headlines and then drills into essential topics to provide technical and strategic insights on wired and wireless network security, access control, clo ...
…
continue reading
Sound like a tech pro, even if you’re not! Award-winning popular host Kim Komando is your secret weapon. Kim is in a class all her own. Her widely successful radio show is heard on over 500 stations in the United States and internationally in 175 different countries. Kim has millions of fans who love her down-to-earth, deeply relatable, and easy-to-understand way of talking about consumer tech. Every episode is loaded with the scoop about the latest gadgets, online security, social media tre ...
…
continue reading
Ledger is the gold standard of security in the crypto space. Our hardware wallets are essential for anyone wanting to take control of their digital value. At the heart of this ecosystem, Ledger connects you with everything in the digital assets space, providing access to services and freedom from compromise on security, ownership or user experience. On 'The Ledger Podcast', we have conversations with some of the most interesting thought leaders in crypto, cybersecurity and culture to discuss ...
…
continue reading
מפגשים עם האנשים בחזית הגנת הסייבר לתעשייה ותשתיות קריטיות Meetings with the people at the forefront of cyber defense for industry and critical infrastructure ICS SCADA OT IoT
…
continue reading
The cloudbrink Podcast explores the future of remote/hybrid work, cybersecurity, and network performance. Each episode features expert insights, tech breakdowns, and conversations on how Cloudbrink is reshaping secure access with personal SASE, zero trust, and edge-native solutions.From tackling zero-day vulnerabilities to challenging legacy systems like VPNs and firewalls, Cloudbrink Edgecast brings you the people, ideas, and innovations driving the next generation of enterprise connectivity.
…
continue reading
…
continue reading
Welcome to "5G 6G Wave" - Riding the Next G Wave of Connectivity. Your ultimate source for everything related to the groundbreaking world of 5G 6G technology. Hosted by Modi Daryani, this podcast delves into the latest advancements, trends, and innovations in 5G, exploring its transformative impact across various industries and everyday life. Each episode of "5G 6G Wave" features in-depth discussions on key topics such as the evolution of mobile networks, the integration of 5G with AI and Io ...
…
continue reading
Ativion Pulse is a podcast exploring the dynamic world of education technology and the critical role of secure remote access in today's learning environments. Join us as we delve into the latest trends, challenges, and best practices in ed-tech, featuring insightful conversations with industry experts, educators, and technology leaders. We'll discuss topics such as: Securing student data: Protecting sensitive information in a remote and increasingly digital world. Improving remote learning e ...
…
continue reading
Beyond Downtime: The Verito Advantage is the podcast for tax and accounting professionals who refuse to let IT issues interrupt their business. Hosted by the experts behind Verito.com, each episode explores the real risks behind "good enough" technology and how to build a firm that just works. Securely. Join us as we dive into real-world stories, compliance must-knows (like the FTC Safeguards Rule, IRS Pub 4557, WISP), and emerging tech shaping the future of financial practices. From ransomw ...
…
continue reading
The Project+ PrepCast is a complete audio series built around the CompTIA Project+ PK0-005 exam objectives. Each episode delivers clear explanations, practical examples, and glossary coverage to help you understand project management concepts, tools, life cycle phases, and IT governance. Produced by BareMetalCyber.com, it’s designed to guide you from orientation through exam readiness with professional, exam-focused instruction.
…
continue reading
In a rapidly evolving industrial world, the demand for intelligent and secure communication tools has never been higher. This episode focuses on what’s ahead for the intrinsically safe phone—how innovation is driving the future of workplace safety, and what that means for businesses and workers alike. Visit us: https://infinity-ex.com/ With the rise of automation, AI, and IoT, the intrinsically safe mobile phone is no longer just a tool for calls and texts. It’s a smart device that integrate ...
…
continue reading
On The Workflow Show, CHESA's Jason Whetstone and Ben Kilburg offer media workflow therapy and address overarching trends and specific tech topics to help guide you through these challenging yet exciting times of unprecedented change within the realm of digital workflows. CHESA is a full-service provider of technology systems and solutions that specializes in optimizing media workflows from creation to distribution and preservation. CHESA’s expert architects design pioneering asset managemen ...
…
continue reading
Intro – Hi, my names Kyle Aitken and this is a short documentary about the problems of Cyber Security at work. Interview 1 – Hello my names Neil Martin, I don’t know wither that’s the first thing I shouldn’t be saying, given the fact were talking about security. But since you don’t know where I am or where I live, we should be ok at that level. I work as an internet and security specialist, em, I work in mainly the financial sector, but also in various other business areas. Em, I specialize ...
…
continue reading
WebInnovationX Web Innovation Center is a Global Think Tank in Digital Transformation of Businesses, the Study of the Social and Economic Impacts of the World Wide Web, and home to the World Wide Web Consortium W3C NY Metro Chapter. Join Our Thought Leaders at SymposiumX CertificationX AccelerationX. Meet the Experts and Get Inspired on Innovation Thought Leadership, Strategy, and Tactics. Powered by FortuneTimes Group.
…
continue reading
Welcome to "The Daily Threat" podcast, your daily dose of curated content around cybersecurity news, advice, and best practices. With the increasing frequency of cyber attacks and data breaches, it's more important than ever to stay informed and prepared. This podcast provides you with the latest updates on cybersecurity threats and trends, along with expert insights and practical advice to help you protect yourself and your organization. Our team of cybersecurity experts scours the latest n ...
…
continue reading
Watch Download File
…
continue reading

1
Shlomo Eshed Founder & CEO @Romtrex about Industrial Automation OT cyber & Secure Remote Access
44:06
44:06
Play later
Play later
Lists
Like
Liked
44:06אני יכול להגיד בביטחון שמרבית אנשי הסייבר שעוסקים במערכות תפעוליות מגיעים ממערכות המידע ולמדו את תחום הבקרה, ללא הבנה של תחום הבקרה לעומק ההגנות יהיו מתוך התפיסה של מערכות מידע טעות מוכרת של הרבה מנהלי מערכות מידע ומנהלי אבטחת מידע בסביבות תפעוליות. משב רוח מרענן הם אנשי בקרה שנכנסו גם לתחום הסייבר, במסגרת המסע שלי למציאת פתרונות גישה מאובטחת מרחוק…
…
continue reading
Make life easier for loved ones with quick phone access. Set up fingerprint or face ID on your spouse’s, child’s, or parent’s devices for emergencies, navigation, or shared logistics. It’s secure, simple, and keeps the people you trust connected. Learn more about your ad choices. Visit megaphone.fm/adchoices…
…
continue reading

1
PP077: News Roundup–Drift Breach Has Long Reach; FCC Investigates Its Own IoT Security Program
37:20
37:20
Play later
Play later
Lists
Like
Liked
37:20Is any publicity good publicity? On today’s News Roundup we talk about how Salesloft, which makes the Drift chat agent that’s been used as a jumping-off point for credential harvesting and data breach attacks against a bunch of big-name companies, is testing that proposition. We also discuss bugs affecting industrial refrigeration controllers, and …
…
continue reading
Gold prices are soaring and scammers are cashing in. Learn how fake FTC callers are tricking people into buying gold bars worth thousands. Here’s how to spot the warning signs and protect your money before you become the next victim. Learn more about your ad choices. Visit megaphone.fm/adchoicesBy Kim Komando
…
continue reading
Please enjoy this encore of Word Notes. A knowledge base of adversary tactics, techniques, and procedures established and maintained by the MITRE Corporation. CyberWire Glossary link: https://thecyberwire.com/glossary/mitre-attck Audio reference link: “Attack Frameworks - SY0-601 CompTIA Security+ : 4.2,” Professor Messer, YouTube, 29 April 202…
…
continue reading
Imagine a 24/7 digital assistant that never sleeps. AI can break down contracts, create presentations, summarize data, draft posts, and write Zoom follow-up emails. Here’s how to make AI your ultimate work sidekick. Learn more about your ad choices. Visit megaphone.fm/adchoicesBy Kim Komando
…
continue reading
Be careful online. Scammers are getting trickier than ever with fake Google Forms, phishing emails, and malicious QR codes. Here’s how to spot traps, protect your logins, financial information, and personal data before it’s too late. Learn more about your ad choices. Visit megaphone.fm/adchoicesBy Kim Komando
…
continue reading
Old accounts can vanish faster than you think. Gmail, Shutterfly, Dropbox, Yahoo, and more may delete your photos, emails, and memories if you haven’t signed in. Here’s how long you really have to log in before it’s all gone. Learn more about your ad choices. Visit megaphone.fm/adchoicesBy Kim Komando
…
continue reading
A Florida man selling an iPhone met a “buyer” in person who pulled a gun, fired a shot into the ground, and stole the phone. Here’s how to stay safe, protect your money, and avoid dangerous situations when meeting buyers or sellers. Learn more about your ad choices. Visit megaphone.fm/adchoicesBy Kim Komando
…
continue reading
Your PC could be spying on you without your knowledge. Stalkerware secretly logs your photos, emails, location, and can even turn on your mic or camera. Here’s how to spot hidden apps, unusual activity, and protect your privacy before it’s too late. Learn more about your ad choices. Visit megaphone.fm/adchoices…
…
continue reading
What sounds like the plot of a horror novel is already real life. Social media apps like Facebook, TikTok, and Instagram are designed to hook children in minutes, sparking mood swings, depression, and full-blown addiction. Here’s what every parent and grandparent needs to know. Learn more about your ad choices. Visit megaphone.fm/adchoices…
…
continue reading
Tired of struggling with your smart TV or streaming stick? Here’s how to use your voice to find shows, control captions, and even locate a lost remote. Learn more about your ad choices. Visit megaphone.fm/adchoicesBy Kim Komando
…
continue reading

1
Everyone ignores this billion-dollar lottery hack
8:30
8:30
Play later
Play later
Lists
Like
Liked
8:30Tomorrow night’s Powerball jackpot is 1.3 billion dollars, but letting the computer randomly pick your numbers may not be the best strategy. Here's how to improve your odds. Learn more about your ad choices. Visit megaphone.fm/adchoicesBy Kim Komando
…
continue reading
Google Street View goes beyond cars, capturing over 10 million miles of roads worldwide. Here’s how to use Street View’s hidden time-travel feature. Try it out, it’s really fun! Learn more about your ad choices. Visit megaphone.fm/adchoicesBy Kim Komando
…
continue reading

1
The internet is forever, except when it’s not
8:43
8:43
Play later
Play later
Lists
Like
Liked
8:43Texts and posts can live forever, while unused email, photo, and cloud accounts risk deletion if you stop logging in. Here’s how to keep your data safe. Learn more about your ad choices. Visit megaphone.fm/adchoicesBy Kim Komando
…
continue reading

1
Yossi Shani Founder & CEO @YazamTech about files inspection, Deep Scan & CDR
53:37
53:37
Play later
Play later
Lists
Like
Liked
53:37לראייתי כול קובץ שנכנס לארגון דורש בדיקה והלבנה, בעידן שמערכות הלבנה מסוגלות לבצע בדיקה ללא לייטנסי ומבלי לעכב את המשתמש כול קובץ צריך לעבור סניטציה. אחת ולתמיד מה ההבדל בין מערכת הלבנת קבצים לבין בדיקת וירוסים (נוזקות)? בתחילת הדרך המשמעות של הלבנה הייתה בדיקה של הקבצים ע"י מספר מנועי אנטי וירוס בד"כ 3-5 בו זמנית ו"הצבעה" ביניהם על תקינות הקובץ אם…
…
continue reading
This week, our hosts Dave Bittner, Joe Carrigan, and Maria Varmazis (also host of the T-Minus Space Daily show) are sharing the latest in social engineering scams, phishing schemes, and criminal exploits t…
…
continue reading
Stuck in a bad conversation? Your phone can bail you out with a fake call on demand. Here’s how to set it up in seconds and escape awkward chats, dates, or meetings with ease. Learn more about your ad choices. Visit megaphone.fm/adchoicesBy Kim Komando
…
continue reading

1
Inside the Black Hat NOC: Lessons in Securing One of the Wildest Networks
23:05
23:05
Play later
Play later
Lists
Like
Liked
23:05How do you build and defend a network where attacks are not just expected-they're part of the curriculum? In this episode, Hazel talks with Jessica Oppenheimer, Director of Security Operations at Cisco, about the ten years she's spent in the Black Hat Network Operations Center (NOC). Explore the technical challenges of segmenting and monitoring a n…
…
continue reading
Over Labor Day weekend, false rumors spread online claiming President Trump had died, and millions believed them. Here’s why fake news travels faster than facts and how news avoidance fuels the problem. Learn more about your ad choices. Visit megaphone.fm/adchoicesBy Kim Komando
…
continue reading
S2: Episode 10: Welcome to 5G 6G Wave, the podcast that takes you beyond the hype and deep into the technologies shaping our hyper-connected future. Hosted by tech visionary Modi Daryani, each episode explores the cutting edge of wireless innovation, from the global race to 6G and AI-native networks, to satellite communications, terahertz speeds, a…
…
continue reading
CarPlay and Android Auto can do more than stream music or show maps. With a few quick tricks, you can text hands-free, find coffee on the fly, and customize your screen so the apps you use most are always at your fingertips. Learn more about your ad choices. Visit megaphone.fm/adchoicesBy Kim Komando
…
continue reading

1
PP076: RF Risks and How to See Unseen Threats
59:58
59:58
Play later
Play later
Lists
Like
Liked
59:58Our airwaves are alive with radio frequencies (RF). Right now billions of devices around the world are chattering invisibly over Wi-Fi, Bluetooth, Zigbee, and other protocols you might not have heard of. On today’s show we peer into the invisible world to better understand the RF threat environment. Our guest is Brett Walkenhorst, CTO of... Read mo…
…
continue reading
Smart glasses are getting harder to spot, and some can secretly record everything you say. Here’s what you need to know to protect your privacy. Learn more about your ad choices. Visit megaphone.fm/adchoicesBy Kim Komando
…
continue reading

1
Hot sauce and hot takes: An Only Malware in the Building special. [OMITB]
36:37
36:37
Play later
Play later
Lists
Like
Liked
36:37Welcome in! You’ve entered, Only Malware in the Building — but this time, it’s not just another episode. This is a special edition you won’t want to miss. For the first time, our hosts are together in-studio — and they’re turning up the heat. Literally. Join Selena Larson, Proofpoint intelligence analyst and host of their po…
…
continue reading
Please enjoy this encore of Word Notes. The set of people, process, technology, and cultural norms that integrates software development and IT operations into a system-of-systems. CyberWire Glossary link: https://thecyberwire.com/glossary/devops Audio reference link: "10+ Deploys Per Day: Dev and Ops Cooperation at Flickr," by John Allspaw and …
…
continue reading
Losing your keys can ruin your day. New AI tools can scan your room, point out where they are hiding, and even suggest the most likely spots to check. Here is how it works. Learn more about your ad choices. Visit megaphone.fm/adchoicesBy Kim Komando
…
continue reading
Podcasting is changing fast. The era of big-budget true crime and long investigative series is fading, replaced by fast talk shows that are cheaper to make and easier to monetize. Here is why your favorite podcast may never return. Learn more about your ad choices. Visit megaphone.fm/adchoicesBy Kim Komando
…
continue reading
In this episode, Star Link Communication introduces the Bio Lynx Attendance Device, a breakthrough in centralized remote enrollment technology. Designed for enterprises managing employees across multiple locations, Bio Lynx eliminates the need for HR or IT teams to physically visit sites for employee enrollment. The episode explains how the system …
…
continue reading
Apple’s iOS 26 lands September 9 with real time call screening, live translation, smarter Apple Intelligence, and faster wireless charging with features you will actually use. Learn more about your ad choices. Visit megaphone.fm/adchoicesBy Kim Komando
…
continue reading