Search a title or topic

Over 20 million podcasts, powered by 

Player FM logo

SolarWinds Podcasts

show episodes
 
Artwork
 
Join the brightest SolarWinds minds and IT industry influencers, as they cut through the jargon and give you the tools you need to grow and keep your tech knowledge razor-sharp. Come with questions—leave with actionable steps and practical insights. Have ideas for future episodes or topics? Tweet us @ SolarWinds using #TechPod.
  continue reading
 
Your host, Andy, and guests break down the technology in your favorite movies/tv shows. They will discuss everything, from plotlines to plot holes, while keeping an eye on how technology is represented. Find out if your favorite movie/tv show got technology right… or wrong… or ridiculously wrong.
  continue reading
 
The CISO Signal is a true cybercrime podcast investigating the most consequential breaches, insider threats, takedowns, and nation-state hacks shaping today’s digital world. Each episode combines gripping, cinematic storytelling with exclusive interviews from top CISOs and cybersecurity leaders. Together, we break down how the world’s most dangerous cyberattacks unfolded and what today’s security professionals must learn from them. Whether you’re a Chief Information Security Officer, a secur ...
  continue reading
 
Artwork
 
We interview cybersecurity professionals for tips and advice on how to break into a cybersecurity career. Explore how to think and take action to be successful as an IT Security professional. Learn about roles in IT Audit, Risk Management, Pentesting, DevSecOps, Cloud Security and certifications.
  continue reading
 
Artwork

1
Risk & Repeat

Robert Wright

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
The seemingly endless stream of cyberattacks and data breaches have put enterprises and the information security industry on their heels. TechTarget SearchSecurity editors Rob Wright and Peter Loshin travel through this dark world of hacks, vulnerabilities and repeated infosec failings to discuss why we’ve arrived at this point, and what can be done to improve things.
  continue reading
 
Artwork

1
Threat Talks

Kevin Golas & Jay Grant

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Threat talks is a thought leadership discussion about everything cyber security. We have industry experts talking about current and future threats in the cyber industry. Host: Kevin Golas | Jay Grant Send us suggestions for topics and feedback to: E:Mail: [email protected]
  continue reading
 
Welcome all Court Reporters to this brand new podcast! I am a retired Court Reporter and I will bring you court reporting news, quality dictations, advice, motivation and fun!! Please subscribe to support this podcast. If you would like to help with a donation click on the Listener Support at on the homepage of my podcast on Anchor.fm or the link below. Listening and subscribing also supports the podcast. Every little bit helps me continue to bring you more content that just for us. https:// ...
  continue reading
 
Artwork

1
The Ring of Defense

Robin Johns and Bill Carter

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
Join Robin Johns, and Bill Carter as we delve into the intricate world of cybersecurity, exploring the critical issues, fundamental concepts, and the latest security incidents that shape our digital landscape. In each episode, Robin and Bill bring their wealth of knowledge and experience to the forefront, unraveling complex cybersecurity topics and making them accessible to all listeners. Whether you're a seasoned professional, an aspiring cybersecurity enthusiast, or simply someone interest ...
  continue reading
 
Loading …
show series
 
In this special holiday episode of SolarWinds TechPod, hosts Sean Sebring and Chrystal Taylor are joined by Movies & Mainframes host Andy Garibay to unpack the perfect Holiday Tech Survival Kit — from must-have travel gadgets to kitchen tech that saves your holiday dinner, how to deck the halls with smart lighting, and surviving every IT pro’s nigh…
  continue reading
 
The holiday season is in full swing, and as retailers vie for consumer dollars, some of the biggest ones are branching out to answer engines like ChatGPT and Perplexity. In this episode, we describe what that experience looks like now and what brands should do in response. We also look at the lasting implications of a high-profile legal case for CI…
  continue reading
 
Midnight Blizzard | How Russian Intelligence Breached Microsoft With guest CISO Co-Host Alyssa Robinson, CISO at HubSpot In late 2023, a Russian state-sponsored threat actor known as Midnight Blizzard (also called NOBELIUM and widely associated with APT29) began probing Microsoft the old-fashioned way: password spraying. No zero-day. No smash-and-g…
  continue reading
 
There may not be any computers in Home Alone, but few movie characters embody the old-school hacker ethos like Kevin McCallister does. Resourceful, clever, determined, and creative, Kevin uses all of the tools and talents at his disposal to repel a pair of relentless adversaries. Merry Christmas ya filthy animals! Support the show…
  continue reading
 
As we ease into the holidays, the security news doesn't stop coming. This week we discuss the research from AWS threat intelligence on Russian adversaries targeting a variety of network edge devices for opportunistic exploitation, then we break down attacks by a Chinese threat actor that target a new zero day in Cisco's AsyncOS, and finally we disc…
  continue reading
 
This week gave us the gift of some more React Server Components vulnerabilities and further exploitation of the previously disclosed bugs by a variety of threat groups. There were also a long list of vulnerabilities disclosed by Microsoft, Adobe, and others, which we discuss in the context of how difficult vulnerability management is right now. Fin…
  continue reading
 
Coming from a military family, Erin Whitmore was prepared for a career of service. But her path took her not into the military, but the intelligence community, first in the private sector supporting the DIA and NGA, and later as a cybersecurty program manager in the Office of the Director of National Intelligence. She eventually joined CIA as an op…
  continue reading
 
The HubSpot Hack | The SaaS Backdoor to Bitcoin - ft. Scott Kisser (CISO, Swan Bitcoin) When attackers breached HubSpot in March 2022, they weren’t after HubSpot at all. They were after the customers of its customers. Crypto firms like Trezor, BlockFi, and Swan Bitcoin suddenly saw their users targeted by near-perfect phishing emails designed to st…
  continue reading
 
In late 2023, the world’s most trusted identity provider experienced the kind of breach it was designed to prevent. Attackers quietly infiltrated Okta’s customer support system, stole session tokens hidden inside HAR files and used them to impersonate users across some of the most secure organizations on earth. For two full weeks, the intruders ope…
  continue reading
 
Dennis and Lindsey react (!) to the React2Shell vulnerability disclosure and the quick exploitation of it by Chinese threat actors, then discuss the continues intrusions into critical infrastructure by the Salt Typhoon actors and this week's congressional hearing on telecom network security. Finally, we talk about some upcoming hacker movie episode…
  continue reading
 
Jeff Gothelf, a renowned author and product strategist and co-founder of Sense and Respond Learning, joins Dennis to discuss the need to design products with users in mind, how critical thinking can help teams succeed, and what the AI revolution means for security teams and other groups. Support the show…
  continue reading
 
It's an acronym-filled, government-only bonanza this week! We discuss the DoJ sanctioning Russian bulletproof hosting provider Media Land (0:53), the SEC dropping its enforcement action against SolarWinds and its CISO (13:25), and the FCC reversing course on a longstanding security rule for telecom providers (26:00). Support the show…
  continue reading
 
Dennis is joined by Rich Mogull, chief analyst at the Cloud Security Alliance, cloud security trainer, and all around good guy to talk about the Cloudflare outage, why the internet is now just six companies, and what, if anything, organizations can do to improve their resilience in the current environment. Support the show…
  continue reading
 
This week was a bit of a throwback to olden times, with the disclosure by Amazon threat intelligence of zero days in Cisco and Citrix products that were exploited by an unnamed APT, and Google using legal action to disrupt the Lighthouse phishing service operation. We dig into those two stories, plus we discuss the challenge of trying to quantify t…
  continue reading
 
"You know, you really don't need a forensics team to get to the bottom of this. If you guys were the inventors of Facebook, you'd have invented Facebook." Melanie Ensign joins Dennis Fisher and Lindsey O'Donnell-Welch to discuss David Fincher's massively successful 2010 film, The Social Network, a movie that opens a window into the dark side of Sil…
  continue reading
 
Yahoo CISO and Chief Paranoid Sean Zadig returns to the podcast for a discussion with Dennis Fisher about how to go about getting kids interested in technology and teaching them about hacking (in the broad, classical sense) safely (9:10). Then they talk about how rapidly the cybersecurity industry is changing and what effects AI is and is not havin…
  continue reading
 
We don't do holiday themed episodes in this house, so no tricks, but we have some treats for you. First we discuss the problem of shadow AI (1:00) and how it seems like we're just repeating the mistakes of previous tech waves in ignoring security until it's too late. Then we dig into a new report from Kaspersky about a crazy exploit they discovered…
  continue reading
 
Recently, a very bad day for AWS became everyone else’s very annoying day. And while the disruption was fairly short-lived, there are longer-term lessons to be learned. In this episode, we look at the lessons from the recent AWS outage as well as an overdue step by a social media giant and a reimagining of how we access information on the web.…
  continue reading
 
The $610 Million Poly Network Hack: The Greatest Heist That Never Was In one of the most shocking moments in crypto history, a lone hacker exploited a vulnerability in Poly Network’s cross-chain protocol—draining over $610 million in digital assets across Ethereum, Binance Smart Chain, and Polygon. Then, in a twist no one saw coming… they gave it a…
  continue reading
 
This week saw a blessed lack of major vulnerabilities, but there was plenty of other news to dig into. We discuss the fallout from the AWS outage (0:36), the conclusions from the latest Cyberspace Solarium Commission report (4:37), and the effects of CISA's shakeup on the private sector (14:07), and the continued effects of the F5 incident (21:21).…
  continue reading
 
Mitch, there's something you need to know. Compared to you, most people have the IQ of a carrot. Real Genius has it all: '80s movie icon Val Kilmer at his coolest, a brilliant hacker named Laszlo living in a closet, a giant space laser, and the absolute embodiment of the hacker ethos. Join us as we dig into this classic with our pal Wendy Nather. I…
  continue reading
 
Have you heard about this AI thing? It's wild. Turns out, attackers are using it for all kinds of things we'd rather not have them doing. Dennis Fisher is joined by two experts from CrowdStrike--Adam Meyers, head of counter adversary operations, and Elia Zaitsev, CTO--to talk about how both defenders and attackers are leveraging AI and where things…
  continue reading
 
In this special mini episode of SolarWinds TechPod, hosts Chrystal Taylor and Sean Sebring sit down again with Matai Wilson to unpack the latest AI innovations announced during SolarWinds Day. Discover how SolarWinds is building the future of autonomous IT operations, from proactive remediation and Root Cause Assist (RCA) to an Agentic Framework th…
  continue reading
 
The $25 Million Arup Deepfake: AI's Most Convincing Con In a world where AI can mimic voices and faces perfectly, even the most secure companies can fall victim. The Arup Deepfake Hack shocked the corporate world when attackers used AI-generated video of the company’s CFO to trick an employee into wiring $25 million to a fraudulent account. This wa…
  continue reading
 
This week brings some new insights into the origins and length of the Cl0p extortion attacks tied to the Oracle E-Business Suite vulnerability, big surges in scanning for Cisco ASA, Palo Alto, and Fortinet devices, and a huge upgrade to Apple bug bounty payouts. Plus: Does Dennis have a dog yet? https://security.apple.com/blog/apple-security-bounty…
  continue reading
 
What you see on these screens up here is a fantasy; a computer-enhanced hallucination. WarGames may be 42 years old (!) but its prescience about our current technocracy and race to take humans out of the loop is as clear as ever. Dennis Fisher, Lindsey O-Donnell-Welch, Zoe Lindsey, and Pete Baker sit down in front of an IMSAI 8080 with some raw cor…
  continue reading
 
Dennis and Lindsey dissect a busy week in security news, starting with the Cl0p group's extortion campaign against Oracle customers (3:24), then moving into the Crimson Collective's claimed breach of some of Red Hat GitLab's repos (12:41), and finally the consequences of the expiration of th CISA legislation and de-funding of the MS-ISAC (22:46). P…
  continue reading
 
The world isn't run by weapons anymore, or energy, or money. It's run by little ones and zeroes, little bits of data. It's all just electrons. Daniel Cuthbert joins Dennis Fisher to dive into an all-tiime, undisputed hacker movie classic, the 1992 masterpiece, Sneakers. We dissect the movie's genesis, its technical accuracy and prescience, and disc…
  continue reading
 
Adam Bateman, co-founder and CEO of Push Security, joins Dennis Fisher to talk about a new, highly targeted phishing campaign the company uncovered that uses compromised LinkedIn accounts in order to harvest victims' Google or Microsoft credentials through a fake investment, then discuss trends in browser-based attacks and defensive challenges. Sup…
  continue reading
 
Are you wondering about the emerging technologies and shifting market dynamics that might shape your strategy for 2026 and beyond? Then this episode is for you. Get a detailed look at how three big shifts could dramatically impact plans and strategies for the year ahead (and get a preview for one of our upcoming 2026 Predictions reports, to boot).…
  continue reading
 
Matai Wilson, Senior Director for Product Management at SolarWinds, joins TechPod to explore the evolving landscape of AI technology. The conversation delves into the challenges of building AI technology, the exciting future of AI in IT operations, and the upcoming features and tools SolarWinds is developing to enhance user experience and operation…
  continue reading
 
Dennis and Lindsey discuss the targeted compromises of NPM packages (1:00) and the pointed letter that Sen. Ron Wyden sent to the FTC chairman asking for Microsoft to be held liable for the Ascension ransomware attack last year (11:45) before finally touching on Apple's new memory safety technology for new iPhones (20:43). NPM compromise: https://d…
  continue reading
 
Dennis and Lindsey talk through the continuing fallout of the Salesloft Drift incident (2:05) in light of the disclosure of several new companies that are involved, including Cloudflare, which published an excellent post-mortem on the intrusion. Then they discuss the new Shared Vision of SBOM for Cybersecurity published by CISA, NSA, and many forei…
  continue reading
 
We are so back! After a bit of a hiatus, we're very excited to be back with new Decipher content for you in all of the old familiar places. And also some new ones. Join Decipher editors Dennis Fisher and Lindsey O'Donnell-Welch as we start our new, independent phase, talk about what we've been up to, and discuss our plans for what fun stuff we have…
  continue reading
 
THE SONY HACK: HOLLYWOOD, NORTH KOREA & THE CYBER WAR THAT CHANGED EVERYTHING In 2014, Sony Pictures became ground zero for the first major nation-state cyberattack on a global corporation. The “Guardians of Peace,” linked to North Korea, crippled Sony’s networks, leaked unreleased films, and exposed troves of executive emails that forced high-leve…
  continue reading
 
It's CSOC o'clock! In this episode, we dive into the high-stakes world of cyber defense with the manager of cybersecurity operations at a critical infrastructure organization. From ransomware threats and zero-day exploits to the rise of nation-state-backed Advanced Persistent Threats (APTs), our guest reveals how security teams manage 24/7 threats,…
  continue reading
 
SIN CITY CYBERATTACK: INSIDE THE MGM & CAESARS CASINO BREACHES In September 2023, Las Vegas turned into ground zero for one of the most disruptive cyberattacks in U.S. history. MGM Resorts, owner of iconic casinos on the Strip, saw slot machines go dark, hotel check-ins grind to a halt, and operations paralyzed for days. At the same time, Caesars E…
  continue reading
 
The CISO Signal | INSIDE CNA's $40M BITCOIN RANSOM | The Hack That Changed Cybersecurity - EP 4 In this episode of The CISO Signal, we go deep inside the cyberattack that shook the financial world. Join us as we unravel the haunting details of the 2021 ransomware attack on CNA Financial, which resulted in a record-breaking $40 million ransom paymen…
  continue reading
 
THE UBER BREACH: HOW A 17-YEAR-OLD HACKED A FORTUNE 500 COMPANY A 17-year-old hacker. A simple social engineering tactic. A taunting message posted to Uber’s internal Slack channel. In one of the most audacious breaches in recent memory, a teenager allegedly affiliated with the Lapsus$ group compromised a Fortune 500 company, exposing critical vuln…
  continue reading
 
Loading …
Copyright 2026 | Privacy Policy | Terms of Service | | Copyright
Listen to this show while you explore
Play