Join the brightest SolarWinds minds and IT industry influencers, as they cut through the jargon and give you the tools you need to grow and keep your tech knowledge razor-sharp. Come with questions—leave with actionable steps and practical insights. Have ideas for future episodes or topics? Tweet us @ SolarWinds using #TechPod.
…
continue reading
SolarWinds Podcasts
Your host, Andy, and guests break down the technology in your favorite movies/tv shows. They will discuss everything, from plotlines to plot holes, while keeping an eye on how technology is represented. Find out if your favorite movie/tv show got technology right… or wrong… or ridiculously wrong.
…
continue reading
Each episode of the What It Means podcast features Forrester analysts providing their unique perspective on the latest news and trends impacting marketing, CX, and technology leaders.
…
continue reading
The editors of Decipher talk with a rotating cast of security practitioners, researchers, and executives about a variety of topics in the security and privacy fields.
…
continue reading
The CISO Signal is a true cybercrime podcast investigating the most consequential breaches, insider threats, takedowns, and nation-state hacks shaping today’s digital world. Each episode combines gripping, cinematic storytelling with exclusive interviews from top CISOs and cybersecurity leaders. Together, we break down how the world’s most dangerous cyberattacks unfolded and what today’s security professionals must learn from them. Whether you’re a Chief Information Security Officer, a secur ...
…
continue reading
We interview cybersecurity professionals for tips and advice on how to break into a cybersecurity career. Explore how to think and take action to be successful as an IT Security professional. Learn about roles in IT Audit, Risk Management, Pentesting, DevSecOps, Cloud Security and certifications.
…
continue reading
The seemingly endless stream of cyberattacks and data breaches have put enterprises and the information security industry on their heels. TechTarget SearchSecurity editors Rob Wright and Peter Loshin travel through this dark world of hacks, vulnerabilities and repeated infosec failings to discuss why we’ve arrived at this point, and what can be done to improve things.
…
continue reading
Threat talks is a thought leadership discussion about everything cyber security. We have industry experts talking about current and future threats in the cyber industry. Host: Kevin Golas | Jay Grant Send us suggestions for topics and feedback to: E:Mail: [email protected]
…
continue reading
Welcome all Court Reporters to this brand new podcast! I am a retired Court Reporter and I will bring you court reporting news, quality dictations, advice, motivation and fun!! Please subscribe to support this podcast. If you would like to help with a donation click on the Listener Support at on the homepage of my podcast on Anchor.fm or the link below. Listening and subscribing also supports the podcast. Every little bit helps me continue to bring you more content that just for us. https:// ...
…
continue reading
Join Robin Johns, and Bill Carter as we delve into the intricate world of cybersecurity, exploring the critical issues, fundamental concepts, and the latest security incidents that shape our digital landscape. In each episode, Robin and Bill bring their wealth of knowledge and experience to the forefront, unraveling complex cybersecurity topics and making them accessible to all listeners. Whether you're a seasoned professional, an aspiring cybersecurity enthusiast, or simply someone interest ...
…
continue reading
In this special holiday episode of SolarWinds TechPod, hosts Sean Sebring and Chrystal Taylor are joined by Movies & Mainframes host Andy Garibay to unpack the perfect Holiday Tech Survival Kit — from must-have travel gadgets to kitchen tech that saves your holiday dinner, how to deck the halls with smart lighting, and surviving every IT pro’s nigh…
…
continue reading
1
SolarWinds’ Lessons For CISOs, AI In B2B Sales, Shopping In Answer Engines
29:25
29:25
Play later
Play later
Lists
Like
Liked
29:25The holiday season is in full swing, and as retailers vie for consumer dollars, some of the biggest ones are branching out to answer engines like ChatGPT and Perplexity. In this episode, we describe what that experience looks like now and what brands should do in response. We also look at the lasting implications of a high-profile legal case for CI…
…
continue reading
1
Midnight Blizzard | How Russian Intelligence Breached Microsoft - w/ Alyssa Robinson, CISO @ HubSpot
32:38
32:38
Play later
Play later
Lists
Like
Liked
32:38Midnight Blizzard | How Russian Intelligence Breached Microsoft With guest CISO Co-Host Alyssa Robinson, CISO at HubSpot In late 2023, a Russian state-sponsored threat actor known as Midnight Blizzard (also called NOBELIUM and widely associated with APT29) began probing Microsoft the old-fashioned way: password spraying. No zero-day. No smash-and-g…
…
continue reading
There may not be any computers in Home Alone, but few movie characters embody the old-school hacker ethos like Kevin McCallister does. Resourceful, clever, determined, and creative, Kevin uses all of the tools and talents at his disposal to repel a pair of relentless adversaries. Merry Christmas ya filthy animals! Support the show…
…
continue reading
1
Russian Targeting of Edge Devices. Cisco AsyncOS Zero Day, and React2Shell Won't Go Away
21:25
21:25
Play later
Play later
Lists
Like
Liked
21:25As we ease into the holidays, the security news doesn't stop coming. This week we discuss the research from AWS threat intelligence on Russian adversaries targeting a variety of network edge devices for opportunistic exploitation, then we break down attacks by a Chinese threat actor that target a new zero day in Cisco's AsyncOS, and finally we disc…
…
continue reading
Pete Baker and Zoe Lindsey join Dennis Fisher on the roof of Nakatomi Plaza to discuss one of the great action classics* and a beloved movie in the hacker community: Die Hard. Yippee ki-yay! *NOT a Christmas movie Support the showBy Decipher
…
continue reading
1
More React Bugs Reaction, the Challenge of Vulnerability Management, and CI Attacks
24:00
24:00
Play later
Play later
Lists
Like
Liked
24:00This week gave us the gift of some more React Server Components vulnerabilities and further exploitation of the previously disclosed bugs by a variety of threat groups. There were also a long list of vulnerabilities disclosed by Microsoft, Adobe, and others, which we discuss in the context of how difficult vulnerability management is right now. Fin…
…
continue reading
1
From CIA Officer to a Career in Cybersecurity With Erin Whitmore
1:21:42
1:21:42
Play later
Play later
Lists
Like
Liked
1:21:42Coming from a military family, Erin Whitmore was prepared for a career of service. But her path took her not into the military, but the intelligence community, first in the private sector supporting the DIA and NGA, and later as a cybersecurty program manager in the Office of the Director of National Intelligence. She eventually joined CIA as an op…
…
continue reading
1
The HubSpot Hack | The SaaS Backdoor to Bitcoin - ft. Scott Kisser (CISO, Swan Bitcoin)
30:14
30:14
Play later
Play later
Lists
Like
Liked
30:14The HubSpot Hack | The SaaS Backdoor to Bitcoin - ft. Scott Kisser (CISO, Swan Bitcoin) When attackers breached HubSpot in March 2022, they weren’t after HubSpot at all. They were after the customers of its customers. Crypto firms like Trezor, BlockFi, and Swan Bitcoin suddenly saw their users targeted by near-perfect phishing emails designed to st…
…
continue reading
In late 2023, the world’s most trusted identity provider experienced the kind of breach it was designed to prevent. Attackers quietly infiltrated Okta’s customer support system, stole session tokens hidden inside HAR files and used them to impersonate users across some of the most secure organizations on earth. For two full weeks, the intruders ope…
…
continue reading
1
React2Shell, Typhoon Attacks, and Why Our Infrastructure is So Vulnerable
33:33
33:33
Play later
Play later
Lists
Like
Liked
33:33Dennis and Lindsey react (!) to the React2Shell vulnerability disclosure and the quick exploitation of it by Chinese threat actors, then discuss the continues intrusions into critical infrastructure by the Salt Typhoon actors and this week's congressional hearing on telecom network security. Finally, we talk about some upcoming hacker movie episode…
…
continue reading
1
Jeff Gothelf on Designing for Users, Enterprise Agility, and the AI Conundrum
41:12
41:12
Play later
Play later
Lists
Like
Liked
41:12Jeff Gothelf, a renowned author and product strategist and co-founder of Sense and Respond Learning, joins Dennis to discuss the need to design products with users in mind, how critical thinking can help teams succeed, and what the AI revolution means for security teams and other groups. Support the show…
…
continue reading
1
DoJ Sanctions, the SEC Abandons the SolarWinds Action, and the FCC Reverses Course on Telecom Security
36:56
36:56
Play later
Play later
Lists
Like
Liked
36:56It's an acronym-filled, government-only bonanza this week! We discuss the DoJ sanctioning Russian bulletproof hosting provider Media Land (0:53), the SEC dropping its enforcement action against SolarWinds and its CISO (13:25), and the FCC reversing course on a longstanding security rule for telecom providers (26:00). Support the show…
…
continue reading
1
Rich Mogull on the Cloudflare Outage, Resilience, and Single Points of Failure
24:52
24:52
Play later
Play later
Lists
Like
Liked
24:52Dennis is joined by Rich Mogull, chief analyst at the Cloud Security Alliance, cloud security trainer, and all around good guy to talk about the Cloudflare outage, why the internet is now just six companies, and what, if anything, organizations can do to improve their resilience in the current environment. Support the show…
…
continue reading
1
Lighthouse Phishing Kit Takedown, Zero Day Mysteries, and Measuring Cyber Attack Costs
46:11
46:11
Play later
Play later
Lists
Like
Liked
46:11This week was a bit of a throwback to olden times, with the disclosure by Amazon threat intelligence of zero days in Cisco and Citrix products that were exploited by an unnamed APT, and Google using legal action to disrupt the Lighthouse phishing service operation. We dig into those two stories, plus we discuss the challenge of trying to quantify t…
…
continue reading
1
Predictions 2026: Breaking Down Three Of Our Boldest Predictions
20:42
20:42
Play later
Play later
Lists
Like
Liked
20:42It’s Predictions season here at Forrester. We recently published our 2026 predictions across a variety of business functions, industries, and geographies. In this episode, we take a detailed look at three of our boldest calls for the coming year.By Forrester
…
continue reading
1
The Hacker Movie Canon: The Social Network
1:13:02
1:13:02
Play later
Play later
Lists
Like
Liked
1:13:02"You know, you really don't need a forensics team to get to the bottom of this. If you guys were the inventors of Facebook, you'd have invented Facebook." Melanie Ensign joins Dennis Fisher and Lindsey O'Donnell-Welch to discuss David Fincher's massively successful 2010 film, The Social Network, a movie that opens a window into the dark side of Sil…
…
continue reading
What does real work-life balance look like in tech? In this honest and funny conversation, Sean Sebring and Chrystal Taylor share stories from their sabbaticals, burnout moments, and how they learned to unplug — for real this time.
…
continue reading
1
Yahoo's Sean Zadig on How to Raise a Hacker Safely and How Maybe AI Isn't Changing Everything
51:29
51:29
Play later
Play later
Lists
Like
Liked
51:29Yahoo CISO and Chief Paranoid Sean Zadig returns to the podcast for a discussion with Dennis Fisher about how to go about getting kids interested in technology and teaching them about hacking (in the broad, classical sense) safely (9:10). Then they talk about how rapidly the cybersecurity industry is changing and what effects AI is and is not havin…
…
continue reading
1
Shadow AI Is Eating the World, the Return of Hacking Team, and the Commercial Spyware Landscape
41:28
41:28
Play later
Play later
Lists
Like
Liked
41:28We don't do holiday themed episodes in this house, so no tricks, but we have some treats for you. First we discuss the problem of shadow AI (1:00) and how it seems like we're just repeating the mistakes of previous tech waves in ignoring security until it's too late. Then we dig into a new report from Kaspersky about a crazy exploit they discovered…
…
continue reading
1
AWS Outage, Safety On Meta, ChatGPT’s AI-First Browser
20:24
20:24
Play later
Play later
Lists
Like
Liked
20:24Recently, a very bad day for AWS became everyone else’s very annoying day. And while the disruption was fairly short-lived, there are longer-term lessons to be learned. In this episode, we look at the lessons from the recent AWS outage as well as an overdue step by a social media giant and a reimagining of how we access information on the web.…
…
continue reading
1
The $610 Million Poly Network Hack: The Greatest Heist That Never Was
32:52
32:52
Play later
Play later
Lists
Like
Liked
32:52The $610 Million Poly Network Hack: The Greatest Heist That Never Was In one of the most shocking moments in crypto history, a lone hacker exploited a vulnerability in Poly Network’s cross-chain protocol—draining over $610 million in digital assets across Ethereum, Binance Smart Chain, and Polygon. Then, in a twist no one saw coming… they gave it a…
…
continue reading
1
US Cybersecurity Going in Reverse, the AWS Outage, and is CISA Okay
43:35
43:35
Play later
Play later
Lists
Like
Liked
43:35This week saw a blessed lack of major vulnerabilities, but there was plenty of other news to dig into. We discuss the fallout from the AWS outage (0:36), the conclusions from the latest Cyberspace Solarium Commission report (4:37), and the effects of CISA's shakeup on the private sector (14:07), and the continued effects of the F5 incident (21:21).…
…
continue reading
Mitch, there's something you need to know. Compared to you, most people have the IQ of a carrot. Real Genius has it all: '80s movie icon Val Kilmer at his coolest, a brilliant hacker named Laszlo living in a closet, a giant space laser, and the absolute embodiment of the hacker ethos. Join us as we dig into this classic with our pal Wendy Nather. I…
…
continue reading
In the wake of the disclosure of a serious intrusion at F5 that reportedly lasted about a year, we talk about the details of the disclosure, the potential link to Chinese state actors, the fallout from the attackers' access to source code and bug reports, and what this could mean in the long term. Support the show…
…
continue reading
Cronenberg, Goldblum, and a baboon named Typhoon star in a horror opera that "penetrates beyond the veil of the flesh." In true Cronenberg fashion, this movie is thought-provoking and gross.By SolarWinds LLC
…
continue reading
1
California’s New AI Law, Anthropic’s Latest Model, B2C Advertising Options
26:22
26:22
Play later
Play later
Lists
Like
Liked
26:22Principal Analyst Alla Valente breaks down California’s new AI law, VP and Research Director Chris Gardner discusses the impact of AI models on software development roles, and Principal Analyst Nikhil Lai reviews Best Buy’s “in-store takeover” advertising offering.By Forrester
…
continue reading
1
AI Attack and Defense With Adam Meyers and Elia Zaitsev of CrowdStrike
57:26
57:26
Play later
Play later
Lists
Like
Liked
57:26Have you heard about this AI thing? It's wild. Turns out, attackers are using it for all kinds of things we'd rather not have them doing. Dennis Fisher is joined by two experts from CrowdStrike--Adam Meyers, head of counter adversary operations, and Elia Zaitsev, CTO--to talk about how both defenders and attackers are leveraging AI and where things…
…
continue reading
In this special mini episode of SolarWinds TechPod, hosts Chrystal Taylor and Sean Sebring sit down again with Matai Wilson to unpack the latest AI innovations announced during SolarWinds Day. Discover how SolarWinds is building the future of autonomous IT operations, from proactive remediation and Root Cause Assist (RCA) to an Agentic Framework th…
…
continue reading
1
The $25 Million Arup Deepfake: AI's Most Convincing Con
40:49
40:49
Play later
Play later
Lists
Like
Liked
40:49The $25 Million Arup Deepfake: AI's Most Convincing Con In a world where AI can mimic voices and faces perfectly, even the most secure companies can fall victim. The Arup Deepfake Hack shocked the corporate world when attackers used AI-generated video of the company’s CFO to trick an employee into wiring $25 million to a fraudulent account. This wa…
…
continue reading
1
More Cl0p Clues and Huge Apple Bug Bounty Changes
14:17
14:17
Play later
Play later
Lists
Like
Liked
14:17This week brings some new insights into the origins and length of the Cl0p extortion attacks tied to the Oracle E-Business Suite vulnerability, big surges in scanning for Cisco ASA, Palo Alto, and Fortinet devices, and a huge upgrade to Apple bug bounty payouts. Plus: Does Dennis have a dog yet? https://security.apple.com/blog/apple-security-bounty…
…
continue reading
What you see on these screens up here is a fantasy; a computer-enhanced hallucination. WarGames may be 42 years old (!) but its prescience about our current technocracy and race to take humans out of the loop is as clear as ever. Dennis Fisher, Lindsey O-Donnell-Welch, Zoe Lindsey, and Pete Baker sit down in front of an IMSAI 8080 with some raw cor…
…
continue reading
1
The Cl0p-Oracle Extortion Emails, Red Hat Breach, and Sad Government News
35:27
35:27
Play later
Play later
Lists
Like
Liked
35:27Dennis and Lindsey dissect a busy week in security news, starting with the Cl0p group's extortion campaign against Oracle customers (3:24), then moving into the Crimson Collective's claimed breach of some of Red Hat GitLab's repos (12:41), and finally the consequences of the expiration of th CISA legislation and de-funding of the MS-ISAC (22:46). P…
…
continue reading
1
H-1B Visa Changes, Agentic Commerce, Optimizing Customer Reviews
21:55
21:55
Play later
Play later
Lists
Like
Liked
21:55Heading into the fourth quarter, there are no signs of a slowdown in developments that will keep business and technology leaders on their toes. This episode dives into the latest impacts of geopolitics on the tech industry and AI’s impact on commerce and buying networks.By Forrester
…
continue reading
The world isn't run by weapons anymore, or energy, or money. It's run by little ones and zeroes, little bits of data. It's all just electrons. Daniel Cuthbert joins Dennis Fisher to dive into an all-tiime, undisputed hacker movie classic, the 1992 masterpiece, Sneakers. We dissect the movie's genesis, its technical accuracy and prescience, and disc…
…
continue reading
1
New Targeted Phishing Attack Trends With Adam Bateman of Push Security
31:33
31:33
Play later
Play later
Lists
Like
Liked
31:33Adam Bateman, co-founder and CEO of Push Security, joins Dennis Fisher to talk about a new, highly targeted phishing campaign the company uncovered that uses compromised LinkedIn accounts in order to harvest victims' Google or Microsoft credentials through a fake investment, then discuss trends in browser-based attacks and defensive challenges. Sup…
…
continue reading
Robots, robots everywhere! Will Smith plays a technophobic cop investigating a murder. I do believe the gentleman doth protest too much.By SolarWinds LLC
…
continue reading
1
Defining AGI, Measuring AI Search, Agency Swirl Continues
27:28
27:28
Play later
Play later
Lists
Like
Liked
27:28Are you wondering about the emerging technologies and shifting market dynamics that might shape your strategy for 2026 and beyond? Then this episode is for you. Get a detailed look at how three big shifts could dramatically impact plans and strategies for the year ahead (and get a preview for one of our upcoming 2026 Predictions reports, to boot).…
…
continue reading
Matai Wilson, Senior Director for Product Management at SolarWinds, joins TechPod to explore the evolving landscape of AI technology. The conversation delves into the challenges of building AI technology, the exciting future of AI in IT operations, and the upcoming features and tools SolarWinds is developing to enhance user experience and operation…
…
continue reading
1
NPM Package Compromises, Sen. Wyden's Ransomware Letter, and Apple's Memory Safety Advance
30:51
30:51
Play later
Play later
Lists
Like
Liked
30:51Dennis and Lindsey discuss the targeted compromises of NPM packages (1:00) and the pointed letter that Sen. Ron Wyden sent to the FTC chairman asking for Microsoft to be held liable for the Ascension ransomware attack last year (11:45) before finally touching on Apple's new memory safety technology for new iPhones (20:43). NPM compromise: https://d…
…
continue reading
1
The Salesloft Drift Fallout and SBOM Guidance From CISA and NSA
28:53
28:53
Play later
Play later
Lists
Like
Liked
28:53Dennis and Lindsey talk through the continuing fallout of the Salesloft Drift incident (2:05) in light of the disclosure of several new companies that are involved, including Cloudflare, which published an excellent post-mortem on the intrusion. Then they discuss the new Shared Vision of SBOM for Cybersecurity published by CISA, NSA, and many forei…
…
continue reading
1
Olympic Sports Sponsorships, AI Agents In Customer Success And Manufacturing
21:42
21:42
Play later
Play later
Lists
Like
Liked
21:42As we move into September, we dig into new sponsorship options for brands and find out how AI agents are impacting the customer success function as well as the industrial manufacturing and supply chain industries.By Forrester
…
continue reading
We are so back! After a bit of a hiatus, we're very excited to be back with new Decipher content for you in all of the old familiar places. And also some new ones. Join Decipher editors Dennis Fisher and Lindsey O'Donnell-Welch as we start our new, independent phase, talk about what we've been up to, and discuss our plans for what fun stuff we have…
…
continue reading
1
The Sony Hollywood Hack | How Cybercrime Turned A Blockbuster Comedy Into A Global News Story
30:41
30:41
Play later
Play later
Lists
Like
Liked
30:41THE SONY HACK: HOLLYWOOD, NORTH KOREA & THE CYBER WAR THAT CHANGED EVERYTHING In 2014, Sony Pictures became ground zero for the first major nation-state cyberattack on a global corporation. The “Guardians of Peace,” linked to North Korea, crippled Sony’s networks, leaked unreleased films, and exposed troves of executive emails that forced high-leve…
…
continue reading
It's CSOC o'clock! In this episode, we dive into the high-stakes world of cyber defense with the manager of cybersecurity operations at a critical infrastructure organization. From ransomware threats and zero-day exploits to the rise of nation-state-backed Advanced Persistent Threats (APTs), our guest reveals how security teams manage 24/7 threats,…
…
continue reading
1
SIN CITY CYBERATTACK | Inside MGM Casino's $100M Hack
30:20
30:20
Play later
Play later
Lists
Like
Liked
30:20SIN CITY CYBERATTACK: INSIDE THE MGM & CAESARS CASINO BREACHES In September 2023, Las Vegas turned into ground zero for one of the most disruptive cyberattacks in U.S. history. MGM Resorts, owner of iconic casinos on the Strip, saw slot machines go dark, hotel check-ins grind to a halt, and operations paralyzed for days. At the same time, Caesars E…
…
continue reading
Have you ever wanted a time machine? Or how about a teleporter? How many lightsabers would you have? In this episode, we list our top 5 favorite technologies featured in movies and television shows.By SolarWinds LLC
…
continue reading
1
Anthropic Lawsuit, AI And Energy, CMO Trends
25:02
25:02
Play later
Play later
Lists
Like
Liked
25:02As we hurtle toward the end of August, it’s time to look toward the future. More specifically, the future of Anthropic (and other AI firms), the future of AI as a technology, and the future of the CMO role.By Forrester
…
continue reading
1
INSIDE CNA's $40M BITCOIN RANSOM | The Hack That Changed Cybersecurity
49:55
49:55
Play later
Play later
Lists
Like
Liked
49:55The CISO Signal | INSIDE CNA's $40M BITCOIN RANSOM | The Hack That Changed Cybersecurity - EP 4 In this episode of The CISO Signal, we go deep inside the cyberattack that shook the financial world. Join us as we unravel the haunting details of the 2021 ransomware attack on CNA Financial, which resulted in a record-breaking $40 million ransom paymen…
…
continue reading
1
THE UBER BREACH: HOW A 17-YEAR-OLD HACKED A FORTUNE 500 COMPANY | S1 EP3
54:25
54:25
Play later
Play later
Lists
Like
Liked
54:25THE UBER BREACH: HOW A 17-YEAR-OLD HACKED A FORTUNE 500 COMPANY A 17-year-old hacker. A simple social engineering tactic. A taunting message posted to Uber’s internal Slack channel. In one of the most audacious breaches in recent memory, a teenager allegedly affiliated with the Lapsus$ group compromised a Fortune 500 company, exposing critical vuln…
…
continue reading