Search a title or topic

Over 20 million podcasts, powered by 

Player FM logo

Zero Trust Architecture Podcasts

show episodes
 
Artwork
 
Welcome to Perimeter Perspective, the podcast where we explore the strategies, challenges, and innovations shaping the future of cybersecurity and IT management. Hosted by the experts at Next Perimeter, this show dives into zero trust principles, cloud-first solutions, and the evolving role of technology in modern businesses. Whether you’re an IT leader, business owner, or tech enthusiast, Perimeter Perspective offers actionable insights and engaging discussions to help you secure your digit ...
  continue reading
 
Artwork

1
CyberSecurity Summary

CyberSecurity Summary

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Daily
 
CyberSecurity Summary is your go-to podcast for concise and insightful summaries of the latest and most influential books in the field of cybersecurity. Each episode delves into the core concepts, key takeaways, and practical applications of these books, providing you with the knowledge you need to stay ahead in the ever-evolving world of cybersecurity. Whether you’re a seasoned professional or just starting out, CyberSecurity Summary offers valuable insights and discussions to enhance your ...
  continue reading
 
The TOF® Biosphere is a privacy focused platform. It accommodates real-world, event driven accounting in DLT and location free use of fiat or cryptocurrencies during legally compliant contractual based engagements. Users define and exchange on their own, trusted terms.
  continue reading
 
Your source for wide-ranging discussions from all around the Go community. Panelists include Mat Ryer, Jon Calhoun, Natalie Pistunovich, Johnny Boursiquot, Angelica Hill, Kris Brandow, and Ian Lopshire. We discuss cloud infrastructure, distributed systems, microservices, Kubernetes, Docker... oh and also Go! Some people search for GoTime or GoTimeFM and can't find the show, so now the strings GoTime and GoTimeFM are in our description too.
  continue reading
 
Host David Brossard discusses the latest in fine-grained, policy-based authorization, and the latest developments and challenges enterprises face in their access control journey. Axiomatics is the originator and leading provider of runtime, fine-grained authorization delivered with attribute-based access control (ABAC) for applications, data, APIs, and microservices. The company’s Orchestrated Authorization strategy enables enterprises to effectively and efficiently connect Axiomatics’ award ...
  continue reading
 
Artwork

1
Authority Partners Podcast

Authority Partners

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
OK, everyone knows that #APKnowsIT. Our global team of 500+ geeks, who work globally on five continents, across 30+ countries, are #CreatingExcellence every day. We want to share our excellence with the IT community. We aim to educate, inspire, and motivate IT, professionals, worldwide. Disclaimer: The views expressed in the podcasts are the speaker’s own and do not reflect the view of Authority Partners. ® AP 1998 - 2023
  continue reading
 
Loading …
show series
 
A comprehensive guide to securing cloud-native applications and APIs, specifically focusing on OAuth and OpenID Connect standards. The book covers a wide range of topics, including API authorization, token design and management, secure client implementations for various application types (web, mobile, desktop), and the deployment and operational as…
  continue reading
 
Explores the multifaceted field of network science, detailing various network types such as social, biological, and technological systems like the Internet and telephone networks. It examines fundamental network properties including paths, connectivity, and the small-world effect, alongside different mathematical representations of networks. The so…
  continue reading
 
Explores various facets of network security and performance, providing practical guidance for hardening systems and optimizing network elements. It covers topics such as client and server security configurations, including detailed steps for Windows and Linux environments, and the benefits of virtualization for disaster recovery and elastic perform…
  continue reading
 
[email protected] What keeps a business alive when the lights flicker, a server drops, or an ISP blinks? We pull back the curtain on practical resilience—how continuity planning, capacity, and clear runbooks turn chaos into a minor hiccup—then pressure-test the plan with drills, documentation, and ruthless honesty. We start by grounding COOP …
  continue reading
 
An extensive guide to Mastering Tableau, a prominent business intelligence tool, focusing on its advanced features for data analysis and visualization. It covers best practices for visual design, including formatting, color usage, and reducing clutter to create impactful data stories. Readers will learn about data preparation and handling using Tab…
  continue reading
 
Detailing its installation, configuration, and management for various IT infrastructure needs. It covers fundamental concepts like server roles, disk management, networking protocols, and PowerShell cmdlets for administration. The text also thoroughly explores advanced topics such as virtualization with Hyper-V, including virtual disks, networks, a…
  continue reading
 
[email protected] What if your “all-in-one” router is doing too much—and your Wi‑Fi “speed” isn’t the real bottleneck? We pull back the rack door and trace the digital bloodstream from SOHO setups to enterprise backbones, translating jargon into choices you can actually make. Starting with LANs, WANs, WLANs, and SANs, we map how scope changes…
  continue reading
 
An introduction to Power BI, outlining its use in business intelligence applications. It covers fundamental concepts like data modeling, DAX calculations, and various visualization types such as bar, line, waterfall, scatter, donut, treemap, and map charts. The text also explains how to connect and shape data from diverse sources using Power Query …
  continue reading
 
A practical resource for developing, deploying, and scaling containerized applications. It covers fundamental concepts like containerization versus virtual machines, Kubernetes architecture, and various Azure container services, alongside advanced topics such as serverless Kubernetes, Windows containers, and integrating with Azure DevOps for contin…
  continue reading
 
[email protected] A tiny stick changed how we move information—and how attackers move too. We pull back the curtain on the USB flash drive’s quiet takeover: why floppies and CD-Rs failed us, how flash memory and USB converged, and which teams across Singapore, Israel, and China raced to ship the first pocket drive that actually worked. From e…
  continue reading
 
Discuss artificial intelligence and deep learning techniques applied to malware analysis and detection, as well as other cybersecurity challenges. They cover various neural network architectures like MLPs, CNNs, RNNs, LSTMs, and GANs, and their effectiveness in tasks such as classifying malware families, identifying malicious URLs, and detecting an…
  continue reading
 
A comprehensive guide to the security architecture of mobile telecommunications systems, particularly focusing on Long Term Evolution (LTE). It details the evolution of cellular security from analogue systems to 2G (GSM), 3G (UMTS), and the Evolved Packet System (EPS), highlighting common vulnerabilities and subsequent design improvements. The text…
  continue reading
 
A practical guide to Narrowband Internet of Things (NB-IoT), detailing its underlying cellular communication technologies like 4G and 5G LTE, and its applications in Machine Type Communication (MTC). The text covers Arduino-based projects for developers, showcasing the use of an NB-IoT hardware board with a microcontroller (MCU) and Quectel BG96 mo…
  continue reading
 
[email protected] Cloud perimeters are fading, identities are multiplying, and threats move faster than patches. We dive into the real mechanics of securing a hybrid world—mapping cloud deployment choices, clarifying shared responsibility across SaaS, PaaS, and IaaS, and showing how Zero Trust reshapes defenses around identity, posture, and c…
  continue reading
 
A comprehensive guide to the LLVM compiler infrastructure. It covers various aspects of LLVM, including its build system, testing utilities like LIT, and the domain-specific language TableGen. The text explores frontend development with Clang, explaining its architecture, preprocessing, Abstract Syntax Tree (AST) handling, and custom toolchain crea…
  continue reading
 
Serves as a comprehensive interview guide for Java professionals, covering a wide array of topics essential for technical interviews. It begins by outlining non-technical aspects of job searching, such as recruitment processes, interview types (telephonic, technical, personal), and strategies for success, including resume preparation and soft skill…
  continue reading
 
[email protected] Storage didn’t just get bigger; it got personal. We rewind to the late ’90s and early 2000s to unpack the clash between Iomega’s Zip drive and the laser-lit world of the CD—two formats that taught a generation how to back up, carry, and truly own their data. From the pain of 30‑floppy installs to the thrill of dropping a 700…
  continue reading
 
Serves as a comprehensive guide for IT professionals, offering both theoretical knowledge and practical application of ITIL 4 service management principles. It covers key concepts, roles, the four dimensions of service management, the Service Value System (SVS), guiding principles, governance, the service value chain, and various ITIL practices. Th…
  continue reading
 
Provides comprehensive guidance on implementing the ISO/IEC 27001:2013 standard for information security management systems (ISMS). The text details requirements for risk assessment, risk treatment, and the creation of a Statement of Applicability (SOA), offering practical methodologies like the event-consequence approach and various control types.…
  continue reading
 
Provides a detailed guide for network engineers to transition into network automation. It commences with fundamental Python concepts, covering data types, syntax, and error handling through numerous exercises. The book then progresses to Linux administration essentials, emphasizing the creation and management of virtual environments using VMware Wo…
  continue reading
 
[email protected] Dive deep into the essential building blocks of secure enterprise networks with Professor J. Rod in this comprehensive exploration of network architecture, security appliances, and remote access solutions. What makes a truly secure organizational network? It's more than just firewalls and fancy equipment—it's thoughtful desi…
  continue reading
 
Introduces intelligent reliability analysis using MATLAB and AI, focusing on failure analysis and reliability engineering. It covers foundational concepts like reliability fundamentals, measures of reliability such as MTBF and MTTF, and remaining useful lifetime (RUL) estimation techniques. The sources also explore experimental methodologies like a…
  continue reading
 
A comprehensive guide to VMware Dynamic Environment Manager (DEM), a solution for managing end-user desktop experiences. It details the installation and initial configuration of DEM, including setting up Group Policy Objects (GPOs) and understanding the NoAD mode. The text explores various aspects of desktop management, such as user personalization…
  continue reading
 
[email protected] What if the real cause of your random reboots isn’t the GPU at all—but the power plan behind it? We take you end to end through a stability-first build, starting with the underrated hero of every system: clean, properly sized power. You’ll learn how to calculate wattage with 25–30% headroom, navigate 80 Plus efficiency tiers…
  continue reading
 
Explores the evolution of DevOps and its contemporary challenges, particularly the issue of fragmented toolchains and the necessity of standardization. It details how cloud-native and data-centric architectures, including microservices, containers, and Infrastructure as Code (IaC), establish a robust foundation for modern software delivery. A signi…
  continue reading
 
A practical guide for building intelligent applications using the OpenAI API. The book provides step-by-step instructions on leveraging various OpenAI endpoints, including Chat Completions, Images, and Audio, to create diverse applications like chatbots, virtual assistants, and content generators. It explains how to interact with the API through to…
  continue reading
 
A comprehensive guide for Natural Language Processing (NLP) professionals, focusing on advanced techniques and applications using the spaCy library. The text covers various topics, including linguistic feature extraction, rule-based matching, utilizing transformer models like BERT and RoBERTa within spaCy, and integrating Large Language Models (LLM…
  continue reading
 
A comprehensive guide for network professionals transitioning from traditional Multiprotocol Label Switching (MPLS) to Segment Routing MPLS (SR-MPLS). It aims to simplify this complex shift through theoretical explanations and practical lab exercises, using network emulators like EVE-NG and virtual Cisco XRv9k routers. The text explores fundamental…
  continue reading
 
[email protected] Remember that satisfying click of inserting a floppy disk? The nerve-wracking moments waiting for your term paper to save? The frustration of "Please insert disk 5 of 12" during game installations? Join Professor J-Rod on a nostalgic yet informative deep dive into the technology that defined personal computing for two decade…
  continue reading
 
A comprehensive guide to developing sophisticated 3D game character animations and virtual worlds. The content covers a wide array of topics, starting with fundamental concepts like loading models and basic animations and progressing to advanced techniques such as GPU-accelerated calculations using compute shaders. Readers will learn about implemen…
  continue reading
 
A reference for Ruby programming. It covers a vast array of topics, beginning with fundamental data types like strings and numbers, and progressing through complex data structures such as arrays, hashes, and trees. The material also explores object-oriented programming (OOP) principles, file I/O and data storage methods, graphical user interface (G…
  continue reading
 
Focuses on machine learning for tabular data, covering its fundamental concepts and practical applications. The sources explore various machine learning and deep learning approaches, with a particular emphasis on gradient boosting techniques like XGBoost and LightGBM, highlighting their efficacy with structured data. Readers will learn about data p…
  continue reading
 
A powerful technology for programming the Linux kernel to enhance observability, networking, and security. It explains eBPF's fundamentals, including its virtual machine, instruction set, maps, and helper functions, along with the verifier that ensures program safety. The text details how eBPF programs are written in C (and increasingly Rust), comp…
  continue reading
 
A comprehensive guide for individuals seeking to understand and implement quantum programs using Python and the IBM Quantum platform. It explores fundamental quantum computing principles like superposition, entanglement, and interference, detailing how these concepts underpin the creation of quantum circuits. The text also provides practical instru…
  continue reading
 
A comprehensive guide for developers creating AI and Large Language Model (LLM) applications. The book covers fundamental concepts such as prompt engineering and retrieval-augmented generation (RAG), explaining how to integrate external data and manage conversational memory. It thoroughly explores various cognitive architectures like chains, router…
  continue reading
 
[email protected] Ever wonder what happens behind the scenes when you tap "Login" on your favorite app? Authentication is the invisible guardian standing between your personal data and potential attackers, and it's more sophisticated than you might think. Authentication systems rely on three critical principles: Confidentiality keeps your cre…
  continue reading
 
A comprehensive guide for mastering shader programming within the Unity 5 game engine. Authored by Alan Zucconi and Kenneth Lammers, it explores various lighting models, rendering techniques, and visual effects, ranging from basic diffuse shading and texture mapping to advanced concepts like Physically Based Rendering (PBR) and screen effects. The …
  continue reading
 
Explores the integration of Cloud Computing and the Internet of Things (IoT), highlighting their combined applications across diverse sectors. It details the fundamental concepts of both cloud computing and IoT, including their architectures, components, advantages, and disadvantages. The source also examines real-world applications such as smart c…
  continue reading
 
A practical resource for mastering cybersecurity assessments. The text covers Nmap's versatile applications in network security, including penetration testing, red teaming, and purple teaming, detailing fundamental and advanced scanning techniques. It emphasizes setting up a lab environment for hands-on practice, mapping attack surfaces, identifyin…
  continue reading
 
Discuss Radio Frequency Identification (RFID) technology, exploring its evolution and applications across various industries, particularly supply chain management and retail. They examine the technical advancements in RFID, including printed electronics and silicon ink, highlighting their impact on cost reduction and performance. A significant port…
  continue reading
 
[email protected] The digital world seems like magic to many, but behind every functioning computer is a complex system of hardware components and methodical troubleshooting approaches. In this comprehensive episode, we pull back the curtain on what makes IT specialists effective problem-solvers and explore the physical heart of computing sys…
  continue reading
 
Provides an extensive overview of operational security (opsec) and anonymity in the digital and physical realms. It thoroughly explains the use of tools like Tor, Freenet, and various encryption methods (PGP, Truecrypt, Veracrypt) to protect digital footprints, communications, and data. The text also highlights the importance of physical security p…
  continue reading
 
Offers an in-depth look at security concerns surrounding Large Language Models (LLMs), drawing heavily from "The Developer’s Playbook for Large Language Model Security" by Steve Wilson. It presents endorsements highlighting the book's importance for AI developers and security professionals due to the novel risks LLMs introduce. The text outlines va…
  continue reading
 
Markus Viitamäki, Senior Infrastructure Architect at Embark Studios is back on the podcast. In this episode, he and Mattias Fridström discuss Markus’ previous engagement in the world’s largest gaming festival DreamHack, when to establish local gaming sites to meet customer needs (and what the requirements are), DDoS attacks in the gaming industry, …
  continue reading
 
A technical guide published by Packt Publishing in 2021. It focuses on optimizing Python application performance by integrating Rust code. The book provides practical guidance on creating Python pip modules with Rust, managing dependencies using Cargo, and structuring Rust code for efficient integration. It explores advanced topics like concurrency…
  continue reading
 
A comprehensive overview of ransomware. It details the history and evolution of various malware types, with a specific focus on ransomware families like Ryuk, WannaCry, and Locky. The sources explore the methods of ransomware distribution, such as email phishing and exploit kits, and explain why traditional antivirus software struggles to detect th…
  continue reading
 
[email protected] Cryptology isn't just theory—it's the invisible shield protecting your every digital move. This second installment of our cryptology deep dive moves beyond the fundamentals to reveal how these powerful tools operate in real-world systems that safeguard our digital lives. Digital signatures stand as one of cryptology's most p…
  continue reading
 
Loading …
Copyright 2025 | Privacy Policy | Terms of Service | | Copyright
Listen to this show while you explore
Play