A brief daily summary of what is important in information security. The podcast is published every weekday and designed to get you ready for the day with a brief, usually 5 minutes long summary of current network security related events. The content is late breaking, educational and based on listener input as well as on input received by the SANS Internet Storm Center. You may submit questions and comments via our contact form at https://isc.sans.edu/contact.html .
…
continue reading
RunAs Radio is a weekly Internet Audio Talk Show for IT Professionals working with Microsoft products.
…
continue reading
In this podcast, networking guru Mattias Fridström, Chief Evangelist at Arelion and industry experts discuss all things Internet, networks, cloud and connectivity.
…
continue reading
Originally the “How to Cover Money” podcast series, ”We Mean Business” is produced by The Reynolds Center for Business Journalism, designed specifically for journalists who want to cover business better on their beats.
…
continue reading
The pod dedicated to the hardworking network operators who keep the bitpipes running smoothly. We focus on sharing best practices, the operations tool stack, and engage with vendors and solution providers to get insights into new technologies and tools so you can make informed decisions for your ops environment. Hosted by your friendly neighborhood internet plumber, Scott Robohn.
…
continue reading
Welcome to video version of “Cybersecurity Where You Are,” the podcast of the Center for Internet Security® (CIS®). Cybersecurity affects us all — whether we’re online at home, managing a company, supporting clients, or running a state or local government. Join us on Wednesdays as Sean Atkinson, CISO at CIS, and Tony Sager, SVP & Chief Evangelist at CIS, discuss trends and threats, explore security best practices, and interview experts in the industry. Together, we’ll clarify these issues, c ...
…
continue reading
This is the best Podcast to get started with English for Call Centers and Customer Service for students of English as a Second Language. Practice your listening and speaking. Learn Call Center Soft Skills and Vocabulary. Learn Customer Service skills: Empathy, Troubleshooting Soft Skills and others. Practice active listening, Call center Role plays, empathy scripts, sales role plays, grammar and vocabulary.
…
continue reading
From the construction of virtual realities to the internet of things to the watches on our wrists—technology's influence is everywhere. Its role in our lives is evolving fast, and we're faced with riveting questions and tough challenges that sit at the intersection of technology and humanity. Listen in every Friday, with host, journalist Sherrell Dorsey, as TED speakers explore the way tech shapes how we think about society, science, design, business, and more. Follow Sherrell on Instagram @ ...
…
continue reading
Tech Bytes are short sponsored audio segments that appear at the end of Network Break episodes. We also separate them into this standalone feed so it’s easy to stay in the loop on new vendor developments.
…
continue reading
The Official AWS Podcast is a podcast for developers and IT professionals looking for the latest news and trends in storage, security, infrastructure, serverless, and more. Join Simon Elisha and Hawn Nguyen-Loughren for regular updates, deep dives, launches, and interviews. Whether you’re training machine learning models, developing open source projects, or building cloud solutions, the Official AWS Podcast has something for you.
…
continue reading
Dive into the world of artificial intelligence with 'Leveraging AI,' a podcast tailored for forward-thinking business professionals. Each episode brings insightful discussions on how AI can ethically transform business practices, offering practical solutions to day-to-day business challenges. Join our host Isar Meitis (4 time CEO), and expert guests as they turn AI's complexities into actionable insights, and explore its ethical implications in the business world. Whether you are an AI novic ...
…
continue reading
Over The Edge is a podcast about edge computing and those in the industry who are creating the future of the internet. On the show we talk to corporate leaders, open-source experts, technologists, journalists, analysts, and the community at large, to discuss technological innovations, trends, practical applications, business models, and the occasional far-flung theory. Over the Edge is brought to you by the generous sponsorship of Dell Technologies.
…
continue reading

1
SANS Stormcast Thursday, May 22nd 2025: Crypto Confidence Scams; Extension Mayhem for VS Code and Chrome (#)
6:22
6:22
Play later
Play later
Lists
Like
Liked
6:22SANS Stormcast Thursday, May 22nd 2025: Crypto Confidence Scams; Extension Mayhem for VS Code and Chrome New Variant of Crypto Confidence Scam Scammers are offering login credentials for what appears to be high value crypto coin accounts. However, the goal is to trick users into paying for expensive “VIP” memberships to withdraw the money. https://…
…
continue reading

1
SANS Stormcast Tuesday, June 3rd, 2025: Windows SSH C2; Google Removes CAs from trusted list; MSFT issues Emergency Patch to fix Crash issue; Qualcom Adreno GPU 0-day (#)
6:07
6:07
Play later
Play later
Lists
Like
Liked
6:07SANS Stormcast Tuesday, June 3rd, 2025: Windows SSH C2; Google Removes CAs from trusted list; MSFT issues Emergency Patch to fix Crash issue; Qualcom Adreno GPU 0-day Simple SSH Backdoor Xavier came across a simple SSH backdoor taking advantage of the ssh client preinstalled on recent Windows systems. The backdoor is implemented via an SSH configur…
…
continue reading

1
Tech Bytes: NetFlow Optimizer: More Insights, Less Flow Volume (Sponsored)
17:25
17:25
Play later
Play later
Lists
Like
Liked
17:25Today on the Tech Bytes podcast, we talk about how to get more out of your NetFlow records with sponsor NetFlow Logic. NetFlow’s been around for a long time, and if you’re already including flow records as part of your monitoring and management arsenal, you may think you’re extracting all the value you can from... Read more »…
…
continue reading

1
#723: AWS News: Claude 4 Opus comes to Bedrock, AWS Transform accelerates modernization, and more
39:45
39:45
Play later
Play later
Lists
Like
Liked
39:45Claude 4 Opus and Sonnet, the most powerful models from Anthropic for coding and advanced reasoning, are now available on Amazon Bedrock. Plus, AWS Transform can now accelerate your Mainframe, .NET and VMWare workload modernization. Learn about these updates and more with your hosts Shruthi and Jillian. 00:00 - Intro, 00:21 - Amazon Bedrock, 03:40 …
…
continue reading

1
SANS Stormcast Monday, May 2nd, 2025: PNG with RAT; Cisco IOS XE WLC Exploit; vBulletin Exploit (#)
5:42
5:42
Play later
Play later
Lists
Like
Liked
5:42SANS Stormcast Monday, May 2nd, 2025: PNG with RAT; Cisco IOS XE WLC Exploit; vBulletin Exploit A PNG Image With an Embedded Gift Xavier shows how Python code attached to a PNG image can be used to implement a command and control channel or a complete remote admin kit. https://isc.sans.edu/diary/A+PNG+Image+With+an+Embedded+Gift/31998 Cisco IOS XE …
…
continue reading

1
193 | AI will eliminate 50% of entry jobs, AI Blackmailing it’s operators, Unauthorized AI usage is putting companies at risk and more important AI news for the week ending on May 30, 2025
58:55
58:55
Play later
Play later
Lists
Like
Liked
58:55👉 Fill out the listener survey - https://services.multiplai.ai/lai-survey 👉 Learn more about the AI Business Transformation Course starting May 12 — spots are limited - http://multiplai.ai/ai-course/ Could your own AI tools be plotting against you — or just replacing half your team? This week’s AI headlines are straight out of a techno-thriller: AI…
…
continue reading

1
TNO031: Attracting New Talent to Networking, Pairing Dev With NetOps, and More With Justin Ryburn
45:22
45:22
Play later
Play later
Lists
Like
Liked
45:22Total Networks Operations sits down with Justin Ryburn for a wide-ranging discussion on the state of the networking industry. Topics including how to attract new talent to network engineering and network operations; getting literate in DevOps/infrastructure tools such as GitHub, Terraform, and Python; pairing Dev and NetOps to maximize domain exper…
…
continue reading

1
How AI models steal creative work — and what to do about it | Ed Newton-Rex
20:05
20:05
Play later
Play later
Lists
Like
Liked
20:05Generative AI is built on three key resources: people, compute and data. While companies invest heavily in the first two, they often use unlicensed creative work as training data without permission or payment — a practice that pits AI against the very creators it relies on. AI expert Ed Newton-Rex has a solution: licensing. He unpacks the dark side…
…
continue reading

1
SANS Stormcast Friday, May 30th 2025: Alternate Data Streams; Connectwise Breach; Google Calendar C2; (#)
13:47
13:47
Play later
Play later
Lists
Like
Liked
13:47SANS Stormcast Friday, May 30th 2025: Alternate Data Streams; Connectwise Breach; Google Calendar C2; Alternate Data Streams: Adversary Defense Evasion and Detection Good Primer of alternate data streams and how they are abused, as well as how to detect and defend against ADS abuse. https://isc.sans.edu/diary/Alternate%20Data%20Streams%20%3F%20Adve…
…
continue reading

1
SANS Stormcast Thursday May 29th 2025: LLM Assisted Analysis; MSP Ransomware; Everetz Vulnerability (#)
6:11
6:11
Play later
Play later
Lists
Like
Liked
6:11SANS Stormcast Thursday May 29th 2025: LLM Assisted Analysis; MSP Ransomware; Everetz Vulnerability Exploring a Use Case of Artificial Intelligence Assistance with Understanding an Attack Jennifer Wilson took a “weird string” found in a recent honeypot sample and worked with ChatGPT to figure out what it is all about. https://isc.sans.edu/diary/%5B…
…
continue reading

1
Episode 137: National Cybersecurity Through SLTT Resilience
42:00
42:00
Play later
Play later
Lists
Like
Liked
42:00In episode 137 of Cybersecurity Where You Are, Sean Atkinson and Tony Sager are joined by Terry Loftus, Assistant Superintendent (Chief Information Officer) of Integrated Technology Services at the San Diego County Office of Education (SDCOE); and Netta Squires, President of Government Affairs, Cybersecurity, & Resilience at Open District Solutions…
…
continue reading

1
SANS Stormcast Wednesday May 28th 2025: Securing authorized_keys; ADAuditPlus SQL Injection; Dero Miner vs Docker API (#)
6:38
6:38
Play later
Play later
Lists
Like
Liked
6:38SANS Stormcast Wednesday May 28th 2025: Securing authorized_keys; ADAuditPlus SQL Injection; Dero Miner vs Docker API SSH authorized_keys File One of the most common techniques used by many bots is to add rogue keys to the authorized_keys file, implementing an SSH backdoor. Managing these files and detecting unauthorized changes is not hard and sho…
…
continue reading
How do you talk to security? While at NDC Melbourne, Richard chatted with Sarah Young about her approaches to helping folks work with the security team. Often seen as an impediment to business, Sarah talks about what motivates security teams, how to use language to help them understand that you are taking security seriously, and how to get more thi…
…
continue reading

1
Creativity, technology, and the future of artistic expression
16:08
16:08
Play later
Play later
Lists
Like
Liked
16:08In this episode, Ananya Bhargava interviews Lance Gharavi, an experimental artist and scholar, professor in the School of Music, Dance and Theatre, and Associate Director of ASU's Interplanetary Initiative. The discussion tackles the complexity of defining creativity in the age of AI, the metaphors we use to make sense of intelligent machines, and …
…
continue reading

1
192 | Create AI images like a pro! Using New ChatGPT, Midjourney, and Open Source with Luka Tisler
38:28
38:28
Play later
Play later
Lists
Like
Liked
38:28👉 Fill out the listener survey - https://services.multiplai.ai/lai-survey 👉 Learn more about the AI Business Transformation Course starting May 12 — spots are limited - http://multiplai.ai/ai-course/ AI-generated visuals have become table stakes. But what if you're still playing checkers while others are playing 4D chess? In this session, we’re bre…
…
continue reading

1
SANS Stormcast Tuesday, May 27th 2025: SVG Steganography; Fortinet PoC; GitLab Duo Prompt Injection (#)
7:13
7:13
Play later
Play later
Lists
Like
Liked
7:13SANS Stormcast Tuesday, May 27th 2025: SVG Steganography; Fortinet PoC; GitLab Duo Prompt Injection SVG Steganography Steganography is not only limited to pixel-based images but can be used to embed messages into vector-based formats like SVG. https://isc.sans.edu/diary/SVG%20Steganography/31978 Fortinet Vulnerability Details CVE-2025-32756 Horizon…
…
continue reading

1
#722: The Frugal Architect w/Werner Vogels: How Warner Bros. Discovery keeps streaming seamless
48:45
48:45
Play later
Play later
Lists
Like
Liked
48:45With only nine months to launch Max, Tom Leaman, VP of Site Reliability Engineering at Warner Bros. Discovery had to move fast to keep millions of viewers streaming smoothly. Learn about their innovative approach to measuring efficiency, managing global operations, and building resilient systems at massive scale with your hosts Simon Elisha and Dr.…
…
continue reading

1
191 | The craziest week in AI news history 🤯 Microsoft, Google, Anthropic and OpenAI major announcements, and more important AI news for the week ending on May 23rd, 2025
56:26
56:26
Play later
Play later
Lists
Like
Liked
56:26👉 Fill out the listener survey - https://services.multiplai.ai/lai-survey 👉 Learn more about the AI Business Transformation Course starting May 12 — spots are limited - http://multiplai.ai/ai-course/ Is your business ready for the AI-powered arms race of the century? This wasn’t just another week in tech — it was the week. Microsoft revealed its pl…
…
continue reading

1
TNO030: The Backbone of AI: Data Center Ops in the Age of Explosive Growth (Sponsored)
52:58
52:58
Play later
Play later
Lists
Like
Liked
52:58Data Center construction has reached an incredible pace over the last few years with implications on NetOps and operations of all kinds. Today we with talk with sponsor Siemon regarding the state of data centers, past, present and future. We explore legacy data centers and how they are evolving to work in today’s environments. We... Read more »…
…
continue reading

1
How Substack is breaking down traditional media gatekeepers | Hamish McKenzie
22:36
22:36
Play later
Play later
Lists
Like
Liked
22:36“The whole Substack ecosystem is about more power because it’s based on those relationships between the publisher and their subscribers, or the video maker and their viewers,” says journalist and Substack co-founder Hamish McKenzie. Following his talk at TED2025, McKenzie is in conversation with Sherrell Dorsey to discuss how the media landscape ha…
…
continue reading

1
SANS Stormcast Friday, May 23rd 2025: Backup Connectivity; Windows 2025 dMSA Abuse; Samlify Vulnerability (#)
7:54
7:54
Play later
Play later
Lists
Like
Liked
7:54SANS Stormcast Friday, May 23rd 2025: Backup Connectivity; Windows 2025 dMSA Abuse; Samlify Vulnerability Resilient Secure Backup Connectivity for SMB/Home Users Establishing resilient access to a home network via a second ISP may lead to unintended backdoors. Secure the access and make sure you have the visibility needed to detect abuse. https://i…
…
continue reading

1
AI’s evolving role in art, storytelling, and marketing
28:51
28:51
Play later
Play later
Lists
Like
Liked
28:51In this episode, Ananya Bhargava interviews Ed Finn, founding director of the Center for Science and the Imagination at Arizona State University. The discussion explores imagination in the context of technology, the potential for AI-generated marketing to connect with audiences, and the complex issues of copyright and ownership.…
…
continue reading

1
Episode 136: How WiCyS Advances Women in Cybersecurity
38:35
38:35
Play later
Play later
Lists
Like
Liked
38:35In episode 136 of Cybersecurity Where You Are, Sean Atkinson and Tony Sager are joined live by Lynn Dohm, Executive Director of Women in CyberSecurity (WiCyS). Together, they discuss how WiCyS works to advance women in cybersecurity. Here are some highlights from our episode: 01:03. A mission of recruiting, retaining, and advancing women in cyberse…
…
continue reading

1
PowerShell 7.5 and DSC 3.0.0 with Jason Helmick
36:47
36:47
Play later
Play later
Lists
Like
Liked
36:47What's new in PowerShell 7.5? Richard talks to Jason Helmick about the latest version of PowerShell. Jason talks about 7.5 being a version with plenty of community contributions and what that means for everyone. He also discusses 7.6, which will be released as a long-term support version of PowerShell synchronized with .NET 10. Then, on to Desired …
…
continue reading

1
SANS Stormcast Wednesday, May 21st 2025: Researchers Scanning the Internet; Forgotten DNS Records; openpgp.js Vulneraiblity (#)
7:51
7:51
Play later
Play later
Lists
Like
Liked
7:51SANS Stormcast Wednesday, May 21st 2025: Researchers Scanning the Internet; Forgotten DNS Records; openpgp.js Vulneraiblity Researchers Scanning the Internet A “newish” RFC, RFC 9511, suggests researchers identify themselves by adding strings to the traffic they send, or by operating web servers on machines from which the scan originates. We do off…
…
continue reading

1
190 | Behind the Curtain: AI Image Generation That Actually Works for Business with Ross Symons
52:00
52:00
Play later
Play later
Lists
Like
Liked
52:00👉 Fill out the listener survey - https://services.multiplai.ai/lai-survey Most business leaders know AI can generate stunning visuals. But turning that potential into real, consistent, on-brand creative? That’s where most teams get stuck. In this live session, we’re pulling back the curtain. Ross Symons will walk us through the exact workflows he t…
…
continue reading

1
SANS Stormcast Tuesday, May 20th 2025: AutoIT Code RAT; Fake Keepass Download; Procolored Printer Software Compromise (#)
6:41
6:41
Play later
Play later
Lists
Like
Liked
6:41SANS Stormcast Tuesday, May 20th 2025: AutoIT Code RAT; Fake Keepass Download; Procolored Printer Software Compromise RAT Dropped By Two Layers of AutoIT Code Xavier explains how AutoIT was used to install a remote admin tool (RAT) and how to analyse such a tool https://isc.sans.edu/diary/RAT%20Dropped%20By%20Two%20Layers%20of%20AutoIT%20Code/31960…
…
continue reading

1
#721: AWS News: Amazon Nova Premier takes on complex tasks and model distillation, and more
28:42
28:42
Play later
Play later
Lists
Like
Liked
28:42Nova Premier is our most advanced AI model yet, featuring a million-token context window and enhanced capabilities at nearly half the cost of competitors. Dive into this update and more with hosts Simon and Jillian.00:00 - Intro 00:31 - Amazon Nova Premier 02:56 - Analytics 04:46 - Artificial Intelligence 11:02 - Business Applications 11:38 - Cloud…
…
continue reading

1
Tech Bytes: Nix AI Risks With Palo Alto Networks Prisma AIRS, Prisma Access Browser (Sponsored)
15:05
15:05
Play later
Play later
Lists
Like
Liked
15:05AI is no longer on the horizon. It’s part of how people and products work today. And as AI finds its way into more business applications and processes, it can create new risks. On today’s Tech Bytes, sponsored by Palo Alto Networks, we talk about how Palo Alto Networks is addressing those risks so that... Read more »…
…
continue reading

1
SANS Stormcast Monday, May 18th 2025: xorsearch python functions; pwn2own Berlin; senior govt official impersonation; dynamic domain risk (#)
6:30
6:30
Play later
Play later
Lists
Like
Liked
6:30SANS Stormcast Monday, May 18th 2025: xorsearch python functions; pwn2own Berlin; senior govt official impersonation; dynamic domain risk xorsearch.py: Python Functions Didier’s xorsearch tool now supports python functions to filter output https://isc.sans.edu/diary/xorsearch.py%3A%20Python%20Functions/31858 Pwn2Own Berlin 2025 Last weeks Pwn2Own c…
…
continue reading

1
189 | The end of the internet as we know it, Higher education AI crisis, AI avatars influencing court cases, and more important AI news for the week ending on May 16th, 2025
51:05
51:05
Play later
Play later
Lists
Like
Liked
51:05👉 Fill out the listener survey - https://services.multiplai.ai/lai-survey Is the internet as we know it about to vanish? Recent data shows a dramatic shift—9 out of the top 10 websites are losing traffic while AI tools like ChatGPT are skyrocketing. The era of web browsing is transforming, and if your business relies on old-school web traffic, you …
…
continue reading

1
TNO029: The Power of Curiosity With Michael Costello
45:41
45:41
Play later
Play later
Lists
Like
Liked
45:41Michael Costello shares his career journey on today’s Total Network Operations. Currently on the Board of Directors at NANOG and a Distinguished Engineer at Saviynt, Michael talks about his early days learning the ropes as a junior network engineer, trying to start an ISP, his stint in graduate school, and a very interesting role at... Read more »…
…
continue reading

1
Whitney Houston Hologram: The Zombification of an Icon | There Are No Girls on the Internet
39:36
39:36
Play later
Play later
Lists
Like
Liked
39:36This episode is part of a feed swap with our friend podcast There Are No Girls On The Internet, hosted by Bridget Todd. She is an expert on tech culture, and on her show she has fun, thought provoking conversations about the ways technology shapes our lives. If you enjoy this episode, you can listen to There Are No Girls On The Internet wherever yo…
…
continue reading