Search a title or topic

Over 20 million podcasts, powered by 

Player FM logo

Cisco Podcast Network

show episodes
 
The Cisco Podcast Network is a collective of podcasts from across Cisco spanning technology to culture and everything in between. Hear from Cisco customers, partners, and Cisco insiders on the topics that matter most to you. Email us with your feedback and suggestions. Discover your favorite playlists today!
  continue reading
 
Human-curated AI podcast for a lightweight technology discussion. I am a Network Engineer with two decades of experience working with Fortune 500 enterprise clients and tier 1 service providers. I also, operate a YouTube channel called SDN Tech Forum, where I share my knowledge and expertise on the latest networking technologies. My channel covers various topics, including Cisco SDA, SD-WAN,, Meraki, Thousandeyes, AWS, IoT, Cybersecurity, and more.
  continue reading
 
Artwork

1
Heavy Networking

Packet Pushers

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
Heavy Networking is an unabashedly nerdy dive into all things networking. Described by one listener as "verbal white papers," the weekly episodes feature network engineers, industry experts, and vendors sharing useful information to keep your professional knowledge sharp and your career growing. Hosts Ethan Banks & Drew Conry-Murray cut through the marketing spin to explore what works—and what doesn't—in networking today, while keeping an eye on what's ahead for the industry. On air since 20 ...
  continue reading
 
Artwork
 
This is The Internet Report, a podcast uncovering what’s working and what’s breaking on the Internet—and why. Tune in to hear ThousandEyes’ Internet experts dig into some of the most interesting outage events from the past couple weeks, discussing what went awry—was it the Internet, or an application issue? Plus, learn about the latest trends in ISP outages, cloud network outages, collaboration network outages, and more.
  continue reading
 
A brief daily summary of what is important in information security. The podcast is published every weekday and designed to get you ready for the day with a brief, usually 5 minutes long summary of current network security related events. The content is late breaking, educational and based on listener input as well as on input received by the SANS Internet Storm Center. You may submit questions and comments via our contact form at https://isc.sans.edu/contact.html .
  continue reading
 
Artwork
 
Welcome to the Security Weekly Podcast Network, your all-in-one source for the latest in cybersecurity! This feed features a diverse lineup of shows, including Application Security Weekly, Business Security Weekly, Paul's Security Weekly, Enterprise Security Weekly, and Security Weekly News. Whether you're a cybersecurity professional, business leader, or tech enthusiast, we cover all angles of the cybersecurity landscape. Tune in for in-depth panel discussions, expert guest interviews, and ...
  continue reading
 
Artwork

4
Network Break

Packet Pushers

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
Network Break keeps you informed with fast, focused analysis of IT news, products, tech trends, and business outcomes. Blending sharp commentary with a touch of humor, hosts Drew Conry-Murray & Johna Till Johnson sift through the weekly landslide of press announcements, product launches, financial reports, and marketing decks to find the stories worth talking about. You come away with the information and context to make smart decisions in your organization and career … all in the span of a ( ...
  continue reading
 
Artwork

1
Inside Outside Innovation

Brian Ardinger, Founder of Inside Outside Innovation podcast, InsideOutside.io, and the Inside Outside Innovation Summit

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Inside Outside Innovation explores the ins and outs of innovation with raw stories, real insights, and tactical advice from the best and brightest in startups & corporate innovation. Each week we bring you the latest thinking on talent, technology, and the future of innovation. Join our community of movers, shakers, makers, founders, builders, and creators to help speed up your knowledge, skills, and network. Previous guests include thought leaders such as Brad Feld, Arlan Hamilton, Jason Ca ...
  continue reading
 
Artwork

1
Baseheads

World Of Sports Network LLC

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Attorney At Sports, Cisco The Realest, and Lestro discuss a weeks worth of the greatest American past time!! Tune in to baseball talk each and every week during the MLB season.
  continue reading
 
Welcome to 'The Citrix Session,' where we bring you the latest in Citrix technologies and solutions. Hosted by XenTegra, this podcast dives deep into the world of Citrix digital workspace solutions, exploring everything from virtual apps and desktops to networking and security. Join us each episode as we discuss best practices, new features, and expert strategies to optimize your Citrix environment and enhance your user experience. Whether you're an IT professional seeking to expand your Cit ...
  continue reading
 
Welcome to the Security Weekly Podcast Network, your all-in-one source for the latest in cybersecurity! This feed features a diverse lineup of shows, including Application Security Weekly, Business Security Weekly, Paul's Security Weekly, Enterprise Security Weekly, and Security Weekly News. Whether you're a cybersecurity professional, business leader, or tech enthusiast, we cover all angles of the cybersecurity landscape. Tune in for in-depth panel discussions, expert guest interviews, and ...
  continue reading
 
Welcome to Ventev's podcast! Here you can listen to industry and subject matter experts share their knowledge and experiences around wireless network deployment, interoperability with leading network manufacturers, innovative solutions from Ventev, and much more. Hosted by master podcaster, Jonathan Davy, and industry expert, Jared VanAllen, in the United States, follow our podcast for the latest episodes twice a month!
  continue reading
 
Artwork

1
Iron Sysadmin Podcast

@IronSysadmin

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Iron Sysadmin is a podcast about being a sysadmin, with a healthy dose of paranoia. We talk about IT news, and have a tendancy toward information security, as it applies to Operations. Our hosts have decades of experience in the field, from desktop support, networking, architecture, network engineering, windows, linux, and even some industrial automation.
  continue reading
 
Take a class of Football 501 as Eric Allen and former Jets LB Bart Scott provide 360 coverage from 1 Jets Drive. Joined throughout the season by Jets players, coaches and personnel staffers plus NFL insiders, EA and the Madbacker go in-depth with big personalities and cover all the top stories. They’ll also review week’s action, get you prepared for what’s ahead for the Jets and take a trip around the NFL.
  continue reading
 
Artwork

1
CyberSecurity Summary

CyberSecurity Summary

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Daily+
 
CyberSecurity Summary is your go-to podcast for concise and insightful summaries of the latest and most influential books in the field of cybersecurity. Each episode delves into the core concepts, key takeaways, and practical applications of these books, providing you with the knowledge you need to stay ahead in the ever-evolving world of cybersecurity. Whether you’re a seasoned professional or just starting out, CyberSecurity Summary offers valuable insights and discussions to enhance your ...
  continue reading
 
Expert mode marketing technology, AI, and CX insights from top brands and Martech platforms fill every episode, focusing on what leaders need to know to build customer lifetime value and long-term business value. The Agile Brand with Greg Kihlström® features executives and thought leaders from top brands and tech platforms discussing the industry's trends, like AI adoption, first-party data strategies, artificial intelligence in the consumer journey, consumer data privacy, omnichannel custom ...
  continue reading
 
Artwork

1
Inside Outside

Brian Ardinger, Founder of NXXT, Inside Outside Innovation podcast, InsideOutside.io, and the Inside Outside Innovation Summit

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Inside Outside Innovation explores the ins and outs of innovation with raw stories, real insights, and tactical advice from the best and brightest in startups & corporate innovation. Each week we bring you the latest thinking on talent, technology, and the future of innovation. Join our community of movers, shakers, makers, founders, builders, and creators to help speed up your knowledge, skills, and network. Previous guests include thought leaders such as Brad Feld, Arlan Hamilton, Jason Ca ...
  continue reading
 
XenTegra podcasts are about VMware, Microsoft, Azure, IGEL, Nutanix, Ivanti, Google, PrinterLogic, Cisco, NVIDIA, ControlUp, Login VSI, and other key partners to make 'end-user computing' environments accessible from anywhere, securely with a single identity via VMware Workspace ONE. We make enterprise digital transformation a reality! XenTegra, we are the experts in digital workspace technologies and cloud infrastructure.
  continue reading
 
Artwork

1
The Drill Down

Cory Johnson

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly+
 
The Drill Down is a daily podcast focused on business fundamentals of the biggest stock movers of the market day, hosted by veteran financial journalist Cory Johnson. Through insightful interviews with CEOs and investors, meaningful research and in-depth analysis, The Drill Down provides a clearer picture of what’s really going on under the hood at publicly traded companies. This is business news for business people.
  continue reading
 
Artwork

1
Patent News Podcast

Coats + Bennett PLLC

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Patent News Podcast provides summaries of recent Federal Circuit decisions related to intellectual property law. Use your commute time rather than your time at your desk to catch up on the latest patent decisions.
  continue reading
 
Artwork

1
Vulnerable U

Matt Johansen

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Welcome to Vulnerable U, a podcast where we explore the intersection of vulnerability and cyber security. Each episode, we explore how vulnerability can drive growth and foster community resilience within our industry. Get ready for thought-provoking conversations, real-life stories, and curated news that inspire you to embrace discomfort on the road to a more vulnerable you.
  continue reading
 
Artwork

1
Breaking Down the Bytes

Pat Allen | Kyle Wolfe | Alex Battaglia

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
A podcast about beginning your journey in the vast world of I.T. Hosts Pat, Kyle and Alex talk about a variety of things to consider, look out for, and do as you navigate the world of I.T. They talk about everything from breaking into certifications to how to stay relevant in today's fast-changing world of I.T. Join them as they have guests from "all walks of I.T. life" on the show all while having a great time!
  continue reading
 
Loading …
show series
 
Just dropped: A new episode of Cisco SE Talks: Conversations on AI!Join us as we’re excited to feature Cisco's Dr. Gaurav Khanna, John Cuneo, and Justin Perry as we explore the latest AI trends, including the impact of agentic AI, LLM models, and the future of AI in Networking - demystifying how Cisco AI is driving innovation in the evolving landsc…
  continue reading
 
SANS Stormcast Tuesday, August 19th, 2025: MFA Bombing; Cisco Firewall Management Vuln; F5 Access for Android Vuln; Keeping an Eye on MFA Bombing Attacks Attackers will attempt to use authentication fatigue by “bombing” users with MFA authentication requests. Rob is talking in this diary about how to investigate these attacks in a Microsoft ecosyst…
  continue reading
 
This week we have, SonicWall, Confidential Informants Exposed, Cisco Vishing, Perplexity vs robots.txt, Microsoft’s Project Ire, Meta–Flo Jury Verdict, GPT‑5 Lands, TeaOnHer Data Leak, Josh Marpet, and more on the Security Weekly News.. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-…
  continue reading
 
Designed for both beginners and seasoned professionals in the field. It covers fundamental concepts such as IP addressing, network hardware, and basic security, building a solid foundation for new learners. The text then transitions to more advanced topics, including enterprise-level security, network automation, cloud integration, and disaster rec…
  continue reading
 
Provides an extensive overview of data science, encompassing its core concepts, methodologies, and practical applications within organizations. It explores the data analysis lifecycle, from problem definition and data sourcing to preparation, model selection, and evaluation. The text emphasizes the importance of understanding data properties, stati…
  continue reading
 
Airtel Router Scans and Mislabeled Usernames A quick summary of some odd usernames that show up in our honeypot logs https://isc.sans.edu/diary/Airtel%20Router%20Scans%2C%20and%20Mislabeled%20usernames/32216 Apple Patches 0-Day CVE-2025-43300 Apple released an update for iOS, iPadOS and MacOS today patching a single, already exploited, vulnerabilit…
  continue reading
 
SANS Stormcast Thursday, August 21st, 2025: Airtel Scans; Apple Patch; Microsoft Copilot Audit Log Issue; Password Manager Clickjacking Airtel Router Scans and Mislabeled Usernames A quick summary of some odd usernames that show up in our honeypot logs https://isc.sans.edu/diary/Airtel%20Router%20Scans%2C%20and%20Mislabeled%20usernames/32216 Apple …
  continue reading
 
The industry is obsessed with vulnerabilities. From vulnerability assessment to vulnerability management to exposure management and even zero days, we love to talk about vulnerabilities. But what about misconfiguration? By definition it's a vulnerability or weakness, but it doesn't have a CVE (common vulnerability enumeration). Should we ignore it?…
  continue reading
 
A comprehensive guide for programmers on leveraging artificial intelligence tools in their workflow. It explores various applications of AI in coding, from generating boilerplate code and CRUD operations using models like ChatGPT and GPT-4, to refactoring, debugging, and optimizing existing code with tools such as GitHub Copilot, Tabnine, and Repli…
  continue reading
 
A comprehensive overview of Cisco's CCNA 200-301 Certification examination, detailing its exam domains like Network Fundamentals, Network Access, IP Connectivity, IP Services, and Security Fundamentals, along with their respective percentage weights. It also includes multiple-choice questions with answers and explanations, covering a wide range of …
  continue reading
 
Is your brand ready to thrive, not just survive, in the face of evolving global consumer expectations and market shifts? Agility requires more than just quick reactions; it demands proactive foresight, strategic adaptability, and a willingness to embrace continuous evolution. This is particularly critical in today's ever-changing global ecommerce l…
  continue reading
 
Increased Elasticsearch Recognizance Scans Our honeypots noted an increase in reconnaissance scans for Elasticsearch. In particular, the endpoint /_cluster/settings is hit hard. https://isc.sans.edu/diary/Increased%20Elasticsearch%20Recognizance%20Scans/32212 Microsoft Patch Tuesday Issues Microsoft noted some issues deploying the most recent patch…
  continue reading
 
SANS Stormcast Wednesday, August 20th, 2025: Increased Elasticsearch Scans; MSFT Patch Issues Increased Elasticsearch Recognizance Scans Our honeypots noted an increase in reconnaissance scans for Elasticsearch. In particular, the endpoint /_cluster/settings is hit hard. https://isc.sans.edu/diary/Increased%20Elasticsearch%20Recognizance%20Scans/32…
  continue reading
 
On this week's episode of Inside Outside Innovation, we sit down with Radhika Dutt, author of the upcoming book Escaping the Performance Trap. Radhika and I talk about the challenges with traditional OKR systems and how companies can break free from the performance theater to create a better way to lead, align, and build what matters. Let's get sta…
  continue reading
 
The Drill Down: Palo Alto Networks Q4 Fiscal Year 2025 Earnings Analysis 💡 Beyond the numbers: Unpack Palo Alto Networks ($PANW) Q4 Fiscal Year 2025 performance with CEO Nikesh Arora. More than “beat” or “miss” – The Drill Down Earnings with Epistrophy Capital Research’s chief market strategist Cory Johnson. It’s the business news behind stocks on …
  continue reading
 
The Drill Down: Fabrinet Q4 Fiscal Year 2025 Earnings Analysis 💡 Beyond the numbers: Unpack Fabrinet ($FN) Q4 Fiscal Year 2025 performance with CEO Seamus Grady. More than “beat” or “miss” – The Drill Down Earnings with Epistrophy Capital Research’s chief market strategist Cory Johnson. It’s the business news behind stocks on the move, empowering r…
  continue reading
 
A smaller attack surface should lead to a smaller list of CVEs to track, which in turn should lead to a smaller set of vulns that you should care about. But in practice, keeping something like a container image small has a lot of challenges in terms of what should be considered minimal. Neil Carpenter shares advice and anecdotes on what it takes to…
  continue reading
 
A comprehensive guide to Cisco CCNA certification, focusing on both theoretical concepts and practical applications through a 60-day study program. The content covers a wide array of networking topics, including router and switch security, VLANs and trunking, IPv4 and IPv6 protocols, Access Control Lists (ACLs), Network Address Translation (NAT), a…
  continue reading
 
Provides an extensive overview of C++ memory management, covering both fundamental concepts and advanced techniques. It begins by explaining core ideas like objects, pointers, references, object lifetime, and the dangers of undefined behavior. The text then progresses to resource management using destructors and the RAII idiom, followed by a detail…
  continue reading
 
In this episode of Shift Happens, host Jeff Edwards sits down with Emma Carpenter, SVP of Recurring Revenue Acceleration at Cisco. From her global journey across Avaya, Palo Alto, and now Cisco, Emma shares how partners are the key to unlocking customer value in a recurring revenue world.They dive into:• Why transformation—not disruption—is the min…
  continue reading
 
Keeping an Eye on MFA Bombing Attacks Attackers will attempt to use authentication fatigue by bombing users with MFA authentication requests. Rob is talking in this diary about how to investigate these attacks in a Microsoft ecosystem. https://isc.sans.edu/diary/Keeping+an+Eye+on+MFABombing+Attacks/32208 Critical Cisco Secure Firewall Management Ce…
  continue reading
 
Take a Network Break! We start with critical vulnerabilities in Cisco Secure Firewall Management Center and Fortinet’s FortiSIEM. On the news front, SonicWall announces Gen8 firewalls plus a $200,000 warranty for customers that sign on to SonicWall’s Managed Protection Security Suite. IBM Cloud suffers its fourth major outage since May of this year…
  continue reading
 
Interview with Snehal Antani - Rethinking Risk-Based Vulnerability Management Vulnerability management is broken. Organizations basically use math to turn a crappy list into a slightly less crappy list, and the hardest part of the job as a CIO is deciding what NOT to fix. There has to be a better way, and there is... Segment Resources: https://hori…
  continue reading
 
A comprehensive guide to building scalable deep learning pipelines on AWS, focusing on practical implementation. It covers setting up the AWS environment, including EC2 instances and S3 buckets, and leveraging PySpark for data preprocessing. The text explores deep learning models for regression and classification tasks using PyTorch and TensorFlow,…
  continue reading
 
It covers the book's copyright, reproduction policies, and commitment to sustainable printing. The text also includes a detailed table of contents, breaking down the book into three parts: Foundations, Fundamental Algorithms and Patterns, and Quantum Solutions: Optimization and Beyond. Throughout the excerpts, key quantum computing concepts are int…
  continue reading
 
AI can create immersive, human-centric experiences that not only drive sales but also foster enduring brand relationships in a rapidly evolving market. Today we’re going to talk about how AI-driven personalization allows retailers to move beyond generic experiences, crafting unique interactions that resonate with individual preferences and behavior…
  continue reading
 
SNI5GECT: Sniffing and Injecting 5G Traffic Without Rogue Base Stations Researchers from the Singapore University of Technology and Design released a new framework, SNI5GECT, to passively sniff and inject traffic into 5G data streams, leading to DoS, downgrade and other attacks. https://isc.sans.edu/diary/SNI5GECT%3A%20Sniffing%20and%20Injecting%20…
  continue reading
 
SANS Stormcast Monday, August 18th, 2025: 5G Attack Framework; Plex Vulnerability; Fortiweb Exploit; Flowise Vuln SNI5GECT: Sniffing and Injecting 5G Traffic Without Rogue Base Stations Researchers from the Singapore University of Technology and Design released a new framework, SNI5GECT, to passively sniff and inject traffic into 5G data streams, l…
  continue reading
 
A comprehensive guide for IT professionals seeking to implement and manage Apache Kafka. It introduces fundamental concepts like messages, topics, and partitions, explaining how these components form Kafka's distributed architecture for scalability and fault tolerance. The book systematically covers operational aspects, including reliability throug…
  continue reading
 
A comprehensive guide to creating cross-platform command-line interface (CLI) applications using C# and the .NET framework. It starts by establishing a development environment and then covers fundamental concepts of console applications, which serve as the base for CLIs. The book progresses to advanced topics like parsing arguments, handling input/…
  continue reading
 
Trinity Capital’s Kyle Brown on Low Defaults and High Returns In Venture Debt Kyle Brown explains how Trinity delivered a 30% rise in NII—more than enough to cover the dividend—just as NAV reached $13.27 per share. He’ll discuss how disciplined credit, strategic origination, and SBIC licensing set the stage for diversified growth. #TheDrillDown #Tr…
  continue reading
 
Introduces agentic AI systems, which are AI systems that can reason, adapt, and act autonomously. It explores their foundational components, including generative AI models like VAEs and GANs, and discusses intelligent agent characteristics such as autonomy, learning, and reasoning. The book then details design principles, memory architectures, and …
  continue reading
 
A comprehensive guide to mastering Azure Bicep. It begins by introducing the fundamentals of JSON syntax and Azure Resource Manager (ARM) templates, providing a foundational understanding before transitioning to Bicep's declarative language. The book then explores advanced Bicep features such as parameters, variables, modules, conditional deploymen…
  continue reading
 
When we looked at outages from the first half of 2025, we saw distinct patterns in how distributed systems failed. Consistent with our ongoing outage analysis, our data revealed a rise in subtle functional failures and service degradations where symptoms often seem disconnected from their root causes.Tune in to hear more about our findings from 202…
  continue reading
 
When we looked at outages from the first half of 2025, we saw distinct patterns in how distributed systems failed. Consistent with our ongoing outage analysis, our data revealed a rise in subtle functional failures and service degradations where symptoms often seem disconnected from their root causes. Tune in to hear more about our findings from 20…
  continue reading
 
Loading …
Copyright 2025 | Privacy Policy | Terms of Service | | Copyright
Listen to this show while you explore
Play