CyberSecurity Summary is your go-to podcast for concise and insightful summaries of the latest and most influential books in the field of cybersecurity. Each episode delves into the core concepts, key takeaways, and practical applications of these books, providing you with the knowledge you need to stay ahead in the ever-evolving world of cybersecurity. Whether you’re a seasoned professional or just starting out, CyberSecurity Summary offers valuable insights and discussions to enhance your ...
…
continue reading
CyberSecurity Summary Podcasts
Saving you valuable time by providing the "Too Long Didn't Read" summary of Cyber Security topics and news.
…
continue reading
Surprising insights into IT, security and the future of work – and what they mean for your business strategy. Join host and former Ivanti CEO Jeff Abbott and a rotating cast of global executives and thought leaders as they unpack Ivanti's latest research and share their own perspectives and experiences.
…
continue reading
A short summary of the latest cyber security news and trends, from the perspective of business leaders and owners. Hosts Trish and Tom provide plain English explanations along with practical advice to keep your business safe and secure from cyber crime and disruption. For cyber security help and advice, speak to Cool Waters Cyber: www.cool-waters.co.uk
…
continue reading
We started Tech Gumbo in Nov 2014 as a conversational show of news, information & updates about the past, present & future of all things technology in a topical, interesting and digestible way.
…
continue reading
Welcome to Best Book Breakdown, the podcast that breaks down the bestseller books you need to read! If you love the idea of reading all the latest bestsellers but simply don't have the time, then this podcast is perfect for you. Each episode, we'll provide you with a comprehensive summary of a popular book that has made it onto the bestseller lists. We'll cover everything from plot and character development to key themes and takeaways, giving you all the information you need to know in a con ...
…
continue reading
In a world where technology and cybersecurity are constantly evolving, staying ahead of the curve is no longer just an option—it's a necessity. Prime Cyber Insights plunges you into the fast-paced universe of tech and cybersecurity, where the stakes are high, and the pace is relentless. Hosted by Niko Pulse and Kyra Pixel, this daily podcast is your essential guide to navigating the ever-changing landscape of technology and cybersecurity. From AI breakthroughs to the latest in cyber threats, ...
…
continue reading

1
Cisco ThousandEyes: Digital Experience Monitoring and Troubleshooting (Networking Technology)
14:25
14:25
Play later
Play later
Lists
Like
Liked
14:25A comprehensive guide for IT professionals on utilizing the Cisco ThousandEyes platform. The book covers deploying and configuring various ThousandEyes agents like Enterprise, Cloud, and Endpoint agents, and details different test types for network, DNS, and web layers, including sophisticated Transaction tests. It also explores alerting mechanisms…
…
continue reading

1
CompTIA A+ Complete Practice Tests: Core 1 Exam 220-1201 and Core 2 Exam 220-1202 (Sybex Study Guide)
19:24
19:24
Play later
Play later
Lists
Like
Liked
19:24A comprehensive guide to CompTIA A+ certification, focusing on hardware, networking, operating systems, and security. It details various display technologies like LCD, IPS, and OLED, along with connectivity standards such as USB-C and Thunderbolt. The text also covers printer types, maintenance, and common troubleshooting steps for issues ranging f…
…
continue reading

1
Toilet TikTok Risks, Taco Bell AI Fumbles, Smart Home Futures, Students Embrace AI, Powerball Scandal, Gmail Security Confusion
22:06
22:06
Play later
Play later
Lists
Like
Liked
22:06News and Updates: A Boston medical study found smartphone use on the toilet raises hemorrhoid risk by 46%. Phone users stayed seated far longer — often 6–15 minutes — amplifying pressure that leads to painful swelling. While causation wasn’t proven, doctors warn the habit may be fueling the condition. Taco Bell is rethinking AI drive-thrus after vi…
…
continue reading

1
Certified Kubernetes Administrator Study Companion : Preparing for the Linux Foundation's CKA Exam
13:35
13:35
Play later
Play later
Lists
Like
Liked
13:35A study companion for the Certified Kubernetes Administrator (CKA) exam, offering comprehensive guidance for professionals aiming to master Kubernetes. It covers fundamental concepts, architecture, and installation using tools like KinD and Kubeadm, progressing to advanced topics such as workloads, scheduling, storage, networking, and security. The…
…
continue reading

1
Exploring Azure Container Apps: Scaling Modern and Cloud-Native Apps and Microservices
19:43
19:43
Play later
Play later
Lists
Like
Liked
19:43A comprehensive guide for developers by Naga Santhosh Reddy Vootukuri, Taiseer Joudeh, and Wael Kdouh, with technical review by Tommaso Stocchi. It details the Azure Container Apps (ACA) platform, comparing it to other Azure services like App Services and Kubernetes Service (AKS), and covers deploying containerized applications. The text also expla…
…
continue reading

1
Pentesting Industrial Control Systems: An ethical hacker's guide to analyzing, compromising, mitigating, and securing industrial processes
28:29
28:29
Play later
Play later
Lists
Like
Liked
28:29An ethical hacker's guide to the unique challenges of analyzing, compromising, mitigating, and securing industrial processes. It offers a practical, hands-on approach to understanding and exploiting vulnerabilities in industrial control systems (ICS) and operational technology (OT) environments. The text covers setting up a virtual lab, open-source…
…
continue reading

1
Azure for Developers: The definitive guide to creating secure, scalable Azure apps with GenAI, serverless, and DevOps pipelines
20:32
20:32
Play later
Play later
Lists
Like
Liked
20:32A comprehensive guide for creating secure and scalable applications on Microsoft Azure. It covers a wide array of topics crucial for modern development, including integrating Generative AI, leveraging serverless architectures, and implementing robust DevOps pipelines. The book instructs readers on setting up their development environment, managing …
…
continue reading
A comprehensive academic text authored by Dr. Ramchandra Sharad Mangrulkar and Dr. Pallavi Vijay Chavan, with a technical review by Dr. Parikshit. The book serves as a guide for students and professionals seeking to enhance their understanding of predictive analytics. It explores core concepts, tools, and implementations across several key areas, i…
…
continue reading
It argues that while AI tools can handle approximately 70% of coding tasks, such as boilerplate and routine functions, the remaining 30% requires crucial human expertise. The text categorizes AI usage into "bootstrapper" and "iterator" patterns, highlighting common pitfalls like the "70% problem" and the "demo-quality trap" when human oversight is …
…
continue reading

1
Computer Literacy I 2025, UK Ransomware Ban Plans, Cybersecurity Concierges, Windows 10’s $7B Price Tag
22:05
22:05
Play later
Play later
Lists
Like
Liked
22:05News and Updates: In 2025, “computer literacy” means more than navigating systems — it’s about collaborating with AI, exercising critical thinking, and adapting to rapid change. While most job postings still only ask for basic skills, AI fluency is emerging as the new digital divide. Experts warn that overreliance on tools like ChatGPT risks erodin…
…
continue reading

1
Quantum Programming in Depth: Solving problems with Q# and Qiskit
18:28
18:28
Play later
Play later
Lists
Like
Liked
18:28A practical guide for programmers transitioning from quantum computing theory to application. It teaches readers to design, implement, and evaluate quantum algorithms using hands-on, project-based challenges. The text covers fundamental quantum concepts like state preparation, measurement, and unitary operations, demonstrating their application wit…
…
continue reading

1
MCA Modern Desktop Administrator Complete Study Guide: Exam MD-100 and Exam MD-101
21:22
21:22
Play later
Play later
Lists
Like
Liked
21:22Offers comprehensive information for managing Windows 10 environments. Chapters 1-6 cover fundamental aspects like installation, user and group account management, file and folder security, and network connectivity, including detailed explanations of Active Directory and TCP/IP. Later chapters, 7-13, shift focus to system maintenance, security, and…
…
continue reading

1
Learn Functional Programming with Elixir: New Foundations for a New World (The Pragmatic Programmers)
31:02
31:02
Play later
Play later
Lists
Like
Liked
31:02Provides an in-depth look at functional programming principles, specifically using the Elixir language. It functions as a learning guide, explaining core concepts such as immutability, pure functions, pattern matching, recursion, and higher-order functions, while also addressing practical application design, error handling strategies (including try…
…
continue reading

1
Ultimate Machine Learning with ML.NET: Build, Optimize, and Deploy Powerful Machine Learning Models for Data-Driven Insights with ML.NET
22:44
22:44
Play later
Play later
Lists
Like
Liked
22:44This comprehensive guide, "Ultimate Machine Learning with ML.NET," authored by Kalicharan Mahasivabhattu and Deepti Bandi and published by Orange Education Pvt Ltd, offers a thorough exploration of ML.NET. The book covers foundational machine learning concepts and terminology, detailing the framework's features, benefits, and applications across va…
…
continue reading
Outlines best practices for designing, documenting, and managing Web APIs, with a strong emphasis on RESTful principles and the use of OpenAPI (formerly Swagger) and JSON Schema. It covers fundamental concepts like resources, HTTP methods, and status codes, while also addressing crucial considerations such as security, efficiency, and user-friendli…
…
continue reading

1
The Art of AI Product Development: Delivering business value
21:52
21:52
Play later
Play later
Lists
Like
Liked
21:52A comprehensive guide for anyone involved in creating, designing, or marketing AI products. It covers the entire lifecycle of AI product development, from identifying and prioritizing AI opportunities and exploring various AI approaches like predictive AI, language models, and agentic AI, to designing user experiences that manage AI's inherent unce…
…
continue reading

1
Encyclopedia of Criminal Activities and the Deep Web
24:01
24:01
Play later
Play later
Lists
Like
Liked
24:01Explore the multifaceted landscape of cybercrime, ranging from its definitions and various forms like malware, phishing, cyberbullying, and identity theft, to its impact on individuals, organizations, and national security. They discuss the technical aspects of cyberattacks, including how they are perpetrated and the role of technologies like AI an…
…
continue reading

1
Practical Object-Oriented Design: An Agile Primer Using Ruby
21:55
21:55
Play later
Play later
Lists
Like
Liked
21:55Explores practical object-oriented design (OOD), particularly within the context of Ruby programming, offering guidance for creating changeable and maintainable software. It covers fundamental principles such as single responsibility, managing dependencies, and designing flexible interfaces, emphasizing the importance of messages over classes and t…
…
continue reading

1
Cybersecurity Ops with bash: Attack, Defend, and Analyze from the Command Line
25:00
25:00
Play later
Play later
Lists
Like
Liked
25:00Focuses on utilizing the bash command line for cybersecurity tasks. It covers a broad range of topics, from foundational bash primer concepts like variables, regular expressions, and command-line basics to advanced cybersecurity applications. The book details data collection, processing, and analysis techniques, including log monitoring, file syste…
…
continue reading

1
Digital Forensics with Kali Linux: Perform data acquisition, data recovery, network forensics, and malware analysis with Kali Linux 2019.x
16:16
16:16
Play later
Play later
Lists
Like
Liked
16:16Focusing on digital forensic methodologies and tools. It covers a wide range of topics essential for investigators and cybersecurity professionals, including incident response, evidence acquisition and preservation, and the analysis of various digital artifacts. The text details the installation and practical application of Kali Linux for forensic …
…
continue reading

1
Countdown to Zero Day: Stuxnet and the Launch of the World's First Digital Weapon
14:29
14:29
Play later
Play later
Lists
Like
Liked
14:29Details the discovery and analysis of the Stuxnet malware, emphasizing its sophisticated design for sabotaging industrial control systems, particularly Siemens PLCs. It explores the history of cyberattacks against critical infrastructure, including early incidents like the Maroochy Shire sewage system hack, and examines vulnerabilities inherent in …
…
continue reading

1
Cybersecurity Incident Response: How to Contain, Eradicate, and Recover from Incidents
16:24
16:24
Play later
Play later
Lists
Like
Liked
16:24A comprehensive approach to cybersecurity incident response, emphasizing the importance of a well-structured program and continuous improvement. It explores leadership qualities essential for effective teams, such as humility and decisiveness, and details how to organize and staff an incident response capability, including various team models and o…
…
continue reading

1
Computer Science Distilled: Learn the Art of Solving Computational Problems (Code is Awesome)
26:29
26:29
Play later
Play later
Lists
Like
Liked
26:29A comprehensive educational text designed to introduce readers to the fundamental concepts of computer science. It covers a broad spectrum of topics essential for understanding computational problem-solving, starting with basic mathematical and logical principles such as counting, probability, and Boolean algebra, which are crucial for modeling pro…
…
continue reading

1
Complete A+ Guide to IT Hardware and Software Lab Manual: A CompTIA A+ Core 1 (220-1001) & CompTIA A+ Core 2 (220-1002) Lab Manual
19:07
19:07
Play later
Play later
Lists
Like
Liked
19:07Provides extensive practical exercises for IT hardware and software, focusing on CompTIA A+ Core certification topics. It includes detailed step-by-step laboratories covering various Windows operating systems (7, 8/8.1, 10), from basic usage and configuration to advanced tasks like managing memory, storage, and networking. The material also introdu…
…
continue reading

1
CCNP and CCIE Data Center Core DCCOR 350-601 Official Cert Guide
14:53
14:53
Play later
Play later
Lists
Like
Liked
14:53A comprehensive guide for IT professionals preparing for Cisco's CCNP and CCIE Data Center Core (DCCOR 350-601) certification exam. It covers a wide array of data center technologies, including detailed explanations of networking protocols like OSPF and BGP, storage solutions such as Fibre Channel and FCoE, and virtualization concepts like VXLAN an…
…
continue reading

1
Understanding Cisco Networking Technologies, Volume 1: Exam 200-301 (CCNA Certification, 1)
19:54
19:54
Play later
Play later
Lists
Like
Liked
19:54Serves as a preparation resource for the CCNA certification. The material covers fundamental networking concepts, including Ethernet networking, data encapsulation, and the OSI and DoD models. It provides detailed explanations of TCP/IP, IP addressing, and subnetting, as well as practical guidance on configuring and troubleshooting Cisco devices us…
…
continue reading

1
Zabbix 7 IT Infrastructure Monitoring Cookbook: Explore the new features of Zabbix 7 for designing, building, and maintaining your Zabbix
18:29
18:29
Play later
Play later
Lists
Like
Liked
18:29Serves as a comprehensive guide for IT professionals aiming to design, build, and maintain Zabbix setups. It covers a wide array of topics, from initial Zabbix server and frontend installation to advanced monitoring techniques for various systems like Linux, Windows, databases, and cloud environments (AWS, Azure, Docker). The text emphasizes practi…
…
continue reading

1
Windows Server 2025 Administration Fundamentals: A beginner's guide to managing and administering Windows Server environments
19:43
19:43
Play later
Play later
Lists
Like
Liked
19:43Provides a comprehensive guide to Windows Server 2025, covering everything from initial setup and configuration to advanced management and security features. It explores core networking concepts, storage solutions, Active Directory Domain Services (AD DS) enhancements, and security protocols like SMB over QUIC and TLS. The text also details virtual…
…
continue reading
Offers comprehensive guidance on establishing and operating an effective cybersecurity program. It addresses various facets of cybersecurity, including understanding cyber threats and attackers, implementing cyber risk management, and deploying robust cyber defenses. The text also examines the organizational aspects of cybersecurity, such as progra…
…
continue reading

1
Wi-Fi 7 In Depth: Your guide to mastering Wi-Fi 7, the 802.11be protocol, and their deployment
19:40
19:40
Play later
Play later
Lists
Like
Liked
19:40Provides an extensive guide to Wi-Fi 7 (802.11be protocol), detailing its technical aspects and deployment strategies. It covers the evolution of Wi-Fi standards, including physical layer enhancements like 320 MHz bandwidth and multi-link operation, and discusses critical aspects such as security, quality of service (QoS), and roaming. The text als…
…
continue reading

1
Blockchain Enabled Applications: Understand the Blockchain Ecosystem and How to Make it Work for You
19:42
19:42
Play later
Play later
Lists
Like
Liked
19:42Explores the foundations and diverse applications of blockchain technology. It begins by contextualizing blockchain's emergence in the wake of the 2008 financial crisis and details the Bitcoin protocol, including mining, transaction processes, and forks. The book then expands to Ethereum, covering its virtual machine, smart contracts, and scalabili…
…
continue reading

1
Azure Strategy and Implementation Guide: The essential handbook to cloud transformation with Azure
22:59
22:59
Play later
Play later
Lists
Like
Liked
22:59Offers an in-depth exploration of cloud transformation using Microsoft Azure. It covers essential topics such as implementing hybrid and multicloud strategies with services like Azure Arc and Azure Stack, planning and executing cloud migrations, and optimizing costs within the Azure ecosystem. Readers will gain understanding in securing remote work…
…
continue reading

1
Waymo Robotaxis In NYC, IRS EV Credit Deadline, Melania’s AI Push, Datacenter Water Wars, Google’s Gemini Energy Use
21:58
21:58
Play later
Play later
Lists
Like
Liked
21:58News and Updates: Waymo begins robotaxi testing in New York City, deploying up to eight vehicles in Manhattan and Brooklyn with safety drivers until Sept. 2025. While Alphabet hails it as a milestone, critics like former mayor Bill de Blasio and union leaders slam the move as unsafe and job-killing. DOT insists safety rules will keep pedestrians pr…
…
continue reading

1
AWS Certified Advanced Networking - Specialty Exam Guide: Build your knowledge and technical expertise as an AWS-certified networking
27:09
27:09
Play later
Play later
Lists
Like
Liked
27:09Serves as an exam guide for the AWS Certified Advanced Networking - Specialty exam, focusing on the networking components and services within the Amazon Web Services (AWS) cloud. It explores fundamental AWS networking concepts like Virtual Private Clouds (VPCs), subnets, gateways, and load balancing, alongside advanced topics such as securing traff…
…
continue reading

1
Authentication and Access Control: Practical Cryptography Methods and Tools
30:55
30:55
Play later
Play later
Lists
Like
Liked
30:55Serves as a comprehensive guide to understanding and implementing secure authentication mechanisms. It begins by introducing fundamental cryptographic principles, including symmetric and asymmetric encryption, hash functions, and digital signatures, highlighting their role in ensuring data confidentiality and integrity. The text then explores Publi…
…
continue reading

1
Active Directory Administration Cookbook: Actionable, proven solutions to identity management and authentication on servers and in the cloud
20:39
20:39
Play later
Play later
Lists
Like
Liked
20:39Provides an in-depth guide to Active Directory administration, covering a wide array of practical "recipes" for managing both on-premises and Azure Active Directory environments. It details fundamental Active Directory concepts like optimizing forests, domains, and trusts, and offers step-by-step instructions for tasks such as deploying and demotin…
…
continue reading

1
Vulkan 3D Graphics Rendering Cookbook: Implement expert-level techniques for high-performance graphics with Vulkan
18:50
18:50
Play later
Play later
Lists
Like
Liked
18:50A rendering lead at Meta and Ubisoft RedLynx, and other industry experts, serves as a handbook for modern real-time rendering using Vulkan. The book systematically covers Vulkan development, starting with environment setup and core concepts, and progresses to advanced rendering techniques. Readers will learn about physically based rendering (PBR), …
…
continue reading
Serves as the definitive resource for mastering the Ghidra platform, a powerful open-source tool developed by the NSA for reverse engineering. The book covers a vast array of Ghidra's functionalities, from its user interface and window management, including the Listing, Decompiler, and Function Graph windows, to advanced topics like scripting, exte…
…
continue reading

1
The Ultimate iOS Interview Playbook: Conquer Swift, frameworks, design patterns, and app architecture for your dream job
18:02
18:02
Play later
Play later
Lists
Like
Liked
18:02A comprehensive guide aimed at helping iOS developers succeed in job interviews. The book covers a wide array of topics crucial for iOS development roles, ranging from developer branding and resume building to mastering advanced Swift language features, data structures, and algorithms. It also explores managing code, debugging techniques, and vario…
…
continue reading

1
Windows 12 AI Future, Excel Copilot Backlash, Intel’s $10B Deal with US
22:14
22:14
Play later
Play later
Lists
Like
Liked
22:14News and Updates: Microsoft’s Windows chief Pavan Davuluri says the next version of Windows—possibly Windows 12—will be an “ambient, multi-modal” OS powered by AI. Voice will become a primary input alongside keyboard and mouse, with context-aware features that understand what’s on your screen. Microsoft calls it an “agentic AI” future, blending loc…
…
continue reading

1
systemd for Linux SysAdmins: All You Need to Know About the systemd Suite for Linux Users
24:23
24:23
Play later
Play later
Lists
Like
Liked
24:23Provides an in-depth guide for Linux system administrators on managing their systems using the systemd suite of tools. Authored by David Both and technically reviewed by Seth Kenlon, the publication, copyrighted 2025 by David Both, offers extensive information on systemd's functionalities, from boot and startup sequences to resource management and …
…
continue reading

1
Red Hat Certified Engineer (RHCE) Ansible Automation Study Guide: In-Depth Guidance and Practice
24:34
24:34
Play later
Play later
Lists
Like
Liked
24:34Prepares individuals for the Red Hat Certified Engineer (RHCE) Ansible Automation (EX294) exam. The book explores Ansible's core functionalities, covering everything from installation and configuration to advanced topics like playbook creation, task automation, and error handling. Readers will also learn about managing files, developing custom modu…
…
continue reading

1
Advanced Front-End Development: Building Scalable and High-Performance Web Applications with React
9:27
9:27
Play later
Play later
Lists
Like
Liked
9:27A comprehensive guide to modern React development. The book covers fundamental concepts such as components, props, and state, alongside crucial aspects like JSX and element rendering, event handling, and managing lists and keys. It also addresses advanced topics including styling techniques, component lifecycle methods and hooks, state management w…
…
continue reading
A comprehensive guide to secure software development. It covers fundamental security concepts like authentication, authorization, and data protection, emphasizing proactive measures throughout the software development lifecycle. The text also explores common vulnerabilities such as injection and memory issues, provides language-specific best practi…
…
continue reading

1
Zero Trust in Resilient Cloud and Network Architectures (Networking Technology)
26:15
26:15
Play later
Play later
Lists
Like
Liked
26:15Offers an in-depth look at implementing zero trust architectures in modern IT environments, encompassing on-premises, cloud, and hybrid infrastructures. It covers various aspects, including network automation, secure development lifecycles, and advanced security concepts like AI/ML-driven threat detection and quantum-safe cryptography. The text emp…
…
continue reading

1
Learn Ethical Hacking from Scratch: Your stepping stone to penetration testing
1:03:40
1:03:40
Play later
Play later
Lists
Like
Liked
1:03:40A comprehensive guide to ethical hacking. It covers a wide array of topics, beginning with setting up a lab environment using VirtualBox and Kali Linux, then progressing through network penetration testing, gaining access to computer devices via server-side and client-side attacks, and post-exploitation techniques. The text also explores man-in-the…
…
continue reading

1
Wireless Hacking with Kali Linux: LEARN FAST HOW TO HACK ANY WIRELESS NETWORKS PENETRATION TESTING IMPLEMENTATION GUIDE
26:32
26:32
Play later
Play later
Lists
Like
Liked
26:32A comprehensive guide for aspiring IT security professionals interested in wireless penetration testing. It covers various wireless attack methodologies, including password attacks, man-in-the-middle attacks, and denial-of-service attacks, often utilizing tools like Kali Linux and Wireshark. The text also provides essential information on counterme…
…
continue reading

1
Wireless Communication in Underground Mines: RFID-based Sensor Networking
22:27
22:27
Play later
Play later
Lists
Like
Liked
22:27Explores the critical need for robust communication and safety systems in underground mining environments. It investigates various wireless and wired communication technologies, such as RFID, ZigBee, Wi-Fi, carrier current, leaky feeder systems, and through-the-earth communication, detailing their principles, applications, and limitations within mi…
…
continue reading

1
Google’s AI Summaries Hit Publishers, CA Police AI Disclosure Bill, Claude Walks Away, Meta’s Deadly Flirty Bot, Gemini’s Self-Loathing Spiral
22:10
22:10
Play later
Play later
Lists
Like
Liked
22:10News and Updates: Digital publishers are losing traffic as Google’s AI Summaries siphon clicks. A survey from Digital Content Next found median referral traffic from Google Search down 10% year-over-year in May and June, with some outlets seeing drops of 25%. Pew data shows only 8% of users click links when AI Overviews appear vs. 15% with standard…
…
continue reading

1
Windows PowerShell Cookbook: The Complete Guide to Scripting Microsoft's Command Shell
18:04
18:04
Play later
Play later
Lists
Like
Liked
18:04A comprehensive guide for interacting with and automating tasks within the PowerShell environment. It offers practical "recipes" and solutions for a wide array of administrative challenges, ranging from "The Windows PowerShell Interactive Shell" and "Variables and Objects" to "Files and Directories," "Remoting," and "Workflows." The book covers fun…
…
continue reading