A brief daily summary of what is important in information security. The podcast is published every weekday and designed to get you ready for the day with a brief, usually 5 minutes long summary of current network security related events. The content is late breaking, educational and based on listener input as well as on input received by the SANS Internet Storm Center. You may submit questions and comments via our contact form at https://isc.sans.edu/contact.html .
…
continue reading
Story
…
continue reading
Through following this course, students will gain a basic understanding of the principles behind network security and the working of the main protocols, mechanisms and techniques in the area of security. The course consists of three parts: security mechanisms within network protocols, systems security and lab sessions. In the first part (security mechanisms within network protocols), the following topics will be discussed: IPSec, SSH, SSL, HTTPS and security for wireless networks. The second ...
…
continue reading
Welcome to the Security Weekly Podcast Network, your all-in-one source for the latest in cybersecurity! This feed features a diverse lineup of shows, including Application Security Weekly, Business Security Weekly, Paul's Security Weekly, Enterprise Security Weekly, and Security Weekly News. Whether you're a cybersecurity professional, business leader, or tech enthusiast, we cover all angles of the cybersecurity landscape. Tune in for in-depth panel discussions, expert guest interviews, and ...
…
continue reading
Welcome to the Security Weekly Podcast Network, your all-in-one source for the latest in cybersecurity! This feed features a diverse lineup of shows, including Application Security Weekly, Business Security Weekly, Paul's Security Weekly, Enterprise Security Weekly, and Security Weekly News. Whether you're a cybersecurity professional, business leader, or tech enthusiast, we cover all angles of the cybersecurity landscape. Tune in for in-depth panel discussions, expert guest interviews, and ...
…
continue reading
…
continue reading
The Defence & Security Podcast Network hosts a unique series of podcasts, featuring discussions with key enablers from across the Australian defence and security industry. The podcasts provide the perfect blend of business intelligence and insights from a range of guests, which include government officials, ADF personnel, industry stakeholders, and members of the academic community. By aligning ourselves with the ADF and the Commonwealth government, we are uniquely placed to deliver a dynami ...
…
continue reading
An online network about educating, entertaining and encouraging your dance with Technology!
…
continue reading
1
Healthcare NOW Radio Podcast Network - Discussions on healthcare including technology, innovation, policy, data security, telehealth and more. Visit HealthcareNOWRadio.com
Healthcare NOW Radio and Podcast Network - Radio and Podcasts for the Healthcare Industry
RADIO FOR THE HEALTHCARE INDUSTRY Healthcare NOW Radio and Podcast Network offers discussions on the latest developments and trends impacting the industry including: health tech, health IT, healthcare innovation, healthcare policy, healthcare data security, telehealth, interoperability, biotech, med tech, value-based care, pharma, healthcare compliance, and much more. Shows are hosted by industry thought leaders. Guests are a "who's who" across the healthcare spectrum. The listening audience ...
…
continue reading
An online network about educating, entertaining and encouraging your dance with Technology!
…
continue reading
1
Transforming Frontline Workflows with Passwordless Access, AI costs, and the News - Joel Burleson-Davis - ESW #431
1:41:46
1:41:46
Відтворити пізніше
Відтворити пізніше
Списки
Подобається
Подобається
1:41:46Segment 1: Interview with Joel Burleson-Davis Frontline workers can’t afford to be slowed down by manual, repetitive logins, especially in mission-critical industries where both security and productivity are crucial. This segment will explore how inefficient login methods erode productivity, while workarounds like shared credentials increase risk, …
…
continue reading
1
SANS Stormcast Monday, November 3rd, 2025: Port 8530/8531 Scans; BADCANDY Webshells; Open VSX Security Improvements (#)
6:27
SANS Stormcast Monday, November 3rd, 2025: Port 8530/8531 Scans; BADCANDY Webshells; Open VSX Security Improvements Scans for WSUS: Port 8530/8531 TCP, CVE-2025-59287 We did observe an increase in scans for TCP ports 8530 and 8531. These ports are associated with WSUS and the scans are likely looking for servers vulnerable to CVE-2025-59287 https:/…
…
continue reading
1
CYBER UNCUT: OpenAI and mental health, government agencies caught up in hack, and a copyright win for Aussie musos
47:29
In this episode of the Cyber Uncut podcast, Daniel Croft and David Hollingworth talk about the latest AI news, the week in cyber crime, Tasmanian government breach woes, and Australia signing an important UN cyber crime treaty. The pair kick things off with some AI news, including OpenAI opening up about how many of its users talk about their menta…
…
continue reading
Episode 139 - Evolving Anesthesia Care Models: Leveraging CRNAs for Sustainable CoverageAcross the U.S., hospitals and surgical centers are facing a growing provider shortage—particularly among anesthesiologists. At the same time, demand for surgical and procedural services continues to rise, especially in ambulatory surgery centers (ASCs). This im…
…
continue reading
1
AI Cheating?, O, Canada, npms, passkeys, Exchange, Solaris, the amazing Rob Allen - Rob Allen - SWN #525
32:25
AI Cheating?, O, Canada, npms, passkeys, Exchange, Solaris, the amazing Rob Allen of Threatlocker, and More on this edition of the Security Weekly News. Segment Resources: Ingram Micro Working Through Ransomware Attack by SafePay Group | MSSP Alert: https://www.msspalert.com/news/ingram-micro-working-through-ransomware-attack-by-safepay-group This …
…
continue reading
On this episode Gil Bashe and Gregg Masters sit with Joseph Dustin, founder and principal of Dauntless E-Clinical Strategies and former Medidata executive. Dustin recounts his two-decade journey transforming clinical trials—from the dawn of electronic data capture to the age of AI-driven design—and reflects on lessons learned from the late Medidata…
…
continue reading
On this episode Justin records live at GAHIMSS in Atlanta. Stay tuned for the next few weeks to hear all his guests. This week Justin talks to Mike Mosquito, global thought leader and business influencer, and Matt Ethington, Co-Founder & CEO of ChronicCareIQ.To stream our Station live 24/7 visit www.HealthcareNOWRadio.com or ask your Smart Device t…
…
continue reading
1
AI Cheating?, O, Canada, npms, passkeys, Exchange, Solaris, the amazing Rob Allen - Rob Allen - SWN #525
32:25
AI Cheating?, O, Canada, npms, passkeys, Exchange, Solaris, the amazing Rob Allen of Threatlocker, and More on this edition of the Security Weekly News. Segment Resources: Ingram Micro Working Through Ransomware Attack by SafePay Group | MSSP Alert: https://www.msspalert.com/news/ingram-micro-working-through-ransomware-attack-by-safepay-group This …
…
continue reading
Host Matt Fisher talks to Angela Adams, CEO, Inflo Health, about background on scope of missed follow ups and procedural issues why; development of technology to support follow up process and engage all interested parties; effective means to drive deployment and adoption; understanding interconnected layers of issues within healthcare.To stream our…
…
continue reading
S1E3: The AI Trust Paradox: Enabling Innovation Without Exposing PatientsHosts Tamer Baker and Steven Hajny dive into the critical intersection of AI, healthcare, and security. From battling prompt injection attacks to fostering trust between clinical and security teams, learn how informed governance and advanced architecture build a safer future f…
…
continue reading
Beyond the Hype: How Ambient AI is Transforming Clinical Care with Dr. Tom Kelly of Heidi HealthJoin Megan Antonelli and Dr. Tom Kelly, co-founder of Heidi Health, as he brings a unique perspective to healthcare AI. He's a vascular surgery trainee turned founder who experienced firsthand the crushing administrative burden that keeps clinicians from…
…
continue reading
1
SANS Stormcast Friday, October 31st, 2025: Bug Bounty Headers; Exchange hardening; MOVEIt vulnerability (#)
6:20
SANS Stormcast Friday, October 31st, 2025: Bug Bounty Headers; Exchange hardening; MOVEIt vulnerability X-Request-Purpose: Identifying "research" and bug bounty related scans? Our honeypots captured a few requests with bug bounty specific headers. These headers are meant to make it easier to identify requests related to bug bounty, and they are sup…
…
continue reading
1
Cybersecurity Is Dead - PSW #898
2:03:55
2:03:55
Відтворити пізніше
Відтворити пізніше
Списки
Подобається
Подобається
2:03:55In the security news this week: Cybersecurity is dead, and AI killed it Exploiting the patching system Apple makes it easier for spyware Who is patching Cisco ASA? Shove that DMCA somewhere HTTPS - a requirement Russia wants to own all the exploits Abandonware challenges Reversing at its hardest with Lua Hacking team is back, and leetspeak malware …
…
continue reading
1
Cybersecurity Is Dead - PSW #898
2:03:55
2:03:55
Відтворити пізніше
Відтворити пізніше
Списки
Подобається
Подобається
2:03:55In the security news this week: Cybersecurity is dead, and AI killed it Exploiting the patching system Apple makes it easier for spyware Who is patching Cisco ASA? Shove that DMCA somewhere HTTPS - a requirement Russia wants to own all the exploits Abandonware challenges Reversing at its hardest with Lua Hacking team is back, and leetspeak malware …
…
continue reading
1
The Defence and Veterans' Service Commission launch and the long road ahead, with Isaac Ohlin
17:59
In this episode of the Defence Connect Podcast, host Bethany Alvaro speaks with Isaac Ohlin, general manager of policy and services at RSL NSW, about the establishment of the Defence and Veterans' Service Commission – launched on 29 September 2025 in response to the Royal Commission into Defence and Veteran Suicide (2021). The pair discuss the comm…
…
continue reading
1
SANS Stormcast Thursday, October 30th, 2025: Memory Only Filesystems Forensics; Azure Outage; docker-compose patch (#)
6:07
SANS Stormcast Thursday, October 30th, 2025: Memory Only Filesystems Forensics; Azure Outage; docker-compose patch How to Collect Memory-Only Filesystems on Linux Systems Getting forensically sound copies of memory-only file systems on Linux can be tricky, as tools like "dd" do not work. https://isc.sans.edu/diary/How%20to%20collect%20memory-only%2…
…
continue reading
1
Emergence of the Chief Trust Officer as CISOs Earn Business Respect and Agenda Shifts - Jeff Pollard - BSW #419
1:00:15
1:00:15
Відтворити пізніше
Відтворити пізніше
Списки
Подобається
Подобається
1:00:15Organizations that successfully earn and keep the trust of their customers, employees, and partners experience better business outcomes, more engagement, and competitive differentiation. But what does that trust look like and who's responsible for building and maintaining that trust? Jeff Pollard, Vice-President, Principal Analyst on the Security a…
…
continue reading
1
Emergence of the Chief Trust Officer as CISOs Earn Business Respect and Agenda Shifts - Jeff Pollard - BSW #419
1:00:15
1:00:15
Відтворити пізніше
Відтворити пізніше
Списки
Подобається
Подобається
1:00:15Organizations that successfully earn and keep the trust of their customers, employees, and partners experience better business outcomes, more engagement, and competitive differentiation. But what does that trust look like and who's responsible for building and maintaining that trust? Jeff Pollard, Vice-President, Principal Analyst on the Security a…
…
continue reading
Ever wondered what it takes to lead with resilience while balancing life, career and wellbeing? In this episode of The Progress Report, Tash Taylor sits down with Marisa Branscombe, head of marketing communication at Atturra, to talk about leadership, resilience, and the human side of managing teams in high-pressure environments. Marisa shares how …
…
continue reading
1
SANS Stormcast Wednesday, October 29th, 2025: Invisible Subject Character Phishing; Tomcat PUT Vuln; BIND9 Spoofing Vuln PoC (#)
8:05
SANS Stormcast Wednesday, October 29th, 2025: Invisible Subject Character Phishing; Tomcat PUT Vuln; BIND9 Spoofing Vuln PoC Phishing with Invisible Characters in the Subject Line Phishing emails use invisible UTF-8 encoded characters to break up keywords used to detect phishing (or spam). This is aided by mail clients not rendering some characters…
…
continue reading
On this episode of Voices of Self-Funding, host Ramesh Kumar welcomes Arun Santhebennur, Co-founder and CEO of Voicegain, to explore how voice AI is reshaping healthcare operations for TPAs, payers, and health plans. They tackle the tough truth that 95% of AI pilots fail, unpacking why — from hype and skill gaps to the “build vs. buy” dilemma and c…
…
continue reading
1
Lockpick chaos, CoPhish, Atlas, Turing, ForumTroll, PKD, Kilgore Trout, Aaran Leyland - SWN #524
34:35
Lockpicks, Microsoft, CoPhish, Atlas, Turing, ForumTroll, PKD, even Kilgore Trout, the Amazing Aaran Leyland, and more on the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-524
…
continue reading
1
Lockpick chaos, CoPhish, Atlas, Turing, ForumTroll, PKD, Kilgore Trout, Aaran Leyland - SWN #524
34:35
Lockpicks, Microsoft, CoPhish, Atlas, Turing, ForumTroll, PKD, even Kilgore Trout, the Amazing Aaran Leyland, and more on the Security Weekly News. Show Notes: https://securityweekly.com/swn-524
…
continue reading
1
Quantum Computing Isn't A Threat To Blockchains - Yet - Sandy Carielli, Martha Bennett - ASW #354
58:52
The post quantum encryption migration is going to be a challenge, but how much of a challenge? There are several reasons why it is different from every other protocol and cypher iteration in the past. Is today's hardware up to the task? Is it just swapping out a library, or is there more to it? What is the extent of software, systems, and architect…
…
continue reading
1
Quantum Computing Isn’t A Threat To Blockchains - Yet - Martha Bennett, Sandy Carielli - ASW #354
58:52
The post quantum encryption migration is going to be a challenge, but how much of a challenge? There are several reasons why it is different from every other protocol and cypher iteration in the past. Is today's hardware up to the task? Is it just swapping out a library, or is there more to it? What is the extent of software, systems, and architect…
…
continue reading
1
Quantum Computing Isn't A Threat To Blockchains - Yet - Martha Bennett, Sandy Carielli - ASW #354
58:52
The post quantum encryption migration is going to be a challenge, but how much of a challenge? There are several reasons why it is different from every other protocol and cypher iteration in the past. Is today's hardware up to the task? Is it just swapping out a library, or is there more to it? What is the extent of software, systems, and architect…
…
continue reading
1
SPOTLIGHT: The digital transformation reshaping the ADF, with Mark Gainsford and Matt Dodds, Systematic
38:12
In this episode of the Defence Connect Spotlight podcast, host Steve Kuper is joined by Mark Gainsford and Matt Dodds of Systematic to discuss the digital transformation shaping the Australian Defence Force. The trio also examine how, in an era of renewed great power competition, the ADF must adapt to warfare defined by data, speed and contested in…
…
continue reading
Smart PT Reverification Lessons From Mary Free BedOn this episode, hear from Mary Free Bed’s Daniel Heemstra on overcoming PT reverification challenges, supported by intelligent automation and Epic integration that simplify the process and reduce the burden on staff.Find all of our network podcasts on your favorite podcast platforms and be sure to …
…
continue reading
1
SANS Stormcast Tuesday, October 28th, 2025: Bytes over DNS; Unifi Access Vuln; OpenAI Atlas Prompt Injection (#)
6:17
SANS Stormcast Tuesday, October 28th, 2025: Bytes over DNS; Unifi Access Vuln; OpenAI Atlas Prompt Injection Bytes over DNS Didiear investigated which bytes may be transmitted as part of a hostname in DNS packets, depending on the client resolver and recursive resolver constraints https://isc.sans.edu/diary/Bytes%20over%20DNS/32420 Unifi Access Vul…
…
continue reading
1
Securing AI Agents with Dave Lewis, Enterprise News, and interviews from Oktane 2025 - Dave Lewis, Mike Poole, Conor Mulherin - ESW #430
1:39:12
1:39:12
Відтворити пізніше
Відтворити пізніше
Списки
Подобається
Подобається
1:39:12Segment 1: Interview with Dave Lewis from 1Password In this week's sponsored interview, we dive into the evolving security landscape around AI agents, where we stand with AI agent adoption. We also touch on topics such as securing credentials in browser workflows and why identity is foundational to AI agent security. 1Password Addresses a Critical …
…
continue reading
1
Securing AI Agents with Dave Lewis, Enterprise News, and interviews from Oktane 2025 - Mike Poole, Conor Mulherin, Dave Lewis - ESW #430
1:39:12
1:39:12
Відтворити пізніше
Відтворити пізніше
Списки
Подобається
Подобається
1:39:12Segment 1: Interview with Dave Lewis from 1Password In this week's sponsored interview, we dive into the evolving security landscape around AI agents, where we stand with AI agent adoption. We also touch on topics such as securing credentials in browser workflows and why identity is foundational to AI agent security. 1Password Addresses a Critical …
…
continue reading
1
SPOTLIGHT: HIMARS, the littoral and maritime strike, with Josh Woodward and Wayne Harrison, Lockheed Martin
35:59
In this episode of the Defence Connect Spotlight podcast, special returning host Liam Garman is joined by Lockheed Martin's Josh Woodward and Wayne Harrison to discuss the transformational impact of the High Mobility Artillery Rocket System for the Australian Defence Force. The trio discuss the range of ways HIMARS will serve as a significant trans…
…
continue reading
1
CYBER UNCUT: Wikipedia's AI woes, Tassie NFP hit by ransomware, and Bryan Cranston strikes back
44:40
In this episode of the Cyber Uncut podcast, Daniel Croft and David Hollingworth talk about the latest AI news, the week in cyber crime, an important Aussie merger, and how a Hollywood actor is reclaiming his identity. The pair kick things off with some AI news, including Wikipedia woes, OpenAI's Atlas, and Yelp's new AI travel offering. Hollingwort…
…
continue reading
SANS Stormcast Monday, October 27th, 2025: Bilingual Phishing; Kaitai Struct WebIDE Bilingual Phishing for Cloud Credentials Guy observed identical phishing messages in French and English attempting to phish cloud credentials https://isc.sans.edu/diary/Phishing%20Cloud%20Account%20for%20Information/32416 Kaitai Struct WebIDE The binary file analysi…
…
continue reading
On this episode Justin records live at GAHIMSS in Atlanta. Stay tuned for the next few weeks to hear all his guests. This week Justin Barnes talks to Chris Paravate, CIO, Northeast Georgia Health System and Geoffrey Brown, CIO of Piedmont Healthcare (Retired).To stream our Station live 24/7 visit www.HealthcareNOWRadio.com or ask your Smart Device …
…
continue reading
S3E12: What's Trending NOW is "how healthcare organizations are evolving their data security strategies in the age of AI without compromising innovation.On this episode Shahid is joined by Dr. Mark Boxer, Board Chair for P-n-T Data Corp., a company that delivers secure, scalable, and intelligent data sharing solutions that help healthcare organizat…
…
continue reading
Meet Chris Caramanico the CEO of Elligint Health, a company formed by the merger of Health EC and Virtual Health. Host Fred Goldstein discusses with Chris bringing together VirtualHealth’s award-winning medical management platform, HELIOS®, with HealthEC’s industry-leading population health analytics, Elligint Health delivers precision-driven, inte…
…
continue reading
CIO Report: Clinical Data Migration Challenges and Best Practice AdviceOn this episode, host Beth Friedman sits down with Darin Ryder, Senior Vice President at e4health and former IT executive at UF Health, Brookmeade Healthcare, and several national consulting firms. Recorded live at the Georgia HIMSS Annual Conference, their conversation centers …
…
continue reading
Hosts Colin Hung and John Lynn discuss Healthcare Startups and Founders.To stream our Station live 24/7 visit www.HealthcareNOWRadio.com or ask your Smart Device to “….Play Healthcare NOW Radio”.Find all of our network podcasts on your favorite podcast platforms and be sure to subscribe and like us. Learn more at www.healthcarenowradio.com/listen…
…
continue reading