A brief daily summary of what is important in information security. The podcast is published every weekday and designed to get you ready for the day with a brief, usually 5 minutes long summary of current network security related events. The content is late breaking, educational and based on listener input as well as on input received by the SANS Internet Storm Center. You may submit questions and comments via our contact form at https://isc.sans.edu/contact.html .
…
continue reading
Through following this course, students will gain a basic understanding of the principles behind network security and the working of the main protocols, mechanisms and techniques in the area of security. The course consists of three parts: security mechanisms within network protocols, systems security and lab sessions. In the first part (security mechanisms within network protocols), the following topics will be discussed: IPSec, SSH, SSL, HTTPS and security for wireless networks. The second ...
…
continue reading
Welcome to the Security Weekly Podcast Network, your all-in-one source for the latest in cybersecurity! This feed features a diverse lineup of shows, including Application Security Weekly, Business Security Weekly, Paul's Security Weekly, Enterprise Security Weekly, and Security Weekly News. Whether you're a cybersecurity professional, business leader, or tech enthusiast, we cover all angles of the cybersecurity landscape. Tune in for in-depth panel discussions, expert guest interviews, and ...
…
continue reading
Welcome to the Security Weekly Podcast Network, your all-in-one source for the latest in cybersecurity! This feed features a diverse lineup of shows, including Application Security Weekly, Business Security Weekly, Paul's Security Weekly, Enterprise Security Weekly, and Security Weekly News. Whether you're a cybersecurity professional, business leader, or tech enthusiast, we cover all angles of the cybersecurity landscape. Tune in for in-depth panel discussions, expert guest interviews, and ...
…
continue reading
…
continue reading
An online network about educating, entertaining and encouraging your dance with Technology!
…
continue reading
1
Healthcare NOW Radio Podcast Network - Discussions on healthcare including technology, innovation, policy, data security, telehealth and more. Visit HealthcareNOWRadio.com
Healthcare NOW Radio and Podcast Network - Radio and Podcasts for the Healthcare Industry
RADIO FOR THE HEALTHCARE INDUSTRY Healthcare NOW Radio and Podcast Network offers discussions on the latest developments and trends impacting the industry including: health tech, health IT, healthcare innovation, healthcare policy, healthcare data security, telehealth, interoperability, biotech, med tech, value-based care, pharma, healthcare compliance, and much more. Shows are hosted by industry thought leaders. Guests are a "who's who" across the healthcare spectrum. The listening audience ...
…
continue reading
An online network about educating, entertaining and encouraging your dance with Technology!
…
continue reading
1
SANS ISC Stormcast, Jan 27, 2025: Access Brokers; Llama Stack Vuln; ESXi SSH Tunnels; Zyxel Boot Loops; Subary StarLeak (#)
6:29
SANS ISC Stormcast, Jan 27, 2025: Access Brokers; Llama Stack Vuln; ESXi SSH Tunnels; Zyxel Boot Loops; Subary StarLeak Guest Diary: How Access Brokers Maintain Persistence Explore how cybercriminals utilize access brokers to persist within networks and the impact this has on organizational security. https://isc.sans.edu/forums/diary/Guest+Diary+Ho…
…
continue reading
HackerOne's co-founder, Michiel Prins walks us through the latest new offensive security service: AI red teaming. At the same time enterprises are globally trying to figure out how to QA and red team generative AI models like LLMs, early adopters are challenged to scale these tests. Crowdsourced bug bounty platforms are a natural place to turn for …
…
continue reading
Healthcare providers will continue to move toward value-based care, fostering a more equitable healthcare system that enhances accessibility, quality, affordability, and innovation. On this episode Dan sits down with Lumina’s Managing Partner, Lucy Zielinski, to explore the healthcare trends of 2025, the effects of new regulatory changes, and the p…
…
continue reading
1
Cursive Funk, Microsoft, Ivanti, Sonic Wall, Exchange, PowerSchool, Aaran Leyland... - SWN #445
32:01
Cursive Funk, Microsoft, Ivanti, Sonic Wall, Exchange, PowerSchool, Aaran Leyland, and More, on this edition of the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-445
…
continue reading
Hosts Gil Bashe and Gregg Masters welcome Smriti Kirubanandan MS, MPH, CN, FRSA, Managing Director, Healthcare at Accenture.To stream our Station live 24/7 visit www.HealthcareNOWRadio.com or ask your Smart Device to “….Play Healthcare NOW Radio”.Find all of our network podcasts on your favorite podcast platforms and be sure to subscribe and like u…
…
continue reading
Host Matt Fisher talks to Ali Morin, Chief Nursing Informatics Officer at symplr, about aligning clinical and IT priorities; defining authentic intelligence; encouraging and acting upon user feedback; preparing clinicians for role in IT.To stream our Station live 24/7 visit www.HealthcareNOWRadio.com or ask your Smart Device to “….Play Healthcare N…
…
continue reading
1
Cursive Funk, Microsoft, Ivanti, Sonic Wall, Exchange, PowerSchool, Aaran Leyland... - SWN #445
32:01
Cursive Funk, Microsoft, Ivanti, Sonic Wall, Exchange, PowerSchool, Aaran Leyland, and More, on this edition of the Security Weekly News. Show Notes: https://securityweekly.com/swn-445
…
continue reading
1
Vulnerability Prioritization In The Real World - Andy Jaquith - PSW #858
2:19:16
2:19:16
Відтворити пізніше
Відтворити пізніше
Списки
Подобається
Подобається
2:19:16
Andy Jaquith joins us to discuss how to prioritize vulnerabilities and remmediation in the real-world, including asset management and more! In the security news: ESP32s in the wild and security, Google oAuth flaw, DDoS targets, Ban on auto components, Bambu firmware updates, Silk Road founder is free, one last cybersecurity executive order, US Trea…
…
continue reading
1
Vulnerability Prioritization In The Real World - PSW #858
2:19:16
2:19:16
Відтворити пізніше
Відтворити пізніше
Списки
Подобається
Подобається
2:19:16
Andy Jaquith joins us to discuss how to prioritize vulnerabilities and remmediation in the real-world, including asset management and more! In the security news: ESP32s in the wild and security, Google oAuth flaw, DDoS targets, Ban on auto components, Bambu firmware updates, Silk Road founder is free, one last cybersecurity executive order, US Trea…
…
continue reading
1
SANS ISC Stormcast, Jan 24, 2025: XSS in Email, SonicWall Exploited; Cisco Vulnerablities; AI and SOAR (@sans_edu research paper by Anthony Russo) (#)
14:45
SANS ISC Stormcast, Jan 24, 2025: XSS in Email, SonicWall Exploited; Cisco Vulnerablities; AI and SOAR (@sans_edu research paper by Anthony Russo) In today's episode, learn how an attacker attempted to exploit webmail XSS vulnerablities against us. Sonicwall released a critical patch fixing an already exploited vulnerability in its SMA 1000 applian…
…
continue reading
1
SANS ISC Stormcast, Jan 23, 2025: PFSync Protocol; Oracle CPU; Korean VPN Supply Chain Attack; Ivanti Guidance (#)
7:50
SANS ISC Stormcast, Jan 23, 2025: PFSync Protocol; Oracle CPU; Korean VPN Supply Chain Attack; Ivanti Guidance In today's episode, we start by talking about the PFSYNC protocol used to synchronize firewall states to support failover. Oracle released it's quarterly critical patch update. ESET is reporting about a critical VPN supply chain attack and…
…
continue reading
Jeff Pollard, Vice-President, Principal Analyst on the Security and Risk Team, and Jess Burn, Principal Analyst, both from Forrester Research join Business Security Weekly to discuss the second part of The Future Of The CISO report. What if you don't like the future of the CISO role and want to get out? The report also provides guidance on what com…
…
continue reading
Becoming a CISO is a lofty goal for many security and risk pros, and the role brings new sets of challenges. CISOs who accept the wrong opportunities will be forced to conform, rather than excel, and take on outsized liability for the scope of responsibilities. Jeff Pollard, Vice-President, Principal Analyst on the Security and Risk Team, and Jess …
…
continue reading
Becoming a CISO is a lofty goal for many security and risk pros, and the role brings new sets of challenges. CISOs who accept the wrong opportunities will be forced to conform, rather than excel, and take on outsized liability for the scope of responsibilities. Jeff Pollard, Vice-President, Principal Analyst on the Security and Risk Team, and Jess …
…
continue reading
1
MRO Exchange: Automated record retrieval w/ CHRISTUS Health's RCS Director, Prudence Budemer
16:35
S2E2: Host Anthony Murray, MRO's Chief Interoperability Officer, discusses automated record retrieval with CHRISTUS Health's Revenue Cycle Services Director, Prudence Budemer. Together they dive into how CHRISTUS and MRO are utilizing FHIR to facilitate the retrieval of medical records required for specific use cases while maintaining the integrity…
…
continue reading
1
Digital Health Talks: Balancing AI Innovation with Human-Centered Healthcare: A CDO's Perspective
33:21
Balancing AI Innovation with Human-Centered Healthcare: A CDO's PerspectiveHost: Megan AntonelliGuest: Eric SmithJoin Megan Antonelli and her guest Eric Smith as he shares how Memorial Hermann Health System is revolutionizing healthcare delivery through responsible AI implementation. Learn how their pioneering governance model ensures technology en…
…
continue reading
1
SANS ISC Stormcast, Jan 22, 2025: Geolocation via Starlink and Cloudflare; AI Prompt Risks; Homebrew Phishing (#)
9:16
SANS ISC Stormcast, Jan 22, 2025: Geolocation via Starlink and Cloudflare; AI Prompt Risks; Homebrew Phishing This episodes covers how Starlink users can be geolocated and how Cloudflare may help deanonymize users. The increased use of AI helpers leads to leaking data via careless prompts. Geolocation and Starlink https://isc.sans.edu/diary/Geoloca…
…
continue reading
Smishing, Microsoft, Star Blizzard, Sneaky Log, VMARE, Josh Marpet, and more on the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-444
…
continue reading
Smishing, Microsoft, Star Blizzard, Sneaky Log, VMARE, Josh Marpet, and more on the Security Weekly News. Show Notes: https://securityweekly.com/swn-444
…
continue reading
Host Ericka Adler welcomes back Roetzel Healthcare attorney Christina Kuta for a discussion on the newly updated guidelines from the Illinois Department of Financial and Professional Regulation (IDFPR) regarding the operation and ownership of medical spas. As med spas continue to rise in popularity, the question of who can own and operate one has b…
…
continue reading
What’s in store for appsec in 2025? Sure, there'll be some XSS and SQL injection, but what about trends that might influence how appsec teams plan? Cody Scott shares five cybersecurity and privacy predictions and we take a deep dive into three of them. We talk about finding value to appsec from AI, why IoT and OT need both programmatic and technica…
…
continue reading
What’s in store for appsec in 2025? Sure, there'll be some XSS and SQL injection, but what about trends that might influence how appsec teams plan? Cody Scott shares five cybersecurity and privacy predictions and we take a deep dive into three of them. We talk about finding value to appsec from AI, why IoT and OT need both programmatic and technica…
…
continue reading
This week in the enterprise news - Cymulate acquires CYNC Secure, Tidal Cyber acquires Zero-Shot, Amazon ransomware attack, and more! Show Notes: https://securityweekly.com/esw-390
…
continue reading
1
SANS ISC Stormcast, Jan 21, 2025: Downloading Partial ZIP files; Remote Tools Used in Attakcs; Azure DevOps SSRF (#)
6:21
SANS ISC Stormcast, Jan 21, 2025: Downloading Partial ZIP files; Remote Tools Used in Attakcs; Azure DevOps SSRF In this episode, we talk about downloading and analyzing partial ZIP files, how legitimate remote access tools are used in recent compromises and how a research found an SSRF vulnerability in Azure DevOps Partial ZIP File Downloads A clo…
…
continue reading
1
50,000 critical exposures + one of the most vulnerable IT environments: our schools - Kiran Chinnagangannagari, Jeff Smith - ESW #390
33:35
I've been so excited to see the external attack surface management (EASM) market take off in the past few years. This market category focuses exclusively on security issues exposed to the public Internet - issues ANYONE can see. All organizations have exposure management problems, but industries that are traditionally underfunded when it comes to c…
…
continue reading
1
The Next Era of Data Security: AI, Cloud, & Compliance - Jeff Smith, Dimitri Sirota, Kiran Chinnagangannagari - ESW #390
2:03:35
2:03:35
Відтворити пізніше
Відтворити пізніше
Списки
Подобається
Подобається
2:03:35
Today's data landscape is undergoing a seismic shift with increasing regulatory pressures, rapid acceleration to the cloud, and AI adoption. Join BigID's CEO and Co-Founder, Dimitri Sirota, to learn how organizations can adopt a holistic approach to their data security and compliance strategy to keep up with the revolution in data, transforming the…
…
continue reading
1
SANS ISC Stormcast, Jan 20, 2025: Honeypots for Offense; SimpleHelp and UEFI Secure Boot Vulnerabilities (#)
3:25
SANS ISC Stormcast, Jan 20, 2025: Honeypots for Offense; SimpleHelp and UEFI Secure Boot Vulnerabilities In this episode, we cover how to use honeypot data to keep your offensive infrastructure alive longer, three critical vulnerabilities in SimpleHelp that must be patched now, and an interesting vulnerability affecting many systems allowing UEFI S…
…
continue reading
Episode 60 Transforming Cardiometabolic Care: Innovation Meets Equity with Dr. Avantika WaringOn this episode host Raj Sundar welcomes back Dr. Avantika Waring from 9 AM Health to discuss her vision for cardiometabolic care, emphasizing equity in treating diabetes, obesity, hyperlipidemia, and hypertension through innovative virtual models. Dr. War…
…
continue reading
1
Ask the Educator: Stephen Kovach’s Exit Interview - Part 1
1:18:21
1:18:21
Відтворити пізніше
Відтворити пізніше
Списки
Подобається
Подобається
1:18:21
Episode 130: Stephen Kovach’s Exit Interview – Part 1As the legendary Stephen Kovach prepares for his January 2025 retirement, he joins us for a final, reflective interview. Stephen shares his journey - from his early life and entry into the healthcare industry to discovering his passion for reprocessing and his impactful career at Healthmark. Alon…
…
continue reading