A brief daily summary of what is important in information security. The podcast is published every weekday and designed to get you ready for the day with a brief, usually 5 minutes long summary of current network security related events. The content is late breaking, educational and based on listener input as well as on input received by the SANS Internet Storm Center. You may submit questions and comments via our contact form at https://isc.sans.edu/contact.html .
…
continue reading
Story
…
continue reading
Through following this course, students will gain a basic understanding of the principles behind network security and the working of the main protocols, mechanisms and techniques in the area of security. The course consists of three parts: security mechanisms within network protocols, systems security and lab sessions. In the first part (security mechanisms within network protocols), the following topics will be discussed: IPSec, SSH, SSL, HTTPS and security for wireless networks. The second ...
…
continue reading
Welcome to the Security Weekly Podcast Network, your all-in-one source for the latest in cybersecurity! This feed features a diverse lineup of shows, including Application Security Weekly, Business Security Weekly, Paul's Security Weekly, Enterprise Security Weekly, and Security Weekly News. Whether you're a cybersecurity professional, business leader, or tech enthusiast, we cover all angles of the cybersecurity landscape. Tune in for in-depth panel discussions, expert guest interviews, and ...
…
continue reading
Welcome to the Security Weekly Podcast Network, your all-in-one source for the latest in cybersecurity! This feed features a diverse lineup of shows, including Application Security Weekly, Business Security Weekly, Paul's Security Weekly, Enterprise Security Weekly, and Security Weekly News. Whether you're a cybersecurity professional, business leader, or tech enthusiast, we cover all angles of the cybersecurity landscape. Tune in for in-depth panel discussions, expert guest interviews, and ...
…
continue reading
…
continue reading
The Defence & Security Podcast Network hosts a unique series of podcasts, featuring discussions with key enablers from across the Australian defence and security industry. The podcasts provide the perfect blend of business intelligence and insights from a range of guests, which include government officials, ADF personnel, industry stakeholders, and members of the academic community. By aligning ourselves with the ADF and the Commonwealth government, we are uniquely placed to deliver a dynami ...
…
continue reading
An online network about educating, entertaining and encouraging your dance with Technology!
…
continue reading
1
Healthcare NOW Radio Podcast Network - Discussions on healthcare including technology, innovation, policy, data security, telehealth and more. Visit HealthcareNOWRadio.com
Healthcare NOW Radio and Podcast Network - Radio and Podcasts for the Healthcare Industry
RADIO FOR THE HEALTHCARE INDUSTRY Healthcare NOW Radio and Podcast Network offers discussions on the latest developments and trends impacting the industry including: health tech, health IT, healthcare innovation, healthcare policy, healthcare data security, telehealth, interoperability, biotech, med tech, value-based care, pharma, healthcare compliance, and much more. Shows are hosted by industry thought leaders. Guests are a "who's who" across the healthcare spectrum. The listening audience ...
…
continue reading
An online network about educating, entertaining and encouraging your dance with Technology!
…
continue reading
1
PopHealth Week: Meet Chris Caramanico, CEO of Elligint
27:57
27:57
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
27:57Meet Chris Caramanico the CEO of Elligint Health, a company formed by the merger of Health EC and Virtual Health. Host Fred Goldstein discusses with Chris bringing together VirtualHealth’s award-winning medical management platform, HELIOS®, with HealthEC’s industry-leading population health analytics, Elligint Health delivers precision-driven, inte…
…
continue reading
1
Robo Bees, side, AI Risk, Red Tiger, SessionReaper, Bad Bots, Willow, Josh Marpet - SWN #523
32:35
32:35
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
32:35Venomous Robo Bees and Rabid Cocaine Weasels, sidebar spoofing, AI Risk, Red Tiger, SessionReaper, Bad Bots, Willow, Josh Marpet, and More on this edition of the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-523
…
continue reading
1
CONTESTED GROUND: From PNG to Gaza – what’s defining Australia’s security future
29:05
29:05
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
29:05In this episode of the Cyber Uncut podcast, Daniel Croft and David Hollingworth touch on the latest in AI and how state governments are regulating its use, the Qantas leak and the 5 million people impacted, and we chat about major cyber attacks with SolarWinds CISO Tim Brown. Croft and Hollingworth begin by discussing the fight that CBA has ignited…
…
continue reading
1
SANS Stormcast Friday, October 24th, 2025: Android Infostealer; SessionReaper Exploited; BIND/unbound DNS Spoofing fix; WSUS Exploit (#)
6:25
6:25
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
6:25SANS Stormcast Friday, October 24th, 2025: Android Infostealer; SessionReaper Exploited; BIND/unbound DNS Spoofing fix; WSUS Exploit Infostealer Targeting Android Devices This infostealer, written in Python, specifically targets Android phones. It takes advantage of Termux to gain access to data and exfiltrates it via Telegram. https://isc.sans.edu…
…
continue reading
1
Trending NOW: Dr. Mark Boxer, Board Chair for P-n-T Data Corp
27:17
27:17
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
27:17S3E12: What's Trending NOW is "how healthcare organizations are evolving their data security strategies in the age of AI without compromising innovation.On this episode Shahid is joined by Dr. Mark Boxer, Board Chair for P-n-T Data Corp., a company that delivers secure, scalable, and intelligent data sharing solutions that help healthcare organizat…
…
continue reading
1
Healthcare IT Today-Healthcare Startups and Founders
29:36
29:36
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
29:36Hosts Colin Hung and John Lynn discuss Healthcare Startups and Founders.To stream our Station live 24/7 visit www.HealthcareNOWRadio.com or ask your Smart Device to “….Play Healthcare NOW Radio”.Find all of our network podcasts on your favorite podcast platforms and be sure to subscribe and like us. Learn more at www.healthcarenowradio.com/listen…
…
continue reading
1
Robo Bees, side, AI Risk, Red Tiger, SessionReaper, Bad Bots, Willow, Josh Marpet - SWN #523
32:35
32:35
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
32:35Venomous Robo Bees and Rabid Cocaine Weasels, sidebar spoofing, AI Risk, Red Tiger, SessionReaper, Bad Bots, Willow, Josh Marpet, and More on this edition of the Security Weekly News. Show Notes: https://securityweekly.com/swn-523
…
continue reading
1
Digital Health Talks: From Crisis to Prevention
28:01
28:01
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
28:01From Crisis to Prevention: How Ambient Monitoring Is Rewiring Healthcare CultureJoin Megan Antonelli as she speaks with Jenice Larmond, RN, BSN, MBA, Clinical Innovation & Excellence Officer at Neteera, about how radar-based ambient monitoring is rewiring clinical culture toward prevention. Discover how FDA-cleared contactless technology continuous…
…
continue reading
1
Health Cent$: Michael Meloch, CEO of TPAC
29:26
29:26
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
29:26On this episode, host Adam Russo welcomes Michael Meloch, CEO of TPAC, a company that helps employers control healthcare costs as their honest, transparent stop loss partner. Mike shares insights on the evolving landscape of underwriting in the self-funded health insurance industry. He explains that while technology has not significantly changed th…
…
continue reading
1
Health Stealth Radio: Calli Dretke, EVP, Chief Digital & Marketing Officer
27:34
27:34
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
27:34S2E15: Digital Empathy, Cyber Resilience, and the New Health IT Paradigm: CHIME’s VisionHost: Frank CutittaGuest: Calli Dretke, EVP, Chief Digital & Marketing Officer, CHIMETo stream our Station live 24/7 visit www.HealthcareNOWRadio.com or ask your Smart Device to “….Play Healthcare NOW Radio”.Find all of our network podcasts on your favorite podc…
…
continue reading
1
Talking the Walk: Cybersecurity Awareness Month with Lance Reid
27:49
27:49
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
27:49Cybersecurity Awareness Month with Lance ReidS1E14: On this episode host Tom Testa invites Lance Reid, CEO of Telcion to discuss cybersecurity in healthcare during Cybersecurity Awareness Month. Lance shares insights on how healthcare organizations, particularly community clinics, face unique cybersecurity challenges due to limited resources and st…
…
continue reading
In the security news: When in doubt, blame DNS, you're almost always correct How to Make Windows 11 great, or at least suck less CSRF is the least of your problems Shady exploits Linux security table stakes (not steaks) The pill camera Give AI access to your UART Security products that actually try to be secure? Firmware vulnerabilities, lots of th…
…
continue reading
In the security news: When in doubt, blame DNS, you're almost always correct How to Make Windows 11 great, or at least suck less CSRF is the least of your problems Shady exploits Linux security table stakes (not steaks) The pill camera Give AI access to your UART Security products that actually try to be secure? Firmware vulnerabilities, lots of th…
…
continue reading
1
Veteran Games, defence treaties and ADF recruitment, with former commando Heston Russell
58:27
58:27
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
58:27In this episode of the Defence Connect Podcast, senior journalist Robert Dougherty is joined by returning guest Heston Russell – a public speaker, author and former Australian Special Forces officer – to discuss the 2025 Veteran Games and the recent grand finals held on the Gold Coast (11 and 12 October). Russell has previously served in 2nd Comman…
…
continue reading
1
SANS Stormcast Thursday, October 23rd, 2025: Blue Angle Software Exploit; Oracle CPU; Rust tar library vulnerability. (#)
7:28
7:28
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
7:28SANS Stormcast Thursday, October 23rd, 2025: Blue Angle Software Exploit; Oracle CPU; Rust tar library vulnerability. webctrl.cgi/Blue Angel Software Suite Exploit Attempts. Maybe CVE-2025-34033 Variant? Our honeypots detected attacks that appear to exploit CVE-2025-34033 or a similar vulnerability in the Blue Angle Software Suite. https://isc.sans…
…
continue reading
1
Security That Sticks: Shaping Human Behavior - Rinki Sethi, Nicole Jiang - BSW #418
1:03:00
1:03:00
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
1:03:00As the Verizon Data Breach Investigations Report has stated year after year, most breaches start with human error. We've invested a lot in Security Awareness and Training and Phishing solutions, but yet human error is still the top risk. How do we actually reduce human risk? Rinki Sethi, CSO at Upwind Security, and Nicole Jiang, CEO of Fable Securi…
…
continue reading
1
Security That Sticks: Shaping Human Behavior - Nicole Jiang, Rinki Sethi - BSW #418
1:03:00
1:03:00
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
1:03:00As the Verizon Data Breach Investigations Report has stated year after year, most breaches start with human error. We've invested a lot in Security Awareness and Training and Phishing solutions, but yet human error is still the top risk. How do we actually reduce human risk? Rinki Sethi, CSO at Upwind Security, and Nicole Jiang, CEO of Fable Securi…
…
continue reading
1
Tell Me Where IT Hurts: Dr. Alwi Yunus, IJN Hospital, Malaysia
28:51
28:51
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
28:51Host Dr. Jay Anders speaks with Dr. Alwi Yunus, Senior Consultant Cardiac Surgeon and Clinical Director of Health Informatics at the National Heart Institute (Institut Jantung Negara, IJN), a 433 bed hospital specializing in cardiology in Kuala Lumpur, Malaysia. Dr. Alwi offers a compelling perspective on how a major public-private healthcare insti…
…
continue reading
1
SANS Stormcast Wednesday, October 22nd, 2025: NTP Pool; Xubuntu Compromise; Squid Vulnerability; Lanscope Vuln; (#)
6:37
6:37
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
6:37SANS Stormcast Wednesday, October 22nd, 2025: NTP Pool; Xubuntu Compromise; Squid Vulnerability; Lanscope Vuln; What time is it? Accuracy of pool.ntp.org. How accurate and reliable is pool.ntp.org? Turns out it is very good! https://isc.sans.edu/diary/What%20time%20is%20it%3F%20Accuracy%20of%20pool.ntp.org./32390 Xubuntu Compromise The Xubuntu webs…
…
continue reading
1
The Afterlife, AWS, ClickFix, Agentic AI, Robot Lumberjacks, Robocalls, Aaran Leyland - SWN #522
37:43
37:43
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
37:43The Afterlife, AWS, ClickFix, Agentic AI Galore, Robot Lumberjacks, Robocalls, Aaran Leyland, and more on the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-522 This segment is sponsored by ThreatLocker. Visit https://securityweekly.com/threatlocker to learn mor…
…
continue reading
1
The Afterlife, AWS, ClickFix, Agentic AI, Robot Lumberjacks, Robocalls, Aaran Leyland - SWN #522
37:43
37:43
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
37:43The Afterlife, AWS, ClickFix, Agentic AI Galore, Robot Lumberjacks, Robocalls, Aaran Leyland, and more on the Security Weekly News. Show Notes: https://securityweekly.com/swn-522 This segment is sponsored by ThreatLocker. Visit https://securityweekly.com/threatlocker to learn more about them!
…
continue reading
1
Reacting to Ransomware and Setting Secure Defaults - Rob Allen - ASW #353
1:03:39
1:03:39
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
1:03:39Ransomware attacks typically don't care about memory safety and dependency scanning, they often target old, unpatched vulns and too often they succeed. Rob Allen shares some of the biggest cases he's seen, what they have in common, and what appsec teams could do better to help them. Too much software still requires custom configuration to make it m…
…
continue reading
1
Reacting to Ransomware and Setting Secure Defaults - Rob Allen - ASW #353
1:03:39
1:03:39
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
1:03:39Ransomware attacks typically don't care about memory safety and dependency scanning, they often target old, unpatched vulns and too often they succeed. Rob Allen shares some of the biggest cases he's seen, what they have in common, and what appsec teams could do better to help them. Too much software still requires custom configuration to make it m…
…
continue reading
1
SPOTLIGHT: Naval infrastructure at the core of next-gen naval capability
37:49
37:49
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
37:49In this episode of the Defence Connect Spotlight podcast, host Steve Kuper is joined by Tony Rogers, Brian Weinstein and Scott Keane of Stantec to discuss the role and importance of naval infrastructure to modern navies. The group discuss a range of subjects including: The global pressures being felt by contemporary Western naval infrastructure and…
…
continue reading
1
Revenue Cycle Optimized: Region 9 HFMA: The Anatomy of AI Agents
56:32
56:32
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
56:32Region 9 HFMA: The Anatomy of AI Agents - What They Are, How They Work, and Why They MatterAI agents don’t come with arms, legs, or eyes—but they do have something even better: the ability to think, reason, and act. As generative AI continues to evolve, so do the capabilities of AI agents—autonomous systems that can interact with applications, extr…
…
continue reading
1
AI Amplified: Empathetic AI in Clinical Interactions with Dr. Erin Palm
29:27
29:27
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
29:27S1E5: Empathetic AI in Clinical Interactions with Dr. Erin PalmOn this episode, host Dr. Heather Bassett welcomes Dr. Erin Palm, the Medical Lead at Infinitus, with a focus on ensuring the highest standards of clinical quality and safety. Erin is also a trauma surgeon practicing at the Santa Clara Valley Medical Center, and serves as affiliated tea…
…
continue reading
1
SANS Stormcast Tuesday, October 21st, 2025: Syscall() Obfuscation; AWS down; Beijing Time Attack (#)
9:17
9:17
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
9:17SANS Stormcast Tuesday, October 21st, 2025: Syscall() Obfuscation; AWS down; Beijing Time Attack Using Syscall() for Obfuscation/Fileless Activity Fileless malware written in Python can uses syscall() to create file descriptors in memory, evading signatures. https://isc.sans.edu/diary/Using%20Syscall%28%29%20for%20Obfuscation%20Fileless%20Activity/…
…
continue reading
1
Mitigating attacks against AI-enabled Apps, Replacing the CIA triad, Enterprise News - David Brauchler - ESW #429
1:38:26
1:38:26
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
1:38:26Segment 1: David Brauchler on AI attacks and stopping them David Brauchler says AI red teaming has proven that eliminating prompt injection is a lost cause. And many developers inadvertently introduce serious threat vectors into their applications – risks they must later eliminate before they become ingrained across application stacks. NCC Group’s …
…
continue reading
1
Mitigating attacks against AI-enabled Apps, Replacing the CIA triad, Enterprise News - David Brauchler - ESW #429
1:38:26
1:38:26
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
1:38:26Segment 1: David Brauchler on AI attacks and stopping them David Brauchler says AI red teaming has proven that eliminating prompt injection is a lost cause. And many developers inadvertently introduce serious threat vectors into their applications – risks they must later eliminate before they become ingrained across application stacks. NCC Group’s …
…
continue reading
1
CYBER UNCUT: CBA’s AI woes, the Qantas leak, and a chat with SolarWinds
53:56
53:56
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
53:56In this episode of the Cyber Uncut podcast, Daniel Croft and David Hollingworth touch on the latest in AI and how state governments are regulating its use, the Qantas leak and the 5 million people impacted, and we chat about major cyber attacks with SolarWinds CISO Tim Brown. Croft and Hollingworth begin by discussing the fight that CBA has ignited…
…
continue reading
1
The Healthtech Marketing Show: AI First Marketing at Scale
1:02:55
1:02:55
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
1:02:55AI-First Marketing at ScaleOn this episode host Adam Turinas talks to Nick Panayi, CMO of Inovalon, to explore one of the most comprehensive AI adoption stories I’ve encountered in healthcare technology marketing.Find all of our network podcasts on your favorite podcast platforms and be sure to subscribe and like us. Learn more at www.healthcarenow…
…
continue reading
1
SANS Stormcast Monday, October 20th, 2025: Malicious Tiktok; More Google Ad Problems; Satellite Insecurity (#)
6:15
6:15
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
6:15SANS Stormcast Monday, October 20th, 2025: Malicious Tiktok; More Google Ad Problems; Satellite Insecurity TikTok Videos Promoting Malware InstallationTikTok Videos Promoting Malware Installation Tiktok videos advertising ways to obtain software like Photoshop for free will instead trick users into downloading https://isc.sans.edu/diary/TikTok%20Vi…
…
continue reading
1
We Have TRUST Issues: Landing Healthcare AI Without a Crash with Chad Tetreault
26:57
26:57
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
26:57S1E2: Landing Healthcare AI Without a CrashHost Tamer Baker invites Chad Tetreault, Field CTO at Zscaler and former DHS Deputy CTO to explore AI in healthcare and governance challenges while cutting through the hype. From practical applications of AI in healthcare, addressing trust, governance, and cutting-edge use cases, this episode has it all.To…
…
continue reading
1
The Tate Chronicles: Louis Hyman on AI in Healthcare
26:08
26:08
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
26:08Host Jim Tate welcomes Louis Hyman for a conversation on AI in Healthcare. Louis has played a significant role in numerous health information technology firms serving in roles such as President, CEO Chief Technology Officer, and Senior Director of Engineering. He has been around the block more than a few time and now provides consulting services to…
…
continue reading
1
VBC Insights: Value Based Care in Action: CMS’s GUIDE Model for Caregiver Support
26:33
26:33
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
26:33Episode 138 -Value-Based Care in Action: CMS’s GUIDE Model for Caregiver Support As CMS continues to expand value-based care programs, one stands out for its focus on supporting some of our most vulnerable patients—and their caregivers. The GUIDE model (Guiding an Improved Dementia Experience) is designed to improve care for individuals with dement…
…
continue reading
1
We Have TRUST Issues: Meet the hosts and welcome to the show
27:23
27:23
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
27:23S1E1: Hosts Tamer Baker and Steve Hajny introduce themselves and discuss what the show is about.Find all of our network podcasts on your favorite podcast platforms and be sure to subscribe and like us. Learn more at www.healthcarenowradio.com/listen/بقلم Healthcare NOW Radio and Podcast Network - Radio and Podcasts for the Healthcare Industry
…
continue reading
1
Health UnaBASHEd: Rethinking Healthcare Engagement with Ritesh Patel
27:49
27:49
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
27:49Host Gil Bashe sits with colleague Ritesh Patel a healthcare marketing and growth executive, innovator, and advisor active at the intersection of health, technology, and go-to-market strategy. Ritesh is Chief Growth Officer at Doceree, where he leads global growth and innovation for point-of-care engagement platforms. With a career spanning senior …
…
continue reading
1
Erotic Chats, UEFI, F5, Cisco, Doug Sings, Insiders, Lastpass, Sora, Aaran Leyland... - SWN #521
35:31
35:31
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
35:31Erotic Chats, UEFI, F5, Cisco, Doug Sings, Insiders, Lastpass, Sora, Aaran Leyland, and More on this edition of the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-521
…
continue reading