A brief daily summary of what is important in information security. The podcast is published every weekday and designed to get you ready for the day with a brief, usually 5 minutes long summary of current network security related events. The content is late breaking, educational and based on listener input as well as on input received by the SANS Internet Storm Center. You may submit questions and comments via our contact form at https://isc.sans.edu/contact.html .
…
continue reading
Story
…
continue reading
Through following this course, students will gain a basic understanding of the principles behind network security and the working of the main protocols, mechanisms and techniques in the area of security. The course consists of three parts: security mechanisms within network protocols, systems security and lab sessions. In the first part (security mechanisms within network protocols), the following topics will be discussed: IPSec, SSH, SSL, HTTPS and security for wireless networks. The second ...
…
continue reading
Welcome to the Security Weekly Podcast Network, your all-in-one source for the latest in cybersecurity! This feed features a diverse lineup of shows, including Application Security Weekly, Business Security Weekly, Paul's Security Weekly, Enterprise Security Weekly, and Security Weekly News. Whether you're a cybersecurity professional, business leader, or tech enthusiast, we cover all angles of the cybersecurity landscape. Tune in for in-depth panel discussions, expert guest interviews, and ...
…
continue reading
Welcome to the Security Weekly Podcast Network, your all-in-one source for the latest in cybersecurity! This feed features a diverse lineup of shows, including Application Security Weekly, Business Security Weekly, Paul's Security Weekly, Enterprise Security Weekly, and Security Weekly News. Whether you're a cybersecurity professional, business leader, or tech enthusiast, we cover all angles of the cybersecurity landscape. Tune in for in-depth panel discussions, expert guest interviews, and ...
…
continue reading
…
continue reading
The Defence & Security Podcast Network hosts a unique series of podcasts, featuring discussions with key enablers from across the Australian defence and security industry. The podcasts provide the perfect blend of business intelligence and insights from a range of guests, which include government officials, ADF personnel, industry stakeholders, and members of the academic community. By aligning ourselves with the ADF and the Commonwealth government, we are uniquely placed to deliver a dynami ...
…
continue reading
An online network about educating, entertaining and encouraging your dance with Technology!
…
continue reading

1
Healthcare NOW Radio Podcast Network - Discussions on healthcare including technology, innovation, policy, data security, telehealth and more. Visit HealthcareNOWRadio.com
Healthcare NOW Radio and Podcast Network - Radio and Podcasts for the Healthcare Industry
RADIO FOR THE HEALTHCARE INDUSTRY Healthcare NOW Radio and Podcast Network offers discussions on the latest developments and trends impacting the industry including: health tech, health IT, healthcare innovation, healthcare policy, healthcare data security, telehealth, interoperability, biotech, med tech, value-based care, pharma, healthcare compliance, and much more. Shows are hosted by industry thought leaders. Guests are a "who's who" across the healthcare spectrum. The listening audience ...
…
continue reading
An online network about educating, entertaining and encouraging your dance with Technology!
…
continue reading

1
Forrester 2026 Budget Planning Guide and BlackHat 2025 Interviews - Jess Burn, Matt Muller, Danny Jenkins - BSW #412
1:11:11
1:11:11
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
1:11:11With volatility now the norm, security and risk leaders need practical guidance on managing existing spending and new budgetary necessities. Where should they look? Jess Burn, Principal Analyst at Forrester Research, joins Business Security Weekly to discuss Forrester's Budget Planning Guide 2026: Security And Risk. This data-and-insights-driven re…
…
continue reading

1
Ask the Educator: 2025 HSPA Award of Honor Winner: Julie Williamson
16:36
16:36
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
16:36On this episode, they speak with 2025 HSPA Award of Honor winner, Julie Williamson about her career, how she came to HSPA and how the sterile processing industry has changed and evolved over the span of her career. As a bonus, they’ll let you know how YOU can get involved with industry writing and making sure you have a voice! Find all of our netwo…
…
continue reading

1
SANS Stormcast Wednesday, September 10th, 2025: Microsoft Patch Tuesday; (#)
8:26
8:26
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
8:26SANS Stormcast Wednesday, September 10th, 2025: Microsoft Patch Tuesday; Microsoft Patch Tuesday As part of its September patch Tuesday, Microsoft addressed 177 different vulnerabilities, 86 of which affect Microsoft products. None of the vulnerabilities has been exploited before today. Two of the vulnerabilities were already made public. Microsoft…
…
continue reading

1
Ransomware, Agentic AI, and Supply Chain Risks: Insights from Black Hat 2025 - HD Moore, Jason Passwaters, J.J. Guy, Theresa Lanowitz, Mickey Bresman, Yuval Wollman, Jawahar “Jawa” Sivasankaran - ESW ...
2:06:06
2:06:06
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
2:06:06Doug White sits down with Theresa Lanowitz, Chief Evangelist at LevelBlue, for a powerful and timely conversation about one of cybersecurity’s most pressing threats: the software supply chain. Theresa shares fresh insights from LevelBlue’s global research involving 1,500 cybersecurity professionals across 16 countries. Together, they unpack the rea…
…
continue reading

1
CYBER UNCUT: ‘Nudify’ app ban, hacker threatens artists with AI punishment, and fake ID marketplace takedown
35:09
35:09
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
35:09In this episode of the Cyber Uncut podcast, David Hollingworth and Daniel Croft discuss the latest AI news, some worrying trends in cyber crime, and this year’s largest supply chain hack, impacting hundreds of companies worldwide. Hollingworth and Croft kick things off by looking at the NSW government embracing AI and the federal government’s timel…
…
continue reading

1
AI Trolley Problems, Rhode Island Drivers, and Kohlbergian Post Conventionalism - SWN #509
40:58
40:58
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
40:58Josh Marpet and Doug White talk about AI Ethics, Issues, and Compliance. AI Trolley problems, Rhode Island Drivers, and Post Conventionalism. Show Notes: https://securityweekly.com/swn-509
…
continue reading

1
Revenue Cycle Optimized: RBMA Founders Day: From Bots to Brains
24:28
24:28
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
24:28Over 70% of imaging centers still depend on manual referral, scheduling, and prior auth processes—slowing care and straining staff. In this episode, Stuart Newsome, CPCO, VP of RCM Insights at Infinx, shows how AI agents powered by generative AI are transforming radiology operations. See how these “invisible coworkers” integrate with RIS, PACS, and…
…
continue reading

1
Hellhounds, Anthropic, iCloud, NPM, gitforked, notdoor, TOR, Signal, Josh Marpet - SWN #510
32:42
32:42
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
32:42AI Hellhounds, Anthropic, iCloud, NPM, gitforked, notdoor, TOR, Signal, WhatsApp, Josh Marpet, and more on the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-510
…
continue reading

1
Limitations and Liabilities of LLM Coding - Seemant Sehgal, Ted Shorter - ASW #347
1:17:09
1:17:09
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
1:17:09Up first, the ASW news of the week. At Black Hat 2025, Doug White interviews Ted Shorter, CTO of Keyfactor, about the quantum revolution already knocking on cybersecurity’s door. They discuss the terrifying reality of quantum computing’s power to break RSA and ECC encryption—the very foundations of modern digital life. With 2030 set as the deadline…
…
continue reading

1
HealthLaw HotSpot: TCPA Compliance in Healthcare: Avoiding Costly Mistakes
25:42
25:42
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
25:42Ericka Adler is joined by Roetzel shareholder Marc Kallish to unpack the hidden legal risks healthcare professionals face under the Telephone Consumer Protection Act (TCPA). They explore how common communication methods like texts, emails, and calls can trigger costly violations, even when used with good intentions. The episode covers what the TCPA…
…
continue reading

1
SANS Stormcast Tuesday, September 9th, 2025: Major npm compromise; HTTP Request Signature (#)
8:44
8:44
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
8:44SANS Stormcast Tuesday, September 9th, 2025: Major npm compromise; HTTP Request Signature Major npm compromise A number of high-profile npm libraries were compromised after developers fell for a phishing email. This compromise affected libraries with a total of hundreds of millions of downloads a week. https://bsky.app/profile/bad-at-computer.bsky.…
…
continue reading

1
SANS Stormcast Monday, September 8th, 2025: YARA to Debugger Offsets; SVG JavaScript Phishing; FreePBX Patches; (#)
5:35
5:35
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
5:35SANS Stormcast Monday, September 8th, 2025: YARA to Debugger Offsets; SVG JavaScript Phishing; FreePBX Patches; From YARA Offsets to Virtual Addresses Xavier explains how to convert offsets reported by YARA into offsets suitable for the use with debuggers. https://isc.sans.edu/diary/From%20YARA%20Offsets%20to%20Virtual%20Addresses/32262 Phishing vi…
…
continue reading

1
The Healthtech Marketing Show: AI Quick Take: Model Mania
19:31
19:31
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
19:31AI Quick Take: Model ManiaOn this episode host Adam Turinas attempts to demystify the confusing landscape of AI models that’s been a little overwhelming. The AI world feels like the mid-’90s browser wars all on steroids, with multiple companies vying for dominance, each with its own approach and philosophy.Find all of our network podcasts on your f…
…
continue reading

1
Trending NOW: How a Smarter Revenue Cycle Empowers Better Care
25:48
25:48
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
25:48S3E9: What's Trending NOW is how a smarter revenue cycle empowers better care. On this episode host Shahid Shah is joined by Rob Stuart, CEO of Claim.MD, a leading EDI Clearinghouse, providing innovative, affordable electronic claims management solutions that streamline billing and boost cash flow for healthcare providers. Rob shares insights on th…
…
continue reading

1
Health UnaBASHEd: Roy Ziegelstein, MD, MACP Editor-in-Chief, DynaMed
27:58
27:58
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
27:58Personomics, Empathy & the Art of Healing: A Conversation with Dr. Roy ZiegelsteinOn this episode Gil and Gregg welcome Roy Ziegelstein, MD, MACP—Editor-in-Chief of DynaMed, renowned cardiologist, and pioneer of humanistic medicine. Together, they explore the concept of “personomics,” the idea that a patient’s personal story is as important as thei…
…
continue reading

1
VBC Insights: Federal Policy Shift: Preparing Hospitals for the Road Ahead
26:42
26:42
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
26:42On this episode Dan explores the potential impact of new federal legislation, including One Big Beautiful Bill Act of 2025, which is set to reshape healthcare delivery and payment models. He is joined by Natalie Davis, a nationally recognized health policy leader who has spent nearly two decades shaping and implementing initiatives to improve acces…
…
continue reading

1
Healthcare de Jure: Donovan Campbell, CEO of MedBridge
28:07
28:07
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
28:07Host Matt Fisher talks to Donovan Campbell, CEO of MedBridge, about how to foster effective engagement in hybrid care models; defining success for an intervention from patient perspective; challenges and opportunities for digital technology integration.To stream our Station live 24/7 visit www.HealthcareNOWRadio.com or ask your Smart Device to “….P…
…
continue reading
August News You Can Use Healthcare: Where Even Babies Get Spam CallsTopics includes: Epic’s annual UGM revealed quirky issues like newborns being assigned cell numbers; Awkward misdirected health updates, but fixes in the works; Epic’s Cosmos database of 300M records powers AI predictions - excitement and privacy concerns for misuse by insurers; He…
…
continue reading

1
AI Trolley Problems, Rhode Island Drivers, and Kohlbergian Post Conventionalism - SWN #509
40:58
40:58
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
40:58Josh Marpet and Doug White talk about AI Ethics, Issues, and Compliance. AI Trolley problems, Rhode Island Drivers, and Post Conventionalism. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-509
…
continue reading

1
CONTESTED GROUND: When information becomes the battlefield
37:59
37:59
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
37:59In this episode of the Contested Ground podcast, Phil Tarrant, Major General (Ret’d) Dr Marcus Thompson and Liam Garman unpack the escalating role of information warfare in today’s conflicts. From the mobile phone’s transformation into a weapon to the blurred lines between propaganda and “information operations”, the team dissects how truth itself …
…
continue reading

1
PopHealth Week: Special Series on Psychedelics with guest Justin Townsend, CEO, MycoMeditations
27:12
27:12
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
27:12Sacred Healing or Clinical Care? Exploring Psychedelics in Retreats and Religion with Justin Townsend of MycoMeditations. On this special episode of PopHealth Week, guest host Jim Tate and Gregg welcome Justin Townsend, CEO of MycoMeditations.com, a leading psilocybin-assisted retreat organization based in Jamaica. Together, they explore the emergi…
…
continue reading

1
The Tate Chronicles: Billing Compliance and Revenue Integrity with Ritesh Ramesh CEO MDaudit
26:29
26:29
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
26:29On this episode Jim welcomes Ritesh Ramesh CEO of MDaudit. MDaudit strengthens billing compliance and revenue integrity with a single data-driven solution. Hear insights from Ritesh on the importance of continuous risk monitoring to safeguard against emerging compliance challenges.To stream our Station live 24/7 visit www.HealthcareNOWRadio.com or …
…
continue reading

1
Digital Health Talks: Five Good Things
18:23
18:23
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
18:23Five Good ThingsFive Good Things with Janae Sharp and Megan Antonelli: A rapid-fire segment highlighting positive developments in digital health. Janae and Megan share insights on recent innovations, successful implementations, and emerging trends that are driving progress in healthcare technology.Find all of our network podcasts on your favorite p…
…
continue reading

1
Talking the Walk: ATA Action with Executive Director Kyle Zebley
27:58
27:58
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
27:58On this episode host Tom Testa continues his series on industry organizations that are making a difference for their members with ATA Action, American Telemedicine Association's affiliated trade organization as a proactive response to the need for expanded advocacy. Tom sits down with Kyle Zebley, he is their Executive Director.To stream our Statio…
…
continue reading

1
SANS Stormcast Friday, September 5th, 2025: Cloudflare Response to 1.1.1.1 Certificate; AI Modem Namespace Reuse; macOS Vulnerability Allowed Keychain Decryption (#)
8:19
8:19
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
8:19SANS Stormcast Friday, September 5th, 2025: Cloudflare Response to 1.1.1.1 Certificate; AI Modem Namespace Reuse; macOS Vulnerability Allowed Keychain Decryption Unauthorized Issuance of Certificate for 1.1.1.1 Cloudflare published a blog post with more details regarding the bad 1.1.1.1 certificate that was issued by Fina. https://blog.cloudflare.c…
…
continue reading

1
Lasagna DoS, AI Slop, Hacker Ultimatums - PSW #890
2:04:36
2:04:36
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
2:04:36In the secure news: Automakers respond to Flipper Zero attacks More on the unconfirmed Elastic EDR 0-Day When Secure Boot does its job too well Crazy authenitcation bypass Hacker ultimatums AI Slop Impatient hackers Linux ISOs are malware Attackers love drivers Hacking Amazon's Eero, the hard way Exploits will continue until security improves The S…
…
continue reading

1
Lasagna DoS, AI Slop, Hacker Ultimatums - PSW #890
2:04:36
2:04:36
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
2:04:36In the secure news: Automakers respond to Flipper Zero attacks More on the unconfirmed Elastic EDR 0-Day When Secure Boot does its job too well Crazy authenitcation bypass Hacker ultimatums AI Slop Impatient hackers Linux ISOs are malware Attackers love drivers Hacking Amazon's Eero, the hard way Exploits will continue until security improves The S…
…
continue reading

1
Australian Defence Industry Awards’ Female Defence Leader of the Year (SME), Sarah Bailey
28:45
28:45
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
28:45In this episode of the Defence Connect Podcast, senior journalist Robert Dougherty is joined by the Australian Defence Industry Awards’ Female Defence Leader of the Year (SME), Sarah Bailey, to discuss the nature of leadership, courage, and opportunity as the chief executive of PentenAmio Australia. Bailey has previously held senior leadership role…
…
continue reading

1
SANS Stormcast Thursday, September 4th, 2025: Dassault DELMIA Apriso Exploit Attempts; Android Updates; 1.1.1.1 Certificate Issued (#)
6:22
6:22
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
6:22SANS Stormcast Thursday, September 4th, 2025: Dassault DELMIA Apriso Exploit Attempts; Android Updates; 1.1.1.1 Certificate Issued Exploit Attempts for Dassault DELMIA Apriso. CVE-2025-5086 Our honeypots detected attacks against the manufacturing management system DELMIA Apriso. The deserialization vulnerability was patched in June and is one of a …
…
continue reading

1
Security Money: The Index Dips and 20 Years of Cybersecurity Consolidation - Ross Haleliuk - BSW #411
1:04:12
1:04:12
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
1:04:12The cybersecurity industry is undergoing a consolidation wave that is moving far faster than many realize. This isn’t at all about CISOs wanting fewer tools as much as some would like to think - the changes are happening at the macro level. Ross Haleliuk joins BSW to present the most comprehensive illustration ever made of how our industry has cons…
…
continue reading

1
Security Money: The Index Dips and 20 Years of Cybersecurity Consolidation - Ross Haleliuk - BSW #411
1:04:12
1:04:12
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
1:04:12The cybersecurity industry is undergoing a consolidation wave that is moving far faster than many realize. This isn’t at all about CISOs wanting fewer tools as much as some would like to think - the changes are happening at the macro level. Ross Haleliuk joins BSW to present the most comprehensive illustration ever made of how our industry has cons…
…
continue reading

1
THE PROGRESS REPORT: Leading at sea and beyond: A conversation with Rear Admiral Van Stralen
28:55
28:55
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
28:55How do you forge a trailblazing path and rise to leadership in the Australian Defence Force? In this episode of The Progress Report, Defence Connect’s Tash Taylor sits down with Rear Admiral Letitia Van Stralen, head of Military Personnel for the Australian Defence Force. ADML Van Stralen shares how her 30-year journey began with a law degree, whic…
…
continue reading

1
SANS Stormcast Wednesday, September 3rd, 2025: Sextortiion Analysis; Covert Channel DNS/ICMP; Azure AD Secret Theft; Official FreePBX Patches (#)
5:30
5:30
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
5:30SANS Stormcast Wednesday, September 3rd, 2025: Sextortiion Analysis; Covert Channel DNS/ICMP; Azure AD Secret Theft; Official FreePBX Patches A Quick Look at Sextortion at Scale Jan analyzed 1900 different sextortion messages using 205 different Bitcoin addresses to look at the success rate, lifetime, and other metrics defining these campaigns. htt…
…
continue reading

1
Rinoa Poison, Scambaiter Extraordinaire - Rinoa Poison - SWN #508
33:29
33:29
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
33:29I talk to Rinoa Poison about scambaiting, identity, and all sorts of things. Check it out. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-508
…
continue reading

1
Rinoa Poison, Scambaiter Extraordinaire - Rinoa Poison - SWN #508
33:29
33:29
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
33:29I talk to Rinoa Poison about scambaiting, identity, and all sorts of things. Check it out. Show Notes: https://securityweekly.com/swn-508
…
continue reading

1
AI, APIs, and the Next Cyber Battleground: Black Hat 2025 - Chris Boehm, Idan Plotnik, Josh Lemos, Michael Callahan - ASW #346
1:08:11
1:08:11
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
1:08:11In this must-see BlackHat 2025 interview, Doug White sits down with Michael Callahan, CMO at Salt Security, for a high-stakes conversation about Agentic AI, Model Context Protocol (MCP) servers, and the massive API security risks reshaping the cyber landscape. Broadcast live from the CyberRisk TV studio at Mandalay Bay, Las Vegas, the discussion pu…
…
continue reading

1
AI, APIs, and the Next Cyber Battleground: Black Hat 2025 - Michael Callahan, Idan Plotnik, Josh Lemos, Chris Boehm - ASW #346
1:08:11
1:08:11
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
1:08:11In this must-see BlackHat 2025 interview, Doug White sits down with Michael Callahan, CMO at Salt Security, for a high-stakes conversation about Agentic AI, Model Context Protocol (MCP) servers, and the massive API security risks reshaping the cyber landscape. Broadcast live from the CyberRisk TV studio at Mandalay Bay, Las Vegas, the discussion pu…
…
continue reading

1
Revenue Cycle Optimized: How Radiology Teams Modernize Intake Without Disrupting Epic Workflows
25:29
25:29
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
25:29How Radiology Teams Modernize Intake Without Disrupting Epic WorkflowsModernizing radiology intake means more than sending documents to Epic—it’s about building accuracy into the process. Learn how AI-powered document capture uses HL7 ORM mapping to handle multi-patient faxes, duplicates, and poor-quality images, with a phased rollout that keeps da…
…
continue reading