A brief daily summary of what is important in information security. The podcast is published every weekday and designed to get you ready for the day with a brief, usually 5 minutes long summary of current network security related events. The content is late breaking, educational and based on listener input as well as on input received by the SANS Internet Storm Center. You may submit questions and comments via our contact form at https://isc.sans.edu/contact.html .
…
continue reading
Story
…
continue reading
Through following this course, students will gain a basic understanding of the principles behind network security and the working of the main protocols, mechanisms and techniques in the area of security. The course consists of three parts: security mechanisms within network protocols, systems security and lab sessions. In the first part (security mechanisms within network protocols), the following topics will be discussed: IPSec, SSH, SSL, HTTPS and security for wireless networks. The second ...
…
continue reading
Welcome to the Security Weekly Podcast Network, your all-in-one source for the latest in cybersecurity! This feed features a diverse lineup of shows, including Application Security Weekly, Business Security Weekly, Paul's Security Weekly, Enterprise Security Weekly, and Security Weekly News. Whether you're a cybersecurity professional, business leader, or tech enthusiast, we cover all angles of the cybersecurity landscape. Tune in for in-depth panel discussions, expert guest interviews, and ...
…
continue reading
Welcome to the Security Weekly Podcast Network, your all-in-one source for the latest in cybersecurity! This feed features a diverse lineup of shows, including Application Security Weekly, Business Security Weekly, Paul's Security Weekly, Enterprise Security Weekly, and Security Weekly News. Whether you're a cybersecurity professional, business leader, or tech enthusiast, we cover all angles of the cybersecurity landscape. Tune in for in-depth panel discussions, expert guest interviews, and ...
…
continue reading
…
continue reading
The Defence & Security Podcast Network hosts a unique series of podcasts, featuring discussions with key enablers from across the Australian defence and security industry. The podcasts provide the perfect blend of business intelligence and insights from a range of guests, which include government officials, ADF personnel, industry stakeholders, and members of the academic community. By aligning ourselves with the ADF and the Commonwealth government, we are uniquely placed to deliver a dynami ...
…
continue reading
An online network about educating, entertaining and encouraging your dance with Technology!
…
continue reading

1
Healthcare NOW Radio Podcast Network - Discussions on healthcare including technology, innovation, policy, data security, telehealth and more. Visit HealthcareNOWRadio.com
Healthcare NOW Radio and Podcast Network - Radio and Podcasts for the Healthcare Industry
RADIO FOR THE HEALTHCARE INDUSTRY Healthcare NOW Radio and Podcast Network offers discussions on the latest developments and trends impacting the industry including: health tech, health IT, healthcare innovation, healthcare policy, healthcare data security, telehealth, interoperability, biotech, med tech, value-based care, pharma, healthcare compliance, and much more. Shows are hosted by industry thought leaders. Guests are a "who's who" across the healthcare spectrum. The listening audience ...
…
continue reading
An online network about educating, entertaining and encouraging your dance with Technology!
…
continue reading

1
Ratboi, Clop, Oracle, svgs, Impact Solutions, The Pentagon, Open AI, Josh Marpet... - SWN #517
30:34
30:34
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
30:34Ratboi, Clop, Oracle, svgs, Impact Solutions, The Pentagon, Open AI, Josh Marpet, and More on this edition of the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-517
…
continue reading

1
Digital Health Talks: From Compliance to Confidence On How to Evolve Cybersecurity
28:23
28:23
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
28:23From Compliance to Confidence: How to Evolve Cybersecurity Beyond the ChecklistHealthcare cybersecurity stands at an inflection point. Traditional compliance frameworks are proving inadequate in the face of sophisticated threats targeting patient data, clinical operations, and connected medical devices. Robert Eikel, CISO at P-n-T Data Corp., bring…
…
continue reading

1
SANS Stormcast Friday, October 3rd, 2025: More .well-known Scans; RedHat Openshift Patch; TOTOLINK Vuln; (#)
6:35
6:35
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
6:35SANS Stormcast Friday, October 3rd, 2025: More .well-known Scans; RedHat Openshift Patch; TOTOLINK Vuln; More .well-known scans Attackers are using API documentation automatically published in the .well-known directory for reconnaissance. https://isc.sans.edu/diary/More%20.well-known%20Scans/32340 RedHat Patches Openshift AI Services A flaw was fou…
…
continue reading

1
THE PROGRESS REPORT: Resilience, hope and the passion to heal, with Families of Veterans Guild
1:00:16
1:00:16
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
1:00:16A truly hard-hitting discussion of challenges and triumphs in the Defence community. In this episode of The Progress Report, Defence Connect’s Tash Taylor sits down with Families of Veterans Guild CEO Renee Wilson, board chair Tricia Hobson as well as board director and interim deputy chair Jennifer Collins. The group takes a look back at the roots…
…
continue reading

1
Ratboi, Clop, Oracle, svgs, Impact Solutions, The Pentagon, Open AI, Josh Marpet... - SWN #517
30:34
30:34
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
30:34Ratboi, Clop, Oracle, svgs, Impact Solutions, The Pentagon, Open AI, Josh Marpet, and More on this edition of the Security Weekly News. Show Notes: https://securityweekly.com/swn-517
…
continue reading

1
AI: The new trigger word. Or is it Robots? - PSW #894
2:04:32
2:04:32
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
2:04:32In addition to some fun news, we get a Mary Ann Davidson as a surprise guest. We even get a great quote from her of "You're never going to have enough cybersecurity people to defend what was never built to be defensible.". Show Notes: https://securityweekly.com/psw-894
…
continue reading

1
AI: The new trigger word. Or is it Robots? - PSW #894
2:04:32
2:04:32
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
2:04:32In addition to some fun news, we get a Mary Ann Davidson as a surprise guest. We even get a great quote from her of "You're never going to have enough cybersecurity people to defend what was never built to be defensible.". Visit https://www.securityweekly.com/psw for all the latest episodes! Show Notes: https://securityweekly.com/psw-894…
…
continue reading

1
SANS Stormcast Thursday, October 2nd, 2025: Honeypot Passwords; OneLogin Vuln; Breaking Intel SGX; OpenSSL Patch (#)
8:12
8:12
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
8:12SANS Stormcast Thursday, October 2nd, 2025: Honeypot Passwords; OneLogin Vuln; Breaking Intel SGX; OpenSSL Patch Comparing Honeypot Passwords with HIBP Most passwords used against our honeypots are also found in the “Have I been pwn3d” list. However, the few percent that are not found tend to be variations of known passwords, extending them to find…
…
continue reading

1
Future Forward: CIO 2025 Outlook - Cybersecurity, AI, and Economic Uncertainty? - Amanda Jack - BSW #415
55:15
55:15
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
55:15More than four out of ten (41%) Chief Information Officers (CIOs) report cybersecurity as their top concern, yet these same leaders are simultaneously increasing security budgets (77%), expanding cloud infrastructure (68%), and accelerating artificial intelligence (AI) capabilities (67%). According to the new Future Forward: CIO 2025 Outlook report…
…
continue reading

1
Future Forward: CIO 2025 Outlook - Cybersecurity, AI, and Economic Uncertainty? - Amanda Jack - BSW #415
55:15
55:15
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
55:15More than four out of ten (41%) Chief Information Officers (CIOs) report cybersecurity as their top concern, yet these same leaders are simultaneously increasing security budgets (77%), expanding cloud infrastructure (68%), and accelerating artificial intelligence (AI) capabilities (67%). According to the new Future Forward: CIO 2025 Outlook report…
…
continue reading

1
The Dish: Insights from the HL7 Da Vinci Project Clinical Advisory Council (CAC)
45:12
45:12
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
45:12Episode 51 - Clinicians Driving Interoperability: Insights from the HL7 Da Vinci Project Clinical Advisory Council (CAC)On this episode POCP CEO and host Tony Schueth sat down with Dr. Julia Skapik (SVP & CMO at PurpleLab, practicing physician, member of the HL7 Da Vinci Clinical Advisory Council, and outgoing HL7 International board chair) and Dr.…
…
continue reading

1
Voices of Self Funding: Merging for Independence: How TPAs Drive Innovation and Customer Experience
39:54
39:54
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
39:54On this episode of Voices of Self Funding, Jeff Walter and Jim Farley discuss their strategic merger, titled "Merging for Independence". They reveal how independent TPAs like JP Farley and PBA are uniting to drive innovation and enhance customer experience, avoiding absorption by larger firms. Discover how this merger focuses on enhanced service wi…
…
continue reading

1
SANS Stormcast Wednesday, October 1st, 2025: Cookie Auth Issues; Western Digtial Command Injection; sudo exploited; (#)
5:10
5:10
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
5:10SANS Stormcast Wednesday, October 1st, 2025: Cookie Auth Issues; Western Digtial Command Injection; sudo exploited; Sometimes you don’t even need to log in Applications using simple, predictable cookies to verify a user’s identity are still exploited, and relatively recent vulnerabilities are still due to this very basic mistake. https://isc.sans.e…
…
continue reading

1
Attica, Crustacean Porn, Broadcom, William of Ockham, Jaguar, SVG, Aaran Leyland... - SWN #516
31:22
31:22
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
31:22Attica, Crustacean Porn, Broadcom, William of Ockham, Jaguar, SVG, Aaran Leyland, and more on the Security Weekly News. Show Notes: https://securityweekly.com/swn-516
…
continue reading

1
Attica, Crustacean Porn, Broadcom, William of Ockham, Jaguar, SVG, Aaran Leyland... - SWN #516
31:22
31:22
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
31:22Attica, Crustacean Porn, Broadcom, William of Ockham, Jaguar, SVG, Aaran Leyland, and more on the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-516
…
continue reading

1
Changing the Vuln Conversation from Volume to Remediation - Francesco Cipollone - ASW #350
1:14:32
1:14:32
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
1:14:32Dealing with vulns tends to be a discussion about prioritization. After all, there a tons of CVEs and dependencies with known vulns. It's important to figure out how to present developers with useful vuln info that doesn't overwhelm them. Francesco Cipollone shares how to redirect that discussion to focus on remediation and how to incorporate LLMs …
…
continue reading

1
Changing the Vuln Conversation from Volume to Remediation - Francesco Cipollone - ASW #350
1:14:32
1:14:32
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
1:14:32Dealing with vulns tends to be a discussion about prioritization. After all, there a tons of CVEs and dependencies with known vulns. It's important to figure out how to present developers with useful vuln info that doesn't overwhelm them. Francesco Cipollone shares how to redirect that discussion to focus on remediation and how to incorporate LLMs …
…
continue reading

1
Revenue Cycle Optimized: The Realities of Reverification and the Future of Intelligent Automation
34:50
34:50
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
34:50The Realities of Reverification and the Future of Intelligent AutomationAI is everywhere in healthcare conversations, but when it comes to reverification, the reality is more complex. Each January, practices are hit with a surge of eligibility and benefits checks, straining staff and creating bottlenecks that risk revenue and patient experience. Tr…
…
continue reading

1
SANS Stormcast Tuesday, September 30th, 2025: Apple Patch; PAN Global Protect Scans; SSL.com signed malware (#)
5:06
5:06
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
5:06SANS Stormcast Tuesday, September 30th, 2025: Apple Patch; PAN Global Protect Scans; SSL.com signed malware Apple Patches Apple released patches for iOS, macOS, and visionOS, fixing a single font parsing vulnerability https://isc.sans.edu/diary/Apple%20Patches%20Single%20Vulnerability%20CVE-2025-43400/32330 Increase in Scans for Palo Alto Global Pr…
…
continue reading

1
Live interviews from Oktane 2025: threats, AI in apps, and AI in cybersecurity tools - Brett Winterford, Shiv Ramji, Damon McDougald - ESW #426
1:35:13
1:35:13
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
1:35:13How identity security can keep pace with the evolving threat landscape, with Brett Winterford Today’s threat landscape has never been more complex. Malicious actors are leveraging tools like generative AI to develop more creative social engineering attacks that can have serious ramifications for businesses. Brett Winterford, VP of Okta Threat Intel…
…
continue reading

1
Live interviews from Oktane 2025: threats, AI in apps, and AI in cybersecurity tools - Brett Winterford, Shiv Ramji, Damon McDougald - ESW #426
1:35:13
1:35:13
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
1:35:13How identity security can keep pace with the evolving threat landscape, with Brett Winterford Today’s threat landscape has never been more complex. Malicious actors are leveraging tools like generative AI to develop more creative social engineering attacks that can have serious ramifications for businesses. Brett Winterford, VP of Okta Threat Intel…
…
continue reading

1
SANS Stormcast Monday, September 29th, 2025: Convert Timestamps; Cisco Compromises; GitHub Notification Phishing (#)
8:36
8:36
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
8:36SANS Stormcast Monday, September 29th, 2025: Convert Timestamps; Cisco Compromises; GitHub Notification Phishing Converting Timestamps in .bash_history Unix shells offer the ability to add timestamps to commands in the .bash_history file. This is often done in the form of Unix timestamps. This new tool converts these timestamps into a more readable…
…
continue reading

1
CYBER UNCUT : NSW schools to get AI tool, AI Charlie Kirk, EU airports hacked and charities get a cyber helping hand
45:49
45:49
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
45:49In this episode of the Cyber Uncut podcast, Daniel Croft and David Hollingworth talk about NSWEduChat, a virtual Charlie Kirk, the impact of a cyber incident disrupting airports across Europe, and how Australian not-for-profits are getting a new tool to face a rising tide of ransomware attacks. Croft and Hollingworth open proceedings with Instagram…
…
continue reading

1
The Healthtech Marketing Show: AI Quick Take – Digital Twinning
15:45
15:45
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
15:45AI Quick Take – Digital TwinningOn this episode host Adam Turinas looks at one of the most fascinating yet misunderstood applications of AI in healthcare: digital twins.Find all of our network podcasts on your favorite podcast platforms and be sure to subscribe and like us. Learn more at www.healthcarenowradio.com/listen/…
…
continue reading

1
The Virtual Shift: Dr. Tom Kelly, Co-founder and CEO of Heidi Health
27:38
27:38
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
27:38Host Tom Foley invites Dr. Tom Kelly, Co-founder and CEO of Heidi Health, a company with an AI-powered medical scribe that streamlines time-intensive administrative tasks to reduce the cognitive load on clinicians. Tom shares insights on how Ambient AI can alleviate clinicians spending so much time on admin and notes making them less available for …
…
continue reading

1
News You Can Use: Special Edition Booking with Dr. Kris Olson
26:17
26:17
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
26:17On this special edition Dr. Nick welcomes Dr. Kris Olson. Dr. Olson’s career spans global health work in refugee camps and disaster zones, shaping his belief in humility, empathy, and local empowerment. At Mass General Brigham, he leads Springboard Studio, using design thinking. Topics include making healthcare more human-centered for both patients…
…
continue reading

1
Healthcare IT Today: Enforcement of Information Blocking
28:29
28:29
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
28:29Hosts Colin Hung and John Lynn discuss Enforcement of Information Blocking.To stream our Station live 24/7 visit www.HealthcareNOWRadio.com or ask your Smart Device to “….Play Healthcare NOW Radio”.Find all of our network podcasts on your favorite podcast platforms and be sure to subscribe and like us. Learn more at www.healthcarenowradio.com/liste…
…
continue reading

1
Health Cent$: Mark Gaunya Founding Principal & CEO, Captivated Health: Principal, Borislow I
28:43
28:43
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
28:43On this episode, host Adam Russo welcomes Mark Gaunya, Founding Principal & CEO, Captivated Health; Principal, Borislow Insurance.To stream our Station live 24/7 visit www.HealthcareNOWRadio.com or ask your Smart Device to “….Play Healthcare NOW Radio”.Find all of our network podcasts on your favorite podcast platforms and be sure to subscribe and …
…
continue reading

1
Health Stealth Radio: Ed Lee, MD, Chief Medical Officer, Nabla
26:51
26:51
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
26:51S2E14: Ambient AI in Healthcare TrendsHost: Frank CutittaGuest: Dr. Ed Lee, Chief Medical Officer at NablaTo stream our Station live 24/7 visit www.HealthcareNOWRadio.com or ask your Smart Device to “….Play Healthcare NOW Radio”.Find all of our network podcasts on your favorite podcast platforms and be sure to subscribe and like us. Learn more at w…
…
continue reading

1
Riker's Curse, River City, EDR-Freeze, MCP, WordPress, GitHub, Josh Marpet, and More. - SWN #515
30:49
30:49
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
30:49Riker's Curse, River City, EDR-Freeze, MCP, WordPress, GitHub, Josh Marpet, and More, on this edition of the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-515
…
continue reading

1
Riker's Curse, River City, EDR-Freeze, MCP, WordPress, GitHub, Josh Marpet, and More. - SWN #515
30:49
30:49
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
30:49Riker's Curse, River City, EDR-Freeze, MCP, WordPress, GitHub, Josh Marpet, and More, on this edition of the Security Weekly News. Show Notes: https://securityweekly.com/swn-515
…
continue reading

1
SANS Stormcast Friday, September 26th, 2025: Webshells in .well-known; Critical Cisco Vulns Exploited; XCSSET Update; GoAnywhere MFT Exploit Details (#)
5:25
5:25
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
5:25SANS Stormcast Friday, September 26th, 2025: Webshells in .well-known; Critical Cisco Vulns Exploited; XCSSET Update; GoAnywhere MFT Exploit Details Webshells Hiding in .well-known Places Our honeypots registered an increase in scans for URLs in the .well-known directory, which appears to be looking for webshells. https://isc.sans.edu/diary/Webshel…
…
continue reading

1
Broadcom, LastPass, SEO Poisoning, QR codes, H1B visas, Distributed Computing... - PSW #893
1:03:06
1:03:06
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
1:03:06Broadcom, LastPass, Brickstone, SEO Poisoning, QR codes, H1B visas, Distributed Computing, and More... Visit https://www.securityweekly.com/psw for all the latest episodes! Show Notes: https://securityweekly.com/psw-893
…
continue reading

1
Broadcom, LastPass, SEO Poisoning, QR codes, H1B visas, Distributed Computing... - PSW #893
1:03:06
1:03:06
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
1:03:06Broadcom, LastPass, Brickstone, SEO Poisoning, QR codes, H1B visas, Distributed Computing, and More... Show Notes: https://securityweekly.com/psw-893
…
continue reading

1
SANS Stormcast Thursday, September 25th, 2025: Hikvision Exploits; Cisco Patches; Sonicawall Anit-Rootkit Patch; Windows 10 Support (#)
5:33
5:33
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
5:33SANS Stormcast Thursday, September 25th, 2025: Hikvision Exploits; Cisco Patches; Sonicawall Anit-Rootkit Patch; Windows 10 Support Exploit Attempts Against Older Hikvision Camera Vulnerability Out honeypots observed an increase in attacks against some older Hikvision issues. A big part of the problem is weak passwords, and the ability to send cred…
…
continue reading