Search a title or topic

Over 20 million podcasts, powered by 

Player FM logo

Cisco Learning Network Podcasts

show episodes
 
Network Automation Nerds is for network engineers and infrastructure professionals eager to learn more about automation. Join host Eric Chou as he explores how to take advantage of modern network programmability to automate tasks, build robust systems, and get more done in less time. You’ll hear from a lineup of seasoned engineers, avid learners, industry leaders, and tool creators as they share tips, best practices, and hard-won advice.
  continue reading
 
Artwork

1
The Cisco Learning Network

The Cisco Learning Network

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Jump-start your use of the Cisco Learning Network's dynamic features and vibrant community offerings. Here you will find technical information and professional networking opportunities, which will help advance your certification goals. By joining the Cisco Learning Network you will be a part of the community, prepare for success, interact with professionals, mentor, share, and achieve.
  continue reading
 
Artwork
 
This is The Internet Report, a podcast uncovering what’s working and what’s breaking on the Internet—and why. Tune in to hear ThousandEyes’ Internet experts dig into some of the most interesting outage events from the past couple weeks, discussing what went awry—was it the Internet, or an application issue? Plus, learn about the latest trends in ISP outages, cloud network outages, collaboration network outages, and more.
  continue reading
 
Artwork
 
Gain unparalleled access to the minds of industry-leading CIOs, CTOs, and CISOs. Enjoy episodes filled with expert insights, inspiring stories, and trend analysis, all brought to you by the people shaping the future of technology. Whether you're an IT professional, aspiring tech leader, or general tech enthusiast, IT Visionaries has something for everyone. Don't miss out on the chance to learn from the best – subscribe now! Produced by the team at Mission.org and brought to you by Brightspot.
  continue reading
 
Artwork
 
Welcome to AI News Daily, brought to you by Brief! Our AI selects the latest stories and top headlines and then delivers them to you each day in less than ten minutes (for more details, visit www.brief.news/how-it-works). Tune in to get your daily news about machine learning, robotics, automation, natural language processing, AI ethics, and more. Whether you're a tech enthusiast, AI researcher, or simply curious about the future of technology, this podcast is your go-to source for AI news. T ...
  continue reading
 
Artwork

1
Entangled Things

Entangled Things

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
What if a Quantum Computing aficionado with expertise in Artificial Intelligence and Machine Learning talked to a security expert interested in how Quantum Computing already impacts the world?
  continue reading
 
Artwork
 
Welcome to the Broadband Bunch, a podcast about broadband and how it impacts all of us. Join us to learn about the state of the industry and the latest innovations and trends. Connect with the thought leaders, pioneers and policymakers helping to shape your future through broadband. The Broadband Bunch is sponsored by: ETI Software: www.etisoftware.com VETRO: www.vetrofibermap.com
  continue reading
 
Loading …
show series
 
Cisco’s Vijoy Pandey - SVP & GM of Outshift by Cisco - explains how AI agents and quantum networks could completely redefine how software, infrastructure, and security function in the next decade. You’ll learn: → What “Agentic AI” and the “Internet of Agents” actually are → How Cisco open-sourced the Internet of Agents framework and why decentraliz…
  continue reading
 
Polymorphic Python Malware Xavier discovered self-modifying Python code on Virustotal. The remote access tool takes advantage of the inspect module to modify code on the fly. https://isc.sans.edu/diary/Polymorphic%20Python%20Malware/32354 SSH ProxyCommand Vulnerability A user cloning a git repository may be tricked into executing arbitrary code via…
  continue reading
 
Oracle E-Business Suite 0-Day CVE-2025-61882 Last week, the Cl0p ransomware gang sent messages to many businesses stating that an Oracle E-Business Suite vulnerability was used to exfiltrate data. Initially, Oracle believed the root cause to be a vulnerability patched in June, but now Oracle released a patch for a new vulnerability. https://www.ora…
  continue reading
 
(0:10): Google Lays Off 100 Designers Amid Shift to AI, Sparking Creativity Concerns (2:08): CAIA Launches Groundbreaking AI Platform to Revolutionize Cancer Research and Treatment (4:39): HP Unveils 14 Innovations to Revolutionize Workspaces and Boost Productivity with AI and Security Enhancements (6:26): Snowflake Unveils Cortex AI to Revolutioni…
  continue reading
 
More .well-known scans Attackers are using API documentation automatically published in the .well-known directory for reconnaissance. https://isc.sans.edu/diary/More%20.well-known%20Scans/32340 RedHat Patches Openshift AI Services A flaw was found in Red Hat Openshift AI Service. A low-privileged attacker with access to an authenticated account, fo…
  continue reading
 
(0:10): Disney's Cease and Desist Sparks IP Showdown with Character.AI Over Copyrighted Characters (2:37): Peloton Unveils AI-Powered Fitness Series Amid Price Hikes, Staff Cuts, and Strategic Revamp (4:50): Elon Musk's xAI Lawsuit Challenges Apple-OpenAI Partnership Over Alleged AI Monopoly (7:09): IBM, AMD, and Zyphra Join Forces to Revolutionize…
  continue reading
 
In this episode of Cisco Champion Radio, we spotlight Cybersecurity Awareness Month and the resources available to help you strengthen your skills and defenses in an evolving threat landscape. With cyberattacks growing more sophisticated and the industry facing a global shortage of 4 million professionals, the need for education and training has ne…
  continue reading
 
Comparing Honeypot Passwords with HIBP Most passwords used against our honeypots are also found in the Have I been pwn3d list. However, the few percent that are not found tend to be variations of known passwords, extending them to find likely mutations. https://isc.sans.edu/diary/%5BGuest%20Diary%5D%20Comparing%20Honeypot%20Passwords%20with%20HIBP/…
  continue reading
 
(0:10): Opera Unveils Neon: AI-Powered Browser Revolutionizes User Experience with Automation, Privacy, and Web 3.0 Features (1:51): Meta Acquires Rivos Inc., Shifts to In-House AI Chips to Reduce Nvidia Dependency (3:49): Trump Unveils $100M AI Initiative to Revolutionize Pediatric Cancer Research Amid Funding Cuts (6:13): Cisco Unveils AI-Powered…
  continue reading
 
As AI becomes more integrated into the IT landscape, developers, engineers, and operators are looking for practical ways to use these new tools. Joining us today is Ryan Booth; he’s built a career around network automation, giving him a unique perspective on how network engineering, operations, software development, and AI intersect. We explore the…
  continue reading
 
Sometimes you don t even need to log in Applications using simple, predictable cookies to verify a user s identity are still exploited, and relatively recent vulnerabilities are still due to this very basic mistake. https://isc.sans.edu/diary/%22user%3Dadmin%22.%20Sometimes%20you%20don%27t%20even%20need%20to%20log%20in./32334 Western Digital My Clo…
  continue reading
 
Just as a detective must gather clues and consider all the evidence, ITOps teams investigating an outage must consider all available data points in context to understand where system failures likely occurred. Recent outages that impacted Starlink and Google Maps SDKs powerfully illustrated this point. Tune in to learn more about these incidents and…
  continue reading
 
In this episode of The Broadband Bunch, host Pete Pizzutillo sits down with Felix Virto, Director of Operations at Blue Streak, and Stephen Rose, CEO of Render Networks, to explore how funding realities, digital transformation, and AI are reshaping large-scale fiber builds. Felix shares his 29-year journey from climbing poles in southwest Virginia …
  continue reading
 
(0:10): GEMA Sues OpenAI: Landmark Case Tests AI's Use of Copyrighted Music in Europe (1:55): AI Mental Health Apps: Boon or Risk Without Regulation? Experts Call for Urgent Federal Oversight (4:06): DeepSeek Unveils Cost-Effective AI Model, Challenging OpenAI with Open-Source Innovation (6:37): NVIDIA Launches Open-Source Ecosystem to Revolutioniz…
  continue reading
 
In Episode 124 of Entangled Things, Patrick is joined by Vijoy Pandey, Senior Vice President of Outshift by Cisco. Together, they explore the future of quantum networking, the power of entanglement, and how these breakthroughs will shape the next generation of technology. Vijoy also shares an exciting announcement: the launch of Cisco’s Quantum Sof…
  continue reading
 
Apple Patches Apple released patches for iOS, macOS, and visionOS, fixing a single font parsing vulnerability https://isc.sans.edu/diary/Apple%20Patches%20Single%20Vulnerability%20CVE-2025-43400/32330 Increase in Scans for Palo Alto Global Protect Vulnerability (CVE-2024-3400). Our honeypots detected an increase in scans for a Palo Alto Global Prot…
  continue reading
 
(0:10): AI in Workplace: Potential Threat to Gender Pay Equality or Opportunity for Balance? (1:09): Lexroom Raises €16.2M to Expand AI-Driven Legal Platform Across Europe (3:03): Korea's ChatGPT Usage Quadruples as Kim Kyung-hoon Strengthens AI Hub Ambitions (4:17): Hong Kong Harnesses AI to Transform into Smart City, Bolster Tourism, and Enhance …
  continue reading
 
Converting Timestamps in .bash_history Unix shells offer the ability to add timestamps to commands in the .bash_history file. This is often done in the form of Unix timestamps. This new tool converts these timestamps into a more readable format. https://isc.sans.edu/diary/New%20tool%3A%20convert-ts-bash-history.py/32324 Cisco ASA/FRD Compromises Ex…
  continue reading
 
(0:10): Microsoft Integrates Anthropic's Claude AI to Boost Copilot Tools, Enhancing Enterprise Efficiency and Flexibility (2:11): Elon Musk's xAI Sues OpenAI for Trade Secret Theft, Sparking Major AI Legal Showdown (4:09): AI Revolutionizes Healthcare Analytics: Report Highlights Industry's Strategic and Technological Advancements (6:28): Cloudfla…
  continue reading
 
Webshells Hiding in .well-known Places Our honeypots registered an increase in scans for URLs in the .well-known directory, which appears to be looking for webshells. https://isc.sans.edu/diary/Webshells%20Hiding%20in%20.well-known%20Places/32320 Cisco Patches Critical Exploited Vulnerabilities Cisco released updates addressing already-exploited vu…
  continue reading
 
(0:10): Robot Umpires Set for 2026 MLB Debut Amid Mixed Reactions from Players and Managers (2:01): Google Photos Unveils AI 'Ask to Edit' for Effortless Voice-Driven Photo Enhancements (3:57): SAP and OpenAI Launch 'OpenAI for Germany' to Boost AI in Public Sector with Data Security Focus (6:32): Qualcomm Unveils Ambitious 6G Vision with AI-Driven…
  continue reading
 
Cybersecurity isn’t just about firewalls and passwords anymore. It’s an all-out battle where hackers run businesses with customer support desks, insider threats can be disguised as your newest hire, and artificial intelligence is both the weapon and the shield. In this special episode of IT Visionaries, host Chris Brandt switches roles and sits in …
  continue reading
 
Exploit Attempts Against Older Hikvision Camera Vulnerability Out honeypots observed an increase in attacks against some older Hikvision issues. A big part of the problem is weak passwords, and the ability to send credentials as part of the URL. https://isc.sans.edu/diary/Exploit%20Attempts%20Against%20Older%20Hikvision%20Camera%20Vulnerability/323…
  continue reading
 
Transforming over 5,000 network devices across 56 data centers is no small feat. Doing that with a very small team is even more impressive. On today’s episode, sponsored by Network To Code, we talk to Greg Botts from Intel, who with his team accomplished just that. They started with YAML files and DNS records and... Read more »…
  continue reading
 
(0:10): Global Coalition Urges AI 'Red Lines' by 2026 to Prevent Pandemics and Unemployment (2:09): EU Investigates Tech Giants Over Online Fraud Prevention Under Digital Services Act (3:53): Filevine Secures $400M to Elevate Legal Tech with AI Innovations, Valuation Hits $3 Billion (6:23): LSEG and Databricks Unite to Revolutionize AI in Finance, …
  continue reading
 
Distracting the Analyst for Fun and Profit Our undergraduate intern, Tyler House analyzed what may have been a small DoS attack that was likely more meant to distract than to actually cause a denial of service https://isc.sans.edu/diary/%5BGuest%20Diary%5D%20Distracting%20the%20Analyst%20for%20Fun%20and%20Profit/32308 GitHub s plan for a more secur…
  continue reading
 
(0:10): Nvidia Partners with Abu Dhabi's TII for Pioneering AI Lab, Expands Middle East Tech Influence (2:24): US Government Approves Meta's Llama AI for Federal Use: A Milestone in AI-Driven Governance (4:34): MediaTek Unveils Dimensity 9500: A Game-Changing Chip for AI, Gaming, and Power Efficiency (7:12): Tide Secures $120M to Expand AI-Driven F…
  continue reading
 
In this episode of The Broadband Bunch, host Pete Pizzutillo sits down with Lee Comer Jr., CEO of Go-Broadband, and Jeremiah Sloan of VETRO FiberMap to explore disaster recovery in the broadband industry. With extreme weather events increasingly impacting infrastructure, the conversation centers around real-world recovery efforts, the chaos of day-…
  continue reading
 
CISA Reports Ivanti EPMM Exploit Sightings Two different organizations submitted backdoors to CISA, which are believed to have been installed using Ivanti vulnerabilities patched in May. https://www.cisa.gov/news-events/analysis-reports/ar25-261a Lastpass Observes Impersonation on GitHub Lastpass noted a number of companies being impersonated via f…
  continue reading
 
(0:10): E-commerce Revolution: AI, AR, and Voice Commerce Redefine Shopping in 2025 (2:29): Nu Holdings Transforms Latin America's Banking with 70 Million Customers and $637M Profit Surge (5:19): UAE's AI Revolution: G42 Leads Multi-Sector Innovation Push Toward Global Leadership by 2027 (7:15): Lemonade and Impinj: AI Stocks Poised to Outshine XRP…
  continue reading
 
Help Wanted: What are these odd requests about? An odd request is hitting a number of our honeypots with a somewhat unusual HTTP request header. Please let me know if you no what the request is about. https://isc.sans.edu/forums/diary/Help+Wanted+What+are+these+odd+reuqests+about/32302/ Forta GoAnywhere MFT Vulnerability Forta s GoAnywhere MFT prod…
  continue reading
 
AI Transforms Swiss Digital Marketing, Boosting SME Efficiency and Campaign Success AI Ethics Crisis: Studies Show AI More Prone to Unethical Behavior Than Humans India Unveils 8 Foundational AI Models, Plans 570 Data Labs for Inclusive AI Growth Amazon Bedrock Launches Stability AI Image Tools for Seamless Enterprise Creative Workflows Major Secur…
  continue reading
 
Exploring Uploads in a Dshield Honeypot Environment This guest diary by one of our SANS.edu undergraduate interns shows how to analyze files uploaded to Cowrie https://isc.sans.edu/diary/Exploring%20Uploads%20in%20a%20Dshield%20Honeypot%20Environment%20%5BGuest%20Diary%5D/32296 Sonicwall Breach SonicWall MySonicWall accounts were breached via crede…
  continue reading
 
(0:10): Reddit Eyes Deeper Google Partnership, Seeks New AI Licensing Model Amid Revenue Surge (2:33): Zoom Unveils AI Companion 3.0: Revolutionizing Remote Work with Advanced AI Avatars and Tools (5:04): AI to Boost Global Trade by 40%, but Risks Widening Economic Divide, Warns WTO (7:43): New AI Model Delphi-2M Predicts Disease Risks, Faces Chall…
  continue reading
 
When your AI has to make decisions in the real world, the data you don’t have can hurt people. DiffuseDrive CEO Balint Pasztor joins IT Visionaries to unpack the $124B data scarcity problem holding back autonomous systems — and how synthetic data (done right) can compress years of data collection into hours. We dig into: why edge cases matter (and …
  continue reading
 
CTRL-Z DLL Hooking Attackers may use a simple reload trick to overwrite breakpoints left by analysts to reverse malicious binaries. https://isc.sans.edu/diary/CTRL-Z%20DLL%20Hooking/32294 Global Admin in every Entra ID tenant via Actor tokens As part of September s patch Tuesday, Microsoft patched CVE-2025-55241. The discoverer of the vulnerability…
  continue reading
 
Gain insights on the Red Sea subsea cable cuts; connectivity issues in China; and other recent service disruptions at Verizon, Google, and Mailchimp. ——— CHAPTERS 00:00 Intro 01:00 Red Sea Cable Cuts 05:35 Connectivity Issues in China 09:20 Verizon 10:46 Google 12:08 Mailchimp 13:05 Outage Trends: By the Numbers 15:07 Get in Touch ——— Want to get i…
  continue reading
 
Sustainability is no longer a “nice to have”—it’s quickly becoming a priority for businesses, boards, and communities across the globe. In this episode of Cisco Champion Radio, we explore how IT is playing a central role in driving sustainable outcomes and reshaping the future of buildings, products, and customer experiences. Our experts unpack Cis…
  continue reading
 
(0:10): OpenAI Unveils GPT-5-Codex: Revolutionizing Software Development with Autonomous AI Coding and Robust Safeguards (2:17): Figure AI Raises $1B for Humanoid Robots, Eyes 100,000 Units by 2027 Amid Industry Boom (4:30): Workday Acquires AI Firm Sana for $1.1B to Boost AI Integration Amid Stock Dip (6:29): UK Music Icons Unite Against AI Copyri…
  continue reading
 
Network Automation Nerds has reached a special milestone: episode 100! Eric Chou looks back on 5 years of conversations with network automation pioneers, practitioners, and visionaries. Drew Conry-Murray from the Packet Pushers joins Eric, along with online guest Ioannis Theodoridis, to find out why Eric started the podcast, his goals for all these…
  continue reading
 
Why You Need Phishing-Resistant Authentication NOW. The recent compromise of a number of high-profile npmjs.com accounts has yet again shown how dangerous a simple phishing email can be. https://isc.sans.edu/diary/Why%20You%20Need%20Phishing%20Resistant%20Authentication%20NOW./32290 S1ngularity/nx Attackers Strike Again A second wave of attacks has…
  continue reading
 
(0:10): AI-Powered Cybersecurity Firm Remedio Raises $65M, Targets Global Expansion with Autonomous Security Solutions (2:24): Deedy Das: Shaping the Future of AI Venture Capital at Menlo Ventures (4:42): DeepMind CEO Warns: AI Must Avoid Social Media's Harmful Patterns, Calls for Ethical Innovation (6:51): AI Chatbots Fuel Rise in Sophisticated Ph…
  continue reading
 
In this episode of The Broadband Bunch, host Brad Hine is joined by Jeff Boozer, VP of Broadband Strategy at ETI Software, and Don Eben, CEO of CORE Consults, for a conversation on what it really takes for broadband providers to succeed with artificial intelligence. While AI is being hailed as the future of telecom operations, the trio cuts through…
  continue reading
 
Loading …
Copyright 2025 | Privacy Policy | Terms of Service | | Copyright
Listen to this show while you explore
Play