Practical DevSecOps (a Hysn Technologies Inc. company) offers vendor-neutral and hands-on DevSecOps and Product Security training and certification programs for IT Professionals. Our online training and certifications are focused on modern areas of information security, including DevOps Security, AI Security, Cloud-Native Security, API Security, Container Security, Threat Modeling, and more.
…
continue reading
Cloud Security Podcasts
We will discuss all things Cloud with an emphasis on Cloud Security.
…
continue reading
Learn Cloud Security in Public Cloud the unbiased way from CyberSecurity Experts solving challenges at Cloud Scale. We can be honest because we are not owned by Cloud Service Provider like AWS, Azure or Google Cloud. We aim to make the community learn Cloud Security through community stories from small - Large organisations solving multi-cloud challenges to diving into specific topics of Cloud Security. We LIVE STREAM interviews on Cloud Security Topics every weekend on Linkedin, YouTube, Fa ...
…
continue reading
Dive deep into AI's accelerating role in securing cloud environments to protect applications and data. In each episode, we showcase its potential to transform our approach to security in the face of an increasingly complex threat landscape. Tune in as we illuminate the complexities at the intersection of AI and security, a space where innovation meets continuous vigilance.
…
continue reading
The podcast that tells true stories about the people making and breaking our digital world. We take listeners into the world of cyber and intelligence without all the techie jargon. Every Tuesday and Friday, former NPR investigations correspondent Dina Temple-Raston and the team draw back the curtain on ransomware attacks, mysterious hackers, and the people who are trying to stop them.
…
continue reading
Get exam-ready with the BareMetalCyber Audio Course, your on-demand guide to conquering the CompTIA Cloud+ (CV0-003). Each episode transforms complex topics like cloud design, deployment, security, and troubleshooting into clear, engaging lessons you can apply immediately. Produced by BareMetalCyber.com, where you’ll also find more prepcasts, books, and tools to fuel your certification success.
…
continue reading
Cloud Security Podcast by Google focuses on security in the cloud, delivering security from the cloud, and all things at the intersection of security and cloud. Of course, we will also cover what we are doing in Google Cloud to help keep our users' data safe and workloads secure. We're going to do our best to avoid security theater, and cut to the heart of real security questions and issues. Expect us to question threat models and ask if something is done for the data subject's benefit or ju ...
…
continue reading
Weekly information security podcast airing Monday mornings hosted by Oscar Minks and Brad Nigh. In a unique focus on protecting personal information, Oscar and Brad discuss information security as an issue that includes cyber security, physical security, as well as administrative controls. Oscar is the CTO of FRSecure and heads technical services and operations at the company. Brad is the Principal Security Consultant and a 20+ year veteran of the industry.
…
continue reading
Ctrl+Alt+Azure offers weekly conversations on Microsoft Azure, cloud strategy, security, identity, and generative AI - focused on what matters for architects, developers, CIOs, and CISOs. Hosted by industry experts Tobias Zimmergren and Jussi Roine.
…
continue reading
The BCM Daily Cyber News brings you clear, timely updates on threats, breaches, patches, and trends every day. Stay informed in minutes with focused audio built for busy professionals. Learn more and explore at BareMetalCyber.com.
…
continue reading
Explore the life of a security leader with NetSPI Field Chief Information Security Officer (CISO) Nabil Hannan. Hear how CISOs with diverse expertise tackle the challenges and opportunities that come with life on the frontlines of cybersecurity.
…
continue reading
Cloud Do You Do? is a podcast full of interviews about cloud and IT related topics with special guests from the world of startups and corporates. When you build or scale business everything seems more important than IT infrastructure. We show you the opposite is the truth. Get comfy in the cloud with us. Powered by Revolgy.
…
continue reading
Cyber Security can be a difficult field to not only understand but to also navigate. Joe South is here to help with over a decade of experience across several domains of security. With this podcast I hope to help more people get into IT and Cyber Security as well as discussing modern day Cyber Security topics you may find in the daily news. Come join us as we learn and grow together!
…
continue reading
Valorem Reply, part of the Reply Group companies, is a business innovation and transformation firm focused on driving change with unique digital solutions, strategic technology investments and design-led user experiences. Through the expertise of our people and power of Microsoft technologies, our innovative strategies and solutions securely and rapidly transform the way our clients do business. Follow our podcast to get insights on the latest digital transformation trends & updates on Micro ...
…
continue reading
Join hosts Ned Bellavance and Kyler Middleton as they dive deep into the challenges of DevOps from the perspective of seasoned practitioners. You'll hear from expert guests—technical leaders, trainers, and consultants with years of hands-on experience—discussing the nuances of DevOps. From AWS to Azure, networking to security, automation to modern cloud environments, each weekly episode equips you with the insights to confidently address tech and business challenges such as resilience, cost ...
…
continue reading
CDW Canada Tech Talks: Discussing the Latest Technology Innovations Experts from CDW and our partners tackle hot topics including generative AI, FinOps, the new cybersecurity landscape and more.
…
continue reading
Smooth Scaling: System Design for High Traffic focuses on all things scalability, reliability, and performance. Tune in for expert advice on how to scale systems, control costs, boost availability, optimize performance, and get the most out of your tech stack. Host Jose Quaresma is the VP of Technical Engagement at Queue-it, working on the frontlines with some of the world’s biggest businesses on their busiest days, from Ticketmaster to Zalando to Home Office U.K. He’ll be joined by experts ...
…
continue reading
Welcome to Behind the Binary, the podcast that introduces you to the fascinating people, technology, and tools driving the world of reverse engineering. Join your host, Josh Stroschein, a reverse engineer with the FLARE team at Google, and someone passionate about sharing knowledge and shedding light on the art of reverse engineering, as he sits down with intriguing guests to explore the human side of this profession. Behind the Binary goes beyond the code, sharing the stories, motivations, ...
…
continue reading
Tresorit's own produced podcast, bringing you biweekly insights on business, security and technology. If you have any questions or feedback, please write to us at [email protected].
…
continue reading
A podcast for Salesforce Admins who are solving problems in the cloud.
…
continue reading
Oracle University Podcast delivers convenient, foundational training on popular Oracle technologies such as Oracle Cloud Infrastructure, Java, Autonomous Database, and more to help you jump-start or advance your career in the cloud.
…
continue reading
DTX Unplugged delves into the major challenges and innovations shaping business transformation, embodying our event's focus on the critical intersection of people, process, and technology. While rooted in the DTX ethos, this will be an industry-focused platform, tackling key issues, spotlighting groundbreaking innovations, and raising awareness for important topics across the sector.
…
continue reading
Stay up to date with the Nextcloud community!
…
continue reading
Welcome to IGEL Weekly, the podcast that explores the future of endpoint management and cloud workspaces. Hosted by XenTegra, this show dives deep into IGEL’s next-generation edge OS solutions. Discover how IGEL delivers extreme hardware cost savings, reduced operating expenses, and a more secure, streamlined platform for endpoint management across nearly any x86 device. Each week, we’ll unpack the latest industry trends, IGEL updates, and actionable insights to help you optimize your IT env ...
…
continue reading
The daily cybersecurity news and analysis industry leaders depend on. Published each weekday, the program also includes interviews with a wide spectrum of experts from industry, academia, and research organizations all over the world.
…
continue reading
…
continue reading
Gain unparalleled access to the minds of industry-leading CIOs, CTOs, and CISOs. Enjoy episodes filled with expert insights, inspiring stories, and trend analysis, all brought to you by the people shaping the future of technology. Whether you're an IT professional, aspiring tech leader, or general tech enthusiast, IT Visionaries has something for everyone. Don't miss out on the chance to learn from the best – subscribe now! Produced by the team at Mission.org and brought to you by Brightspot.
…
continue reading
Cloud Ace is your go-to podcast for in-depth expert discussions on all topics that touch cloud security. Information security professionals can tune in for fresh perspectives on building and managing secure cloud infrastructure, platforms, and applications. The insight shared by our experts on this podcast transcends cloud, making it valuable for professionals across all fields of cyber security. Brought to you by SANS Institute, Cloud Ace podcast delivers actionable insight through intervie ...
…
continue reading
🌟 **Unlock the Power of the Cloud! 🚀** Join us for an exhilarating new season focused on mastering cloud computing and AWS security. This series will cover essential certification topics, provide expert insights, and offer hands-on practices to enhance your skills each week. Whether you are a novice or seeking to deepen your understanding, this program is tailored for you. Season 1 Episodes 1-14: CompTIA Security+ 601 Episodes 15-52: Certified Cloud Security Professional (CCSP) Season 2 Epis ...
…
continue reading
Welcome to the Security Intelligence Podcast, where we discuss cyber security industry analysis, tips and success stories. Join co-hosts Pam Cobb and David Moulton, security thought leaders and industry professionals as they discuss their experiences and expertise on the latest trends and developments in enterprise security. For even more security content, visit https://securityintelligence.com. 095940
…
continue reading
HashiCast is a podcast about the world of DevOps and cloud technology produced by HashiCorp, an IBM company.
…
continue reading
The Practical 365 Podcast is a fortnightly show covering all things Microsoft 365, Copilot, AI, MIcrosoft Teams, Exchange & Cybersecurity plus any hot technology topics that are worth a deep-dive to help you learn more and get the real-world view. Your hosts are Microsoft MVPs Steve Goodman, Paul Robichaux and Quest's Bastiaan Verdonk, who will share their expert opinions on the talk of the week, and Q&A with special guests.
…
continue reading
The Official AWS Podcast is a podcast for developers and IT professionals looking for the latest news and trends in storage, security, infrastructure, serverless, and more. Join Simon Elisha and Hawn Nguyen-Loughren for regular updates, deep dives, launches, and interviews. Whether you’re training machine learning models, developing open source projects, or building cloud solutions, the Official AWS Podcast has something for you.
…
continue reading
Define your digital roadmap. Weekly podcasts featuring specialists from across the S&P Global Market Intelligence research team offer deep insights into what's new and what's next in technology, industries and companies as they design and implement digital infrastructure. To learn more, visit: https://www.spglobal.com/marketintelligence/en/topics/tmt-news-insights
…
continue reading
The purpose of "FounderStoriez Channel" is to interview Entrepreneurs from around the world to share their story, experience, and wisdom with you so you can learn from them and be inspired.
…
continue reading
Welcome to Hot or Hype, the podcast where hosts Olivia Storelli and Andrew Stevens break down the latest trends in cloud computing, data engineering, AI, and cybersecurity - and decide whether they're game-changing innovations or just industry buzz. In each episode, we dive into topics like AI-driven predictive analytics, cloud-native architectures, zero trust security, data mesh, and more, giving you real-world insights from practitioners who know what works and what doesn't. No fluff. No h ...
…
continue reading
Join us for Simply Defensive, a podcast dedicated to exploring the world of defensive cybersecurity through the lens of real-world experts. In each episode, we'll interview leading professionals from the cybersecurity industry, delving into their experiences, challenges, and innovative solutions. Whether you're a seasoned cybersecurity veteran or just starting to learn about the field, Simply Defensive offers valuable insights and practical advice to help you stay ahead of the curve. Tune in ...
…
continue reading
Sync Up is your one-stop shop for all things OneDrive. Join hosts, Stephen Rice and Arvind Mishra, as they shed light on how OneDrive connects you to all of your files in Microsoft and enables you to share and work together from anywhere, and any device! Hear from experts behind the design and development of OneDrive, as well as customers and Microsoft MVPs! Each episode will give you news and announcements, tips and best practices for your OneDrive experience, and some fun and humor!
…
continue reading
Interviews from Bret Fisher's live show with co-host Nirmal Mehta. Topics cover container and cloud topics like Docker, Kubernetes, Swarm, Cloud Native development, DevOps, SRE, GitOps, DevSecOps, platform engineering, and the full software lifecycle. Full show notes and more info available at https://podcast.bretfisher.com
…
continue reading
The Bare Metal Cyber CCISO Audio Course is your complete, executive-level training companion for mastering the Certified Chief Information Security Officer (CCISO) certification. Built for experienced cybersecurity professionals and strategic leaders, this Audio Course delivers over seventy focused episodes covering every domain, concept, and competency area tested on the official EC-Council exam. From governance, risk, and compliance to strategic planning, vendor oversight, and technical co ...
…
continue reading
Cybersecurity Innovation Podcast is the show that experts in their field share the lessons they've learned, the tactics they use, and all other things that are driving innovation in the field.
…
continue reading
Your Microsoft Cloud News from a couple of IT Pros
…
continue reading
The State of Enterprise IT Security is the show for technology leaders looking for actionable and approachable guidance in the security landscape. The show features Brad Bussie, the CISO of e360, a premier technology solutions provider. In each episode, Brad covers 3 timely topics in each episode impacting the enterprise security landscape.
…
continue reading
We are two brothers focusing 100% on Amazon Web Services (AWS). Every other week, one of us prepares the topic of the podcast. The topic is not known to the other one, which results in surprising conversations about all things AWS. Typically, we are covering the following topics: DevOps, Serverless, Container, Security, Infrastructure as Code, Container, Continuous Deployment, S3, EC2, RDS, VPC, IAM, VPC, and many more.
…
continue reading
The Cloud Lounge podcast is a monthly conversation of approximately 20min about how cloud technology can help businesses shape their digital future in all kinds of ways.
…
continue reading
Join Chris and Tim as they delve into the Cloud Networking world! The goal of this podcast is to help Network Engineers with their Cloud journey. Follow us on Twitter @Cables2Clouds | Co-Hosts Twitter Handles: Chris - @bgp_mane | Tim - @juangolbez
…
continue reading
1
EP253 The Craft of Cloud Bug Hunting: Writing Winning Reports and Secrets from a VRP Champion
28:09
28:09
Play later
Play later
Lists
Like
Liked
28:09Guests: Sivanesh Ashok, bug bounty hunter Sreeram KL, bug bounty hunter Topics: We hear from the Cloud VRP team that you write excellent bugbounty reports - is there any advice you'd give to other researchers when they write reports? You are one of Cloud VRP's top researchers and won the MVH (most valuable hacker) award at their event in June - wha…
…
continue reading
1
94-Talking Cloud Podcast with Eran Orzel, CEO of CyTwist
1:01:15
1:01:15
Play later
Play later
Lists
Like
Liked
1:01:15In this episode of Talking Cloud, I interview Eran Orzel, CEO of CyTwist where we discuss the evolving landscape of cybersecurity. We explore the challenges organizations face in protecting against cyber threats, the innovative profiling approach that CyTwist employs, and the role of AI in enhancing security measures. Eran shares insights from his …
…
continue reading
1
EP19 The Art of Deconstructing Problems: Tools, Tactics, and the ScatterBrain Obfuscator with Nino Isakovic
1:53:18
1:53:18
Play later
Play later
Lists
Like
Liked
1:53:18In this episode, we’re joined by Nino Isakovic, a long-time low-level security expert, for a thought-provoking conversation that spans the foundational and the cutting-edge. Nino discusses the art of deconstructing problems—sharing insights on how to learn effectively, the building blocks of a robust RE toolkit, and the critical shift required in o…
…
continue reading
1
How to Build Trust in an AI SOC for Regulated Environments
42:15
42:15
Play later
Play later
Lists
Like
Liked
42:15How do you establish trust in an AI SOC, especially in a regulated environment? Grant Oviatt, Head of SOC at Prophet Security and a former SOC leader at Mandiant and Red Canary, tackles this head-on as a self-proclaimed "AI skeptic". Grant shared that after 15 years of being "scared to death" by high-false-positive AI, modern LLMs have changed the …
…
continue reading
1
Understanding Security Risks and Threats in the Cloud - Part 1
14:11
14:11
Play later
Play later
Lists
Like
Liked
14:11This week, Lois Houston and Nikita Abraham are joined by Principal OCI Instructor Orlando Gentil to explore what truly keeps data safe, and what puts it at risk. They discuss the CIA triad, dive into hashing and encryption, and shed light on how cyber threats like malware, phishing, and ransomware try to sneak past defenses. Cloud Tech Jumpstart: h…
…
continue reading
1
AI Compliance Security: How Modular Systems Transform Enterprise Risk Management with Richa Kaul
31:00
31:00
Play later
Play later
Lists
Like
Liked
31:00AI-Powered Compliance: Transforming Enterprise Security In this episode of Cyber Sentries, John Richards speaks with Richa Kaul, CEO and founder of Complyance. Richa shares insights on using modular AI systems for enterprise security compliance and discusses the critical balance between automation and human oversight in cybersecurity. Why Enterpris…
…
continue reading
1
D2DO286: Scaling Kubernetes Across Clouds – Identity, DNS, and Security
40:39
40:39
Play later
Play later
Lists
Like
Liked
40:39If you think managing Kubernetes clusters is hard, what about managing Kubernetes clusters across three different public clouds? We dive into the challenges that arises from running multi-cloud Kubernetes workloads. These challenges include workload identity, DNS query resolutions, and security. Here to help us navigate this complexity and offer po…
…
continue reading
1
Navigating ISO 27001 and Multi-Cloud with Security Architect Gabor Sivók
24:44
24:44
Play later
Play later
Lists
Like
Liked
24:44In this episode, Gabor Sivók, Cloud Security Architect at Queue-it, shares a practical look at what it takes to secure large-scale systems in today’s cloud environments. He walks through Queue-it’s journey to ISO 27001 certification, the real trade-offs between security and performance, and how security practices adapt in multi-cloud setups. Gabor …
…
continue reading
1
318 - A look at the new Zero Trust assessment tool from Microsoft
29:19
29:19
Play later
Play later
Lists
Like
Liked
29:19In this episode, we take a look at the new Microsoft Zero Trust Assessment tool. We reflect on Zero Trust in general, its application in the Microsoft security landscape, and what this exciting tool will offer you. (00:00) - Intro and catching up. (05:00) - Show content starts. Show links - Microsoft Zero Trust Assessment tool - Demo of Microsoft Z…
…
continue reading
1
VibeCode Episode 6 - Accelerating Innovation with Vibe Coding
4:22
4:22
Play later
Play later
Lists
Like
Liked
4:22In the final episode of VibeCode, we explore how Valorem Reply combines research, strategy, and engineering with Vibe Coding to help organizations reduce risk, accelerate time-to-market, and turn bold ideas into real-world innovation. Follow us on social media - LinkedIn Twitter YouTube Facebook Reach out to us - Website Email Us…
…
continue reading
CISA warns of spyware targeting messaging apps. CodeRED, this is not a test. Infostealer campaign spreads via malicious Blender files. Shai-Hulud’s second coming. Real estate finance firm SitusAMC investigates breach. Dartmouth College discloses Oracle EBS breach. Dave Bittner is joined by Tim Starks, Senior reporter from CyberScoop, to discuss the…
…
continue reading
This is today’s cyber news for November 25th, 2025. The brief follows a sweeping set of stories: a self-spreading JavaScript supply-chain attack leaking developer secrets, AI clusters hijacked through exposed orchestration tools, and quiet flaws in cloud logging and Windows update infrastructure that can turn basic plumbing into a takeover path. We…
…
continue reading
We tend to picture cyberattacks as distant battles—state hackers, big targets, glowing maps of global chaos. But often, the frontlines are more local: a water plant, a 911 system, the power lines outside your window. In this CyberMonday crossover with WAMU’s 1A, we examine a small-town breach, the fragility of our digital infrastructure—and what it…
…
continue reading
1
A midseason takeaway. [CISO Perspectives]
46:37
46:37
Play later
Play later
Lists
Like
Liked
46:37In this mid-season episode, Kim takes a step back to reflect on the conversations he has had so far. During the episode, Kim sits down with N2K's own Ethan Cook to connect the dots across episodes, diving into how new technologies are impacting longstanding challenges, both from a security standpoint and from an attacker's view. Whether you're catc…
…
continue reading
The latest Big Picture reports are out and cover a wide range of topics from financial markets to supply chains and onward to technology and AI. Two of the authors, Lindsey Hall and Chris Rogers, join host Eric Hanselman to talk about sustainability, supply chains and AI. These are tightly interwoven and their dependencies spill out into geopolitic…
…
continue reading
CrowdStrike fires an insider who allegedly shared screenshots with hackers. Google agrees, it wasn’t Salesforce. Cox Enterprises confirms Oracle EBS breach. Alleged Transport for London hackers plead not guilty. Hackers exploit new WSUS bug to deploy ShadowPad backdoor. Iberia discloses breach of customer data. Harvard discloses voice-phishing brea…
…
continue reading
1
AI Security Certification: The Ultimate Guide to the Certified AI Security Professional (CAISP) course
50:35
50:35
Play later
Play later
Lists
Like
Liked
50:35Episode: Securing AI Systems - A Deep Dive into AI Security with Marudhamaran Gunashekaran In this episode, Jeremy Daly, Cybersecurity Lead at Lumifi, sits down with Marudhamaran Gunashekaran, Principal Security Consultant and Lead Author of the Certified AI Security Professional (CAISP) course at Practical DevSecOps (a Hysn Technologies company). …
…
continue reading
1
Building Zero Trust Tools: Inside ThreatLocker with Product Manager Yuriy Tsibere
36:28
36:28
Play later
Play later
Lists
Like
Liked
36:28In this episode of Simply Defensive, hosts Josh Mason and Wade Wells welcome Yuriy Tsibere, Product Manager at ThreatLocker, for a behind-the-scenes look at how security products actually get built. Yuriy's path to cybersecurity started in Ukraine, where he worked in telecom during sophisticated APT campaigns that lasted over a year. Now at ThreatL…
…
continue reading
1
Solving the AI compute crisis through decentralization with Tobias Adler
32:28
32:28
Play later
Play later
Lists
Like
Liked
32:28Why 80% of AI funding goes to cloud bills (and how to fix it) In this episode of Cloud Do You Do, Štěpán Kaiser from Revolgy sits down with Tobias Adler, CEO and founder of nuco.cloud — the first crypto startup ever to receive a grant from the German government. Tobias explains how his need for massive computing power to run stock trading bots in 2…
…
continue reading
1
#747: Unpacking Automated Reasoning: From Mathematical Logic to Practical AI Security
38:02
38:02
Play later
Play later
Lists
Like
Liked
38:02Discover how AWS leverages automated reasoning to enhance AI safety, trustworthiness, and decision-making. Byron Cook (Vice President and Distinguished Scientist) explains the evolution of reasoning tools from limited, PhD-driven solutions to scalable, user-friendly systems embedded in everyday business operations. He highlights real-world examples…
…
continue reading
This is today’s cyber news for November twenty fourth, twenty twenty five. Today’s brief walks through a Gainsight supply chain breach that puts Salesforce customer data in play, an actively exploited flaw in Oracle Identity Manager, and a critical Azure Bastion bug that weakens a key cloud safety rail. You will also hear how a Grafana Enterprise i…
…
continue reading
1
How realistic is A House of Dynamite? [T-Minus Deep Space]
36:03
36:03
Play later
Play later
Lists
Like
Liked
36:03The new Netflix movie A House of Dynamite, chronicles what happens when the unthinkable unfolds. How realistic is it? We ask the movie’s advisor and expert, Lieutenant General Daniel Karbler (Ret.). Remember to leave us a 5-star rating and review in your favorite podcast app. Be sure to follow T-Minus on LinkedIn and Instagram. Want to hear your co…
…
continue reading
1
From Sewers To Subsea: Rethinking Data Centers And Defense
53:30
53:30
Play later
Play later
Lists
Like
Liked
53:30Send us a text We trace a winding path from offshore rigs to elite red team ops and into subsea data centers, using one sewer-side breach as the spark for a new way to secure and scale compute. Along the way we unpack social engineering basics, the blue vs red culture clash, and whether AI is building features or changing outcomes. • junk folders, …
…
continue reading
1
Jacques Benkoski (USVP): Money, Mentors & The Lost Art of Venture Capital
51:08
51:08
Play later
Play later
Lists
Like
Liked
51:08Jacques Benkoski, Managing Partner at USVP, joins the show for a candid, wise, and insightful conversation on venture capital, company building, and life. Jacques opens up about: Growing up without money and raising kids young The emotional moment he finally felt financially secure Why are many serial entrepreneurs driven by unresolved childhood sc…
…
continue reading
1
Satya Gupta: Rising to your contribution. [CTO] [Career Notes]
9:55
9:55
Play later
Play later
Lists
Like
Liked
9:55Please enjoy this encore of Career Notes. Co-founder and CTO of Virsec, Satya Gupta shares his story of how he has over 25 years of expertise in embedded systems, network security and systems architecture. He also talks about how a colleague of his told him something that resinated with him, he said " that was really a remarkable statement that I h…
…
continue reading
1
DataTribe's Cyber Innovation Day: Cyber: The Wake of Tech Innovation. [Special Edition]
47:53
47:53
Play later
Play later
Lists
Like
Liked
47:53On this Special Edition podcast, we share a panel from DataTribe's Cyber Innovation Day 2025, "Cyber: The Wake of Tech Innovation." The podcast tech host panel included Dave Bittner, host of CyberWire Daily podcast, Maria Varmazis, host of T-Minus Space Daily podcast, and Daniel Whitenack, co-host of Practical AI podcast, sharing a wide-ranging dis…
…
continue reading
1
Two RMMs walk into a phish… [Research Saturday]
24:00
24:00
Play later
Play later
Lists
Like
Liked
24:00Alex Berninger, Senior Manager of Intelligence at Red Canary, and Mike Wylie, Director, Threat Hunting at Zscaler, join to discuss four phishing lures in campaigns dropping RMM tools. Red Canary and Zscaler uncovered phishing campaigns delivering legitimate remote monitoring and management (RMM) tools—like ITarian, PDQ, SimpleHelp, and Atera—to gai…
…
continue reading
Cyber Command names a new head of AI. The UK introduces its long-delayed Cyber Security and Resilience Bill. Researchers highlight a critical Oracle Identity Manager flaw. Salesforce warns customers of a third-party data breach. Italy’s state-owned railway operator leaks sensitive information. SonicWall patches firewalls and email security devices.…
…
continue reading
1
Microsoft Ignite 2025: Copilot Updates, Agent 365 & SharePoint Turns 25 - Practical 365 Podcast S04E46
56:52
56:52
Play later
Play later
Lists
Like
Liked
56:52Ignite 2025 delivered major updates across Microsoft 365. In this episode, we discuss: Agent 365: Public preview now. Manage AI agents like identities with Entra Agent ID, renamed app registrations, and Teams app visibility. Copilot updates: Work IQ adds proactive personalization. Voice in Outlook Mobile for hands-free triage and scheduling (early …
…
continue reading
This is today’s cyber news for November 21st, 2025. Today’s brief connects front-line cyber operations to real-world impact, from Iran-aligned hackers using ship tracking data to support a failed missile strike to China-linked BadAudio espionage quietly harvesting government and telecom secrets. We spotlight active exploitation of Fortinet’s FortiW…
…
continue reading
Milo Comerford has been studying online extremism for more than a decade. He’s watched ideologies rise and fall, platforms shift, and tactics mutate. Now, as kids fall into violent online communities with no ideology at all, Milo says we’re overdue for a new playbook. Today: the solutions he thinks might actually work. Learn about your ad choices: …
…
continue reading
1
Inside Jingle Thief Cloud Fraud Unwrapped [Threat Vector]
36:10
36:10
Play later
Play later
Lists
Like
Liked
36:10In this special episode of Threat Vector, host David Moulton, Senior Director of Thought Leadership for Unit 42, sits down with Stav Setty, Principal Researcher at Palo Alto Networks, to unpack Jingle Thief a cloud-only, identity-driven campaign that turned Microsoft 365 into a gift card printing press. Stav explains how the Morocco based group kno…
…
continue reading
The US and allies sanction Russian bulletproof hosting providers. The White House looks to sue states over AI regulations. The US Border Patrol flags citizens’ “suspicious” travel patterns. Lawmakers seek to strengthen the SEC’s cybersecurity posture. A new Android banking trojan captures content from end-to-end encrypted apps. A hidden browser API…
…
continue reading
1
Episode 415 – Diving Into Ignite 2025 for IT Pros and AI Agent Management
30:05
30:05
Play later
Play later
Lists
Like
Liked
30:05Welcome to Episode 415 of the Microsoft Cloud IT Pro Podcast. Ben and Scott discuss the major announcements from Microsoft Ignite 2025, focusing on the dominant themes of AI agents and security. The conversation centers on three key areas: Security Copilot updates, Agent 365 for governance, and the broader security and management implications for I…
…
continue reading
This is today’s cyber news for November 20th, 2025. Today’s brief tracks how fragile our internet plumbing has become, from hijacked home routers and a major Cloudflare outage to record-setting attacks against Azure and a fresh browser flaw already under exploitation. You will hear how a massive botnet built from aging ASUS routers, a FortiWeb zero…
…
continue reading
The promise of agentic AI has been massive, autonomous systems that act, reason, and make business decisions, but most enterprises are still struggling to see results. In this episode, host Chris Brandt sits down with Sumeet Arora, Chief Product Officer at Teradata, to unpack why the gap exists between AI hype and actual impact, and what it takes t…
…
continue reading
1
Unsecurity Episode 251: Practicing Personal Cybersecurity with Coral Morgan & Cory Hanks
21:33
21:33
Play later
Play later
Lists
Like
Liked
21:33Coming off Cybersecurity Awareness Month and into the holidays, this season is the perfect time to reflect on personal cybersecurity practices. Information Security Consultant, Coral Morgan, and IR Case Manager, Cory Hanks, join this episode to provide tips and cybersecurity practices for all age groups. Like, subscribe, and share with your network…
…
continue reading
1
The oversized file that stalled the internet.
29:46
29:46
Play later
Play later
Lists
Like
Liked
29:46Cloudflare’s outage is rooted in an internal configuration error. The Trump administration is preparing a new national cyber strategy. CISA gives federal agencies a week to secure a new Fortinet flaw. MI5 warns that China is using LinkedIn headhunters and covert operatives to target lawmakers. Experts question the national security risks of TP-Link…
…
continue reading
Ever wonder what it takes to level up your career in data science? Senior Data Scientist Darya Petrashka joins Ned and Kyler to share her personal journey from management and linguistics into data science, the real difference between a junior and a senior role, and helps us get under the “data science umbrella” to see... Read more »…
…
continue reading
1
317 - Reflections from Microsoft Ignite 2025
40:09
40:09
Play later
Play later
Lists
Like
Liked
40:09Microsoft Ignite 2025 is here! We reflect on the hero announcements and what they mean for the future. Some exciting announcements were made during the first keynote, and we already had a chance to try a few of them out. (00:00) - Intro and catching up. (03:35) - Show content starts. Show links - ESPC’25 in Dublin - Microsoft Agent 365 - Security C…
…
continue reading
This is today’s cyber news for November 19th, 2025. Today’s brief covers a global Cloudflare outage that briefly knocked major sites offline, a French childcare payroll breach affecting about one point two million people, and a Dutch police takedown of crime-friendly hosting servers. You will also hear about an urgent Google Chrome zero-day fix and…
…
continue reading
Send us a text Networks can sometimes feel like a maze of licenses, tunnels, and 2 a.m. pager alerts. We sit down with Graphiant CEO Ali Shaikh to unpack how Network as a Service makes connectivity on-demand, consumption-based, and finally as flexible as the cloud it serves. From the SD-WAN wave to the pandemic reset, Ali explains why the old build…
…
continue reading
Cloudflare suffers a major outage. Google issues an emergency Chrome update. Logitech discloses a data breach. CISA plans a major hiring push. The House renews the State and Local Cybersecurity Grant Program. The GAO warns military personnel are oversharing online. Tech groups urge governments worldwide to reject proposals that weaken or bypass enc…
…
continue reading
This is today’s cyber news for November eighteenth, twenty twenty five. In this episode, you will hear how a third-party breach at a major political advocacy group, new North Korean supply chain malware, and data theft from a state attorney general’s office are reshaping the privacy and regulatory picture. We also cover active exploitation of a For…
…
continue reading
Across the internet, groups like 764 are redefining extremism: less about beliefs, more about chaos. We look at how the movement works, who it attracts, and why stopping it is so challenging. Learn about your ad choices: dovetail.prx.org/ad-choicesBy Recorded Future News
…
continue reading