Endpoint Management Today is a podcast brought to you by Rhonda and James from the BigFix team. Listen in to understand how IT operations and security teams fully automate discovery, management and remediation of endpoints – whether on-premise, virtual, or cloud – regardless of operating system, location or connectivity. Hear from technical experts, customers, thought leaders and more as we bring you new episodes each month. FIND more. FIX more. DO more.
…
continue reading
Endpoint Security Podcasts
Join us on Proofpoint’s Insider Insight, the podcast where we delve deep into the intricate realm of Endpoint Data Loss Prevention (DLP) and Insider Threat Management (ITM). In each episode, we unravel the complexities of safeguarding your organization's sensitive information by adopting a people-centric approach to managing insider threats. From inadvertent mistakes to malicious intent, insider threats pose a significant risk to the confidentiality and integrity of your data. This podcast i ...
…
continue reading
Welcome to Perimeter Perspective, the podcast where we explore the strategies, challenges, and innovations shaping the future of cybersecurity and IT management. Hosted by the experts at Next Perimeter, this show dives into zero trust principles, cloud-first solutions, and the evolving role of technology in modern businesses. Whether you’re an IT leader, business owner, or tech enthusiast, Perimeter Perspective offers actionable insights and engaging discussions to help you secure your digit ...
…
continue reading
Sync Up is your one-stop shop for all things OneDrive. Join hosts, Stephen Rice and Arvind Mishra, as they shed light on how OneDrive connects you to all of your files in Microsoft and enables you to share and work together from anywhere, and any device! Hear from experts behind the design and development of OneDrive, as well as customers and Microsoft MVPs! Each episode will give you news and announcements, tips and best practices for your OneDrive experience, and some fun and humor!
…
continue reading
Welcome to IGEL Weekly, the podcast that explores the future of endpoint management and cloud workspaces. Hosted by XenTegra, this show dives deep into IGEL’s next-generation edge OS solutions. Discover how IGEL delivers extreme hardware cost savings, reduced operating expenses, and a more secure, streamlined platform for endpoint management across nearly any x86 device. Each week, we’ll unpack the latest industry trends, IGEL updates, and actionable insights to help you optimize your IT env ...
…
continue reading
Join us at the intersection of networking and security! Whether you’re fending off ransomware attacks, securing remote workers, hunting for rogue IoT devices, or gearing up for your latest compliance audit, Packet Protector provides practical information that IT and infrastructure pros can put to work. Every episode covers the latest security headlines and then drills into essential topics to provide technical and strategic insights on wired and wireless network security, access control, clo ...
…
continue reading
How does GDPR, data privacy, and data protection impact your business? In this podcast, Tom Fox, the Voice of Compliance, hosts Data Privacy/Data Security expert Jonathan Armstrong, co-founder of Cordery Compliance. They use the framework of GDPR to discuss a wide range of issues relating to data privacy and data protection. If you are a compliance professional, business leader, or InfoSec security expert, this is the podcast to learn about what is happening in the UK, EU, US, and beyond.
…
continue reading
Young Professionals in Technology is a community that helps foster your burgeoning tech career, no matter what “age” you are.
…
continue reading
Each week, Embedded Computing Design’s EVP Rich Nass speaks to an executive in the embedded industry to understand what’s happening with the latest products, standards, and trends. The frank discussions reveal the real, behind the scenes issues, so the design community knows what’s coming down the pike. Topics covered in artificial intelligence, machine learning, embedded systems, internet of things, industrial automation, automotive applications, open source and more.
…
continue reading
A fun and informative cybersecurity audio glossary from N2K.
…
continue reading
IGEL provides the next-gen edge OS for cloud workspaces. Their solutions offer you extreme CAPEX hardware cost savings, sharply reduced ongoing operating expenses, and a more secure and manageable endpoint management and control platform across nearly any x86 device. We will discuss the endpoint trends in the industry, IGEL updates, and general news. XenTegra is THE preferred IGEL partner
…
continue reading
Nozomi Networks security experts discuss topics that are important to the OT and IoT security community. This includes current cybersecurity threat intelligence, trends, news, and challenges. If you work in security or operations, or if you are a researcher, you’ll find episodes of interest.
…
continue reading
Cyber security is dynamic and fast changing. Keep up-to-date with the latest news, vulnerabilities, threats and new research. For latest cyber security blogs, visit https://rasoolirfan.com and tweet @ → twitter.com/rasoolirfan
…
continue reading
If you're a managed security provider (MSP), managed security service provider (MSSP), virtual CISO, or a cybersecurity professional looking for insights and advice on ways to build bridges with your clients (or vice versa), look no further than Cyber for Hire | The Managed Security Podcast! Presented in partnership with MSSP Alert and ChannelE2E, Cyber for Hire, is a weekly 60-minute podcast (in two 30-minute segments) hosted by Ryan Morris, Principal Consultant at Morris Management Partner ...
…
continue reading
Bradley Chambers and various experts discuss the latest with Apple in the enterprise and K-12. New episodes come out bi-weekly on Tuesday.
…
continue reading
IT talk with a healthy dose of empathy: Hosts Matt Yette & Matt Cozzolino draw on their combined 40+ years of infrastructure experience as they discuss the ever-changing technology landscape – from virtualization to storage, security to networking, and everything in between.
…
continue reading
Azure McFarlane, Ru Campbell, Femke Cornelissen, Peter Rising, & Kat Beedim talk about Microsoft 365 and Azure, and are joined each episode by a guest to talk about their journey in tech, and the challenges they have faced along the way.
…
continue reading
The RocketMSP Podcast, formerly known as MSP Webinars, is a comprehensive platform that caters to Managed Service Providers (MSPs) and the IT community. Hosted by Steve Taylor, a seasoned IT professional, the podcast serves as a knowledge exchange hub, offering a wealth of industry insights, best practices, and innovative solutions. Each episode features interviews and conversations with MSP business owners, channel vendors, and other noteworthy figures in the IT space. The podcast aims to p ...
…
continue reading
1
Endpoint Security and Data Protection: Uncovering the Hidden Compliance Risks in Printer Security with Jim LaRoe
24:31
24:31
Play later
Play later
Lists
Like
Liked
24:31Jonathan Armstrong remains on assignment. Today, Tom Fox visits with fellow Texan Jim LaRoe, CEO of Symphion, to discuss data privacy, data protection, and compliance related to printer security in one of the most interesting podcasts Tom has done in some time. Jim provides insight into how 20-30% of network endpoints are printers, and alarmingly, …
…
continue reading
1
PP084: Inside the CVE Process With Cisco (Sponsored)
44:50
44:50
Play later
Play later
Lists
Like
Liked
44:50CVEs, or Common Vulnerabilities and Exposures, are such a routine aspect of tech that most IT pros probably take them for granted. But like many things we take for granted, the CVE process takes some serious organizational infrastructure to function. On today’s Packet Protector, sponsored by Cisco, we talk about the organizations and processes that…
…
continue reading
1
Inside Cognixion’s study using Vision Pro to give voice through brain signals and AI
18:22
18:22
Play later
Play later
Lists
Like
Liked
18:22Apple @ Work is exclusively brought to you by Mosyle, the only Apple Unified Platform. Mosyle is the only solution that integrates in a single professional-grade platform all the solutions necessary to seamlessly and automatically deploy, manage & protect Apple devices at work. Over 45,000 organizations trust Mosyle to make millions of Apple device…
…
continue reading
Please enjoy this encore of Word Notes. A set of solutions for ensuring that the right users can only access the appropriate resources. CyberWire Glossary link: https://thecyberwire.com/glossary/identity-and-access-management Audio reference link: “The Wrath of Khan (1982) ‘Kirk’s Response,’” by Russell, YouTube, 16 May 2017. Learn more about y…
…
continue reading
1
Embedded Executive: Matter Certification Just Got Easier | CSA
13:56
13:56
Play later
Play later
Lists
Like
Liked
13:56Every IoT device should comply with the Connectivity Standard Alliance (CSA) Matter standard, but we know that’s not the case. For some developers, doing that is a no-brainer. However, there are some developers who struggle with the process. For that latter group, the CSA recently released a Matter-compliant platform certification that should help …
…
continue reading
1
PP083: A CISO’s Perspective on Model Context Protocol (MCP)
44:03
44:03
Play later
Play later
Lists
Like
Liked
44:03Model Context Protocol (MCP) is an open-source protocol that enables AI agents to connect to data, tools, workflows, and other agents both within and outside of enterprise borders. As organizations dive head-first into AI projects, MCP and other agentic protocols are being quickly adopted. And that means security and network teams need to understan…
…
continue reading
Apple @ Work is exclusively brought to you by Mosyle, the only Apple Unified Platform. Mosyle is the only solution that integrates in a single professional-grade platform all the solutions necessary to seamlessly and automatically deploy, manage & protect Apple devices at work. Over 45,000 organizations trust Mosyle to make millions of Apple device…
…
continue reading
Please enjoy this encore of Word Notes. The deployment of rules to the security stack across all data islands, cloud, SaaS applications, data centers, and mobile devices designed to manifest an organization's cybersecurity first principle strategies of zero trust, intrusion kill chain prevention, resilience, and risk forecasting. CyberWire Glossary…
…
continue reading
1
Embedded Executive: Tune Your Compiler for ADAS | Solid Sands
11:12
11:12
Play later
Play later
Lists
Like
Liked
11:12Compilers and ADAS aren’t often used in the same sentence. For developers, that anomaly can represent a design challenge, as compilers in general are not designed for this particular application, which also happens to be at the top of the safety and security checklist. To understand how these compilers should be tested and implemented, I spoke to S…
…
continue reading
1
Closing the Endpoint Gap: Business Continuity and IGEL’s Dual-Boot Solution
31:14
31:14
Play later
Play later
Lists
Like
Liked
31:14In this episode of IGEL Weekly, Andy Whiteside sits down with Chris Feeney from IGEL’s Office of the CTO to explore a critical, often overlooked element of disaster recovery—endpoint resilience. They unpack how IGEL is addressing business continuity challenges with innovative solutions like IGEL Dual Boot and USB Recovery, enabling organizations to…
…
continue reading
1
PP082: Building a Workable Mobile Security Strategy In a World of Risky Apps
1:02:01
1:02:01
Play later
Play later
Lists
Like
Liked
1:02:01Today we’re bringing back one of our favorite guests — Akili Akridge. He’s a former Baltimore cop who transitioned to building and leading mobile offense and defense teams for federal agencies and Fortune 100s. These days he’s a straight-talking expert on all things mobile security. We’re digging into mobile threats, why they keep CISOs up... Read …
…
continue reading
1
Apple now makes up 63% of enterprise endpoints
25:30
25:30
Play later
Play later
Lists
Like
Liked
25:30Apple @ Work is exclusively brought to you by Mosyle, the only Apple Unified Platform. Mosyle is the only solution that integrates in a single professional-grade platform all the solutions necessary to seamlessly and automatically deploy, manage & protect Apple devices at work. Over 45,000 organizations trust Mosyle to make millions of Apple device…
…
continue reading
Please enjoy this encore of Word Notes. A process of hiding the complexity of a system by providing an interface that eases its manipulation. CyberWire Glossary link: https://thecyberwire.com/glossary/abstraction-layer Audio reference link: “What Is Abstraction in Computer Science,” by Codexpanse, YouTube, 29 October 2018. Learn more about your…
…
continue reading
1
A Compliance Roadmap for ADS/ADMT - Part 2: Understanding Opt-In and Opt-Out Requirements
18:36
18:36
Play later
Play later
Lists
Like
Liked
18:36Welcome to a special series on Life with GDPR. Over the next five episodes, Tom Fox and Alyssa DeSimone, a legal/compliance & risk management expert, with an extensive background in HR, will discuss the complex topic of a Compliance Roadmap for ADS/ADMT. In this second episode, Tom Fox and Alyssa DeSimone review the opt-in and opt-out requirements …
…
continue reading
1
A Compliance Roadmap for ADS/ADMT - Part 1: Introduction & Jurisdiction
17:19
17:19
Play later
Play later
Lists
Like
Liked
17:19Welcome to a special series on Life with GDPR. Over the next five episodes, Tom Fox and Alyssa DeSimone, a legal/compliance & risk management expert with an extensive background in HR, will discuss the complex topic of a Compliance Roadmap for ADS/ADMT. In this first episode, we break down the essentials of ADS/ADMT, focusing on who is covered, the…
…
continue reading
1
Embedded Executive: AI At the Endpoint | EMASS
11:56
11:56
Play later
Play later
Lists
Like
Liked
11:56AI at the endpoint gets yet another boost from EMASS, a fabless semiconductor company that recently emerged from stealth mode. Having your processing at the endpoint presents a few significant challenges, namely the amount of processing that can be made available and the ability to run from a battery. EMASS has come up with a way to do this a littl…
…
continue reading
1
PP081: News Roundup – BRICKstorm Backdoor Targets Network Appliances, GitHub Unveils Supply Chain Defense Plans
48:26
48:26
Play later
Play later
Lists
Like
Liked
48:26By Packet Pushers
…
continue reading
1
What happens when engineers get access to AI tools built into their existing platforms?
25:30
25:30
Play later
Play later
Lists
Like
Liked
25:30Apple @ Work is exclusively brought to you by Mosyle, the only Apple Unified Platform. Mosyle is the only solution that integrates in a single professional-grade platform all the solutions necessary to seamlessly and automatically deploy, manage & protect Apple devices at work. Over 45,000 organizations trust Mosyle to make millions of Apple device…
…
continue reading
By N2K Networks
…
continue reading
Back from a short summer break, Stephen and Arvind return with a brand-new Sync Up episode—spotlighting audio overviews in OneDrive. From quick summaries to full podcast-style recaps, this new Copilot feature transforms how you catch up on documents. Joining the conversation are Cass Weber and Cammi Mejia from the OneDrive team, who share the insid…
…
continue reading
1
From IT to Total Compliance Tracking with Adam Goslin
21:08
21:08
Play later
Play later
Lists
Like
Liked
21:08Jonathan Armstrong remains on assignment. Today, Tom visits with Adam Goslin, founder of Total Compliance Tracking, to discuss his journey from IT development and management to becoming a leader in the security and compliance sector. Adam shares his professional background, the challenges he faced with achieving PCI compliance, and the insights tha…
…
continue reading
1
Embedded Executive: The Same Level of Security Is Needed Whether You Have One Device or Millions | Infineon and CommScope
19:30
19:30
Play later
Play later
Lists
Like
Liked
19:30No matter what your end device is, be it a light bulb or a driver’s license, it needs to be secure. I don’t think we need to go through the reasons why it needs to be secure. How you do that is becoming increasingly more difficult. And you may be looking at protecting millions of devices, where each one needs its own unique identity. To get a handl…
…
continue reading
1
PP080: The State of OT Risks in 2025 (and What to Do About Them)
44:32
44:32
Play later
Play later
Lists
Like
Liked
44:32What does the risk environment for Operational Technology (OT) look like in 2025? JJ and Drew review four recent reports on the state of OT security from Dragos, Fortinet, and others. We discuss ransomware impacts, ongoing risks of RDP traffic, directly exposed OT devices, and overall attack trends and the tools and processes that organizations... …
…
continue reading
Apple @ Work is exclusively brought to you by Mosyle, the only Apple Unified Platform. Mosyle is the only solution that integrates in a single professional-grade platform all the solutions necessary to seamlessly and automatically deploy, manage & protect Apple devices at work. Over 45,000 organizations trust Mosyle to make millions of Apple device…
…
continue reading
Please enjoy this encore of Word Notes. A cybersecurity first principle strategy focused on disrupting known adversary activity at one of several phases of an attack sequence. CyberWire Glossary link: https://thecyberwire.com/glossary/intrusion-kill-chain Audio reference link: "Cybersecurity Days: A Network Defender's Future," by Rick Howard, I…
…
continue reading
1
Embedded Executive: Move AI to the Endpoint | Ambiq
13:37
13:37
Play later
Play later
Lists
Like
Liked
13:37AI is a technology that generally requires a significant amount of power and high compute performance. Hence, it’s typically relegated to the Cloud or to an Edge-based computer. Performing AI at the endpoint has not been feasible for those reasons. With ambiq’s Sub-threshold Power Optimized technology (SPOT), performing AI at the endpoint is a real…
…
continue reading
1
PP079: Rethinking the Architecture of Microsegmentation
57:41
57:41
Play later
Play later
Lists
Like
Liked
57:41Microsegmentation is a complex topic. We did an overview episode earlier this year, and we invited listeners to reach out to keep the microsegmentation conversation going. Today’s guest did just that. Philip Griffiths is Head of Strategic Sales at Netfoundry. However, this isn’t a sponsored show about NetFoundry. Philip is also involved in a workin…
…
continue reading
By Zac Hall
…
continue reading
Please enjoy this encore of Word Notes. A subset of security orchestration, the management of identities across an organization's set of digital islands. CyberWire Glossary link: https://thecyberwire.com/glossary/identity-orchestration Learn more about your ad choices. Visit megaphone.fm/adchoicesBy N2K Networks
…
continue reading
1
Embedded Executive: Manual Vs. Automated Code Generation | TeleCANesis
11:44
11:44
Play later
Play later
Lists
Like
Liked
11:44We’ve done podcasts in the past that discussed automating your code documentation. But we haven’t touched much on automating the code generation itself until now. On this week’s Embedded Executives podcast, I spoke to Jonathan Hacker, the Founder and CTO of TeleCANesis, and that’s exactly what they do. We got into the issues of why automated coding…
…
continue reading
1
PP078: Using Free Tools for Detection Engineering
49:25
49:25
Play later
Play later
Lists
Like
Liked
49:25You can build effective, scalable detection pipelines using free and open-source tools like Zeek, Suricata, YARA, and Security Onion. Today on Packet Protector we welcome Matt Gracie, Senior Engineer at Security Onion Solutions — the team behind the open-source platform used for detection engineering, network security monitoring, and log management…
…
continue reading
1
Parallels Desktop 26 makes it easier for IT to deploy and manage virtual machines
20:57
20:57
Play later
Play later
Lists
Like
Liked
20:57Apple @ Work is exclusively brought to you by Mosyle, the only Apple Unified Platform. Mosyle is the only solution that integrates in a single professional-grade platform all the solutions necessary to seamlessly and automatically deploy, manage & protect Apple devices at work. Over 45,000 organizations trust Mosyle to make millions of Apple device…
…
continue reading
Please enjoy this encore of Word Notes. A cyber threat intelligence analysis model that defines relationship pairs between four core components in the shape of a diamond of adversary playbook activity across the intrusion kill chain: the adversary, their capability, the infrastructure used or attacked, and the victim. CyberWire Glossary link: http…
…
continue reading
1
Embedded Executive: AI Is Hard. It’s OK To Ask For Help | CEVA
10:32
10:32
Play later
Play later
Lists
Like
Liked
10:32Designing a device that incorporates AI can be daunting, for a good reason—it’s very complex. When you push that design out to the Edge, it brings in even more challenges, both on the hardware and software sides of the equation. To understand what these challenges are and where a designer can turn for help, I spoke to Amir Panush, the CEO of CEVA, …
…
continue reading
1
PP077: News Roundup–Drift Breach Has Long Reach; FCC Investigates Its Own IoT Security Program
37:20
37:20
Play later
Play later
Lists
Like
Liked
37:20Is any publicity good publicity? On today’s News Roundup we talk about how Salesloft, which makes the Drift chat agent that’s been used as a jumping-off point for credential harvesting and data breach attacks against a bunch of big-name companies, is testing that proposition. We also discuss bugs affecting industrial refrigeration controllers, and …
…
continue reading
1
Apple’s Jeremy Butcher on what’s new for IT with macOS 26 and iOS 26
30:08
30:08
Play later
Play later
Lists
Like
Liked
30:08Apple @ Work is exclusively brought to you by Mosyle, the only Apple Unified Platform. Mosyle is the only solution that integrates in a single professional-grade platform all the solutions necessary to seamlessly and automatically deploy, manage & protect Apple devices at work. Over 45,000 organizations trust Mosyle to make millions of Apple device…
…
continue reading
Please enjoy this encore of Word Notes. A knowledge base of adversary tactics, techniques, and procedures established and maintained by the MITRE Corporation. CyberWire Glossary link: https://thecyberwire.com/glossary/mitre-attck Audio reference link: “Attack Frameworks - SY0-601 CompTIA Security+ : 4.2,” Professor Messer, YouTube, 29 April 202…
…
continue reading
1
Embedded Executive: How Secure is Secure Enough | Silicon Labs
13:26
13:26
Play later
Play later
Lists
Like
Liked
13:26Silicon Labs recently announced an MCU that has achieved the highest level of security possible to date, which is PSA Level 4. The questions you may be asking are, “What does that mean, and is this something I need to understand?” To get answers to these questions and many related ones, I spoke to Sharon Hagi, the Chief Security Officer at Silicon …
…
continue reading
1
PP076: RF Risks and How to See Unseen Threats
59:58
59:58
Play later
Play later
Lists
Like
Liked
59:58Our airwaves are alive with radio frequencies (RF). Right now billions of devices around the world are chattering invisibly over Wi-Fi, Bluetooth, Zigbee, and other protocols you might not have heard of. On today’s show we peer into the invisible world to better understand the RF threat environment. Our guest is Brett Walkenhorst, CTO of... Read mo…
…
continue reading
1
Legal Hold solves a key problem with macOS backups
22:42
22:42
Play later
Play later
Lists
Like
Liked
22:42Apple @ Work is exclusively brought to you by Mosyle, the only Apple Unified Platform. Mosyle is the only solution that integrates in a single professional-grade platform all the solutions necessary to seamlessly and automatically deploy, manage & protect Apple devices at work. Over 45,000 organizations trust Mosyle to make millions of Apple device…
…
continue reading