A brief daily summary of what is important in information security. The podcast is published every weekday and designed to get you ready for the day with a brief, usually 5 minutes long summary of current network security related events. The content is late breaking, educational and based on listener input as well as on input received by the SANS Internet Storm Center. You may submit questions and comments via our contact form at https://isc.sans.edu/contact.html .
…
continue reading
Network Firewall Podcasts
Network Break keeps you informed with fast, focused analysis of IT news, products, tech trends, and business outcomes. Blending sharp commentary with a touch of humor, hosts Drew Conry-Murray & Johna Till Johnson sift through the weekly landslide of press announcements, product launches, financial reports, and marketing decks to find the stories worth talking about. You come away with the information and context to make smart decisions in your organization and career … all in the span of a ( ...
…
continue reading
THEOS CyberNova is a cutting-edge podcast that explores the dynamic world of cybersecurity, hosted by THEOS Cyber CEO Paul Jackson. Each episode delves into the latest trends, challenges, and innovations shaping the cybersecurity landscape, featuring insights from industry experts, thought leaders, and technologists. Paul brings his expertise and passion for cyber security to engaging discussions on topics ranging from emerging threats and data privacy to the future of AI in cyber defense. W ...
…
continue reading
Join us as we explore the world of Network Engineering! In each episode, we explore new topics, talk about technology, and interview people in our industry. We peek behind the curtain and get insights into what it's like being a network engineer - and spoiler alert - it's different for everyone! For more information check out our website https://artofnetworkengineering.com | Be sure to follow us on Twitter and Instagram as well @artofneteng | Co-Host Twitter Handle: Andy @andylapteff
…
continue reading
Every IT professional could use more knowledge about network security, but who has time to study? Grab some knowledge on the go with Radio Free Security, the network security podcast produced by WatchGuard LiveSecurity Service reporters.
…
continue reading
Risky Business is a weekly information security podcast featuring news and in-depth interviews with industry luminaries. Launched in February 2007, Risky Business is a must-listen digest for information security pros. With a running time of approximately 50-60 minutes, Risky Business is pacy; a security podcast without the waffle.
…
continue reading
Welcome to Beyond The Firewall: The Business Bytecast, where cybersecurity meets business strategy and IT innovation powers success. Designed for C-suite executives and managers, this podcast explores how cutting-edge technology, from cyber risk management to outsourced IT services and fractional CTO leadership, transforms organizations. We tackle the challenges of securing your business in a digital world and highlight the opportunities that IT solutions like on-demand support bring to the ...
…
continue reading
Brought to you by IT Audit Labs. Trusted cyber security experts and their guests discuss common security threats, threat actor techniques and other industry topics. IT Audit Labs provides organizations with the leverage of a network of partners and specialists suited for your needs. We are experts at assessing security risk and compliance, while providing administrative and technical controls to improve our clients’ data security. Our threat assessments find the soft spots before the bad g ...
…
continue reading
SecurityGen
…
continue reading
An online network about educating, entertaining and encouraging your dance with Technology!
…
continue reading
Through following this course, students will gain a basic understanding of the principles behind network security and the working of the main protocols, mechanisms and techniques in the area of security. The course consists of three parts: security mechanisms within network protocols, systems security and lab sessions. In the first part (security mechanisms within network protocols), the following topics will be discussed: IPSec, SSH, SSL, HTTPS and security for wireless networks. The second ...
…
continue reading
Welcome to Act on Tech, the podcast that empowers you to harness technology to boost your productivity and simplify your life. Hosted by tech enthusiast and entrepreneur Alex, each episode dives into actionable tips, tools, and insights to help you stay ahead in the digital age. Discover practical advice, expert opinions, and cutting-edge trends, all while learning about Alex Custom Tech, a leading MSP dedicated to providing personalized IT solutions for business and residential customers. T ...
…
continue reading
A live podcast show, that’s like a morning radio show, just much better. Live from 6h00-8h00 Monday, Wednesday and Friday. Clever, funny, outrageous and sometimes very silly. Come for the guests, stay for the laughter. Also check out our other shows on The Real Network for more entertainment.
…
continue reading
With nearly 30+ years of combined network marketing experience, this dynamic father/son duo has literally rewritten the blueprint & cracked the code of building teams in depth. Combining the power & speed of the digital revolution with proven "old school" fundamentals and principals that have stood the test of time, Chris & Dale McNelly will not only show you how to build your business at lightning speed, but also how to keep that team together for true passive income, & a legacy organization.
…
continue reading
SearchSecurity.com's Security Wire Weekly podcast recaps the week's top IT security news. Learn about the latest virus, worm, Trojan, phishing or identity theft scam. Find out the latest strategies for keeping your network and company data secure. Hear what industry experts recommend you watch for in the weeks ahead.
…
continue reading
Fortinet’s cybersecurity podcast provides highlights and commentary about securing the largest enterprise, service provider, and government organizations around the world. Join Fortinet’s top experts as they discuss today’s most important cybersecurity topics. The Fortinet Security Fabric platform addresses the most critical security challenges and protect data across the entire digital infrastructure, whether in networked, application, multi-cloud or edge environments. Both a technology com ...
…
continue reading
Founded in 2022, securitygen is a global start-up focused on telecom security.
…
continue reading

1
Beyond the Firewall | Episode 5 - How to Build a Network That Moves Millions.
52:30
52:30
Play later
Play later
Lists
Like
Liked
52:30In this episode of Beyond the Firewall, host Speaker 2 interviews Alex Wojtchanski, President and CEO of Paramount Business Group. They discuss Alex's extensive experience in the sports industry, the importance of philanthropy in business, the challenges charities face today, the impact of technology on charitable campaigns, current trends in merge…
…
continue reading

1
Tabletop Exercises 2.0: How OpsBook Is Changing the Game
38:36
38:36
Play later
Play later
Lists
Like
Liked
38:36What happens when your carefully crafted incident response playbook becomes worthless? Cody Sullivan from OpsBook reveals the brutal truth about tabletop exercises: most organizations are practicing with medieval armor for a drone war. From 70-participant, 6-hour exercises spanning three continents to the harsh reality of insider threats, this conv…
…
continue reading
30.06.25 Pt 2 - Gareth Cliff is joined by renowned South African broadcaster and history enthusiast Des Latham for a compelling conversation that journeys through pivotal moments in the country’s past — from the Soweto Uprising to the transformative events of 1994. Des reflects on the personal and public impact of his history podcast and shares ins…
…
continue reading

1
Why Our Cities Suck And Why Mondays Might Kill You
1:04:23
1:04:23
Play later
Play later
Lists
Like
Liked
1:04:2330.06.25 Pt 1 - Gareth Cliff and Leigh-Ann Mol unpack the shocking decline of South Africa’s major metros — think ghost buses, broken robots, and city services on life support. They also explore why Mondays see the highest suicide rates, and ask the controversial question: why does women’s sport struggle to hold attention? The Real Network…
…
continue reading

1
SANS Stormcast Monday June 30th, 2025: Scattered Spider; AMI BIOS Exploited; Secure Boot Certs Expiring; Microsoft Resliliency Initiative (#)
7:30
7:30
Play later
Play later
Lists
Like
Liked
7:30SANS Stormcast Monday June 30th, 2025: Scattered Spider; AMI BIOS Exploited; Secure Boot Certs Expiring; Microsoft Resliliency Initiative Scattered Spider Update The threat actor known as Scattered Spider is in the news again, this time focusing on airlines. But the techniques used by Scattered Spider, social engineering, are still some of the most…
…
continue reading
27.06.25 Pt 2 - Gareth Cliff, Simphiwe Mthethwa, and Ben Karpinski dive into a real conversation about coping with depression — is physical action like going for a run the answer, or is it more about shifting your mindset? Ben previews the Springboks’ big return to the field this weekend, and a listener’s clever tip for blocking spam calls gets Gar…
…
continue reading
27.06.25 Pt 1 - Gareth Cliff, Ben Karpinski, and Simphiwe Mthethwa kick off the morning with a surprising stat — Argentina now leads the western world in GDP growth. What lessons can South Africa take from that? They also unpack the jaw-dropping price tag of a luxury apartment going for over R100 million, and question whether we're raising a genera…
…
continue reading

1
SANS Stormcast Friday, June 27th, 2025: Open-VSX Flaw; Airoha Bluetooth Vulnerablity; Critical Cisco Identity Service Engine Vuln; (#)
6:48
6:48
Play later
Play later
Lists
Like
Liked
6:48SANS Stormcast Friday, June 27th, 2025: Open-VSX Flaw; Airoha Bluetooth Vulnerablity; Critical Cisco Identity Service Engine Vuln; Open-VSX Flaw Puts Developers at Risk A flaw in the open-vsx extension marketplace could have let to the compromise of any extension offered by the marketplace. https://blog.koi.security/marketplace-takeover-how-we-coul…
…
continue reading

1
SANS Stormcast Thursday, June 26th, 2025: Another Netscaler Vuln; CentOS Web Panel Vuln; IP Based Certs (#)
5:53
5:53
Play later
Play later
Lists
Like
Liked
5:53SANS Stormcast Thursday, June 26th, 2025: Another Netscaler Vuln; CentOS Web Panel Vuln; IP Based Certs NetScaler ADC and NetScaler Gateway Security Bulletin for CVE-2025-6543 Citrix patched a memory overflow vulnerability leading to unintended control flow and denial of service. https://support.citrix.com/support-home/kbsearch/article?articleNumbe…
…
continue reading

1
The Human Firewall: Training Your Team to Defend Against Cyber Threats
30:13
30:13
Play later
Play later
Lists
Like
Liked
30:13Your employees are either your first line of defense—or your biggest vulnerability. In this episode of Act on Tech, Alex breaks down how to turn your team into a human firewall through smart training, strong habits, and a security-first culture. Learn how phishing, social engineering, and weak passwords lead to breaches—and what you can do to stop …
…
continue reading

1
Free Speech or Hate Speech? The Battle Behind the Headlines
58:59
58:59
Play later
Play later
Lists
Like
Liked
58:5925.06.25 Pt 2 - Gareth Cliff sits down with human rights attorney, author, and filmmaker Brooke Goldstein for a powerful and provocative conversation. They unpack the moral and strategic shifts in the Iran-Israel conflict, examine Donald Trump’s influence on the region, and question whether the U.S. is calming the storm—or fanning the flames. The d…
…
continue reading

1
Risky Business #797 -- Stuxnet vs Massive Ordnance Penetrators
1:02:16
1:02:16
Play later
Play later
Lists
Like
Liked
1:02:16On this week’s show Patrick Gray and Adam Boileau discuss the week’s cybersecurity news: We roll our eyes over the “16 billion credentials” leak hitting mainstream news Some interesting cyber angles emerge from the conflict in Iran Opensource maintainer of libxml2 is fed up with this hacker crap Shockingly, there are yet more ways to trick people i…
…
continue reading

1
Behind the Gains: Bodybuilding, Mental Health & Toilet Truths
58:38
58:38
Play later
Play later
Lists
Like
Liked
58:3825.06.25 Pt 1 - Gareth Cliff is joined by fitness coach and competitive bodybuilder Blake Morgan for a no-holds-barred conversation about the dark side of bodybuilding. From the mental strain of prep to the unrealistic expectations set by social media, Blake opens up about the psychological battles behind the gains. Plus, he drops a few unexpected …
…
continue reading

1
SANS Stormcast Tuesday, June 24th, 2025: Telnet/SSH Scan Evolution; Fake Sonicwall Software; File-Fix vs Click-Fix (#)
4:03
4:03
Play later
Play later
Lists
Like
Liked
4:03SANS Stormcast Tuesday, June 24th, 2025: Telnet/SSH Scan Evolution; Fake Sonicwall Software; File-Fix vs Click-Fix Quick Password Brute Forcing Evolution Statistics After collecting usernames and passwords from our ssh and telnet honeypots for about a decade, I took a look back at how scans changed. Attackers are attempting more passwords in each s…
…
continue reading

1
NB532: HPE Deploys AI Agents Into GreenLake; Wi-Fi 7 Drives Q1 Switch Sales
52:07
52:07
Play later
Play later
Lists
Like
Liked
52:07Take a Network Break! Our Red Alert is a remote code execution vulnerability in Roundcube. On the news front, HPE announces GreenLake Intelligence, which will bring agentic AI capabilities to the HPE portfolio, Pure Storage brings cloud-like operations for on-prem storage, and Juniper Networks adds predictive analytics to its data center ops platfo…
…
continue reading

1
SANS Stormcast Tuesday, June 24th, 2025: Ichano ATHome IP Camera Scans; Netscaler Vulnerability; WinRar Vulnerability (#)
5:04
5:04
Play later
Play later
Lists
Like
Liked
5:04SANS Stormcast Tuesday, June 24th, 2025: Ichano ATHome IP Camera Scans; Netscaler Vulnerability; WinRar Vulnerability Scans for Ichano AtHome IP Cameras A couple days ago, a few sources started scanning for the username super_yg and the password 123. This is associated with Ichano IP Camera software. https://isc.sans.edu/diary/Scans%20for%20Ichano%…
…
continue reading
23.06.25 Pt 2 - Gareth Cliff and Leigh-Ann Mol explore why trusting your gut instinct might be better than blindly following algorithms and data. They also get into the strange but universal human connection to smells — from fresh petrol to the oddly satisfying scent of WD40. Plus, Producer James shares some good news on how Team South Africa is ma…
…
continue reading
23.06.25 Pt 1 - Gareth and Leigh-Ann kick off the week by unpacking the rising tensions in the Middle East and the looming threat of World War 3. They also dive into how AI might be getting smarter... while making humans dumber and lazier in the process. Plus, Dr. Hanan joins the show to break down the surprising psychology behind the simple but po…
…
continue reading

1
SANS Stormcast Monday, June 23rd, 2025: ADS and Python; More Secure Cloud PCs; Zend.to Path Traversal; Parser Differentials (#)
5:37
5:37
Play later
Play later
Lists
Like
Liked
5:37SANS Stormcast Monday, June 23rd, 2025: ADS and Python; More Secure Cloud PCs; Zend.to Path Traversal; Parser Differentials ADS & Python Tools Didier explains how to use his tools cut-bytes.py and filescanner to extract information from alternate data streams. https://isc.sans.edu/diary/ADS%20%26%20Python%20Tools/32058 Enhanced security defaults fo…
…
continue reading
20.06.25 Pt 2 - Gareth Cliff, Ben Karpinski and Simphiwe Mthethwa vent about how people these days seem to have forgotten basic manners — like not standing in the way! Then AI expert Donald Chauke joins the conversation to unpack the evolution of artificial intelligence, robots learning from each other, and how close we might be to an AI takeover. …
…
continue reading
20.06.25 Pt 1 - Gareth Cliff, Simphiwe Mthethwa and Ben Karpinski are back behind the mic! Gareth unpacks Floyd Shivambu’s political party-hopping ways, while the team speculates about the possibility of World War 3 – and what a nuclear winter might actually mean for us all. Plus, why are scientists so keen to resurrect some of history’s most dange…
…
continue reading

1
SANS Stormcast Friday, June 20th, 2025: New Employee Phishing; Malicious Tech Support Links; Social Engineering App Sepecific Passwords (#)
5:47
5:47
Play later
Play later
Lists
Like
Liked
5:47SANS Stormcast Friday, June 20th, 2025: New Employee Phishing; Malicious Tech Support Links; Social Engineering App Sepecific Passwords How Long Until the Phishing Starts? About Two Weeks After setting up a Google Workspace and adding a new user, it took only two weeks for the new employee to receive somewhat targeted phishing emails. https://isc.s…
…
continue reading

1
LAN Ho! Navigating Cruise Ship Networking
42:15
42:15
Play later
Play later
Lists
Like
Liked
42:15Send us a text Beyond the sundecks and buffet lines lies a technological marvel most cruise passengers never consider - the complex network infrastructure keeping these floating cities connected and operational. In this fascinating conversation with Will Robbins, we dive deep into the unique challenges and solutions of maritime networking that blen…
…
continue reading

1
What Is a SOC—and Does Your Business Need One?
28:39
28:39
Play later
Play later
Lists
Like
Liked
28:39In this episode of Act on Tech, Alex breaks down the role of a Security Operations Center (SOC) and why it's no longer just for big corporations. Whether you're an MSP or a small business owner, a SOC can provide 24/7 monitoring, threat detection, and incident response that could save your business from major cyberattacks. Learn what a SOC actually…
…
continue reading
18.06.25 Pt 2 - Gareth Cliff and comedian Q Dube get real about how the comedy world is still feeling the ripple effects of COVID—and what comics are doing to keep the dream alive. They’re later joined by tech-for-good entrepreneur Noleen Mariappen for a fascinating chat about Sophia the Robot and how AI could help drive positive social change The …
…
continue reading

1
Risky Business #796 -- With special guest co-host Chris Krebs
1:01:04
1:01:04
Play later
Play later
Lists
Like
Liked
1:01:04On this week’s show Patrick Gray and Adam Boileau are joined by special guest Chris Krebs to discuss the week’s cybersecurity news. They talk through: Israeli “hacktivists” take out an Iranian state-owned bank Scattered-spider and friends pivot into attacking insurers Securing identities in a cloud-first world keeps us awake at night Microsoft take…
…
continue reading
18.06.25 Pt 1 - Gareth Cliff is joined by comedian Q Dube for a refreshingly honest and unfiltered chat. They kick off with Gareth’s take on the Israel-Iran conflict, before debating whether history actually matters—or if people are just copy-pasting their values from the past. The conversation gets even more real as they tackle Men’s Mental Health…
…
continue reading

1
SANS Stormcast Monday, June 16th, 2025: Extracing Data from JPEG; Windows Recall Export; Anubis Wiper; Mitel Vuln and PoC (#)
5:47
5:47
Play later
Play later
Lists
Like
Liked
5:47SANS Stormcast Monday, June 16th, 2025: Extracing Data from JPEG; Windows Recall Export; Anubis Wiper; Mitel Vuln and PoC Extracting Data From JPEGs Didier shows how to efficiently extract data from JPEGs using his tool jpegdump.py https://isc.sans.edu/diary/A%20JPEG%20With%20A%20Payload/32048 Windows Recall Export in Europe In its latest insider b…
…
continue reading

1
NB531: Cisco Spotlights AI, Unified Management at CLUS; Ultra Ethernet 1.0 Unveiled
21:42
21:42
Play later
Play later
Lists
Like
Liked
21:42Take a Network Break! Our Red Alert for the week is a remote code execution vulnerability in open-source XDR platform Wazuh. In tech news, we dig into several announcements from Cisco Live US including: unified management of Meraki and Catalyst gear, new switches, an AI Assistant for the Meraki dashboard, a Deep Network Model LLM,... Read more »…
…
continue reading

1
The Invisible Threats: OT Meets IT in Modern Manufacturing
39:50
39:50
Play later
Play later
Lists
Like
Liked
39:50Think you can manage industrial systems like your IT infrastructure? Think again. In this episode of The Audit, Dino Busalachi unpacks the high-stakes complexity of OT-IT convergence—and why your trusty IT playbook flatlines on the plant floor. Join the IT Audit Labs crew as we dive into the chaos of managing 10,000+ industrial assets across a spra…
…
continue reading

1
Soap Box: AI has entered the SOC, and it ain't going anywhere
30:58
30:58
Play later
Play later
Lists
Like
Liked
30:58In this sponsored Soap Box edition of the Risky Business podcast Patrick Gray chats with Dropzone AI founder Ed Wu about the role of LLMs in the SOC. The debate about whether AI agents are going to wind up in the SOC is over, they’ve already arrived. But what are they good for? What are they NOT good for? And where else will we see AI popping up in…
…
continue reading

1
SANS Stormcast Monday, June 16th, 2025: Katz Stealer in JPG; JavaScript Attacks; Reviving expired Discord Invites for Evil (#)
6:45
6:45
Play later
Play later
Lists
Like
Liked
6:45SANS Stormcast Monday, June 16th, 2025: Katz Stealer in JPG; JavaScript Attacks; Reviving expired Discord Invites for Evil Katz Stealer in JPG Xavier found some multistage malware that uses an Excel Spreadsheet and an HTA file to load an image that includes embeded a copy of Katz stealer. https://isc.sans.edu/diary/More+Steganography/32044 https://…
…
continue reading

1
From Opposite Lives to Tracking Legends: The Journey of Alex & Renias
57:29
57:29
Play later
Play later
Lists
Like
Liked
57:2913.06.25 Pt 2 - Gareth Cliff sits down with Alex van den Heever and Renias Mhlongo – the unlikely yet extraordinary tracking duo whose bond was forged in the wild. They discuss the ancient art of tracking, the discipline it demands, and how their friendship grew strong despite coming from vastly different worlds The Real Network…
…
continue reading

1
Errol Musk Exposed, LA Riots Unpacked & Bizarre Life Lessons
1:00:09
1:00:09
Play later
Play later
Lists
Like
Liked
1:00:0913.06.25 Pt 1 - Gareth Cliff, Ben Karpinski and Simphiwe Mthethwa unpack the latest drama surrounding Errol Musk, as even his own family starts to keep their distance. They also weigh in on the chaotic LA riots – were they spontaneous or part of a bigger plan? Plus, a cautionary tale on why getting too close to people who live in their cars might n…
…
continue reading

1
SANS Stormcast Friday, June 13th, 2025: Honeypot Scripts; EchoLeak MSFT Copilot Vuln; Thunderbolt mailbox URL Vuln; (#)
5:43
5:43
Play later
Play later
Lists
Like
Liked
5:43SANS Stormcast Friday, June 13th, 2025: Honeypot Scripts; EchoLeak MSFT Copilot Vuln; Thunderbolt mailbox URL Vuln; Automated Tools to Assist with DShield Honeypot Investigations https://isc.sans.edu/diary/Automated%20Tools%20to%20Assist%20with%20DShield%20Honeypot%20Investigations%20%5BGuest%20Diary%5D/32038 EchoLeak: Zero-Click Microsoft 365 Copi…
…
continue reading