Welcome to the Security Weekly Podcast Network, your all-in-one source for the latest in cybersecurity! This feed features a diverse lineup of shows, including Application Security Weekly, Business Security Weekly, Paul's Security Weekly, Enterprise Security Weekly, and Security Weekly News. Whether you're a cybersecurity professional, business leader, or tech enthusiast, we cover all angles of the cybersecurity landscape. Tune in for in-depth panel discussions, expert guest interviews, and ...
…
continue reading
Network Security Testing Podcasts
Explore the life of a security leader with NetSPI Field Chief Information Security Officer (CISO) Nabil Hannan. Hear how CISOs with diverse expertise tackle the challenges and opportunities that come with life on the frontlines of cybersecurity.
…
continue reading
Join us at the intersection of networking and security! Whether you’re fending off ransomware attacks, securing remote workers, hunting for rogue IoT devices, or gearing up for your latest compliance audit, Packet Protector provides practical information that IT and infrastructure pros can put to work. Every episode covers the latest security headlines and then drills into essential topics to provide technical and strategic insights on wired and wireless network security, access control, clo ...
…
continue reading
As cars become smarter and more connected, the demand for top-tier automotive cyber security has never been higher. With expert insights from PlaxidityX, a leading automotive cyber security company, we’ll guide you through the challenges and solutions protecting millions of vehicles worldwide. Whether you’re an industry expert or just curious about how cars are secured in the digital age, this podcast comprehensively looks at how cyber defenses are developed, tested, and deployed. We don’t j ...
…
continue reading
Welcome to the Security Weekly Podcast Network, your all-in-one source for the latest in cybersecurity! This feed features a diverse lineup of shows, including Application Security Weekly, Business Security Weekly, Paul's Security Weekly, Enterprise Security Weekly, and Security Weekly News. Whether you're a cybersecurity professional, business leader, or tech enthusiast, we cover all angles of the cybersecurity landscape. Tune in for in-depth panel discussions, expert guest interviews, and ...
…
continue reading
Heavy Networking is an unabashedly nerdy dive into all things networking. Described by one listener as "verbal white papers," the weekly episodes feature network engineers, industry experts, and vendors sharing useful information to keep your professional knowledge sharp and your career growing. Hosts Ethan Banks & Drew Conry-Murray cut through the marketing spin to explore what works—and what doesn't—in networking today, while keeping an eye on what's ahead for the industry. On air since 20 ...
…
continue reading

1
CISSP Cyber Training Podcast - CISSP Training Program
Shon Gerber, vCISO, CISSP, Cybersecurity Consultant and Entrepreneur
Join Shon Gerber on his weekly CISSP Cyber Training podcast, where his extensive 23-year background in cybersecurity shines through. With a rich history spanning corporate sectors, government roles, and academic positions, Shon imparts the essential insights and advice necessary to conquer the CISSP exam. His expertise is not just theoretical; as a CISSP credential holder since 2009, Shon translates his deep understanding into actionable training. Each episode is packed with invaluable secur ...
…
continue reading
An open show powered by community LINUX Unplugged takes the best attributes of open collaboration and turns it into a weekly show about Linux.
…
continue reading
Three stories to expand your worldview, delivered daily. Matt Galloway cuts through a sea of choice to bring you stories that transcend the news cycle. Conversations with big thinkers, household names, and people living the news. An antidote to algorithms that cater to what you already know — and a meeting place for diverse perspectives. In its 20 years, the Current has become a go-to place for stories that shape and entertain us. Released daily, Monday to Friday. Some of the topics we’ve co ...
…
continue reading
.NET Rocks! is an Internet Audio Talk Show for Microsoft .NET Developers.
…
continue reading
Engineers consistently exclude non-technical people from understanding enough about technology to better utilise it. This is wrong! Engineers should be equipping non-technical people with enough of an understanding to make the right business decisions, without trying to drag them all the way down into the detail.
…
continue reading
In our age of digital transformation, everything is moving to the cloud, including the management of devices, users and applications. The Infoblox ThreatTalk podcast brings you the latest thinking on how to tap the full potential of the cloud while making the most of your existing network security solutions. In each episode, leading cybersecurity experts share insights and practical advice on how to raise network security and automation to the next level across diverse on-premises, virtual a ...
…
continue reading
Join HOU.SEC.CON Cofounders Michael and Sam each week as they chat with conference speakers about the latest topics and trends in the cybersecurity space.
…
continue reading
A relaxed coffee always brings an insightful conversation. And when it comes to mobile app performance, coffee is always a useful tool. Join us at the App Performance Café, where Rui Costa, CEO at Codavel, brings the most knowledgable individuals for an informal conversation around the vast world of mobile app performance. Our guests will share the challenges and obstacles, strategies, and lessons learned when building top-performing mobile apps. Across multiple episodes, we'll cover the con ...
…
continue reading
Stay ahead of the latest cybersecurity trends with Cyberside Chats—your go-to cybersecurity podcast for breaking news, emerging threats, and actionable solutions. Whether you’re a cybersecurity pro or an executive who wants to understand how to protect your organization, cybersecurity experts Sherri Davidoff and Matt Durrin will help you understand and proactively prepare for today’s top cybersecurity threats, AI-driven attack and defense strategies, and more!
…
continue reading
Watch Nationally Syndicated Car Concerns USA Radio Show Every Week-day Morning Starting at 9:00 A.M. (EST). USA TOLL-FREE: 1-855-CAR-CONCERNS (855-227-2662) @ http://bit.ly/cwAyD7 Car Concerns Is The Fastest Growing Car Talk Radio Show In The USA! Car Concerns is Nationally Syndicated Radio Talk Show That is Heard In Great USA Radio Markets Like Boston, Chicago, Las Vegas, Pittsburgh, Winter Springs, Botell, Hagatna and Other Great Cities Around The Nation. Is Car Concerns Heard In Your Town ...
…
continue reading
Inspirational stories of black women in tech. Support this podcast: https://podcasters.spotify.com/pod/show/frauvis/support
…
continue reading
We are two brothers focusing 100% on Amazon Web Services (AWS). Every other week, one of us prepares the topic of the podcast. The topic is not known to the other one, which results in surprising conversations about all things AWS. Typically, we are covering the following topics: DevOps, Serverless, Container, Security, Infrastructure as Code, Container, Continuous Deployment, S3, EC2, RDS, VPC, IAM, VPC, and many more.
…
continue reading
The CyberCast is purpose built for MSPs, MSSPs and IT Practitioners.In each episode you will learn about a new security control, how it maps to the different frameworks, the impact it has, building a policy around it, how the threat actors exploit it - via MITRE ATT&CK - what you can do to defend against it - MITRE Shield, common mistakes or oversights made when implementing into their tech stack and trends.Sponsors:Datto - CIS Control 3 - Data ProtectionNetwrix - CIS Control 3 - Data Protec ...
…
continue reading

1
CCT 251: Practice CISSP Questions - Security Control Testing, Vulnerability Assessments and Network Scanning (Domain 6.2)
19:53
19:53
Play later
Play later
Lists
Like
Liked
19:53Send us a text The boundaries between digital vulnerabilities and physical warfare are dissolving before our eyes. Ukrainian forces have dramatically shifted military paradigms by marrying cybersecurity breaches with commercial drone attacks against strategic Russian targets like Tupolev aircraft manufacturers. This evolution demands security profe…
…
continue reading

1
AP Tests, Hyper-V, Notepad, Google, Nova Scotia, NHI, Bond, Josh Marpet, and more... - SWN #480
35:14
35:14
Play later
Play later
Lists
Like
Liked
35:14AP Tests, Hyper-V, Notepad, Google, Nova Scotia, NHI, Bond, Josh Marpet, and more on the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-480
…
continue reading

1
CISO Cyber Insurance Empowerment - Morey Haber, Peter Hedberg, Stephan Jou - BSW #400
1:03:41
1:03:41
Play later
Play later
Lists
Like
Liked
1:03:41Segment description coming soon! This month BeyondTrust released it's 12th annual edition of the Microsoft Vulnerabilities Report. The report reveals a record-breaking year for Microsoft vulnerabilities, and helps organizations understand, identify, and address the risks within their Microsoft ecosystems. Segment Resources: Insights Security Assess…
…
continue reading

1
AI Zombie Lawyer, Scattered Spider, ASUS, Mainframes, GrayAlpha, Backups, Josh Marpet - SWN #486
36:26
36:26
Play later
Play later
Lists
Like
Liked
36:26AI Zombie Lawyers, Scattered Spider, ASUS, Mainframes, GrayAlpha, Backups, Josh Marpet, and more on the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-486
…
continue reading

1
PP067: Protecting Secrets With Vault and TruffleHog
35:35
35:35
Play later
Play later
Lists
Like
Liked
35:35Secrets trickle out through misconfigurations, poor tooling, and rushed Git commits. Today’s guest, John Howard, joins us on Packet Protector to walk through practical secrets management with Vault and TruffleHog to help make sure you don’t expose your privates. John discusses work he’s done to build an automated process in his organization for dev…
…
continue reading

1
When AI Goes Rogue: Blackmail, Shutdowns, and the Rise of High-Agency Machines
26:27
26:27
Play later
Play later
Lists
Like
Liked
26:27What happens when your AI refuses to shut down—or worse, tries to blackmail you to stay online? Join us for a riveting Cyberside Chats Live as we dig into two chilling real-world incidents: one where OpenAI’s newest model bypassed shutdown scripts during testing, and another where Anthropic’s Claude Opus 4 wrote blackmail messages and threatened us…
…
continue reading

1
Threat Modeling With Good Questions and Without Checklists - Farshad Abasi - ASW #335
1:08:00
1:08:00
Play later
Play later
Lists
Like
Liked
1:08:00What makes a threat modeling process effective? Do you need a long list of threat actors? Do you need a long list of terms? What about a short list like STRIDE? Has an effective process ever come out of a list? Farshad Abasi joins our discussion as we explain why the answer to most of those questions is No and describe the kinds of approaches that …
…
continue reading

1
The greatest artist of the 20th century? AI’s answer and why it matters
15:06
15:06
Play later
Play later
Lists
Like
Liked
15:06AI is exploding. It’s everywhere. And almost everyone is using it. From writing emails to generating lifelike videos, to booking appointments, artificial intelligence is moving beyond simple prompts and into what experts call “agentic AI” — systems that can act on our behalf. CBC’s Nora Young joins Matt Galloway to talk about this moment in AI. She…
…
continue reading

1
He started his degree in 1976. Last week, he graduated
10:06
10:06
Play later
Play later
Lists
Like
Liked
10:06Dave Burnett started his degree in 1976. Now 49 years later, he is graduating. He talks to Matt Galloway about that moment crossing the stage nearly half a century in the making. The 68-year-old just completed his agriculture degree — and reflects on the long road to graduation — a story of addiction, recovery and achieving long-held dreams.…
…
continue reading

1
What to do about the high cost of hospital parking?
19:33
19:33
Play later
Play later
Lists
Like
Liked
19:33Hospital parking is expensive. Add that to the already high cost of being sick. Cancer patients, parents and caregivers can spend thousands on parking and are calling for fees to be reduced or eliminated. But hospitals say they need the money to help pay for healthcare in a stretched system. We hear from one patient about the cost, and why when Nov…
…
continue reading

1
U of T’s president on what a university education is really for
24:05
24:05
Play later
Play later
Lists
Like
Liked
24:05As thousands of graduates toss their caps in the air, the president of Canada’s largest university is stepping down. Meric Gertler reflects on 12 years at the helm of the University of Toronto — and the future of education and life after the classroom in the age of AI and fewer jobs.
…
continue reading

1
CCT 254: Understanding APIs for the CISSP Exam (Domain 8.5)
40:46
40:46
Play later
Play later
Lists
Like
Liked
40:46Send us a text Cybersecurity vulnerabilities continue to emerge in unexpected places, as evidenced by the recent Iranian-backed attacks on U.S. water treatment facilities through poorly secured Unitronics PLCs. This alarming development sets the stage for our deep dive into API security - a critical yet often overlooked aspect of modern cybersecuri…
…
continue reading

1
Insider threats, migrating away from cloud, RSAC interviews with Cyera and Blumira - Rob Allen, Matthew Warner, Yotam Segev - ESW #411
1:19:04
1:19:04
Play later
Play later
Lists
Like
Liked
1:19:04Segment 1 - Interview with Rob Allen from Threatlocker Segment 2 - Topic: Growing Trend - Edge Computing and Hybrid Cloud Segment 3 - Interviews from RSAC 2025 Cyera Cyera is the fastest-growing data security company in history, empowering companies to classify, secure, and manage their data, wherever it is, and leverage the power of the industry’s…
…
continue reading

1
Drama plagued Canada’s last G7 summit. Can Carney avoid repeating it?
19:35
19:35
Play later
Play later
Lists
Like
Liked
19:35A lot is at stake at this week’s G7 summit in Alberta. Prime Minister Mark Carney will be looking for a deal on tariffs, and avoiding the kind of drama that roiled the meeting last time Canada hosted it. CBC journalist JP Tasker walks us through the challenges Carney faces at this meeting, while Peter MacKay and Bessma Momani assess whether world l…
…
continue reading

1
How this conductor is bringing Powell River, B.C. together with music
26:49
26:49
Play later
Play later
Lists
Like
Liked
26:49Many small communities across the country are struggling to survive, as people age and their children chase big city life. Powell River, B.C. is trying to keep its own numbers up with the help of a conductor who’s worked with some of the world’s biggest orchestras. In her documentary War and Peace, the CBC’s Liz Hoath hears from locals who say Arth…
…
continue reading

1
What will it take to get more people into the trades?
24:00
24:00
Play later
Play later
Lists
Like
Liked
24:00As the prime minister eyes a number of “nation-building” projects, the country is in need of tens of thousands more tradespeople to make them happen. We hear from high school students planning to pursue jobs in the trades, while economists Simon Gaudreault and Jim Stanford debate whether lowering standards and encouraging greater immigration could …
…
continue reading
We spent the week learning keybindings, installing dependencies, and cramming for bonus points. Today, we score up and see how we did in the TUI Challenge. Sponsored By: Tailscale: Tailscale is a programmable networking software that is private and secure by default - get it free on up to 100 devices! 1Password Extended Access Management: 1Password…
…
continue reading

1
$200,000 Zoom Call, Microsoft, Zero-Click, China & HD With $649 million of Bitcoin - SWN #485
28:38
28:38
Play later
Play later
Lists
Like
Liked
28:38This week we have, $200,000 Zoom Call, Microsoft Teams, INTERPOL, Zero-Click, Junk Food, China & Hard Drive With $649 million of Bitcoin. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-485
…
continue reading

1
HN785: How To Take Your First Steps Into Network Automation
55:50
55:50
Play later
Play later
Lists
Like
Liked
55:50There’s an old saying that a journey of a thousand miles begins with the first step. On today’s show, we talk about taking your first step into network automation with guest Joseph Nicholson. He’s been automating at NTT Data for many years now and has some perspective to share. He’s a network engineer by trade,... Read more »…
…
continue reading

1
Iran and Israel conflict could escalate quickly after Israeli strikes: expert
19:30
19:30
Play later
Play later
Lists
Like
Liked
19:30Israel targeted nuclear facilities inside Iran in a major attack against the country, killing top military brass and civilians alike. Iran is already retaliating against what it calls a “declaration of war” by Israel with drone strikes of its own. We hear from a journalist and an Iranian political expert about why the escalation is coming right now…
…
continue reading

1
A Saskatchewan scientist says he has a treatment for ALS. Critics say his claims are questionable
24:22
24:22
Play later
Play later
Lists
Like
Liked
24:22ALS is a death sentence for those diagnosed with it. Now a scientist in Moose Jaw claims he has discovered the secret to stopping the disease in its tracks. CBC’s Geoff Leo investigated the claims of a treatment, which desperate patients are forking over tens of thousands of dollars for, in his documentary Hard to Swallow.…
…
continue reading

1
Meet suzetrigine, the new non-opioid painkiller promising relief without risk of addiction
24:30
24:30
Play later
Play later
Lists
Like
Liked
24:30When it comes to treating chronic pain, doctors have few options to reach for aside from opioid prescriptions for their patients. A non-opioid medication recently approved by the U.S. Food and Drug Administration stands to change that. A journalist explains how researchers discovered a new way to combat pain with this drug, which a Canadian doctor …
…
continue reading

1
UEFI Vulnerabilities Galore - PSW #878
2:10:48
2:10:48
Play later
Play later
Lists
Like
Liked
2:10:48This week: You got a Bad box, again Cameras are expose to the Internet EU and connected devices Hydrophobia NVRAM variables Have you heard about IGEL Linux? SSH and more NVRAM AI skeptics are nuts, and AI doesn't make you more efficient Trump Cybersecurity orders I think I can root my Pixel 6 Decentralized Wordpres plugin manager Threat actor namin…
…
continue reading

1
CCT 253: Practice CISSP Questions - Conduct logging and monitoring activities (Domain 7.2)
25:09
25:09
Play later
Play later
Lists
Like
Liked
25:09Send us a text Security professionals face a constant battle to keep up with evolving threats, and our latest CISSP Question Thursday podcast delivers critical insights into one of the most fundamental cybersecurity capabilities: effective logging and monitoring. The episode begins with a warning about a sophisticated attack campaign targeting recr…
…
continue reading

1
Changing Testing using Playwright MCP with Debbie O'Brien
49:11
49:11
Play later
Play later
Lists
Like
Liked
49:11What happens when AI comes to your web testing tool? While at Build, Carl and Richard talked to Debbie O'Brien about the latest features in Playwright, including Playwright MCP, the model control plane for Playwright capabilities. Debbie talks about using Playwright MCP to buy a table. Ask your LLM what tests should be written for your web page, an…
…
continue reading

1
How to get your kids hooked on reading over the summer
22:53
22:53
Play later
Play later
Lists
Like
Liked
22:53It’s not always easy to get your kids reading in the summer. Whether it’s Minecraft or going to the swimming pool, kids have plenty of excuses to not pick up a book. Three experts are here with their favourite kids books for the season — and they tell us how you, too, can get the child in your life to keep reading.…
…
continue reading

1
Calling the military into L.A. poses a threat to democracy: advocate
19:44
19:44
Play later
Play later
Lists
Like
Liked
19:44ICE raids in L.A. sparked protests, pushback and stopped traffic in that city — which have been met with military force, as U.S. President Donald Trump sent in the National Guard and Marines earlier this week. Antonio Gutierrez, co-founder of Organized Communities Against Deportations, says these moves are a threat to American democracy — and a law…
…
continue reading

1
Canadian video game maker wins Peabody — as the industry faces massive downturn
22:15
22:15
Play later
Play later
Lists
Like
Liked
22:15Earlier this month, Remy Siu and his team at Sunset Visitor won a Peabody for their video game 1000xResist. The project was a success, to its own creators' surprise, as they attempted to create a story about mythology for the Asian diaspora. Siu talks about the big win — and a journalist breaks down the context of mass layoffs that are roiling a vi…
…
continue reading