Search a title or topic

Over 20 million podcasts, powered by 

Player FM logo

Security Automation Podcasts

show episodes
 
Artwork
 
The daily cybersecurity news and analysis industry leaders depend on. Published each weekday, the program also includes interviews with a wide spectrum of experts from industry, academia, and research organizations all over the world.
  continue reading
 
Artwork
 
Welcome to the Security Weekly Podcast Network, your all-in-one source for the latest in cybersecurity! This feed features a diverse lineup of shows, including Application Security Weekly, Business Security Weekly, Paul's Security Weekly, Enterprise Security Weekly, and Security Weekly News. Whether you're a cybersecurity professional, business leader, or tech enthusiast, we cover all angles of the cybersecurity landscape. Tune in for in-depth panel discussions, expert guest interviews, and ...
  continue reading
 
Practical DevSecOps (a Hysn Technologies Inc. company) offers vendor-neutral and hands-on DevSecOps and Product Security training and certification programs for IT Professionals. Our online training and certifications are focused on modern areas of information security, including DevOps Security, AI Security, Cloud-Native Security, API Security, Container Security, Threat Modeling, and more.
  continue reading
 
Artwork

1
Three Buddy Problem

Security Conversations

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
The Three Buddy Problem is a popular Security Conversations podcast that goes beyond industry talking points to discuss what others won’t -- nation-state malware, attribution, cyberwar, ethics, privacy, and the messy realities of securing computers and corporate networks. Hosted by three veteran security pros -- journalist Ryan Naraine and malware paleontologists Costin Raiu and Juan Andres Guerrero-Saade -- the weekly show attracts a highly engaged audience of security researchers, corporat ...
  continue reading
 
Artwork

1
Hacker Valley Studio

Hacker Valley Media

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
Welcome back to the show! Hacker Valley Studio podcast features Host Ron Eddings, as he explores the world of cybersecurity through the eyes of professionals in the industry. We cover everything from inspirational real-life stories in tech, to highlighting influential cybersecurity companies, and we do so in a fun and enthusiastic way. We’re making cybersecurity accessible, creating a whole new form of entertainment: cybertainment.
  continue reading
 
Security Done Different is a cybersecurity podcast hosted by CloudGuard experts, featuring conversations with leading industry professionals. In each episode, our team of specialists speaks with cybersecurity thought leaders and innovators to explore strategies, emerging threats and practical solutions.
  continue reading
 
Artwork

1
Simply ICS Cyber

Simply Cyber Media Group

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Simply ICS Cyber podcast features veteran OT security experts Don and Tom, delivering practical insights on securing critical infrastructure and industrial automation systems. With episodes covering essential topics from ICS fundamentals to advanced security frameworks, our show reaches a dedicated audience of operators, security professionals, and decision-makers actively implementing industrial cybersecurity control solutions. Connect with your ideal customers through targeted sponsorships ...
  continue reading
 
Artwork

1
Tech Talks Daily

Neil C. Hughes

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Daily
 
If every company is now a tech company and digital transformation is a journey rather than a destination, how do you keep up with the relentless pace of technological change? Every day, Tech Talks Daily brings you insights from the brightest minds in tech, business, and innovation, breaking down complex ideas into clear, actionable takeaways. Hosted by Neil C. Hughes, Tech Talks Daily explores how emerging technologies such as AI, cybersecurity, cloud computing, fintech, quantum computing, W ...
  continue reading
 
Want to hear what industry experts really think about the cyber threats they face? ShadowTalk is a weekly cybersecurity podcast, made by practitioners for practitioners, featuring analytical insights on the latest cybersecurity news and threat research. Threat Intelligence Analyst Kim Bromley brings over 15 years of experience in threat intelligence across the public and private sectors. Kim and her guests provide practical perspectives on the week’s top cybersecurity news and share knowledg ...
  continue reading
 
Stay ahead of cyberthreats with expert insights and practical security . Led by an ensemble cast of industry thought leaderss offering in-depth analysis and practical advice to fortify your organization's defenses.
  continue reading
 
Artwork

1
Redefining CyberSecurity

Sean Martin, ITSPmagazine

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
Redefining CyberSecurity Podcast Hosted by Sean Martin, CISSP Have you ever thought that we are selling cybersecurity insincerely, buying it indiscriminately, and deploying it ineffectively? For cybersecurity to be genuinely effective, we must make it consumable and usable. We must also bring transparency and honesty to the conversations surrounding the methods, services, and technologies upon which businesses rely. If we are going to protect what matters and bring value to our companies, ou ...
  continue reading
 
Artwork

1
Next in Tech

S&P Global Market Intelligence

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
Define your digital roadmap. Weekly podcasts featuring specialists from across the S&P Global Market Intelligence research team offer deep insights into what's new and what's next in technology, industries and companies as they design and implement digital infrastructure. To learn more, visit: https://www.spglobal.com/marketintelligence/en/topics/tmt-news-insights
  continue reading
 
Artwork

1
TestGuild News Show

Joe Colantonio

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
A weekly show dedicated to helping you kick off your week right with all the latest in automation testing, performance & SRE testing, security testing, and DevOps-related news and updates that you need to know for this week. So grab your favorite cup of coffee or test, and let's do this!
  continue reading
 
Artwork

1
Connect

Axis Communications

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Technology continues to advance at an increasingly rapid pace, so how can you stay on top of it? Learn from those who are pioneering new technologies and promoting entrepreneurial spirit! The Connect podcast encourages people to join prominent thought leaders as they explore today’s most timely and important topics around technology and network solutions. Connect brings listeners an engaging program featuring luminaries and trailblazers—from private industry, the public sector, and professio ...
  continue reading
 
Artwork

1
Manufacturing Hub

Vlad Romanov & Dave Griffith

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
We bring you manufacturing news, insights, discuss opportunities, and cutting edge technologies. Our goal is to inform, educate, and inspire leaders and workers in manufacturing, automation, and related fields.
  continue reading
 
Verbose Mode is a bi-weekly podcast from the team at TuxCare, where IT pros Eric Hendricks and Chris DeMars dig into open source, enterprise IT, and cybersecurity without the jargon. Each episode blends real-world stories, practical insights, and a bit of geeky humor to keep sysadmins, developers, IT leaders, and open-source enthusiasts informed and inspired.
  continue reading
 
Automation, Generative AI, Shift Left - the world of application security is evolving fast, and so are the conversations that shape it. Welcome to The Security Champions Podcast, the go-to resource for insights from the front lines of application security. The podcast is cohosted by Michael Burch, Director of Application Security for Security Journey, and Dustin Lehr, the Director of AppSec Advocacy. Each month, one of them shares a candid conversation with security leaders, engineering voic ...
  continue reading
 
Artwork

1
Day Two DevOps

Packet Pushers

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
Join hosts Ned Bellavance and Kyler Middleton as they dive deep into the challenges of DevOps from the perspective of seasoned practitioners. You'll hear from expert guests—technical leaders, trainers, and consultants with years of hands-on experience—discussing the nuances of DevOps. From AWS to Azure, networking to security, automation to modern cloud environments, each weekly episode equips you with the insights to confidently address tech and business challenges such as resilience, cost ...
  continue reading
 
Artwork

1
Risk Grustlers

Scrut Automation

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Welcome to 'Risk Grustlers,' where we celebrate the extraordinary journeys of modern-day Risk Leaders who embrace the art of 'Grustle'—a powerful fusion of Grind and Hustle. Our podcast dives into the innovative strategies and bold decisions taken by these risk-takers, shaping the future of cybersecurity and risk management. Join us as we explore their inspiring stories, insightful advice, and cutting-edge technologies that define the alternative GRC landscape.
  continue reading
 
I'm always fascinated by new technology, especially AI. One of my biggest regrets is not taking AI electives during my undergraduate years. Now, with consumer-grade AI everywhere, I’m constantly discovering compelling use cases far beyond typical ChatGPT sessions. As a tech founder for over 22 years, focused on niche markets, and the author of several books on web programming, Linux security, and performance, I’ve experienced the good, bad, and ugly of technology from Silicon Valley to Asia. ...
  continue reading
 
Join Privado.ai each week as he navigates the ever-changing landscape of data breaches, surveillance, and individual rights, offering expert insights and actionable advice to help you take control of your digital footprint. Join him for lively discussions, in-depth interviews, and practical tips to protect your privacy in today's connected world.
  continue reading
 
The State of Enterprise IT Security is the show for technology leaders looking for actionable and approachable guidance in the security landscape. The show features Brad Bussie, the CISO of e360, a premier technology solutions provider. In each episode, Brad covers 3 timely topics in each episode impacting the enterprise security landscape.
  continue reading
 
Artwork

1
Breakeven Brothers

Bradley Bernard, Bennett Bernard

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
The Breakeven Brothers podcast explores how AI is transforming the landscape for professionals. Join brothers Bradley Bernard and Bennett Bernard, a software engineer and a Certified Public Accountant, as they offer a unique perspective on how automation and intelligent agents are transforming knowledge work. They explore the shift from manual tasks to strategic oversight, the growing importance of prompt engineering, and the critical skills you'll need to not just survive, but thrive in an ...
  continue reading
 
Ctrl+Alt+Manufacturing, from WTWH Media, explores the technologies and people driving smart manufacturing. Hosts Gary Cohen and Stephanie Neil discuss automation, AI, and digital transformation shaping the industry’s next era.
  continue reading
 
The future of cybersecurity isn’t about AI replacing humans — it’s about AI empowering humans. Security professionals armed with intelligent automation tools will be faster, more accurate, and more proactive than ever before. The combination of AI-driven analytics and human judgment will define the next era of digital protection.
  continue reading
 
Your dose of inspiration. A Philippine podcast show dedicated to help you thrive for greatness, become inspired and urges you to stay motivated despite everything that you are going through. Hosted by Jamir Angelo. A funnel expert and strategist, automation specialist and has been doing digital marketing for years. Take it from someone who has been there. From a fast food attendant, to a security guard, to working as a call center agent - to someone who broke lose and hitting success in the ...
  continue reading
 
Business Compass LLC is an AWS Advanced Consulting Partner and Well-Architected Partner. We have been recognized as APN Certification Distinction. We specialize in cloud migration, serverless solutions, AI/ML, IoT, DevOps, data and analytics, web development, media services, and Well-Architected Framework Reviews. We provide high-performance applications, scalable infrastructure, and cost-optimized deployments with expertise in Generative AI, Data Analytics, Live Streaming, Pay-Per-View, Vid ...
  continue reading
 
Business Compass LLC is an AWS Advanced Consulting Partner and Well-Architected Partner. We have been recognized as APN Certification Distinction. We specialize in cloud migration, serverless solutions, AI/ML, IoT, DevOps, data and analytics, web development, media services, and Well-Architected Framework Reviews. We provide high-performance applications, scalable infrastructure, and cost-optimized deployments with expertise in Generative AI, Data Analytics, Live Streaming, Pay-Per-View, Vid ...
  continue reading
 
Artwork

1
Security Sutra – Cybersecurity Startups and Venture Capital by Startuprad.io™

Startuprad.io – Europe’s Startup & VC Podcast Network

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
ChatGPT: Perfect clarification — that’s important for compliance and metadata consistency. Let’s correct the Security Sutra entry accordingly (removing ™ from all but Startuprad.io™) and reissue the final, publication-ready version. 🎙️ Security Sutra – Cybersecurity Startups and Venture Capital by Startuprad.io™ 🧠 Optimized Title 👉 Security Sutra: Cybersecurity, Startups & Venture Capital by Startuprad.io™ ✅ Complies with your trademark structure ✅ Keeps Apple/Spotify-friendly keyword balanc ...
  continue reading
 
Valorem Reply, part of the Reply Group companies, is a business innovation and transformation firm focused on driving change with unique digital solutions, strategic technology investments and design-led user experiences. Through the expertise of our people and power of Microsoft technologies, our innovative strategies and solutions securely and rapidly transform the way our clients do business. Follow our podcast to get insights on the latest digital transformation trends & updates on Micro ...
  continue reading
 
Artwork
 
Listen to Tech Law Talks for practical observations on technology and data legal trends, from product and technology development to operational and compliance issues that practitioners encounter every day. On this channel, we host regular discussions about the legal and business issues around data protection, privacy and security; data risk management; intellectual property; social media; and other types of information technology.
  continue reading
 
Artwork

1
Mac Admins Podcast

Mac Admins Podcast LLC

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
A rotating panel of Mac admins and consultants are joined by members of the Mac admin community to discuss the latest news, issues, and challenges of managing Apple devices. New episodes weekly. Join the community at macadmins.org.
  continue reading
 
Artwork

1
AI for Replacing Human Labor

Enterprise AI Automation

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Daily+
 
Hire WorkForce is revolutionizing the modern workplace by leveraging advanced AI for replacing human labor in repetitive and time-consuming tasks. Through cutting-edge automation and intelligent process management, the company empowers businesses to reduce operational costs, increase productivity, and maintain unmatched accuracy across all departments. From data analysis and customer support to logistics and administrative functions, AI-driven systems by Hire WorkForce streamline workflows a ...
  continue reading
 
Artwork

1
Cloud Security Podcast

Cloud Security Podcast Team

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
Learn Cloud Security in Public Cloud the unbiased way from CyberSecurity Experts solving challenges at Cloud Scale. We can be honest because we are not owned by Cloud Service Provider like AWS, Azure or Google Cloud. We aim to make the community learn Cloud Security through community stories from small - Large organisations solving multi-cloud challenges to diving into specific topics of Cloud Security. We LIVE STREAM interviews on Cloud Security Topics every weekend on Linkedin, YouTube, Fa ...
  continue reading
 
Tune in for lively, insightful discussion of topics important to the mainframe community, from DevOps to security and staffing. 2020 & 2024 winner of the DevOps Dozen Award for Best DevOps-Related Podcast Series.
  continue reading
 
Artwork

1
theCronJob

Zesty Tech Ltd

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
A podcast for engineers building and operating modern infrastructure. Powered by Zesty. Hosted by Omer Hamerman and Mark Serdze, The Cron Job explores Kubernetes quirks, cost optimization strategies, scaling, reliability, and the art of keeping things from catching fire in production, all while unpacking the deeper DevOps questions around ownership, automation, and the tradeoffs behind every engineering decision. Tune in for real-world stories, sharp insights, and the occasional infrastructu ...
  continue reading
 
Talking Security is your go-to podcast for everything related to Microsoft Security and DevSecOps. Hosted by Frans Oudendorp and Pouyan Khabazi, we dive deep into topics like Microsoft Defender, Entra, Intune, Zero Trust, identity protection, security automation, and secure development practices. In each episode, we engage with Microsoft MVPs, product team members, and security experts to explore real-world challenges, practical solutions, and the latest innovations across the Microsoft Secu ...
  continue reading
 
Listen to the latest happenings in Healthcare IT in this series of interviews with leading experts in healthcare technology. Whether you're trying to understand EMR and EHR, healthcare communications, security and privacy, analytics, telehealth and telemedicine, and much more, these interviews will dive into what's really happening on the front lines of healthcare. Learn more at: https://www.healthcareittoday.com
  continue reading
 
Loading …
show series
 
Modern enterprises face a growing challenge in managing thousands of devices, applications, and identities across increasingly complex IT environments. Unmanaged assets, shadow IT, and inconsistent processes can quietly create security gaps that expose organisations to significant risk. In this episode of Security Strategist, Syed Ali, Chief Execut…
  continue reading
 
Most companies still test security long after code is shipped. That delay creates blind spots. In this episode, Rejah Rehim, Co-Founder & CEO of Beagle Security, explains how automated penetration testing gives teams a clearer picture of their real exposure—while keeping the process simple enough for developers to run themselves. Rejah: https://www…
  continue reading
 
CloudPova Solutions: Transforming Startup Security with Automated IAM & Access Control https://knowledge.businesscompassllc.com/cloudpova-solutions-transforming-startup-security-with-automated-iam-access-control/ Startups face a tough reality: 60% experience security breaches within their first two years, often due to weak identity access managemen…
  continue reading
 
Reimbursements in health care have gotten more complex with the growing importance of risk-based, value-based plans and behavior change. In this video interview, Tiffany Waltos, Director of Revenue and Analytics at Community Health Care in Northern Ohio, discusses today’s pressures on revenue cycle management and ways health care providers can resp…
  continue reading
 
In this special episode of Threat Vector, host David Moulton, Senior Director of Thought Leadership for Unit 42, sits down with Stav Setty, Principal Researcher at Palo Alto Networks, to unpack Jingle Thief a cloud-only, identity-driven campaign that turned Microsoft 365 into a gift card printing press. Stav explains how the Morocco based group kno…
  continue reading
 
S3 vs. Athena for Big Data: Speed, Use Cases, and Best Practices https://knowledge.businesscompassllc.com/s3-vs-athena-for-big-data-speed-use-cases-and-best-practices/ Choosing between AWS S3 vs Athena for your big data projects can feel overwhelming when you’re staring at massive datasets and tight deadlines. While both are powerful AWS big data s…
  continue reading
 
Preventing Access Issues in AWS IAM: Master Resource and Identity Policies https://knowledge.businesscompassllc.com/preventing-access-issues-in-aws-iam-master-resource-and-identity-policies/ AWS IAM access control problems can turn your day into a debugging nightmare. One minute your application works perfectly, the next you’re staring at access de…
  continue reading
 
Building a Scalable Data Lake with AWS Using the Medallion Architecture Model https://knowledge.businesscompassllc.com/building-a-scalable-data-lake-with-aws-using-the-medallion-architecture-model/ Modern businesses generate massive amounts of data daily, but turning that raw information into actionable insights remains a major challenge. Building …
  continue reading
 
What if the biggest cyber risk inside your company wasn’t malware — but identity? In this episode, I sit down with Santhosh Jayaprakash, founder & CEO of UnoSecur, to unpack one of the fastest-moving transformations in cybersecurity: the rise of identity as the new perimeter. Attackers don’t break in anymore — they log in. And with AI agents, LLM w…
  continue reading
 
Why do entire organisations invest millions building resilient data centres yet leave their endpoints exposed to outages that can last days? That question kept coming back to me during my conversation with James Millington of IGEL at the Now and Next event, because it highlights a gap that most IT leaders still underestimate. James walked me throug…
  continue reading
 
In the security news: Cloudflare was down, it was not good Logitech breached The largest data breach in history? Fortinet Fortiweb - the saga continues Hacking Linux through your malware scanner, oh the irony I never stopped hating systemd The ASUS exploit that never existed If iRobot fails, can we deploy our own hacker bot army? Firmware encryptio…
  continue reading
 
The US and allies sanction Russian bulletproof hosting providers. The White House looks to sue states over AI regulations. The US Border Patrol flags citizens’ “suspicious” travel patterns. Lawmakers seek to strengthen the SEC’s cybersecurity posture. A new Android banking trojan captures content from end-to-end encrypted apps. A hidden browser API…
  continue reading
 
This episode takes you inside the reality of becoming a systems integrator and growing a technical services business from the ground up. Vlad and Dave share their personal experiences launching and running integration companies, the lessons they learned as engineers moving into business ownership, and the challenges that come with finding customers…
  continue reading
 
Brad is back from the grind and finally has something to show for his 4 AM coding sessions: the official SplitMyExpenses iOS app is live on the App Store! He shares the entire journey, from the initial manual coding attempts to leveraging AI tools like Claude Code that dramatically accelerated his development pace and expanded the app's feature set…
  continue reading
 
Understanding AWS Data Transfer: Key Services, Tools, and Cost Strategies https://knowledge.businesscompassllc.com/understanding-aws-data-transfer-key-services-tools-and-cost-strategies/ AWS data transfer can make or break your cloud budget, especially as your business scales and moves more data across regions, availability zones, and external netw…
  continue reading
 
Optimizing VPC Architecture: Cost Benefits of Using NAT Instances https://knowledge.businesscompassllc.com/optimizing-vpc-architecture-cost-benefits-of-using-nat-instances/ Managing AWS networking costs can eat up your cloud budget fast, especially when you’re running multiple private subnets that need internet access. For cloud architects, DevOps …
  continue reading
 
Automating Keycloak Deployment on AWS ECS Fargate Using Terraform https://knowledge.businesscompassllc.com/automating-keycloak-deployment-on-aws-ecs-fargate-using-terraform/ Deploying Keycloak on AWS can be complex and time-consuming when done manually. This podcast shows you how to automate Keycloak deployment on AWS ECS Fargate using Terraform, t…
  continue reading
 
How to Pentest AWS Environments: A Clear and Practical Checklist https://knowledge.businesscompassllc.com/how-to-pentest-aws-environments-a-clear-and-practical-checklist/ AWS penetration testing has become critical as more organizations move their infrastructure to the cloud. This podcast provides a practical AWS security checklist for security pro…
  continue reading
 
Building a vLLM Inference Platform on Amazon ECS with EC2 Compute https://knowledge.businesscompassllc.com/building-a-vllm-inference-platform-on-amazon-ecs-with-ec2-compute/ Running large language models in production requires a robust infrastructure that can handle massive computational demands while staying cost-effective. This podcast walks you …
  continue reading
 
Modern Data Analytics on AWS: A Cohesive Guide to Glue and Athena https://knowledge.businesscompassllc.com/modern-data-analytics-on-aws-a-cohesive-guide-to-glue-and-athena/ For data engineers, analysts, and cloud architects ready to master AWS’s powerful analytics duo, this podcast breaks down everything you need to build robust, scalable data pipe…
  continue reading
 
Boost Your Productivity: Best Python Automation Scripts for DevOps Engineers https://knowledge.businesscompassllc.com/boost-your-productivity-best-python-automation-scripts-for-devops-engineers/ DevOps engineers spend countless hours on repetitive tasks that eat away at time better spent on strategic work. Python automation scripts for DevOps can c…
  continue reading
 
Understanding AWS Load Balancers Made Simple: ALB vs. NLB vs. CLB https://knowledge.businesscompassllc.com/understanding-aws-load-balancers-made-simple-alb-vs-nlb-vs-clb/ AWS load balancers can make or break your application’s performance, but choosing between ALB, NLB, and CLB doesn’t have to be complicated. This podcast is designed for cloud engi…
  continue reading
 
The Future of AI Deployment: Hosting DeepSeek R1 on AWS for Cost & Scale Gains https://knowledge.businesscompassllc.com/the-future-of-ai-deployment-hosting-deepseek-r1-on-aws-for-cost-scale-gains/ DeepSeek R1 deployment on AWS is changing how businesses approach enterprise AI scalability and cost management. This podcast targets AI engineers, cloud…
  continue reading
 
AWS Lambda Networking Deep Dive: VPC Access to DynamoDB and RDS https://knowledge.businesscompassllc.com/aws-lambda-networking-deep-dive-vpc-access-to-dynamodb-and-rds/ AWS Lambda functions can connect to your VPC resources, but setting up AWS Lambda VPC networking properly makes the difference between a smooth deployment and hours of troubleshooti…
  continue reading
 
What happens when a founder who built a billion dollar company during a global crisis steps into the centre of industrial AI and begins reshaping how entire organisations think and work? That question sat at the heart of my conversation with Somya Kapoor, CEO of IFS Loops, recorded live on the show floor at IFS Industrial X Unleashed. Somya's journ…
  continue reading
 
Cloudflare’s outage is rooted in an internal configuration error. The Trump administration is preparing a new national cyber strategy. CISA gives federal agencies a week to secure a new Fortinet flaw. MI5 warns that China is using LinkedIn headhunters and covert operatives to target lawmakers. Experts question the national security risks of TP-Link…
  continue reading
 
Resources: https://linktr.ee/ReliaQuestShadowTalk Join host Kim, intelligence analyst John, and threat hunter Tristan as they discuss: Fortinet Flaw Enables Admin Takeover Akira Ransomware Targets Nutanix VMs Smart Redirects Evade Phishing Detection Threat Hunter Hacks: SEO Hits Hard Listen on @Listennotes: https://lnns.co/mgbyVjXv7p6 Kim Bromley: …
  continue reading
 
⬥EPISODE NOTES⬥ Understanding Beg Bounties and Their Growing Impact This episode examines an issue that many organizations have begun to notice, yet often do not know how to interpret. Sean Martin is joined by Casey Ellis, Founder of Bugcrowd and Co-Founder of disclose.io, to break down what a “beg bounty” is, why it is increasing, and how security…
  continue reading
 
Send us a text Get an inside look at how ESRB’s Privacy Certified program uncovers hidden web & app privacy risks like GPC failures, sensitive data collection, misleading banners, misconfigured SDKs, and children’s data violations. In this conversation, Stacy Feuer (SVP, ESRB Privacy Certified) and Vaibhav Antil (CEO, Privado AI) break down: - The …
  continue reading
 
Ever wonder what it takes to level up your career in data science? Senior Data Scientist Darya Petrashka joins Ned and Kyler to share her personal journey from management and linguistics into data science, the real difference between a junior and a senior role, and helps us get under the “data science umbrella” to see... Read more »…
  continue reading
 
In this episode of Simply ICS Cyber, Don and Tom welcome Sam Blaney, retired Chief Warrant Officer (CW3) from the Georgia National Guard and current cybersecurity professor at the University of North Georgia. Sam shares insights from his career building and leading Cyber Protection Team 170, his transition into teaching, and his continued work help…
  continue reading
 
[SPONSORED] Empty shelves in a hospital aren’t just an inconvenience—they can delay care. Other industries solved this problem years ago with predictive tools and smarter supply chains. At the 2025 Oracle Health Summit, Kristen Miles, Vice President of Healthcare Product Strategy at Oracle, discusses how automation, robotics, and AI are reshaping s…
  continue reading
 
“People love the idea that an agent can go out, learn how to do something, and just do it,” Jeff Hickman, Head of Customer Engineering, Ory, said. “But that means we need to rethink authorization from the ground up. It’s not just about who can log in; it’s about who can act, on whose behalf, and under what circumstances.” In the latest episode of T…
  continue reading
 
It's a topic we discuss often on Business Security Weekly: CISO Burnout. It's real, but how should you manage it? Dr. Yonesy Núñez, Global Cybersecurity Executive at Chain Bridge Bank and former Managing Director, Chief Cybersecurity Risk Officer, and Chief Information Security Officer at The Depository Trust & Clearing Corporation (DTCC), joins Bu…
  continue reading
 
It's a topic we discuss often on Business Security Weekly: CISO Burnout. It's real, but how should you manage it? Dr. Yonesy Núñez, Global Cybersecurity Executive at Chain Bridge Bank and former Managing Director, Chief Cybersecurity Risk Officer, and Chief Information Security Officer at The Depository Trust & Clearing Corporation (DTCC), joins Bu…
  continue reading
 
It's a topic we discuss often on Business Security Weekly: CISO Burnout. It's real, but how should you manage it? Dr. Yonesy Núñez, Global Cybersecurity Executive at Chain Bridge Bank and former Managing Director, Chief Cybersecurity Risk Officer, and Chief Information Security Officer at The Depository Trust & Clearing Corporation (DTCC), joins Bu…
  continue reading
 
Automating our work load is a given in IT, and there are a lot of tools out there to help you accomplish streamlined workflows and reclaim time back in your day. Something the Mac Admin Community excels at is its open source mindset and providing tools to others to lend a helping hand. In today's episode we won't be focusing on a specific automatio…
  continue reading
 
Have you ever wondered what happens when the browser stops being a simple window to the web and starts becoming the control point for how AI touches every part of enterprise life? That was the starting point for my conversation with Michael Shieh, founder and CEO of Mammoth Cyber. What followed was a detailed look at why the browser is turning into…
  continue reading
 
Architecting a 2-Tier VPC on AWS: Security, Resilience, and Best Practices https://knowledge.businesscompassllc.com/architecting-a-2-tier-vpc-on-aws-security-resilience-and-best-practices/ Building a solid AWS VPC architecture can make or break your cloud infrastructure. Getting your 2-tier VPC design right from the start saves you countless headac…
  continue reading
 
Optimizing AWS Deployments: Route 53 DNS Patterns and ELB Load Balancing Techniques https://knowledge.businesscompassllc.com/optimizing-aws-deployments-route-53-dns-patterns-and-elb-load-balancing-techniques/ AWS infrastructure teams and DevOps engineers face constant pressure to deliver reliable, high-performance applications that can handle unpre…
  continue reading
 
Terraform Provider Iteration Deep Dive: Benefits, Risks, and Real-World Use Cases https://knowledge.businesscompassllc.com/terraform-provider-iteration-deep-dive-benefits-risks-and-real-world-use-cases/ Terraform provider iteration is changing how DevOps engineers and infrastructure teams manage their infrastructure as code deployments. Many organi…
  continue reading
 
Ensuring Business Continuity with AWS: Disaster Recovery Frameworks and Best Practices https://knowledge.businesscompassllc.com/ensuring-business-continuity-with-aws-disaster-recovery-frameworks-and-best-practices/ Business outages cost companies an average of $5,600 per minute, making AWS disaster recovery a critical investment for any organizatio…
  continue reading
 
Secure Authentication: Integrating Azure AD Workload Identity Federation with Cognito https://knowledge.businesscompassllc.com/secure-authentication-integrating-azure-ad-workload-identity-federation-with-cognito/ Modern cloud applications need robust authentication that works across different platforms. Azure AD Workload Identity Federation with Co…
  continue reading
 
Architecting a Scalable Media On-Demand Service on AWS Cloud https://knowledge.businesscompassllc.com/architecting-a-scalable-media-on-demand-service-on-aws-cloud/ Building a scalable video on demand AWS platform requires smart planning and the right cloud infrastructure. This podcast targets cloud architects, DevOps engineers, and streaming platfo…
  continue reading
 
Transforming Analytics: Navigating Business Outcomes with QuickSight Data Scenarios https://knowledge.businesscompassllc.com/transforming-analytics-navigating-business-outcomes-with-quicksight-data-scenarios/ Business leaders and data teams are discovering that QuickSight analytics can transform how organizations make decisions and drive measurable…
  continue reading
 
Loading …
Copyright 2025 | Privacy Policy | Terms of Service | | Copyright
Listen to this show while you explore
Play