A podcast for information security defenders (blue team) on best practices, tools, and implementation for enterprise security.
…
continue reading
Security Best Practices Podcasts
The AI in Business Podcast is for non-technical business leaders who need to find AI opportunities, align AI capabilities with strategy, and deliver ROI. Each week, Emerj AI Research CEO Daniel Faggella and team interview top AI executives from Fortune 2000 firms and unicorn startups - uncovering trends, use-cases, and best practices for practical AI adoption. Visit our advertising page to learn more about reaching our executive audience of Fortune 2000 AI adopters: https://emerj.com/advertise
…
continue reading
Weekly information security podcast airing Monday mornings hosted by Oscar Minks and Brad Nigh. In a unique focus on protecting personal information, Oscar and Brad discuss information security as an issue that includes cyber security, physical security, as well as administrative controls. Oscar is the CTO of FRSecure and heads technical services and operations at the company. Brad is the Principal Security Consultant and a 20+ year veteran of the industry.
…
continue reading
Secure Talk reviews the latest threats, tips, and trends on security, innovation, and compliance. Host Justin Beals interviews leading privacy, security and technology executives to discuss best practices related to IT security, data protection and compliance. Based in Seattle, he previously served as the CTO of NextStep and Koru, which won the 2018 Most Impactful Startup award from Wharton People Analytics. He is the creator of the patented Training, Tracking & Placement System and the auth ...
…
continue reading
Jake Voll brings security industry professionals together to discuss best practices, challenges, and opportunities.
…
continue reading
Welcome to video version of “Cybersecurity Where You Are,” the podcast of the Center for Internet Security® (CIS®). Cybersecurity affects us all — whether we’re online at home, managing a company, supporting clients, or running a state or local government. Join us on Wednesdays as Sean Atkinson, CISO at CIS, and Tony Sager, SVP & Chief Evangelist at CIS, discuss trends and threats, explore security best practices, and interview experts in the industry. Together, we’ll clarify these issues, c ...
…
continue reading
Digital certificate industry veterans Tim Callan and Jason Soroko explore the issues surrounding digital identity, PKI, and cryptographic connections in today's dynamic and evolving computing world. Best practices in digital certificates are continually under pressure from technology trends, new laws and regulations, cryptographic advances, and the evolution of our computing architectures to be more virtual, agile, ubiquitous, and cloud-based. Jason and Tim (and the occasional guest subject ...
…
continue reading
On WE’RE IN!, you'll hear from the newsmakers and innovators who are making waves and driving the cyber security industry forward. We talk to them about their stories, the future of the industry, their best practices, and more.
…
continue reading
“Health has become overcomplicated. I aim to simplify it” In this podcast, we hear stories from leading health experts and exciting personalities who offer easy health life-hacks, expert advice and debunk common health myths giving you the tools to revolutionise how you eat, sleep, move and relax. Hosted by Dr Chatterjee - one of the most influential GPs in the country with nearly 20 years experience, star of BBC 1’s Doctor In the House, and author of 6 internationally best-selling books, in ...
…
continue reading
Defending the Edge is a bi-weekly cyber security podcast bringing you the updates that matter most to you in the cyber security domain. Join the Cyber Threat Intelligence team at DefendEdge as they keep you informed on current cyber threats, hostile actors, solutions, interview experts in the field, and take deep-dives into historical cyber security topics and learn how they impact us today. From threat analysis to best practices and solutions, we are here to help you defend the edge of your ...
…
continue reading
When Russian hackers break into your business’s computers, what will they find and how much will it cost you? How long will it take you to recover? Can you recover? Here’s the sad truth: 97% of breaches could have been prevented with basic security measures; but once you’ve been hit… you can never get UnHacked! UnHacked is a weekly cybersecurity podcast for SMB business owners and leaders that helps them sort through the overwhelming security costs and recommendations, and focus on the best ...
…
continue reading
Impressive Hosting is a podcast that explores the core tenets of great WordPress hosting, from performance and security to scalability and user experience. Hosted by Jesse Friedman of WP Cloud, each episode features in-depth conversations with industry experts, developers, and hosting professionals who share insights, best practices, and real-world challenges. Whether you’re managing enterprise-level WordPress infrastructure, optimizing hosting for higher education, or scaling for high-traff ...
…
continue reading
Our podcast series is dedicated to exploring topics related to adoption, fostering and kinship care. We invite children’s social care professionals and experts by experience to join us to share best practices, their experiences and knowledge.
…
continue reading
Kitecast features interviews with security, IT, compliance, and risk management leaders and influencers, highlighting best practices, trends, and strategic analysis and insights.
…
continue reading
The Practical 365 Podcast is a fortnightly show covering all things Microsoft 365, Copilot, AI, MIcrosoft Teams, Exchange & Cybersecurity plus any hot technology topics that are worth a deep-dive to help you learn more and get the real-world view. Your hosts are Microsoft MVPs Steve Goodman, Paul Robichaux and Quest's Bastiaan Verdonk, who will share their expert opinions on the talk of the week, and Q&A with special guests.
…
continue reading
Introducing "IT Unplugged" - your go-to podcast for all things IT, Cybersecurity, Business, and Technology! Join our experts as they break down complex topics into simple, easy-to-understand concepts. In each episode, we'll explore the ever-evolving digital landscape and provide practical insights to help your business navigate this exciting world. From cybersecurity best practices to the latest tech trends, we've got you covered. No IT jargon, no complicated explanations - just straightforw ...
…
continue reading
Description: Creating AI Trust is a very complex and hard problem. It is not clear what it is and how it can be operationalized. We will demystify what is Trustworthy AI, efficient adoption and leveraging it for reducing risks in AI programs. McKinsey reports indicates companies seeing the biggest bottom-line returns from AI—those that attribute at least 20 percent of EBIT or profitability to their use of AI—are more likely than others to follow Trustworthy AI best practices, including expla ...
…
continue reading
What economic trends today will set the stage for the future? How will legislative actions impact student financial aid? What accounting policy or reporting changes are on the horizon? Navigating the business of higher education institutions requires knowledge about a variety of issues—from finance to campus security. In this podcast series, hear colleagues, experts, and industry leaders explore issues, provide best practices, offer solutions to new questions that may not have been asked bef ...
…
continue reading
Russ Branzell, President & CEO of the College of Healthcare Information Management Executives (CHIME), interviews leaders in Digital Health from around the world. These thought leaders share their knowledge, challenges, best practices, and ideas for helping to transform health and care on a global level.
…
continue reading
Securing the future of DevOps and AI: real talk with industry leaders.
…
continue reading

1
All Things Secured | Online Privacy & Security on Odysee
All Things Secured | Online Privacy & Security
All Things Secured is dedicated to helping you hack-proof your digital life. Get tips and tutorials on how to lock down your social profiles, use a password manager, connect to a virtual private network (VPN), use an identity monitoring service and much, much more. Now more than ever, it's important to keep yourself safe and secure online. We all tend to know this is true, and yet we rarely do anything about it. Now, you can change that. With the Internet of Things creeping into our daily li ...
…
continue reading
Expert Insights and Stories on SAP and beyond. Transformation Every Day is the podcast for anyone passionate about Digital Transformation done right in the SAP universe. Join hosts Alexander Greb and Johannes Langguth, along with leading experts from SAP and beyond, as they dive deep into what successful digital transformation really takes. Get ready for candid conversations, inspiring experts insights, best practices and practical strategies to drive impactful change in your organization.
…
continue reading
If you know how attacks work, you’ll know exactly where to look—whether you’re breaking in as an ethical hacker or defending as a blue teamer. Hacked & Secured: Pentest Exploits & Mitigations breaks down real-world pentest findings, exposing how vulnerabilities were discovered, exploited, and mitigated. Each episode dives into practical security lessons, covering attack chains and creative exploitation techniques used by ethical hackers. Whether you're a pentester, security engineer, develop ...
…
continue reading
Welcome to "Privacy Please," a podcast for anyone who wants to know more about data privacy and security. Join your hosts Cam and Gabe as they talk to experts, academics, authors, and activists to break down complex privacy topics in a way that's easy to understand. In today's connected world, our personal information is constantly being collected, analyzed, and sometimes exploited. We believe everyone has a right to understand how their data is being used and what they can do to protect the ...
…
continue reading
This podcast is for ocean entrepreneurs and innovators who want to grow and succeed in the blue economy. Through interviews with industry leaders, founders, and subject matter experts, I will share their stories, unpack their most important lessons, and extract actionable insights and best practices.
…
continue reading
Join us for Simply Defensive, a podcast dedicated to exploring the world of defensive cybersecurity through the lens of real-world experts. In each episode, we'll interview leading professionals from the cybersecurity industry, delving into their experiences, challenges, and innovative solutions. Whether you're a seasoned cybersecurity veteran or just starting to learn about the field, Simply Defensive offers valuable insights and practical advice to help you stay ahead of the curve. Tune in ...
…
continue reading
Stay up-to-date on the latest QuickBooks news, tips, and updates with Certified QuickBooks ProAdvisor Alicia Katz Pollock, MAT. Alicia and guests break down need-to-know QuickBooks information in a fun and engaging format. Learn about new product features, accounting technology trends, integration how-tos, and best practices for getting the most out of QuickBooks all while earning NASBA-approved CPE.
…
continue reading
Sync Up is your one-stop shop for all things OneDrive. Join hosts, Stephen Rice and Arvind Mishra, as they shed light on how OneDrive connects you to all of your files in Microsoft and enables you to share and work together from anywhere, and any device! Hear from experts behind the design and development of OneDrive, as well as customers and Microsoft MVPs! Each episode will give you news and announcements, tips and best practices for your OneDrive experience, and some fun and humor!
…
continue reading
Banking on Growth is a podcast for bankers and financial advisors operating in community-based banks and credit unions. Throughout this podcast, we'll chat with financial industry professionals and thought leaders at the forefront of developing creative solutions to assist community banks in delivering financial advisory services to their clients with the goal of helping the institution grow. We'll examine the most recent industry developments, technology, and best practices for providing hi ...
…
continue reading
A interview series where information security marketing executives share their stories, insights, best practices. For more information, check out: https://cybersecuritysalesinsider.substack.com and https://aphinia.com/
…
continue reading
Security Nation Podcast is hosted by ESA, and it brings the voice of the electronic security and life safety industry to you! Host Hannah Boone brings on security pros to discuss best practices, real-life experiences, industry forecasts, and more on this monthly podcast. It's the ever-present voice in an ever-changing industry.
…
continue reading
The pod dedicated to the hardworking network operators who keep the bitpipes running smoothly. We focus on sharing best practices, the operations tool stack, and engage with vendors and solution providers to get insights into new technologies and tools so you can make informed decisions for your ops environment. Hosted by your friendly neighborhood internet plumber, Scott Robohn.
…
continue reading
Meet Patrick Hayes, investment management counsel at Calfee, Halter & Griswold and your host for The Securities Compliance Podcast presented by the National Society of Compliance Professionals. A personal master class for the securities legal and compliance professional, Patrick’s passion is to help you put Compliance In Context™ by combining the technical expertise of industry thought leaders and innovators with the practical experience of doers and key decision-makers. Listen today to help ...
…
continue reading
Podcasts focused on animal nutrition best practices, feed industry trends and offbeat agriculture news relevant to the global animal feed industry.
…
continue reading
Want to hear what industry experts really think about the cyber threats they face? ShadowTalk is a weekly cybersecurity podcast, made by practitioners for practitioners, featuring analytical insights on the latest cybersecurity news and threat research. Threat Intelligence Analyst Kim Bromley brings over 15 years of experience in threat intelligence across the public and private sectors. Kim and her guests provide practical perspectives on the week’s top cybersecurity news and share knowledg ...
…
continue reading
The ERP & Data Management News Briefing delivers concise, actionable updates on the technologies, strategies, and players shaping enterprise resource planning and data management. Each episode distills the latest developments in software, cloud platforms, analytics, and governance—helping IT leaders, business analysts, and decision-makers stay ahead without wading through endless reports. From new vendor launches to emerging best practices in integration, security, and compliance, you’ll get ...
…
continue reading
Our online media channel The Safety Feature brings together industry experts, thought leaders, and innovators to share their insights and experiences on a variety of Security & Life Safety topics. You’ll gain valuable knowledge and perspectives on the latest trends, challenges, and best practices in the industry that can help you stay ahead of the curve.
…
continue reading
The SecurityMetrics Podcast, hosted by Jen Stone (Principal Security Analyst, QSA, CISSP, CISA), will help you understand current data security and compliance trends. Each episode will feature a different security professional offering tips and security best practices.
…
continue reading
The IT Business Podcast is a show for MSPs (Managed Service Providers) and IT Professionals providing business network support and managed services. The podcast aims to provide actionable advice and tips that help IT businesses survive and grow in the competitive tech industry. The podcast features guest interviews with seasoned IT professionals, business owners, vendors and industry leaders who share their experiences, insights, and strategies for success. These discussions often cover topi ...
…
continue reading
Descoped: The Payments Security Podcast is the go-to show from VGS for fintech product builders and leaders. You’ll hear a conversations from experts in payments, issuing, and data security sharing their best practices & real-world experiences.
…
continue reading

1
Secure & Simple — Podcast for Consultants and vCISOs on Cybersecurity Governance and Compliance
Dejan Kosutic
“Secure & Simple” demystifies governance and compliance challenges faced by consultants, as well as professionals acting as fractional CISOs in companies. The podcast is hosted by Dejan Kosutic, an expert in cybersecurity governance, ISO 27001, NIS2, and DORA. The episodes present topics in an easy-to-understand way and provide you with insight you won’t be able to find elsewhere. To provide comments, suggest topics for the next episodes, or express your interest in participating in the show ...
…
continue reading
Down Payment is the podcast for used car dealers and industry professionals that are looking for insights, best practices, and news on the used car industry.
…
continue reading
FINRA Unscripted is the voice of the nation’s largest non-government securities regulator. We bring together FINRA leaders to discuss existing and emerging regulatory topics that impact the broker-dealer industry. We share best practices for compliance officers, insights into the operations of a 3,500 person self-regulated organization and educational tools and information for investors. Every investor in America relies on one thing: fair financial markets. That is what FINRA works every day ...
…
continue reading
Welcome to 'The Citrix Session,' where we bring you the latest in Citrix technologies and solutions. Hosted by XenTegra, this podcast dives deep into the world of Citrix digital workspace solutions, exploring everything from virtual apps and desktops to networking and security. Join us each episode as we discuss best practices, new features, and expert strategies to optimize your Citrix environment and enhance your user experience. Whether you're an IT professional seeking to expand your Cit ...
…
continue reading
"Data at Rest" is an accessible but informed discussion of current concepts, best practices, and personal experiences in computer security, network security, and information security overall, including interviews with expert guests and the history of each topic.
…
continue reading
The need for change in the fundraising sector has never been greater. But innovations in technology are evolving faster than our ability to understand them. Are these advances good or bad? Do they have unintended consequences? And what is the application to the fundraising sector? That’s what we’re here to find out. Welcome to the FundraisingAI podcast, your up-to-date resource for beneficial and responsible AI for the global fundraising community. In our podcast, we explore the intersection ...
…
continue reading
Cybersecurity weekly podcast series featuring industry thought leaders discussing security solutions, best practices, threat intel, and more. Our primary topics within InfoSec include: Application Security; Artificial Intelligence; Blockchain; Career Development; Cloud Security; Encryption / DLP; Endpoint / Mobile / IoT Security; GRC; Incident Response / SIEM; Identity and Access Management; Network Security; Privacy; Ransomware / Malware; and Security Awareness.
…
continue reading

1
Unsecurity Episode 247: Cloud Security Best Practices with Jim Nelson
35:16
35:16
Play later
Play later
Lists
Like
Liked
35:16In this episode of the Unsecurity Podcast, hosts Brad Nigh and Megan Larkins are joined by special guest Jim Nelson from FRSecure to dive deep into the world of cloud security. Whether you're using AWS, Azure, or GCP, understanding the right security protocols is crucial. Jim, a subject matter expert in cloud assessments, CIS benchmarks, and cloud …
…
continue reading
Alicia shares her unconventional journey from making astrology jewelry and teaching English to becoming a QuickBooks authority. She reveals the specific resources, communities, and daily practices that keep her at the top of her game, from testing every QBO feature on her own books to building relationships with Intuit developers. If you've ever wo…
…
continue reading

1
Your Dealership Needs Change Management | Down Payment the Podcast for Used Car Dealers S4 E68
7:54
7:54
Play later
Play later
Lists
Like
Liked
7:54Your Dealership Needs Change Management | Down Payment the Podcast for Used Car Dealers S4 E68 Your dealership needs to change to keep up with world and remain successful. Can you manage that change? Watch this episode for our thoughts on the subject, and then tell us about your tips for managing managers in the comments! Don't miss an episode! Sub…
…
continue reading

1
Fixing Ticket Noise with AI in Enterprise MSP Operations - with Steve Taczala of Impact Networking
18:16
18:16
Play later
Play later
Lists
Like
Liked
18:16Today’s guest is Steve Taczala, VP of Service Operations at Impact Networking. Impact Networking is a managed service provider founded in 1999, with more than 20 US offices, supporting organizations in IT, cybersecurity, and applying AI to business operations. Taczala brings extensive experience in managing MSP service operations and improving IT w…
…
continue reading

1
Data Volume, Quality, and Model Degradation for AI at Scale - with Sunitha Rao of Hitachi Vantara
21:46
21:46
Play later
Play later
Lists
Like
Liked
21:46Today’s guest is Sunitha Rao, SVP and General Manager for Hybrid Cloud Business at Hitachi Vantara. Hitachi Vantara is a wholly owned subsidiary of Hitachi, Ltd. that provides data infrastructure foundations that help leading innovators manage and leverage their data at scale. Through data storage, infrastructure systems, cloud management, and digi…
…
continue reading
This episode opens with a bombshell: Synology finally reversed its drive compatibility policy for NAS units, allowing IT pros and businesses to use third-party drives again—a move that’s sent shockwaves through online forums and social media. I discuss the implications for MSPs and what it means for client storage setups. Next, DattoCon coverage re…
…
continue reading

1
Cl0p's Latest Heist: Exploiting Oracle's Critical Vulnerability
35:08
35:08
Play later
Play later
Lists
Like
Liked
35:08Resources: https://linktr.ee/ReliaQuestShadowTalk Join host Kim along with Intelligence Analyst John and Threat Detection Engineer Marken as they discuss: Clop's Exploitation of Oracle E-Business Suite Scattered Lapsus$ Hunter Returns With Salesforce Leaks Shutdown Threatens US Intel Sharing and Cyber Defense Ransomware and Cyber Extortion in Q3 20…
…
continue reading

1
Episode 68 - AI with Integrity: Preserving Values in a Digital Age with Meena Das
44:55
44:55
Play later
Play later
Lists
Like
Liked
44:55The nonprofit sector continues to reshape with AI, but its power comes with responsibility. The ethical use of AI is essential to ensure technology serves human values rather than replacing them. Organizations need to balance hope and fear, embrace accountability, and create policies rooted in empathy, equity, and integrity. Evolving beyond awarene…
…
continue reading

1
Citrix 2507 LTSR: A Deep Dive into the Latest Innovations
34:51
34:51
Play later
Play later
Lists
Like
Liked
34:51In this episode of The Citrix Session, host Bill Sutton is joined by Randy Price and Stuart Donaldson from XenTegra to unpack the Citrix Virtual Apps and Desktops 2507 Long-Term Service Release (LTSR). Together, they break down what’s new, what’s changed, and why it matters—from HDX enhancements and Secure HDX encryption to Device Trust, Uber Agent…
…
continue reading

1
Episode 156: How CIS Uses CIS Products and Services
37:02
37:02
Play later
Play later
Lists
Like
Liked
37:02In episode 156 of Cybersecurity Where You Are, Sean Atkinson and Tony Sager are joined by Stephanie Gass, Sr. Director of Information Security at Center for Internet Security® (CIS®), and Angelo Marcotullio, Chief Information Officer at CIS. Together, they explore how CIS practices what it preaches by using CIS products and services internally, whi…
…
continue reading

1
The Future of AI Agents in Consumer Goods Operations - with Padma Hari of Nestlé Purina
26:24
26:24
Play later
Play later
Lists
Like
Liked
26:24
…
continue reading

1
Practical AI for In-House Patent Legal - with Kevin Ahlstrom of Meta
18:32
18:32
Play later
Play later
Lists
Like
Liked
18:32
…
continue reading

1
How to Build Inner Strength, Stay Grounded and Keep Going Through Life’s Challenges with Sifan Hassan #584
1:23:33
1:23:33
Play later
Play later
Lists
Like
Liked
1:23:33By Dr Rangan Chatterjee: GP & Author
…
continue reading

1
Root Causes 533: Flexibility Through Multi-CA Trust Models
9:25
9:25
Play later
Play later
Lists
Like
Liked
9:25By Tim Callan and Jason Soroko
…
continue reading

1
Preparing for the Quantum Era: Why Blockchain is Leading the Charge | James Stephens
46:19
46:19
Play later
Play later
Lists
Like
Liked
46:19By Justin Beals
…
continue reading

1
Why Are Good Relationships a Core Tenet of Great Agency Hosting Partnerships?
32:49
32:49
Play later
Play later
Lists
Like
Liked
32:49By Jesse Friedman
…
continue reading

1
iPhone MIE, Microsoft - Israel MOD, npm supply chain attacks
26:53
26:53
Play later
Play later
Lists
Like
Liked
26:53
…
continue reading

1
Volunteer Work in Cybersecurity Nonprofits | Interview with Aruneesh Salhotra
36:04
36:04
Play later
Play later
Lists
Like
Liked
36:04By Dejan Kosutic
…
continue reading

1
Beyond the Hype: How AI Agents Are Transforming Security Businesses Today
57:56
57:56
Play later
Play later
Lists
Like
Liked
57:56By Jake Voll
…
continue reading

1
Encore | Investing Wisely in 2025: Avoiding Scams and Achieving Your Financial Goals
15:52
15:52
Play later
Play later
Lists
Like
Liked
15:52By FINRA
…
continue reading

1
3 Things You Need to Do for Security! Down Payment the Podcast for Used Car Dealers S4 E67
8:56
8:56
Play later
Play later
Lists
Like
Liked
8:56By META Financial Services, Inc.
…
continue reading

1
The Expanding Role of Video and Visual Data From Footage to Forensics in Retail - with Naveen Kumar of Walmart
16:56
16:56
Play later
Play later
Lists
Like
Liked
16:56
…
continue reading
…
continue reading

1
Hands-On Defense: Markus Schober on DFIR, Labs, and Building Better Blue Teamers
30:31
30:31
Play later
Play later
Lists
Like
Liked
30:31In this episode of Simply Defensive, Josh Mason and Wade Wells sit down with Markus Schober, founder of Blue Cape Security, to talk all things digital forensics, incident response (DFIR), and why hands-on training beats theory every time. We dig into: 🔹 The hidden value of building your own cyber range 🔹 How IR pros train using real attacks (and wh…
…
continue reading

1
Risk and Responsibility in the College Business Office
22:39
22:39
Play later
Play later
Lists
Like
Liked
22:39Enterprise Risk Management (ERM) is more than just a threat assessment; it’s a methodical organization-wide approach to making decisions about the safety and security of college and university community members – on campus and abroad. Join Bronté Burleigh-Jones, CFO, vice president, and treasurer at American University; Keesha Trim, senior director…
…
continue reading
Hear from Bradley Gross, one of the tech industry’s top attorneys and founder of Bradley Gross, PA. With over 20 years representing MSPs, Brad shares what every IT pro must know as lawsuits skyrocket around ransomware events. The conversation covers the specifics of contract language, rising legal standards, and how vendor agreements now shape your…
…
continue reading

1
Episode 21: No Monkey Business. The Truth About SAP Security - Jochen Fischer
1:12:31
1:12:31
Play later
Play later
Lists
Like
Liked
1:12:31Guest: Jochen Fischer - CEO - No Monkey Host: Alexander Greb - Consulting Director - cbs corporate business solutions Summary In this conversation, Jochen Fischer shares his journey from being a TSG Hoffenheims hottest asset to becoming a key account manager at SAP and finally founder and CEO of NO MONKEY, one of the leading consulting companies fo…
…
continue reading

1
S6, E257 - How Apple’s New Chip Rewrites Mobile Security
31:48
31:48
Play later
Play later
Lists
Like
Liked
31:48Send us a text We unpack how Apple’s Memory Integrity Enforcement changes the rules of mobile security by rebuilding memory architecture, not just adding guardrails. We weigh who should upgrade now, what this means for Android, and why people remain the biggest risk. • memory corruption explained with apartment analogy • why NOP sleds and heap spra…
…
continue reading

1
TNO044: Inside a Global Enterprise Data Center Network Migration (Sponsored)
44:16
44:16
Play later
Play later
Lists
Like
Liked
44:16Today we get an inside look at a major data center migration that Nokia is undertaking. Nokia is our sponsor for today’s episode. The company is moving legacy sets of data center networking equipment to its own Event Driven Automation (EDA) solution. We go behind the scenes of Nokia’s own IT department, which is supporting... Read more »…
…
continue reading

1
BITESIZE | Try This Simple Dietary Change To Help Reduce Cravings, Increase Your Energy, Get Stronger & Live Longer | Dr Rupy Aujla #583
24:04
24:04
Play later
Play later
Lists
Like
Liked
24:04Protein is the fundamental building block of life – forming everything from our DNA and skin to our enzymes and hormones. Feel Better Live More Bitesize is my weekly podcast for your mind, body, and heart. Each week I’ll be featuring inspirational stories and practical tips from some of my former guests. Today’s clip is from episode 534 of the podc…
…
continue reading

1
You need a new attitude! | Down Payment the Podcast for Used Car Dealers S4 E66
6:40
6:40
Play later
Play later
Lists
Like
Liked
6:40You need a new attitude! | Down Payment the Podcast for Used Car Dealers S4 E66 Are you scaring off customers? It could be your bad attitude! Find out what you can do to fix it and sell more cars! Watch this episode for our thoughts on the subject, and then share your ideas in the comments! Don't miss an episode! Subscribe to Down Payment now! Visi…
…
continue reading

1
How AI Is Reshaping Patent Strategy and Portfolio Management - with Shandon Quinn of Clarivate
22:19
22:19
Play later
Play later
Lists
Like
Liked
22:19Today’s guest is Shandon Quinn, Vice President of Patent Intelligence, Search and Analytics at Clarivate. Quinn joins Emerj Editorial Director Matthew DeMello to examine how AI-powered workflows are helping IP leaders deliver strategic impact, smarter decision-making, and tangible results for data-centric enterprises. Shandon also shares proven cha…
…
continue reading

1
Ubiquiti - The MSP Game Changer (EP 908)
1:05:08
1:05:08
Play later
Play later
Lists
Like
Liked
1:05:08Join Uncle Marv and veteran MSP Tom Wyant as they dive deep into the Ubiquiti ecosystem for IT professionals. Discover real-world tips for replacing SonicWall and Cisco hardware, advanced UniFi management, and transitioning to cost-effective network hardware for MSPs. Whether you’re an Ingenious, Synology, or Cisco fan, get candid pros and cons plu…
…
continue reading
In this episode, Jason describes how we might use the principles of PKI in a purely offline scenario.By Tim Callan and Jason Soroko
…
continue reading

1
SAP's Antitrust Scrutiny, AI Copyright Clash, Databricks-OpenAI Deal, and Salesforce Security
6:58
6:58
Play later
Play later
Lists
Like
Liked
6:58In this episode, we delve into several key developments at the intersection of technology, business, and regulation: 1. **SAP Under EU Scrutiny**: SAP faces antitrust concerns from the European Commission over its ERP software practices, potentially impacting competition and customer costs. Despite SAP's confidence in compliance, the investigation …
…
continue reading

1
Should Governments Hoard Zero Days? Analyzing Brickstorm Malware and Storm-1849
26:29
26:29
Play later
Play later
Lists
Like
Liked
26:29Resources: https://linktr.ee/ReliaQuestShadowTalk Join host Joey along with intelligence analysts Alex and Hayden as they discuss: Brickstorm Backdoor in U.S. Legal and Tech Sectors (1:17) Storm-1849 Targeting Cisco ASA Devices (4:38) Medusa Attempts to Pay Reporter for Initial Access (7:00) Debate Over Government Zero-Day Stockpiling (14:41) Josep…
…
continue reading

1
Migrating Desktop Payroll and Payments to QuickBooks Online Without Starting Over
37:20
37:20
Play later
Play later
Lists
Like
Liked
37:20Converting from QuickBooks Desktop to Online doesn't have to mean rebuilding your payroll from scratch or losing all your attachments. Dan joins Alicia and reveals how matching your Intuit ID, QuickBooks admin, and QBO primary admin can bring employee data, pay rates, and direct deposit information over automatically, even with 431 employees. He al…
…
continue reading

1
Episode 155: The Story of CIS 2.0 and Adapting to a New Era
42:45
42:45
Play later
Play later
Lists
Like
Liked
42:45In episode 155 of Cybersecurity Where You Are, Tony Sager is joined by John Gilligan, President and Chief Executive Officer (CEO) of the Center for Internet Security® (CIS®). Together, they reflect on 25 years of progress for CIS and look ahead to the future. They explore the driving forces behind "CIS 2.0," including the shift toward addressing mu…
…
continue reading
This episode explores the journey of Kevin Dutkiewicz launching Tech Brews, his approach to serving underserved small businesses, the struggles with business administration, and the philosophy of running a modern MSP without the typical minimums. Uncle Marv and Kevin debate the realities of break-fix models, Trunk Slammer myths, and community-drive…
…
continue reading

1
Root Causes 531: Benefits of Single-purpose Root Hierarchies
16:36
16:36
Play later
Play later
Lists
Like
Liked
16:36Public certificates are transitioning from multi-purpose root hierarchies to single-purpose ones. We discuss why.By Tim Callan and Jason Soroko
…
continue reading

1
How Food, Fasting & Lifestyle Can Transform Your Metabolic Health & Reduce Your Risk of Disease with Dr Ben Bikman #582
2:17:05
2:17:05
Play later
Play later
Lists
Like
Liked
2:17:05Most of us will never have our insulin levels tested, yet this single hormone is the body’s master regulator of energy. When it stops working properly, almost every system in the body is affected, from how we store fat, to how we age. Today’s guest is Dr Ben Bikman, a scientist and world-leading expert on insulin and metabolism. He’s a Professor in…
…
continue reading

1
How Can WordPress Hosting Reclaim the Open Web from Algorithms?
37:33
37:33
Play later
Play later
Lists
Like
Liked
37:33Jesse Friedman continues his conversation with Jeffrey Zeldman about the open web versus social media platforms, AI's role in WordPress hosting, and empathetic design. They explore how hosting companies can help users reclaim individual voice from algorithm-controlled platforms while using AI responsibly to enhance website building without replacin…
…
continue reading

1
Copilot Chat for Everyone, AI Agents Everywhere in Teams, and Fighting “Workslop” – Practical 365 Podcast S04E44
1:03:02
1:03:02
Play later
Play later
Lists
Like
Liked
1:03:02Join Steve Goodman and Paul Robichaux as they discuss Microsoft’s latest AI updates – from Copilot Chat coming to all Microsoft 365 apps (no license required) to Teams getting AI agents in meetings, channels, and communities. They also warn about the rise of “AI-generated workslop” cluttering our workflows, and dig into why many Copilot pilot proje…
…
continue reading
Uncle Marv sits down again with Jermaine Clark, Sherweb’s Senior Manager of AI Readiness, for a lively discussion about how managed service providers can drive real business results with AI. Jermaine walks through Sherweb’s robust AI initiatives, including training, certification, and hands-on guides for automating onboarding, ticketing, and custom…
…
continue reading
Summary In this episode of the Blue Security Podcast, hosts Andy Jaw and Adam Brewer delve into the topic of Kerberosting, a known attack method that exploits weaknesses in the Kerberos authentication protocol, particularly focusing on the vulnerabilities associated with RC4 encryption. They discuss a recent letter from Senator Ron Wyden addressing…
…
continue reading

1
Real Life Work Wife: Working With Your Spouse
51:45
51:45
Play later
Play later
Lists
Like
Liked
51:45What happens when your work spouse is your actual spouse? In this episode of Coffee Break With Jake, we dive into the real-world dynamics of running a business with your spouse. Jake sits down with Katie & Parker Smith of Alarm Protection Services, Barb & Dwight Sears of Silent Guard Security, and Jim & Rita Parker of Parker Security Services. Toge…
…
continue reading

1
Managing Managers! | Down Payment the Podcast for Used Car Dealers S4 E65
6:58
6:58
Play later
Play later
Lists
Like
Liked
6:58Managing Managers! | Down Payment the Podcast for Used Car Dealers S4 E65 Can you manage your managers? Managers require a different set of skills to manage them. Watch this episode for our thoughts on the subject, and then tell us about your tips for managing managers in the comments! Don't miss an episode! Subscribe to Down Payment now! Visit all…
…
continue reading

1
Achieving Personalization and Compliance in Med Tech Solutions - with Faithe Toomy of Insulet
22:53
22:53
Play later
Play later
Lists
Like
Liked
22:53Today’s guest is Faithe Toomy, Director of Voice of the Customer and Insights at Insulet. Insulet is a medical device company specializing in wearable drug delivery systems for diabetes care, combining engineering, clinical research, and digital health capabilities to develop automated therapeutic solutions. Faithe joins Emerj Editorial Director Ma…
…
continue reading

1
Ep. 13 – nOAuth Account Misbinding & Assumed-Breach to Domain Admin (Season Finale)
15:09
15:09
Play later
Play later
Lists
Like
Liked
15:09One misbound identity. One exposed internal path. Two routes to total compromise. In this season finale of Hacked & Secured: Pentest Exploits & Mitigations, we break down two real-world findings that show how small trust assumptions can unravel entire systems: nOAuth (SSO account misbinding) — Multi-tenant SSO auto-linked accounts by email instead …
…
continue reading