Novinky Magazín Security
…
continue reading

1
Defensive Security Podcast - Malware, Hacking, Cyber Security & Infosec
Jerry Bell and Andrew Kalat
Defensive Security is a weekly information security podcast which reviews recent high profile cyber security breaches, data breaches, malware infections and intrusions to identify lessons that we can learn and apply to the organizations we protect.
…
continue reading
Daily stories from the world of information security. To delve into any daily story, head to CISOseries.com.
…
continue reading
Der Security-Insider Podcast ist ein Podcast für Security-Profis mit Infos, Nachrichten und Meinungen rund um die IT-Sicherheit. Hier unterhält sich Chefredakteur Peter Schmitz mit seinem Co-Host Dirk Srocke und manchmal auch mit spannenden Gästen. Zum Gespräch stehen alle Themen rund um die IT-Sicherheit, Datenschutz und Compliance.
…
continue reading
A weekly discussion of national security and foreign policy matters featuring Lawfare senior editors Scott R. Anderson, Quinta Jurecic, and Alan Rozenshtein. Hosted on Acast. See acast.com/privacy for more information.
…
continue reading
Some cryptography & security people talk about security, cryptography, and whatever else is happening.
…
continue reading
世界最大の通信技術企業の一つベライゾンがグローバルな視点から、インターネットセキュリティーの今を伝えるプログラム。企業の情報セキュリティ担当者やリモート在宅ワーカーに向け、サイバー攻撃やネット犯罪から身を守るための様々な情報をVerizon Japan Sr Solutions Principal-Security Prod Sales 森マークがお届けします。 最近気になったサイバーニュースなどがあればメッセージフォームから是非お送りください! みなさんからのメッセージお待ちしてます。 https://form.audee.jp/websecurity/message
…
continue reading
Welcome to the Security Weekly Podcast Network, your all-in-one source for the latest in cybersecurity! This feed features a diverse lineup of shows, including Application Security Weekly, Business Security Weekly, Paul's Security Weekly, Enterprise Security Weekly, and Security Weekly News. Whether you're a cybersecurity professional, business leader, or tech enthusiast, we cover all angles of the cybersecurity landscape. Tune in for in-depth panel discussions, expert guest interviews, and ...
…
continue reading
Interviews with Scholars of National Security about their New Books Support our show by becoming a premium member! https://newbooksnetwork.supportingcast.fm/national-security
…
continue reading
7 Minute Security is a weekly information security podcast focusing on penetration testing, blue teaming and building a career in security. The podcast also features in-depth interviews with industry leaders who share their insights, tools, tips and tricks for being a successful security engineer.
…
continue reading
A podcast for information security defenders (blue team) on best practices, tools, and implementation for enterprise security.
…
continue reading
Security Confidential provides weekly interviews and insights into the world of cybersecurity. Produced entirely in-house by MSSP & global risk management firm Dark Rhiino Security.
…
continue reading
Tune in to the StationX Cyber Security Diaries for your dose of cyber security knowledge and career guidance. Whether you’re a seasoned professional or just starting out, our series provides valuable insights and inspiration to help you grow and excel in cyber security.
…
continue reading

1
Security Insights - Cybersecurity for Real-World Workplaces
Ivanti: Cybersecurity and Information Technology Solutions
Welcome to Security Insights, where best-practice cybersecurity meets the real-world risks facing workplaces every day. Ivanti's VP of Product Management, Chris Goettl, brings in a rotating cast of guests to discuss the strategies and tactics that truly matter to the security teams protecting organizations, agencies and businesses like yours.
…
continue reading
A podcast that socializes security, compliance, and related topics to make them more approachable and understandable. Each week we’ll discuss a topic, usually with an expert in the area, with the goal of learning along with you. We’re here to socialize security!
…
continue reading
Podcast Channel ที่ว่าด้วยเรื่องของ Security
…
continue reading
A twice-monthly podcast dedicated to all things relating to Security, Privacy, Compliance and Reliability on the Microsoft Cloud Platform. Hosted by Microsoft security experts, Michael Howard, Sarah Young, Gladys Rodriguez and Mark Simos. https://aka.ms/azsecpod ©2020-2025 Michael Howard, Sarah Young, Gladys Rodriquez, and Mark Simos.
…
continue reading
Cybersecurity guru Steve Gibson joins Leo Laporte every Tuesday. Steve and Leo break down the latest cybercrime and hacking stories, offering a deep understanding of what's happening and how to protect yourself and your business. Security Now is a must listen for security professionals every week. Records live every Tuesday at 4:30pm Eastern / 1:30pm Pacific / 21:30 UTC.
…
continue reading
From commentary on current events to random musings, they chat (mostly) about security and technology topics. However, life is more than just the day job. From beekeeping adventures to hiking mountains to favorite shows, there's always something fun to wrap up the show.
…
continue reading
Podcasts on security, militancy, conflict, International Relations, and more.
…
continue reading
News, analysis, and insights into enterprise security. We put security vendors under the microscope, and explore the latest trends that can help defenders succeed. Hosted by Adrian Sanabria. Co hosts: Katie Teitler-Santullo, Ayman Elsawah, Jason Wood, Jackie McGuire.
…
continue reading
A weekly discussion of new developments and the latest cybersecurity threats, including ransomware, malware, phishing schemes, DDoS attacks and more, facing the U.S. industrial sector.
…
continue reading
News, analysis, and insights into enterprise security. We put security vendors under the microscope, and explore the latest trends that can help defenders succeed. Hosted by Adrian Sanabria. Co hosts: Katie Teitler-Santullo, Ayman Elsawah, Jason Wood, Jackie McGuire.
…
continue reading
Learn how to think not what to think.
…
continue reading
Daily cybersecurity news for practitioners. Vulnerabilities, defenses, threats, network security insight, research and more to make you sound smarter as you get to the office in the morning. New each weekday.
…
continue reading
Welcome to The Security Podcasts from Security, where security and risk professionals can stay up to date on the latest issues affecting the enterprise. Stay informed on: *Cybersecurity and Geopolitical issues affecting global enterprises *Security trends and technologies for risk mitigation *Advice and tips from physical security and cybersecurity thought leaders
…
continue reading
The Security Matters Podcast is published monthly and hosted by the magazine’s Editor Brian Sims. In each episode, Brian reports on and analyses the latest UK security industry news and also interviews leading professionals from the sector. The Security Matters Podcast is sponsored by The Security Event, which takes place on 8-10 April 2025 at the NEC in Birmingham. To register for your free pass to the show visit www.thesecurityevent.co.uk For all the latest security industry news and opini ...
…
continue reading
Where security veterans unpack the latest IT security news, vulnerabilities, and research through a historical and technical lens that can cut through even the thickest cigar smoke. Hosted by Paul Asadoorian and Larry Pesce. Co-hosts: Josh Marpet, Jeff Man, Mandy Logan, Tyler Robinson.
…
continue reading
The International Supply Chain Protection Organization (ISCPO) podcast is for those interested in learning about security in the supply chain and upcoming events.
…
continue reading
Enterprise security topics are discussed through the lens of current events, which catapult us into a discussion about hacking methods, security measures, and outcomes. Your hosts are Carl Franklin, Patrick Hynds, and Duane LaFlotte
…
continue reading
The security repo is a podcast that focuses on real world security issues we are all facing today. We will take deep dives into news events and have exclusive interviews with security leaders on the ground.
…
continue reading
CNA’s experts understand today’s complex and dynamic national security environments. On CNA Talks, you’ll find analysis of globe-shaping conflicts, foreign policy and shifting alliances, regional breakdowns, pandemics and other health crises, environmental disasters, homeland security concerns, and the future of strategic competition. Follow CNA Talks to go behind the headlines and learn from data-driven, objective, discussions on the factors shaping today’s national security landscape.
…
continue reading
About bridging the gap between security initiatives and business objectives. Hosted by Matt Alderman, co-hosted by Jason Albuquerque, Ben Carr.
…
continue reading
Curious about application security? Want to learn how to detect security vulnerabilities and protect your application. We discuss different topics and provide valuable insights into the world of application security.
…
continue reading
Without trust, society stagnates, economies decline, and businesses fail. This podcast series keeps abreast of the latest trends and challenges in cyber and physical security with interviews, event updates, industry suppliers & government initiatives.
…
continue reading
Daily Security Review, the premier source for news and information on security threats, Ransomware and vulnerabilities
…
continue reading
Security DNA is a podcast brought to you by SecurityInfoWatch.com, covering subjects of interest to security stakeholders in the industry. Topics range from security industry news, trends and analysis to technology solutions, policy risk analysis and management, and more. Our editorial team, along with industry experts and consultants, fill each podcast episode with information that is of value to security professionals.
…
continue reading
About bridging the gap between security initiatives and business objectives. Hosted by Matt Alderman, co-hosted by Jason Albuquerque, Ben Carr.
…
continue reading
Concise, bi-weekly reviews of the most significant security stories, including malware, threats, government actions, and other cybersecurity topics. Hosted by Dr. Doug White. Co hosts: Josh Marpet, Aaran Leyland.
…
continue reading
Where security veterans unpack the latest IT security news, vulnerabilities, and research through a historical and technical lens that can cut through even the thickest cigar smoke. Hosted by Paul Asadoorian and Larry Pesce. Co-hosts: Josh Marpet, Jeff Man, Mandy Logan, Tyler Robinson.
…
continue reading
The mnemonic security podcast is a place where IT Security professionals can go to obtain insight into what their peers are working with and thinking about.
…
continue reading
Podcast by Alex Wood & Robb Reck
…
continue reading

1
Next-Gen Logging for the Next-Gen SIEM with Special Guest Karl Niblock
57:00
57:00
나중에 재생
나중에 재생
리스트
좋아요
좋아요
57:00Summary In this episode of the Blue Security Podcast, hosts Andy Jaw and Adam Brewer engage with cybersecurity architect Carl Neibach to discuss the evolution of logging practices in security information and event management (SIEM) systems. The conversation explores the shift from a 'log everything' mentality to a more strategic approach that empha…
…
continue reading
In this episode of Socializing Security, Milou and Brian take a deep dive into the shifting landscape of digital privacy in 2025. With privacy concerns on the rise, they explore the growing adoption of secure communication tools like Signal and unpack the ethical dilemmas of information sharing in an increasingly connected world. From social engine…
…
continue reading

1
CISA's Secure by Design Principles, Pledge, and Progress - Jack Cable - ASW #321
1:13:50
1:13:50
나중에 재생
나중에 재생
리스트
좋아요
좋아요
1:13:50Just three months into 2025 and we already have several hundred CVEs for XSS and SQL injection. Appsec has known about these vulns since the late 90s. Common defenses have been known since the early 2000s. Jack Cable talks about CISA's Secure by Design principles and how they're trying to refocus businesses on addressing vuln classes and prioritizi…
…
continue reading

1
Healthcare breaches expose thousands, X outage, MGM suit dropped
9:19
9:19
나중에 재생
나중에 재생
리스트
좋아요
좋아요
9:19Four healthcare breaches expose over 560,000 records Cyber attack allegedly behind X outages Case against MGM ransomware attack dropped Huge thanks to our sponsor, Vanta Do you know the status of your compliance controls right now? Like...right now? We know that real-time visibility is critical for security, but when it comes to our GRC programs…we…
…
continue reading

1
SANS Stormcast Tuesday Mar 11th: Shellcode as UUIDs; Moxe Switch Vuln Updates; Opentext Vuln; Livewire Volt Vuln;
4:59
4:59
나중에 재생
나중에 재생
리스트
좋아요
좋아요
4:59Shellcode Encoded in UUIDs Attackers are using UUIDs to encode Shellcode. The 128 Bit (or 16 Bytes) encoded in each UUID are converted to shell code to implement a cobalt strike beacon https://isc.sans.edu/diary/Shellcode%20Encoded%20in%20UUIDs/31752 Moxa CVE-2024-12297 Expanded to PT Switches Moxa in January first releast an update to address a fr…
…
continue reading

1
Cybereason CEO quits, Skybox shuts down, More Bybit heist details - ESW #397
51:34
51:34
나중에 재생
나중에 재생
리스트
좋아요
좋아요
51:34In the enterprise security news, Why is a consulting firm raising a $75M Series B? A TON of Cybereason drama just dropped Skybox Security shuts down after 23 years The chilling effect on security leaders is HERE, and what that means IT interest in on-prem, does NOT mean they’re quitting the cloud Updates on the crazy Bybit heist the state of MacOS …
…
continue reading

1
Japanese telco NTT Communications hacked hackers accessed details of almost 18,000 organizations
5:41
5:41
나중에 재생
나중에 재생
리스트
좋아요
좋아요
5:41panese telecommunications giant NTT Communications Corporation (NTT Com) has disclosed a data breach affecting information from nearly 18,000 corporate clients. The breach was identified on February 5, 2025, when suspicious activity was detected in the company's internal Order Information Distribution System. Immediate measures were taken to restri…
…
continue reading

1
Ransomware Attacks a Decade In: What Changed? What Didn't? - benny Vasquez, Mike Mitchell - ESW #397
1:58:32
1:58:32
나중에 재생
나중에 재생
리스트
좋아요
좋아요
1:58:322025 brings us close to an interesting milestone - ransomware attacks, in their current, enterprise-focused form, are almost a decade old. These attacks are so common today, it's impossible to report on all of them. There are signs of hope, however - ransomware payments are significantly down. There are also signs defenders are getting more resilie…
…
continue reading
Summary In this episode of the Defensive Security Podcast, hosts Jerry Bell and Andrew Kalat discuss various cybersecurity topics, including a Disney employee’s mishap with an AI tool that led to a significant hack, vulnerabilities in VMware ESX hypervisors, and a developer’s sabotage of their ex-employer. They also explore the implications of GitH…
…
continue reading

1
EP2044: Soft Skill Day - 5 วิธีรับมือ ‘Toxic Productivity’ ขยันได้ แต่ต้องไม่ขโมยเวลาและความสุขของตัวเอง
8:07
8:07
나중에 재생
나중에 재생
리스트
좋아요
좋아요
8:07Sponsor by SEC Playground
…
continue reading

1
Verizonサイバーセキュリティコンサルティングのグローバルトップ登場vol.2「マークと仲間のここだけの話」
24:08
24:08
나중에 재생
나중에 재생
리스트
좋아요
좋아요
24:08前回に引き続き、Verizonのサイバーセキュリティコンサルチームのグローバルトップをお迎えしお話をお伺いします。 トランプ大統領就任後のセキュリティ業界の変化や、VerizonとしてのAIとの付き合い方とは? ユニークな視点でのお話は必聴です。 ゲスト:Kristoph Philipsen/Verizon Cybersecurity Consulting Senior Director저자 ベライゾンジャパン
…
continue reading
Eric tidies and Jon may have two hives. A US Army soldier is arrested in relation to the AT&T breach last year, scam compounds are using Starlink, and a huge info stealer dump loaded into HIBP. For fun we have the next step in cloning a mammoth ... gene edited mice, and potential genetic factors in how Greenland sharks live for more than 400 years.…
…
continue reading
Malicious Chrome extensions can spoof password managers in new attack저자 Carl Franklin
…
continue reading

1
Secret YouTube Videos, Thunderforge, ByBit, 365, Chrome, VMWARE, Aaran Leyland... - SWN #457
32:18
32:18
나중에 재생
나중에 재생
리스트
좋아요
좋아요
32:18Secret YouTube Videos, Thunderforge, ByBit, 365, Chrome, VMWARE, Aaran Leyland, and More, on this edition of the Security Weekly News. Show Notes: https://securityweekly.com/swn-457
…
continue reading
Hello there friends, I’m doing another “what I’m working on this week” episode which includes: BPATTY v1.6 release – big/cool/new content to share here PWPUSH – this looks to be an awesome way (both paid and free) to securely share files and passwords
…
continue reading
Questions we answer in this episode What is the awesome new tool we're building? How can you get free lifetime access to it? What problem does it solve? What is a computer network port? Episode summary Computer network ports are like phone extensions in a corporate office building. But instead of using an extension to reach a specific person, compu…
…
continue reading
Hacking your mattress, Taylor Swift all the time, DNS sinkholes, throwing parties at rental properties, detect jamming, it took 18 years to hack, airtag hacks, undetectable weapons, RIP Skype, Cellebrite targets, upgrade ALL the things, Kali, Raspberry PIs, and M.2 hats, pirating music through a supply chain attack, Cisco small business and why you…
…
continue reading
Vulnerability management is not for the faint of heart. The pitfalls are many, and odds are you probably have at least one of these issues. Ivanti's Chris Goettl and Robert Waters run down the list of what can get in the way of vulnerability management done well -- from attack surface visibility to data overload and resource constraints -- all with…
…
continue reading

1
S16 E06 (VIDEO) Inside the Mind of a Former Cybercriminal
57:34
57:34
나중에 재생
나중에 재생
리스트
좋아요
좋아요
57:34#SecurityConfidential #DarkRhiinoSecurityFormer US Most Wanted turned Good Guy, Brett Johnson, also known as “The Original Internet Godfather,” was a key figure in the cybercrime world for over 20 years, founding ShadowCrew—the first organized cybercrime community. Brett was Convicted of 39 felonies and placed on the U.S. Most Wanted List, his expe…
…
continue reading

1
CISO Transformation Lessons from CIO While Balancing Security vs. Innovation - BSW #385
28:56
28:56
나중에 재생
나중에 재생
리스트
좋아요
좋아요
28:56In the leadership and communications segment, The CISO Transformation — A Path to Business Leadership, The CISO's dilemma of protecting the enterprise while driving innovation, When Hiring, Emphasize Skills over Degrees, and more! Show Notes: https://securityweekly.com/bsw-385
…
continue reading

1
South Korea: Martial Law and President Yoon’s Impeachment
22:51
22:51
나중에 재생
나중에 재생
리스트
좋아요
좋아요
22:51This episode covers South Korean President Yoon’s December 3 declaration of martial law, his impeachment, and what this means for US/ROK security cooperation. Guest Biographies Dr. Thomas Bickford is a principal research scientist in the CNA Indo-Pacific Security Affairs Program. His research has focused on Chinese maritime strategy, Chinese nation…
…
continue reading

1
Playing (And Winning) CTFs To Advance Your Cybersecurity Career - Edna Jonssen
22:45
22:45
나중에 재생
나중에 재생
리스트
좋아요
좋아요
22:45In this episode of the Security Repo Podcast, we sit down with Edna Jonnson, a cybersecurity engineer and SOC analyst, to discuss their journey from web development to security operations. Edna shares insights on the value of Capture the Flag (CTF) competitions for skill development, recounting their recent victory at Wild West Hacking Fest. We als…
…
continue reading
This week, Scott was joined by his Lawfare colleagues Molly Reynolds and Quinta Jurecic to work through the week’s big national security news stories, including: “Kyiv Calm and Tarry On.” This past Friday, Ukrainian President Volodymyr Zelenskyy visited the White House for what turned into a disastrous meeting, in which President Donald Trump and V…
…
continue reading

1
Security Money: Sailpoint's IPO Saves the Index - BSW #385
59:34
59:34
나중에 재생
나중에 재생
리스트
좋아요
좋아요
59:34After Sophos acquires Secureworks, Sailpoint's IPO saves the index. The Security Weekly 25 index is now made up of the following pure play security vendors: SAIL SailPoint Ord Shs PANW Palo Alto Networks Inc CHKP Check Point Software Technologies Ltd RBRK Rubrik Inc GEN Gen Digital Inc FTNT Fortinet Inc AKAM Akamai Technologies, Inc. FFIV F5 Inc ZS…
…
continue reading

1
SN 1015: Spatial-Domain Wireless Jamming - Firefox Privacy Policy, Signal Leaving Sweden?
2:52:47
2:52:47
나중에 재생
나중에 재생
리스트
좋아요
좋아요
2:52:47Firefox amends their privacy policy -- the world melts down. Signal threatens to leave Sweden. Aftermath of the massive $1.5 billion Bybit ETH heist. It turns out that it wasn't actually Bybit's fault. "The Lazarus Bounty" monitoring and management site. Mozilla's commitment to Manifest V2 (and the uBlock Origin). What does the ACM's plea for memor…
…
continue reading
Audio-visual (AV) equipment is everywhere – meeting rooms, auditoriums, and control centres – but how often do we think about its security? In this episode of the mnemonic security podcast, Robby talks to Øystein Stadskleiv from Leteng, about the overlooked risks of AV systems. They discuss real-world attack scenarios, common vulnerabilities, and p…
…
continue reading
Our feature guest this week is CW Walker from SpyCloud, interviewed by Frank Victory. News from DIA, the Colorado EDC, Outside, Inc, Urban Sky, Cliexa, Affineon, Webroot, Virtual Armour, Ping Identity, Optiv, Red Canary and a lot more!Support us on Patreon! Fun swag available - all proceeds will directly support the Colorado = Security infrastructu…
…
continue reading
One of the goals of the show is to help you better understand all the threats facing your OT assets, your data and your people. In order to do that, we work to identify those individuals with a feel and in-depth understanding of these threats and the evolving network of threat actors. And I can’t think of anyone better to break down the hacker land…
…
continue reading

1
Daniel Silverman, "Seeing Is Disbelieving: Why People Believe Misinformation in War, and When They Know Better" (Cambridge UP, 2024)
46:08
46:08
나중에 재생
나중에 재생
리스트
좋아요
좋아요
46:08Factual misinformation is spread in conflict zones around the world, often with dire consequences. But when is this misinformation actually believed, and when is it not? Seeing is Disbelieving: Why People Believe Misinformation in War, and When They Know Better (Cambridge University Press, 2024) by Dr. Daniel Silverman examines the appeal and limit…
…
continue reading
Episode 34 of the Security Matters Podcast includes Brian interviewing Kieran Mackie (managing director at security solutions specialist Amulet Security) and Sunil Mudholkar, vice-president of products with a physical security focus at Hexagon (the company boasting a comprehensive portfolio of video management software and enterprise incident manag…
…
continue reading

1
Setting the South African Security Stage with Fortress CEO Evan Bloom
26:27
26:27
나중에 재생
나중에 재생
리스트
좋아요
좋아요
26:27This week's episode of SecurityDNA sees host Steve Lasky take to the podium with guest Evan Bloom, industry veteran and CEO of Fortress Strategic Communications. Bloom's formative years growing up in South Africa left him with a unique perspective on the security industry's transformation through technology and the environment. Together, he and Ste…
…
continue reading

1
CISO strategies: Modern challenges and how to overcome them
16:31
16:31
나중에 재생
나중에 재생
리스트
좋아요
좋아요
16:31Jordan Avnaim, Chief Information Security Officer at Entrust, shares strategies CISOs can implement to overcome modern challenges.
…
continue reading

1
Apple Pulls Advanced Data Protection in the UK with Matt Green and Joe Hall
48:30
48:30
나중에 재생
나중에 재생
리스트
좋아요
좋아요
48:30Apple has pulled the availability of their opt-in iCloud end-to-end encryption feature, called Advanced Data Protection, in the UK. This doesn't only affect UK Apple users, however. To help us make sense of this surprising move from the fruit company, we got Matt Green, Associate Professor at Johns Hopkins, and Joe Hall, Distinguished Technologist …
…
continue reading
In this episode, I go over what Double-ClickJacking is and what you can potentially do about it to reduce the risk to your applications. Will this be the new finding on everyone's pen tests this year? Paulos Yibelo first described Double-ClickJacking and you can read more from him at his post referenced below. References: Paulos Yibelo Blog: https:…
…
continue reading
Welcome to the ISCPO 2025 State of the Union video podcast. Today, we're honored to have three distinguished leaders of the ISCPO: Byron Smith, Glenn Master, and Rod Fulenwider. In this first episode of 2025, our guests will be reflecting on the progress the ISCPO has made over the past year and will discuss what lies ahead in 2025. They'll share i…
…
continue reading

1
Episode 109: Securing GenAI Applications with Entra (2 of 4) - Overpermissioning
37:57
37:57
나중에 재생
나중에 재생
리스트
좋아요
좋아요
37:57In this episode, Michael, Gladys and Mark talk to guest Bailey Bercik about the problem of overpermissioning and how to use Microsoft Entra Permissions Management to identify and manage over-permissioned identities in multi-cloud environments to reduce security risks, especially for AI apps. We also cover the latest security news about AI red teami…
…
continue reading
PODCAST | Lebanon review | Ep # 431 (Urdu)
…
continue reading

1
The Success Paradox: The Biggest Lie You’ve Been Told | EP 21
4:56
4:56
나중에 재생
나중에 재생
리스트
좋아요
좋아요
4:56This video explores the importance of choosing a challenging path over a comfortable one to achieve true fulfillment and greatness. Using the ancient Greek myth of Hercules as a metaphor, it emphasizes that greatness is forged through adversity and deliberate choice. Nathan encourages viewers to look at life's difficulties as essential steps toward…
…
continue reading

1
Episode 441 - Space Medicine for Earthlings - Special Virtual Series - Episode 1
1:03:10
1:03:10
나중에 재생
나중에 재생
리스트
좋아요
좋아요
1:03:10Transforming healthcare through innovations in extreme environments. Humans operating in extreme environments often conduct their operations at the edges of the limits of human performance. Sometimes, they are required to push these limits to previously unattained levels. As a result, their margins for error in execution are much smaller than that …
…
continue reading