A brief daily summary of what is important in information security. The podcast is published every weekday and designed to get you ready for the day with a brief, usually 5 minutes long summary of current network security related events. The content is late breaking, educational and based on listener input as well as on input received by the SANS Internet Storm Center. You may submit questions and comments via our contact form at https://isc.sans.edu/contact.html .
…
continue reading
Story
…
continue reading
Through following this course, students will gain a basic understanding of the principles behind network security and the working of the main protocols, mechanisms and techniques in the area of security. The course consists of three parts: security mechanisms within network protocols, systems security and lab sessions. In the first part (security mechanisms within network protocols), the following topics will be discussed: IPSec, SSH, SSL, HTTPS and security for wireless networks. The second ...
…
continue reading
Welcome to the Security Weekly Podcast Network, your all-in-one source for the latest in cybersecurity! This feed features a diverse lineup of shows, including Application Security Weekly, Business Security Weekly, Paul's Security Weekly, Enterprise Security Weekly, and Security Weekly News. Whether you're a cybersecurity professional, business leader, or tech enthusiast, we cover all angles of the cybersecurity landscape. Tune in for in-depth panel discussions, expert guest interviews, and ...
…
continue reading
Welcome to the Security Weekly Podcast Network, your all-in-one source for the latest in cybersecurity! This feed features a diverse lineup of shows, including Application Security Weekly, Business Security Weekly, Paul's Security Weekly, Enterprise Security Weekly, and Security Weekly News. Whether you're a cybersecurity professional, business leader, or tech enthusiast, we cover all angles of the cybersecurity landscape. Tune in for in-depth panel discussions, expert guest interviews, and ...
…
continue reading
…
continue reading
The Defence & Security Podcast Network hosts a unique series of podcasts, featuring discussions with key enablers from across the Australian defence and security industry. The podcasts provide the perfect blend of business intelligence and insights from a range of guests, which include government officials, ADF personnel, industry stakeholders, and members of the academic community. By aligning ourselves with the ADF and the Commonwealth government, we are uniquely placed to deliver a dynami ...
…
continue reading
An online network about educating, entertaining and encouraging your dance with Technology!
…
continue reading
1
Healthcare NOW Radio Podcast Network - Discussions on healthcare including technology, innovation, policy, data security, telehealth and more. Visit HealthcareNOWRadio.com
Healthcare NOW Radio and Podcast Network - Radio and Podcasts for the Healthcare Industry
RADIO FOR THE HEALTHCARE INDUSTRY Healthcare NOW Radio and Podcast Network offers discussions on the latest developments and trends impacting the industry including: health tech, health IT, healthcare innovation, healthcare policy, healthcare data security, telehealth, interoperability, biotech, med tech, value-based care, pharma, healthcare compliance, and much more. Shows are hosted by industry thought leaders. Guests are a "who's who" across the healthcare spectrum. The listening audience ...
…
continue reading
An online network about educating, entertaining and encouraging your dance with Technology!
…
continue reading
1
Figuring Out Where to Start with Secure Code - ASW #358
46:23
46:23
나중에 재생
나중에 재생
리스트
좋아요
좋아요
46:23What are your favorite resources for secure code? Co-hosts John Kinsella and Kalyani Pawar talk about the reality of bringing security into a business. We talk about the role of the OWASP Top 10 and the OWASP ASVS in crafting security programs. And balance that with a discussion in what's the best use of everyone's time -- developers and appsec fol…
…
continue reading
1
SANS Stormcast Tuesday, November 25th, 2025: URL Mapping and Authentication; SHA1-Hulud; Hacklore (#)
6:11
6:11
나중에 재생
나중에 재생
리스트
좋아요
좋아요
6:11SANS Stormcast Tuesday, November 25th, 2025: URL Mapping and Authentication; SHA1-Hulud; Hacklore Conflicts between URL mapping and URL based access control. Mapping different URLs to the same script, and relying on URL based authentication at the same time, may lead to dangerous authentication and access control gaps. https://isc.sans.edu/diary/Co…
…
continue reading
1
CYBER UNCUT: NVIDIA's earnings up, Black Friday scams, a new ransomware group emerges, Russian hacking sanctions
38:27
38:27
나중에 재생
나중에 재생
리스트
좋아요
좋아요
38:27In this episode of the Cyber Uncut podcast, David Hollingworth is joined by Bethany Alvaro to talk about all things Australia and cyber security! The pair kick things off with some AI news. NVIDIA announced record earnings as the AI bubble steadfastly refuses to burst, and ChatGPT's curious new group chat feature. Hollingworth and Alvaro then talk …
…
continue reading
1
FINN Voices: Bringing to Realization the Promise of AI
30:09
30:09
나중에 재생
나중에 재생
리스트
좋아요
좋아요
30:09Bringing to Realization the Promise of AIOn this episode, host Goel Jasper sits down with David Lazerson, Co-founder and CEO of Briya. David discusses the vision of Briya, a company committed to improving and accelerating the research process with an AI-based platform. While 2025 was a year of discovery, David believes 2026 will be the year when AI…
…
continue reading
1
Figuring Out Where to Start with Secure Code - ASW #358
46:23
46:23
나중에 재생
나중에 재생
리스트
좋아요
좋아요
46:23What are your favorite resources for secure code? Co-hosts John Kinsella and Kalyani Pawar talk about the reality of bringing security into a business. We talk about the role of the OWASP Top 10 and the OWASP ASVS in crafting security programs. And balance that with a discussion in what's the best use of everyone's time -- developers and appsec fol…
…
continue reading
1
Aligning teams for effective remediation, Anthropic's latest report, and the news - Ravid Circus - ESW #434
1:38:56
1:38:56
나중에 재생
나중에 재생
리스트
좋아요
좋아요
1:38:56Interview with Ravid Circus Ravid will discuss why security and engineering misalignment is the biggest barrier to fast, effective remediation, using data from Seemplicity’s 2025 Remediation Operations Report. This is costing some teams days of unnecessary exposure, which can lead to major security implications for organizations. Segment Resources:…
…
continue reading
1
Aligning teams for effective remediation, Anthropic's latest report, and the news - Ravid Circus - ESW #434
1:38:57
1:38:57
나중에 재생
나중에 재생
리스트
좋아요
좋아요
1:38:57Interview with Ravid Circus Ravid will discuss why security and engineering misalignment is the biggest barrier to fast, effective remediation, using data from Seemplicity's 2025 Remediation Operations Report. This is costing some teams days of unnecessary exposure, which can lead to major security implications for organizations. Segment Resources:…
…
continue reading
SANS Stormcast Monday, November 24th, 2025: CSS Padding in Phishing; Oracle Identity Manager Scans Update; Use of CSS stuffing as an obfuscation technique? Phishing sites stuff their HTML with benign CSS code. This is likely supposed to throw of simple detection engines https://isc.sans.edu/diary/Use%20of%20CSS%20stuffing%20as%20an%20obfuscation%20…
…
continue reading
1
Healthcare for Humans: Rose Cano on Immigration, Grief, and Real Care
28:56
28:56
나중에 재생
나중에 재생
리스트
좋아요
좋아요
28:56Episode 78 The Interpreter Who Sees Everything: Rose Cano on Immigration, Grief, and Real CareOn this episode host Raj Sundar explores how immigration status profoundly impacts healthcare access, from barriers to benefits and financial assistance, to the psychological toll experienced by patients and families navigating fears of deportation. They d…
…
continue reading
1
The Healthtech Marketing Show: Building Resilience in Healthcare Marketing
23:51
23:51
나중에 재생
나중에 재생
리스트
좋아요
좋아요
23:51Building Resilience in Healthcare MarketingOn this episode host Adam Turinas discusses, with Mark Erwich, Health Launchpad Chief Strategy Officer, the mounting pressures on hospitals and IDNs, from shrinking margins and labor shortages to an onslaught of regulatory changes, including OPBBA, Medicaid work requirements, and ACA cuts. Mark is a health…
…
continue reading
1
This Just In Radio: Live from HLTH25 with Rasu Shrestha, MD MBA and Rowland Illing, MD
28:20
28:20
나중에 재생
나중에 재생
리스트
좋아요
좋아요
28:20On this episode Justin records live at HLTH25 in Las Vegas. Stay tuned for the next few weeks to hear all his guests. This week Justin talks to Rasu Shrestha, MD MBA, Chief Innovation and Commercialization Officer, EVP at Advocate Health and Rowland Illing, MD. Global Chief Medical Officer and Director, Healthcare and Life Sciences at Amazon Web Se…
…
continue reading
Hosts Colin Hung and John Lynn discuss the healthcare job market.To stream our Station live 24/7 visit www.HealthcareNOWRadio.com or ask your Smart Device to “….Play Healthcare NOW Radio”.Find all of our network podcasts on your favorite podcast platforms and be sure to subscribe and like us. Learn more at www.healthcarenowradio.com/listen…
…
continue reading
1
Health Cent$: John Farnsley Executive Vice President Business Development at 90 Degree Benef
25:57
25:57
나중에 재생
나중에 재생
리스트
좋아요
좋아요
25:57On this episode, host Adam Russo welcomes John Farnsley, EVP Business Development at 90 Degree Benefits, a company that is humanizing healthcare by providing plans that increase savings without sacrificing high-quality care. John shares insights on the evolution of healthcare delivery and the changing role of TPAs in the industry.To stream our Stat…
…
continue reading
1
Emoticons, Sonicwall, Global Protect, Pop ups, WhatsApp, 7Zip, Roblox, Josh Marpet... - SWN #531
33:57
33:57
나중에 재생
나중에 재생
리스트
좋아요
좋아요
33:57Emoticons, Sonicwall, Global Protect, Pop-ups, WhatsApp, 7Zip, Roblox, Josh Marpet, and More on the Security Weekly News. Show Notes: https://securityweekly.com/swn-531
…
continue reading
1
Emoticons, Sonicwall, Global Protect, Pop ups, WhatsApp, 7Zip, Roblox, Josh Marpet... - SWN #531
33:56
33:56
나중에 재생
나중에 재생
리스트
좋아요
좋아요
33:56Emoticons, Sonicwall, Global Protect, Pop-ups, WhatsApp, 7Zip, Roblox, Josh Marpet, and More on the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-531
…
continue reading
1
Digital Health Talks: Securing Healthcare's Identity Crisis
28:32
28:32
나중에 재생
나중에 재생
리스트
좋아요
좋아요
28:32Securing Healthcare's Identity Crisis: Why Non-Human Identities Are Your Biggest Cybersecurity ThreatJoin us for a critical discussion on healthcare's most pressing cybersecurity challenge with Nikki Bennett, Healthcare Advisory Identity Strategist at SailPoint. Drawing from five years of frontline IAM experience at ECU Health, Nikki reveals how to…
…
continue reading
1
Talking the Walk: Lauren Barca, VP of Quality at 86Border
27:29
27:29
나중에 재생
나중에 재생
리스트
좋아요
좋아요
27:29S1E16: Lauren Barca, 86 Borders S1E16: On this episode host Tom Testa invites Lauren Barca, VP of Quality at 86Borders, a company that builds human-to-human relationships to remove barriers to care, improving healthcare experiences and outcomes. Lauren share insights on how they partner with health plans to tackle social barriers, close gaps in car…
…
continue reading
1
Give Me Liberty or Linux, Badge Hacking Interview - Bryce Owen - PSW #901
2:09:41
2:09:41
나중에 재생
나중에 재생
리스트
좋아요
좋아요
2:09:41In the security news: Cloudflare was down, it was not good Logitech breached The largest data breach in history? Fortinet Fortiweb - the saga continues Hacking Linux through your malware scanner, oh the irony I never stopped hating systemd The ASUS exploit that never existed If iRobot fails, can we deploy our own hacker bot army? Firmware encryptio…
…
continue reading
1
Give Me Liberty or Linux, Badge Hacking Interview - Bryce Owen - PSW #901
2:09:41
2:09:41
나중에 재생
나중에 재생
리스트
좋아요
좋아요
2:09:41In the security news: Cloudflare was down, it was not good Logitech breached The largest data breach in history? Fortinet Fortiweb - the saga continues Hacking Linux through your malware scanner, oh the irony I never stopped hating systemd The ASUS exploit that never existed If iRobot fails, can we deploy our own hacker bot army? Threat actors depl…
…
continue reading
1
SANS Stormcast Friday, November 21st, 2025: Oracle Idendity Manager Scans; SonicWall DoS Vuln; Adam Wilson (@sans_edu) reducing prompt injection. (#)
14:09
14:09
나중에 재생
나중에 재생
리스트
좋아요
좋아요
14:09SANS Stormcast Friday, November 21st, 2025: Oracle Idendity Manager Scans; SonicWall DoS Vuln; Adam Wilson (@sans_edu) reducing prompt injection. Oracle Identity Manager Exploit Observation from September (CVE-2025-61757) We observed some exploit attempts in September against an Oracle Identity Manager vulnerability that was patched in October, ind…
…
continue reading
1
Building a resilient, competitive industrial base with Brian Schimpf, Anduril Industries CEO
32:30
32:30
나중에 재생
나중에 재생
리스트
좋아요
좋아요
32:30In this special episode of the Defence Connect Podcast, host Steve Kuper is joined by the co-founder and CEO of Anduril Industries, Brian Schimpf, as they talk about building an allied industrial base and the intricacies involved. Recorded live at Indo Pacific International Maritime Exposition 2025, the pair also discuss a range of subjects, includ…
…
continue reading
1
SANS Stormcast Thursday, November 20th, 2025: Unicode Issues; FortiWeb More Vulns; DLink DIR-878 Vuln; Operation WrtHug and ASUS Routers (#)
6:35
6:35
나중에 재생
나중에 재생
리스트
좋아요
좋아요
6:35SANS Stormcast Thursday, November 20th, 2025: Unicode Issues; FortiWeb More Vulns; DLink DIR-878 Vuln; Operation WrtHug and ASUS Routers Unicode: It is more than funny domain names. Unicode can cause a number of issues due to odd features like variance selectors and text direction issues. https://isc.sans.edu/diary/Unicode%3A%20It%20is%20more%20tha…
…
continue reading
1
Health and Wellness of the CISO as They Crack Under Pressure and Need a BISO to Scale - Dr. Yonesy Núñez - BSW #422
56:46
56:46
나중에 재생
나중에 재생
리스트
좋아요
좋아요
56:46It's a topic we discuss often on Business Security Weekly: CISO Burnout. It's real, but how should you manage it? Dr. Yonesy Núñez, Global Cybersecurity Executive at Chain Bridge Bank and former Managing Director, Chief Cybersecurity Risk Officer, and Chief Information Security Officer at The Depository Trust & Clearing Corporation (DTCC), joins Bu…
…
continue reading
1
Health and Wellness of the CISO as They Crack Under Pressure and Need a BISO to Scale - Dr. Yonesy Núñez - BSW #422
56:46
56:46
나중에 재생
나중에 재생
리스트
좋아요
좋아요
56:46It's a topic we discuss often on Business Security Weekly: CISO Burnout. It's real, but how should you manage it? Dr. Yonesy Núñez, Global Cybersecurity Executive at Chain Bridge Bank and former Managing Director, Chief Cybersecurity Risk Officer, and Chief Information Security Officer at The Depository Trust & Clearing Corporation (DTCC), joins Bu…
…
continue reading
1
SANS Stormcast Wednesday, November 19th, 2025: Kong Tuke; Cloudflare Outage (#)
4:39
4:39
나중에 재생
나중에 재생
리스트
좋아요
좋아요
4:39SANS Stormcast Wednesday, November 19th, 2025: Kong Tuke; Cloudflare Outage KongTuke Activity This diary investigates how a recent Kong Tuke infections evolved all the way from starting with a ClickFix attack. https://isc.sans.edu/diary/KongTuke%20activity/32498 Cloudflare Outage Cloudflare suffered a large outage today after an oversized configura…
…
continue reading
1
What's My Tagline?: AI Model Mania: Navigating the Healthtech Marketers Landscape with Adam Turinas
27:24
27:24
나중에 재생
나중에 재생
리스트
좋아요
좋아요
27:24AI Model Mania – Navigating the Healthtech Marketers Landscape with Adam TurinasOn this lively episode, host Carol Flagg welcomes back Adam Turinas, founder of Health Launchpad and host of The Healthtech Marketing Show. Adam shares the story behind his AI Quick Takes segment—particularly the episode Model Mania: Navigating the New AI Landscape, whi…
…
continue reading
1
The Dish: HLTH25 Recap: What’s Real, What’s Hype, and What’s Next in Health IT
49:39
49:39
나중에 재생
나중에 재생
리스트
좋아요
좋아요
49:39Episode 52 - HLTH25 Recap – What’s Real, What’s Hype, and What’s Next in Health IT On this episode host Tony Schueth, CEO of Point-of-Care Partners (POCP), is joined by colleagues Brian Dwyer, POCP’s Business Strategy Lead, and Seth Joseph, Managing Director at Summit Health Advisors, to unpack their takeaways from the HLTH25 conference in Las Vega…
…
continue reading
1
Revenue Cycle Optimized: AI Oversight for the Modern Revenue Cycle
33:15
33:15
나중에 재생
나중에 재생
리스트
좋아요
좋아요
33:15AI Oversight for the Modern Revenue CycleAs AI agents take on more decisions across the revenue cycle, the question isn’t how fast automation can move — it’s how safely it operates. This session explores the guardrails of governance in an AI-driven RCM environment, outlining practical steps to ensure transparency, compliance, and human accountabili…
…
continue reading
1
Cloudflare, Gh0stRAT, npm, North Koreans, Arch, Steam, Documentaries, Aaran Leyland.. - SWN #530
35:24
35:24
나중에 재생
나중에 재생
리스트
좋아요
좋아요
35:24Cloudflare, Gh0stRAT, npm, North Korean Employees, Arch Linux Steam Machine, Documentaries, Aaran Leyland, and more on the Security Weekly News. Show Notes: https://securityweekly.com/swn-530
…
continue reading
1
Cloudflare, Gh0stRAT, npm, North Koreans, Arch, Steam, Documentaries, Aaran Leyland.. - SWN #530
35:24
35:24
나중에 재생
나중에 재생
리스트
좋아요
좋아요
35:24Cloudflare, Gh0stRAT, npm, North Korean Employees, Arch Linux Steam Machine, Documentaries, Aaran Leyland, and more on the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-530
…
continue reading
1
Secure Coding as Critical Thinking Instead of Vulnspotting - Matias Madou - ASW #357
1:03:41
1:03:41
나중에 재생
나중에 재생
리스트
좋아요
좋아요
1:03:41Secure code should be grounded more in concepts like secure by default and secure by design than by "spot the vuln" thinking. Matias Madou shares his experience in secure coding training and the importance of teaching critical thinking. He also discusses why critical thinking is so closely related to threat modeling and how LLMs can be a tool for h…
…
continue reading
1
Secure Coding as Critical Thinking Instead of Vulnspotting - Matias Madou - ASW #357
1:03:41
1:03:41
나중에 재생
나중에 재생
리스트
좋아요
좋아요
1:03:41Secure code should be grounded more in concepts like secure by default and secure by design than by "spot the vuln" thinking. Matias Madou shares his experience in secure coding training and the importance of teaching critical thinking. He also discusses why critical thinking is so closely related to threat modeling and how LLMs can be a tool for h…
…
continue reading
1
SPOTLIGHT: The future of Defence's digital transformation with Leighton Freene and Murray Thompson, Kinetic IT
28:43
28:43
나중에 재생
나중에 재생
리스트
좋아요
좋아요
28:43In this episode of the Defence Connect Spotlight podcast, host Steve Kuper is joined by Leighton Freene and Murray Thompson of Kinetic IT as they unpack the mechanics shaping the digital transformation of the Australian Defence Force. The trio also discuss a range of subjects, including: The pivotal role of digital technologies as the backbone of t…
…
continue reading
1
SANS Stormcast Tuesday, November 18th, 2025: Binary Expression Decoding. Tea NPM Pollution; IBM AIX NIMSH Vulnerability (#)
4:59
4:59
나중에 재생
나중에 재생
리스트
좋아요
좋아요
4:59SANS Stormcast Tuesday, November 18th, 2025: Binary Expression Decoding. Tea NPM Pollution; IBM AIX NIMSH Vulnerability Decoding Binary Numeric Expressions Didier updated his number to hex script to support simple arithmetic operations in the text. https://isc.sans.edu/diary/Decoding%20Binary%20Numeric%20Expressions/32490 Tea Token NPM Pollution Th…
…
continue reading
1
Year of the (Clandestine) Linux Desktop, topic, and the news - Rob Allen - ESW #433
1:56:49
1:56:49
나중에 재생
나중에 재생
리스트
좋아요
좋아요
1:56:49Segment 1: Interview with Rob Allen It's the Year of the (Clandestine) Linux Desktop! As if EDR evasions weren't enough, attackers are now employing yet another method to hide their presence on enterprise systems: deploying tiny Linux VMs. Attackers are using Hyper-V and/or WSL to deploy tiny (120MB disk space and 256MB memory) Linux VMs to host a …
…
continue reading
1
Year of the (Clandestine) Linux Desktop, topic, and the news - Rob Allen - ESW #433
1:56:50
1:56:50
나중에 재생
나중에 재생
리스트
좋아요
좋아요
1:56:50Segment 1: Interview with Rob Allen It's the Year of the (Clandestine) Linux Desktop! As if EDR evasions weren't enough, attackers are now employing yet another method to hide their presence on enterprise systems: deploying tiny Linux VMs. Attackers are using Hyper-V and/or WSL to deploy tiny (120MB disk space and 256MB memory) Linux VMs to host a …
…
continue reading
1
CYBER UNCUT: Proofpoint's Ryan Kalember and Adrian Covich on CISO trends and dealing with growing cyber threats
31:08
31:08
나중에 재생
나중에 재생
리스트
좋아요
좋아요
31:08In this episode of the Cyber Uncut podcast, David Hollingworth catches up with Proofpoint's chief strategy officer, Ryan Kalember, and vice president of systems engineering for the APJ region, Adrian Covich, while attending the Proofpoint Protect Tour in Melbourne. The three talk about the high-level trends and concerns they're seeing from CISOs bo…
…
continue reading