A brief daily summary of what is important in information security. The podcast is published every weekday and designed to get you ready for the day with a brief, usually 5 minutes long summary of current network security related events. The content is late breaking, educational and based on listener input as well as on input received by the SANS Internet Storm Center. You may submit questions and comments via our contact form at https://isc.sans.edu/contact.html .
…
  continue reading
Story
…
  continue reading
Through following this course, students will gain a basic understanding of the principles behind network security and the working of the main protocols, mechanisms and techniques in the area of security. The course consists of three parts: security mechanisms within network protocols, systems security and lab sessions. In the first part (security mechanisms within network protocols), the following topics will be discussed: IPSec, SSH, SSL, HTTPS and security for wireless networks. The second ...
…
  continue reading
Welcome to the Security Weekly Podcast Network, your all-in-one source for the latest in cybersecurity! This feed features a diverse lineup of shows, including Application Security Weekly, Business Security Weekly, Paul's Security Weekly, Enterprise Security Weekly, and Security Weekly News. Whether you're a cybersecurity professional, business leader, or tech enthusiast, we cover all angles of the cybersecurity landscape. Tune in for in-depth panel discussions, expert guest interviews, and  ...
…
  continue reading
Welcome to the Security Weekly Podcast Network, your all-in-one source for the latest in cybersecurity! This feed features a diverse lineup of shows, including Application Security Weekly, Business Security Weekly, Paul's Security Weekly, Enterprise Security Weekly, and Security Weekly News. Whether you're a cybersecurity professional, business leader, or tech enthusiast, we cover all angles of the cybersecurity landscape. Tune in for in-depth panel discussions, expert guest interviews, and  ...
…
  continue reading
…
  continue reading
The Defence & Security Podcast Network hosts a unique series of podcasts, featuring discussions with key enablers from across the Australian defence and security industry. The podcasts provide the perfect blend of business intelligence and insights from a range of guests, which include government officials, ADF personnel, industry stakeholders, and members of the academic community. By aligning ourselves with the ADF and the Commonwealth government, we are uniquely placed to deliver a dynami ...
…
  continue reading
An online network about educating, entertaining and encouraging your dance with Technology!
…
  continue reading

1
Healthcare NOW Radio Podcast Network - Discussions on healthcare including technology, innovation, policy, data security, telehealth and more. Visit HealthcareNOWRadio.com
Healthcare NOW Radio and Podcast Network - Radio and Podcasts for the Healthcare Industry
RADIO FOR THE HEALTHCARE INDUSTRY Healthcare NOW Radio and Podcast Network offers discussions on the latest developments and trends impacting the industry including: health tech, health IT, healthcare innovation, healthcare policy, healthcare data security, telehealth, interoperability, biotech, med tech, value-based care, pharma, healthcare compliance, and much more. Shows are hosted by industry thought leaders. Guests are a "who's who" across the healthcare spectrum. The listening audience ...
…
  continue reading
An online network about educating, entertaining and encouraging your dance with Technology!
…
  continue reading

1
SANS Stormcast Friday, October 31st, 2025: Bug Bounty Headers; Exchange hardening; MOVEIt vulnerability (#)
6:20
6:20
 
 
나중에 재생
 
나중에 재생
 
리스트
 
좋아요
 
좋아요
6:20SANS Stormcast Friday, October 31st, 2025: Bug Bounty Headers; Exchange hardening; MOVEIt vulnerability X-Request-Purpose: Identifying "research" and bug bounty related scans? Our honeypots captured a few requests with bug bounty specific headers. These headers are meant to make it easier to identify requests related to bug bounty, and they are sup…
…
  continue reading
In the security news this week: Cybersecurity is dead, and AI killed it Exploiting the patching system Apple makes it easier for spyware Who is patching Cisco ASA? Shove that DMCA somewhere HTTPS - a requirement Russia wants to own all the exploits Abandonware challenges Reversing at its hardest with Lua Hacking team is back, and leetspeak malware …
…
  continue reading

1
The Defence and Veterans' Service Commission launch and the long road ahead, with Isaac Ohlin
17:59
17:59
 
 
나중에 재생
 
나중에 재생
 
리스트
 
좋아요
 
좋아요
17:59In this episode of the Defence Connect Podcast, host Bethany Alvaro speaks with Isaac Ohlin, general manager of policy and services at RSL NSW, about the establishment of the Defence and Veterans' Service Commission – launched on 29 September 2025 in response to the Royal Commission into Defence and Veteran Suicide (2021). The pair discuss the comm…
…
  continue reading

1
Voices of Self Funding: Arun Santhebennur, Co-founder and CEO of Voicegain
29:17
29:17
 
 
나중에 재생
 
나중에 재생
 
리스트
 
좋아요
 
좋아요
29:17On this episode of Voices of Self-Funding, host Ramesh Kumar welcomes Arun Santhebennur, Co-founder and CEO of Voicegain, to explore how voice AI is reshaping healthcare operations for TPAs, payers, and health plans. They tackle the tough truth that 95% of AI pilots fail, unpacking why — from hype and skill gaps to the “build vs. buy” dilemma and c…
…
  continue reading
In the security news this week: Cybersecurity is dead, and AI killed it Exploiting the patching system Apple makes it easier for spyware Who is patching Cisco ASA? Shove that DMCA somewhere HTTPS - a requirement Russia wants to own all the exploits Abandonware challenges Reversing at its hardest with Lua Hacking team is back, and leetspeak malware …
…
  continue reading

1
SANS Stormcast Thursday, October 30th, 2025: Memory Only Filesystems Forensics; Azure Outage; docker-compose patch (#)
6:07
6:07
 
 
나중에 재생
 
나중에 재생
 
리스트
 
좋아요
 
좋아요
6:07SANS Stormcast Thursday, October 30th, 2025: Memory Only Filesystems Forensics; Azure Outage; docker-compose patch How to Collect Memory-Only Filesystems on Linux Systems Getting forensically sound copies of memory-only file systems on Linux can be tricky, as tools like "dd" do not work. https://isc.sans.edu/diary/How%20to%20collect%20memory-only%2…
…
  continue reading

1
Emergence of the Chief Trust Officer as CISOs Earn Business Respect and Agenda Shifts - Jeff Pollard - BSW #419
1:00:15
1:00:15
 
 
나중에 재생
 
나중에 재생
 
리스트
 
좋아요
 
좋아요
1:00:15Organizations that successfully earn and keep the trust of their customers, employees, and partners experience better business outcomes, more engagement, and competitive differentiation. But what does that trust look like and who's responsible for building and maintaining that trust? Jeff Pollard, Vice-President, Principal Analyst on the Security a…
…
  continue reading

1
Emergence of the Chief Trust Officer as CISOs Earn Business Respect and Agenda Shifts - Jeff Pollard - BSW #419
1:00:15
1:00:15
 
 
나중에 재생
 
나중에 재생
 
리스트
 
좋아요
 
좋아요
1:00:15Organizations that successfully earn and keep the trust of their customers, employees, and partners experience better business outcomes, more engagement, and competitive differentiation. But what does that trust look like and who's responsible for building and maintaining that trust? Jeff Pollard, Vice-President, Principal Analyst on the Security a…
…
  continue reading

1
THE PROGRESS REPORT: Leadership, mental health and life's balancing act
40:37
40:37
 
 
나중에 재생
 
나중에 재생
 
리스트
 
좋아요
 
좋아요
40:37Ever wondered what it takes to lead with resilience while balancing life, career and wellbeing? In this episode of The Progress Report, Tash Taylor sits down with Marisa Branscombe, head of marketing communication at Atturra, to talk about leadership, resilience, and the human side of managing teams in high-pressure environments. Marisa shares how …
…
  continue reading

1
SANS Stormcast Wednesday, October 29th, 2025: Invisible Subject Character Phishing; Tomcat PUT Vuln; BIND9 Spoofing Vuln PoC (#)
8:05
8:05
 
 
나중에 재생
 
나중에 재생
 
리스트
 
좋아요
 
좋아요
8:05SANS Stormcast Wednesday, October 29th, 2025: Invisible Subject Character Phishing; Tomcat PUT Vuln; BIND9 Spoofing Vuln PoC Phishing with Invisible Characters in the Subject Line Phishing emails use invisible UTF-8 encoded characters to break up keywords used to detect phishing (or spam). This is aided by mail clients not rendering some characters…
…
  continue reading

1
Lockpick chaos, CoPhish, Atlas, Turing, ForumTroll, PKD, Kilgore Trout, Aaran Leyland - SWN #524
34:35
34:35
 
 
나중에 재생
 
나중에 재생
 
리스트
 
좋아요
 
좋아요
34:35Lockpicks, Microsoft, CoPhish, Atlas, Turing, ForumTroll, PKD, even Kilgore Trout, the Amazing Aaran Leyland, and more on the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-524
…
  continue reading

1
Lockpick chaos, CoPhish, Atlas, Turing, ForumTroll, PKD, Kilgore Trout, Aaran Leyland - SWN #524
34:35
34:35
 
 
나중에 재생
 
나중에 재생
 
리스트
 
좋아요
 
좋아요
34:35Lockpicks, Microsoft, CoPhish, Atlas, Turing, ForumTroll, PKD, even Kilgore Trout, the Amazing Aaran Leyland, and more on the Security Weekly News. Show Notes: https://securityweekly.com/swn-524
…
  continue reading

1
Quantum Computing Isn't A Threat To Blockchains - Yet - Sandy Carielli, Martha Bennett - ASW #354
58:52
58:52
 
 
나중에 재생
 
나중에 재생
 
리스트
 
좋아요
 
좋아요
58:52The post quantum encryption migration is going to be a challenge, but how much of a challenge? There are several reasons why it is different from every other protocol and cypher iteration in the past. Is today's hardware up to the task? Is it just swapping out a library, or is there more to it? What is the extent of software, systems, and architect…
…
  continue reading

1
Quantum Computing Isn't A Threat To Blockchains - Yet - Martha Bennett, Sandy Carielli - ASW #354
58:52
58:52
 
 
나중에 재생
 
나중에 재생
 
리스트
 
좋아요
 
좋아요
58:52The post quantum encryption migration is going to be a challenge, but how much of a challenge? There are several reasons why it is different from every other protocol and cypher iteration in the past. Is today's hardware up to the task? Is it just swapping out a library, or is there more to it? What is the extent of software, systems, and architect…
…
  continue reading

1
Quantum Computing Isn’t A Threat To Blockchains - Yet - Martha Bennett, Sandy Carielli - ASW #354
58:52
58:52
 
 
나중에 재생
 
나중에 재생
 
리스트
 
좋아요
 
좋아요
58:52The post quantum encryption migration is going to be a challenge, but how much of a challenge? There are several reasons why it is different from every other protocol and cypher iteration in the past. Is today's hardware up to the task? Is it just swapping out a library, or is there more to it? What is the extent of software, systems, and architect…
…
  continue reading

1
SPOTLIGHT: The digital transformation reshaping the ADF, with Mark Gainsford and Matt Dodds, Systematic
38:12
38:12
 
 
나중에 재생
 
나중에 재생
 
리스트
 
좋아요
 
좋아요
38:12In this episode of the Defence Connect Spotlight podcast, host Steve Kuper is joined by Mark Gainsford and Matt Dodds of Systematic to discuss the digital transformation shaping the Australian Defence Force. The trio also examine how, in an era of renewed great power competition, the ADF must adapt to warfare defined by data, speed and contested in…
…
  continue reading

1
Revenue Cycle Optimized: Smart PT Reverification Lessons From Mary Free Bed
32:32
32:32
 
 
나중에 재생
 
나중에 재생
 
리스트
 
좋아요
 
좋아요
32:32Smart PT Reverification Lessons From Mary Free BedOn this episode, hear from Mary Free Bed’s Daniel Heemstra on overcoming PT reverification challenges, supported by intelligent automation and Epic integration that simplify the process and reduce the burden on staff.Find all of our network podcasts on your favorite podcast platforms and be sure to …
…
  continue reading

1
SANS Stormcast Tuesday, October 28th, 2025: Bytes over DNS; Unifi Access Vuln; OpenAI Atlas Prompt Injection (#)
6:17
6:17
 
 
나중에 재생
 
나중에 재생
 
리스트
 
좋아요
 
좋아요
6:17SANS Stormcast Tuesday, October 28th, 2025: Bytes over DNS; Unifi Access Vuln; OpenAI Atlas Prompt Injection Bytes over DNS Didiear investigated which bytes may be transmitted as part of a hostname in DNS packets, depending on the client resolver and recursive resolver constraints https://isc.sans.edu/diary/Bytes%20over%20DNS/32420 Unifi Access Vul…
…
  continue reading

1
Securing AI Agents with Dave Lewis, Enterprise News, and interviews from Oktane 2025 - Dave Lewis, Mike Poole, Conor Mulherin - ESW #430
1:39:12
1:39:12
 
 
나중에 재생
 
나중에 재생
 
리스트
 
좋아요
 
좋아요
1:39:12Segment 1: Interview with Dave Lewis from 1Password In this week's sponsored interview, we dive into the evolving security landscape around AI agents, where we stand with AI agent adoption. We also touch on topics such as securing credentials in browser workflows and why identity is foundational to AI agent security. 1Password Addresses a Critical …
…
  continue reading

1
Securing AI Agents with Dave Lewis, Enterprise News, and interviews from Oktane 2025 - Mike Poole, Conor Mulherin, Dave Lewis - ESW #430
1:39:12
1:39:12
 
 
나중에 재생
 
나중에 재생
 
리스트
 
좋아요
 
좋아요
1:39:12Segment 1: Interview with Dave Lewis from 1Password In this week's sponsored interview, we dive into the evolving security landscape around AI agents, where we stand with AI agent adoption. We also touch on topics such as securing credentials in browser workflows and why identity is foundational to AI agent security. 1Password Addresses a Critical …
…
  continue reading

1
SPOTLIGHT: HIMARS, the littoral and maritime strike, with Josh Woodward and Wayne Harrison, Lockheed Martin
35:59
35:59
 
 
나중에 재생
 
나중에 재생
 
리스트
 
좋아요
 
좋아요
35:59In this episode of the Defence Connect Spotlight podcast, special returning host Liam Garman is joined by Lockheed Martin's Josh Woodward and Wayne Harrison to discuss the transformational impact of the High Mobility Artillery Rocket System for the Australian Defence Force. The trio discuss the range of ways HIMARS will serve as a significant trans…
…
  continue reading

1
CYBER UNCUT: Wikipedia's AI woes, Tassie NFP hit by ransomware, and Bryan Cranston strikes back
44:40
44:40
 
 
나중에 재생
 
나중에 재생
 
리스트
 
좋아요
 
좋아요
44:40In this episode of the Cyber Uncut podcast, Daniel Croft and David Hollingworth talk about the latest AI news, the week in cyber crime, an important Aussie merger, and how a Hollywood actor is reclaiming his identity. The pair kick things off with some AI news, including Wikipedia woes, OpenAI's Atlas, and Yelp's new AI travel offering. Hollingwort…
…
  continue reading

1
SANS Stormcast Monday, October 27th, 2025: Bilingual Phishing; Kaitai Struct WebIDE (#)
6:21
6:21
 
 
나중에 재생
 
나중에 재생
 
리스트
 
좋아요
 
좋아요
6:21SANS Stormcast Monday, October 27th, 2025: Bilingual Phishing; Kaitai Struct WebIDE Bilingual Phishing for Cloud Credentials Guy observed identical phishing messages in French and English attempting to phish cloud credentials https://isc.sans.edu/diary/Phishing%20Cloud%20Account%20for%20Information/32416 Kaitai Struct WebIDE The binary file analysi…
…
  continue reading

1
This Just In Radio: Chris Paravate and Geoffrey Live at GAHIMMS
27:43
27:43
 
 
나중에 재생
 
나중에 재생
 
리스트
 
좋아요
 
좋아요
27:43On this episode Justin records live at GAHIMSS in Atlanta. Stay tuned for the next few weeks to hear all his guests. This week Justin Barnes talks to Chris Paravate, CIO, Northeast Georgia Health System and Geoffrey Brown, CIO of Piedmont Healthcare (Retired).To stream our Station live 24/7 visit www.HealthcareNOWRadio.com or ask your Smart Device …
…
  continue reading

1
Trending NOW: Dr. Mark Boxer, Board Chair for P-n-T Data Corp
27:17
27:17
 
 
나중에 재생
 
나중에 재생
 
리스트
 
좋아요
 
좋아요
27:17S3E12: What's Trending NOW is "how healthcare organizations are evolving their data security strategies in the age of AI without compromising innovation.On this episode Shahid is joined by Dr. Mark Boxer, Board Chair for P-n-T Data Corp., a company that delivers secure, scalable, and intelligent data sharing solutions that help healthcare organizat…
…
  continue reading

1
PopHealth Week: Meet Chris Caramanico, CEO of Elligint
27:57
27:57
 
 
나중에 재생
 
나중에 재생
 
리스트
 
좋아요
 
좋아요
27:57Meet Chris Caramanico the CEO of Elligint Health, a company formed by the merger of Health EC and Virtual Health. Host Fred Goldstein discusses with Chris bringing together VirtualHealth’s award-winning medical management platform, HELIOS®, with HealthEC’s industry-leading population health analytics, Elligint Health delivers precision-driven, inte…
…
  continue reading

1
FINN Voices: ClO Report with Darin Ryder, Sr. Vice President of e4health
22:06
22:06
 
 
나중에 재생
 
나중에 재생
 
리스트
 
좋아요
 
좋아요
22:06CIO Report: Clinical Data Migration Challenges and Best Practice AdviceOn this episode, host Beth Friedman sits down with Darin Ryder, Senior Vice President at e4health and former IT executive at UF Health, Brookmeade Healthcare, and several national consulting firms. Recorded live at the Georgia HIMSS Annual Conference, their conversation centers …
…
  continue reading
Hosts Colin Hung and John Lynn discuss Healthcare Startups and Founders.To stream our Station live 24/7 visit www.HealthcareNOWRadio.com or ask your Smart Device to “….Play Healthcare NOW Radio”.Find all of our network podcasts on your favorite podcast platforms and be sure to subscribe and like us. Learn more at www.healthcarenowradio.com/listen…
…
  continue reading

1
Robo Bees, side, AI Risk, Red Tiger, SessionReaper, Bad Bots, Willow, Josh Marpet - SWN #523
32:35
32:35
 
 
나중에 재생
 
나중에 재생
 
리스트
 
좋아요
 
좋아요
32:35Venomous Robo Bees and Rabid Cocaine Weasels, sidebar spoofing, AI Risk, Red Tiger, SessionReaper, Bad Bots, Willow, Josh Marpet, and More on this edition of the Security Weekly News. Show Notes: https://securityweekly.com/swn-523
…
  continue reading

1
Robo Bees, side, AI Risk, Red Tiger, SessionReaper, Bad Bots, Willow, Josh Marpet - SWN #523
32:35
32:35
 
 
나중에 재생
 
나중에 재생
 
리스트
 
좋아요
 
좋아요
32:35Venomous Robo Bees and Rabid Cocaine Weasels, sidebar spoofing, AI Risk, Red Tiger, SessionReaper, Bad Bots, Willow, Josh Marpet, and More on this edition of the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-523
…
  continue reading

1
CONTESTED GROUND: From PNG to Gaza – what's defining Australia's security future
29:05
29:05
 
 
나중에 재생
 
나중에 재생
 
리스트
 
좋아요
 
좋아요
29:05In this episode of the Cyber Uncut podcast, Daniel Croft and David Hollingworth touch on the latest in AI and how state governments are regulating its use, the Qantas leak and the 5 million people impacted, and we chat about major cyber attacks with SolarWinds CISO Tim Brown. Croft and Hollingworth begin by discussing the fight that CBA has ignited…
…
  continue reading
On this episode, host Adam Russo welcomes Michael Meloch, CEO of TPAC, a company that helps employers control healthcare costs as their honest, transparent stop loss partner. Mike shares insights on the evolving landscape of underwriting in the self-funded health insurance industry. He explains that while technology has not significantly changed th…
…
  continue reading

1
Health Stealth Radio: Calli Dretke, EVP, Chief Digital & Marketing Officer
27:34
27:34
 
 
나중에 재생
 
나중에 재생
 
리스트
 
좋아요
 
좋아요
27:34S2E15: Digital Empathy, Cyber Resilience, and the New Health IT Paradigm: CHIME’s VisionHost: Frank CutittaGuest: Calli Dretke, EVP, Chief Digital & Marketing Officer, CHIMETo stream our Station live 24/7 visit www.HealthcareNOWRadio.com or ask your Smart Device to “….Play Healthcare NOW Radio”.Find all of our network podcasts on your favorite podc…
…
  continue reading
From Crisis to Prevention: How Ambient Monitoring Is Rewiring Healthcare CultureJoin Megan Antonelli as she speaks with Jenice Larmond, RN, BSN, MBA, Clinical Innovation & Excellence Officer at Neteera, about how radar-based ambient monitoring is rewiring clinical culture toward prevention. Discover how FDA-cleared contactless technology continuous…
…
  continue reading

1
Talking the Walk: Cybersecurity Awareness Month with Lance Reid
27:49
27:49
 
 
나중에 재생
 
나중에 재생
 
리스트
 
좋아요
 
좋아요
27:49Cybersecurity Awareness Month with Lance ReidS1E14: On this episode host Tom Testa invites Lance Reid, CEO of Telcion to discuss cybersecurity in healthcare during Cybersecurity Awareness Month. Lance shares insights on how healthcare organizations, particularly community clinics, face unique cybersecurity challenges due to limited resources and st…
…
  continue reading

1
SANS Stormcast Friday, October 24th, 2025: Android Infostealer; SessionReaper Exploited; BIND/unbound DNS Spoofing fix; WSUS Exploit (#)
6:25
6:25
 
 
나중에 재생
 
나중에 재생
 
리스트
 
좋아요
 
좋아요
6:25SANS Stormcast Friday, October 24th, 2025: Android Infostealer; SessionReaper Exploited; BIND/unbound DNS Spoofing fix; WSUS Exploit Infostealer Targeting Android Devices This infostealer, written in Python, specifically targets Android phones. It takes advantage of Termux to gain access to data and exfiltrates it via Telegram. https://isc.sans.edu…
…
  continue reading
In the security news: When in doubt, blame DNS, you're almost always correct How to Make Windows 11 great, or at least suck less CSRF is the least of your problems Shady exploits Linux security table stakes (not steaks) The pill camera Give AI access to your UART Security products that actually try to be secure? Firmware vulnerabilities, lots of th…
…
  continue reading
In the security news: When in doubt, blame DNS, you're almost always correct How to Make Windows 11 great, or at least suck less CSRF is the least of your problems Shady exploits Linux security table stakes (not steaks) The pill camera Give AI access to your UART Security products that actually try to be secure? Firmware vulnerabilities, lots of th…
…
  continue reading
 
 
 
 
