Network Security 공개
[search 0]
Download the App!
show episodes
 
A brief daily summary of what is important in information security. The podcast is published every weekday and designed to get you ready for the day with a brief, usually 5 minutes long summary of current network security related events. The content is late breaking, educational and based on listener input as well as on input received by the SANS Internet Storm Center. You may submit questions and comments via our contact form at https://isc.sans.edu/contact.html .
  continue reading
 
Artwork

1
Network Security

University of Twente

icon
Unsubscribe
icon
icon
Unsubscribe
icon
매달
 
Through following this course, students will gain a basic understanding of the principles behind network security and the working of the main protocols, mechanisms and techniques in the area of security. The course consists of three parts: security mechanisms within network protocols, systems security and lab sessions. In the first part (security mechanisms within network protocols), the following topics will be discussed: IPSec, SSH, SSL, HTTPS and security for wireless networks. The second ...
  continue reading
 
Artwork

1
Security Weekly Podcast Network (Audio)

Security Weekly Productions

icon
Unsubscribe
icon
icon
Unsubscribe
icon
매일
 
Welcome to the Security Weekly Podcast Network, your all-in-one source for the latest in cybersecurity! This feed features a diverse lineup of shows, including Application Security Weekly, Business Security Weekly, Paul's Security Weekly, Enterprise Security Weekly, and Security Weekly News. Whether you're a cybersecurity professional, business leader, or tech enthusiast, we cover all angles of the cybersecurity landscape. Tune in for in-depth panel discussions, expert guest interviews, and ...
  continue reading
 
Artwork
 
Welcome to the Security Weekly Podcast Network, your all-in-one source for the latest in cybersecurity! This feed features a diverse lineup of shows, including Application Security Weekly, Business Security Weekly, Paul's Security Weekly, Enterprise Security Weekly, and Security Weekly News. Whether you're a cybersecurity professional, business leader, or tech enthusiast, we cover all angles of the cybersecurity landscape. Tune in for in-depth panel discussions, expert guest interviews, and ...
  continue reading
 
The Defence & Security Podcast Network hosts a unique series of podcasts, featuring discussions with key enablers from across the Australian defence and security industry. The podcasts provide the perfect blend of business intelligence and insights from a range of guests, which include government officials, ADF personnel, industry stakeholders, and members of the academic community. By aligning ourselves with the ADF and the Commonwealth government, we are uniquely placed to deliver a dynami ...
  continue reading
 
RADIO FOR THE HEALTHCARE INDUSTRY Healthcare NOW Radio and Podcast Network offers discussions on the latest developments and trends impacting the industry including: health tech, health IT, healthcare innovation, healthcare policy, healthcare data security, telehealth, interoperability, biotech, med tech, value-based care, pharma, healthcare compliance, and much more. Shows are hosted by industry thought leaders. Guests are a "who's who" across the healthcare spectrum. The listening audience ...
  continue reading
 
Loading …
show series
 
What are your favorite resources for secure code? Co-hosts John Kinsella and Kalyani Pawar talk about the reality of bringing security into a business. We talk about the role of the OWASP Top 10 and the OWASP ASVS in crafting security programs. And balance that with a discussion in what's the best use of everyone's time -- developers and appsec fol…
  continue reading
 
SANS Stormcast Tuesday, November 25th, 2025: URL Mapping and Authentication; SHA1-Hulud; Hacklore Conflicts between URL mapping and URL based access control. Mapping different URLs to the same script, and relying on URL based authentication at the same time, may lead to dangerous authentication and access control gaps. https://isc.sans.edu/diary/Co…
  continue reading
 
In this episode of the Cyber Uncut podcast, David Hollingworth is joined by Bethany Alvaro to talk about all things Australia and cyber security! The pair kick things off with some AI news. NVIDIA announced record earnings as the AI bubble steadfastly refuses to burst, and ChatGPT's curious new group chat feature. Hollingworth and Alvaro then talk …
  continue reading
 
Bringing to Realization the Promise of AIOn this episode, host Goel Jasper sits down with David Lazerson, Co-founder and CEO of Briya. David discusses the vision of Briya, a company committed to improving and accelerating the research process with an AI-based platform. While 2025 was a year of discovery, David believes 2026 will be the year when AI…
  continue reading
 
What are your favorite resources for secure code? Co-hosts John Kinsella and Kalyani Pawar talk about the reality of bringing security into a business. We talk about the role of the OWASP Top 10 and the OWASP ASVS in crafting security programs. And balance that with a discussion in what's the best use of everyone's time -- developers and appsec fol…
  continue reading
 
Interview with Ravid Circus Ravid will discuss why security and engineering misalignment is the biggest barrier to fast, effective remediation, using data from Seemplicity’s 2025 Remediation Operations Report. This is costing some teams days of unnecessary exposure, which can lead to major security implications for organizations. Segment Resources:…
  continue reading
 
Interview with Ravid Circus Ravid will discuss why security and engineering misalignment is the biggest barrier to fast, effective remediation, using data from Seemplicity's 2025 Remediation Operations Report. This is costing some teams days of unnecessary exposure, which can lead to major security implications for organizations. Segment Resources:…
  continue reading
 
SANS Stormcast Monday, November 24th, 2025: CSS Padding in Phishing; Oracle Identity Manager Scans Update; Use of CSS stuffing as an obfuscation technique? Phishing sites stuff their HTML with benign CSS code. This is likely supposed to throw of simple detection engines https://isc.sans.edu/diary/Use%20of%20CSS%20stuffing%20as%20an%20obfuscation%20…
  continue reading
 
Episode 78 The Interpreter Who Sees Everything: Rose Cano on Immigration, Grief, and Real CareOn this episode host Raj Sundar explores how immigration status profoundly impacts healthcare access, from barriers to benefits and financial assistance, to the psychological toll experienced by patients and families navigating fears of deportation. They d…
  continue reading
 
Building Resilience in Healthcare MarketingOn this episode host Adam Turinas discusses, with Mark Erwich, Health Launchpad Chief Strategy Officer, the mounting pressures on hospitals and IDNs, from shrinking margins and labor shortages to an onslaught of regulatory changes, including OPBBA, Medicaid work requirements, and ACA cuts. Mark is a health…
  continue reading
 
On this episode Justin records live at HLTH25 in Las Vegas. Stay tuned for the next few weeks to hear all his guests. This week Justin talks to Rasu Shrestha, MD MBA, Chief Innovation and Commercialization Officer, EVP at Advocate Health and Rowland Illing, MD. Global Chief Medical Officer and Director, Healthcare and Life Sciences at Amazon Web Se…
  continue reading
 
Hosts Colin Hung and John Lynn discuss the healthcare job market.To stream our Station live 24/7 visit www.HealthcareNOWRadio.com or ask your Smart Device to “….Play Healthcare NOW Radio”.Find all of our network podcasts on your favorite podcast platforms and be sure to subscribe and like us. Learn more at www.healthcarenowradio.com/listen…
  continue reading
 
On this episode, host Adam Russo welcomes John Farnsley, EVP Business Development at 90 Degree Benefits, a company that is humanizing healthcare by providing plans that increase savings without sacrificing high-quality care. John shares insights on the evolution of healthcare delivery and the changing role of TPAs in the industry.To stream our Stat…
  continue reading
 
Securing Healthcare's Identity Crisis: Why Non-Human Identities Are Your Biggest Cybersecurity ThreatJoin us for a critical discussion on healthcare's most pressing cybersecurity challenge with Nikki Bennett, Healthcare Advisory Identity Strategist at SailPoint. Drawing from five years of frontline IAM experience at ECU Health, Nikki reveals how to…
  continue reading
 
S1E16: Lauren Barca, 86 Borders S1E16: On this episode host Tom Testa invites Lauren Barca, VP of Quality at 86Borders, a company that builds human-to-human relationships to remove barriers to care, improving healthcare experiences and outcomes. Lauren share insights on how they partner with health plans to tackle social barriers, close gaps in car…
  continue reading
 
In the security news: Cloudflare was down, it was not good Logitech breached The largest data breach in history? Fortinet Fortiweb - the saga continues Hacking Linux through your malware scanner, oh the irony I never stopped hating systemd The ASUS exploit that never existed If iRobot fails, can we deploy our own hacker bot army? Firmware encryptio…
  continue reading
 
In the security news: Cloudflare was down, it was not good Logitech breached The largest data breach in history? Fortinet Fortiweb - the saga continues Hacking Linux through your malware scanner, oh the irony I never stopped hating systemd The ASUS exploit that never existed If iRobot fails, can we deploy our own hacker bot army? Threat actors depl…
  continue reading
 
SANS Stormcast Friday, November 21st, 2025: Oracle Idendity Manager Scans; SonicWall DoS Vuln; Adam Wilson (@sans_edu) reducing prompt injection. Oracle Identity Manager Exploit Observation from September (CVE-2025-61757) We observed some exploit attempts in September against an Oracle Identity Manager vulnerability that was patched in October, ind…
  continue reading
 
In this special episode of the Defence Connect Podcast, host Steve Kuper is joined by the co-founder and CEO of Anduril Industries, Brian Schimpf, as they talk about building an allied industrial base and the intricacies involved. Recorded live at Indo Pacific International Maritime Exposition 2025, the pair also discuss a range of subjects, includ…
  continue reading
 
SANS Stormcast Thursday, November 20th, 2025: Unicode Issues; FortiWeb More Vulns; DLink DIR-878 Vuln; Operation WrtHug and ASUS Routers Unicode: It is more than funny domain names. Unicode can cause a number of issues due to odd features like variance selectors and text direction issues. https://isc.sans.edu/diary/Unicode%3A%20It%20is%20more%20tha…
  continue reading
 
It's a topic we discuss often on Business Security Weekly: CISO Burnout. It's real, but how should you manage it? Dr. Yonesy Núñez, Global Cybersecurity Executive at Chain Bridge Bank and former Managing Director, Chief Cybersecurity Risk Officer, and Chief Information Security Officer at The Depository Trust & Clearing Corporation (DTCC), joins Bu…
  continue reading
 
It's a topic we discuss often on Business Security Weekly: CISO Burnout. It's real, but how should you manage it? Dr. Yonesy Núñez, Global Cybersecurity Executive at Chain Bridge Bank and former Managing Director, Chief Cybersecurity Risk Officer, and Chief Information Security Officer at The Depository Trust & Clearing Corporation (DTCC), joins Bu…
  continue reading
 
SANS Stormcast Wednesday, November 19th, 2025: Kong Tuke; Cloudflare Outage KongTuke Activity This diary investigates how a recent Kong Tuke infections evolved all the way from starting with a ClickFix attack. https://isc.sans.edu/diary/KongTuke%20activity/32498 Cloudflare Outage Cloudflare suffered a large outage today after an oversized configura…
  continue reading
 
AI Model Mania – Navigating the Healthtech Marketers Landscape with Adam TurinasOn this lively episode, host Carol Flagg welcomes back Adam Turinas, founder of Health Launchpad and host of The Healthtech Marketing Show. Adam shares the story behind his AI Quick Takes segment—particularly the episode Model Mania: Navigating the New AI Landscape, whi…
  continue reading
 
Episode 52 - HLTH25 Recap – What’s Real, What’s Hype, and What’s Next in Health IT On this episode host Tony Schueth, CEO of Point-of-Care Partners (POCP), is joined by colleagues Brian Dwyer, POCP’s Business Strategy Lead, and Seth Joseph, Managing Director at Summit Health Advisors, to unpack their takeaways from the HLTH25 conference in Las Vega…
  continue reading
 
AI Oversight for the Modern Revenue CycleAs AI agents take on more decisions across the revenue cycle, the question isn’t how fast automation can move — it’s how safely it operates. This session explores the guardrails of governance in an AI-driven RCM environment, outlining practical steps to ensure transparency, compliance, and human accountabili…
  continue reading
 
Cloudflare, Gh0stRAT, npm, North Korean Employees, Arch Linux Steam Machine, Documentaries, Aaran Leyland, and more on the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-530
  continue reading
 
Secure code should be grounded more in concepts like secure by default and secure by design than by "spot the vuln" thinking. Matias Madou shares his experience in secure coding training and the importance of teaching critical thinking. He also discusses why critical thinking is so closely related to threat modeling and how LLMs can be a tool for h…
  continue reading
 
Secure code should be grounded more in concepts like secure by default and secure by design than by "spot the vuln" thinking. Matias Madou shares his experience in secure coding training and the importance of teaching critical thinking. He also discusses why critical thinking is so closely related to threat modeling and how LLMs can be a tool for h…
  continue reading
 
In this episode of the Defence Connect Spotlight podcast, host Steve Kuper is joined by Leighton Freene and Murray Thompson of Kinetic IT as they unpack the mechanics shaping the digital transformation of the Australian Defence Force. The trio also discuss a range of subjects, including: The pivotal role of digital technologies as the backbone of t…
  continue reading
 
SANS Stormcast Tuesday, November 18th, 2025: Binary Expression Decoding. Tea NPM Pollution; IBM AIX NIMSH Vulnerability Decoding Binary Numeric Expressions Didier updated his number to hex script to support simple arithmetic operations in the text. https://isc.sans.edu/diary/Decoding%20Binary%20Numeric%20Expressions/32490 Tea Token NPM Pollution Th…
  continue reading
 
Segment 1: Interview with Rob Allen It's the Year of the (Clandestine) Linux Desktop! As if EDR evasions weren't enough, attackers are now employing yet another method to hide their presence on enterprise systems: deploying tiny Linux VMs. Attackers are using Hyper-V and/or WSL to deploy tiny (120MB disk space and 256MB memory) Linux VMs to host a …
  continue reading
 
Segment 1: Interview with Rob Allen It's the Year of the (Clandestine) Linux Desktop! As if EDR evasions weren't enough, attackers are now employing yet another method to hide their presence on enterprise systems: deploying tiny Linux VMs. Attackers are using Hyper-V and/or WSL to deploy tiny (120MB disk space and 256MB memory) Linux VMs to host a …
  continue reading
 
In this episode of the Cyber Uncut podcast, David Hollingworth catches up with Proofpoint's chief strategy officer, Ryan Kalember, and vice president of systems engineering for the APJ region, Adrian Covich, while attending the Proofpoint Protect Tour in Melbourne. The three talk about the high-level trends and concerns they're seeing from CISOs bo…
  continue reading
 
Loading …

빠른 참조 가이드

탐색하는 동안 이 프로그램을 들어보세요.
재생