A brief daily summary of what is important in information security. The podcast is published every weekday and designed to get you ready for the day with a brief, usually 5 minutes long summary of current network security related events. The content is late breaking, educational and based on listener input as well as on input received by the SANS Internet Storm Center. You may submit questions and comments via our contact form at https://isc.sans.edu/contact.html .
…
continue reading
Story
…
continue reading
Through following this course, students will gain a basic understanding of the principles behind network security and the working of the main protocols, mechanisms and techniques in the area of security. The course consists of three parts: security mechanisms within network protocols, systems security and lab sessions. In the first part (security mechanisms within network protocols), the following topics will be discussed: IPSec, SSH, SSL, HTTPS and security for wireless networks. The second ...
…
continue reading
Welcome to the Security Weekly Podcast Network, your all-in-one source for the latest in cybersecurity! This feed features a diverse lineup of shows, including Application Security Weekly, Business Security Weekly, Paul's Security Weekly, Enterprise Security Weekly, and Security Weekly News. Whether you're a cybersecurity professional, business leader, or tech enthusiast, we cover all angles of the cybersecurity landscape. Tune in for in-depth panel discussions, expert guest interviews, and ...
…
continue reading
Welcome to the Security Weekly Podcast Network, your all-in-one source for the latest in cybersecurity! This feed features a diverse lineup of shows, including Application Security Weekly, Business Security Weekly, Paul's Security Weekly, Enterprise Security Weekly, and Security Weekly News. Whether you're a cybersecurity professional, business leader, or tech enthusiast, we cover all angles of the cybersecurity landscape. Tune in for in-depth panel discussions, expert guest interviews, and ...
…
continue reading
…
continue reading
The Defence & Security Podcast Network hosts a unique series of podcasts, featuring discussions with key enablers from across the Australian defence and security industry. The podcasts provide the perfect blend of business intelligence and insights from a range of guests, which include government officials, ADF personnel, industry stakeholders, and members of the academic community. By aligning ourselves with the ADF and the Commonwealth government, we are uniquely placed to deliver a dynami ...
…
continue reading
An online network about educating, entertaining and encouraging your dance with Technology!
…
continue reading

1
Healthcare NOW Radio Podcast Network - Discussions on healthcare including technology, innovation, policy, data security, telehealth and more. Visit HealthcareNOWRadio.com
Healthcare NOW Radio and Podcast Network - Radio and Podcasts for the Healthcare Industry
RADIO FOR THE HEALTHCARE INDUSTRY Healthcare NOW Radio and Podcast Network offers discussions on the latest developments and trends impacting the industry including: health tech, health IT, healthcare innovation, healthcare policy, healthcare data security, telehealth, interoperability, biotech, med tech, value-based care, pharma, healthcare compliance, and much more. Shows are hosted by industry thought leaders. Guests are a "who's who" across the healthcare spectrum. The listening audience ...
…
continue reading
An online network about educating, entertaining and encouraging your dance with Technology!
…
continue reading

1
Changing the Vuln Conversation from Volume to Remediation - Francesco Cipollone - ASW #350
1:14:32
1:14:32
נגן מאוחר יותר
נגן מאוחר יותר
רשימות
לייק
אהבתי
1:14:32Dealing with vulns tends to be a discussion about prioritization. After all, there a tons of CVEs and dependencies with known vulns. It's important to figure out how to present developers with useful vuln info that doesn't overwhelm them. Francesco Cipollone shares how to redirect that discussion to focus on remediation and how to incorporate LLMs …
…
continue reading

1
SANS Stormcast Tuesday, September 30th, 2025: Apple Patch; PAN Global Protect Scans; SSL.com signed malware (#)
5:06
5:06
נגן מאוחר יותר
נגן מאוחר יותר
רשימות
לייק
אהבתי
5:06SANS Stormcast Tuesday, September 30th, 2025: Apple Patch; PAN Global Protect Scans; SSL.com signed malware Apple Patches Apple released patches for iOS, macOS, and visionOS, fixing a single font parsing vulnerability https://isc.sans.edu/diary/Apple%20Patches%20Single%20Vulnerability%20CVE-2025-43400/32330 Increase in Scans for Palo Alto Global Pr…
…
continue reading

1
CYBER UNCUT : NSW schools to get AI tool, AI Charlie Kirk, EU airports hacked and charities get a cyber helping hand
45:49
45:49
נגן מאוחר יותר
נגן מאוחר יותר
רשימות
לייק
אהבתי
45:49In this episode of the Cyber Uncut podcast, Daniel Croft and David Hollingworth talk about NSWEduChat, a virtual Charlie Kirk, the impact of a cyber incident disrupting airports across Europe, and how Australian not-for-profits are getting a new tool to face a rising tide of ransomware attacks. Croft and Hollingworth open proceedings with Instagram…
…
continue reading

1
The Virtual Shift: Dr. Tom Kelly, Co-founder and CEO of Heidi Health
27:38
27:38
נגן מאוחר יותר
נגן מאוחר יותר
רשימות
לייק
אהבתי
27:38Host Tom Foley invites Dr. Tom Kelly, Co-founder and CEO of Heidi Health, a company with an AI-powered medical scribe that streamlines time-intensive administrative tasks to reduce the cognitive load on clinicians. Tom shares insights on how Ambient AI can alleviate clinicians spending so much time on admin and notes making them less available for …
…
continue reading

1
Changing the Vuln Conversation from Volume to Remediation - Francesco Cipollone - ASW #350
1:14:32
1:14:32
נגן מאוחר יותר
נגן מאוחר יותר
רשימות
לייק
אהבתי
1:14:32Dealing with vulns tends to be a discussion about prioritization. After all, there a tons of CVEs and dependencies with known vulns. It's important to figure out how to present developers with useful vuln info that doesn't overwhelm them. Francesco Cipollone shares how to redirect that discussion to focus on remediation and how to incorporate LLMs …
…
continue reading

1
Live interviews from Oktane 2025: threats, AI in apps, and AI in cybersecurity tools - Brett Winterford, Shiv Ramji, Damon McDougald - ESW #426
1:35:13
1:35:13
נגן מאוחר יותר
נגן מאוחר יותר
רשימות
לייק
אהבתי
1:35:13How identity security can keep pace with the evolving threat landscape, with Brett Winterford Today’s threat landscape has never been more complex. Malicious actors are leveraging tools like generative AI to develop more creative social engineering attacks that can have serious ramifications for businesses. Brett Winterford, VP of Okta Threat Intel…
…
continue reading

1
Live interviews from Oktane 2025: threats, AI in apps, and AI in cybersecurity tools - Brett Winterford, Shiv Ramji, Damon McDougald - ESW #426
1:35:13
1:35:13
נגן מאוחר יותר
נגן מאוחר יותר
רשימות
לייק
אהבתי
1:35:13How identity security can keep pace with the evolving threat landscape, with Brett Winterford Today’s threat landscape has never been more complex. Malicious actors are leveraging tools like generative AI to develop more creative social engineering attacks that can have serious ramifications for businesses. Brett Winterford, VP of Okta Threat Intel…
…
continue reading

1
SANS Stormcast Monday, September 29th, 2025: Convert Timestamps; Cisco Compromises; GitHub Notification Phishing (#)
8:36
8:36
נגן מאוחר יותר
נגן מאוחר יותר
רשימות
לייק
אהבתי
8:36SANS Stormcast Monday, September 29th, 2025: Convert Timestamps; Cisco Compromises; GitHub Notification Phishing Converting Timestamps in .bash_history Unix shells offer the ability to add timestamps to commands in the .bash_history file. This is often done in the form of Unix timestamps. This new tool converts these timestamps into a more readable…
…
continue reading

1
The Healthtech Marketing Show: AI Quick Take – Digital Twinning
15:45
15:45
נגן מאוחר יותר
נגן מאוחר יותר
רשימות
לייק
אהבתי
15:45AI Quick Take – Digital TwinningOn this episode host Adam Turinas looks at one of the most fascinating yet misunderstood applications of AI in healthcare: digital twins.Find all of our network podcasts on your favorite podcast platforms and be sure to subscribe and like us. Learn more at www.healthcarenowradio.com/listen/…
…
continue reading

1
Health Stealth Radio: Ed Lee, MD, Chief Medical Officer, Nabla
26:51
26:51
נגן מאוחר יותר
נגן מאוחר יותר
רשימות
לייק
אהבתי
26:51S2E14: Ambient AI in Healthcare TrendsHost: Frank CutittaGuest: Dr. Ed Lee, Chief Medical Officer at NablaTo stream our Station live 24/7 visit www.HealthcareNOWRadio.com or ask your Smart Device to “….Play Healthcare NOW Radio”.Find all of our network podcasts on your favorite podcast platforms and be sure to subscribe and like us. Learn more at w…
…
continue reading

1
News You Can Use: Special Edition Booking with Dr. Kris Olson
26:17
26:17
נגן מאוחר יותר
נגן מאוחר יותר
רשימות
לייק
אהבתי
26:17On this special edition Dr. Nick welcomes Dr. Kris Olson. Dr. Olson’s career spans global health work in refugee camps and disaster zones, shaping his belief in humility, empathy, and local empowerment. At Mass General Brigham, he leads Springboard Studio, using design thinking. Topics include making healthcare more human-centered for both patients…
…
continue reading

1
Healthcare IT Today: Enforcement of Information Blocking
28:29
28:29
נגן מאוחר יותר
נגן מאוחר יותר
רשימות
לייק
אהבתי
28:29Hosts Colin Hung and John Lynn discuss Enforcement of Information Blocking.To stream our Station live 24/7 visit www.HealthcareNOWRadio.com or ask your Smart Device to “….Play Healthcare NOW Radio”.Find all of our network podcasts on your favorite podcast platforms and be sure to subscribe and like us. Learn more at www.healthcarenowradio.com/liste…
…
continue reading

1
Health Cent$: Mark Gaunya Founding Principal & CEO, Captivated Health: Principal, Borislow I
28:43
28:43
נגן מאוחר יותר
נגן מאוחר יותר
רשימות
לייק
אהבתי
28:43On this episode, host Adam Russo welcomes Mark Gaunya, Founding Principal & CEO, Captivated Health; Principal, Borislow Insurance.To stream our Station live 24/7 visit www.HealthcareNOWRadio.com or ask your Smart Device to “….Play Healthcare NOW Radio”.Find all of our network podcasts on your favorite podcast platforms and be sure to subscribe and …
…
continue reading

1
Riker's Curse, River City, EDR-Freeze, MCP, WordPress, GitHub, Josh Marpet, and More. - SWN #515
30:49
30:49
נגן מאוחר יותר
נגן מאוחר יותר
רשימות
לייק
אהבתי
30:49Riker's Curse, River City, EDR-Freeze, MCP, WordPress, GitHub, Josh Marpet, and More, on this edition of the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-515
…
continue reading

1
Riker's Curse, River City, EDR-Freeze, MCP, WordPress, GitHub, Josh Marpet, and More. - SWN #515
30:49
30:49
נגן מאוחר יותר
נגן מאוחר יותר
רשימות
לייק
אהבתי
30:49Riker's Curse, River City, EDR-Freeze, MCP, WordPress, GitHub, Josh Marpet, and More, on this edition of the Security Weekly News. Show Notes: https://securityweekly.com/swn-515
…
continue reading

1
SANS Stormcast Friday, September 26th, 2025: Webshells in .well-known; Critical Cisco Vulns Exploited; XCSSET Update; GoAnywhere MFT Exploit Details (#)
5:25
5:25
נגן מאוחר יותר
נגן מאוחר יותר
רשימות
לייק
אהבתי
5:25SANS Stormcast Friday, September 26th, 2025: Webshells in .well-known; Critical Cisco Vulns Exploited; XCSSET Update; GoAnywhere MFT Exploit Details Webshells Hiding in .well-known Places Our honeypots registered an increase in scans for URLs in the .well-known directory, which appears to be looking for webshells. https://isc.sans.edu/diary/Webshel…
…
continue reading

1
Broadcom, LastPass, SEO Poisoning, QR codes, H1B visas, Distributed Computing... - PSW #893
1:03:06
1:03:06
נגן מאוחר יותר
נגן מאוחר יותר
רשימות
לייק
אהבתי
1:03:06Broadcom, LastPass, Brickstone, SEO Poisoning, QR codes, H1B visas, Distributed Computing, and More... Show Notes: https://securityweekly.com/psw-893
…
continue reading

1
Broadcom, LastPass, SEO Poisoning, QR codes, H1B visas, Distributed Computing... - PSW #893
1:03:06
1:03:06
נגן מאוחר יותר
נגן מאוחר יותר
רשימות
לייק
אהבתי
1:03:06Broadcom, LastPass, Brickstone, SEO Poisoning, QR codes, H1B visas, Distributed Computing, and More... Visit https://www.securityweekly.com/psw for all the latest episodes! Show Notes: https://securityweekly.com/psw-893
…
continue reading

1
SANS Stormcast Thursday, September 25th, 2025: Hikvision Exploits; Cisco Patches; Sonicawall Anit-Rootkit Patch; Windows 10 Support (#)
5:33
5:33
נגן מאוחר יותר
נגן מאוחר יותר
רשימות
לייק
אהבתי
5:33SANS Stormcast Thursday, September 25th, 2025: Hikvision Exploits; Cisco Patches; Sonicawall Anit-Rootkit Patch; Windows 10 Support Exploit Attempts Against Older Hikvision Camera Vulnerability Out honeypots observed an increase in attacks against some older Hikvision issues. A big part of the problem is weak passwords, and the ability to send cred…
…
continue reading

1
Food security, biosecurity and national resilience with Andrew Henderson, director of AgSecure
36:13
36:13
נגן מאוחר יותר
נגן מאוחר יותר
רשימות
לייק
אהבתי
36:13In this episode of the Defence Connect Podcast, managing editor Steve Kuper speaks with Andrew Henderson, director of AgSecure and a leading voice on agricultural resilience, biosecurity, and national preparedness. Together, they explore the recently released National Food Security Strategy discussion paper, the importance of critical inputs like f…
…
continue reading

1
Digital Health Talks: Virtual Care in Acute Settings From Observation to Nursing
28:33
28:33
נגן מאוחר יותר
נגן מאוחר יותר
רשימות
לייק
אהבתי
28:33Virtual Care in Acute Settings: From Observation to Nursing - Technology Solutions for Hospital Risk PreventionJoin Dr. Christine Gall from Collette Health as she explores how virtual care platforms are transforming acute care delivery in hospitals and health systems. Starting with virtual observation as the entry point for falls prevention and pat…
…
continue reading

1
Rearchitecting Systems for Privacy as AI Agents Force You to Rethink Security - Guillaume Jaulerry - BSW #414
1:02:20
1:02:20
נגן מאוחר יותר
נגן מאוחר יותר
רשימות
לייק
אהבתי
1:02:20As AI and cloud-based services power our connected world, individuals are facing an unprecedented privacy crisis. With more than 2.3 billion people entrusting their data to the cloud and centralized servers, cyberattacks, data breaches, surveillance, identity theft, and privacy threats are now everyday risks. How do we protect against these threats…
…
continue reading

1
Rearchitecting Systems for Privacy as AI Agents Force You to Rethink Security - Guillaume Jaulerry - BSW #414
1:02:20
1:02:20
נגן מאוחר יותר
נגן מאוחר יותר
רשימות
לייק
אהבתי
1:02:20As AI and cloud-based services power our connected world, individuals are facing an unprecedented privacy crisis. With more than 2.3 billion people entrusting their data to the cloud and centralized servers, cyberattacks, data breaches, surveillance, identity theft, and privacy threats are now everyday risks. How do we protect against these threats…
…
continue reading

1
SANS Stormcast Wednesday, September 24th, 2025: DoS against the Analyst; GitHub Improvements; Solarwinds and Supermicro BMC vulnerabilities (#)
7:23
7:23
נגן מאוחר יותר
נגן מאוחר יותר
רשימות
לייק
אהבתי
7:23SANS Stormcast Wednesday, September 24th, 2025: DoS against the Analyst; GitHub Improvements; Solarwinds and Supermicro BMC vulnerabilities Distracting the Analyst for Fun and Profit Our undergraduate intern, Tyler House analyzed what may have been a small DoS attack that was likely more meant to distract than to actually cause a denial of service …
…
continue reading

1
What's My Tagline?: Video Podcasting – Changing How We Think about Traditional Podcasting
26:49
26:49
נגן מאוחר יותר
נגן מאוחר יותר
רשימות
לייק
אהבתי
26:49On this episode Carol chats with good friend and colleague, Jared Johnson, Marketing & Digital Transformation Advisor and Founder, of the Healthcare Rap Podcast & Community. He joins her to talk about how YouTube, Apple and Spotify and the rise of video podcasting, are changing our traditional views about podcasting. Learn more about Jared Johnson …
…
continue reading

1
Uhura, Collins, Nimbus Manticore, Sonic Wall, Async Rat, Solar Winds, Aaran Leyland.. - SWN #514
29:42
29:42
נגן מאוחר יותר
נגן מאוחר יותר
רשימות
לייק
אהבתי
29:42Uhura, Collins, Nimbus Manticore, Sonic Wall, Async Rat, Solar Winds, ShadowV2, H1B, Aaran Leyland, and more on the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-514
…
continue reading

1
Uhura, Collins, Nimbus Manticore, Sonic Wall, Async Rat, Solar Winds, Aaran Leyland.. - SWN #514
29:42
29:42
נגן מאוחר יותר
נגן מאוחר יותר
רשימות
לייק
אהבתי
29:42Uhura, Collins, Nimbus Manticore, Sonic Wall, Async Rat, Solar Winds, ShadowV2, H1B, Aaran Leyland, and more on the Security Weekly News. Show Notes: https://securityweekly.com/swn-514
…
continue reading

1
Design Errors in Entra ID, Design Defenses in iOS, Design Difficulties in DeepSeek - ASW #349
58:43
58:43
נגן מאוחר יותר
נגן מאוחר יותר
רשימות
לייק
אהבתי
58:43In the news, Microsoft encounters a new cascade of avoidable errors with Entra ID, Apple improves iOS with hardware-backed memory safety, DeepSeek demonstrates the difficulty in reviewing models, curl reduces risk by eliminating code, preserving the context of code reviews, and more! Visit https://www.securityweekly.com/asw for all the latest episo…
…
continue reading

1
Design Errors in Entra ID, Design Defenses in iOS, Design Difficulties in DeepSeek - ASW #349
58:43
58:43
נגן מאוחר יותר
נגן מאוחר יותר
רשימות
לייק
אהבתי
58:43In the news, Microsoft encounters a new cascade of avoidable errors with Entra ID, Apple improves iOS with hardware-backed memory safety, DeepSeek demonstrates the difficulty in reviewing models, curl reduces risk by eliminating code, preserving the context of code reviews, and more! Show Notes: https://securityweekly.com/asw-349…
…
continue reading

1
SPOTLIGHT: Shaping the future of ADF training and simulation with Benjamin Rice, managing director of Coherics
33:30
33:30
נגן מאוחר יותר
נגן מאוחר יותר
רשימות
לייק
אהבתי
33:30In this episode, host Steve Kuper sits down with Benjamin Rice, managing director at Coherics, to unpack the critical role of training and simulation in preparing the Australian Defence Force and its allies for the challenges of modern warfare. From the vast live-fire exercises of Talisman Sabre to the increasingly vital domains of cyber, space and…
…
continue reading

1
SANS Stormcast Tuesday, September 23rd, 2025: Ivanti EPMM Exploit; GitHub Impersonation (#)
4:50
4:50
נגן מאוחר יותר
נגן מאוחר יותר
רשימות
לייק
אהבתי
4:50SANS Stormcast Tuesday, September 23rd, 2025: Ivanti EPMM Exploit; GitHub Impersonation CISA Reports Ivanti EPMM Exploit Sightings Two different organizations submitted backdoors to CISA, which are believed to have been installed using Ivanti vulnerabilities patched in May. https://www.cisa.gov/news-events/analysis-reports/ar25-261a Lastpass Observ…
…
continue reading

1
Ask the Educator: Are Your Endoscopes Dry?
15:30
15:30
נגן מאוחר יותר
נגן מאוחר יותר
רשימות
לייק
אהבתי
15:30With endoscopy under the spotlight, one of the toughest challenges departments face is proper drying. On this episode, they sit down with Healthmark’s endoscopy specialist, Dyan Darga, to unpack best practices and key takeaways from her July 2025 webinar on endoscope drying.Find all of our network podcasts on your favorite podcast platforms and be …
…
continue reading

1
HealthLaw HotSpot: Terms of Use and Privacy Policies: Protecting Your Healthcare Practice
13:44
13:44
נגן מאוחר יותר
נגן מאוחר יותר
רשימות
לייק
אהבתי
13:44Host Ericka Adler welcomes Roetzel shareholder Scott Brown for an insightful discussion about protecting your healthcare practice online. They explore why clear, customized Terms of Use and Privacy Policies are essential for any healthcare website or app, and how these documents work together to safeguard your practice and your users. Episode highl…
…
continue reading

1
Unscripted the AMCP Podcast: AMCP Special Edition with Susan Cantrell
28:10
28:10
נגן מאוחר יותר
נגן מאוחר יותר
רשימות
לייק
אהבתי
28:10On this milestone episode of Unscripted, the AMCP Podcast, they celebrate the 30th anniversary of the Journal of Managed Care & Specialty Pharmacy (JMCP). Host Susan Cantrell, AMCP CEO, is joined by Laura Happe, PharmD, MPH, Editor-in-Chief of JMCP, and Pat Gleason, PharmD, BCPS, FCCP, FAMCP, Assistant Vice President, Health Outcomes at Prime Thera…
…
continue reading

1
Disruption is Coming for the Vulnerability Management Market - Tod Beardsley - ESW #425
1:47:15
1:47:15
נגן מאוחר יותר
נגן מאוחר יותר
רשימות
לייק
אהבתי
1:47:15Interview with Tod Beardsley This interview is sponsored by runZero. Legacy vulnerability management (VM) hasn't innovated alongside of attackers, and it shows. Let's talk about the state of VM. Check out https://securityweekly.com/runzero to learn more! Topic Segment: NPM Incidents In this week’s topic segment, we’re discussing all the NPM supply …
…
continue reading

1
Disruption is Coming for the Vulnerability Management Market - Tod Beardsley - ESW #425
1:47:15
1:47:15
נגן מאוחר יותר
נגן מאוחר יותר
רשימות
לייק
אהבתי
1:47:15Interview with Tod Beardsley This interview is sponsored by runZero. Legacy vulnerability management (VM) hasn't innovated alongside of attackers, and it shows. Let's talk about the state of VM. Check out https://securityweekly.com/runzero to learn more! Topic Segment: NPM Incidents In this week’s topic segment, we’re discussing all the NPM supply …
…
continue reading