Technology Blog ציבורי
[search 0]
עוד

Download the App!

show episodes
 
This is the podcast where I, Jared, talk about assistive technology, security, driving cars, and anything else that may cross my desk. If you wish to contribute, please feel free to contact me through the contact information available on the blog or contact information available in the podcast itself. You may also go to my web site for other public contact information. I look forward in participation and comments from everyone. The Security Box, otherwise known as TSB is a weekly talk show t ...
 
Open Tech Talks is your weekly sandbox for technology insights, experimentation, and inspiration. Kashif Manzoor, Cloud Expert, Tech Evangelist, and Enterprise Architect reveals the latest Technology information through Podcast and brings together Product overviews, How-to’s, Best practices, Tips & tricks, and Troubleshooting techniques. You can grow your career through these podcasts for fresh and continuous learning of Information and Oracle Technology. Open Tech Talks is an initiative to ...
 
Loading …
show series
 
The Security box, podcast 78: Windows Update includes a Wormable FlawWelcome to podcast 78 of the Security Box. As we do typically on the podcast, we spend some time catching people up on what has been going on in Redmond, Washington with Windows Update. We've only got one article, however, News of the week for January 14th has the other article. ‘…
 
I realized I said podcast 75 at some point in my audio, this is podcast 77. Too late for me to change it however.Below is the notations which include a link to today's program. We return to a Wednesday schedule next week. Hello folks, welcome to the security box, podcast 77. Google fixes nightmare Android bug that stopped user from calling 911 is o…
 
Welcome to the Security box, podcast 76. On this podcast, we're going to talk about advertisers who are sucking up student data, even though legal action was taken. We'll also have comments and news items from the public if any, maybe some other topics if it turns in to one, and we'll see what else comes up. Topic Advertisers are sucking up student…
 
Besides the hour plus discussion we had, we've got music too for the holiday. Hope you have a happy holiday season. No TSB next week unless something breaks, see you in 2022! Welcome to the Security Box, podcast 75. On this edition of the podcast, come with me as we do a little predicting for 2022 with a Trend Micro article titled Pushing Forward: …
 
Hello folks,This is still developing and there are more articles than listed here. We'll provide the show notes as is, and check the blog and future podcasts for more. Thanks so much for listening! Welcome to the Security Box, podcast 74. On this podcast, something breaking this week called Log4j. We'll break down three different articles that talk…
 
Hello folks, welcome to the security box, podcast 73. On this podcast, plenty of news notes and a very interesting topic dealing with AT&T and appliances that are made to bridge the gap between the ISP and the managing of phone calls, conference video systems and similar real-time applications. We hope that you'll enjoy the program and thanks for l…
 
Welcome to the security box, podcast 72. On this program, we're going to play with Linux a little bit as we discuss a vulnerability in the way it works as it can cause DNS cache poisoning. We'll also have news, notes, commentary and more if people have things they want to share. Our Linux Vulnerability Linux has a serious security problem that once…
 
Welcome to the Security box, podcast 71. On this podcast, we're going to cover things we did not cover last podcast including windows update and a very interesting report dealing with the threat trends for November 2021. We'll have news notes and plenty of it too. Hope you enjoy the show! Patch Tuesday Microsoft Patch Tuesday, November 2021 Edition…
 
The cloud adoption framework of several cloud vendors helps cloud architects, IT professionals, and decision-makers have a set of protocols, best practices, and tools for the journey to the cloud. Each cloud vendor has divided the adoption framework into different phases, and in this session, I will walk you through the high-level stages of each cl…
 
Welcome to the security box, podcast 69. On this edition of the podcast, we turn our attention to another story, bullying over the telephone lines. We have some news, notes and commentary as well, but the bulk of this program is to think about what might go on these lines whether it is one you are on now, or one you've been on. Thanks for listening…
 
Welcome to the Security Box, podcast 68. On this edition of the program, let's talk about social media and phone line issues as it relates to cyberbullying and other related topics. We'll also have news, notes and more. Social Media discussion In a very interesting turn of events, I wasn't necessarily going to put anything in to this section becaus…
 
Welcome to Week 4 of NCSAM. This week, we're going to cover protecting your children online. Notations are taken from a presentation I heard about the topic, and I've summarized it to tell possibly some stories that may be similar to something you've heard or seen. We'll also have news, notes and other comments as the program gets started. Protecti…
 
Welcome to the Security Box, podcast 66. Is 66 a lucky number? T-Mobile and Verizon are in the news with Spam messages, AT&T is in the mix as well in passing, Google is getting in the mix with two-factor authentication on more accounts, as well as news, notes and more. Topics Verizon subscribers are the target of a phishing expedition; do not respo…
 
A few technical issues, but what is a show without those? In this 3 hour episode, we've got quite a lot for you, so sit back and check out the links to the following items for your perusal. Welcome to the Security Box, podcast 65. On this podcast, let's discuss an article we read after the release of last week's program in regards to Twitch and the…
 
NCSAM is now in full swing, this week, Are You Cyber Smart? A Checklist from Lastpass will be what you need to look at with 5 great tips and things that might be of interest to you. In my writeup of this, I talked about the Neiman Marcus breach and how people should be aware of it even if they aren't affected. We'll have news, notes and more. Hope …
 
Welcome to podcast number 63 of the Security Box series. On this podcast, come and learn about the password trends of 2021, thanks to lastpass's article. Next, a 5.9 million dollar ransomware paid by a farming co-op and a very interesting discussion I heard recently about this. We'll definitely have some news and notes from around the landscape, an…
 
Welcome to the Security box, program number 62. On this program, we're going to cover Windows Update as well as a very interesting article from Krebs about a new botnet that seems to have done quite a bit of damage. It is an IOT botnet called Meris. We'll also have news, notes and lots more. Windows Update There are the usual two article…
 
Scott Schober is on Clubhouse, and he invited me over to his club which talks about cyber security topics. Here is a link to his Cyber Security club where members can join the conversation. The discussion started with whether we've gotten the vaccine or not, whether restaurants and other places are collecting that data let alone securely, and more.…
 
Welcome to the Security Box, podcast 61. On this podcast, let's discuss the updates on CSAM as it pertains to Apple. We'll have news, notes and more. Topics Under fire from privacy advocates, Apple delays controversial photo scannin…
 
Cloud Adoption Framework is a set of best practices, tools, and guides that most public cloud vendors publish. The idea behind these cloud adoption frameworks is to assist organizations to embrace public cloud securely, efficiently and faster. The cloud adoption framework comprises each phase of cloud acceptance, from planning to living in the clou…
 
The Security box, podcast 60: The Security Landscape as a whole from broadcasting software and web site services to T-Mobile's FiascoWhat has changed on the security landscape? We learn about T-Mobile's recent failure, and even web sites are braught up as well as broadcasting software among other things. This turned out to be a very interesting sho…
 
A deepfake refers to a specific kind of media or photo where a person in an image or video is transacted with another person however it will look like the original person in an image or video. To make a deep fake video, a creator swaps one person’s face and replaces it with another, using a deep learning algorithm generative adversarial networks (G…
 
Hello folks, welcome to the Security box, podcast 59. On this edition of the program we have two different prerecorded segments for you. First, we interview Scott Schober of Berkeley Varitronics Systems, Inc. He's written various books which we talk about, as well as some of what is going on in the security landscape.Next, we have a talk that was d…
 
Cloud migration is challenging, cumbersome, and risky for traditional organizations relying on in-house custom-built systems to support achieving revenue from years on years. Today I will be discussing a wide variety of challenges organizations are facing while planning for cloud migration. These typical challenges are talks of every board room and…
 
The Security Box, podcast 58: What's the matter with T-mobile? Why are system failures on the rise? News Notes and MoreHello Everyone, welcome to the Security Box, podcast 58. Question: what the hell is going on with T-Mobile and their inconsistancies of containing breaches and lying about what they were going to do when they were granted the murge…
 
Originally released on August 11th, we found out that I put it up in download form but not RSS. Sorry about that!Welcome to the security box, podcast 56. Two comments will start us off as someone commented on the replay of our show from last week. Both are good comments worth bringing up. Next, we've got a topic that might be of interest talking ab…
 
It is 2nd part of the session on CIS Benchmarks and controls for Cloud. The Center for Internet Security is a nonprofit organization with the mission to 'identify, develop, validate, promote, and sustain best practice solutions for cyber defense.’ Experts and IT professionals from different governments, institutes, and businesses across the globe a…
 
Welcome to the security box, podcast 57. We have three topics for you today, and I hope that you will enjoy them. The first topic for this podcast will be talking about the name game of the ransomware gangs we have out there. The second topic which was totally forgotten is of course Windows Update and what is happening with that operating system. F…
 
The Center for Internet Security is a nonprofit organization with the mission to 'identify, develop, validate, promote, and sustain best practice solutions for cyber defense.’ Experts and IT professionals from different governments, institutes, and businesses across the globe are participating and finalizing the controls based on the consensus deci…
 
Welcome to the security box, podcast 55. On this edition of the podcast we've got two Sans News Bites headlines, topics including a very interesting story on someone named "PlugwalkJoe" I.E. Joseph O'Connor, a topic on a new ransomware gang called Black Matter, and we've also got several news items including one that isn't an article but intrigued …
 
A cloud migration strategy is a plan which any organization develops to move its systems and applications from on-premises architecture to the cloud. Not all applications and systems benefit from running on the cloud; that’s why you must indorse the most efficient way to work on it and migrate applications. Therefore, a systematic, documented strat…
 
Hello Everyone! Welcome to podcast 54 of the Security Box. On this edition of the program, learn about Windows 11, the latest Microsoft operating system and what scammers are doing to monitize even while this version is still in beta. Next, come with us and learn about the latest in the average ransomware payments as it looks like they are declinin…
 
Hello everyone, welcome to the security box, podcast 53. On this edition, we'll be talking about some of the things that articles talk about in regards to Windows Update that came out the week of July 16, 2021. Seems like we had good success with last week where we opened the phone lines for others to participate in an open forum, so we'll do that …
 
Welcome to the security box, podcast 52. On this podcast, let's talk about the water supply hacks and the growing threat of them through the help of an interesting article by Last Pass. After that, we'll see if people partook in an open forum of topics they want to talk about and of course news, notes and highlights from the landscape that have bee…
 
Hello folks, welcome to the security box, podcast 51. On this edition of the program, we continue with Phishlabs and their q1 Phishing and intellegence report talking about Top Level Domains and certificate abuse. Next, Michael in Tennessee sent me an article talking about one email which exposed hundreds of email addresses. We'll also have news an…
 
Implementing cloud or migration to cloud is challenging. Organizations that have built thousands of applications over the past two to three decades require re-architecting to run efficiently, securely, and resiliently in the cloud. Your next steps are to perform a cloud migration assessment based on your cloud strategy and business objectives. It w…
 
Welcome to the security box, podcast 50. On the big 50th episode, we've got quite a bit of news notes to cover this week. Besides that, we're continuing with Phishlabs and their ongoing rundown of the Q1 Intelligence Report, this time, talking about free tools and their abuse. We hope that users find this of interest like I did. Of course, the line…
 
Tech Talk on Cloud Security Posture Management with John Grange Detecting and preventing the misconfigurations and threats that lead to data breaches and compliance violations in your multi-cloud environments. For organizations embarking on a multi-cloud strategy, cloud security posture management (CSPM) helps them secure multiple cloud infrastruct…
 
Thank you Michael in Tennessee for being our guest throughout the program! We really appreciate it. Welcome to the Security Box, podcast 48. On this edition of the podcast, we've got two topics for you. The first is probably one you can file in the "I can't believe I read this crap" department, while the second deals with Windows Update and what we…
 
Welcome to the security box, podcast 47. On this podcast, we're going to talk about Security. A video which I found on Ted Talk's youtube channel will lead this discussion. We're also going to talk about an article from Lastpass talking about protecting your business from data breach trends. It talks about something we've talked about, supply chain…
 
The Anatomy of an attack has been around for quite awhile. I think its within the last couple of years, and I think it is quite important now more than ever. I talk about what has happened with our staple of the box, and how it was an inbound call that started it, but thats not traditionally the case. Listen to this hour long webinar and let's talk…
 
Workload migration to Cloud has become integral to IT optimization and driving business forward with the increased espousal of cloud technologies. Moving to the cloud enables firms to be more agile, remove inefficiencies and provide required customer, employee experiences. Migration of on-premise enterprise workload to the public cloud has reached …
 
Welcome to podcast 46 of the Security Box. On this podcast, Michael in Indiana is along with an update about a company we talked about in News Notes on podcast 39. We've got a topic dealing with a company that has been able to take advantage of the dark marketplace as they dominated this space very quietly since 2018. We've got a topic also on Rans…
 
How to deploy a server/instance on the newly released Arm Ampere AI compute shape in Oracle OCI. In this session, we will summarize what we have learned from the last seven sessions on the basics of OCI and you will see how those basics concepts are helping us create a new virtual machine. Two days back, Oracle has announced the release of Arm Base…
 
Topics: 4 vulnerabilities under attack give hackers full control of Android devices Ars Technica Conti ransomware gang victimized US health care, first-responder networks, FBI says Cyber Scoop Irish officials analyze decryption tool as long recovery process from ransomware continues Cyber Scoop News and notes from around the landscape How to Tell a…
 
In this session part 7, we will cover three topics: How to manage the virtual network interface cards (VNICs) in a virtual cloud network (VCN). How your instances are assigned private and public IP addresses, and the use of DNS within your cloud network. How to manage the Dynamic Host Configuration Protocol (DHCP) options in a virtual cloud network…
 
Welcome to the Security box, podcast 44. On this episode of the program, its time to make sure we're all caught up on Windows Update and what may be important to you. Next, we'll talk about a task force that hopes to disrupt ransomware payments. We're not done with Experian yet, and we'll have a things to ponder on this particular article I read ab…
 
In this session, how to secure your cloud network as part of the Networking service covers two virtual firewall features to control traffic at the packet level a-Network security groups b-Security lists and to configure VCN flow logs to get details about the traffic that passes through your VCN. It is part 6 of our series to learn the basics of the…
 
Welcome to the Security box, podcast 43. On this edition of the podcast, we've got two topics. The first talks about a fake vaccine web site that is now shut down, thanks to the US Government. The second topic talks about the Exim 21 bug that recently hit headlines. We'll have news, notes, your questions comments and any catch up from any older pod…
 
Loading …

מדריך עזר מהיר

זכויות יוצרים 2022 | מפת אתר | מדיניות פרטיות | תנאי השירות
Google login Twitter login Classic login