A brief daily summary of what is important in information security. The podcast is published every weekday and designed to get you ready for the day with a brief, usually 5 minutes long summary of current network security related events. The content is late breaking, educational and based on listener input as well as on input received by the SANS Internet Storm Center. You may submit questions and comments via our contact form at https://isc.sans.edu/contact.html .
…
continue reading
Through following this course, students will gain a basic understanding of the principles behind network security and the working of the main protocols, mechanisms and techniques in the area of security. The course consists of three parts: security mechanisms within network protocols, systems security and lab sessions. In the first part (security mechanisms within network protocols), the following topics will be discussed: IPSec, SSH, SSL, HTTPS and security for wireless networks. The second ...
…
continue reading
Welcome to the Security Weekly Podcast Network, your all-in-one source for the latest in cybersecurity! This feed features a diverse lineup of shows, including Application Security Weekly, Business Security Weekly, Paul's Security Weekly, Enterprise Security Weekly, and Security Weekly News. Whether you're a cybersecurity professional, business leader, or tech enthusiast, we cover all angles of the cybersecurity landscape. Tune in for in-depth panel discussions, expert guest interviews, and ...
…
continue reading
Welcome to the Security Weekly Podcast Network, your all-in-one source for the latest in cybersecurity! This feed features a diverse lineup of shows, including Application Security Weekly, Business Security Weekly, Paul's Security Weekly, Enterprise Security Weekly, and Security Weekly News. Whether you're a cybersecurity professional, business leader, or tech enthusiast, we cover all angles of the cybersecurity landscape. Tune in for in-depth panel discussions, expert guest interviews, and ...
…
continue reading
…
continue reading
An online network about educating, entertaining and encouraging your dance with Technology!
…
continue reading
1
Healthcare NOW Radio Podcast Network - Discussions on healthcare including technology, innovation, policy, data security, telehealth and more. Visit HealthcareNOWRadio.com
Healthcare NOW Radio and Podcast Network - Radio and Podcasts for the Healthcare Industry
RADIO FOR THE HEALTHCARE INDUSTRY Healthcare NOW Radio and Podcast Network offers discussions on the latest developments and trends impacting the industry including: health tech, health IT, healthcare innovation, healthcare policy, healthcare data security, telehealth, interoperability, biotech, med tech, value-based care, pharma, healthcare compliance, and much more. Shows are hosted by industry thought leaders. Guests are a "who's who" across the healthcare spectrum. The listening audience ...
…
continue reading
An online network about educating, entertaining and encouraging your dance with Technology!
…
continue reading
S2E15: What's Trending NOW is how behavioral science can play a pivotal role in improving healthcare outcomes.Host Shahid Shah is joined by Dr. Chandra Osborn, Chief Behavioral Officer at AdhereHealth, a company driving adherence and health equity outcomes that enhance the quality of care for members, while simultaneously boosting client financial …
…
continue reading
As we wrap up the year, we have an honest discussion about how important security really is to the business. We discuss some of Katie's predictions for AppSec in 2025, as well as "what sucks" in security! Show Notes: https://securityweekly.com/esw-388
…
continue reading
1
Dysentery, TP-Link, Piracy, Calendar Scams, Tencent, TikTok, Aaran Leyland and More.. - SWN #439
36:15
Dysentery, TP-Link, Piracy, Calendar Scams, Tencent, TikTok, Aaran Leyland, and More, on this edition of the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-439
…
continue reading
PPUnit and Androxgh0st; Session Smart Router Attack; FortiWLM Patch; BadBox Update; Beyond Trust Advisory PHPUnit and Androxgh0st https://isc.sans.edu/diary/Command%20Injection%20Exploit%20For%20PHPUnit%20before%204.8.28%20and%205.x%20before%205.6.3%20%5BGuest%20Diary%5D/31528 Mirai Attacks Session Smart Routers https://supportportal.juniper.net/s/…
…
continue reading
Host Justin Barnes records live at HLTH 2024 in Las Vegas. Stay tuned for the next few weeks to hear all his guests. This week tune in to hear David Bosnak, Founder & CEO of Attune Media Labs and Rich Scarfo, President at HLTH, Inc.To stream our Station live 24/7 visit www.HealthcareNOWRadio.com or ask your Smart Device to “….Play Healthcare NOW Ra…
…
continue reading
Hosts John Lynn and Colin Hung discuss 2024 Healthcare IT Year in Review.To stream our Station live 24/7 visit www.HealthcareNOWRadio.com or ask your Smart Device to “….Play Healthcare NOW Radio”.Find all of our network podcasts on your favorite podcast platforms and be sure to subscribe and like us. Learn more at www.healthcarenowradio.com/listen…
…
continue reading
In the enterprise security news, a final few fundings before the year closes out Arctic Wolf buys Cylance from Blackberry for cheap, a sentence that feels very weird to say the quiet HTTPS revolution passkeys are REALLY catching on resilience keeps showing up in the titles of news items Apple Intelligence insults the BBC’s intelligence MITRE ATT&CK…
…
continue reading
1
Dysentery, TP-Link, Piracy, Calendar Scams, Tencent, TikTok, Aaran Leyland and More.. - SWN #439
36:15
Dysentery, TP-Link, Piracy, Calendar Scams, Tencent, TikTok, Aaran Leyland, and More, on this edition of the Security Weekly News. Show Notes: https://securityweekly.com/swn-439
…
continue reading
Since D3FEND was founded to fill a gap created by the MITRE ATT&CK Matrix, it has come a long way. We discuss the details of the 1.0 release of D3FEND with Peter in this episode, along with some of the new tools they've built to go along with this milestone. To use MITRE's own words to describe the gap this project fills: "it is necessary that prac…
…
continue reading
1
D3FEND 1.0: A Milestone in Cyber Ontology - Peter Kaloroumakis - ESW #388
1:42:49
1:42:49
Riproduci in seguito
Riproduci in seguito
Liste
Like
Like aggiunto
1:42:49
Since D3FEND was founded to fill a gap created by the MITRE ATT&CK Matrix, it has come a long way. We discuss the details of the 1.0 release of D3FEND with Peter in this episode, along with some of the new tools they've built to go along with this milestone. To use MITRE's own words to describe the gap this project fills: "it is necessary that prac…
…
continue reading
S1E21: Meet Lisa Gallagher, National Security Advisor for CHIMEHost: Frank CutittaGuest: Lisa Gallagher To stream our Station live 24/7 visit www.HealthcareNOWRadio.com or ask your Smart Device to “….Play Healthcare NOW Radio”.Find all of our network podcasts on your favorite podcast platforms and be sure to subscribe and like us. Learn more at www…
…
continue reading
1
The Number One Threat - PSW #855
1:49:51
1:49:51
Riproduci in seguito
Riproduci in seguito
Liste
Like
Like aggiunto
1:49:51
XSS is the number one threat?, fix your bugs faster, hacking VoIP systems, AI and how it may help fuzzing, hacker gift guides, new DMA attacks, hacking InTune, Rhode Island gets hacked, OpenWrt supply chain issues, we are being spied on, Germans take down botnet, Bill and Larry are speaking at Shmoocon!, and TP-Link bans. Show Notes: https://securi…
…
continue reading
1
When Public Payphones Become Smart Phones - Inbar Raz - PSW #855
2:47:01
2:47:01
Riproduci in seguito
Riproduci in seguito
Liste
Like
Like aggiunto
2:47:01
If you've ever wondered how attackers could go after payphones that are "smart" we got you covered! Inbar has done some amazing research and is here to tell us all about it! Segment Resources: https://www.retro.unarmedsecurity.net/post/%D7%9E%D7%A1%D7%AA%D7%91%D7%A8-%D7%A9%D7%92%D7%9D-%D7%98%D7%9C%D7%A4%D7%95%D7%9F-%D7%A6%D7%99%D7%91%D7%95%D7%A8%D7…
…
continue reading
If you've ever wondered how attackers could go after payphones that are "smart" we got you covered! Inbar has done some amazing research and is here to tell us all about it! Segment Resources: https://www.retro.unarmedsecurity.net/post/%D7%9E%D7%A1%D7%AA%D7%91%D7%A8-%D7%A9%D7%92%D7%9D-%D7%98%D7%9C%D7%A4%D7%95%D7%9F-%D7%A6%D7%99%D7%91%D7%95%D7%A8%D7…
…
continue reading
TeamTNT Deep Diver; Complex RDP Attacks; Okta Social Engineering; TP-Link Ban A Deep Dive into TeamTNT and Spinning YARN https://isc.sans.edu/diary/%5BGuest%20Diary%5D%20A%20Deep%20Dive%20into%20TeamTNT%20and%20Spinning%20YARN/31530 Earth Koshchei Coopts Red Team Tools in Complex RDP Attacks https://www.trendmicro.com/en_us/research/24/l/earth-kosh…
…
continue reading
Employers need proven strategies to manage risks and control costs, but with hundreds of point solutions on the market, how do brokers know where to focus? In this episode, a leading benefits consultant shares the innovative solutions they're implementing, why these choices matter, and the pivotal role a trusted TPA plays in this process. Tune in t…
…
continue reading
Host Dr. Jay Anders invites back Micky Tripathi, PhD, MPP, the current Assistant Secretary for Technology Policy, National Coordinator for Health Information Technology, and Acting Chief Artificial Intelligence Officer for a look back and forward for the ONC.Find all of our network podcasts on your favorite podcast platforms and be sure to subscrib…
…
continue reading
Enhancing Patient-Centered Care: Strategies for InnovationDr. John Chelico, National Chief Medical Information Officer for CommonSpirit Health, says startups need to embrace humility and patience before setting out to “disrupt” the industry. That starts with having deeper conversations with health system leaders to better understand the challenges …
…
continue reading
1
Day in the Life of a CISO, as They Consider Personal Risks and New Defenses in 2025 - BSW #376
28:17
In the leadership and communications segment, CISOs need to consider the personal risks associated with their role, CISOs: Don’t rely solely on technical defences in 2025, The Questions Leaders Need to Be Asking Themselve, and more! Show Notes: https://securityweekly.com/bsw-376
…
continue reading
1
NAC is Back - How Network Access Control Can Protect Your Remote Devices and Data - Rob Allen - BSW #376
55:41
The local network is no more. Neither is the corporate firewall. Users are not only working from the office but also remotely, meaning the network we utilize has quickly become the internet, leaving devices and data vulnerable to cyber threats. But how do we monitor this new, expanded network? Rob Allen, Chief Product Officer at ThreatLocker, joins…
…
continue reading
1
NAC is Back - How Network Access Control Can Protect Your Remote Devices and Data - Rob Allen - BSW #376
27:32
The local network is no more. Neither is the corporate firewall. Users are not only working from the office but also remotely, meaning the network we utilize has quickly become the internet, leaving devices and data vulnerable to cyber threats. But how do we monitor this new, expanded network? Rob Allen, Chief Product Officer at ThreatLocker, joins…
…
continue reading
Python Installs Anydesk; Vishing, Teams and Anydesk; SS7 Attacks; CrushFTP Vuln; Python Delivering AnyDesk Client as RAT https://isc.sans.edu/diary/Python+Delivering+AnyDesk+Client+as+RAT/31524/ Vishing via Microsoft Teams Facilitates DarkGate Malware Intrusion https://www.trendmicro.com/en_us/research/24/l/darkgate-malware.html SS7 Attacks https:/…
…
continue reading
It’s the holiday season and as we say goodbye to 2024 and welcome in 2025, Carol Flagg talks with Beth Friedman, Senior Partner at global marketing and communications agency, FINN Partners. Beth joins the show to talk about her take on not wasting a single content asset. The two also discuss a couple of trends for 2025.To stream our Station live 24…
…
continue reading
Faster Cash Flow, Smarter Workflows with Claim Status AutomationDiscover how AI-driven automation is revolutionizing claims status management, saving time, reducing costs, and boosting productivity. Learn how Infinx’s innovative technology streamlines workflows, resolves denials faster, and delivers measurable improvements to your revenue cycle.Bro…
…
continue reading
Female Founder Spotlight - Revolutionizing Stroke Recovery: How Telehealth and Robotics are Transforming RehabilitationHost: Megan AntonelliGuest: Kristin NuckolsOn this episode they spotlight Kristin Nuckols, OTD, MOT, OTR, a pioneering female founder in digital health. As the Co-Founder and Chief Clinical Officer of Imago Rehab, Kristin shares he…
…
continue reading
1
Vogons, Task Scams, HiatusRat, Cellebrite, Deloitte, Quantum, Aaran Leyland, and More - SWN #438
40:02
Vogons, Task Scams, HiatusRat, Cellebrite, Deloitte, Quantum, WordPress, Aaran Leyland, and more on the Security Weekly News. Show Notes: https://securityweekly.com/swn-438
…
continue reading
1
Vogons, Task Scams, HiatusRat, Cellebrite, Deloitte, Quantum, Aaran Leyland, and More - SWN #438
40:02
Vogons, Task Scams, HiatusRat, Cellebrite, Deloitte, Quantum, WordPress, Aaran Leyland, and more on the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-438
…
continue reading
MUT-1244 Targeting Offensive Actors; Golang SSH Issue; Meeten Malware MUT-1244 Targeting Offensive Actors https://securitylabs.datadoghq.com/articles/mut-1244-targeting-offensive-actors/ Golang Crypto Vulnerability https://github.com/golang/crypto/commit/b4f1988a35dee11ec3e05d6bf3e90b695fbd8909 Meeten Malware: A Cross-Platform Threat to Crypto Wall…
…
continue reading
1
Applying Usability and Transparency to Security - Hannah Sutor - ASW #311
1:09:42
1:09:42
Riproduci in seguito
Riproduci in seguito
Liste
Like
Like aggiunto
1:09:42
Practices around identity and managing credentials have improved greatly since the days of infosec mandating 90-day password rotations. But those improvements didn't arise from a narrow security view. Hannah Sutor talks about the importance of balancing security with usability, the importance of engaging with users when determining defaults, and se…
…
continue reading
Curl's oldest bug yet, RCPs (and more!) from AWS re:Invent, possible controls for NPM's malware proliferation, insights and next steps on protecting top 500 packages from the Census III report, the flawed design choice that made Microsoft's OTP (successfully) brute-forceable, and more! 00:00 - Intro & Cyber Resilience Insights 01:20 - The 25-Year-O…
…
continue reading