Network Security สาธารณะ
[search 0]
เพิ่มเติม
ดาวน์โหลดแอปเลย!
show episodes
 
A brief daily summary of what is important in information security. The podcast is published every weekday and designed to get you ready for the day with a brief, usually 5 minutes long summary of current network security related events. The content is late breaking, educational and based on listener input as well as on input received by the SANS Internet Storm Center. You may submit questions and comments via our contact form at https://isc.sans.edu/contact.html .
  continue reading
 
Artwork

1
Network Security

University of Twente

icon
Unsubscribe
icon
icon
Unsubscribe
icon
รายเดือน
 
Through following this course, students will gain a basic understanding of the principles behind network security and the working of the main protocols, mechanisms and techniques in the area of security. The course consists of three parts: security mechanisms within network protocols, systems security and lab sessions. In the first part (security mechanisms within network protocols), the following topics will be discussed: IPSec, SSH, SSL, HTTPS and security for wireless networks. The second ...
  continue reading
 
Artwork

1
Security Weekly Podcast Network (Audio)

Security Weekly Productions

icon
Unsubscribe
icon
icon
Unsubscribe
icon
รายวัน
 
Welcome to the Security Weekly Podcast Network, your all-in-one source for the latest in cybersecurity! This feed features a diverse lineup of shows, including Application Security Weekly, Business Security Weekly, Paul's Security Weekly, Enterprise Security Weekly, and Security Weekly News. Whether you're a cybersecurity professional, business leader, or tech enthusiast, we cover all angles of the cybersecurity landscape. Tune in for in-depth panel discussions, expert guest interviews, and ...
  continue reading
 
Artwork

1
Security Weekly Podcast Network (Video)

Security Weekly

icon
Unsubscribe
icon
icon
Unsubscribe
icon
รายวัน
 
Welcome to the Security Weekly Podcast Network, your all-in-one source for the latest in cybersecurity! This feed features a diverse lineup of shows, including Application Security Weekly, Business Security Weekly, Paul's Security Weekly, Enterprise Security Weekly, and Security Weekly News. Whether you're a cybersecurity professional, business leader, or tech enthusiast, we cover all angles of the cybersecurity landscape. Tune in for in-depth panel discussions, expert guest interviews, and ...
  continue reading
 
Artwork

1
Defence & Security Podcast Network

Momentum Media

icon
Unsubscribe
icon
icon
Unsubscribe
icon
รายสัปดาห์+
 
The Defence & Security Podcast Network hosts a unique series of podcasts, featuring discussions with key enablers from across the Australian defence and security industry. The podcasts provide the perfect blend of business intelligence and insights from a range of guests, which include government officials, ADF personnel, industry stakeholders, and members of the academic community. By aligning ourselves with the ADF and the Commonwealth government, we are uniquely placed to deliver a dynami ...
  continue reading
 
RADIO FOR THE HEALTHCARE INDUSTRY Healthcare NOW Radio and Podcast Network offers discussions on the latest developments and trends impacting the industry including: health tech, health IT, healthcare innovation, healthcare policy, healthcare data security, telehealth, interoperability, biotech, med tech, value-based care, pharma, healthcare compliance, and much more. Shows are hosted by industry thought leaders. Guests are a "who's who" across the healthcare spectrum. The listening audience ...
  continue reading
 
Loading …
show series
 
The Afterlife, AWS, ClickFix, Agentic AI Galore, Robot Lumberjacks, Robocalls, Aaran Leyland, and more on the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-522 This segment is sponsored by ThreatLocker. Visit https://securityweekly.com/threatlocker to learn mor…
  continue reading
 
Ransomware attacks typically don't care about memory safety and dependency scanning, they often target old, unpatched vulns and too often they succeed. Rob Allen shares some of the biggest cases he's seen, what they have in common, and what appsec teams could do better to help them. Too much software still requires custom configuration to make it m…
  continue reading
 
In this episode of the Defence Connect Spotlight podcast, host Steve Kuper is joined by Tony Rogers, Brian Weinstein and Scott Keane of Stantec to discuss the role and importance of naval infrastructure to modern navies. The group discuss a range of subjects including: The global pressures being felt by contemporary Western naval infrastructure and…
  continue reading
 
SANS Stormcast Tuesday, October 21st, 2025: Syscall() Obfuscation; AWS down; Beijing Time Attack Using Syscall() for Obfuscation/Fileless Activity Fileless malware written in Python can uses syscall() to create file descriptors in memory, evading signatures. https://isc.sans.edu/diary/Using%20Syscall%28%29%20for%20Obfuscation%20Fileless%20Activity/…
  continue reading
 
Segment 1: David Brauchler on AI attacks and stopping them David Brauchler says AI red teaming has proven that eliminating prompt injection is a lost cause. And many developers inadvertently introduce serious threat vectors into their applications – risks they must later eliminate before they become ingrained across application stacks. NCC Group’s …
  continue reading
 
AI-First Marketing at ScaleOn this episode host Adam Turinas talks to Nick Panayi, CMO of Inovalon, to explore one of the most comprehensive AI adoption stories I’ve encountered in healthcare technology marketing.Find all of our network podcasts on your favorite podcast platforms and be sure to subscribe and like us. Learn more at www.healthcarenow…
  continue reading
 
Ransomware attacks typically don't care about memory safety and dependency scanning, they often target old, unpatched vulns and too often they succeed. Rob Allen shares some of the biggest cases he's seen, what they have in common, and what appsec teams could do better to help them. Too much software still requires custom configuration to make it m…
  continue reading
 
Segment 1: David Brauchler on AI attacks and stopping them David Brauchler says AI red teaming has proven that eliminating prompt injection is a lost cause. And many developers inadvertently introduce serious threat vectors into their applications – risks they must later eliminate before they become ingrained across application stacks. NCC Group’s …
  continue reading
 
In this episode of the Cyber Uncut podcast, Daniel Croft and David Hollingworth touch on the latest in AI and how state governments are regulating its use, the Qantas leak and the 5 million people impacted, and we chat about major cyber attacks with SolarWinds CISO Tim Brown. Croft and Hollingworth begin by discussing the fight that CBA has ignited…
  continue reading
 
SANS Stormcast Monday, October 20th, 2025: Malicious Tiktok; More Google Ad Problems; Satellite Insecurity TikTok Videos Promoting Malware InstallationTikTok Videos Promoting Malware Installation Tiktok videos advertising ways to obtain software like Photoshop for free will instead trick users into downloading https://isc.sans.edu/diary/TikTok%20Vi…
  continue reading
 
Host Jim Tate welcomes Louis Hyman for a conversation on AI in Healthcare. Louis has played a significant role in numerous health information technology firms serving in roles such as President, CEO Chief Technology Officer, and Senior Director of Engineering. He has been around the block more than a few time and now provides consulting services to…
  continue reading
 
S1E2: Landing Healthcare AI Without a CrashHost Tamer Baker invites Chad Tetreault, Field CTO at Zscaler and former DHS Deputy CTO to explore AI in healthcare and governance challenges while cutting through the hype. From practical applications of AI in healthcare, addressing trust, governance, and cutting-edge use cases, this episode has it all.To…
  continue reading
 
Episode 138 -Value-Based Care in Action: CMS’s GUIDE Model for Caregiver Support As CMS continues to expand value-based care programs, one stands out for its focus on supporting some of our most vulnerable patients—and their caregivers. The GUIDE model (Guiding an Improved Dementia Experience) is designed to improve care for individuals with dement…
  continue reading
 
Host Gil Bashe sits with colleague Ritesh Patel a healthcare marketing and growth executive, innovator, and advisor active at the intersection of health, technology, and go-to-market strategy. Ritesh is Chief Growth Officer at Doceree, where he leads global growth and innovation for point-of-care engagement platforms. With a career spanning senior …
  continue reading
 
S1E1: Hosts Tamer Baker and Steve Hajny introduce themselves and discuss what the show is about.Find all of our network podcasts on your favorite podcast platforms and be sure to subscribe and like us. Learn more at www.healthcarenowradio.com/listen/โดย Healthcare NOW Radio and Podcast Network - Radio and Podcasts for the Healthcare Industry
  continue reading
 
Erotic Chats, UEFI, F5, Cisco, Doug Sings, Insiders, Lastpass, Sora, Aaran Leyland, and More on this edition of the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-521
  continue reading
 
Erotic Chats, UEFI, F5, Cisco, Doug Sings, Insiders, Lastpass, Sora, Aaran Leyland, and More on this edition of the Security Weekly News. Show Notes: https://securityweekly.com/swn-521
  continue reading
 
SANS Stormcast Friday, October 17th, 2025: New Slack Workspace; Cisco SNMP Exploited; BIOS Backdoor; @sans_edu reseach: Active Defense New DShield Support Slack Workspace Due to an error on Salesforce’s side, we had to create a new Slack Workspace for DShield support. https://isc.sans.edu/diary/New%20DShield%20Support%20Slack/32376 Attackers Exploi…
  continue reading
 
Host Justin Barnes records live at GAHIMSS in Atlanta. Stay tuned for the next few weeks to hear all his guests. On this episode Justin talks to Beth Friedman, Senior Partner at FINN Partners and host of FINN Voices and Hal Wolf, President & CEO of HIMSS.To stream our Station live 24/7 visit www.HealthcareNOWRadio.com or ask your Smart Device to “……
  continue reading
 
This is the final episode focused on emerging psychedelics in therapeutic and sacred ceremonial settings on PopHealth Week with guest host, Jim Tate and executive producer Gregg Anthony Masters, MPH. On this episode Daniel McQueen discusses his journey from underground guide to regulated access work in Colorado, his experiments extending DMT experi…
  continue reading
 
Host Matt Fisher talks to Ann Bilyew, President WebMD Ignite, about assessment of traditional patient engagement and education approaches; need to earn right to get attention; need for personalization through individualized understanding; structure of more engaging communication; importance of context for engagement; how to leverage existing tools …
  continue reading
 
From Pilot to Platform - How Sutter Health is Scaling AI Across 3.5 Million LivesJoin us for a conversation with Dr. Ashley Beecy, Chief AI Officer at Sutter Health, as she shares their journey from targeted AI pilots to enterprise-wide transformation across one of California's largest integrated health systems. We'll explore Sutter's innovative di…
  continue reading
 
First up is a technical segment on UEFI shells: determining if they contain dangerous functionality that allows attackers to bypass Secure Boot. Then in the security news: Your vulnerability scanner is your weakest link Scams that almost got me The state of EDR is not good You don't need to do that on a phone or Raspberry PI Hash cracking and explo…
  continue reading
 
First up is a technical segment on UEFI shells: determining if they contain dangerous functionality that allows attackers to bypass Secure Boot. Then in the security news: Your vulnerability scanner is your weakest link Scams that almost got me The state of EDR is not good You don't need to do that on a phone or Raspberry PI Hash cracking and explo…
  continue reading
 
In this episode of the Defence Connect Podcast, host Steve Kuper is joined by Mike Pezzullo, former secretary of the Department of Home Affairs, and Ross Babbage, CEO of Strategic Forum and a Non-Resident Senior Fellow of the Center for Strategic and Budgetary Assessments, to discuss Australia’s role and challenges in the deteriorating global order…
  continue reading
 
SANS Stormcast Thursday, October 16th, 2025: Clipboard Image Stealer; F5 Compromise; Adobe Updates; SAP Patchday Clipboard Image Stealer Xavier presents an infostealer in Python that steals images from the clipboard. https://isc.sans.edu/diary/Clipboard%20Pictures%20Exfiltration%20in%20Python%20Infostealer/32372 F5 Compromise F5 announced a wide-ra…
  continue reading
 
Still managing compliance in a spreadsheet? Don't have enough time or resources to verify your control or risk posture? And you wonder why you can't get the budget to move your compliance and risk programs forward. Maybe it's time for a different approach. Trevor Horwitz, Founder and CISO at TrustNet joins Business Security Weekly to discuss how th…
  continue reading
 
Still managing compliance in a spreadsheet? Don't have enough time or resources to verify your control or risk posture? And you wonder why you can't get the budget to move your compliance and risk programs forward. Maybe it's time for a different approach. Trevor Horwitz, Founder and CISO at TrustNet joins Business Security Weekly to discuss how th…
  continue reading
 
Imagine being part of a group that no one ever wants to join – a community born from loss, but one that becomes a lifeline. On this episode of The Progress Report, running in time for War Widows Day on 19th October, Tash Taylor sits down with war widows Jenny Ware, Lynne Boyd and Wendy McKean, who have turned grief into friendship, laughter, and re…
  continue reading
 
SANS Stormcast Wednesday, October 15th, 2025: Microsoft Patchday; Ivanti Advisory; Fortinet Patches Microsoft Patch Tuesday Microsoft not only released new patches, but also the last patches for Windows 10, Office 2016, Office 2019, Exchange 2016 and Exchange 2019. https://isc.sans.edu/diary/Microsoft%20Patch%20Tuesday%20October%202025/32368 Ivanti…
  continue reading
 
Bikers, Apple, Storm-657, Astaroth, EES, Salesforce, Aaran Leyland, and more on the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-520
  continue reading
 
Interest and participation in the OWASP GenAI Security Project has exploded over the last two years. Steve Wilson explains why it was important for the project to grow beyond just a Top Ten list and address more audiences than just developers. He also talks about how the growth of AI Agents influences the areas that appsec teams need to focus on. W…
  continue reading
 
Interest and participation in the OWASP GenAI Security Project has exploded over the last two years. Steve Wilson explains why it was important for the project to grow beyond just a Top Ten list and address more audiences than just developers. He also talks about how the growth of AI Agents influences the areas that appsec teams need to focus on. W…
  continue reading
 
In this episode of the Defence Connect Spotlight podcast, host Steve Kuper sits down with Tim Grabert and Chris White to discuss the increasing importance of Australia’s test and evaluation capabilities. The trio discuss the importance of contemporary test and evaluation (T&E) capabilities as outlined in the government’s 2023 Defence Industry Devel…
  continue reading
 
Ensuring Quality and Compliance in AI CodingExplore how today’s AI-powered coding solutions are designed with compliance and quality at their core. This episode will highlight the safeguards built into implementation, the auditing processes that protect accuracy, and how continuous improvement ensures models evolve over time. Join us to learn how o…
  continue reading
 
SANS Stormcast Tuesday, October 14th, 2025: ESAFENET Scans; Payroll Priates; MSFT Edge IE Mode Scans for ESAFENET CDG V5 We do see some increase in scans for the Chinese secure document management system, ESAFENET. https://isc.sans.edu/diary/Heads%20Up%3A%20Scans%20for%20ESAFENET%20CDG%20V5%20/32364 Investigating targeted “payroll pirate” attacks a…
  continue reading
 
Segment 1 - Interview with Dr. Anand Singh We're always thrilled to have authors join us to discuss their new book releases, and this week, it is Dr. Anand Singh. He seriously hustled to get his new book, Data Security in the Age of AI, out as soon as possible so that it could help folks dealing with securing AI rollouts right now! We'll discuss wh…
  continue reading
 
Loading …

คู่มืออ้างอิงด่วน

ฟังรายการนี้ในขณะที่คุณสำรวจ
เล่น