The Iot Review julkinen
[search 0]
Lisää
Download the App!
show episodes
 
Artwork

1
The IOT Review

Industrial IOT Podcast by IrecaMedia

Unsubscribe
Unsubscribe
Kuukausittain
 
We live in an era where businesses are digitally disrupted almost on a daily basis. The Industrial Internet of Things (IoT) is a unique framework to enable businesses exploit the power of digital innovations and emerge as disruptors (and winners). The IOT Review is a podcast specifically designed to empower business decision makers and IT practitioners with highly relevant technology and strategic insights that's needed to integrate IoT in their business models... to gain in-depth know-how o ...
  continue reading
 
Artwork
 
Established IT Professionals focused on delivering technology-based content to growing IT and technology enthusiasts alike. Please support our page by clicking the link below: https://www.buymeacoffee.com/EstablishedLink Hosted on Acast. See acast.com/privacy for more information.
  continue reading
 
Artwork
 
Join hosts Adam Justice and Richard Gunther as they explore the smart home universe. The Smart Home Show features interviews with smart home leaders, analysis of the latest smart home news and the occasional Q and A and product review. All smart home, all the time.
  continue reading
 
Artwork

1
The A.I. Journey

Anchormen

Unsubscribe
Unsubscribe
Kuukausittain
 
Tune in to get inspired by the opportunities, impact and capabilities of Data, Machine Learning, and Artificial Intelligence. Join Anchormen’s CTO, Jeroen Vlek and Senior Data Scientist, Ron Dotsch, as they meet experts in the field and talk about developments, best practices, and lessons learned.
  continue reading
 
Artwork

1
The AppSec Insiders

Farshad Abasi

Unsubscribe
Unsubscribe
Kuukausittain
 
Welcome to The AppSec Insiders Podcast. This is a show where we discuss the hottest topics and latest trends in application and cloud security, and tell you what you need to know For those who don’t know who we are, we are all software developers, white-hat hackers, and code security experts. When we’re not recording the podcast, we help organizations of all sizes with their cybersecurity needs. If you’re an AppSec professional looking for an opportunity to work with some of the best in the ...
  continue reading
 
Artwork

1
Emerging Cyber Risk

Max Aulakh & Joel Yonts

Unsubscribe
Unsubscribe
Kuukausittain
 
Thought leaders and experts Max Aulakh (Ignyte) and Joel Yonts (Secure Robotics) cover subjects such as the development of AI, cyber security and the how the future looks in terms of cyber risk.
  continue reading
 
Artwork

1
The Cipher Podcast

Bill Bowman and others

Unsubscribe
Unsubscribe
Kuukausittain
 
We created this podcast series to discuss the latest information on cybersecurity. Listen to Cipher's leading experts review the cybersecurity news, trends, and challenges. The Cipher Podcast has a global cybersecurity perspective, with special guests from the United States, Brazil, Spain and Portugal. Select topics are covered in English and Portuguese.
  continue reading
 
Artwork

1
Cloudera Podcasts

Cloudera

Unsubscribe
Unsubscribe
Kuukausittain
 
At Cloudera, we believe data can make the impossible possible. The world’s leading organizations choose Cloudera to transform their businesses, improve lives, and advance human achievement. All through the power of data.
  continue reading
 
Artwork

1
4.0 Solutions Podcast

Walker Reynolds

Unsubscribe
Unsubscribe
Kuukausittain
 
Walker Reynolds & Zack Scriven share knowledge and insights on Industry 4.0, IIoT, and Digital Transformation in this podcast from 4.0 Solutions. Support this podcast by checking out our Free / Paid courses at https://www.iiot.university
  continue reading
 
The Engineering Quality Control Podcast (“TEQC”), published by the Engineering Management Institute, is a podcast focused on helping engineering professionals ensure their projects are of the highest quality. The show will be hosted by Brian Wagner, P.E. and provides strategies and concepts to help ensure you address quality control on your projects. We dive into quality control topics with professionals in the world of engineering and will interview guests on quality control practices, samp ...
  continue reading
 
Artwork

1
Hydraulic Valve Dialogue

Parker Hydraulic Valve Division

Unsubscribe
Unsubscribe
Kuukausittain
 
With the wide product breadth Parker Hannifin has to offer, wrapping your head around everything motion systems and controls can be daunting. Join two of Parker's engineers, Brian Baranek and Mitch Eichler, as they try to de-mystify everything hydraulic valves and their applications. Tune in as they review products, discuss applications, interview market experts, unveil division programs and showcase Parker promotions and partners. If you are looking for a reliable source for hydraulic valve ...
  continue reading
 
Artwork
 
Welcome to the Security Weekly Podcast Network, your all-in-one source for the latest in cybersecurity! This feed features a diverse lineup of shows, including Application Security Weekly, Business Security Weekly, Paul's Security Weekly, Enterprise Security Weekly, and Security Weekly News. Whether you're a cybersecurity professional, business leader, or tech enthusiast, we cover all angles of the cybersecurity landscape. Tune in for in-depth panel discussions, expert guest interviews, and ...
  continue reading
 
Artwork

1
Threat Talks

Kevin Golas & Jay Grant

Unsubscribe
Unsubscribe
Kuukausittain
 
Threat talks is a thought leadership discussion about everything cyber security. We have industry experts talking about current and future threats in the cyber industry. Host: Kevin Golas | Jay Grant | Fabian Franco Send us suggestions for topics and feedback to: E:Mail: threattalks@gmail.com
  continue reading
 
Loading …
show series
 
Zed Attack Proxy has been a crucial web app testing tool for decades. It's also had a struggle throughout 2024 to obtain funding that would enable the tool to add more features while remaining true to its open source history. Simon Bennetts, founder of ZAP, and Ori Bendet from Checkmarx update us on that journey, share some exploration of LLM fuzzi…
  continue reading
 
Does the CISO need to act like a politician? Negotiating budgets, communicating risks, and selling your strategy across the organization does sound a little like a politician. And if that's the case, are you hiring the right campaign staff? Kush Sharma, former CISO for CPR, City of Toronto, and Saputo, joins Business Security Weekly to discuss why …
  continue reading
 
Perfctl, Warm Cookie, Pig Butchering, Ivanti, Zimbra, BabyLockerKZ, AI gone Wild, Aaran Leyland, and More, on this edition of the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-419
  continue reading
 
Segment description coming soon! Segment Resources: - https://www.huntress.com/blog/the-hackers-in-the-arena-the-huntress-ctf-retrospective - https://www.huntress.com/blog/fake-browser-updates-lead-to-boinc-volunteer-computing-software Automated tank gauges are leaking more than just fuel, while CUPS is serving up a steaming hot brew of vulnerabili…
  continue reading
 
Our latest in a series of interviews discussing cybersecurity career paths, today we talk to Jayson Grace his path into cybersecurity and his experience building red teams at national labs and purple teams at Meta. We also talk about his community impact, giving talks and building open source tools. Jayson just left Meta for an AI safety startup na…
  continue reading
 
More remote car control via web interfaces, an RCE in CUPS, Microsoft reduces attack surface, migrating to memory safety, dealing with dependency confusion, getting rid of password strength calculators, and more! Visit https://www.securityweekly.com/asw for all the latest episodes! Show Notes: https://securityweekly.com/asw-301…
  continue reading
 
The zero-trust security model has been billed as an ultra-safe defense against emerging, unrecognized and well-known threats. Unlike perimeter security, it doesn't assume people inside an organization are automatically safe. Instead, it requires every user and device -- inside and out -- to be authorized before any access is granted. Sounds enticin…
  continue reading
 
Passwords, CUPS, KIA, Gilbert Gottfried, Salt Typhoon, Rob Allen from ThreatLocker, and More on the Security Weekly News. Segment Resources: https://www.bleepingcomputer.com/news/security/hackers-deploy-ai-written-malware-in-targeted-attacks/ This segment is sponsored by ThreatLocker. Visit https://securityweekly.com/threatlocker to learn more abou…
  continue reading
 
The SIEM market has undergone some significant changes this summer. This is a great opportunity to talk about the current state of SIEM! In this conversation, we'll discuss: market changes and terminology: security analytics, data lakes, SIEM what is SOAR's role in the current SIEM market? machine learning and generative AI's role strategies for im…
  continue reading
 
This week in the security news, Dr. Doug and Larry explore various technological advancements and their implications with a healthy dose of nostalgia, particularly focusing on health monitoring through Wi-Fi signals, the misconceptions surrounding 5G connectivity, the importance of understanding internet speed needs, and the cybersecurity threats f…
  continue reading
 
Revolutionizing International Calling: A Chat with Pete Pattullo In this episode of the Boon of Wireless podcast, host Jon Horovitz speaks with Pete Pattullo, co-founder and CEO of Network IP, about the evolution of international calling. Pete shares his 45+ years of experience in the telecommunications industry, discussing the transition from trad…
  continue reading
 
APIs are essential to modern application architectures, driving rapid development, seamless integration, and improved user experiences. However, their widespread use has made them prime targets for attackers, especially those deploying sophisticated bots. When these bots exploit business logic, they can cause considerable financial and reputational…
  continue reading
 
In the leadership and communications segment, CISA Releases Cyber Defense Alignment Plan for Federal Agencies, UnitedHealth Group CISO: We had to ‘start over’ after Change Healthcare attack, 20 Essential Strategies for Leadership Development Success, and more! AI is bringing productivity gains like we’ve never seen before -- with users, security te…
  continue reading
 
A month ago, my friend Wolfgang Goerlich posted a hot take on LinkedIn that is less and less of a hot take these days. He posted, "our industry needs to kill the phish test",and I knew we needed to have a chat, ideally captured here on the podcast. I've been on the fence when it comes to phishing simulation, partly because I used to phish people as…
  continue reading
 
Apple drops a lawsuit to avoid exposing secrets, what does it mean for the security industry if MS locks down the kernel?, exploding pagers, more things from the past: Adobe Flash exploits, robots get rid of your data, PKFail is still a thing, Android TV malware is back: now with conspiracy theories, DMA attacks, gamers are not nation-state attacke…
  continue reading
 
Adam checks in with Richard about his smart home acquisitions from the past year, including new lighting solutions from Inovelli and Legrand, a smart outlet from Leviton, and the Nest Learning Thermostat v4. They also discuss the Mill Food Recycler, which turns food scraps into something resembling coffee grounds. Those grounds can then be composte…
  continue reading
 
When a conference positioned as a day of security for developers has to be canceled due to lack of interest from developers, it's important to understand why there was so little interest and why appsec should reconsider its approach to awareness. Dustin Lehr discusses how appsec can better engage and better deliver security concepts in a way that m…
  continue reading
 
Back to the office serfs, Void Banshee, ServiceNow, Taiwan, Dlink, C++, Aaran Leyland, and more on this Edition of the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-414
  continue reading
 
Cybersecurity is complex. We have threats, vulnerabilities, incidents, controls, risks, etc. But how do they all connect together to drive a cyber risk program? As an industry, we've struggled for 20+ years trying to boil this ocean. Maybe we've been going about it the wrong way. Padraic O'Reilly, Founder and Chief Innovation Officer at CyberSaint,…
  continue reading
 
Through the Fire and Li-On Flames, Lazarus, Whatsup, Scattered Spider, Hadooken, Dead People, Aaran Leyland, and More on the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-413
  continue reading
 
This week, in the enterprise security news, Cribl, Zafran, and US states raise funding Cisco, Check Point, Salesforce, and Absolute Software acquire cybersecurity startups AI Security products are picking up steam You probably shouldn’t be too worried about Yubikey cloning Instead, you should be more worried about malicious npm packages! The White …
  continue reading
 
Lee comes on the show to discuss: EU CRA - https://en.wikipedia.org/wiki/CyberResilienceAct - its impact on bringing products to market and the challenges of enforcing such laws that require products to be "Secure" Recent legislation on disputes for federal agency fines - Chevron deference rule - supreme court decision, uncertainty, more or less cl…
  continue reading
 
🌐 The Future of Payments with Rob Gatto, Chief Revenue Officer at Paysafe Join host Jon Horovitz on "The Boon of Wireless Podcast" as he sits down with Rob Gatto, Chief Revenue Officer at Paysafe, to explore the forefront of payment technology. In this episode, they delve into Paysafe’s role in revolutionizing payment solutions, the evolving dynami…
  continue reading
 
Cybersecurity resilience, different from cyber resilience, is critical as threats grow in frequency and complexity. With digital innovation driving business, cybersecurity resilience is essential for maintaining stakeholder trust and compliance. But where do you start? Theresa Lanowitz, Chief Evangelist at LevelBlue, joins Business Security Weekly …
  continue reading
 
Check out this episode from the ESW Vault, hand picked by main host Adrian Sanabria! This episode was initially published on April 21 2023. Quantum computers are scaling rapidly. Soon, they will be powerful enough to solve previously unsolvable problems. But they come with a global challenge: fully-realized quantum computers will be able to break s…
  continue reading
 
Exploring the Hacking Landscape with Mark Loveless, AKA SimpleNomad Dive into the intricate world of cybersecurity with our featured guest, Mark Loveless, widely known by his handle SimpleNomad. With a rich history in the realm of information security, Mark is a seasoned professional, researcher, and thought leader. Mark's journey spans decades, ma…
  continue reading
 
Join Jon Horovitz, founder and president of Atrium Unlimited Consulting, as he brings "The Boon of Wireless" podcast directly from the lively atmosphere of the All Wireless and Prepaid Expo in Las Vegas. Dive into this special episode packed with a series of dynamic interviews and insightful conversations conducted live from the expo floor. 🚀📱 Witn…
  continue reading
 
Check out this episode from the BSW Vault, hand picked by main host Matt Alderman! This episode was initially published on November 29, 2022. Todd Fitzgerald, author of CISO Compass and host of CISO Stories, joins BSW to share his top leadership lessons from the first 100 episodes of CISO Stories. Todd interviews CISOs and gains insights into their…
  continue reading
 
Check out this interview from the ASW Vault, hand picked by main host Mike Shema! This segment was originally published on May 9, 2023. What does software resilience mean? Why is status quo application security unfit for the modern era of software? How can we move from security theater to security chaos engineering? This segment answers these quest…
  continue reading
 
Larry and Helen walk us through the AI supply chain landscape. Learn what goes into building and using AI models and the dangers that could lurk within. Segment Resources: Community efforts on AIBOM topic: https://github.com/aibom-squad This week: I want all the firmware, its not just TP-Link, CVEs for malware, BLE and your health, faking your own …
  continue reading
 
The top priority on the CIS Critical Security Controls list has never changed: inventory and control of enterprise assets. Yet it remains one of the most challenging controls to implement, much less master. The refrain, "you can't secure what you don't know about" is as old as information security itself. Complicating this task is the fact that imp…
  continue reading
 
MGs, Free Speech, sedexp, Cthulhu, SeaTac, GrimResource, ServiceBridge, the FBI, Josh Marpet, and more, on this Edition of the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-410
  continue reading
 
IoT devices are notorious for weak designs, insecure implementations, and a lifecycle that mostly ignores patching. We look at external factors that might lead to change, like the FCC's cybersecurity labeling for IoT. We explore the constraints that often influence poor security on these devices, whether those constraints are as consequential given…
  continue reading
 
How are personal liability and indemnification impacting the CISO role? Darren Shou, Chief Strategy Officer from RSA Conference, describes the current landscape of CISO liability and the challenges facing CISOs today. He discusses the implications of the SEC's recent actions, including the charges against SolarWinds' CISO, and the growing trend of …
  continue reading
 
This week, in the enterprise security news, A funding that looks like an acquisition And two for-sure acquisitions Rumors that there are funding problems for early stage cyber startups, and we’ll see a lot more acquisitions before the end of the year Speaking of rumors, Crowdstrike did NOT like last week’s Action1 acquisition rumor! Shortening dete…
  continue reading
 
Every week here on the show we talk about vulnerabilities and exploits. Typically we recommend that organizations remediate these vulnerabilities in some way. But how? And more importantly, which ones? Some tools we have to help us are actually not all that helpful at time, such as: Mitre Att&ck - Don't get me wrong, this is a great project and Ada…
  continue reading
 
**🚀 Revolutionizing Health Monitoring with VMed: Live Demo with Pat O'Brien** Join host Jon Horovitz on "The Boon of Wireless" podcast as we delve into the frontier of health technology with serial entrepreneur Pat O'Brien from Ensurety Ventures. In this episode, Pat introduces VMed Mobile, an innovative mobile biometric device that's transforming …
  continue reading
 
This week, Jeff Pollard and Allie Mellen join us to discuss the fallout and lessons learned from the CrowdStrike fiasco. They explore the reasons behind running in the kernel, the challenges of software quality, and the distinction between a security incident and an IT incident. They also touch on the need to reduce the attack surface and the impor…
  continue reading
 
Loading …

Pikakäyttöopas