Network Security julkinen
[search 0]
Lisää
Download the App!
show episodes
 
A brief daily summary of what is important in information security. The podcast is published every weekday and designed to get you ready for the day with a brief, usually 5 minutes long summary of current network security related events. The content is late breaking, educational and based on listener input as well as on input received by the SANS Internet Storm Center. You may submit questions and comments via our contact form at https://isc.sans.edu/contact.html .
  continue reading
 
Artwork

1
Network Security

University of Twente

Unsubscribe
Unsubscribe
Kuukausittain
 
Through following this course, students will gain a basic understanding of the principles behind network security and the working of the main protocols, mechanisms and techniques in the area of security. The course consists of three parts: security mechanisms within network protocols, systems security and lab sessions. In the first part (security mechanisms within network protocols), the following topics will be discussed: IPSec, SSH, SSL, HTTPS and security for wireless networks. The second ...
  continue reading
 
RADIO FOR THE HEALTHCARE INDUSTRY Healthcare NOW Radio and Podcast Network offers discussions on the latest developments and trends impacting the industry including: health tech, health IT, healthcare innovation, healthcare policy, healthcare data security, telehealth, interoperability, biotech, med tech, value-based care, pharma, healthcare compliance, and much more. Shows are hosted by industry thought leaders. Guests are a "who's who" across the healthcare spectrum. The listening audience ...
  continue reading
 
Loading …
show series
 
The Security Weekly crew discusses some of the latest articles and research in cryptography and some background relevant subtopics including the race against quantum computing, key management, creating your own crypto, selecting the right crypto and more! https://www.globalsecuritymag.com/keysight-introduces-testing-capabilities-to-strengthen-post-…
  continue reading
 
Developing Leaders Through Schools of Experience, Pt. 1The theory of Schools of Experience highlights that one is not born a leader, but rather a leader’s abilities are developed through their work and life experiences. Join Dr. Jean Wright and host Ann Somers Hogg as they discuss lessons from Jean’s Schools of Experience, including her current rol…
  continue reading
 
Linux Trojan; Denial of Wallet Attack; EU iOS Appstore User Tracking; BentoML Vuln; Linux Trojan - Xorddos with Filename eyshcjdmzg https://isc.sans.edu/diary/Linux%20Trojan%20-%20Xorddos%20with%20Filename%20eyshcjdmzg/30880 AWS S3 Denial of Wallet Amplification Attack https://medium.com/@maciej.pocwierz/how-an-empty-s3-bucket-can-make-your-aws-bil…
  continue reading
 
AI, Okta, Chrome, Quantum, Kaiser Permanente, FTC, FCC, NCSC, Josh Marpet, and more, are on this edition of the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-382
  continue reading
 
Zyxel NAS Attacks; R Vulnerability; Malicious Containers; NVMe-oF/TCP Vulns; Another Day, Another NAS: Attacks against Zyxel NAS326 Devices CVE-2023-4473, CVE-2023-4474 https://isc.sans.edu/diary/Another%20Day%2C%20Another%20NAS%3A%20Attacks%20against%20Zyxel%20NAS326%20devices%20CVE-2023-4473%2C%20CVE-2023-4474/30884 R-Bitrary Code Execution: Vuln…
  continue reading
 
Host: Megan AntonelliGuests: Wesley Barker & Ben RosnerIn this engaging discussion, they delve into the findings of a national survey conducted by Dr. Rosner and his team, exploring the experiences of digital health companies integrating their tools with Electronic Health Records (EHRs). Driven by the increasing importance of interoperability in he…
  continue reading
 
Companies deploy tools (usually lots of tools) to address different threats to supply chain security. Melinda Marks shares some of the chaos those companies still face when trying to prioritize investments, measure risk, and scale their solutions to keep pace with their development. Not only are companies still figuring out supply chain, but now th…
  continue reading
 
Companies deploy tools (usually lots of tools) to address different threats to supply chain security. Melinda Marks shares some of the chaos those companies still face when trying to prioritize investments, measure risk, and scale their solutions to keep pace with their development. Not only are companies still figuring out supply chain, but now th…
  continue reading
 
In the leadership and communications section, The Board's Pivotal Role in Steering Cybersecurity, CISO-CEO communication gaps continue to undermine cybersecurity, The Essence of Integrity in Leadership: A Pillar of Trust and Excellence, and more! Show Notes: https://securityweekly.com/bsw-348
  continue reading
 
Host Ericka Adler shares key advice with residents and fellows who are reviewing a contract for the first time. Ericka highlights six major strategies for practitioners to consider, from researching the employer, fighting for key points and understanding the exit strategy. Although Ericka shares pointers for new physicians, she makes it clear that …
  continue reading
 
Host Fred Goldstein invites Jennifer Mathieu, Senior Vice President, Professional & Government Affairs to discuss the Prescription Digital Therapeutics Act, the Medicaid MVPs for Patient Act and other AMCP legislative priorities.Find all of our network podcasts on your favorite podcast platforms and be sure to subscribe and like us. Learn more at w…
  continue reading
 
Designing for Health: Interview with Josh Liu, MDHost Craig Joseph, MD, invites Josh Liu, MD, co-founder of SeamlessMD, a technology platform designed to digitize patient care journeys. Their conversation centers around Dr. Liu’s background, his completion of medical school but not residency, and how he got bit by the startup bug. They also discuss…
  continue reading
 
DLink NAS Exploit Variation; DNS and Great Firewall of China; Android TV Data Leakage DLink NAS Exploit Variation https://www.qnap.com/en/security-advisory/qsa-24-09 Muddling Meerkat DNS Abuse https://blogs.infoblox.com/threat-intelligence/a-cunning-operator-muddling-meerkat-and-chinas-great-firewall/ Android TV Data Leakage https://www.youtube.com…
  continue reading
 
A hybrid workforce requires hybrid identity protection. But what are the threats facing a hybrid workforce? As identity becomes the new perimeter, we need to understand the attacks that can allow attackers access to our applications. Eric Woodruff, Product Technical Specialist at Semperis, joins Business Security Weekly to discuss those attacks, in…
  continue reading
 
A hybrid workforce requires hybrid identity protection. But what are the threats facing a hybrid workforce? As identity becomes the new perimeter, we need to understand the attacks that can allow attackers access to our applications. Eric Woodruff, Product Technical Specialist at Semperis, joins Business Security Weekly to discuss those attacks, in…
  continue reading
 
Episode 44: Cross-Cultural TB Reflections—Ethiopian, Kenyan & Marshallese Perspectives w/ Duncan Reid and Franky ErraHost Raj Sundar & his guests delve into the grave impact of military occupation and nuclear testing on Bikini Atoll, as Duncan Reid links this history to the high rate of tuberculosis in the Marshallese community. They explore commun…
  continue reading
 
Episode 21: The Brain Trust Caregiver Mini-Series: #3 DonnaRaj Shah, MD is joined by Susan Frick, MSW, LSW, Social Worker, Rush Alzheimer’s Disease Center, to talk with caregiver Donna about when her husband, Scott, began showing signs of young-onset Alzheimer’s, and their world turned upside down. Their story, shared with raw honesty in this podca…
  continue reading
 
Credential Stuffing Increase; Fake Payment Cards; USPS Phishing; Chrome Post Quantum TLS Issues; Okta warns of increase in credential stuffing https://sec.okta.com/blockanonymizers Fake payment cards used by Police in Japan https://twitter.com/vxunderground/status/1783522097425211887 Phishing Campaigns Targeting USPS https://www.akamai.com/blog/sec…
  continue reading
 
Dr. Joni Watson speaks with Dr. Brooke Baldwin, Senior Vice President and Chief Nursing Executive at Oregon Health and Science University Health Care. They explore Brooke’s leadership journey and her strategic vision for nursing, emphasizing professional growth, workforce challenges, and the development of guiding principles for the future. They go…
  continue reading
 
Paymon Farazi, President of Signify Health (EXCLUSIVE).Paymon Farazi, President of Signify Health, joins the Rap for an exclusive chat about where health at home does — and doesn't — fit along consumers' healthcare journeys. It’s been about a year since CVS Health completed its acquisition of Signify Health, and Paymon shares how the acquisition is…
  continue reading
 
Future of Marketing Series: Kyle Smith, NoomKyle Smith, Head of Marketing for Healthcare at Noom, joins Jared and guest co-host Paul Schrimpf for the first in a special mini-series about the future of marketing. Hear how Noom's consumer business was born from failure and how Kyle's team experiments with new tools, looks for value, and either adopts…
  continue reading
 
Forty-five years after a Chicago hospital pioneered an integrated network strategy, the healthcare landscape has undergone a significant shift towards prioritizing preventative care. On this episode Jeffry Peters, an expert on medical group strategy, along with Michael Antoniades, President of the University of Chicago Medicine, explore the groundb…
  continue reading
 
Host John Lynn and Colin Hung discuss: Patient Experience Insights.To stream our Station live 24/7 visit www.HealthcareNOWRadio.com or ask your Smart Device to “….Play Healthcare NOW Radio”.Find all of our network podcasts on your favorite podcast platforms and be sure to subscribe and like us. Learn more at www.healthcarenowradio.com/listen…
  continue reading
 
Host Jim Tate talks to Meghan Gaffney, co-founder and CEO of Veda. AI use cases that support efficiencies in healthcare access to crucial information is the topic and Meghan provides insight into real-world processes that are removing roadblocks to long standing challenges.To stream our Station live 24/7 visit www.HealthcareNOWRadio.com or ask your…
  continue reading
 
This is a great interview with Adam Shostack on all things threat modeling. He's often the first name that pops into people's heads when threat modeling comes up, and has created or been involved with much of the foundational material around the subject. Adam recently released a whitepaper that focuses on and defines inherent threats. Resources: He…
  continue reading
 
TikTok, Flowmon, Arcane Door, Brokewell, RuggedCom, Deepfakes, Non-Competes, Aaran Leyland, and More, on this edition of the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-381
  continue reading
 
We've talked about generative AI in a general sense on our podcast for years, but we haven't done many deep dives into specific security use cases. That ends with this interview, as we discuss how generative AI can improve SecOps with Ely Kahn. Some of the use cases are obvious, while others were a complete surprise to me. Check out this episode if…
  continue reading
 
This week the crew discusses: When TVs scan your network, bad things can happen, PuTTY is vulnerable, Crush FTP, vulnerabilities that will never be fixed, CVEs are for vulnerabilities silly, you can test for easily guessable passwords too, FlipperZero can steal all your passwords, more XZ style attacks, more reasons why you shouldn't use a smart lo…
  continue reading
 
How We Treat Our Most Vulnerable Patient PopulationsDavid W. Johnson and Julie Murchinson break down two new reports on Medicaid disenrollment and health disparities and what we must do to address both chronic failures of the healthcare system on the new episode of the 4sight Health Roundup podcast, moderated by David Burda.Find all of our network …
  continue reading
 
Loading …

Pikakäyttöopas