Podcasts about ICS

  • 762PODCASTS
  • 3,103EPISODES
  • 36mAVG DURATION
  • 5WEEKLY NEW EPISODES
  • Jun 13, 2025LATEST

POPULARITY

20172018201920202021202220232024

Categories



Best podcasts about ICS

Show all podcasts related to ics

Latest podcast episodes about ICS

@BEERISAC: CPS/ICS Security Podcast Playlist

Podcast: Error Code (LS 27 · TOP 10% what is this?)Episode: EP 64: Volt TyphoonPub date: 2025-06-10Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationWhile cybersecurity threats targeting critical infrastructure, particularly focusing on the vulnerabilities of operational technology (OT) and industrial control systems (ICS).mostly originate on the business or IT side, there's increasing concern about attacks crossing into OT, which could result in catastrophic consequences, especially in centralized systems like utilities. Michael Welch,  managing director from MorganFranklin Cyber, discusses how Volt Typhoon and other attacks are living off the land, and lying in wait.The podcast and artwork embedded on this page are from Robert Vamosi, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.

ICS Podcast
Inside ICS's New e-Learning Platform: Unlocking Urodynamics and Beyond: ICS Live Lounge

ICS Podcast

Play Episode Listen Later Jun 11, 2025 17:52


ICS Trustee Marcus Drake hosts a conversation with ICS Urodynamics Committee Chair Tufan Tarcan and ICS Trustee Enrico Finazzi Agrò about the all new ICS eLearning modules launching at ICS 2024 Madrid.Recorded at the ICS Live Lounge on Wednesday 23rd October at ICS 2024 Madrid. Through its annual meeting and journal, the International Continence Society (ICS) has been advancing multidisciplinary continence research and education worldwide since 1971. Over 3,000 Urologists, Uro-gynaecologists, Physiotherapists, Nurses and Research Scientists make up ICS, a thriving society dedicated to incontinence and pelvic floor disorders. The Society is growing every day and welcomes you to join us. If you join today, you'll enjoy substantial discounts on ICS Annual Meeting registrations and free journal submissions. Joining ICS is like being welcomed into a big family. Get to know the members and become involved in a vibrant, supportive community of healthcare professionals, dedicated to making a real difference to the lives of people with incontinence.

Embedded Edge
Nordic PMICs – Integrated, Flexible, and Easy-to-Use

Embedded Edge

Play Episode Listen Later Jun 11, 2025 25:21


Today, it is a pleasure to have a special guest, Geir Kjosavik, joining us to discuss precisely why Nordic Semiconductor, a fabless semiconductor company that has a long track record and legacy in designing ultra-low-power wireless solutions, made the move towards power management ICs, or PMICs.  The increasing popularity of battery-operated devices, often characterized by a complex power tree that includes smartphones, hearables, wearables, IoT devices, and other complex portable equipment, has, in turn, driven up the demand for PMICs.   In this episode, we'll explore exactly why Nordic Semiconductor entered the PMIC business in 2021 and how they increased their market share. We'll also discuss what a PMIC is, why companies might want to consider integrating one, and precisely how Nordic's PMIC portfolio is different from existing solutions in the marketplace.

Error Code
EP 64: Volt Typhoon

Error Code

Play Episode Listen Later Jun 10, 2025 43:44


While cybersecurity threats targeting critical infrastructure, particularly focusing on the vulnerabilities of operational technology (OT) and industrial control systems (ICS).mostly originate on the business or IT side, there's increasing concern about attacks crossing into OT, which could result in catastrophic consequences, especially in centralized systems like utilities. Michael Welch,  managing director from MorganFranklin Cyber, discusses how Volt Typhoon and other attacks are living off the land, and lying in wait.

Frankly Speaking About Family Medicine
Rethinking ICS in COPD: Reducing Harm with Guideline-Based Strategies - Frankly Speaking Ep 436

Frankly Speaking About Family Medicine

Play Episode Listen Later Jun 9, 2025 14:45


Credits: 0.25 AMA PRA Category 1 Credit™   CME/CE Information and Claim Credit: https://www.pri-med.com/online-education/podcast/frankly-speaking-cme-436 Overview: Many patients with chronic obstructive pulmonary disease (COPD) are improperly treated with inhaled corticosteroids (ICS), increasing their risk of harm. This episode explores the latest evidence on long-term ICS risks and provides practical guidance to help you align COPD care with current guidelines—improving outcomes while minimizing adverse effects like pneumonia, cataracts, type 2 diabetes mellitus, and osteoporosis. Episode resource links: Pace WD, Callen E, Gaona-Villarreal G, Shaikh A, Yawn BP. Adverse outcomes associated with inhaled corticosteroid use in individuals with chronic obstructive pulmonary disease. Ann Fam Med. 2025;23(2):127-135. doi:10.1370/afm.240030 Pocket Guide to COPD Diagnosis, Management, and Prevention: A Guide for Healthcare Professionals. 2025 Edition. Global Initiative for Chronic Obstructive Lung Disease. https://goldcopd.org/2025-gold-report/ Guest: Jillian Joseph, PA-C   Music Credit: Matthew Bugos Thoughts? Suggestions? Email us at FranklySpeaking@pri-med.com   

Pri-Med Podcasts
Rethinking ICS in COPD: Reducing Harm with Guideline-Based Strategies - Frankly Speaking Ep 436

Pri-Med Podcasts

Play Episode Listen Later Jun 9, 2025 14:45


Credits: 0.25 AMA PRA Category 1 Credit™   CME/CE Information and Claim Credit: https://www.pri-med.com/online-education/podcast/frankly-speaking-cme-436 Overview: Many patients with chronic obstructive pulmonary disease (COPD) are improperly treated with inhaled corticosteroids (ICS), increasing their risk of harm. This episode explores the latest evidence on long-term ICS risks and provides practical guidance to help you align COPD care with current guidelines—improving outcomes while minimizing adverse effects like pneumonia, cataracts, type 2 diabetes mellitus, and osteoporosis. Episode resource links: Pace WD, Callen E, Gaona-Villarreal G, Shaikh A, Yawn BP. Adverse outcomes associated with inhaled corticosteroid use in individuals with chronic obstructive pulmonary disease. Ann Fam Med. 2025;23(2):127-135. doi:10.1370/afm.240030 Pocket Guide to COPD Diagnosis, Management, and Prevention: A Guide for Healthcare Professionals. 2025 Edition. Global Initiative for Chronic Obstructive Lung Disease. https://goldcopd.org/2025-gold-report/ Guest: Jillian Joseph, PA-C   Music Credit: Matthew Bugos Thoughts? Suggestions? Email us at FranklySpeaking@pri-med.com   

The Law & Education
Episode 74: Summer Prep for Title IX: Legal Updates & the ICS Worksheet

The Law & Education

Play Episode Listen Later Jun 5, 2025 20:13


It is hard to believe that we're already zooming into summer! It's been a wild few months, and this is an informational episode to recap some of what has happened. We start by giving you a peek behind the scenes at ICS, from training planned to a newly launched LinkedIn newsletter. Next, we touch on the May 22nd injunction, the events of May 23rd, and what the newly introduced Civil Rights Fraud Initiative stands to do. Our discussion also explores multiple new executive orders that have emerged recently and delves into Harvard's fight and defense strategy with the administration and the timeline of events. Lastly, we unpack what you can gain from the ICS summer prep worksheets. Thanks for listening!  Key Points From This Episode: In-person and live virtual trainings ICS is offering for K-12 and Higher Ed. The newly launched Tuesday Takeaways newsletter on LinkedIn. Unpacking the implications of the preliminary injunction of May 22nd on Title VII. The Supreme Court's recent blocking of its first religious charter school.  Introduction of a new unit: The Civil Rights Fraud Initiative. The new executive order banning disparate impact analysis in civil rights enforcement. Another new executive order focused on strengthening and investing in HBCUs. A timeline of what Harvard sees as the administration's escalating retaliation campaign. What is covered in the 2025 summer prep worksheets from ICS. Links Mentioned in Today's Episode: K-12 Worksheet Higher Ed WorksheetICS Lawyer BlogICS on LinkedInTuesday Takeaways LinkedIn NewsletterHigher Ed Trainings and Webinars'Restoring Equality of Opportunity and Meritocracy'Title IX, Mental Health and School Safety Symposium ICS Lawyer Higher Ed Community Access K-12 Community Access Higher Ed Virtual Certified IX Training K-12 Virtual Certified Title IX Training ICS Blog Courtney Bullard on LinkedIn Courtney Bullard on X  Learn about Becoming a Community Partner

The CyberWire
Appetite for tracking: A feast on private data.

The CyberWire

Play Episode Listen Later Jun 4, 2025 37:00


Researchers uncover a major privacy violation involving tracking scripts from Meta and Yandex. A compliance automation firm discloses a data breach. PumaBot stalks vulnerable IoT devices. The Ramnit banking trojan gets repurposed for ICS intrusions. The North Face suffers a credential stuffing attack. Kaspersky says the Black Owl team is a cyber threat to Russia. CISA releases ISC advisories. An Indian grocery delivery startup suffers a devastating data wiping attack. The UK welcomes their new Cyber and Electromagnetic (CyberEM) Command. Our guest is Rohan Pinto, CTO of 1Kosmos, discussing the implications of AI deepfakes for biometric security. The cybersecurity sleuths at Sophos unravel a curious caper. Remember to leave us a 5-star rating and review in your favorite podcast app. Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you'll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn. CyberWire Guest Today we are joined by Rohan Pinto, CTO of 1Kosmos, and he is discussing the implications of AI deepfakes for biometric security. Selected Reading Meta and Yandex are de-anonymizing Android users' web browsing identifiers (Ars Technica) Vanta leaks customer data due to product code change (Beyond Machines) New Linux PumaBot Attacking IoT Devices by Brute-Forcing SSH Credentials (Cyber Security News) Ramnit Malware Infections Spike in OT as Evidence Suggests ICS Shift (SecurityWeek) The North Face warns customers of April credential stuffing attack (Bleeping Computer) Pro-Ukraine hacker group Black Owl poses ‘major threat' to Russia, Kaspersky says (The Record) CISA Releases ICS Advisories Covering Vulnerabilities & Exploits (Cyber Security News) Indian grocery startup KiranaPro was hacked and its servers deleted, CEO confirms (TechCrunch) UK CyberEM Command to spearhead new era of armed conflict (The Register) Widespread Campaign Targets Cybercriminals and Gamers  (Infosecurity Magazine) Want to hear your company in the show? You too can reach the most influential leaders and operators in the industry. Here's our media kit. Contact us at cyberwire@n2k.com to request more info. The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc. Learn more about your ad choices. Visit megaphone.fm/adchoices

ICS Podcast
Navigating Early Career Challenges: Strategies and Stories for Success: ICS Live Lounge

ICS Podcast

Play Episode Listen Later Jun 4, 2025 15:46


ICS Education Committee Member Shannon Wallace hosts a conversation with Zainab Noor and Marisa Cornejo-Vega about the Early Career Professionals Session at ICS 2024 Madrid.Recorded at the ICS Live Lounge on Wednesday 23rd October at ICS 2024 Madrid.  Through its annual meeting and journal, the International Continence Society (ICS) has been advancing multidisciplinary continence research and education worldwide since 1971. Over 3,000 Urologists, Uro-gynaecologists, Physiotherapists, Nurses and Research Scientists make up ICS, a thriving society dedicated to incontinence and pelvic floor disorders. The Society is growing every day and welcomes you to join us. If you join today, you'll enjoy substantial discounts on ICS Annual Meeting registrations and free journal submissions. Joining ICS is like being welcomed into a big family. Get to know the members and become involved in a vibrant, supportive community of healthcare professionals, dedicated to making a real difference to the lives of people with incontinence.

@BEERISAC: CPS/ICS Security Podcast Playlist
Building Trust and Bridging the Gap in OT and IT Cybersecurity

@BEERISAC: CPS/ICS Security Podcast Playlist

Play Episode Listen Later Jun 4, 2025 60:38


Podcast: PrOTect It All (LS 26 · TOP 10% what is this?)Episode: Building Trust and Bridging the Gap in OT and IT CybersecurityPub date: 2025-06-02Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationIn this episode, host Aaron Crow sits down with Dean Parsons, one of the most recognized names in the OT and industrial control systems (ICS) security world, for a candid and insightful conversation.   Join Aaron and Dean as they explore what it truly takes to bridge the worlds of IT and OT. Drawing from decades of industry experience, their discussion covers everything from building trust across teams, to the superpower of understanding both operational technology and cybersecurity. Expect real-world stories, practical advice on breaking into OT cybersecurity, and memorable lessons from the plant floor to the boardroom.   They also break down what makes OT security fundamentally different from traditional IT approaches, why risk-based strategies are essential, and how building relationships, sometimes over donuts and coffee—can be just as important as deploying firewalls and patching systems. Whether you're new to ICS and OT security, or a seasoned defender looking for fresh perspective, this episode brings actionable tips, honest assessments, and inspiration to help you better protect what matters most.   So grab your hard hat (and maybe a box of donuts!), and get ready for a masterclass on collaboration, building skills, and why trust is the real currency in the fight to secure our critical infrastructure.   Key Moments:    05:32 Listening Over Speaking in Legacy Spaces 07:01 IT Security Teamwork and Trust 11:21 Cost-Efficient ICS Security Solutions 15:42 Converging Skill Sets in IT Security 17:36 OT vs IT: Different Risks 22:28 Prioritizing Post-Assessment Actions 23:20 Prioritize SANS ICS Critical Controls 29:31 Engineering Perspective on Critical Assets 30:47 Detecting Misuse of Control Systems 35:52 Collaborative Incident Response Dynamics 39:03 Remote Hydroelectric Plant Journey 40:45 Building Trust with Baked Goods 44:55 "Safety Crucial in Facility Disruptions" 48:50 ICS Security: Closing Safety Gaps 53:37 Enhancing ICS Security Controls 57:18 "ICS Summit and LinkedIn Activities"   About the guest :  Dean is the CEO and Principal Consultant of ICS Defense Force and brings over 20 years of technical and management experience to the classroom. He has worked in both Information Technology and Industrial Control System (ICS) Cyber Defense in critical infrastructure sectors such as telecommunications, electric generation, transmission, distribution, and oil & gas refineries, storage, and distribution, and water management. Dean is an ambassador for defending industrial systems and an advocate for the safety, reliability, and cyber protection of critical infrastructure. His mission as an instructor is to empower each of his students, and he earnestly preaches that “Defense is Do-able!”    Over the course of his career, Dean's accomplishments include establishing entire ICS security programs for critical infrastructure sectors, successfully conducting industrial-grade incident response and tabletops, ICS digital forensics, and ICS/OT Cybersecurity assessments across multiple sectors. As a SANS Principal Instructor, Dean teaches ICS515: ICS Visibility, Detection, and Response, is a co-author of the SANS Course ICS418: ICS Security Essentials for Managers and an author of SANS ICS Engineer Technical Awareness Training. Dean is a member of the SANS GIAC Advisory Board and holds many cybersecurity professional certifications including the GICSP, GRID, GSLC, and GCIA, as well as the CISSP®, and holds a BS in computer science. When not in the field, Dean spends tine chasing icebergs off the coast of Newfoundland on a jetski, or writing electric 80s inspired electronic music in this band Arcade Knights.   Resources Mentioned:  5 ICS Cybersecurity Critical Controls: https://www.sans.org/white-papers/five-ics-cybersecurity-critical-controls/ SANS ICS Cybersecurity Summit: https://www.sans.org/cyber-security-training-events/ics-security-summit-2025/ How to connect Dean:  https://www.linkedin.com/in/dean-parsons-cybersecurity/ https://www.sans.org/profiles/dean-parsons/ Dean's Book: https://www.amazon.com/ICS-Cybersecurity-Field-Manual-EXCLUSIVE/dp/B0CGG6GMHW/   Connect With Aaron Crow: Website: www.corvosec.com  LinkedIn: https://www.linkedin.com/in/aaronccrow   Learn more about PrOTect IT All: Email: info@protectitall.co  Website: https://protectitall.co/  X: https://twitter.com/protectitall  YouTube: https://www.youtube.com/@PrOTectITAll  FaceBook:  https://facebook.com/protectitallpodcast    To be a guest or suggest a guest/episode, please email us at info@protectitall.co   Please leave us a review on Apple/Spotify Podcasts: Apple   - https://podcasts.apple.com/us/podcast/protect-it-all/id1727211124 Spotify - https://open.spotify.com/show/1Vvi0euj3rE8xObK0yvYi4The podcast and artwork embedded on this page are from Aaron Crow, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.

Between the Slides
Why You Should Treat the Planned Event Like a Project

Between the Slides

Play Episode Listen Later Jun 2, 2025 16:19


Planning a public event without structure is a risk you can't afford. In this episode, Why You Should Treat the Planned Event Like a Project, Kevin Pannell shares how to apply project management principles and ICS tools, like RACI matrices, project phases, SMART goals, and SitReps, to plan safer, smoother public safety events. Whether you're leading a 5K, a drill, or a community gathering, treat the event like a project—and lead with purpose.Topics Covered: event planning, project phases, stakeholder roles, ICS, SMART goals, emergency management, public safety leadership

The CyberWire
All systems not go.

The CyberWire

Play Episode Listen Later May 30, 2025 37:05


SentinelOne suffers a global service outage. A major DDoS attack hits a Russian internet provider. U.S. banking groups urge the SEC to scrap cybersecurity disclosure rules. Australia mandates reporting of ransomware payments. Researchers uncover a new Browser-in-the-Middle (BitM) attack targeting Safari users. A Florida health system pays over $800,000 to settle insider breach concerns. CISA issues five urgent ICS advisories. Our guest is  Matt Covington, VP of Product at BlackCloak, discussing the emergence of advanced impersonation techniques like deepfakes and the importance of digital executive protection. The feds are putting all our digital data in one basket. CyberWire Guest On our Industry Voices segment, at the 2025 RSA Conference, we were joined by Matt Covington, VP of Product at BlackCloak, discussing the emergence of advanced impersonation techniques like deepfakes and digital executive protection. Listen to Matt's conversation here. Selected Reading Cybersecurity Firm SentinelOne Suffers Major Outage (Bank Infosecurity) DDoS incident disrupts internet for thousands in Moscow (The Record) Banks Want SEC to Rescind Cyberattack Disclosure Requirements (PYMNTS.com) Australian ransomware victims now must tell the government if they pay up (The Record) New BitM Attack Exploits Safari Vulnerability to Steal Login Credentials (Cyber Security News) Florida Health System Pays $800K for Insider Record Snooping (Bank Infosecurity) UTG-Q-015 Hackers Launched Large Scale Brute-Force Attacks Against Govt Web Servers (Cyber Security News) CISA Releases Five ICS Advisories Targeting Vulnerabilities and Exploits (Cyber Security News) Trump Taps Palantir to Compile Data on Americans (The New York Times) Want to hear your company in the show? You too can reach the most influential leaders and operators in the industry. Here's our media kit. Contact us at cyberwire@n2k.com to request more info. The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc. Learn more about your ad choices. Visit megaphone.fm/adchoices

SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast
SANS Stormcast Friday, May 30th 2025: Alternate Data Streams; Connectwise Breach; Google Calendar C2;

SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast

Play Episode Listen Later May 30, 2025 13:47


Alternate Data Streams: Adversary Defense Evasion and Detection Good Primer of alternate data streams and how they are abused, as well as how to detect and defend against ADS abuse. https://isc.sans.edu/diary/Alternate%20Data%20Streams%20%3F%20Adversary%20Defense%20Evasion%20and%20Detection%20%5BGuest%20Diary%5D/31990 Connectwise Breach Affects ScreenConnect Customers Connectwise s ScreenConnect solution was compromised, leading to attacks against a small number of customers. This is yet another example of how attackers are taking advantage of remote access solutions. https://www.connectwise.com/company/trust/advisories Mark Your Calendar: APT41 Innovative Tactics Google detected attacks leveraging Google s calendar solution as a command and control channel. https://cloud.google.com/blog/topics/threat-intelligence/apt41-innovative-tactics Webs of Deception: Using the SANS ICS Kill Chain to Flip the Advantage to the Defender Defending a small Industrial Control System (ICS) against sophisticated threats can seem futile. The resource disparity between small ICS defenders and sophisticated attackers poses a significant security challenge. https://www.sans.edu/cyber-research/webs-deception-using-sans-ics-kill-chain-flip-advantage-defender/

NHS Employers
How BOB ICS supports upscaling of T Level industry placements

NHS Employers

Play Episode Listen Later May 30, 2025 29:19


Shilpa Bhatt, apprenticeships and widening participation lead and interim retention lead at Buckinghamshire, Oxfordshire, and Berkshire West Integrated Care System (BOB ICS) shares reflections on how the ICS supporting the upscaling of T Level Industry placements across the system.

ICS Podcast
Key Takeaways from Day 1: Highlights and Reflections: ICS Live Lounge

ICS Podcast

Play Episode Listen Later May 28, 2025 7:31


Emmanuel Chartier-Kastler sits down with  Michel Wyndaele and Salvador Arlandis Guzmán to discuss day 1 of ICS 2024 Madrid.Recorded at the ICS Live Lounge on Wednesday 23rd October at ICS 2024 Madrid.  Through its annual meeting and journal, the International Continence Society (ICS) has been advancing multidisciplinary continence research and education worldwide since 1971. Over 3,000 Urologists, Uro-gynaecologists, Physiotherapists, Nurses and Research Scientists make up ICS, a thriving society dedicated to incontinence and pelvic floor disorders. The Society is growing every day and welcomes you to join us. If you join today, you'll enjoy substantial discounts on ICS Annual Meeting registrations and free journal submissions. Joining ICS is like being welcomed into a big family. Get to know the members and become involved in a vibrant, supportive community of healthcare professionals, dedicated to making a real difference to the lives of people with incontinence.

Ops Cast
The MOps Leap: Transitioning into Strategic Marketing Roles with Rick Collins

Ops Cast

Play Episode Listen Later May 26, 2025 45:31 Transcription Available


Text us your thoughts on the episode or the show!On todays episode, we talk with Rick Collins, Vice President of Demand Generation at ConnectWise, to explore his unconventional yet inspiring journey from IT to marketing operations and ultimately into executive marketing leadership. Rick shares how he transitioned from managing systems to driving demand, the pivotal career moments that shaped his path, and the leadership lessons he's learned along the way. Whether you're early in your marketing ops career or looking to break into leadership, this conversation is packed with valuable takeaways on navigating transitions, building trust, and expanding your influence.Tune in to hear:Rick's unique career path from IT and QA into marketing operations and eventually to a VP role in demand generation.How to leverage technical and relational skills to create career mobility within marketing.The importance of curiosity, relationship-building, and challenging assumptions—internally and externally—for leadership growth.Insights into managing through organizational change, including private equity acquisitions and team restructuring.Tips on transitioning from managing ICs to managing other managers, including the importance of communication, presentation skills, and executive alignment.Episode Brought to You By MO Pros The #1 Community for Marketing Operations ProfessionalsSupport the show

Expresso - Expresso da Meia-Noite
Pós-terramoto eleitoral: a fragmentação do Parlamento e o fim do bipartidarismo

Expresso - Expresso da Meia-Noite

Play Episode Listen Later May 24, 2025 50:22


As eleições do ano passado já tinham dado todos os sinais de que o sistema bipartidário tinha mudado ou estava mesmo a mudar de forma decisiva. E as dúvidas que existiram durante estes 11 ou 12 meses acabaram por ser esclarecidas no dia 18 de maio de 2025: o partido Chega ultrapassou o PS. Ainda falta contar os votos dos imigrantes, mas tudo indica que André Ventura será o líder da oposição e que chegou o fim do sistema bipartidário. Nada será como dantes. Para analisarmos o pós-terramoto de domingo passado, convidámos a Ana Pedrosa Augusto, analista de política nacional, Henrique Monteiro, jornalista, David Dinis, diretor-adjunto do Expresso e, à distância, Marina Costa Lobo, politóloga e presidente do ICS. Este programa foi emitido a 24 de maio na SIC Notícias.See omnystudio.com/listener for privacy information.

ICS Podcast
Postpartum Incontinence, Blues, and Pelvic Floor Training Perspectives: ICS Live Lounge

ICS Podcast

Play Episode Listen Later May 21, 2025 23:54


ICS Trustee, Frankie Bates, hosts a conversation with Victoria Salmon (presenter abstract #53) and Cristina Gallego-Gómez (presenter abstract #44) about their research presented at ICS 2024 Madrid. Recorded at the ICS Live Lounge on Wednesday 23rd October at ICS 2024 Madrid. Through its annual meeting and journal, the International Continence Society (ICS) has been advancing multidisciplinary continence research and education worldwide since 1971. Over 3,000 Urologists, Uro-gynaecologists, Physiotherapists, Nurses and Research Scientists make up ICS, a thriving society dedicated to incontinence and pelvic floor disorders. The Society is growing every day and welcomes you to join us. If you join today, you'll enjoy substantial discounts on ICS Annual Meeting registrations and free journal submissions. Joining ICS is like being welcomed into a big family. Get to know the members and become involved in a vibrant, supportive community of healthcare professionals, dedicated to making a real difference to the lives of people with incontinence.

Threat Talks - Your Gateway to Cybersecurity Insights

Now that we know what a PLC, HMI and SCADA are (check out last week's episode for a refresher if you need one!), we're ready for part two of our OT deep dive: how does an OT attack work? In this Deep Dive, Rob Maas and Luca Cipriano break down just how complex an OT attack really is. From needing to stay hidden, to requiring access to very specific system settings and blueprints; setting up a successful OT attack (thankfully) is no easy task. But does that mean it's easier to defend against them?Key topics:⚙️ How IT and OT attacks differ☠️ What the ICS cyber kill chain is

Rideshare Rodeo Podcast
#463 | New Jersey vs. Independent Contractors

Rideshare Rodeo Podcast

Play Episode Listen Later May 14, 2025 93:38


Today on the podcast, I'm joined by two incredible guests: Mike Hruby (https://x.com/venturemike1) and Kim Kavin (https://x.com/thekimkavin). Mike is a seasoned advocate for independent work and entrepreneurship, while Kim is a respected journalist and a passionate voice for freelancers' rights. Together, we dive deep into the alarming developments happening right now in New Jersey, where the state Labor Department has proposed a new independent-contractor rule that could drastically restrict the freedom of an estimated 1.7 million people who work as independent contractors, freelancers, self-employed individuals, and gig economy drivers for companies like Uber and DoorDash.   This episode unpacks what's really at stake. While the proposed policies are being framed as protections, what the proposed NJDOL rule states is that it will not create any jobs. The fear is that ICs get wiped out and are left with nothing. that would strip people of the flexibility, autonomy, and control that make independent work so vital. Mike and Kim explain how similar policy-making. has played out in other states, and why this movement could have nationwide implications. It's a critical conversation for anyone who values the freedom to choose how and when they work.   Kim Kavin: https://www.freelancebusting.com/ Mike Hruby https://www.newjobsamerica.com/   Rideshare Rodeo Brand & Podcast: https://linktr.ee/RideshareRodeo 

ICS Podcast
Pelvic Floor Evaluation: A Comprehensive Analysis and Key Discussions: ICS Live Lounge

ICS Podcast

Play Episode Listen Later May 14, 2025 23:10


Shannon Wallace hosts a conversation with Anna Spivak and Leila Neshatian about Workshop 5, Comprehensive Evaluation of the Pelvic Floor at ICS 2024 Madrid. Recorded at the ICS Live Lounge on Wednesday 23rd October at ICS 2024 Madrid.  Through its annual meeting and journal, the International Continence Society (ICS) has been advancing multidisciplinary continence research and education worldwide since 1971. Over 3,000 Urologists, Uro-gynaecologists, Physiotherapists, Nurses and Research Scientists make up ICS, a thriving society dedicated to incontinence and pelvic floor disorders. The Society is growing every day and welcomes you to join us. If you join today, you'll enjoy substantial discounts on ICS Annual Meeting registrations and free journal submissions. Joining ICS is like being welcomed into a big family. Get to know the members and become involved in a vibrant, supportive community of healthcare professionals, dedicated to making a real difference to the lives of people with incontinence.

The BoardGameGeek Podcast
Episode 68: Heavy Games: When the Juice is Worth the Squeeze, with Edward from Heavy Cardboard

The BoardGameGeek Podcast

Play Episode Listen Later May 9, 2025 117:23


Edward from Heavy Cardboard joins Candice to discuss the appeal of heavy board games, the ones they've been diggin, and the ones where the juice is worth the squeeze.00:00:00 Introduction00:15:38 Fresh Plays00:16:35 Ayar: Children of the Sun00:25:38 Cosmic Frog00:31:54 Speakeasy00:40:23 Dungeon Degenerates00:54:25 Heavy Games: When the Juice is Worth the Squeeze00:56:15 The Heaviness in Board Games01:16:59 Age of Steam01:22:22 Leaving Earth01:26:20 Crystal Palace01:30:52 Black Rose Wars: Rebirth + Age of Innovation01:34:04 Stress Botics: Odyssey01:40:25 Feudum01:42:53 Edward's List of Games Worth the Squeeze (Stress Botics Odyssey, Age of Steam, Antiquity, Pax Transhumanity, Reef Encounter, Weimar: The Fight for Democracy, Tales of the Northlands: The Sagas of Noggin the Nog, Mr. President, Die Macher, John Company, Dilluvia Project, The Colonists, For-Ex, Sekigahara)01:46:24 Candice's List of Games Worth the Squeeze (Feudum, Too Many Bones, Spirit Island, Mage Knight, COIN & ICS series, War of the Ring: Second Edition, TI4, Cerebria, Here I Stand, Fields of Fire)01:51:08 D-Day at Omaha Beach01:55:38 Sign-offThank you to our sponsor, CATAN Studio!Hope you can join us for our 2025 BGG conventions! For more details and to register for your badge: BGG.Spring May 22-26BGG.CON November 19-23Web: https://boardgamegeek.com/YouTube: https://www.youtube.com/@boardgamegeekTwitter: https://twitter.com/BoardGameGeekEmail: podcast@boardgamegeek.com

pharmaphorum Podcast
The value of a partner, globally and locally

pharmaphorum Podcast

Play Episode Listen Later May 9, 2025 22:08


With the FDA and EMA releasing their annual reports detailing novel drug approvals in 2024, a new pharmaphorum podcast looks at recent trends related to drug approvals, as well as challenges and opportunities both small and large pharma companies face in the year ahead. Host Nicole Raleigh is joined by Cencora's Sandra Anderson, SVP of International Commercialisation, and Chris Williams, SVP & International Managing Director at Alloga Europe and ICS, which are part of Cencora – and the conversation dives into takeaways such as the increase in smaller biotech companies taking their product to market on their own, what is needed to ensure a successful go-to-market strategy, the unique logistics and supply chain considerations specialty pharmaceutical products introduce, and also geographical considerations, with 34 of the 50 novel drugs approved in 2024 being in the US before any other country. You can listen to episode 178a of the pharmaphorum podcast in the player below, download the episode to your computer, or find it - and subscribe to the rest of the series - in iTunes, Spotify, Amazon Music, Podbean, and pretty much wherever you get your other podcasts!

The Gary Null Show
The Gary Null Show 5.8.25

The Gary Null Show

Play Episode Listen Later May 8, 2025 57:24


HEALTH NEWS   ·         Eating avocados during pregnancy associated with lower food allergy risk in baby Six new studies point to red raspberry's potential anti-inflammatory properties ·         Better physical health probably follows religious and spiritual engagement, rather than vice versa ·         Tomato and fruit juice improve quality of life for kids with asthma ·         Discover how parsley helps to fight cancer ·         Eating ultra processed foods may speed up early signs of Parkinson's disease   Eating avocados during pregnancy associated with lower food allergy risk in baby University of Eastern Finland, May 7, 2025 (Eurekalert)   An observational study among 2,272 mother-child pairs in Finland found that infants had 44% lower odds of developing food allergies at 12 months if their mother consumed fresh avocado during pregnancy, after adjusting for other lifestyle, delivery, and maternal health factors. This is the first published study to link avocados in the maternal diet to a lower risk of infant food allergies—a growing public health concern that affects nearly one in 13 children, or roughly two in every classroom.   Researchers analyzed data collected as part of the Kuopio Birth Cohort (KuBiCo). Participants who reported eating any avocado (>0 grams) in either trimester were defined as avocado consumers, and non-consumers were those who did not report consuming any avocado in either trimester. Infant allergic outcomes, including rhinitis, paroxysmal wheezing, eczema, and food allergy, were evaluated at 12-months of age. After adjusting for factors food allergy was found to be significantly higher in infants of non-avocado consumers (4.2%) versus avocado consumers (2.4%).    Six new studies point to red raspberry's potential anti-inflammatory properties   Various Universities, May 2, 2025 (Medical Xpress)   Initial findings from six animal model studies reveal the potential effects of red raspberry consumption on cardiovascular disease risk reduction, maintaining normal blood glucose levels and liver function as well as potential anti-inflammatory effects related to bone health.   Cardiovascular University of Michigan observed potential benefits of red raspberry intake on obesity-prone rats.   Metabolic Syndrome Washington State University noted positive effects of red raspberry consumption on metabolic syndrome in male mice with diet-induced obesity. Oregon State University studied the effects of red raspberries in mice fed a high-fat, high-sugar Western diet.   Diabetes Texas A&M University reported positive effects of red raspberry consumption on diabetes-related complications and heart disease in obese diabetic mice.   Liver Function Oregon State University noted raspberry's capacity for ellagic acid quercetin to bind to the peroxisome proliferator-activated receptor-alpha (PPARa).   Inflammation and Bone Health Texas Woman's University observed anti-inflammatory effect of polyphenols in red raspberries in the production of osteoclasts, the cells associated with the breakdown of bone.     Better physical health probably follows religious and spiritual engagement, rather than vice versa University of Miami, May 7, 2025 (PLoS One)   Better physical health probably follows religious and spiritual engagement, rather than vice versa, per six year longitudinal U.S. study aiming to tease out this relationship Religious and spiritual (R/S) engagement is generally associated with better health. However, it is not known which comes first between R/S engagement and health due to a lack of longitudinal studies. We examined this issue in a sample assessed six years apart. We examined the measurement invariance and reciprocal relationships of R/S engagement and self-rated physical health (SRH) at two timepoints (six years apart). We then assessed whether the strength of their relationships with each other differed.   Our findings demonstrate that religious and spiritual engagement predicts better self-rated physical health six years later, whereas better SRH does not significantly predict future R/S engagement.   Tomato and fruit juice improve quality of life for kids with asthma King Mongkut's Institute of Technology (Thailand), May 7, 2025 (News Medical) In a recent study published in the journal BMC Nutrition, researchers evaluated the effects of an antioxidant-rich diet on asthma outcomes in children. In the present study, researchers examined clinical outcomes, pulmonary function, and serum antioxidant levels in asthmatic children in Thailand. Participants were randomized to the intervention or control group. The control group received conventional usual care, whereas the intervention group received usual care and mixed fruit and tomato juices. Further, serum antioxidants (ascorbic acid, lycopene, and beta-carotene) were measured. In sum, the consumption of tomato and mixed-fruit juices for eight weeks improved asthma symptom control and quality of life in children. Serum beta-carotene increased within the intervention group, though this was not significantly different compared to controls. However, pulmonary function, ICS usage, and between-group antioxidant levels were unaffected by the intervention.   Discover how parsley helps to fight cancer University of Missouri, April 25, 2025 (NaturalHealth365) Research published in Oncotarget  detailed for the how apigenin in parsely slows and halts the production of the enzyme IKKa, which is behind the growth and progression of cancer. The scientists concluded that apigenin has a profound ability to slow cancer progression or stop it altogether.   In addition to these results, combined apigenin with green tea successfully treats colon cancer and the University of Missouri researchers found apigenin was effective against breast cancer and killed as much as 86 percent of lung cancer cells. Parsley is an excellent source of carotenoids, which protect against cancer-causing cell damage. Additionally, it's considered a “chemoprotective” food due to its ability to protect healthy tissues in the body from the toxic effects of many cancer treatments or drugs. As a powerful anti-inflammatory and antioxidant properties – and its rich source of vitamins A, C, E, beta-carotene, chlorophyll, fiber, lutein, zeaxanthin, folate and cryptoxanthin. It's also packed with a higher concentration of vitamin K than kale.   Eating ultra processed foods may speed up early signs of Parkinson's disease Fudan University (China), May 7, 2025 (Eurekalert) People who eat more ultra processed foods like cold breakfast cereal, cookies and hot dogs are more likely to have early signs of Parkinson's disease when compared to those who eat very few ultra processed foods. Researchers looked for signs of prodromal Parkinson's disease, which is the earliest stage, when neurodegeneration begins, but more characteristic symptoms of Parkinson's disease, like tremors, balance problems and slow movement, have not yet begun. These early symptoms can begin years or even decades before the typical symptoms start. The study included 42,853 people with an average age of 48 who did not have Parkinson's disease at the start of the study. They were followed up to 26 years. After adjusting for factorsg, researchers found that participants who ate 11 or more servings of ultra processed foods per day had a 2.5-fold higher likelihood of having three or more early signs of Parkinson's disease compared to those consuming fewer than three servings per day. When looking at individual early signs of Parkinson's disease, researchers also found that eating more ultra processed foods was tied to an increased risk for nearly all symptoms except constipation.

Grow Your Independent Consulting Business
217. Fixing the Wrong Problem in Your Consulting Business

Grow Your Independent Consulting Business

Play Episode Listen Later May 8, 2025 27:55


You solve problems. That's what you do best as a consultant.But what if you're focused on solving the wrong problem in your own consulting business?In this episode, Melisa breaks down a counterintuitive truth: many consultants plateau or underearn not because they don't have solutions, but because they're solving problems they've already outgrown.Melisa shares a real client case study that illustrates how thought errors can keep you solving yesterday's problems and sabotaging your current and future growth. You'll walk away with a new lens for assessing what really needs your attention — and how to stop spinning your wheels on challenges you've already outgrown.Timestamps for Key Moments[04:22] What it looks like to fix the wrong problem and why it's such a common trap for ICs[07:30] A real-world example of a consultant who outgrew his lead gen problem but didn't update his mindset[13:50] The identity and positioning shifts that opened up capacity and growth[18:36] How to shift from more to better — refining your focus instead of adding more to your plate[23:45] Three questions to uncover if you're solving the wrong problemTune in to Episode 217 to shift your perspective and refocus your energy on what actually moves the needle in your business.Related ResourcesFull Show Notes: https://shownotes.melisaliberman.com/episode-217/Subscribe to Melisa's newsletter: The Independent - Weekly Newsletter, https://www.melisaliberman.com/newsConsulting Business Health Assessment – Take The Consultant's Business Health Assessment, https://assessments.melisaliberman.com/consulting-health-assessmentWork with Melisa: Apply for a Coaching Exploratory call at https://consultmelisa.com Want More?Get Melisa's Book: https://www.melisaliberman.com/bookVisit with Melisa's Website: www.melisaliberman.com Follow on LinkedIn: linkedin.com/in/melisa-liberman Want help achieving your consulting business goals? Melisa can help. Click here for more on coaching tailored to you as an independent consulting business owner.

The CyberWire
When spyware backfires.

The CyberWire

Play Episode Listen Later May 7, 2025 33:40


A jury orders NSO Group to pay $167 millions dollars to Meta over spyware allegations. CISA warns of hacktivists targeting U.S. ICS and SCADA systems. Researcher Micah Lee documents serious privacy risks in the TM SGNL app used by high level Trump officials. The NSA plans significant workforce cuts. Nations look for alternatives to U.S. cloud providers. A medical device provider discloses a cyberattack disrupting its ability to ship customer orders. The Panda Shop smishing kit impersonates trusted brands. Accenture's CFO thwarts a deepfake attempt. Our temporary intern Kevin Magee from Microsoft wraps up his reporting from the RSAC show floor.  Server room shenanigans, with romance, retaliation, and root access. Remember to leave us a 5-star rating and review in your favorite podcast app. Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you'll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn. CyberWire Guest Wrapping up RSAC 2025, we're joined by our partner Kevin Magee, Global Director of Cybersecurity Startups at Microsoft for Startups. Kevin brings the energy with a high-octane medley of interviews directly from the show floor, featuring sharp insights and bold ideas from some of cybersecurity's most influential voices. It's the perfect, fast-paced finale to our RSAC coverage—check out the show notes for links to all the guests featured! In this segment, you'll hear from Eoin Wickens, Director of Threat Intelligence of HiddenLayer, Jordan Shaw-Young, Chief of Staff for Security Services at BlueVoyant, Gil Barak, co-founder and CEO of Blink Ops, and Paul St Vil, VP of Field Engineering at Zenity. You can also catch Kevin on our Microsoft for Startups⁠ Spotlight, brought to you by N2K CyberWire and Microsoft, where we shine a light on innovation, ambition, and the tech trailblazers building the future right from the startup trenches. Kevin and Dave talk with startup veteran and Cygenta co-founder FC about making the leap from hacker to entrepreneur, then speak with three Microsoft for Startups members: Matthew Chiodi⁠ of ⁠Cerby⁠, ⁠Travis Howerton⁠ of ⁠RegScale⁠, and ⁠Karl Mattson⁠ of ⁠Endor Labs⁠. Whether you are building your own startup or just love a good innovation story, listen and learn more here. Selected Reading Spyware-maker NSO ordered to pay $167 million for hacking WhatsApp (The Washington Post) CISA Warns of Hackers Attacking ICS/SCADA Systems in Oil and Natural Gas Companies (Cyber Security News) Despite misleading marketing, Israeli company TeleMessage, used by Trump officials, can access plaintext chat logs (Micha Flee) NSA to cut up to 2,000 civilian roles as part of intel community downsizing' (The Record) NIST loses key cyber experts in standards and research (Cybersecurity Dive) A coherent European/non-US cloud strategy: building railroads for the cloud economy (Bert Hubert) Medical device giant Masimo says cyberattack is limiting ability to fill customer orders (The Record) New Chinese Smishing Kit Dubbed 'Panda Shop' Steal Google, Apple Pay & Credit Card Details (Cyber Security News) Accenture: What we learned when our CEO got deepfaked (Computing) IT Worker from Computacenter Let Girlfriend Into Deutsche Bank's Restricted Areas (GB Hackers) Share your feedback. We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. Want to hear your company in the show? You too can reach the most influential leaders and operators in the industry. Here's our media kit. Contact us at cyberwire@n2k.com to request more info. The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc. Learn more about your ad choices. Visit megaphone.fm/adchoices

ICS Podcast
A closer look at Pelvic Floor Ultrasound: Structure and Function: ICS Live Lounge

ICS Podcast

Play Episode Listen Later May 7, 2025 19:49


Paul Hodges hosts a conversation with Grainne Donnelly and Linda McLean about the ICS Physiotherapy Committee workshop Ultrasound Imaging of the Structure and Function of Pelvic Floor Muscles in Men and Women at ICS 2024 Madrid. Recorded at the ICS Live Lounge on Wednesday 23rd October at ICS 2024 Madrid.  Through its annual meeting and journal, the International Continence Society (ICS) has been advancing multidisciplinary continence research and education worldwide since 1971. Over 3,000 Urologists, Uro-gynaecologists, Physiotherapists, Nurses and Research Scientists make up ICS, a thriving society dedicated to incontinence and pelvic floor disorders. The Society is growing every day and welcomes you to join us. If you join today, you'll enjoy substantial discounts on ICS Annual Meeting registrations and free journal submissions. Joining ICS is like being welcomed into a big family. Get to know the members and become involved in a vibrant, supportive community of healthcare professionals, dedicated to making a real difference to the lives of people with incontinence.

The CyberWire
States struggle with cyber shift.

The CyberWire

Play Episode Listen Later Apr 23, 2025 34:49


The White House's shift of cybersecurity responsibilities to the states is met with skepticism. Baltimore City Public Schools suffer a ransomware attack. Russian state-backed hackers target Dutch critical infrastructure. Microsoft resolves multiple Remote Desktop issues. A new malware campaign is targeting Docker environments for cryptojacking. A new phishing campaign uses weaponized Word documents to steal Windows login credentials. Zyxel Networks issues critical patches for two high-severity vulnerabilities. CISA issues five advisories highlighting critical vulnerabilities in ICS systems. Our guest is Deputy Assistant Director Cynthia Kaiser from the FBI Cyber Division, sharing the findings of their latest IC3 report. So long, Privacy Sandbox.  Remember to leave us a 5-star rating and review in your favorite podcast app. Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you'll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn. CyberWire Guest Today we are joined by Deputy Assistant Director Cynthia Kaiser from the FBI Cyber Division, as she is sharing the findings of their latest IC3 report. Selected Reading Trump is shifting cybersecurity to the states, but many aren't prepared (Stateline) Baltimore City Public Schools report data breach (beyondmachines) Russia attempting cyber sabotage attacks against Dutch critical infrastructure (record) Microsoft fixes Remote Desktop freezes caused by Windows updates (bleepingcomputer) New Malware Hijacking Docker Images with Unique Obfuscation Technique (cybersecuritynews) Hackers Exploit Weaponized Word Docs to Steal Windows Login Credentials (gbhackers) Kelly Benefits Data Breach Impacts 260,000 People (SecurityWeek) Data Breach at Onsite Mammography Impacts 350,000 (SecurityWeek) Zyxel Patches Privilege Management Vulnerabilities in USG FLEX H Series Firewalls (cybersecuritynews) CISA Releases Five Advisories Covering ICS Vulnerabilities & Exploits (cybersecuritynews) RIP to the Google Privacy Sandbox (The Register) 2024 IC3 ANNUAL REPORT  Share your feedback. We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show.  Want to hear your company in the show? You too can reach the most influential leaders and operators in the industry. Here's our media kit. Contact us at cyberwire@n2k.com to request more info. The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc. Learn more about your ad choices. Visit megaphone.fm/adchoices

ICS Podcast
Exploring Neurological Signalling: Peptide Receptors, Vectors, and Toxins: ICS Live Lounge

ICS Podcast

Play Episode Listen Later Apr 23, 2025 10:53


Francis "Monty" Hughes hosts a conversation with Lysanne Campeau (presenter abstract #27) and Julien Ratelade (presenter abstract #33) about their research presented at ICS 2024 Madrid. Recorded at the ICS Live Lounge on Wednesday 23rd October at ICS 2024 Madrid. Through its annual meeting and journal, the International Continence Society (ICS) has been advancing multidisciplinary continence research and education worldwide since 1971. Over 3,000 Urologists, Uro-gynaecologists, Physiotherapists, Nurses and Research Scientists make up ICS, a thriving society dedicated to incontinence and pelvic floor disorders. The Society is growing every day and welcomes you to join us. If you join today, you'll enjoy substantial discounts on ICS Annual Meeting registrations and free journal submissions. Joining ICS is like being welcomed into a big family. Get to know the members and become involved in a vibrant, supportive community of healthcare professionals, dedicated to making a real difference to the lives of people with incontinence.

@BEERISAC: CPS/ICS Security Podcast Playlist
IoT Meetup #4: Mati Epstein Head of IoT & ICS Tech Sales @Checkpoint on IoT Security and Enforcement

@BEERISAC: CPS/ICS Security Podcast Playlist

Play Episode Listen Later Apr 18, 2025 54:17


Podcast: ICS Cyber Talks PodcastEpisode: IoT Meetup #4: Mati Epstein Head of IoT & ICS Tech Sales @Checkpoint on IoT Security and EnforcementPub date: 2025-04-15Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationהאם מכשירי האיי.או.טי שלך מאובטחים? אכיפה אוטומטית עם למידת מכונה מרצה: מתי אפשטיין, ראש מכירות טכנולוגיות האיי.או.טי ואיי.סי.אס , צ'ק פוינט ההרצאה זו מתמקדת בהיבט הרצוי ביותר של אבטחת "מכשירים מחוברים" - אכיפה! בהנחה שמכשירי האיי.או.טי ואיי.סי.אס פגיעים, קלים לפריצה ומקור לתנועה רוחבית זדונית ברשתות איי.טי ואוו.טי, צ'ק פוינט יוצרת באופן אוטונומי (ואוטומטי) מדיניות אבטחה בחומת האש בהתבסס על למידת מכונה, וכך מספקת אבטחה לכל נכס Are Your IoT Devices Secure? Automated Enforcement with Machine Learning Speaker: Mati Epstein, Head of IoT and ICS Technology Sales, CheckPoint This lecture is focused on the most desired aspect of “connected devices” security – Enforcement! Assuming IoT and ICS devices are vulnerable, easy to hack, and a source for malicious lateral movement in IT and OT networks, we will demonstrate how Check Point autonomously (and automatically) creates security policies in the perimeter (and segmentation) FWs, based on machine learning, and provides the best security per asset.The podcast and artwork embedded on this page are from Nachshon Pincu, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.

The Law & Education
Episode 73: ICS Updates and the First 70+ Days

The Law & Education

Play Episode Listen Later Apr 17, 2025 27:03


A lot of ground is covered during this informational episode of The Law and Education Podcast to bring listeners up to speed with the changes to Title IX, Diversity Equity and Inclusion (DEI), and federal funding under the current administration. It is also Sexual Assault Awareness Month, and our conversation touches on the role of Title IX in relation to this. Next, we discuss the recent announcements from the Department of Education and the process that lawmakers are required to follow in order to make changes to the 2020 Title IX regulations. We unpack how the Office for Civil Rights (OCR) is enforcing Title IX today, and how the Department of Education's recent order is affecting our institutions. Also included in this episode is a look at the Dear Colleague Letter and Family Educational Rights and Privacy Act (FERPA) investigation. It has been an unprecedented academic year, and ICS aims to keep everyone up to speed as best as possible. Join us for a broad overview of some key points affecting education today.  Key Points From This Episode: ICS's first Title IX Mental Health and School Safety Symposium. The training plan that ICS is finishing up for summer going into fall. Blueprints for different policies that ICS has made available.  What was covered in Episode 72: the initial impact of the current administration. Sexual Assault Awareness Month and Title IX.  Announcements from the Department of Education with respect to special needs funding, student loans, and more.  The process that must be followed for any changes to be made to the 2020 Title IX regulations. How OCR is enforcing Title IX today. The Department of Education's order that K-12 districts certify that they are ending any DEI practices as a condition for receiving federal money.  The Dear Colleague Letter and investigation into FERPA under California statute related to transgender parent notification.  What the most recent official freeze entails: 790 million in federal funding at North Western University.  How ICS is aiming to keep listeners up to speed with the many changes coming from the current administration. Links Mentioned in Today's Episode: Episode 72 Tuesday Takeaways Sexual Assault Awareness Month: Supporting Title IX Work Through Education and Community ICS Lawyer Higher Ed Community Access K-12 Community Access Higher Ed Virtual Certified IX Training K-12 Virtual Certified Title IX Training ICS Blog Courtney Bullard on X  Learn about Becoming a Community Partner

Hackaday Podcast
Ep 316: Soft Robots, Linux the Hard Way, Cellphones into SBCs, and the Circuit Graver

Hackaday Podcast

Play Episode Listen Later Apr 11, 2025 83:28


Join Hackaday Editors Elliot Williams and Tom Nardi as they talk about the best stories and hacks of the week. This episode starts off with a discussion of the Vintage Computer Festival East and Philadelphia Maker Faire -- two incredible events that just so happened to be scheduled for the same weekend. From there the discussion moves on to the latest developments in DIY soft robotics, the challenge of running Linux on 8-pin ICs, hardware mods to improve WiFi reception on cheap ESP32 development boards, and what's keeping old smartphones from being reused as general purpose computers. You'll also hear about Command and Conquer: Red Alert running on the Pi Pico 2, highly suspect USB-C splitters, and producing professional looking PCBs at home with a fiber laser. Stick around to the end to hear about the current state of non-Google web browsers, and a unique new machine that can engrave circuit boards with remarkable accuracy. Check out the links over on Hackaday if you want to follow along, and as always, tell us what you think about this episode in the comments!

Aspire: The Leadership Development Podcast
330. Elevating EdTech, AI, and Servant Leadership: Featuring Vicki Davis

Aspire: The Leadership Development Podcast

Play Episode Listen Later Apr 6, 2025 36:24


In this inspiring episode, Vicki Davis, veteran educator, edtech expert, and edublogger, joins me to explore the evolving world of educational technology and artificial intelligence in the classroom. Vicki shares how she teaches students to use AI art tools with prompt stacking techniques, discusses the importance of formative assessment, and explains how educators can reach every learner. We also dive into the mindset behind servant leadership, the value of collaboration in education, and why elevating others is key to lasting impact. With over 20 years of experience in edtech, Vicki brings wisdom, humility, and a powerful message about staying grounded while embracing innovation. About  Vicki Davis: Vicki Davis, known as the Cool Cat Teacher has been teaching Computer Science since 2002 and blogging at the Cool Cat Teacher blog since 2005. She teachers AP Computer Science Principles (100% pass rate last year) and digital film classes and is an IT Coach and works with technology integration K3-12th grade. Vicki has been a long time leader in the appropriate use of educational technology with a focus on reaching every child and achieving a healthy balance between screen time and face to face relationship building between teacher and student. She does use AI in the classroom and often discusses not only the tools but the appropriate uses of AI in the classroom. Vicki is host of the 10 Minute Teacher podcast and received the BAMMY award in 2016 for the top podcast host in education. She now also hosts a radio and TV show called “Cool Cat Teacher Talk.” Vicki has keynoted more than 50 edtech conferences around the world and at places like Google and Microsoft. In 2021 and 2022 she was named by ICS research as one of the top education influencers in the world and she's been a judge for the Million dollar Varkey Global Teacher Price since its inception. Vicki has written multiple books about collaborating globally and how to teach writing for the web in the classroom. Her greatest joy is her children, husband, faith, and her kitty cat Cheeto. Follow Vicki Davis: Website: https://www.coolcatteacher.com  Twitter (X): https://www.x.com/coolcatteacher  Instagram: https://www.instagram.com/coolcatteacher  Facebook: https://www.facebook.com/coolcatteacher  Linkedin: https://www.linkedin.com/in/coolcatteacher/  YouTube: https://www.youtube.com/coolcatteacher  Bluesky: https://bsky.app/profile/coolcatteacher.bsky.social Flipboard:

The CyberWire
Chrome & Firefox squash the latest flaws.

The CyberWire

Play Episode Listen Later Apr 2, 2025 30:28


Google and Mozilla patch nearly two dozen security flaws. The UK's Royal Mail Group sees 144GB of data stolen and leaked. A bizarre campaign looks to recruit cybersecurity professionals to hack Chinese websites. PostgreSQL servers with weak credentials have been compromised for cryptojacking. Google Cloud patches a vulnerability affecting its Cloud Run platform. Oracle faces a class-action lawsuit over alleged cloud services data breaches. CISA releases ICS advisories detailing vulnerabilities in Rockwell Automation and Hitachi Energy products. General Paul Nakasone offers a candid assessment of America's evolving cyber threats. On today's CertByte segment,  a look at the Cisco Enterprise Network Core Technologies exam. Are AI LLMs more like minds or mirrors? Remember to leave us a 5-star rating and review in your favorite podcast app. Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you'll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn. CertByte Segment Welcome to CertByte! On this bi-weekly segment hosted by Chris Hare, a content developer and project management specialist at N2K, we share practice questions from N2K's suite of industry-leading certification resources, this week, Chris is joined by Troy McMillan to break down a question targeting the Cisco Enterprise Network Core Technologies (350-401 ENCOR) v1.1 exam. Today's question comes from N2K's Cisco CCNP Implementing and Operating Cisco Enterprise Network Core Technologies ENCOR (350-401) Practice Test. The ENCOR exam enables candidates to earn the Cisco Certified Specialist - Enterprise Core certification, which can also be used to meet exam requirements for several other Cisco certifications. Have a question that you'd like to see covered? Email us at certbyte@n2k.com. If you're studying for a certification exam, check out N2K's full exam prep library of certification practice tests, practice labs, and training courses by visiting our website at n2k.com/certify.To get the full news to knowledge experience, learn more about our N2K Pro subscription at https://thecyberwire.com/pro.  Please note: The questions and answers provided here, and on our site, are not actual current or prior questions and answers from these certification publishers or providers. Additional source: https://www.cisco.com/site/us/en/learn/training-certifications/exams/encor.html   Selected Reading Chrome 135, Firefox 137 Patch High-Severity Vulnerabilities (SecurityWeek) Royal Mail Group Loses 144GB to Infostealers: Same Samsung Hacker, Same 2021 Infostealer Log (Infostealers) Someone is trying to recruit security researchers in bizarre hacking campaign (TechCrunch) Ongoing cryptomining campaign hits over 1.5K PostgreSQL servers (SC Media) ImageRunner Flaw Exposed Sensitive Information in Google Cloud (SecurityWeek) Google Brings End-to-End Encrypted Emails to All Enterprise Gmail Users (SecurityWeek) Oracle now faces class action amid alleged data breaches (The Register) CISA Releases Two ICS Advisories for Vulnerabilities, & Exploits Surrounding ICS (Cyber Security News) Exclusive: Gen. Paul Nakasone says China is now our biggest cyber threat (The Record) Large AI models are cultural and social technologies (Science) Share your feedback. We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show.  Want to hear your company in the show? You too can reach the most influential leaders and operators in the industry. Here's our media kit. Contact us at cyberwire@n2k.com to request more info. The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc. Learn more about your ad choices. Visit megaphone.fm/adchoices

The Women's Podcast
Meghan & Gwyneth / The real cost of cancer

The Women's Podcast

Play Episode Listen Later Mar 27, 2025 61:38


On Friday March 28th, the Irish Cancer Society (ICS) will celebrate Daffodil Day. It's the charity's biggest fundraising event and aims to raise millions of euros to support cancer patients and progress cancer research. In this episode, Kathy Sheridan is joined by Daffodil Day Ambassador Tara Doonan, who was diagnosed with breast cancer in 2022 at 36 years-old. Tara lives in Cavan but travelled to the Mater Hospital in Dublin for her treatment. In today's episode she talks about the shock of her diagnosis, the road to recovery and the financial impact of cancer, from travel and parking expenses, to the loss of income. Amy Nolan, Director of Clinical Affairs at ICS also joins the conversation to explain how the charity supports patients financially and what needs to change in order to limit costs for those undergoing treatment. But first Irish Times podcast presenter Bernice Harrison is here to discuss some of the biggest stories of the week including a frightening encounter at a Dublin hotel for influencer Chloe Koyce, the harassment of a University of Limerick student at her campus accommodation and the latest in the rumoured feud between Gwyneth Paltrow and Meghan Markle. Hosted on Acast. See acast.com/privacy for more information.

The CyberWire
No click, all tricks.

The CyberWire

Play Episode Listen Later Mar 26, 2025 30:42


Researchers uncover a new Windows zero-day. A covert Chinese-linked network targets recently laid-off U.S. government workers. Malicious npm packages are found injecting persistent reverse shell backdoors. A macOS malware loader evolves. DrayTek router disruptions affect users worldwide. A new report warns of growing cyber risks to the commercial space sector. CISA issues four ICS advisories. U.S. Marshals arrest a key suspect in a multi million dollar cryptocurrency heist. Our guest is Brian Levine, Co-Founder and CEO of FormerGov.com, speaking about creating a networking directory for former government and military professionals. The UK's NCSC goes full influencer to promote 2FA. Remember to leave us a 5-star rating and review in your favorite podcast app. Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you'll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn. CyberWire Guest Brian Levine, Co-Founder and CEO of FormerGov.com, speaking about the importance of networking and creating a directory for former government and military professionals. Selected Reading New Windows 0-Day Vulnerability Let Remote Attackers Steal NTLM Credentials - Unofficial Patch (cybersecuritynews) Exclusive: Secretive Chinese network tries to lure fired federal workers, research shows (Reuters) New npm attack poisons local packages with backdoors (bleepingcomputer) macOS Users Warned of New Versions of ReaderUpdate Malware (securityweek) DrayTek Routers Vulnerability Exploited in the Wild – Possibly Links to Reboot Loop (cybersecuritynews) ENISA Probes Space Threat Landscape in New Report (Infosecurity Magazine) CISA Warns of Four Vulnerabilities, and Exploits Surrounding ICS (cybersecuritynews) Crypto Heist Suspect "Wiz" Arrested After $243 Million Theft (hackread) NCSC taps influencers to make 2FA go viral (The Register)  Share your feedback. We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show.  Want to hear your company in the show? You too can reach the most influential leaders and operators in the industry. Here's our media kit. Contact us at cyberwire@n2k.com to request more info. The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc. Learn more about your ad choices. Visit megaphone.fm/adchoices

LSU NCBRT Preparedness Podcast
On-Scene Buildout: Key Response Elements

LSU NCBRT Preparedness Podcast

Play Episode Listen Later Mar 25, 2025 25:08


This is our third and final podcast about the Incident Command System with NCBRT/ACE instructors and subject matter experts Todd Short and Sam Shurley. In this episode, we talk about elements responders should keep in mind when they arrive on scene to contribute to a successful ICS structure, how to communicate with other teams on scene, and how to train to prepare for a wide-scale response to a threat.

The CyberWire
Brute force and broken trust.

The CyberWire

Play Episode Listen Later Mar 21, 2025 31:23


Over 150 government database servers are dangerously exposed to the internet. Threat actors are exploiting a vulnerability in CheckPoint's ZoneAlarm antivirus software. Albabat ransomware goes cross-platform. ESET reports on the Chinese Operation FishMedley campaign. VanHelsing ransomware targets Windows systems in the U.S. and France. CISA issues five ICS advisories warning of high-severity vulnerabilities across critical infrastructure systems. A former NFL coach is indicted for allegedly hacking into the accounts of thousands of college athletes. Brandon Karpf joins us with a look at cyberspace in space. A fraud detection firm gets shut down for fraud.  Remember to leave us a 5-star rating and review in your favorite podcast app. Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you'll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn. CyberWire Guest Brandon Karpf, friend of N2K CyberWire, joins T-Minus Space Daily host Maria Varmazis for the Space and Cyber March segment. Selected Reading Over 150 US Government Database Servers Vulnerable to Internet Exposure (GB Hackers) White House Shifting Cyber Risk to State and Local Agencies (Data Breach Today) Cybercriminals Exploit CheckPoint Driver Flaws in Malicious Campaign (Infosecurity Magazine) Albabat Ransomware Attacking Windows, Linux & macOS by Leveraging GitHub (Cyber Security News) Chinese I-Soon Hackers Hit 7 Organizations in Operation FishMedley (SecurityWeek) VanHelsing Ransomware Attacking Windows Systems With New Evasion Technique & File Extension (Cyber Security News) CISA Releases Five Industrial Control Systems Advisories Covering Vulnerabilities & Exploits (Cyber Security News) Former NFL, Michigan Assistant Coach Matt Weiss Charged With Hacking for Athletes' Intimate Photos (SecurityWeek) AdTech CEO whose products detected ad fraud jailed for fraud (The Register)  Share your feedback. We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show.  Want to hear your company in the show? You too can reach the most influential leaders and operators in the industry. Here's our media kit. Contact us at cyberwire@n2k.com to request more info. The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc. Learn more about your ad choices. Visit megaphone.fm/adchoices

Rádio Novelo Apresenta
Quem vê cara

Rádio Novelo Apresenta

Play Episode Listen Later Mar 20, 2025 60:50


As mentiras em que a gente quer acreditar. No primeiro ato: é fofo, mas morde. Por Bia Guimarães. No segundo ato: por trás das árvores do rei do carbono no Brasil. Por Vitor Hugo Brandalise e Fernanda Wenzel. A reportagem "O capitalista verde" teve o apoio do iCS, o Instituto Clima e Sociedade. Acesse este link da TAG - Experiências Literárias e escolha o clube que mais combina com você! Use o cupom NOVELO100 na assinatura dos planos anuais para ganhar frete grátis por 12 meses e assinando até 10/05 você recebe, na sua 1° caixinha, o novo romance da Chimamanda pelo clube TAG Inéditos e o livro escolhido por Edouard Louis pelo clube TAG Curadoria. Palavras-chave: vício; jogos de azar; crianças; grilagem de terras; Amazônia; créditos de carbono; greenwashing; desmatamento; corrupção; lavagem de dinheiro Learn more about your ad choices. Visit megaphone.fm/adchoices

Pet Sitter Confessional
579: From Legacy to Leadership with Lauren Dunkle

Pet Sitter Confessional

Play Episode Listen Later Mar 19, 2025 50:57


How do you build a thriving business while staying true to its legacy? Lauren Dunkle, owner of The Pet Lady, shares how she transformed her aunt's long-standing pet care business into her own while honoring its foundation. She opens up about the struggles of hiring and staff turnover, the transition from independent contractors to employees, and the power of clearly defined roles and SOPs. Lauren also discusses the emotional challenges of business ownership, from self-doubt to burnout, and how she reignited her passion by embracing new learning opportunities. Her story is a powerful example of how growth, structure, and personal fulfillment can coexist in a pet care business. Main topics: Hiring Challenges & Staff Turnover Transitioning from ICs to Employees Defining Roles & SOPs Balancing Growth & Legacy Staying Engaged as an Owner Main takeaway: “The lessons you learn as a business owner are things you'll never expect, but they shape you. It's overwhelming in the moment, but if I hadn't gone through the struggles, I wouldn't have the business I have today.” Every challenge in business feels impossible in the moment—hiring struggles, staff turnover, client conflicts, financial uncertainty. But each of these hurdles teaches us something vital. Lauren Dunkle's journey proves that the toughest moments are often the ones that push us to grow the most. Instead of fearing the hard times, embrace them as part of the process. Every setback refines your vision, strengthens your leadership, and ultimately builds a business that can stand the test of time.

The CyberWire
Balancing budget cuts and cybersecurity.

The CyberWire

Play Episode Listen Later Mar 14, 2025 32:50


The White House is urging federal agencies not to lay off cybersecurity teams. Google doesn't deny receiving a secret legal order from the UK government. Microsoft researchers identify a simple method to bypass AI safety guardrails. Scammers are impersonating the Clop ransomware gang. Cisco issues security advisories for multiple IOS XR vulnerabilities. CISA warns of multiple ICS security issues. A LockBit ransomware developer has been extradited to the U.S. GCHQ's former director calls for stronger cybersecurity collaboration. Rick Howard and Kim Jones pass the mic for the CISO Perspectives podcast. Sniffing out Stingrays. Remember to leave us a 5-star rating and review in your favorite podcast app. Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you'll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn. CyberWire Guest Today, we have Dave speaking with Rick Howard, a friend of the show, and Kim Jones, a veteran CISO, educator, and expert in the field, as Rick passes the mic to Kim for a brand new season of CISO Perspectives, formerly CSO Perspectives.  Selected Reading White House instructs agencies to avoid firing cybersecurity staff, email says (Reuters) Elon Musk Made Visit to U.S. Spy Agency (Wall Street Journal) Google refuses to deny it received encryption order from UK government (The Record) New Context Compliance Exploit Jailbreaks Major AI Models (GB Hackers) Fraudsters Impersonate Clop Ransomware to Extort Businesses (Infosecurity Magazine) Cisco Warns of IOS XR Software Vulnerability Let Attackers Trigger DoS condition (Cyber Security News) CISA Releases Thirteen Industrial Control Systems Focusing Vulnerabilities & Exploits (Cyber Security News) LockBit Ransomware Developer Extradited to US (SecurityWeek) Cyber Industry Falls Short on Collaboration, Says Former GCHQ Director  (Infosecurity Magazine) Meet Rayhunter: A New Open Source Tool from EFF to Detect Cellular Spying (Electronic Frontier Foundation) Share your feedback. We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show.  Want to hear your company in the show? You too can reach the most influential leaders and operators in the industry. Here's our media kit. Contact us at cyberwire@n2k.com to request more info. The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc. Learn more about your ad choices. Visit megaphone.fm/adchoices

FreightCasts
Running on Ice EP122 The Cell And Gene Therapy Cryogenic Cold Chain

FreightCasts

Play Episode Listen Later Mar 14, 2025 32:18


In this episode, we dive into the world of cryogenic storage and transportation of cell and gene therapy. Our guest, Krystal Haynes Senior Director International 3PL Business Development at ICS helps break down the complexities of cryogenic storage and the intricacies of CGT's. For more information subscribe to Running on Ice the newsletter or podcast. Follow the Running on Ice Podcast Other FreightWaves Shows Learn more about your ad choices. Visit megaphone.fm/adchoices

Unsolicited Response Podcast
Unsolicited Response with Maggie Morganti

Unsolicited Response Podcast

Play Episode Listen Later Mar 13, 2025 49:09


Dale Peterson discusses with Maggie how she got into OT security, her recent move to the Financial Sector, women in ICS security, and more.

The CyberWire
Orange you glad you didn't fall for this?

The CyberWire

Play Episode Listen Later Feb 25, 2025 33:18


A hacker claims to have stolen internal documents from  a major French telecommunications company. A security breach hits Russia's financial sector. Cyberattacks targeting ICS and OT surged dramatically last year. Chinese group Silver Fox is spoofing medical software. The UK Home Office's new vulnerability reporting policy risks prosecuting ethical hackers. Ransomware actors are shifting away from encryption. A sophisticated macOS malware campaign is distributing Poseidon Stealer. The LightSpy surveillance framework evolves into a cross-platform espionage tool. A Chinese botnet is targeting Microsoft 365 accounts using password spraying attacks. Our guest today is Lauren Buitta, Founder and CEO at Girl Security, discussing mentoring and intergenerational strategies. There may be a backdoor in your front door. Remember to leave us a 5-star rating and review in your favorite podcast app. Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you'll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn. CyberWire Guest Our guest today is Lauren Buitta, Founder and CEO at Girl Security, discussing mentoring and intergenerational strategies. Selected Reading Orange Group confirms breach after hacker leaks company documents (Bleeping Computer) Russia warns of breach of major IT service provider LANIT serving the financial sector (Beyond Machines)  Dragos: Surge of new hacking groups enter ICS space as states collaborate with private actors (CyberScoop) China's Silver Fox spoofs medical imaging apps to hijack patients' computers (The Register) UK Home Office's new vulnerability reporting mechanism leaves researchers open to prosecution (The Record) Only a Fifth of Ransomware Attacks Now Encrypt Data (Infosecurity Magazine) Poseidon Stealer Malware Attacking Mac Users via Fake DeepSeek Site (Cyber Security News)  Exploits for unpatched Parallels Desktop flaw give root on Macs (Bleeping Computer) LightSpy Malware Expands with 100+ Commands to Target Users Across All Major OS Platforms (GB Hackers)  Chinese Botnet Bypasses MFA in Microsoft 365 Attacks (Infosecurity Magazine) CISA Warns of Attacks Exploiting Oracle Agile PLM Vulnerability (SecurityWeek) A single default password exposes access to dozens of apartment buildings (TechCrunch) Share your feedback. We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show.  Want to hear your company in the show? You too can reach the most influential leaders and operators in the industry. Here's our media kit. Contact us at cyberwire@n2k.com to request more info. The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc. Learn more about your ad choices. Visit megaphone.fm/adchoices

The CyberWire
The political shake-up at the FBI.

The CyberWire

Play Episode Listen Later Feb 21, 2025 33:34


The Senate confirms Kash Patel as FBI director. The SEC rebrands its Crypto Assets and Cyber Unit. Microsoft's quantum chip signals an urgent need for post-quantum security. Chat log leaks reveal the inner workings of BlackBasta. CISA advisories highlight Craft CMS and ICS devices. Researchers release proof-of-concepts for Ivanti Endpoint Manager vulnerabilities. Warby Parker gets a $1.5 million HIPAA fine. Our guest is Steve Schmidt, Amazon CSO, with a behind the scenes look at securing a major event. Researchers explore the massive, mysterious YouTube wormhole. Remember to leave us a 5-star rating and review in your favorite podcast app. Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you'll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn. CyberWire Guest Our guest is Steve Schmidt, Amazon CSO, talking about integrating physical and logical security measures. Learn more: "Securing a city-sized event: How Amazon integrates physical and logical security at re:Invent." Selected Reading Trump loyalist Kash Patel is confirmed as FBI director by the Senate despite deep Democratic doubts (AP) SEC rebrands cryptocurrency unit to focus on emerging technologies (CyberScoop) Microsoft's Quantum Chip Breakthrough Accelerates Threat to Encryption (Infosecurity Magazine) BlackBasta Ransomware Chatlogs Leaked Online (Infosecurity Magazine) CISA Warns of Attacks Exploiting Craft CMS Vulnerability (SecurityWeek) CISA Releases 7 ICS Advisories Detailing Vulnerabilities & Exploits (Cyber Security News) Ivanti endpoint manager can become endpoint ravager (The Register) Feds Fine Eyeglass Retailer $1.5M for HIPAA Lapses in Hacks (GovInfo Security) How a computer that 'drunk dials' videos is exposing YouTube's secrets (BBC) Share your feedback. We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show.  Want to hear your company in the show? You too can reach the most influential leaders and operators in the industry. Here's our media kit. Contact us at cyberwire@n2k.com to request more info. The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc. Learn more about your ad choices. Visit megaphone.fm/adchoices

The CyberWire
Pennies for access.

The CyberWire

Play Episode Listen Later Feb 19, 2025 35:20


Credential theft puts sensitive corporate and military networks at risk. A federal judge refuses to block DOGE from accessing sensitive federal data. New York-based Insight Partners confirms a cyber-attack. BlackLock ransomware group is on the rise. OpenSSH patches a pair of vulnerabilities. Russian threat actors are exploiting Signal's “Linked Devices” feature. Over 12,000 GFI KerioControl firewalls remain exposed to a critical remote code execution (RCE) vulnerability.CISA issued two ICS security advisories. Federal contractors pay $11 million in cybersecurity noncompliance fines. In our CertByte segment, Chris Hare is joined by Steven Burnley to break down a question targeting the ISC2® SSCP - Systems Security Certified Practitioner exam.Sweeping cybercrime reforms are unveiled by…Russia? Remember to leave us a 5-star rating and review in your favorite podcast app. Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you'll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn. CertByte Segment Welcome to CertByte! On this bi-weekly segment hosted by Chris Hare, a content developer and project management specialist at N2K, we share practice questions from N2K's suite of industry-leading certification resources, for the past 25 years, N2K's practice tests have helped more than half a million IT and cyber security professionals reach certification success. Have a question that you'd like to see covered? Email us at certbyte@n2k.com. If you're studying for a certification exam, check out N2K's full exam prep library of certification practice tests, practice labs, and training courses by visiting our website at n2k.com/certify. Please note: The questions and answers provided here, and on our site, are not actual current or prior questions and answers from these certification publishers or providers. Additional source: https://www.isc2.org/certifications/sscp    Selected Reading Hundreds of US Military and Defense Credentials Compromised (Infosecurity Magazine) DOGE Team Wins Legal Battle, Retains Access to Federal Data (GovInfo Security) Musk Ally Demands Admin Access to System That Lets Government Text the Public (404 Media) Cyber Investor Insight Partners Suffers Security Breach (Infosecurity Magazine) BlackLock On Track to Be 2025's Most Prolific Ransomware Group (Infosecurity Magazine) Qualys reports two flaws in OpenSSH, one critical DDoS (Beyond Machines) Russian phishing campaigns exploit Signal's device-linking feature (Bleeping Computer) Over 12,000 KerioControl firewalls exposed to exploited RCE flaw (Bleeping Computer) CISA Releases Two New ICS Advisories Exploits Following Vulnerabilities (Cyber Security News) Managed healthcare defense contractor to pay $11 million over alleged cyber failings (The Record) Russian Government Proposes Stricter Penalties to Tackle Cybercrime (GB Hackers)  Share your feedback. We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. Want to hear your company in the show? You too can reach the most influential leaders and operators in the industry. Here's our media kit. Contact us at cyberwire@n2k.com to request more info. The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc. Learn more about your ad choices. Visit megaphone.fm/adchoices

Matt & Mattingly's Ice Cream Social
Episode 1184: Surviving Main Character Syndrome w/ Tyler West!

Matt & Mattingly's Ice Cream Social

Play Episode Listen Later Feb 17, 2025 94:48


Is appearing on ICS less challenging than doing an aerial act with a four-foot cone on your head? Ask our guest, the talented Tyler West! Tyler regales us with stories of his performances at Mavericks and Atomic Saloon, plus pantomine in NYC and a traveling circus in England. We swap stories about annoying audience members, and do some Scoop Mail and a Scoopardy.

The CyberWire
AI's blind spots need human eyes.

The CyberWire

Play Episode Listen Later Feb 14, 2025 34:10


Nakasone addresses AI at the Munich Cyber Security Conference. Court documents reveal the degree to which DOGE actually has access. Dutch police dismantle a bulletproof hosting operation. German officials investigate Apple's App Tracking. Hackers exploited security flaws in BeyondTrust. CISA issues 20 new ICS advisories. The new Astoroth phishing kit bypasses 2FA. Hackers waste no time exploiting a SonicWall proof-of-concept vulnerability. Our guest today is Lawrence Pingree, VP of Technical Marketing at Dispersive, joining us to discuss why preemptive defense is essential in the AI arms race. Have I Been Pwned ponders whether resellers are worth the trouble.  Remember to leave us a 5-star rating and review in your favorite podcast app. Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you'll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn. CyberWire Guest Our guest today is Lawrence Pingree, VP of Technical Marketing at Dispersive, joining us to discuss why preemptive defense is essential in the AI arms race. You can read more in "How Cybercriminals Are Using AI: Exploring the New Threat Landscape." Selected Reading Putting the human back into AI is key, former NSA Director Nakasone says (The Record) Court Documents Shed New Light on DOGE Access and Activity at Treasury Department (Zero Day) Musk's DOGE team: Judges to consider barring it from US government systems (Reuters) Anyone Can Push Updates to the DOGE.gov Website (404 Media) Dutch Police seizes 127 XHost servers, dismantles bulletproof hoster (Bleeping Computer) Apple app tracking rules more strict for others – watchdog (The Register) PostgreSQL flaw exploited as zero-day in BeyondTrust breach (Bleeping Computer) CISA Releases 20 ICS Advisories Detailing Vulnerabilities & Exploits (Cyber Security News)  Astaroth 2FA Phishing Kit Targets Gmail, Yahoo, Office 365, and Third-Party Logins (GB Hackers)  SonicWall Firewall Vulnerability Exploited After PoC Publication (SecurityWeek) Have I Been Pwned likely to ban resellers (The Register) Share your feedback. We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show.  Want to hear your company in the show? You too can reach the most influential leaders and operators in the industry. Here's our media kit. Contact us at cyberwire@n2k.com to request more info. The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc. Learn more about your ad choices. Visit megaphone.fm/adchoices

The CyberWire
DOGE days numbered?

The CyberWire

Play Episode Listen Later Feb 5, 2025 33:14


The DOGE team faces growing backlash. The Five Eyes release guidance on protecting edge devices. A critical macOS kernel vulnerability allows privilege escalation, memory corruption, and kernel code execution. Google and Mozilla release security updates for Chrome and Firefox. Multiple Veeam backup products are vulnerable to man-in-the-middle attacks. Zyxel suggests you replace those outdated routers. A former Google engineer faces multiple charges for alleged corporate espionage. CISA issues nine new advisories for ICS vulnerabilities. A house Republican introduces a cybersecurity workforce scholarship bill. On our CertByte segment, a look at ISC2's CISSP exam. Google updates its stance on AI weapons.  Remember to leave us a 5-star rating and review in your favorite podcast app. Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you'll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn. CertByte Segment Welcome to CertByte! On this bi-weekly segment hosted by Chris Hare. This week, Chris is joined by Steven Burnley to break down a question targeting ISC2®'s CISSP - Certified Information Systems Security Professional) exam. Today's question comes from N2K's ISC2® CISSP - Certified Information Systems Security Professional Practice Test. Have a question that you'd like to see covered? Email us at certbyte@n2k.com. If you're studying for a certification exam, check out N2K's full exam prep library of certification practice tests, practice labs, and training courses by visiting our website at n2k.com/certify. Please note: The questions and answers provided here, and on our site, are not actual current or prior questions and answers from these certification publishers or providers. Selected Reading Federal Workers Sue to Disconnect DOGE Server (WIRED) Treasury says DOGE review has ‘read-only' access to federal payments system (The Record) ‘Things Are Going to Get Intense:' How a Musk Ally Plans to Push AI on the Government (404 Media) Cybersecurity, government experts are aghast at security failures in DOGE takeover (CyberScoop) Five Eyes Launch Guidance to Improve Edge Device Security (Infosecurity Magazine) Apple's MacOS Kernel Vulnerability Let Attackers Escalate Privileges - PoC Released (Cyber Security News)  Chrome 133, Firefox 135 Patch High-Severity Vulnerabilities (SecurityWeek) Critical Veeam Vulnerability (CVE-2025-23114) Exposes Backup Servers to Remote Code Execution (SOCRadar) Router maker Zyxel tells customers to replace vulnerable hardware exploited by hackers (TechCrunch) US cranks up espionage charges against ex-Googler accused of trade secrets heist (The Register) CISA Releases Nine Advisories Detailing vulnerabilities and Exploits Surrounding ICS (Cyber Security News) CISA hires former DHS CIO into top cyber position (Federal News Network) Proposal for federal cyber scholarship, with service requirement, returns in House (The Record) Google drops pledge not to use AI for weapons or surveillance (Washington Post) Share your feedback. We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show.  Want to hear your company in the show? You too can reach the most influential leaders and operators in the industry. Here's our media kit. Contact us at cyberwire@n2k.com to request more info. The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc. Learn more about your ad choices. Visit megaphone.fm/adchoices