Podcasts about Remote access

  • 198PODCASTS
  • 378EPISODES
  • 53mAVG DURATION
  • 1MONTHLY NEW EPISODE
  • Nov 8, 2025LATEST

POPULARITY

20172018201920202021202220232024


Best podcasts about Remote access

Latest podcast episodes about Remote access

@BEERISAC: CPS/ICS Security Podcast Playlist
When IT Security Meets OT Reality: Why One Size Doesn't Fit All

@BEERISAC: CPS/ICS Security Podcast Playlist

Play Episode Listen Later Nov 8, 2025 33:27


Podcast: Industrial Cybersecurity InsiderEpisode: When IT Security Meets OT Reality: Why One Size Doesn't Fit AllPub date: 2025-11-05Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationWhat happens when IT cybersecurity practices collide with OT operational realities? In this episode, Jim and Dino expose the costly mistakes organizations make when applying IT security playbooks to manufacturing environments.Discover why zero trust architectures can halt production, how shadow IT thrives on every plant floor, and why remote access policies designed for corporate networks fail in industrial settings. Learn the critical importance of OT-tailored asset inventories, the need for IT/OT collaboration, and why digital safety must be treated with the same urgency as physical safety.If you're struggling to bridge the gap between IT security mandates and OT operational needs—or if you've ever watched a well-intentioned security policy bring production to a halt—this episode is your roadmap to getting it right.Chapters:(00:00:00) - Introduction and Episode Overview(00:01:19) - IT vs OT Security Mindsets(00:02:03) - Zero Trust Challenges in OT Environments(00:05:12) - Remote Access and Change Management Conflicts(00:09:00) - Who Should Learn from Whom: IT or OT?(00:10:23) - Asset Inventory: What OT Engineers Don't Know(00:15:00) - Process Integrity and Operational Value(00:21:57) - Shadow IT: The Backdoors Nobody Talks About(00:26:00) - Designing Security Into New Equipment(00:28:00) - Digital Safety vs Physical SafetyLinks And Resources:Want to Sponsor an episode or be a Guest? Reach out here.Industrial Cybersecurity Insider on LinkedInCybersecurity & Digital Safety on LinkedInBW Design Group CybersecurityDino Busalachi on LinkedInCraig Duckworth on LinkedInJim Cook on LinkedInThanks so much for joining us this week. Want to subscribe to Industrial Cybersecurity Insider? Have some feedback you'd like to share? Connect with us on Spotify, Apple Podcasts, and YouTube to leave us a review!The podcast and artwork embedded on this page are from Industrial Cybersecurity Insider, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.

WWL First News with Tommy Tucker
Project NOLA blocks NOPD's remote access to crime cameras

WWL First News with Tommy Tucker

Play Episode Listen Later Oct 2, 2025 7:34


Bryan Lagarde joins Tommy to talk about the crime camera access from Project Nola.

Papo Pro ACBr
Como transformar software legado em SaaS e criar receita recorrente com o TSplus Remote Access

Papo Pro ACBr

Play Episode Listen Later Sep 5, 2025 66:00


Descubra como modernizar seu sistema desktop sem reescrever tudo do zero. Neste episódio, você vai entender os desafios dos softwares legados e como o TSplus Remote Access pode ser a chave para criar uma solução SaaS escalável e lucrativa.Ideal para desenvolvedores que querem receita recorrente, menos suporte técnico e mais competitividade no mercado.Convidados: João Mota, Executivo de Contas da TSplus

@BEERISAC: CPS/ICS Security Podcast Playlist
Shlomo Eshed Founder & CEO @Romtrex about Industrial Automation OT cyber & Secure Remote Access

@BEERISAC: CPS/ICS Security Podcast Playlist

Play Episode Listen Later Aug 31, 2025 44:06


Podcast: ICS Cyber Talks PodcastEpisode: Shlomo Eshed Founder & CEO @Romtrex about Industrial Automation OT cyber & Secure Remote AccessPub date: 2025-08-28Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationאני יכול להגיד בביטחון שמרבית אנשי הסייבר שעוסקים במערכות תפעוליות מגיעים ממערכות המידע ולמדו את תחום הבקרה, ללא הבנה של תחום הבקרה לעומק ההגנות יהיו מתוך התפיסה של מערכות מידע טעות מוכרת של הרבה מנהלי מערכות מידע ומנהלי אבטחת מידע בסביבות תפעוליות. משב רוח מרענן הם אנשי בקרה שנכנסו גם לתחום הסייבר, במסגרת המסע שלי למציאת פתרונות גישה מאובטחת מרחוק למערכות תפעוליות מצאתי פתרון נפלא אבל יותר חשוב מצאתי מומחה בקרה שטבל את ידיו בקלחת הרותחת של סייבר כדי לתת פתרון ללקוחותיו כבר משלב התכנון ועד סיום הביצוע. נחשון פינקו מארח את שלמה אשד מייסד ומנכ"ל רומטרקס בשיחה על סייבר בעולמות התפעולים מנקודת מבט של מומחה בקרה והצורך בפתרונות הגנה ייעודיים. Most cyber professionals who deal with operational systems come from information systems and studied the control field. Without an in-depth understanding of the control field, defenses will be based on the perception of information systems —a common mistake among IT managers and information security managers in operational environments. A refreshing breath of fresh air are control professionals who have also entered the cyber field. As part of my journey to find secure remote access solutions for operational systems, I found an excellent solution. Still, more importantly, I found a control expert who has dipped his hands into the boiling cauldron of cyber to provide a solution to his clients from the planning stage to the end of execution. Nachshon Pincu hosts Shlomo Eshed, founder and CEO of Romtrex, in a conversation about cyber in the world of operations from the perspective of a control expert and the need for dedicated protection solutions. And more ועודThe podcast and artwork embedded on this page are from Nachshon Pincu, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.

ICS Cyber Talks Podcast
Shlomo Eshed Founder & CEO @Romtrex about Industrial Automation OT cyber & Secure Remote Access

ICS Cyber Talks Podcast

Play Episode Listen Later Aug 28, 2025 44:06


אני יכול להגיד בביטחון שמרבית אנשי הסייבר שעוסקים במערכות תפעוליות מגיעים ממערכות המידע ולמדו את תחום הבקרה, ללא הבנה של תחום הבקרה לעומק ההגנות יהיו מתוך התפיסה של מערכות מידע טעות מוכרת של הרבה מנהלי מערכות מידע ומנהלי אבטחת מידע בסביבות תפעוליות. משב רוח מרענן הם אנשי בקרה שנכנסו גם לתחום הסייבר, במסגרת המסע שלי למציאת פתרונות גישה מאובטחת מרחוק למערכות תפעוליות מצאתי פתרון נפלא אבל יותר חשוב מצאתי מומחה בקרה שטבל את ידיו בקלחת הרותחת של סייבר כדי לתת פתרון ללקוחותיו כבר משלב התכנון ועד סיום הביצוע. נחשון פינקו מארח את שלמה אשד מייסד ומנכ"ל רומטרקס בשיחה על סייבר בעולמות התפעולים מנקודת מבט של מומחה בקרה והצורך בפתרונות הגנה ייעודיים. Most cyber professionals who deal with operational systems come from information systems and studied the control field. Without an in-depth understanding of the control field, defenses will be based on the perception of information systems —a common mistake among IT managers and information security managers in operational environments. A refreshing breath of fresh air are control professionals who have also entered the cyber field. As part of my journey to find secure remote access solutions for operational systems, I found an excellent solution. Still, more importantly, I found a control expert who has dipped his hands into the boiling cauldron of cyber to provide a solution to his clients from the planning stage to the end of execution. Nachshon Pincu hosts Shlomo Eshed, founder and CEO of Romtrex, in a conversation about cyber in the world of operations from the perspective of a control expert and the need for dedicated protection solutions. And more ועוד

HeroicStories
Why Disabling Remote Access Doesn’t, and What to Do Instead

HeroicStories

Play Episode Listen Later Jul 25, 2025 5:31


Turning off remote access in Windows might feel safe, but it doesn't block the kind of access scammers use. I'll show you why those settings aren't enough, how remote scams really work, and what simple habits will actually keep your computer secure.

Talos Takes
Why Attackers Love Your Remote Access Tools

Talos Takes

Play Episode Listen Later Jul 17, 2025 14:22


Attackers are increasingly abusing the same remote access tools that IT teams rely on every day. In this episode, Hazel sits down with Talos security researcher Pierre Cadieux to unpack why these legitimate tools have become such an effective tactic for adversaries.Pierre explains how the flexibility, legitimacy, and built-in capabilities of remote access management tools make them ideal for attackers who want to stay under the radar. They discuss trends Talos Incident Response is seeing in the field, examples of commonly abused tools, and the challenges defenders face when trying to detect misuse.You'll also hear practical advice on what defenders and IT teams can do today to better secure their environments — and what the rise of remote access management tool abuse tells us about attacker behavior and the current state of cybercrime.Resources mentioned:Talos Incident Response Quarterly Trends ReportWhen Legitimate Tools Go Rogue (Talos Blog)

QB Power Hour Podcast
Client Collaboration: Accessing QuickBooks Client Data

QB Power Hour Podcast

Play Episode Listen Later Jul 8, 2025 57:41 Transcription Available


Mathew and Dan will be discuss that variety of ways to work with clients QuickBooks files in Online and Desktop. We will be joined by our friends at Qbox to take a closer look at how this option works.Learn About Qbox - https://snip.ly/SOBQBoxQB Power Hour is a free, biweekly webinar series for accountants, ProAdvisors, CPAs, bookkeepers and QuickBooks consultants presented by Dan DeLong and Matthew Fulton who are very passionate about the industry, QuickBooks and apps that integrate with QuickBooks.Earn CPE through Earmark: https://bit.ly/QBPHCPEWatch or listen to all of the QB Power Hours at https://www.qbpowerhour.com/blogRegister for upcoming webinars at https://www.qbpowerhour.com/00:00 Introduction to QB Power Hour Webinar Series00:28 Housekeeping Tips and Resources01:02 Earning Continuing Professional Education Credit02:08 Technical Difficulties and Panelist Introduction02:49 Client Collaboration in QuickBooks Desktop05:57 Introduction of Sarah and Her Background13:19 Intuit News and Pricing Changes19:14 Working with Clients in QuickBooks Online26:22 Accountant Tools in QuickBooks Desktop31:45 The Ping Pong of File Transfers32:39 Challenges of File Restoration33:58 Remote Access and Screen Sharing34:19 Accountant Copy Process36:57 Web Service for File Transfers38:55 Issues with Accountant's Copy41:54 Journal Entries as a Backup42:47 On-Site Work vs. Cloud Hosting46:59 Remote Access Solutions48:46 Introduction to Q Box49:42 How Q Box Works55:23 Benefits of Q Box57:38 Conclusion and Next Steps

Double Tap Canada
Speech Radio Shutdown, NVDA & Victor Reader Updates & The Future of Tactile Graphics

Double Tap Canada

Play Episode Listen Later Jun 16, 2025 56:28


In this episode of Double Tap, Steven and Shaun dive into the latest tech updates and accessibility news, including a deep conversation with Matthew Horspool from the Tactile Reading and Graphics Conference in Amsterdam.Thanks to Turtleback Low Vision for sponsoring this episode of Double Tap. As a thank you to the Double Tap community, Turtleback is offering 12% off your entire order with promo code DT12. Visit https://www.turtlebacklv.com to shop the full lineup!Steven battles through a cold to bring you a packed show covering everything from accessible streaming frustrations to major updates in screen readers and hardware for blind users. The episode features a thoughtful listener question about choosing a braille note taker for work, with expert guidance from Matthew Horspool of the Braillists Foundation. Matthew also shares insights from the Tactile Reading and Graphics Conference, focusing on the future of tactile graphics, braille technology, and the balance between high-end devices like the Monarch and affordable tactile tools for home and education.You'll also hear reactions to the closure of the Speech Radio app, detailed reviews of Victor Reader Stream and NVDA updates, and an important discussion on how blind users can engage with tactile and visual learning in modern tech environments.Chapters00:00 - Introduction00:59 - Steven has a cold!02:31 - Shaun's weekend!09:27 - CoPilot Vision availalbe now to US customers of Microsoft13:27 - Speech Radio app is being closed down14:45 - Statement from British Wireless for the Blind fund18:43 - Victor Reader Stream Gets 1.5 Software Update21:32 - NVDA gets big update with built in Remote Access feature25:20 - Sponsor: Turtleback26:11 - Matthew Horspool on the Tactile Reading and Graphics Conference26:50 - Listener question from Karen on buying a braille display Find Double Tap online: YouTube, Double Tap Website---Follow on:YouTube: https://www.doubletaponair.com/youtubeX (formerly Twitter): https://www.doubletaponair.com/xInstagram: https://www.doubletaponair.com/instagramTikTok: https://www.doubletaponair.com/tiktokThreads: https://www.doubletaponair.com/threadsFacebook: https://www.doubletaponair.com/facebookLinkedIn: https://www.doubletaponair.com/linkedin Subscribe to the Podcast:Apple: https://www.doubletaponair.com/appleSpotify: https://www.doubletaponair.com/spotifyRSS: https://www.doubletaponair.com/podcastiHeadRadio: https://www.doubletaponair.com/iheart About Double TapHosted by the insightful duo, Steven Scott and Shaun Preece, Double Tap is a treasure trove of information for anyone who's blind or partially sighted and has a passion for tech. Steven and Shaun not only demystify tech, but they also regularly feature interviews and welcome guests from the community, fostering an interactive and engaging environment. Tune in every day of the week, and you'll discover how technology can seamlessly integrate into your life, enhancing daily tasks and experiences, even if your sight is limited. "Double Tap" is a registered trademark of Double Tap Productions Inc.

Cybercrime Magazine Podcast
Ransomware Risk Report. Protecting Remote Access Areas. Adam Keown, Global CISO, Eastman.

Cybercrime Magazine Podcast

Play Episode Listen Later May 6, 2025 3:04


From 2023 to 2024, ransomware has seen a 67 percent jump, with an average payment of $2 million and another $2.7 million in recovery costs for most companies that are hit by an attack. Fortunately, there are multiple steps businesses can take to lower the risk of being a victim. In this episode, Adam Keown, global CISO at Eastman, joins host Heather Engel to discuss how organizations can protect their remote access areas. • For more on cybersecurity, visit us at https://cybersecurityventures.com

Oh, My Health...There Is Hope!
Revolutionizing Children's Dental Health: Early Intervention and Nasal Breathing with Dr. Ben Miraglia

Oh, My Health...There Is Hope!

Play Episode Listen Later Mar 29, 2025 26:39


"Mouth breathing is putting bad gasoline into a high-performance race car." - Dr. Ben Miraglia Dr. Ben Miraglia is a renowned dentist with over three decades of experience since graduating from SUNY at Buffalo School of Dental Medicine in 1993. He serves as the Chief Clinical Officer at Airway Health Solutions and Toothpillow, both organizations dedicated to improving dental and airway health. Dr. Miraglia is also on the Board of Directors of the American Academy of Physiological Medicine and Dentistry. He is a key player in transformative dental treatments focusing on physiological growth and airway success without the extraction of teeth. Episode Summary: In this enlightening episode of "Oh, My Health... There Is Hope," host Jana Short sits down with Dr. Ben Miraglia, a trailblazer in the field of dentistry focusing on airway health and pediatric orthodontics without extraction. Dr. Miraglia narrates his journey from being a traditional dentist to discovering expansive orthodontic solutions that avoid tooth extraction and promote better health outcomes. His story of hope is packed with professional insights that will appeal to parents seeking healthier alternatives for children's dental care. Dr. Miraglia's innovative approach advocates early intervention in dental growth, starting as young as three years old, to prevent common issues associated with traditional methods like extracting teeth for orthodontic purposes. Highlighting the profound connection between correct nasal breathing, jaw development, and overall health, this episode offers invaluable information for parents aiming for holistic health solutions for their children. With the development of Toothpillow, Dr. Miraglia extends his expertise globally, providing remote dental care that focuses on growth and natural development rather than immediate corrective remedies. Key Takeaways: Early Intervention: Begin addressing dental development as early as age 3 to promote proper jaw growth and prevent long-term orthodontic issues. Avoid Tooth Extraction: Tooth extraction can lead to bone loss and collapse. Focus instead on techniques that preserve natural tooth structure. Nasal Breathing and Oral Health: Proper nasal breathing is vital for physical health; mouth breathing can lead to various health issues in children. Remote Access to Care: Toothpillow.com provides access to remote assessments and care for children, bridging gaps where local resources may be limited. Educational Resources for Parents: Parents are encouraged to research and choose airway-focused dental professionals who support growth-based orthodontics. Resources www.toothpillow.com @‌toothpilllow_official @‌drbenmiraglia Get in touch with Jana and listen to more Podcasts: https://www.janashort.com/ Show Music ‘Hold On' by Amy Gerhartz: https://www.amygerhartz.com/music. Get the Best Holistic Life Magazine Subscription! One of the fastest-growing independent magazines centered around holistic living. https://bestholisticlife.info/Subscription Grab your gift today: https://www.janashort.com/becoming-the-next-influencers-download-offer/ Connect with Jana Short: https://www.janashort.com/contact/

The Underground Lounge
After Hours: Remote Access, Wild Nights, Hollywood Snubs & More | The Underground Lounge

The Underground Lounge

Play Episode Listen Later Mar 16, 2025 100:37


The Underground Lounge After Hours is back, and things get wild in this no-holds-barred episode. Lou, Spank and Holly dive into outrageous vacation stories, strip club politics, and the chaos that comes with picking the wrong plus-one for a night out. From VIP section power moves to the real cost of bottle service, they break down the dos and don'ts of nightlife like only they can.Then, things heat up when they take on Hollywood's ranking of the greatest Black actors. Is Will Smith getting snubbed? Does Samuel L. Jackson deserve a higher spot? And who needs to be taken off the list entirely? The debate gets ruthless as they rewrite the rankings and call out the industry's biggest oversights.From deep NBA discussions to hilarious personal stories and unexpected debates, this episode of After Hours is the perfect mix of raw comedy, real talk, and unpredictable moments. Buckle up,it's about to get wild!

Down to the Struts
Introducing the Remote Access Archives (and season 4 of the Contra* podcast)

Down to the Struts

Play Episode Listen Later Jan 28, 2025 5:57


The team at Down to the Struts is thrilled to share the trailer for Season 4 of Contra*! This season, Aimi Hamraie and the Critical Design Lab share oral history interviews from the Remote Access Archives. At the start of the COVID-19 pandemic, they spoke with scholars and activists about mutual aid and pandemic times.  This season, they'll be sharing some of these conversations. Aimi Hamraie, Cavar, Jen White-Johnson, Jiya Pandya, Julia Rose Karpicz, Katie Sullivan, and our very own Down to the Struts creator and host, Qudsiya Naqui, contributed to this season's introduction. Contributors to the episodes include: Hector Ramirez, Thomas Reid, moira williams, Qudsiya Naqui, Corbett O'Toole, Sky Cubacub, Katie Goldfinch, Brian Lobel, Susan Molloy, and India Harville. And don't forget to submit your Down to the Struts audio and written testimonials! We want to hear from you about what our podcast means to you, and the impact it's had in your life. Please share your audio files or written comments to downtothestruts@gmail.com. We hope to share your reflections during season 10! ⁠⁠⁠⁠⁠⁠⁠⁠Visit our website⁠ ⁠for transcripts.⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ -- Subscribe to Qudsiya's Substack, ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Getting Down To It Support the team behind the podcast ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠with a donation Let us know what you think with a comment or review on Apple podcasts.⁠⁠⁠⁠⁠⁠⁠⁠⁠

@BEERISAC: CPS/ICS Security Podcast Playlist
119: Revealing the OT Threat Landscape: Remote Access, Supply Chain, and Lateral Movement

@BEERISAC: CPS/ICS Security Podcast Playlist

Play Episode Listen Later Dec 17, 2024 19:37


Podcast: (CS)²AI Podcast Show: Control System Cyber SecurityEpisode: 119: Revealing the OT Threat Landscape: Remote Access, Supply Chain, and Lateral MovementPub date: 2024-12-17Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationOur host Derek Harp sits down with Adam Robbie, Head of OT Threat Research at Palo Alto Networks, live from Hack the Capitol 7.0. Adam shares critical insights into emerging cybersecurity challenges within Operational Technology (OT) environments, including findings from Palo Alto's extensive OT threat landscape research.Listeners will hear about the top attack vectors impacting critical infrastructure: remote access vulnerabilities, supply chain risks, and lateral movement across networks. Adam discusses the importance of network segmentation, cross-team collaboration between IT and OT, and innovative tools like the Cyberwall, a hands-on demonstration environment showcasing real-world OT threats.Whether you're an OT security professional or new to the field, this episode delivers practical takeaways to enhance your cybersecurity strategies. Don't miss this engaging conversation focused on securing control systems and building stronger, collaborative defenses.The podcast and artwork embedded on this page are from Derek Harp, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.

Control System Cyber Security Association International: (CS)²AI
119: Revealing the OT Threat Landscape: Remote Access, Supply Chain, and Lateral Movement

Control System Cyber Security Association International: (CS)²AI

Play Episode Listen Later Dec 17, 2024 19:37


Our host Derek Harp sits down with Adam Robbie, Head of OT Threat Research at Palo Alto Networks, live from Hack the Capitol 7.0. Adam shares critical insights into emerging cybersecurity challenges within Operational Technology (OT) environments, including findings from Palo Alto's extensive OT threat landscape research.Listeners will hear about the top attack vectors impacting critical infrastructure: remote access vulnerabilities, supply chain risks, and lateral movement across networks. Adam discusses the importance of network segmentation, cross-team collaboration between IT and OT, and innovative tools like the Cyberwall, a hands-on demonstration environment showcasing real-world OT threats.Whether you're an OT security professional or new to the field, this episode delivers practical takeaways to enhance your cybersecurity strategies. Don't miss this engaging conversation focused on securing control systems and building stronger, collaborative defenses.

XenTegra XenCast
Citrix VDA for macOS: Revolutionizing Remote Access for Developers and Creatives

XenTegra XenCast

Play Episode Listen Later Oct 8, 2024 31:01 Transcription Available


In this episode of The Citrix Session (Episode 170), host Bill Sutton is joined by Andy Whiteside, CEO of XenTegra, Citrix experts Jeremy Myers and Todd Smith, to discuss the exciting new capabilities of Citrix Virtual Delivery Agent (VDA) for macOS. Dive into how this game-changing feature enables Mac environments to be remotely accessed with the same efficiency as other platforms, perfect for developers, video professionals, and education institutions.Tune in to learn:How Citrix VDA for macOS brings Macs into the fold of remote desktop solutionsKey use cases, including developer environments, multimedia professionals, and educationIntegration with platforms like MacStadium and Amazon EC2 Mac instancesLicensing models and platform compatibilityHow this innovation highlights Citrix's continued investment in cutting-edge technologyExplore how Citrix is meeting customer demands while setting the standard for the future of remote access!

Double Tap Canada
Envision's New ‘Ally' Feature Is Now In Beta

Double Tap Canada

Play Episode Listen Later Sep 20, 2024 56:11


Today on the show Steven and Shaun find out about a new feature from Envision called Ally that acts as your personal assistant for performing tasks and giving you information.Karthik Karnan, the founder and CTO of Envision, joins the guys to chat about its more personalised approach to assistance, with the ability to use the service across phone, glasses and the web soon. You can sign up for the beta of Ally right now.There's also more of your feedback including an interesting email from listener James on his views on the value and necessity of braille, furthering our own discussion recently on the topic. Also, following Graham's request for information about quiet talking clocks, we find ourselves with a doctor in the house - Doctor Clock himself from the Talking Watch Shop in the UK.Doctor Clock tells us about and demonstrates the TC-100 and VTC-03 clocks on sale. You can find out more by visiting Talking Watch Shop online or call 0345 00 40 100.Get in touch with Double Tap by emailing us feedback@doubletaponair.com or by call 1-877-803-4567 and leave us a voicemail. You can also find us across social media. Double Tap is available daily on AMI-audio across Canada, on podcast worldwide and now on YouTube.Chapter Markers:0:00- -Intro5:31 - Double Tap WhatsApp is Coming6:00 - Aira Launches on Meta Ray-Ban Glasses in Beta7:24 - Getting Support Using RIMM12:34 - E-mail - Graham on Loud Alarm Clocks13:21 - E-mail - Dr Clock Helps Graham with Talking Clocks17:54 - E-mail - James on Braille23:42 - Contact Us23:53 - Karthik on the Envision Ally AI Voice AssistantYouTube Adjustment. ((Approx)26:30 - Karthik on the Envision Ally AI Voice Assistant

The Cloudcast
How DevOps is helping to rethink the need for VPNs with Modern Security

The Cloudcast

Play Episode Listen Later Aug 28, 2024 34:21


Emrul Islam (Head of Platform Innovation @TwingateHQ) talks about the evolution of remote access, application security, and enabling DevOps teams to drive security transformation.  SHOW: 851SHOW TRANSCRIPT: The Cloudcast #851 TranscriptCLOUD NEWS OF THE WEEK - http://bit.ly/cloudcast-cnotwNEW TO CLOUD? CHECK OUT OUR OTHER PODCAST - "CLOUDCAST BASICS" SHOW NOTES:How Twingate WorksTwingate vs. VPNsArchitecting Network Connectivity for a Zero Trust FutureSolving the usability problem to unlock Zero Trust adoptionReddit link: https://www.reddit.com/r/twingate/ Signup for Twingate for freeTopic 1 - Welcome to the show. Topic 2 - To properly solve cloud access & security pain points, companies need a tool that works for IT, DevOps, & Security teamsWhat are the challenges when trying to secure cloud access today?What role do each of the stakeholders play in addressing these?How much can technology really help address these challenges?Topic 3 - How is Twingate architected differently to address these new challenges?How do existing systems work?What sort of architecture is required?Topic 4 - Why is it a struggle to get these teams aligned on the right solutionIs there a disconnect between competing requirements and security?Topic 5 - What is the opportunity for Devops teams to influence remote access and security architecture?Why automate security?How much can be automated?FEEDBACK?Email: show at the cloudcast dot netTwitter: @cloudcastpodInstagram: @cloudcastpodTikTok: @cloudcastpod

@BEERISAC: CPS/ICS Security Podcast Playlist
Bridging the Security Gap: How HERA Transforms Remote Access in Industrial Environments with Andrew Ginter

@BEERISAC: CPS/ICS Security Podcast Playlist

Play Episode Listen Later Jul 28, 2024 46:53


Podcast: PrOTect It AllEpisode: Bridging the Security Gap: How HERA Transforms Remote Access in Industrial Environments with Andrew GinterPub date: 2024-07-22Welcome back to *Protect It All*! In Episode 17, host Aaron Crow is joined by Andrew Ginter, VP of Industrial Security at Waterfall Security Solutions, to dive deep into secure remote access for Operational Technology (OT) systems. They explore the cutting-edge HERA (Hardware Enforced Remote Access) technology, which offers a revolutionary approach to remote control via TPM hardware, unidirectional gateways, and stringent encryption protocols. This episode covers everything from the critical need for robust security in high-stakes environments like wind farms and manufacturing to the dangers of supply chain vulnerabilities to the broader implications for industries dependent on remote operations. Ginter sheds light on the limitations of software-based solutions and the strategic advantages of hardware-enforced security, while also discussing his book "Engineering Great OT Security" and the latest initiatives in cyber-informed engineering. Tune in to learn how organizations can remain competitive, reduce costs, and stay secure in an increasingly interconnected industrial world. This enlightening discussion could change the way you think about remote access! Key Moments: 05:53 Spectrum of consequence in remote access explained. 07:55 Security flaws in remote access systems. 10:23 Remote access is often overlooked by many. 15:11 Supply chain vulnerability due to cloud connectivity. 17:33 Hardware-enforced remote access, HERA, fills the security spectrum. 20:52 Custom ASIC with 1M transistors for encryption. 25:55 Ways to exploit network security vulnerabilities discussed. 26:35 Exploiting technology to send unauthorized messages. 32:50 Benefits of centralizing engineering teams in businesses. 34:18 Competing in the international market with unique services. 39:31 Understanding the implications before implementing technology is crucial. 40:30 Uncertainty about large number, risk opportunity tap. 43:50 Firewall controls data flow and is potentially misconfigurable. About the guest : At Waterfall Security, Andrew leads a team of experts working with the world's most secure industrial sites. He is the author of three books on industrial security, co-author of the IIoT SF and the UITP Guide to CyberSecurity in Tendering, and co-host of the Industrial Security Podcast. Links: https://waterfall-security.com/ot-insights-center/ot-cybersecurity-insights-center/hardware-enforced-remote-access-hera-under-the-hood/ LinkedIn: https://www.linkedin.com/in/andrewginter/ Email Andrew: andrew.ginter@waterfall-security.com Connect With Aaron Crow: Website: www.corvosec.com LinkedIn: https://www.linkedin.com/in/aaronccrow Learn more about PrOTect IT All: Email: info@protectitall.co Website: https://protectitall.co/ X: https://twitter.com/protectitall YouTube: https://www.youtube.com/@PrOTectITAll FaceBook: https://facebook.com/protectitallpodcast To be a guest or suggest a guest/episode, please email us at info@protectitall.coThe podcast and artwork embedded on this page are from Aaron Crow, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.

Cyber Talks
From Ransomware to Remote Access: Key Cyber Threats in Manufacturing

Cyber Talks

Play Episode Listen Later Jul 8, 2024 27:08


The manufacturing industry is facing an increasingly complex threat landscape, characterized by expanding attack surfaces due to continuous IT transformation and interconnected OT environments. Key threats such as ransomware and sophisticated social engineering attacks are exploiting these vulnerabilities, making robust security measures and swift incident response crucial. Join Spence Hutchinson, Staff Threat Intelligence Researcher on the Threat Response Unit (TRU) at eSentire, as he delves into the current threat landscape for the manufacturing sector. Spence discusses the latest trends in cyber threats and provides actionable insights based on recent reports from eSentire's Threat Response Unit (TRU). Understanding the "threat surface scope creep" and its implications for manufacturing security. The critical role of visibility in preventing and detecting intrusions stemming from stolen credentials and unpatched vulnerabilities. The rising prevalence of browser-based attacks and USB worms, and how they are targeting manufacturing systems. Strategies for implementing phish-resistant multi-factor authentication and robust device management to mitigate risks. Insights into the underground market dynamics, including credential markets and access brokers, and their impact on the manufacturing sector. -- Have a question for us? Reach out: hello@esentire.com --- About Cyber Talks From ransomware attacks to supply chain compromises, eSentire's Cyber Talks podcast will delve into the world of the latest cyber threats that are impacting businesses globally. Join our team of security experts as we speak with C-level executives and security practitioners about the cyber risks affecting their business and how they're addressing these challenges. About eSentire eSentire, Inc., the Authority in Managed Detection and Response (MDR), protects the critical data and applications of 2000+ organizations in 80+ countries, across 35 industries from known and unknown cyber threats by providing Exposure Management, Managed Detection and Response and Incident Response services designed to build an organization's cyber resilience & prevent business disruption. Founded in 2001, eSentire protects the world's most targeted organizations with 65% of its global base recognized as critical infrastructure, vital to economic health and stability. By combining open XDR platform technology, 24/7 threat hunting, and proven security operations leadership, eSentire's award-winning MDR services and team of experts help organizations anticipate, withstand and recover from cyberattacks. For more information, visit ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠www.esentire.com⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ and follow ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠@eSentire⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠.

ITSPmagazine | Technology. Cybersecurity. Society
Demystifying Microsegmentation | 7 Minutes on ITSPmagazine | A Zero Networks Story with Benny Lakunishok

ITSPmagazine | Technology. Cybersecurity. Society

Play Episode Listen Later Jun 21, 2024 7:07


Earlier this year, the NSA released updated zero-trust guidance in which microsegmentation is listed as a daunting, advanced endeavor, only suitable to the most mature organizations. Zero Networks is committed to challenging this sentiment. While some may hesitate, thinking microsegmentation is beyond their reach, we urge organizations to reconsider. Waiting is not an option when it comes to securing your network against evolving threats. By prioritizing microsegmentation, you're taking a proactive stance against unauthorized lateral movement, thwarting advanced attacks, and effectively blocking ransomware. Zero Networks has helped organizations of all sizes, maturity, and complexity levels to deploy our radically simple microsegmentation solution in a click, without breaking anything, and with little to no effort.As ransomware attacks double, microsegmentation has been hailed by Gartner, Forrester, the NSA, and leading security trade media outlets, as the most promising solution for halting lateral movement and satisfying zero trust guidelines. You can't have a zero trust architecture without microsegmentation – but you also need to implement a solution quickly, without breaking anything, and without extensive costs and complexities. Zero Networks offers exactly this solution. Zero Networks' microsegmentation solution locks down lateral movement, effectively stranding hackers and preventing them from spreading ransomware. For an added layer of security, we apply MFA authentication to the network layer, allowing organizations to protect assets that could not be easily protected by MFA before: legacy applications, databases, OT/IoT devices, mainframes, on-prem VMs, and IaaS VMs. Our just-in-time MFA also applies an additional layer of security to privileged remote admin protocols like RDP, SSH, and WinRM – commonly exploited by attackers. This also supports organizations with compliance needs. “Never trust, always verify” comes automatically with Zero Networks.Zero Networks' microsegmentation solution provides agentless, automated, and multi-factor authentication (MFA) powered architecture. By monitoring and learning all network connections over a 30-day period, Zero Networks creates precise firewall rules that are centrally applied to all assets. This agentless architecture ensures that every asset, whether on-premises or in the cloud, including OT/IoT devices, is segmented without disrupting normal operations. One of the key challenges with traditional microsegmentation solutions is their complexity and associated costs. Forrester highlights the difficulty in quantifying the business benefits of microsegmentation due to its indirect impact on productivity and user experience. A global independent investment bank, Evercore, was undergoing the major challenge of effectively responding to an incident when a workstation was compromised, and a threat actor was able to gain access to their network to move laterally. They had firewalls, whitelists, blacklists and other measures that could slow them down but nothing that could immediately shut them down. Chris Turek, CIO of Evercore, said “Zero Networks is creating a new sphere of security capabilities.See the platform for yourself - reach out to us at zeronetworks.com for a demo.Learn more about Zero Networks: https://itspm.ag/zeronet-al2d2Note: This story contains promotional content. Learn more.Guest: Benny Lakunishok, Co-Founder and CEO, Zero Networks [@ZeroNetworks]On LinkedIn | https://www.linkedin.com/in/bennyl/On Twitter | https://x.com/lakunishokResourcesLearn more and catch more stories from Zero Networks: www.itspmagazine.com/directory/zero-networksLearn more about 7 Minutes on ITSPmagazine Short Brand Story Podcasts: https://www.itspmagazine.com/purchase-programsNewsletter Archive: https://www.linkedin.com/newsletters/tune-into-the-latest-podcasts-7109347022809309184/Business Newsletter Signup: https://www.itspmagazine.com/itspmagazine-business-updates-sign-upAre you interested in telling your story?https://www.itspmagazine.com/telling-your-story

Redefining CyberSecurity
Demystifying Microsegmentation | 7 Minutes on ITSPmagazine | A Zero Networks Story with Benny Lakunishok

Redefining CyberSecurity

Play Episode Listen Later Jun 21, 2024 7:07


Earlier this year, the NSA released updated zero-trust guidance in which microsegmentation is listed as a daunting, advanced endeavor, only suitable to the most mature organizations. Zero Networks is committed to challenging this sentiment. While some may hesitate, thinking microsegmentation is beyond their reach, we urge organizations to reconsider. Waiting is not an option when it comes to securing your network against evolving threats. By prioritizing microsegmentation, you're taking a proactive stance against unauthorized lateral movement, thwarting advanced attacks, and effectively blocking ransomware. Zero Networks has helped organizations of all sizes, maturity, and complexity levels to deploy our radically simple microsegmentation solution in a click, without breaking anything, and with little to no effort.As ransomware attacks double, microsegmentation has been hailed by Gartner, Forrester, the NSA, and leading security trade media outlets, as the most promising solution for halting lateral movement and satisfying zero trust guidelines. You can't have a zero trust architecture without microsegmentation – but you also need to implement a solution quickly, without breaking anything, and without extensive costs and complexities. Zero Networks offers exactly this solution. Zero Networks' microsegmentation solution locks down lateral movement, effectively stranding hackers and preventing them from spreading ransomware. For an added layer of security, we apply MFA authentication to the network layer, allowing organizations to protect assets that could not be easily protected by MFA before: legacy applications, databases, OT/IoT devices, mainframes, on-prem VMs, and IaaS VMs. Our just-in-time MFA also applies an additional layer of security to privileged remote admin protocols like RDP, SSH, and WinRM – commonly exploited by attackers. This also supports organizations with compliance needs. “Never trust, always verify” comes automatically with Zero Networks.Zero Networks' microsegmentation solution provides agentless, automated, and multi-factor authentication (MFA) powered architecture. By monitoring and learning all network connections over a 30-day period, Zero Networks creates precise firewall rules that are centrally applied to all assets. This agentless architecture ensures that every asset, whether on-premises or in the cloud, including OT/IoT devices, is segmented without disrupting normal operations. One of the key challenges with traditional microsegmentation solutions is their complexity and associated costs. Forrester highlights the difficulty in quantifying the business benefits of microsegmentation due to its indirect impact on productivity and user experience. A global independent investment bank, Evercore, was undergoing the major challenge of effectively responding to an incident when a workstation was compromised, and a threat actor was able to gain access to their network to move laterally. They had firewalls, whitelists, blacklists and other measures that could slow them down but nothing that could immediately shut them down. Chris Turek, CIO of Evercore, said “Zero Networks is creating a new sphere of security capabilities.See the platform for yourself - reach out to us at zeronetworks.com for a demo.Learn more about Zero Networks: https://itspm.ag/zeronet-al2d2Note: This story contains promotional content. Learn more.Guest: Benny Lakunishok, Co-Founder and CEO, Zero Networks [@ZeroNetworks]On LinkedIn | https://www.linkedin.com/in/bennyl/On Twitter | https://x.com/lakunishokResourcesLearn more and catch more stories from Zero Networks: www.itspmagazine.com/directory/zero-networksLearn more about 7 Minutes on ITSPmagazine Short Brand Story Podcasts: https://www.itspmagazine.com/purchase-programsNewsletter Archive: https://www.linkedin.com/newsletters/tune-into-the-latest-podcasts-7109347022809309184/Business Newsletter Signup: https://www.itspmagazine.com/itspmagazine-business-updates-sign-upAre you interested in telling your story?https://www.itspmagazine.com/telling-your-story

Cybercrime Magazine Podcast
Hackers Targeting Remote Access Tools. VPNs Vulnerable. Sherrod DeGrippo, Top Cybersecurity Expert.

Cybercrime Magazine Podcast

Play Episode Listen Later Jun 7, 2024 9:02


If your business uses remote access tools like VPNs, you may want to watch out, as hackers have been targeting these tools with ransomware, according to Toms Guide. Research by cyber insurance provider At-Bay has found that remote access tools were the intrusion point for 58% of ransomware attacks in 2023. Sherrod DeGrippo, director of threat intelligence strategy at Microsoft, joins host Steve Morgan in this episode to discuss. • For more on cybersecurity, visit us at https://cybersecurityventures.com

The Automation Podcast
IXON Secure Remote Access and Edge Gateway (P202)

The Automation Podcast

Play Episode Listen Later May 8, 2024


This week I meet up with Brandon Penrod of IXON to learn about their Remote Access and IoT Edge Gateway Solutions in this episode of The Automation Podcast For more information, check out the "Show Notes" located below the video. Watch to the Podcast on The Automation Blog:  Listen to the Podcast on The Automation Blog: The Automation Podcast, Episode 202 Show Notes: Special thanks to Brandon Penrod of IXON for coming on the show to bring us up to speed on their Remote Access and Edge Gateway solutions. To learn more about IXON, check out the below links: IXON IIOT Portal Machine Connectivity in the age of Service Excellence IXON Customer cases Talk to an IXON specialist Follow IXON on LinkedIn Until next time, Peace ✌️  Shawn M TierneyTechnology Enthusiast & Content Creator Have a question? Join my community of automation professionals and take part in the discussion! You'll also find my PLC, HMI, and SCADA courses at TheAutomationSchool.com. If you found this content helpful, consider buying me a coffee here. (40 views)

The SysAdmin DOJO Podcast
Security Risks of Always On Remote Access

The SysAdmin DOJO Podcast

Play Episode Listen Later Apr 9, 2024 35:33


In this episode of The Security Swarm Podcast, host Andy Syrewicze is joined by Matt Lee from Pax8 to discuss the risks associated with deploying always on remote access software on managed endpoints.   The conversation spans various topics, including Matt Lee's extensive background in the MSP space, where he shares insights gained from his experience with a mass ransomware event. Together, they explore the risks and implications of constant remote access, emphasizing the need for organizations to adopt a more proactive stance toward cybersecurity.   Key takeaways:  Embrace the journey of continuous improvement in cybersecurity practices, focusing on being reasonable and defensible rather than striving for perfection.  Follow established cybersecurity controls and be willing to adapt and improve security measures over time.  Consider the risks associated with constant remote access and prioritize security measures that reduce exposure to threats.  Take small steps towards improving cybersecurity practices and be open to learning from past failures to enhance security protocols.  Timestamps:  (11:08) - Navigating Remote Access in Highly Regulated Managed Service Provider (MSP) Environments  (14:02) - Maximizing Security with Just in Time, Just Enough Access  (17:41) – The ConnectWise ScreenConnect Vulnerability and the Importance of Communication  (26:32) – The Need for Maturity in the Cybersecurity Space  (31:10) – Don't Let Perfect be the Enemy of Good  Episode Resources:  Matt Lee  Hornetsecurity  

Cyber and Technology with Mike
07 February 2024 Cyber and Tech News

Cyber and Technology with Mike

Play Episode Listen Later Feb 7, 2024 8:00


In today's podcast we cover four crucial cyber and technology topics, including:  1.        Senegal shuts down mobile Internet access 2.        TeamCity servers vulnerable to remote access via latest flaw 3.        French healthcare data exposed for tens of thousands due to phish 4.        Researchers reveal Chinese effort to spy on Dutch via cyber     I'd love feedback, feel free to send your comments and feedback to  | cyberandtechwithmike@gmail.com

LINUX Unplugged
542: 2023 Tuxies

LINUX Unplugged

Play Episode Listen Later Dec 24, 2023 47:19


It's the fourth annual Unplugged Tuxies; our community votes on the best projects, distros, and desktops of 2023.

Hacking Humans
Encore: remote access Trojan or RAT (noun)

Hacking Humans

Play Episode Listen Later Dec 12, 2023 4:42


From the intrusion kill chain model, a program that provides command and control services for an attack campaign. While the first ever deployed RAT is unknown, one early example is Back Orifice made famous by the notorious hacktivist group called “The Cult of the Dead Cow,” or cDc, Back Orifice was written by the hacker, Sir Dystic AKA Josh Bookbinder and released to the public at DEFCON in 1998.

Word Notes
Encore: remote access Trojan or RAT (noun)

Word Notes

Play Episode Listen Later Dec 12, 2023 4:42


From the intrusion kill chain model, a program that provides command and control services for an attack campaign. While the first ever deployed RAT is unknown, one early example is Back Orifice made famous by the notorious hacktivist group called “The Cult of the Dead Cow,” or cDc, Back Orifice was written by the hacker, Sir Dystic AKA Josh Bookbinder and released to the public at DEFCON in 1998. Learn more about your ad choices. Visit megaphone.fm/adchoices

The Next Session
Ep 98 Raven Queen Resurrection & Remote Access

The Next Session

Play Episode Listen Later Oct 30, 2023 38:52


Next Session Help:  DnDBambi has a Player Character that wants to be resurrected by the Raven Queen and would like help coming up with what the price of that transaction would be.   Ask a GM:  TheBlackIbis asks what could be in a used Bag of Holding that their players have come across? Ok_Box_7276 wants to know our opinion on players that are mechanically of one class, but played as another? Use That Spell: Remote Access Thanks for listening! As always, you can ask us a question at www.nextsessionpodcast.com Instagram: @nextsessionpodcast Facebook: @thenextsession

TechByter Worldwide (formerly Technology Corner) with Bill Blinn
TechByter Worldwide 2023-10-27: Use AeroAdmin To Help Others And For Remote Access. Short Circuits. Twenty Years Ago.

TechByter Worldwide (formerly Technology Corner) with Bill Blinn

Play Episode Listen Later Oct 27, 2023 15:02


AeroAdmin is an excellent choice if you need to help friends or family solve problems with their computers and when you want to log onto your computer when you're not in front of it. In Short Circuits: Artificial intelligence can create text for you, and it can paraphrase your text. Is it worth trying an application such as QuillBot to see how good an editor it is? • We've been able to synchronize the Windows clipboard between computers for a while now, but you can also synchronize the clipboard with your Android phone. Twenty Years Ago (only on the website): Most of us occasionally think about “The Good Old Days”, but if we really stop and think about it, it's clear the the good old days really weren't that good.

GeekNights with Rym + Scott

Tonight on GeekNights, we consider the the idea of remote access. In the news, here's a list of all the tech layoffs so far in 2023, and Twitch changes its simulcasting guidelines.Related Links Forum Thread Remote Access Things of the Day Rym - Star Trek + Design Scott - Homeward

Live, Laugh, Love - LadBaby
E21: Commuting Horror, Drunk Drama & Remote Access

Live, Laugh, Love - LadBaby

Play Episode Listen Later Sep 14, 2023 54:33


On this weeks episode Mark & Rox discuss their best and worst stories from commuting in London, we find out why you should never drink too much on a first date and we learn never to trust hotel TV remote controls ever again! #LadBabyPodcastEmail: ladbabypodcast@gmail.comPresenter & Producer: Mark & Roxanne HoyleSound Engineer/Editing: @mountstreetstudiosHosted by: Global Learn more about your ad choices. Visit podcastchoices.com/adchoices

Cybercrime Magazine Podcast
Mastering Cyber. What Is Remote Access? Alissa “Dr Jay” Abdullah, Deputy CSO, Mastercard.

Cybercrime Magazine Podcast

Play Episode Listen Later Aug 23, 2023 1:50


Welcome to Mastering Cyber with Host Alissa (Dr Jay) Abdullah, PhD, SVP & Deputy CSO at Mastercard, and former White House technology executive. Listen to this weekly one-minute podcast to help you maneuver cybersecurity industry tips, terms, and topics. Buckle up, your 60 seconds of cyber starts now! Sponsored by Mastercard. https://mastercard.us/en-us.html

HeroicStories
Does Turning Off Remote Access Keep Me Safer?

HeroicStories

Play Episode Listen Later Aug 3, 2023 7:18


Turning off remote desktop is incrementally safer, but it is a very small piece of a much larger puzzle.

Secure Talk - Cybersecurity
Secure Remote Access with Karen Gondoly, CEO of Leostream

Secure Talk - Cybersecurity

Play Episode Listen Later Jul 17, 2023 31:17


Karen Gondoly is the CEO and VP of Project Management of Leostream, a leading connection management platform for virtual desktop infrastructures. Karen talks about some of the key trends related to security, access, and performance in the remote desktop access space. Leostream https://leostream.com/ The Secure Talk Cybersecurity Podcast https://securetalkpodcast.com/

Scaling Postgres
Data Skew, Monitoring, Remote Access CSV, Documentation | Scaling Postgres 270

Scaling Postgres

Play Episode Listen Later Jun 18, 2023 14:17


To get the show notes as well as get notified of new episodes, visit:  https://www.scalingpostgres.com/episodes/270-data-skew-monitoring-remote-access-csv-documentation/ In this episode of Scaling Postgres, we discuss how to handle data skew, tools for Postgres monitoring, how to load data remotely and Postgres documentation.  

Packet Pushers - Full Podcast Feed
Tech Bytes: Redefining Secure Remote Access With Fortinet's SASE Solution (Sponsored)

Packet Pushers - Full Podcast Feed

Play Episode Listen Later Dec 12, 2022 16:31


Today on the Tech Bytes podcast we explore sponsor Fortinet's Secure Access Service Edge, or FortiSASE, offering, including the FortiClient agent, what cloud-delivered security services are available, SASE use cases, and more. Our guest is Nirav Shah, VP of Products at Fortinet.

Packet Pushers - Full Podcast Feed
Tech Bytes: Redefining Secure Remote Access With Fortinet's SASE Solution (Sponsored)

Packet Pushers - Full Podcast Feed

Play Episode Listen Later Dec 12, 2022 16:31


Today on the Tech Bytes podcast we explore sponsor Fortinet's Secure Access Service Edge, or FortiSASE, offering, including the FortiClient agent, what cloud-delivered security services are available, SASE use cases, and more. Our guest is Nirav Shah, VP of Products at Fortinet. The post Tech Bytes: Redefining Secure Remote Access With Fortinet's SASE Solution (Sponsored) appeared first on Packet Pushers.

Packet Pushers - Fat Pipe
Tech Bytes: Redefining Secure Remote Access With Fortinet's SASE Solution (Sponsored)

Packet Pushers - Fat Pipe

Play Episode Listen Later Dec 12, 2022 16:31


Today on the Tech Bytes podcast we explore sponsor Fortinet's Secure Access Service Edge, or FortiSASE, offering, including the FortiClient agent, what cloud-delivered security services are available, SASE use cases, and more. Our guest is Nirav Shah, VP of Products at Fortinet. The post Tech Bytes: Redefining Secure Remote Access With Fortinet's SASE Solution (Sponsored) appeared first on Packet Pushers.

Packet Pushers - Fat Pipe
Tech Bytes: Redefining Secure Remote Access With Fortinet's SASE Solution (Sponsored)

Packet Pushers - Fat Pipe

Play Episode Listen Later Dec 12, 2022 16:31


Today on the Tech Bytes podcast we explore sponsor Fortinet's Secure Access Service Edge, or FortiSASE, offering, including the FortiClient agent, what cloud-delivered security services are available, SASE use cases, and more. Our guest is Nirav Shah, VP of Products at Fortinet.

Packet Pushers - Full Podcast Feed
Network Break 410: AWS Previews Secure Remote Access; Broadcom Promises Not To Raise VMware Prices

Packet Pushers - Full Podcast Feed

Play Episode Listen Later Dec 5, 2022 51:56


On today's Network Break we discuss new AWS previews for secure remote access and for connecting applications and services across VPCs. We also discuss a serious outage at Hive Social, Open RAN 5G coming to fighter jets, a promise from Broadcom not to raise prices if the VMware acquisition goes through, and more IT news.

Packet Pushers - Full Podcast Feed
Network Break 410: AWS Previews Secure Remote Access; Broadcom Promises Not To Raise VMware Prices

Packet Pushers - Full Podcast Feed

Play Episode Listen Later Dec 5, 2022 51:56


On today's Network Break we discuss new AWS previews for secure remote access and for connecting applications and services across VPCs. We also discuss a serious outage at Hive Social, Open RAN 5G coming to fighter jets, a promise from Broadcom not to raise prices if the VMware acquisition goes through, and more IT news. The post Network Break 410: AWS Previews Secure Remote Access; Broadcom Promises Not To Raise VMware Prices appeared first on Packet Pushers.

Packet Pushers - Network Break
Network Break 410: AWS Previews Secure Remote Access; Broadcom Promises Not To Raise VMware Prices

Packet Pushers - Network Break

Play Episode Listen Later Dec 5, 2022 51:56


On today's Network Break we discuss new AWS previews for secure remote access and for connecting applications and services across VPCs. We also discuss a serious outage at Hive Social, Open RAN 5G coming to fighter jets, a promise from Broadcom not to raise prices if the VMware acquisition goes through, and more IT news.

Packet Pushers - Network Break
Network Break 410: AWS Previews Secure Remote Access; Broadcom Promises Not To Raise VMware Prices

Packet Pushers - Network Break

Play Episode Listen Later Dec 5, 2022 51:56


On today's Network Break we discuss new AWS previews for secure remote access and for connecting applications and services across VPCs. We also discuss a serious outage at Hive Social, Open RAN 5G coming to fighter jets, a promise from Broadcom not to raise prices if the VMware acquisition goes through, and more IT news. The post Network Break 410: AWS Previews Secure Remote Access; Broadcom Promises Not To Raise VMware Prices appeared first on Packet Pushers.

The Tech Blog Writer Podcast
2158: Enabling Secure Remote Access Experiences Everywhere

The Tech Blog Writer Podcast

Play Episode Listen Later Oct 30, 2022 17:53


On this podcast, I pride myself on sharing stories from all over the world and have interviewed guests from more than 75 countries. Today, I am going to take you on a trip to the Czech Republic, where Artur Kane from Good Access is going to discuss the importance of establishing an encrypted connection between employees and business systems from wherever they're working. Artur is also regarded as a passionate speaker on protecting remote workers and company data in a digital world at industry events and often contributes to security/networking magazines. We discuss how zero trust access control provides a more secure alternative to corporate VPN for remote working security and how companies can move from VPN to zero trust access.

The CyberWire
Cyberattack hits Ukrainian energy provider. NCSC updates its guidance on preparing for a long-term Russian cyber campaign. Hacktivists, scammers, misconfigurations, and rogue insiders.

The CyberWire

Play Episode Listen Later Jul 5, 2022 30:37 Very Popular


Cyberattack hits a Ukrainian energy provider. NCSC updates its guidance on preparing for a long-term Russian cyber campaign. Royal Army accounts are hijacked. A hacktivist group claims to have hit Iranian sites. A very very large database of PII is for sale on the dark web. Chase Snyder from ExtraHop has a look back at WannaCry, 5 years on. Ben Yelin examines the constitutionality of keyword search warrants. And a rogue employee makes off with bug reports. For links to all of today's stories check out our CyberWire daily news briefing: https://thecyberwire.com/newsletters/daily-briefing/11/127 Selected reading. Russian hackers allegedly target Ukraine's biggest private energy firm (CNN) Proruskí hackeri opäť útočili. Ďalšia významná spoločnosť hlási, že čelila kybernetickým útokom (Vosveteit.sk) Preparing for the long haul: the cyber threat from Russia (NCSC) Official British Army Twitter and YouTube accounts hijacked by NFT scammers (Hot for Security) British army confirms breach of its Twitter and YouTube accounts (the Guardian)  British Army hit by cyberattack as Twitter and YouTube accounts hacked (The Telegraph)  Iranians' Remote Access to Banking Services Cut Off Over 'Cyber Attacks' (IranWire)  (Video) Iranian regime's Islamic Culture and Communications Organization targeted in massive cyber offensive (EIN News) Hackers Claim Theft of Police Info in China's Largest Data Leak (Bloomberg)  Hacker Selling Shanghai Police Database with Billions of Chinese Citizens Data (HackRead) Giant data breach? Leaked personal data of one billion people has been spotted for sale on the dark web (ZDNet)  Hacker claims to have stolen 1 bln records of Chinese citizens from police (Reuters)  HackerOne disclosed on HackerOne: June 2022 Incident Report (HackerOne)  HackerOne Employee Caught Stealing Vulnerability Reports for Personal Gains (The Hacker News) Rogue HackerOne employee steals bug reports to sell on the side (BleepingComputer)

Mac Geek Gab (Enhanced AAC)
Cool Stuff (and Jeff Gamet) Found!

Mac Geek Gab (Enhanced AAC)

Play Episode Listen Later Apr 25, 2022 82:01 Very Popular


Jeff Gamet joins John and Dave today to share all kinds of Cool Stuff Found with you. Categories range from MagSafe car mounts to mechanical keyboards, to USB adapters and more. Listen to your three favorite geeks have their minds blown by a listener submission about Remote Access, and then there […]