Podcasts about Remote access

  • 195PODCASTS
  • 349EPISODES
  • 54mAVG DURATION
  • 1MONTHLY NEW EPISODE
  • Mar 31, 2025LATEST

POPULARITY

20172018201920202021202220232024


Best podcasts about Remote access

Latest podcast episodes about Remote access

Oh, My Health...There Is Hope!
Revolutionizing Children's Dental Health: Early Intervention and Nasal Breathing with Dr. Ben Miraglia

Oh, My Health...There Is Hope!

Play Episode Listen Later Mar 29, 2025 26:39


"Mouth breathing is putting bad gasoline into a high-performance race car." - Dr. Ben Miraglia Dr. Ben Miraglia is a renowned dentist with over three decades of experience since graduating from SUNY at Buffalo School of Dental Medicine in 1993. He serves as the Chief Clinical Officer at Airway Health Solutions and Toothpillow, both organizations dedicated to improving dental and airway health. Dr. Miraglia is also on the Board of Directors of the American Academy of Physiological Medicine and Dentistry. He is a key player in transformative dental treatments focusing on physiological growth and airway success without the extraction of teeth. Episode Summary: In this enlightening episode of "Oh, My Health... There Is Hope," host Jana Short sits down with Dr. Ben Miraglia, a trailblazer in the field of dentistry focusing on airway health and pediatric orthodontics without extraction. Dr. Miraglia narrates his journey from being a traditional dentist to discovering expansive orthodontic solutions that avoid tooth extraction and promote better health outcomes. His story of hope is packed with professional insights that will appeal to parents seeking healthier alternatives for children's dental care. Dr. Miraglia's innovative approach advocates early intervention in dental growth, starting as young as three years old, to prevent common issues associated with traditional methods like extracting teeth for orthodontic purposes. Highlighting the profound connection between correct nasal breathing, jaw development, and overall health, this episode offers invaluable information for parents aiming for holistic health solutions for their children. With the development of Toothpillow, Dr. Miraglia extends his expertise globally, providing remote dental care that focuses on growth and natural development rather than immediate corrective remedies. Key Takeaways: Early Intervention: Begin addressing dental development as early as age 3 to promote proper jaw growth and prevent long-term orthodontic issues. Avoid Tooth Extraction: Tooth extraction can lead to bone loss and collapse. Focus instead on techniques that preserve natural tooth structure. Nasal Breathing and Oral Health: Proper nasal breathing is vital for physical health; mouth breathing can lead to various health issues in children. Remote Access to Care: Toothpillow.com provides access to remote assessments and care for children, bridging gaps where local resources may be limited. Educational Resources for Parents: Parents are encouraged to research and choose airway-focused dental professionals who support growth-based orthodontics. Resources www.toothpillow.com @‌toothpilllow_official @‌drbenmiraglia Get in touch with Jana and listen to more Podcasts: https://www.janashort.com/ Show Music ‘Hold On' by Amy Gerhartz: https://www.amygerhartz.com/music. Get the Best Holistic Life Magazine Subscription! One of the fastest-growing independent magazines centered around holistic living. https://bestholisticlife.info/Subscription Grab your gift today: https://www.janashort.com/becoming-the-next-influencers-download-offer/ Connect with Jana Short: https://www.janashort.com/contact/

The Underground Lounge
After Hours: Remote Access, Wild Nights, Hollywood Snubs & More | The Underground Lounge

The Underground Lounge

Play Episode Listen Later Mar 16, 2025 100:37


The Underground Lounge After Hours is back, and things get wild in this no-holds-barred episode. Lou, Spank and Holly dive into outrageous vacation stories, strip club politics, and the chaos that comes with picking the wrong plus-one for a night out. From VIP section power moves to the real cost of bottle service, they break down the dos and don'ts of nightlife like only they can.Then, things heat up when they take on Hollywood's ranking of the greatest Black actors. Is Will Smith getting snubbed? Does Samuel L. Jackson deserve a higher spot? And who needs to be taken off the list entirely? The debate gets ruthless as they rewrite the rankings and call out the industry's biggest oversights.From deep NBA discussions to hilarious personal stories and unexpected debates, this episode of After Hours is the perfect mix of raw comedy, real talk, and unpredictable moments. Buckle up,it's about to get wild!

Down to the Struts
Introducing the Remote Access Archives (and season 4 of the Contra* podcast)

Down to the Struts

Play Episode Listen Later Jan 28, 2025 5:57


The team at Down to the Struts is thrilled to share the trailer for Season 4 of Contra*! This season, Aimi Hamraie and the Critical Design Lab share oral history interviews from the Remote Access Archives. At the start of the COVID-19 pandemic, they spoke with scholars and activists about mutual aid and pandemic times.  This season, they'll be sharing some of these conversations. Aimi Hamraie, Cavar, Jen White-Johnson, Jiya Pandya, Julia Rose Karpicz, Katie Sullivan, and our very own Down to the Struts creator and host, Qudsiya Naqui, contributed to this season's introduction. Contributors to the episodes include: Hector Ramirez, Thomas Reid, moira williams, Qudsiya Naqui, Corbett O'Toole, Sky Cubacub, Katie Goldfinch, Brian Lobel, Susan Molloy, and India Harville. And don't forget to submit your Down to the Struts audio and written testimonials! We want to hear from you about what our podcast means to you, and the impact it's had in your life. Please share your audio files or written comments to downtothestruts@gmail.com. We hope to share your reflections during season 10! ⁠⁠⁠⁠⁠⁠⁠⁠Visit our website⁠ ⁠for transcripts.⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ -- Subscribe to Qudsiya's Substack, ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Getting Down To It Support the team behind the podcast ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠with a donation Let us know what you think with a comment or review on Apple podcasts.⁠⁠⁠⁠⁠⁠⁠⁠⁠

@BEERISAC: CPS/ICS Security Podcast Playlist
119: Revealing the OT Threat Landscape: Remote Access, Supply Chain, and Lateral Movement

@BEERISAC: CPS/ICS Security Podcast Playlist

Play Episode Listen Later Dec 17, 2024 19:37


Podcast: (CS)²AI Podcast Show: Control System Cyber SecurityEpisode: 119: Revealing the OT Threat Landscape: Remote Access, Supply Chain, and Lateral MovementPub date: 2024-12-17Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationOur host Derek Harp sits down with Adam Robbie, Head of OT Threat Research at Palo Alto Networks, live from Hack the Capitol 7.0. Adam shares critical insights into emerging cybersecurity challenges within Operational Technology (OT) environments, including findings from Palo Alto's extensive OT threat landscape research.Listeners will hear about the top attack vectors impacting critical infrastructure: remote access vulnerabilities, supply chain risks, and lateral movement across networks. Adam discusses the importance of network segmentation, cross-team collaboration between IT and OT, and innovative tools like the Cyberwall, a hands-on demonstration environment showcasing real-world OT threats.Whether you're an OT security professional or new to the field, this episode delivers practical takeaways to enhance your cybersecurity strategies. Don't miss this engaging conversation focused on securing control systems and building stronger, collaborative defenses.The podcast and artwork embedded on this page are from Derek Harp, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.

Control System Cyber Security Association International: (CS)²AI
119: Revealing the OT Threat Landscape: Remote Access, Supply Chain, and Lateral Movement

Control System Cyber Security Association International: (CS)²AI

Play Episode Listen Later Dec 17, 2024 19:37


Our host Derek Harp sits down with Adam Robbie, Head of OT Threat Research at Palo Alto Networks, live from Hack the Capitol 7.0. Adam shares critical insights into emerging cybersecurity challenges within Operational Technology (OT) environments, including findings from Palo Alto's extensive OT threat landscape research.Listeners will hear about the top attack vectors impacting critical infrastructure: remote access vulnerabilities, supply chain risks, and lateral movement across networks. Adam discusses the importance of network segmentation, cross-team collaboration between IT and OT, and innovative tools like the Cyberwall, a hands-on demonstration environment showcasing real-world OT threats.Whether you're an OT security professional or new to the field, this episode delivers practical takeaways to enhance your cybersecurity strategies. Don't miss this engaging conversation focused on securing control systems and building stronger, collaborative defenses.

XenTegra XenCast
Citrix VDA for macOS: Revolutionizing Remote Access for Developers and Creatives

XenTegra XenCast

Play Episode Listen Later Oct 8, 2024 31:01 Transcription Available


In this episode of The Citrix Session (Episode 170), host Bill Sutton is joined by Andy Whiteside, CEO of XenTegra, Citrix experts Jeremy Myers and Todd Smith, to discuss the exciting new capabilities of Citrix Virtual Delivery Agent (VDA) for macOS. Dive into how this game-changing feature enables Mac environments to be remotely accessed with the same efficiency as other platforms, perfect for developers, video professionals, and education institutions.Tune in to learn:How Citrix VDA for macOS brings Macs into the fold of remote desktop solutionsKey use cases, including developer environments, multimedia professionals, and educationIntegration with platforms like MacStadium and Amazon EC2 Mac instancesLicensing models and platform compatibilityHow this innovation highlights Citrix's continued investment in cutting-edge technologyExplore how Citrix is meeting customer demands while setting the standard for the future of remote access!

Double Tap Canada
Envision's New ‘Ally' Feature Is Now In Beta

Double Tap Canada

Play Episode Listen Later Sep 20, 2024 56:11


Today on the show Steven and Shaun find out about a new feature from Envision called Ally that acts as your personal assistant for performing tasks and giving you information.Karthik Karnan, the founder and CTO of Envision, joins the guys to chat about its more personalised approach to assistance, with the ability to use the service across phone, glasses and the web soon. You can sign up for the beta of Ally right now.There's also more of your feedback including an interesting email from listener James on his views on the value and necessity of braille, furthering our own discussion recently on the topic. Also, following Graham's request for information about quiet talking clocks, we find ourselves with a doctor in the house - Doctor Clock himself from the Talking Watch Shop in the UK.Doctor Clock tells us about and demonstrates the TC-100 and VTC-03 clocks on sale. You can find out more by visiting Talking Watch Shop online or call 0345 00 40 100.Get in touch with Double Tap by emailing us feedback@doubletaponair.com or by call 1-877-803-4567 and leave us a voicemail. You can also find us across social media. Double Tap is available daily on AMI-audio across Canada, on podcast worldwide and now on YouTube.Chapter Markers:0:00- -Intro5:31 - Double Tap WhatsApp is Coming6:00 - Aira Launches on Meta Ray-Ban Glasses in Beta7:24 - Getting Support Using RIMM12:34 - E-mail - Graham on Loud Alarm Clocks13:21 - E-mail - Dr Clock Helps Graham with Talking Clocks17:54 - E-mail - James on Braille23:42 - Contact Us23:53 - Karthik on the Envision Ally AI Voice AssistantYouTube Adjustment. ((Approx)26:30 - Karthik on the Envision Ally AI Voice Assistant

The Cloudcast
How DevOps is helping to rethink the need for VPNs with Modern Security

The Cloudcast

Play Episode Listen Later Aug 28, 2024 34:21


Emrul Islam (Head of Platform Innovation @TwingateHQ) talks about the evolution of remote access, application security, and enabling DevOps teams to drive security transformation.  SHOW: 851SHOW TRANSCRIPT: The Cloudcast #851 TranscriptCLOUD NEWS OF THE WEEK - http://bit.ly/cloudcast-cnotwNEW TO CLOUD? CHECK OUT OUR OTHER PODCAST - "CLOUDCAST BASICS" SHOW NOTES:How Twingate WorksTwingate vs. VPNsArchitecting Network Connectivity for a Zero Trust FutureSolving the usability problem to unlock Zero Trust adoptionReddit link: https://www.reddit.com/r/twingate/ Signup for Twingate for freeTopic 1 - Welcome to the show. Topic 2 - To properly solve cloud access & security pain points, companies need a tool that works for IT, DevOps, & Security teamsWhat are the challenges when trying to secure cloud access today?What role do each of the stakeholders play in addressing these?How much can technology really help address these challenges?Topic 3 - How is Twingate architected differently to address these new challenges?How do existing systems work?What sort of architecture is required?Topic 4 - Why is it a struggle to get these teams aligned on the right solutionIs there a disconnect between competing requirements and security?Topic 5 - What is the opportunity for Devops teams to influence remote access and security architecture?Why automate security?How much can be automated?FEEDBACK?Email: show at the cloudcast dot netTwitter: @cloudcastpodInstagram: @cloudcastpodTikTok: @cloudcastpod

Papo Pro ACBr
Conheça um caso real de implantação do TSplus Remote Access

Papo Pro ACBr

Play Episode Listen Later Aug 9, 2024 84:28


Descubra a história de sucesso na implantação do TSplus Remote Access em uma empresa do segmento industrial. Convidado: Henrique Alves, Consultor de Vendas na TS Plus Brasil

@BEERISAC: CPS/ICS Security Podcast Playlist
Bridging the Security Gap: How HERA Transforms Remote Access in Industrial Environments with Andrew Ginter

@BEERISAC: CPS/ICS Security Podcast Playlist

Play Episode Listen Later Jul 28, 2024 46:53


Podcast: PrOTect It AllEpisode: Bridging the Security Gap: How HERA Transforms Remote Access in Industrial Environments with Andrew GinterPub date: 2024-07-22Welcome back to *Protect It All*! In Episode 17, host Aaron Crow is joined by Andrew Ginter, VP of Industrial Security at Waterfall Security Solutions, to dive deep into secure remote access for Operational Technology (OT) systems. They explore the cutting-edge HERA (Hardware Enforced Remote Access) technology, which offers a revolutionary approach to remote control via TPM hardware, unidirectional gateways, and stringent encryption protocols. This episode covers everything from the critical need for robust security in high-stakes environments like wind farms and manufacturing to the dangers of supply chain vulnerabilities to the broader implications for industries dependent on remote operations. Ginter sheds light on the limitations of software-based solutions and the strategic advantages of hardware-enforced security, while also discussing his book "Engineering Great OT Security" and the latest initiatives in cyber-informed engineering. Tune in to learn how organizations can remain competitive, reduce costs, and stay secure in an increasingly interconnected industrial world. This enlightening discussion could change the way you think about remote access! Key Moments: 05:53 Spectrum of consequence in remote access explained. 07:55 Security flaws in remote access systems. 10:23 Remote access is often overlooked by many. 15:11 Supply chain vulnerability due to cloud connectivity. 17:33 Hardware-enforced remote access, HERA, fills the security spectrum. 20:52 Custom ASIC with 1M transistors for encryption. 25:55 Ways to exploit network security vulnerabilities discussed. 26:35 Exploiting technology to send unauthorized messages. 32:50 Benefits of centralizing engineering teams in businesses. 34:18 Competing in the international market with unique services. 39:31 Understanding the implications before implementing technology is crucial. 40:30 Uncertainty about large number, risk opportunity tap. 43:50 Firewall controls data flow and is potentially misconfigurable. About the guest : At Waterfall Security, Andrew leads a team of experts working with the world's most secure industrial sites. He is the author of three books on industrial security, co-author of the IIoT SF and the UITP Guide to CyberSecurity in Tendering, and co-host of the Industrial Security Podcast. Links: https://waterfall-security.com/ot-insights-center/ot-cybersecurity-insights-center/hardware-enforced-remote-access-hera-under-the-hood/ LinkedIn: https://www.linkedin.com/in/andrewginter/ Email Andrew: andrew.ginter@waterfall-security.com Connect With Aaron Crow: Website: www.corvosec.com LinkedIn: https://www.linkedin.com/in/aaronccrow Learn more about PrOTect IT All: Email: info@protectitall.co Website: https://protectitall.co/ X: https://twitter.com/protectitall YouTube: https://www.youtube.com/@PrOTectITAll FaceBook: https://facebook.com/protectitallpodcast To be a guest or suggest a guest/episode, please email us at info@protectitall.coThe podcast and artwork embedded on this page are from Aaron Crow, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.

Cyber Talks
From Ransomware to Remote Access: Key Cyber Threats in Manufacturing

Cyber Talks

Play Episode Listen Later Jul 8, 2024 27:08


The manufacturing industry is facing an increasingly complex threat landscape, characterized by expanding attack surfaces due to continuous IT transformation and interconnected OT environments. Key threats such as ransomware and sophisticated social engineering attacks are exploiting these vulnerabilities, making robust security measures and swift incident response crucial. Join Spence Hutchinson, Staff Threat Intelligence Researcher on the Threat Response Unit (TRU) at eSentire, as he delves into the current threat landscape for the manufacturing sector. Spence discusses the latest trends in cyber threats and provides actionable insights based on recent reports from eSentire's Threat Response Unit (TRU). Understanding the "threat surface scope creep" and its implications for manufacturing security. The critical role of visibility in preventing and detecting intrusions stemming from stolen credentials and unpatched vulnerabilities. The rising prevalence of browser-based attacks and USB worms, and how they are targeting manufacturing systems. Strategies for implementing phish-resistant multi-factor authentication and robust device management to mitigate risks. Insights into the underground market dynamics, including credential markets and access brokers, and their impact on the manufacturing sector. -- Have a question for us? Reach out: hello@esentire.com --- About Cyber Talks From ransomware attacks to supply chain compromises, eSentire's Cyber Talks podcast will delve into the world of the latest cyber threats that are impacting businesses globally. Join our team of security experts as we speak with C-level executives and security practitioners about the cyber risks affecting their business and how they're addressing these challenges. About eSentire eSentire, Inc., the Authority in Managed Detection and Response (MDR), protects the critical data and applications of 2000+ organizations in 80+ countries, across 35 industries from known and unknown cyber threats by providing Exposure Management, Managed Detection and Response and Incident Response services designed to build an organization's cyber resilience & prevent business disruption. Founded in 2001, eSentire protects the world's most targeted organizations with 65% of its global base recognized as critical infrastructure, vital to economic health and stability. By combining open XDR platform technology, 24/7 threat hunting, and proven security operations leadership, eSentire's award-winning MDR services and team of experts help organizations anticipate, withstand and recover from cyberattacks. For more information, visit ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠www.esentire.com⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ and follow ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠@eSentire⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠.

ITSPmagazine | Technology. Cybersecurity. Society
Demystifying Microsegmentation | 7 Minutes on ITSPmagazine | A Zero Networks Story with Benny Lakunishok

ITSPmagazine | Technology. Cybersecurity. Society

Play Episode Listen Later Jun 21, 2024 7:07


Earlier this year, the NSA released updated zero-trust guidance in which microsegmentation is listed as a daunting, advanced endeavor, only suitable to the most mature organizations. Zero Networks is committed to challenging this sentiment. While some may hesitate, thinking microsegmentation is beyond their reach, we urge organizations to reconsider. Waiting is not an option when it comes to securing your network against evolving threats. By prioritizing microsegmentation, you're taking a proactive stance against unauthorized lateral movement, thwarting advanced attacks, and effectively blocking ransomware. Zero Networks has helped organizations of all sizes, maturity, and complexity levels to deploy our radically simple microsegmentation solution in a click, without breaking anything, and with little to no effort.As ransomware attacks double, microsegmentation has been hailed by Gartner, Forrester, the NSA, and leading security trade media outlets, as the most promising solution for halting lateral movement and satisfying zero trust guidelines. You can't have a zero trust architecture without microsegmentation – but you also need to implement a solution quickly, without breaking anything, and without extensive costs and complexities. Zero Networks offers exactly this solution. Zero Networks' microsegmentation solution locks down lateral movement, effectively stranding hackers and preventing them from spreading ransomware. For an added layer of security, we apply MFA authentication to the network layer, allowing organizations to protect assets that could not be easily protected by MFA before: legacy applications, databases, OT/IoT devices, mainframes, on-prem VMs, and IaaS VMs. Our just-in-time MFA also applies an additional layer of security to privileged remote admin protocols like RDP, SSH, and WinRM – commonly exploited by attackers. This also supports organizations with compliance needs. “Never trust, always verify” comes automatically with Zero Networks.Zero Networks' microsegmentation solution provides agentless, automated, and multi-factor authentication (MFA) powered architecture. By monitoring and learning all network connections over a 30-day period, Zero Networks creates precise firewall rules that are centrally applied to all assets. This agentless architecture ensures that every asset, whether on-premises or in the cloud, including OT/IoT devices, is segmented without disrupting normal operations. One of the key challenges with traditional microsegmentation solutions is their complexity and associated costs. Forrester highlights the difficulty in quantifying the business benefits of microsegmentation due to its indirect impact on productivity and user experience. A global independent investment bank, Evercore, was undergoing the major challenge of effectively responding to an incident when a workstation was compromised, and a threat actor was able to gain access to their network to move laterally. They had firewalls, whitelists, blacklists and other measures that could slow them down but nothing that could immediately shut them down. Chris Turek, CIO of Evercore, said “Zero Networks is creating a new sphere of security capabilities.See the platform for yourself - reach out to us at zeronetworks.com for a demo.Learn more about Zero Networks: https://itspm.ag/zeronet-al2d2Note: This story contains promotional content. Learn more.Guest: Benny Lakunishok, Co-Founder and CEO, Zero Networks [@ZeroNetworks]On LinkedIn | https://www.linkedin.com/in/bennyl/On Twitter | https://x.com/lakunishokResourcesLearn more and catch more stories from Zero Networks: www.itspmagazine.com/directory/zero-networksLearn more about 7 Minutes on ITSPmagazine Short Brand Story Podcasts: https://www.itspmagazine.com/purchase-programsNewsletter Archive: https://www.linkedin.com/newsletters/tune-into-the-latest-podcasts-7109347022809309184/Business Newsletter Signup: https://www.itspmagazine.com/itspmagazine-business-updates-sign-upAre you interested in telling your story?https://www.itspmagazine.com/telling-your-story

Redefining CyberSecurity
Demystifying Microsegmentation | 7 Minutes on ITSPmagazine | A Zero Networks Story with Benny Lakunishok

Redefining CyberSecurity

Play Episode Listen Later Jun 21, 2024 7:07


Earlier this year, the NSA released updated zero-trust guidance in which microsegmentation is listed as a daunting, advanced endeavor, only suitable to the most mature organizations. Zero Networks is committed to challenging this sentiment. While some may hesitate, thinking microsegmentation is beyond their reach, we urge organizations to reconsider. Waiting is not an option when it comes to securing your network against evolving threats. By prioritizing microsegmentation, you're taking a proactive stance against unauthorized lateral movement, thwarting advanced attacks, and effectively blocking ransomware. Zero Networks has helped organizations of all sizes, maturity, and complexity levels to deploy our radically simple microsegmentation solution in a click, without breaking anything, and with little to no effort.As ransomware attacks double, microsegmentation has been hailed by Gartner, Forrester, the NSA, and leading security trade media outlets, as the most promising solution for halting lateral movement and satisfying zero trust guidelines. You can't have a zero trust architecture without microsegmentation – but you also need to implement a solution quickly, without breaking anything, and without extensive costs and complexities. Zero Networks offers exactly this solution. Zero Networks' microsegmentation solution locks down lateral movement, effectively stranding hackers and preventing them from spreading ransomware. For an added layer of security, we apply MFA authentication to the network layer, allowing organizations to protect assets that could not be easily protected by MFA before: legacy applications, databases, OT/IoT devices, mainframes, on-prem VMs, and IaaS VMs. Our just-in-time MFA also applies an additional layer of security to privileged remote admin protocols like RDP, SSH, and WinRM – commonly exploited by attackers. This also supports organizations with compliance needs. “Never trust, always verify” comes automatically with Zero Networks.Zero Networks' microsegmentation solution provides agentless, automated, and multi-factor authentication (MFA) powered architecture. By monitoring and learning all network connections over a 30-day period, Zero Networks creates precise firewall rules that are centrally applied to all assets. This agentless architecture ensures that every asset, whether on-premises or in the cloud, including OT/IoT devices, is segmented without disrupting normal operations. One of the key challenges with traditional microsegmentation solutions is their complexity and associated costs. Forrester highlights the difficulty in quantifying the business benefits of microsegmentation due to its indirect impact on productivity and user experience. A global independent investment bank, Evercore, was undergoing the major challenge of effectively responding to an incident when a workstation was compromised, and a threat actor was able to gain access to their network to move laterally. They had firewalls, whitelists, blacklists and other measures that could slow them down but nothing that could immediately shut them down. Chris Turek, CIO of Evercore, said “Zero Networks is creating a new sphere of security capabilities.See the platform for yourself - reach out to us at zeronetworks.com for a demo.Learn more about Zero Networks: https://itspm.ag/zeronet-al2d2Note: This story contains promotional content. Learn more.Guest: Benny Lakunishok, Co-Founder and CEO, Zero Networks [@ZeroNetworks]On LinkedIn | https://www.linkedin.com/in/bennyl/On Twitter | https://x.com/lakunishokResourcesLearn more and catch more stories from Zero Networks: www.itspmagazine.com/directory/zero-networksLearn more about 7 Minutes on ITSPmagazine Short Brand Story Podcasts: https://www.itspmagazine.com/purchase-programsNewsletter Archive: https://www.linkedin.com/newsletters/tune-into-the-latest-podcasts-7109347022809309184/Business Newsletter Signup: https://www.itspmagazine.com/itspmagazine-business-updates-sign-upAre you interested in telling your story?https://www.itspmagazine.com/telling-your-story

Cybercrime Magazine Podcast
Hackers Targeting Remote Access Tools. VPNs Vulnerable. Sherrod DeGrippo, Top Cybersecurity Expert.

Cybercrime Magazine Podcast

Play Episode Listen Later Jun 7, 2024 9:02


If your business uses remote access tools like VPNs, you may want to watch out, as hackers have been targeting these tools with ransomware, according to Toms Guide. Research by cyber insurance provider At-Bay has found that remote access tools were the intrusion point for 58% of ransomware attacks in 2023. Sherrod DeGrippo, director of threat intelligence strategy at Microsoft, joins host Steve Morgan in this episode to discuss. • For more on cybersecurity, visit us at https://cybersecurityventures.com

The Automation Podcast
IXON Secure Remote Access and Edge Gateway (P202)

The Automation Podcast

Play Episode Listen Later May 8, 2024


This week I meet up with Brandon Penrod of IXON to learn about their Remote Access and IoT Edge Gateway Solutions in this episode of The Automation Podcast For more information, check out the "Show Notes" located below the video. Watch to the Podcast on The Automation Blog:  Listen to the Podcast on The Automation Blog: The Automation Podcast, Episode 202 Show Notes: Special thanks to Brandon Penrod of IXON for coming on the show to bring us up to speed on their Remote Access and Edge Gateway solutions. To learn more about IXON, check out the below links: IXON IIOT Portal Machine Connectivity in the age of Service Excellence IXON Customer cases Talk to an IXON specialist Follow IXON on LinkedIn Until next time, Peace ✌️  Shawn M TierneyTechnology Enthusiast & Content Creator Have a question? Join my community of automation professionals and take part in the discussion! You'll also find my PLC, HMI, and SCADA courses at TheAutomationSchool.com. If you found this content helpful, consider buying me a coffee here. (40 views)

The SysAdmin DOJO Podcast
Security Risks of Always On Remote Access

The SysAdmin DOJO Podcast

Play Episode Listen Later Apr 9, 2024 35:33


In this episode of The Security Swarm Podcast, host Andy Syrewicze is joined by Matt Lee from Pax8 to discuss the risks associated with deploying always on remote access software on managed endpoints.   The conversation spans various topics, including Matt Lee's extensive background in the MSP space, where he shares insights gained from his experience with a mass ransomware event. Together, they explore the risks and implications of constant remote access, emphasizing the need for organizations to adopt a more proactive stance toward cybersecurity.   Key takeaways:  Embrace the journey of continuous improvement in cybersecurity practices, focusing on being reasonable and defensible rather than striving for perfection.  Follow established cybersecurity controls and be willing to adapt and improve security measures over time.  Consider the risks associated with constant remote access and prioritize security measures that reduce exposure to threats.  Take small steps towards improving cybersecurity practices and be open to learning from past failures to enhance security protocols.  Timestamps:  (11:08) - Navigating Remote Access in Highly Regulated Managed Service Provider (MSP) Environments  (14:02) - Maximizing Security with Just in Time, Just Enough Access  (17:41) – The ConnectWise ScreenConnect Vulnerability and the Importance of Communication  (26:32) – The Need for Maturity in the Cybersecurity Space  (31:10) – Don't Let Perfect be the Enemy of Good  Episode Resources:  Matt Lee  Hornetsecurity  

Cyber and Technology with Mike
07 February 2024 Cyber and Tech News

Cyber and Technology with Mike

Play Episode Listen Later Feb 7, 2024 8:00


In today's podcast we cover four crucial cyber and technology topics, including:  1.        Senegal shuts down mobile Internet access 2.        TeamCity servers vulnerable to remote access via latest flaw 3.        French healthcare data exposed for tens of thousands due to phish 4.        Researchers reveal Chinese effort to spy on Dutch via cyber     I'd love feedback, feel free to send your comments and feedback to  | cyberandtechwithmike@gmail.com

UBC News World
Buy Automated Shades With Remote Access, Smart Home Integration In Overland Park

UBC News World

Play Episode Listen Later Jan 22, 2024 2:17


Want to upgrade your home with motorized blinds managed with a few taps from your smartphone? Call Inside Solutions at +1-913-890-3737! Learn more athttps://insidesolutionsllc.com/ Inside Solutions, LLC. City: Overland Park Address: Overland Park Website https://www.insidesolutionsllc.com Phone +1-913-890-3737 Email sales@insidesolutionsllc.com

MFM SPEAKS OUT
EP 51: 2023 Retrospective

MFM SPEAKS OUT

Play Episode Listen Later Jan 5, 2024 76:32


In this episode of MFM Speaks Out, Dawoud Kringle comes out of retirement to present a 2023 retrospective. We will share some of the content we brought to you in 2023, and  enjoy a few other surprises as well.   Our guest for the January episode was Haana.  Haana is a violinist, vocalist, electronic music artist, visual performer, and entirely self-contained as a one-woman orchestra. She played with Kanye West, and Alvin Ailey, as well as festivals such as Joshua Tree Festival and Coachella and others in the US, Canada, UAE, and Australia, Barack Obama's inaugural ball, and at Michael Jordan's wedding. Haana has endorsement deals with Ableton, Native Instruments, Even Headphones (manufactured by Blue Microphones), and Realist Violins. She appeared in ads for Intel, Harvey Nichols, Nike, Ferrari, and Apple Computers. In addition, she has experience as a film composer and does artist mentorship/marketing, branding, and production consultation.  In February, MFM board member and co-producer of this very podcast Adam Reifsteck joined us for a very fascinating discussion. Adam is a New York-based composer, electronic music artist, producer, entrepreneur, and music activist. He writes for small ensembles, produces electronic music, and performs improvised group compositions on Wi-Fi-connected laptops. He has collaborated with string quartets, university choirs, and visual and electronic artists. His approach to composition includes elements of improvisation. He is a recipient of grants from the Lower Manhattan Cultural Council, the Irving S. Gilmore Foundation, and the Kalamazoo (MI) Community Foundation. His music has been performed by the Attacca Quartet, Amernet String Quartet, Cadillac Moon Ensemble, Duquesne University Chamber Singers, Flutronix, Gaudete Brass Quintet, Mana Saxophone Quartet, Western Michigan University Chorale, and many other ensembles. Adam is also an active recording engineer and producer whose studio alias SONIC FEAR has become synonymous with lush, genre-bending sounds—from dance floor-ready tracks to downtempo meditations. He is the founder and CEO of Teknofonic Recordings, an independent record label and artist development platform providing electronic musicians with learning resources, networking opportunities, and career support. Adam holds a master's of music degree in composition from Western Michigan University and a bachelor's of music in music technology from Duquesne University. He is a member of Broadcast Music Inc., the Society of Composers and Lyricists, the Recording Academy, the Audio Engineering Society, and Musicians for Musicians. Our March episode was a landmark. We interviewed Keyna Wilkins, the first MFM member from Australia. Wilkins holds a Master of Music Composition at Sydney Conservatorium, studied composition, classical and jazz piano, and classical flute with several prestigious instructors, and intuitive conceptual improvisation with Tibetan Buddhist musician Tenzin Cheogyal. holds an MA in Flute Performance at Bristol University (UK) in 2008. She is known as a soloist and leader of cutting-edge ensembles and has written over 60 compositions, including 4 major orchestral works. Her works have been commissioned and/or performed by ensembles such as The Metropolitan Orchestra, Syzygy Ensemble, Elysian Fields, The Sydney Bach Society, and many others. She has released 9 albums of original music on all streaming platforms including 4 solo albums. Wilkins is also an Associate Artist with the Australian Music Centre and has five tunes in the Australian Jazz Realbook. She also writes music for films and theatre including the short film "Remote Access" which won Best Short Film at the Imagine This International Film Festival in New York in 2019 and her works are featured on ABC, Triple J, Fine Music FM, Cambridge Radio, SOAS London and many more. Her music is published by Wirripeng and she is a member of Musicians for Musicians. MFM member Sylvian Leroux was our guest in April. Sylvian is a flutist, saxophonist, guitarist, composer, arranger, bandleader, educator, inventor, and prominent member of Musicians for Musicians.  Sylvain Leroux grew up in Montreal where he studied classical flute at Vincent d'Indy; and improvisation and composition in New York at the Creative Music Studio where he attended classes by luminaries Don Cherry, the Art Ensemble of Chicago, Karl Berger, Cecil Taylor, and many others. A pioneer of African/Jazz collaborations, Sylvain is a foremost player of the Fula flute, the traditional flute from Guinea. He was selected as “Rising Flute Star” by the Downbeat Magazine Critics' Poll for many years, achieving the #2 spot in 2019. As a bandleader, he brought traditional West African music to Zankel Hall with his Fula Flute Ensemble and held the fort for more than a decade at New York City's Zinc Bar with his African Jazz group “Source”. His 2002 CD “Fula Flute" achieved cult status, and stimulated a worldwide interest in the instrument. His 2012 album “Quatuor Creole” was hailed as “a perfect contemporary music release.” He curated New York's “Griot Summits” which featured performances by 25 West African griots from five countries. He has performed and recorded with Emeline Michel, Adam Rudolph, Karl Berger, Hassan Hakmoun, Billy Martin, and many West African stars. As a maker and seller of Fula flutes around the world, he invented and patented the Qromatica, a Fula flute capable of chromatic functionality. This led him to initiate "L'ecole Fula Flute", a music literacy project that graduated many excellent young flutists who are now re-energizing an endangered flute tradition. Our May 2023 episode featured Mark Chimples, a.k.a. Mark C. Mark is the guitarist and synthesizer player with Live Skull. Formed in 1982, Live Skull is considered by many aficionados to be the quintessential New York City noise band. Rising concurrently with bands such as Sonic Youth and Swans, Live Skull helped define the post-No Wave underground "noise rock" in the 1980s music scene in New York City. Over the following decades, Live Skull released five albums and three EPs with a rotating cast of 11 members, all of whom added new ideas to the group's evolving sound. Themes of struggle and chaos permeated and inspired their music. Their constant progression inspired New York Times critic Robert Palmer to call them “as challenging, as spiritually corrosive, and ultimately as transcendent as Albert Ayler's mid-'60s free-jazz or the implacable drone-dance of the early Velvet Underground. It's one of the essential sounds of our time." Music on this episode:Haana - Bison RougeAdam Reifsteck / Sonic Fear - AuroraKeyna Wilkins - Floating in SpaceSylvain Leroux - In Walked BudLive Skull - Party ZeroSpaghetti Eastern - Jungle BlueArturo O'Farrill and the Afro Latin Jazz Orchestra - Amidst the Fire and WhirlwindDave Liebman - Journey Around Truth  SoSaLa - Dadada Dadada DaaDawoud Kringle - Keep Trying CreditsProducer and host: Dawoud KringlePublisher: Musicians For Musicians (MFM), Inc. and Sohrab Saadat LadjvardiTechnical support: Adam ReifsteckLinksBe sure to follow and tag MFM on Facebook ([https://www.facebook.com/M4M.org/] and Instagram (https://www.instagram.com/mfm_association/).

LINUX Unplugged
542: 2023 Tuxies

LINUX Unplugged

Play Episode Listen Later Dec 24, 2023 47:19


It's the fourth annual Unplugged Tuxies; our community votes on the best projects, distros, and desktops of 2023.

Hacking Humans
Encore: remote access Trojan or RAT (noun)

Hacking Humans

Play Episode Listen Later Dec 12, 2023 4:42


From the intrusion kill chain model, a program that provides command and control services for an attack campaign. While the first ever deployed RAT is unknown, one early example is Back Orifice made famous by the notorious hacktivist group called “The Cult of the Dead Cow,” or cDc, Back Orifice was written by the hacker, Sir Dystic AKA Josh Bookbinder and released to the public at DEFCON in 1998.

Word Notes
Encore: remote access Trojan or RAT (noun)

Word Notes

Play Episode Listen Later Dec 12, 2023 4:42


From the intrusion kill chain model, a program that provides command and control services for an attack campaign. While the first ever deployed RAT is unknown, one early example is Back Orifice made famous by the notorious hacktivist group called “The Cult of the Dead Cow,” or cDc, Back Orifice was written by the hacker, Sir Dystic AKA Josh Bookbinder and released to the public at DEFCON in 1998. Learn more about your ad choices. Visit megaphone.fm/adchoices

The Next Session
Ep 98 Raven Queen Resurrection & Remote Access

The Next Session

Play Episode Listen Later Oct 30, 2023 38:52


Next Session Help:  DnDBambi has a Player Character that wants to be resurrected by the Raven Queen and would like help coming up with what the price of that transaction would be.   Ask a GM:  TheBlackIbis asks what could be in a used Bag of Holding that their players have come across? Ok_Box_7276 wants to know our opinion on players that are mechanically of one class, but played as another? Use That Spell: Remote Access Thanks for listening! As always, you can ask us a question at www.nextsessionpodcast.com Instagram: @nextsessionpodcast Facebook: @thenextsession

TechByter Worldwide (formerly Technology Corner) with Bill Blinn
TechByter Worldwide 2023-10-27: Use AeroAdmin To Help Others And For Remote Access. Short Circuits. Twenty Years Ago.

TechByter Worldwide (formerly Technology Corner) with Bill Blinn

Play Episode Listen Later Oct 27, 2023 15:02


AeroAdmin is an excellent choice if you need to help friends or family solve problems with their computers and when you want to log onto your computer when you're not in front of it. In Short Circuits: Artificial intelligence can create text for you, and it can paraphrase your text. Is it worth trying an application such as QuillBot to see how good an editor it is? • We've been able to synchronize the Windows clipboard between computers for a while now, but you can also synchronize the clipboard with your Android phone. Twenty Years Ago (only on the website): Most of us occasionally think about “The Good Old Days”, but if we really stop and think about it, it's clear the the good old days really weren't that good.

GeekNights with Rym + Scott

Tonight on GeekNights, we consider the the idea of remote access. In the news, here's a list of all the tech layoffs so far in 2023, and Twitch changes its simulcasting guidelines.Related Links Forum Thread Remote Access Things of the Day Rym - Star Trek + Design Scott - Homeward

Live, Laugh, Love - LadBaby
E21: Commuting Horror, Drunk Drama & Remote Access

Live, Laugh, Love - LadBaby

Play Episode Listen Later Sep 14, 2023 54:33


On this weeks episode Mark & Rox discuss their best and worst stories from commuting in London, we find out why you should never drink too much on a first date and we learn never to trust hotel TV remote controls ever again! #LadBabyPodcastEmail: ladbabypodcast@gmail.comPresenter & Producer: Mark & Roxanne HoyleSound Engineer/Editing: @mountstreetstudiosHosted by: Global Learn more about your ad choices. Visit podcastchoices.com/adchoices

Cybercrime Magazine Podcast
Mastering Cyber. What Is Remote Access? Alissa “Dr Jay” Abdullah, Deputy CSO, Mastercard.

Cybercrime Magazine Podcast

Play Episode Listen Later Aug 23, 2023 1:50


Welcome to Mastering Cyber with Host Alissa (Dr Jay) Abdullah, PhD, SVP & Deputy CSO at Mastercard, and former White House technology executive. Listen to this weekly one-minute podcast to help you maneuver cybersecurity industry tips, terms, and topics. Buckle up, your 60 seconds of cyber starts now! Sponsored by Mastercard. https://mastercard.us/en-us.html

HeroicStories
Does Turning Off Remote Access Keep Me Safer?

HeroicStories

Play Episode Listen Later Aug 3, 2023 7:18


Turning off remote desktop is incrementally safer, but it is a very small piece of a much larger puzzle.

Secure Talk - Cybersecurity
Secure Remote Access with Karen Gondoly, CEO of Leostream

Secure Talk - Cybersecurity

Play Episode Listen Later Jul 17, 2023 31:17


Karen Gondoly is the CEO and VP of Project Management of Leostream, a leading connection management platform for virtual desktop infrastructures. Karen talks about some of the key trends related to security, access, and performance in the remote desktop access space. Leostream https://leostream.com/ The Secure Talk Cybersecurity Podcast https://securetalkpodcast.com/

Scaling Postgres
Data Skew, Monitoring, Remote Access CSV, Documentation | Scaling Postgres 270

Scaling Postgres

Play Episode Listen Later Jun 18, 2023 14:17


To get the show notes as well as get notified of new episodes, visit:  https://www.scalingpostgres.com/episodes/270-data-skew-monitoring-remote-access-csv-documentation/ In this episode of Scaling Postgres, we discuss how to handle data skew, tools for Postgres monitoring, how to load data remotely and Postgres documentation.  

Packet Pushers - Full Podcast Feed
Tech Bytes: Redefining Secure Remote Access With Fortinet's SASE Solution (Sponsored)

Packet Pushers - Full Podcast Feed

Play Episode Listen Later Dec 12, 2022 16:31


Today on the Tech Bytes podcast we explore sponsor Fortinet's Secure Access Service Edge, or FortiSASE, offering, including the FortiClient agent, what cloud-delivered security services are available, SASE use cases, and more. Our guest is Nirav Shah, VP of Products at Fortinet.

Packet Pushers - Full Podcast Feed
Tech Bytes: Redefining Secure Remote Access With Fortinet's SASE Solution (Sponsored)

Packet Pushers - Full Podcast Feed

Play Episode Listen Later Dec 12, 2022 16:31


Today on the Tech Bytes podcast we explore sponsor Fortinet's Secure Access Service Edge, or FortiSASE, offering, including the FortiClient agent, what cloud-delivered security services are available, SASE use cases, and more. Our guest is Nirav Shah, VP of Products at Fortinet. The post Tech Bytes: Redefining Secure Remote Access With Fortinet's SASE Solution (Sponsored) appeared first on Packet Pushers.

Packet Pushers - Fat Pipe
Tech Bytes: Redefining Secure Remote Access With Fortinet's SASE Solution (Sponsored)

Packet Pushers - Fat Pipe

Play Episode Listen Later Dec 12, 2022 16:31


Today on the Tech Bytes podcast we explore sponsor Fortinet's Secure Access Service Edge, or FortiSASE, offering, including the FortiClient agent, what cloud-delivered security services are available, SASE use cases, and more. Our guest is Nirav Shah, VP of Products at Fortinet. The post Tech Bytes: Redefining Secure Remote Access With Fortinet's SASE Solution (Sponsored) appeared first on Packet Pushers.

Packet Pushers - Fat Pipe
Tech Bytes: Redefining Secure Remote Access With Fortinet's SASE Solution (Sponsored)

Packet Pushers - Fat Pipe

Play Episode Listen Later Dec 12, 2022 16:31


Today on the Tech Bytes podcast we explore sponsor Fortinet's Secure Access Service Edge, or FortiSASE, offering, including the FortiClient agent, what cloud-delivered security services are available, SASE use cases, and more. Our guest is Nirav Shah, VP of Products at Fortinet.

Packet Pushers - Full Podcast Feed
Network Break 410: AWS Previews Secure Remote Access; Broadcom Promises Not To Raise VMware Prices

Packet Pushers - Full Podcast Feed

Play Episode Listen Later Dec 5, 2022 51:56


On today's Network Break we discuss new AWS previews for secure remote access and for connecting applications and services across VPCs. We also discuss a serious outage at Hive Social, Open RAN 5G coming to fighter jets, a promise from Broadcom not to raise prices if the VMware acquisition goes through, and more IT news.

Packet Pushers - Full Podcast Feed
Network Break 410: AWS Previews Secure Remote Access; Broadcom Promises Not To Raise VMware Prices

Packet Pushers - Full Podcast Feed

Play Episode Listen Later Dec 5, 2022 51:56


On today's Network Break we discuss new AWS previews for secure remote access and for connecting applications and services across VPCs. We also discuss a serious outage at Hive Social, Open RAN 5G coming to fighter jets, a promise from Broadcom not to raise prices if the VMware acquisition goes through, and more IT news. The post Network Break 410: AWS Previews Secure Remote Access; Broadcom Promises Not To Raise VMware Prices appeared first on Packet Pushers.

Packet Pushers - Network Break
Network Break 410: AWS Previews Secure Remote Access; Broadcom Promises Not To Raise VMware Prices

Packet Pushers - Network Break

Play Episode Listen Later Dec 5, 2022 51:56


On today's Network Break we discuss new AWS previews for secure remote access and for connecting applications and services across VPCs. We also discuss a serious outage at Hive Social, Open RAN 5G coming to fighter jets, a promise from Broadcom not to raise prices if the VMware acquisition goes through, and more IT news.

Packet Pushers - Network Break
Network Break 410: AWS Previews Secure Remote Access; Broadcom Promises Not To Raise VMware Prices

Packet Pushers - Network Break

Play Episode Listen Later Dec 5, 2022 51:56


On today's Network Break we discuss new AWS previews for secure remote access and for connecting applications and services across VPCs. We also discuss a serious outage at Hive Social, Open RAN 5G coming to fighter jets, a promise from Broadcom not to raise prices if the VMware acquisition goes through, and more IT news. The post Network Break 410: AWS Previews Secure Remote Access; Broadcom Promises Not To Raise VMware Prices appeared first on Packet Pushers.

Packet Pushers - Fat Pipe
Network Break 410: AWS Previews Secure Remote Access; Broadcom Promises Not To Raise VMware Prices

Packet Pushers - Fat Pipe

Play Episode Listen Later Dec 5, 2022 51:56


On today's Network Break we discuss new AWS previews for secure remote access and for connecting applications and services across VPCs. We also discuss a serious outage at Hive Social, Open RAN 5G coming to fighter jets, a promise from Broadcom not to raise prices if the VMware acquisition goes through, and more IT news.

Packet Pushers - Fat Pipe
Network Break 410: AWS Previews Secure Remote Access; Broadcom Promises Not To Raise VMware Prices

Packet Pushers - Fat Pipe

Play Episode Listen Later Dec 5, 2022 51:56


On today's Network Break we discuss new AWS previews for secure remote access and for connecting applications and services across VPCs. We also discuss a serious outage at Hive Social, Open RAN 5G coming to fighter jets, a promise from Broadcom not to raise prices if the VMware acquisition goes through, and more IT news. The post Network Break 410: AWS Previews Secure Remote Access; Broadcom Promises Not To Raise VMware Prices appeared first on Packet Pushers.

The Tech Blog Writer Podcast
2158: Enabling Secure Remote Access Experiences Everywhere

The Tech Blog Writer Podcast

Play Episode Listen Later Oct 30, 2022 17:53


On this podcast, I pride myself on sharing stories from all over the world and have interviewed guests from more than 75 countries. Today, I am going to take you on a trip to the Czech Republic, where Artur Kane from Good Access is going to discuss the importance of establishing an encrypted connection between employees and business systems from wherever they're working. Artur is also regarded as a passionate speaker on protecting remote workers and company data in a digital world at industry events and often contributes to security/networking magazines. We discuss how zero trust access control provides a more secure alternative to corporate VPN for remote working security and how companies can move from VPN to zero trust access.

Down the Security Rabbithole Podcast
DtSR Episode 523 - Practical SASE for the Masses

Down the Security Rabbithole Podcast

Play Episode Listen Later Oct 25, 2022 37:18 Very Popular


Prologue Today's guest helps James and Rafal attempt to unravel the completely confusing space of "modern remote access". Some call it SASE, some SSE, some ZTE and some are completely mad and still use the term VPN. Who knows who's right, or why any one is preferred over the other ...except Carlos Sales from NordLayer. Listen in, and give it some thought. Maybe you'll understand this big mess a little better by the end of the episode. Guest Carlos Salas, Engineering Manager, NordLayer LinkedIn: https://www.linkedin.com/in/carlos-salas-b89480187/ Get a special offer from NordLayer, because you're a listener of DtSR: https://nordlayer.com/dtsr 

Ask Noah Show
Episode 308: Ask Noah Show 308

Ask Noah Show

Play Episode Listen Later Oct 19, 2022 53:52


This episode Noah and Steve discuss building a NAS, audio room correction, Dustin writes back in to say he got his church bank access working, and what do you need to get a law office up and running? It's a packed episode! -- During The Show -- 01:00 Remote Access to OpenMediaVault - Cory Computer provides more control TailScale (https://tailscale.com/) Tinc Mesh VPN (https://tinc-vpn.org/) WireGuard (https://www.wireguard.com/) Site to Site VPN Overlay network Nebula (https://github.com/slackhq/nebula) HeadScale (https://github.com/juanfont/headscale) SyncThing (https://syncthing.net/) 12:00 Bradly from mumble DNS Issue use DIG Check your DNS Route DNS config needs to add the new VPN Client Subnet as ALLOWED 17:30 DIY Digital Room Correction with Linux - Charlie DIY Digital Room Correction (https://th0ma5w.github.io/DIY-Room-Correction/) Calibrated Measurement Microphone (https://www.amazon.com/dp/B00ADR2B84) Discussion Thread (https://news.ycombinator.com/item?id=33053485) 19:30 Tiny from Mumble Hosted email Encrypted Email only helps when both ends are using encrypted email ProtonMail has a good track record Vote with your wallet Proton Mail Bridge 29:15 News Wire Linux 6.1 RC Linux Today (https://www.linuxtoday.com/news/linus-torvalds-announces-first-linux-kernel-6-1-release-candidate/) The Register (https://www.theregister.com/2022/10/14/kernel_61_will_contain_fixes/) Phoronix PPC (https://www.phoronix.com/news/Linux-6.1-PowerPC) Phoronix Xen (https://www.phoronix.com/news/Linux-6.1-Xen) Amiga Updates ARS Technica (https://arstechnica.com/gadgets/2022/10/37-year-old-amiga-platform-gets-updates-to-linux-kernel-amigaos-sdk/) Virtual Box 7.0 Make Use Of (https://www.makeuseof.com/virtualbox-70-boasts-linux-secure-boot-support/) Ardour 7.0 Linux Today (https://www.linuxtoday.com/news/ardour-7-0-open-source-daw-released-with-clip-launching/) Libre Office 7.4.2 9 to 5 Linux (https://9to5linux.com/libreoffice-7-4-2-office-suite-released-with-80-bug-fixes-download-now) Blender 3.4 Blender (https://wiki.blender.org/wiki/Reference/Release_Notes/3.4) Plasma 5.26 KDE (https://kde.org/announcements/plasma/5/5.26.0/) KDE Plasma 5.26 is out. Tails 5.5 Neo Win (https://www.neowin.net/news/tails-55-issued-but-includes-worrying-linux-kernel-bug/) Euro Linux Euro Linux (https://en.euro-linux.com/blog/eurolinux-desktop/) Juno Tablet The Register (https://www.theregister.com/2022/10/17/juno_tablet/) Linux OS Market Value Fortune Business Insights (https://www.fortunebusinessinsights.com/linux-operating-system-market-103037) CISA RedEye Help Net Security (https://www.helpnetsecurity.com/2022/10/17/cisa-redeye-open-source-analytic-tool/) 31:10 Dustin Updates Us About Church and Bank - Dustin YouTube is great till they aren't Provider embed vs another service Streaming Faith (http://streamingfaith.com/) 34:40 Tech for a New Law Office? - Elise File Server Heavy Duty Laser Printer IP Phone / Voxtelsys (http://www.voxtelesys.com/asknoah) Sophos Hardware (Avoid the software) (https://www.ebay.com/itm/295271867668) Print Job Tracking Protectli (https://protectli.com/) The "Big Vendors" do loose data 47:00 Signal Removes SMS Signal (https://signal.org/blog/sms-removal-android/) Signal's reasons SMS is insecure Unexpected messaging bills Clear experience SMS is lowest common denominator Signal is "Moxie's Baby" JMP.chat and Matrix RCS -- The Extra Credit Section -- For links to the articles and material referenced in this week's episode check out this week's page from our podcast dashboard! This Episode's Podcast Dashboard (http://podcast.asknoahshow.com/308) Phone Systems for Ask Noah provided by Voxtelesys (http://www.voxtelesys.com/asknoah) Join us in our dedicated chatroom #GeekLab:linuxdelta.com on Matrix (https://element.linuxdelta.com/#/room/#geeklab:linuxdelta.com) -- Stay In Touch -- Find all the resources for this show on the Ask Noah Dashboard Ask Noah Dashboard (http://www.asknoahshow.com) Need more help than a radio show can offer? Altispeed provides commercial IT services and they're excited to offer you a great deal for listening to the Ask Noah Show. Call today and ask about the discount for listeners of the Ask Noah Show! Altispeed Technologies (http://www.altispeed.com/) Contact Noah live [at] asknoahshow.com -- Twitter -- Noah - Kernellinux (https://twitter.com/kernellinux) Ask Noah Show (https://twitter.com/asknoahshow) Altispeed Technologies (https://twitter.com/altispeed)

Secure Ventures with Kyle McNulty
Brad Laporte and Rob Smith on Trends with Security Analyst Firms (e.g. Gartner)

Secure Ventures with Kyle McNulty

Play Episode Listen Later Sep 6, 2022 43:47


Rob: Managing director at Lionfish Tech Advisors, providing security solution advisory services 8 year veteran of Gartner, leading Endpoint Security, Remote Access, and more 3-time founder Brad: Advisor at Lionfish Previously senior product manager at Dell, IBM, and Acquia Veteran of Gartner, leading Endpoint Security and Threat Intelligence Check out the episode for our discussion on the state of industry research via firms like Gartner and how the market is adapting with other alternatives. Links: https://www.lionfishtechadvisors.com/

The Cloudcast
Zero Config VPNs

The Cloudcast

Play Episode Listen Later Aug 17, 2022 28:04


Maya Kaczorowski (@MayaKaczorowski, Product @Tailscale) talks about the new world of remote systems access, zero-config VPNs, and why everyone loves using Tailscale. SHOW: 643CLOUD NEWS OF THE WEEK - http://bit.ly/cloudcast-cnotwCHECK OUT OUR NEW PODCAST - "CLOUDCAST BASICS"SHOW SPONSORS:Granulate, an Intel company - Autonomous, continuous, workload optimizationgMaestro from Granulate - Kubernetes cost optimization, made easyDatadog Kubernetes Solution: Maximum Visibility into Container EnvironmentsStart monitoring the health and performance of your container environment with a free 14 day Datadog trial. Listeners of The Cloudcast will also receive a free Datadog T-shirt.Streamline on-call, collaboration, incident management, and automation with a free 30-day trial of Lightstep Incident Response, built on ServiceNow. Listeners of The Cloudcast will also receive a free Lightstep Incident Response T-shirt after firing an alert or incident.Pay for the services you use, not the number of people on your team with Lightstep Incident Response. Try free for 30 days. Fire an alert or incident today and receive a free Lightstep Incident Response t-shirt.SHOW NOTES:Tailscale (homepage)WireGuardHow NAT traversal works blog postHow Tailscale works blog postBSidesSF talk: WireGuard from the ground upTopic 1 - Welcome to the show. Tell us a little bit about your background.Topic 2 - Let's start with some praise and some confusion. We see tons of people saying “we love Tailscale”, and yet most people hate VPNs or are trying to get rid of VPNs. Help us get smart about what Tailscale does. Topic 3 - Step back a little bit. Help us understand what a modern CISO has to think about regarding remote access vs. zero trust vs. encrypting communications? What are the critical things they worry about?Topic 4 - What are some of the unique things that Tailscale does with VPNs? Why does everyone seem to love using it? Topic 5 - Tailscale seems to work on all the modern OSs (iOS, Android, Windows, Linux, etc.). How does Tailscale work with existing networking devices? Topic 6 - What are some of the common customer outcomes that happen when they enable Tailscale? What lessons can be learned from this approach?FEEDBACK?Email: show at the cloudcast dot netTwitter: @thecloudcastnet

Paul's Security Weekly
ESW #283 - Anthony James, Evgeniy Kharam

Paul's Security Weekly

Play Episode Listen Later Aug 5, 2022 119:46


In the Enterprise Security News: BlackRock drops $250M into Acronis, Talon raises a massive $100M Series A to make Enterprise Browsers a thing, Cybrary raises $25M, Ghost Security comes out of stealth, Netskope acquires Infiot, Thoma Bravo acquires Ping Identity TLP 2.0, Thought Leadering, And Winamp is back!   The pandemic forced us to rethink our IT environment as office workers went remote, outside the traditional framework of enterprise connectivity and security. This conversation will focus on top security concerns, costs, and containment strategies that 1,100 IT/security workers in 11 countries shared in a global report Infoblox sponsored to understand how organizations are addressing the new workplace. Segment Resources: https://blogs.infoblox.com/security/1100-it-pros-spotlight-the-security-hazards-of-hybrid-work/   Secure Access Service Edge (SASE)/Secure Service Edge(SSE) has quickly become part of day-to-day lexicon. But what exactly is SASE/SSE and will it make enterprise data more secure? How will organizations secure their data in a cloud-first world when the user and information are completely outside the enterprise boundary? How SASE frameworks compares to traditional network protection, such as Secure Web Gateway, Next gen Firewalls, Remote Access and DLP. Segment Resources: https://www.brighttalk.com/webcast/288/508560 https://www.brighttalk.com/webcast/288/538266   Visit https://www.securityweekly.com/esw for all the latest episodes! Follow us on Twitter: https://www.twitter.com/securityweekly Like us on Facebook: https://www.facebook.com/secweekly   Show Notes: https://securityweekly.com/esw283

The CyberWire
Cyberattack hits Ukrainian energy provider. NCSC updates its guidance on preparing for a long-term Russian cyber campaign. Hacktivists, scammers, misconfigurations, and rogue insiders.

The CyberWire

Play Episode Listen Later Jul 5, 2022 30:37 Very Popular


Cyberattack hits a Ukrainian energy provider. NCSC updates its guidance on preparing for a long-term Russian cyber campaign. Royal Army accounts are hijacked. A hacktivist group claims to have hit Iranian sites. A very very large database of PII is for sale on the dark web. Chase Snyder from ExtraHop has a look back at WannaCry, 5 years on. Ben Yelin examines the constitutionality of keyword search warrants. And a rogue employee makes off with bug reports. For links to all of today's stories check out our CyberWire daily news briefing: https://thecyberwire.com/newsletters/daily-briefing/11/127 Selected reading. Russian hackers allegedly target Ukraine's biggest private energy firm (CNN) Proruskí hackeri opäť útočili. Ďalšia významná spoločnosť hlási, že čelila kybernetickým útokom (Vosveteit.sk) Preparing for the long haul: the cyber threat from Russia (NCSC) Official British Army Twitter and YouTube accounts hijacked by NFT scammers (Hot for Security) British army confirms breach of its Twitter and YouTube accounts (the Guardian)  British Army hit by cyberattack as Twitter and YouTube accounts hacked (The Telegraph)  Iranians' Remote Access to Banking Services Cut Off Over 'Cyber Attacks' (IranWire)  (Video) Iranian regime's Islamic Culture and Communications Organization targeted in massive cyber offensive (EIN News) Hackers Claim Theft of Police Info in China's Largest Data Leak (Bloomberg)  Hacker Selling Shanghai Police Database with Billions of Chinese Citizens Data (HackRead) Giant data breach? Leaked personal data of one billion people has been spotted for sale on the dark web (ZDNet)  Hacker claims to have stolen 1 bln records of Chinese citizens from police (Reuters)  HackerOne disclosed on HackerOne: June 2022 Incident Report (HackerOne)  HackerOne Employee Caught Stealing Vulnerability Reports for Personal Gains (The Hacker News) Rogue HackerOne employee steals bug reports to sell on the side (BleepingComputer)

Mac Geek Gab (Enhanced AAC)
Cool Stuff (and Jeff Gamet) Found!

Mac Geek Gab (Enhanced AAC)

Play Episode Listen Later Apr 25, 2022 82:01 Very Popular


Jeff Gamet joins John and Dave today to share all kinds of Cool Stuff Found with you. Categories range from MagSafe car mounts to mechanical keyboards, to USB adapters and more. Listen to your three favorite geeks have their minds blown by a listener submission about Remote Access, and then there […]