Podcasts about secure network

European IT consulting company

  • 31PODCASTS
  • 39EPISODES
  • 34mAVG DURATION
  • 1EPISODE EVERY OTHER WEEK
  • May 1, 2025LATEST
secure network

POPULARITY

20172018201920202021202220232024


Best podcasts about secure network

Latest podcast episodes about secure network

HPE Tech Talk
What's going on at the RSA Conference?

HPE Tech Talk

Play Episode Listen Later May 1, 2025 21:37


 What's the current state of the cybersecurity world? This week, Technology Now explores the biggest threats we currently face, the way companies and businesses are securing themselves, and the future of cybersecurity. Our reporter, Jaye Tillson, is at the RSA Conference in San Francisco where he is joined by Jon Green, Chief Technology Officer and Chief Security Officer at HPE Networking, John Spiegel, CTO of Security and HPE Distinguished Technologist, and Gram Ludlow, a Security Product Line Manager at HPE, to tell us more.This is Technology Now, a weekly show from Hewlett Packard Enterprise. Every week, hosts Michael Bird and Aubrey Lovell look at a story that's been making headlines, take a look at the technology behind it, and explain why it matters to organizations and what can be learnt from it.About our contributorsJaye Tillson: https://www.linkedin.com/in/jaye-tillson/Jon Green: https://www.linkedin.com/in/jongreen4John Spiegel: https://www.linkedin.com/in/john-spiegel-2011543/Gram Ludlow: https://www.linkedin.com/in/gramludlow/Sources:Statista report: https://www.statista.com/statistics/305027/revenue-global-security-technology-and-services-market/RSA Conference: https://www.rsaconference.com/about/Today I Learned: Stretchable batteries Mohsen Mohammadi et al., Make it flow from solid to liquid: Redox-active electrofluids for intrinsically stretchable batteries.Sci. Adv.11,eadr9010(2025).DOI:10.1126/sciadv.adr9010This week in history: https://www.pbs.org/transistor/background1/events/icinv.html https://www.americanscientist.org/article/intel-insider3 

Tech behind the Trends on The Element Podcast | Hewlett Packard Enterprise

 What's the current state of the cybersecurity world? This week, Technology Now explores the biggest threats we currently face, the way companies and businesses are securing themselves, and the future of cybersecurity. Our reporter, Jaye Tillson, is at the RSA Conference in San Francisco where he is joined by Jon Green, Chief Technology Officer and Chief Security Officer at HPE Networking, John Spiegel, CTO of Security and HPE Distinguished Technologist, and Gram Ludlow, a Security Product Line Manager at HPE, to tell us more.This is Technology Now, a weekly show from Hewlett Packard Enterprise. Every week, hosts Michael Bird and Aubrey Lovell look at a story that's been making headlines, take a look at the technology behind it, and explain why it matters to organizations and what can be learnt from it.About our contributorsJaye Tillson: https://www.linkedin.com/in/jaye-tillson/Jon Green: https://www.linkedin.com/in/jongreen4John Spiegel: https://www.linkedin.com/in/john-spiegel-2011543/Gram Ludlow: https://www.linkedin.com/in/gramludlow/Sources:Statista report: https://www.statista.com/statistics/305027/revenue-global-security-technology-and-services-market/RSA Conference: https://www.rsaconference.com/about/Today I Learned: Stretchable batteries Mohsen Mohammadi et al., Make it flow from solid to liquid: Redox-active electrofluids for intrinsically stretchable batteries.Sci. Adv.11,eadr9010(2025).DOI:10.1126/sciadv.adr9010This week in history: https://www.pbs.org/transistor/background1/events/icinv.html https://www.americanscientist.org/article/intel-insider3 

HPE Tech Talk, SMB
What's going on at the RSA Conference?

HPE Tech Talk, SMB

Play Episode Listen Later May 1, 2025 21:37


 What's the current state of the cybersecurity world? This week, Technology Now explores the biggest threats we currently face, the way companies and businesses are securing themselves, and the future of cybersecurity. Our reporter, Jaye Tillson, is at the RSA Conference in San Francisco where he is joined by Jon Green, Chief Technology Officer and Chief Security Officer at HPE Networking, John Spiegel, CTO of Security and HPE Distinguished Technologist, and Gram Ludlow, a Security Product Line Manager at HPE, to tell us more.This is Technology Now, a weekly show from Hewlett Packard Enterprise. Every week, hosts Michael Bird and Aubrey Lovell look at a story that's been making headlines, take a look at the technology behind it, and explain why it matters to organizations and what can be learnt from it.About our contributorsJaye Tillson: https://www.linkedin.com/in/jaye-tillson/Jon Green: https://www.linkedin.com/in/jongreen4John Spiegel: https://www.linkedin.com/in/john-spiegel-2011543/Gram Ludlow: https://www.linkedin.com/in/gramludlow/Sources:Statista report: https://www.statista.com/statistics/305027/revenue-global-security-technology-and-services-market/RSA Conference: https://www.rsaconference.com/about/Today I Learned: Stretchable batteries Mohsen Mohammadi et al., Make it flow from solid to liquid: Redox-active electrofluids for intrinsically stretchable batteries.Sci. Adv.11,eadr9010(2025).DOI:10.1126/sciadv.adr9010This week in history: https://www.pbs.org/transistor/background1/events/icinv.html https://www.americanscientist.org/article/intel-insider3 

CISSP Cyber Training Podcast - CISSP Training Program
CCT 231: Practice CISSP Questions - Secure Network Components and CISSP (Domain 4.2)

CISSP Cyber Training Podcast - CISSP Training Program

Play Episode Listen Later Mar 27, 2025 18:30 Transcription Available


Send us a textCybersecurity professionals, alert! A dangerous Chrome zero-day vulnerability demands your immediate attention. In this action-packed episode, Sean Gerber breaks down CVE-25-2783, a critical security threat that allows attackers to execute remote code simply by having users click malicious links. Though initially targeting Russian organizations, this exploit threatens Chromium-based browsers worldwide—including Chrome, Edge, Brave, Opera, and Vivaldi. Don't wait—patch immediately!The heart of this episode delivers 15 expertly-crafted CISSP practice questions focusing on Domain 4.2 network security concepts. Sean methodically explores essential topics including router load balancing capabilities, electromagnetic interference vulnerabilities, NAC implementation benefits, and optimal firewall configurations. Each question peels back another layer of network security knowledge, from identifying mesh topologies as offering superior fault tolerance to understanding how protocol analyzers diagnose VLAN performance issues.Advanced concepts receive equal attention with clear explanations of UDP timeout values in stateful firewalls, proper NIPS deployment strategies, VPN protocol security comparisons, broadcast storm mitigation techniques, and wireless security standards. Sean's straightforward breakdown of why WPA3 Enterprise provides superior protection and how ARP poisoning facilitates man-in-the-middle attacks transforms complex technical material into accessible knowledge that sticks.Whether you're actively studying for the CISSP exam or simply looking to strengthen your network security fundamentals, this episode delivers precision-targeted information in an engaging format. Visit CISSP Cyber Training for complete access to all practice questions covered and accelerate your certification journey today!Gain exclusive access to 360 FREE CISSP Practice Questions delivered directly to your inbox! Sign up at FreeCISSPQuestions.com and receive 30 expertly crafted practice questions every 15 days for the next 6 months—completely free! Don't miss this valuable opportunity to strengthen your CISSP exam preparation and boost your chances of certification success. Join now and start your journey toward CISSP mastery today!

CISSP Cyber Training Podcast - CISSP Training Program
CCT 230: Drones to Fiber Optics - Secure Network Components and CISSP (Domain 4.2)

CISSP Cyber Training Podcast - CISSP Training Program

Play Episode Listen Later Mar 24, 2025 47:14 Transcription Available


Send us a textGain exclusive access to 360 FREE CISSP Practice Questions delivered directly to your inbox! Sign up at FreeCISSPQuestions.com and receive 30 expertly crafted practice questions every 15 days for the next 6 months—completely free! Don't miss this valuable opportunity to strengthen your CISSP exam preparation and boost your chances of certification success. Join now and start your journey toward CISSP mastery today!

Packet Pushers - Full Podcast Feed
PP053: Rethinking Secure Network Access and Zero Trust With Bowtie (Sponsored)

Packet Pushers - Full Podcast Feed

Play Episode Listen Later Mar 11, 2025 42:45


On today's Packet Protector episode we talk with sponsor Bowtie about its secure network access offering. If you think secure network access is just another way to say ‘VPN,' you'll want to think again. Bowtie's approach aims to provide fast, resilient connectivity while also incorporating zero trust network access, a secure Web gateway, CASB, and... Read more »

Packet Pushers - Fat Pipe
PP053: Rethinking Secure Network Access and Zero Trust With Bowtie (Sponsored)

Packet Pushers - Fat Pipe

Play Episode Listen Later Mar 11, 2025 42:45


On today's Packet Protector episode we talk with sponsor Bowtie about its secure network access offering. If you think secure network access is just another way to say ‘VPN,' you'll want to think again. Bowtie's approach aims to provide fast, resilient connectivity while also incorporating zero trust network access, a secure Web gateway, CASB, and... Read more »

Technovation with Peter High (CIO, CTO, CDO, CXO Interviews)
Disruptive Simplicity: The Origin Story of Nile Secure, Network-as-a-Service, and AI in Network Engineering with Co-Founder & CEO Pankaj Patel

Technovation with Peter High (CIO, CTO, CDO, CXO Interviews)

Play Episode Listen Later Mar 25, 2024 38:28


857: In the last decade, companies across a variety of industries have experienced the ascent of the as-a-service model. At Nile Secure, Co-Founder and CEO Pankaj Patel has pioneered the category of network-as-a-service featuring built-in security, automation, and continuous monitoring for maximum performance. In this episode of Technovation, Peter High speaks with Pankaj about this category of network-as-a-service and the broader mission of Nile. Pankaj reflects on his early career at Cisco, the challenges he saw in the IT landscape, and how the partnership with Cisco's former CEO John Chambers led to the eventual establishment of Nile Secure. He also details the market transitions that influenced the company's founding, the impact of AI and automation in network engineering, and what the future ahead looks like for the industry. Finally, Pankaj looks back on starting a company as a grandfather, balancing family life with work, and the secrets to his career success including early customer interaction and emphasis on team building.

Technovation with Peter High (CIO, CTO, CDO, CXO Interviews)
Disruptive Simplicity: The Origin Story of Nile Secure, Network-as-a-Service, and AI in Network Engineering with Co-Founder & CEO Pankaj Patel

Technovation with Peter High (CIO, CTO, CDO, CXO Interviews)

Play Episode Listen Later Mar 25, 2024 38:28


857: In the last decade, companies across a variety of industries have experienced the ascent of the as-a-service model. At Nile Secure, Co-Founder and CEO Pankaj Patel has pioneered the category of network-as-a-service featuring built-in security, automation, and continuous monitoring for maximum performance. In this episode of Technovation, Peter High speaks with Pankaj about this category of network-as-a-service and the broader mission of Nile. Pankaj reflects on his early career at Cisco, the challenges he saw in the IT landscape, and how the partnership with Cisco's former CEO John Chambers led to the eventual establishment of Nile Secure. He also details the market transitions that influenced the company's founding, the impact of AI and automation in network engineering, and what the future ahead looks like for the industry. Finally, Pankaj looks back on starting a company as a grandfather, balancing family life with work, and the secrets to his career success including early customer interaction and emphasis on team building.

Material Handling Masters Podcast
MHEDA Talks: Steve Stasiukonis on Cyber Security Threats

Material Handling Masters Podcast

Play Episode Listen Later Feb 15, 2024 26:42


Host Shari Altergott, Chief Experience Officer of The CX Edge talks with Steve Stasiukonis, Founder and President of Secure Network Technologies about the biggest cyber security threats to your business, particularly ransomware and what you can do to help protect your data and prevent an attack. They also discuss how changes in technology and the workplace such as remote workers and AI could increase these threats. About Secure Network Technologies Secure Network Technologies, Inc is a full service information security consulting firm based out of Syracuse, NY. Secure Network offers the widest range of security and investigative services with a large client base both domestically and internationally. Since 1997, Secure Network has been one of the largest growing and highly publicized security firms in the United States. Learn more at www.securenetworkinc.com About the MHEDA Talks Podcast with Shari Altergott Stay tuned for more episodes of the MHEDA Talks podcast series when Shari will interview industry thought leaders on issues and trends affecting MHEDA members. Shari Altergott has over 20 years of experience within the Material Handling Industry. During her career she has held several positions within marketing, sales, business development and executive leadership. Today she leads The CX Edge, a customer experience consulting firm focused specifically on the material handling industry. Over her time, she has developed full scope marketing functions that manage corporate initiatives related to customer experience, CRM, social networking, brand development, advertising and lead generation. Learn more at cx-edge.com.

UBC News World
How To Protect Against Rising Cyber Threats & Attacks: Secure Network Tips

UBC News World

Play Episode Listen Later Oct 13, 2023 2:09


If you want to protect against a cybersecurity threat in the most effective way, this More Cybersecurity guide is an ideal place to start. The expert wants to help you to prepare for the worst, and respond quickly! Find out more at https://morecybersecurity.com/mobile-device-security-essential-for-todays-businesses/ More Cybersecurity City: New York Address: 60 W 23rd St Website https://morecybersecurity.com/ Phone +1 877 675 4340 Email scott.hall@betteronlineinfo.com

CISSP Cyber Training Podcast - CISSP Training Program
CCT 020: Secure Network Component (CISSP Domain 4)

CISSP Cyber Training Podcast - CISSP Training Program

Play Episode Listen Later Mar 20, 2023 30:35


Shon Gerber from CISSPCyberTraining.com provides you the information and knowledge you need to prepare and pass the CISSP Exam while providing the tools you need to enhance your cybersecurity career.  Shon utilizes his expansive knowledge in cybersecurity from being a Red Team Squadron Commander; Chief Information Security Officer (CISO); and Adjunct Professor providing superior training from his years of experience in educating people in cybersecurity.    In this episode, Shon will talk about the following items that are included within Domain 4 (Communication and Network Security) of the CISSP Exam:   ·         CISSP Articles – Secure Network Design ·         CISSP Training –  Cybercrime and Data Breaches ·         CISSP Exam Questions   BTW - Get access to all my Training Courses here at:  https://www.cisspcybertraining.com Want to find Shon Gerber / CISSP Cyber Training elsewhere on the internet? LinkedIn – www.linkedin.com/in/shongerber CISSPCyberTraining.com - https://www.cisspcybertraining.com/ Facebook - https://www.facebook.com/CyberRiskReduced/   LINKS:  ISC2 Training Study Guide Gain access to 30 FREE CISSP Exam Questions each and every month by going to FreeCISSPQuestions.com and sign-up to join the team for Free.

Resilient Cyber
S3E16: Greg Thomas - Secure Service Mesh & Cloud-native Networking

Resilient Cyber

Play Episode Listen Later Sep 1, 2022 32:50


Nikki - In one of your recent posts you speak about how more organizations are looking to leverage service mesh in their own environments. Can you talk a little bit about why a team may be interested in moving to a more service mesh architecture? Nikki: What do you think may impede or stop an organization from adopting updated networking practices and technologies, like service mesh, and how can they get started adopting it?Chris: What role do you think Service Mesh plays in the push for Zero Trust and maturing security in cloud-native environments?Chris: I've heard you use the team Secure Service Networking, what exactly is this, and is it different than Service Mesh? We know there are the four pillars of Service Networking: Service Discovery, Secure Network, Automate Network, Access Service. What are these exactly? Chris: In the context of micro-services and Kubernetes, how does networking change? Nikki: The field of engineering is growing more and more, we have Infrastructure Engineers, Application Engineers, versus the traditional job roles of Systems or Software Engineers. Do you see an industry trend moving to expanding the engineering field into different disciplines, like Platform Engineers? Or do you think some of these roles are similar but are getting updated titles?Chris: HashiCorp has some excellent offerings such as Terraform, Vault, Consul and so on. What resources can folks use to upskill in these technologies?Nikki: I saw you recently did a talk on securing service level networking for the DoD - do you feel like a lot of those principles apply outside of the DOD or federal space? Or do you see the private sector using more of these technologies?

Bitcoin and Financial Independence
44: Scarcity With A Secure Network

Bitcoin and Financial Independence

Play Episode Listen Later Jul 24, 2022 7:38


Bitcoin is scarce, but that alone doesn't make it valuable.Scarcity with a large transparent and secure network does..==============================Check out getbitcoinfi.com for more blog posts and articles, and get involved in the community.Strike - the Venmo of crypto. Buy, sell and send crypto with no fees. Use my link to get $10, no purchase necessary.Cash App has low fees and Bitcoin only. Get $5 when you sign up with me linkI have a Roth IRA with Choice to buy Bitcoin in a tax sheltered account. Traditional IRA's are also available. We both get $50 in Bitcoin when you open and fund an account, plus daily chances to win Bitcoin.Swan Bitcoin: Lower fees than Coinbase with a strong focus on educationGiddy waitlist - A simple to use DeFi appMy TwitterMy Youtube==============================Feel free to schedule 15 minutes with me.Note: Swan Bitcoin is my only affiliate relationship - the rest are mutually beneficial referral links.

Configuration Examples with KevTechify for the Cisco Certified Network Associate (CCNA)
Secure Network Devices - Network Security Fundamentals - Configuration Examples for Introduction to Networks - CCNA - KevTechify | podcast 26

Configuration Examples with KevTechify for the Cisco Certified Network Associate (CCNA)

Play Episode Listen Later Jul 22, 2022 38:03


In this episode we are going to look at configuring Secure Network Devices.In this activity we will configure a router and a switch based on a list of requirements. Thank you so much for watching this episode of my series on Configuration Examples for the Cisco Certified Network Associate (CCNA).Once again, I'm Kevin and this is KevTechify. Let's get this adventure started.All my details and contact information can be found on my website, https://KevTechify.comYouTube Channel: https://YouTube.com/KevTechify-------------------------------------------------------Cisco Certified Network Associate (CCNA)Configuration Examples for Introduction to Networks v1 (ITN)Network Security FundamentalsLab 16.5.1 - Secure Network DevicesPod Number: 26Season: 1-------------------------------------------------------Equipment I like.Home Lab ►► https://kit.co/KevTechify/home-labNetworking Tools ►► https://kit.co/KevTechify/networking-toolsStudio Equipment ►► https://kit.co/KevTechify/studio-equipment  

DealMakers
Avery Pennarun On Selling His College Startup To IBM And Raising $115 Million To Build A Secure Network

DealMakers

Play Episode Listen Later Jul 14, 2022 34:43


Avery Pennarun launched his first successful startup in college. He is now on his second tech startup, and investors have been more than eager to help fund it. The venture, Tailscale has attracted funding from top-tier investors like Accel, Heavybit, Insight Partners, and Uncork Capital.

Security In Five Podcast
Episode 1192 - Microsoft Edge Is Getting A VPN

Security In Five Podcast

Play Episode Listen Later May 2, 2022 6:23


Microsoft Edge appears to be getting a built-in VPN. This episode talks about the new feature called Secure Network and the details around this and when you can expect it. Be aware, be safe. Get ExpressVPN, Secure Your Privacy And Support The Show Become A Patron! Patreon Page *** Support the podcast with a cup of coffee *** - Ko-Fi Security In Five —————— Where you can find Security In Five —————— Security In Five Reddit Channel r/SecurityInFive Binary Blogger Website Security In Five Website Security In Five Podcast Page - Podcast RSS Twitter @securityinfive iTunes, YouTube, TuneIn, iHeartRadio,

Motivation Plus Marketing Podcast
John Di Lemme LIVE on the Financial Secure Network Show

Motivation Plus Marketing Podcast

Play Episode Listen Later Mar 1, 2022 22:41


During this episode, John Di Lemme was recently interviewed on Kerry Lutz's Financial Secure Network Show about how you can build your business to be sustainable and profitable in the long term. Here are a few highlights from the Show... John Di Lemme focuses his efforts on helping entrepreneurs, and founded Conservative Business Journal. As a CEO, it's important to think about what you can do to go above and beyond. There is a difference between selling and marketing; marketing entails building relationships with clients and conserving them. Focus on past and current customers rather than just running to the next client. You want to brand yourself for extreme customer service, not the lowest prices. Always have a grand opening mindset.   ✔ Want More *Real News* go to... http://www.ConservativeBusinessJournal.com/updateme ✔ The #1 Secret on How to CANCEL the Cancel Culture is to support Conservative Business Owners and Entrepreneurs by going to http://www.ConservativeMarketplace.com Thank you for the Support! We are Always Open and WE LOVE PATRIOTS! Plus we offer a Mask Free – Vax Free Shopping Experience. Now go Shop away at over 150 Items in the Conservative Marketplace… http://www.ConservativeMarketplace.com ✔ Subscribe to John Di Lemme's Clouthub Channel and be notified of all LIVE Shows at https://clouthub.com/c/cbjrealnews ✔ Follow John Di Lemme and the CBJ Real News on Telegram at https://t.me/cbjrealnews   ✔ Support Patriot Mike Lindell and Receive Up to 66% Off Your Entire Order… Go to www.MyPillow.com and use Promo Code CBJ to receive your INSTANT Savings!

Conservative Business Journal Podcast
John Di Lemme LIVE on the Financial Secure Network Show

Conservative Business Journal Podcast

Play Episode Listen Later Mar 1, 2022 22:41


During this CBJ Real News Podcast Show, John Di Lemme was recently interviewed on Kerry Lutz's Financial Secure Network Show about how you can build your business to be sustainable and profitable in the long term. Here are a few highlights from the Show...   John Di Lemme focuses his efforts on helping entrepreneurs, and founded Conservative Business Journal. As a CEO, it's important to think about what you can do to go above and beyond. There is a difference between selling and marketing; marketing entails building relationships with clients and conserving them. Focus on past and current customers rather than just running to the next client. You want to brand yourself for extreme customer service, not the lowest prices. Always have a grand opening mindset.   ✔ Want More *Real News* go to... http://www.ConservativeBusinessJournal.com/updateme ✔ The #1 Secret on How to CANCEL the Cancel Culture is to support Conservative Business Owners and Entrepreneurs by going to http://www.ConservativeMarketplace.com Thank you for the Support! We are Always Open and WE LOVE PATRIOTS! Plus we offer a Mask Free – Vax Free Shopping Experience. Now go Shop away at over 150 Items in the Conservative Marketplace… http://www.ConservativeMarketplace.com ✔ Subscribe to John Di Lemme's Clouthub Channel and be notified of all LIVE Shows at https://clouthub.com/c/cbjrealnews ✔ Follow John Di Lemme and the CBJ Real News on Telegram at https://t.me/cbjrealnews   ✔ Support Patriot Mike Lindell and Receive Up to 66% Off Your Entire Order… Go to www.MyPillow.com and use Promo Code CBJ to receive your INSTANT Savings!

Ethical Hacking
How to secure network media ?

Ethical Hacking

Play Episode Listen Later Dec 29, 2021 21:49


Hello everyone welcome to the show "Ethical Hacking" episode 82 today we are going to discuss about Securing network media.Network media is the cabling that makes up our network.This can be copper,fiber optic, or coaxial.And they're going to be used as a connectivity method inside of our wired networks.Now, in addition to all the cables there's other parts of the cabling plant we have to think about.All those intermediate devices like patch panels, punch-down blocks,and network jacks all make up this cabling plant that runs throughout our organization.And each part of that can be a vulnerability for us.The first vulnerability I want to discuss is EMI.This stands for electromagnetic interference.Electromagnetic interference is a disturbance that can affect electrical circuits,devices, and cables due to radiation or electromagnetic conduction that occurs.Now, EMI is something that happens normally inside our businesses and inside our homes.EMI is caused by all sorts of things, like televisions,microwaves, cordless phones, baby monitors,motors like inside your vacuum, and other devices.Anything that is really a powered device,even handheld drills can cause electromagnetic interference.Now, to minimize EMI you need to install shielding around the source, for instance,your air conditioner lets off a lot of EMI.You could put shielding around that.Or you can shield the cable itself by choosing shielded twisted-pair.Now, STP cables, or shielded twisted-pair,have foil around either each twisted-pair in the cable or around the entire bundle of twisted-pairs to prevent emanations out of the cable or interference entering into the cable.STP gives you double benefit, it keeps things out, and it keeps things in.This is good for security and helps minimize this vulnerability.Now, the next vulnerability we have is called radio frequency interference, or RFI.RFI is just another type of interference like EMI.Like EMI it's a disturbance that can affect your electrical circuits,your devices, and your cables.But instead of being caused by electrical waves it's caused by radio waves.Most often from AM and FM transmission towers or cellular phone towers.Now, cell towers and radio towers near your office can be a big source of RFI in your wireless networks.And when you have a significant amount of RFI this can cause to network connectivity problems for your wired networks, as well as disturbing your wireless networks too.Now, this is something that you're going to have to address.And a lot of it is going to be addressed by shielding the building or getting stronger devices that can overcome the radio frequency interference that's occurring.Another vulnerability we have is what's known as crosstalk.Crosstalk occurs when a signal is transmitted on one copper wire, and it creates an undesired effect on another copper wire.So, when we think about having two copper wires,like inside of a twisted-pair cable,if the shielding inside that protects those wires comes off,then we can actually have crossover from one wire to another.And that causes interference because of the data emanations and EMI.Crosstalk is essentially that,but in very close proximity.Now, this becomes very common with older cable network types, things like Cat3 networks,or even some early Cat5 networks.Most of our Cat5E and Cat6A networks aren't really subject to crosstalk nearly as much.Another place is see crosstalk happen a lot is if you have punch-down blocks,and you decide to use an older terminal,like the old 66 blocks that were used for phone lines,and tried to use that for networks.Networks should always use a 110 block,like you learned back in Network because it gives more spacing and prevents crosstalk from occurring.The next thing you want to talk about here is STP cables because STP cables are really helpful to our networks.They can prevent some of that RFI, they can prevent EMI.And they can help with crosstalk.

Ethical Hacking
How to secure network devices ? What are network devices ?

Ethical Hacking

Play Episode Listen Later Dec 27, 2021 15:13


Hello everyone welcome to the show "Ethical Hacking" episode 81 today we are going to discuss about Securing network devices.Network devices include things like switches, routers,firewalls, IDS, IPS, and more.Each of these different devices has its own vulnerabilities that have to be addressed.But for the security.we're going to focus on the most common vulnerabilities across all of these different devices.The first vulnerability we're going to talk about is default accounts.These are accounts that exist on a device straight out of the box when you buy it.So for example, if you buy a small office,home office wireless access point.Like a Linksys or a D-Link, or something like that,it's going to have some accounts already established on there.It might have one like admin or administrator or user,or something of that nature.All of these default accounts are very easy to figure out and very easy to guess.And so it's important for you to actually change these names so that they're not something that an attacker can easily guess.And then all they have to do is guess your password.Now, this applies to your organizations as well.You want to make sure that your naming schemes aren't really easy to guess.Unfortunately, though, most organizations are going to use a common naming scheme for all of their users.For example, most organizations like to use first name dot last name.So if your name was vijay kumar like me,you're vijaykumar@yourcompany.com.Or sometimes they'll do something like vkumar@yourcompany.com, where it's the first letter and the last name.Any of these make for a great,normal, easy to understand naming scheme.That makes operations very easy.But it also makes it fairly easy to guess.Because if I see that Jason.Dion@whatever.com is one email,then I can probably guess that Susan.Smith is also there.Or whoever else I'm dealing with.You want to make sure you're thinking about this and you're starting to add diversity,and making sure that those default user names are changed.Now, the next thing you want to think about is the device user name as well.There's defaults for this too.I've seen people call them router or switch as the user names.That's not a good plan either.When you're creating a device account,you want it to be something more complex.So maybe it's rtr for router with a couple of numbers after it.Something that's not easily guessable.That's what I'm talking about here as we try to change these default accounts.The next issue we have goes right along with default accounts,it's weak passwords.Don't leave passwords as their default.For instance, those Linksys routers we all have,they're admin for user, admin for password.That is horrible.We also don't want to use any words that are in the dictionary.Your passwords need to be long, strong and complex with at least 14 characters long, upper case, lower case, special characters and numbers.By having this mixture, it's going to increase the time it takes to brute force that password,and make it much harder for an attacker to break in to your network.So for example, if I have the password of password,which is all lower case, I'm only using 26 different options because lower case letters are A through Z.And so if I look at that, that's considered a weak password.If I add some upper case to it, now I have 52 characters because I have upper case and lower case.So I have something like password,where the P, the S's and the D's are upper case and the other letters are lower case.If I want to make it even more secure,I can add numbers to that.And I'll change out the S's for fives and the Os for zeroes, things like that.And this is going to give us more choices, again,because we have 26 lower case, 26 upper case and 10 numbers, zero through nine.But if we want it to be the best and most secure that it possibly can be, we want to add symbols to this too.And so now we're going to get something like 70 different options.

Coffee and Security
Secure Network Architecture & Administration - Part 2

Coffee and Security

Play Episode Listen Later Dec 21, 2021 19:16


Network security starts with secure network architecture. Today's modern threats need a more modern approach to network detection and response (NDR) that evolves with the way we work and the way threat actors attack. On today's episode we'll check in on some of the high level aspects of what small businesses need to do to identify, detect, and recover from attacks using the network layer. Show Notes: https://insula.tech/tag/coffee-and-security

VMware Partnership Perspectives
Building a Secure Network at the Edge- Guest: Sanjay Uppal, SVP & GM, Service Provider and Edge Business Unit, VMware

VMware Partnership Perspectives

Play Episode Listen Later Jun 25, 2021 26:59


An industry veteran, Sanjay Uppal was co-founder and CEO of VeloCloud, an SD-WAN pioneer which was acquired by VMware in 2017. He now leads the VMware Service Provider and Edge Service Unit, where he leads the team shaping the VMware SASE platform. In this episode, Sanjay talks about the VMware vision to simplify security and reduce the attack surface through a Zero Trust approach that spans from client to cloud to container. For anyone fascinated with how security is moving to the edge and being delivered from the cloud as a service, this conversation is a great way to learn about this rapidly evolving space.  About the Guest: Sanjay Uppal, Senior Vice President and GM, Service Provider and Edge Business Unit (SEBU) at VMware. You can find Sanjay on LinkedIn at: https://www.linkedin.com/in/sanjayuppal/or on Twitter at: @netnut. To learn more about Sanjay's recently published blog, click here:    About the Host: Kathleen Tandy is Vice President of Global Partner and Alliance Marketing at VMware. You can find Kathleen on LinkedIn at: https://www.linkedin.com/in/ktandy85/, or on Twitter at @kaktandy. To learn more about VMware's partner programs, please visit: https://www.vmware.com/partners/partner-executive-edge.html . Subscribe, follow, and review VMware Partnership Perspectives podcast.

CTO Mastermind: Il Podcast per i CTO
Strategie di comunicazione Tech vs. Business | 💻🍔 CTO Lunch #010

CTO Mastermind: Il Podcast per i CTO

Play Episode Listen Later Apr 14, 2021 38:31


Sono i CTO che dovrebbero parlare la lingua del business o i CEO che dovrebbero avvicinarsi di più ai concetti Tech? Quali sono gli argomenti più critici e quali i consigli pratici per comprendersi meglio? Ne abbiamo parlato su Clubhouse nell'10° appuntamento con il 💻🍔 CTO Lunch, pranzo tecnologico con https://www.alexpagnoni.com (Alex Pagnoni) e la community del https://insights.innoteam.it/ctomastermind/ (CTO Mastermind)! ➡️ https://www.alexpagnoni.com/eventi/ (Richiedi l'invito al prossimo CTO Lunch) 🖖 HOST: Alex Pagnoni: imprenditore di servizio e di prodotto (https://www.innoteam.it/ (Innoteam), https://www.teamscaling.it/ (Team Scaling)), https://www.axelerant.it/ (Fractional CTO), esperto di cloud, sviluppo software e marketing technologies. Sono speaker, content creator, conduttore del CTO Show e del CTO Podcast, fondatore della https://insights.innoteam.it/ctomastermind/ (community CTO Mastermind) (+190 CTO italiani). Ringraziamo della partecipazione: Alvise Biffi (AD di Secure Network), Giuseppe Santoro (CTO di TogetherPrice), Sandro Trapella (CTO di Smiling.video), Alessio Setaro (CTO di Leroy Merlin Italia). 🚀 Vuoi crescere professionalmente, confrontandoti con i migliori CTO di tutta Italia? Entra subito nella community CTO Mastermind su slack, insieme a +190 CTO e Leader Tecnologici da tutta Italia: https://insights.innoteam.it/ctomastermind/ (entra ora nella community CTO Mastermind)!

CTO Mastermind: Il Podcast per i CTO
Come scalare un Business Tech | CTO Show #016 con Alvise Biffi

CTO Mastermind: Il Podcast per i CTO

Play Episode Listen Later Apr 13, 2021 52:16


In ambito tech, ci sono tantissime opportunità per scalare il business. Il problema diventa: come farlo? Ne ho parlato con Alvise Biffi, amministratore delegato di Secure Network, nel CTO Show 016, confrontando le nostre esperienze di imprenditori tech su: ✔️ Scalabilità di Business Tech ✔️ Talent Acquisition ✔️ Strategie di Comunicazione Tech-Business 🗣 GUEST: Alvise Biffi, imprenditore e business angel, AD di Secure Network. Dal 1999 opera nella consulenza strategica, principalmente in ambito Digital e Cyber Security. Ha curato l’avviamento di diverse start up tech della scena milanese. 🖖 HOST: Alex Pagnoni: imprenditore di servizio e di prodotto (https://www.innoteam.it/ (Innoteam), https://www.teamscaling.it/ (Team Scaling)), https://www.axelerant.it/ (Fractional CTO), esperto di cloud, sviluppo software e marketing technologies. Sono speaker, content creator, conduttore del CTO Show e del CTO Podcast, fondatore della https://insights.innoteam.it/ctomastermind/ (community CTO Mastermind) (+190 CTO italiani). 🚀 Vuoi crescere professionalmente, confrontandoti con i migliori CTO di tutta Italia? Entra subito nella community CTO Mastermind su slack, insieme a +190 CTO e Leader Tecnologici da tutta Italia: https://insights.innoteam.it/ctomastermind/ (entra ora nella community CTO Mastermind)! ⭐️⭐️⭐️⭐️⭐️ Il Podcast ti è piaciuto? Aiutaci a farlo a conoscere a altri CTO e leader tecnologici. Aggiungilo ai tuoi preferiti e lascia una recensione su Apple Podcast o su Podchaser!

The Restaurant Technology Guys Podcast brought to you by Custom Business Solutions
83 - Ensuring you can get and process orders with a secure network from Netsurion

The Restaurant Technology Guys Podcast brought to you by Custom Business Solutions

Play Episode Listen Later Jul 20, 2020 45:05


83 - Ensuring you can get and process orders with a secure network from Netsurion by Restaurant Technology Guys Podcast, sponsored by Custom Business Solutions

orders ensuring secure network
TechCrunch Startups – Spoken Edition
Owkin raises $25 million as it builds a secure network for healthcare analysis and research

TechCrunch Startups – Spoken Edition

Play Episode Listen Later May 11, 2020 5:33


Imagine a model of collaborative research and development among hospitals, pharmaceutical companies, universities and other research institutions where no one shared any actual data. That's the dream of the new New York-based startup Owkin, which has raised $25 million in fresh financing from investors, including Bpifrance Large Venture, Cathay Innovation and MACSF (the French Pension […]

Reduce Cyber Risk Podcast
RCR 051 - Learning about Secure Network Components for the CISSP Exam

Reduce Cyber Risk Podcast

Play Episode Listen Later Dec 2, 2019 31:08


Shon Gerber from ShonGerber.com provides you the information and knowledge you need to prepare and pass the CISSP Exam while providing the tools you need to enhance your cybersecurity career.  Shon utilizes his expansive knowledge while providing superior training from his years of training people in cybersecurity.  In this episode, Shon will talk about the following items that are included within Domain 4 (Communication and Network Security) of the CISSP Exam: CISSP Articles – Secure Network Design CISSP Training –  Cybercrime and Data Breaches CISSP Exam Questions BTW - Get access to all my CISSP Training Courses here at:  https://shongerber.com/ Want to find Shon Gerber elsewhere on the internet? LinkedIn – www.linkedin.com/in/shongerber Facebook - https://www.facebook.com/CyberRiskReduced/ LINKS:  ISC2 Training Study Guide https://www.isc2.org/Training/Self-Study-Resources Peerlyst https://www.secureops.com/networking/effective-network-security-design/ TechTarget https://searchsecurity.techtarget.com/quiz/CISSP-Domain-4-Test-your-expertise-of-network-security-basics?q0=0&q1=1&q2=1&q3=0&x=55&y=5>

Market Disruptors
Why Bitcoin Is The Most Secure Network In The World

Market Disruptors

Play Episode Listen Later Jul 23, 2019 55:40


In this episode, Mark Moss discusses the leading crypto protocol, Bitcoin, with Dan Held, founder of Interchange, a reconciliation tool for traders and investors. Dan began his involvement in the industry in 2012 after a friend paid him using Bitcoin. He was part of the first crypto meeting in San Francisco with the founders of Coinbase, Ripple, Kraken, and other crypto personalities. He continues sharing insights through his blog, danheld.com.

Cyber Security Dispatch
The Nightmare of IOT Vulnerabilities - An Interview with Stefano Zanero & Roberto Clapis

Cyber Security Dispatch

Play Episode Listen Later Apr 6, 2018 27:55


On today’s episode we host a conversation with Roberto Clapis and Stefano Zanero from Secure Network in Milan. We tackle the issue of IOT device security and try to break down just where companies and users are at with this issue currently. We get a background to Stefano and Roberto’s work and their interest in security as well as little peak inside their presentation from The Black Hat Convention. One of the main takeaways from the discussion is the idea of communication between security and other sectors, something that our guests suggest would greatly improve the strength of security. Listen in to hear what they have to say!

DEF CON 23 [Audio] Speeches from the Hacker Convention
Matteo Becarro & Matteo Collura - Extracting the Painful (blue)tooth

DEF CON 23 [Audio] Speeches from the Hacker Convention

Play Episode Listen Later Sep 22, 2015


Materials Available here:https://media.defcon.org/DEF%20CON%2023/DEF%20CON%2023%20presentations/DEFCON-23-Matteo-Becarro-Matteo-Collura-Extracting-The-Painful-Bluetooth.pdf Extracting the Painful (blue)tooth Matteo Beccaro Matteo Collura Do you know how many Bluetooth-enabled devices are currently present in the world? With the beginning of the IoT (Internet of Things) and Smart Bluetooth (Low energy) we find in our hands almost a zillion of them. Are they secure? What if I tell you I can unlock your Smartphone? What if I tell you I'm able to open the new shiny SmartLock you are using to secure your house's door? In this talk we will explain briefly how the Bluetooth (BDR/EDR/LE) protocols work, focusing on security aspects. We will show then some known vulnerabilities and finally we will consider deeply undisclosed ones, even with live demonstrations. Matteo Beccaro is a young security researcher. His interest focus on WiFi networks, networking and NFC implementations. He finished high school studies in July 2013 and actually he is a student at Politecnico di Torino in Computer Engineering course. He has been selected as speaker at DEF CON 21, 30C3, BlackHat US Arsenal, DEF CON 22's Skytalks and BlackHat EU 2014 and Tetcon, for his research in vulnerabilities of NFC transport systems. Since 2013 he is also pentester and security engineer at Secure Network s.r.l. Since 2015 he is also technical leader of the Security Research Team of OPFOR, the physical security division of Secure Network s.r.l. Twitter: @_bughardy_ Matteo Collura is a student of Electronics Engineering at Politecnico di Torino. He has been studying Wireless networks and in the last few years he focused on NFC. He presented the results of a progressive work of research at several conferences: DEF CON 21 (Las Vegas, 2013), 30C3 (Hamburg 2013), DEF CON Skytalks (Las Vegas, 2014), BlackHat USA 2014 Arsenal (Las Vegas). Currently he is studying Bluetooth protocols and their implementations. Twitter: @eagle1753

CERIAS Security Seminar Podcast
Cristina Nita-Rotaru, Secure Network Coding for Wireless Mesh Networks

CERIAS Security Seminar Podcast

Play Episode Listen Later Aug 25, 2010 52:31


In this talk we identify two general frameworks (inter-flow and intra-flow) that encompassseveral network coding-based systems proposed in wireless mesh networks. Our systematicanalysis of the components of these frameworks reveals vulnerabilities to a wide range of attacks,which may severely degrade system performance. We then focus on addressing the most severeand generic attack against network coding systems, known as packet pollution attack. We showthat existing cryptographic mechanisms that were proposed to solve the problem have a prohibitivecost that makes them impractical in wireless mesh networks. We propose the first practical defensemechanisms to pollution attacks in network coding for wireless mesh networks. The experimentalresults show that the proposed mechanisms can effectively filter out polluted packets and quicklyidentify and isolate attacker nodes while incurring small computation and bandwidth overhead. About the speaker: Cristina Nita-Rotaru is an Associate Professor in the Department of Computer Science at Purdue University where she established the Dependable and Secure Distributed Systems Laboratory (DS2).She is a member of the Center for Education and Research in Information Assurance and Security (CERIAS) and is associated with the Center for Wireless Systems and Applications (CWSA) at Purdue University.Her research interests lie in designing distributed systems, network protocols and applications that are robust to failure, mis-configuration, and malicious attacks. Cristina Nita-Rotaru is a recipient of the NSF Career Award in 2006. She has served on the Technical Program Committee of numerous conferences in security, networking, and distributed systems. She is currently serving as an Associate Editor for ACM Transactions on Information Security and Elsevier Computer Communications.

CERIAS Security Seminar Podcast
Cristina Nita-Rotaru, "Secure Network Coding for Wireless Mesh Networks"

CERIAS Security Seminar Podcast

Play Episode Listen Later Aug 25, 2010


In this talk we identify two general frameworks (inter-flow and intra-flow) that encompass several network coding-based systems proposed in wireless mesh networks. Our systematic analysis of the components of these frameworks reveals vulnerabilities to a wide range of attacks, which may severely degrade system performance. We then focus on addressing the most severe and generic attack against network coding systems, known as packet pollution attack. We show that existing cryptographic mechanisms that were proposed to solve the problem have a prohibitive cost that makes them impractical in wireless mesh networks. We propose the first practical defense mechanisms to pollution attacks in network coding for wireless mesh networks. The experimental results show that the proposed mechanisms can effectively filter out polluted packets and quickly identify and isolate attacker nodes while incurring small computation and bandwidth overhead.

Digital Nation Radio Show
Special Guest: Mike Elgan (The Raw Feed), Cyber Crime/Identity Theft and Securing Your Wireless Ne

Digital Nation Radio Show

Play Episode Listen Later Dec 1, 2007 38:20


Black Hat Briefings, Las Vegas 2006 [Video] Presentations from the security conference
Stephano Zanero: Host Based Anomaly Detection on System calls arguments

Black Hat Briefings, Las Vegas 2006 [Video] Presentations from the security conference

Play Episode Listen Later Jun 4, 2006 74:57


Traditionally, host-based anomaly detection has dealt with system call sequences, but not with system call arguments. We propose a prototype which is capable of detecting anomalous system calls in an execution flow, thus helping in tracing intrusions. Our tool analyzes each argument of the system call, characterizing its contents and comparing it with a model of the content. It is able to cluster system calls and detect "different uses" of the same syscall in different points of different programs. It is also able to build a Markovian model of the sequence, which is then used to trace and flag anomalies. Stefano Zanero received a Ph.D. degree in Computer Engineering from the Politecnico of Milano technical university, where he is currently spending his post-doc. His current research interests include the development of Intrusion Detection Systems based on unsupervised learning algorithms, security of web applications and computer virology. He has been a speaker at international scientific and technical conferences, and he is the author and co-author of books and articles published in international, peer reviewed journals and conferences. He is a member of the board of the "Journal in Computer Virology", and acts as a reviewer for the "ACM Computing Reviews" and "IEEE Security&Privacy", as well as various primary international conferences. He is a member of the IEEE (Institute of Electrical and Electronics Engineers), the ACM (Association for Computing Machinery), and of ISSA (Information Systems Security Association). He has also been a columnist for Computer World Italy, and has been awarded a journalism award in 2003. Since 2004 he is a partner and CTO of Secure Network, a firm specializing in information security training and consulting, based in Milan."

Black Hat Briefings, Las Vegas 2006 [Video] Presentations from the security conference
Claudio Merloni: The BlueBag: a mobile, covert Bluetooth attack and infection device

Black Hat Briefings, Las Vegas 2006 [Video] Presentations from the security conference

Play Episode Listen Later Jun 4, 2006 49:20


How could an attacker steal the phone numbers stored on your mobile, eavesdrop your conversations, see what you're typing on the keyboard, take pictures of the room you're in, and monitor everything you're doing, without ever getting in the range of your Bluetooth mobile phone? In this talk we present a set of projects that can be combined to exploit Bluetooth devices (and users...), weaknesses building a distributed network of agents spreading via Bluetooth which can seek given targets and exploit the devices to log keystrokes, steal data, record audio data, take pictures and then send the collected data back to the attacker, either through the agents network or directly to the attacker. We show the different elements that compose the whole project, giving an estimate, through real data and mathematical models, of the effectiveness of that kind of attack. We also show what our hidden, effective and cool worm-spreading trolley looks like: say hello to the BlueBag! ;-) Claudio Merloni, M.S. in Computer Engineering, has graduated from the Politecnico of Milano School of Engineering. Since 2004, he has worked as a security consultant for Secure Network, a firm specializing in information security consulting and training, based in Milan. His daily work is focused mainly on security policies and management, security assessment and computer forensics. Luca Carettoni is a Computer Engineering student at the Politecnico of Milano University. His current research and master’s degree thesis deals with automatic detection of web application security flaws. Since 2005 he has worked as a security consultant for Secure Network, a firm specializing in information security consulting and training, based in Milan. He is the author of several research papers, advisories and articles on computer security for Italian journals. His interests revolve around three attractors: web applications security, mobile computing and digital freedom."

Black Hat Briefings, Las Vegas 2006 [Audio] Presentations from the security conference
Stephano Zanero: Host Based Anomaly Detection on System calls arguments

Black Hat Briefings, Las Vegas 2006 [Audio] Presentations from the security conference

Play Episode Listen Later Jun 4, 2006 74:57


"Traditionally, host-based anomaly detection has dealt with system call sequences, but not with system call arguments. We propose a prototype which is capable of detecting anomalous system calls in an execution flow, thus helping in tracing intrusions. Our tool analyzes each argument of the system call, characterizing its contents and comparing it with a model of the content. It is able to cluster system calls and detect "different uses" of the same syscall in different points of different programs. It is also able to build a Markovian model of the sequence, which is then used to trace and flag anomalies. Stefano Zanero received a Ph.D. degree in Computer Engineering from the Politecnico of Milano technical university, where he is currently spending his post-doc. His current research interests include the development of Intrusion Detection Systems based on unsupervised learning algorithms, security of web applications and computer virology. He has been a speaker at international scientific and technical conferences, and he is the author and co-author of books and articles published in international, peer reviewed journals and conferences. He is a member of the board of the "Journal in Computer Virology", and acts as a reviewer for the "ACM Computing Reviews" and "IEEE Security&Privacy", as well as various primary international conferences. He is a member of the IEEE (Institute of Electrical and Electronics Engineers), the ACM (Association for Computing Machinery), and of ISSA (Information Systems Security Association). He has also been a columnist for Computer World Italy, and has been awarded a journalism award in 2003. Since 2004 he is a partner and CTO of Secure Network, a firm specializing in information security training and consulting, based in Milan."

Black Hat Briefings, Las Vegas 2006 [Audio] Presentations from the security conference
Claudio Merloni: The BlueBag: a mobile, covert Bluetooth attack and infection device

Black Hat Briefings, Las Vegas 2006 [Audio] Presentations from the security conference

Play Episode Listen Later Jun 4, 2006 49:20


"How could an attacker steal the phone numbers stored on your mobile, eavesdrop your conversations, see what you're typing on the keyboard, take pictures of the room you're in, and monitor everything you're doing, without ever getting in the range of your Bluetooth mobile phone? In this talk we present a set of projects that can be combined to exploit Bluetooth devices (and users...), weaknesses building a distributed network of agents spreading via Bluetooth which can seek given targets and exploit the devices to log keystrokes, steal data, record audio data, take pictures and then send the collected data back to the attacker, either through the agents network or directly to the attacker. We show the different elements that compose the whole project, giving an estimate, through real data and mathematical models, of the effectiveness of that kind of attack. We also show what our hidden, effective and cool worm-spreading trolley looks like: say hello to the BlueBag! ;-) Claudio Merloni, M.S. in Computer Engineering, has graduated from the Politecnico of Milano School of Engineering. Since 2004, he has worked as a security consultant for Secure Network, a firm specializing in information security consulting and training, based in Milan. His daily work is focused mainly on security policies and management, security assessment and computer forensics. Luca Carettoni is a Computer Engineering student at the Politecnico of Milano University. His current research and master’s degree thesis deals with automatic detection of web application security flaws. Since 2005 he has worked as a security consultant for Secure Network, a firm specializing in information security consulting and training, based in Milan. He is the author of several research papers, advisories and articles on computer security for Italian journals. His interests revolve around three attractors: web applications security, mobile computing and digital freedom."