Podcasts about Socs

  • 264PODCASTS
  • 554EPISODES
  • 51mAVG DURATION
  • 5WEEKLY NEW EPISODES
  • Jul 29, 2025LATEST

POPULARITY

20172018201920202021202220232024


Best podcasts about Socs

Latest podcast episodes about Socs

CXOInsights by CXOCIETY
PodChats for FutureCISO: Developing a Resilient Cybersecurity Roadmap

CXOInsights by CXOCIETY

Play Episode Listen Later Jul 29, 2025 18:33


In 2025, Asia's cybersecurity landscape is shaped by rapid digitalisation, AI adoption, and evolving regulatory frameworks. Regional authorities, such as Singapore's MAS and South Korea's National AI Committee, are intensifying enforcement and introducing robust regulations for data privacy, AI governance, and cyber risk management. Businesses face mounting threats from ransomware, advanced persistent threats, and supply chain vulnerabilities, driving demand for Cybersecurity-as-a-Service and managed SOCs. Industry reports highlight a widening gap in cyber resilience and stress the need for urgent action to address cyber inequity and enhance recovery capabilities.1.       How will evolving AI, cloud security, and data privacy regulations across Asia-Pacific affect CISO's multi-cloud governance and compliance frameworks?2.       What strategies can CISOs/organisations adopt to defend against increasingly sophisticated ransomware, supply chain attacks, and network-based intrusions?3.       How do CISOs/CIOs secure hybrid and multi-cloud environments effectively, leveraging generative AI tools to automate identity and access management while reducing manual overhead?4.       Some say quantum computing is still years away. That said, people are talking about post-quantum cryptography today. Can you share any best practice for implementing quantum-resistant encryption and network security protocols to mitigate emerging quantum computing threats?5.       How can CISOs ensure robust security and compliance for AI-powered cloud applications and edge computing infrastructure under diverse data sovereignty laws? How should the CISO work with the CIO and the risk/compliance officers of the organization?6.       Recapping what we've covered so far: our topic is Developing a Resilient Cybersecurity Roadmap. Can you offer some recommendations for CISOs and CIOs in developing their resilient cybersecurity roadmap?

The New CISO
How to Score a Security Role — Without Collecting Certifications

The New CISO

Play Episode Listen Later Jul 24, 2025 51:56


In this episode of The New CISO, host Steve Moore speaks with Marius Poskus, Chief Information Security Officer at Glow Financial Services and creator of the Cyber Diaries podcast. Marius shares his journey from physical security into cybersecurity leadership—and how he did it without relying on traditional certifications.Marius reflects on how self-directed learning, mentorship, and a strong personal brand helped him pivot careers and thrive in the FinTech space. He explains why the security industry needs to stop glorifying certifications, how to break in through SOC roles, and what truly makes a candidate stand out in interviews. From coaching new talent to advising startups on go-to-market strategies, Marius emphasizes that attitude and aptitude matter far more than credentials.Key Topics Covered:Why Marius walked away from a career in physical security—and how that experience shaped his cyber pathThe critical difference between certification collecting and real-world skill developmentWhy most entry-level cybersecurity roles are in SOCs—and how to leverage thatHow sharing your learning journey online builds credibility and unlocks job opportunitiesThe two A's that matter most when hiring: attitude and aptitudeCommon mistakes startups make when targeting CISOs and building security toolsThe growing risks of “AI-washing” and what real AI innovation should look likeWhy mentorship only works when mentees are willing to put in the workHow to shift from security awareness “stick” tactics to culture-based collaborationWhat it means to build a personal brand that outlasts your job titleMarius' story proves that cybersecurity success doesn't come from certificates—it comes from curiosity, consistency, and community. Whether you're just starting your career or leading a security team, this episode will inspire you to focus on what really moves the needle.Marius Poskus Podcast - Cyber Diaries Podcast

ITSPmagazine | Technology. Cybersecurity. Society
Dropzone AI Brings Agentic Automation to Black Hat USA 2025 | A DROP ZONE AI Pre Event Coverage of Black Hat USA 2025 Las Vegas | Brand Story with Edward Wu Founder/CEO at Dropzone AI

ITSPmagazine | Technology. Cybersecurity. Society

Play Episode Listen Later Jul 23, 2025 20:07


As Black Hat USA 2025 approaches, the cybersecurity world is buzzing with innovation—and Dropzone AI is right at the center of it. With roots in Seattle and a mission to bring true intelligence into the security operations center (SOC), the Dropzone AI team is gearing up for a packed week in Las Vegas, from BSides to the AI Summit, and finally at Startup City (booth #6427).Founded by Edward Wu, former Head of AI/ML at ExtraHop Networks, Dropzone AI was built on a key realization: the last thing SOCs need is another flood of alerts. Instead, they need help processing and acting on them. That's where Dropzone comes in—offering an AI-powered security analyst that doesn't just detect threats, but investigates, correlates, and takes action.During a recent pre-event chat with ITSPmagazine's Sean Martin and Marco Ciappelli, Edward explained the core philosophy behind the platform. Unlike hype-driven claims of “fully autonomous SOCs,” Dropzone takes a practical, tiered approach to automation. Their agentic AI system performs full investigations, determines the nature of alerts (true vs. false positives), and recommends or executes containment actions depending on risk tolerance and policy.The tech has found particular traction with lean security teams, or those expanding toward 24/7 coverage without adding headcount. Rather than replacing humans, the platform augments them—freeing analysts from the drudgery of low-priority alert triage and giving them space to focus on strategic work. As Edward put it, “Nobody wants to be a tier-one analyst forever.” Dropzone helps make sure they don't have to be.The platform integrates across existing security stacks and data sources, drawing from threat intel, logs, and endpoint signals to build a full picture of every alert. Security teams retain full control, with human-in-the-loop decision-making remaining the standard in most use cases. However, for low-risk assets and off-hours scenarios, some customers are already authorizing autonomous action.With conversations at Black Hat expected to revolve around the reality of AI in production—not just the vision—Dropzone is entering the perfect arena. From demonstrating real-world impact to sharing insights on agentic design and trust boundaries, their presence will resonate with everyone from analysts to CISOs.Whether you're building out your SOC, questioning your MDR provider, or simply overwhelmed with alert fatigue, this may be your signal. Dropzone AI isn't selling buzzwords. They're delivering results. Visit them at Startup City, booth #6427, and see for yourself what the future of alert triage and SOC efficiency looks like—one investigation at a time. Note: This story contains promotional content. Learn more.Guests:Edward Wu, Founder/CEO at Dropzone AI On LinkedIn: https://www.linkedin.com/in/edwardxwu/DROPZONE AI: https://itspm.ag/dropzoneai-641Hosts:Sean Martin, Co-Founder at ITSPmagazine | Website: https://www.seanmartin.comMarco Ciappelli, Co-Founder at ITSPmagazine | Website: https://www.marcociappelli.com______________________ResourcesVisit the DROPZONE Website to learn more: https://itspm.ag/dropzoneai-641Learn more and catch more stories from Dropzone on ITSPmagazine: https://www.itspmagazine.com/directory/dropzoneaiLearn more about ITSPmagazine Brand Story Podcasts: https://www.itspmagazine.com/purchase-programsNewsletter Archive: https://www.linkedin.com/newsletters/tune-into-the-latest-podcasts-7109347022809309184/Business Newsletter Signup: https://www.itspmagazine.com/itspmagazine-business-updates-sign-upAre you interested in telling your story?https://www.itspmagazine.com/telling-your-story

SECURE AF

Got a question or comment? Message us here!In this week's #SOCBrief, we break down why offboarding policies are ABSOLUTELY critical for security teams. Overlooked items from abandoned accounts to old VPN access can leave backdoors wide open. Learn how SOCs monitor, contain, and shut down lingering access, and why communication between HR, IT, and cybersecurity is essential.

The Signal: A Wi-Fi Alliance podcast
Wi-Fi 7 and AI enable intelligence at the edge with Vineet Ganju of Synaptics

The Signal: A Wi-Fi Alliance podcast

Play Episode Listen Later Jul 23, 2025 21:38


In this episode, we welcome Vineet Ganju, VP of Wireless Connectivity at Synaptics, to the show to discuss Wi-Fi 7 and AI. Vineet talks about how Wi-Fi 7's low latency and high throughput enables applications like immersive AR/VR, factory automation, and next-generation smart home applications. We explore how AI is reshaping connectivity, from efficient network management and enhanced security to local troubleshooting that simplifies setup. We also discuss the integration of Wi-Fi, Bluetooth, Thread, and Zigbee into compact chipsets and the evolution of SoCs that unlock a new level of connectivity. Tune in to learn how Wi-Fi 7 and AI are fueling the future of connected experiences.For Wi-Fi AllianceFor Membership InfoGeneral Contact

Cybercrime Magazine Podcast
From Tools to Teammates. SOC Leadership In The Age of AI Agents. David Greenwood, Product, Sekoia.

Cybercrime Magazine Podcast

Play Episode Listen Later Jul 17, 2025 18:44


David Greenwood, Product at Sekoia, joins host Charlie Osborne to discuss SOC leadership in the age of AI agents, including how they differ from traditional automation practices, best management practices, and more. This episode was brought to you by Sekoia. Leading the way in detection and response solutions for modern SOCs, Sekoia offers businesses and public organizations the best protection technologies against cyber threats. Learn more at https://sekoia.io.

All Hands on Tech with Digital Nova Scotia
GoSecure: Cyber Careers Decoded - SOCs, Threat Hunting & How to Get In

All Hands on Tech with Digital Nova Scotia

Play Episode Listen Later Jul 14, 2025 30:52


Ever wondered what really goes on inside a Security Operations Center (SOC)? In this episode, host, Claire Quirion chats with Derek Halfyard from GoSecure about his journey from NSCC to leading threat hunts and helping clients stay safe around the clock. We break down what a SOC is, who works there, what roles like threat hunters and detection engineers actually do, and what it's really like to build a career in cybersecurity.Derek also opens up about the biggest challenges SOC professionals face, the stress of wondering if a threat has been missed, and the unmatched satisfaction of detecting a previously unknown threat. Whether you're curious about breaking into cyber security or want to understand the realities of life inside a SOC, this episode offers deep insights and career advice. From certifications to career pivots, this is real talk for anyone curious about joining the industry.

Podcast de tecnología e informática
Linux News — rc5 del kernel 6.16, Intel EDAC en 6.17 y más (13-jul-2025)

Podcast de tecnología e informática

Play Episode Listen Later Jul 13, 2025 4:06


Un viaje de 20 min por la actualidad Linux:• Kernel 6.16-rc5 arregla el bajón de rendimiento.• Kernel 6.17 añade EDAC para Granite Rapids-D.• Parchea sudo YA: dos CVE críticos.• Wine-Staging 10.12 corrige un bug de 2014.• GNOME 49 Alpha desactiva X11; Builder se vuelve más pro.• KDE Plasma 6.5 suma funciones y menos cuelgues.• U-Boot 2025.07 trae corutinas, exFAT y más SoCs.Todo explicado en lenguaje fácil, enlaces en las notas.

InfosecTrain
SOC Masterclass: Tools, Roles & Real-Time Threat Response Strategies

InfosecTrain

Play Episode Listen Later Jul 11, 2025 69:37


In this expert-led session, we take you inside the world of the Security Operations Center (SOC) — the command center of modern cybersecurity. Learn how SOCs monitor, detect, and respond to threats in real time using tools like SIEM, threat intelligence, and automated response systems. We cover essential SOC functions including incident response, proactive threat hunting, and compliance alignment, while also diving into core roles such as SOC Analysts, Threat Hunters, and Incident Responders. You'll gain practical insights into SOC maturity models, workflow optimization, and how to use leading tools like Splunk, ELK, and QRadar.Perfect for aspiring SOC professionals or teams aiming to enhance their detection and response capabilities.

InfosecTrain
Proactive Threat Hunting: Techniques to Detect & Stop Attacks Early

InfosecTrain

Play Episode Listen Later Jul 6, 2025 59:27


In this session, we break down the core principles of proactive threat hunting — a critical skill for identifying and stopping cyber threats before they cause damage. Learn how security teams use behavioral analysis, threat intelligence, and tools like SIEM and EDR to detect hidden threats and reduce dwell time. We cover the techniques and mindset required to hunt down threats lurking within systems, and show how a proactive approach dramatically improves an organization's ability to prevent breaches and respond effectively.You'll also get a glimpse into advanced threat hunting and DFIR training, including hands-on learning designed to prepare you for real-world challenges in cybersecurity.

Detection at Scale
SANS's John Hubbard on Future-Proofing SOC Analysts in the Age of AI

Detection at Scale

Play Episode Listen Later Jul 1, 2025 28:44


Drawing from his experience building enterprise SOCs and teaching thousands of security professionals, John Hubbard, Cyber Defense Curriculum Lead at SANS Institute and host of the Blueprint podcast, tells Jack about how AI is revolutionizing security operations centers, including balancing AI automation with fundamental analyst skills. They also explore practical AI applications in alert contextualization, team performance analysis, and the future vision of natural language interfaces for complex security tasks.  John emphasizes the importance of teaching both traditional methods and AI-enhanced approaches, ensuring security teams can leverage technology while maintaining critical thinking capabilities. He also discusses considerations around local versus cloud-based AI models and offers actionable advice for security professionals looking to future-proof their careers in an increasingly automated landscape.   Topics discussed: How AI transforms alert contextualization by dynamically incorporating business context and asset information for better triage decisions. The educational challenge of teaching both foundational security methods and AI-enhanced approaches to maintain analyst skills. Practical applications of AI in SOC operations, including automated phishing triage and mass analysis of analyst performance data. The evolution toward natural language interfaces that could enable complex security tasks like packet analysis through conversational commands. Custom agent development versus relying on vendor-provided AI solutions, including the technical challenges and coding requirements involved. Future SOC architecture predictions featuring interconnected agents, MCP protocols, and the abstraction of traditional security analyst tasks. Local versus cloud-based AI model considerations, including data privacy concerns, computational requirements, and trust implications. The critical question of oversight in automated security operations and who monitors AI agents in increasingly autonomous systems. Performance analysis capabilities enabled by AI's ability to process written text and logs at scale for team improvement insights. Practical advice for security professionals to embrace discomfort, invite AI into problem-solving, and establish mentoring relationships for career growth. Listen to more episodes:  Apple  Spotify  YouTube Website

CISO Tradecraft
#237 - Build a World Class SOC (with Carson Zimmerman)

CISO Tradecraft

Play Episode Listen Later Jun 16, 2025 41:41 Transcription Available


Join G Mark Hardy and Carson Zimmerman, the author of '11 Strategies of a World-Class Cybersecurity Operations Center,' in this insightful episode of CISO Tradecraft. Carson shares his career journey, the evolution from the 10 to 11 strategies, and delves into the future needs of Security Operations Centers (SOCs). They discuss critical topics such as the importance of continuous improvement, AI's impact on SOCs, and the value of embracing neurodiversity in cybersecurity teams. Whether you're a seasoned cybersecurity leader or an aspiring professional, get actionable advice on how to enhance and revolutionize your SOC operations. 11 Strategies of a World Class Cybersecurity Operations Center https://www.mitre.org/sites/default/files/2022-04/11-strategies-of-a-world-class-cybersecurity-operations-center.pdf 14 Questions are all you need - https://www.first.org/resources/papers/conf2024/1445-14-Questions-Carson-Zimmerman.pdf Transcripts - https://docs.google.com/document/d/1WVJi9WkxOG7yedQYWSooiqRFjBERd9kV Chapters  00:00 Introduction and Guest Welcome 00:53 Background and Book Discussion 03:33 SOC Challenges and Stagnation 06:10 Managing SOC Alerts and Burnout 09:26 SOC Evolution and Neurodiversity 23:50 Career Progression in Cybersecurity 30:28 Impact of AI on SOC Operations 40:07 Final Thoughts and Conclusion

BLUEPRINT
Redefining Security Operations: Lessons in AI Integration with James Spiteri

BLUEPRINT

Play Episode Listen Later Jun 12, 2025 67:57


Click here to send us your ideas and feedback on Blueprint!In this episode of Blueprint, host John Hubbard sits down with James Spiteri from Elastic to explore the transformative power of AI on the SOC. They delve into how advanced AI technologies, such as agentic AI models, MCP protocol, and automation, are reshaping the SOC landscape. Discover how AI enhances SOC efficiency, reduces mundane tasks, and integrates context-aware capabilities. Learn about the real-world applications, from automation in cybersecurity operations to the challenges and promises of large language models. This discussion covers the ethical considerations, potential risks, and the promising future of SOCs powered by AI. Tune in to get inspired and see how AI might revolutionize your cyber defense strategies.Check out John's SOC Training Courses for SOC Analysts and Leaders: SEC450: Blue Team Fundamentals - Security Operations and Analysis LDR551: Building and Leader Security Operations Centers Follow and Connect with John: LinkedIn

SemiWiki.com
Video EP8: How Defacto Technologies Helps Customers Build Complex SoC Designs

SemiWiki.com

Play Episode Listen Later Jun 6, 2025 7:45


In this episode of the Semiconductor Insiders video series, Dan is joined by Chouki Aktouf, CEO and Founder of Defacto Technologies. Dan explores the challenges of building complex SoCs with Chouki, who describes challenges around managing complexity at the front end of the process while staying within PPA requirements and … Read More

Embedded
502: Chat, J'ai Peté!

Embedded

Play Episode Listen Later Jun 3, 2025 68:27


Chris and Elecia talk about Murderbot,  LLMs (AI), bikes, control algorithms, and fancy math.  The website with the ecology jobs is wildlabs.net from 501: inside the Armpit of Giraffe with Meredith Palmer and Akiba..  The algorithm Elecia mentioned was from Patent US7370713B1. The Control Bootcamp YouTube series is a great introduction to control systems beyond PIDs There is also a book from the same folks (with matlab and some python code): Data-Driven Science and Engineering: Machine Learning, Dynamical Systems, and Control. Finding bad AI interactions is too easy. Copilot PR mess that was discussed. Lawyers letting ChatGPT hallucinate precedents. Fake (hallucinated) citations in a high-profile report on children's health. Transcript Nordic Semiconductor has been the driving force for Bluetooth Low Energy MCUs and wireless SoCs since the early 2010s, and they offer solutions for low-power Wi-Fi and global Cellular IoT as well. If you plan on developing robust and battery-operated applications, check out their hardware, software, tools, and services. On academy.nordicsemi.com, you'll find Bluetooth, Wi-Fi, and cellular IoT courses, and the Nordic DevZone community covers technical questions:  devzone.nordicsemi.com. Congratulations to the giveaway winners!

Bare Knuckles and Brass Tacks
What's Really Plaguing SOC Teams, Lessons for Vendors & Leaders

Bare Knuckles and Brass Tacks

Play Episode Listen Later Jun 2, 2025 41:51


Erik Bloch, security operations expert and longtime infosec leader, joins the show to talk about the real problems plaguing SOCs and why the industry keeps missing the mark!George K and George A talk to Erik about:- The massive disconnect between what vendors think SOCs do vs. reality - spoiler alert: most founders have never worked in the trenches- Why we're still fighting the same problems from 20 years ago - false positives aren't even 10% of the actual work, so why do we keep obsessing over them?- The real burnout formula: high responsibility + low control + endless busywork that has nothing to do with catching bad guys- Business alignment that actually works: Stop talking about theoretical $48 bazillion losses and start tying security outcomes to actual business growthWhether you're a vendor or an executive leader, there's gold -- and data! -- in this episode. The "AI will solve everything" narrative is misleading, hear what actually works in security operations!------------

Noche de lobos
Programa 567 (Unexpectance, Argion, Morphium, Yeska, Lemmy, Kissin Dynamite)

Noche de lobos

Play Episode Listen Later May 18, 2025 131:00


Quingentésima sexagésima séptima Noche de Llob@s, hoy con todo este menú: Sun of the Dying, Argion, Unexpectance, Expropiazion, MorphiuM, VÓMITO, Yeska, The Broken Horizon, IMPUREZA, BIG MEMBER, Lemmy, Official Motörhead, BEHEMOTH!, Kissin' Dynamite, Ashes of Ares, INCITE_Heavymetal, Fairyland Official, El Drogas, Ravenblood, @State of crime & science - SOCS y The Who

AI with Sally Ward-Foxton
Automating NoC Design Masters SoC Complexity

AI with Sally Ward-Foxton

Play Episode Listen Later May 12, 2025 29:14


Today, we're diving into the critical role of network-on-chip (NoC) design in modern system-on-chip (SoC) architectures. Designing efficient interconnects has become a major challenge as SoCs grow more complex, especially with the increasing integration of AI workloads. NoCs now account for a significant portion of silicon area, making it essential to get them right. Michal Siwinski, Chief Marketing Officer at Arteris, will join us in discussing how their FlexNoC tool is revolutionizing NoC design through automation. We'll explore why this is crucial for today's chips, how it addresses the growing demands of AI, and what the future holds for NoC technology. 

Webinaire Extraordinaire par Gaël Reignier
Choisis ta vibe et transforme ta vie avec Elen Fourcade

Webinaire Extraordinaire par Gaël Reignier

Play Episode Listen Later May 7, 2025 44:53


Elen Fourcade une coach quantique, nous dévoile comment elle accompagne les femmes ayant traversé des épreuves majeures (burnout, maladies, deuils, addictions) pour rétablir l'harmonie avec leur corps et surmonter les blocages émotionnels. À travers son parcours personnel marqué par un combat contre le cancer, Elen nous révèle comment cette maladie est un puissant message du corps, une invitation à se reconnecter avec soi-même et à grandir intérieurement. Ce podcast vous plonge dans l'univers fascinant de la conscience quantique et des transformations profondes. Découvrez comment l'énergie, la méditation, et les "sauts quantiques" peuvent vous guider vers un nouveau niveau de bien-être et de succès personnel. ✨La maladie comme message : comprendre que la maladie n'est pas une fatalité mais une porte vers la guérison. ✨Reconnexion au corps : l'importance de retrouver l'écoute de soi et d'être en phase avec son énergie. ✨Sauts quantiques : comment des changements énergétiques peuvent propulser votre évolution personnelle. ✨Coaching comme guérison : comment l'accompagnement peut être un outil thérapeutique puissant. ✨Retraites transformantes : plongez dans des séjours qui permettent d'explorer votre identité quantique et de briser les chaînes des anciennes identités limitantes. Si tu veux comprendre comment libérer ton potentiel caché et faire un pas vers une vie plus alignée, cet épisode est fait pour toi ! Retrouve Elen sur les réseaux ici : Linkedin : linkedin.com/in/elenfourcadeguzzo Instagram : www.instagram.com/elenfourcade_lifecoach Pour suivre Gaël sur les réseaux sociaux, c'est ici : Linkedin : https://bit.ly/linkedingael Chapitre 00:00 Introduction à la transformation intérieure 03:01 Le corps comme messager sacré 06:05 Reconnexion au corps et à l'énergie 08:54 Parcours personnel et développement professionnel 11:46 Socs quantiques et évolution personnelle 14:54 Création d'un business et accompagnement 18:01 Organisation de retraites et expériences pratiques 26:23 Connexion Énergétique et Projet 29:20 Travail avec les Femmes et Évolution Personnelle 32:30 Retraites Spirituelles et Appels Intérieurs 34:20 Confiance et Guidance dans la Vie 36:10 Lâcher Prise et Auto-Limitation 39:10 L'Héritage et le Message Personnel 41:10 Recommandation d'Invité et Réseautage 42:35 Message de Clôture et Reconnexion à Soi

Embedded
500: Nerding Out About the Ducks

Embedded

Play Episode Listen Later May 2, 2025 68:02


Komathi Sundaram spoke with us about her enthusiasm for tests and test automation. We talked about the different joys of testing vs. development, setting up CI servers, and different kinds of tests including unit, hardware-in-the-loop, and simulation. It may sound dry but we had a lot of fun. Komathi's site is TheKomSea.com which hosts her blog as well as contact info. She will be speaking on automated hardware in the loop test processes at the Embedded Online Conference.  Transcript Nordic Semiconductor has been the driving force for Bluetooth Low Energy MCUs and wireless SoCs since the early 2010s, and they offer solutions for low-power Wi-Fi and global Cellular IoT as well. If you plan on developing robust and battery-operated applications, check out their hardware, software, tools, and services. On academy.nordicsemi.com, you'll find Bluetooth, Wi-Fi, and cellular IoT courses, and the Nordic DevZone community covers technical questions:  devzone.nordicsemi.com. Oh, and don't forget to enter Nordic Semiconductor's giveaway contest! Just fill out the entrance form, and you're in the running. Good luck!

The Social-Engineer Podcast
Ep. 301 - Security Awareness Series - Leadership Relationships and Becoming a CISO with Travis Farral

The Social-Engineer Podcast

Play Episode Listen Later Apr 21, 2025 30:16


Today on the Social-Engineer Podcast: The Security Awareness Series, Chris is joined by Travis Farral. Travis has been working in information security since the 90s at places such as Nokia, ExxonMobil, and XTO Energy. He is currently VP & CISO at Archaea Energy, a bp owned, renewable natural gas company based in Houston, Texas. He has spoken at events around world on topics such as Cyber Threat Intelligence, MITRE ATT&CK, and Incident Response. Notable activities during his career include everything from programming logic controllers, building and leading SOCs, driving forklifts, standing up cybersecurity teams, developing threat intelligence programs, and handling responses to incidents, among many other things over the last few decades. [April 21, 2025]   00:00 - Intro 00:18 - Intro Links: -          Social-Engineer.com - http://www.social-engineer.com/ -          Managed Voice Phishing - https://www.social-engineer.com/services/vishing-service/ -          Managed Email Phishing - https://www.social-engineer.com/services/se-phishing-service/ -          Adversarial Simulations - https://www.social-engineer.com/services/social-engineering-penetration-test/ -          Social-Engineer channel on SLACK - https://social-engineering-hq.slack.com/ssb -          CLUTCH - http://www.pro-rock.com/ -          innocentlivesfoundation.org - http://www.innocentlivesfoundation.org/                                                02:08 - Travis Farral Intro 02:58 - A Different Path than Today 05:25 - Healthy Hacking 08:08 - Anything Can Be Weaponized 10:54 - Questionable Behavior 14:31 - Smash That Report Button!!! 18:58 - Improving Our Odds 21:00 - You Have to Keep It Simple 22:25 - Letters to a Young CISO 24:20 - Find Travis Farral online -          LinkedIn: linkedin.com/in/travisfarral 25:01 - Mentors -          Shawn Edwards -          Jay Leek 27:02 - Book Recommendations -          R. E. Lee: A Biography  - Douglas Southall Freeman 29:34 - Wrap Up & Outro -          www.social-engineer.com -          www.innocentlivesfoundation.org

SemiWiki.com
Podcast EP282: An Overview of Andes Focus on RISC-V and the Upcoming RISC-V CON

SemiWiki.com

Play Episode Listen Later Apr 9, 2025 10:40


Dan is joined by Marc Evans, director of business development and technology at Andes. Marc has over twenty years of experience in the use of CPU, DSP, and Specialized IP in SoCs from his prior positions at Lattice Semiconductor, Ceva, and Tensilica. During his early career, Marc was a processor architect, making significant contributions… Read More

Embedded
498: To Consume Stickers

Embedded

Play Episode Listen Later Apr 4, 2025 66:34


At the end of this week's show, Elecia reads a Winnie the Pooh poem as Cookie Monster death metal. Before that, Chris and Elecia chat about mental health, journaling, personal projects, and listener questions.  Please sign up for the Nordic Giveaway!  You can also sign up for the Embedded newsletter. Maybe now with job postings? Elecia's journaling notebook is this one on JetPens (which is where she gets her nice pens and some of her stickers and washi tape).  From discussing some listener messages, we mentioned: Matt Keeter's talk on debuggability in production where you don't have access to the system that is faulting (video and slides) Letter boards (in the Adirondacks), see those in action here Wokwi simulator is a great place to get more embedded experience without buying all the kits. Christopher has said that there will not, definitely not, under any circumstances, be a whole death metal album of Winnie the Pooh poems. Elecia is practicing anyway.  Transcript Nordic Semiconductor has been the driving force for Bluetooth Low Energy MCUs and wireless SoCs since the early 2010s, and they offer solutions for low-power Wi-Fi and global Cellular IoT as well. If you plan on developing robust and battery-operated applications, check out their hardware, software, tools, and services.   On academy.nordicsemi.com, you'll find Bluetooth, Wi-Fi, and cellular IoT courses, and the Nordic DevZone community covers technical questions:  devzone.nordicsemi.com.   Oh, and don't forget to enter Nordic Semiconductor's giveaway contest! Just fill out the entrance form, and you're in the running. Good luck!

KuppingerCole Analysts
Achieving Near Zero MTTR: AI-Driven Automation for Modern Cyber Defense

KuppingerCole Analysts

Play Episode Listen Later Apr 4, 2025 16:42


In this videocast, KuppingerCole Analysts' Senior Analyst Warwick Ashford is joined by Prakash Sinha, Senior Director and Technology Evangelist at Radware, to explore how security teams can drive Mean Time To Resolution (MTTR) close to zero. As AI-powered attacks increase in sophistication and frequency, security operations centers (SOCs) must evolve by leveraging automation and AI-driven incident response. Prakash shares insights on how AI can enhance threat detection, automate remediation, and reduce analyst workloads while maintaining governance and accountability. Discover practical steps for implementing AI-assisted security and the key success factors for modernizing SOCs in the face of an ever-changing threat landscape.

JAPAN WUT? Podcast
JAPAN WUT PODCAST 205 "AI ATMOSPHERIC CONSCIOUSNESS"

JAPAN WUT? Podcast

Play Episode Listen Later Mar 28, 2025


How did China surpass Japan as the world's leading auto exporter? Is Japan poised for victory in the AI Chip War? Why are Data Centers being built near Nuclear Power Plants?SHOW NOTESPoland's adjusted income to overtake Japan's by 2026Rapidus teams up with Singapore's Quest Global to produce AI chipsBattery materials plant in Finland starts construction; jv with China's EaspringU.S. blacklists over 50 Chinese companies in bid to curb Beijing's AI, chip capabilitiesSoftBank strengthens AI strategy by acquiring data center semiconductor company Ampere Computing for approximately 970 billion yen in cashOpenAI close to finalizing $40 billion SoftBank-led fundingMicrosoft cancels up to 2GW of data center projects, says TD CowenDeepSeek-V3 now runs at 20 tokens per second on Mac Studio, and that's a nightmare for OpenAIChina's SiCarrier emerges as challenger to ASML, other chip tool titansASML will open Beijing facility despite US sanctions on ChinaToyota delays electric vehicle battery plant due to weak demandChina EV giant BYD soars after 5-minute charging platform unveiledHonda and Subaru team up with semiconductor companies to develop proprietary SoCs for AI autonomous driving

Irish Tech News Audio Articles
Integrity360 expands into France with acquisition of Holiseum

Irish Tech News Audio Articles

Play Episode Listen Later Mar 20, 2025 5:58


Continuing its global expansion plan, Integrity360 has acquired leading cyber security specialist Holiseum headquartered in Paris, France. The terms of the transaction were not disclosed. The acquisition will enable Integrity360 to accelerate its growth in France and continental Europe, and significantly provide a new and exciting services practice focused on Operational Technology ("OT") and Internet of Things ("IoT") technologies which complement Integrity360's existing service practices. Those include cyber risk and assurance, cyber security testing, incident response, infrastructure, Microsoft cyber, payments compliance, and a highly comprehensive range of cyber security managed services including managed detection and response ("MDR") solutions. Holiseum will continue to operate from its existing three facilities in France but with the benefit of the full resources and capability of the wider Integrity360 business. Holiseum, founded in 2018, is a highly respected and well-established cybersecurity consultancy that specialises in critical and industrial infrastructure. It serves approx. 80 customers throughout France and selected international locations from facilities in Paris and Nimes including organisations operating in the energy, infrastructure, manufacturing, transport and financial sectors. In particular, Holiseum is an expert in OT technology and has helped many global corporate and infrastructure organisations secure and evolve their OT environment and associated IT estates. Holiseum's reputation is underpinned by several security accreditations from ANSSI - the National Cybersecurity Agency of France - including PASSI (cybersecurity audit services) and PACS (cybersecurity support and consulting) - where Holiseum is one of the first three certified organisations in France. Holiseum's portfolio of services include audit, training, investigation and a full suite of OT consulting solutions. Securing critical infrastructures is a high priority for many governments and corporate organisations across the globe due to the alarming rise in attacks on industrial and energy infrastructure. Leading industry analyst Gartner has commented that such attacks could result in the weaponisation of OT environments to seriously harm human life. Despite the tightening of the regulatory environment with the introduction of cyber security frameworks including NIS2 (Network and Information Security 2) and DORA (Digital Operational Resilience Act) the challenge of continuously securing critical infrastructure remains acute. Holiseum will form a major new practice within Integrity360 dedicated to the mission of aiding, protecting and supporting both government and industrial infrastructure. The existing Holiseum team of 32 will be rapidly expanded in France and across all other Integrity360 markets in support of this mission. In addition, Holiseum's headquarters in Paris will form a new regional hub for the group from which it will deliver the full suite of Integrity360 services, and during 2025 an additional Paris based SOC (Security Operations Centre) will be launched to join the existing network of six SOCs across EMEA (Dublin, Stockholm, Naples, Sofia, Madrid and Cape Town). The SOC teams deliver a wide-ranging set of managed services for customers including EDR, XDR and MDR (Endpoint Detection and Response, Extended Detection and Response, and Managed Detection and Response). Integrity360's innovative range of services have been recognised on multiple occasions by Gartner, namely as a Representative Vendor in the Gartner market guide for Managed Detection and Response services. The addition of Holiseum brings group revenues to over €160m and a dedicated cybersecurity team of over 700 employees. Further innovation and demand for its services across the EMEA region will expand group revenues in 2025 across all territories. Ian Brown, Executive Chairman at Integrity360 commented: "We are very excited to be welcoming the team from Hol...

Embedded
495: Shortcut the Difficulties of Reality

Embedded

Play Episode Listen Later Feb 21, 2025 61:57


Professor Cindy Harnett spoke to us about new and different sensors and actuators, primarily designed for soft robotics and fabricated with relatively low cost materials. Cindy is a professor of electrical and computer engineering at the University of Louisville where she runs the Harnett Lab. The papers we discussed are here. You can find a longer list of Cindy's papers on Google Scholar. The video of the SESAME actuator is especially interesting. Transcript Nordic Semiconductor has been the driving force for Bluetooth Low Energy MCUs and wireless SoCs since the early 2010s, and they offer solutions for low-power Wi-Fi and global Cellular IoT as well. If you plan on developing robust and battery-operated applications, check out their hardware, software, tools, and services.   On academy.nordicsemi.com, you'll find Bluetooth, Wi-Fi, and cellular IoT courses, and the Nordic DevZone community covers technical questions:  devzone.nordicsemi.com.   Oh, and don't forget to enter Nordic Semiconductor's giveaway contest! Just fill out the entrance form, and you're in the running. Good luck!

AWS for Software Companies Podcast
Ep076: Incident Response in the Age of Personal CISO Liability with Suresh Vasudevan of Sysdig

AWS for Software Companies Podcast

Play Episode Listen Later Jan 28, 2025 34:20


Suresh Vasudevan, CEO of Sysdig, discusses the evolving challenges of cloud security incident response and the need for new approaches to mitigate organizational risk.Topics Include:Cybersecurity regulations mandate incident response reporting.Challenges of cloud breach detection and response.Complex cloud attack patterns: reconnaissance, lateral movement, exploit.Rapid exploitation - minutes vs. days for on-prem.Importance of runtime, identity, and control plane monitoring.Limitations of EDR and SIEM tools for cloud.Coordinated incident response across security, DevOps, executives.Criticality of pre-defined incident response plans.Increased CISO personal liability risk and mitigation.Documenting security team's diligence to demonstrate due care.Establishing strong partnerships with legal and audit teams.Covering defensive steps in internal communications.Sysdig's cloud-native security approach and Falco project.Balancing prevention, detection, and response capabilities.Integrating security tooling with customer workflows and SOCs.Providing 24/7 monitoring and rapid response services.Correlating workload, identity, and control plane activities.Detecting unusual reconnaissance and lateral movement behaviors.Daisy-chaining events to identify potential compromise chains.Tracking historical identity activity patterns for anomaly detection.Aligning security with business impact assessment and reporting.Adapting SOC team skills for cloud-native environments.Resource and disruption cost concerns for cloud agents.Importance of "do no harm" philosophy for response.Enhancing existing security data sources with cloud context.Challenges of post-incident forensics vs. real-time response.Bridging security, DevOps, and executive domains.Establishing pre-approved incident response stakeholder roles.Maintaining documentation to demonstrate proper investigation.Evolving CISO role and personal liability considerations.Proactive management of cyber risk at board level.Developing strong general counsel and audit relationships.Transparency in internal communications to avoid discovery risks.Security teams as business partners, not just technicians.Sysdig's cloud security expertise and open-source contributions.Participants:· Suresh Vasudevan – CEO, SysdigSee how Amazon Web Services gives you the freedom to migrate, innovate, and scale your software company at https://aws.amazon/isv/

Embedded
493: Put the Peeps in the Chili Pot

Embedded

Play Episode Listen Later Jan 24, 2025 80:34


Elecia and Chris talk with each other about the state of Chris' mind, what makes an embedded developer stand out, “LEGO block” based design, unit tests, and astronomy. Whew! Elecia was recently on the Changelog podcast, talking about the world of embedded systems. Chris has been working with Micropython (we talked with Damien George about Micropython on episode 456). He's using a Pyboard to start, but is looking to move on to this board from Sparkfun. Wikipedia has a nice reference on what the pulse-per-second signal is all about. Elecia talked about her experience using CFFI to drive unit tests. She also talked about some facts from Information is Beautiful. Chris' telescope is the ZWO Seestar S50. There's also a smaller Seestar S30 now which has a wider field-of-view. Title reference (Chris and Elecia both thoroughly enjoyed The Good Place, the TV show this is taken from.) Transcript Nordic Semiconductor has been the driving force for Bluetooth Low Energy MCUs and wireless SoCs since the early 2010s, and they offer solutions for low-power Wi-Fi and global Cellular IoT as well. If you plan on developing robust and battery-operated applications, check out their hardware, software, tools, and services.   On academy.nordicsemi.com, you'll find Bluetooth, Wi-Fi, and cellular IoT courses, and the Nordic DevZone community covers technical questions:  devzone.nordicsemi.com.   Oh, and don't forget to enter Nordic Semiconductor's giveaway contest! Just fill out the entrance form, and you're in the running. Good luck! Here's one of the astrophotos Chris has taken: The Horsehead and Flame nebulae in Orion taken from a Seestar S50

Digital Government podcast
Security Operations Centres Are a Boon to Cybersecurity

Digital Government podcast

Play Episode Listen Later Jan 22, 2025 28:19


With cyber threats growing in sophistication and scale, organisations must rethink their strategies to safeguard digital assets and operational continuity. Security Operations Centers (SOCs) stand at the forefront of this effort, acting as centralised hubs where cybersecurity professionals monitor, manage, and mitigate threats. The rise in cyber threats – estimated to have grown by 25% annually over the past half-decade – has amplified the importance of SOCs. In this podcast hosted by Merle Maigre, Head of Cybersecurity at e-Governance Academy, Margus Vaino and Martin Paas from Telia discuss the evolution, challenges, and opportunities surrounding SOCs – from the point of view of a major telecommunications player.  Acknowledging the rising importance of SOCs is only the beginning: the increasing complexity of cyber threats, and the essential steps required to build and sustain effective cybersecurity infrastructures, are all part of the roadmap to effective cyber defence. 

Talks at Google
Ep512 - Broadway's The Outsiders | Cast & Creatives

Talks at Google

Play Episode Listen Later Dec 31, 2024 48:51


The cast & creatives from the Tony Award winning musical “The Outsiders” join us to perform a song and discuss the beloved story that defined a generation, reimagined as a groundbreaking new musical. In Tulsa, Oklahoma, 1967, Ponyboy Curtis, his best friend Johnny Cade, and their greaser family of ‘Outsiders' battle with their affluent rivals, the Socs. “The Outsiders” navigates the complexities of self-discovery as the Greasers dream about who they want to become in a world that may never accept them. With a dynamic original score, “The Outsiders” is a story of friendship, family, belonging, and the realization that there is still “lots of good in the world.” Visit http://youtube.com/TalksAtGoogle/ to watch the video.

The Ladies Who Brunch
We Love His Twang ( w/ John Patrick Collins)

The Ladies Who Brunch

Play Episode Listen Later Dec 13, 2024 83:08


HAPPY FRIDAY DIVAS! we're coming in hot with a bonus episode to celebrate our dear, dear friend John Patrick Collins-- Riding high from his Broadway debut in the smash hit “The Outsiders”. Naturally, the Ladies were there to cheer him on, and then sat down to talk all things Greasers, Socs, and more. We love you Johnny boy, and we're beyond excited to have you back on the pod.Divas, check out his earlier episode in Season 1 for more info on his original play, “It's Not What It Looks Like”."The Ladies Who Brunch" New Episodes Every WednesdayInstagram/Tik Tok: @theladieswhobrunchpod@jakewaford@sammyschechter

Cloud Security Podcast by Google
EP202 Beyond Tiered SOCs: Detection as Code and the Rise of Response Engineering

Cloud Security Podcast by Google

Play Episode Listen Later Dec 9, 2024 37:09


Guest: Amine Besson, Tech Lead on Detection Engineering, Behemoth Cyberdefence Topics: What is your best advice on detection engineering to organizations who don't want to engineer anything in security?  What is the state of art when it comes to SOC ? Who is doing well? What on Earth is a fusion center?  Why classic “tiered SOCs” fall flat when dealing with modern threats? Let's focus on a correct definition of detection as code. Can you provide yours? Detection x response engineering - is there a thing called “response engineering”? Should there be? What are your lessons learned to fuse intel, detections, and hunting ops? What is this SIEMless yet SOARful detection architecture? What's next with OpenTIDE 2.0? Resources: Guide your SOC Leaders to More Engineering Wisdom for Detection (Part 9) and other parts linked there Hack.lu 2023: TIDeMEC : A Detection Engineering Platform Homegrown At The EC video OpenTIDE · GitLab  OpenTIDE 1.0 Release blog SpectreOps blog series ‘on detection' Does your SOC have  NOC DNA? presentation Kill SOC Toil, Do SOC Eng blog (tame version) The original ASO paper (2021, still epic!) Behind the Scenes with Red Canary's Detection Engineering Team The DFIR Report – Real Intrusions by Real Attackers, The Truth Behind the Intrusion Site Reliability Engineering (SRE) | Google Cloud  

mnemonic security podcast
CNAPP

mnemonic security podcast

Play Episode Listen Later Dec 2, 2024 43:38 Transcription Available


In this episode of the mnemonic security podcast, Robby is joined by Scott Piper from Wiz and Håkon Sørum from O3 Cyber to talk cloud security. They cover the evolution of cloud security products since Amazon's release of S3 and EC2 in 2006 and how the market has matured into the CNAPP we know today.  They chime in on most of the buzzwords associated with CNAPP, including Cloud Security Posture Management (CSPM), Cloud Workload Protection Platform (CWPP), Cloud Infrastructure Entitlement Management (CIEM), and Cloud Detection and Response (CDR), as well as other key areas of CNAPP such as vulnerability scanning, "shift-left" security, cloud data security, and compliance.   They explain the definition and challenges of "cloud-native attacks" and misconfigurations and discuss whether third-party SOCs can add context and enhance detection capabilities.  

Embedded
490: Wait Until Physics Has Happened

Embedded

Play Episode Listen Later Nov 28, 2024 65:38


Nikolaus Correll spoke with us about robots, teaching robotics, and writing books about robots.  Nikolaus is a Professor of Computer Science at the University of Colorado, see his lab website (or his Wikipedia page). We discussed Nikolaus' Introduction to Robotics with Webots Specialization Coursera course (or YouTube Playlist). These go along with his Introduction to Autonomous Robots (which can be compiled from source from github). Masters of Computer Science online via University of Colorado and Georgia Tech. While the Arcbotics Sparki is no longer in production, Nikolaus also mentioned the Amazon Racer. Transcript Nordic Semiconductor has been the driving force for Bluetooth Low Energy MCUs and wireless SoCs since the early 2010s, and they offer solutions for low-power Wi-Fi and global Cellular IoT as well. If you plan on developing robust and battery-operated applications, check out their hardware, software, tools, and services.   On academy.nordicsemi.com, you'll find Bluetooth, Wi-Fi, and cellular IoT courses, and the Nordic DevZone community covers technical questions:  devzone.nordicsemi.com.   Oh, and don't forget to enter Nordic Semiconductor's giveaway contest! Just fill out the entrance form, and you're in the running. Good luck!

Out of the Woods: The Threat Hunting Podcast
S3 Ep7: [Bonus Episode] Protecting Privacy: Brian Hill on Cyber Threats and Individual Security

Out of the Woods: The Threat Hunting Podcast

Play Episode Listen Later Nov 19, 2024 31:48


In this episode of Out of the Woods: The Threat Hunting Podcast, Scott Poley sits down with Brian Hill, a cybersecurity leader with a rich background in law enforcement, military service, and corporate security. Brian shares his journey from major crimes detective and forensics expert to building and managing Security Operations Centers (SOCs) at organizations like Arctic Wolf and Black Cloak. The discussion highlights challenges in scaling SOCs, the importance of balancing specialized expertise with cross-functional training, and unique threats faced by high-profile individuals, such as SIM swapping and personal device vulnerabilities. Brian also explores broader trends like artificial intelligence and deepfake technology, emphasizing the need for education and proactive measures to stay ahead of evolving cyber threats. *Connect with Brian Hill: https://www.linkedin.com/in/brian-hill-776b50100/ ---- Stay in Touch! Twitter: https://twitter.com/Intel471Inc LinkedIn: https://www.linkedin.com/company/intel-471/ YouTube: https://www.youtube.com/channel/UCIL4ElcM6oLd3n36hM4_wkg Discord: https://discord.gg/DR4mcW4zBr Facebook: https://www.facebook.com/Intel471Inc/

Sustain
Episode 255: Caleb Connolly & Pablo Correa Gómez on postmarketOS

Sustain

Play Episode Listen Later Nov 8, 2024 37:00


Guests Caleb Connolly | Pablo Correa Gómez Panelist Richard Littauer Show Notes In this episode of Sustain, host Richard Littauer is joined by guests Pablo Correa Gómez and Caleb Connolly to explore the development and sustainability of postmarketOS, an open-source Linux distribution designed to extend the life of mobile devices. The team dives into the project's mission, governance, and the community-driven nature of its work. They discuss the challenges related to funding, primarily through grants and Open Collective donations, and the significance of upstreaming Linux kernel support to collaborate with other communities like Alpine Linux. The conversation also highlights the growth of the postmarketOS community, encouraging contributions from both technical and non-technical supporters, and the importance of comprehensive documentation. Additionally, issues of privacy, telemetry, and user support are examined, alongside the steps towards making postmarketOS more professional and economically sustainable. Press download now to hear more! [00:01:30] Pablo explains postmarketOS and its mission to empower people to have full control over their devices and promote sustainability. [00:02:12] Caleb talks about the governance of postmarketOS that started with a few contributors working on a package repository on top of Alpine Linux and overtime more maintainers were added. [00:03:59] There's a discussion on the structure of the team, how the community around hardware components forms sub-communities bases on common SOCs, and the focus on improving tooling and the ecosystem rather than building a product for end users. [00:06:29] Richard discusses the massive, refurbished phone market and asks about how postmarketOS fits into this ecosystem. Caleb shares their experience working on the OnePlus 6 phone and explains the technical process of making the device work on upstream Linux and the challenges of hardware enablement. [00:10:05] Pablo explains that the project is largely funded by volunteer work and Caleb describes the challenges in deciding which devices to prioritize for hardware enablement and how all hardware work so far has been done by volunteers. [00:14:09] On the importance of upstreaming, Pablo explains that postmarketOS works hard to contribute back to the Linux ecosystem rather that maintaining device-specific patches and postmarketOS is downstream to Alpine Linux but contributes much of its work upstream to maintain sustainability. [00:20:09] Richard asks about how the project builds shared context and onboards new developers and Pablo and Caleb explain how the project relies on its wiki page to provide extensive documentation and how the pmbootstrap tool makes it easier for new contributors to get started with porting new devices to postmarketOS. [00:25:01] Richard asks about telemetry and how the team tracks their impact. [00:25:39] Pablo talks about how they receive community feedback through events like FOSDEM and have seen an increase in donations, social media engagement, and community members. [00:28:39] Caleb reflects on the pros and cons of collecting telemetry, which could help guide development but may also create unwanted challenges by focusing too heavily on specific devices. [00:31:30] What are Pablo and Caleb most excited about for the next year? Pablo is excited about professionalizing the project, starting to pay contributors, and scaling the project's growth sustainably, and Caleb jokes about looking forward to the “pre-market OS.” Quotes [00:12:00] “We are trying to grow organically, bit by bit, and be able to pay people to do core things where volunteer work doesn't reach.” [00:15:06] “In the environment we live in, where you have X amount of code per update, it is totally unsustainable.” [00:16:18] “As a distro, we predominately put together the pieces that other people give us.” [00:19:13] “Downstream patches allow to experiment, but long term are a burden. That's the same for every project.” [00:19:22] “The sustainability goes beyond reducing waste and also goes into the social ecosystem and how we maintain projects.” [00:30:33] “We know we are not ready for end users, but we need to build the structure and economic support.” Spotlight [00:32:32] Richard's spotlight is DOSBox. [00:33:03] Pablo's spotlight is FOSDEM and the FOSDEM team. [00:33:57] Caleb's spotlight is processing.org. Links SustainOSS (https://sustainoss.org/) podcast@sustainoss.org (mailto:podcast@sustainoss.org) richard@sustainoss.org (mailto:richard@sustainoss.org) SustainOSS Discourse (https://discourse.sustainoss.org/) SustainOSS Mastodon (https://mastodon.social/tags/sustainoss) Open Collective-SustainOSS (Contribute) (https://opencollective.com/sustainoss) Richard Littauer Socials (https://www.burntfen.com/2023-05-30/socials) Caleb Connolly Website (https://connolly.tech/) Caleb Connolly-treehouse (https://social.treehouse.systems/@cas) Pablo Correa Gómez Website (https://postmarketos.org/core-contributors/#pablo-correa-gomez-pabloyoyoista) Pablo Correa Gómez LinkedIn (https://www.linkedin.com/in/pablo-correa-gomez/) postmarketOS (https://postmarketos.org/) postmarketOS (Open Collective Contribute) (https://opencollective.com/postmarketos) Gnome Shell & Mutter (https://blogs.gnome.org/shell-dev/2022/09/09/gnome-shell-on-mobile-an-update/) postmarketOS Devices (https://wiki.postmarketos.org/wiki/Devices) Sustain Podcast-Episode 195: FOSSY 2023 with Denver Gingerich (https://podcast.sustainoss.org/195) Software Freedom Conservancy (https://sfconservancy.org/) FOSSY 2025:July 31-August 1 (https://2025.fossy.us/) linaro (https://www.linaro.org/) postmarketOS Wiki (https://wiki.postmarketos.org/wiki/Devices) pmbootstrap (https://wiki.postmarketos.org/wiki/Pmbootstrap) compost.party (https://compost.party/) pmbootstrap v3 by Caleb Connolly (https://connolly.tech/posts/2024_06_15-pmbootstrap-v3/) DOSBox (https://www.dosbox.com/) FOSDEM 2025 (https://fosdem.org/2025/) Processing (https://processing.org/) Credits Produced by Richard Littauer (https://www.burntfen.com/) Edited by Paul M. Bahr at Peachtree Sound (https://www.peachtreesound.com/) Show notes by DeAnn Bahr Peachtree Sound (https://www.peachtreesound.com/) Special Guests: Caleb Connolly and Pablo Correa Gomez.

The DIGA Podcast
#133: The Skin of Color Society (SOCS) & the Importance of Connections in Dermatology with Dr. Elizabeth Kiracofe

The DIGA Podcast

Play Episode Listen Later Nov 4, 2024 55:11


In this episode, we talk with Dr. Elizabeth Kiracofe, a dermatologist in the Chicago area who has worked closely for many years with the Skin of Color Society (SOCS)—the world's leading professional dermatologic organization dedicated to advancing health equity and promoting diversity and inclusion in dermatology. Dr. Kiracofe provides an insightful overview of SOCS, introduces their latest initiative and volunteer opportunity, "My Best Winter Skin", and discusses ways for students to get involved with SOCS. She also highlights the importance of building meaningful connections and relationships in dermatology, whether with patients, colleagues, or mentors. We hope you enjoy! Join The Skin of Color Society - here! Learn more about the "My Best Winter Skin" initiative - here! Recommended research article: A model in dermatology for long-distance mentoring (PMID: 23267719) --- Dr. Kiracofe: @drkiracofemd SOCS: @skinofcolorsociety DIGA: @⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠derminterest⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ Today's Host, Austin: @⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠austin_black⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ --- For questions, comments, or future episode suggestions, please reach out to us via email at ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠derminterestpod@gmail.com⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ --- Music: District Four by Kevin MacLeod Link: ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠https://incompetech.filmmusic.io/song/3662-district-four⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ License: ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠https://filmmusic.io/standard-license

Security Management Highlights
Confronting Assumptions Around Investigations, Modern SOCs, and Security Culture

Security Management Highlights

Play Episode Listen Later Nov 1, 2024 34:22


How does the tone from the top influence fraud investigations, organizational culture, security training, and technology upgrades? Scot Walker, PCI, Manish Mehta, and John Rodriguez join this episode of the SM Highlights podcast to talk through how proactive relationship-building and partnerships can drive tactical and strategic success. Additional Resources Join the ASIS International Investigations Community here: https://community.asisonline.org/subjectareahome?CommunityKey=e3a5949e-d103-40a3-80f9-38f8476100b1 Get resources from the Society for Human Resource Management (SHRM) on investigations here: https://www.shrm.org/topics-tools/tools/how-to-guides/how-to-conduct-investigation To learn more about security operations centers (SOCs), check out Security Management's coverage from September: https://www.asisonline.org/security-management-magazine/articles/2024/09/soc/ Read Manish Mehta's take on modernizing SOCs in his article: https://www.asisonline.org/security-management-magazine/articles/2024/09/soc/modernizing-socs/ More interested in security culture and how it affects leadership? Read more here: https://www.asisonline.org/security-management-magazine/articles/2024/10/culture/ Hear more from John Rodriguez about how security leaders can leverage and influence culture in his article: https://www.asisonline.org/security-management-magazine/articles/2024/10/culture/culture-security-differentiator/

CISO Tradecraft
#203 - Be SOCcessful with the SOC-CMM

CISO Tradecraft

Play Episode Listen Later Oct 21, 2024 17:11 Transcription Available


Unlocking SOC Excellence: Master the SOC Capability Maturity Model Join host G Mark Hardy in this compelling episode of CISO Tradecraft as he explores the revolutionary SOC Capability Maturity Model (SOC CMM) authored by Rob van Os. This episode is a must-watch for CISOs, aspiring CISOs, and cybersecurity professionals aiming to optimize their Security Operations Center (SOC). Learn how to measure, evaluate, and enhance your SOC's maturity across key domains including Business, People, Process, Technology, and Services. Gain insights into leveraging radar charts for visualizing SOC capabilities and hear case studies such as a mid-sized financial company's remarkable improvements. Discover why understanding your SOC's strengths and weaknesses and conducting risk-based improvement planning are crucial. Don't miss out—elevate your cyber resilience today, subscribe, and share with your network to set your SOC on the path to excellence! References: SOC-CMM - https://www.soc-cmm.com/products/soc-cmm/ Robert van Os - https://www.linkedin.com/in/socadvisor/ Transcripts: https://docs.google.com/document/d/1Fk6_t9FMyYXDF-7EfgpX_ZjLc0iPAgfN Chapters 00:12 Introduction to CISO Tradecraft and SOCs 01:20 Understanding SOC CMM: A Game-Changing Tool 02:29 Evaluating SOC Maturity and Capability 06:04 Benefits and Implementation of SOC CMM 07:56 Understanding SOC Assessments 08:55 Deep Dive into SOC CMM Domains 12:42 Benefits and Flexibility of SOC CMM 14:40 Real-World Application and Conclusion

Radiogeek
#Radiogeek - Mediatek y su nuevo micro insignia Dimensity 9400 - Nro 2573

Radiogeek

Play Episode Listen Later Oct 10, 2024 28:38


No hay dudas que la empresa Taiwanesa Mediatek, esta avanzando cada vez más en los SOCs de gama alta, a valores más económicos, los cuales se contra pone directamente con el líder Qualcomm, y esto despierta el interés incluso de Samsung para sus próximos buques insignias, ademas; El Departamento de Justicia podría obligar a Google a desmembrarse; HBO afirma que Peter Todd es el creador de bitcoin. Y la respuesta del experto en cifrado es: "por supuesto que no soy Satoshi" y por supuesto esperamos sus comentarios... #Ciberseguridad – Check Point Software y su CPX Argentina 2024 https://infosertecla.com/2024/10/09/ciberseguridad-check-point-software-y-su-cpx-argentina-2024/ El Departamento de Justicia podría obligar a Google a desmembrarse https://www.engadget.com/big-tech/the-justice-department-could-force-google-to-break-itself-up-123041161.html Starlink comenzó a cobrar un recargo "por congestión" de la red a los usuarios de zonas con alta demanda https://www.starlink.com/legal/documents/DOC-1239-99570-81 Mediatek anuncia oficialmente el Dimensity 9400 https://www.mediatek.com/products/smartphones-2/mediatek-dimensity-9400 HBO afirma que Peter Todd es el creador de bitcoin. Y la respuesta del experto en cifrado es: "por supuesto que no soy Satoshi" https://www.coindesk.com/business/2024/10/08/former-bitcoin-dev-peter-todd-denies-hes-satoshi-hours-before-hbo-documentary-airs/ Video del día en las redes https://www.instagram.com/reel/DA55OXDNn92/ https://www.instagram.com/reel/DA6aCbuuNLi/ ESPERAMOS TUS COMENTARIOS...

The Spurs Plus Dave Podcast
Episode 129 - Spurs Gave Socs Sisyphus

The Spurs Plus Dave Podcast

Play Episode Listen Later Oct 8, 2024 51:19


A painful reminder this week, to all who needed it, that we do still support Spurs - and Spurs, from time to time, do still do very Spursy things.  We hope you find this podcast slightly less painful, although make no guarantees, as an absent Elio leaves a 3-man team of Dags, Socs and Dave to cry/troll their respective ways through a breakdown of Tottenham's latest box office capitulation. There's also some chat about a few exciting outings from youngsters in the Europa League and various bizarre bits and pieces. Episode brought to you by Pundit Games - the original football trivia board game - www.punditgames.co.uk - use code PLUSDAVE at checkout for an exclusive 20% discount.

Tantra's Mantra with Prakash Sangam
Lenovo Innovation World 2024 - Recap and Analysis

Tantra's Mantra with Prakash Sangam

Play Episode Listen Later Sep 29, 2024 35:45


Lenovo Innovation World 2024 was held in Berlin on September 4th—5th. During this event, the company announced a slew of Copilot+ PCs powered by the new Intel Core Ultra 400v, AMD Ryzen AI 300, and Qualcomm Snapdragon X Plus (8-core) SoCs. In this episode, I talk to Olivier Blanchard, Research Director, Futurum Research, about the various SoCs, their strengths and weaknesses, the need for OEMs to position them well, specifically what Lenovo should do to maintain its formidable market leadership, and finally, key takeaways from the event. Also, check out the reviews of these Copilot+ PCs powered by Snapdragon XElite SOC  Lenovo Slim7x - https://bit.ly/3WK9W4n Samsung Galaxy Book4 Edge - https://bit.ly/3XJSGLN

Out of the Woods: The Threat Hunting Podcast
S2 Ep22: Top 5 Threat Hunting Headlines - 19 Aug 2024

Out of the Woods: The Threat Hunting Podcast

Play Episode Listen Later Aug 19, 2024 53:37


In this week's Top 5 Threat Hunting Headlines, Scott and Tom discuss top cybersecurity threats, including Kaspersky's Tusk InfoStealer campaign, a cloud extortion campaign exploiting AWS environments, APT41's advanced tactics against a Taiwanese research institute, and the Banshee InfoStealer targeting macOS. They also explore the impact of AI on cybersecurity, emphasizing the need for SOCs to evolve with new talent and strategies to address emerging threats. The episode underscores the importance of staying vigilant and adapting to the rapidly changing threat landscape. Top 5 Threat Hunting Headlines - 19 Aug 2024 1. Secure List | Tusk Campaign Uses Infostealers and Clippers for Financial Gain https://securelist.com/tusk-infostealers-campaign/113367/ 2. Unit 42 | Leaked Environment Variables Allow Large-Scale Extortion Operation of Cloud Environments https://unit42.paloaltonetworks.com/large-scale-cloud-extortion-operation/ 3. Cisco Talos Blog | APT41 Likely Compromised Taiwanese Government-Affiliated Research Institute with ShadowPad and Cobalt Strike https://blog.talosintelligence.com/chinese-hacking-group-apt41-compromised-taiwanese-government-affiliated-research-institute-with-shadowpad-and-cobaltstrike-2/?&web_view=true 4. Elastic Security Labs | Beyond the Wail: Deconstructing the BANSHEE Infostealer https://www.elastic.co/security-labs/beyond-the-wail 5. Help Net Security | 74% of IT Professionals Worry That AI Tools Will Replace Them https://www.helpnetsecurity.com/2024/08/15/it-professionals-ai-worry/?web_view=true ----- Follow Us! Twitter: https://twitter.com/CyborgSecInc LinkedIn: https://www.linkedin.com/company/cyborg-security/ YouTube: https://www.youtube.com/cyborgsecurity Discord: https://discord.gg/DR4mcW4zBr TikTok: https://www.tiktok.com/@cyborgsecinc

Telecom Reseller
What Industry Leading ISPs are Saying about Upping their Security Game, Radware Podcast

Telecom Reseller

Play Episode Listen Later Aug 16, 2024


What Industry Leading ISPs are Saying about Upping their Security Game, Podcast with Radware's Travis Volk, Podcast, Automation is driving down the cost of these attacks “Automation is driving down the cost of these attacks,” says Travis Volk,  senior vice president of global service providers of Radware. “That means that the bad actors can cover smaller to medium businesses. We're having to, as a community, try to alleviate the burden into a much larger addressable market.” After traveling across four continents and visiting with over 75 unique ISPs, Travis Volk walked away with some interesting perspectives from industry leaders who are operating at the forefront of cybersecurity. “Hackers are also leveraging AI for widespread vulnerability assessment. Imagine they can sweep huge address ranges very quickly and use AI to accelerate code revision like bot variants and script modifications. And eventually, you get into this LMM prompt-assisted campaigns where we have some research being done in the universities that show 85% improvement in penetration testing with, basic prompting and retries through LLM support.” In this podcast, we discuss the top cyber threats they are facing Their challenges dealing with AI-empowered hackers who are exposing vulnerabilities a magnitude faster and moving down market to zero in on small businesses How they are coping with SOCs that are running exhausted Why layer 7 visibility, attack detection, and remediation are becoming more important Where they see blind spots in defense of distributed deployments What scaling modern protections have to do with the one aspiration they all share “I think we need to be mentally to evolve as well. Layered protections allow better contextual security and with a means for scaling. Modern consumer and enterprise applications require Layer 7 defense. Adding capabilities into existing platforms offers a sense of reliability and control. I would caution people to evaluate platforms capable of addressing numerous market segments and risk tolerances. I think one of the real challenges that the cyber community faces are providing quality security to more businesses.” Visit www.radware.com

Bookey App 30 mins Book Summaries Knowledge Notes and More
Understanding the Margins: A Deep Dive into S.E. Hinton's 'The Outsiders'

Bookey App 30 mins Book Summaries Knowledge Notes and More

Play Episode Listen Later Jun 24, 2024 14:03


Chapter 1:Summary of Book The outsiders"The Outsiders" is a coming-of-age novel by S.E. Hinton, first published in 1967. The story is set in a small town in the United States in the 1960s and revolves around the intense conflict between two groups: the Greasers and the Socs (short for Socials). The Greasers are from the lower socio-economic class, often characterized by their long, greased hair, while the Socs are from the wealthier class and have a much more privileged upbringing.The novel is narrated by Ponyboy Curtis, a 14-year-old Greaser with a gift for storytelling. Ponyboy lives with his two older brothers, Sodapop and Darry, who are taking care of him after their parents died in a car accident. Despite tough circumstances, the brothers share a close bond.The plot kicks off when Ponyboy and his friend Johnny Cade, another Greaser, are attacked by a group of Socs. The confrontation ends in tragedy when Johnny kills one of the Socs, Bob Sheldon, in self-defense. Fearing the consequences, Ponyboy and Johnny flee and hide out in an abandoned church with the help of their friend and fellow Greaser, Dallas Winston.As they hide from the police, Ponyboy and Johnny bond and discuss deeper topics, such as life, their families, and their future. However, their hideout eventually catches fire while a group of schoolchildren is visiting. Ponyboy and Johnny heroically save the children but Johnny is seriously injured during the rescue.The event garners media attention, and the Greasers and Socs become even more entrenched in their conflict. Meanwhile, Johnny's condition worsens, and he dies in the hospital. Distraught, Dallas reacts impulsively and meets a tragic end after a confrontation with the police.The novel culminates with Ponyboy reflecting on the events and writing his school assignment about them, concluding with the realization that despite class differences, pain and suffering are universal—echoing his reading of Robert Frost's poem "Nothing Gold Can Stay," and the recurrent theme that life's precious moments are fleeting."The Outsiders" is a poignant exploration of friendship, societal expectations, family, and identity, appealing to young readers with its candid portrayal of teenage struggles in the face of socio-economic divides.Chapter 2:The Theme of Book The outsiders"The Outsiders," written by S.E. Hinton and published in 1967, is a novel about teenage gangs and the conflicts between them. Set in a small town in the 1960s, it focuses on the struggles between two rival groups, the Greasers and the Socs, who are differentiated by their socioeconomic statuses.Key Plot Points:1. Introduction to Conflict:The story opens by introducing Ponyboy Curtis, a 14-year-old Greaser, who is jumped by a group of Socs as he's walking home from a movie theater. This sets the scene for the ongoing rivalry and social conflict.2. The Drive-In Movie:Ponyboy, along with his brothers Darrel (Darry) and Sodapop, and friends Johnny and Two-Bit, meet Cherry Valance and Marcia at a drive-in movie. Despite being Socs, Cherry and Ponyboy develop a mutual understanding and discuss their differences and similarities, bridging the gap between their social classes momentarily.3. Johnny Kills Bob:The conflict escalates when Johnny, in self-defense, kills Bob Sheldon (a Soc) after he and his friends try to drown Ponyboy in a park. Fearful of the consequences, Johnny and Ponyboy flee to a church hideout in a nearby town with the help of their friend Dallas (Dally) Winston. 4. The Church Fire:While in hiding, a fire breaks out in the church Johnny and Ponyboy are in, and they heroically save a group of children trapped inside. Both get injured, and their act of bravery receives media coverage, altering the public's perception of the Greasers.5. The Rumble:After returning...

The Tech Blog Writer Podcast
2881: AI in Cybersecurity: The LogRhythm Perspective

The Tech Blog Writer Podcast

Play Episode Listen Later May 2, 2024 28:41


Are we on the brink of a new era in cybersecurity, one where artificial intelligence (AI) reshapes how we protect our digital frontiers? Join us on this episode of Tech Talks Daily as we delve into this fascinating topic with Andrew Hollister, Chief Information Security Officer and Vice President of Labs R&D at LogRhythm. In our conversation, Andrew shares his insights on the evolving role of generative AI in cybersecurity. Despite widespread apprehension that automation may displace human analysts, Andrew suggests a different narrative—AI as a collaborator enhancing human capabilities, not replacing them. With its rapid development, generative AI is finding its place in cybersecurity, aiding in tasks like summarizing threat reports, detecting patterns in massive datasets, and translating technical log data into understandable language. However, the technology has its challenges. Andrew points out the potential risks of AI, such as producing misleading information—what he terms "hallucinating false facts." This underscores the irreplaceable role of human oversight, where seasoned analysts apply critical judgment to AI outputs. Looking ahead, we explore the future skills necessary for cybersecurity professionals. As AI takes over more routine, data-heavy tasks, there's a growing need for roles focused on strategy, problem-solving, and lifelong learning to adapt alongside evolving technologies. What will the future security operations centers (SOCs) look like? How will AI transform the cybersecurity landscape? After listening to our discussion, what are your thoughts on AI's role in cybersecurity?  Share your views with us as we explore these questions and more.

Windows Weekly (MP3)
WW 876: Solder On - Snapdragon X Elite impressions, KB5036893 update, CHIPS & Science Act

Windows Weekly (MP3)

Play Episode Listen Later Apr 10, 2024 163:26


On this episode, Paul shares his thoughts on the Snapdragon X Elite chip with Leo and Richard. Windows 11 24H2, AI, NPUs, and SoCs from Intel, AMD, and Qualcomm are all on the way this year. But a schedule is finally starting to emerge. And it looks like we'll soon have answers to the questions about how or why AI will matter on PCs. Windows, AI, and the future Windows 11 version 24H2 - staggered release schedule as discussed last week Qualcomm Snapdragon X Elite-based PCs in May/June - nothing but good news to date, but Paul went hands-on last week. It's the real deal. Intel's first-gen Core Ultra chipsets are lackluster, but now we have big promises for Arrow Lake in late 2024 Microsoft Build 2024 is in mid-May, and now we have a session list with some nice clues. For example, Introducing the Next Generation of Windows on Arm Microsoft is expected to unveil 24H2 and new X Elite-based Surface PCs at Build Computex and other milestones, and then back-to-school and holiday selling periods Windows 11 Moment 5 arrives in stable with yesterday's Patch Tuesday (which is now called the General Availability channel, by the way). Of course, we still don't have all the features. In particular, waiting on Android phone as a webcam. IDC says PC market grew by 1.5 percent in Q1 and acts like it's the turnaround of the century Microsoft is manually blocking certain registry keys related to default browsers now: Apple-like non-EU belligerence or pragmatic protection of user choice? Why can't it be both? Beta channel (last week) - Copilot actions improvements New Store app update improvements performance dramatically The Windows 11 de-ensh*ttification experiments continue Does Windows 11 Enterprise solve the problem? No. So it's time to move on Hardware TSMC gets some of that sweet, sweet CHIPS Act money to expand its US operations AI Three AIs comparison Blockbuster report claims OpenAI/Microsoft, Google, and Meta stole content at scale to train AI Microsoft opens a new AI hub in London Google mulls charging for generative AI in Search Spotify lets user create AI playlists using text prompts now Brave brings Leo to iOS, so it's on all supported platforms now. And it added Leo to Brave Talk Premium too Google rebrands Studio Bot to Gemini in Android Studio, still in preview. This is their GitHub Copilot Xbox Microsoft rolls out April updates for Xbox consoles, Xbox app on PC Xbox reorgs, Kareem Choudhry leaves Microsoft A rumored game preservation team is too obvious not to be true Tips and Picks Tip of the week: Microsoft Store hosts its annual Spring Sale App picks of the week: Standard Notes & Beeper RunAs Radio this week: Securing AI with Sarah Young Brown liquor pick of the week: Dalwhinnie 15 Hosts: Leo Laporte, Paul Thurrott, and Richard Campbell Download or subscribe to this show at https://twit.tv/shows/windows-weekly Get episodes ad-free with Club TWiT at https://twit.tv/clubtwit Check out Paul's blog at thurrott.com The Windows Weekly theme music is courtesy of Carl Franklin. Sponsor: cachefly.com/twit