logo
episode-header-image
Jan 2024
4m 54s

Encore: shadow IT (noun) [Word Notes]

N2K Networks
About this episode
tail spinning
Up next
Today
Nice to meet you, I'm a scammer.
Please enjoy this encore of Hacking Humans. On Hacking Humans, ⁠Dave Bittner⁠, ⁠Joe Carrigan⁠, and ⁠Maria Varmazis⁠ (also host of N2K's daily space podcast, T-Minus), are once again sharing the latest in social engineering scams, phishing schemes, and criminal exploits that are ... Show More
52m 58s
Nov 25
Pseudoransomware (noun) [Word Notes]
Please enjoy this encore of Word Notes. Malware, in the guise of ransomware, that destroys data rather than encrypts. CyberWire Glossary link: ⁠https://thecyberwire.com/glossary/pseudoransomware⁠ Audio reference link: “⁠Some Men Just Want to Watch the World Burn | the Dark Kn ... Show More
7m 27s
Nov 20
Lost iPhone, found trouble.
tail spinning
55m 59s
Recommended Episodes
Jul 2021
Analyzing the Impact of A.I. and Technology on Society and Cybersecurity
<p>Technology is advancing at pace never seen before and the newest tech, applications and widgets are being widely adopted at an even quicker rate. </p><p>Just look at A.I. and machine learning tools,which are now used to identify things once thought unimaginable — whether it's ... Show More
49m 58s
Aug 2023
2481: Zenoss - From Cloud to AI: The Evolution of IT Infrastructure
In today's episode of Tech Talks Daily, I sit down with Trent Fitz, a seasoned veteran in the tech space with over two decades of leadership experience, especially in cloud computing, AI, and cybersecurity. As Chief Product Officer of Zenoss, Trent has been at the forefront of te ... Show More
27m 4s
Feb 2021
The War with Algorithms: Why Your Next Security Strategy Includes A.I. and Machine Learning
<p>The image of a hooded individual illuminated by the glare of a computer screen hacking into a company’s network is the classic picture of what a cyber attack looks like. The reality, though, is these attackers are almost never a one-man band, but rather a sophisticated team ar ... Show More
40m 57s
Oct 2021
1758: MuleSoft - The IT and Business Alignment Barometer Report
<p>MuleSoft is a trusted integration and API platform provider that can empower any company to quickly unlock and integrate their apps and data to create connected experiences faster. Paul Crerand joins me on the Tech Talks Daily Podcast to discuss the IT and Business Alignment B ... Show More
23m 33s
Nov 2021
1798: Dr. Chase Cunningham, CSO of Ericom Software
<p>Dr. Chase Cunningham, CSO of Ericom Software released a techno-thriller book during Cyber Awareness Month titled "C:\>_gAbrIel." This book draws on Chase's real-world experience as a technologist and how cyber warfare, cybersecurity, and artificial intelligence (AI) can be lev ... Show More
16m 18s
Jul 2021
Software is King, but Hardware is Still an Integral Tool with Future of Tech Enterprise, Bob Venero
<p>The work from home shift has revolutionized IT Departments more than any invention ever could. </p><p>When closets became offices, and commutes morphed into strolls around the neighborhood, corporate IT was left scrambling. Many companies were ill prepared to support remote wo ... Show More
42m 42s
Dec 2021
Security Straight Talk with Jim Alkove, Chief Trust Officer at Salesforce, and George Kurtz, President/CEO and co-founder of CrowdStrike
<p>When it comes to IT security, there are a lot of marketing pitches out there offering bullish assessments of certain technologies, and, of course, the particular products being pitched. Really, there’s nothing wrong with marketers doing their jobs, and it’s especially useful w ... Show More
36m 12s
Jun 2023
HS050 The Tech Job Debacle
Google, Microsoft, Twitter, META/FB and a few others laid off an estimated 200,000 tech and tech-adjacent folks in recent weeks. Other companies like Fedex and Amazon have made layoffs, many impacting the IT teams. What does that mean for the tech industry? Between AI and our cor ... Show More
28 m
Jun 2023
CISA Alert AA23-165A – Understanding Ransomware Threat Actors: LockBit.
CISA, FBI, the MS-ISAC, and international partners are releasing this Cybersecurity Advisory to detail LockBit ransomware incidents and provide recommended mitigations to enable network defenders to proactively improve their organization’s defenses against this ransomware operati ... Show More
2m 43s
Mar 2022
Diving Into Deep Learning with Chuck Everette, Director of Cybersecurity Advocacy, Deep Instinct
<p>AI and machine learning are part of the solution in many cybersecurity products. The issue is that machine learning tends to take a lot of time. Cyber threats are moving quickly so computers need to learn fast to stop them. Chuck Everette, the Director of Cybersecurity Advocac ... Show More
34m 39s