Please enjoy this encore of Word Notes.
Code and data repositories that don't protect against unauthorized changes.
Learn more about your ad choices. Visit megaphone.fm/adchoices
Jun 24
OWASP vulnerable and outdated components (noun)
Please enjoy this encore of Word Notes. Software libraries, frameworks, packages, and other components, and their dependencies (third-party code that each component uses) that have inherent security weaknesses, either through newly discovered vulnerabilities or because newer vers ... Show More
8m 4s
Feb 2017
The Martin NSA-contractor case. Fileless malware hits banks worldwide. DDoS tools undergo refinement. Ransomware developments. Industry notes.
In today's podcast we review some updates on the Martin NSA-contractor case. Fileless malware hits banks worldwide. DDoS tools undergo refinement. Researchers take a look at ransomware developments. It's been an active week for the cyber sector in mergers, acquisitions, and ventu ... Show More
16m 33s
Apr 2013
The Cloudcast (.net) #82 - SDN, Big Data, Internet of Things and What's Next?
Amy Lewis (@CommsNinja) talks with Lew Tucker (@lewtucker, SVP/CTO @ Cisco) and Dave McCrory (@mccrory, SVP @ Warner Music) about the latest keynotes at CloudConnect, the intersection between SDN / Big Data / Sensor Data, and how Cloud Computing and Networking are evolving as a r ... Show More
32m 40s
May 2024
AI Is a Cybersecurity Tool and Threat
When it comes to cybersecurity, artificial intelligence is proving to be both a formidable defensive tool and a potential threat. Today, Patrick Hevesi, VP Analyst with Gartner for Technical Professionals, discusses the concept and implications of “dark AI.” He also highlights pr ... Show More
26m 19s