show episodes
 
Artwork

1
Powered Services Podcast

Dan Tomaszewski of Kaseya

icon
Unsubscribe
icon
Unsubscribe
Monthly
 
Hosted by Dan Tomaszewski, The Powered Services Pro podcast is your high-voltage source for all the cutting-edge trends and electrifying information you need to supercharge your MSP. Plug into vital industry strategies and insights while diving into the hottest topics shaping the channel—whether it's tapping into new markets, leveraging advanced tools, or adopting forward-thinking strategies. Tune in to power up your MSP!
  continue reading
 
Artwork
 
Trilio Insights delves into the dynamic world of data protection and cloud-native technologies. In addition to Trilio experts, we will bring together practitioners, innovators, and visionaries to explore the evolving landscape of data protection, backup, and recovery. From unraveling the complexities of multi-cloud environments to navigating the challenges of data governance, each episode of Trilio Insights serves to share expertise and experience for Product Engineering, It Ops, Dev Ops, Ar ...
  continue reading
 
Artwork

1
The Backup Wrap-Up

W. Curtis Preston (Mr. Backup)

icon
Unsubscribe
icon
Unsubscribe
Weekly
 
Formerly known as "Restore it All," The Backup Wrap-up podcast turns unappreciated backup admins into cyber recovery heroes. After a brief analysis of backup-related news, each episode dives deep into one topic that you can use to better protect your organization from data loss, be it from accidents, disasters, or ransomware. The Backup Wrap-up is hosted by W. Curtis Preston (Mr. Backup) and his co-host Prasanna Malaiyandi. Curtis' passion for backups began over 30 years ago when his employe ...
  continue reading
 
Artwork

1
Speaking in Tech

Melissa Gurney Greene

icon
Unsubscribe
icon
Unsubscribe
Monthly
 
Speaking in Tech: "Where Enterprise Tech meets Consumer Tech...". Speaking in Tech is hosted by Peter Smallbone, Josh Atwell and Melissa Gurney Greene. Topics include popular tech, data storage, cloud computing, networking, storage virtualization, server virtualization, backup, disaster recovery and anything else interesting in the tech world. Disclosure: Speaking in tech does not receive support directly or indirectly from vendors or guests. Vendor relationships are disclosed on the podcast.
  continue reading
 
Employing an outside company to handle all payroll-related duties is known as outsourcing payroll services in a business. The main reasons for using payroll management services are to cut costs and free up time when handling payroll-related financial operations. Employing a third party to handle payroll operations frees up a company from having to recruit and educate a sizable in-house payroll team, buy suitable payroll software, and keep up with complicated tax regulations. All business typ ...
  continue reading
 
Artwork

1
The Tech Savvy Lawyer

Michael D.J. Eisenberg

icon
Unsubscribe
icon
Unsubscribe
Monthly+
 
The Tech Savvy Lawyer interviews Judges, Lawyers, and other professionals discussing utilizing technology in the practice of law. It may springboard an idea and help you in your own pursuit of the business we call "practicing law". Please join us for interesting conversations enjoyable at any tech skill level!
  continue reading
 
Welcome to the eFolder Channel Chat. These short, unscripted conversations are real stories from real channel partners moderated by Ted Hulsy, VP Marketing eFolder. eFolder is a leading supplier of cloud data protection, business continuity, cloud file sync solutions, and cloud to cloud backup for MSPs, cloud service providers, system integrators, and VARs. Delivered as wholesale services to the channel, eFolder enables its partners to provide branded data protection and file sync services a ...
  continue reading
 
Artwork

1
Lenovo Support +1(415)547-0376

Lenovo Support +1(415)547-0376

icon
Unsubscribe
icon
Unsubscribe
Daily+
 
Lenovo Customer Care +1(415)547-0376 Support Phone Number Facing any problem while dealing with your Lenovo device? Want to know various services provided by Lenovo? Or Want to access Lenovo Support Service? Click here!! Lenovo Support In today’s world of cut and throw competition, any firm which is ruling the market will keep ruling till their customers were satisfied. And having a satisfied customer is only possible with two things, i.e., Good Quality Product and best Customer Support Serv ...
  continue reading
 
"Hello, We are introduce to our Diamond Scientific Comapny and their product Biogas GEM™5000 With H2S | Portable Methane Detector located in cocoa, florida, in USA. Best technology in the world to measure gas Competitive pricing Service and 35+ years of experience company. The Portable Biogas Analyzer 5000 With H2S is used for The Accurate Gas Monitoring. BIOGAS 5000 Methane Detectors have A Robust, High Quality Design which can be Fitted easily And are extremely Easy To Use In Laboratory, F ...
  continue reading
 
Artwork

1
Working Class Audio

Working Class Audio

icon
Unsubscribe
icon
Unsubscribe
Weekly
 
Peel back the glamour of the professional recording world. Guests from the world of audio for music, film, games, restoration, and more share their insights on how they made their journey, how they survive, their advice on the real things including wins, losses, working with other people, money, and career advice. Hosted by audio engineer Matt Boudreau. The Working Class Audio Podcast - Navigating the World of Recording with a working class perspective.
  continue reading
 
Artwork
 
Tune in for lively, insightful discussion of topics important to the mainframe community, from DevOps to security and staffing. 2020 & 2024 winner of the DevOps Dozen Award for Best DevOps-Related Podcast Series.
  continue reading
 
Artwork

1
Think2 Design Studio

think2 design studio

icon
Unsubscribe
icon
Unsubscribe
Monthly
 
Welcome to the news and podcast section of Geelong's friendliest design studio. This is the page we host our podcast on. Make sure you never miss a show by subscribing! (links are all over the page to do so.) What are your thoughts? Like to comment? Or just want to chew the cudd? then drop us a line. Make sure you check out our news for some of the latests developments!
  continue reading
 
We discuss different topics all across the IT landscape; spanning from Data and Information Security to Software Development and Complex Systems. We want to share our knowledge to help you understand IT better and assist in building up our community of tech wizards.
  continue reading
 
Artwork

1
Application Hero Podcast

Brian Henderson & Neil Salamack

icon
Unsubscribe
icon
Unsubscribe
Monthly
 
High tech, IT education made easy for Microsoft DBA’s and application owners. Learn about the latest trends in technology and how to improve your application performance and availability. Topics include virtualization, backup, disaster recovery, SAN, and much more. If you run Microsoft Exchange or Microsoft SQL Server, on VMware or Hyper-V - please subscribe today!
  continue reading
 
Artwork

1
House of I.T

House of I.T

icon
Unsubscribe
icon
Unsubscribe
Monthly
 
IT Support Services relied by world industry leaders. Our IT support specialist and technical support engineer can deliver IT solutions to businesses. Our Products - Managed services - Backup and disaster recovery, - Cloud computing - Sofware/system selection, - IT consulting - IT security - IT support - IT upgrades and migrations - Maintenance and monitoring - Network installation and upgrades - Server and desktop virtualisation - Server and network documentation - CargoWise EDI data entry ...
  continue reading
 
Artwork

4
Powering SMB

XenTegra ONE

icon
Unsubscribe
icon
Unsubscribe
Monthly
 
Welcome to "Powering SMB," the ultimate podcast dedicated to empowering small to medium-sized businesses (SMBs) with the knowledge, tools, and inspiration they need to thrive in today's competitive landscape. Hosted by XenTegra One, a leader in SMB-focused technology solutions, this podcast brings you insightful conversations with industry experts, thought leaders, and successful entrepreneurs who have mastered the art of powering SMBs to new heights. In each episode, we dive deep into the c ...
  continue reading
 
Artwork

1
Hashan Kodituwakku

Hashan Kodituwakku

icon
Unsubscribe
icon
Unsubscribe
Monthly
 
Hashan Kodituwakku is a successful IT professional with over 15 years of progressive experience in IT services and security organizations, multiple degrees and professional development in computer services and information systems, deep knowledge of programming languages and operating systems, and an excellent record of work in infrastructure, software development and security systems
  continue reading
 
Artwork
 
Welcome to the Security Weekly Podcast Network, your all-in-one source for the latest in cybersecurity! This feed features a diverse lineup of shows, including Application Security Weekly, Business Security Weekly, Paul's Security Weekly, Enterprise Security Weekly, and Security Weekly News. Whether you're a cybersecurity professional, business leader, or tech enthusiast, we cover all angles of the cybersecurity landscape. Tune in for in-depth panel discussions, expert guest interviews, and ...
  continue reading
 
Artwork

1
Gartner Events Video Podcast

Gartner Events On Demand

icon
Unsubscribe
icon
Unsubscribe
Monthly
 
This video podcast offers sample trailers of recorded presentations from recent Gartner Events. At Gartner Events, information technology experts provide raw insight, strategy, advice and research in a conference environment. Visit "gartner.com/events" to find an event that's right for you and your role. Gartner, Inc. (NYSE: IT) is the world's leading information technology research and advisory company. We deliver the technology-related insight necessary for our clients to make the right de ...
  continue reading
 
Loading …
show series
 
Backups are your last line of defense against ransomware attacks—but what if ransomware can delete them too? Many organizations assume that having backups means they’re safe, but modern ransomware actively targets and destroys backups before demanding a ransom. In this episode, we break down how ransomware finds, encrypts, and deletes backup data, …
  continue reading
 
W. Curtis Preston, aka “Mr. Backup,” reveals shocking insights from the world of data recovery. From a million-tape archive stored in a football-field-sized facility to the critical need for reading backup data without vendor lock-in, this conversation uncovers the hidden struggles of IT professionals. We dive into ransomware recovery, AI’s role in…
  continue reading
 
Loreta Tarozaite, CEO & Founder at Loreta Today breaks down the human side of cybersecurity leadership. We explore the fear of failure among CISOs, the power of executive presence, and how communication—not just technical skills—is the real driver of trust in the boardroom. Loreta shares insights on overcoming imposter syndrome, building relationsh…
  continue reading
 
Loreta Tarozaite, CEO & Founder at Loreta Today breaks down the human side of cybersecurity leadership. We explore the fear of failure among CISOs, the power of executive presence, and how communication—not just technical skills—is the real driver of trust in the boardroom. Loreta shares insights on overcoming imposter syndrome, building relationsh…
  continue reading
 
AI and machine learning (ML) demand massive amounts of data, seamless scalability, and high-speed access—which is why traditional storage solutions often fall short. S3 object storage is rapidly becoming the go-to solution for AI/ML data lakes, enabling organizations to handle vast datasets efficiently and cost-effectively. In this episode, we expl…
  continue reading
 
The ESXiArgs ransomware attack is a wake-up call for organizations relying on VMware ESXi servers for virtualization. Targeting unpatched and vulnerable systems, this ransomware encrypts virtual machines, leaving businesses locked out of their critical workloads. In this episode, we uncover: 🔹 How ESXiArgs ransomware infiltrates VMware environments…
  continue reading
 
In this episode of The Backup Wrap-Up, we look at the cloud vs tape debate for active archives. The conversation was sparked by a LinkedIn post claiming tape libraries are the only robots not making things easier in 2025, suggesting cloud is superior to tape for active archives. We challenge this premise by pointing out that cloud vs tape is a fals…
  continue reading
 
A successful SIEM deployment depends on a lot more than implementing the SIEM correctly. So many other things in your environment have an impact on your chances of a successful SIEM. Are the right logs enabled? Is your EDR working correctly? Would you notice a sudden increase or decrease in events from critical sources? What can practitioners do to…
  continue reading
 
In this episode of Working Class Audio, Matt Boudreau chats with Peter Craft of Boxer Lodge Studio in Napa. From a tech career to full-time audio engineering, Peter shares his inspiring path back to music. Hear about his early recording dreams, building a destination studio, recording philosophy, and working with the vibrant Bay Area Americana scen…
  continue reading
 
Open Source Audacity — My Latest Video Tutorial for ScreenCastsONLINE CES 2025: Yarbo Modular Yard Robot CES 2025: PLAUD AI Voice Recorder Replacing a Big-Boy Camcorder with a DJI Osmo Pocket 3 & Mic2 CES 2025: TEWKE Intelligent Light Switch Support the Show Security Bits — 30 March 2025 (Bart Solo) Transcript of NC_2025_03_30 Join the Conversation…
  continue reading
 
I’ve used the free and open source Audacity for audio recording and editing for as long as I can remember. I did my first podcast recordings using Audacity nearly 20 years ago. What I never did before though, was to actually learn how to use it well. I’d push record, do some minor edits, maybe […] The post Open Source Audacity — My Latest Video Tut…
  continue reading
 
As hospitals and healthcare providers transition from paper to digital, medical record storage and archiving have become critical challenges. From electronic health records (EHRs) to PACS imaging systems, healthcare organizations must manage massive volumes of sensitive patient data while ensuring compliance with HIPAA and other regulations. In thi…
  continue reading
 
AI workloads are pushing traditional IT infrastructure to its limits. In this episode, we break down how AI storage and servers must evolve to handle massive datasets, high-speed processing, and scalable performance. We’ll explore key challenges like latency, bandwidth, and the role of NVMe SSDs, high-capacity storage tiers, and GPU acceleration. J…
  continue reading
 
Manufacturing is under attack. Ransomware is rapidly becoming one of the biggest threats to industrial operations, bringing production lines to a halt, disrupting supply chains, and costing businesses millions in lost revenue. In this episode, we dive into the alarming rise of ransomware in the manufacturing sector, exploring how cybercriminals tar…
  continue reading
 
Data loss isn’t always caused by hardware failures—it can happen through accidental deletions, insider threats, and ransomware attacks that target storage volumes. In this episode, we break down Volume Deletion Protection, a critical safeguard that keeps your data intact even when disaster strikes. 🔹 What is Volume Deletion Protection and how does …
  continue reading
 
Hospitals and healthcare providers are on the frontlines of a growing cyber crisis—ransomware attacks that lock down critical systems, disrupt patient care, and put lives at risk. In this episode, we dive into how ransomware is crippling the healthcare industry and what can be done to stop it. 🔹 Why healthcare is one of the biggest targets for cybe…
  continue reading
 
Schools, colleges, and universities are storing more data than ever—from student records and research data to online learning platforms. But with the rise of ransomware, accidental deletions, and system failures, how can educational institutions ensure their data stays safe, accessible, and recoverable? In this episode, we break down the backup and…
  continue reading
 
Ransomware is evolving, and attackers aren’t just encrypting your files—they’re deleting your backups to leave you with no way out. So, how do you fight back? Immutable snapshots. In this episode, we dive into how immutable snapshots work, why they’re the best defense against ransomware, and how you can set them up on your NAS storage. Unlike tradi…
  continue reading
 
How do we handle scope creep for vulnerabilities?, find the bugs before it hits the real world, risk or hype vulnerabilities, RTL-SDR in a browser, using AI to hack AI and protect AI, 73 vulnerabilities of which 0 patches have been issued, Spinning Cats, bypassing WDAC with Teams and JavaScript, Rust will solve all the security problems, did you he…
  continue reading
 
Ransomware threats are constantly evolving, and Lynx ransomware is one of the latest and most dangerous strains making headlines. But what makes this malware so effective? And how can businesses defend against it? In this episode, we take a deep dive into how Lynx ransomware infiltrates systems, encrypts critical data, and demands hefty ransoms fro…
  continue reading
 
In today’s digital world, passwords alone aren’t enough to keep cybercriminals out. Multi-Factor Authentication (MFA) has become a critical security measure, adding an extra layer of protection against unauthorized access, data breaches, and identity theft. But how does it really work? And why are some businesses still not using it? In this episode…
  continue reading
 
Ransomware is no longer just a tool for elite hackers—it’s now a service for sale on the dark web. Ransomware-as-a-Service (RaaS) has transformed cybercrime, allowing even low-skilled attackers to launch devastating ransomware campaigns against businesses, governments, and individuals. In this episode, we break down how RaaS works—from its subscrip…
  continue reading
 
Banks, credit unions, and financial institutions are prime targets for ransomware attacks, with cybercriminals seeking to steal sensitive financial data or hold entire networks hostage for massive payouts. The financial sector faces a relentless wave of cyber extortion, with devastating consequences—including service disruptions, regulatory fines, …
  continue reading
 
Ransomware attacks are wreaking havoc on the automotive industry, bringing production lines to a grinding halt and costing manufacturers millions in downtime and recovery. But why is this industry such a prime target? In this episode, we break down how ransomware infiltrates automotive supply chains, assembly lines, and dealerships, exposing critic…
  continue reading
 
In this episode, we dive deep into LockBit ransomware, a modern cyber threat that’s making headlines worldwide. We’ll explore how LockBit operates—from its initial intrusion methods to the sophisticated encryption techniques it uses to hold organizations hostage. Discover the tactics behind its rapid data encryption, and learn about the double exto…
  continue reading
 
In this episode, we dive deep into Conti ransomware, one of today’s most notorious cyber threats. We explore how Conti infiltrates networks, the sophisticated methods it uses to encrypt data, and its infamous double extortion tactics. By breaking down Conti’s technical architecture—from its initial breach and infection strategies to the robust encr…
  continue reading
 
Cybersecurity teams were under increasing strain in 2024. To alleviate this burden, 2025 will see greater reliance on automation to streamline workflows, enhance threat detection, and accelerate incident response. But some of these investments may come with risks. Greg Sullivan, Founding Partner at CIOSO Global, joins Business Security Weekly to di…
  continue reading
 
AI is evolving faster than ever—are you keeping up? In this episode, we break down the most impactful AI tools of 2025, from text-to-speech advancements to game-changing productivity hacks. Whether you're a creator, entrepreneur, or tech enthusiast, discover how AI can streamline your work, spark creativity, and revolutionize entire industries. Plu…
  continue reading
 
How do you write better PowerShell? Richard talks to Jeff Hicks about his latest book, Behind the PowerShell Pipeline, and his efforts to promote writing PowerShell scripts that are easy to understand, use, and maintain! Jeff talks about how making a script work is not enough anymore - you can use GitHub Copilot. The goal is to make the output as u…
  continue reading
 
In this episode, we dive into the world of Remote Access Trojans (RATs) — malicious software that gives cybercriminals stealthy control over your systems. We break down how RATs work, from their initial infection to the way they provide attackers with complete remote access. Drawing from real-world examples and expert analysis, we discuss the tacti…
  continue reading
 
In this episode, we dive into the deployment of the StoneFly SA365 Cybersecurity SIEM Appliance, exploring how it strengthens security by providing real-time threat detection, log management, and compliance solutions. Learn how organizations can enhance their cybersecurity posture, streamline incident response, and protect critical data with this p…
  continue reading
 
Loading …

Quick Reference Guide

Listen to this show while you explore
Play