This Week in Enterprise Tech (Audio)

by Leo Laporte (distro@twit.tv) · · · CC BY-NC-ND 4.0

This Week in Enterprise Tech explores the complex, cutting edge world of enterprise technology. Hosted by Lou Maresca, TWiET features IT professionals explaining the ins and outs of enterprise solutions. Records live every Friday at 4:30pm Eastern / 1:30pm Pacific / 20:30 UTC.

PuTTY trojanized, shipping ports cyberthreats, AR in the workforce, and more. * Trojanized versions of PuTTY utility are being used to spread backdoor * Hacker pwns Uber via compromised VPN account * White House guidance recommends SBOMs for federal agencies * Amazon buys warehouse robotics company Cloostermans * Why ports are at risk of cyberattacks * Upskill co-founder and CEO Brian Ballard on AR and other wearable tech in the workplace Hosts: Louis Maresca, Brian Chee, and Curt Franklin Guest: Brian Ballard Download or subscribe to this show at . Get episodes ad-free with Club TWiT at https://twit.tv/clubtwit Sponsors:

more...


Tags:

Older Episodes

IHG hotels cyberattack, Apple Passkeys, Azure Space
Bot Marketplaces, IoT Bugs, No-Code Tools
Okta hack, Raspberry Pi router, low-code/no-code with OutSystems
Apple M1 malware, upskilling tech staff, MDR cybersecurity with Pondurance
AWS Private 5G, IoT & home gateways, IT hardware with Curvature
Amazon & iRobot, Zero-Day Defense, DNS Security
Container files delivering malware, cyberattacks busted by AI, cloud innovation with Azure
Google Drive malware, industrial cyberthreats, app instrumentation trends with AppDynamics
Log4j, license plate reader dangers, AI graphing with Katana Graph
Autonomous Rail, IoT at CES, Applied XL
White House Software Security Summit, Fake QR Codes, Canon DRM
Is SASE better than Identity Management systems?
A look back at the top enterprise and cybersecurity news of 2021!
Preventing more global internet outages, TWiET 2022 Wishlist
AWS outage, API Management with Kong
Library E-books are big business, Salesforce Einstein Automate
Bringing order to the elements of production
What if hackers could turn back time? Mobile Device Security with Privoro
Third party SaaS security, private mobile networks with Celona