<?xml version="1.0" encoding="utf-8" ?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:media="http://search.yahoo.com/mrss/" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0" xmlns:creativeCommons="http://backend.userland.com/creativeCommonsRssModule" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:sy="http://purl.org/rss/1.0/modules/syndication/" xmlns:rawvoice="http://www.rawvoice.com/rawvoiceRssModule/" xmlns:podcast="https://podcastindex.org/namespace/1.0" version="2.0">
	<channel>
		<title>This Week in Enterprise Tech (Audio)</title>
		<itunes:author>TWiT</itunes:author>
		<link>https://twit.tv/shows/this-week-in-enterprise-tech</link>
		<generator>TWiT Feed Generator v4.6</generator>
		<docs>http://blogs.law.harvard.edu/tech/rss</docs>
		<language>en-US</language>
		<copyright>This work is licensed under a Creative Commons License - Attribution-NonCommercial-NoDerivatives 4.0 International - http://creativecommons.org/licenses/by-nc-nd/4.0/</copyright>
		<creativeCommons:license>http://creativecommons.org/licenses/by-nc-nd/4.0/</creativeCommons:license>
		<managingEditor>distro@twit.tv (TWiT Editors)</managingEditor>
		<webMaster>distro@twit.tv (TWiT Engineering)</webMaster>
		<ttl>720</ttl>
		<sy:updatePeriod>weekly</sy:updatePeriod>
		<sy:updateFrequency>1</sy:updateFrequency>
		<lastBuildDate>Fri, 19 Apr 2024 18:45:06 PDT</lastBuildDate>
		<pubDate>Fri, 19 Apr 2024 18:45:06 PDT</pubDate>
		<rawvoice:frequency>weekly</rawvoice:frequency>
		<rawvoice:location>Petaluma, CA</rawvoice:location>
		<itunes:type>episodic</itunes:type>
		<itunes:subtitle>Keep up on the latest in cutting edge enterprise tech.</itunes:subtitle>
		<itunes:summary>This Week in Enterprise Tech explores the complex, cutting edge world of enterprise technology. Hosted by Lou Maresca, TWiET features IT professionals explaining the ins and outs of enterprise solutions.

Although the show is no longer in production, you can enjoy episodes from our archives.</itunes:summary>
		<description>This Week in Enterprise Tech explores the complex, cutting edge world of enterprise technology. Hosted by Lou Maresca, TWiET features IT professionals explaining the ins and outs of enterprise solutions.

Although the show is no longer in production, you can enjoy episodes from our archives.</description>
		<itunes:keywords>TWiT, Lou Maresca, Technology, enterprise, Cheebert, Mo Williams, Brian Chee, Curtis Franklin</itunes:keywords>
		<rawvoice:rating tv="tv-g">tv-g</rawvoice:rating>
		<itunes:explicit>no</itunes:explicit>
		<itunes:block>no</itunes:block>
		<googleplay:block>No</googleplay:block>
		<podcast:funding url="https://twit.tv/clubtwit">Become a Club TWiT member!</podcast:funding>
		<itunes:owner>
			<itunes:name>Leo Laporte</itunes:name>
			<itunes:email>distro@twit.tv</itunes:email>
		</itunes:owner>
		<itunes:category text="Technology" />
		<category>Technology</category>
		<image>
			<title>This Week in Enterprise Tech (Audio)</title>
			<url>https://elroy.twit.tv/sites/default/files/styles/twit_album_art_2048x2048/public/images/shows/this_week_in_enterprise_tech/album_art/audio/twiet2022_albumart_standard_2400.jpg</url>
			<link>https://twit.tv/shows/this-week-in-enterprise-tech</link>
		</image>
		<itunes:image href="https://elroy.twit.tv/sites/default/files/styles/twit_album_art_2048x2048/public/images/shows/this_week_in_enterprise_tech/album_art/audio/twiet2022_albumart_standard_2400.jpg" />
		<itunes:new-feed-url>https://feeds.twit.tv/twiet.xml</itunes:new-feed-url>
		<rawvoice:subscribe feed="https://feeds.twit.tv/twiet.xml" itunes="https://podcasts.apple.com/us/podcast/this-week-in-enterprise-tech-mp3/id545542509?uo=10" tunein="http://tun.in/pgdwx" html="https://twit.tv/shows/this-week-in-enterprise-tech"></rawvoice:subscribe>
		<atom:link href="https://feeds.twit.tv/twiet.xml" type="application/rss+xml" rel="self"/>
		<item>
			<title>TWiET 573: DNS Deep Dive Part 3: Exploring Internal DNS and AD - KV-Botnet, Internal DNS Security, and Farewell Episode</title>
			<itunes:title>DNS Deep Dive Part 3: Exploring Internal DNS and AD - KV-Botnet, Internal DNS Security, and Farewell Episode</itunes:title>
			<itunes:episodeType>full</itunes:episodeType>
			<itunes:author>TWiT</itunes:author>
			<pubDate>Fri, 15 Dec 2023 18:10:23 PST</pubDate>
			<itunes:episode>573</itunes:episode>
			<podcast:episode>573</podcast:episode>
			<link>https://twit.tv/shows/this-week-in-enterprise-tech/episodes/573</link>
			<comments>https://twit.tv/shows/this-week-in-enterprise-tech/episodes/573</comments>
			<category>News</category>
			<category>Technology</category>
			<itunes:explicit>no</itunes:explicit>
			<itunes:subtitle>KV-Botnet, Internal DNS Security, and Farewell Episode</itunes:subtitle>
			<podcast:transcript url="http://twit.tv/posts/transcripts/week-enterprise-tech-573-transcript" type="text/html" />
			<itunes:keywords>This Week in Enterprise Tech, enterprise tech, cybersecurity, botnets, ai, Compliance, Security, G-Pon Technology, fiber, KV Botnet, US Government, communications, Vanta, Military Technology, DARPA, Raytheon, large language models, dns, Internal DNS</itunes:keywords>
			<description><![CDATA[
<p>The TWiET crew delves into botnets, securing hybrid work environments, the future of DNS architecture, and more.</p> 
<p>News Blips:</p><ul> 
<li>Researchers uncover sophisticated IoT botnet named "K- Botnet" targeting US entities; linked to Chinese state-aligned hackers</li> 
<li>AI startup Vanta (a TWiT.tv Sponsor) launches AI suite to automate repetitive security and compliance tasks </li> 
<li>DARPA funds revolutionary laser-based aerial energy delivery system for military operations</li> 
<li>Networking company Cradlepoint acquires SASE vendor ERA to provide a potential combined 5G and zero-trust networking solution</li></ul> 
<p>DNS Deep Drive Part 3 with DNS Expert Josh Kuo and Principal Solutions Architect of Infoblox Ross Gibson</p><ul> 
<li>Internal vs external DNS; differences in intended audience and integration</li> 
<li>Decoupling DNS services from domain controllers for stability </li> 
<li>Namespace planning tips; use owned domains, avoid random internal TLDs </li> 
<li>Encrypted DNS tradeoffs; privacy vs. visibility for security teams</li> 
<li>DNS security options like RPZ for control over internal resolution </li> 
<li>Future DNS role predictions like firewall integration and threat intel protections</li></ul> 
<p>The episode concludes with the announcement that the long-running show will be coming to an end after 12 years of enterprise content.</p> 
<p><strong>Hosts:</strong> <a href="https://twit.tv/people/louis-maresca">Louis Maresca</a>, <a href="https://twit.tv/people/brian-chee">Brian Chee</a>, and <a href="https://twit.tv/people/curtis-franklin">Curtis Franklin</a></p> 
<p><strong>Guests:</strong> <a href="https://www.infoblox.com/wp-content/uploads/infoblox-ebook-dns-security-for-dummies.pdf" target="_blank">Josh Kuo</a>, <a href="https://www.infoblox.com/" target="_blank">Ross Gibson</a>, and <a href="https://twit.tv/people/leo-laporte">Leo Laporte</a></p> 
<p>Help support TWiT by joining Club TWiT at <a href="https://twit.tv/clubtwit" rel="payment">https://twit.tv/clubtwit</a></p>
<p><strong>Sponsors:</strong><ul>
<li><a href="http://GO.ACILEARNING.COM/TWIT" target="_blank" rel="sponsored">GO.ACILEARNING.COM/TWIT</a></li>
<li><a href="http://vanta.com/ENTERPRISE" target="_blank" rel="sponsored">vanta.com/ENTERPRISE</a></li>
<li><a href="http://Miro.com/podcast" target="_blank" rel="sponsored">Miro.com/podcast</a></li>
</ul></p>
]]></description>
			<itunes:summary><![CDATA[
<p>The TWiET crew delves into botnets, securing hybrid work environments, the future of DNS architecture, and more.</p> 
<p>News Blips:</p><ul> 
<li>Researchers uncover sophisticated IoT botnet named "K- Botnet" targeting US entities; linked to Chinese state-aligned hackers</li> 
<li>AI startup Vanta (a TWiT.tv Sponsor) launches AI suite to automate repetitive security and compliance tasks </li> 
<li>DARPA funds revolutionary laser-based aerial energy delivery system for military operations</li> 
<li>Networking company Cradlepoint acquires SASE vendor ERA to provide a potential combined 5G and zero-trust networking solution</li></ul> 
<p>DNS Deep Drive Part 3 with DNS Expert Josh Kuo and Principal Solutions Architect of Infoblox Ross Gibson</p><ul> 
<li>Internal vs external DNS; differences in intended audience and integration</li> 
<li>Decoupling DNS services from domain controllers for stability </li> 
<li>Namespace planning tips; use owned domains, avoid random internal TLDs </li> 
<li>Encrypted DNS tradeoffs; privacy vs. visibility for security teams</li> 
<li>DNS security options like RPZ for control over internal resolution </li> 
<li>Future DNS role predictions like firewall integration and threat intel protections</li></ul> 
<p>The episode concludes with the announcement that the long-running show will be coming to an end after 12 years of enterprise content.</p> 
<p><strong>Hosts:</strong> <a href="https://twit.tv/people/louis-maresca">Louis Maresca</a>, <a href="https://twit.tv/people/brian-chee">Brian Chee</a>, and <a href="https://twit.tv/people/curtis-franklin">Curtis Franklin</a></p> 
<p><strong>Guests:</strong> <a href="https://www.infoblox.com/wp-content/uploads/infoblox-ebook-dns-security-for-dummies.pdf" target="_blank">Josh Kuo</a>, <a href="https://www.infoblox.com/" target="_blank">Ross Gibson</a>, and <a href="https://twit.tv/people/leo-laporte">Leo Laporte</a></p> 
<p>Help support TWiT by joining Club TWiT at <a href="https://twit.tv/clubtwit" rel="payment">https://twit.tv/clubtwit</a></p>
<p><strong>Sponsors:</strong><ul>
<li><a href="http://GO.ACILEARNING.COM/TWIT" target="_blank" rel="sponsored">GO.ACILEARNING.COM/TWIT</a></li>
<li><a href="http://vanta.com/ENTERPRISE" target="_blank" rel="sponsored">vanta.com/ENTERPRISE</a></li>
<li><a href="http://Miro.com/podcast" target="_blank" rel="sponsored">Miro.com/podcast</a></li>
</ul></p>
]]></itunes:summary>
			<content:encoded><![CDATA[
<p>The TWiET crew delves into botnets, securing hybrid work environments, the future of DNS architecture, and more.</p> 
<p>News Blips:</p><ul> 
<li>Researchers uncover sophisticated IoT botnet named "K- Botnet" targeting US entities; linked to Chinese state-aligned hackers</li> 
<li>AI startup Vanta (a TWiT.tv Sponsor) launches AI suite to automate repetitive security and compliance tasks </li> 
<li>DARPA funds revolutionary laser-based aerial energy delivery system for military operations</li> 
<li>Networking company Cradlepoint acquires SASE vendor ERA to provide a potential combined 5G and zero-trust networking solution</li></ul> 
<p>DNS Deep Drive Part 3 with DNS Expert Josh Kuo and Principal Solutions Architect of Infoblox Ross Gibson</p><ul> 
<li>Internal vs external DNS; differences in intended audience and integration</li> 
<li>Decoupling DNS services from domain controllers for stability </li> 
<li>Namespace planning tips; use owned domains, avoid random internal TLDs </li> 
<li>Encrypted DNS tradeoffs; privacy vs. visibility for security teams</li> 
<li>DNS security options like RPZ for control over internal resolution </li> 
<li>Future DNS role predictions like firewall integration and threat intel protections</li></ul> 
<p>The episode concludes with the announcement that the long-running show will be coming to an end after 12 years of enterprise content.</p> 
<p><strong>Hosts:</strong> <a href="https://twit.tv/people/louis-maresca">Louis Maresca</a>, <a href="https://twit.tv/people/brian-chee">Brian Chee</a>, and <a href="https://twit.tv/people/curtis-franklin">Curtis Franklin</a></p> 
<p><strong>Guests:</strong> <a href="https://www.infoblox.com/wp-content/uploads/infoblox-ebook-dns-security-for-dummies.pdf" target="_blank">Josh Kuo</a>, <a href="https://www.infoblox.com/" target="_blank">Ross Gibson</a>, and <a href="https://twit.tv/people/leo-laporte">Leo Laporte</a></p> 
<p>Help support TWiT by joining Club TWiT at <a href="https://twit.tv/clubtwit" rel="payment">https://twit.tv/clubtwit</a></p>
<p><strong>Sponsors:</strong><ul>
<li><a href="http://GO.ACILEARNING.COM/TWIT" target="_blank" rel="sponsored">GO.ACILEARNING.COM/TWIT</a></li>
<li><a href="http://vanta.com/ENTERPRISE" target="_blank" rel="sponsored">vanta.com/ENTERPRISE</a></li>
<li><a href="http://Miro.com/podcast" target="_blank" rel="sponsored">Miro.com/podcast</a></li>
</ul></p>
]]></content:encoded>
			<itunes:image href="https://elroy.twit.tv/sites/default/files/styles/twit_thumb_720x405/public/images/episodes/2023/12/849594/hero/twiet0573_thumbnail.jpg"/>
			<guid isPermaLink="false">https://pdst.fm/e/pscrb.fm/rss/p/cdn.twit.tv/audio/twiet/twiet0573/twiet0573.mp3</guid>
			<itunes:duration>1:15:07</itunes:duration>
			<enclosure url="https://pdst.fm/e/pscrb.fm/rss/p/cdn.twit.tv/libsyn/twiet_573/4cf66d02-0d71-4df2-9f02-35d3f0f8d090/R1_twiet0573.mp3" length="36243522" type="audio/mpeg"/>
			<media:content url="https://pdst.fm/e/pscrb.fm/rss/p/cdn.twit.tv/libsyn/twiet_573/4cf66d02-0d71-4df2-9f02-35d3f0f8d090/R1_twiet0573.mp3" fileSize="36243522" type="audio/mpeg" medium="audio">
				<media:title type="plain">TWiET 573: DNS Deep Dive Part 3: Exploring Internal DNS and AD - KV-Botnet, Internal DNS Security, and Farewell Episode</media:title>
				<media:description type="plain">KV-Botnet, Internal DNS Security, and Farewell Episode</media:description>
				<media:keywords>This Week in Enterprise Tech, enterprise tech, cybersecurity, botnets, ai, Compliance, Security, G-Pon Technology, fiber, KV Botnet, US Government, communications, Vanta, Military Technology, DARPA, Raytheon, large language models, dns, Internal DNS</media:keywords>
				<media:thumbnail url="https://elroy.twit.tv/sites/default/files/styles/twit_slideshow_400x300/public/images/episodes/2023/12/849594/hero/twiet0573_thumbnail.jpg" width="400" height="225" />
				<media:rating scheme="urn:simple">nonadult</media:rating>
				<media:rating scheme="urn:v-chip">tv-g</media:rating>
				<media:category scheme="urn:iab:categories" label="Technology &amp; Computing">IAB19</media:category>
				<media:credit role="host">Louis Maresca</media:credit>
				<media:credit role="host">Brian Chee</media:credit>
				<media:credit role="host">Curtis Franklin</media:credit>
				<media:credit role="guest">Josh Kuo</media:credit>
				<media:credit role="guest">Ross Gibson</media:credit>
				<media:credit role="guest">Leo Laporte</media:credit>
			</media:content>
				<podcast:person role="host" href="https://twit.tv/people/louis-maresca" img="https://elroy.twit.tv/sites/default/files/styles/twit_album_art_600x600/public/people/50091/pictures/lmaresca.jpg">Louis Maresca</podcast:person>
				<podcast:person role="host" href="https://twit.tv/people/brian-chee" img="https://elroy.twit.tv/sites/default/files/styles/twit_album_art_600x600/public/people/58/pictures/brian-chee.png">Brian Chee</podcast:person>
				<podcast:person role="host" href="https://twit.tv/people/curtis-franklin" img="https://elroy.twit.tv/sites/default/files/styles/twit_album_art_600x600/public/people/57/pictures/franklin-curt.jpg">Curtis Franklin</podcast:person>
				<podcast:person role="guest" href="https://www.infoblox.com/wp-content/uploads/infoblox-ebook-dns-security-for-dummies.pdf">Josh Kuo</podcast:person>
				<podcast:person role="guest" href="https://www.infoblox.com/">Ross Gibson</podcast:person>
				<podcast:person role="guest" href="https://twit.tv/people/leo-laporte" img="https://elroy.twit.tv/sites/default/files/styles/twit_album_art_600x600/public/people/21/pictures/leo_1.jpg">Leo Laporte</podcast:person>
		</item>
		<item>
			<title>TWiET 572: DNS Deep Dive Part 2: External Authoritative DNS - Journey into the Heart of the Domain Name System</title>
			<itunes:title>DNS Deep Dive Part 2: External Authoritative DNS - Journey into the Heart of the Domain Name System</itunes:title>
			<itunes:episodeType>full</itunes:episodeType>
			<itunes:author>TWiT</itunes:author>
			<pubDate>Fri, 08 Dec 2023 16:40:31 PST</pubDate>
			<itunes:episode>572</itunes:episode>
			<podcast:episode>572</podcast:episode>
			<link>https://twit.tv/shows/this-week-in-enterprise-tech/episodes/572</link>
			<comments>https://twit.tv/shows/this-week-in-enterprise-tech/episodes/572</comments>
			<category>News</category>
			<category>Technology</category>
			<itunes:explicit>no</itunes:explicit>
			<itunes:subtitle>Journey into the Heart of the Domain Name System</itunes:subtitle>
			<podcast:transcript url="http://twit.tv/posts/transcripts/week-enterprise-tech-episode-572-transcript" type="text/html" />
			<itunes:keywords>dns, Internet Technology, unicode, Punicode, Phishing Sites, malware, gps, Visually Impaired, Apple iBeacon, Recursive Servers, Authoritative Servers, internet security, accessibility, DDOS attack, Domain Hijacking, Security</itunes:keywords>
			<description><![CDATA[
<ul> 
<li>Proxy trojan targets macOS users for traffic redirection</li> 
<li>Indoor navigation has had a slow start</li> 
<li>Krasue RAT uses cross-kernel Linux rootkit to attack telecoms</li> 
<li>U.S. approves first gene-editing treatment, Casgevy, for sickle cell disease</li> 
<li>The DNS Deep-Drive continues with guests Josh Kuo, DNS expert, and Ross Gibson, Principal Solutions Architect of Infoblox, to talk about external authoritative DNS - whether enterprises should fully manage their own external DNS or use managed services, threats like domain hijacking, using load balancers, and more.</li></ul> 
<p><strong>Hosts:</strong> <a href="https://twit.tv/people/curtis-franklin">Curtis Franklin</a> and <a href="https://twit.tv/people/brian-chee">Brian Chee</a></p> 
<p><strong>Guests:</strong> <a href="https://www.infoblox.com/wp-content/uploads/infoblox-ebook-dns-security-for-dummies.pdf" target="_blank">Josh Kuo</a> and <a href="https://www.infoblox.com/" target="_blank">Ross Gibson</a></p> 
<p>Download or subscribe to this show at <a href="https://twit.tv/shows/this-week-in-enterprise-tech">https://twit.tv/shows/this-week-in-enterprise-tech</a>.</p> 
<p>Get episodes ad-free with Club TWiT at <a href="https://twit.tv/clubtwit" rel="payment">https://twit.tv/clubtwit</a></p>
<p><strong>Sponsors:</strong><ul>
<li><a href="http://canary.tools/twit" target="_blank" rel="sponsored">canary.tools/twit - use code: TWIT</a></li>
<li><a href="http://lookout.com" target="_blank" rel="sponsored">lookout.com</a></li>
<li><a href="http://vanta.com/ENTERPRISE" target="_blank" rel="sponsored">vanta.com/ENTERPRISE</a></li>
</ul></p>
]]></description>
			<itunes:summary><![CDATA[
<ul> 
<li>Proxy trojan targets macOS users for traffic redirection</li> 
<li>Indoor navigation has had a slow start</li> 
<li>Krasue RAT uses cross-kernel Linux rootkit to attack telecoms</li> 
<li>U.S. approves first gene-editing treatment, Casgevy, for sickle cell disease</li> 
<li>The DNS Deep-Drive continues with guests Josh Kuo, DNS expert, and Ross Gibson, Principal Solutions Architect of Infoblox, to talk about external authoritative DNS - whether enterprises should fully manage their own external DNS or use managed services, threats like domain hijacking, using load balancers, and more.</li></ul> 
<p><strong>Hosts:</strong> <a href="https://twit.tv/people/curtis-franklin">Curtis Franklin</a> and <a href="https://twit.tv/people/brian-chee">Brian Chee</a></p> 
<p><strong>Guests:</strong> <a href="https://www.infoblox.com/wp-content/uploads/infoblox-ebook-dns-security-for-dummies.pdf" target="_blank">Josh Kuo</a> and <a href="https://www.infoblox.com/" target="_blank">Ross Gibson</a></p> 
<p>Download or subscribe to this show at <a href="https://twit.tv/shows/this-week-in-enterprise-tech">https://twit.tv/shows/this-week-in-enterprise-tech</a>.</p> 
<p>Get episodes ad-free with Club TWiT at <a href="https://twit.tv/clubtwit" rel="payment">https://twit.tv/clubtwit</a></p>
<p><strong>Sponsors:</strong><ul>
<li><a href="http://canary.tools/twit" target="_blank" rel="sponsored">canary.tools/twit - use code: TWIT</a></li>
<li><a href="http://lookout.com" target="_blank" rel="sponsored">lookout.com</a></li>
<li><a href="http://vanta.com/ENTERPRISE" target="_blank" rel="sponsored">vanta.com/ENTERPRISE</a></li>
</ul></p>
]]></itunes:summary>
			<content:encoded><![CDATA[
<ul> 
<li>Proxy trojan targets macOS users for traffic redirection</li> 
<li>Indoor navigation has had a slow start</li> 
<li>Krasue RAT uses cross-kernel Linux rootkit to attack telecoms</li> 
<li>U.S. approves first gene-editing treatment, Casgevy, for sickle cell disease</li> 
<li>The DNS Deep-Drive continues with guests Josh Kuo, DNS expert, and Ross Gibson, Principal Solutions Architect of Infoblox, to talk about external authoritative DNS - whether enterprises should fully manage their own external DNS or use managed services, threats like domain hijacking, using load balancers, and more.</li></ul> 
<p><strong>Hosts:</strong> <a href="https://twit.tv/people/curtis-franklin">Curtis Franklin</a> and <a href="https://twit.tv/people/brian-chee">Brian Chee</a></p> 
<p><strong>Guests:</strong> <a href="https://www.infoblox.com/wp-content/uploads/infoblox-ebook-dns-security-for-dummies.pdf" target="_blank">Josh Kuo</a> and <a href="https://www.infoblox.com/" target="_blank">Ross Gibson</a></p> 
<p>Download or subscribe to this show at <a href="https://twit.tv/shows/this-week-in-enterprise-tech">https://twit.tv/shows/this-week-in-enterprise-tech</a>.</p> 
<p>Get episodes ad-free with Club TWiT at <a href="https://twit.tv/clubtwit" rel="payment">https://twit.tv/clubtwit</a></p>
<p><strong>Sponsors:</strong><ul>
<li><a href="http://canary.tools/twit" target="_blank" rel="sponsored">canary.tools/twit - use code: TWIT</a></li>
<li><a href="http://lookout.com" target="_blank" rel="sponsored">lookout.com</a></li>
<li><a href="http://vanta.com/ENTERPRISE" target="_blank" rel="sponsored">vanta.com/ENTERPRISE</a></li>
</ul></p>
]]></content:encoded>
			<itunes:image href="https://elroy.twit.tv/sites/default/files/styles/twit_thumb_720x405/public/images/episodes/2023/12/849475/hero/twiet0572_thumbnail.jpg"/>
			<guid isPermaLink="false">https://pdst.fm/e/pscrb.fm/rss/p/cdn.twit.tv/audio/twiet/twiet0572/twiet0572.mp3</guid>
			<itunes:duration>1:13:10</itunes:duration>
			<enclosure url="https://pdst.fm/e/pscrb.fm/rss/p/cdn.twit.tv/libsyn/twiet_572/4cf66d02-0d71-4df2-9f02-35d3f0f8d090/R2_twiet0572.mp3" length="35250345" type="audio/mpeg"/>
			<media:content url="https://pdst.fm/e/pscrb.fm/rss/p/cdn.twit.tv/libsyn/twiet_572/4cf66d02-0d71-4df2-9f02-35d3f0f8d090/R2_twiet0572.mp3" fileSize="35250345" type="audio/mpeg" medium="audio">
				<media:title type="plain">TWiET 572: DNS Deep Dive Part 2: External Authoritative DNS - Journey into the Heart of the Domain Name System</media:title>
				<media:description type="plain">Journey into the Heart of the Domain Name System</media:description>
				<media:keywords>dns, Internet Technology, unicode, Punicode, Phishing Sites, malware, gps, Visually Impaired, Apple iBeacon, Recursive Servers, Authoritative Servers, internet security, accessibility, DDOS attack, Domain Hijacking, Security</media:keywords>
				<media:thumbnail url="https://elroy.twit.tv/sites/default/files/styles/twit_slideshow_400x300/public/images/episodes/2023/12/849475/hero/twiet0572_thumbnail.jpg" width="400" height="225" />
				<media:rating scheme="urn:simple">nonadult</media:rating>
				<media:rating scheme="urn:v-chip">tv-g</media:rating>
				<media:category scheme="urn:iab:categories" label="Technology &amp; Computing">IAB19</media:category>
				<media:credit role="host">Curtis Franklin</media:credit>
				<media:credit role="host">Brian Chee</media:credit>
				<media:credit role="guest">Josh Kuo</media:credit>
				<media:credit role="guest">Ross Gibson</media:credit>
			</media:content>
				<podcast:person role="host" href="https://twit.tv/people/curtis-franklin" img="https://elroy.twit.tv/sites/default/files/styles/twit_album_art_600x600/public/people/57/pictures/franklin-curt.jpg">Curtis Franklin</podcast:person>
				<podcast:person role="host" href="https://twit.tv/people/brian-chee" img="https://elroy.twit.tv/sites/default/files/styles/twit_album_art_600x600/public/people/58/pictures/brian-chee.png">Brian Chee</podcast:person>
				<podcast:person role="guest" href="https://www.infoblox.com/wp-content/uploads/infoblox-ebook-dns-security-for-dummies.pdf">Josh Kuo</podcast:person>
				<podcast:person role="guest" href="https://www.infoblox.com/">Ross Gibson</podcast:person>
		</item>
		<item>
			<title>TWiET 571: DNS Deep Dive Part 1: Demystifying DNS - Enterprise DNS basics</title>
			<itunes:title>DNS Deep Dive Part 1: Demystifying DNS - Enterprise DNS basics</itunes:title>
			<itunes:episodeType>full</itunes:episodeType>
			<itunes:author>TWiT</itunes:author>
			<pubDate>Fri, 01 Dec 2023 17:43:12 PST</pubDate>
			<itunes:episode>571</itunes:episode>
			<podcast:episode>571</podcast:episode>
			<link>https://twit.tv/shows/this-week-in-enterprise-tech/episodes/571</link>
			<comments>https://twit.tv/shows/this-week-in-enterprise-tech/episodes/571</comments>
			<category>News</category>
			<category>Technology</category>
			<itunes:explicit>no</itunes:explicit>
			<itunes:subtitle>Enterprise DNS basics</itunes:subtitle>
			<podcast:transcript url="http://twit.tv/posts/transcripts/week-enterprise-tech-571-transcript" type="text/html" />
			<itunes:keywords>Enterprise, enterprise technology, generative ai, PLCs, dns, dns security, DNS basics, DNS 101, infoblox, Brian Chee, Curt Franklin, josh kuo, Ross Gibson, VDI, Windows App, cyber threats, Virtual Desktop Infrastructure, Linux, operating system</itunes:keywords>
			<description><![CDATA[
<ul> 
<li>Hackers Can Easily Extract ChatGPT Training Data</li> 
<li>Cheebert's prediction about VDI just came true</li> 
<li>Big Tech jobs are not as immune to layoffs as we thought</li> 
<li>Siemens PLCs are Still Vulnerable to Stuxnet-like Cyberattacks</li> 
<li>Josh Kuo, DNS Expert and Ross Gibson, Principal Solutions Architect of Infoblox join Brian Chee and Curt Franklin for part 1 of a 3 part in-depth primer on enterprise DNS, from the basics of DNS lookup, key considerations like security and encryption, and why run your own DNS versus other free alternatives?</li></ul> 
<p><strong>Hosts:</strong> <a href="https://twit.tv/people/brian-chee">Brian Chee</a> and <a href="https://twit.tv/people/curtis-franklin">Curtis Franklin</a></p> 
<p><strong>Guests:</strong> <a href="https://www.infoblox.com/wp-content/uploads/infoblox-ebook-dns-security-for-dummies.pdf" target="_blank">Josh Kuo</a> and <a href="https://www.infoblox.com/" target="_blank">Ross Gibson</a></p> 
<p>Download or subscribe to this show at <a href="https://twit.tv/shows/this-week-in-enterprise-tech">https://twit.tv/shows/this-week-in-enterprise-tech</a>.</p> 
<p>Get episodes ad-free with Club TWiT at <a href="https://twit.tv/clubtwit" rel="payment">https://twit.tv/clubtwit</a></p>
<p><strong>Sponsors:</strong><ul>
<li><a href="http://kolide.com/twiet" target="_blank" rel="sponsored">kolide.com/twiet</a></li>
<li><a href="http://bitwarden.com/twit" target="_blank" rel="sponsored">bitwarden.com/twit</a></li>
<li><a href="http://GO.ACILEARNING.COM/TWIT" target="_blank" rel="sponsored">GO.ACILEARNING.COM/TWIT</a></li>
</ul></p>
]]></description>
			<itunes:summary><![CDATA[
<ul> 
<li>Hackers Can Easily Extract ChatGPT Training Data</li> 
<li>Cheebert's prediction about VDI just came true</li> 
<li>Big Tech jobs are not as immune to layoffs as we thought</li> 
<li>Siemens PLCs are Still Vulnerable to Stuxnet-like Cyberattacks</li> 
<li>Josh Kuo, DNS Expert and Ross Gibson, Principal Solutions Architect of Infoblox join Brian Chee and Curt Franklin for part 1 of a 3 part in-depth primer on enterprise DNS, from the basics of DNS lookup, key considerations like security and encryption, and why run your own DNS versus other free alternatives?</li></ul> 
<p><strong>Hosts:</strong> <a href="https://twit.tv/people/brian-chee">Brian Chee</a> and <a href="https://twit.tv/people/curtis-franklin">Curtis Franklin</a></p> 
<p><strong>Guests:</strong> <a href="https://www.infoblox.com/wp-content/uploads/infoblox-ebook-dns-security-for-dummies.pdf" target="_blank">Josh Kuo</a> and <a href="https://www.infoblox.com/" target="_blank">Ross Gibson</a></p> 
<p>Download or subscribe to this show at <a href="https://twit.tv/shows/this-week-in-enterprise-tech">https://twit.tv/shows/this-week-in-enterprise-tech</a>.</p> 
<p>Get episodes ad-free with Club TWiT at <a href="https://twit.tv/clubtwit" rel="payment">https://twit.tv/clubtwit</a></p>
<p><strong>Sponsors:</strong><ul>
<li><a href="http://kolide.com/twiet" target="_blank" rel="sponsored">kolide.com/twiet</a></li>
<li><a href="http://bitwarden.com/twit" target="_blank" rel="sponsored">bitwarden.com/twit</a></li>
<li><a href="http://GO.ACILEARNING.COM/TWIT" target="_blank" rel="sponsored">GO.ACILEARNING.COM/TWIT</a></li>
</ul></p>
]]></itunes:summary>
			<content:encoded><![CDATA[
<ul> 
<li>Hackers Can Easily Extract ChatGPT Training Data</li> 
<li>Cheebert's prediction about VDI just came true</li> 
<li>Big Tech jobs are not as immune to layoffs as we thought</li> 
<li>Siemens PLCs are Still Vulnerable to Stuxnet-like Cyberattacks</li> 
<li>Josh Kuo, DNS Expert and Ross Gibson, Principal Solutions Architect of Infoblox join Brian Chee and Curt Franklin for part 1 of a 3 part in-depth primer on enterprise DNS, from the basics of DNS lookup, key considerations like security and encryption, and why run your own DNS versus other free alternatives?</li></ul> 
<p><strong>Hosts:</strong> <a href="https://twit.tv/people/brian-chee">Brian Chee</a> and <a href="https://twit.tv/people/curtis-franklin">Curtis Franklin</a></p> 
<p><strong>Guests:</strong> <a href="https://www.infoblox.com/wp-content/uploads/infoblox-ebook-dns-security-for-dummies.pdf" target="_blank">Josh Kuo</a> and <a href="https://www.infoblox.com/" target="_blank">Ross Gibson</a></p> 
<p>Download or subscribe to this show at <a href="https://twit.tv/shows/this-week-in-enterprise-tech">https://twit.tv/shows/this-week-in-enterprise-tech</a>.</p> 
<p>Get episodes ad-free with Club TWiT at <a href="https://twit.tv/clubtwit" rel="payment">https://twit.tv/clubtwit</a></p>
<p><strong>Sponsors:</strong><ul>
<li><a href="http://kolide.com/twiet" target="_blank" rel="sponsored">kolide.com/twiet</a></li>
<li><a href="http://bitwarden.com/twit" target="_blank" rel="sponsored">bitwarden.com/twit</a></li>
<li><a href="http://GO.ACILEARNING.COM/TWIT" target="_blank" rel="sponsored">GO.ACILEARNING.COM/TWIT</a></li>
</ul></p>
]]></content:encoded>
			<itunes:image href="https://elroy.twit.tv/sites/default/files/styles/twit_thumb_720x405/public/images/episodes/2023/12/849357/hero/twiet0571b_thumbnail.jpg"/>
			<guid isPermaLink="false">https://pdst.fm/e/pscrb.fm/rss/p/cdn.twit.tv/audio/twiet/twiet0571/twiet0571.mp3</guid>
			<itunes:duration>1:08:10</itunes:duration>
			<enclosure url="https://pdst.fm/e/pscrb.fm/rss/p/cdn.twit.tv/libsyn/twiet_571/4cf66d02-0d71-4df2-9f02-35d3f0f8d090/R1_twiet0571.mp3" length="32990365" type="audio/mpeg"/>
			<media:content url="https://pdst.fm/e/pscrb.fm/rss/p/cdn.twit.tv/libsyn/twiet_571/4cf66d02-0d71-4df2-9f02-35d3f0f8d090/R1_twiet0571.mp3" fileSize="32990365" type="audio/mpeg" medium="audio">
				<media:title type="plain">TWiET 571: DNS Deep Dive Part 1: Demystifying DNS - Enterprise DNS basics</media:title>
				<media:description type="plain">Enterprise DNS basics</media:description>
				<media:keywords>Enterprise, enterprise technology, generative ai, PLCs, dns, dns security, DNS basics, DNS 101, infoblox, Brian Chee, Curt Franklin, josh kuo, Ross Gibson, VDI, Windows App, cyber threats, Virtual Desktop Infrastructure, Linux, operating system</media:keywords>
				<media:thumbnail url="https://elroy.twit.tv/sites/default/files/styles/twit_slideshow_400x300/public/images/episodes/2023/12/849357/hero/twiet0571b_thumbnail.jpg" width="400" height="225" />
				<media:rating scheme="urn:simple">nonadult</media:rating>
				<media:rating scheme="urn:v-chip">tv-g</media:rating>
				<media:category scheme="urn:iab:categories" label="Technology &amp; Computing">IAB19</media:category>
				<media:credit role="host">Brian Chee</media:credit>
				<media:credit role="host">Curtis Franklin</media:credit>
				<media:credit role="guest">Josh Kuo</media:credit>
				<media:credit role="guest">Ross Gibson</media:credit>
			</media:content>
				<podcast:person role="host" href="https://twit.tv/people/brian-chee" img="https://elroy.twit.tv/sites/default/files/styles/twit_album_art_600x600/public/people/58/pictures/brian-chee.png">Brian Chee</podcast:person>
				<podcast:person role="host" href="https://twit.tv/people/curtis-franklin" img="https://elroy.twit.tv/sites/default/files/styles/twit_album_art_600x600/public/people/57/pictures/franklin-curt.jpg">Curtis Franklin</podcast:person>
				<podcast:person role="guest" href="https://www.infoblox.com/wp-content/uploads/infoblox-ebook-dns-security-for-dummies.pdf">Josh Kuo</podcast:person>
				<podcast:person role="guest" href="https://www.infoblox.com/">Ross Gibson</podcast:person>
		</item>
		<item>
			<title>TWiET 570: Well-Placed Friction - EU&#039;s NIS2 Directive, better UX for DevOps w/ LaunchDarkly</title>
			<itunes:title>Well-Placed Friction - EU&#039;s NIS2 Directive, better UX for DevOps w/ LaunchDarkly</itunes:title>
			<itunes:episodeType>full</itunes:episodeType>
			<itunes:author>TWiT</itunes:author>
			<pubDate>Fri, 17 Nov 2023 17:59:24 PST</pubDate>
			<itunes:episode>570</itunes:episode>
			<podcast:episode>570</podcast:episode>
			<link>https://twit.tv/shows/this-week-in-enterprise-tech/episodes/570</link>
			<comments>https://twit.tv/shows/this-week-in-enterprise-tech/episodes/570</comments>
			<category>News</category>
			<category>Technology</category>
			<itunes:explicit>no</itunes:explicit>
			<itunes:subtitle>EU&#039;s NIS2 Directive, better UX for DevOps w/ LaunchDarkly</itunes:subtitle>
			<podcast:transcript url="http://twit.tv/posts/inside-twit/twiet-how-boost-user-experiences-devops" type="text/html" />
			<itunes:keywords>Enterprise, cybersecurity, NIS2 Directive, EU, legislation, devops, user experience, UX, design, Software Accessibility, Kill Switches, incident response, Supply Chain Security, encryption, Vulnerability Disclosure, open source tools, Ransomware Tactics, </itunes:keywords>
			<description><![CDATA[
<ul> 
<li>Ransomware group reports a victim company to the SEC for failing to promptly disclose a breach.</li> 
<li>Shadowy hack-for-hire group behind sprawling web of global cyberattacks</li> 
<li>Electrical arc detection devices that can prevent dangerous home fires caused by faulty wiring.</li> 
<li>The worst passwords of 2023</li> 
<li>The NIS2 Directive: The first piece of EU-wide legislation on cybersecurity</li> 
<li>Jenna Bilotta of LaunchDarkly joins to discuss transforming DevOps tools with better user experiences.</li></ul> 
<p><strong>Hosts:</strong> <a href="https://twit.tv/people/louis-maresca">Louis Maresca</a>, <a href="https://twit.tv/people/brian-chee">Brian Chee</a>, and <a href="https://twit.tv/people/curtis-franklin">Curtis Franklin</a></p> 
<p><strong>Guest:</strong> <a href="https://launchdarkly.com/" target="_blank">Jenna Bilotta</a></p> 
<p>Download or subscribe to this show at <a href="https://twit.tv/shows/this-week-in-enterprise-tech">https://twit.tv/shows/this-week-in-enterprise-tech</a>.</p> 
<p>Get episodes ad-free with Club TWiT at <a href="https://twit.tv/clubtwit" rel="payment">https://twit.tv/clubtwit</a></p>
<p><strong>Sponsors:</strong><ul>
<li><a href="http://Miro.com/podcast" target="_blank" rel="sponsored">Miro.com/podcast</a></li>
<li><a href="http://lookout.com" target="_blank" rel="sponsored">lookout.com</a></li>
<li><a href="https://nureva.co/45id9Kj" target="_blank" rel="sponsored">nureva.com/twit</a></li>
</ul></p>
]]></description>
			<itunes:summary><![CDATA[
<ul> 
<li>Ransomware group reports a victim company to the SEC for failing to promptly disclose a breach.</li> 
<li>Shadowy hack-for-hire group behind sprawling web of global cyberattacks</li> 
<li>Electrical arc detection devices that can prevent dangerous home fires caused by faulty wiring.</li> 
<li>The worst passwords of 2023</li> 
<li>The NIS2 Directive: The first piece of EU-wide legislation on cybersecurity</li> 
<li>Jenna Bilotta of LaunchDarkly joins to discuss transforming DevOps tools with better user experiences.</li></ul> 
<p><strong>Hosts:</strong> <a href="https://twit.tv/people/louis-maresca">Louis Maresca</a>, <a href="https://twit.tv/people/brian-chee">Brian Chee</a>, and <a href="https://twit.tv/people/curtis-franklin">Curtis Franklin</a></p> 
<p><strong>Guest:</strong> <a href="https://launchdarkly.com/" target="_blank">Jenna Bilotta</a></p> 
<p>Download or subscribe to this show at <a href="https://twit.tv/shows/this-week-in-enterprise-tech">https://twit.tv/shows/this-week-in-enterprise-tech</a>.</p> 
<p>Get episodes ad-free with Club TWiT at <a href="https://twit.tv/clubtwit" rel="payment">https://twit.tv/clubtwit</a></p>
<p><strong>Sponsors:</strong><ul>
<li><a href="http://Miro.com/podcast" target="_blank" rel="sponsored">Miro.com/podcast</a></li>
<li><a href="http://lookout.com" target="_blank" rel="sponsored">lookout.com</a></li>
<li><a href="https://nureva.co/45id9Kj" target="_blank" rel="sponsored">nureva.com/twit</a></li>
</ul></p>
]]></itunes:summary>
			<content:encoded><![CDATA[
<ul> 
<li>Ransomware group reports a victim company to the SEC for failing to promptly disclose a breach.</li> 
<li>Shadowy hack-for-hire group behind sprawling web of global cyberattacks</li> 
<li>Electrical arc detection devices that can prevent dangerous home fires caused by faulty wiring.</li> 
<li>The worst passwords of 2023</li> 
<li>The NIS2 Directive: The first piece of EU-wide legislation on cybersecurity</li> 
<li>Jenna Bilotta of LaunchDarkly joins to discuss transforming DevOps tools with better user experiences.</li></ul> 
<p><strong>Hosts:</strong> <a href="https://twit.tv/people/louis-maresca">Louis Maresca</a>, <a href="https://twit.tv/people/brian-chee">Brian Chee</a>, and <a href="https://twit.tv/people/curtis-franklin">Curtis Franklin</a></p> 
<p><strong>Guest:</strong> <a href="https://launchdarkly.com/" target="_blank">Jenna Bilotta</a></p> 
<p>Download or subscribe to this show at <a href="https://twit.tv/shows/this-week-in-enterprise-tech">https://twit.tv/shows/this-week-in-enterprise-tech</a>.</p> 
<p>Get episodes ad-free with Club TWiT at <a href="https://twit.tv/clubtwit" rel="payment">https://twit.tv/clubtwit</a></p>
<p><strong>Sponsors:</strong><ul>
<li><a href="http://Miro.com/podcast" target="_blank" rel="sponsored">Miro.com/podcast</a></li>
<li><a href="http://lookout.com" target="_blank" rel="sponsored">lookout.com</a></li>
<li><a href="https://nureva.co/45id9Kj" target="_blank" rel="sponsored">nureva.com/twit</a></li>
</ul></p>
]]></content:encoded>
			<itunes:image href="https://elroy.twit.tv/sites/default/files/styles/twit_thumb_720x405/public/images/episodes/2023/11/849152/hero/twiet0570_thumbnail.jpg"/>
			<guid isPermaLink="false">https://pdst.fm/e/pscrb.fm/rss/p/cdn.twit.tv/audio/twiet/twiet0570/twiet0570.mp3</guid>
			<itunes:duration>1:11:11</itunes:duration>
			<enclosure url="https://pdst.fm/e/pscrb.fm/rss/p/cdn.twit.tv/libsyn/twiet_570/4cf66d02-0d71-4df2-9f02-35d3f0f8d090/R1_twiet0570.mp3" length="34340931" type="audio/mpeg"/>
			<media:content url="https://pdst.fm/e/pscrb.fm/rss/p/cdn.twit.tv/libsyn/twiet_570/4cf66d02-0d71-4df2-9f02-35d3f0f8d090/R1_twiet0570.mp3" fileSize="34340931" type="audio/mpeg" medium="audio">
				<media:title type="plain">TWiET 570: Well-Placed Friction - EU&#039;s NIS2 Directive, better UX for DevOps w/ LaunchDarkly</media:title>
				<media:description type="plain">EU&#039;s NIS2 Directive, better UX for DevOps w/ LaunchDarkly</media:description>
				<media:keywords>Enterprise, cybersecurity, NIS2 Directive, EU, legislation, devops, user experience, UX, design, Software Accessibility, Kill Switches, incident response, Supply Chain Security, encryption, Vulnerability Disclosure, open source tools, Ransomware Tactics, </media:keywords>
				<media:thumbnail url="https://elroy.twit.tv/sites/default/files/styles/twit_slideshow_400x300/public/images/episodes/2023/11/849152/hero/twiet0570_thumbnail.jpg" width="400" height="225" />
				<media:rating scheme="urn:simple">nonadult</media:rating>
				<media:rating scheme="urn:v-chip">tv-g</media:rating>
				<media:category scheme="urn:iab:categories" label="Technology &amp; Computing">IAB19</media:category>
				<media:credit role="host">Louis Maresca</media:credit>
				<media:credit role="host">Brian Chee</media:credit>
				<media:credit role="host">Curtis Franklin</media:credit>
				<media:credit role="guest">Jenna Bilotta</media:credit>
			</media:content>
				<podcast:person role="host" href="https://twit.tv/people/louis-maresca" img="https://elroy.twit.tv/sites/default/files/styles/twit_album_art_600x600/public/people/50091/pictures/lmaresca.jpg">Louis Maresca</podcast:person>
				<podcast:person role="host" href="https://twit.tv/people/brian-chee" img="https://elroy.twit.tv/sites/default/files/styles/twit_album_art_600x600/public/people/58/pictures/brian-chee.png">Brian Chee</podcast:person>
				<podcast:person role="host" href="https://twit.tv/people/curtis-franklin" img="https://elroy.twit.tv/sites/default/files/styles/twit_album_art_600x600/public/people/57/pictures/franklin-curt.jpg">Curtis Franklin</podcast:person>
				<podcast:person role="guest" href="https://launchdarkly.com/">Jenna Bilotta</podcast:person>
		</item>
		<item>
			<title>TWiET 569: Are Your Patches trackd? - Bridging the cybersecurity skills gap, vulnerability and patch management with TrackD</title>
			<itunes:title>Are Your Patches trackd? - Bridging the cybersecurity skills gap, vulnerability and patch management with TrackD</itunes:title>
			<itunes:episodeType>full</itunes:episodeType>
			<itunes:author>TWiT</itunes:author>
			<pubDate>Fri, 10 Nov 2023 18:24:34 PST</pubDate>
			<itunes:episode>569</itunes:episode>
			<podcast:episode>569</podcast:episode>
			<link>https://twit.tv/shows/this-week-in-enterprise-tech/episodes/569</link>
			<comments>https://twit.tv/shows/this-week-in-enterprise-tech/episodes/569</comments>
			<category>News</category>
			<category>Technology</category>
			<itunes:explicit>no</itunes:explicit>
			<itunes:subtitle>Bridging the cybersecurity skills gap, vulnerability and patch management with TrackD</itunes:subtitle>
			<podcast:transcript url="http://twit.tv/posts/transcripts/week-enterprise-tech-episode-569-transcript" type="text/html" />
			<itunes:keywords>Enterprise, cybersecurity, Network Vulnerabilities, Service Location Protocol, Operational Efficiency, Cybersecurity Threats, Malicious Payload, developer tools, Skills Shortage, Managed Security Service Providers, generative ai, Experienced Trainers</itunes:keywords>
			<description><![CDATA[
<ul> 
<li>CISA Alerts: High-Severity SLP Vulnerability currently being exploited.</li> 
<li>ChatGPT outages attributed to DDoS activity.</li> 
<li>Gen Z and Millennial employees are a bigger cybersecurity risk than older employees.</li> 
<li>Security firm finds highly invasive malware hidden in software developer tools.</li> 
<li>Strategies for bridging the cybersecurity skills gap.</li> 
<li>Mike Star, CEO and founder of trackd talks about managing patches and how the community can help preventing disruption from bad updates.</li></ul> 
<p><strong>Hosts:</strong> <a href="https://twit.tv/people/louis-maresca">Louis Maresca</a>, <a href="https://twit.tv/people/brian-chee">Brian Chee</a>, and <a href="https://twit.tv/people/curtis-franklin">Curtis Franklin</a></p> 
<p><strong>Guest:</strong> <a href="https://trackd.com/" target="_blank">Mike Star</a></p> 
<p>Download or subscribe to this show at <a href="https://twit.tv/shows/this-week-in-enterprise-tech">https://twit.tv/shows/this-week-in-enterprise-tech</a>.</p> 
<p>Get episodes ad-free with Club TWiT at <a href="https://twit.tv/clubtwit" rel="payment">https://twit.tv/clubtwit</a></p>
<p><strong>Sponsors:</strong><ul>
<li><a href="http://GO.ACILEARNING.COM/TWIT" target="_blank" rel="sponsored">GO.ACILEARNING.COM/TWIT</a></li>
<li><a href="https://www.paloaltonetworks.com/ot-security-tco" target="_blank" rel="sponsored">paloaltonetworks.com/ot-security-tco</a></li>
<li><a href="http://canary.tools/twit" target="_blank" rel="sponsored">canary.tools/twit - use code: TWIT</a></li>
</ul></p>
]]></description>
			<itunes:summary><![CDATA[
<ul> 
<li>CISA Alerts: High-Severity SLP Vulnerability currently being exploited.</li> 
<li>ChatGPT outages attributed to DDoS activity.</li> 
<li>Gen Z and Millennial employees are a bigger cybersecurity risk than older employees.</li> 
<li>Security firm finds highly invasive malware hidden in software developer tools.</li> 
<li>Strategies for bridging the cybersecurity skills gap.</li> 
<li>Mike Star, CEO and founder of trackd talks about managing patches and how the community can help preventing disruption from bad updates.</li></ul> 
<p><strong>Hosts:</strong> <a href="https://twit.tv/people/louis-maresca">Louis Maresca</a>, <a href="https://twit.tv/people/brian-chee">Brian Chee</a>, and <a href="https://twit.tv/people/curtis-franklin">Curtis Franklin</a></p> 
<p><strong>Guest:</strong> <a href="https://trackd.com/" target="_blank">Mike Star</a></p> 
<p>Download or subscribe to this show at <a href="https://twit.tv/shows/this-week-in-enterprise-tech">https://twit.tv/shows/this-week-in-enterprise-tech</a>.</p> 
<p>Get episodes ad-free with Club TWiT at <a href="https://twit.tv/clubtwit" rel="payment">https://twit.tv/clubtwit</a></p>
<p><strong>Sponsors:</strong><ul>
<li><a href="http://GO.ACILEARNING.COM/TWIT" target="_blank" rel="sponsored">GO.ACILEARNING.COM/TWIT</a></li>
<li><a href="https://www.paloaltonetworks.com/ot-security-tco" target="_blank" rel="sponsored">paloaltonetworks.com/ot-security-tco</a></li>
<li><a href="http://canary.tools/twit" target="_blank" rel="sponsored">canary.tools/twit - use code: TWIT</a></li>
</ul></p>
]]></itunes:summary>
			<content:encoded><![CDATA[
<ul> 
<li>CISA Alerts: High-Severity SLP Vulnerability currently being exploited.</li> 
<li>ChatGPT outages attributed to DDoS activity.</li> 
<li>Gen Z and Millennial employees are a bigger cybersecurity risk than older employees.</li> 
<li>Security firm finds highly invasive malware hidden in software developer tools.</li> 
<li>Strategies for bridging the cybersecurity skills gap.</li> 
<li>Mike Star, CEO and founder of trackd talks about managing patches and how the community can help preventing disruption from bad updates.</li></ul> 
<p><strong>Hosts:</strong> <a href="https://twit.tv/people/louis-maresca">Louis Maresca</a>, <a href="https://twit.tv/people/brian-chee">Brian Chee</a>, and <a href="https://twit.tv/people/curtis-franklin">Curtis Franklin</a></p> 
<p><strong>Guest:</strong> <a href="https://trackd.com/" target="_blank">Mike Star</a></p> 
<p>Download or subscribe to this show at <a href="https://twit.tv/shows/this-week-in-enterprise-tech">https://twit.tv/shows/this-week-in-enterprise-tech</a>.</p> 
<p>Get episodes ad-free with Club TWiT at <a href="https://twit.tv/clubtwit" rel="payment">https://twit.tv/clubtwit</a></p>
<p><strong>Sponsors:</strong><ul>
<li><a href="http://GO.ACILEARNING.COM/TWIT" target="_blank" rel="sponsored">GO.ACILEARNING.COM/TWIT</a></li>
<li><a href="https://www.paloaltonetworks.com/ot-security-tco" target="_blank" rel="sponsored">paloaltonetworks.com/ot-security-tco</a></li>
<li><a href="http://canary.tools/twit" target="_blank" rel="sponsored">canary.tools/twit - use code: TWIT</a></li>
</ul></p>
]]></content:encoded>
			<itunes:image href="https://elroy.twit.tv/sites/default/files/styles/twit_thumb_720x405/public/images/episodes/2023/11/849012/hero/twiet0569_thumbnail.jpg"/>
			<guid isPermaLink="false">https://pdst.fm/e/pscrb.fm/rss/p/cdn.twit.tv/audio/twiet/twiet0569/twiet0569.mp3</guid>
			<itunes:duration>1:13:00</itunes:duration>
			<enclosure url="https://pdst.fm/e/pscrb.fm/rss/p/cdn.twit.tv/libsyn/twiet_569/4cf66d02-0d71-4df2-9f02-35d3f0f8d090/R1_twiet0569.mp3" length="35197182" type="audio/mpeg"/>
			<media:content url="https://pdst.fm/e/pscrb.fm/rss/p/cdn.twit.tv/libsyn/twiet_569/4cf66d02-0d71-4df2-9f02-35d3f0f8d090/R1_twiet0569.mp3" fileSize="35197182" type="audio/mpeg" medium="audio">
				<media:title type="plain">TWiET 569: Are Your Patches trackd? - Bridging the cybersecurity skills gap, vulnerability and patch management with TrackD</media:title>
				<media:description type="plain">Bridging the cybersecurity skills gap, vulnerability and patch management with TrackD</media:description>
				<media:keywords>Enterprise, cybersecurity, Network Vulnerabilities, Service Location Protocol, Operational Efficiency, Cybersecurity Threats, Malicious Payload, developer tools, Skills Shortage, Managed Security Service Providers, generative ai, Experienced Trainers</media:keywords>
				<media:thumbnail url="https://elroy.twit.tv/sites/default/files/styles/twit_slideshow_400x300/public/images/episodes/2023/11/849012/hero/twiet0569_thumbnail.jpg" width="400" height="225" />
				<media:rating scheme="urn:simple">nonadult</media:rating>
				<media:rating scheme="urn:v-chip">tv-g</media:rating>
				<media:category scheme="urn:iab:categories" label="Technology &amp; Computing">IAB19</media:category>
				<media:credit role="host">Louis Maresca</media:credit>
				<media:credit role="host">Brian Chee</media:credit>
				<media:credit role="host">Curtis Franklin</media:credit>
				<media:credit role="guest">Mike Star</media:credit>
			</media:content>
				<podcast:person role="host" href="https://twit.tv/people/louis-maresca" img="https://elroy.twit.tv/sites/default/files/styles/twit_album_art_600x600/public/people/50091/pictures/lmaresca.jpg">Louis Maresca</podcast:person>
				<podcast:person role="host" href="https://twit.tv/people/brian-chee" img="https://elroy.twit.tv/sites/default/files/styles/twit_album_art_600x600/public/people/58/pictures/brian-chee.png">Brian Chee</podcast:person>
				<podcast:person role="host" href="https://twit.tv/people/curtis-franklin" img="https://elroy.twit.tv/sites/default/files/styles/twit_album_art_600x600/public/people/57/pictures/franklin-curt.jpg">Curtis Franklin</podcast:person>
				<podcast:person role="guest" href="https://trackd.com/">Mike Star</podcast:person>
		</item>
		<item>
			<title>TWiET 568: Find the Gap Before You $pend - President Biden&#039;s AI Executive Order, Software TCO with Olive</title>
			<itunes:title>Find the Gap Before You $pend - President Biden&#039;s AI Executive Order, Software TCO with Olive</itunes:title>
			<itunes:episodeType>full</itunes:episodeType>
			<itunes:author>TWiT</itunes:author>
			<pubDate>Fri, 03 Nov 2023 17:37:45 PDT</pubDate>
			<itunes:episode>568</itunes:episode>
			<podcast:episode>568</podcast:episode>
			<link>https://twit.tv/shows/this-week-in-enterprise-tech/episodes/568</link>
			<comments>https://twit.tv/shows/this-week-in-enterprise-tech/episodes/568</comments>
			<category>News</category>
			<category>Technology</category>
			<itunes:explicit>no</itunes:explicit>
			<itunes:subtitle>President Biden&#039;s AI Executive Order, Software TCO with Olive</itunes:subtitle>
			<podcast:transcript url="http://twit.tv/posts/transcripts/week-enterprise-tech-568" type="text/html" />
			<itunes:keywords>Enterprise, ai, Artificial Intelligence, data breach, okta, Third-Party Risk, Biden administration, affordable connectivity program, fcc, Rip and Replace, executive order, Technology Sales, Total Cost of Ownership, TCO, Security, Developer Survey, ROI</itunes:keywords>
			<description><![CDATA[
<ul> 
<li>Okta customer data exposed in support breach impacting 134 companies.</li> 
<li>Biden requests $3.1B more for FCC's "rip-and-replace" program to remove insecure equipment from federal networks, targeting Huawei and ZTE equipment.</li> 
<li>Kaspersky finds Android spyware targeting WhatsApp users, reusing malware from Telegram cyber attacks.</li> 
<li>U.S. Immigration and Customs Enforcement agency is using AI to scan social media for derogatory content before approving visas. Brian warns about oversharing online.</li> 
<li>President Biden signs executive order governing federal agency use of AI, requiring non-discrimination, privacy, security, and responsible testing. The hosts debate if AI needs unique regulation.</li> 
<li>Chris Heard, CEO of Olive Technologies talks about how businesses can properly evaluate the total cost of ownership when looking for the right software solutions.</li></ul> 
<p><strong>Hosts:</strong> <a href="https://twit.tv/people/louis-maresca">Louis Maresca</a>, <a href="https://twit.tv/people/brian-chee">Brian Chee</a>, and <a href="https://twit.tv/people/curtis-franklin">Curtis Franklin</a></p> 
<p><strong>Guest:</strong> <a href="https://olive.app/" target="_blank">Chris Heard</a></p> 
<p>Download or subscribe to this show at <a href="https://twit.tv/shows/this-week-in-enterprise-tech">https://twit.tv/shows/this-week-in-enterprise-tech</a>.</p> 
<p>Get episodes ad-free with Club TWiT at <a href="https://twit.tv/clubtwit" rel="payment">https://twit.tv/clubtwit</a></p>
<p><strong>Sponsors:</strong><ul>
<li><a href="https://nureva.co/45id9Kj" target="_blank" rel="sponsored">nureva.com/twit</a></li>
<li><a href="http://bitwarden.com/twit" target="_blank" rel="sponsored">bitwarden.com/twit</a></li>
<li><a href="https://www.paloaltonetworks.com/ot-security-tco" target="_blank" rel="sponsored">paloaltonetworks.com/ot-security-tco</a></li>
</ul></p>
]]></description>
			<itunes:summary><![CDATA[
<ul> 
<li>Okta customer data exposed in support breach impacting 134 companies.</li> 
<li>Biden requests $3.1B more for FCC's "rip-and-replace" program to remove insecure equipment from federal networks, targeting Huawei and ZTE equipment.</li> 
<li>Kaspersky finds Android spyware targeting WhatsApp users, reusing malware from Telegram cyber attacks.</li> 
<li>U.S. Immigration and Customs Enforcement agency is using AI to scan social media for derogatory content before approving visas. Brian warns about oversharing online.</li> 
<li>President Biden signs executive order governing federal agency use of AI, requiring non-discrimination, privacy, security, and responsible testing. The hosts debate if AI needs unique regulation.</li> 
<li>Chris Heard, CEO of Olive Technologies talks about how businesses can properly evaluate the total cost of ownership when looking for the right software solutions.</li></ul> 
<p><strong>Hosts:</strong> <a href="https://twit.tv/people/louis-maresca">Louis Maresca</a>, <a href="https://twit.tv/people/brian-chee">Brian Chee</a>, and <a href="https://twit.tv/people/curtis-franklin">Curtis Franklin</a></p> 
<p><strong>Guest:</strong> <a href="https://olive.app/" target="_blank">Chris Heard</a></p> 
<p>Download or subscribe to this show at <a href="https://twit.tv/shows/this-week-in-enterprise-tech">https://twit.tv/shows/this-week-in-enterprise-tech</a>.</p> 
<p>Get episodes ad-free with Club TWiT at <a href="https://twit.tv/clubtwit" rel="payment">https://twit.tv/clubtwit</a></p>
<p><strong>Sponsors:</strong><ul>
<li><a href="https://nureva.co/45id9Kj" target="_blank" rel="sponsored">nureva.com/twit</a></li>
<li><a href="http://bitwarden.com/twit" target="_blank" rel="sponsored">bitwarden.com/twit</a></li>
<li><a href="https://www.paloaltonetworks.com/ot-security-tco" target="_blank" rel="sponsored">paloaltonetworks.com/ot-security-tco</a></li>
</ul></p>
]]></itunes:summary>
			<content:encoded><![CDATA[
<ul> 
<li>Okta customer data exposed in support breach impacting 134 companies.</li> 
<li>Biden requests $3.1B more for FCC's "rip-and-replace" program to remove insecure equipment from federal networks, targeting Huawei and ZTE equipment.</li> 
<li>Kaspersky finds Android spyware targeting WhatsApp users, reusing malware from Telegram cyber attacks.</li> 
<li>U.S. Immigration and Customs Enforcement agency is using AI to scan social media for derogatory content before approving visas. Brian warns about oversharing online.</li> 
<li>President Biden signs executive order governing federal agency use of AI, requiring non-discrimination, privacy, security, and responsible testing. The hosts debate if AI needs unique regulation.</li> 
<li>Chris Heard, CEO of Olive Technologies talks about how businesses can properly evaluate the total cost of ownership when looking for the right software solutions.</li></ul> 
<p><strong>Hosts:</strong> <a href="https://twit.tv/people/louis-maresca">Louis Maresca</a>, <a href="https://twit.tv/people/brian-chee">Brian Chee</a>, and <a href="https://twit.tv/people/curtis-franklin">Curtis Franklin</a></p> 
<p><strong>Guest:</strong> <a href="https://olive.app/" target="_blank">Chris Heard</a></p> 
<p>Download or subscribe to this show at <a href="https://twit.tv/shows/this-week-in-enterprise-tech">https://twit.tv/shows/this-week-in-enterprise-tech</a>.</p> 
<p>Get episodes ad-free with Club TWiT at <a href="https://twit.tv/clubtwit" rel="payment">https://twit.tv/clubtwit</a></p>
<p><strong>Sponsors:</strong><ul>
<li><a href="https://nureva.co/45id9Kj" target="_blank" rel="sponsored">nureva.com/twit</a></li>
<li><a href="http://bitwarden.com/twit" target="_blank" rel="sponsored">bitwarden.com/twit</a></li>
<li><a href="https://www.paloaltonetworks.com/ot-security-tco" target="_blank" rel="sponsored">paloaltonetworks.com/ot-security-tco</a></li>
</ul></p>
]]></content:encoded>
			<itunes:image href="https://elroy.twit.tv/sites/default/files/styles/twit_thumb_720x405/public/images/episodes/2023/11/848831/hero/twiet0568_thumbnail.jpg"/>
			<guid isPermaLink="false">https://pdst.fm/e/pscrb.fm/rss/p/cdn.twit.tv/audio/twiet/twiet0568/twiet0568.mp3</guid>
			<itunes:duration>1:05:07</itunes:duration>
			<enclosure url="https://pdst.fm/e/pscrb.fm/rss/p/cdn.twit.tv/libsyn/twiet_568/4cf66d02-0d71-4df2-9f02-35d3f0f8d090/R1_twiet0568.mp3" length="31524482" type="audio/mpeg"/>
			<media:content url="https://pdst.fm/e/pscrb.fm/rss/p/cdn.twit.tv/libsyn/twiet_568/4cf66d02-0d71-4df2-9f02-35d3f0f8d090/R1_twiet0568.mp3" fileSize="31524482" type="audio/mpeg" medium="audio">
				<media:title type="plain">TWiET 568: Find the Gap Before You $pend - President Biden&#039;s AI Executive Order, Software TCO with Olive</media:title>
				<media:description type="plain">President Biden&#039;s AI Executive Order, Software TCO with Olive</media:description>
				<media:keywords>Enterprise, ai, Artificial Intelligence, data breach, okta, Third-Party Risk, Biden administration, affordable connectivity program, fcc, Rip and Replace, executive order, Technology Sales, Total Cost of Ownership, TCO, Security, Developer Survey, ROI</media:keywords>
				<media:thumbnail url="https://elroy.twit.tv/sites/default/files/styles/twit_slideshow_400x300/public/images/episodes/2023/11/848831/hero/twiet0568_thumbnail.jpg" width="400" height="225" />
				<media:rating scheme="urn:simple">nonadult</media:rating>
				<media:rating scheme="urn:v-chip">tv-g</media:rating>
				<media:category scheme="urn:iab:categories" label="Technology &amp; Computing">IAB19</media:category>
				<media:credit role="host">Louis Maresca</media:credit>
				<media:credit role="host">Brian Chee</media:credit>
				<media:credit role="host">Curtis Franklin</media:credit>
				<media:credit role="guest">Chris Heard</media:credit>
			</media:content>
				<podcast:person role="host" href="https://twit.tv/people/louis-maresca" img="https://elroy.twit.tv/sites/default/files/styles/twit_album_art_600x600/public/people/50091/pictures/lmaresca.jpg">Louis Maresca</podcast:person>
				<podcast:person role="host" href="https://twit.tv/people/brian-chee" img="https://elroy.twit.tv/sites/default/files/styles/twit_album_art_600x600/public/people/58/pictures/brian-chee.png">Brian Chee</podcast:person>
				<podcast:person role="host" href="https://twit.tv/people/curtis-franklin" img="https://elroy.twit.tv/sites/default/files/styles/twit_album_art_600x600/public/people/57/pictures/franklin-curt.jpg">Curtis Franklin</podcast:person>
				<podcast:person role="guest" href="https://olive.app/">Chris Heard</podcast:person>
		</item>
		<item>
			<title>TWiET 567: Lost in Translation - Boosting security hygiene, DNS security with Infoblox</title>
			<itunes:title>Lost in Translation - Boosting security hygiene, DNS security with Infoblox</itunes:title>
			<itunes:episodeType>full</itunes:episodeType>
			<itunes:author>TWiT</itunes:author>
			<pubDate>Fri, 27 Oct 2023 18:33:31 PDT</pubDate>
			<itunes:episode>567</itunes:episode>
			<podcast:episode>567</podcast:episode>
			<link>https://twit.tv/shows/this-week-in-enterprise-tech/episodes/567</link>
			<comments>https://twit.tv/shows/this-week-in-enterprise-tech/episodes/567</comments>
			<category>News</category>
			<category>Technology</category>
			<itunes:explicit>no</itunes:explicit>
			<itunes:subtitle>Boosting security hygiene, DNS security with Infoblox</itunes:subtitle>
			<podcast:transcript url="http://twit.tv/posts/transcripts/week-enterprise-tech-568" type="text/html" />
			<itunes:keywords>Enterprise, infoblox, josh kuo, punycode, dns security, dns, ileakage, cybersecurity, 0-day, vulnerability, iOS, macos, safari, 0ktapus, Microsoft, hacker groups, Apple, right-to-repair bill, apple right-to-repair, roundcube webmail, roundcube 0-day</itunes:keywords>
			<description><![CDATA[
<ul> 
<li>iLeakage gives hackers access passwords and sensitive data on iOS and macOS browsers.</li> 
<li>0ktapus is "one of the world's most dangerous financial criminal groups" says Microsoft.</li> 
<li>Apple backs national right-to-repair bill.</li> 
<li>Pro-Russia hackers exploiting 0-day in Roundcube webmail software.</li> 
<li>9 innovative ways to boost security hygiene for Cyber Awareness Month</li> 
<li>Josh Kuo, Senior Educator and SME in Cyber Security of Infoblox talks about why we need Punycode and how DNS can be a security solution for malicious Punycode.</li></ul> 
<p><strong>Hosts:</strong> <a href="https://twit.tv/people/louis-maresca">Louis Maresca</a>, <a href="https://twit.tv/people/brian-chee">Brian Chee</a>, and <a href="https://twit.tv/people/curtis-franklin">Curtis Franklin</a></p> 
<p><strong>Guest:</strong> <a href="https://www.infoblox.com/wp-content/uploads/infoblox-ebook-dns-security-for-dummies.pdf" target="_blank">Josh Kuo</a></p> 
<p>Download or subscribe to this show at <a href="https://twit.tv/shows/this-week-in-enterprise-tech">https://twit.tv/shows/this-week-in-enterprise-tech</a>.</p> 
<p>Get episodes ad-free with Club TWiT at <a href="https://twit.tv/clubtwit" rel="payment">https://twit.tv/clubtwit</a></p>
<p><strong>Sponsors:</strong><ul>
<li><a href="http://lookout.com" target="_blank" rel="sponsored">lookout.com</a></li>
<li><a href="http://kolide.com/twiet" target="_blank" rel="sponsored">kolide.com/twiet</a></li>
<li><a href="http://Miro.com/podcast" target="_blank" rel="sponsored">Miro.com/podcast</a></li>
</ul></p>
]]></description>
			<itunes:summary><![CDATA[
<ul> 
<li>iLeakage gives hackers access passwords and sensitive data on iOS and macOS browsers.</li> 
<li>0ktapus is "one of the world's most dangerous financial criminal groups" says Microsoft.</li> 
<li>Apple backs national right-to-repair bill.</li> 
<li>Pro-Russia hackers exploiting 0-day in Roundcube webmail software.</li> 
<li>9 innovative ways to boost security hygiene for Cyber Awareness Month</li> 
<li>Josh Kuo, Senior Educator and SME in Cyber Security of Infoblox talks about why we need Punycode and how DNS can be a security solution for malicious Punycode.</li></ul> 
<p><strong>Hosts:</strong> <a href="https://twit.tv/people/louis-maresca">Louis Maresca</a>, <a href="https://twit.tv/people/brian-chee">Brian Chee</a>, and <a href="https://twit.tv/people/curtis-franklin">Curtis Franklin</a></p> 
<p><strong>Guest:</strong> <a href="https://www.infoblox.com/wp-content/uploads/infoblox-ebook-dns-security-for-dummies.pdf" target="_blank">Josh Kuo</a></p> 
<p>Download or subscribe to this show at <a href="https://twit.tv/shows/this-week-in-enterprise-tech">https://twit.tv/shows/this-week-in-enterprise-tech</a>.</p> 
<p>Get episodes ad-free with Club TWiT at <a href="https://twit.tv/clubtwit" rel="payment">https://twit.tv/clubtwit</a></p>
<p><strong>Sponsors:</strong><ul>
<li><a href="http://lookout.com" target="_blank" rel="sponsored">lookout.com</a></li>
<li><a href="http://kolide.com/twiet" target="_blank" rel="sponsored">kolide.com/twiet</a></li>
<li><a href="http://Miro.com/podcast" target="_blank" rel="sponsored">Miro.com/podcast</a></li>
</ul></p>
]]></itunes:summary>
			<content:encoded><![CDATA[
<ul> 
<li>iLeakage gives hackers access passwords and sensitive data on iOS and macOS browsers.</li> 
<li>0ktapus is "one of the world's most dangerous financial criminal groups" says Microsoft.</li> 
<li>Apple backs national right-to-repair bill.</li> 
<li>Pro-Russia hackers exploiting 0-day in Roundcube webmail software.</li> 
<li>9 innovative ways to boost security hygiene for Cyber Awareness Month</li> 
<li>Josh Kuo, Senior Educator and SME in Cyber Security of Infoblox talks about why we need Punycode and how DNS can be a security solution for malicious Punycode.</li></ul> 
<p><strong>Hosts:</strong> <a href="https://twit.tv/people/louis-maresca">Louis Maresca</a>, <a href="https://twit.tv/people/brian-chee">Brian Chee</a>, and <a href="https://twit.tv/people/curtis-franklin">Curtis Franklin</a></p> 
<p><strong>Guest:</strong> <a href="https://www.infoblox.com/wp-content/uploads/infoblox-ebook-dns-security-for-dummies.pdf" target="_blank">Josh Kuo</a></p> 
<p>Download or subscribe to this show at <a href="https://twit.tv/shows/this-week-in-enterprise-tech">https://twit.tv/shows/this-week-in-enterprise-tech</a>.</p> 
<p>Get episodes ad-free with Club TWiT at <a href="https://twit.tv/clubtwit" rel="payment">https://twit.tv/clubtwit</a></p>
<p><strong>Sponsors:</strong><ul>
<li><a href="http://lookout.com" target="_blank" rel="sponsored">lookout.com</a></li>
<li><a href="http://kolide.com/twiet" target="_blank" rel="sponsored">kolide.com/twiet</a></li>
<li><a href="http://Miro.com/podcast" target="_blank" rel="sponsored">Miro.com/podcast</a></li>
</ul></p>
]]></content:encoded>
			<itunes:image href="https://elroy.twit.tv/sites/default/files/styles/twit_thumb_720x405/public/images/episodes/2023/10/848446/hero/twiet0567_thumbnail.jpg"/>
			<guid isPermaLink="false">https://pdst.fm/e/pscrb.fm/rss/p/cdn.twit.tv/audio/twiet/twiet0567/twiet0567.mp3</guid>
			<itunes:duration>1:16:01</itunes:duration>
			<enclosure url="https://pdst.fm/e/pscrb.fm/rss/p/cdn.twit.tv/libsyn/twiet_567/4cf66d02-0d71-4df2-9f02-35d3f0f8d090/R1_twiet0567.mp3" length="36627532" type="audio/mpeg"/>
			<media:content url="https://pdst.fm/e/pscrb.fm/rss/p/cdn.twit.tv/libsyn/twiet_567/4cf66d02-0d71-4df2-9f02-35d3f0f8d090/R1_twiet0567.mp3" fileSize="36627532" type="audio/mpeg" medium="audio">
				<media:title type="plain">TWiET 567: Lost in Translation - Boosting security hygiene, DNS security with Infoblox</media:title>
				<media:description type="plain">Boosting security hygiene, DNS security with Infoblox</media:description>
				<media:keywords>Enterprise, infoblox, josh kuo, punycode, dns security, dns, ileakage, cybersecurity, 0-day, vulnerability, iOS, macos, safari, 0ktapus, Microsoft, hacker groups, Apple, right-to-repair bill, apple right-to-repair, roundcube webmail, roundcube 0-day</media:keywords>
				<media:thumbnail url="https://elroy.twit.tv/sites/default/files/styles/twit_slideshow_400x300/public/images/episodes/2023/10/848446/hero/twiet0567_thumbnail.jpg" width="400" height="225" />
				<media:rating scheme="urn:simple">nonadult</media:rating>
				<media:rating scheme="urn:v-chip">tv-g</media:rating>
				<media:category scheme="urn:iab:categories" label="Technology &amp; Computing">IAB19</media:category>
				<media:credit role="host">Louis Maresca</media:credit>
				<media:credit role="host">Brian Chee</media:credit>
				<media:credit role="host">Curtis Franklin</media:credit>
				<media:credit role="guest">Josh Kuo</media:credit>
			</media:content>
				<podcast:person role="host" href="https://twit.tv/people/louis-maresca" img="https://elroy.twit.tv/sites/default/files/styles/twit_album_art_600x600/public/people/50091/pictures/lmaresca.jpg">Louis Maresca</podcast:person>
				<podcast:person role="host" href="https://twit.tv/people/brian-chee" img="https://elroy.twit.tv/sites/default/files/styles/twit_album_art_600x600/public/people/58/pictures/brian-chee.png">Brian Chee</podcast:person>
				<podcast:person role="host" href="https://twit.tv/people/curtis-franklin" img="https://elroy.twit.tv/sites/default/files/styles/twit_album_art_600x600/public/people/57/pictures/franklin-curt.jpg">Curtis Franklin</podcast:person>
				<podcast:person role="guest" href="https://www.infoblox.com/wp-content/uploads/infoblox-ebook-dns-security-for-dummies.pdf">Josh Kuo</podcast:person>
		</item>
		<item>
			<title>TWiET 566: DevOps Culture Vulture - Reimagining DevOps with System Initiative</title>
			<itunes:title>DevOps Culture Vulture - Reimagining DevOps with System Initiative</itunes:title>
			<itunes:episodeType>full</itunes:episodeType>
			<itunes:author>TWiT</itunes:author>
			<pubDate>Fri, 20 Oct 2023 18:40:52 PDT</pubDate>
			<itunes:episode>566</itunes:episode>
			<podcast:episode>566</podcast:episode>
			<link>https://twit.tv/shows/this-week-in-enterprise-tech/episodes/566</link>
			<comments>https://twit.tv/shows/this-week-in-enterprise-tech/episodes/566</comments>
			<category>News</category>
			<category>Technology</category>
			<itunes:explicit>no</itunes:explicit>
			<itunes:subtitle>Reimagining DevOps with System Initiative</itunes:subtitle>
			<podcast:transcript url="http://twit.tv/posts/transcripts/week-enterprise-tech-episode-566-transcript" type="text/html" />
			<itunes:keywords>Enterprise, Adam Jacob, chef, System Initiative, devops, WinRAR, cybersecurity, Lou Maresca, Curt Franklin, Brian Chee, vulnerability, zero day, passwords, it admin, cisco, unpatched network devices, google hosted malvertising, keepass, punycode</itunes:keywords>
			<description><![CDATA[
<p>This info-packed episode of TWiET dives into the hidden dangers of Google hosted ads with malware. Guest Adam Jacob shares his vision for a "second wave" of DevOps to achieve better collaboration and outcomes.</p><ul> 
<li>Patch Winrar right now</li> 
<li>The most used IT Admin passwords</li> 
<li>Cisco reports 10,000 network devices backdoored with unpatched 0-day</li> 
<li>The global chip talent shortage and partnerships addressing it</li> 
<li>The risks of malicious Google ads using punycode to disguise fake URLs</li> 
<li>Adam Jacob, CEO of System Initiative and Co-founder of Chef talks about his vision for improving and rebuilding DevOps from the ground up.</li></ul> 
<p><strong>Hosts:</strong> <a href="https://twit.tv/people/louis-maresca">Louis Maresca</a>, <a href="https://twit.tv/people/brian-chee">Brian Chee</a>, and <a href="https://twit.tv/people/curtis-franklin">Curtis Franklin</a></p> 
<p><strong>Guest:</strong> <a href="https://www.systeminit.com/" target="_blank">Adam Jacob</a></p> 
<p>Download or subscribe to this show at <a href="https://twit.tv/shows/this-week-in-enterprise-tech">https://twit.tv/shows/this-week-in-enterprise-tech</a>.</p> 
<p>Get episodes ad-free with Club TWiT at <a href="https://twit.tv/clubtwit" rel="payment">https://twit.tv/clubtwit</a></p>
<p><strong>Sponsors:</strong><ul>
<li><a href="http://vanta.com/ENTERPRISE" target="_blank" rel="sponsored">vanta.com/ENTERPRISE</a></li>
<li><a href="https://www.paloaltonetworks.com/ot-security-tco" target="_blank" rel="sponsored">paloaltonetworks.com/ot-security-tco</a></li>
<li><a href="http://GO.ACILEARNING.COM/TWIT" target="_blank" rel="sponsored">GO.ACILEARNING.COM/TWIT</a></li>
</ul></p>
]]></description>
			<itunes:summary><![CDATA[
<p>This info-packed episode of TWiET dives into the hidden dangers of Google hosted ads with malware. Guest Adam Jacob shares his vision for a "second wave" of DevOps to achieve better collaboration and outcomes.</p><ul> 
<li>Patch Winrar right now</li> 
<li>The most used IT Admin passwords</li> 
<li>Cisco reports 10,000 network devices backdoored with unpatched 0-day</li> 
<li>The global chip talent shortage and partnerships addressing it</li> 
<li>The risks of malicious Google ads using punycode to disguise fake URLs</li> 
<li>Adam Jacob, CEO of System Initiative and Co-founder of Chef talks about his vision for improving and rebuilding DevOps from the ground up.</li></ul> 
<p><strong>Hosts:</strong> <a href="https://twit.tv/people/louis-maresca">Louis Maresca</a>, <a href="https://twit.tv/people/brian-chee">Brian Chee</a>, and <a href="https://twit.tv/people/curtis-franklin">Curtis Franklin</a></p> 
<p><strong>Guest:</strong> <a href="https://www.systeminit.com/" target="_blank">Adam Jacob</a></p> 
<p>Download or subscribe to this show at <a href="https://twit.tv/shows/this-week-in-enterprise-tech">https://twit.tv/shows/this-week-in-enterprise-tech</a>.</p> 
<p>Get episodes ad-free with Club TWiT at <a href="https://twit.tv/clubtwit" rel="payment">https://twit.tv/clubtwit</a></p>
<p><strong>Sponsors:</strong><ul>
<li><a href="http://vanta.com/ENTERPRISE" target="_blank" rel="sponsored">vanta.com/ENTERPRISE</a></li>
<li><a href="https://www.paloaltonetworks.com/ot-security-tco" target="_blank" rel="sponsored">paloaltonetworks.com/ot-security-tco</a></li>
<li><a href="http://GO.ACILEARNING.COM/TWIT" target="_blank" rel="sponsored">GO.ACILEARNING.COM/TWIT</a></li>
</ul></p>
]]></itunes:summary>
			<content:encoded><![CDATA[
<p>This info-packed episode of TWiET dives into the hidden dangers of Google hosted ads with malware. Guest Adam Jacob shares his vision for a "second wave" of DevOps to achieve better collaboration and outcomes.</p><ul> 
<li>Patch Winrar right now</li> 
<li>The most used IT Admin passwords</li> 
<li>Cisco reports 10,000 network devices backdoored with unpatched 0-day</li> 
<li>The global chip talent shortage and partnerships addressing it</li> 
<li>The risks of malicious Google ads using punycode to disguise fake URLs</li> 
<li>Adam Jacob, CEO of System Initiative and Co-founder of Chef talks about his vision for improving and rebuilding DevOps from the ground up.</li></ul> 
<p><strong>Hosts:</strong> <a href="https://twit.tv/people/louis-maresca">Louis Maresca</a>, <a href="https://twit.tv/people/brian-chee">Brian Chee</a>, and <a href="https://twit.tv/people/curtis-franklin">Curtis Franklin</a></p> 
<p><strong>Guest:</strong> <a href="https://www.systeminit.com/" target="_blank">Adam Jacob</a></p> 
<p>Download or subscribe to this show at <a href="https://twit.tv/shows/this-week-in-enterprise-tech">https://twit.tv/shows/this-week-in-enterprise-tech</a>.</p> 
<p>Get episodes ad-free with Club TWiT at <a href="https://twit.tv/clubtwit" rel="payment">https://twit.tv/clubtwit</a></p>
<p><strong>Sponsors:</strong><ul>
<li><a href="http://vanta.com/ENTERPRISE" target="_blank" rel="sponsored">vanta.com/ENTERPRISE</a></li>
<li><a href="https://www.paloaltonetworks.com/ot-security-tco" target="_blank" rel="sponsored">paloaltonetworks.com/ot-security-tco</a></li>
<li><a href="http://GO.ACILEARNING.COM/TWIT" target="_blank" rel="sponsored">GO.ACILEARNING.COM/TWIT</a></li>
</ul></p>
]]></content:encoded>
			<itunes:image href="https://elroy.twit.tv/sites/default/files/styles/twit_thumb_720x405/public/images/episodes/2023/10/848297/hero/twiet0566_thumbnail.jpg"/>
			<guid isPermaLink="false">https://pdst.fm/e/pscrb.fm/rss/p/cdn.twit.tv/audio/twiet/twiet0566/twiet0566.mp3</guid>
			<itunes:duration>1:17:27</itunes:duration>
			<enclosure url="https://pdst.fm/e/pscrb.fm/rss/p/cdn.twit.tv/libsyn/twiet_566/4cf66d02-0d71-4df2-9f02-35d3f0f8d090/R1_twiet0566.mp3" length="37349726" type="audio/mpeg"/>
			<media:content url="https://pdst.fm/e/pscrb.fm/rss/p/cdn.twit.tv/libsyn/twiet_566/4cf66d02-0d71-4df2-9f02-35d3f0f8d090/R1_twiet0566.mp3" fileSize="37349726" type="audio/mpeg" medium="audio">
				<media:title type="plain">TWiET 566: DevOps Culture Vulture - Reimagining DevOps with System Initiative</media:title>
				<media:description type="plain">Reimagining DevOps with System Initiative</media:description>
				<media:keywords>Enterprise, Adam Jacob, chef, System Initiative, devops, WinRAR, cybersecurity, Lou Maresca, Curt Franklin, Brian Chee, vulnerability, zero day, passwords, it admin, cisco, unpatched network devices, google hosted malvertising, keepass, punycode</media:keywords>
				<media:thumbnail url="https://elroy.twit.tv/sites/default/files/styles/twit_slideshow_400x300/public/images/episodes/2023/10/848297/hero/twiet0566_thumbnail.jpg" width="400" height="225" />
				<media:rating scheme="urn:simple">nonadult</media:rating>
				<media:rating scheme="urn:v-chip">tv-g</media:rating>
				<media:category scheme="urn:iab:categories" label="Technology &amp; Computing">IAB19</media:category>
				<media:credit role="host">Louis Maresca</media:credit>
				<media:credit role="host">Brian Chee</media:credit>
				<media:credit role="host">Curtis Franklin</media:credit>
				<media:credit role="guest">Adam Jacob</media:credit>
			</media:content>
				<podcast:person role="host" href="https://twit.tv/people/louis-maresca" img="https://elroy.twit.tv/sites/default/files/styles/twit_album_art_600x600/public/people/50091/pictures/lmaresca.jpg">Louis Maresca</podcast:person>
				<podcast:person role="host" href="https://twit.tv/people/brian-chee" img="https://elroy.twit.tv/sites/default/files/styles/twit_album_art_600x600/public/people/58/pictures/brian-chee.png">Brian Chee</podcast:person>
				<podcast:person role="host" href="https://twit.tv/people/curtis-franklin" img="https://elroy.twit.tv/sites/default/files/styles/twit_album_art_600x600/public/people/57/pictures/franklin-curt.jpg">Curtis Franklin</podcast:person>
				<podcast:person role="guest" href="https://www.systeminit.com/">Adam Jacob</podcast:person>
		</item>
		<item>
			<title>TWiET 565: Cheebert's MDM Dreams - Adobe&#039;s Content Credentials, programmable MDM with Fleet</title>
			<itunes:title>Cheebert's MDM Dreams - Adobe&#039;s Content Credentials, programmable MDM with Fleet</itunes:title>
			<itunes:episodeType>full</itunes:episodeType>
			<itunes:author>TWiT</itunes:author>
			<pubDate>Fri, 13 Oct 2023 18:02:11 PDT</pubDate>
			<itunes:episode>565</itunes:episode>
			<podcast:episode>565</podcast:episode>
			<link>https://twit.tv/shows/this-week-in-enterprise-tech/episodes/565</link>
			<comments>https://twit.tv/shows/this-week-in-enterprise-tech/episodes/565</comments>
			<category>News</category>
			<category>Technology</category>
			<itunes:explicit>no</itunes:explicit>
			<itunes:subtitle>Adobe&#039;s Content Credentials, programmable MDM with Fleet</itunes:subtitle>
			<podcast:transcript url="http://twit.tv/posts/transcripts/week-enterprise-tech-565-transcript" type="text/html" />
			<itunes:keywords>Enterprise, cybersecurity, device management, Jeff Marraccini, Altair Engineering, air console, Lou Maresca, Curt Franklin, Brian Chee, comcast, DOCSIS 4.0, EU vulnerability disclosure, Edge AI-enabled drones, public safety, adobe</itunes:keywords>
			<description><![CDATA[
<p>On This Week in Enterprise Tech, Lou, Curt, and Brian dive into how remote console devices are empowering IT pros, the future of digital trust and content authenticity, and the evolving landscape of endpoint management security.</p><ul> 
<li>Jeff Marraccini from Altair explains how air console devices allow him to remotely access noisy server racks to diagnose issues, avoiding dangerous sound levels. This saves time and prevents disruptions.</li> 
<li>This week's news blips:<ul> 
<li>Comcast announces DOCSIS 4.0 in select U.S. cities.</li> 
<li>Security pros warn that EU's vulnerability disclosuer rule is risky.</li> 
<li>Edge AI-enabled drones delivering first response for public safety.</li></ul></li> 
<li>On this week's discussion byte, hosts debate whether Adobe's new content credential system can combat misinformation and assure authenticity. They conclude it helps provide traceability but has limitations as a voluntary system.  </li> 
<li>Zach Wasserman from Fleet discusses how organizations can gain visibility into employee devices to strengthen endpoint security, especially with remote work.</li></ul> 
<p><strong>Hosts:</strong> <a href="https://twit.tv/people/louis-maresca">Louis Maresca</a>, <a href="https://twit.tv/people/brian-chee">Brian Chee</a>, and <a href="https://twit.tv/people/curtis-franklin">Curtis Franklin</a></p> 
<p><strong>Guests:</strong> <a href="https://altair.com/" target="_blank">Jeff Marraccini</a> and <a href="https://fleetdm.com/" target="_blank">Zach Wasserman</a></p> 
<p>Download or subscribe to this show at <a href="https://twit.tv/shows/this-week-in-enterprise-tech">https://twit.tv/shows/this-week-in-enterprise-tech</a>.</p> 
<p>Get episodes ad-free with Club TWiT at <a href="https://twit.tv/clubtwit" rel="payment">https://twit.tv/clubtwit</a></p>
<p><strong>Sponsors:</strong><ul>
<li><a href="https://www.paloaltonetworks.com/ot-security-tco" target="_blank" rel="sponsored">paloaltonetworks.com/ot-security-tco</a></li>
<li><a href="http://canary.tools/twit" target="_blank" rel="sponsored">canary.tools/twit - use code: TWIT</a></li>
<li><a href="https://nureva.co/45id9Kj" target="_blank" rel="sponsored">nureva.com/twit</a></li>
</ul></p>
]]></description>
			<itunes:summary><![CDATA[
<p>On This Week in Enterprise Tech, Lou, Curt, and Brian dive into how remote console devices are empowering IT pros, the future of digital trust and content authenticity, and the evolving landscape of endpoint management security.</p><ul> 
<li>Jeff Marraccini from Altair explains how air console devices allow him to remotely access noisy server racks to diagnose issues, avoiding dangerous sound levels. This saves time and prevents disruptions.</li> 
<li>This week's news blips:<ul> 
<li>Comcast announces DOCSIS 4.0 in select U.S. cities.</li> 
<li>Security pros warn that EU's vulnerability disclosuer rule is risky.</li> 
<li>Edge AI-enabled drones delivering first response for public safety.</li></ul></li> 
<li>On this week's discussion byte, hosts debate whether Adobe's new content credential system can combat misinformation and assure authenticity. They conclude it helps provide traceability but has limitations as a voluntary system.  </li> 
<li>Zach Wasserman from Fleet discusses how organizations can gain visibility into employee devices to strengthen endpoint security, especially with remote work.</li></ul> 
<p><strong>Hosts:</strong> <a href="https://twit.tv/people/louis-maresca">Louis Maresca</a>, <a href="https://twit.tv/people/brian-chee">Brian Chee</a>, and <a href="https://twit.tv/people/curtis-franklin">Curtis Franklin</a></p> 
<p><strong>Guests:</strong> <a href="https://altair.com/" target="_blank">Jeff Marraccini</a> and <a href="https://fleetdm.com/" target="_blank">Zach Wasserman</a></p> 
<p>Download or subscribe to this show at <a href="https://twit.tv/shows/this-week-in-enterprise-tech">https://twit.tv/shows/this-week-in-enterprise-tech</a>.</p> 
<p>Get episodes ad-free with Club TWiT at <a href="https://twit.tv/clubtwit" rel="payment">https://twit.tv/clubtwit</a></p>
<p><strong>Sponsors:</strong><ul>
<li><a href="https://www.paloaltonetworks.com/ot-security-tco" target="_blank" rel="sponsored">paloaltonetworks.com/ot-security-tco</a></li>
<li><a href="http://canary.tools/twit" target="_blank" rel="sponsored">canary.tools/twit - use code: TWIT</a></li>
<li><a href="https://nureva.co/45id9Kj" target="_blank" rel="sponsored">nureva.com/twit</a></li>
</ul></p>
]]></itunes:summary>
			<content:encoded><![CDATA[
<p>On This Week in Enterprise Tech, Lou, Curt, and Brian dive into how remote console devices are empowering IT pros, the future of digital trust and content authenticity, and the evolving landscape of endpoint management security.</p><ul> 
<li>Jeff Marraccini from Altair explains how air console devices allow him to remotely access noisy server racks to diagnose issues, avoiding dangerous sound levels. This saves time and prevents disruptions.</li> 
<li>This week's news blips:<ul> 
<li>Comcast announces DOCSIS 4.0 in select U.S. cities.</li> 
<li>Security pros warn that EU's vulnerability disclosuer rule is risky.</li> 
<li>Edge AI-enabled drones delivering first response for public safety.</li></ul></li> 
<li>On this week's discussion byte, hosts debate whether Adobe's new content credential system can combat misinformation and assure authenticity. They conclude it helps provide traceability but has limitations as a voluntary system.  </li> 
<li>Zach Wasserman from Fleet discusses how organizations can gain visibility into employee devices to strengthen endpoint security, especially with remote work.</li></ul> 
<p><strong>Hosts:</strong> <a href="https://twit.tv/people/louis-maresca">Louis Maresca</a>, <a href="https://twit.tv/people/brian-chee">Brian Chee</a>, and <a href="https://twit.tv/people/curtis-franklin">Curtis Franklin</a></p> 
<p><strong>Guests:</strong> <a href="https://altair.com/" target="_blank">Jeff Marraccini</a> and <a href="https://fleetdm.com/" target="_blank">Zach Wasserman</a></p> 
<p>Download or subscribe to this show at <a href="https://twit.tv/shows/this-week-in-enterprise-tech">https://twit.tv/shows/this-week-in-enterprise-tech</a>.</p> 
<p>Get episodes ad-free with Club TWiT at <a href="https://twit.tv/clubtwit" rel="payment">https://twit.tv/clubtwit</a></p>
<p><strong>Sponsors:</strong><ul>
<li><a href="https://www.paloaltonetworks.com/ot-security-tco" target="_blank" rel="sponsored">paloaltonetworks.com/ot-security-tco</a></li>
<li><a href="http://canary.tools/twit" target="_blank" rel="sponsored">canary.tools/twit - use code: TWIT</a></li>
<li><a href="https://nureva.co/45id9Kj" target="_blank" rel="sponsored">nureva.com/twit</a></li>
</ul></p>
]]></content:encoded>
			<itunes:image href="https://elroy.twit.tv/sites/default/files/styles/twit_thumb_720x405/public/images/episodes/2023/10/848164/hero/twiet0565_thumbnail_0.jpg"/>
			<guid isPermaLink="false">https://pdst.fm/e/pscrb.fm/rss/p/cdn.twit.tv/audio/twiet/twiet0565/twiet0565.mp3</guid>
			<itunes:duration>1:12:03</itunes:duration>
			<enclosure url="https://pdst.fm/e/pscrb.fm/rss/p/cdn.twit.tv/libsyn/twiet_565/4cf66d02-0d71-4df2-9f02-35d3f0f8d090/R1_twiet0565.mp3" length="34748814" type="audio/mpeg"/>
			<media:content url="https://pdst.fm/e/pscrb.fm/rss/p/cdn.twit.tv/libsyn/twiet_565/4cf66d02-0d71-4df2-9f02-35d3f0f8d090/R1_twiet0565.mp3" fileSize="34748814" type="audio/mpeg" medium="audio">
				<media:title type="plain">TWiET 565: Cheebert's MDM Dreams - Adobe&#039;s Content Credentials, programmable MDM with Fleet</media:title>
				<media:description type="plain">Adobe&#039;s Content Credentials, programmable MDM with Fleet</media:description>
				<media:keywords>Enterprise, cybersecurity, device management, Jeff Marraccini, Altair Engineering, air console, Lou Maresca, Curt Franklin, Brian Chee, comcast, DOCSIS 4.0, EU vulnerability disclosure, Edge AI-enabled drones, public safety, adobe</media:keywords>
				<media:thumbnail url="https://elroy.twit.tv/sites/default/files/styles/twit_slideshow_400x300/public/images/episodes/2023/10/848164/hero/twiet0565_thumbnail_0.jpg" width="400" height="225" />
				<media:rating scheme="urn:simple">nonadult</media:rating>
				<media:rating scheme="urn:v-chip">tv-g</media:rating>
				<media:category scheme="urn:iab:categories" label="Technology &amp; Computing">IAB19</media:category>
				<media:credit role="host">Louis Maresca</media:credit>
				<media:credit role="host">Brian Chee</media:credit>
				<media:credit role="host">Curtis Franklin</media:credit>
				<media:credit role="guest">Jeff Marraccini</media:credit>
				<media:credit role="guest">Zach Wasserman</media:credit>
			</media:content>
				<podcast:person role="host" href="https://twit.tv/people/louis-maresca" img="https://elroy.twit.tv/sites/default/files/styles/twit_album_art_600x600/public/people/50091/pictures/lmaresca.jpg">Louis Maresca</podcast:person>
				<podcast:person role="host" href="https://twit.tv/people/brian-chee" img="https://elroy.twit.tv/sites/default/files/styles/twit_album_art_600x600/public/people/58/pictures/brian-chee.png">Brian Chee</podcast:person>
				<podcast:person role="host" href="https://twit.tv/people/curtis-franklin" img="https://elroy.twit.tv/sites/default/files/styles/twit_album_art_600x600/public/people/57/pictures/franklin-curt.jpg">Curtis Franklin</podcast:person>
				<podcast:person role="guest" href="https://altair.com/">Jeff Marraccini</podcast:person>
				<podcast:person role="guest" href="https://fleetdm.com/">Zach Wasserman</podcast:person>
		</item>
		<item>
			<title>TWiET 564: Data Is Bigger In Texas - Cybersecurity Recruitment, Edge Computing, Hyperscale Cloud With Involta</title>
			<itunes:title>Data Is Bigger In Texas - Cybersecurity Recruitment, Edge Computing, Hyperscale Cloud With Involta</itunes:title>
			<itunes:episodeType>full</itunes:episodeType>
			<itunes:author>TWiT</itunes:author>
			<pubDate>Fri, 06 Oct 2023 17:16:06 PDT</pubDate>
			<itunes:episode>564</itunes:episode>
			<podcast:episode>564</podcast:episode>
			<link>https://twit.tv/shows/this-week-in-enterprise-tech/episodes/564</link>
			<comments>https://twit.tv/shows/this-week-in-enterprise-tech/episodes/564</comments>
			<category>News</category>
			<category>Technology</category>
			<itunes:explicit>no</itunes:explicit>
			<itunes:subtitle>Cybersecurity Recruitment, Edge Computing, Hyperscale Cloud With Involta</itunes:subtitle>
			<podcast:transcript url="http://twit.tv/posts/tech/cybersecurity-skills-gap" type="text/html" />
			<itunes:keywords>enterprise podcast, enterprise news podcast, enterprise tech podcast, enterprise technology, enterprise tech news, Enterprise Architect, Involta, cybersecurity recruiting, cybersecurity skills gap, cloud migration strategy, multi-cloud, Hybrid cloud</itunes:keywords>
			<description><![CDATA[
<p>This episode of This Week In Enterprise Tech discusses the major cybersecurity recruitment challenges organizations face today and dives into the world of enterprise edge computing and the future of hyperscale cloud services with Scott Evers of Involta.</p><ul> 
<li>News Blips: The hosts discuss a severe vulnerability in Atlassian's Confluence Server that allows attackers admin-level access, how over 100,000 industrial control systems are exposed on the public internet, using fiber optic cables on the ocean floor for earthquake detection, and a Linux "Looney Tunables" flaw threatens most distributions.</li> 
<li>Byte Discussion - Cybersecurity Recruitment: The hosts examine the cybersecurity talent shortage and creative approaches to recruiting, like looking beyond degrees to aptitude and expanding the talent pipeline.</li> 
<li>Interview with Involta Enterprise Architect Scott Evers: Scott discusses his career path from physicist to enterprise architect. Common security gaps he sees in software-defined environments. The importance of workload-focused cloud migrations. How data sovereignty affects cloud choices. The persisting confusion around shared responsibility models.</li></ul> 
<p><strong>Hosts:</strong> <a href="https://twit.tv/people/louis-maresca">Louis Maresca</a>, <a href="https://twit.tv/people/brian-chee">Brian Chee</a>, and <a href="https://twit.tv/people/curtis-franklin">Curtis Franklin</a></p> 
<p><strong>Guest:</strong> <a href="https://www.linkedin.com/in/scottaevers/" target="_blank">Scott Evers</a></p> 
<p>Download or subscribe to this show at <a href="https://twit.tv/shows/this-week-in-enterprise-tech">https://twit.tv/shows/this-week-in-enterprise-tech</a>.</p> 
<p>Get episodes ad-free with Club TWiT at <a href="https://twit.tv/clubtwit" rel="payment">https://twit.tv/clubtwit</a></p>
<p><strong>Sponsors:</strong><ul>
<li><a href="http://bitwarden.com/twit" target="_blank" rel="sponsored">bitwarden.com/twit</a></li>
<li><a href="http://cs.co/twit" target="_blank" rel="sponsored">cs.co/twit</a></li>
<li><a href="http://GO.ACILEARNING.COM/TWIT" target="_blank" rel="sponsored">GO.ACILEARNING.COM/TWIT</a></li>
</ul></p>
]]></description>
			<itunes:summary><![CDATA[
<p>This episode of This Week In Enterprise Tech discusses the major cybersecurity recruitment challenges organizations face today and dives into the world of enterprise edge computing and the future of hyperscale cloud services with Scott Evers of Involta.</p><ul> 
<li>News Blips: The hosts discuss a severe vulnerability in Atlassian's Confluence Server that allows attackers admin-level access, how over 100,000 industrial control systems are exposed on the public internet, using fiber optic cables on the ocean floor for earthquake detection, and a Linux "Looney Tunables" flaw threatens most distributions.</li> 
<li>Byte Discussion - Cybersecurity Recruitment: The hosts examine the cybersecurity talent shortage and creative approaches to recruiting, like looking beyond degrees to aptitude and expanding the talent pipeline.</li> 
<li>Interview with Involta Enterprise Architect Scott Evers: Scott discusses his career path from physicist to enterprise architect. Common security gaps he sees in software-defined environments. The importance of workload-focused cloud migrations. How data sovereignty affects cloud choices. The persisting confusion around shared responsibility models.</li></ul> 
<p><strong>Hosts:</strong> <a href="https://twit.tv/people/louis-maresca">Louis Maresca</a>, <a href="https://twit.tv/people/brian-chee">Brian Chee</a>, and <a href="https://twit.tv/people/curtis-franklin">Curtis Franklin</a></p> 
<p><strong>Guest:</strong> <a href="https://www.linkedin.com/in/scottaevers/" target="_blank">Scott Evers</a></p> 
<p>Download or subscribe to this show at <a href="https://twit.tv/shows/this-week-in-enterprise-tech">https://twit.tv/shows/this-week-in-enterprise-tech</a>.</p> 
<p>Get episodes ad-free with Club TWiT at <a href="https://twit.tv/clubtwit" rel="payment">https://twit.tv/clubtwit</a></p>
<p><strong>Sponsors:</strong><ul>
<li><a href="http://bitwarden.com/twit" target="_blank" rel="sponsored">bitwarden.com/twit</a></li>
<li><a href="http://cs.co/twit" target="_blank" rel="sponsored">cs.co/twit</a></li>
<li><a href="http://GO.ACILEARNING.COM/TWIT" target="_blank" rel="sponsored">GO.ACILEARNING.COM/TWIT</a></li>
</ul></p>
]]></itunes:summary>
			<content:encoded><![CDATA[
<p>This episode of This Week In Enterprise Tech discusses the major cybersecurity recruitment challenges organizations face today and dives into the world of enterprise edge computing and the future of hyperscale cloud services with Scott Evers of Involta.</p><ul> 
<li>News Blips: The hosts discuss a severe vulnerability in Atlassian's Confluence Server that allows attackers admin-level access, how over 100,000 industrial control systems are exposed on the public internet, using fiber optic cables on the ocean floor for earthquake detection, and a Linux "Looney Tunables" flaw threatens most distributions.</li> 
<li>Byte Discussion - Cybersecurity Recruitment: The hosts examine the cybersecurity talent shortage and creative approaches to recruiting, like looking beyond degrees to aptitude and expanding the talent pipeline.</li> 
<li>Interview with Involta Enterprise Architect Scott Evers: Scott discusses his career path from physicist to enterprise architect. Common security gaps he sees in software-defined environments. The importance of workload-focused cloud migrations. How data sovereignty affects cloud choices. The persisting confusion around shared responsibility models.</li></ul> 
<p><strong>Hosts:</strong> <a href="https://twit.tv/people/louis-maresca">Louis Maresca</a>, <a href="https://twit.tv/people/brian-chee">Brian Chee</a>, and <a href="https://twit.tv/people/curtis-franklin">Curtis Franklin</a></p> 
<p><strong>Guest:</strong> <a href="https://www.linkedin.com/in/scottaevers/" target="_blank">Scott Evers</a></p> 
<p>Download or subscribe to this show at <a href="https://twit.tv/shows/this-week-in-enterprise-tech">https://twit.tv/shows/this-week-in-enterprise-tech</a>.</p> 
<p>Get episodes ad-free with Club TWiT at <a href="https://twit.tv/clubtwit" rel="payment">https://twit.tv/clubtwit</a></p>
<p><strong>Sponsors:</strong><ul>
<li><a href="http://bitwarden.com/twit" target="_blank" rel="sponsored">bitwarden.com/twit</a></li>
<li><a href="http://cs.co/twit" target="_blank" rel="sponsored">cs.co/twit</a></li>
<li><a href="http://GO.ACILEARNING.COM/TWIT" target="_blank" rel="sponsored">GO.ACILEARNING.COM/TWIT</a></li>
</ul></p>
]]></content:encoded>
			<itunes:image href="https://elroy.twit.tv/sites/default/files/styles/twit_thumb_720x405/public/images/episodes/2023/10/848042/hero/twiet0564_thumbnail.jpg"/>
			<guid isPermaLink="false">https://pdst.fm/e/pscrb.fm/rss/p/cdn.twit.tv/audio/twiet/twiet0564/twiet0564.mp3</guid>
			<itunes:duration>1:10:40</itunes:duration>
			<enclosure url="https://pdst.fm/e/pscrb.fm/rss/p/cdn.twit.tv/libsyn/twiet_564/4cf66d02-0d71-4df2-9f02-35d3f0f8d090/R1_twiet0564.mp3" length="34170488" type="audio/mpeg"/>
			<media:content url="https://pdst.fm/e/pscrb.fm/rss/p/cdn.twit.tv/libsyn/twiet_564/4cf66d02-0d71-4df2-9f02-35d3f0f8d090/R1_twiet0564.mp3" fileSize="34170488" type="audio/mpeg" medium="audio">
				<media:title type="plain">TWiET 564: Data Is Bigger In Texas - Cybersecurity Recruitment, Edge Computing, Hyperscale Cloud With Involta</media:title>
				<media:description type="plain">Cybersecurity Recruitment, Edge Computing, Hyperscale Cloud With Involta</media:description>
				<media:keywords>enterprise podcast, enterprise news podcast, enterprise tech podcast, enterprise technology, enterprise tech news, Enterprise Architect, Involta, cybersecurity recruiting, cybersecurity skills gap, cloud migration strategy, multi-cloud, Hybrid cloud</media:keywords>
				<media:thumbnail url="https://elroy.twit.tv/sites/default/files/styles/twit_slideshow_400x300/public/images/episodes/2023/10/848042/hero/twiet0564_thumbnail.jpg" width="400" height="225" />
				<media:rating scheme="urn:simple">nonadult</media:rating>
				<media:rating scheme="urn:v-chip">tv-g</media:rating>
				<media:category scheme="urn:iab:categories" label="Technology &amp; Computing">IAB19</media:category>
				<media:credit role="host">Louis Maresca</media:credit>
				<media:credit role="host">Brian Chee</media:credit>
				<media:credit role="host">Curtis Franklin</media:credit>
				<media:credit role="guest">Scott Evers</media:credit>
			</media:content>
				<podcast:person role="host" href="https://twit.tv/people/louis-maresca" img="https://elroy.twit.tv/sites/default/files/styles/twit_album_art_600x600/public/people/50091/pictures/lmaresca.jpg">Louis Maresca</podcast:person>
				<podcast:person role="host" href="https://twit.tv/people/brian-chee" img="https://elroy.twit.tv/sites/default/files/styles/twit_album_art_600x600/public/people/58/pictures/brian-chee.png">Brian Chee</podcast:person>
				<podcast:person role="host" href="https://twit.tv/people/curtis-franklin" img="https://elroy.twit.tv/sites/default/files/styles/twit_album_art_600x600/public/people/57/pictures/franklin-curt.jpg">Curtis Franklin</podcast:person>
				<podcast:person role="guest" href="https://www.linkedin.com/in/scottaevers/">Scott Evers</podcast:person>
		</item>
	</channel>
</rss>
