Twin Trouble - a podcast featuring Jason and Jeremy Hammond about prison abolition, information activism, and resistance to the state and capitalism. Contact: email twins@twintrouble.net - Twitter - @freejeremynet
…
continue reading
TOP SECRET Personal Attention, SpyCast Listeners Known to be the podcast real spies listen to -(STOP)- eavesdrop on conversations with high level sources from around the world -(STOP)- spychiefs molehunters defectors covert operators analysts cyberwarriors and researchers debriefed by SPY Historian Hammond -(STOP) stories secrets tradecraft and technology discussed -(STOP)- HUMINT SIGINT OSINT IMINT GEOINT and more -(STOP)- rumored to be professional education internal communication and publ ...
…
continue reading
Inspiring Music and Interviews with Classic Roots Reggae Artists.
…
continue reading
Real men having real conversations centered around mental health.
…
continue reading
An Anaheim Ducks Podcast covering the Ducks and the NHL on a game-by-game basis. The Forever Mighty Podcast is hosted by four lifelong Anaheim Ducks fans: Patrick Mahoney, Jason Lamb, Stephen Dohner and Eddy Jones. The Forever Mighty Podcast, as it sounds, covers the Anaheim Ducks on a game-by-game basis. An in-depth analysis on everything surrounding the Anaheim Ducks that has featured guests from all different facets of the game, including: Max Jones, Trevor Zegras, Rich Hammond, Rickard G ...
…
continue reading
Year Zero is a podcast focused on power, its abuses, and finding liberty in your own life.
…
continue reading
Get ready for a minion laughs in the funniest blockbuster hit of the year! Vying for the title of "World's Greatest Villain", Gru (voiced by Steve Carell) – along with his hilarious crew of mischievous minions – plots to pull off the craziest crime of the century: steal the moon! But when Gru enlists the help of three little girls, they see something in him nobody else has ever seen: the perfect dad. From executive producer Chris Meledandri (Horton Hears a Who, Ice Age), and featuring the vo ...
…
continue reading
The Center for AI Policy Podcast zooms into the strategic landscape of AI and unpacks its implications for US policy. This podcast is a publication from the Center for AI Policy (CAIP), a nonpartisan research organization dedicated to mitigating the catastrophic risks of AI through policy development and advocacy. Operating out of Washington, DC, CAIP works to ensure AI is developed and implemented with the highest safety standards.
…
continue reading
Welcome to the Security Weekly Podcast Network, your all-in-one source for the latest in cybersecurity! This feed features a diverse lineup of shows, including Application Security Weekly, Business Security Weekly, Paul's Security Weekly, Enterprise Security Weekly, and Security Weekly News. Whether you're a cybersecurity professional, business leader, or tech enthusiast, we cover all angles of the cybersecurity landscape. Tune in for in-depth panel discussions, expert guest interviews, and ...
…
continue reading
Welcome to the Security Weekly Podcast Network, your all-in-one source for the latest in cybersecurity! This feed features a diverse lineup of shows, including Application Security Weekly, Business Security Weekly, Paul's Security Weekly, Enterprise Security Weekly, and Security Weekly News. Whether you're a cybersecurity professional, business leader, or tech enthusiast, we cover all angles of the cybersecurity landscape. Tune in for in-depth panel discussions, expert guest interviews, and ...
…
continue reading
Because fewer than 7% of Americans have served in uniform, most Americans are unfamiliar with military service and culture. As a result, members of the military and Veteran community are at greater risk for disconnection and lack of belonging with the civilian community. PsychArmor’s mission is to bridge the military-civilian divide by educating and training a Nation. Each week, Duane France, a combat Veteran and Clinical Mental Health Counselor, will dig deep into the stories “Behind The Mi ...
…
continue reading
If you live or work in the booming cities north of Dallas, from Coppell to the west, Frisco and Celina to the north, and down to Mesquite out east, this is the perfect podcast network for you. Star Local Media delivers daily content online to more than 250,000 engaged users every month, and now it has a podcast network for you to enjoy. We have interview episodes to dive deep into community topics, sports shows to highlight the big plays and athletes who are shining bright, and more on the w ...
…
continue reading
Welcome to We Recover Loudly the podcast. In season one, the mission was to spark conversations about addiction, recovery, and drinking cultures within hospitality. What we found was that these topics are closely linked to much bigger issues that we face in the industry, which truly deserve our attention and a space to be discussed. The podcast has evolved to delve into important matters surrounding addiction and recovery, as well as significant themes like burnout, sexual harassment, gender ...
…
continue reading
1
EDR Is Dead, EDR Is Not Dead - PSW #849
1:50:52
1:50:52
Redă mai târziu
Redă mai târziu
Liste
Like
Plăcut
1:50:52
Google's cookie encryption drama, Microsoft accusing Google of shady antitrust tactics, AI shenanigans, the rejected Defcon talk and hacking traffic lights, vulnerabilities in Realtek SD card readers, the never-ending debate on quantum computing vs. cryptography, backdoors are not secrets and where we are pushing attackers, firmware leakage, more o…
…
continue reading
1
Shadow IT and Security Debt - Dave Lewis - PSW #849
2:50:27
2:50:27
Redă mai târziu
Redă mai târziu
Liste
Like
Plăcut
2:50:27
We had the pleasure of finally having Dave Lewis on the show to discuss shadow IT and security debt. Dave shared some fascinating insights from his long career in cybersecurity, emphasizing the importance of addressing fundamental security issues and the human aspect of security. We delved into the challenges of managing shadow IT, the complexities…
…
continue reading
1
Relentless Ambition or Running From Pain? Hannah Hammond Gets Real About Self Worth
1:15:04
1:15:04
Redă mai târziu
Redă mai târziu
Liste
Like
Plăcut
1:15:04
On this episode of the Beyond The Cover podcast, I sit down with Hannah Hammond, a powerhouse in real estate and private lending, a self-made millionaire by 25, and the host of her upcoming podcast, Relentless. But today’s conversation isn’t about money, deals, or accolades; it’s about something deeper. Hannah opens up about her journey through int…
…
continue reading
1
Halloween, TikTok, Telcos, Win 11, Five Eyes, AWS, France, ChatGPT, and more... - SWN #426
36:50
36:50
Redă mai târziu
Redă mai târziu
Liste
Like
Plăcut
36:50
Halloween, TikTok Rip Off, Telcos, Win 11, Five Eyes, AWS, France, ChatGPT, and more on the Security Weekly News. Show Notes: https://securityweekly.com/swn-426
…
continue reading
1
Halloween, TikTok, Telcos, Win 11, Five Eyes, AWS, France, ChatGPT, and more... - SWN #426
36:50
36:50
Redă mai târziu
Redă mai târziu
Liste
Like
Plăcut
36:50
Halloween, TikTok Rip Off, Telcos, Win 11, Five Eyes, AWS, France, ChatGPT, and more on the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-426
…
continue reading
1
Shadow IT and Security Debt - Dave Lewis - PSW #849
59:44
59:44
Redă mai târziu
Redă mai târziu
Liste
Like
Plăcut
59:44
We had the pleasure of finally having Dave Lewis on the show to discuss shadow IT and security debt. Dave shared some fascinating insights from his long career in cybersecurity, emphasizing the importance of addressing fundamental security issues and the human aspect of security. We delved into the challenges of managing shadow IT, the complexities…
…
continue reading
1
Protecting Identity of AI Agents & Standardizing Identity Security for SaaS Apps - Shiven Ramji, Arnab Bose - ASW #305
30:42
30:42
Redă mai târziu
Redă mai târziu
Liste
Like
Plăcut
30:42
Generative AI has been the talk of the technology industry for the past 18+ months. Companies are seeing its value, so generative AI budgets are growing. With more and more AI agents expected in the coming years, it’s essential that we are securing how consumers interact with generative AI agents and how developers build AI agents into their apps. …
…
continue reading
1
The CISO Mindset, Top Strategies, and Mandating Office Presence Without Purpose - David Bradbury, Erin Baudo Felter - BSW #370
1:03:37
1:03:37
Redă mai târziu
Redă mai târziu
Liste
Like
Plăcut
1:03:37
In the leadership and communications segment, The CISO Mindset: A Strategic Guide for Aspiring CEOs and The Board Members, The Top Strategy to Earn More Respect at Work: A Leadership Expert’s Proven Method, The Problem with Mandating Office Presence Without Purpose, and more! Identity continues to be one of the most used attack vectors by cybercrim…
…
continue reading
1
Making TLS More Secure, Lessons from IPv6, LLMs Finding Vulns - ASW #305
53:04
53:04
Redă mai târziu
Redă mai târziu
Liste
Like
Plăcut
53:04
Better TLS implementations with Rust, fuzzing, and managing certs, appsec lessons from the everlasting transition to IPv6, LLMs for finding vulns (and whether fuzzing is better), and more! Also check out this presentation from BSides Knoxville that we talked about briefly, https://youtu.be/DLn7Noex_fc?feature=shared Show Notes: https://securityweek…
…
continue reading
1
Making TLS More Secure, Lessons from IPv6, LLMs Finding Vulns - Arnab Bose, Shiven Ramji - ASW #305
1:22:48
1:22:48
Redă mai târziu
Redă mai târziu
Liste
Like
Plăcut
1:22:48
Better TLS implementations with Rust, fuzzing, and managing certs, appsec lessons from the everlasting transition to IPv6, LLMs for finding vulns (and whether fuzzing is better), and more! Also check out this presentation from BSides Knoxville that we talked about briefly, https://youtu.be/DLn7Noex_fc?feature=shared Generative AI has been the talk …
…
continue reading
1
Bellingcat: An Intelligence Agency for the People with Eliot Higgins
1:07:27
1:07:27
Redă mai târziu
Redă mai târziu
Liste
Like
Plăcut
1:07:27
Summary Eliot Higgins (X; Wikipedia) joins Andrew (X; LinkedIn) to discuss the work of Bellingcat. Eliot founded the open-source investigative website in 2014. What You’ll Learn Intelligence Bellingcat’s approach to “investigative journalism” The rise of OSINT as a tool of journalism Bellingcat’s relationship with intelligence agencies Case studies…
…
continue reading
1
Stay Ahead of Identity Threats & Addressing Cybersecurity Disparities - David Bradbury, Erin Baudo Felter - BSW #370
33:10
33:10
Redă mai târziu
Redă mai târziu
Liste
Like
Plăcut
33:10
Identity continues to be one of the most used attack vectors by cybercriminals. From phishing to credential stuffing to password spraying – threat actors are finding new ways to infiltrate systems and cause costly problems to companies. David Bradbury, Chief Security Officer at Okta, joins Security Weekly's Mandy Logan to discuss today's threat lan…
…
continue reading
1
BTM192 – Conversations with Caregivers Replay – VSOs and Caregivers
37:45
37:45
Redă mai târziu
Redă mai târziu
Liste
Like
Plăcut
37:45
Show Summary On today’s episode, we’re replaying a PsychArmor Conversations with Caregivers featuring how VSOs can support Caregivers. This conversation was recorded in June of 2023 and featured the host, PsychArmor Trusted Advisor Shaina Purser, having a conversation with Madison Moore, VP of Programs & Partnerships at The Elizabeth Dole Foundatio…
…
continue reading
1
The CISO Mindset, Top Strategies, and Mandating Office Presence Without Purpose - BSW #370
30:36
30:36
Redă mai târziu
Redă mai târziu
Liste
Like
Plăcut
30:36
In the leadership and communications segment, The CISO Mindset: A Strategic Guide for Aspiring CEOs and The Board Members, The Top Strategy to Earn More Respect at Work: A Leadership Expert’s Proven Method, The Problem with Mandating Office Presence Without Purpose, and more! Show Notes: https://securityweekly.com/bsw-370…
…
continue reading
1
Era of Bot Battlers & Security Focused Company Culture - ESW #381
32:13
32:13
Redă mai târziu
Redă mai târziu
Liste
Like
Plăcut
32:13
Customer Identity is everywhere. It's powering secure experiences for billions - enabling people to check their luggage at the airport, watch their favorite Major League Soccer games, or take their favorite Peloton class. Because it’s everywhere, threat actors now see customer identity as a path to financial gain. Bots now make up nearly 50% of all…
…
continue reading
CJ of The Dangerous History Podcast joined me to discuss CIA corporate infiltration, Bechtel, and Kamala.
…
continue reading
1
Cyber Security Awareness for Election and Poll Workers - Kirsten Davies - ESW #381
48:02
48:02
Redă mai târziu
Redă mai târziu
Liste
Like
Plăcut
48:02
The vast majority of the folks working polls and elections are volunteers. This creates a significant training challenge. Not only do they have to learn how to perform a complex and potentially stressful job in a short amount of time (most training is one day or less), cybersecurity-related concerns are usually not included for individual poll loca…
…
continue reading
1
Tourists, Fortis, apps, TLP, AWS, Google, Chatbots, Aaran Leyland, and More... - SWN #425
35:07
35:07
Redă mai târziu
Redă mai târziu
Liste
Like
Plăcut
35:07
Tourist Abuse, Fortis, apps, TLP, AWS, Google, Chatbots, Aaran Leyland, and More, on this edition of the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-425
…
continue reading
1
Tourists, Fortis, apps, TLP, AWS, Google, Chatbots, Aaran Leyland, and More... - SWN #425
35:07
35:07
Redă mai târziu
Redă mai târziu
Liste
Like
Plăcut
35:07
Tourist Abuse, Fortis, apps, TLP, AWS, Google, Chatbots, Aaran Leyland, and More, on this edition of the Security Weekly News. Show Notes: https://securityweekly.com/swn-425
…
continue reading
1
Transforming the Defender's Dilemma into the Defender's Advantage - Charlotte Wylie, Bhawna Singh, Lenny Zeltser - ESW #381
1:50:15
1:50:15
Redă mai târziu
Redă mai târziu
Liste
Like
Plăcut
1:50:15
Ever heard someone say, "the attacker only has to be right once, but the defender has to get it right every time"? On this episode, we'll dispel that myth. There is some truth to the saying, but only with regards to initial access to the target's environment. Once on the inside, the attacker's advantage flips to the defender. Call it the 'Home Alon…
…
continue reading
1
Transforming the Defender's Dilemma into the Defender's Advantage - Lenny Zeltser - ESW #381
30:18
30:18
Redă mai târziu
Redă mai târziu
Liste
Like
Plăcut
30:18
Ever heard someone say, "the attacker only has to be right once, but the defender has to get it right every time"? On this episode, we'll dispel that myth. There is some truth to the saying, but only with regards to initial access to the target's environment. Once on the inside, the attacker's advantage flips to the defender. Call it the 'Home Alon…
…
continue reading
1
Not The Vulnerabilities You're Looking For - PSW #848
2:06:29
2:06:29
Redă mai târziu
Redă mai târziu
Liste
Like
Plăcut
2:06:29
This week: The USB Army Knife that won't break the budget, I don't want to say EDR is useless (but there I said it), Paul's list of excellent hacking tips, FortiJump - an RCE that took a while to become public, do malware care if it's on a hypervisor?, MicroPython for fun and not for hacking?, an unspecified vulnerability, can you exploit speculati…
…
continue reading
1
Secure By Default - How do we get there? - Andy Syrewicze - PSW #848
1:00:12
1:00:12
Redă mai târziu
Redă mai târziu
Liste
Like
Plăcut
1:00:12
Andy drops some Microsoft Windows and 365 knowledge as we discuss the details on how we get to secure by default in our Windows and cloud environments. Show Notes: https://securityweekly.com/psw-848
…
continue reading
1
Secure By Default - How do we get there? - Andy Syrewicze - PSW #848
3:06:32
3:06:32
Redă mai târziu
Redă mai târziu
Liste
Like
Plăcut
3:06:32
Andy drops some Microsoft Windows and 365 knowledge as we discuss the details on how we get to secure by default in our Windows and cloud environments. This week: The USB Army Knife that won't break the budget, I don't want to say EDR is useless (but there I said it), Paul's list of excellent hacking tips, FortiJump - an RCE that took a while to be…
…
continue reading
1
My Most Personal Q&A Yet: Curiosity, Love, and Everything In Between
54:41
54:41
Redă mai târziu
Redă mai târziu
Liste
Like
Plăcut
54:41
In this episode of Beyond The Cover, I was on the other side of the interview this time. AD from AZ Rocket Studios asked me the questions and he didn’t hold back. We took the most popular questions from my social media and went all in—no sugar coating, just real talk. From exploring the power of curiosity to tackling trust issues, we unpacked every…
…
continue reading
1
JSON Parsing, Email Parsing, CISA's Bad Practices Guide, Abusing Disclosure Policies - ASW #304
38:34
38:34
Redă mai târziu
Redă mai târziu
Liste
Like
Plăcut
38:34
Flaws that arise from inconsistent parsing of JSON and email addresses, CISA's guide to bad software practices, abusing a security disclosure process to take over a WordPress plugin, and more! Show Notes: https://securityweekly.com/asw-304
…
continue reading
1
CEO Accountability as CISOs Concerned Over Demands and Measured by Profit/Cost - BSW #369
29:09
29:09
Redă mai târziu
Redă mai târziu
Liste
Like
Plăcut
29:09
In the leadership and communications section, Joe Sullivan: CEOs must be held accountable for security too, More tech chiefs have success measured by profitability, cost management, Is Your Career Heading in the Right Direction?, and more. Show Notes: https://securityweekly.com/bsw-369
…
continue reading
1
Doom Brain, E2EE, OT, Adload, Cisco, VMware, internet archive, Josh Marpet ... - SWN #424
29:57
29:57
Redă mai târziu
Redă mai târziu
Liste
Like
Plăcut
29:57
Doom on a Human Brain, E2EE, OT, Adload, Cisco, VMware, Internet Archive, Josh Marpet, and more on the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-424
…
continue reading
1
Doom Brain, E2EE, OT, Adload, Cisco, VMware, internet archive, Josh Marpet ... - SWN #424
30:01
30:01
Redă mai târziu
Redă mai târziu
Liste
Like
Plăcut
30:01
Doom on a Human Brain, E2EE, OT, Adload, Cisco, VMware, Internet Archive, Josh Marpet, and more on the Security Weekly News. Show Notes: https://securityweekly.com/swn-424
…
continue reading
1
The Complexities, Configurations, and Challenges in Cloud Security - Scott Piper - ASW #304
38:53
38:53
Redă mai târziu
Redă mai târziu
Liste
Like
Plăcut
38:53
Building cloud native apps doesn't mean you're immune to dealing with legacy systems. Cloud services have changed significantly over the last decade, both in the security controls available to them and the sheer volume of services that CSPs provide. Scott Piper shares some history of cloud security, the benefits of account separation, and how ratch…
…
continue reading
1
Aligning Tech Execs on Cyber Resilience - Theresa Lanowitz - BSW #369
32:29
32:29
Redă mai târziu
Redă mai târziu
Liste
Like
Plăcut
32:29
Getting C-Suite execs aligned on cyber resilience and cybersecurity can be a challenge. LevelBlue's recent Futures™️ report sought to uncover the barriers that prevent companies from achieving cyber resilience in the enterprise today. The report not only surveyed C-Suite execs (CIOs, CTOs, and CISOs), but non-C-Suite leaders from engineering and ar…
…
continue reading
1
Aligning Tech Execs on Cyber Resilience - Theresa Lanowitz - BSW #369
1:01:21
1:01:21
Redă mai târziu
Redă mai târziu
Liste
Like
Plăcut
1:01:21
Getting C-Suite execs aligned on cyber resilience and cybersecurity can be a challenge. LevelBlue's recent Futures™️ report sought to uncover the barriers that prevent companies from achieving cyber resilience in the enterprise today. The report not only surveyed C-Suite execs (CIOs, CTOs, and CISOs), but non-C-Suite leaders from engineering and ar…
…
continue reading