Every other week, Karen, Brian, Laura, and Jonah create a chart-topping hit based on song title suggestions that you send in.
…
continue reading
Welcome to an interview variety show for your ears hosted by Justin Michael. Each episode brings together a fan of Batman: The Animated Series or a special guest who worked on the TV show to discuss their favorite episodes from the legendary 90’s cartoon. Why? Because I love this show. You probably do, too.
…
continue reading
Two Desiring Machines
…
continue reading
Next Generation Medicine--the podcast tailor-made to empower the next generation of doctors with principles of liberty. By listening, you will have a deeper understanding of why the patient-doctor relationship is central to a better healthcare system and how competitive markets unleash the creativity needed to achieve affordable, quality healthcare.
…
continue reading
Welcome to the Security Weekly Podcast Network, your all-in-one source for the latest in cybersecurity! This feed features a diverse lineup of shows, including Application Security Weekly, Business Security Weekly, Paul's Security Weekly, Enterprise Security Weekly, and Security Weekly News. Whether you're a cybersecurity professional, business leader, or tech enthusiast, we cover all angles of the cybersecurity landscape. Tune in for in-depth panel discussions, expert guest interviews, and ...
…
continue reading
Welcome to the Security Weekly Podcast Network, your all-in-one source for the latest in cybersecurity! This feed features a diverse lineup of shows, including Application Security Weekly, Business Security Weekly, Paul's Security Weekly, Enterprise Security Weekly, and Security Weekly News. Whether you're a cybersecurity professional, business leader, or tech enthusiast, we cover all angles of the cybersecurity landscape. Tune in for in-depth panel discussions, expert guest interviews, and ...
…
continue reading
1
Project Moonbase – The Historic Sound of the Future | Unusual music show | Podcast | Space cult | projectmoonbase.com
Project Moonbase - DJ Bongoboy & MC Zirconium - Futurologists, antiquarians and explorers in the outer realms of the music multiverse
Project Moonbase is filled with music to surprise, delight and occasionally horrify you. Made by someone who really cares (and his prisoner). We bring you music you’ve never heard before that will put a smile on your face, open your third eye and make you dance. We love space age bachelor pad music, library music, charity shop cheese, hauntology, ping pong stereo, moog music, sitar-driven psychedelia, lounge, the retro-futuristic, contemporary electronica, soundtrack music, radiophonics, eur ...
…
continue reading
1
Halloween, TikTok, Telcos, Win 11, Five Eyes, AWS, France, ChatGPT, and more... - SWN #426
36:50
36:50
बाद में चलाएं
बाद में चलाएं
सूचियाँ
पसंद
पसंद
36:50
Halloween, TikTok Rip Off, Telcos, Win 11, Five Eyes, AWS, France, ChatGPT, and more on the Security Weekly News. Show Notes: https://securityweekly.com/swn-426
…
continue reading
1
Halloween, TikTok, Telcos, Win 11, Five Eyes, AWS, France, ChatGPT, and more... - SWN #426
36:50
36:50
बाद में चलाएं
बाद में चलाएं
सूचियाँ
पसंद
पसंद
36:50
Halloween, TikTok Rip Off, Telcos, Win 11, Five Eyes, AWS, France, ChatGPT, and more on the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-426
…
continue reading
1
Protecting Identity of AI Agents & Standardizing Identity Security for SaaS Apps - Shiven Ramji, Arnab Bose - ASW #305
30:42
30:42
बाद में चलाएं
बाद में चलाएं
सूचियाँ
पसंद
पसंद
30:42
Generative AI has been the talk of the technology industry for the past 18+ months. Companies are seeing its value, so generative AI budgets are growing. With more and more AI agents expected in the coming years, it’s essential that we are securing how consumers interact with generative AI agents and how developers build AI agents into their apps. …
…
continue reading
1
The CISO Mindset, Top Strategies, and Mandating Office Presence Without Purpose - David Bradbury, Erin Baudo Felter - BSW #370
1:03:37
1:03:37
बाद में चलाएं
बाद में चलाएं
सूचियाँ
पसंद
पसंद
1:03:37
In the leadership and communications segment, The CISO Mindset: A Strategic Guide for Aspiring CEOs and The Board Members, The Top Strategy to Earn More Respect at Work: A Leadership Expert’s Proven Method, The Problem with Mandating Office Presence Without Purpose, and more! Identity continues to be one of the most used attack vectors by cybercrim…
…
continue reading
1
Making TLS More Secure, Lessons from IPv6, LLMs Finding Vulns - ASW #305
53:04
53:04
बाद में चलाएं
बाद में चलाएं
सूचियाँ
पसंद
पसंद
53:04
Better TLS implementations with Rust, fuzzing, and managing certs, appsec lessons from the everlasting transition to IPv6, LLMs for finding vulns (and whether fuzzing is better), and more! Also check out this presentation from BSides Knoxville that we talked about briefly, https://youtu.be/DLn7Noex_fc?feature=shared Show Notes: https://securityweek…
…
continue reading
1
Making TLS More Secure, Lessons from IPv6, LLMs Finding Vulns - Arnab Bose, Shiven Ramji - ASW #305
1:22:48
1:22:48
बाद में चलाएं
बाद में चलाएं
सूचियाँ
पसंद
पसंद
1:22:48
Better TLS implementations with Rust, fuzzing, and managing certs, appsec lessons from the everlasting transition to IPv6, LLMs for finding vulns (and whether fuzzing is better), and more! Also check out this presentation from BSides Knoxville that we talked about briefly, https://youtu.be/DLn7Noex_fc?feature=shared Generative AI has been the talk …
…
continue reading
1
Stay Ahead of Identity Threats & Addressing Cybersecurity Disparities - David Bradbury, Erin Baudo Felter - BSW #370
33:10
33:10
बाद में चलाएं
बाद में चलाएं
सूचियाँ
पसंद
पसंद
33:10
Identity continues to be one of the most used attack vectors by cybercriminals. From phishing to credential stuffing to password spraying – threat actors are finding new ways to infiltrate systems and cause costly problems to companies. David Bradbury, Chief Security Officer at Okta, joins Security Weekly's Mandy Logan to discuss today's threat lan…
…
continue reading
1
The CISO Mindset, Top Strategies, and Mandating Office Presence Without Purpose - BSW #370
30:36
30:36
बाद में चलाएं
बाद में चलाएं
सूचियाँ
पसंद
पसंद
30:36
In the leadership and communications segment, The CISO Mindset: A Strategic Guide for Aspiring CEOs and The Board Members, The Top Strategy to Earn More Respect at Work: A Leadership Expert’s Proven Method, The Problem with Mandating Office Presence Without Purpose, and more! Show Notes: https://securityweekly.com/bsw-370…
…
continue reading
1
Era of Bot Battlers & Security Focused Company Culture - ESW #381
32:13
32:13
बाद में चलाएं
बाद में चलाएं
सूचियाँ
पसंद
पसंद
32:13
Customer Identity is everywhere. It's powering secure experiences for billions - enabling people to check their luggage at the airport, watch their favorite Major League Soccer games, or take their favorite Peloton class. Because it’s everywhere, threat actors now see customer identity as a path to financial gain. Bots now make up nearly 50% of all…
…
continue reading
1
Cyber Security Awareness for Election and Poll Workers - Kirsten Davies - ESW #381
48:02
48:02
बाद में चलाएं
बाद में चलाएं
सूचियाँ
पसंद
पसंद
48:02
The vast majority of the folks working polls and elections are volunteers. This creates a significant training challenge. Not only do they have to learn how to perform a complex and potentially stressful job in a short amount of time (most training is one day or less), cybersecurity-related concerns are usually not included for individual poll loca…
…
continue reading
1
Tourists, Fortis, apps, TLP, AWS, Google, Chatbots, Aaran Leyland, and More... - SWN #425
35:07
35:07
बाद में चलाएं
बाद में चलाएं
सूचियाँ
पसंद
पसंद
35:07
Tourist Abuse, Fortis, apps, TLP, AWS, Google, Chatbots, Aaran Leyland, and More, on this edition of the Security Weekly News. Show Notes: https://securityweekly.com/swn-425
…
continue reading
1
Tourists, Fortis, apps, TLP, AWS, Google, Chatbots, Aaran Leyland, and More... - SWN #425
35:07
35:07
बाद में चलाएं
बाद में चलाएं
सूचियाँ
पसंद
पसंद
35:07
Tourist Abuse, Fortis, apps, TLP, AWS, Google, Chatbots, Aaran Leyland, and More, on this edition of the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-425
…
continue reading
1
Transforming the Defender's Dilemma into the Defender's Advantage - Lenny Zeltser - ESW #381
30:18
30:18
बाद में चलाएं
बाद में चलाएं
सूचियाँ
पसंद
पसंद
30:18
Ever heard someone say, "the attacker only has to be right once, but the defender has to get it right every time"? On this episode, we'll dispel that myth. There is some truth to the saying, but only with regards to initial access to the target's environment. Once on the inside, the attacker's advantage flips to the defender. Call it the 'Home Alon…
…
continue reading
1
Transforming the Defender's Dilemma into the Defender's Advantage - Charlotte Wylie, Bhawna Singh, Lenny Zeltser - ESW #381
1:50:15
1:50:15
बाद में चलाएं
बाद में चलाएं
सूचियाँ
पसंद
पसंद
1:50:15
Ever heard someone say, "the attacker only has to be right once, but the defender has to get it right every time"? On this episode, we'll dispel that myth. There is some truth to the saying, but only with regards to initial access to the target's environment. Once on the inside, the attacker's advantage flips to the defender. Call it the 'Home Alon…
…
continue reading
1
Not The Vulnerabilities You're Looking For - PSW #848
2:06:29
2:06:29
बाद में चलाएं
बाद में चलाएं
सूचियाँ
पसंद
पसंद
2:06:29
This week: The USB Army Knife that won't break the budget, I don't want to say EDR is useless (but there I said it), Paul's list of excellent hacking tips, FortiJump - an RCE that took a while to become public, do malware care if it's on a hypervisor?, MicroPython for fun and not for hacking?, an unspecified vulnerability, can you exploit speculati…
…
continue reading
1
Secure By Default - How do we get there? - Andy Syrewicze - PSW #848
1:00:12
1:00:12
बाद में चलाएं
बाद में चलाएं
सूचियाँ
पसंद
पसंद
1:00:12
Andy drops some Microsoft Windows and 365 knowledge as we discuss the details on how we get to secure by default in our Windows and cloud environments. Show Notes: https://securityweekly.com/psw-848
…
continue reading
1
Secure By Default - How do we get there? - Andy Syrewicze - PSW #848
3:06:32
3:06:32
बाद में चलाएं
बाद में चलाएं
सूचियाँ
पसंद
पसंद
3:06:32
Andy drops some Microsoft Windows and 365 knowledge as we discuss the details on how we get to secure by default in our Windows and cloud environments. This week: The USB Army Knife that won't break the budget, I don't want to say EDR is useless (but there I said it), Paul's list of excellent hacking tips, FortiJump - an RCE that took a while to be…
…
continue reading
1
JSON Parsing, Email Parsing, CISA's Bad Practices Guide, Abusing Disclosure Policies - ASW #304
38:34
38:34
बाद में चलाएं
बाद में चलाएं
सूचियाँ
पसंद
पसंद
38:34
Flaws that arise from inconsistent parsing of JSON and email addresses, CISA's guide to bad software practices, abusing a security disclosure process to take over a WordPress plugin, and more! Show Notes: https://securityweekly.com/asw-304
…
continue reading
1
CEO Accountability as CISOs Concerned Over Demands and Measured by Profit/Cost - BSW #369
29:09
29:09
बाद में चलाएं
बाद में चलाएं
सूचियाँ
पसंद
पसंद
29:09
In the leadership and communications section, Joe Sullivan: CEOs must be held accountable for security too, More tech chiefs have success measured by profitability, cost management, Is Your Career Heading in the Right Direction?, and more. Show Notes: https://securityweekly.com/bsw-369
…
continue reading
1
Doom Brain, E2EE, OT, Adload, Cisco, VMware, internet archive, Josh Marpet ... - SWN #424
29:57
29:57
बाद में चलाएं
बाद में चलाएं
सूचियाँ
पसंद
पसंद
29:57
Doom on a Human Brain, E2EE, OT, Adload, Cisco, VMware, Internet Archive, Josh Marpet, and more on the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-424
…
continue reading
1
Doom Brain, E2EE, OT, Adload, Cisco, VMware, internet archive, Josh Marpet ... - SWN #424
30:01
30:01
बाद में चलाएं
बाद में चलाएं
सूचियाँ
पसंद
पसंद
30:01
Doom on a Human Brain, E2EE, OT, Adload, Cisco, VMware, Internet Archive, Josh Marpet, and more on the Security Weekly News. Show Notes: https://securityweekly.com/swn-424
…
continue reading
1
The Complexities, Configurations, and Challenges in Cloud Security - Scott Piper - ASW #304
38:53
38:53
बाद में चलाएं
बाद में चलाएं
सूचियाँ
पसंद
पसंद
38:53
Building cloud native apps doesn't mean you're immune to dealing with legacy systems. Cloud services have changed significantly over the last decade, both in the security controls available to them and the sheer volume of services that CSPs provide. Scott Piper shares some history of cloud security, the benefits of account separation, and how ratch…
…
continue reading
1
Aligning Tech Execs on Cyber Resilience - Theresa Lanowitz - BSW #369
32:29
32:29
बाद में चलाएं
बाद में चलाएं
सूचियाँ
पसंद
पसंद
32:29
Getting C-Suite execs aligned on cyber resilience and cybersecurity can be a challenge. LevelBlue's recent Futures™️ report sought to uncover the barriers that prevent companies from achieving cyber resilience in the enterprise today. The report not only surveyed C-Suite execs (CIOs, CTOs, and CISOs), but non-C-Suite leaders from engineering and ar…
…
continue reading
1
Aligning Tech Execs on Cyber Resilience - Theresa Lanowitz - BSW #369
1:01:21
1:01:21
बाद में चलाएं
बाद में चलाएं
सूचियाँ
पसंद
पसंद
1:01:21
Getting C-Suite execs aligned on cyber resilience and cybersecurity can be a challenge. LevelBlue's recent Futures™️ report sought to uncover the barriers that prevent companies from achieving cyber resilience in the enterprise today. The report not only surveyed C-Suite execs (CIOs, CTOs, and CISOs), but non-C-Suite leaders from engineering and ar…
…
continue reading
1
The Complexities, Configurations, and Challenges in Cloud Security - Scott Piper - ASW #304
1:17:25
1:17:25
बाद में चलाएं
बाद में चलाएं
सूचियाँ
पसंद
पसंद
1:17:25
Building cloud native apps doesn't mean you're immune to dealing with legacy systems. Cloud services have changed significantly over the last decade, both in the security controls available to them and the sheer volume of services that CSPs provide. Scott Piper shares some history of cloud security, the benefits of account separation, and how ratch…
…
continue reading
1
Marcel Mauss's A General Theory of Magic
1:38:40
1:38:40
बाद में चलाएं
बाद में चलाएं
सूचियाँ
पसंद
पसंद
1:38:40
This week Cooper and Taylor dive into Marcel Mauss's A General Theory of Magic. Support us on Patreon: www.patreon.com/muhh witter: @unconscioushhद्वारा Cooper Cherry Jr.
…
continue reading
1
Alternative CISO career paths, budget planning, and one easy trick to bypass EDR! - ESW #380
46:24
46:24
बाद में चलाएं
बाद में चलाएं
सूचियाँ
पसंद
पसंद
46:24
Finally, in the enterprise security news, HUMAN, Relyance AI, and watchTowr raise funding this week Alternative paths to becoming a CISO Vendor booths don’t have to suck (for vendors or conference attendees!) Budget planning guidance for 2025 CISOs might not be that great at predicting their own future needs Use this one easy trick to bypass EDR! A…
…
continue reading
1
Exploring Unified SASE as a Service - Renuka Nadkarni - ESW #380
30:27
30:27
बाद में चलाएं
बाद में चलाएं
सूचियाँ
पसंद
पसंद
30:27
Implementing SASE can be tricky and onerous, but it doesn't have to be. Today, we discuss Unified SASE as a Service with Renuka Nadkarni, Chief Product Officer at Aryaka. Particularly, how can Unified SASE make both networking and security more flexible and agile? IT and security professionals need to ensure secure and performant applications and d…
…
continue reading
1
Stealing, Kubernetes, Passkeys, SolarWinds, Intel, Sextortion, and... - SWN #423
33:21
33:21
बाद में चलाएं
बाद में चलाएं
सूचियाँ
पसंद
पसंद
33:21
Stealing Pencils, Kubernetes, Passkeys, SolarWinds, Intel, North Koreans, Sextortion, and More, on this edition of the Security Weekly News. Show Notes: https://securityweekly.com/swn-423
…
continue reading
1
Stealing, Kubernetes, Passkeys, SolarWinds, Intel, Sextortion, and... - SWN #423
33:22
33:22
बाद में चलाएं
बाद में चलाएं
सूचियाँ
पसंद
पसंद
33:22
Stealing Pencils, Kubernetes, Passkeys, SolarWinds, Intel, North Koreans, Sextortion, and More, on this edition of the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-423
…
continue reading
1
Cybersecurity Success is Business Success - Theresa Lanowitz - ESW #380
29:53
29:53
बाद में चलाएं
बाद में चलाएं
सूचियाँ
पसंद
पसंद
29:53
Secure by design is more than just AppSec - it addresses how the whole business designs systems and processes to be effective and resilient. The latest report from LevelBlue on Cyber Resilience reveals security programs that are reactive, ill-equipped, and disconnected from IT and business leaders. Most security problems are out of security teams' …
…
continue reading