Cryptopedia is an exploration of the myths and legends that haunt the human mind. Each week Brandon and John will take you on a journey exploring the mysteries of the world, tackling the tales with a dash of skepticism and an extra helping of humor.
…
continue reading
Award-winning actor Alec Baldwin takes listeners into the lives of artists, policy makers and performers. Alec sidesteps the predictable by going inside the dressing rooms, apartments, and offices of people we want to understand better: Ira Glass, Lena Dunham, David Letterman, Barbara Streisand, Tom Yorke, Chris Rock and others. Hear what happens when an inveterate guest becomes a host.
…
continue reading
A Fringe Podcast Commentary and discussion of the new series from LOST creator J.J. Abrams
…
continue reading
My Journey through Orthodoxy.
…
continue reading
On this season of Lipstick Economy, co-hosts Jamie Dunham, founder of Brand Wise, and Melinda Hudgins Noblitt, Brand Marketing Manager at Asurion, will dive deep into the misconceptions of marketing to women and highlight stories of marketing leaders who are making a difference.
…
continue reading
On our show, we interview leaders from various industries to learn about their journey from the beginning to where they are today.
…
continue reading
Western Edition -- a podcast from Huntington-USC Institute on California and the West and hosted by its director William Deverell, historian of the American West -- seeks to engage Angelenos, Californians, and Westerners as critical thinkers, conscious consumers, and informed community members. The podcast tells the fascinating stories of the people and communities of our region, connecting the past to the present, and demonstrating the tightly woven fabric of history. The forth season, Hidd ...
…
continue reading
Conversations recorded live at the Tribeca Festival with the best in the business. For more follow us on Twitter @TribecaAudio.
…
continue reading
Where security veterans unpack the latest IT security news, vulnerabilities, and research through a historical and technical lens that can cut through even the thickest cigar smoke. Hosted by Paul Asadoorian and Larry Pesce. Co-hosts: Josh Marpet, Jeff Man, Mandy Logan, Tyler Robinson.
…
continue reading
Where security veterans unpack the latest IT security news, vulnerabilities, and research through a historical and technical lens that can cut through even the thickest cigar smoke. Hosted by Paul Asadoorian and Larry Pesce. Co-hosts: Josh Marpet, Jeff Man, Mandy Logan, Tyler Robinson.
…
continue reading
Welcome to WTF! - What the FRAK, a captivating 14-part podcast series hosted by John Arms, the dynamic Mayor of FRAKville. Join us as we dive into engaging conversations with the distinguished speakers of the 2024 FRAK conference. Each episode offers a treasure trove of insights into building a successful fractional business, featuring thought-provoking discussions, inspirational stories, and introductions to some truly fascinating individuals. Whether you're a seasoned entrepreneur or just ...
…
continue reading
Welcome to the Security Weekly Podcast Network, your all-in-one source for the latest in cybersecurity! This feed features a diverse lineup of shows, including Application Security Weekly, Business Security Weekly, Paul's Security Weekly, Enterprise Security Weekly, and Security Weekly News. Whether you're a cybersecurity professional, business leader, or tech enthusiast, we cover all angles of the cybersecurity landscape. Tune in for in-depth panel discussions, expert guest interviews, and ...
…
continue reading
Martine, a 23-year-old artist from New York, arrives in Los Angeles to stay in the pool house of a family living in the hip and hilly community of Silver Lake. Peter, the father, has agreed to help Martine complete sound design on her art film as a favor to his wife. Martine innocently enters the seemingly idyllic life of this open-minded family with two kids and a relaxed Southern California vibe. Like a bolt of lightning, her arrival sparks a surge of energy that awakens suppressed impulse ...
…
continue reading
1
Effective Operational Outcomes - Ken Dunham - PSW #847
2:58:09
2:58:09
बाद में चलाएं
बाद में चलाएं
सूचियाँ
पसंद
पसंद
2:58:09
New security and vulnerability research is published every day. How can security teams get ahead of the curve and build architecture to combat modern threats and threat actors? Tune-in to a lively discussion about the threat landscape and tips on how to stay ahead of the curve. Segment Resources: https://blog.qualys.com/vulnerabilities-threat-resea…
…
continue reading
1
Effective Operational Outcomes - Ken Dunham - PSW #847
2:58:09
2:58:09
बाद में चलाएं
बाद में चलाएं
सूचियाँ
पसंद
पसंद
2:58:09
New security and vulnerability research is published every day. How can security teams get ahead of the curve and build architecture to combat modern threats and threat actors? Tune-in to a lively discussion about the threat landscape and tips on how to stay ahead of the curve. Segment Resources: https://blog.qualys.com/vulnerabilities-threat-resea…
…
continue reading
1
Effective Operational Outcomes - Ken Dunham - PSW #847
56:27
56:27
बाद में चलाएं
बाद में चलाएं
सूचियाँ
पसंद
पसंद
56:27
New security and vulnerability research is published every day. How can security teams get ahead of the curve and build architecture to combat modern threats and threat actors? Tune-in to a lively discussion about the threat landscape and tips on how to stay ahead of the curve. Segment Resources: https://blog.qualys.com/vulnerabilities-threat-resea…
…
continue reading
Join us for an insightful conversation with Chris King from Status Flow, a man with a unique talent for turning the seemingly impossible into reality. Curious why he's often referred to as the "Witch Doctor"? Tune in to uncover his life-changing advice and strategies for success. Don't miss out on this opportunity to learn from one of the best in t…
…
continue reading
1
Perl & PHP Vulns, Fuzzing & Parsers, Protecting Multi-Hosted Tenants, Secure Design - ASW #303
41:59
41:59
बाद में चलाएं
बाद में चलाएं
सूचियाँ
पसंद
पसंद
41:59
Looking at vulnerable code in Ivanti (Perl) and Magento (PHP), fuzzing is perfect for parsers, handling tenant isolation when training LLMs, Microsoft's small steps towards secure design, and more! Visit https://www.securityweekly.com/asw for all the latest episodes! Show Notes: https://securityweekly.com/asw-303…
…
continue reading
1
Stego, uBlock, PPTP, Log4J, Command Jacking, Windows 10, Feet, Josh Marpet, and More. - SWN #422
30:23
30:23
बाद में चलाएं
बाद में चलाएं
सूचियाँ
पसंद
पसंद
30:23
AI Stego, uBlock, PPTP, Log4J rises again, Command Jacking, Windows 10, Principal Skinner's Feet, Josh Marpet, and more on the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-422
…
continue reading
1
Budget Planning Guide 2025: Security And Risk - Jeff Pollard - BSW #368
59:35
59:35
बाद में चलाएं
बाद में चलाएं
सूचियाँ
पसंद
पसंद
59:35
In today’s uncertain macroeconomic environment, security and risk leaders need practical guidance on managing existing spending and new budgetary requests. Jeff Pollard, Vice-President, Principal Analyst on the Security and Risk Team at Forrester Research, joins Business Security Weekly to review Forrester's Budget Planning Guide 2025: Security And…
…
continue reading
Last month, the Great White Way lost one of its brightest stars: Ken Page. In tribute to the beloved actor, singer and Drama Desk Award Winner, “Here’s the Thing” is sharing Alec Baldwin’s 2021 conversation with the Broadway legend. Page was known for his standout roles in the 1976 all-Black revival of “Guys and Dolls” and the original casts of “Th…
…
continue reading
1
The History of Gorillas - The Gorillaz - 167
1:50:38
1:50:38
बाद में चलाएं
बाद में चलाएं
सूचियाँ
पसंद
पसंद
1:50:38
In memoriam to the bad shows we found along the way, John talks about Gorillas way too much. Merch: https://www.etsy.com/shop/cryptopediamerch Discord: https://discord.gg/AWpen8aYQG Patreon: https://www.patreon.com/user?u=14015340 YouTube (Videos have [questionable] captions!): http://youtube.cryptopediacast.com/ --- Hunting Monsters: Cryptozoology…
…
continue reading
1
Cybercab, Golden Jackal, Mamba 2FA, Microsoft, iPhone thieves, esims, Aaran Leyland.. - SWN #421
30:25
30:25
बाद में चलाएं
बाद में चलाएं
सूचियाँ
पसंद
पसंद
30:25
Cybercab, Golden Jackal, Mamba 2FA, Multi Microsoft, iPhone thieves, esims, Aaran Leyland, and More, on this edition of the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-421
…
continue reading
1
Community Knowledge Sharing with CyberNest - Ben Siegel, Aaron Costello - ESW #379
1:53:03
1:53:03
बाद में चलाएं
बाद में चलाएं
सूचियाँ
पसंद
पसंद
1:53:03
For this interview, Ben from CyberNest joins us to talk about one of my favorite subjects: information sharing in infosec. There are so many amazing skills, tips, techniques, and intel that security professionals have to share. Sadly, a natural corporate reluctance to share information viewed as privileged and private has historically had a chillin…
…
continue reading
1
The Saga Continues - PSW #846
1:20:12
1:20:12
बाद में चलाएं
बाद में चलाएं
सूचियाँ
पसंद
पसंद
1:20:12
Get ready for a wild ride in this week's podcast episode, where we dive into the latest security shenanigans! Default Credentials Gone Wild: We’ll kick things off with a look at how default credential scanners are like that friend who shows up to the party but never brings snacks. They're everywhere, but good luck finding one that actually works! C…
…
continue reading
1
The Code of Honor: Embracing Ethics in Cybersecurity - Ed Skoudis - PSW #846
54:53
54:53
बाद में चलाएं
बाद में चलाएं
सूचियाँ
पसंद
पसंद
54:53
"Code of Honor: Embracing Ethics in Cybersecurity" by Ed Skoudis is a book that explores the ethical challenges faced by cybersecurity professionals in today's digital landscape. The book delves into the complex moral dilemmas that arise in the field of cybersecurity, offering guidance on how to navigate these issues while maintaining integrity. Th…
…
continue reading
1
The Code of Honor: Embracing Ethics in Cybersecurity - Ed Skoudis - PSW #846
2:14:57
2:14:57
बाद में चलाएं
बाद में चलाएं
सूचियाँ
पसंद
पसंद
2:14:57
"Code of Honor: Embracing Ethics in Cybersecurity" by Ed Skoudis is a book that explores the ethical challenges faced by cybersecurity professionals in today's digital landscape. The book delves into the complex moral dilemmas that arise in the field of cybersecurity, offering guidance on how to navigate these issues while maintaining integrity. Th…
…
continue reading
1
The Code of Honor: Embracing Ethics in Cybersecurity - Ed Skoudis - PSW #846
2:14:57
2:14:57
बाद में चलाएं
बाद में चलाएं
सूचियाँ
पसंद
पसंद
2:14:57
"Code of Honor: Embracing Ethics in Cybersecurity" by Ed Skoudis is a book that explores the ethical challenges faced by cybersecurity professionals in today's digital landscape. The book delves into the complex moral dilemmas that arise in the field of cybersecurity, offering guidance on how to navigate these issues while maintaining integrity. Th…
…
continue reading
1
The Future of Zed Attack Proxy - Simon Bennetts, Ori Bendet - ASW #302
1:12:35
1:12:35
बाद में चलाएं
बाद में चलाएं
सूचियाँ
पसंद
पसंद
1:12:35
Zed Attack Proxy has been a crucial web app testing tool for decades. It's also had a struggle throughout 2024 to obtain funding that would enable the tool to add more features while remaining true to its open source history. Simon Bennetts, founder of ZAP, and Ori Bendet from Checkmarx update us on that journey, share some exploration of LLM fuzzi…
…
continue reading
1
AI, American Water, Broadband, Claroty, Okta, Meta, Phishing, Robocop, Josh Marpet... - SWN #420
30:10
30:10
बाद में चलाएं
बाद में चलाएं
सूचियाँ
पसंद
पसंद
30:10
AI Fest, American Water, Broadband, Claroty, Okta, Meta, Phishing, Robocop, Josh Marpet, and more on the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-420
…
continue reading
1
Best of the Best, with Judy Barton
33:42
33:42
बाद में चलाएं
बाद में चलाएं
सूचियाँ
पसंद
पसंद
33:42
Judy is an expert Wealth Advisor who specializes in guiding high-net-worth individuals through life's transitions (e.g. divorce, sale of a business, or significant inheritance.) If you or someone you know is undergoing a significant transition, this episode is a must listen.द्वारा Dunham Biles, Jeremy Wilson
…
continue reading
1
Run Your Security Program Like an Election Campaign - Kush Sharma - BSW #367
1:05:11
1:05:11
बाद में चलाएं
बाद में चलाएं
सूचियाँ
पसंद
पसंद
1:05:11
Does the CISO need to act like a politician? Negotiating budgets, communicating risks, and selling your strategy across the organization does sound a little like a politician. And if that's the case, are you hiring the right campaign staff? Kush Sharma, former CISO for CPR, City of Toronto, and Saputo, joins Business Security Weekly to discuss why …
…
continue reading
1
Hidden Pasadena: The Children of the Liberator
26:08
26:08
बाद में चलाएं
बाद में चलाएं
सूचियाँ
पसंद
पसंद
26:08
After the Civil War, many of the children of the anti-slavery crusader who attempted to raid Harper’s Ferry, John Brown, sought new lives and peace in the far West, including Pasadena. This episode shares the story of the Brown brothers and their sister, the recent activism surrounding preserving local post-Civil War era sites, and why this history…
…
continue reading
It has been found at the top of Mount Everest, the bottom of the ocean, and even inside the human body: plastic, once revered as a modern miracle, is now a global threat. Minimally recycled, it never fully disappears; instead, it simply breaks down into tiny particles called microplastics, which contaminate the air we breathe and the water we drink…
…
continue reading
1
Danielle Barnes: Empowering Girls One Cookie at a Time
34:22
34:22
बाद में चलाएं
बाद में चलाएं
सूचियाँ
पसंद
पसंद
34:22
Girl Scouts of Middle Tennessee CEO and President Danielle Barnes discusses the role of the organization in developing the leadership skills in members and her role making that happen.
…
continue reading
Automated tank gauges are leaking more than just fuel, while CUPS is serving up a steaming hot brew of vulnerabilities. Meanwhile, Supermicro's BMC firmware is giving away root access like it's going out of style. If you thought your Kia was safe, think again - all it takes is a license plate and 30 seconds to turn your car into a hacker's joyride.…
…
continue reading
1
Perfctl, Pig Butchering, Ivanti, Zimbra, BabyLockerKZ, AI gone Wild, Aaran Leyland... - SWN #419
32:36
32:36
बाद में चलाएं
बाद में चलाएं
सूचियाँ
पसंद
पसंद
32:36
Perfctl, Warm Cookie, Pig Butchering, Ivanti, Zimbra, BabyLockerKZ, AI gone Wild, Aaran Leyland, and More, on this edition of the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-419
…
continue reading
1
10. The Fractional Operating System: A Formula for Wellbeing and Efficiency ft. LaBrent Speed
31:21
31:21
बाद में चलाएं
बाद में चलाएं
सूचियाँ
पसंद
पसंद
31:21
Join LaBrent Speed and Jeff Eddy as they delve into the fractional operating system designed to enhance your well-being and efficiency. Learn how to implement this innovative formula to streamline your operations, reduce stress, and achieve a balanced, productive work life. Register now for FRAK 2024! www.fractionalconference.com!…
…
continue reading
1
Cybersecurity Career Paths: from touring musician to purple teaming at Meta - Neko Papez, Brian Contos, Jayson Grace - ESW #378
2:14:25
2:14:25
बाद में चलाएं
बाद में चलाएं
सूचियाँ
पसंद
पसंद
2:14:25
Our latest in a series of interviews discussing cybersecurity career paths, today we talk to Jayson Grace his path into cybersecurity and his experience building red teams at national labs and purple teams at Meta. We also talk about his community impact, giving talks and building open source tools. Jayson just left Meta for an AI safety startup na…
…
continue reading
1
Analyzing Malware at Scale - John Hammond - PSW #845
3:07:23
3:07:23
बाद में चलाएं
बाद में चलाएं
सूचियाँ
पसंद
पसंद
3:07:23
This episode of Paul Security Weekly features John Hammond, a senior security researcher from Huntress, discussing malware analysis. Hammond dives into the analysis of Ocean Lotus attacks, highlighting the use of stealthy techniques like alternate data streams and DLL side-loading. The conversation also touches on the challenges of combating attack…
…
continue reading
1
Analyzing Malware at Scale - John Hammond - PSW #845
3:07:23
3:07:23
बाद में चलाएं
बाद में चलाएं
सूचियाँ
पसंद
पसंद
3:07:23
This episode of Paul Security Weekly features John Hammond, a senior security researcher from Huntress, discussing malware analysis. Hammond dives into the analysis of Ocean Lotus attacks, highlighting the use of stealthy techniques like alternate data streams and DLL side-loading. The conversation also touches on the challenges of combating attack…
…
continue reading
1
More Car Hacks, CUPS Vulns, Microsoft's SFI, Memory Safety, Password Complexity - Farshad Abasi - ASW #301
45:57
45:57
बाद में चलाएं
बाद में चलाएं
सूचियाँ
पसंद
पसंद
45:57
More remote car control via web interfaces, an RCE in CUPS, Microsoft reduces attack surface, migrating to memory safety, dealing with dependency confusion, getting rid of password strength calculators, and more! Visit https://www.securityweekly.com/asw for all the latest episodes! Show Notes: https://securityweekly.com/asw-301…
…
continue reading
1
Analyzing Malware at Scale - John Hammond - PSW #845
1:03:12
1:03:12
बाद में चलाएं
बाद में चलाएं
सूचियाँ
पसंद
पसंद
1:03:12
This episode of Paul Security Weekly features John Hammond, a senior security researcher from Huntress, discussing malware analysis. Hammond dives into the analysis of Ocean Lotus attacks, highlighting the use of stealthy techniques like alternate data streams and DLL side-loading. The conversation also touches on the challenges of combating attack…
…
continue reading
1
Death Stars, Recall, Microsoft, Brocade, AI, Josh Marpet, and more... - SWN #418
29:19
29:19
बाद में चलाएं
बाद में चलाएं
सूचियाँ
पसंद
पसंद
29:19
Death Stars are not real or are they?, Recall, Microsoft, Brocade, AI and More and More AI, Josh Marpet, and more on the Cyber Security News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-418
…
continue reading
1
The Beast of Brunei, Giant Grasshoppers - Bugging Out - 166
1:11:37
1:11:37
बाद में चलाएं
बाद में चलाएं
सूचियाँ
पसंद
पसंद
1:11:37
This week, we're talking bugs, hoaxes, and technical difficulties. Merch: https://www.etsy.com/shop/cryptopediamerch Discord: https://discord.gg/AWpen8aYQG Patreon: https://www.patreon.com/user?u=14015340 YouTube (Videos have [questionable] captions!): http://youtube.cryptopediacast.com/ --- Spotting | Project Noah The Beast of Brunei ShukerNature:…
…
continue reading
1
How to Attain Zero Trust - Rob Allen - BSW #366
57:58
57:58
बाद में चलाएं
बाद में चलाएं
सूचियाँ
पसंद
पसंद
57:58
The zero-trust security model has been billed as an ultra-safe defense against emerging, unrecognized and well-known threats. Unlike perimeter security, it doesn't assume people inside an organization are automatically safe. Instead, it requires every user and device -- inside and out -- to be authorized before any access is granted. Sounds enticin…
…
continue reading
What is the oldest structure in the San Gabriel Valley? This episode shares the story of The Shoya House, a 3,000 square-foot home that made a 6,000 mile journey from Japan to Pasadena’s Huntington Library. Now a part of the library’s collection, it fits not only onto the landscape at The Huntington, but serves as a tangible architectural expressio…
…
continue reading
1
Passwords, CUPS, KIA, Gilbert Gottfried, Salt Typhoon, Rob Allen from ThreatLocker... - Rob Allen - SWN #417
33:04
33:04
बाद में चलाएं
बाद में चलाएं
सूचियाँ
पसंद
पसंद
33:04
Passwords, CUPS, KIA, Gilbert Gottfried, Salt Typhoon, Rob Allen from ThreatLocker, and More on the Security Weekly News. Segment Resources: https://www.bleepingcomputer.com/news/security/hackers-deploy-ai-written-malware-in-targeted-attacks/ This segment is sponsored by ThreatLocker. Visit https://securityweekly.com/threatlocker to learn more abou…
…
continue reading
1
SIEM: Shakeup in Event Management - What's Happening in the SIEM market today? - Jason Shockey, Seth Goldhammer - ESW #377
1:59:45
1:59:45
बाद में चलाएं
बाद में चलाएं
सूचियाँ
पसंद
पसंद
1:59:45
The SIEM market has undergone some significant changes this summer. This is a great opportunity to talk about the current state of SIEM! In this conversation, we'll discuss: market changes and terminology: security analytics, data lakes, SIEM what is SOAR's role in the current SIEM market? machine learning and generative AI's role strategies for im…
…
continue reading