Download the App!
show episodes
 
Artwork

1
Twin Trouble

Jeremy and Jason Hammond

Unsubscribe
Unsubscribe
मासिक
 
Twin Trouble - a podcast featuring Jason and Jeremy Hammond about prison abolition, information activism, and resistance to the state and capitalism. Contact: email twins@twintrouble.net - Twitter - @freejeremynet
  continue reading
 
Artwork

1
SpyCast

SpyCast

Unsubscribe
Unsubscribe
साप्ताहिक
 
TOP SECRET Personal Attention, SpyCast Listeners Known to be the podcast real spies listen to -(STOP)- eavesdrop on conversations with high level sources from around the world -(STOP)- spychiefs molehunters defectors covert operators analysts cyberwarriors and researchers debriefed by SPY Historian Hammond -(STOP) stories secrets tradecraft and technology discussed -(STOP)- HUMINT SIGINT OSINT IMINT GEOINT and more -(STOP)- rumored to be professional education internal communication and publ ...
  continue reading
 
An Anaheim Ducks Podcast covering the Ducks and the NHL on a game-by-game basis. The Forever Mighty Podcast is hosted by four lifelong Anaheim Ducks fans: Patrick Mahoney, Jason Lamb, Stephen Dohner and Eddy Jones. The Forever Mighty Podcast, as it sounds, covers the Anaheim Ducks on a game-by-game basis. An in-depth analysis on everything surrounding the Anaheim Ducks that has featured guests from all different facets of the game, including: Max Jones, Trevor Zegras, Rich Hammond, Rickard G ...
  continue reading
 
Artwork

1
Despicable Me

Universal Pictures

Unsubscribe
Unsubscribe
रोज+
 
Get ready for a minion laughs in the funniest blockbuster hit of the year! Vying for the title of "World's Greatest Villain", Gru (voiced by Steve Carell) – along with his hilarious crew of mischievous minions – plots to pull off the craziest crime of the century: steal the moon! But when Gru enlists the help of three little girls, they see something in him nobody else has ever seen: the perfect dad. From executive producer Chris Meledandri (Horton Hears a Who, Ice Age), and featuring the vo ...
  continue reading
 
Artwork

1
Center for AI Policy Podcast

Center for AI Policy

Unsubscribe
Unsubscribe
मासिक
 
The Center for AI Policy Podcast zooms into the strategic landscape of AI and unpacks its implications for US policy. This podcast is a publication from the Center for AI Policy (CAIP), a nonpartisan research organization dedicated to mitigating the catastrophic risks of AI through policy development and advocacy. Operating out of Washington, DC, CAIP works to ensure AI is developed and implemented with the highest safety standards.
  continue reading
 
Welcome to the Security Weekly Podcast Network, your all-in-one source for the latest in cybersecurity! This feed features a diverse lineup of shows, including Application Security Weekly, Business Security Weekly, Paul's Security Weekly, Enterprise Security Weekly, and Security Weekly News. Whether you're a cybersecurity professional, business leader, or tech enthusiast, we cover all angles of the cybersecurity landscape. Tune in for in-depth panel discussions, expert guest interviews, and ...
  continue reading
 
Welcome to the Security Weekly Podcast Network, your all-in-one source for the latest in cybersecurity! This feed features a diverse lineup of shows, including Application Security Weekly, Business Security Weekly, Paul's Security Weekly, Enterprise Security Weekly, and Security Weekly News. Whether you're a cybersecurity professional, business leader, or tech enthusiast, we cover all angles of the cybersecurity landscape. Tune in for in-depth panel discussions, expert guest interviews, and ...
  continue reading
 
Artwork

1
Behind The Mission

Duane K. L. France

Unsubscribe
Unsubscribe
साप्ताहिक
 
Because fewer than 7% of Americans have served in uniform, most Americans are unfamiliar with military service and culture. As a result, members of the military and Veteran community are at greater risk for disconnection and lack of belonging with the civilian community. PsychArmor’s mission is to bridge the military-civilian divide by educating and training a Nation. Each week, Duane France, a combat Veteran and Clinical Mental Health Counselor, will dig deep into the stories “Behind The Mi ...
  continue reading
 
Artwork

1
Star Local Media Podcast Network

Star Local Media

Unsubscribe
Unsubscribe
मासिक
 
If you live or work in the booming cities north of Dallas, from Coppell to the west, Frisco and Celina to the north, and down to Mesquite out east, this is the perfect podcast network for you. Star Local Media delivers daily content online to more than 250,000 engaged users every month, and now it has a podcast network for you to enjoy. We have interview episodes to dive deep into community topics, sports shows to highlight the big plays and athletes who are shining bright, and more on the w ...
  continue reading
 
Welcome to We Recover Loudly the podcast. In season one, the mission was to spark conversations about addiction, recovery, and drinking cultures within hospitality. What we found was that these topics are closely linked to much bigger issues that we face in the industry, which truly deserve our attention and a space to be discussed. The podcast has evolved to delve into important matters surrounding addiction and recovery, as well as significant themes like burnout, sexual harassment, gender ...
  continue reading
 
Loading …
show series
 
Google's cookie encryption drama, Microsoft accusing Google of shady antitrust tactics, AI shenanigans, the rejected Defcon talk and hacking traffic lights, vulnerabilities in Realtek SD card readers, the never-ending debate on quantum computing vs. cryptography, backdoors are not secrets and where we are pushing attackers, firmware leakage, more o…
  continue reading
 
We had the pleasure of finally having Dave Lewis on the show to discuss shadow IT and security debt. Dave shared some fascinating insights from his long career in cybersecurity, emphasizing the importance of addressing fundamental security issues and the human aspect of security. We delved into the challenges of managing shadow IT, the complexities…
  continue reading
 
On this episode of the Beyond The Cover podcast, I sit down with Hannah Hammond, a powerhouse in real estate and private lending, a self-made millionaire by 25, and the host of her upcoming podcast, Relentless. But today’s conversation isn’t about money, deals, or accolades; it’s about something deeper. Hannah opens up about her journey through int…
  continue reading
 
Halloween, TikTok Rip Off, Telcos, Win 11, Five Eyes, AWS, France, ChatGPT, and more on the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-426
  continue reading
 
We had the pleasure of finally having Dave Lewis on the show to discuss shadow IT and security debt. Dave shared some fascinating insights from his long career in cybersecurity, emphasizing the importance of addressing fundamental security issues and the human aspect of security. We delved into the challenges of managing shadow IT, the complexities…
  continue reading
 
Generative AI has been the talk of the technology industry for the past 18+ months. Companies are seeing its value, so generative AI budgets are growing. With more and more AI agents expected in the coming years, it’s essential that we are securing how consumers interact with generative AI agents and how developers build AI agents into their apps. …
  continue reading
 
In the leadership and communications segment, The CISO Mindset: A Strategic Guide for Aspiring CEOs and The Board Members, The Top Strategy to Earn More Respect at Work: A Leadership Expert’s Proven Method, The Problem with Mandating Office Presence Without Purpose, and more! Identity continues to be one of the most used attack vectors by cybercrim…
  continue reading
 
Better TLS implementations with Rust, fuzzing, and managing certs, appsec lessons from the everlasting transition to IPv6, LLMs for finding vulns (and whether fuzzing is better), and more! Also check out this presentation from BSides Knoxville that we talked about briefly, https://youtu.be/DLn7Noex_fc?feature=shared Show Notes: https://securityweek…
  continue reading
 
Better TLS implementations with Rust, fuzzing, and managing certs, appsec lessons from the everlasting transition to IPv6, LLMs for finding vulns (and whether fuzzing is better), and more! Also check out this presentation from BSides Knoxville that we talked about briefly, https://youtu.be/DLn7Noex_fc?feature=shared Generative AI has been the talk …
  continue reading
 
Summary Eliot Higgins (X; Wikipedia) joins Andrew (X; LinkedIn) to discuss the work of Bellingcat. Eliot founded the open-source investigative website in 2014. What You’ll Learn Intelligence Bellingcat’s approach to “investigative journalism” The rise of OSINT as a tool of journalism Bellingcat’s relationship with intelligence agencies Case studies…
  continue reading
 
Identity continues to be one of the most used attack vectors by cybercriminals. From phishing to credential stuffing to password spraying – threat actors are finding new ways to infiltrate systems and cause costly problems to companies. David Bradbury, Chief Security Officer at Okta, joins Security Weekly's Mandy Logan to discuss today's threat lan…
  continue reading
 
Show Summary On today’s episode, we’re replaying a PsychArmor Conversations with Caregivers featuring how VSOs can support Caregivers. This conversation was recorded in June of 2023 and featured the host, PsychArmor Trusted Advisor Shaina Purser, having a conversation with Madison Moore, VP of Programs & Partnerships at The Elizabeth Dole Foundatio…
  continue reading
 
In the leadership and communications segment, The CISO Mindset: A Strategic Guide for Aspiring CEOs and The Board Members, The Top Strategy to Earn More Respect at Work: A Leadership Expert’s Proven Method, The Problem with Mandating Office Presence Without Purpose, and more! Show Notes: https://securityweekly.com/bsw-370…
  continue reading
 
Customer Identity is everywhere. It's powering secure experiences for billions - enabling people to check their luggage at the airport, watch their favorite Major League Soccer games, or take their favorite Peloton class. Because it’s everywhere, threat actors now see customer identity as a path to financial gain. Bots now make up nearly 50% of all…
  continue reading
 
The vast majority of the folks working polls and elections are volunteers. This creates a significant training challenge. Not only do they have to learn how to perform a complex and potentially stressful job in a short amount of time (most training is one day or less), cybersecurity-related concerns are usually not included for individual poll loca…
  continue reading
 
Tourist Abuse, Fortis, apps, TLP, AWS, Google, Chatbots, Aaran Leyland, and More, on this edition of the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-425
  continue reading
 
Ever heard someone say, "the attacker only has to be right once, but the defender has to get it right every time"? On this episode, we'll dispel that myth. There is some truth to the saying, but only with regards to initial access to the target's environment. Once on the inside, the attacker's advantage flips to the defender. Call it the 'Home Alon…
  continue reading
 
Ever heard someone say, "the attacker only has to be right once, but the defender has to get it right every time"? On this episode, we'll dispel that myth. There is some truth to the saying, but only with regards to initial access to the target's environment. Once on the inside, the attacker's advantage flips to the defender. Call it the 'Home Alon…
  continue reading
 
This week: The USB Army Knife that won't break the budget, I don't want to say EDR is useless (but there I said it), Paul's list of excellent hacking tips, FortiJump - an RCE that took a while to become public, do malware care if it's on a hypervisor?, MicroPython for fun and not for hacking?, an unspecified vulnerability, can you exploit speculati…
  continue reading
 
Andy drops some Microsoft Windows and 365 knowledge as we discuss the details on how we get to secure by default in our Windows and cloud environments. This week: The USB Army Knife that won't break the budget, I don't want to say EDR is useless (but there I said it), Paul's list of excellent hacking tips, FortiJump - an RCE that took a while to be…
  continue reading
 
In this episode of Beyond The Cover, I was on the other side of the interview this time. AD from AZ Rocket Studios asked me the questions and he didn’t hold back. We took the most popular questions from my social media and went all in—no sugar coating, just real talk. From exploring the power of curiosity to tackling trust issues, we unpacked every…
  continue reading
 
Flaws that arise from inconsistent parsing of JSON and email addresses, CISA's guide to bad software practices, abusing a security disclosure process to take over a WordPress plugin, and more! Show Notes: https://securityweekly.com/asw-304
  continue reading
 
In the leadership and communications section, Joe Sullivan: CEOs must be held accountable for security too, More tech chiefs have success measured by profitability, cost management, Is Your Career Heading in the Right Direction?, and more. Show Notes: https://securityweekly.com/bsw-369
  continue reading
 
Doom on a Human Brain, E2EE, OT, Adload, Cisco, VMware, Internet Archive, Josh Marpet, and more on the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-424
  continue reading
 
Building cloud native apps doesn't mean you're immune to dealing with legacy systems. Cloud services have changed significantly over the last decade, both in the security controls available to them and the sheer volume of services that CSPs provide. Scott Piper shares some history of cloud security, the benefits of account separation, and how ratch…
  continue reading
 
Getting C-Suite execs aligned on cyber resilience and cybersecurity can be a challenge. LevelBlue's recent Futures™️ report sought to uncover the barriers that prevent companies from achieving cyber resilience in the enterprise today. The report not only surveyed C-Suite execs (CIOs, CTOs, and CISOs), but non-C-Suite leaders from engineering and ar…
  continue reading
 
Getting C-Suite execs aligned on cyber resilience and cybersecurity can be a challenge. LevelBlue's recent Futures™️ report sought to uncover the barriers that prevent companies from achieving cyber resilience in the enterprise today. The report not only surveyed C-Suite execs (CIOs, CTOs, and CISOs), but non-C-Suite leaders from engineering and ar…
  continue reading
 
Loading …

त्वरित संदर्भ मार्गदर्शिका