show episodes
 
Artwork

1
Speak of the Devils

Brad Denny and Joe Healey

Unsubscribe
Unsubscribe
Weekly+
 
Speak of the Devils is the premier podcast for Arizona State Sun Devil football. Hosted by Brad Denny & Joe Healey, get in-depth analysis of your Sun Devils, interviews with ASU players, coaches, and legends, plus features you won't find anywhere else.
  continue reading
 
Inspired Changemakers Podcast hosted by Julia Healey A Podcast about all the amazing things people are doing to make the world a better place - all about creating change and the moments that inspired our guests to activate. Stay tuned to be inspired!
  continue reading
 
Artwork

1
The Fest Podcast

The Fest Podcast

Unsubscribe
Unsubscribe
Monthly
 
The Fest will give you your ND Country Fest updates and news about other music festivals around the world. While trying to give you some entertaining talk about out what is going on in Luke and Jared's world. Whether that is about BBQ, Live Stream Concerts, Sports or Music. Don't forget our favorite segment Ralphy's Top Three.
  continue reading
 
I'm Louise, a dedicated writer and advocate for health and nutrition especially in the early years. Children today face many dire health predictions, some are based on the food landscape they grow up in. Together we can help to influence the health of a generation as ' when you feed a child, you shape a child'
  continue reading
 
Loading …
show series
 
Suddenly SIEMs are all over the news! In a keynote presentation, Crowdstrike CEO George Kurtz talked about the company's "next-gen" SIEM. Meanwhile, Palo Alto, who was taken to task by some for not having an active presence on the RSAC expo floor, hits the headlines for acquiring IBM's SIEM product, just to shut it down! Meanwhile, LogRhythm and Ex…
  continue reading
 
Has cryptocurrency done more harm than good? Our guest for this segment has some interesting views on its impacts! Vulnrichment (I just like saying that word), Trustworthy Computing Memo V2, SSID confusion, the Flipper Zero accessory for Dads, the state of exploitation, Hackbat, Raspberry PI Connect, leaking VPNs, exploiting faster?, a new Outlook …
  continue reading
 
We kick off the show with a look at the imminent hire of a new athletic director and a rundown of the newest Sun Devil football players and how they fit into a now completed roster. Then we dive into baseball's recent turnaround and discuss whether it will be enough with DevilDigest.com reporter Scott Sandulli (31:25). Finally, we catch up with 202…
  continue reading
 
Everyone is interested in generative AIs and LLMs, and everyone is looking for use cases and apps to apply them to. Just as the early days of the web inspired the original OWASP Top 10 over 20 years ago, the experimentation and adoption of LLMs has inspired a Top 10 list of their own. Sandy Dunn talks about why the list looks so familiar in many wa…
  continue reading
 
In today's enterprises, the Identity Access Management (IAM) System is the key to a business' critical operations. But that IAM environment is more vulnerable than most security executives realize. Segment Resources: https://www.mightyid.com/articles/the-r-in-itdr-the-missing-piece-in-identity-threat-detection-and-response https://www.mightyid.com/…
  continue reading
 
In this RSAC 2024 South Stage Keynote, Mikko Hyppönen will look back at the past decade of ransomware evolution and explore how newer innovations, like AI, are shaping its future. Illuminating the Cybersecurity Path: A Conversation with Jeremiah Grossman Join us for a compelling episode featuring Jeremiah Grossman, a prominent figure in the cyberse…
  continue reading
 
A lot of AI security has nothing to do with AI -- things like data privacy, access controls, and identity are concerns for any new software and in many cases AI concerns look more like old-school API concerns. But...there are still important aspects to AI safety and security, from prompt injection to jailbreaking to authenticity. Caleb Sima explain…
  continue reading
 
Inspired by my co-host Jason Albuquerque, this quarter's Say Easy, Do Hard segment is Train How You Fight. In part 1, we discuss the importance of training for a cyber incident. However, lots of organizations do not take it seriously, causing mistakes during an actual cyber incident. How will the lack of preparation impact your organization during …
  continue reading
 
It's the most boring part of incident response. Skip it at your peril, however. In this interview, we'll talk to Joe Gross about why preparing for incident response is so important. There's SO MUCH to do, we'll spend some time breaking down the different tasks you need to complete long before an incident occurs. Resources 5 Best Practices for Build…
  continue reading
 
The Security Weekly crew discusses some of the latest articles and research in cryptography and some background relevant subtopics including the race against quantum computing, key management, creating your own crypto, selecting the right crypto and more! https://www.globalsecuritymag.com/keysight-introduces-testing-capabilities-to-strengthen-post-…
  continue reading
 
Companies deploy tools (usually lots of tools) to address different threats to supply chain security. Melinda Marks shares some of the chaos those companies still face when trying to prioritize investments, measure risk, and scale their solutions to keep pace with their development. Not only are companies still figuring out supply chain, but now th…
  continue reading
 
A hybrid workforce requires hybrid identity protection. But what are the threats facing a hybrid workforce? As identity becomes the new perimeter, we need to understand the attacks that can allow attackers access to our applications. Eric Woodruff, Product Technical Specialist at Semperis, joins Business Security Weekly to discuss those attacks, in…
  continue reading
 
On February 27, 2024, PCAST (President’s Council of Advisors on Science and Technology) sent a report to the President with recommendations to bolster the resilience and adaptability of the nation’s cyber-physical infrastructure resources. Phil was part of the team that worked on the report and comes on the show to talk about what was recommended a…
  continue reading
 
A clear pattern with startups getting funding this week are "autonomous" products and features. Automated detection engineering Autonomously map and predict malicious infrastructure ..."helps your workforce resolve their own security issues autonomously" automated remediation automated compliance management & reporting I'll believe it when I see it…
  continue reading
 
How can open source projects find a funding model that works for them? What are the implications with different sources of funding? Simon Bennetts talks about his stewardship of Zed Attack Proxy and its journey from OWASP to OpenSSF to an Open Source Fellowship with Crash Override. Mark Curphy adds how his experience with OWASP and the appsec commu…
  continue reading
 
Since 2016, we been hearing about the impending impact of CMMC. But so far, it's only been words. That looks to be changing. Edward Tourinsky, Founder & Managing Principal at DTS, joins Business Security Weekly to discuss the coming impact of CMMC v3. Edward will cover: The background of CMMC Standardization of CMMC CMMC v3 changes and implementati…
  continue reading
 
One year can change everything. Such was the case with Dashaun Mallory. After several years at Michigan State, Dashaun came to Arizona State and flourished. Lifted up by the confidence the staff had in him, he became a key contributor along the defensive line for the Sun Devils and a key leader in the locker room. As he prepares for the NFL, Dashau…
  continue reading
 
Four down, one to go. ASU wrapped up their fourth week of spring ball with what Kenny Dillingham called the best practice of the spring. Get a full recap of the action, learn who Dillingham said would start at QB if the season ended today, hear from DE Clayton Smith, CB Rodney Bimage, and C Leif Fautanu, and get analysis on the spring's stars and r…
  continue reading
 
Protecting a normal enterprise environment is already difficult. What must it be like protecting a sports team? From the stadium to merch sales to protecting team strategies and even the players - securing an professional sports team and its brand is a cybersecurity challenge on a whole different level. In this interview, we'll talk to Joe McMann a…
  continue reading
 
Version 4.0 of the Payment Card Industry Data Security Standard (PCI DSS) puts greater emphasis on application security than did previous versions of the standard. It also adds a new “customized approach” option that allows merchants and other entities to come up with their own ways to comply with requirements, and which also has implications for a…
  continue reading
 
A notable return, a marquee hire, and position battles heating up. Week 3 of ASU's spring practice held a lot. After a look at the news, hear from new ASU wide receivers coach and Super Bowl XL MVP Hines Ward (11:18). Then after a chat with ASU's newest 2025 commit Xavier Skowron (35:39), we recap the latest moves and developments from spring pract…
  continue reading
 
Loading …

Quick Reference Guide