Download the App!
show episodes
 
Artwork
 
Scottish and Irish folk songs combined with the Lord of the Rings music and a wee bit o’Celtic fun. The Brobdingnagian Bards (pronounced brob-din-nahg-EE-en) were The Original Celtic Renaissance music duo from Austin, Texas. Their unique brand of folk music on the autoharp, recorder, and mandolin made them one of the most-popular Celtic music groups online where they continue to give away thousands of free Celtic MP3 downloads daily. From 1999 to 2008, the Brobdingnagian Bards performed coas ...
  continue reading
 
Artwork
 
Join Tommy, Shea and Ross every Thursday where we chat with a variety of different guests from the island of Ireland who have some interesting, insightful and side splitting stories to tell. When we aren’t chatting to guests, we’re chatting to each other about local and general news as well as delving deep in to some interesting topics which we know you’ll find valuable! Follow for even more content: https://linktr.ee/heresthecraic
  continue reading
 
Main Pod Girl is a pop culture podcast hosted by artist and songwriter AJ Marks, with special guests ranging from popstars, hit songwriters, r/popheads team members, high-profile journalists and music content creators, as we talk about our shared love for pop music.
  continue reading
 
Artwork

1
Across the Pond

Lori Feathers & Sam Jordison

Unsubscribe
Unsubscribe
Monthly+
 
Across the Pond is a podcast about the most discussed and anticipated books on both sides of the Atlantic. Texas indie bookstore owner Lori Feathers and UK publisher Sam Jordison bring their unique perspectives on the book business, local literary trends, and author news. In each episode Lori and Sam will also provide a critical take on an important book, discussing how it has been anticipated and received on either side of the pond. Exciting US and UK authors occasionally join Lori and Sam ...
  continue reading
 
Loading …
show series
 
This podcast we chat to Andrew from Start Solar UK and Ireland. He talks us through his joinery on starting his successful, renewable energy business and the major benefits of solar power in Ireland.Follow our Instagram: / heresthecraic Check out our other socials and be sure to listen to our Podcast! https://linktr.ee/heresthecraic…
  continue reading
 
Even though Security Champions programs look very different across organizations and maturity levels, they share core principles for becoming successful. Marisa shares her experience in building these programs to foster a positive security culture within companies. She explains the incentives and rewards that lead to more engagement from champions …
  continue reading
 
Scandal at the Hugo Awards; Do straight guys hate novels?; writer Kazim Ali is our guest to talk about his novel, Indian Winter, Coach House Books' submission for the 2024 Republic of Consciousness Prize, US & Canada. Thank you for listening! If you like what you hear, give us a follow at: X: Across the Pond, Galley Beggar Press, Interabang Books, …
  continue reading
 
Inspired by my co-host Jason Albuquerque, this quarter's Say Easy, Do Hard segment is Job Search Strategies for CISOs. In part 1, we discuss the challenges facing the CISO role and it's hiring. As CISOs leave the role, the position is not necessarily being refilled. How will this impact future CISO hiring? Inspired by my co-host Jason Albuquerque, …
  continue reading
 
Remember 20 years ago? When we were certain SIEMs would grant our cybersecurity teams superpowers? Or 10 years ago, when we were sure that NGAV would put an end to malware as we knew it? Or 15 years ago, when we were sure that application control would put an end to malware as we knew it? Or 18 years ago, when NAC would put an end to unauthorized n…
  continue reading
 
John is one of the foremost experts in UEFI and joins us to talk about PK Fail! What happens when a vendor in the supply chain accidentally loses a key? It's one of the things that keeps me up at night. Well, now my nightmare scenario has come true as a key has been leaked. Learn how and why and what you can do about it in this segment! Hacking tra…
  continue reading
 
This is our July Recap episode of the Here's the Craic Podcast! We chat about everything that happened last month, Armagh winning the all Ireland final, NI athletes burning back gold medals and stories from Tommy's stag do.Follow our Instagram: / heresthecraic Check out our other socials and be sure to listen to our Podcast! https://linktr.ee/heres…
  continue reading
 
Modern appsec isn't modern because security tools got shifted in one direction or another, or because teams are finding and fixing more vulns. It's modern because appsec is meeting developer needs and supporting the business. Paul Davis talks about how AI is (and isn't) changing appsec, the KPIs that reflect outcomes rather than being busy, and the…
  continue reading
 
Identity, the security threat that keeps on giving. For the 17th year in a row, identity is one of the top threats identified in the Verizon DBIR. Why? Dor Fledel, Senior Director of Product Management at Okta and Co-Founder of Spera, joins Business Security Weekly to discuss the challenges of identity and how to solve them. From numerous disparate…
  continue reading
 
The emergence of generative AI has caused us to rethink things on two fronts: how we consume threat detection data, as defenders how we need to shift our thinking and approaches to prepare for attackers' newfound GenAI capabilities But wait - is GenAI even useful for defenders or attackers? We'll dive deep into the state of AI as it pertains to sec…
  continue reading
 
Doug and the Security Weekly crew talk about vulnerabilities, are we patching the right things? This is the burning question. We will try to answer it. Segment Resources: https://blog.sonicwall.com/en-us/2024/04/patch-tuesday-which-vulnerabilities-really-need-prioritizing/ Segment description coming soon!The Crowdstrike incident: what happened and …
  continue reading
 
We have Marina from Aware NI chatting about mental health, anxiety, depression and everything surrounding it. This is a great conversation that has a very important message. If you need any more information on the topic or if you need any help please click these links below. https://aware-ni.org/lets-talk https://aware-ni.org/be-aware https://aware…
  continue reading
 
We're celebrating Brat summer by discussing the art of album rollouts with a roundtable of Rolling Stone Senior Editor Brittany Spanos, Billboard Executive Digital Director Katie Atkinson and freelance journalist Rachel Brodsky! We cover all the big pop releases of this year and former years through the different stages of an album rollout.…
  continue reading
 
Generative AI has produced impressive chatbots and content generation, but however fun or impressive those might be, they don't always translate to value for appsec. Allie brings some realistic expectations to how genAI is used by attackers and can be useful to defenders. Segment resources: https://www.forrester.com/blogs/generative-ai-will-not-ful…
  continue reading
 
Back in April, we covered a story on episode #348 titled "CISO-CEO communication gaps continue to undermine cybersecurity". In that article, Sumedh Thakar, the CEO at Qualys, stated "CISOs must translate technical risks into business impact for CEOs." But he didn't say how. So, we invited him on the show to explain. In this episode, Sumedh walks us…
  continue reading
 
That controversial NYT Top 100 List; should a writer's life affect our appreciation of their work; Sam and Lori love J. L. Carr's A Month in the Country and count the ways! Thank you for listening! If you like what you hear, give us a follow at: X: Across the Pond, Galley Beggar Press, Interabang Books, Lori Feathers, Sam Jordison Instagram: Across…
  continue reading
 
In this episode of Security Weekly News, Dr. Doug White and Josh Marpet delve into the widespread impact of the recent CrowdStrike and Microsoft technical issue, which disrupted various industries, including airlines, DMVs, and hospitals. They discuss the interconnectedness of modern systems, the reliance on automatic updates, and the critical need…
  continue reading
 
In this episode of Enterprise Security Weekly, we revisit the insightful book "Jump-start Your SOC Analyst Career" with authors Jarrett Rodrick and Tyler Wall, exploring updates on career paths, opportunities, and the industry's reality. We delve into the myths versus the truths about cybersecurity careers, discussing the viability of high salaries…
  continue reading
 
Thinking about getting a 3D printer or have one and need a good primer? Check out this segment, we live 3D print a Captain Crunch whistle and talk all about 3D printing for hackers! Segment Resources: Slides used in this segment: https://files.scmagazine.com/wp-content/uploads/2024/07/3D-Printing-for-Hackers.pdf Major 3D Printer Websites: https://v…
  continue reading
 
In this episode of Here's The Craic we speak to Aaron McElhinney, owner of Smart Mortgages. We cover everything from getting onto the property ladder for the first time to buying a second home and buy to let.We learned a lot from Aaron and believe you will too.Check him out in the links belowhttps://www.instagram.com/aaron.mortgageguru/https://beac…
  continue reading
 
How can LLMs be valuable to developers as an assistant in finding and fixing insecure code? There are a lot of implications in trusting AI or LLMs to not only find vulns, but in producing code that fixes an underlying problem without changing an app's intended behavior. Stuart McClure explains how combining LLMs with agents and RAGs helps make AI-i…
  continue reading
 
Cyber insurance underwriting is all over the map. With such a variation in application requirements, how should small and medium businesses prepare to receive the best policy for the price? Brian Fritton joins Business Security Weekly to discuss a systematic approach to preparing for cyber insurance. By working with the underwriters, this approach …
  continue reading
 
I'm always thrilled to chat with ex-analysts, and Henrique Teixeira can cover a lot of ground with us on the topic of identity management and governance. The more I talk to folks about IAM/IGA, the more I'm shocked at how little has changed. If anything, it seems like we've gone backwards a bit, with the addition of cloud SaaS, mobile devices, and …
  continue reading
 
Bats in your headset, Windows Wifi driver vulnerabilities, Logitech's dongles, lighthttpd is heavy with vulnerabilities, node-ip's not vulnerability, New Intel CPU non-attacks, Blast Radius, Flipper Zero alternatives, will OpenSSH be exploited, emergency Juniper patches, and the D-Link botnet grows. Iceman comes on the show to talk about RFID and N…
  continue reading
 
Billboard's very own Jason Lipshutz and Andrew Unterberger join the show to discuss 2024's game-changing breakout stars: Chappell Roan, Sabrina Carpenter, Tommy Richman, Benson Boone, Hozier, Tinashe, Charli XCX and more! Also approaching the midway point of the decade, we cast our ideal Mount Rushmores of early 2020s popstars.…
  continue reading
 
Sandy Carielli and Janet Worthington, authors of the State Of Application Security 2024 report, join us to discuss their findings on trends this year! Old vulns, more bots, and more targeted supply chain attacks -- we should be better at this by now. We talk about where secure design fits into all this why appsec needs to accelerate to ludicrous sp…
  continue reading
 
Librarian superheroes; dog-hair mittens; and we talk to author Sarah Perry about her fascinating new novel, Enlightenment. Thank you for listening! If you like what you hear, give us a follow at: X: Across the Pond, Galley Beggar Press, Interabang Books, Lori Feathers, Sam Jordison Instagram: Across the Pond, Galley Beggar Press, Interabang Books, …
  continue reading
 
On average, CISOs manage 50-75 security products. Many of these products have either not been deployed or only partially deployed, while others overlap of products. How do CISOs effectively consolidate their products to a manageable size? Max Shier, Chief Information Security Officer at Optiv Security, joins Business Security Weekly to discuss tech…
  continue reading
 
Want to know how to get onto the property ladder and start making some money? Well Carley is back on the podcast! Carley (Flipping Belfast) made her name by buying houses, fixing them up and selling them for profit, but what is in store next? Tune in to get some advise on you can start your property flipping journey.Follow our Instagram: / heresthe…
  continue reading
 
Exploring the Hardware Hacking Realm with Joe Grand, AKA Kingpin Joe Grand, also known by his hacker pseudonym "Kingpin," stands as a prominent figure in the cybersecurity landscape. With an extensive background in hardware hacking, reverse engineering, and embedded systems, Joe has carved a niche for himself as a respected authority in the field. …
  continue reading
 
Check out this interview from the SWN Vault, hand picked by main host Doug White! This Secure Digital Life segment was originally published on March 6, 2017. Have you ever wondered what phishing is? Do you know what spear phishing attacks are? Doug and Russ explain how to protect yourself from phishing scams in the inaugural episode of Secure Digit…
  continue reading
 
Check out this interview from the BSW Vault, hand picked by main host Matt Alderman! This segment was originally published on October 11, 2022. As 2023 approaches, security leaders are hard at work preparing their budgets, identifying their projects, and setting their priorities for the next twelve months. At the same time, the growth mode days of …
  continue reading
 
Healthcare and malware, MoveIT, Chrome won't trust Entrust, the discovery of Volt Typhoon, & more on this episode of the Security Weekly News! Segment Resources: https://therecord.media/volt-typhoon-targets-underestimated-cisa-says Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-395…
  continue reading
 
We all might be a little worn out on this topic, but there's no escaping it. Executives want to adopt GenAI and it is being embedded into nearly every software product we use in both our professional and personal lives. In this interview, Anurag joins us to discuss how his company evaluated and ultimately integrated AI-based technologies into their…
  continue reading
 
This may be controversial, however, we've been privately discussing how organizations benefit from penetration testing and vulnerability scanning. Do you still need these services as a critical part of your security program? Can't you just patch stuff that is missing patches? Tune in for a lively debate! Zyxl NAS devices are under attack and the ex…
  continue reading
 
This is our June Recap episode of the Here's the Craic Podcast! We chat about everything that happened last month, everything you can expect in the next few weeks and what happened out there in Vegas?Follow our Instagram: / heresthecraic Check out our other socials and be sure to listen to our Podcast! https://linktr.ee/heresthecraicCheck out Four …
  continue reading
 
With 71% of web traffic coming from API calls last year and the average organization maintaining 613 API endpoints, a robust strategy is needed to protect APIs against automated threats and business logic attacks. Tune in as Luke Babarinde, Global Solution Architect, shares the key steps to building a successful API security strategy. This segment …
  continue reading
 
Loading …

Quick Reference Guide