We’ve done some revamping over here on the podcast transforming Eat Play Sex into Sex Love Psychedelics. Sex Love Psychedelics with Dr Cat Meyer will stimulate + titilate your brain with all of the psycho-sexual conversations + guest experts to answer your curiosities on sex, love, and the psyche. Whether we are analyzing the complexities of love, giving tips on energetic orgasms, or getting off on the latest research in psychedelics, it’s going to be a very WILD + expansive experience for u ...
…
continue reading
A pause out of our busy lives to reconnect with our wild + erotic. Because sometimes we forget + could use a tantalizing reminder. Dr. Cat Meyer pleasures our ears with sweet + sultry poetic pleasures that will leave us feeling intoxicated with desire.
…
continue reading
Lessons of Love, Courage, and Intuition with Kevin Crenshaw. Including guest relationship experts and inspirational couples as they share their stories and wisdom. This world is so disconnected, this podcast is meant to connect.
…
continue reading
We are just two weirdos in love. We are open/poly, swingers, kinky, and dont give a fuck what people think of us. We make our alternative relationship work for us and it is the best choice for us. Find out how it can actually be normal to not have a "normal" monogamous white picket fence relationship like society has drilled into us from the day we were born. There are no written rules on how to have a successful relationship. You make your own guidelines, and we're just sharing ours.
…
continue reading
Join Banana Jane Garnett's adventures into the salacious and the spiritual, including talks with idiosyncratic healers — like the psychic who talks to both sides of congress, the hairdresser who discovered she could talk with dead people through sister braids, the death doula who uses 5 MEO DMT to release spirits, the former Meth addict artist who was healed by Iboga, a Tantric sex-cult leader, and a Trans sex worker with surprising insights into what people are really looking for. Throughou ...
…
continue reading
The insatiably curious sexologist and psychotherapist Kelly McDonnell-Arnold hosts this playful and intellectually thought-provoking podcast bringing you next level education on sexuality, intimacy, and relationships. It’s time to elevate the conversation around sex and say what no one else is willing to, but everyone is thinking. Welcome to Higher Sex.
…
continue reading
Hosted by Zach Leary, the intent of the podcast is to bring you the listener an easily accessible resource for a variety of topics all related to psychedelic research. There is a lot to learn about new research into the therapeutic potential of psychedelics and marijuana. Over the years, the Multidisciplinary Association for Psychedelic Studies (MAPS) has amassed an incredible treasure trove of audio archives sourced from the amazing talks, presentations and panels that have taken place at p ...
…
continue reading
This feed includes all episodes of Paul's Security Weekly, Enterprise Security Weekly, Business Security Weekly, Application Security Weekly, and Security Weekly News! Your one-stop shop for all things Security Weekly!
…
continue reading
This feed includes all episodes of Paul's Security Weekly, Enterprise Security Weekly, Business Security Weekly, Application Security Weekly, and Security Weekly News! Your one-stop shop for all things Security Weekly!
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Solving the Complexities of Cyber Insurance for SMBs - Brian Fritton - BSW #356
35:29
35:29
Play later
Play later
Lists
Like
Liked
35:29
Cyber insurance underwriting is all over the map. With such a variation in application requirements, how should small and medium businesses prepare to receive the best policy for the price? Brian Fritton joins Business Security Weekly to discuss a systematic approach to preparing for cyber insurance. By working with the underwriters, this approach …
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Solving the Complexities of Cyber Insurance for SMBs - Brian Fritton - BSW #356
1:06:15
1:06:15
Play later
Play later
Lists
Like
Liked
1:06:15
Cyber insurance underwriting is all over the map. With such a variation in application requirements, how should small and medium businesses prepare to receive the best policy for the price? Brian Fritton joins Business Security Weekly to discuss a systematic approach to preparing for cyber insurance. By working with the underwriters, this approach …
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Heartbreak Survival Guide w/ Cole Zesiger
52:14
52:14
Play later
Play later
Lists
Like
Liked
52:14
Cole Zesiger (@coachcolezesiger) and Kevin Crenshaw discuss heartbreak, Navigating the "what if"s, Grief, no contact, how to ACTUALLY move on, and so much more...This truly is your survival guide for Breakups
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Autobahn, APT 40, Meliorator, RADIUS, AT&T, Apple, Josh Marpet, and More... - SWN #397
34:19
34:19
Play later
Play later
Lists
Like
Liked
34:19
Wir fahren auf der AutoBahn, APT 40, Meliorator, RADIUS, AT&T, Apple, Josh Marpet, and More on the Security Weekly News. Show Notes: https://securityweekly.com/swn-397
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Autobahn, APT 40, Meliorator, RADIUS, AT&T, Apple, Josh Marpet, and More... - SWN #397
34:19
34:19
Play later
Play later
Lists
Like
Liked
34:19
Wir fahren auf der AutoBahn, APT 40, Meliorator, RADIUS, AT&T, Apple, Josh Marpet, and More on the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-397
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Joiners, Movers, Leavers, and Failures: Why is Identity Management Still Struggling? - Henrique Teixeira - ESW #367
1:31:28
1:31:28
Play later
Play later
Lists
Like
Liked
1:31:28
I'm always thrilled to chat with ex-analysts, and Henrique Teixeira can cover a lot of ground with us on the topic of identity management and governance. The more I talk to folks about IAM/IGA, the more I'm shocked at how little has changed. If anything, it seems like we've gone backwards a bit, with the addition of cloud SaaS, mobile devices, and …
…
continue reading
![Artwork](/static/images/128pixel.png)
1
More Vulnerability Shenanigans - PSW #834
2:21:14
2:21:14
Play later
Play later
Lists
Like
Liked
2:21:14
Bats in your headset, Windows Wifi driver vulnerabilities, Logitech's dongles, lighthttpd is heavy with vulnerabilities, node-ip's not vulnerability, New Intel CPU non-attacks, Blast Radius, Flipper Zero alternatives, will OpenSSH be exploited, emergency Juniper patches, and the D-Link botnet grows. Show Notes: https://securityweekly.com/psw-834…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Rockyou2024 is a scam, Google has a whoopsie, and AI is giving folks indigestion - ESW #367
58:01
58:01
Play later
Play later
Lists
Like
Liked
58:01
In this week's enterprise security news, Seed rounds are getting huge Lots of funding for niche security vendors Rapid7 acquires Noetic Cyber but Rapid7 is also rumored to sell itself! Slack battles infostealers The loss of Chevron deference impacts cyber Should cybersecurity put up a no vacancy sign? Figma and Google both make some embarrassing mi…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Joiners, Movers, Leavers, and Failures: Why is Identity Management Still Struggling? - Henrique Teixeira - ESW #367
33:10
33:10
Play later
Play later
Lists
Like
Liked
33:10
I'm always thrilled to chat with ex-analysts, and Henrique Teixeira can cover a lot of ground with us on the topic of identity management and governance. The more I talk to folks about IAM/IGA, the more I'm shocked at how little has changed. If anything, it seems like we've gone backwards a bit, with the addition of cloud SaaS, mobile devices, and …
…
continue reading
Iceman comes on the show to talk about RFID and NFC hacking including the tools, techniques, and hardware. We'll also talk about the ethics behind the disclosure of vulnerabilities and weaknesses in these systems that are used in everything from building access to cars. Segment Resources: Youtube channel - https://www.youtube.com/@iceman1001 Proxma…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
RFID hacking & More Vulnerability Shenanigans - Iceman - PSW #834
3:30:33
3:30:33
Play later
Play later
Lists
Like
Liked
3:30:33
Bats in your headset, Windows Wifi driver vulnerabilities, Logitech's dongles, lighthttpd is heavy with vulnerabilities, node-ip's not vulnerability, New Intel CPU non-attacks, Blast Radius, Flipper Zero alternatives, will OpenSSH be exploited, emergency Juniper patches, and the D-Link botnet grows. Iceman comes on the show to talk about RFID and N…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
164: Body Objectification, Agency, + the Paradox of our Desires with Suzannah Weiss
1:04:56
1:04:56
Play later
Play later
Lists
Like
Liked
1:04:56
Writer and sexologist Suzannah Weiss joins me to explore sexual empowerment, gender dynamics, and spirituality. We discuss reclaiming personal agency, challenging societal norms, and advocating for self-determination. We delve into consent, boundaries, and the limitations of traditional gender roles in relationships, emphasizing the need for balanc…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Zotac, Eldorado, Donex, Qlins, Ticketmaster, AI, Physical Security, Aaran Leyland... - SWN #396
34:11
34:11
Play later
Play later
Lists
Like
Liked
34:11
Zotac, Eldorado, Donex, Qlins, Ticketmaster, AI, Physical Security, Aaran Leyland, and more, are on this edition of the Security Weekly News. Show Notes: https://securityweekly.com/swn-396
…
continue reading
![Artwork](/static/images/128pixel.png)
1
State Of Application Security 2024 - Sandy Carielli, Janet Worthington - ASW #290
1:12:41
1:12:41
Play later
Play later
Lists
Like
Liked
1:12:41
Sandy Carielli and Janet Worthington, authors of the State Of Application Security 2024 report, join us to discuss their findings on trends this year! Old vulns, more bots, and more targeted supply chain attacks -- we should be better at this by now. We talk about where secure design fits into all this why appsec needs to accelerate to ludicrous sp…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Zotac, Eldorado, Donex, Qlins, Ticketmaster, AI, Physical Security, Aaran Leyland... - SWN #396
34:06
34:06
Play later
Play later
Lists
Like
Liked
34:06
Zotac, Eldorado, Donex, Qlins, Ticketmaster, AI, Physical Security, Aaran Leyland, and more, are on this edition of the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-396
…
continue reading
![Artwork](/static/images/128pixel.png)
1
State Of Application Security 2024 - Sandy Carielli, Janet Worthington - ASW #290
38:12
38:12
Play later
Play later
Lists
Like
Liked
38:12
Sandy Carielli and Janet Worthington, authors of the State Of Application Security 2024 report, join us to discuss their findings on trends this year! Old vulns, more bots, and more targeted supply chain attacks -- we should be better at this by now. We talk about where secure design fits into all this why appsec needs to accelerate to ludicrous sp…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Bringing the Boardroom to the Cyber Battlefield as CISOs Navigate the Role - BSW #355
21:53
21:53
Play later
Play later
Lists
Like
Liked
21:53
In the leadership and communications section, Bringing the boardroom to the cyber battlefield, Navigating the CISO Role: Common Pitfalls for New Leaders, Ask Better Questions to be a Better Leader, and more! Show Notes: https://securityweekly.com/bsw-355
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Polyfill Empties Trust, regreSSHion, CocoaPods Vulns & Secure Design, LLM Bughunters - ASW #290
34:30
34:30
Play later
Play later
Lists
Like
Liked
34:30
Polyfill loses trust after CDN misuse, an OpenSSH flaw reappears, how to talk about secure design from some old CocoaPods vulns, using LLMs to find bugs, Burp Proxy gets more investment, and more! Show Notes: https://securityweekly.com/asw-290
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Technology Rationalization in Cybersecurity - Max Shier - BSW #355
1:00:30
1:00:30
Play later
Play later
Lists
Like
Liked
1:00:30
On average, CISOs manage 50-75 security products. Many of these products have either not been deployed or only partially deployed, while others overlap of products. How do CISOs effectively consolidate their products to a manageable size? Max Shier, Chief Information Security Officer at Optiv Security, joins Business Security Weekly to discuss tech…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Technology Rationalization in Cybersecurity - Max Shier - BSW #355
38:42
38:42
Play later
Play later
Lists
Like
Liked
38:42
On average, CISOs manage 50-75 security products. Many of these products have either not been deployed or only partially deployed, while others overlap of products. How do CISOs effectively consolidate their products to a manageable size? Max Shier, Chief Information Security Officer at Optiv Security, joins Business Security Weekly to discuss tech…
…
continue reading
Preston Smiles shares about his new book "Spiritual Millionaire - The 7 Inner Laws for Abundance and Money", the real real about masculine and feminine energy, and what men and women REALLY need in relationships that isn't happening much in today's culture... and much more! You can find more about Preston @prestonsmiles on IG and prestonsmiles.com/…
…
continue reading
Check out this interview from the SWN Vault, hand picked by main host Doug White! This segment was originally published on July 20, 2017. Doug talks about how to count from zero to one! Show Notes: https://securityweekly.com/vault-swn-18
…
continue reading
Check out this interview from the SWN Vault, hand picked by main host Doug White! This segment was originally published on July 20, 2017. Doug talks about how to count from zero to one! Show Notes: https://securityweekly.com/vault-swn-18
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Hacker Heroes - Joe Grand - PSW Vault
1:43:58
1:43:58
Play later
Play later
Lists
Like
Liked
1:43:58
Exploring the Hardware Hacking Realm with Joe Grand, AKA Kingpin Joe Grand, also known by his hacker pseudonym "Kingpin," stands as a prominent figure in the cybersecurity landscape. With an extensive background in hardware hacking, reverse engineering, and embedded systems, Joe has carved a niche for himself as a respected authority in the field. …
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Hacker Heroes - Joe Grand - PSW Vault
1:43:58
1:43:58
Play later
Play later
Lists
Like
Liked
1:43:58
Exploring the Hardware Hacking Realm with Joe Grand, AKA Kingpin Joe Grand, also known by his hacker pseudonym "Kingpin," stands as a prominent figure in the cybersecurity landscape. With an extensive background in hardware hacking, reverse engineering, and embedded systems, Joe has carved a niche for himself as a respected authority in the field. …
…
continue reading
Check out this interview from the SWN Vault, hand picked by main host Doug White! This Secure Digital Life segment was originally published on March 6, 2017. Have you ever wondered what phishing is? Do you know what spear phishing attacks are? Doug and Russ explain how to protect yourself from phishing scams in the inaugural episode of Secure Digit…
…
continue reading
Check out this interview from the SWN Vault, hand picked by main host Doug White! This Secure Digital Life segment was originally published on March 6, 2017. Have you ever wondered what phishing is? Do you know what spear phishing attacks are? Doug and Russ explain how to protect yourself from phishing scams in the inaugural episode of Secure Digit…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
CISOs 2023 Planning Guide: Forecast The Recession's Impact On Your Program - Jeff Pollard - BSW Vault
33:21
33:21
Play later
Play later
Lists
Like
Liked
33:21
Check out this interview from the BSW Vault, hand picked by main host Matt Alderman! This segment was originally published on October 11, 2022. As 2023 approaches, security leaders are hard at work preparing their budgets, identifying their projects, and setting their priorities for the next twelve months. At the same time, the growth mode days of …
…
continue reading
![Artwork](/static/images/128pixel.png)
1
CISOs 2023 Planning Guide: Forecast The Recession's Impact On Your Program - Jeff Pollard - BSW Vault
33:21
33:21
Play later
Play later
Lists
Like
Liked
33:21
Check out this interview from the BSW Vault, hand picked by main host Matt Alderman! This segment was originally published on October 11, 2022. As 2023 approaches, security leaders are hard at work preparing their budgets, identifying their projects, and setting their priorities for the next twelve months. At the same time, the growth mode days of …
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Is GenAI Having a Rough Time? We check in to see how it's doing. - ESW #366
1:00:24
1:00:24
Play later
Play later
Lists
Like
Liked
1:00:24
We've made a slight tweak to the news format, only focusing on the most interesting funding and acquisition stories. As always, you can go check out Mike Privette's Return on Security newsletter for the full list of funded and acquired companies every week. This week, we discuss two $100M+ rounds, from Huntress and Semperis. We also discuss NetSPI'…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Shifting Cybersecurity Philosophy from Threat-Centric to Compromise-Centric - Martin Roesch - ESW #366
42:32
42:32
Play later
Play later
Lists
Like
Liked
42:32
For decades, security teams have been focused on preventing and detecting threats, only to find themselves buried so deep in alerts, they can't detect anything at all! We clearly need a different approach, which will be the topic of our conversation today with Marty. We'll be discussing a shift in philosophy and tactics. We'll discuss whether SecOp…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
MoveIT, Entrust, Fed Reserve, ISPs, Volt Typhoon & More - SWN #395
29:09
29:09
Play later
Play later
Lists
Like
Liked
29:09
Healthcare and malware, MoveIT, Chrome won't trust Entrust, the discovery of Volt Typhoon, & more on this episode of the Security Weekly News! Segment Resources: https://therecord.media/volt-typhoon-targets-underestimated-cisa-says Show Notes: https://securityweekly.com/swn-395
…
continue reading