show episodes
 
This podcast is for all the moms and dads out there who struggle with life’s topics as they are related to family and finances. Our hope is we can provide our thoughts, successes and mistakes and share them with all of you. Please check us out at: financialdads.com
  continue reading
 
Fighters Sean Fagan and Paul Banasiak cover all aspects of Muay Thai. They discuss training in Thailand, fighting strategies, upcoming fight cards and much more! If you're a fan, fighter or full-fledged Muay Thai addict, this podcast was made for you!
  continue reading
 
The Application Security Weekly podcast delivers interviews and news from the worlds of AppSec, DevOps, DevSecOps, and all the other ways people find and fix software flaws. Join hosts Mike Shema and John Kinsella on a journey through modern cybersecurity practices for applications, clouds, containers, and more.
  continue reading
 
Artwork
 
Can Marketing Save the Planet? It’s a big question, and one our podcast sets out to explore with marketers, senior leaders, CMOs and sustainability consultants and experts. Our purpose is to drive education, share best practice, inspire and empower listeners to ask questions and importantly… start taking action. Sitting at the heart of brand, communications, stakeholders and product development, marketers have a significant role to play when it comes to promoting and driving sustainability. ...
  continue reading
 
“Creative thinking takes place neither inside the box nor outside the box, but at the edge of the box.” Free-flowing, long-form conversations about marketing, branding, innovation, consumer behaviour and trends. Conversations that ignite new ideas. Ideas with rough, sharp edges ! These conversations with thought leaders discuss best practices, trends, case studies and insights on topics ranging from strategy planning, brand building, marketing strategy, communication strategy, digital market ...
  continue reading
 
Loading …
show series
 
Los Angeles author Carol Mithers discusses her new book, "Rethinking Rescue," which explores a groundbreaking approach to animal welfare pioneered by Lori Weise, the founder of L.A.’s Downtown Dog Rescue. Known as the "Dog Lady," Weiss focuses on preventing pets from entering shelters by addressing the root causes of surrender, particularly in unde…
  continue reading
 
Check out this interview from the ASW Vault, hand picked by main host Mike Shema! This segment was originally published on May 9, 2023. What does software resilience mean? Why is status quo application security unfit for the modern era of software? How can we move from security theater to security chaos engineering? This segment answers these quest…
  continue reading
 
Patt Morrison, a veteran Los Angeles journalist and Pulitzer Prize winner, takes us on a journey through the city's ever-evolving landscape. With over five decades of experience chronicling L.A. across print, television, and radio, Morrison shares unique insights into the city's transformation, from its complex power structures to its diverse commu…
  continue reading
 
In the final episode of our ‘greening your marketing activity’ mini-series, we caught up with some of our original guests to the podcast, Ollie Deane and Guy Jones from The GoodNet, the ethical intelligence company, focusing on helping ethical brands and products grow. The Goodnet firmly believe that advertising can do good in the world and, we agr…
  continue reading
 
Research by Orange Tsai into Apache HTTPD's architecture reveals several vulns, NCC Group shows techniques for hacking IoT devices with Sonos speakers, finding use cases for WebAssembly, Slack's AI leaks data, DARPA wants a future of Rust, and more! Show Notes: https://securityweekly.com/asw-297
  continue reading
 
IoT devices are notorious for weak designs, insecure implementations, and a lifecycle that mostly ignores patching. We look at external factors that might lead to change, like the FCC's cybersecurity labeling for IoT. We explore the constraints that often influence poor security on these devices, whether those constraints are as consequential given…
  continue reading
 
Karuna, an entrepreneurial brand builder, shares her journey with Nature’s Fynd, a company that developed a new protein source from a unique fungus discovered in Yellowstone National Park.1. From Outer Space to Your Plate: The Unlikely Origin of Nature’s FyndNature’s Fynd’s story began with a NASA research project aimed at understanding how life co…
  continue reading
 
Roger BelAir and Dan Ostroff are bringing hope to California's toughest prisons through an unlikely source: pickleball. Their upcoming documentary, "Pickleball in Prison," explores how the simple paddle sport is transforming life behind bars, bridging gaps between inmates and staff, and fostering teamwork in high-security environments. From San Que…
  continue reading
 
As development cycles shorten and more responsibilities shift to developers, application security (AppSec) is rapidly evolving. Organizations are increasingly building mature programs that automate and enhance AppSec, moving beyond manual processes. In this discussion, we explore how organizations are adapting their AppSec practices, highlighting t…
  continue reading
 
This week, Jeff Pollard and Allie Mellen join us to discuss the fallout and lessons learned from the CrowdStrike fiasco. They explore the reasons behind running in the kernel, the challenges of software quality, and the distinction between a security incident and an IT incident. They also touch on the need to reduce the attack surface and the impor…
  continue reading
 
“When it comes to including sustainability in events - we’re finding the focus on sustainability is increasingly part of the client brief.” As we continue with our greening your marketing activity mini-series, we wanted to turn our attention to events. Events can be fun, they allow us to learn and connect, but they also come with a considerable foo…
  continue reading
 
In complex software ecosystems, individual application risks are compounded. When it comes to mitigating supply chain risk, identifying backdoors or unintended vulnerabilities that can be exploited in your environment is just as critical as staying current with the latest hacking intel. Understand how to spot and reduce the risk to your environment…
  continue reading
 
Startups and small orgs don't have the luxury of massive budgets and large teams. How do you choose an appsec approach that complements a startup's needs while keeping it secure. Kalyani Pawar shares her experience at different ends of an appsec maturity spectrum. Show Notes: https://securityweekly.com/asw-295…
  continue reading
 
Zoë Bernard's recent story in Vanity Fair looks at El Segundo, California's emerging tech scene, where young entrepreneurs are rejecting Silicon Valley's software focus in favor of hard tech and defense tech. These predominantly male founders emphasize bro culture, patriotism, religion, and traditional values while developing drones, nuclear reacto…
  continue reading
 
Even though Security Champions programs look very different across organizations and maturity levels, they share core principles for becoming successful. Marisa shares her experience in building these programs to foster a positive security culture within companies. She explains the incentives and rewards that lead to more engagement from champions …
  continue reading
 
Kevin Fagan, a veteran San Francisco Chronicle reporter, discusses the state's evolving homelessness crisis. After the Supreme Court's recent Grants Pass decision, cities are taking more aggressive action on encampment sweeps. Fagan explores these sweeps, the state of homelessness, and the political implications as elections approach. With decades …
  continue reading
 
“There's something like 7.5 million data centers around the world now, and most of them are still powered by coal and gas. One of the easiest things you can do is move your hosting.” Welcome back to the second part in our mini-series on ‘greening your marketing activities’ and this episode we explored smarter, greener websites with Sepas Seraj, Fou…
  continue reading
 
Modern appsec isn't modern because security tools got shifted in one direction or another, or because teams are finding and fixing more vulns. It's modern because appsec is meeting developer needs and supporting the business. Paul Davis talks about how AI is (and isn't) changing appsec, the KPIs that reflect outcomes rather than being busy, and the…
  continue reading
 
Caroline Paul's youthful adventures began as one of the first women to join the San Francisco Fire Department back in 1989, a story she recounts in her bestselling memoir, "Fighting Fire." In her latest book, "Tough Broad: From Boogie Boarding to Wing Walking — How Outdoor Adventure Improves Our Lives as We Age," Paul demonstrates how a lifelong re…
  continue reading
 
Generative AI has produced impressive chatbots and content generation, but however fun or impressive those might be, they don't always translate to value for appsec. Allie brings some realistic expectations to how genAI is used by attackers and can be useful to defenders. Segment resources: https://www.forrester.com/blogs/generative-ai-will-not-ful…
  continue reading
 
Have you ever considered the carbon footprint of your email activity? Welcome to the first in our ‘greening your marketing activity’ mini-series! Did you know that your digital activity has a carbon footprint? Are you aware that there are better choices you can make which mean your marketing activity is greener and more sustainable, without comprom…
  continue reading
 
How can LLMs be valuable to developers as an assistant in finding and fixing insecure code? There are a lot of implications in trusting AI or LLMs to not only find vulns, but in producing code that fixes an underlying problem without changing an app's intended behavior. Stuart McClure explains how combining LLMs with agents and RAGs helps make AI-i…
  continue reading
 
Dr. Zak shares his findings on how immersion can be used to create better ads, improve training and education, and even enhance personal well-being. Dr. Paul J. Zak is a Professor of economics, psychology and management at Claremont Graduate University. His newest book is Immersion: The Science of the Extraordinary and Source of Happiness. Highligh…
  continue reading
 
Sara Fenske Bahat, the former interim chief executive of San Francisco's Yerba Buena Center for the Arts, explores the interplay between art, politics, and institutional responsibility. Bahat, who is Jewish, explains the museum's mission and history leading up to a crisis in February involving pro-Palestinian protests, questions of free speech, and…
  continue reading
 
Sandy Carielli and Janet Worthington, authors of the State Of Application Security 2024 report, join us to discuss their findings on trends this year! Old vulns, more bots, and more targeted supply chain attacks -- we should be better at this by now. We talk about where secure design fits into all this why appsec needs to accelerate to ludicrous sp…
  continue reading
 
Every other breath you take comes from the ocean … How much thought do you give to the products you use to clean your home? We recently took a metaphorical deep dive with Amanda Horn into her love of the ocean as part of World Ocean Day and Ocean Week (in Canada), and how important the ocean and water is to our lives. Following our chat with Amanda…
  continue reading
 
José Vadi, author of "Chipped: Writing from a Skateboarder's Lens," explores skateboarding as a unique window into California culture, both northern and southern. He discusses how skating serves as a form of self-empowerment and artistic expression, intertwining with music and writing. Vadi examines skateboarding's evolution from a rebellious subcu…
  continue reading
 
OAuth 2.0 is more than just a single spec and it's used to protect more than just APIs. We talk about challenges in maintaining a spec over a decade of changing technologies and new threat models. Not only can OAuth be challenging to secure by default, but it's not even always inter-operable. Segment Resources: https://oauth.net/2.1 https://oauth.n…
  continue reading
 
Loading …

Quick Reference Guide