…
continue reading
Market Pulse is a monthly podcast by Equifax, in partnership with Moody’s Analytics. Equifax hosts bring you interviews with industry experts on the latest economic and credit insights that can help drive better business decisions. Whether you’re in financial, mortgage, auto or another service industry, we help make sense of the latest economic conditions that impact you. This podcast series supplements our Market Pulse webinars, which occur on the first Thursday of each month.
…
continue reading
This is my very interesting podcast about childhood, psychology & growing up.
…
continue reading
Haunting, Purgatory’s premier podcast, shares weekly, real-life paranormal stories told by those who experienced them first-hand. Some will be unsettling... Some unnerving… And some are even downright terrifying! Haunting brings audiences into the story through first-hand accounts and immersive audio, giving listeners the feeling of coming face-to-face with the unexplainable. Hosted by Theresa (Teh-rez-ah), an "influencer" who tragically died before she could get the proverbial "little blue ...
…
continue reading
Behind the scenes of my life and experiences as a mom and mapper in Silicon Valley
…
continue reading
On this podcast, you'll find helpful tips on how to BUY and SELL a house in San Jose, California. Theresa Wellman, with a Mechanical Engineering degree from Santa Clara University, is a California native and has lived in the South Bay since 1995. Once an engineer, always an engineer! Theresa love stats and data. She's very familiar with the local real estate market metrics. Her husband works for Apple Inc so she knows well the intense demands of a Silicon Valley tech job today. Homeowner Exp ...
…
continue reading
Two women. Half the population. Several thousand years of history. About an hour. Join us on an award-winning journey through herstory! The History Chicks celebrates the lives of remarkable women from ancient times to the modern day, exploring women’s history in engaging episodes full of deep research, pop culture references, and the occasional tumble down a rabbit hole.
…
continue reading
Welcome to "The Thea Theresa English Show," a captivating lifestyle podcast that takes you on a journey of personal growth and empowerment. Join host Thea Theresa English as she delves into the realms of personal development, finances, health, career, and relationships.
…
continue reading
Discussing the topics in business, real estate and construction that not everyone talks about
…
continue reading
News Conferences provide information to the media and citizens of Madison, unfiltered and uncut.
…
continue reading
The BIZ Connections podcast is to share the knowledge and wisdom of business owners and entrepreneurs with the audience. I will be interviewing business owners and entrepreneurs to share their unique perspective and story to educate the audience on principles of success. The podcast will be a training tool for individuals, as well as a source of inspiration.
…
continue reading
News, analysis, and insights into enterprise security. We put security vendors under the microscope, and explore the latest trends that can help defenders succeed. Hosted by Adrian Sanabria. Co hosts: Katie Teitler-Santullo, Darwin Salazar.
…
continue reading
The Official Podcast for the Property Masters Guild. Each episode will be a frank discussion with Property Masters discussing the nitty gritty of the craft in all its glory as well as the trials and tribulations, the nuts & bolts of the craft, and conversations with other industry professionals. Nothing is off the table and the table is full. Join us! New episodes drop twice a month. Subscribe to catch them when they drop. Send us your feedback and any topic ideas at Propertymastersguild.org ...
…
continue reading
Reality is not what it used to be. After consensus reality shatters, and humanity evacuates to mysterious sanctuaries known as smart houses, a group of survivors navigate the uncertain future of the Quantum-sphere. John Kenneth Muir, award-winning author of Exploring Space: 1999 and Horror Films of the 1970s, brings to life a unique vision of humanity's future. Enter The House Between, and discover a world in which quantum mechanics, the many-worlds theory, Everett branches, human mutation, ...
…
continue reading
Returning for its long awaited 3rd season, as it was originally intended, The Cerrone Show is a 8 year running, record breaking, award winning podcast interviewing Dope ass people and dope ass nobody's. Hosted by a multi successful entrepreneur, and award winning Las Vegas Special Public Defender
…
continue reading
Welcome to the Security Weekly Podcast Network, your all-in-one source for the latest in cybersecurity! This feed features a diverse lineup of shows, including Application Security Weekly, Business Security Weekly, Paul's Security Weekly, Enterprise Security Weekly, and Security Weekly News. Whether you're a cybersecurity professional, business leader, or tech enthusiast, we cover all angles of the cybersecurity landscape. Tune in for in-depth panel discussions, expert guest interviews, and ...
…
continue reading
In the Holistic Trauma Healing podcast, I share the profound path to healing trauma that allows us to move out of the role of victim and into the role of conscious and empowered creator of our best possible reality through mental, physical, emotional, spiritual, and ancestral trauma healing. Learn how trauma affects every part of your existence and how to weave a new web of life that isn't ruled by the past. The HTH podcast empowers you to heal trauma in the same way it has affected you -- a ...
…
continue reading
1
Planning A Merger Or Acquisition? Ask These Five Cyber Questions First - Craig Davies - BSW #371
1:05:15
1:05:15
Play later
Play later
Lists
Like
Liked
1:05:15
Merger and acquisition (M&A) activity in finally starting to pick up. Although the allure of financial gains and market expansion drives these deals, the digital age demands a rigorous assessment of cybersecurity risks accompanying such mergers. Unanticipated cyber issues, like dormant malware or inconsistent access controls, can transform an ideal…
…
continue reading
Therésa reveals that she applied for a new pet of sorts. But instead of a chic black cat purring on her lap, Therésa was assigned a giant owl as a familiar who wreaks at Haunting HQ. As feathers fly, we dive into Steven's chilling tale: shadowy figures at a secluded religious retreat, nightly visitations, and ghostly encounters that plagued him for…
…
continue reading
1
Recall, Russia, Win 10, Phish n Ships, Midnight Blizzard, Rob Allen, and More... - Rob Allen - SWN #427
36:50
36:50
Play later
Play later
Lists
Like
Liked
36:50
Recall III: the Re-Re-Recalling, Russia, Win 10, Phish n Ships, Midnight Blizzard, Emerald Whale, Rob Allen, and More, on this edition of the Security Weekly News. Segment Resources: https://www.bleepingcomputer.com/news/security/unitedhealth-says-data-of-100-million-stolen-in-change-healthcare-breach/ This segment is sponsored by ThreatLocker. Vis…
…
continue reading
1
What if securing buildings was as easy as your smartphone? - Damon McDougald, Blaine Frederick, Punit Minocha - ESW #382
2:06:19
2:06:19
Play later
Play later
Lists
Like
Liked
2:06:19
The future is here! Imagine if you could get into the office, a datacenter, or even an apartment building as easily as you unlock your smartphone. Alcatraz AI is doing exactly that with technology that works similarly to how smartphones unlock using your face. It works in the dark, if you shave off your beard, and so quickly you don't even need to …
…
continue reading
1
What if securing buildings was as easy as your smartphone? - Damon McDougald, Blaine Frederick, Punit Minocha - ESW #382
2:06:19
2:06:19
Play later
Play later
Lists
Like
Liked
2:06:19
The future is here! Imagine if you could get into the office, a datacenter, or even an apartment building as easily as you unlock your smartphone. Alcatraz AI is doing exactly that with technology that works similarly to how smartphones unlock using your face. It works in the dark, if you shave off your beard, and so quickly you don't even need to …
…
continue reading
1
Shadow IT and Security Debt - Dave Lewis - PSW #849
2:50:27
2:50:27
Play later
Play later
Lists
Like
Liked
2:50:27
We had the pleasure of finally having Dave Lewis on the show to discuss shadow IT and security debt. Dave shared some fascinating insights from his long career in cybersecurity, emphasizing the importance of addressing fundamental security issues and the human aspect of security. We delved into the challenges of managing shadow IT, the complexities…
…
continue reading
1
Halloween, TikTok, Telcos, Win 11, Five Eyes, AWS, France, ChatGPT, and more... - SWN #426
36:50
36:50
Play later
Play later
Lists
Like
Liked
36:50
Halloween, TikTok Rip Off, Telcos, Win 11, Five Eyes, AWS, France, ChatGPT, and more on the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-426
…
continue reading
1
Sarah Winchester and the Winchester Mystery House
1:22:46
1:22:46
Play later
Play later
Lists
Like
Liked
1:22:46
Join us on this Halloween bonus episode as we revisit our 2019 coverage of Sarah Winchester! The Winchester Mystery House has intrigued people for almost a century. Its story has always been a dramatic one, full of ghosts, guns, and desperation - but perhaps there is a simpler explanation buried within the life of Sarah Winchester herself. We would…
…
continue reading
1
The CISO Mindset, Top Strategies, and Mandating Office Presence Without Purpose - David Bradbury, Erin Baudo Felter - BSW #370
1:03:37
1:03:37
Play later
Play later
Lists
Like
Liked
1:03:37
In the leadership and communications segment, The CISO Mindset: A Strategic Guide for Aspiring CEOs and The Board Members, The Top Strategy to Earn More Respect at Work: A Leadership Expert’s Proven Method, The Problem with Mandating Office Presence Without Purpose, and more! Identity continues to be one of the most used attack vectors by cybercrim…
…
continue reading
1
Making TLS More Secure, Lessons from IPv6, LLMs Finding Vulns - Arnab Bose, Shiven Ramji - ASW #305
1:22:48
1:22:48
Play later
Play later
Lists
Like
Liked
1:22:48
Better TLS implementations with Rust, fuzzing, and managing certs, appsec lessons from the everlasting transition to IPv6, LLMs for finding vulns (and whether fuzzing is better), and more! Also check out this presentation from BSides Knoxville that we talked about briefly, https://youtu.be/DLn7Noex_fc?feature=shared Generative AI has been the talk …
…
continue reading
1
'Earl Hays Press, The Worlds Oldest Prop House' with Keith, Martin and Kim - Ep. #41
1:04:41
1:04:41
Play later
Play later
Lists
Like
Liked
1:04:41
Earl Hays Press - The Worlds Oldest Prop House A conversation with Earl Hayes Press Co-Owners Keith Hernandez and Martin Armenta, with Art Department Manager Kim Berens. On this episode of Prop Talk, we sit down with longtime Property Department partners & supporters Earl Hays Press owners to discuss the history behind the oldest prop house in the …
…
continue reading
1
S1: EP 14 — “I Told You, He Didn't Want You to Come In”
28:33
28:33
Play later
Play later
Lists
Like
Liked
28:33
Therésa, preparing for her first Halloween in purgatory reveals her next “brilliant” business idea. Don’t worry, she still introduces us to two chilling sagas, and both are vintage. That’s right; good old-fashioned haunted house stories are sure to keep you up at night. If you would like to reach out to the Haunting team and share your own ghost st…
…
continue reading
1
Tourists, Fortis, apps, TLP, AWS, Google, Chatbots, Aaran Leyland, and More... - SWN #425
35:07
35:07
Play later
Play later
Lists
Like
Liked
35:07
Tourist Abuse, Fortis, apps, TLP, AWS, Google, Chatbots, Aaran Leyland, and More, on this edition of the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-425
…
continue reading
1
Transforming the Defender's Dilemma into the Defender's Advantage - Charlotte Wylie, Bhawna Singh, Lenny Zeltser - ESW #381
1:50:15
1:50:15
Play later
Play later
Lists
Like
Liked
1:50:15
Ever heard someone say, "the attacker only has to be right once, but the defender has to get it right every time"? On this episode, we'll dispel that myth. There is some truth to the saying, but only with regards to initial access to the target's environment. Once on the inside, the attacker's advantage flips to the defender. Call it the 'Home Alon…
…
continue reading
1
Transforming the Defender's Dilemma into the Defender's Advantage - Charlotte Wylie, Bhawna Singh, Lenny Zeltser - ESW #381
1:50:15
1:50:15
Play later
Play later
Lists
Like
Liked
1:50:15
Ever heard someone say, "the attacker only has to be right once, but the defender has to get it right every time"? On this episode, we'll dispel that myth. There is some truth to the saying, but only with regards to initial access to the target's environment. Once on the inside, the attacker's advantage flips to the defender. Call it the 'Home Alon…
…
continue reading
1
Secure By Default - How do we get there? - Andy Syrewicze - PSW #848
3:06:32
3:06:32
Play later
Play later
Lists
Like
Liked
3:06:32
Andy drops some Microsoft Windows and 365 knowledge as we discuss the details on how we get to secure by default in our Windows and cloud environments. This week: The USB Army Knife that won't break the budget, I don't want to say EDR is useless (but there I said it), Paul's list of excellent hacking tips, FortiJump - an RCE that took a while to be…
…
continue reading
Join us as we discuss our recent field trip to the city that never sleeps! Fifty friends joined us for a women's history extravaganza (and thirty more dropped by for a celebration on the water)! From the gritty realities of the Tenement Museum to the excesses of America's Gilded Age - the sobering truths of the Triangle Shirtwaist Fire to the glitt…
…
continue reading
thanks for listening xx Learn more about your ad choices. Visit megaphone.fm/adchoicesBy W!ZARD Studios
…
continue reading
1
Doom Brain, E2EE, OT, Adload, Cisco, VMware, internet archive, Josh Marpet ... - SWN #424
29:57
29:57
Play later
Play later
Lists
Like
Liked
29:57
Doom on a Human Brain, E2EE, OT, Adload, Cisco, VMware, Internet Archive, Josh Marpet, and more on the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-424
…
continue reading
1
Aligning Tech Execs on Cyber Resilience - Theresa Lanowitz - BSW #369
1:01:21
1:01:21
Play later
Play later
Lists
Like
Liked
1:01:21
Getting C-Suite execs aligned on cyber resilience and cybersecurity can be a challenge. LevelBlue's recent Futures™️ report sought to uncover the barriers that prevent companies from achieving cyber resilience in the enterprise today. The report not only surveyed C-Suite execs (CIOs, CTOs, and CISOs), but non-C-Suite leaders from engineering and ar…
…
continue reading
1
S1: EP 13 — "I Didn't Know if I wanted to Scream, or Just Run”
25:22
25:22
Play later
Play later
Lists
Like
Liked
25:22
Therésa and the Haunting team took a short hiatus while Len took advantage of his timeshare at the River Styx, but things aren’t quite back to normal. While dealing with intern issues and personal drama, Therésa shares JJ’s experience as a late-night hospital security guard who was in over his head. We also met Priyanka, whose family Christmas cele…
…
continue reading
1
The Complexities, Configurations, and Challenges in Cloud Security - Scott Piper - ASW #304
1:17:25
1:17:25
Play later
Play later
Lists
Like
Liked
1:17:25
Building cloud native apps doesn't mean you're immune to dealing with legacy systems. Cloud services have changed significantly over the last decade, both in the security controls available to them and the sheer volume of services that CSPs provide. Scott Piper shares some history of cloud security, the benefits of account separation, and how ratch…
…
continue reading
1
Stealing, Kubernetes, Passkeys, SolarWinds, Intel, Sextortion, and... - SWN #423
33:22
33:22
Play later
Play later
Lists
Like
Liked
33:22
Stealing Pencils, Kubernetes, Passkeys, SolarWinds, Intel, North Koreans, Sextortion, and More, on this edition of the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-423
…
continue reading
1
Cybersecurity Success is Business Success - Renuka Nadkarni, Theresa Lanowitz - ESW #380
1:46:37
1:46:37
Play later
Play later
Lists
Like
Liked
1:46:37
Secure by design is more than just AppSec - it addresses how the whole business designs systems and processes to be effective and resilient. The latest report from LevelBlue on Cyber Resilience reveals security programs that are reactive, ill-equipped, and disconnected from IT and business leaders. Most security problems are out of security teams' …
…
continue reading
1
Cybersecurity Success is Business Success - Renuka Nadkarni, Theresa Lanowitz - ESW #380
1:46:37
1:46:37
Play later
Play later
Lists
Like
Liked
1:46:37
Secure by design is more than just AppSec - it addresses how the whole business designs systems and processes to be effective and resilient. The latest report from LevelBlue on Cyber Resilience reveals security programs that are reactive, ill-equipped, and disconnected from IT and business leaders. Most security problems are out of security teams' …
…
continue reading
1
Effective Operational Outcomes - Ken Dunham - PSW #847
2:58:09
2:58:09
Play later
Play later
Lists
Like
Liked
2:58:09
New security and vulnerability research is published every day. How can security teams get ahead of the curve and build architecture to combat modern threats and threat actors? Tune-in to a lively discussion about the threat landscape and tips on how to stay ahead of the curve. Segment Resources: https://blog.qualys.com/vulnerabilities-threat-resea…
…
continue reading
1
Perl & PHP Vulns, Fuzzing & Parsers, Protecting Multi-Hosted Tenants, Secure Design - ASW #303
41:59
41:59
Play later
Play later
Lists
Like
Liked
41:59
Looking at vulnerable code in Ivanti (Perl) and Magento (PHP), fuzzing is perfect for parsers, handling tenant isolation when training LLMs, Microsoft's small steps towards secure design, and more! Visit https://www.securityweekly.com/asw for all the latest episodes! Show Notes: https://securityweekly.com/asw-303…
…
continue reading
1
Stego, uBlock, PPTP, Log4J, Command Jacking, Windows 10, Feet, Josh Marpet, and More. - SWN #422
30:23
30:23
Play later
Play later
Lists
Like
Liked
30:23
AI Stego, uBlock, PPTP, Log4J rises again, Command Jacking, Windows 10, Principal Skinner's Feet, Josh Marpet, and more on the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-422
…
continue reading
1
Budget Planning Guide 2025: Security And Risk - Jeff Pollard - BSW #368
59:35
59:35
Play later
Play later
Lists
Like
Liked
59:35
In today’s uncertain macroeconomic environment, security and risk leaders need practical guidance on managing existing spending and new budgetary requests. Jeff Pollard, Vice-President, Principal Analyst on the Security and Risk Team at Forrester Research, joins Business Security Weekly to review Forrester's Budget Planning Guide 2025: Security And…
…
continue reading
1
'The Bear in Chicago' with Laura Roeper - Ep. #41
1:09:18
1:09:18
Play later
Play later
Lists
Like
Liked
1:09:18
The Bear - Propping in Chicago A conversation with Property Master Laura Roeper, PMG On this episode of Prop Talk, we sit down with PMG Property Master Laura Roeper to discuss what it is like to work in props in Chicago. She also details her experience Property Mastering on a food centric show like "The Bear" and the challenges that come with it. H…
…
continue reading
1
Cybercab, Golden Jackal, Mamba 2FA, Microsoft, iPhone thieves, esims, Aaran Leyland.. - SWN #421
30:25
30:25
Play later
Play later
Lists
Like
Liked
30:25
Cybercab, Golden Jackal, Mamba 2FA, Multi Microsoft, iPhone thieves, esims, Aaran Leyland, and More, on this edition of the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-421
…
continue reading
1
Community Knowledge Sharing with CyberNest - Ben Siegel, Aaron Costello - ESW #379
1:53:03
1:53:03
Play later
Play later
Lists
Like
Liked
1:53:03
For this interview, Ben from CyberNest joins us to talk about one of my favorite subjects: information sharing in infosec. There are so many amazing skills, tips, techniques, and intel that security professionals have to share. Sadly, a natural corporate reluctance to share information viewed as privileged and private has historically had a chillin…
…
continue reading
1
Community Knowledge Sharing with CyberNest - Ben Siegel, Aaron Costello - ESW #379
1:53:03
1:53:03
Play later
Play later
Lists
Like
Liked
1:53:03
For this interview, Ben from CyberNest joins us to talk about one of my favorite subjects: information sharing in infosec. There are so many amazing skills, tips, techniques, and intel that security professionals have to share. Sadly, a natural corporate reluctance to share information viewed as privileged and private has historically had a chillin…
…
continue reading
1
The Code of Honor: Embracing Ethics in Cybersecurity - Ed Skoudis - PSW #846
2:14:57
2:14:57
Play later
Play later
Lists
Like
Liked
2:14:57
"Code of Honor: Embracing Ethics in Cybersecurity" by Ed Skoudis is a book that explores the ethical challenges faced by cybersecurity professionals in today's digital landscape. The book delves into the complex moral dilemmas that arise in the field of cybersecurity, offering guidance on how to navigate these issues while maintaining integrity. Th…
…
continue reading
1
How the Fed’s Interest Rate Cuts are Impacting Consumers and Lenders
35:53
35:53
Play later
Play later
Lists
Like
Liked
35:53
The Risk Advisor team at Equifax discusses the recent 50 basis point rate cut by the Federal Reserve and its wide-reaching impact on the U.S. economy. Topics including consumer sentiment, the housing and auto markets, and the lending landscape offer valuable insights into how these changes will affect both households and financial institutions. The…
…
continue reading
It's election season here in the US, so we're revisiting the life of the very first woman to run for the American Presidency in 1872. Victoria Woodhull crafted a life for herself from very raw materials when she traveled from an abusive childhood to an aristocratic end and, throughout it all, was a woman ahead of her time. This episode is sponsored…
…
continue reading
1
The Future of Zed Attack Proxy - Simon Bennetts, Ori Bendet - ASW #302
1:12:35
1:12:35
Play later
Play later
Lists
Like
Liked
1:12:35
Zed Attack Proxy has been a crucial web app testing tool for decades. It's also had a struggle throughout 2024 to obtain funding that would enable the tool to add more features while remaining true to its open source history. Simon Bennetts, founder of ZAP, and Ori Bendet from Checkmarx update us on that journey, share some exploration of LLM fuzzi…
…
continue reading