show episodes
 
Welcome to Behind the Wheel, where we bring you the latest industry insights and company updates straight to your ears. Join us as we explore future planning, industry news, and trends. Hear directly from David Simon and his team. Whether you're a driver on the road, working in the office or on the warehouse floor, this podcast is for you. So, sit back, relax, and get ready to learn something new. Contact Us. podcasts@simon.com.au
  continue reading
 
50,000 watts of gearhead terror. We’re the talk radio blowtorch you want, chock-full of cars, trucks, beers and guns since 2009. We'll be your go-to for gearhead get-some, full of the sliciest canyon carving, dirtiest off-roading, biggest calibers, hairiest sasquatches, loudest explosions, plus the best epic fails, smoking rubble and blue-collar awesomesauce since Top Gear full of beer.
  continue reading
 
A show dedicated to accountants and bookkeepers who are looking to grow their practice. We deep dive into both the theory and the exact steps you need to grow your practice in the way you always dreamed. You will learn marketing, sales, hiring, management, pricing... everything it takes to scale a practice. The one thing we don’t talk about are accounting skills. You already have those. What we do is give you business skills.
  continue reading
 
If you need advice on how to find and keep the right talent in the trucking industry, you have made it to the right place! Recruit and Retain: Trucking Edition is all about developing the best practices and methods for finding talent and keeping it in the trucking industry. Turnover can be almost 100% for many companies over the course of a few years which is ASTOUNDING! Yet the demand for employees in the trucking industry remains at an all time high. What is going wrong? Why is it so hard ...
  continue reading
 
Bridgestone’s THRIVE aims to bring our North Star to life through a combination of compelling, human interest stories from teammates across the company and high-level conversations with Bridgestone leaders. These conversations will let the unique perspectives and experiences of our people tell the story of how an industry giant is evolving at a moment of unprecedented change in technology, consumer behavior, and society to meet new demands and build a culture where everyone can thrive.
  continue reading
 
Welcome to the Security Weekly Podcast Network, your all-in-one source for the latest in cybersecurity! This feed features a diverse lineup of shows, including Application Security Weekly, Business Security Weekly, Paul's Security Weekly, Enterprise Security Weekly, and Security Weekly News. Whether you're a cybersecurity professional, business leader, or tech enthusiast, we cover all angles of the cybersecurity landscape. Tune in for in-depth panel discussions, expert guest interviews, and ...
  continue reading
 
Loading …
show series
 
We'll trade you a four-pound sledge and a twitchy STi for the time to get more episodes published... This one's full of traffic thinking, with a knobby-tired look at why good alignment matters (and dying end-links don't). There's an in-depth analysis of how it's essential to be in an offensive state of mind when commanding your place in the flow (a…
  continue reading
 
We had the pleasure of finally having Dave Lewis on the show to discuss shadow IT and security debt. Dave shared some fascinating insights from his long career in cybersecurity, emphasizing the importance of addressing fundamental security issues and the human aspect of security. We delved into the challenges of managing shadow IT, the complexities…
  continue reading
 
Show Summary: In this episode of the Grow My Accounting Practice podcast, Stacey Bennett, founder of The SLC Group, discusses the profound impact businesses can have on the world and the unique responsibility of the business owners to drive positive change. She emphasizes the importance of aligning your business with your personal trends. By leanin…
  continue reading
 
We'll trade you a four-pound sledge and a twitchy STi for the time to get more episodes published... This one's full of traffic thinking, with a knobby-tired look at why good alignment matters (and dying end-links don't). There's an in-depth analysis of how it's essential to be in an offensive state of mind when commanding your place in the flow (a…
  continue reading
 
In the leadership and communications segment, The CISO Mindset: A Strategic Guide for Aspiring CEOs and The Board Members, The Top Strategy to Earn More Respect at Work: A Leadership Expert’s Proven Method, The Problem with Mandating Office Presence Without Purpose, and more! Identity continues to be one of the most used attack vectors by cybercrim…
  continue reading
 
Better TLS implementations with Rust, fuzzing, and managing certs, appsec lessons from the everlasting transition to IPv6, LLMs for finding vulns (and whether fuzzing is better), and more! Also check out this presentation from BSides Knoxville that we talked about briefly, https://youtu.be/DLn7Noex_fc?feature=shared Generative AI has been the talk …
  continue reading
 
Ever heard someone say, "the attacker only has to be right once, but the defender has to get it right every time"? On this episode, we'll dispel that myth. There is some truth to the saying, but only with regards to initial access to the target's environment. Once on the inside, the attacker's advantage flips to the defender. Call it the 'Home Alon…
  continue reading
 
Andy drops some Microsoft Windows and 365 knowledge as we discuss the details on how we get to secure by default in our Windows and cloud environments. This week: The USB Army Knife that won't break the budget, I don't want to say EDR is useless (but there I said it), Paul's list of excellent hacking tips, FortiJump - an RCE that took a while to be…
  continue reading
 
Show Summary: In this insightful episode of the Grow My Accounting Practice podcast, hosts welcome Taheera and Anne Christie, co-founders of T5 Transit LLC, as they explore how the Profit First system can revolutionize the trucking industry. Taheera and Anne share their expertise in the Final Mile industry and discuss common challenges that. transp…
  continue reading
 
Getting C-Suite execs aligned on cyber resilience and cybersecurity can be a challenge. LevelBlue's recent Futures™️ report sought to uncover the barriers that prevent companies from achieving cyber resilience in the enterprise today. The report not only surveyed C-Suite execs (CIOs, CTOs, and CISOs), but non-C-Suite leaders from engineering and ar…
  continue reading
 
Building cloud native apps doesn't mean you're immune to dealing with legacy systems. Cloud services have changed significantly over the last decade, both in the security controls available to them and the sheer volume of services that CSPs provide. Scott Piper shares some history of cloud security, the benefits of account separation, and how ratch…
  continue reading
 
Secure by design is more than just AppSec - it addresses how the whole business designs systems and processes to be effective and resilient. The latest report from LevelBlue on Cyber Resilience reveals security programs that are reactive, ill-equipped, and disconnected from IT and business leaders. Most security problems are out of security teams' …
  continue reading
 
New security and vulnerability research is published every day. How can security teams get ahead of the curve and build architecture to combat modern threats and threat actors? Tune-in to a lively discussion about the threat landscape and tips on how to stay ahead of the curve. Segment Resources: https://blog.qualys.com/vulnerabilities-threat-resea…
  continue reading
 
Show Summary: In today’s episode of Grow My Accounting Practice, we’re joined by Dr. Quinn Denny, a work psychologist and president of ioPSYte®, to explore the critical role personality plays in successful leadership. Dr. Denny starts by breaking down the concept of personality and why it matters in a professional setting. He also explains the key …
  continue reading
 
...A data-heavy slacker-upload episode for you - too much to do, so go do it. We did: wrasslin' animals and eating' bears, recalling Fords and Fords and DEIs and Toyotas and Fords and GMs and pickups and some junk in the trunk, as well as recalling a run from El Paso to Wisco in one of BFGoodrich's fleet of jacked-up Suburbans, and revisiting the G…
  continue reading
 
...A data-heavy slacker-upload episode for you - too much to do, so go do it. We did: wrasslin' animals and eating' bears, recalling Fords and Fords and DEIs and Toyotas and Fords and GMs and pickups and some junk in the trunk, as well as recalling a run from El Paso to Wisco in one of BFGoodrich's fleet of jacked-up Suburbans, and revisiting the G…
  continue reading
 
Looking at vulnerable code in Ivanti (Perl) and Magento (PHP), fuzzing is perfect for parsers, handling tenant isolation when training LLMs, Microsoft's small steps towards secure design, and more! Visit https://www.securityweekly.com/asw for all the latest episodes! Show Notes: https://securityweekly.com/asw-303…
  continue reading
 
In today’s uncertain macroeconomic environment, security and risk leaders need practical guidance on managing existing spending and new budgetary requests. Jeff Pollard, Vice-President, Principal Analyst on the Security and Risk Team at Forrester Research, joins Business Security Weekly to review Forrester's Budget Planning Guide 2025: Security And…
  continue reading
 
In this episode of Behind The Wheel, host Ardy Almassi is joined by main guests Mick West, Mark Bury, David Simon, and special guest Bill Manton. This episode touches on the current state of development approvals in Australia, highlighting the significant drop in housing approvals, the lowest since 2011-2012. But also with that, the opportunity and…
  continue reading
 
For this interview, Ben from CyberNest joins us to talk about one of my favorite subjects: information sharing in infosec. There are so many amazing skills, tips, techniques, and intel that security professionals have to share. Sadly, a natural corporate reluctance to share information viewed as privileged and private has historically had a chillin…
  continue reading
 
"Code of Honor: Embracing Ethics in Cybersecurity" by Ed Skoudis is a book that explores the ethical challenges faced by cybersecurity professionals in today's digital landscape. The book delves into the complex moral dilemmas that arise in the field of cybersecurity, offering guidance on how to navigate these issues while maintaining integrity. Th…
  continue reading
 
Show Summary: In today’s episode of the Grow My Accounting Practice podcast, we welcome Patrick Casale, MA, LCMHC, owner of All Things Private Practice LLC. Patrick shares his insights on Neurodivergent Leadership in Business, offering valuable perspectives on how neurodivergent individuals can thrive in leadership roles and shape workplace culture…
  continue reading
 
Zed Attack Proxy has been a crucial web app testing tool for decades. It's also had a struggle throughout 2024 to obtain funding that would enable the tool to add more features while remaining true to its open source history. Simon Bennetts, founder of ZAP, and Ori Bendet from Checkmarx update us on that journey, share some exploration of LLM fuzzi…
  continue reading
 
Does the CISO need to act like a politician? Negotiating budgets, communicating risks, and selling your strategy across the organization does sound a little like a politician. And if that's the case, are you hiring the right campaign staff? Kush Sharma, former CISO for CPR, City of Toronto, and Saputo, joins Business Security Weekly to discuss why …
  continue reading
 
Our latest in a series of interviews discussing cybersecurity career paths, today we talk to Jayson Grace his path into cybersecurity and his experience building red teams at national labs and purple teams at Meta. We also talk about his community impact, giving talks and building open source tools. Jayson just left Meta for an AI safety startup na…
  continue reading
 
Show Summary: In today’s episode of the Grow My Accounting Practice podcast, we are excited to welcome Michelle Weinstein, a seasoned sales expert and founder of The Abundant Accountant. Michelle dives into the core challenges that firm owners face when it comes to sales, particularly the difficulty of increasing fees for existing clients. She shar…
  continue reading
 
This episode of Paul Security Weekly features John Hammond, a senior security researcher from Huntress, discussing malware analysis. Hammond dives into the analysis of Ocean Lotus attacks, highlighting the use of stealthy techniques like alternate data streams and DLL side-loading. The conversation also touches on the challenges of combating attack…
  continue reading
 
More remote car control via web interfaces, an RCE in CUPS, Microsoft reduces attack surface, migrating to memory safety, dealing with dependency confusion, getting rid of password strength calculators, and more! Visit https://www.securityweekly.com/asw for all the latest episodes! Show Notes: https://securityweekly.com/asw-301…
  continue reading
 
The zero-trust security model has been billed as an ultra-safe defense against emerging, unrecognized and well-known threats. Unlike perimeter security, it doesn't assume people inside an organization are automatically safe. Instead, it requires every user and device -- inside and out -- to be authorized before any access is granted. Sounds enticin…
  continue reading
 
Passwords, CUPS, KIA, Gilbert Gottfried, Salt Typhoon, Rob Allen from ThreatLocker, and More on the Security Weekly News. Segment Resources: https://www.bleepingcomputer.com/news/security/hackers-deploy-ai-written-malware-in-targeted-attacks/ This segment is sponsored by ThreatLocker. Visit https://securityweekly.com/threatlocker to learn more abou…
  continue reading
 
The SIEM market has undergone some significant changes this summer. This is a great opportunity to talk about the current state of SIEM! In this conversation, we'll discuss: market changes and terminology: security analytics, data lakes, SIEM what is SOAR's role in the current SIEM market? machine learning and generative AI's role strategies for im…
  continue reading
 
This week in the security news, Dr. Doug and Larry explore various technological advancements and their implications with a healthy dose of nostalgia, particularly focusing on health monitoring through Wi-Fi signals, the misconceptions surrounding 5G connectivity, the importance of understanding internet speed needs, and the cybersecurity threats f…
  continue reading
 
Show Summary: In this episode of the Grow My Accounting Practice podcast, Doreen Binkiewicz, founder of DGL Business Solutions and Certified Profit First Professional, dives into the vital components of exit planning and succession strategies for business owners. She explains how these strategies are not necessarily retirement plans, but rather a w…
  continue reading
 
APIs are essential to modern application architectures, driving rapid development, seamless integration, and improved user experiences. However, their widespread use has made them prime targets for attackers, especially those deploying sophisticated bots. When these bots exploit business logic, they can cause considerable financial and reputational…
  continue reading
 
In the leadership and communications segment, CISA Releases Cyber Defense Alignment Plan for Federal Agencies, UnitedHealth Group CISO: We had to ‘start over’ after Change Healthcare attack, 20 Essential Strategies for Leadership Development Success, and more! AI is bringing productivity gains like we’ve never seen before -- with users, security te…
  continue reading
 
Be the geek and improve the you: the Garage Hour is here to help (everybody, apparently)... The lovely Pam called needing info on detailing a dashboard and cleaning seat fabric, so the Gearhead Consultancy went to town with everything from car care on the Front Range to the beauty of factory headlight plastic - it's all about the sincerity of your …
  continue reading
 
Be the geek and improve the you: the Garage Hour is here to help (everybody, apparently)... The lovely Pam called needing info on detailing a dashboard and cleaning seat fabric, so the Gearhead Consultancy went to town with everything from car care on the Front Range to the beauty of factory headlight plastic - it's all about the sincerity of your …
  continue reading
 
A month ago, my friend Wolfgang Goerlich posted a hot take on LinkedIn that is less and less of a hot take these days. He posted, "our industry needs to kill the phish test",and I knew we needed to have a chat, ideally captured here on the podcast. I've been on the fence when it comes to phishing simulation, partly because I used to phish people as…
  continue reading
 
Apple drops a lawsuit to avoid exposing secrets, what does it mean for the security industry if MS locks down the kernel?, exploding pagers, more things from the past: Adobe Flash exploits, robots get rid of your data, PKFail is still a thing, Android TV malware is back: now with conspiracy theories, DMA attacks, gamers are not nation-state attacke…
  continue reading
 
Loading …

Quick Reference Guide