Get ready to experience a Bible study like never before with Pastor b.Side! This one-of-a-kind deep dive into the Bible will focus on God’s amazing characteristics, purposes, and promises. You won’t want to miss out on inspiring conversations as people share their testimonies as they relate to scripture, proving that God is real and true. This podcast is sure to cultivate hope, nourish your soul, and ignite purpose in your life!
…
continue reading
Satellite Sisters Radio Show on BSide Radio. This show presents and promotes bassmusic tracks produced by Sisters & showcases one sister's DJ set in every episode! #rap #hiphop #techno #electronicmusic #house #drum&bass #bassmusic #bass #female #women #musicproducers #femaledjs
…
continue reading
Las Vegas resident BrandonBside. Be sure to follow on IG @brandonbside and twitter @itsbrandonbside www.BrandonBside.com
…
continue reading
Podcasts from the MiSec, OWASP Detroit, and BSides Detroit communities.
…
continue reading
When six friends share their love for Dungeons & Dragons and Music, what happens? You get a music inspired D&D podcast that follows a small town rock band's cross country tour while the magic of music wafts over the world! BGBS is about found family and finding fame, with a little Scooby-Doo and Buffy mixed in. Check us out at badguysbsides.com
…
continue reading
Welcome to The B-Side, a podcast for The Film Stage! Here we talk about movie stars and directors. Not the movies that made them famous, or kept them famous, but the ones they made in between. From box office fiascos, to interesting curios, and hidden gems, we examine the also-rans of Hollywood and beyond.
…
continue reading
Welcome to awks, the podcast for people trying to figure out this adulting thing... one awkward moment at a time. Join lifelong friends Hannah and Bianca as they discuss all the things you swear no one warned you about before you entered the "real world." Full of stories and perspectives that will bring a smile to your lips, a nod to your head, and a bright spot to your day. _ Music by: Ci Major Support this podcast: https://podcasters.spotify.com/pod/show/awks/support
…
continue reading
A Podcast on Computer Security & Privacy for Non-Techies
…
continue reading
No subject is off limits – anger, sex, money, anxiety, marriage, and success. These guys are covering the personal issues, and current events that many ministries and churches won’t touch. Hosted by Pastor James ‘Havcutz’ Wright and Pastor b.Side, this podcast examines the nuances of spiritual warfare to help Godly men see the world as God does, and get equipped to respond Biblically with the spiritual weapons God provides. Candidly discussing the real-life battle grounds for Christian men, ...
…
continue reading
A weekly audio podcast where Ben Mandelker (bsideblog.com) banters about TV, food, pop culture, Los Angeles, and whatever else is on his mind. It will be the best time you will ever spend listening to a podcast EVER.
…
continue reading
If you're looking for a bunch of us cybersecurity nerds to get together and talk shop, then Paul’s Security Weekly is for you. This show features interviews with folks in the cybersecurity community; technical segments, which are just that, very technical; and cybersecurity news, which is an open discussion forum for the hosts to express their opinions about the latest cybersecurity headlines, breaches, new exploits and vulnerabilities, “not” politics, “cyber” policies and more. The topics v ...
…
continue reading
What isn't it about ? Support this podcast: https://podcasters.spotify.com/pod/show/dominic-moody/support
…
continue reading
Exploring the leading edge of computing technology with a focus on Networking
…
continue reading
Women In Linux is a non-profit organization supporting women in Linux-centric tech careers who want to obtain and sustain a thriving career in tech.
…
continue reading
You may be vaguely aware of the term ‘quantum computing’ from media reports. But what you may not have picked up on is that one of the primary uses for quantum computers may be to break data encryption. Furthermore, you may not realize that if three-letter agencies can save off our encrypted emails and messages now, this could mean they could read …
…
continue reading
1
Episode 41 - The Name of God - Part 3 - Psalm 20:7-9
21:53
21:53
Play later
Play later
Lists
Like
Liked
21:53
Everyone wants safety, security, assurance, peace, prosperity, and blessing. God promises to give His people all those things, but there’s a catch. What’s the catch? We need to ensure we’re seeking access to those things and using the right tools God provides. What are those tools? That’s exactly what we’re talking about in this episode as we look …
…
continue reading
1
Wifi Vulns, Yubikeys, and Firmware - PSW #842
2:02:27
2:02:27
Play later
Play later
Lists
Like
Liked
2:02:27
Don't tell the FCC there is a new Flipper firmware release, unpatchable?, argv[0] and sneaking past defenses, protect your registries, someone solved my UART RX problem, PKFail update, legal threats against security researchers documented, EDR bypass whack-a-mole continues, emulating PIs, VScode moonlights as a spy, Want to clone a YubiKey? All you…
…
continue reading
1
Recent Cyber Security Laws & Regulations - Lee Kim - PSW #842
1:02:29
1:02:29
Play later
Play later
Lists
Like
Liked
1:02:29
Lee comes on the show to discuss: EU CRA - https://en.wikipedia.org/wiki/CyberResilienceAct - its impact on bringing products to market and the challenges of enforcing such laws that require products to be "Secure" Recent legislation on disputes for federal agency fines - Chevron deference rule - supreme court decision, uncertainty, more or less cl…
…
continue reading
Mis- and disinformation is just a fact of modern life, but certain events can cause the practice to significantly increase – like a big election. This is a good time to review this phenomenon, learning how to recognize it, how to avoid being drawn in, and perhaps most importantly how to reduce its spread. In other news: Telegram’s CEO was arrested …
…
continue reading
1
Episode 40 - The Name Of God - Part 2 - Psalm 20:4-6
24:16
24:16
Play later
Play later
Lists
Like
Liked
24:16
Many people struggle to answer the question of what they expect from God when they pray. However, the Bible provides important information on how God will respond to our prayers. In this episode, I will share this information to help you pray confidently with assurance that God will answer. Tune in to learn more. For more information or Bible teach…
…
continue reading
1
Hacker Heroes - Mark Loveless - PSW Vault
1:32:39
1:32:39
Play later
Play later
Lists
Like
Liked
1:32:39
Exploring the Hacking Landscape with Mark Loveless, AKA SimpleNomad Dive into the intricate world of cybersecurity with our featured guest, Mark Loveless, widely known by his handle SimpleNomad. With a rich history in the realm of information security, Mark is a seasoned professional, researcher, and thought leader. Mark's journey spans decades, ma…
…
continue reading
Proton released three major new products this summer, all within the span of about a couple months: Proton Docs, Proton Wallet and Proton Scribe. Given that Proton is a privacy-focused company, some of these offerings seemed almost at odds with that mission. So today I ask Andy Yen (Proton’s CEO) some questions about the privacy of their Bitcoin wa…
…
continue reading
This week: I want all the firmware, its not just TP-Link, CVEs for malware, BLE and your health, faking your own death, serial ports, stealthy Linux malware, call this number, finding all the Wordpress plugin vulnerabilities! Show Notes: https://securityweekly.com/psw-841
…
continue reading
1
Building AI BOMs - Helen Oakley - PSW #841
1:01:39
1:01:39
Play later
Play later
Lists
Like
Liked
1:01:39
Larry and Helen walk us through the AI supply chain landscape. Learn what goes into building and using AI models and the dangers that could lurk within. Segment Resources: Community efforts on AIBOM topic: https://github.com/aibom-squad Show Notes: https://securityweekly.com/psw-841
…
continue reading
1
Episode 39 - The Name Of God Part 1 - Psalm 20:1-3
22:37
22:37
Play later
Play later
Lists
Like
Liked
22:37
Did you know that God has A LOT of names in the Bible? God even calls Himself by several different titles. Which name should we call God by when we pray or ask for help? If God’s name is “THE NAME above all other names,” which one of God’s names is the best? The truth is, it’s not about which name we use to call out to God. The bigger issue is, do …
…
continue reading
The headlines have been on fire with stories about 3 billion people’s data being leaked from a company you’ve never heard of. But like many such stories, the mainstream media gets a lot of the important details wrong and glosses over a lot of the important nuances. Today we’re going to dive into what really happened and what you should do about it,…
…
continue reading
1
Vulnerabilities, Vulnerabilities Everywhere - PSW #840
1:56:39
1:56:39
Play later
Play later
Lists
Like
Liked
1:56:39
This week: YAVD: Yet Another Vulnerable Driver, why bring your own when one already exists, backdoors in MIFARE Classic, wireless hacking tips, AMD sinkclose vulnerability will keep running, you down with SLDP yea you know me, Phrack!, IoTGoats, Pixel vulnerabilities, leaking variables, a DEF CON talk that was not cancelled, Telnet is still a thing…
…
continue reading
1
How do we patch the right things? - PSW #840
1:02:37
1:02:37
Play later
Play later
Lists
Like
Liked
1:02:37
Every week here on the show we talk about vulnerabilities and exploits. Typically we recommend that organizations remediate these vulnerabilities in some way. But how? And more importantly, which ones? Some tools we have to help us are actually not all that helpful at time, such as: Mitre Att&ck - Don't get me wrong, this is a great project and Ada…
…
continue reading
Finding your soul mate or even just a one-night stand can all be done digitally now – there’s an app for that. Several, in fact. But in order to find the best match, you need to turn over a lot of extremely personal information. You probably also need to let the app track your location, so you’re only matching people within some acceptable distance…
…
continue reading
This week: Option ROMS are a novel way to compromise a system at the lowest level, Sinkclose opens AMD processors up to attacks, at home in your firmware exploiting SMM complete with examples, Sonos speakers get hacked and enable attackers to listen in on your conversations, DEF CON badges use new chips and are not without controversy, lasers that …
…
continue reading
1
Cybersecurity Myths - Eugene Spafford - PSW #839
1:06:28
1:06:28
Play later
Play later
Lists
Like
Liked
1:06:28
Early on in his career Spaf was working with microcode and continued to work on technical projects. As time went on he realized that focusing on the non-technical work, such as policies and shaping our thinking, would help move the needle. Borrowing concepts from his book on the subject, we will delve into some cybersecurity myths such as: Are user…
…
continue reading
1
Episode 38 - The Power Of God - Psalm 19:10-14
23:50
23:50
Play later
Play later
Lists
Like
Liked
23:50
The power of God: It’s something we all want and it’s something we all need. What does God’s power look like when we receive it though? The Bible promises that with Jesus, we can do “all things.” How does that practically and functionally show up in life? The answers to those questions are in the portion of scripture we’re studying today. In this e…
…
continue reading
It’s time once again for cybersecurity professionals to make the pilgrimage to the scorching desert of Las Vegas, Nevada for a week of tech conferences that we lovingly refer to as Hacker Summer Camp. Today I’ll bring you my on-the-ground reporting from BSides and DEF CON. I’ll also bring you part 2 of my series on Open Source Intelligence (OSINT) …
…
continue reading
1
Episode 37 - The Treasure Of Our Souls - Psalm 19:7-9
32:05
32:05
Play later
Play later
Lists
Like
Liked
32:05
How do we develop and improve our relationship with God? Believe it or not, the Bible answers that question. In this episode of Getting To Know God – Thru The Psalms, we’re looking at Psalm 19:7-9 to understand how the Bible practically connects us to the Creator of all things. If you’ve ever felt like God is distant from you, or you’re in a rut wi…
…
continue reading
1
Things Not to Miss at BH/DC/Bsides - PSW #838
1:03:32
1:03:32
Play later
Play later
Lists
Like
Liked
1:03:32
Learn what is most interesting at hacker summer camp this year! Show Notes: https://securityweekly.com/psw-838
…
continue reading
1
Downgrades and Attacking Security Things - PSW #838
2:04:44
2:04:44
Play later
Play later
Lists
Like
Liked
2:04:44
This week, Downgrade attacks, bootloader fun, check your firmware before you wreck your firmware, you've got mail server issues, Ivanti is the new Rhianna, you should update your BIOS, Openwrt dominates, and attacking the security tools for fun and profit! Show Notes: https://securityweekly.com/psw-838…
…
continue reading
Jack Daniel is a storyteller, wanderer, comic, bartender, blacksmith, luthier, historian, mechanic, and the world’s oldest millennial. He is also one of the founders of Security BSides. Jack has a colorful and interesting history, and today we’ll learn about how and why he started BSides, delve into a little hacker conference history, talk about mo…
…
continue reading
Hacking traffic lights (for real this time), the Docker API strikes again, access Github deleted data, using EDR to elevate privileges on Windows, computers I need in my life, failed experiments and Raspberry PI access points, sitting ducks and TuDoor - its always DNS times 2, null sessions and a blast from the past, chaining UEFI vulnerabilities, …
…
continue reading
1
PK Fail - John Loucaides - PSW #837
1:12:22
1:12:22
Play later
Play later
Lists
Like
Liked
1:12:22
John is one of the foremost experts in UEFI and joins us to talk about PK Fail! What happens when a vendor in the supply chain accidentally loses a key? It's one of the things that keeps me up at night. Well, now my nightmare scenario has come true as a key has been leaked. Learn how and why and what you can do about it in this segment! Show Notes:…
…
continue reading
History shows that, for thousands of years, millions of men and women have been willing to give their lives, sometimes even to the point of violent death, because of the things written in the Bible. Some of those testimonies are written in the Bible. Why would someone ever do that? In this episode of Getting To Know God – Thru The Psalms, we’re loo…
…
continue reading
Last week, we all learned about a company called CrowdStrike that apparently has the capability to single-handedly bring multiple airlines, hospitals and other large companies to their knees in an instant. There are many lessons we should be learning from this incident, though I’m not going to hold my breath. I’ll tell you what happened and what I …
…
continue reading
1
Crowdstrike: The Aftermath - PSW #836
1:59:49
1:59:49
Play later
Play later
Lists
Like
Liked
1:59:49
Segment description coming soon!The Crowdstrike incident: what happened and what we can do better, people forget what 0-Day really means, shutting off the heat in January, honeypot evasion and non-functional exploits, what not to use to read eMMC, what if we don't patch DoS related vulnerabilities, a CVSS 10 deserves its own category, port shadow a…
…
continue reading