Bside public
[search 0]
More
Download the App!
show episodes
 
Get ready to experience a Bible study like never before with Pastor b.Side! This one-of-a-kind deep dive into the Bible will focus on God’s amazing characteristics, purposes, and promises. You won’t want to miss out on inspiring conversations as people share their testimonies as they relate to scripture, proving that God is real and true. This podcast is sure to cultivate hope, nourish your soul, and ignite purpose in your life!
  continue reading
 
Artwork

1
Satellite Sisters on BSide Radio

All female music producers and djs

Unsubscribe
Unsubscribe
Monthly
 
Satellite Sisters Radio Show on BSide Radio. This show presents and promotes bassmusic tracks produced by Sisters & showcases one sister's DJ set in every episode! #rap #hiphop #techno #electronicmusic #house #drum&bass #bassmusic #bass #female #women #musicproducers #femaledjs
  continue reading
 
Artwork
 
When six friends share their love for Dungeons & Dragons and Music, what happens? You get a music inspired D&D podcast that follows a small town rock band's cross country tour while the magic of music wafts over the world! BGBS is about found family and finding fame, with a little Scooby-Doo and Buffy mixed in. Check us out at badguysbsides.com
  continue reading
 
Welcome to The B-Side, a podcast for The Film Stage! Here we talk about movie stars and directors. Not the movies that made them famous, or kept them famous, but the ones they made in between. From box office fiascos, to interesting curios, and hidden gems, we examine the also-rans of Hollywood and beyond.
  continue reading
 
Artwork

1
awks

H & B Productions

Unsubscribe
Unsubscribe
Monthly
 
Welcome to awks, the podcast for people trying to figure out this adulting thing... one awkward moment at a time. Join lifelong friends Hannah and Bianca as they discuss all the things you swear no one warned you about before you entered the "real world." Full of stories and perspectives that will bring a smile to your lips, a nod to your head, and a bright spot to your day. _ Music by: Ci Major Support this podcast: https://podcasters.spotify.com/pod/show/awks/support
  continue reading
 
Artwork

1
Slingshots & Swords Podcast

Proper Knowledge Ministry

Unsubscribe
Unsubscribe
Monthly
 
No subject is off limits – anger, sex, money, anxiety, marriage, and success. These guys are covering the personal issues, and current events that many ministries and churches won’t touch. Hosted by Pastor James ‘Havcutz’ Wright and Pastor b.Side, this podcast examines the nuances of spiritual warfare to help Godly men see the world as God does, and get equipped to respond Biblically with the spiritual weapons God provides. Candidly discussing the real-life battle grounds for Christian men, ...
  continue reading
 
Artwork
 
A weekly audio podcast where Ben Mandelker (bsideblog.com) banters about TV, food, pop culture, Los Angeles, and whatever else is on his mind. It will be the best time you will ever spend listening to a podcast EVER.
  continue reading
 
Artwork

1
Paul's Security Weekly (Video)

Security Weekly Productions

Unsubscribe
Unsubscribe
Weekly+
 
If you're looking for a bunch of us cybersecurity nerds to get together and talk shop, then Paul’s Security Weekly is for you. This show features interviews with folks in the cybersecurity community; technical segments, which are just that, very technical; and cybersecurity news, which is an open discussion forum for the hosts to express their opinions about the latest cybersecurity headlines, breaches, new exploits and vulnerabilities, “not” politics, “cyber” policies and more. The topics v ...
  continue reading
 
Loading …
show series
 
You may be vaguely aware of the term ‘quantum computing’ from media reports. But what you may not have picked up on is that one of the primary uses for quantum computers may be to break data encryption. Furthermore, you may not realize that if three-letter agencies can save off our encrypted emails and messages now, this could mean they could read …
  continue reading
 
Everyone wants safety, security, assurance, peace, prosperity, and blessing. God promises to give His people all those things, but there’s a catch. What’s the catch? We need to ensure we’re seeking access to those things and using the right tools God provides. What are those tools? That’s exactly what we’re talking about in this episode as we look …
  continue reading
 
Don't tell the FCC there is a new Flipper firmware release, unpatchable?, argv[0] and sneaking past defenses, protect your registries, someone solved my UART RX problem, PKFail update, legal threats against security researchers documented, EDR bypass whack-a-mole continues, emulating PIs, VScode moonlights as a spy, Want to clone a YubiKey? All you…
  continue reading
 
Lee comes on the show to discuss: EU CRA - https://en.wikipedia.org/wiki/CyberResilienceAct - its impact on bringing products to market and the challenges of enforcing such laws that require products to be "Secure" Recent legislation on disputes for federal agency fines - Chevron deference rule - supreme court decision, uncertainty, more or less cl…
  continue reading
 
Mis- and disinformation is just a fact of modern life, but certain events can cause the practice to significantly increase – like a big election. This is a good time to review this phenomenon, learning how to recognize it, how to avoid being drawn in, and perhaps most importantly how to reduce its spread. In other news: Telegram’s CEO was arrested …
  continue reading
 
Many people struggle to answer the question of what they expect from God when they pray. However, the Bible provides important information on how God will respond to our prayers. In this episode, I will share this information to help you pray confidently with assurance that God will answer. Tune in to learn more. For more information or Bible teach…
  continue reading
 
Exploring the Hacking Landscape with Mark Loveless, AKA SimpleNomad Dive into the intricate world of cybersecurity with our featured guest, Mark Loveless, widely known by his handle SimpleNomad. With a rich history in the realm of information security, Mark is a seasoned professional, researcher, and thought leader. Mark's journey spans decades, ma…
  continue reading
 
Proton released three major new products this summer, all within the span of about a couple months: Proton Docs, Proton Wallet and Proton Scribe. Given that Proton is a privacy-focused company, some of these offerings seemed almost at odds with that mission. So today I ask Andy Yen (Proton’s CEO) some questions about the privacy of their Bitcoin wa…
  continue reading
 
Did you know that God has A LOT of names in the Bible? God even calls Himself by several different titles. Which name should we call God by when we pray or ask for help? If God’s name is “THE NAME above all other names,” which one of God’s names is the best? The truth is, it’s not about which name we use to call out to God. The bigger issue is, do …
  continue reading
 
The headlines have been on fire with stories about 3 billion people’s data being leaked from a company you’ve never heard of. But like many such stories, the mainstream media gets a lot of the important details wrong and glosses over a lot of the important nuances. Today we’re going to dive into what really happened and what you should do about it,…
  continue reading
 
This week: YAVD: Yet Another Vulnerable Driver, why bring your own when one already exists, backdoors in MIFARE Classic, wireless hacking tips, AMD sinkclose vulnerability will keep running, you down with SLDP yea you know me, Phrack!, IoTGoats, Pixel vulnerabilities, leaking variables, a DEF CON talk that was not cancelled, Telnet is still a thing…
  continue reading
 
Every week here on the show we talk about vulnerabilities and exploits. Typically we recommend that organizations remediate these vulnerabilities in some way. But how? And more importantly, which ones? Some tools we have to help us are actually not all that helpful at time, such as: Mitre Att&ck - Don't get me wrong, this is a great project and Ada…
  continue reading
 
Finding your soul mate or even just a one-night stand can all be done digitally now – there’s an app for that. Several, in fact. But in order to find the best match, you need to turn over a lot of extremely personal information. You probably also need to let the app track your location, so you’re only matching people within some acceptable distance…
  continue reading
 
This week: Option ROMS are a novel way to compromise a system at the lowest level, Sinkclose opens AMD processors up to attacks, at home in your firmware exploiting SMM complete with examples, Sonos speakers get hacked and enable attackers to listen in on your conversations, DEF CON badges use new chips and are not without controversy, lasers that …
  continue reading
 
Early on in his career Spaf was working with microcode and continued to work on technical projects. As time went on he realized that focusing on the non-technical work, such as policies and shaping our thinking, would help move the needle. Borrowing concepts from his book on the subject, we will delve into some cybersecurity myths such as: Are user…
  continue reading
 
The power of God: It’s something we all want and it’s something we all need. What does God’s power look like when we receive it though? The Bible promises that with Jesus, we can do “all things.” How does that practically and functionally show up in life? The answers to those questions are in the portion of scripture we’re studying today. In this e…
  continue reading
 
It’s time once again for cybersecurity professionals to make the pilgrimage to the scorching desert of Las Vegas, Nevada for a week of tech conferences that we lovingly refer to as Hacker Summer Camp. Today I’ll bring you my on-the-ground reporting from BSides and DEF CON. I’ll also bring you part 2 of my series on Open Source Intelligence (OSINT) …
  continue reading
 
How do we develop and improve our relationship with God? Believe it or not, the Bible answers that question. In this episode of Getting To Know God – Thru The Psalms, we’re looking at Psalm 19:7-9 to understand how the Bible practically connects us to the Creator of all things. If you’ve ever felt like God is distant from you, or you’re in a rut wi…
  continue reading
 
Jack Daniel is a storyteller, wanderer, comic, bartender, blacksmith, luthier, historian, mechanic, and the world’s oldest millennial. He is also one of the founders of Security BSides. Jack has a colorful and interesting history, and today we’ll learn about how and why he started BSides, delve into a little hacker conference history, talk about mo…
  continue reading
 
Hacking traffic lights (for real this time), the Docker API strikes again, access Github deleted data, using EDR to elevate privileges on Windows, computers I need in my life, failed experiments and Raspberry PI access points, sitting ducks and TuDoor - its always DNS times 2, null sessions and a blast from the past, chaining UEFI vulnerabilities, …
  continue reading
 
John is one of the foremost experts in UEFI and joins us to talk about PK Fail! What happens when a vendor in the supply chain accidentally loses a key? It's one of the things that keeps me up at night. Well, now my nightmare scenario has come true as a key has been leaked. Learn how and why and what you can do about it in this segment! Show Notes:…
  continue reading
 
History shows that, for thousands of years, millions of men and women have been willing to give their lives, sometimes even to the point of violent death, because of the things written in the Bible. Some of those testimonies are written in the Bible. Why would someone ever do that? In this episode of Getting To Know God – Thru The Psalms, we’re loo…
  continue reading
 
Last week, we all learned about a company called CrowdStrike that apparently has the capability to single-handedly bring multiple airlines, hospitals and other large companies to their knees in an instant. There are many lessons we should be learning from this incident, though I’m not going to hold my breath. I’ll tell you what happened and what I …
  continue reading
 
Segment description coming soon!The Crowdstrike incident: what happened and what we can do better, people forget what 0-Day really means, shutting off the heat in January, honeypot evasion and non-functional exploits, what not to use to read eMMC, what if we don't patch DoS related vulnerabilities, a CVSS 10 deserves its own category, port shadow a…
  continue reading
 
Loading …

Quick Reference Guide