Download the App!
show episodes
 
Artwork

1
Word In Your Ear

Mark Ellen, David Hepworth and Alex Gold

Unsubscribe
Unsubscribe
Weekly+
 
Mark Ellen and David Hepworth have been talking about and writing about music together and individually for a collective eighty years in magazines like Smash Hits, Mojo and The Word and on radio and TV programmes like "Rock On", "Whistle Test" and VH-1. Over thirteen years ago, when working on the late magazine The Word, they began producing podcasts. Some listeners have been kind enough to say these have been very special to them. When the magazine folded in 2012 they kept the spirit of tho ...
  continue reading
 
Loading …
show series
 
As Mark Ellen goes shrimping at Frinton David Hepworth and Alex Gold links hands across the Atlantic to discuss: ….why a quick turn around Mount Hood in a Cessna should never be confused with pleasure ….why all the highly-rated albums are actually over-rated. ….why Timothee Chalamet has no hope of being able to capture more than one facet of Bob Dy…
  continue reading
 
, in the enterprise security news, AI is still getting a ton of funding! Netwrix acquires PingCastle Tenable looks for a buyer SentinelOne hires Alex Stamos as their new CISO Crowdstrike doesn’t appreciate satire when it’s at their expense Intel begins one of the biggest layoffs we’ve ever seen in tech Windows Downdate RAG poisoning GPT yourself Th…
  continue reading
 
We chat with Sounil Yu, co-founder of LLM access control startup, Knostic. We discuss both the experience of participating in Black Hat's startup competition, and what his company, Knostic, is all about. Knostic was one of four finalists for Black Hat's Startup Spotlight competition and was announced as the winner on August 6th. References DarkRead…
  continue reading
 
In this interview we explore the new and sometimes strange world of redteaming AI. I have SO many questions, like what is AI safety? We'll discuss her presence at Black Hat, where she delivered two days of training and participated on an AI safety panel. We'll also discuss the process of pentesting an AI. Will pentesters just have giant cheatsheets…
  continue reading
 
Even though Security Champions programs look very different across organizations and maturity levels, they share core principles for becoming successful. Marisa shares her experience in building these programs to foster a positive security culture within companies. She explains the incentives and rewards that lead to more engagement from champions …
  continue reading
 
Inspired by my co-host Jason Albuquerque, this quarter's Say Easy, Do Hard segment is Job Search Strategies for CISOs. In part 2, Jason proposes we blow it all up, while Ben recommends a certification board for CISOs. We have no shortage of suggestions for how to fix the CISO hiring problem. Show Notes: https://securityweekly.com/bsw-359…
  continue reading
 
Inspired by my co-host Jason Albuquerque, this quarter's Say Easy, Do Hard segment is Job Search Strategies for CISOs. In part 1, we discuss the challenges facing the CISO role and it's hiring. As CISOs leave the role, the position is not necessarily being refilled. How will this impact future CISO hiring? Show Notes: https://securityweekly.com/bsw…
  continue reading
 
A small Pastis, a game of boules and a conversation putting the rock and roll world to rights, which this week includes … … why Debbie Harry and Mick Jagger worked so well on the small screen. … Elvin Pelvin on the Bilko Show and how Elvis was modelled on Tony Curtis. … An American Werewolf In London, The Birds, Invasion of the Bodysnatchers, Don’t…
  continue reading
 
This week, in the enterprise security news, over half a billion in funding, as everyone gets their pre-Blackhat announcements out! Mimecast picks up Code42 Will Cato Networks IPO? Canarytokens update We still have some crowdstrike fallout to discuss CISO responses to SEC rules Making things secure without security tools tips for going SOCLess denia…
  continue reading
 
There's plenty of content out there detailing how vendors fall short: scummy, aggressive sales tactics overuse of jargon and buzzwords sneaky sales tactics dumping on competitors products that fall far short of claims ambulance chasing So what should they doing? In this episode, we chat with Dani Wolff, about how marketers can adopt the skills and …
  continue reading
 
Rockfield is a converted farmhouse in the Welsh countryside where, for over 50 years, bands have lived while recording. In the ‘70s Tiffany Murray’s mum was the in-house cook, filling Motorhead to the brim with boeuf bourguignon and Black Sabbath with salmon en croute. Her touching memoir My Family And Other Rock Stars – hailed as “a rock and roll …
  continue reading
 
Remember 20 years ago? When we were certain SIEMs would grant our cybersecurity teams superpowers? Or 10 years ago, when we were sure that NGAV would put an end to malware as we knew it? Or 15 years ago, when we were sure that application control would put an end to malware as we knew it? Or 18 years ago, when NAC would put an end to unauthorized n…
  continue reading
 
Hacking traffic lights (for real this time), the Docker API strikes again, access Github deleted data, using EDR to elevate privileges on Windows, computers I need in my life, failed experiments and Raspberry PI access points, sitting ducks and TuDoor - its always DNS times 2, null sessions and a blast from the past, chaining UEFI vulnerabilities, …
  continue reading
 
John is one of the foremost experts in UEFI and joins us to talk about PK Fail! What happens when a vendor in the supply chain accidentally loses a key? It's one of the things that keeps me up at night. Well, now my nightmare scenario has come true as a key has been leaked. Learn how and why and what you can do about it in this segment! Show Notes:…
  continue reading
 
Mark Blake calls Dreams: the Many Lives of Fleetwood Mac a “mosaic biography”, their almost six-decade saga presented as a series of enthralling short stories with titles like ‘Mick Fleetwood’s Great Epiphany’ and ‘Rumours: A Doomed Romance in Six Acts’. It opens in fact with a “cast of characters”, the 18 one-time members, as if dramatis personae …
  continue reading
 
Modern appsec isn't modern because security tools got shifted in one direction or another, or because teams are finding and fixing more vulns. It's modern because appsec is meeting developer needs and supporting the business. Paul Davis talks about how AI is (and isn't) changing appsec, the KPIs that reflect outcomes rather than being busy, and the…
  continue reading
 
Beloved Canadian singer-songwriter Ron Sexsmith, old pal of the pod, is touring the UK in November, two of the nights at the Palladium, and looks back here at the first shows he saw and played himself. Which delights include … … what you learn playing Canadian bars aged 16. … seeing Elton John in a 75,000-seater stadium when he was 12. … early memo…
  continue reading
 
The CISO role has been evolving for 20 years, but the last 2 years have accelerated that evolution. Some might say it's evolving into extinction. What are the factors driving this evolution? Allan Alford, CEO at Alford and Adams Consulting and host of The Cyber Ranch Podcast, joins Business Security Weekly to discuss this evolution and some of the …
  continue reading
 
Identity, the security threat that keeps on giving. For the 17th year in a row, identity is one of the top threats identified in the Verizon DBIR. Why? Dor Fledel, Senior Director of Product Management at Okta and Co-Founder of Spera, joins Business Security Weekly to discuss the challenges of identity and how to solve them. From numerous disparate…
  continue reading
 
Passing the baton of discourse on the rock and roll racetrack, our Olympian hosts sprint in the following direction … … watching Toumani Diabaté play in the pitch-black Malian night. … Laurel Canyon, the Brain Damage Club and the great fire of ‘79. … the Kinks in Fortis Green Road, the Beatles in Chiswick House and other alternative London rock lan…
  continue reading
 
This week, on Enterprise Security Weekly, we've got: Identity Security gets more funding Wiz walks away BlackHat Announces Startup Spotlight Finalists Crowdstrike post mortem Simple Security Tricks are the Best Security Tricks Splitting the CISO role Web scraping for AI is out of control SEC vs Solarwinds Vaping the Internet Show Notes: https://sec…
  continue reading
 
Loading …

Quick Reference Guide