show episodes
 
Artwork

1
Driving While Awesome

Lane Skelton, Warren Madsen, Art Cervantes

Unsubscribe
Unsubscribe
Weekly
 
Driving While Awesome is an automotive podcast starring Lane Skelton, Waarren Madsen, and Art Cervantes. Experts in automotive opinion, long-time friends discuss topics on cars of all types, heavy on fun and cheap sports cars from the '80s and '90s, from a podcast studio in Santa Cruz, California. New episodes are uploaded every Thursday. Follow us on Instagram, YouTube, and Facebook @drivingwhileawesome and visit our website at drivingwhileawesome.com
  continue reading
 
"Fiercely and unapologetically progressive, and definitely NSFW. 'The Professional Left' features award-winning bloggers Driftglass and Blue Gal as they skewer right-wing absurdities and dismantle mainstream media mealy-mouths with razor-sharp wit and zero filter. From mercilessly mocking partisan hacks to elevating stories the media ignores, it's the profane, unflinching political commentary you didn't know you needed. More at http://ProLeftPod.com."
  continue reading
 
Welcome to the Security Weekly Podcast Network, your all-in-one source for the latest in cybersecurity! This feed features a diverse lineup of shows, including Application Security Weekly, Business Security Weekly, Paul's Security Weekly, Enterprise Security Weekly, and Security Weekly News. Whether you're a cybersecurity professional, business leader, or tech enthusiast, we cover all angles of the cybersecurity landscape. Tune in for in-depth panel discussions, expert guest interviews, and ...
  continue reading
 
Loading …
show series
 
This week in the enterprise security news, we've got: Torq, Tamnoon, and Defect Dojo raise funding Checkmarx acquires ZAP Commvault acquires Clumio Would you believe San Francisco is NOT the most funded metro area for cybersecurity? Auto-doxxing Smart glasses are now possible Meta gets fined $100M for storing plaintext passwords AI coding assistant…
  continue reading
 
Automated tank gauges are leaking more than just fuel, while CUPS is serving up a steaming hot brew of vulnerabilities. Meanwhile, Supermicro's BMC firmware is giving away root access like it's going out of style. If you thought your Kia was safe, think again - all it takes is a license plate and 30 seconds to turn your car into a hacker's joyride.…
  continue reading
 
Our latest in a series of interviews discussing cybersecurity career paths, today we talk to Jayson Grace his path into cybersecurity and his experience building red teams at national labs and purple teams at Meta. We also talk about his community impact, giving talks and building open source tools. Jayson just left Meta for an AI safety startup na…
  continue reading
 
Trump is melting. Vance is a robot replacement. Walz understood his assignment. And isn’t it interesting that Rep. Virginia Foxx of North Carolina, #1 enemy of socialism, wants the taxpayers to fix her husband’s driveway in the wake of Helene? More at proleftpod.com. You can help us pay for DG's eye doctor expenses at https://www.gofundme.com/f/hel…
  continue reading
 
We cover the usual (sad!) media failures leading up to the Vice Presidential Debate Tuesday night. Note: Our recording host had some technical issues that other podcasters were also experiencing today. Our apologies for "aborting" the show early...we had to get ready for the Vice Presidential Debate. Please listen to Driftglass and Digby discuss th…
  continue reading
 
In the leadership and communications segment, Underfunding And Leadership Gaps Weaken Cybersecurity Defenses, A Self-Care Checklist for Leaders, Senate bill eyes minimum cybersecurity standards for health care industry, and more! Show Notes: https://securityweekly.com/bsw-366
  continue reading
 
The zero-trust security model has been billed as an ultra-safe defense against emerging, unrecognized and well-known threats. Unlike perimeter security, it doesn't assume people inside an organization are automatically safe. Instead, it requires every user and device -- inside and out -- to be authorized before any access is granted. Sounds enticin…
  continue reading
 
In the Enterprise News, the hosts discuss various trends and challenges in the cybersecurity landscape, including the evolution of terminology, funding trends, the emergence of new startups, and the impact of AI on security practices. They also explore the challenges faced by CISOs, the importance of humor in the industry, and the future of quantum…
  continue reading
 
We've been hearing a lot lately about how the talent gap in cybersecurity is much more complex than some folks have been making it out to be. While making six figures after going through a six week boot camp might be overselling the cybersecurity job market a bit, it is definitely a complex space with lots of opportunities. Fortunately, we have fol…
  continue reading
 
Passwords, CUPS, KIA, Gilbert Gottfried, Salt Typhoon, Rob Allen from ThreatLocker, and More on the Security Weekly News. Segment Resources: https://www.bleepingcomputer.com/news/security/hackers-deploy-ai-written-malware-in-targeted-attacks/ This segment is sponsored by ThreatLocker. Visit https://securityweekly.com/threatlocker to learn more abou…
  continue reading
 
The SIEM market has undergone some significant changes this summer. This is a great opportunity to talk about the current state of SIEM! In this conversation, we'll discuss: market changes and terminology: security analytics, data lakes, SIEM what is SOAR's role in the current SIEM market? machine learning and generative AI's role strategies for im…
  continue reading
 
A Block: Driftglass and Bluegal read each other a list of standard performance review questions. Are we staff or management? B Block (40:30): Donald Trump and his party are flat-out in favor of ethnic cleansing in the United States. C Block (50:15): Kamala Harris's substantive interview on economics; reactions to it broke precisely as expected. New…
  continue reading
 
Kayla Williams, Chief Security Information Officer at Devo, discussed the role of AI in cybersecurity and the ongoing issue of burnout for SOC analysts. Working with Wakefield Research, Devo discovered that 83% of IT professionals feel burnt out due to stress, lack of sleep, and anxiety. Many also report that their burnout leads to breaches. This s…
  continue reading
 
This week in the security news, Dr. Doug and Larry explore various technological advancements and their implications with a healthy dose of nostalgia, particularly focusing on health monitoring through Wi-Fi signals, the misconceptions surrounding 5G connectivity, the importance of understanding internet speed needs, and the cybersecurity threats f…
  continue reading
 
Sorry, Maggie Haberman, we're just two married podcasters who live in a little house near a cornfield and who think the Beltway media is waaay too busy patting each other's backs. We're not an industry, we're pro-journalistic ethics (hello Olivia Nuzzi), political integrity (good bye Mark Robinson), and funding school lunches (Ahem). More at prolef…
  continue reading
 
APIs are essential to modern application architectures, driving rapid development, seamless integration, and improved user experiences. However, their widespread use has made them prime targets for attackers, especially those deploying sophisticated bots. When these bots exploit business logic, they can cause considerable financial and reputational…
  continue reading
 
AI is bringing productivity gains like we’ve never seen before -- with users, security teams and developers already reaping the benefits. However, AI is also bolstering existing threats to application security and user identity -- even enabling new, personalized attacks to emerge. Shiven Ramji, President of Customer Identity at Okta, joins Business…
  continue reading
 
In the leadership and communications segment, CISA Releases Cyber Defense Alignment Plan for Federal Agencies, UnitedHealth Group CISO: We had to ‘start over’ after Change Healthcare attack, 20 Essential Strategies for Leadership Development Success, and more! Show Notes: https://securityweekly.com/bsw-365…
  continue reading
 
This week, the cybersecurity industry's most basic assumptions under scrutiny. Following up our conversation with Wolfgang Goerlich, where he questions the value of phishing simulations, we discuss essays that call into question: the maturity of the industry the supposed "talent gap" with millions of open jobs despite complaints that this industry …
  continue reading
 
In this episode, we explore some compelling reasons for transitioning from traditional SOAR tools to next-generation SOAR platforms. Discover how workflow automation and orchestration offers unparalleled speed and flexibility, allowing organizations to stay ahead of evolving security threats. We also delve into how advancements in AI are driving th…
  continue reading
 
Loading …

Quick Reference Guide