show episodes
 
Artwork

1
First on the Scene

First Responders Children's Foundation

Unsubscribe
Unsubscribe
Daily+
 
First on the Scene spotlights the everyday heroes who rush into danger to help their fellow citizens, often sacrificing their own lives to save total strangers.Go "behind-the-badge" with co-hosts Jillian Crane and Jodie Burke as they climb onto fire trucks, ride along in police cruisers, and query firefighters, law enforcement officers, paramedics, EMTs, 911 dispatchers, nurses and medical personnel who dedicate their lives to helping others by doing good.
  continue reading
 
Artwork

1
The Big Issues

The Big Issues Production Team

Unsubscribe
Unsubscribe
Monthly
 
From the remote twin-island paradise of Antigua and Barbuda, weekly guest panels discuss the biggest issues of politics, economy, people and culture, that make its sun-kissed shores famous and infamous. This programme is a NewsCo Observer Radio 91.1 FM production.
  continue reading
 
This show is hosted by Emma Reed, a Public Safety Dispatcher for close to 20 years. Emma discusses a variety of topics relevant to dispatchers (at least in her opinion, anyway), based on events and experiences she's gone through during her career. The topics she covers include the good, bad, ugly, horrific, beautiful and hilarious parts of life as a "first" First Responder. If you're looking to hear actual 911 calls, there are plenty of shows out there that would be perfect for you - but thi ...
  continue reading
 
Loading …
show series
 
We already have bug bounties for web apps so it was only a matter of time before we would have bounties for AI-related bugs. Keith Hoodlet shares his experience winning first place in the DOD's inaugural AI bias bounty program. He explains how his education in psychology helped fill in the lack of resources in testing an AI's bias. Then we discuss …
  continue reading
 
A lot of AI security has nothing to do with AI -- things like data privacy, access controls, and identity are concerns for any new software and in many cases AI concerns look more like old-school API concerns. But...there are still important aspects to AI safety and security, from prompt injection to jailbreaking to authenticity. Caleb Sima explain…
  continue reading
 
David Covington and John Draper discuss various topics related to crisis care and suicide prevention. They are joined by guest Joy Brunson-Nsubuga, who shares insights on her career and focus in crisis care. The conversation covers themes such as expanding crisis care to include addiction treatment and integrating lived experience in their work. Th…
  continue reading
 
Inspired by my co-host Jason Albuquerque, we dig into the hard part of our Say Easy, Do Hard segment. In part 2, we discuss how to train for a cyber instance. We'll cover the elements of a training program that will prepare you for responding to a cyber incident, including: Developing the training program Practice, practice, practice Imposing corre…
  continue reading
 
Inspired by my co-host Jason Albuquerque, this quarter's Say Easy, Do Hard segment is Train How You Fight. In part 1, we discuss the importance of training for a cyber incident. However, lots of organizations do not take it seriously, causing mistakes during an actual cyber incident. How will the lack of preparation impact your organization during …
  continue reading
 
It's the week before RSA and the news is PACKED. Everyone is trying to get their RSA announcements out all at once. We've got announcements about funding, acquisitions, partnerships, new companies, new products, new features... To make things MORE challenging, everyone is also putting out their big annual reports, like Verizon's DBIR and Mandiant's…
  continue reading
 
It's the most boring part of incident response. Skip it at your peril, however. In this interview, we'll talk to Joe Gross about why preparing for incident response is so important. There's SO MUCH to do, we'll spend some time breaking down the different tasks you need to complete long before an incident occurs. Resources 5 Best Practices for Build…
  continue reading
 
The Security Weekly crew discusses some of the latest articles and research in cryptography and some background relevant subtopics including the race against quantum computing, key management, creating your own crypto, selecting the right crypto and more! https://www.globalsecuritymag.com/keysight-introduces-testing-capabilities-to-strengthen-post-…
  continue reading
 
Companies deploy tools (usually lots of tools) to address different threats to supply chain security. Melinda Marks shares some of the chaos those companies still face when trying to prioritize investments, measure risk, and scale their solutions to keep pace with their development. Not only are companies still figuring out supply chain, but now th…
  continue reading
 
Join us on a compelling journey through the heart of crisis intervention with our esteemed guest, Willie Whited, a true pioneer in the field since the 1960s. Experience a blend of nostalgia, celebration, and insightful discussions as we kick off the conference season, reminiscing about past gatherings and gearing up for the unification of the natio…
  continue reading
 
In the leadership and communications section, The Board's Pivotal Role in Steering Cybersecurity, CISO-CEO communication gaps continue to undermine cybersecurity, The Essence of Integrity in Leadership: A Pillar of Trust and Excellence, and more! Show Notes: https://securityweekly.com/bsw-348
  continue reading
 
A hybrid workforce requires hybrid identity protection. But what are the threats facing a hybrid workforce? As identity becomes the new perimeter, we need to understand the attacks that can allow attackers access to our applications. Eric Woodruff, Product Technical Specialist at Semperis, joins Business Security Weekly to discuss those attacks, in…
  continue reading
 
This is a great interview with Adam Shostack on all things threat modeling. He's often the first name that pops into people's heads when threat modeling comes up, and has created or been involved with much of the foundational material around the subject. Adam recently released a whitepaper that focuses on and defines inherent threats. Resources: He…
  continue reading
 
We've talked about generative AI in a general sense on our podcast for years, but we haven't done many deep dives into specific security use cases. That ends with this interview, as we discuss how generative AI can improve SecOps with Ely Kahn. Some of the use cases are obvious, while others were a complete surprise to me. Check out this episode if…
  continue reading
 
This week the crew discusses: When TVs scan your network, bad things can happen, PuTTY is vulnerable, Crush FTP, vulnerabilities that will never be fixed, CVEs are for vulnerabilities silly, you can test for easily guessable passwords too, FlipperZero can steal all your passwords, more XZ style attacks, more reasons why you shouldn't use a smart lo…
  continue reading
 
A clear pattern with startups getting funding this week are "autonomous" products and features. Automated detection engineering Autonomously map and predict malicious infrastructure ..."helps your workforce resolve their own security issues autonomously" automated remediation automated compliance management & reporting I'll believe it when I see it…
  continue reading
 
On February 27, 2024, PCAST (President’s Council of Advisors on Science and Technology) sent a report to the President with recommendations to bolster the resilience and adaptability of the nation’s cyber-physical infrastructure resources. Phil was part of the team that worked on the report and comes on the show to talk about what was recommended a…
  continue reading
 
In this episode, David and Dr. John were joined by Professor Chan Lai Fong, who shared insights on suicide prevention efforts in Malaysia. The conversation covers themes such as the importance of decriminalizing suicide, reducing access to lethal means, and promoting gender equality. They also discuss the impact of the Zero Suicide movement and the…
  continue reading
 
Loading …

Quick Reference Guide