show episodes
 
I'm Ajay Singh, brings you #AjaySinghTalk. In every episode, I'm sharing my life's experiences, what I've learned and what I'm learning throughout my journey. It's a journey of understanding the real you, It's a journey of finding you. Every episode has been designed to give you a different perspective of life. Everyone perceives life differently and that's the uniqueness of everyone. In every episode, I'll share my perspective. Episodes are not designed as life advice but as a new interpret ...
  continue reading
 
Artwork

1
(Pop) Cultural Marxism

Brooklyn Institute for Social Research

Unsubscribe
Unsubscribe
Monthly
 
In (Pop) Cultural Marxism, a subseries of the Podcast for Social Research, BISR faculty Ajay Singh Chaudhary and Isi Litke (and special guests!) will be exploring the “fantastic form” of pop-cultural commodities—from film and television to toys and games to objects of every conceivable consumer variety.
  continue reading
 
Artwork

1
What's Left of Philosophy

Lillian Cicerchia, Owen Glyn-Williams, Gil Morejón, and William Paris

Unsubscribe
Unsubscribe
Monthly+
 
In What’s Left of Philosophy Gil Morejón (@gdmorejon), Lillian Cicerchia (@lilcicerch), Owen Glyn-Williams (@oglynwil), and William Paris (@williammparis) discuss philosophy’s radical histories and contemporary political theory. Philosophy isn't dead, but what's left? Support us at patreon.com/leftofphilosophy
  continue reading
 
Artwork
 
Our podcast includes episodes of KPFA Radio shows as well as station updates and donor highlights. KPFA is a community powered radio station that creates and curates a unique mix of music, informed public affairs, culture, and news. Since 1949, KPFA has investigated the contemporary intersections of class, race, distribution of wealth and it’s affects on the citizens of our Northern and Central California coverage area.
  continue reading
 
Anupama Chopra, founder & editor of Film Companion, is a film critic, television anchor and book author. She has been writing about Bollywood since 1993. Her work has appeared in publications such as The New York Times, Hindustan Times, The Los Angeles Times and Vogue (India). Here you can find all of her reviews for movies from across the globe.
  continue reading
 
Artwork
 
HinduLounge: Conversations over Coffee is brought to you by HinduPACT, Hindu Policy Research and Advocacy Collective, an initiative of World Hindu Council of America (VHPA). HinduLounge: Conversations over Coffee brings you fascinating guests to talk on issues from American Hindu perspective. It is hosted by Utsav Chakrabarti and Ajay Shah
  continue reading
 
Artwork
 
We hope to get remarkable feedback as that's going to help us grow more. Do LIKE the Audio and SHARE among your circle! We shall come up with amazing stomach aching comedy further too!
  continue reading
 
Artwork

1
Filmy Fever

Fever FM - HT Smartcast

Unsubscribe
Unsubscribe
Monthly+
 
A podcast where you'll find all the latest interviews of your favourite stars, hosted by RJ Picture Pandey aka Anurag Pandey. This is your ultimate source for exclusive entertainment, interviews, B-town gossip, and filmy news, all combined together to enrich your cinematic experience. This weekly podcast is a Fever 104 production, brought to you by HTSmartcast.
  continue reading
 
क्या आपको कहानी सुनना अच्छा लगता है? स्टोरीजैम में सुनिए कहानियां, कुछ जानी पहचानी, कुछ अनजानी. प्रेमचंद के गाँव हो या मन्नू भंडारी का कनाट प्लेस, भीष्म साहनी का पंजाब या फणीश्वर नाथ रेनू का बिहार, देश भर की चुनिंदा कहानियां आप यहाँ सुन सकते हैं तो सुनो कहानी स्टोरीजैम में आरती की ज़ुबानी ! I read aloud stories/ kahaniyan to you. Stories that are sometimes well known, sometimes lesser known, always memorable! From Premchand to Mannu Bhandari, Bhisham Sahani to Renu, you're sure to find a stor ...
  continue reading
 
The Filter Koffee podcast is not an interview. It is a window into the minds of the most interesting people that the host has met. A peek into their craft, passions and convictions. Mostly, it is a conversation. The kind that leaves you richer. The kind that only coffee can bring out. Karthik Nagarajan likes his coffee strong, just like his conversations. This cryptographer turned researcher turned screen writer turned marketer, sits down with creators, activists, business leaders, and the o ...
  continue reading
 
Artwork

1
No Rating Movie Review

Hindustan Times - HT Smartcast

Unsubscribe
Unsubscribe
Monthly
 
The podcast brings to you latest film reviews from Bollywood. And without any star rating, Monika Rawal, the Entertainment Editor of HT City, gives you a detailed lowdown on what works for her and what doesn't and what can you expect from the film. This is a Hindustan Times production, brought to you by HT Smartcast.
  continue reading
 
Loading …
show series
 
John is one of the foremost experts in UEFI and joins us to talk about PK Fail! What happens when a vendor in the supply chain accidentally loses a key? It's one of the things that keeps me up at night. Well, now my nightmare scenario has come true as a key has been leaked. Learn how and why and what you can do about it in this segment! Hacking tra…
  continue reading
 
Modern appsec isn't modern because security tools got shifted in one direction or another, or because teams are finding and fixing more vulns. It's modern because appsec is meeting developer needs and supporting the business. Paul Davis talks about how AI is (and isn't) changing appsec, the KPIs that reflect outcomes rather than being busy, and the…
  continue reading
 
Identity, the security threat that keeps on giving. For the 17th year in a row, identity is one of the top threats identified in the Verizon DBIR. Why? Dor Fledel, Senior Director of Product Management at Okta and Co-Founder of Spera, joins Business Security Weekly to discuss the challenges of identity and how to solve them. From numerous disparate…
  continue reading
 
The emergence of generative AI has caused us to rethink things on two fronts: how we consume threat detection data, as defenders how we need to shift our thinking and approaches to prepare for attackers' newfound GenAI capabilities But wait - is GenAI even useful for defenders or attackers? We'll dive deep into the state of AI as it pertains to sec…
  continue reading
 
"Bad Newz," a sequel to "Good Newzz," explores a complex pregnancy scenario where a woman is pregnant with twins from two different fathers. Featuring Vicky Kaushal, Tripti Dimri, and Ammy Virk, the film includes nostalgic music and glossy visuals. Does the gloss get into the way of sincere storytelling, or do we find ourselves in the midst of an e…
  continue reading
 
Doug and the Security Weekly crew talk about vulnerabilities, are we patching the right things? This is the burning question. We will try to answer it. Segment Resources: https://blog.sonicwall.com/en-us/2024/04/patch-tuesday-which-vulnerabilities-really-need-prioritizing/ Segment description coming soon!The Crowdstrike incident: what happened and …
  continue reading
 
Generative AI has produced impressive chatbots and content generation, but however fun or impressive those might be, they don't always translate to value for appsec. Allie brings some realistic expectations to how genAI is used by attackers and can be useful to defenders. Segment resources: https://www.forrester.com/blogs/generative-ai-will-not-ful…
  continue reading
 
Back in April, we covered a story on episode #348 titled "CISO-CEO communication gaps continue to undermine cybersecurity". In that article, Sumedh Thakar, the CEO at Qualys, stated "CISOs must translate technical risks into business impact for CEOs." But he didn't say how. So, we invited him on the show to explain. In this episode, Sumedh walks us…
  continue reading
 
In this episode of Security Weekly News, Dr. Doug White and Josh Marpet delve into the widespread impact of the recent CrowdStrike and Microsoft technical issue, which disrupted various industries, including airlines, DMVs, and hospitals. They discuss the interconnectedness of modern systems, the reliance on automatic updates, and the critical need…
  continue reading
 
In this episode of Enterprise Security Weekly, we revisit the insightful book "Jump-start Your SOC Analyst Career" with authors Jarrett Rodrick and Tyler Wall, exploring updates on career paths, opportunities, and the industry's reality. We delve into the myths versus the truths about cybersecurity careers, discussing the viability of high salaries…
  continue reading
 
Love is a complex emotion. One that few have been able to understand, let alone explain. Mannu Bhandari delves into the mind of a young woman at crossroads, as she tries to untangle the emotions she feels for the two men in her life.There are few love stories as candid and powerful as this one. The story was made into a memorable film by Basu Chatt…
  continue reading
 
Thinking about getting a 3D printer or have one and need a good primer? Check out this segment, we live 3D print a Captain Crunch whistle and talk all about 3D printing for hackers! Segment Resources: Slides used in this segment: https://files.scmagazine.com/wp-content/uploads/2024/07/3D-Printing-for-Hackers.pdf Major 3D Printer Websites: https://v…
  continue reading
 
In this episode, we talk about the late, great Charles Mills and his landmark book The Racial Contract. Forcefully arguing that the modern discourse of egalitarianism and freedom is underwritten by a tacit commitment to global white supremacy, Mills develops an immanent criticism of liberalism that remains faithful to many of its core values. We di…
  continue reading
 
How can LLMs be valuable to developers as an assistant in finding and fixing insecure code? There are a lot of implications in trusting AI or LLMs to not only find vulns, but in producing code that fixes an underlying problem without changing an app's intended behavior. Stuart McClure explains how combining LLMs with agents and RAGs helps make AI-i…
  continue reading
 
Cyber insurance underwriting is all over the map. With such a variation in application requirements, how should small and medium businesses prepare to receive the best policy for the price? Brian Fritton joins Business Security Weekly to discuss a systematic approach to preparing for cyber insurance. By working with the underwriters, this approach …
  continue reading
 
I'm always thrilled to chat with ex-analysts, and Henrique Teixeira can cover a lot of ground with us on the topic of identity management and governance. The more I talk to folks about IAM/IGA, the more I'm shocked at how little has changed. If anything, it seems like we've gone backwards a bit, with the addition of cloud SaaS, mobile devices, and …
  continue reading
 
"Kill," directed by Nikhil Nagesh Bhat, is a raw and thrilling film set on a train, featuring intense close-quarters combat and extreme violence. The story follows commandos Amrit and Viresh rescuing Amrit’s girlfriend from dacoits. Despite its brutality, the film captivates with powerful performances, dark humor, and social commentary, blurring th…
  continue reading
 
Hosted by Rona Renner - Pain is an unpleasant signal and complex experience when something hurts. It’s an important message to let us know something is wrong, and to help us to take action to prevent further harm. Pain will often go away on its own, but it can also persist and become chronic pain, which is one of the most common reasons people seek…
  continue reading
 
Bats in your headset, Windows Wifi driver vulnerabilities, Logitech's dongles, lighthttpd is heavy with vulnerabilities, node-ip's not vulnerability, New Intel CPU non-attacks, Blast Radius, Flipper Zero alternatives, will OpenSSH be exploited, emergency Juniper patches, and the D-Link botnet grows. Iceman comes on the show to talk about RFID and N…
  continue reading
 
Sandy Carielli and Janet Worthington, authors of the State Of Application Security 2024 report, join us to discuss their findings on trends this year! Old vulns, more bots, and more targeted supply chain attacks -- we should be better at this by now. We talk about where secure design fits into all this why appsec needs to accelerate to ludicrous sp…
  continue reading
 
On average, CISOs manage 50-75 security products. Many of these products have either not been deployed or only partially deployed, while others overlap of products. How do CISOs effectively consolidate their products to a manageable size? Max Shier, Chief Information Security Officer at Optiv Security, joins Business Security Weekly to discuss tech…
  continue reading
 
Exploring the Hardware Hacking Realm with Joe Grand, AKA Kingpin Joe Grand, also known by his hacker pseudonym "Kingpin," stands as a prominent figure in the cybersecurity landscape. With an extensive background in hardware hacking, reverse engineering, and embedded systems, Joe has carved a niche for himself as a respected authority in the field. …
  continue reading
 
July 2, 2024 - KPFA Radio station updates with host mikO Tolliver & Interim General Manager Antonio Ortiz 75th Anniversary Year 4th of July Federal Holiday - Station Closed No Summer Fund Drive ON THE DECK taking summer break. Will return in September. Donor Highlight - Stephen from Ukiah Follow KPFA on Social Media…
  continue reading
 
Check out this interview from the SWN Vault, hand picked by main host Doug White! This Secure Digital Life segment was originally published on March 6, 2017. Have you ever wondered what phishing is? Do you know what spear phishing attacks are? Doug and Russ explain how to protect yourself from phishing scams in the inaugural episode of Secure Digit…
  continue reading
 
Check out this interview from the BSW Vault, hand picked by main host Matt Alderman! This segment was originally published on October 11, 2022. As 2023 approaches, security leaders are hard at work preparing their budgets, identifying their projects, and setting their priorities for the next twelve months. At the same time, the growth mode days of …
  continue reading
 
In this episode, we discuss Robert Nozick’s libertarian political philosophy as presented in his 1974 book Anarchy, State, and Utopia. We consider his challenges to leftist thought, especially the sort of left liberalism championed by the likes of John Rawls. We take seriously his demand for an argument for egalitarianism and his critique of patter…
  continue reading
 
"Kalki 2898 AD" is an ambitious film by Nag Ashwin, blending Indian mythology with Western sci-fi. The story, inspired by the Puranas and the Mahabharata, echoes classics like "Dune" and "Metropolis." While the visuals are stunning and the cast star-studded, the film's creativity and ambition shine through, offering a unique cinematic experience. W…
  continue reading
 
Healthcare and malware, MoveIT, Chrome won't trust Entrust, the discovery of Volt Typhoon, & more on this episode of the Security Weekly News! Segment Resources: https://therecord.media/volt-typhoon-targets-underestimated-cisa-says Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-395…
  continue reading
 
We all might be a little worn out on this topic, but there's no escaping it. Executives want to adopt GenAI and it is being embedded into nearly every software product we use in both our professional and personal lives. In this interview, Anurag joins us to discuss how his company evaluated and ultimately integrated AI-based technologies into their…
  continue reading
 
This may be controversial, however, we've been privately discussing how organizations benefit from penetration testing and vulnerability scanning. Do you still need these services as a critical part of your security program? Can't you just patch stuff that is missing patches? Tune in for a lively debate! Zyxl NAS devices are under attack and the ex…
  continue reading
 
A recent chat with Jeremy White, film-maker, activist, and street medic who’s facing prison time in what has been dubbed the “San Diego Antifa” case. You’ll hear Jeremy talk about what happened on January 9th, 2021 at the Stop The Steal rally, how the police interacted with members of American Guard and Proud Boys as they assaulted passers by, the …
  continue reading
 
With 71% of web traffic coming from API calls last year and the average organization maintaining 613 API endpoints, a robust strategy is needed to protect APIs against automated threats and business logic attacks. Tune in as Luke Babarinde, Global Solution Architect, shares the key steps to building a successful API security strategy. This segment …
  continue reading
 
OAuth 2.0 is more than just a single spec and it's used to protect more than just APIs. We talk about challenges in maintaining a spec over a decade of changing technologies and new threat models. Not only can OAuth be challenging to secure by default, but it's not even always inter-operable. Segment Resources: https://oauth.net/2.1 https://oauth.n…
  continue reading
 
Traditional approaches to access management are no longer sufficient to safeguard enterprise security. Tim will explain why the most effective approach to modern enterprise security requires a Zero Trust model that extends beyond just access to encompass every action, no matter how minor. Tim will describe the importance of implementing a Zero Trus…
  continue reading
 
Check out this interview from the SWN Vault, hand picked by main host Doug White! This Secure Digital Life segment was originally published on June 19, 2018. This week, Doug and Russ interview Matthew Silva, President and Founder of the Cybersecurity and Intel Club at Roger Williams University! They talk about majoring in Cybersecurity vs. Computer…
  continue reading
 
मुग़लों ने अपनी सल्तनत अंग्रेज़ों को कब और कैसे बक्शी, ये जानिए गप्पबाज़हीरो जी से। लेकिन अगर वाकयी हिंदुस्तान पर अंग्रेज़ी हुकूमत के पीछे की कहानी पता लगानी है तो William Dalrymple और Anita Anand की podcast 'Empire' सुनिए यहाँ -https://open.spotify.com/show/0sBh58hSTReUQiK4axYUVx?si=659c1a5311b94616 Thumbnail Art:Title: Shah 'Alam, Mughal Emperor …
  continue reading
 
FIDO security keys are not new in the authentication workflow. They have been around now for 10 years. What is new is the combination of the most secure multi-factor authentication method not only for logical but also for physical access control with the highest FIPS140-3 security certification in the market. Segment Resources: Video "Swissbit iShi…
  continue reading
 
Log4j, solar winds, tesla hacks, and the wave of high profile appsec problems aren’t going to go away with current approaches like SAST and SCA. Why? They are: -40 years old, with little innovation -Haven’t solved the problem. In this segment, we talk about fully autonomous application security. Vetted by DARPA in the Cyber Grand Challenge, the app…
  continue reading
 
In this second episode of the newly launched Verso Book Club Podcast, Jules Gill-Peterson sits down with our host, Eleanor Penny, to discuss her new book A Short History of Trans Misogyny. In this incisive account of the invention of trans panic, A Short History of Trans Misogyny challenges the notion of transmisogyny as simply an attempt to mock o…
  continue reading
 
Exploring the Strategic Minds in Cybersecurity: A Conversation with Dave Aitel Welcome to an enlightening episode of our podcast, where we sit down with Dave Aitel, a prominent figure in the cybersecurity landscape. With a robust background in offensive security and an extensive career spanning various facets of the industry, Dave brings a wealth o…
  continue reading
 
Check out this interview from the ASW Vault, hand picked by main host Mike Shema! This segment was originally published on April 4, 2023. Following on from her successful title "Container Security", Liz has recently authored "Learning eBPF", published by O'Reilly. eBPF is a revolutionary kernel technology that is enabling a whole new generation of …
  continue reading
 
Check out this interview from the SWN Vault, hand picked by main host Doug White! This Secure Digital Life segment was originally published on September 25, 2018. This week, Russ takes the reigns in the absence of Dr. Doug to talk about Networking 101! We are going to go back to school to examine how networking and the internet actually work. Russ …
  continue reading
 
Loading …

Quick Reference Guide