show episodes
 
Artwork
 
Hey there! Welcome to my podcast. This is your host Anurag! Every episode, I try to write a short story embarking you on a creative journey! Please do listen to my episodes, share your feedback and get your friends and family to listen!
  continue reading
 
"History is who we are and why we are the way we are." This podcast will explore fascinating and rich Indian history through narratives. Our history is so widespread that we can imagine covering only a fraction of it. Each episode will take us one step closer to understanding our rich heritage and culture. Brought to you by. Creator and Host: Anurag A S Direction and Music: Raghavan Coverart: Arkoprabhu
  continue reading
 
Artwork

1
The Metabolic Link

Dr. Dominic D'Agostino PhD, Dr. Angela Poff PhD, and Victoria Field

Unsubscribe
Unsubscribe
Monthly+
 
Welcome to The Metabolic Link, a medical and science podcast that explores the common thread of metabolism in health and disease. Join Dr. Dominic D'Agostino PhD, Dr. Angela Poff PhD, and Victoria Field as they dive into the latest research on metabolic health and therapy alongside some of the world’s leading experts. They'll also discuss how this science is being applied in the real world. This is where science meets society.
  continue reading
 
Artwork

1
AERO Life

Anurag Chakraborty

Unsubscribe
Unsubscribe
Monthly
 
Do you want to know why there is a hole in the window of your aeroplane or the ultimate technique of getting free flights? Hey there, this is Anurag and I would love you to join me on my podcast AERO Life where I discuss with various guests of mine about aviation, piloting, rockets and their upcoming launches and many more; about those who operate them and those who design and build them. I hope our conversation will be a great journey for you to experience. Join me on my adventure to explor ...
  continue reading
 
Artwork

1
Thorns Have Roses

Anurag Papolu and Christina Li

Unsubscribe
Unsubscribe
Monthly
 
Do roses have thorns, or do thorns have roses? We offer a different way of seeing the world. Join us biweekly as we dissect modern topics with knowledgeable people to broaden our perspectives.
  continue reading
 
Artwork
 
Hashing It Out is Cointelegraph’s technical crypto podcast, covering innovations, emerging technology and important stories from the blockchain industry. It features interviews with thought leaders in the space, focusing on BTC, Ethereum, altcoins and new technological advancements in the cryptocurrency industry.
  continue reading
 
Artwork

1
Invest it Best

Wilsons Advisory

Unsubscribe
Unsubscribe
Monthly
 
‘Invest it Best‘ is a new investing podcast where you will hear from expert analysts, advisers and fund managers. The show will provide you with insight as to their views on the market, what they‘re looking at, and importantly why that matters. ‘Invest it Best‘ is proudly brought to you by Wilsons Advisory - one of Australia‘s leading financial advisory firms.
  continue reading
 
Hosted by Adrian Sanabria, Tyler Shields, Katie Teitler, and Sean Metcalf. If you’re looking for advice and information on enterprise security solutions, look no further than Enterprise Security Weekly! We give you an “insider” perspective into security vendors, including coverage on new product announcements, integrations, funding, M&A, and more! Adrian, Tyler, Katie, and Sean have unique perspectives on the enterprise security landscape. All four hosts are former analysts. Adrian has been ...
  continue reading
 
Artwork

1
Mirror Talks

Bentinho Massaro

Unsubscribe
Unsubscribe
Monthly
 
Welcome to the Mirror Talks Podcast with Bentinho Massaro where we deconstruct some of humanity's most disconnecting and limiting assumptions and offer an alternative: a free state of consciousness—unbiased, naturally wise, and genuinely loving. We will shed a more enlightened perspective on everyday experiences to help anyone willing realize their true potential and inspire a contemporary spiritual life lived in service to all. Say goodbye to the man-made paradigms of distorted ideas. Let’s ...
  continue reading
 
Storytelling is an ancient craft and humans are wired for story. Yet when it comes to telling the story of our work, we often fall short. My mission, through 'Story Rules', is to help you tell a better story of your work. I do that by tapping into the fascinating and wondrous world of Storytelling techniques. The Story Rules Podcast is a further step in that direction. In episodes of the podcast, we will have long, deep and meaningful conversations with some of the best storytellers in the w ...
  continue reading
 
At Keshavs ANJASMINDCAST, we believe in this Motivational HUB'S show which focuses on to make you completely strengthened and motivated to move forward and to enable each one of you to be a better version of self to fight the hurdles and challenges that comes across your way and it wish you to be passionate helpers of this initiative. Welcome to this club, which is full of positivity, self-love, mental wellness, self-discovery in life and lifestyle, and inspirational stories in a Halcyon way.
  continue reading
 
Artwork

1
Parliamentary Conversations in the Commonwealth

Commonwealth Parliamentary Association

Unsubscribe
Unsubscribe
Monthly
 
Parliamentary Conversations in the Commonwealth, a podcast by the Commonwealth Parliamentary Association (CPA), gives a voice to parliamentarians, civil society experts and activists across the Commonwealth to discuss common democratic challenges and share their ideas on what can be done to solve them. The CPA promotes knowledge of the constitutional, legislative, economic, social and cultural aspects of parliamentary democracy. Our work enables Commonwealth Parliamentarians and officials to ...
  continue reading
 
Everyone remembers the curtain call, but what goes on during the build-up towards that penultimate moment? What ensues when you get a celebrated author to open up for a heart-to-heart? The Teamwork Arts podcast promises to offer a slew of cross-genre conversations that go beyond the labels one tends to attach to creative endeavors. This is an ideal show for when you want to sit in on captivating, enthralling, and sometimes downright hilarious conversations with professionals from all across ...
  continue reading
 
Loading …
show series
 
In this episode of Security Weekly News, Dr. Doug White and Josh Marpet delve into the widespread impact of the recent CrowdStrike and Microsoft technical issue, which disrupted various industries, including airlines, DMVs, and hospitals. They discuss the interconnectedness of modern systems, the reliance on automatic updates, and the critical need…
  continue reading
 
In this episode of Enterprise Security Weekly, we revisit the insightful book "Jump-start Your SOC Analyst Career" with authors Jarrett Rodrick and Tyler Wall, exploring updates on career paths, opportunities, and the industry's reality. We delve into the myths versus the truths about cybersecurity careers, discussing the viability of high salaries…
  continue reading
 
In this episode of Enterprise Security Weekly, we revisit the insightful book "Jump-start Your SOC Analyst Career" with authors Jarrett Rodrick and Tyler Wall, exploring updates on career paths, opportunities, and the industry's reality. We delve into the myths versus the truths about cybersecurity careers, discussing the viability of high salaries…
  continue reading
 
Thinking about getting a 3D printer or have one and need a good primer? Check out this segment, we live 3D print a Captain Crunch whistle and talk all about 3D printing for hackers! Segment Resources: Slides used in this segment: https://files.scmagazine.com/wp-content/uploads/2024/07/3D-Printing-for-Hackers.pdf Major 3D Printer Websites: https://v…
  continue reading
 
How can LLMs be valuable to developers as an assistant in finding and fixing insecure code? There are a lot of implications in trusting AI or LLMs to not only find vulns, but in producing code that fixes an underlying problem without changing an app's intended behavior. Stuart McClure explains how combining LLMs with agents and RAGs helps make AI-i…
  continue reading
 
Become a member of The Metabolic Initiative for ad-free episodes and CMEs In this episode of The Metabolic Link, host Victoria Field interviews Dr. Deanna Kelly, a distinguished professor of psychiatry at the University of Maryland School of Medicine. Dr. Kelly is pioneering nutritional interventions to treat serious mental illness and led a ground…
  continue reading
 
Cyber insurance underwriting is all over the map. With such a variation in application requirements, how should small and medium businesses prepare to receive the best policy for the price? Brian Fritton joins Business Security Weekly to discuss a systematic approach to preparing for cyber insurance. By working with the underwriters, this approach …
  continue reading
 
I'm always thrilled to chat with ex-analysts, and Henrique Teixeira can cover a lot of ground with us on the topic of identity management and governance. The more I talk to folks about IAM/IGA, the more I'm shocked at how little has changed. If anything, it seems like we've gone backwards a bit, with the addition of cloud SaaS, mobile devices, and …
  continue reading
 
I'm always thrilled to chat with ex-analysts, and Henrique Teixeira can cover a lot of ground with us on the topic of identity management and governance. The more I talk to folks about IAM/IGA, the more I'm shocked at how little has changed. If anything, it seems like we've gone backwards a bit, with the addition of cloud SaaS, mobile devices, and …
  continue reading
 
On this episode of the Invest it Best podcast host Ted Richards speaks with Greg Burke, Equity Strategist at Wilsons Advisory. They discuss different trends across the food industry in Australia including the following; - Greg's recent research report on Australian supermarkets - Impacts from cost of living pressures, easing food prices and regulat…
  continue reading
 
Bats in your headset, Windows Wifi driver vulnerabilities, Logitech's dongles, lighthttpd is heavy with vulnerabilities, node-ip's not vulnerability, New Intel CPU non-attacks, Blast Radius, Flipper Zero alternatives, will OpenSSH be exploited, emergency Juniper patches, and the D-Link botnet grows. Iceman comes on the show to talk about RFID and N…
  continue reading
 
“Storytelling is not about glibness. Storytelling is not about verbosity. Storytelling is not just about your confidence or doing it though it is an important aspect of it. Storytelling is fundamentally about the clarity of what you are saying." That is Nitin Seth, Co-Founder and CEO of Incedo Inc. and author of the recent bestseller, 'Mastering th…
  continue reading
 
Sandy Carielli and Janet Worthington, authors of the State Of Application Security 2024 report, join us to discuss their findings on trends this year! Old vulns, more bots, and more targeted supply chain attacks -- we should be better at this by now. We talk about where secure design fits into all this why appsec needs to accelerate to ludicrous sp…
  continue reading
 
On average, CISOs manage 50-75 security products. Many of these products have either not been deployed or only partially deployed, while others overlap of products. How do CISOs effectively consolidate their products to a manageable size? Max Shier, Chief Information Security Officer at Optiv Security, joins Business Security Weekly to discuss tech…
  continue reading
 
Exploring the Hardware Hacking Realm with Joe Grand, AKA Kingpin Joe Grand, also known by his hacker pseudonym "Kingpin," stands as a prominent figure in the cybersecurity landscape. With an extensive background in hardware hacking, reverse engineering, and embedded systems, Joe has carved a niche for himself as a respected authority in the field. …
  continue reading
 
Check out this interview from the SWN Vault, hand picked by main host Doug White! This Secure Digital Life segment was originally published on March 6, 2017. Have you ever wondered what phishing is? Do you know what spear phishing attacks are? Doug and Russ explain how to protect yourself from phishing scams in the inaugural episode of Secure Digit…
  continue reading
 
Become a member of The Metabolic Initiative to access exclusive episodes and earn CMEs: https://membership.metabolicinitiative.com In this episode of the Metabolic Link Podcast, host Dr. Dom D'Agostino sits down with Dr. Robert Lustig to discuss groundbreaking research unifying different models of obesity. They dive deep into the flaws of the tradi…
  continue reading
 
Check out this interview from the BSW Vault, hand picked by main host Matt Alderman! This segment was originally published on October 11, 2022. As 2023 approaches, security leaders are hard at work preparing their budgets, identifying their projects, and setting their priorities for the next twelve months. At the same time, the growth mode days of …
  continue reading
 
Healthcare and malware, MoveIT, Chrome won't trust Entrust, the discovery of Volt Typhoon, & more on this episode of the Security Weekly News! Segment Resources: https://therecord.media/volt-typhoon-targets-underestimated-cisa-says Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-395…
  continue reading
 
We all might be a little worn out on this topic, but there's no escaping it. Executives want to adopt GenAI and it is being embedded into nearly every software product we use in both our professional and personal lives. In this interview, Anurag joins us to discuss how his company evaluated and ultimately integrated AI-based technologies into their…
  continue reading
 
We all might be a little worn out on this topic, but there's no escaping it. Executives want to adopt GenAI and it is being embedded into nearly every software product we use in both our professional and personal lives. In this interview, Anurag joins us to discuss how his company evaluated and ultimately integrated AI-based technologies into their…
  continue reading
 
This may be controversial, however, we've been privately discussing how organizations benefit from penetration testing and vulnerability scanning. Do you still need these services as a critical part of your security program? Can't you just patch stuff that is missing patches? Tune in for a lively debate! Zyxl NAS devices are under attack and the ex…
  continue reading
 
With 71% of web traffic coming from API calls last year and the average organization maintaining 613 API endpoints, a robust strategy is needed to protect APIs against automated threats and business logic attacks. Tune in as Luke Babarinde, Global Solution Architect, shares the key steps to building a successful API security strategy. This segment …
  continue reading
 
OAuth 2.0 is more than just a single spec and it's used to protect more than just APIs. We talk about challenges in maintaining a spec over a decade of changing technologies and new threat models. Not only can OAuth be challenging to secure by default, but it's not even always inter-operable. Segment Resources: https://oauth.net/2.1 https://oauth.n…
  continue reading
 
Traditional approaches to access management are no longer sufficient to safeguard enterprise security. Tim will explain why the most effective approach to modern enterprise security requires a Zero Trust model that extends beyond just access to encompass every action, no matter how minor. Tim will describe the importance of implementing a Zero Trus…
  continue reading
 
Traditional approaches to access management are no longer sufficient to safeguard enterprise security. Tim will explain why the most effective approach to modern enterprise security requires a Zero Trust model that extends beyond just access to encompass every action, no matter how minor. Tim will describe the importance of implementing a Zero Trus…
  continue reading
 
Check out this interview from the SWN Vault, hand picked by main host Doug White! This Secure Digital Life segment was originally published on June 19, 2018. This week, Doug and Russ interview Matthew Silva, President and Founder of the Cybersecurity and Intel Club at Roger Williams University! They talk about majoring in Cybersecurity vs. Computer…
  continue reading
 
FIDO security keys are not new in the authentication workflow. They have been around now for 10 years. What is new is the combination of the most secure multi-factor authentication method not only for logical but also for physical access control with the highest FIPS140-3 security certification in the market. Segment Resources: Video "Swissbit iShi…
  continue reading
 
FIDO security keys are not new in the authentication workflow. They have been around now for 10 years. What is new is the combination of the most secure multi-factor authentication method not only for logical but also for physical access control with the highest FIPS140-3 security certification in the market. Segment Resources: Video "Swissbit iShi…
  continue reading
 
Log4j, solar winds, tesla hacks, and the wave of high profile appsec problems aren’t going to go away with current approaches like SAST and SCA. Why? They are: -40 years old, with little innovation -Haven’t solved the problem. In this segment, we talk about fully autonomous application security. Vetted by DARPA in the Cyber Grand Challenge, the app…
  continue reading
 
Log4j, solar winds, tesla hacks, and the wave of high profile appsec problems aren’t going to go away with current approaches like SAST and SCA. Why? They are: -40 years old, with little innovation -Haven’t solved the problem. In this segment, we talk about fully autonomous application security. Vetted by DARPA in the Cyber Grand Challenge, the app…
  continue reading
 
In this episode of Cointelegraph’s Hashing it Out podcast, host Elisha Owusu Akyaw interviews Roy Hui, co-founder and CEO of LightLink, a layer-2 blockchain. Hui discusses the current state of the blockchain industry, the challenges faced by layer-2 solutions, and LightLink’s unique approach to addressing these challenges. Hui emphasizes LightLink’…
  continue reading
 
Exploring the Strategic Minds in Cybersecurity: A Conversation with Dave Aitel Welcome to an enlightening episode of our podcast, where we sit down with Dave Aitel, a prominent figure in the cybersecurity landscape. With a robust background in offensive security and an extensive career spanning various facets of the industry, Dave brings a wealth o…
  continue reading
 
Check out this interview from the ASW Vault, hand picked by main host Mike Shema! This segment was originally published on April 4, 2023. Following on from her successful title "Container Security", Liz has recently authored "Learning eBPF", published by O'Reilly. eBPF is a revolutionary kernel technology that is enabling a whole new generation of …
  continue reading
 
Check out this interview from the SWN Vault, hand picked by main host Doug White! This Secure Digital Life segment was originally published on September 25, 2018. This week, Russ takes the reigns in the absence of Dr. Doug to talk about Networking 101! We are going to go back to school to examine how networking and the internet actually work. Russ …
  continue reading
 
Become a member of The Metabolic Initiative to access exclusive episodes and earn CMEs: https://membership.metabolicinitiative.com In this interview, host Victoria Field sits down with Dr. Casey Means, a Stanford-trained physician, entrepreneur, and New York Times bestselling author of the new book Good Energy. Dr. Means shares her inspiring journe…
  continue reading
 
Check out this interview from the BSW Vault, hand picked by main host Matt Alderman! This segment was originally published on August 9, 2022. Zero Trust is the security buzzword of the moment, and while it is a very powerful approach, nearly every enterprise security product on the market – and some that aren’t even security products — are saying t…
  continue reading
 
This week, we've got data security being both funded AND acquired. We discuss Lacework's fall from unicorn status and why rumors that it went to Fortinet for considerably more than Wiz was willing to pay make sense. Microsoft Recall and Apple Intelligence are the perfect bookends for a conversation about the importance of handling consumer privacy …
  continue reading
 
Loading …

Quick Reference Guide