Far too often, governments behave like toddlers. They’re fickle. They don’t like to share. And good luck getting them to pay attention to any problem that isn’t directly in front of them. They like to push each other to the brink, and often do. But when they don’t, it’s usually because other people enter the proverbial room. Private citizens who step up and play peacemaker when their governments won’t or can’t. People who strive for collaboration and understanding, and sometimes end up findi ...
…
continue reading
Connecting with celebrity guests, leading experts and change makers to discuss the widespread illicit drug culture ripping through families, businesses, sports, entertainment and even the safest communities. With conversations about the fentanyl and opioid crisis, harm reduction modalities, MAT (Medication Assisted Treatment) Narcan, Rehab, 12- Step Programs and more. Created by Flindt Andersen, Founder and Executive Director of PAIN: Parents & Addicts In Need and Hosted by Jason LaChance.
…
continue reading
All culture is propaganda. Everything you hold dear is connected to that which subjugates you. Deconstruct art, culture, and politics, and attempt to understand the pervasive conformism that has saturated it all. Hosted by Adam Lehrer and Matthew DeNicola patreon.com/systemofsystems safetypropaganda.substack.com x.com/SystemofSystem3 x.com/safetypropagan1 x.com/mattiopattio
…
continue reading
Big Butts No Lies is the best plastic surgery podcast hosted by plastic surgery patient coordinator Mavi Rodriguez. On this show you’ll hear a mix of interviews with talented plastic surgeons, recovery experts and real life patients. The conversations are an exquisite mix of pre-op and recovery tips for tummy tucks, liposuction, bbls (Brazilian butt lifts),breast lift and breast augmentation as well as insight into the beauty industry and breaking down the stigma around plastic surgery. We w ...
…
continue reading
Plastic Surgeons Dr. Sam Fuller and Dr. Dan Butz discuss a wide range of topics within plastic surgery, adding insight, detail, and humor to a captivating field in medicine. Join their conversation as they highlight advice, myths, facts, and everything you need to know about tummy tucks, breast augmentation, liposuction, and more! Included in the podcast are conversations spanning plastic surgery, such as botox, fillers, celebrity plastic surgery, mommy makeovers, breast lift, breast reducti ...
…
continue reading
If you're considering having an aesthetic procedure performed, Nurse Paula Young will arm you with information before scheduling your procedure! And, to complement your aesthetic goals, her guests include discussions on health, wellness and spirituality.
…
continue reading
The podcast for and about firefighters, "Code 3" covers topics of interest to those in the fire service, in about 20 minutes. We take one subject, one guest, and get it done. We don't waste your time.
…
continue reading
This feed includes all episodes of Paul's Security Weekly, Enterprise Security Weekly, Business Security Weekly, Application Security Weekly, and Security Weekly News! Your one-stop shop for all things Security Weekly!
…
continue reading
Russia’s unprovoked invasion of Ukraine has set in motion a catastrophic war. The consequences of this war will be both tragic and far-reaching, including with respect to nuclear nonproliferation and risk reduction. Consistent with the CNS mission of promoting nonproliferation education and analysis, the Center offers a podcast about the nuclear challenges and risks that have arisen as a result of this unfolding crisis. In a fast-changing landscape with countless unknowns, this podcast aims ...
…
continue reading
1
Floppy Disks, Exim, Kaspersky, Darkgate, AT&T, Josh Marpet and more... - SWN #398
29:20
29:20
Play later
Play later
Lists
Like
Liked
29:20
Floppy Disks, Exim, Kaspersky, Darkgate, AT&T, Josh Marpet, and more are on this edition of the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-398
…
continue reading
1
PREVIEW Bending the Knee to Luke Turner in 2024
3:42
3:42
Play later
Play later
Lists
Like
Liked
3:42
Adam explains his experiences as a contributor of Compact Magazine, how it was pitched to him versus what the magazine has become, named around the recent resigning of friend of the show Nina Power as an editor of the project after Luke Turner leaked private communications between her and former guest Daniel Miller that were presented as evidence d…
…
continue reading
1
Producing Secure Code by Leveraging AI - Stuart McClure - ASW #291
1:09:02
1:09:02
Play later
Play later
Lists
Like
Liked
1:09:02
How can LLMs be valuable to developers as an assistant in finding and fixing insecure code? There are a lot of implications in trusting AI or LLMs to not only find vulns, but in producing code that fixes an underlying problem without changing an app's intended behavior. Stuart McClure explains how combining LLMs with agents and RAGs helps make AI-i…
…
continue reading
1
Solving the Complexities of Cyber Insurance for SMBs - Brian Fritton - BSW #356
1:06:15
1:06:15
Play later
Play later
Lists
Like
Liked
1:06:15
Cyber insurance underwriting is all over the map. With such a variation in application requirements, how should small and medium businesses prepare to receive the best policy for the price? Brian Fritton joins Business Security Weekly to discuss a systematic approach to preparing for cyber insurance. By working with the underwriters, this approach …
…
continue reading
1
Should I lose weight before or after my BBL - ft. Dr. Matthew J. Nykiel
40:02
40:02
Play later
Play later
Lists
Like
Liked
40:02
In this episode, our host & plastic surgery consultant Mavi Rodriguez is joined by Dr. Nykiel. Together, dive deep into the advancements of body sculpting procedures, from the latest in liposuction technology to the evolving trends in Brazilian Butt Lifts (BBLs). They answer the following questions: - What is power-assisted liposuction? What is Vas…
…
continue reading
1
The Truth About Benzos Addiction Withdrawal & Recovery With Ryan Phillips
53:36
53:36
Play later
Play later
Lists
Like
Liked
53:36
PAIN Parents & Addicts @painnonprofit in Need’sFounder Flindt Andersen and Media Director Jason LaChance sat down with Ryan Phillips to discuss his personal experience of addiction recovery, most recently with Benzodiazepines. Ryan's journey from a hockey stand out with dreams of becoming the next Wayne Gretzky to the King of the Pot trade from C…
…
continue reading
1
Autobahn, APT 40, Meliorator, RADIUS, AT&T, Apple, Josh Marpet, and More... - SWN #397
34:19
34:19
Play later
Play later
Lists
Like
Liked
34:19
Wir fahren auf der AutoBahn, APT 40, Meliorator, RADIUS, AT&T, Apple, Josh Marpet, and More on the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-397
…
continue reading
1
Joiners, Movers, Leavers, and Failures: Why is Identity Management Still Struggling? - Henrique Teixeira - ESW #367
1:31:28
1:31:28
Play later
Play later
Lists
Like
Liked
1:31:28
I'm always thrilled to chat with ex-analysts, and Henrique Teixeira can cover a lot of ground with us on the topic of identity management and governance. The more I talk to folks about IAM/IGA, the more I'm shocked at how little has changed. If anything, it seems like we've gone backwards a bit, with the addition of cloud SaaS, mobile devices, and …
…
continue reading
1
RFID hacking & More Vulnerability Shenanigans - Iceman - PSW #834
3:30:33
3:30:33
Play later
Play later
Lists
Like
Liked
3:30:33
Bats in your headset, Windows Wifi driver vulnerabilities, Logitech's dongles, lighthttpd is heavy with vulnerabilities, node-ip's not vulnerability, New Intel CPU non-attacks, Blast Radius, Flipper Zero alternatives, will OpenSSH be exploited, emergency Juniper patches, and the D-Link botnet grows. Iceman comes on the show to talk about RFID and N…
…
continue reading
1
Harm Reduction Mantra (W/ Shay Semple)
2:14:25
2:14:25
Play later
Play later
Lists
Like
Liked
2:14:25
People have been telling me for years that the artist Shay Semple and I would get along. Finally, we started bonding on Instagram over a shared contempt for the Tumblr art of Nina Hartman. Shay, who hails from the Fentanyl cesspool of Vancouver, is the OG MAGA art world figure, known equally for his irreverent paintings, his provocative zines, and …
…
continue reading
1
State Of Application Security 2024 - Sandy Carielli, Janet Worthington - ASW #290
1:12:41
1:12:41
Play later
Play later
Lists
Like
Liked
1:12:41
Sandy Carielli and Janet Worthington, authors of the State Of Application Security 2024 report, join us to discuss their findings on trends this year! Old vulns, more bots, and more targeted supply chain attacks -- we should be better at this by now. We talk about where secure design fits into all this why appsec needs to accelerate to ludicrous sp…
…
continue reading
1
Zotac, Eldorado, Donex, Qlins, Ticketmaster, AI, Physical Security, Aaran Leyland... - SWN #396
34:06
34:06
Play later
Play later
Lists
Like
Liked
34:06
Zotac, Eldorado, Donex, Qlins, Ticketmaster, AI, Physical Security, Aaran Leyland, and more, are on this edition of the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-396
…
continue reading
1
Technology Rationalization in Cybersecurity - Max Shier - BSW #355
1:00:30
1:00:30
Play later
Play later
Lists
Like
Liked
1:00:30
On average, CISOs manage 50-75 security products. Many of these products have either not been deployed or only partially deployed, while others overlap of products. How do CISOs effectively consolidate their products to a manageable size? Max Shier, Chief Information Security Officer at Optiv Security, joins Business Security Weekly to discuss tech…
…
continue reading
1
The Real Story Behind Before and After Photos in Plastic Surgery ft. Joseph Jericho
41:23
41:23
Play later
Play later
Lists
Like
Liked
41:23
In this episode, our host & plastic surgery consultant Mavi Rodriguez is joined by Joseph Jericho. Together, they dive into a comprehensive discussion about social media's role and marketing's importance in the plastic surgery industry. Tune in to gain insightful perspectives on the following questions: 1. What are the challenges of obtaining accur…
…
continue reading
1
Law Enforcement & The Addiction Crisis With DEA Bill Bodner, SO Thad Cleveland & ATF Peter Forcelli
45:41
45:41
Play later
Play later
Lists
Like
Liked
45:41
PAIN: Parents & Addicts in Need’s@painnonprofit Founder Flindt Andersen and Jason LaChance revisit some of the Law Enforcement official's that we have had on the Don't Hide The Scars podcast. We hear directly from Special Agent In Charge DEA Los Angeles Bill Bodner, former Border Patrol Agent and current Terrell County Sheriff Thaddeus C. Clevela…
…
continue reading
Check out this interview from the SWN Vault, hand picked by main host Doug White! This segment was originally published on July 20, 2017. Doug talks about how to count from zero to one! Show Notes: https://securityweekly.com/vault-swn-18
…
continue reading
1
Community Risk Reduction: Part of the Job with Chad Costa
25:36
25:36
Play later
Play later
Lists
Like
Liked
25:36
One of the least exciting jobs for a firefighter is the dreaded Community Risk Reduction assignment. In an urban environment, CRR may mean doing a meeting with the people you serve. Or maybe you’re changing smoke alarm batteries. Either of those—not exciting, but not so much work, either. But if your department covers urban and rural areas, where y…
…
continue reading
1
Hacker Heroes - Joe Grand - PSW Vault
1:43:58
1:43:58
Play later
Play later
Lists
Like
Liked
1:43:58
Exploring the Hardware Hacking Realm with Joe Grand, AKA Kingpin Joe Grand, also known by his hacker pseudonym "Kingpin," stands as a prominent figure in the cybersecurity landscape. With an extensive background in hardware hacking, reverse engineering, and embedded systems, Joe has carved a niche for himself as a respected authority in the field. …
…
continue reading
Check out this interview from the SWN Vault, hand picked by main host Doug White! This Secure Digital Life segment was originally published on March 6, 2017. Have you ever wondered what phishing is? Do you know what spear phishing attacks are? Doug and Russ explain how to protect yourself from phishing scams in the inaugural episode of Secure Digit…
…
continue reading
Udith Dematagoda, editor of Hyperidean Press and author of the stellar new novel Agonist, joins Adam and Matt to discuss his home country of Scotland's greatest cultural export: Trainspotting and Trainspotting 2 FULL EPISODE LINKS Buy Udith's novel Agonist Follow Udith on Substack The cast of Trainspotting reunites…
…
continue reading
1
CISOs 2023 Planning Guide: Forecast The Recession's Impact On Your Program - Jeff Pollard - BSW Vault
33:21
33:21
Play later
Play later
Lists
Like
Liked
33:21
Check out this interview from the BSW Vault, hand picked by main host Matt Alderman! This segment was originally published on October 11, 2022. As 2023 approaches, security leaders are hard at work preparing their budgets, identifying their projects, and setting their priorities for the next twelve months. At the same time, the growth mode days of …
…
continue reading
1
Red Flags in Plastic Surgeons' Social Media: What Every Patient Should Know ft. Lauren Huizar
34:20
34:20
Play later
Play later
Lists
Like
Liked
34:20
In this episode, our host & plastic surgery consultant Mavi Rodriguez is joined by Lauren Huizar. Lauren is a social media director specializing in the plastic surgery industry. Together, they discuss the intricacies of the plastic surgery world and its portrayal on social media platforms. Questions addressed in this episode: 1. What are the challe…
…
continue reading
1
Support Groups Are Vital To Recovery & Understanding Family Lineages Of Addiction With Pete Sousa
1:02:20
1:02:20
Play later
Play later
Lists
Like
Liked
1:02:20
PAIN Parents & Addicts in Need’sFounder Flindt Andersen and Media Director Jason LaChance sat down with ESPN Sports Broadcaster Pete Sousa. Pete is an example that addiction doesn't define you. It may feel like an endless and unsalvageable struggle, but Pete Sousa has found a way through it. He's found the good in the bad with a newfound perspect…
…
continue reading
1
MoveIT, Entrust, Fed Reserve, ISPs, Volt Typhoon & More - Chris Wolski - SWN #395
29:10
29:10
Play later
Play later
Lists
Like
Liked
29:10
Healthcare and malware, MoveIT, Chrome won't trust Entrust, the discovery of Volt Typhoon, & more on this episode of the Security Weekly News! Segment Resources: https://therecord.media/volt-typhoon-targets-underestimated-cisa-says Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-395…
…
continue reading
1
The risks and best practices of deploying AI to an enterprise - Martin Roesch, Anurag Lal - ESW #366
2:16:26
2:16:26
Play later
Play later
Lists
Like
Liked
2:16:26
We all might be a little worn out on this topic, but there's no escaping it. Executives want to adopt GenAI and it is being embedded into nearly every software product we use in both our professional and personal lives. In this interview, Anurag joins us to discuss how his company evaluated and ultimately integrated AI-based technologies into their…
…
continue reading
1
Incisions, Revisions, and Second Opinions
41:02
41:02
Play later
Play later
Lists
Like
Liked
41:02
Send us a Text Message. 🎉 Season Finale Alert! 🎉 Join us for the grand finale of the First Season of "Fuller Butz: A Behind the Scenes Plastic Surgery Podcast"! In this special episode, board certified plastic surgeons Dr. Sam Fuller and Dr. Daniel Butz are pulling out all the stops to answer your burning questions and share their expert insights. …
…
continue reading
1
Do We Need Penetration Testing and Vulnerability Scanning? - Josh Bressers, Adrian Sanabria - PSW #833
2:51:52
2:51:52
Play later
Play later
Lists
Like
Liked
2:51:52
This may be controversial, however, we've been privately discussing how organizations benefit from penetration testing and vulnerability scanning. Do you still need these services as a critical part of your security program? Can't you just patch stuff that is missing patches? Tune in for a lively debate! Zyxl NAS devices are under attack and the ex…
…
continue reading
1
[Rebroadcast] Fifth Annual Granite Mtn Hotshots Memorial in Prescott AZ
16:26
16:26
Play later
Play later
Lists
Like
Liked
16:26
(This episode is a rebroadcast of a June, 2018 edition of Code 3) On June 30, 2018, the fifth anniversary of the LODD of 19 members of the Granite Mountain Interagency Hotshot Crew at Yarnell Hill, a memorial ceremony was held in Prescott, Arizona, their home base. The brief ceremony commemorated their loss and celebrated their lives. This is the e…
…
continue reading
1
Based Safety/Cringe Propaganda 2024, pt 1
44:39
44:39
Play later
Play later
Lists
Like
Liked
44:39
Adam discusses the good, the bad and the bewildering of 2024, as of June. WRITE-UP LINK
…
continue reading
1
Baltimore, GPS Jammed, US bans, ARM, YouTube, Kraken and Joshua Marpet - SWN #394
30:07
30:07
Play later
Play later
Lists
Like
Liked
30:07
Baltimore, GPS Jammed, US bans, ARM, YouTube, Kraken and Joshua Marpet, and More, on this edition of the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-394
…
continue reading
1
Building a Successful API Security Strategy - Luke Babarinde, Bhawna Singh - BSW #354
1:04:51
1:04:51
Play later
Play later
Lists
Like
Liked
1:04:51
With 71% of web traffic coming from API calls last year and the average organization maintaining 613 API endpoints, a robust strategy is needed to protect APIs against automated threats and business logic attacks. Tune in as Luke Babarinde, Global Solution Architect, shares the key steps to building a successful API security strategy. This segment …
…
continue reading
Ben Werther is a conceptual artist, born in Nashville and living in New York, whose new exhibition at No Gallery, “WHEN YOU CAN NO LONGER SPEAK, SING ME A SONG.” , presents a fascinating sequence of photographs that initially look like on the ground photojournalistic documents of armed combat. Upon further inquiry, however, you learn that these ima…
…
continue reading
1
OAuth 2.0 from Protecting APIs to Supporting Authorization & Authentication - Aaron Parecki - ASW #289
1:01:09
1:01:09
Play later
Play later
Lists
Like
Liked
1:01:09
OAuth 2.0 is more than just a single spec and it's used to protect more than just APIs. We talk about challenges in maintaining a spec over a decade of changing technologies and new threat models. Not only can OAuth be challenging to secure by default, but it's not even always inter-operable. Segment Resources: https://oauth.net/2.1 https://oauth.n…
…
continue reading
1
Tackling Round 2 Surgeries and Post-Op Realities ft. The Faja Doctor
35:19
35:19
Play later
Play later
Lists
Like
Liked
35:19
In this episode, our host & plastic surgery consultant Mavi Rodriguez is joined by Diana, also known as The Faja Doctor to talk about plastic surgery. Together, they discuss the following topics: 1. How did Diana’s multiple surgeries lead to transformations in her personal and professional life? 2. What does a "round 2" surgery mean and what are th…
…
continue reading
1
OpiAID, Technology That Will Change Addiction Recovery With Dino Miliotis
1:08:58
1:08:58
Play later
Play later
Lists
Like
Liked
1:08:58
PAIN ( @painnonprofit ) Parents & Addicts in Need’sFounder Flindt Andersen and Media Director Jason LaChance sat down with Dino Miliotis. Dino is a celebrated entrepreneur known for his innovative spirit and impactful message of hope. He gained prominence for creating Bug-Ban, an all-natural insect repelling bracelet, which he launched in Chicago…
…
continue reading
1
Access vs Actions, Beyond Traditional IGA, Remote Identity Verification, & Fraud - Tim Prendergast, Damon Tompkins, Andrew Bud, Chris Meyer - ESW Vault
58:32
58:32
Play later
Play later
Lists
Like
Liked
58:32
Traditional approaches to access management are no longer sufficient to safeguard enterprise security. Tim will explain why the most effective approach to modern enterprise security requires a Zero Trust model that extends beyond just access to encompass every action, no matter how minor. Tim will describe the importance of implementing a Zero Trus…
…
continue reading
Check out this interview from the SWN Vault, hand picked by main host Doug White! This Secure Digital Life segment was originally published on June 19, 2018. This week, Doug and Russ interview Matthew Silva, President and Founder of the Cybersecurity and Intel Club at Roger Williams University! They talk about majoring in Cybersecurity vs. Computer…
…
continue reading
1
iShield Key Experience, Automated (PKI) Infrastructure, & GenAI Identity Attacks - Kevin Fadaie, Roni Bliss, David Mahdi - ESW Vault
44:48
44:48
Play later
Play later
Lists
Like
Liked
44:48
FIDO security keys are not new in the authentication workflow. They have been around now for 10 years. What is new is the combination of the most secure multi-factor authentication method not only for logical but also for physical access control with the highest FIPS140-3 security certification in the market. Segment Resources: Video "Swissbit iShi…
…
continue reading
Send us a Text Message. In this latest episode of "Fuller Butz: a Behing the Scenes Plastic Surgery Podcast," co-hosts Dr. Sam Fuller and Dr. Dan Butz dive deep into the world of weight loss treatments to unravel the buzz surrounding the latest trend: Skinny Shots (ie. Ozempic, Semaglutide, Mounjauro, Wegovy). Join these expert physicians and board…
…
continue reading
1
Bringing Autonomy to AppSec - Dr. David Brumley - ESW Vault
32:22
32:22
Play later
Play later
Lists
Like
Liked
32:22
Log4j, solar winds, tesla hacks, and the wave of high profile appsec problems aren’t going to go away with current approaches like SAST and SCA. Why? They are: -40 years old, with little innovation -Haven’t solved the problem. In this segment, we talk about fully autonomous application security. Vetted by DARPA in the Cyber Grand Challenge, the app…
…
continue reading
1
Command Post Placement and Distractions with Robby Bergerson
16:38
16:38
Play later
Play later
Lists
Like
Liked
16:38
Incident commanders, here are some questions for you: How much thought do you put into where you set up your command post? Is it usually on the alpha side of a structure? Why is that? Routine? Street access? What about distractions? For example, noise. That can not only give you a headache but also make you miss an urgent radio call, right? My gues…
…
continue reading
1
Hacker Heroes - Dave Aitel - PSW Vault
1:29:24
1:29:24
Play later
Play later
Lists
Like
Liked
1:29:24
Exploring the Strategic Minds in Cybersecurity: A Conversation with Dave Aitel Welcome to an enlightening episode of our podcast, where we sit down with Dave Aitel, a prominent figure in the cybersecurity landscape. With a robust background in offensive security and an extensive career spanning various facets of the industry, Dave brings a wealth o…
…
continue reading
Check out this interview from the ASW Vault, hand picked by main host Mike Shema! This segment was originally published on April 4, 2023. Following on from her successful title "Container Security", Liz has recently authored "Learning eBPF", published by O'Reilly. eBPF is a revolutionary kernel technology that is enabling a whole new generation of …
…
continue reading
1
Back To School: Networking 101 - SWN Vault
26:29
26:29
Play later
Play later
Lists
Like
Liked
26:29
Check out this interview from the SWN Vault, hand picked by main host Doug White! This Secure Digital Life segment was originally published on September 25, 2018. This week, Russ takes the reigns in the absence of Dr. Doug to talk about Networking 101! We are going to go back to school to examine how networking and the internet actually work. Russ …
…
continue reading
1
Zero Trust Is Not A SKU - Saša Zdjelar - BSW Vault
32:47
32:47
Play later
Play later
Lists
Like
Liked
32:47
Check out this interview from the BSW Vault, hand picked by main host Matt Alderman! This segment was originally published on August 9, 2022. Zero Trust is the security buzzword of the moment, and while it is a very powerful approach, nearly every enterprise security product on the market – and some that aren’t even security products — are saying t…
…
continue reading
1
What Is EZ Gel and PRF / PRP ft. Renee Arriaga and Nicole Tribe
34:05
34:05
Play later
Play later
Lists
Like
Liked
34:05
In this episode, our host & plastic surgery consultant Mavi Rodriguez is joined by Renee Arriaga, an aesthetic nurse injector, and Nicole Tribe, a representative for Cosmo France. In this episode we will answer the following questions: - What is PRF and PRP? - How does the EZ gel procedure work, and what are its benefits compared to traditional fil…
…
continue reading
1
We Don't Use No Matter What & Co-Occurring Disorders Tim Lodgen
35:29
35:29
Play later
Play later
Lists
Like
Liked
35:29
PAIN ( @painnonprofit ) Parents & Addicts in Need’sFounder Flindt Andersen and Media Director Jason LaChance sat down with addiction recovery and mental health advocate Tim Lodgen to discuss his personal experience of co-occurring disorders and pushing through adverse times in sobriety and not pick up any substances no matter what. What does it m…
…
continue reading
1
Shared irresponsibilities and the importance of product privacy: Apple vs Microsoft - Mark Batchelor, Vibhuti Sinha, Chris Simmons, Gerry Gebel, Ajay Gupta, Tarvinder Sembhi - ESW #365
2:41:25
2:41:25
Play later
Play later
Lists
Like
Liked
2:41:25
This week, we've got data security being both funded AND acquired. We discuss Lacework's fall from unicorn status and why rumors that it went to Fortinet for considerably more than Wiz was willing to pay make sense. Microsoft Recall and Apple Intelligence are the perfect bookends for a conversation about the importance of handling consumer privacy …
…
continue reading
1
Trust in Microsoft, Apple, and the Holy AI, Moonstone Sleet, Cheating, Joshua Marpet - SWN #393
34:13
34:13
Play later
Play later
Lists
Like
Liked
34:13
Trust in Microsoft, Apple, and the Holy AI, Amen, Moonstone Sleet, Cheating, Joshua Marpet, and More, on this edition of the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-393
…
continue reading
1
GenAI, Security, and More Lies - Aubrey King - PSW #832
2:54:18
2:54:18
Play later
Play later
Lists
Like
Liked
2:54:18
We will discuss LLM security in general and some of the issues covered in the OWASP Top 10 for LLMs! Segment Resources: https://genai.owasp.org/ Skyrocketing IoT vulnerabilities, bricked computers?, MACBORG!, raw dogging source code, PHP strikes again and again, if you have a Netgear WNR614 replace it now, Arm Mali, new OpenSSH feature, weird headp…
…
continue reading