show episodes
 
Far too often, governments behave like toddlers. They’re fickle. They don’t like to share. And good luck getting them to pay attention to any problem that isn’t directly in front of them. They like to push each other to the brink, and often do. But when they don’t, it’s usually because other people enter the proverbial room. Private citizens who step up and play peacemaker when their governments won’t or can’t. People who strive for collaboration and understanding, and sometimes end up findi ...
  continue reading
 
Connecting with celebrity guests, leading experts and change makers to discuss the widespread illicit drug culture ripping through families, businesses, sports, entertainment and even the safest communities. With conversations about the fentanyl and opioid crisis, harm reduction modalities, MAT (Medication Assisted Treatment) Narcan, Rehab, 12- Step Programs and more. Created by Flindt Andersen, Founder and Executive Director of PAIN: Parents & Addicts In Need and Hosted by Jason LaChance.
  continue reading
 
Artwork

1
System of Systems

Adam Lehrer, Matthew Denicola

Unsubscribe
Unsubscribe
Monthly+
 
All culture is propaganda. Everything you hold dear is connected to that which subjugates you. Deconstruct art, culture, and politics, and attempt to understand the pervasive conformism that has saturated it all. Hosted by Adam Lehrer and Matthew DeNicola patreon.com/systemofsystems safetypropaganda.substack.com x.com/SystemofSystem3 x.com/safetypropagan1 x.com/mattiopattio ​
  continue reading
 
Big Butts No Lies is the best plastic surgery podcast hosted by plastic surgery patient coordinator Mavi Rodriguez. On this show you’ll hear a mix of interviews with talented plastic surgeons, recovery experts and real life patients. The conversations are an exquisite mix of pre-op and recovery tips for tummy tucks, liposuction, bbls (Brazilian butt lifts),breast lift and breast augmentation as well as insight into the beauty industry and breaking down the stigma around plastic surgery. We w ...
  continue reading
 
Plastic Surgeons Dr. Sam Fuller and Dr. Dan Butz discuss a wide range of topics within plastic surgery, adding insight, detail, and humor to a captivating field in medicine. Join their conversation as they highlight advice, myths, facts, and everything you need to know about tummy tucks, breast augmentation, liposuction, and more! Included in the podcast are conversations spanning plastic surgery, such as botox, fillers, celebrity plastic surgery, mommy makeovers, breast lift, breast reducti ...
  continue reading
 
If you're considering having an aesthetic procedure performed, Nurse Paula Young will arm you with information before scheduling your procedure! And, to complement your aesthetic goals, her guests include discussions on health, wellness and spirituality.
  continue reading
 
Artwork

1
Nuclear Threats and the War in Ukraine

James Martin Center for Nonproliferation Studies

Unsubscribe
Unsubscribe
Monthly
 
Russia’s unprovoked invasion of Ukraine has set in motion a catastrophic war. The consequences of this war will be both tragic and far-reaching, including with respect to nuclear nonproliferation and risk reduction. Consistent with the CNS mission of promoting nonproliferation education and analysis, the Center offers a podcast about the nuclear challenges and risks that have arisen as a result of this unfolding crisis. In a fast-changing landscape with countless unknowns, this podcast aims ...
  continue reading
 
Loading …
show series
 
Adam explains his experiences as a contributor of Compact Magazine, how it was pitched to him versus what the magazine has become, named around the recent resigning of friend of the show Nina Power as an editor of the project after Luke Turner leaked private communications between her and former guest Daniel Miller that were presented as evidence d…
  continue reading
 
How can LLMs be valuable to developers as an assistant in finding and fixing insecure code? There are a lot of implications in trusting AI or LLMs to not only find vulns, but in producing code that fixes an underlying problem without changing an app's intended behavior. Stuart McClure explains how combining LLMs with agents and RAGs helps make AI-i…
  continue reading
 
Cyber insurance underwriting is all over the map. With such a variation in application requirements, how should small and medium businesses prepare to receive the best policy for the price? Brian Fritton joins Business Security Weekly to discuss a systematic approach to preparing for cyber insurance. By working with the underwriters, this approach …
  continue reading
 
In this episode, our host & plastic surgery consultant Mavi Rodriguez is joined by Dr. Nykiel. Together, dive deep into the advancements of body sculpting procedures, from the latest in liposuction technology to the evolving trends in Brazilian Butt Lifts (BBLs). They answer the following questions: - What is power-assisted liposuction? What is Vas…
  continue reading
 
PAIN Parents & Addicts @painnonprofit in Need’s⁠⁠Founder Flindt Andersen and Media Director Jason LaChance sat down with Ryan Phillips to discuss his personal experience of addiction recovery, most recently with Benzodiazepines. Ryan's journey from a hockey stand out with dreams of becoming the next Wayne Gretzky to the King of the Pot trade from C…
  continue reading
 
I'm always thrilled to chat with ex-analysts, and Henrique Teixeira can cover a lot of ground with us on the topic of identity management and governance. The more I talk to folks about IAM/IGA, the more I'm shocked at how little has changed. If anything, it seems like we've gone backwards a bit, with the addition of cloud SaaS, mobile devices, and …
  continue reading
 
Bats in your headset, Windows Wifi driver vulnerabilities, Logitech's dongles, lighthttpd is heavy with vulnerabilities, node-ip's not vulnerability, New Intel CPU non-attacks, Blast Radius, Flipper Zero alternatives, will OpenSSH be exploited, emergency Juniper patches, and the D-Link botnet grows. Iceman comes on the show to talk about RFID and N…
  continue reading
 
People have been telling me for years that the artist Shay Semple and I would get along. Finally, we started bonding on Instagram over a shared contempt for the Tumblr art of Nina Hartman. Shay, who hails from the Fentanyl cesspool of Vancouver, is the OG MAGA art world figure, known equally for his irreverent paintings, his provocative zines, and …
  continue reading
 
Sandy Carielli and Janet Worthington, authors of the State Of Application Security 2024 report, join us to discuss their findings on trends this year! Old vulns, more bots, and more targeted supply chain attacks -- we should be better at this by now. We talk about where secure design fits into all this why appsec needs to accelerate to ludicrous sp…
  continue reading
 
On average, CISOs manage 50-75 security products. Many of these products have either not been deployed or only partially deployed, while others overlap of products. How do CISOs effectively consolidate their products to a manageable size? Max Shier, Chief Information Security Officer at Optiv Security, joins Business Security Weekly to discuss tech…
  continue reading
 
In this episode, our host & plastic surgery consultant Mavi Rodriguez is joined by Joseph Jericho. Together, they dive into a comprehensive discussion about social media's role and marketing's importance in the plastic surgery industry. Tune in to gain insightful perspectives on the following questions: 1. What are the challenges of obtaining accur…
  continue reading
 
PAIN: Parents & Addicts in Need’s⁠@painnonprofit ⁠Founder Flindt Andersen and Jason LaChance revisit some of the Law Enforcement official's that we have had on the Don't Hide The Scars podcast. We hear directly from Special Agent In Charge DEA Los Angeles Bill Bodner, former Border Patrol Agent and current Terrell County Sheriff Thaddeus C. Clevela…
  continue reading
 
One of the least exciting jobs for a firefighter is the dreaded Community Risk Reduction assignment. In an urban environment, CRR may mean doing a meeting with the people you serve. Or maybe you’re changing smoke alarm batteries. Either of those—not exciting, but not so much work, either. But if your department covers urban and rural areas, where y…
  continue reading
 
Exploring the Hardware Hacking Realm with Joe Grand, AKA Kingpin Joe Grand, also known by his hacker pseudonym "Kingpin," stands as a prominent figure in the cybersecurity landscape. With an extensive background in hardware hacking, reverse engineering, and embedded systems, Joe has carved a niche for himself as a respected authority in the field. …
  continue reading
 
Check out this interview from the SWN Vault, hand picked by main host Doug White! This Secure Digital Life segment was originally published on March 6, 2017. Have you ever wondered what phishing is? Do you know what spear phishing attacks are? Doug and Russ explain how to protect yourself from phishing scams in the inaugural episode of Secure Digit…
  continue reading
 
Check out this interview from the BSW Vault, hand picked by main host Matt Alderman! This segment was originally published on October 11, 2022. As 2023 approaches, security leaders are hard at work preparing their budgets, identifying their projects, and setting their priorities for the next twelve months. At the same time, the growth mode days of …
  continue reading
 
In this episode, our host & plastic surgery consultant Mavi Rodriguez is joined by Lauren Huizar. Lauren is a social media director specializing in the plastic surgery industry. Together, they discuss the intricacies of the plastic surgery world and its portrayal on social media platforms. Questions addressed in this episode: 1. What are the challe…
  continue reading
 
PAIN Parents & Addicts in Need’s⁠⁠Founder Flindt Andersen and Media Director Jason LaChance sat down with ESPN Sports Broadcaster Pete Sousa. Pete is an example that addiction doesn't define you. It may feel like an endless and unsalvageable struggle, but Pete Sousa has found a way through it. He's found the good in the bad with a newfound perspect…
  continue reading
 
Healthcare and malware, MoveIT, Chrome won't trust Entrust, the discovery of Volt Typhoon, & more on this episode of the Security Weekly News! Segment Resources: https://therecord.media/volt-typhoon-targets-underestimated-cisa-says Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-395…
  continue reading
 
We all might be a little worn out on this topic, but there's no escaping it. Executives want to adopt GenAI and it is being embedded into nearly every software product we use in both our professional and personal lives. In this interview, Anurag joins us to discuss how his company evaluated and ultimately integrated AI-based technologies into their…
  continue reading
 
Send us a Text Message. 🎉 Season Finale Alert! 🎉 Join us for the grand finale of the First Season of "Fuller Butz: A Behind the Scenes Plastic Surgery Podcast"! In this special episode, board certified plastic surgeons Dr. Sam Fuller and Dr. Daniel Butz are pulling out all the stops to answer your burning questions and share their expert insights. …
  continue reading
 
This may be controversial, however, we've been privately discussing how organizations benefit from penetration testing and vulnerability scanning. Do you still need these services as a critical part of your security program? Can't you just patch stuff that is missing patches? Tune in for a lively debate! Zyxl NAS devices are under attack and the ex…
  continue reading
 
(This episode is a rebroadcast of a June, 2018 edition of Code 3) On June 30, 2018, the fifth anniversary of the LODD of 19 members of the Granite Mountain Interagency Hotshot Crew at Yarnell Hill, a memorial ceremony was held in Prescott, Arizona, their home base. The brief ceremony commemorated their loss and celebrated their lives. This is the e…
  continue reading
 
With 71% of web traffic coming from API calls last year and the average organization maintaining 613 API endpoints, a robust strategy is needed to protect APIs against automated threats and business logic attacks. Tune in as Luke Babarinde, Global Solution Architect, shares the key steps to building a successful API security strategy. This segment …
  continue reading
 
Ben Werther is a conceptual artist, born in Nashville and living in New York, whose new exhibition at No Gallery, “WHEN YOU CAN NO LONGER SPEAK, SING ME A SONG.” , presents a fascinating sequence of photographs that initially look like on the ground photojournalistic documents of armed combat. Upon further inquiry, however, you learn that these ima…
  continue reading
 
OAuth 2.0 is more than just a single spec and it's used to protect more than just APIs. We talk about challenges in maintaining a spec over a decade of changing technologies and new threat models. Not only can OAuth be challenging to secure by default, but it's not even always inter-operable. Segment Resources: https://oauth.net/2.1 https://oauth.n…
  continue reading
 
In this episode, our host & plastic surgery consultant Mavi Rodriguez is joined by Diana, also known as The Faja Doctor to talk about plastic surgery. Together, they discuss the following topics: 1. How did Diana’s multiple surgeries lead to transformations in her personal and professional life? 2. What does a "round 2" surgery mean and what are th…
  continue reading
 
PAIN ( @painnonprofit ) Parents & Addicts in Need’s⁠⁠Founder Flindt Andersen and Media Director Jason LaChance sat down with Dino Miliotis. Dino is a celebrated entrepreneur known for his innovative spirit and impactful message of hope. He gained prominence for creating Bug-Ban, an all-natural insect repelling bracelet, which he launched in Chicago…
  continue reading
 
Traditional approaches to access management are no longer sufficient to safeguard enterprise security. Tim will explain why the most effective approach to modern enterprise security requires a Zero Trust model that extends beyond just access to encompass every action, no matter how minor. Tim will describe the importance of implementing a Zero Trus…
  continue reading
 
Check out this interview from the SWN Vault, hand picked by main host Doug White! This Secure Digital Life segment was originally published on June 19, 2018. This week, Doug and Russ interview Matthew Silva, President and Founder of the Cybersecurity and Intel Club at Roger Williams University! They talk about majoring in Cybersecurity vs. Computer…
  continue reading
 
FIDO security keys are not new in the authentication workflow. They have been around now for 10 years. What is new is the combination of the most secure multi-factor authentication method not only for logical but also for physical access control with the highest FIPS140-3 security certification in the market. Segment Resources: Video "Swissbit iShi…
  continue reading
 
Send us a Text Message. In this latest episode of "Fuller Butz: a Behing the Scenes Plastic Surgery Podcast," co-hosts Dr. Sam Fuller and Dr. Dan Butz dive deep into the world of weight loss treatments to unravel the buzz surrounding the latest trend: Skinny Shots (ie. Ozempic, Semaglutide, Mounjauro, Wegovy). Join these expert physicians and board…
  continue reading
 
Log4j, solar winds, tesla hacks, and the wave of high profile appsec problems aren’t going to go away with current approaches like SAST and SCA. Why? They are: -40 years old, with little innovation -Haven’t solved the problem. In this segment, we talk about fully autonomous application security. Vetted by DARPA in the Cyber Grand Challenge, the app…
  continue reading
 
Incident commanders, here are some questions for you: How much thought do you put into where you set up your command post? Is it usually on the alpha side of a structure? Why is that? Routine? Street access? What about distractions? For example, noise. That can not only give you a headache but also make you miss an urgent radio call, right? My gues…
  continue reading
 
Exploring the Strategic Minds in Cybersecurity: A Conversation with Dave Aitel Welcome to an enlightening episode of our podcast, where we sit down with Dave Aitel, a prominent figure in the cybersecurity landscape. With a robust background in offensive security and an extensive career spanning various facets of the industry, Dave brings a wealth o…
  continue reading
 
Check out this interview from the ASW Vault, hand picked by main host Mike Shema! This segment was originally published on April 4, 2023. Following on from her successful title "Container Security", Liz has recently authored "Learning eBPF", published by O'Reilly. eBPF is a revolutionary kernel technology that is enabling a whole new generation of …
  continue reading
 
Check out this interview from the SWN Vault, hand picked by main host Doug White! This Secure Digital Life segment was originally published on September 25, 2018. This week, Russ takes the reigns in the absence of Dr. Doug to talk about Networking 101! We are going to go back to school to examine how networking and the internet actually work. Russ …
  continue reading
 
Check out this interview from the BSW Vault, hand picked by main host Matt Alderman! This segment was originally published on August 9, 2022. Zero Trust is the security buzzword of the moment, and while it is a very powerful approach, nearly every enterprise security product on the market – and some that aren’t even security products — are saying t…
  continue reading
 
In this episode, our host & plastic surgery consultant Mavi Rodriguez is joined by Renee Arriaga, an aesthetic nurse injector, and Nicole Tribe, a representative for Cosmo France. In this episode we will answer the following questions: - What is PRF and PRP? - How does the EZ gel procedure work, and what are its benefits compared to traditional fil…
  continue reading
 
PAIN ( @painnonprofit ) Parents & Addicts in Need’s⁠⁠Founder Flindt Andersen and Media Director Jason LaChance sat down with addiction recovery and mental health advocate Tim Lodgen to discuss his personal experience of co-occurring disorders and pushing through adverse times in sobriety and not pick up any substances no matter what. What does it m…
  continue reading
 
This week, we've got data security being both funded AND acquired. We discuss Lacework's fall from unicorn status and why rumors that it went to Fortinet for considerably more than Wiz was willing to pay make sense. Microsoft Recall and Apple Intelligence are the perfect bookends for a conversation about the importance of handling consumer privacy …
  continue reading
 
We will discuss LLM security in general and some of the issues covered in the OWASP Top 10 for LLMs! Segment Resources: https://genai.owasp.org/ Skyrocketing IoT vulnerabilities, bricked computers?, MACBORG!, raw dogging source code, PHP strikes again and again, if you have a Netgear WNR614 replace it now, Arm Mali, new OpenSSH feature, weird headp…
  continue reading
 
Loading …

Quick Reference Guide