show episodes
 
Artwork

1
Attestation Hub

Attestation Hub

Unsubscribe
Unsubscribe
Daily+
 
Attestation Hub is a one stop solution when it comes to managing all the documents and Visa related Services. Attestation Hub unmatched network across India, high standard customer service and state-of-theart technology, all help in acknowledging, understanding and developing relevant solutions for its clients.
  continue reading
 
Artwork

1
PEC Attestation

PEC Attestation Services

Unsubscribe
Unsubscribe
Daily+
 
PEC Attestation Services brings you “PEC Attestation” Podcast which introduces and guides you through our Professional Services like Attestation, Apostille & Embassy Legalization for your Personal, Educational & Commercial Documents. At PEC Attestation Services we are dedicated to our commitment, and this approach has aided us in becoming one of the numero uno companies in Attestation & Apostille Services.
  continue reading
 
TrampTalk is an Interview based Podcast .Tramp is a long walk, typically a tiring one. As Professionals, Creatives, Artists, etc. We can ALL attest to this long tiring walk in life. Support this podcast: https://podcasters.spotify.com/pod/show/tramptalk/support
  continue reading
 
This podcast is a journey fueled by self-discovery and craft beer. Please join me as I travel across the country to link up with friends while discovering new craft breweries. Adulting is tough and my friends can attest to that. Tune in as we discuss relationships, dating, new family roles, and so forth over flights of beer. We call it Flights with Friends! Cheers!
  continue reading
 
The Recovering Reality Podcast will pump you full of hope, while sharing endless practical and beneficial insights for your personal recovery journey. Over 13yrs ago Life and Recovery Coach, and sought after public speaker, Erik Frederickson was set free from addiction. God has radically transformed his life. He shares about living in faith, freedom, and the miraculous. Erik speaks regularly and coaches clients from all over the world. His clients can attest to his coaching bringing them gre ...
  continue reading
 
Some of the best conversations are had over coffee. Whether that be early in the a.m., late evening, overnight when everyone else is asleep, or when you finally found a moment for yourself. Tune in at your leisure to our weekly podcast where we chit-chat, theorize, rant and rave, and reflect on what’s going on in the world around us. Why not take it a step further and be a part of the show? Write in, post, comment, tag, heck - send a sky message! to share your Convo Over your Coffee of choice!
  continue reading
 
Welcome to The Accountant Quits podcast, an idea born from an inquisitive attempt to find one’s calling. I’m Umar and I will be your host on this series where we look into the impact of blockchain in accounting. From topics around the accounting treatment of cryptocurrencies, the new framework of triple entry accounting, the challenges at hand for audit and tax, and many more, we will look into how the profession of accounting is evolving and how accountants should prepare themselves for the ...
  continue reading
 
Welcome to the Generally Accepted Accounting Podcast (GAAP, for all you accounting nerds) produced by Casey Peterson, LTD. We’re a firm of CPAs and financial advisors based in Rapid City, South Dakota. We talk tax, finance, accounting, audit, data analytics... and a bunch of other topics that sound REALLY boring, but that we’re gonna make hip and cool. Or we’ll try, anyway.
  continue reading
 
Hon Vivek ji called his circumambulation of Holy Narmada in 2022–2023 the Amrutsaya Ma Narmada Pad Parikrama. There are numerous ways in which the holy River Narmada stands out. People have been undertaking circumambulations of this river for thousands of years, making it the only one of its kind in India and probably the world. Various saints in Indian literature attest to the fact that Divine entities have walked on this vary this path. The Narmada River begins in the state of Madhya Prade ...
  continue reading
 
Artwork

1
Between The Sheets with Gaye Ann Bruno

Gaye Ann Bruno - BETWEEN THE SHEETS PODCAST

Unsubscribe
Unsubscribe
Monthly
 
Our ringleader, Gaye Ann Bruno and her diverse group of “girlfriends” leave no stone unturned as they discuss various topics ranging from sex, music, spirituality, philosophy, politics and more, in this tongue-in-cheek unfiltered, un-PC, explicit & raw podcast. Managing to discuss at least 25 topics in a one hour roller coaster time frame, these ‘poddy’ mouth girls are “cool” enough to be invited into the boys locker room, and not feel out of place. They are equal parts funny, articulate, th ...
  continue reading
 
Grant Thornton is the brand for two professional services entities: Grant Thornton LLP, a licensed, certified public accounting firm that provides audit and assurance services ― and Grant Thornton Advisors LLC (not a licensed CPA firm), which exclusively provides non-attest offerings, including tax and advisory services. With revenues of $2.4 billion for the fiscal year that ended July 31, 2023, and almost 50 offices nationwide, Grant Thornton represents a community of almost 10,000 problem ...
  continue reading
 
Artwork

1
SMH Podcast

Shania Hayes & Mark Snipes

Unsubscribe
Unsubscribe
Monthly
 
DARE TO BE DIFFERENT! This podcast is changing the conversation. Nowadays we hear a lot of toxic conversations that center around toxic behavior. SMH Podcast takes a dive into social media to change the conversation! When it comes to our goals, relationships, work, and morals....... WHAT HAPPENED? I feel we got to a point where having a different point of view or difference in opinions causes you to choose a side. To be successful, to get attention, to make money people have to adapt to what ...
  continue reading
 
Laurent Veronnez aka Airwave aka many many other guises was born in Brussels in 1977, he is a naturally gifted artist and this manifested in him at the age of just 7. Influenced by the 80’s and 90’s sounds and by greats such as Kraftwerk, Jean Michel Jarre, Orbital, Oliver Lieb and BT, he honed his skills in music knowledge and technology. Laurent would then see demos picked up by the infamous Bonzai imprint in 1996 and the stunning Airwave - I want To Believe was released. In 1998 this was ...
  continue reading
 
Loading …
show series
 
As the world moves “on-chain,” so too will the need for auditors. With auditors naturally evolving their practices from periodic paper reporting, to digitally native, API-enabled, Oracle-ready, and real-time reporting. But how do auditors bridge the gap and how can the auditing industry as a whole remove the technical barriers to entry? Enter Ledge…
  continue reading
 
Audit, review, compilation, agreed-upon-procedures … oh my. It’s a podcast all about attest services. … Wait! Where are you going?! You’re going to want to hear this one, promise! On today’s episode, we talk to CPA, shareholder, and vice president of our attest services team, Deidre Budahl. Deidre corrects all the misconceptions about audits (they’…
  continue reading
 
Summary In this episode of the Blue Security Podcast, hosts Andy Jaw and Adam Brewer delve into the world of containers, exploring their functionality, differences from virtual machines, and the importance of securing them. They discuss key tools like Docker and Kubernetes, and introduce Microsoft's Defender for Containers as a solution for managin…
  continue reading
 
Summary In this episode, Andy and Adam discuss the key findings from IBM's report on the costs of a data breach in 2024. They cover topics such as the increase in the cost of data breaches, the use of security AI and automation, the cyber skills shortage, the challenges of shadow data, and the importance of insider risk management. They also highli…
  continue reading
 
Summary In this episode of the Blue Security Podcast, Andy and Adam discuss Entra Suite, a new package from Microsoft that includes various Entra products and solutions. They provide an overview of each component, including Entra Private Access, Entra Internet Access, Entra ID Governance, Entra ID Protection, and Entra Verified ID. They highlight t…
  continue reading
 
Summary In this episode, Andy and Adam discuss various resources and methods for getting training and learning about Microsoft and other technology solutions. They cover topics such as official documentation, certification tracks, Ninja training, Microsoft Mechanics, the Tech Community, customer connection programs, building a personal lab, and the…
  continue reading
 
When it comes to internal controls, management is responsible for designing, implementing, and maintaining effective internal controls. Auditors on the other hand would test for the operating effectiveness of these controls. Many auditors today lack the specialized expertise needed to provide assurance for companies holding digital assets, but if w…
  continue reading
 
Summary In this episode of the Blue Security Podcast, Andy and Adam discuss several cybersecurity news stories. They cover the hack of the Trump campaign's emails by Iranian hackers, the breach of the National Public Data records, and Microsoft's new requirement for admins to enable multi-factor authentication (MFA). They also touch on the importan…
  continue reading
 
Summary In this episode of the Blue Security Podcast, Andy and Adam discuss Microsoft's Defender for Storage, a cloud-native security solution for Azure Blob Storage, Azure Files, and Azure Data Lake Storage. They highlight the three major impacts on data workloads: malicious file uploads, sensitive data exfiltration, and data corruption. The solut…
  continue reading
 
There is no current standard framework on how transactions within DAOs should be structured and accounted for. Transactions on the blockchain or so-called block explorers are cash-based and do not comply with accrual-based accounting. Today many companies having on-chain transactions use crypto sub-ledgers, but the essence of DAOs is to reduce the …
  continue reading
 
Summary In this episode of the Blue Security Podcast, Andy and Adam discuss new features and updates in Intune, including autopilot for existing devices, Intune enrollment attestation, and mobile application management (MAM). They explain how autopilot for existing devices allows organizations to enroll on-premise joined devices into autopilot usin…
  continue reading
 
Summary In this episode of the Blue Security Podcast, Andy and Adam discuss Defender CSPM (Cloud Security Posture Management). They explain that CSPM is the process of monitoring cloud-based systems and infrastructure for risks and misconfigurations. They highlight the key capabilities of CSPM, including automation, monitoring and managing IaaS, Sa…
  continue reading
 
Stephanie and Maggie catch you up on their shenanigans: the Super Stupid Troopers of Sports Security tops themselves (yet again) and Bailed on at The Bix (amongst other things). And the story of Joel Meyers battling cancer, surgery, chemo, and Essentia leaving a foreign object in his body, trying to remedy this with a little more than an insult lea…
  continue reading
 
In its early days, businesses used crypto mainly for trading. However, more use cases have emerged in recent times. Making payments with crypto as we all know is lightning fast, but businesses utilizing self-custodial wallets need a full-fledged infrastructure with advanced customization. For example, managing user permissions and roles, creating a…
  continue reading
 
Summary In this episode of the Blue Security Podcast, Andy and Adam discuss the aftermath of the CrowdStrike failed software update. They express empathy for those impacted by the incident and discuss the importance of collaboration in the cybersecurity industry. They also explore the need for transparency from security vendors and the potential im…
  continue reading
 
Can crypto payments accentuate the trend for a globally distributed workforce? More and more people in emerging markets such as freelancers are using crypto to get paid, and having crypto as a payment option enables people to get employed anywhere in the world. So if you as an employer want to have the best talent globally, using crypto as a means …
  continue reading
 
Holy Cannoli! Stephanie might have a new job. But! She's still surrounded by incompetent coworkers: meh, eh, grr and Fun fact...you get it! With another Jail Bird rollercoaster. And Maggie bumps into a girl she used to know who has a BIG surprise of which there is no Hallmark card for! (boy do I love ending a sentence with a preposition!)…
  continue reading
 
Summary In this episode, Andy and Adam discuss a blog post titled 'Cybersecurity is Full' that challenges the hype around cybersecurity careers. They explore the saturation of the field, the value of certifications and conferences, the optional nature of cybersecurity in organizations, and the stress and challenges of the industry. They emphasize t…
  continue reading
 
In this episode of the Blue Security Podcast, Andy and Adam discuss Defender for Servers, a cloud security solution offered by Microsoft. They explain that Defender for Servers is part of the larger Defender for Cloud umbrella and is designed to protect cloud infrastructure, specifically servers. They discuss the different plans available, includin…
  continue reading
 
Welcome to another Generally Accepted Accounting Podcast Happy Hour! This one’s with Laura Gillen, Certified Financial Planner, who works for Avantax, our firm’s wealth management and financial services planning partner. Laura’s taken a kind of nontraditional path to financial planning, and that’s given her a unique perspective on the industry and …
  continue reading
 
In this episode of the Blue Security Podcast, Andy and Adam discuss recommended settings for Exchange Online Protection (EOP) and Microsoft Defender for Office (MDO). They explain that EOP is the core security for M365 subscriptions, providing anti-malware, anti-spam, and anti-phishing protection. They also highlight the importance of the secure by…
  continue reading
 
The deadline for new crypto regulation in the EU, termed the Market in Crypto-Assets (MiCA) is fast approaching, and many are wondering - What exactly does MiCA entail, and how can you prepare for it? For starters, MiCA applies to a broad range of entities providing services related to crypto, including exchanges, custodians, wallet providers, brok…
  continue reading
 
In this episode, Andy and Adam discuss three cybersecurity news stories. They talk about a small town in Massachusetts that lost over $445,000 in an email scam, the Biden administration's ban on Kaspersky antivirus software, and a cyber attack on Crown Equipment, a forklift manufacturer. The main takeaways from the conversation are the importance o…
  continue reading
 
In this episode of the Blue Security Podcast, Andy and Adam discuss three main topics: the unauthorized user access at Snowflake, the cybersecurity issue at Finley Automotive Group, and the cyber threats surrounding the upcoming Olympics in Paris. They highlight the importance of implementing strong security controls like multi-factor authenticatio…
  continue reading
 
A recurring theme among the CFOs I've interviewed is their common starting point: many began their careers at top accounting firms, such as the Big4. And the benefits of working for them are not insignificant - you are often surrounded by the brightest minds in accounting, work with some of the biggest clients, and your experience commands respect.…
  continue reading
 
In this episode, Andy and Adam discuss the updates and clarifications made by Microsoft regarding the security concerns surrounding the Recall feature on Copilot Plus PCs. They highlight the changes, such as the option to proactively enable Recall during the out-of-box experience, the requirement of Windows Hello enrollment and proof of presence fo…
  continue reading
 
The conversation covers three primary themes: Ticketmaster data breach, Slack's data scraping, and Windows Recall feature. The Ticketmaster breach is discussed in detail, highlighting the stolen data, phishing risks, and the importance of password management. The conversation then shifts to Slack's data scraping controversy, addressing concerns abo…
  continue reading
 
Blockchain technology is open source right, but to advance the development of accounting standards for digital assets, we need accounting bodies to be more open for collaboration in these changing times. This revolution cannot take place in an ivory tower. A group of accountants at Propeller Industries have answered the call, and are pioneering a n…
  continue reading
 
In this episode of the Blue Security Podcast, Andy and Adam discuss the security and privacy announcements from Microsoft Build. They cover topics such as AI content safety, Copilot capabilities, security enhancements in Microsoft Edge, and new Windows security features. They also touch on the deprecation of NTLM and the introduction of Copilot Plu…
  continue reading
 
In this episode of the Blue Security Podcast, Andy and Adam discuss Microsoft Entra Private Access and Endpoint Privilege Management. Entra Private Access is a modern secure edge solution that allows remote users to access on-premise applications in a micro-segmented manner. It enables granular app segmentation, MFA, and privileged access to domain…
  continue reading
 
The tokenomics is the catch-all of the elements that make a particular crypto project particularly valuable and interesting to investors. That includes everything from its initial minting process, the token’s supply, and what utility it has. Understanding tokenomics is crucial for making informed investment decisions. A project with well-designed i…
  continue reading
 
In this episode of the Blue Security Podcast, Andy and Adam discuss two important topics: Microsoft's pledge for greater transparency in identifying and determining root causes for security vulnerabilities, and the increasing sophistication of USB malware attacks in industrial organizations. They provide insights into Microsoft's Secure Future Init…
  continue reading
 
The 17th annual Verizon Data Breach Investigation Report reveals key findings and trends in cybersecurity. The report highlights the increase in vulnerability exploitation for initial access, the continued prevalence of human error in breaches, the rise of pure extortion attacks, and the limited impact of generative AI in the cybersecurity landscap…
  continue reading
 
Digital assets and their underlying blockchain technology are an evolving area, and as such accountants frequently face the daunting challenge of scrutinizing existing accounting standards to derive the most reasonable interpretation. Innovation outpaces the speed of accounting regulation, leaving standard-setting bodies like the FASB for US GAAP o…
  continue reading
 
In this episode, Andy and Adam discuss the growing threat of mobile device threats. They highlight the recent mass password reset and account lockout of Apple IDs and the potential for a mobile wormable event. They explore the conditions necessary for a mobile wormable attack, including the development of zero-click exploits, the abuse of contact l…
  continue reading
 
COVID has changed the game for companies hiring internationally. Previously, if an employer didn’t have an established business, or a legal entity in the jurisdiction where the foreign worker lived, often their only option would be to hire the worker as an independent contractor. Companies couldn’t hire full-time employees and were thus unable to g…
  continue reading
 
In this episode, Andy and Adam discuss the importance of VDI (Virtual Desktop Infrastructure) in security and enterprise architecture. They highlight the security benefits of VDI, such as separating end user environments from the underlying physical hardware, centralized management of baseline images and patches, and the ability to keep sensitive d…
  continue reading
 
Stephanie closes the trilogy of fighting all of the shady bitches in her unfortunate experience of being sexually harassed at work (joining the wrong side of the #MeToo Movement), Part Three!! The finale. Maggie tells a tale of her cake-tastrophy. Welcome to the most spliced and diced episode of Convos Over Coffee. Keep it Real, Coffee Cuties & Sla…
  continue reading
 
In this episode, Andy and Adam clarify some points from the previous episode and discuss two main topics: mitigating social engineering attacks on IT help desks and the value of certifications in cybersecurity. They provide practical tips for securing IT help desks, such as requiring callbacks, video verifications, and supervisor verification. They…
  continue reading
 
In this episode of the Blue Security Podcast, Andy Jaw and Adam Brewer discuss two main topics: the importance of managed devices for improving security posture and the bundling of security solutions in Microsoft licensing. They highlight the shift towards requiring Intune and Azure AD joined devices for improved device management and security. The…
  continue reading
 
If you’ve previously worked as an accountant or auditor at a Big4 or other accounting firm, you’ve been through a rigorous & highly sought-after working methodology and have a huge boost on your resume. You’re now equipped to get your foot in the door of most firms looking to hire a Financial Controller, Head of Finance, or even a CFO. Being a prod…
  continue reading
 
Loading …

Quick Reference Guide