Download the App!
show episodes
 
Life is a journey. Along the way, we hit tight turns, inclines, and rough terrains where lessons are presented to us. Some of these we discover and learn, and others are presented to us AGAIN later in life. Will we just ignore them and move on, or REDISCOVER the lesson, and grow? Aubrey shares lessons he's learned on his journey, and chats with extraordinary people who share their amazing stories as well. If you like what you hear, please subscribe to my channel and/or feel free to leave fee ...
  continue reading
 
Artwork
 
Talking in 3's is a podcast about sparking conversations that are light, engaging, and debatable without going extreme. From sports, to music, food, TV/Movies, the web, and more. Come chat with us!
  continue reading
 
Artwork
 
Longtime ESPN host Kenny Mayne brings his curiosity and wit to 2400Sports in a new flagship conversation podcast. Each week, Kenny will talk to someone he knows… a little, and is fascinated by a lot. Athletes, musicians, writers, and celebrities who he’s had encounters with, been inspired by, and generally thought “I wish I knew more about that person.” This is his chance, and yours too. Hey Mayne will deliver a weekly podcast that blends the sports culture with entertainment, politics, musi ...
  continue reading
 
Artwork
 
For the latest in computer security news, hacking, and research! We sit around, drink beer, and talk security. Our show will feature technical segments that show you how to use the latest tools and techniques. Special guests appear on the show to enlighten us and change your perspective on information security. Note: This is only Paul's Security Weekly, a 2-hour show recorded once per week.
  continue reading
 
As Gun Culture dives deeper into the philosophy behind the Human Right to self defense and determination, the Cast and Guests engage in building a closer community through conversation. Shop at www.redactedllc.com Support / Join the Chat at redactedculture.locals.com
  continue reading
 
Loading …
show series
 
With the release of their latest P-365 Raider, Flux Defense teamed up with REDACTED to put on our first public land clean up in Utah. Before we departed for the range, however, we took time to sit down and have a conversation on the nuances of bringing product to market in the firearms industry and gun culture. Alex Aubrey retells some of the histo…
  continue reading
 
The emergence of generative AI has caused us to rethink things on two fronts: how we consume threat detection data, as defenders how we need to shift our thinking and approaches to prepare for attackers' newfound GenAI capabilities But wait - is GenAI even useful for defenders or attackers? We'll dive deep into the state of AI as it pertains to sec…
  continue reading
 
Doug and the Security Weekly crew talk about vulnerabilities, are we patching the right things? This is the burning question. We will try to answer it. Segment Resources: https://blog.sonicwall.com/en-us/2024/04/patch-tuesday-which-vulnerabilities-really-need-prioritizing/ Segment description coming soon!The Crowdstrike incident: what happened and …
  continue reading
 
Doug and the Security Weekly crew talk about vulnerabilities, are we patching the right things? This is the burning question. We will try to answer it. Segment Resources: https://blog.sonicwall.com/en-us/2024/04/patch-tuesday-which-vulnerabilities-really-need-prioritizing/ Segment description coming soon!The Crowdstrike incident: what happened and …
  continue reading
 
Dr. Shai Tubali is a transformational philosopher, specializing in exploring expanded consciousness. Tune in, as Dr. Tubali discusses guidance for revisiting trauma for healing, the relationship between Eastern and Western Philosophies, why we must take the time to discover our “second self”;, and the importance of keeping our mind youthful and fle…
  continue reading
 
Generative AI has produced impressive chatbots and content generation, but however fun or impressive those might be, they don't always translate to value for appsec. Allie brings some realistic expectations to how genAI is used by attackers and can be useful to defenders. Segment resources: https://www.forrester.com/blogs/generative-ai-will-not-ful…
  continue reading
 
Back in April, we covered a story on episode #348 titled "CISO-CEO communication gaps continue to undermine cybersecurity". In that article, Sumedh Thakar, the CEO at Qualys, stated "CISOs must translate technical risks into business impact for CEOs." But he didn't say how. So, we invited him on the show to explain. In this episode, Sumedh walks us…
  continue reading
 
Can one solve a skill issue with better gear? A Stepping stone to maturity in Gun Culture, this topic may come across as both eye rolling and attention gathering. On the one hand, a better ruck sack will not get you up the mountain. On the other hand, it sure helps. Parachutes, plates, and powder all come into play as we consider how and when we lo…
  continue reading
 
In this episode of Security Weekly News, Dr. Doug White and Josh Marpet delve into the widespread impact of the recent CrowdStrike and Microsoft technical issue, which disrupted various industries, including airlines, DMVs, and hospitals. They discuss the interconnectedness of modern systems, the reliance on automatic updates, and the critical need…
  continue reading
 
In this episode of Enterprise Security Weekly, we revisit the insightful book "Jump-start Your SOC Analyst Career" with authors Jarrett Rodrick and Tyler Wall, exploring updates on career paths, opportunities, and the industry's reality. We delve into the myths versus the truths about cybersecurity careers, discussing the viability of high salaries…
  continue reading
 
Thinking about getting a 3D printer or have one and need a good primer? Check out this segment, we live 3D print a Captain Crunch whistle and talk all about 3D printing for hackers! Segment Resources: Slides used in this segment: https://files.scmagazine.com/wp-content/uploads/2024/07/3D-Printing-for-Hackers.pdf Major 3D Printer Websites: https://v…
  continue reading
 
Thinking about getting a 3D printer or have one and need a good primer? Check out this segment, we live 3D print a Captain Crunch whistle and talk all about 3D printing for hackers! Segment Resources: Slides used in this segment: https://files.scmagazine.com/wp-content/uploads/2024/07/3D-Printing-for-Hackers.pdf Major 3D Printer Websites: https://v…
  continue reading
 
Major General Gregg F. Martin is a 36-year Army Combat Veteran, Airborne-Ranger-Engineer Soldier, Army Strategist, a PhD and Double Master’s MIT Graduate, and West Point Graduate. He is also an accomplished Author, and a survivor of Bipolar Disorder. Tune in as Gregg shares his journey through this mental illness, including his highs and lows with …
  continue reading
 
People don't believe in conspiracy theories because they find them rationally compelling. Rather, these ideas hijack an individual's need for a sense of purpose and belonging. They prey on our desire for the world to be thus regular and make sense. However, the consequences of a conspiracy theory tend to be more personal than what the media would l…
  continue reading
 
Should Women serve in combat roles in the military? The recent attempt on President Trump's life brings up the old debate about women in the military and women in combat roles. Framing tends to drive this conversation, and we continually get bogged down in redundant questions. Can women do the job? Are women capable of the achieving the standards? …
  continue reading
 
How can LLMs be valuable to developers as an assistant in finding and fixing insecure code? There are a lot of implications in trusting AI or LLMs to not only find vulns, but in producing code that fixes an underlying problem without changing an app's intended behavior. Stuart McClure explains how combining LLMs with agents and RAGs helps make AI-i…
  continue reading
 
Cyber insurance underwriting is all over the map. With such a variation in application requirements, how should small and medium businesses prepare to receive the best policy for the price? Brian Fritton joins Business Security Weekly to discuss a systematic approach to preparing for cyber insurance. By working with the underwriters, this approach …
  continue reading
 
I'm always thrilled to chat with ex-analysts, and Henrique Teixeira can cover a lot of ground with us on the topic of identity management and governance. The more I talk to folks about IAM/IGA, the more I'm shocked at how little has changed. If anything, it seems like we've gone backwards a bit, with the addition of cloud SaaS, mobile devices, and …
  continue reading
 
Bats in your headset, Windows Wifi driver vulnerabilities, Logitech's dongles, lighthttpd is heavy with vulnerabilities, node-ip's not vulnerability, New Intel CPU non-attacks, Blast Radius, Flipper Zero alternatives, will OpenSSH be exploited, emergency Juniper patches, and the D-Link botnet grows. Iceman comes on the show to talk about RFID and N…
  continue reading
 
Bats in your headset, Windows Wifi driver vulnerabilities, Logitech's dongles, lighthttpd is heavy with vulnerabilities, node-ip's not vulnerability, New Intel CPU non-attacks, Blast Radius, Flipper Zero alternatives, will OpenSSH be exploited, emergency Juniper patches, and the D-Link botnet grows. Iceman comes on the show to talk about RFID and N…
  continue reading
 
At 16 years old, Saanvi Sita Mylavarapu has hiked more miles than most of us in our adulthood. Having covered over 1000 miles at over 25 parks here in the U.S., and 170 kilometers throughout France, Italy and Switzerland, her passion for the outdoors has led her to guide others in connecting with nature and become an Ambassador of the National Park…
  continue reading
 
From Private Military Contractors to Mall Cops, the field of security is full of misconceptions, egos, and opportunities to find yourself hung out to dry for other's safety. But when we look behind the curtain into what goes in to threat prevention, we see a much deeper picture. Rob Rawson of Rozin Security joins the show to teach us about the idea…
  continue reading
 
Sandy Carielli and Janet Worthington, authors of the State Of Application Security 2024 report, join us to discuss their findings on trends this year! Old vulns, more bots, and more targeted supply chain attacks -- we should be better at this by now. We talk about where secure design fits into all this why appsec needs to accelerate to ludicrous sp…
  continue reading
 
On average, CISOs manage 50-75 security products. Many of these products have either not been deployed or only partially deployed, while others overlap of products. How do CISOs effectively consolidate their products to a manageable size? Max Shier, Chief Information Security Officer at Optiv Security, joins Business Security Weekly to discuss tech…
  continue reading
 
In an unexpected, and unwelcomed bout with Covid, Aubrey has nothing but time - to rest and think. During this time, he shares his thoughts on habits and routines - those that serve us and those that don't. Based on our routines, he continues to talk about how we can determine if a change is needed in our lives. Tune in, as Aubrey breaks down the 3…
  continue reading
 
Exploring the Hardware Hacking Realm with Joe Grand, AKA Kingpin Joe Grand, also known by his hacker pseudonym "Kingpin," stands as a prominent figure in the cybersecurity landscape. With an extensive background in hardware hacking, reverse engineering, and embedded systems, Joe has carved a niche for himself as a respected authority in the field. …
  continue reading
 
Exploring the Hardware Hacking Realm with Joe Grand, AKA Kingpin Joe Grand, also known by his hacker pseudonym "Kingpin," stands as a prominent figure in the cybersecurity landscape. With an extensive background in hardware hacking, reverse engineering, and embedded systems, Joe has carved a niche for himself as a respected authority in the field. …
  continue reading
 
Check out this interview from the SWN Vault, hand picked by main host Doug White! This Secure Digital Life segment was originally published on March 6, 2017. Have you ever wondered what phishing is? Do you know what spear phishing attacks are? Doug and Russ explain how to protect yourself from phishing scams in the inaugural episode of Secure Digit…
  continue reading
 
Check out this interview from the BSW Vault, hand picked by main host Matt Alderman! This segment was originally published on October 11, 2022. As 2023 approaches, security leaders are hard at work preparing their budgets, identifying their projects, and setting their priorities for the next twelve months. At the same time, the growth mode days of …
  continue reading
 
The recent debate between Donald Trump and Joe Biden covered a series of topics both relevant and otherwise to the American People. Among them included abortion, the economy, and illegal migration. What didn't come up, was Gun Control. And the silence spoke volumes as this divisive topic wouldn't have helped either candidate appear reasonable or kn…
  continue reading
 
Healthcare and malware, MoveIT, Chrome won't trust Entrust, the discovery of Volt Typhoon, & more on this episode of the Security Weekly News! Segment Resources: https://therecord.media/volt-typhoon-targets-underestimated-cisa-says Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-395…
  continue reading
 
We all might be a little worn out on this topic, but there's no escaping it. Executives want to adopt GenAI and it is being embedded into nearly every software product we use in both our professional and personal lives. In this interview, Anurag joins us to discuss how his company evaluated and ultimately integrated AI-based technologies into their…
  continue reading
 
If owning and becoming proficient with a firearm continues the Second Amendment, owning and becoming proficient with radios may just be securing the First. Jake Knight of Gridbase.net reports on his first off-grid radio course and presents an argument that radios and their extension: mesh networks, strengthen our independence through the ability to…
  continue reading
 
This may be controversial, however, we've been privately discussing how organizations benefit from penetration testing and vulnerability scanning. Do you still need these services as a critical part of your security program? Can't you just patch stuff that is missing patches? Tune in for a lively debate! Zyxl NAS devices are under attack and the ex…
  continue reading
 
This may be controversial, however, we've been privately discussing how organizations benefit from penetration testing and vulnerability scanning. Do you still need these services as a critical part of your security program? Can't you just patch stuff that is missing patches? Tune in for a lively debate! Zyxl NAS devices are under attack and the ex…
  continue reading
 
Loading …

Quick Reference Guide