show episodes
 
Artwork
 
Each Sunday, Brad Shoemaker and Will Smith discuss a new technology topic. Come for the long-form conversations about virtual reality, space travel, electric cars, refresh rates, and a whole lot more. Support the pod on Patreon: http://patreon.com/techpod
  continue reading
 
Artwork

1
Acoustic Music Talk with Brad Apple

Acoustic Music Talk with Brad Apple

Unsubscribe
Unsubscribe
Daily+
 
On Acoustic Music Talk we'll be interviewing artists and talking about all facets of acoustic music, including performing, instruments, recording techniques, and much more. The world of acoustic music is a wonderful one, and we want to explore it along with you! Join us for the ride. Support this podcast: https://podcasters.spotify.com/pod/show/brad-apple/support
  continue reading
 
If you love the health and fitness YouTube show, Live Lean TV, you're also going to love the Live Lean TV Podcast. Lets be real, some people just don't have the time to watch the show on YouTube, so we now upload the audio version of the Live Lean TV episodes, as well as new exclusive audio to this podcast. In addition to the episodes covering specific nutrition and fitness tips, you'll also hear our Motivation Minute series, and our #AskLiveLeanTV show. This is the show where husband and wi ...
  continue reading
 
As editor-in-chief of "Guitar World" magazine, Brad Tolinski has interviewed and profiled some of music’s greatest guitarists, including Eric Clapton, B.B. King, Eddie Van Halen, Jack White, and Jeff Beck. Join Brad at this event as he speaks about his new book, "Light and Shade," an “oral autobiography” of Led Zeppelin guitarist Jimmy Page, and perhaps the most complete and revelatory portrait of the legendary guitarist ever published.
  continue reading
 
Security Conversations covers the business of cybersecurity, from the lens of veteran journalist and storyteller Ryan Naraine. Thoughtful conversations with security practitioners on threat intelligence, zero trust, securing cloud deployments, penetration testing, bug bounties, advancements in offensive research and targeted malware espionage activity. Connect with Ryan on Twitter (Open DMs).
  continue reading
 
Steve Jobs’ Apple keynote presentations were legendary, and they deserve to be shared! So, Krazy Ken and his friends are teaming up to take you on a journey through the Apple Keynote Chronicles! Join them as they learn about the behind-the-scenes stories, argue about the products, laugh at the bloopers, and relive these momentous events in tech history.
  continue reading
 
Step By Step Podcasting was created to help YOU get to your first 100 downloads per episode. I will go through all the steps, in order, of how to start a successful podcast and get those 100 downloads per episode as fast as possible. If you are new to podcasting, I would obviously start with Step 1.
  continue reading
 
Artwork

1
Church Media Design TV HD

Church Media Design

Unsubscribe
Unsubscribe
Monthly
 
Background Loops, Podcasts, Series Graphics, Invite Cards, Video Editng, Live Sound, and the list goes on. If you are wondering how to implement these things into your local church CMD is here to help! Church.Media.Design TV is a show built around understanding and using media of all forms in the church. In this weekly show Brad Zimmerman gives tips,tricks and how to's, for you the Church Media Designer. Join the conversation at churchmediadesign.tv
  continue reading
 
Artwork

51
News for the Ages by Rethinking Aging Club

Linda Sherman, Ray Gordon and Debbie Howard

Unsubscribe
Unsubscribe
Daily
 
Stay informed with "News for the Ages," where we explore the latest developments in aging, longevity, and caregiving. Hosted by Linda Sherman, Ray Gordon and Debbie Howard, our show features insights from a diverse group of industry experts. Each week, we delve into journalistic articles from respected publications, bringing you the most current and informative stories. Join our lively discussions as we cover wellness, neuroscience, aging in place, senior fitness, caregiver support and more. ...
  continue reading
 
Loading …
show series
 
Are you curious about the real benefits of apple cider vinegar for your health, weight loss, and more? In this episode of Live Lean TV, we dive deep into the science-backed facts about apple cider vinegar, covering everything from its health benefits to its potential side effects. ► Free 7 Day Trial To My Workout App: https://www.liveleantv.com► Li…
  continue reading
 
Check out this episode from the BSW Vault, hand picked by main host Matt Alderman! This episode was initially published on November 29, 2022. Todd Fitzgerald, author of CISO Compass and host of CISO Stories, joins BSW to share his top leadership lessons from the first 100 episodes of CISO Stories. Todd interviews CISOs and gains insights into their…
  continue reading
 
Check out this interview from the ASW Vault, hand picked by main host Mike Shema! This segment was originally published on May 9, 2023. What does software resilience mean? Why is status quo application security unfit for the modern era of software? How can we move from security theater to security chaos engineering? This segment answers these quest…
  continue reading
 
In today's episode of Live Lean TV, I'm breaking down 4 healthy guidelines to show you how to choose the best protein powder that meets your fitness goals! ► EarthNutri Whey Protein Powder: https://www.liveleantv.com/earthnutriwhey (25% off discount code: LiveLeanTV25)► EarthNutri Egg White Protein Powder: https://www.liveleantv.com/eggprotein (25%…
  continue reading
 
This week we put our security expert* hats back on to talk about the latest hotness in login technology, passkeys. Find out how passkeys work, how they enable you to login without a password, which major platforms are supporting them, and where and how you should manage them. We also do a quick update on more traditional time-based authenticator ap…
  continue reading
 
Larry and Helen walk us through the AI supply chain landscape. Learn what goes into building and using AI models and the dangers that could lurk within. Segment Resources: Community efforts on AIBOM topic: https://github.com/aibom-squad This week: I want all the firmware, its not just TP-Link, CVEs for malware, BLE and your health, faking your own …
  continue reading
 
Three Buddy Problem - Episode 10: Top stories this week -- Volt Typhoon zero-day exploitation of Versa Director servers, Chinese APT building botnets with EOL routers, the gap in security solutions for network devices and appliances, Russia's APT29 (Midnight Blizzard) caught reusing exploits from NSO Group and Intellexa, Microsoft’s upcoming Window…
  continue reading
 
The top priority on the CIS Critical Security Controls list has never changed: inventory and control of enterprise assets. Yet it remains one of the most challenging controls to implement, much less master. The refrain, "you can't secure what you don't know about" is as old as information security itself. Complicating this task is the fact that imp…
  continue reading
 
Presented by Benjamin Surmi, Koelsch Communities LA Times 8-8-24 Love.Life L.A.’s New Integrative Wellness Club Conceived by John Mackey, Co-Founder, Whole Foods by Deborah Vankin https://www.latimes.com/lifestyle/story/2024-08-08/love-life-wellness-center-los-angeles-whole-foods-john-mackey https://love.life/ Related: https://www.fastcompany.com/9…
  continue reading
 
On this week’s edition of the Flavors of Northwest Arkansas podcast, we talk to Patrick Bohannan and John Kuenzel of the Black Howler Beer Company in Highfill. They’re old pals that met in band in the 6th grade. Now, I think it’s safe to say that it’s not a shock that they weren’t originally looking to open their brewery in Highfill, but it’s turne…
  continue reading
 
IoT devices are notorious for weak designs, insecure implementations, and a lifecycle that mostly ignores patching. We look at external factors that might lead to change, like the FCC's cybersecurity labeling for IoT. We explore the constraints that often influence poor security on these devices, whether those constraints are as consequential given…
  continue reading
 
How are personal liability and indemnification impacting the CISO role? Darren Shou, Chief Strategy Officer from RSA Conference, describes the current landscape of CISO liability and the challenges facing CISOs today. He discusses the implications of the SEC's recent actions, including the charges against SolarWinds' CISO, and the growing trend of …
  continue reading
 
In today's episode, we’re diving deep into the world of maca root powder benefits for men and women to explore whether it truly lives up to its reputation as a superfood. ► Recommended Maca Root Powder: https://www.liveleantv.com/macapowder► Free 7 Day Trial To My Workout App: https://www.liveleantv.com► Live Lean Body Quiz: https://www.liveleantv.…
  continue reading
 
The Qs that we attempt to A in this month's question-fest include: What are some less obvious benefits of portable apps? How trustworthy is a package manager? Is a Windows Pro license really worth it? What's your microwave technique for even, efficient heating? How do you stop analyzing products and just buy something already? Is a MagSafe connecto…
  continue reading
 
Three Buddy Problem - Episode 9: On this episode, we look at the hacking scene in Taiwan, the sad state of visibility into big malware campaigns, the absence of APTs linked to the prolific MIVD Dutch intelligence agency, the blurring lines between big ransomware heists and nation-state actors caught using ransomware as a tool for sabotage and misat…
  continue reading
 
This week, in the enterprise security news, A funding that looks like an acquisition And two for-sure acquisitions Rumors that there are funding problems for early stage cyber startups, and we’ll see a lot more acquisitions before the end of the year Speaking of rumors, Crowdstrike did NOT like last week’s Action1 acquisition rumor! Shortening dete…
  continue reading
 
Every week here on the show we talk about vulnerabilities and exploits. Typically we recommend that organizations remediate these vulnerabilities in some way. But how? And more importantly, which ones? Some tools we have to help us are actually not all that helpful at time, such as: Mitre Att&ck - Don't get me wrong, this is a great project and Ada…
  continue reading
 
Presented by Debbie Howard, Aging Matters International NY Times Well 8-14-24 5 Health Trends We Debunked This Year by Julia Calderone https://www.nytimes.com/2024/08/14/well/2024-health-trends.html Presented by Elizabeth Magallon Fleury, LifesEncore.com NY Times 3-6-24 Digital Wallet by Brian X. Chen: lead consumer technology writer for The New Yo…
  continue reading
 
On this week’s edition of the Flavors of Northwest Arkansas, we’re at Black Apple Hard Cider in downtown Springdale, talking to Co-owner Leo Orpin. Black Apple just celebrated its 9th anniversary! It’s the first and only cidery in the state of Arkansas, and they had to take on educating the masses about cider. I’ve always been curious as to how Bla…
  continue reading
 
This week, Jeff Pollard and Allie Mellen join us to discuss the fallout and lessons learned from the CrowdStrike fiasco. They explore the reasons behind running in the kernel, the challenges of software quality, and the distinction between a security incident and an IT incident. They also touch on the need to reduce the attack surface and the impor…
  continue reading
 
What are the barriers to cyber resilience today? Why is it so difficult? And what is coming next, that will generate resilience challenges further down the line? After five years of focusing on the short- and medium-term future of cybersecurity and edge, this year, LevelBlue wanted to understand what is preventing cyber resilience—and what business…
  continue reading
 
Our good friend Steve Lin joins us to run down the trip he and Brad recently took to the Vintage Computer Festival: West Coast Edition, hosted in Mountain View, CA's wonderful Computer History Museum. Did you ever wonder about the strange arrow-key layout of early Soviet computers? Or how to build your own CRT out of a tube you found on the sidewal…
  continue reading
 
Three Buddy Problem - Episode 8: This week’s show digs into Microsoft’s in-the-wild zero-day woes, Patch Tuesday and the absence of IOCs, a wormable Windows TCP/IP flaw that the Chinese government knew about for months, Iran’s aggressive hacking US election targets, CrowdStrike v Qihoo360 and major problems with APT naming conventions. Hosts: Costi…
  continue reading
 
Early on in his career Spaf was working with microcode and continued to work on technical projects. As time went on he realized that focusing on the non-technical work, such as policies and shaping our thinking, would help move the needle. Borrowing concepts from his book on the subject, we will delve into some cybersecurity myths such as: Are user…
  continue reading
 
In this conversation, the hosts discuss patchless patching, vulnerabilities in the Windows TCP/IP stack, and the trustworthiness of Microsoft. They highlight the challenges of marketing in the cybersecurity industry and the importance of building trust with customers. The conversation also touches on the need for vendors to prioritize security and …
  continue reading
 
Presented by Ellen Khalifa, Behavior Change for Health Span and Wellness Coach Fortune Magazine Wellness 6-25-24 A.I. Can Radically Lengthen Your Lifespan, Says Futurist Ray Kurzweil. Here’s how. =>https://fortune.com/well/article/a-i-radically-lengthen-lifespan-ray-kurzweil/ Presented by Debbie Howard, Aging Matters International Next Avenue 5-29-…
  continue reading
 
On this week’s edition of the Flavors of Northwest Arkansas Podcast, we hop up to Bentonville Provisions where we talked with Chef and Owner Carrie Burse, and this lady has a pedigree! She went to chef school in Napa Valley before getting to work at a 3 Michelin star restaurant for her externship. Wait till you hear what she did there. She found ou…
  continue reading
 
Startups and small orgs don't have the luxury of massive budgets and large teams. How do you choose an appsec approach that complements a startup's needs while keeping it secure. Kalyani Pawar shares her experience at different ends of an appsec maturity spectrum. In complex software ecosystems, individual application risks are compounded. When it …
  continue reading
 
This week, it’s time for security money, our quarterly review of the money of security, including public companies, IPOs, funding rounds and acquisitions from the previous quarter. This quarter, Crowdstrike crashes the index, as Thoma Bravo acquires another index company. The index is currently made up of the following 25 pure play cybersecurity pu…
  continue reading
 
We got a listener request to talk about our ride-or-die software, the apps we just can't live without, and we thought a good way to focus that subject was to step through everything we've got on our taskbar, running in the system tray, and pinned to the Start menu. Listen in as we talk through our workflows that feature all sorts of both well known…
  continue reading
 
In this interview we explore the new and sometimes strange world of redteaming AI. I have SO many questions, like what is AI safety? We'll discuss her presence at Black Hat, where she delivered two days of training and participated on an AI safety panel. We'll also discuss the process of pentesting an AI. Will pentesters just have giant cheatsheets…
  continue reading
 
This week, Downgrade attacks, bootloader fun, check your firmware before you wreck your firmware, you've got mail server issues, Ivanti is the new Rhianna, you should update your BIOS, Openwrt dominates, and attacking the security tools for fun and profit! Learn what is most interesting at hacker summer camp this year! Visit https://www.securitywee…
  continue reading
 
Presented by Debbie Howard, Aging Matters International MedPage Today 7-31-24 Trust in Doctors Crashed During the COVID Pandemic -- And Remains Low by Katherine Kahn https://www.medicaleconomics.com/view/trust-in-physicians-hospitals-drops-from-covid-19-pandemic-to-early-2024 Recommended by Benjamin Surmi during our discussion https://www.compassio…
  continue reading
 
In this week’s episode of the Flavors of Northwest Arkansas podcast, we head to the arts district in downtown Springdale, as we talk to Daniel Hintz and Chef Jennifer Hill Booker of Bauhaus Biergarten. We get into German food and German beer, a very underrepresented concept in our area. Jennifer’s background includes a stint in Germany and she tell…
  continue reading
 
Even though Security Champions programs look very different across organizations and maturity levels, they share core principles for becoming successful. Marisa shares her experience in building these programs to foster a positive security culture within companies. She explains the incentives and rewards that lead to more engagement from champions …
  continue reading
 
Inspired by my co-host Jason Albuquerque, this quarter's Say Easy, Do Hard segment is Job Search Strategies for CISOs. In part 1, we discuss the challenges facing the CISO role and it's hiring. As CISOs leave the role, the position is not necessarily being refilled. How will this impact future CISO hiring? Inspired by my co-host Jason Albuquerque, …
  continue reading
 
Matchmaking: it's hard. Wait, not the online dating kind (well, maybe that too) but the kind where you have to match a bunch of different players with different hardware and different geographic locations together over high-speed Internet and let them have fun in a game together. Prompted by Activision's release of a white paper about Call of Duty'…
  continue reading
 
Three Buddy Problem - Episode 7: In this episode, we try to close the book on the CrowdStrike Windows BSOD story, Microsoft VP David Weston’s technical documentation and issues around kernel access and OS resilience. We also discuss Binarly’s PKFail research, secure boot bypasses, Dan Geer and tech monoculture, software vendor liability issues and …
  continue reading
 
Remember 20 years ago? When we were certain SIEMs would grant our cybersecurity teams superpowers? Or 10 years ago, when we were sure that NGAV would put an end to malware as we knew it? Or 15 years ago, when we were sure that application control would put an end to malware as we knew it? Or 18 years ago, when NAC would put an end to unauthorized n…
  continue reading
 
Presented by Elizabeth Magallon Fleury, LifesEncore.com WSJ 6-29-24 Apple Watch Is Becoming Doctors’ Favorite Medical Device by Christopher Mims Apple Watch Is Becoming Doctors’ Favorite Medical Device https://www.wsj.com/tech/personal-tech/apple-watch-is-becoming-doctors-favorite-medical-device-af3719ec Apple News Access: https://apple.news/AfLcgH…
  continue reading
 
Loading …

Quick Reference Guide