show episodes
 
Comic duo Doggett & Ephgrave interview acts who've appeared at their UK comedy & music club, Mostly Comedy. Previous MTMC guests include Rory Bremner, Phill Jupitus, Katherine Ryan, Paul Daniels & Debbie McGee, Josh Widdicombe, Richard Herring and Arthur Smith. Hosted by Glyn Doggett & David Ephgrave.
  continue reading
 
Artwork

1
Volunteer Friendly

From Studio to Stage

Unsubscribe
Unsubscribe
Monthly
 
Questions meant to provoke contemplation, and encourage discussion with your team, all in less than 10 minutes. For worship leaders, production directors and anyone involved in making Sunday services happen.
  continue reading
 
Artwork

1
D8Life Podcast™

Jackson M. Doggette Jr.

Unsubscribe
Unsubscribe
Weekly
 
Want to live your best life? D8Life Podcast™ is about how to apply eight fundamental principles of success that will propel you to your best life! Listen to the wisdom of Jackson M. Doggette Jr. every week.
  continue reading
 
Artwork

1
Disney Trips A-Z

Ryley Elise Doggett

Unsubscribe
Unsubscribe
Daily+
 
This pod cast will give you the listener all the best trips tricks and ideas on how to have the perfect Disney vacation. The podcast will cover everything Disney and explain the differences between the parks and the resorts. The podcast will go over On a budget/no budget Family vacation Vacation with out kids Disney cruise Disney membership Benefits Airlines ect...
  continue reading
 
Join fresh-faced recruit Amanda and weathered, long-suffering fan Ella as we head back to the 90s to reopen the TV show The X-Files! Every week we discuss one episode in chronological order as we rediscover the thrills, chills, and spills of Mulder and Scully's investigations into the paranormal. Hop aboard our flying saucer! New episodes released every Tuesday.
  continue reading
 
Just like our relationships with other humans in our lives, our relationships with our dogs are dynamic and complex. We believe that for those relationships to flourish or to find resolution when those relationships become strained, we must attend to them thoughtfully and with care. Welcome to the Consider the Dog podcast, created from archived recordings of live sessions where our members get to ask their most burning questions to some of the greatest practitioners of Canine Behavior. Hoste ...
  continue reading
 
Artwork
 
If you’re looking to understand the business of security, then Business Security Weekly is your show! Matt, Jason, and Paul cover security for senior managers and executives, including business challenges, leadership, and communications! Our special guests provide unique perspectives on real problems and solutions to help organizations secure their environments effectively. Learn how to build your security program, solve real problems, learn leadership skills and so much more!
  continue reading
 
Jon Strum cuts through all the jargon and breaks down the latest multiple sclerosis news. You’ll meet the scientists who are creating tomorrow’s MS treatments today. You’ll hear from the experts discussing how the latest tweaks and changes to our healthcare laws will impact your MS treatment. And we’ll be talking to the courageous MS warriors who are out there advocating on behalf of the MS community every day, as well as the men and women who are committed to living their best lives with MS ...
  continue reading
 
GIFT CONNECT is a global initiative dedicated to alleviating poverty by building alliances with leaders and mission-driven organizations to enhance education of early childhood development and mindfulness, expand public funding support, and empower a more conscious, connected, and creative world.
  continue reading
 
The HIP Podcast is the premier podcast for cybersecurity pros charged with defending hybrid identity environments. Hosted by 15-time Microsoft MVP and Active Directory security expert, Sean Deuby. Presented by Semperis: the pioneers of identity-driven cyber resilience for the hybrid enterprise.
  continue reading
 
Artwork

1
The Rogue Radio Podcast

roguemusic.co.uk

Unsubscribe
Unsubscribe
Monthly
 
The Rogue Radio Show has been broadcasting live on Monday nights from Bancroft House, Hitchin since late 2011 and we are pleased to be able to bring you this podcast edition featuring original unsigned music, interviews and local music news from Herts, Beds and beyond. Hosted by an ever-revolving roster of Rogue djs pedalling everything from artist interviews and local music news to points of views and humour.
  continue reading
 
Team Bikenetic races mountain bike and cyclocross race events in the mid-Atlantic USA. We aim to briefly cover happenings with the team, pointing out other interesting media sources, and quick highlights of things we've come across or are excited about. Public podcast but oriented around team interests and events.
  continue reading
 
Artwork
 
The life of dog trainers is often hidden from the public view. We often just see them as "just dog trainers". Join us in an in depth discussion with trainer from around the world as we get to know them on a deeper level. Find out your trainers "why" behind what they do and learn about their background and passion that got them into this field. This is a great opportunity for dog owners to learn about dog training from a brand new angle and to hopefully help you all find the best trainers for ...
  continue reading
 
Loading …
show series
 
When it comes to living your best life when you're living with MS, the first step is to make smart lifestyle choices. Maintaining a healthy lifestyle doesn't require pills, injections, or infusions. And making smart lifestyle choices can make a real, measurable difference in your quality of life. Joining me to talk about the benefits of maintaining…
  continue reading
 
Doug and the Security Weekly crew talk about vulnerabilities, are we patching the right things? This is the burning question. We will try to answer it. Segment Resources: https://blog.sonicwall.com/en-us/2024/04/patch-tuesday-which-vulnerabilities-really-need-prioritizing/ Segment description coming soon!The Crowdstrike incident: what happened and …
  continue reading
 
Generative AI has produced impressive chatbots and content generation, but however fun or impressive those might be, they don't always translate to value for appsec. Allie brings some realistic expectations to how genAI is used by attackers and can be useful to defenders. Segment resources: https://www.forrester.com/blogs/generative-ai-will-not-ful…
  continue reading
 
Back in April, we covered a story on episode #348 titled "CISO-CEO communication gaps continue to undermine cybersecurity". In that article, Sumedh Thakar, the CEO at Qualys, stated "CISOs must translate technical risks into business impact for CEOs." But he didn't say how. So, we invited him on the show to explain. In this episode, Sumedh walks us…
  continue reading
 
Back in April, we covered a story on episode #348 titled "CISO-CEO communication gaps continue to undermine cybersecurity". In that article, Sumedh Thakar, the CEO at Qualys, stated "CISOs must translate technical risks into business impact for CEOs." But he didn't say how. So, we invited him on the show to explain. In this episode, Sumedh walks us…
  continue reading
 
This week we are looking into troubling secrets and barfing creatures while we discuss “The Gift”! We’re talking whether or not Scully has any hobbies, how there’s no way Skinner reads any of their case reports, some Geico Caveman kissing ASMR, and how Mulder is screaming at witnesses. He’s back, baby! We’re happy to see Mulder, but we’re troubled …
  continue reading
 
It's hard to imagine any area of our lives that hasn't been transformed by digital technology. That's certainly true for healthcare in general and MS diagnosis and treatment in particular. Dr. Riley Bove joins me to discuss the role that digital technology already plays in the diagnosis and treatment of MS and to share a preview of what's coming ne…
  continue reading
 
In this episode of Security Weekly News, Dr. Doug White and Josh Marpet delve into the widespread impact of the recent CrowdStrike and Microsoft technical issue, which disrupted various industries, including airlines, DMVs, and hospitals. They discuss the interconnectedness of modern systems, the reliance on automatic updates, and the critical need…
  continue reading
 
In this episode of Enterprise Security Weekly, we revisit the insightful book "Jump-start Your SOC Analyst Career" with authors Jarrett Rodrick and Tyler Wall, exploring updates on career paths, opportunities, and the industry's reality. We delve into the myths versus the truths about cybersecurity careers, discussing the viability of high salaries…
  continue reading
 
Thinking about getting a 3D printer or have one and need a good primer? Check out this segment, we live 3D print a Captain Crunch whistle and talk all about 3D printing for hackers! Segment Resources: Slides used in this segment: https://files.scmagazine.com/wp-content/uploads/2024/07/3D-Printing-for-Hackers.pdf Major 3D Printer Websites: https://v…
  continue reading
 
How can LLMs be valuable to developers as an assistant in finding and fixing insecure code? There are a lot of implications in trusting AI or LLMs to not only find vulns, but in producing code that fixes an underlying problem without changing an app's intended behavior. Stuart McClure explains how combining LLMs with agents and RAGs helps make AI-i…
  continue reading
 
This week we are avoiding squeaky carts in public bathrooms while we discuss “Badlaa”! We’re talking Doggett’s ever-deepening New Yahk accent, how Scully is always late to the scene because she has to exchange insurance information with all the cars she’s hit, sloppy vampires, how Scully is terrified at being the believer, that Skinner would make a…
  continue reading
 
As Harvard Fellow Dr. Nara Michaelson treated women who had been recently diagnosed with MS, she recognized they shared characteristics that she had observed in victims of violent domestic abuse. Dr. Michaelson's observation led her to write The Unraveling, an essay that highlights the fear that can accompany the uncertainty of living with MS. Dr. …
  continue reading
 
Cyber insurance underwriting is all over the map. With such a variation in application requirements, how should small and medium businesses prepare to receive the best policy for the price? Brian Fritton joins Business Security Weekly to discuss a systematic approach to preparing for cyber insurance. By working with the underwriters, this approach …
  continue reading
 
Cyber insurance underwriting is all over the map. With such a variation in application requirements, how should small and medium businesses prepare to receive the best policy for the price? Brian Fritton joins Business Security Weekly to discuss a systematic approach to preparing for cyber insurance. By working with the underwriters, this approach …
  continue reading
 
I'm always thrilled to chat with ex-analysts, and Henrique Teixeira can cover a lot of ground with us on the topic of identity management and governance. The more I talk to folks about IAM/IGA, the more I'm shocked at how little has changed. If anything, it seems like we've gone backwards a bit, with the addition of cloud SaaS, mobile devices, and …
  continue reading
 
Bats in your headset, Windows Wifi driver vulnerabilities, Logitech's dongles, lighthttpd is heavy with vulnerabilities, node-ip's not vulnerability, New Intel CPU non-attacks, Blast Radius, Flipper Zero alternatives, will OpenSSH be exploited, emergency Juniper patches, and the D-Link botnet grows. Iceman comes on the show to talk about RFID and N…
  continue reading
 
Sandy Carielli and Janet Worthington, authors of the State Of Application Security 2024 report, join us to discuss their findings on trends this year! Old vulns, more bots, and more targeted supply chain attacks -- we should be better at this by now. We talk about where secure design fits into all this why appsec needs to accelerate to ludicrous sp…
  continue reading
 
This week we are turning into some kind of metal man while we discuss “Salvage”! We’re talking why you can’t blame everything on Gulf War Syndrome, how Doggett gets scared when Scully starts talking about the paranormal, our favorite extra who gets a little scared of a stick, how you have to shave lest you turn into a metal Chia Pet, and Doggett’s …
  continue reading
 
On average, CISOs manage 50-75 security products. Many of these products have either not been deployed or only partially deployed, while others overlap of products. How do CISOs effectively consolidate their products to a manageable size? Max Shier, Chief Information Security Officer at Optiv Security, joins Business Security Weekly to discuss tech…
  continue reading
 
On average, CISOs manage 50-75 security products. Many of these products have either not been deployed or only partially deployed, while others overlap of products. How do CISOs effectively consolidate their products to a manageable size? Max Shier, Chief Information Security Officer at Optiv Security, joins Business Security Weekly to discuss tech…
  continue reading
 
The inequities associated with gaining access to quality healthcare are often discussed, and my guest this week has taken steps to address them. Dr. Jaime Imitola and his team at UCONN Health have created a tool called VISIBL-MS, a bilingual framework designed to increase doctors' and patients' awareness of the early signs of MS. We'll also share t…
  continue reading
 
Exploring the Hardware Hacking Realm with Joe Grand, AKA Kingpin Joe Grand, also known by his hacker pseudonym "Kingpin," stands as a prominent figure in the cybersecurity landscape. With an extensive background in hardware hacking, reverse engineering, and embedded systems, Joe has carved a niche for himself as a respected authority in the field. …
  continue reading
 
Check out this interview from the SWN Vault, hand picked by main host Doug White! This Secure Digital Life segment was originally published on March 6, 2017. Have you ever wondered what phishing is? Do you know what spear phishing attacks are? Doug and Russ explain how to protect yourself from phishing scams in the inaugural episode of Secure Digit…
  continue reading
 
This week we are staring through walls to look at Hollywood rats while we discuss “Surekill”! We’re talking Terence O’Hara and his telescoping eyes, maybe settle on a supremely-silly team name for Doggett and Scully, boo at Uncle Jack’s appearance, talk about the importance of having an attack child on your side, the real story of Howard Gordon’s d…
  continue reading
 
Check out this interview from the BSW Vault, hand picked by main host Matt Alderman! This segment was originally published on October 11, 2022. As 2023 approaches, security leaders are hard at work preparing their budgets, identifying their projects, and setting their priorities for the next twelve months. At the same time, the growth mode days of …
  continue reading
 
Check out this interview from the BSW Vault, hand picked by main host Matt Alderman! This segment was originally published on October 11, 2022. As 2023 approaches, security leaders are hard at work preparing their budgets, identifying their projects, and setting their priorities for the next twelve months. At the same time, the growth mode days of …
  continue reading
 
Brian Agnew joins us and gives a ton of actionable advice that you can use. Just a few of the topics we cover include: Why some trainers like to use the work ‘no’ when a dog makes a mistake in obedience and other trainers do not, How Brian transitions reactive dogs from working in a large open area on a long line to a more urban setting and a short…
  continue reading
 
Healthcare and malware, MoveIT, Chrome won't trust Entrust, the discovery of Volt Typhoon, & more on this episode of the Security Weekly News! Segment Resources: https://therecord.media/volt-typhoon-targets-underestimated-cisa-says Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-395…
  continue reading
 
We all might be a little worn out on this topic, but there's no escaping it. Executives want to adopt GenAI and it is being embedded into nearly every software product we use in both our professional and personal lives. In this interview, Anurag joins us to discuss how his company evaluated and ultimately integrated AI-based technologies into their…
  continue reading
 
This may be controversial, however, we've been privately discussing how organizations benefit from penetration testing and vulnerability scanning. Do you still need these services as a critical part of your security program? Can't you just patch stuff that is missing patches? Tune in for a lively debate! Zyxl NAS devices are under attack and the ex…
  continue reading
 
With 71% of web traffic coming from API calls last year and the average organization maintaining 613 API endpoints, a robust strategy is needed to protect APIs against automated threats and business logic attacks. Tune in as Luke Babarinde, Global Solution Architect, shares the key steps to building a successful API security strategy. This segment …
  continue reading
 
With 71% of web traffic coming from API calls last year and the average organization maintaining 613 API endpoints, a robust strategy is needed to protect APIs against automated threats and business logic attacks. Tune in as Luke Babarinde, Global Solution Architect, shares the key steps to building a successful API security strategy. This segment …
  continue reading
 
This week we are reluctantly opening our third eyes while we discuss “Via Negativa”! We’re talking the excess of sleepy FBI agents in this episode, Doggett’s Golf Guys dropping like flies and how it’s starting to get a little suspicious, Skinner starting drama and Doggett weathering it, how Scully is in the hospital from the stress of being a belie…
  continue reading
 
Over the course of her 39-year career with the National MS Society, including the past 13 years as its President and CEO, Cyndi Zagieboylo has been a driving force behind major initiatives that have fundamentally changed the MS treatment and research landscape. Creating a world where cures for MS are now within reach, Cyndi has led the work to make…
  continue reading
 
OAuth 2.0 is more than just a single spec and it's used to protect more than just APIs. We talk about challenges in maintaining a spec over a decade of changing technologies and new threat models. Not only can OAuth be challenging to secure by default, but it's not even always inter-operable. Segment Resources: https://oauth.net/2.1 https://oauth.n…
  continue reading
 
Traditional approaches to access management are no longer sufficient to safeguard enterprise security. Tim will explain why the most effective approach to modern enterprise security requires a Zero Trust model that extends beyond just access to encompass every action, no matter how minor. Tim will describe the importance of implementing a Zero Trus…
  continue reading
 
Check out this interview from the SWN Vault, hand picked by main host Doug White! This Secure Digital Life segment was originally published on June 19, 2018. This week, Doug and Russ interview Matthew Silva, President and Founder of the Cybersecurity and Intel Club at Roger Williams University! They talk about majoring in Cybersecurity vs. Computer…
  continue reading
 
Loading …

Quick Reference Guide