The complete and crazy musical adventures that begins with the murder of kids' TV show host and spins out into a world of: angry puppets, a tooth worshipping cult, a fuzzy elder god, and so, so much more!
…
continue reading
Looking at cinema's present via its past. The Next Picture Show is a biweekly roundtable by the former editorial team of The Dissolve examining how classic films inspire and inform modern movies. Episodes take a deep dive into a classic film and its legacy in the first half, then compare and contrast that film with a modern successor in the second. Hosted and produced by Genevieve Koski, Keith Phipps, Tasha Robinson and Scott Tobias.
…
continue reading
The daily podcast in which hosts Scott Carelli and Nick Jimenez analyze Edgar Wright’s Cornetto Trilogy one minute at a time.
…
continue reading
The Application Security Weekly podcast delivers interviews and news from the worlds of AppSec, DevOps, DevSecOps, and all the other ways people find and fix software flaws. Join hosts Mike Shema and John Kinsella on a journey through modern cybersecurity practices for applications, clouds, containers, and more.
…
continue reading
We're making our way through a list of the 100 Greatest films of all time to see if any of them would be on your own list. Join us on the journey.
…
continue reading
Welcome to The Adventures of Cinnamon & Oatmeal! A whimsical saga of two teddy bear bros who find themselves mysteriously transported to a magical world filled with whimsical creatures, dangerous miscreants and mayhemic mysteries!!! The Adventures of Cinnamon & Oatmeal is a Dungeons & Dragons actual play podcast. New episodes premiere on the first Tuesday of every month.
…
continue reading
This podcast is an audio archive of YouTube livestream recording with Patrick Collins and professionals in the web3 smart contract development field.
…
continue reading
Welcome to the Security Weekly Podcast Network, your all-in-one source for the latest in cybersecurity! This feed features a diverse lineup of shows, including Application Security Weekly, Business Security Weekly, Paul's Security Weekly, Enterprise Security Weekly, and Security Weekly News. Whether you're a cybersecurity professional, business leader, or tech enthusiast, we cover all angles of the cybersecurity landscape. Tune in for in-depth panel discussions, expert guest interviews, and ...
…
continue reading
1
Fuzzing for Vulns, GitLab Auth Bypass, JPEG Vulns, Programming Language Ranks - ASW #300
32:45
32:45
Play later
Play later
Lists
Like
Liked
32:45
Fuzzing network traffic in OpenWRT, parsing problems lead to GitLab auth bypass, more fuzzing finds vulns in a JPEG parser, and more! Show Notes: https://securityweekly.com/asw-300
…
continue reading
1
Fuzzing for Vulns, GitLab Auth Bypass, JPEG Vulns, Programming Language Ranks - ASW #300
32:45
32:45
Play later
Play later
Lists
Like
Liked
32:45
Fuzzing network traffic in OpenWRT, parsing problems lead to GitLab auth bypass, more fuzzing finds vulns in a JPEG parser, and more! Show Notes: https://securityweekly.com/asw-300
…
continue reading
1
C3pbot, Kaspersky, Octo2 , Honkai: Star Rail, ServiceNow, LinkedIn... - SWN #416
29:32
29:32
Play later
Play later
Lists
Like
Liked
29:32
C3pbot, Kaspersky, Octo2 Electric Boogaloo, Honkai: Star Rail, ServiceNow, LinkedIn, IoT, Josh Marpet, and more on the Cyber Security News. Show Notes: https://securityweekly.com/swn-416
…
continue reading
1
Vulnerable APIs and Bot Attacks: Two Interconnected, Growing Security Threats - David Holmes - ASW #300
35:07
35:07
Play later
Play later
Lists
Like
Liked
35:07
APIs are essential to modern application architectures, driving rapid development, seamless integration, and improved user experiences. However, their widespread use has made them prime targets for attackers, especially those deploying sophisticated bots. When these bots exploit business logic, they can cause considerable financial and reputational…
…
continue reading
1
Vulnerable APIs and Bot Attacks: Two Interconnected, Growing Security Threats - David Holmes - ASW #300
35:07
35:07
Play later
Play later
Lists
Like
Liked
35:07
APIs are essential to modern application architectures, driving rapid development, seamless integration, and improved user experiences. However, their widespread use has made them prime targets for attackers, especially those deploying sophisticated bots. When these bots exploit business logic, they can cause considerable financial and reputational…
…
continue reading
1
Authentication and Authorization in the AI Era - Shiven Ramji - BSW #365
30:30
30:30
Play later
Play later
Lists
Like
Liked
30:30
AI is bringing productivity gains like we’ve never seen before -- with users, security teams and developers already reaping the benefits. However, AI is also bolstering existing threats to application security and user identity -- even enabling new, personalized attacks to emerge. Shiven Ramji, President of Customer Identity at Okta, joins Business…
…
continue reading
1
#443: Heir Grievances Pt. 1 — The Savages
1:05:19
1:05:19
Play later
Play later
Lists
Like
Liked
1:05:19
Caring for an elderly or infirm parent is a common experience that is less commonly depicted on screen, particularly with a comedic bent, which is why Azazal Jacobs’ new HIS THREE DAUGHTERS inspired us to revisit the 2007 dramedy THE SAVAGES, which writer-director Tamara Jenkins drew from her own experiences dealing with a father with dementia. Muc…
…
continue reading
1
Answering the Board's Questions While UnitedHealth Group 'Starts Over' - BSW #365
36:38
36:38
Play later
Play later
Lists
Like
Liked
36:38
In the leadership and communications segment, CISA Releases Cyber Defense Alignment Plan for Federal Agencies, UnitedHealth Group CISO: We had to ‘start over’ after Change Healthcare attack, 20 Essential Strategies for Leadership Development Success, and more! Show Notes: https://securityweekly.com/bsw-365…
…
continue reading
1
Cybersecurity: is the talent gap a myth? Is the industry delusional? - ESW #376
45:24
45:24
Play later
Play later
Lists
Like
Liked
45:24
This week, the cybersecurity industry's most basic assumptions under scrutiny. Following up our conversation with Wolfgang Goerlich, where he questions the value of phishing simulations, we discuss essays that call into question: the maturity of the industry the supposed "talent gap" with millions of open jobs despite complaints that this industry …
…
continue reading
1
Speed, Flexibility, and AI: The Case for Migrating from Legacy SOAR Systems - Whitney Young - ESW #376
33:06
33:06
Play later
Play later
Lists
Like
Liked
33:06
In this episode, we explore some compelling reasons for transitioning from traditional SOAR tools to next-generation SOAR platforms. Discover how workflow automation and orchestration offers unparalleled speed and flexibility, allowing organizations to stay ahead of evolving security threats. We also delve into how advancements in AI are driving th…
…
continue reading
1
Shroombots, pagers, Tor, Raptor Train, GRU, Blue Light, Aaran Leyland, and More... - SWN #415
34:59
34:59
Play later
Play later
Lists
Like
Liked
34:59
Shroombots, pagers, Tor, Raptor Train, GRU, Blue Light, Aaran Leyland, and More on the Security Weekly News. Show Notes: https://securityweekly.com/swn-415
…
continue reading
1
Back to the office, Void Banshee, ServiceNow, Taiwan, Dlink, C++, Aaran Leyland... - SWN #414
34:40
34:40
Play later
Play later
Lists
Like
Liked
34:40
Back to the office serfs, Void Banshee, ServiceNow, Taiwan, Dlink, C++, Aaran Leyland, and more on this Edition of the Security Weekly News. Show Notes: https://securityweekly.com/swn-414
…
continue reading
1
Do phishing tests do more harm than good? - Wolfgang Goerlich - ESW #376
34:21
34:21
Play later
Play later
Lists
Like
Liked
34:21
A month ago, my friend Wolfgang Goerlich posted a hot take on LinkedIn that is less and less of a hot take these days. He posted, "our industry needs to kill the phish test",and I knew we needed to have a chat, ideally captured here on the podcast. I've been on the fence when it comes to phishing simulation, partly because I used to phish people as…
…
continue reading
1
The Known Exploited Vulnerability catalogue, aka the KEV - Tod Beardsley - PSW #843
56:07
56:07
Play later
Play later
Lists
Like
Liked
56:07
Gain insights into the CISA KEV straight from one of the folks at CISA, Tod Beardsley, in this episode of Below the Surface. Learn how KEV was created, where the data comes from, and how you should use it in your environment. This segment is sponsored by Eclypsium. Visit https://securityweekly.com/eclypsium to learn more about them! Show Notes: htt…
…
continue reading
Apple drops a lawsuit to avoid exposing secrets, what does it mean for the security industry if MS locks down the kernel?, exploding pagers, more things from the past: Adobe Flash exploits, robots get rid of your data, PKFail is still a thing, Android TV malware is back: now with conspiracy theories, DMA attacks, gamers are not nation-state attacke…
…
continue reading
1
A TLD Takeover, An LLM CTF, A Firmware Flaw, 6 Truths of Cyber Risk - ASW #299
29:16
29:16
Play later
Play later
Lists
Like
Liked
29:16
A takeover of the MOBI TLD for $20, configuring an LLM for a CTF, firmware flaw in an SSD, Microsoft talks kernel resilience, six truths of cyber risk quantification, and more! Show Notes: https://securityweekly.com/asw-299
…
continue reading
1
A TLD Takeover, An LLM CTF, A Firmware Flaw, 6 Truths of Cyber Risk - ASW #299
29:16
29:16
Play later
Play later
Lists
Like
Liked
29:16
A takeover of the MOBI TLD for $20, configuring an LLM for a CTF, firmware flaw in an SSD, Microsoft talks kernel resilience, six truths of cyber risk quantification, and more! Show Notes: https://securityweekly.com/asw-299
…
continue reading
1
Bringing Secure Coding Concepts to Developers - Dustin Lehr - ASW #299
33:10
33:10
Play later
Play later
Lists
Like
Liked
33:10
When a conference positioned as a day of security for developers has to be canceled due to lack of interest from developers, it's important to understand why there was so little interest and why appsec should reconsider its approach to awareness. Dustin Lehr discusses how appsec can better engage and better deliver security concepts in a way that m…
…
continue reading
1
Bringing Secure Coding Concepts to Developers - Dustin Lehr - ASW #299
33:10
33:10
Play later
Play later
Lists
Like
Liked
33:10
When a conference positioned as a day of security for developers has to be canceled due to lack of interest from developers, it's important to understand why there was so little interest and why appsec should reconsider its approach to awareness. Dustin Lehr discusses how appsec can better engage and better deliver security concepts in a way that m…
…
continue reading
1
Consolidating C-Suite Tech Roles as Security Budgets and Workforce Growth Flatline - BSW #364
29:21
29:21
Play later
Play later
Lists
Like
Liked
29:21
In the leadership and communications segment, Why Companies Should Consolidate Tech Roles in the C-Suite, End of an era: Security budget growth slows down, Global cybersecurity workforce growth flatlines, stalling at 5.5M pros, and more! Show Notes: https://securityweekly.com/bsw-364
…
continue reading
1
#442: Fuzz Busters, Pt. 2 — Rebel Ridge
1:12:31
1:12:31
Play later
Play later
Lists
Like
Liked
1:12:31
Jeremy Saulnier’s REBEL RIDGE puts a distinctly 2020s spin on the one-man army formula established in the era-defining ‘80s action hit FIRST BLOOD, resulting in a film with more nuance, less firepower, and equal amounts of ass-kicking. We parse that equation a bit more in-depth in our spoiler-light discussion of REBEL RIDGE, before bringing back FI…
…
continue reading
1
Solving the Cybersecurity Data Problem - Padraic O'Reilly - BSW #364
31:43
31:43
Play later
Play later
Lists
Like
Liked
31:43
Cybersecurity is complex. We have threats, vulnerabilities, incidents, controls, risks, etc. But how do they all connect together to drive a cyber risk program? As an industry, we've struggled for 20+ years trying to boil this ocean. Maybe we've been going about it the wrong way. Padraic O'Reilly, Founder and Chief Innovation Officer at CyberSaint,…
…
continue reading
1
Cybersecurity at the speed of Formula One - Darren Guccione, Harry Wilson - ESW #375
39:29
39:29
Play later
Play later
Lists
Like
Liked
39:29
Ever wondered what it's like to be responsible for the cybersecurity of a sports team? How about when that sports team is one of the world's most successful Formula One teams? I can't describe how excited we are to share this interview. This interview is basically two huge F1 nerds who happen to also be cybersecurity veterans asking everything they…
…
continue reading