show episodes
 
Artwork

1
Are We There Yet?

Jamie Hardy, Sonja Ernst

Unsubscribe
Unsubscribe
Monthly
 
Are We There Yet? is about recognizing, defining, and building pathways toward a more sustainable working future. How can we collaborate with others in a way that brings authenticity and durability to our projects and relationships? What tools can we leverage to communicate productively towards a shared goal? What can leaders do to shape where we’re going, and how to get there? Hosts Sonja Ernst and Jamie Hardy are two humans on a quest to understand just where we’re headed, in monthly conve ...
  continue reading
 
Artwork

1
Can't Be Contained

Samantha Skelly: Breathwork Expert, Conscious Entrepreneur, Speaker, Author

Unsubscribe
Unsubscribe
Monthly+
 
“Can’t be Contained”, hosted by Samantha Skelly, will bring you captivating conversations with humans who’ve cultivated a path of passion by following their bliss and intuitive hits; those who’ve released ordinary and opted for extraordinary. From spirituality to science, comedy to culture, and everything in between, Sam will share the untold stories of her guests who push boundaries, defy conventional thinking, and have the courage to seek the freedom their souls are desiring. If you're a r ...
  continue reading
 
I have a face for radio, but you can find me on IG @tashajuli. Behind my smile is my IQ! Fashion and satirical social observations at their finest and funniest! Tearing it up in Beverly Hills, where the people are old, Jewish, Persian, or tourists and more often than not, jerks. I didn’t move here to become a ‘Kardashian’ (I’m an LA native). I have an opinion about everything. I’m classy and polite unless provoked, then watch out! I observe the best of the best and the worst of the worst. I ...
  continue reading
 
Artwork

1
Integral BEing

Irina E. Childs

Unsubscribe
Unsubscribe
Monthly
 
This is the educational podcast that brings together spirituality and leadership, science and art, creativity, yoga and innovation. Thank you for listening in. A podcast for people wanting to know how to be all you are born to be, to reach the peak of human potential and live the integral happy life you are born to live. I am delighted to share with you the steps to take you there. As well as clear strategies and esoteric knowledge that can support your everyday life and work by transforming ...
  continue reading
 
Artwork
 
My Seven Chakras is a podcast that provides ancient wisdom for the modern mind. Through long form interviews, solo episodes and breathwork meditations, Aditya (AJ) helps his viewers discover how to calm their mind, relax their nervous system and experience deep states of bliss. Our community is called 'Action Tribe', so we're all about providing you simple, practical, proven, evidence-based techniques and methods to improve the quality of your life and notice a paradigm shift in how you look ...
  continue reading
 
Almightyportal.com :Join us on our journey of film making and investigative research. Since 2015, our mission is simply seeking truth behind the data. At the end of the day we will find meaning behind the madness. Feel free to join us on our analytic deep dives in pursuit of a real catalyst. We are for a community by the community and look forward to meeting you! Don’t hesitate to reach out with analytic projects and feedback.OUR MISSION To serve a community of like-minded individuals seekin ...
  continue reading
 
Humans, aliens, and other, welcome to the party! Here we explore and question the nuances of existence while balancing the day to day life of being a young adult in the Age of Aquarius. All in all, this is my perception of the Universe. Now there's nothing left to do but turn on, tune in, drop out, and enjoy the vibe!
  continue reading
 
Loading …
show series
 
In this episode of Security Weekly News, Dr. Doug White and Josh Marpet delve into the widespread impact of the recent CrowdStrike and Microsoft technical issue, which disrupted various industries, including airlines, DMVs, and hospitals. They discuss the interconnectedness of modern systems, the reliance on automatic updates, and the critical need…
  continue reading
 
In this episode of Security Weekly News, Dr. Doug White and Josh Marpet delve into the widespread impact of the recent CrowdStrike and Microsoft technical issue, which disrupted various industries, including airlines, DMVs, and hospitals. They discuss the interconnectedness of modern systems, the reliance on automatic updates, and the critical need…
  continue reading
 
In this week's enterprise security news, Google is rumored to be considering acquiring Wiz for $23 BILLION ThreatConnect acquires Polarity XBOW and Sola Security are interesting new companies we’ll discuss What does “shared responsibility” actually mean? Palo Alto probably isn’t going to buy your startup Snowflake-related breaches continue getting …
  continue reading
 
On this segment, we're going to zoom all the way out to discuss one of my favorite topics: what's fundamentally wrong with this industry? I believe we're at an inflection point: security teams have budget, staff, and more sway at the board level than ever. The cybersecurity market is doing great - growing at an astonishing rate with cyber startups …
  continue reading
 
In this episode of Enterprise Security Weekly, we revisit the insightful book "Jump-start Your SOC Analyst Career" with authors Jarrett Rodrick and Tyler Wall, exploring updates on career paths, opportunities, and the industry's reality. We delve into the myths versus the truths about cybersecurity careers, discussing the viability of high salaries…
  continue reading
 
Three years after we last discussed this book on episode #221, Jarrett Rodrick returns, joined by co-author Tyler Wall to discuss an update of the book. We talk opportunities and layoffs. Career paths and experience. Degrees, certifications, and home labs. We talk about who cybersecurity is the right field for, and the pros and cons of the industry…
  continue reading
 
Find new flaws in UEFI using STASE, combining vulnerabilities to exploit Sonicwall Devices, remote BMC exploits, Netgear patches, and not a lot of information, 22 minutes before exploited, if the secrets were lost, we'd all be in screwed, Exim has not been replaced by something better and its vulnerable, CISA's red team reports, and attackers use d…
  continue reading
 
Thinking about getting a 3D printer or have one and need a good primer? Check out this segment, we live 3D print a Captain Crunch whistle and talk all about 3D printing for hackers! Segment Resources: Slides used in this segment: https://files.scmagazine.com/wp-content/uploads/2024/07/3D-Printing-for-Hackers.pdf Major 3D Printer Websites: https://v…
  continue reading
 
Thinking about getting a 3D printer or have one and need a good primer? Check out this segment, we live 3D print a Captain Crunch whistle and talk all about 3D printing for hackers! Segment Resources: Slides used in this segment: https://files.scmagazine.com/wp-content/uploads/2024/07/3D-Printing-for-Hackers.pdf Major 3D Printer Websites: https://v…
  continue reading
 
How can LLMs be valuable to developers as an assistant in finding and fixing insecure code? There are a lot of implications in trusting AI or LLMs to not only find vulns, but in producing code that fixes an underlying problem without changing an app's intended behavior. Stuart McClure explains how combining LLMs with agents and RAGs helps make AI-i…
  continue reading
 
How can LLMs be valuable to developers as an assistant in finding and fixing insecure code? There are a lot of implications in trusting AI or LLMs to not only find vulns, but in producing code that fixes an underlying problem without changing an app's intended behavior. Stuart McClure explains how combining LLMs with agents and RAGs helps make AI-i…
  continue reading
 
Cyber insurance underwriting is all over the map. With such a variation in application requirements, how should small and medium businesses prepare to receive the best policy for the price? Brian Fritton joins Business Security Weekly to discuss a systematic approach to preparing for cyber insurance. By working with the underwriters, this approach …
  continue reading
 
Cyber insurance underwriting is all over the map. With such a variation in application requirements, how should small and medium businesses prepare to receive the best policy for the price? Brian Fritton joins Business Security Weekly to discuss a systematic approach to preparing for cyber insurance. By working with the underwriters, this approach …
  continue reading
 
I'm always thrilled to chat with ex-analysts, and Henrique Teixeira can cover a lot of ground with us on the topic of identity management and governance. The more I talk to folks about IAM/IGA, the more I'm shocked at how little has changed. If anything, it seems like we've gone backwards a bit, with the addition of cloud SaaS, mobile devices, and …
  continue reading
 
Bats in your headset, Windows Wifi driver vulnerabilities, Logitech's dongles, lighthttpd is heavy with vulnerabilities, node-ip's not vulnerability, New Intel CPU non-attacks, Blast Radius, Flipper Zero alternatives, will OpenSSH be exploited, emergency Juniper patches, and the D-Link botnet grows. Show Notes: https://securityweekly.com/psw-834…
  continue reading
 
In this week's enterprise security news, Seed rounds are getting huge Lots of funding for niche security vendors Rapid7 acquires Noetic Cyber but Rapid7 is also rumored to sell itself! Slack battles infostealers The loss of Chevron deference impacts cyber Should cybersecurity put up a no vacancy sign? Figma and Google both make some embarrassing mi…
  continue reading
 
I'm always thrilled to chat with ex-analysts, and Henrique Teixeira can cover a lot of ground with us on the topic of identity management and governance. The more I talk to folks about IAM/IGA, the more I'm shocked at how little has changed. If anything, it seems like we've gone backwards a bit, with the addition of cloud SaaS, mobile devices, and …
  continue reading
 
Iceman comes on the show to talk about RFID and NFC hacking including the tools, techniques, and hardware. We'll also talk about the ethics behind the disclosure of vulnerabilities and weaknesses in these systems that are used in everything from building access to cars. Segment Resources: Youtube channel - https://www.youtube.com/@iceman1001 Proxma…
  continue reading
 
Bats in your headset, Windows Wifi driver vulnerabilities, Logitech's dongles, lighthttpd is heavy with vulnerabilities, node-ip's not vulnerability, New Intel CPU non-attacks, Blast Radius, Flipper Zero alternatives, will OpenSSH be exploited, emergency Juniper patches, and the D-Link botnet grows. Iceman comes on the show to talk about RFID and N…
  continue reading
 
Have you ever imagined that the leadership skills needed to spin up a regional methamphetamine lab would transfer to leading a church ? While he couldn’t have known his destiny from the start, this is the path Pastor Michael Buck took as he set his inner compass to his true North. As a complement to the core Are We There Yet? season, Sonja and Jami…
  continue reading
 
Sandy Carielli and Janet Worthington, authors of the State Of Application Security 2024 report, join us to discuss their findings on trends this year! Old vulns, more bots, and more targeted supply chain attacks -- we should be better at this by now. We talk about where secure design fits into all this why appsec needs to accelerate to ludicrous sp…
  continue reading
 
Sandy Carielli and Janet Worthington, authors of the State Of Application Security 2024 report, join us to discuss their findings on trends this year! Old vulns, more bots, and more targeted supply chain attacks -- we should be better at this by now. We talk about where secure design fits into all this why appsec needs to accelerate to ludicrous sp…
  continue reading
 
Loading …

Quick Reference Guide