show episodes
 
HomoLicious: An Odd Pod ™ is a queer comedy podcast exploring trends, gripes, oddities, while celebrating the gay lifestyle. The show is a laughter filled improvised free-for-all, serving comedic weekly wanderings of uncensored conversation, commentary, and banter, occasionally featuring fabulous and obscure guests in a whimsical variety show. It’s just as queer as it needs to be. It’s an impulsive, no-holds-barred audio journey. HomoLicious: An Odd Pod™ is delectable drollery with comedy fi ...
  continue reading
 
The Application Security Weekly podcast delivers interviews and news from the worlds of AppSec, DevOps, DevSecOps, and all the other ways people find and fix software flaws. Join hosts Mike Shema and John Kinsella on a journey through modern cybersecurity practices for applications, clouds, containers, and more.
  continue reading
 
The Application Security Weekly podcast delivers interviews and news from the worlds of AppSec, DevOps, DevSecOps, and all the other ways people find and fix software flaws. Join hosts Mike Shema and John Kinsella on a journey through modern cybersecurity practices for applications, clouds, containers, and more.
  continue reading
 
Artwork

1
CBF Conversations

Cooperative Baptist Fellowship

Unsubscribe
Unsubscribe
Weekly
 
The Cooperative Baptist Fellowship is a Christian network comprised of individuals and churches that work together to spread the hope of Christ. Our diverse community includes partners all over the globe, and our fellowship supports a wide range of missions and ministries that give people meaningful opportunities to put their faith to action. With a deep respect for freedom, diversity and equality, we encourage autonomy while inviting collaboration. CBF’s podcasts launched in early 2016 to s ...
  continue reading
 
On this podcast we visit with folks obsessed with a wide array of interesting endeavors. We hear some awesome stories, and explore the mindsets and psychology of those who are obsessed. Hosted by Logan Hyrkas.
  continue reading
 
Artwork

1
FOHSE: Welcome To The Future

FOHSE: Welcome To The Future Podcast

Unsubscribe
Unsubscribe
Monthly
 
In this season of Welcome to the Future, we delve into the fascinating world of cannabis, exploring the intersection of education and data-driven techniques that are revolutionizing the industry! Our journey begins with a grow recap from Mr. Soul covering how the A3i has improved seed production at Brother’s Grimm. We also dive into the minutiae of plant nutrition and cannabis cultivation with Scott Wall of New Age Laboratories and Youbin Zheng, an environmental horticulture professor at the ...
  continue reading
 
How do you transform a city? That's a question I've been working on for 6 years, and I think I'm finally on to the answer. I'm from Kittanning PA, a rust belt town left behind by the manufacturing industry. I want to be a part of the comeback. This channel is my documentation of that process for me and for our city. I pray you enjoy the ride with me! Be sure to subscribe on Youtube as well as Instagram and Facebook. Thanks for listening! Support this podcast: https://podcasters.spotify.com/p ...
  continue reading
 
Artwork
 
Regular Radio is a bore, so two ”Musicians” decided to make their own radio show that showcases the talented artists who are lurking in the shadows of your local bars & clubs. Getting in Treble is a show hosted by Matticus the Bliss (Lead Singer of Those Damn Kids) and Ian Cayro (Manager of Those Damn Kids) that takes a deep dive into the Independent Music Scene and give a pedestal to up and coming Artists.
  continue reading
 
Welcome to the Security Weekly Podcast Network, your all-in-one source for the latest in cybersecurity! This feed features a diverse lineup of shows, including Application Security Weekly, Business Security Weekly, Paul's Security Weekly, Enterprise Security Weekly, and Security Weekly News. Whether you're a cybersecurity professional, business leader, or tech enthusiast, we cover all angles of the cybersecurity landscape. Tune in for in-depth panel discussions, expert guest interviews, and ...
  continue reading
 
Cori and Bryan started this podcast as an activity that they and their children could do together, but alas the children grew up so now their pal Patrick is along for the ride. Come join them, as well as some special guests along the way, for some perfectly cromulent discussion about everything Simpsons. Join them as they discuss a variety of topics, and episode breakdowns where they compare their thoughts of the show growing up and seeing if their outlook has changed, as adults and parents.
  continue reading
 
Are there any parallels between real life conspiracies and events in the Star Wars universe? What about conspiracies in the Star Wars universe itself? This podcast discusses both. Open your mind and let the force flow! Support this podcast: https://podcasters.spotify.com/pod/show/conspiracyintheforce/support
  continue reading
 
Loading …
show series
 
This week, in the enterprise security news, Cribl, Zafran, and US states raise funding Cisco, Check Point, Salesforce, and Absolute Software acquire cybersecurity startups AI Security products are picking up steam You probably shouldn’t be too worried about Yubikey cloning Instead, you should be more worried about malicious npm packages! The White …
  continue reading
 
Lee comes on the show to discuss: EU CRA - https://en.wikipedia.org/wiki/CyberResilienceAct - its impact on bringing products to market and the challenges of enforcing such laws that require products to be "Secure" Recent legislation on disputes for federal agency fines - Chevron deference rule - supreme court decision, uncertainty, more or less cl…
  continue reading
 
Cybersecurity resilience, different from cyber resilience, is critical as threats grow in frequency and complexity. With digital innovation driving business, cybersecurity resilience is essential for maintaining stakeholder trust and compliance. But where do you start? Theresa Lanowitz, Chief Evangelist at LevelBlue, joins Business Security Weekly …
  continue reading
 
Sponsors: The Clergy Confessions Podcast (www.clergyconfessions.com); Gardner-Webb University School of Divinity (www.gardner-webb.edu); Baptist Seminary of Kentucky (www.bsk.edu); Baylor's Garland School of Social Work; The Community Transformation Center at Palm Beach Atlantic University (www.pbactc.org); The Center for Congregational Health (htt…
  continue reading
 
Check out this episode from the ESW Vault, hand picked by main host Adrian Sanabria! This episode was initially published on April 21 2023. Quantum computers are scaling rapidly. Soon, they will be powerful enough to solve previously unsolvable problems. But they come with a global challenge: fully-realized quantum computers will be able to break s…
  continue reading
 
Exploring the Hacking Landscape with Mark Loveless, AKA SimpleNomad Dive into the intricate world of cybersecurity with our featured guest, Mark Loveless, widely known by his handle SimpleNomad. With a rich history in the realm of information security, Mark is a seasoned professional, researcher, and thought leader. Mark's journey spans decades, ma…
  continue reading
 
Check out this episode from the BSW Vault, hand picked by main host Matt Alderman! This episode was initially published on November 29, 2022. Todd Fitzgerald, author of CISO Compass and host of CISO Stories, joins BSW to share his top leadership lessons from the first 100 episodes of CISO Stories. Todd interviews CISOs and gains insights into their…
  continue reading
 
Check out this interview from the ASW Vault, hand picked by main host Mike Shema! This segment was originally published on May 9, 2023. What does software resilience mean? Why is status quo application security unfit for the modern era of software? How can we move from security theater to security chaos engineering? This segment answers these quest…
  continue reading
 
Check out this interview from the ASW Vault, hand picked by main host Mike Shema! This segment was originally published on May 9, 2023. What does software resilience mean? Why is status quo application security unfit for the modern era of software? How can we move from security theater to security chaos engineering? This segment answers these quest…
  continue reading
 
Check out this interview from the ASW Vault, hand picked by main host Mike Shema! This segment was originally published on May 9, 2023. What does software resilience mean? Why is status quo application security unfit for the modern era of software? How can we move from security theater to security chaos engineering? This segment answers these quest…
  continue reading
 
Sponsors: The Clergy Confessions Podcast (www.clergyconfessions.com); Gardner-Webb University School of Divinity (www.gardner-webb.edu); Baptist Seminary of Kentucky (www.bsk.edu); Baylor's Garland School of Social Work; The Community Transformation Center at Palm Beach Atlantic University (www.pbactc.org); The Center for Congregational Health (htt…
  continue reading
 
Larry and Helen walk us through the AI supply chain landscape. Learn what goes into building and using AI models and the dangers that could lurk within. Segment Resources: Community efforts on AIBOM topic: https://github.com/aibom-squad This week: I want all the firmware, its not just TP-Link, CVEs for malware, BLE and your health, faking your own …
  continue reading
 
The top priority on the CIS Critical Security Controls list has never changed: inventory and control of enterprise assets. Yet it remains one of the most challenging controls to implement, much less master. The refrain, "you can't secure what you don't know about" is as old as information security itself. Complicating this task is the fact that imp…
  continue reading
 
Research by Orange Tsai into Apache HTTPD's architecture reveals several vulns, NCC Group shows techniques for hacking IoT devices with Sonos speakers, finding use cases for WebAssembly, Slack's AI leaks data, DARPA wants a future of Rust, and more! Show Notes: https://securityweekly.com/asw-297
  continue reading
 
IoT devices are notorious for weak designs, insecure implementations, and a lifecycle that mostly ignores patching. We look at external factors that might lead to change, like the FCC's cybersecurity labeling for IoT. We explore the constraints that often influence poor security on these devices, whether those constraints are as consequential given…
  continue reading
 
IoT devices are notorious for weak designs, insecure implementations, and a lifecycle that mostly ignores patching. We look at external factors that might lead to change, like the FCC's cybersecurity labeling for IoT. We explore the constraints that often influence poor security on these devices, whether those constraints are as consequential given…
  continue reading
 
IoT devices are notorious for weak designs, insecure implementations, and a lifecycle that mostly ignores patching. We look at external factors that might lead to change, like the FCC's cybersecurity labeling for IoT. We explore the constraints that often influence poor security on these devices, whether those constraints are as consequential given…
  continue reading
 
How are personal liability and indemnification impacting the CISO role? Darren Shou, Chief Strategy Officer from RSA Conference, describes the current landscape of CISO liability and the challenges facing CISOs today. He discusses the implications of the SEC's recent actions, including the charges against SolarWinds' CISO, and the growing trend of …
  continue reading
 
Sponsors: The Clergy Confessions Podcast (www.clergyconfessions.com); Gardner-Webb University School of Divinity (www.gardner-webb.edu); Baptist Seminary of Kentucky (www.bsk.edu); Baylor's Garland School of Social Work; The Community Transformation Center at Palm Beach Atlantic University (www.pbactc.org); The Center for Congregational Health (htt…
  continue reading
 
This week, in the enterprise security news, A funding that looks like an acquisition And two for-sure acquisitions Rumors that there are funding problems for early stage cyber startups, and we’ll see a lot more acquisitions before the end of the year Speaking of rumors, Crowdstrike did NOT like last week’s Action1 acquisition rumor! Shortening dete…
  continue reading
 
Every week here on the show we talk about vulnerabilities and exploits. Typically we recommend that organizations remediate these vulnerabilities in some way. But how? And more importantly, which ones? Some tools we have to help us are actually not all that helpful at time, such as: Mitre Att&ck - Don't get me wrong, this is a great project and Ada…
  continue reading
 
As development cycles shorten and more responsibilities shift to developers, application security (AppSec) is rapidly evolving. Organizations are increasingly building mature programs that automate and enhance AppSec, moving beyond manual processes. In this discussion, we explore how organizations are adapting their AppSec practices, highlighting t…
  continue reading
 
This week, Jeff Pollard and Allie Mellen join us to discuss the fallout and lessons learned from the CrowdStrike fiasco. They explore the reasons behind running in the kernel, the challenges of software quality, and the distinction between a security incident and an IT incident. They also touch on the need to reduce the attack surface and the impor…
  continue reading
 
This week, Jeff Pollard and Allie Mellen join us to discuss the fallout and lessons learned from the CrowdStrike fiasco. They explore the reasons behind running in the kernel, the challenges of software quality, and the distinction between a security incident and an IT incident. They also touch on the need to reduce the attack surface and the impor…
  continue reading
 
This week, Jeff Pollard and Allie Mellen join us to discuss the fallout and lessons learned from the CrowdStrike fiasco. They explore the reasons behind running in the kernel, the challenges of software quality, and the distinction between a security incident and an IT incident. They also touch on the need to reduce the attack surface and the impor…
  continue reading
 
What are the barriers to cyber resilience today? Why is it so difficult? And what is coming next, that will generate resilience challenges further down the line? After five years of focusing on the short- and medium-term future of cybersecurity and edge, this year, LevelBlue wanted to understand what is preventing cyber resilience—and what business…
  continue reading
 
Loading …

Quick Reference Guide