Josh Chan public
[search 0]
More
Download the App!
show episodes
 
Artwork

1
A Novel Console

Chris Dominguez and Karradyne Dominguez

Unsubscribe
Unsubscribe
Monthly+
 
A husband and wife sit down every week to talk about books, video games, and food they experienced recently. Join Chris and Karradyne as they make fun of everything they love and themselves. You can contact us at:anovelconsole@gmail.com
  continue reading
 
Geeks of the Valley connects with some of the brightest minds globally, who are leading their respective industries today. We discuss the hottest upcoming industry trends and how their work is affecting the global economy. Support this podcast: https://podcasters.spotify.com/pod/show/geeksofthevalley/support
  continue reading
 
Artwork

1
Film & TV, The Creative Process: Acting, Directing, Writing, Cinematography, Producers, Composers, Costume Design, Talk Art & Creativity

Acting, Directing, Writing, Cinematography Producing Conversations: Creative Process Original Series

Unsubscribe
Unsubscribe
Weekly
 
Film & TV episodes of the popular The Creative Process podcast. We speak to actors, directors, writers, cinematographers & variety of behind the scenes creatives about their work and how they forged their creative careers. To listen to ALL arts & creativity episodes of “The Creative Process · Arts, Culture & Society”, you’ll find our main podcast on Apple: tinyurl.com/thecreativepod, Spotify: tinyurl.com/thecreativespotify, or wherever you get your podcasts! Exploring the fascinating minds o ...
  continue reading
 
Artwork

1
NTP Podcast

James MacDonald

Unsubscribe
Unsubscribe
Monthly
 
Welcome to the NTP Podcast. This podcast aims to highlight the incredible work and tech talent in Australia. We chat with tech professionals on top of their game to learn all about their craft – why they’re passionate about their work, as well as what resources help power their success. By delving into their experiences, we gain insights into the constantly evolving tech scene, explore how it has changed, and where it may be headed.
  continue reading
 
Artwork
 
In 2016, a new Arrowverse show premiered on the CW. Featuring characters from the Flash and Arrow, it existed in their shadows quietly. However, it has since gained popularity and brought the three of us together to discuss the characters and their progression from S1. Definitely don't call us heroes: we are the Legends of Next Week!
  continue reading
 
Conversations with Purrr sees Pauline Nguyen interview the outliers of the world - the misfits, the creative thinkers, those that push the boundaries, those that are open to all possibilities, the rebels, the mavericks and the extraordinary. Pauline skillfully navigates the conversation to get to the very essence of the interviewee - what makes them tick, what makes them successful at this thing called life, what have they learned on the journey. These attributes combined, set the stage for ...
  continue reading
 
Loading …
show series
 
The danger of post-breach disruption and downtime is extremely real. And while we should work to prevent these breaches in the first place, we must also be practical and pre-empt any potential incidents. Organisations armed with the most extensive software-based cybersecurity protection today continue to fall prey to hackers, have their operations …
  continue reading
 
Suddenly SIEMs are all over the news! In a keynote presentation, Crowdstrike CEO George Kurtz talked about the company's "next-gen" SIEM. Meanwhile, Palo Alto, who was taken to task by some for not having an active presence on the RSAC expo floor, hits the headlines for acquiring IBM's SIEM product, just to shut it down! Meanwhile, LogRhythm and Ex…
  continue reading
 
How companies are benefiting from the enterprise browser. It's not just security when talking about the enterprise browser. It's the marriage between security AND productivity. In this interview, Mike will provide real live case studies on how different enterprises are benefitting. Segment Resources: https://www.island.io/resources https://www.isla…
  continue reading
 
Everyone is interested in generative AIs and LLMs, and everyone is looking for use cases and apps to apply them to. Just as the early days of the web inspired the original OWASP Top 10 over 20 years ago, the experimentation and adoption of LLMs has inspired a Top 10 list of their own. Sandy Dunn talks about why the list looks so familiar in many wa…
  continue reading
 
AI is more than just a buzzword. Done right, AI can improve decision making and scale your identity security platform to manage every identity, human and machine, physical and digital. Learn about how Saviynt’s #1 Identity Security platform is leveraging a variety of AI capabilities to enhance the user experience and improve identity security and c…
  continue reading
 
This week on A Novel Console, Chris and Karradyne are back to announce the Backlog of Doom Pt. 11 winners! Afterwards they provide an update of what has been going on with the show, along with the direction they will be taking with it. Then, they try hot sauces sent in by 4th unofficial co-host, Burgerchamp. They end the show talking about funny ga…
  continue reading
 
In today's enterprises, the Identity Access Management (IAM) System is the key to a business' critical operations. But that IAM environment is more vulnerable than most security executives realize. Segment Resources: https://www.mightyid.com/articles/the-r-in-itdr-the-missing-piece-in-identity-threat-detection-and-response https://www.mightyid.com/…
  continue reading
 
Nitin Mahajan, a visionary in the tech industry, is actively transforming the tech universe one company at a time while currently building 88 Ventures to achieve unprecedented success. Recognizing the transformative power of AI, Nitin is passionate about ensuring its widespread adoption in a way that positively impacts lives and maximizes its reach…
  continue reading
 
The landscape of phishing attacks continues to rapidly evolve. In 2023, Zscaler ThreatLabz observed a year-over-year increase of 58.2% in global phishing attempts. This surge was characterized by emerging schemes, including voice phishing, recruitment scams, and browser-in-the-browser attacks. This segment is sponsored by Zscaler. Visit https://sec…
  continue reading
 
Despite building up impressive security stacks in the Cloud, organizations are still struggling to keep their environments safe. Pentera recently introduced Pentera Cloud as the first tool to provide automated pentesting capabilities for cloud environments. This conversation will focus on the challenge of security validation and pentesting in the c…
  continue reading
 
Emerging threats are targeting organizations from seemingly every angle. This means security teams must expand their focus to secure as many domains as possible. OpenText is building on its holistic approach to cybersecurity with new innovations that make it easier for organizations to secure themselves against next generation threats. This segment…
  continue reading
 
Illuminating the Cybersecurity Path: A Conversation with Jeremiah Grossman Join us for a compelling episode featuring Jeremiah Grossman, a prominent figure in the cybersecurity landscape. As a recognized expert, Jeremiah has played a pivotal role in shaping the discourse around web security and risk management. Jeremiah's journey in cybersecurity i…
  continue reading
 
We already have bug bounties for web apps so it was only a matter of time before we would have bounties for AI-related bugs. Keith Hoodlet shares his experience winning first place in the DOD's inaugural AI bias bounty program. He explains how his education in psychology helped fill in the lack of resources in testing an AI's bias. Then we discuss …
  continue reading
 
A lot of AI security has nothing to do with AI -- things like data privacy, access controls, and identity are concerns for any new software and in many cases AI concerns look more like old-school API concerns. But...there are still important aspects to AI safety and security, from prompt injection to jailbreaking to authenticity. Caleb Sima explain…
  continue reading
 
Inspired by my co-host Jason Albuquerque, we dig into the hard part of our Say Easy, Do Hard segment. In part 2, we discuss how to train for a cyber instance. We'll cover the elements of a training program that will prepare you for responding to a cyber incident, including: Developing the training program Practice, practice, practice Imposing corre…
  continue reading
 
Inspired by my co-host Jason Albuquerque, this quarter's Say Easy, Do Hard segment is Train How You Fight. In part 1, we discuss the importance of training for a cyber incident. However, lots of organizations do not take it seriously, causing mistakes during an actual cyber incident. How will the lack of preparation impact your organization during …
  continue reading
 
It's the week before RSA and the news is PACKED. Everyone is trying to get their RSA announcements out all at once. We've got announcements about funding, acquisitions, partnerships, new companies, new products, new features... To make things MORE challenging, everyone is also putting out their big annual reports, like Verizon's DBIR and Mandiant's…
  continue reading
 
It's the most boring part of incident response. Skip it at your peril, however. In this interview, we'll talk to Joe Gross about why preparing for incident response is so important. There's SO MUCH to do, we'll spend some time breaking down the different tasks you need to complete long before an incident occurs. Resources 5 Best Practices for Build…
  continue reading
 
Loading …

Quick Reference Guide