Just two fans who love Archie
…
continue reading
A husband and wife sit down every week to talk about books, video games, and food they experienced recently. Join Chris and Karradyne as they make fun of everything they love and themselves. You can contact us at:anovelconsole@gmail.com
…
continue reading
This feed includes all episodes of Paul's Security Weekly, Enterprise Security Weekly, Business Security Weekly, Application Security Weekly, and Security Weekly News! Your one-stop shop for all things Security Weekly!
…
continue reading
Geeks of the Valley connects with some of the brightest minds globally, who are leading their respective industries today. We discuss the hottest upcoming industry trends and how their work is affecting the global economy. Support this podcast: https://podcasters.spotify.com/pod/show/geeksofthevalley/support
…
continue reading
Analysis of anime, manga, and Japanese culture.
…
continue reading
A weekly podcast recounting all the thrilling adventures of television shows and the people who love them. Email us with questions or your opinions on shows Tvfeels@outlook.com
…
continue reading
On the third Thursday of every month, we bring you a new episode covering various sub-genres, directors, tropes, and concepts in movies.
…
continue reading
1
Film & TV, The Creative Process: Acting, Directing, Writing, Cinematography, Producers, Composers, Costume Design, Talk Art & Creativity
Acting, Directing, Writing, Cinematography Producing Conversations: Creative Process Original Series
Film & TV episodes of the popular The Creative Process podcast. We speak to actors, directors, writers, cinematographers & variety of behind the scenes creatives about their work and how they forged their creative careers. To listen to ALL arts & creativity episodes of “The Creative Process · Arts, Culture & Society”, you’ll find our main podcast on Apple: tinyurl.com/thecreativepod, Spotify: tinyurl.com/thecreativespotify, or wherever you get your podcasts! Exploring the fascinating minds o ...
…
continue reading
Weekly podcast exploring China's business and financial sectors from a legal perspective, brought to you by China Law & Practice. Hosted by Vincent Chow.
…
continue reading
Welcome to the NTP Podcast. This podcast aims to highlight the incredible work and tech talent in Australia. We chat with tech professionals on top of their game to learn all about their craft – why they’re passionate about their work, as well as what resources help power their success. By delving into their experiences, we gain insights into the constantly evolving tech scene, explore how it has changed, and where it may be headed.
…
continue reading
The place to hear great stories from New Zealand winemakers, vineyards owners and others in the industry. Hosted by Boris Lamont. Published by Podcasts NZ.
…
continue reading
In 2016, a new Arrowverse show premiered on the CW. Featuring characters from the Flash and Arrow, it existed in their shadows quietly. However, it has since gained popularity and brought the three of us together to discuss the characters and their progression from S1. Definitely don't call us heroes: we are the Legends of Next Week!
…
continue reading
Conversations with Purrr sees Pauline Nguyen interview the outliers of the world - the misfits, the creative thinkers, those that push the boundaries, those that are open to all possibilities, the rebels, the mavericks and the extraordinary. Pauline skillfully navigates the conversation to get to the very essence of the interviewee - what makes them tick, what makes them successful at this thing called life, what have they learned on the journey. These attributes combined, set the stage for ...
…
continue reading
1
Flexxon Server Defender, Unforeseen Innovation Outcomes, & Security through Data - Jeetu Patel, Amit Sinha, Camellia Chan - ESW #362
47:11
47:11
Play later
Play later
Lists
Like
Liked
47:11
The danger of post-breach disruption and downtime is extremely real. And while we should work to prevent these breaches in the first place, we must also be practical and pre-empt any potential incidents. Organisations armed with the most extensive software-based cybersecurity protection today continue to fall prey to hackers, have their operations …
…
continue reading
1
The Impacts Of Cryptocurrency - Nicholas Weaver - PSW #829
1:12:14
1:12:14
Play later
Play later
Lists
Like
Liked
1:12:14
Has cryptocurrency done more harm than good? Our guest for this segment has some interesting views on its impacts! Show Notes: https://securityweekly.com/psw-829
…
continue reading
1
Post-RSAC, Our Heads Are Spinning, and Big News Keeps on Coming! - ESW #362
57:29
57:29
Play later
Play later
Lists
Like
Liked
57:29
Suddenly SIEMs are all over the news! In a keynote presentation, Crowdstrike CEO George Kurtz talked about the company's "next-gen" SIEM. Meanwhile, Palo Alto, who was taken to task by some for not having an active presence on the RSAC expo floor, hits the headlines for acquiring IBM's SIEM product, just to shut it down! Meanwhile, LogRhythm and Ex…
…
continue reading
Josh and Brandon interview Megan Hutchison—illustrator of Archie Comics: Judgment Day. Follow Archie and Me on Twitter, Instagram, and Facebook. If you enjoy this podcast, please consider leaving a review.By Josh Wright, Brandon Clarkson
…
continue reading
1
The Enterprise Browser & AI in Securing Software and Supply Chains - Mike Fey, Josh Lemos - ASW #285
29:24
29:24
Play later
Play later
Lists
Like
Liked
29:24
How companies are benefiting from the enterprise browser. It's not just security when talking about the enterprise browser. It's the marriage between security AND productivity. In this interview, Mike will provide real live case studies on how different enterprises are benefitting. Segment Resources: https://www.island.io/resources https://www.isla…
…
continue reading
1
3000 Years Ago, Dell, Robocalls, PyPI, Cinterion, Cacti, Chat-GPT, Josh Marpet... - SWN #386
37:01
37:01
Play later
Play later
Lists
Like
Liked
37:01
3000 Years Ago, Dell, Robocalls, PyPI, Cinterion, Cacti, Chat-GPT, Windows, Josh Marpet, and more, on this Edition of the Security Weekly News. Show Notes: https://securityweekly.com/swn-386
…
continue reading
1
Inside the OWASP Top 10 for LLM Applications - Sandy Dunn - ASW #285
37:33
37:33
Play later
Play later
Lists
Like
Liked
37:33
Everyone is interested in generative AIs and LLMs, and everyone is looking for use cases and apps to apply them to. Just as the early days of the web inspired the original OWASP Top 10 over 20 years ago, the experimentation and adoption of LLMs has inspired a Top 10 list of their own. Sandy Dunn talks about why the list looks so familiar in many wa…
…
continue reading
1
Leveraging AI & The Role Identity Plays - BSW #350
34:28
34:28
Play later
Play later
Lists
Like
Liked
34:28
AI is more than just a buzzword. Done right, AI can improve decision making and scale your identity security platform to manage every identity, human and machine, physical and digital. Learn about how Saviynt’s #1 Identity Security platform is leveraging a variety of AI capabilities to enhance the user experience and improve identity security and c…
…
continue reading
1
Episode 168: RNP: Here We Go Again & Final Fantasy VII: Rebirth
54:08
54:08
Play later
Play later
Lists
Like
Liked
54:08
This week on A Novel Console, Chris and Karradyne are back to announce the Backlog of Doom Pt. 11 winners! Afterwards they provide an update of what has been going on with the show, along with the direction they will be taking with it. Then, they try hot sauces sent in by 4th unofficial co-host, Burgerchamp. They end the show talking about funny ga…
…
continue reading
1
Identity Resilience: The Next Frontier in Security - Ray Zadjmool - BSW #350
27:03
27:03
Play later
Play later
Lists
Like
Liked
27:03
In today's enterprises, the Identity Access Management (IAM) System is the key to a business' critical operations. But that IAM environment is more vulnerable than most security executives realize. Segment Resources: https://www.mightyid.com/articles/the-r-in-itdr-the-missing-piece-in-identity-threat-detection-and-response https://www.mightyid.com/…
…
continue reading
1
Easy Passwords, BIG-IP, Ascension, Lockbit, Google, Poland, ZScaler, Aaran Leyland... - SWN #385
37:05
37:05
Play later
Play later
Lists
Like
Liked
37:05
Easy Passwords, BIG-IP, Ascension, Lockbit, Google, Poland, ZScaler, Aaran Leyland, and More, on this edition of the Security Weekly News. Show Notes: https://securityweekly.com/swn-385
…
continue reading
1
#95: Spotting Patterns & Managing Remote Multi-Market Companies with 88 Ventures' Nitin Mahajan
35:01
35:01
Play later
Play later
Lists
Like
Liked
35:01
Nitin Mahajan, a visionary in the tech industry, is actively transforming the tech universe one company at a time while currently building 88 Ventures to achieve unprecedented success. Recognizing the transformative power of AI, Nitin is passionate about ensuring its widespread adoption in a way that positively impacts lives and maximizes its reach…
…
continue reading
1
Phishing Attacks Increase, Network Transformation, & Unified SASE as a Service - Deepen Desai, Renuka Nadkarni, Tim Roddy - ESW #361
48:30
48:30
Play later
Play later
Lists
Like
Liked
48:30
The landscape of phishing attacks continues to rapidly evolve. In 2023, Zscaler ThreatLabz observed a year-over-year increase of 58.2% in global phishing attempts. This surge was characterized by emerging schemes, including voice phishing, recruitment scams, and browser-in-the-browser attacks. This segment is sponsored by Zscaler. Visit https://sec…
…
continue reading
1
Automated Pentesting, AI in SecOps, & AI-Powered Analytics - Jason Keirstead, Jay Mar-Tang, Anthony Aurigemma - ESW #361
45:12
45:12
Play later
Play later
Lists
Like
Liked
45:12
Despite building up impressive security stacks in the Cloud, organizations are still struggling to keep their environments safe. Pentera recently introduced Pentera Cloud as the first tool to provide automated pentesting capabilities for cloud environments. This conversation will focus on the challenge of security validation and pentesting in the c…
…
continue reading
1
Next Gen Threats, CTEM Essentials, & Proactive MDR - Randy Watkins, Paul Reid, Zaira Pirzada - ESW #361
40:48
40:48
Play later
Play later
Lists
Like
Liked
40:48
Emerging threats are targeting organizations from seemingly every angle. This means security teams must expand their focus to secure as many domains as possible. OpenText is building on its holistic approach to cybersecurity with new innovations that make it easier for organizations to secure themselves against next generation threats. This segment…
…
continue reading
1
Hacker Heroes - Jeremiah Grossman - PSW #828
1:00:23
1:00:23
Play later
Play later
Lists
Like
Liked
1:00:23
Illuminating the Cybersecurity Path: A Conversation with Jeremiah Grossman Join us for a compelling episode featuring Jeremiah Grossman, a prominent figure in the cybersecurity landscape. As a recognized expert, Jeremiah has played a pivotal role in shaping the discourse around web security and risk management. Jeremiah's journey in cybersecurity i…
…
continue reading
1
Review: Betty & Veronica Friends Forever Fairy Tales
32:54
32:54
Play later
Play later
Lists
Like
Liked
32:54
Josh and Brandon meet at Pop’s to review Betty & Veronica Friends Forever Fairy Tales. Show notes: Beware spoilers in this episode! Follow Archie and Me on Twitter, Instagram, and Facebook. If you enjoy this podcast, please consider leaving a review.By Josh Wright, Brandon Clarkson
…
continue reading
1
Corporate Ransomware Deep Dive - Mikko Hypponen - PSW #828
56:06
56:06
Play later
Play later
Lists
Like
Liked
56:06
In this RSAC 2024 South Stage Keynote, Mikko Hyppönen will look back at the past decade of ransomware evolution and explore how newer innovations, like AI, are shaping its future. Show Notes: https://securityweekly.com/psw-828
…
continue reading
1
Tetris, APT42, Kimsuky, Android, ChatRTX, MITRE, Computer Dating, Josh Marpet, More - SWN #384
37:50
37:50
Play later
Play later
Lists
Like
Liked
37:50
Tetris, APT42, Kimsuky, Android, ChatRTX, MITRE, Computer Dating, Josh Marpet, and more, on this Edition of the Security Weekly News. Show Notes: https://securityweekly.com/swn-384
…
continue reading
1
Hacking AI Bias with Human Techniques - Keith Hoodlet - ASW #284
31:47
31:47
Play later
Play later
Lists
Like
Liked
31:47
We already have bug bounties for web apps so it was only a matter of time before we would have bounties for AI-related bugs. Keith Hoodlet shares his experience winning first place in the DOD's inaugural AI bias bounty program. He explains how his education in psychology helped fill in the lack of resources in testing an AI's bias. Then we discuss …
…
continue reading
1
Interview: Amy Chase, Jordan Morris, & Ryan Cady
32:54
32:54
Play later
Play later
Lists
Like
Liked
32:54
Josh and Brandon interview Amy Chase, Jordan Morris, and Ryan Cody—writers of Pop's Chock'lit Shoppe of Horrors Fresh Meat. Follow Archie and Me on Twitter, Instagram, and Facebook. If you enjoy this podcast, please consider leaving a review.By Josh Wright, Brandon Clarkson
…
continue reading
1
AI & Hype & Security (Oh My!) - Caleb Sima - ASW #284
33:18
33:18
Play later
Play later
Lists
Like
Liked
33:18
A lot of AI security has nothing to do with AI -- things like data privacy, access controls, and identity are concerns for any new software and in many cases AI concerns look more like old-school API concerns. But...there are still important aspects to AI safety and security, from prompt injection to jailbreaking to authenticity. Caleb Sima explain…
…
continue reading
1
Say Easy, Do Hard - Train How You Fight, Part 2 - BSW #349
32:23
32:23
Play later
Play later
Lists
Like
Liked
32:23
Inspired by my co-host Jason Albuquerque, we dig into the hard part of our Say Easy, Do Hard segment. In part 2, we discuss how to train for a cyber instance. We'll cover the elements of a training program that will prepare you for responding to a cyber incident, including: Developing the training program Practice, practice, practice Imposing corre…
…
continue reading
1
Say Easy, Do Hard - Train How You Fight, Part 1 - BSW #349
28:16
28:16
Play later
Play later
Lists
Like
Liked
28:16
Inspired by my co-host Jason Albuquerque, this quarter's Say Easy, Do Hard segment is Train How You Fight. In part 1, we discuss the importance of training for a cyber incident. However, lots of organizations do not take it seriously, causing mistakes during an actual cyber incident. How will the lack of preparation impact your organization during …
…
continue reading
1
Weird Al, Docker, OT, Gitlab, Credit Monitoring, Dropbox, Cisco, AI, Aaran Leyland... - SWN #383
35:18
35:18
Play later
Play later
Lists
Like
Liked
35:18
Weird Al, Docker, OT, Gitlab, Credit Monitoring, Dropbox, Cisco, AI, Aaran Leyland, and More, on this edition of the Security Weekly News. Show Notes: https://securityweekly.com/swn-383
…
continue reading
1
RSA Conference, Verizon DBIR, funding, reports, partnerships and more - ESW #360
1:07:00
1:07:00
Play later
Play later
Lists
Like
Liked
1:07:00
It's the week before RSA and the news is PACKED. Everyone is trying to get their RSA announcements out all at once. We've got announcements about funding, acquisitions, partnerships, new companies, new products, new features... To make things MORE challenging, everyone is also putting out their big annual reports, like Verizon's DBIR and Mandiant's…
…
continue reading
1
Preparation: The Less Shiny Side of Incident Response - Joe Gross - ESW #360
50:34
50:34
Play later
Play later
Lists
Like
Liked
50:34
It's the most boring part of incident response. Skip it at your peril, however. In this interview, we'll talk to Joe Gross about why preparing for incident response is so important. There's SO MUCH to do, we'll spend some time breaking down the different tasks you need to complete long before an incident occurs. Resources 5 Best Practices for Build…
…
continue reading
ChatGPT writes exploits, banning default and weak passwords, forget vulnerabilities just get rid of malware, IR blasting for fun and not profit, creating fake people, shattered dreams and passkey, and removing chips. Show Notes: https://securityweekly.com/psw-827
…
continue reading