show episodes
 
Taking a break. Get ready summer 2021! Want to know how other people see the world? This is the podcast for you. I will be speaking to people from all over the world with different background, upbringings and beliefs to let them tell their stories and to gain a better understanding of the world and the people in it.
  continue reading
 
Welcome aboard the first ever podcast written by billionaires for billionaires. We aren't the one percent, we aren't even the one-tenth of one percent. We are much less percenty than that. Anyway, Daniel, Sam and I got together this week to analyze a bad decision, eat some food, and give unsolicited advice (the best kind) all in the space of thirty minutes. So sit back and enjoy the show.
  continue reading
 
Artwork

1
There Are Too Many Movies

Chris Collins, Josh Rodriguez, and Alex Wilshin

Unsubscribe
Unsubscribe
Weekly
 
The unofficial podcast of Hollywood. Movie reviews, recommendations, trivia, games, and chaos, hosted by Chris Collins, Josh Rodriguez, and Alex Wilshin. Support this podcast: https://podcasters.spotify.com/pod/show/theraretoomanymovies/support
  continue reading
 
The Application Security Weekly podcast delivers interviews and news from the worlds of AppSec, DevOps, DevSecOps, and all the other ways people find and fix software flaws. Join hosts Mike Shema, John Kinsella, and Akira Brand on a journey through modern security practices for apps, clouds, containers, and more.
  continue reading
 
Carving your path within the Entertainment Industry takes a lot of guts, passion, and unbeatable optimism. Whether you’re an actor, writer, director, make-up artist, or a production assistant; this business will find a way to push you back. But, every obstacle lays the ground work for an incredible story. A story that Actor and Writer, Tyler Laracca, always sought out to hear while working alongside the incredible artists of Film, Television, and Theater. Each week, he’s joined by industry v ...
  continue reading
 
The Application Security Weekly podcast delivers interviews and news from the worlds of AppSec, DevOps, DevSecOps, and all the other ways people find and fix software flaws. Join hosts Mike Shema, John Kinsella, and Akira Brand on a journey through modern security practices for apps, clouds, containers, and more.
  continue reading
 
Welcome to the Youth Ministry Sherpas Coast to Coast Podcast, featuring Brock Morgan, Shannon Dunn, and Steve Anderson. We call ourselves "Sherpas" because we have over 80 years combined experience leading ministries. It's "Coast to Coast" because we serve on opposite ends of the country (Steve in Maryland; Shannon and Brock in California). We love students, we love youth ministry, and we love encouraging youth workers! Vulnerable, winsome, insightful -- think of it like another road trip in ...
  continue reading
 
Artwork
 
Join Shea Harris and Vince Salazar each week on THE Concho Sports Show as they have conversations with coaches, athletes, and more from around San Angelo and the Concho Valley. They'll also keep you up to date on all the latest sports happenings from the area. Would you like to support us? https://anchor.fm/conchosportsshow/support Connect with us! Concho Sports website | http://conchosports.com/concho-sports-show/ Twitter | https://twitter.com/conchosports YouTube | https://youtube.com/conc ...
  continue reading
 
Artwork

1
The Electables

Adrienne Elrod and Doug Thornell

Unsubscribe
Unsubscribe
Monthly+
 
The Electables is a podcast hosted by political strategist Doug Thornell that features a diverse line-up of guests who take you inside “the room where it happens” and discuss what it takes to run winning campaigns.
  continue reading
 
Artwork

1
The Transition 前進樂團 Music Podcast

The Transition 前進樂團 Music Podcast

Unsubscribe
Unsubscribe
Daily+
 
Transition are a band from Bristol UK, the first British band to be nominated for an original Mandarin music award. The journey of Transition is a story of adventure, something that band members Jesse and Josh Edbrooke discuss with guests in the context of their experiences of Taiwan too. For the first epsiode, they welcome the creative original former founding member of the band, Steve Dunne and discuss life shaping events of Transition’s first trip to Taiwan and his work in the UK comedy s ...
  continue reading
 
Loading …
show series
 
Traditional approaches to access management are no longer sufficient to safeguard enterprise security. Tim will explain why the most effective approach to modern enterprise security requires a Zero Trust model that extends beyond just access to encompass every action, no matter how minor. Tim will describe the importance of implementing a Zero Trus…
  continue reading
 
Check out this interview from the SWN Vault, hand picked by main host Doug White! This Secure Digital Life segment was originally published on June 19, 2018. This week, Doug and Russ interview Matthew Silva, President and Founder of the Cybersecurity and Intel Club at Roger Williams University! They talk about majoring in Cybersecurity vs. Computer…
  continue reading
 
FIDO security keys are not new in the authentication workflow. They have been around now for 10 years. What is new is the combination of the most secure multi-factor authentication method not only for logical but also for physical access control with the highest FIPS140-3 security certification in the market. Segment Resources: Video "Swissbit iShi…
  continue reading
 
Log4j, solar winds, tesla hacks, and the wave of high profile appsec problems aren’t going to go away with current approaches like SAST and SCA. Why? They are: -40 years old, with little innovation -Haven’t solved the problem. In this segment, we talk about fully autonomous application security. Vetted by DARPA in the Cyber Grand Challenge, the app…
  continue reading
 
"Just make sure you always have something you're passionate about." Brianna Brown knew she wanted to act at 14 years old, taking it upon herself to scour the yellow pages in search of an opportunity. Years later, she would leave her home state of Minnesota for Los Angeles in pursuit of a career on screen. Her career spans over 70 credits, a pivot i…
  continue reading
 
Exploring the Strategic Minds in Cybersecurity: A Conversation with Dave Aitel Welcome to an enlightening episode of our podcast, where we sit down with Dave Aitel, a prominent figure in the cybersecurity landscape. With a robust background in offensive security and an extensive career spanning various facets of the industry, Dave brings a wealth o…
  continue reading
 
Check out this interview from the SWN Vault, hand picked by main host Doug White! This Secure Digital Life segment was originally published on September 25, 2018. This week, Russ takes the reigns in the absence of Dr. Doug to talk about Networking 101! We are going to go back to school to examine how networking and the internet actually work. Russ …
  continue reading
 
Check out this interview from the ASW Vault, hand picked by main host Mike Shema! This segment was originally published on April 4, 2023. Following on from her successful title "Container Security", Liz has recently authored "Learning eBPF", published by O'Reilly. eBPF is a revolutionary kernel technology that is enabling a whole new generation of …
  continue reading
 
Check out this interview from the ASW Vault, hand picked by main host Mike Shema! This segment was originally published on April 4, 2023. Following on from her successful title "Container Security", Liz has recently authored "Learning eBPF", published by O'Reilly. eBPF is a revolutionary kernel technology that is enabling a whole new generation of …
  continue reading
 
Check out this interview from the ASW Vault, hand picked by main host Mike Shema! This segment was originally published on April 4, 2023. Following on from her successful title "Container Security", Liz has recently authored "Learning eBPF", published by O'Reilly. eBPF is a revolutionary kernel technology that is enabling a whole new generation of …
  continue reading
 
The bois discuss The Watchers, A Man In Full, Venom, Hit Man, and more! Join our Patreon for bonus episodes, supplements, Discord access, and more: https://www.patreon.com/therearetoomanymovies Merch: https://www.toomanymovies.com/shop Leave us a voicemail: 214-699-9076 Instagram: https://www.instagram.com/therearetoomanymovies/ TikTok: https://www…
  continue reading
 
It’s already June, and Brock, Shannon and Steve finally managed to get together to record our final episode of the spring season. The last few months have been tough for all of us, with plenty of personal and ministry things to deal with. That has left us all feeling pretty tired, burned out, and cynical. Let’s just say, we aren’t exactly “killing …
  continue reading
 
Check out this interview from the BSW Vault, hand picked by main host Matt Alderman! This segment was originally published on August 9, 2022. Zero Trust is the security buzzword of the moment, and while it is a very powerful approach, nearly every enterprise security product on the market – and some that aren’t even security products — are saying t…
  continue reading
 
This week, we've got data security being both funded AND acquired. We discuss Lacework's fall from unicorn status and why rumors that it went to Fortinet for considerably more than Wiz was willing to pay make sense. Microsoft Recall and Apple Intelligence are the perfect bookends for a conversation about the importance of handling consumer privacy …
  continue reading
 
We will discuss LLM security in general and some of the issues covered in the OWASP Top 10 for LLMs! Segment Resources: https://genai.owasp.org/ Skyrocketing IoT vulnerabilities, bricked computers?, MACBORG!, raw dogging source code, PHP strikes again and again, if you have a Netgear WNR614 replace it now, Arm Mali, new OpenSSH feature, weird headp…
  continue reading
 
Looking at use cases and abuse cases of Microsoft's Recall feature, examples of hacking web APIs, CISA's secure design pledge, what we look for in CVEs, a nod to PHP's history, and more! Visit https://www.securityweekly.com/asw for all the latest episodes! Show Notes: https://securityweekly.com/asw-288…
  continue reading
 
Looking at use cases and abuse cases of Microsoft's Recall feature, examples of hacking web APIs, CISA's secure design pledge, what we look for in CVEs, a nod to PHP's history, and more! Visit https://www.securityweekly.com/asw for all the latest episodes! Show Notes: https://securityweekly.com/asw-288…
  continue reading
 
The bois discuss Bad Boys II, Pumping Iron, Paprika, Molly's Game, and more! Join our Patreon for bonus episodes, supplements, Discord access, and more: https://www.patreon.com/therearetoomanymovies Merch: https://www.toomanymovies.com/shop Leave us a voicemail: 214-699-9076 Instagram: https://www.instagram.com/therearetoomanymovies/ TikTok: https:…
  continue reading
 
Did you miss Gartner Security & Risk Management last week in National Harbor, MD? Don't worry, Padraic O'Reilly, Founder and Chief Innovation Officer at CyberSaint, joins us to discuss the hot topics that were presented at the conference last week, including: Artificial Intelligence(AI) Continuous Threat Exposure Management(CTEM) Identity & Access …
  continue reading
 
"Identity security has been around forever though", you might be thinking. Allow me to clarify. Identity is the largest cybersecurity product category, but most of it is focused on identity governance, authentication, multi-factor, etc. Very little of it is focused on operational identity security. It's this trend, where we recently (within the las…
  continue reading
 
Josh comes on the show to discuss all things related to vulnerability tracking and scoring, including the current issues with various systems and organizations including NIST, CVE, Mitre, CVSS, NVD, and more! Segment Resources: NVD blog post Josh wrote: https://anchore.com/blog/navigating-the-nvd-quagmire/ Josh's Latest post: https://opensourcesecu…
  continue reading
 
Application security posture management has quickly become a hot commodity in the world of AppSec, but questions remain around what is defined by ASPM. Vendors have cropped up from different corners of the AppSec space to help security teams make their programs more effective, improve their security postures, and connect the dots between developers…
  continue reading
 
Open source has been a part of the software supply chain for decades, yet many projects and their maintainers remain undersupported by the companies that consume them. The security responsibilities for project owners has increased not only in dealing with security disclosures, but in maintaining secure processes backed by strong authentication and …
  continue reading
 
Open source has been a part of the software supply chain for decades, yet many projects and their maintainers remain undersupported by the companies that consume them. The security responsibilities for project owners has increased not only in dealing with security disclosures, but in maintaining secure processes backed by strong authentication and …
  continue reading
 
Open source has been a part of the software supply chain for decades, yet many projects and their maintainers remain undersupported by the companies that consume them. The security responsibilities for project owners has increased not only in dealing with security disclosures, but in maintaining secure processes backed by strong authentication and …
  continue reading
 
The bois discuss Furiosa: A Mad Max Saga, Salo, In A Violent Nature, and more! Join our Patreon for bonus episodes, supplements, Discord access, and more: https://www.patreon.com/therearetoomanymovies Merch: https://www.toomanymovies.com/shop Leave us a voicemail: 214-699-9076 Instagram: https://www.instagram.com/therearetoomanymovies/ TikTok: http…
  continue reading
 
Since the 1995 publication of Daniel Goleman’s international bestseller Emotional Intelligence, Why It Can Matter More Than IQ, a global movement has developed to bring “EQ” into practice in businesses, schools, and communities around the globe. But what is its impact on Cybersecurity? In this interview, we welcome Jessica Hoffman, Deputy CISO for …
  continue reading
 
In this interview, join Swimlane Chief Information Security Officer, Mike Lyborg, and host Akira Brand as we discuss the value of cybersecurity marketplaces from a CISO perspective. Through insightful discussions, unpack the connection between outcomes-driven solutions and tangible business KPIs. This segment is sponsored by Swimlane. Visit https:/…
  continue reading
 
Organizations today are overwhelmed with the sheer magnitude of potential cybersecurity threats and there is plenty of vendor buzz around AI in Security products, but what is the reality? Threat detection and incident response (TDIR) strategy and execution have never been more critical and are essential in maintaining cyber resilience and strengthe…
  continue reading
 
As a special treat for this week's vault episode, we set up a conversation with Derek Manky to discuss Fortinet's FortiGuard Labs Threat Report. This is a bi-annual report put out by FortiGuard Labs, and in my opinion, it just keeps getting better and better. The report is chock full of actionable information and insights. It answered all my questi…
  continue reading
 
Making The World A More Secure Place: Joshua Corman's Journey and Insights Welcome to an insightful podcast episode featuring Joshua Corman, a prominent figure in the realm of cybersecurity. With a wealth of experience and a keen understanding of the evolving threat landscape, Joshua has established himself as a thought leader and influencer in the…
  continue reading
 
With hundreds or thousands of SaaS apps to secure with no traditional perimeter, Identity becomes the focal point for SaaS Security in the modern enterprise. Yet with Shadow IT, now recast as Business-Led IT, quickly becoming normal practice, it’s more complicated than trying to centralize all identities with an Identity Provider (IdP) for Single S…
  continue reading
 
With hundreds or thousands of SaaS apps to secure with no traditional perimeter, Identity becomes the focal point for SaaS Security in the modern enterprise. Yet with Shadow IT, now recast as Business-Led IT, quickly becoming normal practice, it’s more complicated than trying to centralize all identities with an Identity Provider (IdP) for Single S…
  continue reading
 
With hundreds or thousands of SaaS apps to secure with no traditional perimeter, Identity becomes the focal point for SaaS Security in the modern enterprise. Yet with Shadow IT, now recast as Business-Led IT, quickly becoming normal practice, it’s more complicated than trying to centralize all identities with an Identity Provider (IdP) for Single S…
  continue reading
 
Loading …

Quick Reference Guide