Welcome to the Right-Click JPEG Podcast hosted by Michael Morelli & Tom Snyder
…
continue reading
Save As Jpeg is a podcast about artist life and what it means to be an artist in today's world. We discuss a wide range of art subjects, but also branch out into movies, anime, video games, and whatever else that may sound fun. Come hang out! Host: Kito, He's an awesome tri-color shiba inu. IG: @kitos_Shiba_pride Host: Mikayla aka FatTackyCats - Webcomic & Animator Fattackycats@gmail.com Twitter & IG: @Fattackycats Fattackycats.tumblr.com Host: Joshua aka First1stclass - An Illustrator & dig ...
…
continue reading
GM Solana is the first podcast that interviews founders and builders exclusively in the Solana ecosystem.
…
continue reading
Formerly: Overpriced JPEGs After 2 years of covering web3, I'm both spreading my wings and going back to my roots. Covering tech, finance, & the internet. I talk fast :)
…
continue reading
We are living in a time where a JPEG can sell for a million dollars, celebrities openly endorse Ponzi schemes and when what you've invented doesn't matter nearly as much as what you say you've invented. As snake oil increasingly becomes our new currency, regulators and lawmakers are asleep at the wheel while pay-to-play journalists pump out puff pieces from their slurp juice-induced hangovers. Join us as we explore the dizzying, unending roster of these 2020s-era rackets. Welcome to the age ...
…
continue reading
Spike Eskin and Mutlu discover great music, discover your great music, and talk to great musicians. A music podcast from The Rights To Ricky Sanchez.
…
continue reading
The Application Security Weekly podcast delivers interviews and news from the worlds of AppSec, DevOps, DevSecOps, and all the other ways people find and fix software flaws. Join hosts Mike Shema and John Kinsella on a journey through modern cybersecurity practices for applications, clouds, containers, and more.
…
continue reading
A daily update on the latest AI Research Papers. We provide a high level overview of a handful of papers each day and will link all papers in the description for further reading. This podcast is created entirely with AI by PocketPod. Head over to https://pocketpod.app to learn more.
…
continue reading
Welcome to the Security Weekly Podcast Network, your all-in-one source for the latest in cybersecurity! This feed features a diverse lineup of shows, including Application Security Weekly, Business Security Weekly, Paul's Security Weekly, Enterprise Security Weekly, and Security Weekly News. Whether you're a cybersecurity professional, business leader, or tech enthusiast, we cover all angles of the cybersecurity landscape. Tune in for in-depth panel discussions, expert guest interviews, and ...
…
continue reading
Music Matters Media covers all genres of music from Pop, R&B, and Hip-Hop to EDM, Pop-Punk, Alternative Rock, and more! Listen as we discuss music news, album reviews, concert reviews, discover up-and-coming artists, and talk about all things music. You can now stream the #MusicMattersMedia podcast on Apple Podcasts, Spotify, Google Podcasts, Stitcher, Soundcloud, iHeartRadio, Amazon Music, Audible, Pandora, and any other platform podcasts are hosted. Make sure to subscribe to catch up on ol ...
…
continue reading
Capture breathtaking portraits and unforgettable weddings with J-P Visual Voices! This podcast is your one-stop shop for actionable tips, inspiring stories, and essential business insights to elevate your photography game. Whether you're a seasoned pro or just starting out, you'll find valuable advice on posing techniques, lighting setups, creative editing workflows, and essential gear recommendations. J-P Visual Voices goes beyond the technical, delving into the artistic aspects of portrait ...
…
continue reading
Get to Grips with your Sony Alpha
…
continue reading
We provide you the best digitized experience that meets up your standards. We bring the timely, and affordable digitizing service experience in the USA. We are focused on providing quality embroidery items, gifts, text digitizing, 3d Puff digitizing, Applique digitizing, and custom digitizing services with the highest levels of customer satisfaction.
…
continue reading
The CNBC-TV18 Special Podcast covers trends that have an impact on the daily lives of the masses. Experts from sectors like economy, healthcare, banking, finance, autos and technology will discuss the latest developments in various fields. Tune in to the CNBC-TV18 Special Podcast for more.
…
continue reading
1
Fuzzing for Vulns, GitLab Auth Bypass, JPEG Vulns, Programming Language Ranks - ASW #300
32:45
32:45
Play later
Play later
Lists
Like
Liked
32:45
Fuzzing network traffic in OpenWRT, parsing problems lead to GitLab auth bypass, more fuzzing finds vulns in a JPEG parser, and more! Show Notes: https://securityweekly.com/asw-300
…
continue reading
1
AI in Cyber & Addressing Analyst Burnout - Kayla Williams - PSW #844
55:31
55:31
Play later
Play later
Lists
Like
Liked
55:31
Kayla Williams, Chief Security Information Officer at Devo, discussed the role of AI in cybersecurity and the ongoing issue of burnout for SOC analysts. Working with Wakefield Research, Devo discovered that 83% of IT professionals feel burnt out due to stress, lack of sleep, and anxiety. Many also report that their burnout leads to breaches. This s…
…
continue reading
This week in the security news, Dr. Doug and Larry explore various technological advancements and their implications with a healthy dose of nostalgia, particularly focusing on health monitoring through Wi-Fi signals, the misconceptions surrounding 5G connectivity, the importance of understanding internet speed needs, and the cybersecurity threats f…
…
continue reading
1
Linkin Park ‘Hybrid Theory,’ Goo Goo Dolls ‘A Boy Named Goo’ and Fontaines DC ‘In The Modern World’
1:35:36
1:35:36
Play later
Play later
Lists
Like
Liked
1:35:36
Albums discussed are Linkin Park’s ‘Hybrid Theory’ (16:25), as well as their reformation with Emily Armstrong and related controversy. We also discuss Goo Goo Dolls’ ‘A Boy Named Goo’ (57:45). Then we discuss “In The Modern World” from Fontaines DC’s new album ‘Romance’ (81:10). Get tickets to Live Carl 2 on November 20th at this link https://under…
…
continue reading
1
Fuzzing for Vulns, GitLab Auth Bypass, JPEG Vulns, Programming Language Ranks - ASW #300
32:45
32:45
Play later
Play later
Lists
Like
Liked
32:45
Fuzzing network traffic in OpenWRT, parsing problems lead to GitLab auth bypass, more fuzzing finds vulns in a JPEG parser, and more! Show Notes: https://securityweekly.com/asw-300
…
continue reading
1
C3pbot, Kaspersky, Octo2 , Honkai: Star Rail, ServiceNow, LinkedIn... - SWN #416
29:32
29:32
Play later
Play later
Lists
Like
Liked
29:32
C3pbot, Kaspersky, Octo2 Electric Boogaloo, Honkai: Star Rail, ServiceNow, LinkedIn, IoT, Josh Marpet, and more on the Cyber Security News. Show Notes: https://securityweekly.com/swn-416
…
continue reading
1
Vulnerable APIs and Bot Attacks: Two Interconnected, Growing Security Threats - David Holmes - ASW #300
35:07
35:07
Play later
Play later
Lists
Like
Liked
35:07
APIs are essential to modern application architectures, driving rapid development, seamless integration, and improved user experiences. However, their widespread use has made them prime targets for attackers, especially those deploying sophisticated bots. When these bots exploit business logic, they can cause considerable financial and reputational…
…
continue reading
1
Vulnerable APIs and Bot Attacks: Two Interconnected, Growing Security Threats - David Holmes - ASW #300
35:07
35:07
Play later
Play later
Lists
Like
Liked
35:07
APIs are essential to modern application architectures, driving rapid development, seamless integration, and improved user experiences. However, their widespread use has made them prime targets for attackers, especially those deploying sophisticated bots. When these bots exploit business logic, they can cause considerable financial and reputational…
…
continue reading
1
Authentication and Authorization in the AI Era - Shiven Ramji - BSW #365
30:30
30:30
Play later
Play later
Lists
Like
Liked
30:30
AI is bringing productivity gains like we’ve never seen before -- with users, security teams and developers already reaping the benefits. However, AI is also bolstering existing threats to application security and user identity -- even enabling new, personalized attacks to emerge. Shiven Ramji, President of Customer Identity at Okta, joins Business…
…
continue reading
1
Answering the Board's Questions While UnitedHealth Group 'Starts Over' - BSW #365
36:38
36:38
Play later
Play later
Lists
Like
Liked
36:38
In the leadership and communications segment, CISA Releases Cyber Defense Alignment Plan for Federal Agencies, UnitedHealth Group CISO: We had to ‘start over’ after Change Healthcare attack, 20 Essential Strategies for Leadership Development Success, and more! Show Notes: https://securityweekly.com/bsw-365…
…
continue reading
1
Cybersecurity: is the talent gap a myth? Is the industry delusional? - ESW #376
45:24
45:24
Play later
Play later
Lists
Like
Liked
45:24
This week, the cybersecurity industry's most basic assumptions under scrutiny. Following up our conversation with Wolfgang Goerlich, where he questions the value of phishing simulations, we discuss essays that call into question: the maturity of the industry the supposed "talent gap" with millions of open jobs despite complaints that this industry …
…
continue reading
1
Happy Anniversary Music Matters Media! - Episode 123
20:15
20:15
Play later
Play later
Lists
Like
Liked
20:15
In this special episode, we’re throwing a celebration for our incredible journey and the amazing community that supports us! Join us as we shine a spotlight on the people who make Music Matters Media what it is today — from our passionate listeners to our dedicated contributors. Your support has fueled our passion and creativity over all these year…
…
continue reading
1
Speed, Flexibility, and AI: The Case for Migrating from Legacy SOAR Systems - Whitney Young - ESW #376
33:06
33:06
Play later
Play later
Lists
Like
Liked
33:06
In this episode, we explore some compelling reasons for transitioning from traditional SOAR tools to next-generation SOAR platforms. Discover how workflow automation and orchestration offers unparalleled speed and flexibility, allowing organizations to stay ahead of evolving security threats. We also delve into how advancements in AI are driving th…
…
continue reading
1
Shroombots, pagers, Tor, Raptor Train, GRU, Blue Light, Aaran Leyland, and More... - SWN #415
34:59
34:59
Play later
Play later
Lists
Like
Liked
34:59
Shroombots, pagers, Tor, Raptor Train, GRU, Blue Light, Aaran Leyland, and More on the Security Weekly News. Show Notes: https://securityweekly.com/swn-415
…
continue reading
1
Back to the office, Void Banshee, ServiceNow, Taiwan, Dlink, C++, Aaran Leyland... - SWN #414
34:40
34:40
Play later
Play later
Lists
Like
Liked
34:40
Back to the office serfs, Void Banshee, ServiceNow, Taiwan, Dlink, C++, Aaran Leyland, and more on this Edition of the Security Weekly News. Show Notes: https://securityweekly.com/swn-414
…
continue reading
1
Do phishing tests do more harm than good? - Wolfgang Goerlich - ESW #376
34:21
34:21
Play later
Play later
Lists
Like
Liked
34:21
A month ago, my friend Wolfgang Goerlich posted a hot take on LinkedIn that is less and less of a hot take these days. He posted, "our industry needs to kill the phish test",and I knew we needed to have a chat, ideally captured here on the podcast. I've been on the fence when it comes to phishing simulation, partly because I used to phish people as…
…
continue reading
1
The Known Exploited Vulnerability catalogue, aka the KEV - Tod Beardsley - PSW #843
56:07
56:07
Play later
Play later
Lists
Like
Liked
56:07
Gain insights into the CISA KEV straight from one of the folks at CISA, Tod Beardsley, in this episode of Below the Surface. Learn how KEV was created, where the data comes from, and how you should use it in your environment. This segment is sponsored by Eclypsium. Visit https://securityweekly.com/eclypsium to learn more about them! Show Notes: htt…
…
continue reading
Apple drops a lawsuit to avoid exposing secrets, what does it mean for the security industry if MS locks down the kernel?, exploding pagers, more things from the past: Adobe Flash exploits, robots get rid of your data, PKFail is still a thing, Android TV malware is back: now with conspiracy theories, DMA attacks, gamers are not nation-state attacke…
…
continue reading
1
A TLD Takeover, An LLM CTF, A Firmware Flaw, 6 Truths of Cyber Risk - ASW #299
29:16
29:16
Play later
Play later
Lists
Like
Liked
29:16
A takeover of the MOBI TLD for $20, configuring an LLM for a CTF, firmware flaw in an SSD, Microsoft talks kernel resilience, six truths of cyber risk quantification, and more! Show Notes: https://securityweekly.com/asw-299
…
continue reading
1
Blink-182: The One More Time Tour (Part 2) - Episode 122
51:47
51:47
Play later
Play later
Lists
Like
Liked
51:47
Welcome back, Blink fans! In this episode, we dive into part 2 of our Blink-182 saga. After the thrilling 'Run Travis Run' experience, we take you front and center to Blink’s electrifying performance at Citi Field on their 'One More Time' Tour. Get the scoop on the opening acts, some unexpected setlist surprises (Including a mashup of +44 and Box C…
…
continue reading
1
Bringing Secure Coding Concepts to Developers - Dustin Lehr - ASW #299
33:10
33:10
Play later
Play later
Lists
Like
Liked
33:10
When a conference positioned as a day of security for developers has to be canceled due to lack of interest from developers, it's important to understand why there was so little interest and why appsec should reconsider its approach to awareness. Dustin Lehr discusses how appsec can better engage and better deliver security concepts in a way that m…
…
continue reading
1
A TLD Takeover, An LLM CTF, A Firmware Flaw, 6 Truths of Cyber Risk - ASW #299
29:16
29:16
Play later
Play later
Lists
Like
Liked
29:16
A takeover of the MOBI TLD for $20, configuring an LLM for a CTF, firmware flaw in an SSD, Microsoft talks kernel resilience, six truths of cyber risk quantification, and more! Show Notes: https://securityweekly.com/asw-299
…
continue reading
1
Bringing Secure Coding Concepts to Developers - Dustin Lehr - ASW #299
33:10
33:10
Play later
Play later
Lists
Like
Liked
33:10
When a conference positioned as a day of security for developers has to be canceled due to lack of interest from developers, it's important to understand why there was so little interest and why appsec should reconsider its approach to awareness. Dustin Lehr discusses how appsec can better engage and better deliver security concepts in a way that m…
…
continue reading
1
Consolidating C-Suite Tech Roles as Security Budgets and Workforce Growth Flatline - BSW #364
29:21
29:21
Play later
Play later
Lists
Like
Liked
29:21
In the leadership and communications segment, Why Companies Should Consolidate Tech Roles in the C-Suite, End of an era: Security budget growth slows down, Global cybersecurity workforce growth flatlines, stalling at 5.5M pros, and more! Show Notes: https://securityweekly.com/bsw-364
…
continue reading
1
Solving the Cybersecurity Data Problem - Padraic O'Reilly - BSW #364
31:43
31:43
Play later
Play later
Lists
Like
Liked
31:43
Cybersecurity is complex. We have threats, vulnerabilities, incidents, controls, risks, etc. But how do they all connect together to drive a cyber risk program? As an industry, we've struggled for 20+ years trying to boil this ocean. Maybe we've been going about it the wrong way. Padraic O'Reilly, Founder and Chief Innovation Officer at CyberSaint,…
…
continue reading
1
Live Show Announcement! La Luz 'News Of The Universe,' Starland Vocal Band 'Self Titled' and Amos Lee 'Madison'
1:23:54
1:23:54
Play later
Play later
Lists
Like
Liked
1:23:54
We announced Carl Landry Record Club Live II, a celebration of the new Linkin Park book with Jason Lipshutz. Details below the pod description! Albums discussed are Starland Vocal Band’s self-titled album (15:50) and La Luz’s ‘News Of The Universe’ (32:45). Then we discuss “Madison” from Amos Lee’s new album ‘Transmissions’ (60:00). After the pod t…
…
continue reading
1
Cybersecurity at the speed of Formula One - Darren Guccione, Harry Wilson - ESW #375
39:29
39:29
Play later
Play later
Lists
Like
Liked
39:29
Ever wondered what it's like to be responsible for the cybersecurity of a sports team? How about when that sports team is one of the world's most successful Formula One teams? I can't describe how excited we are to share this interview. This interview is basically two huge F1 nerds who happen to also be cybersecurity veterans asking everything they…
…
continue reading