show episodes
 
Artwork

1
Do Well by Doing Good

Coni Meyers & Howard Fox

Unsubscribe
Unsubscribe
Monthly+
 
BePreparedBeReady.org was formed to address our changing world. OUR MISSION is to provide educational services and programs to help individuals, businesses and communities become more sustainable, prepared and ready. OUR VISION is to inspire everyone to take action in their communities and have a positive impact locally and worldwide. OUR GOAL is to educate as many people as possible through initiatives starting with our Kits4Kids campaign.
  continue reading
 
Artwork

1
Okay Sister

Scout & Mady, Podcast Nation

Unsubscribe
Unsubscribe
Weekly
 
Welcome to Okay Sister, a podcast hosted by Gabrielle Scout, Editor-in-Chief of REVUE and Mady, co-founder of Camber. And yes, they are sisters in real life! Join Scout and Mady for sisterly banter, mindset shifts, and that familial feeling of coming home. The podcast that is here to help you show up more for yourself. Past guests include: Jennifer Meyer, Amanda Hirsch, Kelsey Kreppel, Zuri Hall, Lauryn Evarts Bosstick, Sahara Rose, Roxie Nafousi, Heather McMahan, Indy Blue, Koya Webb, Laure ...
  continue reading
 
Artwork

1
Below The Tide

Elizabeth Rohlicek

Unsubscribe
Unsubscribe
Monthly+
 
A podcast dedicated to everyone who grew up dreaming of being a marine biologist. Weekly episodes feature a marine scientist who shares their research, life stories, and fun anecdotes. Follow on instagram @Belowthetidepod for updates and resources! With every episode you can find an instagram post that goes along with it. That post will have some pictures, diagrams, maps, definitions, to help you follow along.Thanks for being here - Liz
  continue reading
 
Artwork

1
October's Children

Jacob Mandell & Derrick Valen in collaboration with ArcanaCast

Unsubscribe
Unsubscribe
Monthly
 
"October’s Children" is an episodic full-cast paranormal mystery/horror audio drama set in a small college town in New England. "October’s Children" focuses on a small, diverse group of 20- and 30-somethings trying to survive the trials and tribulations of ‘everyday’ life in Wolfbrook, New Hampshire. Unbeknownst to them at series start, the group will face increasingly strange and dangerous situations as the boundaries between our world and another fade, and monstrous creatures begin to infi ...
  continue reading
 
What keeps your divinely designed wild heart from being free? Unlock the chains around your heart, break free from your old stories and access your divine birthright for joy and passion. Allow yourself to flow in the energy of fulfillment and freedom, expansion and expression as you were meant to in this life. Connect and be seen, be heard, be part of the bigger consciousness of humanity. Discover your unique gifts and superpowers which allow you to navigate the challenges along the way as y ...
  continue reading
 
Artwork

1
The Metal Detecting Podcast

The Metal Detecting Podcast

Unsubscribe
Unsubscribe
Monthly
 
Join us every other Friday at 7:00 P.M. CST. This podcast is all about metal detecting and those who love the hobby. So join us as we talk with some of the most interesting people in the hobby of metal detecting.
  continue reading
 
Loading …
show series
 
Voula Stojkovic was born and raised on the West Coast of Canada. She is a lover of the ocean; it's where her soul feels most at home. Over the last decade, she has delved deep into learning and obtaining certifications in various energy healing modalities. She wears several energy healing modality hats including: Bio Energy practitioner, Akashic Re…
  continue reading
 
Exploring the Hardware Hacking Realm with Joe Grand, AKA Kingpin Joe Grand, also known by his hacker pseudonym "Kingpin," stands as a prominent figure in the cybersecurity landscape. With an extensive background in hardware hacking, reverse engineering, and embedded systems, Joe has carved a niche for himself as a respected authority in the field. …
  continue reading
 
Exploring the Hardware Hacking Realm with Joe Grand, AKA Kingpin Joe Grand, also known by his hacker pseudonym "Kingpin," stands as a prominent figure in the cybersecurity landscape. With an extensive background in hardware hacking, reverse engineering, and embedded systems, Joe has carved a niche for himself as a respected authority in the field. …
  continue reading
 
Check out this interview from the SWN Vault, hand picked by main host Doug White! This Secure Digital Life segment was originally published on March 6, 2017. Have you ever wondered what phishing is? Do you know what spear phishing attacks are? Doug and Russ explain how to protect yourself from phishing scams in the inaugural episode of Secure Digit…
  continue reading
 
Check out this interview from the SWN Vault, hand picked by main host Doug White! This Secure Digital Life segment was originally published on March 6, 2017. Have you ever wondered what phishing is? Do you know what spear phishing attacks are? Doug and Russ explain how to protect yourself from phishing scams in the inaugural episode of Secure Digit…
  continue reading
 
Check out this interview from the BSW Vault, hand picked by main host Matt Alderman! This segment was originally published on October 11, 2022. As 2023 approaches, security leaders are hard at work preparing their budgets, identifying their projects, and setting their priorities for the next twelve months. At the same time, the growth mode days of …
  continue reading
 
Check out this interview from the BSW Vault, hand picked by main host Matt Alderman! This segment was originally published on October 11, 2022. As 2023 approaches, security leaders are hard at work preparing their budgets, identifying their projects, and setting their priorities for the next twelve months. At the same time, the growth mode days of …
  continue reading
 
Scout and Mady get vulnerable about body image as summer quickly approaches and it’s bathing suit season. They chat openly about how they are feeling and ways to feel more confident in your body - a universal conversation that all women can relate to! Shop this episode! Whimsy + Row outfits (use code: OKAYSISTER): Scout is wearing the Soleil Dress …
  continue reading
 
We've made a slight tweak to the news format, only focusing on the most interesting funding and acquisition stories. As always, you can go check out Mike Privette's Return on Security newsletter for the full list of funded and acquired companies every week. This week, we discuss two $100M+ rounds, from Huntress and Semperis. We also discuss NetSPI'…
  continue reading
 
For decades, security teams have been focused on preventing and detecting threats, only to find themselves buried so deep in alerts, they can't detect anything at all! We clearly need a different approach, which will be the topic of our conversation today with Marty. We'll be discussing a shift in philosophy and tactics. We'll discuss whether SecOp…
  continue reading
 
Healthcare and malware, MoveIT, Chrome won't trust Entrust, the discovery of Volt Typhoon, & more on this episode of the Security Weekly News! Segment Resources: https://therecord.media/volt-typhoon-targets-underestimated-cisa-says Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-395…
  continue reading
 
We all might be a little worn out on this topic, but there's no escaping it. Executives want to adopt GenAI and it is being embedded into nearly every software product we use in both our professional and personal lives. In this interview, Anurag joins us to discuss how his company evaluated and ultimately integrated AI-based technologies into their…
  continue reading
 
We all might be a little worn out on this topic, but there's no escaping it. Executives want to adopt GenAI and it is being embedded into nearly every software product we use in both our professional and personal lives. In this interview, Anurag joins us to discuss how his company evaluated and ultimately integrated AI-based technologies into their…
  continue reading
 
Zyxl NAS devices are under attack and the exploit is pretty simple, A new UEFI vulnerability with a name that some people don't like, that time you setup a load balancer and forgot about it, I love it when there is a vulnerability in a Wifi driver, Polyfill is filling the Internet with supply chain vulnerabilities, open source doesn't mean more sec…
  continue reading
 
This may be controversial, however, we've been privately discussing how organizations benefit from penetration testing and vulnerability scanning. Do you still need these services as a critical part of your security program? Can't you just patch stuff that is missing patches? Tune in for a lively debate! Zyxl NAS devices are under attack and the ex…
  continue reading
 
Domestic violence permeates our society. It impacts lives through multiple channels, not just physically but emotionally, spiritually and mentally. It can be debilitating for victims to a place where they may not feel they have any other choice but to stay in a violent, destructive and painful relationship. Join me in today’s conversation as I inte…
  continue reading
 
This may be controversial, however, we've been privately discussing how organizations benefit from penetration testing and vulnerability scanning. Do you still need these services as a critical part of your security program? Can't you just patch stuff that is missing patches? Tune in for a lively debate! Show Notes: https://securityweekly.com/psw-8…
  continue reading
 
OAuth 2.0 is more than just a single spec and it's used to protect more than just APIs. We talk about challenges in maintaining a spec over a decade of changing technologies and new threat models. Not only can OAuth be challenging to secure by default, but it's not even always inter-operable. Segment Resources: https://oauth.net/2.1 https://oauth.n…
  continue reading
 
With 71% of web traffic coming from API calls last year and the average organization maintaining 613 API endpoints, a robust strategy is needed to protect APIs against automated threats and business logic attacks. Tune in as Luke Babarinde, Global Solution Architect, shares the key steps to building a successful API security strategy. This segment …
  continue reading
 
Welcome back to "Doing Well by Doing Good," the podcast where we explore the intersection of success and social impact. In this episode, we have the pleasure to chat with Michael Maldonado, broker and owner of Preferred Properties and Investments. Michael Maldonado, an accomplished real estate professional. He attributes his success to the rigorous…
  continue reading
 
In the age of AI, driving a business forward requires balancing three very significant considerations: growth through innovation, productivity through operational efficiency, and trust through security. To better understand how AI impacts the intersection of security, innovation, and operational efficiency, Okta commissioned an AlphaSights survey o…
  continue reading
 
With 71% of web traffic coming from API calls last year and the average organization maintaining 613 API endpoints, a robust strategy is needed to protect APIs against automated threats and business logic attacks. Tune in as Luke Babarinde, Global Solution Architect, shares the key steps to building a successful API security strategy. This segment …
  continue reading
 
OAuth 2.0 is more than just a single spec and it's used to protect more than just APIs. We talk about challenges in maintaining a spec over a decade of changing technologies and new threat models. Not only can OAuth be challenging to secure by default, but it's not even always inter-operable. Segment Resources: https://oauth.net/2.1 https://oauth.n…
  continue reading
 
Scout and Mady welcome their VERY FIRST MALE GUEST, none other than Sahil Bloom! On this episode they chat about asking better questions to live a better life, creating your life by design instead of default, his fatherhood outlooks and philosophies, how he healed his relationship with his sister, and how to manage your ambitions as a parent. Subsc…
  continue reading
 
Traditional approaches to access management are no longer sufficient to safeguard enterprise security. Tim will explain why the most effective approach to modern enterprise security requires a Zero Trust model that extends beyond just access to encompass every action, no matter how minor. Tim will describe the importance of implementing a Zero Trus…
  continue reading
 
Traditional approaches to access management are no longer sufficient to safeguard enterprise security. Tim will explain why the most effective approach to modern enterprise security requires a Zero Trust model that extends beyond just access to encompass every action, no matter how minor. Tim will describe the importance of implementing a Zero Trus…
  continue reading
 
Check out this interview from the SWN Vault, hand picked by main host Doug White! This Secure Digital Life segment was originally published on June 19, 2018. This week, Doug and Russ interview Matthew Silva, President and Founder of the Cybersecurity and Intel Club at Roger Williams University! They talk about majoring in Cybersecurity vs. Computer…
  continue reading
 
Check out this interview from the SWN Vault, hand picked by main host Doug White! This Secure Digital Life segment was originally published on June 19, 2018. This week, Doug and Russ interview Matthew Silva, President and Founder of the Cybersecurity and Intel Club at Roger Williams University! They talk about majoring in Cybersecurity vs. Computer…
  continue reading
 
In this fun and engaging episode of Ladies Who Create, hosts Liz Meyer and Jess Rosenberg sit down with the dynamic duo Amy and Jen Hood, the brilliant minds behind Hoodzpah, a Southern California branding and design agency. The Hood sisters share their inspiring journey, detailing their work with industry giants like Google, Disney, and Target. Th…
  continue reading
 
Loading …

Quick Reference Guide