With 10M+ downloads and thousands of listener meetups worldwide, the TMBA Podcast is the hub for 7 & 8-figure founders who’ve built life-changing businesses while attaining personal freedom. New episodes every Thursday morning.
…
continue reading
Be inspired by the past, equipped for the present, and prepared for the future as we engage in conversations with people from around the world.
…
continue reading
Welcome to Retail101online, where timeless wisdom meets modern retail! Join our host, a seasoned veteran with four decades of experience spanning 20 countries and multiple retailers. In a world dominated by automation and technology, essential retail knowledge is often overlooked. Our mission is to revive these forgotten fundamentals and empower both aspiring retailers and curious consumers. From customer service to inventory management, we delve deep into the core principles that form the b ...
…
continue reading
Never Records is a combination recording studio and record shop, setting up in locales throughout the world. The sole proprietor, interior decorator, and engineer is New York-based artist Ted Riederer. Inspired by his own redemptive education at a young age inside the walls of a local record store in Rockville, Maryland as well as the field recording projects of Alan Lomax, Riederer devised his unique community art installation in the early part of this century and has been replicating it wi ...
…
continue reading
Are there any parallels between real life conspiracies and events in the Star Wars universe? What about conspiracies in the Star Wars universe itself? This podcast discusses both. Open your mind and let the force flow! Support this podcast: https://podcasters.spotify.com/pod/show/conspiracyintheforce/support
…
continue reading
Welcome to the Security Weekly Podcast Network, your all-in-one source for the latest in cybersecurity! This feed features a diverse lineup of shows, including Application Security Weekly, Business Security Weekly, Paul's Security Weekly, Enterprise Security Weekly, and Security Weekly News. Whether you're a cybersecurity professional, business leader, or tech enthusiast, we cover all angles of the cybersecurity landscape. Tune in for in-depth panel discussions, expert guest interviews, and ...
…
continue reading
Imagine boldly navigating the complex world of management with a broad range of management theories at your disposal. The Management Theory Toolbox promises you a mind-expanding experience. Prepare to think, rethink, and discover the theory that underlies management practices. This isn't your typical management podcast. Yes, there are plenty of resources out there that will give you the ABCs of how to run a meeting, hire someone, or even how to fake a sick day without getting caught, but her ...
…
continue reading
Welcome to Dreamland Notes! Dive into a realm where reality blurs and dreams take flight. In this ethereal sanctuary, every story is a whisper from the subconscious, every narrative a fragment of the surreal. Join us as we embark on a journey through the corridors of imagination, where the boundaries between truth and fantasy dissolve. In this podcast, we unravel tales spun from the fabric of dreams, offering glimpses into an alternate reality shaped by the mind’s eye. From the depths of rev ...
…
continue reading
Larry Gifford has Parkinson’s disease, and he wants to talk about it. When Life Gives You Parkinson’s chronicles Larry’s journey following diagnosis at age 45, but he knows he’s only part of the story. The podcast gives voice to the fascinating people that make up the Parkinson’s community and beyond — his family, his fellow people with Parkinson’s, care partners, advocates, researchers and healthcare providers. Through these interviews, the podcast informs and inspires others to share their ...
…
continue reading
How to discern what matters in business and IT and find a sense in your trade. We combine practical academic theories with concrete business. If you are a bored seasoned professional or an enterprising engineering student, listen to this show. You will discover how technology and business can be combined to bring more value and sense to society. We illustrate how to avoid out-of-touch strategies that are based on, for example, transparency and pure agility. Today, work environments are often ...
…
continue reading
1
CISO Evolution and Leadership Paradigm as Burnout Rate Hits 93% - BSW #372
32:42
32:42
Play later
Play later
Lists
Like
Liked
32:42
In the leadership and communications segment, Managing Cybersecurity Stress: A Deep Dive into the 93% CISO Burnout Rate, How to Win at Cyber by Influencing People, Boost Your Team’s Productivity by Hiring Force Multiplier, and more! Show Notes: https://securityweekly.com/bsw-372
…
continue reading
1
Typosquatting NPM, vulnerability analysis, and AI challenges - ASW #307
35:50
35:50
Play later
Play later
Lists
Like
Liked
35:50
This week, in the Application Security News, we spend a lot of time on some recent vulnerabilities. We take this opportunity to talk about how to determine whether or not a vulnerability is worth a critical response. Can AI fully automate DevSecOps Governance? Adrian has his reservations, but JLK is bullish. Is it bad that 70% of DevSecOps professi…
…
continue reading
1
Struwwelpeter, Krampus, Flutter, Apple, DLink, C++, Josh Marpet and more... - SWN #430
33:19
33:19
Play later
Play later
Lists
Like
Liked
33:19
Struwwelpeter, Krampus, Flutter, Apple, DLink, C++, Josh Marpet and more on the Security Weekly News. Show Notes: https://securityweekly.com/swn-430
…
continue reading
1
Modernizing AppSec - Melinda Marks - ASW #307
33:41
33:41
Play later
Play later
Lists
Like
Liked
33:41
In this week's interview, Melinda Marks' joins us to discuss her latest research. Her recent report Modernizing Application Security to Scale for Cloud-Native Development delves into many aspects and trends affecting AppSec as it matures, particularly in cloud-first organizations. We also discuss the fuzzy line between "cloud-native" AppSec and eve…
…
continue reading
1
How to Combat the CISO Mental Health Crisis - Ram Movva - BSW #372
25:49
25:49
Play later
Play later
Lists
Like
Liked
25:49
Stress in cybersecurity is an industrywide problem. The CISO role is one of the most stressful in any organization. And the stress levels are at an all time high, leading to a mental health crisis. How should CISOs cope with this stress and improve their mental health? Ram Movva, CEO & Founder at Securin, joins Business Security Weekly to discuss t…
…
continue reading
1
Episode 17 - Scaling Convenience in KSA, A Podcast with DTEK.AI
39:54
39:54
Play later
Play later
Lists
Like
Liked
39:54
Send us a text In this episode, the team from DTEK.AI and Sanad Yaghi of What’s in Store, sits down with Mark Lack, CEO of Circle K Arabia, to explore the rapid expansion of Circle K in Saudi Arabia and the broader GCC region. Mark shares insights from his 40-year career in retail, spanning multiple formats and countries, and discusses the unique c…
…
continue reading
1
$200M for IoT security, 4 acquisitions, fake job openings, vapes are trash - ESW #383
54:50
54:50
Play later
Play later
Lists
Like
Liked
54:50
In the enterprise security news, Some big fundings no less than 4 acquisitions Silencing the EDR silencers ghost jobs overinflated estimates on open cybersecurity jobs weaponizing Microsoft Copilot fun projects with disposable vapes All that and more, on this episode of Enterprise Security Weekly. Show Notes: https://securityweekly.com/esw-383…
…
continue reading
1
The State of DSPM, One of the Hottest New Cybersecurity Markets in Years - Todd Thiemann - ESW #383
33:18
33:18
Play later
Play later
Lists
Like
Liked
33:18
Is it a product or a feature? Is it DLP 4.0, or something legitimately new? Buy now, or wait for further consolidation? There are SO many questions about this market. It's undeniably important - data hygiene and governance continues to be a frustrating mess in many organizations, but is this the solution? We'll discuss with Todd to find out. Show N…
…
continue reading
1
Robo-Turing, BlueNoroff, Palo Alto, German Law, Fabric, Cisco, Bans, Aaran Leyland... - SWN #429
32:39
32:39
Play later
Play later
Lists
Like
Liked
32:39
Robo-Turing, BlueNoroff, Palo Alto, German Law, Fabric, Cisco, Banning Things, Aaran Leyland, and More, on this edition of the Security Weekly News. Show Notes: https://securityweekly.com/swn-429
…
continue reading
1
Andrew and Daphne Kirk // Israelis Attacked on the Streets of Amsterdam
11:08
11:08
Play later
Play later
Lists
Like
Liked
11:08
In this urgent conversation, Andrew and Daphne address the alarming rise of antisemitism in Europe, particularly in the context of recent violent attacks against Israelis in Amsterdam, Holland. They reflect on the historical parallels to the Holocaust, emphasizing the need for vigilance and proactive support for Israelis and the Jewish community. T…
…
continue reading
1
Cybersecurity Budgets: the Journey from Reactive to Proactive - Theresa Lanowitz - ESW #383
32:53
32:53
Play later
Play later
Lists
Like
Liked
32:53
CISOs struggle more with reactive budgets than CIOs or CTOs. It's not that part of the CISO's budget shouldn't be reactive, it's certainly necessary to an extent. The problem is when proactive measures suffer as a result. In this interview, we'll discuss some of the causes behind this and some strategies for breaking out of this loop. This segment …
…
continue reading
1
We're Not Saying "I told you so" - PSW #850
2:01:51
2:01:51
Play later
Play later
Lists
Like
Liked
2:01:51
In the news: Pacific Rim, Linux on Windows for attackers, one of the worst cases of a former employee's retaliation, Zery-Day FOMO, we predicted that, hacking for fun, working hard for no PoC, an LLM that discovers software vulnerabilities, absurd fines, long usernames and Okta, and paying a ransom with dough! Show Notes: https://securityweekly.com…
…
continue reading
1
Cybersecurity For Schools - Kayne McGladrey - PSW #850
45:59
45:59
Play later
Play later
Lists
Like
Liked
45:59
We chatted with Kayne about education systems security, funding for cyber tools and services, and what the future of education might look like to fill more cyber roles. Show Notes: https://securityweekly.com/psw-850
…
continue reading
1
#780 How do you grow from 7 to 8 figures?
41:17
41:17
Play later
Play later
Lists
Like
Liked
41:17
Dan & Ian talk to Lucas Peters, founder of Journey Beyond Travel, about his plans to get to $10M in 5 years. They break down the business and shift thinking from a project-oriented mindset to an approach rooted in financial analysis: What are your gross margins? What does it take to aquire a customer? What is your rebuy rate and LTV? They consider …
…
continue reading
1
Tariffs, Pygmy Goat, Schneider, SQLite, Deepfakes, Military AI, Josh Marpet... - SWN #428
32:53
32:53
Play later
Play later
Lists
Like
Liked
32:53
Tariffs, Pygmy Goat, Schneider, SQLite and Dixie Flatline, Deepfakes, Military AI, Josh Marpet, and more on the Security Weekly News. Show Notes: https://securityweekly.com/swn-428
…
continue reading
1
Today's Hybrid Work Era: Integrated Approach & Implementing Identity - ESW #382
30:38
30:38
Play later
Play later
Lists
Like
Liked
30:38
Today’s cyber threat actors are capitalizing on organizations’ identity vulnerabilities, such as MFA. Nearly 75% of cloud security failures now result from mismanaged identities, access, and privileges, and the identity attack surface is becoming more challenging to protect as companies expand their cloud environments and supply chains to meet thei…
…
continue reading
1
The Right CISO, with a New Security Leadership Style, to Safeguard Your Business - BSW #371
26:57
26:57
Play later
Play later
Lists
Like
Liked
26:57
In the leadership and communications segment, How to Find the Right CISO, New Security Leadership Style Needed for Stressed Workers, Combatting Human Error: How To Safeguard Your Business Against Costly Data Breaches, and more! Show Notes: https://securityweekly.com/bsw-371
…
continue reading
1
Total Recall? LLM finds bug in SQLite, C++ safety failures, zero time for zero privs - ASW #306
33:29
33:29
Play later
Play later
Lists
Like
Liked
33:29
Microsoft delays Recall AGAIN, Project Zero uses an LLM to find a bugger underflow in SQLite, the scourge of infostealer malware, zero standing privileges is easy if you have unlimited time (but no one does), reverse engineering Nintendo's Alarmo and RedBox's... boxes. Bonus: the book series mentioned in this episode The Lost Fleet by Jack Campbell…
…
continue reading
1
Bug bounties, vulnerability disclosure, PTaaS, fractional pentesting - Grant McCracken - ASW #306
32:08
32:08
Play later
Play later
Lists
Like
Liked
32:08
After spending a decade working for appsec vendors, Grant McKracken wanted to give something back. He saw a gap in the market for free or low-cost services for smaller organizations that have real appsec needs, but not a lot of means to pay for it. He founded DarkHorse, who offers VDPs and bug bounties to organizations of all sizes for free, or for…
…
continue reading
1
Planning A Merger Or Acquisition? Ask These Five Cyber Questions First - Craig Davies - BSW #371
38:23
38:23
Play later
Play later
Lists
Like
Liked
38:23
Merger and acquisition (M&A) activity in finally starting to pick up. Although the allure of financial gains and market expansion drives these deals, the digital age demands a rigorous assessment of cybersecurity risks accompanying such mergers. Unanticipated cyber issues, like dormant malware or inconsistent access controls, can transform an ideal…
…
continue reading
1
Funding, AI controls your PC, Cyberstarts stops Sunrise, public cyber goes private - ESW #382
1:04:31
1:04:31
Play later
Play later
Lists
Like
Liked
1:04:31
This week, in the enterprise security news: the latest cybersecurity fundings Cyera acquires Trail Security Sophos acquires Secureworks new companies and products more coverage on Cyberstarts’ sunrise program AI can control your PC public cybersecurity companies are going private Splunk and Palo Alto beef All that and more, on this episode of Enter…
…
continue reading
1
Recall, Russia, Win 10, Phish n Ships, Midnight Blizzard, Rob Allen, and More... - SWN #427
36:50
36:50
Play later
Play later
Lists
Like
Liked
36:50
Recall III: the Re-Re-Recalling, Russia, Win 10, Phish n Ships, Midnight Blizzard, Emerald Whale, Rob Allen, and More, on this edition of the Security Weekly News. Segment Resources: https://www.bleepingcomputer.com/news/security/unitedhealth-says-data-of-100-million-stolen-in-change-healthcare-breach/ This segment is sponsored by ThreatLocker. Vis…
…
continue reading
1
What if securing buildings was as easy as your smartphone? - Blaine Frederick - ESW #382
31:27
31:27
Play later
Play later
Lists
Like
Liked
31:27
The future is here! Imagine if you could get into the office, a datacenter, or even an apartment building as easily as you unlock your smartphone. Alcatraz AI is doing exactly that with technology that works similarly to how smartphones unlock using your face. It works in the dark, if you shave off your beard, and so quickly you don't even need to …
…
continue reading
1
Andrew and Daphne Kirk // Responding to Crisis: Our Journey After October 7th
30:31
30:31
Play later
Play later
Lists
Like
Liked
30:31
Andrew and Daphne speak boldly about their responses to the events of October 7th '23, their commitment to go to the nation, and their preparation to do so. They share their journey, the emotional weight of gratitude from people they meet, and the responsibility they feel to be proactive in times of crisis. - www.G2gMandate.org/Israel YouTube Versi…
…
continue reading
1
EDR Is Dead, EDR Is Not Dead - PSW #849
1:50:52
1:50:52
Play later
Play later
Lists
Like
Liked
1:50:52
Google's cookie encryption drama, Microsoft accusing Google of shady antitrust tactics, AI shenanigans, the rejected Defcon talk and hacking traffic lights, vulnerabilities in Realtek SD card readers, the never-ending debate on quantum computing vs. cryptography, backdoors are not secrets and where we are pushing attackers, firmware leakage, more o…
…
continue reading