show episodes
 
Welcome to Retail101online, where timeless wisdom meets modern retail! Join our host, a seasoned veteran with four decades of experience spanning 20 countries and multiple retailers. In a world dominated by automation and technology, essential retail knowledge is often overlooked. Our mission is to revive these forgotten fundamentals and empower both aspiring retailers and curious consumers. From customer service to inventory management, we delve deep into the core principles that form the b ...
  continue reading
 
Artwork

1
Never Records Podcasts

Never Records Podcasts

Unsubscribe
Unsubscribe
Monthly
 
Never Records is a combination recording studio and record shop, setting up in locales throughout the world. The sole proprietor, interior decorator, and engineer is New York-based artist Ted Riederer. Inspired by his own redemptive education at a young age inside the walls of a local record store in Rockville, Maryland as well as the field recording projects of Alan Lomax, Riederer devised his unique community art installation in the early part of this century and has been replicating it wi ...
  continue reading
 
Are there any parallels between real life conspiracies and events in the Star Wars universe? What about conspiracies in the Star Wars universe itself? This podcast discusses both. Open your mind and let the force flow! Support this podcast: https://podcasters.spotify.com/pod/show/conspiracyintheforce/support
  continue reading
 
Welcome to the Security Weekly Podcast Network, your all-in-one source for the latest in cybersecurity! This feed features a diverse lineup of shows, including Application Security Weekly, Business Security Weekly, Paul's Security Weekly, Enterprise Security Weekly, and Security Weekly News. Whether you're a cybersecurity professional, business leader, or tech enthusiast, we cover all angles of the cybersecurity landscape. Tune in for in-depth panel discussions, expert guest interviews, and ...
  continue reading
 
Imagine boldly navigating the complex world of management with a broad range of management theories at your disposal. The Management Theory Toolbox promises you a mind-expanding experience. Prepare to think, rethink, and discover the theory that underlies management practices. This isn't your typical management podcast. Yes, there are plenty of resources out there that will give you the ABCs of how to run a meeting, hire someone, or even how to fake a sick day without getting caught, but her ...
  continue reading
 
Welcome to Dreamland Notes! Dive into a realm where reality blurs and dreams take flight. In this ethereal sanctuary, every story is a whisper from the subconscious, every narrative a fragment of the surreal. Join us as we embark on a journey through the corridors of imagination, where the boundaries between truth and fantasy dissolve. In this podcast, we unravel tales spun from the fabric of dreams, offering glimpses into an alternate reality shaped by the mind’s eye. From the depths of rev ...
  continue reading
 
Larry Gifford has Parkinson’s disease, and he wants to talk about it. When Life Gives You Parkinson’s chronicles Larry’s journey following diagnosis at age 45, but he knows he’s only part of the story. The podcast gives voice to the fascinating people that make up the Parkinson’s community and beyond — his family, his fellow people with Parkinson’s, care partners, advocates, researchers and healthcare providers. Through these interviews, the podcast informs and inspires others to share their ...
  continue reading
 
How to discern what matters in business and IT and find a sense in your trade. We combine practical academic theories with concrete business. If you are a bored seasoned professional or an enterprising engineering student, listen to this show. You will discover how technology and business can be combined to bring more value and sense to society. We illustrate how to avoid out-of-touch strategies that are based on, for example, transparency and pure agility. Today, work environments are often ...
  continue reading
 
Loading …
show series
 
This week, in the Application Security News, we spend a lot of time on some recent vulnerabilities. We take this opportunity to talk about how to determine whether or not a vulnerability is worth a critical response. Can AI fully automate DevSecOps Governance? Adrian has his reservations, but JLK is bullish. Is it bad that 70% of DevSecOps professi…
  continue reading
 
In this week's interview, Melinda Marks' joins us to discuss her latest research. Her recent report Modernizing Application Security to Scale for Cloud-Native Development delves into many aspects and trends affecting AppSec as it matures, particularly in cloud-first organizations. We also discuss the fuzzy line between "cloud-native" AppSec and eve…
  continue reading
 
Stress in cybersecurity is an industrywide problem. The CISO role is one of the most stressful in any organization. And the stress levels are at an all time high, leading to a mental health crisis. How should CISOs cope with this stress and improve their mental health? Ram Movva, CEO & Founder at Securin, joins Business Security Weekly to discuss t…
  continue reading
 
Send us a text In this episode, the team from DTEK.AI and Sanad Yaghi of What’s in Store, sits down with Mark Lack, CEO of Circle K Arabia, to explore the rapid expansion of Circle K in Saudi Arabia and the broader GCC region. Mark shares insights from his 40-year career in retail, spanning multiple formats and countries, and discusses the unique c…
  continue reading
 
In the enterprise security news, Some big fundings no less than 4 acquisitions Silencing the EDR silencers ghost jobs overinflated estimates on open cybersecurity jobs weaponizing Microsoft Copilot fun projects with disposable vapes All that and more, on this episode of Enterprise Security Weekly. Show Notes: https://securityweekly.com/esw-383…
  continue reading
 
Is it a product or a feature? Is it DLP 4.0, or something legitimately new? Buy now, or wait for further consolidation? There are SO many questions about this market. It's undeniably important - data hygiene and governance continues to be a frustrating mess in many organizations, but is this the solution? We'll discuss with Todd to find out. Show N…
  continue reading
 
In this urgent conversation, Andrew and Daphne address the alarming rise of antisemitism in Europe, particularly in the context of recent violent attacks against Israelis in Amsterdam, Holland. They reflect on the historical parallels to the Holocaust, emphasizing the need for vigilance and proactive support for Israelis and the Jewish community. T…
  continue reading
 
CISOs struggle more with reactive budgets than CIOs or CTOs. It's not that part of the CISO's budget shouldn't be reactive, it's certainly necessary to an extent. The problem is when proactive measures suffer as a result. In this interview, we'll discuss some of the causes behind this and some strategies for breaking out of this loop. This segment …
  continue reading
 
In the news: Pacific Rim, Linux on Windows for attackers, one of the worst cases of a former employee's retaliation, Zery-Day FOMO, we predicted that, hacking for fun, working hard for no PoC, an LLM that discovers software vulnerabilities, absurd fines, long usernames and Okta, and paying a ransom with dough! Show Notes: https://securityweekly.com…
  continue reading
 
Dan & Ian talk to Lucas Peters, founder of Journey Beyond Travel, about his plans to get to $10M in 5 years. They break down the business and shift thinking from a project-oriented mindset to an approach rooted in financial analysis: What are your gross margins? What does it take to aquire a customer? What is your rebuy rate and LTV? They consider …
  continue reading
 
Today’s cyber threat actors are capitalizing on organizations’ identity vulnerabilities, such as MFA. Nearly 75% of cloud security failures now result from mismanaged identities, access, and privileges, and the identity attack surface is becoming more challenging to protect as companies expand their cloud environments and supply chains to meet thei…
  continue reading
 
Microsoft delays Recall AGAIN, Project Zero uses an LLM to find a bugger underflow in SQLite, the scourge of infostealer malware, zero standing privileges is easy if you have unlimited time (but no one does), reverse engineering Nintendo's Alarmo and RedBox's... boxes. Bonus: the book series mentioned in this episode The Lost Fleet by Jack Campbell…
  continue reading
 
After spending a decade working for appsec vendors, Grant McKracken wanted to give something back. He saw a gap in the market for free or low-cost services for smaller organizations that have real appsec needs, but not a lot of means to pay for it. He founded DarkHorse, who offers VDPs and bug bounties to organizations of all sizes for free, or for…
  continue reading
 
Merger and acquisition (M&A) activity in finally starting to pick up. Although the allure of financial gains and market expansion drives these deals, the digital age demands a rigorous assessment of cybersecurity risks accompanying such mergers. Unanticipated cyber issues, like dormant malware or inconsistent access controls, can transform an ideal…
  continue reading
 
This week, in the enterprise security news: the latest cybersecurity fundings Cyera acquires Trail Security Sophos acquires Secureworks new companies and products more coverage on Cyberstarts’ sunrise program AI can control your PC public cybersecurity companies are going private Splunk and Palo Alto beef All that and more, on this episode of Enter…
  continue reading
 
Recall III: the Re-Re-Recalling, Russia, Win 10, Phish n Ships, Midnight Blizzard, Emerald Whale, Rob Allen, and More, on this edition of the Security Weekly News. Segment Resources: https://www.bleepingcomputer.com/news/security/unitedhealth-says-data-of-100-million-stolen-in-change-healthcare-breach/ This segment is sponsored by ThreatLocker. Vis…
  continue reading
 
The future is here! Imagine if you could get into the office, a datacenter, or even an apartment building as easily as you unlock your smartphone. Alcatraz AI is doing exactly that with technology that works similarly to how smartphones unlock using your face. It works in the dark, if you shave off your beard, and so quickly you don't even need to …
  continue reading
 
Andrew and Daphne speak boldly about their responses to the events of October 7th '23, their commitment to go to the nation, and their preparation to do so. They share their journey, the emotional weight of gratitude from people they meet, and the responsibility they feel to be proactive in times of crisis. - www.G2gMandate.org/Israel YouTube Versi…
  continue reading
 
Google's cookie encryption drama, Microsoft accusing Google of shady antitrust tactics, AI shenanigans, the rejected Defcon talk and hacking traffic lights, vulnerabilities in Realtek SD card readers, the never-ending debate on quantum computing vs. cryptography, backdoors are not secrets and where we are pushing attackers, firmware leakage, more o…
  continue reading
 
Loading …

Quick Reference Guide