Your online round up of all things Water Polo in the UK. Host, Paul Metcalfe will be joined high profile guests from the water polo community to chat through thoughts and opinions. Get your questions in via the Facebook page!
…
continue reading
Dunkirk, D-Day, North Africa, Sicily, Italy, Omaha, USAF, RAF, POWs, Second World War Stories, Memoirs & interviews - Britain, USA, Australia, Canada … all the forces … WW2. ... Over 500 5-star ratings. "Thank you for what you are doing. It's incredible and I'm absolutely hooked" AB
…
continue reading
A podcast experiment conducted by comedians Andy Barr (@SomeNiceFun) and Alexander Bennett (@AlexyBennett). Barr and Bennett have been cloning themselves and the clones are idiots - they know nothing, they were literally born yesterday. How do you explain everything to someone who doesn't know anything? Every episode, guest comedians attempt to find out. Hosted on Acast. See acast.com/privacy for more information.
…
continue reading
Hosted by Adrian Sanabria, Tyler Shields, Katie Teitler-Santullo, Darwin Salazar, and Sean Metcalf. If you’re looking for advice and information on enterprise cybersecurity solutions, look no further than Enterprise Security Weekly! We give you an “insider” perspective into security vendors, including coverage on new product announcements, integrations, funding, M&A, and more! Adrian, Tyler, Katie, and Sean have unique perspectives on the enterprise security landscape. All four hosts are for ...
…
continue reading
Hosted by Adrian Sanabria, Tyler Shields, Katie Teitler-Santullo, Darwin Salazar, and Sean Metcalf. If you’re looking for advice and information on enterprise cybersecurity solutions, look no further than Enterprise Security Weekly! We give you an “insider” perspective into security vendors, including coverage on new product announcements, integrations, funding, M&A, and more! Adrian, Tyler, Katie, and Sean have unique perspectives on the enterprise security landscape. All four hosts are for ...
…
continue reading
Lyngso Fitness Academy presents: The Missing Piece, an audio offering about the mission, mindset and mechanics of completely transforming your life.Ever wondered what is holding your back from your best life? Your best self? You know that something is missing.Welcome to the Missing Piece. Hosted by Paul Lyngso, this podcast provides you everything you need to finally achieve the next level of satisfaction in your life. By transforming your life from the inside out, Paul offers actionable ste ...
…
continue reading
Welcome to The Greg Wientjes Show! In this podcast, I decode the minds of world-class technology inventors and business leaders. My interviews explore the key tools, strategies and insights used by these great inventors and entrepreneurs that allow them to achieve and innovate -- tools and techniques that you can emulate, learn from, and apply to your own life for greater creativity and fulfillment. The first few episodes include The Father of the Internet, Vint Cerf; Ray Kurzweil, inventor ...
…
continue reading
Every Wednesday hosts Nate Hopkins and Adam Lantelme and their fascinating guests will be delving into the heart of what it means to be secure, healthy, wealthy, happy and free in a n uncertain world. We want you to feel confident in your ability to face life’s challenges head-on – whether growing a business, being a great parent, improving your health, bolstering your safety, or living a life of freedom and liberty. We draw inspiration from the iconic symbol of freedom, the Statue of Libert ...
…
continue reading
1
Cybersecurity: is the talent gap a myth? Is the industry delusional? - ESW #376
45:24
45:24
Play later
Play later
Lists
Like
Liked
45:24
This week, the cybersecurity industry's most basic assumptions under scrutiny. Following up our conversation with Wolfgang Goerlich, where he questions the value of phishing simulations, we discuss essays that call into question: the maturity of the industry the supposed "talent gap" with millions of open jobs despite complaints that this industry …
…
continue reading
1
Speed, Flexibility, and AI: The Case for Migrating from Legacy SOAR Systems - Whitney Young - ESW #376
33:06
33:06
Play later
Play later
Lists
Like
Liked
33:06
In this episode, we explore some compelling reasons for transitioning from traditional SOAR tools to next-generation SOAR platforms. Discover how workflow automation and orchestration offers unparalleled speed and flexibility, allowing organizations to stay ahead of evolving security threats. We also delve into how advancements in AI are driving th…
…
continue reading
1
Do phishing tests do more harm than good? - Wolfgang Goerlich - ESW #376
34:21
34:21
Play later
Play later
Lists
Like
Liked
34:21
A month ago, my friend Wolfgang Goerlich posted a hot take on LinkedIn that is less and less of a hot take these days. He posted, "our industry needs to kill the phish test",and I knew we needed to have a chat, ideally captured here on the podcast. I've been on the fence when it comes to phishing simulation, partly because I used to phish people as…
…
continue reading
1
Do phishing tests do more harm than good? & Speed, Flexibility, and AI - Wolfgang Goerlich, Whitney Young - ESW #376
1:52:31
1:52:31
Play later
Play later
Lists
Like
Liked
1:52:31
A month ago, my friend Wolfgang Goerlich posted a hot take on LinkedIn that is less and less of a hot take these days. He posted, "our industry needs to kill the phish test",and I knew we needed to have a chat, ideally captured here on the podcast. I've been on the fence when it comes to phishing simulation, partly because I used to phish people as…
…
continue reading
1
Batch 45: Rob Copland and Ali Brice (Moustache Special)
1:06:04
1:06:04
Play later
Play later
Lists
Like
Liked
1:06:04
In this part of the experiment, the clones are joined by Rob Copland (https://www.instagram.com/robertdcopland/) and Ali Brice (https://www.instagram.com/twicebricebrice/) BUY TICKETS TO BORN YESTERDAY LIVE ON THE 20th OCTOBER https://podlifeevents.com/event-details/born-yesterday---live-from-cheerful-earful-podcast-festival-20th-oct-tickets Follow…
…
continue reading
1
Cybersecurity at the speed of Formula One - Darren Guccione, Harry Wilson - ESW #375
39:29
39:29
Play later
Play later
Lists
Like
Liked
39:29
Ever wondered what it's like to be responsible for the cybersecurity of a sports team? How about when that sports team is one of the world's most successful Formula One teams? I can't describe how excited we are to share this interview. This interview is basically two huge F1 nerds who happen to also be cybersecurity veterans asking everything they…
…
continue reading
1
Oktane 2024 and the Current State of Identity Security - Harish Peri - ESW #375
41:02
41:02
Play later
Play later
Lists
Like
Liked
41:02
We are a month away from Oktane -- the biggest identity event of the year. Okta is bringing thousands of identity industry thought leaders, IT and security executives, and other tech leaders together on October 15-17 to discuss the changing landscape for security and identity, how organizations are putting identity first, new Okta products, and mor…
…
continue reading
1
Cybersecurity has too many distractions and can the White House fix BGP? - Harish Peri, Harry Wilson, Darren Guccione - ESW #375
2:30:27
2:30:27
Play later
Play later
Lists
Like
Liked
2:30:27
This week, in the enterprise security news, Cribl, Zafran, and US states raise funding Cisco, Check Point, Salesforce, and Absolute Software acquire cybersecurity startups AI Security products are picking up steam You probably shouldn’t be too worried about Yubikey cloning Instead, you should be more worried about malicious npm packages! The White …
…
continue reading
1
Cybersecurity has too many distractions and can the White House fix BGP? - ESW #375
1:10:29
1:10:29
Play later
Play later
Lists
Like
Liked
1:10:29
This week, in the enterprise security news, Cribl, Zafran, and US states raise funding Cisco, Check Point, Salesforce, and Absolute Software acquire cybersecurity startups AI Security products are picking up steam You probably shouldn’t be too worried about Yubikey cloning Instead, you should be more worried about malicious npm packages! The White …
…
continue reading
1
How to Make the World Quantum Safe - Vadim Lyubashevsky - ESW Vault
46:10
46:10
Play later
Play later
Lists
Like
Liked
46:10
Check out this episode from the ESW Vault, hand picked by main host Adrian Sanabria! This episode was initially published on April 21 2023. Quantum computers are scaling rapidly. Soon, they will be powerful enough to solve previously unsolvable problems. But they come with a global challenge: fully-realized quantum computers will be able to break s…
…
continue reading
1
How to Make the World Quantum Safe - Vadim Lyubashevsky - ESW Vault
46:10
46:10
Play later
Play later
Lists
Like
Liked
46:10
Check out this episode from the ESW Vault, hand picked by main host Adrian Sanabria! This episode was initially published on April 21 2023. Quantum computers are scaling rapidly. Soon, they will be powerful enough to solve previously unsolvable problems. But they come with a global challenge: fully-realized quantum computers will be able to break s…
…
continue reading
CONTROL POD - When circumstances prevent us from being able to perform an experiment, it's time for Control Pod. Follow the experiment (https://twitter.com/BYesterdayPod - https://www.instagram.com/byesterdaypod/?locale=zh-hans) Follow Andy Barr (https://linktr.ee/andybarrcomedy) and Alexander Bennett (https://linktr.ee/alexanderbennettcomedian) Em…
…
continue reading
1
SaaS Security Beyond Just Misconfiguration & Expert Insights on Cybersecurity Ethics - Ed Skoudis, Maor Bin - ESW #374
32:57
32:57
Play later
Play later
Lists
Like
Liked
32:57
In this interview, Maor Bin, CEO and Co-Founder of Adaptive Shield, discusses the evolving landscape of SaaS Security. He highlights the challenges posed by the security gap resulting from the rapid adoption of SaaS applications and why SaaS security is beyond just misconfiguration management. Segment Resources: https://www.adaptive-shield.com/land…
…
continue reading
1
Interview with ThreatLocker: Is Application Allowlisting Making a Comeback? - Danny Jenkins - ESW #374
33:59
33:59
Play later
Play later
Lists
Like
Liked
33:59
I often say that it isn't the concepts or ideas in cybersecurity that are bad, but the implementations of them. Sometimes the market timing is just wrong and the industry isn't ready for a particular technology (e.g. enterprise browsers). Other times, the technology just isn't ready yet (e.g. SIEMs needed better database technology and faster stora…
…
continue reading
1
What asset management (ITAM) looks like outside cybersecurity - Danny Jenkins, Ed Skoudis, Jeremy Boerger, Maor Bin - ESW #374
1:44:09
1:44:09
Play later
Play later
Lists
Like
Liked
1:44:09
The top priority on the CIS Critical Security Controls list has never changed: inventory and control of enterprise assets. Yet it remains one of the most challenging controls to implement, much less master. The refrain, "you can't secure what you don't know about" is as old as information security itself. Complicating this task is the fact that imp…
…
continue reading
1
What asset management (ITAM) looks like outside cybersecurity - Jeremy Boerger - ESW #374
37:29
37:29
Play later
Play later
Lists
Like
Liked
37:29
The top priority on the CIS Critical Security Controls list has never changed: inventory and control of enterprise assets. Yet it remains one of the most challenging controls to implement, much less master. The refrain, "you can't secure what you don't know about" is as old as information security itself. Complicating this task is the fact that imp…
…
continue reading
1
103 Matt Cain interview on Lady of Mann, Dunkirk Little Ship, Manxmen in WW2
2:03:18
2:03:18
Play later
Play later
Lists
Like
Liked
2:03:18
Boat enthusiast Matt Cain enthralls us with the history and restoration project behind one of Dunkirk's most famous rescue ships. The Lady of Mann from the Isle of Man. Matt and Paul discuss the Dunkirk operation and stories behind it. Manx veterans talk about their experiences on Manx Radio. "Scary, fascinating and hilarious" Please do subscribe o…
…
continue reading
1
Let’s Get Real About Where AI can Help SecOps & AI, Automation & Low-Code - Mike Lyborg, Brandon Potter - ESW #373
32:22
32:22
Play later
Play later
Lists
Like
Liked
32:22
Swimlane and GenAI Join Swimlane CISO, Mike Lyborg and Security Weekly’s Mandy Logan as they cut through the AI peanut butter! While Generative AI is the not-so-new hot topic, it's also not the first time the cybersecurity industry has embraced emerging technology that can mimic human actions. Security automation and its ability to take action on b…
…
continue reading
1
The end of the road for some cyber startups & making detection actually work! - Vivek Bhandari, Vivek Ramachandran, Mike Lyborg, Brandon Potter - ESW #373
2:26:35
2:26:35
Play later
Play later
Lists
Like
Liked
2:26:35
This week, in the enterprise security news, A funding that looks like an acquisition And two for-sure acquisitions Rumors that there are funding problems for early stage cyber startups, and we’ll see a lot more acquisitions before the end of the year Speaking of rumors, Crowdstrike did NOT like last week’s Action1 acquisition rumor! Shortening dete…
…
continue reading
1
The end of the road for some cyber startups & making detection actually work! - ESW #373
1:17:58
1:17:58
Play later
Play later
Lists
Like
Liked
1:17:58
This week, in the enterprise security news, A funding that looks like an acquisition And two for-sure acquisitions Rumors that there are funding problems for early stage cyber startups, and we’ll see a lot more acquisitions before the end of the year Speaking of rumors, Crowdstrike did NOT like last week’s Action1 acquisition rumor! Shortening dete…
…
continue reading
1
Secure Web Gateways Have Failed Us & Using AI to Prevent the Next CrowdStrike Outage - Vivek Ramachandran, Vivek Bhandari - ESW #373
36:38
36:38
Play later
Play later
Lists
Like
Liked
36:38
SquareX With employees spending most of their working hours on the browser, web attacks are one of the biggest attack vectors today. Yet, both enterprises and security vendors today aren’t focused on securing the browser – a huge risk given that attackers can easily bypass Secure Web Gateways, SASE and SSE solutions. This segment will demonstrate t…
…
continue reading
CONTROL POD - When circumstances prevent us from being able to perform an experiment, it's time for Control Pod. Tickets to Alexander's Edinburgh Fringe run https://tickets.edfringe.com/whats-on/alexander-bennett-emotional-daredevil Follow the experiment (https://twitter.com/BYesterdayPod - https://www.instagram.com/byesterdaypod/?locale=zh-hans) F…
…
continue reading
1
Operational Resilience in Healthcare & Zscaler Uncovers Record-Breaking Ransom - Marty Momdjian, Brett Stone-Gross - ESW #372
32:10
32:10
Play later
Play later
Lists
Like
Liked
32:10
Many cybersecurity experts are calling recent attacks on healthcare more sophisticated than ever. One attack disrupted prescription drug orders for over a third of the U.S. and has cost $1.5 billion in incident response and recovery services. Separately, an operator of over 140 hospitals and senior care facilities in the U.S. was also victimized. T…
…
continue reading
1
Devo Launches New Capabilities & Revolutionizing Cyber Resilience - Rakesh Nair, Rekha Shenoy - ESW #372
31:43
31:43
Play later
Play later
Lists
Like
Liked
31:43
Devo, the security analytics company, recently launched data orchestration, a data analytics cloud, and security operations center (SOC) workflow enhancements. Enterprise security teams are struggling with growing data volumes—and they’re also up against headcount and budget constraints. These solutions offer security teams data control, cost optim…
…
continue reading
1
Highlights from BlackHat/DefCon, Vulnerabilities, and Cyber Marketing Challenges - ESW #372
1:05:47
1:05:47
Play later
Play later
Lists
Like
Liked
1:05:47
In this conversation, the hosts discuss patchless patching, vulnerabilities in the Windows TCP/IP stack, and the trustworthiness of Microsoft. They highlight the challenges of marketing in the cybersecurity industry and the importance of building trust with customers. The conversation also touches on the need for vendors to prioritize security and …
…
continue reading
1
Highlights from BlackHat/DefCon, Vulnerabilities, and Cyber Marketing Challenges - Brett Stone-Gross, Rakesh Nair, Rekha Shenoy, Marty Momdjian - ESW #372
2:08:47
2:08:47
Play later
Play later
Lists
Like
Liked
2:08:47
In this conversation, the hosts discuss patchless patching, vulnerabilities in the Windows TCP/IP stack, and the trustworthiness of Microsoft. They highlight the challenges of marketing in the cybersecurity industry and the importance of building trust with customers. The conversation also touches on the need for vendors to prioritize security and …
…
continue reading
1
102 Arctic Convoy with Armageddon in the Arctic Ocean
2:36:34
2:36:34
Play later
Play later
Lists
Like
Liked
2:36:34
A family memoir from Paul Gill from USA who sailed in the Arctic convoys during the Second World War. "The enemy planes were flying just a few feet over the surface of the water on our starboard bow, towards the head of the convoy. I started to count them: 1, 2...13, 14…“Damn it! Look at them!” I yelled." "The general alarm sounded for submarine at…
…
continue reading