Paul Metcalf public
[search 0]
More
Download the App!
show episodes
 
Artwork
 
Your online round up of all things Water Polo in the UK. Host, Paul Metcalfe will be joined high profile guests from the water polo community to chat through thoughts and opinions. Get your questions in via the Facebook page!
  continue reading
 
Dunkirk, D-Day, North Africa, Sicily, Italy, Omaha, USAF, RAF, POWs, Second World War Stories, Memoirs & interviews - Britain, USA, Australia, Canada … all the forces … WW2. ... Over 500 5-star ratings. "Thank you for what you are doing. It's incredible and I'm absolutely hooked" AB
  continue reading
 
Artwork

1
Born Yesterday

Andy Barr and Alexander Bennett

Unsubscribe
Unsubscribe
Monthly
 
A podcast experiment conducted by comedians Andy Barr (@SomeNiceFun) and Alexander Bennett (@AlexyBennett). Barr and Bennett have been cloning themselves and the clones are idiots - they know nothing, they were literally born yesterday. How do you explain everything to someone who doesn't know anything? Every episode, guest comedians attempt to find out. Hosted on Acast. See acast.com/privacy for more information.
  continue reading
 
Artwork
 
Hosted by Adrian Sanabria, Tyler Shields, Katie Teitler-Santullo, Darwin Salazar, and Sean Metcalf. If you’re looking for advice and information on enterprise cybersecurity solutions, look no further than Enterprise Security Weekly! We give you an “insider” perspective into security vendors, including coverage on new product announcements, integrations, funding, M&A, and more! Adrian, Tyler, Katie, and Sean have unique perspectives on the enterprise security landscape. All four hosts are for ...
  continue reading
 
Hosted by Adrian Sanabria, Tyler Shields, Katie Teitler-Santullo, Darwin Salazar, and Sean Metcalf. If you’re looking for advice and information on enterprise cybersecurity solutions, look no further than Enterprise Security Weekly! We give you an “insider” perspective into security vendors, including coverage on new product announcements, integrations, funding, M&A, and more! Adrian, Tyler, Katie, and Sean have unique perspectives on the enterprise security landscape. All four hosts are for ...
  continue reading
 
Lyngso Fitness Academy presents: The Missing Piece, an audio offering about the mission, mindset and mechanics of completely transforming your life.Ever wondered what is holding your back from your best life? Your best self? You know that something is missing.Welcome to the Missing Piece. Hosted by Paul Lyngso, this podcast provides you everything you need to finally achieve the next level of satisfaction in your life. By transforming your life from the inside out, Paul offers actionable ste ...
  continue reading
 
Welcome to The Greg Wientjes Show! In this podcast, I decode the minds of world-class technology inventors and business leaders. My interviews explore the key tools, strategies and insights used by these great inventors and entrepreneurs that allow them to achieve and innovate -- tools and techniques that you can emulate, learn from, and apply to your own life for greater creativity and fulfillment. The first few episodes include The Father of the Internet, Vint Cerf; Ray Kurzweil, inventor ...
  continue reading
 
Artwork

1
Patriot on Purpose

Adam Lantelme and Nate Hopkins

Unsubscribe
Unsubscribe
Monthly+
 
Every Wednesday hosts Nate Hopkins and Adam Lantelme and their fascinating guests will be delving into the heart of what it means to be secure, healthy, wealthy, happy and free in a n uncertain world. We want you to feel confident in your ability to face life’s challenges head-on – whether growing a business, being a great parent, improving your health, bolstering your safety, or living a life of freedom and liberty. We draw inspiration from the iconic symbol of freedom, the Statue of Libert ...
  continue reading
 
Loading …
show series
 
This week, the cybersecurity industry's most basic assumptions under scrutiny. Following up our conversation with Wolfgang Goerlich, where he questions the value of phishing simulations, we discuss essays that call into question: the maturity of the industry the supposed "talent gap" with millions of open jobs despite complaints that this industry …
  continue reading
 
In this episode, we explore some compelling reasons for transitioning from traditional SOAR tools to next-generation SOAR platforms. Discover how workflow automation and orchestration offers unparalleled speed and flexibility, allowing organizations to stay ahead of evolving security threats. We also delve into how advancements in AI are driving th…
  continue reading
 
A month ago, my friend Wolfgang Goerlich posted a hot take on LinkedIn that is less and less of a hot take these days. He posted, "our industry needs to kill the phish test",and I knew we needed to have a chat, ideally captured here on the podcast. I've been on the fence when it comes to phishing simulation, partly because I used to phish people as…
  continue reading
 
A month ago, my friend Wolfgang Goerlich posted a hot take on LinkedIn that is less and less of a hot take these days. He posted, "our industry needs to kill the phish test",and I knew we needed to have a chat, ideally captured here on the podcast. I've been on the fence when it comes to phishing simulation, partly because I used to phish people as…
  continue reading
 
In this part of the experiment, the clones are joined by Rob Copland (https://www.instagram.com/robertdcopland/) and Ali Brice (https://www.instagram.com/twicebricebrice/) BUY TICKETS TO BORN YESTERDAY LIVE ON THE 20th OCTOBER https://podlifeevents.com/event-details/born-yesterday---live-from-cheerful-earful-podcast-festival-20th-oct-tickets Follow…
  continue reading
 
Ever wondered what it's like to be responsible for the cybersecurity of a sports team? How about when that sports team is one of the world's most successful Formula One teams? I can't describe how excited we are to share this interview. This interview is basically two huge F1 nerds who happen to also be cybersecurity veterans asking everything they…
  continue reading
 
We are a month away from Oktane -- the biggest identity event of the year. Okta is bringing thousands of identity industry thought leaders, IT and security executives, and other tech leaders together on October 15-17 to discuss the changing landscape for security and identity, how organizations are putting identity first, new Okta products, and mor…
  continue reading
 
This week, in the enterprise security news, Cribl, Zafran, and US states raise funding Cisco, Check Point, Salesforce, and Absolute Software acquire cybersecurity startups AI Security products are picking up steam You probably shouldn’t be too worried about Yubikey cloning Instead, you should be more worried about malicious npm packages! The White …
  continue reading
 
This week, in the enterprise security news, Cribl, Zafran, and US states raise funding Cisco, Check Point, Salesforce, and Absolute Software acquire cybersecurity startups AI Security products are picking up steam You probably shouldn’t be too worried about Yubikey cloning Instead, you should be more worried about malicious npm packages! The White …
  continue reading
 
Check out this episode from the ESW Vault, hand picked by main host Adrian Sanabria! This episode was initially published on April 21 2023. Quantum computers are scaling rapidly. Soon, they will be powerful enough to solve previously unsolvable problems. But they come with a global challenge: fully-realized quantum computers will be able to break s…
  continue reading
 
Check out this episode from the ESW Vault, hand picked by main host Adrian Sanabria! This episode was initially published on April 21 2023. Quantum computers are scaling rapidly. Soon, they will be powerful enough to solve previously unsolvable problems. But they come with a global challenge: fully-realized quantum computers will be able to break s…
  continue reading
 
CONTROL POD - When circumstances prevent us from being able to perform an experiment, it's time for Control Pod. Follow the experiment (https://twitter.com/BYesterdayPod - https://www.instagram.com/byesterdaypod/?locale=zh-hans) Follow Andy Barr (https://linktr.ee/andybarrcomedy) and Alexander Bennett (https://linktr.ee/alexanderbennettcomedian) Em…
  continue reading
 
In this interview, Maor Bin, CEO and Co-Founder of Adaptive Shield, discusses the evolving landscape of SaaS Security. He highlights the challenges posed by the security gap resulting from the rapid adoption of SaaS applications and why SaaS security is beyond just misconfiguration management. Segment Resources: https://www.adaptive-shield.com/land…
  continue reading
 
I often say that it isn't the concepts or ideas in cybersecurity that are bad, but the implementations of them. Sometimes the market timing is just wrong and the industry isn't ready for a particular technology (e.g. enterprise browsers). Other times, the technology just isn't ready yet (e.g. SIEMs needed better database technology and faster stora…
  continue reading
 
The top priority on the CIS Critical Security Controls list has never changed: inventory and control of enterprise assets. Yet it remains one of the most challenging controls to implement, much less master. The refrain, "you can't secure what you don't know about" is as old as information security itself. Complicating this task is the fact that imp…
  continue reading
 
The top priority on the CIS Critical Security Controls list has never changed: inventory and control of enterprise assets. Yet it remains one of the most challenging controls to implement, much less master. The refrain, "you can't secure what you don't know about" is as old as information security itself. Complicating this task is the fact that imp…
  continue reading
 
Boat enthusiast Matt Cain enthralls us with the history and restoration project behind one of Dunkirk's most famous rescue ships. The Lady of Mann from the Isle of Man. Matt and Paul discuss the Dunkirk operation and stories behind it. Manx veterans talk about their experiences on Manx Radio. "Scary, fascinating and hilarious" Please do subscribe o…
  continue reading
 
Swimlane and GenAI Join Swimlane CISO, Mike Lyborg and Security Weekly’s Mandy Logan as they cut through the AI peanut butter! While Generative AI is the not-so-new hot topic, it's also not the first time the cybersecurity industry has embraced emerging technology that can mimic human actions. Security automation and its ability to take action on b…
  continue reading
 
This week, in the enterprise security news, A funding that looks like an acquisition And two for-sure acquisitions Rumors that there are funding problems for early stage cyber startups, and we’ll see a lot more acquisitions before the end of the year Speaking of rumors, Crowdstrike did NOT like last week’s Action1 acquisition rumor! Shortening dete…
  continue reading
 
This week, in the enterprise security news, A funding that looks like an acquisition And two for-sure acquisitions Rumors that there are funding problems for early stage cyber startups, and we’ll see a lot more acquisitions before the end of the year Speaking of rumors, Crowdstrike did NOT like last week’s Action1 acquisition rumor! Shortening dete…
  continue reading
 
SquareX With employees spending most of their working hours on the browser, web attacks are one of the biggest attack vectors today. Yet, both enterprises and security vendors today aren’t focused on securing the browser – a huge risk given that attackers can easily bypass Secure Web Gateways, SASE and SSE solutions. This segment will demonstrate t…
  continue reading
 
CONTROL POD - When circumstances prevent us from being able to perform an experiment, it's time for Control Pod. Tickets to Alexander's Edinburgh Fringe run https://tickets.edfringe.com/whats-on/alexander-bennett-emotional-daredevil Follow the experiment (https://twitter.com/BYesterdayPod - https://www.instagram.com/byesterdaypod/?locale=zh-hans) F…
  continue reading
 
Many cybersecurity experts are calling recent attacks on healthcare more sophisticated than ever. One attack disrupted prescription drug orders for over a third of the U.S. and has cost $1.5 billion in incident response and recovery services. Separately, an operator of over 140 hospitals and senior care facilities in the U.S. was also victimized. T…
  continue reading
 
Devo, the security analytics company, recently launched data orchestration, a data analytics cloud, and security operations center (SOC) workflow enhancements. Enterprise security teams are struggling with growing data volumes—and they’re also up against headcount and budget constraints. These solutions offer security teams data control, cost optim…
  continue reading
 
In this conversation, the hosts discuss patchless patching, vulnerabilities in the Windows TCP/IP stack, and the trustworthiness of Microsoft. They highlight the challenges of marketing in the cybersecurity industry and the importance of building trust with customers. The conversation also touches on the need for vendors to prioritize security and …
  continue reading
 
In this conversation, the hosts discuss patchless patching, vulnerabilities in the Windows TCP/IP stack, and the trustworthiness of Microsoft. They highlight the challenges of marketing in the cybersecurity industry and the importance of building trust with customers. The conversation also touches on the need for vendors to prioritize security and …
  continue reading
 
A family memoir from Paul Gill from USA who sailed in the Arctic convoys during the Second World War. "The enemy planes were flying just a few feet over the surface of the water on our starboard bow, towards the head of the convoy. I started to count them: 1, 2...13, 14…“Damn it! Look at them!” I yelled." "The general alarm sounded for submarine at…
  continue reading
 
Loading …

Quick Reference Guide