show episodes
 
Artwork

1
Permanent Plus One

Allen Woods & Kyla Woods

Unsubscribe
Unsubscribe
Monthly
 
The Permanent Plus One Podcast - "Where Marriages go to Live" - Hosted and produced by Allen & Kyla Woods, Permanent Plus One takes you into the joy, pain, lessons, and blessings of marriage (and parenting). The show was birthed out of Allen & Kyla's mission to provide a platform for couples to be supported and encouraged, and for marriage to be celebrated. Sometimes it feels like the work that is required for marriage to be successful overshadows the beautiful outcomes of that work. The Cin ...
  continue reading
 
Artwork

1
Parking Safe Plus

Parking Safe Plus

Unsubscribe
Unsubscribe
Monthly
 
Parking Safe Plus provides a wide range of safety equipment for parking lots and warehouses. We have everything you need to keep your property safe, including bollards, barriers, signs, and more. Contact us today for a free consultation.
  continue reading
 
Artwork
 
DJ Rodrigo Tancredi From the glorious sunshine of Brazil to the thriving cultural melting pot of London, DJ producer Rodrigo Tancredi has been a permanent feature in the pantheon of House Music for over a decade. He has been making the biggest of statements on the most iconic of stages including Egg Club London, Es Paradise Ibiza, Ibiza Rocks, Savannah Ibiza, Pikes Ibiza, IMS Malta at Dragonara Casino, Ministry of Sound, Fire Club, Electric Brixton, and many more. To have performed at these ...
  continue reading
 
One episode about politics, then one episode about pop culture. And repeat. Note: Episodes are published once (a) editing is complete and (b) a reasonable amount of time has elapsed from the publishing of the previous episode. The plan is to have 2.5 to 3 hours of content released per month (with months starting on the 24th), which should be roughly 3 episodes.
  continue reading
 
Artwork

1
Chameleon: Dr. Dante

Campside Media / Sony Music Entertainment

Unsubscribe
Unsubscribe
Monthly
 
Dr. Ronald Dante is a talented hypnotist (and not an actual doctor) whose mind-bending schemes span decades. Dante worked the smoke-filled nightclubs of 1960s Hollywood and rode the self-help craze of the 1980s and 90s, hypnotizing women out of their fortunes, taking out hits on his rivals and opening up one of the biggest fake universities in history. Host Sam Mullins tracks Dante through yacht clubs, prison cells, trailer parks and theme parks to uncover the unbelievable true story of the ...
  continue reading
 
Artwork

1
2 Dope Queens

WNYC Studios

Unsubscribe
Unsubscribe
Monthly
 
Phoebe Robinson and Jessica Williams are funny. They’re black. They’re BFFs. And they host a a live comedy show in Brooklyn. Join the 2 Dope Queens, along with their favorite comedians, for stories about sex, romance, race, hair journeys, living in New York, and Billy Joel. Plus a whole bunch of other S**t. WNYC Studios is a listener-supported producer of other leading podcasts including Radiolab, Snap Judgment, Sooo Many White Guys, On the Media, Here’s the Thing with Alec Baldwin and many ...
  continue reading
 
Artwork

1
VIBE Mentor

Rebecca Dawn

Unsubscribe
Unsubscribe
Monthly
 
Entrepreneur, Podcaster, YouTuber, certified Somatic Therapist, and Personal Mentor Rebecca Dawn is helping you overcome the blocks that hold you back so that you can step into your purpose and manifest abundance through it! Rebecca Dawn, your VIBE Mentor, is a powerful and gifted mentor and healer who holds a unique ability to identify the root cause of what holds you back while holding a safe place for your healing. Rebecca is elevating lives with her empathic and intuitive insights and in ...
  continue reading
 
Video and Audio Presentations about Tantra Yoga as a Spiritual Path and for personal healing. Topics include Sacred Sexuality, balancing body, mind and Spirit, enlightenment, Self-realization, meditation, Tantra and related yoga practices, non-dualism, non-duality, Advaita Vedanta, Kashmir Shaivism, and Tantric perspectives on Life, consciousness and the individual Self.
  continue reading
 
Loading …
show series
 
Suddenly SIEMs are all over the news! In a keynote presentation, Crowdstrike CEO George Kurtz talked about the company's "next-gen" SIEM. Meanwhile, Palo Alto, who was taken to task by some for not having an active presence on the RSAC expo floor, hits the headlines for acquiring IBM's SIEM product, just to shut it down! Meanwhile, LogRhythm and Ex…
  continue reading
 
Has cryptocurrency done more harm than good? Our guest for this segment has some interesting views on its impacts! Vulnrichment (I just like saying that word), Trustworthy Computing Memo V2, SSID confusion, the Flipper Zero accessory for Dads, the state of exploitation, Hackbat, Raspberry PI Connect, leaking VPNs, exploiting faster?, a new Outlook …
  continue reading
 
Everyone is interested in generative AIs and LLMs, and everyone is looking for use cases and apps to apply them to. Just as the early days of the web inspired the original OWASP Top 10 over 20 years ago, the experimentation and adoption of LLMs has inspired a Top 10 list of their own. Sandy Dunn talks about why the list looks so familiar in many wa…
  continue reading
 
Trump's trial is well underway! In part 1 of this 2 part conversation, we start off with some undercard topics first: racial prejudice, treatment of animals, and various RFK Jr. news. Since I didn't want this episode to be all undercard matches, I also included the first part of the title match, our discussion about the gag order! This episode is d…
  continue reading
 
In today's enterprises, the Identity Access Management (IAM) System is the key to a business' critical operations. But that IAM environment is more vulnerable than most security executives realize. Segment Resources: https://www.mightyid.com/articles/the-r-in-itdr-the-missing-piece-in-identity-threat-detection-and-response https://www.mightyid.com/…
  continue reading
 
In this RSAC 2024 South Stage Keynote, Mikko Hyppönen will look back at the past decade of ransomware evolution and explore how newer innovations, like AI, are shaping its future. Illuminating the Cybersecurity Path: A Conversation with Jeremiah Grossman Join us for a compelling episode featuring Jeremiah Grossman, a prominent figure in the cyberse…
  continue reading
 
A lot of AI security has nothing to do with AI -- things like data privacy, access controls, and identity are concerns for any new software and in many cases AI concerns look more like old-school API concerns. But...there are still important aspects to AI safety and security, from prompt injection to jailbreaking to authenticity. Caleb Sima explain…
  continue reading
 
Inspired by my co-host Jason Albuquerque, this quarter's Say Easy, Do Hard segment is Train How You Fight. In part 1, we discuss the importance of training for a cyber incident. However, lots of organizations do not take it seriously, causing mistakes during an actual cyber incident. How will the lack of preparation impact your organization during …
  continue reading
 
In this episode, Woody and I delve into some side issues. We delve into OJ Simpson and comparing his trial to Trump's, older athletes that are still playing or returning to their sports, local news about Key Bridge and Senator Cardin retiring. I'm experimenting a little bit with loudness normalization, since I feel like there's been too much differ…
  continue reading
 
It's the most boring part of incident response. Skip it at your peril, however. In this interview, we'll talk to Joe Gross about why preparing for incident response is so important. There's SO MUCH to do, we'll spend some time breaking down the different tasks you need to complete long before an incident occurs. Resources 5 Best Practices for Build…
  continue reading
 
The Security Weekly crew discusses some of the latest articles and research in cryptography and some background relevant subtopics including the race against quantum computing, key management, creating your own crypto, selecting the right crypto and more! https://www.globalsecuritymag.com/keysight-introduces-testing-capabilities-to-strengthen-post-…
  continue reading
 
Companies deploy tools (usually lots of tools) to address different threats to supply chain security. Melinda Marks shares some of the chaos those companies still face when trying to prioritize investments, measure risk, and scale their solutions to keep pace with their development. Not only are companies still figuring out supply chain, but now th…
  continue reading
 
In this, the final episode of Get 2 the Point, we start out by recapping the series. Then, we talk about the U.S. Senate, including the history of the filibuster and the problem of aging Senators who don't have term limits. After that, we speculate on where the U.S. political landscape is going from here. Then we smoothly segue from discussing the …
  continue reading
 
A hybrid workforce requires hybrid identity protection. But what are the threats facing a hybrid workforce? As identity becomes the new perimeter, we need to understand the attacks that can allow attackers access to our applications. Eric Woodruff, Product Technical Specialist at Semperis, joins Business Security Weekly to discuss those attacks, in…
  continue reading
 
On February 27, 2024, PCAST (President’s Council of Advisors on Science and Technology) sent a report to the President with recommendations to bolster the resilience and adaptability of the nation’s cyber-physical infrastructure resources. Phil was part of the team that worked on the report and comes on the show to talk about what was recommended a…
  continue reading
 
A clear pattern with startups getting funding this week are "autonomous" products and features. Automated detection engineering Autonomously map and predict malicious infrastructure ..."helps your workforce resolve their own security issues autonomously" automated remediation automated compliance management & reporting I'll believe it when I see it…
  continue reading
 
How can open source projects find a funding model that works for them? What are the implications with different sources of funding? Simon Bennetts talks about his stewardship of Zed Attack Proxy and its journey from OWASP to OpenSSF to an Open Source Fellowship with Crash Override. Mark Curphy adds how his experience with OWASP and the appsec commu…
  continue reading
 
Since 2016, we been hearing about the impending impact of CMMC. But so far, it's only been words. That looks to be changing. Edward Tourinsky, Founder & Managing Principal at DTS, joins Business Security Weekly to discuss the coming impact of CMMC v3. Edward will cover: The background of CMMC Standardization of CMMC CMMC v3 changes and implementati…
  continue reading
 
Do you feel tired and exhausted all the time? Have you found yourself asking "why am I so tired" or "why do I never feel rested"? This podcast will share 11 reasons why we feel so tired and exhausted and what to do about it. Link Tree - pensight.com/x/vibementorBy Rebecca Dawn
  continue reading
 
In this episode, Woody and I get all caught up on current events again. We start with a little more on the eclipse (mainly to hear about Woody's experience), then we address Iran vs Israel, the Trump hush money payments trial, new extreme Abortion laws in Arizona and Florida, how it seems like neither Trump nor Biden could possibly win (and yet...)…
  continue reading
 
Protecting a normal enterprise environment is already difficult. What must it be like protecting a sports team? From the stadium to merch sales to protecting team strategies and even the players - securing an professional sports team and its brand is a cybersecurity challenge on a whole different level. In this interview, we'll talk to Joe McMann a…
  continue reading
 
Sometimes, it's right in the middle of the day, and suddenly the moon gets right between you and the sun and it gets really dark out for a few minutes. Likewise, we take a break from our usual series of politics and pop culture for this episode. I took a trip through Tennessee, Alabama, Mississippi, Arkansas, Missouri, Illinois, and Kansas, schedul…
  continue reading
 
Version 4.0 of the Payment Card Industry Data Security Standard (PCI DSS) puts greater emphasis on application security than did previous versions of the standard. It also adds a new “customized approach” option that allows merchants and other entities to come up with their own ways to comply with requirements, and which also has implications for a…
  continue reading
 
What Is The Right Diet For Spiritual Beings? What is the Jesus diet? What did Christ eat? Is being vegetarian or vegan required to be spiritual? Is it ok for spiritual people to eat meat or animal product? In this podcast I share my journey with finding the right diet that works for me. Link Tree - pensight.com/x/vibementor…
  continue reading
 
There are as many paths into infosec as there are disciplines within infosec to specialize in. Karan Dwivedi talks about the recent book he and co-author Raaghav Srinivasan wrote about security engineering. There's an appealing future to security taking on engineering roles and creating solutions to problems that orgs face. We talk about the breadt…
  continue reading
 
Startup founders dream of success, but it's much harder than it looks. As a former founder, I know the challenges of cultivating an idea, establishing product market fit, growing revenue, and finding the right exit. Trust me, it doesn't always end well. In this interview, we welcome Seth Spergel, Managing Partner at Merlin Ventures, to discuss how …
  continue reading
 
In the days when Mirai emerged and took down DynDNS, along with what seemed like half the Internet, DDoS was as active a topic in the headlines as it was behind the scenes (check out Andy Greenberg's amazing story on Mirai on Wired). We don't hear about DDoS attacks as much anymore. What happened? Well, they didn't go away. DDoS attacks are a more …
  continue reading
 
Jim joins the Security Weekly crew to discuss all things supply chain! Given the recent events with XZ we still have many topics to explore, especially when it comes to practical advice surrounding supply chain threats. Ahoi new VM attacks ahead! HTTP/2 floods, USB Hid and run, forwarded email tricks, attackers be scanning, a bunch of nerds write s…
  continue reading
 
Welcome to the Exist party podcast, where we're taking you on a nostalgic journey from the 90s to today, featuring the best in house and electronic classics music. Get ready to dance as we take you through a journey of sounds that have defined our community over the years. Join us for the ultimate celebration on April 20th from 2pm until 10pm at El…
  continue reading
 
We look into the supply chain saga of the XZ Utils backdoor. It's a wild story of a carefully planned long con to add malicious code to a commonly used package that many SSH connections rely on. It hits themes from social engineering and abuse of trust to obscuring the changes and suppressing warnings. It also has a few lessons about software devel…
  continue reading
 
In this discussion, we focus on vendor/tool challenges in infosec, from a security leader's perspective. To quote our guest, Ross, "running a security program is often confused with shopping". You can't buy an effective security program any more than you can buy respect, or a black belt in kung fu (there might be holes in these examples, but you ho…
  continue reading
 
Special note: I'm re-releasing this on April 8th, which is the day that a full solar eclipse is occurring across much of the middle of the United States. If all is going according to plan, I'm out in Missouri now so that I can watch it from the zone of totality! It's also part of a trip where I'm visiting six states in that west-Tennessee general a…
  continue reading
 
As most of you have probably heard there was a scary supply chain attack against the open source compression software called "xz". The security weekly hosts will break down all the details and provide valuable insights. https://blog.qualys.com/vulnerabilities-threat-research/2024/03/29/xz-utils-sshd-backdoor https://gynvael.coldwind.pl/?id=782 http…
  continue reading
 
NVD checked out, then they came back? Maybe? Should the xz backdoor be treated as a vulnerability? Is scan-driven vulnerability management obsolete when it comes to alerting on emerging threats? What were some of the takeaways from the first-ever VulnCon? EPSS is featured in over 100 security products, but is it properly supported by those that ben…
  continue reading
 
Loading …

Quick Reference Guide