show episodes
 
Think of this as you've finished work for the day, or you need encouragement, or simply an outlet. Come on in, have a drink, and lets chat! The subject matter I’m going to be discussing will be about real world stuff presented with certain biblical and spiritual beliefs. Everything ranging from the Jesus tip, agree to disagree controversy, why you should celebrate your birthday after 40, an alien invasion, truth versus fact, struggles of being an entrepreneur, context of the Ten Commandments ...
  continue reading
 
Much of Pre-Nicene Christian history has been altered, erased and in many cases, completely fabricated. But with every episode of Pre-Nicene Perspective we take you closer to the truth through the prism of The Very First Bible of 144 A.D. Hosted by Presbyter Darren Kelama with theological assistance from MarcioniteChurch.org The original, unedited Christian canon of the first bible serves as the cornerstone on which our programming is based. Join host Darren Kelama and the PCTV team every we ...
  continue reading
 
Investing, business, finance &economics - Mark Homer has the experience to help you with many of your questions & challenges. Mark My Words is a successful, eccentric & introverted businessman’s experience of 20 years with no waffle, ads, bravado or big pitches. Mark will interview the worlds most successful business, finance & money experts as well as impart his knowledge in a factual, direct manner. Mark runs & owns multiple businesses & property portfolios so teaches you what he does on a ...
  continue reading
 
Loading …
show series
 
Find new flaws in UEFI using STASE, combining vulnerabilities to exploit Sonicwall Devices, remote BMC exploits, Netgear patches, and not a lot of information, 22 minutes before exploited, if the secrets were lost, we'd all be in screwed, Exim has not been replaced by something better and its vulnerable, CISA's red team reports, and attackers use d…
  continue reading
 
Thinking about getting a 3D printer or have one and need a good primer? Check out this segment, we live 3D print a Captain Crunch whistle and talk all about 3D printing for hackers! Segment Resources: Slides used in this segment: https://files.scmagazine.com/wp-content/uploads/2024/07/3D-Printing-for-Hackers.pdf Major 3D Printer Websites: https://v…
  continue reading
 
Thinking about getting a 3D printer or have one and need a good primer? Check out this segment, we live 3D print a Captain Crunch whistle and talk all about 3D printing for hackers! Segment Resources: Slides used in this segment: https://files.scmagazine.com/wp-content/uploads/2024/07/3D-Printing-for-Hackers.pdf Major 3D Printer Websites: https://v…
  continue reading
 
How can LLMs be valuable to developers as an assistant in finding and fixing insecure code? There are a lot of implications in trusting AI or LLMs to not only find vulns, but in producing code that fixes an underlying problem without changing an app's intended behavior. Stuart McClure explains how combining LLMs with agents and RAGs helps make AI-i…
  continue reading
 
How can LLMs be valuable to developers as an assistant in finding and fixing insecure code? There are a lot of implications in trusting AI or LLMs to not only find vulns, but in producing code that fixes an underlying problem without changing an app's intended behavior. Stuart McClure explains how combining LLMs with agents and RAGs helps make AI-i…
  continue reading
 
Cyber insurance underwriting is all over the map. With such a variation in application requirements, how should small and medium businesses prepare to receive the best policy for the price? Brian Fritton joins Business Security Weekly to discuss a systematic approach to preparing for cyber insurance. By working with the underwriters, this approach …
  continue reading
 
Cyber insurance underwriting is all over the map. With such a variation in application requirements, how should small and medium businesses prepare to receive the best policy for the price? Brian Fritton joins Business Security Weekly to discuss a systematic approach to preparing for cyber insurance. By working with the underwriters, this approach …
  continue reading
 
Send us a Text Message. Are you living in the shadows of your past mistakes? Join me for a journey through history and personal reflection as we uncover the impact of unresolved regrets and how they can hinder our ability to live fully in the present. From the infamous betrayals of Benedict Arnold to the scientific burdens of Robert Oppenheimer, we…
  continue reading
 
I'm always thrilled to chat with ex-analysts, and Henrique Teixeira can cover a lot of ground with us on the topic of identity management and governance. The more I talk to folks about IAM/IGA, the more I'm shocked at how little has changed. If anything, it seems like we've gone backwards a bit, with the addition of cloud SaaS, mobile devices, and …
  continue reading
 
Bats in your headset, Windows Wifi driver vulnerabilities, Logitech's dongles, lighthttpd is heavy with vulnerabilities, node-ip's not vulnerability, New Intel CPU non-attacks, Blast Radius, Flipper Zero alternatives, will OpenSSH be exploited, emergency Juniper patches, and the D-Link botnet grows. Show Notes: https://securityweekly.com/psw-834…
  continue reading
 
In this week's enterprise security news, Seed rounds are getting huge Lots of funding for niche security vendors Rapid7 acquires Noetic Cyber but Rapid7 is also rumored to sell itself! Slack battles infostealers The loss of Chevron deference impacts cyber Should cybersecurity put up a no vacancy sign? Figma and Google both make some embarrassing mi…
  continue reading
 
I'm always thrilled to chat with ex-analysts, and Henrique Teixeira can cover a lot of ground with us on the topic of identity management and governance. The more I talk to folks about IAM/IGA, the more I'm shocked at how little has changed. If anything, it seems like we've gone backwards a bit, with the addition of cloud SaaS, mobile devices, and …
  continue reading
 
Iceman comes on the show to talk about RFID and NFC hacking including the tools, techniques, and hardware. We'll also talk about the ethics behind the disclosure of vulnerabilities and weaknesses in these systems that are used in everything from building access to cars. Segment Resources: Youtube channel - https://www.youtube.com/@iceman1001 Proxma…
  continue reading
 
Bats in your headset, Windows Wifi driver vulnerabilities, Logitech's dongles, lighthttpd is heavy with vulnerabilities, node-ip's not vulnerability, New Intel CPU non-attacks, Blast Radius, Flipper Zero alternatives, will OpenSSH be exploited, emergency Juniper patches, and the D-Link botnet grows. Iceman comes on the show to talk about RFID and N…
  continue reading
 
Mark and Kevin dissect the recent UK general election results, exploring potential impacts on property investment, economic policies, and the future political landscape. Mark also shares his thoughts on navigating the changing market, seizing opportunities amidst current challenges, and adapting investment strategies. KEY TAKEAWAYS Labour's victory…
  continue reading
 
Sandy Carielli and Janet Worthington, authors of the State Of Application Security 2024 report, join us to discuss their findings on trends this year! Old vulns, more bots, and more targeted supply chain attacks -- we should be better at this by now. We talk about where secure design fits into all this why appsec needs to accelerate to ludicrous sp…
  continue reading
 
Sandy Carielli and Janet Worthington, authors of the State Of Application Security 2024 report, join us to discuss their findings on trends this year! Old vulns, more bots, and more targeted supply chain attacks -- we should be better at this by now. We talk about where secure design fits into all this why appsec needs to accelerate to ludicrous sp…
  continue reading
 
On average, CISOs manage 50-75 security products. Many of these products have either not been deployed or only partially deployed, while others overlap of products. How do CISOs effectively consolidate their products to a manageable size? Max Shier, Chief Information Security Officer at Optiv Security, joins Business Security Weekly to discuss tech…
  continue reading
 
On average, CISOs manage 50-75 security products. Many of these products have either not been deployed or only partially deployed, while others overlap of products. How do CISOs effectively consolidate their products to a manageable size? Max Shier, Chief Information Security Officer at Optiv Security, joins Business Security Weekly to discuss tech…
  continue reading
 
Send us a Text Message. What are some characters of the Almighty? In this deeply reflective episode of the Bartender's Perspective, we unravel Gods' character through the biblical story of David sparing King Saul's life as recounted in 1 Samuel 26. Personal anecdotes about various restaurant managers I've worked with help to illustrate these princi…
  continue reading
 
Loading …

Quick Reference Guide