show episodes
 
Artwork
 
Undermine is the definitive Phish podcast. New season coming soon, building on what we've done—seasons on Phish’s genesis in the 1980s, the Phish community, the Baker's Dozen, and Fall '97. Through deep-dives into the music, shows and songs; interviews with people who were there; and discussion about Phish's lasting impact. Undermine is presented by Osiris Media.
  continue reading
 
Artwork

1
Beyond The Pond

Beyond The Pond/Osiris Media

Unsubscribe
Unsubscribe
Monthly
 
Welcome to Beyond The Pond! We’re two massive Phish fans who are using the music of Phish to introduce you to new and interesting music we think you’ll love! Because we love the Phish. We are Phish fans. But sometimes you gotta break out of your comfort zone and go beyond the pond. A proud member of the Osiris Podcast Network. Hosted on Acast. See acast.com/privacy for more information.
  continue reading
 
Insuphishient is a Phish podcast hosted by Matt and Nick, a 500 episodes series dedicated to the music, culture, and unique universe of the greatest band of all time. With no set setlists and no rules, each episode dives into the band, members, hilarious hot takes, and offbeat theories, creating a space for old heads and newcomers alike to enjoy the ride. Just two friends talking Phish, mostly... Expect the (un)expected.
  continue reading
 
The Helping Friendly Podcast (HFPod) explores the music and fan experience of Phish, through interviews and deep dives on shows and tours. Since 2013, we’ve aimed to bring the fan voice into discussions about Phish, and with the help of our guests, we’re still discovering new angles of appreciation for the band. And when the band is on tour, we provide a review of every show the following day with a fan who was there. As one of our listeners said, “this show has impeccable analysis, stats, c ...
  continue reading
 
Artwork

1
Analyze Phish

Earwolf & Harris Wittels, Scott Aukerman

Unsubscribe
Unsubscribe
Monthly
 
Harris and Scott are comedians, music lovers, and friends. Where do they differ? Harris loves Phish, and Scott does not. On Analyze Phish, Harris navigates the vast landscape of Phish's catalogue to find entry points for Scott while trying to explain the live Phish experience without the use of illegal substances.
  continue reading
 
Artwork

1
Hidden Jukebox

Jake Amster and Matthew Amster-Burton

Unsubscribe
Unsubscribe
Monthly
 
Jake Amster and Matthew Amster-Burton, two Seattle music nerds and actual brothers, take you on an audio tour of the best albums of the 90s, from R.E.M. to T.L.C., Snoop Dogg to Phish.
  continue reading
 
Artwork
 
Chris Parker, the founder of WhatIsMyIPAddress.com, interviews guests and tells real-life stories about topics to open your eyes to the danger and traps lurking in the real world, ranging from online scams and frauds to everyday situations where people are trying to take advantage of you—for their gain and your loss. Our goal is to educate and equip you, so you learn how to spot the warning signs of trouble, take quick action, and lower the risk of becoming a victim.
  continue reading
 
Inside Wall Street with Morris Sachs and Liam Allen. Recommended viewing: The Sting Trading Places Groundhog Day YouTube: Charlie DiFrancesca Full Length Speech 1989 Recommended Reading: 1.Modern Times - Paul Johnson 2. Atlas Shrugged- Ayn Rand 3. *redacted* 4. Reminiscences of a Stock Operator- Edwin Lefevre 5. Lessons of History - Will Durant Daily Reading : Grant’s, GaveKal, Macro Tourist, Daily Shot, Anthony Peters, David Zervos, NYPost, FT, WSJ, NYT, SCMP, Chicago Tribune, Real Deal, Ze ...
  continue reading
 
Learn how to break into cybersecurity, build new skills and move up the career ladder. Each week on the Cyber Work Podcast, host Chris Sienko sits down with thought leaders from Carbon Black, IBM, CompTIA and others to discuss the latest cybersecurity workforce trends.
  continue reading
 
A weekly podcast providing fraud prevention and vendor setup training to protect the vendor master file. Immediate takeaways with actionable steps you can implement today into your vendor onboarding and maintenance process to reduce fraud and regulatory fines. Great tips for the Accounts Payable and Procurement teams to clean-up their vendor data, clean-up their vendor processes so that they can pay the right vendor.
  continue reading
 
Artwork

1
Cyber Uncut

Momentum Media

Unsubscribe
Unsubscribe
Monthly+
 
Cyber Uncut brings you the key decision makers and cutting edge innovators shaping Australia's cyber revolution. From cyber security to artificial intelligence and information systems, discover how businesses and government are navigating the transition to a digital future. Join Momentum Media’s Phil Tarrant, defence and national security podcaster, Major General (Ret’d) Dr Marcus Thompson AM – former head of the ADF’s Information Warfare Division, and Liam Garman, editor of Cyber Daily, as ...
  continue reading
 
”Family Tape Tree” is a surreal and absurd fictional podcasted rooted in the world of the improvisational jam band, Phish. It follows Lexi, a sensitive and surly teen, who discovers her deceased father’s collection of Phish cassette tapes from the ’90s while packing for college. Through ”grief magic” Lexi travels into the tapes and relives those memories with younger versions of her parents and their friends. Over the course of several groove-based-psychedelic-infused-head-bobbing-adventures ...
  continue reading
 
Geared towards Deadheads, Phishheads and the jam band community, The Sound Podcast is a music discovery interview style podcast, hosted by Ira Haberman. Featuring Jam Bands and more... much more. Rooted in Americana, Blues, Bluegrass, Country, Folk, Funk, Jazz, Reggae, Rock, Soul but mostly Jam Band music. Here is a small sample of the guests that have been on The Sound Podcast to date: ALO, Anders Osborne, Antibalas, Aqueous, Band of Heathens, Barr Brothers, Blackberry Smoke, Chris Robinson ...
  continue reading
 
Artwork

1
8th Layer Insights

Perry Carpenter | N2K Networks

Unsubscribe
Unsubscribe
Monthly
 
Get ready for a deep dive into what cybersecurity professionals often refer to as the "8th Layer" of security: HUMANS. Welcome to 8th Layer Insights (8Li). This podcast is a multidisciplinary exploration into how the complexities of human nature affect security and risk. Author, security researcher, and behavior science enthusiast Perry Carpenter taps experts for their insights and illumination. Topics include cybersecurity, psychology, behavior science, communication, leadership, and more.
  continue reading
 
Artwork
 
DISCLAIMER: The following podcast is completely fictional. All of the characters, even those based on real people, are fictional. They are just impressions by a weird dude talking to himself for your enjoyment. AboveTheDave takes you on a funny trip into his weird world of jamband fans and musicians that make up this wonderful scene. Each episode features guests and music created by AboveTheDave who impersonates musicians such as Phish, The Grateful Dead, Dave Matthews Band, Allman Brothers ...
  continue reading
 
A successful cyber-attack has taken your company off-line. The FBI and CISA have been contacted. What now? As you know, if this hasn’t already impacted your business (either directly or indirectly), it will. How can you make yourself a harder target, mitigating against cyber-attacks? What does all the terminology mean and why does it matter? What happens if an attack is successful? Join DTC, Inc. as we outline, in a straight-forward manner, many of the issues surrounding cyber security which ...
  continue reading
 
Artwork

1
The New Dad Rock

Steve Nelson & Keith Nottonson

Unsubscribe
Unsubscribe
Monthly
 
Two college radio DJs during the 90s, hosts Keith and Steve helped expose bands like Nirvana, Pavement and PJ Harvey. They went to shows, interviewed musicians and reviewed albums for various zines and papers. They worked security at concerts and once, even did load-in for Phish. Now they’re dads. Whether you want to explore lesser-known music or take a trip down memory lane, tune in to The New Dad Rock. Join hosts Keith and Steve as they navigate the ages together, sharing their love of mus ...
  continue reading
 
The definitive retrospective of one of music’s most memorable festivals, Phish’s Big Cypress. In December of 1999, Phish drew an estimated 80,000 to the Big Cypress Indian Reservation in Florida’s Everglades, making this festival the largest Millennium Eve concert on earth. We look back on the festival 20 years later—and examine the legacy for Phish and the music world. Hosted and narrated by Jesse Jarnow, this five-episode series draws on interviews with members of Phish and its crew, fan m ...
  continue reading
 
Welcome to the This Happened Once Before, a conversation between generational Phish fans. I'm your host, Bill, a Phish fan for 30 years, and I started this podcast to have conversations with younger fans new to the band. We discuss how they found Phish, and what excites them most about the group and then we have a conversation about a show from the band's era from 1988-1996. Let's get the show on the road!
  continue reading
 
Artwork
 
Strange tales of hacking, tech, internet grifters, AI, and security with Jordan & Scott. Are internet hitmen really a thing? What does someone do with a crypto wallet full of millions and a lost password? Did a Minecraft scammer really hack the president? Hacked is a technology show about people hacking things together and apart, with your old pals Jordan Bloemen and Scott Francis Winder. Get at us via get@hackedpodcast.com.
  continue reading
 
Artwork

1
Pod Ween Satan

Jay Hunter and Dave Massey

Unsubscribe
Unsubscribe
Monthly
 
Ween is The Greatest Band in The World. This is the Greatest Podcast in The World about The Greatest Band in The World....Ween. We will introduce you to Ween in all their grandness and splendor. We shall take you on a tour of the entire Ween Catalogue...One album at a time...One song at a time...Until the end of time. Together we will listen to each and every Ween song. Together we will spread the good word of The Boognish. Buckle up Bitch. Step inside this spaceship and take a ride straight ...
  continue reading
 
On Phemale-Centrics we discuss all things Phish from a woman's point of view. Join us as we interview Phish's community members, play games like "Market Price" and discuss the latest goings on in the Phish scene, both on-line and on Lot! Your host is Dawneebee! Co-hosts are a rotating cast of her phriends including Jillian, Kristie, Merry, Baker & Lauren and her husband Jason "Snakey". Hosted on Acast. See acast.com/privacy for more information.
  continue reading
 
A weekly discussion of new developments and the latest cybersecurity threats, including ransomware, malware, phishing schemes, DDoS attacks and more, facing the U.S. industrial sector.
  continue reading
 
Loading …
show series
 
Maybe you’re sick of hearing about phishing schemes and the way hackers are using this strategy to infiltrate your networks, access intellectual data, shut down production, or hold your assets for ransom. If that’s the case, then you’ve made a lot of hackers very happy. And based on Proofpoint’s 2024 State of Phish report, protecting against phishi…
  continue reading
 
Unveiling the Truth: Insights into Cyber Security Awareness and Phishing In a special crossover episode of Cyber Security Today and Hashtag Trending, host Jim Love discusses the biases and challenges in technology marketing research with guest David Shipley, head of Beauceron Security. The conversation examines the significance of security awarenes…
  continue reading
 
Featured Songs: moe. - 10-20-23 - Yoshimi Battles the Pink Robots - Ogden Theatre - Denver, CO Spafford - 10-27-23 - Cantaloupe Island - Bruno’s Cavern - Cave Junction. OR Greensky Bluegrass - 11-01-23 - Thats What Love Will Make You Do - Harrah’s Lake Tahoe - South Lake Tahoe, NV Infamous Stringdusters - 11-01-23 - Ramble On Rose - Miners Foundry …
  continue reading
 
We wanted to know: How was USDoD, the hacker behind major data breaches, unmasked? On this episode, we trace his journey from infiltrating FBI-linked networks to leaking sensitive data, and hear from OSINT specialist and Predicta Lab CEO Baptiste Robert, who used open-source intelligence to follow USDoD’s digital trail, revealing what law enforceme…
  continue reading
 
Welcome to the weekend edition of Cybersecurity Today! Join host Jim Love as he delves into the top cybersecurity stories of the month with industry experts David Shipley of Beauceron Security, Terry Cutler of Cyology Labs, and special guest Kim Schreader from TELUS. This episode covers a range of vital topics, including AI's impact on cybersecurit…
  continue reading
 
Matt and Nick are back with another long winded rant about the benefits of shopper loyalty programs. Come on! These two have tried to go on camera for the whole time, but cannot really figure out how to share it with you, so you will have to use your imagination. We recommend a dark room when listing to this Show! If you are new always listen to th…
  continue reading
 
I sat down with Warren Haynes last week, to talk about his new record Million Voices Whisper, his latest solo effort almost a decade since Ashes and Dust a mostly acoustic effort with Railroad Earth and more than a decade since Wheels in Motion. Aside from Million Voices Whisper we discussed the impact of hurricane Helene on his home town of Ashevi…
  continue reading
 
Cyber Security Today: Deceptive Delight Jailbreak, API Vulnerabilities Surge, Hex Attack on GPT-4 In this episode of Cyber Security Today, host Jim Love discusses the new jailbreak technique 'Deceptive Delight' that highlights vulnerabilities in large language models, the 21% increase in API vulnerabilities reported by Wallarm, and the hex-encoded …
  continue reading
 
We dive into a season-long discussion of Stephen Batchelor's "After Buddhism: Rethinking the Dharma for a Secular Age". Feel free to listen even if you don't have the book, but you may get the most out of reading along with us. Support the show Our website is lamataboot.com, Instagram: @lamataboot, and YouTube: @lamataboot Find Lama Adam at lamaada…
  continue reading
 
In this episode of the Cyber Uncut podcast, Sadiq Iqbal, sales engineering lead and evangelist, office of the CTO at Check Point Software, joins host Liam Garman to discuss platformisation in cyber security and the importance of interoperability for cyber security tools. The pair begin the podcast by looking at recent developments in cyber security…
  continue reading
 
In case you didn't have the chance to attend CyberTalks, we have the keynote address from the event: National Cyber Director Harry Coker highlighted the White House's focus on strategy and policy to address internet routing vulnerabilities, particularly with the Border Gateway Protocol (BGP). Coker emphasized the importance of Resource Public Key I…
  continue reading
 
While there are plenty of unknowns when it comes to protecting the OT attack surface, there are some things that are undeniably true. We know that the frequency of attacks will continue to increase. We know that it’s not if your ICS will be probed, but when. And we also know that asset and connection visibility is an ongoing challenge due to the im…
  continue reading
 
Yes, payments to corporations may be reportable. In this episode we’ll talk about which 1099-MISC and 1099-NEC payments are reportable and which of those forms they should be reported. Keep listening. Check out my website www.debrarrichardson.com if you need help implementing authentication techniques, internal controls, and best practices to preve…
  continue reading
 
Another Osiris podcast, Beyond the Pond, has compiled their top-30 albums of the decade. Tom talks to them about their motivations and the thoughts behind making such an epic compilation. We hear music from each of the hosts' top-10 selections. Brian Brinkman's top 10 albums: Brian’s Top Ten Albums of The 2010s: 01. The War On Drugs: Lost In The Dr…
  continue reading
 
In this episode of the Contested Ground podcast, interviewer Defence Connect senior journalist Robert Dougherty is joined by former Australian prime minister Scott Morrison. Morrison, non-executive vice chairman of American Global Strategies, has recently announced a new role as chairman of Space Centre Australia, a planned spaceport in far north Q…
  continue reading
 
Cosmic Lion Radio is back with the creative team behind G.H.O.S.T. Agents Outlaw Town and Mind Melt. Writer and creator Rocko Jerome, LEGENDARY ARTIST KEN LANDGRAF, colorist Meesimo and letterer, Eli Schwab. The team chats about the books, Ken's legacy and influence and a TON more stuff. Check it. For more: https://ghostagents.net/ The Kickstarter:…
  continue reading
 
Late release! Matt and Nick are on their high horse about some fools there were at the show, and rightfully so. Then a song by song breakdown of the 10/25 night one show. heres a hint, they liked it. Matt gave some clues to what he wants for Christmas. Nick talks the plus' and minus' of halloween costumes that need a power outlet. If you are new al…
  continue reading
 
The whole second half of this one is one long call but trust us it's worth it. A call in show with tales of hackers getting hacked back, spoofed emails, and operating system vulnerabilities. Hotline Hacked is brought to you by DeleteMe. Take control of your data and keep your private life private by signing up for DeleteMe. Now at a special discoun…
  continue reading
 
There are a shocking amount of businesses that ultimately fail because of fraud. Many managers and business owners are unaware of their losses because they do not have the systems in place to look for fraud and it may not be their primary concern. Today’s guest is James Ratley. Jim graduated from the University of Texas at Dallas with a bachelor’s …
  continue reading
 
Massive CRA Breach Exposed & Cyber Challenges in Healthcare and Retail In this episode of Cyber Security Today, host Jim Love delves into the significant cyber security incidents impacting Canada, healthcare, and retail sectors. A report from CBC and Radio Canada reveals that the Canada Revenue Agency (CRA) has been compromised multiple times, lead…
  continue reading
 
Send us a text Hi everybody and welcome to this week’s episode of Attendance Bias. I am your host, Brian Weinstein. Today, we welcome back guest Adam Jerugim. Adam previously told about seeing “Harry Hood” on April 18, 1992 at Stanford University, and after today, he seems to be the Attendance Bias resident expert on west coast Phish in the 90s. In…
  continue reading
 
In this episode of The New Dad Rock, Steve and Keith are joined by special guest Bryan to dive deep into the transformative year that was 1991. The trio revisits the incredible six-week period that birthed classics from Metallica, Guns N’ Roses, Nirvana, Pearl Jam, The Red Hot Chili Peppers and uh Garth Brooks They take aim at the beginnings of the…
  continue reading
 
79: AboveTheDave breaks down the incredible festival that was Bonnaroo 2006 and we have Thom Yorke back on the podcast to talk Bonnaroo and he plays us more Phish covers! Tom Hamilton joins us as well and he gets to talk to Thom, Jerry Garcia and Bill Walton in Heaven, and the Ghosts of the Forest. Follow us on Instagram @thelotscenepodcast Please …
  continue reading
 
Thanks for joining as we recap the weekend run from Albany, benefiting the Divided Sky Foundation. https://dividedsky.org/benefit Please give us a call at (484) 416-0488 and leave us your thoughts and questions! And give us a review wherever you listen to podcasts. The Helping Friendly Podcast is hosted and produced by Brian Brinkman, Megan Glionna…
  continue reading
 
Get your FREE 2024 Cybersecurity Salary Guide: https://www.infosecinstitute.com/form/cybersecurity-salary-guide-podcast/?utm_source=audio&utm_medium=podcast&utm_campaign=podcast Today on Cyber Work, Jonathan Braley from the Food and Agriculture Information Sharing and Analysis Center (Food and Ag ISAC) delves into the critical security challenges i…
  continue reading
 
Night 3 of 3 in Albany NY is in the books. If you doing think the band and Trey was sending you a message then you were probably high and should seek some help. This show painted a picture and at least one member of the podcast, if not both thought it was beautiful. Plus an amazing Salsa Verde recipe. If you are new always listen to the latest show…
  continue reading
 
In today's episode of Cybersecurity Today, host Jim Love covers stories including, Cisco releases an emergency patch for a vulnerability exploited in brute force attacks, Delta Airlines sues CrowdStrike over a problematic software update leading to flight disruptions, UnitedHealth confirms the massive data breach at Change Healthcare affecting 100 …
  continue reading
 
Welcome to the Social-Engineer Podcast: The SE Etc. Series. This series will be hosted by Chris Hadnagy, CEO of Social-Engineer LLC, and The Innocent Lives Foundation, as well as Social-Engineer.Org and The Institute for Social Engineering. Join Chris as he discusses topics and news pertaining to the world of Social Engineering. [Oct 28, 2024] 00:0…
  continue reading
 
While packing for college, Lexi discovers her later father's collection of Phish cassette tapes from the '90s. Listening back to a tape in her room, through some unknown force of magic, Lexi is transported into the memory inside the tape. She meets her parents and their friends and heads into her first Phish show. "Family Tape Tree" is a fictional …
  continue reading
 
Featured Songs: Yonder Mountain String Band - 09-25-20 - For What Its Worth - Blue Ox Music Festival - Eau Claire, WI Kitchen Dwellers 10-10-20 - Cold Rain And Snow - Cervantes’ Masterpiece Ballroom - Denver, CO Pigeons Playing Ping Pong - 10-10-20 - In The Bubble - South Farms - Morris, CT Warren Haynes - 10-15-20 - Sailing Shoes - South Farms - M…
  continue reading
 
Mastering Cybersecurity: From AI Threats to Quantum Encryption - Insights with CDW Join host Jim Love in a riveting discussion with Ivo Wiens, Field CTO for CDW Canada, as they review CDW's cyber security research and discussions with CISO's about the state of cyber security in Canada. Delve into the sophistication of cyber attacks driven by organi…
  continue reading
 
Loading …

Quick Reference Guide