show episodes
 
Artwork

1
Beyond The Pond

Beyond The Pond/Osiris Media

Unsubscribe
Unsubscribe
Monthly
 
Welcome to Beyond The Pond! We’re two massive Phish fans who are using the music of Phish to introduce you to new and interesting music we think you’ll love! Because we love the Phish. We are Phish fans. But sometimes you gotta break out of your comfort zone and go beyond the pond. A proud member of the Osiris Podcast Network. Hosted on Acast. See acast.com/privacy for more information.
  continue reading
 
Artwork

1
Analyze Phish

Earwolf & Harris Wittels, Scott Aukerman

Unsubscribe
Unsubscribe
Monthly
 
Harris and Scott are comedians, music lovers, and friends. Where do they differ? Harris loves Phish, and Scott does not. On Analyze Phish, Harris navigates the vast landscape of Phish's catalogue to find entry points for Scott while trying to explain the live Phish experience without the use of illegal substances.
  continue reading
 
Artwork
 
Chris Parker, the founder of WhatIsMyIPAddress.com, interviews guests and tells real-life stories about topics to open your eyes to the danger and traps lurking in the real world, ranging from online scams and frauds to everyday situations where people are trying to take advantage of you—for their gain and your loss. Our goal is to educate and equip you, so you learn how to spot the warning signs of trouble, take quick action, and lower the risk of becoming a victim.
  continue reading
 
The Helping Friendly Podcast (HFPod) explores the music and fan experience of Phish, through interviews and deep dives on shows and tours. Since 2013, we’ve aimed to bring the fan voice into discussions about Phish, and with the help of our guests, we’re still discovering new angles of appreciation for the band. And when the band is on tour, we provide a review of every show the following day with a fan who was there. As one of our listeners said, “this show has impeccable analysis, stats, c ...
  continue reading
 
Artwork

1
Cyber Uncut

Momentum Media

Unsubscribe
Unsubscribe
Monthly+
 
Cyber Uncut brings you the key decision makers and cutting edge innovators shaping Australia's cyber revolution. From cyber security to artificial intelligence and information systems, discover how businesses and government are navigating the transition to a digital future. Join Momentum Media’s Phil Tarrant, defence and national security podcaster, Major General (Ret’d) Dr Marcus Thompson AM – former head of the ADF’s Information Warfare Division, and Liam Garman, editor of Cyber Daily, as ...
  continue reading
 
Learn how to break into cybersecurity, build new skills and move up the career ladder. Each week on the Cyber Work Podcast, host Chris Sienko sits down with thought leaders from Carbon Black, IBM, CompTIA and others to discuss the latest cybersecurity workforce trends.
  continue reading
 
Inside Wall Street with Morris Sachs and Liam Allen. Recommended viewing: The Sting Trading Places Groundhog Day YouTube: Charlie DiFrancesca Full Length Speech 1989 Recommended Reading: 1.Modern Times - Paul Johnson 2. Atlas Shrugged- Ayn Rand 3. *redacted* 4. Reminiscences of a Stock Operator- Edwin Lefevre 5. Lessons of History - Will Durant Daily Reading : Grant’s, GaveKal, Macro Tourist, Daily Shot, Anthony Peters, David Zervos, NYPost, FT, WSJ, NYT, SCMP, Chicago Tribune, Real Deal, Ze ...
  continue reading
 
Artwork

1
Hidden Jukebox

Jake Amster and Matthew Amster-Burton

Unsubscribe
Unsubscribe
Monthly
 
Jake Amster and Matthew Amster-Burton, two Seattle music nerds and actual brothers, take you on an audio tour of the best albums of the 90s, from R.E.M. to T.L.C., Snoop Dogg to Phish.
  continue reading
 
Artwork

1
8th Layer Insights

Perry Carpenter | N2K Networks

Unsubscribe
Unsubscribe
Monthly
 
Get ready for a deep dive into what cybersecurity professionals often refer to as the "8th Layer" of security: HUMANS. Welcome to 8th Layer Insights (8Li). This podcast is a multidisciplinary exploration into how the complexities of human nature affect security and risk. Author, security researcher, and behavior science enthusiast Perry Carpenter taps experts for their insights and illumination. Topics include cybersecurity, psychology, behavior science, communication, leadership, and more.
  continue reading
 
Artwork
 
Music: it's good. On each episode of Strong Songs, host Kirk Hamilton takes listeners inside a piece of music, breaking it down and figuring out what makes it work.
  continue reading
 
Artwork
 
We're a network of rockumentary podcasts exploring concert culture. In each episode, we’re not in a studio, we’re for the most part, right at the music venue, for conversations with bands, fans, and industry leaders. Plus, local music and personal anecdotes along the way. Through lively conversations laced with energetic music, accentuated by vivid sound design, the concert setting becomes a world in itself; allowing us to explore deeper musical motifs relevant to us all. Created, Produced & ...
  continue reading
 
A weekly podcast providing fraud prevention and vendor setup training to protect the vendor master file. Immediate takeaways with actionable steps you can implement today into your vendor onboarding and maintenance process to reduce fraud and regulatory fines. Great tips for the Accounts Payable and Procurement teams to clean-up their vendor data, clean-up their vendor processes so that they can pay the right vendor.
  continue reading
 
Geared towards Deadheads, Phishheads and the jam band community, The Sound Podcast is a music discovery interview style podcast, hosted by Ira Haberman. Featuring Jam Bands and more... much more. Rooted in Americana, Blues, Bluegrass, Country, Folk, Funk, Jazz, Reggae, Rock, Soul but mostly Jam Band music. Here is a small sample of the guests that have been on The Sound Podcast to date: ALO, Anders Osborne, Antibalas, Aqueous, Band of Heathens, Barr Brothers, Blackberry Smoke, Chris Robinson ...
  continue reading
 
Artwork

1
Pod Ween Satan

Jay Hunter and Dave Massey

Unsubscribe
Unsubscribe
Monthly+
 
Ween is The Greatest Band in The World. This is the Greatest Podcast in The World about The Greatest Band in The World....Ween. We will introduce you to Ween in all their grandness and splendor. We shall take you on a tour of the entire Ween Catalogue...One album at a time...One song at a time...Until the end of time. Together we will listen to each and every Ween song. Together we will spread the good word of The Boognish. Buckle up Bitch. Step inside this spaceship and take a ride straight ...
  continue reading
 
We take you behind police lines. Former FBI profiler Jim Clemente & former federal prosecutor Francey Hakes get unparalleled access to law enforcement officers, looking back at their most memorable cases – for better or for worse.
  continue reading
 
Artwork

51
Undermine

Osiris Media

Unsubscribe
Unsubscribe
Weekly
 
Undermine is the definitive Phish podcast. New season coming soon, building on what we've done—seasons on Phish’s genesis in the 1980s, the Phish community, the Baker's Dozen, and Fall '97. Through deep-dives into the music, shows and songs; interviews with people who were there; and discussion about Phish's lasting impact. Undermine is presented by Osiris Media.
  continue reading
 
The definitive retrospective of one of music’s most memorable festivals, Phish’s Big Cypress. In December of 1999, Phish drew an estimated 80,000 to the Big Cypress Indian Reservation in Florida’s Everglades, making this festival the largest Millennium Eve concert on earth. We look back on the festival 20 years later—and examine the legacy for Phish and the music world. Hosted and narrated by Jesse Jarnow, this five-episode series draws on interviews with members of Phish and its crew, fan m ...
  continue reading
 
The daily cybersecurity news and analysis industry leaders depend on. Published each weekday, the program also includes interviews with a wide spectrum of experts from industry, academia, and research organizations all over the world.
  continue reading
 
On Phemale-Centrics we discuss all things Phish from a woman's point of view. Join us as we interview Phish's community members, play games like "Market Price" and discuss the latest goings on in the Phish scene, both on-line and on Lot! Your host is Dawneebee! Co-hosts are a rotating cast of her phriends including Jillian, Kristie, Merry, Baker & Lauren and her husband Jason "Snakey". Hosted on Acast. See acast.com/privacy for more information.
  continue reading
 
Artwork

1
The Daily Soundcheck

Myke "LawnMemo" Menio

Unsubscribe
Unsubscribe
Monthly
 
The Daily Soundcheck brings you every Phish Soundcheck where audio circulates. Episodes run Monday-Friday with commentary, history and interviews. Hosted by Myke "LawnMemo" Menio Hosted on Acast. See acast.com/privacy for more information.
  continue reading
 
Loading …
show series
 
From the intrusion kill-chain model, the delivery of a “lure” via a text message to a potential victim by pretending to be some trustworthy person or organization in order to trick the victim into revealing sensitive information. Smishing is a portmanteau word made of two other words, the acronym “SMS” and the cyber coinage “Phishing“. It’s a text-…
  continue reading
 
From the intrusion kill-chain model, the delivery of a “lure” via a text message to a potential victim by pretending to be some trustworthy person or organization in order to trick the victim into revealing sensitive information. Smishing is a portmanteau word made of two other words, the acronym “SMS” and the cyber coinage “Phishing“. It’s a text-…
  continue reading
 
Attackers lock up Azure accounts with MFA. Bank of America alerts customers to a third party data breach. Malicious cyber activity targets elections worldwide. CISA highlights a vulnerability in Roundcube Webmail. Lawmakers introduce a bipartisan bill to enhance healthcare cybersecurity. Siemens and Schneider Electric address multiple industrial vu…
  continue reading
 
In Episode 127 we shine a light on Pitchfork dot com as the site undergoes a period of uncertainty following the announcement that it will be folded into GQ Magazine. A site that has long been a formative inspiration for us as listeners, as well as for this show, we chat about some of our favorite reviews from the site, our thoughts on its evolutio…
  continue reading
 
Assaf Dahan and Daniel Frank from Palo Alto Networks Cortex sit down with Dave to talk about their research "Manic Menagerie 2.0: The Evolution of a Highly Motivated Threat Actor." From late 2020 to late 2022, Unit 42 researchers discovered an active campaign that targeted several web hosting and IT providers in the United States and European Union…
  continue reading
 
The FTC fines Avast over privacy violations. ConnectWise's ScreenConnect is under active exploitation. AT&T restores services nationwide. An Australian telecom provider suffers a data breach. EU Member States publish a cybersecurity and resilience report. Microsoft unleashes a PyRIT. A new infostealer targets the oil and gas sector. A cyberattack c…
  continue reading
 
Strong Songs Season Six kicks off with a widely requested classic: Peter Gabriel's 1986 yearner "In Your Eyes." Because why hire one rhythm section when you can hire two for twice the price? Written by: Peter Gabriel Produced by: Daniel Lanois Album: So (1986) Listen/Buy via Songwhip ALSO DISCUSSED: Rick Beato's Interview with So producer Daniel La…
  continue reading
 
AT&T experiences a major outage. The LockBit takedown continues. An updated Doppelgänger is spreading misinformation. A roundup of critical infrastructure initiatives. Toshiba and Orange make a quantum leap. An eyecare provider hack comes into focus. A phony iphone repair scheme leads to convictions. In our Learning Layer segment, Sam Meisenberg sh…
  continue reading
 
Infosec and Cyber Work hacks want to help you pass the Security+ exam! We have three separate hacks on this channel to help you through the process of studying for and taking the exam. But what about in the years after, when it’s time to get ready to recertify? Infosec boot camp instructor Tommy Gober walks you through all the different ways you ca…
  continue reading
 
When Hamas fighters crossed into Israel on Oct. 7, killing some 1,200 Israelis and kidnapping hundreds more, it marked a new era of the conflict between Israel and an array of militant groups. Most of that conflict has played out in the form of brutal, bloody fighting, but it has also taken place online in the form of cyber operations. Adam Meyers,…
  continue reading
 
Featured Songs: 00:38 - Dopapod - 02-14-24 - Closer - The Black Sheep - Colorado Springs, CO 08:00 - Eggy - 02-16-24 - Learn To Fly - The Burl - Lexington, KY 20:34 - Umphrey’s McGee - 02-17-24 - In Bloom - Brooklyn Bowl - Philadelphia, PA 25:15 - Dogs in a Pile - 02-17-24 - Whipping Post - Bluebird Theatre - Denver, CO 32:16 - Gov’t Mule - 02-18-2…
  continue reading
 
Welcome to the Fraudian Slip…the Identity Theft Resource Center’s podcast where we talk about all-things identity compromise, crime, and fraud that impact people and businesses.I’m Tim Walden and thanks for joining us today. This month’s episode takes us to the recent policy forum in Washington, DC, hosted by the ITRC, the Better Identity Coalition…
  continue reading
 
Get 20 tips to avoid the latest fraud trends of 2023 in 2024. Discover the latest 6 fraud trends of last year and how you can stay updated, avoid and detect fraud in the vendor setup and maintenance process. Keep Listening. Check out my website www.debrarrichardson.com if you need help implementing authentication techniques, internal controls, and …
  continue reading
 
This week we are joined by Maria Varmazis, host of the N2K daily space show, T-Minus. She brings us a scary story from a woman who never thought she'd ever be scammed. Dave and Joe shares some follow up before getting into their stories, they share a story from a listener who sent in a LinkedIn link about scammers targeting Walmart. They also share…
  continue reading
 
President Biden to sign EO to bolster maritime port security. Apple announces post-quantum encryption for iMessage. Malwarebytes examines the i-Soon data leak. Law enforcement airs LockBit’s dirty laundry. Varonis highlights vulnerabilities affecting Salesforce platforms. An appeals court overturns a $1 billion piracy verdict. NSA’s Rob Joyce annou…
  continue reading
 
In this episode, we shine a light on the sinister phenomenon of virtual kidnapping. From deceptive phone calls to the psychological manipulation tactics, join us as we delve into the dark world where fears are exploited for profit, leaving victims shaken and families torn apart. Today’s guest is Titania Jordan. Titania is a nationally renowned tech…
  continue reading
 
Operation Cronos leaves LockBit operations on borrowed time. An alleged leak reveals internal operations from the Chinese Ministry of Public Security. An Israeli airline thwarts communications hijacking attempts. The alleged Raccoon Infostealer operator has been extradited to the US. ConnectWise patches critical vulnerabilities. Schneider Electric …
  continue reading
 
Hi everybody and welcome to today’s episode of Attendance Bias. I am your host, Brian Weinstein. The first week of March is always a conspicuous part of the year for me. No religious or secular holidays, no birthdays or wedding anniversaries in my social circle, but there is one series of dates that will always deserve some deep thoughts, if not an…
  continue reading
 
Tom Terronez joins Cyber Work to discuss security in an industry that doesn’t always make the headlines for security news: dentistry. Terronez co-founded Medix Dental, an IT and security provider for the dental industry, 20 years ago, and has the lowdown on some of the specific security issues dentist offices and networks face. It is an uphill batt…
  continue reading
 
Kathy O’Donnell is the leader of Space Solutions Architecture for AWS Aerospace and Satellite. In this extended conversation, we dive into how AWS is supporting generative AI in the space domain. She walks us through some incredible case studies with AWS customers who are using generative AI and space technologies to improve life here on Earth. Lea…
  continue reading
 
Today on the Social-Engineer Podcast: The Security Awareness Series, Chris is joined by Mary D'Angelo. Mary helps clients understand the threats that exist on the dark web and how to use that intelligence to bolster their cybersecurity programs. With a solid foundation from the University of Washington, where she earned her Bachelor's degree, Mary …
  continue reading
 
In this episode of CyberWire-X, N2K’s CSO, Chief Analyst, and Senior Fellow, Rick Howard, is joined by Tim Miller, Technical Marketing Engineer for Panoptica, Cisco's Cloud Application Security solution, (Panoptica is the result of Cisco's incubation engine (Outshift) for new products and markets), and Kevin Ford, Esri’s CISO. They discuss the comp…
  continue reading
 
We're rolling on in our Top 25 Tours series, hitting Fall 1998. Thank you for joining us, we'll see you next week for a Mexico recap. Please give us a call at (484) 416-0488 and leave us your thoughts and questions! And give us a review wherever you listen to podcasts. The Helping Friendly Podcast is hosted and produced by Brian Brinkman, Megan Gli…
  continue reading
 
Privacy and data security lawyer, Dominique Shelton Leipzig shares that she has always wanted to be a lawyer, ever since she was a little girl. She talks about what her role is with clients in protecting and managing their data, sometimes adhering to up to 134 different data protection laws for global companies. Learn that not a lot has changed for…
  continue reading
 
Ori David from Akamai is sharing their research "Frog4Shell — FritzFrog Botnet Adds One-Days to Its Arsenal." FritzFrog takes advantage of the fact that only internet facing applications were prioritized for Log4Shell patching and targets internal hosts, meaning that a breach of any asset in the network by FritzFrog can expose unpatched internal as…
  continue reading
 
The FBI kicks Moobot out of small business routers. Sensitive data has been stolen from a state government network. AMC proposes a multi-million-dollar settlement after improperly sharing subscriber’s viewing habits. The U.S. targets an Iranian military ship in the Red Sea with a cyberattack. Lawmakers propose transparency in the use of algorithms …
  continue reading
 
In this episode of the Cyber Uncut podcast, Liam Garman, David Hollingworth, and Daniel Croft provide critical insights for business leaders on how to craft an investor and media relations strategy in the event of a breach. The trio begin the podcast by discussing the latest news before diving into how cyber breaches require all hands on deck to ge…
  continue reading
 
Microsoft highlights adversaries experiments with AI LLMs. A misconfiguration exposes a decades worth of emails. SentinelOne describes Kryptina ransomware as a service. The European Court of Human Rights rules against backdoors. Senator Wyden calls out a location data broker. GoldFactory steals facial scans to bypass bank security. The Glow fertili…
  continue reading
 
Loading …

Quick Reference Guide