show episodes
 
Join David Attenborough (Planet Earth, First Life, Flying Monsters 3D), Naturalist and Filmmaker as he talks to Anthony Geffen, Producer of their major new project Kingdom of Plants 3D.Kingdom of plants with David Attenborough is a multi-platform project which includes a three part series in 3D produced by Atlantic Productions with Sky 3D in association with Galileo Digital Entertainment. Shot over a year in the Royal Botanic Gardens, Kew, the series reveals a new look at plant life through ...
  continue reading
 
Artwork

1
Subsurface Talks

Jarosław Dzedzej (aka D.J.)

Unsubscribe
Unsubscribe
Monthly
 
This is a podcast about 3d graphics, animation and art in the digital age. Casual and inspiring chats with creatives from the CGI industry and personal opinions of the host 3d artist DJ (Jarosław Dzedzej)
  continue reading
 
Artwork

1
WinBizSolutionsIndia

winbizsolutions

Unsubscribe
Unsubscribe
Monthly+
 
WinBizSolutionsIndia is a business process outsourcing company based out of Bangalore, India. We provide support to global clientele in the areas of call center, photo editing, graphic designing and eBook conversion services.
  continue reading
 
Namaste, I am Gael. My podcast is about Love Light and Universal Harmony and how they are to me A Universal Trinity of Health and Evolution. I am an Artist. A Painter, a Poet and a Musician. I am also a Fervent Practitionner of Buddhist Meditation and through the years, by Focusing on my Breath of Life and Heart Center I have reached an Understanding of Life rooted in Pure Energy. Like a Cosmic Flower or a Cosmic Tree breathing from my Heart Center to my Roots and vice-versa, breathing from ...
  continue reading
 
Loading …
show series
 
Back in April, we covered a story on episode #348 titled "CISO-CEO communication gaps continue to undermine cybersecurity". In that article, Sumedh Thakar, the CEO at Qualys, stated "CISOs must translate technical risks into business impact for CEOs." But he didn't say how. So, we invited him on the show to explain. In this episode, Sumedh walks us…
  continue reading
 
Gavin Campbell from HomeTech.fm podcast is my guest this week. We discussed various topics, including severe weather preparedness, home automation, tech updates, data storage, and 3D printing. Gavin shared his experiences and recommendations, highlighting the importance of being prepared for severe weather events, investing in reliable backup power…
  continue reading
 
Gavin Campbell from HomeTech.fm podcast is my guest this week. We discussed various topics, including severe weather preparedness, home automation, tech updates, data storage, and 3D printing. Gavin shared his experiences and recommendations, highlighting the importance of being prepared for severe weather events, investing in reliable backup power…
  continue reading
 
On a warm May evening deep in the Forest of Dean, the sound of dusk is alive with birdsong from many different species. The air literally fizzes with the energy produced by avian communications. Their calls and songs echo over long distances, they reflect and bounce from tree trunk to tree trunk, reverberate and dissipate. It's the sheer quantity o…
  continue reading
 
In this episode of Security Weekly News, Dr. Doug White and Josh Marpet delve into the widespread impact of the recent CrowdStrike and Microsoft technical issue, which disrupted various industries, including airlines, DMVs, and hospitals. They discuss the interconnectedness of modern systems, the reliance on automatic updates, and the critical need…
  continue reading
 
In this episode of Enterprise Security Weekly, we revisit the insightful book "Jump-start Your SOC Analyst Career" with authors Jarrett Rodrick and Tyler Wall, exploring updates on career paths, opportunities, and the industry's reality. We delve into the myths versus the truths about cybersecurity careers, discussing the viability of high salaries…
  continue reading
 
Thinking about getting a 3D printer or have one and need a good primer? Check out this segment, we live 3D print a Captain Crunch whistle and talk all about 3D printing for hackers! Segment Resources: Slides used in this segment: https://files.scmagazine.com/wp-content/uploads/2024/07/3D-Printing-for-Hackers.pdf Major 3D Printer Websites: https://v…
  continue reading
 
How can LLMs be valuable to developers as an assistant in finding and fixing insecure code? There are a lot of implications in trusting AI or LLMs to not only find vulns, but in producing code that fixes an underlying problem without changing an app's intended behavior. Stuart McClure explains how combining LLMs with agents and RAGs helps make AI-i…
  continue reading
 
Cyber insurance underwriting is all over the map. With such a variation in application requirements, how should small and medium businesses prepare to receive the best policy for the price? Brian Fritton joins Business Security Weekly to discuss a systematic approach to preparing for cyber insurance. By working with the underwriters, this approach …
  continue reading
 
Jay Mattison is my guest this week. Jay discussed the latest gadgets, smart home automation, laptops, and processing power. He also talked about camera technology, including wireless microphones and road pros, and the limitations of wireless data transfer. He shared his preferences for audio equipment and home automation, and discussed the potentia…
  continue reading
 
Jay Mattison is my guest this week. Jay discussed the latest gadgets, smart home automation, laptops, and processing power. He also talked about camera technology, including wireless microphones and road pros, and the limitations of wireless data transfer. He shared his preferences for audio equipment and home automation, and discussed the potentia…
  continue reading
 
Earlier this week we left the Lento box out to record overnight. Persistent rain was forecast from midnight onwards after a spell of dry weather. We never lose interest in the sound of falling rain. Being outside during a shower invokes strong feelings that must have evolved over millions of years. To make these local rain recordings we normally se…
  continue reading
 
I'm always thrilled to chat with ex-analysts, and Henrique Teixeira can cover a lot of ground with us on the topic of identity management and governance. The more I talk to folks about IAM/IGA, the more I'm shocked at how little has changed. If anything, it seems like we've gone backwards a bit, with the addition of cloud SaaS, mobile devices, and …
  continue reading
 
Bats in your headset, Windows Wifi driver vulnerabilities, Logitech's dongles, lighthttpd is heavy with vulnerabilities, node-ip's not vulnerability, New Intel CPU non-attacks, Blast Radius, Flipper Zero alternatives, will OpenSSH be exploited, emergency Juniper patches, and the D-Link botnet grows. Iceman comes on the show to talk about RFID and N…
  continue reading
 
Sandy Carielli and Janet Worthington, authors of the State Of Application Security 2024 report, join us to discuss their findings on trends this year! Old vulns, more bots, and more targeted supply chain attacks -- we should be better at this by now. We talk about where secure design fits into all this why appsec needs to accelerate to ludicrous sp…
  continue reading
 
On average, CISOs manage 50-75 security products. Many of these products have either not been deployed or only partially deployed, while others overlap of products. How do CISOs effectively consolidate their products to a manageable size? Max Shier, Chief Information Security Officer at Optiv Security, joins Business Security Weekly to discuss tech…
  continue reading
 
Being out on a headland is an experience as fresh as it is freeing. Fresh because these steep craggy places resound continuously, without end, with the effects of ocean and wild weather. Freeing, because they let you feel with all your senses, the reality of the world. A world seven tenths covered in water. Like bathing in forest sound created by t…
  continue reading
 
Exploring the Hardware Hacking Realm with Joe Grand, AKA Kingpin Joe Grand, also known by his hacker pseudonym "Kingpin," stands as a prominent figure in the cybersecurity landscape. With an extensive background in hardware hacking, reverse engineering, and embedded systems, Joe has carved a niche for himself as a respected authority in the field. …
  continue reading
 
Check out this interview from the SWN Vault, hand picked by main host Doug White! This Secure Digital Life segment was originally published on March 6, 2017. Have you ever wondered what phishing is? Do you know what spear phishing attacks are? Doug and Russ explain how to protect yourself from phishing scams in the inaugural episode of Secure Digit…
  continue reading
 
Check out this interview from the BSW Vault, hand picked by main host Matt Alderman! This segment was originally published on October 11, 2022. As 2023 approaches, security leaders are hard at work preparing their budgets, identifying their projects, and setting their priorities for the next twelve months. At the same time, the growth mode days of …
  continue reading
 
Perhaps it is, though you may know of one even more perfect. This stream follows a country road high in the empty hills above the small town of Ceri in the Welsh county of Powys. We've shared many sections from this 2019 recording over the four years of Lento. The area feels magical, being very near to the Ceri Ridgeway (Kerry in English) an ancien…
  continue reading
 
Ed Sullivan joins me this week! We discussed his collection of Apple devices, including an iMac Pro, 16” MacBook Pro, iPhone 12 Pro, and Apple Watch Series 8. We discuss his decision to purchase his first iPad, a 13” 1TB model with nano-texture glass and a Magic Keyboard. We cover the accessories and apps he bought for the iPad, enhancing its strea…
  continue reading
 
Ed Sullivan joins me this week! We discussed his collection of Apple devices, including an iMac Pro, 16” MacBook Pro, iPhone 12 Pro, and Apple Watch Series 8. We discuss his decision to purchase his first iPad, a 13” 1TB model with nano-texture glass and a Magic Keyboard. We cover the accessories and apps he bought for the iPad, enhancing its strea…
  continue reading
 
Healthcare and malware, MoveIT, Chrome won't trust Entrust, the discovery of Volt Typhoon, & more on this episode of the Security Weekly News! Segment Resources: https://therecord.media/volt-typhoon-targets-underestimated-cisa-says Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-395…
  continue reading
 
We all might be a little worn out on this topic, but there's no escaping it. Executives want to adopt GenAI and it is being embedded into nearly every software product we use in both our professional and personal lives. In this interview, Anurag joins us to discuss how his company evaluated and ultimately integrated AI-based technologies into their…
  continue reading
 
This may be controversial, however, we've been privately discussing how organizations benefit from penetration testing and vulnerability scanning. Do you still need these services as a critical part of your security program? Can't you just patch stuff that is missing patches? Tune in for a lively debate! Zyxl NAS devices are under attack and the ex…
  continue reading
 
With 71% of web traffic coming from API calls last year and the average organization maintaining 613 API endpoints, a robust strategy is needed to protect APIs against automated threats and business logic attacks. Tune in as Luke Babarinde, Global Solution Architect, shares the key steps to building a successful API security strategy. This segment …
  continue reading
 
OAuth 2.0 is more than just a single spec and it's used to protect more than just APIs. We talk about challenges in maintaining a spec over a decade of changing technologies and new threat models. Not only can OAuth be challenging to secure by default, but it's not even always inter-operable. Segment Resources: https://oauth.net/2.1 https://oauth.n…
  continue reading
 
Night rain, as it falls onto a quiet suburban garden, has a cool and spacious sound-feel. It seems to help focus the mind's eye onto the presence of objects and surfaces that without the rain would simply not exist, to the ear. Even to the eye, in such murky darkness, these objects and surfaces are not things that make sense in and of themselves. T…
  continue reading
 
Dr. Adam Hickman is my guest this week. Adam is the Vice President of Org Development and Cast Members at Partners, a Walt Disney Company, and a former co-worker of mine at Gallup. We catch up over drinks and then dive into the show. We discuss The X3 Bar, a highly effective strength-training device using variable resistance to build muscle faster …
  continue reading
 
Dr. Adam Hickman is my guest this week. Adam is the Vice President of Org Development and Cast Members at Partners, a Walt Disney Company, and a former co-worker of mine at Gallup. We catch up over drinks and then dive into the show. We discuss The X3 Bar, a highly effective strength-training device using variable resistance to build muscle faster …
  continue reading
 
Traditional approaches to access management are no longer sufficient to safeguard enterprise security. Tim will explain why the most effective approach to modern enterprise security requires a Zero Trust model that extends beyond just access to encompass every action, no matter how minor. Tim will describe the importance of implementing a Zero Trus…
  continue reading
 
Check out this interview from the SWN Vault, hand picked by main host Doug White! This Secure Digital Life segment was originally published on June 19, 2018. This week, Doug and Russ interview Matthew Silva, President and Founder of the Cybersecurity and Intel Club at Roger Williams University! They talk about majoring in Cybersecurity vs. Computer…
  continue reading
 
FIDO security keys are not new in the authentication workflow. They have been around now for 10 years. What is new is the combination of the most secure multi-factor authentication method not only for logical but also for physical access control with the highest FIPS140-3 security certification in the market. Segment Resources: Video "Swissbit iShi…
  continue reading
 
Log4j, solar winds, tesla hacks, and the wave of high profile appsec problems aren’t going to go away with current approaches like SAST and SCA. Why? They are: -40 years old, with little innovation -Haven’t solved the problem. In this segment, we talk about fully autonomous application security. Vetted by DARPA in the Cyber Grand Challenge, the app…
  continue reading
 
Exploring the Strategic Minds in Cybersecurity: A Conversation with Dave Aitel Welcome to an enlightening episode of our podcast, where we sit down with Dave Aitel, a prominent figure in the cybersecurity landscape. With a robust background in offensive security and an extensive career spanning various facets of the industry, Dave brings a wealth o…
  continue reading
 
Check out this interview from the SWN Vault, hand picked by main host Doug White! This Secure Digital Life segment was originally published on September 25, 2018. This week, Russ takes the reigns in the absence of Dr. Doug to talk about Networking 101! We are going to go back to school to examine how networking and the internet actually work. Russ …
  continue reading
 
Check out this interview from the ASW Vault, hand picked by main host Mike Shema! This segment was originally published on April 4, 2023. Following on from her successful title "Container Security", Liz has recently authored "Learning eBPF", published by O'Reilly. eBPF is a revolutionary kernel technology that is enabling a whole new generation of …
  continue reading
 
Check out this interview from the BSW Vault, hand picked by main host Matt Alderman! This segment was originally published on August 9, 2022. Zero Trust is the security buzzword of the moment, and while it is a very powerful approach, nearly every enterprise security product on the market – and some that aren’t even security products — are saying t…
  continue reading
 
Back we go again to Miller's Dale in the Derbyshire hills. To this quiet spot, beside a shallow river wrilling. There's a country lane, and a steep grassy bank down to the river where an old tree grows. The tree, so gnarled, and with an unusually stout trunk, must have grown here for decades. Maybe even a century, or more. At about five feet from t…
  continue reading
 
Erin Lawrence from Tech Gadgets Canada joined me this week. We delved into a variety of tech topics, starting with the Birdfy Hum Feeder, where Erin shared her mixed experiences, praising the seed feeder but expressing disappointment with the Hum feeder’s performance. Moving on to the Kamado Connected Joe smart charcoal grill, Erin’s review highlig…
  continue reading
 
Erin Lawrence from Tech Gadgets Canada joined me this week. We delved into a variety of tech topics, starting with the Birdfy Hum Feeder, where Erin shared her mixed experiences, praising the seed feeder but expressing disappointment with the Hum feeder’s performance. Moving on to the Kamado Connected Joe smart charcoal grill, Erin’s review highlig…
  continue reading
 
This week, we've got data security being both funded AND acquired. We discuss Lacework's fall from unicorn status and why rumors that it went to Fortinet for considerably more than Wiz was willing to pay make sense. Microsoft Recall and Apple Intelligence are the perfect bookends for a conversation about the importance of handling consumer privacy …
  continue reading
 
We will discuss LLM security in general and some of the issues covered in the OWASP Top 10 for LLMs! Segment Resources: https://genai.owasp.org/ Skyrocketing IoT vulnerabilities, bricked computers?, MACBORG!, raw dogging source code, PHP strikes again and again, if you have a Netgear WNR614 replace it now, Arm Mali, new OpenSSH feature, weird headp…
  continue reading
 
Loading …

Quick Reference Guide