show episodes
 
Artwork

1
The Boys

Jeremy Rice, Stuart Hurt, and Dwayne Anderson aka The Boys

Unsubscribe
Unsubscribe
Monthly+
 
Welcome to "The Boys" podcast, where business partners Jeremy, Stuart, and Dwayne come together after two decades of collaboration to share their expertise and passion for all things decor, home design, business, and floral design. Join this dynamic trio as they delve into the world of aesthetics, offering valuable insights, practical tips to elevate your living spaces, and a few laughs along the way. But it's not just about design; it's about spreading joy and making the process enjoyable f ...
  continue reading
 
Artwork

1
Masquerade Of Angels

Stuart Thomas and Ted Rice

Unsubscribe
Unsubscribe
Monthly
 
Hello, we are three dedicated UFO researchers, each bringing unique perspectives to the phenomenon: Ted Rice: Co-author of Masquerade of Angels and collaborator with Karla Turner, offering deep insights into the intricate and often mysterious aspects of UFO encounters.Jennifer Elsner: A psychic and experiencer, providing firsthand accounts and intuitive understandings of the extraterrestrial phenomenon.Stuart Eglington: A diligent researcher committed to uncovering the truth through meticulo ...
  continue reading
 
Artwork

1
Mind Over Murder

William F. Thomas and Kristin M. Dilley

Unsubscribe
Unsubscribe
Weekly+
 
Listen to Mind Over Murder, the true crime podcast from victim's advocates Bill Thomas and Kristin Dilley. Kristin is a researcher, writer and teacher from Virginia. Bill is an entertainment executive who is also the brother of a murder victim, now living in Connecticut. His sister Cathy Thomas along with her girlfriend Rebecca Dowski, were the first two victims in the still unsolved Colonial Parkway Murders ,which claimed the lives of 8 young people near Williamsburg from 1986 to 1989. They ...
  continue reading
 
The Application Security Weekly podcast delivers interviews and news from the worlds of AppSec, DevOps, DevSecOps, and all the other ways people find and fix software flaws. Join hosts Mike Shema, John Kinsella, and Akira Brand on a journey through modern security practices for apps, clouds, containers, and more.
  continue reading
 
Artwork

1
Empowering True Strength

Ian Pettigrew (Kingfisher Coaching)

Unsubscribe
Unsubscribe
Monthly
 
The Empowering True Strength Podcast by Ian Pettigrew (Kingfisher Coaching) features inspiring interviews with leaders about how they sustainably get the best of themselves and their teams. There's lots of talk about strengths (featuring Gallup CliftonStrengths, formerly called StrengthsFinder) and resilience
  continue reading
 
Click-bait headlines, fitness bros, nutrition zealots and influencers try to get us to buy into every new extreme and make us question everything. Is rice bad for me? Should I be running every day to be healthy? Do I need to worry about protein? What about Keto? Rachel Hunter is an evidence-based nutrition coach tired of the status quo. #Health isn't for people that look, eat, exercise or flex a certain way. It is not just for the beige Instagram biddies. Here to firmly plant herself in the ...
  continue reading
 
Loading …
show series
 
This episode starts discussing a celebration we had at our store celebrating a teammate who is just a huge part of our heart who is always a cheerleader for others, and why it's important for us to do that .And that's just the first three minutes or so! lol We then get into discusing why and how we approach tile and flooring, including in our own h…
  continue reading
 
Even though Security Champions programs look very different across organizations and maturity levels, they share core principles for becoming successful. Marisa shares her experience in building these programs to foster a positive security culture within companies. She explains the incentives and rewards that lead to more engagement from champions …
  continue reading
 
Even though Security Champions programs look very different across organizations and maturity levels, they share core principles for becoming successful. Marisa shares her experience in building these programs to foster a positive security culture within companies. She explains the incentives and rewards that lead to more engagement from champions …
  continue reading
 
Inspired by my co-host Jason Albuquerque, this quarter's Say Easy, Do Hard segment is Job Search Strategies for CISOs. In part 1, we discuss the challenges facing the CISO role and it's hiring. As CISOs leave the role, the position is not necessarily being refilled. How will this impact future CISO hiring? Inspired by my co-host Jason Albuquerque, …
  continue reading
 
"Mind Over Murder" hosts Bill Thomas and Kristin Dilley discuss unsolved cases in Virginia with reporter and radio host Courteney Stuart of WINA Charlottesville. Cases include the Colonial Parkway Murders, the Route 29 Stalker, and the Shenandoah National Park Murders of Julie Williams and Lollie Winans, followed by the the bizarre death of Darrell…
  continue reading
 
Remember 20 years ago? When we were certain SIEMs would grant our cybersecurity teams superpowers? Or 10 years ago, when we were sure that NGAV would put an end to malware as we knew it? Or 15 years ago, when we were sure that application control would put an end to malware as we knew it? Or 18 years ago, when NAC would put an end to unauthorized n…
  continue reading
 
John is one of the foremost experts in UEFI and joins us to talk about PK Fail! What happens when a vendor in the supply chain accidentally loses a key? It's one of the things that keeps me up at night. Well, now my nightmare scenario has come true as a key has been leaked. Learn how and why and what you can do about it in this segment! Hacking tra…
  continue reading
 
Producer and podcast host Jennifer Amell and survivor and case advocate Jane Boroski join "Mind Over Murder" co-hosts Bill Thomas and Kristin Dilley to talk about "Dark Valley," their new podcast which covers the unsolved Connecticut River Valley Killings. Dark Valley explores a fascinating true crime case which warrants further investigation and d…
  continue reading
 
Ever wondered why some spaces that you walk into feel so magical? Spoiler Alert, it's always the lighting! The boys discuss some details about lighting that can help you both light it up, and not swiss cheese up your ceiling with recessed lights. And they talk about Jeremy's love for the Olympics and when Dwayne should be planning his next European…
  continue reading
 
Modern appsec isn't modern because security tools got shifted in one direction or another, or because teams are finding and fixing more vulns. It's modern because appsec is meeting developer needs and supporting the business. Paul Davis talks about how AI is (and isn't) changing appsec, the KPIs that reflect outcomes rather than being busy, and the…
  continue reading
 
Modern appsec isn't modern because security tools got shifted in one direction or another, or because teams are finding and fixing more vulns. It's modern because appsec is meeting developer needs and supporting the business. Paul Davis talks about how AI is (and isn't) changing appsec, the KPIs that reflect outcomes rather than being busy, and the…
  continue reading
 
Identity, the security threat that keeps on giving. For the 17th year in a row, identity is one of the top threats identified in the Verizon DBIR. Why? Dor Fledel, Senior Director of Product Management at Okta and Co-Founder of Spera, joins Business Security Weekly to discuss the challenges of identity and how to solve them. From numerous disparate…
  continue reading
 
Bestselling author Ron Peterson Jr joins "Mind Over Murder" podcast hosts Bill Thomas and Kristin Dilley to talk about his brand new book "In the Wind: The Disappearance of Janice Starr" which tells the story of groundbreaking female detective Kay Shucker, who helped solve the case of an Old Dominion University student who went missing in 1981. It …
  continue reading
 
The emergence of generative AI has caused us to rethink things on two fronts: how we consume threat detection data, as defenders how we need to shift our thinking and approaches to prepare for attackers' newfound GenAI capabilities But wait - is GenAI even useful for defenders or attackers? We'll dive deep into the state of AI as it pertains to sec…
  continue reading
 
Doug and the Security Weekly crew talk about vulnerabilities, are we patching the right things? This is the burning question. We will try to answer it. Segment Resources: https://blog.sonicwall.com/en-us/2024/04/patch-tuesday-which-vulnerabilities-really-need-prioritizing/ Segment description coming soon!The Crowdstrike incident: what happened and …
  continue reading
 
Ashley Spence, the head of the DNA Justice Project and a survivor of sexual assault herself, joins "Mind Over Murder" co-hosts Bill Thomas and Kristin Dilley to discuss her personal story of survival, how the CODIS system works to help solve cases including sexual assault and murder, and how the DNA Justice Project is working with legislators aroun…
  continue reading
 
Ever wonder about some of the nuts and bolts of how we do what we do when it comes to going to market and why we buy what we buy! Or maybe why in the world we do Christmas in July! All of that and more is in this episode, including getting a visit from Jeremy's cat, Gracie! We're working on the images of the Christmas looks discusses in the podcast…
  continue reading
 
Generative AI has produced impressive chatbots and content generation, but however fun or impressive those might be, they don't always translate to value for appsec. Allie brings some realistic expectations to how genAI is used by attackers and can be useful to defenders. Segment resources: https://www.forrester.com/blogs/generative-ai-will-not-ful…
  continue reading
 
Generative AI has produced impressive chatbots and content generation, but however fun or impressive those might be, they don't always translate to value for appsec. Allie brings some realistic expectations to how genAI is used by attackers and can be useful to defenders. Segment resources: https://www.forrester.com/blogs/generative-ai-will-not-ful…
  continue reading
 
Back in April, we covered a story on episode #348 titled "CISO-CEO communication gaps continue to undermine cybersecurity". In that article, Sumedh Thakar, the CEO at Qualys, stated "CISOs must translate technical risks into business impact for CEOs." But he didn't say how. So, we invited him on the show to explain. In this episode, Sumedh walks us…
  continue reading
 
"Mind Over Murder" hosts Bill Thomas and Kristin Dilley discuss the bizarre death of Darrell David Rice, a longtime suspect in the Shenandoah National Park murders of Julie Williams and Lollie Winans. Rice was exonerated after the FBI and National Park Service announced that Walter "Leo" Jackson had been linked to the Williams/Winans murder via DNA…
  continue reading
 
In this episode of Security Weekly News, Dr. Doug White and Josh Marpet delve into the widespread impact of the recent CrowdStrike and Microsoft technical issue, which disrupted various industries, including airlines, DMVs, and hospitals. They discuss the interconnectedness of modern systems, the reliance on automatic updates, and the critical need…
  continue reading
 
In this episode of Enterprise Security Weekly, we revisit the insightful book "Jump-start Your SOC Analyst Career" with authors Jarrett Rodrick and Tyler Wall, exploring updates on career paths, opportunities, and the industry's reality. We delve into the myths versus the truths about cybersecurity careers, discussing the viability of high salaries…
  continue reading
 
Thinking about getting a 3D printer or have one and need a good primer? Check out this segment, we live 3D print a Captain Crunch whistle and talk all about 3D printing for hackers! Segment Resources: Slides used in this segment: https://files.scmagazine.com/wp-content/uploads/2024/07/3D-Printing-for-Hackers.pdf Major 3D Printer Websites: https://v…
  continue reading
 
Steve French, the host of the "Unsolved Mysteries" podcast joins "Mind Over Murder" hosts Bill Thomas and Kristin Dilley to discuss the popular podcast version of the legendary TV show, his career in voiceover, how the mix of supernatural and true crime topics works, and how much he has learned about working in the true crime space over the last fe…
  continue reading
 
If there's one thing for sure, we love people, and EVEN MORE connecting people we love with eachother. So one of the things we want to do more with our podcast is connect people that we love, with our listeners, and continue the love-athon spreading the JOY even more. This week, we sat down with Hassan Rahimi, a true light in our community, not to …
  continue reading
 
How can LLMs be valuable to developers as an assistant in finding and fixing insecure code? There are a lot of implications in trusting AI or LLMs to not only find vulns, but in producing code that fixes an underlying problem without changing an app's intended behavior. Stuart McClure explains how combining LLMs with agents and RAGs helps make AI-i…
  continue reading
 
How can LLMs be valuable to developers as an assistant in finding and fixing insecure code? There are a lot of implications in trusting AI or LLMs to not only find vulns, but in producing code that fixes an underlying problem without changing an app's intended behavior. Stuart McClure explains how combining LLMs with agents and RAGs helps make AI-i…
  continue reading
 
Cyber insurance underwriting is all over the map. With such a variation in application requirements, how should small and medium businesses prepare to receive the best policy for the price? Brian Fritton joins Business Security Weekly to discuss a systematic approach to preparing for cyber insurance. By working with the underwriters, this approach …
  continue reading
 
Join "Mind Over Murder hosts Bill Thomas and Kristin Dilley as they discuss the recent FBI/Virginia State Police Press Conferences announcing suspects ID's in the Colonial Parkway Murders (suspect Alan Wade Wilmer, Sr.) and Shenadoah Murders of Julie Williams and Lollie Winans (suspect Walter "Leo" Jackson Sr.) Are these press conferences with law …
  continue reading
 
I'm always thrilled to chat with ex-analysts, and Henrique Teixeira can cover a lot of ground with us on the topic of identity management and governance. The more I talk to folks about IAM/IGA, the more I'm shocked at how little has changed. If anything, it seems like we've gone backwards a bit, with the addition of cloud SaaS, mobile devices, and …
  continue reading
 
Bats in your headset, Windows Wifi driver vulnerabilities, Logitech's dongles, lighthttpd is heavy with vulnerabilities, node-ip's not vulnerability, New Intel CPU non-attacks, Blast Radius, Flipper Zero alternatives, will OpenSSH be exploited, emergency Juniper patches, and the D-Link botnet grows. Iceman comes on the show to talk about RFID and N…
  continue reading
 
Veteran reporter and television news anchor Carol Costello joins "Mind Over Murder" co-hosts Bill Thomas and Kristin Dilley to discuss her new true crime podcast, "Carol Costello Presents Blind Rage," which tells the shocking story of Phyllis Cottle, who was attacked in March 1984. Carol Costello covered the story as a rookie TV reporter. She also …
  continue reading
 
Accessorizing and bookcases can be intimidating, but they don't have to be! In this podcast The Boys discuss how they approach accessorizing and bookcases, some must have pieces they always start with, and how addressing the back of the bookcase first is incredibly important! After listening to the podcast, you might wonder which character in Steel…
  continue reading
 
Sandy Carielli and Janet Worthington, authors of the State Of Application Security 2024 report, join us to discuss their findings on trends this year! Old vulns, more bots, and more targeted supply chain attacks -- we should be better at this by now. We talk about where secure design fits into all this why appsec needs to accelerate to ludicrous sp…
  continue reading
 
Sandy Carielli and Janet Worthington, authors of the State Of Application Security 2024 report, join us to discuss their findings on trends this year! Old vulns, more bots, and more targeted supply chain attacks -- we should be better at this by now. We talk about where secure design fits into all this why appsec needs to accelerate to ludicrous sp…
  continue reading
 
On average, CISOs manage 50-75 security products. Many of these products have either not been deployed or only partially deployed, while others overlap of products. How do CISOs effectively consolidate their products to a manageable size? Max Shier, Chief Information Security Officer at Optiv Security, joins Business Security Weekly to discuss tech…
  continue reading
 
Loading …

Quick Reference Guide