show episodes
 
This spirited and spiritual vegan podcast is a lively hour dedicated to helping you look and feel amazing, eat extraordinary food, honor and protect all beings, and create a body exquisitely attuned to spiritual growth. Host Victoria Moran, author of Main Street Vegan, The Good Karma Diet, and Creating a Charmed Life, is joined by physicians, athletes, yogis, spiritual luminaries, ethical exemplars, and celebrity and real-world vegans with practical ideas for elevated living.
 
Your Faith to Live By speakers are Larry Millender and James Saulter. Larry is the senior pastor of Church 360 in Tallahassee, with Sunday services at 9 a.m. and Wednesday services at 6:30 p.m. James is the senior pastor of Summit Life Church in Crawfordville, with Sunday morning morning prayer at 8 a.m. and worship at 10:30 a.m. And Wednesday Life Group is at 7 p.m.
 
Loading …
show series
 
Show Notes: We should be as intentional with our families as we are with our jobs. There is a sense that, on one level, I as a parent affect the faith journey of my kids. But on another level, there is a limit to the responsibility parents have for the choices our kids make. God has made them as individuals. A lot of godly parents will have a child…
 
Rick explains the network defender evolution from defense-in-depth in the 1990s, to intrusion kill chains in 2010, to too many security tools and SOAR in 2015, and finally to devsecops somewhere in our future. Resources: “Cybersecurity First Principles: DevSecOps.” by Rick Howard, CSO Perspectives, The CyberWire, 8 June 2020. “FAQ,” RSA Conference,…
 
Social engineer and CEO of Hekate, Marina Ciavatta, shares her story of how people think her job is a la Mission Impossible coming from the ceiling with a rope and stealing stuff in the dead of the night. Marina does physical pentesting. Starting with an unused degree in journalism, Marina turned her talent for writing into a job as a content produ…
 
This episode features guest Alissa Knight, former hacker and partner at Knight Ink, along with Karl Mattson, CISO from Noname Security, discussing findings on severe API vulnerabilities in U.S. banking applications research that was conducted by Alissa and funded by Noname Security. The research, “Scorched Earth: Hacking Bank APIs,” unveils a numbe…
 
A large-scale cyberattack against Ukrainian websites looks like an influence operation, and Russian intelligence services are the prime suspects. The FSB raids REvil. The White House Open Source Software Security Summit looks toward software bills of materials. MuddyWater exploits Log4shell. The DPRK is working to steal cryptocurrency. Caleb Barlow…
 
A White House government-industry summit today addresses open-source software security. The US officially makes its second attribution of the week to a nation-state: it calls out Iran as the operator of the MuddyWater threat group. Israel arrests five on charges related to spying for Iran (they’re thought to have been recruited through catphishing)…
 
The US issues an alert over the prospect of Russian cyberattacks, and the EU begins a series of stress tests, both in apparent response to concerns over the prospect of a Russian attack on Ukraine. NIST updates its guidance on Engineering Trustworthy Secure Systems. NIght Sky ransomware exploits Log4shell. Phishing afflicts a hotel chain. Carole Th…
 
Grace. It’s the thing we need the most, and the thing we deserve the least. While many of us understand in our heads the importance of Jesus’ sacrifice for us, we often allow our hearts to forget just how amazing the good news of the gospel really is. As Pastor J.D. shows us in our series, “In Step,” when we allow the amazing grace of God to amaze …
 
Log4shell as an instance of a more general software supply chain issue. An APT apparently mistakenly infects itself with its own RAT. A new backdoor, SysJoker, is in use in the wild. A warning on commercial surveillance software. A leak investigation continues in Denmark. Joe Carrigan explains bogus QR codes. Our guest is Casey Allen of Concentric …
 
As we continue our “In Step” series through the book of Luke, Pastor J.D. teaches about the scandal of grace. Grace offends most people, particularly religious people. We are hard-wired to think that our worth is a result of what we do. Do good things, get good outcomes. Do bad things, get bad outcomes. Grace throws this whole system aside. And tha…
 
CISA describes progress toward remediating Log4shell. Other open-source libraries are found to have similar issues, in one case problems deliberately introduced by the developer. Concerns are expressed over undersea cable security. FIN7’s BadUSB campaign. Security questions about another Chinese-made phone. Our guest is Bob Maley from Black Kite on…
 
Senior Vice President and Executive in Residence with Rapid7 and Chairman for Cyversity, Julian Waits, grew up in the era of the Justice League and Superman and it shaped his career. Julian always wanted to do something where he could find a way to help society to basically help others. Starting out as a Baptist minister with aspirations of being a…
 
Guest Rob Boyce, Accenture's Global Lead for Cyber Incident Response and Transformation Services, joins Dave to discuss their research "Karakurt rises from its lair." Accenture Security has identified a new threat group, the self-proclaimed Karakurt Hacking Team, that has impacted over 40 victims across multiple geographies. The threat group is fin…
 
Kazakhstan shuts down its Internet as civil unrest continues (and one consequence is a disruption of alt-coin mining in that country). The UK’s NHS warns of unknown threat actors exploiting Log4j bugs in unpatched VMware Horizon servers. In the US, CISA continues to assist Federal agencies with Log4j remediation, and observers call for more Governm…
 
As we continue our “In Step” series through the book of Luke, Pastor J.D. teaches what it means to “live ready” for Jesus’ return. Are we awake to the task Jesus left for his church, or are we asleep at the wheel? Are we confident Jesus will return soon, or do we live without urgency? As followers of Jesus, we should live in such a way that only ma…
 
ICS vendors address Log4j vulnerabilities. Regulators and legislators think about addressing issues in the software supply chain. Ransomware gangs were quick to exploit Log4shell. An old, and patched, Windows vulnerability is being exploited by the Malsmoke gang. Social engineering of Google Docs users is up. Mr. Klyshin pleads not guilty. Robert M…
 
If greed is a sickness we can have without even realizing it, what’s the cure? Part of being a disciple of Jesus is learning how to re-think contentment and wake up to the brevity of life. Pastor J.D. shows us what Jesus has to say about guarding against greed as he draws from the book of Luke in our series called “In Step.”…
 
CISA says US Federal agencies are now largely in compliance with Log4j risk mitigation guidance. The FTC issues advice and a warning on Log4j to US businesses. A skimmer is installed through cloud-delivered video. The Vice Society’s ransomware is meddling with supermarket operations in the UK. The Atlantic Council offers advice on strategy for the …
 
As we continue our “In Step” series through the book of Luke, Pastor J.D. preaches about a sickness that most of us have, but few of us realize—the sickness of greed. Part of what makes greed so deadly is our inherent blindness to it. Jesus simply assumes that greed is a problem for all of us! But he also offers us a radical, gospel-shaped antidote…
 
It’s going to take time, vigilance, and attention to detail to manage the Log4j risks. A North Korean APT is trying to install the Konni RAT into Russian diplomats’ devices. More hacktivist-looking incidents follow the anniversary of Iranian General Soleimani’s death. Other, self-inflicted, software supply chain incidents. The Kremlin is said to be…
 
Aquatic Panda has been found working Log4shell exploits against an academic institution. Apache fixes new Log4j issues reported last week, and Microsoft also updates Windows Defender to address Log4j risks. Cyberattacks, criminal or hacktivist in motivation, hit news outlets around the new year. Microsoft works on fixing a Y2K22 bug in on-premise E…
 
As we begin our “In Step” series through the book of Luke, Pastor J.D. dives into one of Jesus’ most recognized parables. It’s a story about two men who built identical houses—with tragically different results. The only difference? Their foundation. In these times of uncertainty, as our very lives seem shaken, it’s a perfect time to make sure our l…
 
Show Notes: Who do you feel the closest kinship with? Who do you spend most of your time with? The lesson from Lot’s life is that you have to make up your mind from the beginning: Who do you really want to be? If it’s with the world, go there 100%. If it’s with God, go with him 100%. What do you love? What does that say about what your heart really…
 
Head of Cyber Governance with Red Sift, Dr. Rois Ni Thuama shares the circuitous route of her career into cyber governance. She notes the route "looks really clean, but actually it was a bit more Jeremy Bearimy." While at Trinity College, Rois was moved to be part of history unfolding in South Africa and pause her studies. While there, she began ma…
 
Industry experts discuss their cybersecurity predictions for 2022, what trends and attacks will be most prevalent in the year ahead, and how organizations should be preparing for the new year. In this show, we cover what they think the industry might see in 2022 (and some we probably won't see). The CyberWire's Rick Howard speaks with Hash Table me…
 
Our guest Doel Santos, Threat Research Analyst at Palo Alto Networks, joins Dave Bittner to talk about Unit 42's work on "Ransomware Groups to Watch: Emerging Threats." As part of Unit 42’s commitment to stop ransomware attacks, they monitor the activity of existing groups, search for dark web leak sites and fresh onion sites, identify up-and-comin…
 
During our winter break, our team thought you might like to try a sample of a CyberWire Pro podcast called Interview Selects. These podcasts are a series of extended interviews, exclusives, and a curated selection of our most engaging and informative interviews over the years, featuring cyber security professionals, journalists, authors and industr…
 
During our winter break, our team thought you might like to try a sample of a CyberWire Pro podcast called Interview Selects. These podcasts are a series of extended interviews, exclusives, and a curated selection of our most engaging and informative interviews over the years, featuring cyber security professionals, journalists, authors and industr…
 
I’ve started to rely more and more on the different GPS apps on my phone – not because I don’t know my way around, but because they get real-time traffic information and can correct my course. It’s more of a guide than just a map. Today, Pastor J.D. lovingly shows us that what we need is a relationship with a constant guide who, at every point, can…
 
During our winter break, our team thought you might like to try a sample of a CyberWire Pro podcast called Interview Selects. These podcasts are a series of extended interviews, exclusives, and a curated selection of our most engaging and informative interviews over the years, featuring cyber security professionals, journalists, authors and industr…
 
No matter how strong our faith is, we all have moments when we come to the end of ourselves. The problem is, if we’re honest, we aren’t sure if God can meet us in that place. But Pastor J.D. explains that if we offer our desperation to God in prayer, we will find him eager to listen, eager to forgive, eager to heal, eager to step in and help.…
 
During our winter break, our team thought you might like to try a sample of a CyberWire Pro podcast called Interview Selects. These podcasts are a series of extended interviews, exclusives, and a curated selection of our most engaging and informative interviews over the years, featuring cyber security professionals, journalists, authors and industr…
 
Did you know that Esther is one of only two books in the Bible named for a woman? It’s been a pretty controversial book. But not because it is named for a woman, but because God’s name is not mentioned— not even one time—in the whole book! Thankfully, however, God has kept it in the Bible for us—because it really has something important to teach us…
 
Loading …

Quick Reference Guide

Copyright 2022 | Sitemap | Privacy Policy | Terms of Service
Google login Twitter login Classic login