Travel Hackers public
[search 0]
More
Download the App!
show episodes
 
Artwork

1
Richie Firth: Travel Hacker

Richie Firth: Travel Hacker

Unsubscribe
Unsubscribe
Monthly
 
Richie Firth is a broadcaster and professional idiot. He has spent years telling millions of people about his travel solutions, but just how good are they? He is joined by friend and producer of The Bugle Chris Skinner to embark on a series of missions involving cars, trains, planes, boats and more. Expect laughs, adventure, and tannoy announcements. Help the show to continue to rewrite history via Patreon: http://patreon.com/TravelHacker A Bugle Podcasts Production. Hosted on Acast. See aca ...
  continue reading
 
Artwork

1
Travel Chat with Ashley & Emily

Ashley Peterson and Emily Cooper

Unsubscribe
Unsubscribe
Monthly+
 
Ever wondered what really goes on when solo traveling the world? Join Emily from Emily Eats and Explores and Ashley from Ashley gets Around weekly as they air out their crazy travel stories, share travel tips, and just chat about travel! Emily Cooper is a full-time traveler and the creator behind Emily Eats and Explores. In 2022, Emily quit her job in healthcare to travel the world solo and create content. Now, she teaches women how they can make money while they travel the world! Ashley Pet ...
  continue reading
 
We celebrate the fun & positive side of miles, points & travel while talking to the most interesting people in the space. Get inspired to travel, find out the latest tricks and learn how to maximize travel rewards. Save money, accomplish your goals and form memories that will last a lifetime! Shawn Coomer has spent the last 17 years globetrotting with his family and has been professionally covering the miles & points space since 2013 when he launched Miles to Memories. He earns and burns mil ...
  continue reading
 
Learn all the hacks to upgrade your life, money and travel – all while spending less and saving more. Host Chris Hutchins is a life hacker who has saved millions by breaking down every aspect of life, looking to maximize happiness at the lowest cost. Chris and guests like Tim Ferriss, Tony Hawk, Codie Sanchez and Gary Vaynerchuk will help you learn the strategies and tactics they used to shape their success.
  continue reading
 
Nomad Tactics is a weekly podcast co-hosted by two veteran nomads. The episodes focus on providing practical how-to tips, and hacks. Best of all the hosts try to combine all tricks they discuss into a wider system that aims to optimize your nomadic life in every possible way. On an occasional basis, there are interviews with a variety of top-notch digital nomads, perpetual travelers, expats, location independent workers, remote workers, and travel hackers.
  continue reading
 
Welcome to the Traveling on Purpose Podcast. My name is DJ Jack. Join me as we explore the transformative stories of individuals who have harnessed the power of travel to elevate their lives and inspire others.
  continue reading
 
Artwork
 
Investigative researchers Ben Chasteen and Rob Counts expose covered-up truths, unearth hidden history, share information the mainstream media won’t discuss, and explore humanity’s buried spiritual potential.
  continue reading
 
Book 2 of the Borrowed Time Chronology Ness Relevant has traveled through time before. Now he must once again use his time machine to confront a determined foe. Only this time his personal stakes are even higher. Threatened by his future, he must find a way to save his wife and thwart a mad-man's schemes for world conquest, or he'll never regain his stolen time.
  continue reading
 
A series of interviews with business owners, restauranteurs, non-profit founders, community leaders and historic figures from Durham, North Carolina. A celebration of the city and an exploration of how people got here and why they stay.
  continue reading
 
Confused about the latest cybercrime in the news? Overwhelmed by trying to figure out if an incident applies to you? Want to learn simple, actionable steps to keep you and your family safe online? Introducing Bee Cyber Fit, a podcast for the Yale University community and beyond. We’ll cut through the cyber mumbo jumbo and make cybersecurity awareness easy to digest. Every two weeks we’ll share compelling cyber stories, make sense of buzzwords and share a simple call to action. Scammers are e ...
  continue reading
 
Do you like to travel? Do you like to listen to travel tales from well off the beaten path? "e-travels with e.trules" is a new, personal, idiosyncratic, and literary podcast created by Eric Trules. A longtime Huffington Post blogger and theater Professor at USC in Los Angeles, Trules has traveled our beautiful and problematic planet for decades, staying in Bedouin huts on the Red Sea, riding the rails to "Nose of the Devil" in Southern Ecuador, and meeting his future Indonesian wife on the m ...
  continue reading
 
Artwork

1
Macpreneur

Damien Schreurs

Unsubscribe
Unsubscribe
Weekly
 
The show for solopreneurs who can't imagine running their business on anything else than a Mac. Discover tips, tools and strategies to streamline your business, so that you'll be able to save time ⏱ and money 💸 while enjoying your solopreneur lifestyle. Weekly show covering Mac productivity mindset, techniques and tools. From time to time, I’ll interview a fellow Macpreneur who will share their own tips, tools and strategies allowing them to be more efficient and productive running their bus ...
  continue reading
 
Join Mat and Wes on Passive Aggressive, a quest to be the most juvenile waste of time there is on the internet! Find us on your favourite podcast app, YouTube or Discord, all the links are here: https://linktr.ee/passiveaggressivepod
  continue reading
 
Artwork
 
We started Tech Gumbo in Nov 2014 as a conversational show of news, information & updates about the past, present & future of all things technology in a topical, interesting and digestible way.
  continue reading
 
Welcome to the Security Weekly Podcast Network, your all-in-one source for the latest in cybersecurity! This feed features a diverse lineup of shows, including Application Security Weekly, Business Security Weekly, Paul's Security Weekly, Enterprise Security Weekly, and Security Weekly News. Whether you're a cybersecurity professional, business leader, or tech enthusiast, we cover all angles of the cybersecurity landscape. Tune in for in-depth panel discussions, expert guest interviews, and ...
  continue reading
 
Welcome to the Security Weekly Podcast Network, your all-in-one source for the latest in cybersecurity! This feed features a diverse lineup of shows, including Application Security Weekly, Business Security Weekly, Paul's Security Weekly, Enterprise Security Weekly, and Security Weekly News. Whether you're a cybersecurity professional, business leader, or tech enthusiast, we cover all angles of the cybersecurity landscape. Tune in for in-depth panel discussions, expert guest interviews, and ...
  continue reading
 
Discover the latest news and trends in cybersecurity and fraud prevention in the Kount 5 Trends, 5 Minutes: Cyber & Fraud podcast. Each week host Lacey Briggs will bring you the top five headlines with insights from industry experts on how to protect your business from eCommerce fraud, payments fraud, bots, account takeover and more. Join us every Thursday.
  continue reading
 
Guards Guards - Insurrection is in the air in Ankh-Morpork. The Haves and Have-Nots are about to fall out all over again. Captain Sam Vimes of the city�s ramshackle Night Watch is used to this. It�s enough to drive a man to drink. Well, to drink more. But this time, something is different � the Have-Nots have found the key to a dormant, lethal weapon that even they don�t fully understand, and they�re about to unleash a campaign of terror on the city. Time for Captain Vimes to sober up. Wyrd ...
  continue reading
 
Synchronicity machines. Difference engines melded with the iChing. Geomancy: the art of making stone float with sound. The hacker collective 'Anonymous'. Secret societies … This is the world of ARMAND PTOLEMY, a new action-adventure hero. Facing an enemy armed with the Golden Aleph -- a mystical device that allows its wielder to see holographically into every point in time and space, Ptolemy must use every trick of his Oxford-educated mind and circus-trained body to succeed. But how do you f ...
  continue reading
 
Loading …
show series
 
This week, the cybersecurity industry's most basic assumptions under scrutiny. Following up our conversation with Wolfgang Goerlich, where he questions the value of phishing simulations, we discuss essays that call into question: the maturity of the industry the supposed "talent gap" with millions of open jobs despite complaints that this industry …
  continue reading
 
After the recent explosions of pagers and other devices like old radios and appliances in Lebanon, the world is wondering: how could this even happen, and how safe are any electronic devices? 👉 Watch all-new Edge of Wonder series, exclusive shows, and more on Rise TV! https://bit.ly/3MUbdzY 👉 Get the Ultimate Guide to the Alien Races PDF for FREE! …
  continue reading
 
In this episode, we explore some compelling reasons for transitioning from traditional SOAR tools to next-generation SOAR platforms. Discover how workflow automation and orchestration offers unparalleled speed and flexibility, allowing organizations to stay ahead of evolving security threats. We also delve into how advancements in AI are driving th…
  continue reading
 
A month ago, my friend Wolfgang Goerlich posted a hot take on LinkedIn that is less and less of a hot take these days. He posted, "our industry needs to kill the phish test",and I knew we needed to have a chat, ideally captured here on the podcast. I've been on the fence when it comes to phishing simulation, partly because I used to phish people as…
  continue reading
 
A month ago, my friend Wolfgang Goerlich posted a hot take on LinkedIn that is less and less of a hot take these days. He posted, "our industry needs to kill the phish test",and I knew we needed to have a chat, ideally captured here on the podcast. I've been on the fence when it comes to phishing simulation, partly because I used to phish people as…
  continue reading
 
Gain insights into the CISA KEV straight from one of the folks at CISA, Tod Beardsley, in this episode of Below the Surface. Learn how KEV was created, where the data comes from, and how you should use it in your environment. This segment is sponsored by Eclypsium. Visit https://securityweekly.com/eclypsium to learn more about them! Show Notes: htt…
  continue reading
 
Episode Description In this episode of the Miles to Memories podcast, hosts Shawn and Joe discuss a variety of topics ranging from sports banter to travel tips. They share a personal story about a potential hack on Joe's American Express account, emphasizing the importance of security measures and password management. The conversation shifts to fam…
  continue reading
 
Apple drops a lawsuit to avoid exposing secrets, what does it mean for the security industry if MS locks down the kernel?, exploding pagers, more things from the past: Adobe Flash exploits, robots get rid of your data, PKFail is still a thing, Android TV malware is back: now with conspiracy theories, DMA attacks, gamers are not nation-state attacke…
  continue reading
 
Apple drops a lawsuit to avoid exposing secrets, what does it mean for the security industry if MS locks down the kernel?, exploding pagers, more things from the past: Adobe Flash exploits, robots get rid of your data, PKFail is still a thing, Android TV malware is back: now with conspiracy theories, DMA attacks, gamers are not nation-state attacke…
  continue reading
 
Send me a Text Message In this episode, you'll learn how Jaclyn Strominger, a high achiever success coach, utilizes her MacBook Air to run her business efficiently. Jaclyn shares her journey from using an old iMac to switching to a MacBook Air. Discover the tools that Jaclyn uses to streamline her workflow. Jaclyn also provides practical tips to sa…
  continue reading
 
The Question of the Week: My children are starting to use the Internet, what should I be telling them? The Big Stories: iPhone 16 (all versions) announced, plus Apple Watch 10 and AirPods 4 Apple Intelligence (A.I.) will not be available at launch, look for a slow roll out CIO’s and CTO’s concerned about the new iPhone’s AI and security risk Wait u…
  continue reading
 
#193: Unlock better opportunities, improve your emotional and physical health, and build stronger relationships by embracing “hopeful skepticism.” Dr. Jamil Zaki shares science-backed, actionable strategies to overcome the rising tide of cynicism and shift toward a positive mindset— paving the way for a more fulfilling and successful life. Dr. Jami…
  continue reading
 
When a conference positioned as a day of security for developers has to be canceled due to lack of interest from developers, it's important to understand why there was so little interest and why appsec should reconsider its approach to awareness. Dustin Lehr discusses how appsec can better engage and better deliver security concepts in a way that m…
  continue reading
 
When a conference positioned as a day of security for developers has to be canceled due to lack of interest from developers, it's important to understand why there was so little interest and why appsec should reconsider its approach to awareness. Dustin Lehr discusses how appsec can better engage and better deliver security concepts in a way that m…
  continue reading
 
Cybersecurity is complex. We have threats, vulnerabilities, incidents, controls, risks, etc. But how do they all connect together to drive a cyber risk program? As an industry, we've struggled for 20+ years trying to boil this ocean. Maybe we've been going about it the wrong way. Padraic O'Reilly, Founder and Chief Innovation Officer at CyberSaint,…
  continue reading
 
In the leadership and communications segment, Why Companies Should Consolidate Tech Roles in the C-Suite, End of an era: Security budget growth slows down, Global cybersecurity workforce growth flatlines, stalling at 5.5M pros, and more! Show Notes: https://securityweekly.com/bsw-364
  continue reading
 
In this episode of Travel Chat, Ashley and Emily explore the digital nomad lifestyle and its challenges. Ashley, who was once ready to take a break from constant travel, is now reconsidering becoming a nomad again. She discusses the logistics of managing a business without a U.S. address and whether to end her lease or stay put as she juggles her b…
  continue reading
 
Cybersecurity is complex. We have threats, vulnerabilities, incidents, controls, risks, etc. But how do they all connect together to drive a cyber risk program? As an industry, we've struggled for 20+ years trying to boil this ocean. Maybe we've been going about it the wrong way. Padraic O'Reilly, Founder and Chief Innovation Officer at CyberSaint,…
  continue reading
 
News and Updates: Ford was awarded a patented for in car advertising that will listen to passenger’s conversation A new Malware, name Voldemort has been released and is affecting Google Sheets Hackers are learning how to bypass MFA WhatsApp and Messenger must be compatible with Telegram, Signal and iMessage Google upgrades from Sky Maps to Google M…
  continue reading
 
By crikey, we are proud to bring you what has been called by pundits as "the biggest waste of time since time was invented" In episode 153 we look at some extreme sports we were not aware existed, we check out the best workplace video ever, Queensland Report is back, we revel in the chaotic joy that is a Maury DNA test and cast our eye over a bruta…
  continue reading
 
Ever wondered what it's like to be responsible for the cybersecurity of a sports team? How about when that sports team is one of the world's most successful Formula One teams? I can't describe how excited we are to share this interview. This interview is basically two huge F1 nerds who happen to also be cybersecurity veterans asking everything they…
  continue reading
 
Are time slips and out-of-body experiences proof of interdimensional travel? 👉 Watch all-new Edge of Wonder series, exclusive shows, and more on Rise TV! https://bit.ly/3TvdQvP 👉 Get the Ultimate Guide to the Alien Races PDF for FREE! https://rise.tv/alienraces Imagine being able to go to the past and witness an event firsthand, such as watching Le…
  continue reading
 
We are a month away from Oktane -- the biggest identity event of the year. Okta is bringing thousands of identity industry thought leaders, IT and security executives, and other tech leaders together on October 15-17 to discuss the changing landscape for security and identity, how organizations are putting identity first, new Okta products, and mor…
  continue reading
 
Episode Description On this episode of the Miles to Memories podcast, Shawn is joined by Mark Ostermann. The two discuss a variety of topics ranging from personal experiences with homeownership challenges to the influence of social media on travel. They share insights on upcoming travel events, the evolution of miles and points, and the behind-the-…
  continue reading
 
This week, in the enterprise security news, Cribl, Zafran, and US states raise funding Cisco, Check Point, Salesforce, and Absolute Software acquire cybersecurity startups AI Security products are picking up steam You probably shouldn’t be too worried about Yubikey cloning Instead, you should be more worried about malicious npm packages! The White …
  continue reading
 
This week, in the enterprise security news, Cribl, Zafran, and US states raise funding Cisco, Check Point, Salesforce, and Absolute Software acquire cybersecurity startups AI Security products are picking up steam You probably shouldn’t be too worried about Yubikey cloning Instead, you should be more worried about malicious npm packages! The White …
  continue reading
 
Don't tell the FCC there is a new Flipper firmware release, unpatchable?, argv[0] and sneaking past defenses, protect your registries, someone solved my UART RX problem, PKFail update, legal threats against security researchers documented, EDR bypass whack-a-mole continues, emulating PIs, VScode moonlights as a spy, Want to clone a YubiKey? All you…
  continue reading
 
Loading …

Quick Reference Guide