Ubiquity public
[search 0]
More
Download the App!
show episodes
 
Uniquity over Ubiquity is a show that delves deep into the mind of an up and coming artist, as well as the artist that inspired them! Anyone that is gaining traction in their field is worth interviewing! We ask our guests to tell us ahead of time who their favorite artist/inspiration is. Once I have the artist I study their career and life and generate a pretty substantial list of questions. These questions relate to many things, such as comparison points between the two careers, questions a ...
  continue reading
 
Pandemic. Health crisis. Economic downturn. Societal standstill. These are the soundbites we hear in the ever-changing, interconnected 24/7 news cycle; all relating back to one thing: coronavirus. But what about the stories and experiences in this current global narrative that don’t always receive media attention? From Ubiquity Audio, this is ‘Coronavirus: Isolated Times’. Join host Aaron M. Wilson as he takes a deep dive into this uncertain new normal. Only this time, you get to hear it not ...
  continue reading
 
Dear diary, This marks a significant moment in my life as I embark on a new path of my journey. I have decided to share my innermost thoughts and experiences through a podcast, transforming it into a digital diary of sorts. I want to invite you, everyone out there, into my world, where the boundaries between the external and internal aspects of our existence blur, and where the spiritual and physical dimensions harmoniously coexist. I have chosen the name "Ubique Perpetuum" for this podcast, ...
  continue reading
 
Artwork

1
Chip on My Shoulder

Chip on My Shoulder

Unsubscribe
Unsubscribe
Monthly
 
Chip on My Shoulder is conversation about the resentments, big and small, that populate modern life and how we live and enjoy life anyways. A cozy conversation with your friends, join us!
  continue reading
 
Artwork

1
Carnegie Council Podcasts

Carnegie Council for Ethics in International Affairs

Unsubscribe
Unsubscribe
Weekly
 
Listen to the latest insights from Carnegie Council for Ethics in International Affairs—the world’s catalyst for ethical action. Tune in to hear from leading experts and thinkers from around the world who are tackling the most complex issues today and tomorrow, including the intersection of AI and equality, the governance of climate altering technologies, America’s changing role in the world, and the future of global migration. To learn more, visit our website at http://www.carnegiecouncil.org.
  continue reading
 
Voices of Conscious Emergence with singer, innovatory educator, author and founder of The Naked Voice, Chloe Goodchild. "Given the turmoil that humanity faces – individually and collectively – I am inviting teachers and authors in the fields of sound, spirituality and the new sciences, to participate with me in unlocking and activating the tools and skills required for the evolution of courageous and compassionate communication. We will explore our diverse artistic disciplines as spiritual p ...
  continue reading
 
401k retirement plan industry podcast for financial advisors, TPA's, CPA's, plan sponsors & other 401k and financial nerds. Formerly the "retireholiks", but our stupid spelling was confusing people. We have unscripted, uncensored discussions with 401k retirement plan insiders and other financial professionals, while drinking beer and playing games.
  continue reading
 
After nearly a decade, 5G is finally becoming a reality. 5G networks will create a smarter, more connected world and will change our lives forever. These rapid advances in artificial intelligence, automation, internet of things and other emerging technologies are creating demand for new jobs and the skills gap continues to widen. All industries are becoming tech industries and the tech talent shortage is becoming everyone’s problem. What will the workforce of the future look like? Join Carri ...
  continue reading
 
Loading …
show series
 
Today, eight of the world's most populous countries, or about 4 billion people, are led by politicians 70 years of age, or older. Wall Street Journal reporter Jon Emont joins Doorstep co-hosts Nick Gvosdev and Tatiana Serafin to discuss the systems and structures that keep aging leaders in power in both autocracies and democracies. What do we lose …
  continue reading
 
Sam Valencia, Jerry Zigmont and Joe Saponare discuss working with Apple technology and clients. Drawn from their combined experience of over 20 years in the Apple Consultants Network, they discuss technical support issues both with the technology and working with clients.By Sam Valencia, Jerry Zigmont and Joe Saponare
  continue reading
 
[youtube https://www.youtube.com/watch?v=63w7er8DhyQ?version=3&rel=1&showsearch=0&showinfo=1&iv_load_policy=1&fs=1&hl=en-US&autohide=2&wmode=transparent&w=900&h=507] Sondheim is the best and these days Tribute Reviews are the thing to do especially since the Sondheim estate has allowed theater companies to craft individualized reviews (unlike the P…
  continue reading
 
Version 4.0 of the Payment Card Industry Data Security Standard (PCI DSS) puts greater emphasis on application security than did previous versions of the standard. It also adds a new “customized approach” option that allows merchants and other entities to come up with their own ways to comply with requirements, and which also has implications for a…
  continue reading
 
There are as many paths into infosec as there are disciplines within infosec to specialize in. Karan Dwivedi talks about the recent book he and co-author Raaghav Srinivasan wrote about security engineering. There's an appealing future to security taking on engineering roles and creating solutions to problems that orgs face. We talk about the breadt…
  continue reading
 
Sam Valencia, Jerry Zigmont and Joe Saponare discuss working with Apple technology and clients. Drawn from their combined experience of over 20 years in the Apple Consultants Network, they discuss technical support issues both with the technology and working with clients.By Sam Valencia, Jerry Zigmont and Joe Saponare
  continue reading
 
Startup founders dream of success, but it's much harder than it looks. As a former founder, I know the challenges of cultivating an idea, establishing product market fit, growing revenue, and finding the right exit. Trust me, it doesn't always end well. In this interview, we welcome Seth Spergel, Managing Partner at Merlin Ventures, to discuss how …
  continue reading
 
Archival Film Curatorship: Early and Silent Cinema from Analog to Digital (Amsterdam UP, 2023) is the first book-length study that investigates film archives at the intersection of institutional histories, early and silent film historiography, and archival curatorship. It examines three institutions at the forefront of experimentation with film exh…
  continue reading
 
In the days when Mirai emerged and took down DynDNS, along with what seemed like half the Internet, DDoS was as active a topic in the headlines as it was behind the scenes (check out Andy Greenberg's amazing story on Mirai on Wired). We don't hear about DDoS attacks as much anymore. What happened? Well, they didn't go away. DDoS attacks are a more …
  continue reading
 
[youtube https://www.youtube.com/watch?v=ZrPI4eN2UsI?version=3&rel=1&showsearch=0&showinfo=1&iv_load_policy=1&fs=1&hl=en-US&autohide=2&wmode=transparent&w=900&h=507] Purpose is a powerful new work by Branden Jacobs-Jenkins, directed by the legendary Phylicia Rashad (who played Claire Huxtable on “The Cosby Show”). The story revolves around the poli…
  continue reading
 
Jim joins the Security Weekly crew to discuss all things supply chain! Given the recent events with XZ we still have many topics to explore, especially when it comes to practical advice surrounding supply chain threats. Ahoi new VM attacks ahead! HTTP/2 floods, USB Hid and run, forwarded email tricks, attackers be scanning, a bunch of nerds write s…
  continue reading
 
We look into the supply chain saga of the XZ Utils backdoor. It's a wild story of a carefully planned long con to add malicious code to a commonly used package that many SSH connections rely on. It hits themes from social engineering and abuse of trust to obscuring the changes and suppressing warnings. It also has a few lessons about software devel…
  continue reading
 
[youtube https://www.youtube.com/watch?v=LlOj3Qei3eY?version=3&rel=1&showsearch=0&showinfo=1&iv_load_policy=1&fs=1&hl=en-US&autohide=2&wmode=transparent&w=900&h=507] Paul goes Behind the Curtain with Magician and Card Cheating expert Harry Milas who discusses his amazing show playing through May 5th at Steppenwolf’s Merle Reskin Garage Space. Milas…
  continue reading
 
In this discussion, we focus on vendor/tool challenges in infosec, from a security leader's perspective. To quote our guest, Ross, "running a security program is often confused with shopping". You can't buy an effective security program any more than you can buy respect, or a black belt in kung fu (there might be holes in these examples, but you ho…
  continue reading
 
As most of you have probably heard there was a scary supply chain attack against the open source compression software called "xz". The security weekly hosts will break down all the details and provide valuable insights. https://blog.qualys.com/vulnerabilities-threat-research/2024/03/29/xz-utils-sshd-backdoor https://gynvael.coldwind.pl/?id=782 http…
  continue reading
 
NVD checked out, then they came back? Maybe? Should the xz backdoor be treated as a vulnerability? Is scan-driven vulnerability management obsolete when it comes to alerting on emerging threats? What were some of the takeaways from the first-ever VulnCon? EPSS is featured in over 100 security products, but is it properly supported by those that ben…
  continue reading
 
Sometimes infosec problems can be summarized succinctly, like "patching is hard". Sometimes a succinct summary sounds convincing, but is based on old data, irrelevant data, or made up data. Adrian Sanabria walks through some of the archeological work he's done to dig up the source of some myths. We talk about some of our favorite (as in most dislik…
  continue reading
 
Harold Rivas has held multiple CISO roles. In his current CISO role, he's championing Trellix's overall mission to address the issues CISOs face every day, encouraging information sharing and collaborative discussions among the CISO community to help address challenges and solve real problems together - part of this is through Trellix's Mind of the…
  continue reading
 
How can Global South and Global North nations collaborate more effectively? What roadblocks hinder joint action on crucial issues such as security, development, climate, and AI? How can ethical reflection and engagement pave the way for a more inclusive and equitable multilateralism? In the inaugural panel of Carnegie Council’s “Unlocking Cooperati…
  continue reading
 
Thank you to our VIP sponsors! ▶️ New: watch on YouTube! Topics: -Today we welcome Justin Esgar of Virtual Computers and The ACES Conference. -Justin gives us his full review of Vision Pro. -Joe gets practical about flying with a Vision Pro. -Justin recommends a book called MSP Secrets Revealed (he happens to be in it as well). -He does not recomme…
  continue reading
 
Many years ago, I fielded a survey focused on the culture of cybersecurity. One of the questions asked what initially drew folks to cybersecurity as a career. The most common response was a deep sense of curiosity. Throughout my career, I noticed another major factor in folks that brought a lot of value to security teams: diversity. Diversity of pe…
  continue reading
 
[youtube https://www.youtube.com/watch?v=lUwIRj67KNo?version=3&rel=1&showsearch=0&showinfo=1&iv_load_policy=1&fs=1&hl=en-US&autohide=2&wmode=transparent&w=900&h=507] Paul goes behind the curtain with the owner of the legendary business, Architectural Artifacts, Stuart Grannen. Located in Chicago for 37 years, Stuart chose to leave our cold winters …
  continue reading
 
One of the core ethical and legal imperatives in warfare is the protection of civilians. With the vast majority of armed conflicts in the world today occurring between state and non-state actors, this has led to ambiguity around traditional battlefield lines, what laws apply, and who is viewed as liable to harm. This virtual panel explored emerging…
  continue reading
 
Jason Healey comes on the show to discuss new ideas on whether the new national cybersecurity strategy is working. Segment Resources: DEFRAG Hacker Film Festival short documentary (https://youtu.be/NYvHWcQsIRE) on hackers and their favorite films. For educational purposes only, as we don’t have the rights to the clips. YouTube link to Wargames even…
  continue reading
 
Chloë Goodchild in conversation with internationally acclaimed singer, musician, and leader in the field of sound healing, Jeralyn Glass, discussing compassion, voice, singing bowls, vibration, music as medicine, and much more. The VOCE Dialogues offer a simple, accessible in-depth ground for poets, authors, musicians, visual artists, and visionary…
  continue reading
 
In this probing discussion with Senior Fellow Arthur Holland Michel, Brianna Rosen, senior fellow at "Just Security" and the University of Oxford, discusses what we know (and what we don't) about Israel's use of AI in the war in Gaza and explains the fraught relationship between algorithmic decisions, transparency, and accountability. She also look…
  continue reading
 
With hundreds or thousands of SaaS apps to secure with no traditional perimeter, Identity becomes the focal point for SaaS Security in the modern enterprise. Yet with Shadow IT, now recast as Business-Led IT, quickly becoming normal practice, it’s more complicated than trying to centralize all identities with an Identity Provider (IdP) for Single S…
  continue reading
 
▶️ New: watch on YouTube! Topics: -This week we welcome Jason Harrison, of Harrison Tech Consulting. -He is also heavily involved with NSITSP (National Society for IT Service Providers). -Jason takes us through the history of his consulting practice, where he handles a variety of operating systems. -We discuss how IT support is not just supporting …
  continue reading
 
One of the biggest failures in appsec is an attitude that blames users for security problems. A lot of processes and workflows break down because of an insecure design or insecure defaults. Benedek Gagyi chats with us about the impact of the user experience (UX) on security and why it's not only important to understand how to make a user's life eas…
  continue reading
 
Get the bestselling and tearjerking (for most people) children's book classic, Love You Forever by Robert Munsch: https://bookshop.org/a/11789/9780920668375 Don't take my word for it, read the CDC stats on birth and fertility in the US: https://www.cdc.gov/nchs/data/nhsr/nhsr179.pdf We use Bookshop affiliate links, which support local bookstores wi…
  continue reading
 
While awareness and attention towards cybersecurity are on the rise, some popular and persistent myths about cybersecurity have almost become threats themselves. API security requires a modern understanding of the threat landscape, with the context that most API providers desire to be more open and accessible to all. We will debunk the 5 worst myth…
  continue reading
 
Which is more dangerous, open source AI or large language models and other forms of generative AI totally controlled by an oligopoly of corporations? Will open access to building generative AI models make AI more democratic? What other approaches to ensuring generative AI is safe and democratic are available? Carnegie-Uehiro Fellow Wendell Wallach …
  continue reading
 
Loading …

Quick Reference Guide