It is said that a good question has one right answer, but that a great question has many right answers. With many voices offering personal answers to complex questions, The 4 Questions podcast provides a platform to learn about and from people doing extraordinary and everyday things. Regardless of whether one is committed to organized religion, spirituality, searching, atheist, agnostic, “done with it,” or something else entirely, this podcast is for anyone. Host | Rabbi Adam Grossman Prod ...
…
continue reading
Celebrate "Bon Appétit's" first-ever 'Culture Issue' at this event featuring Editor-in-Chief Adam Rapoport, Creative Director Alex Grossman, and photographers Peden + Munk. They'll discuss how the issue was shot using iPhone and share their tips and tricks for capturing beautiful food images with your iPhone.
…
continue reading
Fuel your day with a moment of motivation with bestselling author and motivational speaker Adam Davis. It's not theory, it's life experience. Reinforce your faith, live a life undefeated. For this we know; in life, there is death. In victory, there is defeat. But with faith, we are immortalized and undefeated. Semper Invictus, Warrior.
…
continue reading
The podcast about the biggest moments in communications with the people who were behind them.
…
continue reading
Smart People Should Build Things
…
continue reading
Quarter Four covers the intersection between business and sports, providing listeners an inside look into the psychology of what makes individuals successful on and off the field.
…
continue reading
A podcast about life, wellness, becoming a better person — and everything in between. Join entrepreneur, dreamer, family-man, and CEO/Owner of Direct CBD Online John Wiesehan III every month as he talks about how he's gotten where he is in life with the role models he continues to use for inspiration.
…
continue reading
This feed includes all episodes of Paul's Security Weekly, Enterprise Security Weekly, Business Security Weekly, Application Security Weekly, and Security Weekly News! Your one-stop shop for all things Security Weekly!
…
continue reading
This feed includes all episodes of Paul's Security Weekly, Enterprise Security Weekly, Business Security Weekly, Application Security Weekly, and Security Weekly News! Your one-stop shop for all things Security Weekly!
…
continue reading
Hunting podcast for the South. We talk tactics, strategy, biology, stories and more for all kinds of southern wild game on public land, private, leases, and hunt clubs. We strive to be entertaining and informational for hunters from across the globe with a focus on whitetail deer and turkey.
…
continue reading
Conversations on governance with leading social scientists around the world. Run by the Centre for the Study of Governance and Society at King’s College London.
…
continue reading
1
AI SOC Solutions, Revamp Your Cybersecurity, & Nightwing Introduction - Jon Check, Ricardo Villadiego, Jim McDonough - ESW #362
43:42
43:42
Play later
Play later
Lists
Like
Liked
43:42
Artificial intelligence isn’t a magic wand… but could AI actually solve the alert triage problem every security operations center faces? In this interview with Jim McDonough from Intezer, we’ll talk about how 2023 was a tipping point for the maturity of AI tech, what these solutions actually bring to the table, how SOC teams in the real world are a…
…
continue reading
1
Microsoft, North Korea, Santander, CISA, Deepfakes, Aaran Leyland & More - SWN #387
32:04
32:04
Play later
Play later
Lists
Like
Liked
32:04
Microsoft, North Korea, Santander, CISA, Deepfakes, Aaran Leyland & more on this edition of the Security Weekly News. Show Notes: https://securityweekly.com/swn-387
…
continue reading
1
Microsoft, North Korea, Santander, CISA, Deepfakes, Aaran Leyland & More - SWN #387
32:00
32:00
Play later
Play later
Lists
Like
Liked
32:00
Microsoft, North Korea, Santander, CISA, Deepfakes, Aaran Leyland & more on this edition of the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-387
…
continue reading
1
Vulnrichment, Hardware Hacking, VPNs - PSW #829
2:00:52
2:00:52
Play later
Play later
Lists
Like
Liked
2:00:52
Vulnrichment (I just like saying that word), Trustworthy Computing Memo V2, SSID confusion, the Flipper Zero accessory for Dads, the state of exploitation, Hackbat, Raspberry PI Connect, leaking VPNs, exploiting faster?, a new Outlook 0-Day?, updating Linux, and a 16-year-old vulnerability. Show Notes: https://securityweekly.com/psw-829…
…
continue reading
1
Flexxon Server Defender, Unforeseen Innovation Outcomes, & Security through Data - Jeetu Patel, Amit Sinha, Camellia Chan - ESW #362
47:11
47:11
Play later
Play later
Lists
Like
Liked
47:11
The danger of post-breach disruption and downtime is extremely real. And while we should work to prevent these breaches in the first place, we must also be practical and pre-empt any potential incidents. Organisations armed with the most extensive software-based cybersecurity protection today continue to fall prey to hackers, have their operations …
…
continue reading
1
The Impacts Of Cryptocurrency - Nicholas Weaver - PSW #829
1:12:14
1:12:14
Play later
Play later
Lists
Like
Liked
1:12:14
Has cryptocurrency done more harm than good? Our guest for this segment has some interesting views on its impacts! Show Notes: https://securityweekly.com/psw-829
…
continue reading
1
Post-RSAC, Our Heads Are Spinning, and Big News Keeps on Coming! - ESW #362
57:29
57:29
Play later
Play later
Lists
Like
Liked
57:29
Suddenly SIEMs are all over the news! In a keynote presentation, Crowdstrike CEO George Kurtz talked about the company's "next-gen" SIEM. Meanwhile, Palo Alto, who was taken to task by some for not having an active presence on the RSAC expo floor, hits the headlines for acquiring IBM's SIEM product, just to shut it down! Meanwhile, LogRhythm and Ex…
…
continue reading
1
Post-RSAC, Our Heads Are Spinning, and Big News Keeps on Coming! Plus On-Site Interviews from RSAC - ESW #362
2:27:32
2:27:32
Play later
Play later
Lists
Like
Liked
2:27:32
Suddenly SIEMs are all over the news! In a keynote presentation, Crowdstrike CEO George Kurtz talked about the company's "next-gen" SIEM. Meanwhile, Palo Alto, who was taken to task by some for not having an active presence on the RSAC expo floor, hits the headlines for acquiring IBM's SIEM product, just to shut it down! Meanwhile, LogRhythm and Ex…
…
continue reading
1
The Impacts Of Cryptocurrency - Nicholas Weaver - PSW #829
3:12:50
3:12:50
Play later
Play later
Lists
Like
Liked
3:12:50
Has cryptocurrency done more harm than good? Our guest for this segment has some interesting views on its impacts! Vulnrichment (I just like saying that word), Trustworthy Computing Memo V2, SSID confusion, the Flipper Zero accessory for Dads, the state of exploitation, Hackbat, Raspberry PI Connect, leaking VPNs, exploiting faster?, a new Outlook …
…
continue reading
1
The Enterprise Browser & AI in Securing Software and Supply Chains - Mike Fey, Josh Lemos - ASW #285
29:24
29:24
Play later
Play later
Lists
Like
Liked
29:24
How companies are benefiting from the enterprise browser. It's not just security when talking about the enterprise browser. It's the marriage between security AND productivity. In this interview, Mike will provide real live case studies on how different enterprises are benefitting. Segment Resources: https://www.island.io/resources https://www.isla…
…
continue reading
1
3000 Years Ago, Dell, Robocalls, PyPI, Cinterion, Cacti, Chat-GPT, Josh Marpet... - SWN #386
37:01
37:01
Play later
Play later
Lists
Like
Liked
37:01
3000 Years Ago, Dell, Robocalls, PyPI, Cinterion, Cacti, Chat-GPT, Windows, Josh Marpet, and more, on this Edition of the Security Weekly News. Show Notes: https://securityweekly.com/swn-386
…
continue reading
1
3000 Years Ago, Dell, Robocalls, PyPI, Cinterion, Cacti, Chat-GPT, Josh Marpet... - SWN #386
36:58
36:58
Play later
Play later
Lists
Like
Liked
36:58
3000 Years Ago, Dell, Robocalls, PyPI, Cinterion, Cacti, Chat-GPT, Windows, Josh Marpet, and more, on this Edition of the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-386
…
continue reading
1
Inside the OWASP Top 10 for LLM Applications - Sandy Dunn, Mike Fey, Josh Lemos - ASW #285
1:06:40
1:06:40
Play later
Play later
Lists
Like
Liked
1:06:40
Everyone is interested in generative AIs and LLMs, and everyone is looking for use cases and apps to apply them to. Just as the early days of the web inspired the original OWASP Top 10 over 20 years ago, the experimentation and adoption of LLMs has inspired a Top 10 list of their own. Sandy Dunn talks about why the list looks so familiar in many wa…
…
continue reading
1
Inside the OWASP Top 10 for LLM Applications - Sandy Dunn - ASW #285
37:33
37:33
Play later
Play later
Lists
Like
Liked
37:33
Everyone is interested in generative AIs and LLMs, and everyone is looking for use cases and apps to apply them to. Just as the early days of the web inspired the original OWASP Top 10 over 20 years ago, the experimentation and adoption of LLMs has inspired a Top 10 list of their own. Sandy Dunn talks about why the list looks so familiar in many wa…
…
continue reading
1
Leveraging AI & The Role Identity Plays - BSW #350
34:28
34:28
Play later
Play later
Lists
Like
Liked
34:28
AI is more than just a buzzword. Done right, AI can improve decision making and scale your identity security platform to manage every identity, human and machine, physical and digital. Learn about how Saviynt’s #1 Identity Security platform is leveraging a variety of AI capabilities to enhance the user experience and improve identity security and c…
…
continue reading
1
Identity Resilience: The Next Frontier in Security - Ray Zadjmool - BSW #350
27:03
27:03
Play later
Play later
Lists
Like
Liked
27:03
In today's enterprises, the Identity Access Management (IAM) System is the key to a business' critical operations. But that IAM environment is more vulnerable than most security executives realize. Segment Resources: https://www.mightyid.com/articles/the-r-in-itdr-the-missing-piece-in-identity-threat-detection-and-response https://www.mightyid.com/…
…
continue reading
1
Identity Resilience: The Next Frontier in Security - Hed Kovetz, Ray Zadjmool, Jeff Margolies - BSW #350
1:01:22
1:01:22
Play later
Play later
Lists
Like
Liked
1:01:22
In today's enterprises, the Identity Access Management (IAM) System is the key to a business' critical operations. But that IAM environment is more vulnerable than most security executives realize. Segment Resources: https://www.mightyid.com/articles/the-r-in-itdr-the-missing-piece-in-identity-threat-detection-and-response https://www.mightyid.com/…
…
continue reading
1
Easy Passwords, BIG-IP, Ascension, Lockbit, Google, Poland, ZScaler, Aaran Leyland... - SWN #385
37:05
37:05
Play later
Play later
Lists
Like
Liked
37:05
Easy Passwords, BIG-IP, Ascension, Lockbit, Google, Poland, ZScaler, Aaran Leyland, and More, on this edition of the Security Weekly News. Show Notes: https://securityweekly.com/swn-385
…
continue reading
1
Phishing Attacks Increase, Network Transformation, & Unified SASE as a Service - Deepen Desai, Renuka Nadkarni, Tim Roddy - ESW #361
48:30
48:30
Play later
Play later
Lists
Like
Liked
48:30
The landscape of phishing attacks continues to rapidly evolve. In 2023, Zscaler ThreatLabz observed a year-over-year increase of 58.2% in global phishing attempts. This surge was characterized by emerging schemes, including voice phishing, recruitment scams, and browser-in-the-browser attacks. This segment is sponsored by Zscaler. Visit https://sec…
…
continue reading
1
Automated Pentesting, AI in SecOps, & AI-Powered Analytics - Jason Keirstead, Jay Mar-Tang, Anthony Aurigemma - ESW #361
45:12
45:12
Play later
Play later
Lists
Like
Liked
45:12
Despite building up impressive security stacks in the Cloud, organizations are still struggling to keep their environments safe. Pentera recently introduced Pentera Cloud as the first tool to provide automated pentesting capabilities for cloud environments. This conversation will focus on the challenge of security validation and pentesting in the c…
…
continue reading
1
Easy Passwords, BIG-IP, Ascension, Lockbit, Google, Poland, ZScaler, Aaran Leyland... - SWN #385
36:57
36:57
Play later
Play later
Lists
Like
Liked
36:57
Easy Passwords, BIG-IP, Ascension, Lockbit, Google, Poland, ZScaler, Aaran Leyland, and More, on this edition of the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-385
…
continue reading
1
Next Gen Threats, CTEM Essentials, & Proactive MDR - Randy Watkins, Paul Reid, Zaira Pirzada - ESW #361
40:48
40:48
Play later
Play later
Lists
Like
Liked
40:48
Emerging threats are targeting organizations from seemingly every angle. This means security teams must expand their focus to secure as many domains as possible. OpenText is building on its holistic approach to cybersecurity with new innovations that make it easier for organizations to secure themselves against next generation threats. This segment…
…
continue reading
1
Executive Interviews from RSAC! - ESW #361
2:09:12
2:09:12
Play later
Play later
Lists
Like
Liked
2:09:12
Tune in to hear 9 executive interviews from RSA Conference 2024, featuring speakers from Zscaler, Open Systems, Aryaka, OpenText, Hive Pro, Critical Start, Anomali, Cyware, and Pentera! Find individual descriptions for each interview on the show notes. Show Notes: https://securityweekly.com/esw-361
…
continue reading
1
Hacker Heroes - Jeremiah Grossman - PSW #828
1:00:23
1:00:23
Play later
Play later
Lists
Like
Liked
1:00:23
Illuminating the Cybersecurity Path: A Conversation with Jeremiah Grossman Join us for a compelling episode featuring Jeremiah Grossman, a prominent figure in the cybersecurity landscape. As a recognized expert, Jeremiah has played a pivotal role in shaping the discourse around web security and risk management. Jeremiah's journey in cybersecurity i…
…
continue reading
1
Corporate Ransomware Deep Dive - Mikko Hypponen - PSW #828
56:06
56:06
Play later
Play later
Lists
Like
Liked
56:06
In this RSAC 2024 South Stage Keynote, Mikko Hyppönen will look back at the past decade of ransomware evolution and explore how newer innovations, like AI, are shaping its future. Show Notes: https://securityweekly.com/psw-828
…
continue reading
1
Corporate Ransomware Deep Dive - Jeremiah Grossman, Mikko Hypponen - PSW #828
1:56:15
1:56:15
Play later
Play later
Lists
Like
Liked
1:56:15
In this RSAC 2024 South Stage Keynote, Mikko Hyppönen will look back at the past decade of ransomware evolution and explore how newer innovations, like AI, are shaping its future. Illuminating the Cybersecurity Path: A Conversation with Jeremiah Grossman Join us for a compelling episode featuring Jeremiah Grossman, a prominent figure in the cyberse…
…
continue reading
1
Tetris, APT42, Kimsuky, Android, ChatRTX, MITRE, Computer Dating, Josh Marpet, More - SWN #384
37:50
37:50
Play later
Play later
Lists
Like
Liked
37:50
Tetris, APT42, Kimsuky, Android, ChatRTX, MITRE, Computer Dating, Josh Marpet, and more, on this Edition of the Security Weekly News. Show Notes: https://securityweekly.com/swn-384
…
continue reading
1
Hacking AI Bias with Human Techniques - Keith Hoodlet - ASW #284
31:47
31:47
Play later
Play later
Lists
Like
Liked
31:47
We already have bug bounties for web apps so it was only a matter of time before we would have bounties for AI-related bugs. Keith Hoodlet shares his experience winning first place in the DOD's inaugural AI bias bounty program. He explains how his education in psychology helped fill in the lack of resources in testing an AI's bias. Then we discuss …
…
continue reading
1
Tetris, APT42, Kimsuky, Android, ChatRTX, MITRE, Computer Dating, Josh Marpet, More - SWN #384
37:44
37:44
Play later
Play later
Lists
Like
Liked
37:44
Tetris, APT42, Kimsuky, Android, ChatRTX, MITRE, Computer Dating, Josh Marpet, and more, on this Edition of the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-384
…
continue reading
1
AI & Hype & Security (Oh My!) & Hacking AI Bias - Caleb Sima, Keith Hoodlet - ASW #284
1:04:57
1:04:57
Play later
Play later
Lists
Like
Liked
1:04:57
A lot of AI security has nothing to do with AI -- things like data privacy, access controls, and identity are concerns for any new software and in many cases AI concerns look more like old-school API concerns. But...there are still important aspects to AI safety and security, from prompt injection to jailbreaking to authenticity. Caleb Sima explain…
…
continue reading
1
AI & Hype & Security (Oh My!) - Caleb Sima - ASW #284
33:18
33:18
Play later
Play later
Lists
Like
Liked
33:18
A lot of AI security has nothing to do with AI -- things like data privacy, access controls, and identity are concerns for any new software and in many cases AI concerns look more like old-school API concerns. But...there are still important aspects to AI safety and security, from prompt injection to jailbreaking to authenticity. Caleb Sima explain…
…
continue reading