Cats On Bricks public
[search 0]
More
Download the App!
show episodes
 
From our steam train called STOOM we are introducing the Steam House Age that sounds like STOOM. Whistling & pumping … 🚂 take A ride. On board of STOOM, we take you on uplifting rides into the Steam House Age … 🚂 till U steam The Steam House Age is defined by the rides STOOM takes: - Unique sound - Creative art - Fascinating performances - Steam punk fashion - Futuristic avatars We always ride our steam train to the biggest festivals and clubs. Our rides already were: - ULTRA Music Festival ...
  continue reading
 
Artwork
 
Retro Titans is dedicated to the epic world of retro and indie gaming on Evercade. Comprising regular interviews with developers, gamers, YouTubers and media commentators, Retro Titans goes deep into Evercade and explores how the platform fits into the retro gaming scene and its promise for the future.
  continue reading
 
A business podcast for product entrepreneurs. A creative balance of life and business to help you create your dream life. Featured in Inc. as "the country's most sought-after product experts." Also featured in Forbes, NBC News, Yahoo! Finance and more. Also a co-founder of the Shop 1 in 5 pledge - a commitment to shop 1 in 5 of your purchases from small businesses online and offline. The goal in every episode: uplevel you as the Boss of your business. Take your physical product sales and str ...
  continue reading
 
Paint by Murders is an original, as of yet unpublished, mystery novel. It is the first in a series of Harrisburg Homicides. It is written, hosted, and narrated by M. Travis DiNicola. Overview: The Capital city and its art galleries, bars, restaurants, and long-held secrets are featured in this cozy-inspired mystery that is as unpredictable as the mighty Susquehanna River it sits on. When painter Keith Reed stumbles across a dead body in a Harrisburg bookstore, he doesn’t yet know that the vi ...
  continue reading
 
Loading …
show series
 
Check out this interview from the BSW Vault, hand picked by main host Matt Alderman! This segment was originally published on October 11, 2022. As 2023 approaches, security leaders are hard at work preparing their budgets, identifying their projects, and setting their priorities for the next twelve months. At the same time, the growth mode days of …
  continue reading
 
Today, I’m so excited to be chatting with Gina Bianchini, an incredible entrepreneur who has her MBA from Stanford and is also the creator and founder of Mighty Networks! If you’re not familiar with Mighty Networks, it’s an all-in-one platform that serves small and medium businesses through offering digital memberships, online courses, community an…
  continue reading
 
We've made a slight tweak to the news format, only focusing on the most interesting funding and acquisition stories. As always, you can go check out Mike Privette's Return on Security newsletter for the full list of funded and acquired companies every week. This week, we discuss two $100M+ rounds, from Huntress and Semperis. We also discuss NetSPI'…
  continue reading
 
For decades, security teams have been focused on preventing and detecting threats, only to find themselves buried so deep in alerts, they can't detect anything at all! We clearly need a different approach, which will be the topic of our conversation today with Marty. We'll be discussing a shift in philosophy and tactics. We'll discuss whether SecOp…
  continue reading
 
We all might be a little worn out on this topic, but there's no escaping it. Executives want to adopt GenAI and it is being embedded into nearly every software product we use in both our professional and personal lives. In this interview, Anurag joins us to discuss how his company evaluated and ultimately integrated AI-based technologies into their…
  continue reading
 
Zyxl NAS devices are under attack and the exploit is pretty simple, A new UEFI vulnerability with a name that some people don't like, that time you setup a load balancer and forgot about it, I love it when there is a vulnerability in a Wifi driver, Polyfill is filling the Internet with supply chain vulnerabilities, open source doesn't mean more sec…
  continue reading
 
Hey product bosses! I'm back with another action-packed coaching session with Nicole from Lunah, an amazing skincare company in London, Ontario, Canada! Nicole's established herself as the skin care expert in her community and beyond and is on her path to building her million-dollar dream business...all while navigating being a single mom. During o…
  continue reading
 
This may be controversial, however, we've been privately discussing how organizations benefit from penetration testing and vulnerability scanning. Do you still need these services as a critical part of your security program? Can't you just patch stuff that is missing patches? Tune in for a lively debate! Show Notes: https://securityweekly.com/psw-8…
  continue reading
 
OAuth 2.0 is more than just a single spec and it's used to protect more than just APIs. We talk about challenges in maintaining a spec over a decade of changing technologies and new threat models. Not only can OAuth be challenging to secure by default, but it's not even always inter-operable. Segment Resources: https://oauth.net/2.1 https://oauth.n…
  continue reading
 
In the age of AI, driving a business forward requires balancing three very significant considerations: growth through innovation, productivity through operational efficiency, and trust through security. To better understand how AI impacts the intersection of security, innovation, and operational efficiency, Okta commissioned an AlphaSights survey o…
  continue reading
 
With 71% of web traffic coming from API calls last year and the average organization maintaining 613 API endpoints, a robust strategy is needed to protect APIs against automated threats and business logic attacks. Tune in as Luke Babarinde, Global Solution Architect, shares the key steps to building a successful API security strategy. This segment …
  continue reading
 
True or False: You need a HUGE social media following to reach your business goals...I'm excited to tell you that it is FALSE! In today's episode, I'm busting the myth that you need to be on social media to succeed in your product-based business and I'm showing you just how to discover your ideal customers, make more sales, and reach or even surpas…
  continue reading
 
Whether you’re a veteran Evercade collector or new to the world of collecting retro gaming carts, you’ll enjoy this interview with Matt Upton. We discuss what it means to be an Evercade collector, whether you need to collect the full set, and hacks for acquiring hard-to-get Legacy carts. Matt is a keen collector himself and was game enough to play …
  continue reading
 
Traditional approaches to access management are no longer sufficient to safeguard enterprise security. Tim will explain why the most effective approach to modern enterprise security requires a Zero Trust model that extends beyond just access to encompass every action, no matter how minor. Tim will describe the importance of implementing a Zero Trus…
  continue reading
 
Check out this interview from the SWN Vault, hand picked by main host Doug White! This Secure Digital Life segment was originally published on June 19, 2018. This week, Doug and Russ interview Matthew Silva, President and Founder of the Cybersecurity and Intel Club at Roger Williams University! They talk about majoring in Cybersecurity vs. Computer…
  continue reading
 
FIDO security keys are not new in the authentication workflow. They have been around now for 10 years. What is new is the combination of the most secure multi-factor authentication method not only for logical but also for physical access control with the highest FIPS140-3 security certification in the market. Segment Resources: Video "Swissbit iShi…
  continue reading
 
Log4j, solar winds, tesla hacks, and the wave of high profile appsec problems aren’t going to go away with current approaches like SAST and SCA. Why? They are: -40 years old, with little innovation -Haven’t solved the problem. In this segment, we talk about fully autonomous application security. Vetted by DARPA in the Cyber Grand Challenge, the app…
  continue reading
 
Listen up, Product Bosses! We're back with another coaching session, and this time we're talking with Heather of Leetie Lovendale. Heather has been in business for around 20 years and is making multiple six figures. Her goal is to reach a million, but right now, she's on course to make less than she did last year. In this episode, we dive into Heat…
  continue reading
 
Exploring the Strategic Minds in Cybersecurity: A Conversation with Dave Aitel Welcome to an enlightening episode of our podcast, where we sit down with Dave Aitel, a prominent figure in the cybersecurity landscape. With a robust background in offensive security and an extensive career spanning various facets of the industry, Dave brings a wealth o…
  continue reading
 
Check out this interview from the ASW Vault, hand picked by main host Mike Shema! This segment was originally published on April 4, 2023. Following on from her successful title "Container Security", Liz has recently authored "Learning eBPF", published by O'Reilly. eBPF is a revolutionary kernel technology that is enabling a whole new generation of …
  continue reading
 
Check out this interview from the SWN Vault, hand picked by main host Doug White! This Secure Digital Life segment was originally published on September 25, 2018. This week, Russ takes the reigns in the absence of Dr. Doug to talk about Networking 101! We are going to go back to school to examine how networking and the internet actually work. Russ …
  continue reading
 
Loading …

Quick Reference Guide