Jason Rust public
[search 0]
More
Download the App!
show episodes
 
Artwork
 
Doomer Optimism is a podcast dedicated to discovering regenerative paths forward, highlighting the people working for a better world, and connecting seekers to doers. Beyond that, it's pretty much a $hitshow. Enjoy!
  continue reading
 
Artwork
 
This is the Scarlet Vault... Locked away here, in the rust-red rooms, are items too powerful, too dangerous to exist. You may consider me the Custodian of this abominable museum of terrors. Every item stored here is drenched in horror. Every item, a weapon in the wrong hands. And every item has a story. Perhaps you would like to hear one? 'Tales from the Scarlet Vault' is a new and largely undiscovered no-budget supernatural anthology of original stories. It is written and produced by Jason ...
  continue reading
 
Artwork
 
GrowCast is one of the world's largest cannabis growing podcasts, where you can hear host Jordan River sit down with some of the most educated and talented people in the cannabis cultivation industry. Tune in to hear world class expert guests take deep dives on niche growing subjects like lighting, nutrients, plant training, organic growing, living soil, grow room automation, and much, much more. So pop on GrowCast to learn while you work in your garden- you've just discovered your number on ...
  continue reading
 
Welcome to the Security Weekly Podcast Network, your all-in-one source for the latest in cybersecurity! This feed features a diverse lineup of shows, including Application Security Weekly, Business Security Weekly, Paul's Security Weekly, Enterprise Security Weekly, and Security Weekly News. Whether you're a cybersecurity professional, business leader, or tech enthusiast, we cover all angles of the cybersecurity landscape. Tune in for in-depth panel discussions, expert guest interviews, and ...
  continue reading
 
Loading …
show series
 
In this conversation, Jason talks with Rust Belt Kid (@rustbeltkid1 ) about the decline and signs of a potential revival of American manufacturing and agriculture. He talks about his experience growing up in the Midwest, his day job in manufacturing, his aspirations to become a farmer and early successes on his recent 20 acres, and ideas he has abo…
  continue reading
 
Secure by design is more than just AppSec - it addresses how the whole business designs systems and processes to be effective and resilient. The latest report from LevelBlue on Cyber Resilience reveals security programs that are reactive, ill-equipped, and disconnected from IT and business leaders. Most security problems are out of security teams' …
  continue reading
 
Are you craving some sun, sand and sea? Already dreaming of your next holiday? Only feel relaxed when you're in the water? Perhaps there's a sinister reason for all of that... A friendly warning - Tales from the Scarlet Vault is a dark fantasy horror anthology. Episodes may contain depictions of violence, blood and gore, sexual content and use of s…
  continue reading
 
New security and vulnerability research is published every day. How can security teams get ahead of the curve and build architecture to combat modern threats and threat actors? Tune-in to a lively discussion about the threat landscape and tips on how to stay ahead of the curve. Segment Resources: https://blog.qualys.com/vulnerabilities-threat-resea…
  continue reading
 
Looking at vulnerable code in Ivanti (Perl) and Magento (PHP), fuzzing is perfect for parsers, handling tenant isolation when training LLMs, Microsoft's small steps towards secure design, and more! Visit https://www.securityweekly.com/asw for all the latest episodes! Show Notes: https://securityweekly.com/asw-303…
  continue reading
 
In today’s uncertain macroeconomic environment, security and risk leaders need practical guidance on managing existing spending and new budgetary requests. Jeff Pollard, Vice-President, Principal Analyst on the Security and Risk Team at Forrester Research, joins Business Security Weekly to review Forrester's Budget Planning Guide 2025: Security And…
  continue reading
 
In this episode, Nate talks with Robert Hirschfeld, the director of water quality at the Illinois Prairie Rivers Network. They discuss the water quality crisis in the midwest, chemical pollution in the water and air, pesticide drift, and why despite the common sense that everyone wants “clean air and clean water” we continue to allow polluters to d…
  continue reading
 
*ONLY TWO SPOTS LEFT for this Saturday's OKCalyxx Natural Farming Autumn Immersive! Grab your tickets now! Shawn from CBG Gurus is on the program for the very first time! He joins us to today to share his journey from academia to permaculture cannabis cultivation. Shawn talks about his background in ag science, and how his passion eventually shifte…
  continue reading
 
For this interview, Ben from CyberNest joins us to talk about one of my favorite subjects: information sharing in infosec. There are so many amazing skills, tips, techniques, and intel that security professionals have to share. Sadly, a natural corporate reluctance to share information viewed as privileged and private has historically had a chillin…
  continue reading
 
Sign up now to take part in the 'XXXperiment' and test your pleasure beyond its limits! It's what comes after that you should be worried about... Written by Anna Duvall. A friendly warning - Tales from the Scarlet Vault is a dark fantasy horror anthology. Episodes may contain depictions of violence, blood and gore, sexual content and use of strong …
  continue reading
 
"Code of Honor: Embracing Ethics in Cybersecurity" by Ed Skoudis is a book that explores the ethical challenges faced by cybersecurity professionals in today's digital landscape. The book delves into the complex moral dilemmas that arise in the field of cybersecurity, offering guidance on how to navigate these issues while maintaining integrity. Th…
  continue reading
 
Zed Attack Proxy has been a crucial web app testing tool for decades. It's also had a struggle throughout 2024 to obtain funding that would enable the tool to add more features while remaining true to its open source history. Simon Bennetts, founder of ZAP, and Ori Bendet from Checkmarx update us on that journey, share some exploration of LLM fuzzi…
  continue reading
 
Does the CISO need to act like a politician? Negotiating budgets, communicating risks, and selling your strategy across the organization does sound a little like a politician. And if that's the case, are you hiring the right campaign staff? Kush Sharma, former CISO for CPR, City of Toronto, and Saputo, joins Business Security Weekly to discuss why …
  continue reading
 
TWO SPOTS LEFT for OKCalyxx Natural Farming Immersive - grab them before they're gone! www.growcastpodcast.com/classes A few packs of Cookie Truffle Shuffle fems up the site currently! www.growcastpodcast.com/growcast-seed-co OKMushfest this weekend, Oct 12 and 13 www.okmushfest.com KLM Pollination incoming shortly...…
  continue reading
 
Our latest in a series of interviews discussing cybersecurity career paths, today we talk to Jayson Grace his path into cybersecurity and his experience building red teams at national labs and purple teams at Meta. We also talk about his community impact, giving talks and building open source tools. Jayson just left Meta for an AI safety startup na…
  continue reading
 
This episode of Paul Security Weekly features John Hammond, a senior security researcher from Huntress, discussing malware analysis. Hammond dives into the analysis of Ocean Lotus attacks, highlighting the use of stealthy techniques like alternate data streams and DLL side-loading. The conversation also touches on the challenges of combating attack…
  continue reading
 
More remote car control via web interfaces, an RCE in CUPS, Microsoft reduces attack surface, migrating to memory safety, dealing with dependency confusion, getting rid of password strength calculators, and more! Visit https://www.securityweekly.com/asw for all the latest episodes! Show Notes: https://securityweekly.com/asw-301…
  continue reading
 
The zero-trust security model has been billed as an ultra-safe defense against emerging, unrecognized and well-known threats. Unlike perimeter security, it doesn't assume people inside an organization are automatically safe. Instead, it requires every user and device -- inside and out -- to be authorized before any access is granted. Sounds enticin…
  continue reading
 
Alice, Dylan, and Ashley discuss using government funds for regenerative agriculture, building bioregional food hubs, and their upcoming Heritage Food Festival this November. Alice Melendez- I was born in the foothills of the Appalachian Mountains between Clay City and the rolling fields of central Kentucky. I grew up on the farm, went to small-tow…
  continue reading
 
Our friend Jacob from Oklahoma Fungi returns to the show! He has the big OK MushFest coming up on October 12th and 13th, where GrowCast will be appearing! Check it out at www.okmushfest.com and come see us. Jacob shares some of the work he's been involved in since we last spoke, including looking at the concept of using cannabis leaf waste as mushr…
  continue reading
 
Passwords, CUPS, KIA, Gilbert Gottfried, Salt Typhoon, Rob Allen from ThreatLocker, and More on the Security Weekly News. Segment Resources: https://www.bleepingcomputer.com/news/security/hackers-deploy-ai-written-malware-in-targeted-attacks/ This segment is sponsored by ThreatLocker. Visit https://securityweekly.com/threatlocker to learn more abou…
  continue reading
 
The SIEM market has undergone some significant changes this summer. This is a great opportunity to talk about the current state of SIEM! In this conversation, we'll discuss: market changes and terminology: security analytics, data lakes, SIEM what is SOAR's role in the current SIEM market? machine learning and generative AI's role strategies for im…
  continue reading
 
This week in the security news, Dr. Doug and Larry explore various technological advancements and their implications with a healthy dose of nostalgia, particularly focusing on health monitoring through Wi-Fi signals, the misconceptions surrounding 5G connectivity, the importance of understanding internet speed needs, and the cybersecurity threats f…
  continue reading
 
APIs are essential to modern application architectures, driving rapid development, seamless integration, and improved user experiences. However, their widespread use has made them prime targets for attackers, especially those deploying sophisticated bots. When these bots exploit business logic, they can cause considerable financial and reputational…
  continue reading
 
In this emergency podcast, DO hosts discuss the upcoming US Presidential election as well as plans for yanking Western society back from the precipice of certain total destruction. The conversation doubles as a drinking game. Take a drink any time a host: refers to wokeness (approvingly or disparagingly) mis-pronounces “Kamala” uses a Star Wars or …
  continue reading
 
In the leadership and communications segment, CISA Releases Cyber Defense Alignment Plan for Federal Agencies, UnitedHealth Group CISO: We had to ‘start over’ after Change Healthcare attack, 20 Essential Strategies for Leadership Development Success, and more! AI is bringing productivity gains like we’ve never seen before -- with users, security te…
  continue reading
 
A month ago, my friend Wolfgang Goerlich posted a hot take on LinkedIn that is less and less of a hot take these days. He posted, "our industry needs to kill the phish test",and I knew we needed to have a chat, ideally captured here on the podcast. I've been on the fence when it comes to phishing simulation, partly because I used to phish people as…
  continue reading
 
Apple drops a lawsuit to avoid exposing secrets, what does it mean for the security industry if MS locks down the kernel?, exploding pagers, more things from the past: Adobe Flash exploits, robots get rid of your data, PKFail is still a thing, Android TV malware is back: now with conspiracy theories, DMA attacks, gamers are not nation-state attacke…
  continue reading
 
When a conference positioned as a day of security for developers has to be canceled due to lack of interest from developers, it's important to understand why there was so little interest and why appsec should reconsider its approach to awareness. Dustin Lehr discusses how appsec can better engage and better deliver security concepts in a way that m…
  continue reading
 
Cybersecurity is complex. We have threats, vulnerabilities, incidents, controls, risks, etc. But how do they all connect together to drive a cyber risk program? As an industry, we've struggled for 20+ years trying to boil this ocean. Maybe we've been going about it the wrong way. Padraic O'Reilly, Founder and Chief Innovation Officer at CyberSaint,…
  continue reading
 
Jason and Seth from www.aroya.io and the Office Hours podcast are on the show for the very first time! High tech growers rejoice- the guys discuss how they got into the world of agricultural monitoring and eventually education and content creation. Seth and Jason share some of the issues that they work with large scale growers on, including dialing…
  continue reading
 
This week, in the enterprise security news, Cribl, Zafran, and US states raise funding Cisco, Check Point, Salesforce, and Absolute Software acquire cybersecurity startups AI Security products are picking up steam You probably shouldn’t be too worried about Yubikey cloning Instead, you should be more worried about malicious npm packages! The White …
  continue reading
 
Lee comes on the show to discuss: EU CRA - https://en.wikipedia.org/wiki/CyberResilienceAct - its impact on bringing products to market and the challenges of enforcing such laws that require products to be "Secure" Recent legislation on disputes for federal agency fines - Chevron deference rule - supreme court decision, uncertainty, more or less cl…
  continue reading
 
Loading …

Quick Reference Guide