Lady Of Crypto public
[search 0]
More
Download the App!
show episodes
 
Artwork

1
Diaries of a Lodge Owner

Outdoor Journal Radio Podcast Network

Unsubscribe
Unsubscribe
Weekly
 
In 2009, sheet metal mechanic, Steve Niedzwiecki, turned his passions into reality using steadfast belief in himself and his vision by investing everything in a once-obscure run-down Canadian fishing lodge. After ten years, the now-former lodge owner and co-host of The Fish'n Canada Show is here to share stories of inspiration, relationships and the many struggles that turned his monumental gamble into one of the most legendary lodges in the country. From anglers to entrepreneurs, athletes t ...
  continue reading
 
BEES.Social is the world’s first Decentralized Autonomous Organization (DAO) solely focused on empowering people with the education needed to take advantage of the Crypto Revolution. Join the Crypto BEES Colony by staking in the Hive of your choice. You will gain all-inclusive access to a vibrant colony of Crypto BEES that you will participate with to Learn and Earn within the Cryptocurrency Revolution. Watching BeesSocialTV will allow you to get a first-hand education about Crypto projects ...
  continue reading
 
Artwork
 
Greetings Love Live Heal community! This is your host Hazel V. A.K.A. Lady E. I am a Reiki Practitioner, Health and Life Coach, Poetess, Lyricists and Cryptocurrency Investor. I feel elated to finally find an outlet to share with you all my life journey in this this earth school through your speakers. I am here to build a community so we can all learn together how to love unconditionally, live purposely, and heal naturally through this podcast.
  continue reading
 
Artwork

1
NFT Catcher Podcast

Michael Keen & Jennifer Sutto

Unsubscribe
Unsubscribe
Weekly
 
w/ Jennifer Sutto & Michael Keen: NFTs are going mainstream. Jennifer & Michael keep their audience informed about all relevant projects as the industry continues to expand. With a focus on market dynamics and turning a profit, this podcast is perfect for the seasoned NFT trader or someone that is just looking to learn what the heck is going on with these JPEGS!
  continue reading
 
“From The Blockchain" brings you today’s most innovative entrepreneurs and thought leaders to unpack the true potential of smart contract technology, web3, and the digital frontier! Host Ashley Smith is thrilled to have you join today’s top tier community of forward thinking trailblazers. This show brings substance over hype - say goodbye to the noise of NFT and cryptocurrency market speculation. Instead, From The Blockchain aims foster a culture of idea sharing, creativity, and innovation t ...
  continue reading
 
Richard Wolpert, a 35 year veteran of Technology and entertainment (Apple, Disney, RealNetworks, 4xCEO) shares the amazing lessons learned on past, present, and predictions of the future of media and technology, and of how these two categories have and will continue to converge or clash. Having been on both sides of the technology and media industries for over the last 35 years Richard has learned the good the bad and the ugly. This show shares some of the best thinkers and leaders of Entert ...
  continue reading
 
Artwork
 
Authentic, freedom loving explosives and weapons experts discuss issues in culture, science, and spirituality. Dropping quantum thought bombs that still make sense in a world that is ever expanding. Up-level your thinking on the worlds dramas with these Texans whom are into self development and airy fairy things. Or stay for the explosive action as they blow stuff up for fun, we mean in the name of science.... as they are fully licensed explosives and weapons manufacturers who had a TV show ...
  continue reading
 
Loading …
show series
 
How can LLMs be valuable to developers as an assistant in finding and fixing insecure code? There are a lot of implications in trusting AI or LLMs to not only find vulns, but in producing code that fixes an underlying problem without changing an app's intended behavior. Stuart McClure explains how combining LLMs with agents and RAGs helps make AI-i…
  continue reading
 
Send us a Text Message. catching up & travel | Keen's new Mutant | Veecon | JD Vance pro crypto | more Veecon | Apecoin DAO and Banana Bill | DeeZe toy, smart poster and shirt | Threadguy & Andrew Tate | final Chromie Squiggle | Links: Michael Keen @NFTicket Jennifer Sutto @jennifer_sutto NFT Catcher Podcast @NFTCatcherPod produced by Andy Cinquino…
  continue reading
 
Cyber insurance underwriting is all over the map. With such a variation in application requirements, how should small and medium businesses prepare to receive the best policy for the price? Brian Fritton joins Business Security Weekly to discuss a systematic approach to preparing for cyber insurance. By working with the underwriters, this approach …
  continue reading
 
Bats in your headset, Windows Wifi driver vulnerabilities, Logitech's dongles, lighthttpd is heavy with vulnerabilities, node-ip's not vulnerability, New Intel CPU non-attacks, Blast Radius, Flipper Zero alternatives, will OpenSSH be exploited, emergency Juniper patches, and the D-Link botnet grows. Show Notes: https://securityweekly.com/psw-834…
  continue reading
 
In this week's enterprise security news, Seed rounds are getting huge Lots of funding for niche security vendors Rapid7 acquires Noetic Cyber but Rapid7 is also rumored to sell itself! Slack battles infostealers The loss of Chevron deference impacts cyber Should cybersecurity put up a no vacancy sign? Figma and Google both make some embarrassing mi…
  continue reading
 
I'm always thrilled to chat with ex-analysts, and Henrique Teixeira can cover a lot of ground with us on the topic of identity management and governance. The more I talk to folks about IAM/IGA, the more I'm shocked at how little has changed. If anything, it seems like we've gone backwards a bit, with the addition of cloud SaaS, mobile devices, and …
  continue reading
 
Iceman comes on the show to talk about RFID and NFC hacking including the tools, techniques, and hardware. We'll also talk about the ethics behind the disclosure of vulnerabilities and weaknesses in these systems that are used in everything from building access to cars. Segment Resources: Youtube channel - https://www.youtube.com/@iceman1001 Proxma…
  continue reading
 
Chef Colby Adams, the celebrated Chopped Canada finalist, joins us for an unforgettable episode filled with tales of culinary passion and fishing adventures. Discover how a city boy became an avid fisherman, reeling in impressive lake trout and northern pike at the beautiful Brabant Lodge on Great Slave Lake. Colby shares the experiences that led h…
  continue reading
 
Sandy Carielli and Janet Worthington, authors of the State Of Application Security 2024 report, join us to discuss their findings on trends this year! Old vulns, more bots, and more targeted supply chain attacks -- we should be better at this by now. We talk about where secure design fits into all this why appsec needs to accelerate to ludicrous sp…
  continue reading
 
On average, CISOs manage 50-75 security products. Many of these products have either not been deployed or only partially deployed, while others overlap of products. How do CISOs effectively consolidate their products to a manageable size? Max Shier, Chief Information Security Officer at Optiv Security, joins Business Security Weekly to discuss tech…
  continue reading
 
Exploring the Hardware Hacking Realm with Joe Grand, AKA Kingpin Joe Grand, also known by his hacker pseudonym "Kingpin," stands as a prominent figure in the cybersecurity landscape. With an extensive background in hardware hacking, reverse engineering, and embedded systems, Joe has carved a niche for himself as a respected authority in the field. …
  continue reading
 
Ever wondered how a lodge owner turned a simple idea into a marketing phenomenon? Join us as we recount the early days of managing a fishing lodge and the visionary plan that changed everything. We share personal stories of collaborating with TV icons like Peter Bowman and Mike Miller, capturing the essence of camaraderie and adventure that defined…
  continue reading
 
Check out this interview from the SWN Vault, hand picked by main host Doug White! This Secure Digital Life segment was originally published on March 6, 2017. Have you ever wondered what phishing is? Do you know what spear phishing attacks are? Doug and Russ explain how to protect yourself from phishing scams in the inaugural episode of Secure Digit…
  continue reading
 
Check out this interview from the BSW Vault, hand picked by main host Matt Alderman! This segment was originally published on October 11, 2022. As 2023 approaches, security leaders are hard at work preparing their budgets, identifying their projects, and setting their priorities for the next twelve months. At the same time, the growth mode days of …
  continue reading
 
We've made a slight tweak to the news format, only focusing on the most interesting funding and acquisition stories. As always, you can go check out Mike Privette's Return on Security newsletter for the full list of funded and acquired companies every week. This week, we discuss two $100M+ rounds, from Huntress and Semperis. We also discuss NetSPI'…
  continue reading
 
For decades, security teams have been focused on preventing and detecting threats, only to find themselves buried so deep in alerts, they can't detect anything at all! We clearly need a different approach, which will be the topic of our conversation today with Marty. We'll be discussing a shift in philosophy and tactics. We'll discuss whether SecOp…
  continue reading
 
We all might be a little worn out on this topic, but there's no escaping it. Executives want to adopt GenAI and it is being embedded into nearly every software product we use in both our professional and personal lives. In this interview, Anurag joins us to discuss how his company evaluated and ultimately integrated AI-based technologies into their…
  continue reading
 
Zyxl NAS devices are under attack and the exploit is pretty simple, A new UEFI vulnerability with a name that some people don't like, that time you setup a load balancer and forgot about it, I love it when there is a vulnerability in a Wifi driver, Polyfill is filling the Internet with supply chain vulnerabilities, open source doesn't mean more sec…
  continue reading
 
This may be controversial, however, we've been privately discussing how organizations benefit from penetration testing and vulnerability scanning. Do you still need these services as a critical part of your security program? Can't you just patch stuff that is missing patches? Tune in for a lively debate! Show Notes: https://securityweekly.com/psw-8…
  continue reading
 
What drives a man to leave behind the high-stakes world of oil exploration and embrace the tranquil life of a lodge owner? Join us as Will Palowski recounts his extraordinary journey from the oil fields to the serene beauty of Nordic Point Lodge. Will's tales of survival, grit, and determination provide a fascinating look into the rugged realities …
  continue reading
 
OAuth 2.0 is more than just a single spec and it's used to protect more than just APIs. We talk about challenges in maintaining a spec over a decade of changing technologies and new threat models. Not only can OAuth be challenging to secure by default, but it's not even always inter-operable. Segment Resources: https://oauth.net/2.1 https://oauth.n…
  continue reading
 
In the age of AI, driving a business forward requires balancing three very significant considerations: growth through innovation, productivity through operational efficiency, and trust through security. To better understand how AI impacts the intersection of security, innovation, and operational efficiency, Okta commissioned an AlphaSights survey o…
  continue reading
 
With 71% of web traffic coming from API calls last year and the average organization maintaining 613 API endpoints, a robust strategy is needed to protect APIs against automated threats and business logic attacks. Tune in as Luke Babarinde, Global Solution Architect, shares the key steps to building a successful API security strategy. This segment …
  continue reading
 
Traditional approaches to access management are no longer sufficient to safeguard enterprise security. Tim will explain why the most effective approach to modern enterprise security requires a Zero Trust model that extends beyond just access to encompass every action, no matter how minor. Tim will describe the importance of implementing a Zero Trus…
  continue reading
 
Check out this interview from the SWN Vault, hand picked by main host Doug White! This Secure Digital Life segment was originally published on June 19, 2018. This week, Doug and Russ interview Matthew Silva, President and Founder of the Cybersecurity and Intel Club at Roger Williams University! They talk about majoring in Cybersecurity vs. Computer…
  continue reading
 
FIDO security keys are not new in the authentication workflow. They have been around now for 10 years. What is new is the combination of the most secure multi-factor authentication method not only for logical but also for physical access control with the highest FIPS140-3 security certification in the market. Segment Resources: Video "Swissbit iShi…
  continue reading
 
Log4j, solar winds, tesla hacks, and the wave of high profile appsec problems aren’t going to go away with current approaches like SAST and SCA. Why? They are: -40 years old, with little innovation -Haven’t solved the problem. In this segment, we talk about fully autonomous application security. Vetted by DARPA in the Cyber Grand Challenge, the app…
  continue reading
 
Exploring the Strategic Minds in Cybersecurity: A Conversation with Dave Aitel Welcome to an enlightening episode of our podcast, where we sit down with Dave Aitel, a prominent figure in the cybersecurity landscape. With a robust background in offensive security and an extensive career spanning various facets of the industry, Dave brings a wealth o…
  continue reading
 
Ever wondered how food can transform an entire experience, especially in the tranquility of a remote fishing lodge? Join us as we sit down with Chef Jarrett Michetti, the culinary genius behind Nordic Point Lodge, who shares his incredible journey from Fort McMurray, Alberta, to becoming a celebrated chef in the North. Chef Michetti's Italian and U…
  continue reading
 
Check out this interview from the SWN Vault, hand picked by main host Doug White! This Secure Digital Life segment was originally published on September 25, 2018. This week, Russ takes the reigns in the absence of Dr. Doug to talk about Networking 101! We are going to go back to school to examine how networking and the internet actually work. Russ …
  continue reading
 
Check out this interview from the ASW Vault, hand picked by main host Mike Shema! This segment was originally published on April 4, 2023. Following on from her successful title "Container Security", Liz has recently authored "Learning eBPF", published by O'Reilly. eBPF is a revolutionary kernel technology that is enabling a whole new generation of …
  continue reading
 
Check out this interview from the BSW Vault, hand picked by main host Matt Alderman! This segment was originally published on August 9, 2022. Zero Trust is the security buzzword of the moment, and while it is a very powerful approach, nearly every enterprise security product on the market – and some that aren’t even security products — are saying t…
  continue reading
 
Send us a Text Message. Celebrity Solana Memecoin Meta | Crypto in the election Wu-Tang secret album as an NFT | McMetaverse | | Jenny and Doodlifts for Evaluate and Disney Pinnacle | Links: Michael Keen @NFTicket Jennifer Sutto @jennifer_sutto NFT Catcher Podcast @NFTCatcherPod produced by Andy Cinquino @ajc254 NFT Catcher theme music by ItsJustLo…
  continue reading
 
Enterprises often struggle with achieving business value in identity programs. This is typically the result of technology choices that require a disproportionately greater amount of effort and focus and underestimating the workforce required for organizational change management. With 30 years in the industry and a depth of accumulated knowledge wor…
  continue reading
 
Several recent trends underscore the increasing importance of Know Your Business (KYB) practices in today's business landscape. One significant trend is the rise in financial crimes, including money laundering, fraud, and terrorist financing. Technological advancements have transformed the way businesses operate, leading to increased digitization, …
  continue reading
 
Loading …

Quick Reference Guide