language hacker public
[search 0]
More
Download the App!
show episodes
 
Artwork

1
Personality Hacker Podcast

Joel Mark Witt & Antonia Dodge

Unsubscribe
Unsubscribe
Weekly
 
Make better decisions based on how your mind works. Personality Hacker teaches you the coding language of your mind and how to use it to create great relationships - a fulfilling career and happiness. Are you born with your personality, or does it develop over time? What is intuition? What's the fastest way to use your natural gifts to improve overall happiness? Join Joel Mark Witt and Antonia Dodge as they discuss small changes in your personality and relationships that have big impact.
  continue reading
 
Artwork

1
Accelerated Spanish: Learn Spanish online the fastest and best way, by Master of Memory

Timothy Moser: Spanish coach, mnemonist, language hacker, and accelerated

Unsubscribe
Unsubscribe
Daily
 
Learn Spanish with mnemonics! Through Accelerated Spanish, Master of Memory presents the fastest way to learn Spanish using timeless accelerated learning principles. Building from a solid foundation, this show will teach you not just to memorize vocabulary at unbelievable rates, but also to speak Spanish idiomatically. If you're looking for the best way to learn Spanish online for free, you've come to the right place.
  continue reading
 
On WE’RE IN!, you'll hear from the newsmakers and innovators who are making waves and driving the cyber security industry forward. We talk to them about their stories, the future of the industry, their best practices, and more.
  continue reading
 
Artwork
 
Cyber security, no longer a place for tech heads, speaking another language Join us at Girls Talk Cyber, the podcast to help you decode this space and redefine how you act online
  continue reading
 
Artwork
 
This is a weekly podcast on cyber security domains. We discuss, dissect and demystify the world of security by providing an in-depth coverage on the cybersecurity topics that matter most. All these in plain easy to understand language. Like it, share it, and most importantly enjoy it!
  continue reading
 
Jaron Swab, a software engineer, shares tips around Linux, programming, and open source. So you can stay on top of your privacy, security, and productivity. Discover what it means to be a hacker from a self taught software engineer. You'll learn how to land a tech job, amp up your computer efficiency, and leave behind the walled gardens of big tech. Since 2005, Jaron has exercised his love for coding and taking technology into his own hands. It's Jaron and a microphone; a one on one approach ...
  continue reading
 
Dive into “Compromising Positions”, the unique, new podcast designed to iron out the wrinkles in the relationship between cybersecurity teams and other tech professionals. We’re taking the ‘security as a blocker’ stereotype head-on, promoting a shared language and mutual understanding. We’ll turn those ‘compromising positions’ into ‘compromising solutions’, helping security pros and tech teams collaborate more effectively for a smoother, safer digital journey. Every week we will be joined by ...
  continue reading
 
Artwork

1
Sub Club by RevenueCat

David Barnard, Jacob Eiting

Unsubscribe
Unsubscribe
Monthly+
 
Interviews with the experts behind the biggest apps in the App Store. Hosts David Barnard and Jacob Eiting dive deep to unlock insights, strategies, and stories that you can use to carve out your slice of the 'trillion-dollar App Store opportunity'.
  continue reading
 
Turn the Lens is about exploring the people, topics, and pieces of media that help shape my perspective on the world. The concept behind 'turn the lens' is to look beyond the foreground, beyond the obvious, to see things in a different context, to see things that you might have missed before. Let's get past our own bias and point of view to try and look from a broader point of view, to expand our learning beyond the obvious.
  continue reading
 
Loading …
show series
 
This week, in the enterprise security news, A funding that looks like an acquisition And two for-sure acquisitions Rumors that there are funding problems for early stage cyber startups, and we’ll see a lot more acquisitions before the end of the year Speaking of rumors, Crowdstrike did NOT like last week’s Action1 acquisition rumor! Shortening dete…
  continue reading
 
—> Get Your Personality Owners Manual In this episode Joel and Antonia respond to a listener's question on our ability to change personality type. Ask A Question: https://PersonalityHacker.com/Questions More about Personality Types: —> Does The Ambivert Personality Exist? | Podcast 0044 —> Is There Benefit To Being More Than One Personality Type? |…
  continue reading
 
Every week here on the show we talk about vulnerabilities and exploits. Typically we recommend that organizations remediate these vulnerabilities in some way. But how? And more importantly, which ones? Some tools we have to help us are actually not all that helpful at time, such as: Mitre Att&ck - Don't get me wrong, this is a great project and Ada…
  continue reading
 
Episode 85: In this episode of Critical Thinking - Bug Bounty Podcast Justin and Joel talk through some of the research coming out of DEFCON, mainly from the PortSwigger team. Web timing attacks, cache exploitation, and exploits related to email protocols are all featured. Plus we also talk some fun Apache hacks from Orange Tsai Follow us on twitte…
  continue reading
 
This Episode we’re heading back into the vaults to bring you the unabridged version of our fantastic and extremely popular interview with Bec McKeown, a chartered psychologist with extensive experience in carrying out applied research for organisations including the UK Ministry of Defence and the founder and director of Mind Science, an independent…
  continue reading
 
Sara Mosley, technical director for the Bureau of Diplomatic Security's Cybersecurity and Technology Services, works with the U.S. State Department to help identify threats and potential compromises. In her role, she advocates for a Zero Trust approach that focuses on protecting critical data rather than trying to secure everything equally. She rec…
  continue reading
 
—> ENFP Owners Manual In this episode Joel and Antonia respond to a listener's question on how ENFPs can manage emotional overwhelm to focus on projects. Ask A Question: https://PersonalityHacker.com/Questions More about The ENFP Personality: —> ENFP Personality Type Advice | Podcast 0086 —> ENFP Careers - 4 Work Styles Of The Personality Type | Po…
  continue reading
 
On the podcast: How to find success with web2app, the value (and challenges) of “owning the transaction”, and why avoiding app store fees isn’t a great reason to experiment with web2app, but might work out anyway. Key Takeaways: 💰 There’s much more to web2app than avoiding app store fees - In fact, looking at app store fees alone disregards the ben…
  continue reading
 
This week, Jeff Pollard and Allie Mellen join us to discuss the fallout and lessons learned from the CrowdStrike fiasco. They explore the reasons behind running in the kernel, the challenges of software quality, and the distinction between a security incident and an IT incident. They also touch on the need to reduce the attack surface and the impor…
  continue reading
 
—> ENTP Owners Manual In this episode Joel and Antonia respond to a listener's question about ENTP emotional blindspots & how to process them. Ask A Question: https://PersonalityHacker.com/Questions More about the ENTP Personality: —> ENTP Personality Type Advice | Podcast 0092 —> How To Love Yourself as an ENTP | Podcast 527…
  continue reading
 
What are the barriers to cyber resilience today? Why is it so difficult? And what is coming next, that will generate resilience challenges further down the line? After five years of focusing on the short- and medium-term future of cybersecurity and edge, this year, LevelBlue wanted to understand what is preventing cyber resilience—and what business…
  continue reading
 
Enjoying the content? Let us know your feedback! In this week's episode we will dig in exploring a critical framework that’s reshaping how organizations approach cybersecurity—especially in the energy sector—known as the Cybersecurity Capability Maturity Model. This is also refer to C2M2. We’ll unpack what C2M2 is, why it’s so important, and how it…
  continue reading
 
—> INFP Owners Manual In this episode Joel and Antonia respond to a listener's question about INFPs balancing creativity with specialization. Ask A Question: https://PersonalityHacker.com/Questions More about the INFP Personality: —> INFP Personality Type Advice | Podcast 0055 —> INFP Careers - 4 Work Styles Of The Personality Type | Podcast 0484…
  continue reading
 
Early on in his career Spaf was working with microcode and continued to work on technical projects. As time went on he realized that focusing on the non-technical work, such as policies and shaping our thinking, would help move the needle. Borrowing concepts from his book on the subject, we will delve into some cybersecurity myths such as: Are user…
  continue reading
 
In this conversation, the hosts discuss patchless patching, vulnerabilities in the Windows TCP/IP stack, and the trustworthiness of Microsoft. They highlight the challenges of marketing in the cybersecurity industry and the importance of building trust with customers. The conversation also touches on the need for vendors to prioritize security and …
  continue reading
 
Episode 84: In this episode of Critical Thinking - Bug Bounty Podcast, Justin is joined by Roni Carta (@0xLupin) to discuss their MVH win at the recent Google LHE, and share some technical observations they had with the target and the event. Follow us on twitter at: @ctbbpodcast We're new to this podcasting thing, so feel free to send us any feedba…
  continue reading
 
We’re still on a summer break but in the meantime we are delighted to share with you an episode from friend of the show, Cyber Empathy which Lianne appeared on earlier this year. In this episode Lianne discussed how she hates the term ‘weakest link’ when talking about our colleagues, how the language that we use in cybersecurity can be incredibly h…
  continue reading
 
—> Get Your Personality Owners Manual In this episode Joel and Antonia respond to a listener's question about the Jungian Shadow Cognitive functions of personality. —> Ask A Question More about Personality Shadow Functions: —> Jungian Shadow Work Explained | Podcast 0493 —> Personality Type And Our Persona Masks | Podcast 0405…
  continue reading
 
Startups and small orgs don't have the luxury of massive budgets and large teams. How do you choose an appsec approach that complements a startup's needs while keeping it secure. Kalyani Pawar shares her experience at different ends of an appsec maturity spectrum. In complex software ecosystems, individual application risks are compounded. When it …
  continue reading
 
—> INFJ Owners Manual In this episode Joel and Antonia respond to a listener's question on how to distinguish between an INFJ who is insecure or is simply an introvert. Ask A Question: https://PersonalityHacker.com/Questions More INFJ Resources: INFJ Personality Type Advice | Podcast 0034 How To Love Yourself as an INFJ | Podcast 528…
  continue reading
 
Ever wondered how scams really work? In this episode, we are joined by scam expert Shameela Gonzalez as we dive into the shady world of scammers. From pulling on heart strings to encouraging the purchase of questionable Taylor Swift tickets, nothing is off limits for these criminals. Let this episode be your guide on how to spot a scam and stay one…
  continue reading
 
This week, it’s time for security money, our quarterly review of the money of security, including public companies, IPOs, funding rounds and acquisitions from the previous quarter. This quarter, Crowdstrike crashes the index, as Thoma Bravo acquires another index company. The index is currently made up of the following 25 pure play cybersecurity pu…
  continue reading
 
Enjoying the content? Let us know your feedback! In this week's episode, we’re unpacking a topic that’s crucial for anyone connected to the digital world: _Why Hackers Target Stolen Credentials_. From understanding the value behind those stolen usernames and passwords to exploring the dark web marketplaces where they’re traded, we’ll break it all d…
  continue reading
 
In this interview we explore the new and sometimes strange world of redteaming AI. I have SO many questions, like what is AI safety? We'll discuss her presence at Black Hat, where she delivered two days of training and participated on an AI safety panel. We'll also discuss the process of pentesting an AI. Will pentesters just have giant cheatsheets…
  continue reading
 
—> ENTJ Owners Manual In this episode Joel and Antonia respond to a listener's question on how to help get an ENTJ out of a "personality loop." Ask A Question: https://PersonalityHacker.com/Questions More about Personality Loops: Podcast - Episode 0356 - Using Your 6th Function To Break A Loop - Part 2 (INxP - ENxJ) The Difference Between Personali…
  continue reading
 
Loading …

Quick Reference Guide