show episodes
 
Artwork
 
The Mason and Friends Show is primarily comprised of Mason, and his primary co host Ju Unit. featuring an ever expanding group of friends. Like Big Mike, Lady T, Jay_Rod Statham, Big Steve, the Carpenter’s Son, Smokey, Trae X, Bad Silver Savage, Changer, Harvest Blaque, and Brandon... This show is an unedited, Fly on the Wall view of all kinds of Friends and Thoughts and jokes, being batted about.
  continue reading
 
Artwork
 
If you’re looking to understand the business of security, then Business Security Weekly is your show! Matt, Jason, and Paul cover security for senior managers and executives, including business challenges, leadership, and communications! Our special guests provide unique perspectives on real problems and solutions to help organizations secure their environments effectively. Learn how to build your security program, solve real problems, learn leadership skills and so much more!
  continue reading
 
Stroke 9 formed in the San Francisco Bay Area in 1989. The band has since recorded five albums and toured extensively in the United States, Canada and Europe. Fueled by the commercial success of the hit song Little Black Backpack, their third album, "Nasty Little Thoughts", went gold in 2000. The single, Kick Some Ass, from their fourth album "Rip It Off" was featured in the movie Jay And Silent Bob Strike Back. The band has also had songs in other movies and TV shows including EdTV, Scrubs, ...
  continue reading
 
Artwork

1
Kinda Famous Podcast

Kinda Famous Podcast Network

Unsubscribe
Unsubscribe
Monthly
 
From famous interviews to Pop Culture to Deep dives on pressing topics in black america, award winning filmmaker and funnyman LD Rowe brings a podcast that is sure to ruffle some feathers and make you laugh. Tune In NOW what else do you have to do??
  continue reading
 
Welcome to the Storytelling with Seth podcast. Stories are shared because they inspire, educate, and entertain. Listen to conversations about craft, character, and the elements of storytelling that feed our imagination. Hear the insights of the writers, artists, and creators of original stories. Learn more about the voice behind Storytelling with Seth at https://linktr.ee/sethsingleton
  continue reading
 
Loading …
show series
 
Big Tech, Fighting a Junta, Keylogger in Microsoft , APT Hackers, Free Laundry, Joshua Marpet & more on this edition of the Security Weekly News! Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-388
  continue reading
 
Secure coding education should be more than a list of issues or repeating generic advice. Liran Tal explains his approach to teaching developers through examples that start with exploiting known vulns and end with discussions on possible fixes. Not only does this create a more engaging experience, but it also relies on code that looks familiar to d…
  continue reading
 
This week, it’s time for security money, our quarterly review of the money of security, including public companies, IPOs, funding rounds and acquisitions from the previous quarter. This quarter, Rubrick's IPO saves the index, as Cisco finishes the acquisition of Splunk. The index is now made up of the following 25 pure play cybersecurity public com…
  continue reading
 
This week, it’s time for security money, our quarterly review of the money of security, including public companies, IPOs, funding rounds and acquisitions from the previous quarter. This quarter, Rubrick's IPO saves the index, as Cisco finishes the acquisition of Splunk. The index is now made up of the following 25 pure play cybersecurity public com…
  continue reading
 
www.TheMasonAndFriendsShow.com https://thejuunit.bandcamp.com/releases https://www.glass-flo.com Great Pipes for Sure Making Knives, Forge N' Unit Style, New Job Style, Cloud style, fuck em, Fuck Diddy, abusive, google it, Diddy in the hall, usher under the covers, emo rapper disses, feel that, Make it Slow, classical, Brain Cloud, Terrence Howard …
  continue reading
 
Suddenly SIEMs are all over the news! In a keynote presentation, Crowdstrike CEO George Kurtz talked about the company's "next-gen" SIEM. Meanwhile, Palo Alto, who was taken to task by some for not having an active presence on the RSAC expo floor, hits the headlines for acquiring IBM's SIEM product, just to shut it down! Meanwhile, LogRhythm and Ex…
  continue reading
 
www.TheMasonAndFriendsShow.com https://thejuunit.bandcamp.com/releases https://www.glass-flo.com Great Pipes for Sure Midget and Triplets? Porn Records? 2 little 1 Big? group of triplets... late bloomers, Mike sent, Make Up, over doing it? extention? function? split? lean back? foot Massage, feet fish, eating fresh, how much for? rubber or not? mon…
  continue reading
 
Has cryptocurrency done more harm than good? Our guest for this segment has some interesting views on its impacts! Vulnrichment (I just like saying that word), Trustworthy Computing Memo V2, SSID confusion, the Flipper Zero accessory for Dads, the state of exploitation, Hackbat, Raspberry PI Connect, leaking VPNs, exploiting faster?, a new Outlook …
  continue reading
 
Everyone is interested in generative AIs and LLMs, and everyone is looking for use cases and apps to apply them to. Just as the early days of the web inspired the original OWASP Top 10 over 20 years ago, the experimentation and adoption of LLMs has inspired a Top 10 list of their own. Sandy Dunn talks about why the list looks so familiar in many wa…
  continue reading
 
Bryan Caplan is Professor of Economics at George Mason University. A bestselling author, his books include The Case Against Education, Open Borders, and Build, Baby, Build: The Science and Ethics of Housing Deregulation. Full transcript available at: josephnoelwalker.com/bryan-caplan-155 See omnystudio.com/listener for privacy information.…
  continue reading
 
In today's enterprises, the Identity Access Management (IAM) System is the key to a business' critical operations. But that IAM environment is more vulnerable than most security executives realize. Segment Resources: https://www.mightyid.com/articles/the-r-in-itdr-the-missing-piece-in-identity-threat-detection-and-response https://www.mightyid.com/…
  continue reading
 
In today's enterprises, the Identity Access Management (IAM) System is the key to a business' critical operations. But that IAM environment is more vulnerable than most security executives realize. Segment Resources: https://www.mightyid.com/articles/the-r-in-itdr-the-missing-piece-in-identity-threat-detection-and-response https://www.mightyid.com/…
  continue reading
 
www.TheMasonAndFriendsShow.com https://thejuunit.bandcamp.com/releases https://www.glass-flo.com Great Pipes for Sure Wizard of Oz, Diss Records, Game?? Shaq Dissing?? not Impressed... Bush replacement, Merkin? Trial Shit. smooth sliding, warm it up, make it hot, Christmas Present, Crying, Sweet, Cloud infrastructure, no pics, nothing but... only f…
  continue reading
 
www.TheMasonAndFriendsShow.com https://thejuunit.bandcamp.com/releases https://www.glass-flo.com Great Pipes for Sure Kill Bill, hot, ugly, Bad Ass Bitches, Thriller? shit Horror, Redo of Rambo, love, fear red dawn cross over,. Rambo Wins, stankin might as well, gross, blind date. smelly? good weed? hot hippy? People's slot machine,. The Rock Says'…
  continue reading
 
In this RSAC 2024 South Stage Keynote, Mikko Hyppönen will look back at the past decade of ransomware evolution and explore how newer innovations, like AI, are shaping its future. Illuminating the Cybersecurity Path: A Conversation with Jeremiah Grossman Join us for a compelling episode featuring Jeremiah Grossman, a prominent figure in the cyberse…
  continue reading
 
A lot of AI security has nothing to do with AI -- things like data privacy, access controls, and identity are concerns for any new software and in many cases AI concerns look more like old-school API concerns. But...there are still important aspects to AI safety and security, from prompt injection to jailbreaking to authenticity. Caleb Sima explain…
  continue reading
 
Inspired by my co-host Jason Albuquerque, this quarter's Say Easy, Do Hard segment is Train How You Fight. In part 1, we discuss the importance of training for a cyber incident. However, lots of organizations do not take it seriously, causing mistakes during an actual cyber incident. How will the lack of preparation impact your organization during …
  continue reading
 
Inspired by my co-host Jason Albuquerque, this quarter's Say Easy, Do Hard segment is Train How You Fight. In part 1, we discuss the importance of training for a cyber incident. However, lots of organizations do not take it seriously, causing mistakes during an actual cyber incident. How will the lack of preparation impact your organization during …
  continue reading
 
www.TheMasonAndFriendsShow.com https://thejuunit.bandcamp.com/releases https://www.glass-flo.com Great Pipes for Sure shout out Taylor, Ace Hardware shout Out!! shirt options expanding? Cinco De Mayo, Haters, Wollam Gardens June 29, commonwealth Canna, chill in public, Air Fryer Racket, food options, Canna Summer fest, Lush 11 Acres, kickin it, Pum…
  continue reading
 
It's the most boring part of incident response. Skip it at your peril, however. In this interview, we'll talk to Joe Gross about why preparing for incident response is so important. There's SO MUCH to do, we'll spend some time breaking down the different tasks you need to complete long before an incident occurs. Resources 5 Best Practices for Build…
  continue reading
 
The Security Weekly crew discusses some of the latest articles and research in cryptography and some background relevant subtopics including the race against quantum computing, key management, creating your own crypto, selecting the right crypto and more! https://www.globalsecuritymag.com/keysight-introduces-testing-capabilities-to-strengthen-post-…
  continue reading
 
www.TheMasonAndFriendsShow.com https://thejuunit.bandcamp.com/releases https://www.glass-flo.com Great Pipes for Sure Shout Out Chris,. Get Well Soon, Leg scars? man with no face? man in the mask? noticing youtube editing, no edits here, political shit, Bam Bam, Yeezy Porn? fast rapping Beavis, Mockery. Beavis and Butthead, Shogun, Warrior, Shit Sh…
  continue reading
 
Companies deploy tools (usually lots of tools) to address different threats to supply chain security. Melinda Marks shares some of the chaos those companies still face when trying to prioritize investments, measure risk, and scale their solutions to keep pace with their development. Not only are companies still figuring out supply chain, but now th…
  continue reading
 
Loading …

Quick Reference Guide