Well & Good is a meeting place where listeners can pick the brains of some of the world’s leading health and wellbeing authorities. Hosted by wellbeing advocate Art Green, we talk with a broad range of experts to learn wellness techniques in all different aspects of this fast-developing space. Exceptional guests break down scientific breakthroughs, lived experience and the latest research into relatable, actionable tips, arming listeners with the tools and knowledge to reach their health pot ...
…
continue reading
Consuelo Mack has a long and distinguished career in business journalism. In 2005 she struck out on her own to launch her dream program, a weekly half-hour program on public television devoted to helping Americans build and protect their wealth over the long-term. Now in its eighteenth season, CONSUELO MACK WEALTHTRACK has been dubbed the “Cramer Antidote” by the press and Money Magazine named Mack “The Best Money TV Host.” WEALTHTRACK is the only program on television devoted to long-term d ...
…
continue reading
Join the collector of collectors, JD, as he speaks to fans of pop culture toys and memorabilia from around the world. Each episode sees JD interview a new guest and geek out over the many types of nostalgia we all share. Hear the stories of where their love of franchises such as Star Wars, Batman, Harry Potter, Disney, Video Games and many more grew from and the collecting journey that comes with fandom. Add this podcast to your listening collection today! Hosted on Acast. See acast.com/priv ...
…
continue reading
Authors talk about their books, lives, craft, and the serial comma.
…
continue reading
Join us on The Creative Jam as we immerse ourselves in the creativity of this social age. The world is full of creative outlaws and they deserve their moment in the sun. We speak to the makers and try to understand the game-changers. Not everything we come across makes sense but isn't that part of the fun?
…
continue reading
News through the lens of the students of The New School
…
continue reading
This feed includes all episodes of Paul's Security Weekly, Enterprise Security Weekly, Business Security Weekly, Application Security Weekly, and Security Weekly News! Your one-stop shop for all things Security Weekly!
…
continue reading
This feed includes all episodes of Paul's Security Weekly, Enterprise Security Weekly, Business Security Weekly, Application Security Weekly, and Security Weekly News! Your one-stop shop for all things Security Weekly!
…
continue reading
1
Unlocking Business Value, Beyond Outages, & Combat Account and Platform Fraud - Ajay Gupta, Gerry Gebel, Mark Batchelor - ESW #365
46:14
46:14
Play later
Play later
Lists
Like
Liked
46:14
Enterprises often struggle with achieving business value in identity programs. This is typically the result of technology choices that require a disproportionately greater amount of effort and focus and underestimating the workforce required for organizational change management. With 30 years in the industry and a depth of accumulated knowledge wor…
…
continue reading
1
Increasing KYB Coverage, Is your SSO on point, & The Future of Identity Management - Vibhuti Sinha, Tarvinder Sembhi, Chris Simmons - ESW #365
43:52
43:52
Play later
Play later
Lists
Like
Liked
43:52
Several recent trends underscore the increasing importance of Know Your Business (KYB) practices in today's business landscape. One significant trend is the rise in financial crimes, including money laundering, fraud, and terrorist financing. Technological advancements have transformed the way businesses operate, leading to increased digitization, …
…
continue reading
1
Shared irresponsibilities and the importance of product privacy: Apple vs Microsoft - Mark Batchelor, Vibhuti Sinha, Chris Simmons, Gerry Gebel, Ajay Gupta, Tarvinder Sembhi - ESW #365
2:41:25
2:41:25
Play later
Play later
Lists
Like
Liked
2:41:25
This week, we've got data security being both funded AND acquired. We discuss Lacework's fall from unicorn status and why rumors that it went to Fortinet for considerably more than Wiz was willing to pay make sense. Microsoft Recall and Apple Intelligence are the perfect bookends for a conversation about the importance of handling consumer privacy …
…
continue reading
1
Trust in Microsoft, Apple, and the Holy AI, Moonstone Sleet, Cheating, Joshua Marpet - SWN #393
34:13
34:13
Play later
Play later
Lists
Like
Liked
34:13
Trust in Microsoft, Apple, and the Holy AI, Amen, Moonstone Sleet, Cheating, Joshua Marpet, and More, on this edition of the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-393
…
continue reading
1
Trust in Microsoft, Apple, and the Holy AI, Moonstone Sleet, Cheating, Joshua Marpet - SWN #393
34:13
34:13
Play later
Play later
Lists
Like
Liked
34:13
Trust in Microsoft, Apple, and the Holy AI, Amen, Moonstone Sleet, Cheating, Joshua Marpet, and More, on this edition of the Security Weekly News. Show Notes: https://securityweekly.com/swn-393
…
continue reading
1
Shared irresponsibilities and the importance of product privacy: Apple vs Microsoft - ESW #365
1:11:23
1:11:23
Play later
Play later
Lists
Like
Liked
1:11:23
This week, we've got data security being both funded AND acquired. We discuss Lacework's fall from unicorn status and why rumors that it went to Fortinet for considerably more than Wiz was willing to pay make sense. Microsoft Recall and Apple Intelligence are the perfect bookends for a conversation about the importance of handling consumer privacy …
…
continue reading
1
GenAI, Security, and More Lies - Aubrey King - PSW #832
2:54:18
2:54:18
Play later
Play later
Lists
Like
Liked
2:54:18
We will discuss LLM security in general and some of the issues covered in the OWASP Top 10 for LLMs! Segment Resources: https://genai.owasp.org/ Skyrocketing IoT vulnerabilities, bricked computers?, MACBORG!, raw dogging source code, PHP strikes again and again, if you have a Netgear WNR614 replace it now, Arm Mali, new OpenSSH feature, weird headp…
…
continue reading
1
Bricking PCs and IoT Hacking - PSW #832
1:48:43
1:48:43
Play later
Play later
Lists
Like
Liked
1:48:43
Skyrocketing IoT vulnerabilities, bricked computers?, MACBORG!, raw dogging source code, PHP strikes again and again, if you have a Netgear WNR614 replace it now, Arm Mali, new OpenSSH feature, weird headphones, decrypting firmware, and VPNs are still being hacked! Show Notes: https://securityweekly.com/psw-832…
…
continue reading
1
GenAI, Security, and More Lies - Aubrey King - PSW #832
1:03:50
1:03:50
Play later
Play later
Lists
Like
Liked
1:03:50
We will discuss LLM security in general and some of the issues covered in the OWASP Top 10 for LLMs! Segment Resources: https://genai.owasp.org/ Show Notes: https://securityweekly.com/psw-832
…
continue reading
1
Buzz Aldrin, the Gray Lady, Veeam, Microsoft squared, Nvidia, Josh Marpet... - SWN #392
32:24
32:24
Play later
Play later
Lists
Like
Liked
32:24
Buzz Aldrin punches me in the face, the Gray Lady, Veeam, Microsoft squared, Nvidia, Hardware, Pentests, Josh Marpet, and more on this Edition of the Security Weekly News. Show Notes: https://securityweekly.com/swn-392
…
continue reading
1
Buzz Aldrin, the Gray Lady, Veeam, Microsoft squared, Nvidia, Josh Marpet... - SWN #392
32:23
32:23
Play later
Play later
Lists
Like
Liked
32:23
Buzz Aldrin punches me in the face, the Gray Lady, Veeam, Microsoft squared, Nvidia, Hardware, Pentests, Josh Marpet, and more on this Edition of the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-392
…
continue reading
1
Microsoft Recall's Security & Privacy, Hacking Web APIs, Secure Design Pledge - ASW #288
38:37
38:37
Play later
Play later
Lists
Like
Liked
38:37
Looking at use cases and abuse cases of Microsoft's Recall feature, examples of hacking web APIs, CISA's secure design pledge, what we look for in CVEs, a nod to PHP's history, and more! Show Notes: https://securityweekly.com/asw-288
…
continue reading
1
Microsoft Recall's Security & Privacy, Hacking Web APIs, Secure Design Pledge - ASW #288
38:36
38:36
Play later
Play later
Lists
Like
Liked
38:36
Looking at use cases and abuse cases of Microsoft's Recall feature, examples of hacking web APIs, CISA's secure design pledge, what we look for in CVEs, a nod to PHP's history, and more! Visit https://www.securityweekly.com/asw for all the latest episodes! Show Notes: https://securityweekly.com/asw-288…
…
continue reading
1
Deep Learning to Combat AI Threats & Disrupting the Browser Security Market - Carl Froggett, Vivek Ramachandran - BSW #353
32:15
32:15
Play later
Play later
Lists
Like
Liked
32:15
The recent rise in adversarial AI has made it clear: organizations must fight AI with better AI. Gone are the days of relying on legacy, antiquated endpoint detection and response offerings, or cybersecurity tools that are based on ineffective machine learning models. In this interview, Deep Instinct CIO Carl Froggett will explain why Deep Learning…
…
continue reading
1
The State of the Cybersecurity Market, At Least According to Gartner - Vivek Ramachandran, Carl Froggett, Padraic O'Reilly - BSW #353
1:04:11
1:04:11
Play later
Play later
Lists
Like
Liked
1:04:11
Did you miss Gartner Security & Risk Management last week in National Harbor, MD? Don't worry, Padraic O'Reilly, Founder and Chief Innovation Officer at CyberSaint, joins us to discuss the hot topics that were presented at the conference last week, including: Artificial Intelligence(AI) Continuous Threat Exposure Management(CTEM) Identity & Access …
…
continue reading
1
The State of the Cybersecurity Market, At Least According to Gartner - Padraic O'Reilly - BSW #353
32:01
32:01
Play later
Play later
Lists
Like
Liked
32:01
Did you miss Gartner Security & Risk Management last week in National Harbor, MD? Don't worry, Padraic O'Reilly, Founder and Chief Innovation Officer at CyberSaint, joins us to discuss the hot topics that were presented at the conference last week, including: Artificial Intelligence(AI) Continuous Threat Exposure Management(CTEM) Identity & Access …
…
continue reading
1
Securing Health, Creating Phishing-Resistant Users & Rising Ransomware Stakes - Jim Broome, John Shier, Christopher Harrell - ESW #364
48:00
48:00
Play later
Play later
Lists
Like
Liked
48:00
The interview will delve into the healthcare industry's tumultuous year in 2023, marked by 124 million breached health records across 725 hacking incidents (according to The HIPAA Journal). This interview will explore the critical role that MSSPs play in safeguarding health data and systems against potential security incidents, such as ransomware a…
…
continue reading
1
AI, Lockbit, Veeam, Club Penguin, Kali, Commando Cat, HugeGraph, Aaran Leyland... - SWN #391
35:30
35:30
Play later
Play later
Lists
Like
Liked
35:30
Burning AI, Lockbit, Veeam, Club Penguin, Kali, Commando Cat, HugeGraph, Aaran Leyland, and More, on this edition of the Security Weekly News. Show Notes: https://securityweekly.com/swn-391
…
continue reading
1
AI, Lockbit, Veeam, Club Penguin, Kali, Commando Cat, HugeGraph, Aaran Leyland... - SWN #391
35:26
35:26
Play later
Play later
Lists
Like
Liked
35:26
Burning AI, Lockbit, Veeam, Club Penguin, Kali, Commando Cat, HugeGraph, Aaran Leyland, and More, on this edition of the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-391
…
continue reading
1
Interest in Identity Security is Spiking - John Shier, Will Lin, Christopher Harrell, Jim Broome - ESW #364
2:31:08
2:31:08
Play later
Play later
Lists
Like
Liked
2:31:08
"Identity security has been around forever though", you might be thinking. Allow me to clarify. Identity is the largest cybersecurity product category, but most of it is focused on identity governance, authentication, multi-factor, etc. Very little of it is focused on operational identity security. It's this trend, where we recently (within the las…
…
continue reading
1
The Cybersecurity Market Gets Some New Quirks and Features - ESW #364
1:08:15
1:08:15
Play later
Play later
Lists
Like
Liked
1:08:15
We start off discussing the latest round of fundings, centered largely around data security and securing LLM use. This dovetails into a discussion about marketing language and how difficult it can be for buyers to work out what the latest round of early stage startups are doing. Next, we discuss Cloudflare and Bugcrowd's acquisitions, as well as Sy…
…
continue reading
1
Whose Vulnerability Is It Anyway? - Josh Bressers - PSW #831
2:43:47
2:43:47
Play later
Play later
Lists
Like
Liked
2:43:47
Josh comes on the show to discuss all things related to vulnerability tracking and scoring, including the current issues with various systems and organizations including NIST, CVE, Mitre, CVSS, NVD, and more! Segment Resources: NVD blog post Josh wrote: https://anchore.com/blog/navigating-the-nvd-quagmire/ Josh's Latest post: https://opensourcesecu…
…
continue reading
1
Interest in Identity Security is Spiking - Will Lin - ESW #364
35:05
35:05
Play later
Play later
Lists
Like
Liked
35:05
"Identity security has been around forever though", you might be thinking. Allow me to clarify. Identity is the largest cybersecurity product category, but most of it is focused on identity governance, authentication, multi-factor, etc. Very little of it is focused on operational identity security. It's this trend, where we recently (within the las…
…
continue reading
1
Routers, Breaches, and Vulnerabilities - PSW #831
1:36:11
1:36:11
Play later
Play later
Lists
Like
Liked
1:36:11
This week: Take on the upstream, how hard is it to patch end-of-life software, hack millions of routers, take over millions of routers, 0-days, and no responses, hack Taylor Swift wristbands, can you detect that covert channel?, and breach reports from Ticketmaster, Snowflake, Santander, and TikTok, and top it all of with C-level DNS servers droppi…
…
continue reading
1
Whose Vulnerability Is It Anyway? - Josh Bressers - PSW #831
1:07:52
1:07:52
Play later
Play later
Lists
Like
Liked
1:07:52
Josh comes on the show to discuss all things related to vulnerability tracking and scoring, including the current issues with various systems and organizations including NIST, CVE, Mitre, CVSS, NVD, and more! Segment Resources: NVD blog post Josh wrote: https://anchore.com/blog/navigating-the-nvd-quagmire/ Josh's Latest post: https://opensourcesecu…
…
continue reading
1
Gold Pressed Latinum, VBScript, ORBS, Rockwell, Chrome, SKY, Aaran Leyland, and More - SWN #389
36:17
36:17
Play later
Play later
Lists
Like
Liked
36:17
Gold Pressed Latinum, VBScript, ORBS, Rockwell, Chrome, SKY, Aaran Leyland, and More on this edition of the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-389
…
continue reading
1
Bots are Taking Over the Internet & Defining ASPM - Idan Plotnik, Erez Hasson - ASW #287
30:12
30:12
Play later
Play later
Lists
Like
Liked
30:12
Application security posture management has quickly become a hot commodity in the world of AppSec, but questions remain around what is defined by ASPM. Vendors have cropped up from different corners of the AppSec space to help security teams make their programs more effective, improve their security postures, and connect the dots between developers…
…
continue reading
1
BCNF, Azure, Roaring Kitty, Hugging Face, Okta, Linux, Oracle, Josh Marpet... - SWN #390
35:04
35:04
Play later
Play later
Lists
Like
Liked
35:04
Boyce Codd Normal Form, Azure, Roaring Kitty, Hugging Face, Okta, Linux, Oracle, Josh Marpet and more, are on this edition of the Security Weekly News. Show Notes: https://securityweekly.com/swn-390
…
continue reading
1
BCNF, Azure, Roaring Kitty, Hugging Face, Okta, Linux, Oracle, Josh Marpet... - SWN #390
34:55
34:55
Play later
Play later
Lists
Like
Liked
34:55
Boyce Codd Normal Form, Azure, Roaring Kitty, Hugging Face, Okta, Linux, Oracle, Josh Marpet and more, are on this edition of the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-390
…
continue reading
1
Open Source Software Supply Chain Security & The Real Crisis Behind XZ Utils - Idan Plotnik, Luis Villa, Erez Hasson - ASW #287
1:12:08
1:12:08
Play later
Play later
Lists
Like
Liked
1:12:08
Open source has been a part of the software supply chain for decades, yet many projects and their maintainers remain undersupported by the companies that consume them. The security responsibilities for project owners has increased not only in dealing with security disclosures, but in maintaining secure processes backed by strong authentication and …
…
continue reading
1
Open Source Software Supply Chain Security & The Real Crisis Behind XZ Utils - Luis Villa - ASW #287
42:04
42:04
Play later
Play later
Lists
Like
Liked
42:04
Open source has been a part of the software supply chain for decades, yet many projects and their maintainers remain undersupported by the companies that consume them. The security responsibilities for project owners has increased not only in dealing with security disclosures, but in maintaining secure processes backed by strong authentication and …
…
continue reading