show episodes
 
This spirited and spiritual vegan podcast is a lively hour dedicated to helping you look and feel amazing, eat extraordinary food, honor and protect all beings, and create a body exquisitely attuned to spiritual growth. Host Victoria Moran, author of Main Street Vegan, The Good Karma Diet, and Creating a Charmed Life, is joined by physicians, athletes, yogis, spiritual luminaries, ethical exemplars, and celebrity and real-world vegans with practical ideas for elevated living.
 
Your Faith to Live By speakers are Larry Millender and James Saulter. Larry is the senior pastor of Church 360 in Tallahassee, with Sunday services at 9 a.m. and Wednesday services at 6:30 p.m. James is the senior pastor of Summit Life Church in Crawfordville, with Sunday morning morning prayer at 8 a.m. and worship at 10:30 a.m. And Wednesday Life Group is at 7 p.m.
 
Loading …
show series
 
COO and Co-Founder of Query. AI, Andrew Maloney, shares how the building blocks he learned in the military helped him get where he is today. Coming from a blue collar family with a minimal knowledge of computers, Andrew went into computer operations in the Air Force. While deployed to Oman just after the start of the Iraq War, Andrew said he got hi…
 
Guest Rob Boyce, Accenture's Global Lead for Cyber Incident Response and Transformation Services, joins Dave to discuss joint research done by Accenture’s Cyber Threat Intelligence (ACTI) group and Prevailion’s Adversarial Counterintelligence Team (PACT). The teams dug into recently publicized campaigns of the cyber espionage threat group Lyceum (a…
 
US and Russian talks over Ukraine conclude with an agreement to further exchanges next week. Western governments continue to recommend vigilance against the threat of Russian cyberattacks against critical infrastructure. The US Treasury Department sanctions four Ukrainian nationals for their work on behalf of Russia’s FSB and its influence operatio…
 
As we continue our “In Step” series through the Gospel of Luke, Pastor J.D. teaches about a defining feature of those who follow Jesus: They care for the vulnerable, the weak, the helpless, and the forgotten. Followers of Jesus care for the vulnerable and the helpless because, before God, we are vulnerable and helpless, too.…
 
As Russian forces remain in assembly areas near the Ukrainian border, the US and Russia prepare for tomorrow’s high-level talks in Geneva. NATO members look to their cyber defenses. US President Biden issues a Memorandum on Improving the Cybersecurity of National Security, Department of Defense, and Intelligence Community Systems. Notes on C2C mark…
 
It can be frightening to think about battling the “rulers, authorities, and cosmic powers” of this world—Satan’s demonic forces that are at work all around us. But Jesus tells us in the Gospel of Luke that as believers, we have nothing to fear. As strong as Satan is, he’s no match for the power of the Holy Spirit that lives within us.…
 
Ukraine confirms that it was hit by wiper malware last week, as tension between Moscow and Kyiv remains high. It remains high as well between Russia and NATO, as Russia continues marshaling conventional forces around Ukraine. CISA advises organizations to prepare to withstand Russian cyberattacks. Other cyberespionage campaigns are reported, as is …
 
As we continue our “In Step” series through the Gospel of Luke, Pastor J.D. talks about the cosmic struggle between God and Satan, a struggle that bears on our lives every day. We’ll see that apart from God’s power, even the best attempts to change are ultimately doomed to fail. But with God’s power, not only can we survive, but we can actually plu…
 
A new Chinese cyberespionage group is described. Cobalt Strike implants are observed hitting unpatched VMware Horizon servers. Ukraine attributes last week’s cyberattacks to Russia (with some possibility of Belarusian involvement as well). Microsoft doesn’t offer attribution, but it suggests that the incidents were more destructive than ransomware …
 
Show Notes: We should be as intentional with our families as we are with our jobs. There is a sense that, on one level, I as a parent affect the faith journey of my kids. But on another level, there is a limit to the responsibility parents have for the choices our kids make. God has made them as individuals. A lot of godly parents will have a child…
 
Rick explains the network defender evolution from defense-in-depth in the 1990s, to intrusion kill chains in 2010, to too many security tools and SOAR in 2015, and finally to devsecops somewhere in our future. Resources: “Cybersecurity First Principles: DevSecOps.” by Rick Howard, CSO Perspectives, The CyberWire, 8 June 2020. “FAQ,” RSA Conference,…
 
Social engineer and CEO of Hekate, Marina Ciavatta, shares her story of how people think her job is a la Mission Impossible coming from the ceiling with a rope and stealing stuff in the dead of the night. Marina does physical pentesting. Starting with an unused degree in journalism, Marina turned her talent for writing into a job as a content produ…
 
This episode features guest Alissa Knight, former hacker and partner at Knight Ink, along with Karl Mattson, CISO from Noname Security, discussing findings on severe API vulnerabilities in U.S. banking applications research that was conducted by Alissa and funded by Noname Security. The research, “Scorched Earth: Hacking Bank APIs,” unveils a numbe…
 
A large-scale cyberattack against Ukrainian websites looks like an influence operation, and Russian intelligence services are the prime suspects. The FSB raids REvil. The White House Open Source Software Security Summit looks toward software bills of materials. MuddyWater exploits Log4shell. The DPRK is working to steal cryptocurrency. Caleb Barlow…
 
A White House government-industry summit today addresses open-source software security. The US officially makes its second attribution of the week to a nation-state: it calls out Iran as the operator of the MuddyWater threat group. Israel arrests five on charges related to spying for Iran (they’re thought to have been recruited through catphishing)…
 
The US issues an alert over the prospect of Russian cyberattacks, and the EU begins a series of stress tests, both in apparent response to concerns over the prospect of a Russian attack on Ukraine. NIST updates its guidance on Engineering Trustworthy Secure Systems. NIght Sky ransomware exploits Log4shell. Phishing afflicts a hotel chain. Carole Th…
 
Grace. It’s the thing we need the most, and the thing we deserve the least. While many of us understand in our heads the importance of Jesus’ sacrifice for us, we often allow our hearts to forget just how amazing the good news of the gospel really is. As Pastor J.D. shows us in our series, “In Step,” when we allow the amazing grace of God to amaze …
 
Log4shell as an instance of a more general software supply chain issue. An APT apparently mistakenly infects itself with its own RAT. A new backdoor, SysJoker, is in use in the wild. A warning on commercial surveillance software. A leak investigation continues in Denmark. Joe Carrigan explains bogus QR codes. Our guest is Casey Allen of Concentric …
 
As we continue our “In Step” series through the book of Luke, Pastor J.D. teaches about the scandal of grace. Grace offends most people, particularly religious people. We are hard-wired to think that our worth is a result of what we do. Do good things, get good outcomes. Do bad things, get bad outcomes. Grace throws this whole system aside. And tha…
 
CISA describes progress toward remediating Log4shell. Other open-source libraries are found to have similar issues, in one case problems deliberately introduced by the developer. Concerns are expressed over undersea cable security. FIN7’s BadUSB campaign. Security questions about another Chinese-made phone. Our guest is Bob Maley from Black Kite on…
 
Senior Vice President and Executive in Residence with Rapid7 and Chairman for Cyversity, Julian Waits, grew up in the era of the Justice League and Superman and it shaped his career. Julian always wanted to do something where he could find a way to help society to basically help others. Starting out as a Baptist minister with aspirations of being a…
 
Guest Rob Boyce, Accenture's Global Lead for Cyber Incident Response and Transformation Services, joins Dave to discuss their research "Karakurt rises from its lair." Accenture Security has identified a new threat group, the self-proclaimed Karakurt Hacking Team, that has impacted over 40 victims across multiple geographies. The threat group is fin…
 
Kazakhstan shuts down its Internet as civil unrest continues (and one consequence is a disruption of alt-coin mining in that country). The UK’s NHS warns of unknown threat actors exploiting Log4j bugs in unpatched VMware Horizon servers. In the US, CISA continues to assist Federal agencies with Log4j remediation, and observers call for more Governm…
 
As we continue our “In Step” series through the book of Luke, Pastor J.D. teaches what it means to “live ready” for Jesus’ return. Are we awake to the task Jesus left for his church, or are we asleep at the wheel? Are we confident Jesus will return soon, or do we live without urgency? As followers of Jesus, we should live in such a way that only ma…
 
ICS vendors address Log4j vulnerabilities. Regulators and legislators think about addressing issues in the software supply chain. Ransomware gangs were quick to exploit Log4shell. An old, and patched, Windows vulnerability is being exploited by the Malsmoke gang. Social engineering of Google Docs users is up. Mr. Klyshin pleads not guilty. Robert M…
 
If greed is a sickness we can have without even realizing it, what’s the cure? Part of being a disciple of Jesus is learning how to re-think contentment and wake up to the brevity of life. Pastor J.D. shows us what Jesus has to say about guarding against greed as he draws from the book of Luke in our series called “In Step.”…
 
CISA says US Federal agencies are now largely in compliance with Log4j risk mitigation guidance. The FTC issues advice and a warning on Log4j to US businesses. A skimmer is installed through cloud-delivered video. The Vice Society’s ransomware is meddling with supermarket operations in the UK. The Atlantic Council offers advice on strategy for the …
 
As we continue our “In Step” series through the book of Luke, Pastor J.D. preaches about a sickness that most of us have, but few of us realize—the sickness of greed. Part of what makes greed so deadly is our inherent blindness to it. Jesus simply assumes that greed is a problem for all of us! But he also offers us a radical, gospel-shaped antidote…
 
It’s going to take time, vigilance, and attention to detail to manage the Log4j risks. A North Korean APT is trying to install the Konni RAT into Russian diplomats’ devices. More hacktivist-looking incidents follow the anniversary of Iranian General Soleimani’s death. Other, self-inflicted, software supply chain incidents. The Kremlin is said to be…
 
Aquatic Panda has been found working Log4shell exploits against an academic institution. Apache fixes new Log4j issues reported last week, and Microsoft also updates Windows Defender to address Log4j risks. Cyberattacks, criminal or hacktivist in motivation, hit news outlets around the new year. Microsoft works on fixing a Y2K22 bug in on-premise E…
 
As we begin our “In Step” series through the book of Luke, Pastor J.D. dives into one of Jesus’ most recognized parables. It’s a story about two men who built identical houses—with tragically different results. The only difference? Their foundation. In these times of uncertainty, as our very lives seem shaken, it’s a perfect time to make sure our l…
 
Show Notes: Who do you feel the closest kinship with? Who do you spend most of your time with? The lesson from Lot’s life is that you have to make up your mind from the beginning: Who do you really want to be? If it’s with the world, go there 100%. If it’s with God, go with him 100%. What do you love? What does that say about what your heart really…
 
Loading …

Quick Reference Guide

Copyright 2022 | Sitemap | Privacy Policy | Terms of Service
Google login Twitter login Classic login