show episodes
 
Artwork

1
Smells Like Identity Hygiene

SPHERE - Identity Hygiene Solutions

Unsubscribe
Unsubscribe
Monthly
 
84% of organizations experienced an identity-related breach within the last year. What were they missing? How could they have avoided it? Welcome to "Smells Like Identity Hygiene," the podcast for IT professionals, cybersecurity enthusiasts and anyone looking for a better way to protect their organization's most critical assets from risk. - Stay up-to-date with cybersecurity trends, news and industry best practices - Reduce cyber insurance costs, maintain compliance and prevent revenue loss ...
  continue reading
 
The global effort of the Hygiene & infection prevention network links clinical expertise and resources, aiding hygiene improvement efforts in your healthcare communities. The podcast provides cutting-edge research conducted with integrity as a way to reduce infections worldwide.
  continue reading
 
Welcome to THE podcast for independent food service professionals, restaurant operators, and anyone who lives-and-loves the world of food! From fast to fine, casual and convenient Dennis Knows Food serves up industry news, insightful conversations, marketing strategies and more - join host Luke LaBree on a journey to "put the foodie back in foodservice!"
  continue reading
 
Security Visionaries is a podcast all about the world of cyber, data, and tech infrastructure, bringing together experts from around the world and across domains. In each episode, your hosts Emily Wearmouth and Max Havey dig into the hot topics and burning questions that are preoccupying industry conversations.
  continue reading
 
Artwork

1
The Audit

IT Audit Labs

Unsubscribe
Unsubscribe
Monthly+
 
Brought to you by IT Audit Labs. Trusted cyber security experts and their guests discuss common security threats, threat actor techniques and other industry topics. IT Audit Labs provides your organization with the leverage of a network of partners and specialists suited for your needs. ​ We are experts at assessing security risk and compliance, while providing administrative and technical controls to improve our clients’ data security. Our threat assessments find the soft spots before the b ...
  continue reading
 
Hosted by Adrian Sanabria, Tyler Shields, Katie Teitler, and Sean Metcalf. If you’re looking for advice and information on enterprise security solutions, look no further than Enterprise Security Weekly! We give you an “insider” perspective into security vendors, including coverage on new product announcements, integrations, funding, M&A, and more! Adrian, Tyler, Katie, and Sean have unique perspectives on the enterprise security landscape. All four hosts are former analysts. Adrian has been ...
  continue reading
 
Free fitness, nutrition, biohacking, fat loss, anti-aging and cutting-edge health advice from BenGreenfieldLife.com! Tune in to the latest research, interviews with exercise, diet and medical professionals, and an entertaining mash-up of ancestral wisdom and modern science, along with Q&A's and mind-body-spirit optimizing content from America's top personal trainer.
  continue reading
 
This Week in Enterprise Tech explores the complex, cutting edge world of enterprise technology. Hosted by Lou Maresca, TWiET features IT professionals explaining the ins and outs of enterprise solutions. Although the show is no longer in production, you can enjoy episodes from our archives.
  continue reading
 
Artwork

1
Connect Together Podcast

Industrial Solutions Network powered by CED

Unsubscribe
Unsubscribe
Monthly
 
We are a network of industrial electrical solution businesses that are all part of a bigger company, CED. We are working together to help manufacturing plants, OEMs, system integrators, industrial contractors and those that are working the plant-floor drive production efficiencies, reduce energy costs, increase worker safety, and communicate over secure networks
  continue reading
 
This Week in Enterprise Tech explores the complex, cutting edge world of enterprise technology. Hosted by Lou Maresca, TWiET features IT professionals explaining the ins and outs of enterprise solutions. Although the show is no longer in production, you can enjoy episodes from our archives.
  continue reading
 
A tactical, bipartisan forum of Federal Agency executives, legislative community members and industry leaders focused on solutions based strategies to our Nation's critical infrastructure obstacles‏
  continue reading
 
Artwork

1
Life as a..

Christopher Schoenwald

Unsubscribe
Unsubscribe
Weekly
 
FIND YOUR FUTURE | DISCOVER Jobs | SPARK New Career and Biz Ideas | ENGAGE with Top Professionals | FIND YOUR HAPPINESS Undecided about your future career? Looking to change your profession but unsure? Curious about starting a business? Welcome to LIFE AS A.. This is a show intently focussed on helping people to find their professional career or business pathway by exploring and unearthing the details of jobs from around the world. Hear from a global array of fascinating guests as they dish ...
  continue reading
 
The Carl Sandburg College podcast features the news and events of campus and interviews with the people working behind the scenes making things happen. It's a place designed to provide listeners with timely and relevant conversations.
  continue reading
 
Artwork

1
Amplified Podcast

Terry Tateossian

Unsubscribe
Unsubscribe
Monthly
 
Terry Tateossian is on a mission to explore how emerging technologies, media, robotics, data and behavioral science will solve humanity’s most pressing challenges. From education, mobility, energy, food and water supplies, the environment, employment all the way to disease and basic human rights - nothing is off limits.
  continue reading
 
Working in cybersecurity can lead to many restless nights worrying about the safety of your applications. But don’t let software insecurity get you down – we’re here to help you take back your sleep. World-renowned software security evangelists will join our Checkmarx experts Stephen Gates and Matt Slotten to get inside the minds of cyber attackers. Our conversations will be packed with insight into the latest software threats and best practices for maturing your application security program ...
  continue reading
 
Advertising is dead - It’s all business now. The world of business & startups is in constant motion and evolution, from digital disruption to brand communication. And while the fundamentals stay the same, there is a need to unravel where we are, how we got here, and most importantly, where we’re headed not just as a business ecosystem but also as professionals focused on our careers. Join me, Varun Duggirala, for your weekly dose of insights, perspectives and understanding of where the world ...
  continue reading
 
Artwork

1
Superbugs Unplugged

Lance Price and Jay Graham

Unsubscribe
Unsubscribe
Monthly
 
A joint project of Antibiotic Resistance Action Center, Milken Institute School of Public Health at the George Washington University and the UC Berkeley School of Public Health, this monthly podcast will delve into the critical health threat of antibiotic resistance and what drives it, including antibiotic use in agriculture and human health care, challenges and opportunities in R&D, and more. Co-hosts Dr. Lance Price and Dr. Jau Graham will cover a new topic and feature an expert guest ever ...
  continue reading
 
Loading …
show series
 
Interested in reclaiming your youthful appearance but terrified by the thought of a plastic surgeon transforming your face into a botched job fit for reality TV? In today's episode, explore how to achieve natural-looking results and rejuvenate your appearance through facial plastic surgery and other effective anti-aging strategies with Dr. Cameron …
  continue reading
 
This is a great interview with Adam Shostack on all things threat modeling. He's often the first name that pops into people's heads when threat modeling comes up, and has created or been involved with much of the foundational material around the subject. Adam recently released a whitepaper that focuses on and defines inherent threats. Resources: He…
  continue reading
 
We've talked about generative AI in a general sense on our podcast for years, but we haven't done many deep dives into specific security use cases. That ends with this interview, as we discuss how generative AI can improve SecOps with Ely Kahn. Some of the use cases are obvious, while others were a complete surprise to me. Check out this episode if…
  continue reading
 
In this Webinar Session of "Control-Alt-Defeat: Gaming the System of Prioritizing Security Risk," we navigate the treacherous terrain of identity security asset types, controls, and violations with the precision of a grandmaster strategist playing the ultimate game of chess. Our expert host dives into the art and science of turning sprawling data p…
  continue reading
 
This week the crew discusses: When TVs scan your network, bad things can happen, PuTTY is vulnerable, Crush FTP, vulnerabilities that will never be fixed, CVEs are for vulnerabilities silly, you can test for easily guessable passwords too, FlipperZero can steal all your passwords, more XZ style attacks, more reasons why you shouldn't use a smart lo…
  continue reading
 
A clear pattern with startups getting funding this week are "autonomous" products and features. Automated detection engineering Autonomously map and predict malicious infrastructure ..."helps your workforce resolve their own security issues autonomously" automated remediation automated compliance management & reporting I'll believe it when I see it…
  continue reading
 
On February 27, 2024, PCAST (President’s Council of Advisors on Science and Technology) sent a report to the President with recommendations to bolster the resilience and adaptability of the nation’s cyber-physical infrastructure resources. Phil was part of the team that worked on the report and comes on the show to talk about what was recommended a…
  continue reading
 
A clear pattern with startups getting funding this week are "autonomous" products and features. Automated detection engineering Autonomously map and predict malicious infrastructure ..."helps your workforce resolve their own security issues autonomously" automated remediation automated compliance management & reporting I'll believe it when I see it…
  continue reading
 
A clear pattern with startups getting funding this week are "autonomous" products and features. Automated detection engineering Autonomously map and predict malicious infrastructure ..."helps your workforce resolve their own security issues autonomously" automated remediation automated compliance management & reporting I'll believe it when I see it…
  continue reading
 
From his earliest years, Hagen Thiers battled relentless adversaries: headaches, dizziness, and the torment of sleepless nights. These problems persisted, and by the time he was 11 years old, he was diagnosed with electro-hypersensitivity. Now an expert and inventor in groundbreaking electromagnetic field (EMF) protection, Hagen joins me on the pod…
  continue reading
 
Life as a Sales Consultancy Specialist Get a peek inside at what it's like to run a sales based consultancy business. Guest Leighann Lovely, Founder of Love Your Sales, breaks it all down for us in this episode. Drawing from her rich background in Human Resources and over a decade in sales, Leighann provides invaluable insights and strategies for b…
  continue reading
 
On February 27, 2024, PCAST (President’s Council of Advisors on Science and Technology) sent a report to the President with recommendations to bolster the resilience and adaptability of the nation’s cyber-physical infrastructure resources. Phil was part of the team that worked on the report and comes on the show to talk about what was recommended a…
  continue reading
 
How can open source projects find a funding model that works for them? What are the implications with different sources of funding? Simon Bennetts talks about his stewardship of Zed Attack Proxy and its journey from OWASP to OpenSSF to an Open Source Fellowship with Crash Override. Mark Curphy adds how his experience with OWASP and the appsec commu…
  continue reading
 
How can open source projects find a funding model that works for them? What are the implications with different sources of funding? Simon Bennetts talks about his stewardship of Zed Attack Proxy and its journey from OWASP to OpenSSF to an Open Source Fellowship with Crash Override. Mark Curphy adds how his experience with OWASP and the appsec commu…
  continue reading
 
The new SEC Cyber Security Rules require organizations to be ready to report cyber incidents. But what do you actually need to do? Mike Lyborg, Chief Information Security Officer at Swimlane, joins Business Security Weekly to discuss how to prepare. In this interview he'll discuss the key element of your preparation, including: Quantification Mater…
  continue reading
 
Since 2016, we been hearing about the impending impact of CMMC. But so far, it's only been words. That looks to be changing. Edward Tourinsky, Founder & Managing Principal at DTS, joins Business Security Weekly to discuss the coming impact of CMMC v3. Edward will cover: The background of CMMC Standardization of CMMC CMMC v3 changes and implementati…
  continue reading
 
Since 2016, we been hearing about the impending impact of CMMC. But so far, it's only been words. That looks to be changing. Edward Tourinsky, Founder & Managing Principal at DTS, joins Business Security Weekly to discuss the coming impact of CMMC v3. Edward will cover: The background of CMMC Standardization of CMMC CMMC v3 changes and implementati…
  continue reading
 
Alcohol and longevity — it's an extremely controversial topic that most health experts shy away from. But I'm not afraid of courting controversy when there's scientific evidence to consider. Sure, you've heard the warnings about alcohol being a toxin that should be avoided at all costs — and in some cases this is true. But what if I told you that i…
  continue reading
 
This week, Adrian and Tyler discuss some crazy rumors - is it really possible that a cloud security startup valued at over $8 billion in November 2021 just got bought for $200 million??? Some healthy funding for Cyera and Cohesity ($300m and $150m, respectively) Onum, Alethea, Sprinto, Andesite AI, StrikeReady, YL-Backed Miggo, Nymiz, Salvador Tech…
  continue reading
 
Protecting a normal enterprise environment is already difficult. What must it be like protecting a sports team? From the stadium to merch sales to protecting team strategies and even the players - securing an professional sports team and its brand is a cybersecurity challenge on a whole different level. In this interview, we'll talk to Joe McMann a…
  continue reading
 
Protecting a normal enterprise environment is already difficult. What must it be like protecting a sports team? From the stadium to merch sales to protecting team strategies and even the players - securing an professional sports team and its brand is a cybersecurity challenge on a whole different level. In this interview, we'll talk to Joe McMann a…
  continue reading
 
Protecting a normal enterprise environment is already difficult. What must it be like protecting a sports team? From the stadium to merch sales to protecting team strategies and even the players - securing an professional sports team and its brand is a cybersecurity challenge on a whole different level. In this interview, we'll talk to Joe McMann a…
  continue reading
 
Pioneering the Cyber Battlefield: A Deep Dive with Winn Schwartau, Cybersecurity Luminary Get ready for an extraordinary episode as we sit down with Winn Schwartau, a true pioneer and luminary in the world of cybersecurity. Winn's impact on the field is nothing short of legendary, and in this podcast interview, we uncover the profound insights and …
  continue reading
 
Are you tired of feeling like your body is fighting against you? Do you find yourself battling unexplained fatigue, muscle aches, and brain fog day after day, with no relief in sight? Imagine waking up each morning with a renewed sense of energy and clarity, ready to take on the day after uncovering and addressing hidden ailments impacting your hea…
  continue reading
 
Life as an Industrial Hygiene Specialist Robyn Harn, is an Industrial Hygiene Specialist for California Operations at Rio Tinto. In this career interview she shares her journey into this fascinating line of work. Originally from Australia and now based at the Boron Mine in California, one of the world's largest borax mines, Robyn oversees health an…
  continue reading
 
Version 4.0 of the Payment Card Industry Data Security Standard (PCI DSS) puts greater emphasis on application security than did previous versions of the standard. It also adds a new “customized approach” option that allows merchants and other entities to come up with their own ways to comply with requirements, and which also has implications for a…
  continue reading
 
Loading …

Quick Reference Guide