The Design Vault public
[search 0]
More
Download the App!
show episodes
 
Artwork
 
A show about the past, present, and future of design. The Design Vault is a conversation hosted by Albert Shum and Thamer Abanami, reflecting on iconic products and ideas from the past, and rethinking them from new perspectives. FOLLOW US @thedesignvaultpodcast designvaultpodcast.com Hosts: Albert Shum and Thamer Abanami Production and Post-production: Romina Hakim, Toño Tellez and Poonam Patel Music: Red Lips Media LLC Brand Design: Rafael Poloni
  continue reading
 
Artwork

1
Design Vault

Glen-Gery // Gābl Media

Unsubscribe
Unsubscribe
Monthly+
 
From historic homes to contemporary architecture, brick is one of the most popular design elements around the world. However, it's easy to get the impression that creative use of brick can be limited. This podcast shares the inspiring stories of architectural leaders and how ideas of the past inspired ingenious designs of today. Each episode will stretch the imagination and fuel your next innovative solution with brick.
  continue reading
 
The Application Security Weekly podcast delivers interviews and news from the worlds of AppSec, DevOps, DevSecOps, and all the other ways people find and fix software flaws. Join hosts Mike Shema, John Kinsella, and Akira Brand on a journey through modern security practices for apps, clouds, containers, and more.
  continue reading
 
Artwork

1
Welcome to West Vault Radio

westvaultradio@googlemail.com

Unsubscribe
Unsubscribe
Monthly
 
Vault 97 is a fan podcast set in Bethesda’s post-apocalyptic, atom-age inspired universe of Fallout. The eponymous Vault 97 is a large, underground complex with two interesting details: the first is that it is a fully featured music studio and radio broadcast centre with the latest technology, and two, it has been filled with musicians, personalities and any other remaining ex-pats and civilians from Great Britain (along with those that could fake a convincing enough accent to get in). Susan ...
  continue reading
 
Artwork

1
Travel by Design

Marriott Bonvoy Traveler, Hamish Kilburn

Unsubscribe
Unsubscribe
Monthly
 
Behind the facade of every world-class hotel, there’s a story waiting to be heard. From a secluded overwater villa in the Maldives, to a rejuvenated royal palace in Budapest, to a trendy hotspot in downtown Los Angeles — join host Hamish Kilburn as he meets the architects, designers, and visionaries who dive deep into the craft of design and connect us to the world’s most extraordinary travel experiences. Travel by Design reimagines the hotel design podcast previously known as Behind the Des ...
  continue reading
 
Hello and welcome to my podcast. I am long time atheist youtuber Anubis2814. Here is a collection of my old videos on atheism from 10 years ago. If you are nostolgic for good old youtube atheism please subscribe. If you are more interested in politics please subcribe to my podcast "After School Democracy" or go to my channel. Support this podcast: https://podcasters.spotify.com/pod/show/vault-of-anubis/support
  continue reading
 
The Application Security Weekly podcast delivers interviews and news from the worlds of AppSec, DevOps, DevSecOps, and all the other ways people find and fix software flaws. Join hosts Mike Shema, John Kinsella, and Akira Brand on a journey through modern security practices for apps, clouds, containers, and more.
  continue reading
 
Sunshine Steven is a podcast with the goal to bring a little sunshine to your day! Hear from others about their stories of sunshine. Also packed with tips, tea spilling, reviews, pop culture chat, and laughs! Take this time to escape for a while and focus on your mental health. Be sure to subscribe and review, that would mean oh so much!
  continue reading
 
Artwork

1
Know Power

Noha Sidhom and Mike Borgatti

Unsubscribe
Unsubscribe
Monthly
 
Do you know what happens when you flip a light switch? How many people, dollars, and computers are involved to charge your smartphone? Do you understand the policy implications, political landmines, and local issues as we transition to clean energy? We’re here to answer those questions and more on KNOW POWER. Hosted by agnostic but informed industry experts Noha Sidhom and Mike Borgatti, Know Power is all about demystifying the entire energy industry, getting you involved in the discussion, ...
  continue reading
 
Joddie Taylor is the engaging host of the tiny podcast series "Joddie Tried It," where she shares her extensive experiences in personal and professional development. With over seven years of exploring various courses, memberships, apps, and coaching programs, Joddie offers listeners honest reviews and insights. Focusing on her most recent experiences from 2023 and 2024, she also revisits some impactful programs from her past. Joddie's dedication to continuous learning makes her podcast a val ...
  continue reading
 
Artwork

1051
Sound As Ever

Australian Music Vault

Unsubscribe
Unsubscribe
Monthly
 
The Australian Music Vault celebrates contemporary Australian music and is as much about the future of music as the past. Sound as Ever, an Australian Music Vault podcast, will offer a youth perspective on issues within the Australian contemporary music industry. Young content makers and radio producers have produced podcast episodes that delve into challenges and issues facing the music industry, highlight brilliant Australian music and discuss perspectives on the music community. Season 2 ...
  continue reading
 
Loading …
show series
 
In today's episode we explore the iconic Speak and Spell toy by Texas Instruments. We covered the pop culture impact of the Speak and Spell, its technical specifications, the design principles behind educational devices, the concept of open-ended play, and the connection between teaching machines and AI. The challenges faced by the Speak and Spell,…
  continue reading
 
This week, in the enterprise security news, over half a billion in funding, as everyone gets their pre-Blackhat announcements out! Mimecast picks up Code42 Will Cato Networks IPO? Canarytokens update We still have some crowdstrike fallout to discuss CISO responses to SEC rules Making things secure without security tools tips for going SOCLess denia…
  continue reading
 
There's plenty of content out there detailing how vendors fall short: scummy, aggressive sales tactics overuse of jargon and buzzwords sneaky sales tactics dumping on competitors products that fall far short of claims ambulance chasing So what should they doing? In this episode, we chat with Dani Wolff, about how marketers can adopt the skills and …
  continue reading
 
Remember 20 years ago? When we were certain SIEMs would grant our cybersecurity teams superpowers? Or 10 years ago, when we were sure that NGAV would put an end to malware as we knew it? Or 15 years ago, when we were sure that application control would put an end to malware as we knew it? Or 18 years ago, when NAC would put an end to unauthorized n…
  continue reading
 
Remember 20 years ago? When we were certain SIEMs would grant our cybersecurity teams superpowers? Or 10 years ago, when we were sure that NGAV would put an end to malware as we knew it? Or 15 years ago, when we were sure that application control would put an end to malware as we knew it? Or 18 years ago, when NAC would put an end to unauthorized n…
  continue reading
 
Hacking traffic lights (for real this time), the Docker API strikes again, access Github deleted data, using EDR to elevate privileges on Windows, computers I need in my life, failed experiments and Raspberry PI access points, sitting ducks and TuDoor - its always DNS times 2, null sessions and a blast from the past, chaining UEFI vulnerabilities, …
  continue reading
 
John is one of the foremost experts in UEFI and joins us to talk about PK Fail! What happens when a vendor in the supply chain accidentally loses a key? It's one of the things that keeps me up at night. Well, now my nightmare scenario has come true as a key has been leaked. Learn how and why and what you can do about it in this segment! Show Notes:…
  continue reading
 
John is one of the foremost experts in UEFI and joins us to talk about PK Fail! What happens when a vendor in the supply chain accidentally loses a key? It's one of the things that keeps me up at night. Well, now my nightmare scenario has come true as a key has been leaked. Learn how and why and what you can do about it in this segment! Hacking tra…
  continue reading
 
Modern appsec isn't modern because security tools got shifted in one direction or another, or because teams are finding and fixing more vulns. It's modern because appsec is meeting developer needs and supporting the business. Paul Davis talks about how AI is (and isn't) changing appsec, the KPIs that reflect outcomes rather than being busy, and the…
  continue reading
 
Modern appsec isn't modern because security tools got shifted in one direction or another, or because teams are finding and fixing more vulns. It's modern because appsec is meeting developer needs and supporting the business. Paul Davis talks about how AI is (and isn't) changing appsec, the KPIs that reflect outcomes rather than being busy, and the…
  continue reading
 
Modern appsec isn't modern because security tools got shifted in one direction or another, or because teams are finding and fixing more vulns. It's modern because appsec is meeting developer needs and supporting the business. Paul Davis talks about how AI is (and isn't) changing appsec, the KPIs that reflect outcomes rather than being busy, and the…
  continue reading
 
Modern appsec isn't modern because security tools got shifted in one direction or another, or because teams are finding and fixing more vulns. It's modern because appsec is meeting developer needs and supporting the business. Paul Davis talks about how AI is (and isn't) changing appsec, the KPIs that reflect outcomes rather than being busy, and the…
  continue reading
 
The CISO role has been evolving for 20 years, but the last 2 years have accelerated that evolution. Some might say it's evolving into extinction. What are the factors driving this evolution? Allan Alford, CEO at Alford and Adams Consulting and host of The Cyber Ranch Podcast, joins Business Security Weekly to discuss this evolution and some of the …
  continue reading
 
Identity, the security threat that keeps on giving. For the 17th year in a row, identity is one of the top threats identified in the Verizon DBIR. Why? Dor Fledel, Senior Director of Product Management at Okta and Co-Founder of Spera, joins Business Security Weekly to discuss the challenges of identity and how to solve them. From numerous disparate…
  continue reading
 
Identity, the security threat that keeps on giving. For the 17th year in a row, identity is one of the top threats identified in the Verizon DBIR. Why? Dor Fledel, Senior Director of Product Management at Okta and Co-Founder of Spera, joins Business Security Weekly to discuss the challenges of identity and how to solve them. From numerous disparate…
  continue reading
 
TIME SENSITIVE OFFER Debrief Vault | $27 PRE-SALE until 7/31 | Ruth Ridgeway | Go behind the scenes of Ruth's 10+ year online business and access ALL of her business and launch debriefs. Including the numbers, she doesn't share anywhere else! This includes a private podcast feed and access to Ruth's Facebook group, The Lifestyle Designers Club. Not…
  continue reading
 
This week, on Enterprise Security Weekly, we've got: Identity Security gets more funding Wiz walks away BlackHat Announces Startup Spotlight Finalists Crowdstrike post mortem Simple Security Tricks are the Best Security Tricks Splitting the CISO role Web scraping for AI is out of control SEC vs Solarwinds Vaping the Internet Show Notes: https://sec…
  continue reading
 
Edward Wu thinks so! Understandably so, as his startup, Dropzone.ai is making a big bet on generative AI to change the face (and pace) of security operations. We'll talk about what has changed here, and I have so many questions: after many generations of AI/ML technology in security, is the current gen really that dramatically different? Dropzone i…
  continue reading
 
The emergence of generative AI has caused us to rethink things on two fronts: how we consume threat detection data, as defenders how we need to shift our thinking and approaches to prepare for attackers' newfound GenAI capabilities But wait - is GenAI even useful for defenders or attackers? We'll dive deep into the state of AI as it pertains to sec…
  continue reading
 
The emergence of generative AI has caused us to rethink things on two fronts: how we consume threat detection data, as defenders how we need to shift our thinking and approaches to prepare for attackers' newfound GenAI capabilities But wait - is GenAI even useful for defenders or attackers? We'll dive deep into the state of AI as it pertains to sec…
  continue reading
 
MENTIONED/RESOURCES: 1. Digital Planner Template Kit - customize the template to create a beautiful digital planner 2. The Toilets Poop & Unicorns digital planner I created using the Digital Planner Template Kit. (Available on Etsy) 3. Passive Income Planner Girl learn how to create your digital planner from scratch 4. Self Care stayfit journal | I…
  continue reading
 
Segment description coming soon!The Crowdstrike incident: what happened and what we can do better, people forget what 0-Day really means, shutting off the heat in January, honeypot evasion and non-functional exploits, what not to use to read eMMC, what if we don't patch DoS related vulnerabilities, a CVSS 10 deserves its own category, port shadow a…
  continue reading
 
Doug and the Security Weekly crew talk about vulnerabilities, are we patching the right things? This is the burning question. We will try to answer it. Segment Resources: https://blog.sonicwall.com/en-us/2024/04/patch-tuesday-which-vulnerabilities-really-need-prioritizing/ Show Notes: https://securityweekly.com/psw-836…
  continue reading
 
Doug and the Security Weekly crew talk about vulnerabilities, are we patching the right things? This is the burning question. We will try to answer it. Segment Resources: https://blog.sonicwall.com/en-us/2024/04/patch-tuesday-which-vulnerabilities-really-need-prioritizing/ Segment description coming soon!The Crowdstrike incident: what happened and …
  continue reading
 
"Have nothing in your house that you do not know to be useful or believed to be beautiful." - William Morris Unveiling Joddie’s Desk Set-Up 1. I own the Apple Mac Book Pro, which I purchased in 2019. You can still get it but refurbished HERE. Or check out the latest version: Apple Mac Book Pro (2023) Laptop 2. Apple iPad and Apple Pencil 3. Google …
  continue reading
 
Loading …

Quick Reference Guide