Two Broads Talk public
[search 0]
×
Best Two Broads Talk podcasts we could find (updated August 2020)
Best Two Broads Talk podcasts we could find
Updated August 2020
Join millions of Player FM users today to get news and insights whenever you like, even when you're offline. Podcast smarter with the free podcast app that refuses to compromise. Let's play!
Join the world's best podcast app to manage your favorite shows online and play them offline on our Android and iOS apps. It's free and easy!
More
show episodes
 
Listen, Ladies is a podcast by ladies, for ladies (and gentlemen) featuring interviews with experts and innovators in a broad range of fields internationally. The podcast highlight current events and issues, breakthroughs in the arts and academic communities, as well as women making an extraordinary impact in their fields. Hosted by journalist and international relations scholar Maryalice Aymong, Listen, Ladies is a division of Women Across Frontiers, a global digital non-profit publication ...
 
Two Broads Talk Balls is a sports and lifestyle podcast created out of a life-long love of sports and a desire to showcase more women’s voices in the male dominated sports broadcasting world. Two broads talk balls, putting their unique spin on all things sports from college basketball to professional tennis and everything in between. Except golf. Never golf. Whether tackling the latest controversy or flagging new trends these BROADcasters talk real sports and real life.
 
Inland Journal is a half-hour public affairs program that includes news features and interviews produced by SPR staff, reporters from the Northwest News Network (N3) and others. The program has a regional focus that reflects the broad listening area of Spokane Public Radio.
 
Phoebe Robinson is tired of being the token black woman in an ocean of white dude comedians. So in this podcast, Phoebe’s calling the shots. She’ll host intimate, funny and super honest conversations with musicians, actors, writers and comedians who are killing it in their fields — AND who aren’t white dudes! Stay tuned for the one token white guy (it’s only fair), cameos by Phoebe’s ball-busting executive producer Ilana Glazer, and a whole lot of hijinks. WNYC Studios is a listener-supporte ...
 
The Additive-Free Lifestyle Podcast Show is created by Jo and Tracey, two sisters on a mission to inspire you to live the best life possible. They have a whole lot of fun, they keep it real and never profess to be perfect! Jo and Tracey live an additive-free lifestyle, they both have families, children, husbands and run a successful food blog called Additive-Free Lifestyle. This show is designed to talk about all things health, wellness, food, family & is going to inspire you to change the w ...
 
An Idiot and a Broad is a fun, energetic, and honest podcast FOR teens BY teens. The two hosts, Benjamin Gleckman and Claire Corlett never fail to entertain! If you like lame jokes and off-topic discussions while simultaneously learning a fact here and there... then this podcast is perfect for you! Each episode will entail a few different segments... 1. The Knowledge. We ain't just a bunch of nimnuts over here at Idiot and a Broad headquarters... we bring you facts and statistics relating to ...
 
Two television addicts say "um" way more often than they thought possible, and talk circles around portrayals of gender and sexuality on television and in the media via podcast in an effort to justify the ridiculous amounts of TV they watch.
 
Intro – Hi, my names Kyle Aitken and this is a short documentary about the problems of Cyber Security at work. Interview 1 – Hello my names Neil Martin, I don’t know wither that’s the first thing I shouldn’t be saying, given the fact were talking about security. But since you don’t know where I am or where I live, we should be ok at that level. I work as an internet and security specialist, em, I work in mainly the financial sector, but also in various other business areas. Em, I specialize ...
 
Loading …
show series
 
Belarus shuts down its Internet after its incumbent president’s surprising, perhaps implausible, no...really implausible landslide reelection. Papua New Guinea undergoes buyer’s remorse over that Huawei-built National Data Centre it sprung for a couple of years ago. Versions of Chrome found susceptible to CSP rule bypass. Zoom is taken to court ove…
 
The CyberWire's newest show is here - it’s called Word Notes, and it just launched today with 10 binge-able episodes. Think of it as your audio infosec glossary. It’s not an interview show, it’s just fun, informative, 2-3 minute podcasts that explain security terms, related concepts, and gives you a little bit of context. Be sure to subscribe to Wo…
 
The US Office of the Director of National Intelligence has released an appreciation of the goals of election interference among three principal US adversaries, Russia, China and Iran. Anomali offers a look at the ransomware-as-a-service market with its research on Smaug. The CyberWire’s Rick Howard continues his exploration of incident response. An…
 
This week on the Talk Without Rhythm Podcast I'm joined by the Cancer Man to celebrate his birthday! And what better way to commemorate the slow march to the grave than with two films featuring the adventures of an eternal child: 1991's Hook and 2003's Peter Pan. [00:00] INTRO [02:03] The CromCast Podcast Promo [02:48] RANDOM CONVERSATION [20:03] P…
 
We are back with the All New MenTalkHealth Podcast! And it’s time to hear your stories of mental health, especially in our new Covid world.Our first guest is the fantastic GScene columnist, Craig Hanlon-Smith ready to talk all things Lockdown Anxiety, Therapist Tinder and a Madonna lyric for any occasion.New guests & new stories but the same humour…
 
Cyber threat intelligence analyst Selena Larson takes us on her career journey from being a journalist to making the switch to industrial security. As a child who wrote a book about a green goldfish who dealt with bullying, Selena always liked investigating and researching things. Specializing in cybersecurity journalism led to the realization of h…
 
“Cyberbunker” refers to a criminal group that operated a “bulletproof” hosting facility out of an actual military bunker. “Bullet Proof” hosting usually refers to hosting locations in countries with little or corrupt law enforcement, making shutting down criminal activity difficult. Cyberbunker, which is also known as “ZYZtm” and “Calibour”, was a …
 
President Trump issues Executive Orders restricting TikTok and WeChat in the US. A Chinese APT has been active in industrial espionage against Taiwan’s semiconductor industry. Intel sustains a leak of sensitive company intellectual property. Rewards for Justice communicated to Russian and Iranian individuals by text message. Coordinated inauthentic…
 
The US announces five new lines of effort for the Clean Network program, and none of them are exactly mash notes for Beijing. The US is also offering rewards of up to ten million dollars for information about foreign computer crimes aimed at interfering with US elections. Australia’s new cybersecurity strategy is out. Maze may have hit Canon. Rob L…
 
NSA, yes, NSA, has some privacy advice. Interpol offers its take on where cybercrime is going during the time of the pandemic. Iran’s Oilrig is getting clever with its data exfiltration. The FBI would like to know when you’re finally going to move on from Windows 7--like, c’mon people. Joe Carrigan looks at pesky ads from the Google Play store. Our…
 
The US attributes the Taidoor remote access Trojan to the Chinese government. Sources tell Reuters that documents used in an attempt to influence the last British general election were taken from the compromised email account of the trade minister. Pegasus spyware is found deployed against churchmen and political opposition figures in Togo. China d…
 
Microsoft is in talks to acquire TikTok as the US hints that it may be considering action against other Chinese software companies. Three young men have been charged in the Twitter hack. An apparent distributed denial-of-service attack turns out to have been a glitch. We welcome Verizon’s Chris Novak to the show. Rick Howard talks incident response…
 
This week on the Talk Without Rhythm Podcast I'm joined by TWoRP Elite Patron Jacob P for a cannibal-filled Patreon Pick of 1986's The Texas Chainsaw Massacre 2 and 1987's Blood Diner. [00:00] INTRO [01:54] The Projection Booth Podcast Promo [03:05] RANDOM CONVERSATION [15:30] The Texas Chainsaw Massacre 2 (1986) [59:16] Blood Diner (1987) [01:35:4…
 
Director of Security Engineering at Marketa and Host of Hacker Valley Studio podcast Chris Cochran describes his transitions throughout the cybersecurity industry, from an intelligence job with the Marine Corps, to starting the intelligence apparatus for the House of Representatives, then on to leading Netflix's threat intelligence capability. Chri…
 
NortonLifeLock Research Group (NRG) released a prototype browser extension called BotSight that leverages machine learning to detect Twitter bots in real-time. The tool is intended to help users understand the prevalence of bots and disinformation campaigns within their Twitter feeds, particularly with the increase in disinformation of COVID-19. Jo…
 
An update on social engineering at Twitter. A quick look at the phishing kit criminal market. The European Union sanctions individuals and organizations in Russia, China, and North Korea for involvement in notorious hacking campaigns. North Korea’s North Star campaign is back and dangling bogus job offers in front of its marks. Deceptikons snoop in…
 
Yesterday’s antitrust hearings in the US House of Representatives focus on Big Tech’s big data as something open to use in restraint of trade. And there are questions about community standards as well. The BootHole vulnerability may not represent an emergency, but it will be tough to fix. Android malware masquerades as COVID-19 contact-tracers. The…
 
On the 44th episode of the #VoteHerIn series, a partnership project of Two Broads Talking Politics/Kelly Pollock and Rebecca Sive, author of Vote Her In: Your Guide to Electing Our First Woman President, you’ll hear an interview with Heidi Stevens. Heidi writes the daily "Balancing Act" column for the Chicago Tribune, where she has worked since 199…
 
Alleged Russian influence operations described by US intelligence services. “Ghostwriter” targets the Baltic region with anti-NATO false narratives. Chinese intelligence is said to have compromised Vatican networks. Loss of customer PII seems the costliest kind of data breach. VPN bugs represent a risk to OT networks. Big Tech comes to Capitol Hill…
 
Cloudflare says that reported Ukrainian breaches aren’t its issue. Trend Micro describes a new and unusually capable strain of malware. Garmin is reported to have obtained a decryptor for WastedLocker ransomware. Third-party risk continues in the news, as do misconfigured databases that expose personal information. Huawei’s CFO alleges misconduct b…
 
A vigilante appears to be interfering with Emotet’s payloads. A fintech breach is blamed on a third-party service provider. A list of Cloudflare users is dumped online. There’s a going-out-of-business sale over at the Cerberus cybergang. Malek ben Salem from Accenture Labs on DeepFake detection. Our own Rick Howard gathers the Hash Table to sort so…
 
This week on the Talk Without Rhythm Podcast I'm continuing the Patreon Picks with a selection from TWoRP Elite Patron Paul of Invasion of the Podcast and Strange Highways. Paul requested we take a journey into Peter Jackson's pre-blockbuster period, before he was all about Hobbits and Elves and was more interested in Puppet Sex and unhinged Jake B…
 
Privacy and data security lawyer, Dominique Shelton Leipzig shares that she has always wanted to be a lawyer, ever since she was a little girl. She talks about what her role is with clients in protecting and managing their data, sometimes adhering to up to 134 different data protection laws for global companies. Learn that not a lot has changed for…
 
On April 29, 2020, the Salt management framework, authored by the IT automation company SaltStack, received a patch concerning two CVEs; CVE-2020-11651, an authentication bypass vulnerability, and CVE-2020-11652, a directory-traversal vulnerability. On April 30, 2020, researchers at F-Secure disclosed their vulnerability findings to the public, wit…
 
CISA and NSA warn of a foreign threat to US critical infrastructure. A look at what the Bears have been up to lately. The Blackbaud extortion incident shows its ripple effects. An awful lot of Twitter employees had access to powerful admin tools. China orders a US consulate closed in a tit-for-tat response to the closure of China’s consulate in Hou…
 
Twitter updates the news of last week’s incident: the attackers seem to have accessed some direct messages. France’s partial permission for Huawei to operate in that country now looks like a ban with a 2028 deadline. A quiet cryptominer. The cyber threat to British sport. Awais Rashid from the University of Bristol on cyber security and remote work…
 
“Meowing” is now a thing: the automated discovery and wiping of exposed and unprotected databases. The US indicts two Chinese nationals on eleven counts of hacking and reports evidence that Chinese intelligence services are now using cybercriminals as contractors. Mike Schaub from CloudCheckr on why COVID-19 has ignited modernization projects for g…
 
The Intelligence and Security Committee of Parliament has rendered its report on the Russian cyber threat. Trend Micro reports on the workings of the cyber criminal underground economy. Ben Yelin on U.S. Customs and Border Protection collecting license plate data. Our guest is Kevin O'Brien from GreatHorn on the role of business policies in securit…
 
Notes on last week’s Twitter hack, and on the allure of original gangster and other celebrity usernames. Using marketing databases for intelligence collection. The US Government mulls a ban on TikTok. Johannes Ullrich from SANS on Google Cloud storage becoming a more popular phishing platform. Our own Rick Howard on security operations centers, and…
 
This week on the Talk Without Rhythm Podcast we have a Patreon Pick by TWoRP Elite Patron Jonathan R. featuring Ugly Americans having Ugly Things forced upon them as I discuss 2004's Eurotrip and 2005's Hostel. [00:00] INTRO [01:41] The Good, the Bad, and the Odd Podcast Promo [02:25] RANDOM CONVERSATION [08:36] Eurotrip (2004) [39:42] Hostel (2005…
 
Computer security writer, podcaster and public speaker Graham Cluley describes learning to program on his own from magazines, creating text adventure games for donations, and his journey from programming to presenting and writing with a bit of tap dancing on the side. Along the way, Graham collaborated with others and learned to communicate so that…
 
Researchers at Symantec spotted a Sodinokibi targeted ransomware campaign in which the attackers are also scanning the networks of some victims for credit card or point of sale (PoS) software. It is not clear if the attackers are targeting this software for encryption or because they want to scrape this information as a way to make even more money …
 
The Twitter hack is looking more like high-grade, low-end crime. It also worries people over the disinformation potential it suggests. People care, they really do, that someone hacked COVID-19 biomedical research (we’ll explain). Australia joins the UK, Canada, and the US in blaming Russia for Cozy Bear’s capers. Russia says it didn’t do nothin’. R…
 
Twitter sustained a major incident in which celebrity accounts were hijacked yesterday. It seems to have been a social engineering caper, but it’s motivation, nominally financial, remains unclear. British authorities call out Russia for an influence campaign mounted during last year’s elections. Cozy Bear is back, and sniffing for COVID-19 biomedic…
 
On the 43rd episode of the #VoteHerIn series, a partnership project of Two Broads Talking Politics/Kelly Pollock and Rebecca Sive, author of Vote Her In: Your Guide to Electing Our First Woman President, you’ll hear an interview with Aimee Allison, Founder and President of She the People, a national network elevating the voice and power of women of…
 
A 2018 Presidential finding authorized extensive CIA cyber operations against Russia, China, Iran, and North Korea. Wattpad may have been breached. The SEC asks its registrants to take steps to protect themselves against ransomware. Free VPNs’ databases found exposed. Joe Carrigan on privacy vs. security on Android devices. Our guest is Chris Deluz…
 
The British Government decides to ban Huawei. More on the malware associated with Golden Tax software package. The Molerats appear to be behind some spyware misrepresenting itself as a secure chat app. The Porphiex botnet is back distributing a new ransomware strain. The odd case of the Data Viper breach. Ben Yelin tracks a ruling from the DC circu…
 
President Trump says he authorized US Cyber Command’s retaliation against Russia’s Internet Research Agency for midterm election meddling. North Korean financially motivated hacking as a sign of internal power dynamics. TrickBot accidentally deploys a new module. TikTok, privacy, and security. LinkedIn hacker convicted. Justin Harvey from Accenture…
 
This week on the Talk Without Rhythm Podcast I'm continuing the Patreon Picks with a selection (and guest appearance) by TWoRP Elite Patron Brett the Wiese of the Brettro Culture blog and podcast. Brett has decided to take me on a journey of cinematic strangeness with 1993's Freaked and 2012's Holy Motors. [00:00] INTRO [01:34] Chin Stroker vs Punt…
 
Cybersecurity and disinformation researcher Bilyana Lilly shares her career path from studying where she was always a foreigner to an expert on the Russian perspective. While studying international law in Kosovo, Bilyana realized there are no winners in war. Through her work, she hopes to bring a greater understanding of Russia's strategic thinking…
 
Loading …

Quick Reference Guide

Copyright 2020 | Sitemap | Privacy Policy | Terms of Service
Google login Twitter login Classic login