Hosted by productivity strategist Mike Vardy, A Productive Conversation is a podcast that discusses tips, tools, tactics, and tricks that are designed to help you take your productivity, time management, goals, to do lists, habits, and workflow to new heights - both at work and at home. If you're looking to focus your efforts on getting the right things done and start living the good life, then this weekly conversational podcast – crafted in the tradition of Slate's Working, Back to Work, an ...
…
continue reading
A podcast intended to help busy women find the tools and the encouragement to manage their lives, their time, their stress, and their stuff so they can accomplish the things that matter most to them.
…
continue reading
Explore the far reaches of the world’s horrors in the audio drama podcast The White Vault. Follow the collected records of a repair team sent to Outpost Fristed in the vast white wastes of Svalbard and unravel what lies waiting in the ice below. This Fool and Scholar production is intended for mature audiences.
…
continue reading
Something has been found at the bottom of Earth's ocean. An ancient artifact that can only be described as a giant door, inset into the sea floor. It becomes known as the Vault. A gigantic enigma, buried and forgotten...nineteen thousand feet down. To study the artifact, the galaxy's most powerful corporation, Maas-Dorian, has built a massive, self-contained, secret laboratory base surrounding it, named FATHOM. It's objective: unlock the secrets of the artifact and discover what it holds. B ...
…
continue reading
Set shortly after the events of the award-winning podcast The Leviathan Chronicles, The Rapscallion Agency continues the adventures of its two youngest characters, Lisette Mainsabiles and Paul Lee (aka Cluracan) who moved to Paris and use their unique skills to start a business, navigate young love, and lovingly care for a cybernetic rat. After converting a bakery van into their mobile hi-tech headquarters, Lisette and Cluaracan explore Paris by calling upon old acquaintances to help them fi ...
…
continue reading
Audio documentaries, interviews, presentations, Guest hosting gigs, guesting on other shows, and other sh*t you may have missed... Become a supporter of this podcast: https://www.spreaker.com/podcast/jfk-assassination-from-the-vault--4127240/support.
…
continue reading
Steve "Zetro" Souza of Exodus talks music, life, pop culture, and more from his own Toxic Vault Support this podcast: https://podcasters.spotify.com/pod/show/zetros-toxic-vault0/support
…
continue reading
This feed includes all episodes of Paul's Security Weekly, Enterprise Security Weekly, Business Security Weekly, Application Security Weekly, and Security Weekly News! Your one-stop shop for all things Security Weekly!
…
continue reading
Ever wondered how you’d plan a mission to Space? Or how we can make social media a force for good? Have you thought about how we can make water safe for all, or how our experiences can change our reality? What about the power of storytelling? And whether there will ever be a cure for cancer? Join Dr. Alice Roberts from the University of Birmingham, as she opens the doors to The Curiosity Vault in search of answers to the biggest questions facing science and society today. Helping Alice on he ...
…
continue reading
Hey kid, you wanna see a new RPG? The Third Gallon is an actual play TTRPG podcast where we play new games in a seasonal format. Kind of like a sampler, since everything goes with mayo. Currently we are playing through Pathfinder 2nd Edition published by Paizo. We are a group of friends who have been playing tabletop games for years and want to share the fun we have at our table with other people. We all hope you get a laugh and some excitement out of our antics.
…
continue reading
The Application Security Weekly podcast delivers interviews and news from the worlds of AppSec, DevOps, DevSecOps, and all the other ways people find and fix software flaws. Join hosts Mike Shema, John Kinsella, and Akira Brand on a journey through modern security practices for apps, clouds, containers, and more.
…
continue reading
The Application Security Weekly podcast delivers interviews and news from the worlds of AppSec, DevOps, DevSecOps, and all the other ways people find and fix software flaws. Join hosts Mike Shema, John Kinsella, and Akira Brand on a journey through modern security practices for apps, clouds, containers, and more.
…
continue reading
For the latest in computer security news, hacking, and research! We sit around, drink beer, and talk security. Our show will feature technical segments that show you how to use the latest tools and techniques. Special guests appear on the show to enlighten us and change your perspective on information security. Note: This is only Paul's Security Weekly, a 2-hour show recorded once per week.
…
continue reading
Commentary on current nutrition research, fitness product reviews, and interviews with professionals in the field of health and wellness. All that and more, every week, on the Addicted to Fitness podcast.
…
continue reading
Hosted by Adrian Sanabria, Tyler Shields, Katie Teitler, and Sean Metcalf. If you’re looking for advice and information on enterprise security solutions, look no further than Enterprise Security Weekly! We give you an “insider” perspective into security vendors, including coverage on new product announcements, integrations, funding, M&A, and more! Adrian, Tyler, Katie, and Sean have unique perspectives on the enterprise security landscape. All four hosts are former analysts. Adrian has been ...
…
continue reading
If you’re looking to understand the business of security, then Business Security Weekly is your show! Matt and Paul cover security for senior managers and executives, including business challenges, leadership, and communications! Our special guests provide unique perspectives on real problems and solutions to help organizations secure their environments effectively. Learn how to build your security program, solve real problems, learn leadership skills and so much more!
…
continue reading
If you’re looking to understand the business of security, then Business Security Weekly is your show! Matt, Jason, and Paul cover security for senior managers and executives, including business challenges, leadership, and communications! Our special guests provide unique perspectives on real problems and solutions to help organizations secure their environments effectively. Learn how to build your security program, solve real problems, learn leadership skills and so much more!
…
continue reading
This feed includes all episodes of Paul's Security Weekly, Enterprise Security Weekly, Business Security Weekly, Application Security Weekly, and Security Weekly News! Your one-stop shop for all things Security Weekly!
…
continue reading
If you’re looking for advice and information on enterprise security solutions, look no further than Enterprise Security Weekly! We give you an “insider” perspective into security vendors, including coverage on new product announcements, integrations, funding, M&A, and more! Adrian, Tyler, Katie, and Sean have unique perspectives on the enterprise security landscape. All four hosts are former analysts. Adrian has been a consultant, practitioner, founder, and runs Security Weekly Labs. Tyler h ...
…
continue reading
Previously known as "Notion Nerds". A weekly podcast exploring light hearted conversation around Personal Knowledge Management + Productivity through an Ecological dynamics approach. Hosted by Jonathan Stewart: https://simplicity-specialist.com and Danny Hatcher: https://dannyhatcher.com/
…
continue reading
"Old Sounds and the New" is a show dedicated to the world of "A Song of Ice and Fire" by George R.R. Martin. Join Dan, Bill and Alex on our Game of Thrones hype train rewatch marathon leading up to HBO's EPIC SERIES FINALE in Season 8 as well as all breaking news on the remaining books in the series and television spinoff's that follow.
…
continue reading
Welcome to Eye Tea. Fill your cup with the latest in ophthalmology and vision science. Engage with world-renowned experts and future ophthalmology leaders in a candid roundtable discussion as they discuss current innovations, future directions, and their life stories.
…
continue reading
Two Southern College-educated Men discussing multiple topics such as personal experiences, music, anime, comics, maybe sports, and politics. Stop by and give us a listen. Why not open yourself up to new ways of looking at the world and media.
…
continue reading
GrowCast is one of the world's largest cannabis growing podcasts, where you can hear host Jordan River sit down with some of the most educated and talented people in the cannabis cultivation industry. Tune in to hear world class expert guests take deep dives on niche growing subjects like lighting, nutrients, plant training, organic growing, living soil, grow room automation, and much, much more. So pop on GrowCast to learn while you work in your garden- you've just discovered your number on ...
…
continue reading
Between Rounds Radio is the only mixed martial arts radio/podcasting network in the world today. Headed by former Sherdog Radio Network program director TJ De Santis Between Rounds Radio is your home for exclusive pre and post-fight coverage as well as programs hosted by popular personalities. For exclusive content not available here check us out on Patreon. Patreon.com/betweenrounds
…
continue reading
You'll meet creatures who rise from the dead, and blood of ghastly horror; and watch inhuman ape creatures carry off pretty young women. Are you really ready for it? Sit tight for the spine tinglers coming your way. Broadcasting live every Saturday at 2:30pm EST on Odysee Odysee: https://odysee.com/@cave_time Twitter: https://twitter.com/cave_time wherever you listen to podcasts: search "The Cave of Time"
…
continue reading
The idea, insight, or secret you need for massive impact is just moments away. It’s time to Claim Your Career Crown. The podcast where Business owners and entrepreneurs share the keys to the kingdom to help you open the vault to your greater success. Your host, Lynn Whitbeck, is the Queen of Sales. Business owners and entrepreneurs hire Lynn to ignite winning sales, because most are chasing down leads, lack client retention, conversion, and profit. Also, if you want to get more sales strateg ...
…
continue reading
Candid interviews with successful Self-starters. On Build It. They'll Come, you'll hear from some amazing Australian entrepreneurs who bet big to build great businesses. Journalist Helen Dalley interviews business innovators and visionaries on how they turned their lightbulb idea into a viable, sustainable enterprise. This podcast is about the human face behind taking a simple idea and turning it into a business or movement. It's the beating heart behind what it takes to build an empire, fro ...
…
continue reading
1
HR Stories Podcast - A Lesson in Every Story!
John Thalheimer, MS and Chuck Simikian, SPHR, SHRM-SCP
Welcome to the HR Stories Podcast - where there is a lesson in every story. Our Storytellers - John Thalheimer and Chuck Simikian, the Team behind HR Stories, share real-life tales about where a business made a preventable mistake. At The HR Stories Podcast, the STORIES are the teaching tool! LISTEN to the stories of those that did not heed the warning signs. LEARN from their mistakes. ACT on best practices shared by our hosts and guests. Each year, our hosts Chuck Simikian and John Thalheim ...
…
continue reading
1
Baltimore, GPS Jammed, US bans, ARM, YouTube, Kraken and Joshua Marpet - SWN #394
30:16
30:16
Play later
Play later
Lists
Like
Liked
30:16
Baltimore, GPS Jammed, US bans, ARM, YouTube, Kraken and Joshua Marpet, and More, on this edition of the Security Weekly News. Show Notes: https://securityweekly.com/swn-394
…
continue reading
1
Baltimore, GPS Jammed, US bans, ARM, YouTube, Kraken and Joshua Marpet - SWN #394
30:07
30:07
Play later
Play later
Lists
Like
Liked
30:07
Baltimore, GPS Jammed, US bans, ARM, YouTube, Kraken and Joshua Marpet, and More, on this edition of the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-394
…
continue reading
1
OAuth 2.0 from Protecting APIs to Supporting Authorization & Authentication - Aaron Parecki - ASW #289
37:01
37:01
Play later
Play later
Lists
Like
Liked
37:01
OAuth 2.0 is more than just a single spec and it's used to protect more than just APIs. We talk about challenges in maintaining a spec over a decade of changing technologies and new threat models. Not only can OAuth be challenging to secure by default, but it's not even always inter-operable. Segment Resources: https://oauth.net/2.1 https://oauth.n…
…
continue reading
1
OAuth 2.0 from Protecting APIs to Supporting Authorization & Authentication - Aaron Parecki - ASW #289
1:01:09
1:01:09
Play later
Play later
Lists
Like
Liked
1:01:09
OAuth 2.0 is more than just a single spec and it's used to protect more than just APIs. We talk about challenges in maintaining a spec over a decade of changing technologies and new threat models. Not only can OAuth be challenging to secure by default, but it's not even always inter-operable. Segment Resources: https://oauth.net/2.1 https://oauth.n…
…
continue reading
1
OAuth 2.0 from Protecting APIs to Supporting Authorization & Authentication - Aaron Parecki - ASW #289
37:01
37:01
Play later
Play later
Lists
Like
Liked
37:01
OAuth 2.0 is more than just a single spec and it's used to protect more than just APIs. We talk about challenges in maintaining a spec over a decade of changing technologies and new threat models. Not only can OAuth be challenging to secure by default, but it's not even always inter-operable. Segment Resources: https://oauth.net/2.1 https://oauth.n…
…
continue reading
1
Building a Successful API Security Strategy - Luke Babarinde, Bhawna Singh - BSW #354
1:04:51
1:04:51
Play later
Play later
Lists
Like
Liked
1:04:51
With 71% of web traffic coming from API calls last year and the average organization maintaining 613 API endpoints, a robust strategy is needed to protect APIs against automated threats and business logic attacks. Tune in as Luke Babarinde, Global Solution Architect, shares the key steps to building a successful API security strategy. This segment …
…
continue reading
1
Building a Successful API Security Strategy - Luke Babarinde, Bhawna Singh - BSW #354
1:04:51
1:04:51
Play later
Play later
Lists
Like
Liked
1:04:51
With 71% of web traffic coming from API calls last year and the average organization maintaining 613 API endpoints, a robust strategy is needed to protect APIs against automated threats and business logic attacks. Tune in as Luke Babarinde, Global Solution Architect, shares the key steps to building a successful API security strategy. This segment …
…
continue reading
1
Listener Q&A - We Answer Your Questions: Job Descriptions, Balancing Accommodation with Production, and Celebrations
22:29
22:29
Play later
Play later
Lists
Like
Liked
22:29
Send us a Text Message. Welcome to another Listener Q&A with The Team at HR Stories! Today's episode goes into these questions: Do you have a good step-by-step process for creating or gathering job descriptions for all roles in the company? How do you handle an employee who has slower output but claims to have a disability? Do you have any suggesti…
…
continue reading
1
AI at Work 2024: C-suite Perspectives on Artificial Intelligence - Bhawna Singh - BSW #354
32:31
32:31
Play later
Play later
Lists
Like
Liked
32:31
In the age of AI, driving a business forward requires balancing three very significant considerations: growth through innovation, productivity through operational efficiency, and trust through security. To better understand how AI impacts the intersection of security, innovation, and operational efficiency, Okta commissioned an AlphaSights survey o…
…
continue reading
1
AI at Work 2024: C-suite Perspectives on Artificial Intelligence - Bhawna Singh - BSW #354
32:31
32:31
Play later
Play later
Lists
Like
Liked
32:31
In the age of AI, driving a business forward requires balancing three very significant considerations: growth through innovation, productivity through operational efficiency, and trust through security. To better understand how AI impacts the intersection of security, innovation, and operational efficiency, Okta commissioned an AlphaSights survey o…
…
continue reading
1
Building a Successful API Security Strategy - Luke Babarinde - BSW #354
32:41
32:41
Play later
Play later
Lists
Like
Liked
32:41
With 71% of web traffic coming from API calls last year and the average organization maintaining 613 API endpoints, a robust strategy is needed to protect APIs against automated threats and business logic attacks. Tune in as Luke Babarinde, Global Solution Architect, shares the key steps to building a successful API security strategy. This segment …
…
continue reading
1
Building a Successful API Security Strategy - Luke Babarinde - BSW #354
32:41
32:41
Play later
Play later
Lists
Like
Liked
32:41
With 71% of web traffic coming from API calls last year and the average organization maintaining 613 API endpoints, a robust strategy is needed to protect APIs against automated threats and business logic attacks. Tune in as Luke Babarinde, Global Solution Architect, shares the key steps to building a successful API security strategy. This segment …
…
continue reading
1
❔TRUE OR FALSE: IPM Edition, with Matthew Gates
49:05
49:05
Play later
Play later
Lists
Like
Liked
49:05
Matthew Gates is back on the line as we prepare for Pestapalooza Illinois coming July 13+14! (Use code GROWCAST)... Matthew joins us for an interesting episode where he is presented a series of True or False questions when it comes to pest and pest control. Matthew gives his take on using soap as an insecticide, aphids switching from one host to an…
…
continue reading
1
OAuth 2.0 from Protecting APIs to Supporting Authorization & Authentication - Aaron Parecki - ASW #289
1:01:09
1:01:09
Play later
Play later
Lists
Like
Liked
1:01:09
OAuth 2.0 is more than just a single spec and it's used to protect more than just APIs. We talk about challenges in maintaining a spec over a decade of changing technologies and new threat models. Not only can OAuth be challenging to secure by default, but it's not even always inter-operable. Segment Resources: https://oauth.net/2.1 https://oauth.n…
…
continue reading
1
A Breakdown of Red & Infrared Light Therapy
33:46
33:46
Play later
Play later
Lists
Like
Liked
33:46
This week's Addicted to Fitness discusses the beneficial aspects of two different types of light therapy. Nick and Shannon describe the difference between red light and infrared light therapy, which chronic health conditions these two therapies treat, and the efficacy of these therapies. They also provide a review of a red & infrared light therapy …
…
continue reading
By Loose Moose™️ Productions
…
continue reading
1
Access vs Actions, Beyond Traditional IGA, Remote Identity Verification, & Fraud - Tim Prendergast, Damon Tompkins, Andrew Bud, Chris Meyer - ESW Vault
58:32
58:32
Play later
Play later
Lists
Like
Liked
58:32
Traditional approaches to access management are no longer sufficient to safeguard enterprise security. Tim will explain why the most effective approach to modern enterprise security requires a Zero Trust model that extends beyond just access to encompass every action, no matter how minor. Tim will describe the importance of implementing a Zero Trus…
…
continue reading
1
Access vs Actions, Beyond Traditional IGA, Remote Identity Verification, & Fraud - Tim Prendergast, Damon Tompkins, Andrew Bud, Chris Meyer - ESW Vault
58:32
58:32
Play later
Play later
Lists
Like
Liked
58:32
Traditional approaches to access management are no longer sufficient to safeguard enterprise security. Tim will explain why the most effective approach to modern enterprise security requires a Zero Trust model that extends beyond just access to encompass every action, no matter how minor. Tim will describe the importance of implementing a Zero Trus…
…
continue reading
1
Access vs Actions, Beyond Traditional IGA, Remote Identity Verification, & Fraud - Tim Prendergast, Damon Tompkins, Andrew Bud, Chris Meyer - ESW Vault
58:32
58:32
Play later
Play later
Lists
Like
Liked
58:32
Traditional approaches to access management are no longer sufficient to safeguard enterprise security. Tim will explain why the most effective approach to modern enterprise security requires a Zero Trust model that extends beyond just access to encompass every action, no matter how minor. Tim will describe the importance of implementing a Zero Trus…
…
continue reading
1
Access vs Actions, Beyond Traditional IGA, Remote Identity Verification, & Fraud - Tim Prendergast, Damon Tompkins, Andrew Bud, Chris Meyer - ESW Vault
58:32
58:32
Play later
Play later
Lists
Like
Liked
58:32
Traditional approaches to access management are no longer sufficient to safeguard enterprise security. Tim will explain why the most effective approach to modern enterprise security requires a Zero Trust model that extends beyond just access to encompass every action, no matter how minor. Tim will describe the importance of implementing a Zero Trus…
…
continue reading
Check out this interview from the SWN Vault, hand picked by main host Doug White! This Secure Digital Life segment was originally published on June 19, 2018. This week, Doug and Russ interview Matthew Silva, President and Founder of the Cybersecurity and Intel Club at Roger Williams University! They talk about majoring in Cybersecurity vs. Computer…
…
continue reading
Check out this interview from the SWN Vault, hand picked by main host Doug White! This Secure Digital Life segment was originally published on June 19, 2018. This week, Doug and Russ interview Matthew Silva, President and Founder of the Cybersecurity and Intel Club at Roger Williams University! They talk about majoring in Cybersecurity vs. Computer…
…
continue reading
1
iShield Key Experience, Automated (PKI) Infrastructure, & GenAI Identity Attacks - Kevin Fadaie, Roni Bliss, David Mahdi - ESW Vault
44:48
44:48
Play later
Play later
Lists
Like
Liked
44:48
FIDO security keys are not new in the authentication workflow. They have been around now for 10 years. What is new is the combination of the most secure multi-factor authentication method not only for logical but also for physical access control with the highest FIPS140-3 security certification in the market. Segment Resources: Video "Swissbit iShi…
…
continue reading
1
iShield Key Experience, Automated (PKI) Infrastructure, & GenAI Identity Attacks - Kevin Fadaie, Roni Bliss, David Mahdi - ESW Vault
44:48
44:48
Play later
Play later
Lists
Like
Liked
44:48
FIDO security keys are not new in the authentication workflow. They have been around now for 10 years. What is new is the combination of the most secure multi-factor authentication method not only for logical but also for physical access control with the highest FIPS140-3 security certification in the market. Segment Resources: Video "Swissbit iShi…
…
continue reading
1
iShield Key Experience, Automated (PKI) Infrastructure, & GenAI Identity Attacks - Kevin Fadaie, Roni Bliss, David Mahdi - ESW Vault
44:48
44:48
Play later
Play later
Lists
Like
Liked
44:48
FIDO security keys are not new in the authentication workflow. They have been around now for 10 years. What is new is the combination of the most secure multi-factor authentication method not only for logical but also for physical access control with the highest FIPS140-3 security certification in the market. Segment Resources: Video "Swissbit iShi…
…
continue reading
1
iShield Key Experience, Automated (PKI) Infrastructure, & GenAI Identity Attacks - Kevin Fadaie, Roni Bliss, David Mahdi - ESW Vault
44:48
44:48
Play later
Play later
Lists
Like
Liked
44:48
FIDO security keys are not new in the authentication workflow. They have been around now for 10 years. What is new is the combination of the most secure multi-factor authentication method not only for logical but also for physical access control with the highest FIPS140-3 security certification in the market. Segment Resources: Video "Swissbit iShi…
…
continue reading
1
Bringing Autonomy to AppSec - Dr. David Brumley - ESW Vault
32:22
32:22
Play later
Play later
Lists
Like
Liked
32:22
Log4j, solar winds, tesla hacks, and the wave of high profile appsec problems aren’t going to go away with current approaches like SAST and SCA. Why? They are: -40 years old, with little innovation -Haven’t solved the problem. In this segment, we talk about fully autonomous application security. Vetted by DARPA in the Cyber Grand Challenge, the app…
…
continue reading
1
Bringing Autonomy to AppSec - Dr. David Brumley - ESW Vault
32:22
32:22
Play later
Play later
Lists
Like
Liked
32:22
Log4j, solar winds, tesla hacks, and the wave of high profile appsec problems aren’t going to go away with current approaches like SAST and SCA. Why? They are: -40 years old, with little innovation -Haven’t solved the problem. In this segment, we talk about fully autonomous application security. Vetted by DARPA in the Cyber Grand Challenge, the app…
…
continue reading