Come along with us as we talk gaming news, culture, and interview developers and artists to peek behind the curtains of game development!
…
continue reading
Sundays 8:30am, 10am, and 11:30am @ 2520 Holland Rd, Va Beach, VA 23453. We are People Helping People, Find & Follow Jesus. Website: http://www.forefront.org Twitter: http://twitter.com/Forefront757 Facebook: http://www.facebook.com/Forefront757
…
continue reading
Sean Kantrowitz connects with hip hop's biggest fans – rappers, DJs, producers, writers, comedians, actors, and everything in between – to test their rap trivia skills, discuss their careers, dissect albums, and talk about how the music changed their lives.
…
continue reading
Clive Anderson and guests with an eclectic mix of conversation, music and comedy
…
continue reading
About bridging the gap between security initiatives and business objectives. Hosted by Matt Alderman, co-hosted by Jason Albuquerque, Ben Carr.
…
continue reading
About bridging the gap between security initiatives and business objectives. Hosted by Matt Alderman, co-hosted by Jason Albuquerque, Ben Carr.
…
continue reading
If your business Is on a mission to provide authentic value and achieve a positive impact, society doesn't just need you to think about sales and marketing. It needs you to be great at them. Don't let companies that lack integrity continue to dominate the conversation. Selling with Love Podcast is designed to shift your way of thinking about sales, unlocking your ability to further your mission without hesitation and with- out compromise. Achieve results and do it your way. Join Jason Marc C ...
…
continue reading
1
The 19th Hole: PGA Analysis, Local Golf Pro Interviews, and New England Golf Course Reviews
Williams Broadcasting | PGA | New England Golf
“The 19th Hole” a one hour show all about Golf form local courses all over New England to the PGA to the Majors with interviews of club pro’s and the world’s best golfers (Jordan Spieth, Jason Day etc.) Hosted by John Williams and Mike Goden.
…
continue reading
In today’s world how does a brand break through the noise and become iconic? Well, there’s a complex marketing machine running behind all your favorite brand names that goes deeper than you could imagine. Join Jason Harris, co-founder and CEO of award-winning creative agency, Mekanism, as he speaks with leading experts about how to build an iconic brand. We will pull back the curtain on how culturally relevant brand building and always-on digital work together to make brands famous and drive ...
…
continue reading
Welcome to the ’Fired Up’ Podcast by Ryignite, where passion meets exponential growth. Tune in to hear from business trailblazers who’ve dialed into the 10X mindset to skyrocket their personal and professional lives. From scrappy startups to industry leaders, our guests dish on their game-changing strategies for team-building, scaling, and what’s on the horizon. Ready to get fired up and do something great? Listen now and spark your journey to 10X success.
…
continue reading
For most aspiring online entrepreneurs, “making it” means achieving success in your business. But what exactly is business success anyway? And how do outwardly successful online entrepreneurs define "making it"? Here at Mirasee FM, we wanted to find out, so we asked a group of diverse online business owners what success means to them. Their answers and insights surprised, moved, and inspired us. In this podcast, accomplished online entrepreneurs discuss what making it means to them, provide ...
…
continue reading
Welcome to the Security Weekly Podcast Network, your all-in-one source for the latest in cybersecurity! This feed features a diverse lineup of shows, including Application Security Weekly, Business Security Weekly, Paul's Security Weekly, Enterprise Security Weekly, and Security Weekly News. Whether you're a cybersecurity professional, business leader, or tech enthusiast, we cover all angles of the cybersecurity landscape. Tune in for in-depth panel discussions, expert guest interviews, and ...
…
continue reading
Welcome to the Security Weekly Podcast Network, your all-in-one source for the latest in cybersecurity! This feed features a diverse lineup of shows, including Application Security Weekly, Business Security Weekly, Paul's Security Weekly, Enterprise Security Weekly, and Security Weekly News. Whether you're a cybersecurity professional, business leader, or tech enthusiast, we cover all angles of the cybersecurity landscape. Tune in for in-depth panel discussions, expert guest interviews, and ...
…
continue reading
1
Cyber Security Awareness for Election and Poll Workers - Kirsten Davies - ESW #381
48:02
48:02
Lire Plus Tard
Lire Plus Tard
Des listes
J'aime
Aimé
48:02
The vast majority of the folks working polls and elections are volunteers. This creates a significant training challenge. Not only do they have to learn how to perform a complex and potentially stressful job in a short amount of time (most training is one day or less), cybersecurity-related concerns are usually not included for individual poll loca…
…
continue reading
1
Tourists, Fortis, apps, TLP, AWS, Google, Chatbots, Aaran Leyland, and More... - SWN #425
35:07
35:07
Lire Plus Tard
Lire Plus Tard
Des listes
J'aime
Aimé
35:07
Tourist Abuse, Fortis, apps, TLP, AWS, Google, Chatbots, Aaran Leyland, and More, on this edition of the Security Weekly News. Show Notes: https://securityweekly.com/swn-425
…
continue reading
1
Tourists, Fortis, apps, TLP, AWS, Google, Chatbots, Aaran Leyland, and More... - SWN #425
35:07
35:07
Lire Plus Tard
Lire Plus Tard
Des listes
J'aime
Aimé
35:07
Tourist Abuse, Fortis, apps, TLP, AWS, Google, Chatbots, Aaran Leyland, and More, on this edition of the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-425
…
continue reading
1
Transforming the Defender's Dilemma into the Defender's Advantage - Lenny Zeltser - ESW #381
30:18
30:18
Lire Plus Tard
Lire Plus Tard
Des listes
J'aime
Aimé
30:18
Ever heard someone say, "the attacker only has to be right once, but the defender has to get it right every time"? On this episode, we'll dispel that myth. There is some truth to the saying, but only with regards to initial access to the target's environment. Once on the inside, the attacker's advantage flips to the defender. Call it the 'Home Alon…
…
continue reading
1
Transforming the Defender's Dilemma into the Defender's Advantage - Charlotte Wylie, Bhawna Singh, Lenny Zeltser - ESW #381
1:50:15
1:50:15
Lire Plus Tard
Lire Plus Tard
Des listes
J'aime
Aimé
1:50:15
Ever heard someone say, "the attacker only has to be right once, but the defender has to get it right every time"? On this episode, we'll dispel that myth. There is some truth to the saying, but only with regards to initial access to the target's environment. Once on the inside, the attacker's advantage flips to the defender. Call it the 'Home Alon…
…
continue reading
1
Not The Vulnerabilities You're Looking For - PSW #848
2:06:29
2:06:29
Lire Plus Tard
Lire Plus Tard
Des listes
J'aime
Aimé
2:06:29
This week: The USB Army Knife that won't break the budget, I don't want to say EDR is useless (but there I said it), Paul's list of excellent hacking tips, FortiJump - an RCE that took a while to become public, do malware care if it's on a hypervisor?, MicroPython for fun and not for hacking?, an unspecified vulnerability, can you exploit speculati…
…
continue reading
1
Secure By Default - How do we get there? - Andy Syrewicze - PSW #848
3:06:32
3:06:32
Lire Plus Tard
Lire Plus Tard
Des listes
J'aime
Aimé
3:06:32
Andy drops some Microsoft Windows and 365 knowledge as we discuss the details on how we get to secure by default in our Windows and cloud environments. This week: The USB Army Knife that won't break the budget, I don't want to say EDR is useless (but there I said it), Paul's list of excellent hacking tips, FortiJump - an RCE that took a while to be…
…
continue reading
1
Secure By Default - How do we get there? - Andy Syrewicze - PSW #848
1:00:12
1:00:12
Lire Plus Tard
Lire Plus Tard
Des listes
J'aime
Aimé
1:00:12
Andy drops some Microsoft Windows and 365 knowledge as we discuss the details on how we get to secure by default in our Windows and cloud environments. Show Notes: https://securityweekly.com/psw-848
…
continue reading
1
The 19th Hole 10-22-24 with Shaun John
1:04:01
1:04:01
Lire Plus Tard
Lire Plus Tard
Des listes
J'aime
Aimé
1:04:01
Join John and Shaun at "The 19th Hole" for this weeks golf update!Par Wendy Williams
…
continue reading
1
JSON Parsing, Email Parsing, CISA's Bad Practices Guide, Abusing Disclosure Policies - ASW #304
38:34
38:34
Lire Plus Tard
Lire Plus Tard
Des listes
J'aime
Aimé
38:34
Flaws that arise from inconsistent parsing of JSON and email addresses, CISA's guide to bad software practices, abusing a security disclosure process to take over a WordPress plugin, and more! Show Notes: https://securityweekly.com/asw-304
…
continue reading
1
CEO Accountability as CISOs Concerned Over Demands and Measured by Profit/Cost - BSW #369
29:09
29:09
Lire Plus Tard
Lire Plus Tard
Des listes
J'aime
Aimé
29:09
In the leadership and communications section, Joe Sullivan: CEOs must be held accountable for security too, More tech chiefs have success measured by profitability, cost management, Is Your Career Heading in the Right Direction?, and more. Show Notes: https://securityweekly.com/bsw-369
…
continue reading
1
CEO Accountability as CISOs Concerned Over Demands and Measured by Profit/Cost - BSW #369
29:09
29:09
Lire Plus Tard
Lire Plus Tard
Des listes
J'aime
Aimé
29:09
In the leadership and communications section, Joe Sullivan: CEOs must be held accountable for security too, More tech chiefs have success measured by profitability, cost management, Is Your Career Heading in the Right Direction?, and more. Show Notes: https://securityweekly.com/bsw-369
…
continue reading
1
Doom Brain, E2EE, OT, Adload, Cisco, VMware, internet archive, Josh Marpet ... - SWN #424
29:57
29:57
Lire Plus Tard
Lire Plus Tard
Des listes
J'aime
Aimé
29:57
Doom on a Human Brain, E2EE, OT, Adload, Cisco, VMware, Internet Archive, Josh Marpet, and more on the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-424
…
continue reading
1
Doom Brain, E2EE, OT, Adload, Cisco, VMware, internet archive, Josh Marpet ... - SWN #424
30:01
30:01
Lire Plus Tard
Lire Plus Tard
Des listes
J'aime
Aimé
30:01
Doom on a Human Brain, E2EE, OT, Adload, Cisco, VMware, Internet Archive, Josh Marpet, and more on the Security Weekly News. Show Notes: https://securityweekly.com/swn-424
…
continue reading
1
The Complexities, Configurations, and Challenges in Cloud Security - Scott Piper - ASW #304
38:53
38:53
Lire Plus Tard
Lire Plus Tard
Des listes
J'aime
Aimé
38:53
Building cloud native apps doesn't mean you're immune to dealing with legacy systems. Cloud services have changed significantly over the last decade, both in the security controls available to them and the sheer volume of services that CSPs provide. Scott Piper shares some history of cloud security, the benefits of account separation, and how ratch…
…
continue reading
1
Aligning Tech Execs on Cyber Resilience - Theresa Lanowitz - BSW #369
32:29
32:29
Lire Plus Tard
Lire Plus Tard
Des listes
J'aime
Aimé
32:29
Getting C-Suite execs aligned on cyber resilience and cybersecurity can be a challenge. LevelBlue's recent Futures™️ report sought to uncover the barriers that prevent companies from achieving cyber resilience in the enterprise today. The report not only surveyed C-Suite execs (CIOs, CTOs, and CISOs), but non-C-Suite leaders from engineering and ar…
…
continue reading
1
Aligning Tech Execs on Cyber Resilience - Theresa Lanowitz - BSW #369
1:01:21
1:01:21
Lire Plus Tard
Lire Plus Tard
Des listes
J'aime
Aimé
1:01:21
Getting C-Suite execs aligned on cyber resilience and cybersecurity can be a challenge. LevelBlue's recent Futures™️ report sought to uncover the barriers that prevent companies from achieving cyber resilience in the enterprise today. The report not only surveyed C-Suite execs (CIOs, CTOs, and CISOs), but non-C-Suite leaders from engineering and ar…
…
continue reading
1
Aligning Tech Execs on Cyber Resilience - Theresa Lanowitz - BSW #369
32:29
32:29
Lire Plus Tard
Lire Plus Tard
Des listes
J'aime
Aimé
32:29
Getting C-Suite execs aligned on cyber resilience and cybersecurity can be a challenge. LevelBlue's recent Futures™️ report sought to uncover the barriers that prevent companies from achieving cyber resilience in the enterprise today. The report not only surveyed C-Suite execs (CIOs, CTOs, and CISOs), but non-C-Suite leaders from engineering and ar…
…
continue reading
1
Aligning Tech Execs on Cyber Resilience - Theresa Lanowitz - BSW #369
1:01:21
1:01:21
Lire Plus Tard
Lire Plus Tard
Des listes
J'aime
Aimé
1:01:21
Getting C-Suite execs aligned on cyber resilience and cybersecurity can be a challenge. LevelBlue's recent Futures™️ report sought to uncover the barriers that prevent companies from achieving cyber resilience in the enterprise today. The report not only surveyed C-Suite execs (CIOs, CTOs, and CISOs), but non-C-Suite leaders from engineering and ar…
…
continue reading
1
The Complexities, Configurations, and Challenges in Cloud Security - Scott Piper - ASW #304
1:17:25
1:17:25
Lire Plus Tard
Lire Plus Tard
Des listes
J'aime
Aimé
1:17:25
Building cloud native apps doesn't mean you're immune to dealing with legacy systems. Cloud services have changed significantly over the last decade, both in the security controls available to them and the sheer volume of services that CSPs provide. Scott Piper shares some history of cloud security, the benefits of account separation, and how ratch…
…
continue reading
1
The Power of Love in Sales and Marketing with Danielle Laporte
37:34
37:34
Lire Plus Tard
Lire Plus Tard
Des listes
J'aime
Aimé
37:34
In this episode, Danielle LaPorte shares profound insights on selling and marketing from a place of love, authenticity and service. Discover how to align your business with your spiritual values, radiate positivity, and serve customers without stress. Learn the power of speaking from the heart, being transparent, and letting your soul shine through…
…
continue reading
1
#80: Walmart US SVP and CMO William White | The Soul & Science of Retail Marketing
36:45
36:45
Lire Plus Tard
Lire Plus Tard
Des listes
J'aime
Aimé
36:45
Building a lasting brand is all about balancing long-term strategy with short-term wins. In this episode of the Soul & Science Podcast, Jason sits down with William White, SVP and CMO at Walmart, to talk about the secret sauce marketers can use to drive both ongoing engagement and immediate business results. With a career spanning several major bra…
…
continue reading
1
Bill Bailey, Kiri Pritchard-McLean, Amanda Owen, Katherine Priddy & Richard Walters, Maya Sondhi, Stuart Maconie
34:40
34:40
Lire Plus Tard
Lire Plus Tard
Des listes
J'aime
Aimé
34:40
Stuart is joined in the Loose Ends Salford Studio by comedian, musican, actor and Strictly winner Bill Bailey. His new book is 'My Animals, and Other Animals: A memoir of sorts'. It's the story of his life through the creatures who have meant something to him, and a celebration of how animals bring us joy. The Yorkshire Shepherdess, Amanda Owen, ta…
…
continue reading
1
Alternative CISO career paths, budget planning, and one easy trick to bypass EDR! - ESW #380
46:24
46:24
Lire Plus Tard
Lire Plus Tard
Des listes
J'aime
Aimé
46:24
Finally, in the enterprise security news, HUMAN, Relyance AI, and watchTowr raise funding this week Alternative paths to becoming a CISO Vendor booths don’t have to suck (for vendors or conference attendees!) Budget planning guidance for 2025 CISOs might not be that great at predicting their own future needs Use this one easy trick to bypass EDR! A…
…
continue reading
1
Exploring Unified SASE as a Service - Renuka Nadkarni - ESW #380
30:27
30:27
Lire Plus Tard
Lire Plus Tard
Des listes
J'aime
Aimé
30:27
Implementing SASE can be tricky and onerous, but it doesn't have to be. Today, we discuss Unified SASE as a Service with Renuka Nadkarni, Chief Product Officer at Aryaka. Particularly, how can Unified SASE make both networking and security more flexible and agile? IT and security professionals need to ensure secure and performant applications and d…
…
continue reading
1
Stealing, Kubernetes, Passkeys, SolarWinds, Intel, Sextortion, and... - SWN #423
33:21
33:21
Lire Plus Tard
Lire Plus Tard
Des listes
J'aime
Aimé
33:21
Stealing Pencils, Kubernetes, Passkeys, SolarWinds, Intel, North Koreans, Sextortion, and More, on this edition of the Security Weekly News. Show Notes: https://securityweekly.com/swn-423
…
continue reading
1
Stealing, Kubernetes, Passkeys, SolarWinds, Intel, Sextortion, and... - SWN #423
33:22
33:22
Lire Plus Tard
Lire Plus Tard
Des listes
J'aime
Aimé
33:22
Stealing Pencils, Kubernetes, Passkeys, SolarWinds, Intel, North Koreans, Sextortion, and More, on this edition of the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-423
…
continue reading
1
Cybersecurity Success is Business Success - Theresa Lanowitz - ESW #380
29:53
29:53
Lire Plus Tard
Lire Plus Tard
Des listes
J'aime
Aimé
29:53
Secure by design is more than just AppSec - it addresses how the whole business designs systems and processes to be effective and resilient. The latest report from LevelBlue on Cyber Resilience reveals security programs that are reactive, ill-equipped, and disconnected from IT and business leaders. Most security problems are out of security teams' …
…
continue reading
1
Cybersecurity Success is Business Success - Renuka Nadkarni, Theresa Lanowitz - ESW #380
1:46:37
1:46:37
Lire Plus Tard
Lire Plus Tard
Des listes
J'aime
Aimé
1:46:37
Secure by design is more than just AppSec - it addresses how the whole business designs systems and processes to be effective and resilient. The latest report from LevelBlue on Cyber Resilience reveals security programs that are reactive, ill-equipped, and disconnected from IT and business leaders. Most security problems are out of security teams' …
…
continue reading
1
Transforming Pain into Purpose — An Inspiring Path (Ali Shapiro)
14:51
14:51
Lire Plus Tard
Lire Plus Tard
Des listes
J'aime
Aimé
14:51
Sharing her journey in health coaching, Ali Shapiro reflects on pioneering a babysitting camp and rethinking health and entrepreneurship. She weaves together themes of personal growth, resilience, and redefining success — with insights for entrepreneurs on listening to your business’s needs. Making It! explores the lives and stories of entrepreneur…
…
continue reading
1
Everything is Overrated - PSW #847
2:01:59
2:01:59
Lire Plus Tard
Lire Plus Tard
Des listes
J'aime
Aimé
2:01:59
Air gaps are still not air gapped, making old exploits new again, chaining exploits for full compromise, patching is overrated, SBOMs are overrated, VPNs are overrated, getting root with a cigarette lighter, you can be any user you want to be, in-memory Linux malware, the Internet Archive is back, we still don't know who created Bitcoin, unhackable…
…
continue reading
1
Effective Operational Outcomes - Ken Dunham - PSW #847
2:58:09
2:58:09
Lire Plus Tard
Lire Plus Tard
Des listes
J'aime
Aimé
2:58:09
New security and vulnerability research is published every day. How can security teams get ahead of the curve and build architecture to combat modern threats and threat actors? Tune-in to a lively discussion about the threat landscape and tips on how to stay ahead of the curve. Segment Resources: https://blog.qualys.com/vulnerabilities-threat-resea…
…
continue reading
1
Effective Operational Outcomes - Ken Dunham - PSW #847
56:27
56:27
Lire Plus Tard
Lire Plus Tard
Des listes
J'aime
Aimé
56:27
New security and vulnerability research is published every day. How can security teams get ahead of the curve and build architecture to combat modern threats and threat actors? Tune-in to a lively discussion about the threat landscape and tips on how to stay ahead of the curve. Segment Resources: https://blog.qualys.com/vulnerabilities-threat-resea…
…
continue reading