show episodes
 
Artwork

1
The Fantasticast

Stephen Lacey & Andrew Leyland

Unsubscribe
Unsubscribe
En gång i månaden
 
Stephen Lacey and Andrew Leyland are your guide to Marvel's First Family, The Fantastic Four. Starting at the very beginning of the Marvel Age of Comics, they cover every issue of The Fantastic Four, every spinoff title (Strange Tales, Marvel Two-In-One, FF, and more), every guest appearance and every cameo, all in order of publication.
  continue reading
 
After 33 years behind the Newstalk ZB microphone, Leighton can’t give it up completely. There were so many requests to continue his opinionated commentary that the prospect of podcasting was born. So, without restriction, Leighton continues to serve up on everything you want to hear about and some things you don’t. Stand by to be enlightened, educated and enraged!
  continue reading
 
Artwork

1
Navigating the Customer Experience

Yanique Grant, Customer Experience Strategist, Entrepreneur

Unsubscribe
Unsubscribe
En gång i månaden+
 
Join host Yanique Grant as she takes you on a journey with global entrepreneurs and subject matter experts that can help you to navigate your customer experience. Learn what customers really want and how businesses can understand the psychology of each customer or business that they engage with. We will be looking at technology, leadership, customer service charters and strategies, training and development, complaint management, service recovery and so much more!
  continue reading
 
Welcome to the Security Weekly Podcast Network, your all-in-one source for the latest in cybersecurity! This feed features a diverse lineup of shows, including Application Security Weekly, Business Security Weekly, Paul's Security Weekly, Enterprise Security Weekly, and Security Weekly News. Whether you're a cybersecurity professional, business leader, or tech enthusiast, we cover all angles of the cybersecurity landscape. Tune in for in-depth panel discussions, expert guest interviews, and ...
  continue reading
 
Loading …
show series
 
Cybercab, Golden Jackal, Mamba 2FA, Multi Microsoft, iPhone thieves, esims, Aaran Leyland, and More, on this edition of the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-421
  continue reading
 
For this interview, Ben from CyberNest joins us to talk about one of my favorite subjects: information sharing in infosec. There are so many amazing skills, tips, techniques, and intel that security professionals have to share. Sadly, a natural corporate reluctance to share information viewed as privileged and private has historically had a chillin…
  continue reading
 
"Code of Honor: Embracing Ethics in Cybersecurity" by Ed Skoudis is a book that explores the ethical challenges faced by cybersecurity professionals in today's digital landscape. The book delves into the complex moral dilemmas that arise in the field of cybersecurity, offering guidance on how to navigate these issues while maintaining integrity. Th…
  continue reading
 
This week we have responded to enquiries as to whether Patrick Basham will make a return before the Presidential election He brings some new polling numbers from Democracy Institute, along with his exceptional analysis. We proffer our thoughts on multiculturalism, and share what we have in common with Jeremy Clarkson. And we delve into The Mailroom…
  continue reading
 
Zed Attack Proxy has been a crucial web app testing tool for decades. It's also had a struggle throughout 2024 to obtain funding that would enable the tool to add more features while remaining true to its open source history. Simon Bennetts, founder of ZAP, and Ori Bendet from Checkmarx update us on that journey, share some exploration of LLM fuzzi…
  continue reading
 
Does the CISO need to act like a politician? Negotiating budgets, communicating risks, and selling your strategy across the organization does sound a little like a politician. And if that's the case, are you hiring the right campaign staff? Kush Sharma, former CISO for CPR, City of Toronto, and Saputo, joins Business Security Weekly to discuss why …
  continue reading
 
Send us a text Andrew Carothers is a Senior Customer Experience Leader and a CCXP who has significantly shaped the field of customer experience (CX). His career began in public relations, where he worked both in agencies and in-house. He transitioned into the technology sector at Autodesk and even worked for the Electric Vehicle Association of Amer…
  continue reading
 
Perfctl, Warm Cookie, Pig Butchering, Ivanti, Zimbra, BabyLockerKZ, AI gone Wild, Aaran Leyland, and More, on this edition of the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-419
  continue reading
 
Our latest in a series of interviews discussing cybersecurity career paths, today we talk to Jayson Grace his path into cybersecurity and his experience building red teams at national labs and purple teams at Meta. We also talk about his community impact, giving talks and building open source tools. Jayson just left Meta for an AI safety startup na…
  continue reading
 
Send us a text In this episode of Navigating the Customer Experience, host Yanique Grant interviews Rusty Rueff, a seasoned leader with a diverse career in entertainment, talent management, and philanthropy. Rusty shares insights from his journey, which includes significant roles at PepsiCo and Electronic Arts (EA), where he was instrumental in glo…
  continue reading
 
This episode of Paul Security Weekly features John Hammond, a senior security researcher from Huntress, discussing malware analysis. Hammond dives into the analysis of Ocean Lotus attacks, highlighting the use of stealthy techniques like alternate data streams and DLL side-loading. The conversation also touches on the challenges of combating attack…
  continue reading
 
More remote car control via web interfaces, an RCE in CUPS, Microsoft reduces attack surface, migrating to memory safety, dealing with dependency confusion, getting rid of password strength calculators, and more! Visit https://www.securityweekly.com/asw for all the latest episodes! Show Notes: https://securityweekly.com/asw-301…
  continue reading
 
Two years ago, in podcast 151, we interviewed Ashley Rindsberg on “The Gray Lady Winked”, his book critiquing the New York Times. At the time he was domiciled in Israel. The interview was peppered with the occasional sound of rockets. With the recent outbreak of conflict, talking with Rindsberg again was an obvious decision. We visit a very good Ma…
  continue reading
 
The zero-trust security model has been billed as an ultra-safe defense against emerging, unrecognized and well-known threats. Unlike perimeter security, it doesn't assume people inside an organization are automatically safe. Instead, it requires every user and device -- inside and out -- to be authorized before any access is granted. Sounds enticin…
  continue reading
 
Passwords, CUPS, KIA, Gilbert Gottfried, Salt Typhoon, Rob Allen from ThreatLocker, and More on the Security Weekly News. Segment Resources: https://www.bleepingcomputer.com/news/security/hackers-deploy-ai-written-malware-in-targeted-attacks/ This segment is sponsored by ThreatLocker. Visit https://securityweekly.com/threatlocker to learn more abou…
  continue reading
 
The SIEM market has undergone some significant changes this summer. This is a great opportunity to talk about the current state of SIEM! In this conversation, we'll discuss: market changes and terminology: security analytics, data lakes, SIEM what is SOAR's role in the current SIEM market? machine learning and generative AI's role strategies for im…
  continue reading
 
This week in the security news, Dr. Doug and Larry explore various technological advancements and their implications with a healthy dose of nostalgia, particularly focusing on health monitoring through Wi-Fi signals, the misconceptions surrounding 5G connectivity, the importance of understanding internet speed needs, and the cybersecurity threats f…
  continue reading
 
Send us a text Marybeth Alexander has been the Knowledge Goddess and Chief Executive Owl at KnowledgeOwl since she co-founded the company with Pete in 2015. As KnowledgeOwl’s CEO, she's responsible for embodying KnowledgeOwl's mission and values, which include using business as a force for good, cultivating a people-first company, giving excellent …
  continue reading
 
Dr Paul Marik belongs to a group of physicians who have devoted their lives to their patients survival, and effectively been punished for it. How can a man with a reputation as the “most published and influential clinician and researcher in critical care medicine in the United States" be forced from his career? And we introduce a simple but useful …
  continue reading
 
APIs are essential to modern application architectures, driving rapid development, seamless integration, and improved user experiences. However, their widespread use has made them prime targets for attackers, especially those deploying sophisticated bots. When these bots exploit business logic, they can cause considerable financial and reputational…
  continue reading
 
In the leadership and communications segment, CISA Releases Cyber Defense Alignment Plan for Federal Agencies, UnitedHealth Group CISO: We had to ‘start over’ after Change Healthcare attack, 20 Essential Strategies for Leadership Development Success, and more! AI is bringing productivity gains like we’ve never seen before -- with users, security te…
  continue reading
 
A month ago, my friend Wolfgang Goerlich posted a hot take on LinkedIn that is less and less of a hot take these days. He posted, "our industry needs to kill the phish test",and I knew we needed to have a chat, ideally captured here on the podcast. I've been on the fence when it comes to phishing simulation, partly because I used to phish people as…
  continue reading
 
Apple drops a lawsuit to avoid exposing secrets, what does it mean for the security industry if MS locks down the kernel?, exploding pagers, more things from the past: Adobe Flash exploits, robots get rid of your data, PKFail is still a thing, Android TV malware is back: now with conspiracy theories, DMA attacks, gamers are not nation-state attacke…
  continue reading
 
Kamala Harris, the Democrat contender for the U.S. presidency was the most socialist member of the Senate. Further left than Bernie Sanders, she has more recently been tagged a Marxist. But is she? In fact, what is she? That is the most asked question amongst undecided voters. For answers, who better to consult than a Professor of Marxism. Michael …
  continue reading
 
When a conference positioned as a day of security for developers has to be canceled due to lack of interest from developers, it's important to understand why there was so little interest and why appsec should reconsider its approach to awareness. Dustin Lehr discusses how appsec can better engage and better deliver security concepts in a way that m…
  continue reading
 
Cybersecurity is complex. We have threats, vulnerabilities, incidents, controls, risks, etc. But how do they all connect together to drive a cyber risk program? As an industry, we've struggled for 20+ years trying to boil this ocean. Maybe we've been going about it the wrong way. Padraic O'Reilly, Founder and Chief Innovation Officer at CyberSaint,…
  continue reading
 
Send us a text Bob Carrothers has 29 years of experience, he facilitates peer-to-peer boards of CEOs and executives, creating environments conducive to skill enhancement, informed decision-making and superior results. Bob is certified as an Emergenetics advisor and Predictive Index practitioner, equipping him with a profound understanding of human …
  continue reading
 
This week, in the enterprise security news, Cribl, Zafran, and US states raise funding Cisco, Check Point, Salesforce, and Absolute Software acquire cybersecurity startups AI Security products are picking up steam You probably shouldn’t be too worried about Yubikey cloning Instead, you should be more worried about malicious npm packages! The White …
  continue reading
 
Lee comes on the show to discuss: EU CRA - https://en.wikipedia.org/wiki/CyberResilienceAct - its impact on bringing products to market and the challenges of enforcing such laws that require products to be "Secure" Recent legislation on disputes for federal agency fines - Chevron deference rule - supreme court decision, uncertainty, more or less cl…
  continue reading
 
Send us a text Barbara Wardell and Ernesto Cullari run an agency that focuses on geofencing. This embraces a growth hacker mindset that strategically focuses on identifying and amplifying their clients’ strengths while pinpointing weaknesses in the competition, utilizing GPS location data. This approach results in a significant and measurable impac…
  continue reading
 
The Sir John Graham Lecture 2024 guest speaker was Professor Nicholas Aroney, from the University of Queensland. The speech was entitled “The Compass of Character”. It explored law, education and religion, and their roles in the formation of character. In a most interesting conversation we covered the talk and, amongst other things, the threat on d…
  continue reading
 
Cybersecurity resilience, different from cyber resilience, is critical as threats grow in frequency and complexity. With digital innovation driving business, cybersecurity resilience is essential for maintaining stakeholder trust and compliance. But where do you start? Theresa Lanowitz, Chief Evangelist at LevelBlue, joins Business Security Weekly …
  continue reading
 
Check out this episode from the ESW Vault, hand picked by main host Adrian Sanabria! This episode was initially published on April 21 2023. Quantum computers are scaling rapidly. Soon, they will be powerful enough to solve previously unsolvable problems. But they come with a global challenge: fully-realized quantum computers will be able to break s…
  continue reading
 
Exploring the Hacking Landscape with Mark Loveless, AKA SimpleNomad Dive into the intricate world of cybersecurity with our featured guest, Mark Loveless, widely known by his handle SimpleNomad. With a rich history in the realm of information security, Mark is a seasoned professional, researcher, and thought leader. Mark's journey spans decades, ma…
  continue reading
 
New Zealand men and women are being encouraged to pay attention to the court decision in the case of “Tickle v Giggle”. Why be interested in a comedic sounding Australian judge's decision? Well, the ruling has been labelled “dystopian" and "distorting key concepts of sex and discrimination, while dodging Australia’s human rights obligations vis a v…
  continue reading
 
Send us a text Alan Versteeg, an engineer turned sales management expert, initially approached the sales world with skepticism, but soon turned it into a thriving career by applying the engineering principles of cause and effect to sales and sales management. This success led him to co-founding Growth Matters, where Alan and his team have developed…
  continue reading
 
Check out this episode from the BSW Vault, hand picked by main host Matt Alderman! This episode was initially published on November 29, 2022. Todd Fitzgerald, author of CISO Compass and host of CISO Stories, joins BSW to share his top leadership lessons from the first 100 episodes of CISO Stories. Todd interviews CISOs and gains insights into their…
  continue reading
 
Check out this interview from the ASW Vault, hand picked by main host Mike Shema! This segment was originally published on May 9, 2023. What does software resilience mean? Why is status quo application security unfit for the modern era of software? How can we move from security theater to security chaos engineering? This segment answers these quest…
  continue reading
 
Larry and Helen walk us through the AI supply chain landscape. Learn what goes into building and using AI models and the dangers that could lurk within. Segment Resources: Community efforts on AIBOM topic: https://github.com/aibom-squad This week: I want all the firmware, its not just TP-Link, CVEs for malware, BLE and your health, faking your own …
  continue reading
 
Loading …

Snabbguide