show episodes
 
Artwork

1
Live Greatly

Kristel Bauer

Unsubscribe
Unsubscribe
Varje vecka+
 
Are you looking for more happiness, success and vitality in your life? Get inspired each week with Wellness Expert, Integrative Medicine Fellow & Keynote Speaker, Kristel Bauer. Live Greatly shares empowering conversations about life, wellness & success talking with top experts, athletes, celebrities, CEOs and other incredible individuals. Tune in for insights to thrive personally and professionally. It’s time to awaken your ultimate potential! Disclaimer: All of the information shared on th ...
  continue reading
 
Artwork

1
Diversity: Beyond the Checkbox

The Diversity Movement

Unsubscribe
Unsubscribe
En gång i månaden+
 
A weekly podcast delivering diverse insights and perspectives from global leaders in business, executive education and diversity & inclusion. Hosted by award-winning content creator, author, speaker, certified diversity executive and cofounder of The Diversity Movement, Jackie Ferguson. This show is proud to be a part of the Living Corporate network.
  continue reading
 
Artwork

1
Scream Dreams

Scream Dreams

Unsubscribe
Unsubscribe
En gång i månaden+
 
Venture into the shadows with Catherine Corcoran, James A. Janisse, Barbara Crampton and their guests as they dive into the real nightmares of the best minds in genre! Support this podcast: https://podcasters.spotify.com/pod/show/screamdreams/support
  continue reading
 
Artwork

1
And The Writer Is...with Ross Golan

Big Deal Music // Mega House Music

Unsubscribe
Unsubscribe
En gång i månaden
 
Every week, we sit down with an acclaimed and venerable songwriter to intimately discuss what happens behind closed doors in the music industry. There are millions of singers, thousands of artists, and only 40 top songs per genre at a time... this podcast is about the people who make them. Produced by Joe London & Ross Golan in association with Big Deal Music & Mega House Music. And The Writer Is... ™ Hosted on Acast. See acast.com/privacy for more information.
  continue reading
 
Artwork

1
PA BOOKS on PCN

PCN - Pennsylvania Cable Network

Unsubscribe
Unsubscribe
En gång i månaden
 
PA Books features authors of books about Pennsylvania-related topics. These hour-long conversations allow authors to discuss both their subject matter and inspiration behind the books.
  continue reading
 
Loading …
show series
 
Exploring the Hardware Hacking Realm with Joe Grand, AKA Kingpin Joe Grand, also known by his hacker pseudonym "Kingpin," stands as a prominent figure in the cybersecurity landscape. With an extensive background in hardware hacking, reverse engineering, and embedded systems, Joe has carved a niche for himself as a respected authority in the field. …
  continue reading
 
Exploring the Hardware Hacking Realm with Joe Grand, AKA Kingpin Joe Grand, also known by his hacker pseudonym "Kingpin," stands as a prominent figure in the cybersecurity landscape. With an extensive background in hardware hacking, reverse engineering, and embedded systems, Joe has carved a niche for himself as a respected authority in the field. …
  continue reading
 
Gathering a treasure trove of powerful, rare, and haunting original documents, New York Times bestselling author and award-winning historian Allen C. Guelzo presents a uniquely readable and intimate oral history of the Civil War's turning point. We hear from a Union staff officer, a Confederate amputee, artilleryman, a sympathetic Northern woman, a…
  continue reading
 
Check out this interview from the SWN Vault, hand picked by main host Doug White! This Secure Digital Life segment was originally published on March 6, 2017. Have you ever wondered what phishing is? Do you know what spear phishing attacks are? Doug and Russ explain how to protect yourself from phishing scams in the inaugural episode of Secure Digit…
  continue reading
 
Check out this interview from the SWN Vault, hand picked by main host Doug White! This Secure Digital Life segment was originally published on March 6, 2017. Have you ever wondered what phishing is? Do you know what spear phishing attacks are? Doug and Russ explain how to protect yourself from phishing scams in the inaugural episode of Secure Digit…
  continue reading
 
On this Live Greatly podcast episode, Kristel Bauer sits down with the founder of Brilliant Balance, Cherylanne Skolnicki to discuss what it means to really have it all. Cheryanne left a corporate career as a marketing executive to enter into entrepreneurship, becoming an advisor and coach to ambitious women. Kristel and Cherylanne with discuss way…
  continue reading
 
Check out this interview from the BSW Vault, hand picked by main host Matt Alderman! This segment was originally published on October 11, 2022. As 2023 approaches, security leaders are hard at work preparing their budgets, identifying their projects, and setting their priorities for the next twelve months. At the same time, the growth mode days of …
  continue reading
 
Check out this interview from the BSW Vault, hand picked by main host Matt Alderman! This segment was originally published on October 11, 2022. As 2023 approaches, security leaders are hard at work preparing their budgets, identifying their projects, and setting their priorities for the next twelve months. At the same time, the growth mode days of …
  continue reading
 
We've made a slight tweak to the news format, only focusing on the most interesting funding and acquisition stories. As always, you can go check out Mike Privette's Return on Security newsletter for the full list of funded and acquired companies every week. This week, we discuss two $100M+ rounds, from Huntress and Semperis. We also discuss NetSPI'…
  continue reading
 
For decades, security teams have been focused on preventing and detecting threats, only to find themselves buried so deep in alerts, they can't detect anything at all! We clearly need a different approach, which will be the topic of our conversation today with Marty. We'll be discussing a shift in philosophy and tactics. We'll discuss whether SecOp…
  continue reading
 
Healthcare and malware, MoveIT, Chrome won't trust Entrust, the discovery of Volt Typhoon, & more on this episode of the Security Weekly News! Segment Resources: https://therecord.media/volt-typhoon-targets-underestimated-cisa-says Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-395…
  continue reading
 
We all might be a little worn out on this topic, but there's no escaping it. Executives want to adopt GenAI and it is being embedded into nearly every software product we use in both our professional and personal lives. In this interview, Anurag joins us to discuss how his company evaluated and ultimately integrated AI-based technologies into their…
  continue reading
 
We all might be a little worn out on this topic, but there's no escaping it. Executives want to adopt GenAI and it is being embedded into nearly every software product we use in both our professional and personal lives. In this interview, Anurag joins us to discuss how his company evaluated and ultimately integrated AI-based technologies into their…
  continue reading
 
In this Live Greatly 2 minutes of motivation podcast episode Kristel Bauer shares 3 tips to help you navigate indecision. Tune in now! Key Takeaways From This Episode: 3 Tips to Navigate Indecision Explore Having Kristel Bauer speak at your next event or team meeting. https://www.livegreatly.co/contact About the Host of the Live Greatly podcast, Kr…
  continue reading
 
Zyxl NAS devices are under attack and the exploit is pretty simple, A new UEFI vulnerability with a name that some people don't like, that time you setup a load balancer and forgot about it, I love it when there is a vulnerability in a Wifi driver, Polyfill is filling the Internet with supply chain vulnerabilities, open source doesn't mean more sec…
  continue reading
 
This may be controversial, however, we've been privately discussing how organizations benefit from penetration testing and vulnerability scanning. Do you still need these services as a critical part of your security program? Can't you just patch stuff that is missing patches? Tune in for a lively debate! Zyxl NAS devices are under attack and the ex…
  continue reading
 
This may be controversial, however, we've been privately discussing how organizations benefit from penetration testing and vulnerability scanning. Do you still need these services as a critical part of your security program? Can't you just patch stuff that is missing patches? Tune in for a lively debate! Show Notes: https://securityweekly.com/psw-8…
  continue reading
 
In this episode, we delve into the inspiring journey of Dr. Doris Bullock, Interim Chief Program Officer of Arise Collective. Dr. Bullock shares her personal experience of incarceration and the profound inequities she observed and experienced within the justice system. After serving ten and a half years of a life sentence (with the possiblilty of p…
  continue reading
 
OAuth 2.0 is more than just a single spec and it's used to protect more than just APIs. We talk about challenges in maintaining a spec over a decade of changing technologies and new threat models. Not only can OAuth be challenging to secure by default, but it's not even always inter-operable. Segment Resources: https://oauth.net/2.1 https://oauth.n…
  continue reading
 
With 71% of web traffic coming from API calls last year and the average organization maintaining 613 API endpoints, a robust strategy is needed to protect APIs against automated threats and business logic attacks. Tune in as Luke Babarinde, Global Solution Architect, shares the key steps to building a successful API security strategy. This segment …
  continue reading
 
In this Live Greatly podcast episode corporate wellness and performance expert Kristel Bauer shares insights into successfully navigating change and transitions. Kristel shares personal insights that have helped her while preparing for her move from Illinois to Florida. Tune in now! Key Takeaways From This Episode: Tips to successfully navigate cha…
  continue reading
 
In the age of AI, driving a business forward requires balancing three very significant considerations: growth through innovation, productivity through operational efficiency, and trust through security. To better understand how AI impacts the intersection of security, innovation, and operational efficiency, Okta commissioned an AlphaSights survey o…
  continue reading
 
With 71% of web traffic coming from API calls last year and the average organization maintaining 613 API endpoints, a robust strategy is needed to protect APIs against automated threats and business logic attacks. Tune in as Luke Babarinde, Global Solution Architect, shares the key steps to building a successful API security strategy. This segment …
  continue reading
 
OAuth 2.0 is more than just a single spec and it's used to protect more than just APIs. We talk about challenges in maintaining a spec over a decade of changing technologies and new threat models. Not only can OAuth be challenging to secure by default, but it's not even always inter-operable. Segment Resources: https://oauth.net/2.1 https://oauth.n…
  continue reading
 
Today’s guest is a songwriting hall of fame who has been a fixture in the writing scene for decades. Defining and launching careers one lyric at a time, this writer has crafted anthems for Madonna, Cyndi Lauper, Whitney Houston, Heart, The Bangles, Pretenders, Linda Ronstadt, Jojo, Demi Lovato, and many more. As much as these songs launched these a…
  continue reading
 
Traditional approaches to access management are no longer sufficient to safeguard enterprise security. Tim will explain why the most effective approach to modern enterprise security requires a Zero Trust model that extends beyond just access to encompass every action, no matter how minor. Tim will describe the importance of implementing a Zero Trus…
  continue reading
 
Traditional approaches to access management are no longer sufficient to safeguard enterprise security. Tim will explain why the most effective approach to modern enterprise security requires a Zero Trust model that extends beyond just access to encompass every action, no matter how minor. Tim will describe the importance of implementing a Zero Trus…
  continue reading
 
Check out this interview from the SWN Vault, hand picked by main host Doug White! This Secure Digital Life segment was originally published on June 19, 2018. This week, Doug and Russ interview Matthew Silva, President and Founder of the Cybersecurity and Intel Club at Roger Williams University! They talk about majoring in Cybersecurity vs. Computer…
  continue reading
 
Check out this interview from the SWN Vault, hand picked by main host Doug White! This Secure Digital Life segment was originally published on June 19, 2018. This week, Doug and Russ interview Matthew Silva, President and Founder of the Cybersecurity and Intel Club at Roger Williams University! They talk about majoring in Cybersecurity vs. Computer…
  continue reading
 
In this Live Greatly 2 minutes of motivation podcast episode Kristel Bauer shares 5 things that can help build resilience. Tune in now! Key Takeaways From This Episode: 5 Tips to Build Resilience Explore Having Kristel Bauer speak at your next event or team meeting. https://www.livegreatly.co/contact About the Host of the Live Greatly podcast, Kris…
  continue reading
 
FIDO security keys are not new in the authentication workflow. They have been around now for 10 years. What is new is the combination of the most secure multi-factor authentication method not only for logical but also for physical access control with the highest FIPS140-3 security certification in the market. Segment Resources: Video "Swissbit iShi…
  continue reading
 
FIDO security keys are not new in the authentication workflow. They have been around now for 10 years. What is new is the combination of the most secure multi-factor authentication method not only for logical but also for physical access control with the highest FIPS140-3 security certification in the market. Segment Resources: Video "Swissbit iShi…
  continue reading
 
Log4j, solar winds, tesla hacks, and the wave of high profile appsec problems aren’t going to go away with current approaches like SAST and SCA. Why? They are: -40 years old, with little innovation -Haven’t solved the problem. In this segment, we talk about fully autonomous application security. Vetted by DARPA in the Cyber Grand Challenge, the app…
  continue reading
 
Log4j, solar winds, tesla hacks, and the wave of high profile appsec problems aren’t going to go away with current approaches like SAST and SCA. Why? They are: -40 years old, with little innovation -Haven’t solved the problem. In this segment, we talk about fully autonomous application security. Vetted by DARPA in the Cyber Grand Challenge, the app…
  continue reading
 
Exploring the Strategic Minds in Cybersecurity: A Conversation with Dave Aitel Welcome to an enlightening episode of our podcast, where we sit down with Dave Aitel, a prominent figure in the cybersecurity landscape. With a robust background in offensive security and an extensive career spanning various facets of the industry, Dave brings a wealth o…
  continue reading
 
Exploring the Strategic Minds in Cybersecurity: A Conversation with Dave Aitel Welcome to an enlightening episode of our podcast, where we sit down with Dave Aitel, a prominent figure in the cybersecurity landscape. With a robust background in offensive security and an extensive career spanning various facets of the industry, Dave brings a wealth o…
  continue reading
 
Lindsay LaBennett's career journey is a reflection of her strong family influences and unwavering dedication to hard work and respect. Inspired by her mother's engineering background and her grandmother's farm upbringing, Lindsay developed a robust work ethic and a deep understanding of herself. Lindsay's interest in sports and entertainment grew t…
  continue reading
 
Check out this interview from the ASW Vault, hand picked by main host Mike Shema! This segment was originally published on April 4, 2023. Following on from her successful title "Container Security", Liz has recently authored "Learning eBPF", published by O'Reilly. eBPF is a revolutionary kernel technology that is enabling a whole new generation of …
  continue reading
 
Check out this interview from the SWN Vault, hand picked by main host Doug White! This Secure Digital Life segment was originally published on September 25, 2018. This week, Russ takes the reigns in the absence of Dr. Doug to talk about Networking 101! We are going to go back to school to examine how networking and the internet actually work. Russ …
  continue reading
 
Check out this interview from the ASW Vault, hand picked by main host Mike Shema! This segment was originally published on April 4, 2023. Following on from her successful title "Container Security", Liz has recently authored "Learning eBPF", published by O'Reilly. eBPF is a revolutionary kernel technology that is enabling a whole new generation of …
  continue reading
 
Check out this interview from the SWN Vault, hand picked by main host Doug White! This Secure Digital Life segment was originally published on September 25, 2018. This week, Russ takes the reigns in the absence of Dr. Doug to talk about Networking 101! We are going to go back to school to examine how networking and the internet actually work. Russ …
  continue reading
 
On this Live Greatly podcast episode, Kristel Bauer sits down with Gianna Caruso, a hearing loss advocate, co-founder and CEO of the luxury swimwear, activewear, and loungewear brand GIGI C (founded at just 16 years old) and founder of the foundation, Hear With You. Kristel and Gianna discuss entrepreneurship, resilience, hearing health tips and he…
  continue reading
 
Check out this interview from the BSW Vault, hand picked by main host Matt Alderman! This segment was originally published on August 9, 2022. Zero Trust is the security buzzword of the moment, and while it is a very powerful approach, nearly every enterprise security product on the market – and some that aren’t even security products — are saying t…
  continue reading
 
Check out this interview from the BSW Vault, hand picked by main host Matt Alderman! This segment was originally published on August 9, 2022. Zero Trust is the security buzzword of the moment, and while it is a very powerful approach, nearly every enterprise security product on the market – and some that aren’t even security products — are saying t…
  continue reading
 
Enterprises often struggle with achieving business value in identity programs. This is typically the result of technology choices that require a disproportionately greater amount of effort and focus and underestimating the workforce required for organizational change management. With 30 years in the industry and a depth of accumulated knowledge wor…
  continue reading
 
Several recent trends underscore the increasing importance of Know Your Business (KYB) practices in today's business landscape. One significant trend is the rise in financial crimes, including money laundering, fraud, and terrorist financing. Technological advancements have transformed the way businesses operate, leading to increased digitization, …
  continue reading
 
Loading …

Snabbguide