Join Joe Lins and Stephanie Goedl for practical advice and interviews with top agents and industry pros on how to Discover the real estate career you want.
…
continue reading
Are you looking for more happiness, success and vitality in your life? Get inspired each week with Wellness Expert, Integrative Medicine Fellow & Keynote Speaker, Kristel Bauer. Live Greatly shares empowering conversations about life, wellness & success talking with top experts, athletes, celebrities, CEOs and other incredible individuals. Tune in for insights to thrive personally and professionally. It’s time to awaken your ultimate potential! Disclaimer: All of the information shared on th ...
…
continue reading
A weekly podcast delivering diverse insights and perspectives from global leaders in business, executive education and diversity & inclusion. Hosted by award-winning content creator, author, speaker, certified diversity executive and cofounder of The Diversity Movement, Jackie Ferguson. This show is proud to be a part of the Living Corporate network.
…
continue reading
Venture into the shadows with Catherine Corcoran, James A. Janisse, Barbara Crampton and their guests as they dive into the real nightmares of the best minds in genre! Support this podcast: https://podcasters.spotify.com/pod/show/screamdreams/support
…
continue reading
Every week, we sit down with an acclaimed and venerable songwriter to intimately discuss what happens behind closed doors in the music industry. There are millions of singers, thousands of artists, and only 40 top songs per genre at a time... this podcast is about the people who make them. Produced by Joe London & Ross Golan in association with Big Deal Music & Mega House Music. And The Writer Is... ™ Hosted on Acast. See acast.com/privacy for more information.
…
continue reading
PA Books features authors of books about Pennsylvania-related topics. These hour-long conversations allow authors to discuss both their subject matter and inspiration behind the books.
…
continue reading
This feed includes all episodes of Paul's Security Weekly, Enterprise Security Weekly, Business Security Weekly, Application Security Weekly, and Security Weekly News! Your one-stop shop for all things Security Weekly!
…
continue reading
This feed includes all episodes of Paul's Security Weekly, Enterprise Security Weekly, Business Security Weekly, Application Security Weekly, and Security Weekly News! Your one-stop shop for all things Security Weekly!
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Hacker Heroes - Joe Grand - PSW Vault
1:43:58
1:43:58
Spela senare
Spela senare
Listor
Gilla
Gillad
1:43:58
Exploring the Hardware Hacking Realm with Joe Grand, AKA Kingpin Joe Grand, also known by his hacker pseudonym "Kingpin," stands as a prominent figure in the cybersecurity landscape. With an extensive background in hardware hacking, reverse engineering, and embedded systems, Joe has carved a niche for himself as a respected authority in the field. …
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Hacker Heroes - Joe Grand - PSW Vault
1:43:58
1:43:58
Spela senare
Spela senare
Listor
Gilla
Gillad
1:43:58
Exploring the Hardware Hacking Realm with Joe Grand, AKA Kingpin Joe Grand, also known by his hacker pseudonym "Kingpin," stands as a prominent figure in the cybersecurity landscape. With an extensive background in hardware hacking, reverse engineering, and embedded systems, Joe has carved a niche for himself as a respected authority in the field. …
…
continue reading
![Artwork](/static/images/128pixel.png)
1
"Voices from Gettysburg" with Allen Guelzo
57:51
57:51
Spela senare
Spela senare
Listor
Gilla
Gillad
57:51
Gathering a treasure trove of powerful, rare, and haunting original documents, New York Times bestselling author and award-winning historian Allen C. Guelzo presents a uniquely readable and intimate oral history of the Civil War's turning point. We hear from a Union staff officer, a Confederate amputee, artilleryman, a sympathetic Northern woman, a…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
How To Avoid Being Phished - SWN Vault
46:06
46:06
Spela senare
Spela senare
Listor
Gilla
Gillad
46:06
Check out this interview from the SWN Vault, hand picked by main host Doug White! This Secure Digital Life segment was originally published on March 6, 2017. Have you ever wondered what phishing is? Do you know what spear phishing attacks are? Doug and Russ explain how to protect yourself from phishing scams in the inaugural episode of Secure Digit…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
How To Avoid Being Phished - SWN Vault
46:06
46:06
Spela senare
Spela senare
Listor
Gilla
Gillad
46:06
Check out this interview from the SWN Vault, hand picked by main host Doug White! This Secure Digital Life segment was originally published on March 6, 2017. Have you ever wondered what phishing is? Do you know what spear phishing attacks are? Doug and Russ explain how to protect yourself from phishing scams in the inaugural episode of Secure Digit…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Redefining What It Means To Have It All With the Founder of Brilliant Balance, Cherylanne Skolnicki
24:57
24:57
Spela senare
Spela senare
Listor
Gilla
Gillad
24:57
On this Live Greatly podcast episode, Kristel Bauer sits down with the founder of Brilliant Balance, Cherylanne Skolnicki to discuss what it means to really have it all. Cheryanne left a corporate career as a marketing executive to enter into entrepreneurship, becoming an advisor and coach to ambitious women. Kristel and Cherylanne with discuss way…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
CISOs 2023 Planning Guide: Forecast The Recession's Impact On Your Program - Jeff Pollard - BSW Vault
33:21
33:21
Spela senare
Spela senare
Listor
Gilla
Gillad
33:21
Check out this interview from the BSW Vault, hand picked by main host Matt Alderman! This segment was originally published on October 11, 2022. As 2023 approaches, security leaders are hard at work preparing their budgets, identifying their projects, and setting their priorities for the next twelve months. At the same time, the growth mode days of …
…
continue reading
![Artwork](/static/images/128pixel.png)
1
CISOs 2023 Planning Guide: Forecast The Recession's Impact On Your Program - Jeff Pollard - BSW Vault
33:21
33:21
Spela senare
Spela senare
Listor
Gilla
Gillad
33:21
Check out this interview from the BSW Vault, hand picked by main host Matt Alderman! This segment was originally published on October 11, 2022. As 2023 approaches, security leaders are hard at work preparing their budgets, identifying their projects, and setting their priorities for the next twelve months. At the same time, the growth mode days of …
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Is GenAI Having a Rough Time? We check in to see how it's doing. - ESW #366
1:00:24
1:00:24
Spela senare
Spela senare
Listor
Gilla
Gillad
1:00:24
We've made a slight tweak to the news format, only focusing on the most interesting funding and acquisition stories. As always, you can go check out Mike Privette's Return on Security newsletter for the full list of funded and acquired companies every week. This week, we discuss two $100M+ rounds, from Huntress and Semperis. We also discuss NetSPI'…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Shifting Cybersecurity Philosophy from Threat-Centric to Compromise-Centric - Martin Roesch - ESW #366
42:32
42:32
Spela senare
Spela senare
Listor
Gilla
Gillad
42:32
For decades, security teams have been focused on preventing and detecting threats, only to find themselves buried so deep in alerts, they can't detect anything at all! We clearly need a different approach, which will be the topic of our conversation today with Marty. We'll be discussing a shift in philosophy and tactics. We'll discuss whether SecOp…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
MoveIT, Entrust, Fed Reserve, ISPs, Volt Typhoon & More - SWN #395
29:09
29:09
Spela senare
Spela senare
Listor
Gilla
Gillad
29:09
Healthcare and malware, MoveIT, Chrome won't trust Entrust, the discovery of Volt Typhoon, & more on this episode of the Security Weekly News! Segment Resources: https://therecord.media/volt-typhoon-targets-underestimated-cisa-says Show Notes: https://securityweekly.com/swn-395
…
continue reading
![Artwork](/static/images/128pixel.png)
1
MoveIT, Entrust, Fed Reserve, ISPs, Volt Typhoon & More - Chris Wolski - SWN #395
29:10
29:10
Spela senare
Spela senare
Listor
Gilla
Gillad
29:10
Healthcare and malware, MoveIT, Chrome won't trust Entrust, the discovery of Volt Typhoon, & more on this episode of the Security Weekly News! Segment Resources: https://therecord.media/volt-typhoon-targets-underestimated-cisa-says Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-395…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
The risks and best practices of deploying AI to an enterprise - Anurag Lal - ESW #366
33:34
33:34
Spela senare
Spela senare
Listor
Gilla
Gillad
33:34
We all might be a little worn out on this topic, but there's no escaping it. Executives want to adopt GenAI and it is being embedded into nearly every software product we use in both our professional and personal lives. In this interview, Anurag joins us to discuss how his company evaluated and ultimately integrated AI-based technologies into their…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
The risks and best practices of deploying AI to an enterprise - Martin Roesch, Anurag Lal - ESW #366
2:16:26
2:16:26
Spela senare
Spela senare
Listor
Gilla
Gillad
2:16:26
We all might be a little worn out on this topic, but there's no escaping it. Executives want to adopt GenAI and it is being embedded into nearly every software product we use in both our professional and personal lives. In this interview, Anurag joins us to discuss how his company evaluated and ultimately integrated AI-based technologies into their…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
3 Tips to Navigate Indecision: 2 Minutes of Motivation
4:26
4:26
Spela senare
Spela senare
Listor
Gilla
Gillad
4:26
In this Live Greatly 2 minutes of motivation podcast episode Kristel Bauer shares 3 tips to help you navigate indecision. Tune in now! Key Takeaways From This Episode: 3 Tips to Navigate Indecision Explore Having Kristel Bauer speak at your next event or team meeting. https://www.livegreatly.co/contact About the Host of the Live Greatly podcast, Kr…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Hack all the things, patch all the things - PSW #833
1:50:38
1:50:38
Spela senare
Spela senare
Listor
Gilla
Gillad
1:50:38
Zyxl NAS devices are under attack and the exploit is pretty simple, A new UEFI vulnerability with a name that some people don't like, that time you setup a load balancer and forgot about it, I love it when there is a vulnerability in a Wifi driver, Polyfill is filling the Internet with supply chain vulnerabilities, open source doesn't mean more sec…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Do We Need Penetration Testing and Vulnerability Scanning? - Josh Bressers, Adrian Sanabria - PSW #833
2:51:52
2:51:52
Spela senare
Spela senare
Listor
Gilla
Gillad
2:51:52
This may be controversial, however, we've been privately discussing how organizations benefit from penetration testing and vulnerability scanning. Do you still need these services as a critical part of your security program? Can't you just patch stuff that is missing patches? Tune in for a lively debate! Zyxl NAS devices are under attack and the ex…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Do We Need Penetration Testing and Vulnerability Scanning? - Adrian Sanabria, Josh Bressers - PSW #833
1:00:55
1:00:55
Spela senare
Spela senare
Listor
Gilla
Gillad
1:00:55
This may be controversial, however, we've been privately discussing how organizations benefit from penetration testing and vulnerability scanning. Do you still need these services as a critical part of your security program? Can't you just patch stuff that is missing patches? Tune in for a lively debate! Show Notes: https://securityweekly.com/psw-8…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Trouble Doesn't Last: Incarceration to Advocacy w/Doris Bullock
40:02
40:02
Spela senare
Spela senare
Listor
Gilla
Gillad
40:02
In this episode, we delve into the inspiring journey of Dr. Doris Bullock, Interim Chief Program Officer of Arise Collective. Dr. Bullock shares her personal experience of incarceration and the profound inequities she observed and experienced within the justice system. After serving ten and a half years of a life sentence (with the possiblilty of p…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Shared Responsibility Models, AI in Offensive Security, Apple's Private Cloud Compute - ASW #289
24:10
24:10
Spela senare
Spela senare
Listor
Gilla
Gillad
24:10
Thoughts on shared responsibility models after the Snowflake credential attacks, looking at AI's current and future role in offensive security, secure by design lessons from Apple's Private Cloud Computer, and more! Show Notes: https://securityweekly.com/asw-289
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Baltimore, GPS Jammed, US bans, ARM, YouTube, Kraken and Joshua Marpet - SWN #394
30:16
30:16
Spela senare
Spela senare
Listor
Gilla
Gillad
30:16
Baltimore, GPS Jammed, US bans, ARM, YouTube, Kraken and Joshua Marpet, and More, on this edition of the Security Weekly News. Show Notes: https://securityweekly.com/swn-394
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Baltimore, GPS Jammed, US bans, ARM, YouTube, Kraken and Joshua Marpet - SWN #394
30:07
30:07
Spela senare
Spela senare
Listor
Gilla
Gillad
30:07
Baltimore, GPS Jammed, US bans, ARM, YouTube, Kraken and Joshua Marpet, and More, on this edition of the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-394
…
continue reading
![Artwork](/static/images/128pixel.png)
1
OAuth 2.0 from Protecting APIs to Supporting Authorization & Authentication - Aaron Parecki - ASW #289
37:01
37:01
Spela senare
Spela senare
Listor
Gilla
Gillad
37:01
OAuth 2.0 is more than just a single spec and it's used to protect more than just APIs. We talk about challenges in maintaining a spec over a decade of changing technologies and new threat models. Not only can OAuth be challenging to secure by default, but it's not even always inter-operable. Segment Resources: https://oauth.net/2.1 https://oauth.n…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Building a Successful API Security Strategy - Luke Babarinde, Bhawna Singh - BSW #354
1:04:51
1:04:51
Spela senare
Spela senare
Listor
Gilla
Gillad
1:04:51
With 71% of web traffic coming from API calls last year and the average organization maintaining 613 API endpoints, a robust strategy is needed to protect APIs against automated threats and business logic attacks. Tune in as Luke Babarinde, Global Solution Architect, shares the key steps to building a successful API security strategy. This segment …
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Embracing Change and Successfully Navigating Transitions With Kristel Bauer
11:08
11:08
Spela senare
Spela senare
Listor
Gilla
Gillad
11:08
In this Live Greatly podcast episode corporate wellness and performance expert Kristel Bauer shares insights into successfully navigating change and transitions. Kristel shares personal insights that have helped her while preparing for her move from Illinois to Florida. Tune in now! Key Takeaways From This Episode: Tips to successfully navigate cha…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
AI at Work 2024: C-suite Perspectives on Artificial Intelligence - Bhawna Singh - BSW #354
32:31
32:31
Spela senare
Spela senare
Listor
Gilla
Gillad
32:31
In the age of AI, driving a business forward requires balancing three very significant considerations: growth through innovation, productivity through operational efficiency, and trust through security. To better understand how AI impacts the intersection of security, innovation, and operational efficiency, Okta commissioned an AlphaSights survey o…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Building a Successful API Security Strategy - Luke Babarinde - BSW #354
32:41
32:41
Spela senare
Spela senare
Listor
Gilla
Gillad
32:41
With 71% of web traffic coming from API calls last year and the average organization maintaining 613 API endpoints, a robust strategy is needed to protect APIs against automated threats and business logic attacks. Tune in as Luke Babarinde, Global Solution Architect, shares the key steps to building a successful API security strategy. This segment …
…
continue reading
![Artwork](/static/images/128pixel.png)
1
OAuth 2.0 from Protecting APIs to Supporting Authorization & Authentication - Aaron Parecki - ASW #289
1:01:09
1:01:09
Spela senare
Spela senare
Listor
Gilla
Gillad
1:01:09
OAuth 2.0 is more than just a single spec and it's used to protect more than just APIs. We talk about challenges in maintaining a spec over a decade of changing technologies and new threat models. Not only can OAuth be challenging to secure by default, but it's not even always inter-operable. Segment Resources: https://oauth.net/2.1 https://oauth.n…
…
continue reading
Today’s guest is a songwriting hall of fame who has been a fixture in the writing scene for decades. Defining and launching careers one lyric at a time, this writer has crafted anthems for Madonna, Cyndi Lauper, Whitney Houston, Heart, The Bangles, Pretenders, Linda Ronstadt, Jojo, Demi Lovato, and many more. As much as these songs launched these a…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Access vs Actions, Beyond Traditional IGA, Remote Identity Verification, & Fraud - Tim Prendergast, Damon Tompkins, Andrew Bud, Chris Meyer - ESW Vault
58:32
58:32
Spela senare
Spela senare
Listor
Gilla
Gillad
58:32
Traditional approaches to access management are no longer sufficient to safeguard enterprise security. Tim will explain why the most effective approach to modern enterprise security requires a Zero Trust model that extends beyond just access to encompass every action, no matter how minor. Tim will describe the importance of implementing a Zero Trus…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Access vs Actions, Beyond Traditional IGA, Remote Identity Verification, & Fraud - Tim Prendergast, Damon Tompkins, Andrew Bud, Chris Meyer - ESW Vault
58:32
58:32
Spela senare
Spela senare
Listor
Gilla
Gillad
58:32
Traditional approaches to access management are no longer sufficient to safeguard enterprise security. Tim will explain why the most effective approach to modern enterprise security requires a Zero Trust model that extends beyond just access to encompass every action, no matter how minor. Tim will describe the importance of implementing a Zero Trus…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Cybersecurity In College - SWN Vault
38:26
38:26
Spela senare
Spela senare
Listor
Gilla
Gillad
38:26
Check out this interview from the SWN Vault, hand picked by main host Doug White! This Secure Digital Life segment was originally published on June 19, 2018. This week, Doug and Russ interview Matthew Silva, President and Founder of the Cybersecurity and Intel Club at Roger Williams University! They talk about majoring in Cybersecurity vs. Computer…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Cybersecurity In College - SWN Vault
38:26
38:26
Spela senare
Spela senare
Listor
Gilla
Gillad
38:26
Check out this interview from the SWN Vault, hand picked by main host Doug White! This Secure Digital Life segment was originally published on June 19, 2018. This week, Doug and Russ interview Matthew Silva, President and Founder of the Cybersecurity and Intel Club at Roger Williams University! They talk about majoring in Cybersecurity vs. Computer…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
5 Tips to Build Resilience: 2 Minutes of Motivation
5:13
5:13
Spela senare
Spela senare
Listor
Gilla
Gillad
5:13
In this Live Greatly 2 minutes of motivation podcast episode Kristel Bauer shares 5 things that can help build resilience. Tune in now! Key Takeaways From This Episode: 5 Tips to Build Resilience Explore Having Kristel Bauer speak at your next event or team meeting. https://www.livegreatly.co/contact About the Host of the Live Greatly podcast, Kris…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
iShield Key Experience, Automated (PKI) Infrastructure, & GenAI Identity Attacks - Kevin Fadaie, Roni Bliss, David Mahdi - ESW Vault
44:48
44:48
Spela senare
Spela senare
Listor
Gilla
Gillad
44:48
FIDO security keys are not new in the authentication workflow. They have been around now for 10 years. What is new is the combination of the most secure multi-factor authentication method not only for logical but also for physical access control with the highest FIPS140-3 security certification in the market. Segment Resources: Video "Swissbit iShi…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
iShield Key Experience, Automated (PKI) Infrastructure, & GenAI Identity Attacks - Kevin Fadaie, Roni Bliss, David Mahdi - ESW Vault
44:48
44:48
Spela senare
Spela senare
Listor
Gilla
Gillad
44:48
FIDO security keys are not new in the authentication workflow. They have been around now for 10 years. What is new is the combination of the most secure multi-factor authentication method not only for logical but also for physical access control with the highest FIPS140-3 security certification in the market. Segment Resources: Video "Swissbit iShi…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Bringing Autonomy to AppSec - Dr. David Brumley - ESW Vault
32:22
32:22
Spela senare
Spela senare
Listor
Gilla
Gillad
32:22
Log4j, solar winds, tesla hacks, and the wave of high profile appsec problems aren’t going to go away with current approaches like SAST and SCA. Why? They are: -40 years old, with little innovation -Haven’t solved the problem. In this segment, we talk about fully autonomous application security. Vetted by DARPA in the Cyber Grand Challenge, the app…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Bringing Autonomy to AppSec - Dr. David Brumley - ESW Vault
32:22
32:22
Spela senare
Spela senare
Listor
Gilla
Gillad
32:22
Log4j, solar winds, tesla hacks, and the wave of high profile appsec problems aren’t going to go away with current approaches like SAST and SCA. Why? They are: -40 years old, with little innovation -Haven’t solved the problem. In this segment, we talk about fully autonomous application security. Vetted by DARPA in the Cyber Grand Challenge, the app…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Hacker Heroes - Dave Aitel - PSW Vault
1:29:24
1:29:24
Spela senare
Spela senare
Listor
Gilla
Gillad
1:29:24
Exploring the Strategic Minds in Cybersecurity: A Conversation with Dave Aitel Welcome to an enlightening episode of our podcast, where we sit down with Dave Aitel, a prominent figure in the cybersecurity landscape. With a robust background in offensive security and an extensive career spanning various facets of the industry, Dave brings a wealth o…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Hacker Heroes - Dave Aitel - PSW Vault
1:29:24
1:29:24
Spela senare
Spela senare
Listor
Gilla
Gillad
1:29:24
Exploring the Strategic Minds in Cybersecurity: A Conversation with Dave Aitel Welcome to an enlightening episode of our podcast, where we sit down with Dave Aitel, a prominent figure in the cybersecurity landscape. With a robust background in offensive security and an extensive career spanning various facets of the industry, Dave brings a wealth o…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Equity & Inclusion Beyond the Scoreboard w/ Lindsay LaBennett
50:34
50:34
Spela senare
Spela senare
Listor
Gilla
Gillad
50:34
Lindsay LaBennett's career journey is a reflection of her strong family influences and unwavering dedication to hard work and respect. Inspired by her mother's engineering background and her grandmother's farm upbringing, Lindsay developed a robust work ethic and a deep understanding of herself. Lindsay's interest in sports and entertainment grew t…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Learning EBPF - Liz Rice - ASW Vault
37:16
37:16
Spela senare
Spela senare
Listor
Gilla
Gillad
37:16
Check out this interview from the ASW Vault, hand picked by main host Mike Shema! This segment was originally published on April 4, 2023. Following on from her successful title "Container Security", Liz has recently authored "Learning eBPF", published by O'Reilly. eBPF is a revolutionary kernel technology that is enabling a whole new generation of …
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Back To School: Networking 101 - SWN Vault
26:29
26:29
Spela senare
Spela senare
Listor
Gilla
Gillad
26:29
Check out this interview from the SWN Vault, hand picked by main host Doug White! This Secure Digital Life segment was originally published on September 25, 2018. This week, Russ takes the reigns in the absence of Dr. Doug to talk about Networking 101! We are going to go back to school to examine how networking and the internet actually work. Russ …
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Learning EBPF - Liz Rice - ASW Vault
37:16
37:16
Spela senare
Spela senare
Listor
Gilla
Gillad
37:16
Check out this interview from the ASW Vault, hand picked by main host Mike Shema! This segment was originally published on April 4, 2023. Following on from her successful title "Container Security", Liz has recently authored "Learning eBPF", published by O'Reilly. eBPF is a revolutionary kernel technology that is enabling a whole new generation of …
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Back To School: Networking 101 - SWN Vault
26:29
26:29
Spela senare
Spela senare
Listor
Gilla
Gillad
26:29
Check out this interview from the SWN Vault, hand picked by main host Doug White! This Secure Digital Life segment was originally published on September 25, 2018. This week, Russ takes the reigns in the absence of Dr. Doug to talk about Networking 101! We are going to go back to school to examine how networking and the internet actually work. Russ …
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Building Resilience, Entrepreneurship and Harnessing Awareness Around Hearing Health With Gianna Caruso, CEO of GIGI C and Founder of Hear With You
24:18
24:18
Spela senare
Spela senare
Listor
Gilla
Gillad
24:18
On this Live Greatly podcast episode, Kristel Bauer sits down with Gianna Caruso, a hearing loss advocate, co-founder and CEO of the luxury swimwear, activewear, and loungewear brand GIGI C (founded at just 16 years old) and founder of the foundation, Hear With You. Kristel and Gianna discuss entrepreneurship, resilience, hearing health tips and he…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Zero Trust Is Not A SKU - Saša Zdjelar - BSW Vault
32:47
32:47
Spela senare
Spela senare
Listor
Gilla
Gillad
32:47
Check out this interview from the BSW Vault, hand picked by main host Matt Alderman! This segment was originally published on August 9, 2022. Zero Trust is the security buzzword of the moment, and while it is a very powerful approach, nearly every enterprise security product on the market – and some that aren’t even security products — are saying t…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Zero Trust Is Not A SKU - Saša Zdjelar - BSW Vault
32:47
32:47
Spela senare
Spela senare
Listor
Gilla
Gillad
32:47
Check out this interview from the BSW Vault, hand picked by main host Matt Alderman! This segment was originally published on August 9, 2022. Zero Trust is the security buzzword of the moment, and while it is a very powerful approach, nearly every enterprise security product on the market – and some that aren’t even security products — are saying t…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Unlocking Business Value, Beyond Outages, & Combat Account and Platform Fraud - Ajay Gupta, Gerry Gebel, Mark Batchelor - ESW #365
46:14
46:14
Spela senare
Spela senare
Listor
Gilla
Gillad
46:14
Enterprises often struggle with achieving business value in identity programs. This is typically the result of technology choices that require a disproportionately greater amount of effort and focus and underestimating the workforce required for organizational change management. With 30 years in the industry and a depth of accumulated knowledge wor…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Increasing KYB Coverage, Is your SSO on point, & The Future of Identity Management - Vibhuti Sinha, Tarvinder Sembhi, Chris Simmons - ESW #365
43:52
43:52
Spela senare
Spela senare
Listor
Gilla
Gillad
43:52
Several recent trends underscore the increasing importance of Know Your Business (KYB) practices in today's business landscape. One significant trend is the rise in financial crimes, including money laundering, fraud, and terrorist financing. Technological advancements have transformed the way businesses operate, leading to increased digitization, …
…
continue reading