Search a title or topic

Over 20 million podcasts, powered by 

Player FM logo
show episodes
 
Artwork

1
The DadBodCast

Chad and Cam

icon
Unsubscribe
icon
Unsubscribe
Monthly
 
Cam Weaver and Chad Hoy are two lil bb boi BFFs who do a cute ass, somewhat funny podcast together. If you hate laughing, you'll hate this podcast. And we'll hate you if you hate laughing because that means that you'll hate our life's work, which is this very podcast. Thanks for listening!
  continue reading
 
Artwork

1
Small Lake City

Erik Nilsson

icon
Unsubscribe
icon
Unsubscribe
Weekly+
 
Small Talk, Big City Join host Erik Nilsson as he interviews the entrepreneurs, creators, and builders making Salt Lake City the best place it can be. Covering topics such as business, politics, art, food, and more you will get to know the amazing people behind the scenes investing their time and money to improve the place we call home. Follow along for more!
  continue reading
 
Artwork
 
Welcome to the Security Weekly Podcast Network, your all-in-one source for the latest in cybersecurity! This feed features a diverse lineup of shows, including Application Security Weekly, Business Security Weekly, Paul's Security Weekly, Enterprise Security Weekly, and Security Weekly News. Whether you're a cybersecurity professional, business leader, or tech enthusiast, we cover all angles of the cybersecurity landscape. Tune in for in-depth panel discussions, expert guest interviews, and ...
  continue reading
 
Loading …
show series
 
Segment 1 CTG Interview Middle market companies face unique challenges in the ever-evolving cyber environment. Developing a comprehensive cybersecurity approach is a business imperative for middle market companies, and Chad Alessi will discuss the threat landscape, what’s keeping IT decision-makers awkward at night, and the best approach to creatin…
  continue reading
 
From skateboarding around Sugar House as a kid to brewing award-winning beer in the same neighborhood, Chad Hopkins' journey epitomizes the heart of Salt Lake City's local business renaissance. Growing up in Sugar House during the 80s and 90s when it was "kind of rough," Chad developed a deep connection to this eclectic neighborhood. His first job …
  continue reading
 
In the security news: Vicious Trap - The malware hiding in your router Hacking your car WSL is open-source, but why? Using AI to find vulnerabilities - a case study Why you should not build your own password manager The inside scoop behind Lumma Infostealer Hacking a smart grill Hardcoded credentials on end of life routers and "Alphanetworks" SIM s…
  continue reading
 
This segment explores how automated microsegmentation addresses critical Zero Trust gaps overlooked by traditional access controls and legacy segmentation solutions. We'll examine the limitations of perimeter-based defenses in today's dynamic threat landscape and reveal how automated microsegmentation enhances network security beyond conventional f…
  continue reading
 
From the football field to craft beer innovation, this week's update spans Salt Lake City's diverse community landscape. We've recently shared Mitch Matthews' compelling journey from BYU football star and NFL player to successful entrepreneur. His newest venture, Flow House in Pleasant Grove, builds community around wellness practices including hot…
  continue reading
 
ArmorCode unveils Anya—the first agentic AI virtual security champion designed specifically for AppSec and product security teams. Anya brings together conversation and context to help AppSec, developers and security teams cut through the noise, prioritize risks, and make faster, smarter decisions across code, cloud, and infrastructure. Built into …
  continue reading
 
What happens when a Thai influencer and a suit entrepreneur fall in love across continents? Cam and Ying Nance's remarkable journey proves that sometimes life's sweetest opportunities arise from unexpected circumstances. Their story begins in Thailand, where Cam was expanding his custom suit business and Ying was working as an influencer from a pri…
  continue reading
 
Segment 1: Erik Bloch Interview The math on SOC AI just isn't adding up. It's not easy to do the math, either, as each SOC automation vendor is tackling alert fatigue and SecOps assistants a bit differently. Fortunately for us and our audience, Erik Bloch met with many of these vendors at RSAC and is going to share what he learned with us! Segment …
  continue reading
 
This week in the security news: Malware-laced printer drivers Unicode steganography Rhode Island may sue Deloitte for breach. They may even win. Japan's active cyber defense law Stop with the ping LLMs replace Stack Overflow - ya don't say? Aggravated identity theft is aggravating Ivanti DSM and why you shouldn't use it EDR is still playing cat and…
  continue reading
 
From facing the brutal cuts of NFL teams to hiking a Polish mountain in freezing temperatures wearing nothing but shorts and gloves, Mitch Matthews brings us on a remarkable journey of personal transformation that led to creating FlowHaus—a sanctuary designed to elevate human connection through hot and cold therapy. Matthews opens up about the psyc…
  continue reading
 
In the leadership and communications section, Why Every CISO Should Be Gunning For A Seat At The Board Table, The Innovation We Need is Strategic, Not Technical , The Best Leaders Ask the Right Questions, and more! This segment is sponsored by Fortra. Visit https://securityweekly.com/fortrarsac to learn more about them! Fortra is successfully reduc…
  continue reading
 
Warm weather is making a comeback, and so is your weekly roundup of everything that matters in our community! We're fresh off an incredible weekend at Kilby Block Party where the lineup delivered unforgettable performances despite the chilly temperatures. From New Order's classic hits to Beach House's dreamy soundscapes, Weezer's nostalgic energy, …
  continue reading
 
In the news, Coinbase deals with bribes and insider threat, the NCSC notes the cross-cutting problem of incentivizing secure design, we cover some research that notes the multitude of definitions for secure design, and discuss the new Cybersecurity Skills Framework from the OpenSSF and Linux Foundation. Then we share two more sponsored interviews f…
  continue reading
 
Segment 1: Fastly Interview In this week's interview segment, we talk to Marshall Erwin about the state of cybersecurity, particularly when it comes to third party risk management, and whether we're ready for the next big SolarWinds or Crowdstrike incident. These big incidents have inspired executive orders, the Secure by Design initiative, and eve…
  continue reading
 
What happens when a comic book-loving Utah kid meets the daughter of a prominent Thai family? Something magical, as it turns out. Cameron and Ying Nance's story reads like the plot of a Netflix original – he was a Dragon Ball Z enthusiast from Salt Lake City who found himself teaching English to one of Thailand's most revered Buddhist monks. She wa…
  continue reading
 
This week in the security news: Android catches up to iOS with its own lockdown mode Just in case, there is a new CVE foundation Branch privilege injection attacks My screen is vulnerable The return of embedded devices to take over the world - 15 years later Attackers are going after MagicINFO Hacking Starlink Mitel SIP phones can be hacked Reversi…
  continue reading
 
In the leadership and communications section, How CISOs can talk cybersecurity so it makes sense to executives, Firms to spend more on GenAI than security in 2025, Europe leads shift from cyber security ‘headcount gap’ to skills-based hiring, and more! Next, pre-recorded interviews from RSAC Conference 2025, including: This segment is sponsored by …
  continue reading
 
Have a Question? Ask it here! Join Erik as he supports Fork Cancer on August 8th at the Gallivan Center—a night of food, drinks, and live music, all for a great cause. Grab your tickets at utah.acscanforkcancer.org and enter Erik Nilsson to help him hit his $12,000 fundraising goal! Join Erik as he supports Fork Cancer, a night of food, drinks, and…
  continue reading
 
Developers are relying on LLMs as coding assistants, so where are the LLM assistants for appsec? The principles behind secure code reviews don't really change based on who write the code, whether human or AI. But more code means more reasons for appsec to scale its practices and figure out how to establish trust in code, packages, and designs. Rey …
  continue reading
 
Segment 1 - Secrets and their role in infrastructure security From API keys and tokens to environment variables and credentials, secrets are foundational—and often overlooked—attack surfaces in cloud-native and distributed systems. We break down the risks tied to poor secret hygiene, discuss emerging patterns for secure secret management at scale, …
  continue reading
 
We're excited to bring back this incredible conversation with David Garbett, founder of O2 Utah—now known as Stewardship Utah after its recent merger. This transformation marks a new chapter in local climate advocacy, continuing the mission to protect Utah's environment and improve air quality across the state. Imagine hiking the breathtaking trail…
  continue reading
 
Sudo watch this show, Hallucinations, Kickidler, Powershool redux, Old Man Router, PSMU, Aaran Leyland, and More, on this edition of the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-475
  continue reading
 
Security news for this week: RDP and credentials that are not really revoked, and some RDP bitmap caching fun Some magic info on MagicINFO Vulnerability Management Zombies There is a backdoor in your e-commerce Airborne: vulnerabilities in AirPlay Bring your own installer - crafty EDR bypass The Signal clone used by US government officials: shocker…
  continue reading
 
We're thrilled to take you back in time with a special re-release from the Small Lake City Vault—our captivating discussion with the dynamic duo of George and Charlie Cardon, the forces behind Salt Lake City's Edison House. This isn't just any conversation; it's an exploration of the Cardon brothers' journey from the roots of their unique upbringin…
  continue reading
 
In the leadership and communications section, The C-suite gap that's putting your company at risk, CISOs band together to urge world governments to harmonize cyber rules, Cybersecurity is Not Working: Time to Try Something Else, and more! Organizations are increasingly threatened by cyberattacks originating from their suppliers. Existing tools (lik…
  continue reading
 
Deepfake Porn Bots, Skype, dd, Venom Spider, CISA, IT Helpdesk, Rob Allen, and more on the Security Weekly News. Segment Resources: https://cybersecuritynews.com/cyber-security-company-ceo-arrested/ This segment is sponsored by ThreatLocker. Visit https://www.securityweekly.com/threatlocker to learn more about them! Visit https://www.securityweekly…
  continue reading
 
Career success without fulfillment is just a paycheck. Kathleen Bodenlos discovered this truth after spending a decade climbing the corporate ladder, only to realize that external achievements weren't filling her soul. Our conversation takes an unexpected turn as she reveals how childhood memories of her favorite museum sparked a complete career re…
  continue reading
 
We catch up on news after a week of BSidesSF and RSAC Conference. Unsurprisingly, AI in all its flavors, from agentic to gen, was inescapable. But perhaps more surprising (and more unfortunate) is how much the adoption of LLMs has increased the attack surface within orgs. The news is heavy on security issues from MCPs and a novel alignment bypass a…
  continue reading
 
Now in its 18th year, the Verizon Business DBIR is one of the industry’s longest standing and leading reports on the current cybersecurity landscape. This year’s report analyzes more than 22,000 security incidents with victims spanning 139 countries, examining significant growth in third-party involvement in breaches, increases in ransomware and ex…
  continue reading
 
Kathleen Bodenlos had everything society told her she should want – a successful corporate career with good pay and prestige. Yet something was missing. "I thought success would make me fulfilled and it was not fulfilling," she reflects. That realization sparked a dramatic career shift that would eventually lead her to Salt Lake City and the helm o…
  continue reading
 
The PSW crew discusses tips, tricks, and traps for using AI and LLMs. We discuss a wide range of AI-related topics, including how to utilize AI tools for writing, coding, data analysis, website design, and more! Some key takeaways include: AI has rapidly shifted from novelty to an essential tool in security and other fields. Paid AI versions offer …
  continue reading
 
Have a Question? Ask it here! Join Erik as he supports Fork Cancer on August 8th at the Gallivan Center—a night of food, drinks, and live music, all for a great cause. Grab your tickets at utah.acscanforkcancer.org and enter Erik Nilsson to help him hit his $12,000 fundraising goal! Join Erik as he supports Fork Cancer, a night of food, drinks, and…
  continue reading
 
In today’s ever-evolving business landscape, organizations face diverse risks, including cyber risks, that can significantly affect their operations and overall prosperity. Aligning risk management strategies with organizational objectives is crucial for effectively mitigating these potential threats and fostering sustainable growth. Easier said th…
  continue reading
 
In this live recording from BSidesSF we explore the factors that influence a secure design, talk about how to avoid the bite of UX dragons, and why designs should put classes of vulns into dungeons. But we can't threat model a secure design forever and we can't oversimplify guidance for a design to be "more secure". Kalyani Pawar and Jack Cable joi…
  continue reading
 
As organizations embrace hybrid work, SaaS sprawl, and employee-owned devices, traditional Identity and Access Management (IAM) tools are failing to keep up. The rise of shadow IT, unmanaged applications, and evolving cyber threats have created an "Access-Trust Gap", a critical security challenge where IT lacks visibility and control over how emplo…
  continue reading
 
What happens when a former Mormon decides to turn his religious upbringing into comedy gold? Adam Broud joins us to share his fascinating journey from rural poverty to BYU graduate to the co-founder of Comedy Church, a unique comedy experience that playfully examines religious upbringings without resorting to faith-bashing. Growing up poor with lim…
  continue reading
 
Beating the AI Game, Ripple (not that one), Numerology, Darcula, Special Guests, and More, on this edition of the Security Weekly News. Special Guests from Hidden Layer to talk about this article: https://www.forbes.com/sites/tonybradley/2025/04/24/one-prompt-can-bypass-every-major-llms-safeguards/ Visit https://www.securityweekly.com/swn for all t…
  continue reading
 
The crosswalk is talking to me man!, don't block my website without due process, Florida is demanding encryption backdoors, attacking boilers and banning HackRF Ones, time to update your flipper zero, using AI to create working exploits, what happens when you combine an RP2350 and an ESP32? Hopefully good hackery things!, more evidence that patchin…
  continue reading
 
AI Governance, the next frontier for AI Security. But what framework should you use? ISO/IEC 42001 is an international standard that specifies requirements for establishing, implementing, maintaining, and continually improving an Artificial Intelligence Management System (AIMS) within organizations. It is designed for entities providing or utilizin…
  continue reading
 
Have a Question? Ask it here! Join Erik as he supports Fork Cancer on August 8th at the Gallivan Center—a night of food, drinks, and live music, all for a great cause. Grab your tickets at utah.acscanforkcancer.org and enter Erik Nilsson to help him hit his $12,000 fundraising goal! Join Erik as he supports Fork Cancer, a night of food, drinks, and…
  continue reading
 
Secrets end up everywhere, from dev systems to CI/CD pipelines to services, certificates, and cloud environments. Vlad Matsiiako shares some of the tactics that make managing secrets more secure as we discuss the distinctions between secure architectures, good policies, and developer friendly tools. We've thankfully moved on from forced 90-day user…
  continue reading
 
Loading …
Copyright 2025 | Privacy Policy | Terms of Service | | Copyright
Listen to this show while you explore
Play