Search a title or topic

Over 20 million podcasts, powered by 

Player FM logo

Bio Engineering Podcasts

show episodes
 
Artwork
 
Five times winner of the Publisher Podcast Awards, including Best Technology Podcast, Engineering Matters celebrates the work of engineers who use ingenuity, practicality, science, theory and determination to build a better world. In the UK alone 5.7million people work in engineering related enterprises from manufacturing and agriculture to construction and transportation. Their work ensures that the country has sustainable power supplies, better connectivity between cities, increasing effic ...
  continue reading
 
Artwork

1
Columbia University Bio Bytes

Columbia Sys Bio Initiative

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Welcome to Bio Bytes! Tune in for interviews with prominent scientists working at the intersection of Biology, Engineering, Medicine, Computer Science, and Mathematics. Check out our sister podcast "BioWorks" (https://anchor.fm/bioworks) for great discussions on life science-related business, investing, and policy. To support our podcast: https://securepay.cuit.columbia.edu/payment/pub/sponsor-sbi/https://securepay.cuit.columbia.edu/payment/pub/sponsor-sbi/ Please email sophiadeng0321@icloud ...
  continue reading
 
Artwork

1
Bio Without Boundaries

By Tanvi, Parv and Yashvi

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
These podcasts will give you insight into exclusive sessions with students who have pursued science for higher education, doctors and specialists which may help you navigate through your interests and help you choose what you're most passionate about. We will be posting a new podcast every 2 weeks. If you have any suggestions, or topics that you want us to talk about please feel free to contact us on our website or on instagram. Link to our website: https://biowithoutboundari.wixsite.com/bio ...
  continue reading
 
Artwork

1
Engineering Your Farm

Field Agricultural Engineers

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
This podcast is produced and hosted by the Iowa State University Extension and Outreach Field Agricultural Engineering Team. We are a group of agricultural engineers that work with farmers and agribusiness professionals to help improve the efficiency, profitability, and environmental outcomes on farms. This podcast will feature information and interviews with ISU Extension field ag engineers and others with expertise in engineering and environmental issues in agriculture. We will cover a var ...
  continue reading
 
Artwork

1
Raising Health

Andreessen Horowitz, a16z Bio + Health

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
A myriad of AI, science, and technology experts explore the real challenges and enormous opportunities facing entrepreneurs who are building the future of health. Raising Health, a podcast by a16z Bio + Health and hosted by Kris Tatiossian and Olivia Webb, dives deep into the heart of biotechnology and healthcare innovation. Join veteran company builders, operators, and investors Vijay Pande, Julie Yoo, Vineeta Agarwala, and Jorge Conde, along with distinguished guests like Mark Cuban, Greg ...
  continue reading
 
Artwork

1
The AI Health Podcast

Pranav Rajpurkar, Adriel Saporta, Oishi Banerjee, Marc Robbins

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Explore the ways in which AI will transform healthcare, biotech, and medicine through conversations with entrepreneurs, investors and scientists. Hosted by Pranav Rajpurkar and Adriel Saporta. Produced by Oishi Banerjee and Marc Robbins.
  continue reading
 
Join award-winning, indie author, Dianne Burckhardt, as she chats with fellow authors and industry insiders around the world about their work, inspirations, greatest challenges, and triumphs. Writing is often the easy part, and the real work begins once the author writes, "The End." Dianne and her guests shed light on what it takes to be a successful author in today's markets whether as an indie author or traditionally published. Dianne's guests share their insights on their personal journey ...
  continue reading
 
Artwork

4
Great News

Andrew McGivern

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Tired of all the Doom & Gloom news from mainstream media? You'll get none of that here... Instead, you’ll find Great News, inspiring stories, and developments that are making the world a better place. This is the Great News Podcast.
  continue reading
 
Artwork

1
Mission Shunya

Girish Shivakumar

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Mission Shunya (Shunya=Zero) is all about the transition to a zero carbon economy. The podcast features conversations related to clean-tech and sustainability. A new podcast episode is released every fortnight. Experts from around the world are featured along with people whose businesses and actions are having a positive impact and aims to inspire every individual take action to do their bit for the planet. Renewable energy, electric vehicles, sustainable development, climate change, circula ...
  continue reading
 
✈️ The Zero To Travel Podcast has been downloaded 12+ million times and named a "Best Travel Podcast" by The Washington Post, Travel + Leisure, The Telegraph, and Forbes. Packed with life-changing perspectives, inspiration, and practical advice for everyone from travel newbies to nomads, this podcast will give you everything you need to travel the world on your terms, regardless of your situation or experience. Welcome to our amazing global listening community! Since 2013, "Travel Ambassador ...
  continue reading
 
Artwork

1
BIOS

Alix Ventures

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
BIOS Podcast brings together cutting-edge insights from Life Science industry leaders at the forefront of innovation. Join us in hearing from Founders, Investors, Professors, & Pharma operating at the intersection of Technology & Biology. By Alix Ventures: Driving Patient Impact - Supporting early stage Life Science startups engineering biology to drive radical advances in human health. Learn more @ BIOS.community / Alix.vc __________________________________ Alix Ventures, by way of BIOS Com ...
  continue reading
 
Artwork
 
Welcome to the Security Weekly Podcast Network, your all-in-one source for the latest in cybersecurity! This feed features a diverse lineup of shows, including Application Security Weekly, Business Security Weekly, Paul's Security Weekly, Enterprise Security Weekly, and Security Weekly News. Whether you're a cybersecurity professional, business leader, or tech enthusiast, we cover all angles of the cybersecurity landscape. Tune in for in-depth panel discussions, expert guest interviews, and ...
  continue reading
 
Artwork

1
Unapologetically Outspoken

Stephanie Keith and Tara Munjekovich

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly+
 
A few years ago, we were just two mainstream, everyday American women who both had very little interest in federal or global politics. But like many of you, the onslaught of cancel culture, virtue signaling, censorship, and the twisted narrative of patriotic Americans being a “threat to democracy” that started being forced down our throats by the federal government and mainstream media back in 2021 made us feel frustrated, isolated, and angry. Instead of sitting back and quietly taking it as ...
  continue reading
 
Loading …
show series
 
Join the conversation, text us now. Bleeped words: k!lled (twice), d!ed, Hello My Happy People, This week on Book Banter with Dianne Burckhardt – Book Talk Podcast, I sit down with Qin (“Ching”) Sun Stubis, award-winning author of Once Our Lives. Her memoir shares the unforgettable story of four generations of Chinese women who endured war, revolut…
  continue reading
 
Securing top-tier cybersecurity leadership is not just a necessity but a significant challenge, especially when working within budget constraints. Should you hire a full-time CISO or outsource to a vCISO provider? Brian Haugli, CEO at SideChannel, joins BSW to discuss how organizations can hire a Virtual CISO (vCISO) to benefit from their expertise…
  continue reading
 
Getting a Better Handle on International Domain Names and Punycode International Domain names can be used for phishing and other attacks. One way to identify suspect names is to look for mixed script use. https://isc.sans.edu/diary/Getting%20a%20Better%20Handle%20on%20International%20Domain%20Names%20and%20Punycode/32234 Citrix Netscaler Vulnerabil…
  continue reading
 
What can happen when a filmmaker decides to spotlight invisible geniuses and hidden stories that change how we see the world? Robin Danehav is a Swedish documentary filmmaker known for embarking on a bold quest to create 100 short films revealing the everyday impact-makers whose stories remain untold. Based in Stockholm and often traveling worldwid…
  continue reading
 
The EU Cyber Resilience Act joins the long list of regulations intended to improve the security of software delivered to users. Emily Fox and Roman Zhukov share their experience education regulators on open source software and educating open source projects on security. They talk about creating a baseline for security that addresses technical items…
  continue reading
 
Reading Location Position Value in Microsoft Word Documents Jessy investigated how Word documents store the last visited document location in the registry. https://isc.sans.edu/diary/Reading%20Location%20Position%20Value%20in%20Microsoft%20Word%20Documents/32224 Weaponizing image scaling against production AI systems AI systems often downscale imag…
  continue reading
 
Interview with Harish Peri from Okta Oktane Preview: building frameworks to secure our Agentic AI future Like it or not, Agentic AI and protocols like MCP and A2A are getting pushed as the glue to take business process automation to the next level. Giving agents the power and access they need to accomplish these lofty goals is going to be challengi…
  continue reading
 
The end of an era: Properly formatted IP addresses in all of our data. When initiall designing DShield, addresses were zero padded , an unfortunate choice. As of this week, datafeeds should no longer be zero padded . https://isc.sans.edu/diary/The%20end%20of%20an%20era%3A%20Properly%20formated%20IP%20addresses%20in%20all%20of%20our%20data./32228 .d…
  continue reading
 
Humans wiped out by 2040, Okta, Elastic, Bad Bots, Berserk Bear, Siemens, Philip K. Dick, Aaran Leyland, and More, on this edition of the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-505
  continue reading
 
Don't Forget The "-n" Command Line Switch Disabling reverse DNS lookups for IP addresses is important not just for performance, but also for opsec. Xavier is explaining some of the risks. https://isc.sans.edu/diary/Don%27t%20Forget%20The%20%22-n%22%20Command%20Line%20Switch/32220 watchTowr releases details about recent Commvault flaws Users of the …
  continue reading
 
This segment is sponsored by Flashpoint. Visit https://securityweekly.com/flashpoint to learn more about them! Recent leaks tied to LockBit and Black Basta have exposed the inner workings of two of the most notorious ransomware groups—revealing their tactics, negotiation strategies, and operational infrastructure. For defenders, this rare window in…
  continue reading
 
Do you ever feel limited by society’s expectations and stereotypes surrounding travel? When Beth Santos started a travel blog, her goal was to challenge norms by exploring the diverse and shared experiences of women traveling the world. It has since morphed into Wanderful, an international community and social network with over 40,000 active member…
  continue reading
 
Airtel Router Scans and Mislabeled Usernames A quick summary of some odd usernames that show up in our honeypot logs https://isc.sans.edu/diary/Airtel%20Router%20Scans%2C%20and%20Mislabeled%20usernames/32216 Apple Patches 0-Day CVE-2025-43300 Apple released an update for iOS, iPadOS and MacOS today patching a single, already exploited, vulnerabilit…
  continue reading
 
Join the conversation, text us now. Hello My Happy People, This week on Book Banter with Dianne Burckhardt – Book Talk Podcast, I am joined by Marcia Peck, an award-winning author and lifelong musician who has spent over 50 years as a cellist with the Minnesota Orchestra. Marcia brings her love of rhythm, melody, and storytelling together in her de…
  continue reading
 
The industry is obsessed with vulnerabilities. From vulnerability assessment to vulnerability management to exposure management and even zero days, we love to talk about vulnerabilities. But what about misconfiguration? By definition it's a vulnerability or weakness, but it doesn't have a CVE (common vulnerability enumeration). Should we ignore it?…
  continue reading
 
Increased Elasticsearch Recognizance Scans Our honeypots noted an increase in reconnaissance scans for Elasticsearch. In particular, the endpoint /_cluster/settings is hit hard. https://isc.sans.edu/diary/Increased%20Elasticsearch%20Recognizance%20Scans/32212 Microsoft Patch Tuesday Issues Microsoft noted some issues deploying the most recent patch…
  continue reading
 
What if the secret to unlocking a better life and travel experience lies not in more, but in smarter choices? Chris Hutchins is the host of the “All the Hacks” podcast, where he distills practical strategies across life, money, and travel. An optimizer by nature, Chris has saved millions by breaking down every aspect of life to maximize happiness a…
  continue reading
 
A smaller attack surface should lead to a smaller list of CVEs to track, which in turn should lead to a smaller set of vulns that you should care about. But in practice, keeping something like a container image small has a lot of challenges in terms of what should be considered minimal. Neil Carpenter shares advice and anecdotes on what it takes to…
  continue reading
 
Keeping an Eye on MFA Bombing Attacks Attackers will attempt to use authentication fatigue by bombing users with MFA authentication requests. Rob is talking in this diary about how to investigate these attacks in a Microsoft ecosystem. https://isc.sans.edu/diary/Keeping+an+Eye+on+MFABombing+Attacks/32208 Critical Cisco Secure Firewall Management Ce…
  continue reading
 
Interview with Snehal Antani - Rethinking Risk-Based Vulnerability Management Vulnerability management is broken. Organizations basically use math to turn a crappy list into a slightly less crappy list, and the hardest part of the job as a CIO is deciding what NOT to fix. There has to be a better way, and there is... Segment Resources: https://hori…
  continue reading
 
SNI5GECT: Sniffing and Injecting 5G Traffic Without Rogue Base Stations Researchers from the Singapore University of Technology and Design released a new framework, SNI5GECT, to passively sniff and inject traffic into 5G data streams, leading to DoS, downgrade and other attacks. https://isc.sans.edu/diary/SNI5GECT%3A%20Sniffing%20and%20Injecting%20…
  continue reading
 
What does it take to build trust in nuclear energy? Behind every advanced reactor design, every regulatory approval, and every safety system lies a complex web of risk analysis — and that’s where Probabilistic Risk Assessment (PRA) comes in. In this episode, we sit down with Jenifer Avellaneda Díaz, a PRA & Risk Analysis Engineer, to explore the fo…
  continue reading
 
AI and Faster Attack Analysis A few use cases for LLMs to speed up analysis https://isc.sans.edu/diary/AI%20and%20Faster%20Attack%20Analysis%20%5BGuest%20Diary%5D/32198 Proxyware Malware Being Distributed on YouTube Video Download Site Popular YouTube download sites will attempt to infect users with proxyware. https://asec.ahnlab.com/en/89574/ Xero…
  continue reading
 
We kick things off with a deep dive into the Hackberry PI and how to build one. Then in the security news: Will Perplexity buy Chrome? ESP32 Bus Pirates Poisoned telemetry Docker image security Fully Open Source Quantum Sensors Securing your car, Flippers, and show me the money Bringing your printer and desktop to Starbucks Paying a ransom? You nee…
  continue reading
 
The metaverse is often thought of as an alternative virtual space, a world separate from reality where we can hang out with avatars of our friends and families, or shop at virtual stores. But the industrial metaverse ties the physical and the virtual much more closely together, with a focus that is less on photorealism, and more on using connected …
  continue reading
 
CVE-2017-11882 Will Never Die The (very) old equation editor vulnerability is still being exploited, as this recent sample analyzed by Xavier shows. The payload of the Excel file attempts to download and execute an infostealer to exfiltrate passwords via email. https://isc.sans.edu/diary/CVE-2017-11882%20Will%20Never%20Die/32196 Windows Kerberos El…
  continue reading
 
Join the conversation, text us now. Hello Happy People, In this episode of Book Banter with Dianne Burckhardt – Book Talk Podcast, I sit down with Alison Beder Solway, author of The Miles We Run, for an emotional and deeply moving conversation. Alison opens up about her personal journey through the challenges, heartbreaks, and triumphs of surrogacy…
  continue reading
 
As brands grow more digital, the threats grow more personal. Attackers impersonate executives, spin up fake websites, and leak sensitive data — hurting business reputations and breaking customer trust. How do you defend your organization's reputation and customers' trust? Santosh Nair, Co-Founder and CTO at Styx Intelligence, joins Business Securit…
  continue reading
 
Microsoft Patch Tuesday https://isc.sans.edu/diary/Microsoft%20August%202025%20Patch%20Tuesday/32192 https://cymulate.com/blog/zero-click-one-ntlm-microsoft-security-patch-bypass-cve-2025-50154/ libarchive Vulnerability A libarchive vulnerability patched in June was upgraded from a low CVSS score to a critical one. Libarchive is used by compression…
  continue reading
 
Could a loosely planned road trip actually turn out better than a perfectly mapped itinerary? Anne Dorthe is my wife and travel partner of over 11 years, and a Norwegian local with roots in Trøndelag. In this episode, Anne and I share the story of our recent open-ended family road trip through Norway. We talk about the lessons we learned along the …
  continue reading
 
Open source software is a massive contribution that provides everything from foundational frameworks to tiny single-purpose libraries. We walk through the dimensions of trust and provenance in the software supply chain with Janet Worthington. And we discuss how even with new code generated by LLMs and new terms like slopsquatting, a lot of the most…
  continue reading
 
Erlang OTP SSH Exploits A recently patched and easily exploited vulnerability in Erlang/OTP SSH is being exploited. Palo Alto collected some of the details about this exploit activity that they observed. https://unit42.paloaltonetworks.com/erlang-otp-cve-2025-32433/ WinRAR Exploited WinRAR vulnerabilities are actively being exploited by a number of…
  continue reading
 
Topic Segment - What's new at Black Hat? We're coming live from hacker summer camp 2025, so it seemed appropriate to share what we've seen and heard so far at this year's event. Adrian's on vacation, so this episode is featuring Jackie McGuire and Ayman Elsawah! News Segment Then, in the enterprise security news, Tons of funding! SentinelOne picks …
  continue reading
 
Google Paid Ads for Fake Tesla Websites Someone is setting up fake Tesla lookalike websites that attempt to collect credit card data from unsuspecting users trying to preorder Tesla products. https://isc.sans.edu/diary/Google%20Paid%20Ads%20for%20Fake%20Tesla%20Websites/32186 Compromising USB Devices for Persistent Stealthy Access USB devices, like…
  continue reading
 
This week we have, SonicWall, Confidential Informants Exposed, Cisco Vishing, Perplexity vs robots.txt, Microsoft’s Project Ire, Meta–Flo Jury Verdict, GPT‑5 Lands, TeaOnHer Data Leak, Josh Marpet, and more on the Security Weekly News.. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-…
  continue reading
 
Mass Internet Scanning from ASN 43350 Our undergraduate intern Duncan Woosley wrote up aggressive scans from ASN 43350 https://isc.sans.edu/diary/Mass+Internet+Scanning+from+ASN+43350+Guest+Diary/32180/#comments HTTP/1.1 Desync Attacks Portswigger released details about new types of HTTP/1.1 desync attacks it uncovered. These attacks are particular…
  continue reading
 
Why should hate AI When firmware attacks The 300 second breach Old ways still work, AI might help And so begins the crawler wars Turn off your SonicWall VPN Your Pie may be wrapped in PII Attackers will find a way Signed kernel drivers D-Link on the KEV Rasperry PIs attack Stealthy LoRa LLM's don't commit code, people do Jame's Bond style rescue wi…
  continue reading
 
Alan Lusty founded adi Group, a multidisciplinary engineering business supporting major manufacturers. He is part of a group that offers engineering services in 23 sectors, with over 750 employees. But he left school at 16 without qualifications, instead pursuing an apprenticeship. At adi Group, more than 10% of employees are apprentices: double th…
  continue reading
 
What are the best hidden gems in Riga, Latvia, and how can you experience this Baltic city like a local? Lelde Benke-Lungevica is a Latvian writer and cultural storyteller who was born in Australia and moved back to Riga in her teens. Since 2013, she’s run the blog Life in Riga, offering a personal and authentic look at life in Latvia’s capital thr…
  continue reading
 
Do Sextortion Scams Still Work in 2025? Jan looked at recent sextortion emails to check if any of the crypto addresses in these emails received deposits. Sadly, some did, so these scams still work. https://isc.sans.edu/diary/Do%20sextortion%20scams%20still%20work%20in%202025%3F/32178 Akira Ransomware Group s use of Drivers Guidepoint Security obser…
  continue reading
 
In this episode, Julie Yoo and Jay Rughani are joined by Thatch cofounders Chris Ellis and Adam Stevenson to explore why ICHRA—a more recent policy innovation—might quietly revolutionize employer-sponsored health benefits. Unpacking the surprising history of how U.S. healthcare became entangled with employment, they make the case for a defined-cont…
  continue reading
 
Join the conversation, text us now. Hello My Happy People, Have I got a show for you today! In this inspiring episode of Book Banter with Dianne Burckhardt – Book Talk Podcast, I share my interview with the effervescent Risa August—award-winning author, speaker, Gestalt practitioner, and rare disease warrior with sparkles in her hair and a tutu in …
  continue reading
 
🚨Become a beta tester for our new Unapologetically Outspoken GPT! Use the link here or head over to our website: ⁠⁠⁠⁠⁠https://www.thelawofattractiontribe.com/a/2148108179/MpCJCAPZ⁠⁠ Want to join the conversation? Connect with Tara and Stephanie on TikTok, X, Rumble, YouTube, Truth Social, Facebook, and IG.⁠⁠⁠ ⁠⁠https://msha.ke/unapologeticallyoutsp…
  continue reading
 
Recent findings of AI ecosystem insecurities and attacks show the importance of needing AI governance in the supply chain. And this supply chain is rapidly expanding to include not only open-source software but also collaborative platforms where custom models, agents, prompts, and other AI resources are used. And with this expansion of third-party …
  continue reading
 
Stealing Machinekeys for fun and profit (or riding the SharePoint wave) Bojan explains in detail how .NET uses Machine Keys to protect the VIEWSTATE, and how to abuse the VIEWSTATE for code execution if the Machine Keys are lost. https://isc.sans.edu/diary/Stealing%20Machine%20Keys%20for%20fun%20and%20profit%20%28or%20riding%20the%20SharePoint%20wa…
  continue reading
 
Loading …
Copyright 2025 | Privacy Policy | Terms of Service | | Copyright
Listen to this show while you explore
Play