Search a title or topic

Over 20 million podcasts, powered by 

Player FM logo

Distributing Solar Podcasts

show episodes
 
Artwork

1
Distributing Solar

Distributing Solar

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
In Distributing Solar, we speak to entrepreneurs and experts working in energy access and off-grid solar in emerging markets, bringing to life how distributed energy is changing lives around the world. Visit us at www.distributingsolar.com Contact us at [email protected]
  continue reading
 
Candid conversations with the leaders shaping a more sustainable future. Hosted by Chad Reed, Gil Jenkins, Hilary Langer, and Guy Van Syckle. Produced by HASI, a U.S.-based sustainable infrastructure investor.
  continue reading
 
Artwork

1
Local Energy Rules

Local Energy Rules

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
This bi-weekly podcast from the Institute for Local Self-Reliance shares powerful stories of local renewable energy, from mayors discussing their city’s commitment to 100% renewable energy to tales of innovative community owned solar to questions about the the best rooftop solar policy. Join host John Farrell, the director of the Institute’s Energy Democracy Initiative, as he asks if the 100-year-old monopoly market structure for electricity delivery makes sense in an on-demand, distributed ...
  continue reading
 
Energy Future: Powering Tomorrow's Cleaner World" invites listeners on a journey through the dynamic realm of energy transformation and sustainability. Delve into the latest innovations, trends, and challenges reshaping the global energy landscape as we strive for a cleaner, more sustainable tomorrow. From renewable energy sources like solar and wind to cutting-edge technologies such as energy storage and smart grids, this podcast explores the diverse pathways toward a greener future. Join i ...
  continue reading
 
Artwork

1
Security Weekly Podcast Network (Audio)

Security Weekly Productions

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Daily
 
Welcome to the Security Weekly Podcast Network, your all-in-one source for the latest in cybersecurity! This feed features a diverse lineup of shows, including Application Security Weekly, Business Security Weekly, Paul's Security Weekly, Enterprise Security Weekly, and Security Weekly News. Whether you're a cybersecurity professional, business leader, or tech enthusiast, we cover all angles of the cybersecurity landscape. Tune in for in-depth panel discussions, expert guest interviews, and ...
  continue reading
 
Artwork

1
The Green Blueprint

Latitude Media

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
We already have many of the climate solutions we need. But scaling them is hard. The Green Blueprint is a show about the people who are architecting the clean economy. Every other week, host Lara Pierpoint profiles the founders, investors, and organizational leaders who are solving complex challenges in the quest to build climate technologies fast.
  continue reading
 
Artwork

1601
Sustainability Explored

Sustainability Explored

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
This is a podcast on sustainability and innovations in business and economy, a great place to learn more about sustainability across industries. We invite professionals working on the implementation of innovative sustainable solutions for the future - to explore circularity and resilience, corporate social responsibility, leadership and culture, impact investment and so on, and give some guidance on how to actually implement sustainability in business.
  continue reading
 
Loading …
show series
 
Segment 1: Interview with Rob Allen It’s the Year of the (Clandestine) Linux Desktop! As if EDR evasions weren’t enough, attackers are now employing yet another method to hide their presence on enterprise systems: deploying tiny Linux VMs. Attackers are using Hyper-V and/or WSL to deploy tiny (120MB disk space and 256MB memory) Linux VMs to host a …
  continue reading
 
Augustus De Morgan, Doordash, Fortiweb, Typosquatting, Vista, Ransomware, AI, Josh, Rob, Aaran, Jason, Dr. Scott, Rocky, Uh., and More on this edition of the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-529
  continue reading
 
This week: Minecraft on your lightbulb Sonicwall breached, who's next? Ditch Android, install Linux Hacking your face Thermostat freedom Pen test fails HackRF hacking times 2 Going around EDR Hackers in your printer Chinese data breach NFC relays and PCI Constructive construction hacks FlipperZero firmware update ICS, PLCs, and attacks Bayesian Swi…
  continue reading
 
Learn how this state is ramping up the fight with the feds for local, clean energy affordability and access. | Show page available: https://ilsr.org/article/energy-democracy/MN-fights-feds-ler253/| Listen to all of our Local Energy Rules podcast episodes at our site: https://ilsr.org/energy/local-energy-rules-podcast/ | Don't forget to subscribe, s…
  continue reading
 
As AI revolutionizes how we work, it has created a new attack surface with new technologies. One of those new technologies is Model Context Protocol (MCP). MCP has emerged as the standard for connecting AI to external tools, but its flexibility has created security challenges. How do we secure MCP? Rahul Parwani, Head of Product, Security Solutions…
  continue reading
 
Miles Davis, Jimmy Buffet, 10/8 time, Lost Phones, Phishing, Whisper Leak, Quantum Route Redirect, AI Galore, Rob Allen, and more on the Security Weekly News. Segment Resources: https://www.bleepingcomputer.com/news/security/how-a-ransomware-gang-encrypted-nevada-governments-systems/ This segment is sponsored by ThreatLocker. Visit https://security…
  continue reading
 
Just how bad can things get if someone clicks on a link? Rob Allen joins us again to talk about ransomware, why putting too much attention on clicking links misses the larger picture of effective defenses, and what orgs can do to prepare for an influx of holiday-infused ransomware targeting. Segment resources https://www.bleepingcomputer.com/news/s…
  continue reading
 
Segment 1: OT Security Doesn’t Have to be a Struggle OT/ICS/SCADA systems are often off limits to cybersecurity folks, and exempt from many controls. Attackers don’t care how fragile these systems are, however. For attackers aiming to disrupt operations, fragile but critical systems fit criminals’ plans nicely. In this interview, we discuss the cha…
  continue reading
 
This year in the U.S., steel manufacturers will produce more than 71 million tons of steel – enough to build nearly 200 Empire State buildings. It's a stunning statistic, but not surprising. The steel industry has fueled economic growth and innovation in America since the early 1800s. But for every ton of conventional steel produced, two tons of CO…
  continue reading
 
In this Week 5 – October 2025 Energy Update, I take a look at another eventful week in U.S. energy — one defined by offshore wind setbacks, renewed nuclear ambitions, and AI-driven grid innovation. I start with Shell’s withdrawal from Atlantic Shores Offshore Wind, which leaves EDF Renewables as the sole developer after a key EPA permit was pulled.…
  continue reading
 
This week: Reversing keyboard firmware Ghost networks Invasion of the face changers Ghost tapping and whole lot of FUD AI doesn't code securely, but Aardvark can secure code De-Googling Thermostats Dodgy Android TV boxes can run Debian HackRF vs. Honda Cyberslop AI paper Turning to the darkside Poisoning the watering hole Nagios vulnerabilities VPN…
  continue reading
 
Learn about how this Minnesota lawmaker wants to tackle her state’s energy problems. Show page available: https://ilsr.org/article/energy-democracy/acomb-ler252/| Listen to all of our Local Energy Rules podcast episodes at our site: https://ilsr.org/energy/local-energy-rules-podcast/ | Don't forget to subscribe, share with your friends, leave a rec…
  continue reading
 
It’s been eight years since Hurricane Maria struck Puerto Rico, causing one of the longest power outages in U.S. history and leaving behind a fragile electric grid. But Puerto Ricans have taken their future into their own hands, and thousands of locals have invested in solar panels and batteries to keep the lights on for themselves and for everyone…
  continue reading
 
What's the biggest attack vector for breaches besides all of the human related ones (i.e., social engineering, phishing, compromised credentials, etc.)? You might think vulnerabilities, but it's actually misconfiguration. The top breach attack vectors are stolen or compromised credentials, phishing, and misconfigurations, which often work together.…
  continue reading
 
Pull requests are a core part of collaboration, whether in open or closed source. GitHub has documented some of the security consequences of misconfiguring how PRs can trigger actions. But what happens when repo owners don't read the docs? Bar Kaduri and Roi Nisimi walk through their experience in reading docs, finding vulns, demonstrating exploits…
  continue reading
 
Segment 1: Interview with Joel Burleson-Davis Frontline workers can’t afford to be slowed down by manual, repetitive logins, especially in mission-critical industries where both security and productivity are crucial. This segment will explore how inefficient login methods erode productivity, while workarounds like shared credentials increase risk, …
  continue reading
 
AI Cheating?, O, Canada, npms, passkeys, Exchange, Solaris, the amazing Rob Allen of Threatlocker, and More on this edition of the Security Weekly News. Segment Resources: Ingram Micro Working Through Ransomware Attack by SafePay Group | MSSP Alert: https://www.msspalert.com/news/ingram-micro-working-through-ransomware-attack-by-safepay-group This …
  continue reading
 
In this week’s Energy Update, I take a look at some of the biggest developments shaping the global energy landscape — from a nuclear revival in South Carolina to solar and battery breakthroughs overseas. South Carolina’s Santee Cooper has selected Brookfield as its partner to restart the long-abandoned 2.3 GW V.C. Summer nuclear plant, signaling re…
  continue reading
 
In the security news this week: Cybersecurity is dead, and AI killed it Exploiting the patching system Apple makes it easier for spyware Who is patching Cisco ASA? Shove that DMCA somewhere HTTPS - a requirement Russia wants to own all the exploits Abandonware challenges Reversing at its hardest with Lua Hacking team is back, and leetspeak malware …
  continue reading
 
No state in America is currently doing utility regulation well. But there’s hope.| Show page available: https://ilsr.org/article/energy-democracy/states-all-do-a-bad-job-ler250/| Listen to all of our Local Energy Rules podcast episodes at our site: https://ilsr.org/energy/local-energy-rules-podcast/ | Don't forget to subscribe, share with your frie…
  continue reading
 
In this episode of Climate Positive, Guy Van Syckle and Gil Jenkins sit down with Caroline Spears, Executive Director of Climate Cabinet, a nonprofit dedicated to supporting clean energy and climate policy leaders at state and local levels. These often-forgotten races are sometimes decided by a couple hundred votes and can also decide the fate of b…
  continue reading
 
Organizations that successfully earn and keep the trust of their customers, employees, and partners experience better business outcomes, more engagement, and competitive differentiation. But what does that trust look like and who's responsible for building and maintaining that trust? Jeff Pollard, Vice-President, Principal Analyst on the Security a…
  continue reading
 
The post quantum encryption migration is going to be a challenge, but how much of a challenge? There are several reasons why it is different from every other protocol and cypher iteration in the past. Is today's hardware up to the task? Is it just swapping out a library, or is there more to it? What is the extent of software, systems, and architect…
  continue reading
 
Segment 1: Interview with Dave Lewis from 1Password In this week's sponsored interview, we dive into the evolving security landscape around AI agents, where we stand with AI agent adoption. We also touch on topics such as securing credentials in browser workflows and why identity is foundational to AI agent security. 1Password Addresses a Critical …
  continue reading
 
Venomous Robo Bees and Rabid Cocaine Weasels, sidebar spoofing, AI Risk, Red Tiger, SessionReaper, Bad Bots, Willow, Josh Marpet, and More on this edition of the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-523
  continue reading
 
Energy Future: Powering Tomorrow’s Cleaner World with Peter Kelly-Detwiler explores the forces reshaping the global energy landscape — from grid reliability in the U.S. to renewable breakthroughs in Europe and Asia. Each episode dives into the week’s most important developments across clean energy, power markets, EVs, nuclear innovation, hydrogen, …
  continue reading
 
In the security news: When in doubt, blame DNS, you're almost always correct How to Make Windows 11 great, or at least suck less CSRF is the least of your problems Shady exploits Linux security table stakes (not steaks) The pill camera Give AI access to your UART Security products that actually try to be secure? Firmware vulnerabilities, lots of th…
  continue reading
 
BlackRock just bought Minnesota Power. But these consumer advocates haven’t stopped fighting for utility accountability.| Show page available: https://ilsr.org/article/after-BlackRock-ler249/ | Listen to all of our Local Energy Rules podcast episodes at our site: https://ilsr.org/energy/local-energy-rules-podcast/ | Don't forget to subscribe, share…
  continue reading
 
The PJM electricity market is embroiled in a crisis where ratepayers are being gouged to line the pockets of generation owners.| Show page available: https://ilsr.org/article/energy-democracy/how-to-fix-PJM-ler248/| Listen to all of our Local Energy Rules podcast episodes at our site: https://ilsr.org/energy/local-energy-rules-podcast/ | Don't forg…
  continue reading
 
In 2007 Sam White, co-founder of Promethean Power Systems, was traveling through India looking for a rural electrification problem to solve. He and his team had just won a $10,000 grant in an MIT competition, and they wanted to find an industry in India that needed their help. After looking at the sugar industry and the grape industry, they finally…
  continue reading
 
As the Verizon Data Breach Investigations Report has stated year after year, most breaches start with human error. We've invested a lot in Security Awareness and Training and Phishing solutions, but yet human error is still the top risk. How do we actually reduce human risk? Rinki Sethi, CSO at Upwind Security, and Nicole Jiang, CEO of Fable Securi…
  continue reading
 
The Afterlife, AWS, ClickFix, Agentic AI Galore, Robot Lumberjacks, Robocalls, Aaran Leyland, and more on the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-522 This segment is sponsored by ThreatLocker. Visit https://securityweekly.com/threatlocker to learn mor…
  continue reading
 
Ransomware attacks typically don't care about memory safety and dependency scanning, they often target old, unpatched vulns and too often they succeed. Rob Allen shares some of the biggest cases he's seen, what they have in common, and what appsec teams could do better to help them. Too much software still requires custom configuration to make it m…
  continue reading
 
Segment 1: David Brauchler on AI attacks and stopping them David Brauchler says AI red teaming has proven that eliminating prompt injection is a lost cause. And many developers inadvertently introduce serious threat vectors into their applications – risks they must later eliminate before they become ingrained across application stacks. NCC Group’s …
  continue reading
 
A landmark utility proposal to own energy storage on customer property also cements its monopoly power. Show page available: https://ilsr.org/article/energy-democracy/monopoly-utilities-distributed-energy-ler247/| Listen to all of our Local Energy Rules podcast episodes at our site: https://ilsr.org/energy/local-energy-rules-podcast/ | Don't forget…
  continue reading
 
First up is a technical segment on UEFI shells: determining if they contain dangerous functionality that allows attackers to bypass Secure Boot. Then in the security news: Your vulnerability scanner is your weakest link Scams that almost got me The state of EDR is not good You don't need to do that on a phone or Raspberry PI Hash cracking and explo…
  continue reading
 
Still managing compliance in a spreadsheet? Don't have enough time or resources to verify your control or risk posture? And you wonder why you can't get the budget to move your compliance and risk programs forward. Maybe it's time for a different approach. Trevor Horwitz, Founder and CISO at TrustNet joins Business Security Weekly to discuss how th…
  continue reading
 
Interest and participation in the OWASP GenAI Security Project has exploded over the last two years. Steve Wilson explains why it was important for the project to grow beyond just a Top Ten list and address more audiences than just developers. He also talks about how the growth of AI Agents influences the areas that appsec teams need to focus on. W…
  continue reading
 
Segment 1 - Interview with Dr. Anand Singh We're always thrilled to have authors join us to discuss their new book releases, and this week, it is Dr. Anand Singh. He seriously hustled to get his new book, Data Security in the Age of AI, out as soon as possible so that it could help folks dealing with securing AI rollouts right now! We'll discuss wh…
  continue reading
 
Ballistic Hot Dogs, Sonicwall, Clayrat, Twonet, Lockbit, Breachforums, Resumes, Discord, Aaran Leyland, and More on this edition of the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-519
  continue reading
 
This week we kick things off with a special interview: Kieran Human from Threat Locker talks about EDR bypasses and other special projects. In the security news: Hacking TVs Flushable wipes are not the only problem People just want to spy on their pets, except the devices can be hacked Linux EDR is for the birds What does my hat say we love exploit…
  continue reading
 
Clean energy founders love to talk about technology, capital, and scale. But few are prepared for the fourth pillar of success: government. Shomik Dutta, a co-founder and managing partner at Overture VC, learned that lesson firsthand after a career that spanned Obama’s White House, private equity, and venture capital. His takeaway: “If you’re not a…
  continue reading
 
There’s still a chance to breathe new life into California’s rooftop solar ambitions.| Show page available: https://ilsr.org/article/energy-democracy/bright-spot-for-CA-solar-ler246/| Listen to all of our Local Energy Rules podcast episodes at our site: https://ilsr.org/energy/local-energy-rules-podcast/| Don't forget to subscribe, share with your …
  continue reading
 
Global spending on cybersecurity products and services will see a strong 14.4% CAGR from 2024 through 2029 and will hit $302.5 billion in 2029, driven by continued concerns around cyberattacks across all verticals and geographies. But where is the spending occuring and how do you prepare? Merritt Maxim, VP & Research Director at Forrester, joins Bu…
  continue reading
 
Loading …
Copyright 2025 | Privacy Policy | Terms of Service | | Copyright
Listen to this show while you explore
Play