Search a title or topic

Over 20 million podcasts, powered by 

Player FM logo

Emerging Vulnerabilities Podcasts

show episodes
 
Cyber defenders, listen up! The CYFIRMA Research podcast has some juicy intel on the latest cyber threats that are lurking in the shadows. Tune in to this security briefing to stay on top of emerging threats and be ready to tackle digital risk like never before.
  continue reading
 
Artwork

1
YusufOnSecurity.com

YusufOnSecurity.Com

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
This is a weekly podcast on cyber security domains. We discuss, dissect and demystify the world of security by providing an in-depth coverage on the cybersecurity topics that matter most. All these in plain easy to understand language. Like it, share it, and most importantly enjoy it!
  continue reading
 
Artwork

1
DIY Cyber Guy

David W. Schropfer

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
DIY Cyber Guy, hosted by David W. Schropfer, offers a approachable exploration of cybersecurity, emerging technologies (like AI and Quantum Computing) for all knowledge levels. Through dynamic podcasts, expert interviews, and engaging blog posts, DIY Cyber Guy provides practical, easy-to-apply tips to stay ahead of tech trends and protect your digital world. Whether you’re curious about cutting-edge tech or looking to secure your online life, DIY Cyber Guy makes complex topics both fun and a ...
  continue reading
 
Artwork

1
Catalyst Podcast

Launch by NTT DATA

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
Catalyst, a Launch by NTT DATA podcast, puts humans at the front and center of digital transformation. Each week, we feature thought leaders who share their insights on reinventing digital experiences, enhancing customer journeys, and driving innovation in the enterprise. From platform transformation to the latest advancements in AI, our guests delve into the challenges and triumphs of digital transformation, emphasizing the critical role of human ingenuity and leadership. Learn more about L ...
  continue reading
 
Artwork

4
DrZeroTrust

Dr. Chase Cunningham

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
Unlock the future of cybersecurity with the "Dr. Zero Trust Podcast" on all podcasting platforms! Join me as we delve into Zero Trust Security, redefining how we protect data and networks. Explore frameworks, threat prevention, identity management, exclusive interviews, and emerging tech. Whether you're a pro or just curious, trust me– this podcast is where those who value honesty and real insights go for their cybersecurity insights! Tune in on Spotify, Google, or ITunes now. #DrZeroTrustPo ...
  continue reading
 
🎙️ Welcome to the Microsoft Intune and Security Report Podcast🎙️ — your essential stop for the latest in Windows and Edge security! This podcast is designed to be a time-saving powerhouse, distilling the most critical updates, new features, and emerging vulnerabilities from multiple trusted sources into one convenient, ready-to-reference report. Each week, we dig deep into the data to give you a concise, actionable rundown on the security landscape, helping you stay one step ahead. So whethe ...
  continue reading
 
Artwork

1
Talos Takes

Cisco Talos

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
Every week, host Hazel Burton brings on a new guest from Talos or the broader Cisco Security world to break down a complicated security topic. We cover everything from breaking news to attacker trends and emerging threats.
  continue reading
 
Artwork

4
ECDC: On Air

European Centre for Disease Prevention and Control

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
A peek behind the scenes at the European Centre for Disease Prevention and Control - the EU agency that aims to identify, assess and communicate current and emerging threats to human health posed by infectious diseases in Europe. Hear from our experts on a wide range of topics as they discuss the things that matter, and give you a crash course in Epidemiology 101.
  continue reading
 
Secure Talk reviews the latest threats, tips, and trends on security, innovation, and compliance. Host Justin Beals interviews leading privacy, security and technology executives to discuss best practices related to IT security, data protection and compliance. Based in Seattle, he previously served as the CTO of NextStep and Koru, which won the 2018 Most Impactful Startup award from Wharton People Analytics. He is the creator of the patented Training, Tracking & Placement System and the auth ...
  continue reading
 
Artwork
 
An emerging podcast about emerging talent shared fortnightly hosted by romaan asche co-produced by caz kimber social media designs by mai tominaga social media edits by eden guade music by thomas asche find us instagram.com/tmypodcast facebook.com/tmypodcast welcome to themodernyouth
  continue reading
 
Artwork

4
Vulnerable U

Matt Johansen

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Welcome to Vulnerable U, a podcast where we explore the intersection of vulnerability and cyber security. Each episode, we explore how vulnerability can drive growth and foster community resilience within our industry. Get ready for thought-provoking conversations, real-life stories, and curated news that inspire you to embrace discomfort on the road to a more vulnerable you.
  continue reading
 
Artwork

1
Live Like a Leader with John Bates

John Bates - Executive Speaking Success

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Live Like a Leader Show — Where Great Leaders Master Great Communication L = f (c): Leadership is a function of Communication. Great leadership is a function of great communication. Join leadership communication expert, TEDx speaker, author, and executive coach John Bates, founder of Executive Speaking Success, as he explores the communication, leadership, and life secrets of the world’s top leaders. From NASA astronauts and bestselling authors to Navy SEALs, global executives, entrepreneurs ...
  continue reading
 
Artwork

1
Emerging Cyber Risk

Max Aulakh & Joel Yonts

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Thought leaders and experts Max Aulakh (Ignyte) and Joel Yonts (Secure Robotics) cover subjects such as the development of AI, cyber security and the how the future looks in terms of cyber risk.
  continue reading
 
Artwork

1
emergent wisdom

caitlin ludlow

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
emergent wisdom is a collection of raw stories, heart-full conversations, guided meditations, breath work, forest bathing and other energy-shifting resources to regulate the nervous system, cultivate connection and re-orient toward what is important. caitlin brings a wealth of embodied wisdom from her formal education in trauma-informed somatic therapy, outdoor education, yoga and mindfulness as well as her experiences mentoring youth in therapeutic and educational contexts, spending 110 con ...
  continue reading
 
Artwork

1
Risk & Repeat

TechTarget Editorial

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
The seemingly endless stream of cyberattacks and data breaches have put enterprises and the information security industry on their heels. TechTarget SearchSecurity editors Rob Wright and Peter Loshin travel through this dark world of hacks, vulnerabilities and repeated infosec failings to discuss why we’ve arrived at this point, and what can be done to improve things.
  continue reading
 
Artwork

4
daBOM

DJ Schleen

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
Wondering what all the hype about Software Bill of Materials or SBOMs is? They’ve become a regular talking point when discussing the composition of software, and if you haven’t heard of them yet, you surely will soon. Join DJ Schleen as he interviews experts who shed light on what Software Bill of Materials are, how they are used by organizations to exchange information on software composition, and the effect they will have on consumers of software from large organizations to government agen ...
  continue reading
 
Artwork

1
The Growth Project

Jason van Koll

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
The podcast for emerging and blue collar leaders looking to grow their leadership skills. Let’s explore some simple skills and knowledge which could transform your leadership and build better teams.
  continue reading
 
Artwork
 
Welcome to the Security Weekly Podcast Network, your all-in-one source for the latest in cybersecurity! This feed features a diverse lineup of shows, including Application Security Weekly, Business Security Weekly, Paul's Security Weekly, Enterprise Security Weekly, and Security Weekly News. Whether you're a cybersecurity professional, business leader, or tech enthusiast, we cover all angles of the cybersecurity landscape. Tune in for in-depth panel discussions, expert guest interviews, and ...
  continue reading
 
Artwork
 
Electricity. Finance. Transportation. Our water supply. In Hack the Plant, podcast host Bryson Bort looks for answers to the question: Does connecting these systems, and others, to the internet leaves us more vulnerable to attacks by our enemies? We often take these critical infrastructure systems for granted, but they’re all becoming increasingly dependent on the internet to function. From the ransomware threats of Colonial Pipeline to the failure of the Texas power grid, it is clear our in ...
  continue reading
 
Artwork

1
Moon to Moon

Britten LaRue

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
Moon to Moon is a podcast created by intuitive guide, Britten LaRue. Moon to Moon is a space to consider, celebrate, and share the ways we come home to ourselves, anchor through change, and uncover our power -- one month, one phase, one loving step at a time. Though the podcast focuses on healing and learning through the lens of Britten's primary interests in astrology, visual culture, tarot, energy healing, meditation, and intuition, the podcast welcomes all modalities and forms of experien ...
  continue reading
 
Social media's leading physician voice, Kevin Pho, MD, shares the stories of the many who intersect with our health care system but are rarely heard from. 15 minutes a day. 7 days a week. Welcome to The Podcast by KevinMD.
  continue reading
 
Artwork

1
Little Ruckus: Rule Breakers + Tastemakers

Adrienne Han, Big Dopamine PR

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Being ahead of the curve isn't for the faint of heart. Little Ruckus is your peek into the next consumer obsession. With each emerging trend we explore, we sit down with 3 individuals who’ve been propelling it. Join us for tales in persistence, pivots, and pop culture in the making. This is the little ruckus before the big racket.
  continue reading
 
Artwork

1
Know Thyself

André Duqum

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
Know Thyself is a community supporting you to KNOW the true nature of yourself and the world around you, THRIVE in your health, wealth, and relationships – ultimately empowering you to CREATE and share your true self with the world. Each week André Duqum interviews experts in their field; ranging from spiritual educators to cutting edge scientists, heart-led creatives & more on topics such as the true nature of ‘Self’, “what is reality?,” and exploring the fundamental pillars we all need to ...
  continue reading
 
Artwork

1
Giants Talk: A San Francisco Giants Podcast

Alex Pavlovic, Cole Kuiper, NBC Sports Bay Area

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly+
 
NBC Sports Bay Area’s Alex Pavlovic and Cole Kuiper bring you comprehensive coverage of the San Francisco Giants. Don’t miss out on in-depth analysis, breaking news coverage and exclusive interviews with Giants players, coaches and front-office personnel. Giants Talk has new episodes year-round, so subscribe now for all your San Francisco Giants needs.
  continue reading
 
Welcome to the Flexera Security Vulnerability Insight Podcast, your go-to source for all things related to cybersecurity, software vulnerabilities, and threat intelligence. In this engaging podcast series, we will dive deep into the ever-evolving world of digital security, providing you with valuable insights, expert interviews, and the latest industry trends. Hosted by Jeroen Braak and leading experts in the field, each episode explores critical topics such as: Vulnerability Management: Sta ...
  continue reading
 
Join us for a lively and hilarious exploration of the triumphs and trials of being a single mom, single woman, or just plain single. Hosted by Lisa from Ella-Go and accompanied by a multitude of co-hosts, this podcast is your go-to destination for laughter, empowerment, and real talk about navigating the world as independent women. From dating disasters to career victories, we cover it all with wit, humor, and a healthy dose of sisterhood. Each episode dives deep into the unique challenges a ...
  continue reading
 
The Bare Metal Cyber CISA Prepcast is a comprehensive, exam-focused podcast designed to help you master every domain of the Certified Information Systems Auditor (CISA) certification. With over 100 tightly structured episodes, this prepcast walks you through key concepts, audit techniques, IT governance, system acquisition, operations, resilience, and information asset protection—all aligned to ISACA’s exam objectives. Whether you're just beginning your study journey or need a high-impact re ...
  continue reading
 
In a world where technology and cybersecurity are constantly evolving, staying ahead of the curve is no longer just an option—it's a necessity. Prime Cyber Insights plunges you into the fast-paced universe of tech and cybersecurity, where the stakes are high, and the pace is relentless. Hosted by Niko Pulse and Kyra Pixel, this daily podcast is your essential guide to navigating the ever-changing landscape of technology and cybersecurity. From AI breakthroughs to the latest in cyber threats, ...
  continue reading
 
Artwork

1
Mental Health in Tech

Honest Conversations About Difficult Topics

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
In this podcast series hosted by Schalk Neethling and Schalk Venter, the conversation revolves around mental health in the tech industry. Each episode features a guest who joins the hosts in an honest and open discussion about their personal struggles with mental health. The hosts and guests offer valuable insights into tech workers' challenges, such as burnout, imposter syndrome, and work-life balance. They also explore the stigma surrounding mental health issues in the workplace and discus ...
  continue reading
 
#1 Cambridge University BNOC and ‘the best interviewer [The Body Coach Joe Wicks] has ever met’, I give guests legacy-worthy interviews that listeners can enjoy while cooking, commuting, relaxing, or walking their pets. Join D Quan-mmunity of 20 000+ https://www.CoffeesOnMeDavidQuan.com/ … where we kindly share ‘legacy-worthy’ life/study/career interviews, systems, and resources flourishing our Hero's Journey. Receive my Gifts repository & Newsletter – 100% free, all to forward on my blessin ...
  continue reading
 
Artwork
 
Welcome to UK News Daily, brought to you by Brief! Our AI selects the latest stories and top headlines and then delivers them to you each day in less than ten minutes (for more details, visit www.brief.news/how-it-works). Tune in to stay updated on the latest news from the UK, covering politics, culture, business, and more. Whether you're a UK resident, an expat, or simply interested in British affairs, UK News Daily is your reliable source. Tune in every day to be well-informed and to stay ...
  continue reading
 
Artwork

4
Kwik Brain with Jim Kwik

Jim Kwik, Your Brain Coach, Founder www.KwikLearning.com

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
Kwik Brain is a fun, fast-paced show designed to help busy people learn and achieve anything in a fraction of the time! Your coach, Jim Kwik (his real name), is the brain & memory trainer to elite mental performers, including many of the world’s leading CEO’s and celebrities. In this easy to digest bite-sized podcast, you will discover Kwik’s favorite shortcuts to read faster, remember more, and ‘supercharge’ your greatest wealth-building asset: your brain. Whether you’re a student, senior, ...
  continue reading
 
Artwork

1
Investing for Impact

British International Investment

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
We are the UK's development finance institution and impact investor, backed by the UK Government. With over 75 years’ experience, we are a trusted investment partner to businesses in Africa, Asia and the Caribbean. We invest to create productive, sustainable and inclusive economic outcomes for those that need our capital the most and who want to build better lives for themselves and their communities. We currently partner with over 1,000 businesses, working with our investees to help them su ...
  continue reading
 
Artwork

1
Leading Las Vegas

UNLV Emergency and Crisis Management Program

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Leading Las Vegas is a podcast produced by the Emergency and Crisis Management Program at the University of Nevada, Las Vegas. Each season, students in a Leadership, Innovation and Adaptability class interview prominent leaders, who discuss their leadership approaches, and how they prepare for, respond to, and recover from shocks and stresses faced by the community. Las Vegas is known for being the entertainment capital of the world. However, it is also a complex environment, with a highly d ...
  continue reading
 
Artwork

1
Snowball Psychology

Steven Bradshaw

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
A snowball is a life project that starts with a snowflake of intention and picks up energy and mass to become a snowball of vitality, authenticity, and yes real world success. Hosted by Steven Bradshaw, Psychotherapist, Executive Coach and Founder of Beyond Psychology Center--beyondpsychologycenter.com, LMFT #136584
  continue reading
 
Artwork

4
The Mobile Security Show

AT&T Tech Channel

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Daily+
 
The Mobile Security Show is a series of panel discussions on the emerging security trends and standards for high-powered mobile computing. Each episode is hosted by tech guru Veronica Belmont and security expert Dino Dai Zovi. The full video of each panel is available from the AT&T Tech Channel at http://techchannel.att.com
  continue reading
 
Artwork
 
The Mobile Security Show is a series of panel discussions on the emerging security trends and standards for high-powered mobile computing. Each episode is hosted by tech guru Veronica Belmont and security expert Dino Dai Zovi. The full video of each panel is available from the AT&T Tech Channel at http://techchannel.att.com
  continue reading
 
Artwork

1
COVID-19 Heroes

Lorraine Schneider

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
COVID-19 Heroes is a look into the many hearts and minds of the individuals working and helping on the front lines of the global pandemic. From medical professionals to store clerks, everyone has a role to play in moving society forward and stopping the spread of this deadly coronavirus. An emergency manager currently working for The Walt Disney Company, Lorraine Schneider uses her background and curiosity to find out what expertise, skill set and dedication it takes to lead the charge again ...
  continue reading
 
You’ve probably heard of the Japanese concept of “Ikigai” but are wondering how you can successfully apply it to your life. How do you start living a life of purpose, jumping out of bed, excited to face the day? Join the Tokyo based, British born facilitator and coach, Jennifer Shinkai and her guests to hear real-life stories of how regular people found and integrated their ikigai. Be inspired by how they took their first steps and how their lives have changed. Still don’t know what you want ...
  continue reading
 
Every great film and TV maker began as a Red Carpet Rookie. In this podcast each episode you’ll learn from the life and career story of someone who’s grown to the top of the entertainment business, hearing how they mastered their craft with lessons you can apply to harness your own creative talent in your own career and everyday life. From lessons given by Spielberg to Oscar-winners tips on imposter syndrome, and some pretty crazy on-set anecdotes thrown in for good measure… My name is Mike ...
  continue reading
 
Artwork

1
How to End a Pandemic

Center for Global Health Science and Security, Georgetown University

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
The How to End a Pandemic project is a Georgetown University initiative to systematically collect oral histories and insights from people who work in epidemics about how to end epidemics. Our guests come from media, politics, medicine, humanities, the social sciences, public policy, and business to help us answer the question “how can we end pandemics in ways that are smarter, faster, more equitable, and more humane?”
  continue reading
 
The World Joy Movement brings together Trailblazers to shape a more joyful world - one powerful conversation at a time. What you are going to hear is unlike most conversations you are involved in. Because we are looking to create outcomes unlike the outcomes most people keep getting. Each conversation dives deep beyond the surface level conversations into the human and social element of the challenges and opportunities that lay ahead of us at this important inflection point in human history. ...
  continue reading
 
Loading …
show series
 
(0:10): Aircraft Crash Near Southend Airport Sparks Massive Emergency Response, Airport Closed Indefinitely (1:59): Trump's Upcoming UK State Visit Sparks Diplomatic Debate and Planned Protests (4:15): UK Launches £500M Fund to Support 200,000 Vulnerable Children and Families (6:22): Greene King CEO Demands Business Rates Overhaul to Save UK Pubs f…
  continue reading
 
CYFIRMA Research's latest report explores a fake "Free VPN for PC" app hosted on GitHub, delivering a packed DLL payload using obfuscated Base64 hidden in junk strings. It uses P/Invoke to load a hidden DLL, executes GetGameData, and injects into legit processes like MSBuild.exe. Packed, evasive, and anti-debug. Link to the Research Report: https:/…
  continue reading
 
The way you spend your first 30 minutes each morning could determine the clarity, energy and focus of your entire day. In this episode, I reveal my go-to morning brain routine — a series of simple, science-backed habits designed to wake up your mind and jumpstart your cognitive performance. You’ll learn how to align your body and brain with your na…
  continue reading
 
Segment 1: Interview with Monzy Merza - There is a Right and Wrong Way to use AI in the SOC In the rush to score AI funding dollars, a lot of startups build a basic wrapper around existing generative AI services like those offered by OpenAI and Anthropic. As a result, these services are expensive, and don't satisfy many security operations teams' p…
  continue reading
 
Pediatrician Daniel Johnson discusses his article, "From isolation to innovation: the power of learning communities in health care." He reflects on the collaborative, case-based learning that makes medical training exciting and contrasts it with the professional isolation many physicians experience after graduation. To combat this, Daniel champions…
  continue reading
 
In this episode of 'Cybersecurity Today,' hosted by David Shipley from the Exchange Security 2025 conference, urgent updates are provided on critical cybersecurity vulnerabilities and threats. CISA mandates a 24-hour patch for Citrix NetScaler due to a severe vulnerability actively being exploited, dubbed 'Citrix Bleed.' Fortinet’s FortiWeb also fa…
  continue reading
 
Experimental Suspicious Domain Feed Our new experimental suspicious domain feed uses various criteria to identify domains that may be used for phishing or other malicious purposes. https://isc.sans.edu/diary/Experimental%20Suspicious%20Domain%20Feed/32102 Wing FTP Server RCE Vulnerability Exploited CVE-2025-47812 Huntress saw active exploitation of…
  continue reading
 
With the October 14, 2025, end-of-life for Windows 10 looming, the time to migrate to Windows 11 is now. Delaying the transition presents significant financial and security risks that go far beyond a simple IT problem and can impact your entire business. Here's what you need to know: The Deadline is Real: Approximately 50% of enterprise computers h…
  continue reading
 
Heads up, IT and Intune Admins: The July 8th, 2025, Patch Tuesday is a critical one that demands immediate strategic planning. This isn't your average monthly update. Microsoft has signaled a universal, urgent focus on the impending Secure Boot certificate expiration. If not addressed proactively, devices across your fleet could fail to boot secure…
  continue reading
 
In this deep dive, we dissect the essential Windows 10 and 11 updates from the PortalFuse report for July 1st, 2025. This episode is crucial for any IT professional or system administrator managing Windows environments, as we unpack the 13 new KB articles to provide you with the operational awareness you need. We start with Windows 11 versions 22H2…
  continue reading
 
In this episode of Deep Dive, we cut through the noise of this week's security updates to bring you the actionable intelligence you need to protect your Windows environments. We are focusing on the Portal Fuze security report from June 25th to July 1st, 2025, specifically for Microsoft Edge. We analyze eight critical Chromium-based CVEs that impact…
  continue reading
 
In this episode of 'Cybersecurity: Today's Month in Review,' the panel of experts, including Laura Payne, David Shipley, and new guest Tammy Harper, delve into major cybersecurity stories from the past month. Discussions range from the recent arrest of a Montreal scam operator, Scattered Spider's targeted attacks on various sectors, and the impacts…
  continue reading
 
(0:10): UK Cybercrime Crackdown: Four Arrested in Major Retail Cyberattack Probe (1:46): Controversial Belfast Bonfire Sparks Safety Concerns, Legal Challenges, and Political Tensions (3:47): Kneecap's Controversial Wembley Poster Rejected by London Underground Amid Legal Turmoil (6:05): Scotland Braces for Donald Trump's Potential Visit Amid Secur…
  continue reading
 
In this episode of Cybersecurity Today, host Jim Love discusses major updates on the recent cyber attack on Marks and Spencer, revealing new details and arrests. The breach involved sophisticated social engineering that infiltrated the company's network through an IT service provider, leading to 150GB of stolen data. Love then covers a massive insi…
  continue reading
 
SSH Tunneling in Action: direct-tcp requests Attackers are compromising ssh servers to abuse them as relays. The attacker will configure port forwarding direct-tcp connections to forward traffic to a victim. In this particular case, the Yandex mail server was the primary victim of these attacks. https://isc.sans.edu/diary/SSH%20Tunneling%20in%20Act…
  continue reading
 
This week in the security news: Citrixbleed 2 and so many failures Ruckus leads the way on how not to handle vulnerabilities When you have no egress Applocker bypass So you bought earbuds from TikTok More gadgets and the crazy radio Cheap drones and android apps Best Mario Kart controller ever VSCode: You're forked Bluetooth earbuds and vulnerabili…
  continue reading
 
Hosts Cole Kuiper and Alex Pavlovic break down San Francisco's crucial series win over the Phillies and look forward to the Giants' series against the Dodgers before the All-Star break. Plus, an interview with Giants manager Bob Melvin. -- (3:00) - Giants' series win over Phillies (5:00) - Breaking down Bailey's inside-of-the-park home run (13:30) …
  continue reading
 
(0:10): King Charles' Artistic Journeys: Rare Exhibition Showcases Decades of Royal Travel and Creativity (1:54): Kneecap's Politically Charged Concert Sparks Controversy and Protests at O2 Academy (3:54): Urgent Call for Action as North England Faces Alarming Child Obesity and Food Insecurity Crisis (6:11): Southend Council Scrambles to Support Ki…
  continue reading
 
Pediatrician Arti Lal discusses her article, "Why ADHD in women is finally getting the attention it deserves." She explores why new ADHD diagnoses nearly doubled for adult women from 2020 to 2022 and the unique barriers they face in getting proper care. Arti explains how historical gender biases have led to misdiagnosis, as female hyperactivity oft…
  continue reading
 
Physician coach Nicole Perrotte and physician advocate and physical therapist Kim Downey discuss their article, "Love, empathy, and the triangle of exhaustion: Why humanity must come first." Nicole introduces her powerful framework, the Triangle of Exhaustion, which describes the profound fatigue experienced by caregivers, physicians, and parents o…
  continue reading
 
Setting up Your Own Certificate Authority for Development: Why and How. Some tips on setting up your own internal certificate authority using the smallstep CA. https://isc.sans.edu/diary/Setting%20up%20Your%20Own%20Certificate%20Authority%20for%20Development%3A%20Why%20and%20How./32092 Animation-Driven Tapjacking on Android Attackers can use a clic…
  continue reading
 
What You’ll Learn: Why the “Rule of Three” is a leadership game changer The origin and impact of Atlas’ TEDx talk: Start with Who What pirate leadership teaches us about trust and motivation Why success leaves clues—and how to collect them The mindset shift from chasing opportunities to choosing legacy Leadership Gold: “Every leader I’ve admired ke…
  continue reading
 
In this conversation, Dr. Chase Cunningham, also known as Dr. Zero Trust, discusses the recent ransomware attack on Marks & Spencer, the implications of Ingram Micro's investigation into a ransomware incident, and the lessons learned from major cyber attacks. He highlights the importance of cybersecurity measures, job opportunities in the field, an…
  continue reading
 
(0:10): Bayeux Tapestry Heads to UK in Historic Cultural Exchange to Boost Franco-British Ties (2:31): UK Jury Convicts Trio in Russian-Linked Arson Plot Targeting Ukraine Aid Warehouse (4:41): Police Confirm Discovery of Missing Sgt. Cairnie's Body Near Warren Hill; No Foul Play Suspected (6:13): Airport Security Scanner Delays Set to Cause Summer…
  continue reading
 
SEC settles with SolarWinds. We react! In the leadership and communications section, The Skills and Habits Aspiring CEOs Need to Build, Why People Really Quit — And How Great Managers Make Them Want to Stay, The Small Actions That Become Your Legacy, and more! Visit https://www.securityweekly.com/bsw for all the latest episodes! Show Notes: https:/…
  continue reading
 
Emergency physicians Resa E. Lewiss and Courtney M. Smalley discuss their article, "Why point-of-care ultrasound belongs in emergency department triage." Amid the crisis of overcrowded waiting rooms and long wait times, they argue for the immediate integration of a powerful, underutilized tool: point-of-care ultrasound (POCUS). Resa and Courtney us…
  continue reading
 
In this episode of 'Cybersecurity Today,' host Jim Love discusses the recent deep fake attack on high-ranking US government officials using AI voice cloning technology. The conversation highlights the growing ease and risks of AI-generated impersonations. The episode also covers the advancements in AI systems connecting with enterprise data and the…
  continue reading
 
B.L.T features Blake Pavey, Luke Kidgell & Tyler Cahill. New Episode Every Wednesday. The Great Bezos Debate of 2025 Oasis And Other World Healing Moments Robert Irwin Is A Thief Morality Test: Yaga Edition Blake Takes A BDSM Test Luke Gets Good And Bad News 80th Birthday Playlist Luke’s Aussie 100 Picks Blake Pavey's Tour:⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ htt…
  continue reading
 
Microsoft Patch Tuesday, July 2025 Today, Microsoft released patches for 130 Microsoft vulnerabilities and 9 additional vulnerabilities not part of Microsoft's portfolio but distributed by Microsoft. 14 of these are rated critical. Only one of the vulnerabilities was disclosed before being patched, and none of the vulnerabilities have so far been e…
  continue reading
 
Open Source vs Commercial: How "Winning Culture" Has Made Us More Vulnerable | Greg Epstein Silicon Valley's shift from collaborative open-source principles to winner-take-all commercial dominance hasn't just changed business models—it's made us fundamentally more vulnerable. When companies prioritize winning everything over building secure, collab…
  continue reading
 
Retired news journalist and bestselling author, Dan Harris, explores the journey of transforming the mind through meditation. After experiencing a transformative on-air panic attack in 2004, Dan embarked on a journey that led him from the high-pressure world of network news to the forefront of the mindfulness movement. Drawing from his own skeptici…
  continue reading
 
(0:10): London Commemorates 2005 Bombings With Emotional Tribute, Emphasizing Hope and Resilience (2:30): Nigel Farage Slams UK Government's Local Council Overhaul as 'Communistic' (4:11): UK Moves to Ban NDAs for Harassment, Discrimination Victims in Landmark Employment Rights Bill (6:36): Survivors Demand Amendments to 'Cruel' Mother and Baby Hom…
  continue reading
 
Appsec still deals with ancient vulns like SQL injection and XSS. And now LLMs are generating code along side humans. Sandy Carielli and Janet Worthington join us once again to discuss what all this new code means for appsec practices. On a positive note, the prevalence of those ancient vulns seems to be diminishing, but the rising use of LLMs is e…
  continue reading
 
Keena Patel-Moran on building a more holistic healthcare industry As a young professional Keena Patel-Moran saw firsthand how a healthcare product she developed helped save lives. Now the Healthcare and Lifesciences Industry Lead at Launch by NTT DATA, Keena is still working towards building a more human approach to healthcare. This week, Keena sit…
  continue reading
 
Certified financial planner Brian Case discusses the article, "Personal financial planning shouldn't be a taboo subject." They explore the often-overlooked link between financial stress and the crisis of physician burnout, turnover, and the alarming rate of physician suicide. Brian, Jerry, Jonathan, and Anders explain that despite high earning pote…
  continue reading
 
CYFIRMA uncovers a sophisticated phishing campaign by APT36 (Transparent Tribe) leveraging Linux-specific malware on BOSS Linux systems (widely used by Indian government agencies). Attackers use malicious .desktop files to deploy stealthy ELF binaries while distracting users with fake PowerPoint files. Stay vigilant and safeguard critical infrastru…
  continue reading
 
What s My File Name Malware may use the GetModuleFileName API to detect if it was renamed to a name typical for analysis, like sample.exe or malware.exe https://isc.sans.edu/diary/What%27s%20My%20%28File%29Name%3F/32084 Atomic macOS infostealer adds backdoor for persistent attacks Malware analyst discovered a new version of the Atomic macOS info-st…
  continue reading
 
(0:10): Eurostar Train Stranded for 9 Hours: Passengers Endure 'Inhumane' Conditions Amid Electrical Failure (2:09): UK Faces Backlash Over Proposed Special Needs Education Reforms, Threatening EHCP Protections (5:12): UK Government Bans Palestine Action, Sparking Protests and Legal Backlash (7:32): UK Unveils £4,500 Incentive to Attract Teachers t…
  continue reading
 
Hosts Cole Kuiper and Alex Pavlovic react to San Francisco’s All-Star selections and break down the Giants’ series win against the Athletics. -- (5:20) - Initial reactions to All-Star selections (12:35) - Recapping Giants vs A's series (19:10) - Breaking down Hayden Birdsong's outing vs Athletics (26:00) - Erik Miller's elbow injury (27:10) - Mailb…
  continue reading
 
Life doesn’t slow down, it speeds up. And in those high-pressure moments, what makes the difference isn’t talent or luck, it’s resilience. In this episode, I’m sharing 12 of my favorite tools and strategies to help you stay calm, clear, and focused no matter what’s happening around you. These are techniques I’ve used personally and taught to top pe…
  continue reading
 
Loading …
Copyright 2025 | Privacy Policy | Terms of Service | | Copyright
Listen to this show while you explore
Play