Dive into the heart of creativity and business with the Accidental CEO Podcast, your go-to audio hangout for turning passion into a thriving business. Hosted by Nata Salvatori, a seasoned wedding photographer and savvy business educator, this podcast peels back the curtain on the accidental journey from creative professional to CEO. Whether you stumbled upon the role of entrepreneur or have always dreamt of leading your own venture, this podcast is crafted for you. Each episode is a blend of ...
…
continue reading
Identity And Access Management Podcasts
Identity at the Center is a weekly podcast all about identity security in the context of identity and access management (IAM). With decades of real-world IAM experience, hosts Jim McDonald and Jeff Steadman bring you conversations with news, topics, and guests from the identity management industry. Do you know who has access to what?
…
continue reading
Over the last near decade, Gerry DeFilippo has trained THOUSANDS of athletes from the youth to pro level across all major team-sports. Gerry started his gym and brand, Challenger Strength, as an ambitious 22 year old still finishing his college degree. In the time since, he has built his facility and following into a nationally recognized performance company training thousands of athletes both in-person and online. Gerry brings guests across all areas of sports and performance training, givi ...
…
continue reading
For many of us, the workplace is more than a single building or facility. That’s what makes workforce IAM so powerful. By managing security through something we all take wherever we go — our identities — it gives users the flexibility they need to stay productive and enables administrators to quickly detect and address risks. HID’s robust, flexible workforce identity and access management solutions provide your workforce with seamless access to the resources they need — no matter where they are.
…
continue reading
Daily cybersecurity news for practitioners. Vulnerabilities, defenses, threats, network security insight, research and more to make you sound smarter as you get to the office in the morning. New each weekday.
…
continue reading
Welcome to the Security Weekly Podcast Network, your all-in-one source for the latest in cybersecurity! This feed features a diverse lineup of shows, including Application Security Weekly, Business Security Weekly, Paul's Security Weekly, Enterprise Security Weekly, and Security Weekly News. Whether you're a cybersecurity professional, business leader, or tech enthusiast, we cover all angles of the cybersecurity landscape. Tune in for in-depth panel discussions, expert guest interviews, and ...
…
continue reading
We're connecting with leading experts across the industry to shed light on all things digital identity. We're talking trending issues, lessons learned and priorities for the future within verification and authentication. Join us across the series with/in our quickfire chats whilst you enjoy a coffee or make your way to work. Sit back, relax and listen in as we verify this, and that. #TrustMatters
…
continue reading
Made for tech enthusiasts and IT professionals. Expanded coverage of your favorite technologies across Microsoft; including Office, Azure, Windows and Data Platforms. We'll even bring you broader topics such as device innovation with Surface, machine learning, and predictive analytics.
…
continue reading
The Identity Knowledge Podcast is a podcast for Identity and Access Management (IAM) professionals. It is hosted by Dave Shields, an IAM veteran with over 25 years of experience in the IAM field.
…
continue reading
Audio versions of Teleport best technical blog posts. https://goteleport.com/blog/
…
continue reading
News, analysis, and insights into enterprise security. We put security vendors under the microscope, and explore the latest trends that can help defenders succeed. Hosted by Adrian Sanabria. Co hosts: Katie Teitler-Santullo, Ayman Elsawah, Jason Wood, Jackie McGuire.
…
continue reading
News, analysis, and insights into enterprise security. We put security vendors under the microscope, and explore the latest trends that can help defenders succeed. Hosted by Adrian Sanabria. Co hosts: Katie Teitler-Santullo, Ayman Elsawah, Jason Wood, Jackie McGuire.
…
continue reading
Unraveling the technology that affects us all but that few of us understand, in a format to give you a basic understanding in the time it takes to drive to and from the grocery store.
…
continue reading
The podcast connecting identity and business. Each episode features an in-depth conversation with an identity management leader, focusing on industry hot topics and stories. Join Oscar Santolalla and his special guests as they discuss what’s current and what’s next for digital identity. Produced by Ubisecure.
…
continue reading
Cybersecurity weekly podcast series featuring industry thought leaders discussing security solutions, best practices, threat intel, and more. Our primary topics within InfoSec include: Application Security; Artificial Intelligence; Blockchain; Career Development; Cloud Security; Encryption / DLP; Endpoint / Mobile / IoT Security; GRC; Incident Response / SIEM; Identity and Access Management; Network Security; Privacy; Ransomware / Malware; and Security Awareness.
…
continue reading
Hosted by Nyedis CIO and co-founder Adam Callen, the Nyedis Anarchy Series gives expert insight into Identity and Access Management, enterprise cloud security, web3, and much more. Callen, who previously went by the IDM Rockstar, gives practical advice on every episode dealing with cutting edge technologies, real world experiences from his clients, and truly unbiased vendor reviews. Callen chats with other leading names in the field and invites questions from the audience on how they can be ...
…
continue reading
Fintech is eating the world. Join Peter Renton, Co-Founder of Fintech Nexus, every week as he interviews the fintech leaders who are leading the transformation of financial services. If you want to understand what the future will look like for lending, payments, digital banking and more tune in to Fintech One•On•One (formerly the Lend Academy Podcast).
…
continue reading
Podcast by NAHAM Connections Podcast
…
continue reading
"Blue Square Security" is a Microsoft Security focused podcast that explores the latest trends and best practices in cybersecurity, led by the Microsoft Digital Security team including in-depth discussions with experts from multiple industry experts and Microsoft partners. Each episode will delve into a different topic, such as cloud security, threat intelligence, or identity and access management, providing listeners with practical insights and actionable advice to help them better protect ...
…
continue reading
How can Fintech contribute to building a better world? In Season 4 of Fintech Files, we’re turning our focus to where financial technology meets social impact. This season, we explore financial inclusion, sustainable investing, and decarbonization with some of the brightest minds in the industry. As financial services touch every aspect of our lives, the opportunity to drive positive change is enormous. About Fintech Files: Join us on Fintech Files from BCG Platinion as we explore the cuttin ...
…
continue reading
This Anthro Life is the premiere go-to Anthropology Podcast that fuses human insights with cultural storytelling. We equip you with a deep understanding of the human experience to revolutionize your decision-making strategies and social impact. Head over to https://www.thisanthrolife.org to learn more. Spearheaded by acclaimed Anthropologist Dr. Adam Gamwell, This Anthro Life equips leaders, individuals, and organizations to shape a more compassionate future. We aim to broaden perspectives a ...
…
continue reading
Confused about the latest cybercrime in the news? Overwhelmed by trying to figure out if an incident applies to you? Want to learn simple, actionable steps to keep you and your family safe online? Introducing Bee Cyber Fit, a podcast for the Yale University community and beyond. We’ll cut through the cyber mumbo jumbo and make cybersecurity awareness easy to digest. Every two weeks we’ll share compelling cyber stories, make sense of buzzwords and share a simple call to action. Scammers are e ...
…
continue reading
We interview cybersecurity professionals for tips and advice on how to break into a cybersecurity career. Explore how to think and take action to be successful as an IT Security professional. Learn about roles in IT Audit, Risk Management, Pentesting, DevSecOps, Cloud Security and certifications.
…
continue reading
Marketing, Mindset & Visibility for Online Mompreneurs. Inspiring Your Shine is the podcast for faith-driven women ready to rise into their calling and build a business that reflects their purpose. Hosted by brand strategist Rebecca Keselburg, this show helps online entrepreneurs simplify marketing, grow their visibility, and create a business that works for them, not the other way around. Whether you're launching or scaling, you'll gain strategies to clarify your message, overcome mindset b ...
…
continue reading
Web Pro Savvy is a podcast for freelance web designers and developers, hosted by Cathy Sirvatka. You'll hear interviews with experienced freelance web pros about their business operations, the services they offer, and the types of clients they work with. They openly share their stories and pull back the curtain on how they achieve success so that you can boost your own business.
…
continue reading
Where Automation Meets Security
…
continue reading

1
Binance Futures Referral Code ”K6O8CPLG” – Unlock 10% Fee Discount and Up to $600 Bonus
binance futures referral code
If you are planning to start trading on Binance Futures, using a Binance Futures referral code can offer you significant advantages. The Binance Futures referral code ”K6O8CPLG” provides new users with a 10% discount on all futures trading fees and gives you the opportunity to earn up to $600 in welcome bonuses. This is an excellent way to start your trading journey with extra benefits, maximizing your initial deposits and reducing trading costs right from the beginning. What is Binance Futu ...
…
continue reading
Home of the Cloud Unfiltered Podcast cloudunfiltered.substack.com
…
continue reading
Have you ever imagined listening to your favorite IT security expert discuss the ways you can enhance the security posture of your environment on-the go? Now you can! We're thrilled to announce the launch of our weekly podcast series where our security experts will present their take on a wide range of IT security topics.
…
continue reading

1
#369 - A Practitioner’s View on Identity with Anthony Viggiano
56:54
56:54
Play later
Play later
Lists
Like
Liked
56:54Join Jeff and Jim in this special episode of the Identity at the Center podcast as they celebrate crossing 1 million downloads. The hosts share a major announcement, thank their supporters, and discuss the journey and future of the podcast. They also delve into the world of Identity and Access Management (IAM) with guest Anthony Viggiano, covering …
…
continue reading

1
Oktane Preview with Harish Peri, Invisible Prompt Attacks, and the weekly news! - Harish Peri - ESW #421
1:49:28
1:49:28
Play later
Play later
Lists
Like
Liked
1:49:28Interview with Harish Peri from Okta Oktane Preview: building frameworks to secure our Agentic AI future Like it or not, Agentic AI and protocols like MCP and A2A are getting pushed as the glue to take business process automation to the next level. Giving agents the power and access they need to accomplish these lofty goals is going to be challengi…
…
continue reading

1
Oktane Preview with Harish Peri, Invisible Prompt Attacks, and the weekly news! - Harish Peri - ESW #421
1:49:28
1:49:28
Play later
Play later
Lists
Like
Liked
1:49:28Interview with Harish Peri from Okta Oktane Preview: building frameworks to secure our Agentic AI future Like it or not, Agentic AI and protocols like MCP and A2A are getting pushed as the glue to take business process automation to the next level. Giving agents the power and access they need to accomplish these lofty goals is going to be challengi…
…
continue reading

1
Oktane Preview with Harish Peri, Invisible Prompt Attacks, and the weekly news! - Harish Peri - ESW #421
1:49:28
1:49:28
Play later
Play later
Lists
Like
Liked
1:49:28Interview with Harish Peri from Okta Oktane Preview: building frameworks to secure our Agentic AI future Like it or not, Agentic AI and protocols like MCP and A2A are getting pushed as the glue to take business process automation to the next level. Giving agents the power and access they need to accomplish these lofty goals is going to be challengi…
…
continue reading

1
SANS Stormcast Monday, August 25th, 2025: IP Cleanup; Linux Desktop Attacks; Malicious Go SSH Brute Forcer; Onmicrosoft Domain Restrictions
6:04
6:04
Play later
Play later
Lists
Like
Liked
6:04The end of an era: Properly formatted IP addresses in all of our data. When initiall designing DShield, addresses were zero padded , an unfortunate choice. As of this week, datafeeds should no longer be zero padded . https://isc.sans.edu/diary/The%20end%20of%20an%20era%3A%20Properly%20formated%20IP%20addresses%20in%20all%20of%20our%20data./32228 .d…
…
continue reading

1
Humans extinct: 2040, Okta, Elastic, Bad Bots, Berserk Bear, Siemens, Aaran Leyland.. - SWN #505
34:12
34:12
Play later
Play later
Lists
Like
Liked
34:12Humans wiped out by 2040, Okta, Elastic, Bad Bots, Berserk Bear, Siemens, Philip K. Dick, Aaran Leyland, and More, on this edition of the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-505
…
continue reading

1
Episode 11.2 - Separating fact from fiction in Deepfakes
26:59
26:59
Play later
Play later
Lists
Like
Liked
26:59I got a pitch from Reality Defender (deepfake video detection) about a partnership with ValidSoft (deepfake voice) last week. We don’t generally cover partnership agreements because, well, we get a handful every week and they just aren’t news. But the pitch threw out a few statistics that seemed a bit off. After some research, I found out how off t…
…
continue reading

1
Jason Guss, CEO of Octane Lending, on building the number one powersports lender
41:51
41:51
Play later
Play later
Lists
Like
Liked
41:51In this episode, I sit down with Jason Guss, CEO and co-founder of Octane Lending, to discuss how the company became the #1 powersports lender in the country. The conversation covers Octane's early pivot from lender aggregator to direct lender, their dominance in niche markets, and strategies for thriving in challenging interest rate environments. …
…
continue reading

1
SANS Stormcast Friday, August 22nd, 2025: The -n switch; Commvault Exploit; Docker Desktop Escape Vuln;
6:52
6:52
Play later
Play later
Lists
Like
Liked
6:52Don't Forget The "-n" Command Line Switch Disabling reverse DNS lookups for IP addresses is important not just for performance, but also for opsec. Xavier is explaining some of the risks. https://isc.sans.edu/diary/Don%27t%20Forget%20The%20%22-n%22%20Command%20Line%20Switch/32220 watchTowr releases details about recent Commvault flaws Users of the …
…
continue reading

1
What We’ve Learned from LockBit and Black Basta Leaks (and News) - Ian Gray - PSW #888
2:15:17
2:15:17
Play later
Play later
Lists
Like
Liked
2:15:17This segment is sponsored by Flashpoint. Visit https://securityweekly.com/flashpoint to learn more about them! Recent leaks tied to LockBit and Black Basta have exposed the inner workings of two of the most notorious ransomware groups—revealing their tactics, negotiation strategies, and operational infrastructure. For defenders, this rare window in…
…
continue reading

1
SANS Stormcast Thursday, August 21st, 2025: Airtel Scans; Apple Patch; Microsoft Copilot Audit Log Issue; Password Manager Clickjacking
6:52
6:52
Play later
Play later
Lists
Like
Liked
6:52Airtel Router Scans and Mislabeled Usernames A quick summary of some odd usernames that show up in our honeypot logs https://isc.sans.edu/diary/Airtel%20Router%20Scans%2C%20and%20Mislabeled%20usernames/32216 Apple Patches 0-Day CVE-2025-43300 Apple released an update for iOS, iPadOS and MacOS today patching a single, already exploited, vulnerabilit…
…
continue reading
This episode is sponsored by P0 Security. Visit p0.dev/idac to learn why P0 is the easiest and fastest way to implement just-in-time, short-lived, and auditable access to your entire infrastructure stack, like servers, databases, Kubernetes clusters, cloud consoles, and cloud services, for users as well as non-human identities. In this sponsor spot…
…
continue reading

1
Misconfiguration, The Forgotten Vulnerability and the Power and Failure of "Yes" - Danny Jenkins - BSW #409
53:55
53:55
Play later
Play later
Lists
Like
Liked
53:55The industry is obsessed with vulnerabilities. From vulnerability assessment to vulnerability management to exposure management and even zero days, we love to talk about vulnerabilities. But what about misconfiguration? By definition it's a vulnerability or weakness, but it doesn't have a CVE (common vulnerability enumeration). Should we ignore it?…
…
continue reading

1
79: What To Focus On When Everything Feels Urgent
13:27
13:27
Play later
Play later
Lists
Like
Liked
13:27Time management is not about squeezing more into your day — it’s about doing the right things at the right time. In this episode, Nata Salvatori reveals her personal system for running multiple businesses without living in overwhelm. You’ll hear why delegation is the first step in her process, how she keeps track of every recurring task, and the ex…
…
continue reading

1
Episode #252 Ismael Gallo on Movement Flow, Exaggeration Myths, and Long-Term Athlete Development
52:34
52:34
Play later
Play later
Lists
Like
Liked
52:34Send us your questions, or thoughts on today's episode! In Episode 252 of Muscles and Management, Gerry welcomes Dr. Ismael Gallo—former professional baseball player, physical therapist, and founder of Baseball Flows—for a wide-ranging conversation on athlete development through movement, not gimmicks. Gallo brings a unique blend of experience from…
…
continue reading

1
SANS Stormcast Wednesday, August 20th, 2025: Increased Elasticsearch Scans; MSFT Patch Issues
6:07
6:07
Play later
Play later
Lists
Like
Liked
6:07Increased Elasticsearch Recognizance Scans Our honeypots noted an increase in reconnaissance scans for Elasticsearch. In particular, the endpoint /_cluster/settings is hit hard. https://isc.sans.edu/diary/Increased%20Elasticsearch%20Recognizance%20Scans/32212 Microsoft Patch Tuesday Issues Microsoft noted some issues deploying the most recent patch…
…
continue reading

1
The cult of Doug, Crime, Pipemagic, Clickfix, Cats in Space, Josh Marpet, and more... - SWN #504
34:06
34:06
Play later
Play later
Lists
Like
Liked
34:06The cult of Doug, Crime, Pipemagic, Clickfix, Cats in Space, Uncle Silvio, Josh Marpet, and more on the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-504
…
continue reading

1
Build autonomous agents in Copilot Studio | Your MCPs, your models & multi-agent
8:36
8:36
Play later
Play later
Lists
Like
Liked
8:36Build AI agents to automate complex workflows—like project planning and go-to-market strategies—without writing code, all with Microsoft Copilot Studio. Use triggers to launch processes from signals like approval emails, connect to the right data with Model Context Protocol (MCP) for faster, more accurate responses, and coordinate multiple agents t…
…
continue reading

1
Managing the Minimization of a Container Attack Surface - Neil Carpenter - ASW #344
1:08:17
1:08:17
Play later
Play later
Lists
Like
Liked
1:08:17A smaller attack surface should lead to a smaller list of CVEs to track, which in turn should lead to a smaller set of vulns that you should care about. But in practice, keeping something like a container image small has a lot of challenges in terms of what should be considered minimal. Neil Carpenter shares advice and anecdotes on what it takes to…
…
continue reading

1
SANS Stormcast Tuesday, August 19th, 2025: MFA Bombing; Cisco Firewall Management Vuln; F5 Access for Android Vuln;
5:10
5:10
Play later
Play later
Lists
Like
Liked
5:10Keeping an Eye on MFA Bombing Attacks Attackers will attempt to use authentication fatigue by bombing users with MFA authentication requests. Rob is talking in this diary about how to investigate these attacks in a Microsoft ecosystem. https://isc.sans.edu/diary/Keeping+an+Eye+on+MFABombing+Attacks/32208 Critical Cisco Secure Firewall Management Ce…
…
continue reading

1
#367 - RSM & IDAC Present - The Intersection of Attack Surface Management and Identity
51:47
51:47
Play later
Play later
Lists
Like
Liked
51:47Join hosts Jeff Steadman and Jim McDonald as they explore the critical intersection of attack surface management (ASM) and digital identity with Dan Lauritzen, Director with RSM Defense - RSM’s Managed Security Team. This episode dives deep into how identity has become a key component of your organization's attack surface and why breaking down silo…
…
continue reading

1
Rethinking risk based vulnerability management, Black Hat expo insights, and the news - Snehal Antani - ESW #420
1:55:35
1:55:35
Play later
Play later
Lists
Like
Liked
1:55:35Interview with Snehal Antani - Rethinking Risk-Based Vulnerability Management Vulnerability management is broken. Organizations basically use math to turn a crappy list into a slightly less crappy list, and the hardest part of the job as a CIO is deciding what NOT to fix. There has to be a better way, and there is... Segment Resources: https://hori…
…
continue reading

1
Rethinking risk based vulnerability management, Black Hat expo insights, and the news - Snehal Antani - ESW #420
1:55:35
1:55:35
Play later
Play later
Lists
Like
Liked
1:55:35Interview with Snehal Antani - Rethinking Risk-Based Vulnerability Management Vulnerability management is broken. Organizations basically use math to turn a crappy list into a slightly less crappy list, and the hardest part of the job as a CIO is deciding what NOT to fix. There has to be a better way, and there is... Segment Resources: https://hori…
…
continue reading

1
Rethinking risk based vulnerability management, Black Hat expo insights, and the news - Snehal Antani - ESW #420
1:55:35
1:55:35
Play later
Play later
Lists
Like
Liked
1:55:35Interview with Snehal Antani - Rethinking Risk-Based Vulnerability Management Vulnerability management is broken. Organizations basically use math to turn a crappy list into a slightly less crappy list, and the hardest part of the job as a CIO is deciding what NOT to fix. There has to be a better way, and there is... Segment Resources: https://hori…
…
continue reading

1
SANS Stormcast Monday, August 18th, 2025: 5G Attack Framework; Plex Vulnerability; Fortiweb Exploit; Flowise Vuln
5:43
5:43
Play later
Play later
Lists
Like
Liked
5:43SNI5GECT: Sniffing and Injecting 5G Traffic Without Rogue Base Stations Researchers from the Singapore University of Technology and Design released a new framework, SNI5GECT, to passively sniff and inject traffic into 5G data streams, leading to DoS, downgrade and other attacks. https://isc.sans.edu/diary/SNI5GECT%3A%20Sniffing%20and%20Injecting%20…
…
continue reading

1
Creepy chatbots, Fortinet, CISA, Agentic AI, FIDO, EDR, Aaran Leyland, and More... - SWN #503
35:09
35:09
Play later
Play later
Lists
Like
Liked
35:09Creepy chatbots, Fortinet, CISA, Agentic AI, FIDO, EDR, Aaran Leyland, and More on this episode of the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-503
…
continue reading

1
29 — Managing Workplace Violence in Patient Access
19:53
19:53
Play later
Play later
Lists
Like
Liked
19:53Welcome to episode 29 of the NAHAM Connections Podcast, highlighting the latest trends and insights shaping the world of Patient Access. In this episode, host Susan Milligan, CHAM, CRCR, is joined by Sean Buzzard, a certified QPR expert and behavioral health response specialist with Ensemble Health Partners, for a timely discussion on managing work…
…
continue reading

1
SANS Stormcast Friday, August 15th, 2025: Analysing Attack with AI; Proxyware via YouTube; Xerox FreeFlow Vuln; Evaluating Zero Trust @SANS_edu
15:12
15:12
Play later
Play later
Lists
Like
Liked
15:12AI and Faster Attack Analysis A few use cases for LLMs to speed up analysis https://isc.sans.edu/diary/AI%20and%20Faster%20Attack%20Analysis%20%5BGuest%20Diary%5D/32198 Proxyware Malware Being Distributed on YouTube Video Download Site Popular YouTube download sites will attempt to infect users with proxyware. https://asec.ahnlab.com/en/89574/ Xero…
…
continue reading

1
Violet Abtahi, CEO of Platonic, on building the next generation of financial infrastructure
40:20
40:20
Play later
Play later
Lists
Like
Liked
40:20Violet Abtahi is the CEO and Founder of Platonic, a company developing blockchain infrastructure to solve counterparty risk and privacy challenges in financial markets. With over a decade of experience in both traditional finance and blockchain technology, Violet transitioned from a mathematics background on Wall Street to building next-generation …
…
continue reading

1
Hackberry PIs and Other Hacker Things - PSW #887
2:08:42
2:08:42
Play later
Play later
Lists
Like
Liked
2:08:42We kick things off with a deep dive into the Hackberry PI and how to build one. Then in the security news: Will Perplexity buy Chrome? ESP32 Bus Pirates Poisoned telemetry Docker image security Fully Open Source Quantum Sensors Securing your car, Flippers, and show me the money Bringing your printer and desktop to Starbucks Paying a ransom? You nee…
…
continue reading

1
SANS Stormcast Thursday, August 14th, 2025: Equation Editor; Kerberos Patch; XZ-Utils Backdoor; ForitSIEM/FortiWeb patches
7:16
7:16
Play later
Play later
Lists
Like
Liked
7:16CVE-2017-11882 Will Never Die The (very) old equation editor vulnerability is still being exploited, as this recent sample analyzed by Xavier shows. The payload of the Excel file attempts to download and execute an infostealer to exfiltrate passwords via email. https://isc.sans.edu/diary/CVE-2017-11882%20Will%20Never%20Die/32196 Windows Kerberos El…
…
continue reading

1
Defending Trust & Reputation as CISOs and Leaders Prepare Their AI Strategy - Santosh Nair - BSW #408
50:05
50:05
Play later
Play later
Lists
Like
Liked
50:05As brands grow more digital, the threats grow more personal. Attackers impersonate executives, spin up fake websites, and leak sensitive data — hurting business reputations and breaking customer trust. How do you defend your organization's reputation and customers' trust? Santosh Nair, Co-Founder and CTO at Styx Intelligence, joins Business Securit…
…
continue reading

1
78: How to Build Authentic Relationships in a Phone-Obsessed World
45:37
45:37
Play later
Play later
Lists
Like
Liked
45:37In a world that’s constantly online, are we losing what it means to truly connect? This week, Nata sits down with Sam and Elliot Archuleta, hosts of Something More Human and creators of the Return to Real Life event series—a growing movement that invites people to put down their phones and rediscover authentic human interaction. In this conversatio…
…
continue reading

1
Episode #251 Travis Hash on Semi-Private Training Models, True Individualization, and Cutting Through Coaching Gimmicks
44:29
44:29
Play later
Play later
Lists
Like
Liked
44:29Send us your questions, or thoughts on today's episode! In Episode 251 of Muscles and Management, Gerry welcomes Travis Hash, Director of Strength and Conditioning and owner of Absolute Sports Performance, for a deep dive into what it really takes to run an effective athlete training program. From the logistics of scaling individualized programs in…
…
continue reading

1
SANS Stormcast Wednesday, August 13th, 2025: Microsoft Patch Tuesday; libarchive vulnerability upgrade; Adobe Patches
8:55
8:55
Play later
Play later
Lists
Like
Liked
8:55Microsoft Patch Tuesday https://isc.sans.edu/diary/Microsoft%20August%202025%20Patch%20Tuesday/32192 https://cymulate.com/blog/zero-click-one-ntlm-microsoft-security-patch-bypass-cve-2025-50154/ libarchive Vulnerability A libarchive vulnerability patched in June was upgraded from a low CVSS score to a critical one. Libarchive is used by compression…
…
continue reading

1
300 Baud, Buddy Hackett Nudes, Dell, badUSB, Exchange, Erlang/OTP, Josh Marpet... - SWN #502
34:14
34:14
Play later
Play later
Lists
Like
Liked
34:14300 Baud, Buddy Hackett Nudes, Dell, badUSB, Exchange, Erlang/OTP, Josh Marpet, and more on the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-502
…
continue reading

1
Episode 11.1 - Controlling access could help close Agentic AI security holes, but it's not security
40:10
40:10
Play later
Play later
Lists
Like
Liked
40:10We are starting out the 11th season of Crucial Tech is a bang. I am completing an article on a significant security hole in AI agents that shows how the tech industry makes security an afterthought every, damn, time. One of the companies pitching a solution is Teleport, which manages identity access and I had a friendly but contentious conversation…
…
continue reading

1
The Future of Supply Chain Security - Janet Worthington - ASW #343
42:13
42:13
Play later
Play later
Lists
Like
Liked
42:13Open source software is a massive contribution that provides everything from foundational frameworks to tiny single-purpose libraries. We walk through the dimensions of trust and provenance in the software supply chain with Janet Worthington. And we discuss how even with new code generated by LLMs and new terms like slopsquatting, a lot of the most…
…
continue reading

1
SANS Stormcast Tuesday, August 12th, 2025: Erlang OTP SSH Exploits (Palo Alto Networks); Winrar Exploits; Netscaler Exploits; OpenSSH Pushing PQ Crypto;
6:52
6:52
Play later
Play later
Lists
Like
Liked
6:52Erlang OTP SSH Exploits A recently patched and easily exploited vulnerability in Erlang/OTP SSH is being exploited. Palo Alto collected some of the details about this exploit activity that they observed. https://unit42.paloaltonetworks.com/erlang-otp-cve-2025-32433/ WinRAR Exploited WinRAR vulnerabilities are actively being exploited by a number of…
…
continue reading

1
#366 - The Digital Transformation of Healthcare IAM with Shawna Hofer
1:03:18
1:03:18
Play later
Play later
Lists
Like
Liked
1:03:18In this episode of the Identity at the Center podcast, hosts Jeff and Jim dive into an enriching discussion with Shawna Hofer, Chief Information Security Officer at St. Luke's Health System in Idaho. Discover the vital link between cybersecurity and patient safety, the evolving role of AI in healthcare, and the challenges of integrating new technol…
…
continue reading

1
ESW at BlackHat and the weekly enterprise security news - ESW #419
45:44
45:44
Play later
Play later
Lists
Like
Liked
45:44Topic Segment - What's new at Black Hat? We're coming live from hacker summer camp 2025, so it seemed appropriate to share what we've seen and heard so far at this year's event. Adrian's on vacation, so this episode is featuring Jackie McGuire and Ayman Elsawah! News Segment Then, in the enterprise security news, Tons of funding! SentinelOne picks …
…
continue reading

1
ESW at BlackHat and the weekly enterprise security news - ESW #419
45:44
45:44
Play later
Play later
Lists
Like
Liked
45:44Topic Segment - What's new at Black Hat? We're coming live from hacker summer camp 2025, so it seemed appropriate to share what we've seen and heard so far at this year's event. Adrian's on vacation, so this episode is featuring Jackie McGuire and Ayman Elsawah! News Segment Then, in the enterprise security news, Tons of funding! SentinelOne picks …
…
continue reading

1
ESW at BlackHat and the weekly enterprise security news - ESW #419
45:44
45:44
Play later
Play later
Lists
Like
Liked
45:44Topic Segment - What's new at Black Hat? We're coming live from hacker summer camp 2025, so it seemed appropriate to share what we've seen and heard so far at this year's event. Adrian's on vacation, so this episode is featuring Jackie McGuire and Ayman Elsawah! News Segment Then, in the enterprise security news, Tons of funding! SentinelOne picks …
…
continue reading

1
SANS Stormcast Monday, August 11th, 2025: Fake Tesla Preorders; Bad USB Cameras; Win-DoS Epidemic
7:07
7:07
Play later
Play later
Lists
Like
Liked
7:07Google Paid Ads for Fake Tesla Websites Someone is setting up fake Tesla lookalike websites that attempt to collect credit card data from unsuspecting users trying to preorder Tesla products. https://isc.sans.edu/diary/Google%20Paid%20Ads%20for%20Fake%20Tesla%20Websites/32186 Compromising USB Devices for Persistent Stealthy Access USB devices, like…
…
continue reading