Search a title or topic

Over 20 million podcasts, powered by 

Player FM logo

Jason Hackett Podcasts

show episodes
 
Artwork
 
For more than 85 years, Superman has inspired kids and kids-at-heart, always evolving with to inspire each generation in just the way that generation needed. In the case of your host, Jason, the Man of Steel served as something of a surrogate father in the absence of a true role model. This podcast is about exploring how Superman can inspire us all to be better people no matter what stage of life we're in.
  continue reading
 
Artwork

1
Local Relief LIVE

Heather Hackett

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Local Relief LIVE" is your go-to podcast for disaster preparedness, survival, and recovery. Featuring expert insights, real-life stories, and practical tips, we connect communities with the knowledge and resources they need to stay resilient before, during, and after disasters.
  continue reading
 
Artwork

1
Liftoff

Relay FM

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Liftoff was a podcast about space, the universe, and everything. You don’t need to be a rocket scientist to understand the major developments as explained by enthusiastic space fans Stephen Hackett and Jason Snell. Hosted by Jason Snell and Stephen Hackett.
  continue reading
 
Artwork

1
Download

Relay

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
From products and companies to services and trends, Download’s weekly panel of experts analyzed the biggest topics in tech … and a few you may have missed. Hosted by Jason Snell and Stephen Hackett.
  continue reading
 
Learn about getting the most from your Apple technology with focused topics and workflow guests. Creating Mac Power Users since 2009, one conversation at a time. Hosted by David Sparks and Stephen Hackett.
  continue reading
 
We are a financial planning firm located in Melbourne. We are using this podcast as a channel to showcase what we provide to clients and to enlighten listeners in what we could potentially do for them. Like more information contact the office 03 9111 2675
  continue reading
 
Artwork

1
The Cracked Podcast

Literally Media

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Facts, jokes, and more from the Internet’s leading comedy website, Cracked.com. Fill your week and your brain with hilarious, mind-blowing revelations that’ll make you the most interesting person in every room you’re in.
  continue reading
 
Launched in 2013, Wes Schaeffer, The Sales Whisperer®, gives sales, marketing, success, and BJJ advice to help professional salespeople, sales managers, business owners, and entrepreneurs sell more, faster, at higher margins, with less stress, more predictably, while having more fun doing it. As of September 2025, it was rebranded and launched as The BJJ and Biz Podcast here on Spotify.
  continue reading
 
Artwork

1
Security Weekly Podcast Network (Audio)

Security Weekly Productions

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Daily
 
Welcome to the Security Weekly Podcast Network, your all-in-one source for the latest in cybersecurity! This feed features a diverse lineup of shows, including Application Security Weekly, Business Security Weekly, Paul's Security Weekly, Enterprise Security Weekly, and Security Weekly News. Whether you're a cybersecurity professional, business leader, or tech enthusiast, we cover all angles of the cybersecurity landscape. Tune in for in-depth panel discussions, expert guest interviews, and ...
  continue reading
 
Loading …
show series
 
Interview with Tod Beardsley This interview is sponsored by runZero. Legacy vulnerability management (VM) hasn't innovated alongside of attackers, and it shows. Let's talk about the state of VM. Check out https://securityweekly.com/runzero to learn more! Topic Segment: NPM Incidents In this week’s topic segment, we’re discussing all the NPM supply …
  continue reading
 
While Stephen is busy with the Podcastathon, Sal Soghoian joins David to talk about the state of automation and the best way to get started with automation in 2025. This episode of Mac Power Users is sponsored by: Squarespace: Save 10% off your first purchase of a website or domain using code MPU. Indeed: Join more than 3.5 million businesses world…
  continue reading
 
In this episode of Security Weekly News, Joshua Marpet and Aaran Leyland discuss the latest trends in AI and cybersecurity, focusing on innovations from CrowdStrike, the implications of new cyber incident reporting rules, and the evolving landscape of ransomware. They explore the role of AI in enhancing security measures, the challenges posed by ma…
  continue reading
 
This week's technical segment is all about the T-Lora Pager from Lilygo, and really cool Meshtastic device that can also be used for some hacking tasks! In the security news: Your safe is not safe Cisco ASA devices are under attack VMScape HybridPetya and UEFI attacks in the wild Eveything is a Linux terminal Hackers turns 30 Hosting websites on di…
  continue reading
 
In the leadership and communications segment, Lack of board access: The No. 1 factor for CISO dissatisfaction, Pressure on CISOs to stay silent about security incidents growing, The Secret to Building a High-Performing Team, and more! Jackie McGuire sits down with Chuck Randolph, SVP of Strategic Intelligence & Security at 360 Privacy, for a grippi…
  continue reading
 
This week, we chat with Scott Clinton, board member and co-chain of the OWASP GenAI Security Project. This project has become a massive organization within OWASP with hundreds of volunteers and thousands of contributors. This team has been cranking out new tools, reports and guidance for practitioners month after month for over a year now. We start…
  continue reading
 
Welcome to Everyday Heroes, presented by Kofkin Bond & Co. In this episode, Matt shares his inspiring journey from a challenging childhood to becoming a successful golfer and later transitioning to real estate. He discusses the impact of resilience, his passion for golf, the life-altering accident that changed everything, and how he found new purpo…
  continue reading
 
Segment 1 - Interview with Jeff Pollard Introducing Forrester’s AEGIS Framework: Agentic AI Enterprise Guardrails For Information Security For this episode’s interview, we’re talking to Forrester analyst Jeff Pollard. I’m pulling this segment’s description directly from the report’s executive summary, which I think says it best: As AI agents and ag…
  continue reading
 
This week: Americans Can't Hack It Copy and paste to get malware Pixel 5 web servers - because you can How they got in and why security is hard Vulnerability management is failing - is it dead yet? Exploiting hacker tools Bluetooth spending spree! How to defend your car IoT security solutions and other such lies Exploiting IBM i (formerly AS/400) V…
  continue reading
 
With volatility now the norm, security and risk leaders need practical guidance on managing existing spending and new budgetary necessities. Where should they look? Jess Burn, Principal Analyst at Forrester Research, joins Business Security Weekly to discuss Forrester's Budget Planning Guide 2026: Security And Risk. This data-and-insights-driven re…
  continue reading
 
Subtitle: 500 Billion Selfies Just hours after Apple's iPhone event, David and Stephen gather their notes and thoughts to discuss the company's latest hardware. This episode of Mac Power Users is sponsored by: 1Password: Never forget a password again. Ecamm: Powerful live streaming platform for Mac. Get one month free. Steamclock: We make great app…
  continue reading
 
Up first, the ASW news of the week. At Black Hat 2025, Doug White interviews Ted Shorter, CTO of Keyfactor, about the quantum revolution already knocking on cybersecurity’s door. They discuss the terrifying reality of quantum computing’s power to break RSA and ECC encryption—the very foundations of modern digital life. With 2030 set as the deadline…
  continue reading
 
Doug White sits down with Theresa Lanowitz, Chief Evangelist at LevelBlue, for a powerful and timely conversation about one of cybersecurity’s most pressing threats: the software supply chain. Theresa shares fresh insights from LevelBlue’s global research involving 1,500 cybersecurity professionals across 16 countries. Together, they unpack the rea…
  continue reading
 
This Groundskeeper Willie video’s going to have it ALL - the length and girth of a Dan Carlin history podcast, the tightly-scripted humor of a VH1 Behind the Music OR BETTER, that’s just an entry-level promise, and of course we’ll learn a ton of fun facts by cataloging and explaining every single joke or reference Willie’s ever made in an ADD-fuele…
  continue reading
 
On this feedback episode, the guys talk about backing up iCloud data, read-it-later services, automation trigger conflicts, travel tech, converting Markdown, the No List, and a lot more. This episode of Mac Power Users is sponsored by: 1Password: Never forget a password again. Squarespace: Save 10% off your first purchase of a website or domain usi…
  continue reading
 
No plan survives contact with the enemy...yet you still plan. Today, a white belt wanted to review the D'arce and anaconda choke in our morning BJJ training. We spent time getting precise on the D'arce, how to finish it, even on larger opponents, and a few ways to enter it/set it up from top or bottom. Then I get into some sales and business advice…
  continue reading
 
In the secure news: Automakers respond to Flipper Zero attacks More on the unconfirmed Elastic EDR 0-Day When Secure Boot does its job too well Crazy authenitcation bypass Hacker ultimatums AI Slop Impatient hackers Linux ISOs are malware Attackers love drivers Hacking Amazon's Eero, the hard way Exploits will continue until security improves The S…
  continue reading
 
#BJJ#TheBJJandBIZPodcast#Business#SalesTraining#JiuJitsu#PersonalDevelopment#BrazilianJiuJitsu#BJJCommunity#BJJLifestyle#BJJForLife#MartialArtsLife#BJJMindset#assumptions #sales #decision-making #curiosity #concise communication, #sales strategies Summary In this conversation, Wes Schaeffer discusses the importance of avoiding assumptions in both m…
  continue reading
 
The cybersecurity industry is undergoing a consolidation wave that is moving far faster than many realize. This isn’t at all about CISOs wanting fewer tools as much as some would like to think - the changes are happening at the macro level. Ross Haleliuk joins BSW to present the most comprehensive illustration ever made of how our industry has cons…
  continue reading
 
In this must-see BlackHat 2025 interview, Doug White sits down with Michael Callahan, CMO at Salt Security, for a high-stakes conversation about Agentic AI, Model Context Protocol (MCP) servers, and the massive API security risks reshaping the cyber landscape. Broadcast live from the CyberRisk TV studio at Mandalay Bay, Las Vegas, the discussion pu…
  continue reading
 
Interview with Dave Lewis on Security's Role in M&A Due Diligence In this episode, Dave Lewis from 1Password discusses the critical importance of security in mergers and acquisitions, from due diligence through integration. He explores common pitfalls, essential security assessments, and practical strategies for security leaders to protect organiza…
  continue reading
 
Special guest Andru Edwards joins the show. Topics include Google’s Pixel 10 event and the Pixel 10 family of devices, AI’s effect on computational photography, foldable phones, and some speculation on Apple’s September 9 “Awe Dropping” event. Sponsored by: Squarespace: Save 10% off your first purchase of a website or domain using code talkshow. Se…
  continue reading
 
Tyler McRae joins the program to talk about the role of AI in coding and his work in the world of church AV and technology. This episode of Mac Power Users is sponsored by: 1Password: Never forget a password again. Indeed: Join more than 3.5 million businesses worldwide using Indeed to hire great talent fast. Steamclock: We make great apps. Design …
  continue reading
 
Porn bombing the celestial zoom room and Astro Oblivion, FreePBX, GitHub, OWASP, Promptlock, Claude Aaran Leyland, and More, on this edition of the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-507
  continue reading
 
Who really helps small businesses after a disaster? 🌪️ In this episode, Heather sits down with Stacey Dadd, Associate Director at Florida SBDC at USF, to explore how small businesses can find the support, resources, and guidance they need after hurricanes, floods, and other disasters. 👉 You’ll learn: Who small businesses can turn to after a disaste…
  continue reading
 
#AI tools #marketing #automation #trustinAI #contentcreation #AIplatforms #salesstrategies #digitalmarketing #AIcapabilities #humaninteraction #businessgrowth Summary In this conversation, Wes Schaeffer and Roger discuss the significance of AI tools in marketing and sales. They explore various AI platforms, their capabilities, and how to effectivel…
  continue reading
 
Rob Allen joins us to discuss the importance of security research teams, and some cool stuff they've worked on. Then, in the Security News: Flipper Zero, unlocking cars: The saga continues The one where they stole the vulnerabilities ESP32 Bus Pirates AI will weaponize everything, maybe What are in-the-wild exploits? Docker and security boundaries,…
  continue reading
 
Securing top-tier cybersecurity leadership is not just a necessity but a significant challenge, especially when working within budget constraints. Should you hire a full-time CISO or outsource to a vCISO provider? Brian Haugli, CEO at SideChannel, joins BSW to discuss how organizations can hire a Virtual CISO (vCISO) to benefit from their expertise…
  continue reading
 
The EU Cyber Resilience Act joins the long list of regulations intended to improve the security of software delivered to users. Emily Fox and Roman Zhukov share their experience education regulators on open source software and educating open source projects on security. They talk about creating a baseline for security that addresses technical items…
  continue reading
 
Matthew Panzarino returns to the show. Topics include 007 logo creator Joe Caroff’s death at 103, Google’s weird “Made by Google” event hosted by Jimmy Fallon, the UK supposedly dropping its demand for an iCloud encryption backdoor, and Apple’s workaround for the Apple Watch blood oxygen sensor patent stalemate. Sponsored by: Squarespace: Save 10% …
  continue reading
 
Welcome to Everyday Heroes, presented by Kofkin Bond & Co. In this episode, we sit down with Jon Wellman, co-founder and CEO of Vokke, one of Australia’s most trusted software development partners. Jon’s journey began far from the world of tech. As a young boy migrating from the UK, navigating schoolyard challenges, and later finding himself in fin…
  continue reading
 
Hurricane season is coming — are you ready? Don’t wait until it’s too late. In this episode, climate expert Bob Bunting joins us to break down what’s changing with today’s storms and how you can protect your home and community. From rising ocean temps to vulnerable infrastructure, we unpack the realities of stronger, slower, and more dangerous stor…
  continue reading
 
Interview with Harish Peri from Okta Oktane Preview: building frameworks to secure our Agentic AI future Like it or not, Agentic AI and protocols like MCP and A2A are getting pushed as the glue to take business process automation to the next level. Giving agents the power and access they need to accomplish these lofty goals is going to be challengi…
  continue reading
 
Instead of recording a new episode, your not-so-intrepid host has been watching the new Superman movie again and again -- seven times so far, and counting! And with added viewings since the digital home-video release, he's got some more observations about: The Kents The Els Whether the Justice Gang and the Daily Planet staff take time away from Sup…
  continue reading
 
Apple has been in the education market for decades, and over that time, Apple's position and offerings have significantly changed. This week, educator Steven Benner joins the show to talk about how his school district is using Apple gear in the classroom. This episode of Mac Power Users is sponsored by: 1Password: Never forget a password again. Eca…
  continue reading
 
Humans wiped out by 2040, Okta, Elastic, Bad Bots, Berserk Bear, Siemens, Philip K. Dick, Aaran Leyland, and More, on this edition of the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-505
  continue reading
 
Takeaways—The importance of personalization in outreach efforts.—LinkedIn is not just a social platform; it's a data warehouse.—Inbox saturation is a significant challenge for marketers.—Hyper-personalization can lead to new forms of saturation.—Referrals are crucial for building trust and gaining new clients.—Sales strategies must evolve with chan…
  continue reading
 
This segment is sponsored by Flashpoint. Visit https://securityweekly.com/flashpoint to learn more about them! Recent leaks tied to LockBit and Black Basta have exposed the inner workings of two of the most notorious ransomware groups—revealing their tactics, negotiation strategies, and operational infrastructure. For defenders, this rare window in…
  continue reading
 
The industry is obsessed with vulnerabilities. From vulnerability assessment to vulnerability management to exposure management and even zero days, we love to talk about vulnerabilities. But what about misconfiguration? By definition it's a vulnerability or weakness, but it doesn't have a CVE (common vulnerability enumeration). Should we ignore it?…
  continue reading
 
Loading …
Copyright 2025 | Privacy Policy | Terms of Service | | Copyright
Listen to this show while you explore
Play