Search a title or topic

Over 20 million podcasts, powered by 

Player FM logo
show episodes
 
McGill Professor Karl Moore takes you inside his CEO class that is an integral part of the McGill MBA experience. Each week, some of Canada's top leaders spend an hour with Karl discussing their paths to success, insights into the latest business trends, their advice to budding entrepreneurs, their work/life balance and more.
  continue reading
 
Artwork
 
An exploration into humanity's deep connection to nature, a connection that extends to the underlying structure of reality and imbues our biology with incredible capabilities. The shift in perspective from seeing ourselves as separate to being part of nature is necessary for humanity's evolution and that of the planet.
  continue reading
 
Artwork

1
Severe MMA Podcast

SevereMMA.com

icon
Unsubscribe
icon
Unsubscribe
Weekly
 
Severe MMA podcast is presented by Sean Sheehan and Graeme McDonnell every Monday. The lads discuss the biggest topics in worldwide mixed martial arts (MMA) as well as the best Irish MMA has to offer. To support the podcast and listen to the 1000+ extra episodes, sign up for our premium service at SEVEREMMA.com/patreon
  continue reading
 
Artwork
 
Everyone knows about autistic special interests and how dedicated autistic people can be. But can allistic people have special interests too? Kate and Becca are on a mission to interview the allistic world about their passion projects, favorite hobbies and subjects of obsession. In neurotypical society, it's not ok to gush about the things you love, but it's ok with us. And at the end of every episode we try to answer so listener submitted advice inquiries. It's a lot a fun.
  continue reading
 
Artwork
 
You're about to listen to Can you Kickstart? the podcast made for and by the people out there trying to make it on Kickstarter! Join Tom and Karl every week for a brand new episode exploring the depths and stories behind Kickstarter Projects and find out what they're all about! Will they make it though? Come and find out! Also don't forget to follow us on iTunes where you can Rate and Subscribe!
  continue reading
 
Artwork

1
The JoukBox

Joukowsky Institute for Archaeology and the Ancient World

icon
Unsubscribe
icon
Unsubscribe
Monthly
 
A podcast from Brown University's Joukowsky Institute for Archaeology & the Ancient World, hosted and produced by doctoral student Karl Krusell.
  continue reading
 
The Advisor Development Show is a digital mastermind network for the best financial professionals across the country. Join your host, Karl Hoover, as he interviews the brightest minds across the financial landscape every episode. Karl has been with Financial Independence Group for more than 20 years and is a senior vice president who enjoys leading advisors through the the worlds of marketing, practice management, product R&D and the various challenges financial professionals face trying to ...
  continue reading
 
Artwork

1
Enterprise Security Weekly (Video)

Security Weekly Productions

icon
Unsubscribe
icon
Unsubscribe
Weekly+
 
News, analysis, and insights into enterprise security. We put security vendors under the microscope, and explore the latest trends that can help defenders succeed. Hosted by Adrian Sanabria. Co hosts: Katie Teitler-Santullo, Ayman Elsawah, Jason Wood, Jackie McGuire.
  continue reading
 
Artwork

1
Mental Healthy

mentalhealthypodcast

icon
Unsubscribe
icon
Unsubscribe
Monthly
 
The Mental Healthy podcast offers insightful interviews with innovative professors and Mental Health organizations from both the United States and around the world. We aspire to encourage and inform you about different Mental Health techniques & theories, as well as highlight projects and organizations worthy of your attention.
  continue reading
 
Artwork

1
Enterprise Security Weekly (Audio)

Security Weekly Productions

icon
Unsubscribe
icon
Unsubscribe
Weekly
 
News, analysis, and insights into enterprise security. We put security vendors under the microscope, and explore the latest trends that can help defenders succeed. Hosted by Adrian Sanabria. Co hosts: Katie Teitler-Santullo, Ayman Elsawah, Jason Wood, Jackie McGuire.
  continue reading
 
Artwork
 
Welcome to the Security Weekly Podcast Network, your all-in-one source for the latest in cybersecurity! This feed features a diverse lineup of shows, including Application Security Weekly, Business Security Weekly, Paul's Security Weekly, Enterprise Security Weekly, and Security Weekly News. Whether you're a cybersecurity professional, business leader, or tech enthusiast, we cover all angles of the cybersecurity landscape. Tune in for in-depth panel discussions, expert guest interviews, and ...
  continue reading
 
Artwork

1
ibig sabihin

Hirro Mac Joseph T. Kuizon

icon
Unsubscribe
icon
Unsubscribe
Monthly
 
The “Ibig Sabihin” podcast, hosted by Hirro Mac Joseph T. Kuizon, is a unique blend of personal storytelling and insightful conversations. Broadcasting in both Filipino and English, the podcast invites listeners into the world of Hirro's essays, thoughts, and conversations with his new and old friends. If you’re looking for thought-provoking content or simply want to listen to engaging stories and rambling, then “Ibig Sabihin" might be for you.
  continue reading
 
Loading …
show series
 
Sean and Ian talk Paul Hughes, PFL Belfast, Bo Nickal, Karl Moore, UFC 315 and more!Follow Sean X.Com/SeanSheehanBAFollow Graeme X.Com/SevereMMAJoin the fun and support our journalism on Patreon.com/SevereMMAPodcastEpisode 515 is brought to you by our friends at @Cloudbet!Cloudbet has you covered for PFL Europe and MENA. Clean interface. In-play od…
  continue reading
 
The recent popularity of MCPs is surpassed only by the recent examples deficiencies of their secure design. The most obvious challenge is how MCPs, and many more general LLM use cases, have erased two decades of security principles behind separating code and data. We take a look at how developers are using LLMs to generate code and continue our sea…
  continue reading
 
Segment 1 CTG Interview Middle market companies face unique challenges in the ever-evolving cyber environment. Developing a comprehensive cybersecurity approach is a business imperative for middle market companies, and Chad Alessi will discuss the threat landscape, what’s keeping IT decision-makers awkward at night, and the best approach to creatin…
  continue reading
 
Segment 1 CTG Interview Middle market companies face unique challenges in the ever-evolving cyber environment. Developing a comprehensive cybersecurity approach is a business imperative for middle market companies, and Chad Alessi will discuss the threat landscape, what’s keeping IT decision-makers awkward at night, and the best approach to creatin…
  continue reading
 
Segment 1 CTG Interview Middle market companies face unique challenges in the ever-evolving cyber environment. Developing a comprehensive cybersecurity approach is a business imperative for middle market companies, and Chad Alessi will discuss the threat landscape, what’s keeping IT decision-makers awkward at night, and the best approach to creatin…
  continue reading
 
Sean and Graeme talk UFC 316, Irish at CW Rome, Barber's no-show, New UFC lawsuits and more!Follow Sean X.Com/SeanSheehanBAFollow Graeme X.Com/SevereMMAJoin the fun and support our journalism on Patreon.com/SevereMMAPodcastEpisode 519 is brought to you by our friends at @Cloudbet!We’re breaking down all the madness from the UFC right now with UFC 3…
  continue reading
 
In the security news: Vicious Trap - The malware hiding in your router Hacking your car WSL is open-source, but why? Using AI to find vulnerabilities - a case study Why you should not build your own password manager The inside scoop behind Lumma Infostealer Hacking a smart grill Hardcoded credentials on end of life routers and "Alphanetworks" SIM s…
  continue reading
 
This segment explores how automated microsegmentation addresses critical Zero Trust gaps overlooked by traditional access controls and legacy segmentation solutions. We'll examine the limitations of perimeter-based defenses in today's dynamic threat landscape and reveal how automated microsegmentation enhances network security beyond conventional f…
  continue reading
 
ArmorCode unveils Anya—the first agentic AI virtual security champion designed specifically for AppSec and product security teams. Anya brings together conversation and context to help AppSec, developers and security teams cut through the noise, prioritize risks, and make faster, smarter decisions across code, cloud, and infrastructure. Built into …
  continue reading
 
Segment 1: Erik Bloch Interview The math on SOC AI just isn't adding up. It's not easy to do the math, either, as each SOC automation vendor is tackling alert fatigue and SecOps assistants a bit differently. Fortunately for us and our audience, Erik Bloch met with many of these vendors at RSAC and is going to share what he learned with us! Segment …
  continue reading
 
Segment 1: Erik Bloch Interview The math on SOC AI just isn't adding up. It's not easy to do the math, either, as each SOC automation vendor is tackling alert fatigue and SecOps assistants a bit differently. Fortunately for us and our audience, Erik Bloch met with many of these vendors at RSAC and is going to share what he learned with us! Segment …
  continue reading
 
Segment 1: Erik Bloch Interview The math on SOC AI just isn't adding up. It's not easy to do the math, either, as each SOC automation vendor is tackling alert fatigue and SecOps assistants a bit differently. Fortunately for us and our audience, Erik Bloch met with many of these vendors at RSAC and is going to share what he learned with us! Segment …
  continue reading
 
Sean and Spencer talk state of the UFC!Episode 518 is brought to you by our friends at @Cloudbet!We’re breaking down all the madness from the UFC right now with UFC 316 coming up!Massive thanks to our sponsor @Cloudbet — the original crypto sportsbook.Live MMA betting, clean odds, and VIPs watching from private boxes 👀Support the show & get perks w…
  continue reading
 
In this special episode of Mental Healthy, we welcome Dr. Laurel Shaler—licensed therapist, professor, and passionate advocate for mental and emotional wellness. Today, Dr. Shaler dives into the heart of her newest book, "Loving Adopted Children Well: A 5 Love Languages Approach" (2024), co-authored with Dr. Gary Chapman, the bestselling author of …
  continue reading
 
This week in the security news: Malware-laced printer drivers Unicode steganography Rhode Island may sue Deloitte for breach. They may even win. Japan's active cyber defense law Stop with the ping LLMs replace Stack Overflow - ya don't say? Aggravated identity theft is aggravating Ivanti DSM and why you shouldn't use it EDR is still playing cat and…
  continue reading
 
In the leadership and communications section, Why Every CISO Should Be Gunning For A Seat At The Board Table, The Innovation We Need is Strategic, Not Technical , The Best Leaders Ask the Right Questions, and more! This segment is sponsored by Fortra. Visit https://securityweekly.com/fortrarsac to learn more about them! Fortra is successfully reduc…
  continue reading
 
In the news, Coinbase deals with bribes and insider threat, the NCSC notes the cross-cutting problem of incentivizing secure design, we cover some research that notes the multitude of definitions for secure design, and discuss the new Cybersecurity Skills Framework from the OpenSSF and Linux Foundation. Then we share two more sponsored interviews f…
  continue reading
 
Segment 1: Fastly Interview In this week's interview segment, we talk to Marshall Erwin about the state of cybersecurity, particularly when it comes to third party risk management, and whether we're ready for the next big SolarWinds or Crowdstrike incident. These big incidents have inspired executive orders, the Secure by Design initiative, and eve…
  continue reading
 
Segment 1: Fastly Interview In this week's interview segment, we talk to Marshall Erwin about the state of cybersecurity, particularly when it comes to third party risk management, and whether we're ready for the next big SolarWinds or Crowdstrike incident. These big incidents have inspired executive orders, the Secure by Design initiative, and eve…
  continue reading
 
Segment 1: Fastly Interview In this week's interview segment, we talk to Marshall Erwin about the state of cybersecurity, particularly when it comes to third party risk management, and whether we're ready for the next big SolarWinds or Crowdstrike incident. These big incidents have inspired executive orders, the Secure by Design initiative, and eve…
  continue reading
 
Sean and Graeme talk old school Irish MMA, Caolan to PFL, Gilbert Burns lash hoorah, Shem & Frimpong and more!Follow Sean X.Com/SeanSheehanBAFollow Graeme X.Com/SevereMMAJoin the fun and support our journalism on Patreon.com/SevereMMAPodcastEpisode 517 is brought to you by our friends at @Cloudbet!We’re breaking down all the madness from the weeken…
  continue reading
 
In this special Shortcast edition, Baratunde Thurston, shares his experience of unplugging from social media for 25 days—and what he learned about stress, productivity, and the importance of being present. Baratunde reveals how stepping away from constant digital interaction can lead to more meaningful real-world connections and less burnout. In th…
  continue reading
 
Outline 00:00 - Intro and early steps in control 06:42 - Journey to the US 08:30 - Kharitonov's theorem and early influences 12:10 - From Lund to KTH (Stockholm) 15:01 - Ascona and collaboration with Megretski 24:06 - The IMA year in Minnesota 33:50 - Integral quadratic constraints 46:10 - KYP lemma and meeting Yakubovich 52:35 - Piecewise hybrid s…
  continue reading
 
This week in the security news: Android catches up to iOS with its own lockdown mode Just in case, there is a new CVE foundation Branch privilege injection attacks My screen is vulnerable The return of embedded devices to take over the world - 15 years later Attackers are going after MagicINFO Hacking Starlink Mitel SIP phones can be hacked Reversi…
  continue reading
 
In the leadership and communications section, How CISOs can talk cybersecurity so it makes sense to executives, Firms to spend more on GenAI than security in 2025, Europe leads shift from cyber security ‘headcount gap’ to skills-based hiring, and more! Next, pre-recorded interviews from RSAC Conference 2025, including: This segment is sponsored by …
  continue reading
 
In this episode, Dr. Brian Kelley shares valuable insights for college students studying psychology and related fields. Drawing from extensive research in his new book Applied Cognitive Psychology: A Christian and Ethically Integrated Approach, Dr. Kelley explores how students can improve focus, understand the unconscious influence of thought patte…
  continue reading
 
Developers are relying on LLMs as coding assistants, so where are the LLM assistants for appsec? The principles behind secure code reviews don't really change based on who write the code, whether human or AI. But more code means more reasons for appsec to scale its practices and figure out how to establish trust in code, packages, and designs. Rey …
  continue reading
 
This week on The CEO Series, Professor Karl Moore sits down with Graham Carr, President and Vice-Chancellor of Concordia University. Tune in to hear about his path from teaching to senior administration, how Concordia stands out among local universities, and how it’s tackling tuition hikes and other emerging challenges in higher education.…
  continue reading
 
Segment 1 - Secrets and their role in infrastructure security From API keys and tokens to environment variables and credentials, secrets are foundational—and often overlooked—attack surfaces in cloud-native and distributed systems. We break down the risks tied to poor secret hygiene, discuss emerging patterns for secure secret management at scale, …
  continue reading
 
Segment 1 - Secrets and their role in infrastructure security From API keys and tokens to environment variables and credentials, secrets are foundational—and often overlooked—attack surfaces in cloud-native and distributed systems. We break down the risks tied to poor secret hygiene, discuss emerging patterns for secure secret management at scale, …
  continue reading
 
Segment 1 - Secrets and their role in infrastructure security From API keys and tokens to environment variables and credentials, secrets are foundational—and often overlooked—attack surfaces in cloud-native and distributed systems. We break down the risks tied to poor secret hygiene, discuss emerging patterns for secure secret management at scale, …
  continue reading
 
Sean and Graeme talk Paul Hughes, PFL Belfast, JDM, Shevchenko, UFC 315 and more!Follow Sean X.Com/SeanSheehanBAFollow Graeme X.Com/SevereMMAJoin the fun and support our journalism on Patreon.com/SevereMMAPodcastEpisode 516 is brought to you by our friends at @Cloudbet!We’re breaking down all the madness from #PFLBelfast — including Paul Hughes’ hu…
  continue reading
 
Loading …
Copyright 2025 | Privacy Policy | Terms of Service | | Copyright
Listen to this show while you explore
Play