Search a title or topic

Over 20 million podcasts, powered by 

Player FM logo

Michael Randolph Podcasts

show episodes
 
Artwork

1
Guaranteed the Truth

Michael Randolph

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Talking about real life situations and things that's occurring around us.Family life, Sports, politics local governments. Our country and where does it seems to be heading? Different topics and things that we could try to make a difference, because you have to know the truth in order to rebuild and to have a successful outcome... Love you before you can love someone else 💗
  continue reading
 
Artwork

1
Sound Words Podcast

Sound Words Ministries

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
Sound Words helps Christians love and live out God's Word. By discussing topics on the Bible, theology, and Christian living we desire to help people grow in their walk with Jesus Christ. To learn more visit https://soundwords.org
  continue reading
 
Artwork
 
Welcome to the Security Weekly Podcast Network, your all-in-one source for the latest in cybersecurity! This feed features a diverse lineup of shows, including Application Security Weekly, Business Security Weekly, Paul's Security Weekly, Enterprise Security Weekly, and Security Weekly News. Whether you're a cybersecurity professional, business leader, or tech enthusiast, we cover all angles of the cybersecurity landscape. Tune in for in-depth panel discussions, expert guest interviews, and ...
  continue reading
 
Artwork

1
Security DNA

Endeavor Business Media

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Security DNA is a podcast brought to you by SecurityInfoWatch.com, covering subjects of interest to security stakeholders in the industry. Topics range from security industry news, trends and analysis to technology solutions, policy risk analysis and management, and more. Our editorial team, along with industry experts and consultants, fill each podcast episode with information that is of value to security professionals.
  continue reading
 
Brilliant inventions, fresh product designs, iconic brand names and artistic creativity are not only the building blocks of successful business - they deliver a better world for us all. But these valuable forms of intellectual property must be protected in order to flourish. We are the Chartered Institute of Patent Attorneys - the UK's largest intellectual property organisation. Our hosts Lee Davies and Gwilym Roberts chat with entrepreneurs, creatives, patent attorneys and the occasional ju ...
  continue reading
 
Artwork
 
We're all connected in life. We all have similar core necessities - food, water, air, shelter, health, love. Real Estate - it doesn't matter if it's for personal or business, to rent or buy - we need shelter and community which assists us fulfil our core necessities. Property De-Constructed is a collective wisdom of all things Property and Real Estate. Presented by hosts Pat Panetta of Tell Your Story Media and Mark Errichiello of Master Advocates Real Estate Services. Each episode breaks do ...
  continue reading
 
Loading …
show series
 
Drones are reshaping U.S. critical infrastructure—but not always for the better. While they streamline inspections of power lines, pipelines, and bridges, rogue or malicious drones pose a real threat to airports, energy grids, and government sites. As these incidents rise, protecting vital systems has become an urgent priority. Rodney Bosch, SIW Ed…
  continue reading
 
Why is literal interpretation essential for biblicism? Dr. Mark Snoeberger of Detroit Baptist Theological Seminary explains why we must read Scripture according to authorial intent, the dangers of rejecting literal hermeneutics, and how the historical and grammatical context protects us from error. He also gives practical examples of how literal re…
  continue reading
 
As AI and cloud-based services power our connected world, individuals are facing an unprecedented privacy crisis. With more than 2.3 billion people entrusting their data to the cloud and centralized servers, cyberattacks, data breaches, surveillance, identity theft, and privacy threats are now everyday risks. How do we protect against these threats…
  continue reading
 
In the news, Microsoft encounters a new cascade of avoidable errors with Entra ID, Apple improves iOS with hardware-backed memory safety, DeepSeek demonstrates the difficulty in reviewing models, curl reduces risk by eliminating code, preserving the context of code reviews, and more! Visit https://www.securityweekly.com/asw for all the latest episo…
  continue reading
 
Interview with Tod Beardsley This interview is sponsored by runZero. Legacy vulnerability management (VM) hasn't innovated alongside of attackers, and it shows. Let's talk about the state of VM. Check out https://securityweekly.com/runzero to learn more! Topic Segment: NPM Incidents In this week’s topic segment, we’re discussing all the NPM supply …
  continue reading
 
In this episode of Security Weekly News, Joshua Marpet and Aaran Leyland discuss the latest trends in AI and cybersecurity, focusing on innovations from CrowdStrike, the implications of new cyber incident reporting rules, and the evolving landscape of ransomware. They explore the role of AI in enhancing security measures, the challenges posed by ma…
  continue reading
 
This week's technical segment is all about the T-Lora Pager from Lilygo, and really cool Meshtastic device that can also be used for some hacking tasks! In the security news: Your safe is not safe Cisco ASA devices are under attack VMScape HybridPetya and UEFI attacks in the wild Eveything is a Linux terminal Hackers turns 30 Hosting websites on di…
  continue reading
 
How do we move faithfully from interpretation to application? Dr. Jack Hughes, Lead Pastor of Anchor Bible Church, explains why exegesis is essential, what mistakes to avoid, and how biblicist application safeguards the church. With practical examples and preaching pointers, this episode equips teachers and believers to apply God’s Word faithfully.…
  continue reading
 
In the leadership and communications segment, Lack of board access: The No. 1 factor for CISO dissatisfaction, Pressure on CISOs to stay silent about security incidents growing, The Secret to Building a High-Performing Team, and more! Jackie McGuire sits down with Chuck Randolph, SVP of Strategic Intelligence & Security at 360 Privacy, for a grippi…
  continue reading
 
This week, we chat with Scott Clinton, board member and co-chain of the OWASP GenAI Security Project. This project has become a massive organization within OWASP with hundreds of volunteers and thousands of contributors. This team has been cranking out new tools, reports and guidance for practitioners month after month for over a year now. We start…
  continue reading
 
Segment 1 - Interview with Jeff Pollard Introducing Forrester’s AEGIS Framework: Agentic AI Enterprise Guardrails For Information Security For this episode’s interview, we’re talking to Forrester analyst Jeff Pollard. I’m pulling this segment’s description directly from the report’s executive summary, which I think says it best: As AI agents and ag…
  continue reading
 
This week: Americans Can't Hack It Copy and paste to get malware Pixel 5 web servers - because you can How they got in and why security is hard Vulnerability management is failing - is it dead yet? Exploiting hacker tools Bluetooth spending spree! How to defend your car IoT security solutions and other such lies Exploiting IBM i (formerly AS/400) V…
  continue reading
 
Join host Steve Lasky and Michael Niola, Principal and Co-Founder of The Consulting Group LLC, as they explore the future of integrated systems, AI in security, and designing safety into spaces from day one. From “one card” access control to the challenges of data center speed-to-market, Michael shares insights on turning security from a cost cente…
  continue reading
 
What does it mean to be a biblicist—and why should Christians embrace the label? In this episode, Dr. Cory Marsh of Southern California Seminary unpacks the definition of biblicism, its connection to sola Scriptura, and how to guard against tradition and opinion taking precedence over God’s Word. He also addresses common criticisms and explains why…
  continue reading
 
With volatility now the norm, security and risk leaders need practical guidance on managing existing spending and new budgetary necessities. Where should they look? Jess Burn, Principal Analyst at Forrester Research, joins Business Security Weekly to discuss Forrester's Budget Planning Guide 2026: Security And Risk. This data-and-insights-driven re…
  continue reading
 
Up first, the ASW news of the week. At Black Hat 2025, Doug White interviews Ted Shorter, CTO of Keyfactor, about the quantum revolution already knocking on cybersecurity’s door. They discuss the terrifying reality of quantum computing’s power to break RSA and ECC encryption—the very foundations of modern digital life. With 2030 set as the deadline…
  continue reading
 
Doug White sits down with Theresa Lanowitz, Chief Evangelist at LevelBlue, for a powerful and timely conversation about one of cybersecurity’s most pressing threats: the software supply chain. Theresa shares fresh insights from LevelBlue’s global research involving 1,500 cybersecurity professionals across 16 countries. Together, they unpack the rea…
  continue reading
 
In the secure news: Automakers respond to Flipper Zero attacks More on the unconfirmed Elastic EDR 0-Day When Secure Boot does its job too well Crazy authenitcation bypass Hacker ultimatums AI Slop Impatient hackers Linux ISOs are malware Attackers love drivers Hacking Amazon's Eero, the hard way Exploits will continue until security improves The S…
  continue reading
 
What does it mean to develop theology like a biblicist—and why does it matter? In this episode, Dr. Richard Bargas joins Pastor Jesse Randolph to share his journey of becoming a biblicist and how the Bible itself—not tradition or personal opinion—must shape our doctrine. Together they discuss the inspiration and sufficiency of Scripture, practical …
  continue reading
 
The cybersecurity industry is undergoing a consolidation wave that is moving far faster than many realize. This isn’t at all about CISOs wanting fewer tools as much as some would like to think - the changes are happening at the macro level. Ross Haleliuk joins BSW to present the most comprehensive illustration ever made of how our industry has cons…
  continue reading
 
Loading …
Copyright 2025 | Privacy Policy | Terms of Service | | Copyright
Listen to this show while you explore
Play