Talking about real life situations and things that's occurring around us.Family life, Sports, politics local governments. Our country and where does it seems to be heading? Different topics and things that we could try to make a difference, because you have to know the truth in order to rebuild and to have a successful outcome... Love you before you can love someone else 💗
…
continue reading
Michael Randolph Podcasts
Sound Words helps Christians love and live out God's Word. By discussing topics on the Bible, theology, and Christian living we desire to help people grow in their walk with Jesus Christ. To learn more visit https://soundwords.org
…
continue reading
Welcome to the Security Weekly Podcast Network, your all-in-one source for the latest in cybersecurity! This feed features a diverse lineup of shows, including Application Security Weekly, Business Security Weekly, Paul's Security Weekly, Enterprise Security Weekly, and Security Weekly News. Whether you're a cybersecurity professional, business leader, or tech enthusiast, we cover all angles of the cybersecurity landscape. Tune in for in-depth panel discussions, expert guest interviews, and ...
…
continue reading
Security DNA is a podcast brought to you by SecurityInfoWatch.com, covering subjects of interest to security stakeholders in the industry. Topics range from security industry news, trends and analysis to technology solutions, policy risk analysis and management, and more. Our editorial team, along with industry experts and consultants, fill each podcast episode with information that is of value to security professionals.
…
continue reading
Brilliant inventions, fresh product designs, iconic brand names and artistic creativity are not only the building blocks of successful business - they deliver a better world for us all. But these valuable forms of intellectual property must be protected in order to flourish. We are the Chartered Institute of Patent Attorneys - the UK's largest intellectual property organisation. Our hosts Lee Davies and Gwilym Roberts chat with entrepreneurs, creatives, patent attorneys and the occasional ju ...
…
continue reading
The UCLA Internal Medicine Podcast contains the lectures presented in the Department of Internal Medicine at the Ronald Reagan-UCLA Medical Center.
…
continue reading

1
Property De-Constructed – A Collective Wisdom of all things Property and Real Estate
Mark Errichiello - Master Advocates Real Estate Services
We're all connected in life. We all have similar core necessities - food, water, air, shelter, health, love. Real Estate - it doesn't matter if it's for personal or business, to rent or buy - we need shelter and community which assists us fulfil our core necessities. Property De-Constructed is a collective wisdom of all things Property and Real Estate. Presented by hosts Pat Panetta of Tell Your Story Media and Mark Errichiello of Master Advocates Real Estate Services. Each episode breaks do ...
…
continue reading

1
Riker's Curse, River City, EDR-Freeze, MCP, WordPress, GitHub, Josh Marpet, and More. - SWN #515
30:49
30:49
Play later
Play later
Lists
Like
Liked
30:49Riker's Curse, River City, EDR-Freeze, MCP, WordPress, GitHub, Josh Marpet, and More, on this edition of the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-515
…
continue reading

1
Broadcom, LastPass, SEO Poisoning, QR codes, H1B visas, Distributed Computing... - PSW #893
1:03:06
1:03:06
Play later
Play later
Lists
Like
Liked
1:03:06Broadcom, LastPass, Brickstone, SEO Poisoning, QR codes, H1B visas, Distributed Computing, and More... Visit https://www.securityweekly.com/psw for all the latest episodes! Show Notes: https://securityweekly.com/psw-893
…
continue reading

1
Countering Drone Threats at Critical Sites with Echodyne's Leo McCloskey
24:09
24:09
Play later
Play later
Lists
Like
Liked
24:09Drones are reshaping U.S. critical infrastructure—but not always for the better. While they streamline inspections of power lines, pipelines, and bridges, rogue or malicious drones pose a real threat to airports, energy grids, and government sites. As these incidents rise, protecting vital systems has become an urgent priority. Rodney Bosch, SIW Ed…
…
continue reading

1
Reading the Bible Like a Biblicist (Dr. Mark Snoeberger)
23:03
23:03
Play later
Play later
Lists
Like
Liked
23:03Why is literal interpretation essential for biblicism? Dr. Mark Snoeberger of Detroit Baptist Theological Seminary explains why we must read Scripture according to authorial intent, the dangers of rejecting literal hermeneutics, and how the historical and grammatical context protects us from error. He also gives practical examples of how literal re…
…
continue reading

1
Rearchitecting Systems for Privacy as AI Agents Force You to Rethink Security - Guillaume Jaulerry - BSW #414
1:02:20
1:02:20
Play later
Play later
Lists
Like
Liked
1:02:20As AI and cloud-based services power our connected world, individuals are facing an unprecedented privacy crisis. With more than 2.3 billion people entrusting their data to the cloud and centralized servers, cyberattacks, data breaches, surveillance, identity theft, and privacy threats are now everyday risks. How do we protect against these threats…
…
continue reading

1
Uhura, Collins, Nimbus Manticore, Sonic Wall, Async Rat, Solar Winds, Aaran Leyland.. - SWN #514
29:42
29:42
Play later
Play later
Lists
Like
Liked
29:42Uhura, Collins, Nimbus Manticore, Sonic Wall, Async Rat, Solar Winds, ShadowV2, H1B, Aaran Leyland, and more on the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-514
…
continue reading

1
Design Errors in Entra ID, Design Defenses in iOS, Design Difficulties in DeepSeek - ASW #349
58:43
58:43
Play later
Play later
Lists
Like
Liked
58:43In the news, Microsoft encounters a new cascade of avoidable errors with Entra ID, Apple improves iOS with hardware-backed memory safety, DeepSeek demonstrates the difficulty in reviewing models, curl reduces risk by eliminating code, preserving the context of code reviews, and more! Visit https://www.securityweekly.com/asw for all the latest episo…
…
continue reading

1
Disruption is Coming for the Vulnerability Management Market - Tod Beardsley - ESW #425
1:47:15
1:47:15
Play later
Play later
Lists
Like
Liked
1:47:15Interview with Tod Beardsley This interview is sponsored by runZero. Legacy vulnerability management (VM) hasn't innovated alongside of attackers, and it shows. Let's talk about the state of VM. Check out https://securityweekly.com/runzero to learn more! Topic Segment: NPM Incidents In this week’s topic segment, we’re discussing all the NPM supply …
…
continue reading

1
CrowdStrike's AI Innovations in Cyber Defense - SWN #513
37:15
37:15
Play later
Play later
Lists
Like
Liked
37:15In this episode of Security Weekly News, Joshua Marpet and Aaran Leyland discuss the latest trends in AI and cybersecurity, focusing on innovations from CrowdStrike, the implications of new cyber incident reporting rules, and the evolving landscape of ransomware. They explore the role of AI in enhancing security measures, the challenges posed by ma…
…
continue reading

1
Safes, Hackers, and Web Servers - PSW #892
2:12:25
2:12:25
Play later
Play later
Lists
Like
Liked
2:12:25This week's technical segment is all about the T-Lora Pager from Lilygo, and really cool Meshtastic device that can also be used for some hacking tasks! In the security news: Your safe is not safe Cisco ASA devices are under attack VMScape HybridPetya and UEFI attacks in the wild Eveything is a Linux terminal Hackers turns 30 Hosting websites on di…
…
continue reading

1
How to Apply the Bible Faithfully (Pastor Jack Hughes)
40:53
40:53
Play later
Play later
Lists
Like
Liked
40:53How do we move faithfully from interpretation to application? Dr. Jack Hughes, Lead Pastor of Anchor Bible Church, explains why exegesis is essential, what mistakes to avoid, and how biblicist application safeguards the church. With practical examples and preaching pointers, this episode equips teachers and believers to apply God’s Word faithfully.…
…
continue reading

1
Board Priority But Lack of Access & CISO Pressure, 360 Privacy and Pentera Interviews - Chuck Randolph, Tom Pore - BSW #413
1:10:10
1:10:10
Play later
Play later
Lists
Like
Liked
1:10:10In the leadership and communications segment, Lack of board access: The No. 1 factor for CISO dissatisfaction, Pressure on CISOs to stay silent about security incidents growing, The Secret to Building a High-Performing Team, and more! Jackie McGuire sits down with Chuck Randolph, SVP of Strategic Intelligence & Security at 360 Privacy, for a grippi…
…
continue reading

1
AI Nuns, Steganography, You're fired, VoidProxy, C++, Carplay Apriso, Josh Marpet... - SWN #512
34:29
34:29
Play later
Play later
Lists
Like
Liked
34:29AI Nuns, Steganography, You're fired, VoidProxy, C++, Carplay Apriso, Josh Marpet, and more on the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-512
…
continue reading

1
How OWASP's GenAI Security Project keeps up with the pace of AI/Agentic changes - Scott Clinton - ASW #348
1:08:00
1:08:00
Play later
Play later
Lists
Like
Liked
1:08:00This week, we chat with Scott Clinton, board member and co-chain of the OWASP GenAI Security Project. This project has become a massive organization within OWASP with hundreds of volunteers and thousands of contributors. This team has been cranking out new tools, reports and guidance for practitioners month after month for over a year now. We start…
…
continue reading

1
Forrester's AEGIS Framework, the weekly news, and interviews with Fortra and Island - Jeff Pollard, Rohit Dhamankar, Michael Leland - ESW #424
1:40:37
1:40:37
Play later
Play later
Lists
Like
Liked
1:40:37Segment 1 - Interview with Jeff Pollard Introducing Forrester’s AEGIS Framework: Agentic AI Enterprise Guardrails For Information Security For this episode’s interview, we’re talking to Forrester analyst Jeff Pollard. I’m pulling this segment’s description directly from the report’s executive summary, which I think says it best: As AI agents and ag…
…
continue reading

1
Diella, Texas, Movie Rip Offs, WAF, AdaptixC2, Nano11, and More... - SWN #511
33:44
33:44
Play later
Play later
Lists
Like
Liked
33:44Diella, Texas, Movie Rip Offs, WAF, AdaptixC2, Nano11, and More, on this edition of the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-511
…
continue reading
This week: Americans Can't Hack It Copy and paste to get malware Pixel 5 web servers - because you can How they got in and why security is hard Vulnerability management is failing - is it dead yet? Exploiting hacker tools Bluetooth spending spree! How to defend your car IoT security solutions and other such lies Exploiting IBM i (formerly AS/400) V…
…
continue reading

1
Bridging Architecture & Security for Smarter Enterprises with The Consulting Group's Michael Niola
33:34
33:34
Play later
Play later
Lists
Like
Liked
33:34Join host Steve Lasky and Michael Niola, Principal and Co-Founder of The Consulting Group LLC, as they explore the future of integrated systems, AI in security, and designing safety into spaces from day one. From “one card” access control to the challenges of data center speed-to-market, Michael shares insights on turning security from a cost cente…
…
continue reading
What does it mean to be a biblicist—and why should Christians embrace the label? In this episode, Dr. Cory Marsh of Southern California Seminary unpacks the definition of biblicism, its connection to sola Scriptura, and how to guard against tradition and opinion taking precedence over God’s Word. He also addresses common criticisms and explains why…
…
continue reading

1
Forrester 2026 Budget Planning Guide and BlackHat 2025 Interviews - Jess Burn, Matt Muller, Danny Jenkins - BSW #412
1:11:11
1:11:11
Play later
Play later
Lists
Like
Liked
1:11:11With volatility now the norm, security and risk leaders need practical guidance on managing existing spending and new budgetary necessities. Where should they look? Jess Burn, Principal Analyst at Forrester Research, joins Business Security Weekly to discuss Forrester's Budget Planning Guide 2026: Security And Risk. This data-and-insights-driven re…
…
continue reading

1
Hellhounds, Anthropic, iCloud, NPM, gitforked, notdoor, TOR, Signal, Josh Marpet - SWN #510
32:42
32:42
Play later
Play later
Lists
Like
Liked
32:42AI Hellhounds, Anthropic, iCloud, NPM, gitforked, notdoor, TOR, Signal, WhatsApp, Josh Marpet, and more on the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-510
…
continue reading

1
Limitations and Liabilities of LLM Coding - Seemant Sehgal, Ted Shorter - ASW #347
1:17:09
1:17:09
Play later
Play later
Lists
Like
Liked
1:17:09Up first, the ASW news of the week. At Black Hat 2025, Doug White interviews Ted Shorter, CTO of Keyfactor, about the quantum revolution already knocking on cybersecurity’s door. They discuss the terrifying reality of quantum computing’s power to break RSA and ECC encryption—the very foundations of modern digital life. With 2030 set as the deadline…
…
continue reading

1
Ransomware, Agentic AI, and Supply Chain Risks: Insights from Black Hat 2025 - HD Moore, Jason Passwaters, J.J. Guy, Theresa Lanowitz, Mickey Bresman, Yuval Wollman, Jawahar “Jawa” Sivasankaran - ESW ...
2:06:06
2:06:06
Play later
Play later
Lists
Like
Liked
2:06:06Doug White sits down with Theresa Lanowitz, Chief Evangelist at LevelBlue, for a powerful and timely conversation about one of cybersecurity’s most pressing threats: the software supply chain. Theresa shares fresh insights from LevelBlue’s global research involving 1,500 cybersecurity professionals across 16 countries. Together, they unpack the rea…
…
continue reading

1
AI Trolley Problems, Rhode Island Drivers, and Kohlbergian Post Conventionalism - SWN #509
40:58
40:58
Play later
Play later
Lists
Like
Liked
40:58Josh Marpet and Doug White talk about AI Ethics, Issues, and Compliance. AI Trolley problems, Rhode Island Drivers, and Post Conventionalism. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-509
…
continue reading

1
Lasagna DoS, AI Slop, Hacker Ultimatums - PSW #890
2:04:36
2:04:36
Play later
Play later
Lists
Like
Liked
2:04:36In the secure news: Automakers respond to Flipper Zero attacks More on the unconfirmed Elastic EDR 0-Day When Secure Boot does its job too well Crazy authenitcation bypass Hacker ultimatums AI Slop Impatient hackers Linux ISOs are malware Attackers love drivers Hacking Amazon's Eero, the hard way Exploits will continue until security improves The S…
…
continue reading

1
Developing Theology Like a Biblicist (Dr. Richard Bargas)
39:12
39:12
Play later
Play later
Lists
Like
Liked
39:12What does it mean to develop theology like a biblicist—and why does it matter? In this episode, Dr. Richard Bargas joins Pastor Jesse Randolph to share his journey of becoming a biblicist and how the Bible itself—not tradition or personal opinion—must shape our doctrine. Together they discuss the inspiration and sufficiency of Scripture, practical …
…
continue reading

1
Security Money: The Index Dips and 20 Years of Cybersecurity Consolidation - Ross Haleliuk - BSW #411
1:04:12
1:04:12
Play later
Play later
Lists
Like
Liked
1:04:12The cybersecurity industry is undergoing a consolidation wave that is moving far faster than many realize. This isn’t at all about CISOs wanting fewer tools as much as some would like to think - the changes are happening at the macro level. Ross Haleliuk joins BSW to present the most comprehensive illustration ever made of how our industry has cons…
…
continue reading

1
Rinoa Poison, Scambaiter Extraordinaire - Rinoa Poison - SWN #508
33:29
33:29
Play later
Play later
Lists
Like
Liked
33:29I talk to Rinoa Poison about scambaiting, identity, and all sorts of things. Check it out. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-508
…
continue reading