Search a title or topic

Over 20 million podcasts, powered by 

Player FM logo

NEAR Protocol Podcasts

show episodes
 
Artwork

1
The WakeUp Protocol

Nadja Haldimann

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
Something inside of you knows… there’s more. You’re right! The WakeUp Protocol is a podcast for sensitive, curious souls who know there’s more to life than what we’ve been taught. Hosted by Nadja Haldimann, this is a space for big questions, deep remembering, and honest conversations about what it means to come back to your true self, beneath the conditioning, beyond the mask, outside the matrix. Each week, you’ll hear from guests who are in it too, navigating their own awakenings with coura ...
  continue reading
 
Artwork
 
The Saito Social — produced by the team behind the Saito network — is dedicated to the latest news and developments within China's blockchain space. Join us every episode as we talk with cutting-edge blockchain projects from the PRC, as well as teams from around the world focused on doing things in Asia. This is a show for blockchain people and by blockchain people. We hope you like it.
  continue reading
 
Two childhood friends talking news, reviews and everything happening in the world of video games. Follow us on Twitter @OddityAudio Instagram: @audioodditypodcast TikTok: @audioodditypodcast Facebook: @audioodditypodcast Good Pods: @audioodditypodcast
  continue reading
 
Artwork

1
Security Weekly Podcast Network (Audio)

Security Weekly Productions

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Daily
 
Welcome to the Security Weekly Podcast Network, your all-in-one source for the latest in cybersecurity! This feed features a diverse lineup of shows, including Application Security Weekly, Business Security Weekly, Paul's Security Weekly, Enterprise Security Weekly, and Security Weekly News. Whether you're a cybersecurity professional, business leader, or tech enthusiast, we cover all angles of the cybersecurity landscape. Tune in for in-depth panel discussions, expert guest interviews, and ...
  continue reading
 
Artwork

1
The Mark Moss Show

iHeartPodcasts

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly+
 
Welcome to The Mark Moss Show—where we break down the old-money system and equip you with the new money protocol to create, multiply, and preserve wealth in the digital age. Hosted by Mark Moss, a Bitcoin-focused venture capitalist, seasoned entrepreneur, and educator with over 25 years of experience, this show is your blueprint for financial sovereignty. We challenge outdated financial models and explore bold strategies powered by Bitcoin, AI, decentralization, and innovation—giving you the ...
  continue reading
 
Epicenter brings you in-depth conversations about the technical, economic and social implications of cryptocurrencies and blockchain technologies. Every week, we interview business leaders, engineers academics and entrepreneurs, and bring you a diverse spectrum of opinions and points of view. Epicenter is hosted by Sebastien Couture, Brian Fabian Crain, Friederike Ernst, Meher Roy and Felix Lutsch. Since 2014, our episodes have been downloaded over 8 million times.
  continue reading
 
Kim and Carol discuss FSM and take questions from current FSM practitioners. Frustrated with the limited options for treating pain and other complex medical issues? Add Frequency Specific Microcurrent to your medical toolbelt and let FSM help you reduce inflammation in any tissue, anytime... ...easily treat nerve pain. … and dissolve internal scarring and adhesions that cause mobility issues. Each Wednesday join Dr. Carolyn McMakin and Kim Pittis as they discuss what is going on in the world ...
  continue reading
 
Artwork

1
Abel James Show

Abel James

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
Get cutting-edge insights from world-class leaders in health, fitness, longevity, entrepreneurship, music and brain science. In-depth interviews with 400+ world-renowned experts including James Clear, Dr. Casey Means, Dr. Shawn Baker, Dr. Mark Hyman, Robb Wolf, Dr. Jack Kruse, Nir Eyal, Tony Horton, Dr. John Gray, Tim Ferriss, Lewis Howes, JP Sears, and many more. Originally launched in 2012 with the tongue-in-cheek title, The Fat-Burning Man Show, this podcast hit #1 in Health in 8 countrie ...
  continue reading
 
On Fundamental Value we speak with the leading hedge funds, analysts, trading venues, and digital asset market participants. Our goal is simple - to understand how the leading minds in the cryptocurrency space are researching, analyzing, and quantifying the value of cryptocurrency. The Fundamental Value Podcast is hosted by Joshua Frank, CEO of The TIE - the leading provider of institutional cryptocurrency data. https://thetie.io
  continue reading
 
Loading …
show series
 
This story was originally published on HackerNoon at: https://hackernoon.com/decentralization-vs-democracy-in-crypto-are-they-the-same-thing. Decentralization and democracy aren’t the same, but they shape how crypto communities work. Learn the differences and what to check in any project. Check more stories related to web3 at: https://hackernoon.co…
  continue reading
 
This story was originally published on HackerNoon at: https://hackernoon.com/inside-the-hardware-vault-free-web3-course-to-build-robust-apps. A free Binance Academy course shows Web3 developers how to use TEEs to build fast, private, and verifiable dApps with offchain computing. Check more stories related to web3 at: https://hackernoon.com/c/web3. …
  continue reading
 
Developers are adding LLMs to their code creation toolboxes, using them to assist with writing and reviewing code. Chris Wysopal talks about the security downsides of relying on LLMs and how appsec needs to adapt to dealing with more code at a faster pace. Resources https://www.veracode.com/blog/genai-code-security-report/ https://www.veracode.com/…
  continue reading
 
For our first episode of the new year, we thought it would be appropriate to dig into some cybersecurity predictions. First, we cover the very nature of predictions and why they're often so bad. To understand this, we get into logical fallacies and cognitive biases. In the next segment, we cover some 2025 predictions we found on the Internet. In th…
  continue reading
 
This story was originally published on HackerNoon at: https://hackernoon.com/defi-crypto-mutuum-finance-mutm-finalizes-v1-smart-contract-audit-with-halborn-security. Check more stories related to web3 at: https://hackernoon.com/c/web3. You can also check exclusive content about #web3, #mutuum-finance, #btcwire, #press-release, #mutuum-finance-annou…
  continue reading
 
00:00 The Illusion of Record High Markets 03:10 The Dollar as a Broken Yardstick 06:55 Currency Collapses Leave Clues 09:38 How the Imperial Carry Trade Works 12:45 Measuring Markets in Gold and Bitcoin 16:50 The Global Unit of Account Is Fracturing 19:40 How to Position for the Transition See omnystudio.com/listener for privacy information.…
  continue reading
 
This story was originally published on HackerNoon at: https://hackernoon.com/the-deterministic-black-box-that-keeps-failing-your-etherscan-verifications. Crypto contract verification is the definitive proof of identity in the DeFi ecosystem. However, the process is often misunderstood. Check more stories related to web3 at: https://hackernoon.com/c…
  continue reading
 
This story was originally published on HackerNoon at: https://hackernoon.com/a-developers-guide-to-building-next-gen-smart-wallets-with-erc-4337-part-2-bundlers. Bundlers are the bridge between account abstraction and the execution layer. Check more stories related to web3 at: https://hackernoon.com/c/web3. You can also check exclusive content abou…
  continue reading
 
Cloud breaches don’t always start in the cloud, but they do end there. To defeat an attacker you need to understand their mission target along with the access points available to them, regardless of whether they reside within or beyond the cloud. SentinelOne is purpose-built to stop attacks wherever they originate - from within and beyond the cloud…
  continue reading
 
This story was originally published on HackerNoon at: https://hackernoon.com/golds-transparency-problem-and-the-blockchain-solution. Blockchain technology is not a silver bullet for every problem in the gold supply chain, but it's proving to be a powerful tool for creating accountability. Check more stories related to web3 at: https://hackernoon.co…
  continue reading
 
What is your definition of success? The same mental habits that drive stadium-shaking victories can also lead to a profound sense of emptiness long after the roar of the crowd has faded. So it's important to ask yourself: What brings the most meaning to your life? What makes you feel most alive? And when life really hands it to you, what makes you …
  continue reading
 
Our field is booming! Cybersecurity jobs are projected to grow 33 percent through 2033, far outpacing the average 4 percent growth across all jobs. (And yes, those stats could be made up, but they sound nice, eh?) Yet newcomers often feel paralyzed by where to start. The truth? There's no single "right path," but there are proven strategies that wo…
  continue reading
 
This story was originally published on HackerNoon at: https://hackernoon.com/when-wallets-lie-measuring-real-users-in-a-bot-driven-web3. The silent crisis of on-chain bots - why most Web3 ‘users’ aren’t real. That’s a bigger problem than you think Check more stories related to web3 at: https://hackernoon.com/c/web3. You can also check exclusive con…
  continue reading
 
This story was originally published on HackerNoon at: https://hackernoon.com/how-crypto-can-protect-people-from-currency-wars. When we think of war, we imagine soldiers, weapons, and physical destruction. But there's another type of war that affects millions of people worldwide... Check more stories related to web3 at: https://hackernoon.com/c/web3…
  continue reading
 
Michael Saylor, founder and executive chairman of MicroStrategy, returns to explain how Bitcoin is transforming global capital markets and redefining the future of wealth creation. Drawing from his background in science and engineering, Saylor breaks down how Bitcoin’s architecture merges technology, economics, and mathematics to create the first t…
  continue reading
 
In this episode, hosts Sebastien Couture, Brian Crain, and Friederike Ernst gather for their annual wrap-up to discuss the end of the "infinite money glitch": the era where tokens traded at billions without proven product-market fit. They explore the 2025 "spring cleaning" that devastated the altcoin market and the quiet, efficient entry of web2 in…
  continue reading
 
This story was originally published on HackerNoon at: https://hackernoon.com/from-code-to-capital-the-tech-architecture-driving-the-stablecoin-and-tokenization-revolution. In 2024, stablecoin transfer volumes will eclipse the combined settlement volume of traditional payment providers by more than 7%. Check more stories related to web3 at: https://…
  continue reading
 
CISO pressures are on the rise - board expectations, executive alignment, AI, and personal liability - and that's all on top of your normal security pressures. With all these pressures, CISO burnout is on the rise. How do we detect it and help prevent it? Easier said than done. In this Say Easy, Do Hard segment, we tackle the health and wellness of…
  continue reading
 
CISO pressures are on the rise - board expectations, executive alignment, AI, and personal liability - and that's all on top of your normal security pressures. With all these pressures, CISO burnout is on the rise. How do we detect it and help prevent it? Easier said than done. In this Say Easy, Do Hard segment, we tackle the health and wellness of…
  continue reading
 
CISO pressures are on the rise - board expectations, executive alignment, AI, and personal liability - and that's all on top of your normal security pressures. With all these pressures, CISO burnout is on the rise. How do we detect it and help prevent it? Easier said than done. In this Say Easy, Do Hard segment, we tackle the health and wellness of…
  continue reading
 
SentinelOne announced a series of new innovative designations and integrations with Amazon Web Services (AWS), designed to bring the full benefits of AI security to AWS customers today. From securing GenAI usage in the workplace, to protecting AI infrastructure to leveraging agentic AI and automation to speed investigations and incident response, S…
  continue reading
 
This story was originally published on HackerNoon at: https://hackernoon.com/why-verifiability-matters-for-security-12-key-cloud-application-use-cases. Verifiability is becoming essential for crypto, AI, and cloud apps. Learn why proving how systems run will shape the next gen of secure infrastructure. Check more stories related to web3 at: https:/…
  continue reading
 
This story was originally published on HackerNoon at: https://hackernoon.com/educational-byte-smart-contracts-vs-autonomous-agents. Smart contracts and Autonomous Agents in Obyte have different strengths. This overview helps you see how each one works and when they shine. Check more stories related to web3 at: https://hackernoon.com/c/web3. You can…
  continue reading
 
In an era dominated by AI-powered security tools and cloud-native architectures, are traditional Web Application Firewalls still relevant? Join us as we speak with Felipe Zipitria, co-leader of the OWASP Core Rule Set (CRS) project. Felipe has been at the forefront of open-source security, leading the development of one of the world's most widely d…
  continue reading
 
For this week's episode of Enterprise Security Weekly, there wasn't a lot of time to prepare. I had to do 5 podcasts in about 8 days leading up to the holiday break, so I decided to just roll with a general chat and see how it went. Also, apologies, for any audio quality issues, as the meal I promised to make for dinner this day required a lot of p…
  continue reading
 
2026 isn’t asking you to fix the world, it is however asking you to remember who you really are and act in accordance with your truth! In this special episode of The WakeUp Protocol, Nadja Haldimann is joined by spiritual guide, Akashic Soul Channel, and podcaster Ahna Hendrix for a rare and timely Akashic Records forecast for the year ahead. This …
  continue reading
 
2026 is not just another year. It’s the beginning of what I believe will be the biggest wealth window of the next four years. Maybe the next decade. But here’s the truth — most people will miss it. Not because of timing… Not because of money… But because they don’t have the capacity or the systems to take advantage of the opportunity. See omnystudi…
  continue reading
 
This story was originally published on HackerNoon at: https://hackernoon.com/only-1percent-of-phase-6-remains-as-this-$0035-defi-crypto-enters-its-final-accumulation-window. It is preparing to activate these systems with its V1 launch. MUTM is currently priced at $0.035. Check more stories related to web3 at: https://hackernoon.com/c/web3. You can …
  continue reading
 
This story was originally published on HackerNoon at: https://hackernoon.com/tether-is-no-longer-just-a-stablecoin-company. If you believe financial inclusion matters more than institutional turf, Tether has done more in a decade than the World Bank did in 80 years. Check more stories related to web3 at: https://hackernoon.com/c/web3. You can also …
  continue reading
 
You survived the click—but now the click has evolved. In Part 2, the crew follows phishing and ransomware down the rabbit hole into double extortion, initial access brokers, cyber insurance drama, and the unsettling rise of agentic AI that can click, run scripts, and make bad decisions for you. The conversation spans ransomware economics, why payin…
  continue reading
 
In this episode, host Sebastian Couture is joined by Ismael Hishon-Rezaizadeh, CEO of Lagrange, to explore the intersection of frontier cryptography and national security. Ismael discusses the transition of zero-knowledge (ZK) technology from a "token-centric" crypto tool to a vital component of defense, specifically focusing on its role in securin…
  continue reading
 
This story was originally published on HackerNoon at: https://hackernoon.com/solo-satoshi-becomes-authorized-canaan-distributor-for-avalon-home-bitcoin-miners. Solo Satoshi is now an authorized Canaan distributor, bringing the full Avalon home Bitcoin miner lineup to 40,000+ customers. Start mining Bitcoin at home! Check more stories related to web…
  continue reading
 
This story was originally published on HackerNoon at: https://hackernoon.com/from-lagos-to-mauritius-we-paid-people-to-play-mario-kart-with-bitcoin. Mario Kart at the second edition of BTrust's Dev Day held in Mauritius. Check more stories related to web3 at: https://hackernoon.com/c/web3. You can also check exclusive content about #bitcoin, #block…
  continue reading
 
In this episode of The WakeUp Protocol, host Nadja Haldimann sits down with Cori Lovejoy, a cultural connector, spiritual seeker, and deeply thoughtful human who has lived life on both sides of a binary most of us never question. Cori spent nearly five decades navigating the world in a male body while carrying a truth she didn’t yet have language f…
  continue reading
 
Samson Mow, CEO of JAN3 and one of the leading voices driving nation-state Bitcoin adoption, joins to break down why the next phase of Bitcoin’s growth will be led not by individuals—but by governments. From El Salvador’s bold experiment to the quiet shift happening in central banks, Samson reveals how Bitcoin is evolving from a monetary revolution…
  continue reading
 
The crew makes suggestions for building a hacking lab today! We will tackle: What is recommended today to build a lab, given the latest advancements in tech Hardware hacking devices and gadgets that are a must-have Which operating systems should you learn Virtualization technology that works well for a lab build Using AI to help build your lab Visi…
  continue reading
 
Join Business Security Weekly for a roundtable-style year-in-review. The BSW hosts share the most surprising, inspiring, and humbling moments of 2025 in business security, culture, and personal growth. And a few of us might be dressed for the upcoming holiday season... Visit https://www.securityweekly.com/bsw for all the latest episodes! Show Notes…
  continue reading
 
Join Business Security Weekly for a roundtable-style year-in-review. The BSW hosts share the most surprising, inspiring, and humbling moments of 2025 in business security, culture, and personal growth. And a few of us might be dressed for the upcoming holiday season... Show Notes: https://securityweekly.com/bsw-427…
  continue reading
 
Join Business Security Weekly for a roundtable-style year-in-review. The BSW hosts share the most surprising, inspiring, and humbling moments of 2025 in business security, culture, and personal growth. And a few of us might be dressed for the upcoming holiday season... Visit https://www.securityweekly.com/bsw for all the latest episodes! Show Notes…
  continue reading
 
It’s the holidays, your defenses are down, your inbox is lying to you, and yes—you’re gonna click the link. In Part 1 of our holiday special, Doug White and a panel of very smart people explain why social engineering still works decades later, why training alone won’t save you, and why the real job is surviving after the click. From phishing and sm…
  continue reading
 
Using OWASP SAMM to assess and improve compliance with the Cyber Resilience Act (CRA) is an excellent strategy, as SAMM provides a framework for secure development practices such as secure by design principles and handling vulns. Segment Resources: https://owaspsamm.org/ https://cybersecuritycoalition.be/resource/a-strategic-approach-to-product-sec…
  continue reading
 
Interview with Frank Vukovits: Focusing inward: there lie threats also External threats get discussed more than internal threats. There’s a bit of a streetlight effect here: external threats are more visible, easier to track, and sharing external threat intelligence doesn’t infringe on any individual organization’s privacy. That’s why we hear the i…
  continue reading
 
This story was originally published on HackerNoon at: https://hackernoon.com/why-liquidity-matters-more-than-strategy-in-crypto-trading. Even the best crypto strategies fail without liquidity. Discover why execution, slippage, and spreads matter more than indicators. Check more stories related to web3 at: https://hackernoon.com/c/web3. You can also…
  continue reading
 
This story was originally published on HackerNoon at: https://hackernoon.com/mocaportfolio-goes-live-inside-animoca-brands-$20m-token-distribution-platform-for-moca-stakers. MocaPortfolio launches with $20M token allocation from Animoca portfolio. MOCA stakers access Magic Eden drop through burn mechanism. Check more stories related to web3 at: htt…
  continue reading
 
This story was originally published on HackerNoon at: https://hackernoon.com/bdx-on-layerzero-and-stargate-privacy-meets-cross-chain-interoperability. BDX goes multi-chain with LayerZero and Stargate, enabling seamless cross-chain asset transfers across Ethereum, BNB Chain, Solana, Arbitrum, and Base networks. Check more stories related to web3 at:…
  continue reading
 
Loading …
Copyright 2026 | Privacy Policy | Terms of Service | | Copyright
Listen to this show while you explore
Play