Hosted by David Beckworth of the Mercatus Center, Macro Musings pulls back the curtain on the important macroeconomic issues of the past, present, and future.
…
continue reading
Peter Conti Podcasts
Every day, business scholars answer pressing questions in their research — but what do their insights mean for you? In this podcast, Wharton faculty dive into what inspired their studies and how their findings resonate with the world today. Learn how research insights translate into knowledge you can use, with host Dan Loney. Hosted on Acast. See acast.com/privacy for more information.
…
continue reading
Meet Peter and Paul, the brains behind Real Estate 101. A former mechanic, Peter is the co-author of Commercial Real Estate Investing For Dummies and is now considered a premier expert in the country on helping every day achieve their commercial real estate dreams. Paul left his corporate director gig ten years ago to invest in real estate full-time and has never looked back. It did not take him long to realize that he could make a huge impact as a mentor and he has spent the last few years ...
…
continue reading
Welcome to the Accelerated Investor Podcast with Josh Cantwell. This podcast is the go-to destination for real estate investors both active and passive and multifamily apartment investors both new, intermediate and advanced. The Accelerated Investor Podcast is aimed at multifamily real estate investors looking to retire early and have forever passive income. In each podcast we strive to bring no hype real estate investing education, simple but proven strategies, syndication stories, self-dev ...
…
continue reading
Tired of the same old marketing podcasts? Are you ready to learn from the best marketing minds on the planet while making a difference at the same time? Well, look no further, because Marketing Legends is the podcast for you! This ad-free program with host Matt Leitz presents a special opportunity to gain knowledge from the top marketers in the business. Each episode will feature an in-depth interview with a unique marketing legend as they do a deep dive into their own story—both good and ba ...
…
continue reading
Welcome to the Security Weekly Podcast Network, your all-in-one source for the latest in cybersecurity! This feed features a diverse lineup of shows, including Application Security Weekly, Business Security Weekly, Paul's Security Weekly, Enterprise Security Weekly, and Security Weekly News. Whether you're a cybersecurity professional, business leader, or tech enthusiast, we cover all angles of the cybersecurity landscape. Tune in for in-depth panel discussions, expert guest interviews, and ...
…
continue reading
Every week host Dan Zupansky will interview the true crime authors that have written about the most shocking killers of all time.
…
continue reading

1
Private Finance, Public Power | Peter Conti-Brown
15:30
15:30
Play later
Play later
Lists
Like
Liked
15:30Wharton’s Peter Conti-Brown talks about his new book that traces the history of bank supervision in the U.S. This episode is part of the “Meet the Authors” series. Hosted on Acast. See acast.com/privacy for more information.
…
continue reading

1
Peter Conti-Brown and Sean Vanatta on the History of Bank Supervision in America
1:03:28
1:03:28
Play later
Play later
Lists
Like
Liked
1:03:28Peter Conti-Brown is a historian and legal scholar of the Federal Reserve System, and an associate professor at the Wharton School of Business at the University of Pennsylvania. Sean Vanatta is a senior lecturer in financial history and policy at the University of Glasgow. Peter and Sean join the show to discuss their new book titled: Private Finan…
…
continue reading

1
Broadcom, Direct Send, N0auth, UNFI, Cisco, Oneclik, Russ Beauchemin, and more... - SWN #489
31:28
31:28
Play later
Play later
Lists
Like
Liked
31:28Broadcom is coming for you, Direct Send, N0auth, UNFI, Cisco, Oneclik, Russ Beauchemin, and More on this episode of the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-489
…
continue reading

1
Is Vuln Management Dead? - HD Moore - PSW #880
2:16:08
2:16:08
Play later
Play later
Lists
Like
Liked
2:16:08This conversation explores the intersection of cybersecurity and emerging technologies, focusing on innovative hacking techniques, the evolution of vulnerability management, and the critical importance of asset discovery. The discussion also delves into the implications of cyber warfare, the persistent threat of default passwords, and the integrati…
…
continue reading

1
Thriving Through Volatility: Insights for CISOs - Jeff Pollard, Pejman (Pej) Roshan, Deepen Desai - BSW #401
1:05:24
1:05:24
Play later
Play later
Lists
Like
Liked
1:05:24In this episode, Mandy Logan, Summer Craze Fowler, Jason Albuquerque, and Jeff Pollard of Forrester discuss the challenges and strategies for CISOs in navigating volatility in the security landscape. They emphasize the importance of building relationships within the organization, particularly with the CFO, to manage budgets effectively. The convers…
…
continue reading

1
The Rise of Malware: Salt Typhoon and Spark Kitty - SWN #488
35:37
35:37
Play later
Play later
Lists
Like
Liked
35:37In this episode of Security Weekly News, Doug White discusses various cybersecurity threats, including the Salt Typhoon and Spark Kitty malware, the implications of Microsoft's decision to drop support for old hardware drivers, and the potential increase in cyber threats from Iran. The conversation also covers the alarming 16 billion password leak …
…
continue reading

1
How Fuzzing Barcodes Raises the Bar for Secure Code - Artur Cygan - ASW #336
1:01:18
1:01:18
Play later
Play later
Lists
Like
Liked
1:01:18Fuzzing has been one of the most successful ways to improve software quality. And it demonstrates how improving software quality improves security. Artur Cygan shares his experience in building and applying fuzzers to barcode scanners, smart contracts, and just about any code you can imagine. We go through the useful relationship between unit tests…
…
continue reading

1
Sam Schulhofer-Wohl on Reforms in the Treasury Market and Developments with Central Bank Operating Systems
50:34
50:34
Play later
Play later
Lists
Like
Liked
50:34Sam Schulhofer-Wohl is a senior vice president and the senior advisor to President Lorie Logan of the Federal Reserve Bank of Dallas. Sam returns to the show to discuss recent macroeconomic conferences in the context of changes in the Treasury market and with central bank operating systems around the globe. Check out the transcript for this week’s …
…
continue reading

1
Rethinking Identity: IAM, PAM & Passwordless Trends from Identiverse - David Lee, Amit Masand, Chip Hughes, Ashley Stevenson, John Pritchard, Matt Caulfield - ESW #412
1:38:23
1:38:23
Play later
Play later
Lists
Like
Liked
1:38:23In fast-paced, shared device environments like healthcare, manufacturing, and other critical industries, traditional access management approaches are falling short, quietly eroding both security and productivity. This episode explores how outdated methods, like shared credentials and clunky logins, create friction, increase risk, and undermine comp…
…
continue reading
A twisting, deeply engrossing investigation into the many lingering questions surrounding the sudden disappearance of the McStays, a family of four who vanished from their suburban San Diego home without a trace—until their skeletal remains were found in the Mojave Desert nearly four years later—from New York Times bestselling author Caitlin Rother…
…
continue reading

1
Donut Holes, clickfix, rapperbots, bad devs, war, Doug Rants about Backups, and More. - SWN #487
33:37
33:37
Play later
Play later
Lists
Like
Liked
33:37Donut Holes, clickfix, rapperbots, bad devs, war, Doug Rants about Backups, and More on this episode of the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-487
…
continue reading
This week: * The true details around Salt Typhoon are still unknown * The search for a portable pen testing device * Directories named "hacker2" are suspicious * Can a $24 cable compete with a $180 cable? * Hacking Tesla wall chargers * Old Zyxel exploits are new again * Hacking Asus drivers * Stealing KIAs - but not like you may think * Fake artic…
…
continue reading

1
Andy Levin on the Importance of an Independent Inspector General at the Federal Reserve - BONUS
20:02
20:02
Play later
Play later
Lists
Like
Liked
20:02Andy Levin is an advisor to many central banks around the world and professor of economics at Dartmouth College. Andy returns to the show for a special bonus episode to discuss his pervious appearance and accompanying policy brief where he calls for an independent inspector general at the Federal Reserve. Check out the transcript for this week’s ep…
…
continue reading

1
CISO Cyber Insurance Empowerment - Morey Haber, Peter Hedberg, Stephan Jou - BSW #400
1:03:41
1:03:41
Play later
Play later
Lists
Like
Liked
1:03:41In this episode of Business Security Weekly, Mandy Logan, along with guests Peter Hedberg, Summer Craze Fowler, and Ben Carr, delve into the complexities of cyber insurance and the empowerment of Chief Information Security Officers (CISOs). The discussion covers the evolving landscape of cyber insurance, the critical role of underwriting, and the i…
…
continue reading

1
AI Zombie Lawyer, Scattered Spider, ASUS, Mainframes, GrayAlpha, Backups, Josh Marpet - SWN #486
36:26
36:26
Play later
Play later
Lists
Like
Liked
36:26AI Zombie Lawyers, Scattered Spider, ASUS, Mainframes, GrayAlpha, Backups, Josh Marpet, and more on the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-486
…
continue reading

1
Threat Modeling With Good Questions and Without Checklists - Farshad Abasi - ASW #335
1:08:00
1:08:00
Play later
Play later
Lists
Like
Liked
1:08:00What makes a threat modeling process effective? Do you need a long list of threat actors? Do you need a long list of terms? What about a short list like STRIDE? Has an effective process ever come out of a list? Farshad Abasi joins our discussion as we explain why the answer to most of those questions is No and describe the kinds of approaches that …
…
continue reading

1
Unstoppable Entrepreneurs | Lori Rosenkopf
15:53
15:53
Play later
Play later
Lists
Like
Liked
15:53In her new book, Wharton’s Lori Rosenkopf profiles different entrepreneurs to show there’s more than one path to founding a business. This episode is part of the “Meet the Authors” series. Hosted on Acast. See acast.com/privacy for more information.
…
continue reading
FOLLOW-UP TO THE #1 NATIONAL BESTSELLER 22 MURDERS The truth about the deadliest criminal incident in Canadian history has remained untold—until now. Investigative journalist Paul Palango’s 22 Murders examined the April 2020 shooting spree committed by Gabriel Wortman that began in Portapique, Nova Scotia, and ended thirteen and a half hours later …
…
continue reading

1
Matthew Pines on the Future of Money, AI, and Monetary Policy
53:08
53:08
Play later
Play later
Lists
Like
Liked
53:08Sign up for the Bitcoin Policy Summit with our special Macro Musings Discount Code! Matthew Pines is the executive director of the Bitcoin Policy institute. Matthew returns to the show to discuss the future of Bitcoin as a strategic reserve, US stablecoin regulation, geopolitics under Trump, monetary policy at the Fed, and much more. Check out the …
…
continue reading

1
Insider threats, migrating away from cloud, RSAC interviews with Cyera and Blumira - Rob Allen, Matthew Warner, Yotam Segev - ESW #411
1:19:04
1:19:04
Play later
Play later
Lists
Like
Liked
1:19:04Segment 1 - Interview with Rob Allen from ThreatLocker This segment is sponsored by ThreatLocker. Visit https://www.securityweekly.com/threatlocker to learn more about them! Segment 2 - Topic: Growing Trend - Edge Computing and Hybrid Cloud Segment 3 - Interviews from RSAC 2025 Cyera Cyera is the fastest-growing data security company in history, em…
…
continue reading

1
$200,000 Zoom Call, Microsoft, Zero-Click, China & HD With $649 million of Bitcoin - SWN #485
28:38
28:38
Play later
Play later
Lists
Like
Liked
28:38This week we have, $200,000 Zoom Call, Microsoft Teams, INTERPOL, Zero-Click, Junk Food, China & Hard Drive With $649 million of Bitcoin. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-485
…
continue reading

1
UEFI Vulnerabilities Galore - PSW #878
2:10:48
2:10:48
Play later
Play later
Lists
Like
Liked
2:10:48This week: You got a Bad box, again Cameras are expose to the Internet EU and connected devices Hydrophobia NVRAM variables Have you heard about IGEL Linux? SSH and more NVRAM AI skeptics are nuts, and AI doesn't make you more efficient Trump Cybersecurity orders I think I can root my Pixel 6 Decentralized Wordpres plugin manager Threat actor namin…
…
continue reading

1
Security Money: The Index is Up, CISOs Need to Get Out, and Are You Burning Out? - BSW #399
56:27
56:27
Play later
Play later
Lists
Like
Liked
56:27This week, it’s time for security money. The index is up, but the previous quarterly results were brutal. In the leadership and communications segment, Get out of the audit committee: Why CISOs need dedicated board time, Quietly Burning Out? What To Do When Your Leadership Starts Lacking, How to rethink leadership to energize disengaged employees, …
…
continue reading

1
Vixen Panda, NPM, Roundcube, IoT, 4Chan, Josh Marpet, and more... - SWN #484
32:23
32:23
Play later
Play later
Lists
Like
Liked
32:23Vixen Panda, NPM, Roundcube, IoT, 4Chan, Josh Marpet, and more on the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-484
…
continue reading

1
Bringing CISA's Secure by Design Principles to OT Systems - Matthew Rogers - ASW #334
1:09:09
1:09:09
Play later
Play later
Lists
Like
Liked
1:09:09CISA has been championing Secure by Design principles. Many of the principles are universal, like adopting MFA and having opinionated defaults that reduce the need for hardening guides. Matthew Rogers talks about how the approach to Secure by Design has to be tailored for Operational Technology (OT) systems. These systems have strict requirements o…
…
continue reading
In her new book, Wharton senior lecturer Annie Wilson looks at how big brands struggle with customer segmentation and what they can do about it. This episode is part of the “Meet the Authors” series. Hosted on Acast. See acast.com/privacy for more information.
…
continue reading

1
The enterprise security news, more secure by removing credentials, & RSAC interviews - Marty Momdjian, Amit Saha, Dr. Tina Srivastava - ESW #410
1:38:02
1:38:02
Play later
Play later
Lists
Like
Liked
1:38:02Segment 1 - Enterprise Security News, Live at IDV This week, in the enterprise security news, Acquisitions potential IPOs Terminator Salvation in real life First $1B one-employee business? Mikko puts in his notice Pitch Black in real life, and more! Segment 2 - Interview with Dr. Tina Srivastava The #1 cause of data breaches is stolen credentials. …
…
continue reading
The inside story of the CIA’s secret mind control project, MKULTRA, using never-before-seen testimony from the perpetrators themselves. Sidney Gottlieb was the CIA’s most cunning chemist. As head of the infamous MKULTRA project, he oversaw an assortment of dangerous―even deadly―experiments. Among them: dosing unwitting strangers with mind-bending d…
…
continue reading

1
Elsa, Redline, ChaosRat, iMessage, Bladed Feline , Aaran Leyland, and More... - SWN #483
34:00
34:00
Play later
Play later
Lists
Like
Liked
34:00Elsa, Redline, ChaosRat, iMessage, Bladed Feline , Aaran Leyland, and More on this episode of the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-483
…
continue reading

1
Updating & Protecting Linux Systems - PSW #877
1:05:23
1:05:23
Play later
Play later
Lists
Like
Liked
1:05:23Two parts to this episode: Tech Segment: Updating Linux Systems - Beyond apt-get upgrade * Custom scripts for ensuring your Linux systems are up-to-date * topgrade - tutorial for using topgrade to update Linux systems on various Linux distributions Discussion Topic: Anti-Malware and/or EDR on Linux Platforms * PCI calls for scanning Linux systems *…
…
continue reading

1
Regain Control of Business Risks, Your Leadership Habits, and Being Present - Alla Valente - BSW #398
1:18:17
1:18:17
Play later
Play later
Lists
Like
Liked
1:18:17During times of volatility, business leaders often don’t know what they are able to change or even what they should change. At precisely these times, business leaders become risk leaders and need to quickly learn how to identify what is within their control and what isn’t — to not only survive but thrive. Alla Valente, Principal Analyst at Forreste…
…
continue reading

1
Bovril, Deranged, Crocodilus, Cartier, Jinx, Conti, Scattered Spider, Josh Marpet... - SWN #482
37:10
37:10
Play later
Play later
Lists
Like
Liked
37:10Bovril, Deranged Hookworm, Crocodilus, Cartier, Jinx, Conti, Scattered Spider, Josh Marpet, and more on the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-482
…
continue reading

1
AIs, MCPs, and the Acutal Work that LLMs Are Generating - ASW #333
39:06
39:06
Play later
Play later
Lists
Like
Liked
39:06The recent popularity of MCPs is surpassed only by the recent examples deficiencies of their secure design. The most obvious challenge is how MCPs, and many more general LLM use cases, have erased two decades of security principles behind separating code and data. We take a look at how developers are using LLMs to generate code and continue our sea…
…
continue reading

1
Resolute Japan | Harbir Singh and Mike Useem
22:36
22:36
Play later
Play later
Lists
Like
Liked
22:36Wharton management professors Harbir Singh and Mike Useem discuss their book Resolute Japan: The Leaders Forging a Corporate Resurgence, which explores how a new model of leadership has transformed Japan's top companies. This episode is part of the “Meet the Authors” series. Hosted on Acast. See acast.com/privacy for more information.…
…
continue reading

1
George Selgin on Contextualizing the Great Depression and its Implications on Monetary Policy Today
1:12:35
1:12:35
Play later
Play later
Lists
Like
Liked
1:12:35George Selgin is a senior fellow and director emeritus at the Center for Monetary and Financial Alternatives at the Cato Institute, as well as the author of the new book titled False Dawn: The New Deal and the Promise of Recovery, 1933-1947. George returns to the show to discuss the complicated economic history of the Great Depression, how that his…
…
continue reading

1
Building Cyber Resilience: AI Threats, Mid-Market Risks & Ransomware Trends - Karl Van den Bergh, Tony Anscombe, Eyal Benishti, Nick Carroll, Chad Alessi, Chris Peluso - ESW #409
1:38:33
1:38:33
Play later
Play later
Lists
Like
Liked
1:38:33Segment 1 CTG Interview Middle market companies face unique challenges in the ever-evolving cyber environment. Developing a comprehensive cybersecurity approach is a business imperative for middle market companies, and Chad Alessi will discuss the threat landscape, what’s keeping IT decision-makers awkward at night, and the best approach to creatin…
…
continue reading
On September 6, 1982, convicted murderer Leroy James Chasson made a daring break for freedom from the Massachusetts Correctional Institute-Walpole—one of the most infamous, escape-proof prisons in the country. But this wasn't just any prison break. It was a meticulously planned, five-year effort, made possible by an unlikely accomplice—Kathleen Mac…
…
continue reading