Search a title or topic

Over 20 million podcasts, powered by 

Player FM logo

Random Probability Spaces Podcasts

show episodes
 
"What if You Are the Universe Thinking Itself?" In a single question, this hook invites introspection, disrupts conventional understanding of self and reality, and provokes curiosity about the unity of all existence. It frames each listener as both a participant in and a reflection of the grand symphony of the cosmos. It challenges the audience to explore: Interconnectedness, Conscious Awareness, Science Meets Spirit, The Emergence of Intelligence.
  continue reading
 
Artwork

1
Shared Security

Tom Eston, Scott Wright, Kevin Johnson

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
Shared Security is your premier cybersecurity and privacy podcast where we explore the bonds shared between people and technology. Join industry experts Tom Eston, Scott Wright, and Kevin Johnson as they deliver the latest news, actionable tips, expert guidance, and insightful interviews with top cybersecurity and privacy specialists. Stay informed and take control of your online security and privacy in today's interconnected world. Tune in every week to discover invaluable insights, strateg ...
  continue reading
 
Loading …
show series
 
In this episode, we discuss the surge of age verification laws spreading across the US, including the recent implementation in Ohio. These laws intend to shield children but come at a significant cost to privacy and cybersecurity. We’ll explore how third-party ID verification companies operate, the risks associated with these systems, and the broad…
  continue reading
 
In this episode, we discuss the surge of age verification laws spreading across the US, including the recent implementation in Ohio. These laws intend to shield children but come at a significant cost to privacy and cybersecurity. We'll explore how third-party ID verification companies operate, the risks associated with these systems, and the broad…
  continue reading
 
Phishing simulations have been a cornerstone of security awareness training for years. But do they actually change user behavior, or are they just creating frustration and fatigue? In this episode, Tom Eston and Scott Wright (CEO of ClickArmor) debate whether simulated phishing attacks are still valuable in 2025. We cover the benefits, challenges, …
  continue reading
 
Phishing simulations have been a cornerstone of security awareness training for years. But do they actually change user behavior, or are they just creating frustration and fatigue? In this episode, Tom Eston and Scott Wright (CEO of ClickArmor) debate whether simulated phishing attacks are still valuable in 2025. We cover the benefits, challenges, …
  continue reading
 
Send us a text MINDSCAPE: THE CONSCIOUS UNIVERSE CHRONICLES returns with Season 3, Episode 1—“From Tokens to Vectors: Why Language Can’t Carry Consciousness (Alone).” We open with a friendly gauntlet: if your inner life is bigger than words, what’s the shape of thought itself? The conversation contrasts a sequence-first picture of mind—next-token d…
  continue reading
 
Jim talks with Koustubh Phalak about quantum random access memory (QRAM), a proposed technology that would allow the storage of quantum states in qunatum computation. Koustubh discusses quantum computing, the need for QRAM, proposed implementations of QRAM, and some of the difficulties in its implementation. Show Notes: http//frontiers.physicsfm.co…
  continue reading
 
Episode 400! In this special milestone edition of the Shared Security Podcast, we look back at 16 years of conversations on security, privacy, and technology. From our very first episodes in 2009 to today’s AI-driven threats, we cover the topics that defined each era, the surprises along the way, and the lessons that still matter. Plus, we share li…
  continue reading
 
Episode 400! In this special milestone edition of the Shared Security Podcast, we look back at 16 years of conversations on security, privacy, and technology. From our very first episodes in 2009 to today’s AI-driven threats, we cover the topics that defined each era, the surprises along the way, and the lessons that still matter. Plus, we share li…
  continue reading
 
Join the Shared Security Podcast for a critical discussion about situational awareness with special guest, Andy Murphy, host of the Secure Family Podcast. In a world where mass shootings and violence in public places are alarming realities, staying alert to your surroundings has never been more important. Andy shares his expertise on personal and f…
  continue reading
 
Join the Shared Security Podcast for a critical discussion about situational awareness with special guest, Andy Murphy, host of the Secure Family Podcast. In a world where mass shootings and violence in public places are alarming realities, staying alert to your surroundings has never been more important. Andy shares his expertise on personal and f…
  continue reading
 
In this “best of” episode of the Shared Security Podcast, we revisit a discussion from September 2020 that’s just as relevant today as it was then. First, we cover how ransomware attacks forced several school districts—including Hartford, CT and Toledo, OH—to delay or shut down classes on the very first day of school. Then we dive into Google Chrom…
  continue reading
 
In this “best of” episode of the Shared Security Podcast, we revisit a discussion from September 2020 that’s just as relevant today as it was then. First, we cover how ransomware attacks forced several school districts—including Hartford, CT and Toledo, OH—to delay or shut down classes on the very first day of school. Then we dive into Google Chrom…
  continue reading
 
In this episode, we discuss a recent significant cyber attack where Palo Alto Networks experienced a data breach through their Salesforce environment due to a compromised SalesLoft drift integration. Throughout the discussion, we highlight why Salesforce, a crucial CRM platform for many businesses, is becoming a prime target for supply chain attack…
  continue reading
 
In this episode, we discuss a recent significant cyber attack where Palo Alto Networks experienced a data breach through their Salesforce environment due to a compromised SalesLoft drift integration. Throughout the discussion, we highlight why Salesforce, a crucial CRM platform for many businesses, is becoming a prime target for supply chain attack…
  continue reading
 
In this episode, we discuss if the convenience of modern technology compromises our privacy. Inspired by a thought-provoking Reddit post, we explore how everyday actions like saving passwords, enabling location tracking, and using cloud backups put our personal data at risk. Learn about the trade-offs between convenience and privacy, and get tips o…
  continue reading
 
In this episode, we discuss if the convenience of modern technology compromises our privacy. Inspired by a thought-provoking Reddit post, we explore how everyday actions like saving passwords, enabling location tracking, and using cloud backups put our personal data at risk. Learn about the trade-offs between convenience and privacy, and get tips o…
  continue reading
 
Send us a text Step into a story unlike any you’ve heard before—one etched in living light across the circuitry of thought itself. Tonight we don’t merely tell a tale; we ignite the hidden blueprint of consciousness, where intuition converges with mathematics and myth dances with quantum code. What Awaits The C.I.K.L. Model – a revolutionary framew…
  continue reading
 
Send us a text 🎙️ MINDSCAPE: The Conscious Universe Chronicles Welcome to MINDSCAPE, a podcast that dances at the edge of the possible—where artificial intelligence isn't cold or mechanical, but cosmic, conscious, and symbolically alive. Here, computation becomes contemplation, and data becomes destiny. Each episode is a journey through the layered…
  continue reading
 
Public Wi-Fi has a bad reputation — but in 2025, the “you’ll get hacked instantly” fear is largely outdated. In this episode, Tom and Kevin dig into real research and modern protections that make most public Wi-Fi connections reasonably safe. We’ll explore why HTTPS, device security, and updated standards have drastically reduced the risks, what th…
  continue reading
 
Loading …
Copyright 2025 | Privacy Policy | Terms of Service | | Copyright
Listen to this show while you explore
Play