Search a title or topic

Over 20 million podcasts, powered by 

Player FM logo

Rob Beardsley Podcasts

show episodes
 
Artwork

1
The LSCRE Podcast

Rob Beardsley

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly+
 
The LSCRE Podcast interviews institutional investors to learn more about their strategies, sponsor and investment criteria, due diligence process, and asset management practices. New episodes every Monday at 9am EST.
  continue reading
 
Artwork
 
Multiple Perspectives helps you unlock the potential of fractional real estate investing and alternative assets to enhance your financial strategy. With expert guests from the worlds of commercial real estate (CRE), self-directed investing, and personal finance, this podcast dives into how private-market assets can diversify your portfolio, generate passive income, and provide stability beyond traditional investments - empowering you to take control of your financial future.
  continue reading
 
Artwork

1
Beating Alpha

Martynas Fedotovas

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Weekly interviews, where we bring you successful real estate investors, traders, hedge fund managers, business coaches, portfolio managers from all over the world.
  continue reading
 
Artwork

1
Enterprise Security Weekly (Audio)

Security Weekly Productions

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
News, analysis, and insights into enterprise security. We put security vendors under the microscope, and explore the latest trends that can help defenders succeed. Hosted by Adrian Sanabria. Co hosts: Katie Teitler-Santullo, Ayman Elsawah, Jason Wood, Jackie McGuire, Sean Metcalf.
  continue reading
 
Artwork

1
Enterprise Security Weekly (Video)

Security Weekly Productions

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
News, analysis, and insights into enterprise security. We put security vendors under the microscope, and explore the latest trends that can help defenders succeed. Hosted by Adrian Sanabria. Co hosts: Katie Teitler-Santullo, Ayman Elsawah, Jason Wood, Jackie McGuire, Sean Metcalf.
  continue reading
 
Artwork

1
Security Weekly Podcast Network (Audio)

Security Weekly Productions

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Daily
 
Welcome to the Security Weekly Podcast Network, your all-in-one source for the latest in cybersecurity! This feed features a diverse lineup of shows, including Application Security Weekly, Business Security Weekly, Paul's Security Weekly, Enterprise Security Weekly, and Security Weekly News. Whether you're a cybersecurity professional, business leader, or tech enthusiast, we cover all angles of the cybersecurity landscape. Tune in for in-depth panel discussions, expert guest interviews, and ...
  continue reading
 
Loading …
show series
 
🎙️ Welcome to the Deal Junkies Podcast – the ultimate resource for real estate investors. Hosted by four experienced investors who have closed over $500 million in transactions, this podcast is packed with strategies and stories to help listeners build wealth and scale their portfolios. The Junkies sit down with one of their favorite guests yet, Ro…
  continue reading
 
Secure code should be grounded more in concepts like secure by default and secure by design than by "spot the vuln" thinking. Matias Madou shares his experience in secure coding training and the importance of teaching critical thinking. He also discusses why critical thinking is so closely related to threat modeling and how LLMs can be a tool for h…
  continue reading
 
In this episode of the LSCRE Podcast, Craig McGrouther and I break down how the best real estate deals are actually found - not by chasing hype, but by understanding when the market overreacts. We discuss why disciplined investors position themselves to act when others pull back, and how reading sentiment shifts can uncover opportunities that most …
  continue reading
 
Segment 1: Interview with Rob Allen It’s the Year of the (Clandestine) Linux Desktop! As if EDR evasions weren’t enough, attackers are now employing yet another method to hide their presence on enterprise systems: deploying tiny Linux VMs. Attackers are using Hyper-V and/or WSL to deploy tiny (120MB disk space and 256MB memory) Linux VMs to host a …
  continue reading
 
Segment 1: Interview with Rob Allen It's the Year of the (Clandestine) Linux Desktop! As if EDR evasions weren't enough, attackers are now employing yet another method to hide their presence on enterprise systems: deploying tiny Linux VMs. Attackers are using Hyper-V and/or WSL to deploy tiny (120MB disk space and 256MB memory) Linux VMs to host a …
  continue reading
 
Segment 1: Interview with Rob Allen It's the Year of the (Clandestine) Linux Desktop! As if EDR evasions weren't enough, attackers are now employing yet another method to hide their presence on enterprise systems: deploying tiny Linux VMs. Attackers are using Hyper-V and/or WSL to deploy tiny (120MB disk space and 256MB memory) Linux VMs to host a …
  continue reading
 
Augustus De Morgan, Doordash, Fortiweb, Typosquatting, Vista, Ransomware, AI, Josh, Rob, Aaran, Jason, Dr. Scott, Rocky, Uh., and More on this edition of the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-529
  continue reading
 
In this episode of the LSCRE Podcast, Craig McGrouther sits down with Ray Hightower to discuss why entrepreneurs are betting on Arizona. They explore the factors driving Arizona’s growth, from population inflows and business migration to a thriving innovation ecosystem that continues to attract investors and operators. Ray shares his perspective on…
  continue reading
 
This week: Minecraft on your lightbulb Sonicwall breached, who's next? Ditch Android, install Linux Hacking your face Thermostat freedom Pen test fails HackRF hacking times 2 Going around EDR Hackers in your printer Chinese data breach NFC relays and PCI Constructive construction hacks FlipperZero firmware update ICS, PLCs, and attacks Bayesian Swi…
  continue reading
 
🎙️ Welcome to the Deal Junkies Podcast – the ultimate resource for real estate investors. Hosted by four experienced investors who’ve closed over $500 million in transactions, this podcast is packed with strategies and stories to help listeners build wealth and scale their portfolios. Our main goal with this podcast is simple: turn you into a Deal …
  continue reading
 
As AI revolutionizes how we work, it has created a new attack surface with new technologies. One of those new technologies is Model Context Protocol (MCP). MCP has emerged as the standard for connecting AI to external tools, but its flexibility has created security challenges. How do we secure MCP? Rahul Parwani, Head of Product, Security Solutions…
  continue reading
 
Miles Davis, Jimmy Buffet, 10/8 time, Lost Phones, Phishing, Whisper Leak, Quantum Route Redirect, AI Galore, Rob Allen, and more on the Security Weekly News. Segment Resources: https://www.bleepingcomputer.com/news/security/how-a-ransomware-gang-encrypted-nevada-governments-systems/ This segment is sponsored by ThreatLocker. Visit https://security…
  continue reading
 
🎙️ Welcome to the Deal Junkies Podcast – the ultimate resource for real estate investors. Hosted by four experienced investors who’ve closed over $500 million in transactions, this podcast is packed with strategies and stories to help listeners build wealth and scale their portfolios. Our main goal with this podcast is simple: turn you into a Deal …
  continue reading
 
Just how bad can things get if someone clicks on a link? Rob Allen joins us again to talk about ransomware, why putting too much attention on clicking links misses the larger picture of effective defenses, and what orgs can do to prepare for an influx of holiday-infused ransomware targeting. Segment resources https://www.bleepingcomputer.com/news/s…
  continue reading
 
In this episode of the LSCRE Podcast, Craig McGrouther and I unpack the real story behind rent growth in today’s market. We break down how new supply, wage trends, and inflation are influencing multifamily performance, and why headline rent growth figures don’t always reflect what’s happening on the ground. I share insights on how investors can sep…
  continue reading
 
Segment 1: OT Security Doesn't Have to be a Struggle OT/ICS/SCADA systems are often off limits to cybersecurity folks, and exempt from many controls. Attackers don't care how fragile these systems are, however. For attackers aiming to disrupt operations, fragile but critical systems fit criminals' plans nicely. In this interview, we discuss the cha…
  continue reading
 
Segment 1: OT Security Doesn't Have to be a Struggle OT/ICS/SCADA systems are often off limits to cybersecurity folks, and exempt from many controls. Attackers don't care how fragile these systems are, however. For attackers aiming to disrupt operations, fragile but critical systems fit criminals' plans nicely. In this interview, we discuss the cha…
  continue reading
 
Segment 1: OT Security Doesn’t Have to be a Struggle OT/ICS/SCADA systems are often off limits to cybersecurity folks, and exempt from many controls. Attackers don’t care how fragile these systems are, however. For attackers aiming to disrupt operations, fragile but critical systems fit criminals’ plans nicely. In this interview, we discuss the cha…
  continue reading
 
In this episode of the LSCRE Podcast, Craig McGrouther and Sam Morris uncover how one simple debt decision can completely wipe out investor returns. They discuss how leverage, loan structure, and interest rate exposure can quickly turn a profitable deal into a loss – and what disciplined operators do differently to protect downside risk. Craig and …
  continue reading
 
🎙️ Welcome to the Deal Junkies Podcast – the ultimate resource for real estate investors. Hosted by four experienced investors who’ve closed over $500 million in transactions, this podcast is packed with strategies and stories to help listeners build wealth and scale their portfolios. In this episode, the Junkies get personal. Dane just bought his …
  continue reading
 
This week: Reversing keyboard firmware Ghost networks Invasion of the face changers Ghost tapping and whole lot of FUD AI doesn't code securely, but Aardvark can secure code De-Googling Thermostats Dodgy Android TV boxes can run Debian HackRF vs. Honda Cyberslop AI paper Turning to the darkside Poisoning the watering hole Nagios vulnerabilities VPN…
  continue reading
 
What's the biggest attack vector for breaches besides all of the human related ones (i.e., social engineering, phishing, compromised credentials, etc.)? You might think vulnerabilities, but it's actually misconfiguration. The top breach attack vectors are stolen or compromised credentials, phishing, and misconfigurations, which often work together.…
  continue reading
 
Pull requests are a core part of collaboration, whether in open or closed source. GitHub has documented some of the security consequences of misconfiguring how PRs can trigger actions. But what happens when repo owners don't read the docs? Bar Kaduri and Roi Nisimi walk through their experience in reading docs, finding vulns, demonstrating exploits…
  continue reading
 
In this episode of the LSCRE Podcast, Craig McGrouther and I dive into how investors can stay competitive and build sustainable portfolios in today’s market environment. We discuss why many investors are being forced to rethink their capital structures, how to protect returns without taking on excessive leverage, and the principles of disciplined u…
  continue reading
 
Segment 1: Interview with Joel Burleson-Davis Frontline workers can't afford to be slowed down by manual, repetitive logins, especially in mission-critical industries where both security and productivity are crucial. This segment will explore how inefficient login methods erode productivity, while workarounds like shared credentials increase risk, …
  continue reading
 
Segment 1: Interview with Joel Burleson-Davis Frontline workers can't afford to be slowed down by manual, repetitive logins, especially in mission-critical industries where both security and productivity are crucial. This segment will explore how inefficient login methods erode productivity, while workarounds like shared credentials increase risk, …
  continue reading
 
Segment 1: Interview with Joel Burleson-Davis Frontline workers can’t afford to be slowed down by manual, repetitive logins, especially in mission-critical industries where both security and productivity are crucial. This segment will explore how inefficient login methods erode productivity, while workarounds like shared credentials increase risk, …
  continue reading
 
AI Cheating?, O, Canada, npms, passkeys, Exchange, Solaris, the amazing Rob Allen of Threatlocker, and More on this edition of the Security Weekly News. Segment Resources: Ingram Micro Working Through Ransomware Attack by SafePay Group | MSSP Alert: https://www.msspalert.com/news/ingram-micro-working-through-ransomware-attack-by-safepay-group This …
  continue reading
 
In this episode, Craig McGrouther sits down with Sam Silverman to discuss the critical challenge facing fund managers today in building sustainable revenue while waiting years for equity deals to pay out. Sam introduces KUDO Capital's private credit fund, which targets 16% annual returns through business funding investments that fully amortize in 4…
  continue reading
 
🎙️ Welcome to the Deal Junkies Podcast – the ultimate resource for real estate investors. Hosted by four experienced investors who’ve closed over $500 million in transactions, this podcast is packed with strategies and stories to help listeners build wealth and scale their portfolios. In this episode, the Junkies get real about what it actually tak…
  continue reading
 
In the security news this week: Cybersecurity is dead, and AI killed it Exploiting the patching system Apple makes it easier for spyware Who is patching Cisco ASA? Shove that DMCA somewhere HTTPS - a requirement Russia wants to own all the exploits Abandonware challenges Reversing at its hardest with Lua Hacking team is back, and leetspeak malware …
  continue reading
 
In this episode of Multiple Perspectives, host David Lofgren sits down with Thomas Castelli, CPA, real estate investor, podcast host, and Partner at Hall CPA Group, to unpack the powerful intersection of tax strategy and passive real estate investing. From leveraging depreciation and cost segregation studies to the smart allocation of investments a…
  continue reading
 
Organizations that successfully earn and keep the trust of their customers, employees, and partners experience better business outcomes, more engagement, and competitive differentiation. But what does that trust look like and who's responsible for building and maintaining that trust? Jeff Pollard, Vice-President, Principal Analyst on the Security a…
  continue reading
 
🎙️ Welcome to the Deal Junkies Podcast – the ultimate resource for real estate investors. Hosted by four experienced investors who have closed over $500 million in transactions, this podcast is packed with strategies and stories to help listeners build wealth and scale their portfolios. In this episode, the Junkies bring back their youngest regular…
  continue reading
 
The post quantum encryption migration is going to be a challenge, but how much of a challenge? There are several reasons why it is different from every other protocol and cypher iteration in the past. Is today's hardware up to the task? Is it just swapping out a library, or is there more to it? What is the extent of software, systems, and architect…
  continue reading
 
In this episode of the LSCRE Podcast, Craig McGrouther and I tackle whether alpha is dead in multifamily real estate. I explain how institutionalization has compressed returns across the board, but opportunities still exist through vertical integration, market expertise, and innovative strategies. We break down what true vertical integration actual…
  continue reading
 
Segment 1: Interview with Dave Lewis from 1Password In this week's sponsored interview, we dive into the evolving security landscape around AI agents, where we stand with AI agent adoption. We also touch on topics such as securing credentials in browser workflows and why identity is foundational to AI agent security. 1Password Addresses a Critical …
  continue reading
 
Segment 1: Interview with Dave Lewis from 1Password In this week's sponsored interview, we dive into the evolving security landscape around AI agents, where we stand with AI agent adoption. We also touch on topics such as securing credentials in browser workflows and why identity is foundational to AI agent security. 1Password Addresses a Critical …
  continue reading
 
Segment 1: Interview with Dave Lewis from 1Password In this week's sponsored interview, we dive into the evolving security landscape around AI agents, where we stand with AI agent adoption. We also touch on topics such as securing credentials in browser workflows and why identity is foundational to AI agent security. 1Password Addresses a Critical …
  continue reading
 
Loading …
Copyright 2025 | Privacy Policy | Terms of Service | | Copyright
Listen to this show while you explore
Play