The Run Testers are a group of experienced running, fitness and tech journalists. We test kit for dozens of different publications, covering everything from running shoes and GPS running watches to smartwatches, headphones, apparel and nutrition. We bring all that testing together in easy-to-digest videos on YouTube – and now a monthly podcast series that you can listen to on your runs. Subscribe for all the latest news on running shoes, headphones, watches and races.
…
continue reading
Run Testers Podcasts
The daily cybersecurity news and analysis industry leaders depend on. Published each weekday, the program also includes interviews with a wide spectrum of experts from industry, academia, and research organizations all over the world.
…
continue reading
A New Angle is a current affairs Montana Public Radio program and podcast celebrating cool people doing awesome things in and around Montana. We live in the College of Business at the University of Montana. New episodes drop every Thursday. Recent and upcoming guests include Academy Award-winning actor J.K. Simmons, US Senator Jon Tester, Montana Governor Greg Gianforte, Cheryl Strayed (best-selling author of Wild), NYT Columnist Maureen Dowd, and many others. www.anewanglepodcast.com
…
continue reading
Liz Scully spent 20 years working on big Hollywood films - she’s won an Emmy and her work is multi-Oscar nominated. She travelled the world working with massive Visual FX teams + worked far too many weekends so film directors got their perfect shot. Now, she's a business strategist and a Mastermind coach and she'll help you do equally spectacular things with your business. Growth is all about having a clear and simple strategy where each daily task moves the whole business along in many area ...
…
continue reading
1
Video Talks - Conversations on the Business of Video ‣ Marketing ‣ Filmmaking ‣ Online Video
Andy Greenhouse
Video Talks helps creators, business owners and marketers learn from experts in their field (of vision) to make the right decisions when it comes to making, using and commissioning video in all its forms. Featuring inspiring interviews with leaders in video & film – across social media video, YouTube, advertising, animation, video marketing, filmmaking, corporate video and brand stories – with your host, director Andy Greenhouse. You'll learn how to create video strategies for every industry ...
…
continue reading
Welcome to the 'Men After God' podcast, the ultimate resource for Christian men aspiring to become the best version of themselves as fathers and husbands. Empowering and enlightening, we're here to guide you towards a life of faith, dedication, and love. In each episode, we'll dive deep into the challenges and triumphs Christian men face, as fathers and husbands, in today's fast-paced world. We'll provide actionable insights and powerful strategies for personal growth, enhancing your role as ...
…
continue reading
Work is like sex or food — you’re either getting it or looking for it. Comedian Roy Wood Jr. (correspondent on Comedy Central’s The Daily Show with Trevor Noah) explores the human condition every week through the prism of employment. Roy sits down with real people from ALL lines of work about their most memorable jobs, employment vacancies they're looking to fill, scams they've run at the office, and of course, the cringe-worthy office romances. Roy's famed humor is matched by his true empat ...
…
continue reading
While our team is out on winter break, please enjoy this episode of Only Malware in the Building. Welcome in! You’ve entered, Only Malware in the Building. Wrap yourself in a warm blanket, pour your favorite mug of tea, and join us each month as we unwrap the season’s juiciest cyber mysteries. Your host is Selena Larson, Proofpoin…
…
continue reading
In today’s episode, we dig into the Electronic Frontier Foundation’s annual Breachies, highlighting some of the year’s most avoidable, eye-opening, and sometimes head-shaking data breaches. From companies collecting far more data than they need to third-party missteps and quiet misconfigurations, the Breachies offer a revealing look at how familiar…
…
continue reading
1
Eyes in the sky, red flags on the ground.
27:28
27:28
Play later
Play later
Lists
Like
Liked
27:28The White House bans foreign-made drones. African law enforcement agencies crackdown on cybercrime. A new phishing campaign targets Russian military personnel and defense-related organizations. A University of Phoenix data breach affects about 3.5 million people. A pair of Chrome extensions covertly hijack user traffic. Romania’s national water aut…
…
continue reading
1
Tech Investment Strategies and Overview [CISOP]
48:39
48:39
Play later
Play later
Lists
Like
Liked
48:39In this CISOP episode of CSO Perspectives, Host Kim Jones sits down with John Funge, venture capitalist at DataTribe, to explore how investors view the cybersecurity landscape. Kim reflects on the tension between innovation, profit motives, and the real needs of security practitioners—raising questions about whether the industry prioritizes mitigat…
…
continue reading
NATO suspects Russia is developing a new anti-satellite weapon to disrupt the Starlink network. A failed polygraph sparks a DHS probe and deepens turmoil at CISA. A look back at Trump’s cyber policy shifts. MacSync Stealer adopts a stealthy new delivery method. Researchers warn a popular open-source server monitoring tool is being abused. Cyber cri…
…
continue reading
1
Eric Escobar: Collaboration is key. [Pen tester] [Career Notes]
8:42
8:42
Play later
Play later
Lists
Like
Liked
8:42Please enjoy this encore of Career Notes. Principal consultant and pen tester at Secureworks, Eric Escobar, shares his career path translating his childhood favorite Legos to civil engineering and pivoting to cybersecurity. Eric was always headed toward engineering and got both his bachelor and master degrees in civil engineering. Upon breaking int…
…
continue reading
1
The lies that let AI run amok. [Research Saturday]
24:36
24:36
Play later
Play later
Lists
Like
Liked
24:36Darren Meyer, Security Research Advocate at Checkmarx, is sharing their work on "Bypassing AI Agent Defenses with Lies-in-the-Loop." Checkmarx Zero researchers introduce “lies-in-the-loop,” a new attack technique that bypasses human‑in‑the‑loop AI safety controls by deceiving users into approving dangerous actions that appear benign. Using examples…
…
continue reading
1
Bad Reviews Read Aloud | Holiday Foolishness with Ron Tester
30:00
30:00
Play later
Play later
Lists
Like
Liked
30:00What happens when book reviewers completely miss the point? Ron Tester joins me for our holiday special where we read the most baffling book reviews we could find. We discuss readers who don't understand how fiction works, demands for warning labels on perfectly normal books + one truly spectacular misunderstanding about a Holocaust book. Plus, the…
…
continue reading
Trump signs the National Defense Authorization Act for 2026. Danish intelligence officials accuse Russia of orchestrating cyberattacks against critical infrastructure. LongNosedGoblin targets government institutions across Southeast Asia and Japan. A new Android botnet infects nearly two million devices. WatchGuard patches its Firebox firewalls. Am…
…
continue reading
Hewlett Packard Enterprise patches a maximum-severity vulnerability in its OneView infrastructure management software. Cisco warns a critical zero-day is under active exploitation. An emergency Chrome update fixes two high-severity vulnerabilities. French authorities make multiple arrests. US authorities dismantle an unlicensed crypto exchange accu…
…
continue reading
1
Andy Kemmis & Chris Bacon shred some light on skateboarding in Montana
29:08
29:08
Play later
Play later
Lists
Like
Liked
29:08This week’s guests are Andy Kemmis and Chris Bacon. Together, these two made a beautiful new book about skateboarding in Montana titled Grit to Grind. The book is an amazing visual and narrative history of how skateboarding shaped Montana communities in ways that might surprise you. In this episode, Andy and Chris talk about their skateboarding ori…
…
continue reading
Researchers detail a years-long Russian state-sponsored cyber espionage campaign. Israel’s cyber chief warns against complacency. Vulnerabilities affect products from Fortinet and Hitachi Energy. Studies show AI models are rapidly improving at offensive cyber tasks. MITRE expands its D3FEND cybersecurity ontology to cover operational technology. Te…
…
continue reading
Venezuela’s state oil company blames a cyberattack on the U.S. An Iranian hacker group offers cash bounties for doxing Israelis. Germany’s lower house of parliament suffers a major email outage. South Korea’s e-commerce breach exposes personal information of nearly all of that nation’s adults. Researchers report active exploitation of two critical …
…
continue reading
In this episode, host Kim Jones tacks a topic that is rapidly moving from theoretical to operational reality: quantum computing. While classical computing will remain the backbone of our systems for years to come, quantum technologies are advancing fast enough that CISOs must begin preparing today. Kim explores what quantum computing really means, …
…
continue reading
Apple and Google issue emergency updates to patch zero-days. Google links five additional Chinese state-backed hacking groups to “React2Shell.” France’s Ministry of the Interior was hit by a cyberattack. Atlassian patches roughly 30 third-party vulnerabilities. Microsoft says its December 2025 Patch Tuesday updates are breaking Message Queuing. Res…
…
continue reading
1
Amanda Fennell: There's a cyber warrior in all of us [Information] [Career Notes]
9:33
9:33
Play later
Play later
Lists
Like
Liked
9:33Please enjoy this encore of Career Notes. Chief security officer and chief information officer at Relativity, Amanda Fennell shares her story from archeology to cybersecurity. She shares the path that lead her towards becoming an archeologist and how it turned out not being exactly what she expected. She then shares how she got into the cyber busin…
…
continue reading
1
Root access to the great firewall. [Research Saturday]
26:06
26:06
Play later
Play later
Lists
Like
Liked
26:06Daniel Schwalbe, DomainTools Head of Investigations and CISO, is sharing their work on "Inside the Great Firewall." This two-part research project analyzes an extraordinary 500–600GB leak that exposes the internal architecture, tooling, and human ecosystem behind China’s Great Firewall. Across both parts, you break down thousands of leaked document…
…
continue reading
1
Babar's Guide to Losing Yourself in Business | Classics with Kym Medina
28:16
28:16
Play later
Play later
Lists
Like
Liked
28:16What if getting funded means losing yourself? Kym Medina is back to discuss the problematic colonial 'classic' Babar the Elephant + what happens when someone else's money changes everything about who you + your business. We discuss how external funding disconnects you from your roots, how authority based on dazzle rather than competence creates imp…
…
continue reading
A new executive order targets states’ AI regulations, while the White House shifts course on an NSA deputy director pick. The UK fines LastPass over inadequate security measures. Researchers warn of active attacks against Gladinet CentreStack instances. OpenAI outlines future cybersecurity plans. MITRE ranks the top 25 vulnerabilities of 2025. CISA…
…
continue reading