Search a title or topic

Over 20 million podcasts, powered by 

Player FM logo

Todd & Dustin Podcasts

show episodes
 
Artwork

1
Booze & Ballin

Todd & D.K.

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
🏈 Booze & Ballin – Fantasy Football, Shaken Not Stirred 🥃 Welcome to Booze & Ballin, where fantasy football meets the bottom of a glass. We’re not your typical stats-and-spreadsheets podcast — we’re the guys (and the occasional bourbon bottle) at the bar, breaking down fantasy football the way it was meant to be: honest, hilarious, and a little tipsy. Each episode, we bring you fantasy football talk, bold takes, and weekly booze reviews — from smooth Bourbons to the occasional questionable c ...
  continue reading
 
Artwork

1
Battlefront: Frontline with Dustin Faulkner

Maverick Broadcasting Network

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
Dustin Faulkner breaks down current events from a Conservative perspective. Additionally, there is a lot of investigative journalism in exposing what's truly going on in our country... much of which will shock you! Tune in every Sunday evening for a LIVE episode of Battlefront: Frontline
  continue reading
 
Artwork

1
Love Is Spoken Queer

Love Is Spoken Queer

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Love Is Spoken Queer is a podcast where the Topics are Gospel and the Voices are LGBTQ+! Join Dustin Larsen (an active GAY member of The Church of Jesus Christ of Latter-Day Saints), René Hernandez, Hayden Davis and Todd Richardson as they discuss Gospel Topics through Queer Perspectives. Add your own Queer Perspective on Gospel Topics by sending them to: [email protected].
  continue reading
 
Never a Truer Word with Jack Fox explores the truth hidden in the words people use. Each episode breaks down language patterns in relationships, arguments, apologies, workplace communication, and public statements. The focus is on what people reveal without realising it. Hosted by Jack Fox, the show looks at how things are said rather than who is right or wron Get early access, exclusive episodes and video content by subscribing to the podcast https://podcasters.spotify.com/pod/show/neveratr ...
  continue reading
 
Artwork

1
American Contingency

American Contingency

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Welcome to the American Contingency Podcast. Each episode features a unique discussion led by members of the American Contingency community. Experts in all things preparedness join us each week to share their stories and provide insight into the changing culture. American Contingency's mission is to create and support a network of people and teams across the country who are prepared to respond and able to recover from difficult situations they, their families, or their communities may face. ...
  continue reading
 
Artwork
 
The Michelle May O'Neil Show is where reinvention becomes more than an idea; it becomes a movement. If you are standing at the edge of what is next, this is where you will find the stories, strategies, and clarity to create your future by design instead of default. From boardrooms to personal crossroads, we confront the hard part of change: the failures that felt final, the resets that required courage, and the disciplined strategy that turns a comeback into a competitive edge. Hosted by Mic ...
  continue reading
 
/RealEstate is a bi-weekly podcast where we chat with agents and experts in the real estate space to find out what strategies are working for them, what tools are powering their business, and how they are maneuvering shifts in the industry. Join host and marketing aficionado Chris Whitling as he uncovers the tips, tricks, and tech ambitious agents can use to take their businesses to the next level.
  continue reading
 
Artwork

1
Security Weekly Podcast Network (Audio)

Security Weekly Productions

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Daily
 
Welcome to the Security Weekly Podcast Network, your all-in-one source for the latest in cybersecurity! This feed features a diverse lineup of shows, including Application Security Weekly, Business Security Weekly, Paul's Security Weekly, Enterprise Security Weekly, and Security Weekly News. Whether you're a cybersecurity professional, business leader, or tech enthusiast, we cover all angles of the cybersecurity landscape. Tune in for in-depth panel discussions, expert guest interviews, and ...
  continue reading
 
Artwork

1
Speaking Of Wealth with Jason Hartman

Jason Hartman with Dan Millman & Pat Flynn

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Welcome to the "Speaking of Wealth" podcast showcasing profit strategies for speakers, publishers, authors, consultants, and info-marketers. Learn valuable skills to make your business more successful, more passive, more automated, and more scalable. Your host, Jason Hartman interviews top-tier guests, bestselling authors and experts including; Dan Poynter (The Self-Publishing Manual), Harvey Mackay (Swim With The Sharks & Get Your Foot in the Door), Dan Millman (Way of the Peaceful Warrior) ...
  continue reading
 
Loading …
show series
 
What happens when you stop chasing success and start living in alignment with your faith and purpose? In this episode, Michelle O’Neil sits down with Dustin Sanchez, a former lawyer turned legal marketing expert, to unpack his powerful journey of transformation. Dustin shares how leaving the traditional legal path, embracing entrepreneurship, rebui…
  continue reading
 
For our first episode of the new year, we thought it would be appropriate to dig into some cybersecurity predictions. First, we cover the very nature of predictions and why they're often so bad. To understand this, we get into logical fallacies and cognitive biases. In the next segment, we cover some 2025 predictions we found on the Internet. In th…
  continue reading
 
Todd Kendhammer InterrogationThis is where his story faces pressure.In this episode of Never A Truer Word, Jack Fox applies Statement Investigation to the police interrogation of Todd Kendhammer. His wife, Barbara, is the victim. He says her death was a tragic accident. But as investigators begin to test that story, Kendhammer’s answers reveal more…
  continue reading
 
Cloud breaches don’t always start in the cloud, but they do end there. To defeat an attacker you need to understand their mission target along with the access points available to them, regardless of whether they reside within or beyond the cloud. SentinelOne is purpose-built to stop attacks wherever they originate - from within and beyond the cloud…
  continue reading
 
Our field is booming! Cybersecurity jobs are projected to grow 33 percent through 2033, far outpacing the average 4 percent growth across all jobs. (And yes, those stats could be made up, but they sound nice, eh?) Yet newcomers often feel paralyzed by where to start. The truth? There's no single "right path," but there are proven strategies that wo…
  continue reading
 
You don’t need a breakdown to reinvent your life, you need honesty. In this powerful episode, Michelle O’Neil explores the quiet moment when clarity replaces chaos and shows how personal reinvention begins with truth, alignment, and one courageous step forward. If your life looks fine on the outside but feels empty on the inside, this message is fo…
  continue reading
 
CISO pressures are on the rise - board expectations, executive alignment, AI, and personal liability - and that's all on top of your normal security pressures. With all these pressures, CISO burnout is on the rise. How do we detect it and help prevent it? Easier said than done. In this Say Easy, Do Hard segment, we tackle the health and wellness of…
  continue reading
 
SentinelOne announced a series of new innovative designations and integrations with Amazon Web Services (AWS), designed to bring the full benefits of AI security to AWS customers today. From securing GenAI usage in the workplace, to protecting AI infrastructure to leveraging agentic AI and automation to speed investigations and incident response, S…
  continue reading
 
In an era dominated by AI-powered security tools and cloud-native architectures, are traditional Web Application Firewalls still relevant? Join us as we speak with Felipe Zipitria, co-leader of the OWASP Core Rule Set (CRS) project. Felipe has been at the forefront of open-source security, leading the development of one of the world's most widely d…
  continue reading
 
For this week's episode of Enterprise Security Weekly, there wasn't a lot of time to prepare. I had to do 5 podcasts in about 8 days leading up to the holiday break, so I decided to just roll with a general chat and see how it went. Also, apologies, for any audio quality issues, as the meal I promised to make for dinner this day required a lot of p…
  continue reading
 
Robert Wone was killed after spending the night at a house shared by Joe Price, Victor Zaborsky, and Dylan Ward, all three of whom later gave police interviews describing what happened. In this final episode of the series, Jack brings those three accounts together and looks closely at the language used across all of them.Drawing on audience observa…
  continue reading
 
You survived the click—but now the click has evolved. In Part 2, the crew follows phishing and ransomware down the rabbit hole into double extortion, initial access brokers, cyber insurance drama, and the unsettling rise of agentic AI that can click, run scripts, and make bad decisions for you. The conversation spans ransomware economics, why payin…
  continue reading
 
The crew makes suggestions for building a hacking lab today! We will tackle: What is recommended today to build a lab, given the latest advancements in tech Hardware hacking devices and gadgets that are a must-have Which operating systems should you learn Virtualization technology that works well for a lab build Using AI to help build your lab Visi…
  continue reading
 
Send us a text From the Vault: Listen to this never before released Bonus Episode from Season 2, originally recorded in October of 2021! René and Dustin add their Queer Voices to the Voices of the Restoration; alongside those of Emma and Joseph Smith as the Prophet was imprisoned in Liberty Jail! Add your voice by sending your thoughts to: lovespok…
  continue reading
 
Send us a text From the Vault: Listen to this never before released Bonus Episode from Season 2, originally recorded in October of 2021! René and Dustin add their Queer Voices to the Voices of the Restoration; alongside that of Eliza Snow! Add your voice by sending your thoughts to: [email protected] or DM us on Social: Instagram: @lovespok…
  continue reading
 
Jason and Christine Healey, founder of Healey Pre-IPO, discuss the specialized market for private stocks in late-stage, high-value companies. She explains that massive firms like SpaceX and OpenAI are remaining private longer than in previous decades, often reaching valuations in the hundreds of billions before debuting on public exchanges. Because…
  continue reading
 
Michelle O’Neil sits down with Todd Frankfort, a divorce lawyer, professor, and judicial candidate—to explore law, politics, legacy, and leadership. From navigating the political climate as a judge to lessons learned from family, faith, and high-stakes cases, this conversation offers a rare look into integrity, service, and what truly defines succe…
  continue reading
 
Join Business Security Weekly for a roundtable-style year-in-review. The BSW hosts share the most surprising, inspiring, and humbling moments of 2025 in business security, culture, and personal growth. And a few of us might be dressed for the upcoming holiday season... Visit https://www.securityweekly.com/bsw for all the latest episodes! Show Notes…
  continue reading
 
It’s the holidays, your defenses are down, your inbox is lying to you, and yes—you’re gonna click the link. In Part 1 of our holiday special, Doug White and a panel of very smart people explain why social engineering still works decades later, why training alone won’t save you, and why the real job is surviving after the click. From phishing and sm…
  continue reading
 
With The Salt Path Scandal from Sky Documentaries getting talked about a lot, I'm re-sharing this episode from earlier this year. The literary world is reeling from the controversy surrounding Raynor Winn's beloved book, The Salt Path, and its recent film adaptation. Following serious allegations made in The Observer, author Raynor Winn has release…
  continue reading
 
Using OWASP SAMM to assess and improve compliance with the Cyber Resilience Act (CRA) is an excellent strategy, as SAMM provides a framework for secure development practices such as secure by design principles and handling vulns. Segment Resources: https://owaspsamm.org/ https://cybersecuritycoalition.be/resource/a-strategic-approach-to-product-sec…
  continue reading
 
Interview with Frank Vukovits: Focusing inward: there lie threats also External threats get discussed more than internal threats. There’s a bit of a streetlight effect here: external threats are more visible, easier to track, and sharing external threat intelligence doesn’t infringe on any individual organization’s privacy. That’s why we hear the i…
  continue reading
 
Robert Wone remains at the centre of a case that continues to spark theories and long-running discussion across communities like reddit. This episode is part of a three-part series where we analyse the accounts given by the three people who we know were in the house when Robert was killed. Each interview is studied to see what the words reveal, wha…
  continue reading
 
This week in the security news: Linux process injection Threat actors need training too A Linux device "capable of practically anything" The Internet of webcams Hacking cheap devices Automating exploitation with local AI models Lame C2 Smallest SSH backdoor Your RDP is on the Internet These are not the high severity bugs you were looking for Low ha…
  continue reading
 
America is Closer Than You Think to Islamic Control Like Europe | Should We Revisit Our Views on Bacteria and Parasites | The Investor Market is About to Change Like Never Before | Dr. Sherwood, John Grace Follow BBN on X: @dloydfaulk @bf_frontline Join PickAx today and enjoy Freedom of Speech and Freedom of Reach. https://pickax.com/?referralCode=…
  continue reading
 
Business Security Weekly is well aware of the cybersecurity hiring challenges. From hiring CISOs to finding the right skills to developing your employees, we cover it weekly in the leadership and communications segment. But this week, our guest interview digs into the global cybersecurity hiring trends. Jim McCoy, CEO at Atlas, joins Business Secur…
  continue reading
 
Too many leaders spend their year reacting instead of leading, busy every day, yet drifting further from their real goals. This conversation breaks down how to stop living in crisis mode and start designing a year with intention. Michelle O’Neil shares a powerful framework for building 2026 around strategy instead of stress, including how to filter…
  continue reading
 
The Erika Kirk Candace Owens meeting was framed publicly as a private and productive discussion. What followed were two post-meeting statements that reveal very different perspectives on what that meeting achieved.In this episode of Never A Truer Word, Jack Fox applies Statement Investigation to the language used after the meeting, focusing on how …
  continue reading
 
Open source projects benefit from support that takes many shapes. Kat Cosgrove shares her experience across the Kubernetes project and the different ways people can make meaningful contributions to it. One of the underlying themes is that code is written for other people. That means PRs need to be understandable, discussions need to be enlightening…
  continue reading
 
Interview Segment: Tony Kelly Illuminating Data Blind Spots As data sprawls across clouds and collaboration tools, shadow data and fragmented controls have become some of the biggest blind spots in enterprise security. In this segment, we’ll unpack how Data Security Posture Management (DSPM) helps organizations regain visibility and control over th…
  continue reading
 
Robert Wone remains the centre of a case that continues to generate theories and long-running discussion across communities like reddit. This episode is part of a three-part series where we analyse the accounts given by the three people who we know were in the house when Robert was killed. Each interview is studied to see what the words reveal, wha…
  continue reading
 
STASH OR PASS | Dynasty Fantasy Football Cut-Line Decisions In today’s episode of Stash or Pass, we’re diving into the toughest conversations in dynasty fantasy football: 👉 Is this player worth holding onto… or is it time to move on? We break down players living right on the cut line — the guys clogging your bench, testing your patience, and making…
  continue reading
 
Dustin Duren Trial analysis from Never A Truer Word. Jack Fox dissects the sentencing statement Duren delivered after being convicted of murdering Caitlin Naffziger and finds a performance designed for leniency not truth.From sudden tears to selective memory from religious rebirth to emotional distancing Duren’s words reveal a calculated attempt to…
  continue reading
 
This week in our technical segment, you will learn how to build a MITM proxy device using Kali Linux, some custom scripts, and a Raspberry PI! In the security news: Hacking Smart BBQ Probes China uses us as a proxy LOLPROX and living off the Hypervisor Are we overreating to React4Shell? Prolific Spyware vendors EDR evaluations and tin foil hats Com…
  continue reading
 
Former apparel CEO and entrepreneur Ron Pinkerton joins Michelle O'Neil to break down the “win-win-win” strategy that helped him build a powerhouse company from the ground up. He shares real stories on leadership, timing, team building, integrity, and navigating the emotional side of selling a business. This conversation is packed with timeless bus…
  continue reading
 
Organizations rely heavily on Salesforce to manage vasts amounts of sensitive data, but hidden security risks lurk beneath the surface. Misconfigurations, excessive user permissions, and unmonitored third party integrations can expose this data to attackers. How do I secure this data? Justin Hazard, Principal Security Architect at AutoRABIT, joins …
  continue reading
 
The MCP standard gave rise to dreams of interconnected agents and nightmares of what those interconnected agents would do with unfettered access to APIs, data, and local systems. Aaron Parecki explains how OAuth's new Client ID Metadata Documents spec provides more security for MCPs and the reasons why the behavior and design of MCPs required a new…
  continue reading
 
Interview with Danny Jenkins: How badly configured are your endpoints? Misconfigurations are one of the most overlooked areas in terms of security program quick wins. Everyone freaks out about vulnerabilities, patching, and exploits. Meanwhile, security tools are misconfigured. Thousands of unused software packages increase remediation effort and a…
  continue reading
 
Robert Wone is the centre of a case that continues to spark theories and questions, especially in online discussion spaces like reddit. This episode is part of a three-part series where we analyse the accounts given by the three people who we know were in the house when Robert was killed. Each interview is studied to see what the words reveal, what…
  continue reading
 
This week we welcome Ed Skoudis to talk about the holiday hack challenge (https://sans.org/HolidayHack). In the security news: Oh Asus Dashcam botnets Weird CVEs being issued CodeRED, but not the worm Free IP checking Internet space junk and IoT Decade old Linux kernel vulnerabilities Breaking out of Claude code Malicious LLMs Hacker on a plan gets…
  continue reading
 
In this insightful conversation, Stefan Junaeus breaks down the difference between dreamers and visionaries, and why some people wait for life to happen while others step into responsibility and build what they’re called to create. He shares powerful wisdom on faith, reinvention, self-doubt, storytelling, and viewing your purpose through the lens o…
  continue reading
 
While many businesses rely on Microsoft 365, Salesforce and Google Workspace security features, critical blind spots remain—the recent series of high profile SaaS breaches demonstrate this. So what should you do? Mike Puglia, General Manager of Kaseya Labs, joins Business Security Weekly to discuss the risks in SaaS applications. In this segment, M…
  continue reading
 
For OT systems, uptime is paramount. That's a hard rule that makes maintaining, upgrading, and securing them a complex struggle. Tomas "Data" Owens and James Cotter discuss how Tennessee is tackling the organizational and technical challenges that come with hardening OT systems across the state. Those challenges range from old technology (like RS-2…
  continue reading
 
Live from InfoSec World 2025, this episode of Enterprise Security Weekly features six in-depth conversations with leading voices in cybersecurity, exploring the tools, strategies, and leadership approaches driving the future of enterprise defense. From configuration management and AI-generated threats to emerging frameworks and national standards, …
  continue reading
 
Loading …
Copyright 2026 | Privacy Policy | Terms of Service | | Copyright
Listen to this show while you explore
Play