🏈 Booze & Ballin – Fantasy Football, Shaken Not Stirred 🥃 Welcome to Booze & Ballin, where fantasy football meets the bottom of a glass. We’re not your typical stats-and-spreadsheets podcast — we’re the guys (and the occasional bourbon bottle) at the bar, breaking down fantasy football the way it was meant to be: honest, hilarious, and a little tipsy. Each episode, we bring you fantasy football talk, bold takes, and weekly booze reviews — from smooth Bourbons to the occasional questionable c ...
…
continue reading
Todd & Dustin Podcasts
Dustin Faulkner breaks down current events from a Conservative perspective. Additionally, there is a lot of investigative journalism in exposing what's truly going on in our country... much of which will shock you! Tune in every Sunday evening for a LIVE episode of Battlefront: Frontline
…
continue reading
Love Is Spoken Queer is a podcast where the Topics are Gospel and the Voices are LGBTQ+! Join Dustin Larsen (an active GAY member of The Church of Jesus Christ of Latter-Day Saints), René Hernandez, Hayden Davis and Todd Richardson as they discuss Gospel Topics through Queer Perspectives. Add your own Queer Perspective on Gospel Topics by sending them to: [email protected].
…
continue reading
Jason Sauer, artist, entrepreneur, and demolition derby driver; known nationally in arenas for his graffiti style art cars; brings you a podcast about the creation of fine art from demolition derby cars and the hustle that goes into it.
…
continue reading
Never a Truer Word with Jack Fox explores the truth hidden in the words people use. Each episode breaks down language patterns in relationships, arguments, apologies, workplace communication, and public statements. The focus is on what people reveal without realising it. Hosted by Jack Fox, the show looks at how things are said rather than who is right or wron Get early access, exclusive episodes and video content by subscribing to the podcast https://podcasters.spotify.com/pod/show/neveratr ...
…
continue reading
Welcome to the American Contingency Podcast. Each episode features a unique discussion led by members of the American Contingency community. Experts in all things preparedness join us each week to share their stories and provide insight into the changing culture. American Contingency's mission is to create and support a network of people and teams across the country who are prepared to respond and able to recover from difficult situations they, their families, or their communities may face. ...
…
continue reading
The Michelle May O'Neil Show is where reinvention becomes more than an idea; it becomes a movement. If you are standing at the edge of what is next, this is where you will find the stories, strategies, and clarity to create your future by design instead of default. From boardrooms to personal crossroads, we confront the hard part of change: the failures that felt final, the resets that required courage, and the disciplined strategy that turns a comeback into a competitive edge. Hosted by Mic ...
…
continue reading
/RealEstate is a bi-weekly podcast where we chat with agents and experts in the real estate space to find out what strategies are working for them, what tools are powering their business, and how they are maneuvering shifts in the industry. Join host and marketing aficionado Chris Whitling as he uncovers the tips, tricks, and tech ambitious agents can use to take their businesses to the next level.
…
continue reading
Welcome to the Security Weekly Podcast Network, your all-in-one source for the latest in cybersecurity! This feed features a diverse lineup of shows, including Application Security Weekly, Business Security Weekly, Paul's Security Weekly, Enterprise Security Weekly, and Security Weekly News. Whether you're a cybersecurity professional, business leader, or tech enthusiast, we cover all angles of the cybersecurity landscape. Tune in for in-depth panel discussions, expert guest interviews, and ...
…
continue reading
Welcome to the "Speaking of Wealth" podcast showcasing profit strategies for speakers, publishers, authors, consultants, and info-marketers. Learn valuable skills to make your business more successful, more passive, more automated, and more scalable. Your host, Jason Hartman interviews top-tier guests, bestselling authors and experts including; Dan Poynter (The Self-Publishing Manual), Harvey Mackay (Swim With The Sharks & Get Your Foot in the Door), Dan Millman (Way of the Peaceful Warrior) ...
…
continue reading
1
From Lawyer to Marketer: Faith, AI, and Finding Purpose with Dustin Sanchez
1:10:08
1:10:08
Play later
Play later
Lists
Like
Liked
1:10:08What happens when you stop chasing success and start living in alignment with your faith and purpose? In this episode, Michelle O’Neil sits down with Dustin Sanchez, a former lawyer turned legal marketing expert, to unpack his powerful journey of transformation. Dustin shares how leaving the traditional legal path, embracing entrepreneurship, rebui…
…
continue reading
1
Why are cybersecurity predictions so bad? - ESW #440
1:29:41
1:29:41
Play later
Play later
Lists
Like
Liked
1:29:41For our first episode of the new year, we thought it would be appropriate to dig into some cybersecurity predictions. First, we cover the very nature of predictions and why they're often so bad. To understand this, we get into logical fallacies and cognitive biases. In the next segment, we cover some 2025 predictions we found on the Internet. In th…
…
continue reading
1
NATW Podcast: Todd Kendhammer Interrogation
45:46
45:46
Play later
Play later
Lists
Like
Liked
45:46Todd Kendhammer InterrogationThis is where his story faces pressure.In this episode of Never A Truer Word, Jack Fox applies Statement Investigation to the police interrogation of Todd Kendhammer. His wife, Barbara, is the victim. He says her death was a tragic accident. But as investigators begin to test that story, Kendhammer’s answers reveal more…
…
continue reading
1
Defending the Boundaryless Cloud: Understanding Threats That Matter - Cameron Sipes, Steve Stone - SWN #543
36:39
36:39
Play later
Play later
Lists
Like
Liked
36:39Cloud breaches don’t always start in the cloud, but they do end there. To defeat an attacker you need to understand their mission target along with the access points available to them, regardless of whether they reside within or beyond the cloud. SentinelOne is purpose-built to stop attacks wherever they originate - from within and beyond the cloud…
…
continue reading
1
Breaking Into Cybersecurity - PSW #907
1:05:11
1:05:11
Play later
Play later
Lists
Like
Liked
1:05:11Our field is booming! Cybersecurity jobs are projected to grow 33 percent through 2033, far outpacing the average 4 percent growth across all jobs. (And yes, those stats could be made up, but they sound nice, eh?) Yet newcomers often feel paralyzed by where to start. The truth? There's no single "right path," but there are proven strategies that wo…
…
continue reading
1
You Don’t Need a Crisis to Start Over | How to Reinvent Your Life with Clarity
12:13
12:13
Play later
Play later
Lists
Like
Liked
12:13You don’t need a breakdown to reinvent your life, you need honesty. In this powerful episode, Michelle O’Neil explores the quiet moment when clarity replaces chaos and shows how personal reinvention begins with truth, alignment, and one courageous step forward. If your life looks fine on the outside but feels empty on the inside, this message is fo…
…
continue reading
1
Say Easy, Do Hard - Preventing Burnout, Focusing on CISO Health and Wellness - BSW #428
52:24
52:24
Play later
Play later
Lists
Like
Liked
52:24CISO pressures are on the rise - board expectations, executive alignment, AI, and personal liability - and that's all on top of your normal security pressures. With all these pressures, CISO burnout is on the rise. How do we detect it and help prevent it? Easier said than done. In this Say Easy, Do Hard segment, we tackle the health and wellness of…
…
continue reading
1
SentinelOne and AWS Shape the Future of AI Security with Purple AI - Rachel Park, Brian Mendenhall - SWN #542
37:41
37:41
Play later
Play later
Lists
Like
Liked
37:41SentinelOne announced a series of new innovative designations and integrations with Amazon Web Services (AWS), designed to bring the full benefits of AI security to AWS customers today. From securing GenAI usage in the workplace, to protecting AI infrastructure to leveraging agentic AI and automation to speed investigations and incident response, S…
…
continue reading
1
AI-Era AppSec: Transparency, Trust, and Risk Beyond the Firewall - Felipe Zipitria, Steve Springett, Aruneesh Salhotra, Ken Huang - ASW #363
1:06:43
1:06:43
Play later
Play later
Lists
Like
Liked
1:06:43In an era dominated by AI-powered security tools and cloud-native architectures, are traditional Web Application Firewalls still relevant? Join us as we speak with Felipe Zipitria, co-leader of the OWASP Core Rule Set (CRS) project. Felipe has been at the forefront of open-source security, leading the development of one of the world's most widely d…
…
continue reading
1
Holiday Chat: Local AI datacenter activism, AI can't substitute good taste, and more - ESW #439
1:13:43
1:13:43
Play later
Play later
Lists
Like
Liked
1:13:43For this week's episode of Enterprise Security Weekly, there wasn't a lot of time to prepare. I had to do 5 podcasts in about 8 days leading up to the holiday break, so I decided to just roll with a general chat and see how it went. Also, apologies, for any audio quality issues, as the meal I promised to make for dinner this day required a lot of p…
…
continue reading
1
NATW Podcast: Robert Wone - Final Thoughts
38:44
38:44
Play later
Play later
Lists
Like
Liked
38:44Robert Wone was killed after spending the night at a house shared by Joe Price, Victor Zaborsky, and Dylan Ward, all three of whom later gave police interviews describing what happened. In this final episode of the series, Jack brings those three accounts together and looks closely at the language used across all of them.Drawing on audience observa…
…
continue reading
1
Holiday Special Part 2: You’re Gonna Click the Link - Rob Allen - SWN #541
34:25
34:25
Play later
Play later
Lists
Like
Liked
34:25You survived the click—but now the click has evolved. In Part 2, the crew follows phishing and ransomware down the rabbit hole into double extortion, initial access brokers, cyber insurance drama, and the unsettling rise of agentic AI that can click, run scripts, and make bad decisions for you. The conversation spans ransomware economics, why payin…
…
continue reading
1
Building a Hacking Lab in 2025 - PSW #906
1:03:21
1:03:21
Play later
Play later
Lists
Like
Liked
1:03:21The crew makes suggestions for building a hacking lab today! We will tackle: What is recommended today to build a lab, given the latest advancements in tech Hardware hacking devices and gadgets that are a must-have Which operating systems should you learn Virtualization technology that works well for a lab build Using AI to help build your lab Visi…
…
continue reading
1
BONUSODE 11: Voices of the Restoration - Liberty Jail (From the Vault!)
10:58
10:58
Play later
Play later
Lists
Like
Liked
10:58Send us a text From the Vault: Listen to this never before released Bonus Episode from Season 2, originally recorded in October of 2021! René and Dustin add their Queer Voices to the Voices of the Restoration; alongside those of Emma and Joseph Smith as the Prophet was imprisoned in Liberty Jail! Add your voice by sending your thoughts to: lovespok…
…
continue reading
1
BONUSODE 12: Voices of the Restoration - The Relief Society (From the Vault!)
11:38
11:38
Play later
Play later
Lists
Like
Liked
11:38Send us a text From the Vault: Listen to this never before released Bonus Episode from Season 2, originally recorded in October of 2021! René and Dustin add their Queer Voices to the Voices of the Restoration; alongside that of Eliza Snow! Add your voice by sending your thoughts to: [email protected] or DM us on Social: Instagram: @lovespok…
…
continue reading
1
511: Concierge Pre-IPO Access: Why Small, Personalized Firms Beat Giant Platforms
40:48
40:48
Play later
Play later
Lists
Like
Liked
40:48Jason and Christine Healey, founder of Healey Pre-IPO, discuss the specialized market for private stocks in late-stage, high-value companies. She explains that massive firms like SpaceX and OpenAI are remaining private longer than in previous decades, often reaching valuations in the hundreds of billions before debuting on public exchanges. Because…
…
continue reading
1
Todd Frankfort on Law, Legacy, and Why Local Judges Matter More Than You Think
42:51
42:51
Play later
Play later
Lists
Like
Liked
42:51Michelle O’Neil sits down with Todd Frankfort, a divorce lawyer, professor, and judicial candidate—to explore law, politics, legacy, and leadership. From navigating the political climate as a judge to lessons learned from family, faith, and high-stakes cases, this conversation offers a rare look into integrity, service, and what truly defines succe…
…
continue reading
1
The CISO Holiday Party 2025: Leadership Lessons from the Year That Was - BSW #427
49:27
49:27
Play later
Play later
Lists
Like
Liked
49:27Join Business Security Weekly for a roundtable-style year-in-review. The BSW hosts share the most surprising, inspiring, and humbling moments of 2025 in business security, culture, and personal growth. And a few of us might be dressed for the upcoming holiday season... Visit https://www.securityweekly.com/bsw for all the latest episodes! Show Notes…
…
continue reading
1
Holiday Special Part 1: You’re Gonna Click the Link - Rob Allen - SWN #540
35:34
35:34
Play later
Play later
Lists
Like
Liked
35:34It’s the holidays, your defenses are down, your inbox is lying to you, and yes—you’re gonna click the link. In Part 1 of our holiday special, Doug White and a panel of very smart people explain why social engineering still works decades later, why training alone won’t save you, and why the real job is surviving after the click. From phishing and sm…
…
continue reading
With The Salt Path Scandal from Sky Documentaries getting talked about a lot, I'm re-sharing this episode from earlier this year. The literary world is reeling from the controversy surrounding Raynor Winn's beloved book, The Salt Path, and its recent film adaptation. Following serious allegations made in The Observer, author Raynor Winn has release…
…
continue reading
1
Modern AppSec: OWASP SAMM, AI Secure Coding, Threat Modeling & Champions - Sebastian Deleersnyder, Dustin Lehr, James Manico, Adam Shostack - ASW #362
1:07:52
1:07:52
Play later
Play later
Lists
Like
Liked
1:07:52Using OWASP SAMM to assess and improve compliance with the Cyber Resilience Act (CRA) is an excellent strategy, as SAMM provides a framework for secure development practices such as secure by design principles and handling vulns. Segment Resources: https://owaspsamm.org/ https://cybersecuritycoalition.be/resource/a-strategic-approach-to-product-sec…
…
continue reading
1
Internal threats are the hole in Cybersecurity’s donut - Frank Vukovits - ESW #438
1:57:05
1:57:05
Play later
Play later
Lists
Like
Liked
1:57:05Interview with Frank Vukovits: Focusing inward: there lie threats also External threats get discussed more than internal threats. There’s a bit of a streetlight effect here: external threats are more visible, easier to track, and sharing external threat intelligence doesn’t infringe on any individual organization’s privacy. That’s why we hear the i…
…
continue reading
1
NATW Podcast: Robert Wone - Dylan's Story
47:36
47:36
Play later
Play later
Lists
Like
Liked
47:36Robert Wone remains at the centre of a case that continues to spark theories and long-running discussion across communities like reddit. This episode is part of a three-part series where we analyse the accounts given by the three people who we know were in the house when Robert was killed. Each interview is studied to see what the words reveal, wha…
…
continue reading
1
Auld Lang Syne, Ghostpairing, Centerstack, WAFS, React2Shell, Crypto, Josh Marpet... - SWN #539
32:10
32:10
Play later
Play later
Lists
Like
Liked
32:10Auld Lang Syne, Ghostpairing, Centerstack, OneView, WAFS, React2Shell Redux, Crypto, Josh Marpet, and More, on the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-539
…
continue reading
This week in the security news: Linux process injection Threat actors need training too A Linux device "capable of practically anything" The Internet of webcams Hacking cheap devices Automating exploitation with local AI models Lame C2 Smallest SSH backdoor Your RDP is on the Internet These are not the high severity bugs you were looking for Low ha…
…
continue reading
1
America is Closer Than You Think to Islamic Control Like Europe | Dr Mark Sherwood & John Grace
2:13:06
2:13:06
Play later
Play later
Lists
Like
Liked
2:13:06America is Closer Than You Think to Islamic Control Like Europe | Should We Revisit Our Views on Bacteria and Parasites | The Investor Market is About to Change Like Never Before | Dr. Sherwood, John Grace Follow BBN on X: @dloydfaulk @bf_frontline Join PickAx today and enjoy Freedom of Speech and Freedom of Reach. https://pickax.com/?referralCode=…
…
continue reading
1
Cybersecurity Hiring Trends as Boards Bridge Confidence Gap and Build Strategic Lever - Jim McCoy - BSW #426
54:36
54:36
Play later
Play later
Lists
Like
Liked
54:36Business Security Weekly is well aware of the cybersecurity hiring challenges. From hiring CISOs to finding the right skills to developing your employees, we cover it weekly in the leadership and communications segment. But this week, our guest interview digs into the global cybersecurity hiring trends. Jim McCoy, CEO at Atlas, joins Business Secur…
…
continue reading
1
How to Design a Strategic 2026 Instead of Living in Constant Firefighting
16:18
16:18
Play later
Play later
Lists
Like
Liked
16:18Too many leaders spend their year reacting instead of leading, busy every day, yet drifting further from their real goals. This conversation breaks down how to stop living in crisis mode and start designing a year with intention. Michelle O’Neil shares a powerful framework for building 2026 around strategy instead of stress, including how to filter…
…
continue reading
The Erika Kirk Candace Owens meeting was framed publicly as a private and productive discussion. What followed were two post-meeting statements that reveal very different perspectives on what that meeting achieved.In this episode of Never A Truer Word, Jack Fox applies Statement Investigation to the language used after the meeting, focusing on how …
…
continue reading
1
Pornhub, WSL, Santastealer, Geoserver, Webkit, Fortiyomama, Dad's pix, Aaran Leyland. - SWN #538
34:36
34:36
Play later
Play later
Lists
Like
Liked
34:36Pornhub, WSL, Santastealer, Geoserver, Webkit, Fortiyomama, Dad's Pix, Aaran Leyland, and More, on the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-538
…
continue reading
1
Developing Open Source Skills for Maintaining Projects - Kat Cosgrove - ASW #361
1:03:55
1:03:55
Play later
Play later
Lists
Like
Liked
1:03:55Open source projects benefit from support that takes many shapes. Kat Cosgrove shares her experience across the Kubernetes project and the different ways people can make meaningful contributions to it. One of the underlying themes is that code is written for other people. That means PRs need to be understandable, discussions need to be enlightening…
…
continue reading
1
Illuminating Data Blind Spots, Topic, Enterprise News - Tony Kelly - ESW #437
1:49:42
1:49:42
Play later
Play later
Lists
Like
Liked
1:49:42Interview Segment: Tony Kelly Illuminating Data Blind Spots As data sprawls across clouds and collaboration tools, shadow data and fragmented controls have become some of the biggest blind spots in enterprise security. In this segment, we’ll unpack how Data Security Posture Management (DSPM) helps organizations regain visibility and control over th…
…
continue reading
1
NATW Podcast: Robert Wone - Victor's Story
49:15
49:15
Play later
Play later
Lists
Like
Liked
49:15Robert Wone remains the centre of a case that continues to generate theories and long-running discussion across communities like reddit. This episode is part of a three-part series where we analyse the accounts given by the three people who we know were in the house when Robert was killed. Each interview is studied to see what the words reveal, wha…
…
continue reading
STASH OR PASS | Dynasty Fantasy Football Cut-Line Decisions In today’s episode of Stash or Pass, we’re diving into the toughest conversations in dynasty fantasy football: 👉 Is this player worth holding onto… or is it time to move on? We break down players living right on the cut line — the guys clogging your bench, testing your patience, and making…
…
continue reading
1
Disney Gone Wild, Docker, AIs, Passkeys, Gogs, React2Shell, Notepad++, Josh Marpet... - SWN #537
30:38
30:38
Play later
Play later
Lists
Like
Liked
30:38Disney Gone Wild, Docker, AIs, Passkeys, Gogs, React2Shell, Notepad++, Josh Marpet, and More Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-537
…
continue reading
Dustin Duren Trial analysis from Never A Truer Word. Jack Fox dissects the sentencing statement Duren delivered after being convicted of murdering Caitlin Naffziger and finds a performance designed for leniency not truth.From sudden tears to selective memory from religious rebirth to emotional distancing Duren’s words reveal a calculated attempt to…
…
continue reading
1
Tech Segment: MITM Automation + Security News - Josh Bressers - PSW #904
2:07:47
2:07:47
Play later
Play later
Lists
Like
Liked
2:07:47This week in our technical segment, you will learn how to build a MITM proxy device using Kali Linux, some custom scripts, and a Raspberry PI! In the security news: Hacking Smart BBQ Probes China uses us as a proxy LOLPROX and living off the Hypervisor Are we overreating to React4Shell? Prolific Spyware vendors EDR evaluations and tin foil hats Com…
…
continue reading
1
The Strategy Every Entrepreneur Needs | Ron Pinkerton on Leadership & Legacy
39:00
39:00
Play later
Play later
Lists
Like
Liked
39:00Former apparel CEO and entrepreneur Ron Pinkerton joins Michelle O'Neil to break down the “win-win-win” strategy that helped him build a powerhouse company from the ground up. He shares real stories on leadership, timing, team building, integrity, and navigating the emotional side of selling a business. This conversation is packed with timeless bus…
…
continue reading
1
Salesforce Security Risks, Boards Duty of Care, and Managing CISO Risks - Justin Hazard - BSW #425
52:57
52:57
Play later
Play later
Lists
Like
Liked
52:57Organizations rely heavily on Salesforce to manage vasts amounts of sensitive data, but hidden security risks lurk beneath the surface. Misconfigurations, excessive user permissions, and unmonitored third party integrations can expose this data to attackers. How do I secure this data? Justin Hazard, Principal Security Architect at AutoRABIT, joins …
…
continue reading
1
Hypnotoad, AI Galore, Storm-0249, DocuSign, Broadside, Goldblade, Aaran Leyland... - SWN #536
34:50
34:50
Play later
Play later
Lists
Like
Liked
34:50We've got: Hypnotoad, AI Galore, Storm-0249, DocuSign, Broadside, Goldblade, Ships at Sea, Sora, Aaran Leyland, and More on the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-536
…
continue reading
1
Making OAuth Scale Securely for MCPs - Aaron Parecki - ASW #360
1:07:43
1:07:43
Play later
Play later
Lists
Like
Liked
1:07:43The MCP standard gave rise to dreams of interconnected agents and nightmares of what those interconnected agents would do with unfettered access to APIs, data, and local systems. Aaron Parecki explains how OAuth's new Client ID Metadata Documents spec provides more security for MCPs and the reasons why the behavior and design of MCPs required a new…
…
continue reading
1
Fix your dumb misconfigurations, AI isn't people, and the weekly news - Wendy Nather, Danny Jenkins - ESW #436
1:34:58
1:34:58
Play later
Play later
Lists
Like
Liked
1:34:58Interview with Danny Jenkins: How badly configured are your endpoints? Misconfigurations are one of the most overlooked areas in terms of security program quick wins. Everyone freaks out about vulnerabilities, patching, and exploits. Meanwhile, security tools are misconfigured. Thousands of unused software packages increase remediation effort and a…
…
continue reading
Robert Wone is the centre of a case that continues to spark theories and questions, especially in online discussion spaces like reddit. This episode is part of a three-part series where we analyse the accounts given by the three people who we know were in the house when Robert was killed. Each interview is studied to see what the words reveal, what…
…
continue reading
1
Toilet Cams, N. Korea, Brickstorm, MCP, React2Shell, Proxmox, Metaverse, Josh Marpet - SWN #535
33:08
33:08
Play later
Play later
Lists
Like
Liked
33:08Toilet Cams, North Korea, Brickstorm, MCP, India, React2Shell, Proxmox, Metaverse, Josh Marpet, and More, on the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-535
…
continue reading
1
Holiday Hack Challenge, AI, Internet of Trash - Ed Skoudis - PSW #903
2:10:41
2:10:41
Play later
Play later
Lists
Like
Liked
2:10:41This week we welcome Ed Skoudis to talk about the holiday hack challenge (https://sans.org/HolidayHack). In the security news: Oh Asus Dashcam botnets Weird CVEs being issued CodeRED, but not the worm Free IP checking Internet space junk and IoT Decade old Linux kernel vulnerabilities Breaking out of Claude code Malicious LLMs Hacker on a plan gets…
…
continue reading
1
How Do You Build a Life of Purpose in a World Full of Distractions?
41:08
41:08
Play later
Play later
Lists
Like
Liked
41:08In this insightful conversation, Stefan Junaeus breaks down the difference between dreamers and visionaries, and why some people wait for life to happen while others step into responsibility and build what they’re called to create. He shares powerful wisdom on faith, reinvention, self-doubt, storytelling, and viewing your purpose through the lens o…
…
continue reading
1
Shadow Risks in SaaS, Cybersecurity Market Has Lost Its Mind, and Rise of the CTrO - Mike Puglia - BSW #424
1:06:01
1:06:01
Play later
Play later
Lists
Like
Liked
1:06:01While many businesses rely on Microsoft 365, Salesforce and Google Workspace security features, critical blind spots remain—the recent series of high profile SaaS breaches demonstrate this. So what should you do? Mike Puglia, General Manager of Kaseya Labs, joins Business Security Weekly to discuss the risks in SaaS applications. In this segment, M…
…
continue reading
1
AI semantics, Calendly, Teams, Schmaltz, India, Antigravity, Scada, Aaran Leyland... - SWN #534
36:15
36:15
Play later
Play later
Lists
Like
Liked
36:15AI semantics, Calendly, GreyNoise, Teams, Schmaltz, India, Antigravity, Scada, Aaran Leyland, and More... Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-534
…
continue reading
1
Making TN Critical Infrastructure the Most Secure in the Nation - T. Gwyddon 'Data' ("Gwee-thin") Owen, James Cotter - ASW #359
59:02
59:02
Play later
Play later
Lists
Like
Liked
59:02For OT systems, uptime is paramount. That's a hard rule that makes maintaining, upgrading, and securing them a complex struggle. Tomas "Data" Owens and James Cotter discuss how Tennessee is tackling the organizational and technical challenges that come with hardening OT systems across the state. Those challenges range from old technology (like RS-2…
…
continue reading
1
From Misconfigurations to Mission Control: Lessons from InfoSec World 2025 - Marene Allison, Dr. Ron Ross, Ryan Heritage, Patricia Titus, Perry Schumacher, Rob Allen - ESW #435
1:43:23
1:43:23
Play later
Play later
Lists
Like
Liked
1:43:23Live from InfoSec World 2025, this episode of Enterprise Security Weekly features six in-depth conversations with leading voices in cybersecurity, exploring the tools, strategies, and leadership approaches driving the future of enterprise defense. From configuration management and AI-generated threats to emerging frameworks and national standards, …
…
continue reading