Search a title or topic

Over 20 million podcasts, powered by 

Player FM logo

Alexander Bennett Podcasts

show episodes
 
Artwork

1
Born Yesterday

Andy Barr and Alexander Bennett

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
A podcast experiment conducted by comedians Andy Barr (@SomeNiceFun) and Alexander Bennett (@AlexyBennett). Barr and Bennett have been cloning themselves and the clones are idiots - they know nothing, they were literally born yesterday. How do you explain everything to someone who doesn't know anything? Every episode, guest comedians attempt to find out. Hosted on Acast. See acast.com/privacy for more information.
  continue reading
 
Artwork

1
Security Weekly Podcast Network (Audio)

Security Weekly Productions

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Daily
 
Welcome to the Security Weekly Podcast Network, your all-in-one source for the latest in cybersecurity! This feed features a diverse lineup of shows, including Application Security Weekly, Business Security Weekly, Paul's Security Weekly, Enterprise Security Weekly, and Security Weekly News. Whether you're a cybersecurity professional, business leader, or tech enthusiast, we cover all angles of the cybersecurity landscape. Tune in for in-depth panel discussions, expert guest interviews, and ...
  continue reading
 
Artwork

1
The JB Show

Alexander Hanimyan

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
The JB Show, hosted by Alexander "JB" Hanimyan, is a podcast where we talk about anything and everything sports related! Stay tuned! Check out social media for more updates! Instagram: https://www.instagram.com/alexhanimyan/ Twitter: https://twitter.com/alexhanimyan Youtube: https://www.youtube.com/channel/UCd9jswar_I1xWm59HLCTBoA
  continue reading
 
Artwork

1
Resting Witch Face

Resting Witch Face

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Searching for a one stop haunt for all things spooky? Join badass witches Grant Jacoby and Bailey Bennett for weekly tales of ghosts, demons, vampires and things that go bump in the night, with a twist of humor. Bad puns, bitchy comments and plenty of scares guaranteed. Let's get witchy.
  continue reading
 
Artwork

1
Defining Dad Bod

Alex VanHouten

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Coach Alex VanHouten is the owner and founder of two health and fitness companies -- The Betterment Company and Defining Dad Bod and he brings 15 years of fitness industry experience to this epic podcast EVERY WEEK! Through "Defining Dad Bod" Coach Alex helps moms and dads with cutting edge nutrition, exercise, and lifestyle change designed optimize their bioindividuality and help them show up better for themselves and their families. He hosts THIS podcast to cut through the confusion of the ...
  continue reading
 
Welcome to Deep Dive Podcast with Jaimie Good, where hosts Jaimie Good and Alexander take you on a thoughtful and adventurous journey through a wide range of topics. From the intricacies of philosophy and psychology to the immersive worlds of video games, literature, and art, this podcast dives headfirst into complex and fascinating subjects. Whether you’re curious about human consciousness, unraveling the hidden themes in your favorite RPGs, or just looking for a great conversation about li ...
  continue reading
 
Romance Novel Recommendations is your go-to podcast for all things love, passion, and captivating storytelling! Join us as we dive into the world of English romance novels, bringing you the best and most beloved titles in a delightful audiobook format. Perfect for your daily commute, a cozy night in, or whenever you need a dose of romance in your life!
  continue reading
 
Artwork

1
IMTalk's Legends of Triathlon

Bevan James Eyles and 'Coach' John Newsom

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
The boys from IMTalk, the worlds leading Ironman Triathlon podcast, have started Legends of Triathlon. Bevan and John will do a long interview every month with some of the people who have shaped triathlon.
  continue reading
 
All episodes starting in 2022 feature better audio and fewer ads! The Paracast is a paranormal radio show that takes you on a journey to a world beyond science, where UFOs, poltergeists and strange phenomena of all kinds have been reported by millions. The Paracast seeks to shed light on the mysteries and complexities of our Universe and the secrets that surround us in our everyday lives. Join long-time paranormal writer and researcher Gene Steinberg, a team of knowledgeable guest cohosts, a ...
  continue reading
 
Loading …
show series
 
From the United States to China and from Brazil to India, an authoritarian approach to news is spreading across the world. Increasingly, the media is no longer a check on power or a source of objective information but a means by which governments and leaders can propagate their versions of reality, however biased or false. In Dictating Reality: The…
  continue reading
 
Polarization is a defining feature of politics in the United States and many other democracies. Yet although there is much research focusing on the effects of polarization on domestic politics, little is known about how polarization influences international cooperation and conflict. Democracies are thought to have advantages over nondemocratic nati…
  continue reading
 
AI Cheating?, O, Canada, npms, passkeys, Exchange, Solaris, the amazing Rob Allen of Threatlocker, and More on this edition of the Security Weekly News. Segment Resources: Ingram Micro Working Through Ransomware Attack by SafePay Group | MSSP Alert: https://www.msspalert.com/news/ingram-micro-working-through-ransomware-attack-by-safepay-group This …
  continue reading
 
In the security news this week: Cybersecurity is dead, and AI killed it Exploiting the patching system Apple makes it easier for spyware Who is patching Cisco ASA? Shove that DMCA somewhere HTTPS - a requirement Russia wants to own all the exploits Abandonware challenges Reversing at its hardest with Lua Hacking team is back, and leetspeak malware …
  continue reading
 
Organizations that successfully earn and keep the trust of their customers, employees, and partners experience better business outcomes, more engagement, and competitive differentiation. But what does that trust look like and who's responsible for building and maintaining that trust? Jeff Pollard, Vice-President, Principal Analyst on the Security a…
  continue reading
 
The post quantum encryption migration is going to be a challenge, but how much of a challenge? There are several reasons why it is different from every other protocol and cypher iteration in the past. Is today's hardware up to the task? Is it just swapping out a library, or is there more to it? What is the extent of software, systems, and architect…
  continue reading
 
A podcast from Cornell University’s Brooks School of Public Policy Center on Global Democracy About the Podcast Each week, co-hosts Rachel Beatty Riedl and Esam Boraey bring together leading scholars, policymakers, and practitioners to explore the challenges and possibilities facing democracy around the world. Produced by Cornell’s Center on Global…
  continue reading
 
Was Britain’s industrial revolution the result of its machines, which produced goods with miraculous efficiency? Was it the country’s natural abundance, which provided coal for its engines, ores for its furnaces and food for its labourers? Or was it Britain’s colonies, where a brutalized enslaved workforce produced cotton for its factories? In Ruth…
  continue reading
 
Segment 1: Interview with Dave Lewis from 1Password In this week's sponsored interview, we dive into the evolving security landscape around AI agents, where we stand with AI agent adoption. We also touch on topics such as securing credentials in browser workflows and why identity is foundational to AI agent security. 1Password Addresses a Critical …
  continue reading
 
R. Jisung Park is assistant professor at the University of Pennsylvania, where he holds appointments in the School of Social Policy and Practice and the Wharton School of Business. It’s hard not to feel anxious about the problem of climate change, especially if we think of it as an impending planetary catastrophe. In Slow Burn: The Hidden Costs of …
  continue reading
 
Venomous Robo Bees and Rabid Cocaine Weasels, sidebar spoofing, AI Risk, Red Tiger, SessionReaper, Bad Bots, Willow, Josh Marpet, and More on this edition of the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-523
  continue reading
 
In the security news: When in doubt, blame DNS, you're almost always correct How to Make Windows 11 great, or at least suck less CSRF is the least of your problems Shady exploits Linux security table stakes (not steaks) The pill camera Give AI access to your UART Security products that actually try to be secure? Firmware vulnerabilities, lots of th…
  continue reading
 
CONTROL POD - When circumstances prevent us from being able to perform an experiment, it's time for Control Pod. Follow the experiment (https://twitter.com/BYesterdayPod - https://www.instagram.com/byesterdaypod/?locale=zh-hans) Follow Andy Barr (https://linktr.ee/andybarrcomedy) and Alexander Bennett (https://linktr.ee/alexanderbennettcomedian) Em…
  continue reading
 
As the Verizon Data Breach Investigations Report has stated year after year, most breaches start with human error. We've invested a lot in Security Awareness and Training and Phishing solutions, but yet human error is still the top risk. How do we actually reduce human risk? Rinki Sethi, CSO at Upwind Security, and Nicole Jiang, CEO of Fable Securi…
  continue reading
 
In the long run, countries in Northeast Asia will have to see the need for collective defense. Otherwise, you won’t be able to stop rivalry between powers like the U.S. and China. It sounds utopian now, but so did the idea of French and German soldiers serving under the same command a century ago. – Y.S. Lee, NBN Interview (2025) Sustainable Peace …
  continue reading
 
The Afterlife, AWS, ClickFix, Agentic AI Galore, Robot Lumberjacks, Robocalls, Aaran Leyland, and more on the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-522 This segment is sponsored by ThreatLocker. Visit https://securityweekly.com/threatlocker to learn mor…
  continue reading
 
Ransomware attacks typically don't care about memory safety and dependency scanning, they often target old, unpatched vulns and too often they succeed. Rob Allen shares some of the biggest cases he's seen, what they have in common, and what appsec teams could do better to help them. Too much software still requires custom configuration to make it m…
  continue reading
 
Segment 1: David Brauchler on AI attacks and stopping them David Brauchler says AI red teaming has proven that eliminating prompt injection is a lost cause. And many developers inadvertently introduce serious threat vectors into their applications – risks they must later eliminate before they become ingrained across application stacks. NCC Group’s …
  continue reading
 
In No Standard Oil: Managing Abundant Petroleum in a Warming World (Oxford University Press, 2021), Deborah Gordon shows that no two oils or gases are environmentally alike. Each has a distinct, quantifiable climate impact. While all oils and gases pollute, some are much worse for the climate than others. In clear, accessible language, Gordon expla…
  continue reading
 
The world that Alexander remade in his lifetime was transformed once more by his death in 323 BCE. In Age of Conquests: The Greek World from Alexander to Hadrian(Harvard University Press, 2018), Angelos Chaniotis, Professor of Ancient History and Classics at the Institute for Advanced Study in Princeton, examines how his successors reorganized Pers…
  continue reading
 
As the world becomes more connected, strengthening international relations is essential for fostering global stability for economic and cultural growth. By integrating theory and practice applications, nations can move beyond traditional diplomatic approaches to embrace new strategies. By applying transformative theories, it allows for fresh perspe…
  continue reading
 
First up is a technical segment on UEFI shells: determining if they contain dangerous functionality that allows attackers to bypass Secure Boot. Then in the security news: Your vulnerability scanner is your weakest link Scams that almost got me The state of EDR is not good You don't need to do that on a phone or Raspberry PI Hash cracking and explo…
  continue reading
 
Still managing compliance in a spreadsheet? Don't have enough time or resources to verify your control or risk posture? And you wonder why you can't get the budget to move your compliance and risk programs forward. Maybe it's time for a different approach. Trevor Horwitz, Founder and CISO at TrustNet joins Business Security Weekly to discuss how th…
  continue reading
 
Interest and participation in the OWASP GenAI Security Project has exploded over the last two years. Steve Wilson explains why it was important for the project to grow beyond just a Top Ten list and address more audiences than just developers. He also talks about how the growth of AI Agents influences the areas that appsec teams need to focus on. W…
  continue reading
 
Segment 1 - Interview with Dr. Anand Singh We're always thrilled to have authors join us to discuss their new book releases, and this week, it is Dr. Anand Singh. He seriously hustled to get his new book, Data Security in the Age of AI, out as soon as possible so that it could help folks dealing with securing AI rollouts right now! We'll discuss wh…
  continue reading
 
A vital account of the state of the Arctic today--emphasising the twin dangers of climate change and geopolitical competition Nowhere is the dual threat of climate change and geopolitical contest felt more strongly than in the Arctic. Sea ice is declining rapidly, wildfires are burning, and permafrost is thawing. All the while, global interest is g…
  continue reading
 
Suggested additional channels: Political Science, National Security, American Politics, Middle Eastern Studies, Eastern European Studies, New Books with Miranda Melcher NB: I don’t think this needs to go on General History The no-fly zone is a frequently used instrument in the US foreign policy arsenal, despite detrimental, or even catastrophic, re…
  continue reading
 
Ballistic Hot Dogs, Sonicwall, Clayrat, Twonet, Lockbit, Breachforums, Resumes, Discord, Aaran Leyland, and More on this edition of the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-519
  continue reading
 
This week we kick things off with a special interview: Kieran Human from Threat Locker talks about EDR bypasses and other special projects. In the security news: Hacking TVs Flushable wipes are not the only problem People just want to spy on their pets, except the devices can be hacked Linux EDR is for the birds What does my hat say we love exploit…
  continue reading
 
The speech debates have not abated, and it’s clear that invoking the First Amendment, and the importance of free speech for democracy, does not settle these debates but provokes more questions. We have lost our way, it seems, since people on all sides invoke free speech and then try to silence those they disagree with. Historian Fara Dabhoiwala of …
  continue reading
 
Seeds of Exchange: Soviets, Americans, and Cooperation in Agriculture, 1921–1935 (Northern Illinois UP, 2025) examines the US and Soviet exchange of agricultural knowledge and technology during the interwar period. Maria Fedorova challenges the perception of the Soviet Union as a passive recipient of American technology and expertise. She reveals t…
  continue reading
 
CONTROL POD - When circumstances prevent us from being able to perform an experiment, it's time for Control Pod. Follow the experiment (https://twitter.com/BYesterdayPod - https://www.instagram.com/byesterdaypod/?locale=zh-hans) Follow Andy Barr (https://linktr.ee/andybarrcomedy) and Alexander Bennett (https://linktr.ee/alexanderbennettcomedian) Em…
  continue reading
 
Global spending on cybersecurity products and services will see a strong 14.4% CAGR from 2024 through 2029 and will hit $302.5 billion in 2029, driven by continued concerns around cyberattacks across all verticals and geographies. But where is the spending occuring and how do you prepare? Merritt Maxim, VP & Research Director at Forrester, joins Bu…
  continue reading
 
Why do states start conflicts that they ultimately lose? Why do leaders possess inaccurate expectations of their prospects for victory? Bureaucracies at War (Cambridge UP, 2024) examines how national security institutions shape the quality of bureaucratic information upon which leaders base their choice for conflict – which institutional designs pr…
  continue reading
 
Loading …
Copyright 2025 | Privacy Policy | Terms of Service | | Copyright
Listen to this show while you explore
Play