Search a title or topic

Over 20 million podcasts, powered by 

Player FM logo

Alexander Bennett Podcasts

show episodes
 
Artwork

1
Born Yesterday

Andy Barr and Alexander Bennett

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
A podcast experiment conducted by comedians Andy Barr (@SomeNiceFun) and Alexander Bennett (@AlexyBennett). Barr and Bennett have been cloning themselves and the clones are idiots - they know nothing, they were literally born yesterday. How do you explain everything to someone who doesn't know anything? Every episode, guest comedians attempt to find out. Hosted on Acast. See acast.com/privacy for more information.
  continue reading
 
Artwork

4401
The JB Show

Alexander Hanimyan

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
The JB Show, hosted by Alexander "JB" Hanimyan, is a podcast where we talk about anything and everything sports related! Stay tuned! Check out social media for more updates! Instagram: https://www.instagram.com/alexhanimyan/ Twitter: https://twitter.com/alexhanimyan Youtube: https://www.youtube.com/channel/UCd9jswar_I1xWm59HLCTBoA
  continue reading
 
Artwork

1
Security Weekly Podcast Network (Audio)

Security Weekly Productions

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Daily
 
Welcome to the Security Weekly Podcast Network, your all-in-one source for the latest in cybersecurity! This feed features a diverse lineup of shows, including Application Security Weekly, Business Security Weekly, Paul's Security Weekly, Enterprise Security Weekly, and Security Weekly News. Whether you're a cybersecurity professional, business leader, or tech enthusiast, we cover all angles of the cybersecurity landscape. Tune in for in-depth panel discussions, expert guest interviews, and ...
  continue reading
 
Artwork
 
Sacred Sons is an organization dedicated to Masculine Alchemy and Embodiment. We utilize the power of ceremony, ritual, and intentional spaces to deepen into authentic brotherhood and catalyze growth in men worldwide. Sacred Sons Co-founder Adam Jackson hosts weekly episodes where we dive deep into conversations with facilitators, musicians, athletes, artists, and influencers from around the world.
  continue reading
 
Romance Novel Recommendations is your go-to podcast for all things love, passion, and captivating storytelling! Join us as we dive into the world of English romance novels, bringing you the best and most beloved titles in a delightful audiobook format. Perfect for your daily commute, a cozy night in, or whenever you need a dose of romance in your life!
  continue reading
 
Artwork

1
Outside The Chute

outsidethechute

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
Outside The Chute is a podcast dedicated to the game of fastpitch softball. We’ll be sitting down with some of the best in the game, from the past, present and future for exclusive interviews. We’ll also be covering everything on a local, national and world level, including NCAA, ISC, Canadian Nationals, and WBSC. We’re here to connect the softball world!
  continue reading
 
Artwork

51
Resting Witch Face

Resting Witch Face

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Searching for a one stop haunt for all things spooky? Join badass witches Grant Jacoby and Bailey Bennett for weekly tales of ghosts, demons, vampires and things that go bump in the night, with a twist of humor. Bad puns, bitchy comments and plenty of scares guaranteed. Let's get witchy.
  continue reading
 
Artwork

1
Defining Dad Bod

Alex VanHouten

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Coach Alex VanHouten is the owner and founder of two health and fitness companies -- The Betterment Company and Defining Dad Bod and he brings 15 years of fitness industry experience to this epic podcast EVERY WEEK! Through "Defining Dad Bod" Coach Alex helps moms and dads with cutting edge nutrition, exercise, and lifestyle change designed optimize their bioindividuality and help them show up better for themselves and their families. He hosts THIS podcast to cut through the confusion of the ...
  continue reading
 
Artwork

1
IMTalk's Legends of Triathlon

Bevan James Eyles and 'Coach' John Newsom

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
The boys from IMTalk, the worlds leading Ironman Triathlon podcast, have started Legends of Triathlon. Bevan and John will do a long interview every month with some of the people who have shaped triathlon.
  continue reading
 
All episodes starting in 2022 feature better audio and fewer ads! The Paracast is a paranormal radio show that takes you on a journey to a world beyond science, where UFOs, poltergeists and strange phenomena of all kinds have been reported by millions. The Paracast seeks to shed light on the mysteries and complexities of our Universe and the secrets that surround us in our everyday lives. Join long-time paranormal writer and researcher Gene Steinberg, a team of knowledgeable guest cohosts, a ...
  continue reading
 
Loading …
show series
 
Outside The Chute sat down and chatted with just an absolute star in our game, JMU alum and AUSL Bandits pitcher, the one and only, Odicci Alexander-Bennett. Odicci first captured the hearts of fans across the country during her unforgettable run with James Madison University at the 2021 Women’s College World Series, where her dominance, passion, a…
  continue reading
 
In the security news: Cloudflare was down, it was not good Logitech breached The largest data breach in history? Fortinet Fortiweb - the saga continues Hacking Linux through your malware scanner, oh the irony I never stopped hating systemd The ASUS exploit that never existed If iRobot fails, can we deploy our own hacker bot army? Firmware encryptio…
  continue reading
 
In this part of the experiment, the clones are joined by Alex Franklin (https://www.instagram.com/alex_franklin_hallo/) and Neil O'Rourke (https://www.instagram.com/yourfriendneil/) CONTENT WARNING: Over the course of the experiment, literally anything could be discussed in any tone. The clones are beyond ignorant and may misunderstand any number o…
  continue reading
 
📖🔥 HIS DOE, HIS DAMNATION(An Erotic Billionaire Romance) 🔥📖 📎 Read the entire book: https://go.moboreader.com/0MKwC0 ✒️Author: Viviene 🔑 Keywords: Romance, 18+, Erotic, Billionaire Romance, BDSM, Dark Romance 😘 Synopsis: Trigger/Content Warning: This story contains mature themes and explicit content intended for adult audiences(18+). Reader discret…
  continue reading
 
It's a topic we discuss often on Business Security Weekly: CISO Burnout. It's real, but how should you manage it? Dr. Yonesy Núñez, Global Cybersecurity Executive at Chain Bridge Bank and former Managing Director, Chief Cybersecurity Risk Officer, and Chief Information Security Officer at The Depository Trust & Clearing Corporation (DTCC), joins Bu…
  continue reading
 
📖🔥 My Sister Stole My Mate, And I Let Her 🔥📖 📎 Read the entire book: https://go.moboreader.com/tJqdtA ✒️Author: regalsoul 🔑 Keywords: Werewolf, Fantasy, Divorce, CEO, One-night stand, Alpha, Drama, Twist 😘 Synopsis: "My sister threatens to take my mate. And I let her keep him." Born without a wolf, Seraphina is the disgrace of her pack-until a drun…
  continue reading
 
Sagewolf is a father of five and a man devoted to love, creation, and alignment. For nearly twenty years, he's been walking the path of fatherhood and partnership, learning what it means to communicate with honesty, lead with heart, and grow in connection with his beloved of sixteen years, Shay. His passion is helping men slow down enough to find c…
  continue reading
 
Secure code should be grounded more in concepts like secure by default and secure by design than by "spot the vuln" thinking. Matias Madou shares his experience in secure coding training and the importance of teaching critical thinking. He also discusses why critical thinking is so closely related to threat modeling and how LLMs can be a tool for h…
  continue reading
 
Segment 1: Interview with Rob Allen It’s the Year of the (Clandestine) Linux Desktop! As if EDR evasions weren’t enough, attackers are now employing yet another method to hide their presence on enterprise systems: deploying tiny Linux VMs. Attackers are using Hyper-V and/or WSL to deploy tiny (120MB disk space and 256MB memory) Linux VMs to host a …
  continue reading
 
Outside The Chute sat down and chatted with one of our favorite guests ever, the one and only, Kamalani Dung. So we last chatted with Kama back in 2021 and you could say she’s done a little of this and a little of that over the past 4 years. Actually, that’s an understatement, she has done a ton! From walking the red carpet at the Grammy’s, to hitt…
  continue reading
 
Augustus De Morgan, Doordash, Fortiweb, Typosquatting, Vista, Ransomware, AI, Josh, Rob, Aaran, Jason, Dr. Scott, Rocky, Uh., and More on this edition of the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-529
  continue reading
 
This week: Minecraft on your lightbulb Sonicwall breached, who's next? Ditch Android, install Linux Hacking your face Thermostat freedom Pen test fails HackRF hacking times 2 Going around EDR Hackers in your printer Chinese data breach NFC relays and PCI Constructive construction hacks FlipperZero firmware update ICS, PLCs, and attacks Bayesian Swi…
  continue reading
 
As AI revolutionizes how we work, it has created a new attack surface with new technologies. One of those new technologies is Model Context Protocol (MCP). MCP has emerged as the standard for connecting AI to external tools, but its flexibility has created security challenges. How do we secure MCP? Rahul Parwani, Head of Product, Security Solutions…
  continue reading
 
Miles Davis, Jimmy Buffet, 10/8 time, Lost Phones, Phishing, Whisper Leak, Quantum Route Redirect, AI Galore, Rob Allen, and more on the Security Weekly News. Segment Resources: https://www.bleepingcomputer.com/news/security/how-a-ransomware-gang-encrypted-nevada-governments-systems/ This segment is sponsored by ThreatLocker. Visit https://security…
  continue reading
 
Just how bad can things get if someone clicks on a link? Rob Allen joins us again to talk about ransomware, why putting too much attention on clicking links misses the larger picture of effective defenses, and what orgs can do to prepare for an influx of holiday-infused ransomware targeting. Segment resources https://www.bleepingcomputer.com/news/s…
  continue reading
 
Segment 1: OT Security Doesn’t Have to be a Struggle OT/ICS/SCADA systems are often off limits to cybersecurity folks, and exempt from many controls. Attackers don’t care how fragile these systems are, however. For attackers aiming to disrupt operations, fragile but critical systems fit criminals’ plans nicely. In this interview, we discuss the cha…
  continue reading
 
📖🔥 Claimed By My Ex's Uncle 🔥📖 📎 Read the entire book: https://go.moboreader.com/XyR2XT ✒️Author: Nuella.P 🔑 Keywords: Werewolf, R18+, Suspense, Betrayal, Revenge, Alpha, Royalty , Arrogant/Dominant, Age gap 😘 Synopsis: He swore to protect her. Instead, he left her to rot in prison. Hazel was Adrian's mate, his Luna-to-be, and the rightful heir to …
  continue reading
 
📖🔥 You Are Mine, Omega 🔥📖 📎 Read the entire book: https://go.moboreader.com/uqpFeh ✒️Author: AlisTae 🔑 Keywords: Werewolf, R18+, Modern, Love triangle, High school, Alpha, Badboy, Arrogant/Dominant 😘 Synopsis: Allison fell in love with Ethan Iversen, the soon-to-be Alpha of the Moonlight Crown pack. She always wanted him to notice her. Meanwhile, E…
  continue reading
 
📖🔥 The Rise Of The Ugly Luna 🔥📖 📎 Read the entire book: https://go.moboreader.com/KPK2QO ✒️Author: Syra Tucker 🔑 Keywords: Werewolf, Modern, Love at first sight, Contract marriage, Alpha, Arrogant/Dominant, Romance, Transactional love, One-night stand 😘 Synopsis: Lyric had spent her life being hated. Bullied for her scarred face and hated by everyo…
  continue reading
 
This week: Reversing keyboard firmware Ghost networks Invasion of the face changers Ghost tapping and whole lot of FUD AI doesn't code securely, but Aardvark can secure code De-Googling Thermostats Dodgy Android TV boxes can run Debian HackRF vs. Honda Cyberslop AI paper Turning to the darkside Poisoning the watering hole Nagios vulnerabilities VPN…
  continue reading
 
Alexander Cottle is the Founder of The Unmasked Man - an embodied men's facilitator, coach, and spiritual teacher devoted to guiding men home to their truth. Alexander is recognised for his fierce and compassionate work in somatic shadow work, helping men meet their pain, integrate their hidden parts, and transform their wounds into wisdom. He hold…
  continue reading
 
What's the biggest attack vector for breaches besides all of the human related ones (i.e., social engineering, phishing, compromised credentials, etc.)? You might think vulnerabilities, but it's actually misconfiguration. The top breach attack vectors are stolen or compromised credentials, phishing, and misconfigurations, which often work together.…
  continue reading
 
📖🔥 Ten Years a Ward 🔥📖 📎 Read the entire book: https://go.moboreader.com/j6tqV9 ✒️Author: Gavin 🔑 Keywords: Modern, Family, Betrayal, Drama, Workplace, Revenge 😘 Synopsis: For ten years, I secretly loved my guardian, Ethan Hayes. After my family fell apart, he took me in and raised me. He was my entire world. On my eighteenth birthday, I gathered a…
  continue reading
 
Pull requests are a core part of collaboration, whether in open or closed source. GitHub has documented some of the security consequences of misconfiguring how PRs can trigger actions. But what happens when repo owners don't read the docs? Bar Kaduri and Roi Nisimi walk through their experience in reading docs, finding vulns, demonstrating exploits…
  continue reading
 
Segment 1: Interview with Joel Burleson-Davis Frontline workers can’t afford to be slowed down by manual, repetitive logins, especially in mission-critical industries where both security and productivity are crucial. This segment will explore how inefficient login methods erode productivity, while workarounds like shared credentials increase risk, …
  continue reading
 
Outside The Chute sat down and chatted with 2024 ISC Champion and 2022 WBSC World Cup Champ, Aussie native, the one and only, Josh McGovern. This was such a great chat that Hopey and myself got to have with Josh. He took time after travelling over 40 hours to come on and chat with us from down in the Dominican where he was playing in the Legends Cu…
  continue reading
 
AI Cheating?, O, Canada, npms, passkeys, Exchange, Solaris, the amazing Rob Allen of Threatlocker, and More on this edition of the Security Weekly News. Segment Resources: Ingram Micro Working Through Ransomware Attack by SafePay Group | MSSP Alert: https://www.msspalert.com/news/ingram-micro-working-through-ransomware-attack-by-safepay-group This …
  continue reading
 
In the security news this week: Cybersecurity is dead, and AI killed it Exploiting the patching system Apple makes it easier for spyware Who is patching Cisco ASA? Shove that DMCA somewhere HTTPS - a requirement Russia wants to own all the exploits Abandonware challenges Reversing at its hardest with Lua Hacking team is back, and leetspeak malware …
  continue reading
 
Organizations that successfully earn and keep the trust of their customers, employees, and partners experience better business outcomes, more engagement, and competitive differentiation. But what does that trust look like and who's responsible for building and maintaining that trust? Jeff Pollard, Vice-President, Principal Analyst on the Security a…
  continue reading
 
Jacob is a certified master coach, devoted husband and father, and former Tony Robbins Results Coach and Business Strategist. Jacob specializes in creating transformative experiences that elevate people's relationships, wealth, and leadership to extraordinary levels. For nearly a decade, he has worked with men worldwide to become the most empowered…
  continue reading
 
The post quantum encryption migration is going to be a challenge, but how much of a challenge? There are several reasons why it is different from every other protocol and cypher iteration in the past. Is today's hardware up to the task? Is it just swapping out a library, or is there more to it? What is the extent of software, systems, and architect…
  continue reading
 
Segment 1: Interview with Dave Lewis from 1Password In this week's sponsored interview, we dive into the evolving security landscape around AI agents, where we stand with AI agent adoption. We also touch on topics such as securing credentials in browser workflows and why identity is foundational to AI agent security. 1Password Addresses a Critical …
  continue reading
 
Outside The Chute sat down and chatted with , two time NJCAA D1 National Player of the Year at Northeastern Oklahoma A&M college, two-time All-Big 12 First Team selection with Oklahoma State University, and current pro over in the Netherlands with the Haarlem Sparks, it’s the one and only, Rylee Bayless. Its funny, most of these interviews I do, es…
  continue reading
 
Venomous Robo Bees and Rabid Cocaine Weasels, sidebar spoofing, AI Risk, Red Tiger, SessionReaper, Bad Bots, Willow, Josh Marpet, and More on this edition of the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-523
  continue reading
 
In the security news: When in doubt, blame DNS, you're almost always correct How to Make Windows 11 great, or at least suck less CSRF is the least of your problems Shady exploits Linux security table stakes (not steaks) The pill camera Give AI access to your UART Security products that actually try to be secure? Firmware vulnerabilities, lots of th…
  continue reading
 
CONTROL POD - When circumstances prevent us from being able to perform an experiment, it's time for Control Pod. Follow the experiment (https://twitter.com/BYesterdayPod - https://www.instagram.com/byesterdaypod/?locale=zh-hans) Follow Andy Barr (https://linktr.ee/andybarrcomedy) and Alexander Bennett (https://linktr.ee/alexanderbennettcomedian) Em…
  continue reading
 
As the Verizon Data Breach Investigations Report has stated year after year, most breaches start with human error. We've invested a lot in Security Awareness and Training and Phishing solutions, but yet human error is still the top risk. How do we actually reduce human risk? Rinki Sethi, CSO at Upwind Security, and Nicole Jiang, CEO of Fable Securi…
  continue reading
 
The Afterlife, AWS, ClickFix, Agentic AI Galore, Robot Lumberjacks, Robocalls, Aaran Leyland, and more on the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-522 This segment is sponsored by ThreatLocker. Visit https://securityweekly.com/threatlocker to learn mor…
  continue reading
 
Adrian Primeaux is a sixth-generation ceremonial practitioner from the Yankton Sioux, Apache, and Mexica tribes. With nearly two decades of experience teaching and guiding others through spiritual practices, he now helps healers and coaches align their life's work with ancestral wisdom and modern tools. Adrian's approach blends ceremonial knowledge…
  continue reading
 
Ransomware attacks typically don't care about memory safety and dependency scanning, they often target old, unpatched vulns and too often they succeed. Rob Allen shares some of the biggest cases he's seen, what they have in common, and what appsec teams could do better to help them. Too much software still requires custom configuration to make it m…
  continue reading
 
Segment 1: David Brauchler on AI attacks and stopping them David Brauchler says AI red teaming has proven that eliminating prompt injection is a lost cause. And many developers inadvertently introduce serious threat vectors into their applications – risks they must later eliminate before they become ingrained across application stacks. NCC Group’s …
  continue reading
 
What an episode we have for you again this week as we’re going down under and chatting with, 2025 ISC All World Selection with the Bear Creek Express, 2023 University of Newcastle Sportsman of the Year and 2022 WBSC World Cup Champion with the Aussie Steelers, it’s the one and only, Callum Beashel. Like I said, this was such a great episode. We tal…
  continue reading
 
First up is a technical segment on UEFI shells: determining if they contain dangerous functionality that allows attackers to bypass Secure Boot. Then in the security news: Your vulnerability scanner is your weakest link Scams that almost got me The state of EDR is not good You don't need to do that on a phone or Raspberry PI Hash cracking and explo…
  continue reading
 
Still managing compliance in a spreadsheet? Don't have enough time or resources to verify your control or risk posture? And you wonder why you can't get the budget to move your compliance and risk programs forward. Maybe it's time for a different approach. Trevor Horwitz, Founder and CISO at TrustNet joins Business Security Weekly to discuss how th…
  continue reading
 
Loading …
Copyright 2025 | Privacy Policy | Terms of Service | | Copyright
Listen to this show while you explore
Play