Search a title or topic

Over 20 million podcasts, powered by 

Player FM logo
show episodes
 
Artwork

1
Retro Reset

Allen Jenkins and Kyle McCluskey

icon
Unsubscribe
icon
Unsubscribe
Monthly
 
Remember getting stuck in Zelda, only to discover the secret you were missing the next day? Or being jealous of the kid who had Nintendo Power? In the internet age when you get stuck in a game, it's easy to find the solution online. Too easy. On Retro Reset, we're gaming like it's 199X-- no guides, no GameFAQs, no internet. We're resetting our brain console and relearning how to discover the worlds of gaming for ourselves.
  continue reading
 
Artwork

1
The 1776® Community

Brock Fankhauser

icon
Unsubscribe
icon
Unsubscribe
Monthly
 
The 1776® Community is a grass-roots movement combining the elements of American patriotism, the American Dream of home ownership and the founding ideals of The United States of America: Life, Liberty and the Pursuit of Happiness. The movement’s mission is to advance American Patriotism at the zip code level and in new communities and neighborhoods in all 50 states. The 1776® Community is Where Americanism Lives.
  continue reading
 
Artwork

1
Enterprise Security Weekly (Audio)

Security Weekly Productions

icon
Unsubscribe
icon
Unsubscribe
Weekly
 
News, analysis, and insights into enterprise security. We put security vendors under the microscope, and explore the latest trends that can help defenders succeed. Hosted by Adrian Sanabria. Co hosts: Katie Teitler-Santullo, Ayman Elsawah, Jason Wood, Jackie McGuire.
  continue reading
 
Through an intersectional feminist perspective, hosts Anney and Samantha dive into science, history, and culture to make sense of the everyday and unpack the stories that brought us to where we are today. This podcast aims to better understand the challenges facing women and marginalized folks all over the world and highlights the tools we can use to tackle them head on.
  continue reading
 
Artwork
 
Welcome to the Security Weekly Podcast Network, your all-in-one source for the latest in cybersecurity! This feed features a diverse lineup of shows, including Application Security Weekly, Business Security Weekly, Paul's Security Weekly, Enterprise Security Weekly, and Security Weekly News. Whether you're a cybersecurity professional, business leader, or tech enthusiast, we cover all angles of the cybersecurity landscape. Tune in for in-depth panel discussions, expert guest interviews, and ...
  continue reading
 
Amidst all of the conversations about the recruitment of Black educators, where are the discussions about retention? The Exit Interview podcast was created to elevate the stories of Black educators who have been pushed out of the classroom, main or central office. The podcast asks guests to share their education journey, the "last straw" that made them decide to leave education, and, most importantly, what they are doing now that they have left the traditional education sphere.
  continue reading
 
Artwork

1
Remember Reading Podcast

HarperCollins Publishers

icon
Unsubscribe
icon
Unsubscribe
Monthly
 
A family podcast about classic children’s books and the impact they have on us long into adulthood. In each episode, we talk about one popular children's book from the past, uncovering the unique story behind the story. While sitting down with famous, award-winning authors, we investigate the timeless themes in kids’ books.
  continue reading
 
Loading …
show series
 
Two parts to this episode: Tech Segment: Updating Linux Systems - Beyond apt-get upgrade * Custom scripts for ensuring your Linux systems are up-to-date * topgrade - tutorial for using topgrade to update Linux systems on various Linux distributions Discussion Topic: Anti-Malware and/or EDR on Linux Platforms * PCI calls for scanning Linux systems *…
  continue reading
 
During times of volatility, business leaders often don’t know what they are able to change or even what they should change. At precisely these times, business leaders become risk leaders and need to quickly learn how to identify what is within their control and what isn’t — to not only survive but thrive. Alla Valente, Principal Analyst at Forreste…
  continue reading
 
The recent popularity of MCPs is surpassed only by the recent examples deficiencies of their secure design. The most obvious challenge is how MCPs, and many more general LLM use cases, have erased two decades of security principles behind separating code and data. We take a look at how developers are using LLMs to generate code and continue our sea…
  continue reading
 
Segment 1 CTG Interview Middle market companies face unique challenges in the ever-evolving cyber environment. Developing a comprehensive cybersecurity approach is a business imperative for middle market companies, and Chad Alessi will discuss the threat landscape, what’s keeping IT decision-makers awkward at night, and the best approach to creatin…
  continue reading
 
Segment 1 CTG Interview Middle market companies face unique challenges in the ever-evolving cyber environment. Developing a comprehensive cybersecurity approach is a business imperative for middle market companies, and Chad Alessi will discuss the threat landscape, what’s keeping IT decision-makers awkward at night, and the best approach to creatin…
  continue reading
 
In the security news: Vicious Trap - The malware hiding in your router Hacking your car WSL is open-source, but why? Using AI to find vulnerabilities - a case study Why you should not build your own password manager The inside scoop behind Lumma Infostealer Hacking a smart grill Hardcoded credentials on end of life routers and "Alphanetworks" SIM s…
  continue reading
 
This segment explores how automated microsegmentation addresses critical Zero Trust gaps overlooked by traditional access controls and legacy segmentation solutions. We'll examine the limitations of perimeter-based defenses in today's dynamic threat landscape and reveal how automated microsegmentation enhances network security beyond conventional f…
  continue reading
 
What happens when a Black educator survives a natural disaster, a political awakening, and a broken school systemall in the same year? In this deeply moving episode of The Exit Interview, Colorado State Representative Jennifer Bacon recounts how her early teaching career in New Orleans during Hurricane Katrina became a catalyst for her journey into…
  continue reading
 
ArmorCode unveils Anya—the first agentic AI virtual security champion designed specifically for AppSec and product security teams. Anya brings together conversation and context to help AppSec, developers and security teams cut through the noise, prioritize risks, and make faster, smarter decisions across code, cloud, and infrastructure. Built into …
  continue reading
 
In the post-apocalyptic world of The Last of Us, Marlene fought to find a vaccine, while also looking over her best friend's daughter Ellie from afar. We shine a light on her backstory, her struggles with leadership and depression, and the reasoning behind her decisions in this classic (classic) episode. See omnystudio.com/listener for privacy info…
  continue reading
 
Segment 1: Erik Bloch Interview The math on SOC AI just isn't adding up. It's not easy to do the math, either, as each SOC automation vendor is tackling alert fatigue and SecOps assistants a bit differently. Fortunately for us and our audience, Erik Bloch met with many of these vendors at RSAC and is going to share what he learned with us! Segment …
  continue reading
 
Segment 1: Erik Bloch Interview The math on SOC AI just isn't adding up. It's not easy to do the math, either, as each SOC automation vendor is tackling alert fatigue and SecOps assistants a bit differently. Fortunately for us and our audience, Erik Bloch met with many of these vendors at RSAC and is going to share what he learned with us! Segment …
  continue reading
 
This week in the security news: Malware-laced printer drivers Unicode steganography Rhode Island may sue Deloitte for breach. They may even win. Japan's active cyber defense law Stop with the ping LLMs replace Stack Overflow - ya don't say? Aggravated identity theft is aggravating Ivanti DSM and why you shouldn't use it EDR is still playing cat and…
  continue reading
 
Olivia of the women's history podcast What'sHerName joins us to discuss two fascinating women you might never have heard of, Harriet Jacobs and Nur Jahan. Get ready for astounding tales of extreme self-isolation, tiger queens and resilience in this classic episode. See omnystudio.com/listener for privacy information.…
  continue reading
 
In the leadership and communications section, Why Every CISO Should Be Gunning For A Seat At The Board Table, The Innovation We Need is Strategic, Not Technical , The Best Leaders Ask the Right Questions, and more! This segment is sponsored by Fortra. Visit https://securityweekly.com/fortrarsac to learn more about them! Fortra is successfully reduc…
  continue reading
 
Loading …
Copyright 2025 | Privacy Policy | Terms of Service | | Copyright
Listen to this show while you explore
Play