A deep dive into the science of muscle growth. Hosted by Chris Beardsley and Jake Doleschal, this podcast explores hypertrophy training through the lens of pre-steroid era bodybuilding and modern muscle physiology.
…
continue reading
Chris Beardsley Podcasts
Hosted by Ally Beardsley and Babette Thomas, Gender Spiral is a quest to explore the modern experience of being a human in our gendered world. Each episode of the podcast explores important topics and questions about navigating expectations of gender and presentation in our society through conversations with the foremost experts on the topic: trans and queer people. You'll hear firsthand accounts of gender variant folks of all stripes and walks of life, to highlight the liberation of questio ...
…
continue reading
SPONTANEANATION WITH PAUL F. TOMPKINS is a completely improvised show, from monologue to interview to narrative sketch. Join Paul, his special guests, his incredibly talented improviser friends, and accompanist Eban Schletter for an hour of comedy that none of them ever see coming.
…
continue reading
Raise your Income, investments, and life to the next level! Do you want to live life on your own terms? Financially independent people have assets that generate income greater than their expenses. We explore ways how people have increased their income and net worth to achieve financial independence (and how you can too).
…
continue reading
Welcome to the Security Weekly Podcast Network, your all-in-one source for the latest in cybersecurity! This feed features a diverse lineup of shows, including Application Security Weekly, Business Security Weekly, Paul's Security Weekly, Enterprise Security Weekly, and Security Weekly News. Whether you're a cybersecurity professional, business leader, or tech enthusiast, we cover all angles of the cybersecurity landscape. Tune in for in-depth panel discussions, expert guest interviews, and ...
…
continue reading

1
Ballistic Hot Dogs, Clayrat, Twonet, Lockbit, Resumes, Discord, Aaran Leyland and... - SWN #519
31:50
31:50
Play later
Play later
Lists
Like
Liked
31:50Ballistic Hot Dogs, Sonicwall, Clayrat, Twonet, Lockbit, Breachforums, Resumes, Discord, Aaran Leyland, and More on this edition of the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-519
…
continue reading

1
IoT Hacks Galore - Kieran Human - PSW #895
2:09:14
2:09:14
Play later
Play later
Lists
Like
Liked
2:09:14This week we kick things off with a special interview: Kieran Human from Threat Locker talks about EDR bypasses and other special projects. In the security news: Hacking TVs Flushable wipes are not the only problem People just want to spy on their pets, except the devices can be hacked Linux EDR is for the birds What does my hat say we love exploit…
…
continue reading

1
Forrester's Global Cybersecurity Market Forecast Before AI Fully Kicks In - Merritt Maxim - BSW #416
52:51
52:51
Play later
Play later
Lists
Like
Liked
52:51Global spending on cybersecurity products and services will see a strong 14.4% CAGR from 2024 through 2029 and will hit $302.5 billion in 2029, driven by continued concerns around cyberattacks across all verticals and geographies. But where is the spending occuring and how do you prepare? Merritt Maxim, VP & Research Director at Forrester, joins Bu…
…
continue reading

1
Bad Crypto, Zombie CPUs, Y2K38,Park Mobile, Redis, Red Hat, Deloitte, Aaran Leyland.. - SWN #518
28:47
28:47
Play later
Play later
Lists
Like
Liked
28:47
…
continue reading

1
Next Level 276: What are the safest asset classes in today's market? With Paul Moore
41:41
41:41
Play later
Play later
Lists
Like
Liked
41:41By Next-Level Income
…
continue reading

51
Finding Large Bounties with Large Language Models - Nico Waisman - ASW #351
53:52
53:52
Play later
Play later
Lists
Like
Liked
53:52
…
continue reading

1
Community Care in the Catskills (w/ Kamra Hakim)
54:33
54:33
Play later
Play later
Lists
Like
Liked
54:33
…
continue reading

1
AI & IAM: Where Security Gets Superhuman (Or Supremely Stuck) - Matt Immler, Heather Ceylan, Alexander Makarov, Nitin Raina, Dor Fledel, Aaron Parecki - ESW #427
1:34:04
1:34:04
Play later
Play later
Lists
Like
Liked
1:34:04At Oktane 2025, leaders from across the security ecosystem shared how identity has become the new front line in protecting today’s AI-driven enterprises. As SaaS adoption accelerates and AI agents proliferate, organizations face an explosion of human and non-human identities—and with it, growing risks like misconfigured access, orphaned accounts, a…
…
continue reading

1
020 How to program a muscle specialisation phase
1:21:08
1:21:08
Play later
Play later
Lists
Like
Liked
1:21:08In this episode of Hypertrophy: Past and Present, Jake and Chris use Peary Rader’s leg routine to outline a practical, physiology-led blueprint for muscle specialisation. Key topics include: Peary Rader’s pre-steroid era leg routine (and the changes we would make today) A framework for designing a muscle specialisation phase for any muscle When to …
…
continue reading

1
Ratboi, Clop, Oracle, svgs, Impact Solutions, The Pentagon, Open AI, Josh Marpet... - SWN #517
30:34
30:34
Play later
Play later
Lists
Like
Liked
30:34Ratboi, Clop, Oracle, svgs, Impact Solutions, The Pentagon, Open AI, Josh Marpet, and More on this edition of the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-517
…
continue reading

1
AI: The new trigger word. Or is it Robots? - PSW #894
2:04:32
2:04:32
Play later
Play later
Lists
Like
Liked
2:04:32In addition to some fun news, we get a Mary Ann Davidson as a surprise guest. We even get a great quote from her of "You're never going to have enough cybersecurity people to defend what was never built to be defensible.". Visit https://www.securityweekly.com/psw for all the latest episodes! Show Notes: https://securityweekly.com/psw-894…
…
continue reading

1
Future Forward: CIO 2025 Outlook - Cybersecurity, AI, and Economic Uncertainty? - Amanda Jack - BSW #415
55:15
55:15
Play later
Play later
Lists
Like
Liked
55:15More than four out of ten (41%) Chief Information Officers (CIOs) report cybersecurity as their top concern, yet these same leaders are simultaneously increasing security budgets (77%), expanding cloud infrastructure (68%), and accelerating artificial intelligence (AI) capabilities (67%). According to the new Future Forward: CIO 2025 Outlook report…
…
continue reading

1
Attica, Crustacean Porn, Broadcom, William of Ockham, Jaguar, SVG, Aaran Leyland... - SWN #516
31:22
31:22
Play later
Play later
Lists
Like
Liked
31:22Attica, Crustacean Porn, Broadcom, William of Ockham, Jaguar, SVG, Aaran Leyland, and more on the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-516
…
continue reading

1
Changing the Vuln Conversation from Volume to Remediation - Francesco Cipollone - ASW #350
1:14:32
1:14:32
Play later
Play later
Lists
Like
Liked
1:14:32Dealing with vulns tends to be a discussion about prioritization. After all, there a tons of CVEs and dependencies with known vulns. It's important to figure out how to present developers with useful vuln info that doesn't overwhelm them. Francesco Cipollone shares how to redirect that discussion to focus on remediation and how to incorporate LLMs …
…
continue reading

1
Next Level 275: How to hit Q4 running to finish 2025 STRONG!
11:21
11:21
Play later
Play later
Lists
Like
Liked
11:21Struggling to hit your goals? Learn how to create a 3-year vision, set SMART goals, and reclaim 20–40 hours a week with high-performance coach Chris Larsen. Discover powerful productivity strategies, weekly planning habits, and personal development tools to help you achieve financial freedom and live your best life. Perfect for entrepreneurs, profe…
…
continue reading

1
Live interviews from Oktane 2025: threats, AI in apps, and AI in cybersecurity tools - Brett Winterford, Shiv Ramji, Damon McDougald - ESW #426
1:35:13
1:35:13
Play later
Play later
Lists
Like
Liked
1:35:13How identity security can keep pace with the evolving threat landscape, with Brett Winterford Today’s threat landscape has never been more complex. Malicious actors are leveraging tools like generative AI to develop more creative social engineering attacks that can have serious ramifications for businesses. Brett Winterford, VP of Okta Threat Intel…
…
continue reading

1
019 Cluster Sets – How they work and how to use them
1:21:18
1:21:18
Play later
Play later
Lists
Like
Liked
1:21:18In this episode of Hypertrophy: Past and Present, Jake and Chris start by discussing one of the most widely used methods of the Silver Era; the 20 rep squat. They then dive into the physiology of cluster sets: what they are, how they differ from rest-pause and drop sets, and how cluster sets can be programmed to offer benefits over traditional stra…
…
continue reading

1
Riker's Curse, River City, EDR-Freeze, MCP, WordPress, GitHub, Josh Marpet, and More. - SWN #515
30:49
30:49
Play later
Play later
Lists
Like
Liked
30:49Riker's Curse, River City, EDR-Freeze, MCP, WordPress, GitHub, Josh Marpet, and More, on this edition of the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-515
…
continue reading

1
Broadcom, LastPass, SEO Poisoning, QR codes, H1B visas, Distributed Computing... - PSW #893
1:03:06
1:03:06
Play later
Play later
Lists
Like
Liked
1:03:06Broadcom, LastPass, Brickstone, SEO Poisoning, QR codes, H1B visas, Distributed Computing, and More... Visit https://www.securityweekly.com/psw for all the latest episodes! Show Notes: https://securityweekly.com/psw-893
…
continue reading

1
Rearchitecting Systems for Privacy as AI Agents Force You to Rethink Security - Guillaume Jaulerry - BSW #414
1:02:20
1:02:20
Play later
Play later
Lists
Like
Liked
1:02:20As AI and cloud-based services power our connected world, individuals are facing an unprecedented privacy crisis. With more than 2.3 billion people entrusting their data to the cloud and centralized servers, cyberattacks, data breaches, surveillance, identity theft, and privacy threats are now everyday risks. How do we protect against these threats…
…
continue reading

1
Uhura, Collins, Nimbus Manticore, Sonic Wall, Async Rat, Solar Winds, Aaran Leyland.. - SWN #514
29:42
29:42
Play later
Play later
Lists
Like
Liked
29:42Uhura, Collins, Nimbus Manticore, Sonic Wall, Async Rat, Solar Winds, ShadowV2, H1B, Aaran Leyland, and more on the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-514
…
continue reading

1
Design Errors in Entra ID, Design Defenses in iOS, Design Difficulties in DeepSeek - ASW #349
58:43
58:43
Play later
Play later
Lists
Like
Liked
58:43In the news, Microsoft encounters a new cascade of avoidable errors with Entra ID, Apple improves iOS with hardware-backed memory safety, DeepSeek demonstrates the difficulty in reviewing models, curl reduces risk by eliminating code, preserving the context of code reviews, and more! Visit https://www.securityweekly.com/asw for all the latest episo…
…
continue reading

1
Next Level 274: The Future of Real Estate and Where We Are In the Market Cycle with “Big” Mike Zlotnik
32:02
32:02
Play later
Play later
Lists
Like
Liked
32:02Discover how chess, taekwondo, and data-driven strategies shape smart real estate investing with fund manager Mike Zlotnik. Learn about cap rates, interest rate forecasts, and building a buy box to navigate today’s market. Featured on the Next Level Income podcast with Chris Larsen. Perfect for fans of BiggerPockets and Warren Buffett investing wis…
…
continue reading
Twitter-queen-turned-fiction-novelist Rose Dommu talks about her new book Best Woman: a family drama Trojan-horsed into a rom-com loosely based on Rose's personal experiences. We also get her opinions about DIY hormone cocktails, bleaching your way out of a crisis, and what Fire Island is really like for trans folks. Best Woman is out NOW! Get your…
…
continue reading

1
018 Pauses, Stretching, and Partials
1:24:22
1:24:22
Play later
Play later
Lists
Like
Liked
1:24:22In this episode of Hypertrophy: Past and Present, Jake and Chris unpack Reg Park’s calf-specialisation phase before discussing the physiology of pauses: when they work, when they don’t, and how they compare to partial reps. Key topics include: • Reg Park’s 1952 calf-specialisation program • Straight-leg vs bent-leg calf work and how they bias gastr…
…
continue reading

1
Disruption is Coming for the Vulnerability Management Market - Tod Beardsley - ESW #425
1:47:15
1:47:15
Play later
Play later
Lists
Like
Liked
1:47:15Interview with Tod Beardsley This interview is sponsored by runZero. Legacy vulnerability management (VM) hasn't innovated alongside of attackers, and it shows. Let's talk about the state of VM. Check out https://securityweekly.com/runzero to learn more! Topic Segment: NPM Incidents In this week’s topic segment, we’re discussing all the NPM supply …
…
continue reading

1
CrowdStrike's AI Innovations in Cyber Defense - SWN #513
37:15
37:15
Play later
Play later
Lists
Like
Liked
37:15In this episode of Security Weekly News, Joshua Marpet and Aaran Leyland discuss the latest trends in AI and cybersecurity, focusing on innovations from CrowdStrike, the implications of new cyber incident reporting rules, and the evolving landscape of ransomware. They explore the role of AI in enhancing security measures, the challenges posed by ma…
…
continue reading

1
Safes, Hackers, and Web Servers - PSW #892
2:12:25
2:12:25
Play later
Play later
Lists
Like
Liked
2:12:25This week's technical segment is all about the T-Lora Pager from Lilygo, and really cool Meshtastic device that can also be used for some hacking tasks! In the security news: Your safe is not safe Cisco ASA devices are under attack VMScape HybridPetya and UEFI attacks in the wild Eveything is a Linux terminal Hackers turns 30 Hosting websites on di…
…
continue reading

1
Board Priority But Lack of Access & CISO Pressure, 360 Privacy and Pentera Interviews - Chuck Randolph, Tom Pore - BSW #413
1:10:10
1:10:10
Play later
Play later
Lists
Like
Liked
1:10:10In the leadership and communications segment, Lack of board access: The No. 1 factor for CISO dissatisfaction, Pressure on CISOs to stay silent about security incidents growing, The Secret to Building a High-Performing Team, and more! Jackie McGuire sits down with Chuck Randolph, SVP of Strategic Intelligence & Security at 360 Privacy, for a grippi…
…
continue reading

1
AI Nuns, Steganography, You're fired, VoidProxy, C++, Carplay Apriso, Josh Marpet... - SWN #512
34:29
34:29
Play later
Play later
Lists
Like
Liked
34:29AI Nuns, Steganography, You're fired, VoidProxy, C++, Carplay Apriso, Josh Marpet, and more on the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-512
…
continue reading

1
How OWASP's GenAI Security Project keeps up with the pace of AI/Agentic changes - Scott Clinton - ASW #348
1:08:00
1:08:00
Play later
Play later
Lists
Like
Liked
1:08:00This week, we chat with Scott Clinton, board member and co-chain of the OWASP GenAI Security Project. This project has become a massive organization within OWASP with hundreds of volunteers and thousands of contributors. This team has been cranking out new tools, reports and guidance for practitioners month after month for over a year now. We start…
…
continue reading

1
Gender Spiral LIVE in Chicago! (Night 2 w/ Irregular Girl & Mari De La Rua AKA Stephanie)
1:18:54
1:18:54
Play later
Play later
Lists
Like
Liked
1:18:54Missed us in Chicago? NEVER FEAR, THE RECORDING IS HERE! Two Chicago drag ICONS joined us for night 2 of our weekend at iO Theater in May. Irregular Girl and Mari De La Rua (AKA Stephanie) tell us about being in a drag family, how drag informed their gender identities, and why drag would suck without trans women. Find our incredible guests on Insta…
…
continue reading

1
Forrester's AEGIS Framework, the weekly news, and interviews with Fortra and Island - Jeff Pollard, Rohit Dhamankar, Michael Leland - ESW #424
1:40:37
1:40:37
Play later
Play later
Lists
Like
Liked
1:40:37Segment 1 - Interview with Jeff Pollard Introducing Forrester’s AEGIS Framework: Agentic AI Enterprise Guardrails For Information Security For this episode’s interview, we’re talking to Forrester analyst Jeff Pollard. I’m pulling this segment’s description directly from the report’s executive summary, which I think says it best: As AI agents and ag…
…
continue reading

1
017 Exercise Selection - How to pick the exercises needed to maximally develop a muscle
1:22:27
1:22:27
Play later
Play later
Lists
Like
Liked
1:22:27In this episode of Hypertrophy: Past and Present, Jake and Chris discuss Sig Klein’s extensive routine and use it as a springboard to tackle one of the biggest programming questions: how much exercise variety do you really need for maximal growth? Key topics include: How neuromechanical matching explains which motor units get recruited first Volunt…
…
continue reading

1
Diella, Texas, Movie Rip Offs, WAF, AdaptixC2, Nano11, and More... - SWN #511
33:44
33:44
Play later
Play later
Lists
Like
Liked
33:44Diella, Texas, Movie Rip Offs, WAF, AdaptixC2, Nano11, and More, on this edition of the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-511
…
continue reading
This week: Americans Can't Hack It Copy and paste to get malware Pixel 5 web servers - because you can How they got in and why security is hard Vulnerability management is failing - is it dead yet? Exploiting hacker tools Bluetooth spending spree! How to defend your car IoT security solutions and other such lies Exploiting IBM i (formerly AS/400) V…
…
continue reading

1
Forrester 2026 Budget Planning Guide and BlackHat 2025 Interviews - Jess Burn, Matt Muller, Danny Jenkins - BSW #412
1:11:11
1:11:11
Play later
Play later
Lists
Like
Liked
1:11:11With volatility now the norm, security and risk leaders need practical guidance on managing existing spending and new budgetary necessities. Where should they look? Jess Burn, Principal Analyst at Forrester Research, joins Business Security Weekly to discuss Forrester's Budget Planning Guide 2026: Security And Risk. This data-and-insights-driven re…
…
continue reading

1
Hellhounds, Anthropic, iCloud, NPM, gitforked, notdoor, TOR, Signal, Josh Marpet - SWN #510
32:42
32:42
Play later
Play later
Lists
Like
Liked
32:42AI Hellhounds, Anthropic, iCloud, NPM, gitforked, notdoor, TOR, Signal, WhatsApp, Josh Marpet, and more on the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-510
…
continue reading

1
Limitations and Liabilities of LLM Coding - Seemant Sehgal, Ted Shorter - ASW #347
1:17:09
1:17:09
Play later
Play later
Lists
Like
Liked
1:17:09Up first, the ASW news of the week. At Black Hat 2025, Doug White interviews Ted Shorter, CTO of Keyfactor, about the quantum revolution already knocking on cybersecurity’s door. They discuss the terrifying reality of quantum computing’s power to break RSA and ECC encryption—the very foundations of modern digital life. With 2030 set as the deadline…
…
continue reading

1
Next Level 272: How Franchises Can Lead to Financial Independence with Kim Daly
35:22
35:22
Play later
Play later
Lists
Like
Liked
35:22Discover how franchising can be a powerful path to financial freedom with franchise expert Kim Daly. Learn how to invest in a franchise, build passive income, and shift your mindset to create wealth. Featuring insights on alternative investing, entrepreneurship, and semi-absentee franchise ownership. Check out our website: www.nextlevelincome.com. …
…
continue reading

1
A Baby? In This Economy? (w/ Cass Adair)
1:07:43
1:07:43
Play later
Play later
Lists
Like
Liked
1:07:43We're continuing the thread on trans & queer parents in a conversation with scholar, writer, audio producer Cassius (Cass) Adair. He tells us about transitioning in the early days of Tumblr, getting baby fever in his late 20s, and the nitty-gritty of pregnancy and parenting as a trans dad in Minnesota. Check out Cass's work at his website cassiusad…
…
continue reading

1
Ransomware, Agentic AI, and Supply Chain Risks: Insights from Black Hat 2025 - HD Moore, Jason Passwaters, J.J. Guy, Theresa Lanowitz, Mickey Bresman, Yuval Wollman, Jawahar “Jawa” Sivasankaran - ESW ...
2:06:06
2:06:06
Play later
Play later
Lists
Like
Liked
2:06:06Doug White sits down with Theresa Lanowitz, Chief Evangelist at LevelBlue, for a powerful and timely conversation about one of cybersecurity’s most pressing threats: the software supply chain. Theresa shares fresh insights from LevelBlue’s global research involving 1,500 cybersecurity professionals across 16 countries. Together, they unpack the rea…
…
continue reading

1
016 Training Splits - Why upper/lower, torso/limbs, push/pull, and other split routines face the same problem
1:14:16
1:14:16
Play later
Play later
Lists
Like
Liked
1:14:16In this episode of Hypertrophy: Past and Present, Jake and Chris revisit Joe Weider’s early 1940 full-body program before breaking down the central problem that all split routines face: supraspinal CNS fatigue. Key topics include: • How calcium-ion–related fatigue and inflammation create global CNS fatigue • Why back-to-back training days reduce re…
…
continue reading

1
AI Trolley Problems, Rhode Island Drivers, and Kohlbergian Post Conventionalism - SWN #509
40:58
40:58
Play later
Play later
Lists
Like
Liked
40:58Josh Marpet and Doug White talk about AI Ethics, Issues, and Compliance. AI Trolley problems, Rhode Island Drivers, and Post Conventionalism. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-509
…
continue reading

1
Lasagna DoS, AI Slop, Hacker Ultimatums - PSW #890
2:04:36
2:04:36
Play later
Play later
Lists
Like
Liked
2:04:36In the secure news: Automakers respond to Flipper Zero attacks More on the unconfirmed Elastic EDR 0-Day When Secure Boot does its job too well Crazy authenitcation bypass Hacker ultimatums AI Slop Impatient hackers Linux ISOs are malware Attackers love drivers Hacking Amazon's Eero, the hard way Exploits will continue until security improves The S…
…
continue reading

1
Security Money: The Index Dips and 20 Years of Cybersecurity Consolidation - Ross Haleliuk - BSW #411
1:04:12
1:04:12
Play later
Play later
Lists
Like
Liked
1:04:12The cybersecurity industry is undergoing a consolidation wave that is moving far faster than many realize. This isn’t at all about CISOs wanting fewer tools as much as some would like to think - the changes are happening at the macro level. Ross Haleliuk joins BSW to present the most comprehensive illustration ever made of how our industry has cons…
…
continue reading

1
Rinoa Poison, Scambaiter Extraordinaire - Rinoa Poison - SWN #508
33:29
33:29
Play later
Play later
Lists
Like
Liked
33:29I talk to Rinoa Poison about scambaiting, identity, and all sorts of things. Check it out. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-508
…
continue reading

1
Next Level 271: How to Buy and Structure Notes Dan Deppen
27:32
27:32
Play later
Play later
Lists
Like
Liked
27:32Learn how to invest in mortgage notes, create seller-financed deals, and build passive income like a bank. Dan Deppen joins Chris Larsen to break down note investing, Dodd-Frank compliance, and creative real estate strategies in today’s high-rate market. Check out our website: www.nextlevelincome.com. Follow us on social media @thenextlevelincomesh…
…
continue reading

1
AI, APIs, and the Next Cyber Battleground: Black Hat 2025 - Chris Boehm, Idan Plotnik, Josh Lemos, Michael Callahan - ASW #346
1:08:11
1:08:11
Play later
Play later
Lists
Like
Liked
1:08:11In this must-see BlackHat 2025 interview, Doug White sits down with Michael Callahan, CMO at Salt Security, for a high-stakes conversation about Agentic AI, Model Context Protocol (MCP) servers, and the massive API security risks reshaping the cyber landscape. Broadcast live from the CyberRisk TV studio at Mandalay Bay, Las Vegas, the discussion pu…
…
continue reading

1
Dave Lewis talks M&A due diligence, TBD topic, the weekly news - Dave Lewis - ESW #422
1:46:21
1:46:21
Play later
Play later
Lists
Like
Liked
1:46:21Interview with Dave Lewis on Security's Role in M&A Due Diligence In this episode, Dave Lewis from 1Password discusses the critical importance of security in mergers and acquisitions, from due diligence through integration. He explores common pitfalls, essential security assessments, and practical strategies for security leaders to protect organiza…
…
continue reading