All Hands on Tech, hosted by Eilish and Greg, brings together Nova Scotia’s tech community to uncover the secrets of what makes our province the best place for collaboration, innovation, and growth. Each episode hear from local digital experts as we dive into all of the amazing things happening in Nova Scotia’s fastest-growing sector and learn why so many organizations and individuals are calling Canada’s Ocean Playground home. All Hands on Tech is proudly produced by Digital Nova Scotia (DN ...
…
continue reading
Digital Nova Scotia Podcasts
Come chat with Meggan & Jenn about travel planning, travel tips & tricks, and travel fails every week. Don’t forget your travel mug!
…
continue reading
In a media climate dominated by digital voices and one-sided relationships between creators and audiences, trust in podcasting has become one of the most urgent conversations of our time. On June 19, 2025, Halifax will host Echo Podcast Summit, the largest podcast event Atlantic Canada has ever seen, bringing together global leaders, creators, and critical thinkers to explore the future of trust in media. Brought to you by Halifax-based podcast strategy company Podstarter and global podcasti ...
…
continue reading
Welcome to the Security Weekly Podcast Network, your all-in-one source for the latest in cybersecurity! This feed features a diverse lineup of shows, including Application Security Weekly, Business Security Weekly, Paul's Security Weekly, Enterprise Security Weekly, and Security Weekly News. Whether you're a cybersecurity professional, business leader, or tech enthusiast, we cover all angles of the cybersecurity landscape. Tune in for in-depth panel discussions, expert guest interviews, and ...
…
continue reading
Made in Canada. What if work wasn’t something you had to survive? What if it could be truly human—designed to meet the needs of real people, not just systems? These are not just questions. It’s an ethic. A provocation. An insistence that how we design work shapes real lives and futures. Because for too many people—even with all the talk of flexibility and hybrid—work still isn’t working. It burns people out, rebuilds old hierarchies in new packaging, and too often ignores the deeply human ne ...
…
continue reading

1
GoSecure: Cyber Careers Decoded - SOCs, Threat Hunting & How to Get In
30:52
30:52
Play later
Play later
Lists
Like
Liked
30:52Ever wondered what really goes on inside a Security Operations Center (SOC)? In this episode, host, Claire Quirion chats with Derek Halfyard from GoSecure about his journey from NSCC to leading threat hunts and helping clients stay safe around the clock. We break down what a SOC is, who works there, what roles like threat hunters and detection engi…
…
continue reading

1
Tapjacking, ZuChe, PerfektBlue, McHacking, OT in the IT, Add Ons, Josh Marpet... - SWN #493
33:42
33:42
Play later
Play later
Lists
Like
Liked
33:42Tapjacking, ZuChe, PerfektBlue, McHacking, OT in the IT, Add Ons, Josh Marpet, and More on this episode of the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-493
…
continue reading

1
Citrixbleed 2, Hardware Hacking, and Failed Bans - PSW #882
2:06:05
2:06:05
Play later
Play later
Lists
Like
Liked
2:06:05This week in the security news: Citrixbleed 2 and so many failures Ruckus leads the way on how not to handle vulnerabilities When you have no egress Applocker bypass So you bought earbuds from TikTok More gadgets and the crazy radio Cheap drones and android apps Best Mario Kart controller ever VSCode: You're forked Bluetooth earbuds and vulnerabili…
…
continue reading

1
SolarWinds Settlement, Upgrade Your Leadership Instincts to Build Your Legacy - BSW #403
51:58
51:58
Play later
Play later
Lists
Like
Liked
51:58SEC settles with SolarWinds. We react! In the leadership and communications section, The Skills and Habits Aspiring CEOs Need to Build, Why People Really Quit — And How Great Managers Make Them Want to Stay, The Small Actions That Become Your Legacy, and more! Visit https://www.securityweekly.com/bsw for all the latest episodes! Show Notes: https:/…
…
continue reading

1
Spying on your kids, Bank Robberies, Qantas, LOTL, sudo, Hunters, Aaran Leyland... - SWN #492
33:26
33:26
Play later
Play later
Lists
Like
Liked
33:26Spying on your kids, Bank Robberies, Qantas, LOTL, sudo, Hunters, Aaran Leyland, and more on the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-492
…
continue reading

1
Checking in on the State of Appsec in 2025 - Janet Worthington, Sandy Carielli - ASW #338
1:07:15
1:07:15
Play later
Play later
Lists
Like
Liked
1:07:15Appsec still deals with ancient vulns like SQL injection and XSS. And now LLMs are generating code along side humans. Sandy Carielli and Janet Worthington join us once again to discuss what all this new code means for appsec practices. On a positive note, the prevalence of those ancient vulns seems to be diminishing, but the rising use of LLMs is e…
…
continue reading

1
Avoid These Common Travel Scams - Travel Tip Tuesday
9:40
9:40
Play later
Play later
Lists
Like
Liked
9:40Meggan shares some common travel scams she came across while planning her next trip. Unfortunately, we all need to be aware of our surroundings in order to stay safe while traveling Support the Travel Mug Podcast by buying us a coffee! You’ll make our day & you’ll get access to fun stuff like bloopers and extra content. We have Merch! Shop the Trav…
…
continue reading

1
Identity, AI & Access: Highlights from Identiverse 2025 - Sagi Rodin, Ajay Amlani, Treb Ryan, Ajay Gupta, Artyom Poghosyan, Amir Ofek - ESW #414
1:49:38
1:49:38
Play later
Play later
Lists
Like
Liked
1:49:38Single Sign On (SSO) and Multi Factor Authentication (MFA) is critical to secure operations for companies of all sizes. Why is the foundation of cybersecurity still locked behind enterprise licensing? Single Sign-On (SSO) and Multi-Factor Authentication (MFA) are essential—not optional—for protecting modern businesses. But today, these critical too…
…
continue reading

1
North Korea, ransomware, social engineering, AI, Apple, Drugs & Iran - SWN #491
28:50
28:50
Play later
Play later
Lists
Like
Liked
28:50North Korea, ransomware, social engineering, AI, Apple, Drugs & Iran on this edition of the Security Weekly News! Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-491
…
continue reading

1
Exploring Meshtastic and LoRa Mesh Networks - Rob Allen - PSW #881
1:08:14
1:08:14
Play later
Play later
Lists
Like
Liked
1:08:14This week, we dive into the world of Meshtastic and LoRa—two technologies empowering secure, long-range, and infrastructure-free communication. We'll talk about the origins of Meshtastic, how LoRa radio works, and why mesh networking is revolutionizing off-grid messaging for adventurers, hackers, emergency responders, and privacy advocates alike. W…
…
continue reading

1
The Value of Zero Trust - Rob Allen - BSW #402
32:29
32:29
Play later
Play later
Lists
Like
Liked
32:29New research estimates the value of Zero Trust. Using the Marsh McLennan Cyber Risk Intelligence Center’s proprietary cyber losses dataset from the past eight years, researchers estimated that overall cyber losses could have been potentially reduced by up to 31% had the organizations widely deployed zero-trust security. This adds up to a projected …
…
continue reading
Do you get anxious before you travel? Maybe you're worried about packing, getting lost, missing your flight, or forgetting your passport. We dive into some common travel day anxieties and how we can help overcome them! Support the Travel Mug Podcast by buying us a coffee! You’ll make our day & you’ll get access to fun stuff like bloopers and extra …
…
continue reading

1
Sony, Scattered Spider, Hikvision, Cybercrime, Iran, BSODs, Cloudflare, Josh Marpet.. - SWN #490
31:11
31:11
Play later
Play later
Lists
Like
Liked
31:11Sony, Scattered Spider, Hikvision, Cybercrime, Iran, BSODs, Cloudflare, Josh Marpet, and more on the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-490
…
continue reading

1
Simple Patterns for Complex Secure Code Reviews - Louis Nyffenegger - ASW #337
38:26
38:26
Play later
Play later
Lists
Like
Liked
38:26Manual secure code reviews can be tedious and time intensive if you're just going through checklists. There's plenty of room for linters and compilers and all the grep-like tools to find flaws. Louis Nyffenegger describes the steps of a successful code review process. It's a process that starts with understanding code, which can even benefit from a…
…
continue reading

1
Konnekt Digital Engagement: Supporting the Evolution of Local Tech
31:16
31:16
Play later
Play later
Lists
Like
Liked
31:16In this episode of All Hands on Tech, host Claire Quirion welcomes Jeff MacArthur, CEO of Konnekt Digital Engagement and a longtime leader in Atlantic Canada’s tech industry. With over a decade of involvement in the Digital Nova Scotia tech community, including service on the Board of Directors, Jeff shares his insights on the evolving local tech s…
…
continue reading

1
The Illusion of Control: Shadow IT, SSO Shortcomings, and the True Path to Security - Dave Lewis - ESW #413
1:52:05
1:52:05
Play later
Play later
Lists
Like
Liked
1:52:05Interview with Dave Lewis Organizations believe they have a firm grip on security with SSO and corporate IT policies, but in reality, shadow IT lurks in the background—expanding attack surfaces and exposing sensitive data. Employees bypass security controls for the sake of convenience, while SSO fails to provide the comprehensive security net organ…
…
continue reading

1
Broadcom, Direct Send, N0auth, UNFI, Cisco, Oneclik, Russ Beauchemin, and more... - SWN #489
31:28
31:28
Play later
Play later
Lists
Like
Liked
31:28Broadcom is coming for you, Direct Send, N0auth, UNFI, Cisco, Oneclik, Russ Beauchemin, and More on this episode of the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-489
…
continue reading

1
Is Vuln Management Dead? - HD Moore - PSW #880
2:16:08
2:16:08
Play later
Play later
Lists
Like
Liked
2:16:08This conversation explores the intersection of cybersecurity and emerging technologies, focusing on innovative hacking techniques, the evolution of vulnerability management, and the critical importance of asset discovery. The discussion also delves into the implications of cyber warfare, the persistent threat of default passwords, and the integrati…
…
continue reading
How personal should journalists go with their audio storytelling? CBC Atlantic Voice host/producer Lindsay Bird joins Luke Quinton, writer/audio producer and host of the CBC Podcast Come By Chance, to discuss first-person pieces, the role of journalists as a guide, and the rules they’re guided by. Lindsay Bird is the producer and host of Atlantic …
…
continue reading
Examining and discussing the unique power and responsibility podcasters hold as modern storytellers. We’ll explore how digital myths emerge and transform into cultural narratives via podcasts and can ultimately shape listeners perception of reality. A short presentation from a digital anthropologist perspective and ample time to discuss an increasi…
…
continue reading
Where does journalism end and branded content begin? In this provocative panel, former journalists pull back the curtain on their transition into the world of branded storytelling. With credibility on the line and truth wearing a new outfit, we explore the ethical grey zones, creative compromises, and surprising opportunities that come with produci…
…
continue reading
Independent voices and digital disruptors are reshaping the way we consume news. In a conversation between veteran Journalist Pauline Dakin and Investigative Podcaster Jordan Bonaparte - We explore the clash between legacy media and outsider journalism. Who holds the power, who earns the public’s trust, and what the future of news looks like in an …
…
continue reading

1
Thriving Through Volatility: Insights for CISOs - Jeff Pollard, Pejman (Pej) Roshan, Deepen Desai - BSW #401
1:05:24
1:05:24
Play later
Play later
Lists
Like
Liked
1:05:24In this episode, Mandy Logan, Summer Craze Fowler, Jason Albuquerque, and Jeff Pollard of Forrester discuss the challenges and strategies for CISOs in navigating volatility in the security landscape. They emphasize the importance of building relationships within the organization, particularly with the CFO, to manage budgets effectively. The convers…
…
continue reading

1
The Rise of Malware: Salt Typhoon and Spark Kitty - SWN #488
35:37
35:37
Play later
Play later
Lists
Like
Liked
35:37In this episode of Security Weekly News, Doug White discusses various cybersecurity threats, including the Salt Typhoon and Spark Kitty malware, the implications of Microsoft's decision to drop support for old hardware drivers, and the potential increase in cyber threats from Iran. The conversation also covers the alarming 16 billion password leak …
…
continue reading
**Podcasting as Leadership and Cultural Stewardship** Podcasting isn’t just a marketing tool for me—it’s a form of leadership and cultural stewardship. I’ve learned since 2021 that holding the mic comes with real ethical responsibility. I’m not just shaping conversations; I’m shaping culture. What I choose to amplify, who I invite, and how I edit a…
…
continue reading

1
How Fuzzing Barcodes Raises the Bar for Secure Code - Artur Cygan - ASW #336
1:01:18
1:01:18
Play later
Play later
Lists
Like
Liked
1:01:18Fuzzing has been one of the most successful ways to improve software quality. And it demonstrates how improving software quality improves security. Artur Cygan shares his experience in building and applying fuzzers to barcode scanners, smart contracts, and just about any code you can imagine. We go through the useful relationship between unit tests…
…
continue reading

1
What is an Open-Jaw Flight? Travel Tip Tuesday
3:48
3:48
Play later
Play later
Lists
Like
Liked
3:48Jenn shares her experience booking open-jaw flight itineraries, and some tips about why and when you might book an open-jaw flight. Support the Travel Mug Podcast by buying us a coffee! You’ll make our day & you’ll get access to fun stuff like bloopers and extra content. We have Merch! Shop the Travel Mug Podcast Store Check out our fav items here:…
…
continue reading

1
Rethinking Identity: IAM, PAM & Passwordless Trends from Identiverse - David Lee, Amit Masand, Chip Hughes, Ashley Stevenson, John Pritchard, Matt Caulfield - ESW #412
1:38:23
1:38:23
Play later
Play later
Lists
Like
Liked
1:38:23In fast-paced, shared device environments like healthcare, manufacturing, and other critical industries, traditional access management approaches are falling short, quietly eroding both security and productivity. This episode explores how outdated methods, like shared credentials and clunky logins, create friction, increase risk, and undermine comp…
…
continue reading

1
Donut Holes, clickfix, rapperbots, bad devs, war, Doug Rants about Backups, and More. - SWN #487
33:37
33:37
Play later
Play later
Lists
Like
Liked
33:37Donut Holes, clickfix, rapperbots, bad devs, war, Doug Rants about Backups, and More on this episode of the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-487
…
continue reading
This week: * The true details around Salt Typhoon are still unknown * The search for a portable pen testing device * Directories named "hacker2" are suspicious * Can a $24 cable compete with a $180 cable? * Hacking Tesla wall chargers * Old Zyxel exploits are new again * Hacking Asus drivers * Stealing KIAs - but not like you may think * Fake artic…
…
continue reading

1
Skills Based Hiring: Is What You Can Do Who You Are?
5:52
5:52
Play later
Play later
Lists
Like
Liked
5:52Summary: Skill-Based Job Setups, AI, Identity, and Team Dynamics 1. AI and Skill Identification in Organizations AI-Driven Talent Management: Organizations are increasingly using AI to analyze employee data, identify hidden skills, and match people to new roles or projects. This helps optimize workforce deployment and supports upskilling initiative…
…
continue reading

1
CISO Cyber Insurance Empowerment - Morey Haber, Peter Hedberg, Stephan Jou - BSW #400
1:03:41
1:03:41
Play later
Play later
Lists
Like
Liked
1:03:41In this episode of Business Security Weekly, Mandy Logan, along with guests Peter Hedberg, Summer Craze Fowler, and Ben Carr, delve into the complexities of cyber insurance and the empowerment of Chief Information Security Officers (CISOs). The discussion covers the evolving landscape of cyber insurance, the critical role of underwriting, and the i…
…
continue reading

1
Beginner's Guide to the Isle of Skye, Scotland
26:00
26:00
Play later
Play later
Lists
Like
Liked
26:00Planning your trip to the magical Isle of Skye in Scotland? We dive into how to get there, getting around the island, what to do, where to eat, and areas to stay in! Episode Resources: isleofskye.com - helpful for planning any of the hikes/walks mentioned in the episode! Rowan Cottage Self Catering - Jenn's accommodations Support the Travel Mug Pod…
…
continue reading

1
AI Zombie Lawyer, Scattered Spider, ASUS, Mainframes, GrayAlpha, Backups, Josh Marpet - SWN #486
36:26
36:26
Play later
Play later
Lists
Like
Liked
36:26AI Zombie Lawyers, Scattered Spider, ASUS, Mainframes, GrayAlpha, Backups, Josh Marpet, and more on the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-486
…
continue reading

1
Threat Modeling With Good Questions and Without Checklists - Farshad Abasi - ASW #335
1:08:00
1:08:00
Play later
Play later
Lists
Like
Liked
1:08:00What makes a threat modeling process effective? Do you need a long list of threat actors? Do you need a long list of terms? What about a short list like STRIDE? Has an effective process ever come out of a list? Farshad Abasi joins our discussion as we explain why the answer to most of those questions is No and describe the kinds of approaches that …
…
continue reading

1
Mobia Technology Innovations: A People-First Approach to Tech
36:22
36:22
Play later
Play later
Lists
Like
Liked
36:22In this exciting episode of All Hands on Tech, host Claire Quirion is joined by Mike Reeves, President and Owner of Mobia Technology Innovations. From cybersecurity to cloud architecture, Mobia's work bridges technical expertise with real-world impact, and all with an east coast edge. Mike discusses Mobia's 40 years of evolution, their "people firs…
…
continue reading

1
Insider threats, migrating away from cloud, RSAC interviews with Cyera and Blumira - Rob Allen, Matthew Warner, Yotam Segev - ESW #411
1:19:04
1:19:04
Play later
Play later
Lists
Like
Liked
1:19:04Segment 1 - Interview with Rob Allen from ThreatLocker This segment is sponsored by ThreatLocker. Visit https://www.securityweekly.com/threatlocker to learn more about them! Segment 2 - Topic: Growing Trend - Edge Computing and Hybrid Cloud Segment 3 - Interviews from RSAC 2025 Cyera Cyera is the fastest-growing data security company in history, em…
…
continue reading

1
$200,000 Zoom Call, Microsoft, Zero-Click, China & HD With $649 million of Bitcoin - SWN #485
28:38
28:38
Play later
Play later
Lists
Like
Liked
28:38This week we have, $200,000 Zoom Call, Microsoft Teams, INTERPOL, Zero-Click, Junk Food, China & Hard Drive With $649 million of Bitcoin. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-485
…
continue reading

1
UEFI Vulnerabilities Galore - PSW #878
2:10:48
2:10:48
Play later
Play later
Lists
Like
Liked
2:10:48This week: You got a Bad box, again Cameras are expose to the Internet EU and connected devices Hydrophobia NVRAM variables Have you heard about IGEL Linux? SSH and more NVRAM AI skeptics are nuts, and AI doesn't make you more efficient Trump Cybersecurity orders I think I can root my Pixel 6 Decentralized Wordpres plugin manager Threat actor namin…
…
continue reading

1
Security Money: The Index is Up, CISOs Need to Get Out, and Are You Burning Out? - BSW #399
56:27
56:27
Play later
Play later
Lists
Like
Liked
56:27This week, it’s time for security money. The index is up, but the previous quarterly results were brutal. In the leadership and communications segment, Get out of the audit committee: Why CISOs need dedicated board time, Quietly Burning Out? What To Do When Your Leadership Starts Lacking, How to rethink leadership to energize disengaged employees, …
…
continue reading

1
Vixen Panda, NPM, Roundcube, IoT, 4Chan, Josh Marpet, and more... - SWN #484
32:23
32:23
Play later
Play later
Lists
Like
Liked
32:23Vixen Panda, NPM, Roundcube, IoT, 4Chan, Josh Marpet, and more on the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-484
…
continue reading

1
Bringing CISA's Secure by Design Principles to OT Systems - Matthew Rogers - ASW #334
1:09:09
1:09:09
Play later
Play later
Lists
Like
Liked
1:09:09CISA has been championing Secure by Design principles. Many of the principles are universal, like adopting MFA and having opinionated defaults that reduce the need for hardening guides. Matthew Rogers talks about how the approach to Secure by Design has to be tailored for Operational Technology (OT) systems. These systems have strict requirements o…
…
continue reading

1
Overcoming Travel Planning Overwhelm - Travel Tip Tuesday
8:12
8:12
Play later
Play later
Lists
Like
Liked
8:12Are you feeling overwhelmed about the thought of planning a trip? Whether you're a newbie or a seasoned trip planner, planning a trip requires a lot of work. Meggan shares some tips to decrease overwhelm so you can head out on your trip without the stress! Support the Travel Mug Podcast by buying us a coffee! You’ll make our day & you’ll get access…
…
continue reading

1
The enterprise security news, more secure by removing credentials, & RSAC interviews - Marty Momdjian, Amit Saha, Dr. Tina Srivastava - ESW #410
1:38:02
1:38:02
Play later
Play later
Lists
Like
Liked
1:38:02Segment 1 - Enterprise Security News, Live at IDV This week, in the enterprise security news, Acquisitions potential IPOs Terminator Salvation in real life First $1B one-employee business? Mikko puts in his notice Pitch Black in real life, and more! Segment 2 - Interview with Dr. Tina Srivastava The #1 cause of data breaches is stolen credentials. …
…
continue reading

1
Elsa, Redline, ChaosRat, iMessage, Bladed Feline , Aaran Leyland, and More... - SWN #483
34:00
34:00
Play later
Play later
Lists
Like
Liked
34:00Elsa, Redline, ChaosRat, iMessage, Bladed Feline , Aaran Leyland, and More on this episode of the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-483
…
continue reading

1
Updating & Protecting Linux Systems - PSW #877
1:05:23
1:05:23
Play later
Play later
Lists
Like
Liked
1:05:23Two parts to this episode: Tech Segment: Updating Linux Systems - Beyond apt-get upgrade * Custom scripts for ensuring your Linux systems are up-to-date * topgrade - tutorial for using topgrade to update Linux systems on various Linux distributions Discussion Topic: Anti-Malware and/or EDR on Linux Platforms * PCI calls for scanning Linux systems *…
…
continue reading

1
Regain Control of Business Risks, Your Leadership Habits, and Being Present - Alla Valente - BSW #398
1:18:17
1:18:17
Play later
Play later
Lists
Like
Liked
1:18:17During times of volatility, business leaders often don’t know what they are able to change or even what they should change. At precisely these times, business leaders become risk leaders and need to quickly learn how to identify what is within their control and what isn’t — to not only survive but thrive. Alla Valente, Principal Analyst at Forreste…
…
continue reading
Jenn has returned from her adventures in the Yukon! She shares what she did, ate, and saw in Whitehorse, Kluane National Park, Haines Junction, Carcross, and more! Support the Travel Mug Podcast by buying us a coffee! You’ll make our day & you’ll get access to fun stuff like bloopers and extra content. We have Merch! Shop the Travel Mug Podcast Sto…
…
continue reading

1
Bovril, Deranged, Crocodilus, Cartier, Jinx, Conti, Scattered Spider, Josh Marpet... - SWN #482
37:10
37:10
Play later
Play later
Lists
Like
Liked
37:10Bovril, Deranged Hookworm, Crocodilus, Cartier, Jinx, Conti, Scattered Spider, Josh Marpet, and more on the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-482
…
continue reading

1
AIs, MCPs, and the Acutal Work that LLMs Are Generating - ASW #333
39:06
39:06
Play later
Play later
Lists
Like
Liked
39:06The recent popularity of MCPs is surpassed only by the recent examples deficiencies of their secure design. The most obvious challenge is how MCPs, and many more general LLM use cases, have erased two decades of security principles behind separating code and data. We take a look at how developers are using LLMs to generate code and continue our sea…
…
continue reading