Search a title or topic

Over 20 million podcasts, powered by 

Player FM logo

G Rob Weekly Podcasts

show episodes
 
Artwork

1
Paul's Security Weekly (Audio)

Security Weekly Productions

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
For the latest in computer security news, hacking, and research! We sit around, drink beer, and talk security. Our show will feature technical segments that show you how to use the latest tools and techniques. Special guests appear on the show to enlighten us and change your perspective on information security. Note: This is only Paul's Security Weekly, a 2-hour show recorded once per week.
  continue reading
 
Artwork

1
Paul's Security Weekly (Video)

Security Weekly Productions

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
Where security veterans unpack the latest IT security news, vulnerabilities, and research through a historical and technical lens that can cut through even the thickest cigar smoke. Hosted by Paul Asadoorian and Larry Pesce. Co-hosts: Josh Marpet, Jeff Man, Mandy Logan, Tyler Robinson.
  continue reading
 
Artwork

4
Security Weekly Podcast Network (Audio)

Security Weekly Productions

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Daily
 
Welcome to the Security Weekly Podcast Network, your all-in-one source for the latest in cybersecurity! This feed features a diverse lineup of shows, including Application Security Weekly, Business Security Weekly, Paul's Security Weekly, Enterprise Security Weekly, and Security Weekly News. Whether you're a cybersecurity professional, business leader, or tech enthusiast, we cover all angles of the cybersecurity landscape. Tune in for in-depth panel discussions, expert guest interviews, and ...
  continue reading
 
Artwork

1
Pajama Pants

Pajama Pants

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
We are Robert Iler, Kassem G, and Jamie-Lynn Sigler discussing a whole lot of nothing but everything at the same time... in pajama pants. Subscribe for new episodes every Monday morning. Watch on YouTube: http://bit.ly/PajamaPantsPodcast For questions and business inquiries please write to: [email protected]
  continue reading
 
G-Rod will be discussing ONE horror film a week. The mission is to introduce you to the world of horror. Sometimes G will be riding solo. Sometimes G will have a guest. Either way, here at Pod Of Horror HALLOWEEN IS EVERYDAY! Follow Pod of Horror on Twitter: twitter.com/realpodofhorror Follow Pod Of Horror on Instagram: instagram.com/podofhorror Support this podcast: https://podcasters.spotify.com/pod/show/podofhorror/support
  continue reading
 
Artwork

1
Pardon My Take

Barstool Sports

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly+
 
On "Pardon My Take," Big Cat & PFT Commenter deliver the loudest and most correct sports takes in the history of the spoken word. Daily topics, guests, and an inability to tell what the hosts might be doing will make this your new favorite sports talk show. This is a podcast that will without a doubt change your life for the better- guaranteed, or your money back. *Pretend a reggaeton air horn is going off right now* PMT. You can find every episode of this show on Apple Podcasts, Spotify or ...
  continue reading
 
Artwork

1
Leave Your Mark

Scott Livingston

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
The Leave Your Mark Podcast is where high performance meets human stories. Each week, we go beyond résumés and highlight reels to explore how extraordinary people—high achievers who are also genuinely good humans—have been shaped by their environments, experiences, and the people around them. More importantly, we uncover how they are leaving their mark on the world. Step inside the minds and lives of remarkable individuals from sport, business, arts, and beyond—and walk away inspired to leav ...
  continue reading
 
Loading …
show series
 
Doug White sits down with Theresa Lanowitz, Chief Evangelist at LevelBlue, for a powerful and timely conversation about one of cybersecurity’s most pressing threats: the software supply chain. Theresa shares fresh insights from LevelBlue’s global research involving 1,500 cybersecurity professionals across 16 countries. Together, they unpack the rea…
  continue reading
 
Week 1 is here and we're ready to roll with Fastest 2 Minutes (00:00:00-00:11:00). We then recap all of the games from Sunday Steelers 34, Jets 32 (00:11:00-00:26:18)Bucs 23, Falcons 20 (00:26:18-00:33:01)Bengals 17, Browns 16 (00:33:01-00:42:46)Commanders 21, Giants 6 (00:42:46-00:54:44)Colts 33, Dolphins 8 (00:54:44-01:02:54)Raiders 20, Patriots …
  continue reading
 
Football is back and it started with a spit off. The Eagles win opening night and the Cowboys didn't look all that bad (00:00:00-00:13:11). We talk Kawhi Leonard's no show job, Mt Rushmore duel was a blowout and some talking tennis (00:13:11-00:27:08). We then do our Week 1 picks and preview going through the entire NFL Week 1 slate and a new fanta…
  continue reading
 
In the secure news: Automakers respond to Flipper Zero attacks More on the unconfirmed Elastic EDR 0-Day When Secure Boot does its job too well Crazy authenitcation bypass Hacker ultimatums AI Slop Impatient hackers Linux ISOs are malware Attackers love drivers Hacking Amazon's Eero, the hard way Exploits will continue until security improves The S…
  continue reading
 
In the secure news: Automakers respond to Flipper Zero attacks More on the unconfirmed Elastic EDR 0-Day When Secure Boot does its job too well Crazy authenitcation bypass Hacker ultimatums AI Slop Impatient hackers Linux ISOs are malware Attackers love drivers Hacking Amazon's Eero, the hard way Exploits will continue until security improves The S…
  continue reading
 
In the secure news: Automakers respond to Flipper Zero attacks More on the unconfirmed Elastic EDR 0-Day When Secure Boot does its job too well Crazy authenitcation bypass Hacker ultimatums AI Slop Impatient hackers Linux ISOs are malware Attackers love drivers Hacking Amazon's Eero, the hard way Exploits will continue until security improves The S…
  continue reading
 
The cybersecurity industry is undergoing a consolidation wave that is moving far faster than many realize. This isn’t at all about CISOs wanting fewer tools as much as some would like to think - the changes are happening at the macro level. Ross Haleliuk joins BSW to present the most comprehensive illustration ever made of how our industry has cons…
  continue reading
 
NFL is almost here and we do our predictions for the season, worst case scenarios for all of our teams, MVP, SB, least improved and more (00:00:00-00:34:00). Hot Seat/Cool Throne including is President Trump dead or alive (00:34:00-00:53:36)? Mt Rushmore duel to end the Rushmore season plus punishment (00:53:36-01:22:34). Pete Prisco joins the show…
  continue reading
 
Send us a text This week on Leave Your Mark, I sit down with Keenan — CEO, entrepreneur, father, and the author of Gap Selling. But this conversation isn’t about sales tactics. Instead, we dive into his remarkable life story: growing up adopted in a mixed-race family in Boston, chasing dreams of football and modeling, finding his way into sales, an…
  continue reading
 
In this must-see BlackHat 2025 interview, Doug White sits down with Michael Callahan, CMO at Salt Security, for a high-stakes conversation about Agentic AI, Model Context Protocol (MCP) servers, and the massive API security risks reshaping the cyber landscape. Broadcast live from the CyberRisk TV studio at Mandalay Bay, Las Vegas, the discussion pu…
  continue reading
 
Bill Belichick at North Carolina is off and not running (00:00:00-00:07:08). We talk about all the games from Week 1 in CFB, is Arch cooked. Is the Alabama dynasty dead. Brian Kelly gets the monkey off his back and more (00:07:08-00:57:06). Who's back of the week with bonus Booger McFarland cam as he eats 6 donuts for being wrong about Tommy Fleetw…
  continue reading
 
Interview with Dave Lewis on Security's Role in M&A Due Diligence In this episode, Dave Lewis from 1Password discusses the critical importance of security in mergers and acquisitions, from due diligence through integration. He explores common pitfalls, essential security assessments, and practical strategies for security leaders to protect organiza…
  continue reading
 
Porn bombing the celestial zoom room and Astro Oblivion, FreePBX, GitHub, OWASP, Promptlock, Claude Aaran Leyland, and More, on this edition of the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-507
  continue reading
 
Football is all the way back. We get ready for the first full weekend of football with LeBron’s 6 players to watch in the NFL and we name ours as well(00:00:00-00:21:52). Ryder Cup team is set(00:21:52-00:30:27). Mt Rushmore of worst favors(00:30:27-01:00:24). Tom Fornelli and Brandon Walker join the show for our mega CFB preview. We talk conferenc…
  continue reading
 
Rob Allen joins us to discuss the importance of security research teams, and some cool stuff they've worked on. Then, in the Security News: Flipper Zero, unlocking cars: The saga continues The one where they stole the vulnerabilities ESP32 Bus Pirates AI will weaponize everything, maybe What are in-the-wild exploits? Docker and security boundaries,…
  continue reading
 
Rob Allen joins us to discuss the importance of security research teams, and some cool stuff they've worked on. Then, in the Security News: Flipper Zero, unlocking cars: The saga continues The one where they stole the vulnerabilities ESP32 Bus Pirates AI will weaponize everything, maybe What are in-the-wild exploits? Docker and security boundaries,…
  continue reading
 
Rob Allen joins us to discuss the importance of security research teams, and some cool stuff they've worked on. Then, in the Security News: Flipper Zero, unlocking cars: The saga continues The one where they stole the vulnerabilities ESP32 Bus Pirates AI will weaponize everything, maybe What are in-the-wild exploits? Docker and security boundaries,…
  continue reading
 
Securing top-tier cybersecurity leadership is not just a necessity but a significant challenge, especially when working within budget constraints. Should you hire a full-time CISO or outsource to a vCISO provider? Brian Haugli, CEO at SideChannel, joins BSW to discuss how organizations can hire a Virtual CISO (vCISO) to benefit from their expertise…
  continue reading
 
Terry McLaurin has ended his hold in and re-signed. Trey Hendrickson gets a raise and Tommy Devito gets cut (00:00:00-00:14:40). Taylor Swift and KillaTrav get engaged (00:14:40-00:26:12). Hot Seat Cool Throne including Keegan Bradley making himself player/captain (maybe) (00:26:12-00:43:34). Mt Rushmore of things girls hate about guys (00:43:34-01…
  continue reading
 
Send us a text This week's guest is Cory Kennedy. Cory is a leader in high-performance sport, most recently the Director of Performance with the Sacramento Kings. He formerly served as a Strength and Conditioning Coach with the Chicago Cubs organization, and before that, he was the lead of performance for the Institut National de Sport in Montreal.…
  continue reading
 
The EU Cyber Resilience Act joins the long list of regulations intended to improve the security of software delivered to users. Emily Fox and Roman Zhukov share their experience education regulators on open source software and educating open source projects on security. They talk about creating a baseline for security that addresses technical items…
  continue reading
 
Interview with Harish Peri from Okta Oktane Preview: building frameworks to secure our Agentic AI future Like it or not, Agentic AI and protocols like MCP and A2A are getting pushed as the glue to take business process automation to the next level. Giving agents the power and access they need to accomplish these lofty goals is going to be challengi…
  continue reading
 
Tommy Fleetwood finally did it and won the big one. We talk about a great weekend of golf and our guy Robb with two B's sendings us the tip to get us all to bet on Tommy (00:00:00-00:19:43). We talk College Football Week Zero in Dublin and people getting mad about Shedeur Sanders (00:19:43-00:36:58). Who's back of the week including Taiwain and ESP…
  continue reading
 
Humans wiped out by 2040, Okta, Elastic, Bad Bots, Berserk Bear, Siemens, Philip K. Dick, Aaran Leyland, and More, on this edition of the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-505
  continue reading
 
We finish off Camp Barstool week sore and in a great mood after the boys hung out in a cabin all week. Some NFL trades and national sports podcast stories as well as Cracker Barrel changed their logo (00:00:00-00:22:51). Camp has us in a nostalgic mood so we do the Mt Rushmore of N64 games (00:22:51-00:46:13). Jerry O’Connell joins the show to give…
  continue reading
 
This segment is sponsored by Flashpoint. Visit https://securityweekly.com/flashpoint to learn more about them! Recent leaks tied to LockBit and Black Basta have exposed the inner workings of two of the most notorious ransomware groups—revealing their tactics, negotiation strategies, and operational infrastructure. For defenders, this rare window in…
  continue reading
 
This segment is sponsored by Flashpoint. Visit https://securityweekly.com/flashpoint to learn more about them! Recent leaks tied to LockBit and Black Basta have exposed the inner workings of two of the most notorious ransomware groups—revealing their tactics, negotiation strategies, and operational infrastructure. For defenders, this rare window in…
  continue reading
 
This segment is sponsored by Flashpoint. Visit https://securityweekly.com/flashpoint to learn more about them! Recent leaks tied to LockBit and Black Basta have exposed the inner workings of two of the most notorious ransomware groups—revealing their tactics, negotiation strategies, and operational infrastructure. For defenders, this rare window in…
  continue reading
 
The industry is obsessed with vulnerabilities. From vulnerability assessment to vulnerability management to exposure management and even zero days, we love to talk about vulnerabilities. But what about misconfiguration? By definition it's a vulnerability or weakness, but it doesn't have a CVE (common vulnerability enumeration). Should we ignore it?…
  continue reading
 
The QB depth charts are rolling in and Daniel Jones is back at QB1. Hank is doubling down on his Super Bowl England take and we talk some more sports news (00:00:00-00:28:02). Hot Seat/Cool Throne including Tommy Pham, LeBron golfing too much and more (00:28:02-00:46:45). Mt Rushmore of things that make your friends house cool (00:46:45-01:00:13). …
  continue reading
 
Send us a text This week’s episode features Danielle (Dani) Langford, a lifelong athlete whose journey in sport began on the basketball court. With a coach for a father, Dani grew up immersed in team environments and quickly found her passion for basketball. That passion carried her to represent Canada internationally and compete at the collegiate …
  continue reading
 
A smaller attack surface should lead to a smaller list of CVEs to track, which in turn should lead to a smaller set of vulns that you should care about. But in practice, keeping something like a container image small has a lot of challenges in terms of what should be considered minimal. Neil Carpenter shares advice and anecdotes on what it takes to…
  continue reading
 
Interview with Snehal Antani - Rethinking Risk-Based Vulnerability Management Vulnerability management is broken. Organizations basically use math to turn a crappy list into a slightly less crappy list, and the hardest part of the job as a CIO is deciding what NOT to fix. There has to be a better way, and there is... Segment Resources: https://hori…
  continue reading
 
Its Preseason Week 2 and we're ready for the real thing. Quarterback competitions are heating up in Cleveland and Indy (00:00:00-00:16:00). We all went to UFC 319 at the United Center Saturday night and recap the card and experience (00:16:00-00:30:50). Scottie Scheffler is the best and we get a tip for the BMW that we can't ignore (00:30:50-00:40:…
  continue reading
 
Loading …
Copyright 2025 | Privacy Policy | Terms of Service | | Copyright
Listen to this show while you explore
Play