Search a title or topic

Over 20 million podcasts, powered by 

Player FM logo

Jason C Scott Podcasts

show episodes
 
Welcome to The Veteran’s Financial Edge! This podcast is designed to help Veterans make the most of their financial benefits, starting with the VA Home Loan Benefit. We’ll cover topics from loan strategies and investment opportunities to how you can use your benefits to achieve financial freedom, as well as transitioning Veterans from Active Duty to Civilian Careers! Additionally, we will have guest that may or may not be Veterans, but support the Veteran community with insights and opportun ...
  continue reading
 
Artwork

1
Swindled

A Concerned Citizen

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Utilizes narrative storytelling, archival audio, and immersive soundscapes to explore true stories of white-collar criminals, con artists, and corporate evil. From corruption and fraud to Ponzi schemes and environmental disasters, these financially motivated crimes have shaped our world in unimaginable ways. All in the name of greed. Become a ValuedListener™ at ValuedListener.com
  continue reading
 
Artwork

1
Agency Business

Brian Wieser and Olivia Morley

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
Agency Business is a podcast about ad agencies, from media industry analysts Brian Wieser and Olivia Morley. In our interviews with agency CEOs and industry experts, we explain the week's agency news and provide the context you need to navigate the business. Check it out on Spotify, Apple or wherever you get your podcasts.
  continue reading
 
Artwork

1
Law Bytes

Michael Geist

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
In recent years the intersection between law, technology, and policy has exploded as digital policy has become a mainstream concern in Canada and around the world. This podcast explores digital policies in conversations with people studying the legal and policy challenges, set the rules, or are experts in the field. It provides a Canadian perspective, but since the internet is global, examining international developments and Canada’s role in shaping global digital policy is be an important p ...
  continue reading
 
Artwork
 
Welcome to the Security Weekly Podcast Network, your all-in-one source for the latest in cybersecurity! This feed features a diverse lineup of shows, including Application Security Weekly, Business Security Weekly, Paul's Security Weekly, Enterprise Security Weekly, and Security Weekly News. Whether you're a cybersecurity professional, business leader, or tech enthusiast, we cover all angles of the cybersecurity landscape. Tune in for in-depth panel discussions, expert guest interviews, and ...
  continue reading
 
Artwork

1
The Partnership Economy

David A. Yovanno and Todd Crawford

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
The Partnership Economy explores the power of partnerships through candid conversations and stories with industry leaders. Our hosts, David A. Yovanno, CEO and Todd Crawford, Co-founder, of impact.com, unpack the future of partnerships as a lever for scale and an opportunity to put the consumer first.
  continue reading
 
Artwork

1
Hockey Minds Podcast

The Hockey Podcast Network

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Speaking with hockey operations personnel about their careers & the lessons they learned along the way! Guests range from Jr C to NHL and have a background in a number of unique hockey operations roles! Part of The Hockey Podcast Network Follow @hockeypodnet Find NHL & Hockey Content: thehockeypodcastnetwork.com Presented By: InStat Hosted By: Ryan Stacey To learn more contact [email protected] & follow @HockeyMindsPod on Twitter & Instagram!
  continue reading
 
Artwork

1
Classic Ads From Simpler Times

Epic Podcast Productions

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Welcome to a podcast hosted by unemployable fourth-rate advertising suit Steve Cooke and eminently-employable award-winning advertising creative and TV commercial director Tony Williams (no not that one - the other one). Each week, in an attempt to transport ourselves back to a world where there was no global plague, we all had expense accounts and white dogshit was still a thing, we review a classic TV ad and try to work out whether or not it was any good. We're already attracting some grea ...
  continue reading
 
Loading …
show series
 
As AI and cloud-based services power our connected world, individuals are facing an unprecedented privacy crisis. With more than 2.3 billion people entrusting their data to the cloud and centralized servers, cyberattacks, data breaches, surveillance, identity theft, and privacy threats are now everyday risks. How do we protect against these threats…
  continue reading
 
In the news, Microsoft encounters a new cascade of avoidable errors with Entra ID, Apple improves iOS with hardware-backed memory safety, DeepSeek demonstrates the difficulty in reviewing models, curl reduces risk by eliminating code, preserving the context of code reviews, and more! Visit https://www.securityweekly.com/asw for all the latest episo…
  continue reading
 
We all know the creator economy is evolving — but when done right, what does it look like in its ideal form? In this episode, Dave Yovanno is joined by Lindsey Gamble, an Influencer Marketing Advisor, Founder of Lindsey Gamble Media, and creator himself. Lindsey puts on his consultant hat to offer advice to both brands and creators, drawing from hi…
  continue reading
 
The “right to be forgotten” – perhaps better characterized as a right to de-index - has been a hotly debated privacy issue for well over a decade now, pitting those that argue that the harms that may come from the amplification of outdated but accurate content outweighs the benefits of maintaining such content in search indexes. The issue gets its …
  continue reading
 
On this episode of Agency Business, Olivia and Brian interview Luz Corona, editor of Campaign US. Luz leads coverage of advertising agencies across the U.S., shaping how the industry understands shifts in creativity, media, and marketing. She explains how Campaign US covers the ad agency beat with depth and context, including its signature “100 day…
  continue reading
 
Interview with Tod Beardsley This interview is sponsored by runZero. Legacy vulnerability management (VM) hasn't innovated alongside of attackers, and it shows. Let's talk about the state of VM. Check out https://securityweekly.com/runzero to learn more! Topic Segment: NPM Incidents In this week’s topic segment, we’re discussing all the NPM supply …
  continue reading
 
In this episode of Security Weekly News, Joshua Marpet and Aaran Leyland discuss the latest trends in AI and cybersecurity, focusing on innovations from CrowdStrike, the implications of new cyber incident reporting rules, and the evolving landscape of ransomware. They explore the role of AI in enhancing security measures, the challenges posed by ma…
  continue reading
 
This week's technical segment is all about the T-Lora Pager from Lilygo, and really cool Meshtastic device that can also be used for some hacking tasks! In the security news: Your safe is not safe Cisco ASA devices are under attack VMScape HybridPetya and UEFI attacks in the wild Eveything is a Linux terminal Hackers turns 30 Hosting websites on di…
  continue reading
 
In the leadership and communications segment, Lack of board access: The No. 1 factor for CISO dissatisfaction, Pressure on CISOs to stay silent about security incidents growing, The Secret to Building a High-Performing Team, and more! Jackie McGuire sits down with Chuck Randolph, SVP of Strategic Intelligence & Security at 360 Privacy, for a grippi…
  continue reading
 
This week, we chat with Scott Clinton, board member and co-chain of the OWASP GenAI Security Project. This project has become a massive organization within OWASP with hundreds of volunteers and thousands of contributors. This team has been cranking out new tools, reports and guidance for practitioners month after month for over a year now. We start…
  continue reading
 
The return of the Law Bytes podcast series this week coincides with the return of Parliament from its summer break. Digital policy may not be at the very top of the legislative agenda, but there are no shortage of issues that could attract attention. This includes lawful access legislation introduced last June, the prospect of online harms safeguar…
  continue reading
 
This week on Agency Business, Olivia Morley and Brian Wieser speak with Geoff Northcott, CEO of AKQA in EMEA. Geoff's been there 18 years, building a career at the intersection of creativity and technology. From launching Nike+ campaigns to opening offices around the world, his path reflects AKQA’s dual commitment to craft and innovation. Now leadi…
  continue reading
 
Segment 1 - Interview with Jeff Pollard Introducing Forrester’s AEGIS Framework: Agentic AI Enterprise Guardrails For Information Security For this episode’s interview, we’re talking to Forrester analyst Jeff Pollard. I’m pulling this segment’s description directly from the report’s executive summary, which I think says it best: As AI agents and ag…
  continue reading
 
This week: Americans Can't Hack It Copy and paste to get malware Pixel 5 web servers - because you can How they got in and why security is hard Vulnerability management is failing - is it dead yet? Exploiting hacker tools Bluetooth spending spree! How to defend your car IoT security solutions and other such lies Exploiting IBM i (formerly AS/400) V…
  continue reading
 
With volatility now the norm, security and risk leaders need practical guidance on managing existing spending and new budgetary necessities. Where should they look? Jess Burn, Principal Analyst at Forrester Research, joins Business Security Weekly to discuss Forrester's Budget Planning Guide 2026: Security And Risk. This data-and-insights-driven re…
  continue reading
 
Up first, the ASW news of the week. At Black Hat 2025, Doug White interviews Ted Shorter, CTO of Keyfactor, about the quantum revolution already knocking on cybersecurity’s door. They discuss the terrifying reality of quantum computing’s power to break RSA and ECC encryption—the very foundations of modern digital life. With 2030 set as the deadline…
  continue reading
 
AI this, AI that… but what about the creator economy!? With all the buzz around artificial intelligence, it’s time to connect the dots to creator marketing. In this episode of The Partnership Economy, Todd is joined by Brian Klais, Founder of URLgenius, to explore how AI is transforming the creator landscape. Brian kicks things off with a holistic …
  continue reading
 
Welcome to Agency Business. This week, James Dale, CEO and founder of Sine Group and Sine Digital, joins Olivia on the show. Dale’s path into agency life was anything but conventional. A former musician whose band once played at Glastonbury and toured with Band of Horses, he saw his career collapse when streaming upended the music business and data…
  continue reading
 
Doug White sits down with Theresa Lanowitz, Chief Evangelist at LevelBlue, for a powerful and timely conversation about one of cybersecurity’s most pressing threats: the software supply chain. Theresa shares fresh insights from LevelBlue’s global research involving 1,500 cybersecurity professionals across 16 countries. Together, they unpack the rea…
  continue reading
 
A proposed libertarian paradise in the Chilean countryside devolves into a spectacle of betrayal and broken promises. Prelude: Lazarus Long's Principality of New Utopia. –––-–---------------------------------------- BECOME A VALUEDLISTENER™ ⁠⁠⁠⁠⁠⁠⁠Spotify⁠⁠⁠⁠⁠⁠⁠ ⁠⁠⁠⁠⁠⁠⁠Patreon⁠⁠⁠⁠⁠⁠⁠ ⁠⁠⁠⁠⁠⁠⁠Apple Podcasts⁠⁠⁠⁠⁠⁠⁠ –––-–-------------------------------…
  continue reading
 
In the secure news: Automakers respond to Flipper Zero attacks More on the unconfirmed Elastic EDR 0-Day When Secure Boot does its job too well Crazy authenitcation bypass Hacker ultimatums AI Slop Impatient hackers Linux ISOs are malware Attackers love drivers Hacking Amazon's Eero, the hard way Exploits will continue until security improves The S…
  continue reading
 
The cybersecurity industry is undergoing a consolidation wave that is moving far faster than many realize. This isn’t at all about CISOs wanting fewer tools as much as some would like to think - the changes are happening at the macro level. Ross Haleliuk joins BSW to present the most comprehensive illustration ever made of how our industry has cons…
  continue reading
 
In this must-see BlackHat 2025 interview, Doug White sits down with Michael Callahan, CMO at Salt Security, for a high-stakes conversation about Agentic AI, Model Context Protocol (MCP) servers, and the massive API security risks reshaping the cyber landscape. Broadcast live from the CyberRisk TV studio at Mandalay Bay, Las Vegas, the discussion pu…
  continue reading
 
Welcome to Agency Business. This week, Pedro Lerma, CEO and founder of LERMA/ joins us on the show. Pedro shares his unconventional career journey—from selling radio spots in Wichita Falls to spending 23 years at The Richards Group, where he built both its digital practice and its Hispanic marketing arm, Richards/Lerma. He explains how that experie…
  continue reading
 
Interview with Dave Lewis on Security's Role in M&A Due Diligence In this episode, Dave Lewis from 1Password discusses the critical importance of security in mergers and acquisitions, from due diligence through integration. He explores common pitfalls, essential security assessments, and practical strategies for security leaders to protect organiza…
  continue reading
 
Porn bombing the celestial zoom room and Astro Oblivion, FreePBX, GitHub, OWASP, Promptlock, Claude Aaran Leyland, and More, on this edition of the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-507
  continue reading
 
Rob Allen joins us to discuss the importance of security research teams, and some cool stuff they've worked on. Then, in the Security News: Flipper Zero, unlocking cars: The saga continues The one where they stole the vulnerabilities ESP32 Bus Pirates AI will weaponize everything, maybe What are in-the-wild exploits? Docker and security boundaries,…
  continue reading
 
Securing top-tier cybersecurity leadership is not just a necessity but a significant challenge, especially when working within budget constraints. Should you hire a full-time CISO or outsource to a vCISO provider? Brian Haugli, CEO at SideChannel, joins BSW to discuss how organizations can hire a Virtual CISO (vCISO) to benefit from their expertise…
  continue reading
 
The EU Cyber Resilience Act joins the long list of regulations intended to improve the security of software delivered to users. Emily Fox and Roman Zhukov share their experience education regulators on open source software and educating open source projects on security. They talk about creating a baseline for security that addresses technical items…
  continue reading
 
Understanding Gen Z might feel like navigating uncharted territory, but what if your brand's success depends on it? In this episode, Dave Yovanno sits down with Ben Harms, Chief Growth Officer at Archrival, a creative agency built to help brands truly connect with Gen Z and Gen Alpha. Ben shares what it takes to meet these audiences where they are,…
  continue reading
 
Welcome to Agency Business. This week, Brian interviews Kat Ott, president of Havas Chicago. Kat’s unconventional path into advertising—from professional ballerina to agency president—shapes her perspective as what she calls a “modern marketer.” She explains how Havas Chicago operates like a speedboat: integrated, mid-size, and agile enough to make…
  continue reading
 
Interview with Harish Peri from Okta Oktane Preview: building frameworks to secure our Agentic AI future Like it or not, Agentic AI and protocols like MCP and A2A are getting pushed as the glue to take business process automation to the next level. Giving agents the power and access they need to accomplish these lofty goals is going to be challengi…
  continue reading
 
Originally published June 5, 2022. The untimely death of an outspoken advocate for foster children reveals his despicable double life. Prelude: A tragedy occurs after a woman in Rhode Island adopts eight children with developmental issues. –––-–---------------------------------------- BECOME A VALUEDLISTENER™ ⁠⁠Spotify⁠⁠ ⁠⁠Apple Podcasts⁠⁠ ⁠⁠Patreo…
  continue reading
 
Humans wiped out by 2040, Okta, Elastic, Bad Bots, Berserk Bear, Siemens, Philip K. Dick, Aaran Leyland, and More, on this edition of the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-505
  continue reading
 
This segment is sponsored by Flashpoint. Visit https://securityweekly.com/flashpoint to learn more about them! Recent leaks tied to LockBit and Black Basta have exposed the inner workings of two of the most notorious ransomware groups—revealing their tactics, negotiation strategies, and operational infrastructure. For defenders, this rare window in…
  continue reading
 
The industry is obsessed with vulnerabilities. From vulnerability assessment to vulnerability management to exposure management and even zero days, we love to talk about vulnerabilities. But what about misconfiguration? By definition it's a vulnerability or weakness, but it doesn't have a CVE (common vulnerability enumeration). Should we ignore it?…
  continue reading
 
A smaller attack surface should lead to a smaller list of CVEs to track, which in turn should lead to a smaller set of vulns that you should care about. But in practice, keeping something like a container image small has a lot of challenges in terms of what should be considered minimal. Neil Carpenter shares advice and anecdotes on what it takes to…
  continue reading
 
Welcome to Agency Business. This week, co-hosts Brian and Olivia are joined by Chad Maxwell, president of Kelly Scott Madison (KSM). Maxwell’s path into advertising started in anthropology, a background that still informs how he runs KSM today—both in understanding consumers and in building culture inside the agency. He shares how that perspective …
  continue reading
 
Interview with Snehal Antani - Rethinking Risk-Based Vulnerability Management Vulnerability management is broken. Organizations basically use math to turn a crappy list into a slightly less crappy list, and the hardest part of the job as a CIO is deciding what NOT to fix. There has to be a better way, and there is... Segment Resources: https://hori…
  continue reading
 
Loading …
Copyright 2025 | Privacy Policy | Terms of Service | | Copyright
Listen to this show while you explore
Play