Search a title or topic

Over 20 million podcasts, powered by 

Player FM logo

Josh Schneider Podcasts

show episodes
 
Hosted by Josh Schneider, The Meaningful Work Podcast features amazing humans from around the world who have found ways to create meaningful, high performance work. These every day rock stars share their stories, hacks and ideas on how to unleash our best work.
  continue reading
 
Artwork

1
HEMP RISING

Josh Schneider

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Fresh weekly takes on the latest hemp regulatory news, with experts from around the globe! Get rare perspectives on hemp policy reform through the eyes of a plant nerd and the rising leaders of the Hemp Revolution! Listen to new weekly episodes of HEMP RISING with Josh Schneider LIVE every Wednesday at 8 AM PST on Clubhouse!
  continue reading
 
Artwork

1
This Football Life

Josh Schneider-Weiler

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Welcome to This Football Life; the podcast that gives you intimate, in-depth interviews with football's most interesting players, coaches, backroom staff and executives. Walk a mile in their shoes and see the game through their eyes. Hosted by Josh Schneider-Weiler.
  continue reading
 
Artwork

1
BeEPYK

Drew Kreibich

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Daily+
 
Join us journey through entrepreneurship. Being a business owner can be different so we will chat with industry professionals to hear their stories, their wins, their hardships, and the fulfillment that comes with owning a business.
  continue reading
 
Welcome to Marketers Talking, a podcast where we bring you real-world insights and strategies from practitioners in the field. On each episode, we'll be chatting with marketers who are working on the front lines driving real results for their companies or clients. We'll discuss a range of topics, from social media and content marketing to SEO and email marketing, and everything in between.
  continue reading
 
Artwork

1
3 THE HARD WAY HANOI

BCP, MOON, JOSH AND SALOKIN

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
3 The Hard Way Hanoi is a podcast/radio show out of Hanoi, Vietnam, dedicated to playing independent music, interviewing interesting people in the community, talking about issues and news in Hanoi and much much more. Completely raw and unscripted
  continue reading
 
Artwork
 
When it comes to equity markets, there is a seller for every buyer. But how do you know which side of the trade to be on? Macro trends explain 70% of stock movements so understanding the macro backdrop is essential. Join Michael Kantrowitz, No. 1 ranked* Wall Street investment strategist, and the rest of the portfolio strategy & quantitative research team at Piper Sandler as they discuss current macro trends and what’s next for markets. Michael, Stephen, Emily, Joe and Dan have been working ...
  continue reading
 
Learn Chinese with ease! Talk Chineasy brings you 7-minute daily Chinese lessons. Each day, ShaoLan and a special guest share interesting cultural insights and stories as they teach you a useful Chinese phrase. Our amazing guests include rock stars, artists, CEOs, professors, adventurists, scientists, and more. You’ll discover the rich culture behind the most widely spoken language while learning how to converse in essential Mandarin Chinese. ✨ Explore various topics, special guests, and ins ...
  continue reading
 
Artwork

1
Dorothy's Place

Elias Crim

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
A conversation about rebuilding community and creating a moral economy. Catholic-flavored but ecumenical, kinda radical, lots of books mentioned. My friend Pete Davis and I direct the show. solidarityhall.substack.com
  continue reading
 
Artwork

1
Security Weekly Podcast Network (Audio)

Security Weekly Productions

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Daily
 
Welcome to the Security Weekly Podcast Network, your all-in-one source for the latest in cybersecurity! This feed features a diverse lineup of shows, including Application Security Weekly, Business Security Weekly, Paul's Security Weekly, Enterprise Security Weekly, and Security Weekly News. Whether you're a cybersecurity professional, business leader, or tech enthusiast, we cover all angles of the cybersecurity landscape. Tune in for in-depth panel discussions, expert guest interviews, and ...
  continue reading
 
Loading …
show series
 
This week: Americans Can't Hack It Copy and paste to get malware Pixel 5 web servers - because you can How they got in and why security is hard Vulnerability management is failing - is it dead yet? Exploiting hacker tools Bluetooth spending spree! How to defend your car IoT security solutions and other such lies Exploiting IBM i (formerly AS/400) V…
  continue reading
 
With volatility now the norm, security and risk leaders need practical guidance on managing existing spending and new budgetary necessities. Where should they look? Jess Burn, Principal Analyst at Forrester Research, joins Business Security Weekly to discuss Forrester's Budget Planning Guide 2026: Security And Risk. This data-and-insights-driven re…
  continue reading
 
Up first, the ASW news of the week. At Black Hat 2025, Doug White interviews Ted Shorter, CTO of Keyfactor, about the quantum revolution already knocking on cybersecurity’s door. They discuss the terrifying reality of quantum computing’s power to break RSA and ECC encryption—the very foundations of modern digital life. With 2030 set as the deadline…
  continue reading
 
Up first, the ASW news of the week. At Black Hat 2025, Doug White interviews Ted Shorter, CTO of Keyfactor, about the quantum revolution already knocking on cybersecurity’s door. They discuss the terrifying reality of quantum computing’s power to break RSA and ECC encryption—the very foundations of modern digital life. With 2030 set as the deadline…
  continue reading
 
Up first, the ASW news of the week. At Black Hat 2025, Doug White interviews Ted Shorter, CTO of Keyfactor, about the quantum revolution already knocking on cybersecurity’s door. They discuss the terrifying reality of quantum computing’s power to break RSA and ECC encryption—the very foundations of modern digital life. With 2030 set as the deadline…
  continue reading
 
Doug White sits down with Theresa Lanowitz, Chief Evangelist at LevelBlue, for a powerful and timely conversation about one of cybersecurity’s most pressing threats: the software supply chain. Theresa shares fresh insights from LevelBlue’s global research involving 1,500 cybersecurity professionals across 16 countries. Together, they unpack the rea…
  continue reading
 
In this episode of What's Next for Markets, we discuss the market's performance as we enter September, a typically weak month for equities. Despite initial volatility, the markets have been performing well, led by higher beta and value names. The discussion delves into sectoral leadership, factor performance, and the influence of major stocks like …
  continue reading
 
In the secure news: Automakers respond to Flipper Zero attacks More on the unconfirmed Elastic EDR 0-Day When Secure Boot does its job too well Crazy authenitcation bypass Hacker ultimatums AI Slop Impatient hackers Linux ISOs are malware Attackers love drivers Hacking Amazon's Eero, the hard way Exploits will continue until security improves The S…
  continue reading
 
The cybersecurity industry is undergoing a consolidation wave that is moving far faster than many realize. This isn’t at all about CISOs wanting fewer tools as much as some would like to think - the changes are happening at the macro level. Ross Haleliuk joins BSW to present the most comprehensive illustration ever made of how our industry has cons…
  continue reading
 
In this must-see BlackHat 2025 interview, Doug White sits down with Michael Callahan, CMO at Salt Security, for a high-stakes conversation about Agentic AI, Model Context Protocol (MCP) servers, and the massive API security risks reshaping the cyber landscape. Broadcast live from the CyberRisk TV studio at Mandalay Bay, Las Vegas, the discussion pu…
  continue reading
 
In this must-see BlackHat 2025 interview, Doug White sits down with Michael Callahan, CMO at Salt Security, for a high-stakes conversation about Agentic AI, Model Context Protocol (MCP) servers, and the massive API security risks reshaping the cyber landscape. Broadcast live from the CyberRisk TV studio at Mandalay Bay, Las Vegas, the discussion pu…
  continue reading
 
In this must-see BlackHat 2025 interview, Doug White sits down with Michael Callahan, CMO at Salt Security, for a high-stakes conversation about Agentic AI, Model Context Protocol (MCP) servers, and the massive API security risks reshaping the cyber landscape. Broadcast live from the CyberRisk TV studio at Mandalay Bay, Las Vegas, the discussion pu…
  continue reading
 
Interview with Dave Lewis on Security's Role in M&A Due Diligence In this episode, Dave Lewis from 1Password discusses the critical importance of security in mergers and acquisitions, from due diligence through integration. He explores common pitfalls, essential security assessments, and practical strategies for security leaders to protect organiza…
  continue reading
 
In this episode, Stephen and Emily discuss the impressive recent performance in the equity markets, noting new all-time highs in the S&P 500 and significant gains since April. They explore the annualized returns, emphasizing the distinction between large growth and smaller cap stocks, and the effect of sustained higher interest rates on the latter.…
  continue reading
 
Porn bombing the celestial zoom room and Astro Oblivion, FreePBX, GitHub, OWASP, Promptlock, Claude Aaran Leyland, and More, on this edition of the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-507
  continue reading
 
Rob Allen joins us to discuss the importance of security research teams, and some cool stuff they've worked on. Then, in the Security News: Flipper Zero, unlocking cars: The saga continues The one where they stole the vulnerabilities ESP32 Bus Pirates AI will weaponize everything, maybe What are in-the-wild exploits? Docker and security boundaries,…
  continue reading
 
Securing top-tier cybersecurity leadership is not just a necessity but a significant challenge, especially when working within budget constraints. Should you hire a full-time CISO or outsource to a vCISO provider? Brian Haugli, CEO at SideChannel, joins BSW to discuss how organizations can hire a Virtual CISO (vCISO) to benefit from their expertise…
  continue reading
 
The EU Cyber Resilience Act joins the long list of regulations intended to improve the security of software delivered to users. Emily Fox and Roman Zhukov share their experience education regulators on open source software and educating open source projects on security. They talk about creating a baseline for security that addresses technical items…
  continue reading
 
The EU Cyber Resilience Act joins the long list of regulations intended to improve the security of software delivered to users. Emily Fox and Roman Zhukov share their experience education regulators on open source software and educating open source projects on security. They talk about creating a baseline for security that addresses technical items…
  continue reading
 
The EU Cyber Resilience Act joins the long list of regulations intended to improve the security of software delivered to users. Emily Fox and Roman Zhukov share their experience education regulators on open source software and educating open source projects on security. They talk about creating a baseline for security that addresses technical items…
  continue reading
 
Interview with Harish Peri from Okta Oktane Preview: building frameworks to secure our Agentic AI future Like it or not, Agentic AI and protocols like MCP and A2A are getting pushed as the glue to take business process automation to the next level. Giving agents the power and access they need to accomplish these lofty goals is going to be challengi…
  continue reading
 
In this episode of What’s Next for Markets?, Michael Kantrowitz is joined by Jim Bianco, President and Macro Strategist at Bianco Research, for a wide-ranging conversation on the Fed, markets, and the bigger forces shaping the economy. Fresh off Jackson Hole, Michael and Jim dig into Jerome Powell’s latest message, the tension between inflation ris…
  continue reading
 
Humans wiped out by 2040, Okta, Elastic, Bad Bots, Berserk Bear, Siemens, Philip K. Dick, Aaran Leyland, and More, on this edition of the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-505
  continue reading
 
This segment is sponsored by Flashpoint. Visit https://securityweekly.com/flashpoint to learn more about them! Recent leaks tied to LockBit and Black Basta have exposed the inner workings of two of the most notorious ransomware groups—revealing their tactics, negotiation strategies, and operational infrastructure. For defenders, this rare window in…
  continue reading
 
The industry is obsessed with vulnerabilities. From vulnerability assessment to vulnerability management to exposure management and even zero days, we love to talk about vulnerabilities. But what about misconfiguration? By definition it's a vulnerability or weakness, but it doesn't have a CVE (common vulnerability enumeration). Should we ignore it?…
  continue reading
 
A smaller attack surface should lead to a smaller list of CVEs to track, which in turn should lead to a smaller set of vulns that you should care about. But in practice, keeping something like a container image small has a lot of challenges in terms of what should be considered minimal. Neil Carpenter shares advice and anecdotes on what it takes to…
  continue reading
 
A smaller attack surface should lead to a smaller list of CVEs to track, which in turn should lead to a smaller set of vulns that you should care about. But in practice, keeping something like a container image small has a lot of challenges in terms of what should be considered minimal. Neil Carpenter shares advice and anecdotes on what it takes to…
  continue reading
 
A smaller attack surface should lead to a smaller list of CVEs to track, which in turn should lead to a smaller set of vulns that you should care about. But in practice, keeping something like a container image small has a lot of challenges in terms of what should be considered minimal. Neil Carpenter shares advice and anecdotes on what it takes to…
  continue reading
 
Interview with Snehal Antani - Rethinking Risk-Based Vulnerability Management Vulnerability management is broken. Organizations basically use math to turn a crappy list into a slightly less crappy list, and the hardest part of the job as a CIO is deciding what NOT to fix. There has to be a better way, and there is... Segment Resources: https://hori…
  continue reading
 
In this episode, we dive into the complexities of the tech sector. The discussion highlights the significant growth and earnings performance of the tech industry, comparing today's landscape to the tech bubble of 2000. The episode also explore the relative performance of small caps and global tech, highlighting the importance of strong fundamentals…
  continue reading
 
We kick things off with a deep dive into the Hackberry PI and how to build one. Then in the security news: Will Perplexity buy Chrome? ESP32 Bus Pirates Poisoned telemetry Docker image security Fully Open Source Quantum Sensors Securing your car, Flippers, and show me the money Bringing your printer and desktop to Starbucks Paying a ransom? You nee…
  continue reading
 
As brands grow more digital, the threats grow more personal. Attackers impersonate executives, spin up fake websites, and leak sensitive data — hurting business reputations and breaking customer trust. How do you defend your organization's reputation and customers' trust? Santosh Nair, Co-Founder and CTO at Styx Intelligence, joins Business Securit…
  continue reading
 
Open source software is a massive contribution that provides everything from foundational frameworks to tiny single-purpose libraries. We walk through the dimensions of trust and provenance in the software supply chain with Janet Worthington. And we discuss how even with new code generated by LLMs and new terms like slopsquatting, a lot of the most…
  continue reading
 
Open source software is a massive contribution that provides everything from foundational frameworks to tiny single-purpose libraries. We walk through the dimensions of trust and provenance in the software supply chain with Janet Worthington. And we discuss how even with new code generated by LLMs and new terms like slopsquatting, a lot of the most…
  continue reading
 
Loading …
Copyright 2025 | Privacy Policy | Terms of Service | | Copyright
Listen to this show while you explore
Play