Search a title or topic

Over 20 million podcasts, powered by 

Player FM logo

Scott Maxim Podcasts

show episodes
 
Artwork
 
Design a life that really matters. I’m your host, Greg McKeown, author of New York Times bestsellers "Effortless" and "Essentialism" and I’m on mission to help you advocate and negotiate your way to remarkable results without burning out. Come with me on this journey every Tuesday and Thursday as we examine the most essential areas of our lives. Learn more about my books and courses at https://GregMcKeown.com.
  continue reading
 
Artwork

1
Smart People Podcast

Smart People Industries

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
Smart People Podcast is a biweekly, interview-based podcast that features today's most well respected thought leaders engaging in authentic, insightful conversation for the benefit of the listener. The host, Chris Stemp, and his co-host/producer Jon Rojas, utilize their insatiable curiosity and relatable charm to provoke their guests into giving the interview of a lifetime. Every single guest has achieved a high level of recognition within their arena and in doing so has collected a wealth o ...
  continue reading
 
Artwork
 
Welcome to the Security Weekly Podcast Network, your all-in-one source for the latest in cybersecurity! This feed features a diverse lineup of shows, including Application Security Weekly, Business Security Weekly, Paul's Security Weekly, Enterprise Security Weekly, and Security Weekly News. Whether you're a cybersecurity professional, business leader, or tech enthusiast, we cover all angles of the cybersecurity landscape. Tune in for in-depth panel discussions, expert guest interviews, and ...
  continue reading
 
Artwork

1
Abel James Show

Abel James

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
Get cutting-edge insights from world-class leaders in health, fitness, longevity, entrepreneurship, music and brain science. In-depth interviews with 400+ world-renowned experts including James Clear, Dr. Casey Means, Dr. Shawn Baker, Dr. Mark Hyman, Robb Wolf, Dr. Jack Kruse, Nir Eyal, Tony Horton, Dr. John Gray, Tim Ferriss, Lewis Howes, JP Sears, and many more. Originally launched in 2012 with the tongue-in-cheek title, The Fat-Burning Man Show, this podcast hit #1 in Health in 8 countrie ...
  continue reading
 
Loading …
show series
 
Global spending on cybersecurity products and services will see a strong 14.4% CAGR from 2024 through 2029 and will hit $302.5 billion in 2029, driven by continued concerns around cyberattacks across all verticals and geographies. But where is the spending occuring and how do you prepare? Merritt Maxim, VP & Research Director at Forrester, joins Bu…
  continue reading
 
At Oktane 2025, leaders from across the security ecosystem shared how identity has become the new front line in protecting today’s AI-driven enterprises. As SaaS adoption accelerates and AI agents proliferate, organizations face an explosion of human and non-human identities—and with it, growing risks like misconfigured access, orphaned accounts, a…
  continue reading
 
What do we do when logic isn’t enough? Greg sits down with Matthew McConaughey to explore poems, prayers, and the disciplined choice to believe—over cynicism, doubt, and apathy. Together they read new pieces from Poems & Prayers and unpack how language, rhythm, and ritual can metabolize suffering into meaning and forward motion. Buy the Book: Poems…
  continue reading
 
In addition to some fun news, we get a Mary Ann Davidson as a surprise guest. We even get a great quote from her of "You're never going to have enough cybersecurity people to defend what was never built to be defensible.". Visit https://www.securityweekly.com/psw for all the latest episodes! Show Notes: https://securityweekly.com/psw-894…
  continue reading
 
More than four out of ten (41%) Chief Information Officers (CIOs) report cybersecurity as their top concern, yet these same leaders are simultaneously increasing security budgets (77%), expanding cloud infrastructure (68%), and accelerating artificial intelligence (AI) capabilities (67%). According to the new Future Forward: CIO 2025 Outlook report…
  continue reading
 
Dealing with vulns tends to be a discussion about prioritization. After all, there a tons of CVEs and dependencies with known vulns. It's important to figure out how to present developers with useful vuln info that doesn't overwhelm them. Francesco Cipollone shares how to redirect that discussion to focus on remediation and how to incorporate LLMs …
  continue reading
 
Boortz dives into the latest controversies inside America’s government schools - from pride pins in morning announcements to bearded sophomores in the girls’ locker room, and school boards flat-out ignoring parents. More and more families are losing faith in the American school system, except conveniently, the schools they send their own kids to. S…
  continue reading
 
How identity security can keep pace with the evolving threat landscape, with Brett Winterford Today’s threat landscape has never been more complex. Malicious actors are leveraging tools like generative AI to develop more creative social engineering attacks that can have serious ramifications for businesses. Brett Winterford, VP of Okta Threat Intel…
  continue reading
 
What if the secret to unlocking the mysteries of our minds, our health, and even our happiness is hiding in the most unexpected place—our own gut? Could the answers to our most stubborn health mysteries—and maybe even the secret to a longer, happier life—be found in the microbes we’ve spent a lifetime trying to avoid? How does our microbiome affect…
  continue reading
 
As AI and cloud-based services power our connected world, individuals are facing an unprecedented privacy crisis. With more than 2.3 billion people entrusting their data to the cloud and centralized servers, cyberattacks, data breaches, surveillance, identity theft, and privacy threats are now everyday risks. How do we protect against these threats…
  continue reading
 
In the news, Microsoft encounters a new cascade of avoidable errors with Entra ID, Apple improves iOS with hardware-backed memory safety, DeepSeek demonstrates the difficulty in reviewing models, curl reduces risk by eliminating code, preserving the context of code reviews, and more! Visit https://www.securityweekly.com/asw for all the latest episo…
  continue reading
 
Interview with Tod Beardsley This interview is sponsored by runZero. Legacy vulnerability management (VM) hasn't innovated alongside of attackers, and it shows. Let's talk about the state of VM. Check out https://securityweekly.com/runzero to learn more! Topic Segment: NPM Incidents In this week’s topic segment, we’re discussing all the NPM supply …
  continue reading
 
In this episode of Security Weekly News, Joshua Marpet and Aaran Leyland discuss the latest trends in AI and cybersecurity, focusing on innovations from CrowdStrike, the implications of new cyber incident reporting rules, and the evolving landscape of ransomware. They explore the role of AI in enhancing security measures, the challenges posed by ma…
  continue reading
 
Boortz takes aim at the growing power of the FCC and its creeping control over how Americans get their news. With federal regulators now targeting everything from late-night TV to daytime talk, he argues it’s time for the FCC to back off and let the people decide where they get their information. See omnystudio.com/listener for privacy information.…
  continue reading
 
This week's technical segment is all about the T-Lora Pager from Lilygo, and really cool Meshtastic device that can also be used for some hacking tasks! In the security news: Your safe is not safe Cisco ASA devices are under attack VMScape HybridPetya and UEFI attacks in the wild Eveything is a Linux terminal Hackers turns 30 Hosting websites on di…
  continue reading
 
Jimmy Kimmel’s suspension after comments on the Charlie Kirk assassination raises big questions - not just about TV politics, but about the role of the FCC in regulating media content. Boortz gives his take on why government shouldn’t be deciding what broadcasters can or can’t say, and why the free market is already handling it. See omnystudio.com/…
  continue reading
 
Think you’re a creative person? Think again. In this episode, psychologist and author Dr. Zorana Pringle explains why most of us are far less creative than we believe—and what to do about it. We explore why great ideas often die before they ever get started, how fear disguises itself as perfectionism, and why creativity has more to do with action t…
  continue reading
 
In the leadership and communications segment, Lack of board access: The No. 1 factor for CISO dissatisfaction, Pressure on CISOs to stay silent about security incidents growing, The Secret to Building a High-Performing Team, and more! Jackie McGuire sits down with Chuck Randolph, SVP of Strategic Intelligence & Security at 360 Privacy, for a grippi…
  continue reading
 
This week, we chat with Scott Clinton, board member and co-chain of the OWASP GenAI Security Project. This project has become a massive organization within OWASP with hundreds of volunteers and thousands of contributors. This team has been cranking out new tools, reports and guidance for practitioners month after month for over a year now. We start…
  continue reading
 
Segment 1 - Interview with Jeff Pollard Introducing Forrester’s AEGIS Framework: Agentic AI Enterprise Guardrails For Information Security For this episode’s interview, we’re talking to Forrester analyst Jeff Pollard. I’m pulling this segment’s description directly from the report’s executive summary, which I think says it best: As AI agents and ag…
  continue reading
 
What’s the secret to shedding fat as a foodie who refuses to sacrifice joy or flavor? This week’s guest changed the way we think about food and mom and pop businesses in America. He’s a legend in journalism and beloved in the food world, saving countless independent restaurants from certain destruction. As the creator of the beloved TV series Diner…
  continue reading
 
This week: Americans Can't Hack It Copy and paste to get malware Pixel 5 web servers - because you can How they got in and why security is hard Vulnerability management is failing - is it dead yet? Exploiting hacker tools Bluetooth spending spree! How to defend your car IoT security solutions and other such lies Exploiting IBM i (formerly AS/400) V…
  continue reading
 
With volatility now the norm, security and risk leaders need practical guidance on managing existing spending and new budgetary necessities. Where should they look? Jess Burn, Principal Analyst at Forrester Research, joins Business Security Weekly to discuss Forrester's Budget Planning Guide 2026: Security And Risk. This data-and-insights-driven re…
  continue reading
 
Loading …
Copyright 2025 | Privacy Policy | Terms of Service | | Copyright
Listen to this show while you explore
Play