Search a title or topic

Over 20 million podcasts, powered by 

Player FM logo

Security Management Podcasts

show episodes
 
Artwork

1
Risky Business

Patrick Gray

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
Risky Business is a weekly information security podcast featuring news and in-depth interviews with industry luminaries. Launched in February 2007, Risky Business is a must-listen digest for information security pros. With a running time of approximately 50-60 minutes, Risky Business is pacy; a security podcast without the waffle.
  continue reading
 
Artwork

1
Security Weekly Podcast Network (Audio)

Security Weekly Productions

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Daily
 
Welcome to the Security Weekly Podcast Network, your all-in-one source for the latest in cybersecurity! This feed features a diverse lineup of shows, including Application Security Weekly, Business Security Weekly, Paul's Security Weekly, Enterprise Security Weekly, and Security Weekly News. Whether you're a cybersecurity professional, business leader, or tech enthusiast, we cover all angles of the cybersecurity landscape. Tune in for in-depth panel discussions, expert guest interviews, and ...
  continue reading
 
Artwork

101
Defense in Depth

David Spark, Steve Zalewski, Geoff Belknap

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
Defense in Depth promises clear talk on cybersecurity's most controversial and confusing debates. Once a week we choose one controversial and popular cybersecurity debate and use the InfoSec community's insights to lead our discussion.
  continue reading
 
Artwork

1
The Security Circle

Yolanda Hamblen (Yoyo)

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
An IFPOD production for IFPO the very first security podcast called Security Circle. IFPO is the International Foundation for Protection Officers, and is an international security membership body that supports front line security professionals with learning and development, mental Health and wellbeing initiatives.
  continue reading
 
Explore the life of a security leader with NetSPI Field Chief Information Security Officer (CISO) Nabil Hannan. Hear how CISOs with diverse expertise tackle the challenges and opportunities that come with life on the frontlines of cybersecurity.
  continue reading
 
Artwork
 
Security Management Highlights brings the security professional expert interviews and information on the most critical industry topics. Join host Brendan Howard as he interviews thought leaders and industry professionals, as well as editors from the magazine.
  continue reading
 
Artwork

1
The Product Podcast

Product School

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
Hosted by Product School CEO Carlos Gonzalez de Villaumbrosia, The Product Podcast drills deep into the minds of Chief Product Officers from Cisco, Lovable, Perplexity, Shopify and many more. We move beyond high-level theory to reveal how top executives actually lead in the age of AI. We dig deep into their real-world decision-making, strategic frameworks, and the operational playbooks used to build intelligent products. If you are a VP, Director, or CPO looking to drive innovation at scale, ...
  continue reading
 
Artwork
 
Cyber Security, data breaches, Hackers, Chief Information Security Officers, Talking Cyber Security (formerly 'The Australian CISO') is a podcast for anyone interested in Cyber Security. Hear about data breaches, cyber news, how security personnel 'tick', how to answer questions at an interview, lessons learnt while doing the security role, how security people network, how they succeed etc. Use the email address [email protected] to make comments, pose questions or even ask to be on ...
  continue reading
 
Artwork

1
Great Security Debate

The Great Security Debate

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Two CISOs and a security-minded friend discuss and debate topics of security and privacy, with a focus on looking at the topic from various angles, both that they support and those they don't. Sign up for our newsletter to be notified when new episodes drop, or when new projects are announced https://newsletter.greatsecuritydebate.net
  continue reading
 
Artwork

1
ISF Podcast

Information Security Forum Podcast

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
The ISF Podcast brings you cutting-edge conversation, tailored to CISOs, CTOs, CROs, and other global security pros. In every episode of the ISF Podcast, Chief Executive, Steve Durbin speaks with rule-breakers, collaborators, culture builders, and business creatives who manage their enterprise with vision, transparency, authenticity, and integrity. From the Information Security Forum, the leading authority on cyber, information security, and risk management.
  continue reading
 
The Virtual CISO Moment dives into the stories of information security, information technology, and risk management pros; what drives them and what makes them successful while helping small and midsized business (SMB) security needs. No frills, no glamour, no transparent whiteboard text, no complex graphics, and no script - just honest discussion of SMB information security risk issues. Brought to you by vCISO Services, LLC, a leading provider of vCISO and information security risk managemen ...
  continue reading
 
Artwork

1
Secured Steps

Rockwood Wealth Management

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
Welcome to Secured Steps, the podcast where Jeff Llewellyn of Rockwood Wealth Management helps families confidently navigate the financial planning journey for individuals with special needs. Each episode features expert insights and real conversations with advocates, professionals, and families from the special needs community—because every family deserves a secure path forward. This podcast is intended for educational purposes only and should not be construed as investment, tax, or legal a ...
  continue reading
 
Artwork

1
Ctrl+Alt+Azure

Tobias Zimmergren, Jussi Roine

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
Ctrl+Alt+Azure offers weekly conversations on Microsoft Azure, cloud strategy, security, identity, and generative AI - focused on what matters for architects, developers, CIOs, and CISOs. Hosted by industry experts Tobias Zimmergren and Jussi Roine.
  continue reading
 
Artwork

1
Security & GRC Decoded

Raj Krishnamurthy

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
How today’s top organizations navigate the complex world of governance, risk, and compliance (GRC). Security & GRC Decoded brings you actionable strategies, expert insights, and real-world stories that help professionals elevate their security and compliance programs. Hosted by Raj Krishnamurthy. It’s for security professionals, compliance teams, and business leaders responsible security GRC and ensuring their organizations’ are safe, secure and adhere to regulatory mandates. Security & GRC ...
  continue reading
 
Artwork
 
Join County National Bank's Senior Wealth Management Officers Christopher Phillips and Holleigh Baker as they explore the true meaning behind the question "What is Wealth?" From discussions with various guests, they delve into how wealth is not just about financial abundance but also about security, flexibility, and values discovered through personal stories and insights. Join them as they uncover the diverse perspectives on what wealth truly means in today's world and how these insights sha ...
  continue reading
 
Artwork

1
CyberSound™

CyberSound Podcast by Vancord

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
CyberSound™ is a podcast built by and for business owners and professionals. Tune in as our cybersecurity experts cover the latest news regarding IT security, the most recent and relevant threats organizations are facing today, and provide tips to keep your business safe.
  continue reading
 
The Proposal Manager Podcast contains a wealth of information about all things related to the public sector bidding process. From the C-Suite to a GovCon newbie, this show has something for everyone. Each episode will discuss topics related to government business development, capture, and proposal management.
  continue reading
 
Cybersecurity is evolving — and so should you. Razorwire brings the open conversations that give you the edge. Welcome to the Razorwire podcast — your resource for practical advice, expert insights, and real-world conversations on cybersecurity, information security (InfoSec), risk management, governance, security leadership, human factors, and industry trends. Our mission is to help you build a stronger cybersecurity career while supporting a dynamic, agile community of professionals commit ...
  continue reading
 
Cloud Security Podcast by Google focuses on security in the cloud, delivering security from the cloud, and all things at the intersection of security and cloud. Of course, we will also cover what we are doing in Google Cloud to help keep our users' data safe and workloads secure. We're going to do our best to avoid security theater, and cut to the heart of real security questions and issues. Expect us to question threat models and ask if something is done for the data subject's benefit or ju ...
  continue reading
 
Artwork

1
The Security Repo

Mackenzie Jackson & Dwayne McDaniel

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
The security repo is a podcast that focuses on real world security issues we are all facing today. We will take deep dives into news events and have exclusive interviews with security leaders on the ground.
  continue reading
 
Welcome to the Ontic Connected Intelligence Podcast, the show for corporate security professionals who are elevating the practice and perception of security. Whether you’re a seasoned professional or new to the field, our podcast offers valuable insights and practical advice to help you navigate the complexities of modern corporate security. Hosted by Fred Burton and Manish Mehta, our episodes are packed with real-world examples and forward-thinking solutions to help you secure your organiza ...
  continue reading
 
Device management is complex. Security threats are constant. Apple ecosystems are evolving fast. Who's managing these challenges? What does it actually take? And most importantly, how do you stay ahead? Welcome to Jamf After Dark, where IT leaders, security professionals and Apple experts tackle the real issues facing organisations today. Join our hosts as they uncover what works, what doesn't, and how to build technology strategies that actually stick. Hear honest conversations about managi ...
  continue reading
 
Artwork

1
Software Development, Finance and AI

Krish Palaniappan and Varun Palaniappan

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
We’ve been doing Software Development and Architecture work for a while at Snowpal, and currently have several B2B and B2C products in production. In this podcast, we’ll share our experiences on a regular basis to help you & your teams build great software. The topics covered in this podcast will include Product Management, Project Management, Architecture, Development, Deployment, Security, Release Management, Sales, Marketing, Advertising, and just about everything else an ambitious, fast ...
  continue reading
 
Artwork

1
DrZeroTrust

Dr. Chase Cunningham

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
Unlock the future of cybersecurity with the "Dr. Zero Trust Podcast" on all podcasting platforms! Join me as we delve into Zero Trust Security, redefining how we protect data and networks. Explore frameworks, threat prevention, identity management, exclusive interviews, and emerging tech. Whether you're a pro or just curious, trust me– this podcast is where those who value honesty and real insights go for their cybersecurity insights! Tune in on Spotify, Google, or ITunes now. #DrZeroTrustPo ...
  continue reading
 
Artwork

1
The Morning Market Briefing

Narwhal Capital Management

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly+
 
The Morning Market Briefing presented by Narwhal Capital Management offers daily market commentary and long-form investment analysis, opinion, theory, and entertainment. Visit our website: https://www.narwhal.com/ Please see disclosures: https://www.narwhal.com/disclosure
  continue reading
 
Ken Tumolo and his son Nick Tumolo join you on the Tumolo Financial Radio to offer solutions and strategies for your retirement needs. With decades of financial experience, Ken and Nick offer tax recommendations, Social Security maximization, wealth management, retirement income planning and much more.
  continue reading
 
Artwork

1
Connect

Axis Communications

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Technology continues to advance at an increasingly rapid pace, so how can you stay on top of it? Learn from those who are pioneering new technologies and promoting entrepreneurial spirit! The Connect podcast encourages people to join prominent thought leaders as they explore today’s most timely and important topics around technology and network solutions. Connect brings listeners an engaging program featuring luminaries and trailblazers—from private industry, the public sector, and professio ...
  continue reading
 
Artwork

4
Day Two DevOps

Packet Pushers

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
Join hosts Ned Bellavance and Kyler Middleton as they dive deep into the challenges of DevOps from the perspective of seasoned practitioners. You'll hear from expert guests—technical leaders, trainers, and consultants with years of hands-on experience—discussing the nuances of DevOps. From AWS to Azure, networking to security, automation to modern cloud environments, each weekly episode equips you with the insights to confidently address tech and business challenges such as resilience, cost ...
  continue reading
 
Loading …
show series
 
In this episode of Security & GRC Decoded, host Raj Krishnamurthy sits down with Tom Scuderi, Senior Manager of Security & GRC at LTK and a veteran practitioner who has spent his career building governance functions at QTS, Tableau, Salesforce, and LTK. Tom shares how to scale GRC in high-growth environments by designing processes that resemble eng…
  continue reading
 
In this episode of The Professional CISO Show, David Malicoat is joined by Lenny Krol, Head of Services Sales at Check Point Software, recorded live at GPSEC DFW. Lenny breaks down how Check Point’s services organization supports customers across both Check Point and third-party technologies, why an open ecosystem matters, and how CISOs can realist…
  continue reading
 
This week gave us the gift of some more React Server Components vulnerabilities and further exploitation of the previously disclosed bugs by a variety of threat groups. There were also a long list of vulnerabilities disclosed by Microsoft, Adobe, and others, which we discuss in the context of how difficult vulnerability management is right now. Fin…
  continue reading
 
Scaling Open Source Observability and Managing Risk in the Software Supply Chain – Avi Press In this episode of the Security Repo Podcast, Avi Press, founder and CEO of Scarf, dives deep into the evolving world of open source observability and its intersection with security. He unpacks how better visibility into software usage can inform both defen…
  continue reading
 
Organizations rely heavily on Salesforce to manage vasts amounts of sensitive data, but hidden security risks lurk beneath the surface. Misconfigurations, excessive user permissions, and unmonitored third party integrations can expose this data to attackers. How do I secure this data? Justin Hazard, Principal Security Architect at AutoRABIT, joins …
  continue reading
 
For our first episode of the new year, we thought it would be appropriate to dig into some cybersecurity predictions. First, we cover the very nature of predictions and why they're often so bad. To understand this, we get into logical fallacies and cognitive biases. In the next segment, we cover some 2025 predictions we found on the Internet. In th…
  continue reading
 
Cryptocurrency Scam Emails and Web Pages As We Enter 2026 Scam emails are directing victims to confidence scams attempting to steal cryptocurrencies. https://isc.sans.edu/diary/Cryptocurrency%20Scam%20Emails%20and%20Web%20Pages%20As%20We%20Enter%202026/32594 Debugging DNS response times with tshark tshark is a powerful tool to debug DNS timing issu…
  continue reading
 
Our featured guests this month are Matt Sharp , Ian O’Neill and Jason Godley at Xactly Corp, interviewed by Frank Victory. News from Inspirato, Optiv, Lares, Ping Identity, Red Canary and a lot more!The Security Triad: Turning Risk into Revenue: Step inside the boardroom to see how top-tier leadership turns cybersecurity from a "no" into a "go." In…
  continue reading
 
In this engaging conversation, Krish Palaniappan and Suri Nagarajan delve into the intricacies of investing, particularly in the tech sector versus non-tech industries. They discuss the importance of financial literacy, the risks associated with high-risk investments, and the significance of diversification for new investors. Suri shares insights o…
  continue reading
 
In this episode, we break down the DevX Autonomy Open Call Solicitation from the U.S. Department of the Army—a forward-leaning opportunity focused on accelerating next-generation autonomous capabilities across air, ground, and maritime domains. Issued under NAICS 541715, this open call is designed to attract both traditional defense contractors and…
  continue reading
 
In this episode, we break down the Data Systems and Website Support Services (DSAWS) BPA opportunity from the U.S. Department of Health and Human Services, supporting Health Resources and Services Administration (HRSA). This single-award BPA, aligned under NAICS 541512, is expected to drive long-term enterprise data, analytics, and digital platform…
  continue reading
 
Cloud breaches don’t always start in the cloud, but they do end there. To defeat an attacker you need to understand their mission target along with the access points available to them, regardless of whether they reside within or beyond the cloud. SentinelOne is purpose-built to stop attacks wherever they originate - from within and beyond the cloud…
  continue reading
 
Only take vacations you can afford—debt and relaxation should never meet. If it needs installments and isn’t food or medicine, you don’t need it. Credit card debt is just regret charging interest—kill it first. Don’t enroll in college by muscle memory; 2026 doesn’t care about tradition. If you switch careers, pick a role that actually matters—vibes…
  continue reading
 
Our field is booming! Cybersecurity jobs are projected to grow 33 percent through 2033, far outpacing the average 4 percent growth across all jobs. (And yes, those stats could be made up, but they sound nice, eh?) Yet newcomers often feel paralyzed by where to start. The truth? There's no single "right path," but there are proven strategies that wo…
  continue reading
 
#SecurityConfidential #DarkRhiinoSecurity Daniel Lowrie (@daniellowrie) is a longtime IT and cybersecurity professional with over 20 years of hands-on experience, starting from workstation support and evolving into ethical hacking and security training. Inspired early on by hacker and spy movies, he turned that curiosity into a career focused on po…
  continue reading
 
While our team is out on winter break, please enjoy this episode of Only Malware in the Building. Welcome in! You’ve entered, Only Malware in the Building — but this time, it’s not just another episode. This is a special edition you won’t want to miss. For the first time, our hosts are together in-studio — and they’re turning up the heat. Literally…
  continue reading
 
Andy shares his thoughts and commentary about 2025 returns and events for: U.S. stocks International stocks U.S. bonds Gold & Silver Bitcoin Links in this episode: Tenon Financial monthly e-newsletter - Retirement Planning Insights Facebook group - Retirement Planning Education (formerly Taxes in Retirement) YouTube channel - Retirement Planning Ed…
  continue reading
 
#SecurityConfidential #DarkRhiinoSecurity Daniel Lowrie is a longtime IT and cybersecurity professional with over 20 years of hands-on experience, starting from workstation support and evolving into ethical hacking and security training. Inspired early on by hacker and spy movies, he turned that curiosity into a career focused on popping shells, br…
  continue reading
 
As 2025 comes to a close, it’s a good time to reflect, experiment, and learn—especially if you’re interested in investing, trading, or building fintech products. On the final trading day of the year, I spent some time walking through live paper trades using a desktop trading platform, sharing practical insights along the way. This article distills …
  continue reading
 
Andrew, Ben, and Tom discuss what surprised them in 2025 and what many people aren’t thinking about for 2026. Join our live YouTube stream Monday through Friday at 8:30 AM EST: http://www.youtube.com/@TheMorningMarketBriefing Please see disclosures: https://www.narwhal.com/disclosureBy Narwhal Capital Management
  continue reading
 
Send us a text 🎙️ Episode Summary A Continent in Motion: Eva Noelle on Security, Risk, and the Future of Security Risk in Africa In this powerful year-end conversation, Eva Noelle brings rare depth, context, and realism to what it truly means to operate in security, intelligence, and risk across the African continent. Drawing on extensive experienc…
  continue reading
 
In this conversation, I break down the state of cybersecurity heading into 2025—and it’s not pretty. Ransomware isn’t “ramping up,” it’s eating the market alive, while too many organizations are still betting their future on outdated controls, checkbox compliance, and the fantasy that perimeter security is a strategy. I call out the continued failu…
  continue reading
 
In this episode, we take a look at Azure networking topologies from the ground up. What options do we have for building enterprise-scale architectures, and when should we choose one over another? We discuss our own experiences, and also the stuff we seemingly do not know enough about. (00:00) - Intro and catching up. (03:59) - Show content starts. …
  continue reading
 
CISO pressures are on the rise - board expectations, executive alignment, AI, and personal liability - and that's all on top of your normal security pressures. With all these pressures, CISO burnout is on the rise. How do we detect it and help prevent it? Easier said than done. In this Say Easy, Do Hard segment, we tackle the health and wellness of…
  continue reading
 
CISO pressures are on the rise - board expectations, executive alignment, AI, and personal liability - and that's all on top of your normal security pressures. With all these pressures, CISO burnout is on the rise. How do we detect it and help prevent it? Easier said than done. In this Say Easy, Do Hard segment, we tackle the health and wellness of…
  continue reading
 
CISO pressures are on the rise - board expectations, executive alignment, AI, and personal liability - and that's all on top of your normal security pressures. With all these pressures, CISO burnout is on the rise. How do we detect it and help prevent it? Easier said than done. In this Say Easy, Do Hard segment, we tackle the health and wellness of…
  continue reading
 
A new year - and so much to do! To start 2026, Richard flies solo again to discuss the issues he's seen on sysadmins' minds as we head into the new year. Obviously, AI is eating up a lot of the conversation from many different angles: tools that can help us be more productive, security issues in our organizations due to misuse, and now, AI-driven h…
  continue reading
 
At Snowpal, we’ve spent years building and running production-grade software products across multiple domains. Most recently, our focus has been on B2B APIs — tools designed to help teams move faster, build reliably, and scale without reinventing the wheel. As we head into 2026, we’re starting work on our next API product. It will begin life as an …
  continue reading
 
Unless you’ve been completely disconnected from the news cycle, it’s impossible to ignore the explosion of conversation around data centers, energy demand, and AI infrastructure. These topics aren’t abstract anymore—they’re reshaping local communities, capital markets, and the future of technology itself. Living in Northern Virginia, particularly L…
  continue reading
 
SentinelOne announced a series of new innovative designations and integrations with Amazon Web Services (AWS), designed to bring the full benefits of AI security to AWS customers today. From securing GenAI usage in the workplace, to protecting AI infrastructure to leveraging agentic AI and automation to speed investigations and incident response, S…
  continue reading
 
Audits are often misunderstood, frequently disliked, and almost always viewed as a necessary evil — but what if that mindset is holding security teams back? In this episode of Security & GRC Decoded, Raj Krishnamurthy sits down with Varun Prasad to unpack what audits are actually designed to do: provide reasonable assurance, not absolute security. …
  continue reading
 
Andrew and Ben discuss Meta's latest acquisition plans and the Dallas Fed survey. Join our live YouTube stream Monday through Friday at 8:30 AM EST: http://www.youtube.com/@TheMorningMarketBriefing Please see disclosures: https://www.narwhal.com/disclosureBy Narwhal Capital Management
  continue reading
 
In an era dominated by AI-powered security tools and cloud-native architectures, are traditional Web Application Firewalls still relevant? Join us as we speak with Felipe Zipitria, co-leader of the OWASP Core Rule Set (CRS) project. Felipe has been at the forefront of open-source security, leading the development of one of the world's most widely d…
  continue reading
 
While our team is out on winter break, please enjoy this episode of Word Notes. A security awareness training technique in which authorized, but fake phishing emails are sent to employees in order to measure and improve their resistance to real phishing attacks. CyberWire Glossary link: ⁠https://thecyberwire.com/glossary/simulated-phishing⁠ Audio r…
  continue reading
 
In this episode, we break down USTRANSCOM Acquisition Program Support Sources Sought and what it means for small businesses. We explore the scope of support across program management, acquisition planning, risk management, systems engineering, and integration services that enable mission-critical transportation programs. Listen now to understand th…
  continue reading
 
In this conversation, Greg Irwin, co-founder of BWG Global, discusses the role of his company in providing fundamental research for institutional investors. He emphasizes the importance of community and networking in the tech industry, the logistics of organizing expert discussions, and the balance between art and science in research methodologies.…
  continue reading
 
In this episode of the Snowpal podcast, Dr. Adam Link, founder of Fireweed Capital, shares his unique journey from software engineering to wealth management. He discusses common financial mistakes engineers make, the differences between active and passive investment strategies, and the importance of personality in financial decision-making. Dr. Lin…
  continue reading
 
Ben provides an update on Ukraine peace talks and Nvidia's latest acquisition. Join our live YouTube stream Monday through Friday at 8:30 EST: http://www.youtube.com/@TheMorningMarketBriefing Please see disclosures: https://www.narwhal.com/disclosureBy Narwhal Capital Management
  continue reading
 
Rules are made and policies are established. But the “how” of implementing and meeting those regulations or policies will be very context specific. In this episode of the Great Security Debate, Dan, Erik, and Brian cover a number of key policies and requirements and some different ways to think about implementing them and how the specific situation…
  continue reading
 
For this week's episode of Enterprise Security Weekly, there wasn't a lot of time to prepare. I had to do 5 podcasts in about 8 days leading up to the holiday break, so I decided to just roll with a general chat and see how it went. Also, apologies, for any audio quality issues, as the meal I promised to make for dinner this day required a lot of p…
  continue reading
 
MongoDB Unauthenticated Attacker Sensitive Memory Leak CVE-2025-14847 Over the Christmas holiday, MongoDB patched a sensitive memory leak vulnerability that is now actively being exploited https://www.mongodb.com/community/forums/t/important-mongodb-patch-available/332977 https://github.com/mongodb/mongo/commit/505b660a14698bd2b5233bd94da3917b585c5…
  continue reading
 
You survived the click—but now the click has evolved. In Part 2, the crew follows phishing and ransomware down the rabbit hole into double extortion, initial access brokers, cyber insurance drama, and the unsettling rise of agentic AI that can click, run scripts, and make bad decisions for you. The conversation spans ransomware economics, why payin…
  continue reading
 
The crew makes suggestions for building a hacking lab today! We will tackle: What is recommended today to build a lab, given the latest advancements in tech Hardware hacking devices and gadgets that are a must-have Which operating systems should you learn Virtualization technology that works well for a lab build Using AI to help build your lab Visi…
  continue reading
 
Listener Q&A where Andy talks about: Potential advantages or disadvantages of consolidating retirement accounts ( 4:28 ) Paying taxes through IRA withholdings vs making estimated payments ( 13:08 ) Whether a minister's housing allowance impacts Affordable Care Act subsidy eligibility ( 26:11 ) When Qualified Longevity Annuity Contracts ("QLACs") mi…
  continue reading
 
While our team is out on winter break, please enjoy this episode of Hacking Humans This week, our hosts⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Dave Bittner⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠, ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Joe Carrigan⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠, and ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Maria Varmazis⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ (also host of the ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠T-Minus⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠…
  continue reading
 
In this episode, we dive deeper into Azure Trusted Signing, and how it can help with signing your binaries. Why should you care? What are the tools today and in the future, and how to get this done right? (00:00) - Intro and catching up. (03:01) - Show content starts. Show links - Signtool - Introduction to code signing - Trusted Signing - Give us …
  continue reading
 
Send us a text In this episode of the Security Circle Podcast, Host Yolanda “Yoyo” Hamblen is joined by Chris Stitt, a highly respected security and leadership practitioner whose career spans crisis management, international security operations, and complex bureaucratic environments. Chris brings rare credibility to the leadership conversation — no…
  continue reading
 
Loading …
Copyright 2026 | Privacy Policy | Terms of Service | | Copyright
Listen to this show while you explore
Play