Looking at cinema's present via its past. The Next Picture Show is a biweekly roundtable by the former editorial team of The Dissolve examining how classic films inspire and inform modern movies. Episodes take a deep dive into a classic film and its legacy in the first half, then compare and contrast that film with a modern successor in the second. Hosted and produced by Genevieve Koski, Keith Phipps, Tasha Robinson and Scott Tobias.
…
continue reading
The complete and crazy musical adventures that begins with the murder of kids' TV show host and spins out into a world of: angry puppets, a tooth worshipping cult, a fuzzy elder god, and so, so much more!
…
continue reading
About all things AppSec, DevOps, and DevSecOps. Hosted by Mike Shema and John Kinsella, the podcast focuses on helping its audience find and fix software flaws effectively.
…
continue reading
The daily podcast in which hosts Scott Carelli and Nick Jimenez analyze Edgar Wright’s Cornetto Trilogy one minute at a time.
…
continue reading
We're making our way through a list of the 100 Greatest films of all time to see if any of them would be on your own list. Join us on the journey.
…
continue reading
Welcome to The Adventures of Cinnamon & Oatmeal! A whimsical saga of two teddy bear bros who find themselves mysteriously transported to a magical world filled with whimsical creatures, dangerous miscreants and mayhemic mysteries!!! The Adventures of Cinnamon & Oatmeal is a Dungeons & Dragons actual play podcast. New episodes premiere on the first Tuesday of every month.
…
continue reading
Welcome to the Security Weekly Podcast Network, your all-in-one source for the latest in cybersecurity! This feed features a diverse lineup of shows, including Application Security Weekly, Business Security Weekly, Paul's Security Weekly, Enterprise Security Weekly, and Security Weekly News. Whether you're a cybersecurity professional, business leader, or tech enthusiast, we cover all angles of the cybersecurity landscape. Tune in for in-depth panel discussions, expert guest interviews, and ...
…
continue reading
This podcast is an audio archive of YouTube livestream recording with Patrick Collins and professionals in the web3 smart contract development field.
…
continue reading
1
Perfctl, Pig Butchering, Ivanti, Zimbra, BabyLockerKZ, AI gone Wild, Aaran Leyland... - SWN #419
32:36
32:36
Прослушать позже
Прослушать позже
Списки
Нравится
Нравится
32:36
Perfctl, Warm Cookie, Pig Butchering, Ivanti, Zimbra, BabyLockerKZ, AI gone Wild, Aaran Leyland, and More, on this edition of the Security Weekly News. Show Notes: https://securityweekly.com/swn-419
…
continue reading
1
Nothing Is Safe - PSW #845
2:05:10
2:05:10
Прослушать позже
Прослушать позже
Списки
Нравится
Нравится
2:05:10
Automated tank gauges are leaking more than just fuel, while CUPS is serving up a steaming hot brew of vulnerabilities. Meanwhile, Supermicro's BMC firmware is giving away root access like it's going out of style. If you thought your Kia was safe, think again - all it takes is a license plate and 30 seconds to turn your car into a hacker's joyride.…
…
continue reading
1
Cybersecurity Career Paths: from touring musician to purple teaming at Meta - Jayson Grace - ESW #378
35:32
35:32
Прослушать позже
Прослушать позже
Списки
Нравится
Нравится
35:32
Our latest in a series of interviews discussing cybersecurity career paths, today we talk to Jayson Grace his path into cybersecurity and his experience building red teams at national labs and purple teams at Meta. We also talk about his community impact, giving talks and building open source tools. Jayson just left Meta for an AI safety startup na…
…
continue reading
1
Analyzing Malware at Scale - John Hammond - PSW #845
1:03:12
1:03:12
Прослушать позже
Прослушать позже
Списки
Нравится
Нравится
1:03:12
Segment description coming soon! Segment Resources: - https://www.huntress.com/blog/the-hackers-in-the-arena-the-huntress-ctf-retrospective - https://www.huntress.com/blog/fake-browser-updates-lead-to-boinc-volunteer-computing-software Show Notes: https://securityweekly.com/psw-845
…
continue reading
1
Death Stars, Recall, Microsoft, Brocade, AI, Josh Marpet, and more... - SWN #418
29:24
29:24
Прослушать позже
Прослушать позже
Списки
Нравится
Нравится
29:24
Death Stars are not real or are they?, Recall, Microsoft, Brocade, AI and More and More AI, Josh Marpet, and more on the Cyber Security News. Show Notes: https://securityweekly.com/swn-418
…
continue reading
1
Underfunding and Leadership Gaps, as AI Replaces CEO and Senate Eyes Healthcare - BSW #366
26:02
26:02
Прослушать позже
Прослушать позже
Списки
Нравится
Нравится
26:02
In the leadership and communications segment, Underfunding And Leadership Gaps Weaken Cybersecurity Defenses, A Self-Care Checklist for Leaders, Senate bill eyes minimum cybersecurity standards for health care industry, and more! Show Notes: https://securityweekly.com/bsw-366
…
continue reading
1
#444: Heir Grievances Pt. 2 — His Three Daughters
1:00:04
1:00:04
Прослушать позже
Прослушать позже
Списки
Нравится
Нравится
1:00:04
Azazel Jacobs’ HIS THREE DAUGHTERS is, like Tamara Jenkins’ THE SAVAGES, a film about the heartbreaking experience of caring for an aging parent, but even more so it is, also like the other film in the pairing, about adult siblings reuniting and renegotiating their relationships under those fraught conditions. We’re decidedly more mixed on Jacobs’ …
…
continue reading
1
How to Attain Zero Trust - Rob Allen - BSW #366
32:06
32:06
Прослушать позже
Прослушать позже
Списки
Нравится
Нравится
32:06
The zero-trust security model has been billed as an ultra-safe defense against emerging, unrecognized and well-known threats. Unlike perimeter security, it doesn't assume people inside an organization are automatically safe. Instead, it requires every user and device -- inside and out -- to be authorized before any access is granted. Sounds enticin…
…
continue reading
1
Quantum threats, SOC automation, funding trends - ESW #377
44:10
44:10
Прослушать позже
Прослушать позже
Списки
Нравится
Нравится
44:10
In the Enterprise News, the hosts discuss various trends and challenges in the cybersecurity landscape, including the evolution of terminology, funding trends, the emergence of new startups, and the impact of AI on security practices. They also explore the challenges faced by CISOs, the importance of humor in the industry, and the future of quantum…
…
continue reading
1
Oh the Places You'll Go (in Cybersecurity) - Jason Shockey - ESW #377
33:20
33:20
Прослушать позже
Прослушать позже
Списки
Нравится
Нравится
33:20
We've been hearing a lot lately about how the talent gap in cybersecurity is much more complex than some folks have been making it out to be. While making six figures after going through a six week boot camp might be overselling the cybersecurity job market a bit, it is definitely a complex space with lots of opportunities. Fortunately, we have fol…
…
continue reading
1
Passwords, CUPS, KIA, Gilbert Gottfried, Salt Typhoon, Rob Allen from ThreatLocker... - SWN #417
33:04
33:04
Прослушать позже
Прослушать позже
Списки
Нравится
Нравится
33:04
Passwords, CUPS, KIA, Gilbert Gottfried, Salt Typhoon, Rob Allen from ThreatLocker, and More on the Security Weekly News. Segment Resources: https://www.bleepingcomputer.com/news/security/hackers-deploy-ai-written-malware-in-targeted-attacks/ This segment is sponsored by ThreatLocker. Visit https://securityweekly.com/threatlocker to learn more abou…
…
continue reading
1
SIEM: Shakeup in Event Management - What's Happening in the SIEM market today? - Seth Goldhammer - ESW #377
42:42
42:42
Прослушать позже
Прослушать позже
Списки
Нравится
Нравится
42:42
The SIEM market has undergone some significant changes this summer. This is a great opportunity to talk about the current state of SIEM! In this conversation, we'll discuss: market changes and terminology: security analytics, data lakes, SIEM what is SOAR's role in the current SIEM market? machine learning and generative AI's role strategies for im…
…
continue reading
1
AI in Cyber & Addressing Analyst Burnout - Kayla Williams - PSW #844
55:31
55:31
Прослушать позже
Прослушать позже
Списки
Нравится
Нравится
55:31
Kayla Williams, Chief Security Information Officer at Devo, discussed the role of AI in cybersecurity and the ongoing issue of burnout for SOC analysts. Working with Wakefield Research, Devo discovered that 83% of IT professionals feel burnt out due to stress, lack of sleep, and anxiety. Many also report that their burnout leads to breaches. This s…
…
continue reading
1
Unsophisticated Methods - PSW #844
2:03:44
2:03:44
Прослушать позже
Прослушать позже
Списки
Нравится
Нравится
2:03:44
This week in the security news, Dr. Doug and Larry explore various technological advancements and their implications with a healthy dose of nostalgia, particularly focusing on health monitoring through Wi-Fi signals, the misconceptions surrounding 5G connectivity, the importance of understanding internet speed needs, and the cybersecurity threats f…
…
continue reading
1
Fuzzing for Vulns, GitLab Auth Bypass, JPEG Vulns, Programming Language Ranks - ASW #300
32:45
32:45
Прослушать позже
Прослушать позже
Списки
Нравится
Нравится
32:45
Fuzzing network traffic in OpenWRT, parsing problems lead to GitLab auth bypass, more fuzzing finds vulns in a JPEG parser, and more! Show Notes: https://securityweekly.com/asw-300
…
continue reading
1
Fuzzing for Vulns, GitLab Auth Bypass, JPEG Vulns, Programming Language Ranks - ASW #300
32:45
32:45
Прослушать позже
Прослушать позже
Списки
Нравится
Нравится
32:45
Fuzzing network traffic in OpenWRT, parsing problems lead to GitLab auth bypass, more fuzzing finds vulns in a JPEG parser, and more! Show Notes: https://securityweekly.com/asw-300
…
continue reading
1
C3pbot, Kaspersky, Octo2 , Honkai: Star Rail, ServiceNow, LinkedIn... - SWN #416
29:32
29:32
Прослушать позже
Прослушать позже
Списки
Нравится
Нравится
29:32
C3pbot, Kaspersky, Octo2 Electric Boogaloo, Honkai: Star Rail, ServiceNow, LinkedIn, IoT, Josh Marpet, and more on the Cyber Security News. Show Notes: https://securityweekly.com/swn-416
…
continue reading
1
Vulnerable APIs and Bot Attacks: Two Interconnected, Growing Security Threats - David Holmes - ASW #300
35:07
35:07
Прослушать позже
Прослушать позже
Списки
Нравится
Нравится
35:07
APIs are essential to modern application architectures, driving rapid development, seamless integration, and improved user experiences. However, their widespread use has made them prime targets for attackers, especially those deploying sophisticated bots. When these bots exploit business logic, they can cause considerable financial and reputational…
…
continue reading
1
Vulnerable APIs and Bot Attacks: Two Interconnected, Growing Security Threats - David Holmes - ASW #300
35:07
35:07
Прослушать позже
Прослушать позже
Списки
Нравится
Нравится
35:07
APIs are essential to modern application architectures, driving rapid development, seamless integration, and improved user experiences. However, their widespread use has made them prime targets for attackers, especially those deploying sophisticated bots. When these bots exploit business logic, they can cause considerable financial and reputational…
…
continue reading
1
Authentication and Authorization in the AI Era - Shiven Ramji - BSW #365
30:30
30:30
Прослушать позже
Прослушать позже
Списки
Нравится
Нравится
30:30
AI is bringing productivity gains like we’ve never seen before -- with users, security teams and developers already reaping the benefits. However, AI is also bolstering existing threats to application security and user identity -- even enabling new, personalized attacks to emerge. Shiven Ramji, President of Customer Identity at Okta, joins Business…
…
continue reading
1
#443: Heir Grievances Pt. 1 — The Savages
1:05:19
1:05:19
Прослушать позже
Прослушать позже
Списки
Нравится
Нравится
1:05:19
Caring for an elderly or infirm parent is a common experience that is less commonly depicted on screen, particularly with a comedic bent, which is why Azazal Jacobs’ new HIS THREE DAUGHTERS inspired us to revisit the 2007 dramedy THE SAVAGES, which writer-director Tamara Jenkins drew from her own experiences dealing with a father with dementia. Muc…
…
continue reading
1
Answering the Board's Questions While UnitedHealth Group 'Starts Over' - BSW #365
36:38
36:38
Прослушать позже
Прослушать позже
Списки
Нравится
Нравится
36:38
In the leadership and communications segment, CISA Releases Cyber Defense Alignment Plan for Federal Agencies, UnitedHealth Group CISO: We had to ‘start over’ after Change Healthcare attack, 20 Essential Strategies for Leadership Development Success, and more! Show Notes: https://securityweekly.com/bsw-365…
…
continue reading
1
Cybersecurity: is the talent gap a myth? Is the industry delusional? - ESW #376
45:24
45:24
Прослушать позже
Прослушать позже
Списки
Нравится
Нравится
45:24
This week, the cybersecurity industry's most basic assumptions under scrutiny. Following up our conversation with Wolfgang Goerlich, where he questions the value of phishing simulations, we discuss essays that call into question: the maturity of the industry the supposed "talent gap" with millions of open jobs despite complaints that this industry …
…
continue reading
1
Speed, Flexibility, and AI: The Case for Migrating from Legacy SOAR Systems - Whitney Young - ESW #376
33:06
33:06
Прослушать позже
Прослушать позже
Списки
Нравится
Нравится
33:06
In this episode, we explore some compelling reasons for transitioning from traditional SOAR tools to next-generation SOAR platforms. Discover how workflow automation and orchestration offers unparalleled speed and flexibility, allowing organizations to stay ahead of evolving security threats. We also delve into how advancements in AI are driving th…
…
continue reading