show episodes
 
Artwork

51
What the Dice!?

What the Dice?!

icon
Unsubscribe
icon
Unsubscribe
Weekly
 
What the dice?! currently is a Home brewed, Actual Play TTRPG Podcast, rolling Shadowrun 5e with homebrewed world and rules. Following the stories of runners living in the shadows and making a name for themselves. We are a little podcast, with a big heart, spreading the love of not only TTRPG but fellow podcasters! Join us on our Discord! We have a growing, wonderful community, and we’d love to see ya! https://discord.gg/GHmD3KWucw Head over to our website for more info! https://whatthedice. ...
  continue reading
 
Artwork

1
Rewind Reviews

Dan Doolan & Chris Billingham

icon
Unsubscribe
icon
Unsubscribe
Monthly+
 
Welcome to Rewind Reviews a podcast in which Dan and Chris ask the age old question of films from their youth. Was that as good as I remember? Can these films live up to the memory or is childhood nostalgia responsible for rose tinted glasses? Either way, they're going to have a lot of fun rewatching and analysing them!
  continue reading
 
Artwork

1
Pivot

New York Magazine

icon
Unsubscribe
icon
Unsubscribe
Weekly+
 
Every Tuesday and Friday, tech journalist Kara Swisher and NYU Professor Scott Galloway offer sharp, unfiltered insights into the biggest stories in tech, business, and politics. They make bold predictions, pick winners and losers, and bicker and banter like no one else. After all, with great power comes great scrutiny. From New York Magazine and the Vox Media Podcast Network.
  continue reading
 
Artwork
 
Welcome to the Security Weekly Podcast Network, your all-in-one source for the latest in cybersecurity! This feed features a diverse lineup of shows, including Application Security Weekly, Business Security Weekly, Paul's Security Weekly, Enterprise Security Weekly, and Security Weekly News. Whether you're a cybersecurity professional, business leader, or tech enthusiast, we cover all angles of the cybersecurity landscape. Tune in for in-depth panel discussions, expert guest interviews, and ...
  continue reading
 
Artwork

1
Play to Potential Podcast

Play to Potential Podcast

icon
Unsubscribe
icon
Unsubscribe
Monthly
 
This Podcast is created and curated by Deepak Jayaraman (an Executive Coach and a Leadership Advisor). He lives in Mumbai and works with successful Senior Executives by helping them play to their unique potential but with a sharp focus on transitions (business or career). Just like businesses need to think about "where to play" and "how to win", leaders need to be coherent about "where to go" and "how to grow" in their journeys. Deepak works with them during pivotal moments to help them with ...
  continue reading
 
Loading …
show series
 
Jacob Miller is a Portland, Oregon based singer songwriter. I chatted with Jacob about how is style of writing has evolved, tapping into a more authentic version of himself, his views on being a musician at this stage of his life, his new EP, In A Season of Loving, and more. To keep up with Jacob Miller and the Dan Cable Presents Podcast, please ch…
  continue reading
 
This week, it's double AI interview Monday! In our first interview, we discuss how to balance AI opportunities vs. risk. Artificial Intelligence (AI) has the potential to revolutionize how businesses operate. But with this exciting advancement comes new challenges that cannot be ignored. For proactive security and IT leaders, how do you balance the…
  continue reading
 
Kara and Scott discuss the markets' wild ride thanks to Trump's tariffs, China's retaliation plans, and Howard Lutnick's theory about a manufacturing resurgence coming to the United States. Then, a deeper dive into some of the tariff winners (Warren Buffett), and losers (Big Tech), and some advice for panicked investors. Plus, the TikTok deadline g…
  continue reading
 
At Uber, there are many platform teams supporting engineers across the company, and maintaining robust on-call operations is crucial to keeping services functioning smoothly. The prospect of enhancing the efficiency of these engineering teams motivated Uber to create Genie, which is an AI-powered on-call copilot. Genie assists with on-call manageme…
  continue reading
 
We have a top ten list entry for Insecure Design, pledges to CISA's Secure by Design principles, and tons of CVEs that fall into familiar categories of flaws. But what does it mean to have a secure design and how do we get there? There are plenty of secure practices that orgs should implement are supply chains, authentication, and the SDLC. Those p…
  continue reading
 
We have a top ten list entry for Insecure Design, pledges to CISA's Secure by Design principles, and tons of CVEs that fall into familiar categories of flaws. But what does it mean to have a secure design and how do we get there? There are plenty of secure practices that orgs should implement are supply chains, authentication, and the SDLC. Those p…
  continue reading
 
We have a top ten list entry for Insecure Design, pledges to CISA's Secure by Design principles, and tons of CVEs that fall into familiar categories of flaws. But what does it mean to have a secure design and how do we get there? There are plenty of secure practices that orgs should implement are supply chains, authentication, and the SDLC. Those p…
  continue reading
 
When we use the phrase "talent gap" in cybersecurity, we're usually talking about adding headcount. For this interview, however, we're focusing on a gap that is evident within existing teams and practitioners - the often misunderstood soft skills gap. Side note: I really hate the term "soft skills". How about we call them "fundamental business skil…
  continue reading
 
WTD S2E35 Deadbolt ********************* The other side of the team is up. And they want to get the security system. But there is a problem… ********************* Content Warning: Profanity, sexual references, descriptions of violence, Drug/Alcohol use, and homebrewed rules. ********************* Promo: The Hard Knocks Sorority Podcast Youtube: htt…
  continue reading
 
Kara is joined by Jon Lovett, co-host of Pod Save America and host of Lovett or Leave It. They to discuss Elon Musk’s possible departure from the Trump administration, a Democratic win in Wisconsin, and Cory Booker’s record-breaking speech. Then, Liberation Day liberated us all (and threw the market into chaos), Joe Rogan thinks the Trump administr…
  continue reading
 
Rob Allen, Chief Product Officer at Threatlocker joins us for an interview segment on using AI in security products: What works and what's not fully baked! Then in the security news, There are more holes in your boot...loader according to Microsoft, related: Secure Boot is in danger and no one is really talking about it (still), Dear Microsoft: I d…
  continue reading
 
John Hennessy is a computer scientist, entrepreneur, and academic known for his significant contributions to computer architecture. He co-developed the RISC architecture, which revolutionized modern computing by enabling faster and more efficient processors. Hennessy served as the president of Stanford University from 2000 to 2016 and later co-foun…
  continue reading
 
In this interview, Sandy Dann chats with Shire of Broome President Chris Mitchell about the big changes happening around town — including the next stages of the Cable Beach redevelopment, what the new works will mean for locals and tourists, and how long beach access will be affected.Chris also shares updates on housing developments aimed at easing…
  continue reading
 
Vulnerability prioritization, the final frontier. Many say they do it, but do they really? It takes way more than vulnerability data to truly prioritize vulnerabilities. Greg Fitzgerald, Co-Founder and CXO at Sevco Security, and Steve Lodin , Vice President, Information Security at Sallie Mae, join Business Security Weekly to dig in. We'll discuss …
  continue reading
 
Kara is joined by Jen Psaki, the host of MSNBC's "Inside with Jen Psaki," to talk all things Signalgate, Trump taking on Big Law, and what's going on with the latest pardons. Then, Elon says the "destiny of humanity" rests on the outcome of the Wisconsin judicial election, and his AI company xAI acquires X. Plus, Jen weighs in on The White House Co…
  continue reading
 
Sourcegraph is a powerful code search and intelligence tool that helps developers navigate and understand large codebases efficiently. It provides advanced search functionality across multiple repositories, making it easier to find references, functions, and dependencies. Additionally, Sourcegraph integrates with various development workflows to st…
  continue reading
 
We take advantage of April Fools to look at some of appsec's myths, mistakes, and behaviors that lead to bad practices. It's easy to get trapped in a status quo of chasing CVEs or discussing which direction to shift security. But scrutinizing decimal points in CVSS scores or rearranging tools misses the opportunity for more strategic thinking. We s…
  continue reading
 
We take advantage of April Fools to look at some of appsec's myths, mistakes, and behaviors that lead to bad practices. It's easy to get trapped in a status quo of chasing CVEs or discussing which direction to shift security. But scrutinizing decimal points in CVSS scores or rearranging tools misses the opportunity for more strategic thinking. We s…
  continue reading
 
We take advantage of April Fools to look at some of appsec's myths, mistakes, and behaviors that lead to bad practices. It's easy to get trapped in a status quo of chasing CVEs or discussing which direction to shift security. But scrutinizing decimal points in CVSS scores or rearranging tools misses the opportunity for more strategic thinking. We s…
  continue reading
 
A successful SIEM deployment depends on a lot more than implementing the SIEM correctly. So many other things in your environment have an impact on your chances of a successful SIEM. Are the right logs enabled? Is your EDR working correctly? Would you notice a sudden increase or decrease in events from critical sources? What can practitioners do to…
  continue reading
 
✨ Interview: Matty J & Natalie Ahmat on Neighbour Day 2025 ✨In this heartfelt chat, Matty J catches up with long-time friend of the show, journalist, producer, and proud Mudburra & Wagadagum woman, Natalie Ahmat, to talk all things Neighbour Day — happening this Sunday, March 30th.Together, they dive into why real human connection matters now more …
  continue reading
 
WTD S2E34 Scouting in Target seen, but now they need proof. How hard can it be? ********************* Content Warning: Profanity, sexual references, descriptions of violence, Drug/Alcohol use, and homebrewed rules. ********************** Music from Epidemic Sound Hosting by Podbean Shadowrun is owned by The Topps Company, Inc. and Catalyst Games **…
  continue reading
 
Kara and Scott jump right in to discuss all things Signalgate — will heads roll? Then, President Trump has announced a 25% tariff on imported cars, the Trump family announces plans for a stablecoin, and Megyn Kelly is launching a podcast network. Plus, stay tuned for Scott’s prediction on who will fill the leadership void left by the chaos of the T…
  continue reading
 
How do we handle scope creep for vulnerabilities?, find the bugs before it hits the real world, risk or hype vulnerabilities, RTL-SDR in a browser, using AI to hack AI and protect AI, 73 vulnerabilities of which 0 patches have been issued, Spinning Cats, bypassing WDAC with Teams and JavaScript, Rust will solve all the security problems, did you he…
  continue reading
 
Jeffrey Ullman is a renowned computer scientist and professor emeritus at Stanford University, celebrated for his groundbreaking contributions to database systems, compilers, and algorithms. He co-authored influential texts like Principles of Database Systems and Compilers: Principles, Techniques, and Tools (often called the “Dragon Book”), which h…
  continue reading
 
GUEST: In this episode of FLAVOUR-ful Lives, we feature Sucharita Mukherjee, CEO of Kaleidofin, a FinTech company empowering millions with affordable finance. Sucharita’s story is a powerful example of resilience as transformation rather than simply bouncing back. From her early career at LSR, IIM Ahmedabad, and top-tier banks in London to navigati…
  continue reading
 
Cybersecurity teams were under increasing strain in 2024. To alleviate this burden, 2025 will see greater reliance on automation to streamline workflows, enhance threat detection, and accelerate incident response. But some of these investments may come with risks. Greg Sullivan, Founding Partner at CIOSO Global, joins Business Security Weekly to di…
  continue reading
 
Kara and Scott discuss the Meta tell-all that's become a bestseller, the latest attempt to sunset Section 230, and RFK Jr.'s justification for banning phones in schools. Then, Elon Musk's visit to the Pentagon is raising questions about his conflicts of interest, especially as SpaceX prepares to get a windfall from government contracts. Plus, the m…
  continue reading
 
Contextual memory in AI is a major challenge because current models struggle to retain and recall relevant information over time. While humans can build long-term semantic relationships, AI systems often rely on fixed context windows, leading to loss of important past interactions. Zep is a startup that’s developing a memory layer for AI agents usi…
  continue reading
 
LLMs are helping devs write code, but is it secure code? How are LLMs helping appsec teams? Keith Hoodlet returns to talk about where he's seen value from genAI, where it fits in with tools like source code analysis and fuzzers, and where its limitations mean we'll be relying on humans for a while. Those limitations don't mean appsec should dismiss…
  continue reading
 
LLMs are helping devs write code, but is it secure code? How are LLMs helping appsec teams? Keith Hoodlet returns to talk about where he's seen value from genAI, where it fits in with tools like source code analysis and fuzzers, and where its limitations mean we'll be relying on humans for a while. Those limitations don't mean appsec should dismiss…
  continue reading
 
LLMs are helping devs write code, but is it secure code? How are LLMs helping appsec teams? Keith Hoodlet returns to talk about where he's seen value from genAI, where it fits in with tools like source code analysis and fuzzers, and where its limitations mean we'll be relying on humans for a while. Those limitations don't mean appsec should dismiss…
  continue reading
 
What does a mature SecOps team look like? There is pressure to do more with less staff, increase efficiency and reduce costs. JP Bourget's experience has led him to believe that the answer isn't a tool upgrade, it's better planning, architecture, and process. In this interview, we'll discuss some of the common mistakes SecOps teams make, and where …
  continue reading
 
Loading …

Quick Reference Guide

Listen to this show while you explore
Play