Conversations with musicians, artists, industry folks, and deep dives into records. Covering all genres of music.
…
continue reading
What the dice?! currently is a Home brewed, Actual Play TTRPG Podcast, rolling Shadowrun 5e with homebrewed world and rules. Following the stories of runners living in the shadows and making a name for themselves. We are a little podcast, with a big heart, spreading the love of not only TTRPG but fellow podcasters! Join us on our Discord! We have a growing, wonderful community, and we’d love to see ya! https://discord.gg/GHmD3KWucw Head over to our website for more info! https://whatthedice. ...
…
continue reading
Welcome to Rewind Reviews a podcast in which Dan and Chris ask the age old question of films from their youth. Was that as good as I remember? Can these films live up to the memory or is childhood nostalgia responsible for rose tinted glasses? Either way, they're going to have a lot of fun rewatching and analysing them!
…
continue reading
Technical interviews about software topics.
…
continue reading
Every Tuesday and Friday, tech journalist Kara Swisher and NYU Professor Scott Galloway offer sharp, unfiltered insights into the biggest stories in tech, business, and politics. They make bold predictions, pick winners and losers, and bicker and banter like no one else. After all, with great power comes great scrutiny. From New York Magazine and the Vox Media Podcast Network.
…
continue reading
Dan Conry - 8:30am to 11am on 1310 WIBA
…
continue reading
About all things AppSec, DevOps, and DevSecOps. Hosted by Mike Shema and John Kinsella, the podcast focuses on helping its audience find and fix software flaws effectively.
…
continue reading
About all things AppSec, DevOps, and DevSecOps. Hosted by Mike Shema and John Kinsella, the podcast focuses on helping its audience find and fix software flaws effectively.
…
continue reading
We are an Indigenous media organisation located in the far north-west of Australia.
…
continue reading
Jordan Cicchelli and Hayley McGoldrick are girls, but like talking sports, duh.
…
continue reading
Welcome to the Security Weekly Podcast Network, your all-in-one source for the latest in cybersecurity! This feed features a diverse lineup of shows, including Application Security Weekly, Business Security Weekly, Paul's Security Weekly, Enterprise Security Weekly, and Security Weekly News. Whether you're a cybersecurity professional, business leader, or tech enthusiast, we cover all angles of the cybersecurity landscape. Tune in for in-depth panel discussions, expert guest interviews, and ...
…
continue reading
This Podcast is created and curated by Deepak Jayaraman (an Executive Coach and a Leadership Advisor). He lives in Mumbai and works with successful Senior Executives by helping them play to their unique potential but with a sharp focus on transitions (business or career). Just like businesses need to think about "where to play" and "how to win", leaders need to be coherent about "where to go" and "how to grow" in their journeys. Deepak works with them during pivotal moments to help them with ...
…
continue reading
Jacob Miller is a Portland, Oregon based singer songwriter. I chatted with Jacob about how is style of writing has evolved, tapping into a more authentic version of himself, his views on being a musician at this stage of his life, his new EP, In A Season of Loving, and more. To keep up with Jacob Miller and the Dan Cable Presents Podcast, please ch…
…
continue reading

1
Balancing AI Opportunities vs. Risks to Drive Better Business Outcomes - Matt Muller, Summer Fowler - BSW #390
1:02:39
1:02:39
Play later
Play later
Lists
Like
Liked
1:02:39This week, it's double AI interview Monday! In our first interview, we discuss how to balance AI opportunities vs. risk. Artificial Intelligence (AI) has the potential to revolutionize how businesses operate. But with this exciting advancement comes new challenges that cannot be ignored. For proactive security and IT leaders, how do you balance the…
…
continue reading

1
DOS, Web Cams, VSCODE, Coinblack, Oracle, P&G, Satan, Sec Gemini, Josh Marpet... - SWN #466
33:48
33:48
Play later
Play later
Lists
Like
Liked
33:48DOS Lives, Web Cams Gone Wild, VSCODE, Coinblack, Oracle, P&G, Satan, Sec Gemini, Shopify, Josh Marpet, and more on the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-466
…
continue reading

1
Market Meltdown, Tariff Winners and Losers, and TikTok Deadline Delayed
1:07:07
1:07:07
Play later
Play later
Lists
Like
Liked
1:07:07Kara and Scott discuss the markets' wild ride thanks to Trump's tariffs, China's retaliation plans, and Howard Lutnick's theory about a manufacturing resurgence coming to the United States. Then, a deeper dive into some of the tariff winners (Warren Buffett), and losers (Big Tech), and some advice for panicked investors. Plus, the TikTok deadline g…
…
continue reading

1
Uber’s On-Call Copilot with Paarth Chothani and Eduards Sidorovics
44:21
44:21
Play later
Play later
Lists
Like
Liked
44:21At Uber, there are many platform teams supporting engineers across the company, and maintaining robust on-call operations is crucial to keeping services functioning smoothly. The prospect of enhancing the efficiency of these engineering teams motivated Uber to create Genie, which is an AI-powered on-call copilot. Genie assists with on-call manageme…
…
continue reading

1
In Search of Secure Design - ASW #325
1:07:36
1:07:36
Play later
Play later
Lists
Like
Liked
1:07:36We have a top ten list entry for Insecure Design, pledges to CISA's Secure by Design principles, and tons of CVEs that fall into familiar categories of flaws. But what does it mean to have a secure design and how do we get there? There are plenty of secure practices that orgs should implement are supply chains, authentication, and the SDLC. Those p…
…
continue reading

1
In Search of Secure Design - ASW #325
1:07:36
1:07:36
Play later
Play later
Lists
Like
Liked
1:07:36We have a top ten list entry for Insecure Design, pledges to CISA's Secure by Design principles, and tons of CVEs that fall into familiar categories of flaws. But what does it mean to have a secure design and how do we get there? There are plenty of secure practices that orgs should implement are supply chains, authentication, and the SDLC. Those p…
…
continue reading

1
In Search of Secure Design - ASW #325
1:07:36
1:07:36
Play later
Play later
Lists
Like
Liked
1:07:36We have a top ten list entry for Insecure Design, pledges to CISA's Secure by Design principles, and tons of CVEs that fall into familiar categories of flaws. But what does it mean to have a secure design and how do we get there? There are plenty of secure practices that orgs should implement are supply chains, authentication, and the SDLC. Those p…
…
continue reading

1
Soft skills for engineers - Evgeniy Kharam, Paul Nguyen - ESW #401
2:03:22
2:03:22
Play later
Play later
Lists
Like
Liked
2:03:22When we use the phrase "talent gap" in cybersecurity, we're usually talking about adding headcount. For this interview, however, we're focusing on a gap that is evident within existing teams and practitioners - the often misunderstood soft skills gap. Side note: I really hate the term "soft skills". How about we call them "fundamental business skil…
…
continue reading

1
AI Doomsday, Hot Robots, Google, palo Alto, Ivanti, CrushFTP, AI, Aaran Leyland... - SWN #465
30:51
30:51
Play later
Play later
Lists
Like
Liked
30:51AI Doomsday, Hot Robots, Google, palo Alto, Ivanti, CrushFTP, AI, Aaran Leyland, and More, on this edition of the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-465
…
continue reading
WTD S2E35 Deadbolt ********************* The other side of the team is up. And they want to get the security system. But there is a problem… ********************* Content Warning: Profanity, sexual references, descriptions of violence, Drug/Alcohol use, and homebrewed rules. ********************* Promo: The Hard Knocks Sorority Podcast Youtube: htt…
…
continue reading

1
Liberation Day, Elon Exit Rumors, and Guest Co-Host Jon Lovett
1:08:42
1:08:42
Play later
Play later
Lists
Like
Liked
1:08:42Kara is joined by Jon Lovett, co-host of Pod Save America and host of Lovett or Leave It. They to discuss Elon Musk’s possible departure from the Trump administration, a Democratic win in Wisconsin, and Cory Booker’s record-breaking speech. Then, Liberation Day liberated us all (and threw the market into chaos), Joe Rogan thinks the Trump administr…
…
continue reading

1
Not-So-Secure Boot - Rob Allen - PSW #868
2:12:35
2:12:35
Play later
Play later
Lists
Like
Liked
2:12:35Rob Allen, Chief Product Officer at Threatlocker joins us for an interview segment on using AI in security products: What works and what's not fully baked! Then in the security news, There are more holes in your boot...loader according to Microsoft, related: Secure Boot is in danger and no one is really talking about it (still), Dear Microsoft: I d…
…
continue reading

1
Turing Award Special: A Conversation with John Hennessy
38:53
38:53
Play later
Play later
Lists
Like
Liked
38:53John Hennessy is a computer scientist, entrepreneur, and academic known for his significant contributions to computer architecture. He co-developed the RISC architecture, which revolutionized modern computing by enabling faster and more efficient processors. Hennessy served as the president of Stanford University from 2000 to 2016 and later co-foun…
…
continue reading

1
Sandy Dann IV with Shire President Chris Mitchell On Cable Beach Upgrades, Housing & Broome’s Big Plans
18:24
18:24
Play later
Play later
Lists
Like
Liked
18:24In this interview, Sandy Dann chats with Shire of Broome President Chris Mitchell about the big changes happening around town — including the next stages of the Cable Beach redevelopment, what the new works will mean for locals and tourists, and how long beach access will be affected.Chris also shares updates on housing developments aimed at easing…
…
continue reading

1
Vulnerability Prioritization Can Produce Better Business Outcomes - Steve Lodin, Greg Fitzgerald - BSW #389
33:34
33:34
Play later
Play later
Lists
Like
Liked
33:34Vulnerability prioritization, the final frontier. Many say they do it, but do they really? It takes way more than vulnerability data to truly prioritize vulnerabilities. Greg Fitzgerald, Co-Founder and CXO at Sevco Security, and Steve Lodin , Vice President, Information Security at Sallie Mae, join Business Security Weekly to dig in. We'll discuss …
…
continue reading

1
Schrodinger, Lucid, Crocodilus, Wordpress, Ivanti, Oracle, Android, Josh Marpet... - SWN #464
29:24
29:24
Play later
Play later
Lists
Like
Liked
29:24Schrodinger's Television, Lucid, Crocodilus, Wordpress, Ivanti, Oracle, Android, Josh Marpet, and more on the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-464
…
continue reading

1
Elon Merges Companies, WHCA Cuts Comedian, and Guest Co-Host Jen Psaki
1:08:49
1:08:49
Play later
Play later
Lists
Like
Liked
1:08:49Kara is joined by Jen Psaki, the host of MSNBC's "Inside with Jen Psaki," to talk all things Signalgate, Trump taking on Big Law, and what's going on with the latest pardons. Then, Elon says the "destiny of humanity" rests on the outcome of the Wisconsin judicial election, and his AI company xAI acquires X. Plus, Jen weighs in on The White House Co…
…
continue reading

1
Sourcegraph and the Frontier of AI in Software Engineering with Beyang Liu
44:19
44:19
Play later
Play later
Lists
Like
Liked
44:19Sourcegraph is a powerful code search and intelligence tool that helps developers navigate and understand large codebases efficiently. It provides advanced search functionality across multiple repositories, making it easier to find references, functions, and dependencies. Additionally, Sourcegraph integrates with various development workflows to st…
…
continue reading

1
Avoiding Appsec's Worst Practices - ASW #324
1:11:19
1:11:19
Play later
Play later
Lists
Like
Liked
1:11:19We take advantage of April Fools to look at some of appsec's myths, mistakes, and behaviors that lead to bad practices. It's easy to get trapped in a status quo of chasing CVEs or discussing which direction to shift security. But scrutinizing decimal points in CVSS scores or rearranging tools misses the opportunity for more strategic thinking. We s…
…
continue reading

1
Avoiding Appsec's Worst Practices - ASW #324
1:11:19
1:11:19
Play later
Play later
Lists
Like
Liked
1:11:19We take advantage of April Fools to look at some of appsec's myths, mistakes, and behaviors that lead to bad practices. It's easy to get trapped in a status quo of chasing CVEs or discussing which direction to shift security. But scrutinizing decimal points in CVSS scores or rearranging tools misses the opportunity for more strategic thinking. We s…
…
continue reading

1
Avoiding Appsec's Worst Practices - ASW #324
1:11:19
1:11:19
Play later
Play later
Lists
Like
Liked
1:11:19We take advantage of April Fools to look at some of appsec's myths, mistakes, and behaviors that lead to bad practices. It's easy to get trapped in a status quo of chasing CVEs or discussing which direction to shift security. But scrutinizing decimal points in CVSS scores or rearranging tools misses the opportunity for more strategic thinking. We s…
…
continue reading

1
Setting up your SIEM for success - Pitfalls to preclude and tips to take - Geoff Cairns, Neil Desai - ESW #400
1:58:15
1:58:15
Play later
Play later
Lists
Like
Liked
1:58:15A successful SIEM deployment depends on a lot more than implementing the SIEM correctly. So many other things in your environment have an impact on your chances of a successful SIEM. Are the right logs enabled? Is your EDR working correctly? Would you notice a sudden increase or decrease in events from critical sources? What can practitioners do to…
…
continue reading

1
Matty J IV with Natalie Ahmat on Neighbour Day 2025
15:27
15:27
Play later
Play later
Lists
Like
Liked
15:27✨ Interview: Matty J & Natalie Ahmat on Neighbour Day 2025 ✨In this heartfelt chat, Matty J catches up with long-time friend of the show, journalist, producer, and proud Mudburra & Wagadagum woman, Natalie Ahmat, to talk all things Neighbour Day — happening this Sunday, March 30th.Together, they dive into why real human connection matters now more …
…
continue reading

1
Mrtentacle, Morphing Meerkat, Tor, VMWare, Waymo, Oracle, Aaran Leyland, and more... - SWN #463
29:26
29:26
Play later
Play later
Lists
Like
Liked
29:26Mrtentacle, Morphing Meerkat, Tor, VMWare, Waymo, Oracle, Aaran Leyland, and More, on this edition of the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-463
…
continue reading
WTD S2E34 Scouting in Target seen, but now they need proof. How hard can it be? ********************* Content Warning: Profanity, sexual references, descriptions of violence, Drug/Alcohol use, and homebrewed rules. ********************** Music from Epidemic Sound Hosting by Podbean Shadowrun is owned by The Topps Company, Inc. and Catalyst Games **…
…
continue reading

1
Signalgate, Auto Tariffs, and Trump's Crypto Empire
1:11:18
1:11:18
Play later
Play later
Lists
Like
Liked
1:11:18Kara and Scott jump right in to discuss all things Signalgate — will heads roll? Then, President Trump has announced a 25% tariff on imported cars, the Trump family announces plans for a stablecoin, and Megyn Kelly is launching a podcast network. Plus, stay tuned for Scott’s prediction on who will fill the leadership void left by the chaos of the T…
…
continue reading

1
SignalGate and How Not To Protect Secrets - PSW #867
2:07:11
2:07:11
Play later
Play later
Lists
Like
Liked
2:07:11How do we handle scope creep for vulnerabilities?, find the bugs before it hits the real world, risk or hype vulnerabilities, RTL-SDR in a browser, using AI to hack AI and protect AI, 73 vulnerabilities of which 0 patches have been issued, Spinning Cats, bypassing WDAC with Teams and JavaScript, Rust will solve all the security problems, did you he…
…
continue reading

1
Turing Award Special: A Conversation with Jeffrey Ullman
37:45
37:45
Play later
Play later
Lists
Like
Liked
37:45Jeffrey Ullman is a renowned computer scientist and professor emeritus at Stanford University, celebrated for his groundbreaking contributions to database systems, compilers, and algorithms. He co-authored influential texts like Principles of Database Systems and Compilers: Principles, Techniques, and Tools (often called the “Dragon Book”), which h…
…
continue reading

1
691: EP 4. Flavour-ful Lives - Sucharita Mukherjee
1:15:34
1:15:34
Play later
Play later
Lists
Like
Liked
1:15:34GUEST: In this episode of FLAVOUR-ful Lives, we feature Sucharita Mukherjee, CEO of Kaleidofin, a FinTech company empowering millions with affordable finance. Sucharita’s story is a powerful example of resilience as transformation rather than simply bouncing back. From her early career at LSR, IIM Ahmedabad, and top-tier banks in London to navigati…
…
continue reading

1
The Pace of Investments Requires Better Risk Management, Boards Challenged, & More - BSW #388
1:07:22
1:07:22
Play later
Play later
Lists
Like
Liked
1:07:22Cybersecurity teams were under increasing strain in 2024. To alleviate this burden, 2025 will see greater reliance on automation to streamline workflows, enhance threat detection, and accelerate incident response. But some of these investments may come with risks. Greg Sullivan, Founding Partner at CIOSO Global, joins Business Security Weekly to di…
…
continue reading

1
Curdled Miscreant, VanHelsing, MFA, Room 237, MFA, Velora, 23nMe, Josh Marpet... - SWN #462
33:11
33:11
Play later
Play later
Lists
Like
Liked
33:11Curdled Miscreant, VanHelsing, MFA, Room 237, MFA, Velora, 23nMe, Josh Marpet, and more on the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-462
…
continue reading

1
Meta Tell-All, Elon's Daughter Speaks Out, Cybertruck Recall
1:09:05
1:09:05
Play later
Play later
Lists
Like
Liked
1:09:05Kara and Scott discuss the Meta tell-all that's become a bestseller, the latest attempt to sunset Section 230, and RFK Jr.'s justification for banning phones in schools. Then, Elon Musk's visit to the Pentagon is raising questions about his conflicts of interest, especially as SpaceX prepares to get a windfall from government contracts. Plus, the m…
…
continue reading

1
Knowledge Graphs as Agentic Memory with Daniel Chalef
53:39
53:39
Play later
Play later
Lists
Like
Liked
53:39Contextual memory in AI is a major challenge because current models struggle to retain and recall relevant information over time. While humans can build long-term semantic relationships, AI systems often rely on fixed context windows, leading to loss of important past interactions. Zep is a startup that’s developing a memory layer for AI agents usi…
…
continue reading

1
Finding a Use for GenAI in AppSec - Keith Hoodlet - ASW #323
54:08
54:08
Play later
Play later
Lists
Like
Liked
54:08LLMs are helping devs write code, but is it secure code? How are LLMs helping appsec teams? Keith Hoodlet returns to talk about where he's seen value from genAI, where it fits in with tools like source code analysis and fuzzers, and where its limitations mean we'll be relying on humans for a while. Those limitations don't mean appsec should dismiss…
…
continue reading

1
Finding a Use for GenAI in AppSec - Keith Hoodlet - ASW #323
54:08
54:08
Play later
Play later
Lists
Like
Liked
54:08LLMs are helping devs write code, but is it secure code? How are LLMs helping appsec teams? Keith Hoodlet returns to talk about where he's seen value from genAI, where it fits in with tools like source code analysis and fuzzers, and where its limitations mean we'll be relying on humans for a while. Those limitations don't mean appsec should dismiss…
…
continue reading

1
Finding a Use for GenAI in AppSec - Keith Hoodlet - ASW #323
54:08
54:08
Play later
Play later
Lists
Like
Liked
54:08LLMs are helping devs write code, but is it secure code? How are LLMs helping appsec teams? Keith Hoodlet returns to talk about where he's seen value from genAI, where it fits in with tools like source code analysis and fuzzers, and where its limitations mean we'll be relying on humans for a while. Those limitations don't mean appsec should dismiss…
…
continue reading

1
Building the SOC of the Future - JP Bourget, Michael Mumcuoglu - ESW #399
1:50:43
1:50:43
Play later
Play later
Lists
Like
Liked
1:50:43What does a mature SecOps team look like? There is pressure to do more with less staff, increase efficiency and reduce costs. JP Bourget's experience has led him to believe that the answer isn't a tool upgrade, it's better planning, architecture, and process. In this interview, we'll discuss some of the common mistakes SecOps teams make, and where …
…
continue reading

1
Orange Drop Caps, apps, Veeam, jobs, Heathrow, vpentest, Aaran Leyland, and More... - SWN #461
33:05
33:05
Play later
Play later
Lists
Like
Liked
33:05Orange Drop Caps, apps, Veeam, jobs, Heathrow, vpentest, Aaran Leyland, and More are on this edition of the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-461
…
continue reading