show episodes
 
Learn how to break into cybersecurity, build new skills and move up the career ladder. Each week on the Cyber Work Podcast, host Chris Sienko sits down with thought leaders from Carbon Black, IBM, CompTIA and others to discuss the latest cybersecurity workforce trends.
 
Undermine is the definitive Phish podcast. The first season will focus on Phish’s genesis in the 1980s—through deep-dives into the music, shows and songs; interviews with people who were there for the early years; and discussion about the lasting impact of these foundational years. Undermine is a combination of Under the Scales, Helping Friendly Podcast and Beyond the Pond. Presented by Osiris Media.
 
Welcome to Beyond The Pond! We’re two massive Phish fans who are using the music of Phish to introduce you to new and interesting music we think you’ll love! Because we love the Phish. We are Phish fans. But sometimes you gotta break out of your comfort zone and go beyond the pond. A proud member of the Osiris Podcast Network. Support this show http://supporter.acast.com/beyondthepond.
 
Harris and Scott are comedians, music lovers, and friends. Where do they differ? Harris loves Phish, and Scott does not. On Analyze Phish, Harris navigates the vast landscape of Phish's catalogue to find entry points for Scott while trying to explain the live Phish experience without the use of illegal substances.
 
Chris Parker, the founder of WhatIsMyIPAddress.com, interviews guests and tells real-life stories about topics to open your eyes to the danger and traps lurking in the real world, ranging from online scams and frauds to everyday situations where people are trying to take advantage of you—for their gain and your loss. Our goal is to educate and equip you, so you learn how to spot the warnings signs of trouble, take quick action, and lower the risk of becoming a victim.
 
Join your hosts TheKid Himself and TheLza on Gotta Jabrew, the podcast that discusses their two favorite things, Phish and Beer. Listen as they traverse various aspects of their favorite band as well as brewing tips, destination beer cities, and review new craft beer and local NY breweries. All this and more, set to the tunes of the greatest band of all time. Tune in each week for the podcast that makes the world just a little bit Phriendlier!
 
A weekly podcast providing fraud prevention and vendor setup training to protect the vendor master file. Immediate takeaways with actionable steps you can implement today into your vendor onboarding and maintenance process to reduce fraud and regulatory fines. Great tips for the Accounts Payable and Procurement teams to clean-up their vendor data, clean-up their vendor processes so that they can pay the right vendor.
 
The definitive retrospective of one of music’s most memorable festivals, Phish’s Big Cypress. In December of 1999, Phish drew an estimated 80,000 to the Big Cypress Indian Reservation in Florida’s Everglades, making this festival the largest Millennium Eve concert on earth. We look back on the festival 20 years later—and examine the legacy for Phish and the music world. Hosted and narrated by Jesse Jarnow, this five-episode series draws on interviews with members of Phish and its crew, fan m ...
 
Geared towards Deadheads, Phishheads and the jam band community, The Sound Podcast is a music discovery interview style podcast, hosted by Ira Haberman. Featuring Jam Bands and more... much more. Rooted in Americana, Blues, Bluegrass, Country, Folk, Funk, Jazz, Reggae, Rock, Soul but mostly Jam Band music. New episodes of The Sound Podcast are available Monday, Wednesday and Friday (and more if we can). The Wednesday episode is exclusively a live music playlist called LIVEFIVE powered by nug ...
 
Christian Hip-Hop and Urban Gospel (R&P) that represents the Kingdom. We spin the major and indie artists, new releases, and the classics. Through our live stream and podcasts, you hear Christian Rap mix shows from DJs such as DJ Severe, Doxa Dorea, DJ LostNFound, DJ Tituz, and Mr. Tibbs. You'll hear songs from artists such as: 5ive, A.I The Anomaly, Andy Mineo, Angie Rose, Armond Wakeup, AV3, B.E.R.I.D.O.X., Big Fil, Big Yae, Bizzle, Bridgewater, Brinson, Cephas, Chaz Hofler, Chrys Jones, C ...
 
They were college radio DJs during the 90s. They helped expose bands like Nirvana, Pavement, and PJ Harvey to the masses. They went to shows, interviewed musicians, and reviewed albums. They worked security at concerts and once, even did load-in for a Phish show. Now they’re dads. Whether you want to explore lesser-known music or take a trip down memory lane tune in to The New Dad Rock. Hosts, Steve and Keith, share their love of music across eras and genres while helping you, the listener, ...
 
On Phemale-Centrics we discuss all things Phish from a woman's point of view. Join us as we interview Phish's community members, play games like "Market Price" and discuss the latest goings on in the Phish scene, both on-line and on Lot! Your host is Dawneebee! Co-hosts are a rotating cast of her phriends including Jillian, Kristie, Merry, Baker & Lauren and her husband Jason "Snakey".
 
Talkhouse is a media company and outlet for musicians, actors, filmmakers, and others in their respective fields. Artists write essays and criticism from firsthand perspectives, speak one-on-one with their peers via the Talkhouse Podcast and Talkhouse Live events, and offer readers and listeners unique insight into creative work of all genres and generations. In short— Talkhouse is writing and conversations about music and film, from the people who make them.
 
What really happens when a hacker snatches all your data? Breach digs into the who, why and how of history’s most notorious data breaches. Hosted by journalist Bob Sullivan and producer Alia Tavakolian. Season 2 - Equifax: the worst breach ever. How hackers stole the most valuable data of 145 million people, why it matters, and what we can do about it.
 
Osiris Media presents The Drop, a daily podcast sharing music news, artist interviews, and highlights from across the Osiris network. The Drop is brought to you by CashorTrade. Osiris works in media partnership with JamBase.
 
We take an expert look at the latest cybersecurity incidents, how they happened, and why. Tune in weekly to learn what you can do to stop bad things from happening to you! Got questions/suggestions/stories to share? Email: tips@sophos.com Twitter: @NakedSecurity Instagram: @NakedSecurity
 
The Helping Friendly Podcast (HFPod) explores the music and fan experience of Phish, through interviews and deep dives on shows and tours. Since 2013, we’ve aimed to bring the fan voice into discussions about Phish, and with the help of our guests, we’re still discovering new angles of appreciation for the band. And when the band is on tour, we provide a review of every show the following day with a fan who was there. As one of our listeners said, “this show has impeccable analysis, stats, c ...
 
From the team that brought you Root of Evil and Gangster Capitalism, comes a brand-new series, Long May They Run, a groundbreaking music documentary podcast series. Season One focuses on the band Phish. There are great bands and there are great albums. But, there are only a handful of artists who have sold out stadiums for decades, redefined the bond between artist and fans, influenced a way of life, and innovated an entire industry along the way. Hosted by music journalist Dean Budnick, LMT ...
 
Loading …
show series
 
Well-constructed phishing and smishing are reported out of Tehran. Estimates of SolarWinds compromise insurance payouts. Notes from industry on the convergence of criminal and espionage TTPs. Social engineering hooks baited with greed. Ring patches a bug that could have exposed users’ geolocation (and their reports of crime). Advice on cyber best p…
 
Dave's got the story of a landlord who may run afoul of the Computer Fraud and Abuse Act, Ben wonders if the big tech CEOs could be held liable for contact tracking apps, and later in the show my conversation with Joseph Cox. He is a Senior Staff Writer at Motherboard and will be discussing his recent article How Big Companies Spy on Your Emails. W…
 
In this episode, Chris Hadnagy and Ryan MacDougall are joined by industry professional, Marcus Sailler to discuss his experience as the red team information security manager at Capital Group. Marcus shares some great tips on creating a successful security team and how you can prevent it from becoming the "No Police". They also go over the recent ch…
 
Microsoft's Corporate Vice President of Cybersecurity Business Development Ann Johnson brings us on her career journey from aspiring lawyer to cybersecurity executive. After pivoting from studying law, Ann started working with computers and found she had a deep technical aptitude for technology and started earning certifications landing in cybersec…
 
This week it's just Brian while RJ disappears somewhere. We kick things off with a rundown of a few of the great podcasts put out by Osiris this week before diving into Weekend Spins. Podcasts Discussed: Trick Bag w/ Neil The Night Howler Salute The Songbird w/ Maggie Rose—Jennifer Hartswick Comes A Time—Capitol Insurrection Undermine—Trailer Album…
 
Guest Selena Larson, senior cyber threat analyst at Dragos, Inc., joins us to discuss their research into recent observations of ICS-targeting threats to manufacturing organizations. Cyber risk to the manufacturing sector is increasing, led by disruptive cyberattacks impacting industrial processes, intrusions enabling information gathering and proc…
 
The Security Perimeter must follow wherever humans work and extend to wherever the assets reside, which in the last 12 month has meant anywhere and everywhere. SASE provides a fundamentally new way to think about delivering network security, enabling organisations to more flexibly adapt to new ways of working and the delivery of applications. Liste…
 
There are other things going on besides Solorigate and deplatforming. There’s news about the SideWinder threat actor and its interest in South Asian cyberespionage targets. Google’s Project Zero describes a complex and expensive criminal effort. CISA discusses threats to cloud users, and offers some security recommendations. A scam-as-a-service aff…
 
We explain how two French researchers hacked a Google Titan security key (but why you don't need to panic), and dig into the Mimecast certificate compromise story to see what we can all learn from it. With Kimberly Truong, Doug Aamoth and Paul Ducklin Original music by Edith Mudge Got questions/suggestions/stories to share? Email tips@sophos.com Tw…
 
My podcast guest today is the founder of Happy AP in the UK and she is returning to give us an update on Brexit now that 2020 is past and so has January 1st, 2021 when the Brexit rules/regulations are now in place. What does that mean for Accounts Payable (AP) and what lesson did she learn from working remotely in 2020? Keep listening. Check out my…
 
This week Fabio Viggiani hangs out to talk about supply chain attacks, ransomware, mapping your software dependencies and assuming breach. My 3 main takeaways were 1) his insights into reverse engineering the SolarWinds Orion malware 2) Up-in-coming trends he sees in ransomware and 3) how he runs incident response investigations For more informatio…
 
On the latest episode of the Talkhouse Podcast, actress Robin Tunney chats with multihyphenate extraordinaire Alexi Pappas, the filmmaker and Olympic athlete whose excellent new memoir, Bravey: Chasing Dreams, Befriending Pain and Other Big Ideas, is out now through Random House. Tunney, most recently seen in CBS’ The Fix and best known for her rol…
 
Speculation grows that the Solarigate threat actors were also behind the Mimecast compromise. SolarLeaks says it has the goods taken from FireEye and SolarWinds, but caveat emptor. Notes on Patch Tuesday. Joe Carrigan has thoughts on a WhatsApp ultimatum. Our guest is Andrew Cheung of 01 Communique with an update on quantum computing. And farewell …
 
In this episode, we deviate a bit from our traditional topics to incorporate the growing diversity in the Infosec world. In the past, this has been a male dominated field, but the culture is changing. Our guest today is Eleanor Dallway. Eleanor is the Editorial Director at Infosecurity Magazine, and she is at the front of the security industry. She…
 
A cyberespionage campaign, so far not attributed to any threat actor, continues to prospect government and industry targets in Colombia. A new bit of malware is found in the SolarWinds backdoor compromise. Mimecast certificates are compromised in another apparent software supply chain incident. Ubiquiti tells users to reset their passwords. A brief…
 
Another quest to define the boundaries of the obscure realm known only as The New Dad Rock. This week, the Dads' focus is on the New as Keith introduces Steve to a grab bag of recent artists each seeking to join the pantheon of The New Dad Rock. The contenders are: Fall Out Boy Sturgill Simpson Darius Rucker HARDY Senking Jon Hopkins Basti Grub Dog…
 
Tituzthedj is spinning the hottest Christian hip hop this Christmas from Hulvey, Lecrae, KB, Ty Brasel, A.I. The Anomaly, Jered Sanders, and a host of other artists. Listen live! Every Other Saturday at 4 PM ET - Online, Mobile App or Alexa - www.holycultureradio.com #music #Christian #Christianhiphopartist #Christianrapartist #Jesus #Christianmusi…
 
Similarities are found between Sunburst backdoor code and malware used by Turla. CISA expands advice on dealing with Solorigate. Courts revert to paper...and USB drives. More members of the US Congress report devices stolen during last week’s riot. Online inspiration for violence seems distributed, not centralized. Caleb Barlow examines protocols f…
 
Look, I'm not even gonna sugarcoat it: This episode is about Neon Genesis Evangelion, which is like a whoooooooole thing, and I can't blame you for being intimidated by it if you haven't seen it. That being said, our guest today, Super Dating Simulator's Sara Brown (@saraisnotfamous) does a really really good job of making this wet and wild world f…
 
Learn all about Kubernetes, its possible misconfigurations and vulnerabilities, and how it applies to cloud security on today’s episode, featuring Michael Foster, a Cloud Native Advocate at StackRox. Michael discusses intrinsic Kubernetes security issues compared with those that come from improper use, the work of a Cloud Security Advocate, his tim…
 
In this special episode, Chris Hadnagy joins Maxie Reynolds to talk about the amazing stories and useful lessons contained in Chris’s new book: “Human Hacking: Win Friends, Influence People, and Leave Them Better Off for Having Met You”. Listen as Chris delves into the process of making “Human Hacking” and shares the awesome story behind its incept…
 
Listen live! DJ Severe is in the mix with songs from Keya Smith, Originale, Paul Hernandez, Sevin, Thi'sl, Jarred Allstar, Kajmir Kwest and, many more. Every Sunday at 2 PM ET - online, mobile app or Alexa - www.holycultureradio.com #music #Christian #Christianhiphopartist #Christianrapartist #Jesus #Christianmusicartists #hiphopbeats…
 
Vice President of Security and Support Operations of Alert Logic Tom Gorup shares how his career path led him from tactics learned in Army infantry using machine guns and claymores to cybersecurity replacing the artillery with antivirus and firewalls. Tom built a security automation solution called the Grunt (in recollection of his role in the Army…
 
We wanted to bring you some dreamy, interesting, vibey music for winter. Selections are below. Here’s a playlist with all of the Weekend Spins recommendations, which is updated weekly. Please give us a review on Apple Podcasts or wherever you get your podcasts. Also, please check out Salute the Songbird with Maggie Rose! Albums for this week: Natha…
 
Deep Instinct's Shimon Oren joins us to talk about his team's research on "Why Emotet's latest wave is harder to catch than ever before - Part 2." Emotet appears to have reemerged more evasive than before, this time with a payload delivered from a loader that security tools aren’t equipped to handle. Emotet, the largest malware botnet today, starte…
 
Solorigate and its effect on sensitive corporate information. The DC riots show the cybersecurity consequences of brute physical access to systems. A North Korean APT resurfaces with the RokRat Trojan. Ransomware remains very lucrative, and why? Because people continue to pay up. Thomas Etheridge from CrowdStrike on The Role of Outside Counsel in t…
 
A software supply chain attack put SolarWinds in the headlines of every news publication in America. In this episode, we’re joined by Tim LeMaster, Director of Systems Engineering at Lookout, to discuss what happened, whether this could happen to mobile devices and how a Zero Trust security model can safeguard your infrastructure. --- Send in a voi…
 
CISA updates its guidance on Solorigate, and issues an alert that the threat actor may have used attack vectors other than the much-discussed SolarWinds backdoor. Some reports suggest that a widely used development tool produced by a Czech firm may have been compromised. The cyberespionage campaign is now known to have extended to the Department of…
 
We advise you how to react when a friend suddenly asks for money, explain why Chromium is finally aiming for HTTPS by default, and warn you why you should never, ever hardcode passwords into your software. With Kimberly Truong, Doug Aamoth and Paul Ducklin. Original music by Edith Mudge Got questions/suggestions/stories to share? Email tips@sophos.…
 
This week Josh Sokol joins the show talk about managing risk with a focus on keeping it simple, turning a free open source project into a business and his suggestions on how to get started in InfoSec. My 3 main takeaways were 1) the three components of risk mitigation 2) the different level of maturity within risk management programs and 3) his pro…
 
Loading …

Quick Reference Guide

Copyright 2021 | Sitemap | Privacy Policy | Terms of Service
Google login Twitter login Classic login