Search a title or topic

Over 20 million podcasts, powered by 

Player FM logo

2 Bears 2 Beers Podcasts

show episodes
 
Artwork

1
2 Bears 2 Beers

2 Bears 2 Beers

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
"2 Bears 2 Beers" is a fun and laid-back podcast where two friends, often indulging in a beer or two, chat about anything and everything. From quirky stories to random thoughts, it’s all about enjoying great conversation and sharing laughs in a relaxed, no-pressure vibe. Perfect for anyone looking to unwind and have a good time!
  continue reading
 
Volcanoes. Trees. Drunk butterflies. Mars missions. Slug sex. Death. Beauty standards. Anxiety busters. Beer science. Bee drama. Take away a pocket full of science knowledge and charming, bizarre stories about what fuels these professional -ologists' obsessions. Humorist and science correspondent Alie Ward asks smart people stupid questions and the answers might change your life.
  continue reading
 
Artwork

1
Troubled Waters

MaximumFun.org

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
Troubled Waters is the pop culture quiz show where comedians disagree to disagree. Twice a month, Dave will stoke pointless arguments between two teams of comedians and make them compete against each other in order to settle their meaningless debates once and for all. Winner takes home the right to be right.
  continue reading
 
Me and hopefully some of my friends sitting around telling hilarious stories from our past and present. Drinking a few beers, laughing and roasting each other. I’d like to interview local comics from the New England / New York area. But we’ll see what happens. My possible cohost may have some more ideas on the pod cast future as well. Try it out and see.
  continue reading
 
Artwork

1
Bar Room Debates

Matt and Turbo

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Debates moderated by beer and fried food. Who is the greatest running back of all time? Who is the least successful serial killer of all time? What bear is best? Along with the occasional beer or food review and a game every now and then, Bar Room Debates makes a great place to relax with a cold one and argue with strangers
  continue reading
 
Artwork
 
Welcome to the Security Weekly Podcast Network, your all-in-one source for the latest in cybersecurity! This feed features a diverse lineup of shows, including Application Security Weekly, Business Security Weekly, Paul's Security Weekly, Enterprise Security Weekly, and Security Weekly News. Whether you're a cybersecurity professional, business leader, or tech enthusiast, we cover all angles of the cybersecurity landscape. Tune in for in-depth panel discussions, expert guest interviews, and ...
  continue reading
 
Loading …
show series
 
In this lively conversation, Grizz and Ice Bear explore a variety of topics ranging from their favorite beers to memorable concerts, movie critiques, and nostalgic wrestling moments. They share their thoughts on recent films like Jurassic Park and Five Nights at Freddy's, discuss character development in storytelling, and reflect on the evolution o…
  continue reading
 
We’re back with molten hot cheese trivia in Part 2 with Fromologist Kyra James of OwnYourFunk.com. Part 1 covered the foundations and this week we address your listener questions about cows on boats, plant-based cheese options, how to properly store cheese, how cheese changes your brain chemistry, the Cooper's Hill Cheese-Rolling and Wake, the grea…
  continue reading
 
This week, our MaxFun friends Tom Lum and Christian Duguay join Dave for lesser known Superman/Fantastic Four cohorts, Oasis and Green Day song trivia, and Pixar sequel pitches. Tom Lum would like to plug Let's Learn Everything and Our Findings and recommends A Guide to Making Friends in the Fourth Dimension Christian Duguay would like to plug Vall…
  continue reading
 
What are some appsec basics? There's no monolithic appsec role. Broadly speaking, appsec tends to branch into engineering or compliance paths, each with different areas of focus despite having shared vocabularies and the (hopefully!) shared goal of protecting software, data, and users. The better question is, "What do you want to secure?" We discus…
  continue reading
 
SPONSORS:- Start your free online visit today at https://Hims.com/BEARS.- Go to https://quince.com/bears for free shipping on your order and 365 day returns.- Get up to $200 off Square hardware when you sign up at https://square.com/go/bears! #squarepod - Order a bottle of Por Osos and some killer merch online https://drinkporosos.comThis week on 2…
  continue reading
 
Segment 1: Interview with Monzy Merza - There is a Right and Wrong Way to use AI in the SOC In the rush to score AI funding dollars, a lot of startups build a basic wrapper around existing generative AI services like those offered by OpenAI and Anthropic. As a result, these services are expensive, and don't satisfy many security operations teams' p…
  continue reading
 
This week in the security news: Citrixbleed 2 and so many failures Ruckus leads the way on how not to handle vulnerabilities When you have no egress Applocker bypass So you bought earbuds from TikTok More gadgets and the crazy radio Cheap drones and android apps Best Mario Kart controller ever VSCode: You're forked Bluetooth earbuds and vulnerabili…
  continue reading
 
SEC settles with SolarWinds. We react! In the leadership and communications section, The Skills and Habits Aspiring CEOs Need to Build, Why People Really Quit — And How Great Managers Make Them Want to Stay, The Small Actions That Become Your Legacy, and more! Visit https://www.securityweekly.com/bsw for all the latest episodes! Show Notes: https:/…
  continue reading
 
Soft. Hard. Fresh. Aged. Stinky. Illegal. Let’s talk cheese with Certified Cheese Professional (CCP) and Fromologist, Kyra James. We chat about proprietary bacterial slurries, basement caves, cheese knife etiquette, rind eating, vegetarian versus vegan cheeses, cheese history, different warm-blooded animals whose milk is used for cheese, American c…
  continue reading
 
Appsec still deals with ancient vulns like SQL injection and XSS. And now LLMs are generating code along side humans. Sandy Carielli and Janet Worthington join us once again to discuss what all this new code means for appsec practices. On a positive note, the prevalence of those ancient vulns seems to be diminishing, but the rising use of LLMs is e…
  continue reading
 
Welcome to Episode 88 of Beer with Bear, featuring the Henhouse Stranglers, recorded live in Riverside, California, just outside the Hideaway Bar before their performance for previous guest, the Test Pilots. Joining us from Texas are Lane on vocals, Tristan on guitar, Skully on drums, and Sama on upright bass. We had a fantastic conversation, and t…
  continue reading
 
SPONSORS:- Order on DoorDash and save big during Summer of DashPass. Sign up today! DashPass benefits apply only to eligible orders. Terms apply.- Sponsored by BetterHelp. Our listeners get 10% off their first month at https://betterhelp.com/bears- Make life easier by getting harder and discover your options at https://BlueChew.com! And we’ve got a…
  continue reading
 
Single Sign On (SSO) and Multi Factor Authentication (MFA) is critical to secure operations for companies of all sizes. Why is the foundation of cybersecurity still locked behind enterprise licensing? Single Sign-On (SSO) and Multi-Factor Authentication (MFA) are essential—not optional—for protecting modern businesses. But today, these critical too…
  continue reading
 
This week, we dive into the world of Meshtastic and LoRa—two technologies empowering secure, long-range, and infrastructure-free communication. We'll talk about the origins of Meshtastic, how LoRa radio works, and why mesh networking is revolutionizing off-grid messaging for adventurers, hackers, emergency responders, and privacy advocates alike. W…
  continue reading
 
Grizz and Ice Bear navigate through a variety of topics, including their beer reviews, moving plans, driving habits, and reflections on past podcast episodes. They share their thoughts on fitness, food adventures, and cultural insights, particularly focusing on travel plans to Korea and Japan. The conversation is light-hearted and humorous, showcas…
  continue reading
 
New research estimates the value of Zero Trust. Using the Marsh McLennan Cyber Risk Intelligence Center’s proprietary cyber losses dataset from the past eight years, researchers estimated that overall cyber losses could have been potentially reduced by up to 31% had the organizations widely deployed zero-trust security. This adds up to a projected …
  continue reading
 
Let’s light up your life and butt. World-renowned firefly expert Dr. Sara Lewis of Tufts University gives us some updates to her 2021 episode, sharing her love of a bug that many think is merely mythological. Learn how these tiny animals illuminate the night, the dos and don’ts of firefly observation, how to take good firefly photos, femme fatales,…
  continue reading
 
During the 2025 MaxFunDrive, we promised yall if we reach our support stretch goal, we'd make a special D&D episode! Well, we reached that goal and got right to work. Join Dave Holmes, Riley Silverman, John-Luke Roberts, producer Christian, and special guest Austin Taylor of Secret Histories of Nerd Mysteries on a rip roaring musical adventure! DM'…
  continue reading
 
Manual secure code reviews can be tedious and time intensive if you're just going through checklists. There's plenty of room for linters and compilers and all the grep-like tools to find flaws. Louis Nyffenegger describes the steps of a successful code review process. It's a process that starts with understanding code, which can even benefit from a…
  continue reading
 
SPONSORS:- Use code BEARS at https://www.monarchmoney.com/bears in your browser for 50% your first year.- Get started at https://factormeals.com/bears50off and use code bears50off to get 50 percent off plus FREE shipping on your first box. This week on 2 Bears 1 Cave, Tom checks in on Bert’s intestine surgery and his new commitment to being loud, r…
  continue reading
 
Interview with Dave Lewis Organizations believe they have a firm grip on security with SSO and corporate IT policies, but in reality, shadow IT lurks in the background—expanding attack surfaces and exposing sensitive data. Employees bypass security controls for the sake of convenience, while SSO fails to provide the comprehensive security net organ…
  continue reading
 
The conversation is a lively exchange between two hosts, filled with nostalgia for music devices, gaming consoles, and reflections on political history. They share personal anecdotes about their favorite tech from their youth, discuss the evolution of gaming, and touch on cultural experiences, including food preferences. The dialogue is punctuated …
  continue reading
 
This conversation explores the intersection of cybersecurity and emerging technologies, focusing on innovative hacking techniques, the evolution of vulnerability management, and the critical importance of asset discovery. The discussion also delves into the implications of cyber warfare, the persistent threat of default passwords, and the integrati…
  continue reading
 
In this episode, Mandy Logan, Summer Craze Fowler, Jason Albuquerque, and Jeff Pollard of Forrester discuss the challenges and strategies for CISOs in navigating volatility in the security landscape. They emphasize the importance of building relationships within the organization, particularly with the CFO, to manage budgets effectively. The convers…
  continue reading
 
Fangs. Rattles. Misconceptions. Crawl out from under your rock for the angelic rattle of one of the world’s most maligned, misunderstood, gorgeous, mysterious, efficient creatures. Herpetology professor, rattlesnake scientist and thus, Crotalologist Dr. Emily Taylor discusses why rattlesnakes deserve our love, the parenthood strategies of rattlers,…
  continue reading
 
In this episode of Security Weekly News, Doug White discusses various cybersecurity threats, including the Salt Typhoon and Spark Kitty malware, the implications of Microsoft's decision to drop support for old hardware drivers, and the potential increase in cyber threats from Iran. The conversation also covers the alarming 16 billion password leak …
  continue reading
 
Fuzzing has been one of the most successful ways to improve software quality. And it demonstrates how improving software quality improves security. Artur Cygan shares his experience in building and applying fuzzers to barcode scanners, smart contracts, and just about any code you can imagine. We go through the useful relationship between unit tests…
  continue reading
 
Check out Jim's new special Unconceivable right now on YouTube! Watch is here: https://www.youtube.com/watch?v=rb05fiUz6cU SPONSORS: -Our listeners get 10% off their first month at https://betterhelp.com/bears -Get up to $200 off Square hardware when you sign up at http://square.com/go/bears ! #squarepod This week on 2 Bears 1 Cave, Tom Segura is j…
  continue reading
 
In fast-paced, shared device environments like healthcare, manufacturing, and other critical industries, traditional access management approaches are falling short, quietly eroding both security and productivity. This episode explores how outdated methods, like shared credentials and clunky logins, create friction, increase risk, and undermine comp…
  continue reading
 
This week: * The true details around Salt Typhoon are still unknown * The search for a portable pen testing device * Directories named "hacker2" are suspicious * Can a $24 cable compete with a $180 cable? * Hacking Tesla wall chargers * Old Zyxel exploits are new again * Hacking Asus drivers * Stealing KIAs - but not like you may think * Fake artic…
  continue reading
 
Summary In this lively conversation, Grizz and Ice Bear explore various beers, share personal anecdotes, and delve into nostalgic memories of childhood pool experiences. They discuss the flavors and characteristics of different beers, cultural references from movies, and the significance of pouring out for the departed. The conversation flows seaml…
  continue reading
 
In this episode of Business Security Weekly, Mandy Logan, along with guests Peter Hedberg, Summer Craze Fowler, and Ben Carr, delve into the complexities of cyber insurance and the empowerment of Chief Information Security Officers (CISOs). The discussion covers the evolving landscape of cyber insurance, the critical role of underwriting, and the i…
  continue reading
 
Farmed versus wild. Basement shrimp hustles. Mangrove drama. Anthropology. Animal welfare and plant-based diets. Climb aboard to meet UCSB’s super cool dude, researcher and Aquaculture Ecologist, Dr. Ben Halpern. You’ll hear about sustainable food sources, land vs. sea farming, bycatch, shellfish guilt, salmon who wear makeup, global marine populat…
  continue reading
 
What makes a threat modeling process effective? Do you need a long list of threat actors? Do you need a long list of terms? What about a short list like STRIDE? Has an effective process ever come out of a list? Farshad Abasi joins our discussion as we explain why the answer to most of those questions is No and describe the kinds of approaches that …
  continue reading
 
This week, our MaxFun friends Katie Goldin and John Moe join Dave for some Pixar films, custom popcorn buckets, and Muppet music trivia Katie Goldin would like to plug Secretly Incredibly Fascinating and Creature Feature and recommends Pants John Moe would like to plug Depresh Mode, Sleeping with Celebrities, his band Math Emergency, and his upcomi…
  continue reading
 
SPONSORS:- Your summer wardrobe awaits! Get 20% off @chubbies with the code cave at https://www.chubbiesshorts.com/cave #chubbiespod - Sign up for a $1 per month trial period at https://shopify.com/bears.- Order a bottle of Por Osos and some killer merch online https://drinkporosos.comThis week on 2 Bears 1 Cave, Tom Segura and Bart Kersher are joi…
  continue reading
 
Segment 1 - Interview with Rob Allen from ThreatLocker This segment is sponsored by ThreatLocker. Visit https://www.securityweekly.com/threatlocker to learn more about them! Segment 2 - Topic: Growing Trend - Edge Computing and Hybrid Cloud Segment 3 - Interviews from RSAC 2025 Cyera Cyera is the fastest-growing data security company in history, em…
  continue reading
 
Loading …
Copyright 2025 | Privacy Policy | Terms of Service | | Copyright
Listen to this show while you explore
Play