Search a title or topic

Over 20 million podcasts, powered by 

Player FM logo

Phish Podcasts

show episodes
 
Insuphishient is a Phish podcast hosted by Matt and Nick — a 500-episode series dedicated to exploring the music, culture, and one-of-a-kind universe of the greatest band of all time. With no set setlists and no rules, each episode dives into Phish shows, band lore, and wild theories — blending deep insights with hilarious hot takes. Whether you’re a seasoned fan or just discovering Phish, there’s a spot for you here. Each week follows a groove of its own: Monday: Soundcheck — setting the st ...
  continue reading
 
Artwork

1
Beyond The Pond

Beyond The Pond/Osiris Media

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Welcome to Beyond The Pond! We’re two massive Phish fans who are using the music of Phish to introduce you to new and interesting music we think you’ll love! Because we love the Phish. We are Phish fans. But sometimes you gotta break out of your comfort zone and go beyond the pond. A proud member of the Osiris Podcast Network. Hosted on Acast. See acast.com/privacy for more information.
  continue reading
 
The Helping Friendly Podcast (HFPod) explores the music and fan experience of Phish, through interviews and deep dives on shows and tours. Since 2013, we’ve aimed to bring the fan voice into discussions about Phish, and with the help of our guests, we’re still discovering new angles of appreciation for the band. And when the band is on tour, we provide a review of every show the following day with a fan who was there. As one of our listeners said, “this show has impeccable analysis, stats, c ...
  continue reading
 
Artwork

1
Easy Prey

Chris Parker

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
Chris Parker, the founder of WhatIsMyIPAddress.com, interviews guests and tells real-life stories about topics to open your eyes to the danger and traps lurking in the real world, ranging from online scams and frauds to everyday situations where people are trying to take advantage of you—for their gain and your loss. Our goal is to educate and equip you, so you learn how to spot the warning signs of trouble, take quick action, and lower the risk of becoming a victim.
  continue reading
 
Artwork

1
Hidden Jukebox

Jake Amster and Matthew Amster-Burton

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Jake Amster and Matthew Amster-Burton, two Seattle music nerds and actual brothers, take you on an audio tour of the best albums of the 90s, from R.E.M. to T.L.C., Snoop Dogg to Phish.
  continue reading
 
Artwork

1
Analyze Phish

Earwolf & Harris Wittels, Scott Aukerman

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Harris and Scott are comedians, music lovers, and friends. Where do they differ? Harris loves Phish, and Scott does not. On Analyze Phish, Harris navigates the vast landscape of Phish's catalogue to find entry points for Scott while trying to explain the live Phish experience without the use of illegal substances.
  continue reading
 
Artwork
 
Cypher Tech Hacks is an electrifying deep dive into the world of cyber scams and digital deceptions, where host Alex Cipher unpacks intricate hacking techniques into simple, step-by-step explanations. Each episode dissects legendary cyber exploits and high-tech frauds, making complex digital heists accessible and engaging for tech enthusiasts. Beyond the captivating tales, the podcast empowers listeners with practical insights and preventive measures to fortify their digital defenses.
  continue reading
 
Artwork

1
8th Layer Insights

Perry Carpenter | N2K Networks

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Get ready for a deep dive into what cybersecurity professionals often refer to as the "8th Layer" of security: HUMANS. Welcome to 8th Layer Insights (8Li). This podcast is a multidisciplinary exploration into how the complexities of human nature affect security and risk. Author, security researcher, and behavior science enthusiast Perry Carpenter taps experts for their insights and illumination. Topics include cybersecurity, psychology, behavior science, communication, leadership, and more.
  continue reading
 
Artwork

1
Cyber Work

Infosec

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
Learn how to break into cybersecurity, build new skills and move up the career ladder. Each week on the Cyber Work Podcast, host Chris Sienko sits down with thought leaders from Carbon Black, IBM, CompTIA and others to discuss the latest cybersecurity workforce trends.
  continue reading
 
Artwork

1
Putting the AP in hAPpy

Debra R Richardson

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
A weekly podcast providing fraud prevention and vendor setup training to protect the vendor master file. Immediate takeaways with actionable steps you can implement today into your vendor onboarding and maintenance process to reduce fraud and regulatory fines. Great tips for the Accounts Payable and Procurement teams to clean-up their vendor data, clean-up their vendor processes so that they can pay the right vendor.
  continue reading
 
Artwork

1
Cyber Uncut

Momentum Media

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly+
 
Cyber Uncut brings you the key decision makers and cutting edge innovators shaping Australia's cyber revolution. From cyber security to artificial intelligence and information systems, discover how businesses and government are navigating the transition to a digital future. Join Momentum Media’s Phil Tarrant, defence and national security podcaster, Major General (Ret’d) Dr Marcus Thompson AM – former head of the ADF’s Information Warfare Division, and Liam Garman, editor of Cyber Daily, as ...
  continue reading
 
Artwork

1
Pod Ween Satan

Jay Hunter and Dave Massey

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Ween is The Greatest Band in The World. This is the Greatest Podcast in The World about The Greatest Band in The World....Ween. We will introduce you to Ween in all their grandness and splendor. We shall take you on a tour of the entire Ween Catalogue...One album at a time...One song at a time...Until the end of time. Together we will listen to each and every Ween song. Together we will spread the good word of The Boognish. Buckle up Bitch. Step inside this spaceship and take a ride straight ...
  continue reading
 
Geared towards Deadheads, Phishheads and the jam band community, The Sound Podcast is a music discovery interview style podcast, hosted by Ira Haberman. Featuring Jam Bands and more... much more. Rooted in Americana, Blues, Bluegrass, Country, Folk, Funk, Jazz, Reggae, Rock, Soul but mostly Jam Band music. Here is a small sample of the guests that have been on The Sound Podcast to date: ALO, Anders Osborne, Antibalas, Aqueous, Band of Heathens, Barr Brothers, Blackberry Smoke, Chris Robinson ...
  continue reading
 
Artwork
 
A successful cyber-attack has taken your company off-line. The FBI and CISA have been contacted. What now? As you know, if this hasn’t already impacted your business (either directly or indirectly), it will. How can you make yourself a harder target, mitigating against cyber-attacks? What does all the terminology mean and why does it matter? What happens if an attack is successful? Join DTC, Inc. as we outline, in a straight-forward manner, many of the issues surrounding cyber security which ...
  continue reading
 
Artwork

1
Strong Songs

Kirk Hamilton

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Music: it's good. On each episode of Strong Songs, host Kirk Hamilton takes listeners inside a piece of music, breaking it down and figuring out what makes it work.
  continue reading
 
Artwork

1
Undermine

Osiris Media

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly+
 
Undermine is the definitive Phish podcast. New season coming soon, building on what we've done—seasons on Phish’s genesis in the 1980s, the Phish community, the Baker's Dozen, and Fall '97. Through deep-dives into the music, shows and songs; interviews with people who were there; and discussion about Phish's lasting impact. Undermine is presented by Osiris Media.
  continue reading
 
Cybersecurity guru Steve Gibson joins Leo Laporte every Tuesday. Steve and Leo break down the latest cybercrime and hacking stories, offering a deep understanding of what's happening and how to protect yourself and your business. Security Now is a must listen for security professionals every week. Records live every Tuesday at 4:30pm Eastern / 1:30pm Pacific / 20:30 UTC.
  continue reading
 
The definitive retrospective of one of music’s most memorable festivals, Phish’s Big Cypress. In December of 1999, Phish drew an estimated 80,000 to the Big Cypress Indian Reservation in Florida’s Everglades, making this festival the largest Millennium Eve concert on earth. We look back on the festival 20 years later—and examine the legacy for Phish and the music world. Hosted and narrated by Jesse Jarnow, this five-episode series draws on interviews with members of Phish and its crew, fan m ...
  continue reading
 
Artwork

1
Lama Taboot

Lama Taboot

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
Two Phish kids ended up in the same Tibetan Buddhist three- year retreat. Now lamas, they discuss common lessons from the meditation cushion to summer tour.
  continue reading
 
Artwork

1
The New Dad Rock

Steve Nelson & Keith Nottonson

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Two college radio DJs during the 90s, hosts Keith and Steve helped expose bands like Nirvana, Pavement and PJ Harvey. They went to shows, interviewed musicians and reviewed albums for various zines and papers. They worked security at concerts and once, even did load-in for Phish. Now they’re dads. Whether you want to explore lesser-known music or take a trip down memory lane, tune in to The New Dad Rock. Join hosts Keith and Steve as they navigate the ages together, sharing their love of mus ...
  continue reading
 
Artwork
 
On Phemale-Centrics we discuss all things Phish from a woman's point of view. Join us as we interview Phish's community members, play games like "Market Price" and discuss the latest goings on in the Phish scene, both on-line and on Lot! Your host is Dawneebee! Co-hosts are a rotating cast of her phriends including Jillian, Kristie, Merry, Baker & Lauren and her husband Jason "Snakey". Hosted on Acast. See acast.com/privacy for more information.
  continue reading
 
Welcome to the This Happened Once Before, a conversation between generational Phish fans. I'm your host, Bill, a Phish fan for 30 years, and I started this podcast to have conversations with younger fans new to the band. We discuss how they found Phish, and what excites them most about the group and then we have a conversation about a show from the band's era from 1988-1996. Let's get the show on the road!
  continue reading
 
Loading …
show series
 
So here we are, the summit of the sound, The twenty-five that shook both lot and lawn. Matt wears a cape. Nick levitates mid-pound. This final block is where the myths are drawn. They didn’t make the list, but now they reign. These songs arrive like thunderstorms in June. Each track’s a wound, a whisper, or a flame. Some made you cry. Some left the…
  continue reading
 
In this episode of Cybersecurity Today, host Jim Love explores the intricacies behind phishing emails that cleverly spoof Microsoft addresses, making many fall for scams despite appearing legitimate. Love emphasizes the need for a stringent 'zero trust' approach to counter these advanced tactics. Additionally, the episode delves into the activities…
  continue reading
 
This week, Dave speaks with Max Gannon of Cofense Intelligence to dive into his team's research on "The Rise of Precision-Validated Credential Theft: A New Challenge for Defenders." Threat actors continuously develop new tactics, techniques, and procedures (TTPs) to bypass existing defenses. When defenders identify these methods and implement count…
  continue reading
 
In this episode of the Contested Ground podcast, hosts Phil Tarrant, Major General (Ret’d) Dr Marcus Thompson and Liam Garman unpack the latest from Ukraine and the ongoing conflict in India-Pakistan, and how diaspora groups are expanding conflict beyond country borders. They begin the podcast discussing Australian schoolteacher Oscar Jenkins, who …
  continue reading
 
In this episode of Cybersecurity Today, host David Shipley discusses several key cyber incidents affecting organizations and individuals. A new rust-based information stealer, known as Eddie Steeler, is being distributed via deceptive CAPTCHA verification pages. ConnectWise, a management software firm, has been breached in an attack suspected to be…
  continue reading
 
Welcome to the Social-Engineer Podcast: The Doctor Is In Series – where we will discuss understandings and developments in the field of psychology. In today’s episode, Chris and Abbie are discussing why change can feel so lonely? They will talk about what triggers growth in people, the amount a person can actually change and how loneliness plays a …
  continue reading
 
Rich talked about a massive data breach exposing 184 million logins and passwords. He recommends using strong, unique passwords and turning on two-factor authentication for key accounts. Mentioned: Have I Been Pwned and MalwareBytes Digital Footprint Tool Rich highlighted the impressive Gemini live video feature, which brings real-time AI to life. …
  continue reading
 
Featured Songs: Pigeons Playing Ping Pong - Sports Theme - 05-16-19 - Domefest - Masontown, West Virginia Umphrey’s McGee - Sledgehammer - 05-24-19 - Summer Camp - Chillicothe, Illinois Aqueous - Short Skirt, Long Jacket - 05-17-19 - Domefest - Masontown, West Virginia Disco Biscuits - Aquatic Ape - 05-23-19 - The Ogden - Denver, Colorado Jeff Twee…
  continue reading
 
In this episode, the host delves into the alarming rise of 'pig butchering' scams, a form of fraud that preys on vulnerable and trusting individuals, often leaving them financially and emotionally devastated. These scams are orchestrated by organized crime syndicates that use brutal methods, including violence and human trafficking, to sustain thei…
  continue reading
 
This week, we are joined by John Hammond, Principal Security Researcher at Huntress, who is sharing his PoC and research on "CVE-2025-30406 - Critical Gladinet CentreStack & Triofox Vulnerability Exploited In The Wild." A critical 9.0 severity vulnerability (CVE-2025-30406) in Gladinet CentreStack and Triofox is being actively exploited in the wild…
  continue reading
 
In this episode of Cybersecurity Today, host Jim Love covers critical updates in the world of cyber threats. The FBI warns of hijackers posing as IT support to infiltrate law firms, a Wisconsin city reveals a ransomware attack affecting 67,000 residents, and a Texas city refuses to pay a ransom, risking the public release of sensitive data. The epi…
  continue reading
 
In this episode of the Cyber Uncut podcast, David Hollingworth and Daniel Croft talk about Meta moving to use user data to train its AI, cyber attacks on local legal firms and boards, and new regulations requiring mandatory reporting of ransomware payments. Hollingworth and Croft kick things off with the news that a German data watchdog has been un…
  continue reading
 
The jazz standard "All The Things You Are" has been performed countless times by master jazz vocalists, 30s big bands, bebop small groups, hard-bop combos, modern deconstructionists, and even soon-to-be Kings of Pop. On this episode, Kirk takes listeners through the history of the now-famous tune, from its humble Broadway origins all the way to his…
  continue reading
 
Greg Otto talks with Rob Ragan, Principal Technology Strategist at Bishop Fox, as he shares his vision of building an “Iron Man suit” for human security testers that is shaping how AI is used in offensive cybersecurity. Rob dives into lessons learned from developing adaptive AI tools, the unique challenges and risks facing modern AI systems, and ef…
  continue reading
 
If you’re company is a small or medium sized business, don’t get comfortable about fraud – you’re being targeted too. Troy Baker is back to talk fraud and how the fraud prevention resources at the Better Business Bureau can help you protect your payments from fraudsters. Keep listening. Check out my website www.debrarrichardson.com if you need help…
  continue reading
 
Things have gotten weird on Insuphishient. We’re deep into the Top 100 Phish Songs of All Time countdown and the pressure is getting to the hosts. Matt is now only speaking in Spanish. Nick has developed a stress-induced lisp. And yet somehow, we’re still counting down the tracks — #50 through #26, the messy middle where the jams are hot, the opini…
  continue reading
 
This week, our three hosts ⁠⁠⁠Dave Bittner⁠⁠⁠, ⁠⁠⁠Joe Carrigan⁠⁠⁠, and ⁠⁠⁠Maria Varmazis⁠⁠⁠ (also host of the ⁠⁠⁠T-Minus⁠⁠⁠ Space Daily show) are sharing the latest in social engineering scams, phishing schemes, and criminal exploits that are making headlines. We start with a bit of follow up, one from listener Aaron, who shares some safety tips fo…
  continue reading
 
Thanks for joining us for our 2001 Mt. Rushmore episode! Our picks are below, and please vote on your top 4 versions of Carini: ⁠⁠⁠osirispod.com/rushmore⁠⁠⁠ Megan (official) 8/17/97 9/29/00 6/14/00 10/28/21 Brian 8/17/97 7/17/98 7/7/99 9/29/99 RJ 8/17/97 11/19/97 9/29/99 10/28/21 Please give us a call at (484) 416-0488 and leave us your thoughts an…
  continue reading
 
Technology is a double-edged sword. It can empower us, connect us, and solve problems, but it can also be used to exploit, manipulate, and harm. When it comes to protecting children online, that line gets especially thin. Digital forensics, AI-powered image classification, and global law enforcement collaboration are now essential tools for keeping…
  continue reading
 
World Wide Wednesday: 75–51 (The Buffet Bracket) Today on Insuphishient, the countdown continues and the stakes are mild. Matt and Nick are back with Part 2 of the Top 100 Phish Songs of All Time, covering that elusive Jimmy Buffett demographic range — #75 to #51 — where fan favorites rub elbows with songs that were played twice, then once again in…
  continue reading
 
In this explosive episode of Cypher Tech Hacks, host Alex Cipher breaks down the infamous SolarWinds cyberattack—one of the most dangerous supply chain breaches in U.S. history. Learn how elite hackers compromised a trusted software update to infiltrate 18,000 networks, including Fortune 500 companies and U.S. federal agencies. From backdoored buil…
  continue reading
 
If it made you panic, rage, or rush… it probably bypassed your cognitive defenses. In the latest issue of Deceptive Minds, I dig into the dark cognitive malware of emotional hijacking: how scammers, manipulators, and even well-meaning voices use fear, urgency, outrage, and hope to short-circuit your critical thinking. Inside: 🧠 Why your emotions be…
  continue reading
 
What the status of Encrypted Client Hello (ECH)? What radio technology would be best for remote inverter shutdown? Some DNS providers already block newly listed domains. Knowing when not to click a link can take true understanding. Why can losing a small portion of a power grid bring the rest down? Where are we in the "AI Hype Cycle" and is this th…
  continue reading
 
Matt and Nick are kicking off a full week of Phish song rankings — the Top 100 of All Time, as voted by listeners, bots, liars, and one guy who mailed in a VHS tape labeled "Best of 2008" Today we start at the bottom. Songs 100 through 76. And no, we didn’t make this list. We don’t know who did. We found it in a Google Doc titled “Wilson is King”. …
  continue reading
 
This episode dives into actionable strategies for tackling "executive debt" – the accumulation of flawed decision-making and unchallenged assumptions at the leadership level. Hosts Daniela, Monty Fowler, and Mark Dallmeier explore how companies can move beyond traditional, gut-based approaches to goal setting by leveraging data and AI for more info…
  continue reading
 
Send us a text Hi everybody and welcome to Attendance Bias. I am your host Brian Weinstein. We are at the halfway point of the tour by now, having just visited the Schottenstein Center in Columbus for the first time, it is now time to visit an old favorite: The North Charleston Coliseum in Charleston, South Carolina for a THREE NIGHT weekend run! A…
  continue reading
 
In this episode of the Cyber Uncut podcast, host Liam Garman is joined by Thomas Fikentscher, CyberArk’s head of ANZ operations, to explore the company’s international business, cyber security trends, the importance of privileged access, and the importance of taking cyber security seriously. Garman and Fikentscher begin with a discussion on CyberAr…
  continue reading
 
In this episode of Cybersecurity Today, host David Shipley dives into several alarming cyber incidents. The show starts with Nova Scotia Power's confirmation of a ransomware attack that forced the shutdown of customer-facing systems and led to data being published on the dark web. The company decided not to pay the ransom, adhering to law enforceme…
  continue reading
 
Welcome to the Social-Engineer Podcast: The 4th Monday Series with Chris Hadnagy and Mike Holfeld. Chris and Mike will be covering cutting edge global news to help people remain safe, secure and knowledgeable in a world where it is hard to know what is real and what is fake news. Today Chris and Mike are joined by Seth Daniels. Seth is the Director…
  continue reading
 
Rich talks about attending Google I/O 2025 and the major consumer announcements from Google. Mozilla is shutting down its Pocket app—if you need an alternative to save articles for later, check out Instapaper. Google just launched the NotebookLM app for iOS and Android—check out the new Audio Overviews, which turn your notes into podcast-style summ…
  continue reading
 
Loading …
Copyright 2025 | Privacy Policy | Terms of Service | | Copyright
Listen to this show while you explore
Play