Attendance Bias is a podcast for fans to tell a story about an especially meaningful Phish show.
…
continue reading
Phish Podcasts
Updates on the latest cybersecurity threats to businesses, data breach disclosures, and how you can secure your firm in an increasingly risky time.
…
continue reading
Insuphishient is a Phish podcast hosted by Matt and Nick — a 500-episode series dedicated to exploring the music, culture, and one-of-a-kind universe of the greatest band of all time. With no set setlists and no rules, each episode dives into Phish shows, band lore, and wild theories — blending deep insights with hilarious hot takes. Whether you’re a seasoned fan or just discovering Phish, there’s a spot for you here. Each week follows a groove of its own: Monday: Soundcheck — setting the st ...
…
continue reading
Welcome to Beyond The Pond! We’re two massive Phish fans who are using the music of Phish to introduce you to new and interesting music we think you’ll love! Because we love the Phish. We are Phish fans. But sometimes you gotta break out of your comfort zone and go beyond the pond. A proud member of the Osiris Podcast Network. Hosted on Acast. See acast.com/privacy for more information.
…
continue reading
A podcast that helps us understand human vulnerability and how we can defend against the attacks that exploit us.
…
continue reading
A podcast to celebrate the music.
…
continue reading
The Helping Friendly Podcast (HFPod) explores the music and fan experience of Phish, through interviews and deep dives on shows and tours. Since 2013, we’ve aimed to bring the fan voice into discussions about Phish, and with the help of our guests, we’re still discovering new angles of appreciation for the band. And when the band is on tour, we provide a review of every show the following day with a fan who was there. As one of our listeners said, “this show has impeccable analysis, stats, c ...
…
continue reading
Podcast by PHish
…
continue reading
Welcome to PHILM The Podcast! We talk music, life and everything in between. It's worth the trip :) Hosted on Acast. See acast.com/privacy for more information.
…
continue reading
Chris Parker, the founder of WhatIsMyIPAddress.com, interviews guests and tells real-life stories about topics to open your eyes to the danger and traps lurking in the real world, ranging from online scams and frauds to everyday situations where people are trying to take advantage of you—for their gain and your loss. Our goal is to educate and equip you, so you learn how to spot the warning signs of trouble, take quick action, and lower the risk of becoming a victim.
…
continue reading
Podcast by Safe Mode Podcast
…
continue reading
Jake Amster and Matthew Amster-Burton, two Seattle music nerds and actual brothers, take you on an audio tour of the best albums of the 90s, from R.E.M. to T.L.C., Snoop Dogg to Phish.
…
continue reading
Harris and Scott are comedians, music lovers, and friends. Where do they differ? Harris loves Phish, and Scott does not. On Analyze Phish, Harris navigates the vast landscape of Phish's catalogue to find entry points for Scott while trying to explain the live Phish experience without the use of illegal substances.
…
continue reading
Cypher Tech Hacks is an electrifying deep dive into the world of cyber scams and digital deceptions, where host Alex Cipher unpacks intricate hacking techniques into simple, step-by-step explanations. Each episode dissects legendary cyber exploits and high-tech frauds, making complex digital heists accessible and engaging for tech enthusiasts. Beyond the captivating tales, the podcast empowers listeners with practical insights and preventive measures to fortify their digital defenses.
…
continue reading
Get ready for a deep dive into what cybersecurity professionals often refer to as the "8th Layer" of security: HUMANS. Welcome to 8th Layer Insights (8Li). This podcast is a multidisciplinary exploration into how the complexities of human nature affect security and risk. Author, security researcher, and behavior science enthusiast Perry Carpenter taps experts for their insights and illumination. Topics include cybersecurity, psychology, behavior science, communication, leadership, and more.
…
continue reading
Learn how to break into cybersecurity, build new skills and move up the career ladder. Each week on the Cyber Work Podcast, host Chris Sienko sits down with thought leaders from Carbon Black, IBM, CompTIA and others to discuss the latest cybersecurity workforce trends.
…
continue reading
A weekly podcast providing fraud prevention and vendor setup training to protect the vendor master file. Immediate takeaways with actionable steps you can implement today into your vendor onboarding and maintenance process to reduce fraud and regulatory fines. Great tips for the Accounts Payable and Procurement teams to clean-up their vendor data, clean-up their vendor processes so that they can pay the right vendor.
…
continue reading
Celebrating the music of Max Creek, including reviews of live shows, conversations with fans and discussions about the history and impact of this legendary jam band.
…
continue reading
Cyber Uncut brings you the key decision makers and cutting edge innovators shaping Australia's cyber revolution. From cyber security to artificial intelligence and information systems, discover how businesses and government are navigating the transition to a digital future. Join Momentum Media’s Phil Tarrant, defence and national security podcaster, Major General (Ret’d) Dr Marcus Thompson AM – former head of the ADF’s Information Warfare Division, and Liam Garman, editor of Cyber Daily, as ...
…
continue reading
Ween is The Greatest Band in The World. This is the Greatest Podcast in The World about The Greatest Band in The World....Ween. We will introduce you to Ween in all their grandness and splendor. We shall take you on a tour of the entire Ween Catalogue...One album at a time...One song at a time...Until the end of time. Together we will listen to each and every Ween song. Together we will spread the good word of The Boognish. Buckle up Bitch. Step inside this spaceship and take a ride straight ...
…
continue reading
Geared towards Deadheads, Phishheads and the jam band community, The Sound Podcast is a music discovery interview style podcast, hosted by Ira Haberman. Featuring Jam Bands and more... much more. Rooted in Americana, Blues, Bluegrass, Country, Folk, Funk, Jazz, Reggae, Rock, Soul but mostly Jam Band music. Here is a small sample of the guests that have been on The Sound Podcast to date: ALO, Anders Osborne, Antibalas, Aqueous, Band of Heathens, Barr Brothers, Blackberry Smoke, Chris Robinson ...
…
continue reading
A successful cyber-attack has taken your company off-line. The FBI and CISA have been contacted. What now? As you know, if this hasn’t already impacted your business (either directly or indirectly), it will. How can you make yourself a harder target, mitigating against cyber-attacks? What does all the terminology mean and why does it matter? What happens if an attack is successful? Join DTC, Inc. as we outline, in a straight-forward manner, many of the issues surrounding cyber security which ...
…
continue reading
Music: it's good. On each episode of Strong Songs, host Kirk Hamilton takes listeners inside a piece of music, breaking it down and figuring out what makes it work.
…
continue reading
Undermine is the definitive Phish podcast. New season coming soon, building on what we've done—seasons on Phish’s genesis in the 1980s, the Phish community, the Baker's Dozen, and Fall '97. Through deep-dives into the music, shows and songs; interviews with people who were there; and discussion about Phish's lasting impact. Undermine is presented by Osiris Media.
…
continue reading
Original music streamed live online.
…
continue reading
Cybersecurity guru Steve Gibson joins Leo Laporte every Tuesday. Steve and Leo break down the latest cybercrime and hacking stories, offering a deep understanding of what's happening and how to protect yourself and your business. Security Now is a must listen for security professionals every week. Records live every Tuesday at 4:30pm Eastern / 1:30pm Pacific / 20:30 UTC.
…
continue reading
Highlights from the latest Phish show. Reactions and reviews. Call-in with couch tour tales and donut reviews.
…
continue reading
Deception, influence, and social engineering in the world of cyber crime.
…
continue reading
TV Tech Guy Rich DeMuro offers tech news, gadget reviews, helpful apps and answers your questions. richontech.tv
…
continue reading
The definitive retrospective of one of music’s most memorable festivals, Phish’s Big Cypress. In December of 1999, Phish drew an estimated 80,000 to the Big Cypress Indian Reservation in Florida’s Everglades, making this festival the largest Millennium Eve concert on earth. We look back on the festival 20 years later—and examine the legacy for Phish and the music world. Hosted and narrated by Jesse Jarnow, this five-episode series draws on interviews with members of Phish and its crew, fan m ...
…
continue reading
Unraveling the (con)fusion between Tech & Risk Management
…
continue reading
explorations in atonal phish Hosted on Acast. See acast.com/privacy for more information.
…
continue reading
Two Phish kids ended up in the same Tibetan Buddhist three- year retreat. Now lamas, they discuss common lessons from the meditation cushion to summer tour.
…
continue reading
Mag ball phish birthday bash and arrest
…
continue reading
Two college radio DJs during the 90s, hosts Keith and Steve helped expose bands like Nirvana, Pavement and PJ Harvey. They went to shows, interviewed musicians and reviewed albums for various zines and papers. They worked security at concerts and once, even did load-in for Phish. Now they’re dads. Whether you want to explore lesser-known music or take a trip down memory lane, tune in to The New Dad Rock. Join hosts Keith and Steve as they navigate the ages together, sharing their love of mus ...
…
continue reading
On Phemale-Centrics we discuss all things Phish from a woman's point of view. Join us as we interview Phish's community members, play games like "Market Price" and discuss the latest goings on in the Phish scene, both on-line and on Lot! Your host is Dawneebee! Co-hosts are a rotating cast of her phriends including Jillian, Kristie, Merry, Baker & Lauren and her husband Jason "Snakey". Hosted on Acast. See acast.com/privacy for more information.
…
continue reading
Welcome to the This Happened Once Before, a conversation between generational Phish fans. I'm your host, Bill, a Phish fan for 30 years, and I started this podcast to have conversations with younger fans new to the band. We discuss how they found Phish, and what excites them most about the group and then we have a conversation about a show from the band's era from 1988-1996. Let's get the show on the road!
…
continue reading
In the year 2420, the United Planets of America has only one hope against the forces of evil...
…
continue reading
Every Saturday, we sit down with cybersecurity researchers to talk shop about the latest threats, vulnerabilities, and technical discoveries.
…
continue reading

1
Shakespear presents: Big Money Friday top 100 Phish songs 025-001
21:06
21:06
Play later
Play later
Lists
Like
Liked
21:06So here we are, the summit of the sound, The twenty-five that shook both lot and lawn. Matt wears a cape. Nick levitates mid-pound. This final block is where the myths are drawn. They didn’t make the list, but now they reign. These songs arrive like thunderstorms in June. Each track’s a wound, a whisper, or a flame. Some made you cry. Some left the…
…
continue reading

1
Phishing Scams, DNS Hijacking, and Cybersecurity Leadership Shakeup
11:30
11:30
Play later
Play later
Lists
Like
Liked
11:30In this episode of Cybersecurity Today, host Jim Love explores the intricacies behind phishing emails that cleverly spoof Microsoft addresses, making many fall for scams despite appearing legitimate. Love emphasizes the need for a stringent 'zero trust' approach to counter these advanced tactics. Additionally, the episode delves into the activities…
…
continue reading

1
Leveling up their credential phishing tactics.
20:46
20:46
Play later
Play later
Lists
Like
Liked
20:46This week, Dave speaks with Max Gannon of Cofense Intelligence to dive into his team's research on "The Rise of Precision-Validated Credential Theft: A New Challenge for Defenders." Threat actors continuously develop new tactics, techniques, and procedures (TTPs) to bypass existing defenses. When defenders identify these methods and implement count…
…
continue reading

1
CONTESTED GROUND: Australian sentenced to 13 years in Russia, Australia and EU discuss defence pact
34:02
34:02
Play later
Play later
Lists
Like
Liked
34:02In this episode of the Contested Ground podcast, hosts Phil Tarrant, Major General (Ret’d) Dr Marcus Thompson and Liam Garman unpack the latest from Ukraine and the ongoing conflict in India-Pakistan, and how diaspora groups are expanding conflict beyond country borders. They begin the podcast discussing Australian schoolteacher Oscar Jenkins, who …
…
continue reading

1
Cybersecurity Incidents: Eddie Steeler Malware, ConnectWise Breach, and Nova Scotia Power Data Theft
8:27
8:27
Play later
Play later
Lists
Like
Liked
8:27In this episode of Cybersecurity Today, host David Shipley discusses several key cyber incidents affecting organizations and individuals. A new rust-based information stealer, known as Eddie Steeler, is being distributed via deceptive CAPTCHA verification pages. ConnectWise, a management software firm, has been breached in an attack suspected to be…
…
continue reading

1
Ep. 307 - The Doctor Is In Series - Why is the Road to Self-Betterment So Lonely
35:16
35:16
Play later
Play later
Lists
Like
Liked
35:16Welcome to the Social-Engineer Podcast: The Doctor Is In Series – where we will discuss understandings and developments in the field of psychology. In today’s episode, Chris and Abbie are discussing why change can feel so lonely? They will talk about what triggers growth in people, the amount a person can actually change and how loneliness plays a …
…
continue reading
punkin' instigator What we're listening to: Jake: My Morning Jacket, is Bon Iver, SABLE, fABLE Matthew: Suzanne Vega, Flying with Angels Marinero, La La LaBy Jake Amster and Matthew Amster-Burton
…
continue reading

1
Protect yourself after data breach, free PC cleaners & Apple’s China challenge (123 , May 31, 2025)
1:44:56
1:44:56
Play later
Play later
Lists
Like
Liked
1:44:56Rich talked about a massive data breach exposing 184 million logins and passwords. He recommends using strong, unique passwords and turning on two-factor authentication for key accounts. Mentioned: Have I Been Pwned and MalwareBytes Digital Footprint Tool Rich highlighted the impressive Gemini live video feature, which brings real-time AI to life. …
…
continue reading
Featured Songs: Pigeons Playing Ping Pong - Sports Theme - 05-16-19 - Domefest - Masontown, West Virginia Umphrey’s McGee - Sledgehammer - 05-24-19 - Summer Camp - Chillicothe, Illinois Aqueous - Short Skirt, Long Jacket - 05-17-19 - Domefest - Masontown, West Virginia Disco Biscuits - Aquatic Ape - 05-23-19 - The Ogden - Denver, Colorado Jeff Twee…
…
continue reading

1
Pig Butchering: Operation Shamrock Fights Back
39:05
39:05
Play later
Play later
Lists
Like
Liked
39:05In this episode, the host delves into the alarming rise of 'pig butchering' scams, a form of fraud that preys on vulnerable and trusting individuals, often leaving them financially and emotionally devastated. These scams are orchestrated by organized crime syndicates that use brutal methods, including violence and human trafficking, to sustain thei…
…
continue reading
This week, we are joined by John Hammond, Principal Security Researcher at Huntress, who is sharing his PoC and research on "CVE-2025-30406 - Critical Gladinet CentreStack & Triofox Vulnerability Exploited In The Wild." A critical 9.0 severity vulnerability (CVE-2025-30406) in Gladinet CentreStack and Triofox is being actively exploited in the wild…
…
continue reading

1
Cybersecurity Today: Hijacker Scams, Ransomware Attacks, and Summer Travel Threats
13:33
13:33
Play later
Play later
Lists
Like
Liked
13:33In this episode of Cybersecurity Today, host Jim Love covers critical updates in the world of cyber threats. The FBI warns of hijackers posing as IT support to infiltrate law firms, a Wisconsin city reveals a ransomware attack affecting 67,000 residents, and a Texas city refuses to pay a ransom, risking the public release of sensitive data. The epi…
…
continue reading

1
Meta’s new AI, a bad week for legal entities in Australia, and mandatory ransomware reporting
33:14
33:14
Play later
Play later
Lists
Like
Liked
33:14In this episode of the Cyber Uncut podcast, David Hollingworth and Daniel Croft talk about Meta moving to use user data to train its AI, cyber attacks on local legal firms and boards, and new regulations requiring mandatory reporting of ransomware payments. Hollingworth and Croft kick things off with the news that a German data watchdog has been un…
…
continue reading

1
"All The Things You Are" by Jerome Kern & Oscar Hammerstein II
59:47
59:47
Play later
Play later
Lists
Like
Liked
59:47The jazz standard "All The Things You Are" has been performed countless times by master jazz vocalists, 30s big bands, bebop small groups, hard-bop combos, modern deconstructionists, and even soon-to-be Kings of Pop. On this episode, Kirk takes listeners through the history of the now-famous tune, from its humble Broadway origins all the way to his…
…
continue reading

1
Bishop Fox’s Rob Ragan and Iron Man Suit for pen testers
30:08
30:08
Play later
Play later
Lists
Like
Liked
30:08Greg Otto talks with Rob Ragan, Principal Technology Strategist at Bishop Fox, as he shares his vision of building an “Iron Man suit” for human security testers that is shaping how AI is used in offensive cybersecurity. Rob dives into lessons learned from developing adaptive AI tools, the unique challenges and risks facing modern AI systems, and ef…
…
continue reading

1
Episode 340: Part 2 with Troy Baker of the BBB: Is Your Company an SMB? You’re At Risk for Fraud and the Better Business Bureau’s Resources Can Help
29:06
29:06
Play later
Play later
Lists
Like
Liked
29:06If you’re company is a small or medium sized business, don’t get comfortable about fraud – you’re being targeted too. Troy Baker is back to talk fraud and how the fraud prevention resources at the Better Business Bureau can help you protect your payments from fraudsters. Keep listening. Check out my website www.debrarrichardson.com if you need help…
…
continue reading
Things have gotten weird on Insuphishient. We’re deep into the Top 100 Phish Songs of All Time countdown and the pressure is getting to the hosts. Matt is now only speaking in Spanish. Nick has developed a stress-induced lisp. And yet somehow, we’re still counting down the tracks — #50 through #26, the messy middle where the jams are hot, the opini…
…
continue reading
This week, our three hosts Dave Bittner, Joe Carrigan, and Maria Varmazis (also host of the T-Minus Space Daily show) are sharing the latest in social engineering scams, phishing schemes, and criminal exploits that are making headlines. We start with a bit of follow up, one from listener Aaron, who shares some safety tips fo…
…
continue reading
Thanks for joining us for our 2001 Mt. Rushmore episode! Our picks are below, and please vote on your top 4 versions of Carini: osirispod.com/rushmore Megan (official) 8/17/97 9/29/00 6/14/00 10/28/21 Brian 8/17/97 7/17/98 7/7/99 9/29/99 RJ 8/17/97 11/19/97 9/29/99 10/28/21 Please give us a call at (484) 416-0488 and leave us your thoughts an…
…
continue reading
Technology is a double-edged sword. It can empower us, connect us, and solve problems, but it can also be used to exploit, manipulate, and harm. When it comes to protecting children online, that line gets especially thin. Digital forensics, AI-powered image classification, and global law enforcement collaboration are now essential tools for keeping…
…
continue reading

1
Insuphishient Presents 75-51 of the TOP 100 Phish songs
20:20
20:20
Play later
Play later
Lists
Like
Liked
20:20World Wide Wednesday: 75–51 (The Buffet Bracket) Today on Insuphishient, the countdown continues and the stakes are mild. Matt and Nick are back with Part 2 of the Top 100 Phish Songs of All Time, covering that elusive Jimmy Buffett demographic range — #75 to #51 — where fan favorites rub elbows with songs that were played twice, then once again in…
…
continue reading
It is. It all is. https://www.patreon.com/PodWeenSatanBy Jay Hunter
…
continue reading

1
SolarWinds Breach: How 18,000 Targets Got Hacked with One Update
7:03
7:03
Play later
Play later
Lists
Like
Liked
7:03In this explosive episode of Cypher Tech Hacks, host Alex Cipher breaks down the infamous SolarWinds cyberattack—one of the most dangerous supply chain breaches in U.S. history. Learn how elite hackers compromised a trusted software update to infiltrate 18,000 networks, including Fortune 500 companies and U.S. federal agencies. From backdoored buil…
…
continue reading

1
Feel First, Think Never: Your Emotions Are the Exploit
13:13
13:13
Play later
Play later
Lists
Like
Liked
13:13If it made you panic, rage, or rush… it probably bypassed your cognitive defenses. In the latest issue of Deceptive Minds, I dig into the dark cognitive malware of emotional hijacking: how scammers, manipulators, and even well-meaning voices use fear, urgency, outrage, and hope to short-circuit your critical thinking. Inside: 🧠 Why your emotions be…
…
continue reading

1
SN 1027: Artificial Intelligence - The Status of Encrypted Client Hello
2:54:28
2:54:28
Play later
Play later
Lists
Like
Liked
2:54:28What the status of Encrypted Client Hello (ECH)? What radio technology would be best for remote inverter shutdown? Some DNS providers already block newly listed domains. Knowing when not to click a link can take true understanding. Why can losing a small portion of a power grid bring the rest down? Where are we in the "AI Hype Cycle" and is this th…
…
continue reading

1
Insuphishient Presents the top 100 Phish songs of all time: 100 - 76
22:09
22:09
Play later
Play later
Lists
Like
Liked
22:09Matt and Nick are kicking off a full week of Phish song rankings — the Top 100 of All Time, as voted by listeners, bots, liars, and one guy who mailed in a VHS tape labeled "Best of 2008" Today we start at the bottom. Songs 100 through 76. And no, we didn’t make this list. We don’t know who did. We found it in a Google Doc titled “Wilson is King”. …
…
continue reading
This episode dives into actionable strategies for tackling "executive debt" – the accumulation of flawed decision-making and unchallenged assumptions at the leadership level. Hosts Daniela, Monty Fowler, and Mark Dallmeier explore how companies can move beyond traditional, gut-based approaches to goal setting by leveraging data and AI for more info…
…
continue reading

1
OWASP security logging and monitoring failures (noun) [Word Notes]
6:04
6:04
Play later
Play later
Lists
Like
Liked
6:04Please enjoy this encore of Word Notes. The absence of telemetry that could help network defenders detect and respond to hostile attempts to compromise a system.By N2K Networks
…
continue reading

1
2025 Venue Preview: N. Charleston Coliseum, N. Charleston, SC w/Dave Scozarro
42:48
42:48
Play later
Play later
Lists
Like
Liked
42:48Send us a text Hi everybody and welcome to Attendance Bias. I am your host Brian Weinstein. We are at the halfway point of the tour by now, having just visited the Schottenstein Center in Columbus for the first time, it is now time to visit an old favorite: The North Charleston Coliseum in Charleston, South Carolina for a THREE NIGHT weekend run! A…
…
continue reading

1
Tech Acceleration and the Future of Security with James Stanger | Part Two
22:25
22:25
Play later
Play later
Lists
Like
Liked
22:25Send us a text Want to hear more? Past episodes are all posted, including on YouTube! Follow and subscribe on your favorite podcast app to ensure you don’t miss out on the conversation!By DTC, Inc.
…
continue reading

1
CyberArk’s Thomas Fikentscher on why cyber security should not be an afterthought
33:28
33:28
Play later
Play later
Lists
Like
Liked
33:28In this episode of the Cyber Uncut podcast, host Liam Garman is joined by Thomas Fikentscher, CyberArk’s head of ANZ operations, to explore the company’s international business, cyber security trends, the importance of privileged access, and the importance of taking cyber security seriously. Garman and Fikentscher begin with a discussion on CyberAr…
…
continue reading

1
Unraveling Cyber Threats: Ransomware, Kidnapping, and Record-Breaking DDoS Attacks
9:47
9:47
Play later
Play later
Lists
Like
Liked
9:47In this episode of Cybersecurity Today, host David Shipley dives into several alarming cyber incidents. The show starts with Nova Scotia Power's confirmation of a ransomware attack that forced the shutdown of customer-facing systems and led to data being published on the dark web. The company decided not to pay the ransom, adhering to law enforceme…
…
continue reading

1
Ep. 306 - The 4th Monday Series - Changing The Game - New Sport Tech with Seth Daniels
28:19
28:19
Play later
Play later
Lists
Like
Liked
28:19Welcome to the Social-Engineer Podcast: The 4th Monday Series with Chris Hadnagy and Mike Holfeld. Chris and Mike will be covering cutting edge global news to help people remain safe, secure and knowledgeable in a world where it is hard to know what is real and what is fake news. Today Chris and Mike are joined by Seth Daniels. Seth is the Director…
…
continue reading

1
Gemini Gets Smarter, Drones Drop Pies, and AI Fakes Fool a Newspaper (122, May 24, 2025)
1:47:56
1:47:56
Play later
Play later
Lists
Like
Liked
1:47:56Rich talks about attending Google I/O 2025 and the major consumer announcements from Google. Mozilla is shutting down its Pocket app—if you need an alternative to save articles for later, check out Instapaper. Google just launched the NotebookLM app for iOS and Android—check out the new Audio Overviews, which turn your notes into podcast-style summ…
…
continue reading
David Longstreth of Dirty Projectors and a ton of other stuff joins the podcast today! We talk about the Dead, Pavement and Raffi! Hosted on Acast. See acast.com/privacy for more information.
…
continue reading