Search a title or topic

Over 20 million podcasts, powered by 

Player FM logo

Digital Nova Scotia Podcasts

show episodes
 
All Hands on Tech, hosted by Eilish and Greg, brings together Nova Scotia’s tech community to uncover the secrets of what makes our province the best place for collaboration, innovation, and growth. Each episode hear from local digital experts as we dive into all of the amazing things happening in Nova Scotia’s fastest-growing sector and learn why so many organizations and individuals are calling Canada’s Ocean Playground home. All Hands on Tech is proudly produced by Digital Nova Scotia (DN ...
  continue reading
 
Artwork
 
Welcome to the Security Weekly Podcast Network, your all-in-one source for the latest in cybersecurity! This feed features a diverse lineup of shows, including Application Security Weekly, Business Security Weekly, Paul's Security Weekly, Enterprise Security Weekly, and Security Weekly News. Whether you're a cybersecurity professional, business leader, or tech enthusiast, we cover all angles of the cybersecurity landscape. Tune in for in-depth panel discussions, expert guest interviews, and ...
  continue reading
 
Loading …
show series
 
In this exciting episode of All Hands on Tech, host Claire Quirion is joined by Mike Reeves, President and Owner of Mobia Technology Innovations. From cybersecurity to cloud architecture, Mobia's work bridges technical expertise with real-world impact, and all with an east coast edge. Mike discusses Mobia's 40 years of evolution, their "people firs…
  continue reading
 
This week: * The true details around Salt Typhoon are still unknown * The search for a portable pen testing device * Directories named "hacker2" are suspicious * Can a $24 cable compete with a $180 cable? * Hacking Tesla wall chargers * Old Zyxel exploits are new again * Hacking Asus drivers * Stealing KIAs - but not like you may think * Fake artic…
  continue reading
 
Segment description coming soon! This month BeyondTrust released it's 12th annual edition of the Microsoft Vulnerabilities Report. The report reveals a record-breaking year for Microsoft vulnerabilities, and helps organizations understand, identify, and address the risks within their Microsoft ecosystems. Segment Resources: Insights Security Assess…
  continue reading
 
Planning your trip to the magical Isle of Skye in Scotland? We dive into how to get there, getting around the island, what to do, where to eat, and areas to stay in! Episode Resources: isleofskye.com - helpful for planning any of the hikes/walks mentioned in the episode! Rowan Cottage Self Catering - Jenn's accommodations Support the Travel Mug Pod…
  continue reading
 
What makes a threat modeling process effective? Do you need a long list of threat actors? Do you need a long list of terms? What about a short list like STRIDE? Has an effective process ever come out of a list? Farshad Abasi joins our discussion as we explain why the answer to most of those questions is No and describe the kinds of approaches that …
  continue reading
 
Segment 1 - Interview with Rob Allen from Threatlocker Segment 2 - Topic: Growing Trend - Edge Computing and Hybrid Cloud Segment 3 - Interviews from RSAC 2025 Cyera Cyera is the fastest-growing data security company in history, empowering companies to classify, secure, and manage their data, wherever it is, and leverage the power of the industry’s…
  continue reading
 
This week: You got a Bad box, again Cameras are expose to the Internet EU and connected devices Hydrophobia NVRAM variables Have you heard about IGEL Linux? SSH and more NVRAM AI skeptics are nuts, and AI doesn't make you more efficient Trump Cybersecurity orders I think I can root my Pixel 6 Decentralized Wordpres plugin manager Threat actor namin…
  continue reading
 
This week, it’s time for security money. The index is up, but the previous quarterly results were brutal. In the leadership and communications segment, Get out of the audit committee: Why CISOs need dedicated board time, Quietly Burning Out? What To Do When Your Leadership Starts Lacking, How to rethink leadership to energize disengaged employees, …
  continue reading
 
CISA has been championing Secure by Design principles. Many of the principles are universal, like adopting MFA and having opinionated defaults that reduce the need for hardening guides. Matthew Rogers talks about how the approach to Secure by Design has to be tailored for Operational Technology (OT) systems. These systems have strict requirements o…
  continue reading
 
Are you feeling overwhelmed about the thought of planning a trip? Whether you're a newbie or a seasoned trip planner, planning a trip requires a lot of work. Meggan shares some tips to decrease overwhelm so you can head out on your trip without the stress! Support the Travel Mug Podcast by buying us a coffee! You’ll make our day & you’ll get access…
  continue reading
 
Segment 1 - Enterprise Security News, Live at IDV This week, in the enterprise security news, Acquisitions potential IPOs Terminator Salvation in real life First $1B one-employee business? Mikko puts in his notice Pitch Black in real life, and more! Segment 2 - Interview with Dr. Tina Srivastava The #1 cause of data breaches is stolen credentials. …
  continue reading
 
Two parts to this episode: Tech Segment: Updating Linux Systems - Beyond apt-get upgrade * Custom scripts for ensuring your Linux systems are up-to-date * topgrade - tutorial for using topgrade to update Linux systems on various Linux distributions Discussion Topic: Anti-Malware and/or EDR on Linux Platforms * PCI calls for scanning Linux systems *…
  continue reading
 
During times of volatility, business leaders often don’t know what they are able to change or even what they should change. At precisely these times, business leaders become risk leaders and need to quickly learn how to identify what is within their control and what isn’t — to not only survive but thrive. Alla Valente, Principal Analyst at Forreste…
  continue reading
 
Jenn has returned from her adventures in the Yukon! She shares what she did, ate, and saw in Whitehorse, Kluane National Park, Haines Junction, Carcross, and more! Support the Travel Mug Podcast by buying us a coffee! You’ll make our day & you’ll get access to fun stuff like bloopers and extra content. We have Merch! Shop the Travel Mug Podcast Sto…
  continue reading
 
The recent popularity of MCPs is surpassed only by the recent examples deficiencies of their secure design. The most obvious challenge is how MCPs, and many more general LLM use cases, have erased two decades of security principles behind separating code and data. We take a look at how developers are using LLMs to generate code and continue our sea…
  continue reading
 
In this exciting episode of All Hands on Tech, host Claire Quirion sits down with Ryan Sno-Wood from the Interactive Society of Nova Scotia (ISNS) to talk about the fast-growing world of game development in the province. From small indie teams to major collaborations with government and schools, the local gaming industry is expanding fast, and Ryan…
  continue reading
 
Segment 1 CTG Interview Middle market companies face unique challenges in the ever-evolving cyber environment. Developing a comprehensive cybersecurity approach is a business imperative for middle market companies, and Chad Alessi will discuss the threat landscape, what’s keeping IT decision-makers awkward at night, and the best approach to creatin…
  continue reading
 
Welcome to the Dis A fi mi History Podcast, hosted by Wendy Aris. In this enlightening episode, Wendy converses with Dr. Josias Tembo, a PhD researcher at Radboud University, to explore the intricate connections between Western Christianity and racialization in Africa. Dr. Tembo shares his insightful research on how Christianity has historically pl…
  continue reading
 
In the security news: Vicious Trap - The malware hiding in your router Hacking your car WSL is open-source, but why? Using AI to find vulnerabilities - a case study Why you should not build your own password manager The inside scoop behind Lumma Infostealer Hacking a smart grill Hardcoded credentials on end of life routers and "Alphanetworks" SIM s…
  continue reading
 
This segment explores how automated microsegmentation addresses critical Zero Trust gaps overlooked by traditional access controls and legacy segmentation solutions. We'll examine the limitations of perimeter-based defenses in today's dynamic threat landscape and reveal how automated microsegmentation enhances network security beyond conventional f…
  continue reading
 
ArmorCode unveils Anya—the first agentic AI virtual security champion designed specifically for AppSec and product security teams. Anya brings together conversation and context to help AppSec, developers and security teams cut through the noise, prioritize risks, and make faster, smarter decisions across code, cloud, and infrastructure. Built into …
  continue reading
 
Skiplagging is a growing trend where people are booking flights and skipping one leg in order to stay in the layover city. But, there are risks involved, and we're not a fan! Tune in to learn why. Support the Travel Mug Podcast by buying us a coffee! You’ll make our day & you’ll get access to fun stuff like bloopers and extra content. We have Merch…
  continue reading
 
In this episode of All Hands on Tech, our host Claire Quirion sits down with Daphne North, Director of Product Marketing and Content at Dash Social, to explore the bold rebrand of Dash Hudson, and what it means for the future of creator marketing. Daphne shares her journey into the world of content and product marketing, offering a behind-the-scene…
  continue reading
 
Segment 1: Erik Bloch Interview The math on SOC AI just isn't adding up. It's not easy to do the math, either, as each SOC automation vendor is tackling alert fatigue and SecOps assistants a bit differently. Fortunately for us and our audience, Erik Bloch met with many of these vendors at RSAC and is going to share what he learned with us! Segment …
  continue reading
 
Welcome to this enlightening episode of the Dis A fi mi History podcast, hosted by Wendy Aris. Join us as we delve into a nuanced conversation with Professor Randy Brown, an award-winning historian, as he reveals the untold narratives of enslaved men in the British Caribbean. Through their discussion, Professor Brown sheds light on the complexities…
  continue reading
 
This week in the security news: Malware-laced printer drivers Unicode steganography Rhode Island may sue Deloitte for breach. They may even win. Japan's active cyber defense law Stop with the ping LLMs replace Stack Overflow - ya don't say? Aggravated identity theft is aggravating Ivanti DSM and why you shouldn't use it EDR is still playing cat and…
  continue reading
 
In the leadership and communications section, Why Every CISO Should Be Gunning For A Seat At The Board Table, The Innovation We Need is Strategic, Not Technical , The Best Leaders Ask the Right Questions, and more! This segment is sponsored by Fortra. Visit https://securityweekly.com/fortrarsac to learn more about them! Fortra is successfully reduc…
  continue reading
 
We are so excited to chat with Martina about Florence, Italy! She talks about the rigorous process of becoming a tour guide, the tours she offers, and why tours are important! Trust us, you'll be ready to book your trip to Florence at the end of the episode! Episode Resources: SunFlorence Tours website SunFlorence Tours Instagram Harald Baldr video…
  continue reading
 
In the news, Coinbase deals with bribes and insider threat, the NCSC notes the cross-cutting problem of incentivizing secure design, we cover some research that notes the multitude of definitions for secure design, and discuss the new Cybersecurity Skills Framework from the OpenSSF and Linux Foundation. Then we share two more sponsored interviews f…
  continue reading
 
Segment 1: Fastly Interview In this week's interview segment, we talk to Marshall Erwin about the state of cybersecurity, particularly when it comes to third party risk management, and whether we're ready for the next big SolarWinds or Crowdstrike incident. These big incidents have inspired executive orders, the Secure by Design initiative, and eve…
  continue reading
 
Welcome to the Dis A fi mi History Podcast, featuring an enlightening conversation with anti-racist educator and author Ernest Crim III. In this episode, discover the profound impact of Black history in combating racism and empowering youth. Ernest shares his personal journey, starting with the transformative experience of surviving a hate crime an…
  continue reading
 
This week in the security news: Android catches up to iOS with its own lockdown mode Just in case, there is a new CVE foundation Branch privilege injection attacks My screen is vulnerable The return of embedded devices to take over the world - 15 years later Attackers are going after MagicINFO Hacking Starlink Mitel SIP phones can be hacked Reversi…
  continue reading
 
In the leadership and communications section, How CISOs can talk cybersecurity so it makes sense to executives, Firms to spend more on GenAI than security in 2025, Europe leads shift from cyber security ‘headcount gap’ to skills-based hiring, and more! Next, pre-recorded interviews from RSAC Conference 2025, including: This segment is sponsored by …
  continue reading
 
Developers are relying on LLMs as coding assistants, so where are the LLM assistants for appsec? The principles behind secure code reviews don't really change based on who write the code, whether human or AI. But more code means more reasons for appsec to scale its practices and figure out how to establish trust in code, packages, and designs. Rey …
  continue reading
 
Long flights are not a lot of fun, and many of us are tempted to sit in our seats until they are over, but we talk about the importance of getting up and moving around, especially when it comes to preventing blood clots. Support the Travel Mug Podcast by buying us a coffee! You’ll make our day & you’ll get access to fun stuff like bloopers and extr…
  continue reading
 
Segment 1 - Secrets and their role in infrastructure security From API keys and tokens to environment variables and credentials, secrets are foundational—and often overlooked—attack surfaces in cloud-native and distributed systems. We break down the risks tied to poor secret hygiene, discuss emerging patterns for secure secret management at scale, …
  continue reading
 
In this episode of the Dis A fimi History Podcast, join host Wendy Aris as she engages in a profound conversation with historian Miki Garcia about the complexities of Caribbean Irish history. Dr. Garcia, a renowned author and educationalist with a PhD in Irish and British social history, shares insights from his book, "Being Irish: How the Slave My…
  continue reading
 
Sudo watch this show, Hallucinations, Kickidler, Powershool redux, Old Man Router, PSMU, Aaran Leyland, and More, on this edition of the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-475
  continue reading
 
Security news for this week: RDP and credentials that are not really revoked, and some RDP bitmap caching fun Some magic info on MagicINFO Vulnerability Management Zombies There is a backdoor in your e-commerce Airborne: vulnerabilities in AirPlay Bring your own installer - crafty EDR bypass The Signal clone used by US government officials: shocker…
  continue reading
 
Loading …
Copyright 2025 | Privacy Policy | Terms of Service | | Copyright
Listen to this show while you explore
Play