Search a title or topic

Over 20 million podcasts, powered by 

Player FM logo

Fuzz Productions Podcasts

show episodes
 
On HORROR 421 - The Podcast, your hosts, Charles Campbell will discuss happenings in the world of HORROR. From books, film and music. There will be a wide range of topics with occasional guests from all corners of the Horror and entertainment world. Join us every other Friday for a new HORROR 421 - The Podcast Episode! On Backstage 421 - The Musicians Only Podcast, Charles Campbell will discuss what's happening in music with musicians from a plethora of genres. If you're a music lover, this ...
  continue reading
 
Artwork
 
Welcome to the Security Weekly Podcast Network, your all-in-one source for the latest in cybersecurity! This feed features a diverse lineup of shows, including Application Security Weekly, Business Security Weekly, Paul's Security Weekly, Enterprise Security Weekly, and Security Weekly News. Whether you're a cybersecurity professional, business leader, or tech enthusiast, we cover all angles of the cybersecurity landscape. Tune in for in-depth panel discussions, expert guest interviews, and ...
  continue reading
 
Loading …
show series
 
This week, we dive into the world of Meshtastic and LoRa—two technologies empowering secure, long-range, and infrastructure-free communication. We'll talk about the origins of Meshtastic, how LoRa radio works, and why mesh networking is revolutionizing off-grid messaging for adventurers, hackers, emergency responders, and privacy advocates alike. W…
  continue reading
 
I sit down with Chanel West Coast to talk about, Rod Dyrdek, leaving Ridiculousness, Fantasy Factory, Rob & Big, her music career, becoming a Mom, and much more! Follow Chanel YT: https://www.youtube.com/@ChanelWC IG: https://www.instagram.com/chanelwestcoast My new special “Lucky” is streaming now on Netflix! --------------------------------------…
  continue reading
 
New research estimates the value of Zero Trust. Using the Marsh McLennan Cyber Risk Intelligence Center’s proprietary cyber losses dataset from the past eight years, researchers estimated that overall cyber losses could have been potentially reduced by up to 31% had the organizations widely deployed zero-trust security. This adds up to a projected …
  continue reading
 
Venice-based band Strawberry Fuzz is out with a new album – and stops by the kitchen to talk about it. It’s a family-style Italian feast with warm, marinated olives and LeeAnn’s famous lasagna. We also have a heart-to-heart about who is actually famous around here. Check out their new album, Miller’s Garage - https://open.spotify.com/album/43vXOnMe…
  continue reading
 
Venice-based band Strawberry Fuzz is out with a new album – and stops by the kitchen to talk about it. It’s a family-style Italian feast with warm, marinated olives and LeeAnn’s famous lasagna. We also have a heart-to-heart about who is actually famous around here. Check out their new album, Miller’s Garage - https://open.spotify.com/album/43vXOnMe…
  continue reading
 
Manual secure code reviews can be tedious and time intensive if you're just going through checklists. There's plenty of room for linters and compilers and all the grep-like tools to find flaws. Louis Nyffenegger describes the steps of a successful code review process. It's a process that starts with understanding code, which can even benefit from a…
  continue reading
 
Manual secure code reviews can be tedious and time intensive if you're just going through checklists. There's plenty of room for linters and compilers and all the grep-like tools to find flaws. Louis Nyffenegger describes the steps of a successful code review process. It's a process that starts with understanding code, which can even benefit from a…
  continue reading
 
Manual secure code reviews can be tedious and time intensive if you're just going through checklists. There's plenty of room for linters and compilers and all the grep-like tools to find flaws. Louis Nyffenegger describes the steps of a successful code review process. It's a process that starts with understanding code, which can even benefit from a…
  continue reading
 
Interview with Dave Lewis Organizations believe they have a firm grip on security with SSO and corporate IT policies, but in reality, shadow IT lurks in the background—expanding attack surfaces and exposing sensitive data. Employees bypass security controls for the sake of convenience, while SSO fails to provide the comprehensive security net organ…
  continue reading
 
Gush, feature film from Bandit Motion Pictures. Starring Ellie Church, Alyss Winkler, and Jason Crowe. Written and directed by Brian K. Williams, and Scott Schirmer. This is my review of the film.Bandit Motion Pictures:https://banditmotionpictures.com/Join our brand new Patreon at: https://patreon.com/user?u=64040006&u...You can find Charles Campbe…
  continue reading
 
This conversation explores the intersection of cybersecurity and emerging technologies, focusing on innovative hacking techniques, the evolution of vulnerability management, and the critical importance of asset discovery. The discussion also delves into the implications of cyber warfare, the persistent threat of default passwords, and the integrati…
  continue reading
 
I sit down with LA radio legend, Big Boy to talk Hip-hop, Weight Loss, Riots & Radio. Follow Big Boy YT: https://www.youtube.com/BigBoyTVyt IG: https://www.instagram.com/bigboy My new special “Lucky” is streaming now on Netflix! --------------------------------------------------- Sponsors: Butcher Box - Right now, ButcherBox is offering our listene…
  continue reading
 
In this episode, Mandy Logan, Summer Craze Fowler, Jason Albuquerque, and Jeff Pollard of Forrester discuss the challenges and strategies for CISOs in navigating volatility in the security landscape. They emphasize the importance of building relationships within the organization, particularly with the CFO, to manage budgets effectively. The convers…
  continue reading
 
In this episode of Security Weekly News, Doug White discusses various cybersecurity threats, including the Salt Typhoon and Spark Kitty malware, the implications of Microsoft's decision to drop support for old hardware drivers, and the potential increase in cyber threats from Iran. The conversation also covers the alarming 16 billion password leak …
  continue reading
 
Chef Brad Leone and comedian Steph Tolev stop by… so I crank up the pizza oven Brad gave me, and we have a feast. We’re all getting our hands dirty with squid pie, a kimchi Korean pie, and a Carbonara pizza I’ve been dying to try… make sure to check-out Brad’s YouTube channel – and check out Steph’s new special "Filth Queen" on Netflix!Follow Brad …
  continue reading
 
Chef Brad Leone and comedian Steph Tolev stop by… so I crank up the pizza oven Brad gave me, and we have a feast. We’re all getting our hands dirty with squid pie, a kimchi Korean pie, and a Carbonara pizza I’ve been dying to try… make sure to check-out Brad’s YouTube channel – and check out Steph’s new special "Filth Queen" on Netflix!Follow Brad …
  continue reading
 
Fuzzing has been one of the most successful ways to improve software quality. And it demonstrates how improving software quality improves security. Artur Cygan shares his experience in building and applying fuzzers to barcode scanners, smart contracts, and just about any code you can imagine. We go through the useful relationship between unit tests…
  continue reading
 
Fuzzing has been one of the most successful ways to improve software quality. And it demonstrates how improving software quality improves security. Artur Cygan shares his experience in building and applying fuzzers to barcode scanners, smart contracts, and just about any code you can imagine. We go through the useful relationship between unit tests…
  continue reading
 
Fuzzing has been one of the most successful ways to improve software quality. And it demonstrates how improving software quality improves security. Artur Cygan shares his experience in building and applying fuzzers to barcode scanners, smart contracts, and just about any code you can imagine. We go through the useful relationship between unit tests…
  continue reading
 
In fast-paced, shared device environments like healthcare, manufacturing, and other critical industries, traditional access management approaches are falling short, quietly eroding both security and productivity. This episode explores how outdated methods, like shared credentials and clunky logins, create friction, increase risk, and undermine comp…
  continue reading
 
This week: * The true details around Salt Typhoon are still unknown * The search for a portable pen testing device * Directories named "hacker2" are suspicious * Can a $24 cable compete with a $180 cable? * Hacking Tesla wall chargers * Old Zyxel exploits are new again * Hacking Asus drivers * Stealing KIAs - but not like you may think * Fake artic…
  continue reading
 
I sit down with musician, Andy Frasco. We talk about AI LeeAnn, BDSM test, messy hotel rooms,working too much, his new album, and much more! Andy Frasco & The U.N.’s new album “Growing Pains” is streaming everywhere now! Follow Andy YT: https://www.youtube.com/c/AndyFrasco IG: https://www.instagram.com/andyfrasco My new special “Lucky” is streaming…
  continue reading
 
In this episode of Business Security Weekly, Mandy Logan, along with guests Peter Hedberg, Summer Craze Fowler, and Ben Carr, delve into the complexities of cyber insurance and the empowerment of Chief Information Security Officers (CISOs). The discussion covers the evolving landscape of cyber insurance, the critical role of underwriting, and the i…
  continue reading
 
Power couple Robert Irvine and Gail Kim stop by the kitchen to chat about two of my favorite things… wrestling and food. Robert gives me some culinary tips while I serve up one of HIS ramen recipes, and Gail and I geek out on WWE. We also may or may not have a new side-biz with Guy Fieri.Follow Robert Irvine:https://www.instagram.com/chefirvineFoll…
  continue reading
 
Power couple Robert Irvine and Gail Kim stop by the kitchen to chat about two of my favorite things… wrestling and food. Robert gives me some culinary tips while I serve up one of HIS ramen recipes, and Gail and I geek out on WWE. We also may or may not have a new side-biz with Guy Fieri.Follow Robert Irvine:https://www.instagram.com/chefirvineFoll…
  continue reading
 
What makes a threat modeling process effective? Do you need a long list of threat actors? Do you need a long list of terms? What about a short list like STRIDE? Has an effective process ever come out of a list? Farshad Abasi joins our discussion as we explain why the answer to most of those questions is No and describe the kinds of approaches that …
  continue reading
 
What makes a threat modeling process effective? Do you need a long list of threat actors? Do you need a long list of terms? What about a short list like STRIDE? Has an effective process ever come out of a list? Farshad Abasi joins our discussion as we explain why the answer to most of those questions is No and describe the kinds of approaches that …
  continue reading
 
What makes a threat modeling process effective? Do you need a long list of threat actors? Do you need a long list of terms? What about a short list like STRIDE? Has an effective process ever come out of a list? Farshad Abasi joins our discussion as we explain why the answer to most of those questions is No and describe the kinds of approaches that …
  continue reading
 
Loading …
Copyright 2025 | Privacy Policy | Terms of Service | | Copyright
Listen to this show while you explore
Play