Bert Kreischer invites his favorite comedians, actors and musicians into his kitchen to cook for them
…
continue reading
Fuzz Productions Podcasts
The complete and crazy musical adventures that begins with the murder of kids' TV show host and spins out into a world of: angry puppets, a tooth worshipping cult, a fuzzy elder god, and so, so much more!
…
continue reading
About all things AppSec, DevOps, and DevSecOps. Hosted by Mike Shema and John Kinsella, the podcast focuses on helping its audience find and fix software flaws effectively.
…
continue reading
About all things AppSec, DevOps, and DevSecOps. Hosted by Mike Shema and John Kinsella, the podcast focuses on helping its audience find and fix software flaws effectively.
…
continue reading
Comic and man of the world Bert Kreischer shares his wisdom and life with you.
…
continue reading
The daily podcast in which hosts Scott Carelli and Nick Jimenez analyze Edgar Wright’s Cornetto Trilogy one minute at a time.
…
continue reading
On HORROR 421 - The Podcast, your hosts, Charles Campbell will discuss happenings in the world of HORROR. From books, film and music. There will be a wide range of topics with occasional guests from all corners of the Horror and entertainment world. Join us every other Friday for a new HORROR 421 - The Podcast Episode! On Backstage 421 - The Musicians Only Podcast, Charles Campbell will discuss what's happening in music with musicians from a plethora of genres. If you're a music lover, this ...
…
continue reading
Documentary filmmaker Justin Beahm (Reverend Entertainment) takes to the airwaves with insightful conversations spotlighting fascinating people from all walks.
…
continue reading
We're making our way through a list of the 100 Greatest films of all time to see if any of them would be on your own list. Join us on the journey.
…
continue reading
Welcome to the Security Weekly Podcast Network, your all-in-one source for the latest in cybersecurity! This feed features a diverse lineup of shows, including Application Security Weekly, Business Security Weekly, Paul's Security Weekly, Enterprise Security Weekly, and Security Weekly News. Whether you're a cybersecurity professional, business leader, or tech enthusiast, we cover all angles of the cybersecurity landscape. Tune in for in-depth panel discussions, expert guest interviews, and ...
…
continue reading
This podcast is an audio archive of YouTube livestream recording with Patrick Collins and professionals in the web3 smart contract development field.
…
continue reading

1
North Korea, ransomware, social engineering, AI, Apple, Drugs & Iran - SWN #491
28:50
28:50
Play later
Play later
Lists
Like
Liked
28:50North Korea, ransomware, social engineering, AI, Apple, Drugs & Iran on this edition of the Security Weekly News! Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-491
…
continue reading

1
Exploring Meshtastic and LoRa Mesh Networks - Rob Allen - PSW #881
1:08:14
1:08:14
Play later
Play later
Lists
Like
Liked
1:08:14This week, we dive into the world of Meshtastic and LoRa—two technologies empowering secure, long-range, and infrastructure-free communication. We'll talk about the origins of Meshtastic, how LoRa radio works, and why mesh networking is revolutionizing off-grid messaging for adventurers, hackers, emergency responders, and privacy advocates alike. W…
…
continue reading

1
# 683 - Giggles & Tears with Chanel West Coast
1:44:42
1:44:42
Play later
Play later
Lists
Like
Liked
1:44:42I sit down with Chanel West Coast to talk about, Rod Dyrdek, leaving Ridiculousness, Fantasy Factory, Rob & Big, her music career, becoming a Mom, and much more! Follow Chanel YT: https://www.youtube.com/@ChanelWC IG: https://www.instagram.com/chanelwestcoast My new special “Lucky” is streaming now on Netflix! --------------------------------------…
…
continue reading

1
The Value of Zero Trust - Rob Allen - BSW #402
32:29
32:29
Play later
Play later
Lists
Like
Liked
32:29New research estimates the value of Zero Trust. Using the Marsh McLennan Cyber Risk Intelligence Center’s proprietary cyber losses dataset from the past eight years, researchers estimated that overall cyber losses could have been potentially reduced by up to 31% had the organizations widely deployed zero-trust security. This adds up to a projected …
…
continue reading

1
Sony, Scattered Spider, Hikvision, Cybercrime, Iran, BSODs, Cloudflare, Josh Marpet.. - SWN #490
31:11
31:11
Play later
Play later
Lists
Like
Liked
31:11Sony, Scattered Spider, Hikvision, Cybercrime, Iran, BSODs, Cloudflare, Josh Marpet, and more on the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-490
…
continue reading

1
Something's Burning: LeeAnn’s Lasagna + Loud Music with Strawberry Fuzz | S5 E19
1:18:51
1:18:51
Play later
Play later
Lists
Like
Liked
1:18:51Venice-based band Strawberry Fuzz is out with a new album – and stops by the kitchen to talk about it. It’s a family-style Italian feast with warm, marinated olives and LeeAnn’s famous lasagna. We also have a heart-to-heart about who is actually famous around here. Check out their new album, Miller’s Garage - https://open.spotify.com/album/43vXOnMe…
…
continue reading

1
S5 E19: LeeAnn’s Lasagna + Loud Music with Strawberry Fuzz
1:18:51
1:18:51
Play later
Play later
Lists
Like
Liked
1:18:51Venice-based band Strawberry Fuzz is out with a new album – and stops by the kitchen to talk about it. It’s a family-style Italian feast with warm, marinated olives and LeeAnn’s famous lasagna. We also have a heart-to-heart about who is actually famous around here. Check out their new album, Miller’s Garage - https://open.spotify.com/album/43vXOnMe…
…
continue reading

1
Simple Patterns for Complex Secure Code Reviews - Louis Nyffenegger - ASW #337
38:26
38:26
Play later
Play later
Lists
Like
Liked
38:26Manual secure code reviews can be tedious and time intensive if you're just going through checklists. There's plenty of room for linters and compilers and all the grep-like tools to find flaws. Louis Nyffenegger describes the steps of a successful code review process. It's a process that starts with understanding code, which can even benefit from a…
…
continue reading

1
Simple Patterns for Complex Secure Code Reviews - Louis Nyffenegger - ASW #337
38:26
38:26
Play later
Play later
Lists
Like
Liked
38:26Manual secure code reviews can be tedious and time intensive if you're just going through checklists. There's plenty of room for linters and compilers and all the grep-like tools to find flaws. Louis Nyffenegger describes the steps of a successful code review process. It's a process that starts with understanding code, which can even benefit from a…
…
continue reading

1
Simple Patterns for Complex Secure Code Reviews - Louis Nyffenegger - ASW #337
38:26
38:26
Play later
Play later
Lists
Like
Liked
38:26Manual secure code reviews can be tedious and time intensive if you're just going through checklists. There's plenty of room for linters and compilers and all the grep-like tools to find flaws. Louis Nyffenegger describes the steps of a successful code review process. It's a process that starts with understanding code, which can even benefit from a…
…
continue reading

1
The Illusion of Control: Shadow IT, SSO Shortcomings, and the True Path to Security - Dave Lewis - ESW #413
1:52:05
1:52:05
Play later
Play later
Lists
Like
Liked
1:52:05Interview with Dave Lewis Organizations believe they have a firm grip on security with SSO and corporate IT policies, but in reality, shadow IT lurks in the background—expanding attack surfaces and exposing sensitive data. Employees bypass security controls for the sake of convenience, while SSO fails to provide the comprehensive security net organ…
…
continue reading

1
HORROR 421 - The Podcast, Season 4, Episode 9, GUSH Review
10:04
10:04
Play later
Play later
Lists
Like
Liked
10:04Gush, feature film from Bandit Motion Pictures. Starring Ellie Church, Alyss Winkler, and Jason Crowe. Written and directed by Brian K. Williams, and Scott Schirmer. This is my review of the film.Bandit Motion Pictures:https://banditmotionpictures.com/Join our brand new Patreon at: https://patreon.com/user?u=64040006&u...You can find Charles Campbe…
…
continue reading

1
Broadcom, Direct Send, N0auth, UNFI, Cisco, Oneclik, Russ Beauchemin, and more... - SWN #489
31:28
31:28
Play later
Play later
Lists
Like
Liked
31:28Broadcom is coming for you, Direct Send, N0auth, UNFI, Cisco, Oneclik, Russ Beauchemin, and More on this episode of the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-489
…
continue reading

1
Is Vuln Management Dead? - HD Moore - PSW #880
2:16:08
2:16:08
Play later
Play later
Lists
Like
Liked
2:16:08This conversation explores the intersection of cybersecurity and emerging technologies, focusing on innovative hacking techniques, the evolution of vulnerability management, and the critical importance of asset discovery. The discussion also delves into the implications of cyber warfare, the persistent threat of default passwords, and the integrati…
…
continue reading

1
# 682 - Off-air with Radio Legend Big Boy
2:06:41
2:06:41
Play later
Play later
Lists
Like
Liked
2:06:41I sit down with LA radio legend, Big Boy to talk Hip-hop, Weight Loss, Riots & Radio. Follow Big Boy YT: https://www.youtube.com/BigBoyTVyt IG: https://www.instagram.com/bigboy My new special “Lucky” is streaming now on Netflix! --------------------------------------------------- Sponsors: Butcher Box - Right now, ButcherBox is offering our listene…
…
continue reading

1
Thriving Through Volatility: Insights for CISOs - Jeff Pollard, Pejman (Pej) Roshan, Deepen Desai - BSW #401
1:05:24
1:05:24
Play later
Play later
Lists
Like
Liked
1:05:24In this episode, Mandy Logan, Summer Craze Fowler, Jason Albuquerque, and Jeff Pollard of Forrester discuss the challenges and strategies for CISOs in navigating volatility in the security landscape. They emphasize the importance of building relationships within the organization, particularly with the CFO, to manage budgets effectively. The convers…
…
continue reading

1
The Rise of Malware: Salt Typhoon and Spark Kitty - SWN #488
35:37
35:37
Play later
Play later
Lists
Like
Liked
35:37In this episode of Security Weekly News, Doug White discusses various cybersecurity threats, including the Salt Typhoon and Spark Kitty malware, the implications of Microsoft's decision to drop support for old hardware drivers, and the potential increase in cyber threats from Iran. The conversation also covers the alarming 16 billion password leak …
…
continue reading

1
Something’s Burning: Squid, Kimchi, and Carbonara on Pizza?? | Brad Leone + Steph Tolev | S5 E18
1:44:58
1:44:58
Play later
Play later
Lists
Like
Liked
1:44:58Chef Brad Leone and comedian Steph Tolev stop by… so I crank up the pizza oven Brad gave me, and we have a feast. We’re all getting our hands dirty with squid pie, a kimchi Korean pie, and a Carbonara pizza I’ve been dying to try… make sure to check-out Brad’s YouTube channel – and check out Steph’s new special "Filth Queen" on Netflix!Follow Brad …
…
continue reading

1
S5 E18: Squid, Kimchi, and Carbonara on Pizza?? | Brad Leone + Steph Tolev
1:44:58
1:44:58
Play later
Play later
Lists
Like
Liked
1:44:58Chef Brad Leone and comedian Steph Tolev stop by… so I crank up the pizza oven Brad gave me, and we have a feast. We’re all getting our hands dirty with squid pie, a kimchi Korean pie, and a Carbonara pizza I’ve been dying to try… make sure to check-out Brad’s YouTube channel – and check out Steph’s new special "Filth Queen" on Netflix!Follow Brad …
…
continue reading

1
How Fuzzing Barcodes Raises the Bar for Secure Code - Artur Cygan - ASW #336
1:01:18
1:01:18
Play later
Play later
Lists
Like
Liked
1:01:18Fuzzing has been one of the most successful ways to improve software quality. And it demonstrates how improving software quality improves security. Artur Cygan shares his experience in building and applying fuzzers to barcode scanners, smart contracts, and just about any code you can imagine. We go through the useful relationship between unit tests…
…
continue reading

1
How Fuzzing Barcodes Raises the Bar for Secure Code - Artur Cygan - ASW #336
1:01:18
1:01:18
Play later
Play later
Lists
Like
Liked
1:01:18Fuzzing has been one of the most successful ways to improve software quality. And it demonstrates how improving software quality improves security. Artur Cygan shares his experience in building and applying fuzzers to barcode scanners, smart contracts, and just about any code you can imagine. We go through the useful relationship between unit tests…
…
continue reading

1
How Fuzzing Barcodes Raises the Bar for Secure Code - Artur Cygan - ASW #336
1:01:18
1:01:18
Play later
Play later
Lists
Like
Liked
1:01:18Fuzzing has been one of the most successful ways to improve software quality. And it demonstrates how improving software quality improves security. Artur Cygan shares his experience in building and applying fuzzers to barcode scanners, smart contracts, and just about any code you can imagine. We go through the useful relationship between unit tests…
…
continue reading

1
Rethinking Identity: IAM, PAM & Passwordless Trends from Identiverse - David Lee, Amit Masand, Chip Hughes, Ashley Stevenson, John Pritchard, Matt Caulfield - ESW #412
1:38:23
1:38:23
Play later
Play later
Lists
Like
Liked
1:38:23In fast-paced, shared device environments like healthcare, manufacturing, and other critical industries, traditional access management approaches are falling short, quietly eroding both security and productivity. This episode explores how outdated methods, like shared credentials and clunky logins, create friction, increase risk, and undermine comp…
…
continue reading

1
Donut Holes, clickfix, rapperbots, bad devs, war, Doug Rants about Backups, and More. - SWN #487
33:37
33:37
Play later
Play later
Lists
Like
Liked
33:37Donut Holes, clickfix, rapperbots, bad devs, war, Doug Rants about Backups, and More on this episode of the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-487
…
continue reading
This week: * The true details around Salt Typhoon are still unknown * The search for a portable pen testing device * Directories named "hacker2" are suspicious * Can a $24 cable compete with a $180 cable? * Hacking Tesla wall chargers * Old Zyxel exploits are new again * Hacking Asus drivers * Stealing KIAs - but not like you may think * Fake artic…
…
continue reading

1
# 681 - Andy Frasco & His Growing Pains
1:19:55
1:19:55
Play later
Play later
Lists
Like
Liked
1:19:55I sit down with musician, Andy Frasco. We talk about AI LeeAnn, BDSM test, messy hotel rooms,working too much, his new album, and much more! Andy Frasco & The U.N.’s new album “Growing Pains” is streaming everywhere now! Follow Andy YT: https://www.youtube.com/c/AndyFrasco IG: https://www.instagram.com/andyfrasco My new special “Lucky” is streaming…
…
continue reading

1
CISO Cyber Insurance Empowerment - Morey Haber, Peter Hedberg, Stephan Jou - BSW #400
1:03:41
1:03:41
Play later
Play later
Lists
Like
Liked
1:03:41In this episode of Business Security Weekly, Mandy Logan, along with guests Peter Hedberg, Summer Craze Fowler, and Ben Carr, delve into the complexities of cyber insurance and the empowerment of Chief Information Security Officers (CISOs). The discussion covers the evolving landscape of cyber insurance, the critical role of underwriting, and the i…
…
continue reading

1
Something’s Burning: Wrestle Mania + Restaurant Impossible w/ Robert Irvine + Gail Kim | S5 E17
1:36:03
1:36:03
Play later
Play later
Lists
Like
Liked
1:36:03Power couple Robert Irvine and Gail Kim stop by the kitchen to chat about two of my favorite things… wrestling and food. Robert gives me some culinary tips while I serve up one of HIS ramen recipes, and Gail and I geek out on WWE. We also may or may not have a new side-biz with Guy Fieri.Follow Robert Irvine:https://www.instagram.com/chefirvineFoll…
…
continue reading

1
S5 E17: Wrestle Mania + Restaurant Impossible w/ Robert Irvine + Gail Kim
1:36:03
1:36:03
Play later
Play later
Lists
Like
Liked
1:36:03Power couple Robert Irvine and Gail Kim stop by the kitchen to chat about two of my favorite things… wrestling and food. Robert gives me some culinary tips while I serve up one of HIS ramen recipes, and Gail and I geek out on WWE. We also may or may not have a new side-biz with Guy Fieri.Follow Robert Irvine:https://www.instagram.com/chefirvineFoll…
…
continue reading

1
AI Zombie Lawyer, Scattered Spider, ASUS, Mainframes, GrayAlpha, Backups, Josh Marpet - SWN #486
36:26
36:26
Play later
Play later
Lists
Like
Liked
36:26AI Zombie Lawyers, Scattered Spider, ASUS, Mainframes, GrayAlpha, Backups, Josh Marpet, and more on the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-486
…
continue reading

1
Threat Modeling With Good Questions and Without Checklists - Farshad Abasi - ASW #335
1:08:00
1:08:00
Play later
Play later
Lists
Like
Liked
1:08:00What makes a threat modeling process effective? Do you need a long list of threat actors? Do you need a long list of terms? What about a short list like STRIDE? Has an effective process ever come out of a list? Farshad Abasi joins our discussion as we explain why the answer to most of those questions is No and describe the kinds of approaches that …
…
continue reading

1
Threat Modeling With Good Questions and Without Checklists - Farshad Abasi - ASW #335
1:08:00
1:08:00
Play later
Play later
Lists
Like
Liked
1:08:00What makes a threat modeling process effective? Do you need a long list of threat actors? Do you need a long list of terms? What about a short list like STRIDE? Has an effective process ever come out of a list? Farshad Abasi joins our discussion as we explain why the answer to most of those questions is No and describe the kinds of approaches that …
…
continue reading

1
Threat Modeling With Good Questions and Without Checklists - Farshad Abasi - ASW #335
1:08:00
1:08:00
Play later
Play later
Lists
Like
Liked
1:08:00What makes a threat modeling process effective? Do you need a long list of threat actors? Do you need a long list of terms? What about a short list like STRIDE? Has an effective process ever come out of a list? Farshad Abasi joins our discussion as we explain why the answer to most of those questions is No and describe the kinds of approaches that …
…
continue reading