Podcast yang ngebahas kebanyakan tentang game Counter Strike dan dunia esport
…
continue reading
Jason Fernando Podcasts
Brock Kingsley and Jason Wiseman discuss and review movies worth watching in a way that nerd-ish types do when they sit down to chat. Passionate opinions, (bad) inside jokes, obscure references, and rants; there will be rants. Often irreverent, sometimes insightful. Plus, occasional special guests and special topics.
…
continue reading
TGG Cover art photo provided by Jason Leung on Unsplash: https://unsplash.com/@ninjason
…
continue reading
News, analysis, and insights into enterprise security. We put security vendors under the microscope, and explore the latest trends that can help defenders succeed. Hosted by Adrian Sanabria. Co hosts: Katie Teitler-Santullo, Ayman Elsawah, Jason Wood, Jackie McGuire.
…
continue reading
News, analysis, and insights into enterprise security. We put security vendors under the microscope, and explore the latest trends that can help defenders succeed. Hosted by Adrian Sanabria. Co hosts: Katie Teitler-Santullo, Ayman Elsawah, Jason Wood, Jackie McGuire.
…
continue reading
The World Cup is here Daily shows on the pod International guests Have been given the nod Break-downs, debates And segments for laughs Please do tune in To our light-hearted cast Featuring Harper Pestinger, Gerald Lynch, Lucas Rinaldo, Pat Brischetto, Tom Williams, George Kostakos, Gui Finkler, Tony Wilson, Marcos Flores, Jason Pine, Fernando Rech and more!
…
continue reading
Welcome to the Story podcast, where amazing things happen. Cover art photo provided by Jason Leem on Unsplash: https://unsplash.com/@jleeems
…
continue reading
Hosted by celebrated criminal justice reform advocate and founding board member of the Innocence Project Jason Flom, Pulitzer prize-winning podcast host and producer Maggie Freleng, and Emmy Award-winning writer, producer, and podcast host Lauren Bright Pacheco, Wrongful Conviction features intimate conversations with men and women who have spent years in prison for crimes they maintain they did not commit. Some have been fully exonerated and reunited with family and friends while others con ...
…
continue reading

1
Epicenter - Learn about Crypto, Blockchain, Ethereum, Bitcoin and Distributed Technologies
Epicenter Media Ltd.
Epicenter brings you in-depth conversations about the technical, economic and social implications of cryptocurrencies and blockchain technologies. Every week, we interview business leaders, engineers academics and entrepreneurs, and bring you a diverse spectrum of opinions and points of view. Epicenter is hosted by Sebastien Couture, Brian Fabian Crain, Friederike Ernst, Meher Roy and Felix Lutsch. Since 2014, our episodes have been downloaded over 8 million times.
…
continue reading
Welcome to the Security Weekly Podcast Network, your all-in-one source for the latest in cybersecurity! This feed features a diverse lineup of shows, including Application Security Weekly, Business Security Weekly, Paul's Security Weekly, Enterprise Security Weekly, and Security Weekly News. Whether you're a cybersecurity professional, business leader, or tech enthusiast, we cover all angles of the cybersecurity landscape. Tune in for in-depth panel discussions, expert guest interviews, and ...
…
continue reading
Podcast by San Francisco Bay ICC
…
continue reading
Welcome to the Portuguese Football Podcast, a weekly podcast in which host Brian Fonseca discusses the latest happenings in the world of Portuguese football. From the Grandes of Benfica/Porto/Sporting to the sides fighting relegation, from the Seleção A to the U-17, Fonseca takes you through all relevant news, discussing it for listeners to understand and throwing in some personal flavor with his opinion. The podcast is inspired by the Spanish Football Podcast done by the Guardian's Sid Lowe ...
…
continue reading
Overwhelmed by choice in the Peak TV era? Join hosts and IRL friends Tolani Shoneye (of 'The Receipts' podcast fame) and Gena-mour Barrett (who works for Netflix) as they discuss what they're watching, and what they think * you * should be watching too. Each week they'll be accompanied by a guest from the world of Netflix, who'll share a recommendation of their own. From brand new shows to overlooked gems, 10/10 Would Recommend is a freewheeling, unfiltered review show that will help you spe ...
…
continue reading

1
'DIY: The Rise and Fall and Rise of Punk Rock' Interview with Joel Herrera and Rolo Cantu
34:46
34:46
Play later
Play later
Lists
Like
Liked
34:46Another entry in our DIFF interview series. This time, a documentary: DIY: The Rise and Fall and Rise of Punk Rock. It's a doc that's true to its name, and ethos--as are the filmmakers Joel Herrera and Rolo Cantu. DIY: The Rise and Fall and Rise of Punk Rock teaser Support Why Does the Wilhelm Scream Keep in touch and read more at whydoesthewilhelm…
…
continue reading

1
Rethinking Identity: IAM, PAM & Passwordless Trends from Identiverse - Chip Hughes, Ashley Stevenson, John Pritchard, Amit Masand, Matt Caulfield, David Lee - ESW #412
1:38:23
1:38:23
Play later
Play later
Lists
Like
Liked
1:38:23In fast-paced, shared device environments like healthcare, manufacturing, and other critical industries, traditional access management approaches are falling short, quietly eroding both security and productivity. This episode explores how outdated methods, like shared credentials and clunky logins, create friction, increase risk, and undermine comp…
…
continue reading

1
Rethinking Identity: IAM, PAM & Passwordless Trends from Identiverse - David Lee, Amit Masand, Chip Hughes, Ashley Stevenson, John Pritchard, Matt Caulfield - ESW #412
1:38:23
1:38:23
Play later
Play later
Lists
Like
Liked
1:38:23In fast-paced, shared device environments like healthcare, manufacturing, and other critical industries, traditional access management approaches are falling short, quietly eroding both security and productivity. This episode explores how outdated methods, like shared credentials and clunky logins, create friction, increase risk, and undermine comp…
…
continue reading

1
Rethinking Identity: IAM, PAM & Passwordless Trends from Identiverse - David Lee, Amit Masand, Chip Hughes, Ashley Stevenson, John Pritchard, Matt Caulfield - ESW #412
1:38:23
1:38:23
Play later
Play later
Lists
Like
Liked
1:38:23In fast-paced, shared device environments like healthcare, manufacturing, and other critical industries, traditional access management approaches are falling short, quietly eroding both security and productivity. This episode explores how outdated methods, like shared credentials and clunky logins, create friction, increase risk, and undermine comp…
…
continue reading

1
Donut Holes, clickfix, rapperbots, bad devs, war, Doug Rants about Backups, and More. - SWN #487
33:37
33:37
Play later
Play later
Lists
Like
Liked
33:37Donut Holes, clickfix, rapperbots, bad devs, war, Doug Rants about Backups, and More on this episode of the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-487
…
continue reading

1
DappCon 25: The Ticker Is $ETH - Jerome de Tychey, Joshua Dávila & Nixorokish
1:12:32
1:12:32
Play later
Play later
Lists
Like
Liked
1:12:32As the summer tour of European crypto conferences landed in Berlin, one of crypto’s cradles, we couldn’t miss DappCon 25, where we got to sit with Jerome de Tychey, Nixorokish & Joshua Dávila to discuss Ethereum’s restructure and whether its culture is still relevant to the wider crypto community. Join us for a fascinating discussion on the impact …
…
continue reading
This week: * The true details around Salt Typhoon are still unknown * The search for a portable pen testing device * Directories named "hacker2" are suspicious * Can a $24 cable compete with a $180 cable? * Hacking Tesla wall chargers * Old Zyxel exploits are new again * Hacking Asus drivers * Stealing KIAs - but not like you may think * Fake artic…
…
continue reading
On the morning of August 20, 2012, police and firefighters were called to a house fire in Detroit, MI. Bobby Cross and Darryl Simms died in the fire. Bobby’s long-term partner’s son, Duane Williams, was staying over the house that week, but he was not harmed in the fire. Rather, he was accused and ultimately charged with arson and felony murder. Af…
…
continue reading

1
CISO Cyber Insurance Empowerment - Morey Haber, Peter Hedberg, Stephan Jou - BSW #400
1:03:41
1:03:41
Play later
Play later
Lists
Like
Liked
1:03:41Segment description coming soon! This month BeyondTrust released it's 12th annual edition of the Microsoft Vulnerabilities Report. The report reveals a record-breaking year for Microsoft vulnerabilities, and helps organizations understand, identify, and address the risks within their Microsoft ecosystems. Segment Resources: Insights Security Assess…
…
continue reading

1
AI Zombie Lawyer, Scattered Spider, ASUS, Mainframes, GrayAlpha, Backups, Josh Marpet - SWN #486
36:26
36:26
Play later
Play later
Lists
Like
Liked
36:26AI Zombie Lawyers, Scattered Spider, ASUS, Mainframes, GrayAlpha, Backups, Josh Marpet, and more on the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-486
…
continue reading

1
Threat Modeling With Good Questions and Without Checklists - Farshad Abasi - ASW #335
1:08:00
1:08:00
Play later
Play later
Lists
Like
Liked
1:08:00What makes a threat modeling process effective? Do you need a long list of threat actors? Do you need a long list of terms? What about a short list like STRIDE? Has an effective process ever come out of a list? Farshad Abasi joins our discussion as we explain why the answer to most of those questions is No and describe the kinds of approaches that …
…
continue reading
In 1987, 18-year-old Michelle Schofield was found dead in a phosphate pit in Florida. Two years later, her husband, Leo Schofield, was convicted of her murder and sentenced to life in prison. Fifteen years after his conviction, previously unidentified fingerprints found in Michelle’s car were matched to Jeremy Scott—a violent teenager who lived nea…
…
continue reading

1
Lombard: Unlocking Bitcoin DeFi Through Liquid, Yield-Bearing LBTC - Jacob Phillips
1:11:09
1:11:09
Play later
Play later
Lists
Like
Liked
1:11:09Bitcoin remains an untapped source of net-new liquidity that could be injected into DeFi. This would completely reshape Bitcoin’s utilization from a mere store of value to a liquid asset that can be ported cross-chain and traded like a liquid staking derivative. Lombard’s LBTC builds upon Babylon’s Bitcoin staking primitive and aims to unlock new y…
…
continue reading

1
Insider threats, migrating away from cloud, RSAC interviews with Cyera and Blumira - Yotam Segev, Matthew Warner, Rob Allen - ESW #411
1:19:04
1:19:04
Play later
Play later
Lists
Like
Liked
1:19:04Segment 1 - Interview with Rob Allen from Threatlocker Segment 2 - Topic: Growing Trend - Edge Computing and Hybrid Cloud Segment 3 - Interviews from RSAC 2025 Cyera Cyera is the fastest-growing data security company in history, empowering companies to classify, secure, and manage their data, wherever it is, and leverage the power of the industry’s…
…
continue reading

1
Insider threats, migrating away from cloud, RSAC interviews with Cyera and Blumira - Rob Allen, Matthew Warner, Yotam Segev - ESW #411
1:19:04
1:19:04
Play later
Play later
Lists
Like
Liked
1:19:04Segment 1 - Interview with Rob Allen from Threatlocker Segment 2 - Topic: Growing Trend - Edge Computing and Hybrid Cloud Segment 3 - Interviews from RSAC 2025 Cyera Cyera is the fastest-growing data security company in history, empowering companies to classify, secure, and manage their data, wherever it is, and leverage the power of the industry’s…
…
continue reading

1
Insider threats, migrating away from cloud, RSAC interviews with Cyera and Blumira - Rob Allen, Matthew Warner, Yotam Segev - ESW #411
1:19:04
1:19:04
Play later
Play later
Lists
Like
Liked
1:19:04Segment 1 - Interview with Rob Allen from Threatlocker Segment 2 - Topic: Growing Trend - Edge Computing and Hybrid Cloud Segment 3 - Interviews from RSAC 2025 Cyera Cyera is the fastest-growing data security company in history, empowering companies to classify, secure, and manage their data, wherever it is, and leverage the power of the industry’s…
…
continue reading

1
$200,000 Zoom Call, Microsoft, Zero-Click, China & HD With $649 million of Bitcoin - SWN #485
28:38
28:38
Play later
Play later
Lists
Like
Liked
28:38This week we have, $200,000 Zoom Call, Microsoft Teams, INTERPOL, Zero-Click, Junk Food, China & Hard Drive With $649 million of Bitcoin. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-485
…
continue reading

1
UEFI Vulnerabilities Galore - PSW #878
2:10:48
2:10:48
Play later
Play later
Lists
Like
Liked
2:10:48This week: You got a Bad box, again Cameras are expose to the Internet EU and connected devices Hydrophobia NVRAM variables Have you heard about IGEL Linux? SSH and more NVRAM AI skeptics are nuts, and AI doesn't make you more efficient Trump Cybersecurity orders I think I can root my Pixel 6 Decentralized Wordpres plugin manager Threat actor namin…
…
continue reading

1
#529 The Wrongful Conviction of Leonard Peltier - Part 3
41:59
41:59
Play later
Play later
Lists
Like
Liked
41:59In part three of this three-part series, at Leonard’s trial in 1977 federal prosecutors changed the failed narrative from the Butler / Robideau trial, claiming that Leonard executed the agents with an AR15 that they claimed matched casings found near the bodies. Bruce Ellison and Ron Kuby explain how false evidence was used to secure a conviction t…
…
continue reading

1
Security Money: The Index is Up, CISOs Need to Get Out, and Are You Burning Out? - BSW #399
56:27
56:27
Play later
Play later
Lists
Like
Liked
56:27This week, it’s time for security money. The index is up, but the previous quarterly results were brutal. In the leadership and communications segment, Get out of the audit committee: Why CISOs need dedicated board time, Quietly Burning Out? What To Do When Your Leadership Starts Lacking, How to rethink leadership to energize disengaged employees, …
…
continue reading

1
Vixen Panda, NPM, Roundcube, IoT, 4Chan, Josh Marpet, and more... - SWN #484
32:23
32:23
Play later
Play later
Lists
Like
Liked
32:23Vixen Panda, NPM, Roundcube, IoT, 4Chan, Josh Marpet, and more on the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-484
…
continue reading

1
Bringing CISA's Secure by Design Principles to OT Systems - Matthew Rogers - ASW #334
1:09:09
1:09:09
Play later
Play later
Lists
Like
Liked
1:09:09CISA has been championing Secure by Design principles. Many of the principles are universal, like adopting MFA and having opinionated defaults that reduce the need for hardening guides. Matthew Rogers talks about how the approach to Secure by Design has to be tailored for Operational Technology (OT) systems. These systems have strict requirements o…
…
continue reading

1
The enterprise security news, more secure by removing credentials, & RSAC interviews - Marty Momdjian, Amit Saha, Dr. Tina Srivastava - ESW #410
1:38:02
1:38:02
Play later
Play later
Lists
Like
Liked
1:38:02Segment 1 - Enterprise Security News, Live at IDV This week, in the enterprise security news, Acquisitions potential IPOs Terminator Salvation in real life First $1B one-employee business? Mikko puts in his notice Pitch Black in real life, and more! Segment 2 - Interview with Dr. Tina Srivastava The #1 cause of data breaches is stolen credentials. …
…
continue reading

1
The enterprise security news, more secure by removing credentials, & RSAC interviews - Marty Momdjian, Amit Saha, Dr. Tina Srivastava - ESW #410
1:38:02
1:38:02
Play later
Play later
Lists
Like
Liked
1:38:02Segment 1 - Enterprise Security News, Live at IDV This week, in the enterprise security news, Acquisitions potential IPOs Terminator Salvation in real life First $1B one-employee business? Mikko puts in his notice Pitch Black in real life, and more! Segment 2 - Interview with Dr. Tina Srivastava The #1 cause of data breaches is stolen credentials. …
…
continue reading

1
The enterprise security news, more secure by removing credentials, & RSAC interviews - Marty Momdjian, Amit Saha, Dr. Tina Srivastava - ESW #410
1:38:02
1:38:02
Play later
Play later
Lists
Like
Liked
1:38:02Segment 1 - Enterprise Security News, Live at IDV This week, in the enterprise security news, Acquisitions potential IPOs Terminator Salvation in real life First $1B one-employee business? Mikko puts in his notice Pitch Black in real life, and more! Segment 2 - Interview with Dr. Tina Srivastava The #1 cause of data breaches is stolen credentials. …
…
continue reading

1
Elsa, Redline, ChaosRat, iMessage, Bladed Feline , Aaran Leyland, and More... - SWN #483
34:00
34:00
Play later
Play later
Lists
Like
Liked
34:00Elsa, Redline, ChaosRat, iMessage, Bladed Feline , Aaran Leyland, and More on this episode of the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-483
…
continue reading

1
Staking Rewards: Is Crypto Staking Killing Decentralisation? - Mirko Schmiedl & Tobias Jung
54:55
54:55
Play later
Play later
Lists
Like
Liked
54:55Apart from incentivising market participants to secure the network through inflationary rewards, many consider staking as an equivalent of stock dividend yield. As a result, although Bitcoin is regarded as digital gold, protocols are looking for ways to increase its utilisation in DeFi and, ultimately, generate yield. Nowadays, while newer networks…
…
continue reading

1
Updating & Protecting Linux Systems - PSW #877
1:05:23
1:05:23
Play later
Play later
Lists
Like
Liked
1:05:23Two parts to this episode: Tech Segment: Updating Linux Systems - Beyond apt-get upgrade * Custom scripts for ensuring your Linux systems are up-to-date * topgrade - tutorial for using topgrade to update Linux systems on various Linux distributions Discussion Topic: Anti-Malware and/or EDR on Linux Platforms * PCI calls for scanning Linux systems *…
…
continue reading

1
#528 The Wrongful Conviction of Leonard Peltier - Part 2
32:45
32:45
Play later
Play later
Lists
Like
Liked
32:45Ben Bowlin, new co-host of Wrongful Conviction and host of the long-standing podcast Stuff the Don’t Want You to Know and Jason Flom from the Wrongful Conviction podcast had the honor of sitting down for many hours to speak with Leonard Peltier about his personal life, the historical context of the resistance movement and events that led to the att…
…
continue reading

1
'Party People' Interview: Lindsey Robertson, and Joey LePage
59:08
59:08
Play later
Play later
Lists
Like
Liked
59:08There is no way to accurately describe to you how much fun we had talking to Lindsey and Joey--the duo responsible for the brilliant, funny, touching, insightful, crazy-smart film 'Party People.' We can't wait for you all to see this movie when it hits screens. Good Lord, these two are the absolute best. @partypeoplemovie Support Why Does the Wilhe…
…
continue reading

1
Regain Control of Business Risks, Your Leadership Habits, and Being Present - Alla Valente - BSW #398
1:18:17
1:18:17
Play later
Play later
Lists
Like
Liked
1:18:17During times of volatility, business leaders often don’t know what they are able to change or even what they should change. At precisely these times, business leaders become risk leaders and need to quickly learn how to identify what is within their control and what isn’t — to not only survive but thrive. Alla Valente, Principal Analyst at Forreste…
…
continue reading

1
Bovril, Deranged, Crocodilus, Cartier, Jinx, Conti, Scattered Spider, Josh Marpet... - SWN #482
37:10
37:10
Play later
Play later
Lists
Like
Liked
37:10Bovril, Deranged Hookworm, Crocodilus, Cartier, Jinx, Conti, Scattered Spider, Josh Marpet, and more on the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-482
…
continue reading

1
AIs, MCPs, and the Acutal Work that LLMs Are Generating - ASW #333
39:06
39:06
Play later
Play later
Lists
Like
Liked
39:06The recent popularity of MCPs is surpassed only by the recent examples deficiencies of their secure design. The most obvious challenge is how MCPs, and many more general LLM use cases, have erased two decades of security principles behind separating code and data. We take a look at how developers are using LLMs to generate code and continue our sea…
…
continue reading

1
ETHPrague: ETH Renaissance - Austin Griffith, Brenda Loya, Joseph Schweitzer, Marek Olszewski
1:00:25
1:00:25
Play later
Play later
Lists
Like
Liked
1:00:25After a decade of existence, Ethereum has gone a long way from its initial whitepaper, yet many efforts in scaling and finding product-market-fit have been severely criticized for falling short of their promise. However, despite numerous other ‘Ethereum killers’ being launched over the years, none has managed to attract so many developers and liqui…
…
continue reading

1
Building Cyber Resilience: AI Threats, Mid-Market Risks & Ransomware Trends - Eyal Benishti, Chris Peluso, Chad Alessi, Tony Anscombe, Karl Van den Bergh, Nick Carroll - ESW #409
1:38:33
1:38:33
Play later
Play later
Lists
Like
Liked
1:38:33Segment 1 CTG Interview Middle market companies face unique challenges in the ever-evolving cyber environment. Developing a comprehensive cybersecurity approach is a business imperative for middle market companies, and Chad Alessi will discuss the threat landscape, what’s keeping IT decision-makers awkward at night, and the best approach to creatin…
…
continue reading

1
Building Cyber Resilience: AI Threats, Mid-Market Risks & Ransomware Trends - Karl Van den Bergh, Tony Anscombe, Eyal Benishti, Nick Carroll, Chad Alessi, Chris Peluso - ESW #409
1:38:33
1:38:33
Play later
Play later
Lists
Like
Liked
1:38:33Segment 1 CTG Interview Middle market companies face unique challenges in the ever-evolving cyber environment. Developing a comprehensive cybersecurity approach is a business imperative for middle market companies, and Chad Alessi will discuss the threat landscape, what’s keeping IT decision-makers awkward at night, and the best approach to creatin…
…
continue reading

1
Building Cyber Resilience: AI Threats, Mid-Market Risks & Ransomware Trends - Karl Van den Bergh, Tony Anscombe, Eyal Benishti, Nick Carroll, Chad Alessi, Chris Peluso - ESW #409
1:38:33
1:38:33
Play later
Play later
Lists
Like
Liked
1:38:33Segment 1 CTG Interview Middle market companies face unique challenges in the ever-evolving cyber environment. Developing a comprehensive cybersecurity approach is a business imperative for middle market companies, and Chad Alessi will discuss the threat landscape, what’s keeping IT decision-makers awkward at night, and the best approach to creatin…
…
continue reading

1
Edge, Safari, CISO Pay and Loathing, Fake AI, ASUS, OneDrive, Manus, Aaran Leyland... - SWN #481
33:15
33:15
Play later
Play later
Lists
Like
Liked
33:15Edge, Safari, CISO Pay and Loathing, Fake AI, ASUS, OneDrive, Manus, Aaran Leyland, and More on this episode of the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-481
…
continue reading
In the security news: Vicious Trap - The malware hiding in your router Hacking your car WSL is open-source, but why? Using AI to find vulnerabilities - a case study Why you should not build your own password manager The inside scoop behind Lumma Infostealer Hacking a smart grill Hardcoded credentials on end of life routers and "Alphanetworks" SIM s…
…
continue reading

1
#527 The Wrongful Conviction of Leonard Peltier - Part 1
48:06
48:06
Play later
Play later
Lists
Like
Liked
48:06Ben Bowlin, new co-host of Wrongful Conviction and host of the long-standing podcast Stuff the Don’t Want You to Know and Jason Flom from the Wrongful Conviction podcast had the honor of sitting down for many hours to speak with Leonard Peltier about his personal life, the historical context of the resistance movement and events that led to the att…
…
continue reading

1
Quantum Readiness & Zero Trust: Strategies to Strengthen Digital Resilience - Jordan Avnaim, Chris Hickman, Amit Sinha, Albert Estevez Polo - BSW #397
1:07:59
1:07:59
Play later
Play later
Lists
Like
Liked
1:07:59This segment explores how automated microsegmentation addresses critical Zero Trust gaps overlooked by traditional access controls and legacy segmentation solutions. We'll examine the limitations of perimeter-based defenses in today's dynamic threat landscape and reveal how automated microsegmentation enhances network security beyond conventional f…
…
continue reading

1
AP Tests, Hyper-V, Notepad, Google, Nova Scotia, NHI, Bond, Josh Marpet, and more... - SWN #480
35:14
35:14
Play later
Play later
Lists
Like
Liked
35:14AP Tests, Hyper-V, Notepad, Google, Nova Scotia, NHI, Bond, Josh Marpet, and more on the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-480
…
continue reading