Search a title or topic

Over 20 million podcasts, powered by 

Player FM logo

Jess Singh Podcasts

show episodes
 
Artwork
 
Welcome to The Disruptionists – the podcast for visionary entrepreneurs and business owners who are ready to redefine marketing and branding. Hosted by Jess Singh, a leader in innovative marketing, this channel explores transformative branding, advanced marketing tactics, and enhancing the customer journey. Each episode offers practical insights on brand strategy and business leadership, crafted to revolutionize the approaches of SME owners. Whether you're refining your marketing, exploring ...
  continue reading
 
The “Know What You See” podcast delves into the ways our fundamental need to connect with others profoundly shapes our experience of life. On each episode, through conversations with experts and people just trying to make sense of it all, Brian Lowery takes a journey of exploration—answering and raising questions to deepen our understanding of and appreciation for the often surprising, sometimes perplexing, and now and then transcendent lives we create together.
  continue reading
 
I’m breaking bread with big-name friends—old and new—for a delicious meal and candid convos that can only happen over a glass of wine. We're getting out of the studio and into my favorite restaurants across Los Angeles and New York City with people like Julie Bowen, Kristen Bell, Fred Armisen, Jesse Williams, Niecy Nash-Betts, and so many more. I know, a celebrity-interview podcast, who’s doing that? No one. Which is why I needed to. We’ll get vulnerable about everything from relationships a ...
  continue reading
 
Artwork

1
Plus 1

Linda Ayrapetov

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Plus 1 is a podcast about self-love, body politics, and dating. Linda shares her experiences as a plus size woman, looking for "the one" and interviews others to gain a diverse perspective on these topics. Follow her on social media for updates @Lindusiki @Plus1Pod
  continue reading
 
Artwork

1
Security Weekly Podcast Network (Audio)

Security Weekly Productions

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Daily
 
Welcome to the Security Weekly Podcast Network, your all-in-one source for the latest in cybersecurity! This feed features a diverse lineup of shows, including Application Security Weekly, Business Security Weekly, Paul's Security Weekly, Enterprise Security Weekly, and Security Weekly News. Whether you're a cybersecurity professional, business leader, or tech enthusiast, we cover all angles of the cybersecurity landscape. Tune in for in-depth panel discussions, expert guest interviews, and ...
  continue reading
 
Loading …
show series
 
This episode is the second in our occasional series on important, controversial, or unusually relevant conservative texts from the recent past. Here we take up Charles Murray's 2012 book, Coming Apart: The State of White America, 1960-2010. With its focus on the ascendence of a new "cognitive elite," cultural divides, and the pathologies afflicting…
  continue reading
 
Still managing compliance in a spreadsheet? Don't have enough time or resources to verify your control or risk posture? And you wonder why you can't get the budget to move your compliance and risk programs forward. Maybe it's time for a different approach. Trevor Horwitz, Founder and CISO at TrustNet joins Business Security Weekly to discuss how th…
  continue reading
 
Interest and participation in the OWASP GenAI Security Project has exploded over the last two years. Steve Wilson explains why it was important for the project to grow beyond just a Top Ten list and address more audiences than just developers. He also talks about how the growth of AI Agents influences the areas that appsec teams need to focus on. W…
  continue reading
 
Actor Lizzy Caplan joins the show. Over fried catfish and Chinese broccoli salad, we reminisce about our early days as castmates in the sitcom “The Class”—including the infamous table read she slept through—and how that period shaped both of our careers. Lizzy shares stories about growing up in Los Angeles, breaking out in “Mean Girls,” and finding…
  continue reading
 
Segment 1 - Interview with Dr. Anand Singh We're always thrilled to have authors join us to discuss their new book releases, and this week, it is Dr. Anand Singh. He seriously hustled to get his new book, Data Security in the Age of AI, out as soon as possible so that it could help folks dealing with securing AI rollouts right now! We'll discuss wh…
  continue reading
 
Ballistic Hot Dogs, Sonicwall, Clayrat, Twonet, Lockbit, Breachforums, Resumes, Discord, Aaran Leyland, and More on this edition of the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-519
  continue reading
 
This week we kick things off with a special interview: Kieran Human from Threat Locker talks about EDR bypasses and other special projects. In the security news: Hacking TVs Flushable wipes are not the only problem People just want to spy on their pets, except the devices can be hacked Linux EDR is for the birds What does my hat say we love exploit…
  continue reading
 
Global spending on cybersecurity products and services will see a strong 14.4% CAGR from 2024 through 2029 and will hit $302.5 billion in 2029, driven by continued concerns around cyberattacks across all verticals and geographies. But where is the spending occuring and how do you prepare? Merritt Maxim, VP & Research Director at Forrester, joins Bu…
  continue reading
 
Listen to the rest of this premium episode by subscribing at patreon.com/knowyourenemy. Before embarking on a spirited bout of rank punditry, we take a step back and talk about the Staple Singers, Hannah Arendt's Origins of Totalitarianism, Tocqueville's Democracy in America, Zohran, and giving a damn about both your "fellow man" and democracy. The…
  continue reading
 
At Oktane 2025, leaders from across the security ecosystem shared how identity has become the new front line in protecting today’s AI-driven enterprises. As SaaS adoption accelerates and AI agents proliferate, organizations face an explosion of human and non-human identities—and with it, growing risks like misconfigured access, orphaned accounts, a…
  continue reading
 
In addition to some fun news, we get a Mary Ann Davidson as a surprise guest. We even get a great quote from her of "You're never going to have enough cybersecurity people to defend what was never built to be defensible.". Visit https://www.securityweekly.com/psw for all the latest episodes! Show Notes: https://securityweekly.com/psw-894…
  continue reading
 
More than four out of ten (41%) Chief Information Officers (CIOs) report cybersecurity as their top concern, yet these same leaders are simultaneously increasing security budgets (77%), expanding cloud infrastructure (68%), and accelerating artificial intelligence (AI) capabilities (67%). According to the new Future Forward: CIO 2025 Outlook report…
  continue reading
 
Dealing with vulns tends to be a discussion about prioritization. After all, there a tons of CVEs and dependencies with known vulns. It's important to figure out how to present developers with useful vuln info that doesn't overwhelm them. Francesco Cipollone shares how to redirect that discussion to focus on remediation and how to incorporate LLMs …
  continue reading
 
Actor, comedian, and jazz singer Lea DeLaria joins the show. Over enchiladas and rosé, Lea reflects on a life of firsts — from becoming the first openly gay comic on American television with her legendary “Arsenio Hall Show” set, to stealing scenes as Big Boo on Netflix’s “Orange Is the New Black.” We revisit our nearly 30-year friendship, beginnin…
  continue reading
 
To try to understand both the power and strangeness of the Charlie Kirk memorial—one part evangelical worship service, one part MAGA rally—we turned, of course, to our friend Pat Blanchfield. All three of us stewed in the event's footage, which runs to over four and a half hours, then convened to discuss it. After laying out for listeners what happ…
  continue reading
 
How identity security can keep pace with the evolving threat landscape, with Brett Winterford Today’s threat landscape has never been more complex. Malicious actors are leveraging tools like generative AI to develop more creative social engineering attacks that can have serious ramifications for businesses. Brett Winterford, VP of Okta Threat Intel…
  continue reading
 
As AI and cloud-based services power our connected world, individuals are facing an unprecedented privacy crisis. With more than 2.3 billion people entrusting their data to the cloud and centralized servers, cyberattacks, data breaches, surveillance, identity theft, and privacy threats are now everyday risks. How do we protect against these threats…
  continue reading
 
In the news, Microsoft encounters a new cascade of avoidable errors with Entra ID, Apple improves iOS with hardware-backed memory safety, DeepSeek demonstrates the difficulty in reviewing models, curl reduces risk by eliminating code, preserving the context of code reviews, and more! Visit https://www.securityweekly.com/asw for all the latest episo…
  continue reading
 
In this new episode of The Disruptionist, Jess Singh builds a complete marketing strategy for a real-world business, in just 10 minutes. No prep, no fluff, just sharp positioning, audience clarity, and scalable tactics for service-based brands that want to stop blending in. From redefining ideal client personas to crafting high-trust funnels and st…
  continue reading
 
'Murderbot’ star Noma Dumezweni joins the show. Over pumpkin curry and pad see ew, Noma reflects on the joy of finding success in mid-life and why it’s never too late to dream bigger than you imagined. She opens up about tough days growing up as a refugee in the UK, her unexpected and acclaimed turn (and Tony nominated role) as Hermione Granger in …
  continue reading
 
Interview with Tod Beardsley This interview is sponsored by runZero. Legacy vulnerability management (VM) hasn't innovated alongside of attackers, and it shows. Let's talk about the state of VM. Check out https://securityweekly.com/runzero to learn more! Topic Segment: NPM Incidents In this week’s topic segment, we’re discussing all the NPM supply …
  continue reading
 
In this episode of Security Weekly News, Joshua Marpet and Aaran Leyland discuss the latest trends in AI and cybersecurity, focusing on innovations from CrowdStrike, the implications of new cyber incident reporting rules, and the evolving landscape of ransomware. They explore the role of AI in enhancing security measures, the challenges posed by ma…
  continue reading
 
Listen to the rest of this premium episode by subscribing at patreon.com/knowyourenemy. The assassination of Turning Points USA founder Charlie Kirk on September 10, 2025, seemed to change the landscape of American politics in an instant, inspiring a startlingly unanimous battlecry of vengeance from the conservative movement, the GOP, and the Trump…
  continue reading
 
This week's technical segment is all about the T-Lora Pager from Lilygo, and really cool Meshtastic device that can also be used for some hacking tasks! In the security news: Your safe is not safe Cisco ASA devices are under attack VMScape HybridPetya and UEFI attacks in the wild Eveything is a Linux terminal Hackers turns 30 Hosting websites on di…
  continue reading
 
In the leadership and communications segment, Lack of board access: The No. 1 factor for CISO dissatisfaction, Pressure on CISOs to stay silent about security incidents growing, The Secret to Building a High-Performing Team, and more! Jackie McGuire sits down with Chuck Randolph, SVP of Strategic Intelligence & Security at 360 Privacy, for a grippi…
  continue reading
 
This week, we chat with Scott Clinton, board member and co-chain of the OWASP GenAI Security Project. This project has become a massive organization within OWASP with hundreds of volunteers and thousands of contributors. This team has been cranking out new tools, reports and guidance for practitioners month after month for over a year now. We start…
  continue reading
 
‘Downton Abbey: The Grand Finale’ star Elizabeth McGovern joins the show. Over Greek snapper, Elizabeth tells me about her critically acclaimed play ‘Ava: The Secret Conversations,’ which she adapted and stars in. We talk about what inhabiting the Hollywood femme fatale taught her. We also discuss her first series regular gig at age 49 as the iconi…
  continue reading
 
Segment 1 - Interview with Jeff Pollard Introducing Forrester’s AEGIS Framework: Agentic AI Enterprise Guardrails For Information Security For this episode’s interview, we’re talking to Forrester analyst Jeff Pollard. I’m pulling this segment’s description directly from the report’s executive summary, which I think says it best: As AI agents and ag…
  continue reading
 
Since the start of the Trump Era over a decade ago, few words have been deployed as often as "democracy": how it's become imperiled, who threatens it, and what to do to defend it. In The Right of the People: Democracy and the Case for a New American Founding, Osita Nwanevu sets out to understand the true meaning of democracy and defend it from its …
  continue reading
 
This week: Americans Can't Hack It Copy and paste to get malware Pixel 5 web servers - because you can How they got in and why security is hard Vulnerability management is failing - is it dead yet? Exploiting hacker tools Bluetooth spending spree! How to defend your car IoT security solutions and other such lies Exploiting IBM i (formerly AS/400) V…
  continue reading
 
With volatility now the norm, security and risk leaders need practical guidance on managing existing spending and new budgetary necessities. Where should they look? Jess Burn, Principal Analyst at Forrester Research, joins Business Security Weekly to discuss Forrester's Budget Planning Guide 2026: Security And Risk. This data-and-insights-driven re…
  continue reading
 
Up first, the ASW news of the week. At Black Hat 2025, Doug White interviews Ted Shorter, CTO of Keyfactor, about the quantum revolution already knocking on cybersecurity’s door. They discuss the terrifying reality of quantum computing’s power to break RSA and ECC encryption—the very foundations of modern digital life. With 2030 set as the deadline…
  continue reading
 
In this new episode of The Disruptionist, Jess Singh breaks down the boldest brand moves shaking up marketing, from sleep tape launches with cult-like community vibes to jazz-filled guerrilla campaigns in NYC. These aren’t just clever tactics, they’re strategic plays that build emotional connection, drive loyalty, and cut through the noise. Jess re…
  continue reading
 
Writer, director, musician and “How I Met Your Mother” star Josh Radnor joins the show. Over oat milk cortados and bavette steak, I ask him about his new rewatch podcast, How We Made Your Mother, inspired by his wife’s first time watching the series. Josh opens up about the highs and lows of life in an ensemble cast and how, with time and distance,…
  continue reading
 
Doug White sits down with Theresa Lanowitz, Chief Evangelist at LevelBlue, for a powerful and timely conversation about one of cybersecurity’s most pressing threats: the software supply chain. Theresa shares fresh insights from LevelBlue’s global research involving 1,500 cybersecurity professionals across 16 countries. Together, they unpack the rea…
  continue reading
 
Listen to the rest of this premium episode by subscribing at patreon.com/knowyourenemy. Roman Polanski's 2019 film about the Dreyfus affair, An Officer and a Spy, only recently made it's U.S. "premier," running for a few weeks in August at Film Forum in New York City. When it originally was released, it couldn't find an American distributor (and li…
  continue reading
 
Loading …
Copyright 2025 | Privacy Policy | Terms of Service | | Copyright
Listen to this show while you explore
Play