Search a title or topic

Over 20 million podcasts, powered by 

Player FM logo

Jordan Carroll Podcasts

show episodes
 
Artwork

1
Sunday Ain't Scary

Jordan Carroll

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
The Sunday Ain't Scary podcast is the show dedicated to those addicted to living outside of their comfort zone, obsessed with designing a life of freedom, and who choose to make every day count, because they know... Sunday Ain't Scary.⁣⁣
  continue reading
 
Artwork

1
Decoding the Gurus

Christopher Kavanagh and Matthew Browne

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
An exiled Northern Irish anthropologist and a hitchhiking Australian psychologist take a close look at the contemporary crop of 'secular gurus', iconoclasts, and other exiles from the mainstream, offering their own brands of unique takes and special insights. Leveraging two of the most diverse accents in modern podcasting, Chris and Matt dig deep into the claims, peek behind the psychological curtains, and try to figure out once and for all... What's it all About? Join us, as we try to puzzl ...
  continue reading
 
Artwork

1
The Why I Network

Kojo Thompson

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
The two most important days in your life are the day you are born and the day you find out WHY. This podcast is to help you find out "WHY." We interview every job and ask them WHY they started their passion so that you can find your dream job too! Hosted by Kojo Thompson. Follow us on all Social Media:@WhyiNetwork Contact: [email protected]
  continue reading
 
Artwork
 
Welcome to the Security Weekly Podcast Network, your all-in-one source for the latest in cybersecurity! This feed features a diverse lineup of shows, including Application Security Weekly, Business Security Weekly, Paul's Security Weekly, Enterprise Security Weekly, and Security Weekly News. Whether you're a cybersecurity professional, business leader, or tech enthusiast, we cover all angles of the cybersecurity landscape. Tune in for in-depth panel discussions, expert guest interviews, and ...
  continue reading
 
** Ad-free episodes are available to our paid supporters over at patreon.com/geeks ** Host David Barr Kirtley, author of the book Save Me Plz and Other Stories, talks geek culture with guests such as Neil Gaiman, George R. R. Martin, Richard Dawkins, Simon Pegg, Bill Nye, Margaret Atwood, Neil deGrasse Tyson, and Ursula K. Le Guin. Geek’s Guide to the Galaxy has appeared on recommended podcast lists from NPR, The Guardian, Wired, The A.V. Club, BBC America, CBC Radio, WVXU, io9, Omni, The St ...
  continue reading
 
Artwork
 
What makes a sneaker more than just a shoe? How do kicks become cultural icons and a multi-billion-dollar global industry? Hosted by Kenny Carroll, a true pioneer in the footwear and sneaker space since 1978 (and one of the original sellers of the Air Jordan), Sneaker Monster dives deep into the world of sneakers, from new releases and product insights to the culture and business behind the scenes. This podcast is your backstage pass to the intersection of fashion, lifestyle, and the sneaker ...
  continue reading
 
That Remote Life is a podcast focused on helping you become location independent in order to live life on your terms. Serial entrepreneur and traveler Mitko Karshovski interviews some of the most successful entrepreneurs and digital nomads to help uncover the strategies and skills to help you reach the same success. Follow Mitko's journey in real-time as he builds his own location independent business and shares all the lessons and experiences. If you are someone who wants to get out of a de ...
  continue reading
 
Download the latest episode of "Play Ball." Hosted by Harold Reynolds and additional MLB Network analysts, this half-hour show features one-on-one baseball demonstrations and conversations with some of the top personalities in the game, plus highlights from throughout Major League Baseball, and offers ideas for how kids can participate in all forms of baseball activities.
  continue reading
 
Artwork

1
Inquiring Minds

Indre Viskontas

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Each week we bring you a new, in-depth exploration of the space where science and society collide. We’re committed to the idea that making an effort to understand the world around you though science and critical thinking can benefit everyone—and lead to better decisions. We want to find out what’s true, what’s left to discover, and why it all matters.
  continue reading
 
Loading …
show series
 
Conscious Strength 💪 👉 https://www.consciousstrength.net My Links & Website 👉 https://www.jordansather.com/👉 https://allmylinks.com/jordansather Join my Locals community 👉 https://jordansather.locals.com/ Find my writings on Substack 👉 https://jordansather.substack.com/By jordansather
  continue reading
 
This week: * The true details around Salt Typhoon are still unknown * The search for a portable pen testing device * Directories named "hacker2" are suspicious * Can a $24 cable compete with a $180 cable? * Hacking Tesla wall chargers * Old Zyxel exploits are new again * Hacking Asus drivers * Stealing KIAs - but not like you may think * Fake artic…
  continue reading
 
Follow Your Heart In movies, songs, and well-meaning conversations, we hear the phrase, “Follow your heart.” Is this advice in line with the Bible? In this sermon, Adam offers five helpful “runway lights” to keep us on track with God’s will as we discern the path forward in our lives. Hint—one of them involves our hearts.…
  continue reading
 
Segment description coming soon! This month BeyondTrust released it's 12th annual edition of the Microsoft Vulnerabilities Report. The report reveals a record-breaking year for Microsoft vulnerabilities, and helps organizations understand, identify, and address the risks within their Microsoft ecosystems. Segment Resources: Insights Security Assess…
  continue reading
 
What makes a threat modeling process effective? Do you need a long list of threat actors? Do you need a long list of terms? What about a short list like STRIDE? Has an effective process ever come out of a list? Farshad Abasi joins our discussion as we explain why the answer to most of those questions is No and describe the kinds of approaches that …
  continue reading
 
Segment 1 - Interview with Rob Allen from Threatlocker Segment 2 - Topic: Growing Trend - Edge Computing and Hybrid Cloud Segment 3 - Interviews from RSAC 2025 Cyera Cyera is the fastest-growing data security company in history, empowering companies to classify, secure, and manage their data, wherever it is, and leverage the power of the industry’s…
  continue reading
 
Terence Tao is widely considered to be one of the greatest mathematicians in history. He won the Fields Medal and the Breakthrough Prize in Mathematics, and has contributed to a wide range of fields from fluid dynamics with Navier-Stokes equations to mathematical physics & quantum mechanics, prime numbers & analytics number theory, harmonic analysi…
  continue reading
 
Welcome to another enlightening episode of Decoding Academia. In this bonus preview of our highly secretive Patreon content, we are discussing a controversial paper by Dorsa Amir and Chaz Firestone that challenges the established notion of the Müller-Lyer illusion being a product of cultural environments. Prepare yourself for some high-level discus…
  continue reading
 
We venture into the darker corners of the gurusphere and marvel at some very, very brave individuals, their valiant efforts to play devil's advocate, and some world-class discourse surfing skills. Join us, won't you? Supplementary Material 31: Aquatic Nightmares, Strategic Obliviousness, & Race Realists 00:00 Introduction & Ol Squeaky Cameo 02:57 M…
  continue reading
 
This week: You got a Bad box, again Cameras are expose to the Internet EU and connected devices Hydrophobia NVRAM variables Have you heard about IGEL Linux? SSH and more NVRAM AI skeptics are nuts, and AI doesn't make you more efficient Trump Cybersecurity orders I think I can root my Pixel 6 Decentralized Wordpres plugin manager Threat actor namin…
  continue reading
 
In this mash-up column, Paul Jessup, of Fear is the Fire That Lights the Heart, and our own Alan Bailey along with guests Maurice Broaddus, and Susan Kaye Quinn explore the differences and simularities between the genre of horror and the subgenre of Solarpunk and come to some very surprising conclusions. We discuss community, resiliance, Weird fict…
  continue reading
 
This week, it’s time for security money. The index is up, but the previous quarterly results were brutal. In the leadership and communications segment, Get out of the audit committee: Why CISOs need dedicated board time, Quietly Burning Out? What To Do When Your Leadership Starts Lacking, How to rethink leadership to energize disengaged employees, …
  continue reading
 
Ever heard someone say, "God won't give you more than you can handle"? It sounds good, but it might not be the whole story. In fact, Scripture is full of stories about people who faced more than they could bear. This week, Jordan explores how we might adjust this common phrase in light of what God does give us - his grace, his presence, and his Spi…
  continue reading
 
CISA has been championing Secure by Design principles. Many of the principles are universal, like adopting MFA and having opinionated defaults that reduce the need for hardening guides. Matthew Rogers talks about how the approach to Secure by Design has to be tailored for Operational Technology (OT) systems. These systems have strict requirements o…
  continue reading
 
Segment 1 - Enterprise Security News, Live at IDV This week, in the enterprise security news, Acquisitions potential IPOs Terminator Salvation in real life First $1B one-employee business? Mikko puts in his notice Pitch Black in real life, and more! Segment 2 - Interview with Dr. Tina Srivastava The #1 cause of data breaches is stolen credentials. …
  continue reading
 
The Decoders welcome back cognitive anthropologist Manvir Singh for a continued exploration into the social and cognitive dimensions of shamanism. Building upon their earlier conversation, this episode involves further discussion of the psychological mechanisms and cultural patterns that make shamanic practices a recurring feature across human soci…
  continue reading
 
There’s been a disturbance in the Gurusphere. Two of its central objects of worship are feuding. The guru’s guru, Elon Musk, and the MAGA God-King, Donald Trump, have finally turned on each other, trading blows on social media. In this mini supplementary episode, Matt and Chris survey the shockwaves rippling through the Gurusphere as these titanic …
  continue reading
 
Two parts to this episode: Tech Segment: Updating Linux Systems - Beyond apt-get upgrade * Custom scripts for ensuring your Linux systems are up-to-date * topgrade - tutorial for using topgrade to update Linux systems on various Linux distributions Discussion Topic: Anti-Malware and/or EDR on Linux Platforms * PCI calls for scanning Linux systems *…
  continue reading
 
Sundar Pichai is CEO of Google and Alphabet. Thank you for listening ❤ Check out our sponsors: https://lexfridman.com/sponsors/ep471-sc See below for timestamps, transcript, and to give feedback, submit questions, contact Lex, etc. Transcript: https://lexfridman.com/sundar-pichai-transcript CONTACT LEX: Feedback – give feedback to Lex: https://lexf…
  continue reading
 
Three Ways God Lets Us Down, and Why We Can Still Trust Him “God will never let me down,” we sing, but if we’re honest with ourselves, many of us have felt let down by God. In this sermon Abby explores disappointment, how God uses falling as part of our formation, and Jesus’s invitation to a downwardly mobile life.…
  continue reading
 
During times of volatility, business leaders often don’t know what they are able to change or even what they should change. At precisely these times, business leaders become risk leaders and need to quickly learn how to identify what is within their control and what isn’t — to not only survive but thrive. Alla Valente, Principal Analyst at Forreste…
  continue reading
 
The recent popularity of MCPs is surpassed only by the recent examples deficiencies of their secure design. The most obvious challenge is how MCPs, and many more general LLM use cases, have erased two decades of security principles behind separating code and data. We take a look at how developers are using LLMs to generate code and continue our sea…
  continue reading
 
Segment 1 CTG Interview Middle market companies face unique challenges in the ever-evolving cyber environment. Developing a comprehensive cybersecurity approach is a business imperative for middle market companies, and Chad Alessi will discuss the threat landscape, what’s keeping IT decision-makers awkward at night, and the best approach to creatin…
  continue reading
 
Prepare for a hearty mix of culinary tips, avoidance of hypothetical scenarios, and the usual guru grievances. Will Jordan Peterson ever admit he's a Christian? Is it ever truly possible to understand Sam Harris AND still disagree with him? And where does Joe Rogan's primal hate for owls come in? Tune in for at least some of the answers to these pr…
  continue reading
 
In this medium-decoding episode, Matt and Chris turn their attention to an unlikely venue for cutting-edge theoretical physics: Piers Morgan Uncensored. There, Eric Weinstein, renegade genius and uber guru, squares off with Sean Carroll, an actual physicist and popular science communicator, in what might generously be called a “debate.” Eric brings…
  continue reading
 
In the security news: Vicious Trap - The malware hiding in your router Hacking your car WSL is open-source, but why? Using AI to find vulnerabilities - a case study Why you should not build your own password manager The inside scoop behind Lumma Infostealer Hacking a smart grill Hardcoded credentials on end of life routers and "Alphanetworks" SIM s…
  continue reading
 
In this episode, Alan and Cat talk to prolific writer and historian Harry Turtledove. They discuss Cat and Harry's collaboration on The Trumps Will Sound, Turtledove's new book: Powerless, Vaclav Havel, Totalitarianism, the power of the individual, Elon Musk, the alt-right in Science Fiction, reader interpretation of work, how the US would break up…
  continue reading
 
This segment explores how automated microsegmentation addresses critical Zero Trust gaps overlooked by traditional access controls and legacy segmentation solutions. We'll examine the limitations of perimeter-based defenses in today's dynamic threat landscape and reveal how automated microsegmentation enhances network security beyond conventional f…
  continue reading
 
ArmorCode unveils Anya—the first agentic AI virtual security champion designed specifically for AppSec and product security teams. Anya brings together conversation and context to help AppSec, developers and security teams cut through the noise, prioritize risks, and make faster, smarter decisions across code, cloud, and infrastructure. Built into …
  continue reading
 
Loading …
Copyright 2025 | Privacy Policy | Terms of Service | | Copyright
Listen to this show while you explore
Play