Search a title or topic

Over 20 million podcasts, powered by 

Player FM logo

Marshall Stevenson Podcasts

show episodes
 
What begins with a body in a kitchen freezer leads Debi Marshall to a sordid tale of seduction and lies, from Adelaide, to the Outback to the Adriatic Coast. Debi's investigation is the story of the five-part true crime series on Foxtel; Debi Marshall Investigates Frozen Lies. But the story of murder Victim Derrance Stevenson, draws Debi into the web of one of Australia's most terrifying network of paedophiles, known colloquially as 'The Family'. Despite the horrifying scale of the cries, on ...
  continue reading
 
Welcome to the Empire. I truly believe that everyone is an expert, and now I’m looking to talk with you and share your expertise with the world. Each episode of Expert Empire is a conversation jam packed with valuable content from todays foremost entrepreneurs, innovators and personal development experts. Experts like Cliff Ravenscraft, Rand Fishkin, John Lee Dumas, Dana DiTomaso, Mark Mason and so many more. We hope that you’ll join us each episode to learn something new.
  continue reading
 
Artwork

1
Paul Saladino MD podcast

Paul Saladino, MD

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Throughout my training and practice as a physician I have come to one very disappointing conclusion: Western medicine isn’t helping people lead better lives. Now that I’ve realized this, I’ve become obsessed with understanding what makes us healthy or ill. I want to live the best life I can and I want to be able to share this knowledge with others so that they can do the same. This podcast is the result of my relentless search to understand the roots of chronic disease. I hope you’ll join me ...
  continue reading
 
Artwork

1
Enterprise Security Weekly (Audio)

Security Weekly Productions

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
News, analysis, and insights into enterprise security. We put security vendors under the microscope, and explore the latest trends that can help defenders succeed. Hosted by Adrian Sanabria. Co hosts: Katie Teitler-Santullo, Ayman Elsawah, Jason Wood, Jackie McGuire.
  continue reading
 
Artwork

1
Enterprise Security Weekly (Video)

Security Weekly Productions

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly+
 
News, analysis, and insights into enterprise security. We put security vendors under the microscope, and explore the latest trends that can help defenders succeed. Hosted by Adrian Sanabria. Co hosts: Katie Teitler-Santullo, Ayman Elsawah, Jason Wood, Jackie McGuire.
  continue reading
 
Loading …
show series
 
Segment 1: Interview with Monzy Merza - There is a Right and Wrong Way to use AI in the SOC In the rush to score AI funding dollars, a lot of startups build a basic wrapper around existing generative AI services like those offered by OpenAI and Anthropic. As a result, these services are expensive, and don't satisfy many security operations teams' p…
  continue reading
 
Segment 1: Interview with Monzy Merza - There is a Right and Wrong Way to use AI in the SOC In the rush to score AI funding dollars, a lot of startups build a basic wrapper around existing generative AI services like those offered by OpenAI and Anthropic. As a result, these services are expensive, and don't satisfy many security operations teams' p…
  continue reading
 
Single Sign On (SSO) and Multi Factor Authentication (MFA) is critical to secure operations for companies of all sizes. Why is the foundation of cybersecurity still locked behind enterprise licensing? Single Sign-On (SSO) and Multi-Factor Authentication (MFA) are essential—not optional—for protecting modern businesses. But today, these critical too…
  continue reading
 
Single Sign On (SSO) and Multi Factor Authentication (MFA) is critical to secure operations for companies of all sizes. Why is the foundation of cybersecurity still locked behind enterprise licensing? Single Sign-On (SSO) and Multi-Factor Authentication (MFA) are essential—not optional—for protecting modern businesses. But today, these critical too…
  continue reading
 
Interview with Dave Lewis Organizations believe they have a firm grip on security with SSO and corporate IT policies, but in reality, shadow IT lurks in the background—expanding attack surfaces and exposing sensitive data. Employees bypass security controls for the sake of convenience, while SSO fails to provide the comprehensive security net organ…
  continue reading
 
Interview with Dave Lewis Organizations believe they have a firm grip on security with SSO and corporate IT policies, but in reality, shadow IT lurks in the background—expanding attack surfaces and exposing sensitive data. Employees bypass security controls for the sake of convenience, while SSO fails to provide the comprehensive security net organ…
  continue reading
 
🗞️ Newsletter — Reclaim Your Optimal Health: https://www.paulsaladinomd.co/sign-up Find out your ideal diet with my ANIMAL-BASED CALCULATOR: https://www.paulsaladinomd.co/ab-guide#calculator Ever wonder why you're exhausted despite eating well, or why your child's behavioral issues seem impossible to solve? The answers might be hiding in tests your…
  continue reading
 
In fast-paced, shared device environments like healthcare, manufacturing, and other critical industries, traditional access management approaches are falling short, quietly eroding both security and productivity. This episode explores how outdated methods, like shared credentials and clunky logins, create friction, increase risk, and undermine comp…
  continue reading
 
In fast-paced, shared device environments like healthcare, manufacturing, and other critical industries, traditional access management approaches are falling short, quietly eroding both security and productivity. This episode explores how outdated methods, like shared credentials and clunky logins, create friction, increase risk, and undermine comp…
  continue reading
 
🗞️ Newsletter — Reclaim Your Optimal health: https://www.paulsaladinomd.co/sign-up Find out your ideal diet with my ANIMAL-BASED CALCULATOR: https://www.paulsaladinomd.co/ab-guide#calculator What if the system that allowed thousands of chemicals into our food with minimal oversight is finally getting a major overhaul? For years, a loophole meant fo…
  continue reading
 
Segment 1 - Interview with Rob Allen from ThreatLocker This segment is sponsored by ThreatLocker. Visit https://www.securityweekly.com/threatlocker to learn more about them! Segment 2 - Topic: Growing Trend - Edge Computing and Hybrid Cloud Segment 3 - Interviews from RSAC 2025 Cyera Cyera is the fastest-growing data security company in history, em…
  continue reading
 
Segment 1 - Interview with Rob Allen from ThreatLocker This segment is sponsored by ThreatLocker. Visit https://www.securityweekly.com/threatlocker to learn more about them! Segment 2 - Topic: Growing Trend - Edge Computing and Hybrid Cloud Segment 3 - Interviews from RSAC 2025 Cyera Cyera is the fastest-growing data security company in history, em…
  continue reading
 
Segment 1 - Enterprise Security News, Live at IDV This week, in the enterprise security news, Acquisitions potential IPOs Terminator Salvation in real life First $1B one-employee business? Mikko puts in his notice Pitch Black in real life, and more! Segment 2 - Interview with Dr. Tina Srivastava The #1 cause of data breaches is stolen credentials. …
  continue reading
 
Segment 1 - Enterprise Security News, Live at IDV This week, in the enterprise security news, Acquisitions potential IPOs Terminator Salvation in real life First $1B one-employee business? Mikko puts in his notice Pitch Black in real life, and more! Segment 2 - Interview with Dr. Tina Srivastava The #1 cause of data breaches is stolen credentials. …
  continue reading
 
A young woman murdered in an Australian country town. People too afraid to speak for decades are finally breaking their silence. What happened in 23-year-old Rachelle Childs' final nine hours? Now, 24 years since Rachelle was murdered, an unstoppable cold case team has assembled to drive this live investigation. Tips from the public are pouring in …
  continue reading
 
🗞️ Newsletter — Reclaim Your Optimal Health: https://www.paulsaladinomd.co/sign-up Find out your ideal diet with my ANIMAL-BASED CALCULATOR: https://www.paulsaladinomd.co/ab-guide Last week, I had the privilege of attending a press conference at the White House where I got the opportunity to sit down with Vani Hari. Vani has been one of the leaders…
  continue reading
 
🗞️ Newsletter — Reclaim Your Optimal health: https://www.paulsaladinomd.co/sign-up?utm_source=youtube&utm_medium=video&utm_campaign=BobbyKennedy — — — Find out your ideal diet with my ANIMAL-BASED CALCULATOR: https://www.paulsaladinomd.co/ab-guide#calculator?utm_source=youtube&utm_medium=video&utm_campaign=BobbyKennedy — — — For decades, we've beeL…
  continue reading
 
Segment 1 CTG Interview Middle market companies face unique challenges in the ever-evolving cyber environment. Developing a comprehensive cybersecurity approach is a business imperative for middle market companies, and Chad Alessi will discuss the threat landscape, what’s keeping IT decision-makers awkward at night, and the best approach to creatin…
  continue reading
 
Segment 1 CTG Interview Middle market companies face unique challenges in the ever-evolving cyber environment. Developing a comprehensive cybersecurity approach is a business imperative for middle market companies, and Chad Alessi will discuss the threat landscape, what’s keeping IT decision-makers awkward at night, and the best approach to creatin…
  continue reading
 
Segment 1: Erik Bloch Interview The math on SOC AI just isn't adding up. It's not easy to do the math, either, as each SOC automation vendor is tackling alert fatigue and SecOps assistants a bit differently. Fortunately for us and our audience, Erik Bloch met with many of these vendors at RSAC and is going to share what he learned with us! Segment …
  continue reading
 
Segment 1: Erik Bloch Interview The math on SOC AI just isn't adding up. It's not easy to do the math, either, as each SOC automation vendor is tackling alert fatigue and SecOps assistants a bit differently. Fortunately for us and our audience, Erik Bloch met with many of these vendors at RSAC and is going to share what he learned with us! Segment …
  continue reading
 
🗞️ Newsletter — Reclaim Your Optimal health: https://www.paulsaladinomd.co/sign-up?utm_source=youtube&utm_medium=video&utm_campaign=Honey_EricMason--- --- ---Find out your ideal diet with my ANIMAL-BASED CALCULATOR: https://www.paulsaladinomd.co/ab-guide#calculator?utm_source=youtube&utm_medium=video&utm_campaign=Honey_EricMason--- --- ---You might…
  continue reading
 
Segment 1: Fastly Interview In this week's interview segment, we talk to Marshall Erwin about the state of cybersecurity, particularly when it comes to third party risk management, and whether we're ready for the next big SolarWinds or Crowdstrike incident. These big incidents have inspired executive orders, the Secure by Design initiative, and eve…
  continue reading
 
Segment 1: Fastly Interview In this week's interview segment, we talk to Marshall Erwin about the state of cybersecurity, particularly when it comes to third party risk management, and whether we're ready for the next big SolarWinds or Crowdstrike incident. These big incidents have inspired executive orders, the Secure by Design initiative, and eve…
  continue reading
 
Segment 1 - Secrets and their role in infrastructure security From API keys and tokens to environment variables and credentials, secrets are foundational—and often overlooked—attack surfaces in cloud-native and distributed systems. We break down the risks tied to poor secret hygiene, discuss emerging patterns for secure secret management at scale, …
  continue reading
 
Segment 1 - Secrets and their role in infrastructure security From API keys and tokens to environment variables and credentials, secrets are foundational—and often overlooked—attack surfaces in cloud-native and distributed systems. We break down the risks tied to poor secret hygiene, discuss emerging patterns for secure secret management at scale, …
  continue reading
 
🗞️ Newsletter — Reclaim Your Optimal health: https://www.paulsaladinomd.co/sign-up?utm_source=youtube&utm_medium=video&utm_campaign=DrOvadia--- --- ---Ever wonder why your LDL cholesterol might shoot up after you started eating healthier, cutting out seed oils and sugar, and your doctor freaked out?It's a common story, and the panic often misses th…
  continue reading
 
Now in its 18th year, the Verizon Business DBIR is one of the industry’s longest standing and leading reports on the current cybersecurity landscape. This year’s report analyzes more than 22,000 security incidents with victims spanning 139 countries, examining significant growth in third-party involvement in breaches, increases in ransomware and ex…
  continue reading
 
Now in its 18th year, the Verizon Business DBIR is one of the industry’s longest standing and leading reports on the current cybersecurity landscape. This year’s report analyzes more than 22,000 security incidents with victims spanning 139 countries, examining significant growth in third-party involvement in breaches, increases in ransomware and ex…
  continue reading
 
Loading …
Copyright 2025 | Privacy Policy | Terms of Service | | Copyright
Listen to this show while you explore
Play