Search a title or topic

Over 20 million podcasts, powered by 

Player FM logo

Matthew Pollard Podcasts

show episodes
 
Welcome to The Automotive Truth with Matt & Irlanne Pollard! Join us, a husband-and-wife team married for over 17 years and veterans of the automotive industry with two decades of experience each. Each week, we dive into our world of cars, share the ups and downs of married life, and offer a unique blend of industry insights, personal stories, and plenty of laughs. As owners of PTL Autoworks, PTL Global , Christian Cars Texas Charity, we’re passionate about both the business and the impact w ...
  continue reading
 
EO 360°, a podcast by Entrepreneurs’ Organization (https://www.eonetwork.org/), explores entrepreneurship with a wide perspective, moving beyond business to those insights not often shared by high-profile thought leaders. Host and serial entrepreneur, Dave Will, leads in-depth interviews, whose featured guests include: Gazelles founder and CEO, Verne Harnish; popular podcast host and founder of Genius Network, Joe Polish; award-winning entrepreneur, Zahra Al-Harazi; and more. Tune into this ...
  continue reading
 
Artwork
 
It is time to get serious about growing your business, and have some fun while doing it. Hosted by business & entrepreneurship author Mike Michalowicz, we dive into interviews with real entrepreneurs who have been in the trenches. They give us the good, the bad, and the ugly when it comes to starting and growing a business. Each episode is an opportunity to pick up tidbits of entrepreneurship knowledge, and apply it to your business. Formerly the Entrepreneurship Elevated Podcast.
  continue reading
 
Author and mindset coach, Cheryl C. Jones guides you to your best outcomes in life and business through her chats with experts from diverse industries and circumstances who offer their "genius" tips to breaking through to bolder, best results.
  continue reading
 
Welcome to the ’Fired Up’ Podcast by Ryignite, where passion meets exponential growth. Tune in to hear from business trailblazers who’ve dialed into the 10X mindset to skyrocket their personal and professional lives. From scrappy startups to industry leaders, our guests dish on their game-changing strategies for team-building, scaling, and what’s on the horizon. Ready to get fired up and do something great? Listen now and spark your journey to 10X success.
  continue reading
 
Artwork

1
G.E.M. Series

RocketLevel

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
The G.E.M. Series powered by RocketLevel educates, guides, and motivates young professionals who believe in the dynamic shift to break the corporate ladder and invest in themselves. On this podcast, we provide the tools you need to set ambitious goals, execute like a pro and develop a fearless mindset! Many people have big dreams of working for themselves, but don’t know where, when, or how to start. Whether interviewing guests about their personal entrepreneurial journeys, analyzing the lat ...
  continue reading
 
Artwork
 
Welcome to the Security Weekly Podcast Network, your all-in-one source for the latest in cybersecurity! This feed features a diverse lineup of shows, including Application Security Weekly, Business Security Weekly, Paul's Security Weekly, Enterprise Security Weekly, and Security Weekly News. Whether you're a cybersecurity professional, business leader, or tech enthusiast, we cover all angles of the cybersecurity landscape. Tune in for in-depth panel discussions, expert guest interviews, and ...
  continue reading
 
Loading …
show series
 
This conversation explores the intersection of cybersecurity and emerging technologies, focusing on innovative hacking techniques, the evolution of vulnerability management, and the critical importance of asset discovery. The discussion also delves into the implications of cyber warfare, the persistent threat of default passwords, and the integrati…
  continue reading
 
In this episode, Mandy Logan, Summer Craze Fowler, Jason Albuquerque, and Jeff Pollard of Forrester discuss the challenges and strategies for CISOs in navigating volatility in the security landscape. They emphasize the importance of building relationships within the organization, particularly with the CFO, to manage budgets effectively. The convers…
  continue reading
 
Jeremy Poincenot is a highly accomplished keynote speaker and blind golf champion. After losing his eyesight at only 19 years old, Jeremy found his path limited and full of new challenges. However, Jeremy has demonstrated that through drive and determination, individuals can overcome seemingly insurmountable challenges and achieve great success. Wi…
  continue reading
 
In this episode of Security Weekly News, Doug White discusses various cybersecurity threats, including the Salt Typhoon and Spark Kitty malware, the implications of Microsoft's decision to drop support for old hardware drivers, and the potential increase in cyber threats from Iran. The conversation also covers the alarming 16 billion password leak …
  continue reading
 
In this bold and unfiltered episode of THE AUTOMOTIVE TRUTH With Matt & Irlanne Pollard, we dive headfirst into the biggest issues shaking our world today. From the modern church crisis to the decline of community and prayer, we explore why faith is under fire and what needs to change. Then we shift gears to the auto industry, breaking down the Tes…
  continue reading
 
Fuzzing has been one of the most successful ways to improve software quality. And it demonstrates how improving software quality improves security. Artur Cygan shares his experience in building and applying fuzzers to barcode scanners, smart contracts, and just about any code you can imagine. We go through the useful relationship between unit tests…
  continue reading
 
In fast-paced, shared device environments like healthcare, manufacturing, and other critical industries, traditional access management approaches are falling short, quietly eroding both security and productivity. This episode explores how outdated methods, like shared credentials and clunky logins, create friction, increase risk, and undermine comp…
  continue reading
 
This week: * The true details around Salt Typhoon are still unknown * The search for a portable pen testing device * Directories named "hacker2" are suspicious * Can a $24 cable compete with a $180 cable? * Hacking Tesla wall chargers * Old Zyxel exploits are new again * Hacking Asus drivers * Stealing KIAs - but not like you may think * Fake artic…
  continue reading
 
🎙️ New Podcast Episode: Celebrating milestones, navigating crises & empowering communities In this episode, the hosts dive into: Milestone moments: Honoring Father’s Day and the U.S. Army’s 250th birthday parade on June 14, a grand military display with tanks, flyovers, and community celebration Graduation challenges: Graduation season brings joy—a…
  continue reading
 
Segment description coming soon! This month BeyondTrust released it's 12th annual edition of the Microsoft Vulnerabilities Report. The report reveals a record-breaking year for Microsoft vulnerabilities, and helps organizations understand, identify, and address the risks within their Microsoft ecosystems. Segment Resources: Insights Security Assess…
  continue reading
 
What makes a threat modeling process effective? Do you need a long list of threat actors? Do you need a long list of terms? What about a short list like STRIDE? Has an effective process ever come out of a list? Farshad Abasi joins our discussion as we explain why the answer to most of those questions is No and describe the kinds of approaches that …
  continue reading
 
Segment 1 - Interview with Rob Allen from ThreatLocker This segment is sponsored by ThreatLocker. Visit https://www.securityweekly.com/threatlocker to learn more about them! Segment 2 - Topic: Growing Trend - Edge Computing and Hybrid Cloud Segment 3 - Interviews from RSAC 2025 Cyera Cyera is the fastest-growing data security company in history, em…
  continue reading
 
This week: You got a Bad box, again Cameras are expose to the Internet EU and connected devices Hydrophobia NVRAM variables Have you heard about IGEL Linux? SSH and more NVRAM AI skeptics are nuts, and AI doesn't make you more efficient Trump Cybersecurity orders I think I can root my Pixel 6 Decentralized Wordpres plugin manager Threat actor namin…
  continue reading
 
This week, it’s time for security money. The index is up, but the previous quarterly results were brutal. In the leadership and communications segment, Get out of the audit committee: Why CISOs need dedicated board time, Quietly Burning Out? What To Do When Your Leadership Starts Lacking, How to rethink leadership to energize disengaged employees, …
  continue reading
 
Dot Stein is known as the “rock n’ roll masseuse.” She has tended to numerous well-known musical performers for nearly thirty years. Her client list includes notable acts such as The Rolling Stones, Led Zeppelin, Frank Zappa, Katy Perry, Eminem, and David Bowie. As her career grew, so did her company, Dr. Dot Therapy, which now employs over 900 peo…
  continue reading
 
CISA has been championing Secure by Design principles. Many of the principles are universal, like adopting MFA and having opinionated defaults that reduce the need for hardening guides. Matthew Rogers talks about how the approach to Secure by Design has to be tailored for Operational Technology (OT) systems. These systems have strict requirements o…
  continue reading
 
Segment 1 - Enterprise Security News, Live at IDV This week, in the enterprise security news, Acquisitions potential IPOs Terminator Salvation in real life First $1B one-employee business? Mikko puts in his notice Pitch Black in real life, and more! Segment 2 - Interview with Dr. Tina Srivastava The #1 cause of data breaches is stolen credentials. …
  continue reading
 
🔥 New Episode of The Automotive Truth Podcast – Unfiltered Commentary, Auto News, and Real Talk! 🔥 In this must-listen episode, Matt and Irlanne dive deep into automotive industry news, hot summer car maintenance tips, and the latest trends like mini trucks. They don’t hold back on raw, real opinions about societal shifts, including issues surround…
  continue reading
 
Two parts to this episode: Tech Segment: Updating Linux Systems - Beyond apt-get upgrade * Custom scripts for ensuring your Linux systems are up-to-date * topgrade - tutorial for using topgrade to update Linux systems on various Linux distributions Discussion Topic: Anti-Malware and/or EDR on Linux Platforms * PCI calls for scanning Linux systems *…
  continue reading
 
During times of volatility, business leaders often don’t know what they are able to change or even what they should change. At precisely these times, business leaders become risk leaders and need to quickly learn how to identify what is within their control and what isn’t — to not only survive but thrive. Alla Valente, Principal Analyst at Forreste…
  continue reading
 
The recent popularity of MCPs is surpassed only by the recent examples deficiencies of their secure design. The most obvious challenge is how MCPs, and many more general LLM use cases, have erased two decades of security principles behind separating code and data. We take a look at how developers are using LLMs to generate code and continue our sea…
  continue reading
 
Segment 1 CTG Interview Middle market companies face unique challenges in the ever-evolving cyber environment. Developing a comprehensive cybersecurity approach is a business imperative for middle market companies, and Chad Alessi will discuss the threat landscape, what’s keeping IT decision-makers awkward at night, and the best approach to creatin…
  continue reading
 
In the security news: Vicious Trap - The malware hiding in your router Hacking your car WSL is open-source, but why? Using AI to find vulnerabilities - a case study Why you should not build your own password manager The inside scoop behind Lumma Infostealer Hacking a smart grill Hardcoded credentials on end of life routers and "Alphanetworks" SIM s…
  continue reading
 
This segment explores how automated microsegmentation addresses critical Zero Trust gaps overlooked by traditional access controls and legacy segmentation solutions. We'll examine the limitations of perimeter-based defenses in today's dynamic threat landscape and reveal how automated microsegmentation enhances network security beyond conventional f…
  continue reading
 
Shermin Kruse returns to the podcast today to discuss tips and tricks for public speaking. Shermin is a renowned negotiation consultant, law professor, author, and TEDx speaker. Having produced and scripted over 60 TEDx talks, she has a lot of experience under her belt. She is also the founder and executive producer of TEDxWrigleyville. Listen in a…
  continue reading
 
ArmorCode unveils Anya—the first agentic AI virtual security champion designed specifically for AppSec and product security teams. Anya brings together conversation and context to help AppSec, developers and security teams cut through the noise, prioritize risks, and make faster, smarter decisions across code, cloud, and infrastructure. Built into …
  continue reading
 
Segment 1: Erik Bloch Interview The math on SOC AI just isn't adding up. It's not easy to do the math, either, as each SOC automation vendor is tackling alert fatigue and SecOps assistants a bit differently. Fortunately for us and our audience, Erik Bloch met with many of these vendors at RSAC and is going to share what he learned with us! Segment …
  continue reading
 
This week in the security news: Malware-laced printer drivers Unicode steganography Rhode Island may sue Deloitte for breach. They may even win. Japan's active cyber defense law Stop with the ping LLMs replace Stack Overflow - ya don't say? Aggravated identity theft is aggravating Ivanti DSM and why you shouldn't use it EDR is still playing cat and…
  continue reading
 
In the leadership and communications section, Why Every CISO Should Be Gunning For A Seat At The Board Table, The Innovation We Need is Strategic, Not Technical , The Best Leaders Ask the Right Questions, and more! This segment is sponsored by Fortra. Visit https://securityweekly.com/fortrarsac to learn more about them! Fortra is successfully reduc…
  continue reading
 
In the news, Coinbase deals with bribes and insider threat, the NCSC notes the cross-cutting problem of incentivizing secure design, we cover some research that notes the multitude of definitions for secure design, and discuss the new Cybersecurity Skills Framework from the OpenSSF and Linux Foundation. Then we share two more sponsored interviews f…
  continue reading
 
This week, the crew dives under the hood of society and politics, not just engines. From roasting auto start-stop features to breaking down the bulletproof beast they call the presidential limo, it’s a no-BS ride through the chaos of current events. They don’t hold back—calling out lazy techs, clueless voters, and the critical need to wake up, spea…
  continue reading
 
Segment 1: Fastly Interview In this week's interview segment, we talk to Marshall Erwin about the state of cybersecurity, particularly when it comes to third party risk management, and whether we're ready for the next big SolarWinds or Crowdstrike incident. These big incidents have inspired executive orders, the Secure by Design initiative, and eve…
  continue reading
 
This week in the security news: Android catches up to iOS with its own lockdown mode Just in case, there is a new CVE foundation Branch privilege injection attacks My screen is vulnerable The return of embedded devices to take over the world - 15 years later Attackers are going after MagicINFO Hacking Starlink Mitel SIP phones can be hacked Reversi…
  continue reading
 
Joey Coleman returns to the podcast this week with a part 2! Joey has helped companies retain their customers and employees for almost 20 years. As an award-winning speaker, Joey helps businesses convert their employees into fans. He has written two bestselling books, “Never Lose A Customer Again” and “Never Lose An Employee Again.” Listen in as Jo…
  continue reading
 
Loading …
Copyright 2025 | Privacy Policy | Terms of Service | | Copyright
Listen to this show while you explore
Play