From The Top is a powerful podcast series featuring in-depth interviews with accomplished entrepreneurs, CEOs, and business leaders. Hosted by Michael Martin, a seasoned business and executive coach with a diverse background in entrepreneurship, consulting, and technology, this podcast delves into the stories, strategies, and insights that have shaped the success of these visionary leaders. Each episode showcases a different guest, exploring their unique journey, the challenges they’ve overc ...
…
continue reading
Welcome to the Security Weekly Podcast Network, your all-in-one source for the latest in cybersecurity! This feed features a diverse lineup of shows, including Application Security Weekly, Business Security Weekly, Paul's Security Weekly, Enterprise Security Weekly, and Security Weekly News. Whether you're a cybersecurity professional, business leader, or tech enthusiast, we cover all angles of the cybersecurity landscape. Tune in for in-depth panel discussions, expert guest interviews, and ...
…
continue reading

1
The Good Listening To Show: Stories of Distinction & Genius
Chris Grimes - Facilitator. Coach. Motivational Comedian
"If you tell your Story 'out loud' then you're much more likely to LIVE it out loud" and that's what this show is for: To help you to tell your Story - 'get it out there' - and reach a large global audience as you do so. It's the Storytelling Show in which I invite movers, makers, shakers, mavericks, influencers and also personal heroes into a 'Clearing' (or 'serious happy place') of my Guest's choosing, to all share with us their stories of 'Distinction & Genius'. Think "Desert Island Discs ...
…
continue reading
Security news for this week: RDP and credentials that are not really revoked, and some RDP bitmap caching fun Some magic info on MagicINFO Vulnerability Management Zombies There is a backdoor in your e-commerce Airborne: vulnerabilities in AirPlay Bring your own installer - crafty EDR bypass The Signal clone used by US government officials: shocker…
…
continue reading

1
C-Suite Gaps, Cybersecurity is not Working to Solve Exposures and Supply Chain Risks - Dr. Aleksandr Yampolskiy, Lenny Zeltser - BSW #394
1:04:40
1:04:40
Play later
Play later
Lists
Like
Liked
1:04:40In the leadership and communications section, The C-suite gap that's putting your company at risk, CISOs band together to urge world governments to harmonize cyber rules, Cybersecurity is Not Working: Time to Try Something Else, and more! Organizations are increasingly threatened by cyberattacks originating from their suppliers. Existing tools (lik…
…
continue reading

1
Deepfake Porn Bots, Skype, dd, Venom Spider, CISA, IT Helpdesk, Rob Allen... - Rob Allen - SWN #474
36:47
36:47
Play later
Play later
Lists
Like
Liked
36:47Deepfake Porn Bots, Skype, dd, Venom Spider, CISA, IT Helpdesk, Rob Allen, and more on the Security Weekly News. Segment Resources: https://cybersecuritynews.com/cyber-security-company-ceo-arrested/ This segment is sponsored by ThreatLocker. Visit https://www.securityweekly.com/threatlocker to learn more about them! Visit https://www.securityweekly…
…
continue reading

1
AI Era, New Risks: How Data-Centric Security Reduces Emerging AppSec Threats - Vishal Gupta, Idan Plotnik - ASW #329
1:03:03
1:03:03
Play later
Play later
Lists
Like
Liked
1:03:03We catch up on news after a week of BSidesSF and RSAC Conference. Unsurprisingly, AI in all its flavors, from agentic to gen, was inescapable. But perhaps more surprising (and more unfortunate) is how much the adoption of LLMs has increased the attack surface within orgs. The news is heavy on security issues from MCPs and a novel alignment bypass a…
…
continue reading

1
2025 Security Trends: Identity, Endpoint, Cloud & the Rise of Browser Threats - Jason Mical, Lori Robinson, Hed Kovetz, Rob Allen, Vivek Ramachandran, Alex Pinto - ESW #405
1:42:43
1:42:43
Play later
Play later
Lists
Like
Liked
1:42:43Now in its 18th year, the Verizon Business DBIR is one of the industry’s longest standing and leading reports on the current cybersecurity landscape. This year’s report analyzes more than 22,000 security incidents with victims spanning 139 countries, examining significant growth in third-party involvement in breaches, increases in ransomware and ex…
…
continue reading

1
Security Weekly News Interviews Leaders of NECCDC competition - SWN #473
32:02
32:02
Play later
Play later
Lists
Like
Liked
32:02Join us for a special in-person edition of the Security Weekly News! Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-473
…
continue reading

1
Founder Story: 'When Purpose Meets Profit' with Pete Starr, MD of Chilli Group & Wayvie, on the Green Entrepreneur's Journey from Corporate Conformity to Environmental Positive Impact
45:38
45:38
Play later
Play later
Lists
Like
Liked
45:38Send us a text What happens when a corporate executive decides to break free from conformity at age 41 and build something meaningful? Pete Starr's journey from Manchester Council Estate to founding the Chilli Group reveals how purpose can transform both career and impact. Growing up in a conservative household where his father wore a shirt and tie…
…
continue reading

1
AI Tips, Tricks, and Traps! - PSW #872
1:37:21
1:37:21
Play later
Play later
Lists
Like
Liked
1:37:21The PSW crew discusses tips, tricks, and traps for using AI and LLMs. We discuss a wide range of AI-related topics, including how to utilize AI tools for writing, coding, data analysis, website design, and more! Some key takeaways include: AI has rapidly shifted from novelty to an essential tool in security and other fields. Paid AI versions offer …
…
continue reading

1
Say Easy, Do Hard - Defining Objectives and Key Results Aligned to Business Goals - BSW #393
49:58
49:58
Play later
Play later
Lists
Like
Liked
49:58In today’s ever-evolving business landscape, organizations face diverse risks, including cyber risks, that can significantly affect their operations and overall prosperity. Aligning risk management strategies with organizational objectives is crucial for effectively mitigating these potential threats and fostering sustainable growth. Easier said th…
…
continue reading

1
Security Weekly News Interviews Participants and Coaches at NECCDC - SWN #472
33:34
33:34
Play later
Play later
Lists
Like
Liked
33:34Join us for a special in-person edition of the Security Weekly News! Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-472
…
continue reading

1
Secure Designs, UX Dragons, Vuln Dungeons - Jack Cable - ASW #328
44:08
44:08
Play later
Play later
Lists
Like
Liked
44:08In this live recording from BSidesSF we explore the factors that influence a secure design, talk about how to avoid the bite of UX dragons, and why designs should put classes of vulns into dungeons. But we can't threat model a secure design forever and we can't oversimplify guidance for a design to be "more secure". Kalyani Pawar and Jack Cable joi…
…
continue reading

1
The Future of Access Management - Jeff Shiner - ESW #404
2:00:22
2:00:22
Play later
Play later
Lists
Like
Liked
2:00:22As organizations embrace hybrid work, SaaS sprawl, and employee-owned devices, traditional Identity and Access Management (IAM) tools are failing to keep up. The rise of shadow IT, unmanaged applications, and evolving cyber threats have created an "Access-Trust Gap", a critical security challenge where IT lacks visibility and control over how emplo…
…
continue reading

1
Best of Bristol: Life Through the Lens of the 'Godfather' of British Photography, Martin Parr: Sandals, Zoom Lenses & Village Fetes, on a Lifetime of Documenting the Eccentricities of British Life & Leisure ...
30:47
30:47
Play later
Play later
Lists
Like
Liked
30:47Send us a text Martin Parr opens a window into his extraordinary five-decade career documenting the eccentricities of British life and leisure, revealing the philosophy that has made him one of the world's most celebrated documentary photographers. Taking us behind his lens, Parr shares how finding himself "in the right place at the right time" led…
…
continue reading

1
Beating the AI Game, Ripple, Numerology, Darcula, Special Guests from Hidden Layer... - Malcolm Harkins, Kasimir Schulz - SWN #471
34:02
34:02
Play later
Play later
Lists
Like
Liked
34:02Beating the AI Game, Ripple (not that one), Numerology, Darcula, Special Guests, and More, on this edition of the Security Weekly News. Special Guests from Hidden Layer to talk about this article: https://www.forbes.com/sites/tonybradley/2025/04/24/one-prompt-can-bypass-every-major-llms-safeguards/ Visit https://www.securityweekly.com/swn for all t…
…
continue reading

1
Best of Bristol: 'To Be or Not to Be' with Actor, Facilitator, Singer & Coach Neil Bett on the 'Art of Being Present', with Pastries, Birds of Prey & Being One Sixth of an a Capella Sextet!
47:04
47:04
Play later
Play later
Lists
Like
Liked
47:04Send us a text Ever wondered what makes performers tick? Neil Bett – actor, facilitator, coach, and one-sixth of an acapella sextet – takes us on a fascinating journey through the moments that shaped his creative path. Recorded in our brand new Future Leap Studios in Bristol, this conversation between old friends crackles with authenticity. Neil an…
…
continue reading

1
Hacking Crosswalks and Attacking Boilers - PSW #871
2:04:15
2:04:15
Play later
Play later
Lists
Like
Liked
2:04:15The crosswalk is talking to me man!, don't block my website without due process, Florida is demanding encryption backdoors, attacking boilers and banning HackRF Ones, time to update your flipper zero, using AI to create working exploits, what happens when you combine an RP2350 and an ESP32? Hopefully good hackery things!, more evidence that patchin…
…
continue reading

1
ISO 42001 Certification, CIOs Struggle to Align Strategies, and CISOs Rethink Hiring - Martin Tschammer - BSW #392
1:03:55
1:03:55
Play later
Play later
Lists
Like
Liked
1:03:55AI Governance, the next frontier for AI Security. But what framework should you use? ISO/IEC 42001 is an international standard that specifies requirements for establishing, implementing, maintaining, and continually improving an Artificial Intelligence Management System (AIMS) within organizations. It is designed for entities providing or utilizin…
…
continue reading

1
Brains, Elusive Comet, AI Scams, Microsoft Dog Food, Deleting Yourself, Josh Marpet - SWN #470
31:59
31:59
Play later
Play later
Lists
Like
Liked
31:59Brains, Scams, Elusive Comet, AI Scams, Microsoft Dog Food, Deleting Yourself, Josh Marpet, and more on the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-470
…
continue reading

1
Managing Secrets - Vlad Matsiiako - ASW #327
1:03:03
1:03:03
Play later
Play later
Lists
Like
Liked
1:03:03Secrets end up everywhere, from dev systems to CI/CD pipelines to services, certificates, and cloud environments. Vlad Matsiiako shares some of the tactics that make managing secrets more secure as we discuss the distinctions between secure architectures, good policies, and developer friendly tools. We've thankfully moved on from forced 90-day user…
…
continue reading

1
The past, present, and future of enterprise AI - Matthew Toussain, Pravi Devineni - ESW #403
2:11:51
2:11:51
Play later
Play later
Lists
Like
Liked
2:11:51In this interview, we're excited to speak with Pravi Devineni, who was into AI before it was insane. Pravi has a PhD in AI and remembers the days when machine learning (ML) and AI were synonymous. This is where we'll start our conversation: trying to get some perspective around how generative AI has changed the overall landscape of AI in the enterp…
…
continue reading

1
HR Chatbots, MITRE, 4chan, Oracle, Identity, Port 53, NTLM, Zambia, Josh Marpet... - SWN #469
36:06
36:06
Play later
Play later
Lists
Like
Liked
36:06HR Chatbots, MITRE, 4chan, Oracle, Identity, Port 53, NTLM, Zambia, Josh Marpet, and More, on this edition of the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-469
…
continue reading

1
Founder Story: 'Collaboration Catalyst' Gill Tiney from Collaboration Global, on the Alchemy of Bringing Good People Together for Positive Impact & Change for Good
45:01
45:01
Play later
Play later
Lists
Like
Liked
45:01Send us a text What if we could build a world where human connection trumps credentials? Where seeing the gold in others becomes a superpower? In this illuminating conversation, collaboration catalyst Gill Tiney reveals the transformative journey that shaped her mission to connect good people globally. Growing up in the multicultural East End of Lo…
…
continue reading

1
Govt Unravelling, AI Hijinx, Bot Chaos, Recall, Oracle, Slopesquatting, Tycoon 2FA... - PSW #870
2:06:35
2:06:35
Play later
Play later
Lists
Like
Liked
2:06:35Govt Unravelling, AI Hijinx, Bot Chaos, Recall, Oracle, Slopesquatting, Tycoon 2FA, College, who knows, a lot more... On Paul's Security Weekly. Visit https://www.securityweekly.com/psw for all the latest episodes! Show Notes: https://securityweekly.com/psw-870
…
continue reading

1
Deny By Default as CISOs Battle Platform Fatigue and Show Value to the Board - Danny Jenkins - BSW #391
1:05:34
1:05:34
Play later
Play later
Lists
Like
Liked
1:05:34Zero Trust isn't a new concept, but not one easily implemented. How do organizations transform cybersecurity from a "default allow" model, where everything is permitted unless blocked, to a "default deny" model? Danny Jenkins, Co-founder and CEO at ThreatLocker, joins Business Security Weekly to discuss this approach. Deny by default means all acti…
…
continue reading

1
QUBIT AI, Recall This, Defender, Tycoon, Slopsquatting, Feng Mengleng, Aaran Leyland - SWN #468
35:45
35:45
Play later
Play later
Lists
Like
Liked
35:45QUBIT AI, Recall This, Defender, Tycoon, Slopsquatting, Feng Mengleng, Aaran Leyland, and more, on the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-468
…
continue reading

1
More WAFs in Blocking Mode and More Security Headaches from LLMs - Sandy Carielli, Janet Worthington - ASW #326
1:14:45
1:14:45
Play later
Play later
Lists
Like
Liked
1:14:45The breaches will continue until appsec improves. Janet Worthington and Sandy Carielli share their latest research on breaches from 2024, WAFs in 2025, and where secure by design fits into all this. WAFs are delivering value in a way that orgs are relying on them more for bot management and fraud detection. But adopting phishing-resistant authentic…
…
continue reading

1
What is old is new again: default deny on the endpoint - Colby DeRodeff, Danny Jenkins - ESW #402
2:03:21
2:03:21
Play later
Play later
Lists
Like
Liked
2:03:21Default deny is an old, and very recognizable term in security. Most folks that have been in the industry for a long time will associate the concept with firewall rules. The old network firewalls, positioned between the public Internet and private data centers, however, were relatively uncomplicated and static. Most businesses had a few hundred fir…
…
continue reading

1
Win95, Shuckworm, Ottokit, DCs, EC2, IAB, OSS, Recall, Josh Marpet, and More... - SWN #467
35:45
35:45
Play later
Play later
Lists
Like
Liked
35:45Win95, Shuckworm, Ottokit, DCs, EC2, IAB, OSS, Recall, Josh Marpet, and More, on this edition of the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-467
…
continue reading
In the security news this week: You should really just patch things, the NVD backlog, Android phones with malware pre-installed, so convenient, keyloggers and a creepy pharmacist, snooping on federal workers, someone stole your browser history, NSA director fired, deputy director of NSA also fired, CrushFTP the saga continues, only steal the valid …
…
continue reading

1
Balancing AI Opportunities vs. Risks to Drive Better Business Outcomes - Matt Muller, Summer Fowler - BSW #390
1:02:39
1:02:39
Play later
Play later
Lists
Like
Liked
1:02:39This week, it's double AI interview Monday! In our first interview, we discuss how to balance AI opportunities vs. risk. Artificial Intelligence (AI) has the potential to revolutionize how businesses operate. But with this exciting advancement comes new challenges that cannot be ignored. For proactive security and IT leaders, how do you balance the…
…
continue reading

1
DOS, Web Cams, VSCODE, Coinblack, Oracle, P&G, Satan, Sec Gemini, Josh Marpet... - SWN #466
33:48
33:48
Play later
Play later
Lists
Like
Liked
33:48DOS Lives, Web Cams Gone Wild, VSCODE, Coinblack, Oracle, P&G, Satan, Sec Gemini, Shopify, Josh Marpet, and more on the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-466
…
continue reading

1
In Search of Secure Design - ASW #325
1:07:36
1:07:36
Play later
Play later
Lists
Like
Liked
1:07:36We have a top ten list entry for Insecure Design, pledges to CISA's Secure by Design principles, and tons of CVEs that fall into familiar categories of flaws. But what does it mean to have a secure design and how do we get there? There are plenty of secure practices that orgs should implement are supply chains, authentication, and the SDLC. Those p…
…
continue reading

1
Soft skills for engineers - Evgeniy Kharam, Paul Nguyen - ESW #401
2:03:22
2:03:22
Play later
Play later
Lists
Like
Liked
2:03:22When we use the phrase "talent gap" in cybersecurity, we're usually talking about adding headcount. For this interview, however, we're focusing on a gap that is evident within existing teams and practitioners - the often misunderstood soft skills gap. Side note: I really hate the term "soft skills". How about we call them "fundamental business skil…
…
continue reading

1
The Comedy Godfather Speaks! Comedy Gold with Jon Plowman, 'The Comedy Producers' Comedy Producer!' on an Extraordinary Career in British TV Comedy
1:09:10
1:09:10
Play later
Play later
Lists
Like
Liked
1:09:10Send us a text Every TV Sitcom yo've ever loved has been touched by this man's genius! What does it take to shepherding some of the most beloved British comedy shows from idea to cultural phenomenon? Jon Plowman OBE—the executive producer behind The Office, Absolutely Fabulous, Vicar of Dibley, Inside No. 9, and countless other comedy classics—offe…
…
continue reading

1
AI Doomsday, Hot Robots, Google, palo Alto, Ivanti, CrushFTP, AI, Aaran Leyland... - SWN #465
30:51
30:51
Play later
Play later
Lists
Like
Liked
30:51AI Doomsday, Hot Robots, Google, palo Alto, Ivanti, CrushFTP, AI, Aaran Leyland, and More, on this edition of the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-465
…
continue reading

1
Not-So-Secure Boot - Rob Allen - PSW #868
2:12:35
2:12:35
Play later
Play later
Lists
Like
Liked
2:12:35Rob Allen, Chief Product Officer at Threatlocker joins us for an interview segment on using AI in security products: What works and what's not fully baked! Then in the security news, There are more holes in your boot...loader according to Microsoft, related: Secure Boot is in danger and no one is really talking about it (still), Dear Microsoft: I d…
…
continue reading

1
Vulnerability Prioritization Can Produce Better Business Outcomes - Steve Lodin, Greg Fitzgerald - BSW #389
33:34
33:34
Play later
Play later
Lists
Like
Liked
33:34Vulnerability prioritization, the final frontier. Many say they do it, but do they really? It takes way more than vulnerability data to truly prioritize vulnerabilities. Greg Fitzgerald, Co-Founder and CXO at Sevco Security, and Steve Lodin , Vice President, Information Security at Sallie Mae, join Business Security Weekly to dig in. We'll discuss …
…
continue reading

1
Schrodinger, Lucid, Crocodilus, Wordpress, Ivanti, Oracle, Android, Josh Marpet... - SWN #464
29:24
29:24
Play later
Play later
Lists
Like
Liked
29:24Schrodinger's Television, Lucid, Crocodilus, Wordpress, Ivanti, Oracle, Android, Josh Marpet, and more on the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-464
…
continue reading

1
Avoiding Appsec's Worst Practices - ASW #324
1:11:19
1:11:19
Play later
Play later
Lists
Like
Liked
1:11:19We take advantage of April Fools to look at some of appsec's myths, mistakes, and behaviors that lead to bad practices. It's easy to get trapped in a status quo of chasing CVEs or discussing which direction to shift security. But scrutinizing decimal points in CVSS scores or rearranging tools misses the opportunity for more strategic thinking. We s…
…
continue reading

1
Setting up your SIEM for success - Pitfalls to preclude and tips to take - Geoff Cairns, Neil Desai - ESW #400
1:58:15
1:58:15
Play later
Play later
Lists
Like
Liked
1:58:15A successful SIEM deployment depends on a lot more than implementing the SIEM correctly. So many other things in your environment have an impact on your chances of a successful SIEM. Are the right logs enabled? Is your EDR working correctly? Would you notice a sudden increase or decrease in events from critical sources? What can practitioners do to…
…
continue reading

1
Legacy Life Reflections: Scouse Wit and Wisdom & Iconic Ear Worms (like the Royal Family's Favourite 'Lily the Pink') in the Company of renowned Cultural Storyteller, Musician & Photographer, Mike McCartney ...
1:03:25
1:03:25
Play later
Play later
Lists
Like
Liked
1:03:25Send us a text Mike McCartney opens the door to his extraordinary life with warmth, humor, and profound insight in this captivating conversation. The renowned photographer, musician, and cultural storyteller shares intimate tales of growing up in post-war Liverpool, revealing how losing his mother at age twelve pushed him toward creativity as both …
…
continue reading

1
Mrtentacle, Morphing Meerkat, Tor, VMWare, Waymo, Oracle, Aaran Leyland, and more... - SWN #463
29:26
29:26
Play later
Play later
Lists
Like
Liked
29:26Mrtentacle, Morphing Meerkat, Tor, VMWare, Waymo, Oracle, Aaran Leyland, and More, on this edition of the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-463
…
continue reading

1
SignalGate and How Not To Protect Secrets - PSW #867
2:07:11
2:07:11
Play later
Play later
Lists
Like
Liked
2:07:11How do we handle scope creep for vulnerabilities?, find the bugs before it hits the real world, risk or hype vulnerabilities, RTL-SDR in a browser, using AI to hack AI and protect AI, 73 vulnerabilities of which 0 patches have been issued, Spinning Cats, bypassing WDAC with Teams and JavaScript, Rust will solve all the security problems, did you he…
…
continue reading

1
The Pace of Investments Requires Better Risk Management, Boards Challenged, & More - BSW #388
1:07:22
1:07:22
Play later
Play later
Lists
Like
Liked
1:07:22Cybersecurity teams were under increasing strain in 2024. To alleviate this burden, 2025 will see greater reliance on automation to streamline workflows, enhance threat detection, and accelerate incident response. But some of these investments may come with risks. Greg Sullivan, Founding Partner at CIOSO Global, joins Business Security Weekly to di…
…
continue reading

1
Curdled Miscreant, VanHelsing, MFA, Room 237, MFA, Velora, 23nMe, Josh Marpet... - SWN #462
33:11
33:11
Play later
Play later
Lists
Like
Liked
33:11Curdled Miscreant, VanHelsing, MFA, Room 237, MFA, Velora, 23nMe, Josh Marpet, and more on the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-462
…
continue reading

1
Finding a Use for GenAI in AppSec - Keith Hoodlet - ASW #323
54:08
54:08
Play later
Play later
Lists
Like
Liked
54:08LLMs are helping devs write code, but is it secure code? How are LLMs helping appsec teams? Keith Hoodlet returns to talk about where he's seen value from genAI, where it fits in with tools like source code analysis and fuzzers, and where its limitations mean we'll be relying on humans for a while. Those limitations don't mean appsec should dismiss…
…
continue reading

1
'Hi-Diddly-Dee-an-Actor's-Life-for-Me': Behind the Moustache of Actor Michael Maloney. On his Journey to becoming a Director's Dream as Hercule Poirot. Words, Music & Murder on the Orient Express!
42:46
42:46
Play later
Play later
Lists
Like
Liked
42:46Send us a text From boarding school trauma to embodying one of fiction's greatest detectives, Michael Maloney's theatrical journey reveals how life's most difficult experiences often forge our greatest strengths. The acclaimed British Actor joins us from his dressing room in Birmingham—fresh from celebrating his 100th performance as Hercule Poirot …
…
continue reading

1
Building the SOC of the Future - JP Bourget, Michael Mumcuoglu - ESW #399
1:50:43
1:50:43
Play later
Play later
Lists
Like
Liked
1:50:43What does a mature SecOps team look like? There is pressure to do more with less staff, increase efficiency and reduce costs. JP Bourget's experience has led him to believe that the answer isn't a tool upgrade, it's better planning, architecture, and process. In this interview, we'll discuss some of the common mistakes SecOps teams make, and where …
…
continue reading

1
Bish-Bash-Bosh: The No-Nonsense Guide to Business Success with Charlie Mullins, a.k.a 'The Pimlico Plumber', who Sold Pimlico Plumbers for £140 Million to now rise like a Phoenix and Go Again, as Chairman ...
1:12:30
1:12:30
Play later
Play later
Lists
Like
Liked
1:12:30Send us a text Charlie Mullins, founder of Pimlico Plumbers and now chairman of We Fix London, shares his extraordinary journey from council estate kid to selling his plumbing empire for £140 million and starting again with a new venture. What happens when a working-class kid with no qualifications sells a plumbing empire for £140 million, then dec…
…
continue reading

1
Orange Drop Caps, apps, Veeam, jobs, Heathrow, vpentest, Aaran Leyland, and More... - SWN #461
33:05
33:05
Play later
Play later
Lists
Like
Liked
33:05Orange Drop Caps, apps, Veeam, jobs, Heathrow, vpentest, Aaran Leyland, and More are on this edition of the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-461
…
continue reading