show episodes
 
Artwork

1
The Doctor Is In Podcast

Dr. A.W. Martin and Dr. A.P. Martin

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Daily
 
Renowned authors and experts Dr. A.W. Martin and Dr. A.P. Martin of the Martin Clinic share advice on how a back to basics approach to nutrition can have you feeling better and prevent disease.
  continue reading
 
Artwork
 
Welcome to the Security Weekly Podcast Network, your all-in-one source for the latest in cybersecurity! This feed features a diverse lineup of shows, including Application Security Weekly, Business Security Weekly, Paul's Security Weekly, Enterprise Security Weekly, and Security Weekly News. Whether you're a cybersecurity professional, business leader, or tech enthusiast, we cover all angles of the cybersecurity landscape. Tune in for in-depth panel discussions, expert guest interviews, and ...
  continue reading
 
Loading …
show series
 
During times of volatility, business leaders often don’t know what they are able to change or even what they should change. At precisely these times, business leaders become risk leaders and need to quickly learn how to identify what is within their control and what isn’t — to not only survive but thrive. Alla Valente, Principal Analyst at Forreste…
  continue reading
 
The recent popularity of MCPs is surpassed only by the recent examples deficiencies of their secure design. The most obvious challenge is how MCPs, and many more general LLM use cases, have erased two decades of security principles behind separating code and data. We take a look at how developers are using LLMs to generate code and continue our sea…
  continue reading
 
Segment 1 CTG Interview Middle market companies face unique challenges in the ever-evolving cyber environment. Developing a comprehensive cybersecurity approach is a business imperative for middle market companies, and Chad Alessi will discuss the threat landscape, what’s keeping IT decision-makers awkward at night, and the best approach to creatin…
  continue reading
 
The many benefits of optimizing your levels of vitamin D is a topic Dr. Martin speaks on all the time. In today’s episode he looks at 2 new studies on vitamin D, one showing a 40% drop in dementia risk, and another showing how deficiency can age the brain. Dr. Martin also responds to a question about GLP-1 designer drugs like Wegovy and Ozempic in …
  continue reading
 
In the security news: Vicious Trap - The malware hiding in your router Hacking your car WSL is open-source, but why? Using AI to find vulnerabilities - a case study Why you should not build your own password manager The inside scoop behind Lumma Infostealer Hacking a smart grill Hardcoded credentials on end of life routers and "Alphanetworks" SIM s…
  continue reading
 
Ever feel like you're being chased by a lion? That’s exactly how your body reacts to chronic stress by flooding your system with cortisol, the stress hormone. While this fight or flight response can save your life in a true emergency, living in a constant state of stress wreaks havoc on your health. In today’s episode, Dr. Martin unpacks the scienc…
  continue reading
 
This segment explores how automated microsegmentation addresses critical Zero Trust gaps overlooked by traditional access controls and legacy segmentation solutions. We'll examine the limitations of perimeter-based defenses in today's dynamic threat landscape and reveal how automated microsegmentation enhances network security beyond conventional f…
  continue reading
 
ArmorCode unveils Anya—the first agentic AI virtual security champion designed specifically for AppSec and product security teams. Anya brings together conversation and context to help AppSec, developers and security teams cut through the noise, prioritize risks, and make faster, smarter decisions across code, cloud, and infrastructure. Built into …
  continue reading
 
Dr. Martin has often spoken of the benefits of probiotics and how everyone and their dog should be taking broad spectrum probiotics. There are two strains in particular, L reuteri and L rhamnosus, that Dr. Martin especially likes. A new study is showing how lactobacillus bacteria makes its way to mommy’s breast in the 9th month of pregnancy in prep…
  continue reading
 
Segment 1: Erik Bloch Interview The math on SOC AI just isn't adding up. It's not easy to do the math, either, as each SOC automation vendor is tackling alert fatigue and SecOps assistants a bit differently. Fortunately for us and our audience, Erik Bloch met with many of these vendors at RSAC and is going to share what he learned with us! Segment …
  continue reading
 
This week in the security news: Malware-laced printer drivers Unicode steganography Rhode Island may sue Deloitte for breach. They may even win. Japan's active cyber defense law Stop with the ping LLMs replace Stack Overflow - ya don't say? Aggravated identity theft is aggravating Ivanti DSM and why you shouldn't use it EDR is still playing cat and…
  continue reading
 
Many people think that Dr. Martin is against fruit, but he really isn’t. He just doesn’t want people living on it, and instead thinking of it as God’s candy. When you understand what sugar does to the body you’ll want to consume less of it. Dr. Martin looks at two health headlines concerning fruit consumption and sleep apnea. It turns out that frui…
  continue reading
 
In the leadership and communications section, Why Every CISO Should Be Gunning For A Seat At The Board Table, The Innovation We Need is Strategic, Not Technical , The Best Leaders Ask the Right Questions, and more! This segment is sponsored by Fortra. Visit https://securityweekly.com/fortrarsac to learn more about them! Fortra is successfully reduc…
  continue reading
 
In the news, Coinbase deals with bribes and insider threat, the NCSC notes the cross-cutting problem of incentivizing secure design, we cover some research that notes the multitude of definitions for secure design, and discuss the new Cybersecurity Skills Framework from the OpenSSF and Linux Foundation. Then we share two more sponsored interviews f…
  continue reading
 
Did you know that close to 300,000 people a year die of iatrogenic disease in the United States? That’s dying from the side effects of medication. Dr. Martin thinks that number is crazy and cautions listeners to be careful with over-the-counter medications. Dr. Martin looks at an article pointing out the potential kidney and stomach damage from usi…
  continue reading
 
Segment 1: Fastly Interview In this week's interview segment, we talk to Marshall Erwin about the state of cybersecurity, particularly when it comes to third party risk management, and whether we're ready for the next big SolarWinds or Crowdstrike incident. These big incidents have inspired executive orders, the Secure by Design initiative, and eve…
  continue reading
 
There are three kingdoms of food, the animal kingdom, the plant kingdom, and the manmade kingdom. For decades now, Dr. Martin has been encouraging people to eat primarily from the animal kingdom, and specifically eggs, meat and cheese. Join Dr. Martin as he continues discussing nutrients that are not adequately sourced from plants in today’s episod…
  continue reading
 
This week in the security news: Android catches up to iOS with its own lockdown mode Just in case, there is a new CVE foundation Branch privilege injection attacks My screen is vulnerable The return of embedded devices to take over the world - 15 years later Attackers are going after MagicINFO Hacking Starlink Mitel SIP phones can be hacked Reversi…
  continue reading
 
Dr. Martin has always been against eating only from the plant kingdom. It’s not that vegetables are bad, but so many essential nutrients are missed when you choose to avoid eating meat. In this two part series, Dr. Martin looks at 17 things that are not adequately sourced from plants, with some being found only in the animal kingdom. He highlights …
  continue reading
 
In the leadership and communications section, How CISOs can talk cybersecurity so it makes sense to executives, Firms to spend more on GenAI than security in 2025, Europe leads shift from cyber security ‘headcount gap’ to skills-based hiring, and more! Next, pre-recorded interviews from RSAC Conference 2025, including: This segment is sponsored by …
  continue reading
 
In recent years, researchers have discovered that we have a glymphatic system that acts as a self-cleaning oven for our brains. The catch is, it only works when we’re sleeping, and if you can’t sleep, you’re at risk of mental health problems. Dr. Martin shares recent studies on chronic stress and depression, highlighting the role of cortisol and it…
  continue reading
 
Developers are relying on LLMs as coding assistants, so where are the LLM assistants for appsec? The principles behind secure code reviews don't really change based on who write the code, whether human or AI. But more code means more reasons for appsec to scale its practices and figure out how to establish trust in code, packages, and designs. Rey …
  continue reading
 
Segment 1 - Secrets and their role in infrastructure security From API keys and tokens to environment variables and credentials, secrets are foundational—and often overlooked—attack surfaces in cloud-native and distributed systems. We break down the risks tied to poor secret hygiene, discuss emerging patterns for secure secret management at scale, …
  continue reading
 
Sudo watch this show, Hallucinations, Kickidler, Powershool redux, Old Man Router, PSMU, Aaran Leyland, and More, on this edition of the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-475
  continue reading
 
Telomeres are a fairly recent discovery within our DNA, and the length of these tiny wick-like structures can actually be measured. It turns out that the longer your telomeres are, the slower you age. Dr. Martin shares insights from a study involving over 4000 women which showed that those who slept less than six hours a night had telomeres 12% sho…
  continue reading
 
Security news for this week: RDP and credentials that are not really revoked, and some RDP bitmap caching fun Some magic info on MagicINFO Vulnerability Management Zombies There is a backdoor in your e-commerce Airborne: vulnerabilities in AirPlay Bring your own installer - crafty EDR bypass The Signal clone used by US government officials: shocker…
  continue reading
 
With Spring now here, we often think about Spring cleaning our homes, but what about cleaning out our livers? Join Dr. Martin as he discusses the importance of liver health and how modern diets rich in sugar and refined carbs contribute to liver congestion and dysfunction. Learn why eggs, meat and cheese, and coffee, are your best choices for a liv…
  continue reading
 
In the leadership and communications section, The C-suite gap that's putting your company at risk, CISOs band together to urge world governments to harmonize cyber rules, Cybersecurity is Not Working: Time to Try Something Else, and more! Organizations are increasingly threatened by cyberattacks originating from their suppliers. Existing tools (lik…
  continue reading
 
Deepfake Porn Bots, Skype, dd, Venom Spider, CISA, IT Helpdesk, Rob Allen, and more on the Security Weekly News. Segment Resources: https://cybersecuritynews.com/cyber-security-company-ceo-arrested/ This segment is sponsored by ThreatLocker. Visit https://www.securityweekly.com/threatlocker to learn more about them! Visit https://www.securityweekly…
  continue reading
 
We catch up on news after a week of BSidesSF and RSAC Conference. Unsurprisingly, AI in all its flavors, from agentic to gen, was inescapable. But perhaps more surprising (and more unfortunate) is how much the adoption of LLMs has increased the attack surface within orgs. The news is heavy on security issues from MCPs and a novel alignment bypass a…
  continue reading
 
Now in its 18th year, the Verizon Business DBIR is one of the industry’s longest standing and leading reports on the current cybersecurity landscape. This year’s report analyzes more than 22,000 security incidents with victims spanning 139 countries, examining significant growth in third-party involvement in breaches, increases in ransomware and ex…
  continue reading
 
Loading …

Quick Reference Guide

Copyright 2025 | Privacy Policy | Terms of Service | | Copyright
Listen to this show while you explore
Play