show episodes
 
Author and Triathlon Coach, Matt Dixon, will empower and educate you to integrate sport into life in order to reach your athletic potential because, it is through the lens of athletic potential, that you reach your human potential. In addition to topics such as planning your fitness into a time-starved life, the show will provide in-depth interviews, advice, and insight into optimizing your health, work, and life performance, along with the critical habits and approaches that facilitate the ...
  continue reading
 
Artwork

1
The Purpose Patch

The Purpose Patch

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Join hosts Sal Mac & Lou Spargo as they test their life skills with amusing & surprising results. A podcast for those looking to grow the good in life, without taking it all too seriously!
  continue reading
 
Everybody longs for purpose and meaning! Everybody wants to know and follow their bliss! Your host Patch Drury interviews people from all walks of like, musicians, actors, chefs, artists - every one of them, following their bliss. Listen as Patch teases out the stories and philosophies that took them, from some cases, from boring office jobs to a life full of meaning and purpose! A life full of bliss!!
  continue reading
 
DEBRIEFED with Chris Ramsay is a deep dive in to the mysterious world of UFO's, Psychic abilities, Non-Human Intelligence and so much more from The Area 52 YouTube channel. Join me as I post weekly podcasts about famous whistleblowers, government leaks and bring on the occasional guest to chat in the SCIF. For more, tune in to Area 52 Investigations on YouTube!
  continue reading
 
Business done right - Purpose, Values AND Profit. In the Karmic Capitalist conversations, we talk to CEOs and founders of organisations with purpose and values at their heart. We dive into their journeys, and into the nitty gritty of what it takes to build organisations that make good and make money. Some are starting the journey, others are a long way down it, and still others still are changing direction. But all are business leaders who believe that a successful businesses is defined by p ...
  continue reading
 
Artwork
 
The CYSA PrepCast is your comprehensive audio training series for the CompTIA Cybersecurity Analyst (CYSA+) certification. Built for learners who are on the move, this podcast breaks down each domain of the CYSA+ exam in structured, digestible episodes. Whether you're studying during your commute or brushing up at the gym, this PrepCast is designed to reinforce critical skills and exam knowledge with clarity and focus.
  continue reading
 
Artwork

1
Smart&Nimble Monday Talk

Smart&Nimble Monday Talk

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Hey, Everyone! Welcome to my weekly podcast where I share secrets I'm discovering on my way to building my brand and my tribe Smart&Nimble from absolutely nothing! Who are we? We exercise to keep our mental skills at peak. We solve tough world and business problems to fulfill our purpose. We are entrepreneurs. We are biohackers. We are smart and nimble. Cover art photo provided by Martin Widenka on Unsplash: https://unsplash.com/@widenka
  continue reading
 
Artwork

1
The Marriage Guardians

Ritchie Knox / Terrika Knox

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Daily+
 
Book a Private 2-on-2 Session with The Marriage Guardians: [email protected] Be a Guest on The Marriage Guardians Podcast: [email protected] Welcome: Welcome to "The Marriage Guardians," a groundbreaking podcast dedicated to fostering healthy, resilient marriages that stand the test of time. In a world where divorce rates are alarmingly high and the pressures of modern life can strain even the strongest partnerships, our mission is clear: we want to be the gua ...
  continue reading
 
Loading …
show series
 
Welcome to the Purple Patch Podcast! On this episode, IRONMAN Master Coach Matt Dixon introduces the Purple Patch Marathon Special program, offering personalized coaching for $99/month with a 25% discount on the first month. The program includes live education, race strategy support, and on-site coaching. Dixon emphasizes the importance of balancin…
  continue reading
 
Out of Body Merch: https://www.area52.shop Patreon Exclusive Content: https://www.patreon.com/Area52investigations UAP Gerb joins us in the SCIF to talk about the new witnesses he has interviewed. He shares what they saw, why their stories matter, and how these testimonies could change the way we understand the phenomenon.…
  continue reading
 
Welcome to the Purple Patch Podcast! On this episode, IRONMAN Master Coach Matt Dixon introduces the Purple Patch Marathon Special Program, offering personalized coaching for $99/month with a 25% discount for new subscribers. He also promotes the Win Cycle leadership program, designed to enhance team performance and adaptability. Dixon emphasizes t…
  continue reading
 
We open with an exclusive, never-before-seen moment from Joe McMoneagle — one of the U.S. military’s top remote viewers — as he recounts a strange event: a pilot reportedly flew into a wormhole and came out somewhere… else. That story sets the stage for three of the most unsettling pilot encounters ever recorded — all backed by original cockpit or …
  continue reading
 
Welcome to the Purple Patch Podcast! On this episode, IRONMAN Master Coach Matt Dixon discusses the Purple Patch Run Squad program, offering personalized coaching for $99/month with a 25% discount for the first month. He highlights the success of Pasquale Romano, a 60-year-old athlete who achieved a half IRONMAN PR and first age group win. Dixon br…
  continue reading
 
AREA 52 Shop: https://www.area52.shop Patreon Exclusive Content: https://www.patreon.com/Area52investigations Dr. Michael P. Masters is a biological anthropologist and professor at Montana Technological University. He holds a PhD in anthropology with a focus on human evolution and anatomy. In this episode, we explore his research into time travel, …
  continue reading
 
Welcome to the Purple Patch Podcast! On this episode, IRONMAN Master Coach Matt Dixon and Purple Patch Fitness Coach Max Gering discuss a case study on Gwen, a 43-year-old triathlete who has been dealing with recurring lower-body injuries. Gwen's training followed a fixed three-week high-load cycle, leading to frequent injuries. The intervention fo…
  continue reading
 
AREA 52 Shop: https://www.area52.shop Patreon Exclusive Content: https://www.patreon.com/Area52investigations In this episode we read through one of the earliest and most surreal alien abduction stories ever recorded. The case of Antonio Villas Boas.In 1957 a young Brazilian farmer claimed he was taken aboard a UFO by humanoid beings. He described …
  continue reading
 
In today’s episode, we’re excited to share some updates, including the return of our webcomic series on Tapas, the opportunity to vote for the People’s Choice Podcast Awards, nominations for the Techs Rock Awards, and a call for listener stories. Tune in now to discover more! Vote for us from now until July 31st at the People's Choice Podcast Award…
  continue reading
 
Welcome to the Purple Patch Podcast! On this episode, IRONMAN Master Coach Matt Dixon and Purple Patch Coach Max Gering discuss how the midpoint of any racing season is more than just a milestone—it's a vital opportunity to pause, assess, and intentionally adjust one's course. Dixon talks about the power of midseason reflection and how to leverage …
  continue reading
 
Every incident response process must end with two critical questions: What went wrong? And how do we prevent it next time? In this final episode of Domain 4, we explore the structure and value of root cause analysis (RCA) and the metrics analysts use to evaluate incident response performance. You'll learn techniques for identifying the initial fail…
  continue reading
 
When a breach crosses a legal threshold, reporting to regulators or law enforcement may be required. In this episode, we examine the processes and obligations associated with regulatory reporting under frameworks like GDPR, HIPAA, PCI DSS, and state-level data breach laws. You’ll learn what types of incidents trigger mandatory disclosure, how quick…
  continue reading
 
Sometimes the most difficult part of a security incident isn’t stopping the threat—it’s explaining what happened to the people affected. In this episode, we explore how organizations communicate with customers, partners, and the media during and after an incident. You’ll learn what kinds of disclosures are required, what language builds trust, and …
  continue reading
 
Communication during a security incident isn't just internal—it can affect your company’s reputation, legal standing, and customer trust. In this episode, we examine how security teams coordinate with legal departments and public relations professionals to craft official statements and limit liability. You'll learn how analysts contribute to this p…
  continue reading
 
When the incident is over, the reporting begins. In this episode, we explore how security analysts write effective incident response reports that document what happened, how it was discovered, what actions were taken, and what outcomes resulted. You’ll learn how to construct a clear executive summary, provide a precise who-what-when-where-why break…
  continue reading
 
Not every alert becomes an incident—but when one does, it needs to be declared formally and escalated swiftly. In this episode, we walk through the process of incident declaration, including the criteria used to define what qualifies as an incident and the steps analysts take to classify severity. You’ll learn how escalation procedures are triggere…
  continue reading
 
During an incident, clear and timely communication becomes a matter of urgency—not just best practice. In this episode, we cover how security analysts coordinate communication across teams and leadership tiers when responding to security events. You’ll learn how to identify the right stakeholders based on the severity and scope of the incident, and…
  continue reading
 
Not all stakeholders need the same level of technical detail—but all of them need accurate, timely, and actionable reporting. In this episode, we explore how analysts identify and tailor communication for different stakeholder groups during the vulnerability management process. You’ll learn who needs to know what—from system administrators and deve…
  continue reading
 
You can’t improve what you don’t measure. In this episode, we focus on key performance indicators (KPIs) and metrics used to evaluate the effectiveness of vulnerability management programs. You’ll learn how metrics like vulnerability age, remediation time, recurrence rates, and vulnerability density across asset classes are used to benchmark perfor…
  continue reading
 
Even when vulnerabilities are known and documented, remediation doesn’t always move forward. In this episode, we examine the most common inhibitors to remediation—technical, procedural, and political obstacles that delay or prevent action. You’ll learn how factors like legacy systems, proprietary dependencies, business process interruptions, organi…
  continue reading
 
Once vulnerabilities are identified, the work isn’t done—it’s just beginning. In this episode, we explore how analysts develop and communicate action plans for addressing discovered risks. You’ll learn how patching schedules, configuration changes, user awareness efforts, and compensating controls are communicated clearly to technical teams, projec…
  continue reading
 
Security isn't just about stopping threats—it's also about proving due diligence. In this episode, we explore how security teams create and interpret compliance reports aligned with frameworks like PCI DSS, HIPAA, NIST 800-53, and ISO 27001. You’ll learn how reports are structured to demonstrate adherence to technical controls, timelines, audit req…
  continue reading
 
In this episode, we break down the core components of a vulnerability management report. You’ll learn how to organize and present data on discovered vulnerabilities, affected assets, associated risk scores, remediation efforts, recurrence frequency, and mitigation timelines. We explain how to structure reports for different audiences—whether it's a…
  continue reading
 
Welcome to Domain 4 of the CySA+ PrepCast. In this episode, we introduce the principles of reporting and communication—critical soft skills that define how technical findings are translated into business decisions. You’ll learn why analysts must be effective communicators, how reporting ties into regulatory requirements, and what makes security met…
  continue reading
 
Once the smoke clears, the real improvement begins. In this episode, we explore the post-incident phase of the incident response lifecycle. You’ll learn how forensic analysis is conducted to uncover technical root causes, how timeline reconstruction helps validate scope and sequence, and how organizations document lessons learned to avoid repeating…
  continue reading
 
The best incident response doesn’t start with detection—it starts with preparation. In this episode, we walk through the preparation phase of the incident response lifecycle, focusing on how organizations create, document, and test their response plans. You’ll learn about IR playbooks, tabletop exercises, escalation matrices, and readiness assessme…
  continue reading
 
Detecting an incident is only the beginning. In this episode, we examine the containment, eradication, and recovery phases of incident response—what they are, how they differ, and how they build upon one another to restore a secure state. You’ll learn how containment isolates the threat, eradication removes it from the environment, and recovery bri…
  continue reading
 
Raw data becomes actionable intelligence when it’s properly analyzed. In this episode, we focus on the data and log analysis process during an incident, explaining how analysts sift through event logs, network traffic, system alerts, and application telemetry to reconstruct what happened. You’ll learn how to use timeline creation, correlation engin…
  continue reading
 
Once an incident is detected, preserving evidence becomes a top priority. In this episode, we walk through the evidence acquisition process—from initial identification to collection, storage, and transfer. You’ll learn what types of evidence are collected during security incidents, including disk images, memory dumps, log files, and email headers, …
  continue reading
 
Detecting an attack starts with recognizing the signs. In this episode, we explore Indicators of Compromise (IoCs)—artifacts that suggest an organization may have been breached or is under active threat. You’ll learn how IoCs include file hashes, domain names, IP addresses, registry keys, and behavioral anomalies, and how analysts discover them dur…
  continue reading
 
The OSSTMM is often overlooked—but it provides a rigorous, standards-based approach to security testing that aligns with the goals of CySA+ and many compliance frameworks. In this episode, we explain what the Open Source Security Testing Methodology Manual is, why it matters, and how it provides structure to everything from reconnaissance and vulne…
  continue reading
 
In this episode, we explore the MITRE ATT&CK Framework—a living matrix of adversary behaviors that has transformed how cybersecurity professionals track and respond to attacks. You’ll learn how the framework maps tactics (the goals of an attacker) to techniques (the methods they use), and how analysts use ATT&CK to build detection logic, design thr…
  continue reading
 
What happens when we move beyond events and look at the relationships between adversaries, capabilities, victims, and infrastructure? In this episode, we introduce the Diamond Model of Intrusion Analysis—a framework that gives analysts a structured way to examine threats by looking at key attributes and how they interact. You’ll learn how this mode…
  continue reading
 
To stop an attack, you must understand its progression. In this episode, we explore the Lockheed Martin Cyber Kill Chain—a widely used framework that maps the stages of a cyberattack from initial reconnaissance through delivery, exploitation, command and control, and beyond. You’ll learn how attackers move through each phase, and how defenders can …
  continue reading
 
Welcome to Domain 3 of the CySA+ PrepCast, where we move from prevention and vulnerability management into response and containment. In this episode, we provide an overview of what incident response means in modern organizations and how it’s structured in the CySA+ exam. You’ll learn how incident response differs from general troubleshooting, and w…
  continue reading
 
Before moving forward, it’s time to reflect. In this comprehensive recap, we walk through the critical knowledge areas covered in Domain 2: Vulnerability Management. From scanning types and validation workflows to secure coding, asset prioritization, compensating controls, and risk decisions—you’ll get a structured review that reinforces everything…
  continue reading
 
What if you could anticipate the attacker’s plan before they even launch it? In this episode, we introduce threat modeling as a method for identifying and prioritizing potential threats based on how applications and systems are designed. You’ll learn how threat modeling is performed using techniques like STRIDE, kill chain analysis, and data flow d…
  continue reading
 
Security that begins in production is already behind schedule. In this episode, we take a holistic view of the Secure Software Development Lifecycle (SDLC), explaining how security is integrated into every phase of software creation—from planning and design to development, testing, deployment, and maintenance. You'll learn how threat modeling, secu…
  continue reading
 
You don’t need to be a developer to influence secure code—but you do need to understand what secure coding looks like. In this episode, we break down the most important secure development practices that analysts should know when evaluating application risk or reviewing vulnerability reports. Topics include input validation, output encoding, secure …
  continue reading
 
You can't protect what you can't see. In this episode, we explore the evolving discipline of attack surface management (ASM)—a proactive process that helps security teams identify, map, and reduce the ways in which an attacker could compromise an organization. You'll learn how ASM incorporates both internal and external assets, including shadow IT,…
  continue reading
 
In a world where thousands of vulnerabilities exist, how do you decide which to address first? In this episode, we break down the art and science of vulnerability prioritization—how analysts combine CVSS scores, asset value, exploitability, and business context to triage effectively. You’ll learn how to identify which issues must be escalated to le…
  continue reading
 
Cybersecurity doesn’t happen in a vacuum—it happens under governance. In this episode, we explain how policies, governance structures, and service-level objectives (SLOs) shape the work of the security analyst. You’ll learn how vulnerability management policies define scan frequency, remediation timelines, and exception criteria—and how governance …
  continue reading
 
Effective vulnerability management is built on sound risk management principles. In this episode, we explore the four classic risk response strategies—accept, avoid, transfer, and mitigate—and how they apply to real-world cybersecurity scenarios. You'll learn how security analysts recommend and evaluate responses based on the nature of the vulnerab…
  continue reading
 
Sometimes a vulnerability can’t be fixed—at least, not right away. In this episode, we explain how analysts and risk managers document and process exceptions: formal records of accepted risk where vulnerabilities are not remediated within standard timelines. You’ll learn when exceptions are appropriate, what approvals are required, and how expirati…
  continue reading
 
Security teams can’t just apply patches whenever they want—especially in enterprise environments where uptime and availability are critical. In this episode, we explore how maintenance windows are scheduled, documented, and coordinated to apply updates without disrupting core business operations. You’ll learn how organizations balance risk reductio…
  continue reading
 
Loading …

Quick Reference Guide

Copyright 2025 | Privacy Policy | Terms of Service | | Copyright
Listen to this show while you explore
Play