British and American railway news and articles from the late 1800's and early 1900's, as reported in Railway Magazine and other publications and narrated by Dr. David Robinson
…
continue reading
ChangeMaking Connections is a monthly podcast exploring the journeys of change leaders striving for deep societal transformations. Hosted by Beth Berila, this show delves into the intricacies of sparking change, from personal evolutions to communal shifts. Here, we celebrate the challenges, triumphs, strategies, and possibilities that spring from a life dedicated to social justice. Join us in connecting with experts across various fields as we unpack the mechanisms of initiating meaningful c ...
…
continue reading
** Ad-free episodes are available to our paid supporters over at patreon.com/geeks ** Host David Barr Kirtley, author of the book Save Me Plz and Other Stories, talks geek culture with guests such as Neil Gaiman, George R. R. Martin, Richard Dawkins, Simon Pegg, Bill Nye, Margaret Atwood, Neil deGrasse Tyson, and Ursula K. Le Guin. Geek’s Guide to the Galaxy has appeared on recommended podcast lists from NPR, The Guardian, Wired, The A.V. Club, BBC America, CBC Radio, WVXU, io9, Omni, The St ...
…
continue reading
Welcome to DSNSB, a dynamic platform where our guests share compelling stories across the realms of Business, Fitness, and Culture. From enlightening conversations with Dental Hygienists delving into gut health insights to riveting narratives from highly trained long-distance assassins with roots in Narcotics Anonymous. Our mission is to fuel your internal fire and DSNSB is your go-to source for inspiration, whether you're seeking motivation from C-level executives who've triumphed over adve ...
…
continue reading
Authors, Coaches, and Entrepreneurs share their personal and professional journeys. Past guests include Bruce George of the Genius is Common Movement, Life Coach Bobbi Stevens, Financial Expert Steven Hutchinson, Sen. Barbara Robinson, Geraldine Hollis of the Tougaloo Nine, Author Bernard N. Lee, Jr., and Author and Speaker Tawana Williams.
…
continue reading
Welcome to the Security Weekly Podcast Network, your all-in-one source for the latest in cybersecurity! This feed features a diverse lineup of shows, including Application Security Weekly, Business Security Weekly, Paul's Security Weekly, Enterprise Security Weekly, and Security Weekly News. Whether you're a cybersecurity professional, business leader, or tech enthusiast, we cover all angles of the cybersecurity landscape. Tune in for in-depth panel discussions, expert guest interviews, and ...
…
continue reading
From Main Street to Wall Street, global business celebrity and former Fortune 100 C-Suite executive, Jeffrey Hayzlett, brings you insights from today’s biggest headline makers. Listen in as Hayzlett, goes inside the good, bad and ugly of recent business results. It’s ALL BUSINESS with Jeffrey Hayzlett.
…
continue reading
NOT your Ordinary PODCAST. An insight on sports, fantasy football rankings, stats, matchups, players, injuries, news, and social hot takes. New Episodes Drop every Monday, Wednesday and Friday.
…
continue reading

1
People Behind the Science Podcast Stories from Scientists about Science, Life, Research, and Science Careers
Dr. Marie McNeely, featuring top scientists speaking about their life and c
Are you searching for great stories to ignite your curiosity, teach you to perform better in life and career, inspire your mind, and make you laugh along the way? In this science podcast, Dr. Marie McNeely introduces you to the brilliant researchers behind the latest scientific discoveries. Join us as they share their greatest failures, most staggering successes, candid career advice, and what drives them forward in life and science. Our website with show notes]] Greetings science fans! We’r ...
…
continue reading

1
Building Cyber Resilience: AI Threats, Mid-Market Risks & Ransomware Trends - Karl Van den Bergh, Tony Anscombe, Eyal Benishti, Nick Carroll, Chad Alessi, Chris Peluso - ESW #409
1:38:33
1:38:33
Play later
Play later
Lists
Like
Liked
1:38:33Segment 1 CTG Interview Middle market companies face unique challenges in the ever-evolving cyber environment. Developing a comprehensive cybersecurity approach is a business imperative for middle market companies, and Chad Alessi will discuss the threat landscape, what’s keeping IT decision-makers awkward at night, and the best approach to creatin…
…
continue reading

1
815: Fascinated by the Effects of Material Properties on the Form and Function of Fishes - Dr. Adam Summers
50:02
50:02
Play later
Play later
Lists
Like
Liked
50:02Dr. Adam Summers is a Professor in the School of Aquatic and Fisheries Sciences and Department of Biology at the University of Washington, and he conducts research in his lab within the Friday Harbor Laboratories there. With a background in engineering and mathematics, Adam works on applying engineering and physics principles to living systems. He …
…
continue reading

1
Homeless, In Love, and Building a Business: David & Annie Roush’s Radical Rebuild
3:34:04
3:34:04
Play later
Play later
Lists
Like
Liked
3:34:04Send us a text In this gripping, raw, and unexpectedly uplifting episode, we’re joined by David and Annie Roush, a powerhouse couple who’ve lived many lives—Marine, creative, illusionist, strategist, business builder, and survivor. Together, they open up about their lowest lows and the unconventional love story and career path that followed. From j…
…
continue reading

1
Edge, Safari, CISO Pay and Loathing, Fake AI, ASUS, OneDrive, Manus, Aaran Leyland... - SWN #481
33:15
33:15
Play later
Play later
Lists
Like
Liked
33:15Edge, Safari, CISO Pay and Loathing, Fake AI, ASUS, OneDrive, Manus, Aaran Leyland, and More on this episode of the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-481
…
continue reading
In the security news: Vicious Trap - The malware hiding in your router Hacking your car WSL is open-source, but why? Using AI to find vulnerabilities - a case study Why you should not build your own password manager The inside scoop behind Lumma Infostealer Hacking a smart grill Hardcoded credentials on end of life routers and "Alphanetworks" SIM s…
…
continue reading

1
Quantum Readiness & Zero Trust: Strategies to Strengthen Digital Resilience - Jordan Avnaim, Chris Hickman, Amit Sinha, Albert Estevez Polo - BSW #397
1:07:59
1:07:59
Play later
Play later
Lists
Like
Liked
1:07:59This segment explores how automated microsegmentation addresses critical Zero Trust gaps overlooked by traditional access controls and legacy segmentation solutions. We'll examine the limitations of perimeter-based defenses in today's dynamic threat landscape and reveal how automated microsegmentation enhances network security beyond conventional f…
…
continue reading

1
AP Tests, Hyper-V, Notepad, Google, Nova Scotia, NHI, Bond, Josh Marpet, and more... - SWN #480
35:14
35:14
Play later
Play later
Lists
Like
Liked
35:14AP Tests, Hyper-V, Notepad, Google, Nova Scotia, NHI, Bond, Josh Marpet, and more on the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-480
…
continue reading

1
AI in AppSec: Agentic Tools, Vibe Coding Risks & Securing Non-Human Identities - Mo Aboul-Magd, Shahar Man, Brian Fox, Mark Lambert - ASW #332
1:04:35
1:04:35
Play later
Play later
Lists
Like
Liked
1:04:35ArmorCode unveils Anya—the first agentic AI virtual security champion designed specifically for AppSec and product security teams. Anya brings together conversation and context to help AppSec, developers and security teams cut through the noise, prioritize risks, and make faster, smarter decisions across code, cloud, and infrastructure. Built into …
…
continue reading

1
594. Andor Season 2 Review (with Andrea Kail, Erin Lindsey, Matt London)
1:26:36
1:26:36
Play later
Play later
Lists
Like
Liked
1:26:36Andrea Kail, Erin Lindsey, and Matt London join us to discuss Season 2 of the Disney+ series Andor, a prequel to the movie Rogue One: A Star Wars Story. Ad-free episodes are available to our paid supporters over at patreon.com/geeks. Learn more about your ad choices. Visit megaphone.fm/adchoicesBy David Barr Kirtley
…
continue reading

1
Reality check on SOC AI; Enterprise News; runZero and Imprivata RSAC interviews - Erik Bloch, HD Moore, Joel Burleson-Davis - ESW #408
1:49:38
1:49:38
Play later
Play later
Lists
Like
Liked
1:49:38Segment 1: Erik Bloch Interview The math on SOC AI just isn't adding up. It's not easy to do the math, either, as each SOC automation vendor is tackling alert fatigue and SecOps assistants a bit differently. Fortunately for us and our audience, Erik Bloch met with many of these vendors at RSAC and is going to share what he learned with us! Segment …
…
continue reading

1
814: Uncovering the Secrets of Ancient Creatures By Studying Fossils and the Fossilization Process - Dr. Sarah Gabbott
51:23
51:23
Play later
Play later
Lists
Like
Liked
51:23Dr. Sarah Gabbott is a Professor of Palaeontology in the School of Geography, Geology, and the Environment at the University of Leicester. She is also Director of Green Circle Nature Regeneration CIC, a non-profit organization in the UK, and she is co-author of the recently released book Discarded: How Technofossils Will be Our Ultimate Legacy. As …
…
continue reading

1
Healing After Divorce, Career Burnout, and Rock Bottom – Kate Telge Gets Real
1:49:56
1:49:56
Play later
Play later
Lists
Like
Liked
1:49:56Send us a text Guest: Kate Telge – Co-Founder of Open Spaces Topics: Career Pivots | Sobriety | Community | Divorce Recovery | Personal Growth Description: In this powerful and deeply personal episode, I sit down with Kate Telge, co-founder of Open Spaces, a community-first platform dedicated to healing, connection, and authentic human experience. …
…
continue reading

1
Keyboards, 3am, TikTok, LummaC2, Cityworks, Honeypots, Fancy Bear, Aaran Leyland... - SWN #479
33:37
33:37
Play later
Play later
Lists
Like
Liked
33:37Keyboards, 3 am, TikTok, LummaC2, Cityworks, Honeypots, Fancy Bear, Aaran Leyland, and More, on this edition of the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-479
…
continue reading

1
Malware Laced Printer Drivers - PSW #875
2:01:59
2:01:59
Play later
Play later
Lists
Like
Liked
2:01:59This week in the security news: Malware-laced printer drivers Unicode steganography Rhode Island may sue Deloitte for breach. They may even win. Japan's active cyber defense law Stop with the ping LLMs replace Stack Overflow - ya don't say? Aggravated identity theft is aggravating Ivanti DSM and why you shouldn't use it EDR is still playing cat and…
…
continue reading

1
CISO Cheat Sheet, as Role Evolves and vCISO is Viable, Cobalt Strike and Resilience - Theresa Lanowitz, Rohit Dhamankar - BSW #396
1:17:08
1:17:08
Play later
Play later
Lists
Like
Liked
1:17:08In the leadership and communications section, Why Every CISO Should Be Gunning For A Seat At The Board Table, The Innovation We Need is Strategic, Not Technical , The Best Leaders Ask the Right Questions, and more! This segment is sponsored by Fortra. Visit https://securityweekly.com/fortrarsac to learn more about them! Fortra is successfully reduc…
…
continue reading

1
WSL, Defendnot, Clippy, Crawlomatic, Take It Down, Pwn2Own, Aaran Leyland, and More.. - SWN #478
34:55
34:55
Play later
Play later
Lists
Like
Liked
34:55WSL, Defendnot, Clippy, Crawlomatic, Take It Down, Pwn2Own, Aaran Leyland, and more on the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-478
…
continue reading

1
Being (y)our Authentic Selves: Countering Anti-Trans Attacks & Supporting Trans Communities with Teo Drake & Alex Kapitan
59:33
59:33
Play later
Play later
Lists
Like
Liked
59:33Trans communities are being targeted in deeply inhumane ways in this cultural moment. How did we get here and what can we do to support trans communities? In this powerful and timely episode, Teo Drake and Alex Kapitan offer insightful context for how, when, and why the current attack on Transgender communities arose. They trouble the disinformatio…
…
continue reading

1
Appsec News & Interviews from RSAC on Identity and AI - Rami Saas, Charlotte Wylie - ASW #331
1:01:48
1:01:48
Play later
Play later
Lists
Like
Liked
1:01:48In the news, Coinbase deals with bribes and insider threat, the NCSC notes the cross-cutting problem of incentivizing secure design, we cover some research that notes the multitude of definitions for secure design, and discuss the new Cybersecurity Skills Framework from the OpenSSF and Linux Foundation. Then we share two more sponsored interviews f…
…
continue reading

1
The State of Cybersecurity Readiness for the Next Big Emergency - David Aviv, Bri Frost, Marshall Erwin - ESW #407
2:12:42
2:12:42
Play later
Play later
Lists
Like
Liked
2:12:42Segment 1: Fastly Interview In this week's interview segment, we talk to Marshall Erwin about the state of cybersecurity, particularly when it comes to third party risk management, and whether we're ready for the next big SolarWinds or Crowdstrike incident. These big incidents have inspired executive orders, the Secure by Design initiative, and eve…
…
continue reading

1
813: Investigating the Impacts of the Gut Microbiome on Immunotherapy Cancer Treatments - Dr. Jennifer Wargo
35:18
35:18
Play later
Play later
Lists
Like
Liked
35:18Dr. Jennifer Wargo is an Associate Professor in the Department of Surgical Oncology at The University of Texas MD Anderson Cancer Center and a Stand Up To Cancer researcher. Jennifer is a physician scientist, and this means she splits her time between providing care to patients and doing research to find better ways of treating disease. Specificall…
…
continue reading

1
593. Roger Zelazny's Writing Advice (with Warren Lapine)
1:08:55
1:08:55
Play later
Play later
Lists
Like
Liked
1:08:55Warren Lapine joins us to discuss editing the book On Writing Science Fiction and Fantasy by Roger Zelazny. Ad-free episodes are available to our paid supporters over at patreon.com/geeks. Learn more about your ad choices. Visit megaphone.fm/adchoicesBy David Barr Kirtley
…
continue reading

1
Inside the Mind of a Champion: Marcus Robinson’s Bodybuilding Journey & Life Lessons
1:58:42
1:58:42
Play later
Play later
Lists
Like
Liked
1:58:42Send us a text 💪 Welcome back to David’s Saturday Night Sit Back—your go-to podcast for authentic conversations that inspire growth, wellness, and good vibes. Today’s episode features an in-depth sit-down with none other than Marcus Robinson: 🏋️♂️ 8x NPC National Qualifier 🥦 Certified Sports Nutritionist 🏆 ISSA Bodybuilding Specialist 🏢 Founder of…
…
continue reading

1
Steganography, RICO, CMMC, End of 10, AI is coming for you, Aaran Leyland and More... - SWN #477
33:54
33:54
Play later
Play later
Lists
Like
Liked
33:54Steganography, RICO, CMMC, End of 10, AI is coming for you, Aaran Leyland and More, on this edition of the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-477
…
continue reading
This week in the security news: Android catches up to iOS with its own lockdown mode Just in case, there is a new CVE foundation Branch privilege injection attacks My screen is vulnerable The return of embedded devices to take over the world - 15 years later Attackers are going after MagicINFO Hacking Starlink Mitel SIP phones can be hacked Reversi…
…
continue reading

1
CISO Communication and Hiring, as they Combat Threat and Penetration Testing Trends - Gunter Ollmann, Derek Manky - BSW #395
1:06:28
1:06:28
Play later
Play later
Lists
Like
Liked
1:06:28In the leadership and communications section, How CISOs can talk cybersecurity so it makes sense to executives, Firms to spend more on GenAI than security in 2025, Europe leads shift from cyber security ‘headcount gap’ to skills-based hiring, and more! Next, pre-recorded interviews from RSAC Conference 2025, including: This segment is sponsored by …
…
continue reading

1
Deepfake, South Korea, Moonlander, ChineseAI, FBI, AI damages professional reputation - SWN #476
29:03
29:03
Play later
Play later
Lists
Like
Liked
29:03Deepfake porn, South Korea, Operation Moonlander, Chinese AI, FBI, AI use damages professional reputation, Joshua Marpet and More Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-476
…
continue reading

1
Secure Code Reviews, LLM Coding Assistants, and Trusting Code - Rey Bango, Karim Toubba, Gal Elbaz - ASW #330
1:09:38
1:09:38
Play later
Play later
Lists
Like
Liked
1:09:38Developers are relying on LLMs as coding assistants, so where are the LLM assistants for appsec? The principles behind secure code reviews don't really change based on who write the code, whether human or AI. But more code means more reasons for appsec to scale its practices and figure out how to establish trust in code, packages, and designs. Rey …
…
continue reading

1
Secrets and their role in infrastructure security - Jawahar Sivasankaran, Chas Clawson, Sergey Gorbaty, Fernando Medrano - ESW #406
2:14:05
2:14:05
Play later
Play later
Lists
Like
Liked
2:14:05Segment 1 - Secrets and their role in infrastructure security From API keys and tokens to environment variables and credentials, secrets are foundational—and often overlooked—attack surfaces in cloud-native and distributed systems. We break down the risks tied to poor secret hygiene, discuss emerging patterns for secure secret management at scale, …
…
continue reading

1
812: Studying the Evolutionary Diversity of Squishy Sea Creatures - Dr. Joseph Ryan
38:00
38:00
Play later
Play later
Lists
Like
Liked
38:00Dr. Joseph Ryan is an Assistant Professor of Biology at the Whitney Laboratory for Marine Bioscience at the University of Florida. Joe studies DNA from squishy marine invertebrates like ctenophores (e.g. comb jellies), cnidarians (e.g. jellyfish), tunicates (e.g. sea squirts), and sea cucumbers. His goal is to understand how different types of anim…
…
continue reading

1
Natural Muscle, No BS — Building Strength, Identity, and Discipline with Coach Zach
3:50:22
3:50:22
Play later
Play later
Lists
Like
Liked
3:50:22Send us a text In this soul-stirring episode of David’s Saturday Night Sit Back, we’re talking natural fitness, mental resilience, and even extraterrestrial life with Coach Zach—founder of Born to the Iron. Zach shares how to get jacked without drugs or supplements, and why mental clarity and self-discipline matter more than macros or gym hacks. Za…
…
continue reading

1
Sudo watch, AI Dreams, Kickidler, Powershool, Old Man Router, PSMU, Aaran Leyland... - SWN #475
33:52
33:52
Play later
Play later
Lists
Like
Liked
33:52Sudo watch this show, Hallucinations, Kickidler, Powershool redux, Old Man Router, PSMU, Aaran Leyland, and More, on this edition of the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-475
…
continue reading
Security news for this week: RDP and credentials that are not really revoked, and some RDP bitmap caching fun Some magic info on MagicINFO Vulnerability Management Zombies There is a backdoor in your e-commerce Airborne: vulnerabilities in AirPlay Bring your own installer - crafty EDR bypass The Signal clone used by US government officials: shocker…
…
continue reading

1
592. The Best of Greg Egan Part 1 Review (with Anthony Ha)
2:24:07
2:24:07
Play later
Play later
Lists
Like
Liked
2:24:07Anthony Ha joins us to discuss the first eight stories in the book The Best of Greg Egan, part of the SF Masterworks series of science fiction classics. Stories discussed: "Learning to Be Me" (20:42), "Axiomatic" (44:03), "Appropriate Love" (50:10), "Into Darkness" (1:00:30), "Unstable Orbits in the Space of Lies" (1:14:47), "Closer" (1:26:42), "Ch…
…
continue reading

1
C-Suite Gaps, Cybersecurity is not Working to Solve Exposures and Supply Chain Risks - Dr. Aleksandr Yampolskiy, Lenny Zeltser - BSW #394
1:04:40
1:04:40
Play later
Play later
Lists
Like
Liked
1:04:40In the leadership and communications section, The C-suite gap that's putting your company at risk, CISOs band together to urge world governments to harmonize cyber rules, Cybersecurity is Not Working: Time to Try Something Else, and more! Organizations are increasingly threatened by cyberattacks originating from their suppliers. Existing tools (lik…
…
continue reading

1
Deepfake Porn Bots, Skype, dd, Venom Spider, CISA, IT Helpdesk, Rob Allen... - Rob Allen - SWN #474
36:47
36:47
Play later
Play later
Lists
Like
Liked
36:47Deepfake Porn Bots, Skype, dd, Venom Spider, CISA, IT Helpdesk, Rob Allen, and more on the Security Weekly News. Segment Resources: https://cybersecuritynews.com/cyber-security-company-ceo-arrested/ This segment is sponsored by ThreatLocker. Visit https://www.securityweekly.com/threatlocker to learn more about them! Visit https://www.securityweekly…
…
continue reading

1
Becoming Agents of Spiritual Possibility: Living Yoga Practice with Susanna Barkataki
48:07
48:07
Play later
Play later
Lists
Like
Liked
48:07In this episode, Susanna shares about her new book, Ignite Your Yoga: How to Live, Practice, and Teach as an Authentic Yoga Steward. We discuss her journey in writing this book and her first one, Embrace Yoga's Roots. Yoga is a practice for self, community, and for a better world. We talk about how yoga philosophy, traditions, and practice can shap…
…
continue reading

1
AI Era, New Risks: How Data-Centric Security Reduces Emerging AppSec Threats - Vishal Gupta, Idan Plotnik - ASW #329
1:03:03
1:03:03
Play later
Play later
Lists
Like
Liked
1:03:03We catch up on news after a week of BSidesSF and RSAC Conference. Unsurprisingly, AI in all its flavors, from agentic to gen, was inescapable. But perhaps more surprising (and more unfortunate) is how much the adoption of LLMs has increased the attack surface within orgs. The news is heavy on security issues from MCPs and a novel alignment bypass a…
…
continue reading

1
2025 Security Trends: Identity, Endpoint, Cloud & the Rise of Browser Threats - Jason Mical, Lori Robinson, Hed Kovetz, Rob Allen, Vivek Ramachandran, Alex Pinto - ESW #405
1:42:43
1:42:43
Play later
Play later
Lists
Like
Liked
1:42:43Now in its 18th year, the Verizon Business DBIR is one of the industry’s longest standing and leading reports on the current cybersecurity landscape. This year’s report analyzes more than 22,000 security incidents with victims spanning 139 countries, examining significant growth in third-party involvement in breaches, increases in ransomware and ex…
…
continue reading

1
811: Investigating Clams with Photosynthetic Algae, Parasites in Mud Shrimp, and Other Species Interactions that Shape Evolution - Dr. Jingchun Li
42:59
42:59
Play later
Play later
Lists
Like
Liked
42:59Dr. Jingchun Li is an Associate Professor in the Department of Ecology and Evolutionary Biology at the University of Colorado Boulder, and she is the Curator of Invertebrates at CU Boulder’s Museum of Natural History. She is also a Packard Foundation Fellow and a National Geographic Explorer. Jingchun studies how different species interact with eac…
…
continue reading

1
Burnout, Business, and Balance: Vik Singh’s Entrepreneurial Journey
1:33:17
1:33:17
Play later
Play later
Lists
Like
Liked
1:33:17Send us a text In this episode of David’s Saturday Night Sit Back, we explore what it really takes to pivot from corporate life into full-on entrepreneurship with Vik Singh — founder of Serenity Falls Deodorant, a natural, aluminum-free brand making waves with scents like Coconut Vanilla and Ocean Mist. Vik shares how his background at major compan…
…
continue reading

1
Security Weekly News Interviews Leaders of NECCDC competition - SWN #473
32:02
32:02
Play later
Play later
Lists
Like
Liked
32:02Join us for a special in-person edition of the Security Weekly News! Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-473
…
continue reading

1
AI Tips, Tricks, and Traps! - PSW #872
1:37:21
1:37:21
Play later
Play later
Lists
Like
Liked
1:37:21The PSW crew discusses tips, tricks, and traps for using AI and LLMs. We discuss a wide range of AI-related topics, including how to utilize AI tools for writing, coding, data analysis, website design, and more! Some key takeaways include: AI has rapidly shifted from novelty to an essential tool in security and other fields. Paid AI versions offer …
…
continue reading

1
Say Easy, Do Hard - Defining Objectives and Key Results Aligned to Business Goals - BSW #393
49:58
49:58
Play later
Play later
Lists
Like
Liked
49:58In today’s ever-evolving business landscape, organizations face diverse risks, including cyber risks, that can significantly affect their operations and overall prosperity. Aligning risk management strategies with organizational objectives is crucial for effectively mitigating these potential threats and fostering sustainable growth. Easier said th…
…
continue reading

1
Security Weekly News Interviews Participants and Coaches at NECCDC - SWN #472
33:34
33:34
Play later
Play later
Lists
Like
Liked
33:34Join us for a special in-person edition of the Security Weekly News! Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-472
…
continue reading

1
Secure Designs, UX Dragons, Vuln Dungeons - Jack Cable - ASW #328
44:08
44:08
Play later
Play later
Lists
Like
Liked
44:08In this live recording from BSidesSF we explore the factors that influence a secure design, talk about how to avoid the bite of UX dragons, and why designs should put classes of vulns into dungeons. But we can't threat model a secure design forever and we can't oversimplify guidance for a design to be "more secure". Kalyani Pawar and Jack Cable joi…
…
continue reading