All Hands on Tech, hosted by Eilish and Greg, brings together Nova Scotia’s tech community to uncover the secrets of what makes our province the best place for collaboration, innovation, and growth. Each episode hear from local digital experts as we dive into all of the amazing things happening in Nova Scotia’s fastest-growing sector and learn why so many organizations and individuals are calling Canada’s Ocean Playground home. All Hands on Tech is proudly produced by Digital Nova Scotia (DN ...
…
continue reading
Come chat with Meggan & Jenn about travel planning, travel tips & tricks, and travel fails every week. Don’t forget your travel mug!
…
continue reading
Updates on the latest cybersecurity threats to businesses, data breach disclosures, and how you can secure your firm in an increasingly risky time.
…
continue reading
Welcome to the Security Weekly Podcast Network, your all-in-one source for the latest in cybersecurity! This feed features a diverse lineup of shows, including Application Security Weekly, Business Security Weekly, Paul's Security Weekly, Enterprise Security Weekly, and Security Weekly News. Whether you're a cybersecurity professional, business leader, or tech enthusiast, we cover all angles of the cybersecurity landscape. Tune in for in-depth panel discussions, expert guest interviews, and ...
…
continue reading
This is a podcast about Caribbean History and a good resource for individuals researching their family history Host: Wendy Aris
…
continue reading

1
Mobia Technology Innovations: A People-First Approach to Tech
36:22
36:22
Play later
Play later
Lists
Like
Liked
36:22In this exciting episode of All Hands on Tech, host Claire Quirion is joined by Mike Reeves, President and Owner of Mobia Technology Innovations. From cybersecurity to cloud architecture, Mobia's work bridges technical expertise with real-world impact, and all with an east coast edge. Mike discusses Mobia's 40 years of evolution, their "people firs…
…
continue reading
This week: * The true details around Salt Typhoon are still unknown * The search for a portable pen testing device * Directories named "hacker2" are suspicious * Can a $24 cable compete with a $180 cable? * Hacking Tesla wall chargers * Old Zyxel exploits are new again * Hacking Asus drivers * Stealing KIAs - but not like you may think * Fake artic…
…
continue reading

1
CISO Cyber Insurance Empowerment - Morey Haber, Peter Hedberg, Stephan Jou - BSW #400
1:03:41
1:03:41
Play later
Play later
Lists
Like
Liked
1:03:41Segment description coming soon! This month BeyondTrust released it's 12th annual edition of the Microsoft Vulnerabilities Report. The report reveals a record-breaking year for Microsoft vulnerabilities, and helps organizations understand, identify, and address the risks within their Microsoft ecosystems. Segment Resources: Insights Security Assess…
…
continue reading

1
Scattered Spider Targets US Insurance, Microsoft Zero-Day, Major Database Breach, and AI Poison Pill
11:14
11:14
Play later
Play later
Lists
Like
Liked
11:14In this episode, host Jim Love delves into recent cybersecurity threats and breakthroughs. The notorious Scattered Spider hacker group has shifted its focus to US insurance companies after attacking UK retailers earlier this year. Microsoft's urgent security updates address active zero-day vulnerabilities that allow complete system control. Researc…
…
continue reading

1
Beginner's Guide to the Isle of Skye, Scotland
26:00
26:00
Play later
Play later
Lists
Like
Liked
26:00Planning your trip to the magical Isle of Skye in Scotland? We dive into how to get there, getting around the island, what to do, where to eat, and areas to stay in! Episode Resources: isleofskye.com - helpful for planning any of the hikes/walks mentioned in the episode! Rowan Cottage Self Catering - Jenn's accommodations Support the Travel Mug Pod…
…
continue reading

1
AI Zombie Lawyer, Scattered Spider, ASUS, Mainframes, GrayAlpha, Backups, Josh Marpet - SWN #486
36:26
36:26
Play later
Play later
Lists
Like
Liked
36:26AI Zombie Lawyers, Scattered Spider, ASUS, Mainframes, GrayAlpha, Backups, Josh Marpet, and more on the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-486
…
continue reading

1
Threat Modeling With Good Questions and Without Checklists - Farshad Abasi - ASW #335
1:08:00
1:08:00
Play later
Play later
Lists
Like
Liked
1:08:00What makes a threat modeling process effective? Do you need a long list of threat actors? Do you need a long list of terms? What about a short list like STRIDE? Has an effective process ever come out of a list? Farshad Abasi joins our discussion as we explain why the answer to most of those questions is No and describe the kinds of approaches that …
…
continue reading

1
Insider threats, migrating away from cloud, RSAC interviews with Cyera and Blumira - Rob Allen, Matthew Warner, Yotam Segev - ESW #411
1:19:04
1:19:04
Play later
Play later
Lists
Like
Liked
1:19:04Segment 1 - Interview with Rob Allen from Threatlocker Segment 2 - Topic: Growing Trend - Edge Computing and Hybrid Cloud Segment 3 - Interviews from RSAC 2025 Cyera Cyera is the fastest-growing data security company in history, empowering companies to classify, secure, and manage their data, wherever it is, and leverage the power of the industry’s…
…
continue reading

1
Cybersecurity Today: WestJet Cyber Incident, Anubis Ransomware Evolution, Discord Exploits, and Google Cloud Outage
11:30
11:30
Play later
Play later
Lists
Like
Liked
11:30Host David Shipley discusses several critical cybersecurity incidents and developments. WestJet, Canada's second-largest airline, faced a cybersecurity breach impacting its mobile app and internal systems. The airline is working with law enforcement to investigate while emphasizing the integrity of its flight operations. Additionally, the Anubis ra…
…
continue reading

1
The Secret CISO: Navigating the Human and Technical Challenges in Cybersecurity
51:57
51:57
Play later
Play later
Lists
Like
Liked
51:57In this episode of 'Cybersecurity Today,' hosts John Pinard and Jim Love introduce their unique show, 'The Secret CISO,' which aims to dive deep into the lives and thoughts of CISOs and similar roles, beyond the usual interview-style format. The guest for this episode is Priya Mouli, CISO at Sheridan College, who shares her journey from engineering…
…
continue reading

1
$200,000 Zoom Call, Microsoft, Zero-Click, China & HD With $649 million of Bitcoin - SWN #485
28:38
28:38
Play later
Play later
Lists
Like
Liked
28:38This week we have, $200,000 Zoom Call, Microsoft Teams, INTERPOL, Zero-Click, Junk Food, China & Hard Drive With $649 million of Bitcoin. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-485
…
continue reading

1
AI Security Threats: Echo Leak, MCP Vulnerabilities, Meta's Privacy Scandal, and the 'Peep Show'
12:55
12:55
Play later
Play later
Lists
Like
Liked
12:55In this episode of Cybersecurity Today, host Jim Love discusses critical AI-related security issues, such as the Echo Leak vulnerability in Microsoft's AI, MCP's universal integration risks, and Meta's privacy violations in Europe. The episode also explores the dangers of internet-exposed cameras as discovered by BitSight, highlighting the urgent n…
…
continue reading

1
UEFI Vulnerabilities Galore - PSW #878
2:10:48
2:10:48
Play later
Play later
Lists
Like
Liked
2:10:48This week: You got a Bad box, again Cameras are expose to the Internet EU and connected devices Hydrophobia NVRAM variables Have you heard about IGEL Linux? SSH and more NVRAM AI skeptics are nuts, and AI doesn't make you more efficient Trump Cybersecurity orders I think I can root my Pixel 6 Decentralized Wordpres plugin manager Threat actor namin…
…
continue reading

1
Security Money: The Index is Up, CISOs Need to Get Out, and Are You Burning Out? - BSW #399
56:27
56:27
Play later
Play later
Lists
Like
Liked
56:27This week, it’s time for security money. The index is up, but the previous quarterly results were brutal. In the leadership and communications segment, Get out of the audit committee: Why CISOs need dedicated board time, Quietly Burning Out? What To Do When Your Leadership Starts Lacking, How to rethink leadership to energize disengaged employees, …
…
continue reading

1
Cybersecurity Today: State-Backed ChatGPT Misuse, Dark Gaboon Attacks, and Starlink Installation Controversy
12:50
12:50
Play later
Play later
Lists
Like
Liked
12:50This episode of 'Cybersecurity Today' hosted by Jim Love covers various significant events in the cybersecurity landscape. OpenAI has banned multiple ChatGPT accounts linked to state-sponsored hackers from countries including China, Russia, North Korea, Iran, and the Philippines for developing malware, generating disinformation, and conducting scam…
…
continue reading

1
Vixen Panda, NPM, Roundcube, IoT, 4Chan, Josh Marpet, and more... - SWN #484
32:23
32:23
Play later
Play later
Lists
Like
Liked
32:23Vixen Panda, NPM, Roundcube, IoT, 4Chan, Josh Marpet, and more on the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-484
…
continue reading

1
Bringing CISA's Secure by Design Principles to OT Systems - Matthew Rogers - ASW #334
1:09:09
1:09:09
Play later
Play later
Lists
Like
Liked
1:09:09CISA has been championing Secure by Design principles. Many of the principles are universal, like adopting MFA and having opinionated defaults that reduce the need for hardening guides. Matthew Rogers talks about how the approach to Secure by Design has to be tailored for Operational Technology (OT) systems. These systems have strict requirements o…
…
continue reading

1
Overcoming Travel Planning Overwhelm - Travel Tip Tuesday
8:12
8:12
Play later
Play later
Lists
Like
Liked
8:12Are you feeling overwhelmed about the thought of planning a trip? Whether you're a newbie or a seasoned trip planner, planning a trip requires a lot of work. Meggan shares some tips to decrease overwhelm so you can head out on your trip without the stress! Support the Travel Mug Podcast by buying us a coffee! You’ll make our day & you’ll get access…
…
continue reading

1
The enterprise security news, more secure by removing credentials, & RSAC interviews - Marty Momdjian, Amit Saha, Dr. Tina Srivastava - ESW #410
1:38:02
1:38:02
Play later
Play later
Lists
Like
Liked
1:38:02Segment 1 - Enterprise Security News, Live at IDV This week, in the enterprise security news, Acquisitions potential IPOs Terminator Salvation in real life First $1B one-employee business? Mikko puts in his notice Pitch Black in real life, and more! Segment 2 - Interview with Dr. Tina Srivastava The #1 cause of data breaches is stolen credentials. …
…
continue reading

1
Cybersecurity Today: Massive Smart TV Botnets and Major US Cyber Policy Overhaul
12:21
12:21
Play later
Play later
Lists
Like
Liked
12:21In this episode of Cybersecurity Today, host David Shipley delves into alarming developments in the cybersecurity landscape. The FBI has flagged a massive malware campaign named Bad Box 2.0, which has compromised 1 million consumer devices globally, turning them into residential proxies. Additionally, a new variant of the Mirai malware is targeting…
…
continue reading

1
Cybersecurity Month in Review: Uncovering Digital and Physical Threats
48:37
48:37
Play later
Play later
Lists
Like
Liked
48:37In this episode of the 'Cybersecurity Today: The Month in Review' show, host Jim welcomes regular guests Laura Payne and David Shipley, along with newcomer Anton Levaja. The trio dives deep into various cybersecurity stories, analyzing trends, threats, and recent incidents. Topics include the intriguing Mystery Leaker exposing cyber criminals, the …
…
continue reading

1
Elsa, Redline, ChaosRat, iMessage, Bladed Feline , Aaran Leyland, and More... - SWN #483
34:00
34:00
Play later
Play later
Lists
Like
Liked
34:00Elsa, Redline, ChaosRat, iMessage, Bladed Feline , Aaran Leyland, and More on this episode of the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-483
…
continue reading

1
Cyber Extortion, Ukraine's Cyber Offensive, and Chrome Trust Shake-up
12:19
12:19
Play later
Play later
Lists
Like
Liked
12:19Cybersecurity Today, hosted by Jim Love, delves into the latest in cyber threats. Cyber criminals have breached 20 organizations via convincing fake IT support calls, targeting Salesforce data for extortion. Ukraine's intelligence claims a significant cyber operation against Russia's aircraft manufacturer, stealing sensitive data and highlighting U…
…
continue reading

1
Updating & Protecting Linux Systems - PSW #877
1:05:23
1:05:23
Play later
Play later
Lists
Like
Liked
1:05:23Two parts to this episode: Tech Segment: Updating Linux Systems - Beyond apt-get upgrade * Custom scripts for ensuring your Linux systems are up-to-date * topgrade - tutorial for using topgrade to update Linux systems on various Linux distributions Discussion Topic: Anti-Malware and/or EDR on Linux Platforms * PCI calls for scanning Linux systems *…
…
continue reading

1
Regain Control of Business Risks, Your Leadership Habits, and Being Present - Alla Valente - BSW #398
1:18:17
1:18:17
Play later
Play later
Lists
Like
Liked
1:18:17During times of volatility, business leaders often don’t know what they are able to change or even what they should change. At precisely these times, business leaders become risk leaders and need to quickly learn how to identify what is within their control and what isn’t — to not only survive but thrive. Alla Valente, Principal Analyst at Forreste…
…
continue reading

1
Emergency Patches, Ransomware Exposes, and Rising QR Code Scams
10:51
10:51
Play later
Play later
Lists
Like
Liked
10:51In this episode of Cybersecurity Today, host Jim Love discusses the latest urgent security updates and cyber threats. Google has released an emergency Chrome patch to fix a high-severity zero-day vulnerability, while Microsoft issued an emergency patch to resolve Windows 11 boot failures caused by their May 2025 update. A mysterious whistleblower k…
…
continue reading
Jenn has returned from her adventures in the Yukon! She shares what she did, ate, and saw in Whitehorse, Kluane National Park, Haines Junction, Carcross, and more! Support the Travel Mug Podcast by buying us a coffee! You’ll make our day & you’ll get access to fun stuff like bloopers and extra content. We have Merch! Shop the Travel Mug Podcast Sto…
…
continue reading

1
Bovril, Deranged, Crocodilus, Cartier, Jinx, Conti, Scattered Spider, Josh Marpet... - SWN #482
37:10
37:10
Play later
Play later
Lists
Like
Liked
37:10Bovril, Deranged Hookworm, Crocodilus, Cartier, Jinx, Conti, Scattered Spider, Josh Marpet, and more on the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-482
…
continue reading

1
AIs, MCPs, and the Acutal Work that LLMs Are Generating - ASW #333
39:06
39:06
Play later
Play later
Lists
Like
Liked
39:06The recent popularity of MCPs is surpassed only by the recent examples deficiencies of their secure design. The most obvious challenge is how MCPs, and many more general LLM use cases, have erased two decades of security principles behind separating code and data. We take a look at how developers are using LLMs to generate code and continue our sea…
…
continue reading

1
Interactive Society of Nova Scotia: Building a Stronger, Connected Community for Game Developers
56:08
56:08
Play later
Play later
Lists
Like
Liked
56:08In this exciting episode of All Hands on Tech, host Claire Quirion sits down with Ryan Sno-Wood from the Interactive Society of Nova Scotia (ISNS) to talk about the fast-growing world of game development in the province. From small indie teams to major collaborations with government and schools, the local gaming industry is expanding fast, and Ryan…
…
continue reading

1
Building Cyber Resilience: AI Threats, Mid-Market Risks & Ransomware Trends - Karl Van den Bergh, Tony Anscombe, Eyal Benishti, Nick Carroll, Chad Alessi, Chris Peluso - ESW #409
1:38:33
1:38:33
Play later
Play later
Lists
Like
Liked
1:38:33Segment 1 CTG Interview Middle market companies face unique challenges in the ever-evolving cyber environment. Developing a comprehensive cybersecurity approach is a business imperative for middle market companies, and Chad Alessi will discuss the threat landscape, what’s keeping IT decision-makers awkward at night, and the best approach to creatin…
…
continue reading

1
Cybersecurity Incidents: Eddie Steeler Malware, ConnectWise Breach, and Nova Scotia Power Data Theft
8:27
8:27
Play later
Play later
Lists
Like
Liked
8:27In this episode of Cybersecurity Today, host David Shipley discusses several key cyber incidents affecting organizations and individuals. A new rust-based information stealer, known as Eddie Steeler, is being distributed via deceptive CAPTCHA verification pages. ConnectWise, a management software firm, has been breached in an attack suspected to be…
…
continue reading

1
Unveiling the Entanglements: Western Christianity and African Racialization
44:35
44:35
Play later
Play later
Lists
Like
Liked
44:35Welcome to the Dis A fi mi History Podcast, hosted by Wendy Aris. In this enlightening episode, Wendy converses with Dr. Josias Tembo, a PhD researcher at Radboud University, to explore the intricate connections between Western Christianity and racialization in Africa. Dr. Tembo shares his insightful research on how Christianity has historically pl…
…
continue reading

1
Pig Butchering: Operation Shamrock Fights Back
39:05
39:05
Play later
Play later
Lists
Like
Liked
39:05In this episode, the host delves into the alarming rise of 'pig butchering' scams, a form of fraud that preys on vulnerable and trusting individuals, often leaving them financially and emotionally devastated. These scams are orchestrated by organized crime syndicates that use brutal methods, including violence and human trafficking, to sustain thei…
…
continue reading

1
Edge, Safari, CISO Pay and Loathing, Fake AI, ASUS, OneDrive, Manus, Aaran Leyland... - SWN #481
33:15
33:15
Play later
Play later
Lists
Like
Liked
33:15Edge, Safari, CISO Pay and Loathing, Fake AI, ASUS, OneDrive, Manus, Aaran Leyland, and More on this episode of the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-481
…
continue reading

1
Cybersecurity Today: Hijacker Scams, Ransomware Attacks, and Summer Travel Threats
13:33
13:33
Play later
Play later
Lists
Like
Liked
13:33In this episode of Cybersecurity Today, host Jim Love covers critical updates in the world of cyber threats. The FBI warns of hijackers posing as IT support to infiltrate law firms, a Wisconsin city reveals a ransomware attack affecting 67,000 residents, and a Texas city refuses to pay a ransom, risking the public release of sensitive data. The epi…
…
continue reading
In the security news: Vicious Trap - The malware hiding in your router Hacking your car WSL is open-source, but why? Using AI to find vulnerabilities - a case study Why you should not build your own password manager The inside scoop behind Lumma Infostealer Hacking a smart grill Hardcoded credentials on end of life routers and "Alphanetworks" SIM s…
…
continue reading

1
Quantum Readiness & Zero Trust: Strategies to Strengthen Digital Resilience - Jordan Avnaim, Chris Hickman, Amit Sinha, Albert Estevez Polo - BSW #397
1:07:59
1:07:59
Play later
Play later
Lists
Like
Liked
1:07:59This segment explores how automated microsegmentation addresses critical Zero Trust gaps overlooked by traditional access controls and legacy segmentation solutions. We'll examine the limitations of perimeter-based defenses in today's dynamic threat landscape and reveal how automated microsegmentation enhances network security beyond conventional f…
…
continue reading