show episodes
 
Cambridge scientists at work is from The Science Show on Cambridge 105 where maths, physics, chemistry and biology are put to use in ways they never told us about at school. We talk to scientists about their role, their discoveries and their motivation.
  continue reading
 
Artwork

1
The PM Podcast

DonorSearch

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
Untold stories. Real impact. The PM Podcast features raw, personal conversations with changemakers reshaping our world—from nonprofit leaders to grassroots heroes. Hear stories of tragedy and triumph, grief and grace, love and laughter. Whether you lead a mission-driven organization or just care deeply about your community, you’ll find inspiration in every episode. Hosted by Jay Frost. Produced by Jack Frost. Powered by DonorSearch.
  continue reading
 
Artwork
 
The Slow Flowers Podcast is the award-winning, long-running show known as the “Voice of the Slow Flowers Movement.” Airing weekly for more than 9 years, we focus on the business of flower farming and floral design through the Slow Flowers sustainability ethos. Listen to a new episode each Wednesday, available for free download here at slowflowerspodcast.com or on iTunes, Spotify, and other podcast platforms.
  continue reading
 
Artwork

1
Born Yesterday

Andy Barr and Alexander Bennett

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
A podcast experiment conducted by comedians Andy Barr (@SomeNiceFun) and Alexander Bennett (@AlexyBennett). Barr and Bennett have been cloning themselves and the clones are idiots - they know nothing, they were literally born yesterday. How do you explain everything to someone who doesn't know anything? Every episode, guest comedians attempt to find out. Hosted on Acast. See acast.com/privacy for more information.
  continue reading
 
Artwork

1
Warrior Life

Warrior Life by Pam Palmater

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Join award-winning host Pam Palmater, Mi’kmaw lawyer, author & activist, as she shares the stories of Indigenous warriors and activists on the front lines of protecting Indigenous lands, peoples, and cultures.
  continue reading
 
Artwork
 
A husband and wife re-examine the media of their childhoods through the lens of feminism and equality, while eating a sugarfree dessert. At least you get a recipe out of it! Support this podcast: https://podcasters.spotify.com/pod/show/recipefordisaster/support
  continue reading
 
Artwork
 
Welcome to the Security Weekly Podcast Network, your all-in-one source for the latest in cybersecurity! This feed features a diverse lineup of shows, including Application Security Weekly, Business Security Weekly, Paul's Security Weekly, Enterprise Security Weekly, and Security Weekly News. Whether you're a cybersecurity professional, business leader, or tech enthusiast, we cover all angles of the cybersecurity landscape. Tune in for in-depth panel discussions, expert guest interviews, and ...
  continue reading
 
Artwork
 
The global watch industry produces an estimated 1.2 billion units a year. With around, 7.5 billion people on the planet, that means that over a 6 and a half year period, enough are made for every one of us to go out and buy a brand new watch of our own. In reality, that’s not what happens. For starters, just because all these watches are being churned out, doesn't mean that anyone is actually buying them. Lots of people can’t understand why you would spend money on a wrist watch. After all, ...
  continue reading
 
Loading …
show series
 
https://youtu.be/9-oJEifK-u0?si=gW8_eyURbbSIEufOGrowing specialty cut flowers for retail floral shops is a very specific niche and today’s guest, Jamie Rogers of Killing Frost Farm in Helena, Montana, has a lot to share on this topic! Jamie co-founded the business with Carly Jenkins in 2014, the “killing frost” name a tongue-in-cheek reference to e…
  continue reading
 
Dwayne Ashley is the Founder and CEO of Bridge Philanthropic Consulting, the nation’s only full-service Black-owned fundraising firm. A passionate champion for social justice, he has raised over $2 billion to support communities of color. With more than 30 years of experience, he’s a respected leader, author, and advocate for equity in philanthropy…
  continue reading
 
This conversation explores the intersection of cybersecurity and emerging technologies, focusing on innovative hacking techniques, the evolution of vulnerability management, and the critical importance of asset discovery. The discussion also delves into the implications of cyber warfare, the persistent threat of default passwords, and the integrati…
  continue reading
 
https://youtu.be/EiLxxVb7v9k?si=N590_MIvVkx3YabgOndrea Kidd has been recognized by MSN as one of the “Top 10 Florists to Watch in 2025”, bolstering the farm’s status as a leader in eco-friendly, heirloom floral design. The report highlighted innovators shaping the future of luxury floral design and it came as a complete surprise to this farmer-flor…
  continue reading
 
In this episode, Mandy Logan, Summer Craze Fowler, Jason Albuquerque, and Jeff Pollard of Forrester discuss the challenges and strategies for CISOs in navigating volatility in the security landscape. They emphasize the importance of building relationships within the organization, particularly with the CFO, to manage budgets effectively. The convers…
  continue reading
 
In this episode of Security Weekly News, Doug White discusses various cybersecurity threats, including the Salt Typhoon and Spark Kitty malware, the implications of Microsoft's decision to drop support for old hardware drivers, and the potential increase in cyber threats from Iran. The conversation also covers the alarming 16 billion password leak …
  continue reading
 
Fuzzing has been one of the most successful ways to improve software quality. And it demonstrates how improving software quality improves security. Artur Cygan shares his experience in building and applying fuzzers to barcode scanners, smart contracts, and just about any code you can imagine. We go through the useful relationship between unit tests…
  continue reading
 
In fast-paced, shared device environments like healthcare, manufacturing, and other critical industries, traditional access management approaches are falling short, quietly eroding both security and productivity. This episode explores how outdated methods, like shared credentials and clunky logins, create friction, increase risk, and undermine comp…
  continue reading
 
Her Excellency the Right Honourable Mary Simon Governor General of Canada and Commander-in-ChiefHappy National Indigenous Peoples Day 2025!In today's special episode, I got to speak with the first Indigenous person to ever hold the position of Governor General of Canada - Her Excellency the Right Honourable Mary Simon.You can check out her website …
  continue reading
 
Roger Ali is Chair of the AFP Global Board and one of the most respected voices in nonprofit leadership. With more than two decades in the field, he has led teams that have raised over $150 million through transformative capital campaigns and major gift strategies, holding senior roles at Niagara Health Foundation, Hamilton Health Sciences Foundati…
  continue reading
 
This week: * The true details around Salt Typhoon are still unknown * The search for a portable pen testing device * Directories named "hacker2" are suspicious * Can a $24 cable compete with a $180 cable? * Hacking Tesla wall chargers * Old Zyxel exploits are new again * Hacking Asus drivers * Stealing KIAs - but not like you may think * Fake artic…
  continue reading
 
In this part of the experiment, the clones are joined by Neil Frost (https://www.instagram.com/comedyneilfrost/) and Sarah Bennetto (https://www.instagram.com/sarahbennetto/?hl=en-gb) Follow the experiment (https://twitter.com/BYesterdayPod) Follow Andy Barr (https://linktr.ee/andybarrcomedy) and Alexander Bennett (https://linktr.ee/alexanderbennet…
  continue reading
 
https://youtu.be/E1exuo5iMOUA few weeks ago, I journeyed to Bellingham, a beautiful college town located close to the Washington-British Columbia border, where Annika McIntosh of Hazel Designs grows botanicals, designs gardens, and arranges flowers for everyday customers, weddings, and events. During what was a lovely morning in the garden and stud…
  continue reading
 
In this episode of Business Security Weekly, Mandy Logan, along with guests Peter Hedberg, Summer Craze Fowler, and Ben Carr, delve into the complexities of cyber insurance and the empowerment of Chief Information Security Officers (CISOs). The discussion covers the evolving landscape of cyber insurance, the critical role of underwriting, and the i…
  continue reading
 
What makes a threat modeling process effective? Do you need a long list of threat actors? Do you need a long list of terms? What about a short list like STRIDE? Has an effective process ever come out of a list? Farshad Abasi joins our discussion as we explain why the answer to most of those questions is No and describe the kinds of approaches that …
  continue reading
 
Segment 1 - Interview with Rob Allen from ThreatLocker This segment is sponsored by ThreatLocker. Visit https://www.securityweekly.com/threatlocker to learn more about them! Segment 2 - Topic: Growing Trend - Edge Computing and Hybrid Cloud Segment 3 - Interviews from RSAC 2025 Cyera Cyera is the fastest-growing data security company in history, em…
  continue reading
 
Abby Trahan is the Associate Director of Philanthropy at MD Anderson Cancer Center and one of two recipients of the 2025 Outstanding Young Professional award from the Association of Fundraising Professionals. In just five years, Abby has delivered transformational fundraising results—from growing monthly giving at the Houston Food Bank to securing …
  continue reading
 
This week: You got a Bad box, again Cameras are expose to the Internet EU and connected devices Hydrophobia NVRAM variables Have you heard about IGEL Linux? SSH and more NVRAM AI skeptics are nuts, and AI doesn't make you more efficient Trump Cybersecurity orders I think I can root my Pixel 6 Decentralized Wordpres plugin manager Threat actor namin…
  continue reading
 
This week, it’s time for security money. The index is up, but the previous quarterly results were brutal. In the leadership and communications segment, Get out of the audit committee: Why CISOs need dedicated board time, Quietly Burning Out? What To Do When Your Leadership Starts Lacking, How to rethink leadership to energize disengaged employees, …
  continue reading
 
CISA has been championing Secure by Design principles. Many of the principles are universal, like adopting MFA and having opinionated defaults that reduce the need for hardening guides. Matthew Rogers talks about how the approach to Secure by Design has to be tailored for Operational Technology (OT) systems. These systems have strict requirements o…
  continue reading
 
Segment 1 - Enterprise Security News, Live at IDV This week, in the enterprise security news, Acquisitions potential IPOs Terminator Salvation in real life First $1B one-employee business? Mikko puts in his notice Pitch Black in real life, and more! Segment 2 - Interview with Dr. Tina Srivastava The #1 cause of data breaches is stolen credentials. …
  continue reading
 
Two parts to this episode: Tech Segment: Updating Linux Systems - Beyond apt-get upgrade * Custom scripts for ensuring your Linux systems are up-to-date * topgrade - tutorial for using topgrade to update Linux systems on various Linux distributions Discussion Topic: Anti-Malware and/or EDR on Linux Platforms * PCI calls for scanning Linux systems *…
  continue reading
 
In this part of the experiment, the clones are joined by Joe Sutherland (https://www.instagram.com/jomodity/) and Holly Spillar (https://www.instagram.com/hollyspillar/) Follow the experiment (https://twitter.com/BYesterdayPod) Follow Andy Barr (https://linktr.ee/andybarrcomedy) and Alexander Bennett (https://linktr.ee/alexanderbennettcomedian) Ple…
  continue reading
 
https://youtu.be/BxZ3HiTn0UM?si=BtYeIDuXg2qjrW0nVisit an urban cutting garden with me today – and meet long-time Slow Flowers member Eleanor Blackford, a wedding florist whose studio produces designs using only what she grows on her 6,000-square-foot city lot in Seattle’s Beacon Hill neighborhood. You’ll learn more about what Eleanor grows, inspire…
  continue reading
 
During times of volatility, business leaders often don’t know what they are able to change or even what they should change. At precisely these times, business leaders become risk leaders and need to quickly learn how to identify what is within their control and what isn’t — to not only survive but thrive. Alla Valente, Principal Analyst at Forreste…
  continue reading
 
The recent popularity of MCPs is surpassed only by the recent examples deficiencies of their secure design. The most obvious challenge is how MCPs, and many more general LLM use cases, have erased two decades of security principles behind separating code and data. We take a look at how developers are using LLMs to generate code and continue our sea…
  continue reading
 
Segment 1 CTG Interview Middle market companies face unique challenges in the ever-evolving cyber environment. Developing a comprehensive cybersecurity approach is a business imperative for middle market companies, and Chad Alessi will discuss the threat landscape, what’s keeping IT decision-makers awkward at night, and the best approach to creatin…
  continue reading
 
Martha Schumacher is a global philanthropy strategist, leadership coach, and past chair of AFP International. As President of Hazen Consulting and founder of the Hazen Institute for Leadership Training, she’s spent over 25 years helping mission-driven organizations grow their impact—and their people. In this conversation, we explore the trails she …
  continue reading
 
In the security news: Vicious Trap - The malware hiding in your router Hacking your car WSL is open-source, but why? Using AI to find vulnerabilities - a case study Why you should not build your own password manager The inside scoop behind Lumma Infostealer Hacking a smart grill Hardcoded credentials on end of life routers and "Alphanetworks" SIM s…
  continue reading
 
https://youtu.be/BdnRayT0M2A?si=PQVfp6yMUSJD7n42The Flower Farmers has been in the works for two years, as my co-author and the book’s creative director Robin Avni and I have poured our storytelling passion into the narratives and imagery that portray 29 North American growers. The book was released on May 6th by Abrams, and we’ve been in major cel…
  continue reading
 
This segment explores how automated microsegmentation addresses critical Zero Trust gaps overlooked by traditional access controls and legacy segmentation solutions. We'll examine the limitations of perimeter-based defenses in today's dynamic threat landscape and reveal how automated microsegmentation enhances network security beyond conventional f…
  continue reading
 
ArmorCode unveils Anya—the first agentic AI virtual security champion designed specifically for AppSec and product security teams. Anya brings together conversation and context to help AppSec, developers and security teams cut through the noise, prioritize risks, and make faster, smarter decisions across code, cloud, and infrastructure. Built into …
  continue reading
 
Segment 1: Erik Bloch Interview The math on SOC AI just isn't adding up. It's not easy to do the math, either, as each SOC automation vendor is tackling alert fatigue and SecOps assistants a bit differently. Fortunately for us and our audience, Erik Bloch met with many of these vendors at RSAC and is going to share what he learned with us! Segment …
  continue reading
 
Professor Jen Shang is Co-Founder and Director of the Institute for Sustainable Philanthropy, and the world’s only philanthropic psychologist. She was the first person to earn a PhD in Philanthropy, and her research on donor identity and meaning has been featured in the New York Times, BBC, and Chronicle of Philanthropy. In 2025, she received AFP’s…
  continue reading
 
This week in the security news: Malware-laced printer drivers Unicode steganography Rhode Island may sue Deloitte for breach. They may even win. Japan's active cyber defense law Stop with the ping LLMs replace Stack Overflow - ya don't say? Aggravated identity theft is aggravating Ivanti DSM and why you shouldn't use it EDR is still playing cat and…
  continue reading
 
Loading …

Quick Reference Guide

Copyright 2025 | Privacy Policy | Terms of Service | | Copyright
Listen to this show while you explore
Play