Comedy Dynamics Daily is your daily dose of comedy right at your fingertips! You can enjoy bits from your favorite comedians such as Jim Gaffigan, Ali Wong, Tom Segura, Tiffany Haddish, Jimmy O. Yang, Iliza Shlesinger, Larry The Cable Guy, Anjelah Johnson, Lavell Crawford, Eddie Griffin, Gina Brillon, Tom Papa, Maria Bamford, Preacher Lawson, Louie Anderson, Whitney Cummings, Jeff Dunham, Ron Funches, Kathleen Madigan, Craig Ferguson, D.L. Hughley and more! Visit ComedyDynamics.com to check ...
…
continue reading
Here’s a dude who’s spent his entire life talking to little guys on his knee, but now he’s chatting with some amazing folks he can’t actually stuff in a box. Guests are from all walks of life, and they’ve become masters at their chosen profession, each with their own 10,000 hours of experience and a lifetime of dedication to whatever they do. The person may or may not be famous, but you’ll find out what drives them, but also what they did when they almost didn’t “make it.” Hear about the tim ...
…
continue reading
Join your Co-Pilots, Kelsea & her pals, every Weed Wednesday for a new episode at 4:20 PM EST. They'll try a cannabis product, then snack & snark over the pilot episode of your favorite TV show!
…
continue reading
Where security veterans unpack the latest IT security news, vulnerabilities, and research through a historical and technical lens that can cut through even the thickest cigar smoke. Hosted by Paul Asadoorian and Larry Pesce. Co-hosts: Josh Marpet, Jeff Man, Mandy Logan, Tyler Robinson.
…
continue reading
Where security veterans unpack the latest IT security news, vulnerabilities, and research through a historical and technical lens that can cut through even the thickest cigar smoke. Hosted by Paul Asadoorian and Larry Pesce. Co-hosts: Josh Marpet, Jeff Man, Mandy Logan, Tyler Robinson.
…
continue reading
Politics, History, and Music from a Drunko-Communist Paradigm. Recorded live from the Dirty "D".
…
continue reading
Ctrl Alt Delete subverts the traditional career show. Instead, it's for people who are more interested in shaping their work rather than letting their work shape them. The main focus is work, wellbeing and creativity. Hosted by bestselling author Emma Gannon, she has a gentle line of questioning that starts with work, and ends up wherever the conversations lead. Named Best Business podcast by Vuelio, Webby award nominee and named 50 Best Podcasts by Sunday Times, Ctrl Alt Delete is a gateway ...
…
continue reading
Welcome to the Security Weekly Podcast Network, your all-in-one source for the latest in cybersecurity! This feed features a diverse lineup of shows, including Application Security Weekly, Business Security Weekly, Paul's Security Weekly, Enterprise Security Weekly, and Security Weekly News. Whether you're a cybersecurity professional, business leader, or tech enthusiast, we cover all angles of the cybersecurity landscape. Tune in for in-depth panel discussions, expert guest interviews, and ...
…
continue reading
Welcome to the Security Weekly Podcast Network, your all-in-one source for the latest in cybersecurity! This feed features a diverse lineup of shows, including Application Security Weekly, Business Security Weekly, Paul's Security Weekly, Enterprise Security Weekly, and Security Weekly News. Whether you're a cybersecurity professional, business leader, or tech enthusiast, we cover all angles of the cybersecurity landscape. Tune in for in-depth panel discussions, expert guest interviews, and ...
…
continue reading
First, on the Adam Ruins Everything TV show, Adam Conover broke down widespread misconceptions about everything we take for granted. Now, join Adam as he sits down with the experts and stars from the show to go into even more detail.
…
continue reading
1
Jeff Dunham Is Scared Of Mirrors And Red-Neck Vampires
7:10
7:10
Main Kemudian
Main Kemudian
Senarai
Suka
Disukai
7:10
Jeff Dunham: Minding The Monsters Jeff Dunham’s Minding the Monsters brings together your favorites– Walter, Peanut, Bubba J, Jose Jalapeno… On a Steek!, and Achmed the Dead Terrorist as you’ve never seen them before! Enter the ultimate haunted house where Walter transforms into something grumpier than he already is! Watch Bubba J rise from the dea…
…
continue reading
She’s unapologetically pro-joke. Weaving through a landscape of octogenarian celebrity dads to explicit sexual humor, Comedian Myka Fox chooses to be hilarious with no excuses. YouTube: https://bit.ly/3ymp1to Facebook: http://www.facebook.com/ComedyDynamics Twitter: http://www.twitter.com/ComedyDynamics TikTok: https://www.tiktok.com/@comedydynamic…
…
continue reading
1
EDR Is Dead, EDR Is Not Dead - PSW #849
1:50:52
1:50:52
Main Kemudian
Main Kemudian
Senarai
Suka
Disukai
1:50:52
Google's cookie encryption drama, Microsoft accusing Google of shady antitrust tactics, AI shenanigans, the rejected Defcon talk and hacking traffic lights, vulnerabilities in Realtek SD card readers, the never-ending debate on quantum computing vs. cryptography, backdoors are not secrets and where we are pushing attackers, firmware leakage, more o…
…
continue reading
1
EDR Is Dead, EDR Is Not Dead - PSW #849
1:50:52
1:50:52
Main Kemudian
Main Kemudian
Senarai
Suka
Disukai
1:50:52
Google's cookie encryption drama, Microsoft accusing Google of shady antitrust tactics, AI shenanigans, the rejected Defcon talk and hacking traffic lights, vulnerabilities in Realtek SD card readers, the never-ending debate on quantum computing vs. cryptography, backdoors are not secrets and where we are pushing attackers, firmware leakage, more o…
…
continue reading
1
Shadow IT and Security Debt - Dave Lewis - PSW #849
2:50:27
2:50:27
Main Kemudian
Main Kemudian
Senarai
Suka
Disukai
2:50:27
We had the pleasure of finally having Dave Lewis on the show to discuss shadow IT and security debt. Dave shared some fascinating insights from his long career in cybersecurity, emphasizing the importance of addressing fundamental security issues and the human aspect of security. We delved into the challenges of managing shadow IT, the complexities…
…
continue reading
1
Shadow IT and Security Debt - Dave Lewis - PSW #849
2:50:27
2:50:27
Main Kemudian
Main Kemudian
Senarai
Suka
Disukai
2:50:27
We had the pleasure of finally having Dave Lewis on the show to discuss shadow IT and security debt. Dave shared some fascinating insights from his long career in cybersecurity, emphasizing the importance of addressing fundamental security issues and the human aspect of security. We delved into the challenges of managing shadow IT, the complexities…
…
continue reading
1
Max Dolcelli Talks Halloween On A Farm
3:49
3:49
Main Kemudian
Main Kemudian
Senarai
Suka
Disukai
3:49
Max Dolcelli: Funny is All Around Us Max Dolcelli has appeared just about everywhere and done just about everything a comedian can do, performing in comedy clubs and comedy festivals in the U.S. COMEDY DYNAMICS YouTube Facebook X (Twitter) TikTok Instagram Learn more about your ad choices. Visit podcastchoices.com/adchoices…
…
continue reading
1
Halloween, TikTok, Telcos, Win 11, Five Eyes, AWS, France, ChatGPT, and more... - SWN #426
36:50
36:50
Main Kemudian
Main Kemudian
Senarai
Suka
Disukai
36:50
Halloween, TikTok Rip Off, Telcos, Win 11, Five Eyes, AWS, France, ChatGPT, and more on the Security Weekly News. Show Notes: https://securityweekly.com/swn-426
…
continue reading
1
Halloween, TikTok, Telcos, Win 11, Five Eyes, AWS, France, ChatGPT, and more... - SWN #426
36:50
36:50
Main Kemudian
Main Kemudian
Senarai
Suka
Disukai
36:50
Halloween, TikTok Rip Off, Telcos, Win 11, Five Eyes, AWS, France, ChatGPT, and more on the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-426
…
continue reading
1
Shadow IT and Security Debt - Dave Lewis - PSW #849
59:44
59:44
Main Kemudian
Main Kemudian
Senarai
Suka
Disukai
59:44
We had the pleasure of finally having Dave Lewis on the show to discuss shadow IT and security debt. Dave shared some fascinating insights from his long career in cybersecurity, emphasizing the importance of addressing fundamental security issues and the human aspect of security. We delved into the challenges of managing shadow IT, the complexities…
…
continue reading
1
Shadow IT and Security Debt - Dave Lewis - PSW #849
59:44
59:44
Main Kemudian
Main Kemudian
Senarai
Suka
Disukai
59:44
We had the pleasure of finally having Dave Lewis on the show to discuss shadow IT and security debt. Dave shared some fascinating insights from his long career in cybersecurity, emphasizing the importance of addressing fundamental security issues and the human aspect of security. We delved into the challenges of managing shadow IT, the complexities…
…
continue reading
Mike Toomey: Welcome to My World With his Sharp Delivery, quick wit, and unique style, Mike Toomey has been a favorite at comedy clubs and special events since 1982. COMEDY DYNAMICS YouTube Facebook X (Twitter) TikTok Instagram Learn more about your ad choices. Visit podcastchoices.com/adchoicesOleh NacelleCast Studios
…
continue reading
1
Protecting Identity of AI Agents & Standardizing Identity Security for SaaS Apps - Shiven Ramji, Arnab Bose - ASW #305
30:42
30:42
Main Kemudian
Main Kemudian
Senarai
Suka
Disukai
30:42
Generative AI has been the talk of the technology industry for the past 18+ months. Companies are seeing its value, so generative AI budgets are growing. With more and more AI agents expected in the coming years, it’s essential that we are securing how consumers interact with generative AI agents and how developers build AI agents into their apps. …
…
continue reading
1
The CISO Mindset, Top Strategies, and Mandating Office Presence Without Purpose - David Bradbury, Erin Baudo Felter - BSW #370
1:03:37
1:03:37
Main Kemudian
Main Kemudian
Senarai
Suka
Disukai
1:03:37
In the leadership and communications segment, The CISO Mindset: A Strategic Guide for Aspiring CEOs and The Board Members, The Top Strategy to Earn More Respect at Work: A Leadership Expert’s Proven Method, The Problem with Mandating Office Presence Without Purpose, and more! Identity continues to be one of the most used attack vectors by cybercrim…
…
continue reading
1
Making TLS More Secure, Lessons from IPv6, LLMs Finding Vulns - ASW #305
53:04
53:04
Main Kemudian
Main Kemudian
Senarai
Suka
Disukai
53:04
Better TLS implementations with Rust, fuzzing, and managing certs, appsec lessons from the everlasting transition to IPv6, LLMs for finding vulns (and whether fuzzing is better), and more! Also check out this presentation from BSides Knoxville that we talked about briefly, https://youtu.be/DLn7Noex_fc?feature=shared Show Notes: https://securityweek…
…
continue reading
1
Making TLS More Secure, Lessons from IPv6, LLMs Finding Vulns - Arnab Bose, Shiven Ramji - ASW #305
1:22:48
1:22:48
Main Kemudian
Main Kemudian
Senarai
Suka
Disukai
1:22:48
Better TLS implementations with Rust, fuzzing, and managing certs, appsec lessons from the everlasting transition to IPv6, LLMs for finding vulns (and whether fuzzing is better), and more! Also check out this presentation from BSides Knoxville that we talked about briefly, https://youtu.be/DLn7Noex_fc?feature=shared Generative AI has been the talk …
…
continue reading
1
Stay Ahead of Identity Threats & Addressing Cybersecurity Disparities - David Bradbury, Erin Baudo Felter - BSW #370
33:10
33:10
Main Kemudian
Main Kemudian
Senarai
Suka
Disukai
33:10
Identity continues to be one of the most used attack vectors by cybercriminals. From phishing to credential stuffing to password spraying – threat actors are finding new ways to infiltrate systems and cause costly problems to companies. David Bradbury, Chief Security Officer at Okta, joins Security Weekly's Mandy Logan to discuss today's threat lan…
…
continue reading
1
The CISO Mindset, Top Strategies, and Mandating Office Presence Without Purpose - BSW #370
30:36
30:36
Main Kemudian
Main Kemudian
Senarai
Suka
Disukai
30:36
In the leadership and communications segment, The CISO Mindset: A Strategic Guide for Aspiring CEOs and The Board Members, The Top Strategy to Earn More Respect at Work: A Leadership Expert’s Proven Method, The Problem with Mandating Office Presence Without Purpose, and more! Show Notes: https://securityweekly.com/bsw-370…
…
continue reading
1
Chris Porter Says Don't Talk Politics
4:51
4:51
Main Kemudian
Main Kemudian
Senarai
Suka
Disukai
4:51
Chris Porter: A Man From Kansas Chris Porter discusses everything from hipsters ruining food, to being a man, to playing beer pong with celebrities, in his 3rd one hour special. No politics. No religion. No racism. Just a man from Kansas…Live in Colorado. COMEDY DYNAMICS YouTube Facebook X (Twitter) TikTok Instagram Learn more about your ad choices…
…
continue reading
Michael Yo: Blasian Family first comedian and bonafide Blasian, Michael Yo, brings his uniquely personal blend of comedy to his debut stand up special. Born and raised in Houston, TX, Michael talks about the issues growing up half Black and Asian in a place where he really stood out. Fast forward to now, navigating marriage and of course his ultima…
…
continue reading
1
Era of Bot Battlers & Security Focused Company Culture - ESW #381
32:13
32:13
Main Kemudian
Main Kemudian
Senarai
Suka
Disukai
32:13
Customer Identity is everywhere. It's powering secure experiences for billions - enabling people to check their luggage at the airport, watch their favorite Major League Soccer games, or take their favorite Peloton class. Because it’s everywhere, threat actors now see customer identity as a path to financial gain. Bots now make up nearly 50% of all…
…
continue reading
The Best of It’s Showtime at the Apollo Volumes 1-8 It’s Showtime at the Apollo was a music and comedy television show first broadcast in 1987 and ending in 2008, with over 1000 episodes. The show featured live performances from both professional musicians and comedians. Made popular at the famous Apollo Theater in the Harlem neighborhood of New Yo…
…
continue reading
1
Cyber Security Awareness for Election and Poll Workers - Kirsten Davies - ESW #381
48:02
48:02
Main Kemudian
Main Kemudian
Senarai
Suka
Disukai
48:02
The vast majority of the folks working polls and elections are volunteers. This creates a significant training challenge. Not only do they have to learn how to perform a complex and potentially stressful job in a short amount of time (most training is one day or less), cybersecurity-related concerns are usually not included for individual poll loca…
…
continue reading
1
Tourists, Fortis, apps, TLP, AWS, Google, Chatbots, Aaran Leyland, and More... - SWN #425
35:07
35:07
Main Kemudian
Main Kemudian
Senarai
Suka
Disukai
35:07
Tourist Abuse, Fortis, apps, TLP, AWS, Google, Chatbots, Aaran Leyland, and More, on this edition of the Security Weekly News. Show Notes: https://securityweekly.com/swn-425
…
continue reading
1
Tourists, Fortis, apps, TLP, AWS, Google, Chatbots, Aaran Leyland, and More... - SWN #425
35:07
35:07
Main Kemudian
Main Kemudian
Senarai
Suka
Disukai
35:07
Tourist Abuse, Fortis, apps, TLP, AWS, Google, Chatbots, Aaran Leyland, and More, on this edition of the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-425
…
continue reading
1
Transforming the Defender's Dilemma into the Defender's Advantage - Lenny Zeltser - ESW #381
30:18
30:18
Main Kemudian
Main Kemudian
Senarai
Suka
Disukai
30:18
Ever heard someone say, "the attacker only has to be right once, but the defender has to get it right every time"? On this episode, we'll dispel that myth. There is some truth to the saying, but only with regards to initial access to the target's environment. Once on the inside, the attacker's advantage flips to the defender. Call it the 'Home Alon…
…
continue reading
1
Transforming the Defender's Dilemma into the Defender's Advantage - Charlotte Wylie, Bhawna Singh, Lenny Zeltser - ESW #381
1:50:15
1:50:15
Main Kemudian
Main Kemudian
Senarai
Suka
Disukai
1:50:15
Ever heard someone say, "the attacker only has to be right once, but the defender has to get it right every time"? On this episode, we'll dispel that myth. There is some truth to the saying, but only with regards to initial access to the target's environment. Once on the inside, the attacker's advantage flips to the defender. Call it the 'Home Alon…
…
continue reading
1
Lavell Crawford Talks My 600lb American Life
5:59
5:59
Main Kemudian
Main Kemudian
Senarai
Suka
Disukai
5:59
Lavell Crawford: I Could Eat Part 1 In Part 1 of the two part comedy buffet I Could Eat, Lavell Crawford is back and here to contemplate how “My 600 Pound Life” could go for 15 seasons and he was still underweight, the kind of racist you have to be to not take a free holiday, and explosive consequences in a Taco Bell bathroom. COMEDY DYNAMICS YouTu…
…
continue reading
1
Not The Vulnerabilities You're Looking For - PSW #848
2:06:29
2:06:29
Main Kemudian
Main Kemudian
Senarai
Suka
Disukai
2:06:29
This week: The USB Army Knife that won't break the budget, I don't want to say EDR is useless (but there I said it), Paul's list of excellent hacking tips, FortiJump - an RCE that took a while to become public, do malware care if it's on a hypervisor?, MicroPython for fun and not for hacking?, an unspecified vulnerability, can you exploit speculati…
…
continue reading
1
Not The Vulnerabilities You're Looking For - PSW #848
2:06:29
2:06:29
Main Kemudian
Main Kemudian
Senarai
Suka
Disukai
2:06:29
This week: The USB Army Knife that won't break the budget, I don't want to say EDR is useless (but there I said it), Paul's list of excellent hacking tips, FortiJump - an RCE that took a while to become public, do malware care if it's on a hypervisor?, MicroPython for fun and not for hacking?, an unspecified vulnerability, can you exploit speculati…
…
continue reading
1
Secure By Default - How do we get there? - Andy Syrewicze - PSW #848
1:00:12
1:00:12
Main Kemudian
Main Kemudian
Senarai
Suka
Disukai
1:00:12
Andy drops some Microsoft Windows and 365 knowledge as we discuss the details on how we get to secure by default in our Windows and cloud environments. Show Notes: https://securityweekly.com/psw-848
…
continue reading
1
Secure By Default - How do we get there? - Andy Syrewicze - PSW #848
3:06:32
3:06:32
Main Kemudian
Main Kemudian
Senarai
Suka
Disukai
3:06:32
Andy drops some Microsoft Windows and 365 knowledge as we discuss the details on how we get to secure by default in our Windows and cloud environments. This week: The USB Army Knife that won't break the budget, I don't want to say EDR is useless (but there I said it), Paul's list of excellent hacking tips, FortiJump - an RCE that took a while to be…
…
continue reading
1
Secure By Default - How do we get there? - Andy Syrewicze - PSW #848
1:00:12
1:00:12
Main Kemudian
Main Kemudian
Senarai
Suka
Disukai
1:00:12
Andy drops some Microsoft Windows and 365 knowledge as we discuss the details on how we get to secure by default in our Windows and cloud environments. Show Notes: https://securityweekly.com/psw-848
…
continue reading