Podcast by Modern Mindset 365
…
continue reading
Become 365 Driven and discover your true potential! Wealth, Health, Mindset, and Relationships. These are the four cornerstones of happiness and success. Within each episode we share powerful thoughts and introduce you to people who demonstrate excellence in these subjects. Hosted by Tony Whatley, author of "Side Hustle Millionaire" and executive coach, speaker, and community leader.
…
continue reading
Give your mind a little love with Mind Love, a podcast dedicated to the exploration of the power of the mind, focusing on mindset, mindfulness, mind-body-soul, and science-based approaches to mental health. Each week, Melissa Monte hosts interviews with inspiring guest experts, delving into evidence-based mind science and real-life stories from those who have overcome their mental challenges. Whether you’re looking to find purpose and inner peace, rewire negative thought patterns, manifest y ...
…
continue reading
The Meat Mafia Podcast is hosted by @MeatMafiaBrett and @MeatMafiaHarry. We're two guys who walked away from the typical path to carve out something different. Based in Austin, we’re on a mission to figure out what it takes to live a fulfilled life in a world that often pushes us away from meaning. We have conversations with people we believe can help us, diving deep into the pillars of health, wealth, and faith, as the cornerstones of our mission. Whether it's challenging the modern food sy ...
…
continue reading
The Happy at Work podcast explores the intersection of organizational culture, positive psychology, and employee branding to create thriving workplaces. Our expert hosts—Dr. Laura Hamill, Michael McCarthy, and Dr. Tessa Misiaszek—bring diverse perspectives and deep expertise to uncover practical strategies for fostering happiness and success at work. We engage with various guests, including organizational leaders, HR professionals, psychologists, researchers, and employees across various ind ...
…
continue reading
Welcome to the Security Weekly Podcast Network, your all-in-one source for the latest in cybersecurity! This feed features a diverse lineup of shows, including Application Security Weekly, Business Security Weekly, Paul's Security Weekly, Enterprise Security Weekly, and Security Weekly News. Whether you're a cybersecurity professional, business leader, or tech enthusiast, we cover all angles of the cybersecurity landscape. Tune in for in-depth panel discussions, expert guest interviews, and ...
…
continue reading
1
Revolutionizing Healthcare: Why Traditional Systems Are Being Left Behind w/ Andy Schoonover | MMP #374
1:00:23
1:00:23
Main Kemudian
Main Kemudian
Senarai
Suka
Disukai
1:00:23
Andy Schoonover is the founder and CEO of CrowdHealth, a revolutionary platform redefining the healthcare industry. With a mission to challenge traditional insurance models, Andy has built a community-driven alternative that emphasizes personal responsibility, cost-effectiveness, and support. His approach draws inspiration from tribal support syste…
…
continue reading
1
Granny Bots, Microsoft, Shrinklocker, SlugResin, BlueSky, Aaran Leyland, and More... - SWN #431
32:12
32:12
Main Kemudian
Main Kemudian
Senarai
Suka
Disukai
32:12
Granny Bots, Microsoft, Shrinklocker, SlugResin, BlueSky, Aaran Leyland, and More, on this edition of the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-431
…
continue reading
1
AI and the Autonomous SOC - Separating Hype from Reality - Justin Beals, Itai Tevet - ESW #384
1:56:05
1:56:05
Main Kemudian
Main Kemudian
Senarai
Suka
Disukai
1:56:05
There have been a lot of bold claims about how generative AI and machine learning will transform the SOC. Ironically, the SOC was (arguably) invented only because security products failed to make good on bold claims. The cybersecurity market is full of products that exist only to solve the problems created by other security products (Security Analy…
…
continue reading
1
No CVE and No Accountability - Ed Skoudis - PSW #851
2:43:50
2:43:50
Main Kemudian
Main Kemudian
Senarai
Suka
Disukai
2:43:50
Alright, so we dove deep into some pretty wild stuff this week. We started off talking about zip files inside zip files. This is a variation of old-school zip file tricks, and the latest method described here is still causing headaches for antivirus software. Then we geeked out about infrared signals and the Flipper Zero, which brought back memorie…
…
continue reading
1
Beyond Free Snacks: Creating Meaningful In-Person Work Experiences with Stacey Messier
27:51
27:51
Main Kemudian
Main Kemudian
Senarai
Suka
Disukai
27:51
Send us a text In this episode, Tessa and Laura explore the evolving landscape of workplace dynamics with Stacey Messier, who brings her unique perspective from managing multiple innovation workspaces across New England. The conversation walks through how organizations can create meaningful in-person experiences that go beyond basic amenities, addr…
…
continue reading
1
Rich Brand, Poor Brand - with David Brier - EP 386
53:17
53:17
Main Kemudian
Main Kemudian
Senarai
Suka
Disukai
53:17
David Brier, a global authority on branding, joins us to share insights from his upcoming book, "Rich Brand, Poor Brand: How to Unleash Your David in a World of Goliaths." Together, David and Tony unpack how visionary leaders like Steve Jobs and Elon Musk have harnessed their personal influence to forge iconic brands and discuss the often underesti…
…
continue reading
1
Modernizing AppSec - Melinda Marks - ASW #307
1:09:29
1:09:29
Main Kemudian
Main Kemudian
Senarai
Suka
Disukai
1:09:29
In this week's interview, Melinda Marks' joins us to discuss her latest research. Her recent report Modernizing Application Security to Scale for Cloud-Native Development delves into many aspects and trends affecting AppSec as it matures, particularly in cloud-first organizations. We also discuss the fuzzy line between "cloud-native" AppSec and eve…
…
continue reading
1
Struwwelpeter, Krampus, Flutter, Apple, DLink, C++, Josh Marpet and more... - SWN #430
33:19
33:19
Main Kemudian
Main Kemudian
Senarai
Suka
Disukai
33:19
Struwwelpeter, Krampus, Flutter, Apple, DLink, C++, Josh Marpet and more on the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-430
…
continue reading
1
How to Combat the CISO Mental Health Crisis - Ram Movva - BSW #372
58:23
58:23
Main Kemudian
Main Kemudian
Senarai
Suka
Disukai
58:23
Stress in cybersecurity is an industrywide problem. The CISO role is one of the most stressful in any organization. And the stress levels are at an all time high, leading to a mental health crisis. How should CISOs cope with this stress and improve their mental health? Ram Movva, CEO & Founder at Securin, joins Business Security Weekly to discuss t…
…
continue reading
1
How to Build Relationships That Actually Fill You Up with Sah D’Simone • 374
1:16:57
1:16:57
Main Kemudian
Main Kemudian
Senarai
Suka
Disukai
1:16:57
In this episode, you'll learn: How to build authentic relationships that fit your current life stage (no time machine required) The difference between being connected and feeling connected (they're not the same thing) Practical ways to deepen relationships and create new ones, no matter how busy or complicated your life is Have you ever noticed how…
…
continue reading
1
Seven Days Without Food: A Journey of Fasting, Faith, and Focus w/ Brett & Harry | MMP #373
56:41
56:41
Main Kemudian
Main Kemudian
Senarai
Suka
Disukai
56:41
In this episode, we dive into the physical, mental, and spiritual transformation that comes from a seven-day fast. Through raw reflections, we discuss how fasting deepens faith, sharpens focus, and strips away life’s distractions to reveal purpose. What we cover: - Transformation through Fasting - The Mental and Physical Benefits of Fasting - Faith…
…
continue reading
1
Robo-Turing, BlueNoroff, Palo Alto, German Law, Fabric, Cisco, Bans, Aaran Leyland... - SWN #429
32:39
32:39
Main Kemudian
Main Kemudian
Senarai
Suka
Disukai
32:39
Robo-Turing, BlueNoroff, Palo Alto, German Law, Fabric, Cisco, Banning Things, Aaran Leyland, and More, on this edition of the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-429
…
continue reading
1
Cybersecurity Budgets: the Journey from Reactive to Proactive - Todd Thiemann, Theresa Lanowitz - ESW #383
2:01:03
2:01:03
Main Kemudian
Main Kemudian
Senarai
Suka
Disukai
2:01:03
CISOs struggle more with reactive budgets than CIOs or CTOs. It's not that part of the CISO's budget shouldn't be reactive, it's certainly necessary to an extent. The problem is when proactive measures suffer as a result. In this interview, we'll discuss some of the causes behind this and some strategies for breaking out of this loop. This segment …
…
continue reading
1
Cybersecurity For Schools - Kayne McGladrey - PSW #850
2:47:43
2:47:43
Main Kemudian
Main Kemudian
Senarai
Suka
Disukai
2:47:43
We chatted with Kayne about education systems security, funding for cyber tools and services, and what the future of education might look like to fill more cyber roles. In the news: Pacific Rim, Linux on Windows for attackers, one of the worst cases of a former employee's retaliation, Zery-Day FOMO, we predicted that, hacking for fun, working hard …
…
continue reading
1
The Dark Side of Meaningful Work with Andrew Soren
25:17
25:17
Main Kemudian
Main Kemudian
Senarai
Suka
Disukai
25:17
Send us a text In his second appearance on Happy at Work, Andrew Soren explores the complex relationship between meaningful work and well-being. Drawing from recent research, he reveals surprising findings about how highly meaningful work can sometimes lead to decreased well-being, and discusses practical ways to balance purpose with personal susta…
…
continue reading
1
Ancient Philosophies for Leadership and Growth - with Alex Petkas - EP 385
1:09:17
1:09:17
Main Kemudian
Main Kemudian
Senarai
Suka
Disukai
1:09:17
Discover the blend of ancient wisdom and modern entrepreneurship as Tony welcomes Alex Petkas, a scholar in classics and philosophy, to share his riveting transformation from an uninspired student to a seeker of profound truths. Driven by a thirst for meaning, Alex unveils how ancient texts, particularly those of Marcus Aurelius, shaped his worldvi…
…
continue reading
1
Tariffs, Pygmy Goat, Schneider, SQLite, Deepfakes, Military AI, Josh Marpet... - SWN #428
32:53
32:53
Main Kemudian
Main Kemudian
Senarai
Suka
Disukai
32:53
Tariffs, Pygmy Goat, Schneider, SQLite and Dixie Flatline, Deepfakes, Military AI, Josh Marpet, and more on the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-428
…
continue reading
1
Bug bounties, vulnerability disclosure, PTaaS, fractional pentesting - Grant McCracken - ASW #306
1:05:35
1:05:35
Main Kemudian
Main Kemudian
Senarai
Suka
Disukai
1:05:35
After spending a decade working for appsec vendors, Grant McKracken wanted to give something back. He saw a gap in the market for free or low-cost services for smaller organizations that have real appsec needs, but not a lot of means to pay for it. He founded DarkHorse, who offers VDPs and bug bounties to organizations of all sizes for free, or for…
…
continue reading
1
Planning A Merger Or Acquisition? Ask These Five Cyber Questions First - Craig Davies - BSW #371
1:05:15
1:05:15
Main Kemudian
Main Kemudian
Senarai
Suka
Disukai
1:05:15
Merger and acquisition (M&A) activity in finally starting to pick up. Although the allure of financial gains and market expansion drives these deals, the digital age demands a rigorous assessment of cybersecurity risks accompanying such mergers. Unanticipated cyber issues, like dormant malware or inconsistent access controls, can transform an ideal…
…
continue reading
1
Shattering the Illusion of Control: A Masterclass in Conscious Creation with TJ Woodward • 373
1:03:51
1:03:51
Main Kemudian
Main Kemudian
Senarai
Suka
Disukai
1:03:51
We will learn: How to spot and break out of subconscious loops that keep you stuck Practical ways to start consciously creating a life that’s actually yours Tools for creating real, lasting change in every part of your life One day, you’re wild, free, spontaneous—living each moment like anything could happen next. And then, before you know it, you …
…
continue reading
1
Recall, Russia, Win 10, Phish n Ships, Midnight Blizzard, Rob Allen, and More... - Rob Allen - SWN #427
36:50
36:50
Main Kemudian
Main Kemudian
Senarai
Suka
Disukai
36:50
Recall III: the Re-Re-Recalling, Russia, Win 10, Phish n Ships, Midnight Blizzard, Emerald Whale, Rob Allen, and More, on this edition of the Security Weekly News. Segment Resources: https://www.bleepingcomputer.com/news/security/unitedhealth-says-data-of-100-million-stolen-in-change-healthcare-breach/ This segment is sponsored by ThreatLocker. Vis…
…
continue reading
1
What if securing buildings was as easy as your smartphone? - Damon McDougald, Blaine Frederick, Punit Minocha - ESW #382
2:06:19
2:06:19
Main Kemudian
Main Kemudian
Senarai
Suka
Disukai
2:06:19
The future is here! Imagine if you could get into the office, a datacenter, or even an apartment building as easily as you unlock your smartphone. Alcatraz AI is doing exactly that with technology that works similarly to how smartphones unlock using your face. It works in the dark, if you shave off your beard, and so quickly you don't even need to …
…
continue reading
1
Clearing The Fog On Health & The Hill's We'll Die On w/ Brett & Harry | #372
1:12:31
1:12:31
Main Kemudian
Main Kemudian
Senarai
Suka
Disukai
1:12:31
Today we cut through the noise, misinformation, and general fog that seems to surround the health climate currently. We do our best to highlight exactly how we feel on what's real, what's not, and the hill's that we'll ultimately die on when it comes to your health journeys. What we cover: - Simplifying wellness practices for impactful change - The…
…
continue reading
1
Shadow IT and Security Debt - Dave Lewis - PSW #849
2:50:27
2:50:27
Main Kemudian
Main Kemudian
Senarai
Suka
Disukai
2:50:27
We had the pleasure of finally having Dave Lewis on the show to discuss shadow IT and security debt. Dave shared some fascinating insights from his long career in cybersecurity, emphasizing the importance of addressing fundamental security issues and the human aspect of security. We delved into the challenges of managing shadow IT, the complexities…
…
continue reading
1
Unlocking Levels of Awareness with Jay & Beth Robb - EP 384
1:07:13
1:07:13
Main Kemudian
Main Kemudian
Senarai
Suka
Disukai
1:07:13
In this episode I talk with Jay & Beth Robb, a great couple with a lifestyle focused mission in entrepreneurship. Jay has over 40 years in the health and wellness space, as a former gym owner and also a sports nutrition and supplements brand.
…
continue reading
1
Halloween, TikTok, Telcos, Win 11, Five Eyes, AWS, France, ChatGPT, and more... - SWN #426
36:50
36:50
Main Kemudian
Main Kemudian
Senarai
Suka
Disukai
36:50
Halloween, TikTok Rip Off, Telcos, Win 11, Five Eyes, AWS, France, ChatGPT, and more on the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-426
…
continue reading
1
The CISO Mindset, Top Strategies, and Mandating Office Presence Without Purpose - David Bradbury, Erin Baudo Felter - BSW #370
1:03:37
1:03:37
Main Kemudian
Main Kemudian
Senarai
Suka
Disukai
1:03:37
In the leadership and communications segment, The CISO Mindset: A Strategic Guide for Aspiring CEOs and The Board Members, The Top Strategy to Earn More Respect at Work: A Leadership Expert’s Proven Method, The Problem with Mandating Office Presence Without Purpose, and more! Identity continues to be one of the most used attack vectors by cybercrim…
…
continue reading
1
Making TLS More Secure, Lessons from IPv6, LLMs Finding Vulns - Arnab Bose, Shiven Ramji - ASW #305
1:22:48
1:22:48
Main Kemudian
Main Kemudian
Senarai
Suka
Disukai
1:22:48
Better TLS implementations with Rust, fuzzing, and managing certs, appsec lessons from the everlasting transition to IPv6, LLMs for finding vulns (and whether fuzzing is better), and more! Also check out this presentation from BSides Knoxville that we talked about briefly, https://youtu.be/DLn7Noex_fc?feature=shared Generative AI has been the talk …
…
continue reading
1
Rising Above Darkness: Suicide Prevention and Building Resilient Minds with Niyc Pidgeon • 372
1:10:17
1:10:17
Main Kemudian
Main Kemudian
Senarai
Suka
Disukai
1:10:17
We will learn: How positive psychology techniques can be applied to prevent suicide and improve overall mental health. Practical strategies, including Niyc's "333 system," that you can start using today to build resilience and cope with life's challenges. The importance of creating meaningful connections and how small daily actions can make a signi…
…
continue reading
1
My Extraordinary Journey, How To Self-Actualize And Dream-Orient, Contemplating God w/ Paul Chek #371
2:31:00
2:31:00
Main Kemudian
Main Kemudian
Senarai
Suka
Disukai
2:31:00
A huge, huge episode. Paul Chek, the legend, joins us on the show today for the first time. Paul has been a guest we've had on the dream list since we first started the show, and to honor that, we ripped for 2 and a half hours. Paul shares his journey from fighter to healer, taking us the values and experiences that have shaped his life of purpose.…
…
continue reading
1
Tourists, Fortis, apps, TLP, AWS, Google, Chatbots, Aaran Leyland, and More... - SWN #425
35:07
35:07
Main Kemudian
Main Kemudian
Senarai
Suka
Disukai
35:07
Tourist Abuse, Fortis, apps, TLP, AWS, Google, Chatbots, Aaran Leyland, and More, on this edition of the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-425
…
continue reading
1
Transforming the Defender's Dilemma into the Defender's Advantage - Charlotte Wylie, Bhawna Singh, Lenny Zeltser - ESW #381
1:50:15
1:50:15
Main Kemudian
Main Kemudian
Senarai
Suka
Disukai
1:50:15
Ever heard someone say, "the attacker only has to be right once, but the defender has to get it right every time"? On this episode, we'll dispel that myth. There is some truth to the saying, but only with regards to initial access to the target's environment. Once on the inside, the attacker's advantage flips to the defender. Call it the 'Home Alon…
…
continue reading
1
Secure By Default - How do we get there? - Andy Syrewicze - PSW #848
3:06:32
3:06:32
Main Kemudian
Main Kemudian
Senarai
Suka
Disukai
3:06:32
Andy drops some Microsoft Windows and 365 knowledge as we discuss the details on how we get to secure by default in our Windows and cloud environments. This week: The USB Army Knife that won't break the budget, I don't want to say EDR is useless (but there I said it), Paul's list of excellent hacking tips, FortiJump - an RCE that took a while to be…
…
continue reading
1
Unveiling Fake Influence - with Ken Okazaki - EP 383
1:08:20
1:08:20
Main Kemudian
Main Kemudian
Senarai
Suka
Disukai
1:08:20
Ever wondered about the truth behind those glamorous Instagram profiles flaunting thousands of followers? This special episode features Tony as a guest on The Content Capitalists Podcast with Ken Okazaki, and together they pull back the curtain on the world of social media influencers. Tony and Ken tackle the ethical quagmire of fake influence, the…
…
continue reading
1
Doom Brain, E2EE, OT, Adload, Cisco, VMware, internet archive, Josh Marpet ... - SWN #424
29:57
29:57
Main Kemudian
Main Kemudian
Senarai
Suka
Disukai
29:57
Doom on a Human Brain, E2EE, OT, Adload, Cisco, VMware, Internet Archive, Josh Marpet, and more on the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-424
…
continue reading
1
Aligning Tech Execs on Cyber Resilience - Theresa Lanowitz - BSW #369
1:01:21
1:01:21
Main Kemudian
Main Kemudian
Senarai
Suka
Disukai
1:01:21
Getting C-Suite execs aligned on cyber resilience and cybersecurity can be a challenge. LevelBlue's recent Futures™️ report sought to uncover the barriers that prevent companies from achieving cyber resilience in the enterprise today. The report not only surveyed C-Suite execs (CIOs, CTOs, and CISOs), but non-C-Suite leaders from engineering and ar…
…
continue reading
1
The Heart-Uterus Connection: The Emotional and Physical Links in Fertility with Michelle Oravitz • 371
1:04:05
1:04:05
Main Kemudian
Main Kemudian
Senarai
Suka
Disukai
1:04:05
We will learn: How the ancient wisdom of Traditional Chinese Medicine views the connection between the heart and uterus, and why this matters for your fertility journey. The power of conscious creation and how your thoughts and visualizations can influence your reproductive health. Practical techniques to reduce stress and promote the free flow of …
…
continue reading
1
The Complexities, Configurations, and Challenges in Cloud Security - Scott Piper - ASW #304
1:17:25
1:17:25
Main Kemudian
Main Kemudian
Senarai
Suka
Disukai
1:17:25
Building cloud native apps doesn't mean you're immune to dealing with legacy systems. Cloud services have changed significantly over the last decade, both in the security controls available to them and the sheer volume of services that CSPs provide. Scott Piper shares some history of cloud security, the benefits of account separation, and how ratch…
…
continue reading
1
The Path To Modern Sovereignty: Family, Health, & Education w/ John Moody #370
52:51
52:51
Main Kemudian
Main Kemudian
Senarai
Suka
Disukai
52:51
John Moody joins us to break down how to take back control over your family’s food, health, and education by opting out of today’s modern systems. If you’re ready to opt out into a more sovereign life, or simply want to learn about what it means to achieve sovereignty in today's modern world, this episodes for you. What we cover... The flaws in ind…
…
continue reading
1
Stealing, Kubernetes, Passkeys, SolarWinds, Intel, Sextortion, and... - SWN #423
33:22
33:22
Main Kemudian
Main Kemudian
Senarai
Suka
Disukai
33:22
Stealing Pencils, Kubernetes, Passkeys, SolarWinds, Intel, North Koreans, Sextortion, and More, on this edition of the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-423
…
continue reading
1
Cybersecurity Success is Business Success - Renuka Nadkarni, Theresa Lanowitz - ESW #380
1:46:37
1:46:37
Main Kemudian
Main Kemudian
Senarai
Suka
Disukai
1:46:37
Secure by design is more than just AppSec - it addresses how the whole business designs systems and processes to be effective and resilient. The latest report from LevelBlue on Cyber Resilience reveals security programs that are reactive, ill-equipped, and disconnected from IT and business leaders. Most security problems are out of security teams' …
…
continue reading
1
Effective Operational Outcomes - Ken Dunham - PSW #847
2:58:09
2:58:09
Main Kemudian
Main Kemudian
Senarai
Suka
Disukai
2:58:09
New security and vulnerability research is published every day. How can security teams get ahead of the curve and build architecture to combat modern threats and threat actors? Tune-in to a lively discussion about the threat landscape and tips on how to stay ahead of the curve. Segment Resources: https://blog.qualys.com/vulnerabilities-threat-resea…
…
continue reading
1
Building a Business Beyond the 9-to-5 - with Paul Povolni - EP 382
50:45
50:45
Main Kemudian
Main Kemudian
Senarai
Suka
Disukai
50:45
What happens when a side hustle becomes your main hustle, surpassing your traditional career in income and fulfillment? This special episode features Tony as a guest on the Headsmack Podcast hosted by Paul Povolni. In this interview, Tony takes you through his journey from an engineering career in oil and gas to launching a seven-figure automotive …
…
continue reading
1
Perl & PHP Vulns, Fuzzing & Parsers, Protecting Multi-Hosted Tenants, Secure Design - ASW #303
41:59
41:59
Main Kemudian
Main Kemudian
Senarai
Suka
Disukai
41:59
Looking at vulnerable code in Ivanti (Perl) and Magento (PHP), fuzzing is perfect for parsers, handling tenant isolation when training LLMs, Microsoft's small steps towards secure design, and more! Visit https://www.securityweekly.com/asw for all the latest episodes! Show Notes: https://securityweekly.com/asw-303…
…
continue reading
1
Stego, uBlock, PPTP, Log4J, Command Jacking, Windows 10, Feet, Josh Marpet, and More. - SWN #422
30:23
30:23
Main Kemudian
Main Kemudian
Senarai
Suka
Disukai
30:23
AI Stego, uBlock, PPTP, Log4J rises again, Command Jacking, Windows 10, Principal Skinner's Feet, Josh Marpet, and more on the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-422
…
continue reading