Boundary Breaking Champion pubblico
[search 0]
Altro
Scarica l'app!
show episodes
 
Welcome to The Born & Raised Audio Experience, hosted by the outdoor content creators and entrepreneurs of Born And Raised Outdoors. Our Mission: Set out to break every rule and boundary in the outdoor audio space by interacting with the listeners via LIVE Q&A, behind the scene conversations, campfire stories and motivational excerpts that will entertain, educate and inspire. It is a listening experience!
  continue reading
 
Get ready to unlock your full potential and become the ultimate champion of your life! The Coachable Podcast is your one-stop-shop for unparalleled personal and spiritual development. Join host Tori Gordon as she takes you on a journey of self-discovery through intimate conversations and inspiring stories from the world's most successful leaders in business, health, sports, science, and entertainment. Discover the tools, resources, and motivation you need to push beyond your limits and achie ...
  continue reading
 
Artwork

1
Life Beyond Clinical Practice - Healthcare Careers, Professional Growth, Career Planning, Career Pivot, Healthcare Leadership

Dr Diane | Career Strategist, Health Professions Coach & Boundary Breaking Champion

Unsubscribe
Unsubscribe
Ogni settimana
 
The Go-To podcast for health professionals who want to shift their careers to new levels of impact and fulfillment! ** Top 2.5% Global Ranking ** Are you unfulfilled professionally and wonder what other career opportunities may be out there for you? Do you long to engage in more meaningful work, but don’t know which direction to go in, or what next steps to take? Do you feel stuck because you’re unsure how to pivot your career in line with your interests, skills or values? Then this podcast ...
  continue reading
 
Artwork

1
Moms Actually

Morgan Taylor and Blair Gyamfi

Unsubscribe
Unsubscribe
Ogni mese
 
Moms Actually is a motherhood community that aims to redefine motherhood and break away from the unhealthy expectations society has placed on women. Our community provides spaces for women to authentically relate to each other in a society that often prioritizes appearances over genuine experiences. We host a visual podcast that addresses the experiences of womanhood, sisterhood and motherhood through candid and transparent discussions We have discussed a range of topics, including marriage, ...
  continue reading
 
Loading …
show series
 
Swimlane and GenAI Join Swimlane CISO, Mike Lyborg and Security Weekly’s Mandy Logan as they cut through the AI peanut butter! While Generative AI is the not-so-new hot topic, it's also not the first time the cybersecurity industry has embraced emerging technology that can mimic human actions. Security automation and its ability to take action on b…
  continue reading
 
This week: YAVD: Yet Another Vulnerable Driver, why bring your own when one already exists, backdoors in MIFARE Classic, wireless hacking tips, AMD sinkclose vulnerability will keep running, you down with SLDP yea you know me, Phrack!, IoTGoats, Pixel vulnerabilities, leaking variables, a DEF CON talk that was not cancelled, Telnet is still a thing…
  continue reading
 
This week, in the enterprise security news, A funding that looks like an acquisition And two for-sure acquisitions Rumors that there are funding problems for early stage cyber startups, and we’ll see a lot more acquisitions before the end of the year Speaking of rumors, Crowdstrike did NOT like last week’s Action1 acquisition rumor! Shortening dete…
  continue reading
 
Every week here on the show we talk about vulnerabilities and exploits. Typically we recommend that organizations remediate these vulnerabilities in some way. But how? And more importantly, which ones? Some tools we have to help us are actually not all that helpful at time, such as: Mitre Att&ck - Don't get me wrong, this is a great project and Ada…
  continue reading
 
SquareX With employees spending most of their working hours on the browser, web attacks are one of the biggest attack vectors today. Yet, both enterprises and security vendors today aren’t focused on securing the browser – a huge risk given that attackers can easily bypass Secure Web Gateways, SASE and SSE solutions. This segment will demonstrate t…
  continue reading
 
This week I am joined by Sean Clayton to delve into the captivating intersection of spirituality and science. Our conversation explores the fascinating relationship between ancient wisdom and modern scientific discoveries, discussing the role of consciousness in the universe and its impact on our understanding of reality. Listeners will gain insigh…
  continue reading
 
As development cycles shorten and more responsibilities shift to developers, application security (AppSec) is rapidly evolving. Organizations are increasingly building mature programs that automate and enhance AppSec, moving beyond manual processes. In this discussion, we explore how organizations are adapting their AppSec practices, highlighting t…
  continue reading
 
This week, Jeff Pollard and Allie Mellen join us to discuss the fallout and lessons learned from the CrowdStrike fiasco. They explore the reasons behind running in the kernel, the challenges of software quality, and the distinction between a security incident and an IT incident. They also touch on the need to reduce the attack surface and the impor…
  continue reading
 
While CISOs are often responsible for technology implementation, they are not getting the support they need at a strategic level. The Accelerator found that 73% of CISOs expressed concern over cybersecurity becoming unwieldy, requiring risk-laden tradeoffs, compared to only 58% of both CIOs and CTOs. Understanding the C-suite’s business priorities …
  continue reading
 
What are the barriers to cyber resilience today? Why is it so difficult? And what is coming next, that will generate resilience challenges further down the line? After five years of focusing on the short- and medium-term future of cybersecurity and edge, this year, LevelBlue wanted to understand what is preventing cyber resilience—and what business…
  continue reading
 
Most of us never really consider our careers beyond clinical practice when we graduate. So our professional identities become tied up in our professional designation or clinical qualifications. But when you embark on carving out a new career path as a healthcare professional, this often disrupts your professional identity and requires a re-framing …
  continue reading
 
Many cybersecurity experts are calling recent attacks on healthcare more sophisticated than ever. One attack disrupted prescription drug orders for over a third of the U.S. and has cost $1.5 billion in incident response and recovery services. Separately, an operator of over 140 hospitals and senior care facilities in the U.S. was also victimized. T…
  continue reading
 
Devo, the security analytics company, recently launched data orchestration, a data analytics cloud, and security operations center (SOC) workflow enhancements. Enterprise security teams are struggling with growing data volumes—and they’re also up against headcount and budget constraints. These solutions offer security teams data control, cost optim…
  continue reading
 
In this conversation, the hosts discuss patchless patching, vulnerabilities in the Windows TCP/IP stack, and the trustworthiness of Microsoft. They highlight the challenges of marketing in the cybersecurity industry and the importance of building trust with customers. The conversation also touches on the need for vendors to prioritize security and …
  continue reading
 
This week: Option ROMS are a novel way to compromise a system at the lowest level, Sinkclose opens AMD processors up to attacks, at home in your firmware exploiting SMM complete with examples, Sonos speakers get hacked and enable attackers to listen in on your conversations, DEF CON badges use new chips and are not without controversy, lasers that …
  continue reading
 
Early on in his career Spaf was working with microcode and continued to work on technical projects. As time went on he realized that focusing on the non-technical work, such as policies and shaping our thinking, would help move the needle. Borrowing concepts from his book on the subject, we will delve into some cybersecurity myths such as: Are user…
  continue reading
 
Have you ever found yourself wondering, "Who am I, truly?" If you're seeking answers and guidance on your journey towards authenticity, this episode is for you! Join me as I welcome back my best friend, Nikki Grace, to the show for a heartfelt conversation on Unmasking Your Authenticity: The Transformative Power of Self-Expression. Discover the inc…
  continue reading
 
In complex software ecosystems, individual application risks are compounded. When it comes to mitigating supply chain risk, identifying backdoors or unintended vulnerabilities that can be exploited in your environment is just as critical as staying current with the latest hacking intel. Understand how to spot and reduce the risk to your environment…
  continue reading
 
Startups and small orgs don't have the luxury of massive budgets and large teams. How do you choose an appsec approach that complements a startup's needs while keeping it secure. Kalyani Pawar shares her experience at different ends of an appsec maturity spectrum. Show Notes: https://securityweekly.com/asw-295…
  continue reading
 
In the leadership and communications segment, The Cybersecurity Leadership Crisis Dooming America’s Companies, Judge Rejects SEC’s Aggressive Approach to Cybersecurity Enforcement, Is It Time to Pivot Your Strategy?, and more! Show Notes: https://securityweekly.com/bsw-360
  continue reading
 
This week, it’s time for security money, our quarterly review of the money of security, including public companies, IPOs, funding rounds and acquisitions from the previous quarter. This quarter, Crowdstrike crashes the index, as Thoma Bravo acquires another index company. The index is currently made up of the following 25 pure play cybersecurity pu…
  continue reading
 
Many people give up on their career pivot dreams even before exploring their options because they feel the cost is too high, are not up to putting in the work, or simply don't want to make the sacrifice of leaving their comfort zones. But the reality is that the reward of professional fulfillment that comes with career alignment can only be enjoyed…
  continue reading
 
, in the enterprise security news, AI is still getting a ton of funding! Netwrix acquires PingCastle Tenable looks for a buyer SentinelOne hires Alex Stamos as their new CISO Crowdstrike doesn’t appreciate satire when it’s at their expense Intel begins one of the biggest layoffs we’ve ever seen in tech Windows Downdate RAG poisoning GPT yourself Th…
  continue reading
 
Loading …

Guida rapida