Recent TV pubblico
[search 0]
Altro

Scarica l'app!

show episodes
 
The Newsroom After Show recaps, reviews and discusses episodes of HBO's The Newsroom. Show Summary: Aaron Sorkin once chronicled the daily work of the federal government in "The West Wing." In "The Newsroom," the Emmy-winning executive producer uses the operation of a fictional cable news network as the heart of the story, with Jeff Daniels portraying the network's lead anchor and leading an ensemble cast. Episodes are written around actual recent news events, reported by a staff that takes ...
 
Jack Loves TV is a general television discussion podcast. We'll choose a show each week and discuss it at length. We'll also talk recent TV news and do some fun stuff like sorting characters into Hogwarts houses, Meyers-Briggs for protagonists, or play a game. See acast.com/privacy for privacy and opt-out information.
 
Welcome to Caffeinated! We're a podcast that talks about Gilmore Girls! It sounds crazy I know, but we love Gilmore Girls so much and have so for so long, we decided to share that love to the world. Follow us on our adventure of every episode of the little town of Stars Hallow. Tune in every week, new episodes every Sunday, kind of.... not really.
 
Franklin Graham and the Billy Graham Evangelistic Association have consistently used current technology to spread the Gospel to the ends of the earth. The Billy Graham TV Specials are half-hour, ministry-focused programs covering various initiatives. Each program highlights how the Gospel is impacting people around the world. The Billy Graham TV Specials are broadcast on many Christian networks. See recent episodes and get involved online at www.BillyGraham.tv.
 
Charmed is back! If you were a fan of the original you must see this reboot with a Mel, Maggie, and Vera taking on the power of three. Just in time for Halloween this is the spiritual show we needed. Come back every week as our hosts break down each episode diving into this world of demons and whitelighters, and bring you the most recent news and gossip from the show.
 
Welcome to the TV Talk LIVE podcast, where you hear updates about your favourite shows including reviews on premiers, rating and so much more! In every episode you get the most recent news about all your shows and you find out what you should be watching daily! SUBSCRIBE NOW TO KEEP UPDATED :)
 
The Real Housewives of Melbourne After Show recaps, reviews and discusses episodes of Bravo's Real Housewives of Melbourne. Show Summary: The "Real Housewives" franchise has been a staple of Bravo since 2006 with versions in diverse U.S. cities. Now it heads to another hemisphere to import the Melbourne version, spotlighting several socialites in Australia. Whether they enjoy being single or married, their social lives include glamorous cocktail parties and weekend getaways to resorts. The f ...
 
The Total Bellas After Show recaps, reviews and discusses episodes of E!'s Total Bellas. Show Summary: In addition to twin sisters Nikki and Brie Bella being two of the most popular divas in recent WWE history, they are romantically involved with two former WWE champions on the men's side, John Cena and Daniel Bryan, respectively. That quartet is at the forefront of this show, which provides a look at their lives away from the bright lights and big stage of the world-famous arenas where they ...
 
Each week Chris Revill and Nate Withrow discuss a different sketch comedy show, taking a brief look at the history of the show and/or some of the notable actors, writers, or creators before discussing a single sketch. We'll tackle anything from recent shows like Portlandia to cartoon shows like Animaniacs to old variety/comedy shows like the Sonny and Cher show.
 
The When Calls the Heart After Show recaps, reviews and discusses episodes of Hallmark Channel's When Calls the Heart. Show Summary: Elizabeth Thatcher is a young teacher accustomed to high society, so she experiences culture shock when she gets her first classroom assignment in Coal Valley. Life in the small mining town is filled with challenges. A recent explosion has killed more than a dozen of the town's miners, compelling the widows of those men to work in the mines to earn money. One o ...
 
Loading …
show series
 
Priya Chaudhry joins us today as co-host and we are eager to catch up with her and get her legal perspective on recent litigations and proposed legislation that impacts our world of security and compliance. Hear ye, Hear ye! The court is now in session. Visit https://www.securityweekly.com/scw for all the latest episodes! Show Notes: https://securi…
 
Firmware security is complex and continues to be an industry challenge. In this podcast we'll talk about the reasons firmware security remains a challenge and some best practices around platform security. Segment Resources: - https://www.helpnetsecurity.com/2020/04/27/firmware-blind-spots/ - https://www.helpnetsecurity.com/2020/09/28/hardware-secur…
 
Fear not, our Cook Islands power rewatch is still in full force! It has been a super busy month for the Outwatch crew, so we wanted to re-release this past episode this week! In it, Alex is joined by fellow super duper fan Elizabeth, as they put together their dream season, made up of 4 tribes, each of which represent a 10 season era of Survivor. P…
 
This week in the Security News: From a stolen laptop to inside the company network, the essential tool for hackers called "Discord", fixin' your highs, hacking DEF CON, an 11-year-old can show you how to get an RTX 30 series, broadcasting your password, to fuzz or not to fuzz, a real shooting war, evil aerobics instructors, the return of the PunkSp…
 
Join Michael Welch for a discussion on the ramifications a cyber-physical attack can have on ill prepared organizations. As a third-party expert, Michael can speak to: • The importance of being aware of the widening attack surface due to an inter-connected world of cyber-physical security. • The critical need to have the right solutions in place to…
 
Alyssa will discuss the growing trend of organizations implementing Business Information Security Officers. We'll talk about how the BISO builds bridges between the security and business organizations that DevSecOps shared-responsibility culture. We'll dive into Alyssa's career progression and the lessons she learned along the way the prepared her …
 
This week in the Enterprise News: Aqua Security Introduces new Aqua Platform, Decryption Tools, Security Summit 2021: Google expands Trusted Cloud, Clearview AI raises $30M to accelerate growth in image-search technology, & more! Visit https://www.securityweekly.com/esw for all the latest episodes! Show Notes: https://securityweekly.com/esw236…
 
Security starts before detection, it starts before investigations. Mature security teams understand the importance of good hygiene and take proactive measures to secure themselves against the ever-increasing threat landscape. Join us this week as Stephanie Aceves, Threat Response SME Lead, talks through a holistic approach to security using the Tan…
 
Brief chat around the rise in Ransomware attacks, campaigns against our Infrastructure, the deficit in Cyber Talent, and how we could address the issue by extending Corporate Cyber Training programs to extend past the Corporate boundary. Segment Resources: https://www.aegon.com/home/ https://talklou.com/ https://www.infragardnational.org/ https://i…
 
Priya Chaudhry joins us today as co-host and we are eager to catch up with her and get her legal perspective on recent litigations and proposed legislation that impacts our world of security and compliance. Hear ye, Hear ye! The court is now in session. Visit https://www.securityweekly.com/scw for all the latest episodes! Show Notes: https://securi…
 
In the Leadership and Communications section for this week: In modernization, security is a barrier and an incentive, Federal CISO DeRusha Maps FISMA Reform Priorities, Cybersecurity salaries: What 8 top security jobs pay, and more! Visit https://www.securityweekly.com/bsw for all the latest episodes! Show Notes: https://securityweekly.com/bsw225…
 
Both the Security Weekly 25 Index and the NASDAQ close at record highs on 7/23/2021. See how the security market continues to stay hot. The current companies in the Security Weekly 25 Index: SCWX PANW CHKP SPLK NLOK FTNT AKAM FFIV ZS PFPT FEYE QLYS VRNT CYBR TENB SAIL MIME NET CRWD NTCT VRNS RPD SUMO RDWR PING Visit https://www.securityweekly.com/b…
 
This week in the AppSec News: CWE releases the top 25 vulns for 2021, findings bugs in similar code, Sequoia vuln in the Linux kernel, Twitter transparency for account security, a future for cloud security, & more! Visit https://www.securityweekly.com/asw for all the latest episodes! Show Notes: https://securityweekly.com/asw159…
 
Adoption of serverless functions is rapidly growing, which means security teams will be challenged to deliver protection for data and applications in these complex environments in the coming months and years. Peter Klimek is helping Imperva customers address these challenges and will offer guidance on how to get protection for functions without slo…
 
This week in the Security News: Trust no one, its all about the information, so many Windows vulnerabilities and exploits, so. many., Saudi Aramco data for sale, Sequoia, a perfectly named Linux vulnerability, is Microsoft a national security threat?, Pegasus and clickless exploits for iOS, homoglyph domain takedowns, when DNS configuration goes wr…
 
CyberMarket.com is a marketplace where CyberSecurity Consultancies and clients can find each other. There is a growing trend where CyberSecurity Consultants recognize the gap between what they are worth to a consultancy as being sold out for a daily rate compared to what they get paid. There are a number of consultants who are leaving consultancies…
 
Safety in online dating spaces is an issue the dating industry has grappled with for some time; with the surge of dating app usage during the pandemic, the demand for dating apps to take responsibility and ensure safer online interactions is at an all-time high. RealMe is a technology platform that hopes to solve this problem on dating apps (and ot…
 
The shift away from web application security, caused by the pandemic and the focus on remote workforces, resulted in an increased number of web vulnerabilities. In this segment, Mark talks about the best starting point for organizations to get back on track and prioritize your web app security. This segment is sponsored by Acunetix. Visit https://s…
 
In the Enterprise News, SafeBreach adds support for new advanced attacks to the Microsoft Defender for Endpoint evaluation lab, Stellar Cyber XDR Kill Chain allows security analyst teams to disrupt cyberattacks, Bugcrowd Awarded U.S. Patents for Crowd-Enabled Vulnerability Detection, Microsoft puts PCs in the cloud with Windows 365, some funding an…
 
Security teams relying on asset inventory from their IT counterparts can be a challenge due to a lack of security context for assets. This gap can lead to missed opportunities to identify and fix asset-centric issues like EOL or unauthorized software that they can address even before running their vulnerability management program. Ed will discuss t…
 
Our client was using a hosted service to perform remote monitoring and management and resisted its inclusion in the audit scope. The vendor's external scans revealed critical vulnerabilities. Prior to a highly-publicized breach, the vendor said no auditor had ever included their service in the scope of their audits. We will explore attitudes that k…
 
Join hosts Mel & Daisy on season 3 episode 4, the episode that never dies, we talk about how to torture your house guests with HVAC, grossing Daisy out with the eye contraption, the infuriating nature of not believing women, beauty standards and their ridiculousness, the inaccuracy of Lane’s dyeing process, and of course Rory’s green monster.Be sur…
 
Our client was using a hosted service to perform remote monitoring and management and resisted its inclusion in the audit scope. The vendor's external scans revealed critical vulnerabilities. Prior to a highly-publicized breach, the vendor said no auditor had ever included their service in the scope of their audits. We will explore attitudes that k…
 
This week in the Leadership and Communications section, How much does a CEO or business leader need to know about cybersecurity, How businesses can drive innovation while delivering operational excellence, 6 resume mistakes CISOs still make, and more! Visit https://www.securityweekly.com/bsw for all the latest episodes! Show Notes: https://security…
 
In light of recent events and the pressures of the digital world, the landscape is finally shifting towards risk. The opportunity for cyber risk profiling, standardization, and seamless collaboration between CISOs, CIOs, and business-side leadership has come. Padraic O'Reilly, Co-Founder and CPO of CyberSaint discusses what he's learned from workin…
 
This week in the AppSec News: Security from code comments, visualizing decision trees, bypassing Windows Hello, security analysis of Telegram, paying for patient bug bounty programs, cloud risks, & more! Visit https://www.securityweekly.com/asw for all the latest episodes! Show Notes: https://securityweekly.com/asw158…
 
In the wake of events such as the Solarwinds breach, there has been a lot of misinformation about the role of open source in DevSecOps. GitLab believes everyone benefits when everyone can contribute. Open source plays a key role in how GitLab addresses DevSecOps. We will discuss GitLab's view of the role of open source in DevSecOps including recent…
 
I had a dream that this podcast was playing, and there was this old shaman lady hosting it, and all the ads were ads for credit cards. All the guests were supernatural people, too. Welcome to our Survivor: Cook Islands mini-series! For this series, we will speed through Survivor's 13th season, Survivor Cook Islands, covering a handful of episodes a…
 
The White House announces a Ransomware Task Force, how much money Microsoft has paid out to security researchers last year, Amazon rolls out encryption for Ring doorbells, how a backdoor in popular KiwiSDR product gave root to a project developer for years, Trickbot Malware returns with a new VNC Module to spy on its victims, and some of the absolu…
 
In this segment of Paul's Security Weekly, Paul and crew interview Jack Rhysider about how he got his start in Information Security, the projects and careers he worked on over the years, and how he transitioned from a Network Security Engineer to the host of Darknet Diaries Podcast. Segment Resources: https://darknetdiaries.com/ Visit https://www.s…
 
Eclypsium researchers identified vulnerabilities affecting the BIOSConnect feature within Dell Client BIOS. This disconnect impacted 129 Dell models of consumer and business laptops, desktops, and tablets, including devices protected by Secure Boot and Dell Secured-core PCs. With cyber-attacks on the rise, firmware security, while often overlooked,…
 
Against the ubiquitous backdrop of Zero Trust initiatives, we have all come to accept the motto of "Verify, then trust". Yet, here we are building an entire stack of Zero Trust enabled technologies, upon a broken implicit-trust foundation. Nowhere is this risk more apparent, than at the device and firmware level. Indeed this is why both nation-stat…
 
In the Enterprise News, Contrast Security partners with Secure Code Warrior, Bandura releases the Cyber Intelligence Marketplace, Illumio beefs up zero-trust security with automated policy enforcement, Rapid7 Launches InsightCloudSec to Automate Continuous Security and Compliance, Leaked email shows Tanium just lost its fourth chief marketing offic…
 
Gas South and Extrahop have partnered to give Gas South visibility in areas of the network that are normally invisible or dark to the regular network team. To learn more about ExtraHop, visit: https://securityweekly.com/extrahop Visit https://www.securityweekly.com/esw for all the latest episodes! Show Notes: https://securityweekly.com/esw234…
 
We'll start with a brief discussion of what HIPAA and is not (e.g., it's doesn't prevent your employer from ask you about your health). Then discuss recent developments like ongoing how ransomware attacks are targeting healthcare and, when successful, are reportable breaches; and the recent final rule on interoperability and information blocking th…
 
We'll start with a brief discussion of what HIPAA and is not (e.g., it's doesn't prevent your employer from ask you about your health). Then discuss recent developments like ongoing how ransomware attacks are targeting healthcare and, when successful, are reportable breaches; and the recent final rule on interoperability and information blocking th…
 
Every day brings news of more breaches and ransomware attacks. Why are organizations failing to protect themselves, and what can we do to combat these cybersecurity threats? Technological advances, such as XDR and AI-driven threat monitoring, offer a way to thwart attackers in an ever-evolving security landscape. Visit https://www.securityweekly.co…
 
In the Leadership and Communications section, 3 Things Every CISO Wishes You Understood, What is the BISO role and is it necessary?, Cyber insurance costs up by a third, and more! Visit https://www.securityweekly.com/bsw for all the latest episodes! Show Notes: https://securityweekly.com/bsw223
 
The truth is, most web app and API security tools were designed for a very different era. A time before developers and security practitioners worked together, before applications were globally distributed and API-based. But attackers are developers too, and they aren’t bogged down by the limitations of legacy solutions. It’s never been more clear t…
 
In the AppSec news, a password manager makes predictable mistakes, Trusted Types terminate DOM XSS, waking up from PrintNightmare, understanding hardware fault injections. Visit https://www.securityweekly.com/asw for all the latest episodes! Show Notes: https://securityweekly.com/asw157
 
This week MBT is busting out our questionable (and completely unspoiled) skills for Lucifer season 6. The main question is honestly: what will this season even be about? Are we really going to have god as a main character on a TV show? What would that even looks like? While we're on the subject, how would one even date god? All these questions and …
 
You know what, even if you don't listen to this podcast or pledge your monthly support, I already have a better prize. Because I found love here on Survivor. Her name is Candice. Welcome to our Survivor: Cook Islands mini-series! For this series, we will speed through Survivor's 13th season, Survivor Cook Islands, covering a handful of episodes at …
 
This week in the Security News: LinkedIn breach exposes user data, Why MTTR is Bad for SecOps, 3 Things Every CISO Wishes You Understood, USA as a Cyber Power, is ignorance bliss for hackers, flaws let you hack an ATM by waving your phone, PrintNightmare, Bitcoins from Banks and more! Visit https://www.securityweekly.com/psw for all the latest epis…
 
80% of SIM-Swap attacks are successful. This could lead to greater financial loss and loss of social status since this is where hackers latch onto. The statistics are true and spreading like a wildfire. Visit https://www.securityweekly.com/psw for all the latest episodes! Show Notes: https://securityweekly.com/psw701…
 
Deep dive on the data broker industry, and how new threats are stemming from the widespread availability of employee/personal information publicly for sale at data broker websites. Visit https://www.securityweekly.com/psw for all the latest episodes! Show Notes: https://securityweekly.com/psw701
 
Threat hunters are under increased pressure to rapidly analyze, classify, detect and respond to malicious files. ReversingLabs is stepping forward to address these needs with its new Malware Lab Solution. The ReversingLabs Malware Lab solution powers the next generation of threat hunting by delivering a unique combination of static and dynamic anal…
 
This week, In the Enterprise News, Atos launches thinkAI, AWS welcomes Wickr to the team, U.S. DoD approves two (ISC)² certifications as requirements for staff, JFrog to acquire Vdoo, & more! Visit https://www.securityweekly.com/esw for all the latest episodes! Show Notes: https://securityweekly.com/esw233…
 
More than 96% of software development projects fail across the globe because too many businesses rely on the legacy DevOps process which allows us to run security testing right before going to production. Using the legacy DevOps can lead to a downfall of the project management triangle (Budget, Scope, and Time). However, with more efficient use of …
 
We will review how synthetics are being utilized to perpetrate pandemic related frauds in the Payroll Protection Program and Unemployment Insurance. An overview of the government programs will take place with the controls that were in place, how they were compromised, by who and what you can do to remediate risk. Visit https://www.securityweekly.co…
 
We will review how synthetics are being utilized to perpetrate pandemic related frauds in the Payroll Protection Program and Unemployment Insurance. An overview of the government programs will take place with the controls that were in place, how they were compromised, by who and what you can do to remediate risk. Visit https://www.securityweekly.co…
 
Loading …

Guida rapida

Google login Twitter login Classic login