show episodes
 
Artwork
 
Undermine is the definitive Phish podcast. New season coming soon, building on what we've done—seasons on Phish’s genesis in the 1980s, the Phish community, the Baker's Dozen, and Fall '97. Through deep-dives into the music, shows and songs; interviews with people who were there; and discussion about Phish's lasting impact. Undermine is presented by Osiris Media.
  continue reading
 
Artwork

1
Analyze Phish

Earwolf & Harris Wittels, Scott Aukerman

Unsubscribe
Unsubscribe
Monthly
 
Harris and Scott are comedians, music lovers, and friends. Where do they differ? Harris loves Phish, and Scott does not. On Analyze Phish, Harris navigates the vast landscape of Phish's catalogue to find entry points for Scott while trying to explain the live Phish experience without the use of illegal substances.
  continue reading
 
Artwork
 
Insuphishient is a Phish podcast hosted by Matt and Nick, a 500 episodes series dedicated to the music, culture, and unique universe of the greatest band of all time. With no set setlists and no rules, each episode dives into the band, members, hilarious hot takes, and offbeat theories, creating a space for old heads and newcomers alike to enjoy the ride. Just two friends talking Phish, mostly... Expect the (un)expected.
  continue reading
 
Welcome to 'Phishing for the News'—the podcast that hooks you with the juiciest updates in cybersecurity, tech, and AI! From breaking breaches to the latest government moves on digital defense, we reel in the headlines you need to stay ahead in this ever-evolving digital world. So grab your virtual net, and let's dive into the deep end of tech and security news!
  continue reading
 
The Helping Friendly Podcast (HFPod) explores the music and fan experience of Phish, through interviews and deep dives on shows and tours. Since 2013, we’ve aimed to bring the fan voice into discussions about Phish, and with the help of our guests, we’re still discovering new angles of appreciation for the band. And when the band is on tour, we provide a review of every show the following day with a fan who was there. As one of our listeners said, “this show has impeccable analysis, stats, c ...
  continue reading
 
Artwork

1
Hidden Jukebox

Jake Amster and Matthew Amster-Burton

Unsubscribe
Unsubscribe
Monthly
 
Jake Amster and Matthew Amster-Burton, two Seattle music nerds and actual brothers, take you on an audio tour of the best albums of the 90s, from R.E.M. to T.L.C., Snoop Dogg to Phish.
  continue reading
 
Artwork
 
Chris Parker, the founder of WhatIsMyIPAddress.com, interviews guests and tells real-life stories about topics to open your eyes to the danger and traps lurking in the real world, ranging from online scams and frauds to everyday situations where people are trying to take advantage of you—for their gain and your loss. Our goal is to educate and equip you, so you learn how to spot the warning signs of trouble, take quick action, and lower the risk of becoming a victim.
  continue reading
 
Inside Wall Street with Morris Sachs and Liam Allen. Recommended viewing: The Sting Trading Places Groundhog Day YouTube: Charlie DiFrancesca Full Length Speech 1989 Recommended Reading: 1.Modern Times - Paul Johnson 2. Atlas Shrugged- Ayn Rand 3. *redacted* 4. Reminiscences of a Stock Operator- Edwin Lefevre 5. Lessons of History - Will Durant Daily Reading : Grant’s, GaveKal, Macro Tourist, Daily Shot, Anthony Peters, David Zervos, NYPost, FT, WSJ, NYT, SCMP, Chicago Tribune, Real Deal, Ze ...
  continue reading
 
Learn how to break into cybersecurity, build new skills and move up the career ladder. Each week on the Cyber Work Podcast, host Chris Sienko sits down with thought leaders from Carbon Black, IBM, CompTIA and others to discuss the latest cybersecurity workforce trends.
  continue reading
 
Artwork

1
8th Layer Insights

Perry Carpenter | N2K Networks

Unsubscribe
Unsubscribe
Monthly
 
Get ready for a deep dive into what cybersecurity professionals often refer to as the "8th Layer" of security: HUMANS. Welcome to 8th Layer Insights (8Li). This podcast is a multidisciplinary exploration into how the complexities of human nature affect security and risk. Author, security researcher, and behavior science enthusiast Perry Carpenter taps experts for their insights and illumination. Topics include cybersecurity, psychology, behavior science, communication, leadership, and more.
  continue reading
 
A weekly podcast providing fraud prevention and vendor setup training to protect the vendor master file. Immediate takeaways with actionable steps you can implement today into your vendor onboarding and maintenance process to reduce fraud and regulatory fines. Great tips for the Accounts Payable and Procurement teams to clean-up their vendor data, clean-up their vendor processes so that they can pay the right vendor.
  continue reading
 
Artwork
 
Cyber Uncut brings you the key decision makers and cutting edge innovators shaping Australia's cyber revolution. From cyber security to artificial intelligence and information systems, discover how businesses and government are navigating the transition to a digital future. Join Momentum Media’s Phil Tarrant, defence and national security podcaster, Major General (Ret’d) Dr Marcus Thompson AM – former head of the ADF’s Information Warfare Division, and Liam Garman, editor of Cyber Daily, as ...
  continue reading
 
Artwork
 
”Family Tape Tree” is a surreal and absurd fictional podcasted rooted in the world of the improvisational jam band, Phish. It follows Lexi, a sensitive and surly teen, who discovers her deceased father’s collection of Phish cassette tapes from the ’90s while packing for college. Through ”grief magic” Lexi travels into the tapes and relives those memories with younger versions of her parents and their friends. Over the course of several groove-based-psychedelic-infused-head-bobbing-adventures ...
  continue reading
 
Geared towards Deadheads, Phishheads and the jam band community, The Sound Podcast is a music discovery interview style podcast, hosted by Ira Haberman. Featuring Jam Bands and more... much more. Rooted in Americana, Blues, Bluegrass, Country, Folk, Funk, Jazz, Reggae, Rock, Soul but mostly Jam Band music. Here is a small sample of the guests that have been on The Sound Podcast to date: ALO, Anders Osborne, Antibalas, Aqueous, Band of Heathens, Barr Brothers, Blackberry Smoke, Chris Robinson ...
  continue reading
 
Artwork

1
Beyond The Pond

Beyond The Pond/Osiris Media

Unsubscribe
Unsubscribe
Monthly
 
Welcome to Beyond The Pond! We’re two massive Phish fans who are using the music of Phish to introduce you to new and interesting music we think you’ll love! Because we love the Phish. We are Phish fans. But sometimes you gotta break out of your comfort zone and go beyond the pond. A proud member of the Osiris Podcast Network. Hosted on Acast. See acast.com/privacy for more information.
  continue reading
 
A successful cyber-attack has taken your company off-line. The FBI and CISA have been contacted. What now? As you know, if this hasn’t already impacted your business (either directly or indirectly), it will. How can you make yourself a harder target, mitigating against cyber-attacks? What does all the terminology mean and why does it matter? What happens if an attack is successful? Join DTC, Inc. as we outline, in a straight-forward manner, many of the issues surrounding cyber security which ...
  continue reading
 
The definitive retrospective of one of music’s most memorable festivals, Phish’s Big Cypress. In December of 1999, Phish drew an estimated 80,000 to the Big Cypress Indian Reservation in Florida’s Everglades, making this festival the largest Millennium Eve concert on earth. We look back on the festival 20 years later—and examine the legacy for Phish and the music world. Hosted and narrated by Jesse Jarnow, this five-episode series draws on interviews with members of Phish and its crew, fan m ...
  continue reading
 
Artwork

1
The New Dad Rock

Steve Nelson & Keith Nottonson

Unsubscribe
Unsubscribe
Monthly
 
Two college radio DJs during the 90s, hosts Keith and Steve helped expose bands like Nirvana, Pavement and PJ Harvey. They went to shows, interviewed musicians and reviewed albums for various zines and papers. They worked security at concerts and once, even did load-in for Phish. Now they’re dads. Whether you want to explore lesser-known music or take a trip down memory lane, tune in to The New Dad Rock. Join hosts Keith and Steve as they navigate the ages together, sharing their love of mus ...
  continue reading
 
Strange tales of hacking, tech, internet grifters, AI, and security with Jordan & Scott. Are internet hitmen really a thing? What does someone do with a crypto wallet full of millions and a lost password? Did a Minecraft scammer really hack the president? Hacked is a technology show about people hacking things together and apart, with your old pals Jordan Bloemen and Scott Francis Winder. Get at us via get@hackedpodcast.com.
  continue reading
 
On Phemale-Centrics we discuss all things Phish from a woman's point of view. Join us as we interview Phish's community members, play games like "Market Price" and discuss the latest goings on in the Phish scene, both on-line and on Lot! Your host is Dawneebee! Co-hosts are a rotating cast of her phriends including Jillian, Kristie, Merry, Baker & Lauren and her husband Jason "Snakey". Hosted on Acast. See acast.com/privacy for more information.
  continue reading
 
Welcome to the This Happened Once Before, a conversation between generational Phish fans. I'm your host, Bill, a Phish fan for 30 years, and I started this podcast to have conversations with younger fans new to the band. We discuss how they found Phish, and what excites them most about the group and then we have a conversation about a show from the band's era from 1988-1996. Let's get the show on the road!
  continue reading
 
A weekly discussion of new developments and the latest cybersecurity threats, including ransomware, malware, phishing schemes, DDoS attacks and more, facing the U.S. industrial sector.
  continue reading
 
Loading …
show series
 
Here of some of the items covered in today's SecureResearch Cyber Intelligence Briefs: CISA is requesting public comment on a draft update to the National Cyber Incident Response Plan (NCIRP) by January 15, 2025. Siemens published a security advisory, AV24-719, for multiple vulnerabilities affecting industrial control systems. CISA released advisor…
  continue reading
 
Top 5 Phishing Exploits of 2024: Abnormal Security Report and More | Cybersecurity Today In this episode of Cybersecurity Today, host Jim Love delves into Abnormal Security's end-of-year report outlining the top five phishing exploits of 2024 and their predictions for 2025. The episode covers cryptocurrency fraud, weaponized file sharing services, …
  continue reading
 
Get your FREE Cybersecurity Salary Guide: https://www.infosecinstitute.com/form/cybersecurity-salary-guide-podcast/?utm_source=audio&utm_medium=podcast&utm_campaign=podcast In this episode of Cyberwork Hacks, host Chris Sienko speaks with James Stanger from CompTIA about the CySA+ certification, designed for aspiring cybersecurity analysts. They di…
  continue reading
 
It's Monday and Matt and Nick are back on the mic. Today's Show is a good one. Nick relives moments of emotional damage from and 8th grade dance. Matt falls asleep and when he wakes up thinks it the year 2042. After all that they talk about Page and a sneaky secret album. Tune in NOW!!! If you are new always listen to the latest show first!…
  continue reading
 
Here are some key points from the SecureResearch cybersecurity intelligence briefs: Multiple vulnerabilities were found in widely used software like Suricata, the Linux Kernel (Red Hat, Ubuntu, and SUSE), Microsoft Edge, and IBM Products. The Italian Computer Security Incident Response Team (CSIRT Italy) released its weekly cybersecurity bulletin c…
  continue reading
 
As part of the Osiris Phish podcast ‘October Project’, along with Beyond the Pond and HF Pod, we are examining Phish’s epic Fall 2000 tour. In this second of two episodes, Tom interviews John Paluska who was Phish’s first manager. John sheds light on Phish’s decision to take their first hiatus after playing hard on the road for 17 years. Originally…
  continue reading
 
PumaKit Linux Rootkit, Windows Defender Flaw, and Android Malware Outbreak! In today's episode of Cybersecurity Today, host Jim Love delves into the discovery of the advanced Linux rootkit PumaKit, critical vulnerabilities in Microsoft's Windows Defender, a new multi-platform malware campaign downgrading browser security, and Germany's recent outbr…
  continue reading
 
It's been a wacky one. In this very loose year in review, we discuss adversarial agents being gamified for fun an profit, DNA companies changing ownership and what it means for your data, and take a tour through some of the biggest tech, hacking, AI, and security stories of the year. And yes, I'm aware we never actually revisit the intro story duri…
  continue reading
 
Here are some of the items covered in this week's SecureResearch Daily Cyber Intelligence Briefs: Multiple critical vulnerabilities were discovered across various widely used software products, including Ivanti, Google Chrome, Adobe products, and Microsoft Windows and Office. Organizations must prioritize patching these systems to mitigate the risk…
  continue reading
 
Featured Songs: 10-22-22 - Neighbor - Cucamonga Carl - State Theatre - Portland, ME 12-03-22 - Karina Rykman - City Kids - Nectar's - Burlington, VT 12-03-22 - Eggy - Sussudio - Old Town Pub - Steamboat Springs, CO 12-09-22 - Billy Strings - Dark Hollow - The Academy - Dublin, IRL 12-10-22 - Orebolo - Hungersite - Vilar Center for Performing Arts -…
  continue reading
 
Live Insuphishient Volume 2 was recorded live on September 17, 2021, and is being re-released on 12/13/24 as part of the Insuphishient Archival Series. This episode was hosted in Matt’s basement, located in Insuphishient’s home state of Massachusetts. It marked the grand finale of the podcast’s wildly ambitious 2021 pilot season. Earlier that year,…
  continue reading
 
Phishing for the News is brought to you by SecureResearch and based on the SecureResearch Daily Cyber Intelligence Brief. Here are some of the details of what we cover in today's brief: Siemens products have multiple critical vulnerabilities. Apple products have been found to have multiple vulnerabilities that could allow attackers to remotely exec…
  continue reading
 
As part of the Osiris Phish podcast ‘October Project’, along with Beyond the Pond and HF Pod, we are examining Phish’s epic Fall 2000 tour. In this first of two episodes, Tom interviews Andy Gadiel, the founder of Jambase, who was at every show for the latter part of this tour. Andy sheds light from the audience perspective on what it meant to have…
  continue reading
 
What is Makani’s favorite way to send money to friends and family, and why? Which disturbing Venmo privacy setting has been causing problems for years? What major PayPal policy change is coming next summer? links: Get Weekly 1-Minute Security Tips Make your Venmo transactions private Opt out of PayPal selling your data I Know What You Did on Venmo …
  continue reading
 
Note: We're posting Perry's new show, "The FAIK Files", to this feed through the end of the year. This will give you a chance to get a feel for the new show and subscribe to the new feed if you want to keep following in 2025. Welcome back to The FAIK Files--- the show about artificial intelligence and natural nonsense! In this week's episode: Mason…
  continue reading
 
We dive into a season-long discussion of Stephen Batchelor's "After Buddhism: Rethinking the Dharma for a Secular Age". Feel free to listen even if you don't have the book, but you may get the most out of reading along with us. Support the show Our website is lamataboot.com, Instagram: @lamataboot, and YouTube: @lamataboot Find Lama Adam at lamaada…
  continue reading
 
In this episode of the Cyber Uncut podcast, hosts David Hollingworth and Daniel Croft discuss a widespread hacking campaign by a network of hacktivist groups and an alleged data breach impacting United States Marine Corps personnel. The pair also catch up on the evolving case of the apparent assassination of UnitedHealthcare’s CEO and talk about th…
  continue reading
 
Today we're celebrating the #2 tour of all time (ranked #1 by fans) of the Top 25 Tours. Get your dancing shoes on, and let's dive into the funk. We've had so much fun with this series, we hope you have too. Please give us a call at (484) 416-0488 and leave us your thoughts and questions! And give us a review wherever you listen to podcasts. The He…
  continue reading
 
As we begin to close out 2024 and look ahead to 2025, I couldn’t resist the urge to revisit some of my favorite guests from the last couple of months. While I’m grateful for everyone we’ve had on the show, and all the support we continue to receive from the industrial cybersecurity community, I felt these comments were worth another listen, with sp…
  continue reading
 
Featured Songs: 00:38 - Leftover Salmon - 11-29-24 - Sailin’ Shoes - Boulder Theatre - Boulder, CO (with Sam Bush, Luke Black and Torrin Daniels) 11:20 - Eggy - 11-29-24 - Black Friday > Bird Song > Black Friday > Bird Song > Black Friday - Capitol Theatre - Port Chester, NY (with Dogs in a Pile) 38:19 - Billy Strings - 12-06-24 - My Alice - FedEx …
  continue reading
 
Live Insuphishient Vol. 1 was recorded live in Boston, Massachusetts, on September 27, 2021. The episode was part of the podcast's debut season, which featured an ongoing game where Nick and Matt attempted to stump each other with increasingly obscure Phish trivia. The second segment begins with Matt issuing a controversial hot take that Nick could…
  continue reading
 
Our podcast contains a summary of our daily intelligence report. Here are some of the items included this morning: Multiple critical vulnerabilities have been found in widely used software products, requiring immediate action to mitigate risks. These vulnerabilities affect products from vendors like Ivanti, Google, Microsoft, Adobe, Apple, HPE Arub…
  continue reading
 
Are you and your team members making confirmation calls to your vendors to confirm remittance information? If so, are you using confirmation call scripts? See how they can be valuable to prevent fraud and make the person receiving the call more apt to confirm their information. This is the 4th episode in this series of 5. Keep listening. Check out …
  continue reading
 
In this episode of the Contested Ground podcast, special host Steve Kuper is joined by co-host Major General (Ret’d) Marcus Thompson and AMP’s chief economist, Shane Oliver, to discuss the latest economic data and what it means for the nation’s economic and national security. The trio discuss the recently released Australian gross domestic product …
  continue reading
 
In this podcast Tom Uren and Patrick Gray talk about the US Federal Communications Commission effort to get US telcos to lift their security game and compares it to UK and Australian efforts. The US is very late to the game, and improving security is a huge job. They also talk about Chinese cyber actors continuing to pointlessly sow chaos and how a…
  continue reading
 
In the latest episode of Safe Mode, Greg Otto talks with Emily Crose about her new book “Hack to The Future: How World Governments Relentlessly Pursue and Domesticate Hackers.” Emily explains how the US government managed to weaponize a subculture widely seen as misanthropic and awkward into a lever of power that now has far-reaching geopolitical i…
  continue reading
 
Today's podcast covers some of the major cybersecurity items covered in the SecureResearch Daily Cybersecurity Intelligence brief. Our full brief contains details on the following items and more: Urgent Microsoft Update: Critical Remote Code Execution Vulnerabilities Patched Critical Adobe Products Flaws Permit Unrestricted Code Execution Schneider…
  continue reading
 
When a recruiter contacts you, it’s essential to do your homework, verify their sources, and trust your instincts. If something seems too good to be true, it probably is. While it can be frustrating to be this skeptical, being cautious can protect you and your finances. Today’s guest is John Sidoti. John is the Senior Director of Information Techno…
  continue reading
 
SEC Cyber Disclosure Rules, Deloitte Hack Denial, and Critical Microsoft & SAP Patches | Cybersecurity Today In this episode of Cybersecurity Today, host Jim Love delves into the ongoing confusion and compliance struggles faced by companies one year after the SEC's cyber disclosure rules were introduced. We analyze a BreachRx report revealing that …
  continue reading
 
Send us a text Hi everybody and welcome to today’s episode of Attendance Bias. I am your host, Brian Weinstein. Today’s guest, Cris Coey, chose to speak about Phish’s show at the Rupp Arena in Lexington, Kentucky from November 7, 1996. It’s a show that is famous in Phish history for mostly one reason–the long, multi-faceted version of Bathtub Gin t…
  continue reading
 
On a very special episode of Insuphishient, Matt and Nick celebrate Matt's special day and absolutely don't talk about anything else. Well accept Phish. They talked about Phish a lot actually. Going backwards does the debut line Nick and Matt go over the last 3 years of debuts in a new segment that will return as the shows go on. Enjoy! If you are …
  continue reading
 
Loading …

Quick Reference Guide