show episodes
 
Artwork
 
Cousins By Blood is a true crime podcast investigation, unfolding episode by episode. In 2000, Ivan Cantu was arrested for the murders of his cousin James Mosqueda and Amy Kitchen, James's fiancé. Now 20 years later, questions about Ivan's guilt or innocence remain and the case has been reinvestigated. New suspects are uncovered, new evidence has been discovered, and the clock is ticking to Ivan's Execution Day.
  continue reading
 
This is a podcast dedicated to answering your questions about mental health, anxiety, depression, relationships, sex, and life WITHOUT psychobabble BS. I am Dr. Robert Duff, a psychologist from Southern California, but I'm also a regular dude who legitimately wants to help out. I wrote the best selling books Hardcore Self Help: F**k Depression and Hardcore Self Help: F**K Anxiety. Those are available at http://hardcoreselfhelp.com
  continue reading
 
As a certified holistic health and nutrition coach, I created this podcast for anyone who desires to improve physically, emotionally and spiritually. I’ll be interviewing experts and sharing tips and tricks that have helped not only my clients but that have guided me on my own transformational journey. I believe that we all have a greatness that lies within - we just need to uncover it.
  continue reading
 
Artwork

1
Seattle Today

Seattle Today

icon
Unsubscribe
icon
Unsubscribe
Monthly
 
It's Seattle Today! This is a show featuring the stories and experiences of Artists, Musicians, and Entertainment Industry Workers who call Seattle, Washington home.
  continue reading
 
Artwork
 
Hosted by Matt Stocks (Ex-Kerrang! Radio, Metal Hammer, Classic Rock & Scuzz TV) Life In The Stocks features unedited, in-depth, candid conversations with musicians, actors, comedians & creatives. Hosted on Acast. See acast.com/privacy for more information.
  continue reading
 
Artwork
 
Welcome to the Security Weekly Podcast Network, your all-in-one source for the latest in cybersecurity! This feed features a diverse lineup of shows, including Application Security Weekly, Business Security Weekly, Paul's Security Weekly, Enterprise Security Weekly, and Security Weekly News. Whether you're a cybersecurity professional, business leader, or tech enthusiast, we cover all angles of the cybersecurity landscape. Tune in for in-depth panel discussions, expert guest interviews, and ...
  continue reading
 
Artwork
 
RESTAURANT READY: THE BLUEPRINT FOR SUCCESS IN THE HOSPITALITY INDUSTRY Restaurant Ready is your backstage pass to the inner workings of the hospitality industry’s brightest stars. This podcast promises authentic discussions with the most influential chefs, restaurateurs, and food media experts. Award-winning chef, restaurateur, and cookbook author Matt Jennings, along with the MAJC team, helm this weekly podcast. In each episode, industry veterans sit down for candid conversations revealing ...
  continue reading
 
Loading …
show series
 
Norman Van Aken is a celebrated chef and restaurateur known for introducing fusion into global cookery. He pioneered New World Cuisine, a fusion of Latin, Caribbean, Asian American, and African flavors. Van Aken's career has been decorated with awards and accolades, including being inducted into the James Beard Foundation list of who's who in Ameri…
  continue reading
 
Curl and libcurl are everywhere. Not only has the project maintained success for almost three decades now, but it's done that while being written in C. Daniel Stenberg talks about the challenges in dealing with appsec, the design philosophies that keep it secure, and fostering a community to create one of the most recognizable open source projects …
  continue reading
 
In 2011, Marc Andreessen predicted that software would eat the world. Specifically, the prediction was that software companies would take over the economy and disrupt all industries. The economic prediction has mostly come true, with 9 out of 10 of the most highly valued companies being tech companies. The industry disruption didn't materialize in …
  continue reading
 
The Final Chapter The Collin County Courthouse Rally (Death Penalty Action Live Stream) https://www.youtube.com/live/ZdfHTb9YPIM?si=Snz4PkdNNNJfTGwc Tammy's Eulogy from Ivan https://www.facebook.com/story.php?story_fbid=1027871238845388&id=100048675650967&mibextid=wwXIfr&rdid=kTV5ioPm9smKyF97# PATREON https://www.patreon.com/cousinsbyblood DONATE h…
  continue reading
 
In this episode of The Hardcore Self Help Podcast, I sit down with the incredible psychotherapist and author, Terri Cole, to discuss high-functioning codependency, boundaries, and how we can break free from people-pleasing tendencies. Terri shares her own journey from working in the entertainment industry to becoming a therapist and how her persona…
  continue reading
 
Apple, the UK, and data protection, you can get pwned really fast, Australia says no Kaspersky for you!, the default password is on the Internet, topological qubits, dangerous AI tools, old software is not just old but vulnerable too, tearing down Sonic Walls, CWE is good but could be great, updating your pi-hole, should you watch "Zero Day"? my no…
  continue reading
 
This week: CISOs struggling to balance security, business objectives, Signs Your Organization’s Culture is Hurting Your Cybersecurity, Servant Leadership: Putting Trust at the Center, and more! Visit https://www.securityweekly.com/bsw for all the latest episodes! Show Notes: https://securityweekly.com/bsw-384…
  continue reading
 
Alex Stupak is a chef and co-owner of the Empellón restaurant group in New York City. He has a unique approach to cooking that challenges traditional views of cuisine. He focuses on allowing all cuisines to explore and evolve, rather than being limited by tradition or authenticity. Alex has opened multiple restaurants under the Empellón brand, with…
  continue reading
 
Minimizing latency, increasing performance, and reducing compile times are just a part of what makes a development environment better. Throw in useful tests and some useful security tools and you have an even better environment. Dan Moore talks about what motivates some developers to prefer a "local first" approach as we walk through what all of th…
  continue reading
 
In this interview, we're excited to have Ilona Cohen to help us understand what changes this new US administration might bring, in terms of cybersecurity regulation. Ilona's insights come partially from her own experiences working from within the White House. Before she was the Chief Legal Officer of HackerOne, she was a senior lawyer to President …
  continue reading
 
Episode 431: Pathological Demand Avoidance in Coaching & Persistent Depression Welcome to another episode of the Hardcore Self Help Podcast with Dr. Robert Duff! In this Q&A episode, Dr. Duff tackles two insightful listener questions on very different but equally important mental health topics. Question 1: Pathological Demand Avoidance (PDA) in Coa…
  continue reading
 
Application, user, and data security are the three core components of every security program, but data is really what attackers want. In order to protect that data, we need to know where it is and what it's used for. Easier said than done. In this Say Easy, Do Hard segment, we tackle data inventory and classification. In part 1, we discuss the chal…
  continue reading
 
Chef Karen Akunowicz, a renowned chef and restaurateur, shares her passion for owning her own restaurant and the challenges she faced in making that dream a reality. Karen also talks about the importance of having a clear vision and a good business sense when starting a new venture. She emphasizes the value of having a supportive team and the role …
  continue reading
 
We're getting close to two full decades of celebrating web hacking techniques. James Kettle shares which was his favorite, why the list is important to the web hacking community, and what inspires the kind of research that makes it onto the list. We discuss why we keep seeing eternal flaws like XSS and SQL injection making these lists year after ye…
  continue reading
 
We've got a few compelling topics to discuss within SecOps today. First, Tim insists it's possible to automate a large amount of SecOps work, without the use of generative AI. Not only that, but he intends to back it up by tracking the quality of this automated work with an ISO standard unknown to cybersecurity. I've often found useful lessons and …
  continue reading
 
You can install Linux in your PDF, just upload everything to AI, hackers behind the forum, TP-Link's taking security seriously, patche Tuesday for everyone including Intel, AMD, Microsoft, Fortinet, and Ivanti, hacking your space heater for fun and fire, Cybertrucks on fire (or not), if you could just go ahead and get rid of the buffer overflows, s…
  continue reading
 
This week, we tackle a ton of leadership and communications articles: Why CISOs and Boards Must Speak the Same Language on Cybersecurity, The Hidden Costs of Not Having a Strong Cybersecurity Leader, Why Cybersecurity Is Everyone’s Responsibility, Leadership is an Action, not a Position, and more! Visit https://www.securityweekly.com/bsw for all th…
  continue reading
 
Duff Goldman isn’t just a baker—he’s a creative force, a rule-breaker, and a storyteller, all rolled into one. From the wild success of Ace of Cakes to mentoring the next generation of bakers on Kids Baking Championship, Duff has carved out a career that’s as sweet as it is inspiring. In this conversation, he pulls back the curtain on his journey, …
  continue reading
 
Code scanning is one of the oldest appsec practices. In many cases, simple grep patterns and some fancy regular expressions are enough to find many of the obvious software mistakes. Scott Norberg shares his experience with encountering code scanners that didn't find the .NET vuln classes he needed to find and why that led him to creating a scanner …
  continue reading
 
Spoiler: it's probably in your pocket or sitting on the table in front of you, right now! Modern smartphones are conveniently well-suited for identity verification. They have microphones, cameras, depth sensors, and fingerprint readers in some cases. With face scanning quickly becoming the de facto technology used for identity verification, it was …
  continue reading
 
Episode 430: Integrative Approaches to Recovery with Dr. Malasri Chaudhery-Malgeri In this episode of The Hardcore Self Help Podcast, I sit down with Dr. Malasri Chaudhery-Malgeri, also known as Dr. Mala, to discuss her integrative approach to addiction recovery, rehabilitation, and mental health treatment. Dr. Mala shares her personal journey that…
  continue reading
 
Deepseek troubles, AI models explained, AMD CPU microcode signature validation, what happens when you leave an AWS S3 bucket laying around, 3D printing tips, and the malware that never was on Ethernet to USB adapters. Visit https://www.securityweekly.com/psw for all the latest episodes! Show Notes: https://securityweekly.com/psw-860…
  continue reading
 
From online banking to mobile payments, nearly every aspect of our financial lives relies on digital systems. This reliance has brought incredible convenience, but it also means that any disruption — whether due to cyberattacks, system failures, or operational incidents— can have severe consequences. The Digital Operational Resilience Act (DORA) pr…
  continue reading
 
Threat modeling has been in the appsec toolbox for decades. But it hasn't always been used and it hasn't always been useful. Sandy Carielli shares what she's learned from talking to orgs about what's been successful, and what's failed, when they've approached this practice. Akira Brand joins to talk about her direct experience with building threat …
  continue reading
 
Celebrating and Elevating Women in Cyber: Recently, International Women in Cyber Day (September 1) highlighted the ongoing challenges women face in the cybersecurity field, as well as the progress made in recent years. Women bring exceptional skills and knowledge to cybersecurity; however, it is estimated that they make up only 20% to 25% of the cy…
  continue reading
 
In this solo Q&A episode of the Hardcore Self Help Podcast, I answer two deeply personal and important listener questions. The first comes from a trans man struggling with the impact of anti-LGBTQ+ legislation, fear for his safety, and overwhelming feelings of hopelessness. We talk about tangible ways to navigate the stress of doomscrolling, findin…
  continue reading
 
This week, we talked to our friends at Bitwarden about password vaults, storing more than just passwords, free software to manage those SSH keys, and vaults for developers. In the news, new/old Palo Alto vulnerabilities explained, taking down the power grid with a FlipperZero, more vulnerable bootloaders, putting garbage in your .ASS file, the US G…
  continue reading
 
The last five weeks have seen a flurry of news on Artificial Intelligence, especially this last week. It started on December 17, 2024 when the Bipartisan House Task Force on Artificial Intelligence (AI) released a report on “[g]uiding principles, forward-looking recommendations, and policy proposals to ensure America continues to lead the world in …
  continue reading
 
A lot of AI security boils down to the boring, but important, software security topics that appsec teams have been dealing with for decades. Niv Braun explains the distinctions between AI-related and AI-specific security as we avoid the FUD and hype of genAI to figure out where appsec teams can invest their time. He notes that data scientists have …
  continue reading
 
HackerOne's co-founder, Michiel Prins walks us through the latest new offensive security service: AI red teaming. At the same time enterprises are globally trying to figure out how to QA and red team generative AI models like LLMs, early adopters are challenged to scale these tests. Crowdsourced bug bounty platforms are a natural place to turn for …
  continue reading
 
In today’s episode of the Hardcore Self Help Podcast, I sit down with world-renowned psychiatrist, author, and DBT expert Dr. Blaise Aguirre to tackle the complex topic of self-hatred. As a pioneer in the treatment of borderline personality disorder (BPD) and adolescent mental health at McLean Hospital, Dr. Aguirre offers a compassionate and illumi…
  continue reading
 
Loading …

Quick Reference Guide

Listen to this show while you explore
Play