Cousins By Blood is a true crime podcast investigation, unfolding episode by episode. In 2000, Ivan Cantu was arrested for the murders of his cousin James Mosqueda and Amy Kitchen, James's fiancé. Now 20 years later, questions about Ivan's guilt or innocence remain and the case has been reinvestigated. New suspects are uncovered, new evidence has been discovered, and the clock is ticking to Ivan's Execution Day.
…
continue reading
This is a podcast dedicated to answering your questions about mental health, anxiety, depression, relationships, sex, and life WITHOUT psychobabble BS. I am Dr. Robert Duff, a psychologist from Southern California, but I'm also a regular dude who legitimately wants to help out. I wrote the best selling books Hardcore Self Help: F**k Depression and Hardcore Self Help: F**K Anxiety. Those are available at http://hardcoreselfhelp.com
…
continue reading
As a certified holistic health and nutrition coach, I created this podcast for anyone who desires to improve physically, emotionally and spiritually. I’ll be interviewing experts and sharing tips and tricks that have helped not only my clients but that have guided me on my own transformational journey. I believe that we all have a greatness that lies within - we just need to uncover it.
…
continue reading
A podcast diving deep into Apple Arcade. Hear from the developers creating the games for Apple Arcade. Hosted on Acast. See acast.com/privacy for more information.
…
continue reading
It's Seattle Today! This is a show featuring the stories and experiences of Artists, Musicians, and Entertainment Industry Workers who call Seattle, Washington home.
…
continue reading
Hosted by Matt Stocks (Ex-Kerrang! Radio, Metal Hammer, Classic Rock & Scuzz TV) Life In The Stocks features unedited, in-depth, candid conversations with musicians, actors, comedians & creatives. Hosted on Acast. See acast.com/privacy for more information.
…
continue reading
Welcome to the Security Weekly Podcast Network, your all-in-one source for the latest in cybersecurity! This feed features a diverse lineup of shows, including Application Security Weekly, Business Security Weekly, Paul's Security Weekly, Enterprise Security Weekly, and Security Weekly News. Whether you're a cybersecurity professional, business leader, or tech enthusiast, we cover all angles of the cybersecurity landscape. Tune in for in-depth panel discussions, expert guest interviews, and ...
…
continue reading
RESTAURANT READY: THE BLUEPRINT FOR SUCCESS IN THE HOSPITALITY INDUSTRY Restaurant Ready is your backstage pass to the inner workings of the hospitality industry’s brightest stars. This podcast promises authentic discussions with the most influential chefs, restaurateurs, and food media experts. Award-winning chef, restaurateur, and cookbook author Matt Jennings, along with the MAJC team, helm this weekly podcast. In each episode, industry veterans sit down for candid conversations revealing ...
…
continue reading

1
Tastovision, Trufflepig, Cisco, Windows, VSCode, OT, SQL Server, Android, Josh Marpet - SWN #456
35:33
35:33
Play later
Play later
Lists
Like
Liked
35:33Tastovision, Trufflepig, Cisco, Windows, VSCode, OT, SQL Server, Android, Josh Marpet, and more on the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-456
…
continue reading

1
Norman Van Aken on Saying 'No' as a Marketing Tool
34:49
34:49
Play later
Play later
Lists
Like
Liked
34:49Norman Van Aken is a celebrated chef and restaurateur known for introducing fusion into global cookery. He pioneered New World Cuisine, a fusion of Latin, Caribbean, Asian American, and African flavors. Van Aken's career has been decorated with awards and accolades, including being inducted into the James Beard Foundation list of who's who in Ameri…
…
continue reading

1
Keeping Curl Successful and Secure Over the Decades - Daniel Stenberg - ASW #320
1:09:02
1:09:02
Play later
Play later
Lists
Like
Liked
1:09:02Curl and libcurl are everywhere. Not only has the project maintained success for almost three decades now, but it's done that while being written in C. Daniel Stenberg talks about the challenges in dealing with appsec, the design philosophies that keep it secure, and fostering a community to create one of the most recognizable open source projects …
…
continue reading

1
First Do No Harm - Security Challenges in Healthcare - Ed Gaudet, Tanya Janca - ESW #396
2:02:30
2:02:30
Play later
Play later
Lists
Like
Liked
2:02:30In 2011, Marc Andreessen predicted that software would eat the world. Specifically, the prediction was that software companies would take over the economy and disrupt all industries. The economic prediction has mostly come true, with 9 out of 10 of the most highly valued companies being tech companies. The industry disruption didn't materialize in …
…
continue reading
The Final Chapter The Collin County Courthouse Rally (Death Penalty Action Live Stream) https://www.youtube.com/live/ZdfHTb9YPIM?si=Snz4PkdNNNJfTGwc Tammy's Eulogy from Ivan https://www.facebook.com/story.php?story_fbid=1027871238845388&id=100048675650967&mibextid=wwXIfr&rdid=kTV5ioPm9smKyF97# PATREON https://www.patreon.com/cousinsbyblood DONATE h…
…
continue reading

1
Mr. Kurtzmann, Boffins gone Wild, Grasscall, Vo1d, CE, Shadowpad, Aaran Leyland... - SWN #455
30:29
30:29
Play later
Play later
Lists
Like
Liked
30:29Mr. Kurtzmann, Boffins gone Wild, Grasscall, Vo1d, Windows CE, Shadowpad, Aaran Leyland, and More, on this edition of the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-455
…
continue reading

1
432: What is High-Functioning Codependency? Terri Cole
1:09:21
1:09:21
Play later
Play later
Lists
Like
Liked
1:09:21In this episode of The Hardcore Self Help Podcast, I sit down with the incredible psychotherapist and author, Terri Cole, to discuss high-functioning codependency, boundaries, and how we can break free from people-pleasing tendencies. Terri shares her own journey from working in the entertainment industry to becoming a therapist and how her persona…
…
continue reading

1
Zero Days Are Not Just Fiction - PSW #863
1:49:19
1:49:19
Play later
Play later
Lists
Like
Liked
1:49:19Apple, the UK, and data protection, you can get pwned really fast, Australia says no Kaspersky for you!, the default password is on the Internet, topological qubits, dangerous AI tools, old software is not just old but vulnerable too, tearing down Sonic Walls, CWE is good but could be great, updating your pi-hole, should you watch "Zero Day"? my no…
…
continue reading

1
CISOs Struggling, Culture Hurting, But Cybersecurity Salaries Stay Competitive - BSW #384
43:25
43:25
Play later
Play later
Lists
Like
Liked
43:25This week: CISOs struggling to balance security, business objectives, Signs Your Organization’s Culture is Hurting Your Cybersecurity, Servant Leadership: Putting Trust at the Center, and more! Visit https://www.securityweekly.com/bsw for all the latest episodes! Show Notes: https://securityweekly.com/bsw-384…
…
continue reading

1
Cronenbergs, Dangling Twitchbots, Crypto, Kaspersky, SMS, OT, Josh Marpet... - SWN #454
25:34
25:34
Play later
Play later
Lists
Like
Liked
25:34Cronenbergs, Dangling Twitchbots, Crypto, Kaspersky, SMS, OT, Josh Marpet, and more on the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-454
…
continue reading

1
Alex Stupak on Why Restaurants Need to Find the Right Location or They're Screwed
41:42
41:42
Play later
Play later
Lists
Like
Liked
41:42Alex Stupak is a chef and co-owner of the Empellón restaurant group in New York City. He has a unique approach to cooking that challenges traditional views of cuisine. He focuses on allowing all cuisines to explore and evolve, rather than being limited by tradition or authenticity. Alex has opened multiple restaurants under the Empellón brand, with…
…
continue reading

1
Developer Environments, Developer Experience, and Security - Dan Moore - ASW #319
1:10:21
1:10:21
Play later
Play later
Lists
Like
Liked
1:10:21Minimizing latency, increasing performance, and reducing compile times are just a part of what makes a development environment better. Throw in useful tests and some useful security tools and you have an even better environment. Dan Moore talks about what motivates some developers to prefer a "local first" approach as we walk through what all of th…
…
continue reading

1
The Future of Cyber Regulation in the New Administration - Ilona Cohen, Jenn Gile - ESW #395
1:58:52
1:58:52
Play later
Play later
Lists
Like
Liked
1:58:52In this interview, we're excited to have Ilona Cohen to help us understand what changes this new US administration might bring, in terms of cybersecurity regulation. Ilona's insights come partially from her own experiences working from within the White House. Before she was the Chief Legal Officer of HackerOne, she was a senior lawyer to President …
…
continue reading

1
False Claims Act, Google Cloud PQC, Salt Typhoon, AI in SOC, Ivanti Flaws, ICS, DeFi - SWN #453
30:41
30:41
Play later
Play later
Lists
Like
Liked
30:41On this edition of the Security Weekly News: False Claims Act, Google Cloud PQC, Salt Typhoon, AI in SOC, Ivanti Flaws, ICS, DeFi and more! Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-453
…
continue reading

1
431: Pathological Demand Avoidance & Persistent Low-Grade Depression
28:35
28:35
Play later
Play later
Lists
Like
Liked
28:35Episode 431: Pathological Demand Avoidance in Coaching & Persistent Depression Welcome to another episode of the Hardcore Self Help Podcast with Dr. Robert Duff! In this Q&A episode, Dr. Duff tackles two insightful listener questions on very different but equally important mental health topics. Question 1: Pathological Demand Avoidance (PDA) in Coa…
…
continue reading
Our thoughts on Zero Trust World, and just a little bit of news. Of course we covered some firmware and UEFI without Paul! Visit https://www.securityweekly.com/psw for all the latest episodes! Show Notes: https://securityweekly.com/psw-862
…
continue reading

1
Say Easy, Do Hard - Data Inventory and Classification, Part 1 - BSW #383
53:38
53:38
Play later
Play later
Lists
Like
Liked
53:38Application, user, and data security are the three core components of every security program, but data is really what attackers want. In order to protect that data, we need to know where it is and what it's used for. Easier said than done. In this Say Easy, Do Hard segment, we tackle data inventory and classification. In part 1, we discuss the chal…
…
continue reading

1
AI Threat Intelligence, AI Hacking, Data Breaches, Zhong, DOGE, and more - SWN #452
24:54
24:54
Play later
Play later
Lists
Like
Liked
24:54This week in the Security Weekly News: AI Threat Intelligence, AI Hacking, Data Breaches, Zhong, DOGE, and more! Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-452
…
continue reading

1
Karen Akunowicz on How Mundane Systems Help Restaurants Thrive
58:19
58:19
Play later
Play later
Lists
Like
Liked
58:19Chef Karen Akunowicz, a renowned chef and restaurateur, shares her passion for owning her own restaurant and the challenges she faced in making that dream a reality. Karen also talks about the importance of having a clear vision and a good business sense when starting a new venture. She emphasizes the value of having a supportive team and the role …
…
continue reading

1
Top 10 Web Hacking Techniques of 2024 - James Kettle - ASW #318
44:57
44:57
Play later
Play later
Lists
Like
Liked
44:57We're getting close to two full decades of celebrating web hacking techniques. James Kettle shares which was his favorite, why the list is important to the web hacking community, and what inspires the kind of research that makes it onto the list. We discuss why we keep seeing eternal flaws like XSS and SQL injection making these lists year after ye…
…
continue reading

1
Evolving the SOC: Automating Manual Work while Maintaining Quality at Scale - Allie Mellen, Tim MalcomVetter - ESW #394
1:55:17
1:55:17
Play later
Play later
Lists
Like
Liked
1:55:17We've got a few compelling topics to discuss within SecOps today. First, Tim insists it's possible to automate a large amount of SecOps work, without the use of generative AI. Not only that, but he intends to back it up by tracking the quality of this automated work with an ISO standard unknown to cybersecurity. I've often found useful lessons and …
…
continue reading

1
Bad Romance, Kimsuky, Red Mike, Ivanti, Nvidia, C code, Postgre, Aaran Leyland... - SWN #451
33:15
33:15
Play later
Play later
Lists
Like
Liked
33:15Tunnel of Love, Kimsuky, Red Mike, Ivanti, Nvidia, C code, Postgre, Aaran Leyland, and More, on this edition of the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-451
…
continue reading

1
Prompt Injection, CISA, Patch Tuesday - PSW #861
2:05:09
2:05:09
Play later
Play later
Lists
Like
Liked
2:05:09You can install Linux in your PDF, just upload everything to AI, hackers behind the forum, TP-Link's taking security seriously, patche Tuesday for everyone including Intel, AMD, Microsoft, Fortinet, and Ivanti, hacking your space heater for fun and fire, Cybertrucks on fire (or not), if you could just go ahead and get rid of the buffer overflows, s…
…
continue reading

1
Speak the Same Language, as Cybersecurity is Everyone's Responsibility - BSW #382
54:07
54:07
Play later
Play later
Lists
Like
Liked
54:07This week, we tackle a ton of leadership and communications articles: Why CISOs and Boards Must Speak the Same Language on Cybersecurity, The Hidden Costs of Not Having a Strong Cybersecurity Leader, Why Cybersecurity Is Everyone’s Responsibility, Leadership is an Action, not a Position, and more! Visit https://www.securityweekly.com/bsw for all th…
…
continue reading

1
PlayStation, KerioControl, SEC SimSWAP, 8base, Copilot, AI, Bird, Josh Marpet... - SWN #450
30:10
30:10
Play later
Play later
Lists
Like
Liked
30:10PlayStation, KerioControl, SEC SimSWAP, 8base, Copilot, AI, Robert Bird, Josh Marpet, and more on the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-450
…
continue reading
Duff Goldman isn’t just a baker—he’s a creative force, a rule-breaker, and a storyteller, all rolled into one. From the wild success of Ace of Cakes to mentoring the next generation of bakers on Kids Baking Championship, Duff has carved out a career that’s as sweet as it is inspiring. In this conversation, he pulls back the curtain on his journey, …
…
continue reading

1
Code Scanning That Works With Your Code - Scott Norberg - ASW #317
1:12:52
1:12:52
Play later
Play later
Lists
Like
Liked
1:12:52Code scanning is one of the oldest appsec practices. In many cases, simple grep patterns and some fancy regular expressions are enough to find many of the obvious software mistakes. Scott Norberg shares his experience with encountering code scanners that didn't find the .NET vuln classes he needed to find and why that led him to creating a scanner …
…
continue reading

1
The groundbreaking technology addressing employment scams and deepfakes - John Dwyer, Aaron Painter - ESW #393
1:49:44
1:49:44
Play later
Play later
Lists
Like
Liked
1:49:44Spoiler: it's probably in your pocket or sitting on the table in front of you, right now! Modern smartphones are conveniently well-suited for identity verification. They have microphones, cameras, depth sensors, and fingerprint readers in some cases. With face scanning quickly becoming the de facto technology used for identity verification, it was …
…
continue reading

1
AI Cheese, CISA, Scaryware, Kimsuky Returns, Backups, Encryption, Jason Wood... - SWN #449
35:02
35:02
Play later
Play later
Lists
Like
Liked
35:02AI Cheese, CISA, Scaryware, Kimsuky Returns, Backups, Encryption, Jason Wood, and More, on this edition of the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-449
…
continue reading

1
430: The Truth About Recovery with Dr. Mala
54:37
54:37
Play later
Play later
Lists
Like
Liked
54:37Episode 430: Integrative Approaches to Recovery with Dr. Malasri Chaudhery-Malgeri In this episode of The Hardcore Self Help Podcast, I sit down with Dr. Malasri Chaudhery-Malgeri, also known as Dr. Mala, to discuss her integrative approach to addiction recovery, rehabilitation, and mental health treatment. Dr. Mala shares her personal journey that…
…
continue reading

1
Deepseek, AMD, and Forgotten Buckets - PSW #860
2:06:54
2:06:54
Play later
Play later
Lists
Like
Liked
2:06:54Deepseek troubles, AI models explained, AMD CPU microcode signature validation, what happens when you leave an AWS S3 bucket laying around, 3D printing tips, and the malware that never was on Ethernet to USB adapters. Visit https://www.securityweekly.com/psw for all the latest episodes! Show Notes: https://securityweekly.com/psw-860…
…
continue reading

1
Enforcement of the Digital Operational Resilience Act (DORA) - Madelein van der Hout - BSW #381
1:02:04
1:02:04
Play later
Play later
Lists
Like
Liked
1:02:04From online banking to mobile payments, nearly every aspect of our financial lives relies on digital systems. This reliance has brought incredible convenience, but it also means that any disruption — whether due to cyberattacks, system failures, or operational incidents— can have severe consequences. The Digital Operational Resilience Act (DORA) pr…
…
continue reading

1
DeepSeek, Nicolas Cage, OpenAI, Hackers, Ransomware, Canada, Joshua Marpet and More - SWN #448
29:33
29:33
Play later
Play later
Lists
Like
Liked
29:33Today, we've got: DeepSeek, Nicolas Cage, OpenAI, Hackers, Ransomware, Canada, Joshua Marpet and More, on this edition of the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-448
…
continue reading

1
Threat Modeling That Helps the Business - Akira Brand, Sandy Carielli - ASW #316
1:11:39
1:11:39
Play later
Play later
Lists
Like
Liked
1:11:39Threat modeling has been in the appsec toolbox for decades. But it hasn't always been used and it hasn't always been useful. Sandy Carielli shares what she's learned from talking to orgs about what's been successful, and what's failed, when they've approached this practice. Akira Brand joins to talk about her direct experience with building threat …
…
continue reading

1
The Growth of Women in Cybersecurity Has Slowed - Why, and What Can We Do About It? - Lynn Dohm - ESW #392
2:11:49
2:11:49
Play later
Play later
Lists
Like
Liked
2:11:49Celebrating and Elevating Women in Cyber: Recently, International Women in Cyber Day (September 1) highlighted the ongoing challenges women face in the cybersecurity field, as well as the progress made in recent years. Women bring exceptional skills and knowledge to cybersecurity; however, it is estimated that they make up only 20% to 25% of the cy…
…
continue reading

1
.ASS, Deepseek, AI Time Travel, Google, HeartBlocker, TikTok, Aaran Leyland, and More - SWN #447
32:58
32:58
Play later
Play later
Lists
Like
Liked
32:58.ASS, Deepseek, AI Time Travel, Google, HeartBlocker, TikTok, Aaran Leyland, and More, on this edition of the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-447
…
continue reading

1
429: Coping with the Cruel World & Enduring Heartbreak
29:27
29:27
Play later
Play later
Lists
Like
Liked
29:27In this solo Q&A episode of the Hardcore Self Help Podcast, I answer two deeply personal and important listener questions. The first comes from a trans man struggling with the impact of anti-LGBTQ+ legislation, fear for his safety, and overwhelming feelings of hopelessness. We talk about tangible ways to navigate the stress of doomscrolling, findin…
…
continue reading

1
Cred Vaults, Cheap AI, and Hacking Devices - Matt Bishop - PSW #859
2:05:52
2:05:52
Play later
Play later
Lists
Like
Liked
2:05:52This week, we talked to our friends at Bitwarden about password vaults, storing more than just passwords, free software to manage those SSH keys, and vaults for developers. In the news, new/old Palo Alto vulnerabilities explained, taking down the power grid with a FlipperZero, more vulnerable bootloaders, putting garbage in your .ASS file, the US G…
…
continue reading

1
AI in 2025: The Shifting Regulatory Landscape For Artificial Intelligence - BSW #380
44:38
44:38
Play later
Play later
Lists
Like
Liked
44:38The last five weeks have seen a flurry of news on Artificial Intelligence, especially this last week. It started on December 17, 2024 when the Bipartisan House Task Force on Artificial Intelligence (AI) released a report on “[g]uiding principles, forward-looking recommendations, and policy proposals to ensure America continues to lead the world in …
…
continue reading

1
DeepSeek, AIDs, Sex Crime, Microsoft, PayPal, GitHub, Joshua Marpet and More - SWN #446
29:43
29:43
Play later
Play later
Lists
Like
Liked
29:43DeepSeek, AIDs, Sex Crime, Microsoft, PayPal, GitHub, Joshua Marpet and More, on this edition of the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-446
…
continue reading

1
Security the AI SDLC - Niv Braun - ASW #315
1:08:34
1:08:34
Play later
Play later
Lists
Like
Liked
1:08:34A lot of AI security boils down to the boring, but important, software security topics that appsec teams have been dealing with for decades. Niv Braun explains the distinctions between AI-related and AI-specific security as we avoid the FUD and hype of genAI to figure out where appsec teams can invest their time. He notes that data scientists have …
…
continue reading

1
AI Red Teaming Comes to Bug Bounties - Francis Dinha, Michiel Prins - ESW #391
2:07:23
2:07:23
Play later
Play later
Lists
Like
Liked
2:07:23HackerOne's co-founder, Michiel Prins walks us through the latest new offensive security service: AI red teaming. At the same time enterprises are globally trying to figure out how to QA and red team generative AI models like LLMs, early adopters are challenged to scale these tests. Crowdsourced bug bounty platforms are a natural place to turn for …
…
continue reading

1
Cursive Funk, Microsoft, Ivanti, Sonic Wall, Exchange, PowerSchool, Aaran Leyland... - SWN #445
32:01
32:01
Play later
Play later
Lists
Like
Liked
32:01Cursive Funk, Microsoft, Ivanti, Sonic Wall, Exchange, PowerSchool, Aaran Leyland, and More, on this edition of the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-445
…
continue reading

1
428: Overcoming Self-Hatred with Dr. Blaise Aguirre
1:09:33
1:09:33
Play later
Play later
Lists
Like
Liked
1:09:33In today’s episode of the Hardcore Self Help Podcast, I sit down with world-renowned psychiatrist, author, and DBT expert Dr. Blaise Aguirre to tackle the complex topic of self-hatred. As a pioneer in the treatment of borderline personality disorder (BPD) and adolescent mental health at McLean Hospital, Dr. Aguirre offers a compassionate and illumi…
…
continue reading