POPULARITY
Categories
American Institute of CPAs - Personal Financial Planning (PFP)
In this episode, Cary Sinnett is joined by renowned CPA and tax expert Bob Keebler to unpack the complexities of theft and casualty loss deductions under IRC Section 165. From pig butchering scams to IRA fraud and Ponzi schemes, this episode dives deep into the kinds of losses the IRS will—and won't—let you deduct, what qualifies as a profit motive, and how financial planners can guide their clients through one of the most emotionally and financially painful tax situations. Five Key Insights for CPA Financial Planners: Profit Motive Determines Deductibility To qualify under Section 165(c)(2), a theft or loss must stem from a transaction entered into for profit. Losses from romantic or emotional scams—where no profit motive exists—do not qualify. Five Scam Archetypes to Know A recent IRS CCA outlined five fraud scenarios: Compromised account scams Pig butchering (crypto fraud) Phishing and impersonation Romance scams Kidnapping/extortion schemes Only the first three had profit motives and were deductible. The IRA Trap: The Tax Hit Before the Scam If a client is duped into withdrawing funds from an IRA and then loses the money to a scam, they face a double blow—taxable income and no deductible loss. CPA advisors must flag this risk early. Documentation Is Critical for IRS Support To substantiate a theft loss, clients need: Bank records (e.g., wire transfers) Law enforcement reports A clear, detailed paper trail showing the loss and the attempt to recover funds Directing the IRS to the assigned FBI agent can strengthen the claim. Mitigation and Planning: Protecting Vulnerable Clients Encourage older or high-net-worth clients to follow a “1–2% rule” on risky investments. Foster opens dialogue with family members and advisors to prevent fraud and ensure support if it occurs. Access resources related to this podcast: Note: If you're using a podcast app that does not hyperlink to the resources, visit Libsyn (PFP) to access show notes with direct links. IRC Section 165 IRS CCA 2025-101015 (the ruling discussed) Revenue Procedure 2009-20 (Ponzi Scheme Safe Harbor) AICPA PFP Section Guiding your clients who are financial caregivers Scam Tracker Risk Report This episode is brought to you by the AICPA's Personal Financial Planning Section, the premier provider of information, tools, advocacy, and guidance for professionals who specialize in providing tax, estate, retirement, risk management and investment planning advice. Also, by the CPA/PFS credential program, which allows CPAs to demonstrate competence and confidence in providing these services to their clients. Visit us online to join our community, gain access to valuable member-only benefits or learn about our PFP certificate program. Subscribe to the PFP Podcast channel at Libsyn to find all the latest episodes or search “AICPA Personal Financial Planning” on your favorite podcast app.
Mark Carney COMPROMISED Says Pierre Poilievre Over Liberal MP China ScandalBecome a supporter of this podcast: https://www.spreaker.com/podcast/radio-baloney-the-richie-baloney-show--4036781/support.
Livestock owners work hard to ensure their animals are cared for through all stages of production. Despite their efforts, some animals will become injured or sick, and decisions must be made. Consider these tips for treatment, and consult with your veterinarian. Learn more about your ad choices. Visit podcastchoices.com/adchoices
Gospel Baptist Church, Bonita Springs, FL - Fundamental, Independent, Bible Believing
March 9,2025
Trump claims to know nothing about America's extraordinary security breach while fully supporting his defense secretary who wrote in a group chat when bombs would drop. Plus, Homeland Security Secretary Kristi Noem visits the brutal Supermax prison Trump holds up as a model. Learn more about your ad choices. Visit podcastchoices.com/adchoices
Have you ever wondered what the cause of type 2 diabetes or prediabetes is? Or why prediabetes and type 2 diabetes seem to come with a host of other health issues, like weight gain, high blood pressure or cholesterol problems? In this insightful episode, we unpack the invisible culprit behind it all: metabolic dysregulation. This little-known but powerful driver lies at the heart of these conditions and may even be the reason your health feels out of balance.Join us as we explore how metabolic dysregulation develops, the issue that lies at its core (high glucose, high insulin and insulin resistance), why it's so often overlooked in traditional healthcare, and, most importantly, what you can do to reverse it. CHAPTERS2:43 What is metabolic dysregulation?4:29 Symptoms of metabolic dysregulation5:44 Key issues behind metabolic dysregulation8:05 Compromised metabolic functions11:36 High insulin and insulin resistance14:55 Request a fasting insulin test17:11 How to treat the cause, not just symptomsFor show notes and resources, please visit: https://Type2DiabetesTalk.comTo share your questions and suggestions, leave us a voice message or email at: https://Type2DiabetesTalk.com/messageExplore our proven programs and services, visit: https://Type2DiabetesTalk.com/programsSubscribe to our free weekly newsletter for podcast updates, valuable nutrition tips and more: https://Type2DiabetesTalk.com/subscribe
Compromised Justice Robert's, New JFK Details
Michael talks to Independent Senator Angus King of Maine, about President Trump's promise to not touch Social Security, while people in his administration seem to be trying to cut the entitlement that millions of Americans pay in to. Original air date 24 March 2025.
Send us a text We are all at liberty in making our dreams, visions and wonders become a reality. What sets the difference is whether they are build upon a foundation or not. The rain, floods and wind are inevitable to face, but the question is, will your house remain standing? May this sermon be a blessings to you all!
Episode 047 | Christine Preston is a compromised Skin Therapist (certificate in Skin Therapy from George Brown College) who has been certified since 2016. Since then, she's been helping women across North America achieve calm, clear skin by helping them identify their triggers and creating skin care routines that work. She opened the Skin Discovery Spa in 2021 where she helps her clients clear acne, calm rosacea and relieve eczema-prone skin. (Did someone say road trip?!
SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast
Mirai Bot Now Incorporating Malformed DrayTek Vigor Router Exploits One of the many versions of the Mirai botnet added some new exploit strings attempting to take advantage of an old DrayTek Vigor Router vulnerability, but they got the URL wrong. https://isc.sans.edu/diary/Mirai%20Bot%20now%20incroporating%20%28malformed%3F%29%20DrayTek%20Vigor%20Router%20Exploits/31770 Compromised GitHub Action The popular GitHub action tj-actions/changed-files was compromised and leaks credentials via the action logs https://www.stepsecurity.io/blog/harden-runner-detection-tj-actions-changed-files-action-is-compromised ruby-saml authentication bypass A confusion in how to parse SAML messages between two XML parsers used by Ruby leads to an authentication bypass in saml-ruby. https://github.blog/security/sign-in-as-anyone-bypassing-saml-sso-authentication-with-parser-differentials/ GitHub Fake Security Alerts Fake GitHub security alerts are used to trick package maintainers into adding OAUTH privileges to malicious apps. https://www.bleepingcomputer.com/news/security/fake-security-alert-issues-on-github-use-oauth-app-to-hijack-accounts/
Revelation: The Compromised Church Dr. Andrew Hébert
If your sleep is chronically interrupted or too long or short in duration, you may be at increased risk for some types of cancer, research suggests. Sleep expert Charlene Gamaldo at Johns Hopkins says it's unclear whether sleep quality puts … Is compromised sleep related to the development of cancer? Elizabeth Tracey reports Read More »
While it's been observed that disease and poor sleep seem to sort together, ongoing research is looking into the why of it. Johns Hopkins sleep expert Charlene Gamaldo says a couple of possible causes have emerged. Gamaldo: A couple of … How might compromised sleep put one at risk for poorer health outcomes? Elizabeth Tracey reports Read More »
Is Trump controlled? If so, by what Country?
Research shows money matters in education. No student left behind with historic funding agreement in NSW. This agreement was immediately compromised when the shadow minister refused to confirm they would not commit to the agreement. US- Trump and the problematic origin of charter schools and voucher systems.Great State School of the week- Clunes Primanry Schoolwww.adogs.info
This week on The Home Defense Show Skip & Sara talk about the public's lack of confidence in the US food supply. Then they speak with author and radio host Rick Vuyst about how to start raising your own vegetables. In segment 3 firearms and Krav Maga instructor Steve Sulze talks about how to deal with bad neighbors without getting yourself shot.
From 03/12 Hour 1: The Sports Junkies discuss how their emails are getting flooded with spam.
03/12 Hour 1: Our Emails Have Been Compromised / Big Caps Win - 1:00 Better or Worse - 15:00 Tiger Woods Ruptured His Achilles Tendon - 33:00
To kick off 2025, we are spotting ways in which the DNA of the faith one for all delivered to the saints (Jude 3) is mutated and changed.Title: How NOT to Trust Your Inner KnowingScripture Reading: Isaiah 30:21 ESVOne of the messages that gets circulated in Christian circles is listening to your heart or, as one author writes, your "inner knowing." In today's message we first look at why we can't trust our hearts. Then Pastor Bill gives four checks for discerning between your own inner voice that cannot be trusted and the voice of the Holy Spirit. Those four checks are: 1. Does it Align with the Bible?2. Are You Accounting for Your Own Sinfulness?3. Who Ultimately Gets the Glory?4. What Sort of Road Does it Resemble?
China's cyber enterprise is rapidly growing: China-nexus activity was up 150% across industries in 2024, with a 200-300% surge in key sectors such as financial services, media, manufacturing, and industrials/engineering. CrowdStrike identified seven new China-nexus adversaries in 2024. “After decades investing in offensive cyber capabilities, China has achieved parity with some of the top players out there, and I think that is the thing that should terrify everybody,” Adam says. China-nexus threat actors aren't the only ones evolving their cyber operations. As the CrowdStrike 2025 Global Threat Report shows, nation-state and eCrime adversaries spanning regions and skill levels are gaining speed and refining their techniques. They're learning what works and what doesn't, and they're scaling their effective tactics to achieve their goals. So what works? Voice phishing (vishing) skyrocketed 442% between the first and second half of 2024 as adversaries leaned on vishing, callback phishing, and help desk social engineering to access target networks. Generative AI played a key role in social engineering, where its low barrier to entry and powerful capabilities help adversaries create convincing content at scale. Compromised credentials also proved handy last year, helping threat actors enter and move laterally through organizations and operate as legitimate users. What doesn't work as well? Malware. 79% of detections in 2024 were malware-free, indicating a rise in hands-on-keyboard activity as adversaries face stronger security defenses. Tune in to hear Adam and Cristian dig into the key findings of the CrowdStrike 2025 Global Threat Report, which also examines the latest on cloud-focused attacks, vulnerability exploitation, and nation-state activity around the world.
In recent years, Bitcoin has undergone a major culture shift which promotes stagnation, complacency & simping to politicians over maximizing the utility of the money. Eric Voskuil & John Carvalho join the show to remind everyone what the mission really is. State of Bitcoin - [00:01:17] Bitcoin Maximalism - [00:01:32] Bitcoin as a Ponzi Scheme - [00:02:27] Transaction Fees - [00:04:57] History of Bitcoin Tokens (Omni, Counterparty, Mastercoin) Definition of Tokens - [00:08:01] Custodial Problems with Tokens - [00:09:12] Bitcoin and Fiat Money - [00:11:09] Why Bitcoiners Talk About Money - [00:15:49] Stateless Money - [00:17:44] Austrian Economics and Bitcoin - [00:21:01] Monetary Inflation vs. Price Inflation - [00:26:01] Cantillon Effect - [00:29:00] Dollar Inflation and Gold - [00:33:59] Misunderstandings in the Bitcoin Community - [00:41:42] Bitcoin Semantics - [00:43:21] Bitcoin Divisibility - [01:00:13] Bitcoin Deflation - [01:03:41] Maxi Price and One Coin Assumption - [01:07:43] Competition Between Monies - [01:13:42] Scaling Bitcoin - [01:22:41] Bitcoin for the Unbanked - [01:26:14] Maximizing Throughput - [01:36:11] Right to Fork - [01:45:45] Running Old Bitcoin Versions - [01:51:35] Bitcoin as Money vs. Credit - [01:56:26] Settlement in Bitcoin - [02:07:45] Peer-to-Peer Credit Systems - [02:14:47] Fractional Reserve Banking - [02:26:32] Bitkit Wallet and Spending vs. Saving - [02:36:13] Block size increases and Bitcoin adoption - [03:00:00] Scaling Bitcoin and transaction validation - [03:01:00] Bitcoin overflowing into Litecoin and quantum resistance - [03:02:00] Pruning historical data and exchange price - [03:03:00] Lightning system complexity and Bitcoin's value proposition - [03:05:00] Bitcoin as an investment and speculation - [03:07:00] Optimizing Bitcoin throughput and developer motivations - [03:09:00] Scaling Bitcoin and speculation - [03:11:00] Shitcoins, scams, and Bitcoin's security model - [03:13:00] Litecoin's extension blocks and Mimblewimble - [03:15:00] Bitcoin's security and the legitimacy of altcoins - [03:17:00] Shitcoins and Bitcoin's essential aspects - [03:19:00] Majority hash power censorship and attacks - [03:21:00] Bitcoin speculation and market dynamics - [03:23:00] Michael Saylor's Bitcoin strategy and MicroStrategy's history - [03:26:00] Saylor's Bitcoin investment and market manipulation - [03:29:00] Saylor's stock sales and Bitcoin's future - [03:31:00] Blockstream's accomplishments and the Chia project - [03:33:00] Blockstream's influence and SegWit - [03:35:00] Adam Back's influence and Blockstream's hype - [03:37:00] Bitcoin Core's power and the need for competition - [03:39:00] Initial block download performance and Bitcoin Core's architecture - [03:41:00] UTXO store and Bitcoin Core's performance - [03:43:00] Parallelism in Bitcoin Core and assumed UTXO - [03:45:00] Initial block download time and Bitcoin Core's scalability - [03:47:00] Monoculture in Bitcoin development and IBD performance - [03:49:00] UTXO cache and shutdown time - [03:51:00] Trust assumptions in Bitcoin Core and UTXO commitments - [03:53:00] Bitcoin Core's halting problem and theoretical download limits - [03:55:00] Sponsorships: Sideshift, LayerTwo Labs, Ciurea - [03:57:00] Drivechains and ZK rollups - [04:02:00] ZK rollups and liquidity on Ethereum - [04:04:00] Drivechains and altcoins - [04:06:00] Scaling Bitcoin and cultural taboos - [04:08:00] Engineer-driven change and Monero's approach - [04:10:00] Confidential transactionsL Zano & DarkFi - [04:12:00] Fungibility and Bitcoin's metadata - [04:14:00] Privacy, metadata, and state surveillance - [04:16:00] Privacy, taint, and Bitcoin mixing - [04:18:00] Bitcoin mixing and plausible deniability - [04:20:00] Mining and company registration - [04:22:00] Block reward and hash power - [04:24:00] Privacy and mixing - [04:26:00] Privacy in the Bitcoin whitepaper and zero-knowledge proofs - [04:28:00] Dark Wallet and John Dillon - [04:30:00] Dark Wallet and Li Bitcoin - [04:32:00] Amir Taaki's projects and software development - [04:34:00] Dark Wallet funding and developer costs - [04:36:00] Libbitcoin's code size and developer salaries - [04:38:00] John Dillon and Greg Maxwell - [04:40:00] Opportunistic encryption and BIPs 151/152 - [04:42:00] Dandelion and privacy - [04:44:00] BIP 37 and Bloom filters - [04:46:00] Consensus cleanup and the Time Warp bug - [04:48:00] Merkle tree malleability and 64-byte transactions - [04:50:00] 64-byte transactions and SPV wallets - [04:52:00] Coinbase transactions and malleability - [04:54:00] Invalid block hashes and DoS vectors - [04:56:00] Core bug and ban list overflow - [04:58:00] Storing hashes of invalid blocks - [05:00:00] DoS vectors and invalid blocks - [05:02:00] Malleated Merkle trees and 64-byte transactions - [05:04:00] 64-byte transactions and Merkle tree malleability - [05:06:00] Null points and malleated blocks - [05:08:00] Redundant checks and the inflation soft fork - [05:10:00] Op code separator and code complexity - [05:12:00] Transaction order in a block - [05:14:00] Forward references in blocks - [05:16:00] Coinbase transaction rules - [05:18:00] Time Warp bug and Litecoin support - [05:20:00] Quadratic op roll bug - [05:22:00] Stack implementation and op roll - [05:24:00] Templatized stack and op roll optimization - [05:26:00] Non-standard transactions and direct submission to miners - [05:28:00] Mempool policy and DoS - [05:30:00] Monoculture and competing implementations - [05:32:00] Consensus cleanup and Berkeley DB - [05:34:00] Code vs. consensus - [05:36:00] Bitcoin Knots and Luke-jr - [05:38:00] 300 kilobyte node and Luke-jr's views - [05:40:00] Bitcoin Knots and performance - [05:42:00] Bitcoin Knots and censorship - [05:44:00] Censorship and miner incentives - [05:46:00] Censorship and hash power - [05:48:00] Soft forks and censorship - [05:50:00] Ordinals and covenants - [05:52:00] RBF and zero-confirmation transactions - [05:54:00] Double spending and merchant risk - [05:56:00] First-seen mempool policy and RBF - [05:58:00] Low-value transactions and RBF - [06:00:00] Computational cost of actions - [06:00:15] Building infrastructure and system disruption - [06:00:20] Threat actors and economic disruption - [06:00:26] Double spending detection and system control - [06:00:29] Safety and manageability of zero comp transactions - [06:00:41] Security of zero comp transactions - [06:00:51] RBF (Replace-by-fee) and its relevance - [06:01:06] Bitcoin's mempool and transaction handling - [06:01:25] Mempool overflow and resource management - [06:02:08] Transaction storage and mining - [06:02:45] Miners' incentives and fee maximization - [06:03:07] Mempool policy and DOS protection - [06:03:41] Transaction validation and block context - [06:04:11] Fee limits and DOS protection - [06:05:13] Transaction sets, graph processing, and fee maximization - [06:06:24] Mining empty blocks and hash rate - [06:07:34] Replace-by-fee (RBF) and its purpose - [06:08:07] Infrastructure and RBF - [06:09:14] Transaction pool and conflict resolution - [06:09:44] Disk space, fees, and DOS protection - [06:11:06] Fee rates and DOS protection - [06:12:22] Opt-in RBF and mempool full RBF - [06:13:45] Intent flagging in transactions - [06:14:45] Miners obeying user intent and system value - [06:17:06] Socialized gain and individual expense - [06:18:17] Service reliability and profitability - [06:19:06] First-seen mempool policy - [06:19:37] Mempool policy and implementation - [06:20:06] User perspective on transaction priority - [06:21:14] Mempool conflicts and double spending - [06:22:10] CPFP (Child Pays for Parent) - [06:22:24] Mempool management and fee rates - [06:24:30] Mempool complexity and Peter Wuille's work - [06:25:54] Memory and disk resource management - [06:27:37] First-seen policy and miner profitability - [06:29:25] Miners' preference for first-seen - [06:30:04] Computational cost and fee optimization - [06:31:10] Security, Cypherpunk mentality, and the state - [06:35:25] Bitcoin's security model and censorship resistance - [06:41:02] State censorship and fee increases - [06:43:00] State's incentive to censor - [06:46:15] Lightning Network and regulation - [06:48:41] NGU (Number Go Up) and deference to the state - [06:51:10] Reasons for discussing Bitcoin's security model - [06:53:25] Bitcoin's potential subversion and resilience - [06:55:50] Lightning Network subsidies and scaling - [06:57:36] Mining protocols and security - [07:02:02] Braidpool and centralized mining - [07:04:44] Compact blocks and latency reduction - [07:07:23] Orphan rates and mining centralization - [07:08:16] Privacy and threat environments - [07:08:40] Social graphs, reputation, and identity - [07:10:23] Social scalability and Bitcoin - [07:12:36] Individual empowerment and anonymity - [07:16:48] Trust in society and the role of the state - [07:18:01] Payment methods and trust - [07:20:15] Credit reporting agencies and regulation - [07:22:17] Hardware wallets and self-custody - [07:23:46] Security vulnerabilities in Ledger - [07:27:14] Disclosure of secrets on Ledger devices - [07:36:27] Compromised machines and hardware wallets - [07:42:00] Methods for transferring signed transactions - [07:48:25] Threat scenarios and hardware wallet security - [07:50:47] Hardware wallet usage and personal comfort - [07:56:40] Coldcard wallets and user experience - [08:02:23] Security issues in the VX project - [08:03:25] Seed generation and hardware randomness - [08:12:05] Mastering Bitcoin and random number generation - [08:17:41]
In this episode of NorthWoods Church Matters, Matt, Bobby, and the gang continue our discussion on the church in Thyatira and Christ's stern warning against tolerating false teaching. What does it mean for a church to remain faithful when surrounded by corruption? We explore Jesus' call to repentance, the reality of spiritual warfare, and how sound doctrine serves as a foundation for endurance. The conversation delves into theological triage, the difference between essential and secondary beliefs, and the dangers of unchecked false doctrine in the church. Plus, we tackle how to balance love and truth when confronting error and why protecting sound doctrine is an act of love. Join us as we unpack these crucial lessons for the church today! Here's the article Matt references by Al Mohler!
Cyber Security Today: OpenSSH Vulnerabilities and Black Stash's Stolen Cards In this episode, host Jim Love discusses two significant OpenSSH vulnerabilities that risk man-in-the-middle and denial-of-service attacks. The hacker group Black Stash has released 4 million stolen credit cards for free, potentially enticing further illegal activities. Palo Alto Networks' firewalls face active attacks, with multiple CVEs allowing privilege escalation and bypassing authentication. Critical updates and secure management practices are emphasized to protect systems. 00:00 Introduction and Headlines 00:21 OpenSSH Vulnerabilities Explained 02:39 BlackStash's Stolen Credit Card Dump 04:40 Palo Alto Networks Under Attack 06:21 Conclusion and Contact Information
Security analyst Elizabeth Neumann talks about her past working in the Faith-Based and Community Initiative Office, how the Federal Government works through them to help the poor and those in need. It's not a matter of church-government entanglement. Jennifer Hayden Stokes, author of "The Pioneer's Way," talks about JB Stetson, the maker of the Stetson hat, and his life of faith that affected others lives. Faith Radio podcasts are made possible by your support. Give now: Click here
In this episode of the Northwood Church Matters Podcast, we dive into the message to the church in Thyatira from Revelation. Join Pastor Matt, Ivan, Carey, and Pastor Bobby as they explore the tension between growth in love and faithfulness and the dangerous tolerance of sin. What does it mean when Jesus, with eyes like fire and feet like bronze, confronts a church for tolerating Jezebel? How does our silence in the face of sin actually endorse it? Are there times where we should be silent? Plus, we unpack the historical context of Thyatira, the influence of idolatry, and the modern parallels we see in our churches today.
Pergamum allowed the Nicolaitans in.. who were these Nicolaitans? Why was that a bad thing?
On this Salcedo Storm Podcast:Chris Hinkle, is a former FBI Supervisory Special Agent who served as a federal agent for 25 years. He led the FBI's Civil Rights Program in Mississippi. ANDJohn Gentry is a former CIA analyst. He's now a professor of Intelligence studies at the School of defense and strategic studies at Missouri state university. He's the author of the book, Diversity Dysfunction, The DEI Threat to national security intelligence.”
Is Eric Adams being held hostage?
"PREVIEW: Conversation with Professor Sean McMeekin about evidence that Stalin compromised Operation Market Garden to slow the Allied advance on Berlin. More later." 1944 MARKET GARDEN
Welp! The gals are finally discussing the orange elephant in the Oval Office. Mae covers Trumps rollback on DEI department hires and his switch to MEI. He's also hoping to give trans military employees the boot so to speak. We talk about the trans military members that meet his MEI metrics and are fighting back. Laura gives a run down of how everyone's favorite oligarch and n*z* (allegedly!) Elon Musk is skirting government clearance to manage (steal from) the US Treasury with a group of 19 year old incels. So that's fun! And to round it out we discuss a woman in Pakistan who was stood up and is now demanding over 100k from the government. Imagine ghosting so hard they go after the president? It's a free for all! Follow us @RisqueBusinessNews @mae_planert @laurasogar
Today, we're diving into a topic that's overlooked but so crucial: how to know if you have a compromised skin barrier. We'll also discuss how to restore your barrier using insights from the legendary Dr. Zein Obagi and his innovative ZO Skin Health products. By the end of this episode, you'll know exactly how to spot a compromised barrier, why it happens, and how to bring your skin back to optimal health.
Matt Lucas, the president of Our Daily Bread, maintains that the organization has not shifted its doctrinal convictions, yet lists celebrating diversity as a historic, biblical Christian teaching alongside salvation in Christ alone and the infallibility of Scripture. I don't think anyone working for Our Daily Bread in 1938 would have said this. The fact is, Our Daily Bread has been trafficking in social justice teachings in the MeToo and BLM vein for a few years. Jon reviews some of these teachings so that Our Daily Bread readers can be informed and make up their own minds.To Support the Podcast: https://www.worldviewconversation.com/support/Become a Patronhttps://www.patreon.com/jonharrispodcastFollow Jon on Twitter: https://twitter.com/jonharris1989Follow Jon on Facebook: https://www.facebook.com/jonharris1989/Support this podcast at — https://redcircle.com/conversations-that-matter8971/donationsAdvertising Inquiries: https://redcircle.com/brandsPrivacy & Opt-Out: https://redcircle.com/privacy
We did a y'all. Manifesting works. On this truncated emergency episode we react to JT Miller getting traded to the New York Rangers. If you'd like to, support the show and receive weekly bonus episodes head on over to https://patreon.com/IHateThisTeam Presented by DraftKings - Use Promo Code THPN at sign up at https://www.draftkings.com/ for exclusive offers!
1/27/2025 PODCAST Episodes #1778 - #1780 GUESTS: Neil McCabe, Dr. Kelly Victory, Sen. Doug Mastriano, Sen. Mike Oliverio, Rabbi Yaakov Menken + YOUR CALLS! at 1-888-480-JOHN (5646) and GETTR Live! @jfradioshow #GodzillaOfTruth #TruckingTheTruth Want more of today's show? Episode #1778 Most MAGA cabinet picks in U.S. History; Mr. Ellison Needs To Go Back To The Drawing Board Episode #1779 Sen. Mastriano Still Haven't Ruled Out A Run For The Governorship! Episode #1780 UNRWA Is Irredeemably Compromised https://johnfredericksradio.libsyn.com/
Join us as we discuss the leaks and how they came about, What next for Em and his team and will he take home any Grammys at next months show?
Beer 1: Boxing - Inoue Victory - destroys Kim in Japan; Ryan Garcia / Devin Haney Update NFL - Conference Championship Picks NHL - Mikko Rantanen trade announced - Canes pushing the chips again Beer 2: Severance - brief discussion on S2E2 Bad Batch - Why anyone should watch Clone Wars and Bad Batch Shameless - Drew has been watching in the background
Jeff Morrison is the Field Engineering Team Lead at Pentera. In this episode, he joins host Heather Engel to discuss compromised credentials and active directories, including the biggest challenges organizations face in this space, poor credential hygiene, how enterprises can address credential-based threats, and more. Cyber Strong is a Cybercrime Magazine podcast series brought to you by Pentera, the leader in automated security validation. Learn more about our sponsor at https://pentera.io.
Joe DeCamara believes the Eagles will beat the Commanders but is concerned that Jalen Hurts limited in what he can do. The Morning team deabtes how worried you should be with hurts' health. Nick Sirianni seemed confident Jalen will play Sunday but will he be effected by injury.
House Republicans have cheated the usual rules to take Mike Turner off his committee to punish him for supporting Ukraine. Will Trump and the GOP stand up to Putin, or is this a sign they are they under his control? Phil Ittner joins Thom live from Ukraine.See Privacy Policy at https://art19.com/privacy and California Privacy Notice at https://art19.com/privacy#do-not-sell-my-info.
Valenti criticizes Tom Brady for the compromising position he's in calling the Lions game this Saturday while also pursuing Ben Johnson as Raiders head coach.
Transport Layer Security (TLS) relies on certificates to authenticate Web sites and enable encryption. On today’s Packet Protector we look at mechanisms that domain owners can take to ensure the validity of their digital certificates. More specifically, we cover Certification Authority Authorization (CAA) and Certificate Transparency (CT). Our guest is Ed Harmoush. Ed is a... Read more »
Transport Layer Security (TLS) relies on certificates to authenticate Web sites and enable encryption. On today’s Packet Protector we look at mechanisms that domain owners can take to ensure the validity of their digital certificates. More specifically, we cover Certification Authority Authorization (CAA) and Certificate Transparency (CT). Our guest is Ed Harmoush. Ed is a... Read more »
In today's episode, we're thrilled to have Niv Braun, co-founder and CEO of Noma Security, join us as we tackle some pressing issues in AI security.With the rapid adoption of generative AI technologies, the landscape of data security is evolving at breakneck speed. We'll explore the increasing need to secure systems that handle sensitive AI data and pipelines, the rise of AI security careers, and the looming threats of adversarial attacks, model "hallucinations," and more. Niv will share his insights on how companies like Noma Security are working tirelessly to mitigate these risks without hindering innovation.We'll also dive into real-world incidents, such as compromised open-source models and the infamous PyTorch breach, to illustrate the critical need for improved security measures. From the importance of continuous monitoring to the development of safer formats and the adoption of a zero trust approach, this episode is packed with valuable advice for organizations navigating the complex world of AI security.So, whether you're a data scientist, AI engineer, or simply an enthusiast eager to learn more about the intersection of AI and security, this episode promises to offer a wealth of information and practical tips to help you stay ahead in this rapidly changing field. Tune in and join the conversation as we uncover the state of AI security and what it means for the future of technology.Quotable Moments00:00 Security spotlight shifts to data and AI.03:36 Protect against misconfigurations, adversarial attacks, new risks.09:17 Compromised model with undetectable data leaks.12:07 Manual parsing needed for valid, malicious code detection.15:44 Concerns over Agiface models may affect jobs.20:00 Combines self-developed and third-party AI models.20:55 Ensure models don't use sensitive or unauthorized data.25:55 Zero Trust: mindset, philosophy, implementation, security framework.30:51 LLM attacks will have significantly higher impact.34:23 Need better security awareness, exposed secrets risk.35:50 Be organized with visibility and governance.39:51 Red teaming for AI security and safety.44:33 Gen AI primarily used by consumers, not businesses.47:57 Providing model guardrails and runtime protection services.50:53 Ensure flexible, configurable architecture for varied needs.52:35 AI, security, innovation discussed by Niamh Braun.
Fr.Dcn. Ananias Sorem returns to cover the relationship between Jerusalem and Athens – revelation and reason. Firstly, they are and aren't in tension – and we'll see how. Secondly, terms and words are not synonymous – there may be overlap at times, but the meanings of the words are unique in Orthodox theology. Second, we want to look at the Amazon synod, the relationship to Vatican II and perennialism and true and false ecumenism. Send Superchats at any time here: https://streamlabs.com/jaydyer/tip Get started with Bitcoin here: https://www.swanbitcoin.com/jaydyer/ The New Philosophy Course is here: https://marketplace.autonomyagora.com/philosophy101 Set up recurring Choq subscription with the discount code JAY44LIFE for 44% off now https://choq.com Lore coffee is here: https://www.patristicfaith.com/coffee/ Orders for the Red Book are here: https://jaysanalysis.com/product/the-red-book-essays-on-theology-philosophy-new-jay-dyer-book/ Subscribe to my site here: https://jaysanalysis.com/membership-account/membership-levels/ Follow me on R0kfin here: https://rokfin.com/jaydyernism, evangelicalism, Arianism, cults, Hebrew roots, JWs, etc. Subscribe to my site here: https://jaysanalysis.com/membership-account/membership-levels/ Follow me on R0kfin here: https://rokfin.com/jaydyerBecome a supporter of this podcast: https://www.spreaker.com/podcast/jay-sanalysis--1423846/support.
↓ LISTEN LIVE ↓https://www.iheart.com/live/1047-kiss-fm-61/?cmp=ios_share&sc=ios_social_share&pr=false&fbclid=PAAaZsB7idB4FkjlOpphNLT8ah2smVpndvDIg32LS45Ar81jOYEC8CrSi3XCg