POPULARITY
Was the Stuxnet, "cyberworm," the first iteration of a new era of combat? Strider is scared! When scared, seek to understand. striderwilson.com patreon.com/striderwilson Sources: spymuseum.org, smithsonianmag.com ‘Richard Clarke on Who Was Behind the Stuxnet Attack' by Ron Rosenbaum 2012, wired.com ‘An Unprecedented Look at Stuxnet, the World's First Digital Weapon' by Kim Zetter 2014, csoonline.com ‘Stuxnet explained: the first known cyberweapon' by Josh Fruhlinger 2022, britannica.com
Nick and Kyle recap the week in Heathcliff with Josh Fruhlinger of the Comics Curmudgeon blog! Then we test Josh's Heathcliff knowledge in an exciting edition of... HEATHQUIZ. Check out the Heathquiz images here: https://imgur.com/gallery/SGfkR2K Check out the Comics Curmudgeon blog here: https://joshreads.com/ Send us feedback on twitter @HeathcliffRecap or send us an email at HeathcliffRecap@gmail.com! Our theme song is Heathcliff's Meat Song by Louie Zong! Check him out at louiezong.com. Comics featured in the episode: January 21, 2023: https://www.gocomics.com/heathcliff/2023/01/21 January 23, 2023: https://www.gocomics.com/heathcliff/2023/01/23 January 6, 2021: https://www.gocomics.com/heathcliff/2021/01/06 January 24, 2023: https://www.gocomics.com/heathcliff/2023/01/24 January 25, 2023: https://www.gocomics.com/heathcliff/2023/01/25 January 26, 2023: https://www.gocomics.com/heathcliff/2023/01/26
As the Star Warriors struggle to fight off an awakened monster terrorizing the Massassi temple, we find ourselves joined by the Comics Curmudgeon himself, Josh Fruhlinger, for a conversation about a shady mustachioed man, the forbidden love between Luke and Leia, the forgotten joys of the syndicated Spider-Man newspaper strip, and the sad fate of a misunderstood guardian from Yavin's past. And be sure to check out Josh's daily blog about newspaper comic strips at https://joshreads.com/
Today we're playing four bonus follow recommendations that originally were exclusive to Follow Friday XL, our special podcast feed for supporters on Patreon. If you want to get five follow recommendations per week instead of the usual four, you can donate $1 or more at https://www.patreon.com/followfriday (patreon.com/followfriday)! In today's episode: The Stacks host Traci Thomas talks about someone super-talented who's still under the radar, Whit McClure (http://instagram.com/whit_hazen (@whit_hazen) on Instagram) The Comics Curmudgeon writer Josh Fruhlinger talks about someone who makes the internet a better place: Rusty Foster (https://twitter.com/fka_tabs/ (@fka_tabs) on Twitter) There Are No Girls on the Internet host Bridget Todd talks about someone who has stopped posting, but needs to come back: Teju Cole (https://twitter.com/tejucole (@tejucole) on Twitter) Bullseye host and Maximum Fun founder Jesse Thorn talks about someone he's jealous of: Louis Virtel (@louisvirtel on https://www.instagram.com/louisvirtel/ (Instagram) and https://twitter.com/louisvirtel/ (Twitter)) Also: Follow us @FollowFridayPod on https://twitter.com/followfridaypod (Twitter) and https://www.instagram.com/followfridaypod/ (Instagram) Leave a review: https://lovethepodcast.com/followfriday (LoveThePodcast.com/FollowFriday) Follow Eric https://twitter.com/HeyHeyESJ (@heyheyesj) on Twitter Email us! hello@followfridaypodcast.com This show is a production of Lightningpod.fm, hosted and produced by Eric Johnson Music: https://www.fiverr.com/yonamarie (Yona Marie) Show art: https://www.fiverr.com/dodiihr (Dodi Hermawan) Social media producer: Sydney Grodin
Josh Fruhlinger is better known to the internet as the Comics Curmudgeon, and for something like 15 years, he's been riffing on the oddities of newspaper comics at https://joshreads.com/ (joshreads.com). If you want to know which Mary Worth character got into a fight with a cat, Josh is your guy. Today on Follow Friday, Josh talks about four of his favorite people he follows online: Someone who's an expert in a very specific niche that he loves: Numble, https://twitter.com/numble (@numble) on Twitter Someone he's followed forever: Katie Notopoulos, https://twitter.com/katienotopoulos (@katienotopoulos) on Twitter Someone he's jealous of: Annie Rauwerda, https://twitter.com/anniierau (@anniierau) and https://twitter.com/depthsofwiki (@depthsofwiki) on Twitter, http://instagram.com/depthsofwiki (@depthsofwiki) on Instagram, and https://www.tiktok.com/@depthsofwikipedia (@depthsofwikipedia) on TikTok Someone he just started following: WHH Haters Posting Their L's Online, https://twitter.com/WHHHLsonline/ (@WHHHLsonline) on Twitter Thank you to our amazing patrons: Jon, Justin, Amy, Yoichi, Elizabeth, Sylnai, Matthias, and Shima. On https://www.patreon.com/followfriday (our Patreon page), you can pledge any amount of money to get access to Follow Friday XL — our members-only podcast feed with exclusive bonus follows. That feed has an extended-length version of this interview in which Josh talks about someone who makes the internet a better place: Today in Tabs writer Rusty Foster. Also: Follow Josh on Twitter https://twitter.com/jfruh/ (@jfruh) and read the Comics Curmudgeon at https://joshreads.com/ (joshreads.com) Follow us @FollowFridayPod on https://twitter.com/followfridaypod (Twitter) and https://www.instagram.com/followfridaypod/ (Instagram) Follow Eric https://twitter.com/HeyHeyESJ (@heyheyesj) on Twitter This show is a production of Lightningpod.fm, hosted and produced by https://twitter.com/heyheyesj (Eric Johnson) Music: https://www.fiverr.com/yonamarie (Yona Marie) Show art: https://www.fiverr.com/dodiihr (Dodi Hermawan) Social media producer: Sydney Grodin
Today on Follow Friday, Eric Johnson looks back at four of his favorite follows out of the 183 discussed on the show in 2021. They are: https://followfridaypodcast.com/alie-ward (Alie Ward)'s "someone you have a crush on," Jarrett Sleeper / https://twitter.com/jarrettsleeper (@jarrettsleeper) https://followfridaypodcast.com/alexandra-petri (Alexandra Petri)'s "someone who's an expert in a very specific niche you love," Josh Fruhlinger / https://twitter.com/jfruh (@jfruh) https://followfridaypodcast.com/mark-chrisler (Mark Chrisler)'s "someone you just started following," Froot of the Loom / https://twitter.com/frootoftheloom1 (@frootoftheloom1) https://followfridaypodcast.com/auralnauts (The Auralnauts)' "someone who makes you laugh," Michael Cunningham / https://twitter.com/Michael1979 (@Michael1979) Also: Follow us @followfridaypod on https://twitter.com/followfridaypod (Twitter) and https://www.instagram.com/followfridaypod/ (Instagram) Follow Eric on Twitter https://twitter.com/heyheyesj (@heyheyesj) Theme song written by Eric Johnson, and performed by https://www.fiverr.com/yonamarie (Yona Marie). Show art by https://www.fiverr.com/dodiihr (Dodi Hermawan). Thank you to our amazing patrons: Jon, Justin, Amy, Yoichi, Shinri, and Elizabeth This podcast uses the following third-party services for analysis: Chartable - https://chartable.com/privacy Support this podcast
Jesse Trucks is the Minister of Magic at Splunk, where he consults on security and compliance program designs and develops Splunk architectures for security use cases, among other things. He brings more than 20 years of experience in tech to this role, having previously worked as director of security and compliance at Peak Hosting, a staff member at freenode, a cybersecurity engineer at Oak Ridge National Laboratory, and a systems engineer at D.E. Shaw Research, among several other positions. Of course, Jesse is also the host of Meanwhile in Security, the podcast about better cloud security you're about to listen to.Links: EI-ISAC Cybersecurity Spotlight – CIA Triad: https://www.cisecurity.org/spotlight/ei-isac-cybersecurity-spotlight-cia-triad/ What is the CIA Triad?: https://www.f5.com/labs/articles/education/what-is-the-cia-triad The CIA triad: Definition, components and examples: https://www.csoonline.com/article/3519908/the-cia-triad-definition-components-and-examples.html TranscriptJesse: Welcome to Meanwhile in Security where I, your host Jesse Trucks, guides you to better security in the cloud.Announcer: If you have several PostgreSQL databases running behind NAT, check out Teleport, an open-source identity-aware access proxy. Teleport provides secure access to anything running behind NAT, such as SSH servers or Kubernetes clusters and—new in this release—PostgreSQL instances, including AWS RDS. Teleport gives users superpowers like authenticating via SSO with multi-factor, listing and seeing all database instances, getting instant access to them using popular CLI tools or web UIs. Teleport ensures best security practices like role-based access, preventing data exfiltration, providing visibility, and ensuring compliance. Download Teleport at goteleport.com. That's goteleport.com.Jesse: This is the t of a trilogy of threes that covers this core foundations of good security practices and good security programs. In the first issue of Meanwhile in Security, I explained how security is a mindset, not a tool, and the importance of understanding the why or the purpose for building a security program. This drives everything you do in your organization for securing your critical assets. The why is the core reason for having a security program.Next, I laid the foundation for the how or the principles that guide the work of your security program by exploring the people, process, and technology paradigm upon which all successful security programs are based. Using PPT, you will build a longer-lasting, more dynamic, and highly successful security program.Following Simon Sinek's Golden Circle model, the outer ring is the what or services offered by an organization group or individual. In implementing and maintaining a security program, the how focuses on the confidentiality, integrity, and availability of all data and services offered within the scope of your security program. This is often called the holy trinity of security, or the CIA Triad. All actions performed and tools implemented in support of the security program stem from one of these fundamental precepts of security. Let's dig into the parts of the Triad.Confidentiality. The first part of the Triad is confidentiality, which is about controlling data in services' access. In their article titled “EI-ISAC Cybersecurity Spotlight–CIA Triad,” the Center for Internet Security, or CIS, defines confidentiality as quote, “Data should not be accessed or read without authorization. It ensures that only authorized parties have access.” End quote. I expand on this definition to include services not just data. Every organization and person has data to protect. The traditional approach to confidentiality assumes that any service that touches the data falls within the scope of confidentiality, as a means to protect against disclosure of the data that services accesses. This can lead to a focus on robust and complete data access controls without similar attention paid to services that don't directly touch data with those controls in place. However, I consider access to and use of services within the scope of confidentiality because protecting use of resources is often as important or in some cases more important than the data access. This is often the case with cloud-native applications using microservices. Many modern services can take action without accessing specific data sources, especially when the data source is defined as part of the microservices invocation. For example, consider an attacker who has pilfered a file or files from your services or systems or from some other source and wants to perform analysis or some type of processing of the file or files. If you run services useful to the attacker in this scenario, the attacker may not touch your data, but they may attempt to use your services without authorization. To apply confidentiality to your security program, determine and document what data in services are sensitive and require access protection. To do this you may need to track down data and service owners. This process is closely related to the why of your security program which ultimately exists to protect your data or services.Announcer: If your mean time to WTF for a security alert is more than a minute, it's time to look at Lacework. Lacework will help you get your security act together for everything from compliance service configurations to container app relationships, all without the need for PhDs in AWS to write the rules. If you're building a secure business on AWS with compliance requirements, you don't really have time to choose between antivirus or firewall companies to help you secure your stack. That's why Lacework is built from the ground up for the Cloud: low effort, high visibility, and detection. To learn more, visit lacework.com. That's lacework.com.Integrity. The second part of the Holy Trinity is integrity, which refers to keeping data intact and services functioning as expected. Anyone accessing data or a service should only have the ability to alter or remove any data or alter or repurpose a service when they are authorized for such actions. In Debbie Walkowski's post for the F5 Labs site on July 9, 2019, “What is the CIA Triad?” she defines that integrity is about ensuring data quote, “Is correct, authentic and reliable.” End quote. Any authorized changes or removal of data or to services violates integrity, and are generally classified as alteration or modification attacks. Changes to some of your data can immediately call into question other data protected by the same security program and security monitoring or control tools. A type of integrity attack on software is a supply chain attack. This is an attack on any part of the process of creating, testing, and distributing software. This attack could be an alteration of the source code or have compiled binaries and their related checksums prior to distribution to end-user customers. A recent high-profile example is the changes to the supply chain of some SolarWind software that was then installed in thousands of their customers' systems. You can implement integrity protections for your data by putting in place monitoring tools to detect changes to or removal of any data. You can monitor services integrity with tools and logging that indicate any unauthorized changes in running processes, and testing to ensure expected services functionality. Be sure to incorporate integrity definitions, monitoring, and controls into your security program.Availability. The third part of the Holy Trinity is availability, which is maintaining the ability to access and use data or services. If your data is protected from unauthorized access and verified intact, it is useless if it cannot be accessed by authorized users and services. In his feature article titled “The CIA Triad Definition Components and Examples” in CSO on February 2020, Josh Fruhlinger writes that availability means quote, “Authorized users should be able to access data whenever they need to do so.” End quote. This applies to services as well because a service should be available to authorized users when those users need to use the service. Clearly, your services are useless if authorized users cannot access your services. There are many ways to prevent access to services, as well. For example, most of us have heard of Denial of Service or DoS, or Distributed Denial of Service, or DDoS attacks. A DoS on any service can be accomplished in numerous ways from flooding the network or system with too much traffic, stopping the service from running by crashing it or turning it off, or blocking access to the service by altering the network in some way. A DDoS is a method of flooding a network with traffic from multiple sources rather than from a single system. Ensure your security program incorporates availability of your data and services by documenting the means which provide access to your data and services and then implement a combination of monitoring and control systems to detect and respond to attacks on availability.The Golden Triangle defines which organizational personnel policies and procedures and technical tools implement monitoring and controls for the Holy Trinity. These two triads are the how and the what of your security program and work together to support your security program's why. Create or refine your security program by documenting which aspects of your program directly address all the elements of both PPT and the CIA Triad. Taking this approach will ensure your security program is both comprehensive and comprehensible to management IT staff and users, not only the security professionals and auditors. Tune in next week when I discuss applying the trilogy of threes in the cloud.Jesse: Thanks for listening. Please subscribe and rate us on Apple and Google Podcast, Spotify, or wherever you listen to podcasts.Announcer: This has been a HumblePod production. Stay humble.
Josh Fruhlinger is an editor at ThinkNum and in this interview he talks about the changes in media over the past decade.
Josh Fruhlinger is an editor at ThinkNum and in this interview he talks about the changes in media over the past decade.
Writer, comedian, and defiant blogger, Josh Fruhlinger, shares his deep knowledge of Wikipedia! Editor Wars! Citations Needed! Jump on the information superhighway with us! Thanks as always to Molly Lewis for our music and Bryan Ward for our artwork!
That was Stoop Story from Josh Fruhlinger, about the highs and lows of competing on Jeopardy. You can hear his story and many others at stoopstorytelling.com, as well as the Stoop podcast.
Strap on your nostalgia goggles and assemble your Funko Pops, it's another episode of Nathan Rabin's Happy Cast! This episode, Nathan and Clint peer through the rose-colored VR glasses of Steven Spielberg's Ready Player One, desperately dig deep into the fractured cult psyche of Neil Breen's Pass Thru, and try to kick the habit of the '80s anti-drug crossover cartoon Cartoon All-Stars to the Rescue. Meanwhile, Josh Fruhlinger (the Comics Curmudgeon himself) joins the party to wax poetic about the surprisingly solid Garfield: His 9 Lives and the acidic comic strip legacy of the Lockhorns! 4:37 - Scalding Hot Takes: Ready Player One 27:25 - Control Nathan Rabin 4.0: Pass Thru 47:25 - Control Nathan and Clint: Garfield: His 9 Lives (w/Josh Fruhlinger) 1:16:47 - The Big Whoop: The Lockhorns (w/Josh Fruhlinger) 1:34:25 - Control Nathan and Clint: Cartoon All-Stars to the Rescue 1:47:59 - Mailbag 1:54:16 - Happy Places Follow us on Twitter (Nathan: @nathanrabin, Clint: @alcohollywood)! Pledge to our Patreon, and subscribe to us on iTunes Ask us questions at asknathanrabinshappycast@gmail.com! Theme Song by Jon Biegen
@Jfruh is here for the smartest Beef about the dumbest movie. This is a meaty one! Tackling nostalgia culture, cultural feedback, avatars, horses with really sharp feet etc. etc. Come on it, the beef is room temperature!
Episode 235: ControlTalk NOW — Smart Buildings PodCast for week ending August 13, 2017 features two insightful interviews with Marc Petock, Lynxspring’s Chief Communications Officer & Vice President, Marketing, and Aaron Gorka, Innovation Manager for ANT Technologies. Check out ACI’s European Smart Homes 2017; ControlTrends Discovers Monnit Wireless Sensors at Realcomm|IBcon 2017; Belimo’s Correcting Low Delta T Webinar: Internet of Things (IoT); Cybersecurity Improvement Act of 2017; The Dark Web Goes Corporate; NIST Cybersecurity for IoT Program; and Therese Sullivan: Appreciating How Metadata Makes Artificial Intelligence Possible. Internet of Things (IoT) Cybersecurity Improvement Act of 2017 Introduced by Senators Mark Warner, Cory Gardner, Ron Wyden, and Steve Daines. On August 1, 2017, the U.S. Government took a significant “lead by example” step forward in the battle of Internet of Things (IoT) security. Chief among the vendor commitments — that must be made to the U.S.Government: That their IoT devices are patchable; that the devices don’t contain known vulnerabilities; and that the devices don’t contain hard-coded passwords. ACI’s European Smart Homes 2017 will be taking place in London, UK, on 25th & 26th of October 2017.Join European Smart Homes 2017 conference on 25th & 26th October in London, UK and hear John Hutchins’ presentation entitled “Smart Homes and Utility Customer Experience – exploring the link between smart homes, connected devices and better customer experience for utility customers.” The Dark Web Goes Corporate, by Josh Fruhlinger, CSO. By Josh Fruhlinger, CSO. The “dark web” is a phrase strikes an ominous tone, conveying an impression of a marketplace where anything is for sale: hacking tools, weapons, drugs, child pornography, even freelance assassination services. And according to experts we spoke to, all of that’s still true. But something has changed in the way the dark web does business. If there was a time when venturing online to buy these illegal items was like taking your life in your hands in a dark alley, today the experience in quite different. ControlTrends Discovers Monnit Wireless Sensors at Realcomm|IBcon 2017. One of the really cool things about covering shows like Realcomm|IBcon is that we quite often get first looks at new vendors and technologies. Although wireless sensors are not new to Smart Buildings, Monnit’s approach and product offering are. Check this video out to see why. Monnit remote monitoring systems can be setup in just a few minutes and our intuitive interface makes managing your system a snap, and Mommit’s optimized RF communications platform provides superior wireless range for covering large areas. Ken’s Calendar: Belimo’s Correcting Low Delta T Webinar, Wednesday, August 23 at 1:00 PM EDT. Chilled water provided from a utility plant is commonly used in a building’s HVAC system in lieu of installing chillers. This results in lower return water temperatures which decreases the efficiency of the entire chilled water system resulting in the condition known as “Low ∆T Syndrome.” In this webinar we will review the design of a district chilled water system and discuss a study of a building where “Low ∆T Syndrome” was corrected at the point of water to air heat transfer. NIST Cybersecurity for IoT Program (20.8 Billion Connected Devices in Use by 2020). Though each of us, in our own way and at our speed, has willingly or unwillingly, become more acclimated and accepted the rapid proliferation of IoT devices connecting us to the data bases in the clouds, it is still a challenge to fully comprehend the impact this hatching reality will have on our personal lives and professional careers — and we probably should know a lot more. Among the many sources of valuable insight and guidance available to ControlTrends Community, the NIST’s Cybersecurity for the Internet of Things is certainly one of the best. Therese Sullivan: Appreciating How Metadata Makes Artificial Intelligence Possible. Therese Sullivan, editor of BuildingContext.me, and our ControlTrends’ eyes and ears from Silicon Valley, takes us on a data journey that begins at the ethereal origins of Artificial Intelligence (Dartmouth, 1956) and delivers us to metadata and Project Haystack — introducing some of the label makers in between. ControlTalk NOW’s first interview is with industry veteran Marc Petock, Lynxspring‘s Chief Communications Officer & Vice President, Marketing. Marc first updates the ControlTrends Community on the 2017 Lynxspring Exchange, which is open to everybody. This will be the best Exchange ever. Everything is good: Location (Scottsdale, AZ); Speakers (Roberta Gamble, Frost & Sullivan; Tom Schircliff and Rob Murchinson, Intelligent Buildings; and Mark Jewell, Selling Energy); can’t miss technology and product updates, and an all-star cast of Vendor-Sponsors. Marc also addresses Cyber Security, Edge Controllers, and the 2017 ControlTrends Awards. ControlTalk NOW’s second interview is with Aaron Gorka, Innovation Manager for ANT Technologies, who extends the ControlTrends Community a special offer with Ant Technologies. ANT Technologies software portfolio is designed to make contractors more profitable. Aaron grew up in the contracting world — working with his father in a family business environment. He knows the business and financial challenges firsthand. ANT Technologies has the curated software tools: Management of Projects, Service Tools, and Tenant Energy Billing — that will make contractors more efficient and, more profitable. Click here to find your local CGNA distributor and take advantage of Aaron’s special ControlTrends offer that he made during the podcast. The post Episode 235: ControlTalk NOW — Smart Buildings PodCast for Week Ending August 13, 2017 appeared first on ControlTrends.
Ed and John are joined once again by Alice Bolin, for a sometimes jolly, sometimes morose conversation about funny names, Russian heavy metal, New Jersey delicacies, and the complicated history of McDonaldland and Barbie. Follow links to Ghosts and Projectors, Josh Fruhlinger's tweets, McDonaldland, Emily Jones on Trump, dreamy cream scones, Alice's favorite sentences from the Skipper Wikipedia page, Masterchef Junior, The Sporkful on Pork Roll, Nothing is True and Everything is Possible, Beatlebone, and Transit.
MadeMan editors Shawn Donnelly and Steve Mazzucchi are trying to cut bread from their diets, but a debate rages over what foods should be forbidden. Josh Fruhlinger discusses his article about how best to eat sushi. Finally, we weigh in on tipping: when, how much, and why.
We welcome special guest Josh Fruhlinger, proprietor of the popular and long-running blog The Comics Cumudgeon, as well as the author of a recent novel, The Enthusiast, to discuss Jennifer Egan's Pulitzer Prize-winning novel, The Goon Squad. We also talk to Josh about the successful Kickstarter he ran to fund his own book, building an online audience, his enthusiasm for trains, and Mary Worth's love life. For more, visit us online at bookfightpod.com.
It's a Pluggerific episode of I Haven't Seen That as Whitney and Mark are joined by Josh Fruhlinger, the author of The Enthusiast and The Comics Curmudgeon! We finally get all of our newspaper comics discussion out of the way with in-depth examinations of Plugging, Lazy Asshole Spiderman, the age we were the worst, Ayn Rand and MUCH MUCH MORE! A THING JOSH HASN'T SEEN: A Marvel comic book. A THING WHITNEY HASN'T SEEN: A comedy open mic. A THING MARK HASN'T SEEN: Due South.
Two Joshes for the price of a free podcast today! Josh Fruhlinger reads from his novel, The Enthusiast, and Josh Gondelman reads from his humor book, You Blew It, which he co-wrote with non-Josh Joe Berkowitz. ~review The Catapult in iTunes~ CatapultPodcast.com // @CatapultPodcast // The Trebuchet
Hola DigHeads! On this week's episode, Josh and Mike sit down with hilarious comedian, writer, and blogger, Josh Fruhlinger! Follow Us On Twitter! @JFruh – Josh Fruhlinger @BetterRobotJosh – Josh Kuderna @MichaelMoran10 – Mike Moran @DigSeshPod – For Podcast Updates!
It’s a show that’s as familiar as your Sunday Morning Newspaper Comics section, when Josh Fruhlinger of the Comics Curmudgeon chats with the crew. Hear us talk about Funky Winkerbean, Apt. 3G, Beetle Bailey, and why they all suck while we continue to love them. Also, Chris takes on a slew of haters and we talk about Iron Man 2. It’s an Episode 30 blowout!