Part of speech
POPULARITY
Categories
What if your firm's biggest threat isn't poor strategy or weak talent — but misaligned leadership? As part of the “Road to the Summit”, a special series ramping up to the 2025 Game Changers Summit this November 12–13, we're revisiting some of the most powerful conversations ever featured at our events. In this episode of The Game Changing Attorney Podcast, Jessica Mogill takes the stage at the 2024 Game Changers Summit to expose the hidden cost of poor leadership. She breaks down why high performers don't automatically make great leaders, how fear-based management destroys culture, and what it really takes to build alignment at every level. Through real stories from inside Crisp, Jessica reveals how small cracks at the top can ripple through an entire organization, and what leaders can do to stop it. Here's what you'll learn: Why your strongest performers can become your weakest leaders without the right mindset and training How to identify cracks in leadership before they fracture your entire team What it takes to rebuild alignment, trust, and performance from the top down Want to create lasting impact through leadership that lifts everyone around you? Start here. ---- Show Notes: 01:44 – Jessica introduces the theme: the danger of promoting top performers into leadership without the right mindset. 03:02 – Jessica connects “The Boys” to high performers who turn destructive without balance and empathy. 06:35 – “A crack at the leadership level is a canyon to the rest of the team.” She explains how misaligned leadership ripples across the company. 07:56 – Global cost of poor leadership: $7 trillion. Jessica shares how poor management drains performance and trust. 11:32 – Skip-level meetings reveal hidden issues. She explains how transparency rebuilt alignment. 17:08 – The story of “Casey,” the fear-based leader who created a culture of fear and disengagement. 24:57 – The peacekeeper leader “Lisa” avoids conflict, causing accountability to erode. 32:11 – The veteran leader “Jake” clings to the past and kills innovation through resistance to change. 39:35 – Jessica closes with her reflection: “What you tolerate today will become your standard tomorrow.” Links & Resources: The Boys (Amazon Prime Video) Developing the Leader Within You 2.0 by John C. Maxwell Kat Cole ---- Do you love this podcast and want to see more game changing content? Subscribe to our YouTube channel. ---- Past guests on The Game Changing Attorney Podcast include David Goggins, John Morgan, Alex Hormozi, Randi McGinn, Kim Scott, Chris Voss, Kevin O'Leary, Laura Wasser, John Maxwell, Mark Lanier, Robert Greene, and many more. ---- If you enjoyed this episode, you may also like: 388. From Hooters Hostess to $600M CEO: Leading With Grit, Humility, and Urgency with Kat Cole 240. Jessica Mogill — Why Hiring A-Players is Important 62. John Maxwell — Leadership is a Verb, Not a Noun
Please enjoy this encore of Word Notes. A browser configuration control that prevents accessing resources within a private network. CyberWire Glossary link. Audio reference link: “Chrome Limits Access to Private Networks,” by Daniel Lowrie, ITProTV, YouTube, 19 January 2022.
learn how to say 'practice' in Korean
Please enjoy this encore of Word Notes. The potential next evolution of the worldwide web that decentralizes interaction between users and content away from the big silicon valley social media platforms like Twitter, Facebook, and YouTube, and towards peer-to-peer interaction using blockchain as the underlying technology. CyberWire Glossary link: https://thecyberwire.com/glossary/web-30 Audio reference link: “What Elon Musk Just Said about Metaverse, Web3 and Neuralink,” By Clayton Morris, Crypto News Daily, YouTube. 2 December 2021.
Please enjoy this encore of Word Notes. The potential next evolution of the worldwide web that decentralizes interaction between users and content away from the big silicon valley social media platforms like Twitter, Facebook, and YouTube, and towards peer-to-peer interaction using blockchain as the underlying technology. CyberWire Glossary link: https://thecyberwire.com/glossary/web-30 Audio reference link: “What Elon Musk Just Said about Metaverse, Web3 and Neuralink,” By Clayton Morris, Crypto News Daily, YouTube. 2 December 2021. Learn more about your ad choices. Visit megaphone.fm/adchoices
Join Matt and Jake on Sabbath Lounge as they reflect on what happened at their Sukkot celebration — sharing family gatherings, meaningful new traditions, and timeless lessons from the Feast of Tabernacles. Together they explore the Gospel story behind the feast, uncovering deep spiritual truths found in Scripture and how they connect to the joy and meaning of Sukkot today. Watch to discover how faith, family, and biblical truth come together in this season of rejoicing. #SabbathLounge #Sukkot #FeastOfTabernacles #BiblicalFeasts #TheGospelStory #FaithAndFamily #TorahLife Find us on iTunes, Spotify, TikTok, and Podbean. Gen 33:17 And Jacob journeyed to Succoth, and built him an house, and made booths for his cattle: therefore the name of the place is called Succoth. Root Word Suka The KJV translates Strong's H5521 in the following manner: tabernacle (12x), booth (11x), pavilion (5x), cottage (1x), covert (1x), tents (1x). thicket, covert, booth, thicket, booth (rude or temporary shelter) Plural Suka (Succoth) סוכות (succoth) broken down by letter: Samech, The root סכך (sakak) or שכך (sakak) speaks of the creation of a hedge of sorts from interwoven strands of sorts. It commonly describes how prickly branches interweave to create a defensive hedge to hide behind and to look intently out from Jeremiah 35:5-10 5 Then I set cups and pitchers filled with wine in front of the family of Rechab. I said to them, “Drink some wine.”6 They answered, “We don't drink wine, because our ancestor Jonadab, Rechab's son, gave us this order: ‘You and your descendants must never drink wine. 7 Never build any houses or plant any fields or vineyards. You must never have any of these things. You must always live in tents so that you may live for a long time in the land where you are staying.' 8 We, along with our wives, sons, and daughters, have obeyed our ancestor Jonadab, Rechab's son, in everything he ordered us to do. We have never drunk wine, 9 built houses to live in, or owned vineyards, pastures, or grainfields. 10 We live in tents, and we have obeyed everything our ancestor Jonadab ordered us to do. 11 But when King Nebuchadnezzar of Babylon invaded this land, we said, ‘Let's go to Jerusalem to escape the Babylonian and Aramean armies.' That's why we are living in Jerusalem.” -Sucathites- A hedged in people From the root סכך(sakak), to weave a protection. Job 1:10 Names of God Bible 10 Haven't you put a protective fence around him, his home, and everything he has. You have blessed everything he does. His cattle have spread out over the land. Hosea 2:8 Names of God Bible 8 “She doesn't believe that I gave her grain, new wine, and olive oil. I gave her plenty of silver and gold, but she used it to make statues of Baal. Ruth 3 Naomi, Ruth's mother-in-law, said to her, “My daughter, shouldn't I try to look for a home that would be good for you? 2 Isn't Boaz, whose young women you've been working with, our relative? He will be separating the barley from its husks on the threshing floor[a] tonight. 3 Freshen up, put on some perfume, dress up, and go down to the threshing floor. Don't let him know that you're there until he's finished eating and drinking. 4 When he lies down, notice the place where he is lying. Then uncover his feet, and lie down there. He will make it clear what you must do.” 5 Ruth answered her, “I will do whatever you say.” שוכתים- Verb סוך(suk) or סיך (syk) describes the administration of oil — apparently in the expectation that this would protect the recipient, since this two-faced verb may also be used to mean to hedge Noun אסוך ('asuk) means [oil-] flask. Noun מסכה (mesuka) means hedge and is obviously similar to משכה (mesukka) meaning hedge Ohel-The KJV translates Strong's H168 in the following manner: tabernacle(s) (198x), tent(s) (141x), dwelling (2x), place(s) (2x), covering (1x), home (1x). tent, nomad's tent, and thus symbolic of wilderness life, transience, dwelling, home, habitation, the sacred tent of Jehovah (the tabernacle) סוּךְ Transliteration sûḵ -Pronunciation-sook to anoint, pour in anointing (Qal) to anoint to anoint oneself to anoint (another) to be poured (Hiphil) to anoint https://jacksontrailfarm.com/2025/10/05/gospelstoryofthefeast/ At Sabbath Lounge we are dedicated to eating clean, keeping the Feast, Sabbath, following Torah, and leading as many people out of Babylon as possible. Find more information below: www.sabbathlounge.com https://linktr.ee/Sabbathlounge
Language is Fun! The Compound Noun Treasure Hunt with Kimberlee Gard In this episode of the Helping Families Be Happy podcast, host Adina Oberman interviews award-winning children's author Kimberlee Gard about her newest book "The Compound Noun Treasure Hunt," part of the Language is Fun series. Kimberlee shares her personal journey of overcoming dyslexia and her mission to create engaging books that inspire a love of reading in children, especially reluctant readers. The conversation covers practical strategies for parents and teachers supporting struggling readers, including the use of high-interest low-level books, audiobooks, and incorporating reading into everyday activities. Kimberlee also discusses her collaboration with Familius and illustrator Sandy Sonke in bringing compound words to life through an adventure story that makes learning fun and interactive. Episode Highlights 00:00:10: Host Adina Oberman introduces the podcast and guest Kimberlee Gard, an award-winning children's author who overcame dyslexia to write books that inspire love of reading. 00:01:29: Kimberlee expresses enthusiasm about returning to the podcast and discussing her work 00:01:34: Discussion begins about Kimberlee's newest book in the Language is Fun series 00:01:48: Kimberlee introduces "The Compound Noun Treasure Hunt" featuring new characters going on an adventure while discovering compound words 00:02:21: Adina requests more details about the compound word book and the broader Language is Fun series. 00:02:30: Kimberlee credits Familius founder, Christopher, for the book's concept and praises illustrator Sandie Sonke's work in bringing the interactive story to life. 00:03:38: Kimberlee explains her mission to inspire love of reading, especially for reluctant readers and children with dyslexia like herself. 00:04:19: Adina discusses how the books resonate with families and are available on educational platforms including Netflix, making them accessible in classrooms. 00:05:52: Kimberlee provides comprehensive advice for supporting reluctant readers, emphasizing the importance of recognizing reading difficulties and potential learning disabilities early. 00:07:14: Detailed strategies shared including high-interest low-level books, audiobooks, incorporating reading into daily life, and creating reading routines 00:08:13: Additional tips include using rewards, bedtime routines, car audiobooks, visiting little free libraries, and modeling love of reading 00:09:28: Idina appreciates the practical on-the-go strategies and shares how podcasts have inspired her children's reading interests 00:10:56: Kimberly suggests summer reading challenges and charts as additional motivation for children 00:11:17: Discussion of creative approaches like planning mini-adventures based on books being read 00:12:29: Kimberly teases future books in the series and emphasizes the value of author school visits for engaging students. 00:13:47: Idina asks for contact information and where listeners can find Kimberly's work. 00:13:57: Kimberly provides her website and mentions books are available nationwide, offering to help with reading struggles. 00:14:23: Information about the new book's August release date and availability. 00:14:37: Closing pleasantries and thanks. 00:14:39: Host concludes with thanks to Familius and encouragement for listeners to subscribe and review. Key Takeaways Early identification of learning difficulties like dyslexia is crucial for getting children the resources they need. High-interest, low-level books can help reluctant readers feel capable and accomplished Audiobooks and read-alongs significantly improve fluency and comprehension while reducing reading pressure. Incorporating reading into everyday activities (menus, signs, recipes) makes it feel purposeful and fun. Creating consistent reading routines, whether through bedtime stories or car audiobooks, builds positive associations. Parents modeling enthusiasm for reading directly influences children's attitudes toward books Interactive and engaging educational content can make learning grammar fundamentals feel like entertainment rather than academic work. Author visits to schools can significantly boost student engagement with reading and writing. Quotable Moments "If you can make learning fun and engaging, it just takes the work of reading away and they can get excited about it." - Kimberlee Gard "Reading is hard. It is really hard for children to learn and some children pick it up really quick and others struggle a little bit more." -Kimberlee Gard "If your kids see you excited about books, excited to go to the library, excited to go to the bookstore, excited to have reading time, they can start to enjoy it as well." -Kimberlee Gard "My hope for all of the books in the Learning is Fun series is just to inspire kids to have a love for reading." - Kimberlee Gard
En entrevista con Pamela Cerdeira, para MVS Noticias, Tania Rodríguez Mora, Subsecretaria de Educación Media Superior de la SEP, abordó el tema del avance en el plan de ampliación de cobertura de educación media superior.See omnystudio.com/listener for privacy information.
Please enjoy this encore of Word Notes. A set of solutions for ensuring that the right users can only access the appropriate resources. CyberWire Glossary link: https://thecyberwire.com/glossary/identity-and-access-management Audio reference link: “The Wrath of Khan (1982) ‘Kirk's Response,'” by Russell, YouTube, 16 May 2017.
Please enjoy this encore of Word Notes. A set of solutions for ensuring that the right users can only access the appropriate resources. CyberWire Glossary link: https://thecyberwire.com/glossary/identity-and-access-management Audio reference link: “The Wrath of Khan (1982) ‘Kirk's Response,'” by Russell, YouTube, 16 May 2017. Learn more about your ad choices. Visit megaphone.fm/adchoices
Please enjoy this encore of Word Notes. The deployment of rules to the security stack across all data islands, cloud, SaaS applications, data centers, and mobile devices designed to manifest an organization's cybersecurity first principle strategies of zero trust, intrusion kill chain prevention, resilience, and risk forecasting. CyberWire Glossary link: https://thecyberwire.com/glossary/policy-orchestration Audio reference link: “The Value of Using Security Policy Orchestration and Automation,” by David Monahan, uploaded by EMAResearch, 3 April, 2018
Please enjoy this encore of Word Notes. The deployment of rules to the security stack across all data islands, cloud, SaaS applications, data centers, and mobile devices designed to manifest an organization's cybersecurity first principle strategies of zero trust, intrusion kill chain prevention, resilience, and risk forecasting. CyberWire Glossary link: https://thecyberwire.com/glossary/policy-orchestration Audio reference link: “The Value of Using Security Policy Orchestration and Automation,” by David Monahan, uploaded by EMAResearch, 3 April, 2018 Learn more about your ad choices. Visit megaphone.fm/adchoices
Things get creepy on the BSG podcast when four unreliable female narrators come together to discuss the Netflix adaptation of The Woman in Cabin 10, based on the thriller by Ruth Ware. This week, Tirzah Price, author of In Want of a Suspect and the upcoming A Matter of Murder, joins the squad aboard our lavish yacht. Tune in as we tackle important questions like: Why is this woman so tired? Why did the movie switch up the story so much? And most importantly, how the heck did Lo Blacklock get herself in this situation yet again in the sequel? If you watch The Woman in Cabin 10, starring Keira Knightly holding an iPhone for the first time in her life, make sure to write in and let us know your thoughts! And tune in next time (Oct 28) as we discuss Katabasis by RF Kuang! And on Nov 11, Tatiana Schlote-Bonne joins us to discuss Midsommar and her novel The Mean Ones! Don't forget to leave us a rating and review, and join our Patreon for exclusive pet pics!TOC1:18 Tirzah is Here!7:50 Intro. Question13:50 Book Vs. Movie Changes28:33 The Cast32:16 The Ending48:05 Is This Movie Good?54:20 The Woman in Suite 11 (light spoilers)1:04:10 Why is the Woman-Preposition-Noun trend so popular?1:14:03 A Matter of Murder by Tirzah Price!1:18:58 What's on the Blog! Wrap-Up Stuff!
Please enjoy this encore of Word Notes. A process of hiding the complexity of a system by providing an interface that eases its manipulation. CyberWire Glossary link: https://thecyberwire.com/glossary/abstraction-layer Audio reference link: “What Is Abstraction in Computer Science,” by Codexpanse, YouTube, 29 October 2018.
Please enjoy this encore of Word Notes. A process of hiding the complexity of a system by providing an interface that eases its manipulation. CyberWire Glossary link: https://thecyberwire.com/glossary/abstraction-layer Audio reference link: “What Is Abstraction in Computer Science,” by Codexpanse, YouTube, 29 October 2018. Learn more about your ad choices. Visit megaphone.fm/adchoices
Please enjoy this encore of Word Notes. A set of services for managing identity and access management, or IAM across all of an organization's data islands. CyberWire Glossary link: https://thecyberwire.com/glossary/identity-fabric Audio reference link: “Leadership Compass Identity Fabrics - Analyst Chat 126,” by KuppingerCole, YouTube, 30 May 2022.
Please enjoy this encore of Word Notes. A set of services for managing identity and access management, or IAM across all of an organization's data islands. CyberWire Glossary link: https://thecyberwire.com/glossary/identity-fabric Audio reference link: “Leadership Compass Identity Fabrics - Analyst Chat 126,” by KuppingerCole, YouTube, 30 May 2022. Learn more about your ad choices. Visit megaphone.fm/adchoices
learn how to say 'walk (noun)' in Italian
Please enjoy this encore of Word Notes. A cybersecurity first principle strategy focused on disrupting known adversary activity at one of several phases of an attack sequence. CyberWire Glossary link: https://thecyberwire.com/glossary/intrusion-kill-chain Audio reference link: "Cybersecurity Days: A Network Defender's Future," by Rick Howard, Integrated Cyber Conference, Integrated Adaptive Cyber Defense (IACD), YouTube, 26 October 2018.
Please enjoy this encore of Word Notes. A cybersecurity first principle strategy focused on disrupting known adversary activity at one of several phases of an attack sequence. CyberWire Glossary link: https://thecyberwire.com/glossary/intrusion-kill-chain Audio reference link: "Cybersecurity Days: A Network Defender's Future," by Rick Howard, Integrated Cyber Conference, Integrated Adaptive Cyber Defense (IACD), YouTube, 26 October 2018. Learn more about your ad choices. Visit megaphone.fm/adchoices
In this English lesson I'll help you learn some common English noun phrases like: a waste of time, a waste of money, a pain in the neck, a piece of cake, a matter of time, a drop in the bucket, a breath of fresh air, a ray of hope, a stroke of luck, a waste of space, a load of nonsense, a blessing in disguise, a fact of life, a state of mind, a sign of the times, a way of life, a rule of thumb, a matter of opinion, a work of art, a turn of events, a moment of truth, a state of emergency, a pack of lies, a flash of lightning, a sense of humor, a loss of words, a way with words, a matter of principle, a question of time, and a waste of energy!Note: This is the audio portion of a Youtube English lesson which you can watch right here: https://www.youtube.com/watch?v=Xky8iXBzfMw or by searching Youtube for, "Bob the Canadian Noun Phrases"
Headlines: This week, Slovenia imposed sanctions on Israel's Prime Minister Benjamin Netanyahu, the first EU state to do so. The Slovenian government cited the arrest warrant issued by the International Criminal Court (ICC) in November 2024, on charges of war crimes and crimes against humanity allegedly committed in Gaza since October 2023and the July 2024 advisory opinion by the International Court of Justice (ICJ) affirming the illegality of Israel's occupation and the obligations of third states not to recognise it.Israel Strike of the West Asian region including strikes on Yemen as well as a quick report of the most recent UN meeting of the general assembly. From the desk of Prof. Mazin Qumsiyeh who can follow here:The most shocking thing at the UN is not what you expect. Netanyahu'sspeech was largely boycotted by most delegates who walked out. He said whatyou expect him to say: doubling down on his rhetoric and threatening thewhole world (at one point saying to watch what he does when he returns to"Israel" in response to the recognition of a state of Palestine). DonaldTrump spoke, rambling boisterous, dismissive of the world, self centered,and lying as usual. He said to his stunned silent audience: "I am reallygood at this stuff. Your countries are going to hell... It is true I havebeen right about everything." But this was all expected. Also expectedthat other western countries, knowing a western-suppored genocide is goingon, try to wiggle out of it by declaring support for a Palestinian statewithout Palestinian rights. For example France and England want the stateto lie about history in school textbooks, to deny indigenous people rights(especially right of return), and most importantly to delegitimizeresistance to colonialism. Mahmoud Abbas whose term expired 15 years agogave a UN speech by video after being denied a visa by the US. Instead ofrallying against the US/Israeli dictats, he tried to reassure them that hewill disarm the resistance etc. In short they all want to support apartheidbut differ on best way forward! The recognition of the "state of Palestine"is conditional on acceptance of a racist apartheid genocidal regime in thesame was as recognition in apartheid South Africa of the fake Zululandbantustan! But the situation here is far worse than apartheid in SouthAfrica. There it was settler colonialism and here it is DISPLACEMNT andETHNIC CLEANSING and GENOCIDE in a scale not seen in the past 100 years.8.5 million Palestinians are refugees or displaced people. Hardly anyonemaking speeches at the UN mentioned this or came close to making the rightdiagnosis of what ails us. But there were notable exceptions such asVenezuela (hence Trump is bombing it). The reality is that the mostshocking thing at the UN theater of the absurd is the discord betweentalking about Israel being isolated while taking no practical steps to stopthis genocidal regime which still exterminating civilians, attacking shipsin International waters, bombing nearby countries, torturing politicalprisoners, and starving our people. No UN speech saves a single child. Whatis needed is boycotts, divestments and sanctions (bdsmovement.net).Report about the Italian general strike and the applicable lessons to the Australian concept and what can be done about mobilising community groups towards collective and autonomous action. Francesca Albanese speech from Together for Palestine. Voices 4 Palestine II here Comrade Viviene Langford brings us another report from the Sydney rallies, this week we hear from Angus Macflane of the ASU about a union response and responsibility. Menzies 4 Palestine Interview II hereStratos from the community group Menzies for Palestine drops in for a quick chat on community organzing They are having a rally at Eltham Town Square on Arthur Street on the Saturday 4th of October. Speakers will include:Jizelle Hanna - CPSU Victorian SecretarySamanthi Gunawardna Stephen Clandinnen - Nillumbik 4 PalestineSong - DRMNGNOW - Pray NT Report II hereThe last two weeks have seen reports of an NT man that plead guilty to a fatal hit and run that saw the death of one First Nations man and the severe injury of another. The sentence was a 12 month community corrections order we hear a quote from Danggalaba Kulumbirigin Tiwi woman and Advocacy Manager for Change the Record, Mililma May in an interview from NITV. We also hear Mililma May as her speech is read out at the NT protest that was held on the 2nd September that was held by Justice not Jails as well as speech by a Yolngu elderly. All the speeches were recorded by the lovely people at Salt Water Radio on 8CCC which you can listen to here. Song - Brian Eno - Oh Rascal (Live @ Together for Palestine) This is the Week II hereComrade Kevin bring us his satirical reports from The week That Was. Don Sutherland II herePolitical correspondent Don Sutherland stops in to talk about climate, Labors climtae targets and why these targets have been widely recieved as inefficient by enviromental groups. Song - Marlon Williams - Rere Mai Ngā Rau
Please enjoy this encore of Word Notes. A subset of security orchestration, the management of identities across an organization's set of digital islands. CyberWire Glossary link: https://thecyberwire.com/glossary/identity-orchestration
Please enjoy this encore of Word Notes. A subset of security orchestration, the management of identities across an organization's set of digital islands. CyberWire Glossary link: https://thecyberwire.com/glossary/identity-orchestration Learn more about your ad choices. Visit megaphone.fm/adchoices
In this episode, I talk about a new way to talk to yourself about your life's current chapter. I talk about a phrasing of "not yet" that sets you free from the heaviness of certain feelings.My new book "The Opposite of Settling" is out now!Instagram: @case.kenny Hosted by Simplecast, an AdsWizz company. See pcm.adswizz.com for information about our collection and use of personal data for advertising.
Please enjoy this encore of Word Notes. A cyber threat intelligence analysis model that defines relationship pairs between four core components in the shape of a diamond of adversary playbook activity across the intrusion kill chain: the adversary, their capability, the infrastructure used or attacked, and the victim. CyberWire Glossary link: https://thecyberwire.com/glossary/diamond-model Audio reference link: “Diamond Presentation v2 0: Diamond Model for Intrusion Analysis – Applied to Star Wars' Battles,” Andy Pendergrast and Wade Baker, ThreatConnect, YouTube, 4 February 2020.
Please enjoy this encore of Word Notes. A cyber threat intelligence analysis model that defines relationship pairs between four core components in the shape of a diamond of adversary playbook activity across the intrusion kill chain: the adversary, their capability, the infrastructure used or attacked, and the victim. CyberWire Glossary link: https://thecyberwire.com/glossary/diamond-model Audio reference link: “Diamond Presentation v2 0: Diamond Model for Intrusion Analysis – Applied to Star Wars' Battles,” Andy Pendergrast and Wade Baker, ThreatConnect, YouTube, 4 February 2020. Learn more about your ad choices. Visit megaphone.fm/adchoices
TRY N3 Textbook P52▼Buy me a coffee and Be a sponsor of one episode https://bit.ly/KANAKO-Coffee▼italki: Get $10 credit https://www.italki.com/affshare?ref=af28732250▼BGM ⇒ DOVA-SYNDROME(https://dova-s.jp/)▼Ending BGM ⇒Flower Field【FLASH☆BEAT】
Please enjoy this encore of Word Notes. A knowledge base of adversary tactics, techniques, and procedures established and maintained by the MITRE Corporation. CyberWire Glossary link: https://thecyberwire.com/glossary/mitre-attck Audio reference link: “Attack Frameworks - SY0-601 CompTIA Security+ : 4.2,” Professor Messer, YouTube, 29 April 2021.
Please enjoy this encore of Word Notes. A knowledge base of adversary tactics, techniques, and procedures established and maintained by the MITRE Corporation. CyberWire Glossary link: https://thecyberwire.com/glossary/mitre-attck Audio reference link: “Attack Frameworks - SY0-601 CompTIA Security+ : 4.2,” Professor Messer, YouTube, 29 April 2021. Learn more about your ad choices. Visit megaphone.fm/adchoices
The Rizzuto Show crew shares their weekend adventures, including King Scott's concert adventure and trip to meet his hero Weird Al! We dive into the ups and downs of social interactions, from late-night texts to the peculiarities of neighborly pranks. Plus, we get into some interesting relationships and the latest in pop culture, including a unique new dating trend dubbed, "Date Them 'Til You Hate Them." So grab your headphones and dive into this entertaining journey through the Rizz Show's weekend escapades! Follow The Rizzuto Show @rizzshow on all your favorite social media, including YouTube, Facebook, Twitter, Instagram, TikTok, and more. Connect with The Rizzuto Show online at 1057thepoint.com/rizz See Privacy Policy at https://art19.com/privacy and California Privacy Notice at https://art19.com/privacy#do-not-sell-my-info.
Please enjoy this encore of Word Notes. The set of people, process, technology, and cultural norms that integrates software development and IT operations into a system-of-systems. CyberWire Glossary link: https://thecyberwire.com/glossary/devops Audio reference link: "10+ Deploys Per Day: Dev and Ops Cooperation at Flickr," by John Allspaw and Paul Hammond, Velocity 09, 25 July 2009.
Please enjoy this encore of Word Notes. The set of people, process, technology, and cultural norms that integrates software development and IT operations into a system-of-systems. CyberWire Glossary link: https://thecyberwire.com/glossary/devops Audio reference link: "10+ Deploys Per Day: Dev and Ops Cooperation at Flickr," by John Allspaw and Paul Hammond, Velocity 09, 25 July 2009. Learn more about your ad choices. Visit megaphone.fm/adchoices
Please enjoy this encore of Word Notes. A software development model that relies on a series of sequential steps that flow into each other, like a series of waterfalls. CyberWire Glossary link: https://thecyberwire.com/glossary/waterfall-software-development Audio reference link: “Creating Video Games - Agile Software Development,” by Sara Verrilli, MIT OpenCourseWare, YouTube, 10 December 2015
Please enjoy this encore of Word Notes. A software development model that relies on a series of sequential steps that flow into each other, like a series of waterfalls. CyberWire Glossary link: https://thecyberwire.com/glossary/waterfall-software-development Audio reference link: “Creating Video Games - Agile Software Development,” by Sara Verrilli, MIT OpenCourseWare, YouTube, 10 December 2015 Learn more about your ad choices. Visit megaphone.fm/adchoices
Please enjoy this encore of Word Notes. A software development philosophy that emphasizes incremental delivery, team collaboration, continual planning, and continual learning CyberWire Glossary link: https://thecyberwire.com/glossary/agile-software-development Audio reference link: "Velocity 09: John Allspaw and Paul Hammond, "10+ Deploys Pe," John Allspaw and Paul Hammond, 2009 Velocity Conference, YouTube, 25 June 2009.
00:00-15:00 ML chats Calvary Club taking the next step, Scottie Scheffler rolling with another win and signature shot, new technology hitting Calvary, a hard but good golf year in CNY with weather, Syracuse football naming a QB, a hard Orange schedule and more with Jeff Moesch from Calvary Club, Gomez Adams from TK 99, Joe Jr. and golf legend Perry Noun. Presented by CH Insurance.
Please enjoy this encore of Word Notes. A software development philosophy that emphasizes incremental delivery, team collaboration, continual planning, and continual learning CyberWire Glossary link: https://thecyberwire.com/glossary/agile-software-development Audio reference link: "Velocity 09: John Allspaw and Paul Hammond, "10+ Deploys Pe," John Allspaw and Paul Hammond, 2009 Velocity Conference, YouTube, 25 June 2009. Learn more about your ad choices. Visit megaphone.fm/adchoices
Please enjoy this encore of Word Notes. The flagship product of the controversial Israeli spyware vendor, the NSO Group, use for remotely hacking mobile devices, most notably iPhones, via zero-click exploits. CyberWire Glossary link: https://thecyberwire.com/glossary/pegasus Audio reference link:“Cybersecurity beyond the Headlines: A Conversation with Journalist Nicole Perlroth,” Kristen Eichensehr, and Nicole Perlroth, University of Virginia School of Law, YouTube, 14 February 2022
Please enjoy this encore of Word Notes. The flagship product of the controversial Israeli spyware vendor, the NSO Group, use for remotely hacking mobile devices, most notably iPhones, via zero-click exploits. CyberWire Glossary link: https://thecyberwire.com/glossary/pegasus Audio reference link:“Cybersecurity beyond the Headlines: A Conversation with Journalist Nicole Perlroth,” Kristen Eichensehr, and Nicole Perlroth, University of Virginia School of Law, YouTube, 14 February 2022 Learn more about your ad choices. Visit megaphone.fm/adchoices
Please enjoy this encore of Word Notes. An open source email authentication protocol designed to prevent emails, spoofing in phishing, business email compromise or BEC, and other email-based attacks. CyberWire Glossary link: https://thecyberwire.com/glossary/pegasus Audio reference link:"Global Cyber Alliance's Phil Reitinger talks DMARC adoption" “Global Cyber Alliance's Phil Reitinger Talks DMARC Adoption.” YouTube Video. YouTube, April 27, 2018
Please enjoy this encore of Word Notes. An open source email authentication protocol designed to prevent emails, spoofing in phishing, business email compromise or BEC, and other email-based attacks. CyberWire Glossary link: https://thecyberwire.com/glossary/pegasus Audio reference link:"Global Cyber Alliance's Phil Reitinger talks DMARC adoption" “Global Cyber Alliance's Phil Reitinger Talks DMARC Adoption.” YouTube Video. YouTube, April 27, 2018 Learn more about your ad choices. Visit megaphone.fm/adchoices
Please enjoy this encore of Word Notes. A condition announced by the US Cybersecurity and Infrastructure Security Agency (CISA) to draw attention to a temporary period of high alert, associated with expectation of a connected wave of cyberattacks prompted by either a widespread vulnerability or an unusually active and capable threat actor. CyberWire Glossary link: https://thecyberwire.com/glossary/shields-up Audio reference link: “Star Trek II Wrath of Khan - Reliant vs Enterprise; First Clash” YouTube, YouTube, 11 Apr. 2015,
Please enjoy this encore of Word Notes. A condition announced by the US Cybersecurity and Infrastructure Security Agency (CISA) to draw attention to a temporary period of high alert, associated with expectation of a connected wave of cyberattacks prompted by either a widespread vulnerability or an unusually active and capable threat actor. CyberWire Glossary link: https://thecyberwire.com/glossary/shields-up Audio reference link: “Star Trek II Wrath of Khan - Reliant vs Enterprise; First Clash” YouTube, YouTube, 11 Apr. 2015, Learn more about your ad choices. Visit megaphone.fm/adchoices
Learn more about your ad choices. Visit podcastchoices.com/adchoices
Take our free English-level quiz here to find out what your current English level is. Do you love All Ears English? Try our other podcasts here: Business English Podcast: Improve your Business English with 3 episodes per week, featuring Lindsay, Michelle, and Aubrey IELTS Energy Podcast: Learn IELTS from a former Examiner and achieve your Band 7 or higher, featuring Jessica Beck and Aubrey Carter Visit our website here or https://lnk.to/website-sn If you love this podcast, hit the follow button now so that you don't miss five fresh and fun episodes every single week. Don't forget to leave us a review wherever you listen to the show. Send your English question or episode topic idea to support@allearsenglish.com Learn more about your ad choices. Visit podcastchoices.com/adchoices
Please enjoy this encore of Word Notes. A prescriptive open source software security maturity model designed to guide strategies tailored to an organization's specific risks. Audio reference link: "OWASPMSP - Pravir Chandra: Software Assurance Maturity Model (OpenSAMM)." by Pravir Chandra, OWASP MSP, 2009.
Please enjoy this encore of Word Notes. An open standard for hardware authentication tokens that use the universal serial bus, or USB, near-field communications, or NFCs, or Bluetooth to communicate one factor in a two-factor authentication exchange. Cyberwire Glossary link: https://thecyberwire.com/glossary/u2f Audio reference link: “Rise of the Machines: A Cybernetic History,” by Thomas Rid, Published by W. W. Norton Company, 21 November 2017.
Please enjoy this encore of Word Notes. A cyber threat intelligence best practice of assigning arbitrary labels to collections of hacker activity across the intrusion kill chain.