POPULARITY
Today I've got something really special for you. I recently had an incredible live Instagram session with the amazing Thais Gibson, a true expert on relationships and attachment styles. I'm so excited to share this conversation with you because we dive deep into understanding these vital aspects of how we connect and communicate in our relationships. Thais breaks down the four major attachment styles—securely attached, anxious/preoccupied, dismissive/avoidant, and fearful avoidant—and how each of these shapes our subconscious beliefs about love. We chat about how our childhood experiences mold these styles and the profound impact this has on our adult relationships. I also get a bit personal in this episode, opening up about my own journey and struggles with health and hormones, as well as my path from being dismissive avoidant to becoming securely attached. Thais shares practical strategies for identifying and transforming our attachment patterns, which I found incredibly empowering. And guess what? We even touch on the exciting idea of a dating app based on attachment styles! Plus, we delve into the crucial topics of self-validation and emotional regulation. If you're looking to understand your own attachment style better or hoping to improve your relationships, this episode is jam-packed with actionable insights. SHOW NOTES: 00:00 Exciting guest, curiosity for growth, and health journey. 03:09 Attachment styles impact relationships; understanding leads growth. 09:22 Securely attached parents facilitate secure relationships. 12:46 Adults seek consistency, love due to childhood lack. 15:12 Anxious attachment style can hinder self-care. 19:51 Conscious mind reprograms subconscious for emotional growth. 21:00 Learning to rely on internal cues, distractions. 24:28 Childhood emotional neglect can lead to shame. 28:23 Greek upbringing stifled emotional expression, causing avoidance. 30:17 Childhood observation shaped emotional strength and suppression. 36:23 Trust is built on being seen, known. 37:13 Considerate communication and trust build stronger relationships. 40:56 Girl, you were fire! Keep up the work. 43:46 Prioritize what matters; podcast release soon. Learn more about your ad choices. Visit megaphone.fm/adchoices
Send us a textIn this episode, I'm chatting with my friend Kelsey Silver about something so many of you have been asking about - how the heck are we supposed to use AI without compromising our clients' security? Kelsey has a super unique background and she breaks down exactly what we need to look for when evaluating AI tools for our firms. Plus, she shares about her AI app Foresight HQ that helps you identify your hottest leads in your Instagram DMs - no more chasing people who just wanted the freebie!In this episode you'll hear:How to evaluate AI tools for securityThe difference between machine learning and generative AIHow Kelsey balances building an app, doing VIP days, working a corporate job, AND being a mom to a 4.5-year-oldResources mentioned in this episode:The Metrics 7-Figure Business Owners Can't Live Without: https://kelseysilver.com/metrics5 DM Signals $FREE: https://foresighthq.app/5signalsNotionThriveCart, High Level, and SamCartManyChatMeet KelseyKelsey Silver is a data and AI strategist and the founder of ForesightHQ, an AI-powered DM lead tracker designed for business owners who want to follow up in their DMs without feeling like a sales robot. With a background in psychology, 10+ years in corporate analytics, and a deep love for systems that actually fit your life, Kelsey helps entrepreneurs find the hidden gold in their data so they can sell smarter and with more integrity. When she's not decoding buyer signals or mapping launch strategies, you can find her at a Ren Faire with her daughter or decompression from reading spreadsheets all day with a bag of Oreos and an oat milk chai latte.Connect with KelseyInstagram: @kelseyesilverWebsite: https://kelseysilver.com/App: https://foresighthq.appThanks for listening. If this episode inspired you in some way, take a screenshot of you listening on your device and post it to your Instagram stories and tag me @ambitiousbookkeeperFor more information about the Ambitious Bookkeeper Podcast or interest in our programs or mentoring visit our resources below:Visit our website: https://www.ambitiousbookkeeper.comFollow the Blog: https://www.ambitiousbookkeeper.com/blogConnect on Instagram: https://www.instagram.com/ambitiousbookkeeperConnect on Threads: https://www.threads.net/@ambitiousbookkeeperConnect on Facebook: https://www.facebook.com/serenashoupcpaThank you for your support of our show. If you haven't left a review yet it's super simple. Please go to ambitiousbookkeeper.com/podcast and leave your review.Podcast Publishing Tools we use:Editing → Sabr Media LLC: https://www.iangilliam.com/sabr-media-llcDescript: https://get.descript.com/u7lubkx09073 (affiliate link)Buzzsprout: Subscribe to stay in the know about Black Friday: ambitiousbookkeeper.com/subscribeBlack Friday Sale happens November 28 - Dec 2 Get access to the Dubsado Decoded Private Podcast Series here>>
Worship Guide | Contact Us | Watch
Secure data disposal is no longer optional—it's a regulatory and security necessity. In this episode, we break down crypto shredding, a powerful cryptographic method that ensures permanently irrecoverable data. From key destruction to random overwriting, discover how organizations use crypto shredding to prevent breaches and meet compliance standards.
Send us a textCheck us out at: https://www.cisspcybertraining.com/Get access to 360 FREE CISSP Questions: https://www.cisspcybertraining.com/offers/dzHKVcDB/checkoutGet access to my FREE CISSP Self-Study Essentials Videos: https://www.cisspcybertraining.com/offers/KzBKKouvSecurity programs fail when they try to do everything at once. We walk through a clear three-phase plan that keeps you focused and effective: start with a real gap assessment anchored in leadership's risk tolerance, convert findings into decisions to mitigate, accept, or transfer risk, and then implement with a balanced mix of people, process, and tools. Along the way, we share what to look for when hiring a virtual CISO and how to turn that engagement into actionable momentum instead of another shelfware report.From there, we tighten the perimeter by defining bounds that keep systems within safe lanes: role-based access control, data classification, DLP, segmentation, encryption, and change management that shrinks blast radius. We get tactical with process isolation, sandboxing, capability-based security, and application whitelisting, plus a grounded comparison of MAC vs DAC and when a hybrid model makes sense. Defense in depth ties it together with physical safeguards, network protections, EDR and patching, application security practices, and data security. We keep the human layer practical with targeted awareness training and a tested incident response plan.Resilience is the throughline. We advocate for secure defaults and least privilege by design, logging that's actually reviewed, and updates that apply on a measured cadence. When things break, fail safely: graceful degradation, clean error handling, separation of concerns, redundancy, and real-world drills that expose weak spots early. Governance keeps the program honest with separation of duties, dual control, job rotation, and change boards that prevent unilateral risk. Finally, we demystify zero trust: start small, micro-segment your crown jewels, verify continuously, and respect cloud nuances without overcomplicating your stack.If this helps you clarify your next move, follow the show, share it with a teammate, and leave a quick review so others can find it. Tell us: which phase are you tackling first?Gain exclusive access to 360 FREE CISSP Practice Questions at FreeCISSPQuestions.com and have them delivered directly to your inbox! Don't miss this valuable opportunity to strengthen your CISSP exam preparation and boost your chances of certification success. Join now and start your journey toward CISSP mastery today!
In this episode, Matt Vincent, Editor in Chief at Data Frontier is joined by Rob Macchi, Vice President Data Center Solutions at Wesco and they explore how companies can stay ahead of the curve with smarter, more resilient construction strategies. From site selection to integrating emerging technologies, Wesco helps organizations build data centers that are not only efficient but future-ready. Listen now to learn more!
Today’s Bible Verse:"Look to Abraham, your father, and to Sarah, who gave you birth. When I called him he was only one man, and I blessed him and made him many." — Isaiah 51:2 God reminds His people to look back at Abraham and Sarah — ordinary individuals through whom He accomplished extraordinary promises. Their story is a testament to God’s ability to multiply what seems small and bring fruit from what appears barren. When you feel insignificant or overlooked, remember: the same God who called and blessed Abraham is at work in your life, turning faith into fruitfulness and promises into reality. “Want to listen without ads? Become a BibleStudyTools.com PLUS Member today: https://www.biblestudytools.com/subscribe/ Meet Today’s Host: Jennifer Slattery Discover more devotions with Jennifer at Your Daily Bible Verse on LifeAudio Jennifer Slattery is a national speaker, multi-published author, and founder of Wholly Loved Ministries. She’s passionate about helping believers live with bold faith, rooted in surrender to Christ’s purpose. Jennifer co-hosts both Your Daily Bible Verse and Faith Over Fear, encouraging listeners to step into their God-given identity. Her teachings blend Scripture with personal insight to help others embrace God’s power over fear and move forward with confidence.
Text: Psalm 124 In the progression of the Songs of Ascent, and we see a move from fear to hope to joy. As we enter into Psalm 122, we see how the Psalmist is excited - rejoicing even to go to the House of the Lord to worship him. This joy isn't based on any worldly expectation but on the nature of who God is, how he will behave, and the reality that his judgment is good. As we read this, we are reminded that we are called to have this same gladness or excitement, not just to go to church but because we know where our eternal home is. It is in the new Jerusalem, where we will reside with the same good God for all of eternity.
Not all websites protect your password the same way. Some do it well, others badly, and a few dangerously poorly. I'll walk through the good, the bad, and the ugly of password storage, and share one simple step you can take to keep your accounts safe.
Access the podcast to hear digital transformation experts discuss how UConn adopted the Atlassian cloud platform to modernize IT infrastructure, scale service delivery and centralize institutional assets. Learn how your organization can optimize learning and administrative environments with Atlassian's secure cloud services, powered by Jira Service Management, Confluence and Assets.
Big thanks to Cisco for Sponsoring this video. For more information about the topic being discussed follow the following link: https://blogs.cisco.com/news/the-thir... Cisco's Martin Lund joins David Bombal to unpack how AI-scale networking really works - and why a 51.2 Tbps, 64×800G, post-quantum–ready router matters. We break down scale-up vs scale-out vs scale-across, deep buffers to prevent drops on long-haul links, line-rate IPsec/MACsec, SONiC vs IOS XR, P4 programmability, coherent optics for ~1000 km DCI, and how these pieces enable exabit-class fabrics for AI clusters. What you'll learn • Why GPUs are useless without massive, reliable interconnects • 51.2 Tbps with 64×800G ports and what that enables for AI training • Deep buffers vs shallow buffers and when each wins • Line-rate encryption today and post-quantum readiness tomorrow • SONiC on Cisco Silicon One, P4, and automation at hyperscale If you found this useful, hit subscribe and share with your favorite network nerd. It's always the network. // Martin Lund's SOCIALS // LinkedIn: / martinlundca // David's SOCIAL // Discord: discord.com/invite/usKSyzb Twitter: www.twitter.com/davidbombal Instagram: www.instagram.com/davidbombal LinkedIn: www.linkedin.com/in/davidbombal Facebook: www.facebook.com/davidbombal.co TikTok: tiktok.com/@davidbombal YouTube: / @davidbombal Spotify: open.spotify.com/show/3f6k6gE... SoundCloud: / davidbombal Apple Podcast: podcasts.apple.com/us/podcast... // MY STUFF // https://www.amazon.com/shop/davidbombal // SPONSORS // Interested in sponsoring my videos? Reach out to my team here: sponsors@davidbombal.com // MENU // 0:00 - Coming Up 0:54 - Intro 0:59 - Martin's Background 02:15 - Martin's Advice 02:48 - Cisco's Announcement 06:12 - Data Center Scaling 07:02 - Data Centres Scaling Across 11:08 - New Router Speeds 13:24 - Securing the Data Center (Quantum Computing) 17:57 - Are Deep Buffers Efficient? 19:25 - New Protocols 22:50 - Data Center Infrastructure 24:07 - 8804 Router Innovations 25:33 - The Future of Data Centers 27:50 - Conclusion Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel! Disclaimer: This video is for educational purposes only. #cisco #networking #ai
Guest post by Paul Wright, who is a passionate technology reviewer and writer with a focus on emerging innovations. Cryptocurrency wallets give traders and investors the freedom to fully control their digital assets without relying on banks or centralized services. But with that freedom comes an enormous responsibility: securing your wallet. If you lose access to your crypto wallet without a backup, your funds could be gone forever. One of the most critical elements of wallet security is your recovery phrase - sometimes called a seed phrase, mnemonic phrase, or backup phrase. Understanding what it is, how it works, and how to back it up properly is essential if you want to protect your crypto holdings for the long term. In this guide, we'll break down everything you need to know about recovery phrases, from the basics to advanced security practices. By the end, you'll know exactly how to safeguard your assets and avoid common mistakes that leave traders vulnerable. What Is a Crypto Recovery Phrase? A recovery phrase is a sequence of randomly generated words - usually 12, 18, or 24 words - that serves as the master key to your crypto wallet. It's generated when you first create a wallet and is designed to be human-readable so you can write it down or memorize it. Behind the scenes, those words correspond to a cryptographic seed. That seed is used to derive all of the private keys that control your cryptocurrency. In other words, whoever holds your recovery phrase has full control over your funds. This is why exchanges, hardware wallets, and software wallets consistently stress the importance of securely storing your recovery phrase. Why Is the Recovery Phrase So Important? Unlike traditional bank accounts, crypto wallets don't have a customer support hotline to reset your password. If you lose your recovery phrase and can't access your wallet, no one - not even the wallet provider - can help you. The recovery phrase is important because: It unlocks every account and token in your wallet. Even if you have multiple addresses, they all stem from that one seed. It allows you to restore your wallet on any compatible device. If your computer crashes, phone is lost, or hardware wallet is damaged, the phrase lets you restore access. It's your only fallback. Without it, there is no recovery. How Recovery Phrases Are Generated Most modern wallets follow the BIP-39 standard, which defines how recovery phrases are created. Here's how it works in simple terms: Your wallet generates a random number. That number is converted into a binary sequence. The sequence is split into segments that correspond to words from a standardized dictionary of 2048 words. The result is your recovery phrase. Because the dictionary is standardized, any wallet that supports BIP-39 can interpret the phrase, ensuring compatibility across devices. Best Practices for Storing Your Recovery Phrase Since your recovery phrase is the single point of failure for your wallet, you must treat it with extreme care. Here are the best practices every trader should follow: 1. Write It Down, Don't Store Digitally Screenshots, cloud storage, and password managers are vulnerable to hacks. Always write your phrase on paper or use a dedicated backup medium. 2. Store It in Multiple Secure Locations Fire, floods, and theft can destroy a single copy. Keep at least two copies in geographically separate locations. 3. Use Durable Storage Options Paper degrades over time. Consider metal seed storage devices that resist fire, water, and physical damage. 4. Never Share It With Anyone Scammers may pose as support staff or friends. No legitimate service will ever ask for your recovery phrase. 5. Test Your Backup Before storing large amounts of crypto, test your backup by restoring your wallet on another device with a small balance. Common Mistakes to Avoid Many beginners make simple errors that can cost them dearly. Here are the mistakes you must avoid: Taking a photo of your phrase and saving...
Caitlin Anderson, Intel's Americas Sales GM shares which industries are leading AI adoption, where the biggest untapped opportunities lie, and why AI spending is expected to double by 2028. With special guest Piyush Sharrma of Tuskira.aiTopics Include:Caitlin Anderson discusses Intel-AWS partnership and generative AI trends accelerating businessIntel's AI journey spans decades: analytics since 1980s, natural language processing 2000sComputer vision remains major use case from edge computing to data centersGenerative AI and AI agents are the latest wave, with agents collaborating togetherIntel uses AI internally for manufacturing automation in highly sensitive fab environmentsRobotics and AI optimize quality control, system monitoring, and technician productivityAI spending growth spans all industries, with significant acceleration expected through 2028Software services, healthcare, and financial services lead current AI adoption and experimentationEducation, government, retail, and energy represent major untapped growth opportunities aheadIntel-AWS partnership spans 20 years, featuring custom silicon and broad CPU portfolioTuskira CEO Piyush Sharrma explains cybersecurity "perfect storm" where attackers weaponize same AI toolsSuccess requires ecosystem partnerships - no single company can solve complex AI challengesParticipants:Caitlin Anderson - Corporate Vice President, GM Americas Sales, IntelPiyush Sharrma – CEO and Co-Founder, Tuskira.aiSee how Amazon Web Services gives you the freedom to migrate, innovate, and scale your software company at https://aws.amazon.com/isv/
We are back for Part 2 of my wedding reflections — and this episode is extra vulnerable.
MONEY FM 89.3 - Prime Time with Howie Lim, Bernard Lim & Finance Presenter JP Ong
Evren is a next-generation secure workspace platform that helps modern enterprises enable safe, scalable, and efficient work for distributed teams. Designed for organizations managing remote employees, contractors, and third-party collaborators, Evren delivers fully managed, policy-enforced work environments that run on any device without the complexity of traditional virtual desktops or restricted browsers. Evren combines zero-trust security, high-performance virtual infrastructure, and built-in compliance to protect sensitive corporate data while allowing teams to work freely and productively. On The Right Business, Hongbin Jeong speaks to Gaurav Nagar, Founder & CEO, Evren, to find out more.See omnystudio.com/listener for privacy information.
To explore more of the ways that HIPAA compliant hosting and infrastructure has evolved and where it's at today, I sat down with Philip Palmer, Director of Sales at Liquid Web and Kelly Goolsby, Director of Solution Architecture at Liquid Web. What was most fascinating about my discussion with Palmer and Goolsby is that the discussion was very little about the technical aspects and very much about the business aspects of HIPAA compliant hosting. It illustrates how HIPAA compliant hosting today isn't a technical challenge, but it is an administrative challenge that has a real impact on your healthcare organization's business.Learn more about Liquid Web: https://www.liquidweb.com/Healthcare IT Community: https://www.healthcareittoday.com/
In this episode, a16z partner Joel de la Garza sits down with Socket founder and CEO Feross Aboukhadijeh to dive into the intersection of vibe coding and security. As one of the earliest security founders to fully embrace LLMs, Feross shares firsthand insights into how these technologies are transforming software engineering workflows and productivity — and where there are sharp edges that practitioners need to avoid.The TL;DR: Treat AI-assisted programming the same way you'd treat other programming, by vetting packages, reviewing code, and generally make sure you're not sacrificing security for speed. As he explained, LLMs can make developers more productive and even make their software more secure, but only if developers do their part by maintaining a safe supply chain.Follow everyone on social media: Feross AboukhadijehJoel de la Garza Check out everything a16z is doing with artificial intelligence here, including articles, projects, and more podcasts.
Across EMEA, Artificial Intelligence (AI) is redefining industries, inspiring innovation, improving operations, and driving, growth. Government and Irish businesses are embracing and capitalising on AI's potential to enhance customer experiences and gain a competitive advantage. But as adoption accelerates, new security challenges arise, demanding vigilant attention to protect these investments. Forecasts indicate that AI could contribute trillions to the global economy by 2030, with Ireland well-positioned to capture a significant share of this value. According to Dell Technologies' Innovation Catalyst Study, 76% say AI and Generative AI (GenAI) is a key part of their organisation's business strategy while 66% of organisations are already in early-to mid-stages of their AI and GenAI journey. As AI becomes more embedded in everything from customer management to critical infrastructure, safeguarding these investments and tackling the evolving cyber threat landscape must be a priority. To that end the success of integrating AI in the region depends on addressing three critical security imperatives: managing risks associated with AI usage, proactively defend against AI-enhanced attacks, and employing AI to enhance their overall security posture. Managing the Risks of AI Usage Ireland as a digital hub within the EU, must navigate the complex regulatory environment like the Digital Operational Resilience Act (DORA), NIS2 Directive, the Cyber Resilience Act and the recently launched EU AI Act. These frameworks introduce stringent cybersecurity requirements that businesses leveraging AI must meet to ensure resilience and compliance. AI's reliance on vast amounts of data presents unique challenges. AI models are built, trained, and fine-tuned with data sets, making protection paramount. To meet these challenges, Irish organisations must embed cybersecurity principles such as least privilege access, robust authentication controls, and real-time monitoring into every stage of the AI lifecycle. However, technology and implementing these measures effectively isn't enough. The Innovation Catalyst Study highlighted that a lack of skills and expertise ranks as one of the top three challenges faced by organisations looking to modernize their defenses. Bridging this skills gap is vital to delivering secure and scalable AI solutions because only with the right talent, governance, and security-first mindset can Ireland unlock the full potential of AI innovation in a resilient and responsible way. A further step that Irish businesses can take to address AI risks, is to integrate risk considerations across ethical, safety, and cultural domains. A multidisciplinary approach can help ensure that AI is deployed responsibly. Establishing comprehensive AI governance frameworks is essential. These frameworks should include perspectives from experts across the organisation to balance security, compliance, and innovation within a single, cohesive risk management strategy. Countering AI-Powered Threats While AI has enormous potential, bad actors are leveraging AI to enhance the speed, scale, and sophistication of attacks. Social engineering schemes, advanced fraud tactics, and AI-generated phishing emails are becoming more difficult to detect, with some leading to significant financial losses. Deepfakes, for instance, are finding their way into targeted scams aimed at compromising organisations. A 2024 ENISA report highlighted that AI-enhanced phishing attacks have surged by 35% in the past year, underscoring the need for stronger cybersecurity measures. To stay ahead organisations must prepare for an era where cyberattacks operate at machines' speed. Transitioning to a defensive approach anchored in automation is key to responding swiftly and effectively, minimizing the impact of advanced attacks. The future of AI agents in the cybersecurity domain may not be far off. This means deploying AI-powered security tools that can detect anomalies in real time...
MagaMama with Kimberly Ann Johnson: Sex, Birth and Motherhood
In this episode, Kimberly and Bethany discuss their reflections and experiences of attachment and mothering their adult children. Bethany describes changes in how she viewed herself and parenting while her daughter became an adult herself while Kimberly shares her experiences mothering her daughter who is about to move out of their home for the first time. They share challenges, frustrations, and confusing moments around their attachment and parenting, particularly as they age themselves. As most parenting content focuses on the early years, this conversation reveals the nuances of what attachment parenting actually is and how they are navigating its challenges while parenting their grown daughters. Bio Bethany Saltman is a literary agent, mother, wife, zen practitioner, and author of “Strange Situation: A Mother's Journey Into the Science of Attachment.” She has an extensive background in writing, teaching, publishing, and devotes her time as a literary agent helping people put their stories into the world. She is a long-time friend of Kimberly's and a repeat podcast guest. What She Shares: –Different kinds of attachment and the adult attachment test –Mothering through seasons –Generational differences of parenting –Navigating challenges of mothering adult children What You'll Hear: –Different types of attachment –Securely attached is independent –Develop through creativity and exploration with secure base –Flexibility and response with parenting –Behavior versus attachment –Parameters for boundaries when discussing children publicly –Posting children on social media –Attachment research with adults –Generational leaps around attachment and development –Mothering through perimenopause –Hormonal changes through mothering and phases –Similarities between toddler and teenage years –Experiencing the second half of life while mothering –Values shifting through mothering phases –Cultural differences around parenting young adults –Leaving versus staying the nest –Generational differences of survival wiring –Frustrations of parenting adults –Self-actualization leaving parents' house –Adult attachment interview protocol –Mixed feelings shows secure attachment in adulthood –Importance of rupture and repair instead of only positive –Spirituality, religion, and parenting Resources Website: https://www.bethanysaltman.com/ IG: @bethany_saltman Class Sign up for Jagamama Summer School here: https://kimberlyannjohnson.com/jagamama/
Send us a textSecure attachment forms the foundation for a child's healthy development and shapes how they view themselves, others, and the world. We explore the four key attributes caregivers need to foster secure attachment: being present, attentive, attuned, and responsive.• A secure attachment relationship is defined as one that's "free from danger or risk," creating a healthy and safe space for children• Secure attachment forms when caregivers consistently respond to a child's needs, showing them they are important and valued• Children with secure attachment develop a "secure base" that allows them to explore the world confidently, knowing they have a safe place to return to• Crying at daycare drop-offs can actually indicate healthy attachment – the child wants to be with you and knows you'll return• Being physically and emotionally present is the foundation for all other aspects of secure caregiving• Attentiveness means paying close attention to what your child is doing and learning from their behaviors• Attunement is the ability to accurately read and interpret your child's signals beyond surface behaviors• Responsive caregiving teaches children that they matter and that seeking help is valuable• Play accelerates attachment building – according to Dr. Karyn Purvis, it can cut healing time in half for children from difficult backgrounds• Securely attached children develop powerful internal messages: "I am important," "Others are helpful," and "The world is safe"Join us next week as we discuss avoidant attachment and continue our exploration of attachment styles.Contact:podcasts@calfarley.org To Donate: https://secure.calfarley.org/site/Donation2?3358.donation=form1&df_id=3358&mfc_pref=TTo Apply:https://apply.workable.com/cal-farleys-boys-ranch/j/25E1226091/For More Information about Cal Farley's Boys Ranch:https://www.calfarley.org/Music:"Shine" -NewsboysCCS License No. 9402
Before giving away a machine or returning a loaner, it's important to remove your personal information from it. That may be both harder and easier than you think. I'll show you where traditional suggestions fail, and what you need to do instead.
Jim Manico's passion for secure coding has always been rooted in deeply technical practices—methods that matter most to developers writing code day in and day out. At OWASP Global AppSec EU 2025 Conference in Barcelona, Manico brings that same precision and care to a broader conversation around the intersection of application security and artificial intelligence.While many are still just beginning to assess how AI impacts application development, Manico has been preparing for this moment for years. Two and a half years ago, he saw a shift—traditional low-level technical bugs were being mitigated effectively by mature organizations. The new challenge? Business logic flaws and access control issues that scanners can't easily detect. This change signaled a new direction, prompting him to dive into AI security long before it became fashionable.Now, Manico is delivering AI-flavored AppSec training, helping developers understand the risks of insecure code generated by large language models. His research shows that even the best AI coding tools—from Claude to Copilot—still generate insecure code out of the box. That's where his work becomes transformative: by developing detailed, framework-specific prompts grounded in decades of secure coding knowledge, he has trained these tools to write safer code, using React, Django, Vue, and more.Beyond teaching, he's building. With 200 volunteers, he's leading the creation of the Artificial Intelligence Security Verification Standard (AISVS), a new OWASP project inspired by the well-known Application Security Verification Standard (ASVS). Generated with both AI and human collaboration, the AISVS already has a v0.1 release and aims for a major update by summer.For Manico, this isn't just a technical evolution—it's a personal renaissance. His deep catalog of secure coding techniques, once used primarily for human education, is now fueling a new generation of AI-assisted development. And he's just getting started.This episode isn't just about where AppSec is going. It's a call to developers and security professionals to rethink how we teach, how we build, and how we can use AI to enhance—not endanger—the software we create.Learn more about Manicode: https://itspm.ag/manicode-security-7q8iNote: This story contains promotional content. Learn more.Guest: Jim Manico, Founder and Secure Coding Educator at Manicode Security | On Linkedin: https://www.linkedin.com/in/jmanico/ResourcesJim's OWASP Session: https://owasp2025globalappseceu.sched.com/event/1wfpM/leveraging-ai-for-secure-react-development-with-effective-prompt-engineeringDownload the Course Catalog: https://itspm.ag/manicode-x684Learn more and catch more stories from Manicode Security: https://www.itspmagazine.com/directory/manicode-securityAre you interested in telling your story?https://www.itspmagazine.com/telling-your-storyKeywords: jim manico, sean martin, appsec, ai, owasp, securecoding, developers, aisvs, training, react, brand story, brand marketing, marketing podcast, brand story podcast
In this personal episode, I take you behind the scenes of a recent dating experience that stirred up both growth and grief — and revealed just how far I've come on my attachment healing journey.As someone who used to operate from a fearful avoidant (leaning anxious) attachment style, I now move through dating with much more self-trust, clarity, and compassion. But that doesn't mean the old patterns don't still surface — especially when connection, chemistry, and unmet needs collide.I'll walk you through how I navigated this dynamic from a secure place, the conversations I had, and ultimately, how I honored myself enough to walk away when alignment wasn't there — even when it felt good in the moment.If you've ever struggled to balance attraction with long-term compatibility, or felt pulled between your heart and your values, this episode is for you.Takeaways include:The difference between chemistry and compatibilityHow to identify your unmet needs in real timeWhy even "kind and available" people might not be the right fitWhat it looks like to actually date from your secure selfHow to exit with integrity when your paths don't align
Sermon preached by Fr Ben Sternke at The Table's worship service on May 11, 2025 (Fourth Sunday of Easter)
Sunday AM sermon.
Mark “Murch” Erhardt and Mike Schmidt are joined by Jonas Nick, Jameson Lopp, Steven Roose, Gregory Sanders, and Salvatore Ingala to discuss Newsletter #348.News● Educational and experimental-based secp256k1 implementation (1:09) Changing consensus● Should vulnerable bitcoins be destroyed? (9:17) ● Securely proving UTXO ownership by revealing a SHA256 preimage (34:52) ● Draft BIP for destroying quantum-insecure bitcoins (44:01) ● Criticism of CTV motivation (51:16) ● CTV+CSFS benefits (1:06:02) ● Benefit of CTV to Ark users (1:24:37) ● OP_CHECKCONTRACTVERIFY semantics (1:31:49) ● Draft BIP published for consensus cleanup (1:58:29) Releases and release candidates● BDK wallet 1.2.0 (2:06:03) ● LDK v0.1.2 (2:06:48) ● Bitcoin Core 29.0rc3 (2:07:13) ● LND 0.19.0-beta.rc1 (2:08:36) Notable code and documentation changes● Bitcoin Core #31363 (2:09:03) ● Bitcoin Core #31278 (2:09:44) ● Eclair #3050 (2:12:41) ● Eclair #2963 (2:13:54) ● Eclair #3045 (2:14:44) ● LDK #3670 (2:15:47) ● LND #9620 (2:16:24)
How can businesses securely and privately use AI tools? And, what are the top cyber risks of AI, anyway? Let's find out with your hosts Kip Boyle, CISO with Cyber Risk Opportunities, and Jake Bernstein, Partner with K&L Gates. Want to quickly come up to speed with the NIST AI Risk Management Framework? Listen to these two episodes: Part 1 -- https://cr-map.com/podcast/153 Part 2 -- https://cr-map.com/podcast/154
Join George Haas as he explores the intersection of attachment theory and meditation, and the path to live a more meaningful life. If you're interested in meditation-based attachment repair for long-term healing, this is for you.Like this? Grab our free video resource called
At Enterprise Connect 2025, Sam Etler of Numeracle joined Doug Green, publisher of Technology Reseller News, to discuss how enterprises can protect their brand identity and restore trust in voice communications through secure branded calling. Solving the Growing Threat of Spoofed Calls Branded calling has become a critical tool for enterprises looking to authenticate their phone calls. However, traditional branding solutions have been vulnerable to spoofing, where scammers mimic legitimate businesses, damaging reputations and causing financial losses. “This is a way of securely adding your logo, a reason for calling, and your name to a call in a way that cannot be spoofed,” said Etler. “Unlike legacy branded calling solutions, our cryptographic signatures ensure calls are verified by the mobile provider.” What Makes Secure Branded Calling Different? Protects against spoofing: Traditional branding can be manipulated by fraudsters who hijack a business's caller ID, but Numeracle's solution prevents unauthorized branding. Enhances customer trust: Securely verifies the caller's identity before the call reaches the recipient. No third-party apps required: Works natively on iOS and Android without additional software. Live Demos at Enterprise Connect Numeracle is demonstrating this secure branded calling solution live at Booth #1000 at Enterprise Connect, showcasing real-time call authentication. “You'll see our logo appear on devices with no prior setup, proving that the branding is delivered over the network securely,” said Etler. Why Should Enterprises Pay Attention? With brand reputation at risk, large enterprises need to act now to prevent call spoofing and ensure their customers trust incoming calls. For those not attending Enterprise Connect, more information can be found at numeracle.com, where enterprises can also learn about call reputation management solutions to combat spam labeling issues.
In this episode of Control Intelligence, written by contributing editor Jeremy Pollard, editor in chief Mike Bacidore discusses remote monitoring and diagnostics, and how they require security.
Alexandre Isaac, founder of The Repair Academy and Seensys, discusses how his companies are transforming the way businesses repair and recycle IT equipment while promoting sustainability and technical expertise. The Repair Academy is a training school designed to equip anyone with the skills to repair phones, tablets, and computers. From battery replacements to advanced chip repairs, the academy helps individuals and businesses extend the life of their electronics, reducing e-waste while building valuable technical skills. Seensys: Sustainable IT Asset Disposal (ITAD) Synsys specializes in eco-friendly IT asset disposal (ITAD), helping businesses responsibly manage end-of-life computers, mobile devices, and tablets. Their process includes: Collecting used IT equipment directly from companies Securely erasing all data before resale Repairing and refurbishing devices to give them a second life Reselling them to promote circular economy practices For businesses looking to upgrade their tech while minimizing environmental impact, Seensys offers a seamless and responsible solution. Get in Touch To learn more about device repair training or sustainable IT disposal, visit http://seensys.com/ and https://therepairacademy.com/ #DeviceRepair #ITAD #Sustainability #RefurbishedTech #TelecomReseller
RJJ Software's Software Development Service This episode of The Modern .NET Show is supported, in part, by RJJ Software's Podcasting Services, whether your company is looking to elevate its UK operations or reshape its US strategy, we can provide tailored solutions that exceed expectations. Show Notes "From the very first lesson of "Hello, World" they teach us to make insecure code. So the first thing with "Hello, World" is how to output to the screen. That is fine. But the second part of "Hello, World" is: you ask them their name, you take their name. you don't validate it, and then you say "Hello," and you reflect their name back onto the screen with no output encoding. And then you just made cross-site scripting. And right from the very first lesson, we teach everyone wrong in pretty much every language, and so as a result we end up with a lot of people doing code the wrong way. Like, universities are still teaching lots of things wrong. And so I'm hoping that this book will help."— Tanya Janca Welcome friends to The Modern .NET Show; the premier .NET podcast, focusing entirely on the knowledge, tools, and frameworks that all .NET developers should have in their toolbox. We are the go-to podcast for .NET developers worldwide, and I am not your host: Jamie. I'm Delilah and I will be recording the intro for this episode because Jamie's throat infection returned, making it tough for him to record this intro. In this episode, we welcomed Tanya Janca back to the show. This conversation marks her third appearance on the show, and a slight change in focus to Secure Coding. We talk about how developers are taught to write insecure code from day one (or "Hello, World!"), about how her new book "Alice and Bob Learn Secure Coding" could help with that, the many hours of free education and learning that Tanya has created alongside the book, and how both data scientists and academics approach software development differently to some of us developers. "There are so many amazing security features in .NET. There's so many. Like, because I... I wrote about eight different frameworks and .NET by far had the absolute most different security features. And part of it, some of them are from Windows. Some of them are from C... because I wrote about C# and .NET. And to be quite honest, audience, I mixed them up quite a bit because, "what is specifically C#, and what is specifically .NET," got a bit confused in my brain. But I'm like, all of it's good. Do all of it"— Tanya Janca Anyway, without further ado, let's sit back, open up a terminal, type in `dotnet new podcast` and we'll dive into the core of Modern .NET. My voice was created using Generative AI. Supporting the Show If you find this episode useful in any way, please consider supporting the show by either leaving a review (check our review page for ways to do that), sharing the episode with a friend or colleague, buying the host a coffee, or considering becoming a Patron of the show. Full Show Notes The full show notes, including links to some of the things we discussed and a full transcription of this episode, can be found at: https://dotnetcore.show/season-7/the-security-expert-speaks-tanya-janca-on-learning-to-code-securely/ Tanya's Previous Appearances: Episode 77 - Application Security with Tanya Janca Episode 105 - More Application Securuty with Tanya Janca Useful Links Tanya's books Tanya's newsletter Hello, World Don't Accept The Defaults Semgrep Okta Pushing Left, Like a Boss: Part 1 Owasp DAST (Dynamic Application Security Testing) SAST (Static Application Security Testing) Semgrep Academy (previously known as WeHackPurple Academy) Application Security Foundations Level 1 Owasp Juice Shop OwaspHeaders.Core Owasp Top Ten Content-Security-Policy Trusted Types Jason Haddix Retrieval-Augmented Generation (aka RAG) Posting Malicious Code as an Answer Supporting the show: Leave a rating or review Buy the show a coffee Become a patron Getting in Touch: Via the contact page Joining the Discord Remember to rate and review the show on Apple Podcasts, Podchaser, or wherever you find your podcasts, this will help the show's audience grow. Or you can just share the show with a friend. And don't forget to reach out via our Contact page. We're very interested in your opinion of the show, so please get in touch. You can support the show by making a monthly donation on the show's Patreon page at: https://www.patreon.com/TheDotNetCorePodcast.
On today's LawNext: we hand over the podcast to NotebookLM to discuss the state of law practice management technology. If you haven't heard of NotebookLM, it is a generative AI tool from Google that turns your documents into engaging audio discussions. Its output sounds a whole lot like, well, a podcast, with two hosts chatting it up about your documents. To quote Google's own description, “With one click, two AI hosts start up a lively “deep dive” discussion based on your sources. They summarize your material, make connections between topics, and banter back and forth.” So we decided to give it a try. Back in September, LawNext host Bob Ambrogi wrote a four-part series on his LawSites blog called, “The Shrinking Ownership of Law Practice Management Technology.” It was a deep dive into how ownership of law practice management software for solo and small law firms has been consolidated under just six major ownership groups. We loaded the four parts of that series into NotebookLM and asked it to generate its audio overview. What you'll hear today is the discussion it generated, followed by Bob's thoughts on what it produced. The NotebookLM audio is about 15 minutes long, and Bob's comments will come after that plays. It is important to keep in mind that the audio generated by NotebookLM is not simply a summary. The two speakers do summarize key points from Bob's articles, but they also add interpretations and perspectives that are nowhere to be found in the original source material. Here are the articles on which the audio is based: The shrinking ownership of law practice management technology (Part 1 of 4): A Market Dominated by Just Six Ownership Groups. The shrinking ownership of law practice management technology (Part 2 of 4): A Scorecard of Who Owns What. The shrinking ownership of law practice management technology (Part 3 of 4): Future Development and Market Opportunities. The shrinking ownership of law practice management technology (Part 4 of 4): Wrapping It All Up. Thank You To Our Sponsors This episode of LawNext is generously made possible by our sponsors. We appreciate their support and hope you will check them out. Paradigm, home to the practice management platforms PracticePanther, Bill4Time, MerusCase and LollyLaw; the e-payments platform Headnote; and the legal accounting software TrustBooks. Littler, local everywhere. Steno, reliable court reporting with a revolutionary approach ShareFile, Securely send, store, and share files – plus discover document workflows designed to improve your client experience. If you enjoy listening to LawNext, please leave us a review wherever you listen to podcasts.
You cannot have innovation without adoption. That was a theme I heard repeatedly when I attended the Knowledge Management & Innovation for Legal conference in New York City in October. Our guest today, Paul Henry, would take that a step further and say you do not really have adoption without engagement. Henry is the founder and CEO of NGAGE Intelligence, a platform that provides law firms with highly granular and comprehensive behavioral analytics to help them understand whether, how and by whom their communication, collaboration and AI tools are being used. NGAGE was founded on the notion of employee engagement and how analytics can be used to measure and improve it. At the conference, LawNext host Bob Ambrogi sat down with Henry to learn more about Ngage and how the analytics it provides can drive adoption, engagement and governance. A note that this was recorded live at the conference, as the morning keynote speech was being piped throughout the conference area, so I apologize for the background noise. Thank You To Our Sponsors This episode of LawNext is generously made possible by our sponsors. We appreciate their support and hope you will check them out. Paradigm, home to the practice management platforms PracticePanther, Bill4Time, MerusCase and LollyLaw; the e-payments platform Headnote; and the legal accounting software TrustBooks. Littler, local everywhere. Steno, reliable court reporting with a revolutionary approach Sharefile, Securely send, store, and share files – plus discover document workflows designed to improve your client experience. If you enjoy listening to LawNext, please leave us a review wherever you listen to podcasts.
Everlaw for Good is a program run by the e-discovery company Everlaw, through which it makes its software available at no cost to legal aid organizations, nonprofit organizations, and investigative journalists. One beneficiary of that program is the Center for Justice and Accountability, a human rights nonprofit that works to seek justice on behalf of victims of atrocity crimes, including torture, genocide, and war crimes. At the recent Everlaw Summit, the CJA's work using the Everlaw platform was honored with the Everlaw for Good award. LawNext host Bob Ambrogi was at the summit, which was held in San Francisco in October, and he had the opportunity to sit down to record this conversation with two of the CJA's lawyers, along with the director of the Everlaw for Good program. Today's guests are: Claret Vargas, senior staff attorney at CJA. Daniel McLaughlin, senior staff attorney at CJA. Joanne Sprague, director of Everlaw for Good. They discuss the Everlaw for Good program and the specific impact it has had on CJA's work. Thank You To Our Sponsors This episode of LawNext is generously made possible by our sponsors. We appreciate their support and hope you will check them out. Paradigm, home to the practice management platforms PracticePanther, Bill4Time, MerusCase and LollyLaw; the e-payments platform Headnote; and the legal accounting software TrustBooks. Littler, local everywhere. Steno, reliable court reporting with a revolutionary approach Sharefile, Securely send, store, and share files – plus discover document workflows designed to improve your client experience. If you enjoy listening to LawNext, please leave us a review wherever you listen to podcasts.
PREVIEW: PIGEONS: In "Ten Birds That Changed the World," author Stephen Moss describes the crucial role of homing pigeons in carrying messages securely during World War I and the Normandy invasion. More later on the magic of birds. 1939-1945 Winkie and the rescued
Get personalized courses, live webinars & Q&As, and more for free for 7 days! https://attachment.personaldevelopmentschool.com/dream-life?utm_source=podcast&utm_campaign=7-day-trial&utm_medium=organic&utm_content=mg-11-04-24&el=podcast Become a certified relationship coach to secure your financial future with our IAT™ Program. https://attachment.personaldevelopmentschool.com/iat?utm_source=podcast&utm_campaign=iat-live&utm_medium=organic&utm_content=mg-11-04-24&el=podcast Feeling thrown off balance when your ex moves on? Securely attached individuals may feel nostalgic, but they process breakups without lingering pain or self-doubt. In this episode, we dive into how secure attachment styles handle seeing an ex move on by meeting their own needs, avoiding core wound projections, and gaining healthy closure. Ready to understand your own attachment style and discover how to make breakups easier on your heart? Tune in for insights on emotional resilience, plus actionable tips to foster secure attachment behaviors in yourself! Let's connect! https://www.youtube.com/@ThePersonalDevelopmentSchool https://www.tiktok.com/@thaisgibson https://www.instagram.com/thepersonaldevelopmentschool/ https://www.facebook.com/ThePersonalDevelopmentSchool/ Learn more about your ad choices. Visit megaphone.fm/adchoices
The benefits of attachment parenting cannot be overstated. Securely attached kids are more confident, connected and more prepared to enter the world. They also tend to experience fewer health problems. But why? Here to share more about the science behind attachment parenting and how we can raise confident connected children is Eli Harwood. Eli is a licensed therapist who lives in Colorado with her husband and three children. She's an expert on attachment theory and the author of Raising Securely Attached Kids, which will be available September 2024. She also loves playing dress up with her kids, obsessing about sourdough starter. And reminiscing about that one time, she won a set of globes as a Price Is Right contestant. The good news is that even if you haven't been parenting in a way that promotes attachment up to now, this process is flexible and ever changing. The best time to start is right now. Listen in to hear all of Eli's tips and tricks no matter the age of your children. In this episode, we discuss: What securely attached parenting is. How it benefits children throughout their lives. How you can cultivate it in your own home. We touch on highly sensitive children, how you can connect with them and help them to feel more seen and secure. Resources: Raising Securely Attached Kids: Using Connection-Focused Parenting to Create Confidence, Empathy, and Resilience By Eli Harwood https://www.amazon.com/Raising-Securely-Attached-Kids-Connection-Focused/dp/B0CPDP7DT5 Connect with Eli: Attachment Nerd -https://attachmentnerd.com/about Instagram -https://www.instagram.com/attachmentnerd/ YouTube -https://www.youtube.com/channel/UCWUY-2dpPEbeetSUhT2q-7Q LinkedIn -https://www.linkedin.com/in/eli-harwood-b3b9495/ Questions: What is securely attached parenting? How is secure attachment parenting different from William Sears' attachment parenting? What are common life events that test the bond between kids and parents, and how can they be overcome? How can you restore the bond with your kid if it has been broken? Is it ever too late to switch to a secure attachment parenting style? Disclaimer: This podcast does not provide medical advice. The information on this podcast is for informational purposes only. No material on this site is intended to be a substitute for professional medical advice, diagnosis or treatment. Learn more about your ad choices. Visit megaphone.fm/adchoices