Degree of resistance to, or protection from, harm
POPULARITY
Categories
In this episode, Duane Mancini sits down with Isaiah Kaiser, Co-Founder and CEO of Auxilium Health, and Elyse Ball, Vice President of Programming at Bounce Innovation Hub. Fresh off Auxilium Health's exciting $1.5M oversubscribed pre-seed round and new office at Cleveland Clinic, Isaiah returns to share their journey since his first appearance in episode 147. Elyse discusses the vital role of Bounce Innovation Hub in supporting startups and how her journalism background aids in her work. Together, they delve into navigating the regional iCorp program and the JumpStart accelerator, offering invaluable advice for raising capital and maneuvering the startup landscape. Tune in to hear their insights and get a glimpse into Auxilium Health's next major milestones.Isaiah Kaiser LinkedInElyse Ball LinkedInDuane Mancini LinkedInAuxilium Health WebsiteBounce Innovation Hub WebsiteProject Medtech WebsiteProject Medtech LinkedIn
Send us a textDr. Keith Dorsey never planned to become a champion for board diversity. After 30 years as a successful corporate executive following military service, his identity was deeply entwined with his professional title. When retirement forced him to redefine himself, a powerful moment of vulnerability sparked a journey of rediscovery that would change everything.Through stories from hundreds of women, Dorsey discovered pathways and strategies to help women gain a board seat. Whether facing career transitions, seeking board positions, or simply trying to understand boardroom diversity issues, Dorsey's journey offers profound insights on leadership, identity, and the continuous process of reinvention. Ready to transform your leadership journey or board aspirations? Subscribe, share, and join us in creating more diverse, effective boardrooms where everyone has a seat at the table.Episode Guest: Dr. Keith DorseyLinkedIn: www.linkedin.com/in/dr-keith-d-dorsey-798a2681/Website: www.boardroomjourney.comAll episodes and guest requests can be found at:www.leadershipmomentspodcast.comFollow Stacey Caster on Instagram @staceycaster_Follow Tracy-Ann Palmer on Instagram @tracy_ann_palmer
Ashley Johnson, president and CFO of Planet Labs (PL), joins the show to discuss her company's successful quarter. Ashley attributes the strong results to growing demand for high-frequency data, particularly in the defense and intelligence sectors. With Planet Labs having crossed the key milestone of first positive operating cash flow, Johnson believes the company is well-positioned for sustainable growth and profitability.======== Schwab Network ========Empowering every investor and trader, every market day.Subscribe to the Market Minute newsletter - https://schwabnetwork.com/subscribeDownload the iOS app - https://apps.apple.com/us/app/schwab-network/id1460719185Download the Amazon Fire Tv App - https://www.amazon.com/TD-Ameritrade-Network/dp/B07KRD76C7Watch on Sling - https://watch.sling.com/1/asset/191928615bd8d47686f94682aefaa007/watchWatch on Vizio - https://www.vizio.com/en/watchfreeplus-exploreWatch on DistroTV - https://www.distro.tv/live/schwab-network/Follow us on X – https://twitter.com/schwabnetworkFollow us on Facebook – https://www.facebook.com/schwabnetworkFollow us on LinkedIn - https://www.linkedin.com/company/schwab-network/About Schwab Network - https://schwabnetwork.com/about
HPod hits the road, coming to you from AFCEA's TechNet Cyber event in Baltimore, Md., this time featuring three experts from HP Federal: Justin Hancock and Jeff Smith, both in advanced compute solutions, and Kristin Hempstead, advanced compute solutions strategy manager. They explore a complex balancing act — how federal agencies can securely harness AI and edge computing to meet the mission without exposing their operations or their infrastructures to new supply chain risks.
We're delighted to be joined by Rhiannon Gogh, SEND finance expert, mum to a boy with complex autism, trainer, presenter and award winning Financial Advisor. Rhiannon talks us through all the things we need to think about (even if it's difficult!) and helps explain terms like trustees, with informed, positive and helpful advice. You can find more about Rhiannon and her work at Carers Academy and SENDA. Rhiannon's Book is available for order Planning With Love: A Guide to Wills and Trusts for Parents of Children With Special Needs Thanks to the lovely folk at Jiraffe for sponsoring this week's episode. You can find more about them and their work here. We'd love to hear from you – we love sharing stories, we love hearing how things are going, the good, the bad, the snotty-crying ugly. You can leave a message with us in a number of ways: Firstly you can leave a message using speakpipe here: SpeakpipeTSWU (Please note calls need to be limited to 90 seconds) You can send us a voice note from your phone to our email address at tswupodcast@gmail.com Or, if the thought of hearing your own voice gives you ‘the ick', then send us an email to tswupodcast@gmail.com Whatever way you choose to get in touch, we really want to hear your thoughts, views, musings, rants and confessions (we love a confession!) . Thanks for listening and being a part of our podcast community -It would make our day if you could like, follow and review the podcast wherever you listen. We're so happy that The Skies We're Under is a free, independent podcast. Any sponsorship received is used to cover the costs of the production of episodes and compensate our valuable guests for their time. The hosts provide their time and efforts for free. They do, however, appreciate any offers of caffeination to keep them going – you can buy them a cuppa here… Follow us on Instagram @BornatRightTime. Head to www.bornattherighttime.com to find a parent workshop or CPD-certified training for practitioners in communication, collaboration and personalised care with parents/carers.
Day 3 — God's Peace : a Catalyst for securing your word for manifestation (God's peace - a fulfillment for manifestation ) When you fully embrace God's peace, your spirit becomes sensitive — you hear God clearly and obey Him quickly.His peace becomes the vehicle that drives you to do whatever it takes to secure your Word for manifestation.
Day 2 — God's Peace : a Catalyst for securing your word for manifestation ( Guard your heart , guard your word) Be anxious for nothing.Anxiety is a thief—it steals our peace and robs us of the confidence we have in God's Word. It shifts our focus away from God's intentions and plans for us. When we are anxious, we often fixate on what is temporary and fleeting. But the peace of God opens our eyes to what is eternal.If God's peace weren't available, it wouldn't be offered in His Word. That alone is proof of its power and necessity. As believers, we must embrace the peace of God—it is a divine catalyst for securing the Word we've received until it manifests.
In this On Location episode during OWASP AppSec Global 2025 in Barcelona, Sean Martin connects with event speaker, Wojciech Dworakowski, to unpack a critical and underexamined issue in today's financial systems: the vulnerability of mobile-only banking apps when it comes to transaction authorization.Wojciech points out that modern banking has embraced the mobile-first model—sometimes at the cost of fundamental security principles. Most banks now concentrate transaction initiation, security configuration, and transaction authorization into a single device: the user's smartphone. While this offers unmatched convenience, it also creates a single point of failure. If an attacker successfully pairs their phone with a victim's account, they can bypass multiple layers of security, often without needing traditional credentials.The discussion explores the limitations of relying solely on biometric options like Face ID or Touch ID. These conveniences may appear secure but often weaken the overall security posture when used without additional independent verification mechanisms. Wojciech outlines how common attack strategies have shifted from stealing credit card numbers to full account takeover—enabled by social engineering and weak device-pairing controls.He proposes a “raise the bar” strategy rather than relying on a single silver-bullet solution. Suggestions include enhanced device fingerprinting, detection of emulators or rooted environments, and shared interbank databases for device reputation and account pairing anomalies. While some of these are already in motion under new EU and UK regulations, they remain fragmented.Wojciech also introduces a bold idea: giving users a slider in the app to adjust their personal balance of convenience vs. security. This kind of usability-driven approach could empower users while still offering layered defense.For CISOs, developers, and FinTech leaders, the message is clear—evaluate your app security as if attackers already know the shortcuts. Watch the full conversation to hear Wojciech's real-world examples, including a cautionary tale from his own family. Catch the episode and learn how to design financial security that's not just strong—but usable.GUEST: Wojciech Dworakowski | OWASP Poland Chapter Board Member and Managing Partner at SecuRing | https://www.linkedin.com/in/wojciechdworakowski/HOST: Sean Martin, Co-Founder at ITSPmagazine and Host of Redefining CyberSecurity Podcast | https://www.seanmartin.comSPONSORSManicode Security: https://itspm.ag/manicode-security-7q8iRESOURCESLearn more and catch more stories from OWASP AppSec Global 2025 Barcelona coverage: https://www.itspmagazine.com/owasp-global-appsec-barcelona-2025-application-security-event-coverage-in-catalunya-spainCatch all of our event coverage: https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverageWant to tell your Brand Story Briefing as part of our event coverage? Learn More
Securing a job with visa sponsorship as an immigrant might be difficult, but with the appropriate strategy and preparation, it is possible. This article aims to provide valuable tips and guidance for immigrants seeking employment opportunities that offer visa sponsorship.
Polish nationalist opposition candidate Karol Nawrocki has won the second round of Poland's presidential election. Securing just over 50 per cent of votes, Mr Nawrocki has defeated liberal Warsaw mayor and pro-European candidate Rafal Trzaskowski.The election was seen as a choice between a pro-European course – or a Donald Trump-style nationalism.
This week on The International Risk Podcast, Dominic Bowen is joined by Dr. Sarah Case Lackner to explore the emerging risks and evolving opportunities at the intersection of artificial intelligence and nuclear security. With increasing attention on the resilience of global infrastructure, Dr. Case Lackner unpacks how AI is reshaping nuclear supply chains, the hidden dangers of counterfeit components, and the urgent need for cybersecurity preparedness across the sector.From predictive maintenance tools to the threat of ransomware and supply chain sabotage, this conversation highlights both the promise and peril of integrating AI into one of the world's most high-consequence industries. Dr. Case Lackner shares her insights on AI explainability, capacity building, the role of red-teaming in nuclear facilities, and the broader international risks facing today's critical infrastructure professionals.Dr. Sarah Case Lackner is a Senior Fellow at the Vienna Center for Disarmament and Non-Proliferation (VCDNP). She previously served as a Senior Nuclear Security Officer at the International Atomic Energy Agency (IAEA) and held roles at the U.S. Department of State and the National Academy of Sciences. With a PhD in Physics from the University of Chicago, she brings both scientific expertise and extensive policy experience to the global nuclear security conversation.Related Resources Mentioned in This Episode:Nuclear Security and the Nuclear Supply Chain in the Age of Artificial Intelligence – Co-authored by Dr. Case Lackner, this report explores the intersection of AI technologies and nuclear security.Securing the Nuclear Supply Chain: A Handbook of Case Studies on Counterfeit, Fraudulent and Suspect Items – A key report mentioned in the episode, offering real-world examples of supply chain vulnerabilities.The International Risk Podcast is a must-listen for senior executives, board members, and risk advisors who need more than headlines. Each week, Dominic Bowen cuts through the noise to bring you unfiltered insights on emerging risks, geopolitics, international relations flashpoints, boardroom blind spots, and strategic opportunities. Hosted by Dominic Bowen, Head of Strategic Advisory at one of Europe's top risk consulting firms, The International Risk Podcast brings together global experts to share insights and actionable strategies from the people who have been there, done it, and shaped outcomes at the highest levels.Dominic's 25 years of experience managing complex operations in high-risk environments, combined with his role as a public speaker and university lecturer, make him uniquely positioned to guide these conversations. From conflict zones to corporate boardrooms, he explores the risks shaping our world and how organisations can navigate them. Whether he is speaking with intelligence operatives, CEOs, political advisors, or analysts, Dominic helps leaders gain competitive advantage through these conversations.The International Risk Podcast – Reducing risk by increasing knowledge.Follow us on LinkedIn and Instagram for all our great updates.Subscribe to our newsletter for weekly briefs.Tell us what you liked!
Eat. Drink. Social: Social Media Marketing in the Food & Beverage Industry
Securing a chain placement for a brand can drive great awareness and trial. We talk with Industry Veteran and LinkedIn connoisseur Ken Ruff of Stellar Brands to learn what tips brands need to know when they are pitching chains, what mistakes to avoid and how best to leverage social media.
Nathan Street, founder of Novum Wealth, helps real estate investors secure 100% financing through hard money, private money, and creative financing strategies. A lifelong entrepreneur, he started his first business at 10 years old selling candy out of his bedroom window. Fast forward, and Nathan has flipped properties, built and sold a lead generation company, ghostwritten for some of the biggest names in real estate education, and authored 2 books. In addition to that, he and his wife also run a five-star restaurant. He now raises a blended family of nine children along with his wife.Follow Nathan
SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast
SSH authorized_keys File One of the most common techniques used by many bots is to add rogue keys to the authorized_keys file, implementing an SSH backdoor. Managing these files and detecting unauthorized changes is not hard and should be done if you operate Unix systems. https://isc.sans.edu/diary/Securing%20Your%20SSH%20authorized_keys%20File/31986 REMOTE COMMAND EXECUTION ON SMARTBEDDED METEOBRIDGE (CVE-2025-4008) Weatherstation software Meteobridge suffers from an easily exploitable unauthenticated remote code execution vulnerability https://www.onekey.com/resource/security-advisory-remote-command-execution-on-smartbedded-meteobridge-cve-2025-4008 https://forum.meteohub.de/viewtopic.php?t=18687 Manageengine ADAuditPlus SQL Injection Zoho patched two SQL Injection vulnerabilities in its ManageEngine ADAuditPlus product https://www.manageengine.com/products/active-directory-audit/cve-2025-41407.html https://www.manageengine.com/products/active-directory-audit/cve-2025-36527.html Dero Miner Infects Containers through Docker API Kaspersky found yet another botnet infecting docker containers to spread crypto coin miners. The initial access happens via exposed docker APIs. https://securelist.com/dero-miner-infects-containers-through-docker-api/116546/
In this episode of Security Matters, host David Puner welcomes Kevin Bocek, CyberArk SVP of Innovation, for an insightful discussion on the critical role of machine identity in modern cybersecurity. As digital environments become increasingly complex, securing machine identities has never been more crucial.According to the CyberArk 2025 Identity Security Landscape, machine identities now outnumber human identities by more than 80 to 1. As organizations scale cloud workloads and automation, these identities are becoming a critical part of the cybersecurity frontline. From TLS certificate outages to API key exposures, failures in machine identity management can lead to outages, breaches, and cascading system failures. In this episode of Security Matters, Kevin Bocek explains why this moment is pivotal for getting machine identity right—and how Zero Trust principles, automation, and visibility are essential to building cyber resilience.We also explore the future of identity security—from AI kill switches and agentic AI to quantum threats—and how identity can serve as both a safeguard and a kill switch in the age of autonomous systems.Whether you're a cybersecurity professional or simply interested in the latest security trends, this episode offers valuable insights into the importance of machine identity in safeguarding our digital world. Don't forget to subscribe, leave a review, and follow Security Matters for more expert discussions on the latest in cybersecurity.
This episode is sponsored by AllOut Security.In this episode, hosts Chandra and Paul dive deep into JD Edwards (JDE) security. The conversation explores how security settings are structured within JDE. Chandra and Paul walk listeners through the hierarchy and sequence of various security types, explaining their real-world usage, potential pitfalls, and best practices. Listeners receive candid advice on navigating security workbench complexity, understanding user/group/public security precedence, and practical ways to troubleshoot or lock down access as needed. The episode also highlights challenges like ensuring data integrity when multiple people manipulate processing options or data selections. The hosts touch on useful tools, desired system enhancements, and the importance of balancing robust security with efficient user experience. 01:08 What's new in JDE? 06:13 JD Edwards Security Hierarchy 08:30 Processing Option Security 09:25 Data Selection 15:23 Hyper Exit Security 17:07 Tab Security 22:10 Exclusive Application Security in Payroll 24:28 Midwesternism of the Day
What role does security play in building a thriving homestead? Today on the Thriving Farmer Podcast, Michael is joined by Tim Eng, a West Point graduate, Army veteran, and real estate expert who now helps families transition into resilient, self-sufficient homesteads. After years in one of the most competitive real estate markets in the U.S., Tim and his family made the leap to homesteading in Tennessee. With a background in military engineering and a passion for regenerative living, Tim now teaches homesteaders how to build security into their land, homes, and communities—from the ground up. Tune in to hear how Tim combines military strategy and permaculture to help others protect what matters most. In This Episode, You'll Hear: Why security matters: Why should every homesteader take security into account? Axis Control: What it means and how it applies to protecting your land [12:05] Preparedness Planning: What emergency preparedness really looks like for homesteaders [19:23] Smart Land Buying: What to consider when purchasing a homestead property [22:22] Lessons from Experience: Tim's personal examples and the mindset shift behind homestead security [27:25] Don't miss this episode if you're building a homestead and want to ensure your property, family, and food systems are secure and resilient. About the Guest: Tim Eng is a West Point graduate and former Army combat engineer who served in Iraq before becoming a top real estate agent in the San Francisco Bay Area. After relocating to Tennessee with his wife and children, Tim answered the "Call to Farms" and now lives a regenerative homesteading lifestyle. Through his platform The Homesteading Agent, he combines military expertise, real estate insight, and a passion for preparedness to help others find and secure land for resilient living. Connect with Tim Eng:
ArmorCode unveils Anya—the first agentic AI virtual security champion designed specifically for AppSec and product security teams. Anya brings together conversation and context to help AppSec, developers and security teams cut through the noise, prioritize risks, and make faster, smarter decisions across code, cloud, and infrastructure. Built into the ArmorCode ASPM Platform and backed by 25B findings, 285+ integrations, natural language intelligence, and role-aware insights, Anya turns complexity into clarity, helping teams scale securely and close the security skills gap. Anya is now generally available and included as part of the ArmorCode ASPM Platform. Visit https://securityweekly.com/armorcodersac to request a demo! As 'vibe coding", the practice of using AI tools with specialized coding LLMs to develop software, is making waves, what are the implications for security teams? How can this new way of developing applications be made secure? Or have the horses already left the stable? Segment Resources: https://www.backslash.security/press-releases/backslash-security-reveals-in-new-research-that-gpt-4-1-other-popular-llms-generate-insecure-code-unless-explicitly-prompted https://www.backslash.security/blog/vibe-securing-4-1-pillars-of-appsec-for-vibe-coding This segment is sponsored by Backslash. Visit https://securityweekly.com/backslashrsac to learn more about them! The rise of AI has largely mirrored the early days of open source software. With rapid adoption amongst developers who are trying to do more with less time, unmanaged open source AI presents serious risks to organizations. Brian Fox, CTO & Co-founder of Sonatype, will dive into the risks associated with open source AI and best practices to secure it. Segment Resources: https://www.sonatype.com/solutions/open-source-ai https://www.sonatype.com/blog/beyond-open-vs.-closed-understanding-the-spectrum-of-ai-transparency https://www.sonatype.com/resources/whitepapers/modern-development-in-ai-era This segment is sponsored by Sonatype. Visit https://securityweekly.com/sonatypersac to learn more about Sonatype's AI SCA solutions! The surge in AI agents is creating a vast new cyber attack surface with Non-Human Identities (NHIs) becoming a prime target. This segment will explore how SandboxAQ's AQtive Guard Discover platform addresses this challenge by providing real-time vulnerability detection and mitigation for NHIs and cryptographic assets. We'll discuss the platform's AI-driven approach to inventory, threat detection, and automated remediation, and its crucial role in helping enterprises secure their AI-driven future. To take control of your NHI security and proactively address the escalating threats posed by AI agents, visit https://securityweekly.com/sandboxaqrsac to schedule an early deployment and risk assessment. Visit https://www.securityweekly.com/asw for all the latest episodes! Show Notes: https://securityweekly.com/asw-332
Is Artificial Intelligence the ultimate security dragon, we need to slay, or a powerful ally we must train? Recorded LIVE at BSidesSF, this special episode dives headfirst into the most pressing debates around AI security.Join host Ashish Rajan as he navigates the complex landscape of AI threats and opportunities with two leading experts:Jackie Bow (Anthropic): Championing the "How to Train Your Dragon" approach, Jackie reveals how we can leverage AI, and even its 'hallucinations,' for advanced threat detection, response, and creative security solutions.Kane Narraway (Canva): Taking the "Knight/Wizard" stance, Kane illuminates the critical challenges in securing AI systems, understanding the new layers of risk, and the complexities of AI threat modeling.
ArmorCode unveils Anya—the first agentic AI virtual security champion designed specifically for AppSec and product security teams. Anya brings together conversation and context to help AppSec, developers and security teams cut through the noise, prioritize risks, and make faster, smarter decisions across code, cloud, and infrastructure. Built into the ArmorCode ASPM Platform and backed by 25B findings, 285+ integrations, natural language intelligence, and role-aware insights, Anya turns complexity into clarity, helping teams scale securely and close the security skills gap. Anya is now generally available and included as part of the ArmorCode ASPM Platform. Visit https://securityweekly.com/armorcodersac to request a demo! As 'vibe coding", the practice of using AI tools with specialized coding LLMs to develop software, is making waves, what are the implications for security teams? How can this new way of developing applications be made secure? Or have the horses already left the stable? Segment Resources: https://www.backslash.security/press-releases/backslash-security-reveals-in-new-research-that-gpt-4-1-other-popular-llms-generate-insecure-code-unless-explicitly-prompted https://www.backslash.security/blog/vibe-securing-4-1-pillars-of-appsec-for-vibe-coding This segment is sponsored by Backslash. Visit https://securityweekly.com/backslashrsac to learn more about them! The rise of AI has largely mirrored the early days of open source software. With rapid adoption amongst developers who are trying to do more with less time, unmanaged open source AI presents serious risks to organizations. Brian Fox, CTO & Co-founder of Sonatype, will dive into the risks associated with open source AI and best practices to secure it. Segment Resources: https://www.sonatype.com/solutions/open-source-ai https://www.sonatype.com/blog/beyond-open-vs.-closed-understanding-the-spectrum-of-ai-transparency https://www.sonatype.com/resources/whitepapers/modern-development-in-ai-era This segment is sponsored by Sonatype. Visit https://securityweekly.com/sonatypersac to learn more about Sonatype's AI SCA solutions! The surge in AI agents is creating a vast new cyber attack surface with Non-Human Identities (NHIs) becoming a prime target. This segment will explore how SandboxAQ's AQtive Guard Discover platform addresses this challenge by providing real-time vulnerability detection and mitigation for NHIs and cryptographic assets. We'll discuss the platform's AI-driven approach to inventory, threat detection, and automated remediation, and its crucial role in helping enterprises secure their AI-driven future. To take control of your NHI security and proactively address the escalating threats posed by AI agents, visit https://securityweekly.com/sandboxaqrsac to schedule an early deployment and risk assessment. Visit https://www.securityweekly.com/asw for all the latest episodes! Show Notes: https://securityweekly.com/asw-332
ArmorCode unveils Anya—the first agentic AI virtual security champion designed specifically for AppSec and product security teams. Anya brings together conversation and context to help AppSec, developers and security teams cut through the noise, prioritize risks, and make faster, smarter decisions across code, cloud, and infrastructure. Built into the ArmorCode ASPM Platform and backed by 25B findings, 285+ integrations, natural language intelligence, and role-aware insights, Anya turns complexity into clarity, helping teams scale securely and close the security skills gap. Anya is now generally available and included as part of the ArmorCode ASPM Platform. Visit https://securityweekly.com/armorcodersac to request a demo! As 'vibe coding", the practice of using AI tools with specialized coding LLMs to develop software, is making waves, what are the implications for security teams? How can this new way of developing applications be made secure? Or have the horses already left the stable? Segment Resources: https://www.backslash.security/press-releases/backslash-security-reveals-in-new-research-that-gpt-4-1-other-popular-llms-generate-insecure-code-unless-explicitly-prompted https://www.backslash.security/blog/vibe-securing-4-1-pillars-of-appsec-for-vibe-coding This segment is sponsored by Backslash. Visit https://securityweekly.com/backslashrsac to learn more about them! The rise of AI has largely mirrored the early days of open source software. With rapid adoption amongst developers who are trying to do more with less time, unmanaged open source AI presents serious risks to organizations. Brian Fox, CTO & Co-founder of Sonatype, will dive into the risks associated with open source AI and best practices to secure it. Segment Resources: https://www.sonatype.com/solutions/open-source-ai https://www.sonatype.com/blog/beyond-open-vs.-closed-understanding-the-spectrum-of-ai-transparency https://www.sonatype.com/resources/whitepapers/modern-development-in-ai-era This segment is sponsored by Sonatype. Visit https://securityweekly.com/sonatypersac to learn more about Sonatype's AI SCA solutions! The surge in AI agents is creating a vast new cyber attack surface with Non-Human Identities (NHIs) becoming a prime target. This segment will explore how SandboxAQ's AQtive Guard Discover platform addresses this challenge by providing real-time vulnerability detection and mitigation for NHIs and cryptographic assets. We'll discuss the platform's AI-driven approach to inventory, threat detection, and automated remediation, and its crucial role in helping enterprises secure their AI-driven future. To take control of your NHI security and proactively address the escalating threats posed by AI agents, visit https://securityweekly.com/sandboxaqrsac to schedule an early deployment and risk assessment. Show Notes: https://securityweekly.com/asw-332
In this powerful episode of Cafecito con Estrellita, we sit down with Sophia Montano, a first-generation Latina who went from community college to landing a career at EY (Ernst & Young) : one of the top accounting firms in the world. Together, we talk about the REAL stuff: Why she was scared to take out student loansHow investing in her education helped her secure the bagHow she overcame doubt, and money traumaSelf-care tips for staying grounded in academic and career spacesWe also want to highlight that we believe a higher education should be FREE. But until that happens, we will continue to be open and transparent about The Student Loan Segments we will continue to include throughout this season. Tune in for an honest, inspiring convo that reminds you:Your story and experiences are valid. Your dreams are worth investing in.Listen now and share this episode with an amig@ who needs a reminder that she's not alone! Abrazos, Estrellita Connect with Sophia on Linkedin!Follow here:-Subscribe to The Cafecito con Estrellita Newsletter for your Scholarship freebie!-Instagram: cafecitoconestrellita-Tik Tok: cafecitoconestrellita-Twitter: cafeconestrella-LinkedIn: Estrella Serrato-Looking for community, accountability, and 1-1 support?: Work with me-Looking for Personal Branding Support to build your media empire?: Work with me
What physical security measures are recommended for protecting high-value wallet signers' homes?Recommendations include implementing a high-security safe (like a TL-30 rated safe) for storing hardware wallets and seed phrases, reinforcing doors and using strong locks such as deadbolts and smart locks with biometric access. Inside, security cameras with remote monitoring are advised for critical areas, along with motion sensors and panic buttons. Perimeter security should include high fences, gates, and controlled entry points, complemented by motion-activated security lights and surveillance cameras around the property. A secure parking area or monitored garage is also recommended.What technological security measures are suggested to protect digital assets and devices?Securing digital assets and devices involves using secure computers and mobile devices with biometric authentication. Dedicated offline devices (air-gapped devices) for signing transactions are crucial. Electronic devices can be protected using a Faraday cage or signal-blocking container. A secure Wi-Fi network is also essential, recommending a hidden SSID and enterprise-grade encryption.What behavioral security practices are advised to minimize risk for high-value wallet signers?Behavioral security is key and includes strictly avoiding public discussions about crypto holdings, both in person and online. Regularly rotating security routines helps to avoid predictability. Using pseudonyms for crypto-related transactions and accounts adds a layer of anonymity. It's also important to verify the identity of service personnel before allowing them access to the home and to shred sensitive documents before disposal. Establishing emergency protocols, including safe words for distress situations, is also recommended.How can the visibility of wealth be reduced to enhance security?Reducing signs of wealth is an important preventative measure. The checklist specifically advises against having luxury items visible from outside the home.What personal security measures should high-value wallet signers consider?Personal security measures involve carrying a discreet personal alarm or security device and being trained in situational awareness and self-defense. Using a secure and anonymous mobile number for crypto-related activities is advised. Avoiding geotagging locations in social media posts is also crucial. Establishing trusted emergency contacts aware of security protocols is important, and engaging a trusted network of security personnel or bodyguards may be necessary.Why is storing hardware wallets and seed phrases in a high-security safe recommended?Storing hardware wallets and seed phrases in a high-security safe, such as a TL-30 rated safe, provides robust physical protection against theft and damage. These devices and phrases are the keys to accessing digital assets, making their secure storage paramount.What is the purpose of using dedicated offline devices for signing transactions?Using dedicated offline devices (air-gapped devices) for signing transactions significantly reduces the risk of online compromise. Since these devices never connect to the internet, they are isolated from potential malware and hacking attempts, making them much more secure for authorizing transactions.What type of storage is recommended for important documents and backups?Fireproof and waterproof storage is recommended for important documents and backups. This ensures that critical information remains protected in the event of a fire or flood, which could otherwise lead to significant losses.
Secure the GridTransactional GoldSecuring Texas ElectionsTaxpayer Funded LobbyingEnd Federal OverreachTexas Not For SaleProtect Texas KidsBorder EnforcementFollow Debbie Georgatos, America Can We Talk Show HostWebsite: http://americacanwetalk.orgTwitter: @DebbieCanWeTalkTruth: https://truthsocial.com/@AmericaCanWeTalkInstagram: https://www.instagram.com/debbiecanwetalkFacebook: https://www.facebook.com/AmericaCanWeTalkRumble: https://rumble.com/user/AmericaCanWeTalkOBBM: https://www.obbmnetwork.tv/series/america-can-we-talk-207873America Can We Talk is a show with a mission — to speak up for the extraordinary and unique greatness of America. I talk about the top issues of the day facing America, often with insightful guests, always from the perspective of furthering that mission, and with the goal to inspire listeners to celebrate and embrace the liberty on which America was founded. #BecauseAmericaMatters
Anthony Anzalone is the CEO and Founder of XION, the first layer 1 blockchain purpose-built for consumer adoption by abstracting away the complexities of crypto. Previously known for his "Burnt Banksy" project that sparked global discourse on NFTs, Anthony has established himself as a pioneering figure in Web3 with his work covered by Bloomberg, BBC, CBS, and other major media outlets.Through his leadership at XION, Anthony focuses on democratizing blockchain technology through chain abstraction, enabling partnerships with global brands like Uber, BMW, and Amazon. His innovations have gained significant institutional validation, with XION becoming the first Title II EU-compliant L1 blockchain and receiving support from Anchorage Digital, the first federally chartered crypto bank in the U.S.In this conversation, we discuss:- The Evolution of Mainstream Blockchain Adoption- Institutional Validation & Market Positioning- Chain Abstraction: From Theory to Implementation- Chain Abstraction is Dead- Enterprise Adoption Success Stories- Securing Partnerships With Major Brands- Regulatory Leadership in a Changing Landscape- Building a Web3 Ecosystem for Everyone- NYSE Live Appearance- Blending the Physical and Digital WorldXIONWebsite: xion.burnt.comX: @burnt_xionDiscord: discord.gg/burntAnthony AnzaloneX: @BurntBanksy --------------------------------------------------------------------------------- This episode is brought to you by PrimeXBT. PrimeXBT offers a robust trading system for both beginners and professional traders that demand highly reliable market data and performance. Traders of all experience levels can easily design and customize layouts and widgets to best fit their trading style. PrimeXBT is always offering innovative products and professional trading conditions to all customers. PrimeXBT is running an exclusive promotion for listeners of the podcast. After making your first deposit, 50% of that first deposit will be credited to your account as a bonus that can be used as additional collateral to open positions. Code: CRYPTONEWS50 This promotion is available for a month after activation. Click the link below: PrimeXBT x CRYPTONEWS50
Safe Quality Food certifications are crucial to the success and efficiency of the food supply chain. Interstate Cold Storage's Megan Beachler and FreightWaves' Mary O'Connell break down the importance of SQF Certifications and what to look for in a temperature-controlled warehouse provider. Keep up with Live FreightWaves EventsOther FreightWaves Shows Learn more about your ad choices. Visit megaphone.fm/adchoices
In an era where cargo theft, identity spoofing, and double brokering are at an all-time high, logistics leaders must go beyond reactive solutions to proactively secure their operations. In this fireside chat, FreightWaves sits down with Elizabeth Moscoso, President of Moscoso Express, to discuss how her team builds trust, ensures compliance and stays ahead of bad actors. Keep up with Live FreightWaves EventsOther FreightWaves Shows Learn more about your ad choices. Visit megaphone.fm/adchoices
Space is changing fast. Commercial activity is accelerating. Talent needs are shifting. Orbits are filling. And with the growing threat of Kessler Syndrome, long-term access to space may become more constrained than ever before. In this SSPI-WISE Presents podcast, based on the panel conducted at the May 1 meeting of SSPI-WISE, we hear a roundtable discussion between Donya Naz Divsalar, (incoming) Head of Future Projects at Magdrive; Elizabeth Kennick, President, Teachers In Space, Inc. and Genna Ng, Venture Partner, Beyond Earth Technologies and Co-Founder, Singapore Space Network.
Curtis Vincent, CHRO at The Estate Registry, offers a fascinating look at how digital estate management is transforming employee benefits packages and addressing a critical gap in financial wellness programs. The days of the fireproof lockbox stuffed with important papers are long behind us. As Curtis explains, modern employees lead increasingly complex digital lives with countless online accounts and digital assets that require organization and protection. Legacy Now provides a secure, intuitive platform that not only stores traditional estate planning documents but also preserves family legacies through digital photographs and videos that can be passed down through generations.What makes digital estate management particularly valuable is its relevance to employees at every career stage. Curtis challenges the notion that estate planning only benefits those approaching retirement. "Almost everybody, regardless of age or net worth, has something worth protecting," he notes. For younger professionals, the platform offers organization around guardianship arrangements, documentation of existing benefits like 401(k)s and insurance policies, and the foundation for building their own legacies. By centralizing important information, these tools alleviate the stress and anxiety that come with managing complex financial lives, allowing employees to focus better at work.For HR professionals considering implementation, Curtis recommends prioritizing cybersecurity, user support capabilities, and ease of administration. Start by gauging employee interest, arranging demonstrations, educating HR teams about the probate process, and carefully reviewing options. Ready to transform your benefits package with this missing piece of financial security? Connect with Curtis on LinkedIn or visit Estate Registry's website to explore how digital estate management can enhance your employee wellbeing strategy.Support the showFeature Your Brand on the HRchat PodcastThe HRchat show has had 100,000s of downloads and is frequently listed as one of the most popular global podcasts for HR pros, Talent execs and leaders. It is ranked in the top ten in the world based on traffic, social media followers, domain authority & freshness. The podcast is also ranked as the Best Canadian HR Podcast by FeedSpot and one of the top 10% most popular shows by Listen Score. Want to share the story of how your business is helping to shape the world of work? We offer sponsored episodes, audio adverts, email campaigns, and a host of other options. Check out packages here. Follow us on LinkedIn Subscribe to our newsletter Check out our in-person events
In this week's episode of The Future of Security Operations podcast, Thomas is joined by Travis Howerton, Co-founder and CEO of RegScale. Travis began his security career with roles at government and regulated organizations, including the National Nuclear Security Administration and Oak Ridge National Laboratory, before being inspired by inefficiencies in compliance processes to co-found RegScale. As CEO of RegScale, he oversees their Continuous Controls Monitoring platform, which enables rapid GRC outcomes for organizations like Wiz, Keybank, and the US Department of Energy. In this episode: [02:15] How an interest in computer science led Travis to pursue a career in security [03:20] Working in “the Major Leagues of cyber” at the National Nuclear Security Administration [06:20] Moving fast in highly-regulated environments [07:10] Securing the world's fastest supercomputer at Oak Ridge National Laboratory [10:30] Supporting digital transformation at enormous scale at Bechtel Corp [15:15] How outdated compliance processes inspired Travis to co-found RegScale [18:15] How RegScale acquired its first high-profile clients through "hustle and luck" [19:20] The challenges of building the first version of RegScale [21:15] Taking the pain out of compliance [23:20] The biggest GRC roadblocks teams are facing right now [25:10] Practical advice for moving the needle on your automation program [27:33] Eliminating redundancy and inefficiency in federal compliance programs [32:30] What's next for RegScale [33:45] The best applications of AI (and which decisions should "never" be made AI) [35:45] Navigating regulatory uncertainty when it affects your whole business model [38:40] What SecOps and compliance teams might look like in the future [40:20] What the best compliance teams do to build rapport with security, IT and other business functions [43:30] Why AI adoption is a risk-based conversation every organization should be having with their CISO [46:00] Connect with Travis Where to find Travis Howerton: LinkedIn RegScale Where to find Thomas Kinsella: LinkedIn Tines Resources mentioned: The CISO Society 2025 State of Continuous Control Monitoring Report
Guest: Christine Sizemore, Cloud Security Architect, Google Cloud Topics: Can you describe the key components of an AI software supply chain, and how do they compare to those in a traditional software supply chain? I hope folks listening have heard past episodes where we talked about poisoning training data. What are the other interesting and unexpected security challenges and threats associated with the AI software supply chain? We like to say that history might not repeat itself but it does rhyme – what are the rhyming patterns in security practices people need to be aware of when it comes to securing their AI supply chains? We've talked a lot about technology and process–what are the organizational pitfalls to avoid when developing AI software? What organizational "smells" are associated with irresponsible AI development? We are all hearing about agentic security – so can we just ask the AI to secure itself? Top 3 things to do to secure AI software supply chain for a typical org? Resources: Video “Securing AI Supply Chain: Like Software, Only Not” blog (and paper) “Securing the AI software supply chain” webcast EP210 Cloud Security Surprises: Real Stories, Real Lessons, Real "Oh No!" Moments Protect AI issue database “Staying on top of AI Developments” “Office of the CISO 2024 Year in Review: AI Trust and Security” “Your Roadmap to Secure AI: A Recap” (2024) "RSA 2025: AI's Promise vs. Security's Past — A Reality Check" (references our "data as code" presentation)
In this episode, hosts Frank La Vigne and Candice Gillhoolley are joined by Andy Schwaderer and Dr. Christopher Leach from Quantum Knight. As the podcast celebrates its recent top ranking on Feedspot, the conversation dives deep into the urgent realities of post-quantum encryption, highlighting the evolving threats facing our digital lives—far beyond the stereotypical “hackers in hoodies.”Andy and Dr. Leach unpack why “being quantum ready isn't optional, it's essential,” sharing practical insights on defending against sophisticated adversaries, from nation-state actors to criminal gangs exploiting the cracks in legacy infrastructure. From the infamous Sony hack to modern ransomware attacks on hospitals and public utilities, the episode explores how Quantum Knight's innovative cryptosystem aims to protect data across everything from IoT devices to critical medical systems.Tune in for a compelling discussion on why security can no longer be an afterthought, how agile cryptography is enabling a future-proof approach, and why the responsibility—and power—to keep data safe now rests firmly in the hands of every individual and organization. If you've ever wondered how quantum computing and cybersecurity overlap, or how to safeguard your most vital assets in the quantum era, this episode is for you.Timestamps00:00 Streamlined Quantum-Enhanced Data Security08:26 "Data Control is King"14:48 "Understanding Advanced Persistent Threats"17:43 Quantum Computing's Impact on Cybersecurity22:42 "IoT's Security Oversight"32:15 "Admitting Issues, Seeking Solutions"36:02 Cryptography's Limits and Access Control39:31 Affordable Ransomware Protection Solution48:55 Switching Accountants Mid-Service51:35 Data Threat: Public Infrastructure Vulnerability56:45 Versatile Cryptography Support System01:02:19 AI Code Reliability Challenges01:06:53 "Concerns About Health and Security"
Given on the Fourth Sunday after Easter, 2025.
On this episode, we visit the Massachusetts Audubon Society (Mass Audubon). While there, we examine some objects related to the early history of the Society from Membership Specialist, Emily Gray. MHS Chief Historian Peter Drummey and Bancroft Poor, Chief Operating Officer and Chief Financial Officer at Mass Audubon, tell us about the Society's formation as an advocacy group at the turn of the twentieth century and how its goals have changed over time. Learn more about episode objects here: https://www.masshist.org/podcast/season-4-episode-6-Mass-Audubon Email us at podcast@masshist.org. Episode Special Guests: Bancroft Poor serves as Chief Operating Officer and Chief Financial Officer for Mass Audubon. In these roles, he is in charge of information technology, human resources, capital assets and planning, and financial functions, including budget preparation and monitoring, annual audit and tax preparation, insurance, contracting, investment liaison, and banking. He is a member of the senior management team and one of the primary staff contacts with the Board of Directors, serving as staff liaison to the Board Administration/Finance, Audit, and Investment Committees. In addition, he manages Mass Audubon's Belize program and works extensively on Mass Audubon's internal climate change and energy conservation initiatives. Bancroft Poor has been an employee of Mass Audubon since 1984. He is a graduate of Harvard College and holds a master's degree in Public and Private Management from the Yale School of Management. Emily Gray is a Membership Specialist with Mass Audubon. This episode uses materials from: The Bond (Instrumental) by Chad Crouch (Attribution-NonCommercial 4.0 International) Psychic by Dominic Giam of Ketsa Music (licensed under a commercial non-exclusive license by the Massachusetts Historical Society through Ketsa.uk) Curious Nature by Dominic Giam of Ketsa Music (licensed under a commercial non-exclusive license by the Massachusetts Historical Society through Ketsa.uk)
Subscribe to Blue White Illustrated on YouTube: https://bit.ly/3KzEcqKCheck out the site too! - https://bit.ly/3u8dilDOfficial visit season for Penn State football gets underway tomorrow in a big way. Several of the team's top targets will join the program for its last, best impression before many decide on their college destinations this summer. We're previewing the action this weekend on the BWI Live Recruiting Show, today at 10 a.m. on YouTube. Join recruiting reporters Sean Fitz and Ryan Snyder as they discuss the team's chances at securing the commitments that will ensure a top-ten class for the 2026 cycle. If you want to get more on recruiting than just an hour's worth of conversation and insight, join Blue White Illustrated right now! You can access the site for just one dollar for the first week to try us out. Penn State recruiting news We'll start with the latest recruiting news for the Penn State football team that doesn't include players visiting this weekend. Probable five-star defensive end Luke Wafle announced his top four schools and released his official visit schedule for the upcoming months. We'll discuss where Penn State sits on the list of final schools and when he'll visit Happy Valley. Next, we'll flip to the other side of the football to discuss the offensive line. Penn State has built a strong culture under offensive line coach Phil Trautwein, who seems to have his pick of the class in 2026. Which players stand out, and is there a race to secure a spot in the class? We'll discuss what Snyder pieced together in his reporting. Finally, we'll wrap up our discussion of Davion Brown's commitment to the program on Monday and discuss any other topics our experts think you need to know. Official visit weekend Of course, the main event this weekend begins on Friday. Top players like safety Joey O'Brien, cornerback Khary Adams, and linebacker Cincere Johnson will take their official visits this weekend. We'll look at each player's impact on the class, where they are on the big board for the program, and more. Of couse we'll preview all of the players visiting this weekend. Elite 11 Wraps up qualifiers for Finals in State College Finally, we'll preview the Elite 11 qualifier coming to State College on Sunday. Penn State's quarterback commits, Troy Huhn and Peyton Falzone, will attend the event. We'll discuss what we expect and want to see from the duo this weekend. However, the Elite 11 isn't just for quarterbacks. In years past, top commits like Luke Reynolds, Andrew Olesh, Layton Von Brandt, and Lyrick Samuel have attended the event's All-22 camp. We'll end the show by previewing that portion of the event. #PennState #NittanyLions JOIN Blue White Illustrated: https://www.on3.com/teams/penn-state-nittany-lions/join/?plan=annualSUBSCRIBE to Blue White Illustrated on YouTube and enable alerts - new highlights and videos uploaded regularly: https://www.youtube.com/c/bluewhiteillustratedvideo?sub_confirmationBookmark our homepage: https://www.on3.com/teams/penn-state-nittany-lions/Subscribe to BWI Magazine and Newsletters: https://bluewhiteonline.com Like us on Facebook https://www.facebook.com/BlueWhiteIllustrated/Follow us on Twitter https://twitter.com/PennStateOn3
Join Laszlo Szabo, CEO & Co-Founder of Kiln, for a conversation with Adam Levine, SVP of Corporate Development & Partnerships and CEO of Fireblocks Trust Company.In this episode, Adam shares insights into Fireblocks' strategic expansion into regulated custody, explaining why they launched their New York-based trust company, how it serves institutional clients like VCs and market makers, and the operational challenges of balancing innovation with compliance.The discussion dives into the role of stablecoins in global payments, with real-world examples from emerging markets like Brazil and Argentina, where dollar-denominated stablecoins are mitigating currency volatility and accelerating cross-border transactions. Adam also unpacks Fireblocks' vision for tokenization—from traditional assets like T-bills to unconventional ones like investment-grade wine—and how interoperability between blockchains will unlock liquidity in the years ahead.Security remains a cornerstone of the conversation, as Adam reflects on lessons from high-profile hacks (including the recent Bybit incident) and how Fireblocks' infrastructure prioritizes risk mitigation without compromising efficiency. Looking forward, he predicts 2025 will be a year of decisive action for banks and asset managers, with stablecoins and tokenization moving from pilot projects to core infrastructure—even if the full impact may take years to materialize.PODCAST INFO:
Jake Kaminski is a two-time Olympic silver medalist in archery and a longtime member of the US Archery Team. He runs a successful YouTube channel, writes training guides, and develops high-performance gear under the Kaminski Archery brand. Sign up for the Kaminski Archery Backyard Championship here.Sponsors:Helix Sleep premium mattresses: https://HelixSleep.com/Tim (27% off all mattress orders) AG1 all-in-one nutritional supplement: https://DrinkAG1.com/Tim (1-year supply of Vitamin D (and 5 free AG1 travel packs) with your first subscription purchase.)Shopify global commerce platform, providing tools to start, grow, market, and manage a retail business: https://shopify.com/tim (one-dollar-per-month trial period)*Timestamps:[00:00:00] Start.[00:06:50] A glimpse into the high-precision world of Olympic archery.[00:11:04] How Jake and I connected.[00:18:27] Jake's auspicious introduction to archery.[00:21:15] Why you (Yes! You!) should try archery.[00:22:01] The differences between bows.[00:25:19] The admirable proficiency of Shot IQ's Bodie and Joel Turner.[00:26:24] Ethical bow hunting, performing under pressure, and transitioning from rifle to bow.[00:29:22] Why I wouldn't have cut it as a competitive archer in Korea.[00:30:14] Mindful archery and training hard to make competition easy.[00:37:00] What Jake did when compound bow archery started to get boring.[00:40:00] Meeting legendary Coach Kisik Lee (KSL).[00:43:06] The upsides of having no social life as a kid.[00:45:20] The welcoming weirdness of archery communities.[00:46:33] For the sake of form, Coach Lee shakes things up.[00:51:21] “I am.” — an affirmation for apathy adjustment.[00:58:11] London, 2012 Olypmics: when it all starts coming together.[01:08:28] How does teamwork play out in archery?[01:15:40] My own experience with Coach Lee.[01:19:23] The trials of training and traveling.[01:27:33] Blank bale practice.[01:31:14] Layering, biomechanics, and other early points of focus.[01:33:03] The underrated importance of follow through.[01:36:40] Coach Lee's take on follow through vs. release.[01:37:29] Gauging tension and intention as an instructor.[01:38:52] Attention to grouping over hitting the bullseye.[01:40:57] Making adaptations for physical limitations.[01:43:30] The ups and downs of our patented “Jesus take the wheel” instinctive approach.[01:46:24] Warm-up tournaments, barebowing, black bales, and string walking.[01:50:54] Recovering from the disaster that made me rethink Lancaster.[01:55:15] Rebalancing gear: arrows and arrow rests.[02:00:50] The importance of practicing in tournament-like conditions.[02:04:03] Securing convenient fuel.[02:08:17] Lancaster preparation logistics (with special thanks to Heather Kaminski and Rick Simpson Oil).[02:13:17] The glue that holds us together: note-taking and training logs.[02:16:47] Even counterintuitive consistency is key.[02:18:45] Our experience at Lancaster.[02:28:00] “The goal is to do the least necessary, not the most possible.” — Henk Kraaijenhof[02:31:44] Learning by observation and conversation on the practice range.[02:35:35] What's the Kaminski Archery Backyard Championship, and why should you get involved?[02:40:30] How can you (and why should you) get started with archery today?[02:42:48] Parting thoughts.*For show notes and past guests on The Tim Ferriss Show, please visit tim.blog/podcast.For deals from sponsors of The Tim Ferriss Show, please visit tim.blog/podcast-sponsorsSign up for Tim's email newsletter (5-Bullet Friday) at tim.blog/friday.For transcripts of episodes, go to tim.blog/transcripts.Discover Tim's books: tim.blog/books.Follow Tim:Twitter: twitter.com/tferriss Instagram: instagram.com/timferrissYouTube: youtube.com/timferrissFacebook: facebook.com/timferriss LinkedIn: linkedin.com/in/timferrissPast guests on The Tim Ferriss Show include Jerry Seinfeld, Hugh Jackman, Dr. Jane Goodall, LeBron James, Kevin Hart, Doris Kearns Goodwin, Jamie Foxx, Matthew McConaughey, Esther Perel, Elizabeth Gilbert, Terry Crews, Sia, Yuval Noah Harari, Malcolm Gladwell, Madeleine Albright, Cheryl Strayed, Jim Collins, Mary Karr, Maria Popova, Sam Harris, Michael Phelps, Bob Iger, Edward Norton, Arnold Schwarzenegger, Neil Strauss, Ken Burns, Maria Sharapova, Marc Andreessen, Neil Gaiman, Neil de Grasse Tyson, Jocko Willink, Daniel Ek, Kelly Slater, Dr. Peter Attia, Seth Godin, Howard Marks, Dr. Brené Brown, Eric Schmidt, Michael Lewis, Joe Gebbia, Michael Pollan, Dr. Jordan Peterson, Vince Vaughn, Brian Koppelman, Ramit Sethi, Dax Shepard, Tony Robbins, Jim Dethmer, Dan Harris, Ray Dalio, Naval Ravikant, Vitalik Buterin, Elizabeth Lesser, Amanda Palmer, Katie Haun, Sir Richard Branson, Chuck Palahniuk, Arianna Huffington, Reid Hoffman, Bill Burr, Whitney Cummings, Rick Rubin, Dr. Vivek Murthy, Darren Aronofsky, Margaret Atwood, Mark Zuckerberg, Peter Thiel, Dr. Gabor Maté, Anne Lamott, Sarah Silverman, Dr. Andrew Huberman, and many more.See Privacy Policy at https://art19.com/privacy and California Privacy Notice at https://art19.com/privacy#do-not-sell-my-info.
On this episode of the podcast, Dr. Walid Phares breaks down President Trump's ongoing diplomatic and economic initiatives in the Middle East. The former foreign policy and national security advisor to President Trump highlighted major successes, including Saudi Arabia's historic $100B military committment — part of a broader effort that could reach $1T across the region.Dr. Phares discusses how President Trump's strategy is uniting nations like Saudi Arabia, the UAE and Qatar against Iran, signaling a shift in regional alliances. Furthermore, Dr. Phares explores President Trump's comments on Lebanon and Syria, the goal of weaking Hezbollah and the potential for Syria to recognize Israel — an unprecedented move that could reshape the region's future.You can order Dr. Walid Phares' latest book titled, Iran on Amazon or follow him on X by searching for his handle: @WalidPharesSee Privacy Policy at https://art19.com/privacy and California Privacy Notice at https://art19.com/privacy#do-not-sell-my-info.
Dubs OT with John Dickinson and Greg Silver: Minnesota's big third quarter propels the T-wolves to victory and securing a 3-1 series lead.See omnystudio.com/listener for privacy information.
Software Engineering Radio - The Podcast for Professional Software Developers
Steve Summers speaks with SE Radio host Sam Taggart about securing test and measurement equipment. They start by differentiating between IT and OT (Operational Technology) and then discuss the threat model and how security has evolved in the OT space, including a look some of the key drivers. They then examine security challenges associated with a specific device called a CompactRIO, which combines a Linux real-time CPU with a field programmable gate array (FPGA) and some analog hardware for capturing signals and interacting with real-world devices. Brought to you by IEEE Computer Society and IEEE Software magazine.
Hour 1: Ike, Spike and Fritz are giving their reaction to the Sixers getting the No. 3 pick in last night's NBA Draft Lottery and if thye now have hope for the team moving forward.
SummaryIn this conversation, Maribel Lopez and Jeetu Patel discuss the transformative potential of AI in business, the challenges organizations face in adopting AI, and the importance of security in AI applications. They explore the need for visibility, validation, and guardrails in securing AI, the rise of specialized AI models, and the future of AI agents in automating workflows. Patel emphasizes Cisco's commitment to innovation and the urgency for companies to embrace AI to remain relevant in a rapidly evolving landscape.TakeawaysAI is transforming business strategies across industries.CEOs are optimistic about AI but feel unprepared.Security practitioners face significant staffing shortages.AI can both complicate and simplify security challenges.Organizations must secure AI models and use AI for defense.Visibility, validation, and guardrails are essential for AI security.Specialized AI models can be more effective and cost-efficient.AI agents will enhance productivity and workflow automation.Cisco is innovating rapidly and operating like a startup.Companies must embrace AI to thrive in the future.Chapters00:00The Exciting Intersection of AI and Business02:47Challenges in AI Adoption and Security06:34Securing AI: Visibility, Validation, and Guardrails12:47The Rise of Specialized AI Models18:00The Future of AI Agents and Automation25:31Cisco's Transformation and Innovation31:10Embracing AI: A Call to ActionFollow us at: Jeetu Patel https://www.linkedin.com/in/jeetupatel/Maribel Lopez https://www.linkedin.com/in/maribellopez/
In this episode, Andrew Biggs interviews George Otel about business funding strategies. George shares why it's crucial to secure financing when your business is doing well, how to treat a line of credit like an insurance policy, and why building business credit early pays off in the long run.
This week, our co-hosts sit down with Adrienne Taylor—entrepreneur, speaker, and founder of Tailored WealthSaver®—to explore how building wealth is about more than just the numbers. Adrienne shares her journey from pharmacy to finance, her passion for helping millennials achieve financial freedom, and the lessons she learned expanding her business through a strategic partnership.Together, we reflect on the real challenges entrepreneurs face behind the scenes, including navigating personal transitions like divorce, and why giving yourself grace is essential to long-term success. Adrienne reminds us that financial wellness and business growth go hand-in-hand—and that with the right support, what once felt unimaginable can become reality.Whether you're an aspiring entrepreneur, working toward financial stability, or redefining what success looks like in your own life, this episode offers powerful insights on resilience, reinvention, and the beauty of betting on yourself.Show Notes:02:27 From pharmacy to finance: Adrienne's personal journey07:12 The millennial personal finance secret strategy09:42 How business expansion can be your biggest gain rather than loss11:54 The blessings & burdens of being an entrepreneur 19:40 What's to come for Tailored Wealth SaverShow Note Links:Connect with Adrienne on LinkedIn!Connect with Adrienne on Instagram!Read more here!Want to get involved with AFCPE®?Here are a few places to start: Become a Member, Sign up for an Essentials Course, or Get AFC Certified today! Want to support the podcast? We love partnering with organizations that share our mission and values. Download our media kit.
Send us a textWhat happens when a teacher trusts students to create theatrical magic? In this captivating conversation from Ayala High School's drama department, we discover how one unexpected career twist transformed English teacher Madeline Sherritt into a theater director who puts students firmly in the driver's seat.Technical Director Aiden Kitavis and Assistant Director Karly Welsh share their journeys from theater newcomers to program leaders, revealing how the department's unique approach fosters both artistic growth and personal development. Rather than micromanaging, Ms. Sherritt creates an environment where students design sets, manage tech, direct scenes, and solve problems as they arise—from figuring out how to transform a multipurpose room into a medieval rock concert venue to determining how to spend their limited, self-funded budget.The conversation centers around their upcoming production of "Six: The Musical," the Broadway hit that reimagines the wives of Henry VIII as a pop group. Securing rights to this coveted show—one of the first high schools to perform it—represents a meaningful milestone for the program. Through candid stories and lighthearted moments (including impromptu appearances by Ms. Sherritt's young children), we see how Ayala's theater program builds not just productions but a genuine community where students become "the calm in the storm" and develop practical skills they'll carry forward.Whether you're a theater enthusiast, educator, or simply appreciate stories of young people exceeding expectations when given genuine responsibility, this behind-the-scenes look at student-led theater will inspire you to reconsider what's possible when we trust the next generation with creative control. Don't miss Six: The Musical at Ayala High School, running May 15-17!Ayala Theatre CompanyInstagramFacebookSixFind STTS:Steps To The Stage (@stepstothestage) | InstagramFacebookSteps To The Stage (buzzsprout.com)Steps To The Stage - YouTubePlease follow on your favorite podcast platform and we appreciate 5 Star ratings and positive reviews!
Preview: Author Jerry Dunleavy explains that securing Bagram would have made evacuation successful even in haste. More later. 1848 AGHANISTAN
Cybersecurity is no longer confined to the digital world or just a technical challenge, it's a global imperative. The NightDragon Innovation Summit convened a group of industry leaders to discuss how public and private entities can work together to address emerging threats and harness the power of AI, cybersecurity, and innovation to strengthen national defense. In this special edition podcast, we capture a glimpse into the knowledge and expertise shared at the NightDragon Innovation Summit. We are joined by NightDragon Founder and CEO Dave DeWalt, DataBee CEO Nicole Bucala, Liberty Mutual Insurance EVP and CISO Katie Jenkins, Sophos CEO Joe Levy, and Dataminr VP of Sales Engineering Michael Mastrole. Learn more about your ad choices. Visit megaphone.fm/adchoices
#ISRAEL : SECURING GAZA AND THE GAZANS. ALEX TRAIMAN, JNS. MALCOLM HOENLEIN @CONF_OF_PRES @MHOENLEIN1 1914 PALESTINE
On this special report, brought to you by AMAC, economist Steve Moore shares insights on the current volatility of the stock market, the potential impact of tax reforms, and the ongoing negotiations with major global economies, particularly China. With a focus on fair trade practices, Steve emphasizes the importance of domestic production and the role of consumer choices in shaping the future of American trade. Bobby Charles, a former Assistant Secretary of State and Republican candidate for governor of Maine, talks the current state of trade and its implications for America. Bobby discusses the historical context of free trade, the challenges faced by American workers, and the need for a recalibration of trade policies to protect U.S. interests. Finally, Colonel Rob Maness, a United States Air Force veteran delves into significant national security issues, including the military's enhanced control over the southern border, the ongoing efforts to combat drug cartels, and the recent successes against terrorist threats. See Privacy Policy at https://art19.com/privacy and California Privacy Notice at https://art19.com/privacy#do-not-sell-my-info.
On this special report, brought to you by AMAC, Congressman Eric Burlison from Missouri joins to discuss the current state of tariffs and the ongoing debates in Congress. Congressman Burlison shares his insights on President Trump's new initiatives regarding foreign campaign contributions and the implications for American manufacturing. Author and China expert Gordon Chang, author of "Plan China's Project to Destroy America," sheds light on the current state of the Chinese economy and its implications for U.S.-China relations. Additional interview with Leaha Thomas from Wired 2 Fish Coffee.See Privacy Policy at https://art19.com/privacy and California Privacy Notice at https://art19.com/privacy#do-not-sell-my-info.