The Spike Feed відкриті
[search 0]
більше
Download the App!
show episodes
 
Artwork

1
Uncle (the podcast)

Uncle and Aaron

Unsubscribe
Unsubscribe
Щомісяця+
 
Join Uncle John and nephew-in-law Aaron for a hilarious, and at times incoherent, conversation about anything and everything. Featuring special guests and audio taken from daily life, this podcast is unlike anything you've ever heard.
  continue reading
 
Artwork

1
Magic People

TheMagicManSam

Unsubscribe
Unsubscribe
Щомісяця
 
"Magic People" is an interview-style podcast that revolves around Magic: The Gathering and the humans that love the game. Hosted by MTG YouTuber "TheMagicManSam", this show delves into the origin stories of its guests, and always provides a fantastic narrative to enjoy.
  continue reading
 
Loading …
show series
 
- US politics, globalism, and exceptionalism. (0:00) - US military draft, NDAA funding, and nuclear war preparations with Russia and China. (1:52) - US military expansion, technology advancements, and geopolitical tensions. (7:49) - Western exceptionalism and aggression, Putin's critique of US actions. (14:09) - Western economic and cultural influe…
  continue reading
 
Enterprises often struggle with achieving business value in identity programs. This is typically the result of technology choices that require a disproportionately greater amount of effort and focus and underestimating the workforce required for organizational change management. With 30 years in the industry and a depth of accumulated knowledge wor…
  continue reading
 
Several recent trends underscore the increasing importance of Know Your Business (KYB) practices in today's business landscape. One significant trend is the rise in financial crimes, including money laundering, fraud, and terrorist financing. Technological advancements have transformed the way businesses operate, leading to increased digitization, …
  continue reading
 
This week, we've got data security being both funded AND acquired. We discuss Lacework's fall from unicorn status and why rumors that it went to Fortinet for considerably more than Wiz was willing to pay make sense. Microsoft Recall and Apple Intelligence are the perfect bookends for a conversation about the importance of handling consumer privacy …
  continue reading
 
Trust in Microsoft, Apple, and the Holy AI, Amen, Moonstone Sleet, Cheating, Joshua Marpet, and More, on this edition of the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-393
  continue reading
 
Trust in Microsoft, Apple, and the Holy AI, Amen, Moonstone Sleet, Cheating, Joshua Marpet, and More, on this edition of the Security Weekly News. Show Notes: https://securityweekly.com/swn-393
  continue reading
 
This week, we've got data security being both funded AND acquired. We discuss Lacework's fall from unicorn status and why rumors that it went to Fortinet for considerably more than Wiz was willing to pay make sense. Microsoft Recall and Apple Intelligence are the perfect bookends for a conversation about the importance of handling consumer privacy …
  continue reading
 
We will discuss LLM security in general and some of the issues covered in the OWASP Top 10 for LLMs! Segment Resources: https://genai.owasp.org/ Skyrocketing IoT vulnerabilities, bricked computers?, MACBORG!, raw dogging source code, PHP strikes again and again, if you have a Netgear WNR614 replace it now, Arm Mali, new OpenSSH feature, weird headp…
  continue reading
 
- AI and its potential dangers, weaponization by the NSA - AGI by 2027 and the rise of superintelligence. (12:05) - US military's use of weapons, #AI, and #depopulation agendas. (24:07) - AI's potential to harm humanity through government control and depopulation efforts. (34:54) - Open source: Decentralizing AI development for societal safety. (39…
  continue reading
 
Skyrocketing IoT vulnerabilities, bricked computers?, MACBORG!, raw dogging source code, PHP strikes again and again, if you have a Netgear WNR614 replace it now, Arm Mali, new OpenSSH feature, weird headphones, decrypting firmware, and VPNs are still being hacked! Show Notes: https://securityweekly.com/psw-832…
  continue reading
 
- Chinese drone technology, including search and rescue and kamikaze drones. - Military capabilities and population vs. GDP. (2:35) - US dependence on foreign supply chains and naval power. (9:33) - Geopolitical tensions between US and #Russia, covering #Ukraine and economic sanctions. (30:29) - The decline of America, including societal changes an…
  continue reading
 
- LGBT visibility and hate crimes in blue cities. (0:03) - Israel's economy and military actions. (11:48) - Infowars' potential liquidation and Alex Jones' impact on the brand. (16:51) - Limitations of renewable energy sources. (22:38) - Ivermectin pricing and availability, with mention of a cheaper alternative for pets. (28:40) - EPA's handling of…
  continue reading
 
Buzz Aldrin punches me in the face, the Gray Lady, Veeam, Microsoft squared, Nvidia, Hardware, Pentests, Josh Marpet, and more on this Edition of the Security Weekly News. Show Notes: https://securityweekly.com/swn-392
  continue reading
 
Buzz Aldrin punches me in the face, the Gray Lady, Veeam, Microsoft squared, Nvidia, Hardware, Pentests, Josh Marpet, and more on this Edition of the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-392
  continue reading
 
- Israeli military actions in #Palestine, highlighting lack of humanity. (0:03) - Drone warfare, nuclear annihilation, and military terminator robot capabilities in world war three. (5:16) - AI-powered drone swarms. (9:52) - AI extermination of humans, dehumanization of Palestinians, and Israel's fate. (15:55) - Russia's nuclear capabilities, inclu…
  continue reading
 
Looking at use cases and abuse cases of Microsoft's Recall feature, examples of hacking web APIs, CISA's secure design pledge, what we look for in CVEs, a nod to PHP's history, and more! Visit https://www.securityweekly.com/asw for all the latest episodes! Show Notes: https://securityweekly.com/asw-288…
  continue reading
 
Looking at use cases and abuse cases of Microsoft's Recall feature, examples of hacking web APIs, CISA's secure design pledge, what we look for in CVEs, a nod to PHP's history, and more! Show Notes: https://securityweekly.com/asw-288
  continue reading
 
- Trump promises to end federal taxes on service industry tips. (0:03) - Why not end all federal income taxes on individuals? (4:32) - Majority of Americans, including Hispanic, now support mass deportation of illegals. (8:47) - A global book repository and its potential impact on authors and publishers. (15:23) - Idaho government orders water cut …
  continue reading
 
The recent rise in adversarial AI has made it clear: organizations must fight AI with better AI. Gone are the days of relying on legacy, antiquated endpoint detection and response offerings, or cybersecurity tools that are based on ineffective machine learning models. In this interview, Deep Instinct CIO Carl Froggett will explain why Deep Learning…
  continue reading
 
Did you miss Gartner Security & Risk Management last week in National Harbor, MD? Don't worry, Padraic O'Reilly, Founder and Chief Innovation Officer at CyberSaint, joins us to discuss the hot topics that were presented at the conference last week, including: Artificial Intelligence(AI) Continuous Threat Exposure Management(CTEM) Identity & Access …
  continue reading
 
Did you miss Gartner Security & Risk Management last week in National Harbor, MD? Don't worry, Padraic O'Reilly, Founder and Chief Innovation Officer at CyberSaint, joins us to discuss the hot topics that were presented at the conference last week, including: Artificial Intelligence(AI) Continuous Threat Exposure Management(CTEM) Identity & Access …
  continue reading
 
Loading …

Короткий довідник