Hosted by Dr. Niamh Wycherley, this podcast shows that medieval Irish history is complex and dynamic — not at all stuffy or static. Via lively and engaging chats with leading experts, it explores aspects of a largely ignored, but commonly evoked, period, and shares new and exciting research on medieval Ireland. medievalirishhistory@gmail.com Twitter X: @EarlyIrishPod Supported by the Dept of Early Irish, Maynooth University, Taighde Éireann (formerly SFI/IRC). Views expressed are speakers' o ...
…
continue reading
Texter till sfi-podden "SFI - lyssna på svenska" som produceras av Christina Hängsel på Meningsfullt förlag. Podden är skapad för att användas inom sfi-undervisning och finns att ladda ned på Itunes.
…
continue reading
VistaMilk SFI Research Centre is focused on innovative pasture-based dairying and is co-funded by Science Foundation Ireland and the Department of Agriculture, Food and the Marine. During the course of this podcast series, we will introduce you to some of our fantastic researchers and the work they do here at the centre.
…
continue reading
Insight is one of the largest data science research centres in Europe. As such it has an incredible array of stories. It's about the science but it's also about the people as Gráinne Faller and Louise Holden find out.
…
continue reading
Support Us! https://www.patreon.com/DemystifySci DemystifySci is Dr. Michael Shilo DeLay and Dr. Anastasia Bendebury. Together they untangle complex theories of nature, making analysis accessible through conversations with exceptional thinkers. Each week they interview a new theorist about the ideas that are going to rewrite our understanding of the world. Power them via Patreon: @demystifysci
…
continue reading
About all things AppSec, DevOps, and DevSecOps. Hosted by Mike Shema and John Kinsella, the podcast focuses on helping its audience find and fix software flaws effectively.
…
continue reading
About all things AppSec, DevOps, and DevSecOps. Hosted by Mike Shema and John Kinsella, the podcast focuses on helping its audience find and fix software flaws effectively.
…
continue reading
A.I.N.E. is an app exclusive radio drama series about a faulty Human-Robot Hybrid adjusting to life in contemporary Ireland. Although A.I.N.E. appears as a smart and sophisticated 30 year old, the reality is...she’s not the sharpest tool in the box. Can artificial intelligence and Irish society co-exist? Is it all going to end in tears? Tune in every Monday to hear Ireland’s first A.I. bring awkwardness to a new level. A.I.N.E. (Artificial Intelligence Nine Eight) was a joint development bet ...
…
continue reading
Welcome to the Security Weekly Podcast Network, your all-in-one source for the latest in cybersecurity! This feed features a diverse lineup of shows, including Application Security Weekly, Business Security Weekly, Paul's Security Weekly, Enterprise Security Weekly, and Security Weekly News. Whether you're a cybersecurity professional, business leader, or tech enthusiast, we cover all angles of the cybersecurity landscape. Tune in for in-depth panel discussions, expert guest interviews, and ...
…
continue reading
AHDB's Economics & Analysis Director, David Eudall, examines the stories behind the numbers from the world of agriculture. As agri-food markets become more uncertain, driven by changing weather, geopolitics, energy costs and changing consumer demands, David is joined by colleagues to track the latest trends and explain what it all means for our levy payer businesses. And what impact it has on consumers. Each week David throws the spotlight on at least one sector, with the focus shared betwee ...
…
continue reading
Welcome to the Building & Branding podcast hosted by Amanda Stichter, produced by Virtual Vision. On this show, we sit down with experts in the restoration & home services industry to hear their stories of how they built their businesses to succeed and stand out. Our conversations will uncover the challenges they've faced, the strategies they've employed, and the pivotal moments that defined their paths. We'll also dive into the critical importance of branding and marketing in this field, sh ...
…
continue reading
In this episode, recorded at AHDB's Grain Market Outlook briefing in Birmingham, David talks to colleagues to discuss what's driving cereals and oilseeds markets both domestically and abroad. Plus further analysis is made of the Sustainable Farming Incentive. And there's also a nod to foxes and tractor boys. Some more on GMO and SFI: Cereals and Oi…
…
continue reading
1
Origins of Evolution Itself - Dr. Michael Lachmann, SFI, DSPod #296
2:27:41
2:27:41
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
2:27:41
Today we're digging into the deep and often overlooked connections between neodarwinian evolution, life’s origins, and the evolution of non-living systems. We're guided by Dr. Michael Lachmann of the Santa Fe Institute, who investigates how life may have begun as a more generalized cosmic selection process, with planetary conditions shaping its eme…
…
continue reading
1
Signs of an Ice Age Sundaland Civilization - Dr. Danny Hillman Natawidjaja, LIPI, #298
2:11:01
2:11:01
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
2:11:01
In today's episode we chart the debate surrounding Gunung Padang, an enigmatic site in Indonesia, and its implications for the possibility of ice age civilization. Our guide, Dr. Danny Hillman Natawidjaja, an Indonesian geologist specializing in earthquake geology and geotectonics at the Indonesian Institute of Sciences (LIPI) Research Center for G…
…
continue reading
1
Robo-Turing, BlueNoroff, Palo Alto, German Law, Fabric, Cisco, Bans, Aaran Leyland... - SWN #429
32:39
32:39
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
32:39
Robo-Turing, BlueNoroff, Palo Alto, German Law, Fabric, Cisco, Banning Things, Aaran Leyland, and More, on this edition of the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-429
…
continue reading
1
Cybersecurity Budgets: the Journey from Reactive to Proactive - Todd Thiemann, Theresa Lanowitz - ESW #383
2:01:03
2:01:03
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
2:01:03
CISOs struggle more with reactive budgets than CIOs or CTOs. It's not that part of the CISO's budget shouldn't be reactive, it's certainly necessary to an extent. The problem is when proactive measures suffer as a result. In this interview, we'll discuss some of the causes behind this and some strategies for breaking out of this loop. This segment …
…
continue reading
1
Medieval Irish Manuscripts with Dr Chantal Kobel
56:07
56:07
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
56:07
In this episode, we are joined by Dr Chantal Kobel (Department of Early Irish, Maynooth University) to chat all about medieval Irish manuscripts (literally documents written by hand) and the various specialists skills and tools needed to read these precious historical sources. From palaeography (the study of old handwriting and writing systems) to …
…
continue reading
1
It Doesn’t Have to Be This Way - Helena Norberg-Hodge, Local Futures, DSPod #297
2:33:45
2:33:45
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
2:33:45
Helena Norberg-Hodge, from Local Futures, joins us to discuss a brighter future than that which is most commonly advertised. Her particular wisdom is drawn from her experiences in pre-globalized Ladakh, highlighting the corrosive effects of 'West envy' and the accelerating race toward techno-utopia. Together, we challenge inherited narratives about…
…
continue reading
1
Cybersecurity For Schools - Kayne McGladrey - PSW #850
2:47:43
2:47:43
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
2:47:43
We chatted with Kayne about education systems security, funding for cyber tools and services, and what the future of education might look like to fill more cyber roles. In the news: Pacific Rim, Linux on Windows for attackers, one of the worst cases of a former employee's retaliation, Zery-Day FOMO, we predicted that, hacking for fun, working hard …
…
continue reading
1
Tariffs, Pygmy Goat, Schneider, SQLite, Deepfakes, Military AI, Josh Marpet... - SWN #428
32:53
32:53
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
32:53
Tariffs, Pygmy Goat, Schneider, SQLite and Dixie Flatline, Deepfakes, Military AI, Josh Marpet, and more on the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-428
…
continue reading
1
Total Recall? LLM finds bug in SQLite, C++ safety failures, zero time for zero privs - ASW #306
33:29
33:29
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
33:29
Microsoft delays Recall AGAIN, Project Zero uses an LLM to find a bugger underflow in SQLite, the scourge of infostealer malware, zero standing privileges is easy if you have unlimited time (but no one does), reverse engineering Nintendo's Alarmo and RedBox's... boxes. Bonus: the book series mentioned in this episode The Lost Fleet by Jack Campbell…
…
continue reading
1
Bug bounties, vulnerability disclosure, PTaaS, fractional pentesting - Grant McCracken - ASW #306
1:05:35
1:05:35
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
1:05:35
After spending a decade working for appsec vendors, Grant McKracken wanted to give something back. He saw a gap in the market for free or low-cost services for smaller organizations that have real appsec needs, but not a lot of means to pay for it. He founded DarkHorse, who offers VDPs and bug bounties to organizations of all sizes for free, or for…
…
continue reading
1
Bug bounties, vulnerability disclosure, PTaaS, fractional pentesting - Grant McCracken - ASW #306
32:08
32:08
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
32:08
After spending a decade working for appsec vendors, Grant McKracken wanted to give something back. He saw a gap in the market for free or low-cost services for smaller organizations that have real appsec needs, but not a lot of means to pay for it. He founded DarkHorse, who offers VDPs and bug bounties to organizations of all sizes for free, or for…
…
continue reading
1
Bug bounties, vulnerability disclosure, PTaaS, fractional pentesting - Grant McCracken - ASW #306
1:05:35
1:05:35
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
1:05:35
After spending a decade working for appsec vendors, Grant McKracken wanted to give something back. He saw a gap in the market for free or low-cost services for smaller organizations that have real appsec needs, but not a lot of means to pay for it. He founded DarkHorse, who offers VDPs and bug bounties to organizations of all sizes for free, or for…
…
continue reading
1
Planning A Merger Or Acquisition? Ask These Five Cyber Questions First - Craig Davies - BSW #371
1:05:15
1:05:15
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
1:05:15
Merger and acquisition (M&A) activity in finally starting to pick up. Although the allure of financial gains and market expansion drives these deals, the digital age demands a rigorous assessment of cybersecurity risks accompanying such mergers. Unanticipated cyber issues, like dormant malware or inconsistent access controls, can transform an ideal…
…
continue reading
1
Recall, Russia, Win 10, Phish n Ships, Midnight Blizzard, Rob Allen, and More... - Rob Allen - SWN #427
36:50
36:50
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
36:50
Recall III: the Re-Re-Recalling, Russia, Win 10, Phish n Ships, Midnight Blizzard, Emerald Whale, Rob Allen, and More, on this edition of the Security Weekly News. Segment Resources: https://www.bleepingcomputer.com/news/security/unitedhealth-says-data-of-100-million-stolen-in-change-healthcare-breach/ This segment is sponsored by ThreatLocker. Vis…
…
continue reading
1
What if securing buildings was as easy as your smartphone? - Damon McDougald, Blaine Frederick, Punit Minocha - ESW #382
2:06:19
2:06:19
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
2:06:19
The future is here! Imagine if you could get into the office, a datacenter, or even an apartment building as easily as you unlock your smartphone. Alcatraz AI is doing exactly that with technology that works similarly to how smartphones unlock using your face. It works in the dark, if you shave off your beard, and so quickly you don't even need to …
…
continue reading
1
Shadow IT and Security Debt - Dave Lewis - PSW #849
2:50:27
2:50:27
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
2:50:27
We had the pleasure of finally having Dave Lewis on the show to discuss shadow IT and security debt. Dave shared some fascinating insights from his long career in cybersecurity, emphasizing the importance of addressing fundamental security issues and the human aspect of security. We delved into the challenges of managing shadow IT, the complexities…
…
continue reading
1
How Math Is Used to Manipulate You - Dr. Norman Fenton & Dr. Martin Neil - DS Pod #295
2:37:46
2:37:46
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
2:37:46
Dr. Norman Fenton and Dr. Martin Neil are mathematicians from Queen Mary University of London who are experts in the unreasonable power of mathematics. For example - it is possible to produce an algorithm that will predict the likelihood that a piece of hardware or software will fail - and then to use that information to predict the stability of mu…
…
continue reading
1
Halloween, TikTok, Telcos, Win 11, Five Eyes, AWS, France, ChatGPT, and more... - SWN #426
36:50
36:50
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
36:50
Halloween, TikTok Rip Off, Telcos, Win 11, Five Eyes, AWS, France, ChatGPT, and more on the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-426
…
continue reading
David's joined by AHDB colleagues Zoe Kingham and Izzy Shohet to take a granular look at the cost of production for both beef and lamb. Together, they cover efficiency and how our Farmbench tool can help, as well as discussing ways in which the markets could pan out. And David drops the C-bomb, not once, but at least three times! Useful links for f…
…
continue reading
1
Protecting Identity of AI Agents & Standardizing Identity Security for SaaS Apps - Shiven Ramji, Arnab Bose - ASW #305
30:42
30:42
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
30:42
Generative AI has been the talk of the technology industry for the past 18+ months. Companies are seeing its value, so generative AI budgets are growing. With more and more AI agents expected in the coming years, it’s essential that we are securing how consumers interact with generative AI agents and how developers build AI agents into their apps. …
…
continue reading
1
The CISO Mindset, Top Strategies, and Mandating Office Presence Without Purpose - David Bradbury, Erin Baudo Felter - BSW #370
1:03:37
1:03:37
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
1:03:37
In the leadership and communications segment, The CISO Mindset: A Strategic Guide for Aspiring CEOs and The Board Members, The Top Strategy to Earn More Respect at Work: A Leadership Expert’s Proven Method, The Problem with Mandating Office Presence Without Purpose, and more! Identity continues to be one of the most used attack vectors by cybercrim…
…
continue reading
1
Making TLS More Secure, Lessons from IPv6, LLMs Finding Vulns - ASW #305
53:04
53:04
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
53:04
Better TLS implementations with Rust, fuzzing, and managing certs, appsec lessons from the everlasting transition to IPv6, LLMs for finding vulns (and whether fuzzing is better), and more! Also check out this presentation from BSides Knoxville that we talked about briefly, https://youtu.be/DLn7Noex_fc?feature=shared Show Notes: https://securityweek…
…
continue reading
1
Making TLS More Secure, Lessons from IPv6, LLMs Finding Vulns - Arnab Bose, Shiven Ramji - ASW #305
1:22:48
1:22:48
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
1:22:48
Better TLS implementations with Rust, fuzzing, and managing certs, appsec lessons from the everlasting transition to IPv6, LLMs for finding vulns (and whether fuzzing is better), and more! Also check out this presentation from BSides Knoxville that we talked about briefly, https://youtu.be/DLn7Noex_fc?feature=shared Generative AI has been the talk …
…
continue reading
1
Making TLS More Secure, Lessons from IPv6, LLMs Finding Vulns - Arnab Bose, Shiven Ramji - ASW #305
1:22:48
1:22:48
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
1:22:48
Better TLS implementations with Rust, fuzzing, and managing certs, appsec lessons from the everlasting transition to IPv6, LLMs for finding vulns (and whether fuzzing is better), and more! Also check out this presentation from BSides Knoxville that we talked about briefly, https://youtu.be/DLn7Noex_fc?feature=shared Generative AI has been the talk …
…
continue reading
1
Ep 21 - Creating Extraordinary Experiences with Chris Nordyke, Floodlight Consulting Group
1:14:51
1:14:51
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
1:14:51
Summary: In this episode of the Building and Branding Podcast, Amanda Stichter speaks with Chris Nordyke of Floodlight Consulting Group about his journey from the insurance industry to restoration. They discuss the importance of self-leadership, balancing family and work, and the critical role of customer service in the restoration industry. Chris …
…
continue reading
1
Entropic Gravity + Atomic Interconnectome - Dr. Andreas Schlatter - DS Pod #294
2:08:44
2:08:44
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
2:08:44
Dr. Andreas Schlatter is a classically trained physicist (EPFL, Princeton) with a decidedly heretical approach to physics. Though deeply mathematical in his approach, he dispenses with the purely field-based approach to understanding the building blocks of nature, and asks far deeper question about what the mathematics is telling us about the hidde…
…
continue reading
1
Tourists, Fortis, apps, TLP, AWS, Google, Chatbots, Aaran Leyland, and More... - SWN #425
35:07
35:07
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
35:07
Tourist Abuse, Fortis, apps, TLP, AWS, Google, Chatbots, Aaran Leyland, and More, on this edition of the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-425
…
continue reading
1
Transforming the Defender's Dilemma into the Defender's Advantage - Charlotte Wylie, Bhawna Singh, Lenny Zeltser - ESW #381
1:50:15
1:50:15
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
1:50:15
Ever heard someone say, "the attacker only has to be right once, but the defender has to get it right every time"? On this episode, we'll dispel that myth. There is some truth to the saying, but only with regards to initial access to the target's environment. Once on the inside, the attacker's advantage flips to the defender. Call it the 'Home Alon…
…
continue reading
1
Muirchertach Ua Briain with Anthony Candon
55:48
55:48
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
55:48
This week we chat to Anthony Candon about one of the greatest men in Irish history — Muirchertach Ua Briain (c.1050–1119), king of Munster, arguably king of all Ireland, and great-grandson of Brian Bóru. Tony tells us all about Muirchertach's reputation as a great military leader, his influence on the Irish Church, his international status outside …
…
continue reading
1
The Silent Disaster Behind the 2008 Crash - Jeff Snider, Eurodollar University, DSPod #293
1:05:27
1:05:27
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
1:05:27
Today we're back for round 2 of 3 with Jeff Snider from Eurodollar University. This round we're digging into the hidden meaning of the 2008 financial crisis, focusing on the often-overlooked Eurodollar system. Jeff Snider is an economic outsider who has subtle but unique perspectives on mainstream economics, modern monetary theory (MMT), and the ro…
…
continue reading
1
Secure By Default - How do we get there? - Andy Syrewicze - PSW #848
3:06:32
3:06:32
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
3:06:32
Andy drops some Microsoft Windows and 365 knowledge as we discuss the details on how we get to secure by default in our Windows and cloud environments. This week: The USB Army Knife that won't break the budget, I don't want to say EDR is useless (but there I said it), Paul's list of excellent hacking tips, FortiJump - an RCE that took a while to be…
…
continue reading
AHDB's Head of Economics, Sarah Baker, joins David to explore the influence of geopolitics on our farming markets to help levy payers understand and mitigate their impact. Among the areas of concern up for discussion are Ukraine, the China-EU dispute, and the latest on fuel costs. And would the character of B.A. Baracus from the A-Team make a good …
…
continue reading
1
JSON Parsing, Email Parsing, CISA's Bad Practices Guide, Abusing Disclosure Policies - ASW #304
38:34
38:34
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
38:34
Flaws that arise from inconsistent parsing of JSON and email addresses, CISA's guide to bad software practices, abusing a security disclosure process to take over a WordPress plugin, and more! Show Notes: https://securityweekly.com/asw-304
…
continue reading
1
Doom Brain, E2EE, OT, Adload, Cisco, VMware, internet archive, Josh Marpet ... - SWN #424
29:57
29:57
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
29:57
Doom on a Human Brain, E2EE, OT, Adload, Cisco, VMware, Internet Archive, Josh Marpet, and more on the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-424
…
continue reading
1
The Complexities, Configurations, and Challenges in Cloud Security - Scott Piper - ASW #304
38:53
38:53
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
38:53
Building cloud native apps doesn't mean you're immune to dealing with legacy systems. Cloud services have changed significantly over the last decade, both in the security controls available to them and the sheer volume of services that CSPs provide. Scott Piper shares some history of cloud security, the benefits of account separation, and how ratch…
…
continue reading
1
Aligning Tech Execs on Cyber Resilience - Theresa Lanowitz - BSW #369
1:01:21
1:01:21
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
1:01:21
Getting C-Suite execs aligned on cyber resilience and cybersecurity can be a challenge. LevelBlue's recent Futures™️ report sought to uncover the barriers that prevent companies from achieving cyber resilience in the enterprise today. The report not only surveyed C-Suite execs (CIOs, CTOs, and CISOs), but non-C-Suite leaders from engineering and ar…
…
continue reading
1
The Complexities, Configurations, and Challenges in Cloud Security - Scott Piper - ASW #304
1:17:25
1:17:25
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
1:17:25
Building cloud native apps doesn't mean you're immune to dealing with legacy systems. Cloud services have changed significantly over the last decade, both in the security controls available to them and the sheer volume of services that CSPs provide. Scott Piper shares some history of cloud security, the benefits of account separation, and how ratch…
…
continue reading
1
The Complexities, Configurations, and Challenges in Cloud Security - Scott Piper - ASW #304
1:17:25
1:17:25
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
1:17:25
Building cloud native apps doesn't mean you're immune to dealing with legacy systems. Cloud services have changed significantly over the last decade, both in the security controls available to them and the sheer volume of services that CSPs provide. Scott Piper shares some history of cloud security, the benefits of account separation, and how ratch…
…
continue reading
1
Global Banking’s Secret Weapon - Jeff Snider, Eurodollar University, DSPod #292
58:43
58:43
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
58:43
Today we are introduced to the world of Eurodollars and their critical role in shaping the global financial system. Our guide is Jeff Snider, of Eurodollar University - a street smart scholar and former investment manager. We begin by dispelling myths about the evolution of money from the gold standard to ledger-based systems, and discover how Euro…
…
continue reading
1
Stealing, Kubernetes, Passkeys, SolarWinds, Intel, Sextortion, and... - SWN #423
33:22
33:22
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
33:22
Stealing Pencils, Kubernetes, Passkeys, SolarWinds, Intel, North Koreans, Sextortion, and More, on this edition of the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-423
…
continue reading