المحتوى المقدم من Better Informed Network. يتم تحميل جميع محتويات البودكاست بما في ذلك الحلقات والرسومات وأوصاف البودكاست وتقديمها مباشرة بواسطة Better Informed Network أو شريك منصة البودكاست الخاص بهم. إذا كنت تعتقد أن شخصًا ما يستخدم عملك المحمي بحقوق الطبع والنشر دون إذنك، فيمكنك اتباع العملية الموضحة هنا https://ar.player.fm/legal.
Player FM - تطبيق بودكاست انتقل إلى وضع عدم الاتصال باستخدام تطبيق Player FM !
The truth is out West! We’re hopping on the ET Highway and venturing to the most notorious alien hot spots, including Roswell’s infamous crash site, Area 51’s eerie perimeter, and a mysterious desert watchtower. Join us as journalist Laura Krantz, host of the podcast Wild Thing , beams up to share stories from the front lines of UFO reporting—from strange sightings and quirky festivals to a mailbox where people leave letters to extraterrestrials. Maybe you’ll even decide for yourself: Is Earth a tourist stop for spaceships? UFO hot spots you’ll encounter in this episode: - UFO Watchtower (near Great Sand Dunes National Park, Colorado) - Roswell, New Mexico - Area 51, Nevada - Extraterrestrial Highway (aka State Route 375), Nevada - Little A’Le’Inn, ET Highway, Nevada - E.T. Fresh Jerky, ET Highway, Nevada - Alien Research Center, ET Highway, Nevada - The Black Mailbox, ET Highway, Nevada Via Podcast is a production of AAA Mountain West Group .…
المحتوى المقدم من Better Informed Network. يتم تحميل جميع محتويات البودكاست بما في ذلك الحلقات والرسومات وأوصاف البودكاست وتقديمها مباشرة بواسطة Better Informed Network أو شريك منصة البودكاست الخاص بهم. إذا كنت تعتقد أن شخصًا ما يستخدم عملك المحمي بحقوق الطبع والنشر دون إذنك، فيمكنك اتباع العملية الموضحة هنا https://ar.player.fm/legal.
Casual yet insightful conversations on the latest in cybersecurity and weekly updates on vulnerabilities and solutions.
المحتوى المقدم من Better Informed Network. يتم تحميل جميع محتويات البودكاست بما في ذلك الحلقات والرسومات وأوصاف البودكاست وتقديمها مباشرة بواسطة Better Informed Network أو شريك منصة البودكاست الخاص بهم. إذا كنت تعتقد أن شخصًا ما يستخدم عملك المحمي بحقوق الطبع والنشر دون إذنك، فيمكنك اتباع العملية الموضحة هنا https://ar.player.fm/legal.
Casual yet insightful conversations on the latest in cybersecurity and weekly updates on vulnerabilities and solutions.
This episode outlines three core principles: manufacturers taking ownership of customer security outcomes, embracing radical transparency and accountability, and establishing strong leadership commitment to security. The episode provides detailed recommendations for manufacturers to integrate security throughout the software development lifecycle (SDLC), focusing on practices like eliminating default passwords, mandating multi-factor authentication, and utilizing secure coding techniques.…
This episode highlights six key risk categories—cyber expertise, executive commitment, ICT supply chain risk management, single-source suppliers, supplier disruption, and supplier visibility— impacting IT and communications SMBs. The episode provides use cases illustrating these risks and offers practical mitigation strategies, referencing various government and industry resources. The episode is to empower SMBs to proactively address these vulnerabilities and enhance their cybersecurity posture.…
This episode offers a guide to securing software supply chains, focusing on recommended practices for developers, suppliers, and customers. with detailed best practices for developers, emphasizing secure coding, build environment hardening, third-party component verification, and vulnerability response. The episode stresses the importance of secure development lifecycle (SDLC) processes, threat modeling, and artifact creation for auditing and verification. We discuss relevant frameworks like NIST SP 800-218 (SSDF) and SLSA, providing a crosswalk between its recommendations and these standards.…
The episode focuses on the Enterprise Software Framework (ESF) , a collaborative group tackling cybersecurity threats to US national security systems. The ESF unites public and private sector experts to address shared challenges. A key area of focus is mitigating software vulnerabilities, referencing the NIST SP 800-218 Secure Software Development Framework (SSDF) as a recommended approach. We also discuss the SLSA framework and various threat mitigation strategies.…
مرحبًا بك في مشغل أف ام!
يقوم برنامج مشغل أف أم بمسح الويب للحصول على بودكاست عالية الجودة لتستمتع بها الآن. إنه أفضل تطبيق بودكاست ويعمل على أجهزة اندرويد والأيفون والويب. قم بالتسجيل لمزامنة الاشتراكات عبر الأجهزة.