Making It is a weekly audio podcast that comes out every Friday hosted by Jimmy Diresta, Bob Clagett and David Picciuto. Three different makers with different backgrounds talking about creativity, design and making things with your bare hands.
…
continue reading
Player FM - Internet Radio Done Right
Checked 12M ago
เพิ่มแล้วเมื่อ fiveปีที่ผ่านมา
เนื้อหาจัดทำโดย Joe Colantonio เนื้อหาพอดแคสต์ทั้งหมด รวมถึงตอน กราฟิก และคำอธิบายพอดแคสต์ได้รับการอัปโหลดและจัดหาให้โดยตรงจาก Joe Colantonio หรือพันธมิตรแพลตฟอร์มพอดแคสต์ของพวกเขา หากคุณเชื่อว่ามีบุคคลอื่นใช้งานที่มีลิขสิทธิ์ของคุณโดยไม่ได้รับอนุญาต คุณสามารถปฏิบัติตามขั้นตอนที่แสดงไว้ที่นี่ https://th.player.fm/legal
Player FM - แอป Podcast
ออฟไลน์ด้วยแอป Player FM !
ออฟไลน์ด้วยแอป Player FM !
พอดคาสต์ที่ควรค่าแก่การฟัง
สปอนเซอร์
C
Curated Questions: Conversations Celebrating the Power of Questions!
![Curated Questions: Conversations Celebrating the Power of Questions! podcast artwork](https://cdn.player.fm/images/55643642/series/AYrVRyvMkRPcJ4cC/32.jpg 32w, https://cdn.player.fm/images/55643642/series/AYrVRyvMkRPcJ4cC/64.jpg 64w, https://cdn.player.fm/images/55643642/series/AYrVRyvMkRPcJ4cC/128.jpg 128w, https://cdn.player.fm/images/55643642/series/AYrVRyvMkRPcJ4cC/256.jpg 256w, https://cdn.player.fm/images/55643642/series/AYrVRyvMkRPcJ4cC/512.jpg 512w)
![Curated Questions: Conversations Celebrating the Power of Questions! podcast artwork](/static/images/64pixel.png)
This episode dives into the significant political question posed by Ronald Reagan during the closing moments of his 1980 presidential debate with Jimmy Carter: 'Are you better off than you were four years ago?' Ken Woodward explores the context of the 1980 political climate, marked by economic difficulties, high inflation, unemployment, and international issues such as the Iran hostage crisis and concerns about U.S. global standing and nuclear threats. Reagan's question, which became iconic in U.S. political discourse, was noted for its simplicity, personal relevance, emotional resonance, and strategic timing. The question invited voters to reflect on their circumstances rather than abstract policies, ultimately contributing to Reagan's landslide victory. The episode details six crucial lessons for crafting influential questions, emphasizing audience perspective, engagement, simplicity, timing, self-reflection, and a call to action. Listeners are encouraged to consider how such questions have shaped their decisions and to apply these insights in personal and professional contexts. This Curated Questions episode can be found on all major platforms and at CuratedQuestions.com . Keep questioning! Episode Notes [01:58] Setting the Stage: The 1980 Presidential Debate [04:24] Reagan's Memorable Question [06:01] Impact and Aftermath of the Debate [06:45] Analyzing the Rhetorical Question [13:06] Lessons from Reagan's Question [16:05] Modern Applications and Reflections [18:04] Conclusion and Call to Action Resources Mentioned Ronald Reagan Jimmy Carter Beauty Pill Producer Ben Ford Questions Asked Are you better off now than you were four years ago? Is it easier for you to go and buy things in the stores than it was four years ago? Is there more or less unemployment in the country than there was four years ago? Is America as respected throughout the world as it was? Do you feel that our security is as safe, that we're as strong as we were four years ago? Where do you feel it in your body? What emotions come to the surface? What pictures race through your mind? Would it kill you to stop chewing your food with your mouth open? What is your number seven? What comes to mind? Did you feel the knee-jerk need to answer right away when your politician asked? Did you actually do the homework to determine what factors were most important to you, then look at data vice depending on emotion? Is it any easier to see why someone in a different circumstance may answer differently than you? How did the question affect your answer when the opposing politician asked it? Did you use the same metric for the candidates or give your preferred candidate extra leeway? What famous questions continue to pop up in your world?…
TestGuild Security Testing Podcast
ทำเครื่องหมายทั้งหมดว่า (ยังไม่ได้)เล่น…
Manage series 2630150
เนื้อหาจัดทำโดย Joe Colantonio เนื้อหาพอดแคสต์ทั้งหมด รวมถึงตอน กราฟิก และคำอธิบายพอดแคสต์ได้รับการอัปโหลดและจัดหาให้โดยตรงจาก Joe Colantonio หรือพันธมิตรแพลตฟอร์มพอดแคสต์ของพวกเขา หากคุณเชื่อว่ามีบุคคลอื่นใช้งานที่มีลิขสิทธิ์ของคุณโดยไม่ได้รับอนุญาต คุณสามารถปฏิบัติตามขั้นตอนที่แสดงไว้ที่นี่ https://th.player.fm/legal
…
continue reading
51 ตอน
ทำเครื่องหมายทั้งหมดว่า (ยังไม่ได้)เล่น…
Manage series 2630150
เนื้อหาจัดทำโดย Joe Colantonio เนื้อหาพอดแคสต์ทั้งหมด รวมถึงตอน กราฟิก และคำอธิบายพอดแคสต์ได้รับการอัปโหลดและจัดหาให้โดยตรงจาก Joe Colantonio หรือพันธมิตรแพลตฟอร์มพอดแคสต์ของพวกเขา หากคุณเชื่อว่ามีบุคคลอื่นใช้งานที่มีลิขสิทธิ์ของคุณโดยไม่ได้รับอนุญาต คุณสามารถปฏิบัติตามขั้นตอนที่แสดงไว้ที่นี่ https://th.player.fm/legal
…
continue reading
51 ตอน
ทุกตอน
×Did you know that the Department of Defense (DOD) is mandating that suppliers have Cybersecurity Maturity Model Certification (CMMC) to a prescribed level? In this episode , Frank Smith, Manager of Security and Consulting Practice at Ntiva, shares all you need to know about CMMC. Discover what CMMC is, why you should care, the requirements needed for certification, who needs to be certified, and more. Listen up!…
I today’s episode, I’m going to be sharing a session that Mike Spanbauer, Security Evangelist for Juniper, gave at the last Secure Guild online conference on Developing a Security Test Methodology. Discover the four pieces that make up his approach and some essential tips in implementing your own. Listen up!…
Does your team struggle with prioritizing your security open-source findings? In this episode , James Rabon, Director of Product Management at Micro Focus, will share an approach that can help. Discover how James’ team co-developed “susceptibility analysis,” which allows developers and application security engineers determine whether a publicly-disclosed vulnerability has been invoked in their code. It also reveals whether attacker-controlled input reaches that function. Listen now!…
Cybersecurity concepts are fundamental pieces of knowledge necessary for a career in security testing. In this episode, Joe Abraham, author of numerous Pluralsight courses, will share some insights into many security aspects. Listen in to learn about security onion, threat intelligence, cyber threat hunting tips and more.…
Are you struggling to find information on how to use Sysmon for your security efforts? In this episode , Carlos Perez, a Research Team lead at TrustedSec, shares all about the TrustedSec Sysmon Community Guide. Discover why Carlos created this guide and how it helps empower defenders with the information they need to leverage this great tool. Also, listen in to hear about Carlos’s extensive knowledge gained in working to detect attackers.…
Aaron Rosenmund, a cybersecurity researcher at Pluralsight, shares a wealth of knowledge around security testing in this episode . Discover blue team tools to protect, detect, and respond against targeted threat actor techniques in an enterprise environment. Listen in to also learn security frameworks to help you with your threat hunting efforts…
How can you prevent attacks if you don't know your enemy? In this episode , Malek Mohammad, author of the Pluralsight course: Web Application Penetration Testing: Information Gathering , discusses how to know how your enemies target you. Discover fingerprinting web applications, enumerating applications, understanding their entry points, and tooling needed. Listen up!…
Happy New Year! We will be away for a few weeks but will be back with more security testing awesomeness in 2021. Also, don't forget to register for AutomationGuild .
Need to secure your AWS environments? In this episode , Jonathan Helmus, author of the new book AWS Penetration Testing, will share some tips on AWS penetration testing and security best practices. Discover some of the commonly exploited vulnerabilities in AWS and how to prevent them. Listen in to learn more about cloud penetration testing tips, and tricks. Thanks so much for listening! If you like this episode, please subscribe to "The TestGuild Security" podcast and rate and review wherever you get podcasts. Join the Guild for even more security testing awesomeness: https://testguild.com/newsletter/…
Are you using Infection Monkey? In this episode, Pluralsight author and security expert Maril Vernon will share some insights from her Infection Monkey course. Discover uses of Infection Monkey to test for later movement and network segments against known MITRE tactics. Listen up to learn how this amazing tool can identify your company’s vulnerable network paths and how to protect yourself proactively.…
Prepare to learn all about the OWASP Top 10 Web Application Security Risks—Broken Authentication. This is the second monthly episode in which security expert Prasad Salvi will join us to break down each OWASP risk one by one. Today we’ll discuss the second security risk listed—broken authentication. Discover what a broken authentication risk is, the different ways this attack can occur, and how to prevent it. Listen up, and join us next month as we cover the next security risk, sensitive data exposure.…
How do you integrate API security testing into the development process? In this episode, Oli Moradov, VP of Dev and Strategic Alliances at NeuraLegio, shares ways that you can achieve API security testing automation directly into your DevOps or CI/CD pipelines. Discover how you can test every build without causing development drag. Listen up!…
Has COVID-19 impacted your security testing efforts? In this episode , security expert Adhiran Thirmal shares his thoughts on security testing, Covid-19, OWASP, and more. Listen up and find out more about changes to OWASP for 2020 and beyond and how you can help.
Are you familiar with the OWASP Top 10 Web Application Security Risks? This is the first monthly episode where security expert Prasad Salvi joins us to break down each risk one by one. Today we talk all about the first security risk listed -- injection flaws. Discover what an injection flaw is, different ways this attack can occur, and how to prevent it. Listen up and join us next month as we cover the next security risk, broken authentication.…
Peer-to-peer (P2P) communications technology built into millions of security cameras and other consumer electronics. In this episode , Paul Marrapese, a security researcher, shares his story of how supply chain vulnerabilities in modern IP cameras, baby monitors, and even alarm systems are putting millions at risk for eavesdropping and remote compromise. Listen in to find out ways to avoid these exploits!…
ขอต้อนรับสู่ Player FM!
Player FM กำลังหาเว็บ