The document provides tips for how to do a weekly podcast, including that you need an idea, people, equipment, software, a regular schedule, and an understanding spouse. It recommends starting with a basic setup like a USB headset and Skype for recording until growing your equipment. Key equipment includes a USB/Firewire audio interface, microphone, and optionally a mixer. Choosing quality brand microphones, interfaces, and mixers is important. Maintaining a regular schedule is also essential for building an audience.
The Internet Of Insecure Things: 10 Most Wanted List - Derbycon 2014Security Weekly
The Internet of Things (IoT) aims to makes our lives better, yet there is still no foundation for security controls on the devices that allow us to access the Internet, listen to music, watch television, control the temperature in our homes and more. This talk will look at the history of embedded device insecurity. We’ll explore some real-world example of how devices are exploited (and attackers profited). You will also learn what we can do to help fix these problems and push the industry for a much higher level of security for devices affecting our daily lives.
Robots, Ninjas, Pirates and Building an Effective Vulnerability Management Pr...Security Weekly
A robot, a ninja and a pirate get into a fight. The question is: who wins? While we can debate this question until the end of time, likely have fun in the process; it’s a waste of time. Who are the robots, ninjas and pirates in your environment? What roles do they play in the vulnerability management process? We debate how to build a vulnerability management program all the time, however we are still spinning our wheels. Unlike the robot, ninja, pirate battle, there are concrete facts that will help you build a successful program, and avoid smoke bombs, swords, and robot death rays. Who wins? Find out in this presentation and learn how to protect your booty.
The Internet of Insecure Things: 10 Most Wanted ListSecurity Weekly
In this talk I will quickly bring you up to speed on the history of embedded device insecurity. Next, we will look at a real-world example or two of how devices are exploited (And attackers profited). Finally, you will learn what we can do to help fix these problems and push the industry for a much higher level of security for devices affecting our daily lives.
You may have heard about this threat, one that has plagued our lives and networks for well over a decade. A problem so ubiquitous, it can't be ignored. Yet, this threat has a history of hiding in plain sight. Users are, for the most part, unaware of the dangers. Security researchers and the media have attempted to highlight this problem for years, without making an impact on improving security. However, vendors and users are still very much at risk and the problem is still largely being ignored by the masses. The Internet of Things (IoT) aims to makes our lives better, yet there is still no foundation for security controls on the devices that allow us to access the Internet, listen to music, watch television, control the temperature in our homes and more. The goal of this talk is to enable the audience to help raise awareness and influence the security of embedded systems in a positive way.
Presentation on "Managing the Repertoire: Stories, Metaphors, Prototypes, and Concept Coherence in Product Innovation"
Author Name:Seidel, V. P. & Mahony, S.
Year of Publishing: 2014
Journal Name: Organization Science
The Internet Of Insecure Things: 10 Most Wanted List - Derbycon 2014Security Weekly
The Internet of Things (IoT) aims to makes our lives better, yet there is still no foundation for security controls on the devices that allow us to access the Internet, listen to music, watch television, control the temperature in our homes and more. This talk will look at the history of embedded device insecurity. We’ll explore some real-world example of how devices are exploited (and attackers profited). You will also learn what we can do to help fix these problems and push the industry for a much higher level of security for devices affecting our daily lives.
Robots, Ninjas, Pirates and Building an Effective Vulnerability Management Pr...Security Weekly
A robot, a ninja and a pirate get into a fight. The question is: who wins? While we can debate this question until the end of time, likely have fun in the process; it’s a waste of time. Who are the robots, ninjas and pirates in your environment? What roles do they play in the vulnerability management process? We debate how to build a vulnerability management program all the time, however we are still spinning our wheels. Unlike the robot, ninja, pirate battle, there are concrete facts that will help you build a successful program, and avoid smoke bombs, swords, and robot death rays. Who wins? Find out in this presentation and learn how to protect your booty.
The Internet of Insecure Things: 10 Most Wanted ListSecurity Weekly
In this talk I will quickly bring you up to speed on the history of embedded device insecurity. Next, we will look at a real-world example or two of how devices are exploited (And attackers profited). Finally, you will learn what we can do to help fix these problems and push the industry for a much higher level of security for devices affecting our daily lives.
You may have heard about this threat, one that has plagued our lives and networks for well over a decade. A problem so ubiquitous, it can't be ignored. Yet, this threat has a history of hiding in plain sight. Users are, for the most part, unaware of the dangers. Security researchers and the media have attempted to highlight this problem for years, without making an impact on improving security. However, vendors and users are still very much at risk and the problem is still largely being ignored by the masses. The Internet of Things (IoT) aims to makes our lives better, yet there is still no foundation for security controls on the devices that allow us to access the Internet, listen to music, watch television, control the temperature in our homes and more. The goal of this talk is to enable the audience to help raise awareness and influence the security of embedded systems in a positive way.
Presentation on "Managing the Repertoire: Stories, Metaphors, Prototypes, and Concept Coherence in Product Innovation"
Author Name:Seidel, V. P. & Mahony, S.
Year of Publishing: 2014
Journal Name: Organization Science
Getting Started with B2B Podcasting: A not-too-techy guide for first-time pod...Radix Communications
In this tech-light Slideshare you'll have the chance to find out what you need to get a podcast started for your business. From web hosting to recording, editing to uploading.
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
Search and Society: Reimagining Information Access for Radical FuturesBhaskar Mitra
The field of Information retrieval (IR) is currently undergoing a transformative shift, at least partly due to the emerging applications of generative AI to information access. In this talk, we will deliberate on the sociotechnical implications of generative AI for information access. We will argue that there is both a critical necessity and an exciting opportunity for the IR community to re-center our research agendas on societal needs while dismantling the artificial separation between the work on fairness, accountability, transparency, and ethics in IR and the rest of IR research. Instead of adopting a reactionary strategy of trying to mitigate potential social harms from emerging technologies, the community should aim to proactively set the research agenda for the kinds of systems we should build inspired by diverse explicitly stated sociotechnical imaginaries. The sociotechnical imaginaries that underpin the design and development of information access technologies needs to be explicitly articulated, and we need to develop theories of change in context of these diverse perspectives. Our guiding future imaginaries must be informed by other academic fields, such as democratic theory and critical theory, and should be co-developed with social science scholars, legal scholars, civil rights and social justice activists, and artists, among others.
PHP Frameworks: I want to break free (IPC Berlin 2024)Ralf Eggert
In this presentation, we examine the challenges and limitations of relying too heavily on PHP frameworks in web development. We discuss the history of PHP and its frameworks to understand how this dependence has evolved. The focus will be on providing concrete tips and strategies to reduce reliance on these frameworks, based on real-world examples and practical considerations. The goal is to equip developers with the skills and knowledge to create more flexible and future-proof web applications. We'll explore the importance of maintaining autonomy in a rapidly changing tech landscape and how to make informed decisions in PHP development.
This talk is aimed at encouraging a more independent approach to using PHP frameworks, moving towards a more flexible and future-proof approach to PHP development.
Accelerate your Kubernetes clusters with Varnish CachingThijs Feryn
A presentation about the usage and availability of Varnish on Kubernetes. This talk explores the capabilities of Varnish caching and shows how to use the Varnish Helm chart to deploy it to Kubernetes.
This presentation was delivered at K8SUG Singapore. See https://feryn.eu/presentations/accelerate-your-kubernetes-clusters-with-varnish-caching-k8sug-singapore-28-2024 for more details.
Key Trends Shaping the Future of Infrastructure.pdfCheryl Hung
Keynote at DIGIT West Expo, Glasgow on 29 May 2024.
Cheryl Hung, ochery.com
Sr Director, Infrastructure Ecosystem, Arm.
The key trends across hardware, cloud and open-source; exploring how these areas are likely to mature and develop over the short and long-term, and then considering how organisations can position themselves to adapt and thrive.
"Impact of front-end architecture on development cost", Viktor TurskyiFwdays
I have heard many times that architecture is not important for the front-end. Also, many times I have seen how developers implement features on the front-end just following the standard rules for a framework and think that this is enough to successfully launch the project, and then the project fails. How to prevent this and what approach to choose? I have launched dozens of complex projects and during the talk we will analyze which approaches have worked for me and which have not.
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualityInflectra
In this insightful webinar, Inflectra explores how artificial intelligence (AI) is transforming software development and testing. Discover how AI-powered tools are revolutionizing every stage of the software development lifecycle (SDLC), from design and prototyping to testing, deployment, and monitoring.
Learn about:
• The Future of Testing: How AI is shifting testing towards verification, analysis, and higher-level skills, while reducing repetitive tasks.
• Test Automation: How AI-powered test case generation, optimization, and self-healing tests are making testing more efficient and effective.
• Visual Testing: Explore the emerging capabilities of AI in visual testing and how it's set to revolutionize UI verification.
• Inflectra's AI Solutions: See demonstrations of Inflectra's cutting-edge AI tools like the ChatGPT plugin and Azure Open AI platform, designed to streamline your testing process.
Whether you're a developer, tester, or QA professional, this webinar will give you valuable insights into how AI is shaping the future of software delivery.
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Tobias Schneck
As AI technology is pushing into IT I was wondering myself, as an “infrastructure container kubernetes guy”, how get this fancy AI technology get managed from an infrastructure operational view? Is it possible to apply our lovely cloud native principals as well? What benefit’s both technologies could bring to each other?
Let me take this questions and provide you a short journey through existing deployment models and use cases for AI software. On practical examples, we discuss what cloud/on-premise strategy we may need for applying it to our own infrastructure to get it to work from an enterprise perspective. I want to give an overview about infrastructure requirements and technologies, what could be beneficial or limiting your AI use cases in an enterprise environment. An interactive Demo will give you some insides, what approaches I got already working for real.
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
How To Do A Podcast - Bsides RI 2013
1. How To Do A Weekly Podcast (or Three)
Paul Asadoorian
Founder of Security Weekly
http://securityweekly.com Copyright 2013
!
http://securityweekly.com
2. http://securityweekly.com Copyright 2013
Why This Talk
People ask me all the time “How do you manage to produce all
those podcasts?”
Many podcasts have come and gone (“podfade”) and we don’t like
that
Encourage you to create your own podcasts
3. Here’s What You Need
An idea
People
Equipment
Software
A schedule
An understanding spouse
A web site Podcast Cake Helps Too...
http://securityweekly.com Copyright 2013
4. Here are some nice to haves
http://securityweekly.com Copyright 2013
Sponsors
Slogans
Logos
Custom Music
Guidelines for content
5. Ideas
Have better ones than us...
http://securityweekly.com Copyright 2013
6. http://securityweekly.com Copyright 2013
Ideas
It should be about *something*
Long format, short format, talk show, how-to, interviews, round
table
You gotta pick one at first, and run with it
Will you broadcast live? Have video?
7. More on Ideas: Have A Place
A place to record is important
Depends on what ideas you’ve come up with
It needs to be quiet
I built a studio in my basement, and a man cave for
my cigar podcast
Probably your desk is okay for you...
Make sure you have
power...
http://securityweekly.com Copyright 2013
10. http://securityweekly.com Copyright 2013
People
You can do it by yourself if you want...
People may grow tired of hearing just you
Its tough to bounce ideas off yourself
There is no one but you to motive yourself to record
You will have to do everything from planning, recording and post-production
(i.e. its a lot of freakin’ work)
11. Get together at cons
Podcast outside when possible
http://securityweekly.com Copyright 2013
I gave up on trying not to use
“podcast” as a verb
Podcasting at cons is hard.
12. People on Security Weekly
Hosts:
Paul Asadoorian
Larry Pesce
Jack Daniel
John Strand
Carlos Perez
Allison Nixon
Interns:
Patrick Laverty
Rob
Kornmeyer
Greg Hetrick
Dale Luke
Joe Barcia
Mike Perez (Executive Producer)
Steve Reikburg (Audio Engineer)
Steve Ryan (Live Audio/Video)
Bob (Evil Persona)
Byte Bucket (Mail List/IRC)
http://securityweekly.com Copyright 2013
13. Equipment
Golden Rule: You get what you pay for!
http://securityweekly.com Copyright 2013
14. http://securityweekly.com Copyright 2013
Equipment
Some history
Basic Setups
Advanced Setup
Studio Setup
Peavey PV10 10-Channel Recording Mixer
Its a workhorse! $250
15. This was Episode 1 (October 2005)
Beer
Laptop Mic
1 ear
bud
http://securityweekly.com Copyright 2013
16. Then We Grew...
2006 2007
http://securityweekly.com Copyright 2013
17. Got a little better
Live Stream
http://securityweekly.com Copyright 2013
2008
Beer
Soundboar
Recording
(Single Track)
Heil
PR40
20. Security Weekly Today
HDMI Cameras Skype Main
Recording Google+
Skype Ustream
Music Preamp
http://securityweekly.com Copyright 2013
AV Mic
Live Video
Display Power
Conditioner
Headphone Amp
Firewire Recorder
TV Switcher
DAC
Backup
Recorder
22. The USB Headset
In short, they all suck
Most sound like you are in a tin can
It is difficult to properly adjust the volume (you are either too close
or too far away)
After about an hour they stop working (have to dis-connect then re-connect)
http://securityweekly.com Copyright 2013
24. Skype + Software Recording
Its great in a pinch and works really well
Hard to have a backup recorder
If you computer or software crashes, start over
Little flexibility (no knobs to adjust, though software plugins do
exist)
Harder to separate out tracks
http://securityweekly.com Copyright 2013
25. Recording at Both Ends
If there are just two people on the show both can record
Then you send the audio to the person editing
Three+ people gets a little more tricky to sync
Has the best audio quality with just two people
You still need quality Mics and Preamps to sound good
http://securityweekly.com Copyright 2013
26. TIP: Stay Away From These Brands
http://securityweekly.com Copyright 2013
Behringer
Alesis
Tascam
27. Tip: Rather Go With These Brands
http://securityweekly.com Copyright 2013
M-Audio
Presonous
Focusrite
Zoom
28. The Basic Package
A USB or Firewire Recording Interface
A Microphone
http://securityweekly.com Copyright 2013
29. USB or Firewire Interfaces
Takes in analog audio and outputs it to Firewire or USB
Typically Two XLR and/or 1/4” connections
Both are $150, USB, two inputs, two outputs
http://securityweekly.com Copyright 2013
30. Tip: Line Level vs. Mic Level
LINE MIC
http://securityweekly.com Copyright 2013
31. Choosing a Microphone
I will get right to it, the best Microphone for podcasting is a headset
It may seem expensive at first, but it comes with headphones, a
pop filter, cables and you don’t need a stand
http://securityweekly.com Copyright 2013
32. http://securityweekly.com Copyright 2013
Shure PG48
Comes with Mic, mic stand clip, cable
and case for $40
http://www.amazon.com/Shure-PG48-XLR-Cardioid-Dynamic-
Microphone/dp/B0000AQRSR/
33. http://securityweekly.com Copyright 2013
Heil PR40
Best quality mic for podcasting,
around $300
If you have an ear for it, you can tell
the difference between this and
Shure PG48, but mp3 is pretty low
quality anyhow
34. Audio-Technica BPHS1 - The Good
You can turn your head while talking and still be on
mic
You can type, click your mouse, put your beer down
without making background noise
It travels easy (no mic stand or mounting adapters)
You ensure your guests are talking into the mic
Comes with 3 pop filters, reversible mic boom
Its comfortable to wear for hours
It sounds more than acceptable for a podcast
http://securityweekly.com Copyright 2013
35. Audio-Technica BPHS1 - The Bad
It costs $199, and RARELY goes on sale or can be found cheaper
Sometimes the headphone cables tend to have a loose connection
(tape FTW)
Its not comfy for everyone (Esp. for people who wear glasses)
People will move the mic away from their mouths
http://securityweekly.com Copyright 2013
36. More Microphones
Lapel mics are okay, but they are expensive
Stick with cardiod mics, not condenser
Condenser mics pick up background noise (keyboards, mics, laptops
all generate noise)
http://securityweekly.com Copyright 2013
37. Mics with Pop Filters - Not For Video
http://securityweekly.com Copyright 2013
38. http://securityweekly.com Copyright 2013
Mixers
Analog mixers are okay, we use one for a travel rig (Peavy)
Some mixers have a USB output for multi-track recording
They are often cheap and sound horrible
39. Allen and Heath
Nice small mixer ($250)
http://
www.musiciansfriend.com/pro-audio/
http://securityweekly.com Copyright 2013
allen-heath-zed-10-10-
channel-usb-mixer
40. IN <- Out
1/4” <-> 1/8”
Line Level
http://securityweekly.com Copyright 2013
Mixer Setup
Tape Out (RCA) -> Dual 1/4”
In <- Out
RCA <- 1/8”
Out -> IN
1/4” <-> 1/8”
Mix Minus Skype
Music
Backup Recording (Audacity)
Headphone Amp
Tape Out -> IN
RCA -> 1/8”
1/4” <-> 1/4”
41. http://securityweekly.com Copyright 2013
Mixer Setup
Dual 1/4” <- 1/4”
ST1
Mix Minus
Skype
Headphone Amp
1/4” <-> 1/4”
Stereo
AUX -> Input
USB
1/4” <-> 1/4” Stereo
42. http://securityweekly.com Copyright 2013
Cost
ART HeadAmp4 Headphone Amplifier ($65)
Allen and Heath Z10 ($300)
Audio-Technica BPHS1 ($200 x 3)
Zoom ZH4N Handy Portable Digital Recorder ($270)
Cables ($50)
Total (no laptops/computers) = $1285.00
43. Compressor/Limiter/Gate
These are nice to have and can be found pretty cheap
But remember, cheap = crap when it comes to audio gear
I have a couple, they are difficult to tune and configure
Easy to plug into any setup
Put them inline between mics and devices
Use the channel inserts (loops audio through external device)
http://securityweekly.com Copyright 2013
44. Telephone Bridge
JK Audio Podcast Host ($400)
Essentially makes your telephone
am mic
I found it introduces noise
Multiple people require a conference
bridge
They are noisy too
http://securityweekly.com Copyright 2013
45. Software
Warning: Mostly experienced with OS X software
http://securityweekly.com Copyright 2013
46. http://securityweekly.com Copyright 2013
Software
Ustream Producer Pro - Live streaming
Audacity - Backup recording and post-production
iTunes - Play music and sound clips during the show
Feeder - Create, edit and manage RSS feeds
Marsedit - Edit blog posts
Garage Band - Live multi-track recording
47. If I had to do it all over again setup
USB
OUT
http://securityweekly.com Copyright 2013
Skype 1
Skype 2
Google+ Ustream Music
Apple Logic Pro
x5
OUT IN OUT IN OUT IN OUT OUT IN
49. Regular Schedule = Important
I’ve had 0 success trying to do a podcast on an irregular schedule
People are busy
Its to difficult to keep track
All my podcasts are recorded same time every week
Avoids confusion
http://securityweekly.com Copyright 2013
51. Regular Time Slot = Difficult
My Thursday nights have been 95% consumed by podcasts
I don’t know what is on TV on Thursday nights
NFL sucks for having games on Thursday nights (don’t they know
we podcast?)
Holidays, birthdays, baby births, anniversary all must be
rescheduled (j/k)
http://securityweekly.com Copyright 2013
52. A Web Site
And also methods of distribution
http://securityweekly.com Copyright 2013
53. http://securityweekly.com Copyright 2013
Your Web Site
A podcast and a blog go hand in hand
You can make posts to announce your show, post your show notes,
and post your audio/video into
We also use a Wiki for all our show notes
54. Other Web Sites
We use several different web sites and providers:
Libsyn
Blip.TV
YouTube
Ustream
http://securityweekly.com Copyright 2013
56. http://securityweekly.com Copyright 2013
Sponsors
“How Do I Get Sponsors?”
For podcasts, its tough, we don’t track who listens
Have to develop other methods of defining who listens and how
many people listen
First question sponsors will ask: “Who is your audience”
We do webcasts and have a newsletter mailing list (Mailchimp
rules)
57. http://securityweekly.com Copyright 2013
Slogan?
We came up with “Hack Naked”
Now we are stuck with it
Our listeners threaten revolt if we talk about changing it
Choose a slogan wisely
58. http://securityweekly.com Copyright 2013
Logo?
Having a logo at some point makes sense
For the cigar podcast Stogie Geeks I used a
site called logobid.com
The logo was designed for free by a friend
59. http://securityweekly.com Copyright 2013
Custom Music
I’ve used podcast themes and bought the rights to our theme songs
The dude is super nice, tell them we sent you
You can find royalty free music online
You can run clips of copyrighted music in short segments
If you use copyrighted music and post to YouTube, you will be
flagged
60. Content Guidlines
We aim for a “PG-13” rating
We often fall far short of that
You are not regulated by the FCC, so take advantage of that and at
least curse every once and a while
Set rules too (e.g. no politics or religion discussions is a rule we
have on our shows)
Unless your podcast will be about politics and religion...
http://securityweekly.com Copyright 2013
61. More Information
http://securityweekly.com
!
http://hacknaked.tv
!
http://stogiegeeks.com
!
http://www.tenable.com/podcast
!
Contact me: paul@securityweekly.com
http://securityweekly.com Copyright 2013