Mostrando títulos en Educación
-
-
Vulnerability Response and Remediation (Part 2) (Domain 4)
- Duración: 10 m
- Grabación Original
-
General
-
Narración:
-
Historia
Not all vulnerabilities can be patched right away, and in these cases, compensating controls, segmentation, and exceptions become essential components of a realistic remediation strategy. In this episode, we discuss how organizations can use host firewalls, access control lists, and network isolation to contain vulnerable systems while planning for a longer-term fix. We also explore how to formally document and justify exceptions when remediation is deferred—something often required for compliance audits. These exceptions should include timelines, risk assessments, and mitigating measures to...
-
Vulnerability Response and Remediation (Part 2) (Domain 4)
- 06-15-25
- Duración: 10 m
No se pudo agregar al carrito
Solo puedes tener X títulos en el carrito para realizar el pago.Add to Cart failed.
Por favor prueba de nuevo más tardeError al Agregar a Lista de Deseos.
Por favor prueba de nuevo más tardeError al eliminar de la lista de deseos.
Por favor prueba de nuevo más tardeError al añadir a tu biblioteca
Por favor intenta de nuevoError al seguir el podcast
Intenta nuevamenteError al dejar de seguir el podcast
Intenta nuevamente -
-
-
System and Process Auditing (Domain 4)
- Duración: 10 m
- Grabación Original
-
General
-
Narración:
-
Historia
Auditing is how security teams verify that controls are working, policies are being followed, and no one is operating outside expected behavior—and in this episode, we explore both system and process auditing in depth. System audits focus on configurations, permissions, and change logs—ensuring that operating systems, devices, and applications remain in a secure, known state. Process audits, on the other hand, examine whether organizational practices—like onboarding, patching, or incident response—are aligned with documented procedures and regulatory requirements. We explain how to ...
-
System and Process Auditing (Domain 4)
- 06-15-25
- Duración: 10 m
No se pudo agregar al carrito
Solo puedes tener X títulos en el carrito para realizar el pago.Add to Cart failed.
Por favor prueba de nuevo más tardeError al Agregar a Lista de Deseos.
Por favor prueba de nuevo más tardeError al eliminar de la lista de deseos.
Por favor prueba de nuevo más tardeError al añadir a tu biblioteca
Por favor intenta de nuevoError al seguir el podcast
Intenta nuevamenteError al dejar de seguir el podcast
Intenta nuevamente -
-
-
Architecture Security Considerations (Part 3) (Domain 3)
- Duración: 8 m
- Grabación Original
-
General
-
Narración:
-
Historia
In this final installment on architectural considerations, we focus on risk transference, ease of recovery, and the practical realities of patch availability and compute resources. Risk transference involves shifting some security or operational responsibilities to third parties—such as cloud providers, insurers, or managed service vendors—through contracts or service-level agreements (SLAs). While this can offload liability, it must be done with clear understanding of what remains within your control and what doesn’t. Ease of recovery is equally essential, involving strategies like ...
-
Architecture Security Considerations (Part 3) (Domain 3)
- 06-15-25
- Duración: 8 m
No se pudo agregar al carrito
Solo puedes tener X títulos en el carrito para realizar el pago.Add to Cart failed.
Por favor prueba de nuevo más tardeError al Agregar a Lista de Deseos.
Por favor prueba de nuevo más tardeError al eliminar de la lista de deseos.
Por favor prueba de nuevo más tardeError al añadir a tu biblioteca
Por favor intenta de nuevoError al seguir el podcast
Intenta nuevamenteError al dejar de seguir el podcast
Intenta nuevamente -
-
-
High Availability Architectures (Domain 3)
- Duración: 7 m
- Grabación Original
-
General
-
Narración:
-
Historia
Availability is one of the core tenets of cybersecurity, and in mission-critical environments, downtime is simply not an option. In this episode, we focus on high availability (HA) architectures—design strategies that ensure systems remain operational even when components fail. We examine techniques like clustering, load balancing, redundancy, failover mechanisms, and geographic dispersion, all of which contribute to resilience and uptime. We explain the difference between active-active and active-passive configurations, how to plan for single points of failure, and why HA should be part of ...
-
High Availability Architectures (Domain 3)
- 06-15-25
- Duración: 7 m
No se pudo agregar al carrito
Solo puedes tener X títulos en el carrito para realizar el pago.Add to Cart failed.
Por favor prueba de nuevo más tardeError al Agregar a Lista de Deseos.
Por favor prueba de nuevo más tardeError al eliminar de la lista de deseos.
Por favor prueba de nuevo más tardeError al añadir a tu biblioteca
Por favor intenta de nuevoError al seguir el podcast
Intenta nuevamenteError al dejar de seguir el podcast
Intenta nuevamente -
-
-
Considerations for Security Automation (Part 1) (Domain 4)
- Duración: 11 m
- Grabación Original
-
General
-
Narración:
-
Historia
As powerful as automation is, it’s not without challenges—and in this episode, we dive into the complexity and cost considerations that come with security automation projects. Poorly scoped automation can introduce more problems than it solves, especially when it relies on fragile scripts, inconsistent APIs, or tools that don’t integrate cleanly. We explore how hidden costs—such as testing time, support, licensing, and training—can derail budgets and delay ROI if not planned from the start. Complexity grows quickly as automation touches more systems, requiring orchestration tools, ...
-
Considerations for Security Automation (Part 1) (Domain 4)
- 06-16-25
- Duración: 11 m
No se pudo agregar al carrito
Solo puedes tener X títulos en el carrito para realizar el pago.Add to Cart failed.
Por favor prueba de nuevo más tardeError al Agregar a Lista de Deseos.
Por favor prueba de nuevo más tardeError al eliminar de la lista de deseos.
Por favor prueba de nuevo más tardeError al añadir a tu biblioteca
Por favor intenta de nuevoError al seguir el podcast
Intenta nuevamenteError al dejar de seguir el podcast
Intenta nuevamente -
-
-
Infrastructure Security Foundations (Domain 3)
- Duración: 7 m
- Grabación Original
-
General
-
Narración:
-
Historia
Securing infrastructure starts with design decisions about where and how devices are placed, how data flows, and where trust boundaries begin and end. In this episode, we focus on device placement and network zoning, exploring how separating front-end, back-end, and management traffic can prevent attackers from using one compromised segment to access others. Concepts like jump servers, demilitarized zones (DMZs), and out-of-band management networks help isolate critical systems and limit exposure. We also discuss attack surface reduction by minimizing the number of internet-facing devices and ...
-
Infrastructure Security Foundations (Domain 3)
- 06-15-25
- Duración: 7 m
No se pudo agregar al carrito
Solo puedes tener X títulos en el carrito para realizar el pago.Add to Cart failed.
Por favor prueba de nuevo más tardeError al Agregar a Lista de Deseos.
Por favor prueba de nuevo más tardeError al eliminar de la lista de deseos.
Por favor prueba de nuevo más tardeError al añadir a tu biblioteca
Por favor intenta de nuevoError al seguir el podcast
Intenta nuevamenteError al dejar de seguir el podcast
Intenta nuevamente -
-
-
Secure Protocol Implementation (Domain 4)
- Duración: 11 m
- Grabación Original
-
General
-
Narración:
-
Historia
Not all protocols are created equal—and using the wrong one can open a serious security hole in your environment. In this episode, we examine the implementation of secure communication protocols like TLS, SSH, and IPSec, which provide confidentiality and integrity for data in transit. We explain how these protocols differ from insecure alternatives like Telnet, HTTP, and FTP, and why default configurations often need to be hardened to ensure true protection. Topics include cipher suite selection, certificate management, forward secrecy, and secure key exchange—all of which play a role in ...
-
Secure Protocol Implementation (Domain 4)
- 06-16-25
- Duración: 11 m
No se pudo agregar al carrito
Solo puedes tener X títulos en el carrito para realizar el pago.Add to Cart failed.
Por favor prueba de nuevo más tardeError al Agregar a Lista de Deseos.
Por favor prueba de nuevo más tardeError al eliminar de la lista de deseos.
Por favor prueba de nuevo más tardeError al añadir a tu biblioteca
Por favor intenta de nuevoError al seguir el podcast
Intenta nuevamenteError al dejar de seguir el podcast
Intenta nuevamente -
-
-
Spiegelhonger: waarom gezien worden zo veel meer is dan overbodige luxe
- Duración: 19 m
- Grabación Original
-
General
-
Narración:
-
Historia
Spiegelhonger is het verlangen om weerspiegeld te worden in de blik van een ander. Om iemand te ontmoeten die niet alleen naar je kijkt, maar je echt ziet. In je strijd, je verdriet, je kracht, je imperfectie. Je hele zijn. Zónder oordeel. Zónder oplossingen. Maar met oprechte aanwezigheid.Heb jij onderwerpen die je graag behandeld wil zien? Laat het me weten! Wil jij meer weten over hoe je kunt begeleiden bij verlies? Schrijf je in voor mijn gratis webinar. Je kunt kiezen uit volwassenen begeleiden bij verlies, of kinderen en jongeren begeleiden bij verlies. Kijk ook op de website van...
No se pudo agregar al carrito
Solo puedes tener X títulos en el carrito para realizar el pago.Add to Cart failed.
Por favor prueba de nuevo más tardeError al Agregar a Lista de Deseos.
Por favor prueba de nuevo más tardeError al eliminar de la lista de deseos.
Por favor prueba de nuevo más tardeError al añadir a tu biblioteca
Por favor intenta de nuevoError al seguir el podcast
Intenta nuevamenteError al dejar de seguir el podcast
Intenta nuevamente -
-
-
Asset Monitoring and Tracking (Domain 4)
- Duración: 9 m
- Grabación Original
-
General
-
Narración:
-
Historia
Security begins with visibility, and that means knowing what devices, systems, and software exist within your environment at all times. In this episode, we dive into asset monitoring and tracking, emphasizing the importance of real-time discovery tools, agent-based scanning, and centralized asset inventories that support security monitoring, patch management, and incident response. We also explore challenges like shadow IT—unauthorized systems that operate outside governance—and how to close visibility gaps in hybrid and cloud environments. Automated inventory systems help detect new ...
-
Asset Monitoring and Tracking (Domain 4)
- 06-15-25
- Duración: 9 m
No se pudo agregar al carrito
Solo puedes tener X títulos en el carrito para realizar el pago.Add to Cart failed.
Por favor prueba de nuevo más tardeError al Agregar a Lista de Deseos.
Por favor prueba de nuevo más tardeError al eliminar de la lista de deseos.
Por favor prueba de nuevo más tardeError al añadir a tu biblioteca
Por favor intenta de nuevoError al seguir el podcast
Intenta nuevamenteError al dejar de seguir el podcast
Intenta nuevamente -
-
-
Acquisition and Procurement Security (Domain 4)
- Duración: 9 m
- Grabación Original
-
General
-
Narración:
-
Historia
Security doesn’t start when a system is installed—it begins during the procurement process. In this episode, we examine how secure acquisition strategies reduce long-term risk by vetting vendors, establishing supply chain transparency, and embedding cybersecurity requirements in contracts and service-level agreements (SLAs). We discuss how organizations should assess the security posture of suppliers, request evidence of internal controls or compliance certifications, and evaluate whether vendors follow secure development and patching practices. For hardware, this includes checking ...
-
Acquisition and Procurement Security (Domain 4)
- 06-15-25
- Duración: 9 m
No se pudo agregar al carrito
Solo puedes tener X títulos en el carrito para realizar el pago.Add to Cart failed.
Por favor prueba de nuevo más tardeError al Agregar a Lista de Deseos.
Por favor prueba de nuevo más tardeError al eliminar de la lista de deseos.
Por favor prueba de nuevo más tardeError al añadir a tu biblioteca
Por favor intenta de nuevoError al seguir el podcast
Intenta nuevamenteError al dejar de seguir el podcast
Intenta nuevamente -
-
-
Risk Management Strategies (Domain 5)
- Duración: 10 m
- Grabación Original
-
General
-
Narración:
-
Historia
Once risks are identified and analyzed, organizations must decide how to respond—and in this episode, we examine the five primary risk management strategies: mitigate, transfer, accept, avoid, and exempt. Mitigation involves applying controls to reduce risk impact or likelihood, such as enabling MFA or installing endpoint protection. Transferring risk often involves insurance or outsourcing functions to vendors with specialized capabilities and contractual safeguards. Acceptance applies when the cost of mitigation outweighs the threat, provided the risk is well understood and formally ...
-
Risk Management Strategies (Domain 5)
- 06-16-25
- Duración: 10 m
No se pudo agregar al carrito
Solo puedes tener X títulos en el carrito para realizar el pago.Add to Cart failed.
Por favor prueba de nuevo más tardeError al Agregar a Lista de Deseos.
Por favor prueba de nuevo más tardeError al eliminar de la lista de deseos.
Por favor prueba de nuevo más tardeError al añadir a tu biblioteca
Por favor intenta de nuevoError al seguir el podcast
Intenta nuevamenteError al dejar de seguir el podcast
Intenta nuevamente -
-
-
Comprehensive Testing for Resilience (Domain 3)
- Duración: 9 m
- Grabación Original
-
General
-
Narración:
-
Historia
Preparation is only as good as its ability to withstand the unexpected, and resilience testing is how you find out whether your systems, processes, and people are truly ready. In this episode, we explore the value of comprehensive testing methods such as tabletop exercises, simulated failovers, load tests, and real-world attack scenarios. Tabletop exercises walk teams through incident response steps in a controlled environment, helping validate decision-making, communications, and escalation procedures. Simulated failovers test high availability systems and backup infrastructure to ensure ...
-
Comprehensive Testing for Resilience (Domain 3)
- 06-15-25
- Duración: 9 m
No se pudo agregar al carrito
Solo puedes tener X títulos en el carrito para realizar el pago.Add to Cart failed.
Por favor prueba de nuevo más tardeError al Agregar a Lista de Deseos.
Por favor prueba de nuevo más tardeError al eliminar de la lista de deseos.
Por favor prueba de nuevo más tardeError al añadir a tu biblioteca
Por favor intenta de nuevoError al seguir el podcast
Intenta nuevamenteError al dejar de seguir el podcast
Intenta nuevamente -
-
-
Benefits of Security Automation (Part 2) (Domain 4)
- Duración: 10 m
- Grabación Original
-
General
-
Narración:
-
Historia
Building on the first part of our automation series, this episode explores how security automation improves scalability, incident reaction time, and team productivity. We examine real-world examples where automated alerts trigger isolation of infected systems, revoke compromised credentials, or update firewall rules within seconds—long before a human analyst could intervene. Automation enables systems to scale securely by enforcing templates, access policies, and configuration baselines across hundreds or thousands of assets, even in fast-moving cloud environments. We also touch on workforce...
-
Benefits of Security Automation (Part 2) (Domain 4)
- 06-16-25
- Duración: 10 m
No se pudo agregar al carrito
Solo puedes tener X títulos en el carrito para realizar el pago.Add to Cart failed.
Por favor prueba de nuevo más tardeError al Agregar a Lista de Deseos.
Por favor prueba de nuevo más tardeError al eliminar de la lista de deseos.
Por favor prueba de nuevo más tardeError al añadir a tu biblioteca
Por favor intenta de nuevoError al seguir el podcast
Intenta nuevamenteError al dejar de seguir el podcast
Intenta nuevamente -
-
-
Hybrid and Remote Work Security Awareness (Domain 5)
- Duración: 10 m
- Grabación Original
-
General
-
Narración:
-
Historia
Remote and hybrid work models create new layers of security complexity—blending corporate environments with home networks, personal devices, and cloud-first workflows. In this episode, we explore the core topics of remote work security awareness, starting with safe home Wi-Fi configurations, strong authentication, and VPN use for secure connections. We then discuss endpoint hardening for laptops and mobile devices, including encryption, screen locking, and secure backup practices. Hybrid workers also need guidance on physical security—like preventing shoulder surfing in public places or ...
-
Hybrid and Remote Work Security Awareness (Domain 5)
- 06-16-25
- Duración: 10 m
No se pudo agregar al carrito
Solo puedes tener X títulos en el carrito para realizar el pago.Add to Cart failed.
Por favor prueba de nuevo más tardeError al Agregar a Lista de Deseos.
Por favor prueba de nuevo más tardeError al eliminar de la lista de deseos.
Por favor prueba de nuevo más tardeError al añadir a tu biblioteca
Por favor intenta de nuevoError al seguir el podcast
Intenta nuevamenteError al dejar de seguir el podcast
Intenta nuevamente -
-
-
Monitoring Computing Resources (Domain 4)
- Duración: 10 m
- Grabación Original
-
General
-
Narración:
-
Historia
Monitoring is the heartbeat of any modern security operation, providing real-time visibility into systems, applications, and infrastructure. In this episode, we explore how organizations monitor computing resources for both performance and security, using tools like agents, collectors, log forwarders, and telemetry APIs. We discuss the difference between host-based and network-based monitoring, and how to build a centralized view through Security Information and Event Management (SIEM) platforms. The focus is on both proactive and reactive monitoring—identifying anomalies before they become ...
-
Monitoring Computing Resources (Domain 4)
- 06-16-25
- Duración: 10 m
No se pudo agregar al carrito
Solo puedes tener X títulos en el carrito para realizar el pago.Add to Cart failed.
Por favor prueba de nuevo más tardeError al Agregar a Lista de Deseos.
Por favor prueba de nuevo más tardeError al eliminar de la lista de deseos.
Por favor prueba de nuevo más tardeError al añadir a tu biblioteca
Por favor intenta de nuevoError al seguir el podcast
Intenta nuevamenteError al dejar de seguir el podcast
Intenta nuevamente -
-
-
Data Types and Their Protection (Domain 3)
- Duración: 8 m
- Grabación Original
-
General
-
Narración:
-
Historia
Data is not monolithic—its classification and context determine how it should be secured. In this episode, we explore different types of data, including regulated data like personal health information (PHI), payment card information (PCI), and personal identifiable information (PII), as well as trade secrets, intellectual property, and public-facing information. Each type has different legal, operational, and reputational implications if exposed or altered, and thus requires tailored protection strategies. We examine how data classification schemes—ranging from "public" and "internal" to "...
-
Data Types and Their Protection (Domain 3)
- 06-15-25
- Duración: 8 m
No se pudo agregar al carrito
Solo puedes tener X títulos en el carrito para realizar el pago.Add to Cart failed.
Por favor prueba de nuevo más tardeError al Agregar a Lista de Deseos.
Por favor prueba de nuevo más tardeError al eliminar de la lista de deseos.
Por favor prueba de nuevo más tardeError al añadir a tu biblioteca
Por favor intenta de nuevoError al seguir el podcast
Intenta nuevamenteError al dejar de seguir el podcast
Intenta nuevamente -
-
-
Vendor Risk and Supply Chain Considerations (Domain 5)
- Duración: 10 m
- Grabación Original
-
General
-
Narración:
-
Historia
A growing portion of cybersecurity risk now comes from outside the organization—specifically, through third-party vendors, suppliers, and service providers. In this episode, we examine how to assess and manage vendor risk across the full lifecycle, starting with due diligence during procurement and continuing through onboarding, monitoring, and offboarding. We explore how to evaluate vendors based on their security policies, compliance certifications, breach history, and contract terms—especially service-level agreements (SLAs) and right-to-audit clauses. Supply chain security goes beyond ...
-
Vendor Risk and Supply Chain Considerations (Domain 5)
- 06-16-25
- Duración: 10 m
No se pudo agregar al carrito
Solo puedes tener X títulos en el carrito para realizar el pago.Add to Cart failed.
Por favor prueba de nuevo más tardeError al Agregar a Lista de Deseos.
Por favor prueba de nuevo más tardeError al eliminar de la lista de deseos.
Por favor prueba de nuevo más tardeError al añadir a tu biblioteca
Por favor intenta de nuevoError al seguir el podcast
Intenta nuevamenteError al dejar de seguir el podcast
Intenta nuevamente -
-
-
Application Security Essentials (Domain 4)
- Duración: 10 m
- Grabación Original
-
General
-
Narración:
-
Historia
Applications are often the most exposed layer of an organization’s attack surface, and defending them requires both proactive development practices and reactive protection mechanisms. In this episode, we review essential application security concepts including input validation, secure cookie handling, and session management to prevent injection attacks, cross-site scripting (XSS), and session hijacking. We also examine the importance of static code analysis during development, code signing to verify integrity, and the use of secure development lifecycle (SDLC) frameworks to build security ...
-
Application Security Essentials (Domain 4)
- 06-15-25
- Duración: 10 m
No se pudo agregar al carrito
Solo puedes tener X títulos en el carrito para realizar el pago.Add to Cart failed.
Por favor prueba de nuevo más tardeError al Agregar a Lista de Deseos.
Por favor prueba de nuevo más tardeError al eliminar de la lista de deseos.
Por favor prueba de nuevo más tardeError al añadir a tu biblioteca
Por favor intenta de nuevoError al seguir el podcast
Intenta nuevamenteError al dejar de seguir el podcast
Intenta nuevamente -
-
-
On-Premises, Centralized, and Decentralized Architectures (Domain 3)
- Duración: 8 m
- Grabación Original
-
General
-
Narración:
-
Historia
Security must adapt to the architecture of the environment it protects, and that starts with understanding how infrastructure is organized. In this episode, we compare on-premises, centralized, and decentralized architectures, explaining the security implications of each. Centralized models offer streamlined control, simpler updates, and more consistent enforcement—but they also concentrate risk in a single point of failure. Decentralized architectures distribute resources and decision-making, improving resilience but making visibility, auditing, and access management more complex. On-prem ...
-
On-Premises, Centralized, and Decentralized Architectures (Domain 3)
- 06-15-25
- Duración: 8 m
No se pudo agregar al carrito
Solo puedes tener X títulos en el carrito para realizar el pago.Add to Cart failed.
Por favor prueba de nuevo más tardeError al Agregar a Lista de Deseos.
Por favor prueba de nuevo más tardeError al eliminar de la lista de deseos.
Por favor prueba de nuevo más tardeError al añadir a tu biblioteca
Por favor intenta de nuevoError al seguir el podcast
Intenta nuevamenteError al dejar de seguir el podcast
Intenta nuevamente -
-
-
Key Security Monitoring Activities (Part 1) (Domain 4)
- Duración: 11 m
- Grabación Original
-
General
-
Narración:
-
Historia
Monitoring is most valuable when it drives action, and in this episode, we explore foundational activities that turn data into defense—starting with log aggregation, alerting, and scanning. Log aggregation involves collecting logs from diverse systems—servers, firewalls, applications, cloud platforms—into a central platform for correlation and analysis. Alerting systems evaluate these logs in real time, flagging deviations from normal behavior based on thresholds, signatures, or heuristics. We also examine the importance of routine vulnerability scanning to proactively identify ...
-
Key Security Monitoring Activities (Part 1) (Domain 4)
- 06-16-25
- Duración: 11 m
No se pudo agregar al carrito
Solo puedes tener X títulos en el carrito para realizar el pago.Add to Cart failed.
Por favor prueba de nuevo más tardeError al Agregar a Lista de Deseos.
Por favor prueba de nuevo más tardeError al eliminar de la lista de deseos.
Por favor prueba de nuevo más tardeError al añadir a tu biblioteca
Por favor intenta de nuevoError al seguir el podcast
Intenta nuevamenteError al dejar de seguir el podcast
Intenta nuevamente -
-
The Let Them Theory
- A Life-Changing Tool That Millions of People Can’t Stop Talking About
- De: Mel Robbins
- Narrado por: Mel Robbins
- Duración: 10 h y 38 m
- Versión completa
-
General
-
Narración:
-
Historia
In her latest groundbreaking book, The Let Them Theory, Mel Robbins—New York Times bestselling author and one of the world's most respected experts on motivation, confidence, and mindset—teaches you how to stop wasting energy on what you can't control and start focusing on what truly matters: YOU. Your happiness. Your goals. Your life.
-
-
Let Her
- De Paula en 01-02-25
De: Mel Robbins
-
The Primal Hunter 12
- A LitRPG Adventure
- De: Zogarth
- Narrado por: Travis Baldree
- Duración: 20 h y 7 m
- Versión completa
-
General
-
Narración:
-
Historia
The Nevermore Leaderboards competition has gathered more attention than perhaps in any era prior, with gods getting both directly and indirectly involved to see who will eventually come out on top. Jake, who has so far been performing above all expectations, enters his final Challenge Dungeon before it’s time to meet up with his party once more. Together, they’ll make a final push to try and climb as many floors as possible before time is up and, hopefully, in the end, find their names atop the Nevermore Leaderboards.
-
-
Boring
- De Farryll en 06-16-25
De: Zogarth
-
Great Big Beautiful Life
- De: Emily Henry
- Narrado por: Julia Whelan
- Duración: 12 h y 2 m
- Versión completa
-
General
-
Narración:
-
Historia
Alice Scott is an eternal optimist still dreaming of her big writing break. Hayden Anderson is a Pulitzer-prize winning human thundercloud. And they’re both on balmy Little Crescent Island for the same reason: To write the biography of a woman no one has seen in years—or at least to meet with the octogenarian who claims to be the Margaret Ives. Tragic heiress, former tabloid princess, and daughter of one of the most storied (and scandalous) families of the 20th Century.
-
-
Just, wow.
- De julia lee en 04-25-25
De: Emily Henry
-
Atmosphere: A GMA Book Club Pick
- A Love Story
- De: Taylor Jenkins Reid
- Narrado por: Kristen DiMercurio, Julia Whelan, Taylor Jenkins Reid
- Duración: 9 h y 52 m
- Versión completa
-
General
-
Narración:
-
Historia
Fast-paced, thrilling, and emotional, Atmosphere is Taylor Jenkins Reid at her best: transporting listeners to iconic times and places, creating complex protagonists, and telling a passionate and soaring story about the transformative power of love—this time among the stars.
-
-
This has soared to the top of my all-time favs!
- De Kimberley en 06-03-25
-
The Let Them Theory
- A Life-Changing Tool That Millions of People Can’t Stop Talking About
- De: Mel Robbins
- Narrado por: Mel Robbins
- Duración: 10 h y 38 m
- Versión completa
-
General
-
Narración:
-
Historia
In her latest groundbreaking book, The Let Them Theory, Mel Robbins—New York Times bestselling author and one of the world's most respected experts on motivation, confidence, and mindset—teaches you how to stop wasting energy on what you can't control and start focusing on what truly matters: YOU. Your happiness. Your goals. Your life.
-
-
Let Her
- De Paula en 01-02-25
De: Mel Robbins
-
The Primal Hunter 12
- A LitRPG Adventure
- De: Zogarth
- Narrado por: Travis Baldree
- Duración: 20 h y 7 m
- Versión completa
-
General
-
Narración:
-
Historia
The Nevermore Leaderboards competition has gathered more attention than perhaps in any era prior, with gods getting both directly and indirectly involved to see who will eventually come out on top. Jake, who has so far been performing above all expectations, enters his final Challenge Dungeon before it’s time to meet up with his party once more. Together, they’ll make a final push to try and climb as many floors as possible before time is up and, hopefully, in the end, find their names atop the Nevermore Leaderboards.
-
-
Boring
- De Farryll en 06-16-25
De: Zogarth
-
Great Big Beautiful Life
- De: Emily Henry
- Narrado por: Julia Whelan
- Duración: 12 h y 2 m
- Versión completa
-
General
-
Narración:
-
Historia
Alice Scott is an eternal optimist still dreaming of her big writing break. Hayden Anderson is a Pulitzer-prize winning human thundercloud. And they’re both on balmy Little Crescent Island for the same reason: To write the biography of a woman no one has seen in years—or at least to meet with the octogenarian who claims to be the Margaret Ives. Tragic heiress, former tabloid princess, and daughter of one of the most storied (and scandalous) families of the 20th Century.
-
-
Just, wow.
- De julia lee en 04-25-25
De: Emily Henry
-
Atmosphere: A GMA Book Club Pick
- A Love Story
- De: Taylor Jenkins Reid
- Narrado por: Kristen DiMercurio, Julia Whelan, Taylor Jenkins Reid
- Duración: 9 h y 52 m
- Versión completa
-
General
-
Narración:
-
Historia
Fast-paced, thrilling, and emotional, Atmosphere is Taylor Jenkins Reid at her best: transporting listeners to iconic times and places, creating complex protagonists, and telling a passionate and soaring story about the transformative power of love—this time among the stars.
-
-
This has soared to the top of my all-time favs!
- De Kimberley en 06-03-25
-
Harry Potter and the Sorcerer's Stone, Book 1
- De: J.K. Rowling
- Narrado por: Jim Dale
- Duración: 8 h y 18 m
- Versión completa
-
General
-
Narración:
-
Historia
Harry Potter has never even heard of Hogwarts when the letters start dropping on the doormat at number four, Privet Drive. Addressed in green ink on yellowish parchment with a purple seal, they are swiftly confiscated by his grisly aunt and uncle. Then, on Harry's eleventh birthday, a great beetle-eyed giant of a man called Rubeus Hagrid bursts in with some astonishing news: Harry Potter is a wizard, and he has a place at Hogwarts School of Witchcraft and Wizardry. An incredible adventure is about to begin!
-
-
A great reading of the wrong book
- De P en 11-24-15
De: J.K. Rowling
-
The Tenant
- De: Freida McFadden
- Narrado por: Will Damron, Christine Lakin
- Duración: 8 h y 50 m
- Versión completa
-
General
-
Narración:
-
Historia
Blake Porter is riding high, until he's not. Fired abruptly from his job as a VP of marketing and unable to make the mortgage payments on the new brownstone he shares with his fiancée, he's desperate to make ends meet. Enter Whitney. Beautiful, charming, down-to-earth, and looking for a room to rent. She's exactly what Blake's looking for. Or is she? Because something isn't quite right. The neighbors start treating Blake differently. The smell of decay permeates his home, no matter how hard he scrubs. Strange noises jar him awake in the middle of the night.
-
-
the twist
- De Sheila en 05-09-25
De: Freida McFadden
-
My Friends
- A Novel
- De: Fredrik Backman
- Narrado por: Marin Ireland
- Duración: 13 h y 7 m
- Versión completa
-
General
-
Narración:
-
Historia
Most people don’t even notice them—three tiny figures sitting at the end of a long pier in the corner of one of the most famous paintings in the world. Most people think it’s just a depiction of the sea. But Louisa, an artist herself, knows otherwise and she is determined to find out the story of these three enigmatic figures. Twenty-five years earlier, in a distant town, a group of teenagers find refuge from their difficult home lives by spending their days laughing and telling stories out on a pier.
-
-
How can he keep doing this? Another masterpiece!
- De Blue en 05-08-25
De: Fredrik Backman
-
The Waitress
- De: K. L. Slater
- Narrado por: Claudia Jessie
- Duración: 7 h y 56 m
- Grabación Original
-
General
-
Narración:
-
Historia
Alicia has left her young son behind with her sister to chase a better life in London. But she’s not just chasing opportunity. She’s escaping the truth. And no one in her new life needs to know what she’s running from. At The Orbit — a glittering high-rise where the city’s elite come to play — Alicia waits tables and watches everything. She knows just how to blend in, how to charm, how to make people see what she wants them to see.
-
-
Easy listen
- De Birderliz en 06-11-25
De: K. L. Slater
-
Broken Country
- De: Clare Leslie Hall
- Narrado por: Hattie Morahan
- Duración: 8 h y 57 m
- Versión completa
-
General
-
Narración:
-
Historia
Beth and her gentle, kind husband Frank are happily married, but their relationship relies on the past staying buried. But when Beth’s brother-in-law shoots a dog going after their sheep, Beth doesn’t realize that the gunshot will alter the course of their lives. For the dog belonged to none other than Gabriel Wolfe, the man Beth loved as a teenager—the man who broke her heart years ago. Gabriel has returned to the village with his young son Leo, a boy who reminds Beth very much of her own son, who died in a tragic accident.
-
-
Best book of the year
- De Carolyn en 03-27-25
-
Never Flinch
- A Novel
- De: Stephen King
- Narrado por: Jessie Mueller, Stephen King
- Duración: 14 h y 44 m
- Versión completa
-
General
-
Narración:
-
Historia
When the Buckeye City Police Department receives a disturbing letter from a person threatening to “kill thirteen innocents and one guilty” in “an act of atonement for the needless death of an innocent man,” Detective Izzy Jaynes has no idea what to think. Are fourteen citizens about to be slaughtered in an unhinged act of retribution? As the investigation unfolds, Izzy realizes that the letter writer is deadly serious, and she turns to her friend Holly Gibney for help.
-
-
THE VOICES
- De Candis Taylor en 05-30-25
De: Stephen King
-
Fourth Wing
- Empyrean, Book 1
- De: Rebecca Yarros
- Narrado por: Rebecca Soler, Teddy Hamilton
- Duración: 21 h y 22 m
- Versión completa
-
General
-
Narración:
-
Historia
Twenty-year-old Violet Sorrengail was supposed to enter the Scribe Quadrant, living a quiet life among books and history. Now, the commanding general—also known as her tough-as-talons mother—has ordered Violet to join the hundreds of candidates striving to become the elite of Navarre: dragon riders. But when you’re smaller than everyone else and your body is brittle, death is only a heartbeat away...because dragons don’t bond to “fragile” humans. They incinerate them.
-
-
Erotica with Dragons
- De Trev en 05-13-23
De: Rebecca Yarros
-
Sunrise on the Reaping
- A Hunger Games Novel
- De: Suzanne Collins
- Narrado por: Jefferson White
- Duración: 12 h y 48 m
- Versión completa
-
General
-
Narración:
-
Historia
As the day dawns on the fiftieth annual Hunger Games, fear grips the districts of Panem. This year, in honor of the Quarter Quell, twice as many tributes will be taken from their homes. Back in District 12, Haymitch Abernathy is trying not to think too hard about his chances. All he cares about is making it through the day and being with the girl he loves.
-
-
A Sad but Beautiful Tale
- De Anonymous User en 03-19-25
De: Suzanne Collins
-
Project Hail Mary
- De: Andy Weir
- Narrado por: Ray Porter
- Duración: 16 h y 10 m
- Versión completa
-
General
-
Narración:
-
Historia
Ryland Grace is the sole survivor on a desperate, last-chance mission - and if he fails, humanity and the Earth itself will perish. Except that right now, he doesn't know that. He can't even remember his own name, let alone the nature of his assignment or how to complete it. All he knows is that he's been asleep for a very, very long time. And he's just been awakened to find himself millions of miles from home, with nothing but two corpses for company.
-
-
Bazinga
- De Davidgonzalezsr en 05-04-21
De: Andy Weir
-
Nightshade
- De: Michael Connelly
- Narrado por: Will Damron
- Duración: 9 h y 3 m
- Versión completa
-
General
-
Narración:
-
Historia
Los Angeles County Sheriff’s Detective Stilwell has been "exiled" to a low-key post policing rustic Catalina Island, after department politics drove him off a homicide desk on the mainland. But while following up the usual drunk-and-disorderlies and petty thefts that come with his new territory, Detective Stilwell gets a report of a body found wrapped in plastic and weighed down at the bottom of the harbor. Crossing all lines of protocol and jurisdiction, he starts doggedly working the case.
-
-
A new Connelly detective…
- De SAM en 05-28-25
De: Michael Connelly
-
Death Row
- Alibis collection
- De: Freida McFadden
- Narrado por: Lauryn Allman
- Duración: 1 h y 44 m
- Versión completa
-
General
-
Narración:
-
Historia
Talia Kemper is on death row for murdering her husband. She had an alibi and no known motive, yet Talia’s unwavering protestations of innocence have always been ignored. Then one day in the visiting area, she sees a recognizable stranger she’s certain is her husband. It turns out the man she’s been convicted of killing may not be dead after all. But as the days tick away toward Talia’s execution, what will it take for her to be believed?
-
-
So good! I
- De Angela M en 06-17-25
De: Freida McFadden
-
What Could Go Wrong?
- De: Scott Z. Burns
- Narrado por: Scott Z. Burns
- Duración: 3 h y 40 m
- Grabación Original
-
General
-
Narración:
-
Historia
Predicting a global pandemic in a hit movie was impressive. Writing a sequel that will work for today’s world might take a whole different kind of intelligence. Join Scott Z. Burns, the acclaimed screenwriter of Contagion, as he embarks on a mind-bending quest to create a worthy follow-up to his eerily prophetic film. Reuniting with director Steven Soderbergh, members of the cast and crew, and the scientific experts who advised him on the first film, Burns also turns to an unexpected collaborator: artificial intelligence.
-
-
AI an Ethical Dilemma
- De porte8a2 en 06-11-25
De: Scott Z. Burns
-
Atomic Habits
- An Easy & Proven Way to Build Good Habits & Break Bad Ones
- De: James Clear
- Narrado por: James Clear
- Duración: 5 h y 35 m
- Versión completa
-
General
-
Narración:
-
Historia
No matter your goals, Atomic Habits offers a proven framework for improving - every day. James Clear, one of the world's leading experts on habit formation, reveals practical strategies that will teach you exactly how to form good habits, break bad ones, and master the tiny behaviors that lead to remarkable results. If you're having trouble changing your habits, the problem isn't you. The problem is your system. Bad habits repeat themselves again and again not because you don't want to change, but because you have the wrong system for change.
-
-
Author went overboard hawking his site
- De CHughes en 06-25-19
De: James Clear
-
Dungeon Crawler Carl
- A LitRPG/Gamelit Adventure
- De: Matt Dinniman
- Narrado por: Jeff Hays
- Duración: 13 h y 31 m
- Versión completa
-
General
-
Narración:
-
Historia
A man. His ex-girlfriend's cat. A sadistic game show unlike anything in the universe: a dungeon crawl where survival depends on killing your prey in the most entertaining way possible. In a flash, every human-erected construction on Earth - from Buckingham Palace to the tiniest of sheds - collapses in a heap, sinking into the ground. The buildings and all the people inside have all been atomized and transformed into the dungeon: an 18-level labyrinth filled with traps, monsters, and loot.
-
-
A refreshing take on apocalyptical LITRPG
- De Rhexas en 03-01-21
De: Matt Dinniman
-
Onyx Storm
- Empyrean, Book 3
- De: Rebecca Yarros
- Narrado por: Jasmin Walker, Justis Bolding, Teddy Hamilton, y otros
- Duración: 23 h y 52 m
- Versión completa
-
General
-
Narración:
-
Historia
After nearly eighteen months at Basgiath War College, Violet Sorrengail knows there’s no more time for lessons. No more time for uncertainty. Because the battle has truly begun, and with enemies closing in from outside their walls and within their ranks, it’s impossible to know who to trust. Now Violet must journey beyond the failing Aretian wards to seek allies from unfamiliar lands to stand with Navarre. The trip will test every bit of her wit, luck, and strength, but she will do anything to save what she loves—her dragons, her family, her home, and him.
-
-
I'm spoiled by graphic audio
- De CAtkins en 01-22-25
De: Rebecca Yarros
-
Harry Potter and the Chamber of Secrets, Book 2
- De: J.K. Rowling
- Narrado por: Jim Dale
- Duración: 9 h y 2 m
- Versión completa
-
General
-
Narración:
-
Historia
Harry Potter's summer has included the worst birthday ever, doomy warnings from a house-elf called Dobby, and rescue from the Dursleys by his friend Ron Weasley in a magical flying car! Back at Hogwarts School of Witchcraft and Wizardry for his second year, Harry hears strange whispers echo through empty corridors - and then the attacks start. Students are found as though turned to stone... Dobby's sinister predictions seem to be coming true.
-
-
Jim Dale is wonderful!
- De ladigolfer en 12-31-15
De: J.K. Rowling
-
Till Summer Do Us Part
- De: Meghan Quinn
- Narrado por: Erin Mallon, Teddy Hamilton, Stephen Dexter
- Duración: 11 h y 50 m
- Versión completa
-
General
-
Narración:
-
Historia
Scottie Price just started a new job and it's a real sausage fest. She's the only woman on a team filled with Brads and Chads. Expecting a bachelor pad atmosphere, she is quickly corrected when she finds out everyone is happily married. In an effort to impress her boss, Scottie mentions her nonexistent husband in a company meeting. But eagle-eyed Chad points out her lack of wedding ring.
-
-
Perfect summer read!
- De Kathy D. en 06-07-25
De: Meghan Quinn
-
The Wedding People
- A Novel
- De: Alison Espach
- Narrado por: Helen Laser
- Duración: 11 h y 37 m
- Versión completa
-
General
-
Narración:
-
Historia
It’s a beautiful day in Newport, Rhode Island, when Phoebe Stone arrives at the grand Cornwall Inn wearing a green dress and gold heels, not a bag in sight, alone. She's immediately mistaken by everyone in the lobby for one of the wedding people, but she’s actually the only guest at the Cornwall who isn’t here for the big event. Phoebe is here because she’s dreamed of coming for years—she hoped to shuck oysters and take sunset sails with her husband, only now she’s here without him, at rock bottom, and determined to have one last decadent splurge on herself.
-
-
What a beautiful book
- De Brooke Baker en 08-15-24
De: Alison Espach
-
Fourth Wing (Part 1 of 2) (Dramatized Adaptation)
- The Empyrean, Book 1
- De: Rebecca Yarros
- Narrado por: full cast, Scott McCormick, Troy Allan, y otros
- Duración: 7 h y 52 m
- Grabación Original
-
General
-
Narración:
-
Historia
Twenty-year-old Violet Sorrengail was supposed to enter the Scribe Quadrant, living a quiet life among books and history. Now, the commanding general—also known as her tough-as-talons mother—has ordered Violet to join the hundreds of candidates striving to become the elite of Navarre: dragon riders. But when you’re smaller than everyone else and your body is brittle, death is only a heartbeat away...because dragons don’t bond to “fragile” humans. They incinerate them. With fewer dragons willing to bond than cadets, most would kill Violet to better their own chances of success.
-
-
4 FIRST-YEAR ★’s
- De ➷➹➸❥HFB🔹🔹🔹 en 12-27-23
De: Rebecca Yarros
-
The Ballad of Songbirds and Snakes
- A Hunger Games Novel
- De: Suzanne Collins
- Narrado por: Santino Fontana
- Duración: 16 h y 16 m
- Versión completa
-
General
-
Narración:
-
Historia
It is the morning of the reaping that will kick off the 10th annual Hunger Games. In the Capitol, 18-year-old Coriolanus Snow is preparing for his one shot at glory as a mentor in the Games. The once-mighty house of Snow has fallen on hard times, its fate hanging on the slender chance that Coriolanus will be able to out charm, outwit, and outmaneuver his fellow students to mentor the winning tribute. The odds are against him. He’s been given the humiliating assignment of mentoring the female tribute from District 12, the lowest of the low.
-
-
Bad part
- De Edgars Dumins en 05-19-20
De: Suzanne Collins
-
Fourth Wing (Part 2 of 2) (Dramatized Adaptation)
- The Empyrean, Book 1
- De: Rebecca Yarros
- Narrado por: full cast, Robb Moreira, Megan Poppy, y otros
- Duración: 9 h y 22 m
- Grabación Original
-
General
-
Narración:
-
Historia
Twenty-year-old Violet Sorrengail was supposed to enter the Scribe Quadrant, living a quiet life among books and history. Now, the commanding general—also known as her tough-as-talons mother—has ordered Violet to join the hundreds of candidates striving to become the elite of Navarre: dragon riders. But when you’re smaller than everyone else and your body is brittle, death is only a heartbeat away...because dragons don’t bond to “fragile” humans. They incinerate them.
-
-
5 REDEMPTION-FOR-PART-1 ⭐️’s
- De ➷➹➸❥HFB🔹🔹🔹 en 03-02-24
De: Rebecca Yarros
-
Harry Potter and the Prisoner of Azkaban, Book 3
- De: J.K. Rowling
- Narrado por: Jim Dale
- Duración: 11 h y 49 m
- Versión completa
-
General
-
Narración:
-
Historia
When the Knight Bus crashes through the darkness and screeches to a halt in front of him, it's the start of another far from ordinary year at Hogwarts for Harry Potter. Sirius Black, escaped mass-murderer and follower of Lord Voldemort, is on the run - and they say he is coming after Harry. In his first ever Divination class, Professor Trelawney sees an omen of death in Harry's tea leaves... But perhaps most terrifying of all are the Dementors patrolling the school grounds, with their soul-sucking kiss...
-
-
Jim Dale at his best
- De rottndachs en 01-12-16
De: J.K. Rowling
-
Quicksilver
- The Fae & Alchemy Series, Book 1
- De: Callie Hart
- Narrado por: Stella Bloom, Anthony Palmini
- Duración: 20 h y 41 m
- Versión completa
-
General
-
Narración:
-
Historia
Twenty-four-year-old Saeris Fane is good at keeping secrets. No one knows about the strange powers she possesses or the fact that she has been picking pockets and stealing from the Undying Queen's reservoirs for as long as she can remember. But a secret is like a knot. Sooner or later, it is bound to come undone. When Saeris comes face-to-face with Death himself, she inadvertently reopens a gateway between realms and is transported to a land of ice and snow. The Fae have always been the stuff of myth, of legend, of nightmares… but it turns out they're real.
-
-
Best Romantasy this year!
- De Gabby love en 11-02-24
De: Callie Hart
-
Iron Flame
- Empyrean, Book 2
- De: Rebecca Yarros
- Narrado por: Rebecca Soler, Teddy Hamilton
- Duración: 28 h y 16 m
- Versión completa
-
General
-
Narración:
-
Historia
Everyone expected Violet Sorrengail to die during her first year at Basgiath War College-Violet included. But Threshing was only the first impossible test meant to weed out the weak-willed, the unworthy, and the unlucky. Now the real training begins, and Violet’s already wondering how she’ll get through. It’s not just that it’s grueling and maliciously brutal, or even that it’s designed to stretch the riders’ capacity for pain beyond endurance. It’s the new vice commandant, who’s made it his personal mission to teach Violet exactly how powerless she is–unless she betrays the man she loves.
-
-
I wish I could throw this book off a cliff.
- De Rebekah L Johnson en 11-10-23
De: Rebecca Yarros