Password management software
POPULARITY
Categories
Send us a textLosing your OTP or access to Amazon Seller Central can cost sellers serious time. This video breaks down how to recover your account and prevent future login problems. Includes steps for better 2FA setup, security tips, and tools like Authenticator.Need help securing your Amazon account or getting back in? https://bit.ly/44uHuaR#AmazonSeller #SellerCentral #AmazonAccountHelp #TwoStepVerification #FBAHelpWatch these videos on YouTube:Simple Trick to Cut PPC Costs https://www.youtube.com/watch?v=k5CM6XtYo1c&list=PLDkvNlz8yl_YEKE1B5o1uhbBm1QQcPzmY&index=39How to Increase IPI https://www.youtube.com/watch?v=TMysF_XACdQ&list=PLDkvNlz8yl_b5s-jb7KgPe-aPWP47jZIL-------------------------------------------------Struggling with ads? Download our free PPC guide made for Amazon sellers: https://bit.ly/4kjWmgQWant better rankings? Grab the free Amazon SEO toolkit and start fixing your listings: https://bit.ly/3GW5zxMTimestamps00:00 – What To Do If You Lose Your OTP Code00:30 – Common Mistakes When Setting Up OTP01:20 – Account Recovery Using Amazon.com Login02:00 – Required Documents for OTP Reset03:00 – Manual Review Process by Amazon Security04:00 – Better Ways to Set Up Account Security05:10 – How to Use an Authenticator App06:00 – Using 1Password or LastPass for OTP07:00 – Why All Amazon Sellers Should Update OTP Settings-------------------------------------------------Follow us:LinkedIn: https://www.linkedin.com/company/28605816/Instagram: https://www.instagram.com/stevenpopemag/Pinterest: https://www.pinterest.com/myamazonguys/Twitter: https://twitter.com/myamazonguySubscribe to the My Amazon Guy podcast: https://podcast.myamazonguy.comApple Podcast: https://podcasts.apple.com/us/podcast/my-amazon-guy/id1501974229Spotify: https://open.spotify.com/show/4A5ASHGGfr6s4wWNQIqyVwSupport the show
In today's episode, I'm joined by Emma and Kenny, the co-founders of HipPop — a gut-friendly drinks brand that's shaking up the soft drinks aisle. While many might have pigeonholed their product as just kombucha, Emma and Kenny have taken a bold and intentional route: positioning HipPop as a go-to soft drinks brand, not a wellness niche.We talk about what it takes to enter a new market, how branding beyond a product category can be a superpower, and why really listening to your customer is key. From humble beginnings in a farmhouse to securing shelf space in major retailers, their story is packed with practical insight for anyone launching into a crowded space.Emma & Kenny's advice:Test your products locally, in small independent businessesPublicise your ingredients and the provenance of the productTry to work within a representative area of the UKLook for a gap in the marketIf you have a personal reason for setting up the brand, people will love to hear itAfter rigorous testing, and building a local reputation, move on to website and Facebook marketingGradually approach bigger retailers (you will have to be dogged - and original - in pursuing buyers)When you scale, bring in people to cover the skills you don't haveAs you expand distribution, it's important to build relationships with the new people you are dealing with; go slowly and patientlyFF&M enables you to own your own PR & produces podcasts.Recorded, edited & published by Juliet Fallowfield, 2024 MD & Founder of PR & Communications consultancy for startups Fallow, Field & Mason. Email us at hello@fallowfieldmason.com or DM us on instagram @fallowfieldmason. FF&M recommends: LastPass the password-keeping site that syncs between devices.Google Workspace is brilliant for small businessesBuzzsprout podcast 'how to' & hosting directoryCanva has proved invaluable for creating all the social media assets and audio bites.MUSIC CREDIT Funk Game Loop by Kevin MacLeod. Link & LicenceText us your questions for future founders. Plus we'd love to get your feedback, text in via Fan MailSupport the showText us your questions for future founders. Plus we'd love to get your feedback, text in via Fan MailSupport the show
Data silos are significantly hindering AI innovation, as highlighted by a recent report from Infanti. The survey of over 1,200 IT and cybersecurity professionals revealed that more than half of the respondents experience isolated data within their organizations, leading to inefficiencies and slow security responses. Nearly 30% of IT professionals reported that these data deficiencies obstruct their ability to effectively utilize AI tools. Experts emphasize the necessity for a comprehensive data strategy that includes governance, quality, and performance to foster innovation and avoid stagnation in AI projects.In the medical field, radiologists are experiencing growth rather than extinction due to advancements in AI. The Association of American Medical Colleges predicts a shortage of up to 42,000 radiologists by 2033, yet AI is proving to be an essential tool for these professionals. At institutions like the Mayo Clinic, AI has enabled rapid measurements and early disease detection, leading to a 55% expansion in their radiology department and the development of over 250 AI models to enhance diagnostic capabilities.Public relations professionals are adapting to the rise of AI by recognizing the importance of engaging with journalists to influence AI chatbots. Research indicates that authoritative journalism has a more significant impact on how AI platforms generate responses about companies than social media campaigns. This shift underscores the need for firms to prioritize earned media and thought leadership as part of their brand strategy, especially as AI continues to shape public perception.Lastly, companies like SuperOps and TD Cynics are making strides in AI integration. SuperOps has relaunched its AI-powered platform, Monika, which offers various levels of AI autonomy to enhance IT operations for managed service providers. Meanwhile, TD Cynics has updated its Destination AI program to help partners transition from AI exploration to execution, providing tools and frameworks that align technical skills with specific AI solutions. These developments highlight the growing importance of AI in various sectors and the need for organizations to adapt their strategies accordingly. Four things to know today 00:00 Want AI to Work? Fix Your Data First—Then Look at Radiologists for What's Next06:01 OpenAI Rolls Out GPT-4.1, Deepens Microsoft Integration, and Launches Safety Hub for Greater Transparency09:18 AI Gets Practical—SuperOps Wants to Automate Your Ops While TD SYNNEX Helps You Sell It12:29 LastPass Expands into SaaS Visibility, Challenging Lightweight Shadow IT Tools with Business Max Tier This is the Business of Tech. Supported by: https://cometbackup.com/?utm_source=mspradio&utm_medium=podcast&utm_campaign=sponsorshiphttps://getflexpoint.com/msp-radio/ All our Sponsors: https://businessof.tech/sponsors/ Do you want the show on your podcast app or the written versions of the stories? Subscribe to the Business of Tech: https://www.businessof.tech/subscribe/Looking for a link from the stories? The entire script of the show, with links to articles, are posted in each story on https://www.businessof.tech/ Support the show on Patreon: https://patreon.com/mspradio/ Want to be a guest on Business of Tech: Daily 10-Minute IT Services Insights? Send Dave Sobel a message on PodMatch, here: https://www.podmatch.com/hostdetailpreview/businessoftech Want our stuff? Cool Merch? Wear “Why Do We Care?” - Visit https://mspradio.myspreadshop.com Follow us on:LinkedIn: https://www.linkedin.com/company/28908079/YouTube: https://youtube.com/mspradio/Facebook: https://www.facebook.com/mspradionews/Instagram: https://www.instagram.com/mspradio/TikTok: https://www.tiktok.com/@businessoftechBluesky: https://bsky.app/profile/businessof.tech
Developers are relying on LLMs as coding assistants, so where are the LLM assistants for appsec? The principles behind secure code reviews don't really change based on who write the code, whether human or AI. But more code means more reasons for appsec to scale its practices and figure out how to establish trust in code, packages, and designs. Rey Bango shares his experience with secure code reviews and where developer education fits in among the adoption of LLMs. As businesses rapidly embrace SaaS and AI-powered applications at an unprecedented rate, many small-to-medium sized businesses (SMBs) struggle to keep up due to complex tech stacks and limited visibility into the skyrocketing app sprawl. These modern challenges demand a smarter, more streamlined approach to identity and access management. Learn how LastPass is reimagining access control through “Secure Access Experiences” - starting with the introduction of SaaS Monitoring capabilities designed to bring clarity to even the most chaotic environments. Secure Access Experiences - https://www.lastpass.com/solutions/secure-access This segment is sponsored by LastPass. Visit https://securityweekly.com/lastpassrsac to learn more about them! Cloud Application Detection and Response (CADR) has burst onto the scene as one of the hottest categories in security, with numerous vendors touting a variety of capabilities and making promises on how bringing detection and response to the application-level will be a game changer. In this segment, Gal Elbaz, co-founder and CTO of Oligo Security, will dive into what CADR is, who it helps, and what the future will look like for this game changing technology. Segment Resources - https://www.oligo.security/company/whyoligo To see Oligo in action, please visit https://securityweekly.com/oligorsac Visit https://www.securityweekly.com/asw for all the latest episodes! Show Notes: https://securityweekly.com/asw-330
Developers are relying on LLMs as coding assistants, so where are the LLM assistants for appsec? The principles behind secure code reviews don't really change based on who write the code, whether human or AI. But more code means more reasons for appsec to scale its practices and figure out how to establish trust in code, packages, and designs. Rey Bango shares his experience with secure code reviews and where developer education fits in among the adoption of LLMs. As businesses rapidly embrace SaaS and AI-powered applications at an unprecedented rate, many small-to-medium sized businesses (SMBs) struggle to keep up due to complex tech stacks and limited visibility into the skyrocketing app sprawl. These modern challenges demand a smarter, more streamlined approach to identity and access management. Learn how LastPass is reimagining access control through “Secure Access Experiences” - starting with the introduction of SaaS Monitoring capabilities designed to bring clarity to even the most chaotic environments. Secure Access Experiences - https://www.lastpass.com/solutions/secure-access This segment is sponsored by LastPass. Visit https://securityweekly.com/lastpassrsac to learn more about them! Cloud Application Detection and Response (CADR) has burst onto the scene as one of the hottest categories in security, with numerous vendors touting a variety of capabilities and making promises on how bringing detection and response to the application-level will be a game changer. In this segment, Gal Elbaz, co-founder and CTO of Oligo Security, will dive into what CADR is, who it helps, and what the future will look like for this game changing technology. Segment Resources - https://www.oligo.security/company/whyoligo To see Oligo in action, please visit https://securityweekly.com/oligorsac Visit https://www.securityweekly.com/asw for all the latest episodes! Show Notes: https://securityweekly.com/asw-330
Developers are relying on LLMs as coding assistants, so where are the LLM assistants for appsec? The principles behind secure code reviews don't really change based on who write the code, whether human or AI. But more code means more reasons for appsec to scale its practices and figure out how to establish trust in code, packages, and designs. Rey Bango shares his experience with secure code reviews and where developer education fits in among the adoption of LLMs. As businesses rapidly embrace SaaS and AI-powered applications at an unprecedented rate, many small-to-medium sized businesses (SMBs) struggle to keep up due to complex tech stacks and limited visibility into the skyrocketing app sprawl. These modern challenges demand a smarter, more streamlined approach to identity and access management. Learn how LastPass is reimagining access control through “Secure Access Experiences” - starting with the introduction of SaaS Monitoring capabilities designed to bring clarity to even the most chaotic environments. Secure Access Experiences - https://www.lastpass.com/solutions/secure-access This segment is sponsored by LastPass. Visit https://securityweekly.com/lastpassrsac to learn more about them! Cloud Application Detection and Response (CADR) has burst onto the scene as one of the hottest categories in security, with numerous vendors touting a variety of capabilities and making promises on how bringing detection and response to the application-level will be a game changer. In this segment, Gal Elbaz, co-founder and CTO of Oligo Security, will dive into what CADR is, who it helps, and what the future will look like for this game changing technology. Segment Resources - https://www.oligo.security/company/whyoligo To see Oligo in action, please visit https://securityweekly.com/oligorsac Show Notes: https://securityweekly.com/asw-330
The messaging app used by CBP and the White House faces continued security scrutiny. Hacktivists breach the airline used for U.S. deportation flights. The FBI warns that threat actors are exploiting outdated, unsupported routers. Education giant Pearson confirms a cyberattack. Researchers report exploitation of Windows Remote Management (WinRM) for stealthy lateral movement in Active Directory (AD) environments. A sophisticated email attack campaign uses malicious PDF invoices to deliver a cross-platform RAT. A zero-day vulnerability in SAP NetWeaver enables remote code execution. An Indiana health system reports a data breach affecting nearly 263,000 individuals. Our guest is Alex Cox, Director of Information Security at LastPass, discussing tax-related lures targeting refunds. AI empowers a murder victim to speak from beyond the grave. Remember to leave us a 5-star rating and review in your favorite podcast app. Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you'll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn. CyberWire Guest Today we are joined by Alex Cox, Director of Information Security at LastPass, to discuss tax-related lures facing both tax preparation agencies and filers expecting refunds. Selected Reading On the state of modern Web Application Security (BrightTalk) Customs and Border Protection Confirms Its Use of Hacked Signal Clone TeleMessage (Wired) Hackers hit deportation airline GlobalX, leak flight manifests, and leave an unsubtle message for "Donnie" Trump (Bitdefender) FBI Sounds Alarm on Rogue Cybercrime Services Targeting Obsolete Routers (infosecurity magazine) Education giant Pearson hit by cyberattack exposing customer data (Bleeping Computer) Hackers Using Windows Remote Management to Stealthily Navigate Active Directory Network (Cybersecurity News) Hackers Weaponizing PDF Invoices to Attack Windows, Linux & macOS Systems (Cybersecurity News) SAP Zero-Day Targeted Since January, Many Sectors Impacted (Security Week) Indiana Health System Notifies 263,000 of Oracle Hack (Bank of Infosecurity) A Judge Accepted AI Video Testimony From a Dead Man (404 Media) Share your feedback. We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. Want to hear your company in the show? You too can reach the most influential leaders and operators in the industry. Here's our media kit. Contact us at cyberwire@n2k.com to request more info. The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc. Learn more about your ad choices. Visit megaphone.fm/adchoices
Welcome to How To Start Up, the podcast for anyone looking to start & scale their own business. I'm Juliet Fallowfield & today we're discussing viral marketing with Lucie Macleod, founder of the TikTok sensation, Hair Syrup.Founded in 2020 with no prior entrepreneurial experience, Lucie combined her understanding of consumer behavior with social media creativity, to turn a handmade hair oil into THE beauty must-have with over 350,000 engaged TikTok followers & rapid, 1,000% year-on-year growth. After an appearance on BBC Dragon's Den, the brand is now on track to hit £6.5 million in revenue by 2026.To hear our next guest's answer to Lucie's question at the end of this ep, just click follow in your podcast directory of choice & you'll receive a notification from us when it is ready for you to listen. Lucie's advice:Don't invest hugely to begin with; start cautiouslyDon't build on ‘pinterest appeal' with pretty packaging; functionality is what countsBelieve in your productStick at it when things get difficult; be doggedTiktok can be good if you strike luckyBe very careful spending on advertising as you can lose a lot of money if you're badly advisedAlso be very careful about the people you surround yourself with; if you wouldn't be happy with a particular person being in your house, then don't employ them in your businessTrust trumps skillLearn to step away from your business and fully relaxFF&M enables you to own your own PR & produces podcasts.Recorded, edited & published by Juliet Fallowfield, 2024 MD & Founder of PR & Communications consultancy for startups Fallow, Field & Mason. Email us at hello@fallowfieldmason.com or DM us on instagram @fallowfieldmason. FF&M recommends: LastPass the password-keeping site that syncs between devices.Google Workspace is brilliant for small businessesBuzzsprout podcast 'how to' & hosting directoryCanva has proved invaluable for creating all the social media assets and audio bites.MUSIC CREDIT Funk Game Loop by Kevin MacLeod. Link & LicenceText us your questions for future founders. Plus we'd love to get your feedback, text in via Fan MailSupport the showText us your questions for future founders. Plus we'd love to get your feedback, text in via Fan MailSupport the show
In this Chats on the Road to RSAC 2025, , Sean Martin and Marco Ciappelli connect with Tim Brown, Chief Information Security Officer at SolarWinds, to unpack the critical issues facing CISOs today—and why the role remains worth pursuing.Brown is participating in multiple sessions at RSAC Conference 2025, including the CISO Bootcamp and Cyber Leaders Forum. Both are closed-door conversations designed to surface real concerns in a confidential, supportive setting. These aren't theoretical discussions—they're rooted in hard-earned experience. Brown, who has faced high-profile scrutiny and legal fallout from a past incident at SolarWinds, brings a uniquely personal perspective to these sessions.He points out that fear and hesitation are keeping many deputy CISOs from stepping up into the top role. His message to them: don't be afraid of the position. Despite the weight of responsibility, the role offers real influence, the ability to shape enterprise architecture, and the opportunity to drive meaningful business decisions. Brown emphasizes the importance of community support and collective growth, noting that the cybersecurity industry—still relatively young—is maturing and finding its footing when it comes to accountability and resilience.Beyond leadership development, mental health and stress management are key themes in the Cyber Leaders Forum. Brown acknowledges the toll the job can take, even sharing that his own health suffered despite thinking he was managing stress well. This honest reflection opens the door for deeper conversations about personal well-being in high-pressure roles.He's also appearing at the Cloud Security Alliance Summit with Chris Hoff, Chief Security Officer at LastPass, where they'll discuss incident response and field questions from the audience. On Wednesday, Brown joins a breakfast session with Tactic and Hyperwise, guiding attendees through a crisis simulation based on lessons from the Sunburst attack. His focus? Helping others avoid being unprepared in a moment of chaos.From insider threat modeling to supply chain transparency and the challenges of monitoring runtime behavior, Brown is clear-eyed about where CISOs need to focus next.This episode isn't just a preview of conference sessions—it's a call to future security leaders to lean in, not back.___________Guest: Tim Brown, CISO, Solarwinds | On LinkedIn: https://www.linkedin.com/in/tim-brown-ciso/Hosts:Sean Martin, Co-Founder at ITSPmagazine | Website: https://www.seanmartin.comMarco Ciappelli, Co-Founder at ITSPmagazine | Website: https://www.marcociappelli.com___________Episode SponsorsThreatLocker: https://itspm.ag/threatlocker-r974Akamai: https://itspm.ag/akamailbwcBlackCloak: https://itspm.ag/itspbcwebSandboxAQ: https://itspm.ag/sandboxaq-j2enArcher: https://itspm.ag/rsaarchwebDropzone AI: https://itspm.ag/dropzoneai-641ISACA: https://itspm.ag/isaca-96808ObjectFirst: https://itspm.ag/object-first-2gjlEdera: https://itspm.ag/edera-434868___________ResourcesRSAC Session: CLF Ask Me Anything Session with Tim Brown, CISO, SolarWinds: https://path.rsaconference.com/flow/rsac/us25/FullAgenda/page/catalog/session/1739404173721001x1MHRSAC Session: CISO Boot Camp Exclusive Fireside Chat with Tim Brown, CISO, SolarWinds: https://path.rsaconference.com/flow/rsac/us25/FullAgenda/page/catalog/session/1739403254724001isXhCSA Summit at RSAC 2025: Fireside Chat with Tim Brown and Chris Hoff: https://www.csasummitrsac.com/event/5b3547c2-c652-4f77-97de-5b094e746626/agenda?session=1452408b-c822-4664-87b8-38ce1276247bLearn more and catch more stories from RSA Conference 2025 coverage: https://www.itspmagazine.com/rsa-conference-usa-2025-rsac-san-francisco-usa-cybersecurity-event-infosec-conference-coverageCatch all of our event coverage: https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverageWant to tell your Brand Story Briefing as part of our event coverage? Learn More
Jeff Shiner is the CEO of 1Password, the access management company used by over 100,000 businesses and millions of individuals worldwide. He joined 1Password as CEO in 2012, when the team was just under 20 people. Under Jeff's leadership, 1Password expanded into B2B, launched a SaaS platform, and scaled from a small family-run operation into a global company. In 2019, Jeff led 1Password through its first-ever funding round – a $200M Series A from Accel – to build out its go-to-market team and accelerate product development. Before joining 1Password, Jeff held senior roles at IBM and led teams through multiple acquisitions and integrations. --- In today's episode, we discuss: Why bootstrapping isn't always what it's cracked up to be The switch from a consumer product to B2B Launching before billing — and why that worked When being “too secure” nearly killed the product Becoming CEO… without telling anyone Much more --- Referenced: 1Password: https://1password.com Accel: https://www.accel.com Arun Mathew: https://www.linkedin.com/in/arun-mathew-b7186412/ David Teare: https://www.linkedin.com/in/daveteare/ Floodgate: https://floodgate.com LastPass: https://www.lastpass.com Mike Maples: https://www.linkedin.com/in/maples/ Natalia Karimov: https://1password.com/company/meet-the-team/natalia-karimov Roustem Karimov: https://www.linkedin.com/in/roustem/?originalSubdomain=ca Sara Teare: https://1password.com/company/meet-the-team/sara-teare Shopify: https://www.shopify.com Tobi Lütke: https://www.linkedin.com/in/tobiaslutke/ --- Where to find Jeff: LinkedIn: https://www.linkedin.com/in/jshiner --- Where to find Brett: LinkedIn: https://www.linkedin.com/in/brett-berson-9986094/ Twitter/X: https://twitter.com/brettberson --- Where to find First Round Capital: Website: https://firstround.com/ First Round Review: https://review.firstround.com/ Twitter/X: https://twitter.com/firstround YouTube: https://www.youtube.com/@FirstRoundCapital This podcast on all platforms: https://review.firstround.com/podcast --- Timestamps: 0:03 – How Jeff got involved with 1Password 2:01 – How 1Password was initially set up 10:41 – The secret CEO 13:44 – What Jeff's first six months encompassed 16:13 – The lightbulb moment that caused a pivot 17:50 – 1Password's unusual company journey 22:08 – Creating an aligned product roadmap 29:19 – Retaining a customer-centric focus at scale 30:40 – Why 1Password's first B2B product failed 39:43 – How Jeff thinks about competitors 46:44 – Building different go-to-market functions 52:45 – Staying bootstrapped for 15 years 57:17 – Jeff's one regret 1:02:00 – 1Password's most pivotal moments
Hector's back from Miami, rubber ducky giveaways in tow, and diving deep into a wild week of cyber news—from Elon Musk's Starlink bug bounty to a stealthy year-long breach of U.S. bank regulators. The guys unpack major incidents including a Stuxnet-style espionage campaign in Ukraine, AI-powered spear phishing, and yet another haunting update in the LastPass hack saga. But the real fireworks come in Hector's rant, where he slams the cybersecurity industry's political silence and calls out its leaders for cowardice. Join our new Patreon! https://www.patreon.com/c/hackerandthefed
Today's digital landscape isn't just shaped by code—it's shaped by how deeply companies listen. Whether in retail, software, or AI, brands that center their design around real user behavior are pulling ahead. Intuit's “Follow Me Home” approach exemplifies this mindset, encouraging teams to observe customers in their daily environments to uncover real needs. This commitment to customer-centric innovation continues to influence how digital products are designed, tested, and trusted.So how do personal passions like music, books, or frustration with bad service help create better digital experiences?On this episode of DisruptED, host Ron J Stefanski welcomes back Scott Wilder, Global Head of Digital Self-Serve at LastPass and longtime friend from their Borders Books and Music days. Together, they reflect on how early exposure to physical retail and analog media helped inform Scott's approach to customer-centric innovation, particularly in building digital self-service solutions rooted in empathy, simplicity, and trust.Key Highlights:Fixing the Fractured Self-Serve Experience – Scott breaks down how disjointed help centers, support portals, and learning sites confuse users and weaken trust. He shares his approach to designing seamless, customer-first digital journeys.Bringing the Customer into the Room – Drawing on his time at Intuit, Scott explains how physically involving customers in product discussions—through calls, visits, or even team meetings—creates more meaningful innovation than spreadsheets ever could.Building Trust in an AI-Driven World – As AI tools become more central to support and learning, Scott argues that trust, clarity, and human touchpoints will define which experiences succeed and which fail.This is a special treat to have Scott Wilder from Last Pass on the DisruptED podcast. Ron and Scott worked together for 5 years at Borders Books and Music. As they acknowledge on these shows, they learned an awful lot about the kind of intellectual curiosity that fuels innovation.Scott is a recognized thought leader in advancing technology after leading a number of highly innovative tech initiatives as a key executive at Intuit, Google, Hubspot, Udacity, Coursera and Adobe. His passion for technology is fueled by intense curiosity about how to make things work better.
Technology disruption continues to reshape how we work, learn, and connect. From bookstores to browsers, the leap from physical to digital has transformed not only industries, but expectations. According to McKinsey & Company, generative AI alone could add up to $4.4 trillion annually to the global economy, making it vital to understand how curiosity, learning, and innovation fuel this transformation.So what can we learn about today's digital evolution by revisiting the early internet days, especially from someone who built online experiences before “online” was mainstream?On this episode of DisruptED, host Ron J Stefanski reconnects with longtime friend and fellow Borders alum Scott Wilder, now the Global Head of Digital Self-Serve at LastPass. Together, they explore how bookstores, browsers, and bold ideas shaped some of today's most essential tech innovations. Their conversation tracks the early signals of technology disruption, from pioneering web platforms to building scalable, AI-enhanced learning and customer experiences.In this episode, Ron and Scott discuss:Borders as a Digital Pioneer – Borders wasn't just about books. Scott recalls how the company experimented with online media, store-level websites, and event integration—laying the groundwork for modern e-commerce personalization.Early Internet Innovation – From launching web support at Silicon Graphics to building web ad infrastructure at AOL, Scott helped define digital customer engagement before it became standard practice.Curiosity as a Catalyst – Whether in edtech or AI, Scott emphasizes how intellectual curiosity drives innovation, fuels collaboration, and helps overcome fear of new technologies.This is a special treat to have Scott Wilder from Last Pass on the DisruptED podcast. Ron and Scott worked together for 5 years at Borders Books and Music. As they acknowledge on these shows, they learned an awful lot about the kind of intellectual curiosity that fuels innovation.Scott is a recognized thought leader in advancing technology after leading a number of highly innovative tech initiatives as a key executive at Intuit, Google, Hubspot, Udacity, Coursera and Adobe. His passion for technology is fueled by intense curiosity about how to make things work better.
PWC reports that over 80% of consumers are willing to pay higher prices for sustainably produced goods so environmental responsibility is clearly a lucrative business as well as being the right thing to do. Laura Harnett is the Founder of Seep, the only B Corp-certified, plastic-free cleaning tool brand in Europe. Having raised a £50,000 Dragons' Den investment from Trinny Woodall & Deborah Meaden, Laura & her team are on a mission to stop 1 billion plastic cleaning tools from entering landfill by 2030. Keep listening to hear Laura's advice on learning how to sell as a first-time founder & how to make your sales process as sustainable as possible. Laura's advice:As a challenger brand, having spotted a gap in the market you will need to ensure you are confident about your supply chain, packaging, etc. before you approach retailersSelling direct to customers via a website is a great way to gain approval / test - and perfect - your product / do some market research When iterating products, try them out with your direct customersThe evidence of your DTC sales enables you to approach big retailers with confidenceTarget your marketing emails carefully and thoughtfullyPersevere with this; it can take timeFacebook and Instagram ads are helpfulYou will find other founders provide you with advice and supportFF&M enables you to own your own PR & produces podcasts.Recorded, edited & published by Juliet Fallowfield, 2023 MD & Founder of PR & Communications consultancy for startups Fallow, Field & Mason. Email us at hello@fallowfieldmason.com or DM us on instagram @fallowfieldmason. FF&M recommends: LastPass the password-keeping site that syncs between devices.Google Workspace is brilliant for small businessesBuzzsprout podcast 'how to' & hosting directoryCanva has proved invaluable for creating all the social media assets and audio bites.MUSIC CREDIT Funk Game Loop by Kevin MacLeod. Link & LicenceText us your questions for future founders. Plus we'd love to get your feedback, text in via Fan MailSupport the show
Imagine a world where product teams collaborate with security teams. Where product designers can shadow their security peers. A place where security team members believe communication is one of the most important skillsets they have. These are key attributes of human-centered security—the type of dynamics Jordan Girman and Mike Kosak are fostering at Lastpass.In this episode, we talk about:What cross-disciplinary collaboration looks like at Lastpass (for example, a product designer is shadowing the security team).A set of principles for designing for usable security and privacy.Why intentional friction might be counterintuitive to designers but, used carefully, is critical to designing for security.When it comes to improving security outcomes, the words you use matter. Mike explains how the Lastpass Threat Intelligence team thinks about communicating what they learn to a variety of audiences.How to build a threat intelligence program within your organization--even if you have limited resources.Jordan Girman is the VP of User Experience at Lastpass. Mike Kosak is the Senior Principal Intelligence Analyst at Lastpass. Mike references a series of articles he wrote, including “Setting Up a Threat Intelligence Program From Scratch.”
The Future of Security Operations podcast is back for a sixth season, and, to kick it off, Thomas is joined by Christofer Hoff. Christofer has over 30 years of experience in network and information security architecture, development, engineering, operations, and management, including security leadership roles at Bank of America, Citadel, and Juniper Networks. He's currently Chief Secure Technology Officer at LastPass, a unique role that combines the duties of CSO and CTO, while also serving on the board at FIDO Alliance. In this episode: [02:00] How blogging landed Christofer his first couple of jobs in security [06:50] Taking a more holistic approach to security through collaboration [09:40] Rebuilding LastPass's security org from scratch [12:03] Reflecting on incidents - what LastPass did right [16:12] Communicating with customers and the broader community during incidents [20:15] Navigating tech debt as a security leader [23:55] The biggest challenges AI has produced for his team [25:16] How LastPass uses an AI working group for decision-making [29:00] The evolving challenges of browser security [35:05] Passkeys, passwords and the future of secure authentication [41:40] Tips on hiring and structuring effective security teams [46:47] How LastPass creates efficiency through automation [50:38] The biggest changes he'd like to see in security [54:44] Connect with Chris The Future of Security Operations is brought to you by Tines, the orchestration, automation, and AI platform that powers some of the world's most important workflows. Where to find Christofer Hoff: LinkedIn Chris's Rational Survivability blog Where to find Thomas Kinsella: LinkedIn Tines Resources mentioned: Chris on Google's Cloud Security Podcast LastPass Security Incident Summary
La Vinaigre Connection Shamelessplug Hackfest Swag Join Hackfest/La French Connection Discord Join Hackfest us on Mastodon CYBERTECH Global Tel Aviv - Israël - 24-26 mars 2025 InCyber Europe - Lille, France - 1-3 avril 2025 Conference CYBERECO - Montréal - 8-9 avril 2025 ALTSECCON - Halifax - 10-11 avril 2025 World Summit AI - Montréal - 15-16 avril 2025 Conférence NorthSEC - Montréal - 10-18 mai 2025 17th International Conference on Cyber Conflict - Tallinn, Estonie - 27-30 mai 2025 ITSEC Devolution - St-Hyacinthe - 9 juin 2025 Les 101 mots de la cybersécurité : Exporter la cybersécurité et valoriser nos entreprises. Sujet d'opinion Les licornes, les farfadets, dieu et le Cloud n'existent pas!!! Nouvelles Une vulnérabilité critique (CVE-2025-27840) affectant la puce Bluetooth ESP32 d'Espressif Systems expose plus d'un milliard d'appareils IoT à des attaques d'usurpation d'identité et d'accès non autorisé, nécessitant des mises à jour urgentes. Ransomware gang encrypted network from a webcam to bypass EDR US seizes $23 million in crypto linked to LastPass breaches Microsoft Warns of Malvertising Campaign Infecting Over 1 Million Devices Worldwide Apple patches 0-day exploited in “extremely sophisticated attack” About the security content of iOS 18.3.2 and iPadOS 18.3.2 Ballista Botnet Exploits Unpatched TP-Link Vulnerability, Infects Over 6,000 Devices PowerSchool previously hacked in August, months before data breach X hit by ‘massive cyberattack' amid Dark Storm's DDoS claims Swiss critical sector faces new 24-hour cyberattack reporting rule Undocumented commands found in Bluetooth chip used by a billion devices Crew Patrick Mathieu Steve Waterhouse Francis Coats Jacques Sauvé Crédits Montage audio par Hackfest Communication Music par Ecometric – Archetypal Architecture - Clearing Locaux virtuels par Streamyard
Mai menü:lastpass-nak fontos a securityESP32 undocumented commandsBee review: I outsourced my memory to AI and all I got was fanfiction | The Verge Elérhetőségeink:TelegramTwitterInstagramFacebookMail: info@hackeslangos.show
In this episode of The Backup Wrap-up, Curtis and Prasanna discuss how to choose the best password manager in light of recent security breaches. They examine the LastPass hack that resulted in $150 million of stolen cryptocurrency and what that teaches us about password manager security.The hosts break down the critical security features to look for in the best password manager, including encryption strength, iteration counts, multi-factor authentication options, and passkey support. They emphasize that even with the LastPass breach, using a password manager is still far safer than not using one at all.This episode provides practical guidance on evaluating password manager security beyond the standard feature comparisons, with specific recommendations for cryptocurrency users and insights into the technical aspects of password vault protection.Here are some references for today's episode:https://www.rubrik.com/blog/company/25/rubrik-information-security-team-updatehttps://www.bleepingcomputer.com/news/security/ransomware-gang-encrypted-network-from-a-webcam-to-bypass-edr/https://krebsonsecurity.com/2023/09/experts-fear-crooks-are-cracking-keys-stolen-in-lastpass-breach/https://krebsonsecurity.com/2025/03/feds-link-150m-cyberheist-to-2022-lastpass-hacks/
In this episode of Hacker in the Fed, Chris Tarbell and Hector Monsegur discuss their recent travels, major cybersecurity threats, and the dangers of disinformation. Topics include a Bluetooth backdoor affecting a billion devices, a $150M crypto heist linked to the LastPass hack, and malware spreading via GitHub. Plus, Hector's take on propaganda and narrative warfare. Send HATF your questions at questions@hackerandthefed.com.
On this week's show Patrick Gray and Adam Boileau discuss the week's cybersecurity news with special guest Rob Joyce, a Former Special Assistant to the US President and Director of Cybersecurity for NSA. They talk through: A realistic bluetooth-proximity phishing attack against Passkeys A very patient ransomware actor encrypts an entire enterprise with a puny linux webcam processor The ESP32 backdoor that is neither a door nor at the back The X DDoS that Elon said was Ukraine is claimed by pro-Palestinian hacktivists Years later, LastPass hackers are still emptying crypto-wallets …and it turns out North Korea nailed {Safe}Wallet with a malicious docker image. Nice! Rob Joyce recently testified to the US House Select Committee on the Chinese Communist Party, and he explains why DOGE kicking probationary employees to the curb is “devastating” for the national security staff pipeline. This week's episode is sponsored by SpecterOps, makers of the Bloodhound identity attack path mapping tool. Chief Product Officer Justin Kohler and Principal Security Researcher Lee Chagolla-Christensen discuss their pragmatic approach to disabling NTLM authentication in Active Directory using Bloodhound's insight. This episode is also available on Youtube. Show notes CVE-2024-9956 - PassKey Account Takeover in All Mobile Browsers | Tobia Righi - Security Researcher Feds Link $150M Cyberheist to 2022 LastPass Hacks – Krebs on Security Camera off: Akira deploys ransomware via webcam Tarlogic detects a hidden feature in the mass-market ESP32 chip that could infect millions of IoT devices Alleged Co-Founder of Garantex Arrested in India – Krebs on Security 37K+ VMware ESXi instances vulnerable to critical zero-day | Cybersecurity Dive Apple patches 0-day exploited in “extremely sophisticated attack” - Ars Technica What Really Happened With the DDoS Attacks That Took Down X | WIRED Eleven11bot estimates revised downward as researchers point to Mirai variant | Cybersecurity Dive Previously unidentified botnet infects unpatched TP-Link Archer home routers | The Record from Recorded Future News Safe.eth on X: "Investigation Updates and Community Call to Action" / X How to verify Safe{Wallet} transactions on a hardware wallet | Safe{Wallet} Help Center and Support. US charges Chinese nationals in cyberattacks on Treasury, dissidents and more | The Record from Recorded Future News Former top NSA cyber official: Probationary firings ‘devastating' to cyber, national security | CyberScoop U.S. pauses intelligence sharing with Ukraine used to target Russian forces - The Washington Post
Cybersecurity Today: From DDoS Attacks to Developer Sabotage In today's episode, host Jim Love discusses several major cybersecurity incidents: the pro-Palestinian group Dark Storm's claimed DDoS attack on X Twitter and its implications; the impact of budget cuts from the Department of Government Efficiency on the US Cybersecurity and Infrastructure Security Agency; the recovery of $23 million from the Ripple wallet hack allegedly linked to the LastPass breach; New York State's lawsuit against Allstate Insurance for inadequate data security and resultant breaches compromising 200,000 individuals' data; and finally, the conviction of a developer who sabotaged his employer's systems post-termination. The episode underscores the importance of robust cybersecurity measures and responsible handling of personnel changes. 00:00 Pro-Palestinian Group Claims Credit for Twitter Outage 02:51 US Cybersecurity Agency Faces Devastating Cuts 04:23 US Authorities Recover $23 Million from Cryptocurrency Hack 06:31 New York Sues Allstate Over Data Breaches 09:12 Developer Sentenced for Malicious Code Sabotage 11:34 Support the Podcast
EP 233This week... is seized Crypto Linked to LastPass? Feds pocket $23M in hot crypto—but with hackers still sitting on hundreds of millions, it's like finding loose change in the couch.Signal's boss says our ‘magic AI butler' needs root access to everything. What could possibly go wrong?AI is Reshaping Tech Jobs and with nearly one in four tech gigs demanding AI skills, either learn to talk to robots or prepare to serve them coffee."Your Bluetooth toaster might secretly be dialing up hackers—because who doesn't love a little espionage with their morning bagel?With the UK quietly removing encryption advice, Brits wake up to find official security tips gone, like a polite note saying ‘We'd prefer you in clear text, chaps.'Indian tax officials are granted sweeping digital access and can now dig through socials, emails, and maybe grandma's recipe folder. Nothing's sacred if there's tax to be had.Elon's empire takes another DDoS beating—Dark Storm claims credit, X users just want their snarky tweets back."We finish with the discovery of a Fake Website Spewing AI Slop that topped Google Search. AI conjures space fantasies that outrank real news and it turns out that even Google can't spot the Millennium Falcon imposter.Let's keep it safe.Find the full transcript to this podcast here.
When it comes to bringing a product to market, there are lots of aspects to consider before it reaches the shelves. To learn more, I wanted to hear from someone who has successfully launched products to market. Kinga Wilewska is the Founder & CEO of MUJO, the adaptogenic coffee alternative packed with vital nutrients. Having watched her dad lose his fight against cancer, Kinga developed a keen interest in adaptogens & set out to bring truly transformational products to market. Keep listening to hear Kinga's advice on sourcing feedback on your products & how to begin making sales. Kinga's advice:Always pay attention to costsSpend time sourcing ingredients carefullyResearch your market thoroughly and understand where the gaps areSpeak to strangers about what propels them to buy / what are their priorities / what packaging appeals to themPay continual attention to feedbackCommunicate with your buyers; see your product as a service for themRefine your pitch and your website to suit your marketYour brand needs to inspire trust and exude authorityAlways put quality over quantityBelieve absolutely in your product yourselfBe disciplined and honest with yourself (eg when you need help)Use Facebook to advertise - rather than use an agency (this can minimise spend and maximise reach)Minimise risks for first time buyers: guarantee them money back and absorb the shipping costs yourselfAlways be ready to learn some new way of reaching your marketFF&M enables you to own your own PR & produces podcasts.Recorded, edited & published by Juliet Fallowfield, 2023 MD & Founder of PR & Communications consultancy for startups Fallow, Field & Mason. Email us at hello@fallowfieldmason.com or DM us on instagram @fallowfieldmason. FF&M recommends: LastPass the password-keeping site that syncs between devices.Google Workspace is brilliant for small businessesBuzzsprout podcast 'how to' & hosting directoryCanva has proved invaluable for creating all the social media assets and audio bites.MUSIC CREDIT Funk Game Loop by Kevin MacLeod. Link & LicenceText us your questions for future founders. Plus we'd love to get your feedback, text in via Fan MailSupport the showText us your questions for future founders. Plus we'd love to get your feedback, text in via Fan MailSupport the show
PHP exploits are active in the wild. Security researchers discover undocumented commands in a popular Wi-Fi and Bluetooth-enabled microcontroller. The ONCD could gain influence in this second Trump administration. The Akira ransomware gang leverages an unsecured webcam. Mission, Texas declares a state of emergency following a cyberattack. The FBI and Secret Service confirm crypto-heists are linked to the 2022 LastPass breach. A popular home appliance manufacturer suffers a cyberattack. Switzerland updates reporting requirements for critical infrastructure operators. Our guest is Errol Weiss, Chief Security Officer at the Health-ISAC, who warns “the cavalry isn't coming—why the private sector must take the lead in critical infrastructure cybersecurity.” A termination kill switch leads to potential jail time. Remember to leave us a 5-star rating and review in your favorite podcast app. Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you'll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn. CyberWire Guest Today, we have Errol Weiss, Chief Security Officer at the Health-ISAC, sharing his take “the cavalry isn't coming—why the private sector must take the lead in critical infrastructure cybersecurity.” Selected Reading Mass Exploitation of Critical PHP Vulnerability Begins (SecurityWeek) Undocumented commands found in Bluetooth chip used by a billion devices (Bleeping Computer) White House cyber director's office set for more power under Trump, experts say (The Record) Ransomware gang encrypted network from a webcam to bypass EDR (Bleeping Computer) Texas border city declares state of emergency after cyberattack on government systems (The Record) Feds Link $150M Cyberheist to 2022 LastPass Hacks (Krebs on Security) Home appliance company Presto says cyberattack causing delivery delays (The Record) Switzerland Mandates Cyber-Attack Reporting for Critical Infrastructure (Infosecurity Magazine) Developer sabotaged ex-employer IT systems with kill switch (The Register) Share your feedback. We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. Want to hear your company in the show? You too can reach the most influential leaders and operators in the industry. Here's our media kit. Contact us at cyberwire@n2k.com to request more info. The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc. Learn more about your ad choices. Visit megaphone.fm/adchoices
Send us a textThe $150 million cryptocurrency heist linked to the 2022 LastPass breach serves as a powerful wake-up call for cybersecurity professionals. As Sean Gerber explains in this comprehensive breakdown of CISSP Domain 2.1, even security-focused tools can become vulnerability points when housing your most sensitive information.Dive deep into the pyramid structure of data classification, where government frameworks (Unclassified, Confidential, Secret, Top Secret) and non-government equivalents (Public, Sensitive, Private, Confidential/Proprietary) provide the foundation for effective information protection. This systematic approach to identifying and classifying information and assets isn't just theoretical—it's a practical necessity in today's complex regulatory landscape.The episode meticulously examines classification criteria, benefits, and implementation challenges. You'll discover why identifying data owners is non-negotiable, how classification enhances security while optimizing resources, and why enterprises without leadership buy-in are fighting a losing battle. Sean provides actionable insights for protecting data across all three states: at rest, in transit, and in use.Security professionals will appreciate the comprehensive review of industry-specific regulations requiring data classification, from GDPR and HIPAA to sector-specific frameworks like Basel III for banking and NERC SIP for energy infrastructure. Understanding these requirements isn't just exam preparation—it's career preparation.Whether you're studying for the CISSP exam or implementing security controls in your organization, this episode delivers practical wisdom you can apply immediately. Connect with Sean at CISSPCyberTraining.com for additional resources to ace your exam on the first attempt, or reach out through ReduceCyberRisk.com for consulting expertise in implementing these principles in your enterprise.Gain exclusive access to 360 FREE CISSP Practice Questions delivered directly to your inbox! Sign up at FreeCISSPQuestions.com and receive 30 expertly crafted practice questions every 15 days for the next 6 months—completely free! Don't miss this valuable opportunity to strengthen your CISSP exam preparation and boost your chances of certification success. Join now and start your journey toward CISSP mastery today!
Today's blockchain and cryptocurrency news Bitcoin is up slightly at $85,004 Eth is up slightly at $2,142 XRP, is up slightly at $2.25 Kraken eyes IPO Arkham adds new tag for crypto influencers Zoroo arrested in Shanghai Ripple co-founder Chris Larsen may have lost $150M in LastPass hack. Garantex domains seized. Learn more about your ad choices. Visit megaphone.fm/adchoices
As any founder needs to conquer their fear of sales I wanted to interview a founder who rapidly grew a new sector. After overcoming chronic illness, Founder of LYMA, Lucy Goff, set out to redefine the wellness landscape and share her learnings. Since launching in 2017, LYMA has been at the forefront of science-driven wellness & health optimisation securing listings with Harrods & Harvey Nichols with its truly transformational & effective supplements. Keep listening to hear Lucy's advice on acquiring & retaining clients & what to consider when developing a loyalty programme. Lucy's advice:If you want to stand out, look differentSurprise peopleRemember everything is aiming towards a salePlan your PR stories in advance of the launch; that way you reduce any riskThe product will stand on its own; but the brand storytelling is what will set you apartThink about how your brand will resonate with customers and stand out in the marketplaceListen to your customers and engage with them; their feedback will be crucial Customers won't always want what you want to give themAny loyalty scheme should be designed around the product you are sellingA loyalty scheme should also repay the length of time your customers have stayed with youOn a personal level, eliminate fear and don't listen to your subconscious!FF&M enables you to own your own PR & produces podcasts.Recorded, edited & published by Juliet Fallowfield, 2023 MD & Founder of PR & Communications consultancy for startups Fallow, Field & Mason. Email us at hello@fallowfieldmason.com or DM us on instagram @fallowfieldmason. FF&M recommends: LastPass the password-keeping site that syncs between devices.Google Workspace is brilliant for small businessesBuzzsprout podcast 'how to' & hosting directoryCanva has proved invaluable for creating all the social media assets and audio bites.MUSIC CREDIT Funk Game Loop by Kevin MacLeod. Link & LicenceText us your questions for future founders. Plus we'd love to get your feedback, text in via Fan MailSupport the show
Start the new year with clarity and purpose in your creative business journey. Join us on The Naptime Hustle Podcast as we empower entrepreneurial mamas to set impactful goals and effectively plan the year ahead. Hear the inspiring story of Jenny, a listener who achieved a milestone 1,000 sales on her Etsy shop, showing how a clear roadmap and community support can spark transformative success. We'll explore essential tools and technology that streamline your busy life, from wireless headphones that won't budge during workouts to indispensable apps like Trello and LastPass. Discover the art of balancing motherhood with entrepreneurship as we unpack my favorite organizational hacks, including the magical power of sticky notes.EPISODE NOTES: https://kaseyclin.com/blogs/podcast/8-favorite-items-to-own-your-life-as-a-mompreneurThanks for listening! Click one of the links below to. Learn how to design for crafting machines such as Cricut, Silhouette, Glowforge, sublimation or embroidery. Check out my designs on Etsy
How to generate sales overseas?With only 11.9% of UK SMEs exporting their goods & services internationally, more support is needed to help businesses scale overseas. So, I wanted to hear from a founder who has generated millions in international sales. Thea Green MBE founded Nails.INC in 1999 at the age of 23 & has since revolutionised the UK nail care industry with her polishes & treatments. In 2013, Nails.INC was awarded a Queen's Award for Enterprise for international trade & today exports to over 20 countries. Keep listening to hear Thea's advice on how to get started with sales and then how to conquer exporting.Thea's advice: Concentrate on the customers' needsEnjoy working out what the next trend will beHave good PR when starting upFind the new angleIf you believe in it, you will be able to sell itKeep your standards highIt's easier to sell when there's a story to personalise the product and make it relevantListen to the customer and solve their problemsExcite the customerEngage with the customer and listen to themIt's essential to employ good sales peopleRenew your enthusiasm by concentrating on the aspects of the business you enjoyIt's helpful to consider your budget over the long termSales will be transformed when you become a brand; and when you do your first business overseasFF&M enables you to own your own PR & produces podcasts.Recorded, edited & published by Juliet Fallowfield, 2023 MD & Founder of PR & Communications consultancy for startups Fallow, Field & Mason. Email us at hello@fallowfieldmason.com or DM us on instagram @fallowfieldmason. FF&M recommends: LastPass the password-keeping site that syncs between devices.Google Workspace is brilliant for small businessesBuzzsprout podcast 'how to' & hosting directoryCanva has proved invaluable for creating all the social media assets and audio bites.MUSIC CREDIT Funk Game Loop by Kevin MacLeod. Link & LicenceText us your questions for future founders. Plus we'd love to get your feedback, text in via Fan MailSupport the show
When I think of working in sales, two movies come to mind: The Wolf of Wall Street and Glengarry Glen Ross. Ruthless sales tactics where people will stop at nothing as long as it lines their pockets with money. My old friend Lawrence takes me along his journey in the sales space from retail to B2B, and busts some myths of salesmen.Guest: Lawrence LyItems mentioned:Backdoor Banter Podcast:https://www.instagram.com/backdoorbants/Grant Cardone training video:https://www.youtube.com/watch?v=VL1AESpPgNQChapters0:00 Intro1:05 How we know each other2:41 Why is Lawrence here, how he landed his first sales job6:59 How Lawrence and I applied for work as 16 year olds8:43 The WORST WORK EXPERIENCE EVER12:48 The most satisfying quitting story16:16 Never stay with the counter offer when you quit18:39 What was the commission there like?19:48 Extended warranties suck, my fridge warranty issue22:38 The motivation to get into sales - wolf of wall street?23:59 Was uni a scam?25:53 Experience working at Bing Lee27:55 That mate who hooks you up with the discounted goods29:41 Leaving for ANZ, dead people getting credit cards?32:57 Why not pivot into high positions within banking?35:00 After ANZ - JD Sports, crazy customers, physical threats43:20 How was the call centre environment?45:16 The uni capstone unit, an interesting group48:54 EHP Labs, $100 a day?!51:41 Whoring yourself out for any role after graduating54:20 The work at EHP Labs57:28 How to tailor the script for influencers1:01:19 The dream job wasn't the dream1:05:16 Moving to Gartner after getting fired1:11:29 Dealing with rejection1:12:49 Advice for someone starting in sales calls1:21:58 Why not advance within Gartner?1:24:02 How many states are there in Australia?1:26:11 How do you find prospects? A buffet during covid.1:30:00 What is Lastpass? Other password managers1:32:27 What other sales tactics are used in B2B?1:35:22 How is salary broken down?1:42:39 Why stick around LastPass?1:43:41 More hours = more money?1:46:25 How AI has helped in the world of sales1:47:55 How to maintain business relations1:49:32 Funny story - Lawrence's biggest Bing Lee sale1:56:37 Most creative way to close a sale - PRETENDING TO CONVERT TO CHRISTIANITY?!2:01:01 Advice for someone starting sales generally2:03:18 Reading body language, finding common ground2:06:33 Backdoor Banter Podcast
If a business has spent $100 million developing a product, it's a fair bet that they don't want it stolen in two seconds and uploaded to the web where anyone can use it for free.This problem exists in extreme form for AI companies. These days, the electricity and equipment required to train cutting-edge machine learning models that generate uncanny human text and images can cost tens or hundreds of millions of dollars. But once trained, such models may be only a few gigabytes in size and run just fine on ordinary laptops.Today's guest, the computer scientist and polymath Nova DasSarma, works on computer and information security for the AI company Anthropic with the security team. One of her jobs is to stop hackers exfiltrating Anthropic's incredibly expensive intellectual property, as recently happened to Nvidia. Rebroadcast: this episode was originally released in June 2022.Links to learn more, highlights, and full transcript.As she explains, given models' small size, the need to store such models on internet-connected servers, and the poor state of computer security in general, this is a serious challenge.The worries aren't purely commercial though. This problem looms especially large for the growing number of people who expect that in coming decades we'll develop so-called artificial ‘general' intelligence systems that can learn and apply a wide range of skills all at once, and thereby have a transformative effect on society.If aligned with the goals of their owners, such general AI models could operate like a team of super-skilled assistants, going out and doing whatever wonderful (or malicious) things are asked of them. This might represent a huge leap forward for humanity, though the transition to a very different new economy and power structure would have to be handled delicately.If unaligned with the goals of their owners or humanity as a whole, such broadly capable models would naturally ‘go rogue,' breaking their way into additional computer systems to grab more computing power — all the better to pursue their goals and make sure they can't be shut off.As Nova explains, in either case, we don't want such models disseminated all over the world before we've confirmed they are deeply safe and law-abiding, and have figured out how to integrate them peacefully into society. In the first scenario, premature mass deployment would be risky and destabilising. In the second scenario, it could be catastrophic — perhaps even leading to human extinction if such general AI systems turn out to be able to self-improve rapidly rather than slowly, something we can only speculate on at this point.If highly capable general AI systems are coming in the next 10 or 20 years, Nova may be flying below the radar with one of the most important jobs in the world.We'll soon need the ability to ‘sandbox' (i.e. contain) models with a wide range of superhuman capabilities, including the ability to learn new skills, for a period of careful testing and limited deployment — preventing the model from breaking out, and criminals from breaking in. Nova and her colleagues are trying to figure out how to do this, but as this episode reveals, even the state of the art is nowhere near good enough.Chapters:Cold open (00:00:00)Rob's intro (00:00:52)The interview begins (00:02:44)Why computer security matters for AI safety (00:07:39)State of the art in information security (00:17:21)The hack of Nvidia (00:26:50)The most secure systems that exist (00:36:27)Formal verification (00:48:03)How organisations can protect against hacks (00:54:18)Is ML making security better or worse? (00:58:11)Motivated 14-year-old hackers (01:01:08)Disincentivising actors from attacking in the first place (01:05:48)Hofvarpnir Studios (01:12:40)Capabilities vs safety (01:19:47)Interesting design choices with big ML models (01:28:44)Nova's work and how she got into it (01:45:21)Anthropic and career advice (02:05:52)$600M Ethereum hack (02:18:37)Personal computer security advice (02:23:06)LastPass (02:31:04)Stuxnet (02:38:07)Rob's outro (02:40:18)Producer: Keiran HarrisAudio mastering: Ben Cordell and Beppe RådvikTranscriptions: Katy Moore
Selling any product is a skill but selling a product with a luxury price tag is a nuanced skill. As this season is focused on sales I wanted to interview people with experience in differentiating their product in a crowded market & find out how they managed to sell it.Molly Goddard & Joel Jeffery co-founded the luxury pyjama brand Desmond & Dempsey in 2014. Over a decade the couple has redefined the concept of luxury sleepwear & secured listings in Harrods, Harvey Nichols & Selfridges very early on in their business. Keep listening to hear Molly & Joel's advice on how they tackled sales.Molly and Joel's Advice:Impart your message (in their case the benefits of relaxation) with positivity; buying this product is a treat for yourself, it's all about funIt's one thing to love your product but you must take sales seriouslyEnjoy the art of selling! Share news of your product as widely as you can, and always in an optimistic wayPay attention to the market and always note customer preferencesAsk your clients questions, constantly monitor their tastes and their attitudesBe aware of daily sales; if you can achieve wholesale orders this will give you the freedom to take out loansWhen selling to retail clients, find your niche in the marketUse instagram / a website / word of mouth / email your customersPR will pay off and is a valuable toolBranding is important; while obviously the product must be good, you also need to make your customers feel special. This is often achieved with some extra-special packagingYour customers are buying an expensive product and they should feel excited by both the purchase and the product, the anticipation and the realityFF&M enables you to own your own PR & produces podcasts.Recorded, edited & published by Juliet Fallowfield, 2023 MD & Founder of PR & Communications consultancy for startups Fallow, Field & Mason. Email us at hello@fallowfieldmason.com or DM us on instagram @fallowfieldmason. FF&M recommends: LastPass the password-keeping site that syncs between devices.Google Workspace is brilliant for small businessesBuzzsprout podcast 'how to' & hosting directoryCanva has proved invaluable for creating all the social media assets and audio bites.MUSIC CREDIT Funk Game Loop by Kevin MacLeod. Link & LicenceText us your questions for future founders. Plus we'd love to get your feedback, text in via Fan MailSupport the show
Miguel de Vega is the Chief Scientific Officer at Nillion. In this episode, we discuss the potential for what's known as "humanity's first blind computer" and its role to play alongside AI and crypto. Miguel unpacks how Nillion addresses the challenges of handling high value data, by leveraging privacy enhancing technologies (PETs) to enable users to securely store data on a peer-to-peer network, and allow for computations to be executed on the masked data, without the traditional need to decrypt data ahead of computation. We review a variety of Web3 and Web2 use cases unlocked by Nillion for massive emerging markets such as decentralized AI, plus why Nillion will soon launch its own tokenized incentives. ------
PureGym reports that 66% of Britons don't believe they look after their health as much as they should. Since good health is key to being productive, I wanted to hear from an expert about how founders can use fitness to boost their productivity. Following his retirement as captain of the England boxing team, George Veness, Founder & CEO of JAB Boxing Club in London, launched his business to make elite performance accessible to anyone & inspire his members to take control of their health. Keep listening to hear George's advice on how you can build fitness into your weekly routine as a founder & why exercise is so important for maintaining your productivity. George's Advice:Be pleased with your product before you start; believe in it and the team around you will tooPursuing fitness is a discipline, which will give you health and strengthIt will relieve stressAnd, just as important, it will give you self-belief, courage and emotional well-beingThe basics of fitness are nothing new. The essentials are: movement which leads to strength / rest and recovery (including hot and cold therapies) / good, natural food, fresh and not manufactured / good sleepWhen you are fit you will have better focus and clarity, you will make better decisions for your future life and you will be able to push boundariesKeep company with great peopleFollow a lifestyle with good habits and stick to your regimeDon't get distractedWhen you are making a long-term plan, break it down into manageable parts, like months; keep your end goal in sight and get there steadilyCelebrate milestonesEnjoy challengesTry keeping a diary where you write down what you plan to achieveKeep your vision simple; this way you will communicate it better both to your team and your customersFF&M enables you to own your own PR & produces podcasts.Recorded, edited & published by Juliet Fallowfield, 2023 MD & Founder of PR & Communications consultancy for startups Fallow, Field & Mason. Email us at hello@fallowfieldmason.com or DM us on instagram @fallowfieldmason. FF&M recommends: LastPass the password-keeping site that syncs between devices.Google Workspace is brilliant for small businessesBuzzsprout podcast 'how to' & hosting directoryCanva has proved invaluable for creating all the social media assets and audio bites.MUSIC CREDIT Funk Game Loop by Kevin MacLeod. Link & LicenceText us your questions for future founders. Plus we'd love to get your feedback, text in via Fan MailSupport the show
Every other week I'm republishing one of my most popular or impactful episodes and adding an update, new insight, or context that will help you benefit from it even more. This week I'm highlighting Episode 184, where I take you through my eight favorite online tools for nursing school that help set you up for success. NEWLY ADDED! Organize your school and study schedules with My Study Life. Get Google Drive with a free Google account: Google Drive. Say goodbye to password frustrations with LastPass. Take your notes for nursing school into digital format with GoodNotes and Notability. Improve your writing with Grammarly. Start your online search for research articles with Google Scholar and PubMed. Manage your bibliography and make writing scholarly papers easier with Zotero. Demystify APA formatting and scholarly writing with Purdue Owl APA. Reclaim your focus and embark on powerful work sessions with the Focus Keeper App for iOS or Pomodoro Timer for Android. ———— Full Transcript – Read the article FREE CLASS – If all you've heard are nursing school horror stories, then you need this class! Join me in this on-demand session where I dispel all those nursing school myths and show you that YES…you can thrive in nursing school without it taking over your life! Crucial Concepts Bootcamp – Start nursing school ahead of the game, or reset after a difficult first semester with my nursing school prep course, Crucial Concepts Bootcamp. Learn key foundation concepts, organization and time management, dosage calculations, and so much more. New Nursing Student Checklist – Grab this checklist which includes clinical and school supplies, things to organize, what to review, and more to help you prepare for nursing school.
In this episode, the hosts discuss the latest cybersecurity news, focusing on the recurring LastPass hack and its implications for personal security. They emphasize the importance of multifactor authentication and risk mitigation strategies. The conversation also explores the future of password management, advocating for the adoption of passkeys, and touches on the potential impact of quantum computing on encryption and security practices. Article: Old LastPass hack again leads to $5.4 million in stolen crypto coins https://www.techzine.eu/news/security/127230/old-lastpass-hack-again-leads-to-5-million-euros-in-stolen-crypto-coins/?fbclid=IwZXh0bgNhZW0CMTAAAR0Krt1_cg7YNk5rSE5cDakAPqKyA1nqi8FR-1OHlRwuLuWrwtu0bs0bfCE_aem_5ttb1yVhYx4VXBKvMs6cYQ Please LISTEN
Since D3FEND was founded to fill a gap created by the MITRE ATT&CK Matrix, it has come a long way. We discuss the details of the 1.0 release of D3FEND with Peter in this episode, along with some of the new tools they've built to go along with this milestone. To use MITRE's own words to describe the gap this project fills: "it is necessary that practitioners know not only what threats a capability claims to address, but specifically how those threats are addressed from an engineering perspective, and under what circumstances the solution would work" Segment Resources: https://d3fend.mitre.org In the enterprise security news, a final few fundings before the year closes out Arctic Wolf buys Cylance from Blackberry for cheap, a sentence that feels very weird to say the quiet HTTPS revolution passkeys are REALLY catching on resilience keeps showing up in the titles of news items Apple Intelligence insults the BBC's intelligence MITRE ATT&CK evals drama Lastpass breach drama continues All that and more, on this episode of Enterprise Security Weekly As we wrap up the year, we have an honest discussion about how important security really is to the business. We discuss some of Katie's predictions for AppSec in 2025, as well as "what sucks" in security! Visit https://www.securityweekly.com/esw for all the latest episodes! Show Notes: https://securityweekly.com/esw-388
Cybersecurity Today: LastPass Hack Fallout, TP-Link Router Ban, and Microsoft's Passwordless Future In our final daily news show of the season, host Jim Love covers key cybersecurity stories, including millions stolen from crypto wallets linked to the 2022 LastPass breach, potential US ban on TP-Link routers over national security concerns, and Microsoft's push for a passwordless future with passkeys. Don't miss our weekend wrap-up with the cybersecurity panel and special holiday content. Stay tuned for new episodes starting January 6th. Happy holidays! 00:00 Season Finale Announcement 00:29 Crypto Wallets Hacked: Fallout from LastPass Breach 02:38 TP Link Routers Under Scrutiny 04:38 Microsoft's Push for a Passwordless Future 06:38 Holiday Wishes and Future Plans
Since D3FEND was founded to fill a gap created by the MITRE ATT&CK Matrix, it has come a long way. We discuss the details of the 1.0 release of D3FEND with Peter in this episode, along with some of the new tools they've built to go along with this milestone. To use MITRE's own words to describe the gap this project fills: "it is necessary that practitioners know not only what threats a capability claims to address, but specifically how those threats are addressed from an engineering perspective, and under what circumstances the solution would work" Segment Resources: https://d3fend.mitre.org In the enterprise security news, a final few fundings before the year closes out Arctic Wolf buys Cylance from Blackberry for cheap, a sentence that feels very weird to say the quiet HTTPS revolution passkeys are REALLY catching on resilience keeps showing up in the titles of news items Apple Intelligence insults the BBC's intelligence MITRE ATT&CK evals drama Lastpass breach drama continues All that and more, on this episode of Enterprise Security Weekly As we wrap up the year, we have an honest discussion about how important security really is to the business. We discuss some of Katie's predictions for AppSec in 2025, as well as "what sucks" in security! Visit https://www.securityweekly.com/esw for all the latest episodes! Show Notes: https://securityweekly.com/esw-388
In the enterprise security news, a final few fundings before the year closes out Arctic Wolf buys Cylance from Blackberry for cheap, a sentence that feels very weird to say the quiet HTTPS revolution passkeys are REALLY catching on resilience keeps showing up in the titles of news items Apple Intelligence insults the BBC's intelligence MITRE ATT&CK evals drama Lastpass breach drama continues All that and more, on this episode of Enterprise Security Weekly Show Notes: https://securityweekly.com/esw-388
The Cybercrime Magazine Podcast brings you daily cybercrime news on WCYB Digital Radio, the first and only 7x24x365 internet radio station devoted to cybersecurity. Stay updated on the latest cyberattacks, hacks, data breaches, and more with our host. Don't miss an episode, airing every half-hour on WCYB Digital Radio and daily on our podcast. Listen to today's news at https://soundcloud.com/cybercrimemagazine/sets/cybercrime-daily-news. Brought to you by our Partner, Evolution Equity Partners, an international venture capital investor partnering with exceptional entrepreneurs to develop market leading cyber-security and enterprise software companies. Learn more at https://evolutionequity.com
Join us as we dive into the latest cybersecurity nightmares: Rhode Island's system breach, hospital hack exposing millions, university scams, school district data leaks, Teams vulnerabilities, LastPass fallout, and YouTube creator attacks. Plus, we'll explore the push for offensive cyber strategies against foreign threats. Don't miss this crucial update on the evolving digital battleground!
The Biden administration takes its first step to retaliate against China for the Salt Typhoon cyberattack. The Feds release a draft National Cyber Incident Response Plan. Telecom Namibia suffers a cyberattack. The Australian Information Commissioner has reached a $50 million settlement with Meta over the Cambridge Analytica scandal. CISA releases its 2024 year in review. LastPass hackers nab an additional five millions dollars. Texas Tech University notifies over 1.4 million individuals of a ransomware attack. Researchers discover a new DarkGate RAT attack vector using vishing. A fraudster gets 69 months in prison. On our Threat Vector segment, David Moulton speaks with Nir Zuk, Founder and CTO of Palo Alto Networks about predictions for 2025. Surveillance tweaks our brains in unexpected ways. Remember to leave us a 5-star rating and review in your favorite podcast app. Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you'll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn. Threat Vector Segment On our Threat Vector segment, we preview this week's episode where host David Moulton talks with Nir Zuk, Founder and CTO of Palo Alto Networks. They talk about Palo Alto Networks' predictions for 2025, focusing on the shift to unified data security platforms and the growing importance of AI in cybersecurity. You can catch new episodes of Threat Vector every Thursday here and on your favorite podcast app. Selected Reading Biden Administration Takes First Step to Retaliate Against China Over Hack (The New York Times) US Unveils New National Cyber Incident Response Plan (Infosecurity Magazine) Telecom Namibia Cyberattack: 400,000 Files Leaked (The Cyber Express) Landmark settlement of $50m from Meta for Australian users impacted by Cambridge Analytica incident (OAIC) CISA Warns of New Windows Vulnerability Used in Hacker Attacks (CyberInsider) CISA 2024 Year in review (CISA) LastPass threat actor steals $5.4M from victims just a week before Xmas (Cointelegraph) Texas Tech University Data Breach Impacts 1.4 Million People (SecurityWeek) Microsoft Teams Vishing Spreads DarkGate RAT (Dark Reading) Man Accused of SQL Injection Hacking Gets 69-Month Prison Sentence (SecurityWeek) The psychological implications of Big Brother's gaze (SCIMEX) Share your feedback. We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. Want to hear your company in the show? You too can reach the most influential leaders and operators in the industry. Here's our media kit. Contact us at cyberwire@n2k.com to request more info. The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc. Learn more about your ad choices. Visit megaphone.fm/adchoices
70% of us use phones for our work, yet we all know how much they distract us. As productivity is crucial for any business I wanted to speak to an expert to help manage this necessary evil.Dr Kristy Goodwin is a neuro-performance scientist & Australia's leading expert on peak performance in the digital age. Her book Dear Digital, We Need To Talk enables individuals & organisations to enhance their performance & productivity in the digitally-intense world we live in & conquer tech distractions. Keep listening to hear Dr Kristy's advice on how to use digital tools to help us and not hinder, how to work in tandem with your neurobiology to achieve your goals & why rest really is a super power.Kristy's advice:Know your goals Success must be sustainableListen to your body; you cannot outperform itYou will have 4 - 6 hours a day of best performanceRemember that time spent not conspicuously working is often the most valuable productive timeFocussing our eyes on a small screen or area triggers a stress responseWe are programmed to sigh, or exhale fully, every five minutes; however, staring at screens typically means we are holding our breathWe are more successful if we can direct our focus and avoid distractionLeave margins - ie. blank spaces, unprogrammed gaps It is NOT about the hours you put in - it's about the outcomesBe clear to others about how you wish to be contactedIdentify when you are at your most productive You can bundle your notifications Have a VIP list and block everyone elseSleep is vital; get to know your own sleep pattern and keep it regularAs a founder, make sure you - and your team - enjoy not just the results of your work but the process itselfTech robs us of our time, our energy and our attention; be aware of this and take controlLive by design, not defaultFF&M enables you to own your own PR & produces podcasts. Recorded, edited & published by Juliet Fallowfield, 2023 MD & Founder of PR & Communications consultancy for startups Fallow, Field & Mason. Email us at hello@fallowfieldmason.com or DM us on instagram @fallowfieldmason. FF&M recommends: LastPass the password-keeping site that syncs between devices.Google Workspace is brilliant for small businessesBuzzsprout podcast 'how to' & hosting directoryCanva has proved invaluable for creating all the social media assets and audio bites.MUSIC CREDIT Funk Game Loop by Kevin MacLeod. Link & LicenceText us your questions for future founders. Plus we'd love to get your feedback, text in via Fan MailSupport the show
Are the world's most popular websites using outdated password policies?
While the holiday season ramps up, it's important to remember that holiday shoppers aren't the only busy ones this year. Identity thieves and scammers take advantage of this busy season to steal information. While you're out there in-person or shopping online, make sure you guard your cards and card information to ensure your transactions are secure. Links: Learn more about secure password managers like LastPass Learn more about Google Pay, Apple Pay, PayPal Add your Triangle cards to a mobile wallet for secure and convenient payment Check out TCU University for more financial education tips and resources! Follow us on Facebook, Instagram and Twitter! Learn more about Triangle Credit Union Transcript: Welcome to Money Tip Tuesday from the Making Money Personal podcast. We all do our shopping however we feel most comfortable. Some love going out to a physical store to explore the shelves and find that perfect gift. Others like to comfortably camp out on the couch and browse websites for their holiday hunt. Whichever way you choose to shop this year, remember to keep security top of mind. Fraud attempts increase significantly during the shopping season so it's important to consider whether anything insidious is hiding behind that tempting email, social media ad or website. Scammers want your payment information. They target credit card transactions both in-person and online in hopes to steal information from as many unsuspecting shoppers as they can. This holiday, remember to guard your payment information whenever and wherever you pay. For those who prefer shopping online keep these security tips top of mind before you go through the checkout. Make sure the website is secure. Look for the lock icon at the top URL address bar to ensure information being transmitted is encrypted. Don't save your card information in browsers. Instead use a secure digital wallet or vault like LastPass. Don't make payments over unsecured WI-FI or mobile networks. Scammers and hackers can monitor public, unsecured Wi-Fi sources to intercept sensitive data that might be transmitted Use an online payment company that doesn't use card numbers like Google Pay, Apple Pay or PayPal. For those who still shop in-person bad actors can still target your physical card transactions. Remember these tips when using your cards out in public. When using self-pay locations like gas stations, stand-alone ATMs and parking terminals, remember to examine the pump or terminal for any signs of tampering, cameras or card skimmers. Use the contactless payment method for physical cards instead of inserting the EMV chip or swiping the magnetic strip. Contactless methods are more secure when transmitting data Don't shy away from using your phone's mobile wallet to store your cards. Mobile wallets keep all your card information secure; they transmit encrypted codes rather than card information during payment and you get the bonus of no longer needing to carry around physical cards. If you lose your physical card, immediately lock it from any future use until you can find it or report it as lost to the credit card company One final way to keep your cards secure is to get into the habit of monitoring all transactions. Set up transaction alerts to get instant notifications any time your card is charged so that way if suspicious activity occurs you can report it right away. If there are any other tips or topics you'd like us to cover, let us know at tcupodcast@trianglecu.org. Like and follow our Making Money Personal FB and IG page, and look for our sponsor, Triangle Credit Union, on social media to share your thoughts. Thanks for listening to today's Money Tip Tuesday, and be sure to check out our other tips and episodes on the Making Money Personal podcast. Have a great day!
The well-respected photo editing app Pixelmator has been purchased by Apple; are its creative tools coming to Apple Photos? Apple expands Apple Intelligence features in the latest betas of its operating systems. And speaking of Apple Intelligence, Apple's own commercials paint its users as not so intelligent. Show Notes: You can trick Apple Intelligence into following sensitive prompts if they sound “happy” Apple acquires Pixelmator: “A new home for Pixelmator” How to install App Store apps on an external SSD Apple's New USB-C Accessories Require macOS Sequoia, Don't Work Properly With macOS 15.2 Beta In Apple's new ads for AI tools, we're all total idiots Security research on Private Cloud Compute LastPass warns of fake support centers trying to steal customer data LastPass password manager suffers massive data breach Google fixes two Android zero-days used in targeted attacks Android 15's theft protection features keep your device and data safe Intego Mac Premium Bundle X9 is the ultimate protection and utility suite for your Mac. Download a free trial now at intego.com, and use this link for a special discount when you're ready to buy.
Windows Endpoint Security Ecosystem Summit Aging storage media does NOT last forever How Navy chiefs conspired to get themselves illegal warship Wi-Fi adam:ONE named the #1 best Secure Access Service Edge (SASE) solution AI Talk Password Manager Injection Attacks Show Notes - https://www.grc.com/sn/SN-992-Notes.pdf Hosts: Steve Gibson and Mikah Sargent Download or subscribe to this show at https://twit.tv/shows/security-now. Get episodes ad-free with Club TWiT at https://twit.tv/clubtwit You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Sponsors: threatlocker.com for Security Now joindeleteme.com/twit promo code TWIT 1password.com/securitynow vanta.com/SECURITYNOW