Podcasts about let us know

  • 356PODCASTS
  • 932EPISODES
  • 46mAVG DURATION
  • 5WEEKLY NEW EPISODES
  • Dec 13, 2025LATEST

POPULARITY

20172018201920202021202220232024


Best podcasts about let us know

Show all podcasts related to let us know

Latest podcast episodes about let us know

ITSPmagazine | Technology. Cybersecurity. Society
Black Hat Europe 2025 Wrap-Up: Suzy Pallett on Global Expansion, AI Threats, and Defending Together | On Location Coverage With Sean Martin & Marco Ciappelli

ITSPmagazine | Technology. Cybersecurity. Society

Play Episode Listen Later Dec 13, 2025 19:19


____________Guests:Suzy PallettPresident, Black Hat. Cybersecurity.On LinkedIn: https://www.linkedin.com/in/suzy-pallett-60710132/The Cybersecurity Community Finds Its Footing in Uncertain TimesThere is something almost paradoxical about the cybersecurity industry. It exists because of threats, yet it thrives on trust. It deals in technical complexity, yet its beating heart is fundamentally human: people gathering, sharing knowledge, and collectively deciding that defending each other matters more than protecting proprietary advantage.This tension—and this hope—was on full display at Black Hat Europe 2025 in London, which just wrapped up at the ExCel Centre with attendance growing more than 25 percent over last year. For Suzy Pallett, the newly appointed President of Black Hat, the numbers tell only part of the story."What I've found from this week is the knowledge sharing, the insights, the open source tools that we've shared, the demonstrations that have happened—they've been so instrumental," Pallett shared in a conversation with ITSPmagazine. "Cybersecurity is unlike any other industry I've ever been close to in the strength of that collaboration."Pallett took the helm in September after Steve Wylie stepped down following eleven years leading the brand through significant growth. Her background spans over two decades in global events, most recently with Money20/20, the fintech conference series. But she speaks of Black Hat not as a business to be managed but as a community to be served.The event itself reflected the year's dominant concerns. AI agents and supply chain vulnerabilities emerged as central themes, continuing conversations that dominated Black Hat USA in Las Vegas just months earlier. But Europe brought its own character. Keynotes ranged from Max Meets examining whether ransomware can actually be stopped, to Linus Neumann questioning whether compliance checklists might actually expose organizations to greater risk rather than protecting them."He was saying that the compliance checklists that we're all being stressed with are actually where the vulnerabilities lie," Pallett explained. "How can we work more collaboratively together so that it's not just a compliance checklist that we get?"This is the kind of question that sits at the intersection of technology and policy, technical reality and bureaucratic aspiration. It is also the kind of question that rarely gets asked in vendor halls but deserves space in our collective thinking.Joe Tidy, the BBC journalist behind the EvilCorp podcast, delivered a record-breaking keynote attendance on day two, signaling the growing appetite for cybersecurity stories that reach beyond the practitioner community into broader public consciousness. Louise Marie Harrell spoke on technical capacity and international accountability—a reminder that cyber threats respect no borders and neither can our responses.What makes Black Hat distinct, Pallett noted, is that the conversations happening on the business hall floor are not typical expo fare. "You have the product teams, you have the engineers, you have the developers on those stands, and it's still product conversations and technical conversations."Looking ahead, Pallett's priorities center on listening. Review boards, advisory boards, pastoral programs, scholarships—these are the mechanisms through which she intends to ensure Black Hat remains, in her words, "a platform for them and by them."The cybersecurity industry faces a peculiar burden. What used to happen in twelve years now happens in two days, as Pallett put it. The pace is exhausting. The threats keep evolving. The cat-and-mouse game shows no signs of ending.But perhaps that is precisely why events like this matter. Not because they offer solutions to every problem, but because they remind an industry under constant pressure that it is not alone in the fight. That collaboration is not weakness. That sharing knowledge freely is not naïve—it is strategic.Black Hat Europe 2025 may have ended, but the conversations it sparked will carry forward into 2026 and beyond.____________HOSTS:Sean Martin, Co-Founder, ITSPmagazine and Studio C60 | Website: https://www.seanmartin.comMarco Ciappelli, Co-Founder, ITSPmagazine and Studio C60 | Website: https://www.marcociappelli.comCatch all of our event coverage: https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverageWant to share an Event Briefing as part of our event coverage? Learn More

Strictly Stalking
308. Thirty Years of Fear: Stalking Rhonda

Strictly Stalking

Play Episode Listen Later Dec 9, 2025 41:59


Rhonda met a patron at a local tavern. She never dated him, never gave him her number, never had any kind of relationship with him. But none of that mattered to him. He decided she was his, and he's been hunting her ever since. For more than thirty years, Rhonda has endured letters, threats, and sudden, terrifying appearances. And every time she went to the police for help, she heard the same response: "No—he hasn't hurt you." That was true until the day she finally fought back. But instead of arresting him, the police arrested her. What followed feels like something out of a movie—a train, a near-death moment, and even a diamond ring. HAVE YOU EXPERIENCED STALKING?  LET US KNOW: strictlystalkingpod@gmail.com OTHER LINKS lovelustfear | hosted by Jake Deptula Apple Podcasts | https://podcasts.apple.com/us/podcast/lovelustfear/id1735876283?uo=4 Spotify | https://open.spotify.com/show/0e3ndcf5u8lZ5lhN1lvWec Amazon Music | https://music.amazon.com/podcasts/b06d0ea8-cb29-4c3a-98e6-0249d84df748 Instagram | https://www.instagram.com/lovelustfearpod/ Submissions | https://lovelustfear.aidaform.com/lovelustfear The Last Trip - Podcast - hosted by Jaimie Beebe Listen & Subscribe to The Last Trip - https://audioboom.com/channels/5119581-the-last-trip Follow The Last Trip on Instagram - https://www.instagram.com/thelasttripcrimepod/ And Subscribe for all the updates on Patreon - https://www.patreon.com/TheLastTripPodcast Instagram: @strictlystalkingpod @feathergirl77 @jaked3000

ITSPmagazine | Technology. Cybersecurity. Society
AI, Quantum, and the Changing Role of Cybersecurity | ISC2 Security Congress 2025 Coverage with Jon France, Chief Information Security Officer at ISC2 | On Location with Sean Martin and Marco Ciappelli

ITSPmagazine | Technology. Cybersecurity. Society

Play Episode Listen Later Dec 3, 2025 26:22


What Security Congress Reveals About the State of CybersecurityThis discussion focuses on what ISC2 Security Congress represents for practitioners, leaders, and organizations navigating constant technological change. Jon France, Chief Information Security Officer at ISC2, shares how the event brings together thousands of cybersecurity practitioners, certification holders, chapter leaders, and future professionals to exchange ideas on the issues shaping the field today.  Themes That Stand OutAI remains a central point of attention. France notes that organizations are grappling not only with adoption but with the shift in speed it introduces. Sessions highlight how analysts are beginning to work alongside automated systems that sift through massive data sets and surface early indicators of compromise. Rather than replacing entry-level roles, AI changes how they operate and accelerates the decision-making path. Quantum computing receives a growing share of focus as well. Attendees hear about timelines, standards emerging from NIST, and what preparedness looks like as cryptographic models shift.  Identity-based attacks and authorization failures also surface throughout the program. With machine-driven compromises becoming easier to scale, the community explores new defenses, stronger controls, and the practical realities of machine-to-machine trust. Operational technology, zero trust, and machine-speed threats create additional urgency around modernizing security operations centers and rethinking human-to-machine workflows.  A Place for Every Stage of the CareerFrance describes Security Congress as a cross-section of the profession: entry-level newcomers, certification candidates, hands-on practitioners, and CISOs who attend for leadership development. Workshops explore communication, business alignment, and critical thinking skills that help professionals grow beyond technical execution and into more strategic responsibilities.  Looking Ahead to the Next CongressThe next ISC2 Security Congress will be held in October in the Denver/Aurora area. France expects AI and quantum to remain key themes, along with contributions shaped by the call-for-papers process. What keeps the event relevant each year is the mix of education, networking, community stories, and real-world problem-solving that attendees bring with them.The ISC2 Security Congress 2025 is a hybrid event taking place from October 28 to 30, 2025 Coverage provided by ITSPmagazineGUEST:Jon France, Chief Information Security Officer at ISC2 | On LinkedIn: https://www.linkedin.com/in/jonfrance/HOST:Sean Martin, Co-Founder, ITSPmagazine and Studio C60 | Website: https://www.seanmartin.comFollow our ISC2 Security Congress coverage: https://www.itspmagazine.com/cybersecurity-technology-society-events/isc2-security-congress-2025Catch all of our event coverage: https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverageISC2 Security Congress: https://www.isc2.orgNIST Post-Quantum Cryptography Standards: https://csrc.nist.gov/projects/post-quantum-cryptographyISC2 Chapters: https://www.isc2.org/chaptersWant to share an Event Briefing as part of our event coverage? Learn More

Strictly Stalking
307. Across State Lines: Stalking Claire

Strictly Stalking

Play Episode Listen Later Dec 2, 2025 84:56


Claire had barely settled into her new life across the country when the stalking began—launched by a woman she had never even met. A single DM spiraled into relentless messages, emails, and voicemails, each one proving her every online move was being monitored in real time. The harassment soon reached her workplace, and the interstate, fully virtual nature of the stalking made getting help feel impossible. Everything changed when a dispatcher finally recognized the severity of the evidence she'd been documenting, leading to an arrest warrant, an out-of-state arrest, and extradition. Now, Claire has ended the relationship, gone no-contact, and is rebuilding her life after the emotional and financial fallout.  HAVE YOU EXPERIENCED STALKING?  LET US KNOW: strictlystalkingpod@gmail.com OTHER LINKS The Last Trip - Podcast - hosted by Jaimie Beebe Listen & Subscribe to The Last Trip - https://audioboom.com/channels/5119581-the-last-trip Follow The Last Trip on Instagram - https://www.instagram.com/thelasttripcrimepod/ And Subscribe for all the updates on Patreon - https://www.patreon.com/TheLastTripPodcast lovelustfear | hosted by Jake Deptula Apple Podcasts | https://podcasts.apple.com/us/podcast/lovelustfear/id1735876283?uo=4 Spotify | https://open.spotify.com/show/0e3ndcf5u8lZ5lhN1lvWec Amazon Music | https://music.amazon.com/podcasts/b06d0ea8-cb29-4c3a-98e6-0249d84df748 Instagram | https://www.instagram.com/lovelustfearpod/ Submissions | https://lovelustfear.aidaform.com/lovelustfear Instagram: @strictlystalkingpod @feathergirl77 @jaked3000  

Strictly Stalking
Stalking, Psychology & Law Enforcement with Dr. Shiloh

Strictly Stalking

Play Episode Listen Later Nov 28, 2025 50:13


When it comes to stalking, obsession, and criminal psychology, few understand both sides like Dr. Shiloh. She's a California-licensed psychologist working with Los Angeles law enforcement on clinical support, crisis negotiation, and the psychological toll of the job. Before that, she was Officer Shiloh — a patrol cop, background investigator, and terrorism liaison. Now a forensic psychologist, she specializes in high-risk offenders and the minds behind violent crime, with over a decade studying why people cross the line and how victims can protect themselves. Today, she's here to break down how stalkers think — and what survivors need to know to stay safe. HAVE YOU EXPERIENCED STALKING?  LET US KNOW: strictlystalkingpod@gmail.com GUEST LINKS https://www.instagram.com/lanotsopodcast/ https://www.facebook.com/LAnotsoconfidential https://www.youtube.com/channel/UCtvmmYgrZ-hSbw7sWuzC9rQ?view_as=subscriber https://www.la-not-so-confidential.com/ https://www.patreon.com/join/lanotsopodcast  OTHER LINKS Instagram: @strictlystalkingpod @feathergirl77 @jaked3000  

Yalla Home
Does listening to an audiobook count as reading? Yes or No. Let us know

Yalla Home

Play Episode Listen Later Nov 28, 2025 4:33


Listen to #Pulse95Radio in the UAE by tuning in on your radio (95.00 FM) or online on our website: www.pulse95radio.com ************************ Follow us on Social. www.instagram.com/pulse95radio www.facebook.com/pulse95radio www.twitter.com/pulse95radio

Strictly Stalking
306. Hacked, Threatened, Stalked

Strictly Stalking

Play Episode Listen Later Nov 25, 2025 48:06


When Timothy divorced his ex-husband, he thought the nightmare was finally over. But it was only the beginning. The messages started first — threats that crept into every corner of his life. Then came the hacking, the impersonation, the total loss of privacy. And his stalker didn't stop with him. He went after Timothy's family, his friends… even tampered with his mother's medical care — determined to destroy everything that mattered. Now, Timothy is speaking out. He's sharing how his ex turned technology into a weapon — and how he's fighting to take his life back. HAVE YOU EXPERIENCED STALKING?  LET US KNOW: strictlystalkingpod@gmail.com OTHER LINKS lovelustfear | hosted by Jake Deptula Apple Podcasts | https://podcasts.apple.com/us/podcast/lovelustfear/id1735876283?uo=4 Spotify | https://open.spotify.com/show/0e3ndcf5u8lZ5lhN1lvWec Amazon Music | https://music.amazon.com/podcasts/b06d0ea8-cb29-4c3a-98e6-0249d84df748 Instagram | https://www.instagram.com/lovelustfearpod/ Submissions | https://lovelustfear.aidaform.com/lovelustfear The Last Trip - Podcast - hosted by Jaimie Beebe Listen & Subscribe to The Last Trip - https://audioboom.com/channels/5119581-the-last-trip Follow The Last Trip on Instagram - https://www.instagram.com/thelasttripcrimepod/ And Subscribe for all the updates on Patreon - https://www.patreon.com/TheLastTripPodcast Instagram: @strictlystalkingpod @feathergirl77 @jaked3000  

The Dana & Parks Podcast
HOUR 4: Just pick a site for the stadiums and let us know where they will be already.

The Dana & Parks Podcast

Play Episode Listen Later Nov 24, 2025 33:21


HOUR 4: Just pick a site for the stadiums and let us know where they will be already. full 2001 Mon, 24 Nov 2025 23:00:00 +0000 gxgBA2hi7I6YaVMe8skeNPne01YwT5NU news The Dana & Parks Podcast news HOUR 4: Just pick a site for the stadiums and let us know where they will be already. You wanted it... Now here it is! Listen to each hour of the Dana & Parks Show whenever and wherever you want! © 2025 Audacy, Inc. News False https:/

Strictly Stalking
305. "I Just Want Him to Leave Me Alone": Stalking Bailee

Strictly Stalking

Play Episode Listen Later Nov 18, 2025 51:18


For years, Bailee has been hunted by a man who refuses to let her go. He's torn apart her home, attacked her friends, and forced her child to grow up in constant fear. No matter how far she ran, he always found her. But Bailee refused to break. Now a wife and mother, she's still standing — proof that survival is stronger than obsession. Bailee is speaking out to set the record straight: stalking isn't about love, or persistence. It's about power, control… and the fight to stay alive. HAVE YOU EXPERIENCED STALKING?  LET US KNOW: strictlystalkingpod@gmail.com OTHER LINKS The Last Trip - Podcast - hosted by Jaimie Beebe Listen & Subscribe to The Last Trip - https://audioboom.com/channels/5119581-the-last-trip Follow The Last Trip on Instagram - https://www.instagram.com/thelasttripcrimepod/ And Subscribe for all the updates on Patreon - https://www.patreon.com/TheLastTripPodcast lovelustfear | hosted by Jake Deptula Apple Podcasts | https://podcasts.apple.com/us/podcast/lovelustfear/id1735876283?uo=4 Spotify | https://open.spotify.com/show/0e3ndcf5u8lZ5lhN1lvWec Amazon Music | https://music.amazon.com/podcasts/b06d0ea8-cb29-4c3a-98e6-0249d84df748 Instagram | https://www.instagram.com/lovelustfearpod/ Submissions | https://lovelustfear.aidaform.com/lovelustfear Instagram: @strictlystalkingpod @feathergirl77 @jaked3000  

Strictly Stalking
304. The Stalker Slept Beside Her

Strictly Stalking

Play Episode Listen Later Nov 11, 2025 53:15


When the messages started, Kate felt a chill she couldn't explain. Anonymous threats. Cryptic notes. Someone out there was watching her — or so she thought. Each message pulled her deeper into fear and confusion. Her friends were being dragged into it, her life unraveling one text at a time. But the truth was far darker than she imagined. The person tormenting her wasn't a stranger hiding in the shadows…it was someone much closer. Now, Kate's telling her story — how she uncovered the horrifying secret that her stalker was the man she thought she loved. HAVE YOU EXPERIENCED STALKING?  LET US KNOW: strictlystalkingpod@gmail.com OTHER LINKS lovelustfear | hosted by Jake Deptula Apple Podcasts | https://podcasts.apple.com/us/podcast/lovelustfear/id1735876283?uo=4 Spotify | https://open.spotify.com/show/0e3ndcf5u8lZ5lhN1lvWec Amazon Music | https://music.amazon.com/podcasts/b06d0ea8-cb29-4c3a-98e6-0249d84df748 Instagram | https://www.instagram.com/lovelustfearpod/ Submissions | https://lovelustfear.aidaform.com/lovelustfear The Last Trip - Podcast - hosted by Jaimie Beebe Listen & Subscribe to The Last Trip - https://audioboom.com/channels/5119581-the-last-trip Follow The Last Trip on Instagram - https://www.instagram.com/thelasttripcrimepod/ And Subscribe for all the updates on Patreon - https://www.patreon.com/TheLastTripPodcast Instagram: @strictlystalkingpod @feathergirl77 @jaked3000

The Friendship Tour
BONUS | Let Us Know You're Coming!

The Friendship Tour

Play Episode Listen Later Nov 7, 2025 2:34


Hi Ladies! Come hang out with us! You're officially invited to join The Heart of Friendship Book Club, which is meeting soon! We're reading The Vanishing Half by Brit Bennett — and the meeting won't be the same without you. So, grab your book and come join the conversation! You can let me know you're coming by emailing me at The Heart of Friendship Community 

Strictly Stalking
303. The Stalker's Confession-Two Men Terrorized

Strictly Stalking

Play Episode Listen Later Nov 4, 2025 64:19


When Joseph became the target of a cunning stalker, he had no idea who was behind it. The stalker was a master manipulator — framing others, spinning lies, and weaving himself deeper and deeper into Joseph's life, all while remaining unseen. By the time the truth came to light, the reveal shocked everyone. The stalker was finally arrested — but freedom only fueled his obsession. That's when a stranger named Matt entered the picture. At first, their lives had nothing to do with each other… until Matt uncovered something chilling: the stalker's own confession. What happened next would unravel the web of deceit, connect two men who had never met, and expose a relentless predator — bringing him, at last, to justice. HAVE YOU EXPERIENCED STALKING?  LET US KNOW: strictlystalkingpod@gmail.com OTHER LINKS The Last Trip - Podcast - hosted by Jaimie Beebe Listen & Subscribe to The Last Trip - https://audioboom.com/channels/5119581-the-last-trip Follow The Last Trip on Instagram - https://www.instagram.com/thelasttripcrimepod/ And Subscribe for all the updates on Patreon - https://www.patreon.com/TheLastTripPodcast lovelustfear | hosted by Jake Deptula Apple Podcasts | https://podcasts.apple.com/us/podcast/lovelustfear/id1735876283?uo=4 Spotify | https://open.spotify.com/show/0e3ndcf5u8lZ5lhN1lvWec Amazon Music | https://music.amazon.com/podcasts/b06d0ea8-cb29-4c3a-98e6-0249d84df748 Instagram | https://www.instagram.com/lovelustfearpod/ Submissions | https://lovelustfear.aidaform.com/lovelustfear Instagram: @strictlystalkingpod @feathergirl77 @jaked3000  

ITSPmagazine | Technology. Cybersecurity. Society
How to Market to Cybersecurity's Most Elusive Buyers: AI, Emotion, and the Human Touch - Interview with Gianna Whitver and Maria Velasquez | Cyber Marketing Con 2025 Coverage | On Location with Sean Martin and Marco Ciappelli

ITSPmagazine | Technology. Cybersecurity. Society

Play Episode Listen Later Nov 3, 2025 30:24


How to Market to Cybersecurity's Most Elusive Buyers: AI, Emotion, and the Human Touch - Interview with Gianna Whitver and Maria Velasquez | Cyber Marketing Con 2025 Coverage | On Location with Sean Martin and Marco CiappelliCyberMarketingCon 2025 In Person & Virtual https://www.cybermarketingconference.comDec 7-10, 2025 in Austin, Texas Why Cybersecurity Marketing Demands a Different PlaybookThe cybersecurity industry presents a paradox for marketers. While practitioners work with cutting-edge technology, traditional marketing approaches consistently fall flat. Gianna Whitver and Maria Velasquez, co-founders of the Cybersecurity Marketing Society, have spent six years understanding why—and they're sharing those insights at CyberMarketingCon 2025 this December in Austin.The challenge begins with the audience itself. Security professionals operate under constant pressure, actively preventing threats while juggling competing priorities. This stress creates an environment where patience for marketing noise evaporates instantly. Unlike other industries where buyers might browse vendor websites or respond to cold outreach, cybersecurity practitioners have both the technical sophistication to evade tracking and the motivation to control their own buying journey."Our buyer is highly elusive," Whitver explains. "They're saving the world and their companies from threats. When vendors reach out, it's an interruption to critical work." This dynamic forces marketers to rethink fundamental assumptions about how business gets done.The numbers tell part of the story. With over 5,000 cybersecurity vendors flooding the market, standing out based solely on technical specifications has become nearly impossible. Many solutions address similar problems with comparable features. The differentiator, Velasquez argues, isn't in the technology itself but in how that technology transforms the buyer's daily experience."We have to shed that technical layer and go for the emotion," Velasquez says. "If they buy our product, how is it gonna make them feel? Are they gonna get their weekends back with family? Are they actually gonna go to sleep without stress?" This human-centered approach represents a fundamental shift from the feeds-and-speeds messaging that dominated cybersecurity marketing for years.The industry is witnessing what Velasquez calls an "evolution slash revolution" in marketing tactics. Humor, entertainment, and authentic storytelling are replacing dense whitepapers as the first touch point. The goal isn't to dumb down complex technology but to create space for meaningful engagement by first addressing the emotional reality of a stressful profession.Trust remains the currency that matters most. Peer recommendations carry exponentially more weight than any advertising campaign. Security professionals rely on trusted networks to validate purchasing decisions, making community building and genuine thought leadership more valuable than aggressive outreach. Word-of-mouth referrals from colleagues who have seen real results trump even the most sophisticated demand generation campaigns.The emergence of AI as a marketing buzzword presents both opportunity and risk. Whitver notes that countless vendors now position themselves as "AI-native" or "agentic AI" solutions without articulating meaningful differentiation. "If that's what you remember about their product, what do you actually do?" she asks. The challenge for marketers is communicating AI's business value without contributing to the noise.CyberMarketingCon 2025 addresses these challenges head-on. Running December 7-10 in Austin, the conference brings together more than 550 marketing professionals for hands-on workshops, peer learning, and practical strategy sessions. Dedicated tracks cover brand, demand generation, operations, communications, and product marketing, with special summits for CEOs and sales leaders.Hands-on AI workshops represent a conference highlight. Attendees can build marketing agents using n8n, explore Clay for go-to-market planning, or participate in a marketer-focused capture-the-flag hacking exercise. The "Marketing Time Machine" theme balances timeless fundamentals with forward-looking innovation, acknowledging that effective marketing requires both solid foundations and experimental thinking.What sets CyberMarketingCon apart is its community-first philosophy. Despite 40-50% year-over-year growth, organizers prioritize maintaining an intimate, reunion-style atmosphere. Many CMOs bring entire teams for what becomes a working offsite, with different members attending specialized sessions then synthesizing insights into unified strategies.The conference's success metric reflects this philosophy. "Our KPI is: is it worth your time?" Whitver says. In an industry where time represents the scarcest resource, that might be the most important question of all.For cybersecurity marketers navigating an increasingly complex landscape, CyberMarketingCon offers something rare—a chance to learn from peers facing identical challenges, build practical skills, and remember that even in a technical industry, it's humans talking to humans. CyberMarketingCon 2025 In Person & Virtual https://www.cybermarketingconference.comDec 7-10, 2025 in Austin, Texas GUEST:Gianna WhitverCo-Founder & CEO, Cybersecurity Marketing Society | Cybersecurity GTM Industry Resource | Cybersecurity Marketing | Bees & Cybersecurity | Podcast Host | Community | (I like to build things & laugh a lot & tell jokes)Maria Velasquez

Strictly Stalking
Stalking, Justice, and Hope: The Work of AEquitas

Strictly Stalking

Play Episode Listen Later Oct 31, 2025 54:00


Jennifer Gentile Long is the CEO and co-founder of AEquitas, a nonprofit transforming how sexual violence, trafficking, intimate partner violence, and stalking are prosecuted. She began her career as a Philadelphia Assistant District Attorney, fighting for victims of abuse and demanding justice in the courtroom. Over time, her mission grew beyond one city—leading national efforts to change how prosecutors handle these crimes. Today, through AEquitas, Jennifer works with prosecutors and policymakers around the world, bringing innovation, accountability, and compassion to the pursuit of justice. She's here to share how she and her team are changing systems, empowering survivors, and reshaping what justice can look like. HAVE YOU EXPERIENCED STALKING? LET US KNOW: strictlystalkingpod@gmail.com EPISODE LINKS For more information on the prosecution of stalking crimes please visit AEquitas' Resource Page The Stalking Protection, Awareness, and Resource Center (SPARC) a project of AEquitas, and listen to Stalking in the Digital Age on Just Champions, The AEquitas Podcast. If you'd like more info about AEquitas visit: https://aequitasresource.org/ or email us at: info@aequitasresource.org. Follow AEquitas on Instagram @aequitas_resource https://aequitasresource.org/ https://www.stalkingawareness.org/ https://www.stalkingawareness.org/external-resources/ OTHER LINKS Instagram: @strictlystalkingpod @feathergirl77 @jaked3000

Strictly Stalking
302. Barely Escaped: Stalking Tori

Strictly Stalking

Play Episode Listen Later Oct 28, 2025 73:08


Tori is a hairstylist, a single mom, and a survivor. For two long years, her world was consumed by stalking, harassment, and terrifying violence—ending in a brutal fight for her life that she barely escaped. Her abusive ex, the father of her child, was finally arrested and locked away. But even with felony stalking charges, he's serving just two years. And Tori knows—that's nowhere near enough. Today, she's breaking her silence. Urged by her best friend—who was also one of his victims—Tori is sharing her story to protect other women and expose the darkness he left behind. HAVE YOU EXPERIENCED STALKING? LET US KNOW: strictlystalkingpod@gmail.com OTHER LINKS lovelustfear | hosted by Jake Deptula Apple Podcasts | https://podcasts.apple.com/us/podcast/lovelustfear/id1735876283?uo=4 Spotify | https://open.spotify.com/show/0e3ndcf5u8lZ5lhN1lvWec Amazon Music | https://music.amazon.com/podcasts/b06d0ea8-cb29-4c3a-98e6-0249d84df748 Instagram | https://www.instagram.com/lovelustfearpod/ Submissions | https://lovelustfear.aidaform.com/lovelustfear The Last Trip - Podcast - hosted by Jaimie Beebe Listen & Subscribe to The Last Trip - https://audioboom.com/channels/5119581-the-last-trip Follow The Last Trip on Instagram - https://www.instagram.com/thelasttripcrimepod/ And Subscribe for all the updates on Patreon - https://www.patreon.com/TheLastTripPodcast Instagram: @strictlystalkingpod @feathergirl77 @jaked3000

Strictly Stalking
301. One Woman, Two Stalkers

Strictly Stalking

Play Episode Listen Later Oct 21, 2025 43:31


Ro is a mother, educator, and survivor whose world was shattered by not one, but two terrifying stalking ordeals. First, a stranger from her son's football club began sending threats — and eventually tried to run her child down with a car. Then came a neighbor, leaving sinister notes, watching her daughters, and trespassing onto her property. When the system failed to protect her, Ro was left to do it herself — fighting to keep her family safe and pushing for real change in Australia's stalking laws. HAVE YOU EXPERIENCED STALKING?  LET US KNOW: strictlystalkingpod@gmail.com OTHER LINKS The Last Trip - Podcast - hosted by Jaimie Beebe Listen & Subscribe to The Last Trip - https://audioboom.com/channels/5119581-the-last-trip Follow The Last Trip on Instagram - https://www.instagram.com/thelasttripcrimepod/ And Subscribe for all the updates on Patreon - https://www.patreon.com/TheLastTripPodcast lovelustfear | hosted by Jake Deptula Apple Podcasts | https://podcasts.apple.com/us/podcast/lovelustfear/id1735876283?uo=4 Spotify | https://open.spotify.com/show/0e3ndcf5u8lZ5lhN1lvWec Amazon Music | https://music.amazon.com/podcasts/b06d0ea8-cb29-4c3a-98e6-0249d84df748 Instagram | https://www.instagram.com/lovelustfearpod/ Submissions | https://lovelustfear.aidaform.com/lovelustfear Instagram: @strictlystalkingpod @feathergirl77 @jaked3000  

ITSPmagazine | Technology. Cybersecurity. Society
First CISO Charged by SEC: Tim Brown on Trust, Context, and Leading Through Crisis - Interview with Tim Brown | AISA CyberCon Melbourne 2025 Coverage | On Location with Sean Martin and Marco Ciappelli

ITSPmagazine | Technology. Cybersecurity. Society

Play Episode Listen Later Oct 15, 2025 26:54


First CISO Charged by SEC: Tim Brown on Trust, Context, and Leading Through Crisis - Interview with Tim Brown | AISA CyberCon Melbourne 2025 Coverage | On Location with Sean Martin and Marco CiappelliAISA CyberCon Melbourne | October 15-17, 2025Tim Brown's job changed overnight. December 11th, he was the CISO at SolarWinds managing security operations. December 12th, he was leading the response to one of the most scrutinized cybersecurity incidents in history.Connecting from New York and Florence to Melbourne, Sean Martin and Marco Ciappelli caught up with their longtime friend ahead of his keynote at AISA CyberCon. The conversation reveals what actually happens when a CISO faces the unthinkable—and why the relationships you build before crisis hits determine whether you survive it.Tim became the first CISO ever charged by the SEC, a distinction nobody wants but one that shaped his mission: if sharing his experience helps even one security leader prepare better, then the entire saga becomes worthwhile. He's candid about the settlement process still underway, the emotional weight of having strangers ask for selfies, and the mental toll that landed him in a Zurich hospital with a heart attack the week his SEC charges were announced."For them to hear something and hear the context—to hear us taking six months off development, 400 engineers focused completely on security for six months in pure focus—when you say it with emotion, it conveys the real cost," Tim explained. Written communication failed during the incident. People needed to talk, to hear, to feel the weight of decisions being made in real time.What saved SolarWinds wasn't just technical capability. It was implicit trust. The war room team operated without second-guessing each other. The CIO handled deployment and investigation. Engineering figured out how the build system was compromised. Marketing and legal managed their domains. Tim didn't waste cycles checking their work because trust was already built."If we didn't have that, we would've been second-guessing what other people did," he said. That trust came from relationships established long before December 2020, from a culture where people knew their roles and respected each other's expertise.Now Tim's focused on mentoring the next generation through the RSA Conference CSO Bootcamp, helping aspiring CISOs and security leaders at smaller companies build the knowledge, community, and relationships they'll need when—not if—their own December 12th arrives. He tailors every talk to his audience, never delivering the same speech twice. Context matters in crisis, but it matters in communication too.Australia played a significant role during SolarWinds' incident response, with the Australian government partnering closely in January 2021. Tim hadn't been back in a decade, making his return to Melbourne for CyberCon particularly meaningful. He's there to share lessons earned the hardest way possible, and to remind security leaders that stress management, safe spaces, and knowing when to compartmentalize aren't luxuries—they're survival skills.His keynote covers the different stages of incident response, how culture drives crisis outcomes, and why the teams that step up matter more than the ones that run away. For anyone leading security teams, Tim's message is clear: build trust now, before you need it.AISA CyberCon Melbourne runs October 15-17, 2025 Coverage provided by ITSPmagazineGUEST:Tim Brown, CISO at SolarWinds | On LinkedIn: https://www.linkedin.com/in/tim-brown-ciso/HOSTS:Sean Martin, Co-Founder, ITSPmagazine and Studio C60 | Website: https://www.seanmartin.comMarco Ciappelli, Co-Founder, ITSPmagazine and Studio C60 | Website: https://www.marcociappelli.comCatch all of our event coverage: https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverageWant to share an Event Briefing as part of our event coverage? Learn More

Redefining CyberSecurity
First CISO Charged by SEC: Tim Brown on Trust, Context, and Leading Through Crisis - Interview with Tim Brown | AISA CyberCon Melbourne 2025 Coverage | On Location with Sean Martin and Marco Ciappelli

Redefining CyberSecurity

Play Episode Listen Later Oct 15, 2025 26:54


First CISO Charged by SEC: Tim Brown on Trust, Context, and Leading Through Crisis - Interview with Tim Brown | AISA CyberCon Melbourne 2025 Coverage | On Location with Sean Martin and Marco CiappelliAISA CyberCon Melbourne | October 15-17, 2025Tim Brown's job changed overnight. December 11th, he was the CISO at SolarWinds managing security operations. December 12th, he was leading the response to one of the most scrutinized cybersecurity incidents in history.Connecting from New York and Florence to Melbourne, Sean Martin and Marco Ciappelli caught up with their longtime friend ahead of his keynote at AISA CyberCon. The conversation reveals what actually happens when a CISO faces the unthinkable—and why the relationships you build before crisis hits determine whether you survive it.Tim became the first CISO ever charged by the SEC, a distinction nobody wants but one that shaped his mission: if sharing his experience helps even one security leader prepare better, then the entire saga becomes worthwhile. He's candid about the settlement process still underway, the emotional weight of having strangers ask for selfies, and the mental toll that landed him in a Zurich hospital with a heart attack the week his SEC charges were announced."For them to hear something and hear the context—to hear us taking six months off development, 400 engineers focused completely on security for six months in pure focus—when you say it with emotion, it conveys the real cost," Tim explained. Written communication failed during the incident. People needed to talk, to hear, to feel the weight of decisions being made in real time.What saved SolarWinds wasn't just technical capability. It was implicit trust. The war room team operated without second-guessing each other. The CIO handled deployment and investigation. Engineering figured out how the build system was compromised. Marketing and legal managed their domains. Tim didn't waste cycles checking their work because trust was already built."If we didn't have that, we would've been second-guessing what other people did," he said. That trust came from relationships established long before December 2020, from a culture where people knew their roles and respected each other's expertise.Now Tim's focused on mentoring the next generation through the RSA Conference CSO Bootcamp, helping aspiring CISOs and security leaders at smaller companies build the knowledge, community, and relationships they'll need when—not if—their own December 12th arrives. He tailors every talk to his audience, never delivering the same speech twice. Context matters in crisis, but it matters in communication too.Australia played a significant role during SolarWinds' incident response, with the Australian government partnering closely in January 2021. Tim hadn't been back in a decade, making his return to Melbourne for CyberCon particularly meaningful. He's there to share lessons earned the hardest way possible, and to remind security leaders that stress management, safe spaces, and knowing when to compartmentalize aren't luxuries—they're survival skills.His keynote covers the different stages of incident response, how culture drives crisis outcomes, and why the teams that step up matter more than the ones that run away. For anyone leading security teams, Tim's message is clear: build trust now, before you need it.AISA CyberCon Melbourne runs October 15-17, 2025 Coverage provided by ITSPmagazineGUEST:Tim Brown, CISO at SolarWinds | On LinkedIn: https://www.linkedin.com/in/tim-brown-ciso/HOSTS:Sean Martin, Co-Founder, ITSPmagazine and Studio C60 | Website: https://www.seanmartin.comMarco Ciappelli, Co-Founder, ITSPmagazine and Studio C60 | Website: https://www.marcociappelli.comCatch all of our event coverage: https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverageWant to share an Event Briefing as part of our event coverage? Learn More

Strictly Stalking
300. Stalked By A Client: Social Worker's Nightmare

Strictly Stalking

Play Episode Listen Later Oct 14, 2025 54:19


Molly is a licensed clinical social worker whose job turned into a nightmare when a client began stalking and terrorizing her. Despite early warning signs and escalating aggression, her pleas for help were dismissed by supervisors and law enforcement. The stalking intensified, leading to a violent workplace attack and a court-issued protection order. Years later, just as she thought it was behind her, Molly's stalker resurfaced - sending a threatening letter from Japan and triggering an FBI investigation. Forced out of the career she loved, Molly has rebuilt her life with heightened security and a new mission: to raise awareness, fight for therapist safety, and empower others to speak out when they feel unsafe. HAVE YOU EXPERIENCED STALKING?  LET US KNOW: strictlystalkingpod@gmail.com OTHER LINKS lovelustfear | hosted by Jake Deptula Apple Podcasts | https://podcasts.apple.com/us/podcast/lovelustfear/id1735876283?uo=4 Spotify | https://open.spotify.com/show/0e3ndcf5u8lZ5lhN1lvWec Amazon Music | https://music.amazon.com/podcasts/b06d0ea8-cb29-4c3a-98e6-0249d84df748 Instagram | https://www.instagram.com/lovelustfearpod/ Submissions | https://lovelustfear.aidaform.com/lovelustfear The Last Trip - Podcast - hosted by Jaimie Beebe Listen & Subscribe to The Last Trip - https://audioboom.com/channels/5119581-the-last-trip Follow The Last Trip on Instagram - https://www.instagram.com/thelasttripcrimepod/ And Subscribe for all the updates on Patreon - https://www.patreon.com/TheLastTripPodcast Instagram: @strictlystalkingpod @feathergirl77 @jaked3000  

ITSPmagazine | Technology. Cybersecurity. Society
Everyone Is Protecting My Password, But Who Is Protecting My Toilet Paper? - Interview with Amberley Brady | AISA CyberCon Melbourne 2025 Coverage | On Location with Sean Martin and Marco Ciappelli

ITSPmagazine | Technology. Cybersecurity. Society

Play Episode Listen Later Oct 13, 2025 28:05


Everyone Is Protecting My Password, But Who Is Protecting My Toilet Paper? - Interview with Amberley Brady | AISA CyberCon Melbourne 2025 Coverage | On Location with Sean Martin and Marco CiappelliAISA CyberCon Melbourne | October 15-17, 2025Empty shelves trigger something primal in us now. We've lived through the panic, the uncertainty, the realization that our food supply isn't as secure as we thought. Amberley Brady hasn't forgotten that feeling, and she's turned it into action.Speaking with her from Florence to Sydney ahead of AISA CyberCon in Melbourne, I discovered someone who came to cybersecurity through an unexpected path—studying law, working in policy, but driven by a singular passion for food security. When COVID-19 hit Australia in 2019 and grocery store shelves emptied, Amberley couldn't shake the question: what happens if this keeps happening?Her answer was to build realfoodprice.com.au, a platform tracking food pricing transparency across Australia's supply chain. It's based on the Hungarian model, which within three months saved consumers 50 million euros simply by making prices visible from farmer to wholesaler to consumer. The markup disappeared almost overnight when transparency arrived."Once you demonstrate transparency along the supply chain, you see where the markup is," Amberley explained. She gave me an example that hit home: watermelon farmers were getting paid 40 cents per kilo while their production costs ran between $1.00 to $1.50. Meanwhile, consumers paid $2.50 to $2.99 year-round. Someone in the middle was profiting while farmers lost money on every harvest.But this isn't just about fair pricing—it's about critical infrastructure that nobody's protecting. Australia produces food for 70 million people, far more than its own population needs. That food moves through systems, across borders, through supply chains that depend entirely on technology most farmers never think about in cybersecurity terms.The new autonomous tractors collecting soil data? That information goes somewhere. The sensors monitoring crop conditions? Those connect to systems someone else controls. China recognized this vulnerability years ago—with 20% of the world's population but only 7% of arable land, they understood that food security is national security.At CyberCon, Amberley is presenting two sessions that challenge the cybersecurity community to expand their thinking. "Don't Outsource Your Thinking" tackles what she calls "complacency creep"—our growing trust in AI that makes us stop questioning, stop analyzing with our gut instinct. She argues for an Essential Nine in Australia's cybersecurity framework, adding the human firewall to the technical Essential Eight.Her second talk, cheekily titled "Everyone is Protecting My Password, But No One's Protecting My Toilet Paper," addresses food security directly. It's provocative, but that's the point. We saw what happened in Japan recently with the rice crisis—the same panic buying, the same distrust, the same empty shelves that COVID taught us to fear."We will run to the store," Amberley said. "That's going to be human behavior because we've lived through that time." And here's the cybersecurity angle: those panics can be manufactured. A fake image of empty shelves, an AI-generated video, strategic disinformation—all it takes is triggering that collective memory.Amberley describes herself as an early disruptor in the agritech cybersecurity space, and she's right. Most cybersecurity professionals think about hospitals, utilities, financial systems. They don't think about the autonomous vehicles in fields, the sensor networks in soil, the supply chain software moving food across continents.But she's starting the conversation, and CyberCon's audience—increasingly diverse, including people from HR, risk management, and policy—is ready for it. Because at the end of the day, everyone has to eat. And if we don't start thinking about the cyber vulnerabilities in how we grow, move, and price food, we're leaving our most basic need unprotected.AISA CyberCon Melbourne runs October 15-17, 2025 Virtual coverage provided by ITSPmagazineGUEST:Amberley Brady, Food Security & Cybersecurity Advocate, Founder of realfoodprice.com.au | On LinkedIn: https://www.linkedin.com/in/amberley-b-a62022353/HOSTS:Sean Martin, Co-Founder, ITSPmagazine and Studio C60 | Website: https://www.seanmartin.comMarco Ciappelli, Co-Founder, ITSPmagazine and Studio C60 | Website: https://www.marcociappelli.comCatch all of our event coverage: https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverageWant to share an Event Briefing as part of our event coverage? Learn More

ITSPmagazine | Technology. Cybersecurity. Society
Beyond Blame: Navigating the Digital World with Our Kids - Interview with Jacqueline (JJ) Jayne | AISA CyberCon Melbourne 2025 Coverage | On Location with Sean Martin and Marco Ciappelli

ITSPmagazine | Technology. Cybersecurity. Society

Play Episode Listen Later Oct 11, 2025 24:32


Beyond Blame: Navigating the Digital World with Our KidsAISA CyberCon Melbourne | October 15-17, 2025There's something fundamentally broken in how we approach online safety for young people. We're quick to point fingers—at tech companies, at schools, at kids themselves—but Jacqueline Jayne (JJ) wants to change that conversation entirely.Speaking with her from Florence while she prepared for her session at AISA CyberCon Melbourne this week, it became clear that JJ understands what many in the cybersecurity world miss: this isn't a technical problem that needs a technical solution. It's a human problem that requires us to look in the mirror."The online world reflects what we've built for them," JJ told me, referring to our generation. "Now we need to step up and help fix it."Her session, "Beyond Blame: Keeping Our Kids Safe Online," tackles something most cybersecurity professionals avoid—the uncomfortable truth that being an IT expert doesn't automatically make you equipped to protect the young people in your life. Last year's presentation at Cyber Con drew a full house, with nearly every hand raised when she asked who came because of a kid in their world.That's the fascinating contradiction JJ exposes: rooms full of cybersecurity professionals who secure networks and defend against sophisticated attacks, yet find themselves lost when their own children navigate TikTok, Roblox, or encrypted messaging apps.The timing couldn't be more relevant. With Australia implementing a social media ban for anyone under 16 starting December 10, 2025, and similar restrictions appearing globally, parents and carers face unprecedented challenges. But as JJ points out, banning isn't understanding, and restriction isn't education.One revelation from our conversation particularly struck me—the hidden language of emojis. What seems innocent to adults carries entirely different meanings across demographics, from teenage subcultures to, disturbingly, predatory networks online. An explosion emoji doesn't just mean "boom" anymore. Context matters, and most adults are speaking a different digital dialect than their kids.JJ, who successfully guided her now 19-year-old son through the gaming and social media years, isn't offering simple solutions because there aren't any. What she provides instead are conversation starters, resources tailored to different age groups, and even AI prompts that parents can customize for their specific situations.The session reflects a broader shift happening at events like Cyber Con. It's no longer just IT professionals in the room. HR representatives, risk managers, educators, and parents are showing up because they've realized that digital safety doesn't respect departmental boundaries or professional expertise."We were analog brains in a digital world," JJ said, capturing our generational position perfectly. But today's kids? They're born into this interconnectedness, and COVID accelerated everything to a point where taking it away isn't an option.The real question isn't who to blame. It's what role each of us plays in creating a safer digital environment. And that's a conversation worth having—whether you're at the Convention and Exhibition Center in Melbourne this week or joining virtually from anywhere else.AISA CyberCon Melbourne runs October 15-17, 2025 Virtual coverage provided by ITSPmagazine___________GUEST:Jacqueline (JJ) Jayne, Reducing human error in cyber and teaching 1 million people online safety. On Linkedin: https://www.linkedin.com/in/jacquelinejayne/HOSTS:Sean Martin, Co-Founder, ITSPmagazine and Studio C60 | Website: https://www.seanmartin.comMarco Ciappelli, Co-Founder, ITSPmagazine and Studio C60 | Website: https://www.marcociappelli.comCatch all of our event coverage: https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverageWant to share an Event Briefing as part of our event coverage? Learn More

ITSPmagazine | Technology. Cybersecurity. Society
The Once and Future Rules of Cybersecurity | A Black Hat SecTor 2025 Conversation with HD Moore | On Location Coverage with Sean Martin and Marco Ciappelli

ITSPmagazine | Technology. Cybersecurity. Society

Play Episode Listen Later Oct 9, 2025 23:37


During his keynote at SecTor 2025, HD Moore, founder and CEO of runZero and widely recognized for creating Metasploit, invites the cybersecurity community to rethink the foundational “rules” we continue to follow—often without question. In conversation with Sean Martin and Marco Ciappelli for ITSPmagazine's on-location event coverage, Moore breaks down where our security doctrines came from, why some became obsolete, and which ones still hold water.One standout example? The rule to “change your passwords every 30 days.” Moore explains how this outdated guidance—rooted in assumptions from the early 2000s when password sharing was rampant—led to predictable patterns and frustrated users. Today, the advice has flipped: focus on strong, unique passwords per service, stored securely via password managers.But this keynote isn't just about passwords. Moore uses this lens to explore how many security “truths” were formed in response to technical limitations or outdated behaviors—things like shared network trust, brittle segmentation, and fragile authentication models. As technology matures, so too should the rules. Enter passkeys, hardware tokens, and enclave-based authentication. These aren't just new tools—they're a fundamental shift in where and how we anchor trust.Moore also calls out an uncomfortable truth: the very products we rely on to protect our systems—firewalls, endpoint managers, and security appliances—are now among the top vectors for breach, per Mandiant's latest report. That revelation struck a chord with conference attendees, who appreciated Moore's willingness to speak plainly about systemic security debt.He also discusses the inescapable vulnerabilities in AI agent flows, likening prompt injection attacks to the early days of cross-site scripting. The tech itself invites risk, he warns, and we'll need new frameworks—not just tweaks to old ones—to manage what comes next.This conversation is a must-listen for anyone questioning whether our security playbooks are still fit for purpose—or simply carried forward by habit.___________GUEST:HD Moore, Founder and CEO of RunZero | On Linkedin: https://www.linkedin.com/in/hdmoore/HOSTS:Sean Martin, Co-Founder, ITSPmagazine and Studio C60 | Website: https://www.seanmartin.comMarco Ciappelli, Co-Founder, ITSPmagazine and Studio C60 | Website: https://www.marcociappelli.comRESOURCES:Keynote: The Once and Future Rules of Cybersecurity: https://www.blackhat.com/sector/2025/briefings/schedule/#keynote-the-once-and-future-rules-of-cybersecurity-49596Learn more and catch more stories from our SecTor 2025 coverage: https://www.itspmagazine.com/cybersecurity-technology-society-events/sector-cybersecurity-conference-toronto-2025Mandiant M-Trends Breach Report: https://cloud.google.com/blog/topics/threat-intelligence/m-trends-2025/OPM Data Breach Summary: https://oversight.house.gov/report/opm-data-breach-government-jeopardized-national-security-generation/Catch all of our event coverage: https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverageWant to share an Event Briefing as part of our event coverage? Learn More

Redefining CyberSecurity
The Once and Future Rules of Cybersecurity | A Black Hat SecTor 2025 Conversation with HD Moore | On Location Coverage with Sean Martin and Marco Ciappelli

Redefining CyberSecurity

Play Episode Listen Later Oct 9, 2025 23:37


During his keynote at SecTor 2025, HD Moore, founder and CEO of runZero and widely recognized for creating Metasploit, invites the cybersecurity community to rethink the foundational “rules” we continue to follow—often without question. In conversation with Sean Martin and Marco Ciappelli for ITSPmagazine's on-location event coverage, Moore breaks down where our security doctrines came from, why some became obsolete, and which ones still hold water.One standout example? The rule to “change your passwords every 30 days.” Moore explains how this outdated guidance—rooted in assumptions from the early 2000s when password sharing was rampant—led to predictable patterns and frustrated users. Today, the advice has flipped: focus on strong, unique passwords per service, stored securely via password managers.But this keynote isn't just about passwords. Moore uses this lens to explore how many security “truths” were formed in response to technical limitations or outdated behaviors—things like shared network trust, brittle segmentation, and fragile authentication models. As technology matures, so too should the rules. Enter passkeys, hardware tokens, and enclave-based authentication. These aren't just new tools—they're a fundamental shift in where and how we anchor trust.Moore also calls out an uncomfortable truth: the very products we rely on to protect our systems—firewalls, endpoint managers, and security appliances—are now among the top vectors for breach, per Mandiant's latest report. That revelation struck a chord with conference attendees, who appreciated Moore's willingness to speak plainly about systemic security debt.He also discusses the inescapable vulnerabilities in AI agent flows, likening prompt injection attacks to the early days of cross-site scripting. The tech itself invites risk, he warns, and we'll need new frameworks—not just tweaks to old ones—to manage what comes next.This conversation is a must-listen for anyone questioning whether our security playbooks are still fit for purpose—or simply carried forward by habit.___________GUEST:HD Moore, Founder and CEO of RunZero | On Linkedin: https://www.linkedin.com/in/hdmoore/HOSTS:Sean Martin, Co-Founder, ITSPmagazine and Studio C60 | Website: https://www.seanmartin.comMarco Ciappelli, Co-Founder, ITSPmagazine and Studio C60 | Website: https://www.marcociappelli.comRESOURCES:Keynote: The Once and Future Rules of Cybersecurity: https://www.blackhat.com/sector/2025/briefings/schedule/#keynote-the-once-and-future-rules-of-cybersecurity-49596Learn more and catch more stories from our SecTor 2025 coverage: https://www.itspmagazine.com/cybersecurity-technology-society-events/sector-cybersecurity-conference-toronto-2025Mandiant M-Trends Breach Report: https://cloud.google.com/blog/topics/threat-intelligence/m-trends-2025/OPM Data Breach Summary: https://oversight.house.gov/report/opm-data-breach-government-jeopardized-national-security-generation/Catch all of our event coverage: https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverageWant to share an Event Briefing as part of our event coverage? Learn More

Faith Bible Chapel
The Heart Series // Week 1 // Tim Lovell //October 05, 2025

Faith Bible Chapel

Play Episode Listen Later Oct 8, 2025 59:50


The Heart Series Week 1 Often, the description associated with the heart describes a season we are in or a condition we are living in. Look at some of These Words Associated with the Heart:Kind HeartedOpen HeartedWarm HeartedWholeheartedHeart Felt Heart SickHeart WrenchingBroken HeartedHeavy HeartedHard HeartedCold HeartedDisheartenedFaint HeartedWounded Heart God Sees the Heart and Knows Us at the Center of Who We Are, or The Season We Are In. He is Willing to Meet Us There and Let Us Know that We are Known. He is Not Content that We Remain Hurting, Sick, Broken, Hidden, etc. God Doesn't Look at What We Look at; He Looks at the Heart. Jeremiah 17:9-10 (MSG)“The heart is hopelessly dark and deceitful, a puzzle that no one can figure out. But I, God, search the heart and examine the mind. I get to the heart of the human. I get to the root of things. I treat them as they really are, not as they pretend to be.”Exodus 34:6 (ESV)“The LORD, the LORD, a God merciful and gracious, slow to anger, and abounding in steadfast love and faithfulness…” He Walks with Us on this Journey So We Can Walk with Others. He Doesn't Want Us to Remain in Hiding.  We Can Journey with Others into Freedom and Into the Light. Seasons Don't Have to Define UsExperiences Don't Have to Hold Us Feelings Don't Have to Hold Us Fast God KnowsGod ContendsGod Restores God is a God of Hope and a Future, Not Just Our Past.

Strictly Stalking
299. “Not High-Risk Enough”: Stalking Anne

Strictly Stalking

Play Episode Listen Later Oct 7, 2025 99:10


Anne is a survivor of relentless stalking and harassment at the hands of her ex-partner. She reached out for help—police, social services, even family court—but every system meant to protect her failed. Dismissed as “not high-risk enough,” Anne was left in limbo, while the threats and control continued, even after she left the relationship. Now, she is speaking out—to warn others, to reveal how quickly abuse can escalate to femicide, and to demand urgent change for survivors and their children.HAVE YOU EXPERIENCED STALKING? LET US KNOW:strictlystalkingpod@gmail.comOTHER LINKSThe Last Trip - Podcast - hosted by Jaimie BeebeListen & Subscribe to The Last Trip - https://audioboom.com/channels/5119581-the-last-tripFollow The Last Trip on Instagram - https://www.instagram.com/thelasttripcrimepod/And Subscribe for all the updates on Patreon - https://www.patreon.com/TheLastTripPodcastlovelustfear | hosted by Jake DeptulaApple Podcasts | https://podcasts.apple.com/us/podcast/lovelustfear/id1735876283?uo=4Spotify | https://open.spotify.com/show/0e3ndcf5u8lZ5lhN1lvWecAmazon Music | https://music.amazon.com/podcasts/b06d0ea8-cb29-4c3a-98e6-0249d84df748Instagram | https://www.instagram.com/lovelustfearpod/Submissions | https://lovelustfear.aidaform.com/lovelustfearInstagram:@strictlystalkingpod@feathergirl77@jaked3000See Privacy Policy at https://art19.com/privacy and California Privacy Notice at https://art19.com/privacy#do-not-sell-my-info.

Strictly Stalking
298. 33 Weeks of Fear: Stalking Rebecca

Strictly Stalking

Play Episode Listen Later Sep 30, 2025 102:44


Rebecca endured 33 terrifying weeks of stalking at the hands of a fellow student in her college acting class. Red flags were everywhere, threats escalated—but instead of protection, she was silenced. Title IX officials dismissed her, and her search for justice left her isolated, bullied, and retraumatized. Even after the stalking ended, the trauma lingered. Living with PTSD, Rebecca was repeatedly denied support simply because her stalker wasn't a former partner. Only through Cognitive Processing Therapy did she begin to reclaim her life. Today, Rebecca is using her voice to raise awareness, demand change, and fight so that no other survivor has to face the same failures she did.HAVE YOU EXPERIENCED STALKING? LET US KNOW:strictlystalkingpod@gmail.comOTHER LINKSlovelustfear | hosted by Jake DeptulaApple Podcasts | https://podcasts.apple.com/us/podcast/lovelustfear/id1735876283?uo=4Spotify | https://open.spotify.com/show/0e3ndcf5u8lZ5lhN1lvWecAmazon Music | https://music.amazon.com/podcasts/b06d0ea8-cb29-4c3a-98e6-0249d84df748Instagram | https://www.instagram.com/lovelustfearpod/Submissions | https://lovelustfear.aidaform.com/lovelustfearThe Last Trip - Podcast - hosted by Jaimie BeebeListen & Subscribe to The Last Trip - https://audioboom.com/channels/5119581-the-last-tripFollow The Last Trip on Instagram - https://www.instagram.com/thelasttripcrimepod/And Subscribe for all the updates on Patreon - https://www.patreon.com/TheLastTripPodcastInstagram:@strictlystalkingpod@feathergirl77@jaked3000See Privacy Policy at https://art19.com/privacy and California Privacy Notice at https://art19.com/privacy#do-not-sell-my-info.

Johnjay & Rich On Demand
There are Plenty of Fish in the sea but not in Payton's age group!

Johnjay & Rich On Demand

Play Episode Listen Later Sep 30, 2025 86:29


PAYTON AIN'T BUYIN IT! IF YOU'RE 27 and ON THERE, LET US KNOW!!! Today On The Show, it's TUESDAY which means an ALL NEW SECOND DATE UPDATE but first Kyle got a PRICE IS RIGHT EXPERIENCE SHE'LL NEVER FORGET! Then, Michael HAD US CACKLING and PAYTON SAW THE JONAS BROTHERS. Plus, REMEMBER THE TIME and the latest on DIDDY... uh oh. ALL THIS AND MUCH MORE TODAY ON JJR FALLSee omnystudio.com/listener for privacy information.

Smiley Morning Show
Hoosier calls to let us know Bad Bunny Halftime Show is Going to be AWESOME!

Smiley Morning Show

Play Episode Listen Later Sep 30, 2025 2:00


See omnystudio.com/listener for privacy information.

ITSPmagazine | Technology. Cybersecurity. Society
Why Identity Must Come First in the Age of AI Agents | A Black Hat SecTor 2025 Conversation with Cristin Flynn Goodwin | On Location Coverage with Sean Martin and Marco Ciappelli

ITSPmagazine | Technology. Cybersecurity. Society

Play Episode Listen Later Sep 26, 2025 21:45


When we talk about AI at cybersecurity conferences these days, one term is impossible to ignore: agentic AI. But behind the excitement around AI-driven productivity and autonomous workflows lies an unresolved—and increasingly urgent—security issue: identity.In this episode, Sean Martin and Marco Ciappelli speak with Cristin Flynn Goodwin, keynote speaker at SecTor 2025, about the intersection of AI agents, identity management, and legal risk. Drawing from decades at the center of major security incidents—most recently as the head cybersecurity lawyer at Microsoft—Cristin frames today's AI hype within a longstanding identity crisis that organizations still haven't solved.Why It Matters NowAgentic AI changes the game. AI agents can act independently, replicate themselves, and disappear in seconds. That's great for automation—but terrifying for risk teams. Cristin flags the pressing need to identify and authenticate these ephemeral agents. Should they be digitally signed? Should there be a new standard body managing agent identities? Right now, we don't know.Meanwhile, attackers are already adapting. AI tools are being used to create flawless phishing emails, spoofed banking agents, and convincing digital personas. Add that to the fact that many consumers and companies still haven't implemented strong MFA, and the risk multiplier becomes clear.The Legal ViewFrom a legal standpoint, Cristin emphasizes how regulations like New York's DFS Cybersecurity Regulation are putting pressure on CISOs to tighten IAM controls. But what about individuals? “It's an unfair fight,” she says—no consumer can outpace a nation-state attacker armed with AI tooling.This keynote preview also calls attention to shadow AI agents: tools employees may create outside the control of IT or security. As Cristin warns, they could become “offensive digital insiders”—another dimension of the insider threat amplified by AI.Looking AheadThis is a must-listen episode for CISOs, security architects, policymakers, and anyone thinking about AI safety and digital trust. From the potential need for real-time, verifiable agent credentials to the looming collision of agentic AI with quantum computing, this conversation kicks off SecTor 2025 with urgency and clarity.Catch the full episode now, and don't miss Cristin's keynote on October 1.___________Guest:Cristin Flynn Goodwin, Senior Consultant, Good Harbor Security Risk Management | On LinkedIn: https://www.linkedin.com/in/cristin-flynn-goodwin-24359b4/Hosts:Sean Martin, Co-Founder at ITSPmagazine | Website: https://www.seanmartin.comMarco Ciappelli, Co-Founder at ITSPmagazine | Website: https://www.marcociappelli.com___________Episode SponsorsThreatLocker: https://itspm.ag/threatlocker-r974BlackCloak: https://itspm.ag/itspbcweb___________ResourcesKeynote: Agentic AI and Identity: The Biggest Problem We're Not Solving: https://www.blackhat.com/sector/2025/briefings/schedule/#keynote-agentic-ai-and-identity-the-biggest-problem-were-not-solving-49591Learn more and catch more stories from our SecTor 2025 coverage: https://www.itspmagazine.com/cybersecurity-technology-society-events/sector-cybersecurity-conference-toronto-2025New York Department of Financial Services Cybersecurity Regulation: https://www.dfs.ny.gov/industry_guidance/cybersecurityGood Harbor Security Risk Management (Richard Clarke's firm): https://www.goodharbor.net/Catch all of our event coverage: https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverageWant to share an Event Briefing as part of our event coverage? Learn More

Strictly Stalking
297. Stalked in the Heartland

Strictly Stalking

Play Episode Listen Later Sep 23, 2025 46:38


Ted thought he had built a peaceful life in Oklahoma. A Navy veteran, father, and small business owner, he had spent decades serving others with integrity. But in 2025, everything changed. A local family targeted him with stalking, racial abuse, and intimidation. False accusations spread. Threats followed him in broad daylight. And the police—tied personally to his tormentors—looked the other way. This is the story of how one man's quiet life became a fight for survival.HAVE YOU EXPERIENCED STALKING? LET US KNOW:strictlystalkingpod@gmail.comPLEASE VISIT OUR SPONSORS!Delete MeToday get 20% off your DeleteMe plan when you go to JoinDeleteMe.com/STALKING and use promo code STALKING at checkout. Pluto Tvhttps://pluto.tv/us/hub/homeOTHER LINKSThe Last Trip - Podcast - hosted by Jaimie BeebeListen & Subscribe to The Last Trip - https://audioboom.com/channels/5119581-the-last-tripFollow The Last Trip on Instagram - https://www.instagram.com/thelasttripcrimepod/And Subscribe for all the updates on Patreon - https://www.patreon.com/TheLastTripPodcastlovelustfear | hosted by Jake DeptulaApple Podcasts | https://podcasts.apple.com/us/podcast/lovelustfear/id1735876283?uo=4Spotify | https://open.spotify.com/show/0e3ndcf5u8lZ5lhN1lvWecAmazon Music | https://music.amazon.com/podcasts/b06d0ea8-cb29-4c3a-98e6-0249d84df748Instagram | https://www.instagram.com/lovelustfearpod/Submissions | https://lovelustfear.aidaform.com/lovelustfearInstagram:@strictlystalkingpod@feathergirl77@jaked3000See Privacy Policy at https://art19.com/privacy and California Privacy Notice at https://art19.com/privacy#do-not-sell-my-info.

More Fun with Fox FM
Lesley Sembaluk from the Elbert Chartrand Friendship Centre called in today to let us know about everything they've got planned to commemorate this year's National Day for Truth and Reconciliation. Hear it at the link below!

More Fun with Fox FM

Play Episode Listen Later Sep 22, 2025 2:21


Strictly Stalking
296. The Catfish Stalker: Ally's Story

Strictly Stalking

Play Episode Listen Later Sep 16, 2025 50:39


For six years, Ally was hunted by a faceless predator—someone who stole her photos, her identity, even images of her friends and family, to lure victims into a web of deceit. No matter how hard she fought, the lies only spread deeper. But when Ally finally dared to send a single message, it set off a chilling exchange that exposed the stalker's true identity—and revealed just how far the obsession had gone.HAVE YOU EXPERIENCED STALKING? LET US KNOW:strictlystalkingpod@gmail.comGuest LinksAllyInstagram: www.instagram.com/allypeters22Tik tok: https://www.tiktok.com/@allypeters7PLEASE VISIT OUR SPONSORS!Pluto Tvhttps://pluto.tv/us/hub/homeOTHER LINKSlovelustfear | hosted by Jake DeptulaApple Podcasts | https://podcasts.apple.com/us/podcast/lovelustfear/id1735876283?uo=4Spotify | https://open.spotify.com/show/0e3ndcf5u8lZ5lhN1lvWecAmazon Music | https://music.amazon.com/podcasts/b06d0ea8-cb29-4c3a-98e6-0249d84df748Instagram | https://www.instagram.com/lovelustfearpod/Submissions | https://lovelustfear.aidaform.com/lovelustfearThe Last Trip - Podcast - hosted by Jaimie BeebeListen & Subscribe to The Last Trip - https://audioboom.com/channels/5119581-the-last-tripFollow The Last Trip on Instagram - https://www.instagram.com/thelasttripcrimepod/And Subscribe for all the updates on Patreon - https://www.patreon.com/TheLastTripPodcastInstagram:@strictlystalkingpod@feathergirl77@jaked3000See Privacy Policy at https://art19.com/privacy and California Privacy Notice at https://art19.com/privacy#do-not-sell-my-info.

Strictly Stalking
295. Stalked and Framed: Pandemic Romance Leads To Federal Investigation

Strictly Stalking

Play Episode Listen Later Sep 9, 2025 60:11


Bryan thought he was starting fresh when he moved to Hawaii during the pandemic and met someone on a dating app. Instead, his brief romance spiraled into a years-long nightmare. Her soon-to-be ex-husband wasn't just lurking in the background—he was stalking them, bugging her phone, planting hidden cameras, and, according to the FBI, plotting to frame Bryan himself. As a cybersecurity expert, Bryan was ironically the one law enforcement suspected first. But after a federal investigation, the truth came out—the real stalker was exposed and sentenced to nearly eight years in prison. Now, Bryan reveals how he survived the emotional fallout, the toll it took on his relationships, and the red flags he wishes he hadn't ignored.HAVE YOU EXPERIENCED STALKING? LET US KNOW:strictlystalkingpod@gmail.comPLEASE VISIT OUR SPONSORS!Delete MeToday get 20% off your DeleteMe plan when you go to JoinDeleteMe.com/STALKING and use promo code STALKING at checkout. ShopifySign up for a one-dollar-per-month trial period at SHOPIFY.COM/STRICTLYSTALKINGto take your retail business to the next level. That's SHOPIFY.COM/STRICTLYSTALKINGProgressive InsurancePress play on comparing auto rates. Get your auto quote at Progressive.com to join the over 28 million drivers who trust Progressive.OTHER LINKSlovelustfear | hosted by Jake DeptulaApple Podcasts | https://podcasts.apple.com/us/podcast/lovelustfear/id1735876283?uo=4Spotify | https://open.spotify.com/show/0e3ndcf5u8lZ5lhN1lvWecAmazon Music | https://music.amazon.com/podcasts/b06d0ea8-cb29-4c3a-98e6-0249d84df748Instagram | https://www.instagram.com/lovelustfearpod/Submissions | https://lovelustfear.aidaform.com/lovelustfearThe Last Trip - Podcast - hosted by Jaimie BeebeListen & Subscribe to The Last Trip - https://audioboom.com/channels/5119581-the-last-tripFollow The Last Trip on Instagram - https://www.instagram.com/thelasttripcrimepod/And Subscribe for all the updates on Patreon - https://www.patreon.com/TheLastTripPodcastInstagram:@strictlystalkingpod@feathergirl77@jaked3000See Privacy Policy at https://art19.com/privacy and California Privacy Notice at https://art19.com/privacy#do-not-sell-my-info.

Strictly Stalking
294. From Co-worker to Stalker: Madison's Nightmare

Strictly Stalking

Play Episode Listen Later Sep 2, 2025 55:23


Madison was just 23 when she moved across the country, chasing a fresh start in Florida. She thought a new job at a grocery store would be the beginning of something good. Instead, it became the start of a nightmare. A co-worker's flirtation turned into obsession—hundreds of calls in a single night, constant stalking, and finally, a violent break-in where he claimed she belonged to him. When Madison went to the police for help, her pleas were dismissed. Years later, she's still haunted by anonymous messages… and the fear that it's not over.HAVE YOU EXPERIENCED STALKING? LET US KNOW:strictlystalkingpod@gmail.comPLEASE VISIT OUR SPONSORS!Progressive InsurancePress play on comparing auto rates. Get your auto quote at Progressive.com to join the over 28 million drivers who trust Progressive.GUEST LINKSMadshttps://www.instagram.com/greatgalu/OTHER LINKSThe Last Trip - Podcast - hosted by Jaimie BeebeListen & Subscribe to The Last Trip - https://audioboom.com/channels/5119581-the-last-tripFollow The Last Trip on Instagram - https://www.instagram.com/thelasttripcrimepod/And Subscribe for all the updates on Patreon - https://www.patreon.com/TheLastTripPodcastlovelustaw - PodcastApple Podcasts | https://podcasts.apple.com/us/podcast/lovelustlaw/id1819843688Spotify | https://open.spotify.com/show/6BEWXKOaEo8lfK554a5NqEAmazon Music | https://music.amazon.com/podcasts/2789d9c8-b4ab-4b4a-847d-a469d89b1d0b/lovelustlawInstagram | https://www.instagram.com/lovelustlaw/Website: https://www.michelelocke.com/podcastInstagram:@strictlystalkingpod@feathergirl77@jaked3000See Privacy Policy at https://art19.com/privacy and California Privacy Notice at https://art19.com/privacy#do-not-sell-my-info.

Strictly Stalking
293. Stalking, Risk, and Reform: Tabetha Harrison

Strictly Stalking

Play Episode Listen Later Aug 26, 2025 54:31


Tabetha Harrison is one of the nation's foremost experts on stalking—and she's changing the way we understand it. A former law enforcement officer and investigator, Tabetha has dedicated her career to proving that stalking isn't just a nuisance crime. It's a dangerous form of coercive control—and one of the clearest warning signs before domestic violence turns deadly. Her work helped shape Texas Senate Bill 1717, reforming the state's stalking laws to put survivors first. Today, she trains agencies on stalking lethality, risk assessment, and coordinated community response. With unmatched expertise and a clear, urgent message, Tabetha is sounding the alarm: stalking is a red flag no one can afford to ignore.HAVE YOU EXPERIENCED STALKING? LET US KNOW:strictlystalkingpod@gmail.comPLEASE VISIT OUR SPONSORS!ShopifySign up for a one-dollar-per-month trial period at SHOPIFY.COM/STRICTLYSTALKING to take your retail business to the next level. That's SHOPIFY.COM/STRICTLYSTALKINGProgressive InsurancePress play on comparing auto rates. Get your auto quote at Progressive.com to join the over 28 million drivers who trust Progressive.GUEST LINKSTabetha Harrisonhttps://www.linkedin.com/in/tabetha-harrison-684a18186OTHER LINKSThe Last Trip - Podcast - hosted by Jaimie BeebeListen & Subscribe to The Last Trip - https://audioboom.com/channels/5119581-the-last-tripFollow The Last Trip on Instagram - https://www.instagram.com/thelasttripcrimepod/And Subscribe for all the updates on Patreon - https://www.patreon.com/TheLastTripPodcastlovelustaw - PodcastApple Podcasts | https://podcasts.apple.com/us/podcast/lovelustlaw/id1819843688Spotify | https://open.spotify.com/show/6BEWXKOaEo8lfK554a5NqEAmazon Music | https://music.amazon.com/podcasts/2789d9c8-b4ab-4b4a-847d-a469d89b1d0b/lovelustlawInstagram | https://www.instagram.com/lovelustlaw/Website: https://www.michelelocke.com/podcastInstagram:@strictlystalkingpod@feathergirl77@jaked3000See Privacy Policy at https://art19.com/privacy and California Privacy Notice at https://art19.com/privacy#do-not-sell-my-info.

ITSPmagazine | Technology. Cybersecurity. Society
AI Confusion, Privacy Pressures, and the Search for Real Value in Cybersecurity | A Black Hat USA 2025 Conversation with Evgeniy Kharam | On Location Coverage with Sean Martin and Marco Ciappelli

ITSPmagazine | Technology. Cybersecurity. Society

Play Episode Listen Later Aug 24, 2025 16:12


This year at Black Hat USA 2025, the conversation is impossible to escape: artificial intelligence. But while every vendor claims an AI-powered edge, the real question is how organizations can separate meaningful innovation from noise.In our discussion with Evgeniy Kharam, Vice President of Cybersecurity Architecture at Herjavec Group (formerly), Chief Strategy Officer (CSO) at Discern Security, and long-time security leader and author, the theme of AI confusion takes center stage. Evgeniy notes that CISOs and security architects don't have the time or resources to analyze what “AI” means in every product pitch. With over 4,000 vendors in the ecosystem, each layering its own flavor of AI, the burden falls on security leaders to distinguish hype from usable automation.From Gondola Pitches to AI OverloadEvgeniy shares how his creative networking events—skiing, biking, and beyond—mirror the industry's need for genuine connection and trust. Just as his “gondola pitch” builds authentic engagement, buyers want clarity and honesty from technology providers. The proliferation of AI labels, however, makes that trust harder to establish.Where AI Can HelpEvgeniy highlights areas where AI can reduce friction, from vulnerability management and detection to policy writing and compliance. Yet, even here, issues such as hallucinations, privacy tradeoffs, and ethics cannot be ignored. When AI begins influencing employee monitoring or analyzing sensitive data, organizations face difficult questions about fairness, transparency, and control.The Unspoken Challenge: Surveillance and TrustAs we discuss the balance between employee privacy and corporate protection, it becomes clear that AI introduces new layers of surveillance. In Europe, cultural and legal boundaries create clear separation between personal and professional lives. In North America, the lines blur, raising ethical debates that may ultimately be tested in courts.The takeaway? AI has the potential to unlock workflows that were previously too costly or complex. But without transparency, governance, and a commitment to responsible use, the “AI in everything” trend risks overwhelming the very leaders it is meant to help.___________Guest:Evgeniy Kharam, Chief Strategy Officer (CSO), Discern Security | On LinkedIn: https://www.linkedin.com/in/ekharam/Hosts:Sean Martin, Co-Founder at ITSPmagazine | Website: https://www.seanmartin.comMarco Ciappelli, Co-Founder at ITSPmagazine | Website: https://www.marcociappelli.com___________Episode SponsorsThreatLocker: https://itspm.ag/threatlocker-r974BlackCloak: https://itspm.ag/itspbcwebAkamai: https://itspm.ag/akamailbwcDropzoneAI: https://itspm.ag/dropzoneai-641Stellar Cyber: https://itspm.ag/stellar-9dj3___________ResourcesLearn more and catch more stories from our Black Hat USA 2025 coverage: https://www.itspmagazine.com/bhusa25ITSPmagazine Webinar: What's Heating Up Before Black Hat 2025: Place Your Bet on the Top Trends Set to Shake Up this Year's Hacker Conference — An ITSPmagazine Thought Leadership Webinar | https://www.crowdcast.io/c/whats-heating-up-before-black-hat-2025-place-your-bet-on-the-top-trends-set-to-shake-up-this-years-hacker-conferenceCatch all of our event coverage: https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverageWant to tell your Brand Story Briefing as part of our event coverage? Learn More

Strictly Stalking
292. Terror In Her Neighborhood: Stalking Hyde

Strictly Stalking

Play Episode Listen Later Aug 19, 2025 53:19


Hyde's childhood was torn apart when her mother became involved with a violent neighbor. What followed was years of terror—stalking, threats, and even an attempted abduction from school. Eventually, a vicious assault led to his arrest and a 12-year prison sentence. But the nightmare didn't end there. Even from behind bars, he found ways to torment them with threats—and chilling confessions that he was a serial killer. The weight of that trauma pushed Hyde into isolation as a teenager. But in time, she transformed her pain into purpose. Today, after more than two decades working in shelters and youth advocacy, she's dedicated her life to protecting the next generation of at-risk kids.HAVE YOU EXPERIENCED STALKING? LET US KNOW:strictlystalkingpod@gmail.comPLEASE VISIT OUR SPONSORS!Delete MeToday get 20% off your DeleteMe plan when you go to JoinDeleteMe.com/STALKING and use promo code STALKING at checkout. QuinceGo to https://www.quince.com/strictly for free shipping on your order and 365-day returns. Progressive InsurancePress play on comparing auto rates. Get your auto quote at Progressive.com to join the over 28 million drivers who trust Progressive.OTHER LINKSThe Last Trip - Podcast - hosted by Jaimie BeebeListen & Subscribe to The Last Trip - https://audioboom.com/channels/5119581-the-last-tripFollow The Last Trip on Instagram - https://www.instagram.com/thelasttripcrimepod/And Subscribe for all the updates on Patreon - https://www.patreon.com/TheLastTripPodcastlovelustaw - PodcastApple Podcasts | https://podcasts.apple.com/us/podcast/lovelustlaw/id1819843688Spotify | https://open.spotify.com/show/6BEWXKOaEo8lfK554a5NqEAmazon Music | https://music.amazon.com/podcasts/2789d9c8-b4ab-4b4a-847d-a469d89b1d0b/lovelustlawInstagram | https://www.instagram.com/lovelustlaw/Website: https://www.michelelocke.com/podcastInstagram:@strictlystalkingpod@feathergirl77@jaked3000See Privacy Policy at https://art19.com/privacy and California Privacy Notice at https://art19.com/privacy#do-not-sell-my-info.

Strictly Stalking
291. Stalking Games

Strictly Stalking

Play Episode Listen Later Aug 12, 2025 54:48


Bryce had a stalker—someone who knew her every move. But she didn't even know his name. They never met in person. At least, not that she's aware of. But he's seen her. He's watched her family. He's studied her friends. She only knows what he wants her to know—starting with the one image he chose to send. What began as a harmless friendship in the world of online gaming soon spiraled into something much darker: a calculated obsession that would turn her life upside down.HAVE YOU EXPERIENCED STALKING? LET US KNOW:strictlystalkingpod@gmail.comPLEASE VISIT OUR SPONSORS!Progressive InsurancePress play on comparing auto rates. Get your auto quote at Progressive.com to join the over 28 million drivers who trust Progressive.Love, Murder - The PodcastJessie Pray and Andie Cassette team up each week to tell stories of love and relationships gone fatally wrong. This show is all about seemingly normal people driven to terrible madness by passion and rage. Hang out with your new best friends each week to discover how someone can go from sweet to murderous in the blink of an eye, and to hear all the ways murder can give love a real bad name.https://podcasts.apple.com/us/podcast/love-murder/id1522372858OTHER LINKSThe Last Trip - Podcast - hosted by Jaimie BeebeListen & Subscribe to The Last Trip - https://audioboom.com/channels/5119581-the-last-tripFollow The Last Trip on Instagram - https://www.instagram.com/thelasttripcrimepod/And Subscribe for all the updates on Patreon - https://www.patreon.com/TheLastTripPodcastlovelustaw - PodcastApple Podcasts | https://podcasts.apple.com/us/podcast/lovelustlaw/id1819843688Spotify | https://open.spotify.com/show/6BEWXKOaEo8lfK554a5NqEAmazon Music | https://music.amazon.com/podcasts/2789d9c8-b4ab-4b4a-847d-a469d89b1d0b/lovelustlawInstagram | https://www.instagram.com/lovelustlaw/Website: https://www.michelelocke.com/podcastInstagram:@strictlystalkingpod@feathergirl77@jaked3000See Privacy Policy at https://art19.com/privacy and California Privacy Notice at https://art19.com/privacy#do-not-sell-my-info.

ITSPmagazine | Technology. Cybersecurity. Society
From Fish Tanks to AI Agents: Why the Words “We're Secure” Means Nothing Without Proof | A Black Hat USA 2025 Conversation with Viktor Petersson | On Location Coverage with Sean Martin and Marco Ciappelli

ITSPmagazine | Technology. Cybersecurity. Society

Play Episode Listen Later Aug 11, 2025 27:02


When security becomes more than a checkbox, the conversation shifts from “how much” to “how well.” At Black Hat USA 2025, Sean Martin, CISSP, Co-Founder of ITSPmagazine, and Viktor Petersson, Founder of an SBOM artifact platform, unpack how regulatory forces, cultural change, and AI innovation are reshaping how organizations think about security.Viktor points to the growing role of Software Bill of Materials (SBOMs) as not just a best practice, but a likely requirement in future compliance frameworks. The shift, he notes, is driven largely by regulation—especially in Europe—where security is no longer a “nice to have” but a mandated operational function. Sean connects this to a market reality: companies increasingly see transparent security practices as a competitive differentiator, though the industry still struggles with the hollow claim of simply being “secure.”AI naturally dominates discussions, but the focus is nuanced. Rather than chasing hype, both stress the need for strong guardrails before scaling AI-driven development. Viktor envisions engineers supervising fleets of specialized AI agents—handling tasks from UX to code auditing—while Sean sees AI as a way to rethink entire operational models. Yet both caution that without foundational security practices, AI only amplifies existing risks.The conversation extends to IoT and supply chain security, where market failures allow insecure, end-of-life devices to persist in critical environments. The infamous “smart fish tank” hack in a Las Vegas casino serves as a reminder: the weakest link often isn't the target itself, but the entry point it provides.DEFCON, Viktor notes, offers a playground for challenging assumptions—whether it's lock-picking to illustrate perceived versus actual security, or examining the human factor in breaches. For both hosts, events like Black Hat and DEFCON aren't just about the latest vulnerabilities or flashy demos—they're about the human exchange of ideas, the reframing of problems, and the collaboration that fuels more resilient security strategies.___________Guest:Viktor Petersson, Founder, sbomify | On LinkedIn: https://www.linkedin.com/in/vpetersson/Hosts:Sean Martin, Co-Founder at ITSPmagazine | Website: https://www.seanmartin.comMarco Ciappelli, Co-Founder at ITSPmagazine | Website: https://www.marcociappelli.com___________Episode SponsorsThreatLocker: https://itspm.ag/threatlocker-r974BlackCloak: https://itspm.ag/itspbcwebAkamai: https://itspm.ag/akamailbwcDropzoneAI: https://itspm.ag/dropzoneai-641Stellar Cyber: https://itspm.ag/stellar-9dj3___________ResourcesLearn more and catch more stories from our Black Hat USA 2025 coverage: https://www.itspmagazine.com/bhusa25ITSPmagazine Webinar: What's Heating Up Before Black Hat 2025: Place Your Bet on the Top Trends Set to Shake Up this Year's Hacker Conference — An ITSPmagazine Thought Leadership Webinar | https://www.crowdcast.io/c/whats-heating-up-before-black-hat-2025-place-your-bet-on-the-top-trends-set-to-shake-up-this-years-hacker-conferenceCatch all of our event coverage: https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverageWant to tell your Brand Story Briefing as part of our event coverage? Learn More

ITSPmagazine | Technology. Cybersecurity. Society
How to Lose a CISO in 10 Words (or Less) | Straight Talk, Not Spin: Black Hat's Hard Truths | On Location Coverage with Sean Martin and Marco Ciappelli

ITSPmagazine | Technology. Cybersecurity. Society

Play Episode Listen Later Aug 8, 2025 11:04


Black Hat USA 2025 has wrapped, and for Sean Martin, CISSP, Co-Founder of ITSPmagazine, and Marco Ciappelli, Co-Founder of ITSPmagazine, the end of the event is both an exhale and a moment to reflect on what was learned, heard, and felt. After days of conversations with industry leaders, CISOs, vendors, and attendees from around the globe, one recurring message stands out: cybersecurity decision-makers are tired of buzzwords and hungry for real solutions.Sean shares that during sessions and informal meetups, CISOs expressed frustration with marketing pitches that fail to connect to their real challenges. Sitting across from security leaders, marketers heard it directly—stop with the jargon and explain how your solution genuinely makes their lives easier, reduces stress, and improves security outcomes. In other words, trust and honesty carry far more weight than flashy claims.Marco emphasizes that hype not only wastes time but also adds “noise” to the already complex job of running a security program. The more a vendor can be direct about what they do—and what they don't do—the more likely they are to earn a lasting relationship with a CISO and their team. Both agree that connecting the dots between a product and an organization's operational reality is key: what does adoption require, how will it fit into existing systems, and will it force a major operational shift?Beyond the messaging critique, the duo reflects on the community element of Black Hat. They reconnected with peers, met new contacts from as far as Toronto, and discussed future events in places like Melbourne, Barcelona, and Amsterdam. They also teased the upcoming “Transatlantic Broadcast” podcast series, which will explore cybersecurity voices from across Europe while maintaining a global view.While the Black Hat booths are now dismantled and the floors mopped, the conversations are far from over. Sean and Marco head back to Los Angeles ready to produce interviews, publish articles, and share the many stories captured during the week—stories that cut through the noise and get to the heart of what matters in cybersecurity.___________Hosts:Sean Martin, Co-Founder at ITSPmagazine | Website: https://www.seanmartin.comMarco Ciappelli, Co-Founder at ITSPmagazine | Website: https://www.marcociappelli.com___________Episode SponsorsThreatLocker: https://itspm.ag/threatlocker-r974BlackCloak: https://itspm.ag/itspbcwebAkamai: https://itspm.ag/akamailbwcDropzoneAI: https://itspm.ag/dropzoneai-641Stellar Cyber: https://itspm.ag/stellar-9dj3___________ResourcesLearn more and catch more stories from our Black Hat USA 2025 coverage: https://www.itspmagazine.com/bhusa25Learn more about ITSPmagazine Studio: https://www.itspmagazine.studio/Learn more about ITSPmagazine Europe: https://www.itspmagazine.com/europeCatch all of our event coverage: https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverageITSPmagazine Webinar: What's Heating Up Before Black Hat 2025: Place Your Bet on the Top Trends Set to Shake Up this Year's Hacker Conference — An ITSPmagazine Thought Leadership Webinar | https://www.crowdcast.io/c/whats-heating-up-before-black-hat-2025-place-your-bet-on-the-top-trends-set-to-shake-up-this-years-hacker-conferenceWant to tell your Brand Story Briefing as part of our event coverage? Learn More

Strictly Stalking
290. Impersonated, Harassed, Stalked

Strictly Stalking

Play Episode Listen Later Aug 5, 2025 44:09


On today's episode, we're speaking with Whitney — a woman who found love while living life on the road, embracing the freedom of van life and a fresh start. But her new beginning took a dark turn when her partner's ex tracked her down through social media — and began stalking her. Since then, Whitney has been impersonated online, had private photos shared without consent, and faced false police reports — all while the harassment continues. Now, she's stepping forward to share her story.HAVE YOU EXPERIENCED STALKING? LET US KNOW:strictlystalkingpod@gmail.comPLEASE VISIT OUR SPONSORS!Delete MeToday get 20% off your DeleteMe plan when you go to JoinDeleteMe.com/STALKING and use promo code STALKING at checkout. Progressive InsurancePress play on comparing auto rates. Get your auto quote at Progressive.com to join the over 28 million drivers who trust Progressive.Love, Murder - The PodcastJessie Pray and Andie Cassette team up each week to tell stories of love and relationships gone fatally wrong. This show is all about seemingly normal people driven to terrible madness by passion and rage. Hang out with your new best friends each week to discover how someone can go from sweet to murderous in the blink of an eye, and to hear all the ways murder can give love a real bad name.https://podcasts.apple.com/us/podcast/love-murder/id1522372858OTHER LINKSThe Last Trip - Podcast - hosted by Jaimie BeebeListen & Subscribe to The Last Trip - https://audioboom.com/channels/5119581-the-last-tripFollow The Last Trip on Instagram - https://www.instagram.com/thelasttripcrimepod/And Subscribe for all the updates on Patreon - https://www.patreon.com/TheLastTripPodcastlovelustaw - PodcastApple Podcasts | https://podcasts.apple.com/us/podcast/lovelustlaw/id1819843688Spotify | https://open.spotify.com/show/6BEWXKOaEo8lfK554a5NqEAmazon Music | https://music.amazon.com/podcasts/2789d9c8-b4ab-4b4a-847d-a469d89b1d0b/lovelustlawInstagram | https://www.instagram.com/lovelustlaw/Website: https://www.michelelocke.com/podcastInstagram:@strictlystalkingpod@feathergirl77@jaked3000See Privacy Policy at https://art19.com/privacy and California Privacy Notice at https://art19.com/privacy#do-not-sell-my-info.

ITSPmagazine | Technology. Cybersecurity. Society
Fake Identities, Real Consequences: The Data Trail Behind Your Political Donation | A Black Hat USA 2025 Conversation with Virginia Tech's Alan Michaels and Jared Byers | On Location Coverage with Sean Martin and Marco Ciappelli

ITSPmagazine | Technology. Cybersecurity. Society

Play Episode Listen Later Aug 4, 2025 19:25


What happens when you inject thousands of fake identities into the political ecosystem to monitor how personal data is used—or abused? That's the question Virginia Tech's Alan Michaels and Jared Byers explore through their multi-year research project, “Use and Abuse of Personal Information: The Politics Edition.”With support from 130 students across 21 majors, Michaels and Byers create realistic digital personas—complete with phone numbers, emails, and physical addresses—and sign them up across 1,400 political campaigns. Their goal? Understand how political organizations treat personal data: whether it's used ethically, shared with third parties, or even exposed through insecure systems.The findings are both fascinating and concerning. Their data shows that candidates across the political spectrum often prioritize fundraising above all else. The language and targeting vary, but the endgame is consistent: solicit donations and votes. And yes—these candidates frequently share or leak personal data. Sometimes it's deliberate, sometimes it's sloppy, and occasionally it's the result of potential breaches.The team examines differences in how data is handled based on whether an identity donates or not, or whether it's tied to in-state versus out-of-state addresses. They even explore how generative AI and psychometric modeling can craft convincing personalities for these fake identities—tools that can just as easily be used for political influence campaigns and psychological manipulation.But this project isn't about political sides—it's about accountability. The research remains strictly apolitical, letting the data speak for itself. Michaels and Byers are careful to avoid influencing public opinion through misinformation, focusing instead on documenting the reality of digital privacy in modern campaigning.As more of the political playbook shifts into the digital arena, this session at Black Hat USA 2025 pushes attendees to confront an uncomfortable truth: the cost of participation in political life may include the exploitation of your digital identity.___________Guests:Alan Michaels, Professor and Director, Spectrum Dominance Division at Virginia Tech | On LinkedIn: https://www.linkedin.com/in/alan-michaels-1066814/Jared Byers, Research Associate at Virginia Tech National Security Institute | On LinkedIn: https://www.linkedin.com/in/jared-byers-8a477324b/Hosts:Sean Martin, Co-Founder at ITSPmagazine | Website: https://www.seanmartin.comMarco Ciappelli, Co-Founder at ITSPmagazine | Website: https://www.marcociappelli.com___________Episode SponsorsThreatLocker: https://itspm.ag/threatlocker-r974BlackCloak: https://itspm.ag/itspbcwebAkamai: https://itspm.ag/akamailbwcDropzoneAI: https://itspm.ag/dropzoneai-641Stellar Cyber: https://itspm.ag/stellar-9dj3___________ResourcesSession: Use and Abuse of Personal Information -- Politics Edition: https://www.blackhat.com/us-25/briefings/schedule/#use-and-abuse-of-personal-information----politics-edition-45529Learn more and catch more stories from our Black Hat USA 2025 coverage: https://www.itspmagazine.com/bhusa25ITSPmagazine Webinar: What's Heating Up Before Black Hat 2025: Place Your Bet on the Top Trends Set to Shake Up this Year's Hacker Conference — An ITSPmagazine Thought Leadership Webinar | https://www.crowdcast.io/c/whats-heating-up-before-black-hat-2025-place-your-bet-on-the-top-trends-set-to-shake-up-this-years-hacker-conferenceCatch all of our event coverage: https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverageWant to tell your Brand Story Briefing as part of our event coverage? Learn More

ITSPmagazine | Technology. Cybersecurity. Society
From Hacker Defense to Civil Liberties: Threat Modeling Meets Constitutional Law | A Black Hat USA 2025 Keynote Conversation with Jennifer Granick | On Location Coverage with Sean Martin and Marco Ciappelli

ITSPmagazine | Technology. Cybersecurity. Society

Play Episode Listen Later Aug 4, 2025 22:47


At Black Hat USA 2025, Jennifer Granick—Surveillance and Cybersecurity Counsel at the American Civil Liberties Union—takes the keynote stage to make a bold case: we are long overdue for a new threat model, one that sees government surveillance not as a background risk, but as a primary threat to constitutional privacy.Granick draws from decades of experience defending hackers, fighting surveillance overreach, and engaging with the security community since DEFCON 3. She challenges the audience to reconsider outdated assumptions about how the Fourth Amendment is interpreted and applied. While technology has made it easier than ever for governments to collect data, the legal system hasn't kept pace—and in many cases, fails to recognize the sheer scope and sensitivity of personal information exposed through modern services.Her talk doesn't just raise alarm; it calls for action. Granick suggests that while legal reform is sluggish—stymied by a lack of political will and lobbying power—there's an urgent opportunity for the technical community to step up. From encryption to data minimization and anonymization, technologists have the tools to protect civil liberties even when the law falls short.The session promises to be a wake-up call for engineers, designers, policymakers, and privacy advocates. Granick wants attendees to leave not only more informed, but motivated to build systems that limit the unnecessary collection, retention, and exposure of personal data.Her keynote also surfaces a critical cultural shift: from the “Spot the Fed” days of DEFCON to a more nuanced understanding of government roles—welcoming collaboration where it serves the public good, but not at the expense of unchecked surveillance.This conversation reframes privacy as a design problem as much as a legal one—and one that requires collective effort to address. If the law can't fix it, the question becomes: will the technology community rise to the challenge?___________Guest:Jennifer Granick, Surveillance and Cybersecurity Counsel at American Civil Liberties Union | On LinkedIn: https://www.linkedin.com/in/jennifergranick/Hosts:Sean Martin, Co-Founder at ITSPmagazine | Website: https://www.seanmartin.comMarco Ciappelli, Co-Founder at ITSPmagazine | Website: https://www.marcociappelli.com___________Episode SponsorsThreatLocker: https://itspm.ag/threatlocker-r974BlackCloak: https://itspm.ag/itspbcwebAkamai: https://itspm.ag/akamailbwcDropzoneAI: https://itspm.ag/dropzoneai-641Stellar Cyber: https://itspm.ag/stellar-9dj3___________ResourcesKeynote: Threat Modeling and Constitutional Law: https://www.blackhat.com/us-25/briefings/schedule/index.html#keynote-threat-modeling-and-constitutional-law-48276Learn more and catch more stories from our Black Hat USA 2025 coverage: https://www.itspmagazine.com/bhusa25ITSPmagazine Webinar: What's Heating Up Before Black Hat 2025: Place Your Bet on the Top Trends Set to Shake Up this Year's Hacker Conference — An ITSPmagazine Thought Leadership Webinar | https://www.crowdcast.io/c/whats-heating-up-before-black-hat-2025-place-your-bet-on-the-top-trends-set-to-shake-up-this-years-hacker-conferenceCatch all of our event coverage: https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverageWant to tell your Brand Story Briefing as part of our event coverage? Learn More

Strictly Stalking
289. The Stalking Stepmother

Strictly Stalking

Play Episode Listen Later Jul 29, 2025 53:25


Alexis grew up in the shadows of neglect and abuse, with a stepmother whose control didn't end when she left home at 17. Even from a distance, the stalking and manipulation continued — a relentless effort to keep Alexis under her thumb. But Alexis fought back in the quietest, most powerful way: by healing. Through somatic therapy and EMDR, she's learning to calm her nervous system, reclaim her sense of safety, and rebuild trust in herself. Her journey hasn't been easy — but it's given her a sharp clarity. She now recognizes the red flags, holds her boundaries, and protects the peace she fought so hard to find. Today, Alexis is here to share her story — not just to speak her truth, but to let others know they're not alone.**The following episode of Strictly Stalking contains graphics depictions of physical violence. Please listen with caution.**HAVE YOU EXPERIENCED STALKING? LET US KNOW:strictlystalkingpod@gmail.comPLEASE VISIT OUR SPONSORS!QuinceGo to https://www.quince.com/strictly for free shipping on your order and 365-day returns.ShopifySign up for a one-dollar-per-month trial period at SHOPIFY.COM/STRICTLYSTALKING to take your retail business to the next level. That's SHOPIFY.COM/STRICTLYSTALKINGLove, Murder - The PodcastJessie Pray and Andie Cassette team up each week to tell stories of love and relationships gone fatally wrong. This show is all about seemingly normal people driven to terrible madness by passion and rage. Hang out with your new best friends each week to discover how someone can go from sweet to murderous in the blink of an eye, and to hear all the ways murder can give love a real bad name.https://podcasts.apple.com/us/podcast/love-murder/id1522372858OTHER LINKSThe Last Trip - Podcast - hosted by Jaimie BeebeListen & Subscribe to The Last Trip - https://audioboom.com/channels/5119581-the-last-tripFollow The Last Trip on Instagram - https://www.instagram.com/thelasttripcrimepod/And Subscribe for all the updates on Patreon - https://www.patreon.com/TheLastTripPodcastlovelustaw - PodcastApple Podcasts | https://podcasts.apple.com/us/podcast/lovelustlaw/id1819843688Spotify | https://open.spotify.com/show/6BEWXKOaEo8lfK554a5NqEAmazon Music | https://music.amazon.com/podcasts/2789d9c8-b4ab-4b4a-847d-a469d89b1d0b/lovelustlawInstagram | https://www.instagram.com/lovelustlaw/Website: https://www.michelelocke.com/podcastInstagram:@strictlystalkingpod@feathergirl77@jaked3000See Privacy Policy at https://art19.com/privacy and California Privacy Notice at https://art19.com/privacy#do-not-sell-my-info.

Strictly Stalking
288. Stalked by a Federal Agent: C. Kimberly Toms

Strictly Stalking

Play Episode Listen Later Jul 22, 2025 104:01


Kimberly thought she was meeting a charming real estate manager. She had no idea he'd already been stalking her for a month—or that his entire identity was a lie. He was actually a U.S. Department of State special agent with a 30-year history of using his badge and gun to terrorize women across the country. What began as quiet digital surveillance spiraled into a brutal campaign of threats, harassment, rape, and attempted murder. Kimberly fled more than 1,300 miles—twice—but he used his federal ties to track her down, even pulling other law enforcement into his twisted pursuit. Eight officers in five states turned her away. But Kimberly wouldn't stay silent. She was determined to expose the predator behind the badge.**The following episode of Strictly Stalking contains graphics depictions of physical violence and sexual assault. Please listen with caution.**HAVE YOU EXPERIENCED STALKING? LET US KNOW:strictlystalkingpod@gmail.comPLEASE VISIT OUR SPONSORS!Delete MeToday get 20% off your DeleteMe plan when you go to JoinDeleteMe.com/STALKING and use promo code STALKING at checkout. Love, Murder - The PodcastJessie Pray and Andie Cassette team up each week to tell stories of love and relationships gone fatally wrong. This show is all about seemingly normal people driven to terrible madness by passion and rage. Hang out with your new best friends each week to discover how someone can go from sweet to murderous in the blink of an eye, and to hear all the ways murder can give love a real bad name.https://podcasts.apple.com/us/podcast/love-murder/id1522372858GUEST LINKSKimberly TomsPersonal website: kimberlytoms.comNot Just One: notjustone.orgCKT LinkedIn: https://www.linkedin.com/in/c-kimberly-toms/TikTok: https://www.tiktok.com/@notjustoneIG: https://www.instagram.com/ckimberlytoms/OTHER LINKSThe Last Trip - Podcast - hosted by Jaimie BeebeListen & Subscribe to The Last Trip - https://audioboom.com/channels/5119581-the-last-tripFollow The Last Trip on Instagram - https://www.instagram.com/thelasttripcrimepod/And Subscribe for all the updates on Patreon - https://www.patreon.com/TheLastTripPodcastlovelustaw - PodcastApple Podcasts | https://podcasts.apple.com/us/podcast/lovelustlaw/id1819843688Spotify | https://open.spotify.com/show/6BEWXKOaEo8lfK554a5NqEAmazon Music | https://music.amazon.com/podcasts/2789d9c8-b4ab-4b4a-847d-a469d89b1d0b/lovelustlawInstagram | https://www.instagram.com/lovelustlaw/Website: https://www.michelelocke.com/podcastInstagram:@strictlystalkingpod@feathergirl77@jaked3000See Privacy Policy at https://art19.com/privacy and California Privacy Notice at https://art19.com/privacy#do-not-sell-my-info.

Strictly Stalking
287. Stalked Twice: Jennifer's Unrelenting Nightmare

Strictly Stalking

Play Episode Listen Later Jul 15, 2025 45:24


Jennifer didn't just have one stalker—she had two. For over two years, she was haunted by anonymous phone calls that kept coming, no matter how many times she changed her number. Then, the calls spread to her friends and coworkers. Just when it seemed to stop… it started all over again. This time, it was a coworker's ex—furious, obsessed, and blaming Jennifer for the breakup. The harassment began online, but quickly turned into something far more dangerous: cyberstalking, in-person encounters, and relentless fear. It finally ended when Jennifer made the only choice she could—walking away from her job, and her stalker, for good.HAVE YOU EXPERIENCED STALKING? LET US KNOW:strictlystalkingpod@gmail.comPLEASE VISIT OUR SPONSORS!Progressive InsurancePress play on comparing auto rates. Get your auto quote at Progressive.com to join the over 28 million drivers who trust Progressive.Love, Murder - The PodcastJessie Pray and Andie Cassette team up each week to tell stories of love and relationships gone fatally wrong. This show is all about seemingly normal people driven to terrible madness by passion and rage. Hang out with your new best friends each week to discover how someone can go from sweet to murderous in the blink of an eye, and to hear all the ways murder can give love a real bad name.https://podcasts.apple.com/us/podcast/love-murder/id1522372858OTHER LINKSThe Last Trip - Podcast - hosted by Jaimie BeebeListen & Subscribe to The Last Trip - https://audioboom.com/channels/5119581-the-last-tripFollow The Last Trip on Instagram - https://www.instagram.com/thelasttripcrimepod/And Subscribe for all the updates on Patreon - https://www.patreon.com/TheLastTripPodcastlovelustaw - PodcastApple Podcasts | https://podcasts.apple.com/us/podcast/lovelustlaw/id1819843688Spotify | https://open.spotify.com/show/6BEWXKOaEo8lfK554a5NqEAmazon Music | https://music.amazon.com/podcasts/2789d9c8-b4ab-4b4a-847d-a469d89b1d0b/lovelustlawInstagram | https://www.instagram.com/lovelustlaw/Website: https://www.michelelocke.com/podcastInstagram:@strictlystalkingpod@feathergirl77@jaked3000See Privacy Policy at https://art19.com/privacy and California Privacy Notice at https://art19.com/privacy#do-not-sell-my-info.

Strictly Stalking
286. The Stalker Still Works There

Strictly Stalking

Play Episode Listen Later Jul 8, 2025 80:45


Laura's life was turned upside down by a relentless stalker — and now, she's fighting back.He tried to photograph her inside a bathroom stall, then broke into her car… her home… even physically attacked her. He stole photos of her children and obsessively watched videos of her young son. Over and over, he snuck into her office, locked her out, and accessed her personal devices. But despite the clear evidence, Laura was the one labeled unstable. She lost her job — while her stalker still works there. Now, Laura's not just fighting for herself. She's standing up for her children, her colleagues, and the students she once protected.HAVE YOU EXPERIENCED STALKING? LET US KNOW:strictlystalkingpod@gmail.comPLEASE VISIT OUR SPONSORS!Delete MeToday get 20% off your DeleteMe plan when you go to JoinDeleteMe.com/STALKING and use promo code STALKING at checkout. Progressive InsurancePress play on comparing auto rates. Get your auto quote at Progressive.com to join the over 28 million drivers who trust Progressive.Love, Murder - The PodcastJessie Pray and Andie Cassette team up each week to tell stories of love and relationships gone fatally wrong. This show is all about seemingly normal people driven to terrible madness by passion and rage. Hang out with your new best friends each week to discover how someone can go from sweet to murderous in the blink of an eye, and to hear all the ways murder can give love a real bad name.https://podcasts.apple.com/us/podcast/love-murder/id1522372858OTHER LINKSThe Last Trip - Podcast - hosted by Jaimie BeebeListen & Subscribe to The Last Trip - https://audioboom.com/channels/5119581-the-last-tripFollow The Last Trip on Instagram - https://www.instagram.com/thelasttripcrimepod/And Subscribe for all the updates on Patreon - https://www.patreon.com/TheLastTripPodcastlovelustaw - PodcastApple Podcasts | https://podcasts.apple.com/us/podcast/lovelustlaw/id1819843688Spotify | https://open.spotify.com/show/6BEWXKOaEo8lfK554a5NqEAmazon Music | https://music.amazon.com/podcasts/2789d9c8-b4ab-4b4a-847d-a469d89b1d0b/lovelustlawInstagram | https://www.instagram.com/lovelustlaw/Website: https://www.michelelocke.com/podcastInstagram:@strictlystalkingpod@feathergirl77@jaked3000See Privacy Policy at https://art19.com/privacy and California Privacy Notice at https://art19.com/privacy#do-not-sell-my-info.

Strictly Stalking
285. What Came Next: Familicide & Stalking

Strictly Stalking

Play Episode Listen Later Jul 1, 2025 69:39


Amy B. Chesler is an award-winning author, actress, and advocate whose life took a devastating turn in 2007 when her brother murdered their mother. After surviving years of abuse and a prolonged legal battle, Amy continues to face ongoing stalking and threats from her brother — even from behind bars. Although his parole has been extended to 2030, gaps in victim notification and systemic failures still leave Amy living with uncertainty. Determined to turn her trauma into purpose, Amy now uses her voice to drive change. As the host of What Came Next and Familicide, she amplifies survivor stories and advocates for meaningful reform in the justice system.**The following episode of Strictly Stalking contains depictions of familicide, homicide, physical violence, and sexual assault. Please listen with caution.**HAVE YOU EXPERIENCED STALKING? LET US KNOW:strictlystalkingpod@gmail.comPLEASE VISIT OUR SPONSORS!ShopifySign up for a one-dollar-per-month trial period at SHOPIFY.COM/STRICTLYSTALKING to take your retail business to the next level. That's SHOPIFY.COM/STRICTLYSTALKING Progressive InsurancePress play on comparing auto rates. Get your auto quote at Progressive.com to join the over 28 million drivers who trust Progressive.Love, Murder - The PodcastJessie Pray and Andie Cassette team up each week to tell stories of love and relationships gone fatally wrong. This show is all about seemingly normal people driven to terrible madness by passion and rage. Hang out with your new best friends each week to discover how someone can go from sweet to murderous in the blink of an eye, and to hear all the ways murder can give love a real bad name.https://podcasts.apple.com/us/podcast/love-murder/id1522372858GUEST LINKSAmy B. Cheslerhttp://amybchesler.comhttp://www.instagram.com/amybcheslerhttp://www.facebook.com/amybcheslerhttp://www.tiktok.com/@amybcheslerand my book:Working for Justice: https://amzn.to/4kiwOAyOTHER LINKSThe Last Trip - Podcast - hosted by Jaimie BeebeListen & Subscribe to The Last Trip - https://audioboom.com/channels/5119581-the-last-tripFollow The Last Trip on Instagram - https://www.instagram.com/thelasttripcrimepod/And Subscribe for all the updates on Patreon - https://www.patreon.com/TheLastTripPodcastlovelustaw - PodcastApple Podcasts | https://podcasts.apple.com/us/podcast/lovelustlaw/id1819843688Spotify | https://open.spotify.com/show/6BEWXKOaEo8lfK554a5NqEAmazon Music | https://music.amazon.com/podcasts/2789d9c8-b4ab-4b4a-847d-a469d89b1d0b/lovelustlawInstagram | https://www.instagram.com/lovelustlaw/Website: https://www.michelelocke.com/podcastInstagram:@strictlystalkingpod@feathergirl77@jaked3000See Privacy Policy at https://art19.com/privacy and California Privacy Notice at https://art19.com/privacy#do-not-sell-my-info.

Strictly Stalking
284. Fifteen Years of Fear: Stalked Into Silence

Strictly Stalking

Play Episode Listen Later Jun 24, 2025 80:09


Andrew's life was shattered by someone he barely even knew—a person who turned a simple business partnership into a 15-year nightmare of obsession, harassment, and relentless stalking. When the partnership fell apart, his stalker didn't walk away—instead, they weaponized the legal system. They secured a default judgment, not based on facts, but because Andrew simply didn't have the resources to fight back. That judgment became their tool of control, slowly dismantling Andrew's life piece by piece. Years of torment left him homeless, isolated, and battling multiple suicide attempts. But Andrew refused to let that be the end of his story. He's rebuilt his life—and his brand—on survival, resilience, and the raw truth of what it takes to fight back.**The following episode of Strictly Stalking contains topics including attempted suicide. Listener discretion is advised.**HAVE YOU EXPERIENCED STALKING? LET US KNOW:strictlystalkingpod@gmail.comPLEASE VISIT OUR SPONSORS!QuinceGo to https://www.quince.com/strictly for free shipping on your order and 365-day returns. Delete MeToday get 20% off your DeleteMe plan when you go to JoinDeleteMe.com/STALKING and use promo code STALKING at checkout. GUEST LINKSAndrew Janghttps://www.andrewjang.com/https://www.instagram.com/sevenofandrew/https://www.tiktok.com/@sevenofandrewInstagram:@strictlystalkingpod@feathergirl77@jaked3000See Privacy Policy at https://art19.com/privacy and California Privacy Notice at https://art19.com/privacy#do-not-sell-my-info.

Strictly Stalking
283. Stalking and Survival with Dr. Natalie Jones

Strictly Stalking

Play Episode Listen Later Jun 17, 2025 72:00


Dr. Natalie Jones is a licensed professional clinical counselor with more than 16 years of experience helping survivors of domestic violence, sexual assault, and stalking. She specializes in working with both those who've experienced narcissistic abuse — and those who struggle with narcissistic traits themselves. As a trusted voice in both the media and legal communities, Dr. Jones frequently consults on high-profile cases. Today, she's joining us to break down the psychological dynamics of stalking, explore its long-term impact on victims, and share what survivors need to know to protect themselves and begin the healing process.HAVE YOU EXPERIENCED STALKING? LET US KNOW:strictlystalkingpod@gmail.comPLEASE VISIT OUR SPONSORS!QuinceGo to https://www.quince.com/strictly for free shipping on your order and 365-day returns. BeamIf you want to try Beam's best-selling Dream Powder, get up to 40% off for a limited timewhen you go to shopbeam.com/stalking and use code STALKING at checkout. Progressive InsurancePress play on comparing auto rates. Get your auto quote at Progressive.com to join the over 28 million drivers who trust Progressive.GUEST LINKSDr. Natalie Joneshttps://www.drnataliejones.comhttps://www.drnataliejones.com/podcast/https://www.instagram.com/dr.nataliejones/Instagram:@strictlystalkingpod@feathergirl77@jaked3000See Privacy Policy at https://art19.com/privacy and California Privacy Notice at https://art19.com/privacy#do-not-sell-my-info.