Podcasts about let us know

  • 349PODCASTS
  • 896EPISODES
  • 46mAVG DURATION
  • 5WEEKLY NEW EPISODES
  • Aug 26, 2025LATEST

POPULARITY

20172018201920202021202220232024


Best podcasts about let us know

Show all podcasts related to let us know

Latest podcast episodes about let us know

Strictly Stalking
293. Stalking, Risk, and Reform: Tabetha Harrison

Strictly Stalking

Play Episode Listen Later Aug 26, 2025 54:31


Tabetha Harrison is one of the nation's foremost experts on stalking—and she's changing the way we understand it. A former law enforcement officer and investigator, Tabetha has dedicated her career to proving that stalking isn't just a nuisance crime. It's a dangerous form of coercive control—and one of the clearest warning signs before domestic violence turns deadly. Her work helped shape Texas Senate Bill 1717, reforming the state's stalking laws to put survivors first. Today, she trains agencies on stalking lethality, risk assessment, and coordinated community response. With unmatched expertise and a clear, urgent message, Tabetha is sounding the alarm: stalking is a red flag no one can afford to ignore.HAVE YOU EXPERIENCED STALKING? LET US KNOW:strictlystalkingpod@gmail.comPLEASE VISIT OUR SPONSORS!ShopifySign up for a one-dollar-per-month trial period at SHOPIFY.COM/STRICTLYSTALKING to take your retail business to the next level. That's SHOPIFY.COM/STRICTLYSTALKINGProgressive InsurancePress play on comparing auto rates. Get your auto quote at Progressive.com to join the over 28 million drivers who trust Progressive.GUEST LINKSTabetha Harrisonhttps://www.linkedin.com/in/tabetha-harrison-684a18186OTHER LINKSThe Last Trip - Podcast - hosted by Jaimie BeebeListen & Subscribe to The Last Trip - https://audioboom.com/channels/5119581-the-last-tripFollow The Last Trip on Instagram - https://www.instagram.com/thelasttripcrimepod/And Subscribe for all the updates on Patreon - https://www.patreon.com/TheLastTripPodcastlovelustaw - PodcastApple Podcasts | https://podcasts.apple.com/us/podcast/lovelustlaw/id1819843688Spotify | https://open.spotify.com/show/6BEWXKOaEo8lfK554a5NqEAmazon Music | https://music.amazon.com/podcasts/2789d9c8-b4ab-4b4a-847d-a469d89b1d0b/lovelustlawInstagram | https://www.instagram.com/lovelustlaw/Website: https://www.michelelocke.com/podcastInstagram:@strictlystalkingpod@feathergirl77@jaked3000See Privacy Policy at https://art19.com/privacy and California Privacy Notice at https://art19.com/privacy#do-not-sell-my-info.

ITSPmagazine | Technology. Cybersecurity. Society
AI Confusion, Privacy Pressures, and the Search for Real Value in Cybersecurity | A Black Hat USA 2025 Conversation with Evgeniy Kharam | On Location Coverage with Sean Martin and Marco Ciappelli

ITSPmagazine | Technology. Cybersecurity. Society

Play Episode Listen Later Aug 24, 2025 16:12


This year at Black Hat USA 2025, the conversation is impossible to escape: artificial intelligence. But while every vendor claims an AI-powered edge, the real question is how organizations can separate meaningful innovation from noise.In our discussion with Evgeniy Kharam, Vice President of Cybersecurity Architecture at Herjavec Group (formerly), Chief Strategy Officer (CSO) at Discern Security, and long-time security leader and author, the theme of AI confusion takes center stage. Evgeniy notes that CISOs and security architects don't have the time or resources to analyze what “AI” means in every product pitch. With over 4,000 vendors in the ecosystem, each layering its own flavor of AI, the burden falls on security leaders to distinguish hype from usable automation.From Gondola Pitches to AI OverloadEvgeniy shares how his creative networking events—skiing, biking, and beyond—mirror the industry's need for genuine connection and trust. Just as his “gondola pitch” builds authentic engagement, buyers want clarity and honesty from technology providers. The proliferation of AI labels, however, makes that trust harder to establish.Where AI Can HelpEvgeniy highlights areas where AI can reduce friction, from vulnerability management and detection to policy writing and compliance. Yet, even here, issues such as hallucinations, privacy tradeoffs, and ethics cannot be ignored. When AI begins influencing employee monitoring or analyzing sensitive data, organizations face difficult questions about fairness, transparency, and control.The Unspoken Challenge: Surveillance and TrustAs we discuss the balance between employee privacy and corporate protection, it becomes clear that AI introduces new layers of surveillance. In Europe, cultural and legal boundaries create clear separation between personal and professional lives. In North America, the lines blur, raising ethical debates that may ultimately be tested in courts.The takeaway? AI has the potential to unlock workflows that were previously too costly or complex. But without transparency, governance, and a commitment to responsible use, the “AI in everything” trend risks overwhelming the very leaders it is meant to help.___________Guest:Evgeniy Kharam, Chief Strategy Officer (CSO), Discern Security | On LinkedIn: https://www.linkedin.com/in/ekharam/Hosts:Sean Martin, Co-Founder at ITSPmagazine | Website: https://www.seanmartin.comMarco Ciappelli, Co-Founder at ITSPmagazine | Website: https://www.marcociappelli.com___________Episode SponsorsThreatLocker: https://itspm.ag/threatlocker-r974BlackCloak: https://itspm.ag/itspbcwebAkamai: https://itspm.ag/akamailbwcDropzoneAI: https://itspm.ag/dropzoneai-641Stellar Cyber: https://itspm.ag/stellar-9dj3___________ResourcesLearn more and catch more stories from our Black Hat USA 2025 coverage: https://www.itspmagazine.com/bhusa25ITSPmagazine Webinar: What's Heating Up Before Black Hat 2025: Place Your Bet on the Top Trends Set to Shake Up this Year's Hacker Conference — An ITSPmagazine Thought Leadership Webinar | https://www.crowdcast.io/c/whats-heating-up-before-black-hat-2025-place-your-bet-on-the-top-trends-set-to-shake-up-this-years-hacker-conferenceCatch all of our event coverage: https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverageWant to tell your Brand Story Briefing as part of our event coverage? Learn More

Strictly Stalking
292. Terror In Her Neighborhood: Stalking Hyde

Strictly Stalking

Play Episode Listen Later Aug 19, 2025 53:19


Hyde's childhood was torn apart when her mother became involved with a violent neighbor. What followed was years of terror—stalking, threats, and even an attempted abduction from school. Eventually, a vicious assault led to his arrest and a 12-year prison sentence. But the nightmare didn't end there. Even from behind bars, he found ways to torment them with threats—and chilling confessions that he was a serial killer. The weight of that trauma pushed Hyde into isolation as a teenager. But in time, she transformed her pain into purpose. Today, after more than two decades working in shelters and youth advocacy, she's dedicated her life to protecting the next generation of at-risk kids.HAVE YOU EXPERIENCED STALKING? LET US KNOW:strictlystalkingpod@gmail.comPLEASE VISIT OUR SPONSORS!Delete MeToday get 20% off your DeleteMe plan when you go to JoinDeleteMe.com/STALKING and use promo code STALKING at checkout. QuinceGo to https://www.quince.com/strictly for free shipping on your order and 365-day returns. Progressive InsurancePress play on comparing auto rates. Get your auto quote at Progressive.com to join the over 28 million drivers who trust Progressive.OTHER LINKSThe Last Trip - Podcast - hosted by Jaimie BeebeListen & Subscribe to The Last Trip - https://audioboom.com/channels/5119581-the-last-tripFollow The Last Trip on Instagram - https://www.instagram.com/thelasttripcrimepod/And Subscribe for all the updates on Patreon - https://www.patreon.com/TheLastTripPodcastlovelustaw - PodcastApple Podcasts | https://podcasts.apple.com/us/podcast/lovelustlaw/id1819843688Spotify | https://open.spotify.com/show/6BEWXKOaEo8lfK554a5NqEAmazon Music | https://music.amazon.com/podcasts/2789d9c8-b4ab-4b4a-847d-a469d89b1d0b/lovelustlawInstagram | https://www.instagram.com/lovelustlaw/Website: https://www.michelelocke.com/podcastInstagram:@strictlystalkingpod@feathergirl77@jaked3000See Privacy Policy at https://art19.com/privacy and California Privacy Notice at https://art19.com/privacy#do-not-sell-my-info.

Strictly Stalking
291. Stalking Games

Strictly Stalking

Play Episode Listen Later Aug 12, 2025 54:48


Bryce had a stalker—someone who knew her every move. But she didn't even know his name. They never met in person. At least, not that she's aware of. But he's seen her. He's watched her family. He's studied her friends. She only knows what he wants her to know—starting with the one image he chose to send. What began as a harmless friendship in the world of online gaming soon spiraled into something much darker: a calculated obsession that would turn her life upside down.HAVE YOU EXPERIENCED STALKING? LET US KNOW:strictlystalkingpod@gmail.comPLEASE VISIT OUR SPONSORS!Progressive InsurancePress play on comparing auto rates. Get your auto quote at Progressive.com to join the over 28 million drivers who trust Progressive.Love, Murder - The PodcastJessie Pray and Andie Cassette team up each week to tell stories of love and relationships gone fatally wrong. This show is all about seemingly normal people driven to terrible madness by passion and rage. Hang out with your new best friends each week to discover how someone can go from sweet to murderous in the blink of an eye, and to hear all the ways murder can give love a real bad name.https://podcasts.apple.com/us/podcast/love-murder/id1522372858OTHER LINKSThe Last Trip - Podcast - hosted by Jaimie BeebeListen & Subscribe to The Last Trip - https://audioboom.com/channels/5119581-the-last-tripFollow The Last Trip on Instagram - https://www.instagram.com/thelasttripcrimepod/And Subscribe for all the updates on Patreon - https://www.patreon.com/TheLastTripPodcastlovelustaw - PodcastApple Podcasts | https://podcasts.apple.com/us/podcast/lovelustlaw/id1819843688Spotify | https://open.spotify.com/show/6BEWXKOaEo8lfK554a5NqEAmazon Music | https://music.amazon.com/podcasts/2789d9c8-b4ab-4b4a-847d-a469d89b1d0b/lovelustlawInstagram | https://www.instagram.com/lovelustlaw/Website: https://www.michelelocke.com/podcastInstagram:@strictlystalkingpod@feathergirl77@jaked3000See Privacy Policy at https://art19.com/privacy and California Privacy Notice at https://art19.com/privacy#do-not-sell-my-info.

ITSPmagazine | Technology. Cybersecurity. Society
From Fish Tanks to AI Agents: Why the Words “We're Secure” Means Nothing Without Proof | A Black Hat USA 2025 Conversation with Viktor Petersson | On Location Coverage with Sean Martin and Marco Ciappelli

ITSPmagazine | Technology. Cybersecurity. Society

Play Episode Listen Later Aug 11, 2025 27:02


When security becomes more than a checkbox, the conversation shifts from “how much” to “how well.” At Black Hat USA 2025, Sean Martin, CISSP, Co-Founder of ITSPmagazine, and Viktor Petersson, Founder of an SBOM artifact platform, unpack how regulatory forces, cultural change, and AI innovation are reshaping how organizations think about security.Viktor points to the growing role of Software Bill of Materials (SBOMs) as not just a best practice, but a likely requirement in future compliance frameworks. The shift, he notes, is driven largely by regulation—especially in Europe—where security is no longer a “nice to have” but a mandated operational function. Sean connects this to a market reality: companies increasingly see transparent security practices as a competitive differentiator, though the industry still struggles with the hollow claim of simply being “secure.”AI naturally dominates discussions, but the focus is nuanced. Rather than chasing hype, both stress the need for strong guardrails before scaling AI-driven development. Viktor envisions engineers supervising fleets of specialized AI agents—handling tasks from UX to code auditing—while Sean sees AI as a way to rethink entire operational models. Yet both caution that without foundational security practices, AI only amplifies existing risks.The conversation extends to IoT and supply chain security, where market failures allow insecure, end-of-life devices to persist in critical environments. The infamous “smart fish tank” hack in a Las Vegas casino serves as a reminder: the weakest link often isn't the target itself, but the entry point it provides.DEFCON, Viktor notes, offers a playground for challenging assumptions—whether it's lock-picking to illustrate perceived versus actual security, or examining the human factor in breaches. For both hosts, events like Black Hat and DEFCON aren't just about the latest vulnerabilities or flashy demos—they're about the human exchange of ideas, the reframing of problems, and the collaboration that fuels more resilient security strategies.___________Guest:Viktor Petersson, Founder, sbomify | On LinkedIn: https://www.linkedin.com/in/vpetersson/Hosts:Sean Martin, Co-Founder at ITSPmagazine | Website: https://www.seanmartin.comMarco Ciappelli, Co-Founder at ITSPmagazine | Website: https://www.marcociappelli.com___________Episode SponsorsThreatLocker: https://itspm.ag/threatlocker-r974BlackCloak: https://itspm.ag/itspbcwebAkamai: https://itspm.ag/akamailbwcDropzoneAI: https://itspm.ag/dropzoneai-641Stellar Cyber: https://itspm.ag/stellar-9dj3___________ResourcesLearn more and catch more stories from our Black Hat USA 2025 coverage: https://www.itspmagazine.com/bhusa25ITSPmagazine Webinar: What's Heating Up Before Black Hat 2025: Place Your Bet on the Top Trends Set to Shake Up this Year's Hacker Conference — An ITSPmagazine Thought Leadership Webinar | https://www.crowdcast.io/c/whats-heating-up-before-black-hat-2025-place-your-bet-on-the-top-trends-set-to-shake-up-this-years-hacker-conferenceCatch all of our event coverage: https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverageWant to tell your Brand Story Briefing as part of our event coverage? Learn More

ITSPmagazine | Technology. Cybersecurity. Society
How to Lose a CISO in 10 Words (or Less) | Straight Talk, Not Spin: Black Hat's Hard Truths | On Location Coverage with Sean Martin and Marco Ciappelli

ITSPmagazine | Technology. Cybersecurity. Society

Play Episode Listen Later Aug 8, 2025 11:04


Black Hat USA 2025 has wrapped, and for Sean Martin, CISSP, Co-Founder of ITSPmagazine, and Marco Ciappelli, Co-Founder of ITSPmagazine, the end of the event is both an exhale and a moment to reflect on what was learned, heard, and felt. After days of conversations with industry leaders, CISOs, vendors, and attendees from around the globe, one recurring message stands out: cybersecurity decision-makers are tired of buzzwords and hungry for real solutions.Sean shares that during sessions and informal meetups, CISOs expressed frustration with marketing pitches that fail to connect to their real challenges. Sitting across from security leaders, marketers heard it directly—stop with the jargon and explain how your solution genuinely makes their lives easier, reduces stress, and improves security outcomes. In other words, trust and honesty carry far more weight than flashy claims.Marco emphasizes that hype not only wastes time but also adds “noise” to the already complex job of running a security program. The more a vendor can be direct about what they do—and what they don't do—the more likely they are to earn a lasting relationship with a CISO and their team. Both agree that connecting the dots between a product and an organization's operational reality is key: what does adoption require, how will it fit into existing systems, and will it force a major operational shift?Beyond the messaging critique, the duo reflects on the community element of Black Hat. They reconnected with peers, met new contacts from as far as Toronto, and discussed future events in places like Melbourne, Barcelona, and Amsterdam. They also teased the upcoming “Transatlantic Broadcast” podcast series, which will explore cybersecurity voices from across Europe while maintaining a global view.While the Black Hat booths are now dismantled and the floors mopped, the conversations are far from over. Sean and Marco head back to Los Angeles ready to produce interviews, publish articles, and share the many stories captured during the week—stories that cut through the noise and get to the heart of what matters in cybersecurity.___________Hosts:Sean Martin, Co-Founder at ITSPmagazine | Website: https://www.seanmartin.comMarco Ciappelli, Co-Founder at ITSPmagazine | Website: https://www.marcociappelli.com___________Episode SponsorsThreatLocker: https://itspm.ag/threatlocker-r974BlackCloak: https://itspm.ag/itspbcwebAkamai: https://itspm.ag/akamailbwcDropzoneAI: https://itspm.ag/dropzoneai-641Stellar Cyber: https://itspm.ag/stellar-9dj3___________ResourcesLearn more and catch more stories from our Black Hat USA 2025 coverage: https://www.itspmagazine.com/bhusa25Learn more about ITSPmagazine Studio: https://www.itspmagazine.studio/Learn more about ITSPmagazine Europe: https://www.itspmagazine.com/europeCatch all of our event coverage: https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverageITSPmagazine Webinar: What's Heating Up Before Black Hat 2025: Place Your Bet on the Top Trends Set to Shake Up this Year's Hacker Conference — An ITSPmagazine Thought Leadership Webinar | https://www.crowdcast.io/c/whats-heating-up-before-black-hat-2025-place-your-bet-on-the-top-trends-set-to-shake-up-this-years-hacker-conferenceWant to tell your Brand Story Briefing as part of our event coverage? Learn More

Strictly Stalking
290. Impersonated, Harassed, Stalked

Strictly Stalking

Play Episode Listen Later Aug 5, 2025 44:09


On today's episode, we're speaking with Whitney — a woman who found love while living life on the road, embracing the freedom of van life and a fresh start. But her new beginning took a dark turn when her partner's ex tracked her down through social media — and began stalking her. Since then, Whitney has been impersonated online, had private photos shared without consent, and faced false police reports — all while the harassment continues. Now, she's stepping forward to share her story.HAVE YOU EXPERIENCED STALKING? LET US KNOW:strictlystalkingpod@gmail.comPLEASE VISIT OUR SPONSORS!Delete MeToday get 20% off your DeleteMe plan when you go to JoinDeleteMe.com/STALKING and use promo code STALKING at checkout. Progressive InsurancePress play on comparing auto rates. Get your auto quote at Progressive.com to join the over 28 million drivers who trust Progressive.Love, Murder - The PodcastJessie Pray and Andie Cassette team up each week to tell stories of love and relationships gone fatally wrong. This show is all about seemingly normal people driven to terrible madness by passion and rage. Hang out with your new best friends each week to discover how someone can go from sweet to murderous in the blink of an eye, and to hear all the ways murder can give love a real bad name.https://podcasts.apple.com/us/podcast/love-murder/id1522372858OTHER LINKSThe Last Trip - Podcast - hosted by Jaimie BeebeListen & Subscribe to The Last Trip - https://audioboom.com/channels/5119581-the-last-tripFollow The Last Trip on Instagram - https://www.instagram.com/thelasttripcrimepod/And Subscribe for all the updates on Patreon - https://www.patreon.com/TheLastTripPodcastlovelustaw - PodcastApple Podcasts | https://podcasts.apple.com/us/podcast/lovelustlaw/id1819843688Spotify | https://open.spotify.com/show/6BEWXKOaEo8lfK554a5NqEAmazon Music | https://music.amazon.com/podcasts/2789d9c8-b4ab-4b4a-847d-a469d89b1d0b/lovelustlawInstagram | https://www.instagram.com/lovelustlaw/Website: https://www.michelelocke.com/podcastInstagram:@strictlystalkingpod@feathergirl77@jaked3000See Privacy Policy at https://art19.com/privacy and California Privacy Notice at https://art19.com/privacy#do-not-sell-my-info.

Gutted Horror Podcast
99 - Let's Scare Jessica to Death (1971) - GUESS THE ENDING & FULL FILM REVIEW

Gutted Horror Podcast

Play Episode Listen Later Aug 5, 2025 94:22


Is Jessica losing her mind—or is something dead serious haunting her? Join hosts Aleece and Tony as they take a first-time watch of the eerie 1971 cult classic Let's Scare Jessica to Death, directed by John Hancock. In this moody, psychological slow burn, whispers in the woods and ghostly figures may be hiding more than just trauma...This is a GUESS THE ENDING episode! That means we only watch the first half of the film before pausing to spill our guts with wild predictions about how it ends. Will Jessica survive the voices in her head? Will the lake give up its secrets? Or are we ALL just part of her delusion?

ITSPmagazine | Technology. Cybersecurity. Society
Fake Identities, Real Consequences: The Data Trail Behind Your Political Donation | A Black Hat USA 2025 Conversation with Virginia Tech's Alan Michaels and Jared Byers | On Location Coverage with Sean Martin and Marco Ciappelli

ITSPmagazine | Technology. Cybersecurity. Society

Play Episode Listen Later Aug 4, 2025 19:25


What happens when you inject thousands of fake identities into the political ecosystem to monitor how personal data is used—or abused? That's the question Virginia Tech's Alan Michaels and Jared Byers explore through their multi-year research project, “Use and Abuse of Personal Information: The Politics Edition.”With support from 130 students across 21 majors, Michaels and Byers create realistic digital personas—complete with phone numbers, emails, and physical addresses—and sign them up across 1,400 political campaigns. Their goal? Understand how political organizations treat personal data: whether it's used ethically, shared with third parties, or even exposed through insecure systems.The findings are both fascinating and concerning. Their data shows that candidates across the political spectrum often prioritize fundraising above all else. The language and targeting vary, but the endgame is consistent: solicit donations and votes. And yes—these candidates frequently share or leak personal data. Sometimes it's deliberate, sometimes it's sloppy, and occasionally it's the result of potential breaches.The team examines differences in how data is handled based on whether an identity donates or not, or whether it's tied to in-state versus out-of-state addresses. They even explore how generative AI and psychometric modeling can craft convincing personalities for these fake identities—tools that can just as easily be used for political influence campaigns and psychological manipulation.But this project isn't about political sides—it's about accountability. The research remains strictly apolitical, letting the data speak for itself. Michaels and Byers are careful to avoid influencing public opinion through misinformation, focusing instead on documenting the reality of digital privacy in modern campaigning.As more of the political playbook shifts into the digital arena, this session at Black Hat USA 2025 pushes attendees to confront an uncomfortable truth: the cost of participation in political life may include the exploitation of your digital identity.___________Guests:Alan Michaels, Professor and Director, Spectrum Dominance Division at Virginia Tech | On LinkedIn: https://www.linkedin.com/in/alan-michaels-1066814/Jared Byers, Research Associate at Virginia Tech National Security Institute | On LinkedIn: https://www.linkedin.com/in/jared-byers-8a477324b/Hosts:Sean Martin, Co-Founder at ITSPmagazine | Website: https://www.seanmartin.comMarco Ciappelli, Co-Founder at ITSPmagazine | Website: https://www.marcociappelli.com___________Episode SponsorsThreatLocker: https://itspm.ag/threatlocker-r974BlackCloak: https://itspm.ag/itspbcwebAkamai: https://itspm.ag/akamailbwcDropzoneAI: https://itspm.ag/dropzoneai-641Stellar Cyber: https://itspm.ag/stellar-9dj3___________ResourcesSession: Use and Abuse of Personal Information -- Politics Edition: https://www.blackhat.com/us-25/briefings/schedule/#use-and-abuse-of-personal-information----politics-edition-45529Learn more and catch more stories from our Black Hat USA 2025 coverage: https://www.itspmagazine.com/bhusa25ITSPmagazine Webinar: What's Heating Up Before Black Hat 2025: Place Your Bet on the Top Trends Set to Shake Up this Year's Hacker Conference — An ITSPmagazine Thought Leadership Webinar | https://www.crowdcast.io/c/whats-heating-up-before-black-hat-2025-place-your-bet-on-the-top-trends-set-to-shake-up-this-years-hacker-conferenceCatch all of our event coverage: https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverageWant to tell your Brand Story Briefing as part of our event coverage? Learn More

ITSPmagazine | Technology. Cybersecurity. Society
From Hacker Defense to Civil Liberties: Threat Modeling Meets Constitutional Law | A Black Hat USA 2025 Keynote Conversation with Jennifer Granick | On Location Coverage with Sean Martin and Marco Ciappelli

ITSPmagazine | Technology. Cybersecurity. Society

Play Episode Listen Later Aug 4, 2025 22:47


At Black Hat USA 2025, Jennifer Granick—Surveillance and Cybersecurity Counsel at the American Civil Liberties Union—takes the keynote stage to make a bold case: we are long overdue for a new threat model, one that sees government surveillance not as a background risk, but as a primary threat to constitutional privacy.Granick draws from decades of experience defending hackers, fighting surveillance overreach, and engaging with the security community since DEFCON 3. She challenges the audience to reconsider outdated assumptions about how the Fourth Amendment is interpreted and applied. While technology has made it easier than ever for governments to collect data, the legal system hasn't kept pace—and in many cases, fails to recognize the sheer scope and sensitivity of personal information exposed through modern services.Her talk doesn't just raise alarm; it calls for action. Granick suggests that while legal reform is sluggish—stymied by a lack of political will and lobbying power—there's an urgent opportunity for the technical community to step up. From encryption to data minimization and anonymization, technologists have the tools to protect civil liberties even when the law falls short.The session promises to be a wake-up call for engineers, designers, policymakers, and privacy advocates. Granick wants attendees to leave not only more informed, but motivated to build systems that limit the unnecessary collection, retention, and exposure of personal data.Her keynote also surfaces a critical cultural shift: from the “Spot the Fed” days of DEFCON to a more nuanced understanding of government roles—welcoming collaboration where it serves the public good, but not at the expense of unchecked surveillance.This conversation reframes privacy as a design problem as much as a legal one—and one that requires collective effort to address. If the law can't fix it, the question becomes: will the technology community rise to the challenge?___________Guest:Jennifer Granick, Surveillance and Cybersecurity Counsel at American Civil Liberties Union | On LinkedIn: https://www.linkedin.com/in/jennifergranick/Hosts:Sean Martin, Co-Founder at ITSPmagazine | Website: https://www.seanmartin.comMarco Ciappelli, Co-Founder at ITSPmagazine | Website: https://www.marcociappelli.com___________Episode SponsorsThreatLocker: https://itspm.ag/threatlocker-r974BlackCloak: https://itspm.ag/itspbcwebAkamai: https://itspm.ag/akamailbwcDropzoneAI: https://itspm.ag/dropzoneai-641Stellar Cyber: https://itspm.ag/stellar-9dj3___________ResourcesKeynote: Threat Modeling and Constitutional Law: https://www.blackhat.com/us-25/briefings/schedule/index.html#keynote-threat-modeling-and-constitutional-law-48276Learn more and catch more stories from our Black Hat USA 2025 coverage: https://www.itspmagazine.com/bhusa25ITSPmagazine Webinar: What's Heating Up Before Black Hat 2025: Place Your Bet on the Top Trends Set to Shake Up this Year's Hacker Conference — An ITSPmagazine Thought Leadership Webinar | https://www.crowdcast.io/c/whats-heating-up-before-black-hat-2025-place-your-bet-on-the-top-trends-set-to-shake-up-this-years-hacker-conferenceCatch all of our event coverage: https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverageWant to tell your Brand Story Briefing as part of our event coverage? Learn More

Barra Bruvvas
TOP 10 POUND FOR POUND BEST TRANSFERS OF ALL TIME!

Barra Bruvvas

Play Episode Listen Later Aug 3, 2025 68:24


The boys sit down to rank their top 10 best pound for pound football transfers of all time! Some big names here, but who makes your top 10? LET US KNOW!Welcome to Barra Bruvvas.Join the Bruvvahood:https://instagram.com/BarraBruvvashttps://x.com/BarraBruvvashttps://www.tiktok.com/@barrabruvvas Hosted on Acast. See acast.com/privacy for more information.

Redefining CyberSecurity
Black Hat 2025: More Buzzwords, Same Breaches? | What's Heating Up Before Black Hat 2025: Top Trends Set to Shake Up this Year's Hacker Conference | An ITSPmagazine Webinar: On Location Coverage with Sean Martin and Marco Ciappelli

Redefining CyberSecurity

Play Episode Listen Later Jul 31, 2025 60:22


In this thought leadership session, ITSPmagazine co-founders Sean Martin and Marco Ciappelli moderate a dynamic conversation with five industry leaders offering their take on what will dominate the show floor and side-stage chatter at Black Hat USA 2025.Leslie Kesselring, Founder of Kesselring Communications, surfaces how media coverage is shifting in real time—no longer driven solely by talk submissions but now heavily influenced by breaking news, regulation, and public-private sector dynamics. From government briefings to cyberweapon disclosures, the pressure is on to cover what matters, not just what's scheduled.Daniel Cuthbert, member of the Black Hat Review Board and Global Head of Security Research at Banco Santander, pushes back on the hype. He notes that while tech moves fast, security research often revisits decades-old bugs. His sharp observation? “The same bugs from the ‘90s are still showing up—sometimes discovered by researchers younger than the vulnerabilities themselves.”Michael Parisi, Chief Growth Officer at Steel Patriot Partners, shifts the conversation to operational risk. He raises concern over Model-Chained Prompting (MCP) and how AI agents can rewrite enterprise processes without visibility or traceability—especially alarming in environments lacking kill switches or proper controls.Richard Stiennon, Chief Research Analyst at IT-Harvest, offers market-level insights, forecasting AI agent saturation with over 20 vendors already present in the expo hall. While excited by real advancements, he warns of funding velocity outpacing substance and cautions against the cycle of overinvestment in vaporware.Rupesh Chokshi, SVP & GM at Akamai Technologies, brings the product and customer lens—framing the security conversation around how AI use cases are rolling out fast while security coverage is still catching up. From OT to LLMs, securing both AI and with AI is a top concern.This episode is not just about placing bets on buzzwords. It's about uncovering what's real, what's noise, and what still needs fixing—no matter how long we've been talking about it.___________Guests:Leslie Kesselring, Founder at Cyber PR Firm Kesselring Communications | On LinkedIn: https://www.linkedin.com/in/lesliekesselring/“This year, it's the news cycle—not the sessions—that's driving what media cover at Black Hat.”Daniel Cuthbert, Black Hat Training Review Board and Global Head of Security Research for Banco Santander | On LinkedIn: https://www.linkedin.com/in/daniel-cuthbert0x/“Why are we still finding bugs older than the people presenting the research?”Richard Stiennon, Chief Research Analyst at IT-Harvest | On LinkedIn: https://www.linkedin.com/in/stiennon/“The urge to consolidate tools is driven by procurement—not by what defenders actually need.”Michael Parisi, Chief Growth Officer at Steel Patriot Partners | On LinkedIn: https://www.linkedin.com/in/michael-parisi-4009b2261/“Responsible AI use isn't a policy—it's something we have to actually implement.”Rupesh Chokshi, SVP & General Manager at Akamai Technologies | On LinkedIn: https://www.linkedin.com/in/rupeshchokshi/“The business side is racing to deploy AI—but security still hasn't caught up.”Hosts:Sean Martin, Co-Founder at ITSPmagazine | Website: https://www.seanmartin.comMarco Ciappelli, Co-Founder at ITSPmagazine | Website: https://www.marcociappelli.com___________Episode SponsorsThreatLocker: https://itspm.ag/threatlocker-r974BlackCloak: https://itspm.ag/itspbcwebAkamai: https://itspm.ag/akamailbwcDropzoneAI: https://itspm.ag/dropzoneai-641Stellar Cyber: https://itspm.ag/stellar-9dj3___________ResourcesLearn more and catch more stories from our Black Hat USA 2025 coverage: https://www.itspmagazine.com/bhusa25ITSPmagazine Webinar: What's Heating Up Before Black Hat 2025: Place Your Bet on the Top Trends Set to Shake Up this Year's Hacker Conference — An ITSPmagazine Thought Leadership Webinar | https://www.crowdcast.io/c/whats-heating-up-before-black-hat-2025-place-your-bet-on-the-top-trends-set-to-shake-up-this-years-hacker-conferenceCatch all of our event coverage: https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverageWant to tell your Brand Story Briefing as part of our event coverage? Learn More

ITSPmagazine | Technology. Cybersecurity. Society
Black Hat 2025: More Buzzwords, Same Breaches? | What's Heating Up Before Black Hat 2025: Top Trends Set to Shake Up this Year's Hacker Conference | An ITSPmagazine Webinar: On Location Coverage with Sean Martin and Marco Ciappelli

ITSPmagazine | Technology. Cybersecurity. Society

Play Episode Listen Later Jul 30, 2025 60:22


In this thought leadership session, ITSPmagazine co-founders Sean Martin and Marco Ciappelli moderate a dynamic conversation with five industry leaders offering their take on what will dominate the show floor and side-stage chatter at Black Hat USA 2025.Leslie Kesselring, Founder of Kesselring Communications, surfaces how media coverage is shifting in real time—no longer driven solely by talk submissions but now heavily influenced by breaking news, regulation, and public-private sector dynamics. From government briefings to cyberweapon disclosures, the pressure is on to cover what matters, not just what's scheduled.Daniel Cuthbert, member of the Black Hat Review Board and Global Head of Security Research at Banco Santander, pushes back on the hype. He notes that while tech moves fast, security research often revisits decades-old bugs. His sharp observation? “The same bugs from the ‘90s are still showing up—sometimes discovered by researchers younger than the vulnerabilities themselves.”Michael Parisi, Chief Growth Officer at Steel Patriot Partners, shifts the conversation to operational risk. He raises concern over Model-Chained Prompting (MCP) and how AI agents can rewrite enterprise processes without visibility or traceability—especially alarming in environments lacking kill switches or proper controls.Richard Stiennon, Chief Research Analyst at IT-Harvest, offers market-level insights, forecasting AI agent saturation with over 20 vendors already present in the expo hall. While excited by real advancements, he warns of funding velocity outpacing substance and cautions against the cycle of overinvestment in vaporware.Rupesh Chokshi, SVP & GM at Akamai Technologies, brings the product and customer lens—framing the security conversation around how AI use cases are rolling out fast while security coverage is still catching up. From OT to LLMs, securing both AI and with AI is a top concern.This episode is not just about placing bets on buzzwords. It's about uncovering what's real, what's noise, and what still needs fixing—no matter how long we've been talking about it.___________Guests:Leslie Kesselring, Founder at Cyber PR Firm Kesselring Communications | On LinkedIn: https://www.linkedin.com/in/lesliekesselring/“This year, it's the news cycle—not the sessions—that's driving what media cover at Black Hat.”Daniel Cuthbert, Black Hat Training Review Board and Global Head of Security Research for Banco Santander | On LinkedIn: https://www.linkedin.com/in/daniel-cuthbert0x/“Why are we still finding bugs older than the people presenting the research?”Richard Stiennon, Chief Research Analyst at IT-Harvest | On LinkedIn: https://www.linkedin.com/in/stiennon/“The urge to consolidate tools is driven by procurement—not by what defenders actually need.”Michael Parisi, Chief Growth Officer at Steel Patriot Partners | On LinkedIn: https://www.linkedin.com/in/michael-parisi-4009b2261/“Responsible AI use isn't a policy—it's something we have to actually implement.”Rupesh Chokshi, SVP & General Manager at Akamai Technologies | On LinkedIn: https://www.linkedin.com/in/rupeshchokshi/“The business side is racing to deploy AI—but security still hasn't caught up.”Hosts:Sean Martin, Co-Founder at ITSPmagazine | Website: https://www.seanmartin.comMarco Ciappelli, Co-Founder at ITSPmagazine | Website: https://www.marcociappelli.com___________Episode SponsorsThreatLocker: https://itspm.ag/threatlocker-r974BlackCloak: https://itspm.ag/itspbcwebAkamai: https://itspm.ag/akamailbwcDropzoneAI: https://itspm.ag/dropzoneai-641Stellar Cyber: https://itspm.ag/stellar-9dj3___________ResourcesLearn more and catch more stories from our Black Hat USA 2025 coverage: https://www.itspmagazine.com/bhusa25ITSPmagazine Webinar: What's Heating Up Before Black Hat 2025: Place Your Bet on the Top Trends Set to Shake Up this Year's Hacker Conference — An ITSPmagazine Thought Leadership Webinar | https://www.crowdcast.io/c/whats-heating-up-before-black-hat-2025-place-your-bet-on-the-top-trends-set-to-shake-up-this-years-hacker-conferenceCatch all of our event coverage: https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverageWant to tell your Brand Story Briefing as part of our event coverage? Learn More

Strictly Stalking
289. The Stalking Stepmother

Strictly Stalking

Play Episode Listen Later Jul 29, 2025 53:25


Alexis grew up in the shadows of neglect and abuse, with a stepmother whose control didn't end when she left home at 17. Even from a distance, the stalking and manipulation continued — a relentless effort to keep Alexis under her thumb. But Alexis fought back in the quietest, most powerful way: by healing. Through somatic therapy and EMDR, she's learning to calm her nervous system, reclaim her sense of safety, and rebuild trust in herself. Her journey hasn't been easy — but it's given her a sharp clarity. She now recognizes the red flags, holds her boundaries, and protects the peace she fought so hard to find. Today, Alexis is here to share her story — not just to speak her truth, but to let others know they're not alone.**The following episode of Strictly Stalking contains graphics depictions of physical violence. Please listen with caution.**HAVE YOU EXPERIENCED STALKING? LET US KNOW:strictlystalkingpod@gmail.comPLEASE VISIT OUR SPONSORS!QuinceGo to https://www.quince.com/strictly for free shipping on your order and 365-day returns.ShopifySign up for a one-dollar-per-month trial period at SHOPIFY.COM/STRICTLYSTALKING to take your retail business to the next level. That's SHOPIFY.COM/STRICTLYSTALKINGLove, Murder - The PodcastJessie Pray and Andie Cassette team up each week to tell stories of love and relationships gone fatally wrong. This show is all about seemingly normal people driven to terrible madness by passion and rage. Hang out with your new best friends each week to discover how someone can go from sweet to murderous in the blink of an eye, and to hear all the ways murder can give love a real bad name.https://podcasts.apple.com/us/podcast/love-murder/id1522372858OTHER LINKSThe Last Trip - Podcast - hosted by Jaimie BeebeListen & Subscribe to The Last Trip - https://audioboom.com/channels/5119581-the-last-tripFollow The Last Trip on Instagram - https://www.instagram.com/thelasttripcrimepod/And Subscribe for all the updates on Patreon - https://www.patreon.com/TheLastTripPodcastlovelustaw - PodcastApple Podcasts | https://podcasts.apple.com/us/podcast/lovelustlaw/id1819843688Spotify | https://open.spotify.com/show/6BEWXKOaEo8lfK554a5NqEAmazon Music | https://music.amazon.com/podcasts/2789d9c8-b4ab-4b4a-847d-a469d89b1d0b/lovelustlawInstagram | https://www.instagram.com/lovelustlaw/Website: https://www.michelelocke.com/podcastInstagram:@strictlystalkingpod@feathergirl77@jaked3000See Privacy Policy at https://art19.com/privacy and California Privacy Notice at https://art19.com/privacy#do-not-sell-my-info.

Strictly Stalking
288. Stalked by a Federal Agent: C. Kimberly Toms

Strictly Stalking

Play Episode Listen Later Jul 22, 2025 104:01


Kimberly thought she was meeting a charming real estate manager. She had no idea he'd already been stalking her for a month—or that his entire identity was a lie. He was actually a U.S. Department of State special agent with a 30-year history of using his badge and gun to terrorize women across the country. What began as quiet digital surveillance spiraled into a brutal campaign of threats, harassment, rape, and attempted murder. Kimberly fled more than 1,300 miles—twice—but he used his federal ties to track her down, even pulling other law enforcement into his twisted pursuit. Eight officers in five states turned her away. But Kimberly wouldn't stay silent. She was determined to expose the predator behind the badge.**The following episode of Strictly Stalking contains graphics depictions of physical violence and sexual assault. Please listen with caution.**HAVE YOU EXPERIENCED STALKING? LET US KNOW:strictlystalkingpod@gmail.comPLEASE VISIT OUR SPONSORS!Delete MeToday get 20% off your DeleteMe plan when you go to JoinDeleteMe.com/STALKING and use promo code STALKING at checkout. Love, Murder - The PodcastJessie Pray and Andie Cassette team up each week to tell stories of love and relationships gone fatally wrong. This show is all about seemingly normal people driven to terrible madness by passion and rage. Hang out with your new best friends each week to discover how someone can go from sweet to murderous in the blink of an eye, and to hear all the ways murder can give love a real bad name.https://podcasts.apple.com/us/podcast/love-murder/id1522372858GUEST LINKSKimberly TomsPersonal website: kimberlytoms.comNot Just One: notjustone.orgCKT LinkedIn: https://www.linkedin.com/in/c-kimberly-toms/TikTok: https://www.tiktok.com/@notjustoneIG: https://www.instagram.com/ckimberlytoms/OTHER LINKSThe Last Trip - Podcast - hosted by Jaimie BeebeListen & Subscribe to The Last Trip - https://audioboom.com/channels/5119581-the-last-tripFollow The Last Trip on Instagram - https://www.instagram.com/thelasttripcrimepod/And Subscribe for all the updates on Patreon - https://www.patreon.com/TheLastTripPodcastlovelustaw - PodcastApple Podcasts | https://podcasts.apple.com/us/podcast/lovelustlaw/id1819843688Spotify | https://open.spotify.com/show/6BEWXKOaEo8lfK554a5NqEAmazon Music | https://music.amazon.com/podcasts/2789d9c8-b4ab-4b4a-847d-a469d89b1d0b/lovelustlawInstagram | https://www.instagram.com/lovelustlaw/Website: https://www.michelelocke.com/podcastInstagram:@strictlystalkingpod@feathergirl77@jaked3000See Privacy Policy at https://art19.com/privacy and California Privacy Notice at https://art19.com/privacy#do-not-sell-my-info.

ITSPmagazine | Technology. Cybersecurity. Society
Black Hat USA 2025: AI, Investment, and the Expanding Scope of Cybersecurity | Our Traditional Pre-Event Kick-Off Conversation with Steve Wylie | On Location Coverage with Sean Martin and Marco Ciappelli

ITSPmagazine | Technology. Cybersecurity. Society

Play Episode Listen Later Jul 22, 2025 26:51


As Black Hat USA 2025 approaches, General Manager Steve Wylie joins Sean Martin and Marco Ciappelli for the annual pre-conference conversation to highlight what's new—and what's next—for one of cybersecurity's most iconic events. This year's themes and expansions signal a strong return to growth, technical depth, and strategic investment.AI Everywhere—from Training to the Show FloorArtificial intelligence emerges as the dominant force across the agenda. From the main stage to the training rooms, Black Hat is packed with AI-related content designed to meet the rising demand for education and clarity. New this year is a comprehensive lineup of instructor-led AI courses and expanded AI tool showcases in the Arsenal and Arsenal Labs programs. As Wylie notes, three of the four Spotlight competition finalists—FireTail, Keep Aware, and Twine Security—are AI-driven solutions, underscoring the technology's influence on innovation.Investor Energy and Startup MomentumCybersecurity investment is back. That momentum is reflected in the expanded Innovators and Investors Summit and the largest-ever Startup Zone on the show floor, now hosting more than 80 companies. This year's program builds on last year's debut and aims to connect entrepreneurs, investors, and CISOs in a more targeted and collaborative setting.Expanding the Audience: New Summits and KeynotesTo better serve cybersecurity leaders across sectors, Black Hat has introduced new summits tailored to financial services and supply chain security. These gatherings offer strategic-level insights for professionals who don't typically engage in technical briefings. Meanwhile, the keynote lineup includes prominent voices from both public and private sectors—such as Miko Hyppönen, Nicole Perlroth, and Chris Inglis—offering grounded perspectives in a time of uncertainty.Interactive Additions and Community GrowthAttendees can expect hands-on experiences like a new drone hacking zone and an expanded hardware lab area. A Career Development Zone also debuts this year, offering sessions designed to help attendees build or pivot their cybersecurity careers.___________Guest: Steve Wylie, Vice President, Cybersecurity Market at Informa Tech and General Manager at Black Hat | On LinkedIn: https://www.linkedin.com/in/swylie650/Hosts:Sean Martin, Co-Founder at ITSPmagazine | Website: https://www.seanmartin.comMarco Ciappelli, Co-Founder at ITSPmagazine | Website: https://www.marcociappelli.com___________Episode SponsorsThreatLocker: https://itspm.ag/threatlocker-r974BlackCloak: https://itspm.ag/itspbcwebAkamai: https://itspm.ag/akamailbwcDropzoneAI: https://itspm.ag/dropzoneai-641Stellar Cyber: https://itspm.ag/stellar-9dj3___________ResourcesLearn more and catch more stories from our Black Hat USA 2025 coverage: https://www.itspmagazine.com/bhusa25ITSPmagazine Webinar: What's Heating Up Before Black Hat 2025: Place Your Bet on the Top Trends Set to Shake Up this Year's Hacker Conference — An ITSPmagazine Thought Leadership Webinar | https://www.crowdcast.io/c/whats-heating-up-before-black-hat-2025-place-your-bet-on-the-top-trends-set-to-shake-up-this-years-hacker-conferenceCatch all of our event coverage: https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverageWant to tell your Brand Story Briefing as part of our event coverage? Learn More

ITSPmagazine | Technology. Cybersecurity. Society
Catching Up With Ken Munro After Infosecurity Europe 2025 — Hacking the Planet, One Car, One Plane, and One System at a Time | On Location Podcast With Sean Martin & Marco Ciappelli

ITSPmagazine | Technology. Cybersecurity. Society

Play Episode Listen Later Jul 17, 2025 23:25


Title: "Catching Up With Ken Munro After Infosecurity Europe 2025 — Hacking the Planet, One Car, One Plane, and One System at a Time"A Post–Infosecurity Europe 2025 Conversation with Ken MunroGuestsKen Munro Security writer & speakerhttps://www.linkedin.com/in/ken-munro-17899b1/HostsSean Martin, Co-Founder at ITSPmagazineWebsite: https://www.seanmartin.comMarco Ciappelli, Co-Founder, CMO, and Creative Director at ITSPmagazineWebsite: https://www.marcociappelli.com___________Episode SponsorsThreatLocker: https://itspm.ag/threatlocker-r974___________After a whirlwind week at Infosecurity Europe 2025, I had the chance to reconnect with Ken Munro from Pen Test Partners — a longtime friend, hacker, and educator who brings cybersecurity to life in the most tangible ways. From car hacking escape rooms to flight simulators in pubs, we talked about why touching tech matters, how myth-busting makes us safer, and how learning through play might just be the key to securing our increasingly complex world. Tune in, and maybe bring a cocktail.⸻There's something special about catching up with someone who's not just an expert in cybersecurity, but also someone who reminds you why this industry can — and should — be fun. Ken Munro and I go back to the early days of DEFCON's Aviation Village, and this post-Infosecurity Europe 2025 chat brought all that hacker spirit right back to the surface.Ken and his crew from Pen Test Partners set up shop next to the main Infosecurity Europe venue in a traditional London pub — but this wasn't your average afterparty. They transformed it into a hands-on hacking village, complete with a car demo, flight simulator, ICS cocktail CTF, and of course… a bar. The goal? Show that cybersecurity isn't just theory — it's something you can touch. Something that moves. Something that can break — and be fixed — before it breaks us.We talked about the infamous “Otto the Autopilot” from Airplane, the Renault Clio-turned-Mario Kart console, and why knowing how TCAS (collision avoidance) works on an Airbus matters just as much as knowing your Wi-Fi password. We also dug into the real-world cybersecurity concerns of industrial systems, electronic flight bags, and why European regulation might be outpacing the U.S. in some areas — for better or worse.One of the biggest takeaways? It's time to stop fearing the hacker mindset and start embracing it. Curiosity isn't a threat — it's a superpower. And when channeled correctly, it leads to safer skies, smarter cars, and fewer surprises in the water we drink or the power we use.There's a lot to reflect on from our conversation, but above all: education, community, and creativity are still the most powerful tools we have in security — and Ken is out there proving that, one demo and one pint at a time.Thanks again, Ken. See you at the next village — whichever pub, hangar, or DEFCON corner it ends up in.⸻Keywords: cybersecurity, ethical hacking, pen testing, Infosecurity Europe, embedded systems, car hacking, flight simulator, ICS security, industrial control systems, aviation cybersecurity, hacker mindset, DEFCON___________ResourcesLearn more and catch more stories from Infosecurity Europe 2025 London coverage: https://www.itspmagazine.com/infosec25Catch all of our event coverage: https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverageWant to tell your Brand Story Briefing as part of our event coverage? Learn More

Strictly Stalking
287. Stalked Twice: Jennifer's Unrelenting Nightmare

Strictly Stalking

Play Episode Listen Later Jul 15, 2025 45:24


Jennifer didn't just have one stalker—she had two. For over two years, she was haunted by anonymous phone calls that kept coming, no matter how many times she changed her number. Then, the calls spread to her friends and coworkers. Just when it seemed to stop… it started all over again. This time, it was a coworker's ex—furious, obsessed, and blaming Jennifer for the breakup. The harassment began online, but quickly turned into something far more dangerous: cyberstalking, in-person encounters, and relentless fear. It finally ended when Jennifer made the only choice she could—walking away from her job, and her stalker, for good.HAVE YOU EXPERIENCED STALKING? LET US KNOW:strictlystalkingpod@gmail.comPLEASE VISIT OUR SPONSORS!Progressive InsurancePress play on comparing auto rates. Get your auto quote at Progressive.com to join the over 28 million drivers who trust Progressive.Love, Murder - The PodcastJessie Pray and Andie Cassette team up each week to tell stories of love and relationships gone fatally wrong. This show is all about seemingly normal people driven to terrible madness by passion and rage. Hang out with your new best friends each week to discover how someone can go from sweet to murderous in the blink of an eye, and to hear all the ways murder can give love a real bad name.https://podcasts.apple.com/us/podcast/love-murder/id1522372858OTHER LINKSThe Last Trip - Podcast - hosted by Jaimie BeebeListen & Subscribe to The Last Trip - https://audioboom.com/channels/5119581-the-last-tripFollow The Last Trip on Instagram - https://www.instagram.com/thelasttripcrimepod/And Subscribe for all the updates on Patreon - https://www.patreon.com/TheLastTripPodcastlovelustaw - PodcastApple Podcasts | https://podcasts.apple.com/us/podcast/lovelustlaw/id1819843688Spotify | https://open.spotify.com/show/6BEWXKOaEo8lfK554a5NqEAmazon Music | https://music.amazon.com/podcasts/2789d9c8-b4ab-4b4a-847d-a469d89b1d0b/lovelustlawInstagram | https://www.instagram.com/lovelustlaw/Website: https://www.michelelocke.com/podcastInstagram:@strictlystalkingpod@feathergirl77@jaked3000See Privacy Policy at https://art19.com/privacy and California Privacy Notice at https://art19.com/privacy#do-not-sell-my-info.

Filthy @ Five
S3 Ep102: FAMILY MISFORTUNES | FILTHY FELLAS

Filthy @ Five

Play Episode Listen Later Jul 14, 2025 42:22


▷ SUBSCRIBE TO FILTHY FELLAS https://bit.ly/FilthyFellasSubscribe ▷ LIVE SHOW TICKETS: https://www.gotobeat.com/gig/filthy-fellas-ten-year-anniversary-live-show/ ▷ LISTEN ON SPOTIFY: https://bit.ly/FilthyFellasSpotify ▷ LISTEN ON APPLE PODCASTS: https://apple.co/3GIFthj ▷ LISTEN ON AMAZON MUSIC: https://amzn.to/44aouyk IT'S PRE-SEASON, SO WE THOUGHT WE'D TRY SOMETHING DIFFERENT. WE'RE A FAMILY—DYSFUNCTIONAL, CHAOTIC, AND NO STRANGERS TO MISFORTUNE—SO WHAT BETTER TIME TO LAUNCH FAMILY MISFORTUNES (PILOT EPISODE)? THE CROWD'S ALWAYS SHOUTING THAT WE'VE GOT ZERO BALL KNOWLEDGE. WE SAY IT TO EACH OTHER ALL THE TIME TOO. SO WE THOUGHT... WHY NOT PUT OURSELVES TO THE TEST? ‘SHADES OF ZIDANE' — FEATURING LIPPY, KG THA COMEDIAN, AND TEAM CAPTAIN STEVO THE MADMAN — GO HEAD-TO-HEAD WITH MENACE'S ‘THIS IS MESSI', ALONGSIDE LOONS AND JOHN WICK. WHO REALLY KNOWS BALL? WHO REALLY KNOWS FILTHY? THIS MIGHT JUST SETTLE IT. IF YOU ENJOYED THIS AND WANT TO SEE A VERSION WHERE WE ACTUALLY PUT SOME EFFORT IN... LET US KNOW. LOVE, FILTHY. FILTHY FELLAS ON SOCIAL ▷ PATREON: https://www.patreon.com/filthyfellas ▷ TIKTOK: https://www.tiktok.com/@filthy_fellas ▷ INSTAGRAM: https://www.instagram.com/filthy_fellas ▷ X: https://x.com/Filthy_Fellas ▷ MERCH: https://filthyatfive.com FOLLOW THE MANDEM POET https://www.instagram.com/poetscorneruk STEVO THE MADMAN https://www.instagram.com/stevothemadman LIPPY https://www.instagram.com/dondadalippy SAVAGE DAN https://www.instagram.com/savagedan10 MARGS https://www.instagram.com/margsmt LOONS https://www.instagram.com/fruitpunch_papi KG https://www.instagram.com/kgthacomedian SKITS https://www.instagram.com/skitsybuddha SKRIBZ https://www.instagram.com/skribzst JOHN WICK https://www.instagram.com/johnwick_nvb MENACE https://www.instagram.com/mseven_____

Ordway, Merloni & Fauria
The Afternoons let us know which Patriots they are excited to see this season

Ordway, Merloni & Fauria

Play Episode Listen Later Jul 11, 2025 22:41


Which Patriots should you look out for this season

Strictly Stalking
286. The Stalker Still Works There

Strictly Stalking

Play Episode Listen Later Jul 8, 2025 80:45


Laura's life was turned upside down by a relentless stalker — and now, she's fighting back.He tried to photograph her inside a bathroom stall, then broke into her car… her home… even physically attacked her. He stole photos of her children and obsessively watched videos of her young son. Over and over, he snuck into her office, locked her out, and accessed her personal devices. But despite the clear evidence, Laura was the one labeled unstable. She lost her job — while her stalker still works there. Now, Laura's not just fighting for herself. She's standing up for her children, her colleagues, and the students she once protected.HAVE YOU EXPERIENCED STALKING? LET US KNOW:strictlystalkingpod@gmail.comPLEASE VISIT OUR SPONSORS!Delete MeToday get 20% off your DeleteMe plan when you go to JoinDeleteMe.com/STALKING and use promo code STALKING at checkout. Progressive InsurancePress play on comparing auto rates. Get your auto quote at Progressive.com to join the over 28 million drivers who trust Progressive.Love, Murder - The PodcastJessie Pray and Andie Cassette team up each week to tell stories of love and relationships gone fatally wrong. This show is all about seemingly normal people driven to terrible madness by passion and rage. Hang out with your new best friends each week to discover how someone can go from sweet to murderous in the blink of an eye, and to hear all the ways murder can give love a real bad name.https://podcasts.apple.com/us/podcast/love-murder/id1522372858OTHER LINKSThe Last Trip - Podcast - hosted by Jaimie BeebeListen & Subscribe to The Last Trip - https://audioboom.com/channels/5119581-the-last-tripFollow The Last Trip on Instagram - https://www.instagram.com/thelasttripcrimepod/And Subscribe for all the updates on Patreon - https://www.patreon.com/TheLastTripPodcastlovelustaw - PodcastApple Podcasts | https://podcasts.apple.com/us/podcast/lovelustlaw/id1819843688Spotify | https://open.spotify.com/show/6BEWXKOaEo8lfK554a5NqEAmazon Music | https://music.amazon.com/podcasts/2789d9c8-b4ab-4b4a-847d-a469d89b1d0b/lovelustlawInstagram | https://www.instagram.com/lovelustlaw/Website: https://www.michelelocke.com/podcastInstagram:@strictlystalkingpod@feathergirl77@jaked3000See Privacy Policy at https://art19.com/privacy and California Privacy Notice at https://art19.com/privacy#do-not-sell-my-info.

Strictly Stalking
285. What Came Next: Familicide & Stalking

Strictly Stalking

Play Episode Listen Later Jul 1, 2025 69:39


Amy B. Chesler is an award-winning author, actress, and advocate whose life took a devastating turn in 2007 when her brother murdered their mother. After surviving years of abuse and a prolonged legal battle, Amy continues to face ongoing stalking and threats from her brother — even from behind bars. Although his parole has been extended to 2030, gaps in victim notification and systemic failures still leave Amy living with uncertainty. Determined to turn her trauma into purpose, Amy now uses her voice to drive change. As the host of What Came Next and Familicide, she amplifies survivor stories and advocates for meaningful reform in the justice system.**The following episode of Strictly Stalking contains depictions of familicide, homicide, physical violence, and sexual assault. Please listen with caution.**HAVE YOU EXPERIENCED STALKING? LET US KNOW:strictlystalkingpod@gmail.comPLEASE VISIT OUR SPONSORS!ShopifySign up for a one-dollar-per-month trial period at SHOPIFY.COM/STRICTLYSTALKING to take your retail business to the next level. That's SHOPIFY.COM/STRICTLYSTALKING Progressive InsurancePress play on comparing auto rates. Get your auto quote at Progressive.com to join the over 28 million drivers who trust Progressive.Love, Murder - The PodcastJessie Pray and Andie Cassette team up each week to tell stories of love and relationships gone fatally wrong. This show is all about seemingly normal people driven to terrible madness by passion and rage. Hang out with your new best friends each week to discover how someone can go from sweet to murderous in the blink of an eye, and to hear all the ways murder can give love a real bad name.https://podcasts.apple.com/us/podcast/love-murder/id1522372858GUEST LINKSAmy B. Cheslerhttp://amybchesler.comhttp://www.instagram.com/amybcheslerhttp://www.facebook.com/amybcheslerhttp://www.tiktok.com/@amybcheslerand my book:Working for Justice: https://amzn.to/4kiwOAyOTHER LINKSThe Last Trip - Podcast - hosted by Jaimie BeebeListen & Subscribe to The Last Trip - https://audioboom.com/channels/5119581-the-last-tripFollow The Last Trip on Instagram - https://www.instagram.com/thelasttripcrimepod/And Subscribe for all the updates on Patreon - https://www.patreon.com/TheLastTripPodcastlovelustaw - PodcastApple Podcasts | https://podcasts.apple.com/us/podcast/lovelustlaw/id1819843688Spotify | https://open.spotify.com/show/6BEWXKOaEo8lfK554a5NqEAmazon Music | https://music.amazon.com/podcasts/2789d9c8-b4ab-4b4a-847d-a469d89b1d0b/lovelustlawInstagram | https://www.instagram.com/lovelustlaw/Website: https://www.michelelocke.com/podcastInstagram:@strictlystalkingpod@feathergirl77@jaked3000See Privacy Policy at https://art19.com/privacy and California Privacy Notice at https://art19.com/privacy#do-not-sell-my-info.

Strictly Stalking
284. Fifteen Years of Fear: Stalked Into Silence

Strictly Stalking

Play Episode Listen Later Jun 24, 2025 80:09


Andrew's life was shattered by someone he barely even knew—a person who turned a simple business partnership into a 15-year nightmare of obsession, harassment, and relentless stalking. When the partnership fell apart, his stalker didn't walk away—instead, they weaponized the legal system. They secured a default judgment, not based on facts, but because Andrew simply didn't have the resources to fight back. That judgment became their tool of control, slowly dismantling Andrew's life piece by piece. Years of torment left him homeless, isolated, and battling multiple suicide attempts. But Andrew refused to let that be the end of his story. He's rebuilt his life—and his brand—on survival, resilience, and the raw truth of what it takes to fight back.**The following episode of Strictly Stalking contains topics including attempted suicide. Listener discretion is advised.**HAVE YOU EXPERIENCED STALKING? LET US KNOW:strictlystalkingpod@gmail.comPLEASE VISIT OUR SPONSORS!QuinceGo to https://www.quince.com/strictly for free shipping on your order and 365-day returns. Delete MeToday get 20% off your DeleteMe plan when you go to JoinDeleteMe.com/STALKING and use promo code STALKING at checkout. GUEST LINKSAndrew Janghttps://www.andrewjang.com/https://www.instagram.com/sevenofandrew/https://www.tiktok.com/@sevenofandrewInstagram:@strictlystalkingpod@feathergirl77@jaked3000See Privacy Policy at https://art19.com/privacy and California Privacy Notice at https://art19.com/privacy#do-not-sell-my-info.

ITSPmagazine | Technology. Cybersecurity. Society
“These Aren't Soft Skills — They're Human Skills” A Post–Infosecurity Europe 2025 Conversation with Rob Black and Anthony D'Alton

ITSPmagazine | Technology. Cybersecurity. Society

Play Episode Listen Later Jun 19, 2025 27:52


Title: “These Aren't Soft Skills — They're Human Skills”A Post–Infosecurity Europe 2025 Conversation with Rob Black and Anthony D'AltonGuestsRob BlackUK Cyber Citizen of the Year 2024 | International Keynote Speaker | Master of Ceremonies | Cyber Leaders Challenge | Professor | Community Builder | Facilitator | Cyber Security | Cyber Deceptionhttps://www.linkedin.com/in/rob-black-30440819/Anthony D'AltonProduct marketing | brand | reputation for cybersecurity growthhttps://www.linkedin.com/in/anthonydalton/HostsSean Martin, Co-Founder at ITSPmagazineWebsite: https://www.seanmartin.comMarco Ciappelli, Co-Founder, CMO, and Creative Director at ITSPmagazineWebsite: https://www.marcociappelli.com___________Episode SponsorsThreatLocker: https://itspm.ag/threatlocker-r974___________ Yes, Infosecurity Europe 2025 may be over, but the most important conversations are just getting started — and they're far from over. In this post-event follow-up, Marco Ciappelli reconnects from Florence with Rob Black and brings in Anthony D'Alton for a deep-dive into something we all talk about but rarely define clearly: so-called soft skills — or, as we prefer to call them… human skills.From storytelling to structured exercises, team communication to burnout prevention, this episode explores how communication, collaboration, and trust aren't just “nice to have” in cybersecurity — they're critical, measurable capabilities. Rob and Anthony share their experience designing real-world training environments where people — not just tools — are the difference-makers in effective incident response and security leadership.Whether you're a CISO, a SOC leader, or just tired of seeing tech get all the credit while humans carry the weight, this is a practical, honest conversation about building better teams — and redefining what really matters in cybersecurity today.If you still think “soft skills” are soft… you haven't been paying attention.⸻Keywords: Cybersecurity, Infosecurity Europe 2025, Soft Skills, Human Skills, Cyber Resilience, Cyber Training, Security Leadership, Incident Response, Teamwork, Storytelling in Cyber, Marco Ciappelli, Rob Black, Anthony Dalton, On Location, ITSPmagazine, Communication Skills, Cyber Crisis Simulation, RangeForce, Trust in Teams, Post Event Podcast, Security Culture___________ResourcesLearn more and catch more stories from Infosecurity Europe 2025 London coverage: https://www.itspmagazine.com/infosec25Catch all of our event coverage: https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverageWant to tell your Brand Story Briefing as part of our event coverage? Learn More

Strictly Stalking
283. Stalking and Survival with Dr. Natalie Jones

Strictly Stalking

Play Episode Listen Later Jun 17, 2025 72:00


Dr. Natalie Jones is a licensed professional clinical counselor with more than 16 years of experience helping survivors of domestic violence, sexual assault, and stalking. She specializes in working with both those who've experienced narcissistic abuse — and those who struggle with narcissistic traits themselves. As a trusted voice in both the media and legal communities, Dr. Jones frequently consults on high-profile cases. Today, she's joining us to break down the psychological dynamics of stalking, explore its long-term impact on victims, and share what survivors need to know to protect themselves and begin the healing process.HAVE YOU EXPERIENCED STALKING? LET US KNOW:strictlystalkingpod@gmail.comPLEASE VISIT OUR SPONSORS!QuinceGo to https://www.quince.com/strictly for free shipping on your order and 365-day returns. BeamIf you want to try Beam's best-selling Dream Powder, get up to 40% off for a limited timewhen you go to shopbeam.com/stalking and use code STALKING at checkout. Progressive InsurancePress play on comparing auto rates. Get your auto quote at Progressive.com to join the over 28 million drivers who trust Progressive.GUEST LINKSDr. Natalie Joneshttps://www.drnataliejones.comhttps://www.drnataliejones.com/podcast/https://www.instagram.com/dr.nataliejones/Instagram:@strictlystalkingpod@feathergirl77@jaked3000See Privacy Policy at https://art19.com/privacy and California Privacy Notice at https://art19.com/privacy#do-not-sell-my-info.

Fullerton Unfiltered
828. Quick Favor? Drop Us a Review & Let Us Know You're Listening!

Fullerton Unfiltered

Play Episode Listen Later Jun 17, 2025 4:21


We're so grateful you tune in each week — seriously, it means the world. If you've gotten value from the show, would you mind taking 30 seconds to leave a quick review? It helps more than you know and keeps the podcast growing strong. Thanks for being part of the journey! LINK Membership Get Brian's Free Newsletter https://www.lawntrepreneuracademy.com/  LMN Mastermind Sessions (Use code Brian). LMN Landscape Software (Interested in checking out LMN and giving it a free Trial? Use our link or the code "Brian" to get the best savings and signup experience possible). Brian's Lawn Maintenance On YouTube Brian's Lawn Maintenance On Instagram www.brandedbullinc.com  www.CycleCPA.com mention code: Brian to save $200. www.PostcardMania.com/Brian Zero to $100K!: The Complete Guide on How to Start a Successful Lawn Care Company Brian's Lawn Maintenance "MERCH" Together In The Trades - The Summit for Couples in Business - Savannah, Georgia August 14 - 16, 2025 EQUIP Expo - Oct 21-25, 2025 (Save 50% with code Brian)   Our Affiliate Partners: www.EquipmentDefender.com (Brians10 Save 10%) www.KujoYardwear.com (Brians10 Save 10%+Free Shipping!) www.ISOtunes.com (Save 10%) https://bit.ly/3wzhaI4 www.ProvenLocks.com (Brians10 Save 10%) www.DarwinsGrip.com (Brians10 Save 10%) www.Plow-Right.com (Brians10 Save 10%) www.Ballard-Inc.com (Brians10 Save 10%) www.EarthWay.com (Brians10 Save 10%) www.RhinoHitch.com (Brians10 Save 10%) www.SureCanUSA.com (Brians10 Save 10%) www.ComfortTrim.com (Brians10 Save 10%)

ITSPmagazine | Technology. Cybersecurity. Society
Inside the Mind of the UK's Top Cyber Intelligence Officer: A Ransomware 3.0 Reality Check | An Infosecurity EU 2025 Conversation with William Lyne, Deputy Director and Head of Cyber Intelligence at the UK's National Crime Agency (NCA)

ITSPmagazine | Technology. Cybersecurity. Society

Play Episode Listen Later Jun 16, 2025 17:47


William Lyne of the UK's National Crime Agency joins us live at Infosecurity Europe to talk ransomware, AI threats, and the future of cybercrime disruption.When the UK's top cyber intelligence strategist sits down with you in London, you listen — and you hit record.At Infosecurity Europe 2025, the ITSPmagazine podcast team — Marco Ciappelli and Sean Martin — sat down with William Lyne, Deputy Director and Head of Cyber Intelligence at the UK's National Crime Agency (NCA). This is the guy who not only leads cyber strategy for the NCA, but has also represented the UK at the FBI in the U.S. and now oversees national-level ransomware disruption efforts. It's not just a conversation — it's a rare front-row seat into how one of the world's most serious crime-fighting agencies is tackling ransomware 3.0.The message? Ransomware isn't just a cyber issue. It's a societal one. And it's evolving faster than we're prepared for — unless we change the game.“It went from niche to national threat fast,” Lyne explains. “The tools were always there. It just took a few threat actors to stitch them together.”From banking malware to fully operational cybercrime-as-a-service ecosystems, Lyne walks us through how the underground economy has industrialized. Ransomware isn't just about tech — it's about access, scale, and business models. And most importantly, it's no longer limited to elite coders or closed-door Russian-speaking forums. The barrier to entry is gone, and the dark web is wide open for business.Sean brings up the obvious: “Why does this still feel like we're always reacting?”Lyne responds: “We've shifted. We're going after the ecosystem — the people, the infrastructure, the business model — not just the payload.” That includes disrupting ransomware-as-a-service, targeting marketplaces, and yes, investing in preemptive intelligence.Marco flips the script by comparing today's cyber landscape to something deeply human. “Extortion is nothing new — we've just digitalized it. This is human behavior, scaled by tech.”From there, the conversation takes a future-facing turn. Deepfakes, AI-powered phishing, the commoditization of generative tools — Lyne confirms it's all on their radar. But he's quick to note that cybercriminals aren't bleeding-edge innovators. “They adopt when the ROI is right. But AI-as-a-service? That's coming. And it will reshape how efficient — and damaging — these threats become.”And then the real insight lands:“You can't wait to be a victim to talk to law enforcement. We may already have access to the infrastructure. The earlier we hear from you, the better we can act — and fast.”That kind of operational openness isn't something you heard from law enforcement five years ago. It signals a cultural shift — one where collaboration is not optional, it's essential.William also highlights the NCA's partnerships with private sector firms, academia, and international agencies, including the Kronos operation targeting LockBit infrastructure. These kinds of collaborations prove that when information moves, so does impact.Why does this matter?Because while most cybersecurity media gets stuck in product buzzwords and vendor hype, this is the real stuff — how ransomware groups behave, how law enforcement thinks, and how society can respond. It's not theory. It's strategy, lived on the front lines. 

Strictly Stalking
282. Stalked By A Doctor

Strictly Stalking

Play Episode Listen Later Jun 10, 2025 63:48


Just out of college, Justine landed a full-time job at a community health clinic. But everything changed when the clinic brought in a temporary physician - someone we'll refer to as Dr. T. What started as frequent visits to her desk and too many phone calls, quickly crossed the line into harassment… and then into stalking. Justine followed eery protocol. She reported the incidents to HR, spoke to security, and asked for help. But instead of support, she was met with disbelief, blame, and questions about her own conduct. The system that was supposed to protect her… didn't. Fearing for her safety and with nowhere left to turn, Justine made the difficult decision to leave her job. Now she's telling her story - not just to shine a light on the damage workplace stalking can cause, but to call out the institutional failures that allow it to continue. And to empower others to speak up, even when it feels like no one is listening.HAVE YOU EXPERIENCED STALKING? LET US KNOW:strictlystalkingpod@gmail.comPLEASE VISIT OUR SPONSORS!BeamIf you want to try Beam's best-selling Dream Powder, get up to 40% off for a limited timewhen you go to shopbeam.com/stalking and use code STALKING at checkout. Delete MeToday get 20% off your DeleteMe plan when you go to JoinDeleteMe.com/STALKING and use promo code STALKING at checkout. Progressive InsurancePress play on comparing auto rates. Get your auto quote at Progressive.com to join the over 28 million drivers who trust Progressive.Instagram:@strictlystalkingpod@feathergirl77@jaked3000See Privacy Policy at https://art19.com/privacy and California Privacy Notice at https://art19.com/privacy#do-not-sell-my-info.

ITSPmagazine | Technology. Cybersecurity. Society
Beyond the Hoodie: Redefining Who Belongs in Cybersecurity with Community as the Missing Link in Cyber Resilience | An Infosecurity Europe 2025 Conversation with Amanda Finch | On Location Coverage with Sean Martin and Marco Ciappelli

ITSPmagazine | Technology. Cybersecurity. Society

Play Episode Listen Later Jun 10, 2025 27:03


In this episode, Amanda Finch, Chief Executive Officer of the Chartered Institute of Information Security, offers a perspective shaped by decades of experience in a field she has grown with and helped shape. She shares how cybersecurity has transformed from an obscure technical pursuit into a formalized profession with recognized pathways, development programs, and charters. Her focus is clear: we need to support individuals and organizations at every level to ensure cybersecurity is inclusive, sustainable, and effective.Amanda outlines how the Chartered Institute has developed a structured framework to support cybersecurity careers from entry-level to fellowship. Programs such as the Associate Development Program and the Full Membership Development Program help individuals grow into leadership roles, especially those who come from technical backgrounds and must now influence strategy, policy, and people. She emphasizes that supporting this journey isn't just about skills—it's about building confidence and community.A significant part of the conversation centers on representation and diversity. Amanda speaks candidly about being one of the only women in the room early in her career and acknowledges the progress made, but she also highlights the structural issues still holding many back. From the branding of cybersecurity as overly technical, to the inaccessibility of school programs for under-resourced communities, the industry has work to do. She argues for a wider understanding of the skills needed in cybersecurity—communication, analysis, problem-solving—not just coding or technical specialization.Amanda also addresses the growing threat to small and medium-sized businesses. While large organizations may have teams and resources to manage security, smaller businesses face the same threats without the same support. She calls for a renewed emphasis on community-based solutions—knowledge sharing, mentorship, and collaborative platforms—that extend the reach of cyber defense to those with fewer resources.In closing, Amanda urges us not to forget the enduring principles of security—know what you're protecting, understand the consequences if it fails, and use foundational practices to stay grounded even when new technologies like AI and deepfakes arrive. And just as importantly, she reminds us that human principles—trust, empathy, responsibility—are vital tools in facing cybersecurity's biggest challenges.___________Guest: Amanda Finch, CEO of the Chartered Institute of Information Security | https://www.linkedin.com/in/amanda-finch-fciis-b1b1951/Hosts:Sean Martin, Co-Founder at ITSPmagazine | Website: https://www.seanmartin.comMarco Ciappelli, Co-Founder at ITSPmagazine | Website: https://www.marcociappelli.com___________Episode SponsorsThreatLocker: https://itspm.ag/threatlocker-r974___________ResourcesLearn more and catch more stories from Infosecurity Europe 2025 London coverage: https://www.itspmagazine.com/infosec25Catch all of our event coverage: https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverageWant to tell your Brand Story Briefing as part of our event coverage? Learn More

ITSPmagazine | Technology. Cybersecurity. Society
From Code to Culture: Why Technical Tools Alone Won't Save Cybersecurity | An Infosecurity Europe 2025 Conversation with Rob Black | On Location Coverage with Sean Martin and Marco Ciappelli

ITSPmagazine | Technology. Cybersecurity. Society

Play Episode Listen Later Jun 10, 2025 22:33


What if the key to cybersecurity isn't more tech—but more humanity?In this On Location episode of ITSPmagazine, Rob Black—UK Cyber Citizen of the Year and founder of the Global Institute of Cyber Deception—joins hosts Marco Ciappelli and Sean Martin to challenge conventional thinking around cyber defense. With a background spanning military operations and human sciences, Rob brings a fresh perspective that prioritizes multidisciplinary thinking, behavioral insight, and creative disruption over brute-force technology.Rob highlights the importance of soft skills and critical thinking through initiatives like the UK Cyber Leaders Challenge, where students take on crisis simulation roles to sharpen leadership and communication in real-world scenarios. These experiences underscore the need to cultivate professionals who can think dynamically, not just code efficiently.A key focus of the conversation is the strategic use of deception in cybersecurity. Rob points out that while organizations obsess over vulnerabilities and zero-days, they often overlook attacker intent. Instead of just locking down infrastructure, defenders should disrupt decision-making—using tools, tactics, and even perception itself to sow doubt and hesitation. From publicizing the use of deception technologies to crafting networks that appear already compromised by rival threat actors, Rob argues for a smarter, more psychological approach to defense.He also pushes back against the industry's obsession with tools for every symptom—drawing a parallel to big pharma's model of selling treatments without tackling root causes. If cybersecurity is to become more resilient, he argues, it needs to embrace a systems mindset that includes governance, behavioral science, and even cultural analysis.This episode is a must-listen for anyone tired of buzzwords and ready to rethink cybersecurity as a socio-technical system—not just a digital one. From geopolitics to psychology, deception to diplomacy, Rob Black connects the dots between how we live with technology and how we must protect it—not just through code, but through creativity, context, and compassion. Listen now to explore how cybersecurity can grow up—and get smarter—by getting more human.___________Guest: Rob Black, Director, UK Cyber Leaders Challenge | https://www.linkedin.com/in/rob-black-30440819/Hosts:Sean Martin, Co-Founder at ITSPmagazine | Website: https://www.seanmartin.comMarco Ciappelli, Co-Founder at ITSPmagazine | Website: https://www.marcociappelli.com___________Episode SponsorsThreatLocker: https://itspm.ag/threatlocker-r974___________ResourcesLearn more and catch more stories from Infosecurity Europe 2025 London coverage: https://www.itspmagazine.com/infosec25Catch all of our event coverage: https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverageWant to tell your Brand Story Briefing as part of our event coverage? Learn More

ITSPmagazine | Technology. Cybersecurity. Society
The Digital Dark Alley: Teaching Cybersecurity Like Fire Safety by Building Cyber Habits That Stick | An Infosecurity Europe 2025 Conversation with Jemma Davis | On Location Coverage with Sean Martin and Marco Ciappelli

ITSPmagazine | Technology. Cybersecurity. Society

Play Episode Listen Later Jun 10, 2025 21:06


As Infosecurity Europe prepares to mark its 30th anniversary, Portfolio Director Saima Poorghobad shares how the event continues to evolve to meet the needs of cybersecurity professionals across industries, sectors, and career stages. What began in 1996 as a niche IT gathering has grown into a strategic hub for over 14,000 visitors, offering much more than just vendor booths and keynotes. Saima outlines how the event has become a dynamic space for learning, collaboration, and strategic alignment—balancing deep technical insight with the broader social, political, and technological shifts impacting the cybersecurity community.The Power of the Crowd: Community, Policy, and Lifelong LearningThis year's programming reflects the diverse needs of the cybersecurity community. Attendees range from early-career practitioners to seasoned decision-makers, with representation growing from academia and public policy. The UK government will participate in sessions designed to engage with the community and gather feedback to inform future regulation—a sign of how the show has expanded beyond its commercial roots. Universities are also getting special attention, with new student guides and tailored experiences to help emerging professionals find their place in the ecosystem.Tackling Today's and Tomorrow's Threats—From Quantum to GeopoliticsInfosecurity Europe 2024 is not shying away from bold topics. Professor Brian Cox will open the event by exploring the intersection of quantum science and cybersecurity, setting the tone for a future-facing agenda. Immediately following, BBC's Joe Tidy will moderate a session on how organizations can prepare for the cryptographic disruption quantum computing could bring. Rory Stewart will bring a geopolitical lens to the conversation, examining how shifting alliances, global trade tensions, and international conflicts are reshaping the threat landscape and influencing cybersecurity priorities across regions.Maximizing the Experience: Prep, Participate, and PartyFrom hands-on tech demos to peer-led table talks and new formats like the AI and Cloud Security Theater, the show is designed to be navigable—even for first-time attendees. Saima emphasizes preparation, networking, and follow-up as keys to success, with a new content download feature helping attendees retain insights post-event. The celebration culminates with a 90s-themed 30th anniversary party and a strong sense of pride in what this event has helped the community build—and protect—over three decades.The message is clear: cybersecurity is no longer just a technical field—it's a societal one.___________Guest: Saima Poorghobad, Portfolio Director at Reed Exhibitions | https://www.linkedin.com/in/saima-poorghobad-6a37791b/ Hosts:Sean Martin, Co-Founder at ITSPmagazine | Website: https://www.seanmartin.comMarco Ciappelli, Co-Founder at ITSPmagazine | Website: https://www.marcociappelli.com___________Episode SponsorsThreatLocker: https://itspm.ag/threatlocker-r974___________ResourcesLearn more and catch more stories from Infosecurity Europe 2025 London coverage: https://www.itspmagazine.com/infosec25Catch all of our event coverage: https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverageWant to tell your Brand Story Briefing as part of our event coverage? Learn More

ITSPmagazine | Technology. Cybersecurity. Society
Stay Calm, But Be Ready: What Trust Looks Like in the Middle of a Breach | An Infosecurity Europe 2025 Conversation with Steve Wright | On Location Coverage with Sean Martin and Marco Ciappelli

ITSPmagazine | Technology. Cybersecurity. Society

Play Episode Listen Later Jun 10, 2025 28:57


What does it really mean to be crisis-ready? In this conversation from InfoSecurity Europe 2025, Steve Wright—a data privacy and cybersecurity leader with three decades of experience spanning Siemens, Unilever, John Lewis, and the Bank of England—joins Sean Martin and Marco Ciappelli to unpack the heart of effective crisis management. With a career that's evolved from risk, through cybersecurity, and now into privacy, Wright offers a refreshingly grounded perspective: crisis management starts with staying calm—but only if you've done the work beforehand.Preparation Over PanicCrisis management isn't just a technical checklist—it's a cultural discipline. Wright emphasizes that calm only comes from consistent practice. From live simulations to cross-functional coordination, he warns that too many organizations are underprepared, relying on ad hoc responses when a breach or outage occurs. Drawing on a real-life ransomware scenario from his time at John Lewis, Wright illustrates the importance of verification, collaboration with law enforcement, and informed decision-making over knee-jerk reactions.Containment, Communication, and CulturePreparation leads naturally to containment—an organization's ability to limit the damage. Whether it's pulling cables or isolating systems, quick thinking can prevent weeks of downtime. But just as important is how you communicate. Wright points to the contrast between companies that respond with transparency and empathy versus those that go silent, risking public trust. Modern crisis management requires the ability to shift the narrative and speak directly to affected stakeholders—before speculation takes over.Trust and Accountability in a Global EcosystemDigital trust has become a board-level concern, not just a technical one. Wright notes that conversations with executives have moved beyond compliance to include broader questions of data ownership, consumer expectations, and supply chain accountability. As global systems grow more complex, clarity about who owns what—and who's responsible when things go wrong—becomes harder to establish, but more important than ever.Looking AheadWright ends with a look to the future, imagining a world where individuals control their data through biometric locks and personal data brokers. Whether this utopia (or dystopia) arrives remains to be seen—but the path forward demands organizations prioritize practice, transparency, and trust today.___________Guest: Steve Wright, Data Protection Officer, Financial Services Compensation Scheme | https://www.linkedin.com/in/stevewright1970/Hosts:Sean Martin, Co-Founder at ITSPmagazine | Website: https://www.seanmartin.comMarco Ciappelli, Co-Founder at ITSPmagazine | Website: https://www.marcociappelli.com___________Episode SponsorsThreatLocker: https://itspm.ag/threatlocker-r974___________ResourcesLearn more and catch more stories from Infosecurity Europe 2025 London coverage: https://www.itspmagazine.com/infosec25Catch all of our event coverage: https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverageWant to tell your Brand Story Briefing as part of our event coverage? Learn More

ITSPmagazine | Technology. Cybersecurity. Society
Understanding Cybersecurity Behavior: From Social Engineering to Shadow AI | An Infosecurity Europe 2025 Conversation with Jason Nurse | On Location Coverage with Sean Martin and Marco Ciappelli

ITSPmagazine | Technology. Cybersecurity. Society

Play Episode Listen Later Jun 10, 2025 15:21


Dr. Jason Nurse, academic and cybersecurity behavior researcher, joins Marco Ciappelli at Infosecurity Europe to unpack the shift in cybersecurity thinking—away from purely technical measures and toward a deeper understanding of human behavior and psychology. Nurse focuses his work on why people act the way they do when it comes to security decisions, and how culture, community, and workplace influences shape those actions.Behavior is increasingly taking center stage in security conversations, and for good reason. Nurse points to recent attacks that succeed not because of flaws in technology but due to the manipulation of individuals—such as social engineering tactics that target help desk personnel. These incidents highlight how behavioral cues and psychological triggers are weaponized, making it critical for organizations to address not just systems, but the people using them.The conversation then shifts to artificial intelligence, particularly the growing issue of “shadow AI” in corporate settings. Nurse cites research from the National Cybersecurity Alliance's Behavior Report, revealing that approximately 40% of employees who use AI admit to sharing sensitive corporate information with these tools—often without their employer's awareness. Even more concerning, over half of those organizations offer no training on safe or responsible AI use.Rather than banning AI outright, Nurse advocates for responsible use grounded in training and transparency. He acknowledges that some companies attempt to enforce boundaries by deploying internal AI systems, but these are often limited in capability. Others are exploring solutions to filter or sanitize inputs, though achieving a practical balance remains elusive.The conversation also touches on the emotional and psychological bonds forming between individuals and AI. Nurse notes that users increasingly treat AI like a companion, trusting it with personal information and seeking advice, even in sensitive contexts such as mental health. That trust, while understandable, opens new avenues for misuse and misjudgment—especially when users forget AI lacks genuine understanding.This episode prompts an important question: as AI becomes part of our daily routines, how do we maintain control, context, and caution in our interactions with it—and what does that mean for the future of security?___________Guest: Dr. Jason R.C. Nurse, Associate Professor in Cybersecurity at the University of Kent | https://www.linkedin.com/in/jasonrcnurse/Hosts:Sean Martin, Co-Founder at ITSPmagazine | Website: https://www.seanmartin.comMarco Ciappelli, Co-Founder at ITSPmagazine | Website: https://www.marcociappelli.com___________Episode SponsorsThreatLocker: https://itspm.ag/threatlocker-r974___________ResourcesLearn more and catch more stories from Infosecurity Europe 2025 London coverage: https://www.itspmagazine.com/infosec25Catch all of our event coverage: https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverageWant to tell your Brand Story Briefing as part of our event coverage? Learn More

ITSPmagazine | Technology. Cybersecurity. Society
Collaboration Isn't Fluffy: It's Fundamental to Cybersecurity—Rethinking the Role of Humans in Cyber Defense | An Infosecurity Europe 2025 Conversation with Purvi Kay and Rob Black | On Location Coverage with Sean Martin and Marco Ciappelli

ITSPmagazine | Technology. Cybersecurity. Society

Play Episode Listen Later Jun 9, 2025 16:45


Cybersecurity isn't just about code, controls, or compliance—it's about people. That's the core message from Purvi Kay, Head of Cybersecurity for the Future Combat Air System at BAE Systems, and Rob Black, founder of the UK Cyber Leaders Challenge, as they share how genuine collaboration is reshaping security success in high-stakes environments.In this InfoSecurity Europe conversation, Purvi emphasizes that cybersecurity is still too often seen as an IT issue, when in reality it cuts across every aspect of business. Her role spans cybersecurity strategy, leadership development, and advocacy—serving also as Chair of BAE's Women in Cyber program and as a neurodiversity champion. For her, inclusion is more than a policy—it's essential to mission success, especially when coordinating across trilateral government and industry teams on programs as complex as next-gen fighter aircraft.Rob reinforces this point with his focus on developing soft skills in future cybersecurity leaders. His work brings non-traditional talent into cyber, prioritizing communication, empathy, and multidisciplinary collaboration. These human-centric capabilities are crucial when bridging divides between security, legal, HR, and operations.Both guests highlight how assumptions, language, and siloed thinking obstruct progress. Purvi shares how cybersecurity has often been seen as a barrier—brought in too late, misunderstood, or left out of key decisions. She now champions “secure by design” practices through early involvement of cross-functional teams. Rob brings a memorable example: using marriage counseling techniques to help auditors and developers understand each other better—not to resolve personal conflict, but to decode cultural and professional misalignments.Their conversation also touches on practical methods for building shared understanding, from sketching “river journeys” to map project dynamics, to fostering stakeholder buy-in through intentional communication. Whether aligning three governments or managing internal procurement, they show that collaboration isn't just a buzzword—it's a structured, repeatable approach to managing complexity.This episode offers a thoughtful and grounded look at how meaningful human connection—across functions, cultures, and roles—forms the foundation of effective cybersecurity. It's a timely reminder that the path to resilience begins with listening, empathy, and a clear sense of shared purpose.___________Guests:Purvi Kay, Head of Cybersecurity for the Future Combat Air System at BAE Systems | https://www.linkedin.com/in/purvikay/Rob Black, Director, UK Cyber Leaders Challenge | https://www.linkedin.com/in/rob-black-30440819/Hosts:Sean Martin, Co-Founder at ITSPmagazine | Website: https://www.seanmartin.comMarco Ciappelli, Co-Founder at ITSPmagazine | Website: https://www.marcociappelli.com___________Episode SponsorsThreatLocker: https://itspm.ag/threatlocker-r974___________ResourcesLearn more and catch more stories from Infosecurity Europe 2025 London coverage: https://www.itspmagazine.com/infosec25Catch all of our event coverage: https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverageWant to tell your Brand Story Briefing as part of our event coverage? Learn More

ITSPmagazine | Technology. Cybersecurity. Society
The Billion-Dollar Blueprint: Following the Digital Trail of Criminal Cash and the Human Cost of Cybercrime | An Infosecurity Europe 2025 Conversation with Geoff White | On Location Coverage with Sean Martin and Marco Ciappelli

ITSPmagazine | Technology. Cybersecurity. Society

Play Episode Listen Later Jun 9, 2025 24:04


As Infosecurity Europe prepares to mark its 30th anniversary, Portfolio Director Saima Poorghobad shares how the event continues to evolve to meet the needs of cybersecurity professionals across industries, sectors, and career stages. What began in 1996 as a niche IT gathering has grown into a strategic hub for over 14,000 visitors, offering much more than just vendor booths and keynotes. Saima outlines how the event has become a dynamic space for learning, collaboration, and strategic alignment—balancing deep technical insight with the broader social, political, and technological shifts impacting the cybersecurity community.The Power of the Crowd: Community, Policy, and Lifelong LearningThis year's programming reflects the diverse needs of the cybersecurity community. Attendees range from early-career practitioners to seasoned decision-makers, with representation growing from academia and public policy. The UK government will participate in sessions designed to engage with the community and gather feedback to inform future regulation—a sign of how the show has expanded beyond its commercial roots. Universities are also getting special attention, with new student guides and tailored experiences to help emerging professionals find their place in the ecosystem.Tackling Today's and Tomorrow's Threats—From Quantum to GeopoliticsInfosecurity Europe 2024 is not shying away from bold topics. Professor Brian Cox will open the event by exploring the intersection of quantum science and cybersecurity, setting the tone for a future-facing agenda. Immediately following, BBC's Joe Tidy will moderate a session on how organizations can prepare for the cryptographic disruption quantum computing could bring. Rory Stewart will bring a geopolitical lens to the conversation, examining how shifting alliances, global trade tensions, and international conflicts are reshaping the threat landscape and influencing cybersecurity priorities across regions.Maximizing the Experience: Prep, Participate, and PartyFrom hands-on tech demos to peer-led table talks and new formats like the AI and Cloud Security Theater, the show is designed to be navigable—even for first-time attendees. Saima emphasizes preparation, networking, and follow-up as keys to success, with a new content download feature helping attendees retain insights post-event. The celebration culminates with a 90s-themed 30th anniversary party and a strong sense of pride in what this event has helped the community build—and protect—over three decades.The message is clear: cybersecurity is no longer just a technical field—it's a societal one.___________Guest: Geoff White, Author, Speaker, Investigative Journalist, Podcast Creator | https://www.linkedin.com/in/geoffwhitetech/Hosts:Sean Martin, Co-Founder at ITSPmagazine | Website: https://www.seanmartin.comMarco Ciappelli, Co-Founder at ITSPmagazine | Website: https://www.marcociappelli.com___________Episode SponsorsThreatLocker: https://itspm.ag/threatlocker-r974___________ResourcesLearn more and catch more stories from Infosecurity Europe 2025 London coverage: https://www.itspmagazine.com/infosec25Catch all of our event coverage: https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverageWant to tell your Brand Story Briefing as part of our event coverage? Learn More

ITSPmagazine | Technology. Cybersecurity. Society
When Automation Meets Ethics, Budget, Data, and Risk: The Real Factors Behind AI Deployment | An Infosecurity Europe 2025 Conversation with Andrea Isoni | On Location Coverage with Sean Martin and Marco Ciappelli

ITSPmagazine | Technology. Cybersecurity. Society

Play Episode Listen Later Jun 9, 2025 29:35


As Infosecurity Europe prepares to mark its 30th anniversary, Portfolio Director Saima Poorghobad shares how the event continues to evolve to meet the needs of cybersecurity professionals across industries, sectors, and career stages. What began in 1996 as a niche IT gathering has grown into a strategic hub for over 14,000 visitors, offering much more than just vendor booths and keynotes. Saima outlines how the event has become a dynamic space for learning, collaboration, and strategic alignment—balancing deep technical insight with the broader social, political, and technological shifts impacting the cybersecurity community.The Power of the Crowd: Community, Policy, and Lifelong LearningThis year's programming reflects the diverse needs of the cybersecurity community. Attendees range from early-career practitioners to seasoned decision-makers, with representation growing from academia and public policy. The UK government will participate in sessions designed to engage with the community and gather feedback to inform future regulation—a sign of how the show has expanded beyond its commercial roots. Universities are also getting special attention, with new student guides and tailored experiences to help emerging professionals find their place in the ecosystem.Tackling Today's and Tomorrow's Threats—From Quantum to GeopoliticsInfosecurity Europe 2024 is not shying away from bold topics. Professor Brian Cox will open the event by exploring the intersection of quantum science and cybersecurity, setting the tone for a future-facing agenda. Immediately following, BBC's Joe Tidy will moderate a session on how organizations can prepare for the cryptographic disruption quantum computing could bring. Rory Stewart will bring a geopolitical lens to the conversation, examining how shifting alliances, global trade tensions, and international conflicts are reshaping the threat landscape and influencing cybersecurity priorities across regions.Maximizing the Experience: Prep, Participate, and PartyFrom hands-on tech demos to peer-led table talks and new formats like the AI and Cloud Security Theater, the show is designed to be navigable—even for first-time attendees. Saima emphasizes preparation, networking, and follow-up as keys to success, with a new content download feature helping attendees retain insights post-event. The celebration culminates with a 90s-themed 30th anniversary party and a strong sense of pride in what this event has helped the community build—and protect—over three decades.The message is clear: cybersecurity is no longer just a technical field—it's a societal one.___________Guest: Saima Poorghobad, Portfolio Director at Reed Exhibitions | https://www.linkedin.com/in/saima-poorghobad-6a37791b/ Hosts:Sean Martin, Co-Founder at ITSPmagazine | Website: https://www.seanmartin.comMarco Ciappelli, Co-Founder at ITSPmagazine | Website: https://www.marcociappelli.com___________Episode SponsorsThreatLocker: https://itspm.ag/threatlocker-r974___________ResourcesLearn more and catch more stories from Infosecurity Europe 2025 London coverage: https://www.itspmagazine.com/infosec25Catch all of our event coverage: https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverageWant to tell your Brand Story Briefing as part of our event coverage? Learn More

Strictly Stalking
281. Impersonated, Threatened, Stalked

Strictly Stalking

Play Episode Listen Later Jun 3, 2025 44:21


Meghan's nightmare began just weeks after graduating high school, when she became the target of a stalker impersonating her online — posting fake messages that claimed she was suicidal. Years later, after she defended a friend from cyberbullying on a fan site, it happened again. This time, the harassment escalated. Someone sent fake welfare checks to her home and impersonated her online, even going so far as to send threatening messages to a celebrity while posing as Meghan online. She has contacted local police, but with the stalker operating across state lines and hiding behind layers of digital anonymity, legal action has proven nearly impossible. Now, Meghan is speaking out — determined to share her story and put an end to the stalking she has endured.HAVE YOU EXPERIENCED STALKING? LET US KNOW:strictlystalkingpod@gmail.comGUEST LINKSMeghan WalshInstagram: https://www.instagram.com/themeghanwalshTikTok: https://www.tiktok.com/@themeghanwalsh PLEASE VISIT OUR SPONSORS!Progressive InsurancePress play on comparing auto rates. Get your auto quote at Progressive.com to join the over 28 million drivers who trust Progressive.Instagram:@strictlystalkingpod@feathergirl77@jaked3000See Privacy Policy at https://art19.com/privacy and California Privacy Notice at https://art19.com/privacy#do-not-sell-my-info.

ITSPmagazine | Technology. Cybersecurity. Society
More Than Code: Why Human Skills Matter in AppSec | An OWASP AppSec Global 2025 Conversation with Maria Mora | On Location Coverage with Sean Martin and Marco Ciappelli

ITSPmagazine | Technology. Cybersecurity. Society

Play Episode Listen Later Jun 3, 2025 15:37


In this On Location episode during OWASP AppSec Global 2025 in Barcelona, Maria Mora, Staff Application Security Engineer and active OWASP lifetime member, shares how her experience at the OWASP AppSec Global conference in Barcelona has reaffirmed the power of community in security. While many attendees chase back-to-back talks and technical training, Maria highlights something often overlooked—connection. Whether at the member lounge ping-pong table, during late-night beach meetups, or over keynote reflections, it's the relationships and shared purpose that make this event resonate.Maria emphasizes how her own journey into OWASP began with uncertainty but evolved into a meaningful path of participation. Through volunteering, serving on the events committee, and mentoring others, she has expanded not only her technical toolkit but also her ability to collaborate and communicate—skills she notes are essential in InfoSec but rarely prioritized. By stepping into the OWASP community, she's learned that you don't need decades of experience to contribute—just a willingness to start.Keynotes and sessions this year reinforced a similar message: security isn't just about hard skills. It's about bridging academia and industry, engaging first-time attendees, and creating welcoming spaces where no one feels like an outsider. Talks like Sarah Jané's encouraged attendees to find their own ways to give back, whether by submitting to the call for papers, helping with logistics, or simply sparking hallway conversations.Maria also points to how OWASP structures participation to make it accessible. Through demo rooms, project hubs, and informal lounge chats, attendees find ways to contribute to global initiatives like the OWASP Top 10 or volunteer-led trainings. Whether it's your first conference or your tenth, there's always room to jump in.For Maria, OWASP no longer feels like a secret club—it's a growing, open collective focused on helping people bring their best selves to security. That's the power of community: not just lifting up software, but lifting up each other.And for those thinking of taking the next step, Maria reminds us that the call for papers for OWASP DC is open through June 24th. As she puts it, “We all have something valuable to share—sometimes you just need the nudge to start.”GUEST: Maria Mora | Staff Application Security Engineer and OWASP events committee member | https://www.linkedin.com/in/riamaria/HOST: Sean Martin, Co-Founder at ITSPmagazine and Host of Redefining CyberSecurity Podcast | https://www.seanmartin.comSPONSORSManicode Security: https://itspm.ag/manicode-security-7q8iRESOURCESLearn more and catch more stories from OWASP AppSec Global 2025 Barcelona coverage: https://www.itspmagazine.com/owasp-global-appsec-barcelona-2025-application-security-event-coverage-in-catalunya-spainCatch all of our event coverage: https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverageWant to tell your Brand Story Briefing as part of our event coverage? Learn More

ITSPmagazine | Technology. Cybersecurity. Society
From Fraud to Fixes: Designing Usable Security for Financial Applications | An OWASP AppSec Global 2025 Conversation with Wojciech Dworakowski | On Location Coverage with Sean Martin and Marco Ciappelli

ITSPmagazine | Technology. Cybersecurity. Society

Play Episode Listen Later Jun 2, 2025 11:29


In this On Location episode during OWASP AppSec Global 2025 in Barcelona, Sean Martin connects with event speaker, Wojciech Dworakowski, to unpack a critical and underexamined issue in today's financial systems: the vulnerability of mobile-only banking apps when it comes to transaction authorization.Wojciech points out that modern banking has embraced the mobile-first model—sometimes at the cost of fundamental security principles. Most banks now concentrate transaction initiation, security configuration, and transaction authorization into a single device: the user's smartphone. While this offers unmatched convenience, it also creates a single point of failure. If an attacker successfully pairs their phone with a victim's account, they can bypass multiple layers of security, often without needing traditional credentials.The discussion explores the limitations of relying solely on biometric options like Face ID or Touch ID. These conveniences may appear secure but often weaken the overall security posture when used without additional independent verification mechanisms. Wojciech outlines how common attack strategies have shifted from stealing credit card numbers to full account takeover—enabled by social engineering and weak device-pairing controls.He proposes a “raise the bar” strategy rather than relying on a single silver-bullet solution. Suggestions include enhanced device fingerprinting, detection of emulators or rooted environments, and shared interbank databases for device reputation and account pairing anomalies. While some of these are already in motion under new EU and UK regulations, they remain fragmented.Wojciech also introduces a bold idea: giving users a slider in the app to adjust their personal balance of convenience vs. security. This kind of usability-driven approach could empower users while still offering layered defense.For CISOs, developers, and FinTech leaders, the message is clear—evaluate your app security as if attackers already know the shortcuts. Watch the full conversation to hear Wojciech's real-world examples, including a cautionary tale from his own family. Catch the episode and learn how to design financial security that's not just strong—but usable.GUEST: Wojciech Dworakowski | OWASP Poland Chapter Board Member and Managing Partner at SecuRing | https://www.linkedin.com/in/wojciechdworakowski/HOST: Sean Martin, Co-Founder at ITSPmagazine and Host of Redefining CyberSecurity Podcast | https://www.seanmartin.comSPONSORSManicode Security: https://itspm.ag/manicode-security-7q8iRESOURCESLearn more and catch more stories from OWASP AppSec Global 2025 Barcelona coverage: https://www.itspmagazine.com/owasp-global-appsec-barcelona-2025-application-security-event-coverage-in-catalunya-spainCatch all of our event coverage: https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverageWant to tell your Brand Story Briefing as part of our event coverage? Learn More

ITSPmagazine | Technology. Cybersecurity. Society
From Dashboards to Decisions: Why Your Security Metrics Might Be Leading You Astray | An OWASP AppSec Global 2025 Conversation with Aram Hovsepyan | On Location Coverage with Sean Martin and Marco Ciappelli

ITSPmagazine | Technology. Cybersecurity. Society

Play Episode Listen Later May 31, 2025 16:18


In this On Location episode during OWASP AppSec Global 2025 in Barcelona, Aram Hovsepyan, an active contributor to the OWASP SAMM project, brings a critical perspective to how the industry approaches security metrics, especially in vulnerability management. His message is clear: the way we collect and use metrics needs a serious rethink if we want to make real progress in reducing risk.Too often, organizations rely on readily available tool-generated metrics—like vulnerability counts—without pausing to ask what those numbers actually mean in context. These metrics may look impressive in a dashboard or board report, but as Aram points out, they're often disconnected from business goals. Worse, they can drive the wrong behaviors, such as trying to reduce raw vulnerability counts without considering exploitability or actual impact.Aram emphasizes the importance of starting with organizational goals, formulating questions that reflect progress toward those goals, and only then identifying metrics that provide meaningful answers. It's a research-backed approach that has been known for decades but is often ignored in favor of convenience.False positives, inflated dashboards, and a lack of alignment between metrics and strategy are recurring issues. Aram notes that many tools err on the side of overreporting to avoid false negatives, which leads to overwhelming—and often irrelevant—volumes of data. In some cases, up to 80% of identified vulnerabilities may be false positives, leaving security teams drowning in noise and chasing issues that may not matter.What's missing, he argues, is a strategic lens. Vulnerability management should be one component of a broader application security program, not the centerpiece. The OWASP Software Assurance Maturity Model (SAMM) offers a framework for evaluating and improving across a range of practices—strategy, risk analysis, and threat modeling among them—that collectively support better decision-making.To move forward, organizations need to stop treating vulnerability data as a performance metric and start treating it as a signal in a larger conversation about risk, impact, and architectural choices. Aram's call to action is simple: ask better questions, use tools more purposefully, and build security strategies that actually serve the business.GUEST: Aram Hovsepyan | OWASP SAMM Project Core Team member and CEO/Founder at CODIFIC | https://www.linkedin.com/in/aramhovsep/HOST: Sean Martin, Co-Founder at ITSPmagazine and Host of Redefining CyberSecurity Podcast | https://www.seanmartin.comSPONSORSManicode Security: https://itspm.ag/manicode-security-7q8iRESOURCESLearn more and catch more stories from OWASP AppSec Global 2025 Barcelona coverage: https://www.itspmagazine.com/owasp-global-appsec-barcelona-2025-application-security-event-coverage-in-catalunya-spainCatch all of our event coverage: https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverageWant to tell your Brand Story Briefing as part of our event coverage? Learn More

ITSPmagazine | Technology. Cybersecurity. Society
Holding the Line on Quality in an AI-Driven SDLC | An OWASP AppSec Global 2025 Conversation with Sarah-Jane Madden | On Location Coverage with Sean Martin and Marco Ciappelli

ITSPmagazine | Technology. Cybersecurity. Society

Play Episode Listen Later May 30, 2025 14:48


In this On Location episode during OWASP AppSec Global 2025 in Barcelona, Sarah-Jane Madden brings a unique lens to application security, shaped by her journey from developer to security leader and CSO. Speaking at OWASP AppSec Global, she tackles one of today's most pressing concerns: how AI is reshaping software engineering—and how we must respond without compromising core values like quality and security.Madden emphasizes that AI is only the latest in a series of major disruptions, comparing it to shifts like remote work triggered by COVID. Her message is clear: organizations must prepare for continuous change, not just chase the current trend. That means prioritizing adaptability and ensuring critical practices like application security are not sacrificed in the rush to speed up delivery.She makes the case for a layered, iterative approach to development—rejecting the outdated linear mindset. Developers, she argues, should leverage AI as an accelerator, not a replacement. Think of AI as your digital intern: handling the drudgery, automating boilerplate code, and even applying internal security standards to code before it reaches human hands. This frees developers to focus on creative problem-solving and thoughtful architecture.However, Madden cautions against blind enthusiasm. While experimentation is healthy, organizations must be discerning about outcomes. Speed is meaningless without quality, and quality includes security. She calls on developers to advocate for high standards and reminds business leaders not to fall for the allure of shortcut statistics or flashy claims that promise results without skilled labor. Her analogy of microwave dinners vs. proper cuisine illustrates the risk of prioritizing convenience over substance—especially in complex problem-solving environments.For line-of-business leaders, Madden urges realistic expectations. AI can enhance productivity, but it doesn't eliminate the need for thoughtful development. Ultimately, customers will notice if quality drops, and reputational damage is hard to undo.In closing, Madden celebrates OWASP as more than an organization—it's a source of support, camaraderie, and genuine community for those working to build secure, reliable systems. Her message? Embrace change, use tools wisely, protect your standards, and never forget the human side of engineering.GUEST: Sarah-Jane Madden | Global Director of Cyber Defense at Fortive | https://www.linkedin.com/in/sarahjanemadden/HOST: Sean Martin, Co-Founder at ITSPmagazine and Host of Redefining CyberSecurity Podcast | https://www.seanmartin.comSPONSORSManicode Security: https://itspm.ag/manicode-security-7q8iRESOURCESLearn more and catch more stories from OWASP AppSec Global 2025 Barcelona coverage: https://www.itspmagazine.com/owasp-global-appsec-barcelona-2025-application-security-event-coverage-in-catalunya-spainCatch all of our event coverage: https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverageWant to tell your Brand Story Briefing as part of our event coverage? Learn More

ITSPmagazine | Technology. Cybersecurity. Society
When Simplicity Meets Strategy: Making Immutability Accessible for All | A Brand Story with Sterling Wilson from Object First | An RSAC Conference 2025 Post-Event Brand Story

ITSPmagazine | Technology. Cybersecurity. Society

Play Episode Listen Later May 30, 2025 14:35


When it comes to data protection, the word “immutability” often feels like it belongs in the realm of enterprise giants with complex infrastructure and massive budgets. But during this RSAC Conference conversation, Sterling Wilson, Field CTO at Object First, makes a strong case that immutability should be, and can be, for everyone.Wilson brings a grounded perspective shaped by his experience on the floor at RSAC, where Object First made its debut as a sponsor. The energy, he notes, was contagious: not just among vendors, but also from practitioners expressing serious concerns about their ability to recover data post-incident. These conversations weren't hypothetical; they were real worries tied to rising insurance premiums, regulatory compliance, and operational survivability. And at the core of all this? Trust in the data backup process.Agentic AI, AI capable of making decisions independently, is one of the trends Wilson flags as both promising and risky. It offers potential for improving preparedness and accelerating recovery. But it also raises concerns around access and control of sensitive data, particularly if exploited by adversaries. For Sterling, the opportunity lies in combining proactive readiness with simplicity and control, especially for those who aren't traditional security practitioners.Object First is doing just that through OOTBI: Out of the Box Immutability. And yes, there's a mascot: OOTBI. More than just a marketing hook, OOTBI represents a shift toward making backup and recovery systems approachable, usable, and, importantly, accessible. According to Wilson, the product gets users from “box to backup” in 15 minutes... with encrypted, immutable storage that meets critical requirements for cyber insurance coverage.Cost, Wilson adds, is a key barrier that often prevents organizations from reaching data protection best practices. That's why Object First now offers consumption-based pricing models. Whether a business is cloud-first or scaling fast, it's a path to protection that doesn't require breaking the budget.Ultimately, Wilson emphasizes education and community as critical drivers of progress. From field labs where teams can configure their own Opi, to on-location conference conversations, the company is building awareness, and reducing fear, by making secure storage not just a feature, but a foundation.This episode is a reminder that effective cybersecurity isn't only about innovation; it's about inclusion, practicality, and trust... both in your tools and your team.Learn more about Object First: https://itspm.ag/object-first-2gjlNote: This story contains promotional content. Learn more.Guest: Sterling Wilson, Field CTO, Object First | https://www.linkedin.com/in/sterling-wilson/ResourcesLearn more and catch more stories from Object First: https://www.itspmagazine.com/directory/object-firstLearn more and catch more stories from RSA Conference 2025 coverage: https://www.itspmagazine.com/rsac25______________________Keywords:sean martin, marco ciappelli, sterling wilson, immutability, agentic, ai, backup, recovery, cybersecurity, insurance, brand story, brand marketing, marketing podcast, brand story podcast______________________Catch all of our event coverage: https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverageWant to tell your Brand Story Briefing as part of our event coverage? Learn More 

ITSPmagazine | Technology. Cybersecurity. Society
Why Global Community-Led Innovation Is Driving Real Application Security Progress | An OWASP AppSec Global 2025 Conversation with Starr Brown | On Location Coverage with Sean Martin and Marco Ciappelli

ITSPmagazine | Technology. Cybersecurity. Society

Play Episode Listen Later May 30, 2025 9:06


In this On Location episode during OWASP AppSec Global 2025 in Barcelona, Starr Brown, Director of Open Source Projects and Programs at OWASP, unpacks the real engine behind the organization's impact: the projects and the people driving them forward.With over 130 active projects, OWASP continues to expand its open source contributions to improve software security across the board. While the OWASP Top 10 remains its most recognized initiative, Starr points out that it's just one among many. Other significant projects include the Application Security Verification Standard (ASVS), the Software Assurance Maturity Model (SAMM), and the increasingly popular security games like Cornucopia, which use gamification to bring security concepts into business conversations and development workflows.AI is playing an increasingly prominent role in OWASP's work. Starr highlights the GenAI Security Project as a focal point, encompassing tools and guidance for LLM use, agentic AI, red teaming, and more. The scale of community engagement is equally impressive: around 33,000 people are active on Slack, and hundreds contribute to individual initiatives, reflecting the organization's truly global and grassroots structure.Beyond tools and documentation, OWASP is influencing regulation and policy through initiatives like the AI Exchange and the Transparency Exchange. These projects connect with government entities and standards bodies such as the European Commission and CEN/CENELEC to help shape responsible governance frameworks around software, AI, and cybersecurity.Listeners also get a glimpse into what's ahead. From upcoming events in Washington, D.C., to the OWASP Community Room at DEF CON in Las Vegas, the goal is to keep fostering connections and hands-on engagement. These gatherings not only showcase flagship tools and frameworks but create space for open dialogue, prototyping, and collaboration—whether you're breaking things or building them.To get involved, Starr encourages exploring the OWASP Projects page and joining their Slack community. The conversation makes it clear: OWASP is not just a collection of tools—it's a living, breathing network of contributors shaping the future of secure software.GUEST: Starr Brown | Director of Open Source Projects and Programs at OWASP | https://www.linkedin.com/in/starr-brown-8837547/HOST: Sean Martin, Co-Founder at ITSPmagazine and Host of Redefining CyberSecurity Podcast | https://www.seanmartin.comSPONSORSManicode Security: https://itspm.ag/manicode-security-7q8iRESOURCESLearn more and catch more stories from OWASP AppSec Global 2025 Barcelona coverage: https://www.itspmagazine.com/owasp-global-appsec-barcelona-2025-application-security-event-coverage-in-catalunya-spainCatch all of our event coverage: https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverageWant to tell your Brand Story Briefing as part of our event coverage? Learn More

ITSPmagazine | Technology. Cybersecurity. Society
Turning AppSec into a Workflow, Not a Roadblock – Building Security Programs That Teams Actually Want to Use | An OWASP AppSec Global 2025 Conversation with Spyros Gasteratos | On Location Coverage with Sean Martin and Marco Ciappelli

ITSPmagazine | Technology. Cybersecurity. Society

Play Episode Listen Later May 29, 2025 17:28


During the upcoming OWASP Global AppSec EU in Barcelona, Spyros Gasteratos, long-time OWASP contributor and co-founder of Smithy, to explore how automation, collaboration, and community resources are shaping the future of application security. Spyros shares the foundation of his talk at OWASP AppSec Global: building a DevSecOps program from scratch using existing community tools—blending technical guidance with a celebration of open-source achievements.Spyros emphasizes that true progress in security stems not from an ever-growing stack of tools, but from aligning the humans behind them. According to him, security failures often stem from fragmented information and misaligned incentives across teams. His solution? Bring the teams together with a shared, streamlined flow of information and automate wherever possible to reduce wasted cycles and miscommunication.At the core of Spyros' philosophy is the need to turn AppSec from a blocker into a builder. Rather than overwhelming developers with endless bug reports, or security leaders with red dashboards, programs need to reflect the actual risk appetite of the business—prioritizing issues dynamically based on impact, timing, and operational goals. He challenges the one-size-fits-all approach, advocating instead for tagging systems that defer certain risks and encode organizational priorities in automation logic.A major part of that transformation lies in Smithy, the platform he's helping build. It's designed to be “Zapier for security”—an automation engine rooted in open-source standards that allows for custom workflows without creating a tangle of fragile scripts. The idea is to let teams focus on what's unique to them, while relying on battle-tested components for the rest.Looking ahead, Spyros doesn't buy into the doom-and-gloom narrative about AI limiting developer creativity. On the contrary, he argues that AI-enabled coding frees up cognitive space for better architecture and secure design thinking. In his view, creativity doesn't die—it just shifts from syntax to strategy.This episode is more than a discussion—it's a blueprint for how teams can rally around a common goal, and how OWASP's community can be the catalyst. Tune in to hear how open-source, automation, and human alignment are redefining AppSec from the ground up.GUEST: Spyros Gasteratos | OpenCRE co-lead and Founder of smithy.security | https://www.linkedin.com/in/spyr/HOST: Sean Martin, Co-Founder at ITSPmagazine and Host of Redefining CyberSecurity Podcast | https://www.seanmartin.comSPONSORSManicode Security: https://itspm.ag/manicode-security-7q8iRESOURCESSpyros' Session: A completely pluggable DevSecOps programme, for free, using community resources (https://owasp2025globalappseceu.sched.com/event/1whCB/a-completely-pluggable-devsecops-programme-for-free-using-community-resources)Learn more and catch more stories from OWASP Global AppSec EU 2025 Conference coverage: https://www.itspmagazine.com/owasp-global-appsec-barcelona-2025-application-security-event-coverage-in-catalunya-spainCatch all of our event coverage: https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverageWant to tell your Brand Story Briefing as part of our event coverage? Learn More

ITSPmagazine | Technology. Cybersecurity. Society
The API That Could Transform Software Transparency | An OWASP AppSec Global 2025 Conversation with Olle E Johansson | On Location Coverage with Sean Martin and Marco Ciappelli

ITSPmagazine | Technology. Cybersecurity. Society

Play Episode Listen Later May 29, 2025 14:29


The introduction of the Cyber Resilience Act (CRA) marks a major shift for the software industry: for the first time, manufacturers are being held accountable for the cybersecurity of their products. Olle E. Johansson, a long-time open source developer and contributor to the Asterisk PBX project, explains how this new regulation reshapes the role of software creators and introduces the need for transparency across the entire supply chain.In this episode, Johansson breaks down the complexity of today's software supply ecosystems—where manufacturers rely heavily on open source components, and end users struggle to identify vulnerabilities buried deep in third-party dependencies. With the CRA in place, the burden now falls on manufacturers to not only track but also report on the components in their products. That includes actively communicating which vulnerabilities affect users—and which do not.To make this manageable, Johansson introduces the Transparency Exchange API (TEA), a project rooted in the OWASP CycloneDX standard. What started as a simple Software Bill of Materials (SBOM) delivery mechanism has evolved into a broader platform for sharing vulnerability information, attestations, documentation, and even cryptographic data necessary for the post-quantum transition. Standardizing this API through Ecma International is a major step toward a scalable, automated supply chain security infrastructure.The episode also highlights the importance of automation and shared data formats in enabling companies to react quickly to threats like Log4j. Johansson notes that, historically, security teams spent countless hours manually assessing whether they were affected by a specific vulnerability. The Transparency Exchange API aims to change that by automating the entire feedback loop from developer to manufacturer to end user.Although still in beta, the project is gaining traction with organizations like the Apache Foundation integrating it into their release processes. Johansson emphasizes that community feedback is essential and invites listeners to engage through GitHub to help shape the project's future.For Johansson, OWASP stands for global knowledge and collaboration in application security. As Europe's regulatory influence grows, initiatives like this are essential to build a stronger, more accountable software ecosystem.GUEST: Olle E Johansson | Co-Founder, SBOM Europe | https://www.linkedin.com/in/ollejohansson/HOST:Sean Martin, Co-Founder at ITSPmagazine and Host of Redefining CyberSecurity Podcast | https://www.seanmartin.comSPONSORSManicode Security: https://itspm.ag/manicode-security-7q8iRESOURCESCycloneDX/transparency-exchange-api on GitHub: https://github.com/CycloneDX/transparency-exchange-apiVIDEO: The Cyber Resilience Act: How the EU is Reshaping Digital Product Security | With Sarah Fluchs: https://youtu.be/c30eG5kzqnYLearn more and catch more stories from OWASP AppSec Global 2025 Barcelona coverage: https://www.itspmagazine.com/owasp-global-appsec-barcelona-2025-application-security-event-coverage-in-catalunya-spainCatch all of our event coverage: https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverageWant to tell your Brand Story Briefing as part of our event coverage? Learn More

ITSPmagazine | Technology. Cybersecurity. Society
Redefining What Secure Application Development Looks Like: Bringing Application Security into Focus with ASVS v5 | An OWASP AppSec Global 2025 Conversation with Josh Grossman | On Location Coverage with Sean Martin and Marco Ciappelli

ITSPmagazine | Technology. Cybersecurity. Society

Play Episode Listen Later May 29, 2025 13:32


In this On Location episode during OWASP AppSec Global 2025 in Barcelona, Josh Grossman, co-leader of the OWASP Application Security Verification Standard (ASVS) project, shares key updates and strategic thinking behind the release of ASVS version 5. This release, years in the making, reflects a renewed focus on making the standard more approachable, practical, and actionable for development teams and security leaders alike.ASVS is designed to provide a comprehensive and verifiable set of security requirements for building and maintaining secure applications. More than just a checklist, it offers a clear blueprint for what a secure application should look like—making it easier to benchmark progress, develop secure design requirements, and implement effective controls. Version 5 emphasizes accessibility, particularly by lowering the barrier to entry for organizations adopting Level 1 of the standard, reducing the threshold of required controls from nearly 50% to under 30%.One of the major shifts in this new version is the tighter focus on the application itself, moving away from system-level topics like backup policies that tend to fall outside the scope of app development teams. This makes the standard more relevant to software architects, developers, and QA engineers—providing requirements that fall within their sphere of influence, while still covering the full software lifecycle from design to deployment.Grossman explains how organizations can customize ASVS to include their internal controls and build out secure coding checklists, implementation guides, and requirements documents tailored to their environments. He also highlights how ASVS aligns with other OWASP projects, like the Cheat Sheet Series and SAMM, for both control-level guidance and organizational process development.For security leaders looking to improve their application security programs, ASVS v5 offers a foundation to build on—clear, community-driven, and extensible. And true to OWASP's spirit, the project is backed by a passionate community, from project co-leads like Grossman and Elar Lang to contributors around the world. As Grossman puts it, OWASP is about connection—people tackling similar challenges, working together to make software safer.If you're looking for a way to bring practical, standards-based security into your software lifecycle, this conversation is your starting point.GUEST: Josh Grossman | CTO of Bounce Security and co-leader of the OWASP Application Security Verification Standard (ASVS) project | https://www.linkedin.com/in/joshcgrossman/HOST: Sean Martin, Co-Founder at ITSPmagazine and Host of Redefining CyberSecurity Podcast | https://www.seanmartin.comSPONSORSManicode Security: https://itspm.ag/manicode-security-7q8iRESOURCESOWASP Application Security Verification Standard (ASVS): https://owasp.org/www-project-application-security-verification-standard/Learn more and catch more stories from OWASP AppSec Global 2025 Barcelona coverage: https://www.itspmagazine.com/owasp-global-appsec-barcelona-2025-application-security-event-coverage-in-catalunya-spainCatch all of our event coverage: https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverageWant to tell your Brand Story Briefing as part of our event coverage? Learn More

Strictly Stalking
280. Stalked in Lockdown

Strictly Stalking

Play Episode Listen Later May 27, 2025 66:35


Kate met a man on Facebook just before the COVID lockdown—and what began as a pandemic relationship soon turned into a nightmare. After discovering his obsessive behavior toward other women, Kate ended things. But the breakup didn't stop him. For over a year, Kate was relentlessly harassed. She received a flood of messages, phone calls, and emails from multiple numbers. Disturbing packages began arriving at her home. Even after she moved to a nearby city, he found her and followed. Desperate, Kate filed cyberstalking charges—but that only escalated the situation. He started appearing in person, even confronting her in the park while she was with her children. With nowhere else to turn, Kate finally went to the police for help.HAVE YOU EXPERIENCED STALKING? LET US KNOW:strictlystalkingpod@gmail.comShopifySign up for a one-dollar-per-month trial period atSHOPIFY.COM/STRICTLYSTALKING to take your retail business to the next level. That's SHOPIFY.COM/STRICTLYSTALKINGProgressive InsurancePress play on comparing auto rates. Get your auto quote at Progressive.com to join the over 28 million drivers who trust Progressive.Clues with Morgan Absher & Kaelyn Moore!Just search for Clues wherever you get your podcasts. New episodes drop everyWednesday.OTHER LINKSlovelustfear + lovelustfridays | with Jake DeptulaApple Podcasts | https://podcasts.apple.com/us/podcast/lovelustfear/id1735876283?uo=4Spotify | https://open.spotify.com/show/0e3ndcf5u8lZ5lhN1lvWecAmazon Music | https://music.amazon.com/podcasts/b06d0ea8-cb29-4c3a-98e6-0249d84df748Instagram | https://www.instagram.com/lovelustfearpod/Submissions | https://lovelustfear.aidaform.com/lovelustfearThe Last Trip - Podcast - hosted by Jaimie BeebeListen & Subscribe to The Last Trip - https://audioboom.com/channels/5119581-the-last-tripFollow The Last Trip on Instagram - https://www.instagram.com/thelasttripcrimepod/And Subscribe for all the updates on Patreon - https://www.patreon.com/TheLastTripPodcastInstagram:@strictlystalkingpod@feathergirl77@jaked3000See Privacy Policy at https://art19.com/privacy and California Privacy Notice at https://art19.com/privacy#do-not-sell-my-info.

Strictly Stalking
279. Four Pounds of Pressure: The Survival of Danielle Leukam

Strictly Stalking

Play Episode Listen Later May 20, 2025 69:34


Danielle Leukam is a survivor of a horrifying home invasion. While she and her three-year-old son slept, a masked and armed intruder broke in during the night. For the next five hours, Danielle was zip-tied and brutally assaulted before the attacker finally fled. For months, his identity remained a mystery—until DNA from another assault, committed hours away, matched her rape kit. That's when Danielle discovered the unthinkable: her attacker was someone from her past who had been stalking her. He had never been to her home, never had her address—yet somehow, he found her. Today, Danielle bravely shares her story in her memoir, Four Pounds of Pressure: A Memoir of Rape, Survival, and Taking Back My Power.**The following episode of Strictly Stalking contains graphics depictions of physical violence, abduction, torture, and sexual assualt. Please listen with caution.**HAVE YOU EXPERIENCED STALKING? LET US KNOW:strictlystalkingpod@gmail.comPLEASE VISIT OUR SPONSORS!Delete MeToday get 20% off your DeleteMe plan when you go to JoinDeleteMe.com/STALKING and use promo code STALKING at checkout. QuinceGo to https://www.quince.com/strictly for free shipping on your order and 365-day returns. Progressive InsurancePress play on comparing auto rates. Get your auto quote at Progressive.com to join the over 28 million drivers who trust Progressive.Clues with Morgan Absher & Kaelyn Moore!Just search for Clues wherever you get your podcasts. New episodes drop everyWednesday.GUEST LINKSDanielle Leukumwww.danielleleukam.com https://www.instagram.com/danielleleukam/​​https://www.facebook.com/DanielleLouiseLeukam/OTHER LINKSlovelustfear + lovelustfridays | with Jake DeptulaApple Podcasts | https://podcasts.apple.com/us/podcast/lovelustfear/id1735876283?uo=4Spotify | https://open.spotify.com/show/0e3ndcf5u8lZ5lhN1lvWecAmazon Music | https://music.amazon.com/podcasts/b06d0ea8-cb29-4c3a-98e6-0249d84df748Instagram | https://www.instagram.com/lovelustfearpod/Submissions | https://lovelustfear.aidaform.com/lovelustfearThe Last Trip - Podcast - hosted by Jaimie BeebeListen & Subscribe to The Last Trip - https://audioboom.com/channels/5119581-the-last-tripFollow The Last Trip on Instagram - https://www.instagram.com/thelasttripcrimepod/And Subscribe for all the updates on Patreon - https://www.patreon.com/TheLastTripPodcastInstagram:@strictlystalkingpod@feathergirl77@jaked3000See Privacy Policy at https://art19.com/privacy and California Privacy Notice at https://art19.com/privacy#do-not-sell-my-info.

Strictly Stalking
278. Plea for Protection: Stalking Jennifer

Strictly Stalking

Play Episode Listen Later May 13, 2025 42:37


Since September 2020, Jennifer's life has been overshadowed by fear. She's been followed. Harassed. Watched. And no matter how many times she's called the police—or even rushed into a station, terrified and pleading—help has felt just out of reach. When she finally filed for a restraining order, she hoped the system would protect her. But instead, the judge said there wasn't enough evidence. That what her stalker was doing wasn't technically “illegal.” Now, feeling cornered and unheard, Jennifer is speaking out. To raise awareness. To reclaim her voice. And to find the support she's long been denied.HAVE YOU EXPERIENCED STALKING? LET US KNOW:strictlystalkingpod@gmail.comPLEASE VISIT OUR SPONSORS!ShopifySign up for a one-dollar-per-month trial period at shopify.com/strictlystalking to take your retail business to the next level. That's shopify.com/strictlystalkingZocDocGo to Zocdoc.com/STALKING to find and instantly book a top-rated doctor today. OTHER LINKSThe Last Trip - Podcast - hosted by Jaimie BeebeListen & Subscribe to The Last Trip - https://audioboom.com/channels/5119581-the-last-tripFollow The Last Trip on Instagram - https://www.instagram.com/thelasttripcrimepod/And Subscribe for all the updates on Patreon - https://www.patreon.com/TheLastTripPodcastlovelustfear + lovelustfridays | with Jake DeptulaApple Podcasts | https://podcasts.apple.com/us/podcast/lovelustfear/id1735876283?uo=4Spotify | https://open.spotify.com/show/0e3ndcf5u8lZ5lhN1lvWecAmazon Music | https://music.amazon.com/podcasts/b06d0ea8-cb29-4c3a-98e6-0249d84df748Instagram | https://www.instagram.com/lovelustfearpod/Submissions | https://lovelustfear.aidaform.com/lovelustfearInstagram:@strictlystalkingpod@feathergirl77@jaked3000See Privacy Policy at https://art19.com/privacy and California Privacy Notice at https://art19.com/privacy#do-not-sell-my-info.

Strictly Stalking
277. Stalked By Her Neighbors: Amie's Story

Strictly Stalking

Play Episode Listen Later May 6, 2025 48:53


After remarrying and moving into what she hoped would be a peaceful new home, Amie was ready for a fresh start with her six-year-old son. But the promise of a new beginning quickly turned into a nightmare. Her next-door neighbors—two brothers—soon began to exhibit unsettling behavior. What started as odd glances and lingering stares escalated into full-blown stalking. They followed her, loitered in her yard, stared through her windows, and at one terrifying point, trapped her in her own car. Amie shares how she survived the relentless harassment—and how she turned her experience into her new book, Human/Animal: A Bestiary in Essays.HAVE YOU EXPERIENCED STALKING? LET US KNOW:strictlystalkingpod@gmail.comPLEASE VISIT OUR SPONSORS!Delete MeToday get 20% off your DeleteMe plan when you go to JoinDeleteMe.com/STALKING and use promo code STALKING at checkout. GUEST LINKSAmie ReillyBluesky @amiesouzareilly.bsky.socialOTHER LINKSlovelustfear + lovelustfridays | with Jake DeptulaApple Podcasts | https://podcasts.apple.com/us/podcast/lovelustfear/id1735876283?uo=4Spotify | https://open.spotify.com/show/0e3ndcf5u8lZ5lhN1lvWecAmazon Music | https://music.amazon.com/podcasts/b06d0ea8-cb29-4c3a-98e6-0249d84df748Instagram | https://www.instagram.com/lovelustfearpod/Submissions | https://lovelustfear.aidaform.com/lovelustfearThe Last Trip - Podcast - hosted by Jaimie BeebeListen & Subscribe to The Last Trip - https://audioboom.com/channels/5119581-the-last-tripFollow The Last Trip on Instagram - https://www.instagram.com/thelasttripcrimepod/And Subscribe for all the updates on Patreon - https://www.patreon.com/TheLastTripPodcastInstagram:@strictlystalkingpod@feathergirl77@jaked3000See Privacy Policy at https://art19.com/privacy and California Privacy Notice at https://art19.com/privacy#do-not-sell-my-info.