POPULARITY
Secure Your Summer: Protect Your Family Online While Traveling Join host Andy Murphy on The Secure Family Podcast as he shares essential tips for keeping your information and devices safe on vacation. Learn about the growing threat of data collection, steps to ensure secure internet usage, keeping parental controls, and the benefits of using VPNs. Plus, discover the one thing that he brings with him that he'll never leave home without again. Protect your internet from prying eys with NordVPN. Get an exclusive savings from NordVPN. Get the travel router Andy recommends, the Slate AX from GLiNet. Take control of your data with DeleteMe. Because they sponsor the podcast you can get 20% off a privacy plan from DeleteMe with promo code: DAD. Download The Secure Dad Family Home Security Assessment today! Connect
LifeBlood: We talked about AI and online security, how to get started with AI and the consequences of not doing it, how quantum computing is changing everything, and how to position yourself for success in an ever-changing world, with Corey White, CEO of Cyvatar.AI, AI enthusiast and Cyber Security Expert, and speaker. Listen to learn what the table stakes are for protecting yourself and your business online! You can learn more about Corey at Cyvatar.AI, Facebook, X, YouTube, Instagram, and LinkedIn. Thanks, as always for listening! If you got some value and enjoyed the show, please leave us a review here: https://ratethispodcast.com/lifebloodpodcast You can learn more about us at LifeBlood.Live, Twitter, LinkedIn, Instagram, YouTube and Facebook or you'd like to be a guest on the show, contact us at contact@LifeBlood.Live. Stay up to date by getting our monthly updates. Want to say “Thanks!” You can buy us a cup of coffee. https://www.buymeacoffee.com/lifeblood Copyright LifeBlood 2025.
Scientists have made a huge leap in a highly technical practice known as coherent quantum communications. The WSJ's Aylin Woodward breaks down what that is and the effects it could have on everyday life. Plus, our Brussels-based reporter Kim Mackrael takes us through the trade implications of the European Union's fines on Apple and Meta Platforms. Katie Deighton hosts. We want to hear from you! Our recent series “Chatbot Confidential” looked into privacy risks when using generative AI chatbots like ChatGPT or Claude. Do you have a question about using these chatbots and your privacy? Record a voice memo and send it to tnb@wsj.com or leave us a voicemail at (212) 416-2236. Sign up for the WSJ's free Technology newsletter. Learn more about your ad choices. Visit megaphone.fm/adchoices
We explore the growing cyber risks threatening millions across the US. From vulnerabilities in critical industries to shocking security lapses, we reveal what these breaches mean for you. More importantly, we discuss the steps you can take to protect yourself if your personal information is ever exposed. Stay informed, stay secure—tune in now.Click here to send future episode recommendationSupport the showSubscribe now to Darnley's Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape.
Ever felt like you're playing a game of hide and seek—online and in life? This week on The Conscious Collaboration Podcast, Lisa and Emily dive into:
Norbert Gostischa's guide, "Guess the Hack - How to Create Unbreakable Passwords," provides a step-by-step approach to improving password security. The guide highlights common password mistakes, such as using simple patterns or dictionary words, and offers solutions like incorporating special characters and creating unique passphrases for each online account. It emphasizes the importance of password managers for generating and storing complex passwords. Finally, it stresses the need for regular password updates to maintain online safety. I used NotebookLM to create this podcast based on the information in my video - https://youtu.be/M0gO4EAiDQE
with Crime Time Inc.Welcome back to Crime Time Inc. In this episode, we delve deep into the essentials of online security with an expert who shares crucial tips and strategies to protect yourself in the digital world. The discussion begins with the importance of strong, unique passwords and how a password manager can simplify the task of maintaining them. We then explore two-factor authentication as an additional layer of security. The focus shifts to the significance of using separate email addresses for sensitive accounts, and even dedicating a specific device solely for financial transactions to reduce malware risks. Learn about the benefits of tap-to-pay and virtual credit cards in securing online payments and protecting your credit card information. The conversation further covers essential phone security measures, including stolen device protection and careful management of app permissions. We also demystify online tracking, explaining cookies, and how to manage them by blocking third-party cookies and clearing them regularly. Discover privacy-focused browsers like Brave and the benefits of using VPNs for data encryption and protection. The discussion rounds off with minimizing online exposure by being cautious about the information you share and the permissions you grant, as well as the importance of regular data backups. This episode is packed with practical advice aimed at building a strong, proactive security posture to keep you safe online.00:00 Introduction to Online Security00:35 The Importance of Strong Passwords01:22 Password Managers and Two-Factor Authentication02:47 Securing Your Email and Devices04:08 Safe Online Payments05:14 Phone Security Tips06:05 Understanding Cookies and Online Tracking09:05 Using Privacy-Focused Browsers10:12 The Role of VPNs in Online Security11:30 Minimizing Online Exposure15:01 The Importance of Backups17:53 Final Thoughts on Online Security Hosted on Acast. See acast.com/privacy for more information.
Protecting Your Privacy and Avoiding Scams this Holiday Season In this episode of The Secure Dad Podcast, Andy discusses various scams and online security issues that commonly arise during the holiday season. He offers strategies for protecting personal information, avoiding phishing scams, and ensuring secure online shopping. He's keen to highlight the importance of sharing these safety tips with older family members who may be more vulnerable to scams. Take control of your data with DeleteMe. Because they sponsor the podcast you can get 20% off a privacy plan from DeleteMe with promo code: DAD. Defend your home with FlipLok. Listeners get 20% off when using discount code SECUREDAD at checkout. Shop for the protector parent on your list with The Secure Dad Holiday Gift Guide for 2024! Check any suspicious links at URLVoid: https://www.urlvoid.com/ Connect
Security threats and nefarious tactics from hackers are on the rise, demanding more awareness and vigilance online. According to an IBM study of over 150 billion daily security events in more than 130 countries, there was a 71% year-over-year increase in cyberattacks that used stolen or compromised data. Helping learners understand what jobs are available for cybersecurity professionals is of paramount importance to combat the rise in cyberattacks. In this week's episode, we're sharing portions of our latest CERTIFIED Academy: IT webinar. We met with a team of cybersecurity experts from Microsoft: Brodie Cassell, Principal Cybersecurity Consultant; Rod Trent, Senior Program Manager Security/AI; Edward Walton, Microsoft Global Black Belt – Security; and Raae Wolfram, Senior Product Manager, Security. Our Microsoft experts share their insights and tips for breaking into this rapidly expanding field. We dive into their professional experiences, key lessons they've learned, and effective strategies for educators to inspire learners to pursue these in-demand career opportunities. You'll get valuable insights and practical advice on navigating the dynamic world of cybersecurity professionals. Learn more about teaching cybersecurity here: https://certiport.pearsonvue.com/Blog/2024/October/Secure-our-world-for-Cybersecurity-Awareness-Month. Connect with your fellow educators in our CERTIFIED Educator Community here: https://www.linkedin.com/groups/8958289/. Don't miss your chance to register for our annual CERTIFIED Educator's Conference here: https://certified.certiport.com/.
Whether it's your banking, your shopping, your calendar, or how many steps you took today, so much personal information depends on a device and the internet. Keeping up to date with rapidly evolving technology can be perplexing!You not only need to know how to use the device, but you also need to know how to keep your personal information secure. When the device needs to be replaced, what do you do with the old one? If you plan appropriately for incapacity, how can your family access your information on the device without knowing all your passwords? Even how you interact with technology is changing from typing to voice commands.In this episode, Barry Gordon from Senior Tech Tutor goes through challenges and solutions that people need to know when it comes to personal technology.
Happy Halloween everyone! In celebration of my absolute favorite holiday, we're airing a special bonus episode. I sat down with my friend, Jumer Adalin, to chat about a very spooky thing that happened to his business recently…Jumer is a social media marketing expert, who recently had his Instagram account hacked. Yikes!With 45,000 followers lost overnight, Jumer shares how he's bouncing back, rebuilding his presence, and shifting his focus to help a broader range of online entrepreneurs. We dive into the importance of security for your social accounts, the power of owning your email list, and the mindset needed to turn a catastrophe into a growth opportunity.MAKING GOOD SHOWNOTES:https://makinggoodpodcast.com/halloweenbonusCONNECT WITH ME ON INSTAGRAM:https://instagram.com/laurentildenGET 100 MARKETING PROMPTS (free!):https://makinggoodpodcast.com/100promptsYou're invited to 15-Minute Marketing: The Summit! Snag your free ticket: https://makinggoodpodcast.com/summit
Whether you're on iOS or Android, TUSK offers the ultimate search experience for conservatives with the ideal Google alternative! Find out more at: https://tuskbrowser.com/ TUSK City: Santa Barbara Address: 5383 Hollister Ave., Suite 120 Website: https://tuskbrowser.com/ Email: jeff@tuskbrowser.com
Welcome to the Social-Engineer Podcast: The SE Etc. Series. This series will be hosted by Chris Hadnagy, CEO of Social-Engineer LLC, and The Innocent Lives Foundation, as well as Social-Engineer.Org and The Institute for Social Engineering. Join Chris as he discusses topics and news pertaining to the world of Social Engineering. [Oct 28, 2024] 00:00 - Intro 00:24 - Intro Links - Social-Engineer.com - http://www.social-engineer.com/ - Managed Voice Phishing - https://www.social-engineer.com/services/vishing-service/ - Managed Email Phishing - https://www.social-engineer.com/services/se-phishing-service/ - Adversarial Simulations - https://www.social-engineer.com/services/social-engineering-penetration-test/ - Social-Engineer channel on SLACK - https://social-engineering-hq.slack.com/ssb - CLUTCH - http://www.pro-rock.com/ - innocentlivesfoundation.org - http://www.innocentlivesfoundation.org/ 03:25 - Gmail Takeover Scam 06:19 - Fidelity Data Breach 07:28 - Cisco Breach 08:45 - Actionable Tips 09:48 - Wrap Up & Outro - www.social-engineer.com - www.innocentlivesfoundation.org Find us online: - Chris Hadnagy - Twitter: @humanhacker - LinkedIn: linkedin.com/in/christopherhadnagy
In this episode of the Post Status Happiness Hour, Michelle Frechette talks with Nathan Ingram and Kathy Zant. They delve into the critical topic of online security, emphasizing the necessity of user education, particularly for WordPress users. Nathan from Solid WP and the Academy introduces Monster Secure, a new course designed to help agencies educate their clients on security best practices. Kathy, an online security expert, shares her experiences and stresses the importance of security education for overall business protection. The discussion highlights the challenges of online security, the evolving nature of cyber threats, and the need for proactive measures to safeguard digital assets.Top TakeawaysSecurity Awareness is Critical & Need for Vigilance: Effective security involves more than just technical measures; it requires continuous vigilance and education about potential threats. Kathy Zant and Nathan Ingram emphasize the importance of understanding and responding to security risks proactively.Education and Empowering Users: Both Kathy and Nathan stress the significance of educating users and clients about security. They argue that security knowledge should be accessible to everyone, not just experts.Security is for Everyone, Not Just Big Targets: Nathan explains that hackers don't only target large, high-profile websites; they also exploit smaller, less-secure sites for resources. This underscores that security is a concern for everyone, regardless of the size or perceived importance of their websiteMentioned In The Show:Thomas RaefWeWatchYourWebsiteSolid WPSolid AcademyMonster SecureGo Safely OnlineLearnDashJack KitterhingYouTube
Is your freedom of speech under threat? Discover how the UK's Online Security Act might impact your rights and amplify societal tensions in this thought-provoking episode of "Russ Scalzo Chronicles of the End Times." We delve into the media's role in stirring emotional responses and the critical function of the church and individual believers in navigating these turbulent times with wisdom and faith, guided by the teachings of Proverbs. As we wrap up, we analyze the UK's ongoing immigration challenges and the government's duty to safeguard its citizens.Exploring the complexities of online safety regulations, we discuss the fine line between security and suppression of dissenting voices. Uncover how societal divisions can be traced back to unresolved grievances, and why it's crucial for authorities to grasp the root causes of public dissatisfaction. Drawing parallels with historical totalitarian regimes, we underscore how easily a society can be misled by charismatic leaders. We also take a heartfelt moment to thank our supporters, whose contributions are vital for our ministry's mission. Join us for a rich discussion filled with biblical insights, spiritual reflections, and an earnest expression of gratitude.Support the Show.
In this Brand Story episode as part of the On Location Podcast series, Sean Martin speaks with Rupesh Chokshi, who leads the application security business at Akamai. Connecting directly from Black Hat in Las Vegas, the discussion provides an in-depth look into the world of application security, APIs, and the challenges organizations face in today's technology-driven environment.Rupesh Chokshi starts by highlighting Akamai's evolution from an innovative startup focused on improving internet experiences to a global leader in powering and protecting online activities. He emphasizes that Akamai handles trillions of transactions daily, underlining the massive scale and importance of their operations.The conversation shifts to the pivotal role of APIs in the digital economy. With every company now being an 'app company,' APIs have become the lifeline of digital interactions, from financial services to entertainment. Chokshi points out that many organizations struggle with cataloging and discovering their APIs, a critical step for ensuring security. Akamai assists in this by employing scanning capabilities and data flow analysis to help organizations understand and protect their API landscape.A significant part of the discussion focuses on the security challenges associated with APIs. Chokshi details how attackers exploit APIs for data breaches, financial fraud, and other malicious activities. He cites real-world examples to illustrate the impact and scale of these attacks. Chokshi also explains how attackers use APIs for carding attacks, turning businesses into unwitting accomplices in validating stolen credit cards.Chokshi emphasizes the importance of proactive measures like API testing, which Akamai offers to identify vulnerabilities before code deployment. This approach not only bolsters the security of APIs but also instills greater confidence in the enterprise ecosystem.The discussion also touches on the broader implications of API security for CISOs and their teams. Chokshi advises that the first step is often discovery and cataloging, followed by ongoing threat intelligence and posture management. Using insights from Akamai's extensive data, organizations can identify and mitigate threats more effectively.The episode concludes with Chokshi reinforcing the importance of data-driven insights and AI-driven threat detection in safeguarding the API ecosystem. He notes that Akamai's vast experience and visibility into internet traffic allow them to provide unparalleled support to their clients across various sectors.For anyone looking to understand the complexities of API security and how to address them effectively, this episode offers valuable insights from two leaders in the field. Akamai's comprehensive approach to application security, bolstered by real-world examples and expert analysis, provides a robust framework for organizations aiming to protect their digital assets.Learn more about Akamai: https://itspm.ag/akamaievkiNote: This story contains promotional content. Learn more.Guest: Rupesh Chokshi, SVP & General Manager, Application Security, Akamai [@Akamai]On LinkedIn | https://www.linkedin.com/in/rupeshchokshi/ResourcesLearn more and catch more stories from Akamai: https://www.itspmagazine.com/directory/akamaiView all of our Black Hat USA 2024 coverage: https://www.itspmagazine.com/black-hat-usa-2024-hacker-summer-camp-2024-event-coverage-in-las-vegasAre you interested in telling your story?https://www.itspmagazine.com/telling-your-story
In this Brand Story episode of On Location, hosts Sean Martin and Marco Ciappelli sit down with Chris Pierson, Founder and CEO of BlackCloak, a digital executive protection company. Throughout their conversation, they explore the intersection of personal privacy, digital security, and the unique challenges faced by high-profile individuals in protecting their digital lives. Chris Pierson discusses the importance of proactive measures in digital security, emphasizing the need for executives and public figures to safeguard their personal information just as rigorously as their corporate data.The dialogue covers various critical topics, including the rising threats of deep fakes and the implications for personal and professional security. Pierson explains how these convincing digital forgeries can be used maliciously and provides strategies to identify and combat them. Additionally, the conversation delves into common cyber threats like phishing and business email compromise, with Pierson detailing practical strategies for mitigating these risks.Pierson also highlights the evolving landscape of privacy threats and the role of education in empowering individuals to take control of their digital presence. He shares insights on balancing security with usability, pointing out the vulnerabilities that can be overlooked by even the most tech-savvy individuals. Reflecting on his experience building BlackCloak, Pierson discusses key lessons learned while developing solutions tailored to the needs of high-net-worth and high-profile clients.The episode underscores the criticality of a tailored approach to digital security, addressing both technical defenses and user behaviors. Listeners are encouraged to think about their own digital habits and consider how they can better protect their personal information in an increasingly interconnected world.Learn more about BlackCloak:https://itspm.ag/itspbcwebNote: This story contains promotional content. Learn more.Guest: Chris Pierson, Founder and CEO of BlackCloak [@BlackCloakCyber]On Linkedin | https://www.linkedin.com/in/drchristopherpierson/On Twitter | https://twitter.com/drchrispiersonResourcesLearn more and catch more stories from BlackCloak: https://www.itspmagazine.com/directory/blackcloakView all of our Black Hat USA 2024 coverage: https://www.itspmagazine.com/black-hat-usa-2024-hacker-summer-camp-2024-event-coverage-in-las-vegasAre you interested in telling your story?https://www.itspmagazine.com/telling-your-story
In this Brand Story episode of On Location, hosts Sean Martin and Marco Ciappelli sit down with Chris Pierson, Founder and CEO of BlackCloak, a digital executive protection company. Throughout their conversation, they explore the intersection of personal privacy, digital security, and the unique challenges faced by high-profile individuals in protecting their digital lives. Chris Pierson discusses the importance of proactive measures in digital security, emphasizing the need for executives and public figures to safeguard their personal information just as rigorously as their corporate data.The dialogue covers various critical topics, including the rising threats of deep fakes and the implications for personal and professional security. Pierson explains how these convincing digital forgeries can be used maliciously and provides strategies to identify and combat them. Additionally, the conversation delves into common cyber threats like phishing and business email compromise, with Pierson detailing practical strategies for mitigating these risks.Pierson also highlights the evolving landscape of privacy threats and the role of education in empowering individuals to take control of their digital presence. He shares insights on balancing security with usability, pointing out the vulnerabilities that can be overlooked by even the most tech-savvy individuals. Reflecting on his experience building BlackCloak, Pierson discusses key lessons learned while developing solutions tailored to the needs of high-net-worth and high-profile clients.The episode underscores the criticality of a tailored approach to digital security, addressing both technical defenses and user behaviors. Listeners are encouraged to think about their own digital habits and consider how they can better protect their personal information in an increasingly interconnected world.Learn more about BlackCloak:https://itspm.ag/itspbcwebNote: This story contains promotional content. Learn more.Guest: Chris Pierson, Founder and CEO of BlackCloak [@BlackCloakCyber]On Linkedin | https://www.linkedin.com/in/drchristopherpierson/On Twitter | https://twitter.com/drchrispiersonResourcesLearn more and catch more stories from BlackCloak: https://www.itspmagazine.com/directory/blackcloakView all of our Black Hat USA 2024 coverage: https://www.itspmagazine.com/black-hat-usa-2024-hacker-summer-camp-2024-event-coverage-in-las-vegasAre you interested in telling your story?https://www.itspmagazine.com/telling-your-story
In this Brand Story episode as part of the On Location Podcast series, Sean Martin speaks with Rupesh Chokshi, who leads the application security business at Akamai. Connecting directly from Black Hat in Las Vegas, the discussion provides an in-depth look into the world of application security, APIs, and the challenges organizations face in today's technology-driven environment.Rupesh Chokshi starts by highlighting Akamai's evolution from an innovative startup focused on improving internet experiences to a global leader in powering and protecting online activities. He emphasizes that Akamai handles trillions of transactions daily, underlining the massive scale and importance of their operations.The conversation shifts to the pivotal role of APIs in the digital economy. With every company now being an 'app company,' APIs have become the lifeline of digital interactions, from financial services to entertainment. Chokshi points out that many organizations struggle with cataloging and discovering their APIs, a critical step for ensuring security. Akamai assists in this by employing scanning capabilities and data flow analysis to help organizations understand and protect their API landscape.A significant part of the discussion focuses on the security challenges associated with APIs. Chokshi details how attackers exploit APIs for data breaches, financial fraud, and other malicious activities. He cites real-world examples to illustrate the impact and scale of these attacks. Chokshi also explains how attackers use APIs for carding attacks, turning businesses into unwitting accomplices in validating stolen credit cards.Chokshi emphasizes the importance of proactive measures like API testing, which Akamai offers to identify vulnerabilities before code deployment. This approach not only bolsters the security of APIs but also instills greater confidence in the enterprise ecosystem.The discussion also touches on the broader implications of API security for CISOs and their teams. Chokshi advises that the first step is often discovery and cataloging, followed by ongoing threat intelligence and posture management. Using insights from Akamai's extensive data, organizations can identify and mitigate threats more effectively.The episode concludes with Chokshi reinforcing the importance of data-driven insights and AI-driven threat detection in safeguarding the API ecosystem. He notes that Akamai's vast experience and visibility into internet traffic allow them to provide unparalleled support to their clients across various sectors.For anyone looking to understand the complexities of API security and how to address them effectively, this episode offers valuable insights from two leaders in the field. Akamai's comprehensive approach to application security, bolstered by real-world examples and expert analysis, provides a robust framework for organizations aiming to protect their digital assets.Learn more about Akamai: https://itspm.ag/akamaievkiNote: This story contains promotional content. Learn more.Guest: Rupesh Chokshi, SVP & General Manager, Application Security, Akamai [@Akamai]On LinkedIn | https://www.linkedin.com/in/rupeshchokshi/ResourcesLearn more and catch more stories from Akamai: https://www.itspmagazine.com/directory/akamaiView all of our Black Hat USA 2024 coverage: https://www.itspmagazine.com/black-hat-usa-2024-hacker-summer-camp-2024-event-coverage-in-las-vegasAre you interested in telling your story?https://www.itspmagazine.com/telling-your-story
The internet, and social media in particular, have introduced a whole new dimension to reenacting - helping us connect, research and share our passion for living history. However it has also brought with it risks that need to be taken seriously. In this episode Chris is joined by podcast regulars Rudi and Ludwig to talk about how to manage our online profiles in connection with the hobby and raise awareness of how doxing can be an ever present threat that may have potentially harmful real-life implications.... A big thank you to everyone who supports the podcast via Patreon - we appreciate every donation, no matter how big or small, and your regular contributions really do keep the show on the air. You can sign up for as little as $5 a month to unlock regular exclusive content! Thank you. https://patreon.com/reenactorpodcast
What if you could ditch your passwords and still have a secure and seamless online experience? That's the vision of the FIDO Alliance, a group of industry leaders who are developing standards and certifications for passwordless and phishing-resistant authentication solutions. In this podcast, our host, Ken Kadet, talks to Andrew Shikiar, the executive director and CEO of the FIDO Alliance, about how these solutions work, why they are needed, and what the future of authentication looks like.
With so much personal information online these days, NBC's Vicky Nguyen shares a lesson in enhancing online safety and security. Also, the story behind the brand L.L. Bean and its mission to help people embrace the outdoors. Plus, Sutton Foster and Michael Urie discuss teaming up in the Broadway show ‘Once Upon a Mattress,' a hilarious music take on the classic fairytale ‘The Princess and the Pea.'
Cybersecurity is something we all like and will never happen to us. Listen to Cybersecurity expert Caitriona Forde to discover vital strategies to safeguard your business from cyber threats in our enlightening discussion on cyber awareness training. Learn how to identify phishing scams, secure your emails, and create human firewalls within your organisation. Cait brings over 20 years of IT and cybersecurity experience, providing essential tips to protect your small to medium-sized business from the ever-evolving risks of the digital world. Don't miss this crucial episode 249 of Small Business Talk for Coaches to strengthen your defences against cyber attacks and ensure your business's online security. Full show notes at Small Business Talk For Coaches episode 249.Support the show: https://smallbusinesstalk.com.auSee omnystudio.com/listener for privacy information.
The hosts discuss a vulnerability in VPN apps that compromises their security. They debate whether the disclosure of the vulnerability should have been made public or shared with VPN providers individually. They also express concerns about the overall security of online activities and the increasing threats in the cybersecurity landscape. Please LISTEN
Guest: Adrien Ogee, Chief Operations Officer, CyberPeace Institute [@CyberpeaceInst]On LinkedIn | https://www.linkedin.com/in/adrien-ogee/____________________________Host: Christina Stokes, Host, On Cyber & AI Podcast, Founder of Narito CybersecurityOn ITSPmagazine | https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/christina-stokesOn LinkedIn | https://www.linkedin.com/in/xTinaStokes/____________________________Episode NotesA Glimpse into CyberPeace InstituteChristina welcomed Adrien, praising CyberPeace as an incredible organization with a vital mission. Adrien, an experienced cyber security professional, shared insights into his journey from working for governments to serving at the CyberPeace Institute. He emphasized the institute's focus on protecting the most vulnerable individuals globally and collaborating with governments to enhance cyber stability.Advocacy and Protective MeasuresAdrien elaborated on CyberPeace's advocacy efforts at international forums like the United Nations, highlighting the evidence-based approach to raise awareness among policymakers. With a network of 300 nonprofits, CyberPeace engages volunteers to assist vulnerable organizations in enhancing their cybersecurity posture. The institute's initiatives range from phishing simulations to incident response planning, aiming to protect those at risk in cyberspace.Addressing Nonprofit ChallengesIn response to Christina's inquiry about challenges faced by nonprofits, Adrien outlined three main threats—data breaches, financial attacks, and operational disruptions. He underscored the escalating ransomware trend and the dire consequences faced by organizations lacking robust defense mechanisms. CyberPeace's role in assisting nonprofits with cybersecurity measures underscores the institute's commitment to mitigating cyber risks for vulnerable communities.Global Impact and Future EndeavorsThe conversation moved into the global landscape of cybercrime, emphasizing the universal nature of threats while acknowledging regional nuances. Adrien highlighted the rise of ransomware as a pervasive concern and imparted insights on CyberPeace's collaborations with international partners to extend support to a broader array of nonprofits worldwide. The institute's focus on granular impact assessment aims to drive meaningful change at governmental and societal levels.Call to Action: Join the CyberPeace MovementAs the discussion concluded, Christina underscored the critical need for collective action in combating cyber threats. Adrien stressed the importance of engaging with CyberPeace and the broader cybersecurity community to contribute skills, resources, and time towards protecting vulnerable populations. The call to action resonated with the essence of CyberPeace's mission—unity in defending against digital harm and promoting a safer online environment for all.This conversation between Christina and Adrien at RSA 2024 highlight the role of organizations like CyberPeace Institute in fortifying cyber resilience and ensuring the safety of marginalized communities in the digital sphere.In a world where cyber threats loom large, CyberPeace Institute's unwavering commitment to safeguarding the most vulnerable individuals underscores the transformative power of collective action in fostering a secure and inclusive digital ecosystem. Join the movement, stand united with CyberPeace, and together, let's pave the way towards a safer cyberspace for all.Be sure to follow our Coverage Journey and subscribe to our podcasts!____________________________Follow our RSA Conference USA 2024 coverage: https://www.itspmagazine.com/rsa-conference-usa-2024-rsac-san-francisco-usa-cybersecurity-event-infosec-conference-coverageOn YouTube:
From random assaults on women in broad daylight to AI-generated scams online and over the phone, the threats to us physically and financially continue to evolve. Former NYPD Officer Dean Golemis, now the president of Global Security And Investigative Services, describes today's threats and offers advice on how to reduce your chance of being a victim.
Anthony Weaver and Derek "The Cyber Warrior" Scheller will discuss Shopping online safely is easier than you think! This episode dives into essential cybersecurity tips for beginners, including how to create strong passwords, spot phishing scams, and leverage the extra protection of 2FA (two-factor authentication). Learn these simple steps and shop with confidence! Plus, we'll explore how Artificial Intelligence (AI) is shaping the future of online security and information flow, and what you can do to stay ahead of the game! // Essential Cybersecurity Tips for Online Shopping // Creating Strong Passwords & Avoiding Phishing Scams // Understanding & Utilizing 2FA (Two-Factor Authentication) // How AI is Playing into Online Security & Information Spread // Mitigating Your Exposure in an AI-Powered World Derek Scheller is a retired military veteran with over 15 years of IT and cybersecurity experience. He's the owner and host of all content at Cyber Warrior Studios, including their popular live stream, Security Happy Hour. Check out Derek "The Cyber Warrior" Scheller Web: https://www.cyberwarriorstudios.com/ Youtube: https://www.youtube.com/cyberwarriorstudios X: https://twitter.com/CyberWarriorSt1 THANK YOU FOR LISTENING! #Security101 #AISecurity #2024Finances #financialAwareness #AboutThatWallet Get My Habit Journal: https://amzn.to/3U4r44 Join the About That Wallet Monthy Newsletter! https://aboutthatwallet.com/newsletter Continue to support the show by subscribing, sharing and leaving comments on your favorite platforms. This help others like yourself find me. Follow Me: IG: https://instagram.com/aboutthatwallet Twitter: https://twitter.com/aboutthatwallet Website: https://aboutthatwallet.com Email: Anthony@aboutthatwallet.com -- DISCLAIMER: I am not a CPA, attorney, insurance, contractor, lender, or financial advisor. The content in this audio are for educational purposes only. You must do your own research and make the best choice for you. Investing of any kind involves risk. While it is possible to minimize risk, your investments are solely your responsibility. It is imperative that you conduct your own research. I am merely sharing my opinion with no guarantee of gains or losses on investments. If you need advice, please contact a qualified CPA, CFP, an attorney, insurance agent, financial advisor, or the appropriate professional for the subject you would like help with. Episode 248 --- Send in a voice message: https://podcasters.spotify.com/pod/show/aboutthatwallet/message Support this podcast: https://podcasters.spotify.com/pod/show/aboutthatwallet/support
In this episode of The Secure Dad podcast, Andy Murphy delves into the complexities of social engineering, data collection, and online privacy with cybersecurity expert Tom Eston. They discuss ways individuals and families can protect themselves against digital threats. Tom shares insights from his 17-year experience in cybersecurity, emphasizing the significance of being cautious about the information shared online. They explore the evolving challenges posed by artificial intelligence and deepfakes in social engineering, urging listeners to stay vigilant and educated. The conversation also covers practical tips for safeguarding personal and family data online, underscoring the shared responsibility in defending against cyber threats. For more from Tom Eston visit: https://sharedsecurity.net/ Take control of your data with DeleteMe. Because they sponsor the podcast you can get 20% off a privacy plan from DeleteMe with promo code: DAD. See how Troomi Wireless is making smartphones safe for kids. Use code THESECUREDAD at checkout for $50 off a phone. Protect your home inside and out with Fortress Fast Track. Download this free guide from The Secure Dad and Dads for Defense and start protecting your home today. Connect
Guest: ✨ Jason Nurse, Reader in Cyber Security, University of Kent, UK [@UniKent]On LinkedIn | https://www.linkedin.com/in/jasonrcnurseOn Twitter | https://twitter.com/jasonnurse____________________________Host: Marco Ciappelli, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining Society PodcastOn ITSPmagazine | https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli_____________________________This Episode's SponsorsBlackCloak
This is a recap of the top 10 posts on Hacker News on April 5th, 2024.This podcast was generated by wondercraft.ai(00:38): M 4.8 – 2024 Whitehouse Station, New Jersey EarthquakeOriginal post: https://news.ycombinator.com/item?id=39942880&utm_source=wondercraft_ai(02:11): So you wanna de-bog yourselfOriginal post: https://news.ycombinator.com/item?id=39942288&utm_source=wondercraft_ai(04:00): Top Israeli spy chief exposes his true identity in online security lapseOriginal post: https://news.ycombinator.com/item?id=39942122&utm_source=wondercraft_ai(05:50): The Rise and Fall of Silicon GraphicsOriginal post: https://news.ycombinator.com/item?id=39944496&utm_source=wondercraft_ai(07:43): An IRC client in your motherboardOriginal post: https://news.ycombinator.com/item?id=39940975&utm_source=wondercraft_ai(09:37): Cloudflare acquires PartyKit to allow developers to build real-time multi-userOriginal post: https://news.ycombinator.com/item?id=39941859&utm_source=wondercraft_ai(10:30): Apple Updates App Store Guidelines to Permit Game Emulators, EU Music App LinksOriginal post: https://news.ycombinator.com/item?id=39946694&utm_source=wondercraft_ai(12:19): Fortran on WebAssemblyOriginal post: https://news.ycombinator.com/item?id=39944275&utm_source=wondercraft_ai(14:15): A Lego model of financial capitalismOriginal post: https://news.ycombinator.com/item?id=39940959&utm_source=wondercraft_ai(15:57): Big Tech's underground race to buy AI training dataOriginal post: https://news.ycombinator.com/item?id=39942104&utm_source=wondercraft_aiThis is a third-party project, independent from HN and YC. Text and audio generated using AI, by wondercraft.ai. Create your own studio quality podcast with text as the only input in seconds at app.wondercraft.ai. Issues or feedback? We'd love to hear from you: team@wondercraft.ai
Welcome to another edition of our Learning from Financial Fraud Series. In this segment, we discuss an anonymous payment server breach. Craig Jeffery shares his thoughts on the situation, attack, loss, and lessons learned. Learn more about how you can safeguard your company here: https://securetreasury.com/ More from this series: Learning from Financial Fraud Series Episode 7: Understanding “Pig Butchering” Learning from Financial Fraud Series Episode 6: Unpacking the Bernie Madoff Ponzi Scheme Learning from Financial Fraud Series Episode 5: Uncovering the Enron Accounting Scandal Learning from Financial Fraud Series Episode 4: Unmasking the FTX Fraud & Safeguarding Your Assets Learning from Financial Fraud Series Episode 3: Unraveling the Wirecard Fraud – Safeguarding Your Business Learning from Financial Fraud Series Episode 2: Understanding the Satyam Scandal and Its Consequences Learning from Financial Fraud Series Episode 1: Unveiling the Parmalat Fraud Scandal and Bankruptcy
Feeling like your data is up for grabs online? In this episode, Andy is joined by cybersecurity expert Caitlin Sarian to shed light on the ever-changing world of online privacy. They'll tackle your burning questions: What are some simple steps we can take to fortify our online defenses? Strong passwords are a must, but what else can we do to keep our information safe? Do data brokers pose a real threat? Caitlin will break down complex topics into actionable advice that you can implement today to protect yourself, your family, and your precious online data. Feeling a little overwhelmed? Don't worry! This episode is packed with practical tips and strategies to empower you to take control of your online security.
Welcome to Mastering Cyber with Host Alissa (Dr Jay) Abdullah, PhD, SVP & Deputy CSO at Mastercard, and former White House technology executive. Listen to this weekly one-minute podcast to help you maneuver cybersecurity industry tips, terms, and topics. Buckle up, your 60 seconds of cyber starts now! Sponsored by Mastercard: https://mastercard.us/en-us.html
Understanding the complexities around client-side security is more important than ever. As businesses and individuals, we are all 'people of the web', and protecting web transactions and user-data becomes our collective responsibility. On this episode of the Brand Story Podcast, hosts Sean Martin and Marco Ciappelli discuss these complexities with Lynn Marks, Senior Product Manager from Imperva.The conversation begins with a key question: What is client-side protection?Marks explains that modern engineering teams often place much of the applicational logic into the client-side, utilizing third-party JavaScript extensively. But as the prevalence of JavaScript increases, so does its vulnerability to being hijacked. A major concern is ‘form-jacking,' where bad actors compromise JavaScript to skim sensitive information one record at a time. Due to the slow, low, and under-the-radar nature of these attacks, they often go unnoticed, emphasizing the need for proactive detection and robust prevention methods.Marks highlights that many organizations are currently blind to these client-side attacks and require visibility into their online activity. This is where Imperva's Client-Side Protection product comes in. It enables organizations to start gaining visibility, insights, and the ability to either allow or block the execution of certain actions on their client-side applications. The goal is to streamline their compliance processes, manage the auditing stages effectively, and facilitate them to make data-driven, informed decisions.Marks also discusses the importance of adhering to PCI-DSS (Payment Card Industry Data Security Standard)—specifically version 4.0. As this standard applies to all organizations processing payment information, it plays a significant role in helping organizations build programs capable of combating these attacks. Imperva's Client-Side Protection product aligns with this framework, providing necessary visibility and insights while streamlining the auditing and compliance processes.For Imperva WAF customers, the Imperva client-side solution can be activated with just one click, removing any constraints and giving back control to the security teams. As organizations implement these security measures into their regular processes, they gain the ability to forecast and manage potential threats better.Maintaining client-side security is undoubtedly a complex task, especially with the ever-increasing and evolving use of JavaScript. However, with comprehensive visibility, robust solutions, and readily-available compliance with industry standards, organizations can efficiently manage these threats and ultimately protect the end-users. By fostering a proactive stance towards cybersecurity, we can maintain the integrity of our online experiences and embrace our roles as responsible people of the web.Top Questions AddressedWhat is client-side protection?How can an organization protect itself against client-side attacks?What is the role of Imperva's Client Side Protection product in combating client-side security threats? Note: This story contains promotional content. Learn more.Guest: Lynn Marks, Senior Product Manager at Imperva [@Imperva]On Linkedin | https://www.linkedin.com/in/lynnmarks1/Blog | https://thenewstack.io/author/lynn-marks/ResourcesLearn more about Imperva and their offering: https://itspm.ag/imperva277117988Guide: The Role of Client-Side Protection: https://itspm.ag/impervlttqCatch more stories from Imperva at https://www.itspmagazine.com/directory/impervaAre you interested in telling your story?https://www.itspmagazine.com/telling-your-story
Welcome to MOJO: The Meaning of Life and Business. In today's episode, our host, Jennifer Glass, invites guest expert Dylan Evans to demystify the world of online security and personal identity protection. Together, they debunk common misconceptions about internet safety, exploring the real risks individuals face and offering practical measures to mitigate them. From cyber attacks and ransomware to the evolution of the security industry, this episode sheds light on the complexities of online security and provides actionable advice for listeners. Join us as we delve into the topic of internet safety, empowering ourselves with valuable knowledge to safeguard our personal information in the digital era. About my guest: Dylan Evans authentically shares his stories, realizations, and current journeys in business and personal growth. Professionally, he demystifies security and shows business leaders the easy and effective ways to stop internet crime. Connect with Dylan on LinkedIn and on the web at https://simple-salt.com Keywords: online safety, Internet security, cyber attacks, ransomware, breaches, personal data, credit freeze, security industry, IT history, risk aversion, financial protection, credit card fraud, tax return fraud, Simple Salt, data protection, strong passwords, password managers, phishing emails, identity protection, website security, LinkedIn, stolen identities, phone security, state espionage, Eastern Europe crime, email providers, phishing attempts, vulnerability, security breaches, fail fast Key topics: 1. Misconceptions about Online Safety - Misperception of online safety - Risks individuals face - Ineffectiveness of commonly touted security measures - Cyber attacks, ransomware, and breaches affecting large organizations - How individuals are not directly impacted by large-scale incidents - Dismissal of the notion that personal data can enable significant crimes 2. Practical Advice for Personal Protection - Freezing credit as a mitigation strategy - Canceling debit cards and using credit cards for payments - Setting random PINs for added security - Using strong passwords and password managers - Identifying and avoiding phishing emails - Importance of using reputable email providers 3. Evolution of Security Industry and IT Culture - Historical blame in corporate America leading to a culture of defensibility - The influence of "The Phoenix Project" in transforming IT industries and security teams - Encouraging a culture less afraid of failure 4. Protecting Personal Identity - Significance of security and financial protection on the internet - Risks such as credit card fraud and tax return fraud - Criminal activities involving buying and selling stolen identities - Enhancements in secure phone systems to prevent state espionage - The supply chain of stealing and selling information 5. Cybersecurity Measures and Recommendations - Use of credit cards for payments and freezing credit - Protecting against phishing attempts with reputable email providers - Advantages of using password managers - Recognizing vulnerability and guarding against low moments 6. Contact Information and Company Spotlight - Simple Salt, a company aiming to demystify data protection - Assisting businesses in evaluating protective options against traditional tech solutions - Contact information for Simple Salt: simplesalt.com 7. Conclusion and Final Thoughts - Encouraging viewers to connect with Dylan through website and LinkedIn - Emphasizing the importance of using strong passwords and password managers
Guest: ✨ Jon von Tetzchner, Creator of Opera Bowser [@opera] and Vivaldi Browser [@vivaldibrowser]On LinkedIn | https://www.linkedin.com/in/jonv1/On Twitter | https://twitter.com/jonsvt____________________________Host: Marco Ciappelli, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining Society PodcastOn ITSPmagazine | https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli_____________________________This Episode's SponsorsBlackCloak
Love, Money, And Online Security… Only Friends Ep 456 W Matt Berkey Solve For Why by Solve For Why
In the fast-paced world of technology, your Windows device needs the ultimate defense against cyber threats. I've revamped the guide, diving deep into the realms of anti-virus protection, cybersecurity, and online privacy. Here's your roadmap to a digitally clean and secure future: Windows Defender vs. Norton vs. Malwarebytes: Uncover the strengths and limitations of each superhero in the battle against cyber villains. The War Against Malware: Arm yourself with knowledge on the latest malware trends and the tools to combat them effectively. Guarding Your Cyber Fortress: Explore the importance of cybersecurity and online privacy in an era where digital threats are omnipresent. Beyond the Basics: McAfee and Bloatware: Navigate the landscape of additional security options and understand the impact of unnecessary software on your system. Securing Your Digital Territory: Wi-Fi, Smart Home, and Routers: Extend your protection beyond your computer by fortifying your Wi-Fi, securing your smart home devices, and understanding router security. Bitcoin and Cybersecurity: Delve into the world of cryptocurrency and how to safeguard your digital assets in the age of Bitcoin. Cisco's Role in Digital Clean Up: Understand the significance of Cisco in ensuring the overall security and integrity of your digital ecosystem. Click through to embark on a journey towards digital cleanliness and fortify your defenses against cyber threats. Your computer's safety is our top priority, and together, we'll conquer the digital realm! Read the full guide HERE You can also catch Craig at the following stations and channels: With Jim Polito at 0836 on Tuesdays WTAG AM 580 - FM 94.9 Talk 1200 News Radio 920 & 104.7 FM WHJJ NewsRadio 560 WHYN WXTK Craigs Show Airs 0600 Saturday and Sunday With Jeff Katz 1630 - Tuesdays WRVA 96.1 FM, 1140 AM WGAN Matt Gagnon 0730 Wednesdays Craigs Show Airs 1700 Saturday WGIR 610 & News Radio 96.7 Chris Ryan 0730 Mondays Craigs Show Airs 1130 Saturday On the Internet: Tune-In (WGAN) Radio.com (WRVA) iHeartRadio (WGIR, WTAG, and other stations)
What should we be doing to maintain a healthy digital hygiene? In Episode #431 of 'Musings', Juan & I discuss: why this topic felt like work to Juan, how companies think about cyber security, the Stuxnet virus plus a Dutchman receiving American military emails, Butters the abused dog, our argument over what consists an 'attack', the coming era of more awareness of private data and why the social considerations are more important than the technical. Huge thanks to Amorphous Continuum for the boostagram. Your support means the world to us!Timeline:(0:00) - Intro(0:52) - Today's topic: getting our nerd on(3:08) - Risk vs Reward(9:06) - No actual harm is possible(13:38) - It's easier to just kill a dude(16:18) - Protecting against bad actors vs unwitting Kyrin's(22:19) - Boostagram Lounge(29:21) - Boost or the puppy gets it(30:20) - Protecting your data & identity(40:08) - Are AI Deepfakes an attack?(46:16) - Don't be an asshole online(52:02) - Geoguesser, Popsmoke & flashing cash(56:35) - Summary(1:05:50) - V4V: Create a clipValue 4 Value Support:Boostagram: https://www.meremortalspodcast.com/supportPaypal: https://www.paypal.com/paypalme/meremortalspodcastConnect with Mere Mortals:Website: https://www.meremortalspodcast.com/Discord: https://discord.gg/jjfq9eGReUTwitter/X: https://twitter.com/meremortalspodInstagram: https://www.instagram.com/meremortalspodcast/TikTok: https://www.tiktok.com/@meremortalspodcastSupport the show
In this episode, host Bidemi Ologunde spoke with first-time guest Heather Henry about a cyber incident involving a notification she received on her smartphone sometime last year.Support the show
Welcome to another exciting episode of the Label Free Podcast! I'm your host, Deanna Radulescu, and today I have an important announcement to share with you. We have recently partnered with SecureVPN.io, a leading provider of online security solutions.In today's digital age, protecting our online activity has become more crucial than ever. With cyber threats and data breaches on the rise, it's essential to take proactive measures to safeguard our personal information and maintain our privacy.SecureVPN.io specializes in providing top-notch protection for your online activities. Whether you're making transactions, conducting online searches, or simply browsing the web, their advanced security features ensure that your data remains secure and confidential.One of the key benefits of using SecureVPN.io is its ability to protect you from data leakage. Hackers are constantly on the lookout for vulnerabilities to exploit and gain access to your sensitive information. By encrypting your internet connection, SecureVPN.io creates a secure tunnel that prevents hackers from intercepting your data.But it doesn't stop there. SecureVPN.io also offers privacy protection, ensuring that your online activities remain anonymous. With their network of servers located worldwide, you can browse the internet without leaving a trace. This is particularly important if you value your privacy and want to keep your online presence hidden from prying eyes.By partnering with SecureVPN.io, we are offering you a special opportunity to enhance your online security. Simply click the link in below to take advantage of this exclusive offer. Don't miss out on the chance to protect your online activity and enjoy a worry-free browsing experience. https://apps.apple.com/app/apple-store/id1474675452?pt=119274537&ct=Label%20Free%20Podcast%20Host&mt=8Remember, living your best life means living label-free. And with SecureVPN.io, you can do just that. So join us in taking control of your online security and start enjoying the benefits of a protected and private internet experience.Thank you for tuning in to this episode of the Label Free Podcast. Stay tuned for more exciting content and interviews with inspiring individuals who are breaking free from labels and living life on their own terms.As always thank you for the support, to contact me directly follow the link below:https://www.labelfreepodcast.com Stay Healthy, Stay Ready- Deanna Marie Radulescu
Are you aware of the risks lurking in the digital world—especially during the holiday season? In this episode, we're joined by Leigh Tynan, Director of TELUS Online Security, to discuss the importance of cyber safety and how to protect your identity and finances online. Listen in as Leigh shares her insights on the increasing prevalence of online fraud and identity theft in Canada. We delve into the specific risks Canadians face during the holidays and the best practices for safe online shopping. Leigh also walks us through the three phases of dealing with online fraud and offers practical tips for safeguarding your digital presence. "Even if you do everything right, you can still be at risk." - Leigh Tynan This Week on Young Money: The heightened risks of online scams during the holiday season. Strategies for preventing, detecting, and recovering from online fraud. The current landscape of online fraud and identity theft. Best practices for protecting your identity and shopping safely online. The role of TELUS Online Security in safeguarding Canadians' digital lives. Key takeaways: Stay vigilant and informed about the risks of online fraud. Embrace cybersecurity best practices, including two-factor authentication and VPN usage. Regularly monitor your financial accounts and credit reports. Utilize resources like TELUS Online Security for comprehensive digital protection. Share your experiences and report incidents to help combat cybercrime. Resources Mentioned: Leigh Tynan: LinkedIn TELUS: LinkedIn TELUS Online Security Rate, Share & Inspire Other Young Millionaires-in-the-Making Thanks for tuning into the Young Money Podcast - the advice show for young millionaires-in-the-making! If you enjoyed this week's episode, head over to Apple Podcasts and leave us a rating and review. Visit our website to learn how easy it is to leave a review on Apple Podcasts. Don't forget to share your favorite episodes on social media! Follow the Young Money Podcast on iTunes so you never miss an episode and reach out to us on Facebook, Twitter, LinkedIn, our LinkedIn Company Page, or by visiting our website.
In this episode, host Bidemi Ologunde talked about how Meta is struggling to eradicate pedophiles from Facebook and Instagram. Support the show
Laura Bell Main is the co-founder and CEO of SafeStack, an online education platform offering flexible, high-quality, and people-focused secure development training for fast-moving companies, focusing on building application security skills, practices, and culture across the entire engineering team. With over 20 years of experience in software development and application security, Laura specializes in bringing Application Security and Secure Development practices into organizations worldwide. She also hosts the podcast Build Amazing Things Securely.
Immerse yourself in the rhythmic cadence of 'Thanksgiving Tribute: An Ode to the Cybersecurity Heroes,' a poignant and heartfelt poem that resonates with the unsung heroes of our digital age. This evocative piece weaves together the themes of gratitude, dedication, and quiet sacrifice inherent in the world of cybersecurity.From the tireless practitioners to the visionary CISOs, each verse pays homage to those who safeguard our digital frontiers, even on Thanksgiving Day. As the poem unfolds, it not only celebrates their unwavering commitment but also acknowledges those who spend this festive holiday in service of our cyber safety. Perfect for a reflective moment, this audio rendition brings to life the essence of thanksgiving in a world increasingly dependent on digital protection.Listen now and join in honoring the invisible warriors who make our online world safer.________This fictional story represents the results of an interactive collaboration between Human Cognition and Artificial Intelligence.Enjoy, think, share with others, and subscribe to "The Future of Cybersecurity" newsletter on LinkedIn.Sincerely, Sean Martin and TAPE3________Sean Martin is the host of the Redefining CyberSecurity Podcast, part of the ITSPmagazine Podcast Network—which he co-founded with his good friend Marco Ciappelli—where you may just find some of these topics being discussed. Visit Sean on his personal website.TAPE3 is the Artificial Intelligence for ITSPmagazine, created to function as a guide, writing assistant, researcher, and brainstorming partner to those who adventure at and beyond the Intersection Of Technology, Cybersecurity, And Society. Visit TAPE3 on ITSPmagazine.
Guest: Dr. Bruce Y Lee, Executive Director of PHICOR (Public Health Informatics, Computational, and Operations Research) [@PHICORteam]On LinkedIn | https://www.linkedin.com/in/bruce-y-lee-68a6834/On Twitter | https://twitter.com/bruce_y_leeWebsite | https://www.bruceylee.com/On Forbes | https://www.forbes.com/sites/brucelee/On Psychology Today | https://www.psychologytoday.com/us/contributors/bruce-y-lee-md-mba_____________________________Host: Marco Ciappelli, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining Society PodcastOn ITSPmagazine | https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli_____________________________This Episode's SponsorsBlackCloak
Guests: Rafael Brown, CEO/Founder at Symbol ZeroOn LinkedIn | https://www.linkedin.com/in/rafaelbrown/Carey D'Souza, CEO and Co-Founder at IAMPASS [@iampassHQ]On LinkedIn | https://www.linkedin.com/in/careydsouza/On Twitter | https://twitter.com/carey_dsouzaSean Martin, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining CyberSecurity Podcast [@RedefiningCyber]On ITSPmagazine | https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/sean-martin_____________________________Host: Marco Ciappelli, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining Society Podcast and Audio Signals PodcastOn ITSPmagazine | https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli_____________________________This Episode's SponsorsBlackCloak
Leo got the new 15" MacBook Air and gives his first impressions of the device. Steve Huffman and the Reddit revolt. What must I do to protect my personal data after a data breach? What's the easiest way to start a podcast? How can I make sense of the Apple error messages? Rod Pyle and NASA's UFO/UAP Report. Why does Leo dislike using the hibernate or sleep functionality on Windows? As a first-time cellphone owner, what should I do next with my iPhone? Chris Marquardt and the Dull assignment review. What exactly is artificial intelligence? Hosts: Leo Laporte and Mikah Sargent Guests: Rod Pyle and Chris Marquardt Get episodes ad-free with Club TWiT at https://twit.tv/clubtwit Show notes and links for this episode are available at: https://twit.tv/shows/ask-the-tech-guys/episodes/1979 Download or subscribe to this show at: https://twit.tv/shows/ask-the-tech-guys Sponsors: fastmail.com/twit drata.com/twit lectricebikes.com Brooklinen.com Use Code TECHGUY
The Smart Passive Income Online Business and Blogging Podcast
#658 This is not good. Not good at all. I was at the dentist's when my phone started blowing up with messages from my team and audience that Deep Pocket Monster had been hacked. If you're following my updates, you know that my Pokémon YouTube channel has grown to 480K subscribers. But building a large audience online doesn't just attract sponsors and new opportunities. Of course, you also become a target for bad actors looking to make a buck. That's why protecting yourself, your team, and your followers is vital! There's been a spike in attacks of late, so listen in on this episode to learn about how this happened and the tools I used to stop the hackers. I was actually able to get my channel back in about two hours, so join me for today's session to find out how to take action if this ever happens to you! Show notes and more at SmartPassiveIncome.com/session658.See Privacy Policy at https://art19.com/privacy and California Privacy Notice at https://art19.com/privacy#do-not-sell-my-info.