Used for user authentication to prove identity or access approval
POPULARITY
Categories
LIMITED TICKETS HAVE BEEN ADDED TO OUR TORONTO LIVE SHOW redditonwikilive.eventbrite.com Become a Patron or YouTube Member for ad-free episodes and bonus stories every Monday and Friday as well as exclusive content: Cultiv8 Patreon or YouTube Membership Head to https://factormeals.com/factorpodcast and use code WIKI50OFF to get 50% off! If you need support dealing with OCD, head on over to NOCD's website at https://www.treatmyocd.com/ to book a free call with their team. Therapy with NOCD is 100% virtual and covered by insurance for over 155 million Americans, and includes support between sessions, so you're never facing OCD alone. Send us fan mail! Sean Salvino 2700 Cullen Blvd PO Box 84348 Pearland, TX 77584-0802 Want to be part of the show? Leave us a voicemail: https://www.speakpipe.com/Redditonwiki Stories will be played for our $15 Tier Patrons https://www.patreon.com/c/cultiv8podcastnetwork Bonus stories + episodes + ad-free + extra live streams + cameo requests and so many more. (Timestamps are approximate due to dynamic ad insertion. Become a Patron or YouTube member for ad-free episodes) On today's AITA episode, we have:(00:00) - Intro(05:04) - AITA for not seeing a friend while she was in town? (17:43) - AITA for changing the WiFi password and not telling my roommate? (30:27) - AITA for relying too much on a coworker? (38:58) - AITA for cooking my boyfriend's ravioli? (49:46) - AITA For telling a friend that when someone is as qualified as I am, they can charge the same as I do? (1:01:31) - Outro Hit like, subscribe, and follow us on all social media platforms for all things Reddit on Wiki! Click here for our Social and Donation Links: https://linktr.ee/redditonwiki Learn more about your ad choices. Visit megaphone.fm/adchoices
See omnystudio.com/listener for privacy information.
See omnystudio.com/listener for privacy information.
Kris Jenner's plastic surgeon asked Kris to help him get less business, and one celebrity claims to have been run off the road by a city employee. Learn more about your ad choices. Visit megaphone.fm/adchoices
How is the transition to passkeys going in 2025?
Got questions? Send Ericka a Text!A candid look at why AR rises even when production is strong and how access, clarity, and team alignment restore cash flow. We share the biggest blockers we see inside practices—password chaos, clearinghouse issues, unread billing emails—and the simple systems that fix them.• password and portal access as revenue gatekeeper• EFT lockouts creating delays and aged AR• Dentrix–Vine fallout and claim tracing discipline• daily email reviews and statement ownership• patient AR rising from unclear benefits and silence• stronger benefit scripts to prevent “surprise” balances• third-party alignment as team extension, not threat• kickoff meetings for roles, tools, and expectations• billers as end-of-cycle auditors spotting root causes• repeatable rhythms for faster posting and fewer denialsIf any of this resonated with you friends, feel free to leave a review, feel free to leave a comment, share this episode with someone who you feel would relate. And if you're interested in a billing consultation and seeing how fortune billing solutions can help you, go to the show notes. There's a link down below, and you can set up a time to meet with me. Schedule a demo with MaxAssist to unlock scheduleing potential here: https://maxassist.com/book-a-demo-fortune-billing/ Join The Biller Acceleration Mentorship Wait List Here: (Only 5 Spots Left in 2025!!)https://linktr.ee/dental_billing_coachWould you like to set-up a billing consultation with Ericka? She would love the opportunity to discuss your billing questions and see how Fortune Billing Solutions may help you. Email Ericka:ericka@dentalbillingdoneright.comSchedule a call with Ericka: https://calendly.com/ericka-dentalbillingdoneright/30min Perio performance formula: (D4341+D4342+D4346+D4355+D4910)/(D4341+D4342+D4346+D4355+D4910+D1110) Delta Dental Locum Tenens Form: https://www1.deltadentalins.com/content/dam/ddins/en/pdf/dentists/locum-tenens-form.pdf
Social media strategist Scott Kleinberg joins Bob Sirott to explain what passkeys are, how they are different from passwords, and how you can set up passkey for different websites and apps. He also talks about different models of iPhones, reporting spam texts, and updating your tablet.
Si, tus bitcoin pueden ser confiscados incluso si los adquiriste por la vía legal. Esto por la ambigüedad con la que las casas de cambio centralizadas determinan lo sospechosa que puede ser una dirección de bitcoin.Clases nuevas de la semana en: https://cursosbitcoin.comIntroducción pagos silenciososCómo funcionan los pagos silenciosos en bitcoin
See omnystudio.com/listener for privacy information.
Everyone Is Protecting My Password, But Who Is Protecting My Toilet Paper? - Interview with Amberley Brady | AISA CyberCon Melbourne 2025 Coverage | On Location with Sean Martin and Marco CiappelliAISA CyberCon Melbourne | October 15-17, 2025Empty shelves trigger something primal in us now. We've lived through the panic, the uncertainty, the realization that our food supply isn't as secure as we thought. Amberley Brady hasn't forgotten that feeling, and she's turned it into action.Speaking with her from Florence to Sydney ahead of AISA CyberCon in Melbourne, I discovered someone who came to cybersecurity through an unexpected path—studying law, working in policy, but driven by a singular passion for food security. When COVID-19 hit Australia in 2019 and grocery store shelves emptied, Amberley couldn't shake the question: what happens if this keeps happening?Her answer was to build realfoodprice.com.au, a platform tracking food pricing transparency across Australia's supply chain. It's based on the Hungarian model, which within three months saved consumers 50 million euros simply by making prices visible from farmer to wholesaler to consumer. The markup disappeared almost overnight when transparency arrived."Once you demonstrate transparency along the supply chain, you see where the markup is," Amberley explained. She gave me an example that hit home: watermelon farmers were getting paid 40 cents per kilo while their production costs ran between $1.00 to $1.50. Meanwhile, consumers paid $2.50 to $2.99 year-round. Someone in the middle was profiting while farmers lost money on every harvest.But this isn't just about fair pricing—it's about critical infrastructure that nobody's protecting. Australia produces food for 70 million people, far more than its own population needs. That food moves through systems, across borders, through supply chains that depend entirely on technology most farmers never think about in cybersecurity terms.The new autonomous tractors collecting soil data? That information goes somewhere. The sensors monitoring crop conditions? Those connect to systems someone else controls. China recognized this vulnerability years ago—with 20% of the world's population but only 7% of arable land, they understood that food security is national security.At CyberCon, Amberley is presenting two sessions that challenge the cybersecurity community to expand their thinking. "Don't Outsource Your Thinking" tackles what she calls "complacency creep"—our growing trust in AI that makes us stop questioning, stop analyzing with our gut instinct. She argues for an Essential Nine in Australia's cybersecurity framework, adding the human firewall to the technical Essential Eight.Her second talk, cheekily titled "Everyone is Protecting My Password, But No One's Protecting My Toilet Paper," addresses food security directly. It's provocative, but that's the point. We saw what happened in Japan recently with the rice crisis—the same panic buying, the same distrust, the same empty shelves that COVID taught us to fear."We will run to the store," Amberley said. "That's going to be human behavior because we've lived through that time." And here's the cybersecurity angle: those panics can be manufactured. A fake image of empty shelves, an AI-generated video, strategic disinformation—all it takes is triggering that collective memory.Amberley describes herself as an early disruptor in the agritech cybersecurity space, and she's right. Most cybersecurity professionals think about hospitals, utilities, financial systems. They don't think about the autonomous vehicles in fields, the sensor networks in soil, the supply chain software moving food across continents.But she's starting the conversation, and CyberCon's audience—increasingly diverse, including people from HR, risk management, and policy—is ready for it. Because at the end of the day, everyone has to eat. And if we don't start thinking about the cyber vulnerabilities in how we grow, move, and price food, we're leaving our most basic need unprotected.AISA CyberCon Melbourne runs October 15-17, 2025 Virtual coverage provided by ITSPmagazineGUEST:Amberley Brady, Food Security & Cybersecurity Advocate, Founder of realfoodprice.com.au | On LinkedIn: https://www.linkedin.com/in/amberley-b-a62022353/HOSTS:Sean Martin, Co-Founder, ITSPmagazine and Studio C60 | Website: https://www.seanmartin.comMarco Ciappelli, Co-Founder, ITSPmagazine and Studio C60 | Website: https://www.marcociappelli.comCatch all of our event coverage: https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverageWant to share an Event Briefing as part of our event coverage? Learn More
Common & Maxx vs Lil' B & Julia Daniels
Common & Maxx vs Lil' B & Julia DanielsSee omnystudio.com/listener for privacy information.
Common & Maxx vs Lil' B & Julia DanielsSee omnystudio.com/listener for privacy information.
Hairless Heydrich gives the game away. MAGAT senators approve murder on the High Seas. The Password is: "yardarm". All that and more in three hours of live, uncensored, fearless broadcasting that has ever been here, but seldom elsewhere.
I had ChatGPT write this.We're so close to closing on our house!
During his keynote at SecTor 2025, HD Moore, founder and CEO of runZero and widely recognized for creating Metasploit, invites the cybersecurity community to rethink the foundational “rules” we continue to follow—often without question. In conversation with Sean Martin and Marco Ciappelli for ITSPmagazine's on-location event coverage, Moore breaks down where our security doctrines came from, why some became obsolete, and which ones still hold water.One standout example? The rule to “change your passwords every 30 days.” Moore explains how this outdated guidance—rooted in assumptions from the early 2000s when password sharing was rampant—led to predictable patterns and frustrated users. Today, the advice has flipped: focus on strong, unique passwords per service, stored securely via password managers.But this keynote isn't just about passwords. Moore uses this lens to explore how many security “truths” were formed in response to technical limitations or outdated behaviors—things like shared network trust, brittle segmentation, and fragile authentication models. As technology matures, so too should the rules. Enter passkeys, hardware tokens, and enclave-based authentication. These aren't just new tools—they're a fundamental shift in where and how we anchor trust.Moore also calls out an uncomfortable truth: the very products we rely on to protect our systems—firewalls, endpoint managers, and security appliances—are now among the top vectors for breach, per Mandiant's latest report. That revelation struck a chord with conference attendees, who appreciated Moore's willingness to speak plainly about systemic security debt.He also discusses the inescapable vulnerabilities in AI agent flows, likening prompt injection attacks to the early days of cross-site scripting. The tech itself invites risk, he warns, and we'll need new frameworks—not just tweaks to old ones—to manage what comes next.This conversation is a must-listen for anyone questioning whether our security playbooks are still fit for purpose—or simply carried forward by habit.___________GUEST:HD Moore, Founder and CEO of RunZero | On Linkedin: https://www.linkedin.com/in/hdmoore/HOSTS:Sean Martin, Co-Founder, ITSPmagazine and Studio C60 | Website: https://www.seanmartin.comMarco Ciappelli, Co-Founder, ITSPmagazine and Studio C60 | Website: https://www.marcociappelli.comRESOURCES:Keynote: The Once and Future Rules of Cybersecurity: https://www.blackhat.com/sector/2025/briefings/schedule/#keynote-the-once-and-future-rules-of-cybersecurity-49596Learn more and catch more stories from our SecTor 2025 coverage: https://www.itspmagazine.com/cybersecurity-technology-society-events/sector-cybersecurity-conference-toronto-2025Mandiant M-Trends Breach Report: https://cloud.google.com/blog/topics/threat-intelligence/m-trends-2025/OPM Data Breach Summary: https://oversight.house.gov/report/opm-data-breach-government-jeopardized-national-security-generation/Catch all of our event coverage: https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverageWant to share an Event Briefing as part of our event coverage? Learn More
Most of us want to “move on” or “let go,” but we skip the one phase that makes surrender possible. In this episode, I sit down with transformational teacher and bestselling author Kute Blackson to break down what surrender really means and why it's the opposite of weakness. We talk about how to let go without giving up, recognize the ego's survival patterns that keep you in control mode, and the step-by-step “anatomy of surrender” process. Tune in and discover the practices that will help you release control, grieve what's past, and open yourself to bigger opportunities and a life that feels more aligned and alive. In This Episode, You Will Learn Why SURRENDER is not weakness but the PASSWORD to FREEDOM. Why GRIEVING is the missing step before surrender can happen. How CONTROL is the ego's master addiction and keeps you stuck. How to tell yourself the TRUTH and stop negotiating your life away. Why PAIN is feedback that you're out of alignment. Ways to ALIGN with your soul's deeper vision and act from authenticity. Why LETTING GO of what's not for you creates space for greater blessings. Resources + Links Learn more about kuteblackson.com Read You Are The One & Magic of Surrender FREE Reinvent Online Seminar Attend The Boundless Bliss event Listen to Soul Talk Sign up for a one-dollar-per-month trial period at shopify.com/monahan Download the CFO's Guide to AI and Machine Learning at NetSuite.com/MONAHAN. Want to do more and spend less like Uber, 8x8, and Databricks Mosaic? Take a free test drive of OCI at oracle.com/MONAHAN. Get 10% off your first Mitopure order at timeline.com/CONFIDENCE. Get 15% off your first order when you use code CONFIDENCE15 at checkout at jennikayne.com. Call my digital clone at 201-897-2553! Visit heathermonahan.com Sign up for my mailing list: heathermonahan.com/mailing-list/ Overcome Your Villains is Available NOW! Order here: https://overcomeyourvillains.com If you haven't yet, get my first book Confidence Creator Follow Heather on Instagram & LinkedIn Kute on Facebook X & Instagram Kute on Youtube & LinkedIn
It's Hump Day on the Majority Report On Today's Show: Trump posts to Truth Social that Illinois Governor JB Pritzker and Chicago Mayor Brandon Johnson should be imprisoned for hindering ICE agents. Speaker of the House Mike Johnson (R-LA) co-signs Donald Trump's calling for Pritzker's and Johnson's imprisonment CBS Chicago reports that ICE has been making false 911 call and filing phony police reports in an attempt to agitate local authorities. The IDF has seized nine more boats attempting to break the Israeli blockade on aid for Palestinians. Greta Thunberg posts a video on social media pleading for people to stay focused on the genocide and Palestinians and to not make the flotilla members the center of the narrative. Editor of Bolts Magazine, Daniel Nichanian joins the program to discuss his Cheat Sheet for the 2025 General Elections. In the Fun Half: We revisit a talk that new head of CBS news Bari Weiss gave to the Federalist Society in 2023 where she exhibits her only talent, flattering conservatives. After receiving a $20 billion bailout, Argentina's president Javier Milei throws an arena rock show, even singing himself Pam Bondi is once again humiliated, this time by Senator Dick Durbin as he presses her on Epstein. Stephen Crowder doesn't understand why his fellow podcasters are turning on Trump. Dave Rubin goes on a misogynist rant about Greta Thunberg. All that and more The Congress switchboard number is (202) 224-3121. You can use this number to connect with either the U.S. Senate or the House of Representatives. Follow us on TikTok here: https://www.tiktok.com/@majorityreportfm Check us out on Twitch here: https://www.twitch.tv/themajorityreport Find our Rumble stream here: https://rumble.com/user/majorityreport Check out our alt YouTube channel here: https://www.youtube.com/majorityreportlive Gift a Majority Report subscription here: https://fans.fm/majority/gift Subscribe to the AMQuickie newsletter here: https://am-quickie.ghost.io/ Join the Majority Report Discord! https://majoritydiscord.com/ Get all your MR merch at our store: https://shop.majorityreportradio.com/ Get the free Majority Report App!: https://majority.fm/app Go to https://JustCoffee.coop and use coupon code majority to get 10% off your purchase Check out today's sponsors: DELETEME: Get 20% off your DeleteMe plan when you go to www.joindeleteme.com/MAJORITY and use promo code MAJORITY at checkout. WILD GRAIN: Get $30 off your first box + free Croissants in every box. Go to Wildgrain.com/MAJORITY to start your subscription. NAKED WINES: To get 6 bottles of wine for $39.99, head to NakedWines.com/MAJORITY and use code MAJORITY for both the code and PASSWORD. SUNSET LAKE: Head to SunsetLakeCBD.com and use the code JustTreats25 to save 30% on all their gummies for sleep, focus, and relaxation Follow the Majority Report crew on Twitter: @SamSeder @EmmaVigeland @MattLech Check out Matt's show, Left Reckoning, on YouTube, and subscribe on Patreon! https://www.patreon.com/leftreckoning Check out Matt Binder's YouTube channel: https://www.youtube.com/mattbinder Subscribe to Brandon's show The Discourse on Patreon! https://www.patreon.com/ExpandTheDiscourse Check out Ava Raiza's music here! https://avaraiza.bandcamp.co
Midweek Check-in!
Ya puedes hacer transacciones con bitcoin con privacidad desde sparrow wallet así como usar nombres de dominio en lugar de direcciones.Clases nuevas de la semana en: https://cursosbitcoin.comConclusión MiniboltQue son los pagos silenciosos y cómo funcionan
Video version of this episode is here TakeawaysJosh Horwitz is a serial entrepreneur with a focus on cybersecurity.Bootstrapping businesses can lead to successful exits without external funding.Product-market fit is crucial for entrepreneurial success.Validating product ideas through low-cost market testing is essential.Credential stuffing is a significant threat in cybersecurity.Innovative solutions can turn attack vectors into defensive strategies.The future of authentication is moving towards passwordless solutions.User experience must be balanced with security measures.Adaptive security is becoming increasingly important in technology.Understanding customer needs is vital for product development. Chapters00:00 Introduction to Entrepreneurship and Background02:42 Bootstrapping and Product-Market Fit09:29 Cybersecurity Landscape and Credential Stuffing14:57 The Future of Passwords and Authentication22:49 Balancing Business Needs with User Experience
win tickets to see ADAM SANDLER!See omnystudio.com/listener for privacy information.
The Lone Transmitter and Max the Millions delve deep into the wilds of the Radlands for more salvage and find a surprise waiting for them. This episode is sponsored by Flintlock and Fog- The table top role playing experience where your favorite victorian age heroes (and villains) come to life! Ad-free episodes, bonus episodes, BTS, and more can be found by supporting us on Patreon! Follow us on Instagram Follow us on TikTok Join us on Discord! Featured Music: Vocal Few Additional music: Space Crush and eleventyseven The Lone Transmitter: J. S. Pitcher Max the Millions: Leo Joylock Wasteland Free Radio is sponsored by Flintlock and Fog - A TTRPG set in the late 1800s! The game is foot! Wasteland Free Radio Soundtrack Wasteland Free Radio most likely contains strong language and definitely contains adult themes, we're sorry about that, but the creators of this show were incrediblly repressed when they were younger and that is simply how they cope, deal with it.
SLEERICKETS is a podcast about poetry and other intractable problems. My book Midlife now exists. Buy it here, or leave it a rating here or hereFor more SLEERICKETS, subscribe to SECRET SHOW, join the group chat, and send me a poem for Listener Crit!Leave the show a rating here (actually, just do it on your phone, it's easier). Thanks!Wear SLEERICKETS t-shirts and hoodies. They look good!SLEERICKETS is now on YouTube!For a frank, anonymous critique on SLEERICKETS, subscribe to the SECRET SHOW and send a poem of no more 25 lines to sleerickets [at] gmail [dot] com Some of the topics mentioned in this episode:MeanjinWho Killed Meanjin? by Nick FeikOverlandCorditeThe Idea of a Literary Review by T. S. EliotLast Words by T. S. EliotLiterary MattersHEATClem ChristensenSpillwayThe Poetry Foundation's various podcastsChapo Trap HouseDavid CrossHail Satan? (2019)The Antichrist: A Four-Part Lecture Series by Peter ThielEp 208: Password to the Ghost WorldOn Heteropessimism by Asa SeresinFrequently mentioned names:– Joshua Mehigan– Shane McCrae– A. E. Stallings– Ryan Wilson– Morri Creech– Austin Allen– Jonathan Farmer– Zara Raab– Amit Majmudar– Ethan McGuire– Coleman Glenn– Chris Childers– Alexis Sears– JP Gritton– Alex Pepple– Ernie Hilbert– Joanna Pearson– Matt Wall– Steve Knepper – Helena FederOther Ratbag Poetry Pods:Poetry Says by Alice AllanI Hate Matt Wall by Matt WallVersecraft by Elijah BlumovRatbag Poetics By David Jalal MotamedAlice: In Future PostsBrian: @BPlatzerCameron: Minor TiresiasMatthew: sleerickets [at] gmail [dot] comMusic by ETRNLArt by Daniel Alexander Smith
Tennafitzgerald HOUR 2 --Lil B--Nordo and Jonny Athletic --Password
Tennafitzgerald HOUR 3 --Password--AYSTAPF --Russo
Tennafitzgerald HOUR 2 --Lil B--Nordo and Jonny Athletic --PasswordSee omnystudio.com/listener for privacy information.
Tennafitzgerald HOUR 3 --Password--AYSTAPF --RussoSee omnystudio.com/listener for privacy information.
Advocates for US military intervention have invoked the war against the Barbary pirates as justification. Yet, an examination of that conflict shows that President Jefferson's actions were limited and followed the direction of Congress.Original article: https://mises.org/mises-wire/jeffersons-war-barbary-pirates-unjustified-password-military-intervention
Tennafitzgerald HOUR 2 --Lil B--Nordo and Jonny Athletic --PasswordSee omnystudio.com/listener for privacy information.
Tennafitzgerald HOUR 3 --Password--AYSTAPF --RussoSee omnystudio.com/listener for privacy information.
Advocates for US military intervention have invoked the war against the Barbary pirates as justification. Yet, an examination of that conflict shows that President Jefferson's actions were limited and followed the direction of Congress.Original article: https://mises.org/mises-wire/jeffersons-war-barbary-pirates-unjustified-password-military-intervention
Welcome solo and group practice owners! We are Liath Dalton and Evan Dumas, your co-hosts of Group Practice Tech. In our latest episode, we explain what therapists should know about using passkeys in their practice. We discuss: Why we recommend password managers How passkeys differ from passwords Why passkeys are simpler and safer than passwords Which password manager we recommend Where you can use passkeys Things to consider when adopting passkeys Listen here: https://personcenteredtech.com/group/podcast/ For more, visit our website. Resources Article: How Passkeys Work—and How to Use Them PCT Resources Group Practice Care Premium weekly (live & recorded) direct support & consultation service, Group Practice Office Hours -- including monthly session with therapist attorney Eric Ström, JD PhD LMHC + assignable staff HIPAA Security Awareness: Bring Your Own Device training + access to Device Security Center with step-by-step device-specific tutorials & registration forms for securing and documenting all personally owned & practice-provided devices (for *all* team members at no per-person cost) + assignable staff HIPAA Security Awareness: Remote Workspaces training for all team members + access to Remote Workspace Center with step-by-step tutorials & registration forms for securing and documenting Remote Workspaces (for *all* team members at no per-person cost) + more
SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast
Comparing Honeypot Passwords with HIBP Most passwords used against our honeypots are also found in the Have I been pwn3d list. However, the few percent that are not found tend to be variations of known passwords, extending them to find likely mutations. https://isc.sans.edu/diary/%5BGuest%20Diary%5D%20Comparing%20Honeypot%20Passwords%20with%20HIBP/32310 Breaking Server SGX via DRAM Inspection By observing read and write operations to memory, it is possible to derive keys stored in SGX and break the security of systems relying on SGX. https://wiretap.fail/files/wiretap.pdf OneLogin OIDC Vulnerability A vulnerability in OneLogin can be used to read secret application keys https://www.clutch.security/blog/onelogin-many-secrets-clutch-uncovers-vulnerability-exposing-client-credentials OpenSSL Patch OpenSSL patched three vulnerabilities. One could lead to remote code execution, but the feature is used infrequently, and the exploit is difficult, according to OpenSSL
From a jaw-dropping bathroom disaster at a family gathering to a shocking post-breakup confession, The Jubal Show’s Dirty Little Secret brings you two outrageous stories you’ll never see coming. These anonymous callers reveal the kinds of secrets most people would take to the grave—listen now for the twists, gasps, and laughs you didn’t know you needed! The juiciest, most outrageous confession podcast from The Jubal Show! It's the Jubal Show's Dirty Little Secret! Listeners spill their wildest, weirdest, and most scandalous secrets anonymously—no judgment, just pure entertainment. From shocking revelations to hilarious mishaps, you never know what you'll hear next! Hosted by Jubal Fresh and the team, every episode is packed with jaw-dropping confessions, witty reactions, and unexpected twists. Got a secret? Share it with us… we promise we won’t tell!➡︎ Get on The Jubal Show with your story - https://thejubalshow.com This is just a tiny piece of The Jubal Show. You can find every podcast we have, including the full show every weekday right here…➡︎ https://thejubalshow.com/podcasts The Jubal Show is everywhere, and also these places: Website ➡︎ https://thejubalshow.com Instagram ➡︎ https://instagram.com/thejubalshow X/Twitter ➡︎ https://twitter.com/thejubalshow Tiktok ➡︎ https://www.tiktok.com/@the.jubal.show Facebook ➡︎ https://facebook.com/thejubalshow YouTube ➡︎ https://www.youtube.com/@JubalFresh Support the show: https://the-jubal-show.beehiiv.com/subscribeSee omnystudio.com/listener for privacy information.
From a jaw-dropping bathroom disaster at a family gathering to a shocking post-breakup confession, The Jubal Show’s Dirty Little Secret brings you two outrageous stories you’ll never see coming. These anonymous callers reveal the kinds of secrets most people would take to the grave—listen now for the twists, gasps, and laughs you didn’t know you needed! The juiciest, most outrageous confession podcast from The Jubal Show! It's the Jubal Show's Dirty Little Secret! Listeners spill their wildest, weirdest, and most scandalous secrets anonymously—no judgment, just pure entertainment. From shocking revelations to hilarious mishaps, you never know what you'll hear next! Hosted by Jubal Fresh and the team, every episode is packed with jaw-dropping confessions, witty reactions, and unexpected twists. Got a secret? Share it with us… we promise we won’t tell!➡︎ Get on The Jubal Show with your story - https://thejubalshow.com This is just a tiny piece of The Jubal Show. You can find every podcast we have, including the full show every weekday right here…➡︎ https://thejubalshow.com/podcasts The Jubal Show is everywhere, and also these places: Website ➡︎ https://thejubalshow.com Instagram ➡︎ https://instagram.com/thejubalshow X/Twitter ➡︎ https://twitter.com/thejubalshow Tiktok ➡︎ https://www.tiktok.com/@the.jubal.show Facebook ➡︎ https://facebook.com/thejubalshow YouTube ➡︎ https://www.youtube.com/@JubalFresh Support the show: https://the-jubal-show.beehiiv.com/subscribeSee omnystudio.com/listener for privacy information.
One Battle After Another, is what I should rename this podcast, because the movie was that good, and a full review is inside. Plus Xbox takes another self imposed L, Sony gives itself a gold medal, and EA goes private. The Simpsons are headed back to the big screen, and an AI "actress" has Hollywood in a fervor. Plus Forza Horizon is finally headed to the land of the Rising Sun, and Ubisoft gives Assassin's Creed a new home.
How do you know if one of your accounts has been part of a security breach? Richard chats with Troy Hunt about HaveIBeenPwned, a free service that allows individuals to receive notifications when their accounts appear in a security breach. Troy discusses other services available alongside HaveIBeenPwned for sysadmins, including password checking, identifying accounts associated with a specific domain, and more. When considering the cost of managing a customer with an exploited account, being able to prevent or mitigate potential risk is highly valuable. LinksHaveIBeenPwnedPark Mobile SettlementSnowflake Data BreachRecorded September 25, 2025
In today's episode of Reddit Stories Podcast, a wild Karen completely loses it. You won't believe how this one ends! Sit back, relax, and enjoy this binge-worthy Reddit Stories Podcast, featuring Karen freakouts, entitled people stories, and pro revenge tales.
Identity theft affects millions of people every year — but do you really know how it works, or how to protect yourself? This week, we're joined by Eva Velasquez, CEO of the Identity Theft Resource Center, who shares the latest trends in identity crime and what steps you can take if it ever happens to you.
El tema del espacio para agregar datos a la cadena no es nada nuevo, de hecho se remonta a los propios orígenes de bitcoin y el propio Satoshi Nakamoto ya tenía postura al respecto. Publicación de SatoshiClases nuevas de la semana en: https://cursosbitcoin.comConsulta de datos en nodo de bitcoinConslusión Minibolt
DeMarcus Williams, a senior security engineer at Starbucks, has built a career defined by creativity, intuition, and persistence. With roles at the U.S. Department of Defense, AWS/Amazon, and now Starbucks, he specializes in offensive security, red teaming, and adversary emulation. In this episode, DeMarcus joins Jack Clabby of Carlton Fields and Cyber Florida's Sarina Gandy […]
In this episode of No Password Required, host Jack Clabby and guest host Sarina Gandy discuss the insights gained from their conversation with Demarcus Williams, a senior security engineer at Starbucks. They explore Demarcus's journey into cybersecurity, the importance of competitions like CCDC in career development, and the role of gut instinct in cybersecurity. The discussion also touches on the differences between corporate cultures, the significance of mentorship, and the fun aspects of the cybersecurity community, including a light-hearted lifestyle polygraph segment. TakeawaysDemarcus' curiosity about video games sparked his interest in cybersecurity.The transition from defense contracting to corporate roles offers broader access to tools.Gut feelings play a significant role in cybersecurity decision-making.Competitions like CCDC are crucial for career development in cybersecurity.Networking at competitions can lead to job opportunities.Corporate culture varies significantly between government contracting and tech companies.A people-first approach is essential in mentorship and cybersecurity.The red team experience enhances skills applicable to day-to-day work.Work-life balance is crucial in maintaining a sustainable career in cybersecurity.Engaging with the community is vital for personal and professional growth. Chapters00:00 Introduction to Cybersecurity and Curiosity02:47 Day-to-Day Life of a Senior Security Engineer05:30 The Role of Gut Instinct in Cybersecurity08:31 Early Inspirations and the Journey into Cybersecurity11:35 The Importance of Competitions in Career Development14:33 Transitioning from Student to Professional17:34 The Red Team Experience and Its Impact20:25 Recruitment Opportunities in Cybersecurity Competitions23:33 Navigating Corporate Culture in Cybersecurity26:31 Mentorship and People-First Approach29:11 Lifestyle Polygraph and Fun Insights
Common & Frank V vs. Lil' B & AmeliaSee omnystudio.com/listener for privacy information.
Common & Frank V vs. Lil' B & Amelia
Common & Frank V vs. Lil' B & AmeliaSee omnystudio.com/listener for privacy information.
We're back for the fall TV season with the perfect cozy comedy that probably flew under your radar when it premiered last month on Netflix: Each episode of Long Story Short jumps back and forth through time to tell the many stories (both big and small) of one hilarious and relatable Jewish American family. We'll share some favorite jokes and why we can't get enough of this fresh adult animation from the creator of another modern animated classic, Bojack Horseman. Plus we're taking inspiration from the show and diving into our own streaming history with updates on news stories spanning the Streamageddon archives (because everything old is new again in streaming): Is the new season of South Park piloting an anti-binge model for Paramount+? Sesame Street finds a new address (or two) after being kicked to the curb by HBO Max. Speaking of HBO: They're rebranding their cable channels and Chris would like some credit for predicting these names, okay? Remember Netflix House? No? That's okay, neither did we. RIP Hulu but also LONG LIVE HULU (don't worry, we'll explain). Plus the latest Jimmy Fallon project you've never heard of, casting news in one the longest-gestating streaming projects we've been following, and a peek behind the Marvel curtain with Kumail Nanjiani. Note: This episode was recorded before Disney suspended (and then re-instated) Jimmy Kimmel. ———
Send us a textThe Krewe has more whiskey to review, and the more problems of the world to solve, including that not all morals are the same! We'll look at the Jimmy Kimmel situation, Biden-Harris admin sending out daily talking points to social media influencers, and even the British threatening consequences for those who don't sign up for Digital ID.Bonus content get's into the #NFL and gambling and so much more! Subscribe today on Buzzsprout.comSupport the show
professorjrod@gmail.comEver wonder what happens behind the scenes when you tap "Login" on your favorite app? Authentication is the invisible guardian standing between your personal data and potential attackers, and it's more sophisticated than you might think.Authentication systems rely on three critical principles: Confidentiality keeps your credentials private, Integrity ensures no one can fake their way past security, and Availability guarantees you can access your accounts when needed. These principles form the foundation of digital security across every platform you use.The strongest protection comes from combining multiple authentication factors. Your passwords represent "something you know," while those codes texted to your phone verify "something you have." Fingerprint and facial recognition add "something you are" to the equation. When companies layer these factors together, they create robust security that can stop 99% of automated attacks according to Microsoft research.Despite advances in authentication technology, passwords remain the primary defense for most accounts. Security experts now recommend longer passphrases over complex combinations with special characters. A memorable phrase like "Purple Dungeon eats pizza at noon!" creates a formidable 27-character barrier against brute force attacks. Password managers have become essential tools for generating and storing unique credentials for each service, protecting against credential stuffing attacks where hackers try stolen login information across multiple sites.Beyond basic authentication lies the world of access control – determining what you can do once your identity is verified. Modern systems implement various models from Discretionary Access Control to Attribute-Based Access Control, applying the principle of least privilege to minimize potential damage from compromised accounts or insider threats.Ready to strengthen your digital security? Start by enabling multi-factor authentication on your critical accounts today. Consider using a password manager to generate strong, unique passwords for each site. Remember that authentication isn't just about keeping the bad guys out – it's about protecting what matters most to you online.The Dom Sub Living BDSM and Kink PodcastCurious about Dominance & submission? Real stories, real fun, really kinky.Listen on: Apple Podcasts SpotifySupport the showIf you want to help me with my research please e-mail me.Professorjrod@gmail.comIf you want to join my question/answer zoom class e-mail me at Professorjrod@gmail.comArt By Sarah/DesmondMusic by Joakim KarudLittle chacha ProductionsJuan Rodriguez can be reached atTikTok @ProfessorJrodProfessorJRod@gmail.com@Prof_JRodInstagram ProfessorJRod
Amex just jacked up the fee for its Platinum card to $895… so we used AI to optimize the points.Did Nike just collab with Costco on a shoe?... Could be a deepfake - or an intentional Nike leak.Jimmy Kimmel's late night show just got canceled… but you can follow the money to a $6B acquisition.Plus, NBA star Kevin Durant forgot his Coinbase password… so it's now worth Bitcoin millions.$NKE $COST $AMEX $NXSTWant more business storytelling from us? Check out the latest episode of our new weekly deepdive show: The untold origin story of… Sony's Walkman