Podcasts about passwords

Used for user authentication to prove identity or access approval

  • 4,360PODCASTS
  • 10,546EPISODES
  • 41mAVG DURATION
  • 2DAILY NEW EPISODES
  • Oct 17, 2025LATEST
passwords

POPULARITY

20172018201920202021202220232024

Categories



Best podcasts about passwords

Show all podcasts related to passwords

Latest podcast episodes about passwords

Reddit On Wiki
#402: I CHANGED The WiFi Password WITHOUT Telling My Roommate... AITA?

Reddit On Wiki

Play Episode Listen Later Oct 17, 2025 67:52


LIMITED TICKETS HAVE BEEN ADDED TO OUR TORONTO LIVE SHOW redditonwikilive.eventbrite.com Become a Patron or YouTube Member for ad-free episodes and bonus stories every Monday and Friday as well as exclusive content:⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ Cultiv8 Patreon⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ or⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ YouTube Membership⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠   Head to ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠https://factormeals.com/factorpodcast⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ and use code WIKI50OFF to get 50% off! If you need support dealing with OCD, head on over to NOCD's website at ⁠⁠⁠⁠⁠⁠⁠⁠⁠https://www.treatmyocd.com/⁠⁠⁠⁠⁠⁠⁠⁠⁠ to book a free call with their team. Therapy with NOCD is 100% virtual and covered by insurance for over 155 million Americans, and includes support between sessions, so you're never facing OCD alone. Send us fan mail! Sean Salvino 2700 Cullen Blvd PO Box 84348 Pearland, TX 77584-0802 Want to be part of the show? Leave us a voicemail: ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠https://www.speakpipe.com/Redditonwiki⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ Stories will be played for our $15 Tier Patrons ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠https://www.patreon.com/c/cultiv8podcastnetwork⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ Bonus stories + episodes + ad-free + extra live streams + cameo requests and so many more. (Timestamps are approximate due to dynamic ad insertion. Become a Patron or YouTube member for ad-free episodes) On today's AITA episode, we have:(00:00) - Intro(05:04) - AITA for not seeing a friend while she was in town? (17:43) - AITA for changing the WiFi password and not telling my roommate? (30:27) - AITA for relying too much on a coworker? (38:58) - AITA for cooking my boyfriend's ravioli? (49:46) - AITA For telling a friend that when someone is as qualified as I am, they can charge the same as I do? (1:01:31) - Outro Hit like, subscribe, and follow us on all social media platforms for all things Reddit on Wiki! Click here for our Social and Donation Links:⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ https://linktr.ee/redditonwiki Learn more about your ad choices. Visit megaphone.fm/adchoices

Mojo In The Morning
War of the Roses Pt 1: Gabe Guessed His Boyfriend's Password

Mojo In The Morning

Play Episode Listen Later Oct 16, 2025 8:03 Transcription Available


See omnystudio.com/listener for privacy information.

Mojo In The Morning
War of the Roses Pt 2: Gabe Guessed His Boyfriend's Password

Mojo In The Morning

Play Episode Listen Later Oct 16, 2025 13:53 Transcription Available


See omnystudio.com/listener for privacy information.

kPod - The Kidd Kraddick Morning Show
Celebrity Gossip Part 1 – Secret Password

kPod - The Kidd Kraddick Morning Show

Play Episode Listen Later Oct 14, 2025 13:36


Kris Jenner's plastic surgeon asked Kris to help him get less business, and one celebrity claims to have been run off the road by a city employee. Learn more about your ad choices. Visit megaphone.fm/adchoices

The Dental Billing Podcast
Inside a Dental Billing Company: Password Chaos, Dentrix-Vyne Fallout, and the AR Trap

The Dental Billing Podcast

Play Episode Listen Later Oct 14, 2025 22:58 Transcription Available


Got questions? Send Ericka a Text!A candid look at why AR rises even when production is strong and how access, clarity, and team alignment restore cash flow. We share the biggest blockers we see inside practices—password chaos, clearinghouse issues, unread billing emails—and the simple systems that fix them.• password and portal access as revenue gatekeeper• EFT lockouts creating delays and aged AR• Dentrix–Vine fallout and claim tracing discipline• daily email reviews and statement ownership• patient AR rising from unclear benefits and silence• stronger benefit scripts to prevent “surprise” balances• third-party alignment as team extension, not threat• kickoff meetings for roles, tools, and expectations• billers as end-of-cycle auditors spotting root causes• repeatable rhythms for faster posting and fewer denialsIf any of this resonated with you friends, feel free to leave a review, feel free to leave a comment, share this episode with someone who you feel would relate. And if you're interested in a billing consultation and seeing how fortune billing solutions can help you, go to the show notes. There's a link down below, and you can set up a time to meet with me. Schedule a demo with MaxAssist to unlock scheduleing potential here: https://maxassist.com/book-a-demo-fortune-billing/ Join The Biller Acceleration Mentorship Wait List Here: (Only 5 Spots Left in 2025!!)https://linktr.ee/dental_billing_coachWould you like to set-up a billing consultation with Ericka? She would love the opportunity to discuss your billing questions and see how Fortune Billing Solutions may help you. Email Ericka:ericka@dentalbillingdoneright.comSchedule a call with Ericka: https://calendly.com/ericka-dentalbillingdoneright/30min Perio performance formula: (D4341+D4342+D4346+D4355+D4910)/(D4341+D4342+D4346+D4355+D4910+D1110) Delta Dental Locum Tenens Form: https://www1.deltadentalins.com/content/dam/ddins/en/pdf/dentists/locum-tenens-form.pdf

Bob Sirott
What is the difference between passwords and passkeys?

Bob Sirott

Play Episode Listen Later Oct 14, 2025


Social media strategist Scott Kleinberg joins Bob Sirott to explain what passkeys are, how they are different from passwords, and how you can set up passkey for different websites and apps. He also talks about different models of iPhones, reporting spam texts, and updating your tablet.

Bitcoin en español
1067. Cómo evitar que tus satoshis sean retenidos o confiscados

Bitcoin en español

Play Episode Listen Later Oct 14, 2025 11:08


Si, tus bitcoin pueden ser confiscados incluso si los adquiriste por la vía legal. Esto por la ambigüedad con la que las casas de cambio centralizadas determinan lo sospechosa que puede ser una dirección de bitcoin.Clases nuevas de la semana en: https://cursosbitcoin.comIntroducción pagos silenciososCómo funcionan los pagos silenciosos en bitcoin

Smiley Morning Show
Smiley's SPOOKY Password!

Smiley Morning Show

Play Episode Listen Later Oct 13, 2025 9:45


See omnystudio.com/listener for privacy information.

ITSPmagazine | Technology. Cybersecurity. Society
Everyone Is Protecting My Password, But Who Is Protecting My Toilet Paper? - Interview with Amberley Brady | AISA CyberCon Melbourne 2025 Coverage | On Location with Sean Martin and Marco Ciappelli

ITSPmagazine | Technology. Cybersecurity. Society

Play Episode Listen Later Oct 13, 2025 28:05


Everyone Is Protecting My Password, But Who Is Protecting My Toilet Paper? - Interview with Amberley Brady | AISA CyberCon Melbourne 2025 Coverage | On Location with Sean Martin and Marco CiappelliAISA CyberCon Melbourne | October 15-17, 2025Empty shelves trigger something primal in us now. We've lived through the panic, the uncertainty, the realization that our food supply isn't as secure as we thought. Amberley Brady hasn't forgotten that feeling, and she's turned it into action.Speaking with her from Florence to Sydney ahead of AISA CyberCon in Melbourne, I discovered someone who came to cybersecurity through an unexpected path—studying law, working in policy, but driven by a singular passion for food security. When COVID-19 hit Australia in 2019 and grocery store shelves emptied, Amberley couldn't shake the question: what happens if this keeps happening?Her answer was to build realfoodprice.com.au, a platform tracking food pricing transparency across Australia's supply chain. It's based on the Hungarian model, which within three months saved consumers 50 million euros simply by making prices visible from farmer to wholesaler to consumer. The markup disappeared almost overnight when transparency arrived."Once you demonstrate transparency along the supply chain, you see where the markup is," Amberley explained. She gave me an example that hit home: watermelon farmers were getting paid 40 cents per kilo while their production costs ran between $1.00 to $1.50. Meanwhile, consumers paid $2.50 to $2.99 year-round. Someone in the middle was profiting while farmers lost money on every harvest.But this isn't just about fair pricing—it's about critical infrastructure that nobody's protecting. Australia produces food for 70 million people, far more than its own population needs. That food moves through systems, across borders, through supply chains that depend entirely on technology most farmers never think about in cybersecurity terms.The new autonomous tractors collecting soil data? That information goes somewhere. The sensors monitoring crop conditions? Those connect to systems someone else controls. China recognized this vulnerability years ago—with 20% of the world's population but only 7% of arable land, they understood that food security is national security.At CyberCon, Amberley is presenting two sessions that challenge the cybersecurity community to expand their thinking. "Don't Outsource Your Thinking" tackles what she calls "complacency creep"—our growing trust in AI that makes us stop questioning, stop analyzing with our gut instinct. She argues for an Essential Nine in Australia's cybersecurity framework, adding the human firewall to the technical Essential Eight.Her second talk, cheekily titled "Everyone is Protecting My Password, But No One's Protecting My Toilet Paper," addresses food security directly. It's provocative, but that's the point. We saw what happened in Japan recently with the rice crisis—the same panic buying, the same distrust, the same empty shelves that COVID taught us to fear."We will run to the store," Amberley said. "That's going to be human behavior because we've lived through that time." And here's the cybersecurity angle: those panics can be manufactured. A fake image of empty shelves, an AI-generated video, strategic disinformation—all it takes is triggering that collective memory.Amberley describes herself as an early disruptor in the agritech cybersecurity space, and she's right. Most cybersecurity professionals think about hospitals, utilities, financial systems. They don't think about the autonomous vehicles in fields, the sensor networks in soil, the supply chain software moving food across continents.But she's starting the conversation, and CyberCon's audience—increasingly diverse, including people from HR, risk management, and policy—is ready for it. Because at the end of the day, everyone has to eat. And if we don't start thinking about the cyber vulnerabilities in how we grow, move, and price food, we're leaving our most basic need unprotected.AISA CyberCon Melbourne runs October 15-17, 2025 Virtual coverage provided by ITSPmagazineGUEST:Amberley Brady, Food Security & Cybersecurity Advocate, Founder of realfoodprice.com.au | On LinkedIn: https://www.linkedin.com/in/amberley-b-a62022353/HOSTS:Sean Martin, Co-Founder, ITSPmagazine and Studio C60 | Website: https://www.seanmartin.comMarco Ciappelli, Co-Founder, ITSPmagazine and Studio C60 | Website: https://www.marcociappelli.comCatch all of our event coverage: https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverageWant to share an Event Briefing as part of our event coverage? Learn More

The Common Man Progrum
FULL PROGRUM PASSWORD!

The Common Man Progrum

Play Episode Listen Later Oct 10, 2025 33:39


Common & Maxx vs Lil' B & Julia Daniels

The Common Man Progrum
FULL PROGRUM PASSWORD!

The Common Man Progrum

Play Episode Listen Later Oct 10, 2025 32:36 Transcription Available


Common & Maxx vs Lil' B & Julia DanielsSee omnystudio.com/listener for privacy information.

The Common Man Progrum
FULL PROGRUM PASSWORD!

The Common Man Progrum

Play Episode Listen Later Oct 10, 2025 32:36 Transcription Available


Common & Maxx vs Lil' B & Julia DanielsSee omnystudio.com/listener for privacy information.

Head-ON With Bob Kincaid
09-10-2025, Thorn-In-the-Side Thursday, Head-ON With Roxanne Kincaid

Head-ON With Bob Kincaid

Play Episode Listen Later Oct 10, 2025 179:05


Hairless Heydrich gives the game away. MAGAT senators approve murder on the High Seas. The Password is: "yardarm". All that and more in three hours of live, uncensored, fearless broadcasting that has ever been here, but seldom elsewhere.

natelovesjen Podcast
The Password Is "Apple-crisp"

natelovesjen Podcast

Play Episode Listen Later Oct 10, 2025 46:41


I had ChatGPT write this.We're so close to closing on our house!

ITSPmagazine | Technology. Cybersecurity. Society
The Once and Future Rules of Cybersecurity | A Black Hat SecTor 2025 Conversation with HD Moore | On Location Coverage with Sean Martin and Marco Ciappelli

ITSPmagazine | Technology. Cybersecurity. Society

Play Episode Listen Later Oct 9, 2025 23:37


During his keynote at SecTor 2025, HD Moore, founder and CEO of runZero and widely recognized for creating Metasploit, invites the cybersecurity community to rethink the foundational “rules” we continue to follow—often without question. In conversation with Sean Martin and Marco Ciappelli for ITSPmagazine's on-location event coverage, Moore breaks down where our security doctrines came from, why some became obsolete, and which ones still hold water.One standout example? The rule to “change your passwords every 30 days.” Moore explains how this outdated guidance—rooted in assumptions from the early 2000s when password sharing was rampant—led to predictable patterns and frustrated users. Today, the advice has flipped: focus on strong, unique passwords per service, stored securely via password managers.But this keynote isn't just about passwords. Moore uses this lens to explore how many security “truths” were formed in response to technical limitations or outdated behaviors—things like shared network trust, brittle segmentation, and fragile authentication models. As technology matures, so too should the rules. Enter passkeys, hardware tokens, and enclave-based authentication. These aren't just new tools—they're a fundamental shift in where and how we anchor trust.Moore also calls out an uncomfortable truth: the very products we rely on to protect our systems—firewalls, endpoint managers, and security appliances—are now among the top vectors for breach, per Mandiant's latest report. That revelation struck a chord with conference attendees, who appreciated Moore's willingness to speak plainly about systemic security debt.He also discusses the inescapable vulnerabilities in AI agent flows, likening prompt injection attacks to the early days of cross-site scripting. The tech itself invites risk, he warns, and we'll need new frameworks—not just tweaks to old ones—to manage what comes next.This conversation is a must-listen for anyone questioning whether our security playbooks are still fit for purpose—or simply carried forward by habit.___________GUEST:HD Moore, Founder and CEO of RunZero | On Linkedin: https://www.linkedin.com/in/hdmoore/HOSTS:Sean Martin, Co-Founder, ITSPmagazine and Studio C60 | Website: https://www.seanmartin.comMarco Ciappelli, Co-Founder, ITSPmagazine and Studio C60 | Website: https://www.marcociappelli.comRESOURCES:Keynote: The Once and Future Rules of Cybersecurity: https://www.blackhat.com/sector/2025/briefings/schedule/#keynote-the-once-and-future-rules-of-cybersecurity-49596Learn more and catch more stories from our SecTor 2025 coverage: https://www.itspmagazine.com/cybersecurity-technology-society-events/sector-cybersecurity-conference-toronto-2025Mandiant M-Trends Breach Report: https://cloud.google.com/blog/topics/threat-intelligence/m-trends-2025/OPM Data Breach Summary: https://oversight.house.gov/report/opm-data-breach-government-jeopardized-national-security-generation/Catch all of our event coverage: https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverageWant to share an Event Briefing as part of our event coverage? Learn More

Creating Confidence with Heather Monahan
Confidence Classic: The MAGIC of Surrender with Kute Blackson

Creating Confidence with Heather Monahan

Play Episode Listen Later Oct 8, 2025 52:48


Most of us want to “move on” or “let go,” but we skip the one phase that makes surrender possible. In this episode, I sit down with transformational teacher and bestselling author Kute Blackson to break down what surrender really means and why it's the opposite of weakness. We talk about how to let go without giving up, recognize the ego's survival patterns that keep you in control mode, and the step-by-step “anatomy of surrender” process. Tune in and discover the practices that will help you release control, grieve what's past, and open yourself to bigger opportunities and a life that feels more aligned and alive. In This Episode, You Will Learn Why SURRENDER is not weakness but the PASSWORD to FREEDOM. Why GRIEVING is the missing step before surrender can happen. How CONTROL is the ego's master addiction and keeps you stuck. How to tell yourself the TRUTH and stop negotiating your life away. Why PAIN is feedback that you're out of alignment. Ways to ALIGN with your soul's deeper vision and act from authenticity. Why LETTING GO of what's not for you creates space for greater blessings. Resources + Links Learn more about ⁠kuteblackson.com⁠  Read ⁠You Are The One⁠ & ⁠Magic of Surrender ⁠ FREE ⁠Reinvent Online Seminar⁠   Attend ⁠The Boundless Bliss⁠ event  Listen to ⁠Soul Talk⁠  Sign up for a one-dollar-per-month trial period at shopify.com/monahan Download the CFO's Guide to AI and Machine Learning at NetSuite.com/MONAHAN. Want to do more and spend less like Uber, 8x8, and Databricks Mosaic? Take a free test drive of OCI at oracle.com/MONAHAN. Get 10% off your first Mitopure order at timeline.com/CONFIDENCE. Get 15% off your first order when you use code CONFIDENCE15 at checkout at jennikayne.com. Call my digital clone at 201-897-2553!  Visit heathermonahan.com Sign up for my mailing list: heathermonahan.com/mailing-list/  Overcome Your Villains is Available NOW! Order here: https://overcomeyourvillains.com  If you haven't yet, get my first book Confidence Creator Follow Heather on Instagram & LinkedIn Kute on Facebook X & ⁠Instagram Kute on ⁠Youtube & LinkedIn

The Majority Report with Sam Seder
3598 - Trump Calls for Political Arrests; Urgent 2025 Elections w/ Daniel Nichanian

The Majority Report with Sam Seder

Play Episode Listen Later Oct 8, 2025 85:46


It's Hump Day on the Majority Report On Today's Show: Trump posts to Truth Social that Illinois Governor JB Pritzker and Chicago Mayor Brandon Johnson should be imprisoned for hindering ICE agents. Speaker of the House Mike Johnson (R-LA) co-signs Donald Trump's calling for Pritzker's and Johnson's imprisonment CBS Chicago reports that ICE has been making false 911 call and filing phony police reports in an attempt to agitate local authorities. The IDF has seized nine more boats attempting to break the Israeli blockade on aid for Palestinians. Greta Thunberg posts a video on social media pleading for people to stay focused on the genocide and Palestinians and to not make the flotilla members the center of the narrative. Editor of Bolts Magazine, Daniel Nichanian joins the program to discuss his Cheat Sheet for the 2025 General Elections. In the Fun Half: We revisit a talk that new head of CBS news Bari Weiss gave to the Federalist Society in 2023 where she exhibits her only talent, flattering conservatives. After receiving a $20 billion bailout, Argentina's president Javier Milei throws an arena rock show, even singing himself Pam Bondi is once again humiliated, this time by Senator Dick Durbin as he presses her on Epstein. Stephen Crowder doesn't understand why his fellow podcasters are turning on Trump. Dave Rubin goes on a misogynist rant about Greta Thunberg. All that and more The Congress switchboard number is (202) 224-3121. You can use this number to connect with either the U.S. Senate or the House of Representatives. Follow us on TikTok here: https://www.tiktok.com/@majorityreportfm Check us out on Twitch here: https://www.twitch.tv/themajorityreport Find our Rumble stream here: https://rumble.com/user/majorityreport Check out our alt YouTube channel here: https://www.youtube.com/majorityreportlive Gift a Majority Report subscription here: https://fans.fm/majority/gift Subscribe to the AMQuickie newsletter here: https://am-quickie.ghost.io/ Join the Majority Report Discord! https://majoritydiscord.com/ Get all your MR merch at our store: https://shop.majorityreportradio.com/ Get the free Majority Report App!: https://majority.fm/app Go to https://JustCoffee.coop and use coupon code majority to get 10% off your purchase Check out today's sponsors: DELETEME: Get 20% off your DeleteMe plan when you go to www.joindeleteme.com/MAJORITY and use promo code MAJORITY at checkout. WILD GRAIN: Get $30 off your first box + free Croissants in every box. Go to Wildgrain.com/MAJORITY to start your subscription. NAKED WINES: To get 6 bottles of wine for $39.99, head to NakedWines.com/MAJORITY and use code MAJORITY for both the code and PASSWORD. SUNSET LAKE:  Head to SunsetLakeCBD.com and use the code JustTreats25 to save 30% on all their gummies for sleep, focus, and relaxation Follow the Majority Report crew on Twitter: @SamSeder @EmmaVigeland @MattLech Check out Matt's show, Left Reckoning, on YouTube, and subscribe on Patreon! https://www.patreon.com/leftreckoning Check out Matt Binder's YouTube channel: https://www.youtube.com/mattbinder Subscribe to Brandon's show The Discourse on Patreon! https://www.patreon.com/ExpandTheDiscourse Check out Ava Raiza's music here! https://avaraiza.bandcamp.co

Marriage By Design
The Hump Day 90 - Should my spouse know all of my usernames and passwords?

Marriage By Design

Play Episode Listen Later Oct 8, 2025 1:29


Bitcoin en español
1066 Pagos silenciosos y vía DNS con bitcoin

Bitcoin en español

Play Episode Listen Later Oct 7, 2025 12:43


Ya puedes hacer transacciones con bitcoin con privacidad desde sparrow wallet así como usar nombres de dominio en lugar de direcciones.Clases nuevas de la semana en: https://cursosbitcoin.comConclusión MiniboltQue son los pagos silenciosos y cómo funcionan

Retailistic
Forget Passwords Forever: The Biometric Bombshell Making Your Logins Hacker-Proof

Retailistic

Play Episode Listen Later Oct 7, 2025 29:58


Video version of this episode is here TakeawaysJosh Horwitz is a serial entrepreneur with a focus on cybersecurity.Bootstrapping businesses can lead to successful exits without external funding.Product-market fit is crucial for entrepreneurial success.Validating product ideas through low-cost market testing is essential.Credential stuffing is a significant threat in cybersecurity.Innovative solutions can turn attack vectors into defensive strategies.The future of authentication is moving towards passwordless solutions.User experience must be balanced with security measures.Adaptive security is becoming increasingly important in technology.Understanding customer needs is vital for product development. Chapters00:00 Introduction to Entrepreneurship and Background02:42 Bootstrapping and Product-Market Fit09:29 Cybersecurity Landscape and Credential Stuffing14:57 The Future of Passwords and Authentication22:49 Balancing Business Needs with User Experience

Smiley Morning Show
Smiley's Password Game

Smiley Morning Show

Play Episode Listen Later Oct 6, 2025 8:47


win tickets to see ADAM SANDLER!See omnystudio.com/listener for privacy information.

Wasteland Free Radio
S2 Ep. 10 - Passwords

Wasteland Free Radio

Play Episode Listen Later Oct 6, 2025 20:05


  The Lone Transmitter and Max the Millions delve deep into the wilds of the Radlands for more salvage and find a surprise waiting for them. This episode is sponsored by Flintlock and Fog- The table top role playing experience where your favorite victorian age heroes (and villains) come to life! Ad-free episodes, bonus episodes, BTS, and more can be found by supporting us on Patreon!  Follow us on Instagram  Follow us on TikTok Join us on Discord! Featured Music: Vocal Few Additional music: Space Crush and eleventyseven The Lone Transmitter: J. S. Pitcher Max the Millions: Leo Joylock Wasteland Free Radio is sponsored by Flintlock and Fog - A TTRPG set in the late 1800s! The game is foot! Wasteland Free Radio Soundtrack Wasteland Free Radio most likely contains strong language and definitely contains adult themes, we're sorry about that, but the creators of this show were incrediblly repressed when they were younger and that is simply how they cope, deal with it.

SLEERICKETS
Ep 215: The Old Criterion

SLEERICKETS

Play Episode Listen Later Oct 4, 2025 66:57


SLEERICKETS is a podcast about poetry and other intractable problems. My book Midlife now exists. Buy it here, or leave it a rating here or hereFor more SLEERICKETS, subscribe to SECRET SHOW, join the group chat, and send me a poem for Listener Crit!Leave the show a rating here (actually, just do it on your phone, it's easier). Thanks!Wear SLEERICKETS t-shirts and hoodies. They look good!SLEERICKETS is now on YouTube!For a frank, anonymous critique on SLEERICKETS, subscribe to the SECRET SHOW and send a poem of no more 25 lines to sleerickets [at] gmail [dot] com Some of the topics mentioned in this episode:MeanjinWho Killed Meanjin? by Nick FeikOverlandCorditeThe Idea of a Literary Review by T. S. EliotLast Words by T. S. EliotLiterary MattersHEATClem ChristensenSpillwayThe Poetry Foundation's various podcastsChapo Trap HouseDavid CrossHail Satan? (2019)The Antichrist: A Four-Part Lecture Series by Peter ThielEp 208: Password to the Ghost WorldOn Heteropessimism by Asa SeresinFrequently mentioned names:– Joshua Mehigan– Shane McCrae– A. E. Stallings– Ryan Wilson– Morri Creech– Austin Allen– Jonathan Farmer– Zara Raab– Amit Majmudar– Ethan McGuire– Coleman Glenn– Chris Childers– Alexis Sears– JP Gritton– Alex Pepple– Ernie Hilbert– Joanna Pearson– Matt Wall– Steve Knepper – Helena FederOther Ratbag Poetry Pods:Poetry Says by Alice AllanI Hate Matt Wall by Matt WallVersecraft by Elijah BlumovRatbag Poetics By David Jalal MotamedAlice: In Future PostsBrian: @BPlatzerCameron: Minor TiresiasMatthew: sleerickets [at] gmail [dot] comMusic by ETRNLArt by Daniel Alexander Smith

The Common Man Progrum
Lil B, Progrum Password! Tennafitzgerald HOUR 2

The Common Man Progrum

Play Episode Listen Later Oct 3, 2025 39:56


Tennafitzgerald HOUR 2 --Lil B--Nordo and Jonny Athletic --Password

The Common Man Progrum
Password 2nd Half! Russo Radio! Tennafitzgerald HOUR 3

The Common Man Progrum

Play Episode Listen Later Oct 3, 2025 40:13


Tennafitzgerald HOUR 3 --Password--AYSTAPF --Russo

passwords russo radio
The Common Man Progrum
Lil B, Progrum Password! Tennafitzgerald HOUR 2

The Common Man Progrum

Play Episode Listen Later Oct 3, 2025 41:27 Transcription Available


Tennafitzgerald HOUR 2 --Lil B--Nordo and Jonny Athletic --PasswordSee omnystudio.com/listener for privacy information.

The Common Man Progrum
Password 2nd Half! Russo Radio! Tennafitzgerald HOUR 3

The Common Man Progrum

Play Episode Listen Later Oct 3, 2025 40:43 Transcription Available


Tennafitzgerald HOUR 3 --Password--AYSTAPF --RussoSee omnystudio.com/listener for privacy information.

passwords russo radio
Audio Mises Wire
Jefferson's War on the Barbary Pirates Is an Unjustified Password for Military Intervention

Audio Mises Wire

Play Episode Listen Later Oct 3, 2025


Advocates for US military intervention have invoked the war against the Barbary pirates as justification. Yet, an examination of that conflict shows that President Jefferson's actions were limited and followed the direction of Congress.Original article: https://mises.org/mises-wire/jeffersons-war-barbary-pirates-unjustified-password-military-intervention

The Common Man Progrum
Lil B, Progrum Password! Tennafitzgerald HOUR 2

The Common Man Progrum

Play Episode Listen Later Oct 3, 2025 41:27 Transcription Available


Tennafitzgerald HOUR 2 --Lil B--Nordo and Jonny Athletic --PasswordSee omnystudio.com/listener for privacy information.

The Common Man Progrum
Password 2nd Half! Russo Radio! Tennafitzgerald HOUR 3

The Common Man Progrum

Play Episode Listen Later Oct 3, 2025 40:43 Transcription Available


Tennafitzgerald HOUR 3 --Password--AYSTAPF --RussoSee omnystudio.com/listener for privacy information.

passwords russo radio
Mises Media
Jefferson's War on the Barbary Pirates Is an Unjustified Password for Military Intervention

Mises Media

Play Episode Listen Later Oct 3, 2025


Advocates for US military intervention have invoked the war against the Barbary pirates as justification. Yet, an examination of that conflict shows that President Jefferson's actions were limited and followed the direction of Congress.Original article: https://mises.org/mises-wire/jeffersons-war-barbary-pirates-unjustified-password-military-intervention

Group Practice Tech
Episode 535: Passkeys and Password Managers: The Future of Secure Logins for Therapists

Group Practice Tech

Play Episode Listen Later Oct 3, 2025 22:14


Welcome solo and group practice owners! We are Liath Dalton and Evan Dumas, your co-hosts of Group Practice Tech. In our latest episode, we explain what therapists should know about using passkeys in their practice. We discuss: Why we recommend password managers How passkeys differ from passwords Why passkeys are simpler and safer than passwords Which password manager we recommend Where you can use passkeys Things to consider when adopting passkeys Listen here: https://personcenteredtech.com/group/podcast/ For more, visit our website. Resources Article: How Passkeys Work—and How to Use Them PCT Resources Group Practice Care Premium weekly (live & recorded) direct support & consultation service, Group Practice Office Hours -- including monthly session with therapist attorney Eric Ström, JD PhD LMHC + assignable staff HIPAA Security Awareness: Bring Your Own Device training + access to Device Security Center with step-by-step device-specific tutorials & registration forms for securing and documenting all personally owned & practice-provided devices (for *all* team members at no per-person cost) + assignable staff HIPAA Security Awareness: Remote Workspaces training for all team members + access to Remote Workspace Center with step-by-step tutorials & registration forms for securing and documenting Remote Workspaces (for *all* team members at no per-person cost) + more

SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast
SANS Stormcast Thursday, October 2nd, 2025: Honeypot Passwords; OneLogin Vuln; Breaking Intel SGX; OpenSSL Patch

SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast

Play Episode Listen Later Oct 2, 2025 8:11


Comparing Honeypot Passwords with HIBP Most passwords used against our honeypots are also found in the Have I been pwn3d list. However, the few percent that are not found tend to be variations of known passwords, extending them to find likely mutations. https://isc.sans.edu/diary/%5BGuest%20Diary%5D%20Comparing%20Honeypot%20Passwords%20with%20HIBP/32310 Breaking Server SGX via DRAM Inspection By observing read and write operations to memory, it is possible to derive keys stored in SGX and break the security of systems relying on SGX. https://wiretap.fail/files/wiretap.pdf OneLogin OIDC Vulnerability A vulnerability in OneLogin can be used to read secret application keys https://www.clutch.security/blog/onelogin-many-secrets-clutch-uncovers-vulnerability-exposing-client-credentials OpenSSL Patch OpenSSL patched three vulnerabilities. One could lead to remote code execution, but the feature is used infrequently, and the exploit is difficult, according to OpenSSL

The Jubal Show
Dirty Little Secret - From Carpeted Bathrooms to Stolen Passwords…

The Jubal Show

Play Episode Listen Later Oct 2, 2025 2:59 Transcription Available


From a jaw-dropping bathroom disaster at a family gathering to a shocking post-breakup confession, The Jubal Show’s Dirty Little Secret brings you two outrageous stories you’ll never see coming. These anonymous callers reveal the kinds of secrets most people would take to the grave—listen now for the twists, gasps, and laughs you didn’t know you needed! The juiciest, most outrageous confession podcast from The Jubal Show! It's the Jubal Show's Dirty Little Secret! Listeners spill their wildest, weirdest, and most scandalous secrets anonymously—no judgment, just pure entertainment. From shocking revelations to hilarious mishaps, you never know what you'll hear next! Hosted by Jubal Fresh and the team, every episode is packed with jaw-dropping confessions, witty reactions, and unexpected twists. Got a secret? Share it with us… we promise we won’t tell!➡︎ Get on The Jubal Show with your story - https://thejubalshow.com This is just a tiny piece of The Jubal Show. You can find every podcast we have, including the full show every weekday right here…➡︎ https://thejubalshow.com/podcasts The Jubal Show is everywhere, and also these places: Website ➡︎ https://thejubalshow.com Instagram ➡︎ https://instagram.com/thejubalshow X/Twitter ➡︎ https://twitter.com/thejubalshow Tiktok ➡︎ https://www.tiktok.com/@the.jubal.show Facebook ➡︎ https://facebook.com/thejubalshow YouTube ➡︎ https://www.youtube.com/@JubalFresh Support the show: https://the-jubal-show.beehiiv.com/subscribeSee omnystudio.com/listener for privacy information.

Dirty Little Secret - The Jubal Show
From Carpeted Bathrooms to Stolen Passwords…

Dirty Little Secret - The Jubal Show

Play Episode Listen Later Oct 2, 2025 2:59 Transcription Available


From a jaw-dropping bathroom disaster at a family gathering to a shocking post-breakup confession, The Jubal Show’s Dirty Little Secret brings you two outrageous stories you’ll never see coming. These anonymous callers reveal the kinds of secrets most people would take to the grave—listen now for the twists, gasps, and laughs you didn’t know you needed! The juiciest, most outrageous confession podcast from The Jubal Show! It's the Jubal Show's Dirty Little Secret! Listeners spill their wildest, weirdest, and most scandalous secrets anonymously—no judgment, just pure entertainment. From shocking revelations to hilarious mishaps, you never know what you'll hear next! Hosted by Jubal Fresh and the team, every episode is packed with jaw-dropping confessions, witty reactions, and unexpected twists. Got a secret? Share it with us… we promise we won’t tell!➡︎ Get on The Jubal Show with your story - https://thejubalshow.com This is just a tiny piece of The Jubal Show. You can find every podcast we have, including the full show every weekday right here…➡︎ https://thejubalshow.com/podcasts The Jubal Show is everywhere, and also these places: Website ➡︎ https://thejubalshow.com Instagram ➡︎ https://instagram.com/thejubalshow X/Twitter ➡︎ https://twitter.com/thejubalshow Tiktok ➡︎ https://www.tiktok.com/@the.jubal.show Facebook ➡︎ https://facebook.com/thejubalshow YouTube ➡︎ https://www.youtube.com/@JubalFresh Support the show: https://the-jubal-show.beehiiv.com/subscribeSee omnystudio.com/listener for privacy information.

Nick's Nerd News
Episode 386: Let's just not nitpick over the passwords

Nick's Nerd News

Play Episode Listen Later Oct 2, 2025 100:31


RunAs Radio
HaveIBeenPwned with Troy Hunt

RunAs Radio

Play Episode Listen Later Oct 1, 2025 41:01


How do you know if one of your accounts has been part of a security breach? Richard chats with Troy Hunt about HaveIBeenPwned, a free service that allows individuals to receive notifications when their accounts appear in a security breach. Troy discusses other services available alongside HaveIBeenPwned for sysadmins, including password checking, identifying accounts associated with a specific domain, and more. When considering the cost of managing a customer with an exploited account, being able to prevent or mitigate potential risk is highly valuable. LinksHaveIBeenPwnedPark Mobile SettlementSnowflake Data BreachRecorded September 25, 2025

mr redder
Daughter Refuses School Dad's Genius Plan to Change the WiFi Password!

mr redder

Play Episode Listen Later Sep 30, 2025 32:57


In today's episode of Reddit Stories Podcast, a wild Karen completely loses it. You won't believe how this one ends! Sit back, relax, and enjoy this binge-worthy Reddit Stories Podcast, featuring Karen freakouts, entitled people stories, and pro revenge tales.

Random but Memorable
How to protect yourself from digital identity theft with Eva Velasquez | VOICE CLONE IDENTITY THEFT

Random but Memorable

Play Episode Listen Later Sep 30, 2025 63:03


Identity theft affects millions of people every year — but do you really know how it works, or how to protect yourself? This week, we're joined by Eva Velasquez, CEO of the Identity Theft Resource Center, who shares the latest trends in identity crime and what steps you can take if it ever happens to you.

Bitcoin en español
1065 La guerra por los datos en Bitcoin 2010 vs 2025

Bitcoin en español

Play Episode Listen Later Sep 30, 2025 20:03


El tema del espacio para agregar datos a la cadena no es nada nuevo, de hecho se remonta a los propios orígenes de bitcoin y el propio Satoshi Nakamoto ya tenía postura al respecto. Publicación de SatoshiClases nuevas de la semana en: https://cursosbitcoin.comConsulta de datos en nodo de bitcoinConslusión Minibolt

Carlton Fields Podcasts
No Password Required: Starbucks' Security Pro Went From Cyber Competitions to Corporate Red Teaming

Carlton Fields Podcasts

Play Episode Listen Later Sep 30, 2025


DeMarcus Williams, a senior security engineer at Starbucks, has built a career defined by creativity, intuition, and persistence. With roles at the U.S. Department of Defense, AWS/Amazon, and now Starbucks, he specializes in offensive security, red teaming, and adversary emulation. In this episode, DeMarcus joins Jack Clabby of Carlton Fields and Cyber Florida's Sarina Gandy […]

No Password Required
No Password Required Podcast Episode 64 — DeMarcus Williams

No Password Required

Play Episode Listen Later Sep 29, 2025 42:59


In this episode of No Password Required, host Jack Clabby and guest host Sarina Gandy discuss the insights gained from their conversation with Demarcus Williams, a senior security engineer at Starbucks. They explore Demarcus's journey into cybersecurity, the importance of competitions like CCDC in career development, and the role of gut instinct in cybersecurity. The discussion also touches on the differences between corporate cultures, the significance of mentorship, and the fun aspects of the cybersecurity community, including a light-hearted lifestyle polygraph segment. TakeawaysDemarcus' curiosity about video games sparked his interest in cybersecurity.The transition from defense contracting to corporate roles offers broader access to tools.Gut feelings play a significant role in cybersecurity decision-making.Competitions like CCDC are crucial for career development in cybersecurity.Networking at competitions can lead to job opportunities.Corporate culture varies significantly between government contracting and tech companies.A people-first approach is essential in mentorship and cybersecurity.The red team experience enhances skills applicable to day-to-day work.Work-life balance is crucial in maintaining a sustainable career in cybersecurity.Engaging with the community is vital for personal and professional growth. Chapters00:00 Introduction to Cybersecurity and Curiosity02:47 Day-to-Day Life of a Senior Security Engineer05:30 The Role of Gut Instinct in Cybersecurity08:31 Early Inspirations and the Journey into Cybersecurity11:35 The Importance of Competitions in Career Development14:33 Transitioning from Student to Professional17:34 The Red Team Experience and Its Impact20:25 Recruitment Opportunities in Cybersecurity Competitions23:33 Navigating Corporate Culture in Cybersecurity26:31 Mentorship and People-First Approach29:11 Lifestyle Polygraph and Fun Insights

The Common Man Progrum
FULL PROGRUM PASSWORD!

The Common Man Progrum

Play Episode Listen Later Sep 26, 2025 30:25


Common & Frank V vs. Lil' B & AmeliaSee omnystudio.com/listener for privacy information.

The Common Man Progrum
FULL PROGRUM PASSWORD!

The Common Man Progrum

Play Episode Listen Later Sep 26, 2025 29:46


Common & Frank V vs. Lil' B & Amelia

The Common Man Progrum
FULL PROGRUM PASSWORD!

The Common Man Progrum

Play Episode Listen Later Sep 26, 2025 30:25


Common & Frank V vs. Lil' B & AmeliaSee omnystudio.com/listener for privacy information.

Streamageddon
#113 – Long Stories Short

Streamageddon

Play Episode Listen Later Sep 26, 2025 53:37


We're back for the fall TV season with the perfect cozy comedy that probably flew under your radar when it premiered last month on Netflix: Each episode of Long Story Short jumps back and forth through time to tell the many stories (both big and small) of one hilarious and relatable Jewish American family. We'll share some favorite jokes and why we can't get enough of this fresh adult animation from the creator of another modern animated classic, Bojack Horseman. Plus we're taking inspiration from the show and diving into our own streaming history with updates on news stories spanning the Streamageddon archives (because everything old is new again in streaming): Is the new season of South Park piloting an anti-binge model for Paramount+? Sesame Street finds a new address (or two) after being kicked to the curb by HBO Max. Speaking of HBO: They're rebranding their cable channels and Chris would like some credit for predicting these names, okay? Remember Netflix House? No? That's okay, neither did we. RIP Hulu but also LONG LIVE HULU (don't worry, we'll explain). Plus the latest Jimmy Fallon project you've never heard of, casting news in one the longest-gestating streaming projects we've been following, and a peek behind the Marvel curtain with Kumail Nanjiani. Note: This episode was recorded before Disney suspended (and then re-instated) Jimmy Kimmel. ———

Implicit Bias
The password is: "Egalitarianism"

Implicit Bias

Play Episode Listen Later Sep 26, 2025 124:30


Send us a textThe Krewe has more whiskey to review, and the more problems of the world to solve, including that not all morals are the same! We'll look at the Jimmy Kimmel situation, Biden-Harris admin sending out daily talking points to social media influencers, and even the British threatening consequences for those who don't sign up for Digital ID.Bonus content get's into the #NFL and gambling and so much more! Subscribe today on Buzzsprout.comSupport the show

Technology Tap
Cybersecurity Fundamentals: Cracking the Authentication Code Chapter 5

Technology Tap

Play Episode Listen Later Sep 26, 2025 26:56 Transcription Available


professorjrod@gmail.comEver wonder what happens behind the scenes when you tap "Login" on your favorite app? Authentication is the invisible guardian standing between your personal data and potential attackers, and it's more sophisticated than you might think.Authentication systems rely on three critical principles: Confidentiality keeps your credentials private, Integrity ensures no one can fake their way past security, and Availability guarantees you can access your accounts when needed. These principles form the foundation of digital security across every platform you use.The strongest protection comes from combining multiple authentication factors. Your passwords represent "something you know," while those codes texted to your phone verify "something you have." Fingerprint and facial recognition add "something you are" to the equation. When companies layer these factors together, they create robust security that can stop 99% of automated attacks according to Microsoft research.Despite advances in authentication technology, passwords remain the primary defense for most accounts. Security experts now recommend longer passphrases over complex combinations with special characters. A memorable phrase like "Purple Dungeon eats pizza at noon!" creates a formidable 27-character barrier against brute force attacks. Password managers have become essential tools for generating and storing unique credentials for each service, protecting against credential stuffing attacks where hackers try stolen login information across multiple sites.Beyond basic authentication lies the world of access control – determining what you can do once your identity is verified. Modern systems implement various models from Discretionary Access Control to Attribute-Based Access Control, applying the principle of least privilege to minimize potential damage from compromised accounts or insider threats.Ready to strengthen your digital security? Start by enabling multi-factor authentication on your critical accounts today. Consider using a password manager to generate strong, unique passwords for each site. Remember that authentication isn't just about keeping the bad guys out – it's about protecting what matters most to you online.The Dom Sub Living BDSM and Kink PodcastCurious about Dominance & submission? Real stories, real fun, really kinky.Listen on: Apple Podcasts SpotifySupport the showIf you want to help me with my research please e-mail me.Professorjrod@gmail.comIf you want to join my question/answer zoom class e-mail me at Professorjrod@gmail.comArt By Sarah/DesmondMusic by Joakim KarudLittle chacha ProductionsJuan Rodriguez can be reached atTikTok @ProfessorJrodProfessorJRod@gmail.com@Prof_JRodInstagram ProfessorJRod

The Best One Yet

Amex just jacked up the fee for its Platinum card to $895… so we used AI to optimize the points.Did Nike just collab with Costco on a shoe?... Could be a deepfake - or an intentional Nike leak.Jimmy Kimmel's late night show just got canceled… but you can follow the money to a $6B acquisition.Plus, NBA star Kevin Durant forgot his Coinbase password… so it's now worth Bitcoin millions.$NKE $COST $AMEX $NXSTWant more business storytelling from us? Check out the latest episode of our new weekly deepdive show: The untold origin story of… Sony's Walkman