Podcasts about password security

Measure of the effectiveness of a password in resisting guessing and brute-force attacks

  • 116PODCASTS
  • 136EPISODES
  • 41mAVG DURATION
  • 1EPISODE EVERY OTHER WEEK
  • Apr 24, 2025LATEST
password security

POPULARITY

20172018201920202021202220232024


Best podcasts about password security

Latest podcast episodes about password security

All TWiT.tv Shows (MP3)
Hands-On Mac 179: Using the Passwords App in macOS Sequoia

All TWiT.tv Shows (MP3)

Play Episode Listen Later Apr 24, 2025 9:49


Mikah Sargent takes viewers on a comprehensive tour of the Passwords app in macOS Sequoia, demonstrating how this robust tool serves as a complete credential management system. From passkeys to verification codes and shared passwords, Mikah explores how Apple has created a secure yet user-friendly solution for managing all your login information across devices. Passkeys - These are created automatically when you set up passkey authentication on websites, with limited editing options but the ability to add notes or modify the associated website. Verification codes - Users can add two-factor authentication codes either by entering setup keys manually or scanning QR codes. Wi-Fi - The app stores Wi-Fi network credentials, displays network security information (WPA2/WPA3), and lets users generate QR codes for easy sharing. Security recommendations - The app alerts users when passwords may be compromised in data breaches using Apple's differential privacy techniques that protect user privacy. Password sharing feature - Users can create groups to share specific login credentials with family members or others, with granular control over which passwords are shared. Password importing - The app supports importing passwords from CSV files, though Mikah strongly recommends deleting these files immediately after import for security. Cross-device synchronization - All passwords sync across Apple devices with end-to-end encryption via iCloud. Windows compatibility - Even Windows users can access their passwords through the iCloud Passwords app, making it a versatile solution. Passwords User Guide - Apple Support - https://support.apple.com/guide/passwords/welcome/1.1/mac/15.4.1 Host: Mikah Sargent Download or subscribe to Hands-On Mac at https://twit.tv/shows/hands-on-mac Want access to the ad-free video and exclusive features? Become a member of Club TWiT today! https://twit.tv/clubtwit Club TWiT members can discuss this episode and leave feedback in the Club TWiT Discord.

Hands-On Mac (Video)
HOM 179: Using the Passwords App in macOS Sequoia

Hands-On Mac (Video)

Play Episode Listen Later Apr 24, 2025 9:49


Mikah Sargent takes viewers on a comprehensive tour of the Passwords app in macOS Sequoia, demonstrating how this robust tool serves as a complete credential management system. From passkeys to verification codes and shared passwords, Mikah explores how Apple has created a secure yet user-friendly solution for managing all your login information across devices. Passkeys - These are created automatically when you set up passkey authentication on websites, with limited editing options but the ability to add notes or modify the associated website. Verification codes - Users can add two-factor authentication codes either by entering setup keys manually or scanning QR codes. Wi-Fi - The app stores Wi-Fi network credentials, displays network security information (WPA2/WPA3), and lets users generate QR codes for easy sharing. Security recommendations - The app alerts users when passwords may be compromised in data breaches using Apple's differential privacy techniques that protect user privacy. Password sharing feature - Users can create groups to share specific login credentials with family members or others, with granular control over which passwords are shared. Password importing - The app supports importing passwords from CSV files, though Mikah strongly recommends deleting these files immediately after import for security. Cross-device synchronization - All passwords sync across Apple devices with end-to-end encryption via iCloud. Windows compatibility - Even Windows users can access their passwords through the iCloud Passwords app, making it a versatile solution. Passwords User Guide - Apple Support - https://support.apple.com/guide/passwords/welcome/1.1/mac/15.4.1 Host: Mikah Sargent Download or subscribe to Hands-On Mac at https://twit.tv/shows/hands-on-mac Want access to the ad-free video and exclusive features? Become a member of Club TWiT today! https://twit.tv/clubtwit Club TWiT members can discuss this episode and leave feedback in the Club TWiT Discord.

Total Mikah (Audio)
Hands-On Mac 179: Using the Passwords App in macOS Sequoia

Total Mikah (Audio)

Play Episode Listen Later Apr 24, 2025 9:49 Transcription Available


Mikah Sargent takes viewers on a comprehensive tour of the Passwords app in macOS Sequoia, demonstrating how this robust tool serves as a complete credential management system. From passkeys to verification codes and shared passwords, Mikah explores how Apple has created a secure yet user-friendly solution for managing all your login information across devices. Passkeys - These are created automatically when you set up passkey authentication on websites, with limited editing options but the ability to add notes or modify the associated website. Verification codes - Users can add two-factor authentication codes either by entering setup keys manually or scanning QR codes. Wi-Fi - The app stores Wi-Fi network credentials, displays network security information (WPA2/WPA3), and lets users generate QR codes for easy sharing. Security recommendations - The app alerts users when passwords may be compromised in data breaches using Apple's differential privacy techniques that protect user privacy. Password sharing feature - Users can create groups to share specific login credentials with family members or others, with granular control over which passwords are shared. Password importing - The app supports importing passwords from CSV files, though Mikah strongly recommends deleting these files immediately after import for security. Cross-device synchronization - All passwords sync across Apple devices with end-to-end encryption via iCloud. Windows compatibility - Even Windows users can access their passwords through the iCloud Passwords app, making it a versatile solution. Passwords User Guide - Apple Support - https://support.apple.com/guide/passwords/welcome/1.1/mac/15.4.1 Host: Mikah Sargent Download or subscribe to Hands-On Mac at https://twit.tv/shows/hands-on-mac Want access to the ad-free video and exclusive features? Become a member of Club TWiT today! https://twit.tv/clubtwit Club TWiT members can discuss this episode and leave feedback in the Club TWiT Discord.

Dave and Dujanovic
Password security problems at Utah elections offices

Dave and Dujanovic

Play Episode Listen Later Apr 17, 2025 19:22


Auditors are recommending changes to ensure the security of Utah elections after finding potential vulnerabilities with password management. In some extreme cases, they found that election workers kept passwords on sticky notes next to computers. Taylor Morgan from Inside Sources shares analysis. Jared Houghton, Information Security Manager with Bonneville International, joins the show to explain the risk of weak password and password management.

Entrepreneur Money Stories
Protect Your Business: Simple Cybersecurity Steps Every Entrepreneur Needs to Take – Ep. 217

Entrepreneur Money Stories

Play Episode Listen Later Apr 8, 2025 11:33 Transcription Available


In today's episode, Danielle Hayden, CPA and founder of Kickstart Accounting, Inc., dives into a topic that every small business owner needs to take seriously: cybersecurity. As entrepreneurs, we're focused on growth, profitability, and strategy, but all of that hard work can be put at risk in an instant if we fall victim to cyber threats. A single phishing email, password breach, or scam can lead to lost revenue, stolen data, and massive headaches (and let's be real, none of us have time for that!). But don't worry, we've got you covered! Danielle breaks down the biggest cybersecurity threats facing small businesses and shares simple, practical steps to keep your business and finances safe. Key Takeaways:  Phishing Emails & Texts Are Everywhere: Be on the lookout for fake DocuSign requests, “unpaid” toll or shipping texts, gift card scams, and urgent wire transfer emails. If something feels off, don't click! Verify directly with the sender outside of the potential scam text or email before doing anything and immediately report it. Scammers Want You to Act Fast: Cybercriminals rely on urgency to trick you into clicking malicious links or sharing sensitive information; slow down and verify before taking action. Strong Passwords & Two-Step Authentication Are Essential: Using unique passwords and enabling two-step authentication makes it harder for hackers to gain access to your accounts. Yes, it's annoying but it's worth it! Backup Your Data to the Cloud: Use Google Drive or Microsoft OneDrive for automatic backups so that if your device is compromised, your business documents are safe and easily recoverable. Trust Your Gut & Double-Check Everything: If you weren't expecting an email, text, or request for money or information, take a moment to verify before you click or send anything! It's always okay to say no and follow up through a secure method. Topics Discussed: Common Cyber Scams Targeting Small Businesses (00:01:06 – 00:03:24) How to Spot and Avoid Phishing Emails and Text Scams (00:03:24 – 00:04:53) Best Practices for Password Security and Two-Step Authentication (00:04:53 – 00:06:42) Why Backing Up Your Business Data is Critical (00:06:42 – 00:07:43) The Power of Slowing Down and Verifying Before You Click (00:07:43 – 00:09:18) Recap of Cybersecurity Steps to Take (00:09:18 - 00:10:51)   Book a Call with Kickstart Accounting, Inc.: https://www.kickstartaccountinginc.com/book    Connect with Kickstart Accounting, Inc.: Instagram | https://www.instagram.com/Kickstartaccounting YouTube | https://www.youtube.com/@businessbythebooks  Facebook | https://www.facebook.com/kickstartaccountinginc  

Entrepreneur Money Stories
Protect Your Business: Simple Cybersecurity Steps Every Entrepreneur Needs to Take – Ep. 217

Entrepreneur Money Stories

Play Episode Listen Later Apr 8, 2025 11:33 Transcription Available


In today's episode, Danielle Hayden, CPA and founder of Kickstart Accounting, Inc., dives into a topic that every small business owner needs to take seriously: cybersecurity. As entrepreneurs, we're focused on growth, profitability, and strategy, but all of that hard work can be put at risk in an instant if we fall victim to cyber threats. A single phishing email, password breach, or scam can lead to lost revenue, stolen data, and massive headaches (and let's be real, none of us have time for that!). But don't worry, we've got you covered! Danielle breaks down the biggest cybersecurity threats facing small businesses and shares simple, practical steps to keep your business and finances safe. Key Takeaways:  Phishing Emails & Texts Are Everywhere: Be on the lookout for fake DocuSign requests, “unpaid” toll or shipping texts, gift card scams, and urgent wire transfer emails. If something feels off, don't click! Verify directly with the sender outside of the potential scam text or email before doing anything and immediately report it. Scammers Want You to Act Fast: Cybercriminals rely on urgency to trick you into clicking malicious links or sharing sensitive information; slow down and verify before taking action. Strong Passwords & Two-Step Authentication Are Essential: Using unique passwords and enabling two-step authentication makes it harder for hackers to gain access to your accounts. Yes, it's annoying but it's worth it! Backup Your Data to the Cloud: Use Google Drive or Microsoft OneDrive for automatic backups so that if your device is compromised, your business documents are safe and easily recoverable. Trust Your Gut & Double-Check Everything: If you weren't expecting an email, text, or request for money or information, take a moment to verify before you click or send anything! It's always okay to say no and follow up through a secure method. Topics Discussed: Common Cyber Scams Targeting Small Businesses (00:01:06 – 00:03:24) How to Spot and Avoid Phishing Emails and Text Scams (00:03:24 – 00:04:53) Best Practices for Password Security and Two-Step Authentication (00:04:53 – 00:06:42) Why Backing Up Your Business Data is Critical (00:06:42 – 00:07:43) The Power of Slowing Down and Verifying Before You Click (00:07:43 – 00:09:18) Recap of Cybersecurity Steps to Take (00:09:18 - 00:10:51)   Book a Call with Kickstart Accounting, Inc.: https://www.kickstartaccountinginc.com/book    Connect with Kickstart Accounting, Inc.: Instagram | https://www.instagram.com/Kickstartaccounting YouTube | https://www.youtube.com/@businessbythebooks  Facebook | https://www.facebook.com/kickstartaccountinginc  

The Stacking Benjamins Show
Yet Another Insurance To Avoid (SB1640)

The Stacking Benjamins Show

Play Episode Listen Later Feb 5, 2025 55:40


What do scammers, fancy doors, and Twinkies have in common? Turns out, more than you think! Today, Joe, OG, and Doug take you on a wild ride through financial scams, fraud prevention, tax implications of dual residency, and... the surprising link between door quality and financial stability. (Yeah, we didn't see that one coming either.) What's Inside This Episode?

Cybercrime Magazine Podcast
Security Nudge. Password Security: A Crucial Line Of Defense. Sponsored By CybSafe.

Cybercrime Magazine Podcast

Play Episode Listen Later Feb 4, 2025 1:23


Spanish telecommunications company Telefónica is fighting to recover after cybercriminals stole 2.3 gigabytes of sensitive customer and business data. According to HackRead, the cybercriminals gained access to credentials used by some of the company's employees, which allowed them to access Telefónica's internal JIRA technical support ticketing system. This attack underscores a critical truth for every employee at every organization: your password security is a crucial line of defense. Using strong, unique passwords for work accounts, and changing them regularly, is not just a best practice—it's a fundamental responsibility in today's digital landscape. As Telefónica and so many other companies have found out the hard way, even the best security measures will fail if you hand cybercriminals the key to the front door. The 60-second "Security Nudge" is brought to you by CybSafe, developers of the Human Risk Management Platform. Learn more at https://cybsafe.com

Tech News Weekly (MP3)
TNW 368: Facebook Hopes You'll Befriend AI Influencers - AI Phishing, Retro Tech Revival, Passkey Predicament

Tech News Weekly (MP3)

Play Episode Listen Later Jan 2, 2025 70:32


In the first episode of 2025, Mikah and Abrar discuss Meta's plans to add AI bots to their social media platforms, the rise of AI-generated phishing scams, the trend of parents giving their kids retro tech devices to reduce screen time, and the current state and future potential of passkeys for secure logins. Meta plans to populate Facebook and Instagram with AI-generated bot accounts that can create content, share posts, and interact with users, in an effort to drive engagement as user growth stagnates. Abrar and Mikah debate the pros and cons of AI bots on social media. Cybersecurity experts have seen a significant increase in sophisticated phishing scams using AI to generate hyper-personalized messages mimicking people's communication styles, with over 90% of successful cyberattacks now beginning with phishing emails. Abrar and Mikah discuss cybersecurity training and email filtering used by companies to combat this. There's a growing trend of parents gifting their kids retro tech like Walkmans, portable CD players, and MP3 players in an effort to reduce screen time. Mikah and Abrar reflect on the appeal of single-purpose devices and bonding over music. Passkeys, a new login technology aiming to replace passwords, have seen increasing adoption but face usability challenges and inconsistent implementation across sites and devices. Mikah explains how passkeys work and recommends using password managers for now, as both hosts agree passkeys aren't quite ready for mainstream adoption yet. Hosts: Mikah Sargent and Abrar Al-Heeti Download or subscribe to Tech News Weekly at https://twit.tv/shows/tech-news-weekly. Get episodes ad-free with Club TWiT at https://twit.tv/clubtwit

Tech News Weekly (Video HI)
TNW 368: Facebook Hopes You'll Befriend AI Influencers - AI Phishing, Retro Tech Revival, Passkey Predicament

Tech News Weekly (Video HI)

Play Episode Listen Later Jan 2, 2025 70:31


In the first episode of 2025, Mikah and Abrar discuss Meta's plans to add AI bots to their social media platforms, the rise of AI-generated phishing scams, the trend of parents giving their kids retro tech devices to reduce screen time, and the current state and future potential of passkeys for secure logins. Meta plans to populate Facebook and Instagram with AI-generated bot accounts that can create content, share posts, and interact with users, in an effort to drive engagement as user growth stagnates. Abrar and Mikah debate the pros and cons of AI bots on social media. Cybersecurity experts have seen a significant increase in sophisticated phishing scams using AI to generate hyper-personalized messages mimicking people's communication styles, with over 90% of successful cyberattacks now beginning with phishing emails. Abrar and Mikah discuss cybersecurity training and email filtering used by companies to combat this. There's a growing trend of parents gifting their kids retro tech like Walkmans, portable CD players, and MP3 players in an effort to reduce screen time. Mikah and Abrar reflect on the appeal of single-purpose devices and bonding over music. Passkeys, a new login technology aiming to replace passwords, have seen increasing adoption but face usability challenges and inconsistent implementation across sites and devices. Mikah explains how passkeys work and recommends using password managers for now, as both hosts agree passkeys aren't quite ready for mainstream adoption yet. Hosts: Mikah Sargent and Abrar Al-Heeti Download or subscribe to Tech News Weekly at https://twit.tv/shows/tech-news-weekly. Get episodes ad-free with Club TWiT at https://twit.tv/clubtwit

All TWiT.tv Shows (MP3)
Tech News Weekly 368: Facebook Hopes You'll Befriend AI Influencers

All TWiT.tv Shows (MP3)

Play Episode Listen Later Jan 2, 2025 70:32


In the first episode of 2025, Mikah and Abrar discuss Meta's plans to add AI bots to their social media platforms, the rise of AI-generated phishing scams, the trend of parents giving their kids retro tech devices to reduce screen time, and the current state and future potential of passkeys for secure logins. Meta plans to populate Facebook and Instagram with AI-generated bot accounts that can create content, share posts, and interact with users, in an effort to drive engagement as user growth stagnates. Abrar and Mikah debate the pros and cons of AI bots on social media. Cybersecurity experts have seen a significant increase in sophisticated phishing scams using AI to generate hyper-personalized messages mimicking people's communication styles, with over 90% of successful cyberattacks now beginning with phishing emails. Abrar and Mikah discuss cybersecurity training and email filtering used by companies to combat this. There's a growing trend of parents gifting their kids retro tech like Walkmans, portable CD players, and MP3 players in an effort to reduce screen time. Mikah and Abrar reflect on the appeal of single-purpose devices and bonding over music. Passkeys, a new login technology aiming to replace passwords, have seen increasing adoption but face usability challenges and inconsistent implementation across sites and devices. Mikah explains how passkeys work and recommends using password managers for now, as both hosts agree passkeys aren't quite ready for mainstream adoption yet. Hosts: Mikah Sargent and Abrar Al-Heeti Download or subscribe to Tech News Weekly at https://twit.tv/shows/tech-news-weekly. Get episodes ad-free with Club TWiT at https://twit.tv/clubtwit

Tech News Weekly (Video LO)
TNW 368: Facebook Hopes You'll Befriend AI Influencers - AI Phishing, Retro Tech Revival, Passkey Predicament

Tech News Weekly (Video LO)

Play Episode Listen Later Jan 2, 2025 70:31


In the first episode of 2025, Mikah and Abrar discuss Meta's plans to add AI bots to their social media platforms, the rise of AI-generated phishing scams, the trend of parents giving their kids retro tech devices to reduce screen time, and the current state and future potential of passkeys for secure logins. Meta plans to populate Facebook and Instagram with AI-generated bot accounts that can create content, share posts, and interact with users, in an effort to drive engagement as user growth stagnates. Abrar and Mikah debate the pros and cons of AI bots on social media. Cybersecurity experts have seen a significant increase in sophisticated phishing scams using AI to generate hyper-personalized messages mimicking people's communication styles, with over 90% of successful cyberattacks now beginning with phishing emails. Abrar and Mikah discuss cybersecurity training and email filtering used by companies to combat this. There's a growing trend of parents gifting their kids retro tech like Walkmans, portable CD players, and MP3 players in an effort to reduce screen time. Mikah and Abrar reflect on the appeal of single-purpose devices and bonding over music. Passkeys, a new login technology aiming to replace passwords, have seen increasing adoption but face usability challenges and inconsistent implementation across sites and devices. Mikah explains how passkeys work and recommends using password managers for now, as both hosts agree passkeys aren't quite ready for mainstream adoption yet. Hosts: Mikah Sargent and Abrar Al-Heeti Download or subscribe to Tech News Weekly at https://twit.tv/shows/tech-news-weekly. Get episodes ad-free with Club TWiT at https://twit.tv/clubtwit

Tech News Weekly (Video HD)
TNW 368: Facebook Hopes You'll Befriend AI Influencers - AI Phishing, Retro Tech Revival, Passkey Predicament

Tech News Weekly (Video HD)

Play Episode Listen Later Jan 2, 2025 70:31 Transcription Available


In the first episode of 2025, Mikah and Abrar discuss Meta's plans to add AI bots to their social media platforms, the rise of AI-generated phishing scams, the trend of parents giving their kids retro tech devices to reduce screen time, and the current state and future potential of passkeys for secure logins. Meta plans to populate Facebook and Instagram with AI-generated bot accounts that can create content, share posts, and interact with users, in an effort to drive engagement as user growth stagnates. Abrar and Mikah debate the pros and cons of AI bots on social media. Cybersecurity experts have seen a significant increase in sophisticated phishing scams using AI to generate hyper-personalized messages mimicking people's communication styles, with over 90% of successful cyberattacks now beginning with phishing emails. Abrar and Mikah discuss cybersecurity training and email filtering used by companies to combat this. There's a growing trend of parents gifting their kids retro tech like Walkmans, portable CD players, and MP3 players in an effort to reduce screen time. Mikah and Abrar reflect on the appeal of single-purpose devices and bonding over music. Passkeys, a new login technology aiming to replace passwords, have seen increasing adoption but face usability challenges and inconsistent implementation across sites and devices. Mikah explains how passkeys work and recommends using password managers for now, as both hosts agree passkeys aren't quite ready for mainstream adoption yet. Hosts: Mikah Sargent and Abrar Al-Heeti Download or subscribe to Tech News Weekly at https://twit.tv/shows/tech-news-weekly. Get episodes ad-free with Club TWiT at https://twit.tv/clubtwit Sponsors: zscaler.com/security joindeleteme.com/twit promo code TWIT cachefly.com/twit

All TWiT.tv Shows (Video LO)
Tech News Weekly 368: Facebook Hopes You'll Befriend AI Influencers

All TWiT.tv Shows (Video LO)

Play Episode Listen Later Jan 2, 2025 70:31 Transcription Available


In the first episode of 2025, Mikah and Abrar discuss Meta's plans to add AI bots to their social media platforms, the rise of AI-generated phishing scams, the trend of parents giving their kids retro tech devices to reduce screen time, and the current state and future potential of passkeys for secure logins. Meta plans to populate Facebook and Instagram with AI-generated bot accounts that can create content, share posts, and interact with users, in an effort to drive engagement as user growth stagnates. Abrar and Mikah debate the pros and cons of AI bots on social media. Cybersecurity experts have seen a significant increase in sophisticated phishing scams using AI to generate hyper-personalized messages mimicking people's communication styles, with over 90% of successful cyberattacks now beginning with phishing emails. Abrar and Mikah discuss cybersecurity training and email filtering used by companies to combat this. There's a growing trend of parents gifting their kids retro tech like Walkmans, portable CD players, and MP3 players in an effort to reduce screen time. Mikah and Abrar reflect on the appeal of single-purpose devices and bonding over music. Passkeys, a new login technology aiming to replace passwords, have seen increasing adoption but face usability challenges and inconsistent implementation across sites and devices. Mikah explains how passkeys work and recommends using password managers for now, as both hosts agree passkeys aren't quite ready for mainstream adoption yet. Hosts: Mikah Sargent and Abrar Al-Heeti Download or subscribe to Tech News Weekly at https://twit.tv/shows/tech-news-weekly. Get episodes ad-free with Club TWiT at https://twit.tv/clubtwit Sponsors: zscaler.com/security joindeleteme.com/twit promo code TWIT cachefly.com/twit

Total Mikah (Video)
Tech News Weekly 368: Facebook Hopes You'll Befriend AI Influencers

Total Mikah (Video)

Play Episode Listen Later Jan 2, 2025 70:31 Transcription Available


In the first episode of 2025, Mikah and Abrar discuss Meta's plans to add AI bots to their social media platforms, the rise of AI-generated phishing scams, the trend of parents giving their kids retro tech devices to reduce screen time, and the current state and future potential of passkeys for secure logins. Meta plans to populate Facebook and Instagram with AI-generated bot accounts that can create content, share posts, and interact with users, in an effort to drive engagement as user growth stagnates. Abrar and Mikah debate the pros and cons of AI bots on social media. Cybersecurity experts have seen a significant increase in sophisticated phishing scams using AI to generate hyper-personalized messages mimicking people's communication styles, with over 90% of successful cyberattacks now beginning with phishing emails. Abrar and Mikah discuss cybersecurity training and email filtering used by companies to combat this. There's a growing trend of parents gifting their kids retro tech like Walkmans, portable CD players, and MP3 players in an effort to reduce screen time. Mikah and Abrar reflect on the appeal of single-purpose devices and bonding over music. Passkeys, a new login technology aiming to replace passwords, have seen increasing adoption but face usability challenges and inconsistent implementation across sites and devices. Mikah explains how passkeys work and recommends using password managers for now, as both hosts agree passkeys aren't quite ready for mainstream adoption yet. Hosts: Mikah Sargent and Abrar Al-Heeti Download or subscribe to Tech News Weekly at https://twit.tv/shows/tech-news-weekly. Get episodes ad-free with Club TWiT at https://twit.tv/clubtwit Sponsors: zscaler.com/security joindeleteme.com/twit promo code TWIT cachefly.com/twit

Total Mikah (Audio)
Tech News Weekly 368: Facebook Hopes You'll Befriend AI Influencers

Total Mikah (Audio)

Play Episode Listen Later Jan 2, 2025 70:32 Transcription Available


In the first episode of 2025, Mikah and Abrar discuss Meta's plans to add AI bots to their social media platforms, the rise of AI-generated phishing scams, the trend of parents giving their kids retro tech devices to reduce screen time, and the current state and future potential of passkeys for secure logins. Meta plans to populate Facebook and Instagram with AI-generated bot accounts that can create content, share posts, and interact with users, in an effort to drive engagement as user growth stagnates. Abrar and Mikah debate the pros and cons of AI bots on social media. Cybersecurity experts have seen a significant increase in sophisticated phishing scams using AI to generate hyper-personalized messages mimicking people's communication styles, with over 90% of successful cyberattacks now beginning with phishing emails. Abrar and Mikah discuss cybersecurity training and email filtering used by companies to combat this. There's a growing trend of parents gifting their kids retro tech like Walkmans, portable CD players, and MP3 players in an effort to reduce screen time. Mikah and Abrar reflect on the appeal of single-purpose devices and bonding over music. Passkeys, a new login technology aiming to replace passwords, have seen increasing adoption but face usability challenges and inconsistent implementation across sites and devices. Mikah explains how passkeys work and recommends using password managers for now, as both hosts agree passkeys aren't quite ready for mainstream adoption yet. Hosts: Mikah Sargent and Abrar Al-Heeti Download or subscribe to Tech News Weekly at https://twit.tv/shows/tech-news-weekly. Get episodes ad-free with Club TWiT at https://twit.tv/clubtwit Sponsors: zscaler.com/security joindeleteme.com/twit promo code TWIT cachefly.com/twit

MillionKids.org
Million Kids Exploited - Special Guest Mack Jackson, Jr., Cyber Security Expert

MillionKids.org

Play Episode Listen Later Dec 29, 2024 49:48


Mack Jackson Jr is a cyber security speaker and consultant that works with complex corporate cybersecurity issues. He provides expert consulting and employee training to mitigate risks by educating the work force about cybercrimes. Mack also has a heart for helping individuals stay safe online. Mack will share about his two new e books: “The Ultimate Guide to Password Security” and “Cybersecurity Basics for Non-Techies”. The year 2025 will bring many changes affecting corporations, businesses and individuals. Businesses, individuals, our kids and the elderly are starting to see the results of global scam farms targeting naïve and unsuspecting people to generate billions of dollars in cartel revenue. At the same time, we are seeing the results of artificial intelligence, character AI, and bots that can access our passwords, our personal information, and build relationships that can be used to seduce and groom, the most innocent people including our kids and the elderly. Cybercrime is a multibillion-dollar industry and it is critical that all of us become educated about how global predators operate and how to protect ourselves. --- Support this podcast: https://podcasters.spotify.com/pod/show/million-kids/support

Saturday Morning with Jack Tame
Paul Stenhouse: Password security 101

Saturday Morning with Jack Tame

Play Episode Listen Later Dec 20, 2024 6:21 Transcription Available


Paul Stenhouse joins the show to talk password security 101. Use a password manager: A password manager can generate, store, and fill in your passwords for you. This can help you create and remember strong, unique passwords for each account. Use strong passwords: Passwords should be at least 12 characters long and include symbols, numbers and a mix of uppercase and lowercase letters. Avoid dictionary words, personal data, sequential numbers, repeated numbers, and keyboard patterns. Tip: try a "pass phrase" of multiple words or numbers strung together" Use different passwords for different accounts: Using the same password for multiple accounts makes your data more vulnerable. If a hacker guesses your password for one account, they can try it on all of your accounts. Use multi-factor authentication: It's annoying, but multi-factor authentication adds layers of protection so even if someone has your password, they still need that second factor of authentication too. Bonus points.. try adding a Pass Key. It's like an advanced password that is super long, and is uniquely tied to the website/app that you created it with. So if you ever ended up on a look-a-like fake website, your credentials wouldn't even be sent. LISTEN ABOVE. See omnystudio.com/listener for privacy information.

レアジョブ英会話 Daily News Article Podcast
Meta hit with $102 million privacy fine from European Union over 2019 password security lapse

レアジョブ英会話 Daily News Article Podcast

Play Episode Listen Later Oct 24, 2024 1:56


Meta was punished in September with a fine worth more than $100 million from the social media giant's European Union privacy regulator over a security lapse involving passwords for Facebook users. The Irish Data Protection Commission said it slapped the U.S. tech company with a 91-million-euro ($101.6-million) penalty following an investigation. The watchdog started investigating in 2019 after it was notified by Meta that some passwords had been inadvertently stored internally in plain text, which means they weren't encrypted and it was possible for employees to search for them. Deputy Commissioner Graham Doyle said it's “widely accepted” that user passwords should not be stored in plain text, “considering the risks of abuse.” Meta said a security review found that a “subset” of Facebook users' passwords were “temporarily logged in a readable format.” “We took immediate action to fix this error, and there is no evidence that these passwords were abused or accessed improperly,” the company said in a statement. “We proactively flagged this issue to our lead regulator, the Irish Data Protection Commission, and have engaged constructively with them throughout this inquiry.” It's the latest in a series of hefty fines for Meta and its social media platforms from the Dublin-based watchdog, which is the company's lead regulator under the 27-nation EU's stringent data privacy rulebook. They include a 405 million euro fine for Instagram over mishandling teen data, a 5.5 million euro penalty involving WhatsApp, and a 1.2 billion euro fine for Meta over transatlantic data transfers. This article was provided by The Associated Press.

Tamara Chaos
Freedom in Christ: Supporting Each Other's Burdens/Password Security Tips

Tamara Chaos

Play Episode Listen Later Oct 11, 2024 35:33


Hello Friends: When we are navigating through this world, it can be difficult if we don't get any encouragement from others or any hope. I, with the help of the holy spirit, hope to spread hope to everyone through my words and music. You are not alone. You are loved and adored. You are needed. You do matter. These podcasts are also available on YouTube, Rumble and Spotify. YouTube: www.youtube.com/@TamaraChaos Rumble: rumble.com/c/c-6645651 Spotify: podcasters.spotify.com/pod/show/tamarachaos Let's connect: Facebook: https://bit.ly/45C2Q3e Instagram: https://bit.ly/3S0BMY3 Blog: https://bit.ly/48OjaAB Links for other socials: https://linktr.ee/tamarachaos Emmanuel by April Marie: If you are interested in Emmanuel by April Marie, you can check it out here: Lulu.com http://www.lulu.com/spotlight/hawkmatrix Barnes and Noble http://www.barnesandnoble.com/w/emmanuel-april-marie/1120753655?ean=9781430329886 Amazon.com http://www.amazon.com/Emmanuel-April-Marie/dp/1430329882/ref=sr_1_1?ie=UTF8&qid=1455811023&sr=8-1&keywords=Emmanuel+by+April+Marie Shama Patel: eveninglightdesigns.com --- Support this podcast: https://podcasters.spotify.com/pod/show/tamarachaos/support

Technology for Business
Password Security 101

Technology for Business

Play Episode Listen Later Oct 8, 2024 27:08


Buckle up for a riveting journey into the heart of password security with Nate, CIT's cybersecurity maverick! In this gripping episode, he unravels the mysteries behind creating hack-proof passwords and unveils the future of passwordless authentication. Get ready to be captivated as Nate dishes out mind-blowing insights, shattering conventional wisdom and leaving you begging for more. From the challenges of current password standards to the game-changing NIST guidelines, he takes you on a roller-coaster ride through the ever-evolving landscape of digital protection. But that's not all – Nate's infectious enthusiasm will have you rethinking password managers and embracing the art of cyber resilience like a true security ninja. Brace yourself for an adrenaline-fueled adventure that will forever change how you view password security!Learn more about Password Security: NIST password guidelines Password basicsGet the Password tip sheetPassword Managers

The SysAdmin DOJO Podcast
New Password Requirements from NIST

The SysAdmin DOJO Podcast

Play Episode Listen Later Oct 2, 2024 36:12


In this episode of the Security Swarm Podcast, host Andy Syrewicze and guest Michael Posey discuss the new password guidelines and recommendations released by NIST (National Institute of Standards and Technology). They cover a range of topics related to password security, including the importance of password length over complexity, the move away from composition rules and periodic password changes, the risks associated with knowledge-based authentication, the concept of password entropy, and more!   Throughout the conversation, Andy and Michael draw on their extensive experience in the cybersecurity field to offer practical advice and perspectives on the changing landscape of password security.   Do you want to join the conversation? Join us in our Security Lab LinkedIn Group!  Key Takeaways:  NIST recommends a minimum password length of 8 characters, with a suggested length of 15 characters or more.   NIST has recommended removal of the requirement for password composition rules, such as the need for special characters, numbers, and uppercase letters.   NIST states that password providers SHALL NOT require periodic password changes unless there is evidence of a breach, as this can lead to users creating predictable password patterns.   The use of ASCII and Unicode characters is now encouraged, allowing for more diverse and random password options.   Password entropy (randomness) is more important than password complexity, as modern computing power can quickly crack simple but complex-looking passwords.   For mission-critical systems, organizations may still choose to implement more rigorous password policies, even if they deviate from the NIST recommendations.   The industry is exploring new hashing methods and technologies, such as passkeys, to address the challenges posed by GPU-based brute-force attacks.  Timestamps:  (07:40) Credential Service Provider (CSP) Requirements and Recommendations   (10:02) Removing Password Composition Rules   (14:21) Ending Periodic Password Changes   (19:48) The Importance of Password Entropy and Length   (28:30) Phasing Out Knowledge-Based Authentication   (30:30) The Impact of Password Length on Cracking Time  Episode Resources:  NIST Publication 800-63B -- To enhance your organization's security posture, consider implementing Hornetsecurity's Advanced Threat Protection. This solution provides AI-powered defense against sophisticated attacks, ensuring your emails and data remain secure. By adopting best practices in password management and utilizing advanced security features, you can significantly reduce the risk of breaches. Protect your business today and stay one step ahead of cyber threats. Learn more about Advanced Threat Protection here. 

The Other Side Of The Firewall
The Weekly Run Down 7/12/24

The Other Side Of The Firewall

Play Episode Listen Later Jul 14, 2024 36:58


In this conversation, Ryan and Shannon discuss various topics, including cybersecurity news, movies, and TV series. They mention OpenAI being victims of espionage, the impact of password compilations, and the role of CISOs. They also talk about the movies they watched, such as 'The Beekeeper' and 'Clipped,' and the TV series 'Barbershop.' They share their thoughts on actors like Jason Statham and Tyrese Gibson, as well as their favorite comedy movies like 'Coming to America' and 'Friday.' In this conversation, Ryan and Shannon discuss various topics including movies, holidays, gaming, and cultural differences. They talk about old movies and the challenges of remaking them with deceased actors. They also discuss the observation of holidays and the inconvenience of having them in the middle of the week. They share their gaming experiences and recommend games to each other. They touch on the topic of children watching horror movies and the cultural differences in nudity and violence. Please LISTEN

The Treasury Update Podcast
Coffee Break Session #112: What Is Authentication?

The Treasury Update Podcast

Play Episode Listen Later Jun 20, 2024 7:56


In today's podcast, we'll hear from Christin Cifaldi, Director of Product Development & Analytics, discussing authentication in digital systems. What is authentication, and why is it crucial? Tune in to find out.

Cloud Security Podcast
Cybersecurity Best Practices and Password Security in Cloud and AI

Cloud Security Podcast

Play Episode Listen Later Jan 26, 2024 29:59


We caught up with Troy Hunt and Scott Helme at NDC Security Oslo 2024 to talk about best practices when it come to decoding TLS, password security and data breaches in cloud and AI. Troy Hunt, known for his work with haveibeenpwned.com, spoke to us about the complexities of cloud deployment and paradox of data input versus privacy risk in Large Language Models (LLMs), Cloud. Scott Helme, a security researcher and founder of securityheaders.com, spoke about the importance of early security training in the development lifecycle for applications built in 2024. We dissected the critical yet often overlooked aspects of cybersecurity in cloud and ai. Guest Socials: ⁠Troy Hunt + Scott Helme Podcast Twitter - ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠@CloudSecPod⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ If you want to watch videos of this LIVE STREAMED episode and past episodes - Check out our other Cloud Security Social Channels: - ⁠⁠⁠⁠⁠⁠Cloud Security Podcast- Youtube⁠⁠⁠⁠⁠⁠ - ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Cloud Security Newsletter ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ - ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Cloud Security BootCamp⁠⁠ Questions asked: (00:00) Introduction (01:37) Evolving Landscape of Password Management (04:17) Analyzing Data Breach Trends: (05:48) Latest Security Protocols with TLS and Encryption (08:24) Debating Encryption Key Management (10:59) AI's Role in Data Breaches: (13:59) Best Practices for Enterprise Password Management (16:01) Best Practices for Password Management in Small to Medium Sized Businesses (18:04) Top 5 security best practices (19:58) Understanding Security Headers (27:14) The Fun Section

Three Cartoon Avatars
EP 91: How George Kurtz Built A $65B+ Company - The CrowdStrike Story

Three Cartoon Avatars

Play Episode Listen Later Jan 19, 2024 97:15


(0:00) Intro(1:52) The Journey to Founding CrowdStrike(2:38) The Difference Between Stopping Malware and Stopping Breaches(3:27) Inspiration Behind CrowdStrike's Unique Approach(4:30) Challenges of Building a New Architecture in Cybersecurity(5:10) The Decision to Leave McAfee and Start CrowdStrike(8:11) Early Days of CrowdStrike: Building the Product and Offering Services(9:45) Unexpected Beginnings of CrowdStrike's Intelligence Product(10:33) The Role of Incident Response in Cybersecurity(11:16) Journey to Becoming a Software Business(14:36) Evolution of CrowdStrike's Product Offering(19:54) The Importance of Building Trust and Credibility in Cybersecurity(20:27) The Role of Nation States and Cybercrime in the Growth of Cybersecurity Threats(25:09) Experience of Handling High-Profile Cybersecurity Incidents(26:16) The Importance of Having the Right Investors and Board Members(34:08) The Strategy Behind Competing with Big Players Like Microsoft(42:09) The Importance of Having the Right Team and Leadership(43:53) The Challenges and Rewards of Scaling a Cybersecurity Company(48:49) Hiring and Retaining the Right People(49:49) Understanding Different Types of Salespeople(51:52) The Importance of Marketing and PR in Business(55:59) The Role of Nation State, E Crime, and Hacktivism in Cybersecurity(1:05:03) Impact of AI on Cybersecurity(1:09:36) The Importance of Password Security(1:10:41) New SEC Reporting Rule for Cybersecurity Breaches(1:14:48) The Role of AI in the Future of Cybersecurity(1:17:42) The Journey to Entrepreneurship(1:19:58) Importance of Timing in Starting a Business(1:25:06) Impact of Early Life Experiences on Entrepreneurship(1:26:58) The Role of Sports in Developing Leadership Skills(1:29:41) Transition from Accounting to Entrepreneurship(1:29:55) Importance of Timing and Market Readiness in Entrepreneurship(1:35:32) The Role of Teamwork in Business Success Produced: Rashad Assir & Leah ClapperMixed and edited: Justin HrabovskyExecutive Producer: Josh Machiz 

Gravity - The Digital Agency Power Up : Weekly shows for digital marketing agency owners.
Bootstrapping, Cyber Security & Finding Creator Confidence, with Jai Aenugu

Gravity - The Digital Agency Power Up : Weekly shows for digital marketing agency owners.

Play Episode Listen Later Jan 15, 2024 49:35


In this episode of The Personal Brand Business Show, join me as I welcome Jai Aenugu, founder of Techforce Cyber, to discuss content marketing, cybersecurity and his journey from IT manager to successful entrepreneur. The conversation highlights the importance of specific proactive cybersecurity measures for small businesses and the significant financial and reputational risks posed by cyber attacks. Some of the things we covered.1. "The Purple Cow Approach: Standing Out in Personal Branding" - Exploring the concept of being a "purple cow" in the business world, standing out from the crowd, and how uniqueness can impact personal branding and content marketing strategies.2. "Cybersecurity for Small Businesses: Proactive vs. Reactive Approach" - Highlighting the importance of proactive cybersecurity measures for small businesses, discussing the common mistake of being reactive, and providing tips for safeguarding against cyber threats.3. "The Emotional Vulnerability in Cybersecurity: Protecting Against Voice Phishing" - Understanding how emotional vulnerability can make individuals susceptible to cyber scams, with a focus on voice phishing and its potential impact on businesses.4. "Journey to Entrepreneurship: From IT Manager to Cybersecurity Founder" - Sharing the personal journey of Jai Aenugu, from struggling to attract clients and sustaining his business, to founding and growing Techforce Cyber, providing inspiration for aspiring entrepreneurs.5. "Content Marketing for Business Growth: Lessons from Jai Aenugu" - Discussing the impact of content marketing on business growth, highlighting Jai Aenugu's journey and his focus on creating engaging and valuable online content to build his business.6. "Phishing Attacks During the Festive Season: Staying Safe Online" - Raising awareness about the increase in phishing attacks targeting online shoppers during Christmas, providing practical tips to stay safe online during the festive season.7. "Password Security and Two-Factor Authentication: Essential Practices for Cyber Protection" - Providing comprehensive guidance on password security, the importance of two-factor authentication, and implementing essential practices for cyber protection in business and personal contexts.https://techforce.co.uk/----Get your copy of my Personal Brand Business Blueprint It's the FREE roadmap to starting, scaling or just fixing your expert business.www.amplifyme.agency/roadmap----Subscribe to my Youtube!! Follow on Instagram and Twitter @bobgentleJoin the Amplify Insiders Facebook Community : www.amplifyme.agency/insidersPlease take a second to rate this show in Apple Podcasts. ❤ It will mean a lot to me.

GOTO - Today, Tomorrow and the Future
Unlocking the Web: Exploring WebAuthn & Beyond • Eli Holderness & Mark Rendle

GOTO - Today, Tomorrow and the Future

Play Episode Listen Later Jan 5, 2024 27:42 Transcription Available


This interview was recorded at GOTO Amsterdam for GOTO Unscripted.gotopia.techRead the full transcription of this interview hereEli Holderness - Developer Advocate at ScalewayMark Rendle - Creator of Visual ReCode with 7 Microsoft MVP Awards & 30+ Years of Experience Building SoftwareRESOURCESElitwitter.com/eliholdernesslinkedin.com/in/eli-holderness-4890b886hachyderm.io/@eliMarktwitter.com/markrendlegithub.com/markrendlelinkedin.com/in/markrendleDESCRIPTIONMark Rendle interviews Eli Holderness, a developer advocate at Scaleway, about WebAuthn and the future of web authentication. Eli explains the intricacies of WebAuthn, delving into public key cryptography and hardware security tokens.The conversation extends to broader topics, including data privacy, the challenges of passwordless authentication, and the potential impact of WebAssembly on cloud computing.The interview provides insights into the evolving landscape of web development, security, and cloud services, offering a glimpse into the advancements and challenges faced by developers and cloud providers.RECOMMENDED BOOKSLiz Rice • Container SecurityLiz Rice • Kubernetes SecurityAaron Parecki • OAuth 2.0 SimplifiedAaron Parecki • OAuth 2.0 ServersAaron Parecki • The Little Book of OAuth 2.0 RFCsErdal Ozkaya • Cybersecurity: The Beginner's GuideRicher & Sanso • OAuth 2 in ActionTwitterInstagramLinkedInFacebookLooking for a unique learning experience?Attend the next GOTO conference near you! Get your ticket: gotopia.techSUBSCRIBE TO OUR YOUTUBE CHANNEL - new videos posted daily!

The Shared Security Show
Password Security for the Elderly: Tips and Best Practices

The Shared Security Show

Play Episode Listen Later Dec 18, 2023 18:04


In episode 308, we discuss the often overlooked topic of password management for the elderly. Addressing the commonly held belief that writing down passwords is a bad idea, we discuss the nuances and context of this practice. Elderly individuals who may struggle with technology can benefit from recording passwords, but we discuss the importance of […] The post Password Security for the Elderly: Tips and Best Practices appeared first on Shared Security Podcast.

It's 5:05! Daily cybersecurity and open source briefing
Episode #288: Edwin Kwan: WhatsApp Updates Password Security; Katy Craig: AI Alliance to Compete with Closed Source LLMs; Hillary Coover: 23andMe: Guard Your DNA Data, Protect Your Family; Marcel Brown: This Day in Tech History

It's 5:05! Daily cybersecurity and open source briefing

Play Episode Listen Later Dec 6, 2023 10:33


Free, ungated access to all 285+ episodes of “It's 5:05!” on your favorite podcast platforms: https://bit.ly/505-updates. You're welcome to

RRR FM
Helping Wildlife, Password Security & Linguistics

RRR FM

Play Episode Listen Later Nov 30, 2023 78:36


The team compare their tyre changing abilities; CEO of Wildlife Victoria, Lisa Palma, explains how to best take care of wild animals this summer; Film reviewer Simone Ubaldi talks us through the new satirical teen comedy Bottoms; Nat has been confronted by password security questions; linguist Kate Burridge speaks on the words that helped to wrongly convict Kathleen Folbigg; Book enthusiast Fi Wright reviews memoir Scenes from my Life by Michael K Williams; and comedian Matt Stewart shares his work experience story. With presenters Monique Sebire, Daniel Burt & Nat Harris.Website: https://www.rrr.org.au/explore/programs/breakfasters/Facebook: https://www.facebook.com/Breakfasters3RRRFM/Twitter: https://twitter.com/breakfasters

TWiT Bits (MP3)
TWiG Clip: The Other Shoe Drops on Lastpass Breach

TWiT Bits (MP3)

Play Episode Listen Later Sep 7, 2023 16:19


Leo Laporte, Glenn Fleishman and Ant Pruitt discuss the latest news on the Lastpass breach of 2022. There has been more happening online since the breach. For the full episode, visit twit.tv/twig/732 Hosts: Leo Laporte and Ant Pruitt Guest: Glenn Fleishman You can find more about TWiT and subscribe to our podcasts at https://podcasts.twit.tv/ Sponsor: GO.ACILEARNING.COM/TWIT

TWiT Bits (Video HD)
TWiG Clip: The Other Shoe Drops on Lastpass Breach

TWiT Bits (Video HD)

Play Episode Listen Later Sep 7, 2023 16:19


Leo Laporte, Glenn Fleishman and Ant Pruitt discuss the latest news on the Lastpass breach of 2022. There has been more happening online since the breach. For the full episode, visit twit.tv/twig/732 Hosts: Leo Laporte and Ant Pruitt Guest: Glenn Fleishman You can find more about TWiT and subscribe to our podcasts at https://podcasts.twit.tv/ Sponsor: GO.ACILEARNING.COM/TWIT

CISO Tradecraft
#143 - Authentication, Rainbow Tables, and Password Managers

CISO Tradecraft

Play Episode Listen Later Aug 21, 2023 45:18


Here's a nice overview of cybersecurity on passwords, authentication, rainbow tables, and password managers. Enjoy the show and check out our other podcasts. Special Thanks to our Sponsors: Risk3Sixty: Being able to clearly articulate your vision for your security program to the board and other executives within your firm is critical to obtaining the buy in you need for your program's success. Risk3Sixty has created a presentation template that helps you structure your thoughts while telling a compelling story about where you want your security program to go. Download it today for free at: https://risk3sixty.com/?utm_source=cisotradecraft&utm_medium=podcast&utm_campaign=2023-ct&utm_term=1week&utm_content=sponser CPrime: Visit https://www.cprime.com/train to schedule an IT governance workshop to align expectations, capture priorities, and improve effective governance across your entire technology portfolio. Use the code CPRIMEPOD to get 15% off your training course purchase. Transcripts: https://docs.google.com/document/d/1BD6LnITOpq6wrM2CsJzCHefN0Dw4hFp9  Chapters 00:00 Introduction 02:02 Evaluating Password Management Solutions and Design-Making Approaches 05:36 Password Security and Authentication Methods 27:25 Background Sanitization, Password Storage, and Login Screen Risks 28:52 The Importance of Commercial Password Managers and Security Threats 31:27 Considerations for Choosing a Password Manager

In Case You Get Hit By A Podcast
Password Security

In Case You Get Hit By A Podcast

Play Episode Listen Later Aug 21, 2023 14:48


This week we're sharing realistic tips for you passwords, and making sure all of your online accounts are totally secure.

Wiser Roundtable Podcast
Crypto Special: Tips to Secure Your Passwords and Cryptocurrency Assets

Wiser Roundtable Podcast

Play Episode Listen Later Jul 5, 2023 33:24 Transcription Available


How secure is your digital life, especially when it comes to cryptocurrency? This week, on A Wiser Retirement™ Podcast, Casey Smith is joined by Robert Swarthout, founder, CEO, and portfolio manager of Teton Crypto Capital, to discuss the essential role of password managers and two-factor authentication in safeguarding your digital assets. Don't miss this episode that will provide valuable insights and advice on protecting your digital presence and navigating the ever-evolving landscape of cryptocurrency.As digital security becomes even more critical, we explore the potential risks associated with storing passwords on your browser and the importance of having a hardware wallet for your crypto assets. We also discuss the dangers of leaving your laptop on an airplane and how fingerprint scans, Face ID, and other security measures can help protect your devices. Robert shares his expert knowledge on securing your assets and the risks of using exchanges.Finally, we dive into the world of crypto custody and ETFs, examining the ongoing turf war between the SEC and CFTC over-regulation and the history of Bitcoin ETFs. We cover the basics of managing a wallet and discuss if it passes the "grandma test" for ease of use. We also unpack recent events involving the SEC, Binance, and Coinbase, analyzing the potential implications for the future of US crypto regulation.Podcast Episodes Referenced:- Ep 167: Crypto Special: The SEC and Crypto- Ep 161: Crypto Special: Why Crypto is So Confusing to the Average InvestorDownload Our eBook: "Buyer Beware: Why do they keep trying to sell you that annuity?"Click here to schedule a consultation with one of our financial advisors.Connect With Us:Our WebsiteYouTubeFacebookLinkedInInstagramTwitterPodcastBlog This podcast was produced by Wiser Wealth Management. Thanks for listening!

ITSPmagazine | Technology. Cybersecurity. Society
Beyond the Code: The Human Side of Cybersecurity and Social Engineering | A Conversation with Aunshul Rege | Redefining CyberSecurity Podcast With Sean Martin

ITSPmagazine | Technology. Cybersecurity. Society

Play Episode Listen Later May 10, 2023 44:51


Guest: Aunshul Rege, Director at The CARE Lab at Temple University [@TU_CARE]On Linkedin | https://www.linkedin.com/in/aunshul-rege-26526b59/On Twitter | https://twitter.com/Prof_Rege____________________________Host: Sean Martin, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining CyberSecurity Podcast [@RedefiningCyber]On ITSPmagazine | https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/sean-martin____________________________This Episode's SponsorsPentera | https://itspm.ag/penteri67aCrowdSec | https://itspm.ag/crowdsec-b1vp___________________________Episode NotesWelcome to a riveting new episode of the Redefining Cybersecurity Podcast, hosted by Sean Martin! Today, we're diving into the fascinating world of social engineering and the crucial role of education in understanding cybersecurity. Join us in this engaging conversation with Aunshul Rege from Temple University, who does amazing work in helping students comprehend the importance of cybersecurity and how social engineering plays a vital part in it.Imagine a world where computer science students and liberal arts students come together to tackle cybersecurity challenges from different angles. Aunshul Rege is an associate professor at the Department of Criminal Justice at Temple University, who has a unique journey starting as a software engineer and eventually realizing that computer science wasn't enough to answer the who, why, and how of cyber attacks. Her passion for understanding human behavior, sociology, and cybersecurity led her to explore the liberal arts side of cybersecurity.In this episode, Aunshul talks about her innovative teaching methods, where she pushes her students to collaborate across disciplines and explore the importance of social engineering in cyber attacks. From shoulder surfing activities to discussing ethics and multidisciplinary teamwork, her students learn to appreciate the different skill sets and perspectives they bring to the table.But it's not just about the technical aspect of cybersecurity. Aunshul's approach to teaching focuses on building students' understanding of human behavior and psychology in cyber attacks, emphasizing the value of social engineering in both the attack and defense aspects of cybersecurity.As you listen to this fascinating conversation, you'll discover the powerful impact of merging computer science and liberal arts perspectives, the importance of ethics in cybersecurity, and how Aunshul's unique teaching methods help students appreciate their role in the ever-evolving world of cybersecurity.So, get ready to be inspired by Aunshul's story and her innovative approach to cybersecurity education. You won't want to miss this captivating episode that challenges our understanding of cybersecurity and the critical role of social engineering in it. And don't forget to share this episode, subscribe to the podcast, and join us for more insightful conversations on Redefining Cybersecurity.____________________________Watch this and other videos on ITSPmagazine's YouTube ChannelRedefining CyberSecurity Podcast with Sean Martin, CISSP playlist

Privacy Files
Password Security

Privacy Files

Play Episode Listen Later May 3, 2023 54:57


World Password Day is May 4, 2023. And with 80% of hacking-related breaches being linked to passwords, this Intel-conceived annual event, is an opportunity to raise awareness about the importance of strong passwords and fight back against bad actors. It's a great reminder to take inventory of your accounts and reassess all login credentials--especially financial accounts. Take an extra hard look at account passwords for checking, savings, credit cards, peer-to-peer payment apps and investments. If there are accounts you haven't used in a while, consider whether it's worth keeping them open. The more password-protected accounts you hold, the greater your exposure is to a data breach. In this episode of Privacy Files, we examine the topic of password security. From longer and more complex passwords, to multifactor authentication and password managers, there are many tools available for upping your password game. Every study of a topic typically begins with the statistics. And it's no different here as we highlighted the most interesting facts about passwords. For instance, 59% of people use their name or birth date in their password. Definitely not a good idea! Even more fascinating--only 45% of people said they would change a password after a breach. 42% of organizations rely on sticky notes for password management. Again...not a good idea! One of the more concerning stats is about the reuse of passwords. Almost two-thirds of people use the same password across multiple accounts. While traditional advice typically includes resetting passwords every so often, more experts are now recommending the use of a password manager to store long and complex passwords that never need to be reset. Combine this approach with multifactor authentication and the security of your accounts should be at their maximum. In fact, research indicates that multifactor authentication blocks 99.9% of all attacks. Those are pretty convincing results. We also briefly touch on other secure access methods such as biometrics, passkeys, security keys and decentralized identity. Links Referenced: https://www.cbsnews.com/news/netflix-password-crackdown-timeline-sharing-paid-earnings-q1-2023/ https://www.foxnews.com/tech/ai-tech-can-crack-common-passwords-stunning-speed-researchers-find https://www.tomshardware.com/news/thermal-cameras-and-machine-learning-combine-to-snoop-out-passwords https://www.comparitech.com/blog/information-security/password-statistics/ https://www.wired.com/story/best-password-managers/ OUR SPONSORS: Anonyome Labs - Makers of MySudo and Sudo Platform. Take back control of your personal data. www.anonyome.com MySudo - The world's only all-in-one privacy app. Communicate and transact securely and privately. Talk, text, email, browse, shop and pay, all from one app. Stay private. www.mysudo.com Sudo Platform - The cloud-based platform companies turn to for seamlessly integrating privacy solutions into their software. Easy-to-use SDKs and APIs for building out your own branded customer apps like password managers, virtual cards, private browsing, identity wallets (decentralized identity), and secure, encrypted communications (e.g., encrypted voice, video, email and messaging). www.sudoplatform.com

All TWiT.tv Shows (MP3)
This Week in Enterprise Tech 530: The Death of "The Password"

All TWiT.tv Shows (MP3)

Play Episode Listen Later Feb 11, 2023 66:44


CISA releases recovery script for ESXiArgs ransomware victims MagicWeb mystery highlights Nobelium attacker's sophistication Challenges facing Bing, Bard and AI search in the future Amazon secures key FCC approval to deploy its Project Kuiper broadband satellites Have PLC's overstayed their welcome? John Engates, Field Chief Technology Officer from Cloudflare talks about MFA and passwordless options for the enterprise. Hosts: Louis Maresca, Brian Chee, and Curtis Franklin Guest: John Engates Download or subscribe to this show at https://twit.tv/shows/this-week-in-enterprise-tech. Get episodes ad-free with Club TWiT at https://twit.tv/clubtwit Sponsors: ZipRecruiter.com/twiet kolide.com/twiet Miro.com/podcast

This Week in Enterprise Tech (Video HD)
TWiET 530: The Death of "The Password" - Have PLC's overstayed their welcome? Passwordless options with Cloudflare

This Week in Enterprise Tech (Video HD)

Play Episode Listen Later Feb 11, 2023 66:44


CISA releases recovery script for ESXiArgs ransomware victims MagicWeb mystery highlights Nobelium attacker's sophistication Challenges facing Bing, Bard and AI search in the future Amazon secures key FCC approval to deploy its Project Kuiper broadband satellites Have PLC's overstayed their welcome? John Engates, Field Chief Technology Officer from Cloudflare talks about MFA and passwordless options for the enterprise. Hosts: Louis Maresca, Brian Chee, and Curtis Franklin Guest: John Engates Download or subscribe to this show at https://twit.tv/shows/this-week-in-enterprise-tech. Get episodes ad-free with Club TWiT at https://twit.tv/clubtwit Sponsors: ZipRecruiter.com/twiet kolide.com/twiet Miro.com/podcast

This Week in Enterprise Tech (MP3)
TWiET 530: The Death of "The Password" - Have PLC's overstayed their welcome? Passwordless options with Cloudflare

This Week in Enterprise Tech (MP3)

Play Episode Listen Later Feb 11, 2023 66:44


CISA releases recovery script for ESXiArgs ransomware victims MagicWeb mystery highlights Nobelium attacker's sophistication Challenges facing Bing, Bard and AI search in the future Amazon secures key FCC approval to deploy its Project Kuiper broadband satellites Have PLC's overstayed their welcome? John Engates, Field Chief Technology Officer from Cloudflare talks about MFA and passwordless options for the enterprise. Hosts: Louis Maresca, Brian Chee, and Curtis Franklin Guest: John Engates Download or subscribe to this show at https://twit.tv/shows/this-week-in-enterprise-tech. Get episodes ad-free with Club TWiT at https://twit.tv/clubtwit Sponsors: ZipRecruiter.com/twiet kolide.com/twiet Miro.com/podcast

All TWiT.tv Shows (Video LO)
This Week in Enterprise Tech 530: The Death of "The Password"

All TWiT.tv Shows (Video LO)

Play Episode Listen Later Feb 11, 2023 66:44


CISA releases recovery script for ESXiArgs ransomware victims MagicWeb mystery highlights Nobelium attacker's sophistication Challenges facing Bing, Bard and AI search in the future Amazon secures key FCC approval to deploy its Project Kuiper broadband satellites Have PLC's overstayed their welcome? John Engates, Field Chief Technology Officer from Cloudflare talks about MFA and passwordless options for the enterprise. Hosts: Louis Maresca, Brian Chee, and Curtis Franklin Guest: John Engates Download or subscribe to this show at https://twit.tv/shows/this-week-in-enterprise-tech. Get episodes ad-free with Club TWiT at https://twit.tv/clubtwit Sponsors: ZipRecruiter.com/twiet kolide.com/twiet Miro.com/podcast

Track Changes
You Shall Not Pass: On Password Security

Track Changes

Play Episode Listen Later Feb 7, 2023 29:14


LastPass, a password management site Gina has been touting to friends and family for years, reported a security breach in late December 2022. In the wake of this disappointment, Chris and Gina chat about how to keep your information safe when so much of our information is floating around on the internet. They discuss the tradeoffs between convenience and security and why password managers are still a net positive in personal security. 

TWiT Bits (MP3)
ATTG Clip: Strengthening Your Password Manager

TWiT Bits (MP3)

Play Episode Listen Later Jan 16, 2023 15:00


On Ask The Tech Guys, Leo Laporte and Mikah Sargent talk about other password managers you can use, like 1Password, and what you can do to protect your password manager even more. For more, check out Ask the Tech Guys: https://twit.tv/attg/1957 Hosts: Leo Laporte and Mikah Sargent You can find more about TWiT and subscribe to our podcasts at https://podcasts.twit.tv/ Sponsor: acilearning.com

TWiT Bits (Video HD)
ATTG Clip: Strengthening Your Password Manager

TWiT Bits (Video HD)

Play Episode Listen Later Jan 16, 2023 15:04


On Ask The Tech Guys, Leo Laporte and Mikah Sargent talk about other password managers you can use, like 1Password, and what you can do to protect your password manager even more. For more, check out Ask the Tech Guys: https://twit.tv/attg/1957 Hosts: Leo Laporte and Mikah Sargent You can find more about TWiT and subscribe to our podcasts at https://podcasts.twit.tv/ Sponsor: acilearning.com

Great Things with Great Tech!
Open Source Password Security for Everyone with Bitwarden | Episode #57

Great Things with Great Tech!

Play Episode Listen Later Jan 12, 2023 39:36


In this episode I talk with Ryan Luibrand, Senior Product Manager at Bitwarden. Bitwarden is an open-source password management solution for individuals, teams, and business organizations. It enables users to store, share, and sync sensitive data. In this episode Ryan and I talk about how Bitwarden provides an open-source password management solution for individuals, teams, and enterprises. Bitwarden emphasizes the importance of code transparency and regular security assessments, and offers a free version to ensure that password security is accessible to everyone. The company's founder, Kyle Spearrin, started the company with the goal of making password management easier and more secure for both developers and everyday users. The company's growth strategy is to continue to provide professional support for their open-source platform and to prioritize customer satisfaction and community engagement. Bitwarden was founded in 2015 and is headquartered in Santa Barbara, California. ☑️ Support the Channel by buying a coffee? - https://ko-fi.com/gtwgt ☑️ Technology and Technology Partners Mentioned: OSS, Windows, Linux, Docker, Password Management, Azure ☑️ Raw Talking Points: What constitutes a password manager Personal plus Business MSP About Open Source Software Code Repos Self Host with Docker Linux/Mac/Windows pros/cons About Bitwarden Vault Security About the Bitwarden Security Audit What is Bitwarden Send? Zero Knowedgle Architecture Data Compliance SaaS Azure? Web and Mobile Cybersecurity Transparency Individual and Business impact Self Hosting, tinkering element tech ☑️ Web: https://bitwarden.com/ ☑️ Self Hosted Info: https://bitwarden.com/blog/new-deployment-option-for-self-hosting-bitwarden ☑️ Zero Knowledge White Paper: https://bitwarden.com/resources/zero-knowledge-encryption-white-paper ☑️ Crunch Base Profile: https://www.crunchbase.com/organization/bitwarden ☑️ Interested in being on #GTwGT? Contact via Twitter @GTwGTPodcast or go to https://www.gtwgt.com ☑️ Subscribe to YouTube: https://www.youtube.com/@GTwGTPodcast?sub_confirmation=1 ☑️ Music: https://www.bensound.com

Geek Speak - Tech Talks with Envision IT
Episode 29: LastPass Security Incident and Recommendations

Geek Speak - Tech Talks with Envision IT

Play Episode Listen Later Jan 4, 2023 5:41


LastPass sent out a communication to their customers indicating they had detected “unusual activity” within their environment. What actions you should take now depends on your situation. If you are uncomfortable staying with LastPass you should still absolutely use a great password manager, consider Keeper Security (great for businesses) or Bitwarden (great for personal/families). Connect with us: https://www.linkedin.com/company/envisionitllc marketing@envisionitllc.com

SECURE AF
Episode #33 Password Security

SECURE AF

Play Episode Listen Later Oct 6, 2022 13:44


It's Cybersecurity Awareness Month, are your passwords secure? Find out in this episode of the Secure AF Podcast! We chatted with Technical Writer, Todd Wedel, to dive into why password security matters and how you can make stronger passwords.Catch the whole episode now at securafpodcast.comListen on Apple Podcasts, Spotify and Google PodcastsWatch on our YouTube Channel!

The Tech Blog Writer Podcast
1939: Password Security and Authentication Tech

The Tech Blog Writer Podcast

Play Episode Listen Later Apr 9, 2022 34:56


Cybersecurity can seem complicated, but the truth is, many cyberattacks could be stopped with something very simple: improving password security. In fact, over the last two years, passwords were at the heart of some of the most high-profile breaches, including SolarWinds and Colonial Pipeline. And with an estimated 1 million passwords stolen every week, anyone could be the next target if they haven't taken steps to improve their password security. Darren James, a password security expert and Head of Internal IT at Specops Software, joins me on Tech Talks Daily. Darren discusses his role at Specops and what inspired him to pursue a career in security. We also discuss best practices that every business and individual should be using and why password breaches are so common.