Used for user authentication to prove identity or access approval
POPULARITY
Categories
Common & Cove vs Lil' B & MarneySee omnystudio.com/listener for privacy information.
Common & Cove vs Lil' B & Marney
JT, the Yankee fan is openly jealous of the Dodgers and their payroll. (Yes, a Yankee fan annoyed by the Dodger payroll. The definition of irony.) The guys also talk about restaurants, airports and what their watching on TV other than sports. Hosted by Simplecast, an AdsWizz company. See pcm.adswizz.com for information about our collection and use of personal data for advertising.
Brandyn Murtagh, a full-time bug bounty-hunter and ethical ‘White Hat' hacker, recently told Cybercrime Magazine about his exploits during an eye-opening podcast interview. In this episode, host Paul John Spaulding is joined by Steve Morgan, Founder of Cybersecurity Ventures and Editor-in-Chief at Cybercrime Magazine, to discuss. The Cybercrime Magazine Update airs weekly and covers the latest news, interviews, podcasts, reports, videos, and special productions from Cybercrime Magazine, published by Cybersecurity Ventures. For more on cybersecurity, visit us at https://cybersecurityventures.com
Why has Bitcoin captured the attention of investors and innovators alike? Lance Roberts & Vinay Gupta break down what makes Bitcoin unique — from its blockchain backbone to its role as currency, commodity, and speculative asset. We'll explore how to think about Bitcoin in a diversified portfolio, what risks investors need to understand, and why blockchain may reshape how business is done in the future.
Why has Bitcoin captured the attention of investors and innovators alike? Lance Roberts & Vinay Gupta break down what makes Bitcoin unique — from its blockchain backbone to its role as currency, commodity, and speculative asset. We'll explore how to think about Bitcoin in a diversified portfolio, what risks investors need to understand, and why blockchain may reshape how business is done in the future.
Ever wondered how easy it is to hack a car?
Gmail users on high alert after millions of credentials stolen; Convicted child rapist Steven van de Velde barred from entering Australia to play in a volleyball championship, Jamaica is preparing to face Hurricane Melissa; Another deceased hostage's body handed to Israel's military; Matildas forward Sam Kerr is officially back from injury. Support independent women's media CREDITS Host/Producer: Cassandra Green Audio Production: Lu Hill Become a Mamamia subscriber: https://www.mamamia.com.au/subscribeSee omnystudio.com/listener for privacy information.
La oferta de carteras en hardware seguras afortunadamente está incrementando, lamentablemente el modelo de negocio requiere que constantemente se estén vendiendo nuevos dispositivos, lo que lleva a las empresas a sacar actualizaciones con agregados que pueden ser más un nuevo vector de ataque, que un método de seguridad.Clases nuevas de la semana en: https://cursosbitcoin.comVerificación de los pagos silenciososEscaneo de la blockchain para ver pagos silenciosos
Guest post by Cillian McCarthy, CEO, Paradyn More often than not, the weakest link in any organisation's defences is its people. Evolving social engineering tactics such as deepfakes, an ever-increasing volume of cyberattacks, and the growing sophistication of threats from would-be hackers combine to make a perfect cybersecurity storm which can confuse and overwhelm employees. A key reason for this is a lack of cybersecurity awareness, and that's why building a strong cybersecurity culture is paramount. Transforming employees into active defenders Cultivating a culture of cyber awareness is about transforming employees from potential vulnerabilities into active defenders. However, this doesn't happen overnight or during a single training session - it's a continuous process which must be evolved in line with changing risks. It also must start from the top down, and business leaders should set the example for the rest of the organisation and demonstrate their commitment by actively driving increased cyber awareness. Communication is key and when it comes to an organisation's security policies, it's crucial to explain the "why" behind the "what". Demonstrating the real-world impacts will help to cement the vital importance of adhering to security protocols. Knowledge is power This is where cybersecurity awareness training comes in. The threat landscape is constantly changing, and employees must be kept up to date on emerging threats and best practices. It's a good idea to run regular penetration tests - simulated phishing attacks - to assess vigilance and identify vulnerability gaps in your defences. Businesses should take the time to develop and enforce clear, concise cybersecurity policies that are based on their individual needs and easy to follow. The final step is to have an incident response plan in place and ensure that employees know what to do - and how fast they need to do it - in the event of a cyber incident. Perhaps most importantly, employees need to be encouraged to report potential breaches or suspicious activity without fear of repercussions. Malware can go undetected within systems for significant periods of time, so it's crucial to get out in front of any potential threats. Fostering a culture of shared responsibility will ensure that employees feel supported and empowered. Tools of the trade The right toolkit will enable an organisation to create a powerful line of defence against cyber threats. Solutions might even need to be tailored to different roles or departments, depending on the specific threats they are likely to face. Multi-factor authentication (MFA) makes it harder for malicious actors to gain access to your systems as it requires several steps to verify the user's identity. Password managers, meanwhile, can securely store login details for company accounts and even suggest strong, unique passwords. And, while it may seem simple, ensuring that all devices and software are regularly updated and patched will go a long way to protecting your business against emerging risks. In addition, compliance with new and changing cybersecurity regulations such as NIS2 is becoming necessary for a growing number of businesses. Non-compliance can not only leave your organisation vulnerable to cyber threats, but can also have financial ramifications and create lasting reputational damage. Effective cybersecurity goes beyond ensuring that systems are protected. It can also boost employee engagement, enhance customer trust, and increase productivity and efficiency within the business. Cybersecurity is constantly evolving and we will see a continuous flow of new threats to be grappled with - underscoring the importance of a security-first mindset for businesses. Ultimately, building a strong cybersecurity culture is all about the journey - not the destination. See more stories here.
SHOW NOTESIf Rumble is freezing, check us out on “X” https://x.com/JaySheldonShowJoin Our LOCALS for Behind The Scenes and More!https://locals.com/jaysheldon/feed Patriot MobileIt's time to switch to Patriot Mobile, America's ONLY Christian conservative wireless provider. https://www.patriotmobile.com/JayGet the best “wake up and kick butt” coffee from BLACKOUT COFFEE https://www.blackoutcoffee.com/?p=HyctD1sS3Use promo code JAY20 at check out for 20% offGROUND NEWSStaying up to date with events around the world can be difficult, where it's impossible to consult a single source for the full story. Find out what you're missing.Sign up and get 40% off with my link https://ground.news/checkout/all?fpr=jay69Be Prepared with JASE Medicalhttps://jasemedical.com/?rstr=21099Use Promo code SHELDON10 for a $10 Discount!Keep your online activity hidden with the best VPN. Get a HUGE DISCOUNT at NordVPN with this special link! https://bit.ly/NordVPN-JaySheldon Get healthy with all natural fruits and veggies! Start today! Brickhouse Nutrition https://bit.ly/JaySheldonBrickhouseAll New, All-American designs!Check out our new show merchandise!Contact Your Representatives. Let Them Know!https://www.congress.gov/membersPlease subscribe to the podcast at: iTunes: https://podcasts.apple.com/us/podcast/the-jay-sheldon-show/id1568836253Spotify: https://open.spotify.com/show/2HNQU8yshneTCb0K1Q6cS0Buy my book!https://www.facebook.com/WillyandTheWarthoghttps://www.amazon.com/dp/1320055001/ref=cm_sw_r_fa_dp_VjSStb0E2RTDG26WOr Just Send me money ‘cause you love me! https://www.paypal.com/paypalme/TheJaySheldonShowSocial MediaTikTok: @JaySheldonTikTok X: https://x.com/JaySheldonShowTruth Social https://truthsocial.com/@JaySheldonFacebook @jay.sheldonInstagram @ItsJaySheldonEmail us at show@jaysheldon.comDISCLAIMER: The opinions expressed on this show are the host's and do not reflect the opinions of guests or advertisers. This show does not promote drug use or violence in any manner, but we do promote free thinking and the absolute freedom of speech.
Digital Content Editor, Barbara Friedman, shared her top three stories trending online. Views and News with Clarence Ford is the mid-morning show on CapeTalk. This 3-hour long programme shares and reflects a broad array of perspectives. It is inspirational, passionate and positive. Host Clarence Ford’s gentle curiosity and dapper demeanour leave listeners feeling motivated and empowered. Known for his love of jazz and golf, Clarrie covers a range of themes including relationships, heritage and philosophy. Popular segments include Barbs’ Wire at 9:30am (Mon-Thurs) and The Naked Scientist at 9:30 on Fridays. Thank you for listening to a podcast from Views & News with Clarence Ford Listen live on Primedia+ weekdays between 09:00 and 12:00 (SA Time) to Views and News with Clarence Ford broadcast on CapeTalk https://buff.ly/NnFM3Nk For more from the show go to https://buff.ly/erjiQj2 or find all the catch-up podcasts here https://buff.ly/BdpaXRn Subscribe to the CapeTalk Daily and Weekly Newsletters https://buff.ly/sbvVZD5 Follow us on social media: CapeTalk on Facebook: https://www.facebook.com/CapeTalk CapeTalk on TikTok: https://www.tiktok.com/@capetalk CapeTalk on Instagram: https://www.instagram.com/ CapeTalk on X: https://x.com/CapeTalk CapeTalk on YouTube: https://www.youtube.com/@CapeTalk567See omnystudio.com/listener for privacy information.
Wähle deine Lieblings-Plattform Youtube: https://cutt.ly/rk1EJxY Whatsapp: http://dozz.es/10mja Telegram: https://t.me/zehnmmj Spotify: https://shorturl.at/yGIJ3 Ivoox: https://cutt.ly/Ok1EOoV Web: https://10minutenmitjesus.org Instagram: https://lmy.de/QddR Hallow: https://shorturl.at/BDxXI Hast du Fragen oder hat dich diese Betrachtung besonders angesprochen? Du kannst einen Priester aus unserem Team per Mail unter 10minutenmitjesus@gmail.com kontaktieren!
Wähle deine Lieblings-Plattform Youtube: https://cutt.ly/rk1EJxY Whatsapp: http://dozz.es/10mja Telegram: https://t.me/zehnmmj Spotify: https://shorturl.at/yGIJ3 Ivoox: https://cutt.ly/Ok1EOoV Web: https://10minutenmitjesus.org Instagram: https://lmy.de/QddR Hallow: https://shorturl.at/BDxXI Hast du Fragen oder hat dich diese Betrachtung besonders angesprochen? Du kannst einen Priester aus unserem Team per Mail unter 10minutenmitjesus@gmail.com kontaktieren!
Oscar-winner Edward Berger joins us for a very special episode of Film Stories with Simon Brew. The pair meet to chat about Edward's new release, Ballad Of A Small Player, starring Colin Farrell. And the chat also goes back to Edward's early years making films for German television, through to finding himself on the awards circuit with All Quiet On The Western Front and Conclave. As we'll discuss, not a bad journey for someone who took a huge gamble and turned down a safe job with Ang Lee's company... Ballad Of A Small Player is on Netflix now. Learn more about your ad choices. Visit megaphone.fm/adchoices
A heroes welcome has yet to be felt by the agents of Endurrin for as Lindbury continues its restoration from warfare. A debrief is in order, and hard decisions must be taken. Crossed with the idea of a final showdown, Rhogar shares an ominous dream and confirms his suspicion. If a sacrifice is not made and a ritual stopped, there will be no dreams for anyone. Ever. We are proud to shout out all the supporters of thre show as well as the other podcasts on the Geekonomic Podcast Network. Thank you again to Kellen and Virus of Ideals. Just the spark to get me going, and often the drive I need to start the next one. Also, freesound.org. Podcasting is fun if you use proper attribution and never sacrifice your effort for an AI shortcut. And remember adventurers, sometimes it is up to you to make the magic for the magical adventure. Keep creating.
Password resistance, Jeremy Allen White as Springsteen, and more unseen addictions. You can join our Wally Show Poddies Facebook group at www.facebook.com/groups/WallyShowPoddies
Jack reveals a HUGE development that’s been 10 years in the making! We’ve been sent some killer Power Moves - including one that’s perfect for dog owners. Andy’s discovered what might be the next-level upgrade to the AirPods Pro 3, taking their translating powers even further. Meanwhile, Hamish and Zoë reckon they’ve found a “banana portal” in a small country town - a place that mysteriously caters to the Blake family’s confectionery needs. 1. Jack's bitcoin recovery 2. Power moves 3. AirPods Pro 3 + 4. The banana chocolate portal
See omnystudio.com/listener for privacy information.
October is Cybersecurity Month... What are Passkeys and how are they more secure than passwords to protect your accounts and data online? (at 14:43) --- October is also Menopause Awareness Month... What makes this such a scary topic for so many women to talk about? (at 25:13) --- What's Happening: Meet and mingle with local writers at the 10th annual AuthorFest... among the many events and programs in November at the Findlay-Hancock County Public Library (at 45:38)
As dificuldades em acertar com o raio da password do wifi. Vá, é um X minúsculo, depois um 3...
Passwords lost, logins denied, patience tested—sound familiar? Karli and Abby unpack the art (and heart) of helping students get back in. Press Play now for login laughs and password problem-solving on this episode of…Coordinated.Student Account Help Poster-----Chat it up with fellow AP coordinators on Chat with a Coordinator.Watch the AP Coordinator: Back-to-School Workshop videos on-demand. There is one video for those who are new to the role, and one for experienced AP coordinators.Watch the Coordinated podcast on YouTube.Subscribe to the AP Coordinator Experience YouTube Channel.Bookmark the AP Coordinator Experience webpage.Download the AP Coordinator Academic Calendar (2025-26).Watch this video series on how to use AP Registration and Ordering.Join the AP Coordinator Community. Read up at the AP Coordinator Resource Library. Podcast theme song, “Good as Gold,” courtesy of former AP Music Theory student, Jackie Rae.
In this episode of Hashtag Trending, host Jim Love covers the latest in tech news: Microsoft's recent Windows 11 update that disrupted local host functions for developers, Salesforce's ambitious AI agent initiatives at Dreamforce, Google's upcoming Gemini 3.0 Pro rollout with significant AI advancements, Tor browser removing AI features for privacy reasons, and NIST's new advice on password security emphasizing longer passphrases. He also references a popular segment from Cybersecurity Today's weekend show on the Dark Web. 00:00 Introduction and Headlines 00:42 Microsoft's Windows 11 Update Issues 02:42 Salesforce's AI Revolution at Dreamforce 04:44 Google's Gemini 3.0: A Major Upgrade 06:31 Tor Browser Strips AI for Privacy 08:02 NIST's New Password Guidelines 10:09 Conclusion and Listener Engagement
LIMITED TICKETS HAVE BEEN ADDED TO OUR TORONTO LIVE SHOW redditonwikilive.eventbrite.com Become a Patron or YouTube Member for ad-free episodes and bonus stories every Monday and Friday as well as exclusive content: Cultiv8 Patreon or YouTube Membership Head to https://factormeals.com/factorpodcast and use code WIKI50OFF to get 50% off! If you need support dealing with OCD, head on over to NOCD's website at https://www.treatmyocd.com/ to book a free call with their team. Therapy with NOCD is 100% virtual and covered by insurance for over 155 million Americans, and includes support between sessions, so you're never facing OCD alone. Send us fan mail! Sean Salvino 2700 Cullen Blvd PO Box 84348 Pearland, TX 77584-0802 Want to be part of the show? Leave us a voicemail: https://www.speakpipe.com/Redditonwiki Stories will be played for our $15 Tier Patrons https://www.patreon.com/c/cultiv8podcastnetwork Bonus stories + episodes + ad-free + extra live streams + cameo requests and so many more. (Timestamps are approximate due to dynamic ad insertion. Become a Patron or YouTube member for ad-free episodes) On today's AITA episode, we have:(00:00) - Intro(05:04) - AITA for not seeing a friend while she was in town? (17:43) - AITA for changing the WiFi password and not telling my roommate? (30:27) - AITA for relying too much on a coworker? (38:58) - AITA for cooking my boyfriend's ravioli? (49:46) - AITA For telling a friend that when someone is as qualified as I am, they can charge the same as I do? (1:01:31) - Outro Hit like, subscribe, and follow us on all social media platforms for all things Reddit on Wiki! Click here for our Social and Donation Links: https://linktr.ee/redditonwiki Learn more about your ad choices. Visit megaphone.fm/adchoices
A new report from the password management company NordPass is challenging the idea that federal institutions are more secure than local governments against cybersecurity threats. The study, conducted by NordPass and threat exposure management platform NordStellar, found a total of 53,070 passwords belonging to U.S. civil servants were exposed in public sources since the beginning of 2024. Of the impacted institutions, NordPass found the Department of Defense had 1,897 total exposed passwords, 222 of which were unique. The State Department had 15,272 total exposed passwords, 190 of which were unique, while the U.S. Army had 1,706 exposed passwords, 167 of them unique. The Department of Veterans Affairs also ranked among the top five most-affected institutions, with 1,331 total password exposures, 53 of which were unique. Seven passwords of White House employees were also compromised, according to the study. A State Department spokesperson told FedScoop the agency is “committed to cybersecurity across the department.” They said the agency has instituted multi-factor authentication and regularly rotates credentials. A Biden-era director of the White House Office of Science and Technology Policy slammed the Trump administration's cuts to research and development funding Wednesday, warning of adverse effects to areas such as artificial intelligence. Arati Prabhakar said during a panel held by Harvard's Kennedy School: “Today what we are in the middle of is an assault on the public investment in research unlike anything we have seen in our country's history.” Prabhakar specifically pointed to the Trump administration's moves to withdraw support from certain projects, its removal of federal workers at research agencies, its attacks on universities, reversal of immigration policies that bring talent to the U.S., and the administration's budget proposal that sought to cut federal R&D spending by roughly $44 billion. The Daily Scoop Podcast is available every Monday-Friday afternoon. If you want to hear more of the latest from Washington, subscribe to The Daily Scoop Podcast on Apple Podcasts, Soundcloud, Spotify and YouTube.
Kim Haberley - Face lift at 37 Can You Hear It Ruel Open Line - Your chance to take over the pod Freedom Fridays - Our chance to take it back See omnystudio.com/listener for privacy information.
See omnystudio.com/listener for privacy information.
See omnystudio.com/listener for privacy information.
Passwords, Privacy and Peace of Mind: Wrangling Your Digitals Assets with Kate Hufnagel Kathleen and Michael speak with Kate Hufnagle, The Digital Wrangler, to explore the often-overlooked world of digital estate planning. Kate shares how organizing passwords, accounts, and important life details can ease the burden on loved ones, save money, and create true peace of mind. We talk about different types of digital assets, including ones that are often overlooked; best practices for handling usernames and passwords; how Kate works with individuals to help them wrangle their digital assets; and more! Tune in for simple, practical steps to bring more clarity and organization to your digital life. https://www.thedigitalwrangler.com/ https://www.linkedin.com/in/kate-hufnagel/
Kris Jenner's plastic surgeon asked Kris to help him get less business, and one celebrity claims to have been run off the road by a city employee. Learn more about your ad choices. Visit megaphone.fm/adchoices
How is the transition to passkeys going in 2025?
Got questions? Send Ericka a Text!A candid look at why AR rises even when production is strong and how access, clarity, and team alignment restore cash flow. We share the biggest blockers we see inside practices—password chaos, clearinghouse issues, unread billing emails—and the simple systems that fix them.• password and portal access as revenue gatekeeper• EFT lockouts creating delays and aged AR• Dentrix–Vine fallout and claim tracing discipline• daily email reviews and statement ownership• patient AR rising from unclear benefits and silence• stronger benefit scripts to prevent “surprise” balances• third-party alignment as team extension, not threat• kickoff meetings for roles, tools, and expectations• billers as end-of-cycle auditors spotting root causes• repeatable rhythms for faster posting and fewer denialsIf any of this resonated with you friends, feel free to leave a review, feel free to leave a comment, share this episode with someone who you feel would relate. And if you're interested in a billing consultation and seeing how fortune billing solutions can help you, go to the show notes. There's a link down below, and you can set up a time to meet with me. Schedule a demo with MaxAssist to unlock scheduleing potential here: https://maxassist.com/book-a-demo-fortune-billing/ Join The Biller Acceleration Mentorship Wait List Here: (Only 5 Spots Left in 2025!!)https://linktr.ee/dental_billing_coachWould you like to set-up a billing consultation with Ericka? She would love the opportunity to discuss your billing questions and see how Fortune Billing Solutions may help you. Email Ericka:ericka@dentalbillingdoneright.comSchedule a call with Ericka: https://calendly.com/ericka-dentalbillingdoneright/30min Perio performance formula: (D4341+D4342+D4346+D4355+D4910)/(D4341+D4342+D4346+D4355+D4910+D1110) Delta Dental Locum Tenens Form: https://www1.deltadentalins.com/content/dam/ddins/en/pdf/dentists/locum-tenens-form.pdf
Social media strategist Scott Kleinberg joins Bob Sirott to explain what passkeys are, how they are different from passwords, and how you can set up passkey for different websites and apps. He also talks about different models of iPhones, reporting spam texts, and updating your tablet.
Si, tus bitcoin pueden ser confiscados incluso si los adquiriste por la vía legal. Esto por la ambigüedad con la que las casas de cambio centralizadas determinan lo sospechosa que puede ser una dirección de bitcoin.Clases nuevas de la semana en: https://cursosbitcoin.comIntroducción pagos silenciososCómo funcionan los pagos silenciosos en bitcoin
See omnystudio.com/listener for privacy information.
Everyone Is Protecting My Password, But Who Is Protecting My Toilet Paper? - Interview with Amberley Brady | AISA CyberCon Melbourne 2025 Coverage | On Location with Sean Martin and Marco CiappelliAISA CyberCon Melbourne | October 15-17, 2025Empty shelves trigger something primal in us now. We've lived through the panic, the uncertainty, the realization that our food supply isn't as secure as we thought. Amberley Brady hasn't forgotten that feeling, and she's turned it into action.Speaking with her from Florence to Sydney ahead of AISA CyberCon in Melbourne, I discovered someone who came to cybersecurity through an unexpected path—studying law, working in policy, but driven by a singular passion for food security. When COVID-19 hit Australia in 2019 and grocery store shelves emptied, Amberley couldn't shake the question: what happens if this keeps happening?Her answer was to build realfoodprice.com.au, a platform tracking food pricing transparency across Australia's supply chain. It's based on the Hungarian model, which within three months saved consumers 50 million euros simply by making prices visible from farmer to wholesaler to consumer. The markup disappeared almost overnight when transparency arrived."Once you demonstrate transparency along the supply chain, you see where the markup is," Amberley explained. She gave me an example that hit home: watermelon farmers were getting paid 40 cents per kilo while their production costs ran between $1.00 to $1.50. Meanwhile, consumers paid $2.50 to $2.99 year-round. Someone in the middle was profiting while farmers lost money on every harvest.But this isn't just about fair pricing—it's about critical infrastructure that nobody's protecting. Australia produces food for 70 million people, far more than its own population needs. That food moves through systems, across borders, through supply chains that depend entirely on technology most farmers never think about in cybersecurity terms.The new autonomous tractors collecting soil data? That information goes somewhere. The sensors monitoring crop conditions? Those connect to systems someone else controls. China recognized this vulnerability years ago—with 20% of the world's population but only 7% of arable land, they understood that food security is national security.At CyberCon, Amberley is presenting two sessions that challenge the cybersecurity community to expand their thinking. "Don't Outsource Your Thinking" tackles what she calls "complacency creep"—our growing trust in AI that makes us stop questioning, stop analyzing with our gut instinct. She argues for an Essential Nine in Australia's cybersecurity framework, adding the human firewall to the technical Essential Eight.Her second talk, cheekily titled "Everyone is Protecting My Password, But No One's Protecting My Toilet Paper," addresses food security directly. It's provocative, but that's the point. We saw what happened in Japan recently with the rice crisis—the same panic buying, the same distrust, the same empty shelves that COVID taught us to fear."We will run to the store," Amberley said. "That's going to be human behavior because we've lived through that time." And here's the cybersecurity angle: those panics can be manufactured. A fake image of empty shelves, an AI-generated video, strategic disinformation—all it takes is triggering that collective memory.Amberley describes herself as an early disruptor in the agritech cybersecurity space, and she's right. Most cybersecurity professionals think about hospitals, utilities, financial systems. They don't think about the autonomous vehicles in fields, the sensor networks in soil, the supply chain software moving food across continents.But she's starting the conversation, and CyberCon's audience—increasingly diverse, including people from HR, risk management, and policy—is ready for it. Because at the end of the day, everyone has to eat. And if we don't start thinking about the cyber vulnerabilities in how we grow, move, and price food, we're leaving our most basic need unprotected.AISA CyberCon Melbourne runs October 15-17, 2025 Virtual coverage provided by ITSPmagazineGUEST:Amberley Brady, Food Security & Cybersecurity Advocate, Founder of realfoodprice.com.au | On LinkedIn: https://www.linkedin.com/in/amberley-b-a62022353/HOSTS:Sean Martin, Co-Founder, ITSPmagazine and Studio C60 | Website: https://www.seanmartin.comMarco Ciappelli, Co-Founder, ITSPmagazine and Studio C60 | Website: https://www.marcociappelli.comCatch all of our event coverage: https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverageWant to share an Event Briefing as part of our event coverage? Learn More
Common & Maxx vs Lil' B & Julia Daniels
Common & Maxx vs Lil' B & Julia DanielsSee omnystudio.com/listener for privacy information.
Common & Maxx vs Lil' B & Julia DanielsSee omnystudio.com/listener for privacy information.
Hairless Heydrich gives the game away. MAGAT senators approve murder on the High Seas. The Password is: "yardarm". All that and more in three hours of live, uncensored, fearless broadcasting that has ever been here, but seldom elsewhere.
I had ChatGPT write this.We're so close to closing on our house!
During his keynote at SecTor 2025, HD Moore, founder and CEO of runZero and widely recognized for creating Metasploit, invites the cybersecurity community to rethink the foundational “rules” we continue to follow—often without question. In conversation with Sean Martin and Marco Ciappelli for ITSPmagazine's on-location event coverage, Moore breaks down where our security doctrines came from, why some became obsolete, and which ones still hold water.One standout example? The rule to “change your passwords every 30 days.” Moore explains how this outdated guidance—rooted in assumptions from the early 2000s when password sharing was rampant—led to predictable patterns and frustrated users. Today, the advice has flipped: focus on strong, unique passwords per service, stored securely via password managers.But this keynote isn't just about passwords. Moore uses this lens to explore how many security “truths” were formed in response to technical limitations or outdated behaviors—things like shared network trust, brittle segmentation, and fragile authentication models. As technology matures, so too should the rules. Enter passkeys, hardware tokens, and enclave-based authentication. These aren't just new tools—they're a fundamental shift in where and how we anchor trust.Moore also calls out an uncomfortable truth: the very products we rely on to protect our systems—firewalls, endpoint managers, and security appliances—are now among the top vectors for breach, per Mandiant's latest report. That revelation struck a chord with conference attendees, who appreciated Moore's willingness to speak plainly about systemic security debt.He also discusses the inescapable vulnerabilities in AI agent flows, likening prompt injection attacks to the early days of cross-site scripting. The tech itself invites risk, he warns, and we'll need new frameworks—not just tweaks to old ones—to manage what comes next.This conversation is a must-listen for anyone questioning whether our security playbooks are still fit for purpose—or simply carried forward by habit.___________GUEST:HD Moore, Founder and CEO of RunZero | On Linkedin: https://www.linkedin.com/in/hdmoore/HOSTS:Sean Martin, Co-Founder, ITSPmagazine and Studio C60 | Website: https://www.seanmartin.comMarco Ciappelli, Co-Founder, ITSPmagazine and Studio C60 | Website: https://www.marcociappelli.comRESOURCES:Keynote: The Once and Future Rules of Cybersecurity: https://www.blackhat.com/sector/2025/briefings/schedule/#keynote-the-once-and-future-rules-of-cybersecurity-49596Learn more and catch more stories from our SecTor 2025 coverage: https://www.itspmagazine.com/cybersecurity-technology-society-events/sector-cybersecurity-conference-toronto-2025Mandiant M-Trends Breach Report: https://cloud.google.com/blog/topics/threat-intelligence/m-trends-2025/OPM Data Breach Summary: https://oversight.house.gov/report/opm-data-breach-government-jeopardized-national-security-generation/Catch all of our event coverage: https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverageWant to share an Event Briefing as part of our event coverage? Learn More
Most of us want to “move on” or “let go,” but we skip the one phase that makes surrender possible. In this episode, I sit down with transformational teacher and bestselling author Kute Blackson to break down what surrender really means and why it's the opposite of weakness. We talk about how to let go without giving up, recognize the ego's survival patterns that keep you in control mode, and the step-by-step “anatomy of surrender” process. Tune in and discover the practices that will help you release control, grieve what's past, and open yourself to bigger opportunities and a life that feels more aligned and alive. In This Episode, You Will Learn Why SURRENDER is not weakness but the PASSWORD to FREEDOM. Why GRIEVING is the missing step before surrender can happen. How CONTROL is the ego's master addiction and keeps you stuck. How to tell yourself the TRUTH and stop negotiating your life away. Why PAIN is feedback that you're out of alignment. Ways to ALIGN with your soul's deeper vision and act from authenticity. Why LETTING GO of what's not for you creates space for greater blessings. Resources + Links Learn more about kuteblackson.com Read You Are The One & Magic of Surrender FREE Reinvent Online Seminar Attend The Boundless Bliss event Listen to Soul Talk Sign up for a one-dollar-per-month trial period at shopify.com/monahan Download the CFO's Guide to AI and Machine Learning at NetSuite.com/MONAHAN. Want to do more and spend less like Uber, 8x8, and Databricks Mosaic? Take a free test drive of OCI at oracle.com/MONAHAN. Get 10% off your first Mitopure order at timeline.com/CONFIDENCE. Get 15% off your first order when you use code CONFIDENCE15 at checkout at jennikayne.com. Call my digital clone at 201-897-2553! Visit heathermonahan.com Sign up for my mailing list: heathermonahan.com/mailing-list/ Overcome Your Villains is Available NOW! Order here: https://overcomeyourvillains.com If you haven't yet, get my first book Confidence Creator Follow Heather on Instagram & LinkedIn Kute on Facebook X & Instagram Kute on Youtube & LinkedIn
It's Hump Day on the Majority Report On Today's Show: Trump posts to Truth Social that Illinois Governor JB Pritzker and Chicago Mayor Brandon Johnson should be imprisoned for hindering ICE agents. Speaker of the House Mike Johnson (R-LA) co-signs Donald Trump's calling for Pritzker's and Johnson's imprisonment CBS Chicago reports that ICE has been making false 911 call and filing phony police reports in an attempt to agitate local authorities. The IDF has seized nine more boats attempting to break the Israeli blockade on aid for Palestinians. Greta Thunberg posts a video on social media pleading for people to stay focused on the genocide and Palestinians and to not make the flotilla members the center of the narrative. Editor of Bolts Magazine, Daniel Nichanian joins the program to discuss his Cheat Sheet for the 2025 General Elections. In the Fun Half: We revisit a talk that new head of CBS news Bari Weiss gave to the Federalist Society in 2023 where she exhibits her only talent, flattering conservatives. After receiving a $20 billion bailout, Argentina's president Javier Milei throws an arena rock show, even singing himself Pam Bondi is once again humiliated, this time by Senator Dick Durbin as he presses her on Epstein. Stephen Crowder doesn't understand why his fellow podcasters are turning on Trump. Dave Rubin goes on a misogynist rant about Greta Thunberg. All that and more The Congress switchboard number is (202) 224-3121. You can use this number to connect with either the U.S. Senate or the House of Representatives. Follow us on TikTok here: https://www.tiktok.com/@majorityreportfm Check us out on Twitch here: https://www.twitch.tv/themajorityreport Find our Rumble stream here: https://rumble.com/user/majorityreport Check out our alt YouTube channel here: https://www.youtube.com/majorityreportlive Gift a Majority Report subscription here: https://fans.fm/majority/gift Subscribe to the AMQuickie newsletter here: https://am-quickie.ghost.io/ Join the Majority Report Discord! https://majoritydiscord.com/ Get all your MR merch at our store: https://shop.majorityreportradio.com/ Get the free Majority Report App!: https://majority.fm/app Go to https://JustCoffee.coop and use coupon code majority to get 10% off your purchase Check out today's sponsors: DELETEME: Get 20% off your DeleteMe plan when you go to www.joindeleteme.com/MAJORITY and use promo code MAJORITY at checkout. WILD GRAIN: Get $30 off your first box + free Croissants in every box. Go to Wildgrain.com/MAJORITY to start your subscription. NAKED WINES: To get 6 bottles of wine for $39.99, head to NakedWines.com/MAJORITY and use code MAJORITY for both the code and PASSWORD. SUNSET LAKE: Head to SunsetLakeCBD.com and use the code JustTreats25 to save 30% on all their gummies for sleep, focus, and relaxation Follow the Majority Report crew on Twitter: @SamSeder @EmmaVigeland @MattLech Check out Matt's show, Left Reckoning, on YouTube, and subscribe on Patreon! https://www.patreon.com/leftreckoning Check out Matt Binder's YouTube channel: https://www.youtube.com/mattbinder Subscribe to Brandon's show The Discourse on Patreon! https://www.patreon.com/ExpandTheDiscourse Check out Ava Raiza's music here! https://avaraiza.bandcamp.co
Midweek Check-in!
win tickets to see ADAM SANDLER!See omnystudio.com/listener for privacy information.
Tennafitzgerald HOUR 2 --Lil B--Nordo and Jonny Athletic --PasswordSee omnystudio.com/listener for privacy information.
Tennafitzgerald HOUR 3 --Password--AYSTAPF --RussoSee omnystudio.com/listener for privacy information.
SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast
Comparing Honeypot Passwords with HIBP Most passwords used against our honeypots are also found in the Have I been pwn3d list. However, the few percent that are not found tend to be variations of known passwords, extending them to find likely mutations. https://isc.sans.edu/diary/%5BGuest%20Diary%5D%20Comparing%20Honeypot%20Passwords%20with%20HIBP/32310 Breaking Server SGX via DRAM Inspection By observing read and write operations to memory, it is possible to derive keys stored in SGX and break the security of systems relying on SGX. https://wiretap.fail/files/wiretap.pdf OneLogin OIDC Vulnerability A vulnerability in OneLogin can be used to read secret application keys https://www.clutch.security/blog/onelogin-many-secrets-clutch-uncovers-vulnerability-exposing-client-credentials OpenSSL Patch OpenSSL patched three vulnerabilities. One could lead to remote code execution, but the feature is used infrequently, and the exploit is difficult, according to OpenSSL