Podcasts about passwords

Used for user authentication to prove identity or access approval

  • 4,374PODCASTS
  • 10,603EPISODES
  • 41mAVG DURATION
  • 2DAILY NEW EPISODES
  • Oct 31, 2025LATEST
passwords

POPULARITY

20172018201920202021202220232024

Categories



Best podcasts about passwords

Show all podcasts related to passwords

Latest podcast episodes about passwords

The Common Man Progrum
FULL PROGRUM PASSWORD!

The Common Man Progrum

Play Episode Listen Later Oct 31, 2025 30:27 Transcription Available


Common & Cove vs Lil' B & MarneySee omnystudio.com/listener for privacy information.

The Common Man Progrum
FULL PROGRUM PASSWORD!

The Common Man Progrum

Play Episode Listen Later Oct 31, 2025 31:47


Common & Cove vs Lil' B & Marney

JT And Looney
THE PASSWORD IS: STAVE !

JT And Looney

Play Episode Listen Later Oct 31, 2025 28:57


JT, the Yankee fan is openly jealous of the Dodgers and their payroll. (Yes, a Yankee fan annoyed by the Dodger payroll. The definition of irony.) The guys also talk about restaurants, airports and what their watching on TV other than sports. Hosted by Simplecast, an AdsWizz company. See pcm.adswizz.com for information about our collection and use of personal data for advertising.

Cybercrime Magazine Podcast
Cybercrime Magazine Update: Passwords Uncovered In 180 Seconds. Ethical Hacker On Cybercrime Radio.

Cybercrime Magazine Podcast

Play Episode Listen Later Oct 30, 2025 2:13


Brandyn Murtagh, a full-time bug bounty-hunter and ethical ‘White Hat' hacker, recently told Cybercrime Magazine about his exploits during an eye-opening podcast interview. In this episode, host Paul John Spaulding is joined by Steve Morgan, Founder of Cybersecurity Ventures and Editor-in-Chief at Cybercrime Magazine, to discuss. The Cybercrime Magazine Update airs weekly and covers the latest news, interviews, podcasts, reports, videos, and special productions from Cybercrime Magazine, published by Cybersecurity Ventures. For more on cybersecurity, visit us at https://cybersecurityventures.com

Lance Roberts' Real Investment Hour
10-29-25 Bitcoin - Speculation, Blockchain, & the Future of Money

Lance Roberts' Real Investment Hour

Play Episode Listen Later Oct 29, 2025 59:28


Why has Bitcoin captured the attention of investors and innovators alike? Lance Roberts & Vinay Gupta break down what makes Bitcoin unique — from its blockchain backbone to its role as currency, commodity, and speculative asset. We'll explore how to think about Bitcoin in a diversified portfolio, what risks investors need to understand, and why blockchain may reshape how business is done in the future.

The Real Investment Show Podcast
10-29-25 Vinay Gupta - Bitcoin - Speculation Blockchain the Future of Money

The Real Investment Show Podcast

Play Episode Listen Later Oct 29, 2025 59:29


Why has Bitcoin captured the attention of investors and innovators alike? Lance Roberts & Vinay Gupta break down what makes Bitcoin unique — from its blockchain backbone to its role as currency, commodity, and speculative asset. We'll explore how to think about Bitcoin in a diversified portfolio, what risks investors need to understand, and why blockchain may reshape how business is done in the future.

The Quicky
Was Your Gmail Password Just Stolen?

The Quicky

Play Episode Listen Later Oct 28, 2025 5:36 Transcription Available


Gmail users on high alert after millions of credentials stolen; Convicted child rapist Steven van de Velde barred from entering Australia to play in a volleyball championship, Jamaica is preparing to face Hurricane Melissa; Another deceased hostage's body handed to Israel's military; Matildas forward Sam Kerr is officially back from injury. Support independent women's media CREDITS Host/Producer: Cassandra Green Audio Production: Lu Hill Become a Mamamia subscriber: https://www.mamamia.com.au/subscribeSee omnystudio.com/listener for privacy information.

Bitcoin en español
1068 Obsolescencia programada… versión cripto

Bitcoin en español

Play Episode Listen Later Oct 28, 2025 17:32


La oferta de carteras en hardware seguras afortunadamente está incrementando, lamentablemente el modelo de negocio requiere que constantemente se estén vendiendo nuevos dispositivos, lo que lleva a las empresas a sacar actualizaciones con agregados que pueden ser más un nuevo vector de ataque, que un método de seguridad.Clases nuevas de la semana en: https://cursosbitcoin.comVerificación de los pagos silenciososEscaneo de la blockchain para ver pagos silenciosos

Irish Tech News Audio Articles
Cultivating a strong cybersecurity culture

Irish Tech News Audio Articles

Play Episode Listen Later Oct 28, 2025 3:56


Guest post by Cillian McCarthy, CEO, Paradyn More often than not, the weakest link in any organisation's defences is its people. Evolving social engineering tactics such as deepfakes, an ever-increasing volume of cyberattacks, and the growing sophistication of threats from would-be hackers combine to make a perfect cybersecurity storm which can confuse and overwhelm employees. A key reason for this is a lack of cybersecurity awareness, and that's why building a strong cybersecurity culture is paramount. Transforming employees into active defenders Cultivating a culture of cyber awareness is about transforming employees from potential vulnerabilities into active defenders. However, this doesn't happen overnight or during a single training session - it's a continuous process which must be evolved in line with changing risks. It also must start from the top down, and business leaders should set the example for the rest of the organisation and demonstrate their commitment by actively driving increased cyber awareness. Communication is key and when it comes to an organisation's security policies, it's crucial to explain the "why" behind the "what". Demonstrating the real-world impacts will help to cement the vital importance of adhering to security protocols. Knowledge is power This is where cybersecurity awareness training comes in. The threat landscape is constantly changing, and employees must be kept up to date on emerging threats and best practices. It's a good idea to run regular penetration tests - simulated phishing attacks - to assess vigilance and identify vulnerability gaps in your defences. Businesses should take the time to develop and enforce clear, concise cybersecurity policies that are based on their individual needs and easy to follow. The final step is to have an incident response plan in place and ensure that employees know what to do - and how fast they need to do it - in the event of a cyber incident. Perhaps most importantly, employees need to be encouraged to report potential breaches or suspicious activity without fear of repercussions. Malware can go undetected within systems for significant periods of time, so it's crucial to get out in front of any potential threats. Fostering a culture of shared responsibility will ensure that employees feel supported and empowered. Tools of the trade The right toolkit will enable an organisation to create a powerful line of defence against cyber threats. Solutions might even need to be tailored to different roles or departments, depending on the specific threats they are likely to face. Multi-factor authentication (MFA) makes it harder for malicious actors to gain access to your systems as it requires several steps to verify the user's identity. Password managers, meanwhile, can securely store login details for company accounts and even suggest strong, unique passwords. And, while it may seem simple, ensuring that all devices and software are regularly updated and patched will go a long way to protecting your business against emerging risks. In addition, compliance with new and changing cybersecurity regulations such as NIS2 is becoming necessary for a growing number of businesses. Non-compliance can not only leave your organisation vulnerable to cyber threats, but can also have financial ramifications and create lasting reputational damage. Effective cybersecurity goes beyond ensuring that systems are protected. It can also boost employee engagement, enhance customer trust, and increase productivity and efficiency within the business. Cybersecurity is constantly evolving and we will see a continuous flow of new threats to be grappled with - underscoring the importance of a security-first mindset for businesses. Ultimately, building a strong cybersecurity culture is all about the journey - not the destination. See more stories here.

The Jay Sheldon Show
183M Email Passwords Exposed

The Jay Sheldon Show

Play Episode Listen Later Oct 28, 2025 47:35


SHOW NOTESIf Rumble is freezing, check us out on “X” https://x.com/JaySheldonShowJoin Our LOCALS for Behind The Scenes and More!https://locals.com/jaysheldon/feed Patriot MobileIt's time to switch to Patriot Mobile, America's ONLY Christian conservative wireless provider. https://www.patriotmobile.com/JayGet the best “wake up and kick butt” coffee from BLACKOUT COFFEE https://www.blackoutcoffee.com/?p=HyctD1sS3Use promo code JAY20 at check out for 20% offGROUND NEWSStaying up to date with events around the world can be difficult, where it's impossible to consult a single source for the full story. Find out what you're missing.Sign up and get 40% off with my link https://ground.news/checkout/all?fpr=jay69Be Prepared with JASE Medicalhttps://jasemedical.com/?rstr=21099Use Promo code SHELDON10 for a $10 Discount!Keep your online activity hidden with the best VPN. Get a HUGE DISCOUNT at NordVPN with this special link! https://bit.ly/NordVPN-JaySheldon Get healthy with all natural fruits and veggies! Start today! Brickhouse Nutrition https://bit.ly/JaySheldonBrickhouseAll New, All-American designs!Check out our new show merchandise!Contact Your Representatives. Let Them Know!https://www.congress.gov/membersPlease subscribe to the podcast at: iTunes: https://podcasts.apple.com/us/podcast/the-jay-sheldon-show/id1568836253Spotify: https://open.spotify.com/show/2HNQU8yshneTCb0K1Q6cS0Buy my book!https://www.facebook.com/WillyandTheWarthoghttps://www.amazon.com/dp/1320055001/ref=cm_sw_r_fa_dp_VjSStb0E2RTDG26WOr Just Send me money ‘cause you love me! https://www.paypal.com/paypalme/TheJaySheldonShowSocial MediaTikTok: @JaySheldonTikTok X: https://x.com/JaySheldonShowTruth Social https://truthsocial.com/@JaySheldonFacebook @jay.sheldonInstagram @ItsJaySheldonEmail us at show@jaysheldon.comDISCLAIMER: The opinions expressed on this show are the host's and do not reflect the opinions of guests or advertisers. This show does not promote drug use or violence in any manner, but we do promote free thinking and the absolute freedom of speech.

The Morning Review with Lester Kiewit Podcast
Barbs Wire: Gmail passwords, China requires influencers to hold a degree, Sydney patient receives heart via robotic surgery

The Morning Review with Lester Kiewit Podcast

Play Episode Listen Later Oct 28, 2025 10:12 Transcription Available


Digital Content Editor, Barbara Friedman, shared her top three stories trending online. Views and News with Clarence Ford is the mid-morning show on CapeTalk. This 3-hour long programme shares and reflects a broad array of perspectives. It is inspirational, passionate and positive. Host Clarence Ford’s gentle curiosity and dapper demeanour leave listeners feeling motivated and empowered. Known for his love of jazz and golf, Clarrie covers a range of themes including relationships, heritage and philosophy. Popular segments include Barbs’ Wire at 9:30am (Mon-Thurs) and The Naked Scientist at 9:30 on Fridays. Thank you for listening to a podcast from Views & News with Clarence Ford Listen live on Primedia+ weekdays between 09:00 and 12:00 (SA Time) to Views and News with Clarence Ford broadcast on CapeTalk https://buff.ly/NnFM3Nk For more from the show go to https://buff.ly/erjiQj2 or find all the catch-up podcasts here https://buff.ly/BdpaXRn Subscribe to the CapeTalk Daily and Weekly Newsletters https://buff.ly/sbvVZD5 Follow us on social media: CapeTalk on Facebook: https://www.facebook.com/CapeTalk CapeTalk on TikTok: https://www.tiktok.com/@capetalk CapeTalk on Instagram: https://www.instagram.com/ CapeTalk on X: https://x.com/CapeTalk CapeTalk on YouTube: https://www.youtube.com/@CapeTalk567See omnystudio.com/listener for privacy information.

10 Minuten mit Jesus
27-10-2025 - Das richtige Password für die enge Tür - 10 Minuten mit Jesus

10 Minuten mit Jesus

Play Episode Listen Later Oct 26, 2025 11:07


Wähle deine Lieblings-Plattform Youtube: https://cutt.ly/rk1EJxY Whatsapp: http://dozz.es/10mja Telegram: https://t.me/zehnmmj Spotify: https://shorturl.at/yGIJ3 Ivoox: https://cutt.ly/Ok1EOoV Web: https://10minutenmitjesus.org Instagram: https://lmy.de/QddR Hallow: https://shorturl.at/BDxXI Hast du Fragen oder hat dich diese Betrachtung besonders angesprochen? Du kannst einen Priester aus unserem Team per Mail unter 10minutenmitjesus@gmail.com kontaktieren!

10 Minuten mit Jesus
27-10-2025 - Das richtige Password für die enge Tür - 10 Minuten mit Jesus

10 Minuten mit Jesus

Play Episode Listen Later Oct 26, 2025 11:06


Wähle deine Lieblings-Plattform Youtube: https://cutt.ly/rk1EJxY Whatsapp: http://dozz.es/10mja Telegram: https://t.me/zehnmmj Spotify: https://shorturl.at/yGIJ3 Ivoox: https://cutt.ly/Ok1EOoV Web: https://10minutenmitjesus.org Instagram: https://lmy.de/QddR Hallow: https://shorturl.at/BDxXI Hast du Fragen oder hat dich diese Betrachtung besonders angesprochen? Du kannst einen Priester aus unserem Team per Mail unter 10minutenmitjesus@gmail.com kontaktieren!

Film Stories with Simon Brew
In conversation with Edward Berger | Ballad Of A Small Player, Conclave, and internet passwords

Film Stories with Simon Brew

Play Episode Listen Later Oct 24, 2025 41:56


Oscar-winner Edward Berger joins us for a very special episode of Film Stories with Simon Brew. The pair meet to chat about Edward's new release, Ballad Of A Small Player, starring Colin Farrell. And the chat also goes back to Edward's early years making films for German television, through to finding himself on the awards circuit with All Quiet On The Western Front and Conclave. As we'll discuss, not a bad journey for someone who took a huge gamble and turned down a safe job with Ang Lee's company... Ballad Of A Small Player is on Netflix now. Learn more about your ad choices. Visit megaphone.fm/adchoices

The Ross Kaminsky Show
10-24-25 *INTERVIEW* Andrew Shikiar Talks Passkeys: A Solution to Password Insecurity

The Ross Kaminsky Show

Play Episode Listen Later Oct 24, 2025 19:55 Transcription Available


Geekonomics Podcast Network
Dungeonetics -80- Password Recovery

Geekonomics Podcast Network

Play Episode Listen Later Oct 24, 2025 56:55


A heroes welcome has yet to be felt by the agents of Endurrin for as Lindbury continues its restoration from warfare. A debrief is in order, and hard decisions must be taken. Crossed with the idea of a final showdown, Rhogar shares an ominous dream and confirms his suspicion. If a sacrifice is not made and a ritual stopped, there will be no dreams for anyone. Ever.   We are proud to shout out all the supporters of thre show as well as the other podcasts on the Geekonomic Podcast Network. Thank you again to Kellen and Virus of Ideals. Just the spark to get me going, and often the drive I need to start the next one. Also, freesound.org. Podcasting is fun if you use proper attribution and never sacrifice your effort for an AI shortcut.   And remember adventurers, sometimes it is up to you to make the magic for the magical adventure. Keep creating.

Wally Show Podcast
Aftercast: Denim & Flowers: October 23, 2025

Wally Show Podcast

Play Episode Listen Later Oct 23, 2025 29:40


Password resistance, Jeremy Allen White as Springsteen, and more unseen addictions. You can join our Wally Show Poddies Facebook group at www.facebook.com/groups/WallyShowPoddies

Hamish & Andy
2025 Ep 314 - ⁠10 Years, One Password

Hamish & Andy

Play Episode Listen Later Oct 22, 2025 42:25


Jack reveals a HUGE development that’s been 10 years in the making! We’ve been sent some killer Power Moves - including one that’s perfect for dog owners. Andy’s discovered what might be the next-level upgrade to the AirPods Pro 3, taking their translating powers even further. Meanwhile, Hamish and Zoë reckon they’ve found a “banana portal” in a small country town - a place that mysteriously caters to the Blake family’s confectionery needs. 1. Jack's bitcoin recovery 2. Power moves 3. AirPods Pro 3 + 4. The banana chocolate portal

Smiley Morning Show
Password - All Smiley All the time.

Smiley Morning Show

Play Episode Listen Later Oct 22, 2025 6:52


See omnystudio.com/listener for privacy information.

Good Mornings Podcast Edition
S24 E87: Cybersecurity: Passkeys vs. Passwords

Good Mornings Podcast Edition

Play Episode Listen Later Oct 22, 2025 55:15


October is Cybersecurity Month... What are Passkeys and how are they more secure than passwords to protect your accounts and data online? (at 14:43) --- October is also Menopause Awareness Month... What makes this such a scary topic for so many women to talk about? (at 25:13) --- What's Happening: Meet and mingle with local writers at the 10th annual AuthorFest... among the many events and programs in November at the Findlay-Hancock County Public Library (at 45:38)

M80 - Macaquinhos no Sotão
Dar a Password do WiFi

M80 - Macaquinhos no Sotão

Play Episode Listen Later Oct 22, 2025 5:24


As dificuldades em acertar com o raio da password do wifi. Vá, é um X minúsculo, depois um 3...

Coordinated
298. Hot Topic - Do You Have My Password?

Coordinated

Play Episode Listen Later Oct 20, 2025 13:11


Passwords lost, logins denied, patience tested—sound familiar? Karli and Abby unpack the art (and heart) of helping students get back in. Press Play now for login laughs and password problem-solving on this episode of…Coordinated.Student Account Help Poster-----Chat it up with fellow AP coordinators on Chat with a Coordinator.Watch the AP Coordinator: Back-to-School Workshop videos on-demand. There is one video for those who are new to the role, and one for experienced AP coordinators.Watch the Coordinated podcast on YouTube.Subscribe to the AP Coordinator Experience YouTube Channel.Bookmark the AP Coordinator Experience webpage.Download the AP Coordinator Academic Calendar (2025-26).Watch this video series on how to use AP Registration and Ordering.Join the AP Coordinator Community. Read up at the AP Coordinator Resource Library. Podcast theme song, “Good as Gold,” courtesy of former AP Music Theory student, Jackie Rae.

Hashtag Trending
Tech Updates: Microsoft Fixes, Salesforce's AI Push, Google's Gemini 3.0, and Password Security

Hashtag Trending

Play Episode Listen Later Oct 20, 2025 11:02 Transcription Available


In this episode of Hashtag Trending, host Jim Love covers the latest in tech news: Microsoft's recent Windows 11 update that disrupted local host functions for developers, Salesforce's ambitious AI agent initiatives at Dreamforce, Google's upcoming Gemini 3.0 Pro rollout with significant AI advancements, Tor browser removing AI features for privacy reasons, and NIST's new advice on password security emphasizing longer passphrases. He also references a popular segment from Cybersecurity Today's weekend show on the Dark Web. 00:00 Introduction and Headlines 00:42 Microsoft's Windows 11 Update Issues 02:42 Salesforce's AI Revolution at Dreamforce 04:44 Google's Gemini 3.0: A Major Upgrade 06:31 Tor Browser Strips AI for Privacy 08:02 NIST's New Password Guidelines 10:09 Conclusion and Listener Engagement

Reddit On Wiki
#402: I CHANGED The WiFi Password WITHOUT Telling My Roommate... AITA?

Reddit On Wiki

Play Episode Listen Later Oct 17, 2025 67:52


LIMITED TICKETS HAVE BEEN ADDED TO OUR TORONTO LIVE SHOW redditonwikilive.eventbrite.com Become a Patron or YouTube Member for ad-free episodes and bonus stories every Monday and Friday as well as exclusive content:⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ Cultiv8 Patreon⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ or⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ YouTube Membership⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠   Head to ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠https://factormeals.com/factorpodcast⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ and use code WIKI50OFF to get 50% off! If you need support dealing with OCD, head on over to NOCD's website at ⁠⁠⁠⁠⁠⁠⁠⁠⁠https://www.treatmyocd.com/⁠⁠⁠⁠⁠⁠⁠⁠⁠ to book a free call with their team. Therapy with NOCD is 100% virtual and covered by insurance for over 155 million Americans, and includes support between sessions, so you're never facing OCD alone. Send us fan mail! Sean Salvino 2700 Cullen Blvd PO Box 84348 Pearland, TX 77584-0802 Want to be part of the show? Leave us a voicemail: ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠https://www.speakpipe.com/Redditonwiki⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ Stories will be played for our $15 Tier Patrons ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠https://www.patreon.com/c/cultiv8podcastnetwork⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ Bonus stories + episodes + ad-free + extra live streams + cameo requests and so many more. (Timestamps are approximate due to dynamic ad insertion. Become a Patron or YouTube member for ad-free episodes) On today's AITA episode, we have:(00:00) - Intro(05:04) - AITA for not seeing a friend while she was in town? (17:43) - AITA for changing the WiFi password and not telling my roommate? (30:27) - AITA for relying too much on a coworker? (38:58) - AITA for cooking my boyfriend's ravioli? (49:46) - AITA For telling a friend that when someone is as qualified as I am, they can charge the same as I do? (1:01:31) - Outro Hit like, subscribe, and follow us on all social media platforms for all things Reddit on Wiki! Click here for our Social and Donation Links:⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ https://linktr.ee/redditonwiki Learn more about your ad choices. Visit megaphone.fm/adchoices

The Daily Scoop Podcast
Thousands of federal passwords exposed since early 2024

The Daily Scoop Podcast

Play Episode Listen Later Oct 17, 2025 5:04


A new report from the password management company NordPass is challenging the idea that federal institutions are more secure than local governments against cybersecurity threats. The study, conducted by NordPass and threat exposure management platform NordStellar, found a total of 53,070 passwords belonging to U.S. civil servants were exposed in public sources since the beginning of 2024. Of the impacted institutions, NordPass found the Department of Defense had 1,897 total exposed passwords, 222 of which were unique. The State Department had 15,272 total exposed passwords, 190 of which were unique, while the U.S. Army had 1,706 exposed passwords, 167 of them unique. The Department of Veterans Affairs also ranked among the top five most-affected institutions, with 1,331 total password exposures, 53 of which were unique. Seven passwords of White House employees were also compromised, according to the study. A State Department spokesperson told FedScoop the agency is “committed to cybersecurity across the department.” They said the agency has instituted multi-factor authentication and regularly rotates credentials. A Biden-era director of the White House Office of Science and Technology Policy slammed the Trump administration's cuts to research and development funding Wednesday, warning of adverse effects to areas such as artificial intelligence. Arati Prabhakar said during a panel held by Harvard's Kennedy School: “Today what we are in the middle of is an assault on the public investment in research unlike anything we have seen in our country's history.” Prabhakar specifically pointed to the Trump administration's moves to withdraw support from certain projects, its removal of federal workers at research agencies, its attacks on universities, reversal of immigration policies that bring talent to the U.S., and the administration's budget proposal that sought to cut federal R&D spending by roughly $44 billion. The Daily Scoop Podcast is available every Monday-Friday afternoon. If you want to hear more of the latest from Washington, subscribe to The Daily Scoop Podcast  on Apple Podcasts, Soundcloud, Spotify and YouTube.

Will & Woody
The Password For Extra Cheese

Will & Woody

Play Episode Listen Later Oct 17, 2025 45:12 Transcription Available


Kim Haberley - Face lift at 37 Can You Hear It Ruel Open Line - Your chance to take over the pod Freedom Fridays - Our chance to take it back See omnystudio.com/listener for privacy information.

Mojo In The Morning
War of the Roses Pt 1: Gabe Guessed His Boyfriend's Password

Mojo In The Morning

Play Episode Listen Later Oct 16, 2025 8:03 Transcription Available


See omnystudio.com/listener for privacy information.

Mojo In The Morning
War of the Roses Pt 2: Gabe Guessed His Boyfriend's Password

Mojo In The Morning

Play Episode Listen Later Oct 16, 2025 13:53 Transcription Available


See omnystudio.com/listener for privacy information.

Wicked Pissah Podcast
#266 - Passwords, Privacy and Peace of Mind: Wrangling Your Digitals Assets with Kate Hufnagel

Wicked Pissah Podcast

Play Episode Listen Later Oct 15, 2025 46:20


Passwords, Privacy and Peace of Mind: Wrangling Your Digitals Assets with Kate Hufnagel Kathleen and Michael speak with Kate Hufnagle, The Digital Wrangler, to explore the often-overlooked world of digital estate planning. Kate shares how organizing passwords, accounts, and important life details can ease the burden on loved ones, save money, and create true peace of mind. We talk about different types of digital assets, including ones that are often overlooked; best practices for handling usernames and passwords; how Kate works with individuals to help them wrangle their digital assets; and more! Tune in for simple, practical steps to bring more clarity and organization to your digital life. https://www.thedigitalwrangler.com/ https://www.linkedin.com/in/kate-hufnagel/  

kPod - The Kidd Kraddick Morning Show
Celebrity Gossip Part 1 – Secret Password

kPod - The Kidd Kraddick Morning Show

Play Episode Listen Later Oct 14, 2025 13:36


Kris Jenner's plastic surgeon asked Kris to help him get less business, and one celebrity claims to have been run off the road by a city employee. Learn more about your ad choices. Visit megaphone.fm/adchoices

The Dental Billing Podcast
Inside a Dental Billing Company: Password Chaos, Dentrix-Vyne Fallout, and the AR Trap

The Dental Billing Podcast

Play Episode Listen Later Oct 14, 2025 22:58 Transcription Available


Got questions? Send Ericka a Text!A candid look at why AR rises even when production is strong and how access, clarity, and team alignment restore cash flow. We share the biggest blockers we see inside practices—password chaos, clearinghouse issues, unread billing emails—and the simple systems that fix them.• password and portal access as revenue gatekeeper• EFT lockouts creating delays and aged AR• Dentrix–Vine fallout and claim tracing discipline• daily email reviews and statement ownership• patient AR rising from unclear benefits and silence• stronger benefit scripts to prevent “surprise” balances• third-party alignment as team extension, not threat• kickoff meetings for roles, tools, and expectations• billers as end-of-cycle auditors spotting root causes• repeatable rhythms for faster posting and fewer denialsIf any of this resonated with you friends, feel free to leave a review, feel free to leave a comment, share this episode with someone who you feel would relate. And if you're interested in a billing consultation and seeing how fortune billing solutions can help you, go to the show notes. There's a link down below, and you can set up a time to meet with me. Schedule a demo with MaxAssist to unlock scheduleing potential here: https://maxassist.com/book-a-demo-fortune-billing/ Join The Biller Acceleration Mentorship Wait List Here: (Only 5 Spots Left in 2025!!)https://linktr.ee/dental_billing_coachWould you like to set-up a billing consultation with Ericka? She would love the opportunity to discuss your billing questions and see how Fortune Billing Solutions may help you. Email Ericka:ericka@dentalbillingdoneright.comSchedule a call with Ericka: https://calendly.com/ericka-dentalbillingdoneright/30min Perio performance formula: (D4341+D4342+D4346+D4355+D4910)/(D4341+D4342+D4346+D4355+D4910+D1110) Delta Dental Locum Tenens Form: https://www1.deltadentalins.com/content/dam/ddins/en/pdf/dentists/locum-tenens-form.pdf

Bob Sirott
What is the difference between passwords and passkeys?

Bob Sirott

Play Episode Listen Later Oct 14, 2025


Social media strategist Scott Kleinberg joins Bob Sirott to explain what passkeys are, how they are different from passwords, and how you can set up passkey for different websites and apps. He also talks about different models of iPhones, reporting spam texts, and updating your tablet.

Bitcoin en español
1067. Cómo evitar que tus satoshis sean retenidos o confiscados

Bitcoin en español

Play Episode Listen Later Oct 14, 2025 11:08


Si, tus bitcoin pueden ser confiscados incluso si los adquiriste por la vía legal. Esto por la ambigüedad con la que las casas de cambio centralizadas determinan lo sospechosa que puede ser una dirección de bitcoin.Clases nuevas de la semana en: https://cursosbitcoin.comIntroducción pagos silenciososCómo funcionan los pagos silenciosos en bitcoin

Smiley Morning Show
Smiley's SPOOKY Password!

Smiley Morning Show

Play Episode Listen Later Oct 13, 2025 9:45


See omnystudio.com/listener for privacy information.

ITSPmagazine | Technology. Cybersecurity. Society
Everyone Is Protecting My Password, But Who Is Protecting My Toilet Paper? - Interview with Amberley Brady | AISA CyberCon Melbourne 2025 Coverage | On Location with Sean Martin and Marco Ciappelli

ITSPmagazine | Technology. Cybersecurity. Society

Play Episode Listen Later Oct 13, 2025 28:05


Everyone Is Protecting My Password, But Who Is Protecting My Toilet Paper? - Interview with Amberley Brady | AISA CyberCon Melbourne 2025 Coverage | On Location with Sean Martin and Marco CiappelliAISA CyberCon Melbourne | October 15-17, 2025Empty shelves trigger something primal in us now. We've lived through the panic, the uncertainty, the realization that our food supply isn't as secure as we thought. Amberley Brady hasn't forgotten that feeling, and she's turned it into action.Speaking with her from Florence to Sydney ahead of AISA CyberCon in Melbourne, I discovered someone who came to cybersecurity through an unexpected path—studying law, working in policy, but driven by a singular passion for food security. When COVID-19 hit Australia in 2019 and grocery store shelves emptied, Amberley couldn't shake the question: what happens if this keeps happening?Her answer was to build realfoodprice.com.au, a platform tracking food pricing transparency across Australia's supply chain. It's based on the Hungarian model, which within three months saved consumers 50 million euros simply by making prices visible from farmer to wholesaler to consumer. The markup disappeared almost overnight when transparency arrived."Once you demonstrate transparency along the supply chain, you see where the markup is," Amberley explained. She gave me an example that hit home: watermelon farmers were getting paid 40 cents per kilo while their production costs ran between $1.00 to $1.50. Meanwhile, consumers paid $2.50 to $2.99 year-round. Someone in the middle was profiting while farmers lost money on every harvest.But this isn't just about fair pricing—it's about critical infrastructure that nobody's protecting. Australia produces food for 70 million people, far more than its own population needs. That food moves through systems, across borders, through supply chains that depend entirely on technology most farmers never think about in cybersecurity terms.The new autonomous tractors collecting soil data? That information goes somewhere. The sensors monitoring crop conditions? Those connect to systems someone else controls. China recognized this vulnerability years ago—with 20% of the world's population but only 7% of arable land, they understood that food security is national security.At CyberCon, Amberley is presenting two sessions that challenge the cybersecurity community to expand their thinking. "Don't Outsource Your Thinking" tackles what she calls "complacency creep"—our growing trust in AI that makes us stop questioning, stop analyzing with our gut instinct. She argues for an Essential Nine in Australia's cybersecurity framework, adding the human firewall to the technical Essential Eight.Her second talk, cheekily titled "Everyone is Protecting My Password, But No One's Protecting My Toilet Paper," addresses food security directly. It's provocative, but that's the point. We saw what happened in Japan recently with the rice crisis—the same panic buying, the same distrust, the same empty shelves that COVID taught us to fear."We will run to the store," Amberley said. "That's going to be human behavior because we've lived through that time." And here's the cybersecurity angle: those panics can be manufactured. A fake image of empty shelves, an AI-generated video, strategic disinformation—all it takes is triggering that collective memory.Amberley describes herself as an early disruptor in the agritech cybersecurity space, and she's right. Most cybersecurity professionals think about hospitals, utilities, financial systems. They don't think about the autonomous vehicles in fields, the sensor networks in soil, the supply chain software moving food across continents.But she's starting the conversation, and CyberCon's audience—increasingly diverse, including people from HR, risk management, and policy—is ready for it. Because at the end of the day, everyone has to eat. And if we don't start thinking about the cyber vulnerabilities in how we grow, move, and price food, we're leaving our most basic need unprotected.AISA CyberCon Melbourne runs October 15-17, 2025 Virtual coverage provided by ITSPmagazineGUEST:Amberley Brady, Food Security & Cybersecurity Advocate, Founder of realfoodprice.com.au | On LinkedIn: https://www.linkedin.com/in/amberley-b-a62022353/HOSTS:Sean Martin, Co-Founder, ITSPmagazine and Studio C60 | Website: https://www.seanmartin.comMarco Ciappelli, Co-Founder, ITSPmagazine and Studio C60 | Website: https://www.marcociappelli.comCatch all of our event coverage: https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverageWant to share an Event Briefing as part of our event coverage? Learn More

The Common Man Progrum
FULL PROGRUM PASSWORD!

The Common Man Progrum

Play Episode Listen Later Oct 10, 2025 33:39


Common & Maxx vs Lil' B & Julia Daniels

The Common Man Progrum
FULL PROGRUM PASSWORD!

The Common Man Progrum

Play Episode Listen Later Oct 10, 2025 32:36 Transcription Available


Common & Maxx vs Lil' B & Julia DanielsSee omnystudio.com/listener for privacy information.

The Common Man Progrum
FULL PROGRUM PASSWORD!

The Common Man Progrum

Play Episode Listen Later Oct 10, 2025 32:36 Transcription Available


Common & Maxx vs Lil' B & Julia DanielsSee omnystudio.com/listener for privacy information.

Head-ON With Bob Kincaid
09-10-2025, Thorn-In-the-Side Thursday, Head-ON With Roxanne Kincaid

Head-ON With Bob Kincaid

Play Episode Listen Later Oct 10, 2025 179:05


Hairless Heydrich gives the game away. MAGAT senators approve murder on the High Seas. The Password is: "yardarm". All that and more in three hours of live, uncensored, fearless broadcasting that has ever been here, but seldom elsewhere.

natelovesjen Podcast
The Password Is "Apple-crisp"

natelovesjen Podcast

Play Episode Listen Later Oct 10, 2025 46:41


I had ChatGPT write this.We're so close to closing on our house!

ITSPmagazine | Technology. Cybersecurity. Society
The Once and Future Rules of Cybersecurity | A Black Hat SecTor 2025 Conversation with HD Moore | On Location Coverage with Sean Martin and Marco Ciappelli

ITSPmagazine | Technology. Cybersecurity. Society

Play Episode Listen Later Oct 9, 2025 23:37


During his keynote at SecTor 2025, HD Moore, founder and CEO of runZero and widely recognized for creating Metasploit, invites the cybersecurity community to rethink the foundational “rules” we continue to follow—often without question. In conversation with Sean Martin and Marco Ciappelli for ITSPmagazine's on-location event coverage, Moore breaks down where our security doctrines came from, why some became obsolete, and which ones still hold water.One standout example? The rule to “change your passwords every 30 days.” Moore explains how this outdated guidance—rooted in assumptions from the early 2000s when password sharing was rampant—led to predictable patterns and frustrated users. Today, the advice has flipped: focus on strong, unique passwords per service, stored securely via password managers.But this keynote isn't just about passwords. Moore uses this lens to explore how many security “truths” were formed in response to technical limitations or outdated behaviors—things like shared network trust, brittle segmentation, and fragile authentication models. As technology matures, so too should the rules. Enter passkeys, hardware tokens, and enclave-based authentication. These aren't just new tools—they're a fundamental shift in where and how we anchor trust.Moore also calls out an uncomfortable truth: the very products we rely on to protect our systems—firewalls, endpoint managers, and security appliances—are now among the top vectors for breach, per Mandiant's latest report. That revelation struck a chord with conference attendees, who appreciated Moore's willingness to speak plainly about systemic security debt.He also discusses the inescapable vulnerabilities in AI agent flows, likening prompt injection attacks to the early days of cross-site scripting. The tech itself invites risk, he warns, and we'll need new frameworks—not just tweaks to old ones—to manage what comes next.This conversation is a must-listen for anyone questioning whether our security playbooks are still fit for purpose—or simply carried forward by habit.___________GUEST:HD Moore, Founder and CEO of RunZero | On Linkedin: https://www.linkedin.com/in/hdmoore/HOSTS:Sean Martin, Co-Founder, ITSPmagazine and Studio C60 | Website: https://www.seanmartin.comMarco Ciappelli, Co-Founder, ITSPmagazine and Studio C60 | Website: https://www.marcociappelli.comRESOURCES:Keynote: The Once and Future Rules of Cybersecurity: https://www.blackhat.com/sector/2025/briefings/schedule/#keynote-the-once-and-future-rules-of-cybersecurity-49596Learn more and catch more stories from our SecTor 2025 coverage: https://www.itspmagazine.com/cybersecurity-technology-society-events/sector-cybersecurity-conference-toronto-2025Mandiant M-Trends Breach Report: https://cloud.google.com/blog/topics/threat-intelligence/m-trends-2025/OPM Data Breach Summary: https://oversight.house.gov/report/opm-data-breach-government-jeopardized-national-security-generation/Catch all of our event coverage: https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverageWant to share an Event Briefing as part of our event coverage? Learn More

Creating Confidence with Heather Monahan
Confidence Classic: The MAGIC of Surrender with Kute Blackson

Creating Confidence with Heather Monahan

Play Episode Listen Later Oct 8, 2025 52:48


Most of us want to “move on” or “let go,” but we skip the one phase that makes surrender possible. In this episode, I sit down with transformational teacher and bestselling author Kute Blackson to break down what surrender really means and why it's the opposite of weakness. We talk about how to let go without giving up, recognize the ego's survival patterns that keep you in control mode, and the step-by-step “anatomy of surrender” process. Tune in and discover the practices that will help you release control, grieve what's past, and open yourself to bigger opportunities and a life that feels more aligned and alive. In This Episode, You Will Learn Why SURRENDER is not weakness but the PASSWORD to FREEDOM. Why GRIEVING is the missing step before surrender can happen. How CONTROL is the ego's master addiction and keeps you stuck. How to tell yourself the TRUTH and stop negotiating your life away. Why PAIN is feedback that you're out of alignment. Ways to ALIGN with your soul's deeper vision and act from authenticity. Why LETTING GO of what's not for you creates space for greater blessings. Resources + Links Learn more about ⁠kuteblackson.com⁠  Read ⁠You Are The One⁠ & ⁠Magic of Surrender ⁠ FREE ⁠Reinvent Online Seminar⁠   Attend ⁠The Boundless Bliss⁠ event  Listen to ⁠Soul Talk⁠  Sign up for a one-dollar-per-month trial period at shopify.com/monahan Download the CFO's Guide to AI and Machine Learning at NetSuite.com/MONAHAN. Want to do more and spend less like Uber, 8x8, and Databricks Mosaic? Take a free test drive of OCI at oracle.com/MONAHAN. Get 10% off your first Mitopure order at timeline.com/CONFIDENCE. Get 15% off your first order when you use code CONFIDENCE15 at checkout at jennikayne.com. Call my digital clone at 201-897-2553!  Visit heathermonahan.com Sign up for my mailing list: heathermonahan.com/mailing-list/  Overcome Your Villains is Available NOW! Order here: https://overcomeyourvillains.com  If you haven't yet, get my first book Confidence Creator Follow Heather on Instagram & LinkedIn Kute on Facebook X & ⁠Instagram Kute on ⁠Youtube & LinkedIn

The Majority Report with Sam Seder
3598 - Trump Calls for Political Arrests; Urgent 2025 Elections w/ Daniel Nichanian

The Majority Report with Sam Seder

Play Episode Listen Later Oct 8, 2025 85:46


It's Hump Day on the Majority Report On Today's Show: Trump posts to Truth Social that Illinois Governor JB Pritzker and Chicago Mayor Brandon Johnson should be imprisoned for hindering ICE agents. Speaker of the House Mike Johnson (R-LA) co-signs Donald Trump's calling for Pritzker's and Johnson's imprisonment CBS Chicago reports that ICE has been making false 911 call and filing phony police reports in an attempt to agitate local authorities. The IDF has seized nine more boats attempting to break the Israeli blockade on aid for Palestinians. Greta Thunberg posts a video on social media pleading for people to stay focused on the genocide and Palestinians and to not make the flotilla members the center of the narrative. Editor of Bolts Magazine, Daniel Nichanian joins the program to discuss his Cheat Sheet for the 2025 General Elections. In the Fun Half: We revisit a talk that new head of CBS news Bari Weiss gave to the Federalist Society in 2023 where she exhibits her only talent, flattering conservatives. After receiving a $20 billion bailout, Argentina's president Javier Milei throws an arena rock show, even singing himself Pam Bondi is once again humiliated, this time by Senator Dick Durbin as he presses her on Epstein. Stephen Crowder doesn't understand why his fellow podcasters are turning on Trump. Dave Rubin goes on a misogynist rant about Greta Thunberg. All that and more The Congress switchboard number is (202) 224-3121. You can use this number to connect with either the U.S. Senate or the House of Representatives. Follow us on TikTok here: https://www.tiktok.com/@majorityreportfm Check us out on Twitch here: https://www.twitch.tv/themajorityreport Find our Rumble stream here: https://rumble.com/user/majorityreport Check out our alt YouTube channel here: https://www.youtube.com/majorityreportlive Gift a Majority Report subscription here: https://fans.fm/majority/gift Subscribe to the AMQuickie newsletter here: https://am-quickie.ghost.io/ Join the Majority Report Discord! https://majoritydiscord.com/ Get all your MR merch at our store: https://shop.majorityreportradio.com/ Get the free Majority Report App!: https://majority.fm/app Go to https://JustCoffee.coop and use coupon code majority to get 10% off your purchase Check out today's sponsors: DELETEME: Get 20% off your DeleteMe plan when you go to www.joindeleteme.com/MAJORITY and use promo code MAJORITY at checkout. WILD GRAIN: Get $30 off your first box + free Croissants in every box. Go to Wildgrain.com/MAJORITY to start your subscription. NAKED WINES: To get 6 bottles of wine for $39.99, head to NakedWines.com/MAJORITY and use code MAJORITY for both the code and PASSWORD. SUNSET LAKE:  Head to SunsetLakeCBD.com and use the code JustTreats25 to save 30% on all their gummies for sleep, focus, and relaxation Follow the Majority Report crew on Twitter: @SamSeder @EmmaVigeland @MattLech Check out Matt's show, Left Reckoning, on YouTube, and subscribe on Patreon! https://www.patreon.com/leftreckoning Check out Matt Binder's YouTube channel: https://www.youtube.com/mattbinder Subscribe to Brandon's show The Discourse on Patreon! https://www.patreon.com/ExpandTheDiscourse Check out Ava Raiza's music here! https://avaraiza.bandcamp.co

Marriage By Design
The Hump Day 90 - Should my spouse know all of my usernames and passwords?

Marriage By Design

Play Episode Listen Later Oct 8, 2025 1:29


Smiley Morning Show
Smiley's Password Game

Smiley Morning Show

Play Episode Listen Later Oct 6, 2025 8:47


win tickets to see ADAM SANDLER!See omnystudio.com/listener for privacy information.

The Common Man Progrum
Lil B, Progrum Password! Tennafitzgerald HOUR 2

The Common Man Progrum

Play Episode Listen Later Oct 3, 2025 41:27 Transcription Available


Tennafitzgerald HOUR 2 --Lil B--Nordo and Jonny Athletic --PasswordSee omnystudio.com/listener for privacy information.

The Common Man Progrum
Password 2nd Half! Russo Radio! Tennafitzgerald HOUR 3

The Common Man Progrum

Play Episode Listen Later Oct 3, 2025 40:43 Transcription Available


Tennafitzgerald HOUR 3 --Password--AYSTAPF --RussoSee omnystudio.com/listener for privacy information.

passwords russo radio
SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast
SANS Stormcast Thursday, October 2nd, 2025: Honeypot Passwords; OneLogin Vuln; Breaking Intel SGX; OpenSSL Patch

SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast

Play Episode Listen Later Oct 2, 2025 8:11


Comparing Honeypot Passwords with HIBP Most passwords used against our honeypots are also found in the Have I been pwn3d list. However, the few percent that are not found tend to be variations of known passwords, extending them to find likely mutations. https://isc.sans.edu/diary/%5BGuest%20Diary%5D%20Comparing%20Honeypot%20Passwords%20with%20HIBP/32310 Breaking Server SGX via DRAM Inspection By observing read and write operations to memory, it is possible to derive keys stored in SGX and break the security of systems relying on SGX. https://wiretap.fail/files/wiretap.pdf OneLogin OIDC Vulnerability A vulnerability in OneLogin can be used to read secret application keys https://www.clutch.security/blog/onelogin-many-secrets-clutch-uncovers-vulnerability-exposing-client-credentials OpenSSL Patch OpenSSL patched three vulnerabilities. One could lead to remote code execution, but the feature is used infrequently, and the exploit is difficult, according to OpenSSL