Podcast appearances and mentions of Roger A Grimes

  • 13PODCASTS
  • 17EPISODES
  • 46mAVG DURATION
  • ?INFREQUENT EPISODES
  • Oct 30, 2024LATEST

POPULARITY

20172018201920202021202220232024


Best podcasts about Roger A Grimes

Latest podcast episodes about Roger A Grimes

CERIAS Security Seminar Podcast
Roger Grimes, Many Ways to Hack MFA

CERIAS Security Seminar Podcast

Play Episode Listen Later Oct 30, 2024 113:12


Students: this is a hybrid event. You are strongly encouraged to attend in-person. Location:  STEW G52 (Suite 050B) WL Campus.  Everyone knows that multi-factor authentication (MFA) is more secure than a simple login name and password, but too many people think that MFA is a perfect, unhackable solution. It isn't! I can send you a regular phishing email and completely take control of your account even if you use a super-duper MFA token or smartphone app. I can hack ANY MFA solution at least a handful of different ways, although some forms of MFA are more resilient than others. Attend this presentation and learn the 12+ ways hackers can and do get around your favorite MFA solution. The presentation will include a (pre-filmed) hacking demo and real-life successful examples of every attack type. It will end by telling you how to better defend your MFA solution so that you get maximum benefit and security. About the speaker: Roger A. Grimes, CPA, CISSP, CEH, MCSE, CISA, CISM, CNE, yada, yada, Data-Driven Defense Evangelist for KnowBe4, Inc., is the author of 14 books and over 1400 articles on computer security, specializing in host security and preventing hacker and malware attacks. Roger is a frequent speaker at national computer security conferences and was the weekly security columnist at InfoWorld and CSO magazines between 2005 - 2019. He has worked at some of the world's largest computer security companies, including, Foundstone, McAfee, and Microsoft. Roger is frequently interviewed and quoted in the media including Newsweek, CNN, NPR, and WSJ. His presentations are fast-paced and filled with useful facts and recommendations.

Security-Insider Podcast
#87 Fighting Phishing

Security-Insider Podcast

Play Episode Listen Later May 24, 2024 44:18


Mit seinem Buch „Fighting Phishing“ will Roger A. Grimes zugleich Fachanwender, IT-Mitabeiter und Führungskräfte gegen verschiedenartigste Angriffe per Social Engineering wappnen. Wie gut dieser thematische Rundumschlag gelingt, besprechen wir in dieser Folge des Security-Insider Podcast mit Dr. Martin J. Krämer. Kleiner Spoiler: Sogar der Forscher und Dozent bei KnowB4 konnte seine Expertise mit dem Werk noch weiter vertiefen.Weiterführende Informationen und Links zu dieser Episode gibt es im Artikel auf Security-Insider!Bestellen Sie unseren kostenfreien Security-Insider Newsletter!Weitere spannende Podcasts aus unserem Haus:BREAKING DATA - der Podcast zu Datenanalyse und AICLOUD ON AIR - mit Experten und Anwendern aus der Cloud-WeltDATACENTER DIARIES - Homestories direkt aus dem Zentrum von Daten und RechnernDEV-METAL - der Podcast für Entwicklerinnen und EntwicklerLOCALHOST - mit spannenden Gästen zu den Themen Netzwerktechnik und IP-basierter KommunikationSPEICHERHUNGRIG - für Speicherprofis und -interessierteUNBÜROKRATISCH - zur Digitalisierung der VerwaltungHEALTHCARE DIGITAL - zur Digitalisierung im GesundheitswesenINSIDER RESEARCH - Das Expertengespräch zur Digitalisierung

Cyber Pro Podcast
#281 | Roger Grimes | Data-Driven Defense Evangelist | KnowBe4

Cyber Pro Podcast

Play Episode Listen Later Sep 20, 2023 10:20


Roger talks to us about all things phishing and cybersecurity. He discusses how spear phishing is responsible for 60% of all data breaches. He talks about the current trends of crowd sourcing, big data, and AI. He touches on how AI will be used to make more responsive tools to catch phishing. He is hopeful that with AI and crowd sourcing will bring back the accuracy that we have seemed to be missing lately. He discusses how insurance companies are requiring MFA, but is that really as secure as we think it is?   Connect with Roger: https://www.linkedin.com/in/rogeragrimes/ Visit KnowBe4: https://www.knowbe4.com/ Check out Rogers books: https://www.amazon.com/Roger-A.-Grimes/e/B001IQUMT4%3Fref=dbs_a_mng_rwt_scns_share   Visit Shortarms website: https://www.shortarmsolutions.com/    You can follow us at: Linked In: https://www.linkedin.com/company/shortarmsolutions  YouTube: https://www.youtube.com/@shortarmsolutions   Twitter: https://twitter.com/ShortArmSAS

ai defense rogers mfa evangelist grimes data driven knowbe4 data driven defense evangelist roger a grimes
Cyber Pro Podcast
#281 | Roger Grimes | Data-Driven Defense Evangelist | KnowBe4

Cyber Pro Podcast

Play Episode Listen Later Sep 20, 2023 10:20


Roger talks to us about all things phishing and cybersecurity. He discusses how spear phishing is responsible for 60% of all data breaches. He talks about the current trends of crowd sourcing, big data, and AI. He touches on how AI will be used to make more responsive tools to catch phishing. He is hopeful that with AI and crowd sourcing will bring back the accuracy that we have seemed to be missing lately. He discusses how insurance companies are requiring MFA, but is that really as secure as we think it is?   Connect with Roger: https://www.linkedin.com/in/rogeragrimes/ Visit KnowBe4: https://www.knowbe4.com/ Check out Rogers books: https://www.amazon.com/Roger-A.-Grimes/e/B001IQUMT4%3Fref=dbs_a_mng_rwt_scns_share   Visit Shortarms website: https://www.shortarmsolutions.com/    You can follow us at: Linked In: https://www.linkedin.com/company/shortarmsolutions  YouTube: https://www.youtube.com/@shortarmsolutions   Twitter: https://twitter.com/ShortArmSAS

ai defense rogers mfa evangelist grimes data driven knowbe4 data driven defense evangelist roger a grimes
Paul's Security Weekly TV
Focusing on Preventing Ransomware - Roger Grimes - PSW #716

Paul's Security Weekly TV

Play Episode Listen Later Oct 29, 2021 48:27


A good backup is not prevention. Its recovery. Roger A. Grimes, author of the just released Ransomware Protection Playbook (Wiley), and author of 12 other books and over 1100 articles on computer security is going to discuss how sophisticated ransomware is today, how it usually breaks in, what it does, and what every person and organization should be doing to stop it. Hint, it doesn't involve firewalls, antivirus software, or any other super special software supposedly designed to stop every attack. Come get the straight dope in what you and your company should be doing to prevent ransomware from getting a foothold into your environment…from the guy that wrote the book on it.   Visit https://www.securityweekly.com/psw for all the latest episodes! Show Notes: https://securityweekly.com/psw716

Paul's Security Weekly (Video-Only)
Focusing on Preventing Ransomware - Roger Grimes - PSW #716

Paul's Security Weekly (Video-Only)

Play Episode Listen Later Oct 28, 2021 48:27


A good backup is not prevention. Its recovery. Roger A. Grimes, author of the just released Ransomware Protection Playbook (Wiley), and author of 12 other books and over 1100 articles on computer security is going to discuss how sophisticated ransomware is today, how it usually breaks in, what it does, and what every person and organization should be doing to stop it. Hint, it doesn't involve firewalls, antivirus software, or any other super special software supposedly designed to stop every attack. Come get the straight dope in what you and your company should be doing to prevent ransomware from getting a foothold into your environment…from the guy that wrote the book on it.   Visit https://www.securityweekly.com/psw for all the latest episodes! Show Notes: https://securityweekly.com/psw716

What keeps you up at night? (audio feed)
What keeps Roger Grimes up at night?

What keeps you up at night? (audio feed)

Play Episode Listen Later Aug 17, 2021 23:17


Roger A. Grimes is Data-Driven Defense Evangelist for KnowBe4. Roger is a 33-year computer security consultant, instructor, holder of dozens of computer certifications, and author of 12 books and over 1,100 magazine articles on computer security. He has spoken at many of the world's biggest computer security conferences, been in Newsweek magazine, appeared on television, been interviewed for NPR's All Things Considered, the Wall Street Journal, and been a guest on dozens of radio shows and podcasts. He has worked at some of the world's largest computer security companies, including Foundstone, McAfee, and Microsoft. He specializes in host and network security, quantum security, identity management, anti-malware, hackers, honeypots, Public Key Infrastructure, cloud security, cryptography, policy, and technical writing. Scott Schober is a #cybersecurity​ and wireless technology expert, author of Hacked Again and Cybersecurity is Everybody's Business, host of 2 Minute CyberSecurity Briefing video podcast and CEO of Berkeley Varitronics Systems who appears regularly on Bloomberg TV, Fox Business & Fox News, CGTN America, Canadian TV News, as well as CNN, CBS Morning Show, MSNBC, CNBC, The Blaze, WPIX as well as local and syndicated Radio including Sirius/XM & Bloomberg Radio and NPR. Subscribe and follow: Apple Podcasts: https://podcasts.apple.com/us/podcast... Google Podcasts: https://podcasts.google.com/feed/aHR0... iHeart Podcasts: https://www.iheart.com/podcast/70626340/ Amazon Music Podcasts: https://scottschober.com/wp-content/u... YouTube: https://www.youtube.com/channel/UCxqx... Twitter: @ScottBVS LinkedIn: https://www.linkedin.com/in/snschober​ Website: www.ScottSchober.com

What keeps you up at night?
What keeps Roger Grimes up at night?

What keeps you up at night?

Play Episode Listen Later Aug 17, 2021 23:17


Roger A. Grimes is Data-Driven Defense Evangelist for KnowBe4. Roger is a 33-year computer security consultant, instructor, holder of dozens of computer certifications, and author of 12 books and over 1,100 magazine articles on computer security. He has spoken at many of the world's biggest computer security conferences, been in Newsweek magazine, appeared on television, been interviewed for NPR's All Things Considered, the Wall Street Journal, and been a guest on dozens of radio shows and podcasts. He has worked at some of the world's largest computer security companies, including Foundstone, McAfee, and Microsoft. He specializes in host and network security, quantum security, identity management, anti-malware, hackers, honeypots, Public Key Infrastructure, cloud security, cryptography, policy, and technical writing. Scott Schober is a #cybersecurity​ and wireless technology expert, author of Hacked Again and Cybersecurity is Everybody's Business, host of 2 Minute CyberSecurity Briefing video podcast and CEO of Berkeley Varitronics Systems who appears regularly on Bloomberg TV, Fox Business & Fox News, CGTN America, Canadian TV News, as well as CNN, CBS Morning Show, MSNBC, CNBC, The Blaze, WPIX as well as local and syndicated Radio including Sirius/XM & Bloomberg Radio and NPR. Subscribe and follow: Apple Podcasts: https://podcasts.apple.com/us/podcast... Google Podcasts: https://podcasts.google.com/feed/aHR0... iHeart Podcasts: https://www.iheart.com/podcast/70626340/ Amazon Music Podcasts: https://scottschober.com/wp-content/u... YouTube: https://www.youtube.com/channel/UCxqx... Twitter: @ScottBVS LinkedIn: https://www.linkedin.com/in/snschober​ Website: www.ScottSchober.com

ceo business radio microsoft cnn wall street journal npr google podcasts cybersecurity cnbc msnbc newsweek grimes mcafee all things considered bloomberg tv knowbe4 wpix cbs morning show scott schober amazon music podcasts foundstone hacked again data driven defense evangelist cgtn america roger a grimes everybody's business canadian tv news sirius xm bloomberg radio minute cybersecurity briefing
Drinking With Authors
Episode 105 Literary Briefs Roger Grimes

Drinking With Authors

Play Episode Listen Later Feb 17, 2021 33:30


Roger A. Grimes, Data-Driven Defense Evangelist for KnowBe4, Inc., is a 33-year computer securityconsultant, instructor, holder of dozens of computer certifications, and author of 12 books and over 1,000magazine articles on computer security. He has spoken at many of the world’s biggest computer securityconferences, been in Newsweek™ magazine, appeared on television, been interviewed for NPR’s AllThings Considered™, the Wall Street Journal, and been a guest on dozens of radio shows and podcasts.He has worked at some of the world’s largest computer security companies, including Foundstone,McAfee, and Microsoft. He has consulted for hundreds of companies, from the largest to the smallest,around the world. He specializes in host and network security, quantum security, identity management,anti-malware, hackers, honeypots, Public Key Infrastructure, cloud security, cryptography, policy, andtechnical writing. His certifications have included CPA, CISSP, CISA, CISM, CEH, MSCE: Security,Security+, and yada-yada others, and he has been an instructor for many of them. His writings andpresentations are often known for their real-world, contrarian views. He was the weekly security columnistfor InfoWorld and CSO magazines between 2005 - 2019.Roger A. Grimes, CPA, CISSP, CEH, MCSE, CISA, CISM, CNE, yada, yada, is the author of 12 books and over1000 national magazine articles on computer security, specializing in host security and preventinghacker and malware attacks. Roger is a frequent speaker at national computer security conferences, andwas the weekly security columnist at InfoWorld and CSO magazines between 2005 - 2019. He hasworked at some of the world’s largest computer security companies, including, Foundstone, McAfee,and Microsoft. Roger is frequently interviewed and quoted in the media including Newsweek, CNN, NPR,and WSJ. His presentations are fast-paced and filled with useful facts and recommendations.Contact the Author:Email: roger@banneretcs.comLinkedIn: https://www.linkedin.com/in/rogeragrimes/Twitter: @rogeragrimesCSOOnline: https://www.csoonline.com/author/Roger-A.-Grimes/Author’s other books on Amazon: https://www.amazon.com/Roger-A.-Grimes/e/B001IQUMT4/

Drinking With Authors
Episode 104 Roger Grimes

Drinking With Authors

Play Episode Listen Later Feb 13, 2021 59:54


Roger A. Grimes, Data-Driven Defense Evangelist for KnowBe4, Inc., is a 33-year computer securityconsultant, instructor, holder of dozens of computer certifications, and author of 12 books and over 1,000magazine articles on computer security. He has spoken at many of the world’s biggest computer securityconferences, been in Newsweek™ magazine, appeared on television, been interviewed for NPR’s AllThings Considered™, the Wall Street Journal, and been a guest on dozens of radio shows and podcasts.He has worked at some of the world’s largest computer security companies, including Foundstone,McAfee, and Microsoft. He has consulted for hundreds of companies, from the largest to the smallest,around the world. He specializes in host and network security, quantum security, identity management,anti-malware, hackers, honeypots, Public Key Infrastructure, cloud security, cryptography, policy, andtechnical writing. His certifications have included CPA, CISSP, CISA, CISM, CEH, MSCE: Security,Security+, and yada-yada others, and he has been an instructor for many of them. His writings andpresentations are often known for their real-world, contrarian views. He was the weekly security columnistfor InfoWorld and CSO magazines between 2005 - 2019.Roger A. Grimes, CPA, CISSP, CEH, MCSE, CISA, CISM, CNE, yada, yada, is the author of 12 books and over1000 national magazine articles on computer security, specializing in host security and preventinghacker and malware attacks. Roger is a frequent speaker at national computer security conferences, andwas the weekly security columnist at InfoWorld and CSO magazines between 2005 - 2019. He hasworked at some of the world’s largest computer security companies, including, Foundstone, McAfee,and Microsoft. Roger is frequently interviewed and quoted in the media including Newsweek, CNN, NPR,and WSJ. His presentations are fast-paced and filled with useful facts and recommendations.Contact the Author:Email: roger@banneretcs.com LinkedIn: https://www.linkedin.com/in/rogeragrimes/Twitter: @rogeragrimesCSOOnline: https://www.csoonline.com/author/Roger-A.-Grimes/Author’s other books on Amazon: https://www.amazon.com/Roger-A.-Grimes/e/B001IQUMT4/

The CyberHub Podcast
Tech Corner with Roger Grimes Data Driven Defense Evangelist at KnowBe4 - Hacking MFA

The CyberHub Podcast

Play Episode Listen Later Jan 8, 2021 72:50 Transcription Available


Topic: Hacking MFA    In the first episode of Tech Corner for 2021 The legendary Roger Grimes joins host James Azar to discuss the truth behind MFA and how secure it really is. Roger shares best use cases, types of MFA to avoid, Fido2 and much more… Guest Bio: Roger A. Grimes, Data-Driven Defense Evangelist for KnowBe4, Inc., is a 33-year computer security consultant, instructor, holder of dozens of computer certifications, and author of 12 books and over 1,000 magazine articles on computer security. He has spoken at many of the world's biggest computer security conferences, been in Newsweek™ magazine, appeared on television, been interviewed for NPR's All Things Considered™, the Wall Street Journal, and been a guest on dozens of radio shows and podcasts. He has worked at some of the world's largest computer security companies, including Foundstone, McAfee, and Microsoft. He has consulted for hundreds of companies, from the largest to the smallest, around the world. He specializes in host and network security, quantum security, identity management, anti-malware, hackers, honeypots, Public Key Infrastructure, cloud security, cryptography, policy, and technical writing. His certifications have included CPA, CISSP, CISA, CISM, CEH, MSCE: Security, Security+, and yada-yada others, and he has been an instructor for many of them. His writings and presentations are often known for their real-world, contrarian views. He was the weekly security columnist for InfoWorld and CSO magazines between 2005 - 2019.   Roger A. Grimes, CPA, CISSP, CEH, MCSE, CISA, CISM, CNE, yada, yada, is the author of 12 books and over 1000 national magazine articles on computer security, specializing in host security and preventing hacker and malware attacks. Roger is a frequent speaker at national computer security conferences, and was the weekly security columnist at InfoWorld and CSO magazines between 2005 - 2019. He has worked at some of the world's largest computer security companies, including, Foundstone, McAfee, and Microsoft. Roger is frequently interviewed and quoted in the media including Newsweek, CNN, NPR, and WSJ. His presentations are fast-paced and filled with useful facts and recommendations.   Tech Corner is supported by these great partners please make sure to check them out: KnowBe4: https://info.knowbe4.com/phishing-security-test-cyberhub    James Azar Host of CyberHub Podcast James on Twitter: https://twitter.com/james_azar1 James on Linkedin: https://www.linkedin.com/in/james-azar-a1655316/ ****** Sign up for our newsletter with the best of CyberHub Podcast delivered to your inbox once a month: http://bit.ly/cyberhubengage-newsletter ****** Website: https://www.cyberhubpodcast.com Youtube: https://www.youtube.com/channel/UCPoU8iZfKFIsJ1gk0UrvGFw Facebook: https://www.facebook.com/CyberHubpodcast/ Linkedin: https://www.linkedin.com/company/cyberhubpodcast/ Twitter: https://twitter.com/cyberhubpodcast Instagram: https://www.instagram.com/cyberhubpodcast Listen here: https://linktr.ee/cyberhubpodcast CISO Talk Podcast: https://linktr.ee/CISOtalk

Bill Murphy's  RedZone Podcast | World Class IT Security
#173: Hacking Multifactor Authentication - Interview With the Best in the World at Computer Security Defense - Roger Grimes

Bill Murphy's RedZone Podcast | World Class IT Security

Play Episode Listen Later Nov 23, 2020 59:42


Today, my guest is Roger Grimes.  Roger's expertise in the field of computer security is unparalleled. He describes himself as the best in the world when it comes to computer security defense- and he has the credentials to back up this assertion. He works with Kevin Mitnick who he calls the best Offensive Security guy in the world, but he calls himself the best when it comes to Defense. As all of you know by now I love Offense and Defense Innovation so this interview falls squarely into the category of Defense Innovation for sure. With more than 40 computer certifications and twelve books authored or (Co-authored) on computer security, Roger has spent over three decades imparting his knowledge to audiences worldwide. His current title is Data-Driven Defense Evangelist at KnowBe4. He is the author of the new book, Hacking Multifactor Authentication. Roger is a 33-year senior computer security architect and cybersecurity veteran specializing in general computer security, identity management, PKI, Windows computer security, host security, cloud security, honeypots, APT, and defending against hackers and malware. He has worked at some of the world's largest computer security companies, including Foundstone, McAfee, and Microsoft. In this time of remote workforces and distributed endpoints, Roger advocates for Multi-Factor Authentication. However, MFA is not the end all be all for security. The vast majority of hacking doesn't care about your MFA. It's all about reducing your risk, according to Roger. Throughout his many years in the industry, Roger a universal mission that drives all of his actions- to make the internet a safer place. Roger says if he leaves the Earth without accomplishing that feat, he has failed. I also provide how you can connect with him on Linkedin. He has over 25k followers. We've been sold by the industry that MFA is a Warm Blanky and Panacea for all security ills. Learn more deeply about this topic as it is critical to your distributed security architectures moving forward I'm excited to share this conversation with such a distinguished and world-renowned Security Defense Specialist. Here are useful topics, books, and resources discussed and what you will learn as you listen: Why most companies today fail in risk-based security and how to avoid the most common pitfalls. The benefits of enabling application control software like AppLocker in audit only mode. Why assuming just because you have MFA that you can't be hacked is false and how smart application of MFA will reduce your risk of getting hacked. Why push applications like FIDO are more effective than SMS-based multi-factor authentication. The highest risk areas CIO's and CISO's need to avoid falling into when dealing with MFA. Why MFA and other security measures like it are all about reducing your risk instead of eliminating it completely. How to Connect with this Guest: LinkedIn  Twitter      Books    Articles  Technologies referenced in podcast: Troy Hunt’s “Have I Been Pwned?”  Kevin Mitnick's “Mitnick Security” FIDO Alliance Framework Books Published by Roger A. Grimes Referenced in Podcast: Hacking Multifactor Authentication , 1st Edition, By Roger A. Grimes. Published by Wiley, 2020 A Data-Driven Computer Security Defense: THE Computer Security Defense You Should Be Using, 1st Edition, By Roger A. Grimes, Published Independently, 2017 Transcript: You can go to the show notes to get more information about this interview and what we discussed in this episode. You'll find the show notes at redzonetech.net/podcasts. Leave A Review: Love this episode? Share it with your LinkedIn community here. If you haven't already, please make sure you leave us a review on iTunes or Stitcher. Not sure how to leave a review? Check out the instructions here. About Bill Murphy: Bill Murphy is a world-renowned IT Security Expert dedicated to your success as an IT business leader. Follow Bill on LinkedIn and Twitter. If you are interested in learning more about RedZone and our security expertise in particular related to Cloud and Email Security Kill Chain Strategy, Techniques, and Tactics you can email cloudkill@redzonetech.net. Music provided by Ben's Sound: http://www.bensound.com/ Other Ways to Listen to the Podcast: iTunes | Libsyn | Soundcloud | RSS | LinkedIn

Fool Me Twice
S1E9: 9| Watch Out

Fool Me Twice

Play Episode Listen Later Dec 19, 2019 58:58


FINAL EPISODE: We dive a little deeper into the mechanisms of scamming, and hear from a woman whose online dating situation was downright scary. What are some ways we can protect ourselves from the possibility of being scammed? All the experts keep saying that it can happen to anyone. A huge coup as Jules manages to contact a real-life scammer from Ghana, and interviews him to find out about his motives and tactics. Fool Me Twice - A True Crime podcast is based on a memoir of the same name by Jules Hannaford. It is written and directed by Zara Hannaford and is produced and edited by Jules Hannaford. Music and sound design by Shayde Furlong. The theme song is performed by Angele Meyerhoff. Special thanks to Experts: Roger A. Grimes, Scott Musgrove and Shiloh Catanese. Actor: Gareth Dunster and Scam Victim: Michelle. Special thanks to ABC7 in Los Angeles for the audio of the Nigerian Scammers Arrests FBI Press Conference. Fool Me Twice is available on Apple Podcasts, Spotify, Auscast Network and anywhere that you listen to your podcasts. Please check out our Patreon page where you can listen to the episodes AD FREE and get many other rewards for as little as $1USD a month. https://www.patreon.com/foolmetwice Fool Me Twice: https://www.foolmetwicepod.com/ Zara Hannaford: https://www.synonymediting.com/ Auscast Network: https://www.auscastnetwork.com/home/fool-me-twice Shayde Furlong: https://shaydefurlong.com/ Angele Meyerhoff: angelemeyerhoff@gmail.com Fool Me Twice Sponsors Bust a Rut: https://www.bustarut.net/ Adelaide Independent Taxis: http://aitaxis.com.au/ Zara Hannaford: https://www.movecreateplay.com/ Promo Swap: Hong Kong Confidential: http://www.hongkongconfidential.net/ Support the show.

Fool Me Twice
S1E8: 8| Safe and Sound

Fool Me Twice

Play Episode Listen Later Dec 12, 2019 44:04


Back in Hong Kong, she is out, and safe. However, now comes time for reflection, and with that, the gift (or curse) of hindsight. Jules wonders how she could have missed all the signs! There were so many red flags and it’s up to her to figure out how to learn from these mistakes, heal and move forward. We hear from experts in the field to help us piece together the events and the best ways to grow from them. Fool Me Twice - A True Crime podcast is based on a memoir of the same name by Jules Hannaford. It is written and directed by Zara Hannaford and is produced and edited by Jules Hannaford. Music and sound design by Shayde Furlong. The theme song is performed by Angele Meyerhoff. Special thanks to Experts: Elina Juusola, Roger A. Grimes, Kathy Waters and Bryan Denny. Actor: Lawrence Akandu and Scam Victim: Sharon Fool Me Twice is available on Apple Podcasts, Spotify, Auscast Network and anywhere that you listen to your podcasts. Please check out our Patreon page where you can listen to the episodes AD FREE and get many other rewards for as little as $1USD a month. https://www.patreon.com/foolmetwice Fool Me Twice: https://www.foolmetwicepod.com/ Zara Hannaford: https://www.synonymediting.com/ Auscast Network: https://www.auscastnetwork.com/home/fool-me-twice Shayde Furlong: https://shaydefurlong.com/ Angele Meyerhoff: angelemeyerhoff@gmail.com Fool Me Twice Sponsors Bust a Rut: https://www.bustarut.net/ Michelle Harris International: https://www.michelleharrisinternational.com/ Zara Hannaford: https://www.movecreateplay.com/ Promo Swap: Hong Kong Confidential: http://www.hongkongconfidential.net/ Support the show.

Fool Me Twice
S1E7: 7| Cigarettes Saved My Life

Fool Me Twice

Play Episode Listen Later Dec 5, 2019 38:38


With a cold, hard dose of reality, Jules has finally realised that she is in danger. She knows that she needs to get out, fast, from this situation that’s dodgy in more ways than one. She needs to get the car back from Truman. He has taken it, but where? Finally, he returns to the hotel and since he now knows any opportunity to further scam her is impossible, he severs connection from her, and he does it violently. Fool Me Twice - A True Crime podcast is based on a memoir of the same name by Jules Hannaford. It is written and directed by Zara Hannaford and is produced and edited by Jules Hannaford. Music and sound design by Shayde Furlong. The theme song is performed by Angele Meyerhoff. Special thanks to Experts: Elina Juusola and Roger A. Grimes and Scam Victim: Kathleen Fool Me Twice is available on Apple Podcasts, Spotify, Auscast Network and anywhere that you listen to your podcasts. Please check out our Patreon page where you can listen to the episodes AD FREE and get many other rewards for as little as $1USD a month. https://www.patreon.com/foolmetwice Fool Me Twice: https://www.foolmetwicepod.com/ Zara Hannaford: https://www.synonymediting.com/ Auscast Network: https://www.auscastnetwork.com/home/fool-me-twice Shayde Furlong: https://shaydefurlong.com/ Angele Meyerhoff: angelemeyerhoff@gmail.com Fool Me Twice Sponsors Bust a Rut: https://www.bustarut.net/ Happy Ever After: https://happyeverafter.asia/ Podvertise: https://podvertise.com.au/ Zara Hannaford: https://www.movecreateplay.com/ Support the show.

No Password Required
Roger A. Grimes, KnowBe4’s data-driven defense evangelist

No Password Required

Play Episode Listen Later Nov 7, 2019 40:40


Can a piece of dust on your touchscreen compromise your data? The answer is yes. We learn how from No Password Required Podcast guest Roger A. Grimes, KnowBe4’s data-driven defense evangelist, whose mission is to educate others about cybersecurity issues that can compromise computers. He shares two of the largest threats of cyberattacks impacting companies: social engineering and unpatched software. His simple advice for avoiding 99% of cyber risks: “Patch your stuff and don’t get tricked into doing something you shouldn’t; you do those two things and you will not get hacked.”Roger is a prolific author, blogger and speaker. He shares his 30+ years of penetration testing/ethical hacking expertise with companies and tech professionals to improve their security and defend their network. In this interview, he talks about man-in-the-middle attacks and other social engineering scams that open doors for data breaches. He examines the lack of improvement in technical controls and the proliferation of adversaries and continuous daily malware attempts. Roger also discusses the future of computing with quantum supremacy on the horizon and the threat it poses to public key cryptography. Topics in Order:Who is Roger A. Grimes?Hacking Isn’t That Hard Is Misinformation Part of the Cybersecurity ProblemAnti-Virus and Firewalls Don’t Work - Close Your Computer Exploits by Patching Software 10 Ways I Can Hack YouRecognizing Red Flags of Social EngineeringWhy is Hacking Still Such a ProblemHow to Hack Passwords & Multi-factor AuthenticationThe Truth Behind Password Lengths and Password PoliciesHow to Never Be HackedIs that Dust or Hair on Your Touchscreen? Nope, it’s an Embedded ScamWhat are the Two Biggest Cybersecurity Risks?Have You Heard of this Scam? Security Awareness Training and Social EngineeringCreating a Cyber Culture for Your Employees through Security Awareness TrainingThe End of Classic ComputingWill Quantum Computers Launch in 2019?  The Sprint for Quantum SupremacyA Better Future with Quantum ModelsThe Downside of Quantum Computers: Breaking the Public Key CryptographyThe Coming Quantum BreakPost-Quantum Encryption and Susceptibility Has the Quantum Crypto Break Already Happened? Is Quantum Supremacy a Big Deal or the Next Y2K?What is Crypto-Agility and Will it Matter with Quantum Computing?Is Society Becoming Tolerant of Hacking and Cybercrime? Why and What Do We Do About It?  

Cyber Speaks LIVE
Dissecting Malware Variants and Defenses with Roger Grimes of KnowBe4

Cyber Speaks LIVE

Play Episode Listen Later May 17, 2019 68:12


In this episode I'm honored to be joined by Roger A. Grimes, famed KnowBe4 evangelist, to discuss: Nine kinds of malware (literally!)  A flashback to the Microsoft Trustworthy Computing Initiative  Revisited WannaCry two years later - have we learned anything?  Debate whether Marcus Hutchins is a hero or a zero Episode Timeline: Top 3 Cyber Clusters (1:00) Roger Intro (7:00 9 Types of Malware & How to Detect & Defeat Them (9:56) WannaCry Revisited (48:48) Marcus Hutchins (52:31) Kevin Mitnick (56:27) About KnowBe4 (1:03:37) 9 Types of Malware & How to Detect & Defeat Them      1. Viruses 12:13      2. Worms 16:13 (Sidebar: Trustworthy Computing Initiative 17:53)      3. Trojans 12:42      4. Hybrids/Exotic Forms 27:54 (Sidebar: Botnets 27:07)      5. Ransomware 31:33      6. File-less (In-Memory Injection) 38:27      7. Adware 40:08      8. Malvertising 43:00 (Sidebar: 3rd Party Patching 45:18)      9. Spyware 47:15 CSO Online: 9 types of malware and how to recognize them Think you know your malware? Here's a refresher to make sure you know what you're talking about — with basic advice for finding and removing malware when you've been hit https://www.csoonline.com/article/2615925/security-your-quick-guide-to-malware-types.html --- Send in a voice message: https://anchor.fm/cyberspeakslive/message