POPULARITY
Categories
Get ready for busy year end by building a checklist to avoid global payment fraud. Don't forget to download your free checklist template!Keep listening. Check out my website www.debrarrichardson.com if you need help implementing authentication techniques, internal controls, and best practices to prevent fraudulent payments, regulatory fines or bad vendor data. Check out the Vendor Process Training Center for 116+ hours of weekly live and on-demand training for the Vendor team. Links mentioned in the podcast + other helpful resources: On-Demand Webinar to Get Checklist: Build Your Checklist to Avoid Global Payment Fraud At Busy Year-End - In 5 StepsCustomized Vendor Validations Session: https://debrarrichardson.com/vendor-validation-sessionFree Download: Vendor Validation Reference List with Resource Links https://debrarrichardson.com/vendor-validation-downloadVendor Process Training Center - https://training.debrarrichardson.comCustomized Fraud Training: https://training.debrarrichardson.com/customized-fraud-training Free Live and On-Demand Webinars: https://training.debrarrichardson.com/webinarsVendor Master File Clean-Up: https://www.debrarrichardson.com/cleanupYouTube Channel: https://www.youtube.com/channel/UCqeoffeQu3pSXMV8fUIGNiw More Podcasts/Blogs/Webinars www.debrarrichardson.comMore ideas? Email me at debra@debrarrichardson.com Music Credit: www.purple-planet.com
Today on the Social-Engineer Podcast: The Security Awareness Series, Chris is joined by Michelle Li. Chris and Michelle delve into the transformative role of AI in social engineering, highlighting both its potential and pitfalls. Their conversation emphasizes the critical need for empathy in leadership and the importance of maintaining human-centric processes in an increasingly automated world. [Nov 17, 2025] 00:00 - Intro 00:27 - Intro Links: - Social-Engineer.com - http://www.social-engineer.com/ - Offensive Security Vishing Services - https://www.social-engineer.com/offensive-security/vishing/ - Offensive Security SMiShing Services - https://www.social-engineer.com/offensive-security/smishing/ - Offensive Security Phishing Services - https://www.social-engineer.com/offensive-security/smishing/ - Call Back Phishing - https://www.social-engineer.com/offensive-security/call-back-phishing/ - Adversarial Simulation Services - https://www.social-engineer.com/offensive-security/adversarial-simulation/ - Social Engineering Risk Assessments - https://www.social-engineer.com/offensive-security/social-engineering-risk-assessment/ - Social-Engineer channel on SLACK - https://social-engineering-hq.slack.com/ssb - CLUTCH - http://www.pro-rock.com/ - innocentlivesfoundation.org - http://www.innocentlivesfoundation.org/ 02:34 - Michelle Li Intro 03:14 - A Roundabout Journey 05:40 - The Importance of Legacy 07:26 - Using AI Honorably 10:00 - The Effects of AI on Social Engineering 11:52 - AI for Protection 13:47 - Still About the Human Role 14:49 - Masterclass Ad 16:27 - Origins of FASE 20:01 - Reflection of Self 25:52 - The Role of Core Principles 30:15 - New Kid in Town 34:08 - Find Michelle Li Online - LinkedIn: https://www.linkedin.com/in/michelle-li-mba-ssbb-0850b975/ - Website: https://www.bisblox.com/ 34:47 - Book Recommendations - Blink - Malcolm Gladwell - The Book of Forgiving - Desmond Tutu 36:11 - Mentors 38:52 - Wrap Up & Outro - www.social-engineer.com - www.innocentlivesfoundation.org
A young undercover FBI operative risks everything to expose America's most devastating traitor — revealing how Cold-War spycraft evolved into today's cybercrime economy.The shocking true story of Robert Hanssen — the FBI mole who sold America's deepest secrets to Russia for over 20 years, leading to the execution of multiple double agents and triggering the worst intelligence breach in U.S. history.
As Accounts Payable or Vendor team members we know that fraud risk is high in email. Is there a way that you can tell which email addresses are risky? And is that sufficient to manage fraud risk?Keep listening. Check out my website www.debrarrichardson.com if you need help implementing authentication techniques, internal controls, and best practices to prevent fraudulent payments, regulatory fines or bad vendor data. Check out the Vendor Process Training Center for 116+ hours of weekly live and on-demand training for the Vendor team. Links mentioned in the podcast + other helpful resources: AVM Framework: 3 Step Vendor Setup and Maintenance Process Workshop https://training.debrarrichardson.com/course/vendoronboardingworkshopFree Training: Plug Up the Gaps in Your Vendor Process https://training.debrarrichardson.com/course/gapsImprove the Confirmation Call: Vendor Callback Confirmation Toolkit(TM)https://training.debrarrichardson.com/course/callback-confirmation-toolkitCustomized Vendor Validations Session: https://debrarrichardson.com/vendor-validation-sessionFree Download: Vendor Validation Reference List with Resource Links https://debrarrichardson.com/vendor-validation-downloadVendor Process Training Center - https://training.debrarrichardson.comCustomized Fraud Training: https://training.debrarrichardson.com/customized-fraud-training Free Live and On-Demand Webinars: https://training.debrarrichardson.com/webinarsVendor Master File Clean-Up: https://www.debrarrichardson.com/cleanupYouTube Channel: https://www.youtube.com/channel/UCqeoffeQu3pSXMV8fUIGNiw More Podcasts/Blogs/Webinars www.debrarrichardson.comMore ideas? Email me at debra@debrarrichardson.com Music Credit: www.purple-planet.com
Swipe right… but at what cost?
Time Stamps:2:30 - Happy Veterans Day! -- Al-Qaeda's White House Tour3:47 - Archive.is down following a subpoena from the FBI5:11 - J6 Pipe Bomber Allegedly Identified22:51 - Mamdani's Antisemitic False flag30:36 - (First Caller): J6 Psychosis & the David movie41:17 - Trump's Crucifixion Free Masonic Artwork46:48 - The Kansas City Butcher's Satanic Art collection1:03:18 - Postmortem/Call-in Portion1:19:00 - Adam Fitzgerald joins the show1:48:11 - Lauren Boebert's Halloween Costume1:51:01 - Kanye's public humiliation ritual with corrupt Zionist Kabbalistic Moroccan RabbiVenture into the shadowy realms of power and secrecy with Already Dead, where hosts Jose Galison (@towergangjose) and Austin Picard (@theatrethugawp) dissect the intricate web of conspiracy, covert operations, and the underlying political machinations that might just be pulling the strings of our society.What to Expect: Live Listener Interaction: Call in to share your theories, ask burning questions, or discuss personal experiences related to the topics at hand. In-Depth Explorations: Each episode focuses on a different conspiracy or hidden aspect of political history, offering a platform to question and analyze what's often left unsaid. Thought-Provoking Guests: We invite individuals with insider knowledge or those who've taken the red pill to discuss topics that range from the fringe to the forefront of conspiracy culture. Critical Analysis of Current Affairs: We don't just report on events; we interpret them through the lens of parapolitics, looking for patterns and hidden agendas.Join Us: Every Tuesday at 9:30 PM ET, dive into the depths of the unknown with us. Subscribe, participate in our live call-ins, and be part of a community that seeks to understand the world beyond the surface narrative.Disclaimer: This podcast thrives on speculation, hypothesis, and the examination of alternative theories. It's meant to provoke thought and encourage personal research. Not all discussed is proven fact, but rather a call to question, explore, and understand.Warning: For those not ready to challenge their worldview, tread carefully. Once you enter the world of Already Dead, you might find that the truth is often already dead to the uninitiated. Welcome aboard, where curiosity is your guide.Please consider supporting our work- Austin's Patreon: https://www.patreon.com/c/TheUnderclassPodcastAustin's Spreaker: https://www.spreaker.com/podcast/the-underclass-podcast--6511540Austin's Rumble: https://rumble.com/user/TheUnderclassPodcastAustin's YouTube: https://www.youtube.com/@TheUnderclassPodcast#VeteransDay #AlqaedasWhiteHouseTour #ArchiveDown #FBISubpoena #J6PipeBomber #MamdanisFalseFlag #AntisemitismFalseFlag #J6Psychosis #DavidMovie #SocialEngineering #TrumpCrucifixionArtwork #FreeMasonicArt #DomesticSleeperCells #GazaGenocide #NetanyahusPowerStruggle #October7KnessetAllegations #LaurenBoebertsHalloweenCostume #KanyesHumiliationRitual #VirginiaGovernor #CIASpanbergerBecome a supporter of this podcast: https://www.spreaker.com/podcast/the-underclass-podcast--6511540/support.
Eric O'Neill, former FBI ghost and author of “Spies, Lies & Cybercrime,” joins host David Puner to take a deep dive into the mindset and tactics needed to defend against today's sophisticated cyber threats. Drawing on O'Neill's experience catching spies and investigating cybercriminals, the conversation explains how thinking like an attacker can help organizations and individuals stay ahead. The episode covers actionable frameworks, real-world stories, and practical advice for building cyber resilience in an age of AI-driven scams and industrialized ransomware.
In this special live episode of the Shift AI Podcast recorded at Seattle AI Week, Dr. Andre Alfred, who leads threat operations and security for Google Cloud's Fortune 500 customers, joins host Boaz Ashkenazy for an eye-opening conversation about the intersection of AI and cybersecurity. With his remarkable journey from high school help desk operator to earning his PhD and leading security operations at Microsoft, Oracle, and Google, Andre brings a unique perspective on protecting critical infrastructure in an era where adversaries have access to the same powerful AI tools as defenders.From data poisoning threats that could compromise healthcare diagnostics to the challenges of securing physical infrastructure like water systems and power grids, Andre shares what keeps him up at night and why two-factor authentication isn't optional anymore. The conversation explores how AI is transforming both offensive and defensive capabilities in cybersecurity, why the next generation of jobs will be defined by leaders rather than technology, and Andre's commitment to visibility as an African American leader in tech. Through his scholarship program at Western Governors University, Andre is opening pathways for the next generation of cybersecurity and healthcare professionals. If you're wondering about the real security threats we're not thinking about—and why the future of work requires "more focus"—this conversation offers crucial insights from someone defending some of the world's most critical systems.Chapters[00:00] Introduction and Boaz's Journey to the Shift AI Podcast [02:37] Andre's Background and Role at Google Cloud Security [03:44] The Non-Traditional Path: From Help Desk to PhD [06:25] The Decision to Return to College and Transform Your Career [08:41] From Capital One to Microsoft to Google [12:03] What It's Like to Wake Up Every Morning in Threat Operations [14:21] The Bittersweet Reality: When Innovation Can Be Weaponized [15:31] Data Poisoning and Healthcare: The Threat We're Not Thinking About [18:37] Teaching Kids to Question What They See Online [20:06] Physical Infrastructure Vulnerabilities and Social Engineering [24:09] The Future of AI and Cybersecurity in 2030 [26:24] Creating Jobs of the Future Through Education [29:41] The Intersection of Cybersecurity and Healthcare [32:29] Leaders Must Define the Next Jobs, Not Let Technology Define Them [33:36] Being Visible as an African American in Tech [36:11] Two Words for the Future: "More Focus"Connect with Dr. Andre Alfred LinkedIn: https://www.linkedin.com/in/aoalfred/Connect with Boaz Ashkenazy LinkedIn: https://linkedin.com/in/boazashkenazy Email: info@shiftai.fmSpecial thank you to Western Governers University for hosting and sponsoring this live episode at the Labor Temple in Seattle WA during AI Week.
With Mexico and the U.K. being the latest countries to roll out mandatory digital ID's the conspiracy has once again become a reality! Many people who have not heeded the warnings or passed them off as a conspiracy theory are now realizing the warnings were real. Let's look at how we got here, what the future plans are and the end goal of digital ID's. This is just another step in the nightmare to come!Email us at: downtherh@protonmail.com
CMMC 2.0 explained in plain English — what it means for small businesses, defense contractors, and vendors across the DoD supply chain. Learn about Level 1 vs Level 2, self-attestation risks, C3PAO shortages, compliance deadlines, and how to stay audit-ready before 2025.Don't miss out on crucial information about the CMMC 2025 deadline. The Cybersecurity Maturity Model Certification is a vital requirement for businesses dealing with the Department of Defense. If you miss the deadline, you risk losing contracts and facing severe penalties. In this video, we'll explore the consequences of missing the CMMC 2025 deadline and provide valuable insights on how to prepare and stay compliant. Stay ahead of the game and ensure your business is CMMC-ready. Find out what happens if you missed the deadline and learn how to avoid costly mistakes. Tune in now and take the first step towards CMMC compliance. CHAPTERS00:00 – The 4 Letters That Can End Your Business00:15 – CMMC 2.0: Why November 10, 2025 Changes Everything01:35 – Meet the Expert: Frontline View from a CMMC Assessor02:59 – What Is CMMC (In Plain English)?04:20 – FCI vs CUI: The Data That Decides Your Level07:05 – Are You Level 1 or Level 2? How the Flow-Down Really Work10:05 – Why the DoD Stopped “Trusting” Small Contractors11:40 – Supply-Chain Breaches: How Third Parties Take You Down13:00 – Level 1: The 17 “Basic” Controls Everyone Ignores17:00 – The Dangerous Game of Fudging Your Self-Attestation21:15 – Level 2: 110 Controls, SSPs, and the Reality of NIST 800-17123:40 – C3PAO Bottleneck: Why Waiting Means Losing Contracts26:30 – POA&M and the 180-Day “Grace” Trap32:05 – Surprise: Printers, MSPs, and “Non-Defense” Vendors in the Blast Radius35:15 – CMMC Is Not Going Away (And Other Hard Truths)37:05 – Countdown to FallSend us a textGrowth without Interruption. Get peace of mind. Stay Competitive-Get NetGain. Contact NetGain today at 844-777-6278 or reach out online at www.NETGAINIT.com Support the show
Researchers have uncovered flaws that allow Microsoft Teams messages to be manipulated, letting hackers impersonate executives, forge notifications, and alter private chats. In this episode of Darnley's Cyber Café, we explore how these vulnerabilities work, why they exist, and how to protect yourself from deception hiding behind familiar names.For deeper insight, revisit Season 6, Episode 3: “The Teams Trap.”Click here to send future episode recommendationSupport the showSubscribe now to Darnley's Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape.
It's time to start vendor data tasks that will make tax reporting season easier if you do them now! What are they? And listen to the end for a bonus task that may reduce your vendor inquiries…..Keep listening. Check out my website www.debrarrichardson.com if you need help implementing authentication techniques, internal controls, and best practices to prevent fraudulent payments, regulatory fines or bad vendor data. Check out the Vendor Process Training Center for 116+ hours of weekly live and on-demand training for the Vendor team. Links mentioned in the podcast + other helpful resources: AP Tax Reporting - TY 2025 - Training Pass - From an AP Perspective! 4 Training Sessions to Get You Ready for Reporting Tax Year 2025 https://training.debrarrichardson.com/bundle/ap-tax-reporting-tax-year-2025Get the Vendor Callback Confirmation Toolkit(TM) Today: https://training.debrarrichardson.com/course/callback-confirmation-toolkitCustomized Vendor Validations Session: https://debrarrichardson.com/vendor-validation-sessionFree Download: Vendor Validation Reference List with Resource Links https://debrarrichardson.com/vendor-validation-downloadVendor Process Training Center - https://training.debrarrichardson.comCustomized Fraud Training: https://training.debrarrichardson.com/customized-fraud-training Free Live and On-Demand Webinars: https://training.debrarrichardson.com/webinarsVendor Master File Clean-Up: https://www.debrarrichardson.com/cleanupYouTube Channel: https://www.youtube.com/channel/UCqeoffeQu3pSXMV8fUIGNiw More Podcasts/Blogs/Webinars www.debrarrichardson.comMore ideas? Email me at debra@debrarrichardson.com Music Credit: www.purple-planet.com
Keywordscybersecurity, technology, AI, IoT, Intel, startups, security culture, talent development, career advice SummaryIn this episode of No Password Required, host Jack Clabby and Kayleigh Melton engage with Steve Orrin, the federal CTO at Intel, discussing the evolving landscape of cybersecurity, the importance of diverse teams, and the intersection of technology and security. Steve shares insights from his extensive career, including his experiences in the startup scene, the significance of AI and IoT, and the critical blind spots in cybersecurity practices. The conversation also touches on nurturing talent in technology and offers valuable advice for young professionals entering the field. TakeawaysIoT is now referred to as the Edge in technology.Diverse teams bring unique perspectives and solutions.Experience in cybersecurity is crucial for effective team building.The startup scene in the 90s was vibrant and innovative.Understanding both biology and technology can lead to unique career paths.AI and IoT are integral to modern cybersecurity solutions.Organizations often overlook the importance of security in early project stages.Nurturing talent involves giving them interesting projects and autonomy.Young professionals should understand the hacker mentality to succeed in cybersecurity.Customer feedback is essential for developing effective security solutions. TitlesThe Edge of Cybersecurity: Insights from Steve OrrinNavigating the Intersection of Technology and Security Sound bites"IoT is officially called the Edge.""We're making mainframe sexy again.""Surround yourself with people smarter than you." Chapters00:00 Introduction to Cybersecurity and the Edge01:48 Steve Orrin's Role at Intel04:51 The Evolution of Security Technology09:07 The Startup Scene in the 90s13:00 The Intersection of Biology and Technology15:52 The Importance of AI and IoT20:30 Blind Spots in Cybersecurity25:38 Nurturing Talent in Technology28:57 Advice for Young Cybersecurity Professionals32:10 Lifestyle Polygraph: Fun Questions with Steve
In the latest Tin Foil Hat episode, Sam Tripoli and guest Mark Waters explore the Age of Un-Enlightenment, suggesting modern society is drifting into darkness despite all its progress. They dive into theories linking Britain to the Lost Tribe of Judah and discuss a hidden clash between a Black Magic Temple and a mysterious counter force. It's a wild ride through history, spirituality, and the unseen powers shaping our world. This episode is lovingly dedicated to the memory of Pollyanna, the most devoted and joyful companion, fondly remembered as Stinkbutt. Check out Sam Tripoli's premium content at SamTripoli.com! Please subscribe to the new Tin Foil Hat youtube channel: https://www.youtube.com/@TinFoilHatYoutube Check out Sam Tripoli's 4th Crowd Work Special "Deep Dish: Live From Chicago" Oct 4th on Youtube.com/SamTripoliComedy Grab your copy of the 2nd issue of the Chaos Twins now and join the Army Of Chaos: https://bit.ly/415fDfY Check out Sam "DoomScrollin with Sam Tripoli and Midnight Mike" Every Tuesday At 4pm pst on Youtube, X Twitter, Rumble and Rokfin! Join the WolfPack at Wise Wolf Gold and Silver and start hedging your financial position by investing in precious metals now! Go to samtripoli.gold and use the promo code "TinFoil" and we thank Tony for supporting our show. CopyMyCrypto.com: The 'Copy my Crypto' membership site shows you the coins that the youtuber 'James McMahon' personally holds - and allows you to copy him. So if you'd like to join the 1300 members who copy James, then stop what you're doing and head over to: https://copymycrypto.com/tinfoilhat/ You'll not only find proof of everything I've said - but my listeners get full access for just $1 LiveLongerFormula.com: Check out https://www.livelongerformula.com/sam — Christian is a longevity author and functional health expert who helps you fix your gut, detox, boost testosterone, and sleep better so you can thrive, not just survive. Watch his free masterclass on the 7 Deadly Health Fads, and if it clicks, book a free Metabolic Function Assessment to get to the root of your health issues. Want to see Sam Tripoli live? Get tickets at SamTripoli.com: Las Vegas, NV: Tin Foil Hat Comedy Live At The Virgin Hotel Nov 21st https://www.etix.com/ticket/p/95279813/tin-foil-hat-comedy-with-sam-tripoli-and-eddie-bravo-las-vegas-24-oxford Minneapolis: Headlining The House Of Comedy Dec 11th-13th https://samtripoli.com/events/?paged=3 Morris Plains, NJ: New Year's Eve At The Dojo Of Comedy Dec 31st https://www.tiffscomedy.com/events/121228 Please Check Out Mark Waters's internet: Website: https://windowsontheworld.net Youtube: https://www.youtube.com/@markwindowsontheworld Please check out Sam Tripoli's internet: Linktree: https://linktr.ee/samtripoli Please Follow Sam Tripoli's Stand Up Youtube Page: https://www.youtube.com/@SamTripoliComedy Please Follow Sam Tripoli's Comedy Instagram: https://www.instagram.com/samtripolicomedy/ Please Follow Sam Tripoli's Podcast Clip Instagram: https://www.instagram.com/samtripolispodcastclips/ Huge Thank You To Our Sponsor: Home Chef: Home Chef delivers fresh ingredients and chef-designed recipes, conveniently to your doorstep to simplify your cooking experience. Users of leading meal kits have rated Home Chef #1 in quality, convenience, value, taste, AND recipe ease. For a limited time, Home Chef is offering my listeners FIFTY PERCENT OFF and free shipping for your first box PLUS free dessert for life! Go to Home Chef dot com slash TINFOIL. Cornbread Hemp: If you're looking for a healthier way to enjoy a carefree moment, you have to give Cornbread Hemp a try! They've created the first-ever USDA Organic THC gummy that's 100% legal. As a special offer for Tin Foil Hat listeners, you can get 30% off your first order! Just visit cornbreadhemp.com/TinFoil and use promo code TinFoil at checkout. Again that's cornbreadhemp.com/TinFoil and use code TinFoil for 30% off your first order. Cheers to a healthier happy hour!
All links and images can be found on CISO Series. Check out this post for the discussion that is the basis of our conversation on this week's episode co-hosted by David Spark, the producer of CISO Series, and Mike Johnson, CISO, Rivian. Joining them is their sponsored guest Bobby Ford, chief strategy and experience officer, Doppel. In this episode: Beyond the click High-risk users demand different metrics Building engagement over punishment Creating a security culture through community Huge thanks to our sponsor, Doppel Doppel is protecting the world's digital integrity. Impersonators adapt fast — but so does Doppel. By pairing AI with expert analysis, we don't just detect deception; we dismantle it. Our platform learns from every attack, expands its reach across digital channels, and disrupts threats before they cause harm. The result? Impersonators lose. Businesses become too costly to attack. And trust stays intact. Learn more at https://www.doppel.com/
When will the IRS contact you? How will they contact you? Is it really them? To hear how and when they will reach out and how you can tell if you are communicating with a fraudster….Keep listening. Check out my website www.debrarrichardson.com if you need help implementing authentication techniques, internal controls, and best practices to prevent fraudulent payments, regulatory fines or bad vendor data. Check out the Vendor Process Training Center for 116+ hours of weekly live and on-demand training for the Vendor team. Links mentioned in the podcast + other helpful resources: Free Download: IRS Authentication Checklist IRS Page: Search IRS Notices and Letters Get the Vendor Callback Confirmation Toolkit(TM) Today: https://training.debrarrichardson.com/course/callback-confirmation-toolkitCustomized Vendor Validations Session: https://debrarrichardson.com/vendor-validation-sessionFree Download: Vendor Validation Reference List with Resource Links https://debrarrichardson.com/vendor-validation-downloadVendor Process Training Center - https://training.debrarrichardson.comCustomized Fraud Training: https://training.debrarrichardson.com/customized-fraud-training Free Live and On-Demand Webinars: https://training.debrarrichardson.com/webinarsVendor Master File Clean-Up: https://www.debrarrichardson.com/cleanupYouTube Channel: https://www.youtube.com/channel/UCqeoffeQu3pSXMV8fUIGNiw More Podcasts/Blogs/Webinars www.debrarrichardson.comMore ideas? Email me at debra@debrarrichardson.com Music Credit: www.purple-planet.com
As cyber threats and geopolitical risks intensify, how can organizations be nimble and outsmart the next cyber attack? In this episode, seasoned data protection and cyber law expert Vinod Bange breaks down the threats that are still overlooked – including a new understanding of influence in social engineering – and the questions that leaders should ask themselves to ensure their teams are truly nimble and cyber ready. This Baker McKenzie partner also shares the unique methods that business and government are employing to work together to share best practices and strategies, all while breaking down why this sort of collaboration has traditionally been slow to happen. About this episode: Baker McKenzie: https://www.bakermckenzie.com/en/ Global Disputes Forecast: https://www.bakermckenzie.com/en/insight/publications/2025/01/global-disputes-forecast-2025 Related report: Cybercrime Atlas: Impact Report 2025: https://initiatives.weforum.org/cybercrime-atlas/home Related podcasts: Radio Davos: New era, new mood, new challenges Read: https://www.weforum.org/podcasts/radio-davos/episodes/adam-tooze-cnbc-china-us-history/ Listen: https://open.spotify.com/episode/4byCozwrPwSDRGexzSpOIv?go=1&sp_cid=01e8f5e22b1a6834bc34234353341751&utm_source=embed_player_p&utm_medium=desktop&nd=1&dlsi=21eda2cf5c3c4932 Watch: https://www.youtube.com/watch?v=vOlOPL3woKA Meet the Leader: AI will reshape knowledge work. What leaders should ask, do and learn now: Read: https://tinyurl.com/ydfed937 Listen: https://tinyurl.com/ycxh9zer Watch: https://youtu.be/GCo7czq2yXI
Just when you thought DNS cache poisoning was a thing of the past, Steve and Leo reveal why this 17-year-old bug is making a dramatic comeback—and why most DNS resolvers still can't manage high-quality random numbers after all this time. The unsuspected sucking power of a Linux-based robot vacuum. Russia to follow China's vulnerability reporting laws. A pair of Scattered Spider UK teen hackers arrested. Facebook,Instagram and TikTok violating the EU's DSA. Microsoft Teams bringing user WiFi tracking bypolicy. You backed up. That's great. Did you test that backup? Coveware reports all-time lowransomware payment rate. Ransomware negotiator reports how the bad guys get in. Lots of listener thoughts and feedback about NIST passwords. And against all reason and begging credulity, it seems we still haven't managed to put high-quality random number generators into our DNS resolvers. Show Notes - https://www.grc.com/sn/SN-1049-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to Security Now at https://twit.tv/shows/security-now. You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free shows, a members-only Discord, and behind-the-scenes access. Join today: https://twit.tv/clubtwit Sponsors: hoxhunt.com/securitynow zapier.com/securitynow 1password.com/securitynow veeam.com zscaler.com/security
Just when you thought DNS cache poisoning was a thing of the past, Steve and Leo reveal why this 17-year-old bug is making a dramatic comeback—and why most DNS resolvers still can't manage high-quality random numbers after all this time. The unsuspected sucking power of a Linux-based robot vacuum. Russia to follow China's vulnerability reporting laws. A pair of Scattered Spider UK teen hackers arrested. Facebook,Instagram and TikTok violating the EU's DSA. Microsoft Teams bringing user WiFi tracking bypolicy. You backed up. That's great. Did you test that backup? Coveware reports all-time lowransomware payment rate. Ransomware negotiator reports how the bad guys get in. Lots of listener thoughts and feedback about NIST passwords. And against all reason and begging credulity, it seems we still haven't managed to put high-quality random number generators into our DNS resolvers. Show Notes - https://www.grc.com/sn/SN-1049-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to Security Now at https://twit.tv/shows/security-now. You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free shows, a members-only Discord, and behind-the-scenes access. Join today: https://twit.tv/clubtwit Sponsors: hoxhunt.com/securitynow zapier.com/securitynow 1password.com/securitynow veeam.com zscaler.com/security
Just when you thought DNS cache poisoning was a thing of the past, Steve and Leo reveal why this 17-year-old bug is making a dramatic comeback—and why most DNS resolvers still can't manage high-quality random numbers after all this time. The unsuspected sucking power of a Linux-based robot vacuum. Russia to follow China's vulnerability reporting laws. A pair of Scattered Spider UK teen hackers arrested. Facebook,Instagram and TikTok violating the EU's DSA. Microsoft Teams bringing user WiFi tracking bypolicy. You backed up. That's great. Did you test that backup? Coveware reports all-time lowransomware payment rate. Ransomware negotiator reports how the bad guys get in. Lots of listener thoughts and feedback about NIST passwords. And against all reason and begging credulity, it seems we still haven't managed to put high-quality random number generators into our DNS resolvers. Show Notes - https://www.grc.com/sn/SN-1049-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to Security Now at https://twit.tv/shows/security-now. You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free shows, a members-only Discord, and behind-the-scenes access. Join today: https://twit.tv/clubtwit Sponsors: hoxhunt.com/securitynow zapier.com/securitynow 1password.com/securitynow veeam.com zscaler.com/security
Just when you thought DNS cache poisoning was a thing of the past, Steve and Leo reveal why this 17-year-old bug is making a dramatic comeback—and why most DNS resolvers still can't manage high-quality random numbers after all this time. The unsuspected sucking power of a Linux-based robot vacuum. Russia to follow China's vulnerability reporting laws. A pair of Scattered Spider UK teen hackers arrested. Facebook,Instagram and TikTok violating the EU's DSA. Microsoft Teams bringing user WiFi tracking bypolicy. You backed up. That's great. Did you test that backup? Coveware reports all-time lowransomware payment rate. Ransomware negotiator reports how the bad guys get in. Lots of listener thoughts and feedback about NIST passwords. And against all reason and begging credulity, it seems we still haven't managed to put high-quality random number generators into our DNS resolvers. Show Notes - https://www.grc.com/sn/SN-1049-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to Security Now at https://twit.tv/shows/security-now. You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free shows, a members-only Discord, and behind-the-scenes access. Join today: https://twit.tv/clubtwit Sponsors: hoxhunt.com/securitynow zapier.com/securitynow 1password.com/securitynow veeam.com zscaler.com/security
Just when you thought DNS cache poisoning was a thing of the past, Steve and Leo reveal why this 17-year-old bug is making a dramatic comeback—and why most DNS resolvers still can't manage high-quality random numbers after all this time. The unsuspected sucking power of a Linux-based robot vacuum. Russia to follow China's vulnerability reporting laws. A pair of Scattered Spider UK teen hackers arrested. Facebook,Instagram and TikTok violating the EU's DSA. Microsoft Teams bringing user WiFi tracking bypolicy. You backed up. That's great. Did you test that backup? Coveware reports all-time lowransomware payment rate. Ransomware negotiator reports how the bad guys get in. Lots of listener thoughts and feedback about NIST passwords. And against all reason and begging credulity, it seems we still haven't managed to put high-quality random number generators into our DNS resolvers. Show Notes - https://www.grc.com/sn/SN-1049-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to Security Now at https://twit.tv/shows/security-now. You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free shows, a members-only Discord, and behind-the-scenes access. Join today: https://twit.tv/clubtwit Sponsors: hoxhunt.com/securitynow zapier.com/securitynow 1password.com/securitynow veeam.com zscaler.com/security
Just when you thought DNS cache poisoning was a thing of the past, Steve and Leo reveal why this 17-year-old bug is making a dramatic comeback—and why most DNS resolvers still can't manage high-quality random numbers after all this time. The unsuspected sucking power of a Linux-based robot vacuum. Russia to follow China's vulnerability reporting laws. A pair of Scattered Spider UK teen hackers arrested. Facebook,Instagram and TikTok violating the EU's DSA. Microsoft Teams bringing user WiFi tracking bypolicy. You backed up. That's great. Did you test that backup? Coveware reports all-time lowransomware payment rate. Ransomware negotiator reports how the bad guys get in. Lots of listener thoughts and feedback about NIST passwords. And against all reason and begging credulity, it seems we still haven't managed to put high-quality random number generators into our DNS resolvers. Show Notes - https://www.grc.com/sn/SN-1049-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to Security Now at https://twit.tv/shows/security-now. You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free shows, a members-only Discord, and behind-the-scenes access. Join today: https://twit.tv/clubtwit Sponsors: hoxhunt.com/securitynow zapier.com/securitynow 1password.com/securitynow veeam.com zscaler.com/security
This episode is sponsored by HYPR. Visit hypr.com/idac to learn more.In this episode from Authenticate 2025, Jim McDonald and Jeff Steadman are joined by Bojan Simic, Co-Founder and CEO of HYPR, for a sponsored discussion on the evolving landscape of identity and security.Bojan shares his journey from software engineer to cybersecurity leader and dives into the core mission of HYPR: providing fast, consistent, and secure identity controls that complement existing investments. The conversation explores the major themes from the conference, including the push for passkey adoption at scale and the challenge of securely authenticating AI agents.A key focus of the discussion is the concept of "Know Your Employee" (KYE) in a continuous manner, a critical strategy for today's remote and hybrid workforces. Bojan explains how the old paradigm of one-time verification is failing, especially in the face of sophisticated, AI-powered social engineering attacks like those used by Scattered Spider. They discuss the issue of "identity sprawl" across multiple IDPs and why consolidation isn't always the answer. Instead, Bojan advocates for a flexible, best-of-breed approach that provides a consistent authentication experience and leverages existing security tools.Connect with Bojan: https://www.linkedin.com/in/bojansimic/Learn more about HYPR: https://www.hypr.com/idacConnect with us on LinkedIn:Jim McDonald: https://www.linkedin.com/in/jimmcdonaldpmp/Jeff Steadman: https://www.linkedin.com/in/jeffsteadman/Visit the show on the web at idacpodcast.comChapter Timestamps:00:00 - Introduction at Authenticate 202500:23 - Sponsored Episode Welcome: Bojan Simic, CEO of HYPR01:11 - How Bojan Simic Got into Identity and Cybersecurity02:10 - The Elevator Pitch for HYPR04:03 - The Buzz at Authenticate 2025: Passkeys and Securing AI Agents05:29 - The Trend of Continuous "Know Your Employee" (KYE)07:33 - Is Your MFA Program Enough Anymore?09:44 - Hackers Don't Break In, They Log In: The Scattered Spider Threat11:19 - How AI is Scaling Social Engineering Attacks Globally13:08 - When a Breach Happens, Who's on the Hook? IT, Security, or HR?16:23 - What is the Right Solution for Identity Practitioners?17:05 - The Critical Role of Internal Marketing for Technology Adoption22:27 - The Problem with Identity Sprawl and the Fallacy of IDP Consolidation25:47 - When is it Time to Move On From Your Existing Identity Tools?28:16 - The Role of Document-Based Identity Verification in the Enterprise32:31 - What Makes HYPR's Approach Unique?35:33 - How Do You Measure the Success of an Identity Solution?36:39 - HYPR's Philosophy: Never Leave a User Stranded39:00 - Authentication as a Tier Zero, Always-On Capability40:05 - Is Identity Part of Your Disaster Recovery Plan?41:36 - From the Ring to the C-Suite: Bojan's Past as a Competitive Boxer47:03 - How to Learn More About HYPRKeywords:IDAC, Identity at the Center, Jeff Steadman, Jim McDonald, Bojan Simic, HYPR, Passkeys, Know Your Employee, KYE, Continuous Identity, Identity Verification, Authenticate 2025, Phishing Resistant, Social Engineering, Scattered Spider, AI Security, Identity Sprawl, Passwordless Authentication, FIDO, MFA, IDP Consolidation, Zero Trust, Cybersecurity, IAM, Identity and Access Management, Enterprise Security
Just when you thought DNS cache poisoning was a thing of the past, Steve and Leo reveal why this 17-year-old bug is making a dramatic comeback—and why most DNS resolvers still can't manage high-quality random numbers after all this time. The unsuspected sucking power of a Linux-based robot vacuum. Russia to follow China's vulnerability reporting laws. A pair of Scattered Spider UK teen hackers arrested. Facebook,Instagram and TikTok violating the EU's DSA. Microsoft Teams bringing user WiFi tracking bypolicy. You backed up. That's great. Did you test that backup? Coveware reports all-time lowransomware payment rate. Ransomware negotiator reports how the bad guys get in. Lots of listener thoughts and feedback about NIST passwords. And against all reason and begging credulity, it seems we still haven't managed to put high-quality random number generators into our DNS resolvers. Show Notes - https://www.grc.com/sn/SN-1049-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to Security Now at https://twit.tv/shows/security-now. You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free shows, a members-only Discord, and behind-the-scenes access. Join today: https://twit.tv/clubtwit Sponsors: hoxhunt.com/securitynow zapier.com/securitynow 1password.com/securitynow veeam.com zscaler.com/security
Just when you thought DNS cache poisoning was a thing of the past, Steve and Leo reveal why this 17-year-old bug is making a dramatic comeback—and why most DNS resolvers still can't manage high-quality random numbers after all this time. The unsuspected sucking power of a Linux-based robot vacuum. Russia to follow China's vulnerability reporting laws. A pair of Scattered Spider UK teen hackers arrested. Facebook,Instagram and TikTok violating the EU's DSA. Microsoft Teams bringing user WiFi tracking bypolicy. You backed up. That's great. Did you test that backup? Coveware reports all-time lowransomware payment rate. Ransomware negotiator reports how the bad guys get in. Lots of listener thoughts and feedback about NIST passwords. And against all reason and begging credulity, it seems we still haven't managed to put high-quality random number generators into our DNS resolvers. Show Notes - https://www.grc.com/sn/SN-1049-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to Security Now at https://twit.tv/shows/security-now. You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free shows, a members-only Discord, and behind-the-scenes access. Join today: https://twit.tv/clubtwit Sponsors: hoxhunt.com/securitynow zapier.com/securitynow 1password.com/securitynow veeam.com zscaler.com/security
Rob Smith, a Black and gay conservative, shares his unfiltered take on navigating today's polarized political landscape. A combat veteran and marketing expert, Rob discusses how AI is transforming marketing and social media, from smarter campaigns to the risks of deepfakes. We dive into AI's threat to critical thinking, especially how it's eroding kids' ability to reason independently in a world of algorithms and instant answers. Get practical insights on fighting back.Follow Rob Smith on X @ https://x.com/robsmithonline
This conversation delves into the enigmatic world of the Process Church of the Final Judgment, exploring its origins, beliefs, and connections to various cults and intelligence operations. The discussion highlights the church's apocalyptic views, its chaotic nature, and its influence on social engineering and control. The conversation also touches on the broader context of ancient alien cargo cults and their shared characteristics with the Process Church. In this conversation, JJ and BT dive into the intricate connections between various cults, particularly the Process Church, and their historical and contemporary implications. He discusses the Luciferian belief system, the criminal activities associated with these organizations, and the influence of the Process Church on modern movements and individuals in the music industry. The conversation also touches on the evolution of the Process Church, its ties to transhumanism, and the ongoing impact of these cults in today's society.
On this special Friday Edition of Security Noise, Geoff lets Skyler out of the sound booth and sends him to Deadwood, South Dakota to attend (and speak at) Wild West Hackin' Fest! Skyler also interviews TrustedSec's Senior Security Consultant David Boyd on his WWHF talk on Social Engineering and Principal Security Consultant Adam Compton's GrrCON talk titled "An Old Hillbilly's Guide to BASH for Pentests...". Listen in as Skyler takes over the show to talk with the "CON Men of TrustedSec!" About this podcast: Security Noise, a TrustedSec Podcast hosted by Geoff Walton and Producer/Contributor Skyler Tuter, features our cybersecurity experts in conversation about the infosec topics that interest them the most. Find more cybersecurity resources on our website at https://trustedsec.com/resources.
It's almost the end of the 25th annual October Cybersecurity Awareness Month and if you haven't heard of or watched the cybercriminal version of “The Office” it's time! Keep listening. Check out my website www.debrarrichardson.com if you need help implementing authentication techniques, internal controls, and best practices to prevent fraudulent payments, regulatory fines or bad vendor data. Check out the Vendor Process Training Center for 116+ hours of weekly live and on-demand training for the Vendor team. Links mentioned in the podcast + other helpful resources: National Cybersecurity Alliance: Cybersecurity Awareness Month Kubikle Videos Get the Vendor Callback Confirmation Toolkit(TM) Today: https://training.debrarrichardson.com/course/callback-confirmation-toolkitCustomized Vendor Validations Session: https://debrarrichardson.com/vendor-validation-sessionFree Download: Vendor Validation Reference List with Resource Links https://debrarrichardson.com/vendor-validation-downloadVendor Process Training Center - https://training.debrarrichardson.comCustomized Fraud Training: https://training.debrarrichardson.com/customized-fraud-training Free Live and On-Demand Webinars: https://training.debrarrichardson.com/webinarsVendor Master File Clean-Up: https://www.debrarrichardson.com/cleanupYouTube Channel: https://www.youtube.com/channel/UCqeoffeQu3pSXMV8fUIGNiw More Podcasts/Blogs/Webinars www.debrarrichardson.comMore ideas? Email me at debra@debrarrichardson.com Music Credit: www.purple-planet.com
From the archives: Host Talmage Boston interviews Malcolm Gladwell, author of seven New York Times bestsellers, about his book Revenge of the Tipping Point: Overstories, Superspreaders, and the Rise of Social Engineering. (Recorded December 2024 in Dallas.) Learn more about your ad choices. Visit podcastchoices.com/adchoices
Today on the Social-Engineer Podcast: The Security Awareness Series, Chris is joined by Carter Zupancich. Chris and Carter explore the evolving landscape of social engineering threats, focusing on the rise of vishing attacks and the role of AI in enhancing these tactics. Their discussion underscores the importance of empowering employees as a human firewall and the need for continuous education and testing to strengthen organizational security. [Oct 20, 2025] 00:00 - Intro 00:31 - Carter Zupancich Intro - Website: https://carterzupancich.com/ 01:30 - Intro Links: - Social-Engineer.com - http://www.social-engineer.com/ - Managed Voice Phishing - https://www.social-engineer.com/services/vishing-service/ - Managed Email Phishing - https://www.social-engineer.com/services/se-phishing-service/ - Adversarial Simulations - https://www.social-engineer.com/services/social-engineering-penetration-test/ - Social-Engineer channel on SLACK - https://social-engineering-hq.slack.com/ssb - CLUTCH - http://www.pro-rock.com/ - innocentlivesfoundation.org - http://www.innocentlivesfoundation.org/ 03:35 - Tools, Tactics and Procedures 05:19 - Tech Advances 08:16 - The Classics 10:01 - The Need for Testing 12:16 - Callback Phishing 17:26 - Setting Expectations 21:56 - Approved Language 23:56 - Verify! 25:16 - Empowerment 26:17 - And Now a Horrible Story 28:47 - Investing In Employees 31:19 - Wrap Up & Outro - www.social-engineer.com - www.innocentlivesfoundation.org
Is there anything real left on the internet? Neil deGrasse Tyson and co-hosts Chuck Nice and Gary O'Reilly explore deepfakes, scams, and cybercrime with the Director of Threat Research at Bitdefender, Bogdan Botezatu. Scams are a trillion-dollar industry; keep your loved ones safe with Bitdefender: https://bitdefend.me/90-StarTalkNOTE: StarTalk+ Patrons can listen to this entire episode commercial-free here: https://startalkmedia.com/show/deepfakes-and-the-war-on-truth-with-bogdan-botezatu/Thanks to our Patrons Bubbalotski, Oskar Yazan Mellemsether, Craig A, Andrew, Liagadd, William ROberts, Pratiksha, Corey Williams, Keith, anirao, matthew, Cody T, Janna Ladd, Jen Richardson, Elizaveta Nikitenko, James Quagliariello, LA Stritt, Rocco Ciccolini, Kyle Jones, Jeremy Jones, Micheal Fiebelkorn, Erik the Nerd, Debbie Gloom, Adam Tobias Lofton, Chad Stewart, Christy Bradford, David Jirel, e4e5Nf3, John Rost, cluckaizo, Diane Féve, Conny Vigström, Julian Farr, karl Lebeau, AnnElizabeth, p johnson, Jarvis, Charles Bouril, Kevin Salam, Alex Rzem, Joseph Strolin, Madelaine Bertelsen, noel jimenez, Arham Jain, Tim Manzer, Alex, Ray Weikal, Kevin O'Reilly, Mila Love, Mert Durak, Scrubbing Bubblez, Lili Rose, Ram Zaidenvorm, Sammy Aleksov, Carter Lampe, Tom Andrusyna, Raghvendra Singh Bais, ramenbrownie, cap kay, B Rhodes, Chrissi Vergoglini, Micheal Reilly, Mone, Brendan D., Mung, J Ram, Katie Holliday, Nico R, Riven, lanagoeh, Shashank, Bradley Andrews, Jeff Raimer, Angel velez, Sara, Timothy Criss, Katy Boyer, Jesse Hausner, Blue Cardinal, Benjamin Kedwards, Dave, Wen Wei LOKE, Micheal Sacher, Lucas, Ken Kuipers, Alex Marks, Amanda Morrison, Gary Ritter Jr, Bushmaster, thomas hennigan, Erin Flynn, Chad F, fro drick, Ben Speire, Sanjiv VIJ, Sam B, BriarPatch, and Mario Boutet for supporting us this week. Subscribe to SiriusXM Podcasts+ to listen to new episodes of StarTalk Radio ad-free and a whole week early.Start a free trial now on Apple Podcasts or by visiting siriusxm.com/podcastsplus. Hosted by Simplecast, an AdsWizz company. See pcm.adswizz.com for information about our collection and use of personal data for advertising.
My guest today is Dan Wang. Dan is a technology analyst and author who spent six years living in China studying its manufacturing ecosystem and tech development, best known for his new book Breakneck. Dan offers the most nuanced framework I've encountered for understanding US-China competition. We explore a critical asymmetry: it's far harder for the US to rebuild manufacturing capacity than for China to improve scientific research, with profound implications for AI, national security, and investment returns. For investors, Dan explains the "ByteDance problem"—why exceptional Chinese companies trade at massive discounts due to Communist Party unpredictability and geopolitical risks. He argues China is a "high agency" society that executes relentlessly while America deliberates endlessly, yet also reveals the societal cost. We discuss innovation, state capacity, and investing across both superpowers. Please enjoy my conversation with Dan Wang. For the full show notes, transcript, and links to mentioned content, check out the episode page here. ----- This episode is brought to you by Ramp. Ramp's mission is to help companies manage their spend in a way that reduces expenses and frees up time for teams to work on more valuable projects. Go to Ramp.com/invest to sign up for free and get a $250 welcome bonus. – This episode is brought to you by Ridgeline. Ridgeline has built a complete, real-time, modern operating system for investment managers. It handles trading, portfolio management, compliance, customer reporting, and much more through an all-in-one real-time cloud platform. Head to ridgelineapps.com to learn more about the platform. – This episode is brought to you by AlphaSense. AlphaSense has completely transformed the research process with cutting-edge AI technology and a vast collection of top-tier, reliable business content. Invest Like the Best listeners can get a free trial now at Alpha-Sense.com/Invest and experience firsthand how AlphaSense and Tegus help you make smarter decisions faster. ----- Editing and post-production work for this episode was provided by The Podcast Consultant (https://thepodcastconsultant.com). Show Notes: (00:00:00) Welcome to Invest Like the Best (00:05:55) China's Engineering State and Social Engineering (00:12:15) US-China Competition: Innovation and Manufacturing (00:19:41) The Future of US and China: Technological and Economic Perspectives (00:25:22) Cultural and Work Ethic Comparisons (00:39:09) Investing in China: Opportunities and Risks (00:44:43) Future Equilibrium States Between US and China (00:48:32) China's High Agency and Infrastructure (00:49:58) Lawyerly Tendencies in US Society (00:53:41) Comparing US and Chinese Societal Structures (00:57:59) China's Historical Lessons and Future Prospects (01:10:39) AI and Technological Competition (01:15:30) Vertical Integration in Chinese Companies (01:26:39) The Kindest Thing
Fraudsters have evolved again – this time with check fraud because they have found a way to bypass payee positive pay. So now what? Keep listening. Check out my website www.debrarrichardson.com if you need help implementing authentication techniques, internal controls, and best practices to prevent fraudulent payments, regulatory fines or bad vendor data. Check out the Vendor Process Training Center for 116+ hours of weekly live and on-demand training for the Vendor team. Links mentioned in the podcast + other helpful resources: Federal Reserve Board: How Criminals Commit Check Fraud Using Stolen Business Identities Training: Validations to Prevent Check Payment Fraud - Your Accounts System/ERP, The Bank and Your Vendor Team Get the Vendor Callback Confirmation Toolkit(TM) Today: https://training.debrarrichardson.com/course/callback-confirmation-toolkitCustomized Vendor Validations Session: https://debrarrichardson.com/vendor-validation-sessionFree Download: Vendor Validation Reference List with Resource Links https://debrarrichardson.com/vendor-validation-downloadVendor Process Training Center - https://training.debrarrichardson.comCustomized Fraud Training: https://training.debrarrichardson.com/customized-fraud-training Free Live and On-Demand Webinars: https://training.debrarrichardson.com/webinarsVendor Master File Clean-Up: https://www.debrarrichardson.com/cleanupYouTube Channel: https://www.youtube.com/channel/UCqeoffeQu3pSXMV8fUIGNiw More Podcasts/Blogs/Webinars www.debrarrichardson.comMore ideas? Email me at debra@debrarrichardson.com Music Credit: www.purple-planet.com
Mary welcomes first time guest to the podcast Pastor/Dr. Richard Schmidt to discuss current events. Richard has been an avid student of the Word of God for over 45 years. After giving his life to Christ during a Chicago revival meeting, he immediately immersed himself into evangelism and the study of Scripture, graduating with both a B.S. and M.A. in Pastoral Theology/Christian Education. Early in his ministry, Rich traveled with Evangelist Joe Boyd and preached in various churches and venues, including Chicago's Pacific Garden Mission. Upon college graduation and ordination, Rich and his wife, Valori, moved to Milwaukee, WI to church plant. After the church plant was successfully merged with another, Rich joined the Milwaukee County Sheriff's Office to support his young family, while simultaneously serving as an Assistant Pastor. He is currently the pastor of Union Grove Baptist Church just south of Milwaukee and an in-demand speaker. Today we chat about the rampant lawlessness in our nation and how we got here politically and prophetically. We also look at the current peace initiative in Israel, and what are we to expect when there's a victory lap going on, but we all know that Israel's enemies haven't truly had a change of heart. We talk about AI, and its troubling encroachment into Europe. China we expect to be a police state, but why are other nations looking so similar? A full hour with a very sharp brother in Christ. Stand Up For The Truth Videos: https://rumble.com/user/CTRNOnline & https://www.youtube.com/channel/UCgQQSvKiMcglId7oGc5c46A
Mary welcomes first time guest to the podcast Pastor/Dr. Richard Schmidt to discuss current events. Richard has been an avid student of the Word of God for over 45 years. After giving his life to Christ during a Chicago revival meeting, he immediately immersed himself into evangelism and the study of Scripture, graduating with both a B.S. and M.A. in Pastoral Theology/Christian Education. Early in his ministry, Rich traveled with Evangelist Joe Boyd and preached in various churches and venues, including Chicago's Pacific Garden Mission. Upon college graduation and ordination, Rich and his wife, Valori, moved to Milwaukee, WI to church plant. After the church plant was successfully merged with another, Rich joined the Milwaukee County Sheriff's Office to support his young family, while simultaneously serving as an Assistant Pastor. He is currently the pastor of Union Grove Baptist Church just south of Milwaukee and an in-demand speaker. Today we chat about the rampant lawlessness in our nation and how we got here politically and prophetically. We also look at the current peace initiative in Israel, and what are we to expect when there's a victory lap going on, but we all know that Israel's enemies haven't truly had a change of heart. We talk about AI, and its troubling encroachment into Europe. China we expect to be a police state, but why are other nations looking so similar? A full hour with a very sharp brother in Christ. Stand Up For The Truth Videos: https://rumble.com/user/CTRNOnline & https://www.youtube.com/channel/UCgQQSvKiMcglId7oGc5c46A
Today we are joined by Jay Izso. Jay is a high-energy mindset and resilience coach, keynote speaker, bestselling author, and media personality. Known as “Coach Jay,” he helps people shift their thinking, master their mindset, and unlock their potential in business and life. Drawing on his background in psychology and years of coaching leaders, entrepreneurs, and athletes, Jay blends humor, science, and real-world stories that resonate with audiences everywhere. As the host of A New Direction and Real Estate Right Now, he's built a reputation for engaging conversations that inspire action, growth, and results. [Oct 13, 2025] 00:00 - Intro 00:53 - Intro Links - Social-Engineer.com - http://www.social-engineer.com/ - Managed Voice Phishing - https://www.social-engineer.com/services/vishing-service/ - Managed Email Phishing - https://www.social-engineer.com/services/se-phishing-service/ - Adversarial Simulations - https://www.social-engineer.com/services/social-engineering-penetration-test/ - Social-Engineer channel on SLACK - https://social-engineering-hq.slack.com/ssb - CLUTCH - http://www.pro-rock.com/ - innocentlivesfoundation.org - http://www.innocentlivesfoundation.org/ 01:58 - Jay Izso Intro 02:48 - Lessons From the Farm - Book: Lessons From the Farm - Jay Izso 09:11 - Kindness as a Core Value 14:37 - MasterClass Ad 16:16 - The Electric Fence 23:24 - I'll Figure It Out 29:16 - Losing Your Ego 34:40 - The Gift of Servitude 37:07 - 100% Rule 38:14 - I Was Wrong 39:17 - Find Jay Izso Online - LinkedIn: https://www.linkedin.com/in/coach-jay/ 40:14 - Book Recommendations - Human Hacking - Christopher Hadnagy - Iron-Sharpened Leadership - John L. Gronski - Success Mindsets - Ryan Gottfredson - The Creator Mindset - Nir Bashan 42:11 - Mentors 45:29 - Wrap Up & Outro - www.social-engineer.com - www.innocentlivesfoundation.org
Every window you open on the web may also be a window into your life tracking your behavior, emotions, thoughts, even choices. Every search, every map query, every site page, every trivia, every Gmail login feeds into the same machine. Chrome isn't just a browser, it's a portal to surveillance. We trace how Google is used to collect your data and feed it into AI models learning from us in real-time. Is there a way to get privacy back? The answer to that is shared at the end.
Jeremy Maldonado breaks down cybersecurity fundamentals from a real-world IT operations perspective. From phishing and social engineering to patching best practices and zero trust, Jeremy shares practical insights to help you protect your organization — starting with your own behavior.He covers:Why the human factor is still your biggest vulnerabilityThe basics of zero trust in everyday communicationSocial engineering red flags to watch forHow to think strategically about patch prioritizationWhy most orgs still struggle with timely patchingTips for human-controlled automation using the Automox consoleWhether you're new to cybersecurity or want to tighten your patching strategy, this episode gives you a tactical refresh on where to focus your attention.
If one of your vendor validations is checking with the State of your vendor but find that the vendor is not registered with the State of their address….now what? Keep listening. Check out my website www.debrarrichardson.com if you need help implementing authentication techniques, internal controls, and best practices to prevent fraudulent payments, regulatory fines or bad vendor data. Check out the Vendor Process Training Center for 116+ hours of weekly live and on-demand training for the Vendor team. Links mentioned in the podcast + other helpful resources: Find States Your Vendor is Registered In: Open Corporates Free Download: 5 Steps to Improve Your Vendor Callback Process https://training.debrarrichardson.com/confirmationGet the Vendor Callback Confirmation Toolkit(TM) Today: https://training.debrarrichardson.com/course/callback-confirmation-toolkitCustomized Vendor Validations Session: https://debrarrichardson.com/vendor-validation-sessionFree Download: Vendor Validation Reference List with Resource Links https://debrarrichardson.com/vendor-validation-downloadVendor Process Training Center - https://training.debrarrichardson.comCustomized Fraud Training: https://training.debrarrichardson.com/customized-fraud-training Free Live and On-Demand Webinars: https://training.debrarrichardson.com/webinarsVendor Master File Clean-Up: https://www.debrarrichardson.com/cleanupYouTube Channel: https://www.youtube.com/channel/UCqeoffeQu3pSXMV8fUIGNiw More Podcasts/Blogs/Webinars www.debrarrichardson.comMore ideas? Email me at debra@debrarrichardson.com Music Credit: www.purple-planet.com
Send us a text
From high-speed rail to electric cars to batteries to AI, it's clear that China can operate with incredible speed at massive scale. Can the US still compete?We sat down with Dan Wang, a Research Fellow at the Hoover Institution and the author of “Breakneck: China's Quest to Engineer the Future” to discuss. Timecodes: 0:00 Introduction1:36 Lawyers vs. Engineers: Cultural and Economic Differences4:06 Urban and Rural Life: Comparing Infrastructure7:20 Barriers to Progress: Regulation and Governance11:00 Industrial Policy and Public-Private Partnerships14:20 The Double-Edged Sword of Legal and Engineering Mindsets16:50 Social Engineering and Policy in China23:00 Competition, Intellectual Property, and Business Culture27:10 Manufacturing, Scale, and Global Supply Chains36:00 Lessons from Japan and Korea41:30 Complacency, Quality, and the Future of Competition48:45 Strategic Resources and Industrial Policy54:00 Foreign Policy: Engineering Diplomacy vs. Alliances59:00 Taiwan, Demographics, and the Future of US-China Relations Resources:Follow Dan on X: https://x.com/danwwangRead Dan's blog: https://danwang.co/Buy Breakneck on Amazon: https://www.amazon.com/dp/1324106034/Follow Steven on X: https://x.com/stevesi Stay Updated:Find a16z on XFind a16z on LinkedInListen to the a16z Podcast on SpotifyListen to the a16z Podcast on Apple PodcastsFollow our host: https://twitter.com/eriktorenberg Please note that the content here is for informational purposes only; should NOT be taken as legal, business, tax, or investment advice or be used to evaluate any investment or security; and is not directed at any investors or potential investors in any a16z fund. a16z and its affiliates may maintain investments in the companies discussed. For more details please see a16z.com/disclosures. Hosted by Simplecast, an AdsWizz company. See pcm.adswizz.com for information about our collection and use of personal data for advertising.
Former DreamWorks animator, Andrew Young, exposes how beloved animated films have become tools of social engineering, subtly shifting from character-driven stories to politically charged narratives that undermine family values and traditional storytelling. We trace Andrew's journey from Hollywood success to cultural whistleblower as he reveals how the animation, media, & education industries now shape young minds and foster division through ideological agendas. The conversation culminates with Andrew's advocacy to combat online child exploitation, highlighting the dangers of sextortion, Section 230, and the urgent need to protect children in the digital age. This episode is a must-listen for parents, educators, & creators determined to defend truth, creativity, and the hearts of the next generation. Andrew Young is a former professional animator turned child advocate. He currently works for Porn Harms, a National Center on Sexual Exploitation (NCOSE) initiative to raise awareness of the public health harms of porn - exposing the connection between porn and all forms of sexual exploitation. Porn Harms/Research archives offer the most comprehensive look at available research on pornography. NCOSE Porn Harms engages the public and change policies with projects such as the Dirty Dozen list, the Safe Schools Safe Libraries initiative, and No Vacancy for Exploitation. Discussed in this Episode: Andrew's Full Story: Social Engineering in Animation No Escape Room Documentary SCHOOL TO HOMESCHOOL RESOURCES: FREE MONTHLY WEDNESDAY WORKSHOP: CLICK HERE Sign Up for the School to Homeschool Newsletter Private Mentoring with Janae: Schedule a Free Discovery Call School to Homeschool YouTube Channel Etsy Store: Shop for Homeschooling Swag *Please note that some of the links included in this article are Amazon affiliate links. CONNECT with US Join the Private Facebook Group Learn more about School to Homeschool Contact Janae: schooltohomeschool1@gmail.com
Many automation software platforms including email to invoicing have artificial intelligence embedded in them. You may not think that email or invoicing software can help fight fraud in the vendor process, but yes they can and here's how... Keep listening. Check out my website www.debrarrichardson.com if you need help implementing authentication techniques, internal controls, and best practices to prevent fraudulent payments, regulatory fines or bad vendor data. Check out the Vendor Process Training Center for 116+ hours of weekly live and on-demand training for the Vendor team. Links mentioned in the podcast + other helpful resources: Free Download: 5 Steps to Improve Your Vendor Callback Process https://training.debrarrichardson.com/confirmationGet the Vendor Callback Confirmation Toolkit(TM) Today: https://training.debrarrichardson.com/course/callback-confirmation-toolkitCustomized Vendor Validations Session: https://debrarrichardson.com/vendor-validation-sessionFree Download: Vendor Validation Reference List with Resource Links https://debrarrichardson.com/vendor-validation-downloadVendor Process Training Center - https://training.debrarrichardson.comCustomized Fraud Training: https://training.debrarrichardson.com/customized-fraud-training Free Live and On-Demand Webinars: https://training.debrarrichardson.com/webinarsVendor Master File Clean-Up: https://www.debrarrichardson.com/cleanupYouTube Channel: https://www.youtube.com/channel/UCqeoffeQu3pSXMV8fUIGNiw More Podcasts/Blogs/Webinars www.debrarrichardson.comMore ideas? Email me at debra@debrarrichardson.com Music Credit: www.purple-planet.com
Adam Swart — CEO of Crowds on Demand — joins the show to reveal the mechanics on how modern movements are manufactured. He explains how fake protests, paid participants and manufactured online followers are used to seed real engagement, create the illusion of consensus, and drive actual street and media action. If you've ever wondered why certain narratives explode overnight or why social momentum sometimes feels engineered, this episode shows you the playbook.We dig into:– How organizers buy attention and simulate grassroots energy.– Why fake consensus persuades real people to act.– The tools and platforms used to manufacture reality online and on the ground.– Real-world examples and the downstream effects on media, politics, and public perception.– Practical ways listeners can spot engineered movements and protect their newsfeeds and their minds from manipulation.This is essential listening for anyone who wants to understand — and resist — the mechanics behind manufactured movements, manipulation and mind controlYou can see more at CrowdsOnDemand.com
Get ready for a wild ride on this episode of *The Pour Horsemen Podcast*!
Cybersecurity isn't just about firewalls and passwords anymore. It's an all-out battle where hackers run businesses with customer support desks, insider threats can be disguised as your newest hire, and artificial intelligence is both the weapon and the shield. In this special episode of IT Visionaries, host Chris Brandt switches roles and sits in the hot seat while Lacey Peace, host of Experts of Experience, interviews him about the three biggest cyber threats IT leaders must prepare for in 2025. From the rise of ransomware-as-a-service to North Korean nationals infiltrating U.S. companies, and AI reshaping the entire security landscape, Chris reveals what's really happening behind the scenes of today's most dangerous attacks. With stories from his career building high-security facilities — including an EMP-shielded data center buried under a mountain — Chris shares the lessons that every business leader needs to hear about resilience, recovery, and why it's no longer a matter of “if” but “when.” Don't miss this candid and eye-opening conversation. Watch the full episode now and learn how to protect your organization before it's too late. Key Moments: 00:00: Lacey Peace Interviews Chris Brandt04:45 Cyber Extortion and Ransomware08:17 Supply Chain Attacks18:20 Creating an Isolated Recovery Environment20:08 Threat Number Two: IT Worker Attacks22:14 The Rise of Phishing Attacks27:26 The Evolution of Social Engineering30:19 The Role of AI in Cybersecurity33:01 Challenges in Reporting Cyber Incidents33:46 The Complexity of Cyber Incident Recovery34:45 The Role of Governments in Cybersecurity -- This episode of IT Visionaries is brought to you by Meter - the company building better networks. Businesses today are frustrated with outdated providers, rigid pricing, and fragmented tools. Meter changes that with a single integrated solution that covers everything wired, wireless, and even cellular networking. They design the hardware, write the firmware, build the software, and manage it all so your team doesn't have to. That means you get fast, secure, and scalable connectivity without the complexity of juggling multiple providers. Thanks to meter for sponsoring. Go to meter.com/itv to book a demo.---Mission.org is a media studio producing content alongside world-class clients. Learn more at mission.org Hosted by Simplecast, an AdsWizz company. See pcm.adswizz.com for information about our collection and use of personal data for advertising.
⬥GUEST⬥Aunshul Rege, Director at The CARE Lab at Temple University | On Linkedin: https://www.linkedin.com/in/aunshul-rege-26526b59/⬥CO-HOST⬥Julie Haney, Computer scientist and Human-Centered Cybersecurity Program Lead, National Institute of Standards and Technology | On LinkedIn: https://www.linkedin.com/in/julie-haney-037449119/⬥HOST⬥Host: Sean Martin, Co-Founder at ITSPmagazine and Host of Redefining CyberSecurity Podcast | On LinkedIn: https://www.linkedin.com/in/imsmartin/ | Website: https://www.seanmartin.com⬥EPISODE NOTES⬥Cybersecurity Is for Everyone — If We Teach It That WayCybersecurity impacts us all, yet most people still see it as a tech-centric domain reserved for experts in computer science or IT. Dr. Aunshul Rege, Associate Professor in the Department of Criminal Justice at Temple University, challenges that perception through her research, outreach, and education programs — all grounded in community, empathy, and human behavior.In this episode, Dr. Rege joins Sean Martin and co-host Julie Haney to share her multi-layered approach to cybersecurity awareness and education. Drawing from her unique background that spans computer science and criminology, she explains how understanding human behavior is critical to understanding and addressing digital risk.One powerful initiative she describes brings university students into the community to teach cyber hygiene to seniors — a demographic often left out of traditional training programs. These student-led sessions focus on practical topics like scams and password safety, delivered in clear, respectful, and engaging ways. The result? Not just education, but trust-building, conversation, and long-term community engagement.Dr. Rege also leads interdisciplinary social engineering competitions that invite students from diverse academic backgrounds — including theater, nursing, business, and criminal justice — to explore real-world cyber scenarios. These events prove that you don't need to code to contribute meaningfully to cybersecurity. You just need curiosity, communication skills, and a willingness to learn.Looking ahead, Temple University is launching a new Bachelor of Arts in Cybersecurity and Human Behavior — a program that weaves in community engagement, liberal arts, and applied practice to prepare students for real-world roles beyond traditional technical paths.If you're a security leader looking to improve awareness programs, a university educator shaping the next generation, or someone simply curious about where you fit in the cyber puzzle, this episode offers a fresh perspective: cybersecurity works best when it's human-first.⬥SPONSORS⬥ThreatLocker: https://itspm.ag/threatlocker-r974⬥RESOURCES⬥Dr. Aunshul Rege is an Associate Professor here, and much of her work is conducted under this department: https://liberalarts.temple.edu/academics/departments-and-programs/criminal-justiceTemple Digital Equity Plan (2022): https://www.phila.gov/media/20220412162153/Philadelphia-Digital-Equity-Plan-FINAL.pdfTemple University Digital Equity Center / Digital Access Center: https://news.temple.edu/news/2022-12-06/temple-launches-digital-equity-center-north-philadelphiaNICE Cybersecurity Workforce Framework: https://www.nist.gov/itl/applied-cybersecurity/nice/nice-framework-resource-center⬥ADDITIONAL INFORMATION⬥✨ More Redefining CyberSecurity Podcast:
Enjoy these back to back throwback episodes! Doors of Perception is available now on Amazon Prime!https://watch.amazon.com/detail?gti=amzn1.dv.gti.8a60e6c7-678d-4502-b335-adfbb30697b8&ref_=atv_lp_share_mv&r=webDoors of Perception official trailerhttps://youtu.be/F-VJ01kMSII?si=Ee6xwtUONA18HNLZIndependent Media Token https://www.independentmediatoken.com/Patreon https://patreon.com/forbiddenknowledgenews?utm_medium=unknown&utm_source=join_link&utm_campaign=creatorshare_creator&utm_content=copyLinkMerchhttps://fknstore.net/Start your microdosing journey with BrainsupremeGet 15% off your order here!!https://brainsupreme.co/FKN15Book a free consultation with Jennifer Halcame Emailjenniferhalcame@gmail.comFacebook pagehttps://www.facebook.com/profile.php?id=61561665957079&mibextid=ZbWKwLWatch The Forbidden Documentary: Occult Louisiana on Tubi: https://link.tubi.tv/pGXW6chxCJbC60 PurplePowerhttps://go.shopc60.com/FORBIDDEN10/or use coupon code knowledge10FKN Link Treehttps://linktr.ee/FKNlinksForbidden Knowledge Network https://forbiddenknowledge.news/ Make a Donation to Forbidden Knowledge News https://www.paypal.me/forbiddenknowledgenehttps://buymeacoffee.com/forbiddenJohnny Larson's artworkhttps://www.patreon.com/JohnnyLarsonSign up on Rokfin!https://rokfin.com/fknplusPodcastshttps://www.spreaker.com/show/forbiddenAvailable on all platforms Support FKN on Spreaker https://spreaker.page.link/KoPgfbEq8kcsR5oj9FKN ON Rumblehttps://rumble.com/c/FKNpGet Cory Hughes books!Lee Harvey Oswald In Black and White https://www.amazon.com/dp/B0FJ2PQJRMA Warning From History Audio bookhttps://buymeacoffee.com/jfkbook/e/392579https://www.buymeacoffee.com/jfkbookhttps://www.amazon.com/Warning-History-Cory-Hughes/dp/B0CL14VQY6/ref=mp_s_a_1_1?crid=72HEFZQA7TAP&keywords=a+warning+from+history+cory+hughes&qid=1698861279&sprefix=a+warning+fro%2Caps%2C121&sr=8-1https://coryhughes.org/YouTube https://youtube.com/@fknclipspBecome Self-Sufficient With A Food Forest!!https://foodforestabundance.com/get-started/?ref=CHRISTOPHERMATHUse coupon code: FORBIDDEN for discountsOur Facebook pageshttps://www.facebook.com/forbiddenknowledgenewsconspiracy/https://www.facebook.com/FKNNetwork/Instagram @forbiddenknowledgenews1@forbiddenknowledgenetworkXhttps://x.com/ForbiddenKnow10?t=uO5AqEtDuHdF9fXYtCUtfw&s=09Email meforbiddenknowledgenews@gmail.comsome music thanks to:https://www.bensound.com/Become a supporter of this podcast: https://www.spreaker.com/podcast/forbidden-knowledge-news--3589233/support.