Podcasts about Social engineering

  • 1,005PODCASTS
  • 2,569EPISODES
  • 53mAVG DURATION
  • 5WEEKLY NEW EPISODES
  • May 27, 2025LATEST

POPULARITY

20172018201920202021202220232024

Categories



Best podcasts about Social engineering

Show all podcasts related to social engineering

Latest podcast episodes about Social engineering

Cybercrime Magazine Podcast
Cybercrime Magazine Update: Small Business Alert. Top 10 Most Common Social Engineering Attacks.

Cybercrime Magazine Podcast

Play Episode Listen Later May 27, 2025 4:20


Tech Bullion has highlighted the top 10 most common social engineering attacks that small businesses should know, including phishing emails and spear phishing. In this episode, host Paul John Spaulding is joined by Steve Morgan, Founder of Cybersecurity Ventures and Editor-in-Chief at Cybercrime Magazine, to discuss. The Cybercrime Magazine Update airs weekly and covers the latest news, interviews, podcasts, reports, videos, and special productions from Cybercrime Magazine, published by Cybersecurity Ventures. For more on cybersecurity, visit us at https://cybersecurityventures.com.

Cyber Security Today
From English Literature to Cybersecurity: A Journey Through Blockchain and Security

Cyber Security Today

Play Episode Listen Later May 24, 2025 54:36 Transcription Available


LINKS:  https://distrust.co/software.html - Software page with OSS software Linux distro: https://codeberg.org/stagex/stagex Milksad vulnerability:  https://milksad.info/ In this episode of Cybersecurity Today on the Weekend, host Jim Love engages in a captivating discussion with Anton Livaja  from Distrust. Anton shares his unique career transition from obtaining a BA in English literature at York University to delving into cybersecurity and tech. Anton recounts how he initially entered the tech field through a startup and quickly embraced programming and automation. The conversation covers Anton's interest in Bitcoin and blockchain technology, including the importance of stablecoins, and the frequent hacking incidents in the crypto space. Anton explains the intricacies of blockchain security, emphasizing the critical role of managing cryptographic keys. The dialogue also explores advanced security methodologies like full source bootstrapping and deterministic builds, and Anton elaborates on the significance of creating open-source software for enhanced security. As the discussion concludes, Anton highlights the need for continual curiosity, teamwork, and purpose-driven work in the cybersecurity field. 00:00 Introduction to Cybersecurity Today 00:17 Anton's Journey from Literature to Cybersecurity 01:08 First Foray into Programming and Automation 02:35 Blockchain and Its Real-World Applications 04:36 Security Challenges in Blockchain and Cryptocurrency 13:21 The Rise of Insider Threats and Social Engineering 16:40 Advanced Security Measures and Supply Chain Attacks 22:36 The Importance of Deterministic Builds and Full Source Bootstrapping 29:35 Making Open Source Software Accessible 31:29 Blockchain and Supply Chain Traceability 33:34 Ensuring Software Integrity and Security 38:20 The Role of AI in Code Review 40:37 The Milksad Incident 46:33 Introducing Distrust and Its Mission 52:23 Final Thoughts and Encouragement

Putting the AP in hAPpy
Episode 339: The Better Business Bureau's Troy Baker on How to Shield Your Business From Fraud Using BBB Resources

Putting the AP in hAPpy

Play Episode Listen Later May 22, 2025 47:29


Did you know you can find lots of fraud prevention resources from the Better Business Bureau?  In this episode, Troy Baker from the Michigan Better Business Bureau talks about fraud, using the BBB for validations and what we both think is the best thing to do that will keep your company protected from fraud.   Keep listening. Check out my website www.debrarrichardson.com if you need help implementing authentication techniques, internal controls, and best practices to prevent fraudulent payments, regulatory fines or bad vendor data. Check out the Vendor Process Training Center for 116+ hours of weekly live and on-demand training for the Vendor team. Links mentioned in the podcast + other helpful resources:   Better Business Bureau Links:  Main Webpage:  https://www.bbb.org Scam Tracker:  https://www.bbb.org/scamtracker Scam News/Tips:  https://www.bbb.org/all/scamtips Sign-Up for Scam Alerts: https://signup.e2ma.net/signup/1900156/1902645/ Michigan Better Business Bureau:  https://www.bbb.org/miprograms Validate Charities:  https://www.give.org Customized Vendor Validations Session: https://debrarrichardson.com/vendor-validation-sessionVendor Process Training Center - https://training.debrarrichardson.comCustomized Fraud Training:  https://training.debrarrichardson.com/customized-fraud-training Free Live and On-Demand Webinars: https://training.debrarrichardson.com/webinarsVendor Master File Clean-Up:  https://www.debrarrichardson.com/cleanupYouTube Channel:  https://www.youtube.com/channel/UCqeoffeQu3pSXMV8fUIGNiw More Podcasts/Blogs/Webinars www.debrarrichardson.comMore ideas?  Email me at debra@debrarrichardson.com Music Credit:  www.purple-planet.com

Doppelgänger Tech Talk
xAI Propaganda-Panne | Reddit Google-Sichtbarkeit | Booking | Cohere #458

Doppelgänger Tech Talk

Play Episode Listen Later May 16, 2025 70:56


Grok erzählt zusammenhangslos Verschwörungstheorie über weißen Genozid in Südafrika. Trumps Zölle könnten die US-Konsumlaune ins Wanken bringe. Cohere verfehlt seine Umsatzerwartungen drastisch. CoreWeave übertrifft Erwartungen. Microsofts KI-gestützte Einsparungen werfen Fragen zur Zukunft der Softwareentwicklung auf. Coinbase wurde Opfer von Social Engineering. Unterstütze unseren Podcast und entdecke die Angebote unserer Werbepartner auf ⁠⁠⁠⁠⁠doppelgaenger.io/werbung⁠⁠⁠⁠⁠. Vielen Dank!  Philipp Glöckler und Philipp Klöckner sprechen heute über: (00:00:00) Intro (00:01:50) Reddit Google (00:08:15) Youtube Podcast Charts (00:12:15) US Verbraucherbelastung (00:18:45) xAI Systemprompt Genozid Südafrika (00:32:00) Cohere  (00:38:30) CoreWeave  (00:45:20) AirBnb & Booking (00:56:00) TikTok (00:58:00) Microsoft Entlassungen Softwareentwickler (01:01:20) Coinbase Hack (01:06:15) Trump Apple Indienple Shownotes YouTube veröffentlicht Ranking der Top-Podcasts in den USA – nytimes.com Verbraucher unter Druck durch Trumps Zölle – nytimes.com Grok „weißer Völkermord“ in Südafrika - pivot-to-ai.com, axios.com Grok System Prompt – x.com Sam Altman Tweet – x.com Warum Cohere seine Umsatzprognose um 85% verfehlte – theinformation.com Warum ein KI-Datenzentrum auf der Prärie leer steht – theinformation.com CoreWeave übertrifft Erwartungen – ft.com Airbnb: Köche und Massagen in neuer App – bbc.com EU gegen TikTok wegen Online-Inhaltsregeln – ft.com Microsoft-Entlassungen treffen Softwareingenieure, AI-Einsparungen – bloomberg.com Cyberangriff auf Kryptobörse: Kopfgeld auf Hacker ausgesetzt – manager-magazin.de Trump Apple Indien – ft.com Apple warnt vor EU-Apps ohne App-Store-Zahlungen – theverge.com

Putting the AP in hAPpy
Episode 338: 3 Benefits When the Customer Master File is Also the Vendor Master File

Putting the AP in hAPpy

Play Episode Listen Later May 15, 2025 20:58


Is your vendor master file and customer master file the same?  Don't miss taking advantage of these key benefits when they are one in the same.  What are they?  Keep listening. Check out my website www.debrarrichardson.com if you need help implementing authentication techniques, internal controls, and best practices to prevent fraudulent payments, regulatory fines or bad vendor data. Check out the Vendor Process Training Center for 116+ hours of weekly live and on-demand training for the Vendor team. Links mentioned in the podcast + other helpful resources:   Customer Master File Training (50% off Through 6/15/25):  3 Step Customer Setup & Maintenance Process Workshop Customized Vendor Validations Session: https://debrarrichardson.com/vendor-validation-sessionVendor Process Training Center - https://training.debrarrichardson.comCustomized Fraud Training:  https://training.debrarrichardson.com/customized-fraud-training Free Live and On-Demand Webinars: https://training.debrarrichardson.com/webinarsVendor Master File Clean-Up:  https://www.debrarrichardson.com/cleanupYouTube Channel:  https://www.youtube.com/channel/UCqeoffeQu3pSXMV8fUIGNiw More Podcasts/Blogs/Webinars www.debrarrichardson.comMore ideas?  Email me at debra@debrarrichardson.com Music Credit:  www.purple-planet.com

Cyber Security with Bob G
3 Red Flags to Watch Out for in Social Engineering - Non-Phishing

Cyber Security with Bob G

Play Episode Listen Later May 15, 2025 7:19


Video - https://youtu.be/OpOAoPUMfoUEver get that weird feeling when someone rushes you for sensitive info or tries a little too hard to be helpful? You might be facing a social engineering attack—and not the phishing kind. In this video, we break down the 3 biggest red flags you need to spot before it's too late. Don't get played—get prepared. I used ChatGPT-4o, ScreenPal, and Pictory.ai to put this information together.If you're interested in trying Pictory.ai please use the following link. https://pictory.ai?ref=t015o

Darn IT Podcast
The Teams Trap

Darn IT Podcast

Play Episode Listen Later May 13, 2025 8:28


Cybercriminals are sliding into Microsoft Teams chats—and they're not who they say they are. In this episode of Darnley's Cyber Cafe, we uncover a clever new attack targeting businesses from the inside out. From fake IT support to sneaky malware that hides in plain sight, this is one you don't want to ignore. Grab a coffee and learn how to spot the warning signs, protect your systems, and stay one step ahead.

Putting the AP in hAPpy
Episode 337: April 2025 Changes to the 1099-MISC and 1099-NEC

Putting the AP in hAPpy

Play Episode Listen Later May 8, 2025 16:26


Of course – the IRS has updated the 1099-MISC and 1099-NEC again effective for reporting Tax Year 2025 payments to your vendors.  It's not that bad though….Keep listening. Check out my website www.debrarrichardson.com if you need help implementing authentication techniques, internal controls, and best practices to prevent fraudulent payments, regulatory fines or bad vendor data. Check out the Vendor Process Training Center for 116+ hours of weekly live and on-demand training for the Vendor team.  Links mentioned in the podcast + other helpful resources:   Training:  From an Accounts Payable Perspective:  Year-End Checklist for 1099-MISC, 1099-NEC and 1042-S Reporting IRS:  Instructions for Forms 1099-MISC and 1099-NEC (Rev. April 2025) IRS:  Form 1099-MISC (Rev. April 2025)  https://www.irs.gov/pub/irs-pdf/f1099msc.pdf IRS:  Form 1099-NEC (Rev. April 2025) https://www.irs.gov/pub/irs-pdf/f1099nec.pdf Customized Vendor Validations Session: https://debrarrichardson.com/vendor-validation-sessionVendor Process Training Center - https://training.debrarrichardson.comCustomized Fraud Training:  https://training.debrarrichardson.com/customized-fraud-training Free Live and On-Demand Webinars: https://training.debrarrichardson.com/webinarsVendor Master File Clean-Up:  https://www.debrarrichardson.com/cleanupYouTube Channel:  https://www.youtube.com/channel/UCqeoffeQu3pSXMV8fUIGNiw More Podcasts/Blogs/Webinars www.debrarrichardson.comMore ideas?  Email me at debra@debrarrichardson.com Music Credit:  www.purple-planet.com

Darn IT Podcast
When Google Emails Lie: Phishing Through the Front Door

Darn IT Podcast

Play Episode Listen Later May 8, 2025 7:48


An email from Google. A law enforcement warning. Everything looks legit—until it isn't. In this episode of Darnley's Cyber Cafe, we uncover a shockingly convincing phishing scam and explore how trust can be weaponized in your inbox. Click play... but think twice before you click anything else!Click here to send future episode recommendationSupport the showSubscribe now to Darnley's Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape.

Communism Exposed:East and West
The Root of Totalitarianism Is Social Engineering

Communism Exposed:East and West

Play Episode Listen Later May 4, 2025 6:31


Voice-Over-Text: Pandemic Quotables
The Root of Totalitarianism Is Social Engineering

Voice-Over-Text: Pandemic Quotables

Play Episode Listen Later May 4, 2025 6:31


Pandemic Quotables
The Root of Totalitarianism Is Social Engineering

Pandemic Quotables

Play Episode Listen Later May 4, 2025 6:31


Communism Exposed:East & West(PDF)
The Root of Totalitarianism Is Social Engineering

Communism Exposed:East & West(PDF)

Play Episode Listen Later May 4, 2025 6:31


Trust Issues
EP 6 - Incident Response POV: 2025 Emerging Threats

Trust Issues

Play Episode Listen Later Apr 30, 2025 36:41


In this episode of Security Matters, host David Puner, dives into the world of evolving cyberthreats with Bryan Murphy, Senior Director of CyberArk's Incident Response Team. Imagine a scenario where an attacker uses AI-generated deepfakes to impersonate your company's VP of finance, gaining unauthorized access to your environment. Bryan Murphy shares insights on how these sophisticated attacks are turning identity into the attack surface and why your first line of defense might be as simple as a video call. Learn about the latest trends in social engineering, credential tiering and the importance of visual verification in incident response. Don't miss this eye-opening discussion on how to protect your organization from the ever-evolving threat landscape.

The Effortless Podcast
MCP Is Less Software Engineering And More Social Engineering Ft. Harpinder Singh- Episode 14: The Effortless Podcast

The Effortless Podcast

Play Episode Listen Later Apr 30, 2025 79:03


Episode 14 | The Effortless PodcastIn this episode of The Effortless Podcast, hosts Dheeraj Pandey and Amit Prakash sit down with Harpinder "Happy" Singh, AI/ML Engineer at DevRev, to explore the future of AI and machine learning in business automation. Happy, who joined DevRev in 2021, shares his journey from computer science to AI, discussing how DevRev is leveraging cutting-edge technologies like large language models (LLMs) and function calling to streamline enterprise workflows.Happy breaks down the key concepts of AI-driven workflows, the debate between federated and integrated systems, and the growing importance of Python in AI. He also shares insights from the CodeAct paper, which proposes using Python code execution for more efficient and flexible LLMs. The conversation highlights the transformative potential of AI in enterprise automation and how it is reshaping industries.They also cover:The evolution of AI at DevRev: From workflows to AI-driven automationThe role of Python in executing complex tasks for LLMsUnderstanding the user-agent-environment model in AI systemsHow federated vs. integrated systems impact AI performanceThe future of AI in enterprise automation and DevRev's innovationsHappy's decision to stay in India and the growing tech ecosystem in IndiaThis episode provides valuable insights into how AI is transforming business operations, making complex workflows more efficient and accessible. Whether you're an AI enthusiast, a developer, or a business leader, this conversation is a must-listen for anyone interested in the next wave of AI-driven innovation.Key Topics & Timestamps:00:00 – Introduction to Harpinder "Happy" Singh & His Journey into AI03:00 – Happy's Early Background: From Shahjahanpur to BITS Pilani06:30 – Transition to AI at DevRev09:30 – Bangalore Life and Growing with DevRev13:00 – AI in India vs. the US18:00 – Federated vs. Integrated Systems: Which Approach Works Best for AI?25:00 – The Role of Python in AI32:00 – User, Agent, and Environment Model in AI39:30 – The CodeAct Paper: Replacing Tool Calls with Python Code Execution47:00 – AI in Enterprise Automation: How DevRev Uses AI to Streamline Workflows54:00 – Looking Ahead at DevRev's AI Innovations1:00:00 – Final Reflections: The Future of AI in Business and AutomationHosts:Dheeraj Pandey: Co-founder and CEO at DevRev, formerly CEO of Nutanix, a tech visionary passionate about AI and systems thinking.Amit Prakash: Co-founder and CTO at ThoughtSpot, former engineer at Google and Microsoft, and expert in distributed systems and machine learning.Guest:Harpinder Jot Singh: AI/ML Engineer at DevRev, working on the cutting edge of large language models (LLMs), AI-driven workflows, and integrating AI into enterprise systems.Follow the Host and the Guest:Dheeraj Pandey: LinkedIn | XAmit Prakash: LinkedIn | XHarpinder Singh: LinkedInHave questions or thoughts on AI? Drop us a mail at effortlesspodcasthq@gmail.comDon't forget to like, comment, and subscribe for more insights into the future of AI, business automation, and enterprise technology!

The
How to Instantly Read People & Protect Yourself from Manipulation w/ Chase Hughes (WiM577)

The "What is Money?" Show

Play Episode Listen Later Apr 28, 2025 154:04


// GUEST //Website: https://nci.university/X: https://x.com/nciuniversityYoutube: https://www.youtube.com/@chasehughesofficialBook: https://www.amazon.com/dp/173514164XInstagram: https://www.instagram.com/chasehughesofficialFacebook: https://www.facebook.com/chasehughesofficial/ // SPONSORS //The Farm at Okefenokee: https://okefarm.com/iCoin: https://icointechnology.com/breedloveHeart and Soil Supplements (use discount code BREEDLOVE): https://heartandsoil.co/In Wolf's Clothing: https://wolfnyc.com/Revero: https://www.revero.com/breedloveBlockware Solutions: https://mining.blockwaresolutions.com/breedloveOn Ramp: https://onrampbitcoin.com/?grsf=breedloveMindlab Pro: https://www.mindlabpro.com/breedloveCoinbits: https://coinbits.app/breedlove // PRODUCTS I ENDORSE //Protect your mobile phone from SIM swap attacks: https://www.efani.com/breedloveNoble Protein (discount code BREEDLOVE for 15% off): https://nobleorigins.com/Lineage Provisions (use discount code BREEDLOVE): https://lineageprovisions.com/?ref=breedlove_22Colorado Craft Beef (use discount code BREEDLOVE): https://coloradocraftbeef.com/ // SUBSCRIBE TO THE CLIPS CHANNEL //https://www.youtube.com/@robertbreedloveclips2996/videos // OUTLINE //0:00 - WiM Episode Trailer1:40 - From the Navy to Behavioral Science6:10 - The Origins of Social Anxiety12:34 - Dealing with Social Anxiety19:10 - Fake it Till You Make It?26:14 - The Farm at Okefenokee27:40 - iCoin Technology29:10 - The Power of Focusing on Others32:10 - Intuition and Incongruent Behavior37:12 - Dealing With Online Criticism39:58 - Behavior Science 10150:55 - Carrying Concealed Shame56:42 - Heart and Soil Supplements57:42 - Helping Lightning Startups with In Wolf's Clothing58:34 - Personalize Your Health with Revero59:37 - Radical Truth and Forgiving Yourself1:08:33 - Handling Manipulation1:16:45 - Concealment of Intent1:24:50 - Mine Bitcoin with Blockware Solutions1:26:16 - Onramp Bitcoin Custody1:27:39 - Money Printing is Mind Control1:37:01 - The History of Propaganda1:53:22 - Mind Lab Pro Supplements1:54:32 - Buy Bitcoin with Coinbits1:55:43 - Waking Up to Manipulation and Propaganda2:00:14 - Empathy and Rationality2:09:11 - The Psychopath Checklist2:17:22 - Interrogation 1012:28:20 - Seeing Behind People's Mask2:32:27 - Closing Thoughts and Where to Find Chase Hughes // PODCAST //Podcast Website: https://whatismoneypodcast.com/Apple Podcast: https://podcasts.apple.com/us/podcast/the-what-is-money-show/id1541404400Spotify: https://open.spotify.com/show/25LPvm8EewBGyfQQ1abIsERSS Feed: https://feeds.simplecast.com/MLdpYXYI // SUPPORT THIS CHANNEL //Bitcoin: 3D1gfxKZKMtfWaD1bkwiR6JsDzu6e9bZQ7Sats via Strike: https://strike.me/breedlove22Dollars via Paypal: https://www.paypal.com/paypalme/RBreedloveDollars via Venmo: https://account.venmo.com/u/Robert-Breedlove-2 // SOCIAL //Breedlove X: https://x.com/Breedlove22WiM? X: https://x.com/WhatisMoneyShowLinkedin: https://www.linkedin.com/in/breedlove22/Instagram: https://www.instagram.com/breedlove_22/TikTok: https://www.tiktok.com/@breedlove22Substack: https://breedlove22.substack.com/All My Current Work: https://linktr.ee/robertbreedlove

The Social-Engineer Podcast
Ep. 302 - The 4th Monday Series - From Scam Victim to Investment Guru with Kayla Lussier

The Social-Engineer Podcast

Play Episode Listen Later Apr 28, 2025 25:06


Welcome to the Social-Engineer Podcast: The 4th Monday Series with Chris Hadnagy and Mike Holfeld. Chris and Mike will be covering cutting edge global news to help people remain safe, secure and knowledgeable in a world where it is hard to know what is real and what is fake news.   Today Chris and Mike are joined by Kayla Lussier. Kayla is the co-founder of Money Match, a platform championing financial wellness by connecting real estate investors and small businesses with the capital they need to thrive. Her 15 years in healthcare as a nurse practitioner have instilled in her a deep understanding of holistic well-being – mind, body, and wallet. [April 28, 2025]   00:00 - Intro 00:16 - Mike Holfeld Intro 00:47 - Today's Guest: Kayla Lussier 01:53 - Jumping In Too Quickly 03:22 - Getting Burned 07:35 - Don't Mess with Kayla! 09:07 - Making a Match 13:21 - Play is the Way 15:17 - Mitigating the Risks 18:26 - Digital Nomads Welcome 21:25 - Find Kayla Lussier Online -          Website: moneymatchapp.com 22:30 - Silver Tsunami 24:26 - Wrap Up 24:40 - Next Month: Baseball Technology 24:50 - Outro -          www.social-engineer.com -          www.innocentlivesfoundation.org   Find us online: -          Chris Hadnagy -          Twitter: @humanhacker -          LinkedIn: linkedin.com/in/christopherhadnagy

Putting the AP in hAPpy
Episode 335: Why the Vendor Process Is Key to Preventing ACH, Wire and Check Payment Fraud

Putting the AP in hAPpy

Play Episode Listen Later Apr 24, 2025 25:20


Invoice automation is great for invoice processing and even has artificial intelligence tools that can help spot attempted fraud – but it's really the vendor setup and maintenance process that will save you from making fraudulent electronic and check payments. Keep listening.  Check out my website www.debrarrichardson.com if you need help implementing authentication techniques, internal controls, and best practices to prevent fraudulent payments, regulatory fines or bad vendor data. Check out the Vendor Process Training Center for 116+ hours of weekly live and on-demand training for the Vendor team.  Links mentioned in the podcast + other helpful resources:    Training: The BANK of AP: An Internal Control System to Combat Business Email Compromise Training: AVM 3 Step Vendor Setup & Maintenance process Workshop Customized Vendor Validations Session: https://debrarrichardson.com/vendor-validation-sessionVendor Process Training Center - https://training.debrarrichardson.comCustomized Fraud Training:  https://training.debrarrichardson.com/customized-fraud-training Free Live and On-Demand Webinars: https://training.debrarrichardson.com/webinarsVendor Master File Clean-Up:  https://www.debrarrichardson.com/cleanupYouTube Channel:  https://www.youtube.com/channel/UCqeoffeQu3pSXMV8fUIGNiw More Podcasts/Blogs/Webinars www.debrarrichardson.comMore ideas?  Email me at debra@debrarrichardson.com Music Credit:  www.purple-planet.com

Financial Freedom and Wealth Trailblazers Podcast
Strategic Social Engineering: Creating Lasting Community Impact With Andrea Kanaris

Financial Freedom and Wealth Trailblazers Podcast

Play Episode Listen Later Apr 23, 2025 19:39


Welcome to the Financial Freedom & Wealth Trailblazers Podcast! In today's episode,  we'll dive into how strategic social engineering can make a tangible difference in community development.Andrea Kanaris is a social scientist, social impact professional, and founder of All Things Social Impact—a platform that equips businesses and professionals with practical strategies to embed social responsibility and drive long-term value. With over 20 years' experience across Australia and internationally, Andrea has worked with government regulators, engineering and environmental firms, and project proponents to navigate complex social risks and support sustainable development.She is the author of A Practical Guide to Social Impact Assessment for the Real World, a hands-on manual that reframes social impact assessment as a strategic business asset rather than a compliance exercise.Andrea also hosts a YouTube channel featuring honest conversations with early career professionals and experienced practitioners, exploring their challenges, insights, and pathways to purpose-driven work. Her mission is to make social impact work accessible, actionable, and empowering for those committed to creating meaningful change for people and the planet.Connect with Andrea Here: Website: https://www.allthingssocialimpact.com/ YouTube: www.youtube.com/@AllThingsSocialImpactSpotify: https://open.spotify.com/show/4RLkmfuAUYC8XVoeISCzKv?si=-THRxKW8QJ--7Vhhlh2sfgLinkedIn: https://www.linkedin.com/in/andreakanaris/Facebook: https://www.facebook.com/share/p/18UieS5Lbf/TikTok: https://www.tiktok.com/@all.things.social12Instagram: https://www.instagram.com/allthingssocialimpact/ X: https://x.com/AllThingsSI===================================If you enjoyed this episode, remember to hit the like button and subscribe. Then share this episode with your friends.Thanks for watching the Financial Freedom & Wealth  Trailblazers Podcast. This podcast is part of the Digital Trailblazer family of podcasts. To learn more about Digital Trailblazer and what we do to help entrepreneurs, go to DigitalTrailblazer.com.Are you a coach, consultant, expert, or online course creator? Then we'd love to invite you to our FREE Facebook Group where you can learn the best strategies to land more high-ticket clients and customers. QUICK LINKS: APPLY TO BE FEATURED: https://app.digitaltrailblazer.com/podcast-guest-applicationDIGITAL TRAILBLAZER: https://digitaltrailblazer.com/

ITSPmagazine | Technology. Cybersecurity. Society
Living Forever (Sort Of): AI Clones, Digital Ghosts, and the Problem with Perfection | A Carbon, a Silicon, and a Cell walk into a bar... | A Redefining Society Podcast Series With Recurring Guest Dr. Bruce Y. Lee

ITSPmagazine | Technology. Cybersecurity. Society

Play Episode Listen Later Apr 17, 2025 43:23


Guest: Dr. Bruce Y LeeSenior Contributor @Forbes | Professor | CEO | Writer/Journalist | Entrepreneur | Digital & Computational Health | #AI | bruceylee.substack.com | bruceylee.com Bruce Y. Lee, MD, MBA is a writer, journalist, systems modeler, AI, computational and digital health expert, professor, physician, entrepreneur, and avocado-eater, not always in that order.Executive Director of PHICOR (Public Health Informatics, Computational, and Operations Research) [@PHICORteam]On LinkedIn | https://www.linkedin.com/in/bruce-y-lee-68a6834/Website | https://www.bruceylee.com/_____________________________Host: Marco Ciappelli, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining Society PodcastVisit Marco's website

Putting the AP in hAPpy
Episode 334: Flipping the Script - Two Tactics Vendors Are Using to Secure Their Bank Info With Clients (You)

Putting the AP in hAPpy

Play Episode Listen Later Apr 17, 2025 22:26


Vendor team members need to be vigilant when collecting and confirming bank account information.  Now, some vendors are doing the same.  If you want to hear what tactics the vendors are using to secure their banking information and how it benefits vendor teams….Keep listening. Check out my website www.debrarrichardson.com if you need help implementing authentication techniques, internal controls, and best practices to prevent fraudulent payments, regulatory fines or bad vendor data. Check out the Vendor Process Training Center for 116+ hours of weekly live and on-demand training for the Vendor team. Links mentioned in the podcast + other helpful resources:   Authentication Training (Free): AVM 3 Step Vendor Setup & Maintenance process Workshop Customized Vendor Validations Session: https://debrarrichardson.com/vendor-validation-sessionVendor Process Training Center - https://training.debrarrichardson.comCustomized Fraud Training:  https://training.debrarrichardson.com/customized-fraud-training Free Live and On-Demand Webinars: https://training.debrarrichardson.com/webinarsVendor Master File Clean-Up:  https://www.debrarrichardson.com/cleanupYouTube Channel:  https://www.youtube.com/channel/UCqeoffeQu3pSXMV8fUIGNiw More Podcasts/Blogs/Webinars www.debrarrichardson.comMore ideas?  Email me at debra@debrarrichardson.com Music Credit:  www.purple-planet.com

The Social-Engineer Podcast
Ep. 300 - Human Element Series - Celebrating 300 Episodes of The Social Engineer Podcast

The Social-Engineer Podcast

Play Episode Listen Later Apr 14, 2025 54:23


Today we are celebrating our 300th episode! Chris will be joined by some friends as he discusses how the podcast got started - back in 2009, how it has evolved, including the creation of multiple series, and the direction for the future. [April 14, 2025]   00:00 - Intro 00:22 - Intro Links -          Social-Engineer.com - http://www.social-engineer.com/ -          Managed Voice Phishing - https://www.social-engineer.com/services/vishing-service/ -          Managed Email Phishing - https://www.social-engineer.com/services/se-phishing-service/ -          Adversarial Simulations - https://www.social-engineer.com/services/social-engineering-penetration-test/ -          Social-Engineer channel on SLACK - https://social-engineering-hq.slack.com/ssb -          CLUTCH - http://www.pro-rock.com/ -          innocentlivesfoundation.org - http://www.innocentlivesfoundation.org/                                02:45 - Social-Engineer Origin Story 03:59 - The Human Element Series 05:34 - The Security Awareness Series 06:03 - The Doctor Is In Series 06:12 - The SE ETC. Series 06:28 - The 4th Monday Series 07:05 - The Future 07:43 - Amanda Drops By 08:35 - Ooof! 09:12 - SE Trivia 13:17 - A Video Celebration! 21:16 - Neil Fallon Drops By 52:50 - Wrap Up 53:56 - Outro -           www.social-engineer.com -          www.innocentlivesfoundation.org

The Health Ranger Report
Brighteon Broadcast News, Apr 11, 2025 – END OF EMPIRE: Trump disses the entire world while the dollar collapses and GOLD SKYROCKETS

The Health Ranger Report

Play Episode Listen Later Apr 11, 2025 144:04


- Trump's Geopolitical Illiteracy and Flu Vaccine Effectiveness (0:10) - RFK Jr.'s Advocacy and Measles Outbreak (3:23) - Trump's International Diplomacy and Economic Impact (8:55) - Trump's Economic Idiocy and Military Incompetence (20:07) - The Role of Vaccines in Autism and Infant Formula Testing (33:46) - The Influence of Zionism in America and the Deep State (52:03) - The Role of Tavistock Institute in Social Engineering (57:25) - The Cognition Race and the Depopulation Agenda (1:05:27) - The Role of Gold and Silver in Economic Stability (1:06:41) - The Future of Human Cognition and Machine Cognition (1:09:32) - Energy Consumption and Data Centers (1:18:51) - Competition for Resources (1:21:43) - Impact of Automation on Jobs (1:23:57) - Human Genius and AI Tools (1:26:49) - Homegrown Food and Seed Kits (1:30:47) - Interview with Dane Wigington (1:33:52) - Geoengineering and Weather Control (1:40:08) - Health and Environmental Impact (1:57:09) - Legislation and Public Awareness (2:22:20) - Future Prospects and Call to Action (2:23:00) For more updates, visit: http://www.brighteon.com/channel/hrreport NaturalNews videos would not be possible without you, as always we remain passionately dedicated to our mission of educating people all over the world on the subject of natural healing remedies and personal liberty (food freedom, medical freedom, the freedom of speech, etc.). Together, we're helping create a better world, with more honest food labeling, reduced chemical contamination, the avoidance of toxic heavy metals and vastly increased scientific transparency. ▶️ Every dollar you spend at the Health Ranger Store goes toward helping us achieve important science and content goals for humanity: https://www.healthrangerstore.com/ ▶️ Sign Up For Our Newsletter: https://www.naturalnews.com/Readerregistration.html ▶️ Brighteon: https://www.brighteon.com/channels/hrreport ▶️ Join Our Social Network: https://brighteon.social/@HealthRanger ▶️ Check In Stock Products at: https://PrepWithMike.com

Putting the AP in hAPpy
Episode 333: Looking for Vendor Contact Info? 3 Reasons Why the FTC Warns Not To Use Online Search Results

Putting the AP in hAPpy

Play Episode Listen Later Apr 10, 2025 11:25


If you perform a web search and use the results to find your vendor contact information or to confirm their information – you might want to hear what the Federal Trade Commission (FTC) warns against.  Plus what you can do instead. Keep listening. Check out my website www.debrarrichardson.com if you need help implementing authentication techniques, internal controls, and best practices to prevent fraudulent payments, regulatory fines or bad vendor data. Check out the Vendor Process Training Center for 116+ hours of weekly live and on-demand training for the Vendor team. Links mentioned in the podcast + other helpful resources:    FTC Article:  Online search results: The good, the bad, and the scammyAVM Toolkit – Internal Vendor Request Form Customized Vendor Validations Session: https://debrarrichardson.com/vendor-validation-sessionVendor Process Training Center - https://training.debrarrichardson.comCustomized Fraud Training:  https://training.debrarrichardson.com/customized-fraud-training Free Live and On-Demand Webinars: https://training.debrarrichardson.com/webinarsVendor Master File Clean-Up:  https://www.debrarrichardson.com/cleanupYouTube Channel:  https://www.youtube.com/channel/UCqeoffeQu3pSXMV8fUIGNiw More Podcasts/Blogs/Webinars www.debrarrichardson.comMore ideas?  Email me at debra@debrarrichardson.com Music Credit:  www.purple-planet.com

Fintech Confidential
Molotov cocktail of Social Engineering - AI, Deepfakes Plus Data Equals Just Enough To Fool Everyone

Fintech Confidential

Play Episode Listen Later Apr 10, 2025 63:45


Click here to see MORE!In this episode of FinTech Confidential Uncut, host Tedd Huff talks with Jeff Scheidel, VP of Operations at AuthID, about the rise of AI-driven fraud targeting financial institutions. They explore how deepfakes, voice cloning, and large language models are enabling scammers to impersonate executives, create synthetic identities, and build fake websites and phishing emails with alarming accuracy. Real cases include a $25 million loss from a deepfake video call and voice cloning scams using only seconds of audio.The episode highlights the limitations of current security tools, such as facial recognition failing due to minor appearance changes, and the inefficiency of manual fraud reviews. Jeff explains how biometric systems using passive liveness detection and cryptographic keys offer stronger protection without storing facial data. The discussion makes clear that financial organizations must quickly adopt smarter authentication methods and better user education to stay ahead of rapidly advancing threats.Takeaways 1️⃣ Stop Falling for Fake Customer Support2️⃣ Watch How One Photo Fakes a Live Identity3️⃣ Use Biometrics to Expose Deepfake Lies4️⃣ Catch Scammers Building Fake Credit Profiles5️⃣ Block Voice Scams Made in Under 5 SecondsLinks: Jeff Scheidel LinkedIn: https://www.linkedin.com/in/jeffscheidel/authID Website: https://www.authid.ai LinkedIn: https://www.linkedin.com/company/authid Twitter: https://twitter.com/authIDai Facebook: https://www.facebook.com/authidai/ Instagram: https://www.instagram.com/authid.ai/ YouTube Channel: https://www.youtube.com/@authID-we-are-digital-identityFintech ConfidentialPodcast: https://fintechconfidential.com/listenNewsletter: https://fintechconfidential.comLinkedIn: https://www.linkedin.com/company/fintechconfidentialX: https://x.com/FTconfidentialInstagram: https://www.instagram.com/fintechconfidentialFacebook: https://www.facebook.com/fintechconfidentialSupportersSkyflow – A zero trust data privacy vault API for secure data collection and compliance: www.skyflowsecure.comSolvpath – AI-powered platform that reduces support tickets and guides users in real time: www.solvpath.comClearingworks – Unified accounts receivable platform for streamlined financial workflows: www.clearingworks.comHawk AI –...

Putting the AP in hAPpy
Episode 332: New Scam Alert – Beware of Inbound Snail Mail Scam

Putting the AP in hAPpy

Play Episode Listen Later Apr 3, 2025 8:15


Fraudsters are using snail mail to deliver scams – watch out for this one reported by the US Postal Inspection Service.  Keep listening.  Check out my website www.debrarrichardson.com if you need help implementing authentication techniques, internal controls, and best practices to prevent fraudulent payments, regulatory fines or bad vendor data. Check out the Vendor Process Training Center for 116+ hours of weekly live and on-demand training for the Vendor team. Links mentioned in the podcast + other helpful resources:  New Scam Alert: Ransomware Scam Letters Training:  Frauds and New Scam Alerts + How To Prevent Them  On-Demand Webinar:  Vendor Validations Recommended for Compliance - Manual vs Automated https://training.debrarrichardson.com/course/june2024-2Customized Vendor Validations Session: https://debrarrichardson.com/vendor-validation-sessionVendor Process Training Center - https://training.debrarrichardson.comCustomized Fraud Training:  https://training.debrarrichardson.com/customized-fraud-training Free Live and On-Demand Webinars: https://training.debrarrichardson.com/webinarsVendor Master File Clean-Up:  https://www.debrarrichardson.com/cleanupYouTube Channel:  https://www.youtube.com/channel/UCqeoffeQu3pSXMV8fUIGNiw More Podcasts/Blogs/Webinars www.debrarrichardson.comMore ideas?  Email me at debra@debrarrichardson.com Music Credit:  www.purple-planet.com

The Social-Engineer Podcast
Ep. 260 - The SE ETC Series - Suffering Through a Romance Scam with Nadja El Fertasi REPLAY

The Social-Engineer Podcast

Play Episode Listen Later Mar 31, 2025 46:02


REPLAY (Original Air Date May 27, 2024) *Please note that this episode contains discussions regarding abuse that some may find disturbing. Welcome to the Social-Engineer Podcast: The SE Etc. Series. This series will be hosted by Chris Hadnagy, CEO of Social-Engineer LLC, and The Innocent Lives Foundation, as well as Social-Engineer.Org and The Institute for Social Engineering. Join Chris as he discusses topics and news pertaining to the world of Social Engineering. Today, Chris is joined by Nadja El Fertasi. Nadja is a leading figure in fostering emotional resilience within the digital age. Her comprehensive expertise spans crisis management, strategic stakeholder communication, and emotional intelligence, creating a unified approach to enhance the human side of digital advancements. Having spent nearly two decades at NATO, including a significant role in the NATO Communications and Information Agency focusing on Digital Transformation & Cybersecurity, Nadja has been a pivotal figure in strategic engagement and communications. This role highlighted her commitment to navigating and leading through the complexities of cybersecurity and digital transformation. With over 15 years dedicated to cybersecurity at NATO, Nadja has emerged as a respected expert in her field. Her contribution to the cybersecurity community was acknowledged in "Hacking Gender Barriers: Europe's Top Cyberwomen," by the Women4Cyber foundation, which recognized her as one of Europe's influential figures in cybersecurity. Today, Nadja is the voice behind the EQ Elevator Podcast, where she assists businesses in cultivating leadership that's resilient and equipped for the digital age's challenges. Her work is dedicated to shaping a safer, more emotionally intelligent digital landscape, where individuals and organizations can thrive amidst technological disruptions. [May 27, 2024]   00:00 - Intro 00:19 - 2024 State of Vishing Report 01:01 - Intro Links -          Social-Engineer.com - http://www.social-engineer.com/ -          Managed Voice Phishing - https://www.social-engineer.com/services/vishing-service/ -          Managed Email Phishing - https://www.social-engineer.com/services/se-phishing-service/ -          Adversarial Simulations - https://www.social-engineer.com/services/social-engineering-penetration-test/ -          Social-Engineer channel on SLACK - https://social-engineering-hq.slack.com/ssb -          CLUTCH - http://www.pro-rock.com/ -          innocentlivesfoundation.org - http://www.innocentlivesfoundation.org/                                                 03:11 - Nadja El Fertasi Intro 05:02 - The Importance of Sharing 07:14 - Romance Scam: Nadja's Story 13:51 - The Other Side 15:59 - The Red Flags 19:13 - A Gift and a Curse 23:22 - Taking Responsibility 25:24 - Love, Not Romance 27:05 - Navigating the Apps 32:28 - Reality Check 37:27 - Being Human 39:39 - Learning From "No" 41:28 - Where to Report 42:25 - Wrap Up 43:58 - Find Nadja El Fertasi Online -          LinkedIn: in/nadja-elfertasi -          Instagram: @nadjafertasi 45:17 - Outro -          www.social-engineer.com -          www.innocentlivesfoundation.org   Find us online -          Chris Hadnagy -          Twitter: @humanhacker -          LinkedIn: linkedin.com/in/christopherhadnagy

Sales vs. Marketing
Lessons - Fixing Human Error in Cybersecurity | Theresa Payton - Former White House CIO

Sales vs. Marketing

Play Episode Listen Later Mar 30, 2025 11:29


➡️ Like The Podcast? Leave A Rating: https://ratethispodcast.com/successstory  In this "Lessons" episode, Theresa Payton, former White House CIO, shares how predictable human behavior creates vulnerabilities in cybersecurity and why conventional defenses often fall short. Learn why routine security measures are exploited by sophisticated social engineering and how designing innovative, personalized protocols can disrupt attackers and strengthen digital defenses. ➡️ Show Linkshttps://successstorypodcast.com  YouTube: https://youtu.be/bH8DwhGUg0cApple: https://podcasts.apple.com/us/podcast/theresa-payton-cybersecurity-expert-author-former-white/id1484783544Spotify: https://open.spotify.com/episode/5DLZKqN89CTRVXW2Hi3Pq5➡️ Watch the Podcast on YouTubehttps://www.youtube.com/c/scottdclary 

Uncommon Sense with Ginny Robinson
Answering Your Questions – My Stalker, RFK Jr.'s Scandal, & Leaked Government Texts

Uncommon Sense with Ginny Robinson

Play Episode Listen Later Mar 30, 2025 44:01


Today, we're going over your questions. You guys had some follow-ups about my stalker, Timothy C., and I'll be giving you a few more details on that situation. We're also unpacking the RFK Jr. sex scandal—what's real, what's spin, and what it all means. Plus, the government's leaked text messages have been making waves, and I'll be breaking down what they reveal and why you should (and shouldn't) care.—https://policecoffee.com/?gad_source=1&gbraid=0AAAAACG7qmI1dmMkruwgp8vA8w0oECKla&gclid=Cj0KCQjwtJ6_BhDWARIsAGanmKfdkRQ1M1sighZQ-PGpEpsCjrZ8fCigidnvH55bfBUNMa56-yoy_A8aAv34EALw_wcB—https://open.spotify.com/episode/7CcmZWvQEaLTQAQRAFy2BQ?si=FgeO4b9QSi-5eB2cqX2XHw

government fbi conspiracies accountability behind the scenes scandals controversy cia fake news conspiracy theories breaking news propaganda hacking censorship free speech misinformation law enforcement surveillance whistleblowers stalker leaked texts nsa national security stalking robert f kennedy jr breaking barriers deep state dark web answering your questions espionage mainstream media secret societies crisis management blackmail court cases power struggles data breach legal system civil liberties social engineering media bias hidden truth legal battle investigative journalism hidden agendas truth seekers cyber threats sex scandals election interference deep web crisis communications crime and punishment data mining ethical dilemmas cyberwarfare intelligence community restraining orders reputation management public perception press freedom surveillance state privacy concerns public trust investigative reporting security breach surveillance capitalism doxxing crisis response internet safety government overreach personal safety public discourse false narratives legal implications information warfare digital privacy digital forensics shadow government government corruption alternative media news coverage political strategy security challenges cyberstalking digital rights intelligence agencies government accountability online harassment public awareness legal defense wiretapping personal protection online bullying media narratives government transparency citizen journalism classified information government oversight phone hacking state secrets political games media control media circus media spin public scrutiny secret recordings government ethics narrative control inside politics mass deception online activism victim advocacy opposition research whistleblower protection journalism ethics online journalism secret agendas watchdog journalism
Scrum Master Toolbox Podcast
AI and Cybersecurity - An Introduction to The Hidden Threats in Our Connected World | Dr. Eric Cole

Scrum Master Toolbox Podcast

Play Episode Listen Later Mar 29, 2025 37:46


BONUS: AI and Cybersecurity - An Introduction to The Hidden Threats in Our Connected World with Dr. Eric Cole In this BONUS episode, we explore the evolving landscape of cybersecurity in the age of artificial intelligence. Dr. Eric Cole, a renowned cybersecurity expert and author of Cyber Crisis: Protecting Your Business from Real Threats in the Virtual World, shares critical insights about how AI is transforming security strategies. From the privacy concerns of our always-connected devices to practical tips for protecting your business and personal information, this conversation offers essential knowledge for navigating our increasingly digital world. The Double-Edged Sword of AI in Cybersecurity "We are giving away our IP, our data, and our privacy. The data set is what gives value to AI." The rise of artificial intelligence presents both opportunities and serious risks in the cybersecurity landscape. Dr. Cole emphasizes that while many focus solely on AI's benefits, we often overlook the fact that we're surrendering vast amounts of our sensitive information, intellectual property, and private data to AI providers. This data becomes the foundation of AI's value and capabilities, creating a significant privacy concern that many organizations fail to properly address. As we embrace these new technologies, we must carefully consider what information we're willing to share and what safeguards should be in place. Modern Attack Vectors: The Human Element "Attacks today are mostly social engineering. We end up having to retrain people to not trust their email." Today's cybersecurity threats have evolved beyond traditional technical exploits to focus primarily on social engineering—manipulating people into compromising their own security. Dr. Cole explains that modern attackers increasingly target the human element, requiring organizations to fundamentally retrain employees to approach communications with healthy skepticism. Particularly concerning are mobile threats, as our phones constantly record audio and other personal data. Dr. Cole warns that "free" apps often come with a hidden price: your privacy and security. Understanding these attack vectors is essential for developing effective defense strategies in both personal and professional contexts. Cybersecurity as a Business Enabler "Security is not a barrier, not an obstacle. Cybersecurity is a business enabler." Dr. Cole challenges the common perception that security measures primarily restrict functionality and impede business operations. Instead, he reframes cybersecurity as a critical business enabler that should be integrated into strategic decision-making. Organizations need to make deliberate decisions about the tradeoffs between security and functionality, understanding that proper security measures protect business continuity and reputation. Dr. Cole particularly warns about supply chain attacks, which have become increasingly prevalent, and emphasizes that awareness is the foundation of any effective protection strategy. He recommends centralizing data for easier security management and advises that client devices should minimize storing sensitive data. Mobile Phones: The Ultimate Tracking Device "You don't go anywhere without your cell phone. Your cell phone is never more than a foot from you it's with you wherever you go... which means if somebody wants to track and monitor you they can." We often worry about theoretical tracking technologies while overlooking the sophisticated tracking device we voluntarily carry everywhere—our mobile phones. Dr. Cole points out the irony that people who would never accept being "chipped" for tracking purposes willingly keep their phones within arm's reach at all times. These devices record our locations, conversations, messages, and activities, creating a comprehensive digital trail of our lives. With access to someone's phone, anyone can trace their movements for months and access an alarming amount of personal information. This risk is compounded when we back up this data to cloud services, effectively giving third parties access to our most sensitive information. Understanding these vulnerabilities is the first step toward more mindful mobile security practices. Business Opportunities in the Security Space "We have too much information, too much data. How can we use that data effectively?" The cybersecurity landscape presents significant business opportunities, particularly in making sense of the overwhelming amount of security data organizations collect. Dr. Cole identifies data correlation and effective data utilization as key investment areas. Modern security systems generate vast quantities of logs and alerts, but transforming this raw information into actionable intelligence remains a challenge. Companies that can develop solutions to effectively analyze, correlate, and extract meaningful insights from security data will find substantial opportunities in the market, helping organizations strengthen their security posture while managing the complexity of modern threats. Essential Training for Security-Conscious Developers "Go for secure coding courses. This helps us understand how software can be exploited." For software developers looking to build more secure applications, Dr. Cole recommends focusing on penetration testing skills and secure coding practices. Understanding how software can be exploited from an attacker's perspective provides invaluable insights for designing more robust systems. By learning the methodologies and techniques used by malicious actors, developers can anticipate potential vulnerabilities and incorporate appropriate safeguards from the beginning of the development process. This proactive approach to security helps create applications that are inherently more resistant to attacks rather than requiring extensive security patches and updates after deployment. About Dr. Eric Cole Dr. Eric Cole is the author of "Cyber Crisis, Protecting Your Business from Real Threats in the Virtual World." He is a renowned cybersecurity expert with over 20 years of experience helping organizations identify vulnerabilities and build robust defense solutions against advanced threats. He has trained over 65,000 professionals worldwide through his best-selling cybersecurity courses and is dedicated to making cyberspace a safe place for all. You can link with Dr. Eric Cole on LinkedIn, or visit his company's website Secure-Anchor.com. 

Putting the AP in hAPpy
Episode 331: Vendor Validations Recommended for Compliance

Putting the AP in hAPpy

Play Episode Listen Later Mar 27, 2025 67:27


Are you performing all required vendor validations to avoid non-compliance fines and penalties? Identify non-compliance risks, and get vendor validation recommendations for regulatory, watchlist,  and electronic payment compliance.Keep listening. Check out my website www.debrarrichardson.com if you need help implementing authentication techniques, internal controls, and best practices to prevent fraudulent payments, regulatory fines or bad vendor data. Check out the Vendor Process Training Center for 116+ hours of weekly live and on-demand training for the Vendor team. Links mentioned in the podcast + other helpful resources:    On-Demand Webinar:  Vendor Validations Recommended for Compliance - Manual vs Automated Customized Vendor Validations Session: https://debrarrichardson.com/vendor-validation-sessionVendor Process Training Center - https://training.debrarrichardson.comCustomized Fraud Training:  https://training.debrarrichardson.com/customized-fraud-training Free Live and On-Demand Webinars: https://training.debrarrichardson.com/webinarsVendor Master File Clean-Up:  https://www.debrarrichardson.com/cleanupYouTube Channel:  https://www.youtube.com/channel/UCqeoffeQu3pSXMV8fUIGNiw More Podcasts/Blogs/Webinars www.debrarrichardson.comMore ideas?  Email me at debra@debrarrichardson.com Music Credit:  www.purple-planet.com

Gents Journey
Unseen Laws of Power: Social Engineering

Gents Journey

Play Episode Listen Later Mar 26, 2025 43:20 Transcription Available


Send us a text"True mastery is found in the details. The way you handle the little things defines the way you handle everything."

The Underclass Podcast
The Morning Dump: "Suicidal Empathy," Mossad's Cybersecurity Startup, Genocidal Intent, & More

The Underclass Podcast

Play Episode Listen Later Mar 24, 2025 113:21


Time Stamps:2:40 - "Suicidal Empathy"7:56 - The Kosher Mafia18:50 - Gad Saad = Mossad Agent?38:30 - Israel Targets Journalists43:27 - Google buys Cybersecurity Company 'Wiz' for $32 Billion1:09:24 - Israel Established New Office Dedicated to Ethnic Cleansing1:18:20 - Genocidal Intent1:22:47 - The Wider Regional ConflictWelcome to The Morning Dump, where we dive headfirst into the deep end of the pool of current events, conspiracy, and everything in between. Join us for a no-holds-barred look at the week's hottest topics, where we flush away the fluff and get straight to the substance.Please consider supporting our work-Austin's Patreon: https://www.patreon.com/c/TheUnderclassPodcastAustin's Spreaker: https://www.spreaker.com/podcast/the-underclass-podcast--6511540Austin's Rumble: https://rumble.com/user/TheUnderclassPodcastAustin's YouTube: https://www.youtube.com/@TheUnderclassPodcastCheck out nadeaushaveco.com today & use code Jose for 10% off your entire order!!!Jose's Patreon- https://www.patreon.com/nowayjose2020 Only costs $2/month and will get you access to episodes earlier than the public Check out TopLobsta's kickass threads- toplobsta.com Use JOSE at checkout for 10% off Get No Way, Jose! merch- https://www.toplobsta.com/pages/no-way-joseNo Way, Jose! Rumble Channel- https://rumble.com/c/c-3379274 No Way, Jose! Odysee Channel- https://odysee.com/@NoWayJose:7?r=JChxx9RMmW9PuL49z3PvTq4sxE2GjJrpNo Way, Jose! YouTube Channel- https://youtube.com/channel/UCzyrpy3eo37eiRTq0cXff0gJose's Podcast Host- https://redcircle.com/shows/no-way-joseApple podcasts- https://podcasts.apple.com/us/podcast/no-way-jose/id1546040443Spotify- https://open.spotify.com/show/0xUIH4pZ0tM1UxARxPe6ThStitcher- https://www.stitcher.com/show/no-way-jose-2Amazon Music- https://music.amazon.com/podcasts/41237e28-c365-491c-9a31-2c6ef874d89d/No-Way-JoseGoogle Podcasts- https://www.google.com/podcasts?feed=aHR0cHM6Ly9mZWVkcy5yZWRjaXJjbGUuY29tL2ZkM2JkYTE3LTg2OTEtNDc5Ny05Mzc2LTc1M2ExZTE4NGQ5Yw%3D%3DRadioPublic- https://radiopublic.com/no-way-jose-6p1BAOVurbl- https://vurbl.com/station/4qHi6pyWP9B/#SuicidalEmpathy #JewishMobInfluence #GadSaadMossad #IsraelTargetsPress #JournalistsUnderFire #GoogleWizDeal #MossadCybersecurity #IsraelEthnicCleansing #NewEthnicCleansingOffice #GenocidalIntent #IntentToDestroy #RegionalConflict #WiderEscalation #MossadStartups #WizAcquisition #SocialContagion #SocialEngineering #SocialContagionPsychologyBecome a supporter of this podcast: https://www.spreaker.com/podcast/the-underclass-podcast--6511540/support.

Uncommon Sense with Ginny Robinson

Today, I'm sharing something deeply personal and serious—my stalker story. For over a year, Timothy C. (we can share his full name soon if need be) has been physically stalking me, and his digital harassment goes back even further. Law enforcement is now involved, but I wanted to update you all in case anything happens to me—so there's no question about who did it. This episode isn't just about my experience; it's also about the reality of stalking, the dangers of obsession, and the importance of taking threats seriously. Stay aware, stay safe, and let's talk about it all, shall we?—https://noblegoldinvestments.com

fear mental health law trauma crime revenge threats empowerment tracking red flags selfhelp cybersecurity true crime social justice self awareness obsessive compulsive disorder lawsuit domestic violence case study hacking law enforcement toxic relationships human trafficking surveillance martial arts gaslighting stalker criminal justice self defense stalking harassment public safety cybercrime identity theft intimidation missing person malware cyberbullying justice system community support defamation true crime podcasts personality disorders blackmail court cases encryption emotional abuse taser risk assessment data protection crime scene emotional resilience media coverage extortion social engineering narcissistic abuse private investigators criminal justice reform personal freedom emergency preparedness trauma recovery background checks healing from trauma situational awareness emergency response cyber threats spyware peeping toms mental resilience revenge porn forensic science criminal charges post traumatic stress legal action restraining orders security policies whistleblowing home security data breaches surveillance state it security federal laws digital literacy mental health resources security cameras security breach forensic psychology psychological warfare doxxing victim blaming criminal defense internet safety threat intelligence personal boundaries pepper spray digital footprint police accountability crime prevention personal safety self protection neighborhood watch witness protection digital security public records news coverage ethical hacking crisis hotline legal protection cyberstalking cyber defense digital rights emotional manipulation threat assessment security tips online harassment emotional distress public awareness internet privacy personal security mobile security protective services gps tracking email security online fraud crime scene investigations identity fraud criminal behavior identity protection forensic investigations onlinepredators behavioral analysis victim support local law enforcement emotional recovery privacy settings detective work legal advocacy criminal profiling criminal intent security awareness training aggressive behavior crime reporting protective gear police reports personal rights digital evidence home protection personal defense social media monitoring relationship abuse victim advocacy whistleblower protection private browsing cyber investigations technology safety
Putting the AP in hAPpy
Episode 330: New Scam Alert: 5 Ways the FBI Says Criminals Steal Checks You Send To Your Vendors

Putting the AP in hAPpy

Play Episode Listen Later Mar 20, 2025 17:20


The FBI issued a Public Service Announcement that check theft via mail is increasing.  See five ways they say criminals are stealing your vendor checks from the mail, and some resources to prevent check fraud. Keep listening. Check out my website www.debrarrichardson.com if you need help implementing authentication techniques, internal controls, and best practices to prevent fraudulent payments, regulatory fines or bad vendor data. Check out the Vendor Process Training Center for 116+ hours of weekly live and on-demand training for the Vendor team. Links mentioned in the podcast + other helpful resources:    On-Demand Webinar:  Avoid Paper Check Fraud When Paying Your Vendors – In 5 StepsNew Scam Alert: FBI Issues PSA On Check FraudVendor Process Training Center - https://training.debrarrichardson.comCustomized Fraud Training:  https://training.debrarrichardson.com/customized-fraud-training Free Live and On-Demand Webinars: https://training.debrarrichardson.com/webinarsVendor Master File Clean-Up:  https://www.debrarrichardson.com/cleanupYouTube Channel:  https://www.youtube.com/channel/UCqeoffeQu3pSXMV8fUIGNiw More Podcasts/Blogs/Webinars www.debrarrichardson.comMore ideas?  Email me at debra@debrarrichardson.com Music Credit:  www.purple-planet.com

Turmeric and Tequila
247. Social Engineering: Chris Hadnagy

Turmeric and Tequila

Play Episode Listen Later Mar 18, 2025 50:28


“Understanding the ways humans make decisions is integral in everything we do from maintaining security to communicating with the people in your life. Social engineering skills, when used properly, can make your life so much better.” – Chris Hadnagy  Welcome back to Turmeric & Tequila with your host, Kristen Olson, where we dive into the delicate balance of disruption and dialogue in pursuit of a better way. In this episode, we're thrilled to have Chris Hadnagy, a distinguished leader in the field of social engineering. Kristen and Chris explore the complexities of human behavior, uncovering the motives behind our actions and the profound influence of ethical social engineering. From Chris's diverse career path to his work in cybersecurity and his nonprofit organization, the Innocent Lives Foundation, this conversation is rich with insights on communication, ethical influence, and the intersection of human connection with modern technology. Tune in as we discuss the importance of emotional intelligence, the evolving landscape of AI, and the ways we can use social engineering practices for the greater good. If you're passionate about understanding and improving human interactions, this episode is a must-listen.   Time Stamps: 00:00 Sponsors Shoutout and Highlights 05:48 Ethical Hacking Framework Development 09:22 Creative Pretexts for Infiltration 11:01 Cybersecurity: Protecting, Educating, Enhancing Lives 14:47 Geolocating Dark Web Exploiters 17:22 Addressing Digital Sextortion Challenges 19:54 Supportive Parenting Through Mistakes 23:09 Instant Gratification's Hidden Costs 28:28 Podcaster on Human Stories & Challenges 30:48 Workshops on Elicitation and Non-verbals 34:12 Parental Safety Advice Scenario 36:28 Apologizing Builds Respect 40:00 AI: A Double-Edged Sword 43:30 Connect with Me on LinkedIn 47:10 Family Over Fortune 49:39 "Life Skills Through Sports"   Chris Hadnagy: Chris Hadnagy is the Founder and CEO of Social-Engineer, LLC. During Chris' 19 years in information security, he created the world's first social engineering framework and newsletter. He has also hosted the first social engineering-based podcast. Chris is the Founder, Executive Director, and Board Member, for the Innocent Lives Foundation, a nonprofit organization that identifies anonymous child predators and helps bring them to justice. Having written five books on social engineering, Chris is also a well-known author. His most recent book, “Human Hacking: Win Friends, Influence People and Leave Them Better Off for Having Met You,” was released January 5, 2021. Chris leads the way in educating people about social engineering. He created the world's first Social Engineering Capture the Flag (SECTF) to raise awareness of this serious threat. Chris is also an Adjunct Professor of Social Engineering for the University of Arizona's NSA designated Center of Academic Excellence in Cyber Operations (CAE-CO). And he also lectures and teaches about social engineering around the globe. Moreover, he was invited to speak at the Pentagon and other high-security facilities. Chris works with some of the world's leaders in scientific research for the purpose of acquiring a deeper understanding of social engineering. Notably, Chris authored a book with Dr. Paul Ekman regarding the use of nonverbal communication by social engineers. Chris is certified as an Offensive Security Certified Professional (OSCP), as well as an Offensive Security Wireless Professional (OSWP). He is also the creator of the Social Engineering Pentest Professional (SEPP), Certified Ethical Social Engineer (CESE), and Master's Level Social Engineering (MLSE), certifications.   Chris' published books include: – Social Engineering: The Art of Human Hacking – Unmasking the Social Engineer: The Human Element of Security – Phishing Dark Waters: The Offensive and Defensive Sides of Malicious E-mails – Social Engineering: The Science of Human Hacking 2nd Edition – Human Hacking: Win Friends, Influence People, and Leave Them Better Off for Having Met You https://www.facebook.com/socialengineerllc/ https://www.instagram.com/socialengineerllc https://www.linkedin.com/in/christopherhadnagy/   Connect with T&T: IG: @TurmericTequila Facebook: @TurmericAndTequila Website: www.TurmericAndTequila.com Host: Kristen Olson IG: @Madonnashero Tik Tok: @Madonnashero Website: www.KOAlliance.com WATCH HERE   MORE LIKE THIS: https://youtu.be/ZCFQSpFoAgI?si=Erg8_2eH8uyEgYZF   https://youtu.be/piCU9JboWuY?si=qLdhFKCGdBzuAeuI https://youtu.be/9Vs2JDzJJXk?si=dpjV31GDqTroUKWH  

Beyond the Paradigm
Ep 95: The Tavistock Institute's Influence - Social Engineering the Masses

Beyond the Paradigm

Play Episode Listen Later Mar 14, 2025 92:43


In this eye-opening episode, I dive deep into the Tavistock Institute – the secretive organization behind some of the most profound shifts in modern society. Founded in the aftermath of World War I, the Tavistock Institute has played a pivotal role in shaping public opinion, social norms, and even political movements through psychological research and mass manipulation techniques. From media influence to behavioral conditioning, discover how Tavistock's methods have quietly shaped the way we think, act, and engage with the world around us. Are we truly thinking for ourselves, or have our thoughts and beliefs been engineered? Tune in as we uncover the hidden hand of social engineering and its far-reaching effects on society.Linksemail:beyondtheparadigm@yahoo.com(2) Beyond the Paradigm - YouTubeinstagram.com/paradigm1979twitter.com/paradigm_79⁠(1) Facebook⁠Support The Showpatreon.com/BeyondTheParadigmbuymeacoffee.com/beyondthep5

Informatics in the Round
That's a Wrap! Celebrating Five Years of Informatics in the Round

Informatics in the Round

Play Episode Listen Later Mar 14, 2025 122:32 Transcription Available


Well, here we are—the final episode of Informatics in the Round (we think!). After five incredible years, 38 episodes, and thousands of listeners, we've decided it's time to wrap up this journey. But first, we're taking a minute (or maybe two hours) to reflect on this wild ride—and we've brought some people you might recognize! In this episode, we pull some clips from the archive to help us look back at our best moments, favorite topics, and silliest slip-ups over the years. We take you through our “Top 5” topics that we loved to talk about the most: electronic health records, patient privacy, public health, health equity, and AI. We will also share some stories you didn't hear (like that time we forgot to hit records—oops), how the pandemic reshaped our personal and professional lives, and the lessons that will stick with us. To lead us through our Top 5, we invited back some of our favorite guests to reflect and discuss the future of the field:  Dr. Yaa Kumah-Crystal, MD, MPH, MS, is an Associate Professor of Biomedical Informatics and Pediatric Endocrinology at Vanderbilt University Medical Center whose research focuses on documentation in healthcare communication. Dr. Ellen Wright Clayton, JD, MD, is a professor of Pediatrics, Law, and Health Policy at Vanderbilt University Law School and Vanderbilt University Medical Center. Her research focuses on the ethical, legal, and social implications of genomics research. Dr. Melissa McPheeters, PhD, MPH, is the Senior Director for Analytics at RTI International, as well as an esteemed epidemiologist and public health informatician. Her work focuses on building interdisciplinary teams to address complex problems across health, public health, and data modernization processes. Dr. Consuelo H. Wilkins, MD, is the Senior Vice President and Senior Associate Dean of Health Equity at Vanderbilt University Medical Center and the Associate Director of the Vanderbilt Institute for Clinical and Translational Research. Her work attempts to bring together community stakeholders and create collaboration initiatives to improve community health and biomedical research. Dr. Chris Callison-Burch, PhD, MS, is a Professor of Computer and Information Science at the University of Pennsylvania. His research focuses on natural language processing and generative AI. So, is this really goodbye? Maybe, maybe not. We can never sit still for long. But for now, let's raise a glass, share a few laughs, and remember the good ol' times! We can't leave without saying thank you to all of you for being part of the ride, for listening to us on your jog or your commute, and for engaging critically with all we've had to say. It's been an honor. Thank you to all the guests who have joined us throughout the last five years. Thank you for contributing your expertise, your lived experiences, and your unfiltered thoughts. Thank you to the musicians who bravely stepped into conversations about topics they knew little about and for offering up their questions. You ensured we spoke to everyone, and your music said the rest of what our words couldn't convey. To all our guests, your generosity with your time and your knowledge is what made this podcast what it was. Our mission was always to make informatics intelligible so that you and all your friends and family can engage confidently with the topic. We hope you now have the language to feel empowered navigating this crazy, awesome, flawed, fascinating healthcare system.  For now, this is Kevin Johnson, Harris Bland, and Ellie Shuert signing off! Mentioned in the episode: -Hidden Brain podcast -Scott Scovill and Moo TV, plus his appearance on episode 4: “Automated Resilience: Biomedical Informatics as a Safety Net for Life” -Nancy Lorenzi in “Informatics and Anti-Black Racism: What We Need to Do” (Jun. 2020) -Trent Rosenbloom in “21st Century Cures: Curing our Anxiety or Causing It?” (May 2021) -Hey Epic! -Brad Malin in “Data Privacy: Possible, Impossible, or Somewhere In Between?” (Aug. 2020) -Moore v. Regents of the University of California (1990) -”Learning Health Care and the Obligation to Participate in Research” by Ruth R. Faden and Nancy E. Kass (Hastings Center Report) -”The Right to Privacy” by Samuel D. Warren II and Louis Brandeis (Harvard Law Review) -Revenge of the Tipping Point: Overstories, Superspreaders, and the Rise of Social Engineering by Malcolm Gladwell -Colin Walsh in “COVID and the Hidden Data Gap” (Feb. 2021) -Bryant Thomas Karras in “Get Your Dose of Data! An Introduction to Public Health Informatics” (Jul. 2024) STE and public health highway? -Consuelo Wilkins in “Clinical Trials: Are We Whitewashing the Data?” (Nov. 2023) -Where Do We Go from Here: Chaos or Community? by Martin Luther King Jr. -Michael Matheny and Tom Lasko in “AI and Medicine: The Slippery Slope to an Uncertain Future” (Feb. 2020) -Lyle Ungar and Angela Bradbury in “Chatbots in Healthcare: The Ultimate Turing Test” (Aug. 2024) -“A Textbook Remedy for Domain Shifts: Knowledge Priors for Medical Image Analysis” by Yue Yang, Mona Gandhi, Yufei Wang, Yifan Wu, Michael S. Yao, Chris Callison-Burch, James C. Gee, Mark Yatskar (NeurIPS) -Google DeepMind -OpenAI's Deep Research -The Thinking Game (2024) dir. by Greg Kohs -“Dolly the Sheep: A Cautionary Tale” by Robin Feldman and Vern Norviel (Yale Journal of Law & Technology) -Who, Me? Children's book series -The Influencers Substack Follow our social media platforms to stay up to date on our new projects!

Putting the AP in hAPpy
Episode 329: More Important Than Phishing Tests – Test Controls in Your Vendor Remittance Change Process

Putting the AP in hAPpy

Play Episode Listen Later Mar 13, 2025 23:39


We are all familiar with phishing tests to test our ability to identify a fraudulent email – but what about a test to see if a fraudulent vendor request to change vendor remittance details can be leaked or changed?  Keep listening.  Check out my website www.debrarrichardson.com if you need help implementing authentication techniques, internal controls, and best practices to prevent fraudulent payments, regulatory fines or bad vendor data. Check out the Vendor Process Training Center for 116+ hours of weekly live and on-demand training for the Vendor team.  Links mentioned in the podcast + other helpful resources:    Free Training Sessions: https://training.debrarrichardson.com/free-training-sessions Plug Up the Gaps in Your Vendor Process to Avoid fraud, Fines and Bad Vendor DataAuthentication (Includes a Free Authentication Reference Template)Pressure Testing 101: How to Stress-Test AP Fraud Controls: https://www.iofm.com/ap/whitepapers/pressure-testing-101-how-to-stress-test-ap-fraud-controls Vendor Process Training Center - https://training.debrarrichardson.comCustomized Fraud Training:  https://training.debrarrichardson.com/customized-fraud-training Free Live and On-Demand Webinars: https://training.debrarrichardson.com/webinarsVendor Master File Clean-Up:  https://www.debrarrichardson.com/cleanupYouTube Channel:  https://www.youtube.com/channel/UCqeoffeQu3pSXMV8fUIGNiw More Podcasts/Blogs/Webinars www.debrarrichardson.comMore ideas?  Email me at debra@debrarrichardson.com Music Credit:  www.purple-planet.com

The
Self-Bitcoinization: A Philosophy of Bitcoin with Noah Kaufman (WiM561)

The "What is Money?" Show

Play Episode Listen Later Mar 11, 2025 212:51


// GUEST //X: https://x.com/noahkaufmanmdInstagram: https://www.instagram.com/noahkaufmanmdWebsite: https://selfbitcoinization.com/ // SPONSORS //The Farm at Okefenokee: https://okefarm.com/iCoin: https://icointechnology.com/breedloveHeart and Soil Supplements (use discount code BREEDLOVE): https://heartandsoil.co/In Wolf's Clothing: https://wolfnyc.com/Blockware Solutions: https://mining.blockwaresolutions.com/breedloveOn Ramp: https://onrampbitcoin.com/?grsf=breedloveMindlab Pro: https://www.mindlabpro.com/breedloveCoinbits: https://coinbits.app/breedlove // PRODUCTS I ENDORSE //Protect your mobile phone from SIM swap attacks: https://www.efani.com/breedloveNoble Protein (discount code BREEDLOVE for 15% off): https://nobleorigins.com/Lineage Provisions (use discount code BREEDLOVE): https://lineageprovisions.com/?ref=breedlove_22Colorado Craft Beef (use discount code BREEDLOVE): https://coloradocraftbeef.com/ // SUBSCRIBE TO THE CLIPS CHANNEL //https://www.youtube.com/@robertbreedloveclips2996/videos // OUTLINE //0:00 - WiM Episode Trailer1:04 - Myers-Briggs Personality Type of Bitcoiners7:28 - Bitcoin as a Moral Force for Good16:13 - Human Evolution and Monetary Evolution23:24 - Technology's Effect on Purpose and Self-Actualization28:34 - The Farm at Okefenokee30:00 - iCoin Bitcoin Wallet31:30 - Economic Progress and Maslow's Hierarchy of Needs39:25 - Broken Money and Moral Corruption of the Healthcare System47:40 - Bitcoin as an Organism53:54 - Privacy is an Aspect of Freedom56:18 - Heart and Soil Supplements57:18 - Helping Lightning Startups with In Wolf's Clothing58:10 - Life Reversing the Flow of Entropy1:10:30 - The Death of Money and Importance of Energy1:25:21 - The Connection Between the Monetary Standard and the Moral Standard1:30:52 - Mine Bitcoin with Blockware Solutions1:32:15 - OnRamp Bitcoin Custody1:34:11 -  The Connection Between the Monetary Standard and the Moral Standard (contd)1:46:11 - The Complexity of Applied Morality1:56:38 - Shitcoins and Continued Bitcoin Education2:01:41 - Mind Lab Pro Supplements2:02:52 - Buy Bitcoin with Coinbits2:04:02 - The Bridge Between the Fiat to Bitcoin Paradigms2:38:20 - The End of an Inflationary Monetary System2:42:20 - An Intellectual Gold Rush and New PhDs2:47:09 - Managing the Ego for Learning2:56:55 - Bitcoin as a Moral Imperative3:00:58 - Bitcoin is More American than the Constitution3:04:05 - Dealing with Toxic Maximalism3:06:33 - Remedying Corruption in Medicine and Money3:16:45 - Aligning the Incentives of the Individual and the Collective3:25:30 - The Altcoin Market as a Bitcoin Testnet3:30:56 - How to Connect with Noah // PODCAST //Podcast Website: https://whatismoneypodcast.com/Apple Podcast: https://podcasts.apple.com/us/podcast/the-what-is-money-show/id1541404400Spotify: https://open.spotify.com/show/25LPvm8EewBGyfQQ1abIsERSS Feed: https://feeds.simplecast.com/MLdpYXYI // SUPPORT THIS CHANNEL //Bitcoin: 3D1gfxKZKMtfWaD1bkwiR6JsDzu6e9bZQ7Sats via Strike: https://strike.me/breedlove22Dollars via Paypal: https://www.paypal.com/paypalme/RBreedloveDollars via Venmo: https://account.venmo.com/u/Robert-Breedlove-2 // SOCIAL //Breedlove X: https://x.com/Breedlove22WiM? X: https://x.com/WhatisMoneyShowLinkedin: https://www.linkedin.com/in/breedlove22/Instagram: https://www.instagram.com/breedlove_22/TikTok: https://www.tiktok.com/@breedlove22Substack: https://breedlove22.substack.com/All My Current Work: https://linktr.ee/robertbreedlove

The Underclass Podcast
The Catcher in the Rye w/ William Ramsey Investigates

The Underclass Podcast

Play Episode Listen Later Mar 10, 2025 101:14


This week, we're joined by the great William Ramsey of 'William Ramsey Investigates' to discuss the controversial novel written by J.D. Salinger known as 'The Catcher in the Rye'...Join us at the intersection of culture creation, social engineering, behavioral modification, and pop culture symbolism in our effort to peel back these complicated layers of deceit imbued with sophisticated methods of mind control and psychological warfare techniques.Please consider supporting our work-https://www.spreaker.com/podcast/william-ramsey-investigates--1898073https://www.patreon.com/williamramseyinvestigateshttps://www.williamramseyinvestigates.com/https://www.patreon.com/c/TheUnderclassPodcasthttps://www.spreaker.com/podcast/the-underclass-podcast--6511540https://www.youtube.com/@TheUnderclassPodcasthttps://rumble.com/user/TheUnderclassPodcast#CatcherInTheRye #CultureCreation #SocialEngineering #BehavioralModification #PopCultureSymbolism #HypnoProgrammed #ManchurianCandidates #MindControlPatsy #TedKaczynski #LuigiMangione #RyanRouth #SirhanSirhan #MarkDavidChapman #JohnHinckleyJr #CharlesManson #PsychologicalWarfare #HoldenCaulfield #SalingerUnraveled #LiteraryMindGames #ControlThroughArtBecome a supporter of this podcast: https://www.spreaker.com/podcast/the-underclass-podcast--6511540/support.

The Frictionless Experience
Coffee, Convenience and Conversion: Reducing Friction on Mobile Ordering Apps with Adam Candela (ex-Dunkin', Staples)

The Frictionless Experience

Play Episode Listen Later Mar 10, 2025 41:52


What if creating frictionless digital experiences isn't just about making things easier, but finding the perfect balance between ease and profitability?Join hosts Chuck Moxley and Nick Paladino as they talk with Adam Candela, former Director of Digital Retail and Digital Marketing at Dunkin' Brands. With over 25 years of digital experience including roles at BJ's Wholesale Club and Staples, Adam shares insights on balancing frictionless experiences with business objectives, building effective digital teams, and avoiding the pitfalls of over-automation.Lessons from this episode:1. Balance customer convenience with profitability by maintaining strategic friction points that create opportunities for additional value and sales.2. Encourage innovation within teams by practicing humility as a leader and creating safe spaces for all team members to contribute ideas.3. When implementing digital initiatives, focus first on solving the right problem rather than rushing to quick solutions that might miss the mark with customers.Want more tips and strategies to create frictionless user experiences? Subscribe to our newsletter!https://www.thefrictionlessexperience.com/frictionless—Adam's LinkedIn: https://www.linkedin.com/in/adamcandela/Chuck's LinkedIn: https://www.linkedin.com/in/chuckmoxley/Nick's LinkedIn: https://www.linkedin.com/in/npaladino/Chapters:(00:00) Introduction(02:15) Defining Frictionless Digital Experiences(04:45) Challenges of Order-Ahead Technology(07:15) Balancing Convenience with Business Needs(08:45) Location-Based Notifications and Personalization(12:15) Social Engineering in Digital Design(15:45) When Frictionless Hurts Profitability(21:15) Balancing Automation and Personalization(27:00) Internal Friction and Team Dynamics(32:00) Avoiding the "Hippo" Effect in Meetings(35:00) Common Misconceptions About Digital Experiences(38:30) Conclusion

Putting the AP in hAPpy
Episode 328: Vendor Remittance Information = 3 Confirmation Calls

Putting the AP in hAPpy

Play Episode Listen Later Mar 6, 2025 15:00


If you still receive vendor supporting documentation via email and process vendor adds and changes manually - this topic is for you, though, it may surprise some of you since I routinely say that confirmation calls are not the silver bullet to avoid fraud.  What can 3 confirmation calls do?   Keep listening.  Check out my website www.debrarrichardson.com if you need help implementing authentication techniques, internal controls, and best practices to prevent fraudulent payments, regulatory fines or bad vendor data. Check out the Vendor Process Training Center for 116+ hours of weekly live and on-demand training for the Vendor team. Links mentioned in the podcast + other helpful resources:     Vendor Master File Tip of the Week > New Best Practice To Avoid Fraud When Making That Confirmation Call:  https://youtu.be/4Yv_D2hv76E Vendor Process Training Center - https://training.debrarrichardson.comCustomized Fraud Training:  https://training.debrarrichardson.com/customized-fraud-training Free Live and On-Demand Webinars: https://training.debrarrichardson.com/webinarsVendor Master File Clean-Up:  https://www.debrarrichardson.com/cleanupYouTube Channel:  https://www.youtube.com/channel/UCqeoffeQu3pSXMV8fUIGNiw More Podcasts/Blogs/Webinars www.debrarrichardson.comMore ideas?  Email me at debra@debrarrichardson.com Music Credit:  www.purple-planet.com

ITSPmagazine | Technology. Cybersecurity. Society
AI, Cybersecurity, and the High-Stakes Risks in Healthcare | A HIMSS 2025 Conversation with Lee Kim | On Location Coverage with Sean Martin and Marco Ciappelli

ITSPmagazine | Technology. Cybersecurity. Society

Play Episode Listen Later Mar 3, 2025 28:18


The intersection of cybersecurity and healthcare is more critical than ever, as technology continues to shape the way patient care is delivered. At HIMSS 2025 in Las Vegas, we sat down with Lee Kim, Senior Principal of Cybersecurity and Privacy at HIMSS, to discuss the pressing security challenges facing healthcare organizations, the role of artificial intelligence, and the balance between innovation and risk.AI in Healthcare: Promise and PerilArtificial intelligence is rapidly being adopted across the healthcare sector, yet many organizations still lack structured governance around its use. Kim highlights the “wild west” nature of AI adoption, where policies are either non-existent or underdeveloped, creating risks related to privacy, data security, and patient outcomes. While AI-powered diagnostic tools, like those used in radiology, have the potential to improve patient care by identifying critical conditions early, blind trust in AI-generated results presents serious risks. Without proper oversight, reliance on AI could lead to incorrect medical decisions, putting patient safety in jeopardy.Cybersecurity Gaps in Healthcare OrganizationsOne of the biggest concerns in healthcare cybersecurity is the over-reliance on security tools without a clear strategy. Many organizations invest in the latest technology but neglect foundational security practices, such as governance, policy development, and staff training. Kim points out that less than half of cybersecurity budgets are allocated to governance, leading to disorganized security programs.Another persistent challenge is the human factor. Social engineering and phishing attacks remain the top attack vectors, exploiting the inherent culture of healthcare professionals who are trained to help and trust others. Organizations must focus on proactive security measures, such as regular training and simulated attacks, to reduce human error and strengthen defenses.The Financial and Operational RealityBudget constraints continue to be a challenge, particularly for smaller hospitals and community healthcare providers. While larger organizations may have more resources, cybersecurity spending often focuses on acquiring new tools rather than optimizing existing defenses. Kim stresses the importance of a balanced approach—investing in both technology and governance to ensure long-term resilience.Another concern is the increasing dependence on third-party services and cloud-based AI tools. If these services become too expensive or go offline, healthcare organizations may face operational disruptions. The lack of contingency planning, such as backup vendors or alternative systems, leaves many institutions vulnerable to supply chain risks.Building a More Resilient Healthcare Security ModelAs technology continues to drive innovation in healthcare, organizations must adopt a proactive cybersecurity stance. Business impact analyses, vendor risk assessments, and tabletop exercises should be standard practice to prepare for disruptions. Kim also raises the idea of cyber mutual aid—a model similar to emergency medical mutual aid, where healthcare organizations collaborate to support each other in times of crisis.HIMSS 2025 provides a forum for these critical conversations, bringing together global healthcare leaders to share insights, challenges, and solutions. For those interested in diving deeper, the HIMSS Cybersecurity Survey is available online, offering a comprehensive look at the current state of healthcare security.To hear the full discussion on these topics and more, listen to the episode featuring Lee Kim, Sean Martin, and Marco Ciappelli from HIMSS 2025 On Location.Guest: Lee Kim, Senior Principal of Cybersecurity and Privacy at HIMSS | On LinkedIn: https://www.linkedin.com/in/leekim/Hosts:Sean Martin, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining CyberSecurity Podcast [@RedefiningCyber] | On ITSPmagazine:  https://www.itspmagazine.com/sean-martinMarco Ciappelli, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining Society Podcast & Audio Signals Podcast | On ITSPmagazine: https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli____________________________This Episode's SponsorsHITRUST: https://itspm.ag/itsphitweb____________________________ResourcesLearn more and catch more stories from HIMSS 2025 coverage: https://www.itspmagazine.com/himss-2025-health-technology-and-cybersecurity-event-coverage-las-vegasHIMSS 2024 Cybersecurity Report: https://www.himss.org/resources/himss-healthcare-cybersecurity-survey/____________________________Catch all of our event coverage: https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverageTo see and hear more Redefining CyberSecurity content on ITSPmagazine, visit: https://www.itspmagazine.com/redefining-cybersecurity-podcastTo see and hear more Redefining Society stories on ITSPmagazine, visit:https://www.itspmagazine.com/redefining-society-podcastWant to tell your Brand Story Briefing as part of our event coverage? Learn More

The
Brian Dixon

The "What is Money?" Show

Play Episode Listen Later Feb 28, 2025 194:38


// GUEST //Off the Chain Capital: ⁠https://offthechain.capital/⁠X: ⁠https://x.com/briandixon06?lang=en⁠LinkedIn: ⁠https://www.linkedin.com/in/briandixon06⁠ // SPONSORS //The Farm at Okefenokee: ⁠https://okefarm.com/⁠Heart and Soil Supplements (use discount code BREEDLOVE): ⁠https://heartandsoil.co/⁠In Wolf's Clothing: ⁠https://wolfnyc.com/⁠Blockware Solutions: ⁠https://mining.blockwaresolutions.com/breedlove⁠NetSuite: ⁠https://netsuite.com/whatismoney⁠On Ramp: ⁠https://onrampbitcoin.com/?grsf=breedlove⁠Mindlab Pro: ⁠https://www.mindlabpro.com/breedlove⁠Coinbits: ⁠https://coinbits.app/breedlove⁠ // PRODUCTS I ENDORSE //Protect your mobile phone from SIM swap attacks: ⁠https://www.efani.com/breedlove⁠Noble Protein (discount code BREEDLOVE for 15% off): ⁠https://nobleorigins.com/⁠Lineage Provisions (use discount code BREEDLOVE): ⁠https://lineageprovisions.com/?ref=breedlove_22⁠Colorado Craft Beef (use discount code BREEDLOVE): ⁠https://coloradocraftbeef.com/⁠ // SUBSCRIBE TO THE CLIPS CHANNEL //⁠https://www.youtube.com/@robertbreedloveclips2996/videos⁠ // OUTLINE //0:00 - WiM Episode Trailer1:39 - Brian Dixon's Near-Death Experience8:00 - Law School and Discovering Bitcoin14:27 - How Brian Met His Wife16:38 - From Law to Entrepreneurship23:21 - Early Bitcoin Education26:13 - The Farm at Okefenokee27:33 - Heart and Soil Supplements28:32 - Off the Chain Investment Strategy33:44 - Human Consciousness and the Philosophy of Bitcoin41:43 - Bitcoin's Connection to Spirituality and Religion48:21 - Politics, Money, and Religion54:30 - Seen vs. Unseen Realm1:01:43 - Helping Lightning Startups with In Wolf's Clothing1:02:37 - Mine Bitcoin with Blockware Solutions1:03:59 - What Is Reality?1:14:06 - Balance, Love, and the Imitation of Christ1:24:11 - On-Ramp Bitcoin Custody1:26:07 - NetSuite: Business Software1:27:25 - Ancient Egypt and Related Mysteries1:45:55 - MindLab Pro Supplements1:47:07 - Buy Bitcoin with Coinbits1:48:35 - Past Life Readings1:53:30 - Dreams, DMT, and Astrology2:02:19 - Ancient & Secret Technology and UFOs2:13:03 - Electromagnetism and the Pyramids2:16:20 - Connections Between Physiology, Psychology, and Spirituality2:21:17 - Free Will vs. Determinism2:29:39 - Brian's Health and Fitness Protocol2:40:22 - Nutrient-Rich Food and The Farm at Okefenokee2:44:31 - The Simplest Answer Is the Best Answer2:46:00 - The Future of Technology and Societal Control2:55:15 - Censorship and the Effects of AI on Communication3:01:30 - Social Engineering and De-Population Theories3:09:12 - What's Next for Brian Dixon3:12:19 - Where to Find Brian & Closing Thoughts // PODCAST //Podcast Website: ⁠https://whatismoneypodcast.com/⁠Apple Podcast: ⁠https://podcasts.apple.com/us/podcast/the-what-is-money-show/id1541404400⁠Spotify: ⁠https://open.spotify.com/show/25LPvm8EewBGyfQQ1abIsE⁠RSS Feed: ⁠https://feeds.simplecast.com/MLdpYXYI⁠ // SUPPORT THIS CHANNEL //Bitcoin: 3D1gfxKZKMtfWaD1bkwiR6JsDzu6e9bZQ7Sats via Strike: ⁠https://strike.me/breedlove22⁠Dollars via Paypal: ⁠https://www.paypal.com/paypalme/RBreedlove⁠Dollars via Venmo: ⁠https://account.venmo.com/u/Robert-Breedlove-2⁠ // SOCIAL //Breedlove X: ⁠https://x.com/Breedlove22⁠WiM? X: ⁠https://x.com/WhatisMoneyShow⁠Linkedin: ⁠https://www.linkedin.com/in/breedlove22/⁠Instagram: ⁠https://www.instagram.com/breedlove_22/⁠TikTok: ⁠https://www.tiktok.com/@breedlove22⁠Substack: ⁠https://breedlove22.substack.com/⁠All My Current Work: ⁠https://linktr.ee/robertbreedlove

Fringe Radio Network
PsyOp 101: How to Detect Them and Not be Fooled - NWCZ Radio's Down The Rabbit Hole

Fringe Radio Network

Play Episode Listen Later Feb 27, 2025 55:06


Several listeners have requested we explain what psyops and their characteristics look like. How to detect them, how to recognize them and how to avoid being caught up in them. Today we look at the ins and outs of psyops and get to the bottom of what is going on.Email us at: downtherh@protonmail.com

The Blind Mike Project
SOCIAL ENGINEERING

The Blind Mike Project

Play Episode Listen Later Feb 24, 2025 234:41


7:12 TOM MYERS PITS WATP VS BMP35:09 BERT KREISHCER AND MARC MARON MAKE FRIENDS56:53 ROAST BATTLE - DONNELL RAWLINGS CRASHOUT1:24:06 CUMIA PUTS OPIE IN HIS PLACE2:07:16 OWEN BENJAMIN GOES AT SHANE GILLIS2:38:56 GOAL TIME WITH STEEL TOEFOR ALL THINGS BLIND MIKEhttp://blindmike.netFOR ALL THINGS CRAIGGERShttp://www.verygoodshow.orgFOR ALL THINGS HACKRIDEhttp://hackridethedemon.comFOR ALL THINGS DJ ELECTRA FRYhttp://djelectrafry.com

Motley Fool Money
Malcolm Gladwell, Social Engineering and The Magic Third

Motley Fool Money

Play Episode Listen Later Feb 22, 2025 36:21


If you haven't changed your mind on anything in the past two decades, you should reconsider your beliefs. Malcolm Gladwell's latest book is Revenge of the Tipping Point: Overstories, Superspreaders, and the Rise of Social Engineering and he is the host of the podcast Revisionist History. Dylan Lewis caught up with Gladwell for a conversation about: - How social engineering effects your life. - Why real diversity can prevent leaders from doing stupid things. - The demand to return to more in-person experiences. Host: Dylan Lewis Guest: Malcolm Gladwell Producer:Ricky Mulvey Engineer: Rick Engdahl Learn more about your ad choices. Visit megaphone.fm/adchoices

Tim Pool Daily Show
Elon's DOGE EXPOSES US Funding Liberal Press MASS SOCIAL ENGINEERING, Trump FURIOUS

Tim Pool Daily Show

Play Episode Listen Later Feb 13, 2025 146:40


The Green Room - https://rumble.com/playlists/aa56qw_g-j0 BUY CAST BREW COFFEE TO FIGHT BACK - https://castbrew.com/ Join The Discord Server - https://timcast.com/join-us/ Hang Out With Tim Pool & Crew LIVE At - http://Youtube.com/TimcastIRL Elon's DOGE EXPOSES US Funding Liberal Press MASS SOCIAL ENGINEERING, Trump FURIOUS | Timcast LIVE Learn more about your ad choices. Visit megaphone.fm/adchoices

SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast
SANS Stormcast Feb 13th 2025: Smart City Threats; Advanced Social Engineering Attacks; Wazuh Vulnerability; PAM Vulnerability; Ivanti Patches

SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast

Play Episode Listen Later Feb 13, 2025 5:58


An Ontology for Threats: Cybercrime and Digital Forensic Investigation on Smart City Infrastructure Smart cities is a big topic for many local governments. With building these complex systems, attacks will follow. https://isc.sans.edu/diary/An%20ontology%20for%20threats%2C%20cybercrime%20and%20digital%20forensic%20investigation%20on%20Smart%20City%20Infrastructure/31676 North Korean state actor tricking admins into executing PowerShell North Korean state actors are spending quite a bit of effort setting up relationships with South Korean system administrators, culminating in them getting tricked into executing malicious PowerShell scripts. https://x.com/MsftSecIntel/status/1889407814604296490 Wazuh Vulnerability A deserialization vulnerability in Wazuh may lead to an unauthenticated remote code execution vulnerability https://github.com/wazuh/wazuh/security/advisories/GHSA-hcrc-79hj-m3qh PAM PKCS11 Vulnerablity Several vulnerabilities in the Linux PAM module processing smart card authentication can be used to bypass authentication https://github.com/OpenSC/pam_pkcs11/releases/tag/pam_pkcs11-0.6.13 Ivanti Patches Ivanti released its monhtly update, fixing a number of critical vulnerabilities in Connect Secure and other prodcuts https://forums.ivanti.com/s/article/February-Security-Advisory-Ivanti-Connect-Secure-ICS-Ivanti-Policy-Secure-IPS-and-Ivanti-Secure-Access-Client-ISAC-Multiple-CVEs?language=en_US