POPULARITY
Categories
Afraid of the IRS penalties and interest for no filing, late filing or corrections for reportable vendors? That's nothing compared to the fines for two other organizations that can also hit your company with compliance fines. What are they?Keep Listening. Check out my website www.debrarrichardson.com if you need help implementing authentication techniques, internal controls, and best practices to prevent fraudulent payments, regulatory fines or bad vendor data. Check out my new Vendor Process Training Center for 149+ hours of weekly live and on-demand training for the Vendor team. Subscribe today to be entered in the subscriber-only monthly drawing to win a free Putting the AP in hAPpy Coffee Mug. Links mentioned in the podcast: OFAC: Office of Foreign Assets Control (OFAC)OFAC: Penalty ChartOFAC: FAQ > If There is a MatchNacha: Nacha OrgVendor Validation Reference List with Resources Links: www.debrarrichardson.com/vendor-validation-download (Get 25% Discount on the Global Vendor Registration Numbers)Vendor Master File Clean-Up: https://www.debrarrichardson.com/cleanupYouTube Channel: https://www.youtube.com/channel/UCqeoffeQu3pSXMV8fUIGNiw More Podcasts/Blogs/Webinars www.debrarrichardson.comMore ideas? Email me at debra@debrarrichardson.com Music Credit: www.purple-planet.com
Our Non-US counterparts still look at US businesses and wonder why we still write paper checks. It's no secret that checks cost more to produce than say, ACH payments. So why are US companies still writing paper checks?Keep listening. Check out my website www.debrarrichardson.com if you need help implementing authentication techniques, internal controls, and best practices to prevent fraudulent payments, regulatory fines or bad vendor data. Check out my new Vendor Process Training Center for 149+ hours of weekly live and on-demand training for the Vendor team. Subscribe today to be entered in the subscriber-only monthly drawing to win a free Putting the AP in hAPpy Coffee Mug. Links mentioned in the podcast: Vendor Validation Reference List with Resources Links: www.debrarrichardson.com/vendor-validation-download (Get 25% Discount on the Global Vendor Registration Numbers)Vendor Master File Clean-Up: https://www.debrarrichardson.com/cleanupYouTube Channel: https://www.youtube.com/channel/UCqeoffeQu3pSXMV8fUIGNiw More Podcasts/Blogs/Webinars www.debrarrichardson.comMore ideas? Email me at debra@debrarrichardson.com Music Credit: www.purple-planet.com
I love going to and speaking at Accounts Payable in-person conferences, I educate many – but I also learn a lot. Today I have 3 tips I learned from practitioners to avoid making a fraudulent payment. Keep listening.Check out my website www.debrarrichardson.com if you need help implementing authentication techniques, internal controls, and best practices to prevent fraudulent payments, regulatory fines or bad vendor data. Check out my new Vendor Process Training Center for 149+ hours of weekly live and on-demand training for the Vendor team. Subscribe today to be entered in the subscriber-only monthly drawing to win a free Putting the AP in hAPpy Coffee Mug. Links mentioned in the podcast: Vendor Validation Reference List with Resources Links: www.debrarrichardson.com/vendor-validation-download (Get 25% Discount on the Global Vendor Registration Numbers)Vendor Master File Clean-Up: https://www.debrarrichardson.com/cleanupYouTube Channel: https://www.youtube.com/channel/UCqeoffeQu3pSXMV8fUIGNiw More Podcasts/Blogs/Webinars www.debrarrichardson.comMore ideas? Email me at debra@debrarrichardson.com Music Credit: www.purple-planet.com
Welcome to the Social-Engineer Podcast: The SE Etc. Series. This series will be hosted by Chris Hadnagy, CEO of Social-Engineer LLC, and The Innocent Lives Foundation, as well as Social-Engineer.Org and The Institute for Social Engineering. Chris will be joined by his co-host Patrick Laverty as they discuss topics pertaining to the world of Social Engineering. [May 22, 2023] 00:00 - Intro 00:18 - Patrick Laverty Intro 00:58 - Intro Links - Social-Engineer.com - http://www.social-engineer.com/ - Managed Voice Phishing - https://www.social-engineer.com/services/vishing-service/ - Managed Email Phishing - https://www.social-engineer.com/services/se-phishing-service/ - Adversarial Simulations - https://www.social-engineer.com/services/social-engineering-penetration-test/ - Social-Engineer channel on SLACK - https://social-engineering-hq.slack.com/ssb - CLUTCH - http://www.pro-rock.com/ - innocentlivesfoundation.org - http://www.innocentlivesfoundation.org/ 08:58 - Todays Topic: Human Hacking Book Discussion 13:52 - From "Tech" to "Storytelling" 18:51 - Experience Not Required 22:02 - The Importance of Knowing Yourself 25:43 - A Foundation in Communication 29:04 - Principles of Influence 31:32 - Leveling the Playing Field 35:35 - Elicitation Breakdown 40:22 - Understanding the Baseline 44:31 - Dress for the Job (You're Pretending to Have) 48:00 - The Forgotten Resources 49:39 - Wrap Up & Outro - www.social-engineer.com - www.innocentlivesfoundation.org Find us online - Chris Hadnagy - Twitter: @humanhacker - LinkedIn: linkedin.com/in/christopherhadnagy - Patrick Laverty - Twitter: @plaverty9 - LinkedIn: linkedin.com/in/plaverty9
Patreon -- https://www.patreon.com/DuhHeads@duhheads @izzyngriffin @pre_l0rd Jimmy Donaldson (born May 7, 1998), better known as MrBeast, is an American YouTuber and philanthropist. He is credited with pioneering a genre of YouTube videos that centers on expensive stunts.[5] With over 150 million subscribers as of May 2023,[6] his main YouTube channel ranks as the fourth-most-subscribed on the platform, with many[7][8] considering it to be the most-subscribed channel whose owner is an individual.[note 2]Donaldson grew up in a middle-class household in Greenville, North Carolina.[9][10] He began posting videos to YouTube in early 2012 at the age of 13[11] under the handle MrBeast6000. His early content ranged from Let's Plays to "videos estimating the wealth of other YouTubers."[12] He went viral in 2017 after his "counting to 100,000" video earned tens of thousands of views in just a few days, and he has become increasingly popular ever since, with most of his videos gaining tens of millions of views.[12] Over time, his style of content diversified to include challenge and donation videos that reward thousands of dollars, videos with arduous tasks or survival challenges, and original vlogs.[13] Once his channel took off, Donaldson hired some of his childhood friends to co-run the brand. As of 2022, the MrBeast team is made up of 30 people, including Donaldson himself.[14] Other than MrBeast, Donaldson runs the YouTube channels Beast Reacts, MrBeast Gaming, MrBeast 2 (formerly MrBeast Shorts),[15] and the philanthropy channel Beast Philanthropy.[16][17] He formerly ran MrBeast 3 (initially MrBeast 2), which is now inactive.[18][19] He was one of the 10 highest-paid YouTubers of 2020.[20]Donaldson is the founder of MrBeast Burger and Feastables, and a co-creator of Team Trees, a fundraiser for the Arbor Day Foundation that has raised over $23 million,[21][22] and
When prompted, ChatGPT gave me 5 types of business email compromise! Four of the types, no problem – but one was one I hadn't thought about but is definitely fraudulent! If you want to hear the five types and how to combat each…. Keep listening. Check out my website www.debrarrichardson.com if you need help implementing authentication techniques, internal controls, and best practices to prevent fraudulent payments, regulatory fines or bad vendor data. Check out my new Vendor Process Training Center for 149+ hours of weekly live and on-demand training for the Vendor team. Subscribe today to be entered in the subscriber-only monthly drawing to win a free Putting the AP in hAPpy Coffee Mug. Links mentioned in the podcast: Vendor Master File Tip of the Week: Easy Precaution From the Secret Service to Protect Your EmailsVendor Master File Tip of the Week: Don't Collect Vendor Banking From An InvoiceVendor Validation Reference List with Resources Links: www.debrarrichardson.com/vendor-validation-download (Get 25% Discount on the Global Vendor Registration Numbers)Vendor Master File Clean-Up: https://www.debrarrichardson.com/cleanupYouTube Channel: https://www.youtube.com/channel/UCqeoffeQu3pSXMV8fUIGNiw More Podcasts/Blogs/Webinars www.debrarrichardson.comMore ideas? Email me at debra@debrarrichardson.com Music Credit: www.purple-planet.com
Patrick Wood is a leading and critical expert on Sustainable Development, Green Economy, Agenda 21, 2030 Agenda and historic Technocracy.He is the author of Technocracy Rising: The Trojan Horse of Global Transformation (2015) and co-author of Trilaterals Over Washington, Volumes I and II (1978-1980) with the late Antony C. Sutton.Wood remains a leading expert on the elitist Trilateral Commission, their policies and achievements in creating their self-proclaimed “New International Economic Order” which is the essence of Sustainable Development on a global scale.An economist by education, a financial analyst and writer by profession and an American Constitutionalist by choice, Wood maintains a Biblical world view and has deep historical insights into the modern attacks on sovereignty, property rights and personal freedom. Such attacks are epitomized by the implementation of U.N. policies such as Agenda 21, Sustainable Development, Smart Growth and in education, the widespread adoption of Common Core State Standards.Wood is a frequent speaker and guest on radio shows around the nation. His current research builds on Trilateral Commission hegemony, focusing on Technocracy, Transhumanism and Scientism, and how these are transforming global economics, politics and religion.Patrick's website https://www.technocracy.news/Citizens For Free Speech https://www.citizensforfreespeech.org/SUPPORT THE SHOWSuper Chat Tips https://bit.ly/42W7iZHBuzzsprout https://bit.ly/3m50hFTSubscribeStar http://bit.ly/42Y0qM8Paypal http://bit.ly/3Gv3ZjpPatreon http://bit.ly/3G37AVxHow to grow lots of food in a grid-down situation.This is for people who want the fastest and easiest ways to produce healthy and delicious meat, eggs, and vegetables. Because you know that growing your own food is like printing your own money. Register for FREE full access to the webinar: http://dangerousoffgrid.comAFFILIATESAmerican Coins and JewelryWaterford, MichiganMatt (248) 978-7686CONNECT WITH USChatroom http://bit.ly/42OayqyEmail the show http://dangerousinfopodcast@protonmail.comJoin mailing list http://bit.ly/3Kku5YtSOCIALSInstagram https://www.instagram.com/jessejaymz1/Twitter https://twitter.com/jaymz_jesseGab https://gab.com/JessejaymzTruth Social https://truthsocial.com/@jessejaymzWATCH LIVETwitch https://www.twitch.tv/dangerousinfopodcastRumble https://rumble.com/c/DangerousInfoPodcastPilled https://pilled.net/profile/144176CloutHub https://clouthub.com/DangerousINFOpodcastTwitter https://twitter.com/jaymz_jesseDLive https://dlive.tv/DangerSMART is the acronym that was created by technocrats that have setup the "internet of things" that will eventually enslave humanity to their needs. Support the show
Today on the Social-Engineer Podcast: The Security Awareness Series, Ryan and I are joined by John Young. Like many security experts, John started out on the wrong side of the law by manipulating the AT&T phone system as a teenage phone phreak in New York City before he was scared straight by the FBI. His career started four decades ago in 1982, and by 1987 Young became the network director at McDonnell Douglas's $41.8 billion C-17 program. He eventually retired from IBM after a 30-year career in the corporate cyberwar trenches to launch his own company, CyberDef. Regarded as one of America's top corporate cybersecurity experts and thought leaders, Young's published dozens of articles, appeared on countless podcasts, and is designing a video course for people based on his book so that they can thrive in cybersecurity. [May 15, 2023] 00:00 - Intro 00:53 - Intro Links: - Social-Engineer.com - http://www.social-engineer.com/ - Managed Voice Phishing - https://www.social-engineer.com/services/vishing-service/ - Managed Email Phishing - https://www.social-engineer.com/services/se-phishing-service/ - Adversarial Simulations - https://www.social-engineer.com/services/social-engineering-penetration-test/ - Social-Engineer channel on SLACK - https://social-engineering-hq.slack.com/ssb - CLUTCH - http://www.pro-rock.com/ - innocentlivesfoundation.org - http://www.innocentlivesfoundation.org/ 04:51 - John Young Intro 06:41 - Scared Straight 15:38 - Imposter Syndrome 16:53 - Don't Quit Your Day Job! 22:54 - Integration is Key 28:05 - The Effect of AI on Cyber Security 32:32 - Tips to Stay Ahead 38:17 - Policies, Processes and Procedures 38:37 - Book Recommendations: - Don't Hack! – John Young 43:22 - Find John Young Online - LinkedIn: linkedin.com/in/john-young-4aa083151/ - Website: https://cyberdef.tv 43:55 - Learn to Thrive 46:42 - Wrap Up & Outro - www.social-engineer.com - www.innocentlivesfoundation.org
Are you aware of the invisible threat of social engineering that can compromise your personal and professional security? Cybercriminals are using cunning manipulations to exploit human vulnerabilities and gain access to sensitive information. But don't worry; there are practical ways to protect yourself from these attacks. We have published a must-read article that provides invaluable insights and guidance on how to avoid social engineering attacks. From phishing scams to physical impersonation, the article delves into the inner workings of these attacks and offers concrete strategies to fortify your defenses. In this article, you will learn the steps to recognize that you are a potential target, be cautious of unsolicited emails and phone calls, and use multifactor authentication as an extra layer of protection. Additionally, you'll learn how to prevent breaches by not clicking on links in emails. If you want to stay ahead of the curve and protect yourself from the ever-evolving tactics of cybercriminals, this informative article is a must-read. Don't wait till it's too late! Take charge of your personal and professional security. Click on the link and read the article now! The Hidden Dangers of Social Engineering: Tips to Outsmart Cybercriminals Craig is also heard on the following: With Jim Polito at 0836 Tuesdays WTAG AM 580 - FM 94.9 Talk 1200 News Radio 920 & 104.7 FM WHJJ NewsRadio 560 WHYN WXTK Craigs Show Airs 0600 Saturday and Sunday With Jeff Katz 1630 - Tuesdays WRVA 96.1 FM, 1140 AM WGAN Matt Gagnon 0730 Wednesdays Craigs Show Airs 1700 Saturday WGIR 610 & News Radio 96.7 Chris Ryan 0730 Mondays Craigs Show Airs 1130 Saturday On the Internet: Tune-In (WGAN) Radio.com (WRVA) iHeartRadio (WGIR, WTAG, and other stations)
Are you still collecting vendor supporting documents by email? Don't worry you are not alone, but this process does carry its share of organizing issues and fraud risks, so here are 3 tips that can help mitigate that fraud risk and organize your inbox and responses. Stay until the end to hear where you can get 17 more tips for free!Keep listening.Check out my website www.debrarrichardson.com if you need help implementing authentication techniques, internal controls, and best practices to prevent fraudulent payments, regulatory fines or bad vendor data. Check out my new Vendor Process Training Center for 149+ hours of weekly live and on-demand training for the Vendor team. Subscribe today to be entered in the subscriber-only monthly drawing to win a free Putting the AP in hAPpy Coffee Mug. Links mentioned in the podcast: May 2023: LinkedIn NewsletterFree Webinar: 20 Tips in 20 Minutes: Managing Your Inbox When Collecting Vendor Supporting Documents by Email.Vendor Validation Reference List with Resources Links: www.debrarrichardson.com/vendor-validation-download (Get 25% Discount on the Global Vendor Registration Numbers)Vendor Master File Clean-Up: https://www.debrarrichardson.com/cleanupYouTube Channel: https://www.youtube.com/channel/UCqeoffeQu3pSXMV8fUIGNiw More Podcasts/Blogs/Webinars www.debrarrichardson.comMore ideas? Email me at debra@debrarrichardson.com Music Credit: www.purple-planet.com
A Ransomware report highlights targeting and classification. Phishing remains a major threat. Cisco addresses an expired certificate issue. LockBit and Medusa hit school districts with ransomware. US and Canadian cyber units wrap up a hunt-forward mission in Latvia. Ben Yelin on NYPD surveillance. Our CyberWire producer Liz Irvin interviews Damien Lewke, a graduate student at MIT. And an unknown threat actor is collecting against both Russia and Ukraine. For links to all of today's stories check out our CyberWire daily news briefing: https://thecyberwire.com/newsletters/daily-briefing/12/90 Selected reading. GRIT Ransomware Report: April 2023 (GuidePoint Security) DNSFilter State of Internet Security - Q1 2023 (DNSFilter) Identify vEdge Certificate Expired on May 9th 2023 (Cisco) The State of Ransomware Attacks in Education 2023: Trends and Solutions (Veriti) US Cyber Command 'Hunts Forward' in Latvia (Voice of America) US cyber team unearths malware during ‘hunt-forward' mission in Latvia (C4ISRNET) Uncovering RedStinger - Undetected APT cyber operations in Eastern Europe since 2020 (Malwarebytes) Bad magic: new APT found in the area of Russo-Ukrainian conflict (Kaspersky)
Guest: Aunshul Rege, Director at The CARE Lab at Temple University [@TU_CARE]On Linkedin | https://www.linkedin.com/in/aunshul-rege-26526b59/On Twitter | https://twitter.com/Prof_Rege____________________________Host: Sean Martin, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining CyberSecurity Podcast [@RedefiningCyber]On ITSPmagazine | https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/sean-martin____________________________This Episode's SponsorsPentera | https://itspm.ag/penteri67aCrowdSec | https://itspm.ag/crowdsec-b1vp___________________________Episode NotesWelcome to a riveting new episode of the Redefining Cybersecurity Podcast, hosted by Sean Martin! Today, we're diving into the fascinating world of social engineering and the crucial role of education in understanding cybersecurity. Join us in this engaging conversation with Aunshul Rege from Temple University, who does amazing work in helping students comprehend the importance of cybersecurity and how social engineering plays a vital part in it.Imagine a world where computer science students and liberal arts students come together to tackle cybersecurity challenges from different angles. Aunshul Rege is an associate professor at the Department of Criminal Justice at Temple University, who has a unique journey starting as a software engineer and eventually realizing that computer science wasn't enough to answer the who, why, and how of cyber attacks. Her passion for understanding human behavior, sociology, and cybersecurity led her to explore the liberal arts side of cybersecurity.In this episode, Aunshul talks about her innovative teaching methods, where she pushes her students to collaborate across disciplines and explore the importance of social engineering in cyber attacks. From shoulder surfing activities to discussing ethics and multidisciplinary teamwork, her students learn to appreciate the different skill sets and perspectives they bring to the table.But it's not just about the technical aspect of cybersecurity. Aunshul's approach to teaching focuses on building students' understanding of human behavior and psychology in cyber attacks, emphasizing the value of social engineering in both the attack and defense aspects of cybersecurity.As you listen to this fascinating conversation, you'll discover the powerful impact of merging computer science and liberal arts perspectives, the importance of ethics in cybersecurity, and how Aunshul's unique teaching methods help students appreciate their role in the ever-evolving world of cybersecurity.So, get ready to be inspired by Aunshul's story and her innovative approach to cybersecurity education. You won't want to miss this captivating episode that challenges our understanding of cybersecurity and the critical role of social engineering in it. And don't forget to share this episode, subscribe to the podcast, and join us for more insightful conversations on Redefining Cybersecurity.____________________________Watch this and other videos on ITSPmagazine's YouTube ChannelRedefining CyberSecurity Podcast with Sean Martin, CISSP playlist
In this episode, we delve into the world of social engineering, phishing, and spam campaigns, exploring modern techniques threat actors are using to trick users into divulging sensitive information through email. Security Evangelist Andy and guest expert Umut Alemdar, head of the Security Lab here at Hornetsecurity, explain how phishing remains the top method of attack for many cybercriminals due to its cost-effectiveness and ability to exploit human vulnerability. Attackers use excellent context and timing to create convincing email messages that trick even the most savvy users into divulging sensitive information. Despite the prevalence of anti-spam solutions, phishing continues to rise as attackers adapt and evolve their techniques. Tune in to gain a better understanding of social engineering and how to protect your organization in the modern age. Timestamps: 1:47 – Social engineering, phishing, and spam campaigns: still a problem in the modern era 6:30 – Why is phishing so effective, even today? 11:43 – What other types of attacks does phishing enable for end users? 16:48 – How does the industry ultimately solve the problem of phishing? Episode resources: Cyber Security Report 2023 Security Awareness Services Google and Facebook Accounts Payable Fraud Find Andy on LinkedIn , Twitter , Mastodon Find Umut on LinkedIn
The American freeway is born in a time of intense optimism around the promise of the automobile. President Eisenhower sees the country's dilapidated road network as a barrier to economic growth and national defense. Jacob Dekema, the father of San Diego's freeway network, sees freeways as lifesavers. How did our optimism blind us to the freeway's dark side? Magic Highway USA: https://www.youtube.com/watch?v=Vo4-rYNGEwE&
Today we are joined by Tommy Honton. Tommy is a writer and experienced designer specializing in the intersection of interactivity and narrative. He has produced work around the world for audiences of all sizes and regularly lectures about design. He is also the co-creator of the award-winning escape room Stash House. [May 8, 2023] 00:00 – Intro 00:22 – Intro Links - Social-Engineer.com - http://www.social-engineer.com/ - Managed Voice Phishing - https://www.social-engineer.com/services/vishing-service/ - Managed Email Phishing - https://www.social-engineer.com/services/se-phishing-service/ - Adversarial Simulations - https://www.social-engineer.com/services/social-engineering-penetration-test/ - Social-Engineer channel on SLACK - https://social-engineering-hq.slack.com/ssb - CLUTCH - http://www.pro-rock.com/ - innocentlivesfoundation.org - http://www.innocentlivesfoundation.org/ 03:40 - Tommy Honton Intro 04:25 - How did Escape Rooms become your career? 06:19 - The Hero of Your Journey 08:42 - Crafting a Non-Linear Narrative 15:47 - Go with the Flow 19:33 - More than Words 24:45 - I'm Not Just the President... 29:06 - Some Stranger Things 34:34 - The Florida Market and Beyond 36:22 - Who would you consider your greatest mentors? - Marty Parker - Sean Stewart 39:00 - Book Recommendations - Sex at Dawn - Christopher Ryan & Cacilda Jethá - Sapiens - Yuval Noah Harari - Blood, Seat, and Pixels - Jason Schreier - Press Reset - Jason Schreier 40:56 - MORTY: The Escape Room App - Site: Morty 42:41 - Find Tommy online - Website: tommyhonton.com 43:25 - Guest Wrap Up & Outro - www.social-engineer.com - www.innocentlivesfoundation.org
On Episode 134, Scott Mann talked about his humble beginnings - enlisting in the Army, working his way up to Special Ops, and discovering some of the most untold parts of the world in a way only a good soldier can. But Scott's leadership, and the struggles that came with it, were only small part of that story. In Part 2, Scott digs into the challenges that come with leading, and the often absurd political machinations that come with it, before diving into the aptly named Operation Pineapple Express, reviewing his charitable works, and explaining just how he managed to get on a stage in his acclaimed play 'Last Out: Elegy of a Green Beret.' ----------Chapters:00:00 - Intro01:17 - Running the Ops Center17:29 - Navigating Leadership Waters23:13 - Challenging Calls40:56 - Regretful Ops46:07 - Retiring on My Terms58:16 - Gender, Vaccines, & Social Engineering in the Military01:02:50 - Different Ways in Ukraine01:11:26 - Veteran Entrepreneurs01:15:21 - Last Out: Elegy of a Green Beret01:19:01 - Operation Pineapple Express----------Support Scott Mann: Website - https://scottmann.comPlay - Last Out: Elegy of a Green Beret - https://lastoutplay.comBook - Operation Pineapple Express - https://operationpineappleexpress.comPodcast - The Rooftop Podcast - https://spoti.fi/3FIz3vsYouTube - https://bit.ly/3lsoR3vInstagram - https://www.instagram.com/scottmannauthorFacebook: https://www.facebook.com/ScottMannAuthor----------Sponsors: BUBS Naturals The BUBS namesake derives from Glen ‘BUB' Doherty, who was heroically killed in Benghazi, Libya in 2012. In addition to remembering Glen for the patriot he is, the BUBS ethos centers around the passionate and adventure seeking life that Glen lived. BUBS Naturals products are rooted in sustainably sourced ingredients and controlled consistency to provide our customers with the highest quality Collagen Protein & MCT Oil Powder that help you feel amazing and live a fuller life.Our mission is simple. FEEL GREAT. DO GOOD. 10% always goes back to charity, helping military men and women transition back into civilian life. Go to bubsnaturals.com and use code MIKEDROP for 20% off your order. ----------MUD/WTRGo to mudwtr.com/mike to support the show and use code MIKEMUD for 15% off----------Black BuffaloGo to blackbuffalo.com/discount/MIKEDROP and use promo code Mike Drop at checkout for 15% off your first order!----------Fueled by TeamDog | www.mikeritlandco.com | @Teamdog.petALL THINGS MIKE RITLAND:SHOP for Fueled By Team Dog Performance Dog Food, Treats, Apparel, Accessories, and Protection dogs - MikeRitlandCo.com - https://www.MikeRitlandCo.com Team Dog Online dog training - TeamDog.pet - https://www.TeamDog.pet
Listen for 4 types of reports from your Accounting System or ERP that can help in the war against internal and external fraud. Yes I said war….Keep listening.Check out my website www.debrarrichardson.com if you need help implementing authentication techniques, internal controls, and best practices to prevent fraudulent payments, regulatory fines or bad vendor data. Check out my new Vendor Process Training Center for 149+ hours of weekly live and on-demand training for the Vendor team. Subscribe today to be entered in the subscriber-only monthly drawing to win a free Putting the AP in hAPpy Coffee Mug. Links mentioned in the podcast: On-Demand Webinar: 8 Steps to Clean Your Vendor Master FileVendor Validation Reference List with Resources Links: www.debrarrichardson.com/vendor-validation-download (Get 25% Discount on the Global Vendor Registration Numbers)Vendor Master File Clean-Up: https://www.debrarrichardson.com/cleanupYouTube Channel: https://www.youtube.com/channel/UCqeoffeQu3pSXMV8fUIGNiw More Podcasts/Blogs/Webinars www.debrarrichardson.comMore ideas? Email me at debra@debrarrichardson.com Music Credit: www.purple-planet.com
Welcome to the Social-Engineer Podcast: The Doctor Is In Series – where we will discuss understandings and developments in the field of psychology. In today's episode, Chris and Abbie are discussing: Conspiracy theories. They will talk about what makes a Conspiracy Theory and why we believe them. [May 1, 2023] 00:00 - Intro 00:17 - Dr. Abbie Maroño Intro 00:59 - Intro Links - Social-Engineer.com - http://www.social-engineer.com/ - Managed Voice Phishing - https://www.social-engineer.com/services/vishing-service/ - Managed Email Phishing - https://www.social-engineer.com/services/se-phishing-service/ - Adversarial Simulations - https://www.social-engineer.com/services/social-engineering-penetration-test/ - Social-Engineer channel on SLACK - https://social-engineering-hq.slack.com/ssb - CLUTCH - http://www.pro-rock.com/ - innocentlivesfoundation.org - http://www.innocentlivesfoundation.org/ 04:45 - The Topic of the Day: The TRUTH Behind Conspiracy Theories 05:54 - What is a Conspiracy Theory? 07:39 - What's the harm? 10:20 - WHY??? 11:17 - Pattern Seekers 13:15 - Cognitive Closure 17:04 - The Role of Critical Thinking 19:18 - An Existential Element 20:41 - Don't Forget the Lizards! 22:35 - What about Bigfoot? 24:30 - Escapism 30:15 - Reading the Emotions 32:29 - Social Motive 33:31 - Emotions vs Critical Thinking 36:42 - Prove Me Wrong! 39:09 - The Takeaway: Empathy 40:57 - Wrap Up & Outro - www.social-engineer.com - www.innocentlivesfoundation.org Find us online: - Twitter: https://twitter.com/abbiejmarono - LinkedIn: linkedin.com/in/dr-abbie-maroño-phd-35ab2611a - Twitter: https://twitter.com/humanhacker - LinkedIn: linkedin.com/in/christopherhadnagy References: Abalakina-Paap, M., Stephan, W. G., Craig, T., & Gregory, L. (1999). Beliefs in conspiracies. Political Psychology, 20, 637–647. Adams, G., O'Brien, L. T., & Nelson, J. C. (2006). Perceptions of racism in Hurricane Katrina: A liberation psychology analysis. Analyses of Social Issues and Public Policy, 6, 215–235. Bilewicz, M., Winiewski, M., Kofta, M., & Wójcik, A. (2013). Harmful ideas: The structure and consequences of antiSemitic beliefs in Poland. Political Psychology, 34, 821–839. Bost, P. R., & Prunier, S. G. (2013). Rationality in conspiracy beliefs: The role of perceived motive. Psychological Reports, 113, 118–128 Crocker, J., Luhtanen, R., Broadnax, S., & Blaine, B. E. (1999). Belief in U.S. government conspiracies against Blacks among Black and White college students: Powerlessness or system blame? Personality and Social Psychology Bulletin, 25, 941–953. Dieguez, S., Wagner-Egger, P., & Gauvrit, N. (2015). Nothing happens by accident, or does it? A low prior for randomness does not explain belief in conspiracy theories. Psychological Science, 26, 1762–1770. Dieguez, S., Wagner-Egger, P., & Gauvrit, N. (2015). Nothing happens by accident, or does it? A low prior for randomness does not explain belief in conspiracy theories. Psychological Science, 26(11), 1762–1770. https://doi. org/10.1177/0956797615598740 DiFonzo, N., Bordia, P., & Rosnow, R. L. (1994). Reining in rumors. Organizational Dynamics, 23(1), 47–62. https://doi. org/10.1016/0090-2616(94)90087-6 Douglas, K. M., & Leite, A. C. (2017). Suspicion in the workplace: Organizational conspiracy theories and workrelated outcomes. British Journal of Psychology, 108, 486–506. Douglas, K. M., & Sutton, R. M. (2008). The hidden impact of conspiracy theories: Perceived and actual impact of theories surrounding the death of Princess Diana. Journal of Social Psychology, 148, 210–221. Douglas, K. M., Sutton, R. M., & Cichocka, A. (2017). The psychology of conspiracy theories. Current directions in psychological science, 26(6), 538-542. Douglas, K. M., Sutton, R. M., Callan, M. J., Dawtry, R. J., & Harvey, A. J. (2016). Someone is pulling the strings: Hypersensitive agency detection and belief in conspiracy theories. Thinking & Reasoning, 22, 57–77. Douglas, K. M., Uscinski, J. E., Sutton, R. M., Cichocka, A., Nefes, T., Ang, C. S., & Deravi, F. (2019). Understanding conspiracy theories. Political psychology, 40, 3-35. Keeley, B. L. (1999). Of conspiracy theories. The journal of Philosophy, 96(3), 109-126. Kim, M., & Cao, X. (2016). The impact of exposure to media messages promoting government conspiracy theories on distrust in the government: Evidence from a two-stage randomized experiment. International Journal of Communication, 10(2016), 3808–3827. Retrieved from http://ijoc.org/index.php/ijoc/article/view/5127 Klein, C., Clutton, P., & Dunn, A. G. (2018). Pathways to conspiracy: The social and linguistic precursors of involvement in Reddit's conspiracy theory forum. Retrieved frompsyarxiv.com/8vesf Nefes, T. S. (2017). The impacts of the Turkish Government's “interest rate lobby” theory about the Gezi Park Protests. Social Movement Studies, 16(5), 610–622. https://doi.org/10.1080/14742837.2017.1319269 Nera, K., Pantazi, M., & Klein, O. (2018). “These are just stories, Mulder”: Exposure to conspiracist fiction does not produce narrative persuasion. Frontiers in Psychology, 9, https://doi.org/10.3389/fpsyg.2018.00684 Swift, A. (2013). Majority in U.S. still believe JFK killed in a conspiracy. Retrieved from http://www.gallup.com/ poll/165893/majority-believe-jfk-killed-conspiracy.aspx Tetlock, P. E. (2002). Social-functionalist frameworks for judgment and choice: The intuitive politician, theologian, and prosecutor. Psychological Review, 109, 451–472. Uscinski, J. E., & Parent, J. M. (2014). American conspiracy theories. New York, NY: Oxford University Press. Uscinski, J. E., Klofstad, C., & Atkinson, M. D. (2016). What drives conspiratorial beliefs? The role of informational cues and predispositions. Political Research Quarterly, 69, 57–71. van Prooijen, J.-W., & Acker, M. (2015). The influence of control on belief in conspiracy theories: Conceptual and applied extensions. Applied Cognitive Psychology, 29, 753–761. van Prooijen, J.-W., & Jostmann, N. B. (2013). Belief in conspiracy theories: The influence of uncertainty and perceived morality. European Journal of Social Psychology, 43, 109–115. Whitson, J. A., & Galinsky, A. D. (2008). Lacking control increases illusory pattern perception. Science, 322, 115–117.
Cleveland's Bob Frantz fills in for Dr. G.Support the show: https://www.sebgorka.com/See omnystudio.com/listener for privacy information.
The United States Postal Inspection Service? They're real? Yes, it is and here are 5 tips that you can use to combat fraud at your company.Keep listening.Check out my website www.debrarrichardson.com if you need help implementing authentication techniques, internal controls, and best practices to prevent fraudulent payments, regulatory fines or bad vendor data. Check out my new Vendor Process Training Center for 149+ hours of weekly live and on-demand training for the Vendor team. Subscribe today to be entered in the subscriber-only monthly drawing to win a free Putting the AP in hAPpy Coffee Mug. Links mentioned in the podcast: United States Postal Inspection Service (USPIS): Main PageSubscribe to Scam ArticlesForward Suspicious TextsVendor Process Training Center: Vendor Process Training PassFrauds And New Scam Alerts + How To Prevent ThemVendor Process ReDesign – Plug Up the Gaps In Your Vendor Setup & Maintenance ProcessVendor Validation Reference List with Resources Links: www.debrarrichardson.com/vendor-validation-download (Get 25% Discount on the Global Vendor Registration Numbers)Vendor Master File Clean-Up: https://www.debrarrichardson.com/cleanupYouTube Channel: https://www.youtube.com/channel/UCqeoffeQu3pSXMV8fUIGNiw More Podcasts/Blogs/Webinars www.debrarrichardson.comMore ideas? Email me at debra@debrarrichardson.com Music Credit: www.purple-planet.com
What is social engineering? How is it affecting businesses nowadays? What is the most effective way to prevent it? These were some of the questions Chris Hadnagy, Social Engineering expert discussed in the latest episode of the AUDIT 15 FUN podcast.
Welcome to the Social-Engineer Podcast: The SE Etc. Series. This series will be hosted by Chris Hadnagy, CEO of Social-Engineer LLC, and The Innocent Lives Foundation, as well as Social-Engineer.Org and The Institute for Social Engineering. Chris will be joined by his co-host Patrick Laverty as they discuss topics pertaining to the world of Social Engineering. [April 24, 2023] 00:00 - Intro 00:25 - Patrick Laverty Intro 00:59 - Intro Links - Social-Engineer.com - http://www.social-engineer.com/ - Managed Voice Phishing - https://www.social-engineer.com/services/vishing-service/ - Managed Email Phishing - https://www.social-engineer.com/services/se-phishing-service/ - Adversarial Simulations - https://www.social-engineer.com/services/social-engineering-penetration-test/ - Social-Engineer channel on SLACK - https://social-engineering-hq.slack.com/ssb - CLUTCH - http://www.pro-rock.com/ - innocentlivesfoundation.org - http://www.innocentlivesfoundation.org/ 05:34 - Scary Little Human 07:50 - Today's Topic: The SE Framework 09:13 - Origin Story 14:15 - Social Engineering: A Complete Definition 18:03 - A Tool for Communication 19:20 - Influence is NOT Manipulation 24:15 - Code of Ethics 27:38 - Intent is Key 33:36 - Human Buffer Overflow 41:56 - Education for Everyone 43:51 - Updating When Necessary 45:14 - Next Month: Book Club 45:59 - Wrap Up & Outro - www.social-engineer.com - www.innocentlivesfoundation.org Find us online - Chris Hadnagy - Twitter: @humanhacker - LinkedIn: linkedin.com/in/christopherhadnagy - Patrick Laverty - Twitter: @plaverty9 LinkedIn: linkedin.com/in/plaverty9
Some days it seems like we live in an upside down world. Today's show fits in the category of “You can't make this stuff up.” It's just too bizarre for words, and it would be even funny if it were not for the fact that this is real. Charlie Munger, who is Warren Buffet's business partner is famous for saying “show me the incentive and I'll show you the outcome”. The latest bit of insanity coming out of the Biden White House is an idea whereby the government will charge a premium on borrowers with a good credit score in order to make it easier for those with a poor credit score to qualify for a loan. You heard me correctly. This is the equivalent of taking points away from an A student and giving extra marks to a C student, to make things more fair. The details are that a borrower with a credit score of 740 or higher will pay an additional fee ontheir residential mortgage. ---------------- Host: Victor Menasce email: podcast@victorjm.com
Guest: David Pereira, CEO and Founder of SecPro [@SecProInt]On LinkedIn | https://www.linkedin.com/in/davidfpereira/On Twitter | https://twitter.com/davidpereiracibOn YouTube | https://www.youtube.com/@secprointHost: Phillip WylieOn ITSPmagazine
Guest: Justin "Hutch" Hutchens, Director of Security Research & Development at Set Solutions [@setsolutionsinc] and a cybersecurity instructor for the University of Texas at Austin [@UTAustin]On LinkedIn | https://www.linkedin.com/in/justinhutchens/On Twitter | https://twitter.com/sociosploitOn YouTube | https://www.youtube.com/channel/UCGx0Wq45QB3pKHUzsX8R0Zg____________________________Hosts: Sean Martin, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining CyberSecurity Podcast [@RedefiningCyber]On ITSPmagazine | https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/sean-martinMarco Ciappelli, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining Society PodcastOn ITSPmagazine | https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli____________________________This Episode's SponsorsBlackCloak | https://itspm.ag/itspbcwebBrinqa | https://itspm.ag/brinqa-pmdpSandboxAQ | https://itspm.ag/sandboxaq-j2en____________________________Episode NotesIn this captivating episode as part of our RSA Conference Coverage Chats on the Road series, Justin Hutchens, a seasoned expert in information security and AI, and hosts Sean Martin and Marco Ciappelli discuss the potential benefits and risks of integrating artificial intelligence (AI) and natural language processing (NLP) into various aspects of our lives. Justin shares his journey in AI, from attempting to crack financial markets to exploring its potential in social engineering.Hutchens will be delivering a talk at RSA about the weaponization of large language models for fully autonomous social engineering systems and potential mitigation strategies. He will also lead a "birds of a feather" session on the ethics surrounding AI, touching on topics such as societal impacts, mental health, and job displacement.The podcast delves into the perception and limitations of AI, emphasizing that it should be seen as a tool rather than a solution. Hutchens highlights the risks of integrating AI into business processes and shares his thoughts on the importance of human intervention to ensure the accuracy and safety of AI-generated outputs. He also mentions the possible advantages of using AI in security operations and its challenges in operational decision-making.The conversation underscores the need for ongoing discussions covering the importance of ethics in AI, the rapid acceleration of AI development, its potential societal impacts, and understanding the necessity of balancing business objectives with societal concerns. Join this enlightening conversation as the trio discuss the power and responsibility that come with using AI and explore ways to mitigate the risks associated with integrating AI into organizations' workflows.Don't forget to follow all of ITSPmagazine's RSA Conference coverage. Be sure to share and subscribe to Redefining CyberSecurity Podcast to keep up with the latest trends in technology and cybersecurity.____________________________ResourcesSession | Artificial Intelligence: Balancing Rapid Innovation with Ethics: https://www.rsaconference.com/USA/agenda/session/Artificial%20Intelligence%20Balancing%20Rapid%20Innovation%20with%20EthicsSession | CatPhish Automation - The Emerging Use of AI in Social Engineering: https://www.rsaconference.com/USA/agenda/session/CatPhish%20Automation%20-%20The%20Emerging%20Use%20of%20AI%20in%20Social%20EngineeringPrevious RSAC Presentations: https://www.rsaconference.com/experts/Justin%20HutchensLearn more, explore the agenda, and register for RSA Conference: https://itspm.ag/rsa-cordbw____________________________For more RSAC Conference Coverage podcast and video episodes visit: https://www.itspmagazine.com/rsa-conference-usa-2023-rsac-san-francisco-usa-cybersecurity-event-coverageAre you interested in telling your story in connection with RSA Conference by sponsoring our coverage?
When you inactivate vendors in your vendor master file, do you also remove the tax id and the vendor's banking?Keep listening.Check out my website www.debrarrichardson.com if you need help implementing authentication techniques, internal controls, and best practices to prevent fraudulent payments, regulatory fines or bad vendor data. Check out my new Vendor Process Training Center for 149+ hours of weekly live and on-demand training for the Vendor team. Subscribe today to be entered in the subscriber-only monthly drawing to win a free Putting the AP in hAPpy Coffee Mug. Links mentioned in the podcast: On-Demand Webinar: 8 Steps to Clean Your Vendor Master FileVendor Banking Form Template w/Built-In Authentication to Prevent Fraud: Vendor Banking Form TemplateVendor Process ReDesign – Plug Up the Gaps In Your Vendor Setup & Maintenance ProcessVendor Validation Reference List with Resources Links: www.debrarrichardson.com/vendor-validation-download (Get 25% Discount on the Global Vendor Registration Numbers)Vendor Master File Clean-Up: https://www.debrarrichardson.com/cleanupYouTube Channel: https://www.youtube.com/channel/UCqeoffeQu3pSXMV8fUIGNiw More Podcasts/Blogs/Webinars www.debrarrichardson.comMore ideas? Email me at debra@debrarrichardson.com Music Credit: www.purple-planet.com
Guest: Dr. Rebecca Wynn, Global Chief Security Strategist & CISO at Click Solutions GroupOn LinkedIn | https://linkedin.com/in/rebeccawynncisspHost: Chloé MessdaghiOn ITSPmagazine
Today on the Social-Engineer Podcast: The Security Awareness Series, Ryan and I are joined by Dr. Abbie Maroño. Dr. Maroño is now the Director of Education at Social-Engineer, LLC, an active member of internationally recognized research groups, and an expert consultant and advisor. Today, Chris, Ryan and Abbie will discuss the 2023 State of Vishing Report. [April 17, 2023] 00:00 - Intro 00:23 - Ryan Intro 01:20 - Intro Links: - Social-Engineer.com - http://www.social-engineer.com/ - Managed Voice Phishing - https://www.social-engineer.com/services/vishing-service/ - Managed Email Phishing - https://www.social-engineer.com/services/se-phishing-service/ - Adversarial Simulations - https://www.social-engineer.com/services/social-engineering-penetration-test/ - Social-Engineer channel on SLACK - https://social-engineering-hq.slack.com/ssb - CLUTCH - http://www.pro-rock.com/ - innocentlivesfoundation.org - http://www.innocentlivesfoundation.org/ 04:42 - Dr. Abbie Maroño Intro 06:55 - Topic of the Day: 2023 State of Vishing Report 08:25 - Discussing the Data Set 10:47 - Following the Trends 12:47 - Limitation of Data 13:28 - Negatives in Positives? 15:49 - Vishing: A Definition 18:10 - Understanding Vulnerabilities 19:10 - Got the Time 21:08 - Why Time of Day Matters 26:18 - Make it Personal 28:05 - Ethics are Vital! 31:34 - The Academic Dilemma 35:46 - Know Your Goal 37:04 - Vishing Trends 39:28 - Increased Understanding 41:34 - Creating Vulnerability 45:18 - Hope through Education 48:03 - Wrap Up & Outro - www.social-engineer.com - www.innocentlivesfoundation.org
FC has gone through extreme adversity and has come out stronger on the other side. He grew up in a very negative environment, which unfortunately led to the development of complex PTSD. But from that emerged a unique talent, one that is both a gift and a curse: hypervigilance. He refused to allow his past define him and instead, leveraged the state of increased alertness to fuel his passion for security. FC talks with us about his breakthrough into ethical hacking and physical security assignments, his 100% success rate at breaking into banks and other highly secured government facilities, the reason physical security engagements are NOT helpful to the business, uniting digital/physical/human-factor for optimal security, and the risk of investing in new tech. FC also details some truly insane stories, including the time he kidnapped the guard at a facility protected by ex-military Gurkhas. Finally, he reveals his advice for aspiring hackers and details on his soon to be released book, "How I Rob Banks: And Other Such Places". TIMESTAMPS0:03:49 - The Origin of an Ethical Hacker0:05:49 - Early Computing and Hacking Experiences0:10:04 -The Cursed Gift of Hypervigilance0:13:25 - Social Engineering and Physical Security Assessments0:20:30 - The Inevitability of Security Breaches0:22:38 - The Lack of Focus on Human and Physical Security in Organizations0:24:35 - Challenges of Adopting Cutting Edge Technology0:26:53 - The Impact of AI on Ethical Hacking0:34:16 - Methods of Social Engineering0:36:29 - Identifying Entry Points and Planning an Attack0:42:07 - Security Breach Simulation at a Data Center protected by Ex-Military Gurkhas0:44:31 - Advice for Aspiring Security Professionals0:48:46 - Cybersecurity Education and CertificationsSYMLINKSLinkedInTwitterCygentaHacktheboxTryhackmePentest AcademyBook: Breaking into Information Security: Learning the Ropes 101Book: How I Rob Banks: And Other Such PlacesDRINK INSTRUCTIONKOMBUCHA MOJITO1 Cup Kombucha1 TBSP Honey8-10 Mint Leaves1/2 Lime (Juiced)Club SodaMuddle 8-10 mint leaves and 1/2 a lime, juiced. Add 1 tbsp of honey and 1 cup of kombucha. Pour mixture into a highball glass. Top with club soda and stir gently.EPISODE SPONSORN/ACONNECT WITH USBecome a SponsorSupport us on PatreonFollow us on LinkedInTweet us at @BarCodeSecurityEmail us at info@barcodesecurity.com
Guest: Michael Farnum, CTO at SET Solutions [@setsolutionsinc]On LinkedIn | https://www.linkedin.com/in/mfarnum/On Twitter | https://twitter.com/m1a1vetHost: Phillip WylieOn ITSPmagazine
Do you have internal employees collecting vendor supporting documentation for vendor adds and changes? What are the risks and how to mitigate them?Keep listening.Check out my website www.debrarrichardson.com if you need help implementing authentication techniques, internal controls, and best practices to prevent fraudulent payments, regulatory fines or bad vendor data. Check out my new Vendor Process Training Center for 149+ hours of weekly live and on-demand training for the Vendor team. Subscribe today to be entered in the subscriber-only monthly drawing to win a free Putting the AP in hAPpy Coffee Mug. Links mentioned in the podcast: Vendor Banking Form Template w/Built-In Authentication to Prevent Fraud: Vendor Banking Form TemplateFree Training Session: Build An Authentication Matrix So Your Vendor Team And Help Desk Do Not Communicate With A FraudsterVendor Process ReDesign – Plug Up the Gaps In Your Vendor Setup & Maintenance ProcessVendor Validation Reference List with Resources Links: www.debrarrichardson.com/vendor-validation-download (Get 25% Discount on the Global Vendor Registration Numbers)Vendor Master File Clean-Up: https://www.debrarrichardson.com/cleanupYouTube Channel: https://www.youtube.com/channel/UCqeoffeQu3pSXMV8fUIGNiw More Podcasts/Blogs/Webinars www.debrarrichardson.comMore ideas? Email me at debra@debrarrichardson.com Music Credit: www.purple-planet.com
Imagine an illness that requires surgery a few times a month and restricts your mobility. What would that do to your career? In our chat with Billy Boatright today, we'll find out how he not only switched careers despite his illness, he found an advantage in his weaknesses: he turned them into effective social engineering skills. Visit https://www.securityweekly.com/psw for all the latest episodes! Show Notes: https://securityweekly.com/psw780
From the 4/5/23 Live Stream. Watch the full video here Join Courtenay & Rachel as they dive into episode 3 of Crypted History Uncrypted. Under the guise of social “science” research, we were brought, social engineering and propaganda. The ladies uncover what at first glance appears to be a field to investigate and heal ailments of the “psyche” aka the soul, and how that became weaponized against the masses and propagandized for war all while being funded by similar entities of todays MIC machine. To join the live conversation, we'll answer questions asked via our live chat link. To join, follow our chat link: https://dono.chat/dono/Courtenay ————————————————— Disclaimer: this is intended to be inspiration & entertainment. We aim to inform, inspire & empower. Guest opinions/ statements are not a reflection of the host or podcast. Please note these are conversational dialogues. All statements and opinions are not necessarily meant to be taken as fact. Please do your own research. Thanks for watching! ————————————————— Join us at Rebels for a C.A.U.S.E - June 3rd & 4th in Nashville, TN - https://www.rebelsforcause.com Follow & Connect with Courtenay: https://www.courtenayturner.com Twitter: https://twitter.com/KineticCourtz TruthSocial: https://truthsocial.com/@CourtenayTurner Instagram: https://instagram.com/kineticcourtz?utm_medium=copy_link Telegram: https://t.me/courtenayturnerpodcastcommunity Read some of her articles: https://www.truthmatters.biz Listen to &/or watch the podcast here! https://linktr.ee/courtenayturner Support my work & Affiliate links: https://www.buymeacoffee.com/courtzt https://zstacklife.com/?ref=COURTENAYTURNER FOX N SONS Coffee: https://www.foxnsons.com Promo Code: CTP The wellness company: https://www.twc.health/?ref=UY6YiLPqkwZzUX Enroll link: https://app.sharehealthcare.com/enroll? Referral code: courtz Www.HolyHydrogen.com Discount code: UPRISING144K LMNT: https://drinklmnt.com/pages/free-gift-with-purchase?rfsn=6999587.ebab27&utm_medium=affiliate&utm_source=courtenayturner&utm_campaign=agwp&utm_content=&utm_term=&rfsn_cn=EXCLUSIVE%20GIFT%20FOR%20COURTENAY%20TURNER%27S%20COMMUNITY Ignite Sales: https://www.universityofreason.com/a/29887/KVR3yvZo Mindset workshop: https://www.universityofreason.com/a/2147526145/KVR3yvZo Critical thinking trivium method: https://www.universityofreason.com/a/2147486641/KVR3yvZo Solutions webinar: https://www.universityofreason.com/a/2147492490/KVR3yvZo Richard's GTW freedom vault: https://www.universityofreason.com/a/2147506649/KVR3yvZo https://www.universityofreason.com/a/29887/KVR3yvZo ©2023 All Rights Reserved Learn more about your ad choices. Visit megaphone.fm/adchoices
We must each do our part to reclaim language from those who would distort the meanings of words in order to bludgeon the rest of us into submission.Would you like to share your thoughts with Ralph? Please email your comments to hello@idahospeaks.com or post your comments on @IdahoSpeaks on Twitter.Idaho Speaks is a listener supported production. Please visit idahospeaks.com/support to learn more.Do you have something so say? Interested in learning more about publishing on the Idaho Speaks Network? Our nation was built on ideas and your idea could be the next political advancement for Idaho. Call Ed at (208) 209-7170 or email hello@idahospeaks.com to start the conversation.
Courtenay Turner is a public speaker, an athlete, the co-founder of TruthMatters.biz, and the host of the Courtenay Turner Podcast. In this conversation with Courtenay we discuss:Her "impossible" birth storyThe benefits of wet sand and a narrower beamGoing down the vaccine rabbit holeThe demonic nature of COVIDWhy she's skeptical of the big push towards plant medicineand moreYou can learn more about Courtenay at her website or by following her on Instagram.Terrain Theory episodes are not to be taken as medical advice. You are your own primary healthcare provider.If you have a Terrain Transformation story you would like to share, email us at ben@terraintheory.net.Learn more at www.terraintheory.net.Music by Chris Merenda
Guest: Fletus Poston, Senior Manager, Security Operations at CrashPlanOn LinkedIn | https://www.linkedin.com/in/fletusposton/On Twitter | https://twitter.com/fletuspostonHost: Phillip WylieOn ITSPmagazine
A fraudulent payment has been made. Now what?Keep listening. Check out my website www.debrarrichardson.com if you need help implementing authentication techniques, internal controls, and best practices to prevent fraudulent payments, regulatory fines, or bad vendor data. Check out my new Vendor Process Training Center for 149+ hours of weekly live and on-demand training for the Vendor team. Subscribe today to be entered in the subscriber-only monthly drawing to win a free Putting the AP in hAPpy Coffee Mug. Links mentioned in the podcast: Vendor Process ReDesign – Plug Up the Gaps In Your Vendor Setup & Maintenance ProcessVendor Validation Reference List with Resources Links: www.debrarrichardson.com/vendor-validation-download (Get 25% Discount on the Global Vendor Registration Numbers)Vendor Master File Clean-Up: https://www.debrarrichardson.com/cleanupYouTube Channel: https://www.youtube.com/channel/UCqeoffeQu3pSXMV8fUIGNiw More Podcasts/Blogs/Webinars www.debrarrichardson.comMore ideas? Email me at debra@debrarrichardson.com Music Credit: www.purple-planet.com
In this discussion, we begin to forge together topics like Astrology, Ancestry, and Species with the works of Rupert Sheldrake, Renn Butler, Mattias Desmet, and Vadim Zeland into one cohesive understanding. We use these parallels existing between different philosophies and sciences to bridge the gap between unseen, metaphysical phenomena in the cosmos. How is consciousness being influenced and what causes everything to be interconnected within the matrix we reside in? Support the show and get exclusive content on PatreonSupport this show http://supporter.acast.com/thedailytranscendence. Hosted on Acast. See acast.com/privacy for more information.
Guest: Tracy Maleeff, Principal at Sherpa Intelligence LLCOn Twitter | https://twitter.com/InfoSecSherpaOn LinkedIn | https://linkedin.com/in/tzmaleeffHost: Chloé MessdaghiOn ITSPmagazine
"Cylance" the ransomware (with no relation to Cylance, the security company). An update on the 3CX incident. The FSB's arrest of a Wall Street Journal reporter. Simone Petrella from N2K Networks unpacks 2023 cybersecurity training trends. Deepen Desai from Zscaler has the latest on cloud security. And Hacktivists claim to have tricked wives of Russian combat pilots into revealing personal information. For links to all of today's stories check out our CyberWire daily news briefing: https://thecyberwire.com/newsletters/daily-briefing/12/63 Selected reading. "Cylance" ransomware (no relation to Cylance). (CyberWire Pro) New Cylance Ransomware Targets Linux and Windows, Warn Researchers (HackRead) New Cylance Ransomware strain emerges, experts speculate about its notorious members (IT PRO) More evidence links 3CX supply-chain attack to North Korean hacking group (Record) 3CX supply chain attack: the unanswered questions (Computing) 3CX Desktop App Compromised (CVE-2023-29059) (Fortinet Blog) Evan Gershkovich Loved Russia, the Country That Turned on Him (Wall Street Journal) The Ukrainian hoax that revealed the Russian pilots who bombed Mariupol theatre (The Telegraph) Ukrainian Hacktivists Trick Russian Military Wives for Personal Info (HackRead)