Podcasts about two factor authentication

Method of computer access control

  • 234PODCASTS
  • 368EPISODES
  • 47mAVG DURATION
  • 1EPISODE EVERY OTHER WEEK
  • May 6, 2025LATEST
two factor authentication

POPULARITY

20172018201920202021202220232024


Best podcasts about two factor authentication

Latest podcast episodes about two factor authentication

All TWiT.tv Shows (MP3)
Hands-On Mac 179: Using the Passwords App in macOS Sequoia

All TWiT.tv Shows (MP3)

Play Episode Listen Later Apr 24, 2025 9:49


Mikah Sargent takes viewers on a comprehensive tour of the Passwords app in macOS Sequoia, demonstrating how this robust tool serves as a complete credential management system. From passkeys to verification codes and shared passwords, Mikah explores how Apple has created a secure yet user-friendly solution for managing all your login information across devices. Passkeys - These are created automatically when you set up passkey authentication on websites, with limited editing options but the ability to add notes or modify the associated website. Verification codes - Users can add two-factor authentication codes either by entering setup keys manually or scanning QR codes. Wi-Fi - The app stores Wi-Fi network credentials, displays network security information (WPA2/WPA3), and lets users generate QR codes for easy sharing. Security recommendations - The app alerts users when passwords may be compromised in data breaches using Apple's differential privacy techniques that protect user privacy. Password sharing feature - Users can create groups to share specific login credentials with family members or others, with granular control over which passwords are shared. Password importing - The app supports importing passwords from CSV files, though Mikah strongly recommends deleting these files immediately after import for security. Cross-device synchronization - All passwords sync across Apple devices with end-to-end encryption via iCloud. Windows compatibility - Even Windows users can access their passwords through the iCloud Passwords app, making it a versatile solution. Passwords User Guide - Apple Support - https://support.apple.com/guide/passwords/welcome/1.1/mac/15.4.1 Host: Mikah Sargent Download or subscribe to Hands-On Mac at https://twit.tv/shows/hands-on-mac Want access to the ad-free video and exclusive features? Become a member of Club TWiT today! https://twit.tv/clubtwit Club TWiT members can discuss this episode and leave feedback in the Club TWiT Discord.

Hands-On Mac (Video)
HOM 179: Using the Passwords App in macOS Sequoia

Hands-On Mac (Video)

Play Episode Listen Later Apr 24, 2025 9:49


Mikah Sargent takes viewers on a comprehensive tour of the Passwords app in macOS Sequoia, demonstrating how this robust tool serves as a complete credential management system. From passkeys to verification codes and shared passwords, Mikah explores how Apple has created a secure yet user-friendly solution for managing all your login information across devices. Passkeys - These are created automatically when you set up passkey authentication on websites, with limited editing options but the ability to add notes or modify the associated website. Verification codes - Users can add two-factor authentication codes either by entering setup keys manually or scanning QR codes. Wi-Fi - The app stores Wi-Fi network credentials, displays network security information (WPA2/WPA3), and lets users generate QR codes for easy sharing. Security recommendations - The app alerts users when passwords may be compromised in data breaches using Apple's differential privacy techniques that protect user privacy. Password sharing feature - Users can create groups to share specific login credentials with family members or others, with granular control over which passwords are shared. Password importing - The app supports importing passwords from CSV files, though Mikah strongly recommends deleting these files immediately after import for security. Cross-device synchronization - All passwords sync across Apple devices with end-to-end encryption via iCloud. Windows compatibility - Even Windows users can access their passwords through the iCloud Passwords app, making it a versatile solution. Passwords User Guide - Apple Support - https://support.apple.com/guide/passwords/welcome/1.1/mac/15.4.1 Host: Mikah Sargent Download or subscribe to Hands-On Mac at https://twit.tv/shows/hands-on-mac Want access to the ad-free video and exclusive features? Become a member of Club TWiT today! https://twit.tv/clubtwit Club TWiT members can discuss this episode and leave feedback in the Club TWiT Discord.

Total Mikah (Audio)
Hands-On Mac 179: Using the Passwords App in macOS Sequoia

Total Mikah (Audio)

Play Episode Listen Later Apr 24, 2025 9:49 Transcription Available


Mikah Sargent takes viewers on a comprehensive tour of the Passwords app in macOS Sequoia, demonstrating how this robust tool serves as a complete credential management system. From passkeys to verification codes and shared passwords, Mikah explores how Apple has created a secure yet user-friendly solution for managing all your login information across devices. Passkeys - These are created automatically when you set up passkey authentication on websites, with limited editing options but the ability to add notes or modify the associated website. Verification codes - Users can add two-factor authentication codes either by entering setup keys manually or scanning QR codes. Wi-Fi - The app stores Wi-Fi network credentials, displays network security information (WPA2/WPA3), and lets users generate QR codes for easy sharing. Security recommendations - The app alerts users when passwords may be compromised in data breaches using Apple's differential privacy techniques that protect user privacy. Password sharing feature - Users can create groups to share specific login credentials with family members or others, with granular control over which passwords are shared. Password importing - The app supports importing passwords from CSV files, though Mikah strongly recommends deleting these files immediately after import for security. Cross-device synchronization - All passwords sync across Apple devices with end-to-end encryption via iCloud. Windows compatibility - Even Windows users can access their passwords through the iCloud Passwords app, making it a versatile solution. Passwords User Guide - Apple Support - https://support.apple.com/guide/passwords/welcome/1.1/mac/15.4.1 Host: Mikah Sargent Download or subscribe to Hands-On Mac at https://twit.tv/shows/hands-on-mac Want access to the ad-free video and exclusive features? Become a member of Club TWiT today! https://twit.tv/clubtwit Club TWiT members can discuss this episode and leave feedback in the Club TWiT Discord.

Engadget
Anthropic's new Claude model can think both fast and slow, Gmail will stop using SMS for two-factor authentication, and each second of Google's Veo 2 AI video footage will cost 50 cents

Engadget

Play Episode Listen Later Feb 25, 2025 8:06


Anthropic's new Claude model can think both fast and slow, Gmail will stop using SMS for two-factor authentication, and each second of Google's Veo 2 AI video footage will cost 50 cents. It's Tuesday, February 25th and this is Engadget News. Learn more about your ad choices. Visit podcastchoices.com/adchoices

MacVoices Audio
MacVoices #25059: Live! - A Scam Story, Invites, and An Earnings Call

MacVoices Audio

Play Episode Listen Later Feb 10, 2025 27:41


Host Chuck Joiner shares the lessons from a scam story, then the panel of David Ginsburg, Brian Flanigan-Arthurs, Marty Jencius, Eric Bolden, Guy Serle, Jim Rea, and Web Bixby join in a discussion of the just-released Invites app by Apple. What are the benefits of operating inside the Apple ecosystem? How does it play with Android users? Wrapping up the conversation is a look at the recent quarterly Apple earnings call and what the results say about the past and the future.  This edition of MacVoices is brought to you by our Patreon supporters. Get access to the MacVoices Slack and MacVoices After Dark by joining in at Patreon.com/macvoices. Show Notes: Chapters: 00:11 Welcome to MacVoices 02:05 Scam Awareness 06:36 New Apple Invites App 21:02 Apple Earnings Call Insights Links: Apple's reports record revenue for Q1 2025 (with charts) https://sixcolors.com/post/2025/01/apples-reports-record-revenue-for-q1-2025/Apple Continues to Be the World's Most Admired Company https://www.macrumors.com/2025/01/30/apple-continues-as-most-admired-company/ Guests: Web Bixby has been in the insurance business for 40 years and has been an Apple user for longer than that.You can catch up with him on Facebook, Twitter, and LinkedIn. Eric Bolden is into macOS, plants, sci-fi, food, and is a rural internet supporter. You can connect with him on Twitter, by email at embolden@mac.com, on Mastodon at @eabolden@techhub.social, on his blog, Trending At Work, and as co-host on The Vision ProFiles podcast. Brian Flanigan-Arthurs is an educator with a passion for providing results-driven, innovative learning strategies for all students, but particularly those who are at-risk. He is also a tech enthusiast who has a particular affinity for Apple since he first used the Apple IIGS as a student. You can contact Brian on twitter as @brian8944. He also recently opened a Mastodon account at @brian8944@mastodon.cloud. David Ginsburg is the host of the weekly podcast In Touch With iOS where he discusses all things iOS, iPhone, iPad, Apple TV, Apple Watch, and related technologies. He is an IT professional supporting Mac, iOS and Windows users. Visit his YouTube channel at https://youtube.com/daveg65 and find and follow him on Twitter @daveg65 and on Mastodon at @daveg65@mastodon.cloud. Dr. Marty Jencius has been an Associate Professor of Counseling at Kent State University since 2000. He has over 120 publications in books, chapters, journal articles, and others, along with 200 podcasts related to counseling, counselor education, and faculty life. His technology interest led him to develop the counseling profession ‘firsts,' including listservs, a web-based peer-reviewed journal, The Journal of Technology in Counseling, teaching and conferencing in virtual worlds as the founder of Counselor Education in Second Life, and podcast founder/producer of CounselorAudioSource.net and ThePodTalk.net. Currently, he produces a podcast about counseling and life questions, the Circular Firing Squad, and digital video interviews with legacies capturing the history of the counseling field. This is also co-host of The Vision ProFiles podcast. Generally, Marty is chasing the newest tech trends, which explains his interest in A.I. for teaching, research, and productivity. Marty is an active presenter and past president of the NorthEast Ohio Apple Corp (NEOAC). Jim Rea built his own computer from scratch in 1975, started programming in 1977, and has been an independent Mac developer continuously since 1984. He is the founder of ProVUE Development, and the author of Panorama X, ProVUE's ultra fast RAM based database software for the macOS platform. He's been a speaker at MacTech, MacWorld Expo and other industry conferences. Follow Jim at provue.com and via @provuejim@techhub.social on Mastodon. Guy Serle, best known for being one of the co-hosts of the MyMac Podcast, sincerely apologizes for anything he has done or caused to have happened while in possession of dangerous podcasting equipment. He should know better but being a blonde from Florida means he's probably incapable of understanding the damage he has wrought. Guy is also the author of the novel, The Maltese Cube. You can follow his exploits on Twitter, catch him on Mac to the Future on Facebook, at @Macparrot@mastodon.social, and find everything at VertShark.com. Support:      Become a MacVoices Patron on Patreon      http://patreon.com/macvoices      Enjoy this episode? Make a one-time donation with PayPal Connect:      Web:      http://macvoices.com      Twitter:      http://www.twitter.com/chuckjoiner      http://www.twitter.com/macvoices      Mastodon:      https://mastodon.cloud/@chuckjoiner      Facebook:      http://www.facebook.com/chuck.joiner      MacVoices Page on Facebook:      http://www.facebook.com/macvoices/      MacVoices Group on Facebook:      http://www.facebook.com/groups/macvoice      LinkedIn:      https://www.linkedin.com/in/chuckjoiner/      Instagram:      https://www.instagram.com/chuckjoiner/ Subscribe:      Audio in iTunes      Video in iTunes      Subscribe manually via iTunes or any podcatcher:      Audio: http://www.macvoices.com/rss/macvoicesrss      Video: http://www.macvoices.com/rss/macvoicesvideorss

Cyber Security Today
Sneaky 2FA Attacks Microsoft 365 Users Breaking Two Factor Authentication (2FA): Cyber Security Today Monday January 20, 2025

Cyber Security Today

Play Episode Listen Later Jan 20, 2025 5:57 Transcription Available


Cybersecurity Today: Sneaky 2FA Phishing Attack & AI-Powered Scams In this episode of Cybersecurity Today, host Jim Love explores the emergence of Sneaky 2FA, a new phishing-as-a-service attack that compromises two-factor authentication for Microsoft 365 users. The episode also covers a legal case where a scam led a Western Australian company to lose $190,000, underscoring the importance of robust payment verification processes. The discussion extends to AI-powered romance scams, featuring deep fake technology that has defrauded victims worldwide, highlighting the growing need for advanced fraud detection and awareness. 00:00 Introduction to Cybersecurity Threats 00:23 Sneaky 2FA: A New Phishing Threat 01:54 Legal Consequences of Email Scams 03:34 AI-Powered Romance Scams 05:34 Conclusion and Contact Information

UBC News World
Trezor Model T Two-Factor Authentication Tool Explained For New Crypto Traders

UBC News World

Play Episode Listen Later Dec 12, 2024 2:42


Password manager. Two-factor authentication. These are the features you must master if you want to unlock the full powers of your Trezor Model T - and The Crypto Merchant can show you how it's done. Click https://www.thecryptomerchant.com/blogs/resources/how-to-use-the-trezor-model-t-as-a-password-manager-and-a-second-factor-authentication-device now! The Crypto Merchant City: Daytona Beach Address: 609 South Ridgewood Avenue Website: https://www.thecryptomerchant.com/

Cyber Security Today
Cyber Security Today Weekend Panel: Month In Review, December 7th, 2024

Cyber Security Today

Play Episode Listen Later Dec 7, 2024 57:47 Transcription Available


Cyber Security Today: Navigating Novel Phishing Campaigns and Ransomware Tactics Join host Jim Love and the Cyber Security Today panel featuring Terry Cutler of Cyology Labs, David Shipley of Beauceron Security, and cybersecurity executive John Pinard. In this episode, they delve into pressing cybersecurity challenges such as novel phishing tactics using corrupted Word documents, the importance of robust offboarding processes in light of breaches at major companies like Disney, and the ramifications of a major ransomware attack on the City of Hamilton. Topics also include the recurring issue of session cookie theft, the implications of third-party cybersecurity risk as seen in the Blue Yonder ransomware attack impacting Starbucks, and the rise of hacktivism. Tune in for valuable insights and discussions aimed at improving cybersecurity measures in an ever-evolving threat landscape. 00:00 Introduction and Panelist Introductions 00:40 David Shipley's Cyber Risk Talk 02:39 Novel Phishing Campaign Discussion 06:08 Fileless Malware and Human Error 10:44 Offboarding and Internal Audits 19:48 Vendor Responsibility and Ransomware 27:06 City of Hamilton Cyber Attack 28:19 Keynote Talks and Cybersecurity Challenges 29:30 The Reality of Cyber Attacks 29:46 Ransomware and Business Email Compromise 31:21 Cyber Insurance and Its Pitfalls 32:44 Andrew Tate Hack and Hacktivism 36:04 Chinese State-Sponsored Hacks 41:26 Canadian Cybersecurity Issues 44:53 Session Cookies and Two-Factor Authentication 49:45 AI in Software Development 56:42 Concluding Thoughts and Final Remarks

HeroicStories
How to Add Two-Factor Authentication to Your Google Account

HeroicStories

Play Episode Listen Later Nov 16, 2024 9:54


Adding the most common and secure form of two-factor authentication to your account.

Unsupervised Learning
A Conversation with Jason Haddix from Flare

Unsupervised Learning

Play Episode Listen Later Nov 11, 2024 30:11 Transcription Available


Streamline Your Cybersecurity with Flare Here: https://try.flare.io/unsupervised-learning/ In this conversation, I speak with Jason Haddix, founder of Arcanum Security and CISO at Flare. We talk about: Flare's Unique Approach to Threat Intelligence:How Flare's capability to uncover compromised credentials and cookies from the dark web and private forums has been crucial in red team engagements. Challenges of Credential Theft and Advanced Malware Techniques:How adversaries utilize tools like the RedLine Stealer malware to gather credentials, cookies, and other sensitive information, and this stolen data enables attackers to bypass authentication protocols, emphasizing the need for comprehensive exposure management. Jason's Journey To Founding Arcanum & Arcanum's Security Training Programs:How Jason now advises on product development and threat intelligence as Flare's CISO and his journey to fund Arcanum, a company focused on red teaming and cybersecurity, and Arcanum's specialized training programs focusing on offensive security and using AI in security roles.  And more Introduction to the Podcast (00:00:00)Guest Excitement on Podcast (00:00:20)Jason's New Business and Flare Role (00:00:24)Career Shift from Ubisoft to Red Teaming (00:01:02)Evolution of Adversary Tactics (00:02:04)Flare's Credential Exposure Management (00:02:58)Synergy Between Arcanum and Flare(00:03:55)Dark Web Credential Compromise (00:04:45)Challenges with Two-Factor Authentication (00:06:25)Cookie Theft and Unauthorized Access (00:07:39)Redline Malware and Its Impact (00:08:12)Flare's Research Capabilities (00:09:50)Potential for Advanced Malware Detection (00:11:40)Expansion of Threat Intelligence Services (00:12:15)Vision for a Unified Security Dashboard (00:13:25)Integrating Threat Intelligence with Identity Management (00:14:00)Credential Update Notifications via API (00:15:54)Automated Credential Management Potential (00:17:28)AI Features in Security Platforms (00:17:32)Exploration of Automated Security Responses (00:18:38)Introduction to Arcanum Security (00:19:25)Overview of Arcanum Training Courses (00:20:25)Necessity for Up-to-Date Training (00:22:15)Guest Experts in Training Sessions (00:23:08)Upcoming Features for Flare (00:25:11)Integrating Vulnerability Management (00:28:08)Accessing Flare's Free Trial (00:28:25)Learning More About Arcanum (00:29:09)Become a Member: https://danielmiessler.com/upgradeSee omnystudio.com/listener for privacy information.

Secrets To Scaling Online
Ep 596: TikTok Shop Halo Effect - How It Works And Why with Mina Elias, Trivium Group LLC

Secrets To Scaling Online

Play Episode Listen Later Oct 31, 2024 39:37


Send us a textIn the dynamic landscape of online business, scaling your brand isn't just an ambition—it's an art. If you've achieved the remarkable milestone of 6 to 8-figure sales, you're on the brink of something even bigger. Your story is already impressive, but imagine where it could lead with the right guidance.In this episode, Jordan West with Mina Elias gets into the fascinating world of personal branding and the revolutionary impact of TikTok Shop on ecommerce. We'll explore the critical importance of building a personal brand and how it can open doors to incredible business opportunities. We'll also touch on essential strategies for account security, the evolving landscape of influencer marketing, and how companies are navigating challenges and seizing opportunities in the ever-changing digital marketplace. Listen and learn in this episode!Key takeaways from this episode:Personal Branding: Essential for building trust and reducing traditional sales needs. It's crucial for business growth and opportunities.Account Security: Importance of secure practices like two-factor authentication, shared through personal experiences of account issues.TikTok Shop Potential: Offers significant brand exposure despite fulfillment challenges. Impactful marketing focus over precise tracking.Talent Management: Prioritize hiring top talent and improving team performance. Understand weaknesses before outsourcing.Shifting Lead Platforms: Post-pandemic shift toward YouTube and LinkedIn over podcasts for lead generation.Marketing Strategies: Effective use of influencer and user-generated content marketing for brand growth.Strategic Partnerships: Be selective with partnerships to protect brand reputation and ensure impactful collaborations.Operational Challenges: TikTok Shop's fulfillment needs improvement for enhanced performance on other platforms like Amazon.Today's Guest: Mina Elias, Founder & CEO of Trivium - is connected with Trivium, where he provides resources and assistance for Amazon sellers. He is a chemical engineer with a master's degree, an MMA fighter, and an expert in ecommerce, particularly in leveraging platforms like Amazon and TikTok Shop for business growth.Growth Plan: www.upgrowthcommerce.com/growMillion Dollar Offers: www.upgrowthcommerce.com/growIn this episode's sponsor is Particl - a decentralized marketplace built on blockchain. With privacy at its core, Particl allows users to anonymously buy and sell goods using its cryptocurrency, PART. No middlemen, no extra fees—just secure, encrypted, peer-to-peer transactions. Learn how Particl is revolutionizing e-commerce with its unique focus on security and privacy. Learn more here: Particl

Agent Survival Guide Podcast
Simplify Marketplace Enrollments with HealthSherpa

Agent Survival Guide Podcast

Play Episode Listen Later Oct 29, 2024 10:54


  There's more than one way to enroll clients into marketplace plans. Learn the advantages of using HealthSherpa as your ACA enrollment platform in this episode!    Read the text version    The Complete Guide to Selling Affordable Care Act Insurance Plans FREE eBook Download: https://ritterim.com/aca-ebook/   Contact the Agent Survival Guide Podcast! Email us ASGPodcast@Ritterim.com or call 1-717-562-7211 and leave a voicemail.   Resources: 5 Myths About Selling ACA Health Plans: https://ritterim.com/blog/5-myths-about-selling-aca-health-plans/ ACA 101:Selling Under-65 Health Insurance: https://link.chtbl.com/ASG6248 Carriers & Products with Ritter: https://ritterim.com/products/by-carrier/ Create a HealthSherpa Account Through Ritter: https://docs.ritterim.com/products/under-65-health/#create-a-healthsherpa-account FAQs About Selling On-Exchange & Off-Exchange Under-65 Plans: https://ritterim.com/blog/faqs-about-selling-on-exchange-off-exchange-under-65-plans/ How Agents Can Protect Clients from Unauthorized ACA Plan Switching: https://ritterim.com/blog/how-agents-can-protect-clients-from-unauthorized-aca-plan-switching/ Key Changes for ACA Open Enrollment 2025 ft. Ross Baker from HealthSherpa: https://link.chtbl.com/ASG2024RossBaker Meet Your Sales Team: https://ritterim.com/meet-your-sales-team/ New Required Document Agents Need for ACA Sales: https://ritterim.com/blog/new-required-documents-agents-need-for-aca-sales/ Register with Ritter Insurance Marketing: https://app.ritterim.com/public/registration/   References: “Agent Help Center.” HealthSherpa Help Center, HealthSherpa, www.faq.healthsherpa.com/en/collections/166253-agent-help-center. Accessed 21 Oct. 2024. “Direct Enrollment and Enhanced Direct Enrollment.” CMS.Gov, Centers for Medicare & Medicaid Services, www.cms.gov/marketplace/agents-brokers/direct-enrollment-partners. Accessed 21 Oct. 2024. “Enhanced Direct Enrollment.” HealthSherpa, www.healthsherpa.com/ede. Accessed 21 Oct. 2024. “Free Preventive Care & the Affordable Care Act.” HealthSherpa, www.healthsherpa.com/preventive-care-services. Accessed 21 Oct. 2024. “HealthSherpa Privacy Notice.” HealthSherpa, 5 Oct. 2020, www.healthsherpa.com/privacy_notice. “Maximize Your ACA Revenue with HealthSherpa.” HealthSherpa, www.healthsherpa.com/carrier. Accessed 21 Oct. 2024. “Member Defense Network: Ensuring Health Insurance Marketplace Integrity.” Member Defense Network, www.memberdefense.org/. Accessed 21 Oct. 2024. “Secure Your ACA Book with Two-Factor Authentication.” HealthSherpa Blog, HealthSherpa, https://blog.healthsherpa.com/agents/agent-2fa/. Accessed 21 Oct. 2024. “Welcome to the Health Insurance Marketplace®.” HealthCare.Gov, www.healthcare.gov/. Accessed 21 Oct. 2024. “Work your ACA book faster and easier.” HealthSherpa, www.healthsherpa.com/agents/features. Accessed 21 Oct. 2024.   Follow Us on Social!  Ritter on Facebook, https://www.facebook.com/RitterIM Instagram, https://www.instagram.com/ritter.insurance.marketing/ LinkedIn, https://www.linkedin.com/company/ritter-insurance-marketing TikTok, https://www.tiktok.com/@ritterim X, https://twitter.com/RitterIM and Youtube, https://www.youtube.com/user/RitterInsurance     Sarah on LinkedIn, https://www.linkedin.com/in/sjrueppel/ Instagram, https://www.instagram.com/thesarahjrueppel/ and Threads, https://www.threads.net/@thesarahjrueppel  Tina on LinkedIn, https://www.linkedin.com/in/tina-lamoreux-6384b7199/

HeroicStories
Is a Passkey Two-Factor Authentication?

HeroicStories

Play Episode Listen Later Oct 9, 2024 8:20


Passkeys are secure, but they're not two-factor authentication in and of themselves. I'll run the scenarios that explain why that is and when 2FA might be involved as well.

NJCPA IssuesWatch Podcast
271: Protecting Yourself from Two-Factor Authentication Fraud

NJCPA IssuesWatch Podcast

Play Episode Listen Later Oct 8, 2024 21:51


Two-factor authentication (2FA) is a powerful anti-fraud, anti-hacking tool. But it can also be used against you – as NJCPA member Sean Stein Smith, CPA, recently found out firsthand. Hear about Sean's story and find out steps you can take to protect yourself.  Resources: Speaking with Clients about 2FA Fraud PreventionFraud Prevention Knowledge Hub

WordPress | Post Status Draft Podcast
Post Status Happiness Hour | Session Eleven

WordPress | Post Status Draft Podcast

Play Episode Listen Later Oct 4, 2024 50:45


In this episode of the Post Status Happiness Hour, host Michelle Frechette interviews Robert Abela from Melapress to discuss WordPress security. They emphasize the importance of adopting security best practices, the challenges faced by website administrators, and the critical role of user training in preventing breaches. Robert shares insights from a survey by Mala Press, revealing common security issues and misconceptions. They explore authentication methods like two-factor authentication (2FA) and passkeys, stressing the need for continuous education and awareness. The episode underscores that human error often contributes to vulnerabilities, highlighting the necessity of proactive security measures.Top Takeaways:Use Password Managers for Stronger Security: Both emphasize the importance of strong, unique passwords across different platforms. Using a password manager simplifies this  process, generating and securely storing passwords, which helps users avoid the common mistake of reusing passwords across multiple accounts.Auto-Updates Are Essential but Need Careful Implementation: Auto-updates in WordPress, especially for minor updates, are crucial for keeping websites secure. However, using a staging environment to test updates before applying them to a live site is a best practice. It ensures that any potential issues can be resolved without affecting the live site.Backups Are a Must-Have: Regular backups are vital for website security and recovery. Although backups are not always seen as part of security, they play a crucial role in recovering from incidents like hacking or failed updates. Many web hosts offer backup services, making it easy to implement.Outsourcing Security Can Be Beneficial for Non-Technical Users: Businesses without technical expertise (e.g., small shops or bakeries) may benefit from outsourcing website management to agencies. These agencies have experience with hundreds of websites and can handle security updates and maintenance more efficiently, reducing the risk of security breaches.Proactive Security Measures Are Key: The conversation stresses the importance of proactive security practices. Having security solutions, policies, and a recovery plan in place before a security breach occurs is critical. Waiting until after a breach happens can result in higher costs, operational downtime, and damage to reputation.Mentioned In The Show:WordCampWordPressKathy Zant Nathan Ingram Black HatGive WPLiquid WebWP Accessibility DayTopher DeRosiaCate DeRosiaHero Press

Cyber Rants - The Refreshingly Real Cybersecurity Podcast
Episode #124: Urgent Release - Major Two Factor Authentication Vulnerability Discovered

Cyber Rants - The Refreshingly Real Cybersecurity Podcast

Play Episode Listen Later Sep 25, 2024 42:06


In this urgent episode, the Cyber Rants crew welcomes Silent Sector's Principal Cybersecurity Architect, Brian Contario, to discuss his game-changing discovery of a critical vulnerability in the Two-Factor Authentication Enrollment Process. This vulnerability has the potential to impact hundreds of millions of accounts globally and poses a serious threat to IT infrastructures everywhere. Brian and the team break down why this finding is not just another CVE but a pivotal moment that will require swift action from software vendors to update their 2FA Enrollment Process. Tune in to learn what steps IT professionals must take now to protect their organizations from a new wave of attacks and where you can find additional resources, including the IETF Request For Comments Draft. This is a must-listen episode for anyone serious about safeguarding their systems!More information: https://silentsector.com/2faIETF Request for Comments Draft: https://datatracker.ietf.org/doc/html/draft-contario-totp-secure-enrollment

WordPress | Post Status Draft Podcast
Post Status Happiness Hour | Session Two

WordPress | Post Status Draft Podcast

Play Episode Listen Later Jul 26, 2024 50:04


In this podcast episode of the Post Status Happiness Hour, Michelle Frechette is joined by her friend and WordPress security expert, Kathy Zant. They delve into various aspects of website security, focusing on WordPress. Kathy discusses her recent security courses aimed at demystifying WordPress for beginners and emphasizes the importance of proactive security measures. They highlight the critical role of regular backups and the potential risks of automated updates. Kathy shares practical security tips, such as using strong passwords and enabling two-factor authentication. The episode is both informative and engaging, filled with personal anecdotes and humor, making it a valuable resource for listeners.Top Takeaways: Importance of Security: Both Michelle and Kathy emphasize the importance of understanding and implementing robust security measures to protect websites from hacks.Criminal Behavior: Kathy highlights that criminals (including hackers) often look for the easiest targets. If a website or home has visible security measures, they are more likely to move on to an easier target. However, if a determined attacker sees something of value, they might still find a way in despite the security measures.Auto Updates: Kathy advises against relying solely on automated updates, especially for websites that are crucial for business. She recommends a process of updating on a staging environment first, ensuring everything works, and then updating the production site. She highlights real-world scenarios where automated updates have caused issues, leading to downtime and confusion over whether a site was hacked or simply experiencing an update-related error.Content Creation and Community Engagement:Kathy discusses her responsibilities at Motivation Code, including managing content across different platforms and facilitating challenges to foster community interaction. Despite facing technical challenges with platforms like LinkedIn, she remains committed to creating engaging content and moving activities to more effective platforms like Facebook.Mentioned In The Show:ShopifyWixSquarespaceMotivation Code CrowdStrike StellarWPWordCamp USNathan IngramMark WestguardKathy's website

The Daily Decrypt - Cyber News and Discussions
WUKY: Two-factor authentication could have prevented AT&T data breach

The Daily Decrypt - Cyber News and Discussions

Play Episode Listen Later Jul 19, 2024


Show Notes In this episode of WUKY News, host Clay Wallace sits down with cybersecurity expert Colin to discuss a recent breach affecting AT&T customers. Earlier this year, cybercriminals accessed metadata from AT&T customers, detailing the numbers they interacted with, the frequency of texts, and call durations. Although the breach did not include message content or personal information, it highlights significant vulnerabilities in cloud security. AT&T recently informed customers that while the data breach occurred, there is no evidence of the data being publicly released or used illegally. The compromised metadata includes phone numbers and interaction records from May 1st to October 31st, 2022. Colin, a security software developer and host of the Daily Decrypt podcast, explains that this breach is part of a larger issue stemming from increased reliance on cloud storage. He emphasizes that while the cloud is often considered cheaper, more flexible, and more secure, storing data with third-party cloud services shifts the responsibility for data security. Companies like AT&T, Advanced Auto Parts, and Ticketmaster, which also faced breaches, stored data on the cloud service provider Snowflake. Many organizations created accounts with just usernames and passwords, neglecting additional security measures. Cybercriminals exploited this by purchasing stolen login credentials from the dark web and using them to access Snowflake accounts. details how phishing attacks can lead to info-stealer malware, which captures login credentials. Without multi-factor authentication (MFA), these credentials can be easily misused. He stresses that if MFA had been enabled, the breaches could have been prevented as unauthorized login attempts would have been flagged. For over 160 companies using Snowflake, the lack of MFA led to significant data breaches, including customer records from AT&T, Taylor Swift tickets from Ticketmaster, and social security numbers from Advance Auto Parts. Snowflake has since mandated MFA for all new customers. Colin offers advice on basic data protection steps, such as using end-to-end encrypted messaging services and being cautious about the amount of personal information shared with companies. Ultimately, he advocates for stricter regulations to protect user data, calling for legislative action and involvement from bodies like the SEC to ensure companies implement robust security measures, including multiple forms of authentication and physical encryption keys. https://www.wuky.org/local-regional-news/2024-07-18/two-factor-authentication-could-have-prevented-at-t-data-breach-affecting-110-million-customers Tags metadata breach, AT&T data breach, cybersecurity, cloud security, multi-factor authentication, data protection, regulatory measures, Snowflake compromise, data breach prevention Search Phrases AT&T metadata breach 2024 Snowflake cloud security breach Multi-factor authentication importance Cybercriminals accessing metadata Cloud storage security risks Protecting user data in the cloud Regulatory measures for data protection Steps to prevent data breaches

SoundBytes
TWO-FACTOR AUTHENTICATION SCAMS!

SoundBytes

Play Episode Listen Later Jul 8, 2024 1:01


Two-Factor authentication helps security but scammers are trying to find ways around it! The post TWO-FACTOR AUTHENTICATION SCAMS! appeared first on sound*bytes.

Invest In Yourself: The Digital Entrepreneur Podcast
Megan Shields on Scaling Podcast Growth with Facebook Ads

Invest In Yourself: The Digital Entrepreneur Podcast

Play Episode Listen Later Jun 21, 2024 30:06


In this electrifying episode of "Invest In Yourself: the Digital Entrepreneur Podcast," host Phil Better sits down with Megan Shields, the visionary CEO of Chime House Media. Discover how Megan pivoted from sales to launching a successful boutique Facebook ad agency in 2020, designed to catapult podcasters into exponential growth. Megan shares her transformative strategies for utilizing Facebook and Instagram to build highly engaged audiences, driving significant growth in podcast plays, followers, and email lists. Listen as she breaks down her acclaimed 4-module Facebook ads course, perfected through beta testing, offering a concise and practical approach to ad strategies. Megan also reveals her VIP Day program for hands-on, one-on-one coaching, and implementation. Don't miss Megan's invaluable advice on fraud prevention, essential mindset tips, and her vision for Chime House Media. Plus, get insider tips on making the most of your ad investments. Tune in to enhance your podcasting journey today!

The Treasury Update Podcast
Coffee Break Session #112: What Is Authentication?

The Treasury Update Podcast

Play Episode Listen Later Jun 20, 2024 7:56


In today's podcast, we'll hear from Christin Cifaldi, Director of Product Development & Analytics, discussing authentication in digital systems. What is authentication, and why is it crucial? Tune in to find out.

Explain Like I'm Five - ELI5 Mini Podcast
ELI5 Two Factor Authentication - how are authenticator apps more secure than SMS?

Explain Like I'm Five - ELI5 Mini Podcast

Play Episode Listen Later Jun 14, 2024 8:00


How did we go from secret handshakes to digital codes? Explain “something you know, something you have, and something you are”. Where was the first computer password invented? Why are SMS codes considered not that secure? Which former CIA director had their phone compromised via a teenage phone hack? ... we explain like I'm five Thank you to the r/explainlikeimfive community and in particular the following users whose questions and comments formed the basis of this discussion: aschentei, nottherealslash, elskerelks, mazaru , dissentologist and trueeyes To the ELI5 community that has supported us so far, thanks for all your feedback and comments. Join us on Twitter: https://www.twitter.com/eli5ThePodcast/ or send us an e-mail: ELI5ThePodcast@gmail.com

The Guy R Cook Report - Got a Minute?
How to easily secure your WordPress Website with Two-Factor Authentication

The Guy R Cook Report - Got a Minute?

Play Episode Listen Later May 24, 2024 3:08


Got a Minute? Checkout today's episode of The Guy R Cook Report podcast - the Google Doc for this episode is @ How to easily secure your WordPress Website with Two-Factor Authentication ----more---- Support this podcast Subscribe where you listen to podcasts I help goal oriented business owners that run established companies to leverage the power of the internet Contact Guy R Cook @ https://guyrcook.com In the meantime, go ahead follow me on X: @guyrcookreport Click to Post Be a patron of The Guy R Cook Report. Your help is appreciated. Contact Guy R Cook Follow The Guy R Cook Report on Podbean iPhone and Android App | Podbean   https://bit.ly/3m6TJDV Thanks for listening, viewing or reading the show notes for this episode. This episode of The Guy R Cook Report is on YouTube too @ This episode of The Guy R Cook Report Have a great new year, and hopefully your efforts to Entertain, Educate, Convince or Inspire are in play vDomainHosting, Inc 3110 S Neel Place Kennewick, WA 509-200-1429

ITSPmagazine | Technology. Cybersecurity. Society
Simplifying Identity Management in 2024: A Deep Dive into Latest Research about IT and the Role of MSPs | A JumpCloud Brand Story with Chase Doelling

ITSPmagazine | Technology. Cybersecurity. Society

Play Episode Listen Later May 6, 2024 39:07


In an enlightening discussion on ITSP Magazine, Sean Martin, a seasoned voice in the technology space, dives into the evolving realm of identity management with Chase Doelling, Principal Strategist at JumpCloud. This conversation sheds light on the operational challenges organizations face in today's complex digital landscapes and how identity management stands at the core of addressing these issues. Below, we unpack the essentials of this dialogue, offering insights into identity management's current state, its implications for businesses, and how JumpCloud is pioneering solutions to streamline and secure identity management.The Evolution of Identity Management and Its Current ChallengesThe conversation begins with an exploration of the journey to the present state of identity management, particularly in the context of hybrid cloud environments. Sean and Chase navigate the history and complexities that have led to the current landscape, emphasizing how identity management has become central to enabling business operations, securing revenue, protecting against cyber threats, and facilitating growth.Chase Doelling articulates the paradox of identity management: when it's functioning seamlessly, it's virtually invisible to organizations, yet it's fundamental to the operational, security, and business continuity of any organization. The discussion highlights how the COVID-19 pandemic has accelerated the shift toward remote work, intensifying the focus on identity management as organizations navigate the challenges of a global, hybrid workforce.The Integral Role of Identity in Modern OrganizationsThe conversation shifts to how identity management, viewed as the hub around which all tech solutions revolve, has evolved. Over the years, the perception of identity management has oscillated between being a centerpiece and receding into the backdrop. However, with increasing cybersecurity threats and the adoption of multi-cloud environments, identity management is now more crucial than ever.Doelling vividly illustrates the concept of identity being at the core of operational enablement, drawing parallels to how it grants access and interconnectivity within the organizational ecosystem. This section of the dialogue underscores the critical nature of identity management in enabling access to resources, ensuring security, and fostering operational efficiency.JumpCloud's Role in Shaping the Future of Identity ManagementAs the discussion unfolds, the spotlight turns to JumpCloud and its innovative approach to identity management. Sean Martin probes into how JumpCloud's solutions are designed to address the multifaceted challenges businesses face today. Chase Doelling provides a comprehensive overview of JumpCloud's role in redefining identity management, detailing how their platform aids organizations in overcoming operational hurdles through seamless identity and access management across cloud environments.JumpCloud's solution is presented as a robust platform that integrates digital identity management with device management, offering a unified approach to secure access across various applications and systems. This integration is crucial for enabling passwordless access, simplifying onboarding and offboarding processes, and enhancing overall security posture.Evolving with Identity Management: Insights and Future DirectionsIn concluding the conversation, Doelling emphasizes the importance of a proactive and curious mindset towards identity management. He encourages organizations to re-evaluate their approach to identity management, considering its central role in ensuring operational resilience, security, and scalability. The discussion ends with a forward-looking perspective, highlighting the need for organizations to adapt and evolve with the trends in identity management to stay competitive and secure in the digital age.This insightful episode with Chase Doelling not only highlights the critical role of identity management in today's digital landscape but also showcases how JumpCloud is at the forefront of innovating solutions that enable businesses to navigate the complexities of modern IT environments. As organizations continue to face evolving challenges, adopting a cohesive and integrated approach to identity management will be key to ensuring operational efficiency, security, and business growth in 2024 and beyond.Note: This story contains promotional content. Learn more. Guest: Chase Doelling, Principal Strategist, JumpCloud [@JumpCloud]On LinkedIn | https://www.linkedin.com/in/chasedoelling/ResourcesLearn more about JumpCloud and their offering: https://itspm.ag/jumpcloud-pg7zCatch more stories from JumpCloud at https://www.itspmagazine.com/directory/jumpcloudAre you interested in telling your story?https://www.itspmagazine.com/telling-your-story

Redefining CyberSecurity
Simplifying Identity Management in 2024: A Deep Dive into Latest Research about IT and the Role of MSPs | A JumpCloud Brand Story with Chase Doelling

Redefining CyberSecurity

Play Episode Listen Later May 6, 2024 39:07


In an enlightening discussion on ITSP Magazine, Sean Martin, a seasoned voice in the technology space, dives into the evolving realm of identity management with Chase Doelling, Principal Strategist at JumpCloud. This conversation sheds light on the operational challenges organizations face in today's complex digital landscapes and how identity management stands at the core of addressing these issues. Below, we unpack the essentials of this dialogue, offering insights into identity management's current state, its implications for businesses, and how JumpCloud is pioneering solutions to streamline and secure identity management.The Evolution of Identity Management and Its Current ChallengesThe conversation begins with an exploration of the journey to the present state of identity management, particularly in the context of hybrid cloud environments. Sean and Chase navigate the history and complexities that have led to the current landscape, emphasizing how identity management has become central to enabling business operations, securing revenue, protecting against cyber threats, and facilitating growth.Chase Doelling articulates the paradox of identity management: when it's functioning seamlessly, it's virtually invisible to organizations, yet it's fundamental to the operational, security, and business continuity of any organization. The discussion highlights how the COVID-19 pandemic has accelerated the shift toward remote work, intensifying the focus on identity management as organizations navigate the challenges of a global, hybrid workforce.The Integral Role of Identity in Modern OrganizationsThe conversation shifts to how identity management, viewed as the hub around which all tech solutions revolve, has evolved. Over the years, the perception of identity management has oscillated between being a centerpiece and receding into the backdrop. However, with increasing cybersecurity threats and the adoption of multi-cloud environments, identity management is now more crucial than ever.Doelling vividly illustrates the concept of identity being at the core of operational enablement, drawing parallels to how it grants access and interconnectivity within the organizational ecosystem. This section of the dialogue underscores the critical nature of identity management in enabling access to resources, ensuring security, and fostering operational efficiency.JumpCloud's Role in Shaping the Future of Identity ManagementAs the discussion unfolds, the spotlight turns to JumpCloud and its innovative approach to identity management. Sean Martin probes into how JumpCloud's solutions are designed to address the multifaceted challenges businesses face today. Chase Doelling provides a comprehensive overview of JumpCloud's role in redefining identity management, detailing how their platform aids organizations in overcoming operational hurdles through seamless identity and access management across cloud environments.JumpCloud's solution is presented as a robust platform that integrates digital identity management with device management, offering a unified approach to secure access across various applications and systems. This integration is crucial for enabling passwordless access, simplifying onboarding and offboarding processes, and enhancing overall security posture.Evolving with Identity Management: Insights and Future DirectionsIn concluding the conversation, Doelling emphasizes the importance of a proactive and curious mindset towards identity management. He encourages organizations to re-evaluate their approach to identity management, considering its central role in ensuring operational resilience, security, and scalability. The discussion ends with a forward-looking perspective, highlighting the need for organizations to adapt and evolve with the trends in identity management to stay competitive and secure in the digital age.This insightful episode with Chase Doelling not only highlights the critical role of identity management in today's digital landscape but also showcases how JumpCloud is at the forefront of innovating solutions that enable businesses to navigate the complexities of modern IT environments. As organizations continue to face evolving challenges, adopting a cohesive and integrated approach to identity management will be key to ensuring operational efficiency, security, and business growth in 2024 and beyond.Note: This story contains promotional content. Learn more. Guest: Chase Doelling, Principal Strategist, JumpCloud [@JumpCloud]On LinkedIn | https://www.linkedin.com/in/chasedoelling/ResourcesLearn more about JumpCloud and their offering: https://itspm.ag/jumpcloud-pg7zCatch more stories from JumpCloud at https://www.itspmagazine.com/directory/jumpcloudAre you interested in telling your story?https://www.itspmagazine.com/telling-your-story

Hashtag Trending
Google's two factor authentication is broken? Hashtag Trending, Monday April 14th, 2024

Hashtag Trending

Play Episode Listen Later Apr 15, 2024 11:28 Transcription Available


Google Enhances Browser Security with AI and announces a New Paid 'Premium' Version, Google users report account lock outs that beat their two factor authentication. Google Blocks California News Access Amid Fight Over a Journalism Payment Bill and Gen Z Ditching Google for TikTok and YouTube Searches** All this and more on the “too much Google” edition of Hashtag Trending. I'm your host, Jim Love.

WIRED Security: News, Advice, and More
How to Turn Off Facebook's Two-Factor Authentication Change

WIRED Security: News, Advice, and More

Play Episode Listen Later Mar 14, 2024 5:30


With Meta's updated 2FA process, the company now automatically trusts devices you often use. Read this story here. Learn more about your ad choices. Visit megaphone.fm/adchoices

Paul's Security Weekly
Two-Factor Authentication - SWN Vault

Paul's Security Weekly

Play Episode Listen Later Feb 23, 2024 31:43


Check out this interview from the SWN Vault, hand picked by main host Doug White! This segment was originally published on November 2, 2018. This week, Dr. Doug and Russ talk about the mysterious world of Two-Factor Authentication. This is something you hear all the time, and more and more sites are requiring and supporting it. The real question is, should you be using it? Show Notes: https://securityweekly.com/vault-swn-12

Paul's Security Weekly TV
Two-Factor Authentication - SWN Vault

Paul's Security Weekly TV

Play Episode Listen Later Feb 23, 2024 31:43


Check out this interview from the SWN Vault, hand picked by main host Doug White! This segment was originally published on November 2, 2018. This week, Dr. Doug and Russ talk about the mysterious world of Two-Factor Authentication. This is something you hear all the time, and more and more sites are requiring and supporting it. The real question is, should you be using it? Show Notes: https://securityweekly.com/vault-swn-12

Hack Naked News (Audio)
Two-Factor Authentication - SWN Vault

Hack Naked News (Audio)

Play Episode Listen Later Feb 23, 2024 31:43


Check out this interview from the SWN Vault, hand picked by main host Doug White! This segment was originally published on November 2, 2018. This week, Dr. Doug and Russ talk about the mysterious world of Two-Factor Authentication. This is something you hear all the time, and more and more sites are requiring and supporting it. The real question is, should you be using it? Show Notes: https://securityweekly.com/vault-swn-12

Hack Naked News (Video)
Two-Factor Authentication - SWN Vault

Hack Naked News (Video)

Play Episode Listen Later Feb 23, 2024 31:43


Check out this interview from the SWN Vault, hand picked by main host Doug White! This segment was originally published on November 2, 2018. This week, Dr. Doug and Russ talk about the mysterious world of Two-Factor Authentication. This is something you hear all the time, and more and more sites are requiring and supporting it. The real question is, should you be using it? Show Notes: https://securityweekly.com/vault-swn-12

HeroicStories
I Lost My Two-Factor Authentication (2FA) Device. How Do I Sign In?

HeroicStories

Play Episode Listen Later Jan 20, 2024 7:02


Fear of second-factor loss prevents some people from using two-factor authentication. There's no need to fear that scenario.

And Another Thing with Dave
#364 Interview With A Founder of Anonymous Part 5 of 6

And Another Thing with Dave

Play Episode Listen Later Jan 5, 2024 26:59


And Another Thing With Dave, by Dave Smith #AATWD In this episode, part 5 of 6 in a 3 hour conversation with one of the founders of Anonymous. We cover a lot of ground. --------- EPISODE CHAPTERS WITH SHORT KEY POINTS --------- (0:00:02) - Internet Scams and Identity Theft I was scammed online, lost $3,000, received a pallet of hand sanitizer, and found out the person was wanted for drug and human trafficking. (0:09:18) - Exploring Online Chat, Hacking, and Exploitation NSA personnel, elite hackers, Ashley Madison hack, 2FA, sending dick pics, and online safety skills discussed. (0:23:09) - Identify and Protect Against Fake People Online dating protocols, IP addresses, hacker hierarchy, and the Ashley Madison hack are discussed to explore potential dangers. On this engaging episode, we take you through the murky and dangerous waters of internet scams and identity theft. Our guest shares a chilling tale of online deception where he was almost left three thousand dollars in the hole after falling prey to a cunning online scam. Listen as we uncover the startling reality of the dark underbelly of the internet, from cases of stolen identities to associations with drug and human trafficking rings. This episode is a stark reminder of the potential perils of the digital world and the importance of online safety. We also journey into the realms of online chat, hacking, and exploitation. From discussing the hierarchy of hackers, to the impact of the Ashley Madison hack on the advent of two-factor authentication, we leave no stone unturned. The exploration continues with a deep look at the potential dangers of online dating and the precautions one can take to ensure safety. This is an episode filled with intriguing discussions and insights into the world of internet security. Tune in for an eye-opening discourse on the risks lurking behind your screens and learn how to protect yourself against them. If you are digging what I am doing, and picking up what I'm putting down, please share the podcast on social media and with friends. Reviews are greatly appreciated. You can leave a review on Apple Podcasts, or Spotify. Thanks again!!! Follow me and find More of My Content with link below ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠https://linktr.ee/andanotherthingwithdave⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ Thank you to my listeners throughout the world. Now heard in 65 countries. According to Spotify my podcast is in the top 20% of podcasts shared internationally. Listener locations: 69% USA 11% Canada 6% United Kingdom  5% India 2% Germany 2% Romania 1% Russia less than 1% in 50 plus countries THANK YOU all !!! #aatwd #andanotherthing #davesmith #podcast #conspiracies #truther #rich #1% #99% #99percent #anonymous #epstein #silkroad Internet Scams, Identity Theft, Online Chat, Hacking, Exploitation, Fake People, Ashley Madison Hack, Two-Factor Authentication, Dick Pics, Online Dating, Safety Protocols, Fake URL, IP Addresses, NSA Personnel, Elite Hackers, Architects, Suicides --- Send in a voice message: https://podcasters.spotify.com/pod/show/andanotherthingwithdave/message

The Motivation Congregation Podcast
Two-Factor Authentication and Spiritual Liberation: Understanding Sacrifice and Forgiveness Through Rochel's Act

The Motivation Congregation Podcast

Play Episode Listen Later Nov 27, 2023 5:00 Transcription Available


Ever get annoyed by the necessity of two-factor authentication to check an email or do some banking? What if I told you it could teach us a profound lesson about sacrifice and forgiveness? This episode takes you on a fascinating journey, linking this pesky modern-day protocol to the biblical narrative of Yaakov, manipulative Laban, and the beyond-selfless Rochel. We highlight how Rachel's giving away the "password" to protect her sister becomes a powerful lesson of sacrifice.This episode continues to dive deeper, exploring how Rachel's sacrifice echoes through time, providing spiritual assistance. We reference the Midrash in Eicha, where Rachel's plea to Hashem brings mercy and spares the Jewish people. This brings us to the concept of Vatronus - the self-sacrifice of giving in and its profound spiritual power. Wrapping up with the wisdom of Reb Chaim Kanievsky, we challenge you to reevaluate the costly nature of holding onto anger. Get ready to attain a new level of understanding about letting go of grudges and embracing the liberation granted by forgiveness.Support the showJoin the WhatsApp community for daily motivational Torah content! JOIN HERE ---------------- SUBSCRIBE to The Weekly Parsha for an insightful weekly shiur on the Parsha of the week. Listen on Spotify or the new Jewish music and Podcast streaming platform 24six! Access all Torah talks and listen to featured episodes on our new website, themotivationcongregation.org ---------------- Questions or Comments? Please email me @ michaelbrooke97@gmail.com

ITSPmagazine | Technology. Cybersecurity. Society
SOC Analyst Appreciation Day 2023 | Day in the Life of a SOC Analyst | An Event Coverage Conversation with Jules Okafor, David Meece, Jay Jay Davey

ITSPmagazine | Technology. Cybersecurity. Society

Play Episode Listen Later Oct 26, 2023 48:15


Guests: Jules Okafor, BISO and CEO and Founder of RevolutionCyberOn LinkedIn | https://www.linkedin.com/in/julesmgmt/David Meece, SOC Analyst, also known as Cyber Tech Dave on LinkedInOn LinkedIn | https://www.linkedin.com/in/david-meece-cybertech-dave/Jay Jay Davey, Global Security Operations Centre Lead, Marks and SpencerOn LinkedIn | https://www.linkedin.com/in/secopsjay/?originalSubdomain=uk____________________________Hosts: Sean Martin, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining CyberSecurity Podcast [@RedefiningCyber]On ITSPmagazine | https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/sean-martinMarco Ciappelli, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining Society PodcastOn ITSPmagazine | https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli____________________________Episode NotesHello to all our listeners out there! Marco and Sean here, and we are thrilled to bring you a special episode today. For the third consecutive year, we've been invited to host a panel for an event that's become a cornerstone for the infosec community. And guess what? We've been involved right from its inception. That's right! We are talking about the SOC Analyst Appreciation Day™, a day designed to shed light on the unsung heroes of the cybersecurity world.Now, for those new to this, let us dive a bit deeper. The life of a SOC analyst isn't always glamorous. They often find themselves caught in the whirlwind of immense workload, sometimes feeling like the weight of the entire digital universe rests on their shoulders. Overworked and, sadly, often underappreciated, these analysts face challenges that can lead to burnout and, ultimately, a high turnover rate.Enter Devo, the brilliant minds behind the establishment of the SOC Analyst Appreciation Day™. Their mission? To offer a hearty shoutout to these hardworking individuals and to prompt organizations globally to step up, recognizing the importance of their analysts' satisfaction and mental well-being.If you've been following the event, you know that this year was jam-packed with on-demand content that was nothing short of enlightening. With presentations from some of the most influential thought leaders in the infosec community, topics ranged from real-life use cases to the intricacies of SOC automation and the critical importance of managing mental well-being in such high-pressure roles.But, listeners, we have a treat for you. Today, we're going to dive deep into one of the event's highlights. We had the privilege of moderating a panel that, trust us, you won't want to miss. So, whether you're a budding SOC analyst, a seasoned pro, or just someone with a keen interest in the world of infosec, sit back, relax, and let's delve into some insightful discussions.This panel will take a look at the ins and outs of SOC life. From the tier one analyst role to leadership positions to everything in between, the day-to-day in each type of SOC can look very different — and this panel will cover all perspectives. Moderated by Sean Martin and Marco Ciappelli from ITSP MagazineJules Okafor, BISO and CEO and Founder of RevolutionCyberDavid Meece, SOC Analyst, also known as Cyber Tech Dave on LinkedInJay Jay Davey, Global Security Operations Centre Lead, Marks and SpencerThanks for tuning in to this special episode. Let's get started!____________________________Watch this and other videos on ITSPmagazine's YouTube ChannelRedefining CyberSecurity Podcast with Sean Martin, CISSP playlist:

TWiT Bits (MP3)
TNW Clip: More Data Leaked From 23AndMe Breach

TWiT Bits (MP3)

Play Episode Listen Later Oct 20, 2023 9:57


On Tech News Weekly, Mikah Sargent talks about the 23AndMe data breach and the additional data that has been released by the original hacker. For more, check out Tech News Weekly: https://twit.tv/tnw/308 Hosts: Mikah Sargent and Jason Howell You can find more about TWiT and subscribe to our podcasts at https://podcasts.twit.tv/ Sponsor: GO.ACILEARNING.COM/TWIT

TWiT Bits (Video HD)
TNW Clip: More Data Leaked From 23AndMe Breach

TWiT Bits (Video HD)

Play Episode Listen Later Oct 20, 2023 9:57


On Tech News Weekly, Mikah Sargent talks about the 23AndMe data breach and the additional data that has been released by the original hacker. For more, check out Tech News Weekly: https://twit.tv/tnw/308 Hosts: Mikah Sargent and Jason Howell You can find more about TWiT and subscribe to our podcasts at https://podcasts.twit.tv/ Sponsor: GO.ACILEARNING.COM/TWIT

The Bootstrapped Founder
250: Amanda Goetz — The Antidote to Hustle Culture

The Bootstrapped Founder

Play Episode Listen Later Sep 13, 2023 55:45


I finally got to talk to Amanda Goetz, a marketer-turned-full-time-creator, who's generously poured out her wisdom on navigating the creator economy. Amanda's journey from corporate life to the creator economy is filled with valuable lessons about embracing awkward self-promotion, overcoming 'Cringe Valley', and the journey of (maybe?) writing a book. This conversation is a must-listen for anyone looking to carve out a calm niche in a world full of "hustle culture," or just for those curious about the behind-the-scenes of a first-time author getting into book publishing.I didn't set out to chat about writing books, but it was too exciting an opportunity: Amanda announced that she's writing a book! Amanda has walked the tightrope of maintaining authenticity while engaging with the book publishing industry's commercial demands, and she shares this experience with us. We get into the nitty-gritty of dealing with Imposter Syndrome, understanding the angle publishers are looking for, and using hype effectively. It's a deep-dive into the business side of books, the choices of self-publishing or seeking an agent, and the journey towards finding validation in our creative endeavors.But it's not all hustle and bustle; we also touch on the vital importance of rest and self-care in our lives. Amanda talks about how crucial it is for creators to set boundaries on social media, carefully choosing what aspects of their lives to share. We learn about the balance between sharing personal and private moments, with invaluable insights from Amanda's own experience, including the trauma of a social media hack and the importance of diversifying platforms. So, tune in for a candid, comprehensive, and genuinely helpful discussion on thriving in the creator economy.Amanda on Twitter: http://twitter.com/AmandaMGoetz Amanda's Newsletter:https://www.amandagoetz.com/Amanda's Instagram: http://instagram.com/goetzam00:00:01 Finding Balance in the Creator Economy00:11:45 Exploring Niche Markets and Writing Books00:17:40 Imposter Syndrome in the Publishing Business00:25:28 The Importance of Rest and Self00:41:02 Boundaries and Authenticity on Social Media00:49:07 Creator's Social Media Hack LessonsThe blog post: https://thebootstrappedfounder.com/amanda-goetz-the-antidote-to-hustle-culture/The podcast episode: https://share.transistor.fm/s/2af3083cThe video: https://youtu.be/DKFBGozqz_cYou'll find my weekly article on my blog: https://thebootstrappedfounder.comPodcast: https://thebootstrappedfounder.com/podcastNewsletter: https://thebootstrappedfounder.com/newsletterMy book Zero to Sold: https://zerotosold.com/My book The Embedded Entrepreneur: https://embeddedentrepreneur.com/My course Find Your Following: https://findyourfollowing.comThis episode is sponsored by Acquire.com (00:01) - Finding Balance in the Creator Economy (11:45) - Exploring Niche Markets and Writing Books (17:40) - Imposter Syndrome in the Publishing Business (25:28) - The Importance of Rest and Self-Care (41:02) - Boundaries and Authenticity on Social Media (49:07) - Creator's Social Media Hack Lessons

ITSPmagazine | Technology. Cybersecurity. Society
Brewing Cyber Confidence for Back-to-School | A Conversation with Dr. Ryan Ko | Musa Cybercafe Podcast with Mansi Thakar

ITSPmagazine | Technology. Cybersecurity. Society

Play Episode Listen Later Sep 8, 2023 36:11


Rich On Tech
Europe's biggest tech show - September 2, 2023 (Episode 35)

Rich On Tech

Play Episode Listen Later Sep 3, 2023 109:25


Rich DeMuro talks tech news, tips, gadget reviews and conducts interviews in this weekly show. Airs 11 AM - 2 PM PT on KFI AM 640 and syndicated on stations nationwide through Premiere Networks. Stream live on the iHeartRadio App or subscribe to the podcast.Follow Rich on X, Instagram, Facebook and Threads.Call 1-888-RICH-101 (1-888-742-4101) to join in!RichOnTech.tvRich talks about this trip to Berlin for IFA 2023. Highlights here.He also tried out California's Digital Driver's license with TSA at LAX.Rich mentioned how you need to prep your gadgets for any travel, especially international travel. Check with your cellular carrier to see if you get any free travel days, or get an eSIM (use my code RICH5375 for $3 off). Also, Rich recommends a travel plug adapter, portable battery bank and an old school USB cable for charging on the plane.If you want to use your Bluetooth earbuds/headphones with the seatback entertainment, Rich recommends a gadget from Twelve South called AirFly.Rich talks about his experience with the Google Pixel Fold.Rich also talked about taking a walking tour with VoiceMap. Use my referral code gptyoh for your first tour free.John in Minnesota says his earbuds keep cutting out because Google Assistant activates. How can you disable that?Mark Gurman of Bloomberg explains what to expect with the new iPhone 15 models.Alex in Nuevo, CA wants to know why his SD card isn't working.Google is raising prices for it's Nest Aware subscription service.Verizon has a new way for you to stop those spammy email to text messages.Reggie in Charleston, S.C. wants to know why she lost access to her Facebook Page. Rich suspects she was hacked. Your first line of defense is to turn on Two Factor Authentication, set an additional admin on your business page and go to Facebook.com/hacked if you suspect you've been hacked.Greg in Des Moines is legally blind and has a Samsung Z Flip 3 and wants to know if he should upgrade to the Z Flip 5.Oliver Merlin, Managing Director of IFA Management talks IFA 2023.Patty in Santa Clarita restored her iPhone from a backup and her iMessages didn't follow. Rich mentioned iMazing as a way to perhaps find the messages in an older backup.FEMA and the FCC are going to test the Emergency Alert System by sending a test text message to all consumer cell phones on October 4.Down Town Brown in Durango, Colorado asks for more information about eSIMs and options for international roaming. Rich mentioned that he is also testing the Solis 5G Hotspot and Power Bank, which is a great solution if you have multiple devices or are traveling with a group since up to 16 devices can share the data.Google is making it easier to remove your personal information from search results. Easy step by step instructions here!Sylvie in San Diego wants to know the best wireless video doorbell that also has a chime.Mark Vena, Principal Analyst at Smart Tech Research chats all things IFA 2023.Announced at IFA: Eve Play will make old speakers compatible with AirPlay 2.Paul emailed to say he is planning a cross country trip and wants some fun apps. Rich recommends Roadside America, Atlas Obscura, Roadtrippers, Autio, iExit and GuideGeek AI.Stephanie emailed to say she is going on a work related trip and leaving the kids with a nanny and needs a good discreet camera. Rich says to check out SpyGuy.See Privacy Policy at https://art19.com/privacy and California Privacy Notice at https://art19.com/privacy#do-not-sell-my-info.

Hacking Humans
two-factor authentication (noun) [Word Notes]

Hacking Humans

Play Episode Listen Later Aug 15, 2023 9:07


An authentication process that requires two different factors before granting access. CyberWire Glossary link: https://thecyberwire.com/glossary/two-factor-authentication

Word Notes
two-factor authentication (noun)

Word Notes

Play Episode Listen Later Aug 15, 2023 9:07


An authentication process that requires two different factors before granting access. CyberWire Glossary link: https://thecyberwire.com/glossary/two-factor-authentication Learn more about your ad choices. Visit megaphone.fm/adchoices

ITSPmagazine | Technology. Cybersecurity. Society
Exploitation of Humans by AI Assistants | A Conversation with Matthew Canham and Ben Sawyer | Las Vegas Black Hat 2023 Event Coverage | Redefining CyberSecurity Podcast With Sean Martin and Marco Ciappelli

ITSPmagazine | Technology. Cybersecurity. Society

Play Episode Listen Later Aug 4, 2023 36:14


Guests: Matthew Canham, CEO, Beyond Layer Seven, LLCOn Linkedin | https://www.linkedin.com/in/matthew-c-971855100/Website | https://drmatthewcanham.com/Ben Sawyer, Professor, University of Central Florida [@UCF]On Linkedin | https://www.linkedin.com/in/bendsawyer/On Twitter | https://twitter.com/bendsawyerWebsite | https://www.bendsawyer.com/____________________________Sean Martin, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining CyberSecurity Podcast [@RedefiningCyber]On ITSPmagazine | https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/sean-martinMarco Ciappelli, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining Society Podcast and Audio Signals PodcastOn ITSPmagazine | https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli____________________________This Episode's SponsorsIsland.io | https://itspm.ag/island-io-6b5ffd____________________________Episode NotesWelcome to a fascinating new episode where we delve deep into the confluence of cybersecurity, psychology, and philosophy in the realm of artificial intelligence. In anticipation of their insightful presentation at Black Hat Las Vegas 2023, our hosts Marco and Sean had an engaging conversation with Ben and Matthew, shedding light on the astonishingly rapid developments of AI and the accompanying cybersecurity implications.Within the last few months, the GPT-4 and ChatGPT language models have captivated the world. There is a growing perception that the line between AI and sentience is becoming increasingly blurred, nudging us into uncharted territories. However, one must question if this is genuinely the case, or merely what we want or are predisposed to perceive.Ben and Matthew's research outlines the fundamental "cognitive levers" available to manipulate human users, a threat vector that is more nuanced and insidious than we ever imagined.In their upcoming Black Hat talk, they aim to reveal how AI can exploit our cognitive biases and vulnerabilities, reshaping our perceptions and potentially causing harm. From social engineering to perceptual limitations, our digital realities are at a risk we have never seen before.Listen in as Marco and Sean explore a captivating debate around the nature of reality in the context of our interaction with AI. What we think is real, may not be real after all. How does that affect us as we continue to interact with increasingly sophisticated AI? In a world that often feels like a simulation, are we falling prey to AI's exploitation of our human cognitive operating rules?Marco and Sean also introduce us to the masterminds behind this groundbreaking research, Ben Sawyer, with his background in Applied Experimental Psychology and Industrial Engineering, and Matthew Canham, whose work spans cognitive neuroscience and human interface design. Their combined expertise results in a comprehensive exploration of the intersection between humans and machines, particularly in the current digital age where AI's ability to emulate human-like interactions has advanced dramatically.This thought-provoking episode is a must-listen for anyone interested in the philosophical, psychological, and cybersecurity implications of AI's evolution. The hosts challenge you to think about the consequences of human cognition manipulation by AI, encouraging you to contemplate this deep topic beyond the immediate conversation.Don't miss out on this thrilling journey into the unexplored depths of human-AI interaction.Subscribe to our podcast, share it with your network, and join us in pondering the questions this conversation raises. Be part of the ongoing dialogue around this pressing issue, and we invite you to stay tuned for further discussions in the future.Stay tuned for all of our Black Hat USA 2023 coverage: https://www.itspmagazine.com/bhusa____ResourcesMe and My Evil Digital Twin: The Psychology of Human Exploitation by AI Assistants: https://www.blackhat.com/us-23/briefings/schedule/index.html#me-and-my-evil-digital-twin-the-psychology-of-human-exploitation-by-ai-assistants-32661For more Black Hat USA 2023 Event information, coverage, and podcast and video episodes, visit: https://www.itspmagazine.com/black-hat-usa-2023-cybersecurity-event-coverage-in-las-vegasAre you interested in telling your story in connection with our Black Hat coverage? Book a briefing here:

Rich On Tech
027 Rich on Tech Radio Show - July 8, 2023

Rich On Tech

Play Episode Listen Later Jul 9, 2023 106:33


Follow Rich!Rich opened the show by taking a stroll down social media history lane with a look at some brands that have fizzled including Friendster, MySpace, Foursquare, Path, Google+, Vine and Meerkat. Now, Instagram, Twitter, Facebook and Instagram are the gold standards, with Threads quickly gaining 70 million users in just a few days.Rich is on Threads at richontech.Jennifer in Laguna Beach wants to know if there's a way to keep tabs on her friend while they travel through Europe. She has iOS and her friend has Android. Rich recommends Life360. Another way to find a lost iPhone or Android is through finding tools for Google and Apple.Don't fall for a new scam that claims to give you a free piano.Samsung is holding its next foldable phone event on July 26 in Seoul, Korea.Volkswagen will test self-driving cars in Austin.Casey Newton of Platformer will chat about all things Threads. Listen to an interview with Threads Adam Mosseri on his podcast Hard Fork.The Las Vegas Sphere was lit up for the first time. It's 580,000 square feet of LED's, the largest in the world. Here's my behind the scenes look.Rich recommends the campy sci fi horror movie M3GAN, which is streaming free on Amazon Prime.Reggie in South Carolina clicked a Facebook notification that asked for her to submit her driver's license. Is that a scam? Just to be safe, check Facebook security settings here and be sure you're not logged into any unknown devices and have Two Factor Authentication turned on.Mark wants to know who the first performer in the Sphere in Las Vegas will be. It will be U2 Live in September.If you lose an AirTag, be sure to open the Find My app and put it into Lost Mode, and include your contact information. Someone who finds it can hold the AirTag to the back of their phone to bring up the information.Jacob Palmer of Best Reviews joins to talk Amazon Prime Day deals.Paul in Columbus asks if he gets a new Amazon Fire TV Cube, will he have to re-log into all of his streaming apps?The Super Mario Bros. Movie will stream on Peacock starting August 3. Check the Big list of streaming deals page to see which services are offering free streaming trials.Chris in Miami wants to know if he should go with a Ring peephole cam.YouTube Premium is testing a new lock screen feature.James wants to rescue the data on a USB drive he purchased. Rich recommends trying free data recovery software from Stellar, Recuva and Disk Drill. If that doesn't work, search Yelp for Data Recovery and find someone that can help you out in your area.Dr. Renee Dua explains how her new app called Together can take your vitals with just a selfie.A caller in Murrieta says her VoiceOver function has disappeared from her iPhone. It's still a part of iOS, so perhaps it got deactivated. Use Settings or Siri to turn it back on.See Privacy Policy at https://art19.com/privacy and California Privacy Notice at https://art19.com/privacy#do-not-sell-my-info.

Python Bytes
#339 Actual Technical People

Python Bytes

Play Episode Listen Later Jun 7, 2023 30:43


Watch on YouTube About the show Sponsored by InfluxDB from Influxdata. Connect with the hosts Michael: @mkennedy@fosstodon.org Brian: @brianokken@fosstodon.org Show: @pythonbytes@fosstodon.org Join us on YouTube at pythonbytes.fm/live to be part of the audience. Usually Tuesdays at 11am PT. Older video versions available there too. Michael #1: pystack PyStack is a tool that uses forbidden magic to let you inspect the stack frames of a running Python process or a Python core dump, helping you quickly and easily learn what it's doing. PyStack has the following amazing features:

SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast

Analyzing Office Documents Embedded Inside PowerPoint Files https://isc.sans.edu/diary/Analyzing%20Office%20Documents%20Embedded%20Inside%20PPT%20%28PowerPoint%29%20Files/29894 DocuSign Themed Email Leads to Script-Based Infection https://isc.sans.edu/diary/DocuSign-themed%20email%20leads%20to%20script-based%20infection/29888 File Archiver In The Browser https://mrd0x.com/file-archiver-in-the-browser/ Securing PyPI accounts via Two-Factor Authentication https://blog.pypi.org/posts/2023-05-25-securing-pypi-with-2fa/ Apache Casandra Vulnerabilities https://lists.apache.org/thread/mwd02nrw2go8shg29rnp3o4hgompvkp5 MOXA MXsecurity Vulerabilities https://www.moxa.com/en/support/product-support/security-advisory/mxsecurity-command-injection-and-hardcoded-credential-vulnerabilities

SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast

Analyzing Office Documents Embedded Inside PowerPoint Files https://isc.sans.edu/diary/Analyzing%20Office%20Documents%20Embedded%20Inside%20PPT%20%28PowerPoint%29%20Files/29894 DocuSign Themed Email Leads to Script-Based Infection https://isc.sans.edu/diary/DocuSign-themed%20email%20leads%20to%20script-based%20infection/29888 File Archiver In The Browser https://mrd0x.com/file-archiver-in-the-browser/ Securing PyPI accounts via Two-Factor Authentication https://blog.pypi.org/posts/2023-05-25-securing-pypi-with-2fa/ Apache Casandra Vulnerabilities https://lists.apache.org/thread/mwd02nrw2go8shg29rnp3o4hgompvkp5 MOXA MXsecurity Vulerabilities https://www.moxa.com/en/support/product-support/security-advisory/mxsecurity-command-injection-and-hardcoded-credential-vulnerabilities

ChooseFI
397 | Securing Your Financial Life

ChooseFI

Play Episode Listen Later Oct 3, 2022 76:31 Very Popular


In this episode: cybersecurity, password managers, two-factor authentication, safely navigating the internet, and more hot-seat questions! Have you ever considered how secure your finances are in the modern world? Within the cyber-dominated world we are all living in, it can be tough to stay on top of updates, passwords, and other necessary resources that help us keep our digital footprints safe. Well in order to provide you all with some high-level tips and tricks to stay ahead of the curve, we decided to have long time listener and cybersecurity expert Tom on the show this week to discuss how you can secure your online life. Keeping yourself secure and your assets safe is one of the best ways to ensure a progressive future as you move forward in the digital era while on your FI journey! Timestamps: 1:44 - Introduction 2:52 - Passwords and Password Managers 13:22 - Two-Factor Authentication 22:03 - Email Links 28:38 - Cyber Financial Risks 34:57 - Surfing The Web Safely 39:14 - Antivirus Software 43:57 - Public Wifi, Back-ups, and High-Level Tips 55:18 - Look Out For Elderly Loved Ones 58:38 - Tom Takes On The Hot Seat 75:01 - Conclusion Resources Mentioned In Today's Episode: Join ChooseFI's Facebook Group! Yubico Lastpass 1Password KeePass Why You Need A Legacy Binder JL Collins Die With Zero: Getting All You Can from Your Money and Your Life By Bill Perkins RunnersFI Suggested Books Libby Subscribe to The FI Weekly! More Helpful Links and Resources: Earn $1,000 in cashback with ChooseFI's 3-card credit card strategy Share FI by sending a friend ChooseFI: Your Blueprint to Financial Independence Track your personal finances with Personal Capital Keep learning or start a new side hustle with one of our educational courses Slash your cell phone bill without sacrificing service with Mint Mobile