show episodes
 
Exploring the practical and exciting alternate realities that can be unleashed through cloud driven transformation and cloud native living and working. Each episode, our hosts Dave, Esmee & Rob talk to Cloud leaders and practitioners to understand how previously untapped business value can be released, how to deal with the challenges and risks that come with bold ventures and how does human experience factor into all of this? They cover Intelligent Industry, Customer Experience, Sustainabili ...
  continue reading
 
Cybersecurity guru Steve Gibson joins Leo Laporte every Tuesday. Steve and Leo break down the latest cybercrime and hacking stories, offering a deep understanding of what's happening and how to protect yourself and your business. Security Now is a must listen for security professionals every week. Records live every Tuesday at 4:30pm Eastern / 1:30pm Pacific / 20:30 UTC.
  continue reading
 
Artwork

1
Girls Talk Cyber

girlstalkcyber

Unsubscribe
Unsubscribe
Kuukausittain
 
Cyber security, no longer a place for tech heads, speaking another language Join us at Girls Talk Cyber, the podcast to help you decode this space and redefine how you act online
  continue reading
 
Artwork

1
CISSP Cyber Training Podcast - CISSP Training Program

Shon Gerber, vCISO, CISSP, Cybersecurity Consultant and Entrepreneur

Unsubscribe
Unsubscribe
Viikoittain+
 
Join Shon Gerber on his weekly CISSP Cyber Training podcast, where his extensive 22-year background in cybersecurity shines through. With a rich history spanning corporate sectors, government roles, and academic positions, Shon imparts the essential insights and advice necessary to conquer the CISSP exam. His expertise is not just theoretical; as a CISSP credential holder since 2009, Shon translates his deep understanding into actionable training. Each episode is packed with invaluable secur ...
  continue reading
 
A podcast with short episodes that discuss cyber crime cases, security problems, and infamous malware. I make my episodes quick and easy to understand so you get the story without the filler and too much technical jargon. Links to all my sources on my pastebin https://pastebin.com/u/BiteSizedCyberCrime
  continue reading
 
Artwork
 
Without trust, society stagnates, economies decline, and businesses fail. This podcast series keeps abreast of the latest trends and challenges in cyber and physical security with interviews, event updates, industry suppliers & government initiatives.
  continue reading
 
As cars become smarter and more connected, the demand for top-tier automotive cyber security has never been higher. With expert insights from PlaxidityX, a leading automotive cyber security company, we’ll guide you through the challenges and solutions protecting millions of vehicles worldwide. Whether you’re an industry expert or just curious about how cars are secured in the digital age, this podcast comprehensively looks at how cyber defenses are developed, tested, and deployed. We don’t j ...
  continue reading
 
Cybersecurity guru Steve Gibson joins Leo Laporte every Tuesday. Steve and Leo break down the latest cybercrime and hacking stories, offering a deep understanding of what's happening and how to protect yourself and your business. Security Now is a must listen for security professionals every week. Records live every Tuesday at 4:30pm Eastern / 1:30pm Pacific / 20:30 UTC.
  continue reading
 
Cyber Security can be a difficult field to not only understand but to also navigate. Joe South is here to help with over a decade of experience across several domains of security. With this podcast I hope to help more people get into IT and Cyber Security as well as discussing modern day Cyber Security topics you may find in the daily news. Come join us as we learn and grow together!
  continue reading
 
Artwork

1
YusufOnSecurity.com

YusufOnSecurity.Com

Unsubscribe
Unsubscribe
Viikoittain
 
This is a weekly podcast on cyber security domains. We discuss, dissect and demystify the world of security by providing an in-depth coverage on the cybersecurity topics that matter most. All these in plain easy to understand language. Like it, share it, and most importantly enjoy it!
  continue reading
 
Artwork

1
Geopolitics Decanted by Silverado

Silverado Policy Accelerator

Unsubscribe
Unsubscribe
Kuukausittain
 
Geopolitics Decanted is a podcast featuring geopolitical analysis and in-depth expert interviews on topics ranging from War in Ukraine, Great Power Competition with China, changing nature of warfare, sanctions and export controls, semiconductors and cybersecurity. This is a podcast for people who care about the details and are seeking a comprehensive understanding of global issues, not just the sound bytes. It is hosted by Dmitri Alperovitch, Chairman of Silverado Policy Accelerator (www.sil ...
  continue reading
 
Artwork

1
2 Cyber Chicks

Simply Cyber Media Group

Unsubscribe
Unsubscribe
Kuukausittain
 
2 Cyber Chicks is an inclusive cybersecurity podcast designed to educate and break the stereotypes of cybersecurity professionals. We will be discussing the “tough” topics that come along with being a woman in this field while providing life hacks on how to handle burnout, networking, and goal-setting. Our mission is to cast a net to an inclusive audience and provide a safe place for discussion. Guests will include leading professionals in the field, providing real-life insight and demystify ...
  continue reading
 
Artwork

1
Unmasked

Assura, Inc.

Unsubscribe
Unsubscribe
Kuukausittain
 
A bi-monthly show focusing on cybersecurity, hacker news with a lighter side. Unmasked is a look behind the cyber professionals and will spotlight teammates, community advocators and businesses to give insight to how cybersecurity affects everyone. Brought to you by Assura. Where the superheroes of cybersecurity provide a clearer understanding of the threats we face in our digital world. With Host: Paul Blacker Web: https://www.assurainc.com/
  continue reading
 
Dive into “Compromising Positions”, the unique, new podcast designed to iron out the wrinkles in the relationship between cybersecurity teams and other tech professionals. We’re taking the ‘security as a blocker’ stereotype head-on, promoting a shared language and mutual understanding. We’ll turn those ‘compromising positions’ into ‘compromising solutions’, helping security pros and tech teams collaborate more effectively for a smoother, safer digital journey. Every week we will be joined by ...
  continue reading
 
Defuse / Diːˈfjuːz/ Verb: To Make A Situation Less Tense Or Dangerous. Join me in listening to this informative podcast that delves into the critical issues facing private and corporate clients. Each episode features global experts sharing their insights on preventing and resolving problematic behaviors and security issues that cause harm. The podcast covers a wide range of topics, including stalking, protective security, intelligence, psychological profiling, crisis management, risk managem ...
  continue reading
 
Welcome to One Step Beyond Cyber, the ultimate IT and cybersecurity podcast that's sure to keep you on the edge of your seat! Whether you're a tech guru or a total newbie, our hosts Scott Kreisberg, and Tim Derrickson will make sure you're entertained and educated every step of the way. As technology advances, it can be challenging to keep up with the latest trends and developments. Don’t worry, our hosts are here to help! They will discuss real-world IT-related problems and solutions, as we ...
  continue reading
 
The Cyber-Crime Survivors Advisory & Recovery Podcast is created to raise awareness about the ongoing theft of people’s lifesaving and wealth by evil cyber criminals. It is time to stop shaming victims and start sharing the truth about what is happening to our families and friends. CCSARP is a safe place for learning and growth that will empower cybercrime victims to become survivors. Another goal is if all people are aware of the evil theft of money from our loved one, we can shut down cybe ...
  continue reading
 
Get involved in the exciting world of Digital Forensics and Incident Response with: Traffic Light Protocol. The Digital Forensics Podcast. In each episode, we sit down with seasoned DFIR professionals, the blueteamers who work around the clock to investigate cyber intrusions. From data breaches to cyberattacks, they share firsthand accounts of some of the most intense investigations they've ever tackled, how they deal with burnout and the added pressure of cat and mouse while they learn abou ...
  continue reading
 
Artwork

1
Raising Tech

Amber Bardon

Unsubscribe
Unsubscribe
Kuukausittain+
 
Raising Tech is your guide to understanding the role technology plays in your community, where to invest to transform culture, and how to bring your team and residents along the journey. Tune in to explore the latest tech trends, dive into hot topics, and hear from industry experts, community leaders, and innovative vendors shaping the senior living tech landscape. Each episode is packed with practical insights and real-world stories to help you spark change and level up your community’s tec ...
  continue reading
 
It’s a conversation about what you did before, why did you pivot into cyber, what the process you went through Breaking Into Cybersecurity, how you keep up, and advice/tips/tricks along the way. Cybersecurity Leaders, we would love to help develop the next generation of cybersecurity leadership. You can also bring up topics like attraction/retention/developing the next generation of the workforce.
  continue reading
 
Artwork

1
Likutei Moharan

Moshe Rubin

Unsubscribe
Unsubscribe
Kuukausittain+
 
Come join us on our journey!!! ... working towards an accessible and meaningful glimpse into the universe of Likutei Moharan with a group of growth-oriented people; Also available at: http://www.jewishheritagefoundation.org/audio_shiurim.html Please feel free to reach out from cyber space: mrubin214@gmail.com and let me know how you are enjoying the shiurim, or just to say hello. Would love to hear from you!!!
  continue reading
 
Artwork

1
The Next Five

FT Partner Studio

Unsubscribe
Unsubscribe
Kuukausittain
 
What lies ahead? In this series Tom Parker asks experts what will happen over the next five years and how it will affect our lives. This content is paid for by advertisers and is produced in partnership with the Financial Times’ Commercial Department Hosted on Acast. See acast.com/privacy for more information.
  continue reading
 
Artwork

1
alphalist.CTO Podcast - For CTOs and Technical Leaders

Tobias Schlottke - alphalist CTO Podcast

Unsubscribe
Unsubscribe
Kuukausittain+
 
This podcast features interviews of CTOs and other technical leadership figures and topics range from technology (AI, blockchain, cyber, DevOps, Web Architecture, etc.) to management (e.g. scaling, structuring teams, mentoring, technical recruiting, product etc.). Guests from leading tech companies share their best practices and knowledge. The goal is to support other CTOs on their journey through tech and engineering, inspire and allow a sneak-peek into other successful companies to underst ...
  continue reading
 
Artwork

1
Cyber Security

SE LABS ®

Unsubscribe
Unsubscribe
Kuukausittain
 
The cyber security podcast from SE Labs. Understand cyber security and other security issues. Practical and insightful, our experts have experience in attacking and defending in the physical and digital worlds. Peek behind the curtain with Cyber Security DE:CODED.
  continue reading
 
Welcome to the Cyber Security Happy Hour Podcast. This podcast is dedicated to discussing a variety of topics in all things Cyber Security.. Each episode features our host Christie Ogubere This is Cyber Security podcast - do not forget to protect your data in transit by using our affiliate link for Nordvpn. GET NORDVPN: https://go.nordvpn.net/aff_c?offer_id=288&aff_id=41574&url_id=11219 USE COUPON CODE: intexcyber USE THE CODE SO YOU CAN GET 70% off 3-year plan + 1 month free Website: https: ...
  continue reading
 
Artwork

1
Cyber Synapse Podcast

Catherine Knibbs

Unsubscribe
Unsubscribe
Kuukausittain
 
Creating connections and conversations about people, technology and the intersection of health and wellbeing. Recorded through the "cyber synaptic space." Catherine speaks to people who are considered experts in their fields. Important information for parents, teachers, professionals and anyone who wants to learn about cyberspace, digital parenting, security, data protection, counselling, health, wellbeing, personal growth and development. This is your acoustic & neuroplastic ride that will ...
  continue reading
 
Artwork
 
This podcast series offers risk intelligence and analysis from RANE Network. RANE is a risk intelligence company that provides business professionals with access to critical insights, analysis, and support, enabling them to better anticipate, monitor, and respond to emerging risks and threats. In the RANE podcast series, risk management experts and thought leaders share best practices for managing business risk, geopolitical risk, physical and cyber security risks, compliance risk, and other ...
  continue reading
 
We bring together the greatest minds for the use of technology in education to understand what has worked for them and what can enable your students and educators to fulfill the promise of learning through technology
  continue reading
 
Artwork

1
Cyber Safety Pod

Victor Castelo

Unsubscribe
Unsubscribe
Päivittäin+
 
Cyber Security doesn't have to be a daunting task. Everyone has the right to be more secure and enjoy some privacy while surfing the web. That's where we come in. We will give you simple yet effective ways of staying safe and private online. And we'll do it in a language you'll understand. Learn how to be Cyber Smart because Privacy Matters.
  continue reading
 
Artwork

1
SpyCast

SpyCast

Unsubscribe
Unsubscribe
Viikoittain
 
TOP SECRET Personal Attention, SpyCast Listeners Known to be the podcast real spies listen to -(STOP)- eavesdrop on conversations with high level sources from around the world -(STOP)- spychiefs molehunters defectors covert operators analysts cyberwarriors and researchers debriefed by SPY Historian Hammond -(STOP) stories secrets tradecraft and technology discussed -(STOP)- HUMINT SIGINT OSINT IMINT GEOINT and more -(STOP)- rumored to be professional education internal communication and publ ...
  continue reading
 
The Future of Cybercrime is dedicated to helping security practitioners defend their organizations by distilling insights, best practices, and actionable tips from the world’s leading cyber crime experts. This show is brought you by KELA Cyber Threat Intelligence. For more information, visit www.kelacyber.com
  continue reading
 
Artwork
 
Bi-Weekly Cyber intellgence briefing, each episode includes update regrading some of the latest events happened in the cyber security world. This podcast is meant for people who wants to listen to a short (5 minute) overview about some of the latest events happened lately in the cyber world. The Podcast is not getting into technical details and anyone can understand.
  continue reading
 
AstrologyNow is devoted to sharing the ancient science of Jyotish or Vedic astrology. By tuning into cosmic forces we may better understand ourselves at a soul level, connect to others with more divinity, and feel more prepared in navigating the world around us. This podcast provides weekly astrological updates, forecasts, and research while encouraging personal introspection and providing insight into global events. Christine has a Masters in Social Work and is certified in Vedic Astrology, ...
  continue reading
 
The GC+CISO Connection Show explores how we can better foster collaboration between organizations’ legal departments and security teams, with a focus on the General Counsel (GCs) and Chief Information Security Officers (CISOs). In an era where cyber threats are rapidly evolving, the partnership between legal and cybersecurity leaders is more crucial than ever. The goal of this Show is to enhance dialogue, understanding, and cooperation between these critical roles to bolster organizational c ...
  continue reading
 
ABC News Daily is the podcast that helps you understand the issues affecting your world. Every episode, host Samantha Hawley walks through one story with the help of an ABC colleague or expert in under 15 minutes. When you want coverage you can trust, listen to ABC News Daily. Key topics of recent episodes include the US presidential election, Donald Trump, Kamala Harris, neo-Nazis, Albanese’s Copacobana home, Oasis, Ticketmaster, Live Nation, Sean ‘Diddy’ Combs, Chinese EVs, electric vehicl ...
  continue reading
 
Artwork

1
The Bid Picture with Bidemi Ologunde

CHIP STORY Media & Rainmaker Podcasts

Unsubscribe
Unsubscribe
Viikoittain+
 
The Bid Picture podcast provides an array of information concerning cybersecurity. It includes the latest news and facts to keep listeners up-to-date with the most current events and developments in cybersecurity. At the same time, the podcast is not merely a factual digest; it also incorporates a range of opinions, encouraging its audience to consider different perspectives on cybersecurity matters. The Bid Picture podcast enriches its content by inviting a variety of guests. These guests c ...
  continue reading
 
Artwork

1
Cybersecurity

Senthilvel Kumar

Unsubscribe
Unsubscribe
Päivittäin+
 
YASH cyber security solutions are helping global corporations address a plethora of cyber risks proactively and reactively. We help our customers to grow their business securely, we understand your world.
  continue reading
 
Artwork

1
Threat Vector by Palo Alto Networks

Palo Alto Networks and N2K Networks

Unsubscribe
Unsubscribe
Kuukausittain+
 
Threat Vector, Palo Alto Networks podcast, is your premier destination for security thought leadership. Join us as we explore pressing cybersecurity threats, robust protection strategies, and the latest industry trends. The podcast features in-depth discussions with industry leaders, Palo Alto Networks experts, and customers, providing crucial insights for security decision-makers. Whether you're looking to stay ahead of the curve with innovative solutions or understand the evolving cybersec ...
  continue reading
 
imanmeet13 brings you "Cyber Safar" which is an audio version of his daily experience in Hacking & Digital World. It’s FREE to learn here! You don’t have to have a coding bone in yourself to understand technology. Every single successful person out there is a practitioner & has some or the other motivational routine as well. Stay Informative every single day with Cyber Safar when it comes to Technology, Hacking & Motivation. Got doubt? Contact me⤵️ Instagram = https://www.instagram.com/imanm ...
  continue reading
 
Loading …
show series
 
Arete is a global cyber risk company whose mission is to transform the way organizations prepare for, respond to, and prevent cybercrime. This episode will provide listeners with expert insights from two leaders in the cybersecurity industry, and equip organizations to better prepare for cybercrimes before they happen. As October is recognized as N…
  continue reading
 
Send us a text Unlock the secrets of the OSI and TCP/IP models with Sean Gerber as your guide on the CISSP Cyber Training Podcast. Ever wondered how the presentation layer manages to format and translate data seamlessly for the application layer? Or how the network layer deftly routes packets across networks? Prepare to gain a comprehensive underst…
  continue reading
 
Welcome to the GC+CISO Connection Show with host Shawn Tuma. In this very first episode of the Show, Shawn talks with Dena DeNooyer Stroh, General Counsel and Ethics Officer at North Texas Tollway Authority, to learn her perspectives on the legal department's role in cybersecurity, collaboration between the GC and the IT and InfoSec Teams, and tips…
  continue reading
 
Did Chinese researchers really break RSA encryption? What did they do? What next-level terror extortion is being powered by the NPD breach data? The EU to hold software companies liable for software security? Microsoft lost weeks of security logs. How hard did the try to fix the problem? The Chinese drone company DJI has sued the DoJ over its ban o…
  continue reading
 
Did Chinese researchers really break RSA encryption? What did they do? What next-level terror extortion is being powered by the NPD breach data? The EU to hold software companies liable for software security? Microsoft lost weeks of security logs. How hard did the try to fix the problem? The Chinese drone company DJI has sued the DoJ over its ban o…
  continue reading
 
With the polls in the US neck and neck just a few weeks out from the election, money talks. Elon Musk, the richest man in the world, is throwing it around for Donald Trump, even offering million-dollar cheques to voters who sign a petition set up by a Trump-friendly campaign group. Today, Vittoria Elliot from WIRED on why Musk is so desperate for T…
  continue reading
 
In this episode of Essential Geopolitics, RANE Cyber Analyst Ali Plucinski highlights major cyber risks companies should be aware of as the U.S. general election approaches. RANE is a global risk intelligence company that delivers risk and security professionals access to critical insights, analysis and support to ensure business continuity and res…
  continue reading
 
Summary Cameron Malin (LinkedIn) joins Andrew (X; LinkedIn) to discuss cyber and behavioral profiling. Cameron was the creator and founder of the FBI’s Cyber Behavioral Analysis Center. What You’ll Learn Intelligence The historical origins of behavioral profiling Applying behavioral profiling to counterintelligence and cyber threats Nature vs. Nurt…
  continue reading
 
Dmitri Alperovitch talks with Andrey Liscovich (UkraineDefenseFund.org) about the latest updates in the evolution of drone warfare on the battlefields in Ukraine. They discuss:- How Ground Unmanned Vehicles (GUVs) are being used in battle- 3rd Generation FPV drones- Quadcopter bombers- Mass-market EW systems- Fiber optics C2- EW recon units- Use of…
  continue reading
 
A couple months ago security education company KnowBe4 accidentally hired a North Korean threat actor who tried to install malware on their machine. Turns out this may not be as uncommon as you'd think. Recently a network of North Korean threat actors applying for jobs, and US citizens helping them, has been uncovered. Sources: https://pastebin.com…
  continue reading
 
The assassination of the Hamas leader, Yahya Sinwar in Gaza, the architect of the October 7 attack, might have been an opportunity for a ceasefire. Instead, Israeli airstrikes have intensified in the north and there is no sign Hamas will agree to the return of hostages. Today, international relations expert Rajan Menon on what Benjamin Netanyahu ho…
  continue reading
 
Send us a text Unlock the secrets to enhancing your organization's security posture by mastering the art of security audits. Tune in to discover how security audits play a pivotal role in both the CISSP exam and real-world scenarios. Through personal anecdotes and expert insights, we explore how conducting effective audits with departments like fin…
  continue reading
 
Send us a text A cybersecurity journey like no other awaits as we welcome a guest with a formidable background, shaped by their experiences in the Israeli military's elite 8200th unit. This exceptional career path led them from the rigors of military service to the academic halls of the Technion—Israel's very own MIT. We uncover how their military …
  continue reading
 
The cost of toll roads for drivers and even rideshare passengers are hard to avoid and the price attached to each beep of the reader increases every year. Transurban is the firm that dominates the industry on the east coast and in some states they can even use the criminal justice system to chase toll debts and fines. The cost of toll roads is proh…
  continue reading
 
Automotive cyber security is becoming a critical concern as software-defined vehicles (SDVs) increasingly dominate the market. In this episode, we explore how DevSecOps ensures that cyber security is integrated at every stage of the automotive software development process. By adopting a security-by-design approach, automakers can accelerate product…
  continue reading
 
Hi everyone! In this segment we cover the transit of Mars in Cancer. The fiery and passionate planet of Mars is debilitated in the sign of Cancer - causing Mars to feel quite uncomfortable and unable to operate properly. This can cause some big disturbances in the world and potentially in our personal lives! What happens when the planet of war and …
  continue reading
 
In this episode of Essential Geopolitics, RANE’s Eurasia Analyst Matthew Orr provides an overview of Georgia and Moldova’s upcoming elections and explains what the results will mean for the threat landscape in Europe. RANE is a global risk intelligence company that delivers risk and security professionals access to critical insights, analysis and s…
  continue reading
 
In this episode of Raising Tech, Matt Reiners chats with Akshita Iyer, founder and CEO of Ome, about her inspiring journey to create a smart knob that can turn any stove into a safer, smart appliance. After a personal experience, Akshita developed a device that retrofits gas and electric stoves to automatically shut off or adjust burners. The knob …
  continue reading
 
Indonesia held its presidential election back in February and the inauguration fast approaching on Oct. 20th. In this episode of Essential Geopolitics, RANE’s Asia-Pacific Analyst Nate Fischler explains what President Elect Prabowo Subianto’s inauguration will mean for the country going forward. RANE is a global risk intelligence company that deliv…
  continue reading
 
This week we learned that the Prime Minister Anthony Albanese will soon be a new home owner. He’s bought a multi-million-dollar house, featuring sweeping ocean views, on the New South Wales central coast. Some people think it’s a move from the PM that’s especially tone deaf, given the depths of the housing crisis, while others see the story as a co…
  continue reading
 
Send us a text Unlock the secrets to mastering access control models essential for conquering the CISSP exam and advancing your cybersecurity expertise. Imagine having a comprehensive understanding of how discretionary, mandatory, role-based, risk-based, rule-based, attribute-based, and hybrid models function in various scenarios. This episode feat…
  continue reading
 
In this episode of Threat Vector, host David Moulton talks with guest speaker Brian Wrozek, Forrester Principal Analyst in Security & Risk, about the complexities of aligning security strategies across global teams. Brian draws on his extensive experience in cybersecurity, operational technology (OT) risk, and threat intelligence to discuss how org…
  continue reading
 
Today drones are a common sight from use in industrial and military settings to incredible swarming light shows. They are often used for aerial data capture at scale, providing intelligence over wide and inhospitable areas. This week, Dave, Esmee and Rob talk to Dario Valenza, founder of Carbonix, about the state of the art of drones, their role in…
  continue reading
 
From 100k to 30k: How Joblift slashed their monthly cloud bill Save Money on Cloud Costs with Claire Fautsch (CTO @ Joblift). Find out how the team at Joblift slashed monthly cloud costs from €100K to €30K without compromising performance.Listen to find out:📊 How to build dashboards 📈 How to align cloud costs with business KPIs🤝 How to get the enti…
  continue reading
 
Dreaming of a career in Cybersecurity? Currently a Student and wondering how to succeed? In this episode, we are joined by Dr. Thalita Vergilio. Thalita is a passionate technologist and cybersecurity expert dedicated to demystifying complex concepts. This episode is for those dreaming of a thrilling career in cybersecurity as Thalita gives her road…
  continue reading
 
Unlock the secrets to navigating the ever-evolving world of cybersecurity and commercial insurance with expert insights from Alan Delahunty of McGriff Insurance. Discover how the complexity of cyber threats is reshaping insurance policies and learn why multi-factor authentication and other security measures are now industry standards. We promise yo…
  continue reading
 
When masked neo-Nazis turned up in a small New South Wales town to hold a rally on the weekend it shocked the locals. The men, part of a white supremacist group, were not from the area. So, why were they there? Today, extremism researcher Kaz Ross discusses how we should respond to the growing white supremacist movement in Australia. Kaz Ross expla…
  continue reading
 
uBlock Origin to the rescue National Public Data files for bankruptcy Will the .IO top level domain be disappearing? Patch Tuesday Firefox under attack Miscellany Sci-Fi The Sequence uBlock Origin Eero Routers Pep Link Router BIMI (up Scotty) Show Notes - https://www.grc.com/sn/SN-996-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscr…
  continue reading
 
uBlock Origin to the rescue National Public Data files for bankruptcy Will the .IO top level domain be disappearing? Patch Tuesday Firefox under attack Miscellany Sci-Fi The Sequence uBlock Origin Eero Routers Pep Link Router BIMI (up Scotty) Show Notes - https://www.grc.com/sn/SN-996-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscr…
  continue reading
 
The Lebanese capital Beirut is a divided city, where life continues as normal for some, while not so far away Israeli air strikes are reducing buildings to rubble. The sound of Israeli drones is constant as its forces hunt members of Hezbollah. The militant group has been firing missiles into Israel since Hamas terrorists crossed from Gaza into Isr…
  continue reading
 
Summary Chris Voss (X; LinkedIn) joins Andrew (X; LinkedIn) to discuss the art of negotiation. Chris formerly served as the FBI lead international hostage negotiator. What You’ll Learn Intelligence The very basics of negotiation, including the phrase “Never split the difference” The art of Tactical Empathy Case studies from Chris’ career, including…
  continue reading
 
Send us a text Key Takeaways: Introduction to Hayabusa: Hayabusa is an open-source Windows Event Log Analysis Tool used for processing EVTX logs to detect suspicious activities in Windows environments. Critical Alerts Detection: The tool is capable of detecting a variety of suspicious activities, including WannaCry ransomware and unauthorized Activ…
  continue reading
 
The wide-ranging impacts of climate change underscore the importance for businesses and authorities to focus on adaptation and take actions to build resilience. With climate change transforming the way we live and impacting the way we do business, the urgency to address these risks has never been greater. In this episode of Risk in Context, Marsh’s…
  continue reading
 
Episode 2 - Empowering Yourself, Understanding the Grieving Process, and a Deep Dive on Loneliness If you are feeling suicidal or wanting to harm yourself, call or text 988 Brian and Mike are back to discuss the importance of freeing yourself of the pain you may carry around with you after being scammed. We also talk about the grieving process and …
  continue reading
 
In just three weeks, Americans will choose whether they want Donald Trump or Kamala Harris in the White House and the contest is incredibly close. More than a hundred thousand eligible voters are living here in Australia, although not all will cast a ballot. Today, we meet an Australian-based Harris voter and a Trump voter, to talk about what’s dri…
  continue reading
 
Loading …

Pikakäyttöopas