Bad situations help us to learn.
…
continue reading
Dmarc Podcasts
Deception, influence, and social engineering in the world of cyber crime.
…
continue reading
The positive affects of having a strong women by your side.
…
continue reading
Interrogating the world's best minds on email deliverability.
…
continue reading
Helping bloggers, podcasters, and online business entrepreneurs grow their business! Host Pete McPherson chats with the world's TOP creators, including names like Seth Godin, Michelle Schroeder-Gardner, Neil Patel, Matt Mullenweg (creator of WordPress), John Lee Dumas, and way more.Topics include blogging (duh), SEO, affiliate marketing, podcasting, and monetization (especially digital products and FUNNELS!). ;)
…
continue reading
Build your newsletter and achieve online growth, with high quality content from the top 1% of successful newsletter creators across the world
…
continue reading
A deep dive into all things email
…
continue reading
Email's Not Dead is a podcast about how we communicate with each other and the broader world through modern technologies. Email isn't dead, but it could be if we don't change how we think about it. Hosts Jonathan Torres and Eric Trinidad dive into the email underworld and come back out with a distinctive look at the way developers and marketers send email. Produced by Thomas "T-Bird" Knierien.
…
continue reading
We talk Tech. This podcast looks at Tech in everyday life, in companies, in schools. Irreverent, quirky, and quite a lot of fun. Each week, join Paul Ogier, ex-teacher, business owner, Udemy Lecturer and general dog's body, as he interviews guests who are working at the coal face of software, apps, SAAS and support. How did they get there, what is their story, what technology do they deal with and how does it make their lives easier and how do they make their staff or clients lives easier? W ...
…
continue reading
Selling products online is challenging and can lead to poor customer experiences. In each episode, we explore how entrepreneurs and organizations in e-commerce are delivering delightfully unexpected experiences to their shoppers and customers! Amazon FBA, Shopify, artificial intelligence... We’ll discuss what matters today and what you can do to build a better eCommerce business, we’ll show you how! :) Appreciate the show? Leave us a review and rating in iTunes, or wherever you get your podc ...
…
continue reading

1
DMARC, DKIM, and the Secret to Staying Out of the Spam Folder - Email Marketing w/ Cheryl Rerick
59:38
59:38
Play later
Play later
Lists
Like
Liked
59:38Forget algorithms and deliverability myths — learn how to send emails real people actually open, click, and reply to. FIND CHERY's STUFF: https://www.instagram.com/cherylrerickmarketing/ https://cherylrerick.com/ https://cherylrerick.com/deliverability-webinar/ https://cherylrerick.com/time-to-conversion/ Want 1 roundup email of fun & useful resour…
…
continue reading

1
Email Deliverability Masterclass for Newsletters – SPF, DKIM, DMARC & Warm-Up with Anthony from Mission Inbox | Episode 4 | The LetterStack Podcast
36:45
36:45
Play later
Play later
Lists
Like
Liked
36:45Hitting the primary inbox (not spam or promotions) is make-or-break for every newsletter and cold-email campaign. In Episode 4 of the LetterStack Podcast, Renga sits down with Anthony Baltodano, founder of Mission Inbox and a decade-long deliverability expert, to unpack the exact tech and tactics that keep your emails landing where they belong. Wha…
…
continue reading
This week, our hosts Dave Bittner , Joe Carrigan, and Maria Varmazis (also host of the T-Minus Space Daily show) are sharing the latest in social engineering scams, phishing schemes, and criminal ex…
…
continue reading
Please enjoy this encore of Word Notes. A process of hiding the complexity of a system by providing an interface that eases its manipulation. CyberWire Glossary link: https://thecyberwire.com/glossary/abstraction-layer Audio reference link: “What Is Abstraction in Computer Science,” by Codexpanse, YouTube, 29 October 2018.…
…
continue reading
This week, our hosts Dave Bittner , Joe Carrigan, and Maria Varmazis (also host of the T-Minus Space Daily show) are sharing the latest in social engineering scams, phishing schemes, and criminal exploits t…
…
continue reading
By N2K Networks
…
continue reading
By N2K Networks
…
continue reading
This week, our hosts Dave Bittner , Joe Carrigan, and Maria Varmazis (also host of the T-Minus Space Daily show) are sharing the latest in social engineering scams, phishing schemes, and criminal exploits that are …
…
continue reading
Please enjoy this encore of Word Notes. A cybersecurity first principle strategy focused on disrupting known adversary activity at one of several phases of an attack sequence. CyberWire Glossary link: https://thecyberwire.com/glossary/intrusion-kill-chain Audio reference link: "Cybersecurity Days: A Network Defender's Future," by Rick Howard, I…
…
continue reading
This week, while Dave Bittner is out, Joe Carrigan, and Maria Varmazis (also host of the T-Minus Space Daily show) are sharing the latest in social engineering scams, phishing schemes, and …
…
continue reading
Please enjoy this encore of Word Notes. A subset of security orchestration, the management of identities across an organization's set of digital islands. CyberWire Glossary link: https://thecyberwire.com/glossary/identity-orchestrationBy N2K Networks
…
continue reading

1
How RemoteBase Grew from 112 Subs to a 6 Figure Newsletter Business – Chris Cerra | Episode 5 | The LetterStack Podcast
36:30
36:30
Play later
Play later
Lists
Like
Liked
36:30Ready to turn a travel side-project into a full-time, six-figure newsletter? In Episode 5 of the LetterStack Podcast, Renga chats with Chris Cerra, founder of RemoteBase and Digital Nomad Trip Reports, about bootstrapping a lean media empire (and why he runs it under the delightfully named Mad Banana Media). What you’ll learn: How Chris went from a…
…
continue reading
This week, our hosts Dave Bittner, Joe Carrigan, and Maria Varmazis (also host of the T-Minus Space Daily show) are sharing the latest in social engineering scams, phishing schemes, and…
…
continue reading
This episode contains a few curse words, be forewarned! I'm about to drop what FinCon *confirmed* for me last week--something I've been feeling for months now. Sorry in advance for the rant. Want 1 roundup email of fun & useful resources for creators? JOIN MY NEWSLETTER! https://petemcpherson.com/ OTHER WAYS I CAN HELP YOU: - Do You Even Blog: A+ b…
…
continue reading
Please enjoy this encore of Word Notes. A cyber threat intelligence analysis model that defines relationship pairs between four core components in the shape of a diamond of adversary playbook activity across the intrusion kill chain: the adversary, their capability, the infrastructure used or attacked, and the victim. CyberWire Glossary link: http…
…
continue reading
This week, our hosts Dave Bittner, Joe Carrigan, and Maria Varmazis (also host of the T-Minus Space Daily show) are sharing the latest in social engineering scams, phishing schemes, and criminal …
…
continue reading

1
S6 Ep 06 – Zunes, Beans and Black Friday Cyber Monday things. With Mike Auldredge of Customer.io
34:05
34:05
Play later
Play later
Lists
Like
Liked
34:05It’s been a long time coming for this interview to happen. The courteous and hilarious and Zunes biggest fan Mike Auldredge of Customer.io joined us with his friend and our now coworker Alison Gootee to brief you on what you should and shouldn't do for your Black Friday Cyber Monday prep. Yes, were talking about this in September because you need t…
…
continue reading
Please enjoy this encore of Word Notes. A knowledge base of adversary tactics, techniques, and procedures established and maintained by the MITRE Corporation. CyberWire Glossary link: https://thecyberwire.com/glossary/mitre-attck Audio reference link: “Attack Frameworks - SY0-601 CompTIA Security+ : 4.2,” Professor Messer, YouTube, 29 April 202…
…
continue reading
This week, our hosts Dave Bittner, Joe Carrigan, and Maria Varmazis (also host of the T-Minus Space Daily show) are sharing the latest in social engineering scams, phishing schemes, and criminal exploits t…
…
continue reading

1
Hot sauce and hot takes: An Only Malware in the Building special. [OMITB]
36:37
36:37
Play later
Play later
Lists
Like
Liked
36:37Welcome in! You’ve entered, Only Malware in the Building — but this time, it’s not just another episode. This is a special edition you won’t want to miss. For the first time, our hosts are together in-studio — and they’re turning up the heat. Literally. Join Selena Larson, Proofpoint intelligence analyst and host of their po…
…
continue reading
Please enjoy this encore of Word Notes. The set of people, process, technology, and cultural norms that integrates software development and IT operations into a system-of-systems. CyberWire Glossary link: https://thecyberwire.com/glossary/devops Audio reference link: "10+ Deploys Per Day: Dev and Ops Cooperation at Flickr," by John Allspaw and …
…
continue reading
This week, our hosts Dave Bittner, Joe Carrigan, and Maria Varmazis (also host of the T-Minus Space Daily show) are sharing the latest in social engineering scams, phishing schemes, and criminal exploits that are ma…
…
continue reading

1
Waterfall Software Development Method (noun) [Word Notes]
6:25
6:25
Play later
Play later
Lists
Like
Liked
6:25Please enjoy this encore of Word Notes. A software development model that relies on a series of sequential steps that flow into each other, like a series of waterfalls. CyberWire Glossary link: https://thecyberwire.com/glossary/waterfall-software-development Audio reference link: “Creating Video Games - Agile Software Development,” by Sara Verr…
…
continue reading

1
Scammers hit the right notes in the wrong way.
49:06
49:06
Play later
Play later
Lists
Like
Liked
49:06This week, our hosts Dave Bittner, Joe Carrigan, and Maria Varmazis (also host of the T-Minus Space Daily show) are sharing the latest in social engineering scams, phishing schemes, and criminal exploits that are making headlines. We s…
…
continue reading

1
Agile Software Development Method (noun) [Word Notes]
7:45
7:45
Play later
Play later
Lists
Like
Liked
7:45Please enjoy this encore of Word Notes. A software development philosophy that emphasizes incremental delivery, team collaboration, continual planning, and continual learning CyberWire Glossary link: https://thecyberwire.com/glossary/agile-software-development Audio reference link: "Velocity 09: John Allspaw and Paul Hammond, "10+ Deploys Pe," …
…
continue reading

1
S6 Ep 05 – The BIMI Group, how they’re here to help with Matthew Vernhout
41:38
41:38
Play later
Play later
Lists
Like
Liked
41:38T-Bird put a call out to the BIMI group to find out more about the amazing work they're doing to guide users on how to set up BIMI authentication for their brands. When low and behold we find out our friend Matthew Vernhout is actually the Communications Chair over at the BIMI Group. Of course we had to bring him back in and find out how this super…
…
continue reading
This week, our hosts Dave Bittner, Joe Carrigan, and Maria Varmazis (also host of the T-Minus Space Daily show) are back sharing the latest in social engineering scams, phishing schemes, and criminal exploits that are making headlines. Joe's sto…
…
continue reading
Please enjoy this encore of Word Notes. The flagship product of the controversial Israeli spyware vendor, the NSO Group, use for remotely hacking mobile devices, most notably iPhones, via zero-click exploits. CyberWire Glossary link: https://thecyberwire.com/glossary/pegasus Audio reference link:“Cybersecurity beyond the Headlines: A Conversatio…
…
continue reading
This week, our hosts Dave Bittner, Joe Carrigan, and Maria Varmazis (also host of the T-Minus Space Daily show) are back sharing the latest in social engineering scams, phishing schemes, and criminal exploits that are making headlines. We start with some …
…
continue reading

1
Work from home, malware included. [OMITB]
32:14
32:14
Play later
Play later
Lists
Like
Liked
32:14Welcome in! You’ve entered, Only Malware in the Building. Join us each month to sip tea and solve mysteries about today’s most interesting threats. Your host is Selena Larson, Proofpoint intelligence analyst and host of their podcast DISCARDED. Inspired by the residents of a building in New York’s exclusive upper west side, Selena…
…
continue reading

1
Domain-based Message Authentication Reporting Conformance (DMARC) (noun) [Word Notes]
8:27
8:27
Play later
Play later
Lists
Like
Liked
8:27Please enjoy this encore of Word Notes. An open source email authentication protocol designed to prevent emails, spoofing in phishing, business email compromise or BEC, and other email-based attacks. CyberWire Glossary link: https://thecyberwire.com/glossary/pegasus Audio reference link:"Global Cyber Alliance's Phil Reitinger talks DMARC adoptio…
…
continue reading
In this special episode of Hacking Humans, while Joe and Maria take a well-earned summer break, we’re joined by a special guest host: Rob Allen, Chief Product Officer at ThreatLocker. Rob dives into the tactics and profile of the cybercriminal group known as Scattered Spider—a crew that’s gained notoriety for its cunning use of social engineering o…
…
continue reading
Please enjoy this encore of Word Notes. A condition announced by the US Cybersecurity and Infrastructure Security Agency (CISA) to draw attention to a temporary period of high alert, associated with expectation of a connected wave of cyberattacks prompted by either a widespread vulnerability or an unusually active and capable threat actor. CyberWir…
…
continue reading
This week, our hosts Dave Bittner, Joe Carrigan, and Maria Varmazis (also host of the T-Minus Space Daily show) are back sharing the latest in social engineering scams, phishing schemes, and criminal exploits that are making headlines. We've got some follow-up from…
…
continue reading

1
Software Assurance Maturity Model (SAMM) (noun) [Word Notes]
5:43
5:43
Play later
Play later
Lists
Like
Liked
5:43Please enjoy this encore of Word Notes. A prescriptive open source software security maturity model designed to guide strategies tailored to an organization’s specific risks. Audio reference link: "OWASPMSP - Pravir Chandra: Software Assurance Maturity Model (OpenSAMM)." by Pravir Chandra, OWASP MSP, 2009.…
…
continue reading
This week, our hosts Dave Bittner, Joe Carrigan, and Maria Varmazis (also host of the T-Minus Space Daily show) are back sharing the latest in social engineering scams, phishing schemes, and criminal exploits that are making headlines. Our hosts share some follow-up, includi…
…
continue reading

1
My system for figuring out what to work on ("trifecta method")
25:02
25:02
Play later
Play later
Lists
Like
Liked
25:02This has been a game-changer for me lately! Felt lost, created a spreadsheet, used AI, felt better ;) Want 1 roundup email of fun & useful resources for creators? JOIN MY NEWSLETTER! https://petemcpherson.com/ OTHER WAYS I CAN HELP YOU: - Do You Even Blog: A+ blog posts, podcast episodes, and YT videos to help you grow your audience. - Topical Map …
…
continue reading

1
Universal 2nd Factor (U2F) (noun) [Word Notes]
7:17
7:17
Play later
Play later
Lists
Like
Liked
7:17Please enjoy this encore of Word Notes. An open standard for hardware authentication tokens that use the universal serial bus, or USB, near-field communications, or NFCs, or Bluetooth to communicate one factor in a two-factor authentication exchange. Cyberwire Glossary link: https://thecyberwire.com/glossary/u2f Audio reference link: “Rise of…
…
continue reading
This week, our hosts Dave Bittner, Joe Carrigan, and Maria Varmazis (also host of the T-Minus Space Daily show) are back sharing the latest in social engineering scams, phishing schemes, and criminal exploits that are making headlines. We start with a ton of follow-up—from a sextortio…
…
continue reading

1
adversary group naming (noun) [Word Notes]
10:17
10:17
Play later
Play later
Lists
Like
Liked
10:17Please enjoy this encore of Word Notes. A cyber threat intelligence best practice of assigning arbitrary labels to collections of hacker activity across the intrusion kill chain.By N2K Networks
…
continue reading

1
Want people to actually listen to you? (literally) Listen to this.
20:01
20:01
Play later
Play later
Lists
Like
Liked
20:01Easy & practical tips for SPEAKING better (YouTube? Podcast? Speaking? Sales? Webinars? everything). Enjoy! Want 1 roundup email of fun & useful resources for creators? JOIN MY NEWSLETTER! https://petemcpherson.com/ OTHER WAYS I CAN HELP YOU: - Do You Even Blog: A+ blog posts, podcast episodes, and YT videos to help you grow your audience. - Topica…
…
continue reading

1
Unlock Newsletter Growth: How Understanding Your Subscriber Data Boosts Revenue with Niklas Wenzel | Episode 3 | The LetterStack Podcast
35:10
35:10
Play later
Play later
Lists
Like
Liked
35:10Curious why top newsletter creators obsess over their subscriber data? In this episode of the LetterStack Podcast, we dive deep with Niklas Wenzel, founder of MegaHit and the Audience Doctor newsletter, to reveal how understanding who’s on your list can transform your newsletter into a revenue machine. What you’ll learn: Why knowing your subscriber…
…
continue reading

1
How to Scale Your Newsletter: Nathan May talks newsletter advertising strategies | Episode 2 | The LetterStack Podcast
33:27
33:27
Play later
Play later
Lists
Like
Liked
33:27Are you struggling to grow your newsletter beyond those first 1,000 subscribers? In this episode of LetterStack, we sit down with Nathan May how to use newsletter advertising to scale your newsletter. Nathan is the founder of Feed Media, the growth agency behind The Rundown, The Neuron, Bootstrap Giants to name a few! Before we forget, subscribe fo…
…
continue reading

1
Brushed aside: The subtle scam you didn't order.
44:00
44:00
Play later
Play later
Lists
Like
Liked
44:00This week, our hosts Dave Bittner, Joe Carrigan, and Maria Varmazis (also host of the T-Minus Space Daily show) are back sharing the latest in social engineering scams, phishing schemes, and criminal exploits that are making headlines. We start with some follow up, as Joe shares with us a compl…
…
continue reading

1
The RMM protocol: Remote, risky, and ready to strike. [Only Malware in the Building]
39:25
39:25
Play later
Play later
Lists
Like
Liked
39:25Please enjoy this encore of Only Malware in the Building. Welcome in! You’ve entered, Only Malware in the Building. Join us each month to sip tea and solve mysteries about today’s most interesting threats. Your host is Selena Larson, Proofpoint intelligence analyst and host of their podcast DISCARDED. Inspired by the residents of a buil…
…
continue reading
Please enjoy this encore of Word Notes. A descriptive model that provides a baseline of observed software security initiatives and activities from a collection of volunteer software development shops. CyberWire Glossary link: https://thecyberwire.com/glossary/bsimm Audio reference link: “OWASP AppSecUSA 2014 - Keynote: Gary McGraw - BSIMM: A Dec…
…
continue reading