Search a title or topic

Over 20 million podcasts, powered by 

Player FM logo

Jack Rhysider Podcasts

show episodes
 
Artwork

1
Darknet Diaries

Jack Rhysider

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Explore true stories of the dark side of the Internet with host Jack Rhysider as he takes you on a journey through the chilling world of hacking, data breaches, and cyber crime. ¿Hablas español? Escucha en español aquí ➔ https://darknetdiaries.com/es/
  continue reading
 
Ann Johnson, Corporate Vice President and Deputy Chief Information Security Officer at Microsoft, talks with cybersecurity thought leaders and influential industry experts about the trends shaping the cyber landscape and what should be top-of-mind for the C-suite and other key decision makers. Ann and her guests explore the risk and promise of emerging technologies, as well as the impact on how humans work, communicate, consume information, and live in this era of digital transformation. Ple ...
  continue reading
 
Artwork

1
The I.T. Career Podcast

The Bearded I.T. Dad - Dakota Snow

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
Empowering Your IT Career Journey – From the first step to success! With a passion for technology and a mission to uplift others, I’m here to guide you through the dynamic IT industry. Whether you're just starting or looking to advance, you’ve found a community dedicated to your growth. Advice & Insights: From Help Desk to Director of Network Operations in 3 years, I share strategies to fast-track your career. Expert Conversations: Gain exclusive insights from industry leaders. Let’s make IT ...
  continue reading
 
Artwork

1
Security Masterminds

Security Masterminds

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
The podcast that brings you the very best in all things, cybersecurity, taking an in-depth look at the most pressing issues and trends across the industry. Connect with us on our LinkedIn page! - https://www.linkedin.com/company/security-masterminds-podcast/
  continue reading
 
Artwork

1
Beyond the Barrier

Jake, Corwin, and, Joe

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
We are a group of friends that have worked in Public Safety in one way or another for most of our lives. We have long talked about starting a podcast to cover those things that not many shows will talk about. We also want to talk about and share our personal experiences with others in the hope that maybe we can help them learn from our experiences.
  continue reading
 
Welcome to Buzzsprout Conversations, the show where we dive into the real-life stories of podcasters in the middle of their podcasting journey. You'll hear stories from famous podcasters as well as everyday podcasters, just like you, share stories about how podcasting has impacted them and the things they've learned.
  continue reading
 
Artwork
 
Every week, we take a bite-sized look at legal and economic developments in locales around the world as we try to decipher global trends in law and business with the help of our international guests. No topic is too big, too small, too simple, or too complicated. We plan to cover continents, countries, regimes, governance, finances, legal developments, and whatever is trending on Twitter. Connect with us: - https://twitter.com/globallawbiz - https://www.linkedin.com/company/harris-bricken - ...
  continue reading
 
Loading …
show series
 
What if a USB cable could take complete control of your PC or phone? Hackers use them. Governments are using them. And it's all thanks to one security pro known only as "MG." Visit https://darknetdiaries.com/episode/161/ for a list of sources, full transcripts, and to listen to all episodes. ... https://www.youtube.com/watch?v=W81oWOf_RiE…
  continue reading
 
Please enjoy this encore episode of Afternoon Cyber Tea while Ann Johnson and team are taking a break. Jack Rhysider, the creator and host of cybersecurity podcast Darknet Diaries joins Ann on this week's episode of Afternoon Cyber Tea. Jack shares his journey from network security engineer to self-taught storyteller, detailing how his passion for …
  continue reading
 
In this episode we talk with mg (https://x.com/MG), the brilliant (and notorious) hacker and hardware engineer behind the OMG Cable. A seemingly ordinary USB cable with extraordinary offensive capabilities. Learn more about mg at: o.mg.lol Sponsors Support for this show comes from ThreatLocker®. ThreatLocker® is a Zero Trust Endpoint Protection Pla…
  continue reading
 
Join Ben Winters, director of AI and Privacy at the Consumer Federation of America, for a front-row seat to the chaotic world of AI regulation where dirty data, aggressive lobbying, and public confusion drive a "winner takes all" vibe. From shady therapy bots to data-fueled discrimination, Ben reveals the urgent need to create guardrails for AI bef…
  continue reading
 
Kristin got scammed because she didn't want to give a puppy mill her business. This classic digital scam has it all: fake breeders, phony shipping agents, and a non-existent air-conditioned crate. Kristen reveals how her scammers used trust, urgency and emotion, to close the deal. Listen to her story and what you can do to avoid getting duped yours…
  continue reading
 
Greg Linares (AKA Laughing Mantis) shares his hunts for Zero Day exploits, the triple(?) agent working at Microsoft, how he became the youngest hacker ever arrested in Arizona, and that time a client hired him to steal human DNA. Follow Greg on Twitter: https://x.com/Laughing_Mantis. Visit https://darknetdiaries.com/episode/160 for a list of source…
  continue reading
 
In this episode of the IT Career Podcast, I sit down with Network Chuck for a raw, unfiltered conversation about tech, career growth, burnout, content creation, certifications, and the real behind-the-scenes life of one of YouTube’s biggest tech creators.Whether you're just starting your IT journey or you're a seasoned professional, this episode is…
  continue reading
 
Jeetu Patel, President and Chief Product Officer at Cisco, joins Ann on this week's episode of Afternoon Cyber Tea to explore how artificial intelligence is reshaping the cybersecurity landscape. Jeetu shares insights on the urgent need for machine-scale defenses, the potential for defenders to finally tip the scale against attackers, and the impor…
  continue reading
 
Greg Linares (AKA Laughing Mantis) joins us to tell us about how he became the youngest hacker to be arrested in Arizona. Follow Greg on Twitter: https://x.com/Laughing_Mantis. Sponsors Support for this show comes from ThreatLocker®. ThreatLocker® is a Zero Trust Endpoint Protection Platform that strengthens your infrastructure from the ground up. …
  continue reading
 
If you have never listened to Chris Hutchins explain how to get free travel, you’ve probably been paying too much for your vacations. Turns out, a threat actor was listening to him and stole his miles. Download this week’s episode to hear how he hacked the situation to score even more points. (This episode originally airdropped September 26, 2022.)…
  continue reading
 
Every part of life that comes in contact with the Internet is tracked, packed and sold to a a seemingly infinite network of data brokers. Caitlin Sarian AKA Cybersecurity Girl joined us this week to discuss why scrubbing your information is trickier than it sounds and what you can do about it.By DeleteMe
  continue reading
 
Dr. Aleise McGowan, Chief Information Security Officer of BlackGirlsHack and a 20-year cybersecurity veteran, joins Ann on this week's episode of Afternoon Cyber Tea. Aleise shares how a career-defining hack early on shifted her trajectory from developer to defender, and why she believes the future of security lies in resilience, diversity, and hum…
  continue reading
 
Nicole Perlroth’s book This Is How They Tell Me the World Ends is a masterpiece on the topic of cyberwar and the zero-day hacks that make it deadly. Join us as we explore with Perlroth a cyberscape where mistakes are weaponized, backdoors abound and we all have zero degrees of separation from spies and the people they spy on.…
  continue reading
 
Get Total Network Visibility today and better understand your network: https://itdad.info/pathsolutionsIn this episode, I sit down with Tim Titus, CTO of @PathSolutions , live from the floor at Cisco Live—the world’s biggest networking conference. We dive into the evolution of network monitoring and why the tools you choose can make or break not ju…
  continue reading
 
Check out everything Careerist has to offer: https://crst.co/K0LtWThe speaker highlights that it's never too late for a career transition, even after 30, and that your job doesn't define your identity. There are many courses after bds abroad and bootcamps available that make it possible to improve your life. Changing your career change can be an in…
  continue reading
 
Unlock your dream job in IT with our proven community: https://itcareerjob.com/Jack Rhysider is the creator and voice behind Darknet Diaries, one of the most compelling podcasts in the cybersecurity world. But before the podcast, before the half-million downloads per episode, and before the NSA came knocking with stories of their own—Jack was just …
  continue reading
 
Yonatan Zunger, Corporate Vice President and Deputy Chief Information Security Officer for Artificial Intelligence at Microsoft joins Ann on this week's episode of Afternoon Cyber Tea. They dive into the evolving cybersecurity landscape shaped by generative and agentic AI, discussing both the opportunities and the risks. Yonatan shares insights on …
  continue reading
 
Some hackers steal your credit card. Others might snoop through your Web history. But what if your deepest, darkest secrets — the ones you only tell your therapist — were suddenly on the Internet, for anyone to read? When one of Finland's largest psychotherapy companies was breached, the stakes were so high that police worked around the clock hunti…
  continue reading
 
Joe Tidy investigates what may be the cruelest and most disturbing cyber attack in history. A breach so invasive it blurred the line between digital crime and psychological torture. This story might make your skin crawl. Get more from Joe linktr.ee/joetidy. Get the book Ctrl + Alt + Chaos: How Teenage Hackers Hijack the Internet (https://amzn.to/3H…
  continue reading
 
As technology is integrated deeper into classrooms, the lines between education and data privacy have been destroyed by for-profit data miners. This week, privacy advocate Shannon Edwards reveals how educational apps harvest sensitive information from children, commodify their data, and what parents can do to fight it.…
  continue reading
 
Save 40% on Coursera Plus for 3 Months: https://imp.i384100.net/c/1341007/2942209/14726Learn about the secrets of hiring and how companies sometimes create job positions for the right candidate, even if there aren't any official openings. This episode offers useful career advice and touches on the importance of cultural fit when assessing candidate…
  continue reading
 
Dr. Hugh Thompson, Executive Chairman of RSA Conference and Managing Partner at Crosspoint Capital joins Ann on this week's episode of Afternoon Cyber Tea. They discuss what goes into planning the world’s largest cybersecurity conference—from theme selection to llama-related surprises on the expo floor—and how the RSA community continues to evolve.…
  continue reading
 
$1000 OFF ANY Springboard Tech Boot camps with my code THEBEARDEDITDAD. See if you qualify for the JOB GUARANTEE! 👉 https://itdad.info/springboardJoin me as I chat with Anil Varanasi, an experienced network engineer who shares his journey from studying at George Mason to mastering networking fundamentals in the field. Through career guidance and pr…
  continue reading
 
Start the FREE I.T. Introduction Course with CourseCareers Now: https://coursecareers.com/a/thebeardeditdad?course=itAre you unknowingly killing your tech career before it even starts?In this video, I break down the most overlooked job that opens doors to nearly every tech career — from cybersecurity and networking to cloud, DevOps, and beyond.Whet…
  continue reading
 
MalwareTech was an anonymous young security researcher, until he stumbled upon the command and control server for WannaCry, a Windows exploit developed by the NSA and weaponized by North Korea (probably). When he registered the domain, he inadvertently hit the kill switch for this terrifying ransomware - and exposed his identity to the entire world…
  continue reading
 
On this special episode of Afternoon Cyber Tea, Ann brings listeners inside the 2025 RSA Conference to explore the intersection of AI, quantum computing and cyber resiliency with two visionary experts: Massachusetts Institute of Technology’s Vinod Vaikuntanathan and Dr. Sasha O’Connell from The Aspen Institute. Vinod shares how quantum computing po…
  continue reading
 
MalwareTech was an anonymous security researcher, until he accidentally stopped WannaCry, one of the largest ransomware attacks in history. That single act of heroism shattered his anonymity and pulled him into a world he never expected. https://malwaretech.com Sponsors Support for the show comes from Black Hills Information Security. Black Hills h…
  continue reading
 
From elections to ransomware, CISA Director Jen Easterly breaks down the threats to America’s critical infrastructure and what’s being done to stop them, sharing along the way her journey from the real-life battlefield to the frontlines of cybersecurity. This is a rare glimpse into the most pressing threats America faces—and a compelling story abou…
  continue reading
 
Save 40% on Coursera Plus for 3 Months: https://imp.i384100.net/c/1341007/2942209/14726You’ve got the skills. You’ve put in the work.But despite your experience, you’re still being passed over… Why?In this episode, I sit down with public speaking coach Geoffrey Huck to uncover the silent career killer that holds back even the smartest tech pros: co…
  continue reading
 
Think you’re too savvy to get scammed? Author and activist Cory Doctorow explains how we’re all one muffaletta and a malfunctioning jet door away from falling prey to the most basic of cons. He joins us this week to talk about that and to fill us in about his new book, “The Bezzle.”By DeleteMe
  continue reading
 
Want to land a cybersecurity job? Start with hands-on training from TryHackMe: https://tryhackme.com/why-subscribe?utm_source=youtube&utm_medium=social&utm_campaign=dakota_21aprilIn this episode, I sit down with Kenneth Ellington, cybersecurity instructor and founder of Ellington Cyber Academy, to break down how to build a high-paying career in cyb…
  continue reading
 
Loading …
Copyright 2025 | Privacy Policy | Terms of Service | | Copyright
Listen to this show while you explore
Play