As a business owner, you take risks every day. Would you take a risk with your CYBERSECURITY? Join us on the Think Cyber Secure Podcast to get actionable tips and information that you can use to uncover the hidden gaps in your business that cause cyber risk and fix them resulting in a stronger and more secure business.
…
continue reading
Think Cyber Secure Podcasts
Cyber Security can be a difficult field to not only understand but to also navigate. Joe South is here to help with over a decade of experience across several domains of security. With this podcast I hope to help more people get into IT and Cyber Security as well as discussing modern day Cyber Security topics you may find in the daily news. Come join us as we learn and grow together!
…
continue reading
Think like a hacker. Defend like a pro. Welcome to the Secure AF Cybersecurity Podcast — your tactical edge in the ever-evolving cyber battlefield. Hosted by industry veterans including Donovan Farrow and Jonathan Kimmitt, this podcast dives deep into real-world infosec challenges, red team tactics, blue team strategies, and the latest tools shaping the cybersecurity landscape. Whether you're a seasoned pentester, a SOC analyst, or just breaking into the field, you'll find actionable insight ...
…
continue reading
Shaping Cybersecurity Leadership: Today, Tomorrow, Together.
…
continue reading
There is “no one way” to start and stay in the field of cyber security. Whether you are involved from the military, law enforcement, consulting, or IT services, it doesn’t matter. I have had countless discussions for years with other professionals online, at conferences, or over drinks, which have changed the way I think about cyber security. That is where this podcast comes in. What if I can capture those moments and frank discussions? I want to share the stories from other cyber security l ...
…
continue reading
Selva Kumar is SAP Career Trainer specializing in SAP Career Coaching, identifying skills for getting a Job. You can reach me @ 302 494 9476 or Email: [email protected] Download Free SAP GRC Guide. http://expressgrc.com/sap-grc-10-1-step-step-guide/
…
continue reading
Award-winning info about Canadian privacy and tech law from Canadian privacy lawyer David Fraser. Seriously, I won a Canadian Law Blog Award (Clawbie!) in 2023 for the YouTube version of this channel.
…
continue reading
Cybermidnight Club– Hackers, Cyber Security and Cyber Crime is a trailblazing podcast by Alberto Daniel Hill, an expert in cybersecurity and the first person in Uruguay to serve prison for a computer-related crime. A crime he isn’t guilty of, perhaps one which never happened. Join Alberto as he dives deep into the world of hackers and cybersecurity in his riveting podcast. In this series, Alberto provides firsthand insights into the dark web and expert analysis of cybersecurity issues that a ...
…
continue reading
On Ahead of the Threat, Bryan Vorndran, assistant director of the FBI’s Cyber Division, and Jamil Farshchi—a strategic engagement advisor for the FBI who also works as Equifax’s executive vice president and chief information security officer—discuss emerging cyber threats and the enduring importance of cybersecurity fundamentals. Featuring distinguished guests from the business world and government, Ahead of the Threat will confront some of the biggest questions in cyber: How will emerging t ...
…
continue reading
Want to hear what industry experts really think about the cyber threats they face? ShadowTalk is a weekly cybersecurity podcast, made by practitioners for practitioners, featuring analytical insights on the latest cybersecurity news and threat research. Threat Intelligence Analyst John Dilgen brings extensive expertise in cyber threat intelligence and incident response, specializing in researching threats impacting ReliaQuest customers. John and his guests provide practical perspectives on t ...
…
continue reading
Become a Paid Subscriber: https://podcasters.spotify.com/pod/show/jon-atack-family--friends/subscribe Become a Paid Subscriber: https://anchor.fm/jon-atack-family--friends/subscribe jon atack, along with his son sam, present a series of educational podcasts on how to spot, avoid, and overcome unethical manipulation of all kinds - from destructive cults and abusive relationships, to advertising, groupthink, bullying and more. join us in our hope to create a world where people are taught from ...
…
continue reading
NorthStandard‘s podcast features thought-provoking discussions on news and topics in the maritime industry. We talk with experts from the club and special guests in the field from around the world
…
continue reading
Electricity. Finance. Transportation. Our water supply. In Hack the Plant, podcast host Bryson Bort looks for answers to the question: Does connecting these systems, and others, to the internet leaves us more vulnerable to attacks by our enemies? We often take these critical infrastructure systems for granted, but they’re all becoming increasingly dependent on the internet to function. From the ransomware threats of Colonial Pipeline to the failure of the Texas power grid, it is clear our in ...
…
continue reading
Cyber After Hours: The Podcast Where Real Cyber Pros Let Loose What’s It All About? Think of it as that relaxed, late-night bar conversation you have with a fellow cybersecurity pro—except now it’s on the record. Co-hosts (and longtime friends) Paul Marco and Evan Morgan bring decades of combined experience in cybersecurity, from hands-on operations to engineering and architecture. Unscripted & Authentic Every week, they draw a random cybersecurity topic from a “fishbowl” and dive right in. ...
…
continue reading
We dissect the tech news train wrecks of the week, calling out what went wrong and who’s to blame. Think of this podcast as if Kurt Cobain threw down with Tom from MySpace, Elon Musk, and Mark Zuckerberg in a back alley brawl. No mercy, no filter—if tech had a walk of shame, this would be it.
…
continue reading
MAD Warfare™️ is a science-driven deep dive into the wild, weird, and sometimes wicked world of the "weaponization of everything." But don't worry—IT WILL BE FUN. Think of it as your covert ops manual for spotting how cyber hackers, rogue AI agents, and shady "bad actors" (who'd be terrible in a buddy comedy) are messing with our minds. Often in ways that evade detection… until it's too late. With expert interviews from unexpected places and plenty of offbeat insights, this podcast reveals t ...
…
continue reading
Welcome to the Security Intelligence Podcast, where we discuss cyber security industry analysis, tips and success stories. Join co-hosts Pam Cobb and David Moulton, security thought leaders and industry professionals as they discuss their experiences and expertise on the latest trends and developments in enterprise security. For even more security content, visit https://securityintelligence.com. 095940
…
continue reading
From technology to workplace culture, from geopolitical trends to economics, Heavy Strategy debates pivotal questions in enterprise IT. Hosts Johna Till Johnson & John Burke bring their technical expertise, analytical acumen, and contrasting viewpoints to discuss complex topics of interest to IT leaders. Frequently irreverent and always thought-provoking, these are the conversations you wish you could have at the leadership table. Tune in and join the think tank, where unanswered questions a ...
…
continue reading
Pathways-2-Partnership (P2P) delivers expert insights, real-world success stories, and actionable strategies from MoveAmerica—the premier think tank for public-private collaboration. Each episode will explore innovations, partnerships, and policies that strengthen the defense industrial base, secure supply chains, and drive mission success. Created for entrepreneurs, industry executives, government leaders, and policy makers, P2P helps you navigate the acquisition processes, ethically influe ...
…
continue reading
Dive into “Compromising Positions”, the unique, new podcast designed to iron out the wrinkles in the relationship between cybersecurity teams and other tech professionals. We’re taking the ‘security as a blocker’ stereotype head-on, promoting a shared language and mutual understanding. We’ll turn those ‘compromising positions’ into ‘compromising solutions’, helping security pros and tech teams collaborate more effectively for a smoother, safer digital journey. Every week we will be joined by ...
…
continue reading
The brave new world of podcasts, let’s do it.
…
continue reading
Industrial Cybersecurity Insider offers a thorough look into the field of industrial cybersecurity for manufacturing and critical infrastructure. The podcast delves into key topics, including industry trends, policy changes, and groundbreaking innovations. Each episode will feature insights from key influencers, policy makers, and industry leaders. Subscribe and tune in weekly to stay in the know on everything important in the industrial cybersecurity world!
…
continue reading
Author, feminist, gay rights activist and political commentator Margaret Hoover leads a rigorous exchange of ideas with America’s political and cultural newsmakers. In the spirit of William F. Buckley Jr.’s iconic “Firing Line,” Hoover engages with thought leaders on the pivotal issues moving the nation forward. New podcast episodes drop weekly, and sometimes more, featuring bonus content you won’t hear on TV.
…
continue reading
This podcast series is brought to you by Lookout. In each episode, host Hank Schless brings on guests from different corners of cybersecurity to discuss the impact various technology trends and events are having on how we think about security and privacy.
…
continue reading
There are great stories in the security industry that aren’t being told. Fascinating people who fly below the radar and aren’t being heard. We know because we encounter them in hallways, hotel lobbies and just about everywhere imaginable across the globe. Everytime we think “I wish I had recorded that conversation so that everyone could hear it…” Our goal with Security Voices is to provide a place for clear-headed dialogue with great people that’s unencumbered by the hyperbole and shouting t ...
…
continue reading
Welcome to The Bare Metal Cyber CISSP Audio Course—your comprehensive companion for mastering the Certified Information Systems Security Professional (CISSP) certification. Built for serious cybersecurity professionals and aspiring leaders alike, this Audio Course transforms the eight domains of the CISSP Common Body of Knowledge into clear, structured, and engaging lessons you can learn anytime, anywhere. Each episode blends real-world context, expert insight, and exam-focused explanations ...
…
continue reading
In this podcast we discuss mentoring in cybersecurity, information for those that are looking to get into cybersecurity, and tips for those that are looking to advance their careers.
…
continue reading
The Ambitious Bookkeeper podcast is for bookkeepers & accountants who are growing or aspiring to start their own business. Our mission is to elevate the bookkeeping profession by providing support and resources for new and experienced firm owners. We share actionable tips on running a successful bookkeeping business, tools and resources, plus guest expert interviews that will help you elevate your business. Where you can find us: Website: https://www.ambitiousbookkeeper.com BBA: https://www. ...
…
continue reading
Intro – Hi, my names Kyle Aitken and this is a short documentary about the problems of Cyber Security at work. Interview 1 – Hello my names Neil Martin, I don’t know wither that’s the first thing I shouldn’t be saying, given the fact were talking about security. But since you don’t know where I am or where I live, we should be ok at that level. I work as an internet and security specialist, em, I work in mainly the financial sector, but also in various other business areas. Em, I specialize ...
…
continue reading
Welcome to the Re-Thinking the Human Factor podcast. It's a podcast for information security professionals, where we will be asking our guests to share thoughts and insights on security awareness, behaviour and culture. Our guests come, predominately, from outside of the security industry. They all specialise in elements of awareness, behaviour and culture, or they have effectively tackled similar challenges, in their own industry or careers. The one thing that unites them all is their willi ...
…
continue reading
Intel 471's podcast with a twist! Join us for the first fully interactive threat hunting podcast where you can hang out with threat hunters from all over the world! Join a rag-tag bunch of threat hunters as they come out of the woods to explore some of the most burning issues related to cyber security. The Out of the Woods podcast is a casual talk covering the topics of threat hunting, security research, and threat intelligence, and some ranting and raving along the way, all over a cocktail ...
…
continue reading
Discussions over drinks with security, defense, and foreign policy insiders and experts. The original War on the Rocks podcast series.
…
continue reading
The Bare Metal Cyber CCISO Audio Course is your complete, executive-level training companion for mastering the Certified Chief Information Security Officer (CCISO) certification. Built for experienced cybersecurity professionals and strategic leaders, this Audio Course delivers over seventy focused episodes covering every domain, concept, and competency area tested on the official EC-Council exam. From governance, risk, and compliance to strategic planning, vendor oversight, and technical co ...
…
continue reading
The Hack Podcast, straight-talk smart tech. Leon McQuade, Paul Longely and Dean Bulfeild bring a leader’s eye over technology drivers shaping the world back to East Yorkshire. We now live in a dazzling world of screens that continues to revolutionise how we live, work and play. The futures arriving faster than ever before, it's time to Think Different. We talk transformation and change focusing on People, Process and Technology. Originally Inspired By Pete Lindsay and Mark Bawden's Book “Pig ...
…
continue reading
Just Lookin’ Out is the first podcast from online safety advocate Kalie Nitzsche who was inspired to create this show after being spectacularly duped by a guy she met on the dating apps. It’s a safe place to share, relate, commiserate, and get practical tips about how to survive this fast-paced digital first world. How do we protect ourselves from a scam? What good or bad traits should we be on the lookout for if we're meeting people for the first time online? How can Kalie and her guests he ...
…
continue reading
When the threats are real and the stakes are high — what actually works? Right now, as you're reading this, someone's watching your family, your business rivals are digging through your digital history, and a disgruntled employee knows exactly where your vulnerabilities are. While you're focused on your day job, they're building a plan. This podcast exists because ignoring threats doesn't make them disappear. I'm Philip Grindell — former Scotland Yard detective, behavioural threat specialist ...
…
continue reading
Wait Just an Infosec is a weekly hour-long cybersecurity-focused broadcast produced by SANS Institute, streamed live on LinkedIn and YouTube, Tuesdays at 10am ET and available to listen to in podcast format on Wednesdays. Our hosts and invited guests are a rotating lineup of SANS faculty members and experts across all infosec domains – some of the brightest minds in cybersecurity, with decades of experience as practitioners. Each week will offer thought-provoking, rich content for a full ran ...
…
continue reading
1
RAISING HER CONFIDENTLY | Connecting with Teens, Parenting Styles, Family Communication, Raising Teen Daughters
Jeannie Baldomero | Parenting Teens Coach Inspired by Brene Brown, Mark Gregston, Gary Chapman
Do you want to have open communication with your teen daughter? Do you find yourself up late at night constantly thinking about how to talk to your teen or why she’s not opening up to you? Do you wake up with confident intentions only to feel confused and frustrated when you get 1-word answers from your daughter or instead of the deep conversations you hoped to have, you end up in a yelling match? Hi, I’m Jeannie. I think back to when I was 13. I was that teenage girl you are googling about! ...
…
continue reading
1
Critical Thinking in the Age of Digital Propaganda - misinformation and disinformation
31:07
31:07
Play later
Play later
Lists
Like
Liked
31:07The provided text is a transcript of a Twitter Spaces discussion where participants explored the significant threats posed by misinformation and disinformation in the context of cyber culture and societal stability. The conversation clarifies that disinformation is the deliberate spreading of false information, often for financial or political gain…
…
continue reading
1
Digital Justice in Uruguay: Hill's Case and the Anthem of Resistance
38:22
38:22
Play later
Play later
Lists
Like
Liked
38:22the provided text examines the modern struggle for freedom and justice in Uruguay by comparing the plight of traditional political prisoners with the challenges faced by the contemporary "digital prisoner." This extensive analysis focuses on Alberto Daniel Hill, the country's first incarcerated "hacker," whose wrongful prosecution following an ethi…
…
continue reading
In the season five finale of the Cyber Security Mentors podcast, hosts Steve and John reflect on the season's highlights, featuring insightful discussions with various cybersecurity experts. They recap key lessons learned, including leadership during crises, negotiation tactics, and the importance of community support. The episode also addresses li…
…
continue reading
1
La Fabricación de la Realidad 1: Dentro de la Economía Sombra de las Redes Sociales
9:11
9:11
Play later
Play later
Lists
Like
Liked
9:11Bienvenidos al CyberMidnight Club. Esta noche, arrancamos la interfaz brillante de tus aplicaciones favoritas para revelar el vientre oscuro, húmedo y lleno de cables de internet. Estamos investigando "La Fabricación de la Realidad": una economía sumergida multimillonaria donde el consenso online se fabrica, se compra y se vende a escala industrial…
…
continue reading
1
The Fabrication of Reality 2: Inside the Shadow Economy of Social Media
39:49
39:49
Play later
Play later
Lists
Like
Liked
39:49Welcome to the CyberMidnight Club. Tonight, we strip away the glossy interface of your favorite apps to reveal the humid, cable-strewn underbelly of the internet. We are investigating "The Fabrication of Reality"—a multi-billion dollar shadow economy where online consensus is manufactured, bought, and sold on an industrial scale. You look at your s…
…
continue reading
1
The Fabrication of Reality 1: Inside the Shadow Economy of Social Media Host:
8:07
8:07
Play later
Play later
Lists
Like
Liked
8:07Welcome to the CyberMidnight Club. Tonight, we strip away the glossy interface of your favorite apps to reveal the humid, cable-strewn underbelly of the internet. We are investigating "The Fabrication of Reality"—a multi-billion dollar shadow economy where online consensus is manufactured, bought, and sold on an industrial scale. You look at your s…
…
continue reading
1
Uruguay Data Hack Compromised Three Million Records
12:49
12:49
Play later
Play later
Lists
Like
Liked
12:49The combined sources present a critical analysis of the October 2025 cybersecurity incident impacting Uruguay’s Plataforma GURI, the education system's central data repository for millions of citizens, including minors. Security analysts confirm this incident is part of a systemic cyber campaign targeting the Uruguayan public sector, concurrent wit…
…
continue reading
1
Desinformación es propaganda intencional, mientras que la mis información es la propagación involuntaria de falsedades
14:07
14:07
Play later
Play later
Lists
Like
Liked
14:07Basado en la transcripción del "Twitter Space" de 2021 y el análisis psicológico proporcionado, este resumen aborda la dinámica de la desinformación y el perfil de su anfitrión, Alberto Daniel Hill. Perfil del Anfitrión: Alberto Daniel HillAlberto Daniel Hill es perfilado como un experto en ciberseguridad con un coeficiente intelectual estimado de …
…
continue reading
1
Mexico's Cartel State: Violence and Deep Infiltration
38:11
38:11
Play later
Play later
Lists
Like
Liked
38:11The collected materials explore pressing issues across digital security, online communities, and geopolitical corruption. A foundational research report examines how trust and reputation are built and managed in unfiltered online spaces, using a user’s cyber-harassment crisis as a case study. Complementing this, other documents analyze the grave th…
…
continue reading
1
The Epstein You Don't Know: 4 Astonishing Claims From His Own Account of the 2008 Case
38:08
38:08
Play later
Play later
Lists
Like
Liked
38:08The public narrative surrounding Jeffrey Epstein's 2008 prosecution is well-established, painting a picture of a powerful man who used his wealth and connections to escape serious federal charges. However, a detailed, first-person account written by Epstein himself offers a meticulously constructed counter-narrative—an attempt to dismantle the publ…
…
continue reading
1
State Surveillance and Digital Rights in Uruguay
27:59
27:59
Play later
Play later
Lists
Like
Liked
27:59The collected sources examine the controversies surrounding Uruguay's sophisticated electronic surveillance system, "El Guardián," acquired by the Ministry of the Interior to intercept communications like mobile calls, landlines, and social media traffic. While government officials emphasize that the system operates strictly under judicial authoriz…
…
continue reading
1
Scattered Lapsus$ Hunters, SilverFox's ValleyRat Campaign, and More
25:01
25:01
Play later
Play later
Lists
Like
Liked
25:01Resources: https://linktr.ee/ReliaQuestShadowTalk Join host John and intelligence analysts Alex and Hayden as they discuss: Scattered Lapsus$ Hunters Targeting Zendesk (1:14) Microsoft Teams Guest Access Phishing Bypass (3:37) Dark AI Tools Enhancing Threat Actors (6:08) Silver Fox’s Campaign: Chinese APT Spotlight (10:05) John Dilgen: Cyber Threat…
…
continue reading
1
U.S.-Venezuela Tensions: Cyber Risks for American SOCs
6:32
6:32
Play later
Play later
Lists
Like
Liked
6:32Got a question or comment? Message us here! In this episode of the #SOCBrief, we dig into how world events can trigger cyber fallout that lands directly on the desks of security teams. From ransomware crews capitalizing on instability to hacktivists launching DDoS attacks and opportunistic actors going after vulnerable sectors, we talk through why …
…
continue reading
1
El ataque digital a tu relación de pareja
17:09
17:09
Play later
Play later
Lists
Like
Liked
17:09Para los oyentes del CyberMidnight Club, la conclusión forense es clara: las redes sociales han desplegado un exploit "Zero-Day" contra la unidad fundamental de la sociedad: la relación romántica. Estamos ante un cambio criminológico donde el smartphone actúa como un atacante "Man-in-the-Middle", interceptando la intimidad y reemplazándola con vali…
…
continue reading
Para los oyentes del CyberMidnight Club, la conclusión forense es clara: las redes sociales han desplegado un exploit "Zero-Day" contra la unidad fundamental de la sociedad: la relación romántica. Estamos ante un cambio criminológico donde el smartphone actúa como un atacante "Man-in-the-Middle", interceptando la intimidad y reemplazándola con vali…
…
continue reading
For listeners of the CyberMidnight Club, the forensic conclusion is stark: Social media has deployed a massive "Zero-Day" exploit against the foundational unit of human society—the romantic relationship. We are witnessing a criminological shift where the smartphone acts as a "Man-in-the-Middle" attacker, intercepting intimacy and replacing it with …
…
continue reading
1
223 | Using AI Securely + to Land Clients with Kelsey Silver
40:17
40:17
Play later
Play later
Lists
Like
Liked
40:17Send us a text In this episode, I'm chatting with my friend Kelsey Silver about something so many of you have been asking about - how the heck are we supposed to use AI without compromising our clients' security? Kelsey has a super unique background and she breaks down exactly what we need to look for when evaluating AI tools for our firms. Plus, s…
…
continue reading
Got a question or comment? Message us here! 📱 This #SecureAF episode covers the everyday questions and concerns people have when they think something unusual is happening with their devices or accounts. Hickman and Peters talk through typical scenarios, common misunderstandings, and the foundational steps that help people regain control of their ac…
…
continue reading
1
Former U.S. Secret Service Special Agent Shares Cyber Criminal Secrets
38:23
38:23
Play later
Play later
Lists
Like
Liked
38:23Former U.S. Secret Service Special Agent Richard LaTulip joins Craig Duckworth to reveal the hidden world of cyber criminal networks and infrastructure attacks. Drawing from his undercover work infiltrating dark web forums and catching some of the world's most sophisticated threat actors, Richard breaks down why traditional security approaches fail…
…
continue reading
1
HS119: Securing 2026: How AI, Quantum, and the AI-Powered Browser are Driving Enterprise Defense (Sponsored)
23:53
23:53
Play later
Play later
Lists
Like
Liked
23:53Anand Oswal, Executive Vice President at Palo Alto Networks, joins Johna Johnson and John Burke for a wide-ranging exploration of two emerging focal points of enterprise risk: cryptographically relevant quantum computing, and browser-mediated agentic AI. The looming arrival of quantum computers that can break legacy encryption has already created t…
…
continue reading
1
Dating Apps after 40 w/ TikTok Dating Guru Catherine Berra
59:53
59:53
Play later
Play later
Lists
Like
Liked
59:53Send us a text What’s the worst thing a guy can do before you meet him for a first date? Our guest this week has the answer! Catherine Berra, shares crazy tales from her book These Stories Are True ... I Sh#t You Not!: A Humorous Look at Online Dating for the Unsuspecting Older Human, detailing both her own wild experiences and those of her male an…
…
continue reading
1
286\\ Understanding Your Teenage Daughter's Development with Dr. Anna Levy-Warren
31:55
31:55
Play later
Play later
Lists
Like
Liked
31:55Wondering why can't your teen girl keep herself organized? Frustrated by her lack of skills in areas you know your teenage daughter should already know? Dr Anna Levy-Warren, clinical psychologist, founder of Organizational Tutors and mom of teens, talks about navigating the teen years: executive functioning-based strategies for thriving through mor…
…
continue reading
1
Cognitive Security in a Noisy World w John Bicknell
51:38
51:38
Play later
Play later
Lists
Like
Liked
51:38What happens when the information environment becomes too loud for the human brain to handle? And why does it feel like everyone — kids, adults, institutions, governments — is getting overwhelmed at the same time? We sit down with John Bicknell, former Marine and host of The Cognitive Crucible, to talk about the cognitive overload shaping modern li…
…
continue reading
1
Unlocking Data Protection: Vishnu Varma on Cybersecurity Challenges
53:55
53:55
Play later
Play later
Lists
Like
Liked
53:55Send us a text In this episode, Joe sits down with Vishnu Varma to explore the evolving landscape of cybersecurity and data management. Vishnu shares his journey from India to the US, detailing his experiences at Cisco and the rise of cloud security. They delve into the challenges of managing vast amounts of data in the age of AI, discussing how Bo…
…
continue reading
After surviving Thanksgiving and the subsequent biting cold, we jumped into the FOLLOW UP with news that Malaysia is joining the trend by taking steps to ban social media for children under 16, mirroring similar actions in Australia and Denmark—it seems the world is finally realizing the internet is a toxic wasteland for the kids. We also discussed…
…
continue reading
1
Robert George and Cornel West: Revisiting a conversation with an ideological odd couple
26:17
26:17
Play later
Play later
Lists
Like
Liked
26:17Conservative Robert George and progressive Cornel West talk to Margaret Hoover about their long-standing friendship that bridges their ideological differences in an interview recorded in 2020. George–who recently resigned from the board of the Heritage Foundation over its defense of Tucker Carlson’s interview with white nationalist Nick Fuentes–exp…
…
continue reading
A_Hacker_s_Fear_for_Mexico
…
continue reading
Ecosistema_tóxico_de_Twitter
…
continue reading
The Promise and Peril of a Global Conversation Imagine trying to tell your friends about something important you just saw online. You start to speak, “You guys are not going to believe what Trump just tweeted…”—but before you can finish, your phone buzzes. And again. And again. The constant stream of notifications, arguments, and alerts becomes so …
…
continue reading
1
We Tested ACI Learning’s Security+ Bundle — Here’s What We Found
36:57
36:57
Play later
Play later
Lists
Like
Liked
36:57In this episode of the Cyber Security Mentals podcast, hosts Steve and John delve into effective strategies for studying cybersecurity. They discuss the importance of structured learning, hands-on labs, and consistent practice, while exploring the challenges of self-paced learning. The episode highlights the benefits of programs like ACI Learning a…
…
continue reading
1
FortiWeb Zero-Day: Silent Patch and Firewall Wake-Up Call 🔥
6:36
6:36
Play later
Play later
Lists
Like
Liked
6:36Got a question or comment? Message us here! This week’s #SOCBrief dives into the FortiWeb zero-day that’s letting attackers create admin accounts with a single unauthenticated HTTP request. With exploitation spiking and Fortinet pushing out a quiet fix, SOC teams are under pressure to lock down configs, audit firewalls, and patch fast. We break dow…
…
continue reading
1
If Scientology Ruled - chapter six: Hubbard the godmaker - part two
5:49
5:49
Play later
Play later
Lists
Like
Liked
5:49part two of chapter six: Hubbard the godmaker Like this sample? buy the whole book here Written by Jon Atack, author of the bestselling expose, Let's Sell These People a Piece of Blue Sky, this book is a frightening look into an alarming possible future – and a fascinating deep dive into the history that could lead us there.#scientologycult #davidm…
…
continue reading
1
If Scientology Ruled - chapter six: Hubbard the godmaker - part one
6:34
6:34
Play later
Play later
Lists
Like
Liked
6:34part one of chapter six: Hubbard the godmaker Like this sample? buy the whole book here Written by Jon Atack, author of the bestselling expose, Let's Sell These People a Piece of Blue Sky, this book is a frightening look into an alarming possible future – and a fascinating deep dive into the history that could lead us there.#scientologycult #davidm…
…
continue reading
1
If Scientology Ruled - chapter five: The Blood Ritual and The Fool - part two
9:33
9:33
Play later
Play later
Lists
Like
Liked
9:33part two of chapter five: The Blood Ritual and The Fool Like this sample? buy the whole book here Written by Jon Atack, author of the bestselling expose, Let's Sell These People a Piece of Blue Sky, this book is a frightening look into an alarming possible future – and a fascinating deep dive into the history that could lead us there.#scientologycu…
…
continue reading
1
If Scientology Ruled - chapter five: The Blood Ritual and The Fool - part one
10:10
10:10
Play later
Play later
Lists
Like
Liked
10:10part one of chapter five: The Blood Ritual and The Fool Like this sample? buy the whole book here Written by Jon Atack, author of the bestselling expose, Let's Sell These People a Piece of Blue Sky, this book is a frightening look into an alarming possible future – and a fascinating deep dive into the history that could lead us there.#scientologycu…
…
continue reading
1
If Scientology Ruled - chapter four: The Empress – Hubbard’s Holy Guardian Angel - part three
10:47
10:47
Play later
Play later
Lists
Like
Liked
10:47part three of chapter four: The Empress – Hubbard’s Holy Guardian Angel Like this sample? buy the whole book here Written by Jon Atack, author of the bestselling expose, Let's Sell These People a Piece of Blue Sky, this book is a frightening look into an alarming possible future – and a fascinating deep dive into the history that could lead us ther…
…
continue reading
1
If Scientology Ruled - chapter four: The Empress – Hubbard’s Holy Guardian Angel - part two
10:04
10:04
Play later
Play later
Lists
Like
Liked
10:04part two of chapter four: The Empress – Hubbard’s Holy Guardian Angel Like this sample? buy the whole book here Written by Jon Atack, author of the bestselling expose, Let's Sell These People a Piece of Blue Sky, this book is a frightening look into an alarming possible future – and a fascinating deep dive into the history that could lead us there.…
…
continue reading
1
If Scientology Ruled - chapter four: The Empress – Hubbard’s Holy Guardian Angel - part one
10:07
10:07
Play later
Play later
Lists
Like
Liked
10:07part one of chapter four: The Empress – Hubbard’s Holy Guardian Angel Like this sample? buy the whole book here Written by Jon Atack, author of the bestselling expose, Let's Sell These People a Piece of Blue Sky, this book is a frightening look into an alarming possible future – and a fascinating deep dive into the history that could lead us there.…
…
continue reading
1
If Scientology Ruled - chapter three: L. Ron Hubbard as the Antichrist
7:57
7:57
Play later
Play later
Lists
Like
Liked
7:57chapter three: L. Ron Hubbard as the Antichrist Like this sample? buy the whole book here Written by Jon Atack, author of the bestselling expose, Let's Sell These People a Piece of Blue Sky, this book is a frightening look into an alarming possible future – and a fascinating deep dive into the history that could lead us there.#scientologycult #davi…
…
continue reading
1
If Scientology Ruled - chapter two: Himmler’s lust for superpowers
3:57
3:57
Play later
Play later
Lists
Like
Liked
3:57chapter two: Himmler’s Lust for Superpowers Like this sample? buy the whole book here by Jon Atack, author of the bestselling expose, Let's Sell These People a Piece of Blue Sky, this book is a frightening look into an alarming possible future – and a fascinating deep dive into the history that could lead us there.#scientologycult #davidmiscavige…
…
continue reading
1
If Scientology Ruled - chapter one: Meet the Leader of the New World - part two
7:00
7:00
Play later
Play later
Lists
Like
Liked
7:00Part two of Chapter one - Meet the Leader of the New World Like this sample? buy the whole book here Written by Jon Atack, author of the bestselling expose, Let's Sell These People a Piece of Blue Sky, this book is a frightening look into an alarming possible future – and a fascinating deep dive into the history that could lead us there.#scientolog…
…
continue reading
1
If Scientology Ruled - chapter one: Meet the Leader of the New World - part one
7:14
7:14
Play later
Play later
Lists
Like
Liked
7:14Part one of Chapter one - Meet the Leader of the New World Like this sample? buy the whole book here Written by Jon Atack, author of the bestselling expose, Let's Sell These People a Piece of Blue Sky, this book is a frightening look into an alarming possible future – and a fascinating deep dive into the history that could lead us there.#scientolog…
…
continue reading
1
If Scientology Ruled the World - Introduction by Tony Ortega (with title page read by Jon Atack)
3:49
3:49
Play later
Play later
Lists
Like
Liked
3:49If Scientology Ruled the World: Introduction by Tony Ortega, read by Tony Ortega with titles, copyright and dedication read by Jon Atack Like this sample? buy the whole book here Written by Jon Atack, author of the bestselling expose, Let's Sell These People a Piece of Blue Sky, this book is a frightening look into an alarming possible future – and…
…
continue reading
1
Are Cyber Predictions Worth It? Plus Chinese AI Attacks, IoT Takeovers
27:53
27:53
Play later
Play later
Lists
Like
Liked
27:53Resources: https://linktr.ee/ReliaQuestShadowTalk Do you really need predictions to tackle cyber threats? Join host Kim along with intelligence analyst John & special guest CISO Rafal Baran as they discuss: New NPM Supply Chain Threat (1:13) China Manipulates AI for Initial Access (4:46) Cloud Gaps Bring IoT Takeover (7:29) 2026 Cyber-Threat Predic…
…
continue reading
Got a question or comment? Message us here! We’re back with the Hacker Holiday Gift Guide, and this year’s lineup is stacked with RF gadgets, Wi-Fi tools, red-team essentials, and quirky cyber gifts Tanner swears by. Whether you’re shopping for a pentester, a tinkerer, or someone who just loves breaking things (legally), these picks won’t miss. Get…
…
continue reading
1
HS118: Bricking the Company – Discussing Existential Threats with Leadership
35:05
35:05
Play later
Play later
Lists
Like
Liked
35:05AI and other technologies are increasingly capable of delivering company-ending events. How do you have “the conversation” with senior leadership–the one about the existential risks your organization faces, and the steps needed for remediation–in a way that ensures that your company is maximally protected, and that you get the resources you need? A…
…
continue reading
1
S3 Ep49: Guess Who: The Adversary Edition - 2
1:32:04
1:32:04
Play later
Play later
Lists
Like
Liked
1:32:04Can You Identify the Nation-State Actor? …
…
continue reading
1
Perception vs. Reality: Why Your Plant Floor Might Not Be as Secure as You Think
22:46
22:46
Play later
Play later
Lists
Like
Liked
22:46In this eye-opening conversation, Dino and Craig address a critical issue facing manufacturing organizations today: the dangerous gap between perceived and actual cybersecurity preparedness in operational technology (OT) environments. They discuss why many organizations "don't know what they don't know" when it comes to securing industrial control …
…
continue reading
1
285\\ Growing Gratitude: 4 Ways to Practice Thankfulness with Your Daughter
12:49
12:49
Play later
Play later
Lists
Like
Liked
12:49It’s so easy to get caught up in the chaos of life — the schedules, the moods, the constant running around — that we forget to pause and simply say thank you. But gratitude isn’t just a seasonal thing; it’s a way to reframe how we see our lives and how our daughters see theirs. When we model gratitude, our girls learn that thankfulness doesn’t depe…
…
continue reading
1
From Sewers To Subsea: Rethinking Data Centers And Defense
52:57
52:57
Play later
Play later
Lists
Like
Liked
52:57Send us a text We trace a winding path from offshore rigs to elite red team ops and into subsea data centers, using one sewer-side breach as the spark for a new way to secure and scale compute. Along the way we unpack social engineering basics, the blue vs red culture clash, and whether AI is building features or changing outcomes. • junk folders, …
…
continue reading