Search a title or topic

Over 20 million podcasts, powered by 

Player FM logo

Think Cyber Secure Podcasts

show episodes
 
Artwork

1
Think Cyber Secure

Think Cyber Secure

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
As a business owner, you take risks every day. Would you take a risk with your CYBERSECURITY? Join us on the Think Cyber Secure Podcast to get actionable tips and information that you can use to uncover the hidden gaps in your business that cause cyber risk and fix them resulting in a stronger and more secure business.
  continue reading
 
Cyber Security can be a difficult field to not only understand but to also navigate. Joe South is here to help with over a decade of experience across several domains of security. With this podcast I hope to help more people get into IT and Cyber Security as well as discussing modern day Cyber Security topics you may find in the daily news. Come join us as we learn and grow together!
  continue reading
 
Think like a hacker. Defend like a pro. Welcome to the Secure AF Cybersecurity Podcast — your tactical edge in the ever-evolving cyber battlefield. Hosted by industry veterans including Donovan Farrow and Jonathan Kimmitt, this podcast dives deep into real-world infosec challenges, red team tactics, blue team strategies, and the latest tools shaping the cybersecurity landscape. Whether you're a seasoned pentester, a SOC analyst, or just breaking into the field, you'll find actionable insight ...
  continue reading
 
Artwork

1
Cyber Security Interviews

Douglas A. Brush | Weekly Interviews w/ InfoSec Pros

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
There is “no one way” to start and stay in the field of cyber security. Whether you are involved from the military, law enforcement, consulting, or IT services, it doesn’t matter. I have had countless discussions for years with other professionals online, at conferences, or over drinks, which have changed the way I think about cyber security. That is where this podcast comes in. What if I can capture those moments and frank discussions? I want to share the stories from other cyber security l ...
  continue reading
 
Cybermidnight Club– Hackers, Cyber Security and Cyber Crime is a trailblazing podcast by Alberto Daniel Hill, an expert in cybersecurity and the first person in Uruguay to serve prison for a computer-related crime. A crime he isn’t guilty of, perhaps one which never happened. Join Alberto as he dives deep into the world of hackers and cybersecurity in his riveting podcast. In this series, Alberto provides firsthand insights into the dark web and expert analysis of cybersecurity issues that a ...
  continue reading
 
Artwork

1
Ahead of the Threat

Federal Bureau of Investigation

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
On Ahead of the Threat, Bryan Vorndran, assistant director of the FBI’s Cyber Division, and Jamil Farshchi—a strategic engagement advisor for the FBI who also works as Equifax’s executive vice president and chief information security officer—discuss emerging cyber threats and the enduring importance of cybersecurity fundamentals. Featuring distinguished guests from the business world and government, Ahead of the Threat will confront some of the biggest questions in cyber: How will emerging t ...
  continue reading
 
Want to hear what industry experts really think about the cyber threats they face? ShadowTalk is a weekly cybersecurity podcast, made by practitioners for practitioners, featuring analytical insights on the latest cybersecurity news and threat research. Threat Intelligence Analyst John Dilgen brings extensive expertise in cyber threat intelligence and incident response, specializing in researching threats impacting ReliaQuest customers. John and his guests provide practical perspectives on t ...
  continue reading
 
Artwork

1
jon atack, family and friends

jon atack, family and friends

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
Become a Paid Subscriber: https://podcasters.spotify.com/pod/show/jon-atack-family--friends/subscribe Become a Paid Subscriber: https://anchor.fm/jon-atack-family--friends/subscribe jon atack, along with his son sam, present a series of educational podcasts on how to spot, avoid, and overcome unethical manipulation of all kinds - from destructive cults and abusive relationships, to advertising, groupthink, bullying and more. join us in our hope to create a world where people are taught from ...
  continue reading
 
Artwork

1
Alongside

NorthStandard

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
NorthStandard‘s podcast features thought-provoking discussions on news and topics in the maritime industry. We talk with experts from the club and special guests in the field from around the world
  continue reading
 
Artwork

1
Hack the Plant

Bryson Bort

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Electricity. Finance. Transportation. Our water supply. In Hack the Plant, podcast host Bryson Bort looks for answers to the question: Does connecting these systems, and others, to the internet leaves us more vulnerable to attacks by our enemies? We often take these critical infrastructure systems for granted, but they’re all becoming increasingly dependent on the internet to function. From the ransomware threats of Colonial Pipeline to the failure of the Texas power grid, it is clear our in ...
  continue reading
 
Artwork
 
Cyber After Hours: The Podcast Where Real Cyber Pros Let Loose What’s It All About? Think of it as that relaxed, late-night bar conversation you have with a fellow cybersecurity pro—except now it’s on the record. Co-hosts (and longtime friends) Paul Marco and Evan Morgan bring decades of combined experience in cybersecurity, from hands-on operations to engineering and architecture. Unscripted & Authentic Every week, they draw a random cybersecurity topic from a “fishbowl” and dive right in. ...
  continue reading
 
Artwork

1
Grumpy Old Geeks

Jason DeFillippo & Brian Schulmeister with Dave Bittner

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
We dissect the tech news train wrecks of the week, calling out what went wrong and who’s to blame. Think of this podcast as if Kurt Cobain threw down with Tom from MySpace, Elon Musk, and Mark Zuckerberg in a back alley brawl. No mercy, no filter—if tech had a walk of shame, this would be it.
  continue reading
 
Artwork

1
MAD Warfare Podcast

STP Productions

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
MAD Warfare™️ is a science-driven deep dive into the wild, weird, and sometimes wicked world of the "weaponization of everything." But don't worry—IT WILL BE FUN. Think of it as your covert ops manual for spotting how cyber hackers, rogue AI agents, and shady "bad actors" (who'd be terrible in a buddy comedy) are messing with our minds. Often in ways that evade detection… until it's too late. With expert interviews from unexpected places and plenty of offbeat insights, this podcast reveals t ...
  continue reading
 
Welcome to the Security Intelligence Podcast, where we discuss cyber security industry analysis, tips and success stories. Join co-hosts Pam Cobb and David Moulton, security thought leaders and industry professionals as they discuss their experiences and expertise on the latest trends and developments in enterprise security. For even more security content, visit https://securityintelligence.com. 095940
  continue reading
 
Artwork

1
Heavy Strategy

Packet Pushers

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
From technology to workplace culture, from geopolitical trends to economics, Heavy Strategy debates pivotal questions in enterprise IT. Hosts Johna Till Johnson & John Burke bring their technical expertise, analytical acumen, and contrasting viewpoints to discuss complex topics of interest to IT leaders. Frequently irreverent and always thought-provoking, these are the conversations you wish you could have at the leadership table. Tune in and join the think tank, where unanswered questions a ...
  continue reading
 
Pathways-2-Partnership (P2P) delivers expert insights, real-world success stories, and actionable strategies from MoveAmerica—the premier think tank for public-private collaboration. Each episode will explore innovations, partnerships, and policies that strengthen the defense industrial base, secure supply chains, and drive mission success. Created for entrepreneurs, industry executives, government leaders, and policy makers, P2P helps you navigate the acquisition processes, ethically influe ...
  continue reading
 
Dive into “Compromising Positions”, the unique, new podcast designed to iron out the wrinkles in the relationship between cybersecurity teams and other tech professionals. We’re taking the ‘security as a blocker’ stereotype head-on, promoting a shared language and mutual understanding. We’ll turn those ‘compromising positions’ into ‘compromising solutions’, helping security pros and tech teams collaborate more effectively for a smoother, safer digital journey. Every week we will be joined by ...
  continue reading
 
Artwork

1
Industrial Cybersecurity Insider

Industrial Cybersecurity Insider

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
Industrial Cybersecurity Insider offers a thorough look into the field of industrial cybersecurity for manufacturing and critical infrastructure. The podcast delves into key topics, including industry trends, policy changes, and groundbreaking innovations. Each episode will feature insights from key influencers, policy makers, and industry leaders. Subscribe and tune in weekly to stay in the know on everything important in the industrial cybersecurity world!
  continue reading
 
Artwork

1
Firing Line with Margaret Hoover

Firing Line With Margaret Hoover

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
Author, feminist, gay rights activist and political commentator Margaret Hoover leads a rigorous exchange of ideas with America’s political and cultural newsmakers. In the spirit of William F. Buckley Jr.’s iconic “Firing Line,” Hoover engages with thought leaders on the pivotal issues moving the nation forward. New podcast episodes drop weekly, and sometimes more, featuring bonus content you won’t hear on TV.
  continue reading
 
Artwork

1
Security Voices

Security Voices

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
There are great stories in the security industry that aren’t being told. Fascinating people who fly below the radar and aren’t being heard. We know because we encounter them in hallways, hotel lobbies and just about everywhere imaginable across the globe. Everytime we think “I wish I had recorded that conversation so that everyone could hear it…” Our goal with Security Voices is to provide a place for clear-headed dialogue with great people that’s unencumbered by the hyperbole and shouting t ...
  continue reading
 
Welcome to The Bare Metal Cyber CISSP Audio Course—your comprehensive companion for mastering the Certified Information Systems Security Professional (CISSP) certification. Built for serious cybersecurity professionals and aspiring leaders alike, this Audio Course transforms the eight domains of the CISSP Common Body of Knowledge into clear, structured, and engaging lessons you can learn anytime, anywhere. Each episode blends real-world context, expert insight, and exam-focused explanations ...
  continue reading
 
The Ambitious Bookkeeper podcast is for bookkeepers & accountants who are growing or aspiring to start their own business. Our mission is to elevate the bookkeeping profession by providing support and resources for new and experienced firm owners. We share actionable tips on running a successful bookkeeping business, tools and resources, plus guest expert interviews that will help you elevate your business. Where you can find us: Website: https://www.ambitiousbookkeeper.com BBA: https://www. ...
  continue reading
 
Intro – Hi, my names Kyle Aitken and this is a short documentary about the problems of Cyber Security at work. Interview 1 – Hello my names Neil Martin, I don’t know wither that’s the first thing I shouldn’t be saying, given the fact were talking about security. But since you don’t know where I am or where I live, we should be ok at that level. I work as an internet and security specialist, em, I work in mainly the financial sector, but also in various other business areas. Em, I specialize ...
  continue reading
 
Welcome to the Re-Thinking the Human Factor podcast. It's a podcast for information security professionals, where we will be asking our guests to share thoughts and insights on security awareness, behaviour and culture. Our guests come, predominately, from outside of the security industry. They all specialise in elements of awareness, behaviour and culture, or they have effectively tackled similar challenges, in their own industry or careers. The one thing that unites them all is their willi ...
  continue reading
 
Artwork

1
Out of the Woods: The Threat Hunting Podcast

Out of the Woods: The Threat Hunting Podcast

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
Intel 471's podcast with a twist! Join us for the first fully interactive threat hunting podcast where you can hang out with threat hunters from all over the world! Join a rag-tag bunch of threat hunters as they come out of the woods to explore some of the most burning issues related to cyber security. The Out of the Woods podcast is a casual talk covering the topics of threat hunting, security research, and threat intelligence, and some ranting and raving along the way, all over a cocktail ...
  continue reading
 
The Bare Metal Cyber CCISO Audio Course is your complete, executive-level training companion for mastering the Certified Chief Information Security Officer (CCISO) certification. Built for experienced cybersecurity professionals and strategic leaders, this Audio Course delivers over seventy focused episodes covering every domain, concept, and competency area tested on the official EC-Council exam. From governance, risk, and compliance to strategic planning, vendor oversight, and technical co ...
  continue reading
 
Artwork

1
The Hack Podcast

Leon McQuade Paul Longley Dean Bulfield

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
The Hack Podcast, straight-talk smart tech. Leon McQuade, Paul Longely and Dean Bulfeild bring a leader’s eye over technology drivers shaping the world back to East Yorkshire. We now live in a dazzling world of screens that continues to revolutionise how we live, work and play. The futures arriving faster than ever before, it's time to Think Different. We talk transformation and change focusing on People, Process and Technology. Originally Inspired By Pete Lindsay and Mark Bawden's Book “Pig ...
  continue reading
 
Artwork

1
Just Lookin' Out!

SafeHer Studios LLC

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Just Lookin’ Out is the first podcast from online safety advocate Kalie Nitzsche who was inspired to create this show after being spectacularly duped by a guy she met on the dating apps. It’s a safe place to share, relate, commiserate, and get practical tips about how to survive this fast-paced digital first world. How do we protect ourselves from a scam? What good or bad traits should we be on the lookout for if we're meeting people for the first time online? How can Kalie and her guests he ...
  continue reading
 
When the threats are real and the stakes are high — what actually works? Right now, as you're reading this, someone's watching your family, your business rivals are digging through your digital history, and a disgruntled employee knows exactly where your vulnerabilities are. While you're focused on your day job, they're building a plan. This podcast exists because ignoring threats doesn't make them disappear. I'm Philip Grindell — former Scotland Yard detective, behavioural threat specialist ...
  continue reading
 
Artwork
 
Wait Just an Infosec is a weekly hour-long cybersecurity-focused broadcast produced by SANS Institute, streamed live on LinkedIn and YouTube, Tuesdays at 10am ET and available to listen to in podcast format on Wednesdays. Our hosts and invited guests are a rotating lineup of SANS faculty members and experts across all infosec domains – some of the brightest minds in cybersecurity, with decades of experience as practitioners. Each week will offer thought-provoking, rich content for a full ran ...
  continue reading
 
Artwork

1
RAISING HER CONFIDENTLY | Connecting with Teens, Parenting Styles, Family Communication, Raising Teen Daughters

Jeannie Baldomero | Parenting Teens Coach Inspired by Brene Brown, Mark Gregston, Gary Chapman

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly+
 
Do you want to have open communication with your teen daughter? Do you find yourself up late at night constantly thinking about how to talk to your teen or why she’s not opening up to you? Do you wake up with confident intentions only to feel confused and frustrated when you get 1-word answers from your daughter or instead of the deep conversations you hoped to have, you end up in a yelling match? Hi, I’m Jeannie. I think back to when I was 13. I was that teenage girl you are googling about! ...
  continue reading
 
Loading …
show series
 
The provided text is a transcript of a Twitter Spaces discussion where participants explored the significant threats posed by misinformation and disinformation in the context of cyber culture and societal stability. The conversation clarifies that disinformation is the deliberate spreading of false information, often for financial or political gain…
  continue reading
 
the provided text examines the modern struggle for freedom and justice in Uruguay by comparing the plight of traditional political prisoners with the challenges faced by the contemporary "digital prisoner." This extensive analysis focuses on Alberto Daniel Hill, the country's first incarcerated "hacker," whose wrongful prosecution following an ethi…
  continue reading
 
In the season five finale of the Cyber Security Mentors podcast, hosts Steve and John reflect on the season's highlights, featuring insightful discussions with various cybersecurity experts. They recap key lessons learned, including leadership during crises, negotiation tactics, and the importance of community support. The episode also addresses li…
  continue reading
 
Bienvenidos al CyberMidnight Club. Esta noche, arrancamos la interfaz brillante de tus aplicaciones favoritas para revelar el vientre oscuro, húmedo y lleno de cables de internet. Estamos investigando "La Fabricación de la Realidad": una economía sumergida multimillonaria donde el consenso online se fabrica, se compra y se vende a escala industrial…
  continue reading
 
Welcome to the CyberMidnight Club. Tonight, we strip away the glossy interface of your favorite apps to reveal the humid, cable-strewn underbelly of the internet. We are investigating "The Fabrication of Reality"—a multi-billion dollar shadow economy where online consensus is manufactured, bought, and sold on an industrial scale. You look at your s…
  continue reading
 
Welcome to the CyberMidnight Club. Tonight, we strip away the glossy interface of your favorite apps to reveal the humid, cable-strewn underbelly of the internet. We are investigating "The Fabrication of Reality"—a multi-billion dollar shadow economy where online consensus is manufactured, bought, and sold on an industrial scale. You look at your s…
  continue reading
 
The combined sources present a critical analysis of the October 2025 cybersecurity incident impacting Uruguay’s Plataforma GURI, the education system's central data repository for millions of citizens, including minors. Security analysts confirm this incident is part of a systemic cyber campaign targeting the Uruguayan public sector, concurrent wit…
  continue reading
 
Basado en la transcripción del "Twitter Space" de 2021 y el análisis psicológico proporcionado, este resumen aborda la dinámica de la desinformación y el perfil de su anfitrión, Alberto Daniel Hill. Perfil del Anfitrión: Alberto Daniel HillAlberto Daniel Hill es perfilado como un experto en ciberseguridad con un coeficiente intelectual estimado de …
  continue reading
 
The collected materials explore pressing issues across digital security, online communities, and geopolitical corruption. A foundational research report examines how trust and reputation are built and managed in unfiltered online spaces, using a user’s cyber-harassment crisis as a case study. Complementing this, other documents analyze the grave th…
  continue reading
 
The public narrative surrounding Jeffrey Epstein's 2008 prosecution is well-established, painting a picture of a powerful man who used his wealth and connections to escape serious federal charges. However, a detailed, first-person account written by Epstein himself offers a meticulously constructed counter-narrative—an attempt to dismantle the publ…
  continue reading
 
The collected sources examine the controversies surrounding Uruguay's sophisticated electronic surveillance system, "El Guardián," acquired by the Ministry of the Interior to intercept communications like mobile calls, landlines, and social media traffic. While government officials emphasize that the system operates strictly under judicial authoriz…
  continue reading
 
Resources: https://linktr.ee/ReliaQuestShadowTalk Join host John and intelligence analysts Alex and Hayden as they discuss: Scattered Lapsus$ Hunters Targeting Zendesk (1:14) Microsoft Teams Guest Access Phishing Bypass (3:37) Dark AI Tools Enhancing Threat Actors (6:08) Silver Fox’s Campaign: Chinese APT Spotlight (10:05) John Dilgen: Cyber Threat…
  continue reading
 
Got a question or comment? Message us here! In this episode of the #SOCBrief, we dig into how world events can trigger cyber fallout that lands directly on the desks of security teams. From ransomware crews capitalizing on instability to hacktivists launching DDoS attacks and opportunistic actors going after vulnerable sectors, we talk through why …
  continue reading
 
Para los oyentes del CyberMidnight Club, la conclusión forense es clara: las redes sociales han desplegado un exploit "Zero-Day" contra la unidad fundamental de la sociedad: la relación romántica. Estamos ante un cambio criminológico donde el smartphone actúa como un atacante "Man-in-the-Middle", interceptando la intimidad y reemplazándola con vali…
  continue reading
 
Para los oyentes del CyberMidnight Club, la conclusión forense es clara: las redes sociales han desplegado un exploit "Zero-Day" contra la unidad fundamental de la sociedad: la relación romántica. Estamos ante un cambio criminológico donde el smartphone actúa como un atacante "Man-in-the-Middle", interceptando la intimidad y reemplazándola con vali…
  continue reading
 
For listeners of the CyberMidnight Club, the forensic conclusion is stark: Social media has deployed a massive "Zero-Day" exploit against the foundational unit of human society—the romantic relationship. We are witnessing a criminological shift where the smartphone acts as a "Man-in-the-Middle" attacker, intercepting intimacy and replacing it with …
  continue reading
 
Send us a text In this episode, I'm chatting with my friend Kelsey Silver about something so many of you have been asking about - how the heck are we supposed to use AI without compromising our clients' security? Kelsey has a super unique background and she breaks down exactly what we need to look for when evaluating AI tools for our firms. Plus, s…
  continue reading
 
Got a question or comment? Message us here! 📱 This #SecureAF episode covers the everyday questions and concerns people have when they think something unusual is happening with their devices or accounts. Hickman and Peters talk through typical scenarios, common misunderstandings, and the foundational steps that help people regain control of their ac…
  continue reading
 
Former U.S. Secret Service Special Agent Richard LaTulip joins Craig Duckworth to reveal the hidden world of cyber criminal networks and infrastructure attacks. Drawing from his undercover work infiltrating dark web forums and catching some of the world's most sophisticated threat actors, Richard breaks down why traditional security approaches fail…
  continue reading
 
Anand Oswal, Executive Vice President at Palo Alto Networks, joins Johna Johnson and John Burke for a wide-ranging exploration of two emerging focal points of enterprise risk: cryptographically relevant quantum computing, and browser-mediated agentic AI. The looming arrival of quantum computers that can break legacy encryption has already created t…
  continue reading
 
Send us a text What’s the worst thing a guy can do before you meet him for a first date? Our guest this week has the answer! Catherine Berra, shares crazy tales from her book These Stories Are True ... I Sh#t You Not!: A Humorous Look at Online Dating for the Unsuspecting Older Human, detailing both her own wild experiences and those of her male an…
  continue reading
 
Wondering why can't your teen girl keep herself organized? Frustrated by her lack of skills in areas you know your teenage daughter should already know? Dr Anna Levy-Warren, clinical psychologist, founder of Organizational Tutors and mom of teens, talks about navigating the teen years: executive functioning-based strategies for thriving through mor…
  continue reading
 
What happens when the information environment becomes too loud for the human brain to handle? And why does it feel like everyone — kids, adults, institutions, governments — is getting overwhelmed at the same time? We sit down with John Bicknell, former Marine and host of The Cognitive Crucible, to talk about the cognitive overload shaping modern li…
  continue reading
 
Send us a text In this episode, Joe sits down with Vishnu Varma to explore the evolving landscape of cybersecurity and data management. Vishnu shares his journey from India to the US, detailing his experiences at Cisco and the rise of cloud security. They delve into the challenges of managing vast amounts of data in the age of AI, discussing how Bo…
  continue reading
 
After surviving Thanksgiving and the subsequent biting cold, we jumped into the FOLLOW UP with news that Malaysia is joining the trend by taking steps to ban social media for children under 16, mirroring similar actions in Australia and Denmark—it seems the world is finally realizing the internet is a toxic wasteland for the kids. We also discussed…
  continue reading
 
Conservative Robert George and progressive Cornel West talk to Margaret Hoover about their long-standing friendship that bridges their ideological differences in an interview recorded in 2020. George–who recently resigned from the board of the Heritage Foundation over its defense of Tucker Carlson’s interview with white nationalist Nick Fuentes–exp…
  continue reading
 
The Promise and Peril of a Global Conversation Imagine trying to tell your friends about something important you just saw online. You start to speak, “You guys are not going to believe what Trump just tweeted…”—but before you can finish, your phone buzzes. And again. And again. The constant stream of notifications, arguments, and alerts becomes so …
  continue reading
 
In this episode of the Cyber Security Mentals podcast, hosts Steve and John delve into effective strategies for studying cybersecurity. They discuss the importance of structured learning, hands-on labs, and consistent practice, while exploring the challenges of self-paced learning. The episode highlights the benefits of programs like ACI Learning a…
  continue reading
 
Got a question or comment? Message us here! This week’s #SOCBrief dives into the FortiWeb zero-day that’s letting attackers create admin accounts with a single unauthenticated HTTP request. With exploitation spiking and Fortinet pushing out a quiet fix, SOC teams are under pressure to lock down configs, audit firewalls, and patch fast. We break dow…
  continue reading
 
part two of chapter six: Hubbard the godmaker Like this sample? buy the whole book here Written by Jon Atack, author of the bestselling expose, Let's Sell These People a Piece of Blue Sky, this book is a frightening look into an alarming possible future – and a fascinating deep dive into the history that could lead us there.#scientologycult #davidm…
  continue reading
 
part one of chapter six: Hubbard the godmaker Like this sample? buy the whole book here Written by Jon Atack, author of the bestselling expose, Let's Sell These People a Piece of Blue Sky, this book is a frightening look into an alarming possible future – and a fascinating deep dive into the history that could lead us there.#scientologycult #davidm…
  continue reading
 
part two of chapter five: The Blood Ritual and The Fool Like this sample? buy the whole book here Written by Jon Atack, author of the bestselling expose, Let's Sell These People a Piece of Blue Sky, this book is a frightening look into an alarming possible future – and a fascinating deep dive into the history that could lead us there.#scientologycu…
  continue reading
 
part one of chapter five: The Blood Ritual and The Fool Like this sample? buy the whole book here Written by Jon Atack, author of the bestselling expose, Let's Sell These People a Piece of Blue Sky, this book is a frightening look into an alarming possible future – and a fascinating deep dive into the history that could lead us there.#scientologycu…
  continue reading
 
part three of chapter four: The Empress – Hubbard’s Holy Guardian Angel Like this sample? buy the whole book here Written by Jon Atack, author of the bestselling expose, Let's Sell These People a Piece of Blue Sky, this book is a frightening look into an alarming possible future – and a fascinating deep dive into the history that could lead us ther…
  continue reading
 
part two of chapter four: The Empress – Hubbard’s Holy Guardian Angel Like this sample? buy the whole book here Written by Jon Atack, author of the bestselling expose, Let's Sell These People a Piece of Blue Sky, this book is a frightening look into an alarming possible future – and a fascinating deep dive into the history that could lead us there.…
  continue reading
 
part one of chapter four: The Empress – Hubbard’s Holy Guardian Angel Like this sample? buy the whole book here Written by Jon Atack, author of the bestselling expose, Let's Sell These People a Piece of Blue Sky, this book is a frightening look into an alarming possible future – and a fascinating deep dive into the history that could lead us there.…
  continue reading
 
chapter three: L. Ron Hubbard as the Antichrist Like this sample? buy the whole book here Written by Jon Atack, author of the bestselling expose, Let's Sell These People a Piece of Blue Sky, this book is a frightening look into an alarming possible future – and a fascinating deep dive into the history that could lead us there.#scientologycult #davi…
  continue reading
 
chapter two: Himmler’s Lust for Superpowers Like this sample? buy the whole book here by Jon Atack, author of the bestselling expose, Let's Sell These People a Piece of Blue Sky, this book is a frightening look into an alarming possible future – and a fascinating deep dive into the history that could lead us there.#scientologycult #davidmiscavige…
  continue reading
 
Part two of Chapter one - Meet the Leader of the New World Like this sample? buy the whole book here Written by Jon Atack, author of the bestselling expose, Let's Sell These People a Piece of Blue Sky, this book is a frightening look into an alarming possible future – and a fascinating deep dive into the history that could lead us there.#scientolog…
  continue reading
 
Part one of Chapter one - Meet the Leader of the New World Like this sample? buy the whole book here Written by Jon Atack, author of the bestselling expose, Let's Sell These People a Piece of Blue Sky, this book is a frightening look into an alarming possible future – and a fascinating deep dive into the history that could lead us there.#scientolog…
  continue reading
 
If Scientology Ruled the World: Introduction by Tony Ortega, read by Tony Ortega with titles, copyright and dedication read by Jon Atack Like this sample? buy the whole book here Written by Jon Atack, author of the bestselling expose, Let's Sell These People a Piece of Blue Sky, this book is a frightening look into an alarming possible future – and…
  continue reading
 
Resources: https://linktr.ee/ReliaQuestShadowTalk Do you really need predictions to tackle cyber threats? Join host Kim along with intelligence analyst John & special guest CISO Rafal Baran as they discuss: New NPM Supply Chain Threat (1:13) China Manipulates AI for Initial Access (4:46) Cloud Gaps Bring IoT Takeover (7:29) 2026 Cyber-Threat Predic…
  continue reading
 
Got a question or comment? Message us here! We’re back with the Hacker Holiday Gift Guide, and this year’s lineup is stacked with RF gadgets, Wi-Fi tools, red-team essentials, and quirky cyber gifts Tanner swears by. Whether you’re shopping for a pentester, a tinkerer, or someone who just loves breaking things (legally), these picks won’t miss. Get…
  continue reading
 
AI and other technologies are increasingly capable of delivering company-ending events. How do you have “the conversation” with senior leadership–the one about the existential risks your organization faces, and the steps needed for remediation–in a way that ensures that your company is maximally protected, and that you get the resources you need? A…
  continue reading
 
Can You Identify the Nation-State Actor?​​​​‌ ‍ ​‍​‍‌‍ ‌ ​‍‌‍‍‌‌‍‌ ‌‍‍‌‌‍ ‍​‍​‍​ ‍‍​‍​‍‌ ​ ‌‍​‌‌‍ ‍‌‍‍‌‌ ‌​‌ ‍‌​‍ ‍‌‍‍‌‌‍ ​‍​‍​‍ ​​‍​‍‌‍‍​‌ ​‍‌‍‌‌‌‍‌‍​‍​‍​ ‍‍​‍​‍‌‍‍​‌ ‌​‌ ‌​‌ ​​‌ ​ ​ ‍‍​‍ ​‍ ‌‍‍‌‌‍ ‍‌ ‌​‌‍‌‌‌‍ ​​ ‌​​ ‌ ​ ​‌​‍ ‍‌ ​ ‌‍​‌‌‍ ‍‌‍‍‌‌ ‌​‌ ‍‌​‍ ‍‌ ​ ‌ ‌​‌ ‌‌‌‍‌​‌‍‍‌‌‍ ​‍ ‌‍‍‌‌‍ ‍‌ ‌​‌‍‌‌‌‍ ‍‌ ‌​​‍ ‌‍‌‌‌‍‌​‌‍‍‌‌ ‌​​‍ ‌‍ ‌‌‍ ‌‍‌​‌‍‌‌​ ‌‌ ​​…
  continue reading
 
In this eye-opening conversation, Dino and Craig address a critical issue facing manufacturing organizations today: the dangerous gap between perceived and actual cybersecurity preparedness in operational technology (OT) environments. They discuss why many organizations "don't know what they don't know" when it comes to securing industrial control …
  continue reading
 
It’s so easy to get caught up in the chaos of life — the schedules, the moods, the constant running around — that we forget to pause and simply say thank you. But gratitude isn’t just a seasonal thing; it’s a way to reframe how we see our lives and how our daughters see theirs. When we model gratitude, our girls learn that thankfulness doesn’t depe…
  continue reading
 
Send us a text We trace a winding path from offshore rigs to elite red team ops and into subsea data centers, using one sewer-side breach as the spark for a new way to secure and scale compute. Along the way we unpack social engineering basics, the blue vs red culture clash, and whether AI is building features or changing outcomes. • junk folders, …
  continue reading
 
Loading …
Copyright 2025 | Privacy Policy | Terms of Service | | Copyright
Listen to this show while you explore
Play