Mysterious Realms with Mr Cyber Follow us, Like and Subscribe https://www.youtube.com/@MrCyberShow
…
continue reading
Mr Cyber Podcasts
We've signed up with fsociety for season two of Mr. Robot, USA Network's neurotic cyber psychothriller. 'Decoding Mr. Robot' will analyze and speculate over every snippet of code leaked from Evil Corp, each dispatch from fsociety, and all the secrets from Allsafe's servers.
…
continue reading
Formerly known as "Restore it All," The Backup Wrap-up podcast turns unappreciated backup admins into cyber recovery heroes. After a brief analysis of backup-related news, each episode dives deep into one topic that you can use to better protect your organization from data loss, be it from accidents, disasters, or ransomware. The Backup Wrap-up is hosted by W. Curtis Preston (Mr. Backup) and his co-host Prasanna Malaiyandi. Curtis' passion for backups began over 30 years ago when his employe ...
…
continue reading
Welcome to my Cyber Security Podcast. To give you a better idea of what you can expect, I’ll be covering a wide range of topics in the cyber security field, including what you can do to protect yourself from cyber threats. This podcast is for everyone, from the most experienced cybersecurity professional to the complete beginner. So stay tuned for the latest updates in cyber security!
…
continue reading
Marketing guru and hospitality extraordinaire David Orland Brown interviews Atlanta's most interesting people! Focusing on current events, upcoming parties, business, personal & professional development, community, culture, local politics and more! linktr.ee/davidorlandbrown instagram.com/davidorlandbrown podcasts.apple.com/us/podcast/mr-atlanta-podcast/id1476895168 FB.me/dobatl youtube.com/c/DavidOrlandBrown linkedin.com/in/davidorlandbrown
…
continue reading
There's a lot of cool techy stuff going down in cybersecurity, and we love it. But you can't deny that a lot of the time we humans get forgotten. Our podcast takes a not-so-serious look at issues in security from a human point of view. Covering social engineering to hacker motivations and everything in between, we chat through security stories and themes and what they mean to us: the oft-neglected humans behind the screen. Apart from Kev, Kev is a cyborg. These weekly podcasts come in two ma ...
…
continue reading
Deep Dreams is an AI generated podcast with nonsensical stories to help you fall asleep to a soothing voice. Let your robotic overlords whisper comforting sweet nothings straight into your subconscious. What could go wrong? Website: https://deepdreams.stavros.io/ RSS feed: https://deepdreams.stavros.io/feed.xml
…
continue reading
On Let's Talk About That Sh*t I talk about and host conversations on topics that matter, whether it be from self improvement, to implications of a security breach, and more. Have a topic you want to hear about? Let us know at [email protected]!
…
continue reading
Hello everyone. I'm Nisha George and this is my podcasting platform. PODCASTS BY NISHA GEORGE is a new beginning from my side to motivate myself through short 5 to 30-minute podcasts daily or whenever I can. I'm originally from Kerala, India and currently working and living in Melbourne, Australia. I will be doing podcasts in English and Malayalam. Kindly subscribe, support, and keep up-to-date. Thank you. Available now in Google and Apple podcasts. https://anchor.fm/nisha-george Instagram: ...
…
continue reading
Conversations about Marine Corps acquisition, innovation, and gear with host Morgan Blackstock, MCSC’s Public Affairs Specialist.
…
continue reading
The President of Capitol Technology University explores various industry executives ideas on what best is needed from higher education to support the various needs of industry across the United States.
…
continue reading

1
Social Engineering Lessons from Mr. Robot Episode 1
44:15
44:15
Play later
Play later
Lists
Like
Liked
44:15Learn how social engineering attacks really work by analyzing the cybersecurity lessons from Mr. Robot's pilot episode. Curtis Preston and Prasanna Malaiyandi break down real-world social engineering tactics used by cybercriminals to manipulate victims into revealing sensitive information. This episode covers social engineering phone scams targetin…
…
continue reading

1
Insider Threat Prevention: Protecting Your Backups from Within
39:05
39:05
Play later
Play later
Lists
Like
Liked
39:05The insider threat represents one of the most dangerous and overlooked cybersecurity challenges facing organizations today. In this episode of The Backup Wrap-up, W. Curtis Preston and Prasanna explore the three distinct types of insider threats that can devastate your organization from within. From malicious employees seeking revenge to careless w…
…
continue reading

1
Mission Impossible Movie Teaches Real Cyber Security Lessons
46:21
46:21
Play later
Play later
Lists
Like
Liked
46:21This episode explores surprising cyber security lessons hidden within Mission: Impossible's latest blockbuster. We analyze how Hollywood's depiction of AI threats, immutable backups, and air-gapped storage actually reflects real-world data protection challenges. Curtis and Prasanna dissect the movie's central premise: an AI entity altering digital …
…
continue reading

1
The EU Cloud Exit - Backup Strategies for Digital Sovereignty
36:58
36:58
Play later
Play later
Lists
Like
Liked
36:58The EU cloud exit movement is reshaping how European organizations think about data storage and sovereignty. Companies across Europe are moving away from US-based cloud providers like Microsoft 365, AWS, and Google Workspace due to concerns about the Cloud Act and data privacy regulations. In this episode, Curtis and Prasanna explore the backup imp…
…
continue reading

1
What Is an Air Gap Backup? Real Protection vs Marketing
33:32
33:32
Play later
Play later
Lists
Like
Liked
33:32Air gap has become one of the most overused and misunderstood terms in backup and recovery. In this episode, W. Curtis Preston and Prasanna explore what air gap really means, tracing its origins from the days when everyone used tape storage to modern virtual implementations. They discuss how true air gap required physical separation - tapes stored …
…
continue reading

1
Largest Data Breach in History: What You Need to Know
48:45
48:45
Play later
Play later
Lists
Like
Liked
48:45The largest data breach in recent memory has exposed 16 billion login credentials across multiple databases, and we're here to help you understand what it means for your security. This massive exposure involves data stolen primarily through infostealer malware rather than a single company breach. Join W. Curtis Preston, Dr. Mike Saylor, and Prasann…
…
continue reading
This episode breaks down snapshot backup fundamentals, covering the key differences between traditional storage snapshots and cloud-based approaches. Curtis and Prasanna explain copy-on-write versus redirect-on-write methods, performance implications, and why some snapshot systems can degrade performance by up to 50%. Learn about NetApp's redirect-…
…
continue reading
Human error has replaced hardware failures as the primary driver of data loss and restore operations in modern IT environments. This episode explores real-world examples of how both end users and administrators create the need for backup and recovery operations through accidental deletions, configuration mistakes, and poor processes. W. Curtis Pres…
…
continue reading
Learn how to extract measurable ROI from your backups beyond traditional disaster recovery. Curtis and Prasanna explore proven strategies for extracting business value from backup infrastructure through test and development environments, security monitoring, compliance checking, and AI-powered analytics. Discover why the shift from tape to disk sto…
…
continue reading

1
World Backup Day: Take the Pledge to Protect Your Data
34:23
34:23
Play later
Play later
Lists
Like
Liked
34:23World Backup Day falls on March 31st - the day before April Fool's Day because not backing up your data is no joke. In this episode, hosts W. Curtis Preston and Prasanna Malaiyandi discuss alarming statistics about data loss and why proper backup strategies are essential for business survival. The hosts break down the famous 3-2-1 backup rule and h…
…
continue reading

1
Ransomware Targets VMware ESXi: Melissa Palmer Explains the Threat
51:51
51:51
Play later
Play later
Lists
Like
Liked
51:51You've found The Backup Wrap-up, your go-to podcast for all things backup, recovery, and cyber-recovery. In this episode, we tackle one of the scariest threats out there - ransomware targeting VMware ESXi environments. I'm joined by Prasanna Malaiyandi and our special guest Melissa Palmer, also known as @vmiss, who's an independent technology analy…
…
continue reading

1
Breaking Down the VeeamOn Announcements for Backup Admins
45:24
45:24
Play later
Play later
Lists
Like
Liked
45:24In this episode of The Backup Wrap-up, W. Curtis Preston breaks down the key VeeamON announcements from the VeeamON 2025 conference in San Diego. He highlights Veeam's focus on security and ransomware defense, including their new CrowdStrike integration and data resilience maturity model developed with McKinsey and MIT. Curtis shares his excitement…
…
continue reading

1
DOGE and GSA Claim $1M Savings by Ditching Old Tape Tech
46:17
46:17
Play later
Play later
Lists
Like
Liked
46:17DOGE and GSA recently made headlines with a tweet claiming $1 million annual savings by converting 14,000 magnetic tapes to "permanent modern digital records." In this episode, W. Curtis Preston and Prasanna Malaiyandi analyze whether this claim is possible – although they cannot actually validate it due to lack of information. They discuss that DO…
…
continue reading

1
Why Tape Backup for Small Business Makes Sense Against Ransomware
38:03
38:03
Play later
Play later
Lists
Like
Liked
38:03Tape backup for small business might sound like old tech, but Mag Store's new Thunderbolt-compatible tape drive could change that perception. In this episode, we discuss how this new offering potentially opens tape technology to a wider market of SMBs and content creators looking for ransomware protection and cost-effective long-term storage. Curti…
…
continue reading

1
How Forever Incremental Backup Changed the World
43:46
43:46
Play later
Play later
Lists
Like
Liked
43:46In this episode of The Backup Wrap-Up, Curtis and Prasanna explore how forever incremental backup technology revolutionized the data protection industry. They discuss the evolution from traditional backup methods to modern approaches that eliminate the need for regular full backups, dramatically reducing network traffic, storage requirements, and b…
…
continue reading

1
Cloud vs Tape Throwdown: Which is Better for Archiving?
36:14
36:14
Play later
Play later
Lists
Like
Liked
36:14In this episode of The Backup Wrap-Up, we look at the cloud vs tape debate for active archives. The conversation was sparked by a LinkedIn post claiming tape libraries are the only robots not making things easier in 2025, suggesting cloud is superior to tape for active archives. We challenge this premise by pointing out that cloud vs tape is a fals…
…
continue reading

1
Disaster Recovery Lessons from 9/11 and Beyond
35:54
35:54
Play later
Play later
Lists
Like
Liked
35:54In this eye-opening episode of The Backup Wrap-up, W. Curtis Preston and Prasanna Malaiyandi unpack crucial disaster recovery lessons from major events like 9/11. They discuss how companies lost both primary and backup data centers when both World Trade Center towers fell, highlighting why geographic separation is non-negotiable. The hosts break do…
…
continue reading

1
How to Choose the Best Password Manager: Security Features That Matter
41:08
41:08
Play later
Play later
Lists
Like
Liked
41:08In this episode of The Backup Wrap-up, Curtis and Prasanna discuss how to choose the best password manager in light of recent security breaches. They examine the LastPass hack that resulted in $150 million of stolen cryptocurrency and what that teaches us about password manager security. The hosts break down the critical security features to look f…
…
continue reading

1
SEASON 5/E.1: UNCOMMON ADVICE: അസാധാരണമായ ഉപദേശം..ആരും എടുക്കരുത്😂
8:58
8:58
Play later
Play later
Lists
Like
Liked
8:58SEASON 5/E.2: UNCOMMON ADVICE Restarted my 2025 PODCAST season with some insights into myself and my life. Stay tuned for more contents that matter to me. Please don't copy my life😂. Thank you. https://linktr.ee/anu811981
…
continue reading

1
Is Tape Backup Dead? Why This Technology Still Matters
56:25
56:25
Play later
Play later
Lists
Like
Liked
56:25Tape backup isn't dead – but it's glory days are gone. In this episode, W. Curtis Preston and Prasanna Malaiyandi discuss why tape backup remains relevant despite its diminished role in operational backups. They reveal how cloud giants have become the biggest consumers of tape technology while explaining common misconceptions about tape's performan…
…
continue reading
In this episode of The Backup Wrap-up, W. Curtis Preston and Prasanna Malaiyandi discuss critical strategies for securing your backup disk against cyber threats. They explain why the default configuration of storing backups in easily accessible directories makes your backup disk vulnerable to threat actors who specifically target backup systems bef…
…
continue reading

1
Your 4-Hour Recovery Time Objective is Fantasy
38:40
38:40
Play later
Play later
Lists
Like
Liked
38:40Ever wonder why your recovery time objective seems impossible to meet? In this episode, we challenge the common assumption that a four-hour RTO is achievable for most organizations. Host W. Curtis Preston and guest Prasanna Malaiyandi discuss why these aggressive recovery time objectives often exist only on paper. From ransomware attacks to natural…
…
continue reading

1
Passwords vs Passkeys: The Future of Backup Security
43:14
43:14
Play later
Play later
Lists
Like
Liked
43:14In this eye-opening episode about passwords vs passkeys, W. Curtis Preston and Prasanna Malaiyandi expose why traditional password protection isn't enough for your backup systems anymore. They break down the evolution from basic passwords to MFA, and explain why passkeys and FIDO compliance represent the next level in security. Learn why hackers ta…
…
continue reading
Understanding your backup window is crucial for effective data protection, but there's a twist - it's not just about backup speed. In this episode, we explore why focusing solely on backup speed misses the point entirely. The real measure of success? Your recovery capabilities. Join W. Curtis Preston and Prasanna Malaiyandi as they share war storie…
…
continue reading

1
Artificial Intelligence: The Future of Backup?
43:06
43:06
Play later
Play later
Lists
Like
Liked
43:06Artificial intelligence in backup isn't just marketing hype - it's changing how we protect our data. In this episode, W. Curtis Preston and Prasanna Malaiyandi break down the practical applications of AI in backup systems, from intelligent scheduling to ransomware detection. Learn how artificial intelligence helps with capacity planning, especially…
…
continue reading

1
Disaster Recovery Testing: The Execution Phase
33:11
33:11
Play later
Play later
Lists
Like
Liked
33:11In part two of our disaster recovery testing series, we explore the critical steps of executing a DR test. From coordinating teams and documenting issues to maintaining communication channels during the test, this episode covers everything you need to know about running an effective DR test. Host W. Curtis Preston and co-host Prasanna Malaiyandi sh…
…
continue reading