Welcome to the “Bernie Clifton Podcast”, a riotous and unpredictable live-ish comedy show recorded in front of a live audience in glorious Sheffield once every month. We’ve got special guests joining us from the world of showbiz, comedy and entertainment on each episode. They’ll be chatting with Bernie and talking about what they’re currently thinking, feeling, doing and everything else inbetween! Our guests will also be playing a number of games and quizzes with both Bernie and the colourfu ...
…
continue reading
A podcast about Inside No 9, by two people who just wanted to find a podcast about Inside No 9. But they couldn't. So they started one in the hope that it will inspire someone else to do something better. Steve and Andy discuss the shows and you are invited to listen along, episode by episode (of both the TV show and the podcast).
…
continue reading
Brought to you by IT Audit Labs. Trusted cyber security experts and their guests discuss common security threats, threat actor techniques and other industry topics. IT Audit Labs provides your organization with the leverage of a network of partners and specialists suited for your needs. We are experts at assessing security risk and compliance, while providing administrative and technical controls to improve our clients’ data security. Our threat assessments find the soft spots before the b ...
…
continue reading
1
92. Curse of the Ninth (Inside Series Nine, Episode Five)
1:22:47
1:22:47
Play later
Play later
Lists
Like
Liked
1:22:47
Jonah Quigley is called to a house to tune a piano, something he's done many times before. Little did he know this piano belonged to one of his idols, whose fate was about to intertwine with his own. Email us: aquietnightinsideno9@gmail.com, find us on Twitter: http://twitter.com/aqnin9 or on YouTube: https://www.youtube.com/aquietnightinsideno9 Fa…
…
continue reading
1
91. Ctrl/Alt/Esc (Inside Series Nine, Episode Four)
1:11:09
1:11:09
Play later
Play later
Lists
Like
Liked
1:11:09
Jason's family reluctantly find themselves with him in yet another Escape Room. They've tried many but this might prove the toughest of them all. Email us: aquietnightinsideno9@gmail.com, find us on Twitter: http://twitter.com/aqnin9 or on YouTube: https://www.youtube.com/aquietnightinsideno9 Fancy supporting the show? Drop us a donation here: http…
…
continue reading
1
Quantum Computing's Impact on Cybersecurity with Bernie Leung
37:32
37:32
Play later
Play later
Lists
Like
Liked
37:32
Explore the intriguing intersection of quantum computing and cybersecurity... It’s closer than you think. In this episode, special guest Bernie Leung from Autodesk shares his expert insights on how quantum computing is reshaping the cybersecurity landscape. Discover the challenges and breakthroughs in encryption practices as Bernie breaks down comp…
…
continue reading
1
90. Mulberry Close (Inside Series Nine, Episode Three)
1:13:04
1:13:04
Play later
Play later
Lists
Like
Liked
1:13:04
Mulberry Close is a quiet place where not much happens. Just some neighbourly friends watching out for one another. When a new couple joins the street, things start to take a turn, and the residents decide to figure out what's going on at number nine. Brick by brick, they build their side of the story. So...grab a box of popcorn, relax on your futo…
…
continue reading
1
89. The Trolley Problem (Inside Series Nine, Episode Two)
1:03:46
1:03:46
Play later
Play later
Lists
Like
Liked
1:03:46
Driving home one stormy night, a poorly educated therapist sees a potential new client alone on a bridge, contemplating whatever he is contemplating. The therapist pulls the lever and stops his car, taking the stranger home to help him dry out and warm up. What would have happened if he'd succumbed to the bystander effect like everyone else and let…
…
continue reading
1
88. Boo To a Goose (Inside Series Nine, Episode One)
1:13:37
1:13:37
Play later
Play later
Lists
Like
Liked
1:13:37
Late-night passengers on the underground get stuck when power is lost. They await the replacement service but an inciting incident causes some unrest in the ranks. Email us: aquietnightinsideno9@gmail.com, find us on Twitter: http://twitter.com/aqnin9 or on YouTube: https://www.youtube.com/aquietnightinsideno9 Fancy supporting the show? Drop us a d…
…
continue reading
1
Securing the Invisible Threats: Insights on IoT Security with Eric Johansen
49:27
49:27
Play later
Play later
Lists
Like
Liked
49:27
Discover cutting-edge IoT cybersecurity strategies with insights from expert Eric Johansen. Join us as we delve into the world of IoT cybersecurity with Eric Johansen from Phosphorus. Eric discusses the challenges and solutions for managing IoT devices at scale, the critical importance of asset inventory, and the significant risks posed by outdated…
…
continue reading
1
Soaring Through Cybersecurity: Indoor Skydiving and Pen Testing with Brian Johnson
56:09
56:09
Play later
Play later
Lists
Like
Liked
56:09
Get ready for a special episode of The Audit! We're celebrating our 40th episode with Brian Johnson, host of the 7-Minute Security podcast, as we talk cybersecurity, social engineering, and some wild stories that you won't want to miss. We’ll explore the role of tabletop exercises in shoring up a company's security and dive into the fascinating wor…
…
continue reading
1
Building the Future: AI and Cybersecurity in Construction
51:39
51:39
Play later
Play later
Lists
Like
Liked
51:39
In this episode we explore the intersection of AI and cybersecurity in the construction industry with John Massie, Technology Director at Journey Group. John shares his insights on integrating technology to enhance cybersecurity and operational efficiency within the construction sector. The discussion covers a range of topics from combatting sophis…
…
continue reading
1
87. And The Winner Is... | A Flick Through The Scripts
52:38
52:38
Play later
Play later
Lists
Like
Liked
52:38
Andrew experienced some technical issues on this episode - his laptop crashed half way through recording, which meant he lost his microphone. This meant the quality is not as good as it ought to be. It should still be ok to listen to though... We're looking through Series 4 again because the script book could tell us some new things about it. We'll…
…
continue reading
1
86. To Have and To Hold | A Flick Through The Scripts
46:29
46:29
Play later
Play later
Lists
Like
Liked
46:29
We're looking through Series 4 again because the script book could tell us some new things about it. We'll be trying to pick up on things we missed first time round, and sharing new revelations (and ridiculous theories) brought to light by the books. We might need your help. If you haven't heard our reaction episode to To Have and To Hold (or like …
…
continue reading
1
Cybersecurity Brief: Water Systems & IoT Devices Under Threat
39:05
39:05
Play later
Play later
Lists
Like
Liked
39:05
Join us on The Audit for a critical examination of cybersecurity's latest frontiers: threats to our water system and the push for global IoT security standards. In this episode, our team of cybersecurity experts, Eric Brown and Nick Mellum, dissect the Biden administration's recent warnings about cyber-attacks on U.S. water utilities and delve into…
…
continue reading
1
85. Once Removed | A Flick Through The Scripts
47:48
47:48
Play later
Play later
Lists
Like
Liked
47:48
We're looking through Series 4 again because the script book could tell us some new things about it. We'll be trying to pick up on things we missed first time round, and sharing new revelations (and ridiculous theories) brought to light by the books. We might need your help. If you haven't heard our reaction episode to Once Removed (or like us, you…
…
continue reading
1
84. Bernie Clifton's Dressing Room | A Flick Through The Scripts
38:20
38:20
Play later
Play later
Lists
Like
Liked
38:20
We're looking through Series 4 again because the script book could tell us some new things about it. We'll be trying to pick up on things we missed first time round, and sharing new revelations (and ridiculous theories) brought to light by the books. We might need your help. If you haven't heard our reaction episode to Bernie Clifton's Dressing Roo…
…
continue reading
1
Phishing: The Number 1 Social Engineering Tactic with James Arndt
49:09
49:09
Play later
Play later
Lists
Like
Liked
49:09
In this episode of The Audit, we dive into the world of phishing to uncover the sophisticated tactics that make these scams the leading threat in cybersecurity. Join us as Jamie Arndt, a cybersecurity expert with extensive experience in reverse engineering and analyzing malicious emails, shares his insights and stories from the front lines. We’ll c…
…
continue reading
1
83. Zanzibar | A Flick Through The Scripts
32:42
32:42
Play later
Play later
Lists
Like
Liked
32:42
We're looking through Series 4 again because the script book could tell us some new things about it. We'll be trying to pick up on things we missed first time round, and sharing new revelations (and ridiculous theories) brought to light by the books. We might need your help. If you haven't heard our reaction episode to Zanzibar (or like us, you can…
…
continue reading
1
Printing the Future: Navigating Cybersecurity in 3D Printing
46:30
46:30
Play later
Play later
Lists
Like
Liked
46:30
How exposed are your 3D printing operations to cyber threats? Is the intellectual property involved in 3D printing at risk, and can 3D printers themselves become targets for hackers? As 3D printing technology becomes more integrated into various industries, its cybersecurity implications cannot be ignored. This episode sheds light on the exciting w…
…
continue reading
1
Are VPNs Secure? Insights on the Risks, and the Ivanti Breach
44:10
44:10
Play later
Play later
Lists
Like
Liked
44:10
How secure is a VPN, really? Can a VPN server be hacked, and are these services truly safe? In this episode of The Audit, Joshua, Nick, and Eric tackle these pressing questions head-on. As the cybersecurity landscape evolves, Virtual Private Networks (VPNs) are increasingly common among cybersecurity professionals and enthusiasts alike... but how s…
…
continue reading
1
A Veteran’s Journey into Cybersecurity with Clifton Robinson
44:32
44:32
Play later
Play later
Lists
Like
Liked
44:32
It should come as no surprise that building a team can be challenging for cybersecurity professionals. However, we've found that individuals who have served in the military often possess a unique focus and drive, setting them apart in the cyber world. Clifton Robinson, a former Army logistician and healthcare market analyst, joins our team to discu…
…
continue reading
1
Email and Mobile Security Tips with Dean Morstad
44:02
44:02
Play later
Play later
Lists
Like
Liked
44:02
Is your digital footprint secure? In our latest episode we unravel the complexities of email and mobile security. Join Dean Morstad, a seasoned cybersecurity expert, as he shares invaluable insights and practical tips to enhance your digital safety. The conversation includes: - Why and how are most of us viewed as a “product”? - Practical email sec…
…
continue reading
1
Meet the Team: Learn Their Approach to Ransomware, Breach Response, and AI
52:26
52:26
Play later
Play later
Lists
Like
Liked
52:26
This episode offers more than just insights; it's a chance to meet the minds who have been combatting cyber threats for decades. We explore topics like ransomware, effective data breach responses, and the integration of AI in cybersecurity. Discover strategies and insights from industry leaders and learn how to fortify your digital defenses in an e…
…
continue reading
1
Cybersecurity Jobs, Breach Communication & The Infosec Landscape with Leah McLean
46:51
46:51
Play later
Play later
Lists
Like
Liked
46:51
In this episode of The Audit, Leah McLean shares her insights from over 10 years in cybersecurity and IT with companies like Cisco, and now Mastercard. We’ll cover: How to get a job in cybersecurity Navigating the ethical challenges of AI in Cybersecurity Work-life balance in cybersecurity jobs Perspectives on success for cybersecurity leadership E…
…
continue reading
1
Decoding Flipper Zero: The Swiss-Army Knife of Hacking Tools
43:30
43:30
Play later
Play later
Lists
Like
Liked
43:30
The Audit - Episode 30 - Join us as we speak with cybersecurity expert and hacking hardware enthusiast Cameron Birkland, who introduces us to the world of the Flipper Zero. The brainchild of a successful Kickstarter campaign in 2020, the Flipper Zero might look cute with its dolphin avatar, but it's a potent tool capable of manipulating control sys…
…
continue reading
1
Understanding Cryptocurrency and Wallet Security with Matt Starland
1:03:56
1:03:56
Play later
Play later
Lists
Like
Liked
1:03:56
The Audit - Episode 29 - Ready to uncover the world of crypto? Join us in our latest episode as we dive into the realm of cryptocurrency with Matt Starland. Let's embark on a journey from the origins of Bitcoin to the frenzy of meme stocks making headlines. Tune in to understand how cryptocurrency is shaking the foundation of economies with unstabl…
…
continue reading
1
Stories from the Dark Side of Cyber Forensics with Andre Champagne
1:19:29
1:19:29
Play later
Play later
Lists
Like
Liked
1:19:29
The Audit - Episode 28 - We are pleased to introduce you to Andre Champagne, an expert in the intriguing world of cyber and digital forensics. Andre’s journey, from the Anoka County Sheriff's Office, through the Illinois Attorney General's Office, to the state of Minnesota, provides fascinating insights into a career in stopping cyber-crime. Andre …
…
continue reading
1
eCommerce and Surviving the Black Friday Frenzy with Jeff White
28:42
28:42
Play later
Play later
Lists
Like
Liked
28:42
The Audit - Episode 27 - Imagine managing over a million orders per minute during a high-stakes sales event like Black Friday! That's the reality Jeff White from Cockroach faced during his time at Best Buy. We sit down with him in a lively discussion, unpacking the intricacies of running a successful online store, the immense pressure involved, and…
…
continue reading
1
The Future of Digital Storage: From Hard Drives to DNA
45:35
45:35
Play later
Play later
Lists
Like
Liked
45:35
The Audit - Episode 26 - Ready to decode the future of data storage technology? We guarantee that you'll be fascinated by our in-depth exploration into this rapidly evolving landscape. Together with our esteemed guest, Bill Harris, we probe into the intricacies of current storage mediums, such as hard disk drives, flash drives, and magnetic tapes, …
…
continue reading
1
A Comprehensive Guide to Quantum Computing
46:13
46:13
Play later
Play later
Lists
Like
Liked
46:13
In Part 2 of the Tech Lessons Series by Bill Harris, get ready to unravel the mystery of quantum computing? Brace yourselves as we, your hosts, and our esteemed guest, Bill Harris, take you on a whirlwind tour of this fascinating technology that's set to redefine the future. Possessing the potential to disrupt major industries and even cryptography…
…
continue reading
1
The Next Era of Computing and Processor Technology
52:14
52:14
Play later
Play later
Lists
Like
Liked
52:14
The Audit - Episode 24 In Part 1 of the Tech Lessons Series by Bill Harris, prepare to be transported into the future of computing resources, with our fascinating guest, Bill Harris from IT Audit Labs. We're opening up the world of processor design and specialized workloads, discussing the intricacies of chip fabrication, the genius behind improvin…
…
continue reading
1
Unmasking the Complex World of Cybersecurity and Software Updates
58:33
58:33
Play later
Play later
Lists
Like
Liked
58:33
Wouldn't it be great if you could navigate the treacherous landscape of software vulnerabilities like a pro? That's exactly what we're serving up in our latest podcast episode. Together with our dedicated team, we dissect the upsurge of these vulnerabilities, the recent discovery of a toolkit targeting Apple, Mac OS, and stolen chat GPT credentials…
…
continue reading
1
The Dark Side of Cyberspace: Data Breaches and the Price of Information
42:59
42:59
Play later
Play later
Lists
Like
Liked
42:59
The Audit - Episode 22 Want to understand the dark underbelly of cyberspace? Join us as we take a deep dive into recent data breaches at T-Mobile, discussing why fewer customers were impacted this time around compared to the January API attack. Get insights on how negligence in security could lead to government oversight and understand the power co…
…
continue reading
1
The New Toolkit: AI-Powered Presentations
52:49
52:49
Play later
Play later
Lists
Like
Liked
52:49
For this episdoe we are joined by Eric Pesik, the Deputy General Counsel at Seagate Technology. Eric, walks us through how he has been using generative AI tools, including ChatGPT, AI image generators and AI voice overs to speed up his workflow when creating presentations for his colleagues. The crew also discusses how AI will broadly impact other …
…
continue reading
A conversation between Nick Mellem, Eric Palms, and Matt Starland about the future of passwords through the lens of IT. The team notes a general lag time behind current threats and the technology already available to upgrade security protocols and the lack of large-scale adoption and upgrades. Passwords may eventually have to be left behind for new…
…
continue reading
This is our traditional end of series wrap up. Thanks to everyone who sent in responses to the episode of series 8. It was great to receive so many messages! It's been an absolute joy to go through them and to watch this series alongside you.By Steve and Andy
…
continue reading
A discussion with ITAL members Eric Brown and Scott Rysdahl with Micah Kryzer. Micah is a pentester by day but also works alongside the ITAL team. In this episode the crew overviews certificates, a big topic that transcends any one vendor or environment. Certificates are like an electronic passport meant to uniquely identify a person, computer or a…
…
continue reading
1
81: The Last Weekend (Inside Series Eight, Episode Six)
1:10:34
1:10:34
Play later
Play later
Lists
Like
Liked
1:10:34
Chazz and Joe spend the weekend in their remote cabin where they come to leave their troubles behind. Except, there are some troubles you just can't escape and maybe it's time to come to terms with that. Email us: aquietnightinsideno9@gmail.com, find us on Twitter: http://twitter.com/aqnin9 or on YouTube: https://www.youtube.com/aquietnightinsideno…
…
continue reading
An in-depth conversation with former CISO (Chief Information Security Officer) of the Minnesota Judicial and Metropolitan Council, Gretchen White. ITAL’s own Eric Brown and Gretchen discuss topics including the day-to-day grind of advocating for funding and implementing security protocols, how to prioritize security needs and access risk on a budge…
…
continue reading
1
80: 3 by 3 (Inside Series Eight, Episode Five)
1:02:44
1:02:44
Play later
Play later
Lists
Like
Liked
1:02:44
Wolfie and Clarke love their bus, but perhaps not as much as the mysterious Mr Cole and his dolly-bird nieces. As Clarke would say, `plenty of room up top!' Wait, no. That's not it. Hold on Tight! was replaced by a game show hosted by Lee Mack, in which three teams of three people, have three chances to win a big money prize. Notice anything odd? E…
…
continue reading