Reaching America ON DEMAND™ is a grassroots podcast that deal with social issues affecting the African American community. Some of the issues are Criminal Justice Reform - Ideas and solutions to make a more fair and just criminal justice system. Energy - Addressing Energy Poverty Policies that harm minorities and drive income inequality. Occupational Licensing/Job Creation - Working to remove outdated and antiquated barriers to opportunities for those wanting to contribute to our economy. Fr ...
…
continue reading
A weekly true crime podcast that finds humanity in the darkness, humor in the history and the devil in the details.
…
continue reading
Cyber Security can be a difficult field to not only understand but to also navigate. Joe South is here to help with over a decade of experience across several domains of security. With this podcast I hope to help more people get into IT and Cyber Security as well as discussing modern day Cyber Security topics you may find in the daily news. Come join us as we learn and grow together!
…
continue reading
Rootfire Presents: The Reggae Podclash's mission is to share the stories of foundational reggae artists, creating a historical record told by the artists themselves, while building bridges to new artists who have followed in their footsteps. Hosted by Devin Morrison and Roger Rivas, two longtime players in the Los Angeles reggae scene who have performed and recorded with Jamaican legends including Alton Ellis, Prince Buster, Leonard “The Ethiopian” Dillon, Wailing Souls, Roy Shirley, Pat Kel ...
…
continue reading
1
Welcome to Thrill House (An Original Story by Holly Knapp)
52:07
52:07
Play later
Play later
Lists
Like
Liked
52:07
Dear Fiends, We cordially invite you to spend some time with the terrifying spirits of Thrill house. We hope you enjoy this original gothic horror story! Consider it a treat from us to you. Happy Halloween! Click to Learn MoreThe WWBD Team Holly Knapp, Co-Host Leslie Weidel, Co-Host Jon Katity, Composer & Audio Engineer WWBD Merch Buy your WWBD swa…
…
continue reading
1
Embracing the Suck, Lessons From #NASA In #Cybersecurity
53:59
53:59
Play later
Play later
Lists
Like
Liked
53:59
Send us a text In this engaging conversation, Robert Vescio shares his unique journey from horticulture to cybersecurity, emphasizing the importance of economics in understanding cyber risk. The discussion highlights the value of learning from mistakes, the need for transparency in cyber risk management, and the cultural challenges within the cyber…
…
continue reading
1
Consumed (Mercy Brown and the New England Vampires)
1:40:58
1:40:58
Play later
Play later
Lists
Like
Liked
1:40:58
On a sunny day in November of 1990 three young boys decide to sneak off and play in the gravel pits at a local landscaping store for the afternoon. Little did they know that they were about to open a doorway into the world of colonial American vampires. This week we plunge head first into the strange and mysterious practice of vampire exhumations. …
…
continue reading
1
From Building The Worlds Most Powerful Malware To Building The Worlds Most Secure Phone
54:42
54:42
Play later
Play later
Lists
Like
Liked
54:42
Send us a text A cybersecurity journey like no other awaits as we welcome a guest with a formidable background, shaped by their experiences in the Israeli military's elite 8200th unit. This exceptional career path led them from the rigors of military service to the academic halls of the Technion—Israel's very own MIT. We uncover how their military …
…
continue reading
1
From Cipher Wheels to Modern Data Security with Jeff Man Pt 2.
1:11:51
1:11:51
Play later
Play later
Lists
Like
Liked
1:11:51
Send us a text Ready to unlock the secrets of cryptography and cybersecurity from a seasoned expert? Join us as we welcome back Jeff Man for the riveting second part of his story, where he navigates a hectic schedule filled with speaking engagements at premier conferences like B-sides Edmonton and GurrCon. Jeff opens up about his efforts to achieve…
…
continue reading
We're starting off spooky season with one of the most haunting cases in true crime history. This case, referred to internationally as “The Burari Deaths” walks the thin line between devotion and madness, faith and delusion, mortal and paranormal. At 7:15 AM on July 1st, 2018 Gurcharan Singh went outside to meet his neighbor, Lalit Chundawat, for th…
…
continue reading
1
Balancing Cybersecurity: Mastering Soft Skills, Work-Life Balance, and Community Connections with Tyler Robinson
51:27
51:27
Play later
Play later
Lists
Like
Liked
51:27
Send us a text Feeling burnt out in the tech industry? Discover how to reclaim your work-life balance and enhance your professional journey with our latest episode featuring Tyler Robinson, a veteran in cybersecurity. Listen in as Tyler recounts his unconventional start in the 90s with phone phreaking, which eventually led him to manage his high sc…
…
continue reading
1
Building Resilient Cyber Defenses with Richard Cassidy
58:16
58:16
Play later
Play later
Lists
Like
Liked
58:16
Send us a text Ever wondered how a psychology degree can lead to a cybersecurity career? Join us as Richard Cassidy reveals his remarkable journey from a teenage computer enthusiast to a leading expert in IT and cybersecurity. Richard shares intimate stories from his early days, including how he transitioned from psychology to an apprenticeship at …
…
continue reading
1
Dragonflies (The Murder of Laci and Connor Peterson, Part 2)
1:52:41
1:52:41
Play later
Play later
Lists
Like
Liked
1:52:41
Sorry for leaving you all with a crazy cliff hanger last week but it had to be done! When we left off Laci Peterson had gone missing from her Modesto CA home on Christmas Eve day 2002. After a cursory investigation authorities had their eyes on her husband scott. This week we'll see how a pair of burglars with the worst luck in the world threw this…
…
continue reading
1
From Intelligence Analyst to Cybersecurity: Scott Small's Journey and Insights on Geopolitics
51:01
51:01
Play later
Play later
Lists
Like
Liked
51:01
Send us a text What if you could pivot from a career in intelligence analysis to becoming a cybersecurity expert, all by leveraging self-taught skills and open-source intelligence? Join us as Scott Small reveals his inspiring journey, transitioning from dealing with physical security threats to mastering cybersecurity. He shares the invaluable role…
…
continue reading
1
Dragonflies (The Disappearance of Laci and Connor Peterson, Part 1)
1:27:56
1:27:56
Play later
Play later
Lists
Like
Liked
1:27:56
On Christmas Eve morning 2002 Scott Peterson said goodbye to his pregnant wife Laci, got in his car and left to go golfing. When he returned home late that afternoon Laci was gone. Friends and family members leapt into action furiously trying to find Laci. Little did they know that they would find themselves launched into a horrifying media circus.…
…
continue reading
1
From #Boeing to #Google: Jake Moshenko's Journey with Cutting-Edge Security at Authzed
41:57
41:57
Play later
Play later
Lists
Like
Liked
41:57
Send us a text What if the smallest oversight in software could have catastrophic consequences? Join us as we uncover the remarkable journey of Jake, a visionary engineer who has made significant strides in the tech industry. From his days at the University of Michigan to influential positions at Boeing, Amazon, and Google, Jake's story is a testam…
…
continue reading
1
Copycat (The Friday the 13th Killer with Jon Katity) [REBROADCAST OF EPISODE 167]
1:29:36
1:29:36
Play later
Play later
Lists
Like
Liked
1:29:36
OH MAN! IT'S FRIDAY THE 13TH!! Remember last year when Leslie had just had her baby so she sent her husband, our composer and editor, Jon, in to take her place?! If you don't, well lucky you, because we are rebroadcasting our Friday the 13th episode that Holly and Jon recorded on 10.13.23. And if you do remember, well you get to enjoy twice!!! Jon'…
…
continue reading
1
Innovative Approaches to Safeguarding Information with Matt Howard
48:18
48:18
Play later
Play later
Lists
Like
Liked
48:18
Send us a text What if you could protect your organization's data as effortlessly as sending an email? Join us for an enlightening conversation with Matt Howard, a veteran IT professional whose career spans the dawn of the application service provider model to the forefront of open-source software and application security. Matt’s experience at tech…
…
continue reading
1
Navigating the Cyber Threat Landscape with Chris Hale
44:32
44:32
Play later
Play later
Lists
Like
Liked
44:32
Send us a text Ever wondered what it takes to stay one step ahead of cybercriminals? This episode, featuring cybersecurity expert Chris Hale, promises to unravel the complexities of safeguarding digital fortresses while sharing invaluable lessons from the frontlines. Chris’s journey from a help desk technician to the founder of his own cybersecurit…
…
continue reading
1
Lessons in Privacy from Across the Atlantic with Richard Hollis
59:51
59:51
Play later
Play later
Lists
Like
Liked
59:51
Send us a text What happens when a seasoned American cybersecurity expert navigates the intricate world of European data privacy? Richard Hollis, with over three decades in the cybersecurity industry, shares his captivating journey from Washington DC's government projects to leading Risk Crew in London. Listen as Richard emphasizes the critical rol…
…
continue reading
1
True Crime TLDR: The Career Girls Murder
1:06:07
1:06:07
Play later
Play later
Lists
Like
Liked
1:06:07
It's a Lesliesode!!! This week's double sized TLDR takes you through the murders of Emily Hoffert & Janice Wylie, deemed the Career Girls Murder. It's a windy, twisty road that finally leads us to justice - but not without really f-ing up first. Click To Learn More https://timesmachine.nytimes.com/timesmachine/1963/08/29/89957611.pdf?pdf_redirect=t…
…
continue reading
1
Fighting Misinformation in a Divided Landscape
30:12
30:12
Play later
Play later
Lists
Like
Liked
30:12
Send us a text Have you ever wondered how drastically your media consumption could change just by crossing state lines? During a recent family vacation to Nashville, I experienced firsthand how my YouTube and social media feeds were manipulated to present opposing political views. This episode exposes the unnerving reality of regional media targeti…
…
continue reading
1
AI, Security, and the Future of IT Explored With Michael Goldstein
57:40
57:40
Play later
Play later
Lists
Like
Liked
57:40
Send us a text How does a mischievous high school curiosity evolve into a rich, multifaceted career in IT and security? This episode promises a deep dive into Michael Goldstein's fascinating journey from tinkering with school computers to becoming an influential figure during the PC revolution. Learn from Michael's transition from mainframe to PC e…
…
continue reading
1
Balancing Tech and Soft Skills in Modern Cybersecurity With Rui Ribeiro
58:56
58:56
Play later
Play later
Lists
Like
Liked
58:56
Send us a text Imagine the bustling energy of DEF CON suddenly shifting from Caesars to the Las Vegas Convention Center. How will this change impact the magic of one of the world's most renowned cybersecurity events? Join us as we share personal experiences from past DEF CONs, consider the logistical hurdles, and discuss the potential financial imp…
…
continue reading
1
Road To Nowhere (The Disappearance of Brandon Swanson)
1:41:34
1:41:34
Play later
Play later
Lists
Like
Liked
1:41:34
Shortly after midnight on May 14, 2008, 19 year old Brandon Swanson left a going away party for a friend. He started off on the half hour drive home to his parents house in Marshall Minnesota, taking back roads through dark cornfields when he found himself in unfamiliar territory. Brandon tried to turn his car around but ended up stuck off the road…
…
continue reading
Send us a text In this insightful interview, Joe sits down with cybersecurity expert Mr. Jeff Man to delve into his extensive background in security and his impactful tenure at the National Security Agency (NSA). They explore how Jeff embarked on his security career, the critical mission of the NSA, and the agency's compartmentalized structure. Jef…
…
continue reading
1
Folie à Deux Minus One ( TLDR Anna Stubblefield and Derrick Johnson)
1:31:35
1:31:35
Play later
Play later
Lists
Like
Liked
1:31:35
This week's super sized TLDR takes you through the complicated, one sided love story of Anna Stubblefield and Derrick Johnson. It's the story that inspired the much talked about Netflix Documentary: Tell Them You Love Me. Click To Learn More Click here to watch "Tell Them You Love Me" on Netflix WWBD Merch Buy your WWBD swag here! Join the Conversa…
…
continue reading
1
The Trail's Gone Cold (The Disappearance and Murder of Angela Nicole Bradbury)
1:28:55
1:28:55
Play later
Play later
Lists
Like
Liked
1:28:55
Mitchell County Iowa, July 12th 2021, 5:27 PM. A local girl was taking a walk down the Greenbelt River Trail when something strange and terrifying caught her attention. She looked once, rubbed her eyes thinking she must be seeing things, and then looked again. Upon further inspection it was clear that no she wasn't seeing things, there among the lu…
…
continue reading
1
Grant Borzikas' Unconventional Journey to CISO of Cloudflare
53:17
53:17
Play later
Play later
Lists
Like
Liked
53:17
Send us a text In this episode, we dive into the fascinating story of Grant Borzikas, the CISO of Cloudflare. From his passion for baseball and a brief stint in accounting to becoming a prominent figure in IT, Grant's journey is anything but typical. Listen as he recounts how his father's influence and his own relentless curiosity led him into the …
…
continue reading
1
From Hacked Teen to Cybersecurity Pro: Ron Eddings' Journey to the NSA & Hacker Valley Studios
57:01
57:01
Play later
Play later
Lists
Like
Liked
57:01
Send us a text What happens when a curious teenager gets hacked on AOL Instant Messenger and turns that experience into a thriving cybersecurity career? Join us as we sit down with Ron Edding from Hacker Valley Studios, who shares his journey from being a 13-year-old victim of hacking to becoming a professional at Booz Allen Hamilton by the age of …
…
continue reading
1
True Crime TLDR: Gay Nazis (Ernst Röhm and the Eldorado Cabaret)
50:57
50:57
Play later
Play later
Lists
Like
Liked
50:57
Happy Pride Fiends! Alright we know it's July, but we had one more pride episode on the books so we're giving it to you anyway. This one is for the musical theater fans! Before The stonewall there was the Edorado Cabaret, a german, multi locational, enlightened, anything goes wonderland where liberation was was abundant. We have learned that you ca…
…
continue reading
1
From Mathematics to Cybersecurity: Fayon Atkinson's Unexpected Career Journey
49:31
49:31
Play later
Play later
Lists
Like
Liked
49:31
Send us a text What if your career path took an unexpected turn into the fast-paced world of cybersecurity? Join us for an insightful conversation with Fayon, a senior cybersecurity advisor, who pivots from mathematics and mechanical engineering to become a cornerstone of breach response and risk advisory. Hear how her role as a breach assistant at…
…
continue reading
1
Be Gay Do Crime (The Stonewall Uprising)
1:53:20
1:53:20
Play later
Play later
Lists
Like
Liked
1:53:20
Happy Pride Fiends! WWBD whole heartedly supports the LGBTQ+ community and so, we decided that it was time we covered the event that launched what we know today as Pride, The Stonewall Uprising. As we all know, Pride was first and foremost a protest, but the events that lead up to that protest might just surprise you. Click To Learn More https://ww…
…
continue reading
1
Protecting Small Businesses in the Digital Age With Chris Petersen From Radicl
51:21
51:21
Play later
Play later
Lists
Like
Liked
51:21
Send us a text Ever wondered how a degree in accounting could lead to a thriving career in cybersecurity? Join us as Chris Petersen shares his riveting journey from Colorado State University to becoming a cybersecurity expert. Initially hesitant to dive into engineering, Chris leveraged his minor in accounting information systems and a golden oppor…
…
continue reading
1
The Future of Encryption and Digital Safety With Ameesh Divatia
43:57
43:57
Play later
Play later
Lists
Like
Liked
43:57
Send us a text What if you could unlock the secrets of a thriving tech career and learn how to safeguard sensitive data in the digital age? Join us for an insightful episode featuring our special guest, Ameesh Divatia, who shares his captivating journey into IT, sparked by reading tech articles in Time magazine and National Geographic. From his ear…
…
continue reading
1
Safeguarding the Future Of AI Meets Cybersecurity With Erick Galinkin
57:07
57:07
Play later
Play later
Lists
Like
Liked
57:07
Send us a text Curious about the real history of artificial intelligence and how it has woven itself into the fabric of modern life? Join us as Erick Galinkin returns to share his insights on the evolution of AI, from its early conceptual stages to its present-day applications like self-driving cars. We promise you'll walk away with a deep understa…
…
continue reading
1
Transforming Your Mindset for Lasting Success: Personal Stories and Strategies
29:30
29:30
Play later
Play later
Lists
Like
Liked
29:30
Send us a text Is your mindset holding you back from achieving the success you desire? Discover how a simple shift in perspective can transform your life, as we share personal stories and actionable strategies to help you envision and reach your goals. Reflecting on my own journey, I recount how motivational videos in high school changed my thinkin…
…
continue reading
1
Unlocking Cloud Security: Insights and Innovations with Sandy Bird
46:25
46:25
Play later
Play later
Lists
Like
Liked
46:25
Send us a text Are your cloud environments secure, or are they silently exposing you to threats? In this gripping episode, we sit down with security industry giant Sandy Bird from Sonrai Security. Sandy draws from his rich 20-year career, from founding Q1 Labs to his pivotal role as CTO of IBM's security division, to share invaluable insights. We u…
…
continue reading
Happy Halfoween fiends! It's time once again to brin you stories that explore our deepest, darkest, squirmiest fears! Join Holly, Leslie and fiend favorite John Rattacasa as they bring you a smorgasbord of scary stories. WWBD Merch Buy your WWBD swag here! Join the ConversationBy We Would Be Dead
…
continue reading
1
Indu Keri's Insights on Balancing Security and Innovation
47:16
47:16
Play later
Play later
Lists
Like
Liked
47:16
Send us a text Experience the extraordinary journey of Indu Keri as he traverses the landscape of IT, from her upbringing in India to discovering her passion for computer science. With a choice between becoming a doctor or an engineer, Indu opted for electronics—motivated by her aversion to dissection—and eventually found herself captivated by the …
…
continue reading
1
Case File TLDR (Amber Hagerman, AMBER alert)
37:08
37:08
Play later
Play later
Lists
Like
Liked
37:08
WEEKLY CONTENT IS BACK! Ever wish you knew more about the cases the rest of the world has analyzed without you? Often, when cases are fully developed and researched, there's just too much information to take in at once. It can be overwhelming! Don't worry, you've come to the right place. Welcome to Case File TLDR! Every other week we'll provide and…
…
continue reading
1
The Challenges of Depreciating IT Equipment The Importance of Proper Data Destruction with Rocco D'Amico
49:51
49:51
Play later
Play later
Lists
Like
Liked
49:51
Send us a text Rocco D'Amico shares his journey into IT sales and the evolution of his business, Brass Valley, which specializes in decommissioning data centers and providing data security. The conversation touches on topics such as the shift from on-premises data centers to the cloud, the cyclical nature of technology, the depreciation of IT equip…
…
continue reading
1
Addressing the Risks of AI with Innovative Solutions Encrypting Communication
49:45
49:45
Play later
Play later
Lists
Like
Liked
49:45
Send us a text Ari Andersen shares his journey from starting a podcast to founding a security startup. He discusses the importance of trust in the digital world and the need for a security layer based on trust. Ari explains how his company leverages trusted relationships to share information securely and prevent attacks like deep fakes and spoofed …
…
continue reading
1
A Family Affair (Steven and Katie Pladl)
1:35:09
1:35:09
Play later
Play later
Lists
Like
Liked
1:35:09
On April 12, 2018, 43 year old Steven Walter Pladl, murdered his father in law Tony, His infant son Bennet and his 20 year old wife Katie, then called her mother, told her to notify the police, and turned the gun on himself. Days prior to this horrific event Stephen's wife Katie had ended their brief marriage by way of a phone call and Stephen, it …
…
continue reading
1
Inside the Mind of a Cybersecurity Maestro: Oliver Tavakoli's Journey from Mainframes to AI
44:12
44:12
Play later
Play later
Lists
Like
Liked
44:12
Send us a text Have you ever gazed into the depths of a cybersecurity expert's mind? Prepare to be captivated as we sit down with Oliver, a virtuoso in the realms of IT and cybersecurity, whose tale unfolds from a childhood enchanted by math and sci-fi to the frontlines of digital defense. In today's episode, we peel back the layers of cybersecurit…
…
continue reading
1
Ashley Burke's Resilience in the World of Fintech and Cyber Risk
47:54
47:54
Play later
Play later
Lists
Like
Liked
47:54
Send us a text When Ashley's journey led her from environmental studies to a pivotal role in cybersecurity, it wasn't just a career change – it was a reinvention. We're thrilled to share her candid story, illuminating how she balances the demands of family life with the rigors of fintech, where she excels in risk governance and vulnerability manage…
…
continue reading
1
Cover Girl Interrupted (The Ivory Soap Murders)
1:43:22
1:43:22
Play later
Play later
Lists
Like
Liked
1:43:22
In 1937 Pin up party girl Veronica Gedeon was a fixture in the pages of many true crime magazines. Her blond hair, bright eyes and slender figure were sure to sell more copies of whatever pulp periodical cover she graced on any given week that all of its competitors combined. So, when Veronica was discovered nude and strangled to death on the bed o…
…
continue reading
1
Bridging the Gap Between Technical Expertise and Business Acumen with Shauli Rozen
46:00
46:00
Play later
Play later
Lists
Like
Liked
46:00
Send us a text When Shauli stepped out of the army and into the world of engineering, little did he know that his love for math and physics would catapult him into the tech stratosphere. Our latest episode features Shauli's riveting journey as he navigates from algorithms engineering to the forefront of cybersecurity and beyond. His experiences rev…
…
continue reading
1
Outsmarting Cybercriminals: A Deep Dive into Social Engineering, Deepfakes, and Digital Defense with Aaron Painter
52:53
52:53
Play later
Play later
Lists
Like
Liked
52:53
Send us a text Prepare to have your mind broadened and your digital defenses bolstered as we journey with cybersecurity expert Aaron Painter, whose insights from Microsoft and NameTag are nothing short of enlightening. We tackle the increasingly sophisticated realm of social engineering, where attackers prey on human psychology rather than system w…
…
continue reading
1
Pick A Crime (St. Patrick's Day Live Campfire 2024)
1:28:11
1:28:11
Play later
Play later
Lists
Like
Liked
1:28:11
Welcome to our live game of Irish True Crime Roulette! This year's St. Patrick's Day livestream featured 3 classic Irish true crime stories from the book Foster's Book of Irish Murder. All three were picked at random, live, with the help of our fiends, and as usual feature some lively color commentary. We are happy to bring you "One Sock" read by L…
…
continue reading
1
Educational Grit and Quantum Communications in Space Security
27:34
27:34
Play later
Play later
Lists
Like
Liked
27:34
Send us a text Embarking on the rollercoaster ride of higher education can be daunting, but what if it's the key to unlocking a career in the complex world of cybersecurity? That's exactly what I dive into in our latest episode, as I peel back the layers of my own experience, from the decision to pursue advanced degrees to the unexpected shift from…
…
continue reading
1
Unlocking the Secrets of Effective Insider Threat Management With Joe Payne From Code42
58:28
58:28
Play later
Play later
Lists
Like
Liked
58:28
Send us a text From the fizz of soda pop to the buzz of cybersecurity – witness Joe's extraordinary journey through the tech landscape. Our latest podcast episode takes you through a narrative of unexpected career leaps and the critical role of intelligence in the digital age. Joe, a former soft drink enthusiast turned cybersecurity guru, shares ta…
…
continue reading
1
Seizing IT Opportunities - Gerry Gebel's Professional Saga
41:21
41:21
Play later
Play later
Lists
Like
Liked
41:21
Send us a text Ever wondered how an economics graduate ends up orchestrating identities in the tech world? Join us as Gerry Gebel unpacks his incredible journey from an unexpected programming class to spearheading a bank's leap into IBM technology. His story, far from typical, is a testament to seizing opportunities and navigating the dynamic lands…
…
continue reading
1
The Short Straw (The Horrible Fate of the Francis Spaight)
1:56:14
1:56:14
Play later
Play later
Lists
Like
Liked
1:56:14
It's our Irish episode fiends, and boy did we find an eerie tale this year! Just before Christmas in 1835 the British merchant ship, The Angerona, was on it's way from Newfoundland to Teignmouth when the captain spotted something strange. Off in the distance he saw a large vessel, ravaged by a storm, with no masts. Normally this would have signifie…
…
continue reading