Listen
…
continue reading
Deception, influence, and social engineering in the world of cyber crime.
…
continue reading
A fun and informative cybersecurity audio glossary from N2K.
…
continue reading
Exploration, history and current trends in technology and focus on artificial intelligence
…
continue reading
Take a listen to the #LighthouseITPodcast every other week as we discuss both cybersecurity and digital marketing news! It's time to stop dreaming IT. Let's start doing IT. #GetLITS
…
continue reading
Get Certified Together is Podcast series from TechnoKofe, where we cover exam topics of the various Tech Industry renowned Certifications.For the first 14 Episodes, we have covered CompTIA Security+ 601. From Episode 15 onwards, we are moving forward with CCSP (Certified Cloud Security Professional)
…
continue reading
Freeform independent community radio streaming from Christchurch, New Zealand.
…
continue reading
4 Bridges Podcast Presented by Zeallous, host Elijah Collins interviews music industry professionals, tell you about up-and-coming local artists and connect music lovers from all four corners of the bay.
…
continue reading
Poetry & scripture (s) in relation to real life experiences.
…
continue reading
Welcome to Pour Into It! Where we are giving great advice, breathing positive energy while sipping on our fave cocktail. Pouring life into positive things and dissecting everyday issues within our culture. Hosted by MicahRen #PourIntoIt Send topics, comments and questions to pourintoit@gmail.com
…
continue reading
This is the Soundcloud page for the Humberview Howl podcast!
…
continue reading
1
personally identifiable information (PII) (noun) [Word Notes]
7:26
7:26
Play later
Play later
Lists
Like
Liked
7:26
A term of legal art that defines the types of data and circumstances that permits a third party to directly or indirectly identify an individual with collected data.By N2K Networks
…
continue reading
1
personally identifiable information (PII) (noun)
7:26
7:26
Play later
Play later
Lists
Like
Liked
7:26
A term of legal art that defines the types of data and circumstances that permits a third party to directly or indirectly identify an individual with collected data. Learn more about your ad choices. Visit megaphone.fm/adchoicesBy N2K Networks
…
continue reading
1
Episode 51 - CCSP Endgame , 2 Week Sprint
38:39
38:39
Play later
Play later
Lists
Like
Liked
38:39
I am certified as a Certified Cloud Security Professional (CCSP) after clearing the exam by ISC2 on 3rd Dec. In this episode, I shared my final sprint, till a day before the exam by sharing books I referred to during this period. For resources, refer to the show notes at https://technokofe.com/2024/12/05/get-certified-together-episode-51/ Support t…
…
continue reading
On Hacking Humans, Dave Bittner, Joe Carrigan, and Maria Varmazis (also host of N2K's daily space podcast, T-Minus), are once again sharing the latest in social engineering scams, phishing schemes, and criminal exploits that are making headlines to help our audience become aware of what is out there. This week, our hosts dive into some follow up fr…
…
continue reading
1
A cyber carol. [Only Malware in the Building]
51:22
51:22
Play later
Play later
Lists
Like
Liked
51:22
Welcome in! You’ve entered, Only Malware in the Building. Grab your eggnog and don your coziest holiday sweater as we sleuth our way through cyber mysteries with a festive twist! Your host is Selena Larson, Proofpoint intelligence analyst and host of their podcast DISCARDED. Inspired by the residents of a building in New York’s exclusive upper west…
…
continue reading
Please enjoy this encore episode of Word Notes. An isolated and controlled set of resources that mimics real world environments and used to safely execute suspicious code without infecting or causing damage to the host machine, operating system, or network.By N2K Networks
…
continue reading
Please enjoy this encore episode of Word Notes. An isolated and controlled set of resources that mimics real world environments and used to safely execute suspicious code without infecting or causing damage to the host machine, operating system, or network. Learn more about your ad choices. Visit megaphone.fm/adchoices…
…
continue reading
1
Palo-Alto Zero-Day, Google’s Legal Battle, Social Media Laws, & more!
33:13
33:13
Play later
Play later
Lists
Like
Liked
33:13
The Lighthouse IT Podcast - November 29th, 2024 This week, Matt and Griff discuss recent security updates for MacOS, iOS, and VMware, including active exploitation of vulnerabilities and a Zero-Day flaw in Palo-Alto Firewalls enabling authentication bypass and root access. Finnish authorities suspect sabotage in the C-Lion1 data cable break. Amazon…
…
continue reading
Please enjoy this encore of Hacking Humans: This week, we are joined by host of N2K's T-Minus Space Daily podcast, Maria Varmazis, she sits down with Joe and Dave to discuss sextorion materials that were found on popular social media apps such as, TikTok, Instagram, Snapchat and YouTube. Joe and Dave share quite a bit of follow up, Joe starts with …
…
continue reading
1
security orchestration, automation, and response (SOAR) (noun) [Word Notes]
6:26
6:26
Play later
Play later
Lists
Like
Liked
6:26
Please enjoy this encore episode of Word Notes. A stack of security software solutions and tools that allow organizations to orchestrate disparate internal and external tools which feed pre-built automation playbooks that respond to events or alert analysts if an event meets a certain threshold.By N2K Networks
…
continue reading
1
security orchestration, automation, and response (SOAR) (noun)
6:26
6:26
Play later
Play later
Lists
Like
Liked
6:26
Please enjoy this encore episode of Word Notes. A stack of security software solutions and tools that allow organizations to orchestrate disparate internal and external tools which feed pre-built automation playbooks that respond to events or alert analysts if an event meets a certain threshold. Learn more about your ad choices. Visit megaphone.fm/…
…
continue reading
On Hacking Humans, Dave Bittner, Joe Carrigan, and Maria Varmazis (also host of N2K's daily space podcast, T-Minus), are once again sharing the latest in social engineering scams, phishing schemes, and criminal exploits that are making headlines to help our audience become aware of what is out there. This week, Joe shares a note from listener Micha…
…
continue reading
1
Mac Tiny, Walblox, FortiJump, & Wooden Satellites
35:40
35:40
Play later
Play later
Lists
Like
Liked
35:40
The Lighthouse IT Podcast - November 15th, 2024 This week, Matt and Griff discuss Apple's updates to the Mac Mini hardware, Walmart is pushing hard towards eCommerce, even going so far as to implement a brand integration into Roblox and integrate actionable AI into its customer support chatbots. To everyone's shock and surprise (we are not actually…
…
continue reading
On Hacking Humans, Dave Bittner, Joe Carrigan, and Maria Varmazis (also host of N2K's daily space podcast, T-Minus), are once again sharing the latest in social engineering scams, phishing schemes, and criminal exploits that are making headlines to help our audience become aware of what is out there. This week, the team shares follow up about FEMA …
…
continue reading
1
secure access service edge (SASE) (noun) [Word Notes]
8:25
8:25
Play later
Play later
Lists
Like
Liked
8:25
Enjoy this encore episode. A security architecture that incorporates the cloud shared responsibility model, a vendor provided security stack, an SD-WAN abstraction layer, and network peering with one or more of the big content providers and their associated fiber networks.By N2K Networks
…
continue reading
Enjoy this encore episode. A security architecture that incorporates the cloud shared responsibility model, a vendor provided security stack, an SD-WAN abstraction layer, and network peering with one or more of the big content providers and their associated fiber networks. Learn more about your ad choices. Visit megaphone.fm/adchoices…
…
continue reading
Maria Varmazis, host of N2K's daily space show T-Minus, joins Dave and Joe to share the story of the five types of social engineers Deanne Lewis encountered while tending bar, revealing how each barroom personality reflects a common cybersecurity threat. Our hosts share some follow-up from a friend of the show, JJ, who reports a rise in tech suppor…
…
continue reading
Enjoy this encore episode. The practice of emulating known adversary behavior against an organization's actual defensive posture.By N2K Networks
…
continue reading
1
Whispers in the wires: A closer look at the new age of intrusion. [OMITB]
40:10
40:10
Play later
Play later
Lists
Like
Liked
40:10
Welcome in! You’ve entered, Only Malware in the Building. Join us each month to sip tea and solve mysteries about today’s most interesting threats. Your host is Selena Larson, Proofpoint intelligence analyst and host of their podcast DISCARDED. Inspired by the residents of a building in New York’s exclusive upper west side, Selena is joined by N2K …
…
continue reading
Enjoy this encore episode. The practice of emulating known adversary behavior against an organization's actual defensive posture. Learn more about your ad choices. Visit megaphone.fm/adchoicesBy N2K Networks
…
continue reading
1
Episode 50 - Risk Management, Outsourcing and Cloud Contract
42:35
42:35
Play later
Play later
Lists
Like
Liked
42:35
In this episode, I discussed Understanding the Implications of the Cloud to Enterprise Risk Management, and Understand Outsourcing and Cloud Contract Design. This brings the end of the season for CompTia and CCSP. We will come again in Season 2 of this series, with amazing content. Support this podcast at — https://redcircle.com/get-certified-toget…
…
continue reading
1
Prime Time, Click to Cancel, & Death of Windows 10
49:28
49:28
Play later
Play later
Lists
Like
Liked
49:28
The Lighthouse IT Podcast - November 1st, 2024 This week, Matt and Griff discuss the recent discovery of the largest prime number known to date, and holy cow, it's a big one. Also, do you remember when Windows 10 was going to be Microsoft's last OS? Lighthouse IT Solutions remembers. But unfortunately, it doesn't matter anymore since Microsoft anno…
…
continue reading
1
S2E8- A Conversation with Deena Pierott, CEO iUrbanTeen
23:00
23:00
Play later
Play later
Lists
Like
Liked
23:00
As part of the Retro21 Studios podcast series - Brand Storytelling, we present S2E8- A Conversation with Deena Pierott, CEO iUrbanTeen. As the CEO and Executive Director of iUrban Teen, Deena leads a nationally recognized program that brings STEM+C+A (Science, Technology, Engineering, Math, Computing, Arts) education to historically excluded youth …
…
continue reading
Happy Halloween from the team at N2K Networks! We hope you share in our Halloween tradition of listening to the Malware Mash. You can check out our video here. Lyrics I was coding in the lab late one night when my eyes beheld an eerie sight for my malware threat score began to rise and suddenly to my surprise... It did the Mash It did the Malware M…
…
continue reading
1
How political donations can be deceiving.
50:24
50:24
Play later
Play later
Lists
Like
Liked
50:24
Maria Varmazis, host of N2K's daily space show T-Minus, joins Dave and Joe to share the story of a relentless wave of political donation texts that go well beyond simple annoyance, revealing an unsettling impact on vulnerable populations. CNN's investigation exposes how these texts, with their urgent and personal tone, have led seniors, including t…
…
continue reading
1
next generation firewall (noun) [Word Notes]
7:27
7:27
Play later
Play later
Lists
Like
Liked
7:27
Please enjoy this encore episode of Word Notes. A layer seven security orchestration platform deployed at the boundary between internal workloads slash data storage and untrusted sources that blocks incoming and outgoing network traffic with rules that tie applications to the authenticated user and provides most of the traditional security stack fu…
…
continue reading
Please enjoy this encore episode of Word Notes. A layer seven security orchestration platform deployed at the boundary between internal workloads slash data storage and untrusted sources that blocks incoming and outgoing network traffic with rules that tie applications to the authenticated user and provides most of the traditional security stack fu…
…
continue reading
1
S2E7 - A Conversation with Rose City Techies Co-Founders Annie Baker and Brooklyn Whittman
25:48
25:48
Play later
Play later
Lists
Like
Liked
25:48
As part of the Retro21 Studios podcast series - Brand Storytelling, we present S2E7 - A Conversation with Rose City Techies Co-Founders Annie Baker and Brooklyn Whittman. Rose City Techies We're an inclusive community of techies dedicated to building, creating, and exploring the future of technology together. This is a place for those who want to f…
…
continue reading
Maria Varmazis, host of N2K's daily space show T-Minus, joins Dave and Joe to share the story of how ESET Research revealed that Telekopye, a scam toolkit used by cybercriminals, has expanded its operations from online marketplaces to accommodation booking platforms like Booking.com and Airbnb. Joe’s story is on the elaborate "blessing scam" target…
…
continue reading
Please enjoy this encore of Word Notes. A network designed to obfuscate the location of a cyber adversary's command and control server by manipulating the domain name system, or DNS, in a way that rotates the associated IP address among large numbers of compromised hosts in a botnet.By N2K Networks
…
continue reading
Please enjoy this encore of Word Notes. A network designed to obfuscate the location of a cyber adversary's command and control server by manipulating the domain name system, or DNS, in a way that rotates the associated IP address among large numbers of compromised hosts in a botnet. Learn more about your ad choices. Visit megaphone.fm/adchoices…
…
continue reading
1
Open-source arguments, DDoSflare, & Day:Break
29:42
29:42
Play later
Play later
Lists
Like
Liked
29:42
The Lighthouse IT Podcast - October 18th, 2024 This week, Matt and Griff discuss the growing dispute between WordPress.org and WP Engine over their contributions to the open-source project vs. their monetization of it. The internet domain .io has seen a spike in popularity from tech companies, but a potential upcoming change in domain ownership cou…
…
continue reading
1
Cybercriminals thrive in vulnerable moments.
44:50
44:50
Play later
Play later
Lists
Like
Liked
44:50
Maria Varmazis, host of N2K's daily space show T-Minus, joins Dave and Joe to share the story of how cybercriminals are exploiting the chaos following Hurricane Helene in Florida by launching scams and phishing attacks. Veriti’s research highlights three key threats: FEMA claim scams, phishing using hurricane-related domains, and malicious files di…
…
continue reading
1
Election Propaganda: Part 3: Efforts to reduce the impact of future elections. [CSO Perspectives]
46:28
46:28
Play later
Play later
Lists
Like
Liked
46:28
Thinking past the US 2024 Presidential Election, In part three of the series, Rick Howard, N2K CyberWire’s Chief Analyst and Senior Fellow, discusses reducing the impact of propaganda in the future elections with Perry Carpenter, Chief Human Risk Management Strategist at KnowBe4 and host of the 8th Layer Insights Podcast, Nina Jankowicz, Co-Founder…
…
continue reading
Enjoy this Word Notes encore. The process of converting plain text into an unrecognizable form or secret code to hide its true meaning.By N2K Networks
…
continue reading
Enjoy this Word Notes encore. The process of converting plain text into an unrecognizable form or secret code to hide its true meaning. Learn more about your ad choices. Visit megaphone.fm/adchoicesBy N2K Networks
…
continue reading
1
The e-commerce scam you didn’t see coming!
46:28
46:28
Play later
Play later
Lists
Like
Liked
46:28
Maria Varmazis, host of N2K's daily space show T-Minus, joins Dave and Joe to share the story of a South Carolina couple, and how they were devastated to discover their vacant land in Concord, Massachusetts was fraudulently sold by thieves who posed as them, with the new owners already building a home on the property, prompting a lawsuit and an FBI…
…
continue reading
1
Election Propaganda: Part 2: Modern propaganda efforts. [CSO Perspectives]
50:31
50:31
Play later
Play later
Lists
Like
Liked
50:31
In preparation for the US 2024 Presidential Election, Rick Howard, N2K CyberWire’s Chief Analyst and Senior Fellow, discusses recent international propaganda efforts in the form of nation state interference and influence operations as well as domestic campaigns designed to split the target country into opposing camps. Guests include Nina Jankowicz,…
…
continue reading
1
S2E6 - A Conversation with Andrew Lekashman, AI LLM/Infrastructure, Product Owner.
33:48
33:48
Play later
Play later
Lists
Like
Liked
33:48
As part of the Retro21 Studios podcast series - Brand Storytelling, we present S2E6 - A Conversation with Andrew Lekashman, AI LLM/Infrastructure, Product Owner. Andrew is a technical product manager with expertise in AI, product management, and eCommerce. Proven ability to lead cross-functional teams, launch innovative products, and drive business…
…
continue reading
Please enjoy this encore episode of Word Notes. Software or hardware that records the computer keys pressed by a user.By N2K Networks
…
continue reading
Please enjoy this encore episode of Word Notes. Software or hardware that records the computer keys pressed by a user. Learn more about your ad choices. Visit megaphone.fm/adchoicesBy N2K Networks
…
continue reading
1
Wi-Fi Chipset Hole, Scraping Meta, Google Archive, & BanTok
32:43
32:43
Play later
Play later
Lists
Like
Liked
32:43
The Lighthouse IT Podcast - October 4th, 2024 This week, Matt and Griff discuss the discovery that Meta has been scraping public posts on Facebook and Instagram since 2007 and using that data to train their AI models. TikTok is hoping to avoid a ban in the U.S. without selling themselves and has taken their plight to the U.S. Court of Appeals. Addi…
…
continue reading
1
Election Propaganda Part 1: How does election propaganda work? [CSO Perspectives]
33:37
33:37
Play later
Play later
Lists
Like
Liked
33:37
Rick Howard, N2K CyberWire’s Chief Analyst and Senior Fellow, discusses personal defensive measures that an average citizen, regardless of political philosophy, can take in order to not succumb to propaganda. References: David Ehl, 2024. Why Meta is now banning Russian propaganda [News]. Deutsche Welle. Jeff Berman, Renée DiResta, 2023. Disinformat…
…
continue reading
1
non-fungible tokens (NFT) (noun) [Word Notes]
5:34
5:34
Play later
Play later
Lists
Like
Liked
5:34
Enjoy this encore of Word Notes. Digital assets that are cryptographically protected on a blockchain and contain unique identification codes and metadata that makes them one of a kind.By N2K Networks
…
continue reading
1
The Dark Arts of cyber. [Only Malware in the Building]
32:46
32:46
Play later
Play later
Lists
Like
Liked
32:46
Welcome, witches, wizards, and cybersecurity sleuths! You’ve entered, Only Malware in the Building. Join us each month to brew potions of knowledge and crack the curses of today’s most intriguing cyber mysteries. Your host is Selena Larson, Proofpoint intelligence analyst and host of their podcast DISCARDED. Inspired by the residents of a building …
…
continue reading
Enjoy this encore of Word Notes. Digital assets that are cryptographically protected on a blockchain and contain unique identification codes and metadata that makes them one of a kind. Learn more about your ad choices. Visit megaphone.fm/adchoicesBy N2K Networks
…
continue reading
In this episode, I discussed the recent gap in our podcast and what lies ahead for us after finishing CCSP. In the next episode, I will cover Understanding the Implications of the Cloud to Enterprise Risk Management, and Understand Outsourcing and Cloud Contract Design. Twitter (X) - @dev_lops Support this podcast at — https://redcircle.com/get-cer…
…
continue reading
It's all in the details, folks. Pay attention to those and you can avoid unnecessary stress. Dave Bittner, Maria Varmazis, and Joe Carrigan swap stories on email password-stealing attacks, Google ads scams, and fake banks this week. The team shares follow up from listener Steven from the UK about the hazards of shoulder surfing when they received t…
…
continue reading
1
multi-factor authentication (noun) [Word Notes]
6:01
6:01
Play later
Play later
Lists
Like
Liked
6:01
Enjoy this special encore episode. The use of two or more verification methods to gain access to an account.By N2K Networks
…
continue reading
Enjoy this special encore episode. The use of two or more verification methods to gain access to an account. Learn more about your ad choices. Visit megaphone.fm/adchoicesBy N2K Networks
…
continue reading