Pii public
[search 0]
More
Download the App!
show episodes
 
Get Certified Together is Podcast series from TechnoKofe, where we cover exam topics of the various Tech Industry renowned Certifications.For the first 14 Episodes, we have covered CompTIA Security+ 601. From Episode 15 onwards, we are moving forward with CCSP (Certified Cloud Security Professional)
  continue reading
 
Artwork

1
4 Bridges

Elijah Collins

Unsubscribe
Unsubscribe
Monthly
 
4 Bridges Podcast Presented by Zeallous, host Elijah Collins interviews music industry professionals, tell you about up-and-coming local artists and connect music lovers from all four corners of the bay.
  continue reading
 
Welcome to Pour Into It! Where we are giving great advice, breathing positive energy while sipping on our fave cocktail. Pouring life into positive things and dissecting everyday issues within our culture. Hosted by MicahRen #PourIntoIt Send topics, comments and questions to pourintoit@gmail.com
  continue reading
 
Loading …
show series
 
I am certified as a Certified Cloud Security Professional (CCSP) after clearing the exam by ISC2 on 3rd Dec. In this episode, I shared my final sprint, till a day before the exam by sharing books I referred to during this period. For resources, refer to the show notes at https://technokofe.com/2024/12/05/get-certified-together-episode-51/ Support t…
  continue reading
 
On Hacking Humans, Dave Bittner, Joe Carrigan, and Maria Varmazis (also host of N2K's daily space podcast, T-Minus), are once again sharing the latest in social engineering scams, phishing schemes, and criminal exploits that are making headlines to help our audience become aware of what is out there. This week, our hosts dive into some follow up fr…
  continue reading
 
Welcome in! You’ve entered, Only Malware in the Building. Grab your eggnog and don your coziest holiday sweater as we sleuth our way through cyber mysteries with a festive twist! Your host is Selena Larson, Proofpoint intelligence analyst and host of their podcast DISCARDED. Inspired by the residents of a building in New York’s exclusive upper west…
  continue reading
 
The Lighthouse IT Podcast - November 29th, 2024 This week, Matt and Griff discuss recent security updates for MacOS, iOS, and VMware, including active exploitation of vulnerabilities and a Zero-Day flaw in Palo-Alto Firewalls enabling authentication bypass and root access. Finnish authorities suspect sabotage in the C-Lion1 data cable break. Amazon…
  continue reading
 
Please enjoy this encore of Hacking Humans: This week, we are joined by host of N2K's T-Minus Space Daily podcast, Maria Varmazis, she sits down with Joe and Dave to discuss sextorion materials that were found on popular social media apps such as, TikTok, Instagram, Snapchat and YouTube. Joe and Dave share quite a bit of follow up, Joe starts with …
  continue reading
 
Please enjoy this encore episode of Word Notes. A stack of security software solutions and tools that allow organizations to orchestrate disparate internal and external tools which feed pre-built automation playbooks that respond to events or alert analysts if an event meets a certain threshold.By N2K Networks
  continue reading
 
Please enjoy this encore episode of Word Notes. A stack of security software solutions and tools that allow organizations to orchestrate disparate internal and external tools which feed pre-built automation playbooks that respond to events or alert analysts if an event meets a certain threshold. Learn more about your ad choices. Visit megaphone.fm/…
  continue reading
 
On Hacking Humans, Dave Bittner, Joe Carrigan, and Maria Varmazis (also host of N2K's daily space podcast, T-Minus), are once again sharing the latest in social engineering scams, phishing schemes, and criminal exploits that are making headlines to help our audience become aware of what is out there. This week, Joe shares a note from listener Micha…
  continue reading
 
The Lighthouse IT Podcast - November 15th, 2024 This week, Matt and Griff discuss Apple's updates to the Mac Mini hardware, Walmart is pushing hard towards eCommerce, even going so far as to implement a brand integration into Roblox and integrate actionable AI into its customer support chatbots. To everyone's shock and surprise (we are not actually…
  continue reading
 
On Hacking Humans, Dave Bittner, Joe Carrigan, and Maria Varmazis (also host of N2K's daily space podcast, T-Minus), are once again sharing the latest in social engineering scams, phishing schemes, and criminal exploits that are making headlines to help our audience become aware of what is out there. This week, the team shares follow up about FEMA …
  continue reading
 
Enjoy this encore episode. A security architecture that incorporates the cloud shared responsibility model, a vendor provided security stack, an SD-WAN abstraction layer, and network peering with one or more of the big content providers and their associated fiber networks. Learn more about your ad choices. Visit megaphone.fm/adchoices…
  continue reading
 
Maria Varmazis, host of N2K's daily space show T-Minus, joins Dave and Joe to share the story of the five types of social engineers Deanne Lewis encountered while tending bar, revealing how each barroom personality reflects a common cybersecurity threat. Our hosts share some follow-up from a friend of the show, JJ, who reports a rise in tech suppor…
  continue reading
 
Welcome in! You’ve entered, Only Malware in the Building. Join us each month to sip tea and solve mysteries about today’s most interesting threats. Your host is Selena Larson, Proofpoint intelligence analyst and host of their podcast DISCARDED. Inspired by the residents of a building in New York’s exclusive upper west side, Selena is joined by N2K …
  continue reading
 
In this episode, I discussed Understanding the Implications of the Cloud to Enterprise Risk Management, and Understand Outsourcing and Cloud Contract Design. This brings the end of the season for CompTia and CCSP. We will come again in Season 2 of this series, with amazing content. Support this podcast at — https://redcircle.com/get-certified-toget…
  continue reading
 
The Lighthouse IT Podcast - November 1st, 2024 This week, Matt and Griff discuss the recent discovery of the largest prime number known to date, and holy cow, it's a big one. Also, do you remember when Windows 10 was going to be Microsoft's last OS? Lighthouse IT Solutions remembers. But unfortunately, it doesn't matter anymore since Microsoft anno…
  continue reading
 
As part of the Retro21 Studios podcast series - Brand Storytelling, we present S2E8- A Conversation with Deena Pierott, CEO iUrbanTeen. As the CEO and Executive Director of iUrban Teen, Deena leads a nationally recognized program that brings STEM+C+A (Science, Technology, Engineering, Math, Computing, Arts) education to historically excluded youth …
  continue reading
 
Happy Halloween from the team at N2K Networks! We hope you share in our Halloween tradition of listening to the Malware Mash. You can check out our video here. Lyrics I was coding in the lab late one night when my eyes beheld an eerie sight for my malware threat score began to rise and suddenly to my surprise... It did the Mash It did the Malware M…
  continue reading
 
Maria Varmazis, host of N2K's daily space show T-Minus, joins Dave and Joe to share the story of a relentless wave of political donation texts that go well beyond simple annoyance, revealing an unsettling impact on vulnerable populations. CNN's investigation exposes how these texts, with their urgent and personal tone, have led seniors, including t…
  continue reading
 
Please enjoy this encore episode of Word Notes. A layer seven security orchestration platform deployed at the boundary between internal workloads slash data storage and untrusted sources that blocks incoming and outgoing network traffic with rules that tie applications to the authenticated user and provides most of the traditional security stack fu…
  continue reading
 
Please enjoy this encore episode of Word Notes. A layer seven security orchestration platform deployed at the boundary between internal workloads slash data storage and untrusted sources that blocks incoming and outgoing network traffic with rules that tie applications to the authenticated user and provides most of the traditional security stack fu…
  continue reading
 
As part of the Retro21 Studios podcast series - Brand Storytelling, we present S2E7 - A Conversation with Rose City Techies Co-Founders Annie Baker and Brooklyn Whittman. Rose City Techies We're an inclusive community of techies dedicated to building, creating, and exploring the future of technology together. This is a place for those who want to f…
  continue reading
 
Maria Varmazis, host of N2K's daily space show T-Minus, joins Dave and Joe to share the story of how ESET Research revealed that Telekopye, a scam toolkit used by cybercriminals, has expanded its operations from online marketplaces to accommodation booking platforms like Booking.com and Airbnb. Joe’s story is on the elaborate "blessing scam" target…
  continue reading
 
Please enjoy this encore of Word Notes. A network designed to obfuscate the location of a cyber adversary's command and control server by manipulating the domain name system, or DNS, in a way that rotates the associated IP address among large numbers of compromised hosts in a botnet. Learn more about your ad choices. Visit megaphone.fm/adchoices…
  continue reading
 
The Lighthouse IT Podcast - October 18th, 2024 This week, Matt and Griff discuss the growing dispute between WordPress.org and WP Engine over their contributions to the open-source project vs. their monetization of it. The internet domain .io has seen a spike in popularity from tech companies, but a potential upcoming change in domain ownership cou…
  continue reading
 
Maria Varmazis, host of N2K's daily space show T-Minus, joins Dave and Joe to share the story of how cybercriminals are exploiting the chaos following Hurricane Helene in Florida by launching scams and phishing attacks. Veriti’s research highlights three key threats: FEMA claim scams, phishing using hurricane-related domains, and malicious files di…
  continue reading
 
Thinking past the US 2024 Presidential Election, In part three of the series, Rick Howard, N2K CyberWire’s Chief Analyst and Senior Fellow, discusses reducing the impact of propaganda in the future elections with Perry Carpenter, Chief Human Risk Management Strategist at KnowBe4 and host of the 8th Layer Insights Podcast, Nina Jankowicz, Co-Founder…
  continue reading
 
Maria Varmazis, host of N2K's daily space show T-Minus, joins Dave and Joe to share the story of a South Carolina couple, and how they were devastated to discover their vacant land in Concord, Massachusetts was fraudulently sold by thieves who posed as them, with the new owners already building a home on the property, prompting a lawsuit and an FBI…
  continue reading
 
In preparation for the US 2024 Presidential Election, Rick Howard, N2K CyberWire’s Chief Analyst and Senior Fellow, discusses recent international propaganda efforts in the form of nation state interference and influence operations as well as domestic campaigns designed to split the target country into opposing camps. Guests include Nina Jankowicz,…
  continue reading
 
As part of the Retro21 Studios podcast series - Brand Storytelling, we present S2E6 - A Conversation with Andrew Lekashman, AI LLM/Infrastructure, Product Owner. Andrew is a technical product manager with expertise in AI, product management, and eCommerce. Proven ability to lead cross-functional teams, launch innovative products, and drive business…
  continue reading
 
The Lighthouse IT Podcast - October 4th, 2024 This week, Matt and Griff discuss the discovery that Meta has been scraping public posts on Facebook and Instagram since 2007 and using that data to train their AI models. TikTok is hoping to avoid a ban in the U.S. without selling themselves and has taken their plight to the U.S. Court of Appeals. Addi…
  continue reading
 
Rick Howard, N2K CyberWire’s Chief Analyst and Senior Fellow, discusses personal defensive measures that an average citizen, regardless of political philosophy, can take in order to not succumb to propaganda. References: David Ehl, 2024. Why Meta is now banning Russian propaganda [News]. Deutsche Welle. Jeff Berman, Renée DiResta, 2023. Disinformat…
  continue reading
 
Welcome, witches, wizards, and cybersecurity sleuths! You’ve entered, Only Malware in the Building. Join us each month to brew potions of knowledge and crack the curses of today’s most intriguing cyber mysteries. Your host is Selena Larson, Proofpoint intelligence analyst and host of their podcast DISCARDED. Inspired by the residents of a building …
  continue reading
 
In this episode, I discussed the recent gap in our podcast and what lies ahead for us after finishing CCSP. In the next episode, I will cover Understanding the Implications of the Cloud to Enterprise Risk Management, and Understand Outsourcing and Cloud Contract Design. Twitter (X) - @dev_lops Support this podcast at — https://redcircle.com/get-cer…
  continue reading
 
It's all in the details, folks. Pay attention to those and you can avoid unnecessary stress. Dave Bittner, Maria Varmazis, and Joe Carrigan swap stories on email password-stealing attacks, Google ads scams, and fake banks this week. The team shares follow up from listener Steven from the UK about the hazards of shoulder surfing when they received t…
  continue reading
 
Loading …

Quick Reference Guide