In the security industry, it's easy to get overwhelmed by the constant barrage of information and buzzy trends. On Security Noise, we help you sort through the noise and identify the trends that truly matter. Listen to hear from practitioners in the field who are using the latest tools and methodologies to stay ahead. Whether you're a seasoned security pro or an industry newcomer, our podcast has something for anyone in the business of making the world secure. Presented by TrustedSec, end-to ...
…
continue reading
We make the topic of privacy approachable. For both businesses and consumers. With so much of our lives taking place online today, it's easy to overlook the dangers associated with sharing your personal data with companies and strangers. Many people are aware that privacy is a problem but they don't know where to begin. Privacy Files explains the vast array of privacy issues facing society in easy-to-understand language. Then we give you practical solutions to quickly and effortlessly make t ...
…
continue reading
Official Website: https://lockdown.media Welcome to The Lockdown. Privacy doesn’t have to be all-or-nothing. The inability to attain extreme levels of privacy shouldn’t deter one from taking any protective measures at all. The show is hosted by Ray Heffer, an expert in the field of privacy and cybersecurity, with each episode touching on a range of topics such as data privacy, password management, and secure browsing habits. Tin-foil hats are optional. Follow the show on Twitter @privacypod
…
continue reading
Here at Cyber Sector 7 our main goal is to Inform you and give you Security Tips, Digital Privacy Tips, OSINT Methods, and to teach you about hacker methods, culture, and news. We want to inform you of how important security and privacy is. This is for everyone, even if you know nothing about computers, we want you to stay informed.
…
continue reading
Tune in as our hosts answer questions from small business leaders! We will discuss real-world Information Security challenges faced by our callers and offer relevant advice and guidance.
…
continue reading
A skilled individual can effortlessly blend into any environment without drawing attention, effectively hiding their true capabilities and intentions. They seamlessly mingle, remain unmemorable, and forge relationships to gather vital information for their objectives. Every move they make is calculated and intended to keep them inconspicuous. Originating from espionage, the term "gray man" refers to incorporating spy tradecraft into one's daily life. This involves honing skills essential for ...
…
continue reading
On this show, we have talked quite a bit about the red hot cybersecurity industry. Companies can't fill open positions fast enough. Globally, cybersecurity spending exceeds $200 billion. But there's a small problem. You might call it a cybersecurity paradox. Despite companies spending more than ever on cybersecurity, companies are also losing data …
…
continue reading
The rapid rise of artificial intelligence (AI) is bringing great promise to the world in the form of increased productivity and a better quality of life. However, as with any new technology, there are people who look to leverage it for nefarious purposes. Deepfakes are seemingly everywhere now. And while some are being used for humor or general ent…
…
continue reading
1
6.18 - Careers in InfoSec: Where do you want to go today?
42:35
42:35
Play later
Play later
Lists
Like
Liked
42:35
Security Noise starts a multi episode look at how to start or grow a career in infoSec. We begin by talking with Senior Security Consultant Kelsey Segrue and Security Consultant Olivia Cate who took what might be considered the traditional route. They share their stories and offer some insights into how to maximize the advantage of similar opportun…
…
continue reading
Web3, or Web 3.0, is a new vision for the World Wide Web where the user is in control. While Web3 has been called many things, there's no doubt that its architecture enables for the democratization of the web. The key concepts of Web3 include decentralization, blockchain technologies and token-based economies. While the pervasiveness of fraud in cr…
…
continue reading
With large data breaches making headline news nearly every week, cybersecurity is a hot topic. Recently, AT&T discovered the personal information of more than 70 million current and former customers being sold on the Dark Web. Compounding this is the fact that it takes on average nearly seven months for a corporate security and compliance team to e…
…
continue reading
On this episode of Security Noise, we are revisiting the topic of open-source intelligence (OSINT) in the wake of the theories spurred by the Royal Family's social media photo that was quickly flagged as being altered. Along with guests, Senior Security Consultants Joe Sullivan and David Boyd, we delve into various theories surrounding the Princess…
…
continue reading
According to a recent study at the University of Texas at Austin, from January 2020 to February 2024, people lost more than $75 billion around the world to the scam of pig butchering. Named after the practice of farmers fattening hogs before slaughter, victims are lured into fake crypto investments. Once victims send enough funds, the scammers disa…
…
continue reading
In 2023, Americans lost more than $10 billion to fraud. This is the largest annual loss in US history. In terms of dollars lost, investment scams emptied consumers' bank accounts more than any other scam at $4.6 billion. But a close second was imposter scams at $2.7 billion. In this episode of Privacy Files, we look at the tragic story of former Ne…
…
continue reading
The demand for cybersecurity professionals is strong. Job vacancies in the industry grew from one million in 2013 to 3.5 million in 2021. And because of this shortfall in talent, companies are struggling to keep up with the latest in modern threat awareness, including phishing, social engineering, Business Email Compromise (BEC), and financial frau…
…
continue reading
1
010 - Alternatives to Authy, SANS OSINT Summit, and Selling your Soul to CLEAR
37:07
37:07
Play later
Play later
Lists
Like
Liked
37:07
In this week's show, I discuss CLEAR's intrusive privacy policy and highlight alternatives to Authy using KeePass, with a privacy friendly solution for scanning QR codes. I also address the common mistakes people make when backing up their MFA codes. Additionally, I share some of the highlights from attending the SANS OSINT Summit in Washington, D.…
…
continue reading
In 2015, Dr. Robert Epstein, a psychologist at the American Institute for Behavioral Research and Technology, made world news. Dr. Epstein was one of the authors of a groundbreaking study that found that Google's search ranking algorithm could influence how people vote. Even more shocking, according to Dr. Epstein, "We estimate, based on win margin…
…
continue reading
We look into the release of the Open Source Intelligence (OSINT) strategy, a pivotal development now under the stewardship of the CIA. This strategy outlines a comprehensive approach, encompassing enhanced training, rigorous standardization, innovative collection methods, refined tradecraft, and robust intelligence sharing mechanisms, all aimed at …
…
continue reading
1
Credibility Check: Vetting Volunteer Sources
39:52
39:52
Play later
Play later
Lists
Like
Liked
39:52
The critical process of vetting volunteer sources, is a skill paramount for journalists, researchers, and anyone relying on external information. #Grayman #podcast We explore the powerful technique of using repeat and control questions, a method designed to establish the reliability of a source and the accuracy of their information. Learn how askin…
…
continue reading
In 2023, it is estimated that $3.1 trillion in illicit funds moved through the global financial system. Financial crimes can take many forms. Money laundering accounted for trillions of dollars supporting a wide range of crimes, including $346.7 billion in human trafficking, $782.9 billion in drug trafficking activity, and $11.5 billion in terroris…
…
continue reading
1
009 - Data Broker Sites and a Conversation with Lawrence Gentilello from Optery
53:55
53:55
Play later
Play later
Lists
Like
Liked
53:55
In today's show, I have a conversation with Lawrence Gentellio, the CEO and Founder of Optery, a personal data removal service. Lawrence shares his own experiences with identity theft and what motivated him to start Optery. We also discuss the future of privacy in the United States, Utah's new privacy law, the Utah Consumer Privacy Act (UCPA), and …
…
continue reading
1
6.16 - Leak Week: Plumbing the Depths of Privacy Pitfalls
41:24
41:24
Play later
Play later
Lists
Like
Liked
41:24
It's Leak Week for this episode of Security Noise! Geoff and Skyler chat with Security Consultant Whitney Phillips and Senior Security Consultant Kurt Muhl about a number of recent privacy pitfalls including destructive ransomware groups such as LockBit, leaked government emails, and other data and privacy mishaps. References: https://krebsonsecuri…
…
continue reading
1
Safe Passage: Essentials for a Trouble-Free Vacation
25:04
25:04
Play later
Play later
Lists
Like
Liked
25:04
Whether you're a seasoned traveler or planning your first European adventure, this episode arms you with essential knowledge and best practices to ensure a secure and enjoyable trip. #podcast #grayman We'll discuss what you need to know about choosing and staying in hotels, from checking in to safeguarding your belongings. Understand the intricacie…
…
continue reading
According to the Federal Trade Commission (FTC) in the United States, consumers reported losing more than $10 billion to fraud in 2023. This is a 14% increase over reported losses in 2022. Some of the most common scams include investment scams, imposter scams, bank transfer scams and cryptocurrency scams. "Digital tools are making it easier than ev…
…
continue reading
The rise of remote work has led to the rise of a wild phenomenon: the overemployed. While it is difficult to know exactly how many people juggle multiple full-time jobs simultaneously, it is evident the trend is more common than most realize. 79% of remote workers say they have been overemployed within the past year In fact, on Reddit, there is a s…
…
continue reading
1
6.15 - OSINT: Digital Detective or Cyber Stalking?
29:45
29:45
Play later
Play later
Lists
Like
Liked
29:45
Skyler and Geoff chat with Senior Security Consultant Joe Sullivan about using open-source intelligence (OSINT) for gathering ideas and information. We discuss some of the ethical questions about what you can do with what you learn.
…
continue reading
1
What small business owners should know about Artificial Intelligence (AI) tools
50:17
50:17
Play later
Play later
Lists
Like
Liked
50:17
The Mindful Business Security Show is a call-in radio style podcast for small business leaders. In this episode, Accidental CISO is accompanied by guest host Brent Hinks. Brent is a longtime industry veteran. He's worked in a wide range of roles and industry verticals. For the last six years, he's been focused helping organization's implement AI se…
…
continue reading
1
Valor and Vision: Inspired Motivation for Everyday Heroes
32:28
32:28
Play later
Play later
Lists
Like
Liked
32:28
We explore the impact of wisdom and motivational statements on personal and professional development.#Grayman #podcast Drawing upon lessons learned from the discipline, leadership, courage, and teamwork inherent in military service, this episode offers listeners a series of powerful, motivational insights designed to inspire resilience, determinati…
…
continue reading
1
008 - Anonymity with TOR, Data Removals, and Mozilla Monitor
23:15
23:15
Play later
Play later
Lists
Like
Liked
23:15
In this weeks show I discuss some of the concerns of using TOR over a VPN, and take another look at data removal from people search sites, including a look at Mozilla Monitor, a new service for data removal from the makers of Firefox. I'll also discuss the importance of freezing your credit and putting the title of your home into a revocable living…
…
continue reading
1
How To Sharpen Your Situational Awareness Skills
23:23
23:23
Play later
Play later
Lists
Like
Liked
23:23
We explore the world of situational awareness through the lens of fun and educational games and exercises suitable for both kids and adults. #Grayman #podcast Discover how turning awareness training into interactive play enhances your ability to notice details about your surroundings and improve reaction times, decision-making skills, and overall s…
…
continue reading
Did the #NSA buy personal data illegally obtained from smartphone users? #Grayman #podcast Discover The Latest In Grayman Gear🔥🛍️ http://tinyurl.com/Grayman-Store Contact Us 🎙️ Send a voice message to be featured on the show! Email iamshammer@protonmail.com Facebook https://www.facebook.com/graymanconcepts Twitter/X https://twitter.com/GraymanConc…
…
continue reading
1
Truths Untold: Revisiting My Moments of Misdirection
24:24
24:24
Play later
Play later
Lists
Like
Liked
24:24
We take a moment to pause and reflect on the instances where I may have led our listeners astray, whether through willful omission, unintentional misinformation, or the subtle art of misleading. #Grayman #podcast #lying This episode isn't just about admitting faults but understanding the why behind each moment. Was it to protect privacy, simplify c…
…
continue reading
Modern organizations face continuous threats from bad actors that put systems, data and people at great risk. This is why it's critical for companies to adopt solid cyber governance strategies. Cyber governance, or cybersecurity governance, is a holistic approach to mitigating business risks. Via risk management and security awareness, companies de…
…
continue reading
1
Maximizing Privacy with Smart Cellphone Use
36:22
36:22
Play later
Play later
Lists
Like
Liked
36:22
The essential steps and strategies to safeguard your mobile device from the vulnerabilities exposed by public #WiFi and data networks. #Grayman #podcast #security Discover how to adjust your phone's settings for maximum privacy and why minimizing the use of public networks can be a crucial step toward digital security. We'll also explore the concep…
…
continue reading
If you have ever spent some time on dating apps, you most likely have encountered fake profiles. And with recent improvements in AI, there's a good chance some of those fake profiles aren't even using pictures of real people. According to the Federal Trade Commission (FTC), in 2022, nearly 70,000 people reported some form of a romance scam, with to…
…
continue reading
1
6.14 - Extraordinary Incident Responders and Where to Find Them
35:40
35:40
Play later
Play later
Lists
Like
Liked
35:40
Geoff and Skyler talk to Incident Response Practice Lead Tyler Hudak about when you need an IR plan, what kind of relationships you should have with your IR vendor, and what things to know before perusing an IR retainer. The conversation looks at the needs for businesses of various sizes, proposes some self-assessment questions, and concludes with …
…
continue reading
In this Friday Field Notes episode of The Lockdown, I share my experience with imposter syndrome, and compare practical privacy approaches with extreme measures, inspired by my move to the USA. Follow on Twitter (X): @privacypod Support the show: https://www.patreon.com/TheLockdown This episode was recorded on January 31, 2024 In this week's episod…
…
continue reading
1
007 - Defensive OSINT, Privacy on the Road, More Aliases, and Face Morphing
52:12
52:12
Play later
Play later
Lists
Like
Liked
52:12
This week, I introduce Defensive OSINT, address privacy concerns while on the road, and examine the intricacies of alias usage and AI-based face morphing for photo alteration. Sharing insights from my recent travels, I highlight the need for vigilance and innovative strategies for maintaining privacy on the go. The episode explores the pros and con…
…
continue reading
1
Living Secure: Navigating Safely in Shared Spaces
36:53
36:53
Play later
Play later
Lists
Like
Liked
36:53
Crucial aspects of security and #safety in apartment buildings. We discuss what residents should be vigilant about, including potential #security lapses in common areas, and assessing the security measures of a building before moving in The episode provides tips on dealing with neighbors, understanding security personnel and building employees, man…
…
continue reading
Whether it's at work or at home, everything we do online is based on permissions. If you have the proper credentials, you can obtain access. When permissions management breaks down or a threat actor manages to gain unauthorized access, the situation can deteriorate very quickly. In this episode of Privacy Files, we talk to Jake Moshenko. Jake is an…
…
continue reading
1
Epstein & The CIA: The Story of a Celebrity Spy
28:42
28:42
Play later
Play later
Lists
Like
Liked
28:42
We challenge and dissect the question, “Was Jeffery #Epstein working for the #CIA?” The enigmatic stories of famous individuals and celebrities who were entangled in the clandestine world of espionage will always captivate the public. While Epstein met their demise in prison under mysterious and controversial circumstances, leaving behind a trail o…
…
continue reading
1
Show update - Some exciting new things are coming!
3:45
3:45
Play later
Play later
Lists
Like
Liked
3:45
The Mindful Business Security Show is a call-in radio style podcast for small business leaders. Join our hosts as they take questions from business leaders like you! In this episode, Accidental CISO is flying solo and providing some updates about changes coming to the show. We'll be releasing some security awareness training content soon and updati…
…
continue reading
1
Is Seeing Believing? Debunking Myths in Lie Detection
19:53
19:53
Play later
Play later
Lists
Like
Liked
19:53
We challenge and dissect several widely held beliefs about lying and deception that are scientifically inaccurate. This show aims to enlighten listeners on the realities of detecting deceit, moving beyond popular misconceptions. Do liars avoid eye contact? Can a nervous twitch reveal dishonesty? Is there a foolproof way to spot a liar? We confront …
…
continue reading
In this episode of Privacy Files, we talk to Cindy Cohn, an American civil liberties attorney and the Executive Director of the Electronic Frontier Foundation (EFF). In 2018, Forbes named Cindy one of America's Top 50 Women in Tech. Cindy's passion for internet law spans decades and has put her in the middle of landmark legal cases involving privac…
…
continue reading
1
The Doggy Bag Diaries: Essential Get-Home Gear for You and Your Pup
29:58
29:58
Play later
Play later
Lists
Like
Liked
29:58
In this unique episode we explore the concept of the get-home bag, tailored specifically for single individuals with canine companions.Our journey begins with an in-depth look at the 'get-home bag' – an essential kit designed to help you and your furry friend safely navigate unexpected emergencies or situations where you're away from home and need …
…
continue reading
Geoff and Skyler make bold predictions for 2024 about AI, changes to Air Tags, and Open Source! LINKS: https://techcrunch.com/2024/01/04/orrick-law-firm-data-breach/ https://arstechnica.com/security/2023/12/researchers-come-up-with-better-idea-to-prevent-airtag-stalking/ https://www.theregister.com/2023/12/27/bruce_perens_post_open/…
…
continue reading
Happy New Year! In this first Privacy Files episode of 2024, we kick off a new true crime series...with a privacy angle. We examine the disturbing crime of cyber kidnapping. According to the FBI, scammers have been perpetrating variations of cyber kidnapping for at least 20 years. Sometimes called "virtual kidnapping," cyber kidnapping is an extort…
…
continue reading
1
006 - When you Lose your Phone, Nextcloud, and Backups with Restic and Backblaze B2
42:26
42:26
Play later
Play later
Lists
Like
Liked
42:26
In this week's episode, it's time to wrap up 2023 with another look at Privacy.com, and my strategies for avoiding bank account lockout. I delve into the CIA Triad, breaking down its relevance to everyday privacy concerns. The episode also takes a practical turn with a guide on using FindMyDevice on GrapheneOS, and the FindMyDevice feature on the G…
…
continue reading
1
Area Study Blueprint: Mastering the Art of Research for the Grayman
40:21
40:21
Play later
Play later
Lists
Like
Liked
40:21
In this episode of The Grayman Concept, we delve into the critical process of structuring an area study, an essential skill for anyone looking to blend seamlessly into any environment and to deepen their understanding of world affairs.We kick off by discussing the methodology I personally used to initiate my research, providing listeners with a pra…
…
continue reading
How close are #surveillance and #AI platforms to predicting the behaviors and actions of criminals, terrorists, and the rest of us? In this #Grayman #podcast we discuss the current and future capability of government-controlled technology.In This Episodehttps://www.imdb.com/title/tt1839578/plotsummary/Discover The Latest In Grayman Gear🔥🛍️http://ti…
…
continue reading
1
"It's the end of the world and we know it...."
55:18
55:18
Play later
Play later
Lists
Like
Liked
55:18
What do the wars in #Israel and #Ukraine have to do with #recession here in America? What financial move is keeping the U.S. out of recession? We discuss season 5, The #Grayman Project and upcoming improvements to the #podcast Discover The Latest In Grayman Gear🔥🛍️ http://tinyurl.com/Grayman-Store Contact Us 🎙️ Send a voice message to be featured …
…
continue reading
Quick Note: This is the last episode of 2023. We will be back the second week of January 2024 with exciting new changes and many more fascinating guests. Thank you to everyone who has supported Privacy Files over the past year. You have given us encouragement to continue our mission to help the world take back control over its personal information.…
…
continue reading
The concept of #IoT dates back to the 1980s and 1990s, with the first internet-connected toaster created in 1990. We discuss the #cybersecurity threat, infrastructure, protection measures, and the future of IOT integration with #5G and #AI #Grayman #podcast Discover The Latest In Grayman Gear🔥🛍️ http://tinyurl.com/Grayman-Store Contact Us 🎙️ Send a…
…
continue reading
We discuss rapport building that may be malicious. An introduction to Micro Expressions and Macro Expressions. The Recent arrest of a #USAF Airmen for violating the #Espionageact #Grayman #podcast https://www.militarytimes.com/news/your-military/2023/12/11/15-air-national-guardsmen-disciplined-in-discord-server-leak/Discover The Latest In Grayman G…
…
continue reading