Hacks Hackers Bs As public
[search 0]
More
Download the App!
show episodes
 
Avoiding hackers. Easy? With our podcast it can be. Stay in the know on cybersecurity tips, tools, and more in the Secure AF Cyber Security Podcast. Join our hosts, Donovan Farrow and Jonathan Kimmitt, as they cover all things cybersecurity with Alias and outside guests. No matter where you are in your cybersecurity expertise, there’s an episode here for you. The views, information, or opinions expressed during this podcast are solely those of the individuals involved and do not necessarily ...
  continue reading
 
Join Freedom Hacker, creator of The Truthiversity, and acclaimed author of 'The Grand Illusion' books as he cuts through the B.S. to get to the truth - whatever it may be. Brendan and his guests uncover the mysteries of consciousness, geopolitics, health, cosmology, medicine, freedom, personal development, exopolitics, the paranormal, and more. No dogmas. No holds barred. Nothing off limits. You'll need an open mind and your grown-up pants. Find out more about Brendan: https://brendandmurphy ...
  continue reading
 
Loading …
show series
 
Alias CEO Donovan Farrow and Business Development Coordinator Trey Allen talk the tips and tricks of the vishing trade. They're gearing up for the DEFCON social engineering village. Listen or watch to hear their tales and experiences to learn how they're going to bring the heat to Las Vegas. Watch the full video at youtube.com/@aliascybersecurity. …
  continue reading
 
Bryan Filice of Trap Technologies joins Keelan Knox to talk about the current threat landscape and why security has to involve every system, host, and employee. Watch the full video at youtube.com/@aliascybersecurity. Catch the whole episode now at https://bit.ly/47eYPTK Listen on Apple Podcasts, Spotify and anywhere you get you're podcasts.…
  continue reading
 
Ever wonder what your CISO (or CIO or anyone in IT security management) may be thinking? Are you’re the one in that position having those thoughts? Join Jonathan Kimmitt as he describes all the things CISOs wish they say but don't…and why and when they should. Watch the full video at youtube.com/@aliascybersecurity. Catch the whole episode now at h…
  continue reading
 
Heard about the recent revelation of the Boeing breach? Join Alias CEO Donovan Farrow on the SecureAF Podcast as he lays out what we know, what we don't, what this means, and what we hope to learn to better protect our companies and communities, locally and nationally. Watch the full video at youtube.com/@aliascybersecurity. Catch the whole episode…
  continue reading
 
AI is all the rage. Or AI having rage is the bigger fear. Doesn't matter where you go, it's a topic of attention. The potential uses and abuses are touted on every news station and from every pundit, whether proponent or naysayer. But what's true? Especially in the realm of cybersecurity? Our engineers have on-the-ground knowledge of AI's capabilit…
  continue reading
 
Leading health educator and author Daniel Roytas joins Brendan to discuss his journey from being a naturopath and nutritionist to quitting his job as a lecturer and swinging a wrecking ball through established health dogma. Daniel elucidates the mistakes made in the mainstream health/disease maintenance paradigm, problems with disease labels, the s…
  continue reading
 
Seriously, do you know where your data is? It’s an often overlooked question in cybersecurity. In the case of an incident, without knowing where your data is, how do you know what’s been accessed? Where else that data might be? What’s needed to remediate? And what’s less crucial to restore? But even before an incident, how do you know what to prote…
  continue reading
 
What good is a Pen Test? There are a host of answers - knowing your environment, identifying dangers, implementing remediations, meeting compliance. But how should a CISO view a Pen Test given their unique role in the organization? How do they best understand the need, the conduct, the reporting, and the follow through? On this episode of the Secur…
  continue reading
 
Dr. Sam Osmanagic has opened a whole new chapter in the World of archaeology. In contrast to the archaeologists at the other sites, he uses an interdisciplinary scientific approach and has demonstrated that the oldest and best pyramids served as energy amplifiers rather than being constructed as tombs. As a result, this energy was used as a communi…
  continue reading
 
Alias stays at the cutting edge of the cybersecurity threat frontier. Today on the SecureAF Podcast, Donovan Farrow and Tanner Shinn discuss a 2023 retrospective with a view to how last year helps us understand and prepare for 2024. Listen, learn, be prepared. We're here to support you, 24/7/365. Watch the full video at youtube.com/@aliascybersecur…
  continue reading
 
Join me for a shocking insider expose of what goes on behind the scenes at pharma juggernauts like Pfizer - as well as alternative media outlets like Project Veritas (and James O'Keefe's dubious connections and behaviour). Scientist and journalist Justin Leslie is the producer of the film "Project Whistleblower." He worked directly on the COVID-19 …
  continue reading
 
Cybersecurity is critical to an organization. But cybersecurity is only part of a robust security posture. It’s equally important, and in fact of first importance, to assess information security. You need to assess what privacy guidelines, compliance, and best practices entail what data you can have so you can determine the security needed to keep …
  continue reading
 
Scheduling a cybersecurity engagement can be stressful, for client and pentester alike. Both want the same thing - a well conducted, accurate assessment of the client infrastructure to provide the best value add to bolster cybersecurity. It helps to start from a shared set of standard expectations and practices. On this episode of the SecureAF Podc…
  continue reading
 
wWhat's the Final Frontier? For Trekkies, it's space. For cybersecurity, it's Critical Infrastructure. Might not sound exciting, but the risks from poor security and the rewards of strong controls might get you to sit up and take notice. Maybe even motivate you to boldly go where no ethical hacker has gone before. On this episode of the SecureAF Po…
  continue reading
 
Wondering what the best path into cybersecurity is? Here's a hint: There's not one answer. On this episode of the SecureAF Podcast, Tanner Shinn and Keelan Knox share very different stories of getting into the field. Even with different paths, they'll share what they have in common and what you should think about and do if you want to become an eth…
  continue reading
 
You may have heard of Penetration Tests. You may know you need one. You may have had one or more. But do you know there's more than one type? More than one take? More than one test? On this episode of the SecureAF Podcast, Alias Principal Security Engineer Tanner Shinn and CISO Jonathan Kimmitt discuss the types of Pen Tests, how they're conducted,…
  continue reading
 
There has been a lot of news about the alleged incident experienced by Integris. Some of you may have even received emails from the threat actors revealing personal information to solicit money. This is not the first attack to leverage the threat of leaked data for monetary reward. It is among the first for the threat actors to directly appeal to t…
  continue reading
 
A (mostly) lighthearted look at the year gone by with a sprinkling of harsh truths and a dash of basic wisdom thrown in, in signature BDM fashion. We also unveil the (ultra-low-budget) inaugural TRUTHIVERSE award ceremony. Who will the winners of kudos and ignominy be? And what's in the offing for 2024? Tune in and find out. ⚠️ GET EVERYTHING: Beco…
  continue reading
 
You know you need regular penetration tests to ensure your network is secure. You know the steps to remediate the findings and take the recommended actions to continue on a path toward cybersecurity. But what about what you don't know? What about what the penetration test doesn't cover or doesn't reveal? On this episode of the SecureAF Podcast, Ali…
  continue reading
 
The Solar Winds breach is not news. The CISO being personally named in the investigation is. Although not the first CISO to be so identified, this is the most high profile. This raises questions for the future of CISO role and responsibility and IT more generally. Should an individual be held responsible for an incident? What is their responsibilit…
  continue reading
 
David Whitehead joins Brendan to discuss the hidden networks of globalist power that seek to retain control over the masses from behind the scenes (mostly). Who are the would-be powers ruling the world? What circles do they move in? What are the nexus points between these shadowy networks and visible geopolitical activity and known figureheads? Dav…
  continue reading
 
If you follow our socials, you know Phillip Wylie recently joined the Alias crew! We’re excited to welcome him to help us build our team’s presence supporting organizations’ and individuals’ growth in cybermaturity. Join Alias CISO Jonathan Kimmitt to hear his story of getting into cybersecurity, what’s brought him to Alias, and what's to come. Wat…
  continue reading
 
Is it possible for people to share a loved one's experience of dying? Co-authors Paul Perry and Raymond Moody ("Life After Life") believe so, based on extensive research into the subject, distilled into their new book PROOF OF LIFE AFTER LIFE: 7 REASONS TO BELIEVE THERE IS AN AFTERLIFE. They joined me to discuss their multiple decades of research i…
  continue reading
 
Sam Higgins had her life turned upside down when she suddenly started hearing voices back in 2007. While this brought elements of confusion, chaos, and intensity into her already interesting life, instead of simply trying to drug them into silence Sam got really curious about the voices and gradually worked on integrating them into her life. Instea…
  continue reading
 
It requires technical expertise to respond to a breach. It requires thinking like a hacker to know where to go, what to do, and what level of response is appropriate. It requires the human element. But humans aren't machines. Your staff and any outside experts require basic needs to be met: food, shelter (well, at least sleep), probably a lot of ca…
  continue reading
 
Journalist Joachim Hagopian returns to dissect the Israel-Hamas narrative that exploded in the media in recent days, starting October 7th, and see what we're NOT being told about it. We ask some fundamental questions such as, "How could Israel's defence forces have possibly been caught unaware of the Hamas incursion?", and "Who benefits?" Even Isra…
  continue reading
 
Co-hosts of the popular 'Are You Here for the Truth' podcast Joel & Yerasimos join Brendan to talk conscious personal evolution and aligning with your authentic self in spite of the Crowd and all the conditioning and programming that leads us away from our individuality. They discuss: The hero's journey and individualism Repression and armouring Wh…
  continue reading
 
Did you know some ransomware groups have customer support better than major businesses? That the negotiations might feel more like a regular corporate transaction than a back-alley holdup? On this episode of the SecureAF Podcast, CEO Donovan Farrow and Security Team Lead Tanner Shinn share their experience working the business side of an Incident R…
  continue reading
 
Extreme human antiquity? Forbidden archeologist and author Michael Cremo joins Brendan to discuss his decades-long and detailed research into the question: how old is humanity REALLY? Michael is an expert in the field of suppressed and ignored history, particularly as it pertains to the origins of humankind. Influenced by a long-running interest in…
  continue reading
 
You know you may be a target. But what about your family? How could a hacker leverage those closest to you to gain advanced access to your work? Recently on the And Security For All podcast, Alias CISO Jonathan Kimmitt and Security Team Lead Tanner Shinn discussed this question. You can listen to their conversation here. On this episode of the Secu…
  continue reading
 
Intrepid independent scholar Ralph Ellis joins Truthiverse again to continue his analysis of key Biblical characters and events, this time the most important one of all: the "Jesus" character. Ralph discusses his extensive research into Edessa and the ancient Edessan monarchy and King Izas Manu, likely the primary historical figure upon whom the Je…
  continue reading
 
What were the lessons from Defcon 31? What were the most noteworthy experiences of the conference (Hint: it's not all about the talks and villages). On this episode of the SecureAF Podcast, join Alias Security Team Lead Tanner Shinn and Security Engineer Keelan Knox to hear what they learned and what went down this year at Defcon. Watch the full vi…
  continue reading
 
Champion competitive sculptor and ancient history researcher Rob Neyland (FreetheLioness.com) joins me to discuss his fascinating and ground-breaking research into the true nature and history of the famous Egyptian Sphinx. Rob is known for using his advanced skills as a sculptor to create a stunning miniature "re-carving" of the Sphinx with a very …
  continue reading
 
Headed to DEF CON? Want to know what you should know and where you should be? And most importantly, how to survive? On this episode of the SecureAF Podcast, host Donovan Farrow and guest Tanner Shinn talk all thing DEF CON. New to DEF CON? Learn from us how to make the most of the experience. Returning to DEF CON? Remember best talks and best place…
  continue reading
 
Digital forensics may be something you don't think about. Or think about only after an incident or breach. But knowing what techniques and tools are used will help equip you to understand your potential vulnerabilities and strengthen your security posture. And you'll gain more insight into the work an Incident Response team does. In this episode of…
  continue reading
 
Historian and Electric Universe researcher Troy McLachlan joins Brendan to discuss: Why Saturn was once the primary god Catastrophic celestial events witnessed by ancient cultures around the world The true origins of major world religions What the “eye of god” REALLY was Giza’s pyramids’ connection to Saturn The crucial importance of electricity in…
  continue reading
 
A great deal of hype surrounds certain information circulating about people who received the C19 jabs and what is being found in their blood - along with the blood of the UN-jabbed. As usual it is the most sensationalist and least helpful information (and fear-mongering) that seems to get the most attention in medicine and life in general. Nothing …
  continue reading
 
The SecureAF Podcast is 50! Listen this week as our hosts discuss a critical topic in cybersecurity. Your environment may be unique. Your business may feel to small to be noticed. But to a hacker, everyone is a target of opportunity, and every target may yield to the same avenues of attack. On this episode of the SecureAF Podcast, Alias CEO Donovan…
  continue reading
 
Independent scholar and autodidact Joseph Atwill joins us for a compelling and shocking discussion of his research findings into KEY ideas, characters, and events in the Bible. Once a Christian believer himself, a young Atwill became a voracious reader and began a detailed inquiry into a realm of Biblical scholarship that featured a glaring - and a…
  continue reading
 
Want to become a Pentester rather than a Thintester? Want to find out what a Thintester even means? In this episode of the SecureAF Podcast, Alias CEO Donovan Farrow and CISO Jonathan Kimmitt discuss one of our often-asked questions: What do I need to do to become a Pentester? They'll talk about what qualities and experiences prepare you for the ro…
  continue reading
 
Alobar Jones has a diverse psychic toolkit and probably over 20,000 hours of meditation behind him, including many thousands of hours of astral travel. He's also a professional exorcist who uses a new paradigm for Successful Mental Health treatment. His approach to removing demons and other entities from someone - without relying on religious dogma…
  continue reading
 
SecureAF host Donovan Farrow shares news about transitions with the SecureAF Podcast and exciting announcements about what else is coming for the Alias podcast lineup. Watch the full video at youtube.com/@aliascybersecurity. Catch the whole episode now at https://bit.ly/47eYPTK Listen on Apple Podcasts, Spotify and anywhere you get you're podcasts.…
  continue reading
 
If you have questions regarding your health…the answers are in the blood. The Bigelsen name looms large over the field of blood analysis, and well it should. Adam and Josh Bigelsen are the sons of Dr. Harvey Bigelsen who was a pioneer in the world of holistic medicine, and author of the groundbreaking books, 'Holographic Blood' and 'Doctors are Mor…
  continue reading
 
The Internet of Things (IoT) and connection Operational Technology (OT) devices has opened up possibilities for extending interconnectivity and creating means of more immediate controls on crucial systems and everyday devices. These open opportunities for hackers to exploit their connections and leverage access for malicious and destructive ends. O…
  continue reading
 
Building a cybersecurity career is a two-way street. There are the questions for those who do the hiring and those who are being hired - they're the same set of questions - What should and do employers look for? What education or certifications are needed? How do employers find and attract good talent? In this episode of the SecureAF Podcast, Chad …
  continue reading
 
Amandha Vollmer is naturopathically trained (and blacklisted) holistic healer and educator who joins me to discuss a number of juicy topics, including the allopathic takeover of naturopathy and destruction of education. She explains how to came to leave naturopathy behind and expand her remit, designing her own remedies, learning from clients and h…
  continue reading
 
Back the blue. Don’t start a fight; always finish one. Hold the door. Yes, ma’m. Don’t mess with Texas. From serious to seemingly frivolous, we’re steeped in ways to think, act, and believe. What if those are all expressions of a “code” that social engineers can use to leverage better exploits? On this episode of the SecureAF Podcast, Alias Cyberse…
  continue reading
 
Author and researcher Demi Pietchell joins me to unpack the vortex of intrigue that is the world and mind of Elon Musk - including recent dramas involving Twitter and Substack. In her view, 'Musk is not trying to “free the public square.” He's potentially attempting to control it because there are other goals he has that would require him to have c…
  continue reading
 
How do you work with vendors to ensure they are meeting your requirements for regulatory compliance? In this episode of the SecureAF Podcast, Alias CISO Jonathan Kimmitt will share his experience and expert tips on how to work with vendors to ensure a secure partnership. Watch the full video at youtube.com/@aliascybersecurity. Catch the whole episo…
  continue reading
 
It's now common knowledge that the global food supply chain has been under attack and intentionally undermined in order for the globalists to create food shortages, poverty, and civil chaos to further their agenda. The full impact of the convid manipulations and the supply chain disruptions is yet to be fully felt, so it's not too late to start ada…
  continue reading
 
Loading …

Quick Reference Guide