Avoiding hackers. Easy? With our podcast it can be. Stay in the know on cybersecurity tips, tools, and more in the Secure AF Cyber Security Podcast. Join our hosts, Donovan Farrow and Jonathan Kimmitt, as they cover all things cybersecurity with Alias and outside guests. No matter where you are in your cybersecurity expertise, there’s an episode here for you. The views, information, or opinions expressed during this podcast are solely those of the individuals involved and do not necessarily ...
…
continue reading
Podcast about technology applied to journalism. If you are a journalist, designer, or developer , listen to this.
…
continue reading
Join Freedom Hacker, creator of The Truthiversity, and acclaimed author of 'The Grand Illusion' books as he cuts through the B.S. to get to the truth - whatever it may be. Brendan and his guests uncover the mysteries of consciousness, geopolitics, health, cosmology, medicine, freedom, personal development, exopolitics, the paranormal, and more. No dogmas. No holds barred. Nothing off limits. You'll need an open mind and your grown-up pants. Find out more about Brendan: https://brendandmurphy ...
…
continue reading
Alias CEO Donovan Farrow and Business Development Coordinator Trey Allen talk the tips and tricks of the vishing trade. They're gearing up for the DEFCON social engineering village. Listen or watch to hear their tales and experiences to learn how they're going to bring the heat to Las Vegas. Watch the full video at youtube.com/@aliascybersecurity. …
…
continue reading
Bryan Filice of Trap Technologies joins Keelan Knox to talk about the current threat landscape and why security has to involve every system, host, and employee. Watch the full video at youtube.com/@aliascybersecurity. Catch the whole episode now at https://bit.ly/47eYPTK Listen on Apple Podcasts, Spotify and anywhere you get you're podcasts.…
…
continue reading
Ever wonder what your CISO (or CIO or anyone in IT security management) may be thinking? Are you’re the one in that position having those thoughts? Join Jonathan Kimmitt as he describes all the things CISOs wish they say but don't…and why and when they should. Watch the full video at youtube.com/@aliascybersecurity. Catch the whole episode now at h…
…
continue reading
Heard about the recent revelation of the Boeing breach? Join Alias CEO Donovan Farrow on the SecureAF Podcast as he lays out what we know, what we don't, what this means, and what we hope to learn to better protect our companies and communities, locally and nationally. Watch the full video at youtube.com/@aliascybersecurity. Catch the whole episode…
…
continue reading
AI is all the rage. Or AI having rage is the bigger fear. Doesn't matter where you go, it's a topic of attention. The potential uses and abuses are touted on every news station and from every pundit, whether proponent or naysayer. But what's true? Especially in the realm of cybersecurity? Our engineers have on-the-ground knowledge of AI's capabilit…
…
continue reading
1
Episode 77: The Return to Health Wisdom and Truth in Medicine With Daniel Roytas
1:32:40
1:32:40
Play later
Play later
Lists
Like
Liked
1:32:40
Leading health educator and author Daniel Roytas joins Brendan to discuss his journey from being a naturopath and nutritionist to quitting his job as a lecturer and swinging a wrecking ball through established health dogma. Daniel elucidates the mistakes made in the mainstream health/disease maintenance paradigm, problems with disease labels, the s…
…
continue reading
Seriously, do you know where your data is? It’s an often overlooked question in cybersecurity. In the case of an incident, without knowing where your data is, how do you know what’s been accessed? Where else that data might be? What’s needed to remediate? And what’s less crucial to restore? But even before an incident, how do you know what to prote…
…
continue reading
What good is a Pen Test? There are a host of answers - knowing your environment, identifying dangers, implementing remediations, meeting compliance. But how should a CISO view a Pen Test given their unique role in the organization? How do they best understand the need, the conduct, the reporting, and the follow through? On this episode of the Secur…
…
continue reading
1
Episode 76: Bosnian Pyramids and the New Earth That's Possible with Dr Sam Osmanagic
1:19:50
1:19:50
Play later
Play later
Lists
Like
Liked
1:19:50
Dr. Sam Osmanagic has opened a whole new chapter in the World of archaeology. In contrast to the archaeologists at the other sites, he uses an interdisciplinary scientific approach and has demonstrated that the oldest and best pyramids served as energy amplifiers rather than being constructed as tombs. As a result, this energy was used as a communi…
…
continue reading
1
Episode 66 - Are the Hackers Winning 2024 Edition
42:26
42:26
Play later
Play later
Lists
Like
Liked
42:26
Alias stays at the cutting edge of the cybersecurity threat frontier. Today on the SecureAF Podcast, Donovan Farrow and Tanner Shinn discuss a 2023 retrospective with a view to how last year helps us understand and prepare for 2024. Listen, learn, be prepared. We're here to support you, 24/7/365. Watch the full video at youtube.com/@aliascybersecur…
…
continue reading
1
Episode 75: Project Whistleblower: Inside Big Pharma & Alt Media with Justin Leslie
2:09:33
2:09:33
Play later
Play later
Lists
Like
Liked
2:09:33
Join me for a shocking insider expose of what goes on behind the scenes at pharma juggernauts like Pfizer - as well as alternative media outlets like Project Veritas (and James O'Keefe's dubious connections and behaviour). Scientist and journalist Justin Leslie is the producer of the film "Project Whistleblower." He worked directly on the COVID-19 …
…
continue reading
Cybersecurity is critical to an organization. But cybersecurity is only part of a robust security posture. It’s equally important, and in fact of first importance, to assess information security. You need to assess what privacy guidelines, compliance, and best practices entail what data you can have so you can determine the security needed to keep …
…
continue reading
Scheduling a cybersecurity engagement can be stressful, for client and pentester alike. Both want the same thing - a well conducted, accurate assessment of the client infrastructure to provide the best value add to bolster cybersecurity. It helps to start from a shared set of standard expectations and practices. On this episode of the SecureAF Podc…
…
continue reading
1
Episode 63 - Critial Infrastructure: The Final Frontier
39:40
39:40
Play later
Play later
Lists
Like
Liked
39:40
wWhat's the Final Frontier? For Trekkies, it's space. For cybersecurity, it's Critical Infrastructure. Might not sound exciting, but the risks from poor security and the rewards of strong controls might get you to sit up and take notice. Maybe even motivate you to boldly go where no ethical hacker has gone before. On this episode of the SecureAF Po…
…
continue reading
Wondering what the best path into cybersecurity is? Here's a hint: There's not one answer. On this episode of the SecureAF Podcast, Tanner Shinn and Keelan Knox share very different stories of getting into the field. Even with different paths, they'll share what they have in common and what you should think about and do if you want to become an eth…
…
continue reading
You may have heard of Penetration Tests. You may know you need one. You may have had one or more. But do you know there's more than one type? More than one take? More than one test? On this episode of the SecureAF Podcast, Alias Principal Security Engineer Tanner Shinn and CISO Jonathan Kimmitt discuss the types of Pen Tests, how they're conducted,…
…
continue reading
There has been a lot of news about the alleged incident experienced by Integris. Some of you may have even received emails from the threat actors revealing personal information to solicit money. This is not the first attack to leverage the threat of leaked data for monetary reward. It is among the first for the threat actors to directly appeal to t…
…
continue reading
1
Episode 74: 2023 Wrap-up and Awards
1:03:23
1:03:23
Play later
Play later
Lists
Like
Liked
1:03:23
A (mostly) lighthearted look at the year gone by with a sprinkling of harsh truths and a dash of basic wisdom thrown in, in signature BDM fashion. We also unveil the (ultra-low-budget) inaugural TRUTHIVERSE award ceremony. Who will the winners of kudos and ignominy be? And what's in the offing for 2024? Tune in and find out. ⚠️ GET EVERYTHING: Beco…
…
continue reading
You know you need regular penetration tests to ensure your network is secure. You know the steps to remediate the findings and take the recommended actions to continue on a path toward cybersecurity. But what about what you don't know? What about what the penetration test doesn't cover or doesn't reveal? On this episode of the SecureAF Podcast, Ali…
…
continue reading
The Solar Winds breach is not news. The CISO being personally named in the investigation is. Although not the first CISO to be so identified, this is the most high profile. This raises questions for the future of CISO role and responsibility and IT more generally. Should an individual be held responsible for an incident? What is their responsibilit…
…
continue reading
1
Episode 73: The Occult Conspiracy to Rule the World With David Whitehead
1:05:35
1:05:35
Play later
Play later
Lists
Like
Liked
1:05:35
David Whitehead joins Brendan to discuss the hidden networks of globalist power that seek to retain control over the masses from behind the scenes (mostly). Who are the would-be powers ruling the world? What circles do they move in? What are the nexus points between these shadowy networks and visible geopolitical activity and known figureheads? Dav…
…
continue reading
If you follow our socials, you know Phillip Wylie recently joined the Alias crew! We’re excited to welcome him to help us build our team’s presence supporting organizations’ and individuals’ growth in cybermaturity. Join Alias CISO Jonathan Kimmitt to hear his story of getting into cybersecurity, what’s brought him to Alias, and what's to come. Wat…
…
continue reading
1
Episode 72: Shared Death Experiences & The Afterlife with Paul Perry and Raymond Moody
1:08:30
1:08:30
Play later
Play later
Lists
Like
Liked
1:08:30
Is it possible for people to share a loved one's experience of dying? Co-authors Paul Perry and Raymond Moody ("Life After Life") believe so, based on extensive research into the subject, distilled into their new book PROOF OF LIFE AFTER LIFE: 7 REASONS TO BELIEVE THERE IS AN AFTERLIFE. They joined me to discuss their multiple decades of research i…
…
continue reading
1
Episode 71: Hearing Voices - And Other Adventures In Expanded Perception With Sam Higgins
55:13
55:13
Play later
Play later
Lists
Like
Liked
55:13
Sam Higgins had her life turned upside down when she suddenly started hearing voices back in 2007. While this brought elements of confusion, chaos, and intensity into her already interesting life, instead of simply trying to drug them into silence Sam got really curious about the voices and gradually worked on integrating them into her life. Instea…
…
continue reading
It requires technical expertise to respond to a breach. It requires thinking like a hacker to know where to go, what to do, and what level of response is appropriate. It requires the human element. But humans aren't machines. Your staff and any outside experts require basic needs to be met: food, shelter (well, at least sleep), probably a lot of ca…
…
continue reading
1
Episode 70: Israel and Palestine: An Emergency Truth Broadcast with Joachim Hagopian
1:18:42
1:18:42
Play later
Play later
Lists
Like
Liked
1:18:42
Journalist Joachim Hagopian returns to dissect the Israel-Hamas narrative that exploded in the media in recent days, starting October 7th, and see what we're NOT being told about it. We ask some fundamental questions such as, "How could Israel's defence forces have possibly been caught unaware of the Hamas incursion?", and "Who benefits?" Even Isra…
…
continue reading
1
Episode 69: Rising Above the Herd: Conscious Personal Evolution with Joel and Yerasimos
1:19:58
1:19:58
Play later
Play later
Lists
Like
Liked
1:19:58
Co-hosts of the popular 'Are You Here for the Truth' podcast Joel & Yerasimos join Brendan to talk conscious personal evolution and aligning with your authentic self in spite of the Crowd and all the conditioning and programming that leads us away from our individuality. They discuss: The hero's journey and individualism Repression and armouring Wh…
…
continue reading
Did you know some ransomware groups have customer support better than major businesses? That the negotiations might feel more like a regular corporate transaction than a back-alley holdup? On this episode of the SecureAF Podcast, CEO Donovan Farrow and Security Team Lead Tanner Shinn share their experience working the business side of an Incident R…
…
continue reading
1
Episode 68: Forbidden Archeology: Evidence of Extreme Human Antiquity With Michael Cremo
1:16:38
1:16:38
Play later
Play later
Lists
Like
Liked
1:16:38
Extreme human antiquity? Forbidden archeologist and author Michael Cremo joins Brendan to discuss his decades-long and detailed research into the question: how old is humanity REALLY? Michael is an expert in the field of suppressed and ignored history, particularly as it pertains to the origins of humankind. Influenced by a long-running interest in…
…
continue reading
You know you may be a target. But what about your family? How could a hacker leverage those closest to you to gain advanced access to your work? Recently on the And Security For All podcast, Alias CISO Jonathan Kimmitt and Security Team Lead Tanner Shinn discussed this question. You can listen to their conversation here. On this episode of the Secu…
…
continue reading
1
Episode 67: Cracking the Jesus Code: Unpalatable Truths About the New Testament With Ralph Ellis
1:32:02
1:32:02
Play later
Play later
Lists
Like
Liked
1:32:02
Intrepid independent scholar Ralph Ellis joins Truthiverse again to continue his analysis of key Biblical characters and events, this time the most important one of all: the "Jesus" character. Ralph discusses his extensive research into Edessa and the ancient Edessan monarchy and King Izas Manu, likely the primary historical figure upon whom the Je…
…
continue reading
What were the lessons from Defcon 31? What were the most noteworthy experiences of the conference (Hint: it's not all about the talks and villages). On this episode of the SecureAF Podcast, join Alias Security Team Lead Tanner Shinn and Security Engineer Keelan Knox to hear what they learned and what went down this year at Defcon. Watch the full vi…
…
continue reading
1
Episode 66: Spilling the Secrets of the Sphinx: Solving One of History’s Greatest Mysteries with Rob Neyland
1:16:23
1:16:23
Play later
Play later
Lists
Like
Liked
1:16:23
Champion competitive sculptor and ancient history researcher Rob Neyland (FreetheLioness.com) joins me to discuss his fascinating and ground-breaking research into the true nature and history of the famous Egyptian Sphinx. Rob is known for using his advanced skills as a sculptor to create a stunning miniature "re-carving" of the Sphinx with a very …
…
continue reading
Headed to DEF CON? Want to know what you should know and where you should be? And most importantly, how to survive? On this episode of the SecureAF Podcast, host Donovan Farrow and guest Tanner Shinn talk all thing DEF CON. New to DEF CON? Learn from us how to make the most of the experience. Returning to DEF CON? Remember best talks and best place…
…
continue reading
Digital forensics may be something you don't think about. Or think about only after an incident or breach. But knowing what techniques and tools are used will help equip you to understand your potential vulnerabilities and strengthen your security posture. And you'll gain more insight into the work an Incident Response team does. In this episode of…
…
continue reading
1
Episode 65: The Saturn Death Cult Revealed: The Ancient Key to Today's Historical Enigmas With Troy McLachlan
1:09:22
1:09:22
Play later
Play later
Lists
Like
Liked
1:09:22
Historian and Electric Universe researcher Troy McLachlan joins Brendan to discuss: Why Saturn was once the primary god Catastrophic celestial events witnessed by ancient cultures around the world The true origins of major world religions What the “eye of god” REALLY was Giza’s pyramids’ connection to Saturn The crucial importance of electricity in…
…
continue reading
1
Episode 64: Truthers, it's time to get off the fear carousel - Facts & Fables about Blood Analysis of the Jabbed with Dr Ana Maria Oliva
1:05:14
1:05:14
Play later
Play later
Lists
Like
Liked
1:05:14
A great deal of hype surrounds certain information circulating about people who received the C19 jabs and what is being found in their blood - along with the blood of the UN-jabbed. As usual it is the most sensationalist and least helpful information (and fear-mongering) that seems to get the most attention in medicine and life in general. Nothing …
…
continue reading
The SecureAF Podcast is 50! Listen this week as our hosts discuss a critical topic in cybersecurity. Your environment may be unique. Your business may feel to small to be noticed. But to a hacker, everyone is a target of opportunity, and every target may yield to the same avenues of attack. On this episode of the SecureAF Podcast, Alias CEO Donovan…
…
continue reading
1
Episode 63: Caesar's Messiah: Rome's Greatest Crime?
59:01
59:01
Play later
Play later
Lists
Like
Liked
59:01
Independent scholar and autodidact Joseph Atwill joins us for a compelling and shocking discussion of his research findings into KEY ideas, characters, and events in the Bible. Once a Christian believer himself, a young Atwill became a voracious reader and began a detailed inquiry into a realm of Biblical scholarship that featured a glaring - and a…
…
continue reading
Want to become a Pentester rather than a Thintester? Want to find out what a Thintester even means? In this episode of the SecureAF Podcast, Alias CEO Donovan Farrow and CISO Jonathan Kimmitt discuss one of our often-asked questions: What do I need to do to become a Pentester? They'll talk about what qualities and experiences prepare you for the ro…
…
continue reading
1
Episode 62: Demonic Interference: A Professional Exorcist on Demons, AI, and Loosh with Alobar Jones
1:00:33
1:00:33
Play later
Play later
Lists
Like
Liked
1:00:33
Alobar Jones has a diverse psychic toolkit and probably over 20,000 hours of meditation behind him, including many thousands of hours of astral travel. He's also a professional exorcist who uses a new paradigm for Successful Mental Health treatment. His approach to removing demons and other entities from someone - without relying on religious dogma…
…
continue reading
1
Episode 48 - Updates and Announcements - Secure AF
2:02
2:02
Play later
Play later
Lists
Like
Liked
2:02
SecureAF host Donovan Farrow shares news about transitions with the SecureAF Podcast and exciting announcements about what else is coming for the Alias podcast lineup. Watch the full video at youtube.com/@aliascybersecurity. Catch the whole episode now at https://bit.ly/47eYPTK Listen on Apple Podcasts, Spotify and anywhere you get you're podcasts.…
…
continue reading
1
Episode 61: Secrets of Holographic Blood with Adam and Josh Bigelsen
59:36
59:36
Play later
Play later
Lists
Like
Liked
59:36
If you have questions regarding your health…the answers are in the blood. The Bigelsen name looms large over the field of blood analysis, and well it should. Adam and Josh Bigelsen are the sons of Dr. Harvey Bigelsen who was a pioneer in the world of holistic medicine, and author of the groundbreaking books, 'Holographic Blood' and 'Doctors are Mor…
…
continue reading
1
Episode 47 - IOT and XIOT Devices and Dangers
53:46
53:46
Play later
Play later
Lists
Like
Liked
53:46
The Internet of Things (IoT) and connection Operational Technology (OT) devices has opened up possibilities for extending interconnectivity and creating means of more immediate controls on crucial systems and everyday devices. These open opportunities for hackers to exploit their connections and leverage access for malicious and destructive ends. O…
…
continue reading
1
Episode 46 - Hacking a Cybersecurity Career
51:07
51:07
Play later
Play later
Lists
Like
Liked
51:07
Building a cybersecurity career is a two-way street. There are the questions for those who do the hiring and those who are being hired - they're the same set of questions - What should and do employers look for? What education or certifications are needed? How do employers find and attract good talent? In this episode of the SecureAF Podcast, Chad …
…
continue reading
1
Episode 60: Confessions of a Blacklisted Naturopath with Amandha Vollmer
48:07
48:07
Play later
Play later
Lists
Like
Liked
48:07
Amandha Vollmer is naturopathically trained (and blacklisted) holistic healer and educator who joins me to discuss a number of juicy topics, including the allopathic takeover of naturopathy and destruction of education. She explains how to came to leave naturopathy behind and expand her remit, designing her own remedies, learning from clients and h…
…
continue reading
Back the blue. Don’t start a fight; always finish one. Hold the door. Yes, ma’m. Don’t mess with Texas. From serious to seemingly frivolous, we’re steeped in ways to think, act, and believe. What if those are all expressions of a “code” that social engineers can use to leverage better exploits? On this episode of the SecureAF Podcast, Alias Cyberse…
…
continue reading
1
Episode 59: Inside the Elon Musk Agenda With Demi Pietchell
46:15
46:15
Play later
Play later
Lists
Like
Liked
46:15
Author and researcher Demi Pietchell joins me to unpack the vortex of intrigue that is the world and mind of Elon Musk - including recent dramas involving Twitter and Substack. In her view, 'Musk is not trying to “free the public square.” He's potentially attempting to control it because there are other goals he has that would require him to have c…
…
continue reading
How do you work with vendors to ensure they are meeting your requirements for regulatory compliance? In this episode of the SecureAF Podcast, Alias CISO Jonathan Kimmitt will share his experience and expert tips on how to work with vendors to ensure a secure partnership. Watch the full video at youtube.com/@aliascybersecurity. Catch the whole episo…
…
continue reading
1
Episode 58: The Food Supply Crisis and How to Sur-thrive It
51:37
51:37
Play later
Play later
Lists
Like
Liked
51:37
It's now common knowledge that the global food supply chain has been under attack and intentionally undermined in order for the globalists to create food shortages, poverty, and civil chaos to further their agenda. The full impact of the convid manipulations and the supply chain disruptions is yet to be fully felt, so it's not too late to start ada…
…
continue reading