Content provided by Fearless Paranoia. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Fearless Paranoia or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://player.fm/legal.
Player FM - Podcast App Go offline with the Player FM app!
In late 1972, U.S. Marine Captain Ron Forrester disappeared on a bombing run into North Vietnam. Back home in Texas, his family could only wait and hope. Audio subscribers to Texas Monthly can get early access to episodes of the series, plus exclusive interviews and audio. Visit texasmonthly.com/audio to join. Go to HelloFresh.com/FLIGHT10FM to get 10 Free Meals with a Free Item For Life.…
Content provided by Fearless Paranoia. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Fearless Paranoia or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://player.fm/legal.
A Cybersecurity Lawyer and an IT Specialist helping to demystify the world of cybersecurity. The language and terminology of cybersecurity is oftentimes intentionally confusing and hard to keep up with even for experienced professionals. Each week, we will break down different topics in the cybersecurity, data security, and privacy fields to help you be able to keep up. Understanding cybersecurity has never been more important to everyday life, but also never more difficult to do.
Content provided by Fearless Paranoia. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Fearless Paranoia or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://player.fm/legal.
A Cybersecurity Lawyer and an IT Specialist helping to demystify the world of cybersecurity. The language and terminology of cybersecurity is oftentimes intentionally confusing and hard to keep up with even for experienced professionals. Each week, we will break down different topics in the cybersecurity, data security, and privacy fields to help you be able to keep up. Understanding cybersecurity has never been more important to everyday life, but also never more difficult to do.
What if I told you that for a few dollars a month, you could become the proud owner of a new cybercrime franchise? Well, that's where the current world of extortion-for-hire has gone: ransomware-as-a-service.
Mult-Factor Authentication has too often been talked about as though it is a cure to all cybersecurity failures. It's not. But make sure that you're using phishing-resistant MFA to get the best protection available.
For our 50th episode, we discuss how ransomware gangs have adapted their tactics in response to improved cybersecurity defenses, and some tips on the best ways to fight against this increasingly dangerous threat.
It was the best of times, it was... late 2023. Two major tech companies, two nation-state attackers. One company set the standard for how to respond, the other, well, didn't.
Discover why effective cybersecurity training is crucial, but why most employers fail to do it right. Here are 4 critical steps for your company to make it engaging, relevant, and inclusive.
We return to the 23andMe breach, analyzing DNA data security, user-corporate responsibility balance, and the implications of genetic information hacking.
From major companies hit with multiple cyberattacks to the operational chaos at OpenAI, there have been some big events with major cybersecurity ramifications in 2023. Here are the biggest cybersecurity stories from a busy year.
fIT burnout is an epidemic that's sweeping through tech departments worldwide. We dissect the causes, from the cybersecurity skills gap to the overwhelming workload, and offer practical strategies for mitigation.
Dive into the MGM Data Breach: Discover root causes, the impact of credential stuffing, and 10 vital cybersecurity lessons for businesses.
Welcome to Player FM!
Player FM is scanning the web for high-quality podcasts for you to enjoy right now. It's the best podcast app and works on Android, iPhone, and the web. Signup to sync subscriptions across devices.