Look for any podcast host, guest or anyone
Showing episodes and shows of

RealTime Cyber

Shows

RealTime CyberRealTime CyberCybersecurity Recruiter/Founder talks Entrepreneurship, Startups, and the state of the Job Market.Josh Keeley is a Co-Founder of Trident Search, a cybersecurity recruiting agency specializing in early state cybersecurity startups. He talks about his journey as an entrepreneur, cybersecurity startups, and the current state of the job market.2025-04-0938 minRealTime CyberRealTime CyberCISO Hot Takes: GRC, AI & Vendor Relations in HealthcareDan Holland, Deputy CISO of Tampa General Hospital, joins us for a deep dive into a wide range of topics—from GRC and AI to vendor risk management and the unique cybersecurity challenges posed by hurricanes in Florida. We also explore his journey from cybersecurity entrepreneur to his current role at Tampa General.2025-02-2648 minThe FAIK FilesThe FAIK FilesOf Spies and HitmenWelcome back to The FAIK Files! When tech gets weird, we're here to help make sense of it all.This week, we’re tackling: Mason is out this week, so Perry is doing his best not to screw anything up too badly. We've got some new videos posted about how deepfakes work -- everything from those fake celebrity endorsements to realtime deepfakes that can happen in live videoconferences. Perry & Mason interview FBI counter-terrorism and counterintelligence operative, Eric O'Neill It looks like we are on the verge of AI Agents that can not only bo...2025-01-2454 minRealTime CyberRealTime CyberBehind the Scenes of Election Security: CISO of AZ Sec of StateMichael Moore is the Chief Information Security Officer (CISO) for the Arizona Secretary of State's Office which plays a major role in running elections. We sit down and talk about how elections are run, how votes are cast, authenticated, and counted, how they ensure security and integrity of ballot tabulators, cyber threats to elections, and respond to allegations of voter fraud and voter suppression.2025-01-161h 04RealTime CyberRealTime CyberElection Security Official Answers Your Election Security and Integrity QuestionsMichael Moore is the Chief Information Security Office for the Arizona Secretary of State which plays a major role in running elections.We sit down and talk about how elections are run, how votes are cast, authenticated, and counted, how they ensure security and integrity of ballot tabulators, cyber threats to elections, and respond to allegations of voter fraud and voter suppression. 2024-12-111h 02CyberSecurity SummaryCyberSecurity SummaryThe Road to React with Firebase: Your journey to master advanced React for business web applicationsThis summary is talking about the Book "The Road to React with Firebase: Your journey to master advanced React for business web applications".This document is an excerpt from the ebook "The Road to React with Firebase," written by Robin Wieruch, which teaches readers how to build web applications using React.js and Firebase. The document covers a range of topics related to web development, including: setting up a React project, using React Router for client-side navigation, integrating Firebase into the project, implementing email-based and social media authentication, managing user data in a Firebase Realtime...2024-11-0619 minThe Bytagig PodcastThe Bytagig PodcastUnraveling Everyday Device Vulnerabilities with RealTime CyberIn this episode, cybersecurity experts Tom and Matt dive into the latest threats and innovations we face with devices we use every day. Join us as we explore the vulnerabilities of everyday technologies, from smartphones and mobile apps to smart homes and even modern connected cars like Tesla. Give it a listen!2024-09-1838 minRealTime CyberRealTime CyberOperation CrytoRunner: The Scam Laundering Takedown Told by Secret Secret AgentIn this episode, we sit down with Secret Service Agent William Mack to discuss a series of high-profile cryptocurrency money laundering investigations; From transnational money laundering operations to domestic wire fraud, we discuss the investigation and the cyber criminal organizations behind the scams. 2024-08-2228 minThe Cyber Ranch PodcastThe Cyber Ranch PodcastManaging Threats Throughout the SDLC with Tomer SchwartzHowdy, y’all, and welcome to The Cyber Ranch Podcast!  Our guest toda is Tomer Schwartz, co-founder and CTO over at Dazz  Yup!  He’s a vendor!  And OMG he’s a sponsoring vendor too! Whatever will we do?  But wait, y’all know Allan's rule:  Vendors are allowed on the show if and when they can add more value on a given subject vs. any practitioners in The Cyber Ranch network.  Tomer fits that bill perfectly!  Tomer has worked in the Microsoft Security Response Center, he’s the former Armis co-founder & CTO, current co-founder & CTO at Dazz, who is a leader in the...2024-07-1028 minRealTime CyberRealTime CyberCISO of Arizona Talks AI Threats, AI Policy, and His Journey to CISORyan Murray is the Deputy Director of Arizona Homeland Security and Chief Information Security Officer of Arizona. We talk about a wide range of cybersecurity issues facing the State of Arizona from DeepFakes, AI powered Hackers, to Chinese State Sponsored Hackers positioning themselves in Critical Infrastructure. Chapters: 0:00 The Journey to Becoming a CISO 5:35 The 5 Year Plan for Collective Defense 13:04 Threat Actors using Artificial Intelligence 15:56 DeepFake Threats 17:21 Artificial Intelligence In Government 20:50 Chinese Hackers in the Power Grid & Critical Infra 28:16 Things he Believed Before Becoming a CISO 31:14 The Most Stressful Part of Being...2024-03-2739 minRealTime CyberRealTime CyberDigital Forensics Examiner ExaminedPhillip Hinders is a Digital Forensics examiner for the State of Ohio. He supported cybersecurity incident response efforts for the State of Ohio before working as a digital forensics examiner supporting law enforcement, mainly conducting digital forensics with tools like Cellebrite and Grey Key. 2024-03-2030 minRealTime CyberRealTime CyberThe State of Data Privacy in 2024Wynter Deagle is a Data Privacy and Cybersecurity Attorney out of California. She has proactively counseled companies and defended companies in data privacy litigation. She shares insights from her experience with us. Chapters: 0:00 How Data Privacy came to Light 4:08 Are you Opting in or Opting out? 6:16 Healthcare Companies have the Facebook Pixel? 11:21 Are Data Brokers Actually Affected by New Privacy Laws? 14:33 Some Companies DO Respect your Privacy 18:08 The End of "Free" 25:30 Companies Collect More Data Than They Think 29:51 What Every Company & Consumer Should Know 33:54 Is it Possible to fix AI Pri...2024-03-1341 minelliTek\'s Automation Know-HowelliTek's Automation Know-HowIndustrial Automation - It Doesn't Have To... DisagreeSend us a textBridging the Gap: Cybersecurity and Networking in Industrial AutomationIn this episode of "Industrial Automation - It Doesn't Have To...", we delve into the critical intersection of cybersecurity and networking, essential components in today's industrial landscape.🛡️Who better to navigate this complex terrain than Siemens' Industrial Network Consultant for the Southeast Region, Kyle Frederick? With seven years of experience under his belt, Kyle is a seasoned expert in cybersecurity and networking, making him the perfect guide for this discussion.Operational Technology (OT) and Information Technology (IT) are netwo...2024-02-1344 minRealTime CyberRealTime CyberFormer NSA Contractor Talks Quantum Computing2024-01-0346 minRealTime CyberRealTime CyberThe Space Domain & Electronic Battlefield; from Military to StartupsMark Reed is a former U.S Air Force officer who worked on Satellites before transitioning to private sector Satellite & Space Technology Startups. We talk about the nature of space technologies, technical limitations, satellite traffic control, electronic warfare in space, GPS signals, and some concerning trends around GPS signals jamming and interference with aircraft here on earth.Chapters:0:00 From U.S Air Force to Satellite Startups3:48 Will Satellites Crash into Each Other?12:45 Intelligence Collection in Space22:09 Technical Limitation of Satellites30:04 You Probably Didn't Know this About GPS37:12 GPS Jamming & S...2023-11-2748 minCyber Morning CallCyber Morning CallCyber Morning Call - #418 - 24/10/2023[Referências do Episódio] - Ada Lovelace Day 2023 - https://www.even3.com.br/ada-lovelace-day-2023  - Scammers use India’s real-time payment system to siphon off money, send it to China - https://www.theregister.com/2023/10/24/scammers_use_indias_realtime_payment/  - Chinese Scammers Launder Money via Fraud Payment Gateways: A New Threat to India's Digital Payment Ecosystem - https://assets-global.website-files.com/635e632477408d12d1811a64/65320d7ba79c7763af31cd3e_Loan%20Apps%20Report_Final.pdf  - The Stream - Aadhaar: The world’s largest biometric identification system - https...2023-10-2402 minRealTime CyberRealTime CyberThe Secretive World of Spyware & Digital SurveillanceGary Miller from Citizen Lab has made a career Exposing Cyber Threats and Digital Surveillance. He specializes in mobile network threat intelligence and surveillance monitoring. He has testified to Congress, the Department of Justice, as well as been a contributor with the Washington Post and the Intercept. Chapters:0:00 Concerning Discoveries While Working in Telecom 4:57 Why Your Cellphone is so Vulnerable 10:18 The Concerning Observation of Huawei 14:00 NSO Group Tries to Buy Access to Cellular Network 18:58 Detecting Pegasus Spyware 24:06 Internet Censorship & Surveillance in Iran 31:37 Internet Behavioral Profiling 33:55 Internet Shutdowns? 36:06...2023-07-2648 minRealTime CyberRealTime CyberFormer FBI Cyber Agent; Whistleblowing in the Digital AgeKurt Suizdak is a former FBI Cyber Agent and current cybersecurity and privacy attorney. He also represents FBI whistleblowers who testify to congress. He talks about his career at the FBI and gives a brutally honest opinion about the current state of the FBI. Chapters: 0:00 Covert Cyber, and FBI in Iraq 5:03 Drones & Military Tech in the Civilian World 14:04 The Brewing Congressional Showdown on FBI Mass Surveillence 18:51 Did the FBI Submit Social Media Takedown Requests for Russian FSB? 23:19 Does the FBI have a Database on Americans? 27:33 FBI Abusing FISA, Patriot Act 31:03 The Time...2023-07-1247 minRealTime CyberRealTime CyberHe Went from Help Desk to Cybersecurity EngineerTrevor Costanzi is a Senior DevSecOps Engineer. He opens up about a wide variety of topics throughout his Cybersecurity and IT Career. He gives unique insights into what made him successful. 0:00 How he Went From Help Desk to Security Engineer 3:49 How the Equifax Breach Changed the Company Security Culture 6:06 How DevOps Changed Software Development 11:48 Should You Use ChatGPT to Write Code? 15:27 Advice for Getting into DevOps/DevSecOps 20:41 Advice for Starting a Cybersecurity Career2023-06-2822 minRealTime CyberRealTime CyberCrypto Crackdown? Washington Insider Breaks it Down.Recently the SEC pulled a 180 on their policy toward cryptocurrencies and sued Binance and Coinbase. Sam Lyman is a Public Policy Director in Washington who covers Blockchain. He is also a Forbes Contributor, covering Fintech and Digital Assets. He breaks down the historical politics and policy behind crypto and the recent assault against crypto. He can be found at:https://www.forbes.com/sites/samlyman/?sh=79368a3850bb https://twitter.com/@SamLyman33 2023-06-2138 minRealTime CyberRealTime CyberFormer USCYBERCOM Officer Talks Battlefield Cyber: The War America is Losing. Michael McLaughlin is a former senior adviser for U.S. Cyber Command (USCYBERCOM), where he was responsible for the coordination of Department of Defense (DOD) counterintelligence operations in cyberspace. He was the Chief of counterintelligence for the Cyber National Mission Force where he supported threat hunting teams (hunt teams) in Ukrainian networks. William Holstein is a journalist who has specialized in technology and China for over a decade. They CoAuthored the Book "Battlefield Cyber". You can find it here: https://www.amazon.com/Battlefield-Cyber-Undermining-Democracy-National/dp/1633889017 They talk about how America’s adversaries are fully engaged in a...2023-06-1450 minRealTime CyberRealTime CyberBefore the Breach: You're Liable if You Aren't Doing ThisAnnMarie Giblin is a Cybersecurity Lawyer specializing in Proactive Cybersecurity. She talks about how cybersecurity laws are changing and what you can do to stay ahead. Chapters: 0:00 This Changed Cyber Negligence Law 2:30 The Changing Nature of Cybersecurity Lawsuits 9:47 Supply Chain Breaches are Changing Cybersecurity Law 12:40 You're Liable if You Aren't Doing This 17:59 This is The Cyber Liability Threshold 20:33 These New Data Privacy and Security Laws are Coming 26:42 This is How AI will Change Law and Regulation 2023-06-0834 minRealTime CyberRealTime CyberFormer FBI Cyber Agent Brent Watkins Talks Cyber Brent Watkins served in the U.S Air Force during the cold war reverse engineering Soviet Technologies before joining the FBI and investigating cyber crimes. Chapters: 0:00 Air Force During the Cold War 1:36 Cyber Crime Investigations with the FBI 17:37 Tracking Terrorists Online 18:25 Investigating Hop Points 20:31 Investigating Cyber Criminal Groups 25:24 Corporate Espionage & Insider Threats 27:57 From FBI to Working in Threat Intelligence 31:57 Wire Fraud & Ransom Claw Backs 34: 36 What Are Cyber Criminals Like? 2023-05-0339 minRealTime CyberRealTime CyberHe Will Change the Way You See Artificial Intelligence Dallas Clounch, the "AI Surfer, is a former software developer and now AI Guru. He covers all things AI. You can Find More AI insights at: https://www.theaisurfer.com/ Facebook: https://www.facebook.com/theaisurfer?mibextid=LQQJ4dInstagram: https://instagram.com/theaisurfer?igshid=YmMyMTA2M2Y= TikTok (chinese spy app): https://www.tiktok.com/@theaisurfer?_t=8bRgi3AlW3i&_r=1 YouTube: https://www.youtube.com/ @theAIsurfer 2023-04-2046 minWerkgeversverhalenWerkgeversverhalenNorthwave Security - Werkgeversverhalen podcast by boinq® | Aflevering 11Bedrijven beschermen is de dagelijkse missie van Nortwave Cyber Security. Hun toewijding aan deze bedrijven is gebaseerd op de motivatie van elke Northwaver. Zo noemen ze hun werknemers. Ze heten je welkom bij Northwave en nodigen je uit om deel te nemen aan hun missie. Van ethische hacker tot advocaat, van cyberanalist tot psycholoog, van programmeur tot bedrijfsexpert, van CEO tot receptionist, ze delen allemaal een gemeenschappelijk doel: een veilige digitale reis voor een vrije en moderne wereld. Daarom pushen ze zichzelf om vandaag de beste versie van hunzelf te zijn en morgen een nog betere versie.2023-04-1825 minRealTime CyberRealTime CyberCyberWarfare & Signals: Deciphered by U.S. Navy Cryptologic Officer Ben Bissantz is a Cryptologic Warfare Officer for the U.S Navy. He's served in Electronic Warfare and Signals Intelligence for U.S Special Operations Command (USSOCOM) and Sealiftcommand. He's also served in the Navy Information Warfare Comminity’s Artificial Intelligence and Machine Learning Task Force. Chapters: 0:00 Announcement and Disclosure 1:00 Background from USSOCOM to Sealift 3:00 Cryptologic, Cyber, & Electronic warfare explained 13:42 Cyber in Ukraine 15:37 NotPetya implications on U.S Military 19:17 What would a cyber war look like? 22:53 Border Gateway Controls; Undersea Cables & Satcom 29:30 The Irreversible Vulnerability in SatCom 31:30 OSINT, the Deep Wed...2023-03-201h 07RealTime CyberRealTime CyberCISO of Maricopa County Talks Superbowl and Election SecurityLester Godsey is the Chief Information Officer of Maricopa County Arizona. He has served as the Chief Information Security officer of both Maricopa County and the City of Mesa. We talk about security and cyber threats surrounding the Superbowl, Waste Management Open, Elections, and talk a little Blockchain. Chapters: 0:00 Note and Announcement 1:11 Cyber Threats facing Superbowl and WMO 4:57 The Drone Threat 6:46 CISO of a City vs County 9:31 Massive Influx of People 12:15 Cellular and Internet Overwhelmed? 15:11 Cyber Attacks on the Election 2020 vs 2022 26:54 Blockchain for Elections? 34:09 Blockchain for Threat Intelligence 37:36 O...2023-03-1442 minRealTime CyberRealTime CyberPrivate Insights from a Data Privacy AttorneyRyan Johnson is a data privacy and cyber security Lawyer. He sits on the boards of a few companies providing legal counsel and advising on navigating the increasingly complex world of data privacy and information security. Chapters: 0:00 From IT Admin to Data Privacy Attorney 6:49 The Dirty Secret about Data Breach Lawsuits 11:02 Is Cybersecurity Driving Inflation? 13:26 Cybersecurity Affirmative Defense Laws 18:28 Navigating the Complex Mesh of State Privacy and Breach Disclosure Laws 21:01 Cyber Insurance Premiums Going Through the Roof 25:52 Navigating the Complex Technicalities of Privacy 25:49 The Wild West Data Brokers 34:30 "Opt In" vs "Opt...2023-02-0351 minRealTime CyberRealTime CyberHacking IoT With Pentester Ryan JonesIoT Penetration Tester and IoT Security Expert, Ryan Jones joins the podcast to talk all things IoT Security. IoT's hyper growth is outpacing security and creating a new set of security challenges. We dive into the security of ATMs, Healthcare Devices, Drones, Cars, the Power Grid, and other Operational Technology.2023-01-2542 minRealTime CyberRealTime CyberUncommon Insights from a Crypto InsiderWe interviewed crypto developer, product manager, and startup founder Dima Azarenko. He's developed and engineered software, protocols, and NFTs, We talk all things crypto. LEDGER HARDWARE WALLETS: https://shop.ledger.com/?r=e411905c4b6dDima Azarenko Twitter: https://twitter.com/azar3nko RMeta Labs: https://rmetalabs.ai/ Chapters: 0:00 Intro, Bankruptcies & Where to Store Your Crypto? 2:26 Differences Between Engineering Software vs Crypto 6:11 Crypto Security & Breaches 14:58 Crypto Laundering & Tornado Cash 17:35 Is Russia Using Crypto to Circumvent Sanctions? 20:11 Whats Actually Driving Crypto Adoption 25:01 Federal Reserve CBC Coin, China's Di...2023-01-091h 23RealTime CyberRealTime CyberFormer CIA Officer and Current AZ Dept of Homeland Security Director/CISO Tim RoemerTim Roemer opens up about cyber threats facing the state and country, managing the border crisis in Arizona, cyber war, Anonymous, how he's created a cyber security culture, his time at the White House and CIA, among a bunch of other topics. 2022-12-071h 12RealTime CyberRealTime CyberSecuring the Military & Defense Industrial BaseCybersecurity Model Maturity Certification (CMMC)  consultant Grant Burns talks about new Department of Defense cybersecurity requirements for the Military and Defense Industrial Base supply chain.Grant Burnshttps://www.boundplanet.com/2022-12-0232 minNo Shit InfoSecNo Shit InfoSecWhat is a real hacker?I discuss the issue of what makes a real hacker with my my sonSHOW NOTESIn this episode, I discuss the ever prominent question of "What is a real hacker?". So enjoy the discussion and give me your thoughts. This topic always gets peoples feathers ruffled, so agree, disagree? Leave your thoughts and let's discuss!Cool Shit:Has you email or phone number been in a breach?https://haveibeenpwned.com/Realtime Global Cyber Attack Maphttps://threatmap.checkpoint...2022-09-1932 minNo Shit InfoSecNo Shit InfoSecBreaches ever reachingA short episode about the reaching effects of breaches and accounts you may have forgotten about.New Marriot Breach:https://techcrunch.com/2022/07/06/marriott-breach-again/Privacy Fix: How to Find Old Online Accounts from Consumer Reports:https://www.consumerreports.org/digital-security/how-to-find-old-online-accounts-a1266305698/Has you email or phone number been in a breach?https://haveibeenpwned.com/Cool Shit:Realtime Global Cyber Attack Maphttps://threatmap.checkpoint.com/ Hosted on Acast. See acast.com...2022-09-1305 minNo Shit InfoSecNo Shit InfoSecBreaches ever reachingA short episode about the reaching effects of breaches and accounts you may have forgottenNew Marriot Breach:https://techcrunch.com/2022/07/06/marriott-breach-again/Privacy Fix: How to Find Old Online Accounts from Consumer Reports:https://www.consumerreports.org/digital-security/how-to-find-old-online-accounts-a1266305698/Has you email or phone number been in a breach?https://haveibeenpwned.com/Cool Shit:Realtime Global Cyber Attack Maphttps://threatmap.checkpoint.com/ Our GDPR privacy policy was updated on August 8, 2022. Visit acast...2022-09-1206 minNo Shit InfoSecNo Shit InfoSecThe Future of TechnologySHOW NOTES:Brady and I discuss people and technology; where it was, where we are, and where we are going. Put on your philosophy hats!xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxPodcast Stuff:Robert actually had an Atari 1200 XL:http://oldcomputers.net/atari-1200xl.htmlRay Ban Smart Glasses:https://www.ray-ban.com/usa/electronics/RW4002%20UNISEX%20ray-ban%20stories%20%7C%20wayfarer-shiny%20black/8056597489478?fbclid=IwAR08oSxzKyvMfsPYKa1PtvVkda6rJtAlAyJ24pDFSCo03tIqaIxDnVC9IWw&cid=PM-SBI_080622-1.US-RayBanStories-EN-B-Related-Exact_RayBan_Related_ray+ban+camera+glasses&gclid=c6b5a6ec15e015...2022-09-0552 minNo Shit InfoSecNo Shit InfoSecMis-information, Dis-information, and Fake News. You are a product and target for all of it.Season 1, Episode 13Mis-information, Dis-information, and Fake News. You are a product and target for all of it.Brady and I discuss Mis-information, Dis-information, and Fake News. We discuss what it is, how it is used, and we are all a product and target for all of it. We discuss ways to avoid deception which leads to a philosophical discussion about truth, morals, and ethics. Brady takes a moment on the couch discussing how understanding the matrix for what it is can affect you on a personal level.Links and Resources:2022-08-291h 13No Shit InfoSecNo Shit InfoSecEducation, Certifications, and sipping on the SocialsI have had a lot of questions over the years about how to proceed with a career, education, and certifications. So, I give my take on these and what they mean relative to my life experiences. Individual mileage may vary. I also discuss the need to have a public facing social media presence that is active and consistent. Hide the private Socials and search to see what actually shows up when searching for yourself. Your future employers will. Just sayin'.Links:Realtime Global Cyber Attack Maphttps://threatmap.checkpoint.com/2022-08-2331 minBeers with Talos PodcastBeers with Talos PodcastBeers with Talos Ep. #109: We have not secured our society — Or, working out a conference talk in realtimeMost of the Beers with Talos folks are refreshed after a summer vacation. But don’t assume that means they actually prepared for this episode. This is more of a free-flowing episode, where we discuss cyber conflict between nations — one of the many things that keep Matt up at night. They go back and forth discussing what a “cyber war” could actually look like, and what crosses the line into conflict versus traditional “hacktivism.”2022-08-1253 minBeers with Talos PodcastBeers with Talos PodcastBeers with Talos Ep. #109: We have not secured our society — Or, working out a conference talk in realtimeMost of the Beers with Talos folks are refreshed after a summer vacation. But don’t assume that means they actually prepared for this episode. This is more of a free-flowing episode, where we discuss cyber conflict between nations — one of the many things that keep Matt up at night. They go back and forth discussing what a “cyber war” could actually look like, and what crosses the line into conflict versus traditional “hacktivism.”2022-08-1253 minBeers with Talos PodcastBeers with Talos PodcastBeers with Talos Ep. #109: We have not secured our society — Or, working out a conference talk in realtimeMost of the Beers with Talos folks are refreshed after a summer vacation. But don’t assume that means they actually prepared for this episode. This is more of a free-flowing episode, where we discuss cyber conflict between nations — one of the many things that keep Matt up at night. They go back and forth discussing what a “cyber war” could actually look like, and what crosses the line into conflict versus traditional “hacktivism.”2022-08-1253 minpwn the futurepwn the futureTales from "the infinite front"In late June, an obscure twitter account posted surveillance footage from inside an Iranian steel mill, from the morning on 26 June 2022. The video seems to capture a catastrophic industrial failure happening in realtime. If press reports are to be believed, hackers deliberately took control of the facility and caused tons of molten steel to spill onto the floor of the mill. The group claiming responsibility also posted photos of the “human-machine interface” (HMI) control systems that seem to run the same facility:A few quick points:* Even in Iran, a country under extreme sanc...2022-08-0303 minNo Shit InfoSecNo Shit InfoSecOne Weird TrickIn this episode, I talk about getting in to the field of cybersecurity or moving up in the field. I also talk about how keyboards could keep malware from going Boom on your system.Links:Try This One Weird Trick Russian Hackers Hatehttps://krebsonsecurity.com/2021/05/try-this-one-weird-trick-russian-hackers-hate/Fake VM Sandbox artifacts - not talked about in this episodehttps://github.com/NavyTitanium/Fake-Sandbox-ArtifactsHas your password been involved in a breach?https://haveibeenpwned.com/...2022-08-0118 minNo Shit InfoSecNo Shit InfoSecInternet Security: Child EditionIn this episode, Brady and I have a discussion with our sons, Isaac and Devin, about Internet Security. This is after a security podcast for the average human, and who better fits that bill than our kids? Stayed tuned for outtakes at the end!Pics of the week:Elden Ring (Video Game)https://en.bandainamcoent.eu/elden-ring/elden-ringThe Boys (Amazon Prime Series)https://www.primevideo.com/detail/The-Boys/0KRGHGZCHKS920ZQGY5LBRF7MAR. Brady Frost...2022-07-2542 minNo Shit InfoSecNo Shit InfoSecThe Importance of Data ReductionIn this episode, I have a discussion about data reduction with special guest and author, R. Brady Frost. The discussion revolves around the security risk of keeping too much data available, and things that can be done to mitigate those risks.Pics of the week:Hackers (The Movie)https://www.imdb.com/title/tt0113243/?ref_=fn_al_tt_1Our Flag Means Deathhttps://www.imdb.com/title/tt11000902/R. Brady Frosthttps://www.rbradyfrost.com/2022-07-1840 minGo Be Great with Coach KarenaGo Be Great with Coach KarenaThe Balance of Networking In Business Building With LaDawn VanKirkRecently, I've been on a quest to learn more about networking.  Something that I have adamantly ran from and absolutely hated.  Truth be told...I did not understand it.  I'm making it my business to understand now.  Networking is one of the most important things you can do for your business, but it's also one of the most intimidating.  It's hard to know where to start and what to do when you're networking. You don't want to come across as pushy or sales-y, but you also want to make a good impression, genuinely connect, build relat...2022-06-1630 minMoody\'s Talks - Inside EconomicsMoody's Talks - Inside EconomicsThe Macroeconomics of Cyber AttacksJim Hempstead, Lesley Ritter, and Leroy Terrelonge from Moody's Investors Service, Join the podcast to discuss the rising concern of cyber risks and attacks.Full episode transcriptFollow Mark Zandi @MarkZandi, Ryan Sweet @RealTime_Econ and Cris deRitis on LinkedIn for additional insight.  Questions or Comments, please email us at helpeconomy@moodys.com. We would love to hear from you.  To stay informed and follow the insights of Moody's Analytics economists, visit Economic View.2022-05-271h 10RefactoredRefactoredPerformance OptimizationRefactored #037: “Performance Optimization” On this episode of Refactored… Frank ages, realtime. He is so old and tired he can barely make it through the show. The guys talk breaking and entering - both home and cyber. Do you know how easy it is to get through most doors? How easy it is to pick a lock? The guys briefly discuss IDS/IPS technology, and the Thinkst Canary comes up even though Chris derps on the name. Honeypots are kinda cool. Chris rails against the query planner in MySQL, which opens a larger conversation about database and system...2021-09-101h 12Real Time with Prince BlueReal Time with Prince BlueReal-Time With Prince Blue Say It With Your Chest Episode#RealTime With Prince Blue  3/18 Thursday @ 8pm Live FB/Twitter/YouTube -Cyber Bullying -Victim or Bully? -Is Sympathy a Drug? -Selective Cancel Culture -New Blacks -E.B.B.Y.(Everybody Business But Your Own) #0FucksMedia 2021-03-191h 33The Hoot from HumioThe Hoot from HumioThe Hoot - Episode 32 - Humio at Lunar with Kasper NissenJohn meets up with Kasper Nissen, Cloud Architect and Site Reliability Engineer at Lunar, Cloud Native Computing Foundation (CNCF) Ambassador, and co-founder and Community Lead at Cloud Native Nordics. Lunar is a 100% digital mobile-based banking app available in Denmark, Sweden, and Norway. As a new banking app, they’re not bound by old systems and ancient perceptions of what makes up personal finances. They believe that you know how to handle your money the best way yourself, especially if you have the right tools. So it’s their job to create tools that make managing finances easy, intu...2020-07-1724 minInnovation CallingInnovation CallingRedefining The Customer Experience Online And In The Real WorldAbout this Discussion: It's a fact that as we become more dependent on technology for customer experience, traditional brick and mortar retail businesses must align for evolving expectations. It is simply not enough to have product available to touch, taste, experience. Consumers are very interested in better products at better prices and better experiences. Even now, retailers are still challenged with managing  omnichannels in an effective way where both the online business is truly integrated with the traditional shopping experience. Julian Fisher, CEO of Jisp, saw this big gap between the messaging and experience and service between online and brick a...2019-11-1945 minUNSW Canberra PodcastsUNSW Canberra PodcastsS1E2 - Edward Farrell @ DEF CON - Password123In this episode Edward Farrell provides a realtime review of DEFCON27. Edward, tired but - cyber inspired – called in from Los Angeles International Airport(LAX) before flying home to Australia. DEFCON is the world’s largest hacker conference, or ‘con’. Jeff Moss(Dark Tangent) started DEFCON in 1993. DEFCON is also one of the world’s longest running hacker cons. Only Europe’s Chaos Communication Congress beats DEFCON’s record for longevity. Today, hacker cons, including Canberra’s very own annual ‘Cybernats, ’ - Bsides - are an integral part of infosec culture. Farrell is Director of Mercury ISS and has regularly made the annual hack...2019-08-2128 minThe Jason & Scot Show - E-Commerce And Retail NewsThe Jason & Scot Show - E-Commerce And Retail News2018 Cyber-5 Recap w/ Adobe's Tamera GaffneyEP155 - Cyber-5 Recap w/ Adobe's Tamera Gaffney. Tamara Gaffney (@tamarag) is the Adobe’s Principal Analyst, Experience Index.  Tamera joins us to discuss the holiday e-commerce results from Black Friday through Cyber Monday (Cyber 5).  Tamera has access to anonymous, and aggregated data from more than 5,000 companies worldwide that use the Adobe Digital Marketing Cloud (including Adobe Analytics formerly known as Omniture), which represents one of the largest samples of the overall e-commerce industry available.  Her team publishes useful insights based on that data throughout the year. Adobe 2018 Holiday Forecast and Realtime Holiday Dashboard Adobe...2018-11-2935 minThe Jason & Scot Show - E-Commerce And Retail NewsThe Jason & Scot Show - E-Commerce And Retail NewsCyber 5 Recap with Adobe's Tamara GaffneyTamara Gaffney is the Director of the Strategic Insights Engagement Group at Adobe.  Tamera joins us to discuss the holiday e-commerce results from Black Friday through Cyber Monday (Cyber 5).  Tamera has access to anonymous, and aggregated data from more than 5,000 companies worldwide that use the Adobe Digital Marketing Cloud (including Adobe Analytics formerly known as Omniture), which represents one of the largest samples of the overall e-commerce industry available.  Her team publishes useful insights based on that data throughout the year. Adobe 2017 Holiday Forecast and Realtime Holiday Dashboard Adobe Digital Insights Adobe Digital Price...2017-12-0556 minLaravel News PodcastLaravel News PodcastPresets, Editors, and Laracon 2018Jake and Michael take on episode 50 talking about survey results, frontend presets, code editors, Laracon in 2018, and a whole lot more. Show Links 2017 Laravel survey results Laravel Frontend Presets A Tailwind CSS preset for Laravel 5.5 Bootstrap 4 Laravel preset for Laravel 5.5 Laracasts: Free Visual Studio Code course Visual Studio Announces Live Share Atom Teletype - Code collaboration in realtime Laravel v5.5.20 released assertValidationErrors and assertJsonCount allOnQueue and allOnConnection Laravel v5.5.21 released Learn how to write a Vue JS wrapper component Focus App Laracon US 2018 website coming Cyber Monday Laracon AU 2018 Manage model revisions with ease...2017-11-2156 minDe Grote Tech Show | BNRDe Grote Tech Show | BNREinde van de batterij in IoTMede mogelijk gemaakt door: Orange Cyberdefense Tech in de politiekNog maar twee weken en dan mogen we weer stemmen voor een nieuwe Tweede Kamer. Deze weken besteden we daarom aandacht aan welke plannen de verschillende politieke partijen hebben, als het gaat om technologie en het digitale. Vandaag te gast is ChristenUnie-Kamerlid Eppo Bruins, nummer 5 op de kandidatenlijst van die partij. TechnieuwsIn het technieuws aandacht voor: de CEO van Uber zegt sorry wegens niet-professioneel gedrag, de opvolger van slimme pop Cayla is de slimme teddybear van CloudPets en het Defensie Cyber...2017-03-0123 minAgainst the Grain - The PodcastAgainst the Grain - The PodcastReimagining Our World at Planetary Scale: The Big Data Future of Our LibrariesReimagining Our World at Planetary Scale: The Big Data Future of Our Libraries What happens when massive computing power brings together an ever-growing cross-section of the world’s information in realtime, from news media to social media, books to academic literature, the world’s libraries to the web itself, machine translates all of that material as it arrives, and applies a vast array of algorithms to identify the events and emotions, actors and narratives and their myriad connections that define the planet to create a living silicon replica of global society? The GDELT Project (gdeltproject.org/), supported by G...2016-12-1835 minCyber, cyber...Cyber, cyber...Cyber, Cyber… – 1 – Zaczynamy!Zapraszamy do wysłuchania rozmowy z udziałem: Adama Haertle (UPC Polska), Sergiusza Bazańskiego (Dragon Sector) i Mirosława Maja (Fundacja Bezpieczna Cyberprzestrzeń). Zaproszeni goście komentują ostatnie wydarzenia ze świata bezpieczeństwa teleinformatycznego. Podcast jest pierwszym z serii planowanych audycji. Serdecznie zapraszamy do wysłuchania dzisiejszego odcinka:   https://www.cybsecurity.org/wp-content/uploads/2015/04/FBC-podcast-10.mp3 Tematy poruszane w trakcie podcastu: 1. HTTP.sys – krytyczny błąd w usłudze Microsoft (MS15-34) 2. #OpPoland – Czy 26 kwietnia czekają nas ataki w polskim Internecie 3. Atak na francuską telewizję TV...2015-04-2100 min