A Cybersecurity Lawyer and an IT Specialist helping to demystify the world of cybersecurity. The language and terminology of cybersecurity is oftentimes intentionally confusing and hard to keep up with even for experienced professionals. Each week, we will break down different topics in the cybersecurity, data security, and privacy fields to help you be able to keep up. Understanding cybersecurity has never been more important to everyday life, but also never more difficult to do.
…
continue reading
1
Ransomware-as-a-Service: The New Normal in Cyber Warfare
28:45
28:45
Daha Sonra Çal
Daha Sonra Çal
Listeler
Beğen
Beğenildi
28:45
What if I told you that for a few dollars a month, you could become the proud owner of a new cybercrime franchise? Well, that's where the current world of extortion-for-hire has gone: ransomware-as-a-service.Fearless Paranoia tarafından oluşturuldu
…
continue reading
1
Phishing-Resistant Multi-Factor Authentication: What You Need to Know
23:45
23:45
Daha Sonra Çal
Daha Sonra Çal
Listeler
Beğen
Beğenildi
23:45
Mult-Factor Authentication has too often been talked about as though it is a cure to all cybersecurity failures. It's not. But make sure that you're using phishing-resistant MFA to get the best protection available.Fearless Paranoia tarafından oluşturuldu
…
continue reading
1
Multi-Factor Extortion: The Evolution of Modern Ransomware Tactics
28:35
28:35
Daha Sonra Çal
Daha Sonra Çal
Listeler
Beğen
Beğenildi
28:35
For our 50th episode, we discuss how ransomware gangs have adapted their tactics in response to improved cybersecurity defenses, and some tips on the best ways to fight against this increasingly dangerous threat.Fearless Paranoia tarafından oluşturuldu
…
continue reading
1
A Tale of Two Hacks: Inside the Microsoft and CloudFlare Breaches
38:55
38:55
Daha Sonra Çal
Daha Sonra Çal
Listeler
Beğen
Beğenildi
38:55
It was the best of times, it was... late 2023. Two major tech companies, two nation-state attackers. One company set the standard for how to respond, the other, well, didn't.Fearless Paranoia tarafından oluşturuldu
…
continue reading
1
How to Make Your Employer Fix Their Terrible Cybersecurity Training
37:26
37:26
Daha Sonra Çal
Daha Sonra Çal
Listeler
Beğen
Beğenildi
37:26
Discover why effective cybersecurity training is crucial, but why most employers fail to do it right. Here are 4 critical steps for your company to make it engaging, relevant, and inclusive.Fearless Paranoia tarafından oluşturuldu
…
continue reading
1
The End of Passwords? The Rise of Passwordless Security
22:22
22:22
Daha Sonra Çal
Daha Sonra Çal
Listeler
Beğen
Beğenildi
22:22
Explore the shift from traditional passwords to passwordless systems, the risks of password reuse, and strategies for robust digital security.Fearless Paranoia tarafından oluşturuldu
…
continue reading
1
Stealing DNA: 23andMe's Terrifying Cybersecurity Failure
27:59
27:59
Daha Sonra Çal
Daha Sonra Çal
Listeler
Beğen
Beğenildi
27:59
We return to the 23andMe breach, analyzing DNA data security, user-corporate responsibility balance, and the implications of genetic information hacking.Fearless Paranoia tarafından oluşturuldu
…
continue reading
1
Kaspersky Under Attack: Behind the Scenes of Operation Triangulation
31:53
31:53
Daha Sonra Çal
Daha Sonra Çal
Listeler
Beğen
Beğenildi
31:53
Delve into Operation Triangulation: a sophisticated cyberattack on Kaspersky, showcasing emerging cybersecurity challenges.Fearless Paranoia tarafından oluşturuldu
…
continue reading
1
The Year in Review: The Biggest Cybersecurity Stories of 2023
40:34
40:34
Daha Sonra Çal
Daha Sonra Çal
Listeler
Beğen
Beğenildi
40:34
From major companies hit with multiple cyberattacks to the operational chaos at OpenAI, there have been some big events with major cybersecurity ramifications in 2023. Here are the biggest cybersecurity stories from a busy year.Fearless Paranoia tarafından oluşturuldu
…
continue reading
1
The Year in Review: 2023’s 10 Most Notable Cyberattacks
36:19
36:19
Daha Sonra Çal
Daha Sonra Çal
Listeler
Beğen
Beğenildi
36:19
We explore the 10 most notable cyberattacks of 2023, from Twitter's data leak to the MongoDB breach, in this review of the past year.Fearless Paranoia tarafından oluşturuldu
…
continue reading
1
9 Cybersecurity Predictions for 2024
33:49
33:49
Daha Sonra Çal
Daha Sonra Çal
Listeler
Beğen
Beğenildi
33:49
Our 2024 cybersecurity predictions, from AI-driven threats to election interference, and how they'll reshape our digital world.Fearless Paranoia tarafından oluşturuldu
…
continue reading
1
Network Overload: Understanding and Overcoming IT Burnout
36:14
36:14
Daha Sonra Çal
Daha Sonra Çal
Listeler
Beğen
Beğenildi
36:14
fIT burnout is an epidemic that's sweeping through tech departments worldwide. We dissect the causes, from the cybersecurity skills gap to the overwhelming workload, and offer practical strategies for mitigation.Fearless Paranoia tarafından oluşturuldu
…
continue reading
1
Getting Hacked without Getting Hacked: The 23andMe Nightmare
22:37
22:37
Daha Sonra Çal
Daha Sonra Çal
Listeler
Beğen
Beğenildi
22:37
Unraveling the 23andMe data leak: Join us as we discuss the profound privacy risks when millions of DNA profiles become a dark web commodity.Fearless Paranoia tarafından oluşturuldu
…
continue reading
1
AI Cybercrime: The New Face of Spearfishing
23:26
23:26
Daha Sonra Çal
Daha Sonra Çal
Listeler
Beğen
Beğenildi
23:26
Explore AI's role in enhancing spear phishing attacks & the need for advanced cybersecurity. Tune in & stay vigilant!Fearless Paranoia tarafından oluşturuldu
…
continue reading
1
The MGM Data Breach: 10 Lessons to Limit Your Cybersecurity Flaws
31:42
31:42
Daha Sonra Çal
Daha Sonra Çal
Listeler
Beğen
Beğenildi
31:42
Dive into the MGM Data Breach: Discover root causes, the impact of credential stuffing, and 10 vital cybersecurity lessons for businesses.Fearless Paranoia tarafından oluşturuldu
…
continue reading
1
Quantum Computing and the End of Encryption
28:24
28:24
Daha Sonra Çal
Daha Sonra Çal
Listeler
Beğen
Beğenildi
28:24
Deep dive into quantum computing: its potential, mechanics, challenges, and implications for our digital future.Fearless Paranoia tarafından oluşturuldu
…
continue reading
1
How Cybercriminals Stay Anonymous Online
23:54
23:54
Daha Sonra Çal
Daha Sonra Çal
Listeler
Beğen
Beğenildi
23:54
One of the most effective tools cybercriminals have is their ability to stay anonymous. How do they do it in a world where everything and everyone is tracked almost all the time?Fearless Paranoia tarafından oluşturuldu
…
continue reading
1
The 5 Insider Threats Everyone Needs to Watch Out For
29:33
29:33
Daha Sonra Çal
Daha Sonra Çal
Listeler
Beğen
Beğenildi
29:33
Some of the greatest cybersecurity threats don't need to get past your security perimeter - they're already inside. Here are the five most significant insider threats you need to know about.Fearless Paranoia tarafından oluşturuldu
…
continue reading
1
The Dark Web - Busting the Myths About the Internet’s Underground
21:04
21:04
Daha Sonra Çal
Daha Sonra Çal
Listeler
Beğen
Beğenildi
21:04
Uncover the reality of the Dark Web in our latest episode. Beyond the myth, we explore its structure, uses, and inherent risks.Fearless Paranoia tarafından oluşturuldu
…
continue reading
1
A Hacker’s Walking Tour - How Physical Security Determines Cybersecurity
33:04
33:04
Daha Sonra Çal
Daha Sonra Çal
Listeler
Beğen
Beğenildi
33:04
Discover unseen cybersecurity risks in your office space as we explore the importance of physical security in digital defense.Fearless Paranoia tarafından oluşturuldu
…
continue reading
1
The Shadow IT Nightmare: How to Protect Yourself from this Dangerous Tech
21:26
21:26
Daha Sonra Çal
Daha Sonra Çal
Listeler
Beğen
Beğenildi
21:26
The pandemic has led to the rise of what's called "Shadow IT." We discuss what that means, and what you can do about it.Fearless Paranoia tarafından oluşturuldu
…
continue reading
1
The SolarWinds Hack: 4 Supply Chain Attack Survival Tips You Need to Know
21:55
21:55
Daha Sonra Çal
Daha Sonra Çal
Listeler
Beğen
Beğenildi
21:55
Discover the rising threat of supply chain attacks and ways to protect yourself in today's digital landscape.Fearless Paranoia tarafından oluşturuldu
…
continue reading
1
Cybersecurity Testing Essentials: A Comparison of Key Approaches for Small Businesses
28:01
28:01
Daha Sonra Çal
Daha Sonra Çal
Listeler
Beğen
Beğenildi
28:01
We explore cybersecurity testing methods for businesses: vulnerability assessments, penetration testing, & red team tests. Stay secure out there!Fearless Paranoia tarafından oluşturuldu
…
continue reading
1
The Dark Side of Generative AI: 11 Looming Dangers You Need To Know
23:52
23:52
Daha Sonra Çal
Daha Sonra Çal
Listeler
Beğen
Beğenildi
23:52
Explore the perils of Generative AI, from plagiarism to misinformation, and from cyber threats to the end of objective reality.Fearless Paranoia tarafından oluşturuldu
…
continue reading
1
The Benefits of Artificial Intelligence: 13 Ways AI Will Make the World Better
21:14
21:14
Daha Sonra Çal
Daha Sonra Çal
Listeler
Beğen
Beğenildi
21:14
In this episode, we explore the benefits of AI: revolutionizing industries, improving lives, and enhancing human capabilities.Fearless Paranoia tarafından oluşturuldu
…
continue reading
1
What is ChatGPT? Understanding the New Face of AI
19:58
19:58
Daha Sonra Çal
Daha Sonra Çal
Listeler
Beğen
Beğenildi
19:58
Discover the power and potential of Generative AI and Large Language Models. Check out this episode to learn about these amazing/terrifying technologies.Fearless Paranoia tarafından oluşturuldu
…
continue reading
1
Two New Zero Day Exploits to Make Sure You Never Feel Too Secure
16:30
16:30
Daha Sonra Çal
Daha Sonra Çal
Listeler
Beğen
Beğenildi
16:30
Zero-day exploits are the silent killers of the cybersecurity world, and these two are no different. Can you possibly protect yourself?Fearless Paranoia tarafından oluşturuldu
…
continue reading
1
The T-Mobile Data Breach: What You Need to Know About SIM Swapping Attacks
22:05
22:05
Daha Sonra Çal
Daha Sonra Çal
Listeler
Beğen
Beğenildi
22:05
When T-Mobile was hacked, and the entire dataset of millions of customers were leaked, did you consider that the hackers would take that data right back to T-Mobile? You should have.Fearless Paranoia tarafından oluşturuldu
…
continue reading
1
How to Stop and Overcome a Business Email Compromise Attack
26:40
26:40
Daha Sonra Çal
Daha Sonra Çal
Listeler
Beğen
Beğenildi
26:40
One of the most common and most dangerous types of cyberattacks is a Business Email Compromise. We discuss what a BEC is, what makes it so devastating, and how to protect yourself.Fearless Paranoia tarafından oluşturuldu
…
continue reading
1
How Multi-Factor Authentication Protects You, Your Data, and Your Privacy
28:03
28:03
Daha Sonra Çal
Daha Sonra Çal
Listeler
Beğen
Beğenildi
28:03
Proving that you are who you say you are is the primary goal of most cybersecurity systems. The best way to accomplish that task is through Multi-Factor Authentication. Here's how:Fearless Paranoia tarafından oluşturuldu
…
continue reading
Failing to properly secure your data using API best practices is like having the best home security system on the market, but leaving the back door open. Here's how to avoid that mistake.Fearless Paranoia tarafından oluşturuldu
…
continue reading
1
The Power and Peril of APIs - The T-Mobile Data Breach
19:24
19:24
Daha Sonra Çal
Daha Sonra Çal
Listeler
Beğen
Beğenildi
19:24
37 million customer records were recently stolen from T-Moblie by exploiting an API. So what are APIs, and why are they such a popular tool for hackers? We discuss.Fearless Paranoia tarafından oluşturuldu
…
continue reading
1
How to Make Sense of Encryption When You’re Not an IT Pro
17:18
17:18
Daha Sonra Çal
Daha Sonra Çal
Listeler
Beğen
Beğenildi
17:18
Another one of those cybersecurity concepts that is talked about a lot but difficult to fully understand is Encryption. By understanding a few basic concepts, you can make sense of it all.Fearless Paranoia tarafından oluşturuldu
…
continue reading
1
How to Protect Your Personal Privacy Online: 8 Steps You Need to Take Immediately
17:28
17:28
Daha Sonra Çal
Daha Sonra Çal
Listeler
Beğen
Beğenildi
17:28
Keeping your private information secret just feels hard to accomplish these days. Fortunately, there are steps you can take - right now - that can protect your privacy and secure your online identity.Fearless Paranoia tarafından oluşturuldu
…
continue reading
1
6 Easy Ways to Secure Your Personal Data and Devices
18:30
18:30
Daha Sonra Çal
Daha Sonra Çal
Listeler
Beğen
Beğenildi
18:30
Technology moves pretty fast these days. It can be difficult to know what to do to best protect your personal data from theft or loss. Here are some tips, straight from the expert.Fearless Paranoia tarafından oluşturuldu
…
continue reading
1
The LastPass Breach: 3 Steps You Need to Take Immediately
24:13
24:13
Daha Sonra Çal
Daha Sonra Çal
Listeler
Beğen
Beğenildi
24:13
There are a lot of opinions floating around about the most recent LastPass breach. But before you read those, do these three things right now, and thank us later.Fearless Paranoia tarafından oluşturuldu
…
continue reading
1
What is Zero Trust Cybersecurity (and Can I Afford It)?
18:08
18:08
Daha Sonra Çal
Daha Sonra Çal
Listeler
Beğen
Beğenildi
18:08
One of the hottest buzz-phrases in cybersecurity these days is “zero trust.” In this episode, we talk about the three elements of zero trust cybersecurity, and how to implement a zero trust model without breaking the bank.Fearless Paranoia tarafından oluşturuldu
…
continue reading
1
Why Resilience is the Most Important Way to Measure Cybersecurity
18:24
18:24
Daha Sonra Çal
Daha Sonra Çal
Listeler
Beğen
Beğenildi
18:24
Your cybersecurity systems may be top-notch, with an amazing firewall and great protections from cyberattacks. But the true measure of your cybersecurity effectiveness is your resilience - your ability to recover from an attack. In this episode, we discuss why.Fearless Paranoia tarafından oluşturuldu
…
continue reading
One of the most common type of cyberattacks used today is the DDoS attack – a Distributed Denial of Service. So what is a DDoS attack, and what can you do to protect yourself from one?Fearless Paranoia tarafından oluşturuldu
…
continue reading
1
How Implementing (and Understanding) Least Privilege can Protect Your Business
17:49
17:49
Daha Sonra Çal
Daha Sonra Çal
Listeler
Beğen
Beğenildi
17:49
The more access users have to company data, the more vulnerable that data is in the event of a breach. To limit your company's risks, users should have the least privilege they need to do their jobs.Fearless Paranoia tarafından oluşturuldu
…
continue reading
1
Eufy’s Privacy Blunder - Don’t Promise What You Don’t Provide
21:51
21:51
Daha Sonra Çal
Daha Sonra Çal
Listeler
Beğen
Beğenildi
21:51
Eufy made a name for itself as a video baby monitor company that provided peace of mind - in the form of top-of-the-line security to protect your privacy. It turns out their promises were more than a little bit hollow.Fearless Paranoia tarafından oluşturuldu
…
continue reading
1
8 Lessons from the Uber Hack
22:40
22:40
Daha Sonra Çal
Daha Sonra Çal
Listeler
Beğen
Beğenildi
22:40
In September 2022, Uber suffered a massive, unique security breach. The hacker actually told the world how it was done. Here are 8 lessons businesses need to learn from this event.Fearless Paranoia tarafından oluşturuldu
…
continue reading
1
The Open SSL Vulnerability - What It Is, and What Can Be Done
11:14
11:14
Daha Sonra Çal
Daha Sonra Çal
Listeler
Beğen
Beğenildi
11:14
Open SSL is the basis for a lot of secure communication on the internet, and it's got a major vulnerability. We talk about what Open SSL does, and how you can protect yourself from this and other similar problems.Fearless Paranoia tarafından oluşturuldu
…
continue reading
1
Automated Vulnerability Scanning - Why It’s Critical To Know Your Weaknesses
11:36
11:36
Daha Sonra Çal
Daha Sonra Çal
Listeler
Beğen
Beğenildi
11:36
One of the big shifts in cyber crime over the past 20 years has been from manual to automated processes. Automatically scanning for vulnerabilities now happens every minute. What will they find?Fearless Paranoia tarafından oluşturuldu
…
continue reading
1
Disaster Plans - Are You Prepared for the Worst?
23:16
23:16
Daha Sonra Çal
Daha Sonra Çal
Listeler
Beğen
Beğenildi
23:16
Disasters happen. Without a sufficient recovery plan in place - one that is written for your business, updated regularly, and tested and rehearsed - the only thing protecting your business, your employees, and your customers is luck.Fearless Paranoia tarafından oluşturuldu
…
continue reading
1
Do You Need an Endpoint Detection System?
26:18
26:18
Daha Sonra Çal
Daha Sonra Çal
Listeler
Beğen
Beğenildi
26:18
They're required by insurance companies, governments, and other companies. So what is an Endpoint Detection System, and does your business need one?Fearless Paranoia tarafından oluşturuldu
…
continue reading
1
When Countries use Cyberattacks, How Do You Know?
15:24
15:24
Daha Sonra Çal
Daha Sonra Çal
Listeler
Beğen
Beğenildi
15:24
Knowing who is responsible for a cyberattack can be crucial in determining whether the damages will be covered by insurance. So how do you ever really know?Fearless Paranoia tarafından oluşturuldu
…
continue reading
1
When is a Cyber War a Real War?
15:52
15:52
Daha Sonra Çal
Daha Sonra Çal
Listeler
Beğen
Beğenildi
15:52
The Wanna Cry and Not Petya malware attacks were nation state-sponsored attacks, with a lot of collateral damage and victims. Are you protected for when it happens again?Fearless Paranoia tarafından oluşturuldu
…
continue reading
1
We Don’t Negotiate with Hackers... Or Best Offer
24:39
24:39
Daha Sonra Çal
Daha Sonra Çal
Listeler
Beğen
Beğenildi
24:39
Ransomware and other forms of cyber extortion can put your business in a tough spot. Isn't negotiating with criminals wrong? Here are things to consider before you have to make that decision.Fearless Paranoia tarafından oluşturuldu
…
continue reading
1
What Is This Crap? Or Understanding Cyber Insurance
24:42
24:42
Daha Sonra Çal
Daha Sonra Çal
Listeler
Beğen
Beğenildi
24:42
Cyber Insurance is becoming an absolute necessity for small businesses, but is also largely unregulated, inconsistent, and packed with special terms and clauses. Here's what you need to know.Fearless Paranoia tarafından oluşturuldu
…
continue reading