Player FM - Internet Radio Done Right
Checked 2M ago
Aggiunto tre anni fa
Contenuto fornito da Fearless Paranoia. Tutti i contenuti dei podcast, inclusi episodi, grafica e descrizioni dei podcast, vengono caricati e forniti direttamente da Fearless Paranoia o dal partner della piattaforma podcast. Se ritieni che qualcuno stia utilizzando la tua opera protetta da copyright senza la tua autorizzazione, puoi seguire la procedura descritta qui https://it.player.fm/legal.
Player FM - App Podcast
Vai offline con l'app Player FM !
Vai offline con l'app Player FM !
Podcast che vale la pena ascoltare
SPONSORIZZATO
For many travelers, Antarctica is a bucket-list destination, a once-in-a-lifetime opportunity to touch all seven continents. In 2023, a record-breaking 100,000 tourists made the trip. But the journey begs a fundamental question: What do we risk by traveling to a place that is supposed to be uninhabited by humans? And as the climate warms, should we really be going to Antarctica in the first place? SHOW NOTES: Kara Weller: The Impossible Dilemma of a Polar Guide Marilyn Raphael: A twenty-first century structural change in Antarctica’s sea ice system Karl Watson: First Time in Antarctica Jeb Brooks : 7 Days in Antarctica (Journey to the South Pole) Metallica - Freeze 'Em All: Live in Antarctica Learn about your ad choices: dovetail.prx.org/ad-choices…
Phishing-Resistant Multi-Factor Authentication: What You Need to Know
Manage episode 403580168 series 3384305
Contenuto fornito da Fearless Paranoia. Tutti i contenuti dei podcast, inclusi episodi, grafica e descrizioni dei podcast, vengono caricati e forniti direttamente da Fearless Paranoia o dal partner della piattaforma podcast. Se ritieni che qualcuno stia utilizzando la tua opera protetta da copyright senza la tua autorizzazione, puoi seguire la procedura descritta qui https://it.player.fm/legal.
Mult-Factor Authentication has too often been talked about as though it is a cure to all cybersecurity failures. It's not. But make sure that you're using phishing-resistant MFA to get the best protection available.
52 episodi
Manage episode 403580168 series 3384305
Contenuto fornito da Fearless Paranoia. Tutti i contenuti dei podcast, inclusi episodi, grafica e descrizioni dei podcast, vengono caricati e forniti direttamente da Fearless Paranoia o dal partner della piattaforma podcast. Se ritieni che qualcuno stia utilizzando la tua opera protetta da copyright senza la tua autorizzazione, puoi seguire la procedura descritta qui https://it.player.fm/legal.
Mult-Factor Authentication has too often been talked about as though it is a cure to all cybersecurity failures. It's not. But make sure that you're using phishing-resistant MFA to get the best protection available.
52 episodi
Tutti gli episodi
×What if I told you that for a few dollars a month, you could become the proud owner of a new cybercrime franchise? Well, that's where the current world of extortion-for-hire has gone: ransomware-as-a-service.
Mult-Factor Authentication has too often been talked about as though it is a cure to all cybersecurity failures. It's not. But make sure that you're using phishing-resistant MFA to get the best protection available.
For our 50th episode, we discuss how ransomware gangs have adapted their tactics in response to improved cybersecurity defenses, and some tips on the best ways to fight against this increasingly dangerous threat.
It was the best of times, it was... late 2023. Two major tech companies, two nation-state attackers. One company set the standard for how to respond, the other, well, didn't.
Discover why effective cybersecurity training is crucial, but why most employers fail to do it right. Here are 4 critical steps for your company to make it engaging, relevant, and inclusive.
Explore the shift from traditional passwords to passwordless systems, the risks of password reuse, and strategies for robust digital security.
We return to the 23andMe breach, analyzing DNA data security, user-corporate responsibility balance, and the implications of genetic information hacking.
Delve into Operation Triangulation: a sophisticated cyberattack on Kaspersky, showcasing emerging cybersecurity challenges.
From major companies hit with multiple cyberattacks to the operational chaos at OpenAI, there have been some big events with major cybersecurity ramifications in 2023. Here are the biggest cybersecurity stories from a busy year.
We explore the 10 most notable cyberattacks of 2023, from Twitter's data leak to the MongoDB breach, in this review of the past year.
Our 2024 cybersecurity predictions, from AI-driven threats to election interference, and how they'll reshape our digital world.
fIT burnout is an epidemic that's sweeping through tech departments worldwide. We dissect the causes, from the cybersecurity skills gap to the overwhelming workload, and offer practical strategies for mitigation.
Unraveling the 23andMe data leak: Join us as we discuss the profound privacy risks when millions of DNA profiles become a dark web commodity.
Explore AI's role in enhancing spear phishing attacks & the need for advanced cybersecurity. Tune in & stay vigilant!
Dive into the MGM Data Breach: Discover root causes, the impact of credential stuffing, and 10 vital cybersecurity lessons for businesses.
Deep dive into quantum computing: its potential, mechanics, challenges, and implications for our digital future.
One of the most effective tools cybercriminals have is their ability to stay anonymous. How do they do it in a world where everything and everyone is tracked almost all the time?
Some of the greatest cybersecurity threats don't need to get past your security perimeter - they're already inside. Here are the five most significant insider threats you need to know about.
Uncover the reality of the Dark Web in our latest episode. Beyond the myth, we explore its structure, uses, and inherent risks.
Discover unseen cybersecurity risks in your office space as we explore the importance of physical security in digital defense.
The pandemic has led to the rise of what's called "Shadow IT." We discuss what that means, and what you can do about it.
Discover the rising threat of supply chain attacks and ways to protect yourself in today's digital landscape.
F
Fearless Paranoia

We explore cybersecurity testing methods for businesses: vulnerability assessments, penetration testing, & red team tests. Stay secure out there!
Explore the perils of Generative AI, from plagiarism to misinformation, and from cyber threats to the end of objective reality.
F
Fearless Paranoia

In this episode, we explore the benefits of AI: revolutionizing industries, improving lives, and enhancing human capabilities.
Discover the power and potential of Generative AI and Large Language Models. Check out this episode to learn about these amazing/terrifying technologies.
Zero-day exploits are the silent killers of the cybersecurity world, and these two are no different. Can you possibly protect yourself?
F
Fearless Paranoia

When T-Mobile was hacked, and the entire dataset of millions of customers were leaked, did you consider that the hackers would take that data right back to T-Mobile? You should have.
One of the most common and most dangerous types of cyberattacks is a Business Email Compromise. We discuss what a BEC is, what makes it so devastating, and how to protect yourself.
Proving that you are who you say you are is the primary goal of most cybersecurity systems. The best way to accomplish that task is through Multi-Factor Authentication. Here's how:
Benvenuto su Player FM!
Player FM ricerca sul web podcast di alta qualità che tu possa goderti adesso. È la migliore app di podcast e funziona su Android, iPhone e web. Registrati per sincronizzare le iscrizioni su tutti i tuoi dispositivi.