Player FM - Internet Radio Done Right
Checked 2M ago
Adicionado há três anos atrás
Contenuto fornito da Fearless Paranoia. Tutti i contenuti dei podcast, inclusi episodi, grafica e descrizioni dei podcast, vengono caricati e forniti direttamente da Fearless Paranoia o dal partner della piattaforma podcast. Se ritieni che qualcuno stia utilizzando la tua opera protetta da copyright senza la tua autorizzazione, puoi seguire la procedura descritta qui https://it.player.fm/legal.
Player FM - App Podcast
Vai offline con l'app Player FM !
Vai offline con l'app Player FM !
Podcast che vale la pena ascoltare
SPONSORIZZATO
AI and Generative AI are transforming cybersecurity by enhancing threat detection and response. These technologies offer unmatched accuracy and efficiency, making them crucial for protecting sensitive data. As cyber threats evolve, integrating AI into security strategies is essential. This week, Dave, Esmee and Rob talk to Corence Klop, CISO at the Rabobank, about the expanding role of AI and Generative AI in cybersecurity, and how to begin integrating these technologies into your organization. TLDR 04:45 Rob is confused about wrong AI information for a hotel booking 08:20 Conversation with Corence 33:40 How can you identify the state of flow for your end-user in agile practices? 40:50 Going to the swimming pool and disco with your daughter Guest Corence Klop: https://www.linkedin.com/in/corenceklop/ Hosts Dave Chapman: https://www.linkedin.com/in/chapmandr/ Esmee van de Giessen: https://www.linkedin.com/in/esmeevandegiessen/ Rob Kernahan: https://www.linkedin.com/in/rob-kernahan/ Production Marcel van der Burg: https://www.linkedin.com/in/marcel-vd-burg/ Dave Chapman: https://www.linkedin.com/in/chapmandr/ Sound Ben Corbett: https://www.linkedin.com/in/ben-corbett-3b6a11135/ Louis Corbett: https://www.linkedin.com/in/louis-corbett-087250264/ ' Cloud Realities' is an original podcast from Capgemini…
The End of Passwords? The Rise of Passwordless Security
Manage episode 397068910 series 3384305
Contenuto fornito da Fearless Paranoia. Tutti i contenuti dei podcast, inclusi episodi, grafica e descrizioni dei podcast, vengono caricati e forniti direttamente da Fearless Paranoia o dal partner della piattaforma podcast. Se ritieni che qualcuno stia utilizzando la tua opera protetta da copyright senza la tua autorizzazione, puoi seguire la procedura descritta qui https://it.player.fm/legal.
Explore the shift from traditional passwords to passwordless systems, the risks of password reuse, and strategies for robust digital security.
52 episodi
Manage episode 397068910 series 3384305
Contenuto fornito da Fearless Paranoia. Tutti i contenuti dei podcast, inclusi episodi, grafica e descrizioni dei podcast, vengono caricati e forniti direttamente da Fearless Paranoia o dal partner della piattaforma podcast. Se ritieni che qualcuno stia utilizzando la tua opera protetta da copyright senza la tua autorizzazione, puoi seguire la procedura descritta qui https://it.player.fm/legal.
Explore the shift from traditional passwords to passwordless systems, the risks of password reuse, and strategies for robust digital security.
52 episodi
Todos os episódios
×What if I told you that for a few dollars a month, you could become the proud owner of a new cybercrime franchise? Well, that's where the current world of extortion-for-hire has gone: ransomware-as-a-service.
Mult-Factor Authentication has too often been talked about as though it is a cure to all cybersecurity failures. It's not. But make sure that you're using phishing-resistant MFA to get the best protection available.
For our 50th episode, we discuss how ransomware gangs have adapted their tactics in response to improved cybersecurity defenses, and some tips on the best ways to fight against this increasingly dangerous threat.
It was the best of times, it was... late 2023. Two major tech companies, two nation-state attackers. One company set the standard for how to respond, the other, well, didn't.
Discover why effective cybersecurity training is crucial, but why most employers fail to do it right. Here are 4 critical steps for your company to make it engaging, relevant, and inclusive.
Explore the shift from traditional passwords to passwordless systems, the risks of password reuse, and strategies for robust digital security.
We return to the 23andMe breach, analyzing DNA data security, user-corporate responsibility balance, and the implications of genetic information hacking.
Delve into Operation Triangulation: a sophisticated cyberattack on Kaspersky, showcasing emerging cybersecurity challenges.
From major companies hit with multiple cyberattacks to the operational chaos at OpenAI, there have been some big events with major cybersecurity ramifications in 2023. Here are the biggest cybersecurity stories from a busy year.
We explore the 10 most notable cyberattacks of 2023, from Twitter's data leak to the MongoDB breach, in this review of the past year.
Our 2024 cybersecurity predictions, from AI-driven threats to election interference, and how they'll reshape our digital world.
fIT burnout is an epidemic that's sweeping through tech departments worldwide. We dissect the causes, from the cybersecurity skills gap to the overwhelming workload, and offer practical strategies for mitigation.
Unraveling the 23andMe data leak: Join us as we discuss the profound privacy risks when millions of DNA profiles become a dark web commodity.
Explore AI's role in enhancing spear phishing attacks & the need for advanced cybersecurity. Tune in & stay vigilant!
Dive into the MGM Data Breach: Discover root causes, the impact of credential stuffing, and 10 vital cybersecurity lessons for businesses.
Deep dive into quantum computing: its potential, mechanics, challenges, and implications for our digital future.
One of the most effective tools cybercriminals have is their ability to stay anonymous. How do they do it in a world where everything and everyone is tracked almost all the time?
Some of the greatest cybersecurity threats don't need to get past your security perimeter - they're already inside. Here are the five most significant insider threats you need to know about.
Uncover the reality of the Dark Web in our latest episode. Beyond the myth, we explore its structure, uses, and inherent risks.
Discover unseen cybersecurity risks in your office space as we explore the importance of physical security in digital defense.
The pandemic has led to the rise of what's called "Shadow IT." We discuss what that means, and what you can do about it.
Discover the rising threat of supply chain attacks and ways to protect yourself in today's digital landscape.
F
Fearless Paranoia

We explore cybersecurity testing methods for businesses: vulnerability assessments, penetration testing, & red team tests. Stay secure out there!
Explore the perils of Generative AI, from plagiarism to misinformation, and from cyber threats to the end of objective reality.
F
Fearless Paranoia

In this episode, we explore the benefits of AI: revolutionizing industries, improving lives, and enhancing human capabilities.
Discover the power and potential of Generative AI and Large Language Models. Check out this episode to learn about these amazing/terrifying technologies.
Zero-day exploits are the silent killers of the cybersecurity world, and these two are no different. Can you possibly protect yourself?
F
Fearless Paranoia

When T-Mobile was hacked, and the entire dataset of millions of customers were leaked, did you consider that the hackers would take that data right back to T-Mobile? You should have.
One of the most common and most dangerous types of cyberattacks is a Business Email Compromise. We discuss what a BEC is, what makes it so devastating, and how to protect yourself.
Proving that you are who you say you are is the primary goal of most cybersecurity systems. The best way to accomplish that task is through Multi-Factor Authentication. Here's how:
Benvenuto su Player FM!
Player FM ricerca sul web podcast di alta qualità che tu possa goderti adesso. È la migliore app di podcast e funziona su Android, iPhone e web. Registrati per sincronizzare le iscrizioni su tutti i tuoi dispositivi.