Breaching Extinction is an investigative podcast evaluating the complexities of the declining Southern Resident Killer Whale population in an effort to better understand the trials they currently face, and find solutions through conversation and connection.
Exclusive, insightful audio interviews by our staff with data breach/security leading practitioners and thought-leaders
Reality Breached is a Podcast about Video Games, Movies and…well, I guess we are still trying to figure that out. Things tend to get weird, enjoy…subscribe and tell your friends.
The Breachside Broadcast covers all things Wyrd.
Top notch gaming podcast hosted by Get Flanked, Prodigio Pete and Rogue-9. If you are a Rainbow Six Siege or first person shooter fan, this podcast is definitely for you!
Pop culture talk, among other things
Step into The Breach as we expose and explore abuses of power in our government. Part of the Rewire.News podcast network.
Small time guy, with small time opinions on Magic the Gathering
The Reality Breached JXN Spotlight focuses on the people and places that make the Metro-Jackson Mississippi area unique.
Church militant happenings (headlines), phone-a-friends, scripture probably, faith, love, hope, support, advice, inspiration and family shenanigans! Learn more about the battle at http://bit.ly/ITBpodcast 📿 Support this podcast: https://anchor.fm/intothebreach/support
What really happens when a hacker snatches all your data? Breach digs into the who, why and how of history’s most notorious data breaches. Hosted by journalist Bob Sullivan and producer Alia Tavakolian. Season 2 - Equifax: the worst breach ever. How hackers stole the most valuable data of 145 million people, why it matters, and what we can do about it.
Soulstory is an actual play role playing game podcast (RPG) set in the world of Malifaux. Join us as our Fatemaster guides her four players into a story where steam power and magic meet horror cliché's and fairy tales. If you want to know more about Malifaux, be sure to stick around. Each episode is followed by a cast member sharing some tidbits and lore about the universe. Come for the story but be careful. Bad things happen.
A podcast from two third-year law students who don’t have enough on their plate already. Listen as we try to navigate being a twenty-something in law school and provide advice (warnings) to prospective and current students. Support this podcast: https://anchor.fm/badbreaches/support
Welcome to my Podcast. I'm Edwin Perez, a pastor, author, blogger and just a man who is passionate about the Gospel. Here you will find topics, interviews, devotionals, theological discussions, music and more. Check out my website for blogs, articles and teachings at http://www.breachingthewalls.org.
We're a group of four Malifaux enthusiasts that help new players with advice, personal experience, and entertainment in the steampunk streets.
This is “Life, Death and Data Breach”, a podcast about the pains and pitfalls of dealing with sensitive data in large and unorganized company repositories. Jeanne Somma, insights executive and counsel with ayfie and seasoned eDiscovery practitioner and Johannes Stiehler, CEO of ayfie and a linguist at heart discuss how to recognize and solve some of the challenges of discovering and protecting textual information. If you are a legal practitioner, data security officer or just interested in d ...
Welcome to Beyond the Breach. A new series about how individuals and organizations manage change – with a focus on technology’s impact on humanity and the nature of cybersecurity risk. * The show is hosted by Jonathan Reiber, a writer and security strategist who served as a Speechwriter and Chief Strategy Officer for Cyber Policy in the Obama Defense Department, and co-hosted by D.J. Skelton, a combat veteran, retired Army officer, founder of Paradox Sports, and outdoorsman. * In each episod ...
The "remote workforce" of 2020 is gone. Now we're talking about the new, permanent "branch office" - and it comes with its own unique set of cybersecurity concerns, says Derek Manky of FortiGuard Labs. He discusses new social engineering trends and how to respond.DataBreachToday.com による
In this weeks episode Erica chats with Shelby Nielson, PhD student studying epidemiology about a study evaluating the impact of vessel traffic on foraging behavior of the SRKW's. They discuss this study, new regulations in Washington and the recent siting of what was thought to be a long lost Norther Resident Killer Whale. See link's below for more…
Congrats everyone, you've got a front-row seat to the end of American Democracy, maybe you should start Podcast!Sergio Lugo, Reid Walker, Josh Alcaraz, Robert Morris & Others による
In this episode Erica chats with Liam Doucet, activist and high school student from Portland, Oregon about the history of the Lower Snake River Dams as well as their current function. They expand the conversation, exploring the spiritual connection between orca and humans.
This edition of the ISMG Security Report features an analysis of the very latest information about the SolarWinds hack. Also featured are discussions of "zero trust" for the hybrid cloud environment and data privacy regulatory trends.DataBreachToday.com による
In There's Something About Molly, we catch up with Molly Squidpiddge and Philip Tombers who, despite being very dead, still have plenty of ambitions, desires, and resentments.Read By: Henrietta MeiraAnnounced by: Julian SmithMusic: "Terror Theme" by Hakan ErikssonWyrd Miniatures, LLC による
New regulatory provisions that allow healthcare systems to make donations of cybersecurity technology and services to physician practices could help greatly bolster security in the sector, says attorney Julie Kass of law firm Baker Donelson.DataBreachToday.com による
Kicking off Season 2 with our new sponsors at Blackfin Coffee, Brain & Nicole Jenkins. They tell us about the company, their values and what they are help the Southern Residents. Use promo code "BreachExtinction20" for 20% your first order!
Facebook's relaunch and rebrand of its Libra digital payment initiative as Diem is seen by some as a shadow of its former self. Financial services commentator Chris Skinner explains why state governments and AML concerns are to blame.DataBreachToday.com による
As federal regulators intensify their focus on compliance with requirements to provide patients with access to their health information, healthcare organizations need to sort through a variety of emerging challenges, says health information management and privacy expert Rita Bowen.DataBreachToday.com による
The latest edition of the ISMG Security Report offers leadership lessons from Equifax CISO Jamil Farshchi and Mastercard's deputy CSO, Alissa "Dr. Jay" Abdullah. Also featured: An assessment of cybersecurity priorities for President-elect Joe Biden.DataBreachToday.com による
Identity management will be at the forefront of securing remote work in the coming year. Jason Bohrer, new leader of the Secure Technology Alliance and the U.S. Payments Forum, describes key initiatives as he steps into this role.DataBreachToday.com による
The growth in the use of telehealth during the COVID-19 crisis means that healthcare providers must carefully reassess and bolster the security of the connected devices, applications and systems used, says Kelly Rozumalski of the consultancy Booz Allen Hamilton.DataBreachToday.com による
The Unapologetic Geek stops by to adieu to the year from hell, 2020.Sergio Lugo, Reid Walker, Josh Alcaraz, Robert Morris & Others による
In the year ahead, healthcare organizations must be prepared to face an assortment of advancing security threats, including those that damage the integrity of critical patient data, says Rod Piechowski of the Healthcare Information and Management Systems Society.DataBreachToday.com による
The COVID-19 pandemic has spotlighted an array of evolving patient privacy issues that legislators and regulators will need to address in the year ahead, say government policy experts Mari Savickis and Cassie Leonard of the College of Healthcare Information Management Executives.DataBreachToday.com による
After several delays, Wonder Woman 1984 is here. Does it live up to the hype? Reid and Sergio give their instant opinions of DCs latest Super Hero Film entry.Sergio Lugo, Reid Walker, Josh Alcaraz, Robert Morris & Others による
This edition of the ISMG Security Report features insights from David Forscey, managing director at Aspen Cybersecurity Group, on improving supply chain security in the aftermath of the SolarWinds hack. Also featured: Black Hat Europe's key takeaways; keeping safe during the holidays.DataBreachToday.com による
The Mandalorian Season 2 ended with a bang and our resident Star Wars experts are here to put the whole series in perspective. Join us for some hot takes and be sure to subscribe.Sergio Lugo, Reid Walker, Josh Alcaraz, Robert Morris & Others による
In light of the SolarWinds supply chain breach and other security incidents, the United States has substantial work to do in building a resilient digital infrastructure, says David Forscey of the Aspen Cyber Group, who outlines a five-step road map.DataBreachToday.com による
The latest edition of the ISMG Security Report features an analysis of what we know so far about the impact of the SolarWinds supply chain hack and how to respond.DataBreachToday.com による
In the conclusion of "Formaldehyde Nights," McMourning and Sebastian see how long they can maintain their ruse.Read By: Henrietta MeiraAnnounced by: Julian SmithMusic: "Terror Theme" by Hakan ErikssonWyrd Miniatures, LLC による
What critical factors should organizations consider before taking the step of paying extortionists a ransom in hopes of regaining access to systems or avoiding the release of data in the wake of a ransomware attack? Former FBI special agent Vincent D'Agostino provides guidance.DataBreachToday.com による
The latest edition of the ISMG Security Report features an analysis of why the FireEye breach is a wake-up call for the cybersecurity industry. Also featured: Monero cryptocurrency scams; key considerations for cloud security.DataBreachToday.com による
In this story, we rejoin Binh and Suchong and learn the true purpose of their training. Read by: Henrietta Meira Announced by: Julian Smith Music: "Red Waltz" by Holypet (Opening & Closing Theme)Wyrd Miniatures, LLC による
This edition of the ISMG Security Report features an analysis of a serious Apple iOS "zero-click exploit" that could have allowed hackers to remotely gain complete control of a device. Also featured: a discussion of identity proofing challenges and a review of New Zealand's updated Privacy Act.DataBreachToday.com による
In part three of The Risk of Reason, Lady Justice and her newly minted Judge confront the traitorous resurrectionist Douglas McMourning. But Lady Justice must also confront a figure from her past.Read by: Ian TravisAnnounced by: Julian SmithMusic: "Frog Secret Agent" by 3 Leg Torso (Opening & Closing), "Campfire" GarageBand Loop, "Rock the Boat" by…
The latest edition of the ISMG Security Report features an analysis of how cybercriminals are ditching banking Trojans in favor of ransomware attacks. Also featured: Defending against deep fakes; supporting a dispersed workforce.DataBreachToday.com による
This edition of the ISMG Security Report features a discussion with Christopher Krebs, the recently fired director of the Cybersecurity Infrastructure Security Agency, on his accomplishments at the agency. Also featured are updates on ransomware gangs recruiting affiliates and healthcare supply chain risks.…
In part one of Formaldehyde Nights, McMourning finds inventive ways to hide his extracurricular activities from his Guild employers. Read By: Henrietta MeiraAnnounced by: Julian SmithMusic: "Terror Theme" by Hakan ErikssonWyrd Miniatures, LLC による
Organizations need to build security into their cloud environments to help thwart cyberthreats, says Tom Corn of VMware, who describes this "intrinsic security" approach.DataBreachToday.com による
In this episode of Reality Recalibrated Danny and Sergio look at the 2020 Election results and wonder how and if things will get back to normal.Sergio Lugo, Reid Walker, Josh Alcaraz, Robert Morris & Others による
With the escalation of cyberattacks on the healthcare sector during the COVID-19 pandemic, supply chain partners need to strengthen their security controls and defenses, say Vishwas Gadgil of pharmaceutical firm Merck and Ed Gaudet of the consultancy Censinet. They describe updated guidance on the subject.…
"Better, cheaper, faster." These are the results that banking institutions can receive by shifting security to the cloud, says David Vergara of OneSpan. At a time when multi-channel fraud is surging and the customer experience is paramount, cloud needs serious consideration, he says.DataBreachToday.com による
The latest edition of the ISMG Security Report features an analysis of how President-elect Joe Biden is expected to renew international relationships needed in the fight against cyberattacks. Also featured: the pandemic's impact on cybercrime; analysis of Europol's annual cybercrime report.DataBreachToday.com による
Louis Marinos of the European Cybersecurity Agency offers an analysis of the agency's new Threat Landscape 2020 report, which shows how cybercriminals have been advancing their capabilities, adapting quickly and targeting victims.DataBreachToday.com による
It’s a well known secret that there is chaos in the data backyards of almost all companies. While we struggle to create and implement policies, guidelines and possibly regulatory compliance, everybody just keeps on creating documents, putting them wherever seems suitable, creating copies and versions. Do you care? Should you care? What can we do to…
The latest edition of the ISMG Security Report features an analysis of the EU General Data Protection Regulation fines that have finally been imposed on Marriott and BA over serious data breaches each suffered. Also featured: Regional digital fraud trends, and a look at the CISO role and its responsibilities.…
In part two of The Assassin's Ball, things get complicated for the assassins who have been hired to kill Lucius. Read By: Henrietta MeiraAnnounced by: Julian SmithMusic: "Terror Theme" by Hakan ErikssonWyrd Miniatures, LLC による
The latest edition of the ISMG Security Report features a discussion with FBI Agent Elvis Chan on the cyber disruptions to expect immediately after the Nov. 3 U.S. election. Also featured: smart lock security flaws; cryptocurrency-funded crimes in 2021.DataBreachToday.com による
In this very special episode we deviate a little bit from our focus on data privacy and talk about data piracy instead. More specifically, we shed some light on how Jeanne Somma became a lawyer by trade and technologist by accident. We not only cover what could be considered career advice, but also touch upon the topics of usability, the Apple Newt…
The latest edition of the ISMG Security Report analyzes the U.S. indictment against Russian hackers who were allegedly behind NotPetya. Also featured: A discussion of nation-state adversaries and how they operate; an update on Instagram privacy investigation.DataBreachToday.com による
The IRS Criminal Investigation Cyber Crimes Unit is waging a battle against the use of cryptocurrency for financing terrorists and other money-laundering activities. Agents Chris Janczewski and Jon Gebhart describe recent cryptocurrency-related takedowns.DataBreachToday.com による
In part one of The Assassin's Ball, a group of hired killers attends a lavish ball and look for an opportunity to assassinate Secretary Lucius Mattheson. Read By: Henrietta MeiraAnnounced by: Julian SmithMusic: "Terror Theme" by Hakan ErikssonWyrd Miniatures, LLC による
Many healthcare organizations are failing to address shortcomings in security risk management for their supply chains, says former healthcare CIO David Finn, describing findings of a recent study assessing the state of cybersecurity in the sector.DataBreachToday.com による
Ending our first season with none other than Ellie Sawyer. We reflect on the last season, discuss the most current politics surrounding the SRKW's, and of course harbor seals. Thanks to everyone who has been a part of this, looking forward to the start of a new season!
The latest edition of the ISMG Security Report analyzes a new report that labels ransomware as the No. 1 cybercrime threat. Also featured: A former FBI agent offers an update on "disruptionware" attacks; how Tesla's autopilot is tricked by phantom images.DataBreachToday.com による
What is a data subject access request and how can you use it to take revenge on your employer? In this episode we discuss uses and abuses of this mechanism and how it affects different industries. The “triangle of problems” – people, processes and technology – again plays a key role in finding a solution for DSARs that doesn’t break the bank.…
This week we had the honor of interviewing Tori Obermeyer, coproducer of the film Coextinction about her journey in the field, up coming film, Dolly Parton & events with the Southern Resident.
The latest edition of the ISMG Security Report analyzes why clothing retailer H&M was hit with a hefty fine for violating the EU's General Data Protection Rule. Also featured: The coming of age of digital identities; deputy CSO at Mastercard on top priorities for 2021.DataBreachToday.com による