show episodes
 
Welcome to the award-winning 401 Access Denied podcast, voted Best Cybersecurity Podcast for North America by the 2021, 2022, and 2023 Cybersecurity Excellence Awards and named 2023's Best Tech Podcast by TMCnet. Want authorized access to top security tips from experts in InfoSec? Bi-weekly, join the 401 Access Denied Podcast with Delinea's ethical hacker Joseph Carson as he shares life lessons and insights into the world of InfoSec – the good, the bad, and the ugly. Joe will be speaking wit ...
  continue reading
 
Artwork

1
Security Masterminds

Security Masterminds

Unsubscribe
Unsubscribe
Miesięcznie
 
The podcast that brings you the very best in all things, cybersecurity, taking an in-depth look at the most pressing issues and trends across the industry. Connect with us on our LinkedIn page! - https://www.linkedin.com/company/security-masterminds-podcast/
  continue reading
 
Artwork
 
ANWOTB has researched a deeper section of life and media. With curations of hope, encouragement, as well as much needed guidance. We provide conversations that many have but never share. We provide knowledge building, to expand the mind and entertain. Local, and national politics, religion, physics, metaphysics, ancient stories, and new ideas every episode. All with the goal of putting A New Wrinkle On The Brain. Facts over feelings plus silly wordplay with characters. Enjoy a fresh take wit ...
  continue reading
 
The Future of Cybercrime is dedicated to helping security practitioners defend their organizations by distilling insights, best practices, and actionable tips from the world’s leading cyber crime experts. This show is brought you by KELA Cyber Threat Intelligence. For more information, visit www.kelacyber.com
  continue reading
 
Artwork

1
START WRITING

J Washburn, Joseph Bendoski

Unsubscribe
Unsubscribe
Miesięcznie
 
Start Writing is a craft-focused podcast dealing with the art of telling stories. We look at the structure of plots, characters, worlds, scenes, word choice, and every other detail that goes into writing great novels.
  continue reading
 
Artwork
 
Novelist Spotlight is a gathering place for people interested in reading and writing great fiction and literature. This is where you will hear from the authors who write the novels and learn of their motivations, writing process, characters, struggles and successes. Novelist Spotlight is hosted by Mike Consol, a lifelong journalist and author of four novels.
  continue reading
 
Loading …
show series
 
Send us a text This is the bonus part of the episode where we go through and ask a speed round of questions for not only their insights into cybersecurity, but a little bit of their personal life too! Show Notes from Joe's Reponses: Favorite Cybersecurity Tool: Proxmark - https://proxmark.com/ Cybersecurity Books: Cuckoo's Egg, Clifford Stoll - htt…
  continue reading
 
Access controls have evolved from attribute and role-based to today’s policy-based and knowledge-based access controls. Static controls miss the mark in organizations where job functions are fluid and access to IT systems and business applications must be granular. Nabeel Nizar, EVP of advisory at MajorKey Technologies, joins Joe to share strategie…
  continue reading
 
In the spotlight is Rachel Turow, a San Francisco native who earned her Ph.D. in Clinical Psychology at the University of Oregon. She is the author of the book The Self-Talk Workout: Six Science-Backed Strategies to Dissolve Self-Criticism and Transform the Voice in Your Head. We discuss: >> The principles of self-talk >> Feeling bad about feeling …
  continue reading
 
Send us a text In the rapidly evolving landscape of cybersecurity, staying ahead of emerging threats and technologies is crucial. This episode delves into the intricate world of cybersecurity with Joseph Carson, Chief Security Scientist and Advisory CISO at Delinea, as we explore the latest advancements and challenges in the field. With over three …
  continue reading
 
In the spotlight is U.K.-based novelist Marek Handzel, the author of six titles, including the forthcoming book “The Anchorite.” His other titles include “The Dojang,” “I Must Stay Home,” “Redemptio,” “Through Open Doors” and “The Gaff.” We discuss: >> The Shroud of Turin >> Isolation >> Catholicism >> Martial arts >> Writing at night >> Naming cha…
  continue reading
 
Join Joseph Carson and digital identity expert Ian Glazer as they dive into the complex world of identity management. Discover the evolving tech expectations, the rise of non-human identities, and why visibility and automation are crucial for incident response. They’ll explore the future of identity management, including AI’s role in detection and …
  continue reading
 
Send us a text This is the bonus part of the episode where we go through and ask a speed round of questions for not only their insights into cybersecurity, but a little bit of their personal life too! Show Notes from Dave's Reponses: Cybersecurity Books: Andy Ellis - 1% Percentage Leadership - 1% Leadership: Master the Small, Daily Improvements tha…
  continue reading
 
Send us a text Dave Lewis, the global advisory CISO at OnePassword, shares his fascinating journey from the music industry to a thriving career in cybersecurity. With a background in music and a natural curiosity for computers, Dave's unconventional path highlights the diverse entry points into the cybersecurity field. His extensive experience, spa…
  continue reading
 
Platformization is a hot topic in the cybersecurity industry, especially as use cases converge and vendor consolidation continues. Phil Calvin, chief product officer at Delinea, joins Joe to talk about how a platform approach changes the mindset around software development to prioritize agility and accelerate innovation. The two discuss how platfor…
  continue reading
 
In the spotlight is the late novelist Joseph Heller of Catch-22 fame, and one of his biographers, Tracy Daughtery, who is himself the author of six novels, a novella connection, six short story collections, a book of personal essays, and a collection of essays on literature and writing. In addition, he has published biographies of Donald Barthelme,…
  continue reading
 
Send us a text This is the extra part of the episode where we go through and ask a speed round of questions for not only their insights into cybersecurity, but a little bit of their personal life too! Enjoy! Connect with Jack Rhysider DarkNet Diaries: https://darknetdiaries.com/ X: https://x.com/JackRhysider Connect with us Website: securitymasterm…
  continue reading
 
In this episode, Joseph Carson interviews Myrna Soto, former Global CISO for Comcast, about the changing role of CISOs. Myrna shares her journey into cybersecurity and highlights the importance of business relationships and brand protection. She also offers tips on communicating with the board and staying informed. Tune in for valuable insights and…
  continue reading
 
Send us a text Want to strengthen your advocacy for privacy protection and cybersecurity awareness? Get ready to hear the solution that will help you achieve this result and empower you to make a difference. Let's dive into it! Jack Rhysider's cybersecurity journey is sparked by a deep concern for data privacy and a desire to advocate for its prote…
  continue reading
 
In the spotlight is Tom Zoellner, the author of nine nonfiction books, including Island on Fire: The Revolt that Ended Slavery in the British Empire, winner of the National Book Critics Circle Award for the best nonfiction book of 2020 and a finalist for the Bancroft Prize and the California Book Award. He works as a professor at Chapman University…
  continue reading
 
You can think of authentication as the key that lets you inside a house. Authorization allows you to enter a specific room, open the closet, turn on the TV, and look under the bed. Governance is the historical record of all activity that took place. In an enterprise environment, those interconnected “rooms” are core infrastructure, cloud platforms,…
  continue reading
 
Send us a text The bonus episode of the rapid fire questions with Loren Kohnfelder. Connect with Loren Kohnfelder LinkedIn: https://www.linkedin.com/in/kohnfelder/ Designing Secure Software Book: https://a.co/d/07h5nQna Connect with us Website: securitymasterminds.buzzsprout.com KnowBe4 Resources: KnowBe4 Blog: https://blog.knowbe4.com James McQuig…
  continue reading
 
In the spotlight is biographer and storyteller Laurence Leamer, whose most recent bio, “Capote’s Women,” has been turned into a Hulu series and has been nominated for five Emmy Awards. He is the author of more than 18 books, including five New York Times bestsellers and one off-Broadway play. We discuss: >> His choice of subjects >> His work style …
  continue reading
 
Send us a text Do you want to gain a deeper understanding of how PKI, AI, and cryptography are shaping software development? Our special guest is Loren Kohnfelder Loren Kohnfelder's journey into the world of AI and cybersecurity began with an early exposure to mainframe programming at the age of twelve. His fascination with software development gre…
  continue reading
 
Join Joseph Carson and Dr. Andrea Isoni as they dive into the complexities of artificial intelligence. Explore AI's definition, practical applications in medicine and law, and the ethical challenges, including algorithmic bias and human oversight. They discuss the EU AI Act, its impact on AI development, and the global challenges of regulation. Dis…
  continue reading
 
Send us a text This is the extra part of the episode where we go through and ask a speed round of questions to Lee for not only his insights into cybersecurity, but a little bit of his personal life too! Enjoy! Connect with Dr. Lee Mangold LinkedIn: https://www.linkedin.com/in/leemangold/ Connect with us Website: securitymasterminds.buzzsprout.com …
  continue reading
 
Geoff White, author and investigative journalist, has interviewed the masterminds behind some of the most notorious cyberattacks. His new book, Rinsed, reveals how technology has revolutionized money laundering, from drug cartels washing their cash in Bitcoin to organized fraud gangs recruiting money mules on social media. In this episode, the expe…
  continue reading
 
In the spotlight is Amanda DuBois, author of the Camille Delaney mystery series. She is the founder and managing partner of the DuBois Levias Law Group, a woman-owned boutique family law practice in Seattle. She was also a former high-risk labor and delivery nurse at the University of Washington Medical Center, before beginning her legal career in …
  continue reading
 
In the spotlight is Paula Treick DeBoard, novelist and new bookstore owner. In April 2024, DeBoard opened Bookish in Modesto, Calif., and discusses her motivation and her strategy for succeeding. She is also the author of four family dramas, the novels “The Mourning Hours,” “The Fragile World,” “The Drowning Girls” and “Here We Lie.” She also teach…
  continue reading
 
Good to see you. Enjoy. We got Video for this one!Welcome back for the wrinkle. The Wrinkle has some new new. In this new episode we visit Ms. Linda Moulton Howe An investigator that has a very diverse past and does the best investigative reporting I have ever seen. I am happy to bring this to you. You can help this page grow. Please hit the subscr…
  continue reading
 
Send us a text If you're feeling overwhelmed and stressed out about keeping up with new cybersecurity technologies, then you are not alone! The constant flood of new technologies and emerging threats can make it feel like you're falling behind, leaving you feeling exhausted and frustrated. It's time to find a way to cut through the overwhelm and st…
  continue reading
 
Joe Carson and Tony Goulding dive into the Verizon Data Breach Investigations Report (DBIR), revealing key insights on the top threats in cybersecurity. Discover why credential compromise remains the leading attack method and how ransomware, data exfiltration, and extortion are on the rise. Learn about the critical importance of strong authenticati…
  continue reading
 
Welcome back for the wrinkle. The Wrinkle has some new new. In this new episode we visit Ms. Linda Moulton Howe An investigator that has a very diverse past and does the best investigative reporting I have ever seen. I am happy to bring this to you. You can help this page grow. Please hit the subscribe button it really helps the channel Thank you.…
  continue reading
 
In this episode, join us as Brent Deterding, a cybersecurity professional with 19 years of experience, unveils his top strategies for managing stress, prioritizing risks, and building resilience in the high-stakes world of cybersecurity. Discover how Brent's focus on controllable factors and his calm, composed approach—drawn from emergency medicine…
  continue reading
 
Ask literary critics to name the greatest American novelists of the past 50 years and Don DeLillo’s name is sure to be there. DeLillo, now 87, has written more than 18 novels and has won awards ranging from the National Book Award and PEN/Faulkner Award to the Library of Congress Prize for American Fiction. Discussing his career during this episode…
  continue reading
 
Send us a text This is the extra part of the episode where we go through and ask a speed round of questions to Jessica for not only her insights into cybersecurity, but a little bit of her personal life too! Connect with Dr. Jessica Barker, PhD, MBE LinkedIn: https://www.linkedin.com/in/jessica-barker/ Twitter: https://twitter.com/drjessicabarker D…
  continue reading
 
Matt Coyle is the author of the best-selling Rick Cahill crime novels. Though he has wanted to be a crime writer since age 14, his actual foray into crime fiction was delayed for 30 years while he spent time managing a restaurant, selling golf clubs for various golf companies, and doing national sales for a sports licensing company. He wrote nights…
  continue reading
 
It’s becoming more common for companies to rely on cloud platforms like AWS, SaaS tools, Okta, and Github actions on CICD pipelines. In this episode, penetration tester and creator of HackTricks Carlos Polop shares how he’s helping cloud-first organizations understand the risk of vulnerabilities, misconfigurations, and exploitation techniques such …
  continue reading
 
Send us a text Uncover the Unexpected: Discover the Surprising Key to Enhanced Security Culture. Are you ready to discover the game-changing element that's transforming the cybersecurity industry? Get ready to challenge your perceptions and dive into the human side of cybersecurity with an unexpected twist that's reshaping the landscape. Are you cu…
  continue reading
 
Loading …

Skrócona instrukcja obsługi