Fearless Paranoia

By Fearless Paranoia

Listen to a podcast, please open Podcast Republic app. Available on Google Play Store and Apple App Store.


Category: Technology

Open in Apple Podcasts


Open RSS feed


Open Website


Rate for this podcast

Subscribers: 0
Reviews: 0
Episodes: 52

Description

A Cybersecurity Lawyer and an IT Specialist helping to demystify the world of cybersecurity. The language and terminology of cybersecurity is oftentimes intentionally confusing and hard to keep up with even for experienced professionals. Each week, we will break down different topics in the cybersecurity, data security, and privacy fields to help you be able to keep up. Understanding cybersecurity has never been more important to everyday life, but also never more difficult to do.

Episode Date
Ransomware-as-a-Service: The New Normal in Cyber Warfare
Mar 05, 2024
Phishing-Resistant Multi-Factor Authentication: What You Need to Know
Feb 27, 2024
Multi-Factor Extortion: The Evolution of Modern Ransomware Tactics
Feb 20, 2024
A Tale of Two Hacks: Inside the Microsoft and CloudFlare Breaches
Feb 06, 2024
How to Make Your Employer Fix Their Terrible Cybersecurity Training
Jan 30, 2024
The End of Passwords? The Rise of Passwordless Security
Jan 23, 2024
Stealing DNA: 23andMe's Terrifying Cybersecurity Failure
Jan 16, 2024
Kaspersky Under Attack: Behind the Scenes of Operation Triangulation
Jan 09, 2024
The Year in Review: The Biggest Cybersecurity Stories of 2023
Jan 02, 2024
The Year in Review: 2023’s 10 Most Notable Cyberattacks
Dec 19, 2023
9 Cybersecurity Predictions for 2024
Dec 12, 2023
Network Overload: Understanding and Overcoming IT Burnout
Dec 05, 2023
Getting Hacked without Getting Hacked: The 23andMe Nightmare
Oct 17, 2023
AI Cybercrime: The New Face of Spearfishing
Oct 10, 2023
The MGM Data Breach: 10 Lessons to Limit Your Cybersecurity Flaws
Oct 03, 2023
Quantum Computing and the End of Encryption
Sep 26, 2023
How Cybercriminals Stay Anonymous Online
Jun 15, 2023
The 5 Insider Threats Everyone Needs to Watch Out For
Jun 07, 2023
The Dark Web - Busting the Myths About the Internet’s Underground
May 23, 2023
A Hacker’s Walking Tour - How Physical Security Determines Cybersecurity
May 16, 2023
The Shadow IT Nightmare: How to Protect Yourself from this Dangerous Tech
May 09, 2023
The SolarWinds Hack: 4 Supply Chain Attack Survival Tips You Need to Know
May 02, 2023
Cybersecurity Testing Essentials: A Comparison of Key Approaches for Small Businesses
Apr 25, 2023
The Dark Side of Generative AI: 11 Looming Dangers You Need To Know
Apr 18, 2023
The Benefits of Artificial Intelligence: 13 Ways AI Will Make the World Better
Apr 11, 2023
What is ChatGPT? Understanding the New Face of AI
Apr 04, 2023
Two New Zero Day Exploits to Make Sure You Never Feel Too Secure
Mar 28, 2023
The T-Mobile Data Breach: What You Need to Know About SIM Swapping Attacks
Mar 14, 2023
How to Stop and Overcome a Business Email Compromise Attack
Mar 07, 2023
How Multi-Factor Authentication Protects You, Your Data, and Your Privacy
Feb 28, 2023
How to Secure Your Data Using API Best Practices
Feb 21, 2023
The Power and Peril of APIs - The T-Mobile Data Breach
Feb 14, 2023
How to Make Sense of Encryption When You’re Not an IT Pro
Feb 07, 2023
How to Protect Your Personal Privacy Online: 8 Steps You Need to Take Immediately
Jan 31, 2023
6 Easy Ways to Secure Your Personal Data and Devices
Jan 24, 2023
The LastPass Breach: 3 Steps You Need to Take Immediately
Jan 17, 2023
What is Zero Trust Cybersecurity (and Can I Afford It)?
Jan 10, 2023
Why Resilience is the Most Important Way to Measure Cybersecurity
Jan 03, 2023
What is a DDoS attack?
Dec 20, 2022
How Implementing (and Understanding) Least Privilege can Protect Your Business
Dec 13, 2022
Eufy’s Privacy Blunder - Don’t Promise What You Don’t Provide
Dec 06, 2022
8 Lessons from the Uber Hack
Nov 29, 2022
The Open SSL Vulnerability - What It Is, and What Can Be Done
Nov 15, 2022
Automated Vulnerability Scanning - Why It’s Critical To Know Your Weaknesses
Nov 08, 2022
Disaster Plans - Are You Prepared for the Worst?
Oct 18, 2022
Do You Need an Endpoint Detection System?
Oct 11, 2022
When Countries use Cyberattacks, How Do You Know?
Sep 27, 2022
When is a Cyber War a Real War?
Sep 20, 2022
We Don’t Negotiate with Hackers... Or Best Offer
Sep 13, 2022
What Is This Crap? Or Understanding Cyber Insurance
Sep 06, 2022
Ransomware 101: How Ransomware Works
Aug 23, 2022
Ransomware 101: What is Ransomware?
Aug 16, 2022