Logo

    pwned

    Explore " pwned" with insightful episodes like "Edgy Authenticity in Cybersecurity", "What's this Microsoft: Follina?- Can the United States expect to get Cyberpwned?- What's the New Word for Ransomware?- QBot Merging Forces?-Statistics", "Episode 64: ok, this is epic", "25: Avoiding Common Pitfalls" and "The Bitcoin Podcast #272: Jack Got Hacked" from podcasts like ""Content Marketing, Engineered Podcast | TREW Marketing", "Security Squawk - The Business of Cybersecurity", "suck my (fan) fic.", "Sudo Show" and "Logos Press"" and more!

    Episodes (37)

    Edgy Authenticity in Cybersecurity

    Edgy Authenticity in Cybersecurity

    Two cybersecurity experts having an authentic conversation leads to business growth and chart-topping podcast listenership.

    When you fire up a Zoom call for a conversation with NuHarbor CEO Justin Fimlaid and VP of Product and Engineering Jack Danahay, you soon discover that these two have distinct chemistry and philosophical alignment on most things in the cybersecurity world. Given this, it was not very surprising to me to learn that their podcast, PWNED (that's pronounced "poh-nd" to us non-cybersecurity people) has a massive following, breaking the top 100 in both the U.S. and UK. 

    During the episode, Justin and Jack share their story, from how they met and discovered their aligned views, NuHarbor's "respectfully edgy" brand personality, and how at the heart of it all is walking the walk with their audience. They fully understand the needs and frustrations of their buyers, including piecemeal solutions and oversimplified value propositions that overpromise. 

    Through NuHarbor's content marketing, with PWNED playing a key role, they've discovered that adopting an authentic voice and helpful, specific advice has attracted the professionals they most want to work with, those that look at the cybersecurity world through a similar lens and are aligned with NuHarbor's approach.

    For show links and more, visit the Content Marketing, Engineered podcast blog

     https://bit.ly/CMEPodcast 

    Learn more about TREW Marketing

     https://www.trewmarketing.com 

    Order the book! Content Marketing, Engineered

     https://bit.ly/contentmktgeng


    What's this Microsoft: Follina?- Can the United States expect to get Cyberpwned?- What's the New Word for Ransomware?- QBot Merging Forces?-Statistics

    What's this Microsoft: Follina?- Can the United States expect to get Cyberpwned?- What's the New Word for Ransomware?- QBot Merging Forces?-Statistics

    In this week's episode, the cybersecurity experts Bryan Hornung, Reginald Andre, Randy Bryan, and Ryan O'Hara discuss this exploit, this vulnerability, that is running rampant right now no patch for it and its a type of zero day that is known as MIcrosoft: Follina. The crew will explain what this is and what you shouldn't be clicking on, on your computers. Then, the team gets into two countries Costa Rica and Italy who are dealing with being pawned by cybercriminals. Could this start creeping into the United States? Next, the experts go into a retreat where cybercriminals believe that ransomware is not the best route to go nowadays. They will get into some detail about what they think these cybercriminals are going to change it to, to get more money? Briefly, the crew will get into a article on Qbot which is like Trickbot, who combine their forces together to spread these viruses quicker than normal. Lastly, the cyber experts will go into some targeted healthcare statistics and what they need to do to be secure? Tune in for more information!

    25: Avoiding Common Pitfalls

    25: Avoiding Common Pitfalls
    Destination Linux Network (https://destinationlinux.network) Sudo Show Website (https://sudo.show) Sponsor: Digital Ocean (https://do.co/dln) Sponsor: Bitwarden (https://bitwarden.com/dln) Sudo Show Swag (https://sudo.show/swag) Contact Us: DLN Discourse (https://sudo.show/discuss) Email Us! (mailto:contact@sudo.show) Matrix: +sudoshow:destinationlinux.network (UPDATED!) Passwords: Bitwarden: Bitwarden Releases the Emergency Access Feature for Peace of Mind in Unprecedented Times (https://bitwarden.com/blog/post/bitwarden-launches-emergency-access/) Have I Been Pwned (https://haveibeenpwned.com/) Firefox Monitor (https://monitor.firefox.com/) HashiCorp Vault (https://www.vaultproject.io/) Pass, CLI Password Store (https://www.passwordstore.org/) Ansible Vault (https://docs.ansible.com/ansible/latest/user_guide/vault.html) FreeIPA (https://www.freeipa.org/page/Main_Page) Patching: Red Hat Satellite (https://www.redhat.com/en/technologies/management/satellite) Spacewalk (https://spacewalkproject.github.io/) Foreman Katello (https://theforeman.org/plugins/katello/) Front Page Linux: Sudo Bug Discovered (https://frontpagelinux.com/news/sudo-vulnerability-discovered-how-to-protect-your-system-from-baron-samedit/) Compliance: OpenScap (https://www.open-scap.org/) Square: PCI Complaince (https://squareup.com/us/en/townsquare/pci-compliance) FileCloud: An Introduction to HIPAA (https://www.getfilecloud.com/blog/2015/03/hipaa-101-an-introduction-to-hipaa/) Network Management: phpIPAM (https://phpipam.net/) Netbox: GitHub (https://github.com/netbox-community/netbox/blob/develop/README.md) Cockpit: WebUI (https://cockpit-project.org/) Open Suse: Yast (https://yast.opensuse.org/) News Sources: Front Page Linux (https://frontpagelinux.com) Ars Technica (https://arstechnica.com/) Fedora Magazine (https://fedoramagazine.org/) Inoreader - RSS Feed Reader (https://www.inoreader.com) GTD: Getting Things Done (https://gettingthingsdone.com/) Gettings Things Done (David Allen) (https://amzn.to/2LwdiGf) Note: This is an affiliate link. If you purchase through this link, a percentage of your purchase will go back to the Sudo Show! Hamberg.no - GTD in 15 Minutes (https://hamberg.no/gtd/) ToDoIst - Getting Things Done (https://todoist.com/productivity-methods/getting-things-done) Elementary Planner (https://blog.elementary.io/appcenter-spotlight-planner/) Gnome ToDo (https://wiki.gnome.org/Apps/Todo) Getting Things Gnome (https://wiki.gnome.org/Apps/GTG) Amazon:C.R. Gibson Black Bonded Leather Journal (https://www.amazon.com/dp/B003M6A9CI/ref=cm_sw_em_r_mt_dp_Z57R8DA78E06ZAS1B2JX?_encoding=UTF8&psc=1)

    The Bitcoin Podcast #272: Jack Got Hacked

    The Bitcoin Podcast #272: Jack Got Hacked

    In this episode the roundtable is open. Ray Redacted, Jessie "The Man" Broke, Harry D and Taylor from MyCrypto all swing by to discuss security, why it is not sexy and what it needs to do to be sexy. Corey invents a new acronym, "SIS." Everyone in the roundtable agrees that it should be a new standard way of thinking. Also, Taylor reminds everyone in the crypto community that the worst user experience is the one where the user loses their money. Nobody wants that. Oh...and for good measure, if you aren't using 2FA or some form of MFA, then you are just waiting to get pwned. Waiting very patiently to get pwned.

    Logos Press Engine includes Logos Podcast and Hashing It Out. Hashing it Out dives into the mechanisms and hardware of the technology that aid in making sovereign communities. 

    The Bitcoin Podcast #272: Jack Got Hacked

    The Bitcoin Podcast #272: Jack Got Hacked

    In this episode the roundtable is open. Ray Redacted, Jessie "The Man" Broke, Harry D and Taylor from MyCrypto all swing by to discuss security, why it is not sexy and what it needs to do to be sexy. Corey invents a new acronym, "SIS." Everyone in the roundtable agrees that it should be a new standard way of thinking. Also, Taylor reminds everyone in the crypto community that the worst user experience is the one where the user loses their money. Nobody wants that. Oh...and for good measure, if you aren't using 2FA or some form of MFA, then you are just waiting to get pwned. Waiting very patiently to get pwned.

    Logos Press Engine includes Logos Podcast and Hashing It Out. Hashing it Out dives into the mechanisms and hardware of the technology that aid in making sovereign communities. 

    Life of an IT Pro

    Life of an IT Pro

    Like many in IT, you can probably commiserate with this week’s Inside Out Security Show panel – Cindy Ng, Mike Buckbee and Alan Cizenski – on elaborating when someone asks you, “What Do You Do for a Living?” Whether you’re a programmer or a sysadmin, the scope of your role is often multi-faceted and complex.

    In this episode, we talk about various roles and responsibilities of those in IT - differentiating similar tools, testing and evaluating, balancing practical decision making, and much more.

    Logo

    © 2024 Podcastworld. All rights reserved

    Stay up to date

    For any inquiries, please email us at hello@podcastworld.io