628 Episodes

  1. Identity Fabric (noun) [Word Notes]

    Published: 6/28/2022
  2. North Korea and a global cyber war.

    Published: 6/23/2022
  3. Intrusion Kill Chain (noun) [Word Notes]

    Published: 6/21/2022
  4. The great resignation and data exposure challenges.

    Published: 6/16/2022
  5. Identity Orchestration (noun) [Word Notes]

    Published: 6/14/2022
  6. What to look out for with scan-and-exploit cyber attacks.

    Published: 6/9/2022
  7. Diamond Model (noun) [Word Notes]

    Published: 6/7/2022
  8. Is ransomware getting too fast?

    Published: 6/2/2022
  9. MITRE ATT&CK (noun) [Word Notes]

    Published: 5/31/2022
  10. Combating social engineering.

    Published: 5/26/2022
  11. DevOps (noun) [Word Notes]

    Published: 5/24/2022
  12. Voice authentication taking hold.

    Published: 5/19/2022
  13. MITRE ATT&CK (noun) [Word Notes]

    Published: 5/17/2022
  14. Business phishing: Who's biting the bait?

    Published: 5/12/2022
  15. Waterfall Software Development Method (noun) [Word Notes]

    Published: 5/10/2022
  16. Encore: The attackers keep coming every single day.

    Published: 5/5/2022
  17. Agile Software Development Method (noun) [Word Notes]

    Published: 5/3/2022
  18. The dark side of business email attacks.

    Published: 4/28/2022
  19. Pegasus (noun) [Word Notes]

    Published: 4/26/2022
  20. Cons through and through. [Hacking Humans Goes to the Movies]

    Published: 4/24/2022

16 / 32

Deception, influence, and social engineering in the world of cyber crime.