Bad situations help us to learn.
…
continue reading
Dmarc Podcasts
Deception, influence, and social engineering in the world of cyber crime.
…
continue reading
The positive affects of having a strong women by your side.
…
continue reading
Build your newsletter and achieve online growth, with high quality content from the top 1% of successful newsletter creators across the world
…
continue reading
Helping bloggers, podcasters, and online business entrepreneurs grow their business! Host Pete McPherson chats with the world's TOP creators, including names like Seth Godin, Michelle Schroeder-Gardner, Neil Patel, Matt Mullenweg (creator of WordPress), John Lee Dumas, and way more.Topics include blogging (duh), SEO, affiliate marketing, podcasting, and monetization (especially digital products and FUNNELS!). ;)
…
continue reading
A deep dive into all things email
…
continue reading
Email's Not Dead is a podcast about how we communicate with each other and the broader world through modern technologies. Email isn't dead, but it could be if we don't change how we think about it. Hosts Jonathan Torres and Eric Trinidad dive into the email underworld and come back out with a distinctive look at the way developers and marketers send email. Produced by Thomas "T-Bird" Knierien.
…
continue reading
We talk Tech. This podcast looks at Tech in everyday life, in companies, in schools. Irreverent, quirky, and quite a lot of fun. Each week, join Paul Ogier, ex-teacher, business owner, Udemy Lecturer and general dog's body, as he interviews guests who are working at the coal face of software, apps, SAAS and support. How did they get there, what is their story, what technology do they deal with and how does it make their lives easier and how do they make their staff or clients lives easier? W ...
…
continue reading
Selling products online is challenging and can lead to poor customer experiences. In each episode, we explore how entrepreneurs and organizations in e-commerce are delivering delightfully unexpected experiences to their shoppers and customers! Amazon FBA, Shopify, artificial intelligence... We'll discuss what matters today and what you can do to build a better eCommerce business, we'll show you how! :) Appreciate the show? Leave us a review and rating in iTunes, or wherever you get your podc ...
…
continue reading
Please enjoy this encore of Word Notes. The process of installing applications on a device without the use of official software distribution channels. CyberWire Glossary link: https://thecyberwire.com/glossary/sideloadingBy N2K Networks
…
continue reading
This week, our hosts Dave Bittner, Joe Carrigan, and Maria Varmazis (also host of the T-Minus Space Daily show) are sharing the latest in social engineering scams, p…
…
continue reading
Please enjoy this encore of Word Notes. A zero trust security technique that isolates application workloads from each other, allowing each one to be protected individually. CyberWire Glossary link: https://thecyberwire.com/glossary/microsegmentation Audio reference link: “Micro-Segmentation Masterpieces,” PJ Kirner, Illumio CTO and Co-Founder, …
…
continue reading
This week, our hosts Dave Bittner, Joe Carrigan, and Maria Varmazis (also host of the T-Minus Space Daily show) are sharing the latest in soci…
…
continue reading
Please enjoy this encore of Word Notes. The use of similar-looking characters in a phishing URL to spoof a legitimate site. CyberWire Glossary link: https://thecyberwire.com/glossary/homograph-phishing Audio reference link: “Mission Impossible III 2006 Masking 01,” uploaded by DISGUISE MASK, 28 July 2018.…
…
continue reading
1
Building Thriving Local Newsletters with TJ Larkin | Episode 6 | The LetterStack Podcast
37:12
37:12
Play later
Play later
Lists
Like
Liked
37:12What does it really take to build a profitable local newsletter network? In this episode of The LetterStack Podcast, Renga sits down with TJ Larkin, founder of multiple community-focused newsletters across the U.S., to uncover the secrets behind starting, scaling, and monetizing local newsletters. TJ shares how he grew from 2 neighborhood newslette…
…
continue reading
The world is crazy--but that doesn't mean you can go out on your own! Here are my honest (and blunt) advice for "quittin the ole' day job" and moving into self-employment. Question? Email [email protected], I'd love to hear from you!! https://doyouevenblog.com/ https://petemcpherson.com/By Pete McPherson
…
continue reading
1
A fish commits credit card fraud (inadvertently).
51:31
51:31
Play later
Play later
Lists
Like
Liked
51:31This week, our hosts Dave Bittner, Joe Carrigan, and Maria Varmazis (also host of the T-Minus Space Daily show) are sharing the latest in social engin…
…
continue reading
Welcome in! You’ve entered, Only Malware in the Building. Wrap yourself in a warm blanket, pour your favorite mug of tea, and join us each month as we unwrap the season’s juiciest cyber mysteries. Your host is Selena Larson, Proofpoint intelligence analyst and host of their podcast DISCARDED. Inspired by the residents …
…
continue reading
Please enjoy this encore of Word Notes. Software designed to prevent cheating in video games. CyberWire Glossary link: https://thecyberwire.com/glossary/anti-cheat-software Audio reference link: “The BIG Problem with Anti-Cheat,” by Techquickie, YouTube, 5 June 2020By N2K Networks
…
continue reading
Please enjoy this encore of Hacking Humans. On Hacking Humans, Dave Bittner, Joe Carrigan, and Maria Varmazis (also host of N2K's daily space podcast, T-Minus), are once again sharing the latest in social engineering scams, phishing schemes, and criminal exploits that are making headlines to help our audience become aware of what is out there…
…
continue reading
Please enjoy this encore of Word Notes. Malware, in the guise of ransomware, that destroys data rather than encrypts. CyberWire Glossary link: https://thecyberwire.com/glossary/pseudoransomware Audio reference link: “Some Men Just Want to Watch the World Burn | the Dark Knight,” by YouTube, 2 November 2019.…
…
continue reading
1
Answering your questions! (blogging, YouTube, automations, and more)
35:18
35:18
Play later
Play later
Lists
Like
Liked
35:18Just a grab bag of the issues & questions y'all sent in! Want 1 roundup email of fun & useful resources for creators? JOIN MY NEWSLETTER! https://petemcpherson.com/ 0:00 Intro 1:43 Selling SaaS Products 4:52 Top of Funnel Activities 6:45 Blogging Landscape 2026 7:04 Blogging Viability 10:49 YouTube vs. Blogging 14:41 Systems 22:56 Facebook Ads Expe…
…
continue reading
This week, our hosts Dave Bittner, Joe Carrigan, and Maria Varmazis (also host of the T-Minus Space Daily show) are sharing the latest in social engineering s…
…
continue reading
1
Trusted Platform Module (TPM) (noun) [Word Notes]
6:38
6:38
Play later
Play later
Lists
Like
Liked
6:38Please enjoy this encore of Word Notes. A browser configuration control that prevents accessing resources within a private network. CyberWire Glossary link: https://thecyberwire.com/glossary/trusted-platform-module Audio reference link: “TPM (Trusted Platform Module) - Computerphile,” Computerphile, 23 July 2021…
…
continue reading
1
S6 Ep 07 – The best and worst of 2025 and what we’re excited about in 2026.
43:59
43:59
Play later
Play later
Lists
Like
Liked
43:59“Closing time, open all the doors and let you out into the world.” No, but for real we’re wrapping up the season, putting up the storm windows, holidays and long PTO are coming. We’ll be back in 2026 but before we board up the windows for the winter we wanted to recap everything that's happened this year in the email industry. Alison Gootee stopped…
…
continue reading
This week, our hosts Dave Bittner, Joe Carrigan, and Maria Varmazis (also host of the T-Minus Space Daily show) are sharing the latest in social engineering scams, ph…
…
continue reading
1
Private Network Access (PNA) (noun) [Word Notes]
5:36
5:36
Play later
Play later
Lists
Like
Liked
5:36Please enjoy this encore of Word Notes. A browser configuration control that prevents accessing resources within a private network. CyberWire Glossary link. Audio reference link: “Chrome Limits Access to Private Networks,” by Daniel Lowrie, ITProTV, YouTube, 19 January 2022.By N2K Networks
…
continue reading
This week, our hosts Dave Bittner, Joe Carrigan, and Maria Varmazis (also host of the T-Minus Space Daily show) are sharing the latest in social engineering scams, phishing s…
…
continue reading
Please enjoy this encore of Word Notes. The potential next evolution of the worldwide web that decentralizes interaction between users and content away from the big silicon valley social media platforms like Twitter, Facebook, and YouTube, and towards peer-to-peer interaction using blockchain as the underlying technology. CyberWire Glossary link: …
…
continue reading
Welcome in! You’ve entered, Only Malware in the Building. Join us each month to sip tea and solve mysteries about today’s most interesting threats. Your host is Selena Larson, Proofpoint intelligence analyst and host of their podcast DISCARDED. Inspired by the residents of a building in New York’s exclusive upper west side, …
…
continue reading
Happy Halloween from the team at N2K Networks! We hope you share in our Halloween tradition of listening to the Malware Mash. You can check out our video here. Lyrics I was coding in the lab late one night when my eyes beheld an eerie sight for my malware threat score began to rise and suddenly to my surprise... It did the Mash It did the Malware…
…
continue reading
This week, our hosts Dave Bittner, Joe Carrigan, and Maria Varmazis (also host of the T-Minus Space Daily show) are sharing the latest in social engineering scams, phishing schemes, …
…
continue reading
1
Identity access management (IAM) (noun) [Word Notes]
11:55
11:55
Play later
Play later
Lists
Like
Liked
11:55Please enjoy this encore of Word Notes. A set of solutions for ensuring that the right users can only access the appropriate resources. CyberWire Glossary link: https://thecyberwire.com/glossary/identity-and-access-management Audio reference link: “The Wrath of Khan (1982) ‘Kirk’s Response,’” by Russell, YouTube, 16 May 2017.…
…
continue reading
This week, while Dave Bittner is on vacation, hosts Joe Carrigan, and Maria Varmazis (also host of the T-Minus Space Daily show) are sharing the latest in social engineering scams, phishing …
…
continue reading
Please enjoy this encore of Word Notes. The deployment of rules to the security stack across all data islands, cloud, SaaS applications, data centers, and mobile devices designed to manifest an organization's cybersecurity first principle strategies of zero trust, intrusion kill chain prevention, resilience, and risk forecasting. CyberWire Glossary…
…
continue reading
This week, our hosts Dave Bittner , Joe Carrigan, and Maria Varmazis (also host of the T-Minus Space Daily show) are sharing the latest in social engineering scams, phishing schemes, and criminal ex…
…
continue reading
1
DMARC, DKIM, and the Secret to Staying Out of the Spam Folder - Email Marketing w/ Cheryl Rerick
59:38
59:38
Play later
Play later
Lists
Like
Liked
59:38Forget algorithms and deliverability myths — learn how to send emails real people actually open, click, and reply to. FIND CHERYL's STUFF: https://www.instagram.com/cherylrerickmarketing/ https://cherylrerick.com/ https://cherylrerick.com/deliverability-webinar/ https://cherylrerick.com/time-to-conversion/ Want 1 roundup email of fun & useful resou…
…
continue reading
Please enjoy this encore of Word Notes. A process of hiding the complexity of a system by providing an interface that eases its manipulation. CyberWire Glossary link: https://thecyberwire.com/glossary/abstraction-layer Audio reference link: “What Is Abstraction in Computer Science,” by Codexpanse, YouTube, 29 October 2018.…
…
continue reading
This week, our hosts Dave Bittner , Joe Carrigan, and Maria Varmazis (also host of the T-Minus Space Daily show) are sharing the latest in social engineering scams, phishing schemes, and criminal exploits t…
…
continue reading
By N2K Networks
…
continue reading
By N2K Networks
…
continue reading
This week, our hosts Dave Bittner , Joe Carrigan, and Maria Varmazis (also host of the T-Minus Space Daily show) are sharing the latest in social engineering scams, phishing schemes, and criminal exploits that are …
…
continue reading
Please enjoy this encore of Word Notes. A cybersecurity first principle strategy focused on disrupting known adversary activity at one of several phases of an attack sequence. CyberWire Glossary link: https://thecyberwire.com/glossary/intrusion-kill-chain Audio reference link: "Cybersecurity Days: A Network Defender's Future," by Rick Howard, I…
…
continue reading
This week, while Dave Bittner is out, Joe Carrigan, and Maria Varmazis (also host of the T-Minus Space Daily show) are sharing the latest in social engineering scams, phishing schemes, and …
…
continue reading
Please enjoy this encore of Word Notes. A subset of security orchestration, the management of identities across an organization's set of digital islands. CyberWire Glossary link: https://thecyberwire.com/glossary/identity-orchestrationBy N2K Networks
…
continue reading
1
How RemoteBase Grew from 112 Subs to a 6 Figure Newsletter Business – Chris Cerra | Episode 5 | The LetterStack Podcast
36:30
36:30
Play later
Play later
Lists
Like
Liked
36:30Ready to turn a travel side-project into a full-time, six-figure newsletter? In Episode 5 of the LetterStack Podcast, Renga chats with Chris Cerra, founder of RemoteBase and Digital Nomad Trip Reports, about bootstrapping a lean media empire (and why he runs it under the delightfully named Mad Banana Media). What you’ll learn: How Chris went from a…
…
continue reading
1
Email Deliverability Masterclass for Newsletters – SPF, DKIM, DMARC & Warm-Up with Anthony from Mission Inbox | Episode 4 | The LetterStack Podcast
36:45
36:45
Play later
Play later
Lists
Like
Liked
36:45Hitting the primary inbox (not spam or promotions) is make-or-break for every newsletter and cold-email campaign. In Episode 4 of the LetterStack Podcast, Renga sits down with Anthony Baltodano, founder of Mission Inbox and a decade-long deliverability expert, to unpack the exact tech and tactics that keep your emails landing where they belong. Wha…
…
continue reading
This week, our hosts Dave Bittner, Joe Carrigan, and Maria Varmazis (also host of the T-Minus Space Daily show) are sharing the latest in social engineering scams, phishing schemes, and…
…
continue reading
This episode contains a few curse words, be forewarned! I'm about to drop what FinCon *confirmed* for me last week--something I've been feeling for months now. Sorry in advance for the rant. Want 1 roundup email of fun & useful resources for creators? JOIN MY NEWSLETTER! https://petemcpherson.com/ OTHER WAYS I CAN HELP YOU: - Do You Even Blog: A+ b…
…
continue reading
Please enjoy this encore of Word Notes. A cyber threat intelligence analysis model that defines relationship pairs between four core components in the shape of a diamond of adversary playbook activity across the intrusion kill chain: the adversary, their capability, the infrastructure used or attacked, and the victim. CyberWire Glossary link: http…
…
continue reading
This week, our hosts Dave Bittner, Joe Carrigan, and Maria Varmazis (also host of the T-Minus Space Daily show) are sharing the latest in social engineering scams, phishing schemes, and criminal …
…
continue reading
1
S6 Ep 06 – Zunes, Beans and Black Friday Cyber Monday things. With Mike Auldredge of Customer.io
34:05
34:05
Play later
Play later
Lists
Like
Liked
34:05It’s been a long time coming for this interview to happen. The courteous and hilarious and Zunes biggest fan Mike Auldredge of Customer.io joined us with his friend and our now coworker Alison Gootee to brief you on what you should and shouldn't do for your Black Friday Cyber Monday prep. Yes, were talking about this in September because you need t…
…
continue reading
Please enjoy this encore of Word Notes. A knowledge base of adversary tactics, techniques, and procedures established and maintained by the MITRE Corporation. CyberWire Glossary link: https://thecyberwire.com/glossary/mitre-attck Audio reference link: “Attack Frameworks - SY0-601 CompTIA Security+ : 4.2,” Professor Messer, YouTube, 29 April 202…
…
continue reading
This week, our hosts Dave Bittner, Joe Carrigan, and Maria Varmazis (also host of the T-Minus Space Daily show) are sharing the latest in social engineering scams, phishing schemes, and criminal exploits t…
…
continue reading
1
Hot sauce and hot takes: An Only Malware in the Building special. [OMITB]
36:37
36:37
Play later
Play later
Lists
Like
Liked
36:37Welcome in! You’ve entered, Only Malware in the Building — but this time, it’s not just another episode. This is a special edition you won’t want to miss. For the first time, our hosts are together in-studio — and they’re turning up the heat. Literally. Join Selena Larson, Proofpoint intelligence analyst and host of their po…
…
continue reading