Search a title or topic

Over 20 million podcasts, powered by 

Player FM logo

Jack Rhysider Podcasts

show episodes
 
Artwork

1
Darknet Diaries

Jack Rhysider

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Explore true stories of the dark side of the Internet with host Jack Rhysider as he takes you on a journey through the chilling world of hacking, data breaches, and cyber crime. ¿Hablas español? Escucha en español aquí ➔ https://darknetdiaries.com/es/
  continue reading
 
Ann Johnson, Corporate Vice President and Deputy Chief Information Security Officer at Microsoft, talks with cybersecurity thought leaders and influential industry experts about the trends shaping the cyber landscape and what should be top-of-mind for the C-suite and other key decision makers. Ann and her guests explore the risk and promise of emerging technologies, as well as the impact on how humans work, communicate, consume information, and live in this era of digital transformation. Ple ...
  continue reading
 
Artwork

1
The I.T. Career Podcast

The Bearded I.T. Dad - Dakota Snow

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
Empowering Your IT Career Journey – From the first step to success! With a passion for technology and a mission to uplift others, I’m here to guide you through the dynamic IT industry. Whether you're just starting or looking to advance, you’ve found a community dedicated to your growth. Advice & Insights: From Help Desk to Director of Network Operations in 3 years, I share strategies to fast-track your career. Expert Conversations: Gain exclusive insights from industry leaders. Let’s make IT ...
  continue reading
 
Artwork

1
Security Masterminds

Security Masterminds

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
The podcast that brings you the very best in all things, cybersecurity, taking an in-depth look at the most pressing issues and trends across the industry. Connect with us on our LinkedIn page! - https://www.linkedin.com/company/security-masterminds-podcast/
  continue reading
 
Artwork

1
Beyond the Barrier

Jake, Corwin, and, Joe

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
We are a group of friends that have worked in Public Safety in one way or another for most of our lives. We have long talked about starting a podcast to cover those things that not many shows will talk about. We also want to talk about and share our personal experiences with others in the hope that maybe we can help them learn from our experiences.
  continue reading
 
Welcome to Buzzsprout Conversations, the show where we dive into the real-life stories of podcasters in the middle of their podcasting journey. You'll hear stories from famous podcasters as well as everyday podcasters, just like you, share stories about how podcasting has impacted them and the things they've learned.
  continue reading
 
Artwork

1
Global Law and Business

Harris Bricken

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Every week, we take a bite-sized look at legal and economic developments in locales around the world as we try to decipher global trends in law and business with the help of our international guests. No topic is too big, too small, too simple, or too complicated. We plan to cover continents, countries, regimes, governance, finances, legal developments, and whatever is trending on Twitter. Connect with us: - https://twitter.com/globallawbiz - https://www.linkedin.com/company/harris-bricken - ...
  continue reading
 
Loading …
show series
 
In 2019, Ola Bini, a Swedish programmer and privacy advocate, was arrested in Ecuador with no evidence and no motive. But what's really going on goes far deeper than he could imagine. Visit https://darknetdiaries.com/episode/163/ for a list of sources, full transcripts, and to listen to all episodes. ... https://www.youtube.com/watch?v=4xnX9tQtk2A…
  continue reading
 
Every click, swipe, and post fuels the data economy. Credit cards, apps, even maps—our lives are scraped, stitched, and sold. It feels like a heist, and sometimes it is. Identity Theft Resource Center CEO Eva Velazquez insists the picture isn’t entirely bleak. This week we talk about the good, the bad, and the ugly of data brokers. Learn more about…
  continue reading
 
Meter: Visit https://meter.com/itcareer to book a demo To be competitive, it's important to focus on continuous education to improve your cyber security skills. This video provides career advice and tips for career development, especially regarding the skills for cybersecurity that employers are looking for. We also share some insightful resume tip…
  continue reading
 
Meter: Visit meter.com/itcareer to book a demo How do you go from curious about hacking to becoming one of the most recognized names in cybersecurity? In this episode of the I.T. Career Podcast, I sit down with John Hammond to unpack his real story—how he broke into security, the big moments that shaped his career, and the lessons he’d share with a…
  continue reading
 
Matt Rowe, Chief Security Officer at Lloyds Bank, joins Ann on this week's episode of Afternoon Cyber Tea to explore the future of cybersecurity. They discuss the accelerating pace of change in the industry, from AI and automation to data-driven security practices and identity management. Matt shares how Lloyds Bank is modernizing its approach by r…
  continue reading
 
It started with a slow roll of weird emails and phone calls. And then award-winning filmmaker Dan Sturman found himself in the crosshairs of serious hackers. With parallels to another case of mistaken identity and an assist from security expert Reuben Moretz, this week we explore bad social engineering. Learn more about your ad choices. Visit megap…
  continue reading
 
Meter: Visit https://meter.com/itcareer to book a demoCybersecurity is changing faster than ever — and the jobs of the future may not look like the ones you picture today. Everyone talks about hacking, red teaming, and pen testing, but there’s a side of cybersecurity that’s just as critical and often overlooked: GRC (Governance, Risk, and Complianc…
  continue reading
 
Feeling watched? Join us as Vermont Attorney General Charity Clark breaks down the new reality of digital surveillance. From school apps to AI scams, we dive into how companies collect your data and how to take control of your online privacy. The war for privacy is real—and it's a fight you can't afford to lose. Learn more about your ad choices. Vi…
  continue reading
 
Meter: Visit https://meter.com/ITCAREER to book a demoSeven years ago, I was sitting in the cab of a bulldozer at a pulp mill, covered in dust, thinking: “Is this really my future?”Three years later, I was the Director of Network Operations at a fiber ISP, earning six figures — without a degree, without certifications, and without prior IT job expe…
  continue reading
 
Erez Liebermann, partner at Debevoise & Plimpton and a leading voice in cybersecurity and data privacy joins Ann on this week's episode of Afternoon Cyber Tea. Together, they unpack how legal and security teams can act as strategic partners, aligning regulatory compliance with business priorities while preparing for and responding to incidents. Ere…
  continue reading
 
In 2019, Ola Bini, a Swedish programmer and privacy advocate, was arrested in Ecuador for being a Russian hacker. Find Ola on X: https://x.com/olabini. Or visit his website https://olabini.se/blog/. Or check out his non-profit https://autonomia.digital/. Sponsors Support for this show comes from ThreatLocker®. ThreatLocker® is a Zero Trust Endpoint…
  continue reading
 
A fake Microsoft pop-up cost Ken Westbrook’s mom her life savings. But they scammed the wrong family. Westbrook is former CIA. These days he’s sounding the alarm on how foreign crime rings steal billions from Americans with smishing campaigns, scareware, and gift cards. We talked about solutions. Learn more about your ad choices. Visit megaphone.fm…
  continue reading
 
In this second installment of our DEF CON two-parter, we talked to SocialProof Security CEO Rachel Tobac about how and why people are often the weakest link in so many cybersecurity protocols and how making yourself a harder target will cause most threat actors to move on to an easier mark. Learn more about your ad choices. Visit megaphone.fm/adcho…
  continue reading
 
Amy Edmondson, Harvard Business School professor and psychological safety pioneer joins Ann on this week's episode of Afternoon Cyber Tea. Together they discuss how creating psychologically safe environments allows teams, especially in high-pressure fields like cybersecurity, to speak up about early warnings, embrace the red, and learn from failure…
  continue reading
 
At DEF CON’s Social Engineering Village, contestants have 22 minutes to charm real employees at real companies into revealing real details that could lead to a breach. We step inside the booth to see how persuasion, improv, and psychology fuel both ethical hacking and the rise of cybercrime worldwide. Learn more about your ad choices. Visit megapho…
  continue reading
 
Dive deeper with Snow Goat — the free hands-on lab that inspired this video. https://hubs.ly/Q03CSkb80 Plus, check out the Varonis blog for real-world cybersecurity insights https://hubs.ly/Q03CShBG0DEF CON isn’t just a hacker conference — it’s a chaotic, creative, overwhelming, and wildly inspiring deep dive into everything cybersecurity. From pac…
  continue reading
 
Kurtis Minder knows the dark web better than most—and he’s not just watching from the sidelines. As a ransomware negotiator, he’s helped victims talk their way out of seemingly impossible situations. This week, we explore how cybercriminals operate, what makes them tick, and what you need to know to avoid becoming their next target. Learn more abou…
  continue reading
 
Nasrin Rezai, SVP and CISO at Verizon joins Ann on this week's episode of Afternoon Cyber Tea. Nasrin shares practical defense strategies for hard-to-secure legacy systems, emphasizes the importance of zero trust, and explains why cybersecurity is now a matter of national defense. Despite the challenges, she closes with optimism, believing that inn…
  continue reading
 
Before he even graduated high school, Hieu Minh Ngo had stolen 100,000 credit cards. But that was just the beginning of his hacking career. When he stumbled into the terrifying (and perfectly legal) world of data brokers, he built a pipeline for identity theft on a massive scale. But why are these companies even allowed to exist? And who are they s…
  continue reading
 
All Hieu Minh Ngo wanted was to make money online. But when he stumbled into the dark web, he found more than just opportunity, he found a global dark market. What started as a side hustle turned into an international crime spree. Find Hieu on X: https://x.com/HHieupc. Sponsors Support for this show comes from ThreatLocker®. ThreatLocker® is a Zero…
  continue reading
 
A not-entirely innocent moment at a concert set the internet on fire. But what if that was just a symptom of a bigger problem? New York Times journalist Kashmir Hill, author of Your Face Belongs to Us, helps us explore the chilling reality of ambient surveillance, and how facial recognition could be the end privacy as we know it. Learn more about y…
  continue reading
 
Please enjoy this encore episode of Afternoon Cyber Tea while Ann Johnson and team are taking a break. Dr. Hugh Thompson⁠, Executive Chairman of RSA Conference and Managing Partner at Crosspoint Capital joins Ann on this week's episode of Afternoon Cyber Tea. They discuss what goes into planning the world’s largest cybersecurity conference—from the…
  continue reading
 
Online fraud isn't just annoying; it's a national crisis. Last year alone, it may have siphoned $158 billion from the U.S. economy. This episode features AARP's Kathy Stokes, who reveals how fraud has morphed into a sophisticated, global operation and what's being done to fight back against this evolving threat. Learn more about your ad choices. Vi…
  continue reading
 
Fortune Magazine's Amanda Gerut offers a deep dive into the secret army of remote IT workers funding North Korea's nuclear ambitions. Explore the hidden world of laptop farms, the criminal identity theft targeting freelancers, and the shocking human cost. It's a chilling scheme with law enforcement and freelancers trapped in the crossfire. Learn mo…
  continue reading
 
What if a USB cable could take complete control of your PC or phone? Hackers use them. Governments are using them. And it's all thanks to one security pro known only as "MG." Visit https://darknetdiaries.com/episode/161/ for a list of sources, full transcripts, and to listen to all episodes. ... https://www.youtube.com/watch?v=W81oWOf_RiE…
  continue reading
 
Please enjoy this encore episode of Afternoon Cyber Tea while Ann Johnson and team are taking a break. Jack Rhysider, the creator and host of cybersecurity podcast Darknet Diaries joins Ann on this week's episode of Afternoon Cyber Tea. Jack shares his journey from network security engineer to self-taught storyteller, detailing how his passion for …
  continue reading
 
In this episode we talk with mg (https://x.com/MG), the brilliant (and notorious) hacker and hardware engineer behind the OMG Cable. A seemingly ordinary USB cable with extraordinary offensive capabilities. Learn more about mg at: o.mg.lol Sponsors Support for this show comes from ThreatLocker®. ThreatLocker® is a Zero Trust Endpoint Protection Pla…
  continue reading
 
Join Ben Winters, director of AI and Privacy at the Consumer Federation of America, for a front-row seat to the chaotic world of AI regulation where dirty data, aggressive lobbying, and public confusion drive a "winner takes all" vibe. From shady therapy bots to data-fueled discrimination, Ben reveals the urgent need to create guardrails for AI bef…
  continue reading
 
Kristin got scammed because she didn't want to give a puppy mill her business. This classic digital scam has it all: fake breeders, phony shipping agents, and a non-existent air-conditioned crate. Kristen reveals how her scammers used trust, urgency and emotion, to close the deal. Listen to her story and what you can do to avoid getting duped yours…
  continue reading
 
Greg Linares (AKA Laughing Mantis) shares his hunts for Zero Day exploits, the triple(?) agent working at Microsoft, how he became the youngest hacker ever arrested in Arizona, and that time a client hired him to steal human DNA. Follow Greg on Twitter: https://x.com/Laughing_Mantis. Visit https://darknetdiaries.com/episode/160 for a list of source…
  continue reading
 
In this episode of the IT Career Podcast, I sit down with Network Chuck for a raw, unfiltered conversation about tech, career growth, burnout, content creation, certifications, and the real behind-the-scenes life of one of YouTube’s biggest tech creators.Whether you're just starting your IT journey or you're a seasoned professional, this episode is…
  continue reading
 
Jeetu Patel, President and Chief Product Officer at Cisco, joins Ann on this week's episode of Afternoon Cyber Tea to explore how artificial intelligence is reshaping the cybersecurity landscape. Jeetu shares insights on the urgent need for machine-scale defenses, the potential for defenders to finally tip the scale against attackers, and the impor…
  continue reading
 
Greg Linares (AKA Laughing Mantis) joins us to tell us about how he became the youngest hacker to be arrested in Arizona. Follow Greg on Twitter: https://x.com/Laughing_Mantis. Sponsors Support for this show comes from ThreatLocker®. ThreatLocker® is a Zero Trust Endpoint Protection Platform that strengthens your infrastructure from the ground up. …
  continue reading
 
If you have never listened to Chris Hutchins explain how to get free travel, you’ve probably been paying too much for your vacations. Turns out, a threat actor was listening to him and stole his miles. Download this week’s episode to hear how he hacked the situation to score even more points. (This episode originally airdropped September 26, 2022.)…
  continue reading
 
Loading …
Copyright 2025 | Privacy Policy | Terms of Service | | Copyright
Listen to this show while you explore
Play