Search a title or topic

Over 20 million podcasts, powered by 

Player FM logo

Python Bytes App Podcasts

show episodes
 
Join the original Monty Pythons Michael Palin, Terry Jones, Terry Gilliam and Special Guest Carol Cleveland as they introduce and discuss their first official app. The Monty Python’s Flying Circus Python Bytes App includes 22 of the Python’s best sketches from the first series of Monty Python’s Flying Circus. Also included are exclusive commentaries and back-stories from the creators, as well as a digital autograph feature.
  continue reading
 
In a world where cyberattacks are becoming more commonplace, we all need to be vigilant about protecting our digital lives, whether at home or at work. Byte Sized Security is the podcast that provides snackable advice on cybersecurity best practices tailored for professionals on the go. Hosted by information security expert, Marc David, each 15-20 minute episode provides actionable guidance to help listeners safeguard their devices, data, and organizations against online threats. With new ep ...
  continue reading
 
Join Jon Hamm (Mad Men, Bridesmaids) and writer, director and producer Jennifer Westfeldt (24, Kissing Jessica Stein) as they discuss their new film Friends with Kids. A romantic comedy that centres around two best friends who decide to have a child together, whilst keeping their relationship platonic, Friends with Kids shows how having kids can change your life forever, in amusing and surprising ways.
  continue reading
 
Loading …
show series
 
# Byte Sized Security Show Notes ## Episode Title: 3 Immediate Actions to Protect Your Privacy Today ## Episode Summary: In this episode of Byte Sized Security, host Marc David outlines three practical, actionable steps to enhance your privacy protection immediately. With data breaches nearly doubling in 2024 and companies like AT&T and Ticketmaste…
  continue reading
 
Episode Summary: In this episode, we explore the alarming discovery that many of the top-rated VPN apps on the App Store and Google Play are secretly owned by Chinese companies. These VPNs pose a serious risk to user privacy and security, as Chinese law requires them to hand over all user data to the government without justification. Key Topics Cov…
  continue reading
 
The Imminent AI Job Crisis: Are You Prepared? This episode highlights the alarming prediction by Dario Amodei, CEO of Anthropic, that AI could eliminate half of all entry-level white-collar jobs within the next one to five years, potentially raising U.S. unemployment to 20%. While major companies are quietly adopting advanced AI systems, the public…
  continue reading
 
Adapt or Replace: How AI is Changing Entry-Level Job Markets AI has already impacted the job market significantly, particularly affecting entry-level positions. The script highlights that entry-level hiring has decreased due to the integration of AI, which automates routine tasks. Companies are reconsidering traditional roles and opting for more ef…
  continue reading
 
# Episode: "Avoiding the Phishing Bait: How to Spot Scam Emails" ## Episode Summary In this episode of Byte Sized Security, host Marc David breaks down how to identify phishing emails. He provides practical tips to recognize scam attempts and protect your personal information from fraudulent emails. ## Key Discussion Points - Introduction to phishi…
  continue reading
 
**Episode Summary:** Marc David dives into the rapidly evolving world of deepfakes and digital deception, projecting forward to 2025. The episode explores the alarming growth in deepfake use, driven by accessible AI technology and user-friendly tools. Mark discusses the severe consequences for businesses (e.g., fraudulent CEO announcements, financi…
  continue reading
 
AI Security and Competition: Unpacking the Debate Around DeepSeek This episode delves into the controversy surrounding DeepSeek, a Chinese AI considered by some as a national security threat. It questions whether this stance is legitimate or merely a tactic by big tech to stifle competition. The episode highlights multiple security breaches across …
  continue reading
 
The Double Standards of Social Media Manipulation: Facebook vs. TikTok This episode delves into the contrasting treatment of Facebook and TikTok concerning data manipulation and national security. It highlights the documented case of Facebook's data misuse with Cambridge Analytica, affecting 87 million Americans, and questions why similar scrutiny …
  continue reading
 
The Real Threat of TikTok: Manipulation by Any Owner The video discusses the controversy surrounding TikTok and the calls to ban it due to national security concerns. It questions the hypocrisy of other social media giants like Facebook and Twitter (now X) which have also manipulated users for profit. The script emphasizes that the issue isn't the …
  continue reading
 
Do You Need Coding Skills to Succeed as a Security Engineer? In this episode, we debunk the myth that coding expertise, particularly in Python, is essential for success in cybersecurity engineering. While many claim that coding skills are a gatekeeper in this field, the reality showcases a wide array of roles such as governance, risk and compliance…
  continue reading
 
Dismantling Gatekeeping in Cybersecurity: Embracing Diverse Talents The episode discusses the need to move beyond gatekeeping in cybersecurity, which often prioritizes coding skills over diverse talents. It highlights the importance of embracing individuals who have strategic vision, risk management expertise, and effective communication abilities,…
  continue reading
 
Tailoring Your Resume with AI: My Honest Experience with Claude We're diving into the often daunting task of tailoring resumes for specific jobs and how an AI tool, Claude, made this process significantly easier. The presenter shares a detailed, step-by-step account of their experience using Claude to enhance their resume, highlighting the tool's d…
  continue reading
 
The source is an audio recording of a podcast episode focused on providing advice for those seeking to enter the cybersecurity field. The host, Marc, offers insights on acquiring practical experience, the importance of certifications, the significance of soft skills, strategies for successful job interviews, and effective networking methods. He emp…
  continue reading
 
Navigating Cybersecurity: Q&A Session with Marc In this special episode recorded outdoors, Marc answers listener questions about breaking into the cybersecurity field. Topics include gaining practical experience without an IT background, the importance of certifications, essential soft skills, networking strategies, handling job rejections, and mak…
  continue reading
 
Safeguarding Your Identity: Essential Tools and Techniques This episode focuses on the increasing dangers of data breaches and the various steps individuals can take to protect their personal information. Highlighting the threats posed by data breaches and data brokers, the discussion provides detailed reviews of free resources such as OperationPri…
  continue reading
 
The Great IT vs. Security Smackdown: A Comedy in Three Acts In this hilarious and eye-opening episode of ByteSizedSecurity, we're flipping the script on the age-old IT vs. Security debate. Prepare for a rollercoaster ride through the corporate tech landscape as we challenge the notion that security is just IT's sidekick. From debunking myths to exp…
  continue reading
 
The Responsibility of Cybersecurity Influencers: A Call for Integrity This podcast addresses the issue of misinformation in the cybersecurity community, especially among influencers on platforms such as TikTok. The narrator emphasizes the importance of influencers conducting thorough research and providing accurate, evidence-based information rathe…
  continue reading
 
The recent breach of the 23andMe service, a DNA ancestry testing company. It highlights the impact of the breach, the potential risks of sharing personal information, and the lack of adequate security measures taken by the company. It also suggests various security practices that could have been implemented to prevent such breaches in the future. F…
  continue reading
 
As a security engineer. I'm curious about your thoughts on the intersection of professional cybersecurity roles. And personal social media use. And specifically. Using platforms like TikTok, does that compromise the trustworthiness of security professionals? --- I do hope you enjoyed this episode of the podcast. Here's some helpful resources includ…
  continue reading
 
Decoding Google Cybersecurity Certificate Program The speaker discusses the Google Cybersecurity Certificate Program and its benefits for both experienced and new cybersecurity enthusiasts. The speaker discusses how you can get the program for free through libraries that offer Coursera, like the California state public library. No matter if you're …
  continue reading
 
Explore Byte-Sized Security on YouTube Byte-Sized Security on YouTube The Byte-Sized Security YouTube channel is a resource for everyone interested in cybersecurity. The channel features a mix of insights, expert talks and in-depth discussions that elaborate on the concepts of cybersecurity. Viewers can subscribe to join a community of both profess…
  continue reading
 
I'll explain how to access Coursera courses for free with a public library card. This is possible for people living in specific states and cities like California, New York, Tennessee, Missouri, and Chicago. I'll share personal experience of using library resources to take an 8-module Google cybersecurity professional certificate course from Courser…
  continue reading
 
Unlock Free Learning Resources with your Public Library Card In this podcast, I will tell you how to access premium online learning resources like LinkedIn Learning, Udemy, and Coursera for free, simply by utilizing your public library card. Most people don't know that library cards can open doors to various resources, varying from library to libra…
  continue reading
 
The script is for an episode titled "Ep19: Is a Google Cybersecurity Professional Certificate Worth it?" where the speaker, Marc, shares his perspectives on the value of attaining a Google Cyber Security Certificate. He discusses how Google's certificate differs from other recognized credentials in the industry like the CompTIA Security Plus Certif…
  continue reading
 
Show Notes for Byte-Sized Security Episode: "The Illusion of Expertise: Why YouTube's Security Gurus Aren't in the Trenches" In this eye-opening episode, host Marc David takes a critical look at the proliferation of self-proclaimed cybersecurity 'experts' on YouTube. We delve into the mechanics of content creation, the business model behind it, and…
  continue reading
 
In this thought-provoking video, we delve deep into the intriguing question: "Will AI Help or Hurt Cybersecurity?" Join us as we explore the profound impact of Artificial Intelligence (AI) on the realm of cybersecurity, deciphering whether it is a trusted friend or a potential adversary. As technology continues to evolve, AI is revolutionizing vari…
  continue reading
 
--- I do hope you enjoyed this episode of the podcast. Here's some helpful resources including any sites that were mentioned in this episode. -- Sites Mentioned in this Episode Securing Your Meetings -- Find subscriber links on my site, add to your podcast player, or listen on the web players on my site: Listen to Byte Sized Security -- Support thi…
  continue reading
 
The show notes for this episode can be found in the previous shorter episode. No need to over extended an already extended version. --- I do hope you enjoyed this episode of the podcast. Here's some helpful resources including any sites that were mentioned in this episode. -- -- Find subscriber links on my site, add to your podcast player, or liste…
  continue reading
 
Getting a job in cybersecurity without direct experience can be challenging but not impossible. Here are some strategies to help you break into the field: Education and Certifications: Obtain foundational certifications like CompTIA Security+ and consider advancing to others like CISSP, CEH, or Cisco's CCNA Cyber Ops. Network: Attend cybersecurity …
  continue reading
 
Episode Overview: In this episode, I had the pleasure of sitting down with Dr. Lillian Hartfield to discuss the transformative approach to authentication: Passkeys. We delved deep into what passkeys are, how they differ from traditional passwords, and the reasons behind their rising popularity. Key Discussion Points: Introduction to Passkeys Dr. Ha…
  continue reading
 
Episode Overview: In this extended episode, host Marc David and cybersecurity expert Savvy Sharma delve deep into the recent cyberattack on MGM Resorts International. They discuss the tactics used by the attackers, the vulnerabilities exploited, and the cascading impact of the breach on MGM's operations. Key Discussion Points: Introduction to the M…
  continue reading
 
In this episode, Marc David speaks with social media expert Nia Jordan about best practices for staying safe on social platforms including: Tightening up default privacy settings to restrict who can see profile info Using strong unique passwords and enabling two-factor authentication Avoiding scams involving money transfers, malware links or fake p…
  continue reading
 
In this episode, Marc David speaks with expert Amelia Thompson about staying cyber secure while traveling including: Using VPNs and avoiding sensitive logins on public WiFi to prevent eavesdropping Enabling device tracking in case items are lost or stolen during transit Strengthening account login protections with multi-factor authentication Settin…
  continue reading
 
Attention iPhone users! Apple has just released an emergency update, iOS 16.6.1, which addresses two critical vulnerabilities that have been actively exploited in real-world scenarios. Here's what you need to know: The Flaws: The first vulnerability is associated with ImageIO, identified as CVE-2023-41064. This flaw could let attackers execute mali…
  continue reading
 
In this episode, host Marc David and cybersecurity expert Dr. Emily Thompson discuss the top 10 password managers for 2023. They delve into the pros, cons, and unique features of each, providing listeners with a comprehensive guide to choosing the right password manager. Key Highlights: Introduction: Recap of Episode 1, emphasizing the importance o…
  continue reading
 
In this episode, Marc David speaks with credit expert Olivia Chen about best practices for safeguarding your credit reports and identity including: Placing credit freezes with Equifax, Experian and TransUnion to restrict new account openings Lifting freezes temporarily when applying for new credit using your PIN Freezing children’s credit reports u…
  continue reading
 
In this episode, host Marc David discusses mobile security threats and best practices with expert Savannah Hill including: Using strong screen locks like fingerprints or facial recognition to prevent unauthorized access Backing up important data like contacts and photos to the cloud or external drives Only installing apps from official app stores a…
  continue reading
 
In this episode of Byte Sized Security, host Marc David dives deep on best practices for locking down your online accounts, including: Creating strong, unique passwords - Using passphrases, password managers, proper length and complexity Enabling multi-factor authentication - Using authenticator apps, security keys, SMS codes, and other factors Sec…
  continue reading
 
Please rate and review Byte Sized Security on your podcast platform of choice to help grow the show's audience. Share any pressing cybersecurity questions or topics you want covered in future episodes. Email [email protected] Let us know what online risks most concern you and what tech tips would make you feel safer.. Share the podcast with frie…
  continue reading
 
In this solo episode of Byte Sized Security, host Marc David provides guidance for parents, teachers and caregivers on keeping children safe online. He covers: Protecting kids from online predators - Teaching them not to share personal info, limiting strangers, and monitoring communications Discussing inappropriate content - Using parental controls…
  continue reading
 
In this episode of Byte Sized Security, host Marc David talks with expert Ethan Winnobego about how to recognize and avoid phishing scams trying to steal your personal information. They discuss: What phishing is and the major security risks it poses Common phishing techniques like fake login alerts and malicious links Red flags to watch out for lik…
  continue reading
 
In this episode of The Byte-Sized Security Podcast, host Marc David speaks with returning expert Nancy Doe about how two-factor authentication enhances login security. They discuss: What 2FA is and how it requires both a password and a secondary code or factor to log in Real-world examples of using an authenticator app or text code as the second fa…
  continue reading
 
In this episode of the Byte-Sized Security Podcast, host Malcom Smith interviews cybersecurity expert Nancy Doe about the benefits of using a password manager. They discuss: What a password manager is and how it works to store passwords and log into accounts Key advantages of a password manager like generating strong unique passwords, auto-fill, an…
  continue reading
 
Join Jon Hamm (Mad Men, Bridesmaids) and writer, director and producer Jennifer Westfeldt (24, Kissing Jessica Stein) as they discuss their new film Friends with Kids. A romantic comedy that centres around two best friends who decide to have a child together, whilst keeping their relationship platonic, Friends with Kids shows how having kids can ch…
  continue reading
 
Loading …
Copyright 2025 | Privacy Policy | Terms of Service | | Copyright
Listen to this show while you explore
Play