Chapters
Transcript
Episode notes
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31
Introduction
00:00 • 2min
How to Deal With a Ransomware Incident
02:28 • 2min
Mono Julie With the Super Check in Morning Cyber Heads
04:33 • 3min
Jump Cloud Breach by APT
07:27 • 2min
The Importance of Data Security Metrics
09:44 • 4min
Jump Cloud's Catastrophic Software Failure
13:53 • 3min
How to Deal With Ransomware Threats
16:34 • 3min
The US Military Leaks Military Emails
19:46 • 2min
Typosquatting: A Social Engineering Attack
21:27 • 3min
The Mali Government Owns All of the Domains
24:13 • 3min
Cloud Connects for Team Security
27:28 • 3min
The Value of a Quantified Risk Assessment
30:07 • 6min
How to Prepare for Quantum Cyber Attacks
36:02 • 5min
Binance and the Bitcoin Lightning Network
40:52 • 4min
Cryptocurrency Scams
44:54 • 3min
How to Educate Your End Users About WordPress Sites
47:25 • 2min
How Ashley Liles Modified a Ransomware File
49:07 • 4min
IPSEC's N Map
53:21 • 2min
How to Find the Simply Cyber Community Challenge
55:46 • 2min
How to Get a Starting Salary of 96,000
57:23 • 3min
The Cyber 101 Course Is Approved
59:57 • 4min
How to Implement a Stronger Cyber Security Policy at a Smaller Company
01:03:40 • 6min
How to Use AI and Ethical Hacking at Defcon
01:09:14 • 5min
How to Make a Book Better for Everyone
01:13:59 • 3min
The Importance of a Good Risk Assessment
01:17:20 • 4min
How Networking Changed My Career
01:21:25 • 3min
How to Get Recruited by the Government as an Adverse Adversity Towards Particular Country?
01:23:59 • 2min
How to Hack the Russian Government
01:25:37 • 2min
How Long Does It Take to Be a Data Forensic Analyst?
01:28:01 • 3min
How to Start a Business
01:30:35 • 2min
How to Start a Business in Your Community
01:32:12 • 5min


