On Hacking Humans, Dave Bittner, Joe Carrigan, and Maria Varmazis (also host of N2K's daily space podcast, T-Minus), are once again sharing the latest in social engineering scams, phishing schemes, a…
Please enjoy this encore episode of Hacking Humans.
This week we are joined by Maria Varmazis, host of the N2K daily space show, T-Minus. She discusses how AI is being used as a possible solution to…
Please enjoy this encore episode of Word Notes.
A supply chain cybersecurity accreditation standard designed for the protection of controlled unclassified information that the U.S. Department of Def…
On Hacking Humans, Dave Bittner, Joe Carrigan, and Maria Varmazis (also host of N2K's daily space podcast, T-Minus), are once again sharing the latest in social engineering scams, phishing schemes, a…
Please enjoy this encore episode of Word Notes.
A collection of people, process, and technology that provides an organization the ability to detect and respond to cyber attacks.
On Hacking Humans, Dave Bittner, Joe Carrigan, and Maria Varmazis (also host of N2K's daily space podcast, T-Minus), are once again sharing the latest in social engineering scams, phishing schemes, a…
Please enjoy this encore episode of Word Notes.
Cybercriminals who lack the expertise to write their own programs use existing scripts, code, or tools authored by other more skilled hackers.
On Hacking Humans, Dave Bittner, Joe Carrigan, and Maria Varmazis (also host of N2K's daily space podcast, T-Minus), are once again sharing the latest in social engineering scams, phishing schemes, a…
Please enjoy this encore episode of Word Notes.
An isolated and controlled set of resources that mimics real world environments and used to safely execute suspicious code without infecting or causing…
Welcome in! You’ve entered, Only Malware in the Building. Grab your eggnog and don your coziest holiday sweater as we sleuth our way through cyber mysteries with a festive twist! Your host is Selena …
Please enjoy this encore of Hacking Humans:
This week, we are joined by host of N2K's T-Minus Space Daily podcast, Maria Varmazis, she sits down with Joe and Dave to discuss sextorion materials that…
Please enjoy this encore episode of Word Notes.
A stack of security software solutions and tools that allow organizations to orchestrate disparate internal and external tools which feed pre-built au…
On Hacking Humans, Dave Bittner, Joe Carrigan, and Maria Varmazis (also host of N2K's daily space podcast, T-Minus), are once again sharing the latest in social engineering scams, phishing schemes, a…
A term of legal art that defines the types of data and circumstances that permits a third party to directly or indirectly identify an individual with collected data.
On Hacking Humans, Dave Bittner, Joe Carrigan, and Maria Varmazis (also host of N2K's daily space podcast, T-Minus), are once again sharing the latest in social engineering scams, phishing schemes, a…
Enjoy this encore episode.
A security architecture that incorporates the cloud shared responsibility model, a vendor provided security stack, an SD-WAN abstraction layer, and network peering with on…
Maria Varmazis, host of N2K's daily space show T-Minus, joins Dave and Joe to share the story of the five types of social engineers Deanne Lewis encountered while tending bar, revealing how each barr…
Welcome in! You’ve entered, Only Malware in the Building. Join us each month to sip tea and solve mysteries about today’s most interesting threats. Your host is Selena Larson, Proofpoint intelligence…
00:39:10 |
Tue 05 Nov 2024
Disclaimer: The podcast and artwork embedded on this page are the property of N2K Networks, Inc.. This content is not affiliated with or endorsed by eachpod.com.