show episodes
 
The European Central Bank Podcast – bringing you insights into the world of economics and central banking. Our host, Katie Ranger, talks to experts about the topics and trends that matter to the eurozone economy today. The views expressed are those of the speakers and not necessarily those of the European Central Bank.
 
The American Monetary Association is a non-profit venture funded by The Jason Hartman Foundation that is dedicated to educating people about the practical effects of monetary policy and government actions on inflation, deflation and freedom. Our goal is to help people prosper in the midst of uncertain economic times. The American Monetary Association believes that a new and innovative understanding of wealth, value, business and investment is necessary to thrive in the new reality of big gov ...
 
Become an EMPOWERED INVESTOR. Survive and thrive in today's economy! With nearly 2,000 episodes in this Monday, Wednesday, Friday podcast, business and investment expert Jason Hartman interviews top-tier guests, bestselling authors and financial experts including; Steve Forbes (Freedom Manifesto), Tomas Sowell (Housing Boom and Bust), Noam Chomsky (Manufacturing Consent), Jenny Craig (Health & Fitness CEO), Jim Cramer (Mad Money), Harvey Mackay (Swim With The Sharks & Get Your Foot in the Do ...
 
The FNA Talks Podcast draws on the expertise and experience of key FinTech, RegTech and SupTech authorities to discuss the trends and developments defining the technology and innovation landscapes. Learn more at www.fna.fi
 
Welcome to the home of Eat Sleep Suplex Retweet, a wrestling podcast based out of Scotland and the U.K. Through our team of knowledgeable fans of the industry, we bring you the best of all things wrestling, from the heights of WWE and AEW to the best of the Japanese and European scene. Some wrestling pods may just do previews and reviews, but here, we aim to produce analysis of a number of topics, whilst also providing a whole bunch of laughs and banter. Follow us on Facebook, Twitter and In ...
 
Loading …
show series
 
Adversary-in-the-middle sites support business email compromise. Silent validation carding bot discovered. Attempted social engineering at the European Central Bank. Germany puts its shields up. Carole Theriault speaks with Jen Caltrider about Mozilla's *Privacy Not Included initiative. Our guest is Lucia Milica on Proofpoint’s Voice of the CISO re…
 
Ashley Taylor from SANS.edu, joins Dave to discuss fake job ads and methods to proactively detect these scams. The research shares how job seekers are under attack, with scammers posing as fake job recruiters to steal information from people who are interested in the job posting. The brands being impersonated as are at risk of losing credibility to…
 
The optempo of the war's cyber phase, and Ukraine’s response. Organizing and equipping hacktivists. Joint warning on Zeppelin ransomware. Update on the DoNot Team, APT-C-35. Rewards for Justice offers $10 million for information on Conti operators. Rob Boyce from Accenture shares insights from BlackHat. Caleb Barlow ponders closing the skills gap w…
 
Today's Flashback Friday is from episode 767 published last December 19, 2016. What a treat! Jason leads us into this episode revealing the possibilities available to the real estate market under our first US real estate president and reminds us the Fed has only raised the interest rate twice in the last decade. The political cartoon Christine sent…
 
Zeppelin ransomware functions as a ransomware-as-a-service (RaaS), and since 2019, actors have used this malware to target a wide range of businesses and critical infrastructure organizations. Actors use remote desktop protocol (RDP), SonicWall firewall vulnerabilities, and phishing campaigns to gain initial access to victim networks and then deplo…
 
KillMilk says his crew downed Lockheed Martin's website. Industroyer2, and what became of it. CISA releases its election cybersecurity toolkit. Post-incident disruption at Britain’s NHS. Carl Wright of AttackIQ shares strategies for CISOs to successfully prepare for the next attack. Dr. Christopher Pierson from Blackcloak joins us from Black Hat. A…
 
How can digitalisation help central banks? And what role does cutting-edge technology play? In this episode, host Katie Ranger talks about this and more with Claudia Plattner, our head of information systems. The views expressed are those of the speakers and not necessarily those of the European Central Bank.Published on 11 August 2022 and recorded…
 
Patch notes, and the risks associated with failure to patch. Finland's parliament comes under cyberattack. Killnet says there will be blood, but they may just be grandstanding for the home crowd. Cyberattacks against a UK firm that's criticized Russia's war. We’re joined by FBI Cyber Division AD Bryan Vorndran and Adam Hickey, deputy assistant atto…
 
Welcome to this 10th episode of The Creating Wealth Show where Jason discusses other topics of great interest. Today’s guest is none other than..Jason Hartman! Jason recently sat down with Success Coach, Business Consultant, Speaker, Best-Selling Author and Entrepreneur Kate McKay on her Master Your Life Podcast and they took a deep dive into Jason…
 
Tracking apparent Chinese industrial cyberespionage. Tornado Cash sanctions. Twilio discloses a breach. Social engineering exposes data at Klaviyo. Microsoft’s Ann Johnson previews the latest season of Afternoon Cyber Tea. Joe Carrigan tracks the growth in cryptojacking. And what might the Mounties be monitoring? For links to all of today's stories…
 
In order to run a successful SOC, security leaders rely on tools with different strengths to create layers of defense. This has led to a highly siloed industry with over 2,000 vendors, each with their own specific function and who very seldom work together. To gain an advantage on attackers, we need to start seeing cybersecurity as a team sport–uni…
 
Shifting cyber threats during Russia's war against Ukraine. A Twitter exploit may have compromised more than 5 million accounts. A Cyberattack disrupts NHS 111. Developments in the C2C market. An alleged Russian cryptocurrency exchange operator is extradited to the US. Rick Howard looks at FinTech. Andrea Little Limbago from Interos on Industrial p…
 
The most overlooked facet of asset protection is actually one of the easiest! Jason Hartman invites Rich Dad Advisor Garrett Sutton to talk about the ongoing requirements to keep your corporation or LLC current in good standing. If you fail to follow these simple rules, a court can pierce through the corporation or LLC, also known as “the corporate…
 
Anna Belak, Director of Thought Leadership at Sysdig, shares her story from physics to cyber. Anna explains how she went into college with the thinking of getting a physics degree and then for her PhD decided to switch to material science and engineering. Both were not something she enjoyed and ultimately decided to go into cyber. She shares some a…
 
Jason Hartman welcomes bitcoin expert and author of "Bitcoin Clarity," Kiara Bickers. There's a lot of noise in the crypto space involving all kinds of buzzwords and Kiara's work helps us take a step back and obtain a true understanding of all the properties of the system without having to learn how to code or be a cryptographer. Her book aims to h…
 
Deepen Desai from Zscaler's ThreatLabz joins Dave to discuss how APTs, like Lyceum Group, create tactics and malware to carry out attacks against their targets. The Lyceum group has been active since 2017 and is a state-sponsored Iranian APT group. This group targets Middle Eastern organizations most notably in the energy and telecommunication sect…
 
CyberFront Z's failed influence operation. Iranian operators target Albanian government networks. CISA issues two ICS security advisories. Andy Robbins of SpecterOps to discuss Attack Paths in Azure. Denis O'Shea of Mobile Mentor talking on the intersection of endpoint security and employee experience. CISA and ACSC issue a joint advisory on top ma…
 
Today's Flashback Friday is from episode 542 published last July 15, 2015. The world of long term financial savings plans can leave you dizzy. The paperwork can be pages and pages of jargon which make plans hard to distinguish and administer. Jason’s guest Edwin Kelly from Specialized IRA Services breaks down the Self Directed IRA, the solo 401k an…
 
Ukraine claims to have taken down a massive Russian bot farm. Russian cyber operations may have been premature. A report says Emergency Alert Systems might be vulnerable to hijacking. The Mirai botnet may have a descendant. Adam Flatley from Redacted with a look back at NotPetya. Ryan Windham from Imperva takes on Bad Bots. Attacks on a cryptocurre…
 
This joint Cybersecurity Advisory was coauthored by CISA and the Australian Cyber Security Centre, or ACSC. This advisory provides details on the top malware strains observed in 2021. AA22-216A Alert, Technical Details, and Mitigations For alerts on malicious and criminal cyber activity, see the FBI Internet Crime Complaint Center webpage. For more…
 
Tories delay a leadership vote over security concerns. A summary of the cyber phases of the hybrid war. Cyberattacks affect three official sites in Taiwan. Malware designed to abuse trust. Gunter Ollmann of Devo to discuss how Cybercriminals are Winning the AI Race. Renuka Nadkarni of Aryaka explains enterprises can recession proof security archite…
 
According to Tina Tamboer, Senior Housing Analyst at The Cromford Report, what we’re seeing in the housing market is not a correction, but rather a disruption and the next few months are going to be a very telling time. Jason Hartman and Tina put the Phoenix housing market under a microscope to see exactly what’s happening with buyers, sellers, lis…
 
Nomad cryptocurrency bridge is looted. The BlackCat ransomware gang hits a Luxembourgeois energy company. DSIRF disputes Microsoft's characterization of the Austrian firm as cyber mercenaries. Ben Yelin looks at privacy concerns in the education software market. Our guest is PJ Kirner from Illumio to discuss Zero Trust Segmentation. And, finally, a…
 
The U.S. Patent and Trademark Office has awarded The Ohio State University a trademark for the word “THE,” for use in connection with apparel sold in “channels customary to the field of sports and collegiate athletics”. Jones Day partner Meredith Wilkes explains, how the University was able to obtain a registration, and the important lessons the ac…
 
KillNet threatens hack-and-leak op against HIMARS maker. Online investment scams hit Europe. Microsoft associates Raspberry Robin with EvilCorp. Rick Howard previews season ten of the CSO Perspectives podcast. Our guest is Nate Kharrl of SpecTrust on deploying fraud detection at the gateway. And a heartfelt farewell to a woman who’s inspiration liv…
 
Is the housing market at an inflection point? Tina Tamboer, Senior Housing Analyst at The Cromford Report says there has been a significant shift, specifically in supply and demand creating a very interesting dynamic right now in the greater Phoenix area market. Are things becoming more favorable to buyers? What about investors? Is this seller’s ma…
 
Larry Cashdollar, Principal Security Intelligence Response Engineer at Akamai Technologies, sits down with Dave Bittner to discuss his life leading up to working at Akamai. He shares his story from his beginnings to now, describing what college life was like as a young computer enthusiast. He says "If you look at my 1986 yearbook, I think it was my…
 
Israel Barak, CISO from Cybereason, sits down with Dave to discuss their research, "Operation CuckooBees: Cybereason Uncovers Massive Chinese Intellectual Property Theft Operation." Cybereason researchers recently found an attack lurking beneath the surface which was assessed to be the work of Chinese APT Winnti. Cybereason briefed the FBI and the …
 
Anonymous's hacktivism in a hybrid war. Pyongyang's [un]H0lyGh0st. Phishing in the IPFS. Update on the initial access criminal-to-criminal market and its effect on MSPs. Cyber gangs move away from malicious macros. Thomas Etheridge from CrowdStrike on managed detection and response. Rick Howard sits down with Art Poghosyan from Britive to discuss D…
 
Today's Flashback Friday is from episode 411, published last September 10, 2014. Jeff Reeves is the Editor at InvestorPlace.com. He's the author of, "The Frugal Investor’s Guide to Finding Great Stocks." Reeves discusses why investors should love Google again. He also explains why blue chip brands like Amazon, Coke and Whole Foods make for bad inve…
 
SSSCIP and CISA sign a memorandum of cooperation. Are private-sector offensive actors tailored security services, or are they just hired guns? Bringing cyber mercenaries to heel. Malek Ben Salem from Accenture on why crisis management is at the heart of ransomware resilience. Our guest is Derek Manky from Fortinet on the World Economic Forum Partne…
 
IBM reports on the cost of a data breach. Personal apps as a potential business risk. Over on the dark side, there’s help wanted in the C2C labor market. An employee engagement study reaches predictably glum conclusions. Betsy Carmelite from Booz Allen Hamilton on reducing software supply chain risks with SBOMs. Our guest is Elaine Lee from Mimecas…
 
Jason Hartman welcomes Steve Hoffman back to the show today to hear about the latest developments regarding real estate, digital assets and speculation in the metaverse. As we see a lot of big brands such as Gucci jumping into the virtual space to sell digital assets, a lot of people are wondering, where do you buy land in the metaverse? Are these …
 
LockBit gets an upgrade. CosmicStrand firmware rootkit is out in a new and improved version. Are thieves being treated like white hats? AV-Test's Twitter account is hijacked. Joe Carrigan considers the mental health effects of the online scam economy. Mr. Security Answer Person John Pescatore ponders the cybersecurity talent gap. And ongoing specul…
 
La confidentialité et le secret professionnel résultant de la relation avocat-client sont des principes essentiels de l’exercice de la profession d’avocat. À cet égard, les litiges internationaux, qui peuvent être soumis à des règles de confidentialité différentes et parfois contradictoires, notamment concernant les juristes d’entreprise, présenten…
 
Confidentiality and attorney-client privilege are cardinal principles for lawyers. In this regard, international litigation, which may be subject to different and sometimes conflicting confidentiality rules, presents many challenges to the legal teams involved in such a process. Ozan Akyurek and Cyril Philibert, partners in Jones Day’s Global Dispu…
 
The minor mystery of GPS-jamming. Twitter investigates an apparent data breach. Ransomware command and control staging is discovered. Andrea Little Limbago from Interos looks at the intersection of social sciences and cyber. Our guest is Nelly Porter from Google Cloud on the emerging idea of confidential computing. A C2C offering restricted to pote…
 
Jason Hartman invites Tom Wheelwright, entrepreneur, best selling author, Rich Dad Advisor® & International Authority on Tax to discuss how we as taxpayers can do what the government wants done and get a tax break for doing it! We've heard a lot of discussion in the media and in politics about how the rich don't pay taxes, but maybe they should rep…
 
Shifting left has been a buzzword in the application security space for several years now, and with good reason – making security an integral part of development is the only practical approach for modern agile workflows. But in their drive to build security testing into development as early as possible, many organizations are neglecting application…
 
Mary Writz, Vice President of Product Strategy at ForgeRock, shares how each career path she has taken has led her to where she is now. Mary describes how she has been a woman working in a male dominated field for most of her career and how she had to take charge, and she had to get the men to take charge with her. She says "I was often leading peo…
 
Loading …

Quick Reference Guide

Copyright 2022 | Sitemap | Privacy Policy | Terms of Service
Google login Twitter login Classic login