show episodes
 
Presented by National Debt Relief, a New York Better Business Bureau accredited business, the National Debt Relief podcast shares personal finance insights to help you manage your money wisely. Learn what are the main causes of credit card debt and how to deal with them. You may also laugh with some of our corny jokes about money and famous quotes about money, credit and debt. You'll also learn about the differences between debt consolidation loans, debt negotiation, debt settlement, bankrup ...
  continue reading
 
Loading …
show series
 
The boys welcome back David Moulton (commradedoom1) to discuss AIDS activism in the 80s to now. They also discuss big pharma goals and how queer ideology has been at the forefront of lifelong medicalization. Check out his compact mag piece: https://compactmag.com/article/how-leftists-became-big-pharma-s-shock-troops…
  continue reading
 
Crypto Finance How does a crypto finance agency work with security? To answer this question, and provide insight into security in the world of crypto, we’re joined by Dr. Dominik Raub. He has more than 10 years of experience from the financial industry, a Doctor of Sciences in Cryptography, and works as CISO at Crypto Finance AG, an organisation pr…
  continue reading
 
Due to a horrible accident at the misinfo factory, the audio we recorded for this week's episode was corrupted... (we remain convinced but without evidence that the cabal is responsible for this). So this week we are re-broadcasting Q's appearance on Here Comes the Backklash, hosted by friend of the pod Poolhouse [@NuganHandVEVO]! Hope you all enjo…
  continue reading
 
Office IoT Can you say for certain that you have a full overview of the IoT devices that are set up in your office environment? Smart Lighting, thermostats, locks, appliances, security cameras, sensors... perhaps even a fish tank? To talk about the importance of securing our office IoT, and specifically our printers, Robby is joined by Quentyn Tayl…
  continue reading
 
Passwords and their managers How do you create your passwords? Do you get help from a password manager, or is your personal “system” bulletproof? Robby has invited two guests passionate about passwords, and how we manage them. Not surprisingly, they can with confidence say that our own “systems” are highly guessable, and not as unique as you might …
  continue reading
 
Darkwebs Most of us have our ideas and perceptions of what the Dark Web is. But could it be more than just the dark side of the World Wide Web? To talk about the Dark Web, Robby is joined by Keven Hendricks, Dark Web Subject Matter Expert at The Ubivis Project. Keven has worked in law enforcement in the US since 2007, in areas such as computer and …
  continue reading
 
In Brophie's Choice a lone twitter bro must decide: Hulk Hogan with a pussy or Megan Fox with a dick? Cassandra (@truth_enjoyer) , A (@lowiqmoron), and Q (@saintq92) discuss this dilemma of all dilemmas, greater even than the Sphinx's riddle. They also give tips on orgasms, getting blow jobs from guys while refusing to look at their face, and love …
  continue reading
 
The importance of identity within our field has been established. According to analysis from CrowdStrike, 8/10 attacks are identity-based. But what does that actually mean? How do we even define identity these days, and how has it changed? To look into this, Robby has invited an expert within the field, Peter Barta. Peter works as a Senior Cloud Se…
  continue reading
 
This week the boys welcome e-girl extraordinaire Cassandra back on the pod to ask the hard hitting questions. Are right wing twitter boys all gay for each other? Is Tony Soprano a 1 or 0 on the binary? At the end of the day are we all mid? Cassandra and Q also torture A by re-hashing the Caroline Calloway/Natalie Beach controversy because Q got an …
  continue reading
 
Bots; they can be both helpful assistants and harmful pests, and you’ll find them all over the internet targeting most public facing applications in some way or another. But what actually are they? To explore the bad bots on the Internet, Robby is joined by someone that has spent the last seven years studying them, Dan Woods, Global Head of Intelli…
  continue reading
 
This episode is for anyone working within cybersecurity that has ever had to explain what they actually do, or defend why they are investing in security. We’re happy to welcome Jeff Barto back to the podcast, to go through his presentation “We are Defending” that he presented at mnemonic’s C2 summit this summer. Jeff is the CISO of a large hedge fo…
  continue reading
 
House of Pain: new EU cyber regulations NIS2, DORA, the Cyber Resilience and Artificial Intelligence acts; have you started to familiarise yourself with the new EU cyber regulations that are coming into force? In this episode, Robby welcomes Rolf von Roessing, former Vice Chair of ISACA Global, and CEO of FORFA Consulting, a German company speciali…
  continue reading
 
While A does dad-duty, Q and twitter extraordinaire Basil (@NeoBactrian) discuss George Santos and Marjorie Taylor Greene beginning to bring drama back to congress, Jeffree Starr, frat boys in colorful shorts as menace or sexual gods (?), and Basil's recent trip to Afghanistan (seriously he went to Afghanistan). It's a ride!…
  continue reading
 
What happens when cyber criminals don’t get what they believe they're owed? For this episode, Robby is joined by John Fokker, Head of Trellix Threat Intelligence. John shares from his long experience fighting cybercrime, where he among other places has worked for the Dutch National High-Tech Crime Unit (NHTCU), the Dutch National Police unit dedica…
  continue reading
 
The boys invite Poolhouse [@NuganHandVEVO] back to talk about an overlooked chapter of American history for which Wendy S Painting's book Aberration in the Heartland of the Real has generated renewed interest. This one runs long but its well worth it - at one point nefarious intergalactic beings intervene to shut off the fountain of truth flowing f…
  continue reading
 
Network detection and response (NDR): the value of evidence What exactly is NDR, how have these technologies changed over the years, and are they more relevant now than ever? To help answer these questions, Robby is joined by Jean Schaffer. She’s had, to say the least, an interesting career with more than 33 years of experience from the US Departme…
  continue reading
 
The boys welcome Cassandra to the show to talk rw trad larping & bullshit eco straws at lib bookstores and soooo much more. Is Donald Trump a TERF? Have u ever had your azz coin-bounced by a Female Booty Inspector? Are mountains actually...not mountains at all? Tune in for the answers to these questions...…
  continue reading
 
Industrial Control Systems (ICS) in the cloud Can the cloud fundamentally revolutionise Operational Technology (OT) security? To help Robby understand some of the nuances of OT security and help connect the dots between IT and OT, we’re joined by Vivek Ponnada from the OT, ICS & IoT security company Nozomi Networks. Vivek shares from his 24 years o…
  continue reading
 
Q & A welcome distinguished guest KB Goldtooth from across the pond to talk about his new article published on Off Guardian: "The glorious counter-revolution: how the British beat back the New Normal." From BLM worldwide to propaganda to woke vs. awake, this episode's got it all. Only a little bit of celeb gossip this time - apologies to our girls …
  continue reading
 
Enterprise Security Architecture Most organisations find it challenging to protect themselves against the ever-evolving list of risks and threats. The fact that most of us do this with a limited set of resources makes this even more complicated. Knowing what you should spend your time and efforts on is far from straight forward. But hopefully this …
  continue reading
 
Azure monitoring & hardening What is the best way to build and automate security in the world of Azure? For this episode, Robby has invited someone that spends all their time doing exactly that, or more specifically, identifying all the things that can go wrong within the Microsoft ecosystem; Rik van Duijn, Hacker & Co-Founder of the Dutch cybersec…
  continue reading
 
Q & A talk MAGA Lana Del Rey, Q getting cancelled for a WHITE hot White Lotus take, and discuss the film WR: Mysteries of the Organism, a 1971 freakadelic foray into the life and times of dissident psychologist Wilhelm Reich interspersed with a fictional account of life in Soviet Yugoslavia featuring two hot commies. It's a wild ride so buckle up.…
  continue reading
 
Who are the people helping us to keep the lights on? And what are our adversaries doing to get in the way of this? This episode of the mnemonic security podcast is directing some love and attention toward the people working with Operational Technology (OT) / Industrial Control Systems (ICS). To help him navigate this field, Robby is joined by Micha…
  continue reading
 
What does mobile security mean in 2022? And what are defenders doing to keep the bad guys out of our pockets? To provide some insight into these questions, Robby has invited someone who has worked his entire career in Android security; Dario Durando, Android Malware Analyst at the Dutch security company ThreatFabric. During their conversation, they…
  continue reading
 
As a follow up from last week’s episode on the malicious use-cases of drones with Mario Bartolome Manovel, Robby chats with Pablo Ruiz Encinas, Security Consultant at mnemonic. He recently did a course on drone security – the Drone Security Operations Certificate (DSOC) by DroneSec - and hence has a lot to say on the subject. Pablo did not only bri…
  continue reading
 
Drones: malicious use-cases and how to counteract them. As unmanned aerial vehicles (UAVs), or drones, are growing in popularity commercially, their use-cases are also growing in numbers. To discuss them from a security professional’s view point, Robby has invited Mario Bartolome Manovel, Offensive Security Engineer at Telefonica. Mario talks about…
  continue reading
 
Application Programming Interfaces (APIs) Why is Gartner predicting that API-based attacks will become the most frequent attack vector for applications? Although APIs deserve the credit for a lot of digital transformation and innovation, they’re also an attractive target for bad actors. To explain how APIs are being used these days, and why they ar…
  continue reading
 
Q & A welcome the show's first ever guest, friend of the pod MyFitnessFeelingz. Strap into your moon boots for a truly outta this world discussion on the plausibility of human landings on a certain space rock in the sky. Also Q’s review of post-feminist pro-life quasi pornographic “Blonde” and some low IQ thots on diversity trainings in the workpla…
  continue reading
 
Loading …

Quick Reference Guide

Copyright 2023 | Sitemap | Privacy Policy | Terms of Service