Learn how to think not what to think.
What are the 6 layers in the Bulletproof Stack Formula?
How are they grouped?
What are the most neglected layers?
Episode summaryThere are 6 types of layers we can review to help us build a Security Stack. They help us build redundancy into our Security Stack. Yes, that's a good thing! We want as many layers of defense as we can to keep the b...
Seven Critical Router Security Settings
Questions we answer in this episodeWhat are the 5 questions in the Bulletproof Stack Formula?
How do they help us?
Episode summaryThere are 5 questions we can ask to help us build a Security Stack. These questions help to ensure that our Security Stack is relevant.
This means there is a legitimate threat that I care about, and I'm will...
What are the 4 phases in a Security Stack?
How do they help us?
Which one is the most important?
Episode summaryThe 4 phases of a Security Stack are: Learn, Prevent, Detect, and Repair. This parallels how an attack affects us over time.
We want to Learn about an attack before it hits us, and ideally Prevent it from succeeding. But just in case...
4 Strategies for Picking Your Priorities
Questions we answer in this episodeWhat does Makani love building?
What is a Security Stack?
How do you build one?
What is the twist on our usual Call-to-Actions for this series?
Episode summaryA Security Stack is a piece of your Personal Security Plan focused on a specific area. It is comprised of layers of protection that work together to keep you safe.
You bui...
What is the 4P formula?
What are 4 strategies for picking your priorities?
What is the theme of our new series of episodes?
How many episodes do you think it will take Makani to finish it?
Episode summaryThere's a lot of ways you can improve your online security. But where should you begin? It can be a daunting question to answer.
Picking your priorities goes a long way. There are 4 simple strategies y...
Why is Makani sharing his story?
What is a domain name registrar?
What is whois data?
How can it help me stay safe online?
Episode summaryA domain name is what we think of as a website - facebook.com or makanimason.com. In order to have your own domain, you need to pay some money and share some personal informati...
Episode 62, Even a Security Expert Can Get Phished (Troy Hunt, Part 1)
Episode 17, Eliminating Email Exhaustion - Part 2 - Unique Emails
Episode 42, Website and Email Filtering, Part 3: Email Friends
Questions we answer in this episodeWho is to blame for Troy getting phished?
How can you reliably tell who sent you an email?
How can you cut down your email spam?
What are two major flaws in our email syst...
Who is Troy Hunt?
How did he get phished?
What are some lessons we can learn from his story?
Who will we be inviting as a guest to the podcast?
Episode summaryTroy Hunt, a security expert, got phished. He clicked a link in an email, and entered his password into a fake website.
The hackers logged into his Mailchimp account that he uses to send his email newsletter. They stole the email addresses of all...
What is the website, ID.me used for?
What are the two PIN numbers used in filing your taxes?
How can I get an identity protection (IP) PIN?
What does it mean (in online security) to plant your flag?
Episode summaryWhen filing your taxes, there are 2 different PINs you might use. The first is called your self-select PIN. It's 5 digits long, and pointless.
The second is called an Identity Protection (IP)...
What is a DDoS attack?
What social media platform was recently the target of a DDoS attack?
How can your home network be impacted by one?
What can you do to protect your home network?
Episode summaryDDoS attacks are growing faster than the squash in my garden - seriously, it's wild!
The slaves in the army? Devices quietly hijacked by hackers.
There are millions of them scattered around the globe...
And y...
Episode 40 - Website and Email Filtering
Episode 56 - Home Network Attacks From Within
Episode 57 - How Firewalls Protect You And What You Might Be Missing
Questions we answer in this episodeWhat is a trojan horse?
What are two ways an outbound firewall protects you?
What is an outbound firewall's greatest frustration and greatest strength?
What is an allow list?
Episode summaryIf you want to protect you...
Home Network Attacks From Within
Questions we answer in this episodeWhat is a guest network?
How can it protect my home network?
Does everyone need to use it?
What are the 3 categories of Internet of Things (IoT) devices?
Episode summaryA guest network is a second wifi network you can set up at home.
It lets visitors use your internet without touching your main network.
That mean...
Home Network Attacks From Within
Questions we answer in this episodeWhat is a firewall?
Why do I need more than one firewall?
Which device already has a firewall enabled?
What kinds of devices have an increased need for a firewall?
Episode summaryFirewalls in buildings stop fire from spreading.
Firewalls on computers do something similar: they stop malware f...
What is a computer virus?
How does a computer virus spread?
How does patient (device) zero get infected?
What protection do we NOT have against these attacks?
Episode summaryWhat happens if a device in your home gets infected with a computer virus?
Just like a human virus, it wants to spread.
But how does that first device get infected?
There are p...
What are the seven most critical router security settings?
What is WPS and when is it okay to use?
What is a brute force password attack?
Which unexpected setting helps against this attack?
Episode summaryDefault passwords and settings make a hacker's job easy.
It's time to take just a few minutes and strengthen your router's security.
If you don't know how to access your router, please listen to Episod...
Why do I need the manual for my router?
What's the first step in accessing my router?
How many passwords are there for my home network?
What are the two methods for connecting to a router?
Episode summaryIf you can install an app, and visit a website, you can learn to access your router.
Reading the section in the router's manual should help.
Yes, I realize many of us don't read manuals anymore, but tha...
What is the awesome new tool we're building?
How can you get free lifetime access to it?
What problem does it solve?
What is a computer network port?
Episode summaryComputer network ports are like phone extensions in a corporate office building.
But instead of using an extension to reach a specific person, computer use ports to access specific services.
Services like visting a webpage, sending an email,...
What is the simple rule to keep your home network safe?
Why is breaking that rule so common?
How do I know if MY router is following the rule?
What new tool are we building?
Episode summaryYour home network's guardian from internet based attacks is your router.
To keep your home safe from these attacks, your router needs to follow one simple rule:
Don't answer the phone!
Unfortunately, convenience often ...
What is a router?
How many episodes will be in this series?
Is Makani trying to turn me into a network engineer?
What is the metaphor we will use for this series?
Episode summaryEvery internet connected device is under constant threat of attack.
Especially the router on your home network.
In order to protect your devices, you don't need to become a network engineer.
But you need to understand 3 ...
What are the phone protections the FCC mandated in 2024?
What is a sim swap attack?
What is a port-out attack?
What is your second most important online account?
United States of Kennedy is a podcast about our cultural fascination with the Kennedy dynasty. Every week, hosts Lyra Smith and George Civeris go into one aspect of the Kennedy story.
Current and classic episodes, featuring compelling true-crime mysteries, powerful documentaries and in-depth investigations. Follow now to get the latest episodes of Dateline NBC completely free, or subscribe to Dateline Premium for ad-free listening and exclusive bonus content: DatelinePremium.com
Welcome to Bookmarked by Reese’s Book Club — the podcast where great stories, bold women, and irresistible conversations collide! Hosted by award-winning journalist Danielle Robay, each week new episodes balance thoughtful literary insight with the fervor of buzzy book trends, pop culture and more. Bookmarked brings together celebrities, tastemakers, influencers and authors from Reese's Book Club and beyond to share stories that transcend the page. Pull up a chair. You’re not just listening — you’re part of the conversation.
The World's Most Dangerous Morning Show, The Breakfast Club, With DJ Envy And Charlamagne Tha God!
The latest news in 4 minutes updated every hour, every day.