Fearless Paranoia

Fearless Paranoia

A Cybersecurity Lawyer and an IT Specialist helping to demystify the world of cybersecurity. The language and terminology of cybersecurity is oftentimes intentionally confusing and hard to keep up with even for experienced professionals. Each week, we will break down different topics in the cybersecurity, data security, and privacy fields to help you be able to keep up. Understanding cybersecurity has never been more important to everyday life, but also never more difficult to do.

Episodes

May 23, 2023 21 mins

Uncover the reality of the Dark Web in our latest episode. Beyond the myth, we explore its structure, uses, and inherent risks.

Mark as Played

Discover unseen cybersecurity risks in your office space as we explore the importance of physical security in digital defense.

Mark as Played

The pandemic has led to the rise of what's called "Shadow IT." We discuss what that means, and what you can do about it.

Mark as Played

Discover the rising threat of supply chain attacks and ways to protect yourself in today's digital landscape.

Mark as Played

We explore cybersecurity testing methods for businesses: vulnerability assessments, penetration testing, & red team tests. Stay secure out there!

Mark as Played

Explore the perils of Generative AI, from plagiarism to misinformation, and from cyber threats to the end of objective reality.

Mark as Played

In this episode, we explore the benefits of AI: revolutionizing industries, improving lives, and enhancing human capabilities.

Mark as Played

Discover the power and potential of Generative AI and Large Language Models. Check out this episode to learn about these amazing/terrifying technologies.

Mark as Played

Zero-day exploits are the silent killers of the cybersecurity world, and these two are no different. Can you possibly protect yourself?

Mark as Played

When T-Mobile was hacked, and the entire dataset of millions of customers were leaked, did you consider that the hackers would take that data right back to T-Mobile? You should have.

Mark as Played

One of the most common and most dangerous types of cyberattacks is a Business Email Compromise. We discuss what a BEC is, what makes it so devastating, and how to protect yourself.

Mark as Played

Proving that you are who you say you are is the primary goal of most cybersecurity systems. The best way to accomplish that task is through Multi-Factor Authentication. Here's how:

Mark as Played

Failing to properly secure your data using API best practices is like having the best home security system on the market, but leaving the back door open. Here's how to avoid that mistake.

Mark as Played

37 million customer records were recently stolen from T-Moblie by exploiting an API. So what are APIs, and why are they such a popular tool for hackers? We discuss.

Mark as Played

Another one of those cybersecurity concepts that is talked about a lot but difficult to fully understand is Encryption. By understanding a few basic concepts, you can make sense of it all.

Mark as Played

Keeping your private information secret just feels hard to accomplish these days. Fortunately, there are steps you can take - right now - that can protect your privacy and secure your online identity.

Mark as Played

Technology moves pretty fast these days. It can be difficult to know what to do to best protect your personal data from theft or loss. Here are some tips, straight from the expert.

Mark as Played

There are a lot of opinions floating around about the most recent LastPass breach. But before you read those, do these three things right now, and thank us later.

Mark as Played

One of the hottest buzz-phrases in cybersecurity these days is “zero trust.” In this episode, we talk about the three elements of zero trust cybersecurity, and how to implement a zero trust model without breaking the bank.

Mark as Played

Your cybersecurity systems may be top-notch, with an amazing firewall and great protections from cyberattacks. But the true measure of your cybersecurity effectiveness is your resilience - your ability to recover from an attack. In this episode, we discuss why.

Mark as Played

Popular Podcasts

    Current and classic episodes, featuring compelling true-crime mysteries, powerful documentaries and in-depth investigations.

    Crime Junkie

    If you can never get enough true crime... Congratulations, you’ve found your people.

    CounterClock

    In order to tell the story of a crime, you have to turn back time. Every season, Investigative journalist Delia D'Ambra digs deep into a mind-bending mystery with the hopes of reigniting interest in a decades old homicide case.

    Morbid

    It’s a lighthearted nightmare in here, weirdos! Morbid is a true crime, creepy history and all things spooky podcast hosted by an autopsy technician and a hairstylist. Join us for a heavy dose of research with a dash of comedy thrown in for flavor.

    20/20

    Unforgettable true crime mysteries, exclusive newsmaker interviews, hard-hitting investigative reports and in-depth coverage of high profile stories.

Advertise With Us

For You

    Music, radio and podcasts, all free. Listen online or download the iHeart App.

    Connect

    © 2023 iHeartMedia, Inc.