What do inmates do with their phones? Why has ransomware stopped making so much money for cybercriminals? Did you make it available for everyone in the world to download?

In the latest edition of the award-winning podcast Smashing Security, computer security veterans Graham Cluley and Carole Theriault join Maria Varmazis to discuss all this and much more this week.

host:

Graham Cluley – @gcluley
Carol Terrio – @caroletheriault

The guests:

Maria Varmadis – @mvarmazis

Episode link:

Sponsored by:

  • Bit Warden – The Bitwarden vault is end-to-end encrypted with zero-knowledge encryption, including the website URL where you have an account. For a more secure password manager, move to Bitwarden.
  • ManageEngine PAM360 – A fully functional privileged access management suite that provides a holistic view of all privileged devices, users and credentials within your IT infrastructure. From managing and managing access to all enterprise resources to automating the access management lifecycle within your organization, PAM360 does it all.
  • node layer – NordLayer protects corporate networks, protects remote workers and business data. It also helps ensure security compliance. First month free.

Support the show:

You can help the podcast by telling your friends and colleagues about “Smashing Security” and leaving a review. Apple podcasts Also pod chaser.

Become a supporter via Patreon Also Apple podcasts Enjoy ad-free episodes and early release feeds!

follow us:

Follow the show on Twitter. @SmashinSecurityor on Mastodon, Smashing Security SubredditAlso Visit our website for more episodes.

Thank you:

Theme Song: “Vinyl Memories” by Mikael Manvelyan.
Various sound effects: AudioBlocks.

Did you find this article interesting? Follow Graham Cluley on Twitter Also Mastodon To read more about the exclusive content we post.


Graham Cluley is a veteran of the antivirus industry and has worked for many security companies since the early 1990s when he created the first version of Dr. Solomon’s Antivirus Toolkit for Windows. He is now an independent security he is an analyst and makes regular media appearances and lectures internationally on the topics of computer he security, hackers and online he privacy. Follow him on Twitter. @gcluleyfor Mastodon @[email protected]or drop him an email.

cropped-BTA_Logo-B-1-scaled-1
YOUR FUTURE STARTS HERE.

BLUE TRAINING ACADEMY

Register now for our membership to gain access to our elite training program and fast forward your career today!

Newsletter

Subscribe my Newsletter for new blog posts, tips & new photos. Let's stay updated!

cropped-BTA_Logo-B-1-scaled-1
Security Blog

Blue Training Academy

Blue Training Academy was developed in 2018 as a educational and training facility for continuing education and certification courses. Blue Training Academy is an educational institution that allows for all sectors of the public and Criminal Justice field to gain ongoing training and education.

Copyright ©️ All rights reserved. | Blue Training Academy Blog