No Password Required
Cyber Florida
All episodes
Best episodes
Top 10 No Password Required Episodes
Goodpods has curated a list of the 10 best No Password Required episodes, ranked by the number of listens and likes each episode have garnered from our listeners. If you are listening to No Password Required for the first time, there's no better place to start than with one of these standout episodes. If you are a fan of the show, vote for your favorite No Password Required episode by adding your comments to the episode page.
No Password Required Podcast Episode 46 — Dr. Diana Burley
No Password Required
01/31/24 • 58 min
SummaryThe conversation discusses the arrest of Ola Segun Simpson Adagorin, a Nigerian national facing US federal charges for a business email compromise scheme. The collaboration between the FBI and Ghana is highlighted, along with the role of the legal attache job in solving crimes with international impact. The scheme and indictment details are explored, emphasizing the sophistication of the attack. Dr. Diana Burley, Vice Provost for Research and Innovation at American University, shares insights on cybersecurity education and workforce readiness. The importance of understanding human behavior in cybersecurity is discussed, along with strategies for engaging in conversations and addressing the search for cyber unicorns. In this episode, the importance of password security and the various methods to enhance it are discussed. The conversation covers common password mistakes, the use of password managers, multi-factor authentication, biometric authentication, and the future of password security.
Takeaways
- Collaboration between law enforcement agencies is crucial in solving cybercrime cases with international implications.
- Understanding human behavior is essential in addressing cybersecurity challenges and shaping effective policies.
- Digital literacy and foundational cybersecurity skills should be integrated into education across disciplines.
- Creating a culture of cybersecurity requires a balance between rules and creativity, and a focus on psychological safety.
- Engaging in conversations with strangers can be facilitated by finding common interests and making personal connections. Create strong and unique passwords for each online account.
- Avoid common password mistakes such as using personal information or easily guessable patterns.
- Consider using a password manager to securely store and generate passwords.
- Enable multi-factor authentication whenever possible for an added layer of security.
- Biometric authentication, such as fingerprint or facial recognition, can provide convenient and secure access to devices and accounts.
- Passwordless authentication methods, such as biometrics or hardware tokens, may become more prevalent in the future.
- Stay informed about emerging technologies and best practices in password security.
Chapters
00:00 Introduction and Arrest of Ola Segun Simpson Adagorin
01:24 Collaboration between FBI and Ghana
03:15 Scheme and Indictment Details
04:44 Legal Attache Job and Collaboration
06:10 Deterrence and Sealed Indictments
07:36 Introduction of Dr. Diana Burley
08:31 Dr. Burley's Background and Role at American University
09:23 Interest in Cybersecurity and Technology
10:21 American University's Role in Educating Policymakers
12:15 Engaging with Leaders and Shaping Policy
13:36 Engaging with Students and Future Leaders
14:28 American University's Focus on Policy and Research
15:27 Misconceptions about the Cybersecurity Workforce
16:23 Digital Literacy and Foundational Cybersecurity Skills
18:45 Retaining Skilled Members in the Academic Environment
19:43 Benefits of Engaging as a University Faculty Member
20:37 Understanding Human Behavior in Cybersecurity
22:05 Insights from Research on Human Behavior
23:25 Understanding Employee Behavior in Cybersecurity
24:47 Creating a Culture of Cybersecurity
27:08 Strategies for Initiating Conversations with Strangers
31:50 The Cyber Unicorn Project
35:08 Addressing the Search for Cyber Unicorns
41:45 Lifestyle Polygraph
50:57 Understanding Irrational Behavior and Self-Awareness
53:37 Engaging in Conversations with Strangers
02:30 The Importance of Password Security
10:15 Common Password Mistakes
18:45 Password Managers
27:10 Multi-Factor Authentication
35:40 Biometric Authentication
44:20 Passwordless Authentication
52:30 Future of Password Security
58:21 Conclusion
No Password Required Podcast Episode 50 — Tanya Janca
No Password Required
05/28/24 • 60 min
Summary
The conversation discusses the extradition case of Julian Assange and the role of the US prison system in the decision. It also explores Tanya Janca's role at Semgrep and her passion for affordable cybersecurity education. Additionally, it touches on Tanya's experience in election security and the importance of transparency in the process. Tanya discusses her volunteer work with the Canadian government, where she helps educate students about cybersecurity. She talks about the importance of teaching young people about privacy, protecting digital devices, and understanding cyber threats. Tanya also mentions her involvement in the Cyber Titan competition and her efforts to promote cybersecurity as a career. She shares her experience writing the book 'Alice and Bob Learn Application Security' and her unique approach to making technical concepts accessible through stories and different learning styles. Tanya also talks about the importance of mentoring and how she has benefited from mentors throughout her career.
Keywords
Julian Assange, extradition, US prison system, cybersecurity education, Semgrep, election security, transparency, volunteer work, Canadian government, cybersecurity education, privacy, digital devices, cyber threats, Cyber Titan, promoting cybersecurity, career, Alice and Bob Learn Application Security, technical concepts, stories, learning styles, mentoring
Takeaways
- The extradition case of Julian Assange highlights the differences in prison systems between the US and other Western democracies.
- Tanya Janca's role at Semgrep involves community management and education in the field of cybersecurity.
- Affordable cybersecurity education is crucial for organizations to effectively use security tools and integrate them into their programs.
- Election security requires centralization, knowledge sharing, and transparency to ensure public trust in the process. Volunteer work with the Canadian government focuses on educating students about cybersecurity, including topics like privacy and protecting digital devices.
- Promoting cybersecurity as a career is important, and initiatives like the Cyber Titan competition help engage high school students in learning about cybersecurity.
- Tanya's book 'Alice and Bob Learn Application Security' uses stories and different learning styles to make technical concepts accessible.
- Mentoring is valuable for personal and professional growth, and Tanya has both benefited from mentors and become a mentor herself.
Titles
- The Importance of Transparency in Election Security
- Cybersecurity as a Career: The Cyber Titan Competition
- The Value of Mentoring: Tanya's Experience as a Mentor and Mentee
Sound Bites
- "I am head of community and education, which is a role they made up just for me."
- "They decided, I think in 2017, we need to make a task force to make sure they know cyber."
- "Defenders need to understand attacks or they can't be good at defending, right? Like we're teaching them ethics as we teach them how to hack."
- "Alice and Bob are going to learn secure coding this time."
Chapters
00:00 The Extradition Case of Julian Assange
08:18 Affordable Cybersecurity Education at Semgrep
30:40 Tanya's Volunteer Work with the Canadian Government
31:35 Promoting Cybersecurity as a Career
34:02 Making Technical Concepts Accessible: 'Alice and Bob Learn Application Security'
39:45 The Value of Mentoring
No Password Required Podcast Episode 41 — Allan Liska
No Password Required
09/26/23 • 57 min
No Password Required Podcast Episode 39 - Lisa Ventura MBE
No Password Required
07/19/23 • 58 min
Chase Fopiano - a kindhearted former police officer who embodies all the qualities of a great leader
No Password Required
01/28/22 • 66 min
No Password Required Podcast Episode 54 — Dr. Sunny Wear
No Password Required
12/10/24 • 51 min
summary
In this episode, the conversation begins with a significant data breach at Star Health Insurance, affecting over 31 million individuals. The discussion delves into the complexities of insider threats, particularly focusing on the alleged involvement of the company's CISO. The episode transitions to an introduction of Dr. Sunny Ware, a web application penetration tester, who shares her journey from software development to cybersecurity. Dr. Sunny discusses her role in penetration testing, the importance of understanding application logic, and the use of AI in her work. The episode concludes with a lifestyle polygraph segment, where Dr. Sunny shares personal insights and experiences, emphasizing the importance of mentorship in cybersecurity.
takeaways
- Star Health Insurance experienced a major data breach affecting millions.
- Insider threats are predicted to be a significant risk in 2025.
- Dr. Sunny Ware transitioned from software development to cybersecurity.
- Understanding application logic is crucial in penetration testing.
- AI can be a valuable tool in penetration testing.
- Bug bounty programs offer focused opportunities for security testing.
- Mentorship is important for the next generation of cybersecurity professionals.
- Dr. Sunny emphasizes the creativity involved in coding and security.
- Vulnerability disclosure programs differ from bug bounty programs.
- Dr. Sunny's passion for teaching and sharing knowledge is evident.
titles
- The Star Health Insurance Data Breach: A Deep Dive
- Insider Threats: The New Face of Cybersecurity Risks
- Meet Dr. Sunny Ware: A Cybersecurity Trailblazer
- The Art of Penetration Testing with Dr. Sunny
- Exploring AI's Role in Cybersecurity
sound bites
- "Star Health Insurance suffered a significant data security incident."
- "There's a hacker and then there's this kind of cool insider twist."
- "The alleged hackers claimed that Star Health's CISO facilitated the breach."
- "Insider threats are going to be the risk to prepare for in 2025."
- "I came from very humble beginnings."
- "I think coding is like making a painting on a blank canvas."
- "I want to capitalize on the experience I already have in web API."
- "I use AI almost every day on every pen test."
- "I actively do bug hunting."
- "I want to make sure that if there's anything I can share to help."
chapters
00:00 Data Breach at Star Health Insurance
06:06 Insider Threats and Whistleblowers
07:05 Introduction to Dr. Sunny Ware
30:14 Dr. Sunny's Career Path and Penetration Testing
37:00 Lifestyle Polygraph with Dr. Sunny
48:55 Key Takeaways and Closing Thoughts
No Password Required Podcast Episode 53 — Confidence Staveley
No Password Required
10/24/24 • 35 min
Summary
In this episode, the hosts discuss the importance of representation in cybersecurity, highlighting a documentary that showcases the experiences of women and underrepresented groups in the industry. They are joined by Confidence Stavely, founder of the CyberSafe Foundation, who shares her personal journey from a victim of cybercrime to a leader in promoting digital safety and inclusion in Africa. The conversation explores themes of overcoming challenges, the significance of passion in career choices, and the responsibilities of leadership in creating opportunities for others. Confidence also discusses her creative approach to making complex topics accessible through her YouTube series, API Kitchen, and emphasizes the importance of mobilizing resources to empower the next generation in tech.
Takeaways
- The documentary highlights the importance of representation in cybersecurity.
- There are solutions to the challenges faced by underrepresented groups.
- Personal experiences can drive a passion for change in the industry.
- Education is a key factor in overcoming barriers to entry in tech.
- Leadership should focus on values and empowering team members.
- Creativity can be a powerful tool in communicating complex ideas.
- API Kitchen was created as a response to gender stereotypes in tech.
- Cybersecurity skills can significantly change lives and communities.
- It's essential to hold the door open for others in the industry.
- Passion is a driving force behind career success.
Chapters
00:00 The Impact of Representation in Cybersecurity
05:47 Confidence Stavely's Journey and CyberSafe Foundation
12:00 Overcoming Challenges and Pursuing Passion
18:00 Leadership and Responsibility in Cybersecurity
24:12 Creativity and Communication in Tech
29:46 Personal Growth and Future Aspirations
No Password Required Podcast Episode 51 — Maretta Morovitz
No Password Required
07/08/24 • 54 min
Summary
Kenya's efforts to enhance its cybersecurity and technological progress through partnerships with the US and major tech companies. The focus is on responsible state behavior in cyberspace and addressing mobile app security. The role of public-private partnerships in promoting a robust digital economy and infrastructure. The conversation then transitions to an interview with Maretta Morovitz, a cybersecurity expert at MITRE, discussing her career path, the importance of mentorship, and the impact of ADHD on her work. The discussion also covers MITRE Engage, which focuses on cyber denial, deception, and adversary engagement, and highlights the use of simple yet effective techniques like decoy credentials. In this conversation, Maretta Morovitz discusses the importance of thinking creatively and outside the box when it comes to cybersecurity solutions, especially for organizations with limited budgets. She emphasizes the need for simplicity and proactive measures in cybersecurity. Maretta also highlights the value of interdisciplinary collaboration in the field, involving professionals from various backgrounds such as human behavioral scientists and graphic designers. She shares a successful collaboration between MITRE and HSBC in the field of deception operations. Maretta also talks about her passion for dance and her unique talent of reciting the alphabet backwards.
Keywords
Kenya, cybersecurity, technological progress, partnerships, responsible state behavior, mobile app security, public-private partnerships, digital economy, infrastructure, interview, Maretta Morovitz, career path, mentorship, ADHD, MITRE Engage, cyber denial, deception, adversary engagement, decoy credentials, cybersecurity, low budget solutions, simplicity, proactive measures, interdisciplinary collaboration, deception operations, dance, talent
Takeaways
- Kenya is forging partnerships with the US and major tech companies to enhance its cybersecurity and technological progress.
- The focus is on responsible state behavior in cyberspace and addressing mobile app security.
- Public-private partnerships play a crucial role in promoting a robust digital economy and infrastructure.
- Mentorship is important in career development, and having mentors who provide opportunities and support can be instrumental in success.
- ADHD can present challenges but also bring unique strengths to the workplace.
- MITRE Engage focuses on cyber denial, deception, and adversary engagement, using simple yet effective techniques like decoy credentials. Thinking creatively and outside the box is crucial in cybersecurity, especially for organizations with limited budgets.
- Simplicity and proactive measures are key in cybersecurity to effectively address threats.
- Interdisciplinary collaboration involving professionals from various backgrounds can bring new perspectives and solutions to the field.
- Deception operations can be a valuable tool in cybersecurity, and successful collaborations in this area have been seen between organizations like MITRE and HSBC.
- Passions and talents outside of cybersecurity, such as dance, can bring unique perspectives and skills to the field.
Sound Bites
- "Sometimes the real solution is something very low tech or just kind of outside the box, low budget."
- "Being proactive has to be simple."
- "We definitely need more of that interdisciplinary approach."
Chapters
00:00 Kenya's Cybersecurity Partnerships
03:24 Addressing Mobile App Security
07:13 Interview with Maretta Morovitz
11:35 Cyber Deception and Adversary Engagement
29:12 The Importance of Simplicity and Proactive Measures
30:07 Interdisciplinary Collaboration in Cybersecurity
31:06 Successful Collaboration in Deception Operations
34:44 Bringing Unique Perspectives and Skills to Cybersecurity
Follow Maretta Morovitz on LinkedIn: Maretta Morovitz
Follow MITRE on Twitter: @MITREcorp
Learn more about MITRE Engage:...
No Password Required Podcast Episode 49 — Tamiko Fletcher LIVE from Sunshine Cyber Con
No Password Required
04/30/24 • 71 min
Summary
In this episode of the No Password Required podcast, host Jack Clabby and co-host Kayley Melton interview Tamiko Fletcher, the CISO at Kennedy Space Center. Tamiko shares her journey from a small town in South Carolina to working at NASA and discusses her role as a CISO. She emphasizes the importance of mentorship, outreach, and diversity in the cybersecurity field. Tamiko also talks about the unique challenges of cybersecurity at NASA, such as patching during launches and balancing innovation with security.
She emphasizes the need to know and learn about individuals' strengths, interests, and motivations in order to effectively place them on teams and utilize their skills. Tamiko also shares her experiences working at NASA and the changes she has witnessed over the years, including the evolution of IT and the increasing diversity at the Kennedy Space Center. She highlights the excitement and pride she feels when witnessing a launch and the impact of NASA's work on the world.
Keywords
NASA, cybersecurity, CISO, career trajectory, mentorship, outreach, diversity, patching, innovation, security, NASA, Kennedy Space Center, cybersecurity, teamwork, understanding people, IT evolution, diversity, launches, personal experiences, imposter syndrome, work-life balance, advocating for oneself, UFOs
Takeaways
- Tamiko Fletcher shares her journey from a small town in South Carolina to working at NASA as the CISO at Kennedy Space Center.
- She highlights the importance of mentorship, outreach, and diversity in the cybersecurity field.
- Tamiko discusses the unique challenges of cybersecurity at NASA, such as patching during launches and balancing innovation with security.
- She emphasizes the need for flexibility and adaptability in the ever-changing cybersecurity landscape. Understanding and valuing people is crucial in the workplace, as it allows for effective team placement and utilization of individual skills.
- The evolution of IT and the increasing diversity at NASA's Kennedy Space Center have been significant changes over the years.
- Witnessing a launch at NASA is an exciting and prideful experience, reminding employees of the impact of their work.
- Advocating for oneself and setting boundaries is important for maintaining work-life balance and overall well-being.
Sound Bites
- "I'm from a small town called Manning, South Carolina. If you look it up on the map, it's near Travel America. It's probably the best thing we got going for it, honestly."
- "Success stories like yours are common at NASA. And it's also based on one's definition of success, right? So everyone has their own definition of what success is for them."
- "I try to actually know and learn people... because I want to understand what makes them tick so I know where to place them on a team."
- "We are human first and then we are who our job is. And I want to be able to utilize that person, that whole person, what makes them happy, what makes them excited to come in every day."
- "I have a vast variety of folks on the team who help get cyber done."
Chapters
00:00 Introduction and Welcome to the Podcast
08:00 Education and Career Trajectory
25:48 Challenges and Innovations in Cybersecurity at NASA
34:4 8Building a Team and Emphasizing Diversity
41:30 The Diversity of the Cyber Team at NASA
54:25 Instilling Values in Teams to Change the Work Environment
No Password Required Podcast Episode 48 — Roman Sannikov
No Password Required
03/26/24 • 65 min
Summary
Roman Sanikov, is the president of Constellation Cyber and specializes in cyber threat intelligence. In this episode, Roman discusses the importance of collaboration and transparency in the cybersecurity industry, particularly in combating ransomware attacks. He also emphasizes the need for a holistic approach to cybersecurity, involving education and empowerment for both employees and consumers. In this episode, Roman Reinhart shares his experiences as an undercover agent in the cybercrime world. He discusses maintaining a persona, dealing with forum behavior, and memorable arrests. He also emphasizes the importance of redemption and second chances. Roman also talks about his involvement with Helpster USA, an organization dedicated to providing life-saving treatment to young people in developing economies. He shares his hobbies of mushrooming and highlights the satisfying moments at work. Finally, he reflects on the cultural differences he experienced after moving overseas.
Takeaways
- Pig butchering schemes are a significant cause of financial losses globally, and it is important to approach the topic with compassion and nuance.
- Many scammers involved in these schemes are forced into this life against their will, either through human trafficking or being lured into it with false promises.
- Collaboration and transparency are crucial in the cybersecurity industry to effectively combat ransomware attacks and mitigate their secondary and tertiary impacts.
- A holistic approach to cybersecurity, involving education and empowerment for employees and consumers, is necessary to create a more secure environment. Maintaining a persona in the cybercrime world requires careful observation and adaptation.
- Memorable arrests can lead to redemption and second chances for individuals involved in cybercrime.
- Helpster USA provides life-saving treatment to young people in developing economies.
- Mushrooming is a rewarding hobby that allows for outdoor exploration and collection.
- Satisfying moments at work include helping clients have eureka moments and making positive changes.
- Cultural differences, such as politeness, can take time to understand and adapt to.
Chapters
00:00 Introduction to Pig Butchering Schemes (opening conversation)
02:18 Online Scams and Exploitation
03:41 Forced Labor and Human Trafficking
04:41 Approaching Scams with Compassion
05:39 Guest Introduction: Roman Sanikov
07:01 Roman's Role at Constellation Cyber
08:22 Promoting Transparency in Ransomware Incidents
10:17 Mitigating Secondary and Tertiary Impacts of Ransomware Attacks
11:14 The Ripple Effect of Ransomware Attacks
13:10 The Importance of Collaboration in Cybersecurity
14:58 Roman's Career Path and Background
19:34 Educating and Empowering Employees and Consumers
21:28 Avoiding Victim-Blaming in Cybersecurity
24:16 The Need for Collaboration and Transparency in the Industry
25:10 Balancing Non-Traditional Pursuits with College
26:37 Undercover Work and Building Relationships
33:07 Maintaining a Persona
36:25 Dealing with Forum Behavior
38:18 Memorable Arrests
41:25 Redemption and Second Chances
45:13 Helpster USA
48:16 Eccentricities of NHL Players
50:56 Life's Unexpected Moments
56:19 The Joy of Mushrooming
58:43 Satisfying Moments at Work
01:01:04 Learning Politeness in America
Show more best episodes
Show more best episodes
FAQ
How many episodes does No Password Required have?
No Password Required currently has 56 episodes available.
What topics does No Password Required cover?
The podcast is about Coding, Cloud, Information Security, Code, Infosec, Data, How To, Software, Network Security, Cloud Computing, Windows, Podcasts, Anonymous, Big Data, Technology, Developer, Education, Internet, Business, National Security, Data Privacy, Networking, Python, Cybersecurity and Network.
What is the most popular episode on No Password Required?
The episode title 'No Password Required Podcast Episode 50 — Tanya Janca' is the most popular.
What is the average episode length on No Password Required?
The average episode length on No Password Required is 57 minutes.
How often are episodes of No Password Required released?
Episodes of No Password Required are typically released every 28 days, 23 hours.
When was the first episode of No Password Required?
The first episode of No Password Required was released on Nov 7, 2019.
Show more FAQ
Show more FAQ