<?xml version="1.0" encoding="UTF-8"?><?xml-stylesheet href="https://feeds.captivate.fm/style.xsl" type="text/xsl"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0" xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:sy="http://purl.org/rss/1.0/modules/syndication/" xmlns:podcast="https://podcastindex.org/namespace/1.0"><channel><atom:link href="https://feeds.captivate.fm/bytesizedsecurity/" rel="self" type="application/rss+xml"/><title><![CDATA[Byte Sized Security]]></title><podcast:guid>39667670-8014-5302-b621-d7db19ae18d6</podcast:guid><lastBuildDate>Mon, 13 Apr 2026 00:32:01 +0000</lastBuildDate><generator>Captivate.fm</generator><language><![CDATA[en]]></language><copyright><![CDATA[Copyright 2026 Marc David]]></copyright><managingEditor>Marc David</managingEditor><itunes:summary><![CDATA[In a world where cyberattacks are becoming more commonplace, we all need to be vigilant about protecting our digital lives, whether at home or at work. Byte Sized Security is the podcast that provides snackable advice on cybersecurity best practices tailored for professionals on the go.

Hosted by information security expert, Marc David, each 15-20 minute episode provides actionable guidance to help listeners safeguard their devices, data, and organizations against online threats. With new episodes released every Monday, Byte Sized Security covers topics like social engineering, password management, multi-factor authentication, security awareness training, regulatory compliance, incident response, and more.

Whether you're an IT professional, small business owner, developer, or just someone interested in learning more about cybersecurity, Byte Sized Security is the quick, easy way to pick up useful tips and insights you can immediately put into practice. The clear, jargon-free advice is perfect for listening on your commute, during a lunch break, or working out.

Visit bytesizedsecurity.com to access episodes and show notes with key takeaways and links to useful resources mentioned in each episode. Don't let cybercriminals catch you off guard - get smart, fast with Byte Sized Security! Tune in to boost your cybersecurity knowledge and help secure your part of cyberspace.]]></itunes:summary><image><url>https://artwork.captivate.fm/6daab296-d019-4be9-bbf4-3e3566f5d395/UatAugnAE7j5mC_O7AskLuwU.png</url><title>Byte Sized Security</title><link><![CDATA[https://www.bytesizedsecurity.show]]></link></image><itunes:image href="https://artwork.captivate.fm/6daab296-d019-4be9-bbf4-3e3566f5d395/UatAugnAE7j5mC_O7AskLuwU.png"/><itunes:owner><itunes:name>Marc David</itunes:name></itunes:owner><itunes:author>Marc David</itunes:author><description>In a world where cyberattacks are becoming more commonplace, we all need to be vigilant about protecting our digital lives, whether at home or at work. Byte Sized Security is the podcast that provides snackable advice on cybersecurity best practices tailored for professionals on the go.

Hosted by information security expert, Marc David, each 15-20 minute episode provides actionable guidance to help listeners safeguard their devices, data, and organizations against online threats. With new episodes released every Monday, Byte Sized Security covers topics like social engineering, password management, multi-factor authentication, security awareness training, regulatory compliance, incident response, and more.

Whether you&apos;re an IT professional, small business owner, developer, or just someone interested in learning more about cybersecurity, Byte Sized Security is the quick, easy way to pick up useful tips and insights you can immediately put into practice. The clear, jargon-free advice is perfect for listening on your commute, during a lunch break, or working out.

Visit bytesizedsecurity.com to access episodes and show notes with key takeaways and links to useful resources mentioned in each episode. Don&apos;t let cybercriminals catch you off guard - get smart, fast with Byte Sized Security! Tune in to boost your cybersecurity knowledge and help secure your part of cyberspace.</description><link>https://www.bytesizedsecurity.show</link><atom:link href="https://pubsubhubbub.appspot.com" rel="hub"/><itunes:subtitle><![CDATA[Snackable advice on cyber security best practices tailored for professionals on the go]]></itunes:subtitle><itunes:explicit>false</itunes:explicit><itunes:type>episodic</itunes:type><itunes:category text="Technology"></itunes:category><itunes:category text="Business"><itunes:category text="Entrepreneurship"/></itunes:category><itunes:category text="News"><itunes:category text="Business News"/></itunes:category><podcast:locked>no</podcast:locked><podcast:medium>podcast</podcast:medium><podcast:funding url="https://bytesizedsecurity.show/support">Support the show!</podcast:funding><item><title>Ep42: Three Privacy Actions You Need Today</title><itunes:title>Three Privacy Actions You Need Today</itunes:title><description><![CDATA[<p># Byte Sized Security Show Notes</p><p>## Episode Title: </p><p>3 Immediate Actions to Protect Your Privacy Today</p><p>## Episode Summary:</p><p>In this episode of Byte Sized Security, host Marc David outlines three practical, actionable steps to enhance your privacy protection immediately. With data breaches nearly doubling in 2024 and companies like AT&amp;T and Ticketmaster experiencing massive exposures, these privacy protection measures aren't just theoretical—they're essential defenses against real threats.</p><p>## Key Discussion Points:</p><p>* The alarming state of data breaches in 2024: 10,626 confirmed breaches, nearly double from previous year</p><p>* Major breaches highlighted: AT&amp;T (73M records), Ticketmaster (560M users), National Public Data (2.9B records)</p><p>* The average breach costs $4.88 million, or $165 per stolen record</p><p>* **Step 1**: Enable two-factor authentication everywhere</p><p>  * 2FA stops 99.9% of automated attacks</p><p>  * Use authentication apps instead of SMS</p><p>  * Save backup codes in a safe place</p><p>* **Step 2**: Audit your privacy settings</p><p>  * Detailed walkthrough for Facebook, Instagram, Twitter/X, and LinkedIn</p><p>  * Phone settings review for both iOS and Android</p><p>  * Revoking unnecessary app permissions</p><p>* **Step 3**: Protect your connection and digital footprint</p><p>  * Using a VPN to encrypt connections and mask browsing</p><p>  * Reviewing and cleaning your digital footprint</p><p>  * Opting out of data broker sites</p><p>  * Deleting old, unused accounts</p><p>* The importance of ongoing privacy maintenance</p><p><br></p><p>## Tools and Resources Mentioned:</p><p>* **Authentication Apps:**</p><p>  * [Google Authenticator](https://googleauthenticator.net/)</p><p>  * [Authy](https://authy.com/)</p><p>* **Recommended VPN Services:**</p><p>  * [NordVPN](https://nordvpn.com/)</p><p>  * [ExpressVPN](https://www.expressvpn.com/)</p><p>  * [Surfshark](https://surfshark.com/)</p><p>* **Data Broker Removal Services:**</p><p>  * [DeleteMe](https://joindeleteme.com/)</p><p>  * [Privacy Bee](https://privacybee.com/)</p><p>  * [Optery](https://optery.com/)</p><p>* **Data Broker Sites to Opt Out From:**</p><p>  * [Whitepages](https://www.whitepages.com/)</p><p>  * [PeopleFinder](https://www.peoplefinder.com/)</p><p>  * [Spokeo](https://www.spokeo.com/)</p>]]></description><content:encoded><![CDATA[<p># Byte Sized Security Show Notes</p><p>## Episode Title: </p><p>3 Immediate Actions to Protect Your Privacy Today</p><p>## Episode Summary:</p><p>In this episode of Byte Sized Security, host Marc David outlines three practical, actionable steps to enhance your privacy protection immediately. With data breaches nearly doubling in 2024 and companies like AT&amp;T and Ticketmaster experiencing massive exposures, these privacy protection measures aren't just theoretical—they're essential defenses against real threats.</p><p>## Key Discussion Points:</p><p>* The alarming state of data breaches in 2024: 10,626 confirmed breaches, nearly double from previous year</p><p>* Major breaches highlighted: AT&amp;T (73M records), Ticketmaster (560M users), National Public Data (2.9B records)</p><p>* The average breach costs $4.88 million, or $165 per stolen record</p><p>* **Step 1**: Enable two-factor authentication everywhere</p><p>  * 2FA stops 99.9% of automated attacks</p><p>  * Use authentication apps instead of SMS</p><p>  * Save backup codes in a safe place</p><p>* **Step 2**: Audit your privacy settings</p><p>  * Detailed walkthrough for Facebook, Instagram, Twitter/X, and LinkedIn</p><p>  * Phone settings review for both iOS and Android</p><p>  * Revoking unnecessary app permissions</p><p>* **Step 3**: Protect your connection and digital footprint</p><p>  * Using a VPN to encrypt connections and mask browsing</p><p>  * Reviewing and cleaning your digital footprint</p><p>  * Opting out of data broker sites</p><p>  * Deleting old, unused accounts</p><p>* The importance of ongoing privacy maintenance</p><p><br></p><p>## Tools and Resources Mentioned:</p><p>* **Authentication Apps:**</p><p>  * [Google Authenticator](https://googleauthenticator.net/)</p><p>  * [Authy](https://authy.com/)</p><p>* **Recommended VPN Services:**</p><p>  * [NordVPN](https://nordvpn.com/)</p><p>  * [ExpressVPN](https://www.expressvpn.com/)</p><p>  * [Surfshark](https://surfshark.com/)</p><p>* **Data Broker Removal Services:**</p><p>  * [DeleteMe](https://joindeleteme.com/)</p><p>  * [Privacy Bee](https://privacybee.com/)</p><p>  * [Optery](https://optery.com/)</p><p>* **Data Broker Sites to Opt Out From:**</p><p>  * [Whitepages](https://www.whitepages.com/)</p><p>  * [PeopleFinder](https://www.peoplefinder.com/)</p><p>  * [Spokeo](https://www.spokeo.com/)</p>]]></content:encoded><link><![CDATA[https://bytesizedsecurity.show/episode/ep-42-three-privacy-actions-you-need-today]]></link><guid isPermaLink="false">90081dcd-52e5-4d0d-8c01-dc4e8d300941</guid><itunes:image href="https://artwork.captivate.fm/6daab296-d019-4be9-bbf4-3e3566f5d395/UatAugnAE7j5mC_O7AskLuwU.png"/><pubDate>Fri, 04 Jul 2025 21:11:00 -0700</pubDate><enclosure url="https://pdcn.co/e/episodes.captivate.fm/episode/90081dcd-52e5-4d0d-8c01-dc4e8d300941.mp3" length="4988283" type="audio/mpeg"/><itunes:duration>06:56</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>42</itunes:episode><podcast:episode>42</podcast:episode><podcast:season>1</podcast:season></item><item><title>Ep:41 Beware: Your Top VPN App May Be a Chinese Government Spy</title><itunes:title>Ep:41 Beware: Your Top VPN App May Be a Chinese Government Spy</itunes:title><description><![CDATA[<p><strong>Episode Summary:</strong></p><p>In this episode, we explore the alarming discovery that many of the top-rated VPN apps on the App Store and Google Play are secretly owned by Chinese companies. These VPNs pose a serious risk to user privacy and security, as Chinese law requires them to hand over all user data to the government without justification.</p><p>Key Topics Covered:</p><p>- Chinese-owned VPN apps masquerading as legitimate services</p><p>- Lack of transparency and disclosure around company ownership</p><p>- Risks of user data being accessed by the Chinese government</p><p>- Failure of app stores to properly vet and regulate these VPN apps</p><p>- Importance of researching VPN providers before using them</p><p>Main Takeaways:</p><p>- Many popular VPN apps are secretly owned by Chinese companies, creating a significant risk to user privacy and security.</p><p>- App stores like the App Store and Google Play are not properly vetting and regulating these potentially compromised VPN apps.</p><p>- Users must do their own research to ensure the VPN they are using is trustworthy and not owned by a company with ties to the Chinese government.</p><p>Timestamps for Major Topics:</p><p>- 0:00 - Introduction to the issue of Chinese-owned VPN apps</p><p>- 1:30 - Examples of top-ranked VPN apps with hidden Chinese ownership</p><p>- 3:00 - Explanation of the legal requirements for Chinese companies to hand over user data</p><p>- 4:30 - Lack of action by app stores to remove or label these problematic VPN apps</p><p>- 6:00 - Importance of user research and caution when selecting a VPN provider</p><p>---</p><p>I do hope you enjoyed this episode of the podcast.  Here's some helpful resources including any sites that were mentioned in this episode.</p><p>--</p><p>--</p><p>Find subscriber links on my site, add to your podcast player, or listen on the web players on my site:</p><p><a href="https://bytesizedsecurity.show/listen">Listen to Byte Sized Security</a> </p><p>--</p><p><strong>Support this Podcast with a Tip:</strong></p><p><a href="https://bytesizedsecurity.show/support">Support Byte Sized Security</a> </p><p>--</p><p>If you have questions for the show, feedback or topics you want covered.  Please send a short email to marc@bytesizedsecurity.show with the Subject line of "Byte-Sized Security" so I know it's about the podcast.</p><p>Connect with me on TikTok: <a href="https://www.tiktok.com/@bytesizedsecurity" rel="noopener noreferrer" target="_blank">https://www.tiktok.com/@bytesizedsecurity</a></p>]]></description><content:encoded><![CDATA[<p><strong>Episode Summary:</strong></p><p>In this episode, we explore the alarming discovery that many of the top-rated VPN apps on the App Store and Google Play are secretly owned by Chinese companies. These VPNs pose a serious risk to user privacy and security, as Chinese law requires them to hand over all user data to the government without justification.</p><p>Key Topics Covered:</p><p>- Chinese-owned VPN apps masquerading as legitimate services</p><p>- Lack of transparency and disclosure around company ownership</p><p>- Risks of user data being accessed by the Chinese government</p><p>- Failure of app stores to properly vet and regulate these VPN apps</p><p>- Importance of researching VPN providers before using them</p><p>Main Takeaways:</p><p>- Many popular VPN apps are secretly owned by Chinese companies, creating a significant risk to user privacy and security.</p><p>- App stores like the App Store and Google Play are not properly vetting and regulating these potentially compromised VPN apps.</p><p>- Users must do their own research to ensure the VPN they are using is trustworthy and not owned by a company with ties to the Chinese government.</p><p>Timestamps for Major Topics:</p><p>- 0:00 - Introduction to the issue of Chinese-owned VPN apps</p><p>- 1:30 - Examples of top-ranked VPN apps with hidden Chinese ownership</p><p>- 3:00 - Explanation of the legal requirements for Chinese companies to hand over user data</p><p>- 4:30 - Lack of action by app stores to remove or label these problematic VPN apps</p><p>- 6:00 - Importance of user research and caution when selecting a VPN provider</p><p>---</p><p>I do hope you enjoyed this episode of the podcast.  Here's some helpful resources including any sites that were mentioned in this episode.</p><p>--</p><p>--</p><p>Find subscriber links on my site, add to your podcast player, or listen on the web players on my site:</p><p><a href="https://bytesizedsecurity.show/listen">Listen to Byte Sized Security</a> </p><p>--</p><p><strong>Support this Podcast with a Tip:</strong></p><p><a href="https://bytesizedsecurity.show/support">Support Byte Sized Security</a> </p><p>--</p><p>If you have questions for the show, feedback or topics you want covered.  Please send a short email to marc@bytesizedsecurity.show with the Subject line of "Byte-Sized Security" so I know it's about the podcast.</p><p>Connect with me on TikTok: <a href="https://www.tiktok.com/@bytesizedsecurity" rel="noopener noreferrer" target="_blank">https://www.tiktok.com/@bytesizedsecurity</a></p>]]></content:encoded><link><![CDATA[https://bytesizedsecurity.show/episode/beware-your-top-vpn-app-may-be-a-chinese-government-spy]]></link><guid isPermaLink="false">89c20c64-4c1d-4ef1-a8ee-493bfd127790</guid><itunes:image href="https://artwork.captivate.fm/6daab296-d019-4be9-bbf4-3e3566f5d395/UatAugnAE7j5mC_O7AskLuwU.png"/><pubDate>Thu, 03 Jul 2025 09:00:00 -0700</pubDate><enclosure url="https://pdcn.co/e/episodes.captivate.fm/episode/89c20c64-4c1d-4ef1-a8ee-493bfd127790.mp3" length="3040173" type="audio/mpeg"/><itunes:duration>03:10</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>41</itunes:episode><podcast:episode>41</podcast:episode><podcast:season>1</podcast:season></item><item><title>Ep40: The AI Layoff Apocalypse Has Already Started — And You’re Next</title><itunes:title>Ep40: The AI Layoff Apocalypse Has Already Started — And You’re Next</itunes:title><description><![CDATA[<p><strong>The Imminent AI Job Crisis: Are You Prepared?</strong></p><p>This episode highlights the alarming prediction by Dario Amodei, CEO of Anthropic, that AI could eliminate half of all entry-level white-collar jobs within the next one to five years, potentially raising U.S. unemployment to 20%. While major companies are quietly adopting advanced AI systems, the public and lawmakers remain largely unaware or in disbelief. The episode discusses the impacts of AI on various industries and jobs, stressing the need for urgent action such as an AI 'token tax,' real-time job replacement tracking, legislative briefings, and worker reskilling programs. The message is clear: the AI job crash is imminent, and proactive measures are essential to mitigate its effects.</p><br><p>00:00 The Impending Disappearance of White-Collar Jobs</p><p>00:37 Real-World Examples of AI-Induced Job Cuts</p><p>01:03 The Rise of AI Agents in the Workplace</p><p>01:30 The Alarming Capabilities of Advanced AI</p><p>01:48 Public Response and the Threat to Democracy</p><p>02:32 Proposed Solutions to the AI Job Crisis</p><p>02:57 The Urgency of Immediate Action</p><p>03:06 Conclusion: Preparing for the AI Job Crash</p><p>---</p><p>I do hope you enjoyed this episode of the podcast.  Here's some helpful resources including any sites that were mentioned in this episode.</p><p>--</p><p>Sites Mentioned in this Episode</p><ul><li><a href="https://www.axios.com/2025/05/28/ai-jobs-white-collar-unemployment-anthropic">Behind the Curtain: A white-collar bloodbath</a></li></ul><br/><p>--</p><p>Find subscriber links on my site, add to your podcast player, or listen on the web players on my site:</p><p><a href="https://bytesizedsecurity.show/listen">Listen to Byte Sized Security</a> </p><p>--</p><p><strong>Support this Podcast with a Tip:</strong></p><p><a href="https://bytesizedsecurity.show/support">Support Byte Sized Security</a> </p><p>--</p><p>If you have questions for the show, feedback or topics you want covered.  Please send a short email to marc@bytesizedsecurity.show with the Subject line of "Byte-Sized Security" so I know it's about the podcast.</p><p>Connect with me on TikTok: <a href="https://www.tiktok.com/@bytesizedsecurity" rel="noopener noreferrer" target="_blank">https://www.tiktok.com/@bytesizedsecurity</a></p>]]></description><content:encoded><![CDATA[<p><strong>The Imminent AI Job Crisis: Are You Prepared?</strong></p><p>This episode highlights the alarming prediction by Dario Amodei, CEO of Anthropic, that AI could eliminate half of all entry-level white-collar jobs within the next one to five years, potentially raising U.S. unemployment to 20%. While major companies are quietly adopting advanced AI systems, the public and lawmakers remain largely unaware or in disbelief. The episode discusses the impacts of AI on various industries and jobs, stressing the need for urgent action such as an AI 'token tax,' real-time job replacement tracking, legislative briefings, and worker reskilling programs. The message is clear: the AI job crash is imminent, and proactive measures are essential to mitigate its effects.</p><br><p>00:00 The Impending Disappearance of White-Collar Jobs</p><p>00:37 Real-World Examples of AI-Induced Job Cuts</p><p>01:03 The Rise of AI Agents in the Workplace</p><p>01:30 The Alarming Capabilities of Advanced AI</p><p>01:48 Public Response and the Threat to Democracy</p><p>02:32 Proposed Solutions to the AI Job Crisis</p><p>02:57 The Urgency of Immediate Action</p><p>03:06 Conclusion: Preparing for the AI Job Crash</p><p>---</p><p>I do hope you enjoyed this episode of the podcast.  Here's some helpful resources including any sites that were mentioned in this episode.</p><p>--</p><p>Sites Mentioned in this Episode</p><ul><li><a href="https://www.axios.com/2025/05/28/ai-jobs-white-collar-unemployment-anthropic">Behind the Curtain: A white-collar bloodbath</a></li></ul><br/><p>--</p><p>Find subscriber links on my site, add to your podcast player, or listen on the web players on my site:</p><p><a href="https://bytesizedsecurity.show/listen">Listen to Byte Sized Security</a> </p><p>--</p><p><strong>Support this Podcast with a Tip:</strong></p><p><a href="https://bytesizedsecurity.show/support">Support Byte Sized Security</a> </p><p>--</p><p>If you have questions for the show, feedback or topics you want covered.  Please send a short email to marc@bytesizedsecurity.show with the Subject line of "Byte-Sized Security" so I know it's about the podcast.</p><p>Connect with me on TikTok: <a href="https://www.tiktok.com/@bytesizedsecurity" rel="noopener noreferrer" target="_blank">https://www.tiktok.com/@bytesizedsecurity</a></p>]]></content:encoded><link><![CDATA[https://bytesizedsecurity.show/episode/ep40-the-ai-layoff-apocalypse-has-already-started-and-youre-next]]></link><guid isPermaLink="false">cf1ebf79-e024-453f-9e02-4290fee246a9</guid><itunes:image href="https://artwork.captivate.fm/6daab296-d019-4be9-bbf4-3e3566f5d395/UatAugnAE7j5mC_O7AskLuwU.png"/><pubDate>Fri, 30 May 2025 09:00:00 -0700</pubDate><enclosure url="https://pdcn.co/e/episodes.captivate.fm/episode/cf1ebf79-e024-453f-9e02-4290fee246a9.mp3" length="5466527" type="audio/mpeg"/><itunes:duration>04:33</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>40</itunes:episode><podcast:episode>40</podcast:episode><podcast:season>1</podcast:season><podcast:transcript url="https://transcripts.captivate.fm/transcript/56b8d3dc-c976-4287-b9f2-31aceb06017d/transcript.json" type="application/json"/><podcast:transcript url="https://transcripts.captivate.fm/transcript/56b8d3dc-c976-4287-b9f2-31aceb06017d/transcript.srt" type="application/srt" rel="captions"/><podcast:transcript url="https://transcripts.captivate.fm/transcript/56b8d3dc-c976-4287-b9f2-31aceb06017d/index.html" type="text/html"/></item><item><title>Ep39: AI in the Workplace: Adapt or Be Replaced</title><itunes:title>Ep39: AI in the Workplace: Adapt or Be Replaced</itunes:title><description><![CDATA[<p>Adapt or Replace: How AI is Changing Entry-Level Job Markets</p><p>AI has already impacted the job market significantly, particularly affecting entry-level positions. The script highlights that entry-level hiring has decreased due to the integration of AI, which automates routine tasks. Companies are reconsidering traditional roles and opting for more efficient AI solutions. Job seekers are faced with two choices: compete against AI or learn to leverage it to improve productivity. The script emphasizes the importance of mastering AI tools to stay relevant in the workforce and outlines steps to integrate AI proficiency into daily routines and resumes.</p><p>00:00 AI Isn't Coming for Your Job</p><p>00:02 The Impact of AI on Entry-Level Jobs</p><p>00:18 Automation and Workflow Changes</p><p>00:39 Adapting to the AI Revolution</p><p>00:46 The Future of Work: Competing with AI</p><p>01:07 Embracing AI Tools for Success</p><p>01:15 The Consequences of Ignoring AI</p><p>01:31 Final Thoughts: Adapt or Be Replaced</p><p>---</p><p>I do hope you enjoyed this episode of the podcast.  Here's some helpful resources including any sites that were mentioned in this episode.</p><p>--</p><p>--</p><p>Find subscriber links on my site, add to your podcast player, or listen on the web players on my site:</p><p><a href="https://bytesizedsecurity.show/listen">Listen to Byte Sized Security</a> </p><p>--</p><p><strong>Support this Podcast with a Tip:</strong></p><p><a href="https://bytesizedsecurity.show/support">Support Byte Sized Security</a> </p><p>--</p><p>If you have questions for the show, feedback or topics you want covered.  Please send a short email to marc@bytesizedsecurity.show with the Subject line of "Byte-Sized Security" so I know it's about the podcast.</p><p>Connect with me on TikTok: <a href="https://www.tiktok.com/@bytesizedsecurity" rel="noopener noreferrer" target="_blank">https://www.tiktok.com/@bytesizedsecurity</a></p>]]></description><content:encoded><![CDATA[<p>Adapt or Replace: How AI is Changing Entry-Level Job Markets</p><p>AI has already impacted the job market significantly, particularly affecting entry-level positions. The script highlights that entry-level hiring has decreased due to the integration of AI, which automates routine tasks. Companies are reconsidering traditional roles and opting for more efficient AI solutions. Job seekers are faced with two choices: compete against AI or learn to leverage it to improve productivity. The script emphasizes the importance of mastering AI tools to stay relevant in the workforce and outlines steps to integrate AI proficiency into daily routines and resumes.</p><p>00:00 AI Isn't Coming for Your Job</p><p>00:02 The Impact of AI on Entry-Level Jobs</p><p>00:18 Automation and Workflow Changes</p><p>00:39 Adapting to the AI Revolution</p><p>00:46 The Future of Work: Competing with AI</p><p>01:07 Embracing AI Tools for Success</p><p>01:15 The Consequences of Ignoring AI</p><p>01:31 Final Thoughts: Adapt or Be Replaced</p><p>---</p><p>I do hope you enjoyed this episode of the podcast.  Here's some helpful resources including any sites that were mentioned in this episode.</p><p>--</p><p>--</p><p>Find subscriber links on my site, add to your podcast player, or listen on the web players on my site:</p><p><a href="https://bytesizedsecurity.show/listen">Listen to Byte Sized Security</a> </p><p>--</p><p><strong>Support this Podcast with a Tip:</strong></p><p><a href="https://bytesizedsecurity.show/support">Support Byte Sized Security</a> </p><p>--</p><p>If you have questions for the show, feedback or topics you want covered.  Please send a short email to marc@bytesizedsecurity.show with the Subject line of "Byte-Sized Security" so I know it's about the podcast.</p><p>Connect with me on TikTok: <a href="https://www.tiktok.com/@bytesizedsecurity" rel="noopener noreferrer" target="_blank">https://www.tiktok.com/@bytesizedsecurity</a></p>]]></content:encoded><link><![CDATA[https://bytesizedsecurity.show/episode/ep39-ai-in-the-workplace-adapt-or-be-replaced]]></link><guid isPermaLink="false">9fafad8c-d89f-4b72-a186-b2dc5e77e2b3</guid><itunes:image href="https://artwork.captivate.fm/6daab296-d019-4be9-bbf4-3e3566f5d395/UatAugnAE7j5mC_O7AskLuwU.png"/><pubDate>Tue, 27 May 2025 09:00:00 -0700</pubDate><enclosure url="https://pdcn.co/e/episodes.captivate.fm/episode/9fafad8c-d89f-4b72-a186-b2dc5e77e2b3.mp3" length="3504209" type="audio/mpeg"/><itunes:duration>02:55</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>39</itunes:episode><podcast:episode>39</podcast:episode><podcast:season>1</podcast:season><podcast:transcript url="https://transcripts.captivate.fm/transcript/c76ee6d8-82b4-4ca2-8504-ad085f79077b/transcript.json" type="application/json"/><podcast:transcript url="https://transcripts.captivate.fm/transcript/c76ee6d8-82b4-4ca2-8504-ad085f79077b/transcript.srt" type="application/srt" rel="captions"/><podcast:transcript url="https://transcripts.captivate.fm/transcript/c76ee6d8-82b4-4ca2-8504-ad085f79077b/index.html" type="text/html"/></item><item><title>Ep37: Deepfakes and Digital Deception: The 2025 Threat</title><itunes:title>Deepfakes and Digital Deception: The 2025 Threat</itunes:title><description><![CDATA[<p>**Episode Summary:**</p><p>Marc David dives into the rapidly evolving world of deepfakes and digital deception, projecting forward to 2025. The episode explores the alarming growth in deepfake use, driven by accessible AI technology and user-friendly tools. Mark discusses the severe consequences for businesses (e.g., fraudulent CEO announcements, financial scams like the Polish bank incident), politics (e.g., election manipulation), and personal lives. The discussion also covers emerging solutions, including AI-powered detection tools like those from MIT's DeepTrace Lab, the role of regulations like GDPR, and practical steps listeners can take, such as using verification software like Truepic. The core message is the importance of vigilance and questioning the authenticity of digital content.</p><p><strong>**Key Discussion Points:**</strong></p><p>*   **The Explosion of Deepfake Use (00:21):**</p><p>    *   A 900% increase in deepfake videos was found by Sensity researchers in 2021.</p><p>    *   The problem is projected to have quadrupled by 2025.</p><p>*   **Drivers of the Deepfake Surge (00:35):**</p><p>    *   Accessible and user-friendly AI technology.</p><p>    *   Cheaper software accelerating spread.</p><p>*   **Impact on Businesses (00:48):**</p><p>    *   Potential for CEO deepfakes to announce fraudulent mergers or layoffs.</p><p>    *   Real-world example: A Polish bank lost millions in 2023 due to a deepfake scam involving an urgent fake call to redirect funds.</p><p>*   **Impact on Politics (01:10):**</p><p>    *   Deepfakes manipulating elections (e.g., doctored videos of candidates).</p><p>    *   Erosion of voter trust.</p><p>*   **Current Preparedness &amp; Solutions (01:21):**</p><p>    *   We are not yet fully equipped, but solutions are evolving.</p><p>    *   **Detection Tools (01:25):** AI systems learning to recognize deepfakes by detecting minute digital artifacts.</p><p>        *   MIT's DeepTrace Lab: Provides tools analyzing AI generation flaws.</p><p>    *   **Policy and Regulations (01:42):**</p><p>        *   Europe's GDPR now covers AI-generated media.</p><p>        *   The US is considering similar steps.</p><p>*   **What You Can Do (01:52):**</p><p>    *   Stay informed.</p><p>    *   Report suspicious content.</p><p>    *   Support legislative actions against deepfakes.</p><p>    *   Use available verification tools.</p><p>*   **Today's Takeaway (02:04):**</p><p>    *   Be vigilant.</p><p>    *   Question authenticity until trust is verifiable.</p><p>**Tools &amp; Sites Mentioned:**</p><br><p>*   **Sensity:** (Research mentioned from 2021 regarding the 900% increase in deepfake videos). Sensity was an AI threat intelligence company, later acquired. The research highlighted the scale of the problem.</p><p>*   **MIT DeepTrace Lab:** A research initiative at MIT focusing on detecting deepfakes and manipulated media.</p><p>    *   Website: [https://deeptrace.csail.mit.edu/](https://deeptrace.csail.mit.edu/)</p><p>*   **GDPR (General Data Protection Regulation):** Europe's privacy and data protection law, now addressing AI-generated media.</p><p>    *   Official Information: [https://gdpr-info.eu/](https://gdpr-info.eu/)</p><p>*   **Truepic:** A company offering photo and video verification technology.</p><p>    *   Website: [https://truepic.com/](https://truepic.com/)</p><br><p>------</p><p>I do hope you enjoyed this episode of the podcast.  Here's some helpful resources including any sites that were mentioned in this episode.</p><p>--</p><p>--</p><p>Find subscriber links on my site, add to your podcast player, or listen on the web players on my site:</p><p><a href="https://bytesizedsecurity.show/listen">Listen to Byte Sized Security</a> </p><p>--</p><p><strong>Support this Podcast with a Tip:</strong></p><p><a href="https://bytesizedsecurity.show/support">Support Byte Sized Security</a> </p><p>--</p><p>If you have questions for the show, feedback or topics you want covered.  Please send a short email to marc@bytesizedsecurity.show with the Subject line of "Byte-Sized Security" so I know it's about the podcast.</p><p>Connect with me on TikTok: <a href="https://www.tiktok.com/@bytesizedsecurity" rel="noopener noreferrer" target="_blank">https://www.tiktok.com/@bytesizedsecurity</a></p>]]></description><content:encoded><![CDATA[<p>**Episode Summary:**</p><p>Marc David dives into the rapidly evolving world of deepfakes and digital deception, projecting forward to 2025. The episode explores the alarming growth in deepfake use, driven by accessible AI technology and user-friendly tools. Mark discusses the severe consequences for businesses (e.g., fraudulent CEO announcements, financial scams like the Polish bank incident), politics (e.g., election manipulation), and personal lives. The discussion also covers emerging solutions, including AI-powered detection tools like those from MIT's DeepTrace Lab, the role of regulations like GDPR, and practical steps listeners can take, such as using verification software like Truepic. The core message is the importance of vigilance and questioning the authenticity of digital content.</p><p><strong>**Key Discussion Points:**</strong></p><p>*   **The Explosion of Deepfake Use (00:21):**</p><p>    *   A 900% increase in deepfake videos was found by Sensity researchers in 2021.</p><p>    *   The problem is projected to have quadrupled by 2025.</p><p>*   **Drivers of the Deepfake Surge (00:35):**</p><p>    *   Accessible and user-friendly AI technology.</p><p>    *   Cheaper software accelerating spread.</p><p>*   **Impact on Businesses (00:48):**</p><p>    *   Potential for CEO deepfakes to announce fraudulent mergers or layoffs.</p><p>    *   Real-world example: A Polish bank lost millions in 2023 due to a deepfake scam involving an urgent fake call to redirect funds.</p><p>*   **Impact on Politics (01:10):**</p><p>    *   Deepfakes manipulating elections (e.g., doctored videos of candidates).</p><p>    *   Erosion of voter trust.</p><p>*   **Current Preparedness &amp; Solutions (01:21):**</p><p>    *   We are not yet fully equipped, but solutions are evolving.</p><p>    *   **Detection Tools (01:25):** AI systems learning to recognize deepfakes by detecting minute digital artifacts.</p><p>        *   MIT's DeepTrace Lab: Provides tools analyzing AI generation flaws.</p><p>    *   **Policy and Regulations (01:42):**</p><p>        *   Europe's GDPR now covers AI-generated media.</p><p>        *   The US is considering similar steps.</p><p>*   **What You Can Do (01:52):**</p><p>    *   Stay informed.</p><p>    *   Report suspicious content.</p><p>    *   Support legislative actions against deepfakes.</p><p>    *   Use available verification tools.</p><p>*   **Today's Takeaway (02:04):**</p><p>    *   Be vigilant.</p><p>    *   Question authenticity until trust is verifiable.</p><p>**Tools &amp; Sites Mentioned:**</p><br><p>*   **Sensity:** (Research mentioned from 2021 regarding the 900% increase in deepfake videos). Sensity was an AI threat intelligence company, later acquired. The research highlighted the scale of the problem.</p><p>*   **MIT DeepTrace Lab:** A research initiative at MIT focusing on detecting deepfakes and manipulated media.</p><p>    *   Website: [https://deeptrace.csail.mit.edu/](https://deeptrace.csail.mit.edu/)</p><p>*   **GDPR (General Data Protection Regulation):** Europe's privacy and data protection law, now addressing AI-generated media.</p><p>    *   Official Information: [https://gdpr-info.eu/](https://gdpr-info.eu/)</p><p>*   **Truepic:** A company offering photo and video verification technology.</p><p>    *   Website: [https://truepic.com/](https://truepic.com/)</p><br><p>------</p><p>I do hope you enjoyed this episode of the podcast.  Here's some helpful resources including any sites that were mentioned in this episode.</p><p>--</p><p>--</p><p>Find subscriber links on my site, add to your podcast player, or listen on the web players on my site:</p><p><a href="https://bytesizedsecurity.show/listen">Listen to Byte Sized Security</a> </p><p>--</p><p><strong>Support this Podcast with a Tip:</strong></p><p><a href="https://bytesizedsecurity.show/support">Support Byte Sized Security</a> </p><p>--</p><p>If you have questions for the show, feedback or topics you want covered.  Please send a short email to marc@bytesizedsecurity.show with the Subject line of "Byte-Sized Security" so I know it's about the podcast.</p><p>Connect with me on TikTok: <a href="https://www.tiktok.com/@bytesizedsecurity" rel="noopener noreferrer" target="_blank">https://www.tiktok.com/@bytesizedsecurity</a></p>]]></content:encoded><link><![CDATA[https://bytesizedsecurity.show/episode/ep37-deepfakes-and-digital-deception-the-2025-threat]]></link><guid isPermaLink="false">d1127ac3-2c4b-49bf-9340-0fc4836cf2b7</guid><itunes:image href="https://artwork.captivate.fm/6daab296-d019-4be9-bbf4-3e3566f5d395/UatAugnAE7j5mC_O7AskLuwU.png"/><pubDate>Mon, 19 May 2025 09:00:00 -0700</pubDate><enclosure url="https://pdcn.co/e/episodes.captivate.fm/episode/d1127ac3-2c4b-49bf-9340-0fc4836cf2b7.mp3" length="2645099" type="audio/mpeg"/><itunes:duration>03:40</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>37</itunes:episode><podcast:episode>37</podcast:episode><podcast:season>1</podcast:season><itunes:summary>Links to resources on deepfakes, detection tools, and recent case studies
TruePic verification tool
Deeptrace AI pattern recognition</itunes:summary></item><item><title>Ep36: DeepSeek AI – The Real Issue Isn&apos;t China, It’s AI Security</title><itunes:title>Ep36: DeepSeek AI – The Real Issue Isn&apos;t China, It’s AI Security</itunes:title><description><![CDATA[<p><strong>AI Security and Competition: Unpacking the Debate Around DeepSeek</strong></p><p>This episode delves into the controversy surrounding DeepSeek, a Chinese AI considered by some as a national security threat. It questions whether this stance is legitimate or merely a tactic by big tech to stifle competition. The episode highlights multiple security breaches across the AI industry, including OpenAI and Google, arguing that the core issue lies in how AI handles security rather than its origin. The discussion also explores the suspicious uniformity in the anti-DeepSeek narrative, the potential motivations of big AI corporations to maintain monopolies, and the necessity of reading AI privacy policies. Additionally, the episode critiques the U.S. response to AI competition, drawing parallels to historical moments like the Sputnik era, and advocates for stronger AI security regulations and more open-source innovation. Listeners are encouraged to reflect on whether the fear of DeepSeek is justified or manipulated by big tech interests.</p><br><p>00:00 Introduction: The DeepSeek Controversy</p><p>00:08 Data Leaks: A Global Issue</p><p>00:39 The Suspicious Narrative Against DeepSeek</p><p>01:24 Big AI's Fear of Open Source</p><p>01:35 Smart AI Usage Tips</p><p>02:29 The Real Issue: AI Governance</p><p>03:15 The AI Moat Playbook</p><p>04:08 Big Tech's Control Over AI</p><p>05:49 The Global AI Competition</p><p>09:45 Security and Privacy Concerns</p><p>17:22 Conclusion: The Future of AI</p><p>---</p><p>I do hope you enjoyed this episode of the podcast.  Here's some helpful resources including any sites that were mentioned in this episode.</p><p>--</p><p>Sites Mentioned in this Episode</p><ul><li><a href="https://chat.deepseek.com/downloads/DeepSeek%20Privacy%20Policy.html">DeepSeek Privacy Policy</a> - The DeekSeek Privacy Policy</li></ul><br/><p>--</p><p>Find subscriber links on my site, add to your podcast player, or listen on the web players on my site:</p><p><a href="https://bytesizedsecurity.show/listen">Listen to Byte Sized Security</a> </p><p>--</p><p><strong>Support this Podcast with a Tip:</strong></p><p><a href="https://bytesizedsecurity.show/support">Support Byte Sized Security</a> </p><p>--</p><p>If you have questions for the show, feedback or topics you want covered.  Please send a short email to marc@bytesizedsecurity.show with the Subject line of "Byte-Sized Security" so I know it's about the podcast.</p><p>Connect with me on TikTok: <a href="https://www.tiktok.com/@bytesizedsecurity" rel="noopener noreferrer" target="_blank">https://www.tiktok.com/@bytesizedsecurity</a></p>]]></description><content:encoded><![CDATA[<p><strong>AI Security and Competition: Unpacking the Debate Around DeepSeek</strong></p><p>This episode delves into the controversy surrounding DeepSeek, a Chinese AI considered by some as a national security threat. It questions whether this stance is legitimate or merely a tactic by big tech to stifle competition. The episode highlights multiple security breaches across the AI industry, including OpenAI and Google, arguing that the core issue lies in how AI handles security rather than its origin. The discussion also explores the suspicious uniformity in the anti-DeepSeek narrative, the potential motivations of big AI corporations to maintain monopolies, and the necessity of reading AI privacy policies. Additionally, the episode critiques the U.S. response to AI competition, drawing parallels to historical moments like the Sputnik era, and advocates for stronger AI security regulations and more open-source innovation. Listeners are encouraged to reflect on whether the fear of DeepSeek is justified or manipulated by big tech interests.</p><br><p>00:00 Introduction: The DeepSeek Controversy</p><p>00:08 Data Leaks: A Global Issue</p><p>00:39 The Suspicious Narrative Against DeepSeek</p><p>01:24 Big AI's Fear of Open Source</p><p>01:35 Smart AI Usage Tips</p><p>02:29 The Real Issue: AI Governance</p><p>03:15 The AI Moat Playbook</p><p>04:08 Big Tech's Control Over AI</p><p>05:49 The Global AI Competition</p><p>09:45 Security and Privacy Concerns</p><p>17:22 Conclusion: The Future of AI</p><p>---</p><p>I do hope you enjoyed this episode of the podcast.  Here's some helpful resources including any sites that were mentioned in this episode.</p><p>--</p><p>Sites Mentioned in this Episode</p><ul><li><a href="https://chat.deepseek.com/downloads/DeepSeek%20Privacy%20Policy.html">DeepSeek Privacy Policy</a> - The DeekSeek Privacy Policy</li></ul><br/><p>--</p><p>Find subscriber links on my site, add to your podcast player, or listen on the web players on my site:</p><p><a href="https://bytesizedsecurity.show/listen">Listen to Byte Sized Security</a> </p><p>--</p><p><strong>Support this Podcast with a Tip:</strong></p><p><a href="https://bytesizedsecurity.show/support">Support Byte Sized Security</a> </p><p>--</p><p>If you have questions for the show, feedback or topics you want covered.  Please send a short email to marc@bytesizedsecurity.show with the Subject line of "Byte-Sized Security" so I know it's about the podcast.</p><p>Connect with me on TikTok: <a href="https://www.tiktok.com/@bytesizedsecurity" rel="noopener noreferrer" target="_blank">https://www.tiktok.com/@bytesizedsecurity</a></p>]]></content:encoded><link><![CDATA[https://bytesizedsecurity.show/episode/ep36-deepseek-ai-the-real-issue-isnt-china-its-ai-security]]></link><guid isPermaLink="false">56c474cf-012c-48bd-8857-c6a4fdf80621</guid><itunes:image href="https://artwork.captivate.fm/6daab296-d019-4be9-bbf4-3e3566f5d395/UatAugnAE7j5mC_O7AskLuwU.png"/><pubDate>Mon, 03 Feb 2025 09:00:00 -0700</pubDate><enclosure url="https://pdcn.co/e/podcasts.captivate.fm/media/48604627-5d66-4c50-8cef-c6ad7669757e/deepseek-ai-the-real-issue-isn-t-china-it-s-ai-security-convert.mp3" length="25266299" type="audio/mpeg"/><itunes:duration>21:03</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>36</itunes:episode><podcast:episode>36</podcast:episode><podcast:season>1</podcast:season><podcast:transcript url="https://transcripts.captivate.fm/transcript/336f9bd1-c5b2-4081-a0cd-ba6214240deb/transcript.json" type="application/json"/><podcast:transcript url="https://transcripts.captivate.fm/transcript/336f9bd1-c5b2-4081-a0cd-ba6214240deb/transcript.srt" type="application/srt" rel="captions"/><podcast:transcript url="https://transcripts.captivate.fm/transcript/336f9bd1-c5b2-4081-a0cd-ba6214240deb/index.html" type="text/html"/></item><item><title>Ep35: So TikTok might manipulate Americans?</title><itunes:title>Ep35: So TikTok might manipulate Americans?</itunes:title><description><![CDATA[<p><strong>The Double Standards of Social Media Manipulation: Facebook vs. TikTok</strong></p><p>This episode delves into the contrasting treatment of Facebook and TikTok concerning data manipulation and national security. It highlights the documented case of Facebook's data misuse with Cambridge Analytica, affecting 87 million Americans, and questions why similar scrutiny isn't applied to domestic companies. The script challenges the narrative around TikTok's possible threats, urging viewers to consider the double standards in regulatory actions against social media manipulation.</p><p>00:00 Introduction: The Manipulation Debate</p><p>00:02 The Facebook-Cambridge Analytica Scandal</p><p>00:43 The Double Standards in Social Media Manipulation</p><p>01:02 Questioning the Real Threat</p><p>01:30 Conclusion: Addressing Double Standards</p><p>---</p><p>I do hope you enjoyed this episode of the podcast.  Here's some helpful resources including any sites that were mentioned in this episode.</p><p>--</p><p>--</p><p>Find subscriber links on my site, add to your podcast player, or listen on the web players on my site:</p><p><a href="https://bytesizedsecurity.show/listen">Listen to Byte Sized Security</a> </p><p>--</p><p><strong>Support this Podcast with a Tip:</strong></p><p><a href="https://bytesizedsecurity.show/support">Support Byte Sized Security</a> </p><p>--</p><p>If you have questions for the show, feedback or topics you want covered.  Please send a short email to marc@bytesizedsecurity.show with the Subject line of "Byte-Sized Security" so I know it's about the podcast.</p><p>Connect with me on TikTok: <a href="https://www.tiktok.com/@bytesizedsecurity" rel="noopener noreferrer" target="_blank">https://www.tiktok.com/@bytesizedsecurity</a></p>]]></description><content:encoded><![CDATA[<p><strong>The Double Standards of Social Media Manipulation: Facebook vs. TikTok</strong></p><p>This episode delves into the contrasting treatment of Facebook and TikTok concerning data manipulation and national security. It highlights the documented case of Facebook's data misuse with Cambridge Analytica, affecting 87 million Americans, and questions why similar scrutiny isn't applied to domestic companies. The script challenges the narrative around TikTok's possible threats, urging viewers to consider the double standards in regulatory actions against social media manipulation.</p><p>00:00 Introduction: The Manipulation Debate</p><p>00:02 The Facebook-Cambridge Analytica Scandal</p><p>00:43 The Double Standards in Social Media Manipulation</p><p>01:02 Questioning the Real Threat</p><p>01:30 Conclusion: Addressing Double Standards</p><p>---</p><p>I do hope you enjoyed this episode of the podcast.  Here's some helpful resources including any sites that were mentioned in this episode.</p><p>--</p><p>--</p><p>Find subscriber links on my site, add to your podcast player, or listen on the web players on my site:</p><p><a href="https://bytesizedsecurity.show/listen">Listen to Byte Sized Security</a> </p><p>--</p><p><strong>Support this Podcast with a Tip:</strong></p><p><a href="https://bytesizedsecurity.show/support">Support Byte Sized Security</a> </p><p>--</p><p>If you have questions for the show, feedback or topics you want covered.  Please send a short email to marc@bytesizedsecurity.show with the Subject line of "Byte-Sized Security" so I know it's about the podcast.</p><p>Connect with me on TikTok: <a href="https://www.tiktok.com/@bytesizedsecurity" rel="noopener noreferrer" target="_blank">https://www.tiktok.com/@bytesizedsecurity</a></p>]]></content:encoded><link><![CDATA[https://bytesizedsecurity.show/episode/ep35-so-tiktok-might-manipulate-americans]]></link><guid isPermaLink="false">0ec7b5ee-ad7f-42f5-8cb8-6f92436bc392</guid><itunes:image href="https://artwork.captivate.fm/6daab296-d019-4be9-bbf4-3e3566f5d395/UatAugnAE7j5mC_O7AskLuwU.png"/><pubDate>Tue, 14 Jan 2025 09:00:00 -0700</pubDate><enclosure url="https://pdcn.co/e/podcasts.captivate.fm/media/4605a2d1-5d2b-44c2-8906-e8bf2d1fd3fd/so-tiktok-might-manipulate-americans-converted.mp3" length="3604519" type="audio/mpeg"/><itunes:duration>03:00</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>35</itunes:episode><podcast:episode>35</podcast:episode><podcast:season>1</podcast:season><podcast:transcript url="https://transcripts.captivate.fm/transcript/786928db-26fd-42b6-8e8d-eb3691c57d01/transcript.json" type="application/json"/><podcast:transcript url="https://transcripts.captivate.fm/transcript/786928db-26fd-42b6-8e8d-eb3691c57d01/transcript.srt" type="application/srt" rel="captions"/><podcast:transcript url="https://transcripts.captivate.fm/transcript/786928db-26fd-42b6-8e8d-eb3691c57d01/index.html" type="text/html"/></item><item><title>Ep34: They say TikTok is dangerous... but look who&apos;s talking</title><itunes:title>Ep34: They say TikTok is dangerous... but look who&apos;s talking</itunes:title><description><![CDATA[<p><strong>The Real Threat of TikTok: Manipulation by Any Owner</strong></p><p>The video discusses the controversy surrounding TikTok and the calls to ban it due to national security concerns. It questions the hypocrisy of other social media giants like Facebook and Twitter (now X) which have also manipulated users for profit. The script emphasizes that the issue isn't the country that owns TikTok, but rather the potential for manipulation by any corporation. The discussion highlights that banning social media isn't the solution and points out that corporate greed remains the true threat, affecting trust in these platforms.</p><p>00:00 Introduction: The TikTok Controversy</p><p>00:16 The Hypocrisy of Social Media Giants</p><p>00:44 The Real Question: Who Controls TikTok?</p><p>01:01 Conclusion: The True Threat of Manipulation</p><p>---</p><p>I do hope you enjoyed this episode of the podcast.  Here's some helpful resources including any sites that were mentioned in this episode.</p><p>--</p><p>Sites Mentioned in this Episode</p><ul><li><a href="https://en.wikipedia.org/wiki/Cambridge_Analytica">Cambridge Analytica - Wikipedia</a></li></ul><br/><p>--</p><p>Find subscriber links on my site, add to your podcast player, or listen on the web players on my site:</p><p><a href="https://bytesizedsecurity.show/listen">Listen to Byte Sized Security</a> </p><p>--</p><p><strong>Support this Podcast with a Tip:</strong></p><p><a href="https://bytesizedsecurity.show/support">Support Byte Sized Security</a> </p><p>--</p><p>If you have questions for the show, feedback or topics you want covered.  Please send a short email to marc@bytesizedsecurity.show with the Subject line of "Byte-Sized Security" so I know it's about the podcast.</p><p>Connect with me on TikTok: <a href="https://www.tiktok.com/@bytesizedsecurity" rel="noopener noreferrer" target="_blank">https://www.tiktok.com/@bytesizedsecurity</a></p>]]></description><content:encoded><![CDATA[<p><strong>The Real Threat of TikTok: Manipulation by Any Owner</strong></p><p>The video discusses the controversy surrounding TikTok and the calls to ban it due to national security concerns. It questions the hypocrisy of other social media giants like Facebook and Twitter (now X) which have also manipulated users for profit. The script emphasizes that the issue isn't the country that owns TikTok, but rather the potential for manipulation by any corporation. The discussion highlights that banning social media isn't the solution and points out that corporate greed remains the true threat, affecting trust in these platforms.</p><p>00:00 Introduction: The TikTok Controversy</p><p>00:16 The Hypocrisy of Social Media Giants</p><p>00:44 The Real Question: Who Controls TikTok?</p><p>01:01 Conclusion: The True Threat of Manipulation</p><p>---</p><p>I do hope you enjoyed this episode of the podcast.  Here's some helpful resources including any sites that were mentioned in this episode.</p><p>--</p><p>Sites Mentioned in this Episode</p><ul><li><a href="https://en.wikipedia.org/wiki/Cambridge_Analytica">Cambridge Analytica - Wikipedia</a></li></ul><br/><p>--</p><p>Find subscriber links on my site, add to your podcast player, or listen on the web players on my site:</p><p><a href="https://bytesizedsecurity.show/listen">Listen to Byte Sized Security</a> </p><p>--</p><p><strong>Support this Podcast with a Tip:</strong></p><p><a href="https://bytesizedsecurity.show/support">Support Byte Sized Security</a> </p><p>--</p><p>If you have questions for the show, feedback or topics you want covered.  Please send a short email to marc@bytesizedsecurity.show with the Subject line of "Byte-Sized Security" so I know it's about the podcast.</p><p>Connect with me on TikTok: <a href="https://www.tiktok.com/@bytesizedsecurity" rel="noopener noreferrer" target="_blank">https://www.tiktok.com/@bytesizedsecurity</a></p>]]></content:encoded><link><![CDATA[https://bytesizedsecurity.show/episode/ep34-they-say-tiktok-is-dangerous-but-look-whos-talking]]></link><guid isPermaLink="false">2c93d530-137b-4933-a3e1-53fcf93f3fea</guid><itunes:image href="https://artwork.captivate.fm/6daab296-d019-4be9-bbf4-3e3566f5d395/UatAugnAE7j5mC_O7AskLuwU.png"/><pubDate>Mon, 13 Jan 2025 09:00:00 -0700</pubDate><enclosure url="https://pdcn.co/e/podcasts.captivate.fm/media/72a9d396-aa8a-490d-aa15-7dfa5e5fdaca/they-say-tiktok-is-dangerous-but-look-who-s-talking-converted.mp3" length="3155735" type="audio/mpeg"/><itunes:duration>02:38</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>34</itunes:episode><podcast:episode>34</podcast:episode><podcast:season>1</podcast:season><podcast:transcript url="https://transcripts.captivate.fm/transcript/77868de0-0663-401e-96e6-5d7f9e8ebada/transcript.json" type="application/json"/><podcast:transcript url="https://transcripts.captivate.fm/transcript/77868de0-0663-401e-96e6-5d7f9e8ebada/transcript.srt" type="application/srt" rel="captions"/><podcast:transcript url="https://transcripts.captivate.fm/transcript/77868de0-0663-401e-96e6-5d7f9e8ebada/index.html" type="text/html"/></item><item><title>Ep33: Do you really need to know Python or coding to be a great cybersecurity engineer?</title><itunes:title>Ep33: Do you really need to know Python or coding to be a great cybersecurity engineer?</itunes:title><description><![CDATA[<p><strong>Do You Need Coding Skills to Succeed as a Security Engineer?</strong></p><p>In this episode, we debunk the myth that coding expertise, particularly in Python, is essential for success in cybersecurity engineering. While many claim that coding skills are a gatekeeper in this field, the reality showcases a wide array of roles such as governance, risk and compliance (GRC), security awareness, and SOC analysis, which do not require deep coding knowledge. The ability to write simple, logical instructions can be helpful, especially in application security or cloud engineering roles. However, mastering core cybersecurity skills like threat modeling, vulnerability assessment, and incident response often has a greater impact. Additionally, AI tools are making coding tasks more accessible. We encourage you to focus on the skills that matter most for your desired cybersecurity role and not be deterred by the myth of mandatory coding expertise.</p><p>00:00 Introduction: Do You Need to Know Python for Cybersecurity?</p><p>00:06 Debunking the Coding Myth in Cybersecurity</p><p>00:26 The Role of Coding in Specific Security Roles</p><p>00:59 Core Skills Beyond Coding</p><p>01:07 Non-Coding Roles in Cybersecurity</p><p>01:34 The Impact of AI on Coding in Cybersecurity</p><p>02:12 Essential Skills for Cybersecurity Professionals</p><p>02:38 Encouragement for Aspiring Security Engineers</p><p>---</p><p>I do hope you enjoyed this episode of the podcast.  Here's some helpful resources including any sites that were mentioned in this episode.</p><p>--</p><p>--</p><p>Find subscriber links on my site, add to your podcast player, or listen on the web players on my site:</p><p><a href="https://bytesizedsecurity.show/listen">Listen to Byte Sized Security</a> </p><p>--</p><p><strong>Support this Podcast with a Tip:</strong></p><p><a href="https://bytesizedsecurity.show/support">Support Byte Sized Security</a> </p><p>--</p><p>If you have questions for the show, feedback or topics you want covered.  Please send a short email to marc@bytesizedsecurity.show with the Subject line of "Byte-Sized Security" so I know it's about the podcast.</p><p>Connect with me on TikTok: <a href="https://www.tiktok.com/@bytesizedsecurity" rel="noopener noreferrer" target="_blank">https://www.tiktok.com/@bytesizedsecurity</a></p>]]></description><content:encoded><![CDATA[<p><strong>Do You Need Coding Skills to Succeed as a Security Engineer?</strong></p><p>In this episode, we debunk the myth that coding expertise, particularly in Python, is essential for success in cybersecurity engineering. While many claim that coding skills are a gatekeeper in this field, the reality showcases a wide array of roles such as governance, risk and compliance (GRC), security awareness, and SOC analysis, which do not require deep coding knowledge. The ability to write simple, logical instructions can be helpful, especially in application security or cloud engineering roles. However, mastering core cybersecurity skills like threat modeling, vulnerability assessment, and incident response often has a greater impact. Additionally, AI tools are making coding tasks more accessible. We encourage you to focus on the skills that matter most for your desired cybersecurity role and not be deterred by the myth of mandatory coding expertise.</p><p>00:00 Introduction: Do You Need to Know Python for Cybersecurity?</p><p>00:06 Debunking the Coding Myth in Cybersecurity</p><p>00:26 The Role of Coding in Specific Security Roles</p><p>00:59 Core Skills Beyond Coding</p><p>01:07 Non-Coding Roles in Cybersecurity</p><p>01:34 The Impact of AI on Coding in Cybersecurity</p><p>02:12 Essential Skills for Cybersecurity Professionals</p><p>02:38 Encouragement for Aspiring Security Engineers</p><p>---</p><p>I do hope you enjoyed this episode of the podcast.  Here's some helpful resources including any sites that were mentioned in this episode.</p><p>--</p><p>--</p><p>Find subscriber links on my site, add to your podcast player, or listen on the web players on my site:</p><p><a href="https://bytesizedsecurity.show/listen">Listen to Byte Sized Security</a> </p><p>--</p><p><strong>Support this Podcast with a Tip:</strong></p><p><a href="https://bytesizedsecurity.show/support">Support Byte Sized Security</a> </p><p>--</p><p>If you have questions for the show, feedback or topics you want covered.  Please send a short email to marc@bytesizedsecurity.show with the Subject line of "Byte-Sized Security" so I know it's about the podcast.</p><p>Connect with me on TikTok: <a href="https://www.tiktok.com/@bytesizedsecurity" rel="noopener noreferrer" target="_blank">https://www.tiktok.com/@bytesizedsecurity</a></p>]]></content:encoded><link><![CDATA[https://bytesizedsecurity.show/episode/ep33-do-you-really-need-to-know-python-or-coding-to-be-a-great-cybersecurity-engineer]]></link><guid isPermaLink="false">0ca2909a-f81e-45ec-8852-1e94b8db3340</guid><itunes:image href="https://artwork.captivate.fm/6daab296-d019-4be9-bbf4-3e3566f5d395/UatAugnAE7j5mC_O7AskLuwU.png"/><pubDate>Wed, 06 Nov 2024 09:00:00 -0700</pubDate><enclosure url="https://pdcn.co/e/podcasts.captivate.fm/media/f0085d13-03b9-49dc-9902-3ba814a7aaa1/do-you-really-need-to-know-python-or-coding-to-be-a-great-cyber.mp3" length="4189347" type="audio/mpeg"/><itunes:duration>04:22</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>33</itunes:episode><podcast:episode>33</podcast:episode><podcast:season>1</podcast:season><podcast:transcript url="https://transcripts.captivate.fm/transcript/a7ef7d0c-955b-43c2-a700-e329e7c07e79/transcript.json" type="application/json"/><podcast:transcript url="https://transcripts.captivate.fm/transcript/a7ef7d0c-955b-43c2-a700-e329e7c07e79/transcript.srt" type="application/srt" rel="captions"/><podcast:transcript url="https://transcripts.captivate.fm/transcript/a7ef7d0c-955b-43c2-a700-e329e7c07e79/index.html" type="text/html"/></item><item><title>Ep32: Cybersecruity is more than learning how to code</title><itunes:title>Ep32: Cybersecruity is more than learning how to code</itunes:title><description><![CDATA[<p><strong>Dismantling Gatekeeping in Cybersecurity: Embracing Diverse Talents</strong></p><p>The episode discusses the need to move beyond gatekeeping in cybersecurity, which often prioritizes coding skills over diverse talents. It highlights the importance of embracing individuals who have strategic vision, risk management expertise, and effective communication abilities, even if they lack programming experience. The host argues that cybersecurity is a complex, multidisciplinary field that requires diverse teams to solve its challenges. The episode calls on hiring managers and leaders to recognize and nurture a variety of skills within their teams, aiming to dismantle barriers and create more inclusive opportunities in cybersecurity.</p><p>00:00 The Importance of Diverse Talents in Cybersecurity</p><p>00:06 The Problem with Gatekeeping Based on Coding Skills</p><p>00:24 A Story of Overlooked Talent</p><p>01:11 The Need for Visionaries and Strategists</p><p>01:38 The Human Aspect of Cybersecurity</p><p>02:35 The Power of Effective Communication</p><p>03:40 Encouraging Diverse Skillsets in Hiring</p><p>04:06 Broadening Skills Beyond Coding</p><p>04:31 A Message to Aspiring Cybersecurity Professionals</p><p>05:00 The Future of Cybersecurity</p><p>05:40 A Call to Action for the Cybersecurity Community</p><p>---</p><p>I do hope you enjoyed this episode of the podcast.  Here's some helpful resources including any sites that were mentioned in this episode.</p><p>--</p><p>--</p><p>Find subscriber links on my site, add to your podcast player, or listen on the web players on my site:</p><p><a href="https://bytesizedsecurity.show/listen">Listen to Byte Sized Security</a> </p><p>--</p><p><strong>Support this Podcast with a Tip:</strong></p><p><a href="https://bytesizedsecurity.show/support">Support Byte Sized Security</a> </p><p>--</p><p>If you have questions for the show, feedback or topics you want covered.  Please send a short email to marc@bytesizedsecurity.show with the Subject line of "Byte-Sized Security" so I know it's about the podcast.</p><p>Connect with me on TikTok: <a href="https://www.tiktok.com/@bytesizedsecurity" rel="noopener noreferrer" target="_blank">https://www.tiktok.com/@bytesizedsecurity</a></p>]]></description><content:encoded><![CDATA[<p><strong>Dismantling Gatekeeping in Cybersecurity: Embracing Diverse Talents</strong></p><p>The episode discusses the need to move beyond gatekeeping in cybersecurity, which often prioritizes coding skills over diverse talents. It highlights the importance of embracing individuals who have strategic vision, risk management expertise, and effective communication abilities, even if they lack programming experience. The host argues that cybersecurity is a complex, multidisciplinary field that requires diverse teams to solve its challenges. The episode calls on hiring managers and leaders to recognize and nurture a variety of skills within their teams, aiming to dismantle barriers and create more inclusive opportunities in cybersecurity.</p><p>00:00 The Importance of Diverse Talents in Cybersecurity</p><p>00:06 The Problem with Gatekeeping Based on Coding Skills</p><p>00:24 A Story of Overlooked Talent</p><p>01:11 The Need for Visionaries and Strategists</p><p>01:38 The Human Aspect of Cybersecurity</p><p>02:35 The Power of Effective Communication</p><p>03:40 Encouraging Diverse Skillsets in Hiring</p><p>04:06 Broadening Skills Beyond Coding</p><p>04:31 A Message to Aspiring Cybersecurity Professionals</p><p>05:00 The Future of Cybersecurity</p><p>05:40 A Call to Action for the Cybersecurity Community</p><p>---</p><p>I do hope you enjoyed this episode of the podcast.  Here's some helpful resources including any sites that were mentioned in this episode.</p><p>--</p><p>--</p><p>Find subscriber links on my site, add to your podcast player, or listen on the web players on my site:</p><p><a href="https://bytesizedsecurity.show/listen">Listen to Byte Sized Security</a> </p><p>--</p><p><strong>Support this Podcast with a Tip:</strong></p><p><a href="https://bytesizedsecurity.show/support">Support Byte Sized Security</a> </p><p>--</p><p>If you have questions for the show, feedback or topics you want covered.  Please send a short email to marc@bytesizedsecurity.show with the Subject line of "Byte-Sized Security" so I know it's about the podcast.</p><p>Connect with me on TikTok: <a href="https://www.tiktok.com/@bytesizedsecurity" rel="noopener noreferrer" target="_blank">https://www.tiktok.com/@bytesizedsecurity</a></p>]]></content:encoded><link><![CDATA[https://bytesizedsecurity.show/episode/ep32-cybersecruity-is-more-than-learning-how-to-code]]></link><guid isPermaLink="false">8c094a59-3355-4ade-9264-4e25c1add3ed</guid><itunes:image href="https://artwork.captivate.fm/6daab296-d019-4be9-bbf4-3e3566f5d395/UatAugnAE7j5mC_O7AskLuwU.png"/><pubDate>Wed, 30 Oct 2024 09:00:00 -0700</pubDate><enclosure url="https://pdcn.co/e/podcasts.captivate.fm/media/58fd4aa6-c5b5-49ce-a4cb-4055af4b1b8a/cybersecruity-is-more-than-learning-how-to-code-converted.mp3" length="8895360" type="audio/mpeg"/><itunes:duration>07:25</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>32</itunes:episode><podcast:episode>32</podcast:episode><podcast:season>1</podcast:season><podcast:transcript url="https://transcripts.captivate.fm/transcript/bdbc9d3b-163c-4a4c-994c-c940e4084441/transcript.json" type="application/json"/><podcast:transcript url="https://transcripts.captivate.fm/transcript/bdbc9d3b-163c-4a4c-994c-c940e4084441/transcript.srt" type="application/srt" rel="captions"/><podcast:transcript url="https://transcripts.captivate.fm/transcript/bdbc9d3b-163c-4a4c-994c-c940e4084441/index.html" type="text/html"/></item><item><title>Ep31: How I turned Claude AI into a career coach and got 3 job offers in 2 weeks</title><itunes:title>Ep31: How I turned Claude AI into a career coach and got 3 job offers in 2 weeks</itunes:title><description><![CDATA[<p><strong>Tailoring Your Resume with AI: My Honest Experience with Claude</strong></p><p>We're diving into the often daunting task of tailoring resumes for specific jobs and how an AI tool, Claude, made this process significantly easier. The presenter shares a detailed, step-by-step account of their experience using Claude to enhance their resume, highlighting the tool's deep analysis, actionable feedback, and authentic improvement suggestions. They discuss the importance of presenting one's true skills and value in a competitive job market while emphasizing that quality and customization in job applications matter more than quantity. The episode wraps up by encouraging viewers to be genuine, strategic, and thoughtful in their job search efforts.</p><p>00:00 Introduction: The Dreaded Resume Tailoring</p><p>00:38 Discovering Claude AI: A Game Changer</p><p>01:22 How Claude AI Works: Step-by-Step Guide</p><p>02:15 Real-World Application: Matching Job Descriptions</p><p>03:04 Addressing the Experience Gap with Confidence</p><p>04:27 The Importance of Authenticity in Job Applications</p><p>05:20 Final Thoughts and Practical Advice</p><p>---</p><p>I do hope you enjoyed this episode of the podcast.  Here's some helpful resources including any sites that were mentioned in this episode.</p><p>--</p><p>Sites Mentioned in this Episode</p><ul><li><a href="https://claude.ai">Claude - Your Career Coach</a> - My step by step experience using Claude Projects as a Career Coach</li></ul><br/><p>--</p><p>Find subscriber links on my site, add to your podcast player, or listen on the web players on my site:</p><p><a href="https://bytesizedsecurity.show/listen">Listen to Byte Sized Security</a> </p><p>--</p><p><strong>Support this Podcast with a Tip:</strong></p><p><a href="https://bytesizedsecurity.show/support">Support Byte Sized Security</a> </p><p>--</p><p>If you have questions for the show, feedback or topics you want covered.  Please send a short email to marc@bytesizedsecurity.show with the Subject line of "Byte-Sized Security" so I know it's about the podcast.</p><p>Connect with me on TikTok: <a href="https://www.tiktok.com/@bytesizedsecurity" rel="noopener noreferrer" target="_blank">https://www.tiktok.com/@bytesizedsecurity</a></p>]]></description><content:encoded><![CDATA[<p><strong>Tailoring Your Resume with AI: My Honest Experience with Claude</strong></p><p>We're diving into the often daunting task of tailoring resumes for specific jobs and how an AI tool, Claude, made this process significantly easier. The presenter shares a detailed, step-by-step account of their experience using Claude to enhance their resume, highlighting the tool's deep analysis, actionable feedback, and authentic improvement suggestions. They discuss the importance of presenting one's true skills and value in a competitive job market while emphasizing that quality and customization in job applications matter more than quantity. The episode wraps up by encouraging viewers to be genuine, strategic, and thoughtful in their job search efforts.</p><p>00:00 Introduction: The Dreaded Resume Tailoring</p><p>00:38 Discovering Claude AI: A Game Changer</p><p>01:22 How Claude AI Works: Step-by-Step Guide</p><p>02:15 Real-World Application: Matching Job Descriptions</p><p>03:04 Addressing the Experience Gap with Confidence</p><p>04:27 The Importance of Authenticity in Job Applications</p><p>05:20 Final Thoughts and Practical Advice</p><p>---</p><p>I do hope you enjoyed this episode of the podcast.  Here's some helpful resources including any sites that were mentioned in this episode.</p><p>--</p><p>Sites Mentioned in this Episode</p><ul><li><a href="https://claude.ai">Claude - Your Career Coach</a> - My step by step experience using Claude Projects as a Career Coach</li></ul><br/><p>--</p><p>Find subscriber links on my site, add to your podcast player, or listen on the web players on my site:</p><p><a href="https://bytesizedsecurity.show/listen">Listen to Byte Sized Security</a> </p><p>--</p><p><strong>Support this Podcast with a Tip:</strong></p><p><a href="https://bytesizedsecurity.show/support">Support Byte Sized Security</a> </p><p>--</p><p>If you have questions for the show, feedback or topics you want covered.  Please send a short email to marc@bytesizedsecurity.show with the Subject line of "Byte-Sized Security" so I know it's about the podcast.</p><p>Connect with me on TikTok: <a href="https://www.tiktok.com/@bytesizedsecurity" rel="noopener noreferrer" target="_blank">https://www.tiktok.com/@bytesizedsecurity</a></p>]]></content:encoded><link><![CDATA[https://bytesizedsecurity.show/episode/ep31-how-i-turned-claude-ai-into-a-career-coach-and-got-3-job-offers-in-2-weeks]]></link><guid isPermaLink="false">26e2746f-179e-4aee-bc7d-574caddb1f2a</guid><itunes:image href="https://artwork.captivate.fm/6daab296-d019-4be9-bbf4-3e3566f5d395/UatAugnAE7j5mC_O7AskLuwU.png"/><pubDate>Tue, 29 Oct 2024 10:00:00 -0700</pubDate><enclosure url="https://pdcn.co/e/podcasts.captivate.fm/media/78948da7-ce04-425c-9a58-f6a47303c32d/how-i-turned-claude-ai-into-a-career-coach-and-got-3-job-offers.mp3" length="9362429" type="audio/mpeg"/><itunes:duration>07:48</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>31</itunes:episode><podcast:episode>31</podcast:episode><podcast:season>1</podcast:season><podcast:transcript url="https://transcripts.captivate.fm/transcript/9602fb62-32d5-4f80-994f-b98b42952ad7/transcript.json" type="application/json"/><podcast:transcript url="https://transcripts.captivate.fm/transcript/9602fb62-32d5-4f80-994f-b98b42952ad7/transcript.srt" type="application/srt" rel="captions"/><podcast:transcript url="https://transcripts.captivate.fm/transcript/9602fb62-32d5-4f80-994f-b98b42952ad7/index.html" type="text/html"/></item><item><title>Ep:30 Practical Cybersecruity Advice You Can Use</title><itunes:title>Ep:30 Practical Cybersecruity Advice You Can Use</itunes:title><description><![CDATA[<p>The source is an audio recording of a podcast episode focused on providing advice for those seeking to enter the cybersecurity field. The host, Marc, offers insights on acquiring practical experience, the importance of certifications, the significance of soft skills, strategies for successful job interviews, and effective networking methods. He emphasizes the importance of tailoring resumes to showcase relevant skills and using networking events to connect with industry professionals. He also shares his own personal experience with job hunting and rejection, encouraging listeners to persevere despite setbacks and to continuously improve their job application materials.</p><p>---</p><p>I do hope you enjoyed this episode of the podcast.  Here's some helpful resources including any sites that were mentioned in this episode.</p><p>--</p><p>--</p><p>Find subscriber links on my site, add to your podcast player, or listen on the web players on my site:</p><p><a href="https://bytesizedsecurity.show/listen">Listen to Byte Sized Security</a> </p><p>--</p><p><strong>Support this Podcast with a Tip:</strong></p><p><a href="https://bytesizedsecurity.show/support">Support Byte Sized Security</a> </p><p>--</p><p>If you have questions for the show, feedback or topics you want covered.  Please send a short email to marc@bytesizedsecurity.show with the Subject line of "Byte-Sized Security" so I know it's about the podcast.</p><p>Connect with me on TikTok: <a href="https://www.tiktok.com/@bytesizedsecurity" rel="noopener noreferrer" target="_blank">https://www.tiktok.com/@bytesizedsecurity</a></p>]]></description><content:encoded><![CDATA[<p>The source is an audio recording of a podcast episode focused on providing advice for those seeking to enter the cybersecurity field. The host, Marc, offers insights on acquiring practical experience, the importance of certifications, the significance of soft skills, strategies for successful job interviews, and effective networking methods. He emphasizes the importance of tailoring resumes to showcase relevant skills and using networking events to connect with industry professionals. He also shares his own personal experience with job hunting and rejection, encouraging listeners to persevere despite setbacks and to continuously improve their job application materials.</p><p>---</p><p>I do hope you enjoyed this episode of the podcast.  Here's some helpful resources including any sites that were mentioned in this episode.</p><p>--</p><p>--</p><p>Find subscriber links on my site, add to your podcast player, or listen on the web players on my site:</p><p><a href="https://bytesizedsecurity.show/listen">Listen to Byte Sized Security</a> </p><p>--</p><p><strong>Support this Podcast with a Tip:</strong></p><p><a href="https://bytesizedsecurity.show/support">Support Byte Sized Security</a> </p><p>--</p><p>If you have questions for the show, feedback or topics you want covered.  Please send a short email to marc@bytesizedsecurity.show with the Subject line of "Byte-Sized Security" so I know it's about the podcast.</p><p>Connect with me on TikTok: <a href="https://www.tiktok.com/@bytesizedsecurity" rel="noopener noreferrer" target="_blank">https://www.tiktok.com/@bytesizedsecurity</a></p>]]></content:encoded><link><![CDATA[https://bytesizedsecurity.show/episode/ep-30-practical-cybersecruity-advice-you-can-use]]></link><guid isPermaLink="false">ee41cccc-363a-4a15-ad48-957eff2d7eba</guid><itunes:image href="https://artwork.captivate.fm/6daab296-d019-4be9-bbf4-3e3566f5d395/UatAugnAE7j5mC_O7AskLuwU.png"/><pubDate>Thu, 19 Sep 2024 09:00:00 -0700</pubDate><enclosure url="https://pdcn.co/e/podcasts.captivate.fm/media/75a1716d-4a44-4a5c-a3f4-4f5ad92d3198/30-practical-cybersecruity-advice-you-can-use-converted.mp3" length="18888764" type="audio/mpeg"/><itunes:duration>15:44</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>30</itunes:episode><podcast:episode>30</podcast:episode><podcast:season>1</podcast:season><podcast:transcript url="https://transcripts.captivate.fm/transcript/80ce81d5-981c-4ee6-b928-b912927d7f74/transcript.json" type="application/json"/><podcast:transcript url="https://transcripts.captivate.fm/transcript/80ce81d5-981c-4ee6-b928-b912927d7f74/transcript.srt" type="application/srt" rel="captions"/><podcast:transcript url="https://transcripts.captivate.fm/transcript/80ce81d5-981c-4ee6-b928-b912927d7f74/index.html" type="text/html"/></item><item><title>Ep29: Hack Your Career: Insider Tips for Cybersecurity Beginners</title><itunes:title>Ep29: Hack Your Career: Insider Tips for Cybersecurity Beginners</itunes:title><description><![CDATA[<p><strong>Navigating Cybersecurity: Q&amp;A Session with Marc</strong></p><p>In this special episode recorded outdoors, Marc answers listener questions about breaking into the cybersecurity field. Topics include gaining practical experience without an IT background, the importance of certifications, essential soft skills, networking strategies, handling job rejections, and making a career transition into cybersecurity. Marc provides practical advice on how to stand out in interviews, tailor your resume, and continuously improve your chances of landing a cybersecurity job. Resources and contact information are available in the show notes.</p><p>00:00 Introduction and Format Change</p><p>00:29 Question 1: Gaining Practical Experience in Cybersecurity</p><p>03:31 Question 2: Importance of Certifications</p><p>06:46 Question 3: Crucial Soft Skills</p><p>09:26 Question 4: Standing Out in Job Interviews</p><p>12:33 Question 5: Networking in Cybersecurity</p><p>15:59 Question 6: Handling Rejection and Improving Applications</p><p>22:35 Conclusion and Final Thoughts</p><p>---</p><p>I do hope you enjoyed this episode of the podcast.  Here are some helpful resources, including any sites that were mentioned in this episode.</p><p>--</p><p>Sites Mentioned in this Episode</p><ul><li><a href="https://infosec-conferences.com/">Cybersecurity Conferences</a> - Our cybersecurity conference directory is meticulously updated and checked manually to prevent spam, ensuring it remains the community’s premier resource for discovering top cybersecurity conferences, events, meetings, and seminars for 2024, 2025, and beyond.</li><li><a href="https://podcasts.apple.com/us/podcast/the-hire-drive/id1698574412">The Hire Drive Podcast Series - Apple Podcasts</a></li><li><a href="https://a.co/d/6TzSIPO">Zero to Hired: Job Hunting in the AI Age</a> - "Zero to Hired: Job Hunting in the AI Age" demystifies the complex world of job searching and hiring practices, providing job seekers with a comprehensive step-by-step guide to leverage artificial intelligence and modern digital tools to land their dream job. </li></ul><br/><p>--</p><p>Find subscriber links on my site, add to your podcast player, or listen on the web players on my site:</p><p><a href="https://bytesizedsecurity.show/listen">Listen to Byte Sized Security</a> </p><p>--</p><p><strong>Support this Podcast with a Tip:</strong></p><p><a href="https://bytesizedsecurity.show/support">Support Byte Sized Security</a> </p><p>--</p><p>If you have questions for the show, feedback or topics you want covered.  Please send a short email to marc@bytesizedsecurity.show with the Subject line of "Byte-Sized Security" so I know it's about the podcast.</p><p>Connect with me on TikTok: <a href="https://www.tiktok.com/@bytesizedsecurity" rel="noopener noreferrer" target="_blank">https://www.tiktok.com/@bytesizedsecurity</a></p>]]></description><content:encoded><![CDATA[<p><strong>Navigating Cybersecurity: Q&amp;A Session with Marc</strong></p><p>In this special episode recorded outdoors, Marc answers listener questions about breaking into the cybersecurity field. Topics include gaining practical experience without an IT background, the importance of certifications, essential soft skills, networking strategies, handling job rejections, and making a career transition into cybersecurity. Marc provides practical advice on how to stand out in interviews, tailor your resume, and continuously improve your chances of landing a cybersecurity job. Resources and contact information are available in the show notes.</p><p>00:00 Introduction and Format Change</p><p>00:29 Question 1: Gaining Practical Experience in Cybersecurity</p><p>03:31 Question 2: Importance of Certifications</p><p>06:46 Question 3: Crucial Soft Skills</p><p>09:26 Question 4: Standing Out in Job Interviews</p><p>12:33 Question 5: Networking in Cybersecurity</p><p>15:59 Question 6: Handling Rejection and Improving Applications</p><p>22:35 Conclusion and Final Thoughts</p><p>---</p><p>I do hope you enjoyed this episode of the podcast.  Here are some helpful resources, including any sites that were mentioned in this episode.</p><p>--</p><p>Sites Mentioned in this Episode</p><ul><li><a href="https://infosec-conferences.com/">Cybersecurity Conferences</a> - Our cybersecurity conference directory is meticulously updated and checked manually to prevent spam, ensuring it remains the community’s premier resource for discovering top cybersecurity conferences, events, meetings, and seminars for 2024, 2025, and beyond.</li><li><a href="https://podcasts.apple.com/us/podcast/the-hire-drive/id1698574412">The Hire Drive Podcast Series - Apple Podcasts</a></li><li><a href="https://a.co/d/6TzSIPO">Zero to Hired: Job Hunting in the AI Age</a> - "Zero to Hired: Job Hunting in the AI Age" demystifies the complex world of job searching and hiring practices, providing job seekers with a comprehensive step-by-step guide to leverage artificial intelligence and modern digital tools to land their dream job. </li></ul><br/><p>--</p><p>Find subscriber links on my site, add to your podcast player, or listen on the web players on my site:</p><p><a href="https://bytesizedsecurity.show/listen">Listen to Byte Sized Security</a> </p><p>--</p><p><strong>Support this Podcast with a Tip:</strong></p><p><a href="https://bytesizedsecurity.show/support">Support Byte Sized Security</a> </p><p>--</p><p>If you have questions for the show, feedback or topics you want covered.  Please send a short email to marc@bytesizedsecurity.show with the Subject line of "Byte-Sized Security" so I know it's about the podcast.</p><p>Connect with me on TikTok: <a href="https://www.tiktok.com/@bytesizedsecurity" rel="noopener noreferrer" target="_blank">https://www.tiktok.com/@bytesizedsecurity</a></p>]]></content:encoded><link><![CDATA[https://bytesizedsecurity.show/episode/ep29-hack-your-career-insider-tips-for-cybersecurity-beginners]]></link><guid isPermaLink="false">4f844187-23ab-4aee-b9b5-8398309967c3</guid><itunes:image href="https://artwork.captivate.fm/6daab296-d019-4be9-bbf4-3e3566f5d395/UatAugnAE7j5mC_O7AskLuwU.png"/><pubDate>Thu, 29 Aug 2024 09:00:00 -0700</pubDate><enclosure url="https://pdcn.co/e/podcasts.captivate.fm/media/4925f67d-f3b2-489e-b0d4-9e0591fad911/hack-your-career-insider-tips-for-cybersecurity-beginners-conve.mp3" length="27441777" type="audio/mpeg"/><itunes:duration>22:52</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>29</itunes:episode><podcast:episode>29</podcast:episode><podcast:season>1</podcast:season><podcast:transcript url="https://transcripts.captivate.fm/transcript/68210688-d25f-4a29-87d1-60f8c56920eb/transcript.json" type="application/json"/><podcast:transcript url="https://transcripts.captivate.fm/transcript/68210688-d25f-4a29-87d1-60f8c56920eb/transcript.srt" type="application/srt" rel="captions"/><podcast:transcript url="https://transcripts.captivate.fm/transcript/68210688-d25f-4a29-87d1-60f8c56920eb/index.html" type="text/html"/></item><item><title>Ep28: How to Delete Your Data from the Internet</title><itunes:title>Ep28: How to Delete Your Data from the Internet</itunes:title><description><![CDATA[<p><strong>Safeguarding Your Identity: Essential Tools and Techniques</strong></p><p>This episode focuses on the increasing dangers of data breaches and the various steps individuals can take to protect their personal information. Highlighting the threats posed by data breaches and data brokers, the discussion provides detailed reviews of free resources such as OperationPrivacy.com and Google’s 'Results About You' feature. These tools help users remove their data from major brokers and search engines. Additionally, the episode covers the importance and process of freezing your credit to prevent identity theft, emphasizing the use of password managers and two-factor authentication (2FA) for enhanced security.</p><p>00:00 Introduction: The Reality of Data Breaches</p><p>00:22 Understanding the Risks: How Your Data is Compromised</p><p>01:29 Adopting a Breach Mentality: Protecting Your Information</p><p>02:27 Operation Privacy: A Free Tool for Data Removal</p><p>06:41 Google Results About You: Managing Your Online Presence</p><p>10:15 Freezing Your Credit: An Essential Step</p><p>13:34 Conclusion: Taking Control of Your Data Security</p><p>---</p><p>I do hope you enjoyed this episode of the podcast.  Here are some helpful resources including any sites that were mentioned in this episode.</p><p>--</p><p>Sites Mentioned in this Episode</p><ul><li><a href="https://myactivity.google.com/results-about-you">Google Take Controls of Results About You</a></li><li><a href="https://www.operationprivacy.com/">Operation Privacy</a></li></ul><br/><p>--</p><p>Find subscriber links on my site, add to your podcast player, or listen on the web players on my site:</p><p><a href="https://bytesizedsecurity.show/listen">Listen to Byte Sized Security</a> </p><p>--</p><p><strong>Support this Podcast with a Tip:</strong></p><p><a href="https://bytesizedsecurity.show/support">Support Byte Sized Security</a> </p><p>--</p><p>If you have questions for the show, feedback or topics you want covered.  Please send a short email to marc@bytesizedsecurity.show with the Subject line of "Byte-Sized Security" so I know it's about the podcast.</p><p>Connect with me on TikTok: <a href="https://www.tiktok.com/@bytesizedsecurity" rel="noopener noreferrer" target="_blank">https://www.tiktok.com/@bytesizedsecurity</a></p>]]></description><content:encoded><![CDATA[<p><strong>Safeguarding Your Identity: Essential Tools and Techniques</strong></p><p>This episode focuses on the increasing dangers of data breaches and the various steps individuals can take to protect their personal information. Highlighting the threats posed by data breaches and data brokers, the discussion provides detailed reviews of free resources such as OperationPrivacy.com and Google’s 'Results About You' feature. These tools help users remove their data from major brokers and search engines. Additionally, the episode covers the importance and process of freezing your credit to prevent identity theft, emphasizing the use of password managers and two-factor authentication (2FA) for enhanced security.</p><p>00:00 Introduction: The Reality of Data Breaches</p><p>00:22 Understanding the Risks: How Your Data is Compromised</p><p>01:29 Adopting a Breach Mentality: Protecting Your Information</p><p>02:27 Operation Privacy: A Free Tool for Data Removal</p><p>06:41 Google Results About You: Managing Your Online Presence</p><p>10:15 Freezing Your Credit: An Essential Step</p><p>13:34 Conclusion: Taking Control of Your Data Security</p><p>---</p><p>I do hope you enjoyed this episode of the podcast.  Here are some helpful resources including any sites that were mentioned in this episode.</p><p>--</p><p>Sites Mentioned in this Episode</p><ul><li><a href="https://myactivity.google.com/results-about-you">Google Take Controls of Results About You</a></li><li><a href="https://www.operationprivacy.com/">Operation Privacy</a></li></ul><br/><p>--</p><p>Find subscriber links on my site, add to your podcast player, or listen on the web players on my site:</p><p><a href="https://bytesizedsecurity.show/listen">Listen to Byte Sized Security</a> </p><p>--</p><p><strong>Support this Podcast with a Tip:</strong></p><p><a href="https://bytesizedsecurity.show/support">Support Byte Sized Security</a> </p><p>--</p><p>If you have questions for the show, feedback or topics you want covered.  Please send a short email to marc@bytesizedsecurity.show with the Subject line of "Byte-Sized Security" so I know it's about the podcast.</p><p>Connect with me on TikTok: <a href="https://www.tiktok.com/@bytesizedsecurity" rel="noopener noreferrer" target="_blank">https://www.tiktok.com/@bytesizedsecurity</a></p>]]></content:encoded><link><![CDATA[https://bytesizedsecurity.show/episode/ep28-how-to-delete-your-data-from-the-internet]]></link><guid isPermaLink="false">b505c252-f9a0-45f6-92ea-2400994e441b</guid><itunes:image href="https://artwork.captivate.fm/6daab296-d019-4be9-bbf4-3e3566f5d395/UatAugnAE7j5mC_O7AskLuwU.png"/><pubDate>Tue, 27 Aug 2024 09:00:00 -0700</pubDate><enclosure url="https://pdcn.co/e/podcasts.captivate.fm/media/30e94b32-00fe-4e88-8820-2899d2b26a9a/how-to-delete-your-data-from-the-internet-converted.mp3" length="21397564" type="audio/mpeg"/><itunes:duration>17:50</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>28</itunes:episode><podcast:episode>28</podcast:episode><podcast:season>1</podcast:season><podcast:transcript url="https://transcripts.captivate.fm/transcript/9846c1a9-c8c1-4235-a093-56678aabda8c/transcript.json" type="application/json"/><podcast:transcript url="https://transcripts.captivate.fm/transcript/9846c1a9-c8c1-4235-a093-56678aabda8c/transcript.srt" type="application/srt" rel="captions"/><podcast:transcript url="https://transcripts.captivate.fm/transcript/9846c1a9-c8c1-4235-a093-56678aabda8c/index.html" type="text/html"/></item><item><title>Ep:27 The Great IT vs. Security Smackdown: A Comedy in Three Acts</title><itunes:title>Ep:27 The Great IT vs. Security Smackdown: A Comedy in Three Acts</itunes:title><description><![CDATA[<p><strong>The Great IT vs. Security Smackdown: A Comedy in Three Acts</strong></p><p>In this hilarious and eye-opening episode of ByteSizedSecurity, we're flipping the script on the age-old IT vs. Security debate. Prepare for a rollercoaster ride through the corporate tech landscape as we challenge the notion that security is just IT's sidekick. From debunking myths to exposing organizational chart failures, this episode serves up hard truths with a side of laughter. Whether you're an IT pro, a security guru, or just someone who enjoys a good tech tussle, tune in for a fresh perspective on why security should be in the driver's seat. Warning: This episode may cause uncontrollable giggles and a sudden urge to redesign your company's org chart!</p><p>Keywords: IT, Security, Cybersecurity, Corporate Structure, CIA Triad, CISO, CIO, Tech Humor</p>]]></description><content:encoded><![CDATA[<p><strong>The Great IT vs. Security Smackdown: A Comedy in Three Acts</strong></p><p>In this hilarious and eye-opening episode of ByteSizedSecurity, we're flipping the script on the age-old IT vs. Security debate. Prepare for a rollercoaster ride through the corporate tech landscape as we challenge the notion that security is just IT's sidekick. From debunking myths to exposing organizational chart failures, this episode serves up hard truths with a side of laughter. Whether you're an IT pro, a security guru, or just someone who enjoys a good tech tussle, tune in for a fresh perspective on why security should be in the driver's seat. Warning: This episode may cause uncontrollable giggles and a sudden urge to redesign your company's org chart!</p><p>Keywords: IT, Security, Cybersecurity, Corporate Structure, CIA Triad, CISO, CIO, Tech Humor</p>]]></content:encoded><link><![CDATA[https://bytesizedsecurity.show/episode/ep-27-the-great-it-vs-security-smackdown-a-comedy-in-three-acts]]></link><guid isPermaLink="false">a9464e48-d86c-459c-a5db-c1fbfc339d48</guid><itunes:image href="https://artwork.captivate.fm/6daab296-d019-4be9-bbf4-3e3566f5d395/UatAugnAE7j5mC_O7AskLuwU.png"/><pubDate>Mon, 05 Aug 2024 09:00:00 -0700</pubDate><enclosure url="https://pdcn.co/e/podcasts.captivate.fm/media/ea06b94b-5068-4ac2-a425-796c4c536233/27-the-great-it-vs-security-smackdown-a-comedy-in-three-acts-co.mp3" length="5297254" type="audio/mpeg"/><itunes:duration>04:25</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>27</itunes:episode><podcast:episode>27</podcast:episode><podcast:season>1</podcast:season><podcast:transcript url="https://transcripts.captivate.fm/transcript/e79b4bed-c288-4b03-a9a8-036463ab9692/transcript.json" type="application/json"/><podcast:transcript url="https://transcripts.captivate.fm/transcript/e79b4bed-c288-4b03-a9a8-036463ab9692/transcript.srt" type="application/srt" rel="captions"/><podcast:transcript url="https://transcripts.captivate.fm/transcript/e79b4bed-c288-4b03-a9a8-036463ab9692/index.html" type="text/html"/></item><item><title>Ep26: Cybersecurity Influencers Need to Do Better</title><itunes:title>Ep26: Cybersecurity Influencers Need to Do Better</itunes:title><description><![CDATA[<p><strong>The Responsibility of Cybersecurity Influencers: A Call for Integrity</strong></p><p>This podcast addresses the issue of misinformation in the cybersecurity community, especially among influencers on platforms such as TikTok. The narrator emphasizes the importance of influencers conducting thorough research and providing accurate, evidence-based information rather than spreading myths or fear-mongering. They argue that cybersecurity influencers have an obligation to their audience to be reliable sources of information, citing examples such as unfounded fears about iOS updates and privacy. The podcast critiques the current state of cybersecurity discourse, where ease of content creation has led to an abundance of unverified information, comparing it unfavorably to the medical field where expertise is rigorously vetted. The narrator calls on influencers to improve their practices by doing proper research, citing sources, and understanding the real-world impact of their advice on data protection and security. Lastly, the importance of being discerning about the motives behind the information provided by influencers, including financial incentives, is highlighted as crucial for the audience's ability to trust the content they consume.</p><p>00:00 The Call for Cybersecurity Influencers to Step Up</p><p>00:45 The Dangers of Misinformation in Cybersecurity</p><p>02:09 The Responsibility of Influencers: Research and Truth</p><p>03:52 The Importance of Credibility and Trust in Cybersecurity Advice</p><p>05:57 The Role of Influencers in Educating the Public Responsibly</p><p>09:59 The Obligation of Cybersecurity Influencers to Provide Accurate Information</p><p>12:46 Final Thoughts: The Impact of Responsible Influence</p><p>---</p><p>I do hope you enjoyed this episode of the podcast.  Here's some helpful resources including any sites that were mentioned in this episode.</p><p>--</p><p>--</p><p>Find subscriber links on my site, add to your podcast player, or listen on the web players on my site:</p><p><a href="https://bytesizedsecurity.show/listen">Listen to Byte Sized Security</a> </p><p>--</p><p><strong>Support this Podcast with a Tip:</strong></p><p><a href="https://bytesizedsecurity.show/support">Support Byte Sized Security</a> </p><p>--</p><p>If you have questions for the show, feedback or topics you want covered.  Please send a short email to marc@bytesizedsecurity.show with the Subject line of "Byte-Sized Security" so I know it's about the podcast.</p><p>Connect with me on TikTok: <a href="https://www.tiktok.com/@bytesizedsecurity" rel="noopener noreferrer" target="_blank">https://www.tiktok.com/@bytesizedsecurity</a></p>]]></description><content:encoded><![CDATA[<p><strong>The Responsibility of Cybersecurity Influencers: A Call for Integrity</strong></p><p>This podcast addresses the issue of misinformation in the cybersecurity community, especially among influencers on platforms such as TikTok. The narrator emphasizes the importance of influencers conducting thorough research and providing accurate, evidence-based information rather than spreading myths or fear-mongering. They argue that cybersecurity influencers have an obligation to their audience to be reliable sources of information, citing examples such as unfounded fears about iOS updates and privacy. The podcast critiques the current state of cybersecurity discourse, where ease of content creation has led to an abundance of unverified information, comparing it unfavorably to the medical field where expertise is rigorously vetted. The narrator calls on influencers to improve their practices by doing proper research, citing sources, and understanding the real-world impact of their advice on data protection and security. Lastly, the importance of being discerning about the motives behind the information provided by influencers, including financial incentives, is highlighted as crucial for the audience's ability to trust the content they consume.</p><p>00:00 The Call for Cybersecurity Influencers to Step Up</p><p>00:45 The Dangers of Misinformation in Cybersecurity</p><p>02:09 The Responsibility of Influencers: Research and Truth</p><p>03:52 The Importance of Credibility and Trust in Cybersecurity Advice</p><p>05:57 The Role of Influencers in Educating the Public Responsibly</p><p>09:59 The Obligation of Cybersecurity Influencers to Provide Accurate Information</p><p>12:46 Final Thoughts: The Impact of Responsible Influence</p><p>---</p><p>I do hope you enjoyed this episode of the podcast.  Here's some helpful resources including any sites that were mentioned in this episode.</p><p>--</p><p>--</p><p>Find subscriber links on my site, add to your podcast player, or listen on the web players on my site:</p><p><a href="https://bytesizedsecurity.show/listen">Listen to Byte Sized Security</a> </p><p>--</p><p><strong>Support this Podcast with a Tip:</strong></p><p><a href="https://bytesizedsecurity.show/support">Support Byte Sized Security</a> </p><p>--</p><p>If you have questions for the show, feedback or topics you want covered.  Please send a short email to marc@bytesizedsecurity.show with the Subject line of "Byte-Sized Security" so I know it's about the podcast.</p><p>Connect with me on TikTok: <a href="https://www.tiktok.com/@bytesizedsecurity" rel="noopener noreferrer" target="_blank">https://www.tiktok.com/@bytesizedsecurity</a></p>]]></content:encoded><link><![CDATA[https://bytesizedsecurity.show/episode/ep26-cybersecurity-influencers-need-to-do-better]]></link><guid isPermaLink="false">b167d5f6-614e-4a15-bb44-97abd1bfa43f</guid><itunes:image href="https://artwork.captivate.fm/6daab296-d019-4be9-bbf4-3e3566f5d395/UatAugnAE7j5mC_O7AskLuwU.png"/><pubDate>Thu, 14 Mar 2024 09:00:00 -0700</pubDate><enclosure url="https://pdcn.co/e/podcasts.captivate.fm/media/bad3389a-bb57-4236-b66c-b3153b368acb/cybersecurity-influencers-need-to-do-better-converted.mp3" length="19656764" type="audio/mpeg"/><itunes:duration>16:23</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>26</itunes:episode><podcast:episode>26</podcast:episode><podcast:season>1</podcast:season><podcast:transcript url="https://transcripts.captivate.fm/transcript/18caedad-33b6-4132-a8da-6aac1dbc38d7/transcript.json" type="application/json"/><podcast:transcript url="https://transcripts.captivate.fm/transcript/18caedad-33b6-4132-a8da-6aac1dbc38d7/transcript.srt" type="application/srt" rel="captions"/><podcast:transcript url="https://transcripts.captivate.fm/transcript/18caedad-33b6-4132-a8da-6aac1dbc38d7/index.html" type="text/html"/></item><item><title>EP25: The Impact of the 23andMe Breach: Protecting Personal Information Online</title><itunes:title>EP25: The Impact of the 23andMe Breach: Protecting Personal Information Online</itunes:title><description><![CDATA[<p>The recent breach of the 23andMe service, a DNA ancestry testing company. It highlights the impact of the breach, the potential risks of sharing personal information, and the lack of adequate security measures taken by the company. It also suggests various security practices that could have been implemented to prevent such breaches in the future. Finally, it mentions the importance of individual users taking steps to protect their own security and the recommendation to freeze credit to prevent identity theft.</p><p>---</p><p>I do hope you enjoyed this episode of the podcast.  Here's some helpful resources including any sites that were mentioned in this episode.</p><p>--</p><p>--</p><p>Find subscriber links on my site, add to your podcast player, or listen on the web players on my site:</p><p><a href="https://bytesizedsecurity.show/listen">Listen to Byte Sized Security</a> </p><p>--</p><p><strong>Support this Podcast with a Tip:</strong></p><p><a href="https://bytesizedsecurity.show/support">Support Byte Sized Security</a> </p><p>--</p><p>If you have questions for the show, feedback or topics you want covered.  Please send a short email to marc@bytesizedsecurity.show with the Subject line of "Byte-Sized Security" so I know it's about the podcast.</p><p>Connect with me on TikTok: <a href="https://www.tiktok.com/@bytesizedsecurity" rel="noopener noreferrer" target="_blank">https://www.tiktok.com/@bytesizedsecurity</a></p>]]></description><content:encoded><![CDATA[<p>The recent breach of the 23andMe service, a DNA ancestry testing company. It highlights the impact of the breach, the potential risks of sharing personal information, and the lack of adequate security measures taken by the company. It also suggests various security practices that could have been implemented to prevent such breaches in the future. Finally, it mentions the importance of individual users taking steps to protect their own security and the recommendation to freeze credit to prevent identity theft.</p><p>---</p><p>I do hope you enjoyed this episode of the podcast.  Here's some helpful resources including any sites that were mentioned in this episode.</p><p>--</p><p>--</p><p>Find subscriber links on my site, add to your podcast player, or listen on the web players on my site:</p><p><a href="https://bytesizedsecurity.show/listen">Listen to Byte Sized Security</a> </p><p>--</p><p><strong>Support this Podcast with a Tip:</strong></p><p><a href="https://bytesizedsecurity.show/support">Support Byte Sized Security</a> </p><p>--</p><p>If you have questions for the show, feedback or topics you want covered.  Please send a short email to marc@bytesizedsecurity.show with the Subject line of "Byte-Sized Security" so I know it's about the podcast.</p><p>Connect with me on TikTok: <a href="https://www.tiktok.com/@bytesizedsecurity" rel="noopener noreferrer" target="_blank">https://www.tiktok.com/@bytesizedsecurity</a></p>]]></content:encoded><link><![CDATA[https://bytesizedsecurity.show/episode/the-impact-of-the-23andme-breach-protecting-personal-information-online]]></link><guid isPermaLink="false">14002f43-5c7f-4915-bc33-25590251d575</guid><itunes:image href="https://artwork.captivate.fm/6daab296-d019-4be9-bbf4-3e3566f5d395/UatAugnAE7j5mC_O7AskLuwU.png"/><pubDate>Sat, 06 Jan 2024 09:00:00 -0700</pubDate><enclosure url="https://pdcn.co/e/podcasts.captivate.fm/media/f34f8594-e603-4b51-a153-3853d917d42a/23andme-breach-converted.mp3" length="15536522" type="audio/mpeg"/><itunes:duration>16:11</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>25</itunes:episode><podcast:episode>25</podcast:episode><podcast:season>1</podcast:season><podcast:transcript url="https://transcripts.captivate.fm/transcript/7fea226f-1a54-4512-952a-99e16c3e4bba/transcript.json" type="application/json"/><podcast:transcript url="https://transcripts.captivate.fm/transcript/7fea226f-1a54-4512-952a-99e16c3e4bba/transcript.srt" type="application/srt" rel="captions"/><podcast:transcript url="https://transcripts.captivate.fm/transcript/7fea226f-1a54-4512-952a-99e16c3e4bba/index.html" type="text/html"/></item><item><title>Ep24: Can Cybersecurity Experts Safely Use TikTok?</title><itunes:title>Ep24: Can Cybersecurity Experts Safely Use TikTok?</itunes:title><description><![CDATA[<p>As a security engineer. I'm curious about your thoughts on the intersection of professional cybersecurity roles. And personal social media use. And specifically. Using platforms like TikTok, does that compromise the trustworthiness of security professionals?</p><p>---</p><p>I do hope you enjoyed this episode of the podcast.  Here's some helpful resources including any sites that were mentioned in this episode.</p><p>--</p><p>--</p><p>Find subscriber links on my site, add to your podcast player, or listen on the web players on my site:</p><p><a href="https://bytesizedsecurity.show/listen">Listen to Byte Sized Security</a> </p><p>--</p><p><strong>Support this Podcast with a Tip:</strong></p><p><a href="https://bytesizedsecurity.show/support">Support Byte Sized Security</a> </p><p>--</p><p>If you have questions for the show, feedback or topics you want covered.  Please send a short email to marc@bytesizedsecurity.show with the Subject line of "Byte-Sized Security" so I know it's about the podcast.</p><p>Connect with me on TikTok: <a href="https://www.tiktok.com/@bytesizedsecurity" rel="noopener noreferrer" target="_blank">https://www.tiktok.com/@bytesizedsecurity</a></p>]]></description><content:encoded><![CDATA[<p>As a security engineer. I'm curious about your thoughts on the intersection of professional cybersecurity roles. And personal social media use. And specifically. Using platforms like TikTok, does that compromise the trustworthiness of security professionals?</p><p>---</p><p>I do hope you enjoyed this episode of the podcast.  Here's some helpful resources including any sites that were mentioned in this episode.</p><p>--</p><p>--</p><p>Find subscriber links on my site, add to your podcast player, or listen on the web players on my site:</p><p><a href="https://bytesizedsecurity.show/listen">Listen to Byte Sized Security</a> </p><p>--</p><p><strong>Support this Podcast with a Tip:</strong></p><p><a href="https://bytesizedsecurity.show/support">Support Byte Sized Security</a> </p><p>--</p><p>If you have questions for the show, feedback or topics you want covered.  Please send a short email to marc@bytesizedsecurity.show with the Subject line of "Byte-Sized Security" so I know it's about the podcast.</p><p>Connect with me on TikTok: <a href="https://www.tiktok.com/@bytesizedsecurity" rel="noopener noreferrer" target="_blank">https://www.tiktok.com/@bytesizedsecurity</a></p>]]></content:encoded><link><![CDATA[https://bytesizedsecurity.show/episode/ep24-can-cybersecurity-experts-safely-use-tiktok]]></link><guid isPermaLink="false">6a037c23-5bf8-4162-83af-120cc2d20e22</guid><itunes:image href="https://artwork.captivate.fm/6daab296-d019-4be9-bbf4-3e3566f5d395/UatAugnAE7j5mC_O7AskLuwU.png"/><pubDate>Mon, 11 Dec 2023 09:00:00 -0700</pubDate><enclosure url="https://pdcn.co/e/podcasts.captivate.fm/media/9eaf4b2c-e0b8-48d2-98eb-e9af09701131/can-cybersecurity-experts-safely-use-tiktok-converted.mp3" length="16939610" type="audio/mpeg"/><itunes:duration>17:39</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>24</itunes:episode><podcast:episode>24</podcast:episode><podcast:season>1</podcast:season><podcast:transcript url="https://transcripts.captivate.fm/transcript/0fcc26b3-a5c1-493c-b2c2-b538e8a2d038/transcript.json" type="application/json"/><podcast:transcript url="https://transcripts.captivate.fm/transcript/0fcc26b3-a5c1-493c-b2c2-b538e8a2d038/transcript.srt" type="application/srt" rel="captions"/><podcast:transcript url="https://transcripts.captivate.fm/transcript/0fcc26b3-a5c1-493c-b2c2-b538e8a2d038/index.html" type="text/html"/></item><item><title>Ep23: Updated Google Cybersecurity Professional Certificate</title><itunes:title>Ep23: Updated Google Cybersecurity Professional Certificate</itunes:title><description><![CDATA[<p><strong>Decoding Google Cybersecurity Certificate Program</strong></p><p>The speaker discusses the Google Cybersecurity Certificate Program and its benefits for both experienced and new cybersecurity enthusiasts. The speaker discusses how you can get the program for free through libraries that offer Coursera, like the California state public library. No matter if you're already in the field and looking for a refresher course or entirely new to cybersecurity, the speaker finds the program commendable. They add that while it won't guarantee you a job, it does provide a structured learning path and a certificate that you can mention on your resume.</p><p><strong>Timeline:</strong></p><p>00:00 Introduction to Google Cybersecurity Certificate Program</p><p>00:16 Who Should Consider the Program</p><p>00:51 Benefits of the Program</p><p>01:12 Comparing with Other Certifications</p><p>02:32 How to Access the Program for Free</p><p>03:11 Personal Experience with the Program</p><p>03:26 Benefits for Existing Certification Holders</p><p>05:31 Value of the Certificate for Job Seekers</p><p>07:02 Final Thoughts and Recommendations</p><p>---</p><p>I do hope you enjoyed this episode of the podcast.  Here's some helpful resources including any sites that were mentioned in this episode.</p><p>--</p><p>Sites Mentioned in this Episode</p><ul><li><a href="https://grow.google/certificates/cybersecurity/#?modal_active=none">Google Cybersecurity Certificate</a> - The Google Cybersecurity Certificate program on Coursera</li></ul><br/><p>--</p><p>Find subscriber links on my site, add to your podcast player, or listen on the web players on my site:</p><p><a href="https://bytesizedsecurity.show/listen">Listen to Byte Sized Security</a> </p><p>--</p><p><strong>Support this Podcast with a Tip:</strong></p><p><a href="https://bytesizedsecurity.show/support">Support Byte Sized Security</a> </p><p>--</p><p>If you have questions for the show, feedback or topics you want covered.  Please send a short email to marc@bytesizedsecurity.show with the Subject line of "Byte-Sized Security" so I know it's about the podcast.</p><p>Connect with me on TikTok: <a href="https://www.tiktok.com/@bytesizedsecurity" rel="noopener noreferrer" target="_blank">https://www.tiktok.com/@bytesizedsecurity</a></p><p>Mentioned in this episode:</p><p><a href="https://bytesizedsecurity.show/youtube">YouTube Byte-Sized Security Channel</a></p>]]></description><content:encoded><![CDATA[<p><strong>Decoding Google Cybersecurity Certificate Program</strong></p><p>The speaker discusses the Google Cybersecurity Certificate Program and its benefits for both experienced and new cybersecurity enthusiasts. The speaker discusses how you can get the program for free through libraries that offer Coursera, like the California state public library. No matter if you're already in the field and looking for a refresher course or entirely new to cybersecurity, the speaker finds the program commendable. They add that while it won't guarantee you a job, it does provide a structured learning path and a certificate that you can mention on your resume.</p><p><strong>Timeline:</strong></p><p>00:00 Introduction to Google Cybersecurity Certificate Program</p><p>00:16 Who Should Consider the Program</p><p>00:51 Benefits of the Program</p><p>01:12 Comparing with Other Certifications</p><p>02:32 How to Access the Program for Free</p><p>03:11 Personal Experience with the Program</p><p>03:26 Benefits for Existing Certification Holders</p><p>05:31 Value of the Certificate for Job Seekers</p><p>07:02 Final Thoughts and Recommendations</p><p>---</p><p>I do hope you enjoyed this episode of the podcast.  Here's some helpful resources including any sites that were mentioned in this episode.</p><p>--</p><p>Sites Mentioned in this Episode</p><ul><li><a href="https://grow.google/certificates/cybersecurity/#?modal_active=none">Google Cybersecurity Certificate</a> - The Google Cybersecurity Certificate program on Coursera</li></ul><br/><p>--</p><p>Find subscriber links on my site, add to your podcast player, or listen on the web players on my site:</p><p><a href="https://bytesizedsecurity.show/listen">Listen to Byte Sized Security</a> </p><p>--</p><p><strong>Support this Podcast with a Tip:</strong></p><p><a href="https://bytesizedsecurity.show/support">Support Byte Sized Security</a> </p><p>--</p><p>If you have questions for the show, feedback or topics you want covered.  Please send a short email to marc@bytesizedsecurity.show with the Subject line of "Byte-Sized Security" so I know it's about the podcast.</p><p>Connect with me on TikTok: <a href="https://www.tiktok.com/@bytesizedsecurity" rel="noopener noreferrer" target="_blank">https://www.tiktok.com/@bytesizedsecurity</a></p><p>Mentioned in this episode:</p><p><a href="https://bytesizedsecurity.show/youtube">YouTube Byte-Sized Security Channel</a></p>]]></content:encoded><link><![CDATA[https://bytesizedsecurity.show/episode/ep23-updated-google-cybersecurity-professional-certificate]]></link><guid isPermaLink="false">4abc7206-79f9-462f-9d96-6d61af717524</guid><itunes:image href="https://artwork.captivate.fm/6daab296-d019-4be9-bbf4-3e3566f5d395/UatAugnAE7j5mC_O7AskLuwU.png"/><pubDate>Sun, 19 Nov 2023 09:00:00 -0700</pubDate><enclosure url="https://pdcn.co/e/podcasts.captivate.fm/media/1be65fb2-f58e-45cd-a871-a07fb18d5ed7/updated-google-cybersecurity-professional-certificate-converted.mp3" length="10190404" type="audio/mpeg"/><itunes:duration>10:37</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>23</itunes:episode><podcast:episode>23</podcast:episode><podcast:season>1</podcast:season><podcast:transcript url="https://transcripts.captivate.fm/transcript/be89cfc3-857a-4a0a-ac9a-b61727aff213/transcript.json" type="application/json"/><podcast:transcript url="https://transcripts.captivate.fm/transcript/be89cfc3-857a-4a0a-ac9a-b61727aff213/transcript.srt" type="application/srt" rel="captions"/><podcast:transcript url="https://transcripts.captivate.fm/transcript/be89cfc3-857a-4a0a-ac9a-b61727aff213/index.html" type="text/html"/></item><item><title>Promo: Byte Sized Security YouTube Channel</title><itunes:title>Promo: Byte Sized Security YouTube Channel</itunes:title><description><![CDATA[<p><strong>Explore Byte-Sized Security on YouTube</strong></p><p><a href="https://bytesizedsecurity.show/youtube" rel="noopener noreferrer" target="_blank">Byte-Sized Security on YouTube</a></p><p>The Byte-Sized Security YouTube channel is a resource for everyone interested in cybersecurity. The channel features a mix of insights, expert talks and in-depth discussions that elaborate on the concepts of cybersecurity. Viewers can subscribe to join a community of both professional and budding cybersecurity enthusiasts, staying updated in the digital world.</p><p>00:00 Introduction to Byte-Sized Security</p><p>00:04 Invitation to the Byte-Sized Security Podcast</p><p>00:10 Discover the Byte-Sized Security YouTube Channel</p><p>00:13 What to Expect from Our YouTube Channel</p><p>00:26 How to Access Our YouTube Channel</p><p>00:35 Join Our Cybersecurity Community</p><p>00:40 Stay Ahead in the Digital World</p><p>---</p><p>I do hope you enjoyed this episode of the podcast.  Here's some helpful resources including any sites that were mentioned in this episode.</p><p>--</p><p>--</p><p>Find subscriber links on my site, add to your podcast player, or listen on the web players on my site:</p><p><a href="https://bytesizedsecurity.show/listen">Listen to Byte Sized Security</a> </p><p>--</p><p><strong>Support this Podcast with a Tip:</strong></p><p><a href="https://bytesizedsecurity.show/support">Support Byte Sized Security</a> </p><p>--</p><p>If you have questions for the show, feedback or topics you want covered.  Please send a short email to marc@bytesizedsecurity.show with the Subject line of "Byte-Sized Security" so I know it's about the podcast.</p><p>Connect with me on TikTok: <a href="https://www.tiktok.com/@bytesizedsecurity" rel="noopener noreferrer" target="_blank">https://www.tiktok.com/@bytesizedsecurity</a></p>]]></description><content:encoded><![CDATA[<p><strong>Explore Byte-Sized Security on YouTube</strong></p><p><a href="https://bytesizedsecurity.show/youtube" rel="noopener noreferrer" target="_blank">Byte-Sized Security on YouTube</a></p><p>The Byte-Sized Security YouTube channel is a resource for everyone interested in cybersecurity. The channel features a mix of insights, expert talks and in-depth discussions that elaborate on the concepts of cybersecurity. Viewers can subscribe to join a community of both professional and budding cybersecurity enthusiasts, staying updated in the digital world.</p><p>00:00 Introduction to Byte-Sized Security</p><p>00:04 Invitation to the Byte-Sized Security Podcast</p><p>00:10 Discover the Byte-Sized Security YouTube Channel</p><p>00:13 What to Expect from Our YouTube Channel</p><p>00:26 How to Access Our YouTube Channel</p><p>00:35 Join Our Cybersecurity Community</p><p>00:40 Stay Ahead in the Digital World</p><p>---</p><p>I do hope you enjoyed this episode of the podcast.  Here's some helpful resources including any sites that were mentioned in this episode.</p><p>--</p><p>--</p><p>Find subscriber links on my site, add to your podcast player, or listen on the web players on my site:</p><p><a href="https://bytesizedsecurity.show/listen">Listen to Byte Sized Security</a> </p><p>--</p><p><strong>Support this Podcast with a Tip:</strong></p><p><a href="https://bytesizedsecurity.show/support">Support Byte Sized Security</a> </p><p>--</p><p>If you have questions for the show, feedback or topics you want covered.  Please send a short email to marc@bytesizedsecurity.show with the Subject line of "Byte-Sized Security" so I know it's about the podcast.</p><p>Connect with me on TikTok: <a href="https://www.tiktok.com/@bytesizedsecurity" rel="noopener noreferrer" target="_blank">https://www.tiktok.com/@bytesizedsecurity</a></p>]]></content:encoded><link><![CDATA[https://bytesizedsecurity.show/episode/promo-byte-sized-security-youtube-channel]]></link><guid isPermaLink="false">5a69f419-0fac-474f-9dcd-bb256dc66b6d</guid><itunes:image href="https://artwork.captivate.fm/6daab296-d019-4be9-bbf4-3e3566f5d395/UatAugnAE7j5mC_O7AskLuwU.png"/><pubDate>Thu, 16 Nov 2023 09:00:00 -0700</pubDate><enclosure url="https://pdcn.co/e/podcasts.captivate.fm/media/fc573f59-4dce-4aaa-ac82-d0890066d5d1/byte-sized-security-converted.mp3" length="874201" type="audio/mpeg"/><itunes:duration>00:44</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>22</itunes:episode><podcast:episode>22</podcast:episode><podcast:season>1</podcast:season><podcast:transcript url="https://transcripts.captivate.fm/transcript/8c550125-102a-4864-8ffe-51f8e55791f3/transcript.json" type="application/json"/><podcast:transcript url="https://transcripts.captivate.fm/transcript/8c550125-102a-4864-8ffe-51f8e55791f3/transcript.srt" type="application/srt" rel="captions"/><podcast:transcript url="https://transcripts.captivate.fm/transcript/8c550125-102a-4864-8ffe-51f8e55791f3/index.html" type="text/html"/></item><item><title>Ep21: How to Get Coursera Courses for Free</title><itunes:title>Ep21: How to Get Coursera Courses for Free</itunes:title><description><![CDATA[<p>I'll explain how to access Coursera courses for free with a public library card. This is possible for people living in specific states and cities like California, New York, Tennessee, Missouri, and Chicago. I'll share personal experience of using library resources to take an 8-module Google cybersecurity professional certificate course from Coursera for free, from which I earned CPE credits towards my CISSP renewal. I'll also mention the added bonuses of a library card, including access to Udemy, free WiFi hotspots, newspapers like New York Times, and more. I encourage listeners to explore this free route to improve their cybersecurity knowledge, saying a sign of curiosity and inquisitiveness, two qualities important to succeeding in cybersecurity.</p><p>---</p><p>I do hope you enjoyed this episode of the podcast.  Here's some helpful resources including any sites that were mentioned in this episode.</p><p>--</p><p>Sites Mentioned in this Episode</p><ul><li><a href="https://blog.coursera.org/coursera-partners-with-the-california-state-library-to-launch-free-statewide-job-training-program/">Coursera partners with the California State Library to launch free statewide job training program  - Coursera Blog</a> - Check your local library's eLearning or Digital areas.  Ask them if they can join if it's not listed. Coursera is free for the California State Library partner libraries including New York, Tennessee, Missouri, and the city of Chicago. </li></ul><br/><p>--</p><p>Find subscriber links on my site, add to your podcast player, or listen on the web players on my site:</p><p><a href="https://bytesizedsecurity.show/listen">Listen to Byte Sized Security</a> </p><p>--</p><p><strong>Support this Podcast with a Tip:</strong></p><p><a href="https://bytesizedsecurity.show/support">Support Byte Sized Security</a> </p><p>--</p><p>If you have questions for the show, feedback or topics you want covered.  Please send a short email to marc@bytesizedsecurity.show with the Subject line of "Byte-Sized Security" so I know it's about the podcast.</p><p>Connect with me on TikTok: <a href="https://www.tiktok.com/@bytesizedsecurity" rel="noopener noreferrer" target="_blank">https://www.tiktok.com/@bytesizedsecurity</a></p>]]></description><content:encoded><![CDATA[<p>I'll explain how to access Coursera courses for free with a public library card. This is possible for people living in specific states and cities like California, New York, Tennessee, Missouri, and Chicago. I'll share personal experience of using library resources to take an 8-module Google cybersecurity professional certificate course from Coursera for free, from which I earned CPE credits towards my CISSP renewal. I'll also mention the added bonuses of a library card, including access to Udemy, free WiFi hotspots, newspapers like New York Times, and more. I encourage listeners to explore this free route to improve their cybersecurity knowledge, saying a sign of curiosity and inquisitiveness, two qualities important to succeeding in cybersecurity.</p><p>---</p><p>I do hope you enjoyed this episode of the podcast.  Here's some helpful resources including any sites that were mentioned in this episode.</p><p>--</p><p>Sites Mentioned in this Episode</p><ul><li><a href="https://blog.coursera.org/coursera-partners-with-the-california-state-library-to-launch-free-statewide-job-training-program/">Coursera partners with the California State Library to launch free statewide job training program  - Coursera Blog</a> - Check your local library's eLearning or Digital areas.  Ask them if they can join if it's not listed. Coursera is free for the California State Library partner libraries including New York, Tennessee, Missouri, and the city of Chicago. </li></ul><br/><p>--</p><p>Find subscriber links on my site, add to your podcast player, or listen on the web players on my site:</p><p><a href="https://bytesizedsecurity.show/listen">Listen to Byte Sized Security</a> </p><p>--</p><p><strong>Support this Podcast with a Tip:</strong></p><p><a href="https://bytesizedsecurity.show/support">Support Byte Sized Security</a> </p><p>--</p><p>If you have questions for the show, feedback or topics you want covered.  Please send a short email to marc@bytesizedsecurity.show with the Subject line of "Byte-Sized Security" so I know it's about the podcast.</p><p>Connect with me on TikTok: <a href="https://www.tiktok.com/@bytesizedsecurity" rel="noopener noreferrer" target="_blank">https://www.tiktok.com/@bytesizedsecurity</a></p>]]></content:encoded><link><![CDATA[https://bytesizedsecurity.show/episode/ep21-how-to-get-coursera-courses-for-free]]></link><guid isPermaLink="false">d4b11da6-f6d8-4d2e-913c-823424e070ae</guid><itunes:image href="https://artwork.captivate.fm/6daab296-d019-4be9-bbf4-3e3566f5d395/UatAugnAE7j5mC_O7AskLuwU.png"/><pubDate>Wed, 08 Nov 2023 09:00:00 -0700</pubDate><enclosure url="https://pdcn.co/e/podcasts.captivate.fm/media/d23c83d8-e586-44e4-8f22-5815ae96d65a/how-to-get-coursera-courses-for-free-converted.mp3" length="4928299" type="audio/mpeg"/><itunes:duration>05:08</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>21</itunes:episode><podcast:episode>21</podcast:episode><podcast:season>1</podcast:season><podcast:transcript url="https://transcripts.captivate.fm/transcript/b5068547-49a5-4f86-b507-e4d0a442a058/transcript.json" type="application/json"/><podcast:transcript url="https://transcripts.captivate.fm/transcript/b5068547-49a5-4f86-b507-e4d0a442a058/transcript.srt" type="application/srt" rel="captions"/><podcast:transcript url="https://transcripts.captivate.fm/transcript/b5068547-49a5-4f86-b507-e4d0a442a058/index.html" type="text/html"/></item><item><title>Ep20: LinkedIn Learning Free with a Library Card... And a Whole Lot More!</title><itunes:title>Ep20: LinkedIn Learning Free with a Library Card... And a Whole Lot More!</itunes:title><description><![CDATA[<p><strong>Unlock Free Learning Resources with your Public Library Card</strong></p><p>In this podcast, I will tell you how to access premium online learning resources like LinkedIn Learning, Udemy, and Coursera for free, simply by utilizing your public library card. Most people don't know that library cards can open doors to various resources, varying from library to library. However, most libraries in the U.S provide free access to LinkedIn's premium content. Plus you can gain access to Libby, an app allowing users to borrow a selection of audiobooks and ebooks. I want to stress the importance of taking advantage of available resources paid through taxes rather than spending additional money on courses and online platforms.</p><p>00:00 Introduction to Free Access to LinkedIn Learning</p><p>00:37 The Secret: Public Library Card</p><p>00:57 How to Use Your Library Card for Online Learning</p><p>01:33 Accessing LinkedIn Premium Content with Library Card</p><p>02:12 Why Collect Multiple Library Cards</p><p>02:27 Examples of Different Libraries and Their Offers</p><p>02:49 Accessing Coursera with Library Card</p><p>03:53 Additional Benefits of Public Library Card</p><p>00:40 Steps to Accessing Online Learning Resources</p><p>05:48 The Value of Public Library Resources</p><p>07:23 Conclusion and Call to Action</p><p>08:08 Accessing Mobile Hotspots with Library Card</p><p>---</p><p>I do hope you enjoyed this episode of the podcast.  Here's some helpful resources including any sites that were mentioned in this episode.</p><p>--</p><p>--</p><p>Find subscriber links on my site, add to your podcast player, or listen on the web players on my site:</p><p><a href="https://bytesizedsecurity.show/listen">Listen to Byte Sized Security</a> </p><p>--</p><p><strong>Support this Podcast with a Tip:</strong></p><p><a href="https://bytesizedsecurity.show/support">Support Byte Sized Security</a> </p><p>--</p><p>If you have questions for the show, feedback or topics you want covered.  Please send a short email to marc@bytesizedsecurity.show with the Subject line of "Byte-Sized Security" so I know it's about the podcast.</p><p>Connect with me on TikTok: <a href="https://www.tiktok.com/@bytesizedsecurity" rel="noopener noreferrer" target="_blank">https://www.tiktok.com/@bytesizedsecurity</a></p><p>Mentioned in this episode:</p><p><a href="https://bytesizedsecurity.show/youtube">YouTube Byte-Sized Security Channel</a></p>]]></description><content:encoded><![CDATA[<p><strong>Unlock Free Learning Resources with your Public Library Card</strong></p><p>In this podcast, I will tell you how to access premium online learning resources like LinkedIn Learning, Udemy, and Coursera for free, simply by utilizing your public library card. Most people don't know that library cards can open doors to various resources, varying from library to library. However, most libraries in the U.S provide free access to LinkedIn's premium content. Plus you can gain access to Libby, an app allowing users to borrow a selection of audiobooks and ebooks. I want to stress the importance of taking advantage of available resources paid through taxes rather than spending additional money on courses and online platforms.</p><p>00:00 Introduction to Free Access to LinkedIn Learning</p><p>00:37 The Secret: Public Library Card</p><p>00:57 How to Use Your Library Card for Online Learning</p><p>01:33 Accessing LinkedIn Premium Content with Library Card</p><p>02:12 Why Collect Multiple Library Cards</p><p>02:27 Examples of Different Libraries and Their Offers</p><p>02:49 Accessing Coursera with Library Card</p><p>03:53 Additional Benefits of Public Library Card</p><p>00:40 Steps to Accessing Online Learning Resources</p><p>05:48 The Value of Public Library Resources</p><p>07:23 Conclusion and Call to Action</p><p>08:08 Accessing Mobile Hotspots with Library Card</p><p>---</p><p>I do hope you enjoyed this episode of the podcast.  Here's some helpful resources including any sites that were mentioned in this episode.</p><p>--</p><p>--</p><p>Find subscriber links on my site, add to your podcast player, or listen on the web players on my site:</p><p><a href="https://bytesizedsecurity.show/listen">Listen to Byte Sized Security</a> </p><p>--</p><p><strong>Support this Podcast with a Tip:</strong></p><p><a href="https://bytesizedsecurity.show/support">Support Byte Sized Security</a> </p><p>--</p><p>If you have questions for the show, feedback or topics you want covered.  Please send a short email to marc@bytesizedsecurity.show with the Subject line of "Byte-Sized Security" so I know it's about the podcast.</p><p>Connect with me on TikTok: <a href="https://www.tiktok.com/@bytesizedsecurity" rel="noopener noreferrer" target="_blank">https://www.tiktok.com/@bytesizedsecurity</a></p><p>Mentioned in this episode:</p><p><a href="https://bytesizedsecurity.show/youtube">YouTube Byte-Sized Security Channel</a></p>]]></content:encoded><link><![CDATA[https://bytesizedsecurity.show/episode/ep19-linkedin-learning-free-with-a-library-card-and-a-whole-lot-more]]></link><guid isPermaLink="false">74f5e829-4b4d-4789-98a6-1f573fe93d90</guid><itunes:image href="https://artwork.captivate.fm/6daab296-d019-4be9-bbf4-3e3566f5d395/UatAugnAE7j5mC_O7AskLuwU.png"/><pubDate>Mon, 06 Nov 2023 09:00:00 -0700</pubDate><enclosure url="https://pdcn.co/e/podcasts.captivate.fm/media/fd624e02-d58d-400b-9077-dca9d481e7b8/linkedin-learning-free-with-a-library-card-and-a-whole-lot-more.mp3" length="11911978" type="audio/mpeg"/><itunes:duration>12:24</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>20</itunes:episode><podcast:episode>20</podcast:episode><podcast:season>1</podcast:season><podcast:transcript url="https://transcripts.captivate.fm/transcript/e0011df7-bfc0-4f7c-a3c4-8f6f4da814b6/transcript.json" type="application/json"/><podcast:transcript url="https://transcripts.captivate.fm/transcript/e0011df7-bfc0-4f7c-a3c4-8f6f4da814b6/transcript.srt" type="application/srt" rel="captions"/><podcast:transcript url="https://transcripts.captivate.fm/transcript/e0011df7-bfc0-4f7c-a3c4-8f6f4da814b6/index.html" type="text/html"/></item><item><title>Ep19: Is a Google Cybersecurity Professional Certificate Worth it?</title><itunes:title>Ep19: Is a Google Cybersecurity Professional Certificate Worth it?</itunes:title><description><![CDATA[<p>The script is for an episode titled "Ep19: Is a Google Cybersecurity Professional Certificate Worth it?" where the speaker, Marc, shares his perspectives on the value of attaining a Google Cyber Security Certificate. He discusses how Google's certificate differs from other recognized credentials in the industry like the CompTIA Security Plus Certificate and CISSP. He also provides suggestions on study resources and paths to these certifications such as studying from books, using online guides, and accessing free courses through LinkedIn Learning via public libraries. The major takeaway is that while education is valuable, he doesn't consider Google's certificate to be universally acknowledged in the industry as compared with CompTIA or CISSP, although if someone wanted to get it in addition to these, that would not be a problem.</p><p>---</p><p>I do hope you enjoyed this episode of the podcast.  Here's some helpful resources including any sites that were mentioned in this episode.</p><p>--</p><p>--</p><p>Find subscriber links on my site, add to your podcast player, or listen on the web players on my site:</p><p><a href="https://bytesizedsecurity.show/listen">Listen to Byte Sized Security</a> </p><p>--</p><p><strong>Support this Podcast with a Tip:</strong></p><p><a href="https://bytesizedsecurity.show/support">Support Byte Sized Security</a> </p>]]></description><content:encoded><![CDATA[<p>The script is for an episode titled "Ep19: Is a Google Cybersecurity Professional Certificate Worth it?" where the speaker, Marc, shares his perspectives on the value of attaining a Google Cyber Security Certificate. He discusses how Google's certificate differs from other recognized credentials in the industry like the CompTIA Security Plus Certificate and CISSP. He also provides suggestions on study resources and paths to these certifications such as studying from books, using online guides, and accessing free courses through LinkedIn Learning via public libraries. The major takeaway is that while education is valuable, he doesn't consider Google's certificate to be universally acknowledged in the industry as compared with CompTIA or CISSP, although if someone wanted to get it in addition to these, that would not be a problem.</p><p>---</p><p>I do hope you enjoyed this episode of the podcast.  Here's some helpful resources including any sites that were mentioned in this episode.</p><p>--</p><p>--</p><p>Find subscriber links on my site, add to your podcast player, or listen on the web players on my site:</p><p><a href="https://bytesizedsecurity.show/listen">Listen to Byte Sized Security</a> </p><p>--</p><p><strong>Support this Podcast with a Tip:</strong></p><p><a href="https://bytesizedsecurity.show/support">Support Byte Sized Security</a> </p>]]></content:encoded><link><![CDATA[https://bytesizedsecurity.show/episode/ep19-is-a-google-cybersecurity-professional-certificate-worth-it]]></link><guid isPermaLink="false">b7afa200-9148-4924-a457-ea5349f4773b</guid><itunes:image href="https://artwork.captivate.fm/6daab296-d019-4be9-bbf4-3e3566f5d395/UatAugnAE7j5mC_O7AskLuwU.png"/><pubDate>Mon, 30 Oct 2023 09:00:00 -0700</pubDate><enclosure url="https://pdcn.co/e/podcasts.captivate.fm/media/c25a3269-93f9-4594-b10f-820acc4d04d2/is-a-google-cybersecurity-professional-certificate-worth-it-con.mp3" length="11813760" type="audio/mpeg"/><itunes:duration>09:51</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>19</itunes:episode><podcast:episode>19</podcast:episode><podcast:season>1</podcast:season><podcast:transcript url="https://transcripts.captivate.fm/transcript/73d636fb-73df-427f-bf5c-43956666acfb/transcript.json" type="application/json"/><podcast:transcript url="https://transcripts.captivate.fm/transcript/73d636fb-73df-427f-bf5c-43956666acfb/transcript.srt" type="application/srt" rel="captions"/><podcast:transcript url="https://transcripts.captivate.fm/transcript/73d636fb-73df-427f-bf5c-43956666acfb/index.html" type="text/html"/></item><item><title>Ep18: The Illusion of Expertise: Are YouTube&apos;s Security Gurus Really in the Trenches?</title><itunes:title>Ep18: The Illusion of Expertise: Are YouTube&apos;s Security Gurus Really in the Trenches?</itunes:title><description><![CDATA[<h2>Show Notes for Byte-Sized Security Episode: "The Illusion of Expertise: Why YouTube's Security Gurus Aren't in the Trenches"</h2><p>In this eye-opening episode, host Marc David takes a critical look at the proliferation of self-proclaimed cybersecurity 'experts' on YouTube. We delve into the mechanics of content creation, the business model behind it, and the glaring gap of practical experience. Ready for a reality check? Tune in!</p><h3>📌 Timestamps</h3><ul><li>00:00 - Introduction: The Fluff &amp; Stuff of Cybersecurity YouTube Videos</li><li>01:46 - Core Argument 1: The Content Mill</li><li>03:25 - Core Argument 2: The Business of YouTube</li><li>05:28 - Core Argument 3: Missing Practical Experience</li><li>07:15 - Counter-Arguments: The Other Side of the Coin</li><li>08:58 - Conclusion: A Byte-Sized Reality Check</li><li>10:15 - Call to Action &amp; Community Poll: How Do You Vet YouTube Cybersecurity Experts?</li></ul><br/><h3>🎯 Key Takeaways</h3><ol><li>Expertise ≠ Popularity: A large subscriber count doesn't necessarily make someone an authority in cybersecurity.</li><li>Content Mills: The alarming rate at which some YouTubers churn out content may impact the quality and depth of their advice.</li><li>Business Over Authenticity: Learn why monetization models can clash with the ethical considerations of cybersecurity.</li><li>The Importance of Practical Experience: There's no substitute for hands-on, in-the-field know-how.</li></ol><br/><h3>🗳️ Community Poll</h3><p>Don't forget to participate in our YouTube community poll: "How do you vet the credibility of a cybersecurity expert on YouTube?" <a href="https://bytesizedsecurity.show/youtube" rel="noopener noreferrer" target="_blank">Click here to vote!</a></p><p>---</p><p>I do hope you enjoyed this episode of the podcast.  Here's some helpful resources including any sites that were mentioned in this episode.</p><p>--</p><p>--</p><p>Find subscriber links on my site, add to your podcast player, or listen on the web players on my site:</p><p><a href="https://bytesizedsecurity.show/listen">Listen to Byte Sized Security</a> </p><p>--</p><p><strong>Support this Podcast with a Tip:</strong></p><p><a href="https://bytesizedsecurity.show/support">Support Byte Sized Security</a> </p>]]></description><content:encoded><![CDATA[<h2>Show Notes for Byte-Sized Security Episode: "The Illusion of Expertise: Why YouTube's Security Gurus Aren't in the Trenches"</h2><p>In this eye-opening episode, host Marc David takes a critical look at the proliferation of self-proclaimed cybersecurity 'experts' on YouTube. We delve into the mechanics of content creation, the business model behind it, and the glaring gap of practical experience. Ready for a reality check? Tune in!</p><h3>📌 Timestamps</h3><ul><li>00:00 - Introduction: The Fluff &amp; Stuff of Cybersecurity YouTube Videos</li><li>01:46 - Core Argument 1: The Content Mill</li><li>03:25 - Core Argument 2: The Business of YouTube</li><li>05:28 - Core Argument 3: Missing Practical Experience</li><li>07:15 - Counter-Arguments: The Other Side of the Coin</li><li>08:58 - Conclusion: A Byte-Sized Reality Check</li><li>10:15 - Call to Action &amp; Community Poll: How Do You Vet YouTube Cybersecurity Experts?</li></ul><br/><h3>🎯 Key Takeaways</h3><ol><li>Expertise ≠ Popularity: A large subscriber count doesn't necessarily make someone an authority in cybersecurity.</li><li>Content Mills: The alarming rate at which some YouTubers churn out content may impact the quality and depth of their advice.</li><li>Business Over Authenticity: Learn why monetization models can clash with the ethical considerations of cybersecurity.</li><li>The Importance of Practical Experience: There's no substitute for hands-on, in-the-field know-how.</li></ol><br/><h3>🗳️ Community Poll</h3><p>Don't forget to participate in our YouTube community poll: "How do you vet the credibility of a cybersecurity expert on YouTube?" <a href="https://bytesizedsecurity.show/youtube" rel="noopener noreferrer" target="_blank">Click here to vote!</a></p><p>---</p><p>I do hope you enjoyed this episode of the podcast.  Here's some helpful resources including any sites that were mentioned in this episode.</p><p>--</p><p>--</p><p>Find subscriber links on my site, add to your podcast player, or listen on the web players on my site:</p><p><a href="https://bytesizedsecurity.show/listen">Listen to Byte Sized Security</a> </p><p>--</p><p><strong>Support this Podcast with a Tip:</strong></p><p><a href="https://bytesizedsecurity.show/support">Support Byte Sized Security</a> </p>]]></content:encoded><link><![CDATA[https://bytesizedsecurity.show/episode/ep18-the-illusion-of-expertise-are-youtubes-security-gurus-really-in-the-trenches]]></link><guid isPermaLink="false">edd00189-19f6-4ed2-8889-58a1829a27e8</guid><itunes:image href="https://artwork.captivate.fm/6daab296-d019-4be9-bbf4-3e3566f5d395/UatAugnAE7j5mC_O7AskLuwU.png"/><pubDate>Thu, 26 Oct 2023 09:00:00 -0700</pubDate><enclosure url="https://pdcn.co/e/podcasts.captivate.fm/media/6e433521-8805-4623-88b4-4ab34c4a91a7/Ep18-The-Illusion-of-Expertise-Are-YouTube-s-Security-Gurus-Rea.mp3" length="17806475" type="audio/mpeg"/><itunes:duration>12:22</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>18</itunes:episode><podcast:episode>18</podcast:episode><podcast:season>1</podcast:season><podcast:transcript url="https://transcripts.captivate.fm/transcript/1830182e-ff54-48ea-86bc-98a3cdfff3ce/transcript.json" type="application/json"/><podcast:transcript url="https://transcripts.captivate.fm/transcript/1830182e-ff54-48ea-86bc-98a3cdfff3ce/transcript.srt" type="application/srt" rel="captions"/><podcast:transcript url="https://transcripts.captivate.fm/transcript/1830182e-ff54-48ea-86bc-98a3cdfff3ce/index.html" type="text/html"/></item><item><title>Ep17: Exploring the Impact of AI on Cybersecurity: Friend or Foe?</title><itunes:title>Ep17: Exploring the Impact of AI on Cybersecurity: Friend or Foe?</itunes:title><description><![CDATA[<p>In this thought-provoking video, we delve deep into the intriguing question: "Will AI Help or Hurt Cybersecurity?" Join us as we explore the profound impact of Artificial Intelligence (AI) on the realm of cybersecurity, deciphering whether it is a trusted friend or a potential adversary. As technology continues to evolve, AI is revolutionizing various industries, including cybersecurity. This captivating discussion sheds light on how AI is transforming the cybersecurity landscape, presenting both opportunities and challenges.</p><p>---</p><p>I do hope you enjoyed this episode of the podcast.  Here's some helpful resources including any sites that were mentioned in this episode.</p><p>--</p><p>Sites Mentioned in this Episode</p><ul><li><a href="https://terranovasecurity.com/ai-in-cyber-security/">AI in Cyber Security: Pros and Cons | Terranova Security</a></li><li><a href="https://cybermagazine.com/articles/humans-and-ai-the-double-edged-sword-of-cybersecurity">Humans and AI: The double-edged sword of cybersecurity | Cyber Magazine</a></li></ul><br/><p>--</p><p>Find subscriber links on my site, add to your podcast player, or listen on the web players on my site:</p><p><a href="https://bytesizedsecurity.show/listen">Listen to Byte Sized Security</a> </p><p>--</p><p><strong>Support this Podcast with a Tip:</strong></p><p><a href="https://bytesizedsecurity.show/support">Support Byte Sized Security</a> </p>]]></description><content:encoded><![CDATA[<p>In this thought-provoking video, we delve deep into the intriguing question: "Will AI Help or Hurt Cybersecurity?" Join us as we explore the profound impact of Artificial Intelligence (AI) on the realm of cybersecurity, deciphering whether it is a trusted friend or a potential adversary. As technology continues to evolve, AI is revolutionizing various industries, including cybersecurity. This captivating discussion sheds light on how AI is transforming the cybersecurity landscape, presenting both opportunities and challenges.</p><p>---</p><p>I do hope you enjoyed this episode of the podcast.  Here's some helpful resources including any sites that were mentioned in this episode.</p><p>--</p><p>Sites Mentioned in this Episode</p><ul><li><a href="https://terranovasecurity.com/ai-in-cyber-security/">AI in Cyber Security: Pros and Cons | Terranova Security</a></li><li><a href="https://cybermagazine.com/articles/humans-and-ai-the-double-edged-sword-of-cybersecurity">Humans and AI: The double-edged sword of cybersecurity | Cyber Magazine</a></li></ul><br/><p>--</p><p>Find subscriber links on my site, add to your podcast player, or listen on the web players on my site:</p><p><a href="https://bytesizedsecurity.show/listen">Listen to Byte Sized Security</a> </p><p>--</p><p><strong>Support this Podcast with a Tip:</strong></p><p><a href="https://bytesizedsecurity.show/support">Support Byte Sized Security</a> </p>]]></content:encoded><link><![CDATA[https://bytesizedsecurity.show/episode/ep17-exploring-the-impact-of-ai-on-cybersecurity-friend-or-foe]]></link><guid isPermaLink="false">cf9db416-3c8c-4f04-a1c7-0e27103384a6</guid><itunes:image href="https://artwork.captivate.fm/6daab296-d019-4be9-bbf4-3e3566f5d395/UatAugnAE7j5mC_O7AskLuwU.png"/><pubDate>Tue, 24 Oct 2023 09:00:00 -0700</pubDate><enclosure url="https://pdcn.co/e/podcasts.captivate.fm/media/22a8e63f-c169-4206-aa72-cda5a91581b0/exploring-the-impact-of-ai-on-cybersecurity-friend-or-foe-conve.mp3" length="4261237" type="audio/mpeg"/><itunes:duration>03:33</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>17</itunes:episode><podcast:episode>17</podcast:episode><podcast:season>1</podcast:season><podcast:transcript url="https://transcripts.captivate.fm/transcript/d2cb16c5-f845-4e29-a143-ae4416e0b758/transcript.json" type="application/json"/><podcast:transcript url="https://transcripts.captivate.fm/transcript/d2cb16c5-f845-4e29-a143-ae4416e0b758/transcript.srt" type="application/srt" rel="captions"/><podcast:transcript url="https://transcripts.captivate.fm/transcript/d2cb16c5-f845-4e29-a143-ae4416e0b758/index.html" type="text/html"/></item><item><title>Ep16: Securing Your Video Calls</title><itunes:title>Ep16: Securing Your Video Calls</itunes:title><description><![CDATA[<p>---</p><p>I do hope you enjoyed this episode of the podcast.  Here's some helpful resources including any sites that were mentioned in this episode.</p><p>--</p><p>Sites Mentioned in this Episode</p><ul><li><a href="https://www.zoom.com/en/products/virtual-meetings/resources/securing-your-meetings">Securing Your Meetings</a></li></ul><br/><p>--</p><p>Find subscriber links on my site, add to your podcast player, or listen on the web players on my site:</p><p><a href="https://bytesizedsecurity.show/listen">Listen to Byte Sized Security</a> </p><p>--</p><p><strong>Support this Podcast with a Tip:</strong></p><p><a href="https://bytesizedsecurity.show/support">Support Byte Sized Security</a> </p>]]></description><content:encoded><![CDATA[<p>---</p><p>I do hope you enjoyed this episode of the podcast.  Here's some helpful resources including any sites that were mentioned in this episode.</p><p>--</p><p>Sites Mentioned in this Episode</p><ul><li><a href="https://www.zoom.com/en/products/virtual-meetings/resources/securing-your-meetings">Securing Your Meetings</a></li></ul><br/><p>--</p><p>Find subscriber links on my site, add to your podcast player, or listen on the web players on my site:</p><p><a href="https://bytesizedsecurity.show/listen">Listen to Byte Sized Security</a> </p><p>--</p><p><strong>Support this Podcast with a Tip:</strong></p><p><a href="https://bytesizedsecurity.show/support">Support Byte Sized Security</a> </p>]]></content:encoded><link><![CDATA[https://bytesizedsecurity.show/episode/ep16-securing-your-video-calls]]></link><guid isPermaLink="false">91bcff28-3d87-4375-99d5-70d7f57d0504</guid><itunes:image href="https://artwork.captivate.fm/6daab296-d019-4be9-bbf4-3e3566f5d395/UatAugnAE7j5mC_O7AskLuwU.png"/><pubDate>Mon, 23 Oct 2023 09:00:00 -0700</pubDate><enclosure url="https://pdcn.co/e/podcasts.captivate.fm/media/e78ae464-8af3-496b-ae3c-2ed22068ee4c/securing-your-video-calls-converted.mp3" length="9755833" type="audio/mpeg"/><itunes:duration>08:08</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>16</itunes:episode><podcast:episode>16</podcast:episode><podcast:season>1</podcast:season><podcast:transcript url="https://transcripts.captivate.fm/transcript/40cb1b76-3007-447a-932c-d5114a7598ef/transcript.json" type="application/json"/><podcast:transcript url="https://transcripts.captivate.fm/transcript/40cb1b76-3007-447a-932c-d5114a7598ef/transcript.srt" type="application/srt" rel="captions"/><podcast:transcript url="https://transcripts.captivate.fm/transcript/40cb1b76-3007-447a-932c-d5114a7598ef/index.html" type="text/html"/></item><item><title>Ep15: How to Get a Job in Cybersecurity with No Experience (Extended Version)</title><itunes:title>Ep15: How to Get a Job in Cybersecurity with No Experience (Extended Version)</itunes:title><description><![CDATA[<p>The show notes for this episode can be found in the previous shorter episode.  No need to over extended an already extended version.</p><p>---</p><p>I do hope you enjoyed this episode of the podcast.  Here's some helpful resources including any sites that were mentioned in this episode.</p><p>--</p><p>--</p><p>Find subscriber links on my site, add to your podcast player, or listen on the web players on my site:</p><p><a href="https://bytesizedsecurity.show/listen">Listen to Byte Sized Security</a> </p><p>--</p><p><strong>Support this Podcast with a Tip:</strong></p><p><a href="https://bytesizedsecurity.show/support">Support Byte Sized Security</a> </p><p>--</p><p>If you have questions for the show, feedback or topics you want covered.  Please send a short email to marc@bytesizedsecurity.show with the Subject line of "Byte-Sized Security" so I know it's about the podcast.</p><p>Connect with me on TikTok: <a href="https://www.tiktok.com/@bytesizedsecurity" rel="noopener noreferrer" target="_blank">https://www.tiktok.com/@bytesizedsecurity</a></p>]]></description><content:encoded><![CDATA[<p>The show notes for this episode can be found in the previous shorter episode.  No need to over extended an already extended version.</p><p>---</p><p>I do hope you enjoyed this episode of the podcast.  Here's some helpful resources including any sites that were mentioned in this episode.</p><p>--</p><p>--</p><p>Find subscriber links on my site, add to your podcast player, or listen on the web players on my site:</p><p><a href="https://bytesizedsecurity.show/listen">Listen to Byte Sized Security</a> </p><p>--</p><p><strong>Support this Podcast with a Tip:</strong></p><p><a href="https://bytesizedsecurity.show/support">Support Byte Sized Security</a> </p><p>--</p><p>If you have questions for the show, feedback or topics you want covered.  Please send a short email to marc@bytesizedsecurity.show with the Subject line of "Byte-Sized Security" so I know it's about the podcast.</p><p>Connect with me on TikTok: <a href="https://www.tiktok.com/@bytesizedsecurity" rel="noopener noreferrer" target="_blank">https://www.tiktok.com/@bytesizedsecurity</a></p>]]></content:encoded><link><![CDATA[https://bytesizedsecurity.show/episode/ep15-how-to-get-a-job-in-cybersecurity-with-no-experience-extended-version]]></link><guid isPermaLink="false">ec0ee318-3f87-4e26-8069-906a03e4d508</guid><itunes:image href="https://artwork.captivate.fm/6daab296-d019-4be9-bbf4-3e3566f5d395/UatAugnAE7j5mC_O7AskLuwU.png"/><pubDate>Sat, 14 Oct 2023 09:00:00 -0700</pubDate><enclosure url="https://pdcn.co/e/podcasts.captivate.fm/media/e010267b-3535-4d72-a44e-9848dbe6a54a/how-to-get-a-job-in-cybersecurity-with-no-experience-extended-v.mp3" length="32492813" type="audio/mpeg"/><itunes:duration>27:05</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>15</itunes:episode><podcast:episode>15</podcast:episode><podcast:season>1</podcast:season><podcast:transcript url="https://transcripts.captivate.fm/transcript/f7730825-a833-4e69-a30a-e9015f419673/transcript.json" type="application/json"/><podcast:transcript url="https://transcripts.captivate.fm/transcript/f7730825-a833-4e69-a30a-e9015f419673/transcript.srt" type="application/srt" rel="captions"/><podcast:transcript url="https://transcripts.captivate.fm/transcript/f7730825-a833-4e69-a30a-e9015f419673/index.html" type="text/html"/></item><item><title>Ep15: How I Got a Job in Cyber Security without Experience</title><itunes:title>Ep15: How I Got a Job in Cyber Security without Experience</itunes:title><description><![CDATA[<p>Getting a job in cybersecurity without direct experience can be challenging but not impossible. Here are some strategies to help you break into the field:</p><ol><li>Education and Certifications: Obtain foundational certifications like CompTIA Security+ and consider advancing to others like CISSP, CEH, or Cisco's CCNA Cyber Ops.</li><li>Network: Attend cybersecurity conferences, seminars, and meetups. Engage with professionals and peers in events like DEFCON or platforms like&nbsp;<a href="http://meetup.com/" rel="noopener noreferrer" target="_blank">Meetup.com</a>.</li><li>Internships and Entry-Level Positions: Pursue internships or related entry-level positions, such as IT support roles, to gain relevant industry experience.</li><li>Projects and Portfolio: Establish a home lab, explore security tools, or conduct ethical hacking on systems where you have permission. Document and showcase your endeavors.</li><li>Online Platforms: Engage in platforms like Hack The Box, TryHackMe, or participate in Capture The Flag (CTF) challenges to hone practical skills.</li><li>Blogs and Publications: Write about cybersecurity topics to demonstrate your knowledge and passion for the field.</li><li>Additional Training: Use platforms like Cybrary, Udemy, and Coursera to take courses in cybersecurity and further develop your skills.</li><li>Soft Skills: Highlight your analytical, problem-solving abilities, and other vital soft skills that are in demand in cybersecurity roles.</li><li>Transferrable Skills: Emphasize skills from previous roles or experiences that can be applied to a cybersecurity position.</li><li>Stay Updated: Regularly update your knowledge on the latest trends, news, and threats in the cybersecurity domain.</li><li>Further Education: Depending on your aspirations, consider pursuing degrees in cybersecurity or related disciplines.</li><li>Seek Mentorship: Connect with industry professionals who can provide guidance, insights, and potential introductions.</li><li>Volunteer Opportunities:</li></ol><br/><ul><li>Contribute to local non-profits, schools, or community centers by offering cybersecurity services or training.</li><li>Use the experience to develop practical skills and expand your professional network.</li><li>Highlight your dedication to the industry and community on your resume.</li></ul><br/><p><strong>Starting Your Own Business:</strong></p><ul><li>Demonstrate your entrepreneurial spirit, initiative, and proactive approach.</li><li>Gain hands-on experience by tackling real-world cybersecurity challenges for clients.</li><li>Develop and hone both technical and business skills, such as client relations and project management.</li><li>Establish credibility through success stories, case studies, or client testimonials.</li></ul><br/><p>With a combination of these strategies, you can build a robust resume and gain valuable experience, positioning yourself effectively for a career in cybersecurity, even if you're starting without direct experience in the field.</p><p>---</p><p>I do hope you enjoyed this episode of the podcast.  Here's some helpful resources including any sites that were mentioned in this episode.</p><p>--</p><p>--</p><p>Find subscriber links on my site, add to your podcast player, or listen on the web players on my site:</p><p><a href="https://bytesizedsecurity.show/listen">Listen to Byte Sized Security</a> </p><p>--</p><p><strong>Support this Podcast with a Tip:</strong></p><p><a href="https://bytesizedsecurity.show/support">Support Byte Sized Security</a> </p>]]></description><content:encoded><![CDATA[<p>Getting a job in cybersecurity without direct experience can be challenging but not impossible. Here are some strategies to help you break into the field:</p><ol><li>Education and Certifications: Obtain foundational certifications like CompTIA Security+ and consider advancing to others like CISSP, CEH, or Cisco's CCNA Cyber Ops.</li><li>Network: Attend cybersecurity conferences, seminars, and meetups. Engage with professionals and peers in events like DEFCON or platforms like&nbsp;<a href="http://meetup.com/" rel="noopener noreferrer" target="_blank">Meetup.com</a>.</li><li>Internships and Entry-Level Positions: Pursue internships or related entry-level positions, such as IT support roles, to gain relevant industry experience.</li><li>Projects and Portfolio: Establish a home lab, explore security tools, or conduct ethical hacking on systems where you have permission. Document and showcase your endeavors.</li><li>Online Platforms: Engage in platforms like Hack The Box, TryHackMe, or participate in Capture The Flag (CTF) challenges to hone practical skills.</li><li>Blogs and Publications: Write about cybersecurity topics to demonstrate your knowledge and passion for the field.</li><li>Additional Training: Use platforms like Cybrary, Udemy, and Coursera to take courses in cybersecurity and further develop your skills.</li><li>Soft Skills: Highlight your analytical, problem-solving abilities, and other vital soft skills that are in demand in cybersecurity roles.</li><li>Transferrable Skills: Emphasize skills from previous roles or experiences that can be applied to a cybersecurity position.</li><li>Stay Updated: Regularly update your knowledge on the latest trends, news, and threats in the cybersecurity domain.</li><li>Further Education: Depending on your aspirations, consider pursuing degrees in cybersecurity or related disciplines.</li><li>Seek Mentorship: Connect with industry professionals who can provide guidance, insights, and potential introductions.</li><li>Volunteer Opportunities:</li></ol><br/><ul><li>Contribute to local non-profits, schools, or community centers by offering cybersecurity services or training.</li><li>Use the experience to develop practical skills and expand your professional network.</li><li>Highlight your dedication to the industry and community on your resume.</li></ul><br/><p><strong>Starting Your Own Business:</strong></p><ul><li>Demonstrate your entrepreneurial spirit, initiative, and proactive approach.</li><li>Gain hands-on experience by tackling real-world cybersecurity challenges for clients.</li><li>Develop and hone both technical and business skills, such as client relations and project management.</li><li>Establish credibility through success stories, case studies, or client testimonials.</li></ul><br/><p>With a combination of these strategies, you can build a robust resume and gain valuable experience, positioning yourself effectively for a career in cybersecurity, even if you're starting without direct experience in the field.</p><p>---</p><p>I do hope you enjoyed this episode of the podcast.  Here's some helpful resources including any sites that were mentioned in this episode.</p><p>--</p><p>--</p><p>Find subscriber links on my site, add to your podcast player, or listen on the web players on my site:</p><p><a href="https://bytesizedsecurity.show/listen">Listen to Byte Sized Security</a> </p><p>--</p><p><strong>Support this Podcast with a Tip:</strong></p><p><a href="https://bytesizedsecurity.show/support">Support Byte Sized Security</a> </p>]]></content:encoded><link><![CDATA[https://bytesizedsecurity.show/episode/ep15-how-i-got-a-job-in-cyber-security-without-experience]]></link><guid isPermaLink="false">562db754-d9f1-4e2d-9676-e670985207d5</guid><itunes:image href="https://artwork.captivate.fm/6daab296-d019-4be9-bbf4-3e3566f5d395/UatAugnAE7j5mC_O7AskLuwU.png"/><pubDate>Tue, 10 Oct 2023 09:00:00 -0700</pubDate><enclosure url="https://pdcn.co/e/podcasts.captivate.fm/media/7c8a5a93-8472-4a54-a70e-e2411cceef13/How-to-Get-a-Job-in-Cyber-Security-without-Experience.mp3" length="3260550" type="audio/mpeg"/><itunes:duration>02:16</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>14</itunes:episode><podcast:episode>14</podcast:episode><podcast:season>1</podcast:season></item><item><title>Ep14: The Future of Authentication: Passkeys Explained</title><itunes:title>Ep14: The Future of Authentication: Passkeys Explained</itunes:title><description><![CDATA[<p><strong>Episode Overview:</strong></p><p>In this episode, I had the pleasure of sitting down with Dr. Lillian Hartfield to discuss the transformative approach to authentication: Passkeys. We delved deep into what passkeys are, how they differ from traditional passwords, and the reasons behind their rising popularity.</p><p><strong>Key Discussion Points:</strong></p><ol><li>Introduction to Passkeys</li><li>Dr. Hartfield provided a comprehensive overview of passkeys and their advantages over traditional passwords.</li><li>The Problem with Current Password Systems</li><li>We discussed the challenges users face with complex passwords and the security risks associated with password reuse.</li><li>Enhanced Security with Passkeys</li><li>Dr. Hartfield shed light on how passkeys leverage public-key cryptography to offer a more secure authentication method.</li><li>The Process of Creating and Using Passkeys</li><li>We walked through the user-friendly process of setting up and using passkeys for online authentication.</li><li>Device and Platform Support for Passkeys</li><li>Dr. Hartfield highlighted the widespread adoption of passkeys across various devices and platforms.</li><li>Password Managers and Passkeys</li><li>We touched upon the integration of passkeys in password managers, with a special mention of 1Password.</li><li>The Future of Passkeys</li><li>Dr. Hartfield shared her insights on the potential of passkeys to replace traditional passwords in the near future.</li></ol><br/><p><strong>Episode Highlights:</strong></p><ul><li>"Passkeys offer a more secure and user-friendly alternative to passwords." - Dr. Lillian Hartfield</li><li>"Password managers like 1Password are evolving to support passkeys, ensuring users have a centralized, secure location for authentication." - Dr. Lillian Hartfield</li></ul><br/><p>---</p><p>I do hope you enjoyed this episode of the podcast.  Here's some helpful resources including any sites that were mentioned in this episode.</p><p>--</p><p>Sites Mentioned in this Episode</p><ul><li><a href="https://www.tomsguide.com/news/what-are-passkeys">What are passkeys? Everything you need to know about the death of passwords</a></li></ul><br/><p>--</p><p>Find subscriber links on my site, add to your podcast player, or listen on the web players on my site:</p><p><a href="https://bytesizedsecurity.show/listen">Listen to Byte Sized Security</a> </p><p>--</p><p><strong>Support this Podcast with a Tip:</strong></p><p><a href="https://bytesizedsecurity.show/support">Support Byte Sized Security</a> </p>]]></description><content:encoded><![CDATA[<p><strong>Episode Overview:</strong></p><p>In this episode, I had the pleasure of sitting down with Dr. Lillian Hartfield to discuss the transformative approach to authentication: Passkeys. We delved deep into what passkeys are, how they differ from traditional passwords, and the reasons behind their rising popularity.</p><p><strong>Key Discussion Points:</strong></p><ol><li>Introduction to Passkeys</li><li>Dr. Hartfield provided a comprehensive overview of passkeys and their advantages over traditional passwords.</li><li>The Problem with Current Password Systems</li><li>We discussed the challenges users face with complex passwords and the security risks associated with password reuse.</li><li>Enhanced Security with Passkeys</li><li>Dr. Hartfield shed light on how passkeys leverage public-key cryptography to offer a more secure authentication method.</li><li>The Process of Creating and Using Passkeys</li><li>We walked through the user-friendly process of setting up and using passkeys for online authentication.</li><li>Device and Platform Support for Passkeys</li><li>Dr. Hartfield highlighted the widespread adoption of passkeys across various devices and platforms.</li><li>Password Managers and Passkeys</li><li>We touched upon the integration of passkeys in password managers, with a special mention of 1Password.</li><li>The Future of Passkeys</li><li>Dr. Hartfield shared her insights on the potential of passkeys to replace traditional passwords in the near future.</li></ol><br/><p><strong>Episode Highlights:</strong></p><ul><li>"Passkeys offer a more secure and user-friendly alternative to passwords." - Dr. Lillian Hartfield</li><li>"Password managers like 1Password are evolving to support passkeys, ensuring users have a centralized, secure location for authentication." - Dr. Lillian Hartfield</li></ul><br/><p>---</p><p>I do hope you enjoyed this episode of the podcast.  Here's some helpful resources including any sites that were mentioned in this episode.</p><p>--</p><p>Sites Mentioned in this Episode</p><ul><li><a href="https://www.tomsguide.com/news/what-are-passkeys">What are passkeys? Everything you need to know about the death of passwords</a></li></ul><br/><p>--</p><p>Find subscriber links on my site, add to your podcast player, or listen on the web players on my site:</p><p><a href="https://bytesizedsecurity.show/listen">Listen to Byte Sized Security</a> </p><p>--</p><p><strong>Support this Podcast with a Tip:</strong></p><p><a href="https://bytesizedsecurity.show/support">Support Byte Sized Security</a> </p>]]></content:encoded><link><![CDATA[https://bytesizedsecurity.show/episode/ep14-the-future-of-authentication-passkeys-explained]]></link><guid isPermaLink="false">ec05fdd0-9288-4068-b89c-acba2821dcd1</guid><itunes:image href="https://artwork.captivate.fm/6daab296-d019-4be9-bbf4-3e3566f5d395/UatAugnAE7j5mC_O7AskLuwU.png"/><pubDate>Sun, 01 Oct 2023 15:30:00 -0700</pubDate><enclosure url="https://pdcn.co/e/podcasts.captivate.fm/media/01174acb-e758-42b4-86bc-28ffe9425bd8/the-future-of-authentication-passkeys-explained-converted.mp3" length="6617482" type="audio/mpeg"/><itunes:duration>05:31</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>13</itunes:episode><podcast:episode>13</podcast:episode><podcast:season>1</podcast:season><podcast:transcript url="https://transcripts.captivate.fm/transcript/48a3c19c-234f-4d0c-905a-e7854b0b2ad3/transcript.json" type="application/json"/><podcast:transcript url="https://transcripts.captivate.fm/transcript/48a3c19c-234f-4d0c-905a-e7854b0b2ad3/transcript.srt" type="application/srt" rel="captions"/><podcast:transcript url="https://transcripts.captivate.fm/transcript/48a3c19c-234f-4d0c-905a-e7854b0b2ad3/index.html" type="text/html"/></item><item><title>Ep12: The MGM Resorts Breach: Lessons Learned and Future Implications (Extended)</title><itunes:title>Ep12: The MGM Resorts Breach: Lessons Learned and Future Implications (Extended)</itunes:title><description><![CDATA[<p><strong>Episode Overview:</strong></p><p>In this extended episode, host Marc David and cybersecurity expert Savvy Sharma delve deep into the recent cyberattack on MGM Resorts International. They discuss the tactics used by the attackers, the vulnerabilities exploited, and the cascading impact of the breach on MGM's operations.</p><p><strong>Key Discussion Points:</strong></p><p><strong>Introduction to the MGM Resorts Attack</strong></p><ul><li>Overview of the attack and its significance in the cybersecurity landscape.</li></ul><br/><p><strong>The Attackers and Their Tactics</strong></p><ul><li>The role of Scattered Spider and their use of social engineering.</li><li>The exploitation of password reuse and the significance of multi-factor authentication.</li></ul><br/><p><strong>The Impact and Aftermath</strong></p><ul><li>The deployment of BlackCat/ALPHV ransomware and its consequences.</li><li>The financial and operational repercussions for MGM Resorts.</li></ul><br/><p><strong>Lessons Learned and Mitigation Strategies</strong></p><ul><li>The importance of privileged access management (PAM) solutions.</li><li>Strategies for improving multi-factor authentication (MFA) control.</li><li>The significance of protecting Tier 0 assets and adopting best Identity Provider (IdP) practices.</li></ul><br/><p><strong>CyberArk Labs' Takeaways</strong></p><ul><li>The commonality of attacking IAM platforms.</li><li>The role of BlackCat/ALPHV in the attack.</li><li>The importance of monitoring trust changes and staying updated on evolving cyber threats.</li></ul><br/><p><strong>Episode Highlights:</strong></p><ul><li>"A series of mistakes ultimately led to one of the most visible and brand-damaging attacks in years." - Savvy Sharma</li><li>"It’s crucial for organizations to continuously improve their security measures and follow best practices to protect themselves in today’s digital landscape." - Savvy Sharma</li></ul><br/><p>---</p><p>I do hope you enjoyed this episode of the podcast.  Here's some helpful resources including any sites that were mentioned in this episode.</p><p>--</p><p>Sites Mentioned in this Episode</p><ul><li><a href="https://www.cyberark.com/resources/blog/the-mgm-resorts-attack-initial-analysis">The MGM Resorts Attack: Initial Analysis</a></li></ul><br/><p>--</p><p>Find subscriber links on my site, add to your podcast player, or listen on the web players on my site:</p><p><a href="https://bytesizedsecurity.show/listen">Listen to Byte Sized Security</a> </p><p>--</p><p><strong>Support this Podcast with a Tip:</strong></p><p><a href="https://bytesizedsecurity.show/support">Support Byte Sized Security</a> </p>]]></description><content:encoded><![CDATA[<p><strong>Episode Overview:</strong></p><p>In this extended episode, host Marc David and cybersecurity expert Savvy Sharma delve deep into the recent cyberattack on MGM Resorts International. They discuss the tactics used by the attackers, the vulnerabilities exploited, and the cascading impact of the breach on MGM's operations.</p><p><strong>Key Discussion Points:</strong></p><p><strong>Introduction to the MGM Resorts Attack</strong></p><ul><li>Overview of the attack and its significance in the cybersecurity landscape.</li></ul><br/><p><strong>The Attackers and Their Tactics</strong></p><ul><li>The role of Scattered Spider and their use of social engineering.</li><li>The exploitation of password reuse and the significance of multi-factor authentication.</li></ul><br/><p><strong>The Impact and Aftermath</strong></p><ul><li>The deployment of BlackCat/ALPHV ransomware and its consequences.</li><li>The financial and operational repercussions for MGM Resorts.</li></ul><br/><p><strong>Lessons Learned and Mitigation Strategies</strong></p><ul><li>The importance of privileged access management (PAM) solutions.</li><li>Strategies for improving multi-factor authentication (MFA) control.</li><li>The significance of protecting Tier 0 assets and adopting best Identity Provider (IdP) practices.</li></ul><br/><p><strong>CyberArk Labs' Takeaways</strong></p><ul><li>The commonality of attacking IAM platforms.</li><li>The role of BlackCat/ALPHV in the attack.</li><li>The importance of monitoring trust changes and staying updated on evolving cyber threats.</li></ul><br/><p><strong>Episode Highlights:</strong></p><ul><li>"A series of mistakes ultimately led to one of the most visible and brand-damaging attacks in years." - Savvy Sharma</li><li>"It’s crucial for organizations to continuously improve their security measures and follow best practices to protect themselves in today’s digital landscape." - Savvy Sharma</li></ul><br/><p>---</p><p>I do hope you enjoyed this episode of the podcast.  Here's some helpful resources including any sites that were mentioned in this episode.</p><p>--</p><p>Sites Mentioned in this Episode</p><ul><li><a href="https://www.cyberark.com/resources/blog/the-mgm-resorts-attack-initial-analysis">The MGM Resorts Attack: Initial Analysis</a></li></ul><br/><p>--</p><p>Find subscriber links on my site, add to your podcast player, or listen on the web players on my site:</p><p><a href="https://bytesizedsecurity.show/listen">Listen to Byte Sized Security</a> </p><p>--</p><p><strong>Support this Podcast with a Tip:</strong></p><p><a href="https://bytesizedsecurity.show/support">Support Byte Sized Security</a> </p>]]></content:encoded><link><![CDATA[https://bytesizedsecurity.show/episode/ep12-the-mgm-resorts-breach-lessons-learned-and-future-implications-extended]]></link><guid isPermaLink="false">898d00c7-77ce-4d57-b55f-3ea00ce953ff</guid><itunes:image href="https://artwork.captivate.fm/6daab296-d019-4be9-bbf4-3e3566f5d395/UatAugnAE7j5mC_O7AskLuwU.png"/><pubDate>Mon, 25 Sep 2023 09:00:00 -0700</pubDate><enclosure url="https://pdcn.co/e/podcasts.captivate.fm/media/948002f9-14bd-4cdf-a549-c835e2d875be/the-mgm-resorts-breach-lessons-learned-and-future-implications-.mp3" length="6177058" type="audio/mpeg"/><itunes:duration>05:09</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>12</itunes:episode><podcast:episode>12</podcast:episode><podcast:season>1</podcast:season><podcast:transcript url="https://transcripts.captivate.fm/transcript/c9fbd1fa-8c4d-4679-ba00-460d0e4a8624/transcript.json" type="application/json"/><podcast:transcript url="https://transcripts.captivate.fm/transcript/c9fbd1fa-8c4d-4679-ba00-460d0e4a8624/transcript.srt" type="application/srt" rel="captions"/><podcast:transcript url="https://transcripts.captivate.fm/transcript/c9fbd1fa-8c4d-4679-ba00-460d0e4a8624/index.html" type="text/html"/></item><item><title>Ep11: Staying Safe on Social Media</title><itunes:title>Ep11: Staying Safe on Social Media</itunes:title><description><![CDATA[<p>In this episode, Marc David speaks with social media expert Nia Jordan about best practices for staying safe on social platforms including:</p><ul><li>Tightening up default privacy settings to restrict who can see profile info</li><li>Using strong unique passwords and enabling two-factor authentication</li><li>Avoiding scams involving money transfers, malware links or fake prizes</li><li>Not linking accounts across platforms or via third party apps</li><li>Vetting friend requests and connections to avoid impersonation risks</li><li>Monitoring children’s accounts and guiding them on security practices</li><li>Having ongoing conversations about oversharing and permanent content</li><li>Applying thoughtful precautions when interacting with strangers digitally</li></ul><br/><p>For more bite-sized cybersecurity tips, visit bytesizedsecurity.show or subscribe to the podcast. See you next time!</p><p>---</p><p>I do hope you enjoyed this episode of the podcast.  Here's some helpful resources including any sites that were mentioned in this episode.</p><p>--</p><p>--</p><p>Find subscriber links on my site, add to your podcast player, or listen on the web players on my site:</p><p><a href="https://bytesizedsecurity.show/listen">Listen to Byte Sized Security</a> </p><p>--</p><p><strong>Support this Podcast with a Tip:</strong></p><p><a href="https://bytesizedsecurity.show/support">Support Byte Sized Security</a> </p>]]></description><content:encoded><![CDATA[<p>In this episode, Marc David speaks with social media expert Nia Jordan about best practices for staying safe on social platforms including:</p><ul><li>Tightening up default privacy settings to restrict who can see profile info</li><li>Using strong unique passwords and enabling two-factor authentication</li><li>Avoiding scams involving money transfers, malware links or fake prizes</li><li>Not linking accounts across platforms or via third party apps</li><li>Vetting friend requests and connections to avoid impersonation risks</li><li>Monitoring children’s accounts and guiding them on security practices</li><li>Having ongoing conversations about oversharing and permanent content</li><li>Applying thoughtful precautions when interacting with strangers digitally</li></ul><br/><p>For more bite-sized cybersecurity tips, visit bytesizedsecurity.show or subscribe to the podcast. See you next time!</p><p>---</p><p>I do hope you enjoyed this episode of the podcast.  Here's some helpful resources including any sites that were mentioned in this episode.</p><p>--</p><p>--</p><p>Find subscriber links on my site, add to your podcast player, or listen on the web players on my site:</p><p><a href="https://bytesizedsecurity.show/listen">Listen to Byte Sized Security</a> </p><p>--</p><p><strong>Support this Podcast with a Tip:</strong></p><p><a href="https://bytesizedsecurity.show/support">Support Byte Sized Security</a> </p>]]></content:encoded><link><![CDATA[https://bytesizedsecurity.show/episode/ep12-staying-safe-on-social-media]]></link><guid isPermaLink="false">dd8839b8-2a4a-44e8-b953-aca46d1b887d</guid><itunes:image href="https://artwork.captivate.fm/6daab296-d019-4be9-bbf4-3e3566f5d395/UatAugnAE7j5mC_O7AskLuwU.png"/><pubDate>Sat, 23 Sep 2023 09:00:00 -0700</pubDate><enclosure url="https://pdcn.co/e/podcasts.captivate.fm/media/78062668-75f2-4ff4-bd1e-ec1a78fed92f/staying-safe-on-social-media-converted.mp3" length="7573042" type="audio/mpeg"/><itunes:duration>06:19</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>11</itunes:episode><podcast:episode>11</podcast:episode><podcast:season>1</podcast:season><podcast:transcript url="https://transcripts.captivate.fm/transcript/e07098df-58a5-4ad8-bd28-771d68b91109/transcript.json" type="application/json"/><podcast:transcript url="https://transcripts.captivate.fm/transcript/e07098df-58a5-4ad8-bd28-771d68b91109/transcript.srt" type="application/srt" rel="captions"/><podcast:transcript url="https://transcripts.captivate.fm/transcript/e07098df-58a5-4ad8-bd28-771d68b91109/index.html" type="text/html"/></item><item><title>Ep10: Staying Cyber Safe While Traveling</title><itunes:title>Ep10: Staying Cyber Safe While Traveling</itunes:title><description><![CDATA[<p>In this episode, Marc David speaks with expert Amelia Thompson about staying cyber secure while traveling including:</p><ul><li>Using VPNs and avoiding sensitive logins on public WiFi to prevent eavesdropping</li><li>Enabling device tracking in case items are lost or stolen during transit</li><li>Strengthening account login protections with multi-factor authentication</li><li>Setting travel notices on financial accounts to prevent fraudulent transactions</li><li>Avoiding phishing attempts by strangers when distracted in public spaces</li><li>Updating devices and backing up data in case of damage or theft</li><li>Carrying temporary “burner” phones devoid of personal data</li><li>Using mobile device management for securely configured company phones</li><li>Remaining vigilant about security while recognizing travel poses added risks</li></ul><br/><p>For more bite-sized cybersecurity tips, visit bytesizedsecurity.show or subscribe to the podcast. See you next time!</p><p>---</p><p>I do hope you enjoyed this episode of the podcast.  Here's some helpful resources including any sites that were mentioned in this episode.</p><p>--</p><p>Sites Mentioned in this Episode</p><ul><li><a href="https://www.eff.org/document/eff-border-search-pocket-guide">EFF Border Search Pocket Guide | Electronic Frontier Foundation</a></li><li><a href="https://www.cisecurity.org/insights/newsletter/cyber-safe-travel">Cyber-Safe Travel</a></li><li><a href="https://www.worldnomads.com/travel-safety/worldwide/cyber-safety-tips-for-travel">5 Cyber Safety Tips for Travelers and Digital Nomads</a></li><li><a href="https://www.fcc.gov/consumers/guides/cybersecurity-tips-international-travelers">Cybersecurity Tips for International Travelers | Federal Communications Commission</a></li><li><a href="https://www.cisa.gov/sites/default/files/publications/Cybersecurity%20While%20Traveling_6.pdf">Cybersecurity While Traveling Tip Card</a></li><li><a href="https://www.malwarebytes.com/blog/news/2023/03/9-cybersecurity-tips-to-keep-you-safe-when-travelling#:~:text=Avoid%20sites%20where%20you%20need,your%20browser%20history%20as%20well.">8 cybersecurity tips to keep you safe when travelling</a></li><li><a href="https://blog.1password.com/how-to-protect-your-digital-life-when-you-travel/">How To Keep Your Data Secure While Traveling | 1Password</a></li></ul><br/><p>--</p><p>Find subscriber links on my site, add to your podcast player, or listen on the web players on my site:</p><p><a href="https://bytesizedsecurity.show/listen">Listen to Byte Sized Security</a> </p><p>--</p><p><strong>Support this Podcast with a Tip:</strong></p><p><a href="https://bytesizedsecurity.show/support">Support Byte Sized Security</a> </p>]]></description><content:encoded><![CDATA[<p>In this episode, Marc David speaks with expert Amelia Thompson about staying cyber secure while traveling including:</p><ul><li>Using VPNs and avoiding sensitive logins on public WiFi to prevent eavesdropping</li><li>Enabling device tracking in case items are lost or stolen during transit</li><li>Strengthening account login protections with multi-factor authentication</li><li>Setting travel notices on financial accounts to prevent fraudulent transactions</li><li>Avoiding phishing attempts by strangers when distracted in public spaces</li><li>Updating devices and backing up data in case of damage or theft</li><li>Carrying temporary “burner” phones devoid of personal data</li><li>Using mobile device management for securely configured company phones</li><li>Remaining vigilant about security while recognizing travel poses added risks</li></ul><br/><p>For more bite-sized cybersecurity tips, visit bytesizedsecurity.show or subscribe to the podcast. See you next time!</p><p>---</p><p>I do hope you enjoyed this episode of the podcast.  Here's some helpful resources including any sites that were mentioned in this episode.</p><p>--</p><p>Sites Mentioned in this Episode</p><ul><li><a href="https://www.eff.org/document/eff-border-search-pocket-guide">EFF Border Search Pocket Guide | Electronic Frontier Foundation</a></li><li><a href="https://www.cisecurity.org/insights/newsletter/cyber-safe-travel">Cyber-Safe Travel</a></li><li><a href="https://www.worldnomads.com/travel-safety/worldwide/cyber-safety-tips-for-travel">5 Cyber Safety Tips for Travelers and Digital Nomads</a></li><li><a href="https://www.fcc.gov/consumers/guides/cybersecurity-tips-international-travelers">Cybersecurity Tips for International Travelers | Federal Communications Commission</a></li><li><a href="https://www.cisa.gov/sites/default/files/publications/Cybersecurity%20While%20Traveling_6.pdf">Cybersecurity While Traveling Tip Card</a></li><li><a href="https://www.malwarebytes.com/blog/news/2023/03/9-cybersecurity-tips-to-keep-you-safe-when-travelling#:~:text=Avoid%20sites%20where%20you%20need,your%20browser%20history%20as%20well.">8 cybersecurity tips to keep you safe when travelling</a></li><li><a href="https://blog.1password.com/how-to-protect-your-digital-life-when-you-travel/">How To Keep Your Data Secure While Traveling | 1Password</a></li></ul><br/><p>--</p><p>Find subscriber links on my site, add to your podcast player, or listen on the web players on my site:</p><p><a href="https://bytesizedsecurity.show/listen">Listen to Byte Sized Security</a> </p><p>--</p><p><strong>Support this Podcast with a Tip:</strong></p><p><a href="https://bytesizedsecurity.show/support">Support Byte Sized Security</a> </p>]]></content:encoded><link><![CDATA[https://bytesizedsecurity.show/episode/ep10-staying-cyber-safe-while-traveling]]></link><guid isPermaLink="false">30c19d72-ceba-4c50-b258-4159d88a7cfa</guid><itunes:image href="https://artwork.captivate.fm/6daab296-d019-4be9-bbf4-3e3566f5d395/UatAugnAE7j5mC_O7AskLuwU.png"/><pubDate>Thu, 21 Sep 2023 09:00:00 -0700</pubDate><enclosure url="https://pdcn.co/e/podcasts.captivate.fm/media/17233f18-e6cf-4eed-9261-c8a7c4fb47ee/staying-cyber-safe-while-traveling-converted.mp3" length="6929907" type="audio/mpeg"/><itunes:duration>05:46</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>10</itunes:episode><podcast:episode>10</podcast:episode><podcast:season>1</podcast:season><podcast:transcript url="https://transcripts.captivate.fm/transcript/e77360b2-6311-4182-9d17-f9537c47a365/transcript.json" type="application/json"/><podcast:transcript url="https://transcripts.captivate.fm/transcript/e77360b2-6311-4182-9d17-f9537c47a365/transcript.srt" type="application/srt" rel="captions"/><podcast:transcript url="https://transcripts.captivate.fm/transcript/e77360b2-6311-4182-9d17-f9537c47a365/index.html" type="text/html"/></item><item><title>Security Update: Urgent iOS Update Alert for iPhone Users</title><itunes:title>Security Update: Urgent iOS Update Alert for iPhone Users</itunes:title><description><![CDATA[<p>Attention iPhone users! Apple has just released an emergency update, iOS 16.6.1, which addresses two critical vulnerabilities that have been actively exploited in real-world scenarios. Here's what you need to know:</p><ol><li>The Flaws: The first vulnerability is associated with ImageIO, identified as CVE-2023-41064. This flaw could let attackers execute malicious code through a specially crafted image. The second vulnerability is linked to Apple's Wallet, labeled as CVE-2023-41061. This could allow attackers to execute code via a malicious attachment. Apple has confirmed that both these issues have been actively exploited.</li><li>Real-Life Implications: These vulnerabilities aren't just theoretical. They've been used in real-life attacks to deploy spyware without any user interaction. Notably, the infamous Pegasus spyware, which grants attackers full access to iPhones, has been linked to these flaws. Citizen Lab, a security research group, discovered an exploit named "BLASTPASS" that compromised iPhones running iOS 16.6 without any user interaction.</li><li>Why Update Now: Given the severity of these vulnerabilities, it's crucial to update to iOS 16.6.1 immediately. Even if you believe you're not a direct target, the more these flaws are known, the higher the risk of them being used maliciously. Independent security researcher, Sean Wright, emphasizes the importance of updating promptly. For those concerned about potential compromises, tools like iVerify can be used to check device security. Additionally, Apple's Lockdown Mode can be activated for those at higher risk, though it does limit device functionality.</li><li>Broader Impacts: It's not just iPhones. The Wallet vulnerability is also present in Apple Watch, and the ImageIO issue has been addressed in a new Mac update. Ensure all your Apple devices are updated for maximum security.</li><li>How to Update: Even if you've set your iPhone for automatic updates, it's recommended to manually check and update to ensure you have the latest protection. Navigate to iPhone Settings &gt; General &gt; Software Update and install iOS 16.6.1.</li></ol><br/><p>Listeners, in the ever-evolving world of technology, staying updated is not just about getting the latest features; it's about ensuring your personal security. Always prioritize updates, especially those addressing security concerns.</p><p>---</p><p>I do hope you enjoyed this episode of the podcast.  Here's some helpful resources including any sites that were mentioned in this episode.</p><p>--</p><p>Sites Mentioned in this Episode</p><ul><li><a href="https://www.forbes.com/sites/kateoflahertyuk/2023/09/08/ios-1661-update-now-warning-issued-to-all-iphone-users/?sh=2bdece5565da">iOS 16.6.1—Update Now Warning Issued To All iPhone Users</a></li></ul><br/><p>--</p><p>Find subscriber links on my site, add to your podcast player, or listen on the web players on my site:</p><p><a href="https://bytesizedsecurity.show/listen">Listen to Byte Sized Security</a> </p><p>--</p><p><strong>Support this Podcast with a Tip:</strong></p><p><a href="https://bytesizedsecurity.show/support">Support Byte Sized Security</a> </p>]]></description><content:encoded><![CDATA[<p>Attention iPhone users! Apple has just released an emergency update, iOS 16.6.1, which addresses two critical vulnerabilities that have been actively exploited in real-world scenarios. Here's what you need to know:</p><ol><li>The Flaws: The first vulnerability is associated with ImageIO, identified as CVE-2023-41064. This flaw could let attackers execute malicious code through a specially crafted image. The second vulnerability is linked to Apple's Wallet, labeled as CVE-2023-41061. This could allow attackers to execute code via a malicious attachment. Apple has confirmed that both these issues have been actively exploited.</li><li>Real-Life Implications: These vulnerabilities aren't just theoretical. They've been used in real-life attacks to deploy spyware without any user interaction. Notably, the infamous Pegasus spyware, which grants attackers full access to iPhones, has been linked to these flaws. Citizen Lab, a security research group, discovered an exploit named "BLASTPASS" that compromised iPhones running iOS 16.6 without any user interaction.</li><li>Why Update Now: Given the severity of these vulnerabilities, it's crucial to update to iOS 16.6.1 immediately. Even if you believe you're not a direct target, the more these flaws are known, the higher the risk of them being used maliciously. Independent security researcher, Sean Wright, emphasizes the importance of updating promptly. For those concerned about potential compromises, tools like iVerify can be used to check device security. Additionally, Apple's Lockdown Mode can be activated for those at higher risk, though it does limit device functionality.</li><li>Broader Impacts: It's not just iPhones. The Wallet vulnerability is also present in Apple Watch, and the ImageIO issue has been addressed in a new Mac update. Ensure all your Apple devices are updated for maximum security.</li><li>How to Update: Even if you've set your iPhone for automatic updates, it's recommended to manually check and update to ensure you have the latest protection. Navigate to iPhone Settings &gt; General &gt; Software Update and install iOS 16.6.1.</li></ol><br/><p>Listeners, in the ever-evolving world of technology, staying updated is not just about getting the latest features; it's about ensuring your personal security. Always prioritize updates, especially those addressing security concerns.</p><p>---</p><p>I do hope you enjoyed this episode of the podcast.  Here's some helpful resources including any sites that were mentioned in this episode.</p><p>--</p><p>Sites Mentioned in this Episode</p><ul><li><a href="https://www.forbes.com/sites/kateoflahertyuk/2023/09/08/ios-1661-update-now-warning-issued-to-all-iphone-users/?sh=2bdece5565da">iOS 16.6.1—Update Now Warning Issued To All iPhone Users</a></li></ul><br/><p>--</p><p>Find subscriber links on my site, add to your podcast player, or listen on the web players on my site:</p><p><a href="https://bytesizedsecurity.show/listen">Listen to Byte Sized Security</a> </p><p>--</p><p><strong>Support this Podcast with a Tip:</strong></p><p><a href="https://bytesizedsecurity.show/support">Support Byte Sized Security</a> </p>]]></content:encoded><link><![CDATA[https://bytesizedsecurity.show/episode/ep10-security-update-urgent-ios-update-alert-for-iphone-users]]></link><guid isPermaLink="false">3137e5cc-92cf-4d81-a26c-6f8ce67c66c9</guid><itunes:image href="https://artwork.captivate.fm/6daab296-d019-4be9-bbf4-3e3566f5d395/UatAugnAE7j5mC_O7AskLuwU.png"/><pubDate>Fri, 08 Sep 2023 09:15:00 -0700</pubDate><enclosure url="https://pdcn.co/e/podcasts.captivate.fm/media/4c93b613-035a-4e55-b97a-2d3d4dcb2042/original-converted.mp3" length="4126968" type="audio/mpeg"/><itunes:duration>03:26</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>bonus</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>10</itunes:episode><podcast:episode>10</podcast:episode><podcast:season>1</podcast:season></item><item><title>Ep9: The 10 Best Password Managers of 2023</title><itunes:title>Ep9: The 10 Best Password Managers of 2023</itunes:title><description><![CDATA[<p>In this episode, host Marc David and cybersecurity expert Dr. Emily Thompson discuss the top 10 password managers for 2023. They delve into the pros, cons, and unique features of each, providing listeners with a comprehensive guide to choosing the right password manager.</p><p><strong>Key Highlights:</strong></p><ul><li>Introduction: Recap of Episode 1, emphasizing the importance of using a password manager in today's digital landscape.</li><li>Guest Introduction: Dr. Emily Thompson, a cybersecurity expert with over a decade of experience, adjunct professor at MIT, and a frequent speaker at international conferences.</li><li>Master Password Tips:</li><li>Importance of a strong master password or passphrase.</li><li>Tips sourced from NIST's Digital Identity Guidelines and the SP 800 63 series.</li><li>Recommendations on password length, complexity, avoiding personal information, and more.</li></ul><br/><p><strong>Top 10 Password Managers:</strong></p><ol><li>LastPass: Popular choice with user-friendly interface, cross-platform support, and unique “Security Challenge” feature.</li><li>Dashlane: Offers VPN integration, dark web monitoring, and an identity dashboard.</li><li>1Password: Ideal for families, with features like travel mode and watchtower.</li><li>Keeper: Known for biometric login and a self-destruct feature.</li><li>Bitwarden: Open-source option with data import capabilities.</li><li>NordPass: From the makers of NordVPN, offers OCR scanning and password health checks.</li><li>RoboForm: Not just a password manager, but also a form filler.</li><li>Enpass: Offers offline access and a one-time purchase model.</li><li>Sticky Password: Known for USB portability and local Wi-Fi syncing.</li><li>Password Boss: Features a digital wallet, emergency access, and a security score.</li></ol><br/><p><strong>Notable Mention:</strong></p><ul><li>Proton Pass: From the Proton team, offers end-to-end encryption, hide-my-email aliases, and acts as an identity manager.</li></ul><br/><p><strong>Closing Remarks:</strong></p><p>A reminder of the importance of digital security and the role of password managers in safeguarding online identities.  Please review the research links below for more information regarding the LastPass breach.</p><p>---</p><p>I do hope you enjoyed this episode of the podcast.  Here are some helpful resources, including any sites that were mentioned in this episode.</p><p>--</p><p>Sites Mentioned in this Episode</p><ul><li><a href="https://cybernews.com/best-password-managers/lastpass-review/#:~:text=Should%20you%20leave%20LastPass%3F,the%20encryption%20could%20be%20cracked.">LastPass Review 2023: Is It Still Safe to Use? | Cybernews</a></li><li><a href="https://proton.me/pass">Proton Pass: Open Source Password Manager App | Proton</a> - Not sure about LastPass?  Check this one out.</li><li><a href="https://blog.lastpass.com/2023/03/security-incident-update-recommended-actions/">Security Incident March 2023 Update & Actions - LastPass</a></li><li><a href="https://krebsonsecurity.com/2023/09/experts-fear-crooks-are-cracking-keys-stolen-in-lastpass-breach/">Experts Fear Crooks are Cracking Keys Stolen in LastPass Breach – Krebs on Security</a></li><li><a href="https://www.pcmag.com/picks/the-best-password-managers">The Best Password Managers for 2023 | PCMag</a></li><li><a href="https://www.cbsnews.com/news/the-10-best-password-managers-of-2023-top-choices-tested-by-our-experts/">The 10 best password managers of 2023: Top choices tested by our experts - CBS News</a></li></ul><br/><p>--</p><p>Find subscriber links on my site, add to your podcast player, or listen on the web players on my site:</p><p><a href="https://bytesizedsecurity.show/listen">Listen to Byte Sized Security</a> </p><p>--</p><p><strong>Support this Podcast with a Tip:</strong></p><p><a href="https://bytesizedsecurity.show/support">Support Byte Sized Security</a> </p>]]></description><content:encoded><![CDATA[<p>In this episode, host Marc David and cybersecurity expert Dr. Emily Thompson discuss the top 10 password managers for 2023. They delve into the pros, cons, and unique features of each, providing listeners with a comprehensive guide to choosing the right password manager.</p><p><strong>Key Highlights:</strong></p><ul><li>Introduction: Recap of Episode 1, emphasizing the importance of using a password manager in today's digital landscape.</li><li>Guest Introduction: Dr. Emily Thompson, a cybersecurity expert with over a decade of experience, adjunct professor at MIT, and a frequent speaker at international conferences.</li><li>Master Password Tips:</li><li>Importance of a strong master password or passphrase.</li><li>Tips sourced from NIST's Digital Identity Guidelines and the SP 800 63 series.</li><li>Recommendations on password length, complexity, avoiding personal information, and more.</li></ul><br/><p><strong>Top 10 Password Managers:</strong></p><ol><li>LastPass: Popular choice with user-friendly interface, cross-platform support, and unique “Security Challenge” feature.</li><li>Dashlane: Offers VPN integration, dark web monitoring, and an identity dashboard.</li><li>1Password: Ideal for families, with features like travel mode and watchtower.</li><li>Keeper: Known for biometric login and a self-destruct feature.</li><li>Bitwarden: Open-source option with data import capabilities.</li><li>NordPass: From the makers of NordVPN, offers OCR scanning and password health checks.</li><li>RoboForm: Not just a password manager, but also a form filler.</li><li>Enpass: Offers offline access and a one-time purchase model.</li><li>Sticky Password: Known for USB portability and local Wi-Fi syncing.</li><li>Password Boss: Features a digital wallet, emergency access, and a security score.</li></ol><br/><p><strong>Notable Mention:</strong></p><ul><li>Proton Pass: From the Proton team, offers end-to-end encryption, hide-my-email aliases, and acts as an identity manager.</li></ul><br/><p><strong>Closing Remarks:</strong></p><p>A reminder of the importance of digital security and the role of password managers in safeguarding online identities.  Please review the research links below for more information regarding the LastPass breach.</p><p>---</p><p>I do hope you enjoyed this episode of the podcast.  Here are some helpful resources, including any sites that were mentioned in this episode.</p><p>--</p><p>Sites Mentioned in this Episode</p><ul><li><a href="https://cybernews.com/best-password-managers/lastpass-review/#:~:text=Should%20you%20leave%20LastPass%3F,the%20encryption%20could%20be%20cracked.">LastPass Review 2023: Is It Still Safe to Use? | Cybernews</a></li><li><a href="https://proton.me/pass">Proton Pass: Open Source Password Manager App | Proton</a> - Not sure about LastPass?  Check this one out.</li><li><a href="https://blog.lastpass.com/2023/03/security-incident-update-recommended-actions/">Security Incident March 2023 Update & Actions - LastPass</a></li><li><a href="https://krebsonsecurity.com/2023/09/experts-fear-crooks-are-cracking-keys-stolen-in-lastpass-breach/">Experts Fear Crooks are Cracking Keys Stolen in LastPass Breach – Krebs on Security</a></li><li><a href="https://www.pcmag.com/picks/the-best-password-managers">The Best Password Managers for 2023 | PCMag</a></li><li><a href="https://www.cbsnews.com/news/the-10-best-password-managers-of-2023-top-choices-tested-by-our-experts/">The 10 best password managers of 2023: Top choices tested by our experts - CBS News</a></li></ul><br/><p>--</p><p>Find subscriber links on my site, add to your podcast player, or listen on the web players on my site:</p><p><a href="https://bytesizedsecurity.show/listen">Listen to Byte Sized Security</a> </p><p>--</p><p><strong>Support this Podcast with a Tip:</strong></p><p><a href="https://bytesizedsecurity.show/support">Support Byte Sized Security</a> </p>]]></content:encoded><link><![CDATA[https://bytesizedsecurity.show/episode/ep9-the-10-best-password-managers-of-2023]]></link><guid isPermaLink="false">19391cbf-18d3-4d00-978c-d8c4e7f5ebe5</guid><itunes:image href="https://artwork.captivate.fm/6daab296-d019-4be9-bbf4-3e3566f5d395/UatAugnAE7j5mC_O7AskLuwU.png"/><pubDate>Fri, 08 Sep 2023 09:00:00 -0700</pubDate><enclosure url="https://pdcn.co/e/podcasts.captivate.fm/media/e906ef7b-6f7e-4c04-aeb6-71dd8285e1dd/original-converted.mp3" length="12039980" type="audio/mpeg"/><itunes:duration>10:02</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>9</itunes:episode><podcast:episode>9</podcast:episode><podcast:season>1</podcast:season></item><item><title>Ep8: Securing Your Credit Reports and Freezes</title><itunes:title>Ep8: Securing Your Credit Reports and Freezes</itunes:title><description><![CDATA[<p>In this episode, Marc David speaks with credit expert Olivia Chen about best practices for safeguarding your credit reports and identity including:</p><ul><li>Placing credit freezes with Equifax, Experian and TransUnion to restrict new account openings</li><li>Lifting freezes temporarily when applying for new credit using your PIN</li><li>Freezing children’s credit reports until they are old enough to manage credit</li><li>Checking your credit reports annually for signs of fraudulent activity</li><li>Reviewing reports to verify personal info and watch for unauthorized accounts</li><li>Disputing fraudulent charges, closing accounts and reporting identity theft</li><li>Putting freezes and monitoring in place proactively even if not breach impacted</li><li>Making credit protections part of your regular financial security regimen</li></ul><br/><p>For full episode recaps and cybersecurity tips, visit <a href="bytesizedsecurity.show" rel="noopener noreferrer" target="_blank">bytesizedsecurity.show</a> or subscribe to the podcast. See you next time!</p><p>---</p><p>I do hope you enjoyed this episode of the podcast.  Here's some helpful resources including any sites that were mentioned in this episode.</p><p>--</p><p>Sites Mentioned in this Episode</p><ul><li><a href="https://www.identitytheft.gov/#/Steps">IdentityTheft.gov - Recovery Steps</a> - Hopefully you won't need this resource but if you do or you know somebody who needs help with Identity Theft</li><li><a href="https://www.annualcreditreport.com/index.action">Annual Credit Report.com - Home Page</a> - The free way to request your credit report, annually, from the big agencies</li><li><a href="https://www.transunion.com/credit-freeze">Credit Freeze | Freeze My Credit | TransUnion</a></li><li><a href="https://www.equifax.com/personal/credit-report-services/credit-freeze/">Security Freeze | Freeze or Unfreeze Your Credit | Equifax</a></li><li><a href="https://www.experian.com/blogs/ask-experian/credit-education/preventing-fraud/security-freeze/">How to Freeze Your Credit For Free - Experian</a></li><li><a href="https://www.consumerfinance.gov/about-us/blog/free-credit-freezes-are-here/">Free credit freezes are here | Consumer Financial Protection Bureau</a></li><li><a href="https://consumer.ftc.gov/articles/what-know-about-credit-freezes-fraud-alerts">What To Know About Credit Freezes and Fraud Alerts | Consumer Advice</a></li><li><a href="https://clark.com/credit/credit-freeze-and-thaw-guide/">How To Freeze Your Credit With Experian, Equifax and TransUnion</a> - This article from Clark Howard provides excellent guidance on how to freeze and unfreeze your credit with the three major credit bureaus to prevent identity theft.</li></ul><br/><p>--</p><p>Find subscriber links on my site, add to your podcast player, or listen on the web players on my site:</p><p><a href="https://bytesizedsecurity.show/listen">Listen to Byte Sized Security</a> </p><p>--</p><p><strong>Support this Podcast with a Tip:</strong></p><p><a href="https://bytesizedsecurity.show/support">Support Byte Sized Security</a> </p>]]></description><content:encoded><![CDATA[<p>In this episode, Marc David speaks with credit expert Olivia Chen about best practices for safeguarding your credit reports and identity including:</p><ul><li>Placing credit freezes with Equifax, Experian and TransUnion to restrict new account openings</li><li>Lifting freezes temporarily when applying for new credit using your PIN</li><li>Freezing children’s credit reports until they are old enough to manage credit</li><li>Checking your credit reports annually for signs of fraudulent activity</li><li>Reviewing reports to verify personal info and watch for unauthorized accounts</li><li>Disputing fraudulent charges, closing accounts and reporting identity theft</li><li>Putting freezes and monitoring in place proactively even if not breach impacted</li><li>Making credit protections part of your regular financial security regimen</li></ul><br/><p>For full episode recaps and cybersecurity tips, visit <a href="bytesizedsecurity.show" rel="noopener noreferrer" target="_blank">bytesizedsecurity.show</a> or subscribe to the podcast. See you next time!</p><p>---</p><p>I do hope you enjoyed this episode of the podcast.  Here's some helpful resources including any sites that were mentioned in this episode.</p><p>--</p><p>Sites Mentioned in this Episode</p><ul><li><a href="https://www.identitytheft.gov/#/Steps">IdentityTheft.gov - Recovery Steps</a> - Hopefully you won't need this resource but if you do or you know somebody who needs help with Identity Theft</li><li><a href="https://www.annualcreditreport.com/index.action">Annual Credit Report.com - Home Page</a> - The free way to request your credit report, annually, from the big agencies</li><li><a href="https://www.transunion.com/credit-freeze">Credit Freeze | Freeze My Credit | TransUnion</a></li><li><a href="https://www.equifax.com/personal/credit-report-services/credit-freeze/">Security Freeze | Freeze or Unfreeze Your Credit | Equifax</a></li><li><a href="https://www.experian.com/blogs/ask-experian/credit-education/preventing-fraud/security-freeze/">How to Freeze Your Credit For Free - Experian</a></li><li><a href="https://www.consumerfinance.gov/about-us/blog/free-credit-freezes-are-here/">Free credit freezes are here | Consumer Financial Protection Bureau</a></li><li><a href="https://consumer.ftc.gov/articles/what-know-about-credit-freezes-fraud-alerts">What To Know About Credit Freezes and Fraud Alerts | Consumer Advice</a></li><li><a href="https://clark.com/credit/credit-freeze-and-thaw-guide/">How To Freeze Your Credit With Experian, Equifax and TransUnion</a> - This article from Clark Howard provides excellent guidance on how to freeze and unfreeze your credit with the three major credit bureaus to prevent identity theft.</li></ul><br/><p>--</p><p>Find subscriber links on my site, add to your podcast player, or listen on the web players on my site:</p><p><a href="https://bytesizedsecurity.show/listen">Listen to Byte Sized Security</a> </p><p>--</p><p><strong>Support this Podcast with a Tip:</strong></p><p><a href="https://bytesizedsecurity.show/support">Support Byte Sized Security</a> </p>]]></content:encoded><link><![CDATA[https://bytesizedsecurity.show/episode/ep8-securing-your-credit-reports-and-freezes]]></link><guid isPermaLink="false">4d8b1f3d-3d35-4581-960e-ca6af62a0b58</guid><itunes:image href="https://artwork.captivate.fm/6daab296-d019-4be9-bbf4-3e3566f5d395/UatAugnAE7j5mC_O7AskLuwU.png"/><pubDate>Wed, 06 Sep 2023 09:00:00 -0700</pubDate><enclosure url="https://pdcn.co/e/podcasts.captivate.fm/media/a614b190-f4b3-413c-a6dc-7dd62b628874/original-converted.mp3" length="7471164" type="audio/mpeg"/><itunes:duration>06:14</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>8</itunes:episode><podcast:episode>8</podcast:episode><podcast:season>1</podcast:season><podcast:transcript url="https://transcripts.captivate.fm/transcript/15491b16-0c68-4213-8746-a0b4e7a77e44/transcript.json" type="application/json"/><podcast:transcript url="https://transcripts.captivate.fm/transcript/15491b16-0c68-4213-8746-a0b4e7a77e44/transcript.srt" type="application/srt" rel="captions"/><podcast:transcript url="https://transcripts.captivate.fm/transcript/15491b16-0c68-4213-8746-a0b4e7a77e44/index.html" type="text/html"/></item><item><title>Ep7: Securing Your SmartPhone</title><itunes:title>Ep7: Securing Your SmartPhone</itunes:title><description><![CDATA[<p>In this episode, host Marc David discusses mobile security threats and best practices with expert Savannah Hill including:</p><ul><li>Using strong screen locks like fingerprints or facial recognition to prevent unauthorized access</li><li>Backing up important data like contacts and photos to the cloud or external drives</li><li>Only installing apps from official app stores and limiting unnecessary permissions</li><li>Keeping devices updated and using mobile antivirus software as an added precaution</li><li>Enabling private browsing and VPNs for secure connections on public WiFi</li><li>Preparing for lost devices with remote wipe capabilities and location tracking</li><li>Setting lock screen contact info in case an honest finder returns your phone</li><li>Running advanced tools like VPNs and mobile device management for corporate security</li></ul><br/><p>For full episode recaps and more cybersecurity tips, visit <a href="bytesizedsecurity.show" rel="noopener noreferrer" target="_blank">bytesizedsecurity.show</a> or subscribe on your favorite podcast app. See you next time!</p><p>---</p><p>I do hope you enjoyed this episode of the podcast.  Here's some helpful resources including any sites that were mentioned in this episode.</p><p>--</p><p>Sites Mentioned in this Episode</p><ul><li><a href="https://www.tripwire.com/state-of-security/secure-mobile-device-six-steps">How to Secure Your Mobile Device: 8 Tips</a></li><li><a href="https://us.norton.com/blog/mobile">Mobile Device Security Articles | Norton Blog</a></li><li><a href="https://support.google.com/android/answer/2819582?hl=en">Back up or restore data on your Android device - Android Help</a></li><li><a href="https://support.apple.com/en-us/HT204204">Update your iPhone or iPad - Apple Support</a></li><li><a href="https://consumer.ftc.gov/articles/how-protect-your-phone-hackers">How To Protect Your Phone From Hackers | Consumer Advice</a> - Tips from the FTC on how to protect your mobile phone.</li><li><a href="https://www.cisa.gov/resources-tools/resources/mobile-security-tip-card-and-recommendations">Mobile Security Tip Card and Recommendations | CISA</a></li></ul><br/><p>--</p><p>Find subscriber links on my site, add to your podcast player, or listen on the web players on my site:</p><p><a href="https://bytesizedsecurity.show/listen">Listen to Byte Sized Security</a> </p><p>--</p><p><strong>Support this Podcast with a Tip:</strong></p><p><a href="https://bytesizedsecurity.show/support">Support Byte Sized Security</a> </p>]]></description><content:encoded><![CDATA[<p>In this episode, host Marc David discusses mobile security threats and best practices with expert Savannah Hill including:</p><ul><li>Using strong screen locks like fingerprints or facial recognition to prevent unauthorized access</li><li>Backing up important data like contacts and photos to the cloud or external drives</li><li>Only installing apps from official app stores and limiting unnecessary permissions</li><li>Keeping devices updated and using mobile antivirus software as an added precaution</li><li>Enabling private browsing and VPNs for secure connections on public WiFi</li><li>Preparing for lost devices with remote wipe capabilities and location tracking</li><li>Setting lock screen contact info in case an honest finder returns your phone</li><li>Running advanced tools like VPNs and mobile device management for corporate security</li></ul><br/><p>For full episode recaps and more cybersecurity tips, visit <a href="bytesizedsecurity.show" rel="noopener noreferrer" target="_blank">bytesizedsecurity.show</a> or subscribe on your favorite podcast app. See you next time!</p><p>---</p><p>I do hope you enjoyed this episode of the podcast.  Here's some helpful resources including any sites that were mentioned in this episode.</p><p>--</p><p>Sites Mentioned in this Episode</p><ul><li><a href="https://www.tripwire.com/state-of-security/secure-mobile-device-six-steps">How to Secure Your Mobile Device: 8 Tips</a></li><li><a href="https://us.norton.com/blog/mobile">Mobile Device Security Articles | Norton Blog</a></li><li><a href="https://support.google.com/android/answer/2819582?hl=en">Back up or restore data on your Android device - Android Help</a></li><li><a href="https://support.apple.com/en-us/HT204204">Update your iPhone or iPad - Apple Support</a></li><li><a href="https://consumer.ftc.gov/articles/how-protect-your-phone-hackers">How To Protect Your Phone From Hackers | Consumer Advice</a> - Tips from the FTC on how to protect your mobile phone.</li><li><a href="https://www.cisa.gov/resources-tools/resources/mobile-security-tip-card-and-recommendations">Mobile Security Tip Card and Recommendations | CISA</a></li></ul><br/><p>--</p><p>Find subscriber links on my site, add to your podcast player, or listen on the web players on my site:</p><p><a href="https://bytesizedsecurity.show/listen">Listen to Byte Sized Security</a> </p><p>--</p><p><strong>Support this Podcast with a Tip:</strong></p><p><a href="https://bytesizedsecurity.show/support">Support Byte Sized Security</a> </p>]]></content:encoded><link><![CDATA[https://bytesizedsecurity.show/episode/ep7-securing-your-smartphone]]></link><guid isPermaLink="false">844f38d1-b195-4190-9fce-92705f76ae0f</guid><itunes:image href="https://artwork.captivate.fm/6daab296-d019-4be9-bbf4-3e3566f5d395/UatAugnAE7j5mC_O7AskLuwU.png"/><pubDate>Thu, 31 Aug 2023 13:45:00 -0700</pubDate><enclosure url="https://pdcn.co/e/podcasts.captivate.fm/media/5a6f0338-185f-41e3-952f-c469137fcf69/original-converted.mp3" length="7961744" type="audio/mpeg"/><itunes:duration>06:38</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>7</itunes:episode><podcast:episode>7</podcast:episode><podcast:season>1</podcast:season><podcast:transcript url="https://transcripts.captivate.fm/transcript/ecb94387-2b22-4add-9aa1-c3241b6853f6/transcript.json" type="application/json"/><podcast:transcript url="https://transcripts.captivate.fm/transcript/ecb94387-2b22-4add-9aa1-c3241b6853f6/transcript.srt" type="application/srt" rel="captions"/><podcast:transcript url="https://transcripts.captivate.fm/transcript/ecb94387-2b22-4add-9aa1-c3241b6853f6/index.html" type="text/html"/></item><item><title>Ep6: Securing Your Online Accounts</title><itunes:title>Ep6: Securing Your Online Accounts</itunes:title><description><![CDATA[<p>In this episode of Byte Sized Security, host Marc David dives deep on best practices for locking down your online accounts, including:</p><ul><li>Creating strong, unique passwords - Using passphrases, password managers, proper length and complexity</li><li>Enabling multi-factor authentication - Using authenticator apps, security keys, SMS codes, and other factors</li><li>Securing MFA backup codes - Storing offline, not on your computer</li><li>Using advanced authentication options - Like biometrics and video selfie verification when available</li><li>Monitoring account activity - Setting up alerts for suspicious logins, transactions, and changes</li><li>Revoking unnecessary third-party account access</li><li>Turning on enhanced security settings - Like fraud monitoring and access restrictions</li><li>Responding to account breaches - Changing passwords, contacting companies, freezing credit</li><li>Maintaining good account hygiene - Signing out, updating credentials periodically, deleting unused accounts</li></ul><br/><p>For full episode recaps, subscribe to Byte Sized Security wherever you get your podcasts or visit bytesizedsecurity.show. See you next time!</p><p>---</p><p>I do hope you enjoyed this episode of the podcast.  Here's some helpful resources including any sites that were mentioned in this episode.</p><p>--</p><p>Sites Mentioned in this Episode</p><ul><li><a href="https://www.cisa.gov/MFA">More than a Password</a> - Multifactor authentication (MFA) can make you much more secure. Taking the extra step beyond just a password can protect your business, online purchases, bank accounts, and even your identity from potential hackers.</li><li><a href="https://lifehacker.com/people-sure-are-bad-at-creating-passwords-1850539358">People Are Still Terrible at Creating Passwords</a></li><li><a href="https://clark.com/credit/credit-freeze-and-thaw-guide/">How To Freeze Your Credit With Experian, Equifax and TransUnion</a> - This article from Clark Howard provides excellent guidance on how to freeze and unfreeze your credit with the three major credit bureaus to prevent identity theft.</li><li><a href="https://consumer.ftc.gov/consumer-alerts/2022/10/five-things-do-protect-yourself-online">Five things to do to protect yourself online | FTC Consumer Advice</a></li><li><a href="https://www.privacyguides.org/en/basics/threat-modeling/">Threat Modeling: The First Step on Your Privacy Journey - Privacy Guides</a> - An excellent resource to figure out how to balance security, privacy and usability.</li></ul><br/><p>--</p><p>Find subscriber links on my site, add to your podcast player, or listen on the web players on my site:</p><p><a href="https://bytesizedsecurity.show/listen">Listen to Byte Sized Security</a> </p><p>--</p><p><strong>Support this Podcast with a Tip:</strong></p><p><a href="https://bytesizedsecurity.show/support">Support Byte Sized Security</a> </p>]]></description><content:encoded><![CDATA[<p>In this episode of Byte Sized Security, host Marc David dives deep on best practices for locking down your online accounts, including:</p><ul><li>Creating strong, unique passwords - Using passphrases, password managers, proper length and complexity</li><li>Enabling multi-factor authentication - Using authenticator apps, security keys, SMS codes, and other factors</li><li>Securing MFA backup codes - Storing offline, not on your computer</li><li>Using advanced authentication options - Like biometrics and video selfie verification when available</li><li>Monitoring account activity - Setting up alerts for suspicious logins, transactions, and changes</li><li>Revoking unnecessary third-party account access</li><li>Turning on enhanced security settings - Like fraud monitoring and access restrictions</li><li>Responding to account breaches - Changing passwords, contacting companies, freezing credit</li><li>Maintaining good account hygiene - Signing out, updating credentials periodically, deleting unused accounts</li></ul><br/><p>For full episode recaps, subscribe to Byte Sized Security wherever you get your podcasts or visit bytesizedsecurity.show. See you next time!</p><p>---</p><p>I do hope you enjoyed this episode of the podcast.  Here's some helpful resources including any sites that were mentioned in this episode.</p><p>--</p><p>Sites Mentioned in this Episode</p><ul><li><a href="https://www.cisa.gov/MFA">More than a Password</a> - Multifactor authentication (MFA) can make you much more secure. Taking the extra step beyond just a password can protect your business, online purchases, bank accounts, and even your identity from potential hackers.</li><li><a href="https://lifehacker.com/people-sure-are-bad-at-creating-passwords-1850539358">People Are Still Terrible at Creating Passwords</a></li><li><a href="https://clark.com/credit/credit-freeze-and-thaw-guide/">How To Freeze Your Credit With Experian, Equifax and TransUnion</a> - This article from Clark Howard provides excellent guidance on how to freeze and unfreeze your credit with the three major credit bureaus to prevent identity theft.</li><li><a href="https://consumer.ftc.gov/consumer-alerts/2022/10/five-things-do-protect-yourself-online">Five things to do to protect yourself online | FTC Consumer Advice</a></li><li><a href="https://www.privacyguides.org/en/basics/threat-modeling/">Threat Modeling: The First Step on Your Privacy Journey - Privacy Guides</a> - An excellent resource to figure out how to balance security, privacy and usability.</li></ul><br/><p>--</p><p>Find subscriber links on my site, add to your podcast player, or listen on the web players on my site:</p><p><a href="https://bytesizedsecurity.show/listen">Listen to Byte Sized Security</a> </p><p>--</p><p><strong>Support this Podcast with a Tip:</strong></p><p><a href="https://bytesizedsecurity.show/support">Support Byte Sized Security</a> </p>]]></content:encoded><link><![CDATA[https://bytesizedsecurity.show/episode/ep6-securing-your-online-accounts]]></link><guid isPermaLink="false">b0459f71-9532-4fbc-8018-10fbb0e44c47</guid><itunes:image href="https://artwork.captivate.fm/6daab296-d019-4be9-bbf4-3e3566f5d395/UatAugnAE7j5mC_O7AskLuwU.png"/><pubDate>Tue, 29 Aug 2023 09:00:00 -0700</pubDate><enclosure url="https://pdcn.co/e/podcasts.captivate.fm/media/6dfe2d5f-7efa-4e9b-be94-ae3a06484f08/original-converted.mp3" length="10392699" type="audio/mpeg"/><itunes:duration>08:40</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>6</itunes:episode><podcast:episode>6</podcast:episode><podcast:season>1</podcast:season><podcast:transcript url="https://transcripts.captivate.fm/transcript/dfe7d961-017f-47ee-a2cc-b92d00ade32b/transcript.json" type="application/json"/><podcast:transcript url="https://transcripts.captivate.fm/transcript/dfe7d961-017f-47ee-a2cc-b92d00ade32b/transcript.srt" type="application/srt" rel="captions"/><podcast:transcript url="https://transcripts.captivate.fm/transcript/dfe7d961-017f-47ee-a2cc-b92d00ade32b/index.html" type="text/html"/></item><item><title>Ep5: We Want to Hear From You</title><itunes:title>Ep5: We Want to Hear From You</itunes:title><description><![CDATA[<ul><li>Please rate and review Byte Sized Security on your podcast platform of choice to help grow the show's audience.</li><li>Share any pressing cybersecurity questions or topics you want covered in future episodes. Email&nbsp;<a href="mailto:marc@justaskmarc.com" rel="noopener noreferrer" target="_blank">marc@justaskmarc.com</a></li><li>Let us know what online risks most concern you and what tech tips would make you feel safer..</li><li>Share the podcast with friends and family interested in practical tech safety.</li><li>Thank you for listening and providing feedback to improve the show!</li></ul><br/><p>---</p><p>I do hope you enjoyed this episode of the podcast.  Here's some helpful resources including any sites that were mentioned in this episode.</p><p>--</p><p>--</p><p>Find subscriber links on my site, add to your podcast player, or listen on the web players on my site:</p><p><a href="https://bytesizedsecurity.show/listen">Listen to Byte Sized Security</a> </p><p>--</p><p><strong>Support this Podcast with a Tip:</strong></p><p><a href="https://bytesizedsecurity.show/support">Support Byte Sized Security</a> </p>]]></description><content:encoded><![CDATA[<ul><li>Please rate and review Byte Sized Security on your podcast platform of choice to help grow the show's audience.</li><li>Share any pressing cybersecurity questions or topics you want covered in future episodes. Email&nbsp;<a href="mailto:marc@justaskmarc.com" rel="noopener noreferrer" target="_blank">marc@justaskmarc.com</a></li><li>Let us know what online risks most concern you and what tech tips would make you feel safer..</li><li>Share the podcast with friends and family interested in practical tech safety.</li><li>Thank you for listening and providing feedback to improve the show!</li></ul><br/><p>---</p><p>I do hope you enjoyed this episode of the podcast.  Here's some helpful resources including any sites that were mentioned in this episode.</p><p>--</p><p>--</p><p>Find subscriber links on my site, add to your podcast player, or listen on the web players on my site:</p><p><a href="https://bytesizedsecurity.show/listen">Listen to Byte Sized Security</a> </p><p>--</p><p><strong>Support this Podcast with a Tip:</strong></p><p><a href="https://bytesizedsecurity.show/support">Support Byte Sized Security</a> </p>]]></content:encoded><link><![CDATA[https://bytesizedsecurity.show/episode/ep5-we-want-to-hear-from-you]]></link><guid isPermaLink="false">1cae1995-3312-43b9-8c1f-ed90f825b615</guid><itunes:image href="https://artwork.captivate.fm/6daab296-d019-4be9-bbf4-3e3566f5d395/UatAugnAE7j5mC_O7AskLuwU.png"/><pubDate>Thu, 24 Aug 2023 09:00:00 -0700</pubDate><enclosure url="https://pdcn.co/e/podcasts.captivate.fm/media/c045271e-f810-412f-be18-f378dc7c60d1/original-converted.mp3" length="1134067" type="audio/mpeg"/><itunes:duration>01:11</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>5</itunes:episode><podcast:episode>5</podcast:episode><podcast:season>1</podcast:season><podcast:transcript url="https://transcripts.captivate.fm/transcript/d27d9cab-9cd3-4c80-92d1-657d21185dac/transcript.json" type="application/json"/><podcast:transcript url="https://transcripts.captivate.fm/transcript/d27d9cab-9cd3-4c80-92d1-657d21185dac/transcript.srt" type="application/srt" rel="captions"/><podcast:transcript url="https://transcripts.captivate.fm/transcript/d27d9cab-9cd3-4c80-92d1-657d21185dac/index.html" type="text/html"/></item><item><title>Ep4: Keeping Kids Safe Online</title><itunes:title>Ep4: Keeping Kids Safe Online</itunes:title><description><![CDATA[<p>In this solo episode of Byte Sized Security, host Marc David provides guidance for parents, teachers and caregivers on keeping children safe online. He covers:</p><ul><li>Protecting kids from online predators - Teaching them not to share personal info, limiting strangers, and monitoring communications</li><li>Discussing inappropriate content - Using parental controls, having age-appropriate conversations about explicit material</li><li>Addressing cyberbullying - Getting evidence, escalating to schools/authorities, providing emotional support</li><li>Curbing oversharing - Advising kids on smart posting habits and privacy settings</li><li>Fostering good digital citizenship - Setting family tech agreements and modeling positive behaviors</li><li>Implementing parental controls - Using built-in device restrictions and monitoring apps judiciously</li><li>Having ongoing conversations - Getting kids to open up about their online lives and habits</li><li>Encouraging kids to come forward - So adults can help navigate issues like predators, bullying, and oversharing</li><li>Balancing protection with privacy - Overseeing activity without invading their space</li></ul><br/><p>For full episode recaps, subscribe to Byte Sized Security wherever you get your podcasts or visit bytesizedsecurity.show. See you next time!</p><p>---</p><p>I do hope you enjoyed this episode of the podcast.  Here's some helpful resources including any sites that were mentioned in this episode.</p><p>--</p><p>Sites Mentioned in this Episode</p><ul><li><a href="https://connectsafely.org/parentguides/">Parent Guides from ConnectSafely</a> - A growing collection of clearly written guidebooks that demystify apps, services and platforms popular with kids and teens</li><li><a href="https://www.internetmatters.org/advice/">Internet safety advice and information</a> - Receive practical advice on the steps you can take as a parent to keep kids safe on social media, in online games and around the web</li><li><a href="https://consumer.ftc.gov/identity-theft-and-online-security/protecting-kids-online">Protecting Kids Online</a> - How to talk to your kids about being online, and how to help them make good decisions and stay safe</li><li><a href="https://www2.fbi.gov/publications/pguide/pguidee.htm">FBI Publications - A Parent's Guide to Internet Safety</a></li><li><a href="https://www.missingkids.org/netsmartz/home">NetSmartz</a> - Provides age-appropriate videos and activities to help teach children be safer online with the goal of helping children to become more aware of potential online risks</li><li><a href="https://www.commonsensemedia.org/articles/online-safety">Parenting, Media, and Everything in Between</a> - Tips to promote healthy communication and development with kids</li></ul><br/><p>--</p><p>Find subscriber links on my site, add to your podcast player, or listen on the web players on my site:</p><p><a href="https://bytesizedsecurity.show/listen">Listen to Byte Sized Security</a> </p><p>--</p><p><strong>Support this Podcast with a Tip:</strong></p><p><a href="https://bytesizedsecurity.show/support">Support Byte Sized Security</a> </p>]]></description><content:encoded><![CDATA[<p>In this solo episode of Byte Sized Security, host Marc David provides guidance for parents, teachers and caregivers on keeping children safe online. He covers:</p><ul><li>Protecting kids from online predators - Teaching them not to share personal info, limiting strangers, and monitoring communications</li><li>Discussing inappropriate content - Using parental controls, having age-appropriate conversations about explicit material</li><li>Addressing cyberbullying - Getting evidence, escalating to schools/authorities, providing emotional support</li><li>Curbing oversharing - Advising kids on smart posting habits and privacy settings</li><li>Fostering good digital citizenship - Setting family tech agreements and modeling positive behaviors</li><li>Implementing parental controls - Using built-in device restrictions and monitoring apps judiciously</li><li>Having ongoing conversations - Getting kids to open up about their online lives and habits</li><li>Encouraging kids to come forward - So adults can help navigate issues like predators, bullying, and oversharing</li><li>Balancing protection with privacy - Overseeing activity without invading their space</li></ul><br/><p>For full episode recaps, subscribe to Byte Sized Security wherever you get your podcasts or visit bytesizedsecurity.show. See you next time!</p><p>---</p><p>I do hope you enjoyed this episode of the podcast.  Here's some helpful resources including any sites that were mentioned in this episode.</p><p>--</p><p>Sites Mentioned in this Episode</p><ul><li><a href="https://connectsafely.org/parentguides/">Parent Guides from ConnectSafely</a> - A growing collection of clearly written guidebooks that demystify apps, services and platforms popular with kids and teens</li><li><a href="https://www.internetmatters.org/advice/">Internet safety advice and information</a> - Receive practical advice on the steps you can take as a parent to keep kids safe on social media, in online games and around the web</li><li><a href="https://consumer.ftc.gov/identity-theft-and-online-security/protecting-kids-online">Protecting Kids Online</a> - How to talk to your kids about being online, and how to help them make good decisions and stay safe</li><li><a href="https://www2.fbi.gov/publications/pguide/pguidee.htm">FBI Publications - A Parent's Guide to Internet Safety</a></li><li><a href="https://www.missingkids.org/netsmartz/home">NetSmartz</a> - Provides age-appropriate videos and activities to help teach children be safer online with the goal of helping children to become more aware of potential online risks</li><li><a href="https://www.commonsensemedia.org/articles/online-safety">Parenting, Media, and Everything in Between</a> - Tips to promote healthy communication and development with kids</li></ul><br/><p>--</p><p>Find subscriber links on my site, add to your podcast player, or listen on the web players on my site:</p><p><a href="https://bytesizedsecurity.show/listen">Listen to Byte Sized Security</a> </p><p>--</p><p><strong>Support this Podcast with a Tip:</strong></p><p><a href="https://bytesizedsecurity.show/support">Support Byte Sized Security</a> </p>]]></content:encoded><link><![CDATA[https://bytesizedsecurity.show/episode/e4-keeping-kids-safe-online]]></link><guid isPermaLink="false">f151473d-e211-4544-aa5f-367314d525ce</guid><itunes:image href="https://artwork.captivate.fm/6daab296-d019-4be9-bbf4-3e3566f5d395/UatAugnAE7j5mC_O7AskLuwU.png"/><pubDate>Wed, 23 Aug 2023 09:00:00 -0700</pubDate><enclosure url="https://pdcn.co/e/podcasts.captivate.fm/media/49a47bdc-6ae1-4e06-877c-d386f5c71cb4/original-converted.mp3" length="8140421" type="audio/mpeg"/><itunes:duration>06:47</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>4</itunes:episode><podcast:episode>4</podcast:episode><podcast:season>1</podcast:season><podcast:transcript url="https://transcripts.captivate.fm/transcript/9c87b65c-c6fd-485b-ae2e-a1c9bf3786b1/transcript.json" type="application/json"/><podcast:transcript url="https://transcripts.captivate.fm/transcript/9c87b65c-c6fd-485b-ae2e-a1c9bf3786b1/transcript.srt" type="application/srt" rel="captions"/><podcast:transcript url="https://transcripts.captivate.fm/transcript/9c87b65c-c6fd-485b-ae2e-a1c9bf3786b1/index.html" type="text/html"/></item><item><title>Ep3: How to Spot and Avoid Phishing Attacks</title><itunes:title>Ep3: How to Spot and Avoid Phishing Attacks</itunes:title><description><![CDATA[<p>In this episode of Byte Sized Security, host Marc David talks with expert Ethan Winnobego about how to recognize and avoid phishing scams trying to steal your personal information. They discuss:</p><ul><li>What phishing is and the major security risks it poses</li><li>Common phishing techniques like fake login alerts and malicious links</li><li>Red flags to watch out for like urgent requests for info and odd URLs</li><li>Steps to take if you suspect a phishing attempt</li><li>Safety measures like strong passwords, multi-factor authentication, and training</li><li>How companies and institutions can help defend against phishing</li><li>Why you should slow down and verify legitimacy before acting</li><li>Key advice for individuals to thwart phishing attempts</li></ul><br/><p>For full episode recaps, subscribe to Byte Sized Security wherever you get your podcasts or visit our website <a href="https://bytesizedsecurity.show" rel="noopener noreferrer" target="_blank">bytesizedsecurity.show</a>. See you next time!</p>]]></description><content:encoded><![CDATA[<p>In this episode of Byte Sized Security, host Marc David talks with expert Ethan Winnobego about how to recognize and avoid phishing scams trying to steal your personal information. They discuss:</p><ul><li>What phishing is and the major security risks it poses</li><li>Common phishing techniques like fake login alerts and malicious links</li><li>Red flags to watch out for like urgent requests for info and odd URLs</li><li>Steps to take if you suspect a phishing attempt</li><li>Safety measures like strong passwords, multi-factor authentication, and training</li><li>How companies and institutions can help defend against phishing</li><li>Why you should slow down and verify legitimacy before acting</li><li>Key advice for individuals to thwart phishing attempts</li></ul><br/><p>For full episode recaps, subscribe to Byte Sized Security wherever you get your podcasts or visit our website <a href="https://bytesizedsecurity.show" rel="noopener noreferrer" target="_blank">bytesizedsecurity.show</a>. See you next time!</p>]]></content:encoded><link><![CDATA[https://bytesizedsecurity.show/episode/ep3-how-to-spot-and-avoid-phishing-attacks]]></link><guid isPermaLink="false">0acd830c-93d9-4890-9286-9986febf5fa9</guid><itunes:image href="https://artwork.captivate.fm/6daab296-d019-4be9-bbf4-3e3566f5d395/UatAugnAE7j5mC_O7AskLuwU.png"/><pubDate>Fri, 18 Aug 2023 09:00:00 -0700</pubDate><enclosure url="https://pdcn.co/e/podcasts.captivate.fm/media/1cd779ce-c427-4aa4-892f-f419fdff80ca/original-converted.mp3" length="6319164" type="audio/mpeg"/><itunes:duration>05:16</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>3</itunes:episode><podcast:episode>3</podcast:episode><podcast:season>1</podcast:season><podcast:transcript url="https://transcripts.captivate.fm/transcript/a8652eda-63c3-4bcf-b1f3-4ea07e029658/transcript.json" type="application/json"/><podcast:transcript url="https://transcripts.captivate.fm/transcript/a8652eda-63c3-4bcf-b1f3-4ea07e029658/transcript.srt" type="application/srt" rel="captions"/><podcast:transcript url="https://transcripts.captivate.fm/transcript/a8652eda-63c3-4bcf-b1f3-4ea07e029658/index.html" type="text/html"/></item><item><title>Ep2: Securing Logins with Two-Factor Authentication</title><itunes:title>Ep2: Securing Logins with Two-Factor Authentication</itunes:title><description><![CDATA[<p>In this episode of The Byte-Sized Security Podcast, host Marc David speaks with returning expert Nancy Doe about how two-factor authentication enhances login security. They discuss:</p><ul><li>What 2FA is and how it requires both a password and a secondary code or factor to log in</li><li>Real-world examples of using an authenticator app or text code as the second factor</li><li>Benefits of 2FA like blocking hackers even if passwords are stolen</li><li>Tips for enabling 2FA on email, banking, social media, and sensitive accounts</li><li>Setting up backup codes and recovery options to avoid lockout</li><li>Emerging authentication methods like biometrics and security keys</li><li>Why adding 2FA is one of the top steps you can take to lock down accounts</li></ul><br/><p>To learn more about two-factor authentication and other practical online security techniques, visit The Byte-Sized Security Podcast website at <a href="bytesizedsecurity.show" rel="noopener noreferrer" target="_blank">bytesizedsecurity.show</a>. See you next week when we cover how to spot and avoid phishing attacks. Thanks for listening!</p><p><strong>2FA Directory:</strong></p><p><a href="﻿https://2fa.directory/us/" rel="noopener noreferrer" target="_blank"><strong>﻿</strong>https://2fa.directory/us/</a></p>]]></description><content:encoded><![CDATA[<p>In this episode of The Byte-Sized Security Podcast, host Marc David speaks with returning expert Nancy Doe about how two-factor authentication enhances login security. They discuss:</p><ul><li>What 2FA is and how it requires both a password and a secondary code or factor to log in</li><li>Real-world examples of using an authenticator app or text code as the second factor</li><li>Benefits of 2FA like blocking hackers even if passwords are stolen</li><li>Tips for enabling 2FA on email, banking, social media, and sensitive accounts</li><li>Setting up backup codes and recovery options to avoid lockout</li><li>Emerging authentication methods like biometrics and security keys</li><li>Why adding 2FA is one of the top steps you can take to lock down accounts</li></ul><br/><p>To learn more about two-factor authentication and other practical online security techniques, visit The Byte-Sized Security Podcast website at <a href="bytesizedsecurity.show" rel="noopener noreferrer" target="_blank">bytesizedsecurity.show</a>. See you next week when we cover how to spot and avoid phishing attacks. Thanks for listening!</p><p><strong>2FA Directory:</strong></p><p><a href="﻿https://2fa.directory/us/" rel="noopener noreferrer" target="_blank"><strong>﻿</strong>https://2fa.directory/us/</a></p>]]></content:encoded><link><![CDATA[https://bytesizedsecurity.show/episode/ep2-securing-logins-with-two-factor-authentication]]></link><guid isPermaLink="false">1cadd2e0-7a14-4157-b61a-d6a268032b96</guid><itunes:image href="https://artwork.captivate.fm/6daab296-d019-4be9-bbf4-3e3566f5d395/UatAugnAE7j5mC_O7AskLuwU.png"/><pubDate>Tue, 15 Aug 2023 09:00:00 -0700</pubDate><enclosure url="https://pdcn.co/e/podcasts.captivate.fm/media/b9777188-5afe-4a76-b74c-18f179cb9f48/Ep2-Securing-Logins-with-Two-Factor-Authentication.mp3" length="8897014" type="audio/mpeg"/><itunes:duration>06:11</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>2</itunes:episode><podcast:episode>2</podcast:episode><podcast:season>1</podcast:season><podcast:transcript url="https://transcripts.captivate.fm/transcript/30358318-a635-4c52-b349-decdf41c153b/transcript.json" type="application/json"/><podcast:transcript url="https://transcripts.captivate.fm/transcript/30358318-a635-4c52-b349-decdf41c153b/transcript.srt" type="application/srt" rel="captions"/><podcast:transcript url="https://transcripts.captivate.fm/transcript/30358318-a635-4c52-b349-decdf41c153b/index.html" type="text/html"/></item><item><title>Ep1: Why You Need a Password Manager</title><itunes:title>Ep1: Why You Need a Password Manager</itunes:title><description><![CDATA[<p>In this episode of the Byte-Sized Security Podcast, host Malcom Smith interviews cybersecurity expert Nancy Doe about the benefits of using a password manager. They discuss:</p><ul><li>What a password manager is and how it works to store passwords and log into accounts</li><li>Key advantages of a password manager like generating strong unique passwords, auto-fill, and secure encrypted storage</li><li>Potential downsides like someone getting the master password and service outages</li><li>Tips for choosing a password manager, like end-to-end encryption and ease of use</li><li>Specific password manager recommendations like 1Password, LastPass, and Bitwarden</li><li>Why using a password manager is critical for protecting your online accounts and data in today's world of prevalent data breaches</li></ul><br/><p>To learn more about improving your password security, visit the Byte-Sized Security Podcast website at bytesizedsecurity.show. Tune in next week when we dive into two-factor authentication. Thanks for listening!</p>]]></description><content:encoded><![CDATA[<p>In this episode of the Byte-Sized Security Podcast, host Malcom Smith interviews cybersecurity expert Nancy Doe about the benefits of using a password manager. They discuss:</p><ul><li>What a password manager is and how it works to store passwords and log into accounts</li><li>Key advantages of a password manager like generating strong unique passwords, auto-fill, and secure encrypted storage</li><li>Potential downsides like someone getting the master password and service outages</li><li>Tips for choosing a password manager, like end-to-end encryption and ease of use</li><li>Specific password manager recommendations like 1Password, LastPass, and Bitwarden</li><li>Why using a password manager is critical for protecting your online accounts and data in today's world of prevalent data breaches</li></ul><br/><p>To learn more about improving your password security, visit the Byte-Sized Security Podcast website at bytesizedsecurity.show. Tune in next week when we dive into two-factor authentication. Thanks for listening!</p>]]></content:encoded><link><![CDATA[https://bytesizedsecurity.show/episode/ep1-why-you-need-a-password-manager]]></link><guid isPermaLink="false">b4a23770-4f15-4cf4-824e-e7007d825ff7</guid><itunes:image href="https://artwork.captivate.fm/6daab296-d019-4be9-bbf4-3e3566f5d395/UatAugnAE7j5mC_O7AskLuwU.png"/><pubDate>Sun, 13 Aug 2023 09:00:00 -0700</pubDate><enclosure url="https://pdcn.co/e/podcasts.captivate.fm/media/5a1a6770-972d-4239-b43e-4a0e22529ede/Ep1-Why-You-Need-a-Password-Manager.mp3" length="6031889" type="audio/mpeg"/><itunes:duration>04:11</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>1</itunes:episode><podcast:episode>1</podcast:episode><podcast:season>1</podcast:season><podcast:transcript url="https://transcripts.captivate.fm/transcript/b6765f28-423e-4dcb-8a5e-0433235d1de4/transcript.json" type="application/json"/><podcast:transcript url="https://transcripts.captivate.fm/transcript/b6765f28-423e-4dcb-8a5e-0433235d1de4/transcript.srt" type="application/srt" rel="captions"/><podcast:transcript url="https://transcripts.captivate.fm/transcript/b6765f28-423e-4dcb-8a5e-0433235d1de4/index.html" type="text/html"/></item></channel></rss>