018. There's No Hiding in a Digital World - featuring guests Eliot Jardines and Charissa Kim
#CyberChats4 Tammi 2024

018. There's No Hiding in a Digital World - featuring guests Eliot Jardines and Charissa Kim

Happy new year! To start off 2024, we are resolving to think more critically about all of the info we share online before we share it! To do that, we're re-listening to our first ever #CyberChats Podcast episode with Dr. Eliot Jardines. We'll see you back in a couple of weeks with new episodes and new challenges. In the meantime, let us know -- how are you resolving to stay safe online in 2024?

__________________

From your likes and dislikes to your location and even your personal conversations, your personal data is not only collected by companies every day but, thanks to new technologies, is also made available to individuals and groups around the world. So what happens with all of that seemingly harmless information when the wrong person has access to it?

In this episode, we take a closer look at the world of technology and how it affects your personal privacy. We talk with our guests about the issue of inadvertently sharing private information, explore ways in which our personal data can be exploited, and discuss what you can do to protect your information and keep it, and yourself, safe.

So, grab your headphones, and get ready to learn all about the not-so-secret life of your data. It's time to take control of your online identity and keep your private info safe!

Sign up for our #CyberChats Newsletter, participate in episode challenges with MetaCTF, and catch up on all podcast episodes at https://www.cryptolgicfoundation.org/podcast

Jaksot(62)

036. Welcome Kennedy Taylor, new Host of #CyberChats Podcast

036. Welcome Kennedy Taylor, new Host of #CyberChats Podcast

We are ecstatic to welcome Kennedy Taylor to the National Cyptologic Foundation (NCF) family! You may remember Kennedy from Season 2, where she shared her journey to cyber and the title of Miss Maryland with former host, Jennifer Langdon! Listen to learn more about Kennedy and what you can expect on the #CyberChats Podcast!

12 Syys 202456s

035. A conversation between NCF President & CEO Laura Nelson and NCF Chairman of the Board George Barnes

035. A conversation between NCF President & CEO Laura Nelson and NCF Chairman of the Board George Barnes

Welcome to a very special episode of CyberChats! In this episode, we're bringing you a talk between the National Cryptologic Foundation's (NCF) President & CEO Laura Nelson, and the NCF Chairman of the Board, George Barnes. During this discussion, you'll hear about the challenges of post-quantum cryptography, news of upcoming Convening to Act programs, how the National Security Agency (NSA) and NCF are building community, and the NSA's work toward building a future-ready workforce. George and Laura also discuss topics such as plans for the cryptologic education center, the future of the National Cryptologic Museum (NCM) and Vigilance Park, the cybersecurity collaboration center, how the balance of offense and defense has changed at the NSA, and steps the NSA is taking to make applying easier. Register for #CyberChats' Cyber Challenges below to compete individually or join a team, and look for your name on the leaderboard. For more practice, register for MetaCTF's free monthly Flash CTF. Topics discussed: NCF community questions, post-quantum cryptography, upcoming Convening to Act programs, building community with the NSA, preparing a future-ready workforce, the cryptologic education center, the NCM and Vigilance Park, the cybersecurity collaboration center, balance of offense and defense at the NSA, and NSA employment. Register here for the NCF’s FREE summer challenges with MetaCTF: https://metactf.com/join/cyberchats Never miss an episode or Challenge drop by signing up for our #CyberChats newsletter at: https://cryptologicfoundation.org/podcast

29 Elo 202448min

034. Sorting the good from the bad: Working our way through the "Basic Login" Challenge.

034. Sorting the good from the bad: Working our way through the "Basic Login" Challenge.

Hope you're having a great summer, cyberheads! In this episode of the #CyberChats special edition summer series, we use our adversarial thinking to help find and diagnose a brute force attack. We'll walk you through our thought process for solving this month's MetaCTF Cyber Challenge "Basic Login." We'll also give you an introduction to using Wireshark, the industry's most popular packet capture and analysis tool, plus some tips on using the sort features to cut down on visual clutter, and we'll revisit our old friend CyberChef. This episode will definitely give you more confidence in using Wireshark, plus some good hands-on practice. Register for #CyberChats' Cyber Challenges below to compete individually or join a team, and look for your name on the leaderboard. For more practice, register for MetaCTF's free monthly Flash CTF. Topics discussed: adversarial thinking, brute force attacks, credential stuffing, packet captures, packet analysis, Wireshark, CyberChef. Register here for the NCF’s FREE Summer challenges with MetaCTF: https://metactf.com/join/cyberchats Never miss an episode or Challenge drop by signing up for our #CyberChats newsletter at: https://cryptologicfoundation.org/podcast

15 Elo 202414min

033. Thinking like a bad actor: Why adversarial thinking can help you as a defender

033. Thinking like a bad actor: Why adversarial thinking can help you as a defender

Happy summer, Cyberheads! In this episode of the #CyberChats special edition summer series, we explore why thinking like a bad actor can help you be a better defender. In this episode, we discuss the basics of Adversarial Thinking, and how this switch in mindset can allow you to find weaknesses you might not have thought of before. What are some basic attacks that bad actors use to gain access? What are their next steps once they get in? How can you use this knowledge to slow down or stop the bad actors? Finally, put your new knowledge to practice in our third of three Summer Cyber Challenges on MetaCTF: Basic Login! Register below, compete individually or join a team, and look for your name on the leaderboard. Be sure to come back here in two weeks as we work through the Challenge together. Topics discussed: adversarial thinking, brute force attacks, account lockouts, whoami command, Wireshark, OSI model Register here for the NCF’s FREE Summer challenges with MetaCTF: https://metactf.com/join/cyberchats Never miss an episode or Challenge drop by signing up for our #CyberChats newsletter at: https://cryptologicfoundation.org/podcast

1 Elo 202411min

032. Finding your way: How to get through "Lost in the Woods"

032. Finding your way: How to get through "Lost in the Woods"

Keep those fans on MAX, cyberheads! In this episode of the #CyberChats special edition summer series, we continue to build on our theme of system security. To start, we walk through our thought process and some techniques for solving this month's Cyber Challenge on MetaCTF: "Lost in the Woods." If you had a different methodology, let us know. Next, we explore some ways to defeat credential stuffing and keep our online accounts safe. What is credential stuffing? How can we protect ourselves without being paranoid? Why do is using multiple emails a good idea? By the end of this episode, you'll have a better understanding of some new tools, like nmap, curl, and netcat, and another Cyber Challenge win. Register for #CyberChats' Cyber Challenges below to compete individually or join a team, and look for your name on the leaderboard. For more practice, register for MetaCTF's free monthly Flash CTF taking place on Friday, July19. Topics discussed: networking, nmap, curl, netcat, ssh, credential stuffing, account safety.Register here for the NCF’s FREE Summer challenges with MetaCTF: https://metactf.com/join/cyberchats Never miss an episode or Challenge drop by signing up for our #CyberChats newsletter at:https://cryptologicfoundation.org/podcast

18 Heinä 202413min

031. Securing Systems: How to make your systems less attractive to bad actors

031. Securing Systems: How to make your systems less attractive to bad actors

The heat is on, Cyberheads! In this episode of the #CyberChats special edition summer series, we explore how to improve your system security. In today's episode, we discuss the basics of how to make your phone, laptop, or PC more secure and less attractive to bad actors. How do you reduce your attack surface? How do you limit access to your location data? Why should you remove apps you don't use? What makes a good password, and how do I remember all these passwords? The answers to all of these questions are in this episode, so tune in to find out. After the episode, put your new knowledge to practice in our second of three Summer Cyber Challenges on MetaCTF: Lost in the Woods! Register below, compete individually or join a team, and look for your name on the leaderboard. Be sure to come back here in two weeks as we work through the Challenge together. Topics discussed: system security, location data, unused apps, strong password creation, password managers Register here for the NCF’s FREE Summer challenges with MetaCTF: https://metactf.com/join/cyberchats Never miss an episode or Challenge drop by signing up for our #CyberChats newsletter at: https://cryptologicfoundation.org/podcast

4 Heinä 202411min

030. How to solve HexCryption, and basics of asymmetric Cryptography

030. How to solve HexCryption, and basics of asymmetric Cryptography

Happy summer, cyberheads! Like many of you, our guests are on break and out of office, so we have some special edition episodes just for the summer. Don't worry, guests will be back to chat with us in the fall. But until then, join us on #CyberChats as we stay cool in the summer heat and dive into the freshest topics in cyber. In this episode, we give a basic primer on how asymmetric cryptography works. What is asymmetric cryptography? How can two different keys open the same lock? Why do we need asymmetric cryptography? We also take you on a walkthrough of he thought process and some techniques for completing this month's challenge - HexCryption. Did you have a different way to solve it? Tune in next episode for our next challenge, and more entertaining cyber education. Register below, compete individually or join a team, and look for your name on the leaderboard. Be sure to come back here in two weeks as we work through the Challenge together. Topics discussed: cryptography, bash tools, hexadecimal number systems, CyberChef.io. Register here for the NCF’s FREE Summer challenges with MetaCTF: https://metactf.com/join/cyberchats Never miss an episode or Challenge drop by signing up for our #CyberChats newsletter at: https://cryptologicfoundation.org/podcast

20 Kesä 20249min

029. Think Like a Computer: Putting the "Crypt" in Cryptography

029. Think Like a Computer: Putting the "Crypt" in Cryptography

Happy summer, cyberheads! Like many of you, our guests are on break and out of office, so we have some special edition episodes just for the summer. Don't worry, guests will be back to chat with us in the fall. But until then, join us on #CyberChats as we stay cool in the summer heat and dive into the freshest topics in cyber. In today's episode, we dip our toes into an introduction to cryptograhy. What is cryptography? Why do we need cryptography? How does cryptography work? To answer these questions, we'll talk about how computers think -- while you and I might look at a picture and see colors, a computer can't think in colors. So, how do computers understand reds, blues, and greens in images? Tune in to find out. After the episode, put your new knowledge to practice in our first of three Summer Cyber Challenges on MetaCTF: HexCryption! Register below, compete individually or join a team, and look for your name on the leaderboard. Be sure to come back here in two weeks as we work through the Challenge together. Topics discussed: cryptography, binary, hexadecimal number systems, computers. Register here for the NCF’s FREE Summer challenges with MetaCTF:https://metactf.com/join/cyberchats Never miss an episode or Challenge drop by signing up for our #CyberChats newsletter at:https://cryptologicfoundation.org/podcast

6 Kesä 20248min

Suosittua kategoriassa Nuorille kuuntelijoille

lasten-sadut
rss-naapurissa
rss-hei-baby
saran-kaverikirja
iltasatu-lapselle
satuillaan-yhteisia-satuhetkia-koko-perheelle
kauneimmat-lastensadut
rss-lastenohjelma-taikalipas
satuhetki
rss-hippo-satuja-lapsille
perusasento
docemilia
riivattu-rakki
rss-satupalvelu-satuja-lapsille
kaksplus
rss-hunajapurkki
perhepuhetta
pariasiaa
rss-iskapodi
rss-iskat