Chapters
Transcript
Episode notes
1 2 3 4 5 6 7 8 9 10 11 12
Introduction
00:00 • 3min
The Challenges of Cyber Security
03:10 • 4min
How to Protect Your Identity in the Age of Online Connectivity
07:18 • 4min
The Latitude Breach
11:42 • 4min
The Importance of Technology in the Security Industry
15:51 • 3min
The Colonial Pipeline Attack
19:15 • 5min
How to Protect Your Social Media Accounts
24:16 • 3min
The Importance of Two-Factor Authentication
27:46 • 3min
How to Use a Hardware Token to Protect Your Identity
30:24 • 4min
The Impact of SMS on Mobile Phone Security
34:13 • 3min
How to Secure Your Code
37:33 • 4min
How to Make Your Online Presence Safer
42:02 • 3min