Hack The Entrepreneur Inc public
[search 0]
More

Download the App!

show episodes
 
Unlike other business podcasts. No filler and no fluff. HTE is a show for people looking to take charge of their lives and build a successful online business. People who are looking for their next business idea, getting started online, and how to start a business. We understand that starting a business and doing work that matters is not always easy, but it is worth it. Learn more at https://hacktheentrepreneur.com/podcasts/
 
Impact Theory is a business and mindset-focused interview show that will teach anyone aspiring to greatness the secrets to success. The show is hosted by Tom Bilyeu - a serial entrepreneur and co-founder of the #2 Inc. 500 company Quest Nutrition and former host of the viral hit Youtube series Inside Quest (viewed over 100,000,000 times). Bilyeu is known for his passion and preparation. Always eager to truly learn from his guests, Bilyeu digs deep and brings the urgency of someone hungry to ...
 
Hosts Jesse Torres and Sid Voorakkara, cofounders of Small Business Front Inc., have important and valuable conversations with guests such as policy makers, economic development agencies, CEO's, entrepreneurs, and more to provide resources and assistance to small businesses to hack their way to success.
 
Modern Finance breaks down all things bitcoin, cryptocurrency, finance hacks & tips, decentralized finance (DeFi), yield farming, NFTs, robo-investing, and more. Join entrepreneur and technology venture capitalist Kevin Rose as he interviews experts and the entrepreneurs building modern finance tools. Time Magazine calls Kevin one of the "Top 25 Most Influential People on the Web," and Bloomberg lists him as a "Top 25 Angel Investor." Kevin has appeared on the Jimmy Fallon Show, Charlie Rose ...
 
Being Agile is all about being more flexible, adaptable and being ready to change and adjust in this ever changing world. The often forgotten "secret" to living a truly fulfilling and happy life lies in your ability to be agile. Join Jon Voigt, founder of Agility Inc, as he shares the tips, strategies and insights from Entrepreneurs and Digital Leaders across the country on how to make your business and overall life more Agile. Each week Jon will be sharing the stories of today’s most Agile ...
 
Join entrepreneur, technology investor, and self-experimenter Kevin Rose as he explores new ways to reach peak personal and professional performance. In this "podcast for the curious," Kevin interviews technologists, scientists, meditators, self-experimenters, and productivity hackers to discover insights that you can incorporate into daily life. Time Magazine calls him one of the "Top 25 Most Influential People on the Web," and Bloomberg lists him as a "Top 25 Angel Investor." Kevin has app ...
 
Taking your time is a podcast series hosted by Jacques Fu, author of Time Hacks. You will learn tips and strategies of practical time management and discover what it means to make the most out of the moments you have. In this show, we also seek to explore the feeling and reality of never having enough time. Jacques's books, and businesses he's co-founded have been featured in news outlets such as Spectrum News, the Orlando Sentinel, and Inc Magazine, Forbes, and USA Today. Jacques will draw ...
 
From behind-the-scenes interviews with the media to a look at inspiring brands and entrepreneurs that are rocking the world of PR, the Pitchin’ and Sippin’ Podcast talks tips, while taking sips, and openly discussing what makes those in the world of PR tick. Come pour it out beyond THEPRBAR inc. with Founder Lexie Smith from nine to wine to learn what really goes into landing press and achieving true influence, impact, and organic revenue with PR.
 
Loading …
show series
 
Cyber risk continues over Ukraine as the US and NATO reject Russian demands. Emissary Panda’s industrial espionage against German industry. Fancy Bear is spotted in Western Asia. The C2C market’s initial access broker Prophet Spider is selling access to unpatched VMware Horizon instances. Social engineering adapts to its marks. Thomas Etheridge fro…
 
Check out our sponsors: ButcherBox: Sign up at ButcherBox.com/impact Athletic Greens: Go to athleticgreens.com/impact and receive a FREE 1 year supply of Vitamin D AND 5 free travel packs with your first purchase! Skillshare: Explore your creativity at skillshare.com/impacttheory for a 1 month FREE trial of Premium Membership. Ombre Lab: To get $30…
 
Tensions between Russia and Ukraine remain high as NATO offers Ukraine cyber, diplomatic, and other support. North Korea gets DDoSed. DazzleSpy hits Hong Kong dissidents drawn to a watering hole. TrickBot ups its game. A quick look at ransomware trends. Microsoft’s Kevin Magee unpacks a recent World Economic Forum report. Our own Rick Howard speaks…
 
Tensions remain high as Russia assembles troops near Ukraine and NATO moves to higher states of readiness. The Belarusian Cyber Partisans claim responsibility for a ransomware attack against Belarusian railroads. The BRATA banking Trojan spreads, as does DTPacker malware. REvil alumni may be getting the band back together. Ransomware operators work…
 
Check out our sponsors: MindPump: mindpumpimpact.com Athletic Greens: Go to athleticgreens.com/impact and receive a FREE 1 year supply of Vitamin D AND 5 free travel packs with your first purchase! InsideTracker: Get 25% off their entire store at insidetracker.com/impacttheory Helix Sleep: Go to HelixSleep.com/impact for up to $200 off your mattres…
 
As entrepreneurs passionate about creating things from scratch, we are constantly looking for better ways to innovate. Luckily, we’re joined today by Taylor McPartland, the CEO and creator of ScaleHealth. Taylor created ScaleHealth to provide innovators with strategic resources and partnerships that will help them succeed in their field. We’ll clue…
 
Updates on the continuing hybrid war in Ukraine. The UK charges Russia with trying to install a puppet in Kyiv. Nominal hacktivists claim an attack against Belarusian railroads. Compromise of Greek parliamentary email accounts reported. Netherlands authorities warn against relaxing your guard against Log4j exploitation. Julian Assange will get anot…
 
COO and Co-Founder of Query. AI, Andrew Maloney, shares how the building blocks he learned in the military helped him get where he is today. Coming from a blue collar family with a minimal knowledge of computers, Andrew went into computer operations in the Air Force. While deployed to Oman just after the start of the Iraq War, Andrew said he got hi…
 
On this week's Consensus, Kevin, Feyyaz, and John O'Connell discuss the latest in Crypto and NFT. Kevin updates everyone on the new Proof Collective projects, including the Grails project and Heart You PFP. They cover the new Twitter Blue, which adds NFT profile pic support. They also cover Cover Frog Nation, An alternative to OpenSea called LOOKS,…
 
Guest Rob Boyce, Accenture's Global Lead for Cyber Incident Response and Transformation Services, joins Dave to discuss joint research done by Accenture’s Cyber Threat Intelligence (ACTI) group and Prevailion’s Adversarial Counterintelligence Team (PACT). The teams dug into recently publicized campaigns of the cyber espionage threat group Lyceum (a…
 
US and Russian talks over Ukraine conclude with an agreement to further exchanges next week. Western governments continue to recommend vigilance against the threat of Russian cyberattacks against critical infrastructure. The US Treasury Department sanctions four Ukrainian nationals for their work on behalf of Russia’s FSB and its influence operatio…
 
As Russian forces remain in assembly areas near the Ukrainian border, the US and Russia prepare for tomorrow’s high-level talks in Geneva. NATO members look to their cyber defenses. US President Biden issues a Memorandum on Improving the Cybersecurity of National Security, Department of Defense, and Intelligence Community Systems. Notes on C2C mark…
 
Check out our sponsors: ButcherBox: Sign up at ButcherBox.com/impact Athletic Greens: Go to athleticgreens.com/impact and receive a FREE 1 year supply of Vitamin D AND 5 free travel packs with your first purchase! Ombre Lab: To get $30 off -- go to: tryombre.com/Impact Helix Sleep: Go to HelixSleep.com/impact for up to $200 off your mattress and 2 …
 
Ukraine confirms that it was hit by wiper malware last week, as tension between Moscow and Kyiv remains high. It remains high as well between Russia and NATO, as Russia continues marshaling conventional forces around Ukraine. CISA advises organizations to prepare to withstand Russian cyberattacks. Other cyberespionage campaigns are reported, as is …
 
A new Chinese cyberespionage group is described. Cobalt Strike implants are observed hitting unpatched VMware Horizon servers. Ukraine attributes last week’s cyberattacks to Russia (with some possibility of Belarusian involvement as well). Microsoft doesn’t offer attribution, but it suggests that the incidents were more destructive than ransomware …
 
Check out our sponsors: ButcherBox: Sign up at ButcherBox.com/impact Athletic Greens: Go to athleticgreens.com/impact and receive a FREE 1 year supply of Vitamin D AND 5 free travel packs with your first purchase! InsideTracker: Get 25% off their entire store at insidetracker.com/impacttheory Huel: huel.com/impact Ombre Lab: To get $30 off -- go to…
 
Ever wondered how to get your start as an entrepreneur in the entertainment industry? Well you’re in luck, today we are joined by entertainment expert, Bianca Quesada, the CEO and Founder of ARCUS Studios and Zone One Productions. The entertainment industry is teeming with small businesses and Bianca is here to inspire you to take your first steps …
 
Rick explains the network defender evolution from defense-in-depth in the 1990s, to intrusion kill chains in 2010, to too many security tools and SOAR in 2015, and finally to devsecops somewhere in our future. Resources: “Cybersecurity First Principles: DevSecOps.” by Rick Howard, CSO Perspectives, The CyberWire, 8 June 2020. “FAQ,” RSA Conference,…
 
Social engineer and CEO of Hekate, Marina Ciavatta, shares her story of how people think her job is a la Mission Impossible coming from the ceiling with a rope and stealing stuff in the dead of the night. Marina does physical pentesting. Starting with an unused degree in journalism, Marina turned her talent for writing into a job as a content produ…
 
This episode features guest Alissa Knight, former hacker and partner at Knight Ink, along with Karl Mattson, CISO from Noname Security, discussing findings on severe API vulnerabilities in U.S. banking applications research that was conducted by Alissa and funded by Noname Security. The research, “Scorched Earth: Hacking Bank APIs,” unveils a numbe…
 
A large-scale cyberattack against Ukrainian websites looks like an influence operation, and Russian intelligence services are the prime suspects. The FSB raids REvil. The White House Open Source Software Security Summit looks toward software bills of materials. MuddyWater exploits Log4shell. The DPRK is working to steal cryptocurrency. Caleb Barlow…
 
A White House government-industry summit today addresses open-source software security. The US officially makes its second attribution of the week to a nation-state: it calls out Iran as the operator of the MuddyWater threat group. Israel arrests five on charges related to spying for Iran (they’re thought to have been recruited through catphishing)…
 
Check out our sponsors: BLUblox: Go to blublox.com/impacttheory for 15% off your order or use discount code ImpactTheory at checkout. Athletic Greens: Go to athleticgreens.com/impact and receive a FREE 1 year supply of Vitamin D AND 5 free travel packs with your first purchase! TextExpander: Go to textexpander.com/podcast and get 20% off your first…
 
The US issues an alert over the prospect of Russian cyberattacks, and the EU begins a series of stress tests, both in apparent response to concerns over the prospect of a Russian attack on Ukraine. NIST updates its guidance on Engineering Trustworthy Secure Systems. NIght Sky ransomware exploits Log4shell. Phishing afflicts a hotel chain. Carole Th…
 
Log4shell as an instance of a more general software supply chain issue. An APT apparently mistakenly infects itself with its own RAT. A new backdoor, SysJoker, is in use in the wild. A warning on commercial surveillance software. A leak investigation continues in Denmark. Joe Carrigan explains bogus QR codes. Our guest is Casey Allen of Concentric …
 
Check out our sponsors: BLUblox: Go to blublox.com/impacttheory for 15% off your order or use discount code ImpactTheory at checkout. Athletic Greens: Go to athleticgreens.com/impact and receive a FREE 1 year supply of Vitamin D AND 5 free travel packs with your first purchase! Novo: banknovo.com/IMPACT InsideTracker: Get 25% off their entire store…
 
CISA describes progress toward remediating Log4shell. Other open-source libraries are found to have similar issues, in one case problems deliberately introduced by the developer. Concerns are expressed over undersea cable security. FIN7’s BadUSB campaign. Security questions about another Chinese-made phone. Our guest is Bob Maley from Black Kite on…
 
Senior Vice President and Executive in Residence with Rapid7 and Chairman for Cyversity, Julian Waits, grew up in the era of the Justice League and Superman and it shaped his career. Julian always wanted to do something where he could find a way to help society to basically help others. Starting out as a Baptist minister with aspirations of being a…
 
Guest Rob Boyce, Accenture's Global Lead for Cyber Incident Response and Transformation Services, joins Dave to discuss their research "Karakurt rises from its lair." Accenture Security has identified a new threat group, the self-proclaimed Karakurt Hacking Team, that has impacted over 40 victims across multiple geographies. The threat group is fin…
 
Kazakhstan shuts down its Internet as civil unrest continues (and one consequence is a disruption of alt-coin mining in that country). The UK’s NHS warns of unknown threat actors exploiting Log4j bugs in unpatched VMware Horizon servers. In the US, CISA continues to assist Federal agencies with Log4j remediation, and observers call for more Governm…
 
ICS vendors address Log4j vulnerabilities. Regulators and legislators think about addressing issues in the software supply chain. Ransomware gangs were quick to exploit Log4shell. An old, and patched, Windows vulnerability is being exploited by the Malsmoke gang. Social engineering of Google Docs users is up. Mr. Klyshin pleads not guilty. Robert M…
 
Check out our sponsors: BLUblox: Go to blublox.com/impacttheory for 15% off your order or use discount code ImpactTheory at checkout. Athletic Greens: Go to athleticgreens.com/impact and receive a FREE 1 year supply of Vitamin D AND 5 free travel packs with your first purchase! InsideTracker: Get 25% off their entire store at insidetracker.com/impa…
 
CISA says US Federal agencies are now largely in compliance with Log4j risk mitigation guidance. The FTC issues advice and a warning on Log4j to US businesses. A skimmer is installed through cloud-delivered video. The Vice Society’s ransomware is meddling with supermarket operations in the UK. The Atlantic Council offers advice on strategy for the …
 
It’s going to take time, vigilance, and attention to detail to manage the Log4j risks. A North Korean APT is trying to install the Konni RAT into Russian diplomats’ devices. More hacktivist-looking incidents follow the anniversary of Iranian General Soleimani’s death. Other, self-inflicted, software supply chain incidents. The Kremlin is said to be…
 
Check out our sponsors: MindPump: mindpumpimpact.com Athletic Greens: Go to athleticgreens.com/impact and receive a FREE 1 year supply of Vitamin D AND 5 free travel packs with your first purchase! Audible: Start listening with a 30-day free trial, one free audiobook and access to the Plus Catalog. Visit audible.com/IMPACTTHEORY or text IMPACTTHEOR…
 
Kevin sits with the founders of the Particle Collection. Particle aims to acquire and tokenize the world's greatest masterpieces via a Particalization Process which involves taking a painting's title deed, or the legal term for proof of ownership, and dividing into (in the case of the first acquisition) a 100x100 grid resulting in 10,000 unique NFT…
 
Aquatic Panda has been found working Log4shell exploits against an academic institution. Apache fixes new Log4j issues reported last week, and Microsoft also updates Windows Defender to address Log4j risks. Cyberattacks, criminal or hacktivist in motivation, hit news outlets around the new year. Microsoft works on fixing a Y2K22 bug in on-premise E…
 
Head of Cyber Governance with Red Sift, Dr. Rois Ni Thuama shares the circuitous route of her career into cyber governance. She notes the route "looks really clean, but actually it was a bit more Jeremy Bearimy." While at Trinity College, Rois was moved to be part of history unfolding in South Africa and pause her studies. While there, she began ma…
 
Industry experts discuss their cybersecurity predictions for 2022, what trends and attacks will be most prevalent in the year ahead, and how organizations should be preparing for the new year. In this show, we cover what they think the industry might see in 2022 (and some we probably won't see). The CyberWire's Rick Howard speaks with Hash Table me…
 
Our guest Doel Santos, Threat Research Analyst at Palo Alto Networks, joins Dave Bittner to talk about Unit 42's work on "Ransomware Groups to Watch: Emerging Threats." As part of Unit 42’s commitment to stop ransomware attacks, they monitor the activity of existing groups, search for dark web leak sites and fresh onion sites, identify up-and-comin…
 
During our winter break, our team thought you might like to try a sample of a CyberWire Pro podcast called Interview Selects. These podcasts are a series of extended interviews, exclusives, and a curated selection of our most engaging and informative interviews over the years, featuring cyber security professionals, journalists, authors and industr…
 
Loading …

Quick Reference Guide

Copyright 2022 | Sitemap | Privacy Policy | Terms of Service
Google login Twitter login Classic login