<?xml version="1.0" encoding="UTF-8" ?>
<?xml-stylesheet href="https://rss.buzzsprout.com/styles.xsl" type="text/xsl"?>
<rss version="2.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:podcast="https://podcastindex.org/namespace/1.0" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:psc="http://podlove.org/simple-chapters" xmlns:atom="http://www.w3.org/2005/Atom">
<channel>
  <atom:link href="https://rss.buzzsprout.com/1068769.rss" rel="self" type="application/rss+xml" />
  <atom:link href="https://pubsubhubbub.appspot.com/" rel="hub" xmlns="http://www.w3.org/2005/Atom" />
  <title>Speakeasy Security</title>

  <lastBuildDate>Thu, 19 Mar 2026 14:49:42 -0400</lastBuildDate>
  <link>http://www.eset.com</link>
  <language>en-us</language>
  <copyright>© 2026 Speakeasy Security</copyright>
  <podcast:locked>yes</podcast:locked>
    <podcast:guid>b22a9b55-bebe-500e-82e6-d190ff1e1001</podcast:guid>
  <itunes:author>Tony Anscombe</itunes:author>
  <itunes:type>episodic</itunes:type>
  <itunes:explicit>false</itunes:explicit>
  <description><![CDATA[Speakeasy Security is a new podcast from ESET. Published weekly, Cyber Speakeasy features news and commentary from ESET’s leading security professionals. Hosted by ESET Chief Security Evangelist Tony Anscombe, Speakeasy Security and a variety of expert guests will offer prescriptive advice to everyday internet users in a less technical and more accessible manner. For more information check-out https://www.eset.com/us/about/newsroom/podcast-list/]]></description>
  <generator>Buzzsprout (https://www.buzzsprout.com)</generator>
  <itunes:keywords>ESET, CyberSecurity, Malware, Privacy, IOT</itunes:keywords>
  <itunes:owner>
    <itunes:name>Tony Anscombe</itunes:name>
  </itunes:owner>
  <image>
     <url>https://storage.buzzsprout.com/bu92yuuwa0q8rk9hfoon5quem4cv?.jpg</url>
     <title>Speakeasy Security</title>
     <link>http://www.eset.com</link>
  </image>
  <itunes:image href="https://storage.buzzsprout.com/bu92yuuwa0q8rk9hfoon5quem4cv?.jpg" />
  <itunes:category text="Technology" />
  <item>
    <itunes:title>Trust in Technology - AI &amp; Driverless Cars</itunes:title>
    <title>Trust in Technology - AI &amp; Driverless Cars</title>
    <itunes:summary><![CDATA[The first episode of series 8 introduces a new co-host for this season, Kirsten Bay, Co-Founder and CEO of Cysurance. Kirsten and Tony discuss “Trust in Technology—AI and Driverless Cars”, starting off with the key question – ‘Would you take a ride in a driverless vehicle?’. Waymo driverless vehicles are a part of everyday life in some cities in the US and while early adopters may leap at the chance to ride, not everyone in society may share the same opinion. With technology integrating into ...]]></itunes:summary>
    <description><![CDATA[<p>The first episode of series 8 introduces a new co-host for this season, Kirsten Bay, Co-Founder and CEO of Cysurance. Kirsten and Tony discuss “Trust in Technology—AI and Driverless Cars”, starting off with the key question – ‘Would you take a ride in a driverless vehicle?’. Waymo driverless vehicles are a part of everyday life in some cities in the US and while early adopters may leap at the chance to ride<b>, </b>not everyone in society may share the same opinion. With technology integrating into every part of our personal and professional lives just how comfortable and trusting should we be with the new AI powered devices and services? Hear the viewpoint of your Speakeasy hosts.</p><p>This podcast is for informational purposes only and is not intended to replace professional legal, financial or insurance advice. We are not responsible for any losses, damages, or liabilities that may arise from the use of this podcast. The content and views expressed are those of the host and guests.</p>]]></description>
    <content:encoded><![CDATA[<p>The first episode of series 8 introduces a new co-host for this season, Kirsten Bay, Co-Founder and CEO of Cysurance. Kirsten and Tony discuss “Trust in Technology—AI and Driverless Cars”, starting off with the key question – ‘Would you take a ride in a driverless vehicle?’. Waymo driverless vehicles are a part of everyday life in some cities in the US and while early adopters may leap at the chance to ride<b>, </b>not everyone in society may share the same opinion. With technology integrating into every part of our personal and professional lives just how comfortable and trusting should we be with the new AI powered devices and services? Hear the viewpoint of your Speakeasy hosts.</p><p>This podcast is for informational purposes only and is not intended to replace professional legal, financial or insurance advice. We are not responsible for any losses, damages, or liabilities that may arise from the use of this podcast. The content and views expressed are those of the host and guests.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1068769/episodes/16429135-trust-in-technology-ai-driverless-cars.mp3" length="22864224" type="audio/mpeg" />
    <itunes:author>Tony Anscombe</itunes:author>
    <guid isPermaLink="false">Buzzsprout-16429135</guid>
    <pubDate>Tue, 28 Jan 2025 08:00:00 -0800</pubDate>
    <itunes:duration>1902</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>8</itunes:season>
    <itunes:episode>1</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Business transformation and hybrid working with AI: How should organisations respond to the growing cyber risk? </itunes:title>
    <title>Business transformation and hybrid working with AI: How should organisations respond to the growing cyber risk? </title>
    <itunes:summary><![CDATA[Prof. Leslie Wilcox, Professor at London School of Economics, talks to Peter Warren about the problem with digitalisation, and the importance of balancing cost-efficiency and cyber resilience.    This podcast is for informational purposes only and is not intended to replace professional legal, financial or insurance advice. We are not responsible for any losses, damages, or liabilities that may arise from the use of this podcast. The content and views expressed are those of the host and ...]]></itunes:summary>
    <description><![CDATA[<p>Prof. Leslie Wilcox, Professor at London School of Economics, talks to Peter Warren about the problem with digitalisation, and the importance of balancing cost-efficiency and cyber resilience. </p><p><br/></p><p>This podcast is for informational purposes only and is not intended to replace professional legal, financial or insurance advice. We are not responsible for any losses, damages, or liabilities that may arise from the use of this podcast. The content and views expressed are those of the host and guests.</p>]]></description>
    <content:encoded><![CDATA[<p>Prof. Leslie Wilcox, Professor at London School of Economics, talks to Peter Warren about the problem with digitalisation, and the importance of balancing cost-efficiency and cyber resilience. </p><p><br/></p><p>This podcast is for informational purposes only and is not intended to replace professional legal, financial or insurance advice. We are not responsible for any losses, damages, or liabilities that may arise from the use of this podcast. The content and views expressed are those of the host and guests.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1068769/episodes/15231435-business-transformation-and-hybrid-working-with-ai-how-should-organisations-respond-to-the-growing-cyber-risk.mp3" length="14906987" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/2mg13eucad5ynyvl2bnps0a7ka7f?.jpg" />
    <itunes:author>Tony Anscombe</itunes:author>
    <guid isPermaLink="false">Buzzsprout-15231435</guid>
    <pubDate>Tue, 08 Oct 2024 02:00:00 -0700</pubDate>
    <itunes:duration>1237</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>7</itunes:season>
    <itunes:episode>7</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>What is needed for a successful cyber insurance model in the dynamic risk environment?</itunes:title>
    <title>What is needed for a successful cyber insurance model in the dynamic risk environment?</title>
    <itunes:summary><![CDATA[Hear Peter Warren discuss insights from Prof. Leslie Wilcox, Professor at London School of Economics; Lord Francis Maude, former Minister of State for Trade and Investment; Prof Keith Martin, Director of the EPSRC Centre for Doctoral Training in Cyber Security for the Everyday; Prof. Neil Barrett, former advisor of cybercrime to then Home Labour Secretary ,Jack Straw; Martin Borrett, IBM Security’s UK Technical Director; David Chavez, Cyber Insurance Product Manager and Tushar Nandwana, Risk ...]]></itunes:summary>
    <description><![CDATA[<p>Hear Peter Warren discuss insights from Prof. Leslie Wilcox, Professor at London School of Economics; Lord Francis Maude, former Minister of State for Trade and Investment; Prof Keith Martin, Director of the EPSRC Centre for Doctoral Training in Cyber Security for the Everyday; Prof. Neil Barrett, former advisor of cybercrime to then Home Labour Secretary ,Jack Straw; Martin Borrett, IBM Security’s UK Technical Director; David Chavez, Cyber Insurance Product Manager and Tushar Nandwana, Risk Control Technology Segment Manager at Intact Insurance Specialty Solutions, and Dr Constance Dierickx, Founder and President of CD Consulting Group.</p><p><br/></p><p>This podcast is for informational purposes only and is not intended to replace professional legal, financial or insurance advice. We are not responsible for any losses, damages, or liabilities that may arise from the use of this podcast. The content and views expressed are those of the host and guests.</p>]]></description>
    <content:encoded><![CDATA[<p>Hear Peter Warren discuss insights from Prof. Leslie Wilcox, Professor at London School of Economics; Lord Francis Maude, former Minister of State for Trade and Investment; Prof Keith Martin, Director of the EPSRC Centre for Doctoral Training in Cyber Security for the Everyday; Prof. Neil Barrett, former advisor of cybercrime to then Home Labour Secretary ,Jack Straw; Martin Borrett, IBM Security’s UK Technical Director; David Chavez, Cyber Insurance Product Manager and Tushar Nandwana, Risk Control Technology Segment Manager at Intact Insurance Specialty Solutions, and Dr Constance Dierickx, Founder and President of CD Consulting Group.</p><p><br/></p><p>This podcast is for informational purposes only and is not intended to replace professional legal, financial or insurance advice. We are not responsible for any losses, damages, or liabilities that may arise from the use of this podcast. The content and views expressed are those of the host and guests.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1068769/episodes/15231715-what-is-needed-for-a-successful-cyber-insurance-model-in-the-dynamic-risk-environment.mp3" length="14820434" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/idap4t26zfk30i28mzhmj5rewegv?.jpg" />
    <itunes:author>Tony Anscombe</itunes:author>
    <guid isPermaLink="false">Buzzsprout-15231715</guid>
    <pubDate>Wed, 18 Sep 2024 02:00:00 -0700</pubDate>
    <itunes:duration>1229</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>7</itunes:season>
    <itunes:episode>6</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Cyber insurance in a volatile risk environment: The need for an ongoing partnership between insurers and insurees. </itunes:title>
    <title>Cyber insurance in a volatile risk environment: The need for an ongoing partnership between insurers and insurees. </title>
    <itunes:summary><![CDATA[Hear from Peter Warren’s conversations with Lorenzo Callerio, Senior Director of Alvarez and Marsal; Paul Cragg, CTO of Norm Managed Security Service Provider; David Chavez, Cyber Insurance Product Manager and Tushar Nandwana, Risk Control Technology Segment Manager at Intact Insurance Specialty Solutions to learn more.  This podcast is for informational purposes only and is not intended to replace professional legal, financial or insurance advice. We are not responsible for any losses, ...]]></itunes:summary>
    <description><![CDATA[<p>Hear from Peter Warren’s conversations with Lorenzo Callerio, Senior Director of Alvarez and Marsal; Paul Cragg, CTO of Norm Managed Security Service Provider; David Chavez, Cyber Insurance Product Manager and Tushar Nandwana, Risk Control Technology Segment Manager at Intact Insurance Specialty Solutions to learn more. </p><p>This podcast is for informational purposes only and is not intended to replace professional legal, financial or insurance advice. We are not responsible for any losses, damages, or liabilities that may arise from the use of this podcast. The content and views expressed are those of the host and guests.</p>]]></description>
    <content:encoded><![CDATA[<p>Hear from Peter Warren’s conversations with Lorenzo Callerio, Senior Director of Alvarez and Marsal; Paul Cragg, CTO of Norm Managed Security Service Provider; David Chavez, Cyber Insurance Product Manager and Tushar Nandwana, Risk Control Technology Segment Manager at Intact Insurance Specialty Solutions to learn more. </p><p>This podcast is for informational purposes only and is not intended to replace professional legal, financial or insurance advice. We are not responsible for any losses, damages, or liabilities that may arise from the use of this podcast. The content and views expressed are those of the host and guests.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1068769/episodes/15231593-cyber-insurance-in-a-volatile-risk-environment-the-need-for-an-ongoing-partnership-between-insurers-and-insurees.mp3" length="19133266" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/lt77bvy2u45g7znnte88xz46r113?.jpg" />
    <itunes:author>Tony Anscombe</itunes:author>
    <guid isPermaLink="false">Buzzsprout-15231593</guid>
    <pubDate>Wed, 04 Sep 2024 02:00:00 -0700</pubDate>
    <itunes:duration>1588</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>7</itunes:season>
    <itunes:episode>5</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Cyber insurance and the law. How are regulators responding to the increased pace of digital transformation?</itunes:title>
    <title>Cyber insurance and the law. How are regulators responding to the increased pace of digital transformation?</title>
    <itunes:summary><![CDATA[More data means more risks. More risk means more legislation, but how can new legislation mitigate cyber risk? Hear Peter Warren talk to Robert Santifort, Principal Associate at Eversheds Law Firm, and Richard Breavington, Partner at RPC Law Firm to find out.  This podcast is for informational purposes only and is not intended to replace professional legal, financial or insurance advice. We are not responsible for any losses, damages, or liabilities that may arise from the use of this po...]]></itunes:summary>
    <description><![CDATA[<p>More data means more risks. More risk means more legislation, but how can new legislation mitigate cyber risk? Hear Peter Warren talk to Robert Santifort, Principal Associate at Eversheds Law Firm, and Richard Breavington, Partner at RPC Law Firm to find out. </p><p>This podcast is for informational purposes only and is not intended to replace professional legal, financial or insurance advice. We are not responsible for any losses, damages, or liabilities that may arise from the use of this podcast. The content and views expressed are those of the host and guests.</p>]]></description>
    <content:encoded><![CDATA[<p>More data means more risks. More risk means more legislation, but how can new legislation mitigate cyber risk? Hear Peter Warren talk to Robert Santifort, Principal Associate at Eversheds Law Firm, and Richard Breavington, Partner at RPC Law Firm to find out. </p><p>This podcast is for informational purposes only and is not intended to replace professional legal, financial or insurance advice. We are not responsible for any losses, damages, or liabilities that may arise from the use of this podcast. The content and views expressed are those of the host and guests.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1068769/episodes/15231423-cyber-insurance-and-the-law-how-are-regulators-responding-to-the-increased-pace-of-digital-transformation.mp3" length="15174222" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/5ralxcxbcz7jgnefuog8o8wgxu86?.jpg" />
    <itunes:author>Tony Anscombe</itunes:author>
    <guid isPermaLink="false">Buzzsprout-15231423</guid>
    <pubDate>Wed, 21 Aug 2024 02:00:00 -0700</pubDate>
    <itunes:duration>1258</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>7</itunes:season>
    <itunes:episode>4</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Technological literacy amongst boardrooms is a must for a strong cyber insurability posture</itunes:title>
    <title>Technological literacy amongst boardrooms is a must for a strong cyber insurability posture</title>
    <itunes:summary><![CDATA[Learn more from Peter Warren’s interviews with Roger Barker, Director of Policy and Corporate Governance of the UK Institute of Directors; Lorenzo Callerio, Senior Director of Alvarez and Marsal; and Lord Francis Maude, former Minister of State for Trade and Investment.  This podcast is for informational purposes only and is not intended to replace professional legal, financial or insurance advice. We are not responsible for any losses, damages, or liabilities that may arise from the use...]]></itunes:summary>
    <description><![CDATA[<p>Learn more from Peter Warren’s interviews with Roger Barker, Director of Policy and Corporate Governance of the UK Institute of Directors; Lorenzo Callerio, Senior Director of Alvarez and Marsal; and Lord Francis Maude, former Minister of State for Trade and Investment. </p><p>This podcast is for informational purposes only and is not intended to replace professional legal, financial or insurance advice. We are not responsible for any losses, damages, or liabilities that may arise from the use of this podcast. The content and views expressed are those of the host and guests.</p>]]></description>
    <content:encoded><![CDATA[<p>Learn more from Peter Warren’s interviews with Roger Barker, Director of Policy and Corporate Governance of the UK Institute of Directors; Lorenzo Callerio, Senior Director of Alvarez and Marsal; and Lord Francis Maude, former Minister of State for Trade and Investment. </p><p>This podcast is for informational purposes only and is not intended to replace professional legal, financial or insurance advice. We are not responsible for any losses, damages, or liabilities that may arise from the use of this podcast. The content and views expressed are those of the host and guests.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1068769/episodes/15231402-technological-literacy-amongst-boardrooms-is-a-must-for-a-strong-cyber-insurability-posture.mp3" length="11475852" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/ggj4i7txoxfpfb7xl0tve7byrfo5?.jpg" />
    <itunes:author>Tony Anscombe</itunes:author>
    <guid isPermaLink="false">Buzzsprout-15231402</guid>
    <pubDate>Wed, 07 Aug 2024 02:00:00 -0700</pubDate>
    <itunes:duration>951</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>7</itunes:season>
    <itunes:episode>3</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>true</itunes:explicit>
  </item>
  <item>
    <itunes:title>How will AI impact the future of cybercrime and digital security?</itunes:title>
    <title>How will AI impact the future of cybercrime and digital security?</title>
    <itunes:summary><![CDATA[Join Peter Warren; Martin Borrett, IBM Security’s UK Technical Director; Prof. Neil Barrett, former advisor of cybercrime to then Home Labour Secretary ,Jack Straw, and Prof Keith Martin, Director of the EPSRC Centre for Doctoral Training in Cyber Security for the Everyday, as they discuss how organisations can use AI to defend against the growing threat of cybercrime in an increasingly digital world.    This podcast is for informational purposes only and is not intended to replace profe...]]></itunes:summary>
    <description><![CDATA[<p>Join Peter Warren; Martin Borrett, IBM Security’s UK Technical Director; Prof. Neil Barrett, former advisor of cybercrime to then Home Labour Secretary ,Jack Straw, and Prof Keith Martin, Director of the EPSRC Centre for Doctoral Training in Cyber Security for the Everyday, as they discuss how organisations can use AI to defend against the growing threat of cybercrime in an increasingly digital world. </p><p><br/></p><p>This podcast is for informational purposes only and is not intended to replace professional legal, financial or insurance advice. We are not responsible for any losses, damages, or liabilities that may arise from the use of this podcast. The content and views expressed are those of the host and guests.</p>]]></description>
    <content:encoded><![CDATA[<p>Join Peter Warren; Martin Borrett, IBM Security’s UK Technical Director; Prof. Neil Barrett, former advisor of cybercrime to then Home Labour Secretary ,Jack Straw, and Prof Keith Martin, Director of the EPSRC Centre for Doctoral Training in Cyber Security for the Everyday, as they discuss how organisations can use AI to defend against the growing threat of cybercrime in an increasingly digital world. </p><p><br/></p><p>This podcast is for informational purposes only and is not intended to replace professional legal, financial or insurance advice. We are not responsible for any losses, damages, or liabilities that may arise from the use of this podcast. The content and views expressed are those of the host and guests.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1068769/episodes/15231443-how-will-ai-impact-the-future-of-cybercrime-and-digital-security.mp3" length="15840383" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/w0bvvvupjxb4fysswoss8r7ta9gh?.jpg" />
    <itunes:author>Tony Anscombe</itunes:author>
    <guid isPermaLink="false">Buzzsprout-15231443</guid>
    <pubDate>Wed, 31 Jul 2024 02:00:00 -0700</pubDate>
    <itunes:duration>1315</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>7</itunes:season>
    <itunes:episode>2</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Prevent. Protect. Insure: Why cyber insurance should be the new normal for organisations of all sizes in this digital age</itunes:title>
    <title>Prevent. Protect. Insure: Why cyber insurance should be the new normal for organisations of all sizes in this digital age</title>
    <itunes:summary><![CDATA[Introducing our series of podcasts unpacking cyber insurance and its significant relevance to companies in this digital era. Peter Warren, an award-winning investigative journalist, writer, and broadcaster chats to Tony Anscombe, ESET’s Chief Security Evangelist with over 20 years of international leadership experience in business development, partnerships, and as a company spokesperson.   This podcast is for informational purposes only and is not intended to replace professional legal, finan...]]></itunes:summary>
    <description><![CDATA[<p>Introducing our series of podcasts unpacking cyber insurance and its significant relevance to companies in this digital era. Peter Warren, an award-winning investigative journalist, writer, and broadcaster chats to Tony Anscombe, ESET’s Chief Security Evangelist with over 20 years of international leadership experience in business development, partnerships, and as a company spokesperson.<br/><br/></p><p>This podcast is for informational purposes only and is not intended to replace professional legal, financial or insurance advice. We are not responsible for any losses, damages, or liabilities that may arise from the use of this podcast. The content and views expressed are those of the host and guests.</p>]]></description>
    <content:encoded><![CDATA[<p>Introducing our series of podcasts unpacking cyber insurance and its significant relevance to companies in this digital era. Peter Warren, an award-winning investigative journalist, writer, and broadcaster chats to Tony Anscombe, ESET’s Chief Security Evangelist with over 20 years of international leadership experience in business development, partnerships, and as a company spokesperson.<br/><br/></p><p>This podcast is for informational purposes only and is not intended to replace professional legal, financial or insurance advice. We are not responsible for any losses, damages, or liabilities that may arise from the use of this podcast. The content and views expressed are those of the host and guests.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1068769/episodes/15231914-prevent-protect-insure-why-cyber-insurance-should-be-the-new-normal-for-organisations-of-all-sizes-in-this-digital-age.mp3" length="22223100" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/cl9qnhc7xhq2dhy3odftl8au1j6j?.jpg" />
    <itunes:author>Tony Anscombe</itunes:author>
    <guid isPermaLink="false">Buzzsprout-15231914</guid>
    <pubDate>Wed, 26 Jun 2024 02:00:00 -0700</pubDate>
    <itunes:duration>1848</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>7</itunes:season>
    <itunes:episode>1</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Deepfakes: Navigating what’s real and what’s not.</itunes:title>
    <title>Deepfakes: Navigating what’s real and what’s not.</title>
    <itunes:summary><![CDATA[The episode kicks off with an overview of what deepfakes are and how the technology is being used positively in industries such as movie making, while others use it to trick the viewer into thinking their loved one may have been kidnapped or that their favorite celebrity is now endorsing certain products. The hosts also address the ethical concerns tied to deepfakes, touching on issues of misinformation, privacy invasion, and potential harm to individuals, especially children. The hosts touch...]]></itunes:summary>
    <description><![CDATA[<p>The episode kicks off with an overview of what deepfakes are and how the technology is being used positively in industries such as movie making, while others use it to trick the viewer into thinking their loved one may have been kidnapped or that their favorite celebrity is now endorsing certain products. The hosts also address the ethical concerns tied to deepfakes, touching on issues of misinformation, privacy invasion, and potential harm to individuals, especially children. The hosts touch-on the legal landscape surrounding deepfake content when children use the technology to create inappropriate images of other children.</p><p>Tune in for a thought-provoking discussion that navigates the landscape of deepfake technology, prompting reflection on the responsible use of AI and the importance of safeguarding the integrity of our digital reality.</p><p>This podcast is for informational purposes only and is not intended to replace professional legal, financial or insurance advice. We are not responsible for any losses, damages, or liabilities that may arise from the use of this podcast. The content and views expressed are those of the host and guests.</p>]]></description>
    <content:encoded><![CDATA[<p>The episode kicks off with an overview of what deepfakes are and how the technology is being used positively in industries such as movie making, while others use it to trick the viewer into thinking their loved one may have been kidnapped or that their favorite celebrity is now endorsing certain products. The hosts also address the ethical concerns tied to deepfakes, touching on issues of misinformation, privacy invasion, and potential harm to individuals, especially children. The hosts touch-on the legal landscape surrounding deepfake content when children use the technology to create inappropriate images of other children.</p><p>Tune in for a thought-provoking discussion that navigates the landscape of deepfake technology, prompting reflection on the responsible use of AI and the importance of safeguarding the integrity of our digital reality.</p><p>This podcast is for informational purposes only and is not intended to replace professional legal, financial or insurance advice. We are not responsible for any losses, damages, or liabilities that may arise from the use of this podcast. The content and views expressed are those of the host and guests.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1068769/episodes/14108166-deepfakes-navigating-what-s-real-and-what-s-not.mp3" length="22002860" type="audio/mpeg" />
    <itunes:author>Tony Anscombe</itunes:author>
    <guid isPermaLink="false">Buzzsprout-14108166</guid>
    <pubDate>Fri, 08 Dec 2023 10:00:00 -0800</pubDate>
    <itunes:duration>1830</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>6</itunes:season>
    <itunes:episode>1</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Cybersecurity challenges according to a crypto exchange CISO</itunes:title>
    <title>Cybersecurity challenges according to a crypto exchange CISO</title>
    <itunes:summary><![CDATA[Crypto security is getting plenty of attention amid recent hacks. This month’s podcast features cybersecurity expert Pasi Koistinen, who runs crypto security for Coinhako, the renowned crypto exchange to buy cryptocurrencies in Singapore and Asia. We geek out on the technology, security challenges, and the role of crypto in emerging markets.   Pasi Koistinen - https://www.linkedin.com/in/pasikoistinen/ This podcast is for informational purposes only and is not intended to replace profess...]]></itunes:summary>
    <description><![CDATA[<p>Crypto security is getting plenty of attention amid recent hacks. This month’s podcast features cybersecurity expert Pasi Koistinen, who runs crypto security for Coinhako, the renowned crypto exchange to buy cryptocurrencies in Singapore and Asia. We geek out on the technology, security challenges, and the role of crypto in emerging markets. <br/><br/>Pasi Koistinen - https://www.linkedin.com/in/pasikoistinen/</p><p>This podcast is for informational purposes only and is not intended to replace professional legal, financial or insurance advice. We are not responsible for any losses, damages, or liabilities that may arise from the use of this podcast. The content and views expressed are those of the host and guests.</p>]]></description>
    <content:encoded><![CDATA[<p>Crypto security is getting plenty of attention amid recent hacks. This month’s podcast features cybersecurity expert Pasi Koistinen, who runs crypto security for Coinhako, the renowned crypto exchange to buy cryptocurrencies in Singapore and Asia. We geek out on the technology, security challenges, and the role of crypto in emerging markets. <br/><br/>Pasi Koistinen - https://www.linkedin.com/in/pasikoistinen/</p><p>This podcast is for informational purposes only and is not intended to replace professional legal, financial or insurance advice. We are not responsible for any losses, damages, or liabilities that may arise from the use of this podcast. The content and views expressed are those of the host and guests.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1068769/episodes/10670354-cybersecurity-challenges-according-to-a-crypto-exchange-ciso.mp3" length="22610004" type="audio/mpeg" />
    <itunes:author>Tony Anscombe</itunes:author>
    <guid isPermaLink="false">Buzzsprout-10670354</guid>
    <pubDate>Tue, 31 May 2022 14:00:00 -0700</pubDate>
    <itunes:duration>1882</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>5</itunes:season>
    <itunes:episode>7</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Predictions on the cybersecurity sector from one of Wall Street&#39;s top tech analysts</itunes:title>
    <title>Predictions on the cybersecurity sector from one of Wall Street&#39;s top tech analysts</title>
    <itunes:summary><![CDATA[The Cybersecurity sector will continue to see plenty more spending. That’s the prediction from Wall Street’s top tech analyst Dan Ives of Wedbush Securities. He read the tea leaves for the industry – with thoughts on M&amp;A; cybersecurity around cryptocurrency; and why private cybersecurity research firms like ESET are so important.    https://www.wedbush.com/  https://www.linkedin.com/in/daniel-ives-542321a8/   This podcast is for informational purposes only and is not intend...]]></itunes:summary>
    <description><![CDATA[<p>The Cybersecurity sector will continue to see plenty more spending. That’s the prediction from Wall Street’s top tech analyst Dan Ives of Wedbush Securities. He read the tea leaves for the industry – with thoughts on M&amp;A; cybersecurity around cryptocurrency; and why private cybersecurity research firms like ESET are so important.<br/> <br/> https://www.wedbush.com/<br/> https://www.linkedin.com/in/daniel-ives-542321a8/<br/><br/></p><p>This podcast is for informational purposes only and is not intended to replace professional legal, financial or insurance advice. We are not responsible for any losses, damages, or liabilities that may arise from the use of this podcast. The content and views expressed are those of the host and guests.</p>]]></description>
    <content:encoded><![CDATA[<p>The Cybersecurity sector will continue to see plenty more spending. That’s the prediction from Wall Street’s top tech analyst Dan Ives of Wedbush Securities. He read the tea leaves for the industry – with thoughts on M&amp;A; cybersecurity around cryptocurrency; and why private cybersecurity research firms like ESET are so important.<br/> <br/> https://www.wedbush.com/<br/> https://www.linkedin.com/in/daniel-ives-542321a8/<br/><br/></p><p>This podcast is for informational purposes only and is not intended to replace professional legal, financial or insurance advice. We are not responsible for any losses, damages, or liabilities that may arise from the use of this podcast. The content and views expressed are those of the host and guests.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1068769/episodes/10357697-predictions-on-the-cybersecurity-sector-from-one-of-wall-street-s-top-tech-analysts.mp3" length="17890455" type="audio/mpeg" />
    <itunes:author>Tony Anscombe</itunes:author>
    <guid isPermaLink="false">Buzzsprout-10357697</guid>
    <pubDate>Thu, 31 Mar 2022 18:00:00 -0700</pubDate>
    <itunes:duration>1488</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>5</itunes:season>
    <itunes:episode>6</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Highlights from CES: A security researcher&#39;s perspective </itunes:title>
    <title>Highlights from CES: A security researcher&#39;s perspective </title>
    <itunes:summary><![CDATA[The Consumer Electronics Show (CES) is one of the world's largest technology events,  bringing together manufacturers, developers and suppliers of consumer technology.  We catch-up with Cameron Camp, an ESET security researcher, who has been pounding the exhibition floor, to get his view on the new innovative technology on show,  the possible benefits it may deliver to society, and to talk through a few of the potential cybersecurity risks the new tech may need to address.&nbsp...]]></itunes:summary>
    <description><![CDATA[<p>The Consumer Electronics Show (CES) is one of the world&apos;s largest technology events,  bringing together manufacturers, developers and suppliers of consumer technology.  We catch-up with Cameron Camp, an ESET security researcher, who has been pounding the exhibition floor, to get his view on the new innovative technology on show,  the possible benefits it may deliver to society, and to talk through a few of the potential cybersecurity risks the new tech may need to address. <br/><br/>https://www.ces.tech/<br/>https://www.welivesecurity.com/2022/01/06/ces-2022-more-sensors-than-people/<br/>https://www.welivesecurity.com/2022/01/07/ces-2022-space-security-no-more-flying-blind/<br/><br/></p><p>This podcast is for informational purposes only and is not intended to replace professional legal, financial or insurance advice. We are not responsible for any losses, damages, or liabilities that may arise from the use of this podcast. The content and views expressed are those of the host and guests.</p>]]></description>
    <content:encoded><![CDATA[<p>The Consumer Electronics Show (CES) is one of the world&apos;s largest technology events,  bringing together manufacturers, developers and suppliers of consumer technology.  We catch-up with Cameron Camp, an ESET security researcher, who has been pounding the exhibition floor, to get his view on the new innovative technology on show,  the possible benefits it may deliver to society, and to talk through a few of the potential cybersecurity risks the new tech may need to address. <br/><br/>https://www.ces.tech/<br/>https://www.welivesecurity.com/2022/01/06/ces-2022-more-sensors-than-people/<br/>https://www.welivesecurity.com/2022/01/07/ces-2022-space-security-no-more-flying-blind/<br/><br/></p><p>This podcast is for informational purposes only and is not intended to replace professional legal, financial or insurance advice. We are not responsible for any losses, damages, or liabilities that may arise from the use of this podcast. The content and views expressed are those of the host and guests.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1068769/episodes/9849258-highlights-from-ces-a-security-researcher-s-perspective.mp3" length="20221362" type="audio/mpeg" />
    <itunes:author>Tony Anscombe</itunes:author>
    <guid isPermaLink="false">Buzzsprout-9849258</guid>
    <pubDate>Fri, 07 Jan 2022 17:00:00 -0800</pubDate>
    <itunes:duration>1683</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>5</itunes:season>
    <itunes:episode>5</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>How to avoid online scams and fraud on Black Friday and Cyber Monday    </itunes:title>
    <title>How to avoid online scams and fraud on Black Friday and Cyber Monday    </title>
    <itunes:summary><![CDATA[With the holiday season upon us inboxes are filling up with the must have bargains as online retailers try to tempt us into securing a bargain, unfortunately cyber scammers also recognize this as an opportunity to make money.  Keir Humble, an ESET sales engineer, joins Speakeasy's host, Tony Anscombe, to discuss how to stay cyber-safe, avoiding the pitfalls of phishing emails through to the best practices when landing in the online checkout.   Links: https://www.eset.com/us/about/ne...]]></itunes:summary>
    <description><![CDATA[<p>With the holiday season upon us inboxes are filling up with the must have bargains as online retailers try to tempt us into securing a bargain, unfortunately cyber scammers also recognize this as an opportunity to make money.  Keir Humble, an ESET sales engineer, joins Speakeasy&apos;s host, Tony Anscombe, to discuss how to stay cyber-safe, avoiding the pitfalls of phishing emails through to the best practices when landing in the online checkout. <br/><br/>Links:<br/>https://www.eset.com/us/about/newsroom/corporate-blog/9-tips-for-safe-online-shopping-on-black-friday-and-beyond/<br/><br/></p><p>This podcast is for informational purposes only and is not intended to replace professional legal, financial or insurance advice. We are not responsible for any losses, damages, or liabilities that may arise from the use of this podcast. The content and views expressed are those of the host and guests.</p>]]></description>
    <content:encoded><![CDATA[<p>With the holiday season upon us inboxes are filling up with the must have bargains as online retailers try to tempt us into securing a bargain, unfortunately cyber scammers also recognize this as an opportunity to make money.  Keir Humble, an ESET sales engineer, joins Speakeasy&apos;s host, Tony Anscombe, to discuss how to stay cyber-safe, avoiding the pitfalls of phishing emails through to the best practices when landing in the online checkout. <br/><br/>Links:<br/>https://www.eset.com/us/about/newsroom/corporate-blog/9-tips-for-safe-online-shopping-on-black-friday-and-beyond/<br/><br/></p><p>This podcast is for informational purposes only and is not intended to replace professional legal, financial or insurance advice. We are not responsible for any losses, damages, or liabilities that may arise from the use of this podcast. The content and views expressed are those of the host and guests.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1068769/episodes/9575382-how-to-avoid-online-scams-and-fraud-on-black-friday-and-cyber-monday.mp3" length="23618773" type="audio/mpeg" />
    <itunes:author>Tony Anscombe</itunes:author>
    <guid isPermaLink="false">Buzzsprout-9575382</guid>
    <pubDate>Fri, 19 Nov 2021 10:00:00 -0800</pubDate>
    <itunes:duration>1966</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>5</itunes:season>
    <itunes:episode>4</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>The NFT market is evolving - what&#39;s happening and where next?</itunes:title>
    <title>The NFT market is evolving - what&#39;s happening and where next?</title>
    <itunes:summary><![CDATA[The topic of NFT’s, that’s Non-fungible token’s, if frequently in the media, and is a subject the Speakeasy team have discussed before. We revisit the topic to discuss what drives a buyer to purchase, for example, the popular ‘side-eyeing Chloe’ image that recently sold for $75,000. And how a purchaser was duped out of £244,000 buying, what they thought was, the very first NFT Banksy artwork. If you're considering entering the NFT market then it's important to know what to be on lookout for a...]]></itunes:summary>
    <description><![CDATA[<p>The topic of NFT’s, that’s Non-fungible token’s, if frequently in the media, and is a subject the Speakeasy team have discussed before. We revisit the topic to discuss what drives a buyer to purchase, for example, the popular ‘side-eyeing Chloe’ image that recently sold for $75,000. And how a purchaser was duped out of £244,000 buying, what they thought was, the very first NFT Banksy artwork. If you&apos;re considering entering the NFT market then it&apos;s important to know what to be on lookout for and my guest on this episode, Cameron Camp, from the ESET research team, provides some sound advice.   <br/><br/>Links:<br/><a href='https://www.siliconvalley.com/2021/09/29/disneyland-meme-of-viral-side-eyeing-chloe-sells-for-75000/'>https://www.siliconvalley.com/2021/09/29/disneyland-meme-of-viral-side-eyeing-chloe-sells-for-75000/</a></p><p><a href='https://www.bbc.com/news/technology-58585342'>https://www.bbc.com/news/technology-58585342</a></p><p><a href='https://www.bbc.com/news/technology-58343062'>https://www.bbc.com/news/technology-58343062</a></p><p><a href='https://www.bbc.com/news/technology-58399338'>https://www.bbc.com/news/technology-58399338</a></p><p>This podcast is for informational purposes only and is not intended to replace professional legal, financial or insurance advice. We are not responsible for any losses, damages, or liabilities that may arise from the use of this podcast. The content and views expressed are those of the host and guests.</p>]]></description>
    <content:encoded><![CDATA[<p>The topic of NFT’s, that’s Non-fungible token’s, if frequently in the media, and is a subject the Speakeasy team have discussed before. We revisit the topic to discuss what drives a buyer to purchase, for example, the popular ‘side-eyeing Chloe’ image that recently sold for $75,000. And how a purchaser was duped out of £244,000 buying, what they thought was, the very first NFT Banksy artwork. If you&apos;re considering entering the NFT market then it&apos;s important to know what to be on lookout for and my guest on this episode, Cameron Camp, from the ESET research team, provides some sound advice.   <br/><br/>Links:<br/><a href='https://www.siliconvalley.com/2021/09/29/disneyland-meme-of-viral-side-eyeing-chloe-sells-for-75000/'>https://www.siliconvalley.com/2021/09/29/disneyland-meme-of-viral-side-eyeing-chloe-sells-for-75000/</a></p><p><a href='https://www.bbc.com/news/technology-58585342'>https://www.bbc.com/news/technology-58585342</a></p><p><a href='https://www.bbc.com/news/technology-58343062'>https://www.bbc.com/news/technology-58343062</a></p><p><a href='https://www.bbc.com/news/technology-58399338'>https://www.bbc.com/news/technology-58399338</a></p><p>This podcast is for informational purposes only and is not intended to replace professional legal, financial or insurance advice. We are not responsible for any losses, damages, or liabilities that may arise from the use of this podcast. The content and views expressed are those of the host and guests.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1068769/episodes/9336625-the-nft-market-is-evolving-what-s-happening-and-where-next.mp3" length="19371868" type="audio/mpeg" />
    <itunes:author>Tony Anscombe</itunes:author>
    <guid isPermaLink="false">Buzzsprout-9336625</guid>
    <pubDate>Fri, 08 Oct 2021 15:00:00 -0700</pubDate>
    <itunes:duration>1612</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>5</itunes:season>
    <itunes:episode>3</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>The password-less future </itunes:title>
    <title>The password-less future </title>
    <itunes:summary><![CDATA[Microsoft's recently announcement that users can delete passwords and adopt a password-less environment using alternative authentication such as an authenticator app. Does this signal the beginning of the end for password based authentication. Keir Humble, an ESET sales engineer, joins Speakeasy's host, Tony Anscombe, to discuss what this means for users and whether the proposed new password-less world is more or less secure.   Episode links: https://www.microsoft.com/security/blog/2021/...]]></itunes:summary>
    <description><![CDATA[<p>Microsoft&apos;s recently announcement that users can delete passwords and adopt a password-less environment using alternative authentication such as an authenticator app. Does this signal the beginning of the end for password based authentication. Keir Humble, an ESET sales engineer, joins Speakeasy&apos;s host, Tony Anscombe, to discuss what this means for users and whether the proposed new password-less world is more or less secure. <br/><br/>Episode links:</p><p><a href='https://www.microsoft.com/security/blog/2021/09/15/the-passwordless-future-is-here-for-your-microsoft-account/'>https://www.microsoft.com/security/blog/2021/09/15/the-passwordless-future-is-here-for-your-microsoft-account/</a></p><p>This podcast is for informational purposes only and is not intended to replace professional legal, financial or insurance advice. We are not responsible for any losses, damages, or liabilities that may arise from the use of this podcast. The content and views expressed are those of the host and guests.</p>]]></description>
    <content:encoded><![CDATA[<p>Microsoft&apos;s recently announcement that users can delete passwords and adopt a password-less environment using alternative authentication such as an authenticator app. Does this signal the beginning of the end for password based authentication. Keir Humble, an ESET sales engineer, joins Speakeasy&apos;s host, Tony Anscombe, to discuss what this means for users and whether the proposed new password-less world is more or less secure. <br/><br/>Episode links:</p><p><a href='https://www.microsoft.com/security/blog/2021/09/15/the-passwordless-future-is-here-for-your-microsoft-account/'>https://www.microsoft.com/security/blog/2021/09/15/the-passwordless-future-is-here-for-your-microsoft-account/</a></p><p>This podcast is for informational purposes only and is not intended to replace professional legal, financial or insurance advice. We are not responsible for any losses, damages, or liabilities that may arise from the use of this podcast. The content and views expressed are those of the host and guests.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1068769/episodes/9237507-the-password-less-future.mp3" length="18592225" type="audio/mpeg" />
    <itunes:author>Tony Anscombe &amp; Keir Humble</itunes:author>
    <guid isPermaLink="false">Buzzsprout-9237507</guid>
    <pubDate>Tue, 21 Sep 2021 16:00:00 -0700</pubDate>
    <itunes:duration>1547</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>5</itunes:season>
    <itunes:episode>2</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Cybersecurity insurance explained</itunes:title>
    <title>Cybersecurity insurance explained</title>
    <itunes:summary><![CDATA[Businesses have been clamoring to understand how cybersecurity insurance works and we explain everything this week with our special guest. Rehana Moosa is the founder of a forensic accounting firm and joins us to clarify what cybersecurity insurance is. Are ransom payments for ransomware attacks covered by cyber insurance? What factors contribute to how much a cyber insurance premium will cost? Don’t miss this episode as cover the ins and outs of cybersecurity insurance and forensic accountin...]]></itunes:summary>
    <description><![CDATA[<p>Businesses have been clamoring to understand how cybersecurity insurance works and we explain everything this week with our special guest. Rehana Moosa is the founder of a forensic accounting firm and joins us to clarify what cybersecurity insurance is. Are ransom payments for ransomware attacks covered by cyber insurance? What factors contribute to how much a cyber insurance premium will cost? Don’t miss this episode as cover the ins and outs of cybersecurity insurance and forensic accounting.</p><p><b>Links</b></p><p>Rehana Moosa Forensics: <a href='http://www.rmforensics.ca/'>www.RMForensics.ca</a></p><p>Cybersecurity insurance overview: <a href='https://www.cisa.gov/cybersecurity-insurance'>https://www.cisa.gov/cybersecurity-insurance</a></p><p> </p><p>This podcast is for informational purposes only and is not intended to replace professional legal, financial or insurance advice. We are not responsible for any losses, damages, or liabilities that may arise from the use of this podcast. The content and views expressed are those of the host and guests.</p>]]></description>
    <content:encoded><![CDATA[<p>Businesses have been clamoring to understand how cybersecurity insurance works and we explain everything this week with our special guest. Rehana Moosa is the founder of a forensic accounting firm and joins us to clarify what cybersecurity insurance is. Are ransom payments for ransomware attacks covered by cyber insurance? What factors contribute to how much a cyber insurance premium will cost? Don’t miss this episode as cover the ins and outs of cybersecurity insurance and forensic accounting.</p><p><b>Links</b></p><p>Rehana Moosa Forensics: <a href='http://www.rmforensics.ca/'>www.RMForensics.ca</a></p><p>Cybersecurity insurance overview: <a href='https://www.cisa.gov/cybersecurity-insurance'>https://www.cisa.gov/cybersecurity-insurance</a></p><p> </p><p>This podcast is for informational purposes only and is not intended to replace professional legal, financial or insurance advice. We are not responsible for any losses, damages, or liabilities that may arise from the use of this podcast. The content and views expressed are those of the host and guests.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1068769/episodes/9045799-cybersecurity-insurance-explained.mp3" length="29475518" type="audio/mpeg" />
    <itunes:author></itunes:author>
    <guid isPermaLink="false">Buzzsprout-9045799</guid>
    <pubDate>Thu, 19 Aug 2021 08:00:00 -0700</pubDate>
    <itunes:duration>2454</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>5</itunes:season>
    <itunes:episode>1</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Apple to begin reporting Child Sexual Abuse Material (CSAM)</itunes:title>
    <title>Apple to begin reporting Child Sexual Abuse Material (CSAM)</title>
    <itunes:summary><![CDATA[Apple recently announced it will begin reporting Child Sexual Abuse Material (CSAM) to law enforcement with the latest iOS 15 update. The new system aims to identify images using a process called hashing, which turns images into numbers. On this episode, we discuss how Apple’s new system will work and how this bold step in combating Child Sexual Abuse is being received by privacy-sensitive users around the world. Links: Apple to combat Child Sexual Abuse Material:  https://www.cnbc.com/2...]]></itunes:summary>
    <description><![CDATA[<p>Apple recently announced it will begin reporting Child Sexual Abuse Material (CSAM) to law enforcement with the latest iOS 15 update. The new system aims to identify images using a process called hashing, which turns images into numbers. On this episode, we discuss how Apple’s new system will work and how this bold step in combating Child Sexual Abuse is being received by privacy-sensitive users around the world.</p><p><b>Links:</b></p><p>Apple to combat Child Sexual Abuse Material:  <a href='https://www.cnbc.com/2021/08/05/apple-will-report-child-sexual-abuse-images-on-icloud-to-law.html'>https://www.cnbc.com/2021/08/05/apple-will-report-child-sexual-abuse-images-on-icloud-to-law.html</a> </p><p> National Center for Missing Exploited Children (NCMEC): <a href='https://www.missingkids.org/home'>Home (missingkids.org)</a> </p><p> Internet Watch Foundation (IWF): <a href='https://www.iwf.org.uk/'>Homepage | Internet Watch Foundation (iwf.org.uk)</a> </p><p>This podcast is for informational purposes only and is not intended to replace professional legal, financial or insurance advice. We are not responsible for any losses, damages, or liabilities that may arise from the use of this podcast. The content and views expressed are those of the host and guests.</p>]]></description>
    <content:encoded><![CDATA[<p>Apple recently announced it will begin reporting Child Sexual Abuse Material (CSAM) to law enforcement with the latest iOS 15 update. The new system aims to identify images using a process called hashing, which turns images into numbers. On this episode, we discuss how Apple’s new system will work and how this bold step in combating Child Sexual Abuse is being received by privacy-sensitive users around the world.</p><p><b>Links:</b></p><p>Apple to combat Child Sexual Abuse Material:  <a href='https://www.cnbc.com/2021/08/05/apple-will-report-child-sexual-abuse-images-on-icloud-to-law.html'>https://www.cnbc.com/2021/08/05/apple-will-report-child-sexual-abuse-images-on-icloud-to-law.html</a> </p><p> National Center for Missing Exploited Children (NCMEC): <a href='https://www.missingkids.org/home'>Home (missingkids.org)</a> </p><p> Internet Watch Foundation (IWF): <a href='https://www.iwf.org.uk/'>Homepage | Internet Watch Foundation (iwf.org.uk)</a> </p><p>This podcast is for informational purposes only and is not intended to replace professional legal, financial or insurance advice. We are not responsible for any losses, damages, or liabilities that may arise from the use of this podcast. The content and views expressed are those of the host and guests.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1068769/episodes/9026324-apple-to-begin-reporting-child-sexual-abuse-material-csam.mp3" length="15829069" type="audio/mpeg" />
    <itunes:author>Ranson Burkette &amp; Tony Anscombe</itunes:author>
    <guid isPermaLink="false">Buzzsprout-9026324</guid>
    <pubDate>Mon, 16 Aug 2021 08:00:00 -0700</pubDate>
    <itunes:duration>1317</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>4</itunes:season>
    <itunes:episode>10</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>What is an Advanced Persistent Threat?</itunes:title>
    <title>What is an Advanced Persistent Threat?</title>
    <itunes:summary><![CDATA[APTs are said to be the most menacing cyber attacks in existence. Designed to be stealthy, gain access to corporate networks and steal secrets, APTs can cause crippling damage to businesses and governments alike. APT stands for Advanced Persistent Threats and this week we dive deep into the nature of these threats for our audience.  From exploiting vulnerabilities to exfiltrating data, we explore how these threats, and the teams of attackers behind them, can gain access to corporate and ...]]></itunes:summary>
    <description><![CDATA[<p>APTs are said to be the most menacing cyber attacks in existence. Designed to be stealthy, gain access to corporate networks and steal secrets, APTs can cause crippling damage to businesses and governments alike. APT stands for Advanced Persistent Threats and this week we dive deep into the nature of these threats for our audience.  From exploiting vulnerabilities to exfiltrating data, we explore how these threats, and the teams of attackers behind them, can gain access to corporate and government secrets. Buckle up for this one!  </p><p> </p><p><b>Links:</b> </p><p><b>What is an APT - </b><a href='https://www.cioinsight.com/security/apt-attack/'><b>https://www.cioinsight.com/security/apt-attack/</b></a> </p><p> </p><p>This podcast is for informational purposes only and is not intended to replace professional legal, financial or insurance advice. We are not responsible for any losses, damages, or liabilities that may arise from the use of this podcast. The content and views expressed are those of the host and guests.</p>]]></description>
    <content:encoded><![CDATA[<p>APTs are said to be the most menacing cyber attacks in existence. Designed to be stealthy, gain access to corporate networks and steal secrets, APTs can cause crippling damage to businesses and governments alike. APT stands for Advanced Persistent Threats and this week we dive deep into the nature of these threats for our audience.  From exploiting vulnerabilities to exfiltrating data, we explore how these threats, and the teams of attackers behind them, can gain access to corporate and government secrets. Buckle up for this one!  </p><p> </p><p><b>Links:</b> </p><p><b>What is an APT - </b><a href='https://www.cioinsight.com/security/apt-attack/'><b>https://www.cioinsight.com/security/apt-attack/</b></a> </p><p> </p><p>This podcast is for informational purposes only and is not intended to replace professional legal, financial or insurance advice. We are not responsible for any losses, damages, or liabilities that may arise from the use of this podcast. The content and views expressed are those of the host and guests.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1068769/episodes/8945515-what-is-an-advanced-persistent-threat.mp3" length="18787162" type="audio/mpeg" />
    <itunes:author></itunes:author>
    <guid isPermaLink="false">Buzzsprout-8945515</guid>
    <pubDate>Thu, 29 Jul 2021 16:00:00 -0700</pubDate>
    <itunes:duration>1563</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>4</itunes:season>
    <itunes:episode>9</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>The sinister nature of Stalkerware</itunes:title>
    <title>The sinister nature of Stalkerware</title>
    <itunes:summary><![CDATA[Stalkerware is monitoring software which enables a remote user to track the activities of another user’s device. With stalkerware appearing in news headlines around the world, this week we discuss what this dangerous software is, how it spies on its victims, and how you can detect it on your device. We also discuss the privacy implications of stalkerware and share helpful resources for victims seeking help.  Links  What is spyware? https://www.bbc.com/news/av/technology-57894917&nbs...]]></itunes:summary>
    <description><![CDATA[<p>Stalkerware is monitoring software which enables a remote user to track the activities of another user’s device. With stalkerware appearing in news headlines around the world, this week we discuss what this dangerous software is, how it spies on its victims, and how you can detect it on your device. We also discuss the privacy implications of stalkerware and share helpful resources for victims seeking help. </p><p><b>Links</b> </p><p>What is spyware? <a href='https://www.bbc.com/news/av/technology-57894917'>https://www.bbc.com/news/av/technology-57894917</a> </p><p>Stalkerware surges in 2021 <a href='https://www.zdnet.com/article/stalkerware-adoption-rates-surge-over-2020-hundreds-of-vulnerabilities-found/'>https://www.zdnet.com/article/stalkerware-adoption-rates-surge-over-2020-hundreds-of-vulnerabilities-found/</a> </p><p>NCSA Stalkerware tip sheet  <a href='https://staysafeonline.org/resource/stalkerware-tip-sheet/'>https://staysafeonline.org/resource/stalkerware-tip-sheet/</a>  </p><p>National Domestic Violence Hotline <a href='https://www.thehotline.org/'>https://www.thehotline.org/</a>  </p><p>This podcast is for informational purposes only and is not intended to replace professional legal, financial or insurance advice. We are not responsible for any losses, damages, or liabilities that may arise from the use of this podcast. The content and views expressed are those of the host and guests.</p>]]></description>
    <content:encoded><![CDATA[<p>Stalkerware is monitoring software which enables a remote user to track the activities of another user’s device. With stalkerware appearing in news headlines around the world, this week we discuss what this dangerous software is, how it spies on its victims, and how you can detect it on your device. We also discuss the privacy implications of stalkerware and share helpful resources for victims seeking help. </p><p><b>Links</b> </p><p>What is spyware? <a href='https://www.bbc.com/news/av/technology-57894917'>https://www.bbc.com/news/av/technology-57894917</a> </p><p>Stalkerware surges in 2021 <a href='https://www.zdnet.com/article/stalkerware-adoption-rates-surge-over-2020-hundreds-of-vulnerabilities-found/'>https://www.zdnet.com/article/stalkerware-adoption-rates-surge-over-2020-hundreds-of-vulnerabilities-found/</a> </p><p>NCSA Stalkerware tip sheet  <a href='https://staysafeonline.org/resource/stalkerware-tip-sheet/'>https://staysafeonline.org/resource/stalkerware-tip-sheet/</a>  </p><p>National Domestic Violence Hotline <a href='https://www.thehotline.org/'>https://www.thehotline.org/</a>  </p><p>This podcast is for informational purposes only and is not intended to replace professional legal, financial or insurance advice. We are not responsible for any losses, damages, or liabilities that may arise from the use of this podcast. The content and views expressed are those of the host and guests.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1068769/episodes/8913513-the-sinister-nature-of-stalkerware.mp3" length="19556797" type="audio/mpeg" />
    <itunes:author>Ranson Burkette &amp; Tony Anscombe</itunes:author>
    <guid isPermaLink="false">Buzzsprout-8913513</guid>
    <pubDate>Mon, 26 Jul 2021 08:00:00 -0700</pubDate>
    <itunes:duration>1627</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>4</itunes:season>
    <itunes:episode>8</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>true</itunes:explicit>
  </item>
  <item>
    <itunes:title>The crypto crackdown</itunes:title>
    <title>The crypto crackdown</title>
    <itunes:summary><![CDATA[With Bitcoin leading the downward spiral of crypto currency values, Ranson and Tony take a look at the factors which have contributed to the rollercoaster ride in the crypto market. In recent weeks, crypto mining has come under increasing scrutiny amidst revelations of its massive energy consumption and negative impact on the environment and China is taking significant measures to curb crypto mining and have already shutdown a number mining regions within the country. Our hosts also examine t...]]></itunes:summary>
    <description><![CDATA[<p>With Bitcoin leading the downward spiral of crypto currency values, Ranson and Tony take a look at the factors which have contributed to the rollercoaster ride in the crypto market. In recent weeks, crypto mining has come under increasing scrutiny amidst revelations of its massive energy consumption and negative impact on the environment and China is taking significant measures to curb crypto mining and have already shutdown a number mining regions within the country. Our hosts also examine the role Tesla played in the valuation of bitcoin and look to one country in seeking to make bitcoin legal tender.</p><p><b>Links: </b> </p><p>China’s focus on cryptocurrency:  <a href='https://www.cnbc.com/2021/06/22/china-crypto-crackdown-wipes-nearly-300-billion-off-market-btc-slides.html'>https://www.cnbc.com/2021/06/22/china-crypto-crackdown-wipes-nearly-300-billion-off-market-btc-slides.html</a> </p><p>El Salvador wants bitcoin to become legal tender: <a href='https://www.bbc.com/news/business-57507386'>https://www.bbc.com/news/business-57507386</a> </p><p>This podcast is for informational purposes only and is not intended to replace professional legal, financial or insurance advice. We are not responsible for any losses, damages, or liabilities that may arise from the use of this podcast. The content and views expressed are those of the host and guests.</p>]]></description>
    <content:encoded><![CDATA[<p>With Bitcoin leading the downward spiral of crypto currency values, Ranson and Tony take a look at the factors which have contributed to the rollercoaster ride in the crypto market. In recent weeks, crypto mining has come under increasing scrutiny amidst revelations of its massive energy consumption and negative impact on the environment and China is taking significant measures to curb crypto mining and have already shutdown a number mining regions within the country. Our hosts also examine the role Tesla played in the valuation of bitcoin and look to one country in seeking to make bitcoin legal tender.</p><p><b>Links: </b> </p><p>China’s focus on cryptocurrency:  <a href='https://www.cnbc.com/2021/06/22/china-crypto-crackdown-wipes-nearly-300-billion-off-market-btc-slides.html'>https://www.cnbc.com/2021/06/22/china-crypto-crackdown-wipes-nearly-300-billion-off-market-btc-slides.html</a> </p><p>El Salvador wants bitcoin to become legal tender: <a href='https://www.bbc.com/news/business-57507386'>https://www.bbc.com/news/business-57507386</a> </p><p>This podcast is for informational purposes only and is not intended to replace professional legal, financial or insurance advice. We are not responsible for any losses, damages, or liabilities that may arise from the use of this podcast. The content and views expressed are those of the host and guests.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1068769/episodes/8763497-the-crypto-crackdown.mp3" length="20726323" type="audio/mpeg" />
    <itunes:author>Ranson Burkette &amp; Tony Anscombe</itunes:author>
    <guid isPermaLink="false">Buzzsprout-8763497</guid>
    <pubDate>Fri, 25 Jun 2021 10:00:00 -0700</pubDate>
    <itunes:duration>1725</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>4</itunes:season>
    <itunes:episode>7</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Hacking McDonald’s and EA? What’s the world come to?</itunes:title>
    <title>Hacking McDonald’s and EA? What’s the world come to?</title>
    <itunes:summary><![CDATA[Last week McDonald’s and Electronic Arts revealed they were the latest victims of cyberattacks and they likely won’t be the last. Especially after a massive leak of 8.4 billion passwords on the Dark Web. With a whopping $350 million in ransomware payments in 2019, this year is already poised to surpass that.  What does hacking a video game maker and the largest fast-food burger chain have in common? What are the criminals after? What can businesses do now so they don’t end up in the head...]]></itunes:summary>
    <description><![CDATA[<p>Last week McDonald’s and Electronic Arts revealed they were the latest victims of cyberattacks and they likely won’t be the last. Especially after a massive leak of 8.4 billion passwords on the Dark Web. With a whopping $350 million in ransomware payments in 2019, this year is already poised to surpass that.  What does hacking a video game maker and the largest fast-food burger chain have in common? What are the criminals after? What can businesses do now so they don’t end up in the headlines. Find out on this week’s episode of Speakeasy Security.  <br/><br/>Links:<br/>Colonial Hack/Passwords and Old VPN account: <a href='https://www.cpomagazine.com/cyber-security/colonial-pipeline-hack-connected-to-password-leak-of-8-4-billion-accounts-attackers-got-in-via-an-old-vpn-account/'>https://www.cpomagazine.com/cyber-security/colonial-pipeline-hack-connected-to-password-leak-of-8-4-billion-accounts-attackers-got-in-via-an-old-vpn-account/</a> </p><p>McDonalds: <a href='https://www.reuters.com/technology/mcdonalds-hit-by-data-breach-south-korea-taiwan-wsj-2021-06-11/'>https://www.reuters.com/technology/mcdonalds-hit-by-data-breach-south-korea-taiwan-wsj-2021-06-11/</a>  </p><p>EA: <a href='https://www.vice.com/en/article/wx5xpx/hackers-steal-data-electronic-arts-ea-fifa-source-code'>https://www.vice.com/en/article/wx5xpx/hackers-steal-data-electronic-arts-ea-fifa-source-code</a> </p><p>ESET Cybersecurity Awareness Training: <a href='https://www.eset.com/us/cybertraining/'>https://www.eset.com/us/cybertraining/</a> </p><p>This podcast is for informational purposes only and is not intended to replace professional legal, financial or insurance advice. We are not responsible for any losses, damages, or liabilities that may arise from the use of this podcast. The content and views expressed are those of the host and guests.</p>]]></description>
    <content:encoded><![CDATA[<p>Last week McDonald’s and Electronic Arts revealed they were the latest victims of cyberattacks and they likely won’t be the last. Especially after a massive leak of 8.4 billion passwords on the Dark Web. With a whopping $350 million in ransomware payments in 2019, this year is already poised to surpass that.  What does hacking a video game maker and the largest fast-food burger chain have in common? What are the criminals after? What can businesses do now so they don’t end up in the headlines. Find out on this week’s episode of Speakeasy Security.  <br/><br/>Links:<br/>Colonial Hack/Passwords and Old VPN account: <a href='https://www.cpomagazine.com/cyber-security/colonial-pipeline-hack-connected-to-password-leak-of-8-4-billion-accounts-attackers-got-in-via-an-old-vpn-account/'>https://www.cpomagazine.com/cyber-security/colonial-pipeline-hack-connected-to-password-leak-of-8-4-billion-accounts-attackers-got-in-via-an-old-vpn-account/</a> </p><p>McDonalds: <a href='https://www.reuters.com/technology/mcdonalds-hit-by-data-breach-south-korea-taiwan-wsj-2021-06-11/'>https://www.reuters.com/technology/mcdonalds-hit-by-data-breach-south-korea-taiwan-wsj-2021-06-11/</a>  </p><p>EA: <a href='https://www.vice.com/en/article/wx5xpx/hackers-steal-data-electronic-arts-ea-fifa-source-code'>https://www.vice.com/en/article/wx5xpx/hackers-steal-data-electronic-arts-ea-fifa-source-code</a> </p><p>ESET Cybersecurity Awareness Training: <a href='https://www.eset.com/us/cybertraining/'>https://www.eset.com/us/cybertraining/</a> </p><p>This podcast is for informational purposes only and is not intended to replace professional legal, financial or insurance advice. We are not responsible for any losses, damages, or liabilities that may arise from the use of this podcast. The content and views expressed are those of the host and guests.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1068769/episodes/8715997-hacking-mcdonald-s-and-ea-what-s-the-world-come-to.mp3" length="21022929" type="audio/mpeg" />
    <itunes:author>Ranson Burkette &amp; Tony Anscombe</itunes:author>
    <guid isPermaLink="false">Buzzsprout-8715997</guid>
    <pubDate>Thu, 17 Jun 2021 08:00:00 -0700</pubDate>
    <itunes:duration>1749</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>4</itunes:season>
    <itunes:episode>6</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Cyberespionage and ransomware are wreaking havoc on governments</itunes:title>
    <title>Cyberespionage and ransomware are wreaking havoc on governments</title>
    <itunes:summary><![CDATA[The attacks on government entities and critical infrastructure, including the recent Colonial Pipeline attack, are increasing in scope and sophistication. Cybercriminals are becoming more brazen in their approach to disrupting economies and continue to conduct supply chain attacks, causing massive amounts of damage. This week our hosts talk to Andy Garth, ESET’s Government Affairs lead, and Robert Lipovský, senior malware researcher at ESET, join the podcast to discuss the latest attacks on G...]]></itunes:summary>
    <description><![CDATA[<p>The attacks on government entities and critical infrastructure, including the recent Colonial Pipeline attack, are increasing in scope and sophistication. Cybercriminals are becoming more brazen in their approach to disrupting economies and continue to conduct supply chain attacks, causing massive amounts of damage. This week our hosts talk to Andy Garth, ESET’s Government Affairs lead, and Robert Lipovský, senior malware researcher at ESET, join the podcast to discuss the latest attacks on Governments and the newly release ESET Government Threat Report. From cyberespionage to ransomware, you don’t want to miss what our guests have to say about the recent wave of attacks.<br/><br/><b>Links:</b> </p><p>ESET Government Threat Report: <a href='https://www.welivesecurity.com/wp-content/uploads/2021/04/ESET_Industry_Report_Government.pdf'>https://www.welivesecurity.com/wp-content/uploads/2021/04/ESET_Industry_Report_Government.pdf</a> </p><p>Kr00k: Billions of Wi-Fi devices affected: <a href='https://www.welivesecurity.com/2020/02/26/krook-serious-vulnerability-affected-encryption-billion-wifi-devices/'>https://www.welivesecurity.com/2020/02/26/krook-serious-vulnerability-affected-encryption-billion-wifi-devices/</a> </p><p>This podcast is for informational purposes only and is not intended to replace professional legal, financial or insurance advice. We are not responsible for any losses, damages, or liabilities that may arise from the use of this podcast. The content and views expressed are those of the host and guests.</p>]]></description>
    <content:encoded><![CDATA[<p>The attacks on government entities and critical infrastructure, including the recent Colonial Pipeline attack, are increasing in scope and sophistication. Cybercriminals are becoming more brazen in their approach to disrupting economies and continue to conduct supply chain attacks, causing massive amounts of damage. This week our hosts talk to Andy Garth, ESET’s Government Affairs lead, and Robert Lipovský, senior malware researcher at ESET, join the podcast to discuss the latest attacks on Governments and the newly release ESET Government Threat Report. From cyberespionage to ransomware, you don’t want to miss what our guests have to say about the recent wave of attacks.<br/><br/><b>Links:</b> </p><p>ESET Government Threat Report: <a href='https://www.welivesecurity.com/wp-content/uploads/2021/04/ESET_Industry_Report_Government.pdf'>https://www.welivesecurity.com/wp-content/uploads/2021/04/ESET_Industry_Report_Government.pdf</a> </p><p>Kr00k: Billions of Wi-Fi devices affected: <a href='https://www.welivesecurity.com/2020/02/26/krook-serious-vulnerability-affected-encryption-billion-wifi-devices/'>https://www.welivesecurity.com/2020/02/26/krook-serious-vulnerability-affected-encryption-billion-wifi-devices/</a> </p><p>This podcast is for informational purposes only and is not intended to replace professional legal, financial or insurance advice. We are not responsible for any losses, damages, or liabilities that may arise from the use of this podcast. The content and views expressed are those of the host and guests.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1068769/episodes/8676745-cyberespionage-and-ransomware-are-wreaking-havoc-on-governments.mp3" length="29520404" type="audio/mpeg" />
    <itunes:author></itunes:author>
    <guid isPermaLink="false">Buzzsprout-8676745</guid>
    <pubDate>Thu, 10 Jun 2021 08:00:00 -0700</pubDate>
    <itunes:duration>2457</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>4</itunes:season>
    <itunes:episode>5</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Why end-to-end encryption is needed</itunes:title>
    <title>Why end-to-end encryption is needed</title>
    <itunes:summary><![CDATA[Thinking about end-to-end encryption can give the average person a headache. Our hosts Tony and Ranson break down how it works and why this technology is critical to protecting your information. However, with this level of secrecy, criminals are leveraging end-to-end encryption to hide from law enforcement. What is being done to protect your privacy while not weakening encryption? Tune in to this episode to find out.   Links:  What is encryption and how does it work? - https://www.welive...]]></itunes:summary>
    <description><![CDATA[<p>Thinking about end-to-end encryption can give the average person a headache. Our hosts Tony and Ranson break down how it works and why this technology is critical to protecting your information. However, with this level of secrecy, criminals are leveraging end-to-end encryption to hide from law enforcement. What is being done to protect your privacy while not weakening encryption? Tune in to this episode to find out. <br/><br/><b>Links:</b> </p><p>What is encryption and how does it work? - <a href='https://www.welivesecurity.com/videos/what-is-encryption-and-how-does-it-work/'>https://www.welivesecurity.com/videos/what-is-encryption-and-how-does-it-work/</a>  </p><p>Should encryption be curbed to combat child abuse? -  <a href='https://www.bbc.com/news/business-57050689'>https://www.bbc.com/news/business-57050689</a> </p><p>End-to-end encryption explained - <a href='https://www.businessinsider.com/end-to-end-encryption'>https://www.businessinsider.com/end-to-end-encryption</a> </p><p>This podcast is for informational purposes only and is not intended to replace professional legal, financial or insurance advice. We are not responsible for any losses, damages, or liabilities that may arise from the use of this podcast. The content and views expressed are those of the host and guests.</p>]]></description>
    <content:encoded><![CDATA[<p>Thinking about end-to-end encryption can give the average person a headache. Our hosts Tony and Ranson break down how it works and why this technology is critical to protecting your information. However, with this level of secrecy, criminals are leveraging end-to-end encryption to hide from law enforcement. What is being done to protect your privacy while not weakening encryption? Tune in to this episode to find out. <br/><br/><b>Links:</b> </p><p>What is encryption and how does it work? - <a href='https://www.welivesecurity.com/videos/what-is-encryption-and-how-does-it-work/'>https://www.welivesecurity.com/videos/what-is-encryption-and-how-does-it-work/</a>  </p><p>Should encryption be curbed to combat child abuse? -  <a href='https://www.bbc.com/news/business-57050689'>https://www.bbc.com/news/business-57050689</a> </p><p>End-to-end encryption explained - <a href='https://www.businessinsider.com/end-to-end-encryption'>https://www.businessinsider.com/end-to-end-encryption</a> </p><p>This podcast is for informational purposes only and is not intended to replace professional legal, financial or insurance advice. We are not responsible for any losses, damages, or liabilities that may arise from the use of this podcast. The content and views expressed are those of the host and guests.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1068769/episodes/8552878-why-end-to-end-encryption-is-needed.mp3" length="15930271" type="audio/mpeg" />
    <itunes:author>Ranson Burkette &amp; Tony Anscombe</itunes:author>
    <guid isPermaLink="false">Buzzsprout-8552878</guid>
    <pubDate>Thu, 20 May 2021 08:00:00 -0700</pubDate>
    <itunes:duration>1325</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>4</itunes:season>
    <itunes:episode>4</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Bitcoin is here to stay, but is it environmentally friendly?</itunes:title>
    <title>Bitcoin is here to stay, but is it environmentally friendly?</title>
    <itunes:summary><![CDATA[This week on Speakeasy Security, Tony and Ranson dive headfirst into the Bitcoin craze. Our hosts explain what Bitcoin is, how they are made, and why crypto currencies provide an unprecedented level of anonymity.  With one Bitcoin transaction consuming more energy than the average home, our hosts also explore the massive carbon footprint left from Bitcoin mining. Whether you’re interested in learning the differences between Bitcoin and physical (fiat) currency or if you would simply like...]]></itunes:summary>
    <description><![CDATA[<p>This week on Speakeasy Security, Tony and Ranson dive headfirst into the Bitcoin craze. Our hosts explain what Bitcoin is, how they are made, and why crypto currencies provide an unprecedented level of anonymity.  With one Bitcoin transaction consuming more energy than the average home, our hosts also explore the massive carbon footprint left from Bitcoin mining. Whether you’re interested in learning the differences between Bitcoin and physical (fiat) currency or if you would simply like to know how to protect your crypto currency wallet, join us for another exciting episode of Speakeasy Security.   </p><p><b>Links:</b> </p><p>BBC – Crypto firm Coinbase valued at more than oil giant BP - <a href='https://www.bbc.com/news/business-56750102'>https://www.bbc.com/news/business-56750102</a> </p><p>Bitcoin Energy consumption index <a href='https://digiconomist.net/bitcoin-energy-consumption/'>https://digiconomist.net/bitcoin-energy-consumption/</a>  </p><p>This podcast is for informational purposes only and is not intended to replace professional legal, financial or insurance advice. We are not responsible for any losses, damages, or liabilities that may arise from the use of this podcast. The content and views expressed are those of the host and guests.</p>]]></description>
    <content:encoded><![CDATA[<p>This week on Speakeasy Security, Tony and Ranson dive headfirst into the Bitcoin craze. Our hosts explain what Bitcoin is, how they are made, and why crypto currencies provide an unprecedented level of anonymity.  With one Bitcoin transaction consuming more energy than the average home, our hosts also explore the massive carbon footprint left from Bitcoin mining. Whether you’re interested in learning the differences between Bitcoin and physical (fiat) currency or if you would simply like to know how to protect your crypto currency wallet, join us for another exciting episode of Speakeasy Security.   </p><p><b>Links:</b> </p><p>BBC – Crypto firm Coinbase valued at more than oil giant BP - <a href='https://www.bbc.com/news/business-56750102'>https://www.bbc.com/news/business-56750102</a> </p><p>Bitcoin Energy consumption index <a href='https://digiconomist.net/bitcoin-energy-consumption/'>https://digiconomist.net/bitcoin-energy-consumption/</a>  </p><p>This podcast is for informational purposes only and is not intended to replace professional legal, financial or insurance advice. We are not responsible for any losses, damages, or liabilities that may arise from the use of this podcast. The content and views expressed are those of the host and guests.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1068769/episodes/8423988-bitcoin-is-here-to-stay-but-is-it-environmentally-friendly.mp3" length="25788934" type="audio/mpeg" />
    <itunes:author>Ranson Burkette &amp; Tony Anscombe</itunes:author>
    <guid isPermaLink="false">Buzzsprout-8423988</guid>
    <pubDate>Thu, 29 Apr 2021 08:00:00 -0700</pubDate>
    <itunes:duration>2146</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>4</itunes:season>
    <itunes:episode>3</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Home listing ‘realtor’ photos could expose personal data</itunes:title>
    <title>Home listing ‘realtor’ photos could expose personal data</title>
    <itunes:summary><![CDATA[This week on Speakeasy Security, Tony and Ranson discuss how a cybercriminal can take advantage of the personal information contained in real estate listing photos. All too often, home sellers do not depersonalize their home before listing which can lead to a headache later on. From visible account details and personally identifiable information to pictures of family members and pet names, anyone selling a property should take inventory of not only what photos will be posted but what is conta...]]></itunes:summary>
    <description><![CDATA[<p>This week on Speakeasy Security, Tony and Ranson discuss how a cybercriminal can take advantage of the personal information contained in real estate listing photos. All too often, home sellers do not depersonalize their home before listing which can lead to a headache later on. From visible account details and personally identifiable information to pictures of family members and pet names, anyone selling a property should take inventory of not only what photos will be posted but what is contained within them.  Join us for this exciting episode as we explain how to keep this information private and secure.<br/><br/><b>Links: </b></p><p>BBC – House tour exposes owners personal data - <a href='https://www.bbc.com/news/technology-56718046'>https://www.bbc.com/news/technology-56718046</a> </p><p> The American Genius – Privacy issues and real estate listing photos – <a href='https://theamericangenius.com/housing/editorials/privacy-issues-and-real-estate-listing-photos-how-to-get-yours-removed/'>https://theamericangenius.com/housing/editorials/privacy-issues-and-real-estate-listing-photos-how-to-get-yours-removed/</a> </p><p> </p><p>This podcast is for informational purposes only and is not intended to replace professional legal, financial or insurance advice. We are not responsible for any losses, damages, or liabilities that may arise from the use of this podcast. The content and views expressed are those of the host and guests.</p>]]></description>
    <content:encoded><![CDATA[<p>This week on Speakeasy Security, Tony and Ranson discuss how a cybercriminal can take advantage of the personal information contained in real estate listing photos. All too often, home sellers do not depersonalize their home before listing which can lead to a headache later on. From visible account details and personally identifiable information to pictures of family members and pet names, anyone selling a property should take inventory of not only what photos will be posted but what is contained within them.  Join us for this exciting episode as we explain how to keep this information private and secure.<br/><br/><b>Links: </b></p><p>BBC – House tour exposes owners personal data - <a href='https://www.bbc.com/news/technology-56718046'>https://www.bbc.com/news/technology-56718046</a> </p><p> The American Genius – Privacy issues and real estate listing photos – <a href='https://theamericangenius.com/housing/editorials/privacy-issues-and-real-estate-listing-photos-how-to-get-yours-removed/'>https://theamericangenius.com/housing/editorials/privacy-issues-and-real-estate-listing-photos-how-to-get-yours-removed/</a> </p><p> </p><p>This podcast is for informational purposes only and is not intended to replace professional legal, financial or insurance advice. We are not responsible for any losses, damages, or liabilities that may arise from the use of this podcast. The content and views expressed are those of the host and guests.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1068769/episodes/8373960-home-listing-realtor-photos-could-expose-personal-data.mp3" length="15182375" type="audio/mpeg" />
    <itunes:author>Ranson Burkette &amp; Tony Anscombe</itunes:author>
    <guid isPermaLink="false">Buzzsprout-8373960</guid>
    <pubDate>Thu, 22 Apr 2021 08:00:00 -0700</pubDate>
    <itunes:duration>1263</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>4</itunes:season>
    <itunes:episode>2</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>true</itunes:explicit>
  </item>
  <item>
    <itunes:title>What is a vaccination passport?</itunes:title>
    <title>What is a vaccination passport?</title>
    <itunes:summary><![CDATA[Join us as we kick off season 4 of Speakeasy Security! This week, our hosts take on the hot topic of vaccination passports. As travel begins to pick up and restrictions begin to ease, Tony and Ranson explain what vaccination passports are, the privacy implications and how they are being managed. Without realizing it many people may already be declaring openly that they have had certain vaccinations to comply with state and federal requirements.  Links: BBC News – Vaccination passports: https:...]]></itunes:summary>
    <description><![CDATA[<p>Join us as we kick off season 4 of Speakeasy Security! This week, our hosts take on the hot topic of vaccination passports. As travel begins to pick up and restrictions begin to ease, Tony and Ranson explain what vaccination passports are, the privacy implications and how they are being managed. Without realizing it many people may already be declaring openly that they have had certain vaccinations to comply with state and federal requirements.<br/><br/><b>Links:</b></p><p>BBC News – Vaccination passports: <a href='https://www.bbc.com/news/technology-56489574'>https://www.bbc.com/news/technology-56489574</a>  </p><p>Kaiser Family Foundation – Vaccinations by States and Race: <a href='https://www.kff.org/coronavirus-covid-19/issue-brief/latest-data-on-covid-19-vaccinations-race-ethnicity/'>https://www.kff.org/coronavirus-covid-19/issue-brief/latest-data-on-covid-19-vaccinations-race-ethnicity/</a> </p><p> </p><p> </p><p>This podcast is for informational purposes only and is not intended to replace professional legal, financial or insurance advice. We are not responsible for any losses, damages, or liabilities that may arise from the use of this podcast. The content and views expressed are those of the host and guests.</p>]]></description>
    <content:encoded><![CDATA[<p>Join us as we kick off season 4 of Speakeasy Security! This week, our hosts take on the hot topic of vaccination passports. As travel begins to pick up and restrictions begin to ease, Tony and Ranson explain what vaccination passports are, the privacy implications and how they are being managed. Without realizing it many people may already be declaring openly that they have had certain vaccinations to comply with state and federal requirements.<br/><br/><b>Links:</b></p><p>BBC News – Vaccination passports: <a href='https://www.bbc.com/news/technology-56489574'>https://www.bbc.com/news/technology-56489574</a>  </p><p>Kaiser Family Foundation – Vaccinations by States and Race: <a href='https://www.kff.org/coronavirus-covid-19/issue-brief/latest-data-on-covid-19-vaccinations-race-ethnicity/'>https://www.kff.org/coronavirus-covid-19/issue-brief/latest-data-on-covid-19-vaccinations-race-ethnicity/</a> </p><p> </p><p> </p><p>This podcast is for informational purposes only and is not intended to replace professional legal, financial or insurance advice. We are not responsible for any losses, damages, or liabilities that may arise from the use of this podcast. The content and views expressed are those of the host and guests.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1068769/episodes/8293450-what-is-a-vaccination-passport.mp3" length="19702554" type="audio/mpeg" />
    <itunes:author>Ranson Burkette &amp; Tony Anscombe</itunes:author>
    <guid isPermaLink="false">Buzzsprout-8293450</guid>
    <pubDate>Thu, 08 Apr 2021 08:00:00 -0700</pubDate>
    <itunes:duration>1639</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>4</itunes:season>
    <itunes:episode>1</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Thinking of hacking a connected car? Think again.</itunes:title>
    <title>Thinking of hacking a connected car? Think again.</title>
    <itunes:summary><![CDATA[How likely is it for a cybercriminal to hack your vehicle? Why is the UN involved and what are car manufacturers doing to help protect connected vehicles? This week on Speakeasy Security, Tony and Ranson take a look at how connected cars can be attacked and what the industry is doing to help. If you’re a gear head, a connected car owner, or simply interested in learning more, you won’t want to miss this episode of Speakeasy security. Links: The Department of Transportation Cybersecurity – Cyb...]]></itunes:summary>
    <description><![CDATA[<p>How likely is it for a cybercriminal to hack your vehicle? Why is the UN involved and what are car manufacturers doing to help protect connected vehicles? This week on Speakeasy Security, Tony and Ranson take a look at how connected cars can be attacked and what the industry is doing to help. If you’re a gear head, a connected car owner, or simply interested in learning more, you won’t want to miss this episode of Speakeasy security.</p><p>Links:</p><p>The Department of Transportation Cybersecurity – Cybersecurity Best practices for connected vehicles: <a href='https://www.nhtsa.gov/press-releases/cybersecurity-best-practices-comments'>https://www.nhtsa.gov/press-releases/cybersecurity-best-practices-comments</a></p><p>The United Nations Regulation on Cybersecurity and Software Updates:<a href='https://unece.org/press/un-regulations-cybersecurity-and-software-updates-pave-way-mass-roll-out-connected-vehicles'>https://unece.org/press/un-regulations-cybersecurity-and-software-updates-pave-way-mass-roll-out-connected-vehicles</a> </p><p> </p><p>This podcast is for informational purposes only and is not intended to replace professional legal, financial or insurance advice. We are not responsible for any losses, damages, or liabilities that may arise from the use of this podcast. The content and views expressed are those of the host and guests.</p>]]></description>
    <content:encoded><![CDATA[<p>How likely is it for a cybercriminal to hack your vehicle? Why is the UN involved and what are car manufacturers doing to help protect connected vehicles? This week on Speakeasy Security, Tony and Ranson take a look at how connected cars can be attacked and what the industry is doing to help. If you’re a gear head, a connected car owner, or simply interested in learning more, you won’t want to miss this episode of Speakeasy security.</p><p>Links:</p><p>The Department of Transportation Cybersecurity – Cybersecurity Best practices for connected vehicles: <a href='https://www.nhtsa.gov/press-releases/cybersecurity-best-practices-comments'>https://www.nhtsa.gov/press-releases/cybersecurity-best-practices-comments</a></p><p>The United Nations Regulation on Cybersecurity and Software Updates:<a href='https://unece.org/press/un-regulations-cybersecurity-and-software-updates-pave-way-mass-roll-out-connected-vehicles'>https://unece.org/press/un-regulations-cybersecurity-and-software-updates-pave-way-mass-roll-out-connected-vehicles</a> </p><p> </p><p>This podcast is for informational purposes only and is not intended to replace professional legal, financial or insurance advice. We are not responsible for any losses, damages, or liabilities that may arise from the use of this podcast. The content and views expressed are those of the host and guests.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1068769/episodes/8250625-thinking-of-hacking-a-connected-car-think-again.mp3" length="20928255" type="audio/mpeg" />
    <itunes:author>Ranson Burkette &amp; Tony Anscombe</itunes:author>
    <guid isPermaLink="false">Buzzsprout-8250625</guid>
    <pubDate>Thu, 01 Apr 2021 08:00:00 -0700</pubDate>
    <itunes:duration>1741</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>3</itunes:season>
    <itunes:episode>10</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Non-fungible tokens - disrupting the art industry one NFT at a time!</itunes:title>
    <title>Non-fungible tokens - disrupting the art industry one NFT at a time!</title>
    <itunes:summary><![CDATA[What is a non-fungible token, or NFT? Are these digital tokens the future of the art industry? This week our hosts dive into the world of NFTs and explain what the blockchain-based technology is all about. There’s a lot to unpack in this episode of Speakeasy Security so pour a cold beer and join us for this look into the interesting world of NFTs. Links Time - https://time.com/5947720/nft-art/ This podcast is for informational purposes only and is not intended to replace professional legal, f...]]></itunes:summary>
    <description><![CDATA[<p>What is a non-fungible token, or NFT? Are these digital tokens the future of the art industry? This week our hosts dive into the world of NFTs and explain what the blockchain-based technology is all about. There’s a lot to unpack in this episode of Speakeasy Security so pour a cold beer and join us for this look into the interesting world of NFTs.</p><p><b>Links<br/></b>Time - <a href='https://time.com/5947720/nft-art/'>https://time.com/5947720/nft-art/</a></p><p>This podcast is for informational purposes only and is not intended to replace professional legal, financial or insurance advice. We are not responsible for any losses, damages, or liabilities that may arise from the use of this podcast. The content and views expressed are those of the host and guests.</p>]]></description>
    <content:encoded><![CDATA[<p>What is a non-fungible token, or NFT? Are these digital tokens the future of the art industry? This week our hosts dive into the world of NFTs and explain what the blockchain-based technology is all about. There’s a lot to unpack in this episode of Speakeasy Security so pour a cold beer and join us for this look into the interesting world of NFTs.</p><p><b>Links<br/></b>Time - <a href='https://time.com/5947720/nft-art/'>https://time.com/5947720/nft-art/</a></p><p>This podcast is for informational purposes only and is not intended to replace professional legal, financial or insurance advice. We are not responsible for any losses, damages, or liabilities that may arise from the use of this podcast. The content and views expressed are those of the host and guests.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1068769/episodes/8206511-non-fungible-tokens-disrupting-the-art-industry-one-nft-at-a-time.mp3" length="16647555" type="audio/mpeg" />
    <itunes:author>Ranson Burkette &amp; Tony Anscombe</itunes:author>
    <guid isPermaLink="false">Buzzsprout-8206511</guid>
    <pubDate>Thu, 25 Mar 2021 08:00:00 -0700</pubDate>
    <itunes:duration>1385</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>3</itunes:season>
    <itunes:episode>9</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Say goodbye to &#39;some&#39; ad tracking</itunes:title>
    <title>Say goodbye to &#39;some&#39; ad tracking</title>
    <itunes:summary><![CDATA[Google has recently announced it will stop selling ads based on an individuals’ browsing history across sites and it has serious implication for the public. What does this change mean for the average person? How will this affect ads on social media? Ranson and Tony discuss this major development and more on this week’s episode of Speakeasy Security.  Links: https://blog.google/products/ads-commerce/a-more-privacy-first-web/ This podcast is for informational purposes only and is not intended t...]]></itunes:summary>
    <description><![CDATA[<p>Google has recently announced it will stop selling ads based on an individuals’ browsing history across sites and it has serious implication for the public. What does this change mean for the average person? How will this affect ads on social media? Ranson and Tony discuss this major development and more on this week’s episode of Speakeasy Security.<br/><br/>Links:<br/>https://blog.google/products/ads-commerce/a-more-privacy-first-web/</p><p>This podcast is for informational purposes only and is not intended to replace professional legal, financial or insurance advice. We are not responsible for any losses, damages, or liabilities that may arise from the use of this podcast. The content and views expressed are those of the host and guests.</p>]]></description>
    <content:encoded><![CDATA[<p>Google has recently announced it will stop selling ads based on an individuals’ browsing history across sites and it has serious implication for the public. What does this change mean for the average person? How will this affect ads on social media? Ranson and Tony discuss this major development and more on this week’s episode of Speakeasy Security.<br/><br/>Links:<br/>https://blog.google/products/ads-commerce/a-more-privacy-first-web/</p><p>This podcast is for informational purposes only and is not intended to replace professional legal, financial or insurance advice. We are not responsible for any losses, damages, or liabilities that may arise from the use of this podcast. The content and views expressed are those of the host and guests.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1068769/episodes/8118342-say-goodbye-to-some-ad-tracking.mp3" length="13867325" type="audio/mpeg" />
    <itunes:author>Ranson Burkette &amp; Tony Anscombe</itunes:author>
    <guid isPermaLink="false">Buzzsprout-8118342</guid>
    <pubDate>Thu, 11 Mar 2021 08:00:00 -0800</pubDate>
    <itunes:duration>1153</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>3</itunes:season>
    <itunes:episode>8</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Clubhouse, is anything really private anymore?</itunes:title>
    <title>Clubhouse, is anything really private anymore?</title>
    <itunes:summary><![CDATA[Everyone’s talking about Clubhouse, the invite-only, audio app du jour is creating a lot buzz. However, are the members of this service trading in their privacy for access to the exclusive app? What happens to your contact list when you sign up for the service? Tony and Ranson tackle this trending topic on the latest episode of Speakeasy Security and explain what you need to know about Clubhouse.  Links Clubhouse audio streamed to a third-party site: https://www.welivesecurity.com/2021/02/23/...]]></itunes:summary>
    <description><![CDATA[<p>Everyone’s talking about Clubhouse, the invite-only, audio app du jour is creating a lot buzz. However, are the members of this service trading in their privacy for access to the exclusive app? What happens to your contact list when you sign up for the service? Tony and Ranson tackle this trending topic on the latest episode of Speakeasy Security and explain what you need to know about Clubhouse.<br/><br/>Links<br/>Clubhouse audio streamed to a third-party site: <a href='https://www.welivesecurity.com/2021/02/23/clubhouse-chats-streamed-third-party-website/'>https://www.welivesecurity.com/2021/02/23/clubhouse-chats-streamed-third-party-website/</a></p><p>Clubhouse privacy policy: <a href='https://www.clubhouse-app.com/privacy_policy'>https://www.clubhouse-app.com/privacy_policy</a></p><p> </p><p>This podcast is for informational purposes only and is not intended to replace professional legal, financial or insurance advice. We are not responsible for any losses, damages, or liabilities that may arise from the use of this podcast. The content and views expressed are those of the host and guests.</p>]]></description>
    <content:encoded><![CDATA[<p>Everyone’s talking about Clubhouse, the invite-only, audio app du jour is creating a lot buzz. However, are the members of this service trading in their privacy for access to the exclusive app? What happens to your contact list when you sign up for the service? Tony and Ranson tackle this trending topic on the latest episode of Speakeasy Security and explain what you need to know about Clubhouse.<br/><br/>Links<br/>Clubhouse audio streamed to a third-party site: <a href='https://www.welivesecurity.com/2021/02/23/clubhouse-chats-streamed-third-party-website/'>https://www.welivesecurity.com/2021/02/23/clubhouse-chats-streamed-third-party-website/</a></p><p>Clubhouse privacy policy: <a href='https://www.clubhouse-app.com/privacy_policy'>https://www.clubhouse-app.com/privacy_policy</a></p><p> </p><p>This podcast is for informational purposes only and is not intended to replace professional legal, financial or insurance advice. We are not responsible for any losses, damages, or liabilities that may arise from the use of this podcast. The content and views expressed are those of the host and guests.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1068769/episodes/8032011-clubhouse-is-anything-really-private-anymore.mp3" length="21205595" type="audio/mpeg" />
    <itunes:author></itunes:author>
    <guid isPermaLink="false">Buzzsprout-8032011</guid>
    <pubDate>Fri, 26 Feb 2021 08:00:00 -0800</pubDate>
    <itunes:duration>1765</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>3</itunes:season>
    <itunes:episode>7</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>My kid is a hacker!</itunes:title>
    <title>My kid is a hacker!</title>
    <itunes:summary><![CDATA[Tony and Ranson uncover an unlikely, albeit true story this week on Speakeasy Security. An 11-year-old boy blackmails his own father while posing as a hacker from within their own home, or so the story goes. What did the child do, and did he actually get away with it? Our hosts discuss this incredible story and share a few lessons in this episode you won’t want to miss.   Links  Ubergizmo Article: https://www.ubergizmo.com/2021/02/11-year-old-online-blackmail-dad/  Codeacademy:...]]></itunes:summary>
    <description><![CDATA[<p>Tony and Ranson uncover an unlikely, albeit true story this week on Speakeasy Security. An 11-year-old boy blackmails his own father while posing as a hacker from within their own home, or so the story goes. What did the child do, and did he actually get away with it? Our hosts discuss this incredible story and share a few lessons in this episode you won’t want to miss.  </p><p><b>Links</b> </p><p>Ubergizmo Article: <a href='https://www.ubergizmo.com/2021/02/11-year-old-online-blackmail-dad/'>https://www.ubergizmo.com/2021/02/11-year-old-online-blackmail-dad/</a> </p><p>Codeacademy: <a href='https://www.codecademy.com/'>https://www.codecademy.com/</a> </p><p>Code Monster from Crunchzilla: <a href='http://www.crunchzilla.com/code-monster'>http://www.crunchzilla.com/code-monster</a> </p><p>This podcast is for informational purposes only and is not intended to replace professional legal, financial or insurance advice. We are not responsible for any losses, damages, or liabilities that may arise from the use of this podcast. The content and views expressed are those of the host and guests.</p>]]></description>
    <content:encoded><![CDATA[<p>Tony and Ranson uncover an unlikely, albeit true story this week on Speakeasy Security. An 11-year-old boy blackmails his own father while posing as a hacker from within their own home, or so the story goes. What did the child do, and did he actually get away with it? Our hosts discuss this incredible story and share a few lessons in this episode you won’t want to miss.  </p><p><b>Links</b> </p><p>Ubergizmo Article: <a href='https://www.ubergizmo.com/2021/02/11-year-old-online-blackmail-dad/'>https://www.ubergizmo.com/2021/02/11-year-old-online-blackmail-dad/</a> </p><p>Codeacademy: <a href='https://www.codecademy.com/'>https://www.codecademy.com/</a> </p><p>Code Monster from Crunchzilla: <a href='http://www.crunchzilla.com/code-monster'>http://www.crunchzilla.com/code-monster</a> </p><p>This podcast is for informational purposes only and is not intended to replace professional legal, financial or insurance advice. We are not responsible for any losses, damages, or liabilities that may arise from the use of this podcast. The content and views expressed are those of the host and guests.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1068769/episodes/7955848-my-kid-is-a-hacker.mp3" length="14558109" type="audio/mpeg" />
    <itunes:author></itunes:author>
    <guid isPermaLink="false">Buzzsprout-7955848</guid>
    <pubDate>Fri, 19 Feb 2021 10:00:00 -0800</pubDate>
    <itunes:duration>1211</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>3</itunes:season>
    <itunes:episode>6</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>The cyber unicorn. </itunes:title>
    <title>The cyber unicorn. </title>
    <itunes:summary><![CDATA[On this edition of Speakeasy Security, our hosts Tony and Ranson invite a special guest to the show to share her experience in the industry. Dominique West (CISSP) is an accomplished cyber security professional with an inspiring story. Having been named one of ESET’s Women in Cybersecurity Scholarship winners, she’s deeply passionate about cloud security and empowering women in the field of cybersecurity. She’ll also join a panel of industry leaders during ESET’s Black History Month Fireside ...]]></itunes:summary>
    <description><![CDATA[<p>On this edition of Speakeasy Security, our hosts Tony and Ranson invite a special guest to the show to share her experience in the industry. Dominique West (CISSP) is an accomplished cyber security professional with an inspiring story. Having been named one of ESET’s Women in Cybersecurity Scholarship winners, she’s deeply passionate about cloud security and empowering women in the field of cybersecurity. She’ll also join a panel of industry leaders during ESET’s Black History Month Fireside chat on February 17th. You don’t want to miss this incredible professional as she shares her path to success as well as her favorite seltzer beer!<br/><br/><b>Dominique West – </b><a href='https://www.linkedin.com/in/dominiquewest/'><b>LinkedIn</b></a><b>, </b><a href='https://twitter.com/domyboo'><b>Twitter</b></a><b>, </b><a href='https://securityincolor.com/'><b>Security in Color</b></a></p><p><b>Women’s Cyberjutsu: </b><a href='https://womenscyberjutsu.org/'>https://womenscyberjutsu.org/</a></p><p><b>ESET’s Black History Month Fireside Chat: </b><a href='https://register.gotowebinar.com/register/1685726560453967119'><b>https://register.gotowebinar.com/register/1685726560453967119</b></a></p><p>This podcast is for informational purposes only and is not intended to replace professional legal, financial or insurance advice. We are not responsible for any losses, damages, or liabilities that may arise from the use of this podcast. The content and views expressed are those of the host and guests.</p>]]></description>
    <content:encoded><![CDATA[<p>On this edition of Speakeasy Security, our hosts Tony and Ranson invite a special guest to the show to share her experience in the industry. Dominique West (CISSP) is an accomplished cyber security professional with an inspiring story. Having been named one of ESET’s Women in Cybersecurity Scholarship winners, she’s deeply passionate about cloud security and empowering women in the field of cybersecurity. She’ll also join a panel of industry leaders during ESET’s Black History Month Fireside chat on February 17th. You don’t want to miss this incredible professional as she shares her path to success as well as her favorite seltzer beer!<br/><br/><b>Dominique West – </b><a href='https://www.linkedin.com/in/dominiquewest/'><b>LinkedIn</b></a><b>, </b><a href='https://twitter.com/domyboo'><b>Twitter</b></a><b>, </b><a href='https://securityincolor.com/'><b>Security in Color</b></a></p><p><b>Women’s Cyberjutsu: </b><a href='https://womenscyberjutsu.org/'>https://womenscyberjutsu.org/</a></p><p><b>ESET’s Black History Month Fireside Chat: </b><a href='https://register.gotowebinar.com/register/1685726560453967119'><b>https://register.gotowebinar.com/register/1685726560453967119</b></a></p><p>This podcast is for informational purposes only and is not intended to replace professional legal, financial or insurance advice. We are not responsible for any losses, damages, or liabilities that may arise from the use of this podcast. The content and views expressed are those of the host and guests.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1068769/episodes/7798762-the-cyber-unicorn.mp3" length="33825818" type="audio/mpeg" />
    <itunes:author></itunes:author>
    <guid isPermaLink="false">Buzzsprout-7798762</guid>
    <pubDate>Thu, 11 Feb 2021 08:00:00 -0800</pubDate>
    <itunes:duration>2816</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>3</itunes:season>
    <itunes:episode>5</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Romance Scams and Valentine’s Day</itunes:title>
    <title>Romance Scams and Valentine’s Day</title>
    <itunes:summary><![CDATA[Romance scams are everywhere. With Valentine’s Day fast approaching, our hosts take a closer look at how these scams work and how to identify them. From flooding DM’s to invading dating apps, the recent rise of romance scams are creating big paydays for criminals and even bigger headaches for victims. Protect yourself, your loved ones and don’t get caught falling victim to one of the most prevalent types of scams this Valentine’s Day. FTC: https://www.ftc.gov/news-events/blogs/data-spotlight/...]]></itunes:summary>
    <description><![CDATA[<p>Romance scams are everywhere. With Valentine’s Day fast approaching, our hosts take a closer look at how these scams work and how to identify them. From flooding DM’s to invading dating apps, the recent rise of romance scams are creating big paydays for criminals and even bigger headaches for victims. Protect yourself, your loved ones and don’t get caught falling victim to one of the most prevalent types of scams this Valentine’s Day.</p><p>FTC: <a href='https://www.ftc.gov/news-events/blogs/data-spotlight/2019/02/romance-scams-rank-number-one-total-reported-losses'>https://www.ftc.gov/news-events/blogs/data-spotlight/2019/02/romance-scams-rank-number-one-total-reported-losses</a></p><p>The National Cybersecurity Alliance Romance Scam Tip Sheet: <a href='https://staysafeonline.org/resource/online-romance-scams/'>https://staysafeonline.org/resource/online-romance-scams/</a></p><p>Report a romance scam to the FBI: <a href='https://www.ic3.gov/Home/FileComplaint'>https://www.ic3.gov/Home/FileComplaint</a></p><p>This podcast is for informational purposes only and is not intended to replace professional legal, financial or insurance advice. We are not responsible for any losses, damages, or liabilities that may arise from the use of this podcast. The content and views expressed are those of the host and guests.</p>]]></description>
    <content:encoded><![CDATA[<p>Romance scams are everywhere. With Valentine’s Day fast approaching, our hosts take a closer look at how these scams work and how to identify them. From flooding DM’s to invading dating apps, the recent rise of romance scams are creating big paydays for criminals and even bigger headaches for victims. Protect yourself, your loved ones and don’t get caught falling victim to one of the most prevalent types of scams this Valentine’s Day.</p><p>FTC: <a href='https://www.ftc.gov/news-events/blogs/data-spotlight/2019/02/romance-scams-rank-number-one-total-reported-losses'>https://www.ftc.gov/news-events/blogs/data-spotlight/2019/02/romance-scams-rank-number-one-total-reported-losses</a></p><p>The National Cybersecurity Alliance Romance Scam Tip Sheet: <a href='https://staysafeonline.org/resource/online-romance-scams/'>https://staysafeonline.org/resource/online-romance-scams/</a></p><p>Report a romance scam to the FBI: <a href='https://www.ic3.gov/Home/FileComplaint'>https://www.ic3.gov/Home/FileComplaint</a></p><p>This podcast is for informational purposes only and is not intended to replace professional legal, financial or insurance advice. We are not responsible for any losses, damages, or liabilities that may arise from the use of this podcast. The content and views expressed are those of the host and guests.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1068769/episodes/7664110-romance-scams-and-valentine-s-day.mp3" length="13833750" type="audio/mpeg" />
    <itunes:author>Ranson Burkette &amp; Tony Anscombe</itunes:author>
    <guid isPermaLink="false">Buzzsprout-7664110</guid>
    <pubDate>Thu, 04 Feb 2021 08:00:00 -0800</pubDate>
    <itunes:duration>1150</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>3</itunes:season>
    <itunes:episode>4</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Data Privacy Day 2021</itunes:title>
    <title>Data Privacy Day 2021</title>
    <itunes:summary><![CDATA[On this episode of Speakeasy Security, our hosts celebrate Data Privacy Day and discuss its importance to both individuals and businesses. With this year’s theme of “Own Your Data”, Tony and Ranson help our listeners navigate this tricky topic. What information is being collected on the average consumer? Why are privacy policies so difficult to understand? How valuable is personal data to a company? Join us as we answer these questions and share our perspectives on this important day.   ...]]></itunes:summary>
    <description><![CDATA[<p>On this episode of Speakeasy Security, our hosts celebrate Data Privacy Day and discuss its importance to both individuals and businesses. With this year’s theme of “Own Your Data”, Tony and Ranson help our listeners navigate this tricky topic. What information is being collected on the average consumer? Why are privacy policies so difficult to understand? How valuable is personal data to a company? Join us as we answer these questions and share our perspectives on this important day. <br/><br/><b>Data Privacy Day blog: </b><a href='https://staysafeonline.org/blog/are-people-failing-to-understand-privacy/'>https://staysafeonline.org/blog/are-people-failing-to-understand-privacy/</a> </p><p><b>Pew Research Study: </b><a href='https://www.pewresearch.org/internet/2019/11/15/americans-and-privacy-concerned-confused-and-feeling-lack-of-control-over-their-personal-information/'>https://www.pewresearch.org/internet/2019/11/15/americans-and-privacy-concerned-confused-and-feeling-lack-of-control-over-their-personal-information/</a> </p><p> </p><p>This podcast is for informational purposes only and is not intended to replace professional legal, financial or insurance advice. We are not responsible for any losses, damages, or liabilities that may arise from the use of this podcast. The content and views expressed are those of the host and guests.</p>]]></description>
    <content:encoded><![CDATA[<p>On this episode of Speakeasy Security, our hosts celebrate Data Privacy Day and discuss its importance to both individuals and businesses. With this year’s theme of “Own Your Data”, Tony and Ranson help our listeners navigate this tricky topic. What information is being collected on the average consumer? Why are privacy policies so difficult to understand? How valuable is personal data to a company? Join us as we answer these questions and share our perspectives on this important day. <br/><br/><b>Data Privacy Day blog: </b><a href='https://staysafeonline.org/blog/are-people-failing-to-understand-privacy/'>https://staysafeonline.org/blog/are-people-failing-to-understand-privacy/</a> </p><p><b>Pew Research Study: </b><a href='https://www.pewresearch.org/internet/2019/11/15/americans-and-privacy-concerned-confused-and-feeling-lack-of-control-over-their-personal-information/'>https://www.pewresearch.org/internet/2019/11/15/americans-and-privacy-concerned-confused-and-feeling-lack-of-control-over-their-personal-information/</a> </p><p> </p><p>This podcast is for informational purposes only and is not intended to replace professional legal, financial or insurance advice. We are not responsible for any losses, damages, or liabilities that may arise from the use of this podcast. The content and views expressed are those of the host and guests.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1068769/episodes/7524787-data-privacy-day-2021.mp3" length="20065208" type="audio/mpeg" />
    <itunes:author>Ranson Burkette &amp; Tony Anscombe</itunes:author>
    <guid isPermaLink="false">Buzzsprout-7524787</guid>
    <pubDate>Thu, 28 Jan 2021 06:00:00 -0800</pubDate>
    <itunes:duration>1670</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>3</itunes:season>
    <itunes:episode>3</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Show me the money! Business Email Compromise explained</itunes:title>
    <title>Show me the money! Business Email Compromise explained</title>
    <itunes:summary><![CDATA[Have you ever received an email from an executive at your company requesting you to wire money to an account? Then you’ve been affected by a Business Email Compromise, which the FBI has labeled as the number 1 threat to businesses. This week, our hosts take our listeners through the murky world of business email compromise and share examples of these sinister scams that may surprise the most cyber-savvy individuals. You won’t believe the techniques cybercriminals are deploying to trick the av...]]></itunes:summary>
    <description><![CDATA[<p>Have you ever received an email from an executive at your company requesting you to wire money to an account? Then you’ve been affected by a Business Email Compromise, which the FBI has labeled as the number 1 threat to businesses. This week, our hosts take our listeners through the murky world of business email compromise and share examples of these sinister scams that may surprise the most cyber-savvy individuals. You won’t believe the techniques cybercriminals are deploying to trick the average user. Pull up a chair and pour a nice drink because you don’t want to miss this episode of Speakeasy Security.  <br/><br/><b>Links </b></p><p><b>FBI’s IC3: </b><a href='https://www.ic3.gov/Media/Y2020/PSA200406'>https://www.ic3.gov/Media/Y2020/PSA200406</a>  </p><p><b>Deepfake voice example:</b> <a href='https://www.forbes.com/sites/jessedamiani/2019/09/03/a-voice-deepfake-was-used-to-scam-a-ceo-out-of-243000'>https://www.forbes.com/sites/jessedamiani/2019/09/03/a-voice-deepfake-was-used-to-scam-a-ceo-out-of-243000</a> <br/><br/><br/></p><p>This podcast is for informational purposes only and is not intended to replace professional legal, financial or insurance advice. We are not responsible for any losses, damages, or liabilities that may arise from the use of this podcast. The content and views expressed are those of the host and guests.</p>]]></description>
    <content:encoded><![CDATA[<p>Have you ever received an email from an executive at your company requesting you to wire money to an account? Then you’ve been affected by a Business Email Compromise, which the FBI has labeled as the number 1 threat to businesses. This week, our hosts take our listeners through the murky world of business email compromise and share examples of these sinister scams that may surprise the most cyber-savvy individuals. You won’t believe the techniques cybercriminals are deploying to trick the average user. Pull up a chair and pour a nice drink because you don’t want to miss this episode of Speakeasy Security.  <br/><br/><b>Links </b></p><p><b>FBI’s IC3: </b><a href='https://www.ic3.gov/Media/Y2020/PSA200406'>https://www.ic3.gov/Media/Y2020/PSA200406</a>  </p><p><b>Deepfake voice example:</b> <a href='https://www.forbes.com/sites/jessedamiani/2019/09/03/a-voice-deepfake-was-used-to-scam-a-ceo-out-of-243000'>https://www.forbes.com/sites/jessedamiani/2019/09/03/a-voice-deepfake-was-used-to-scam-a-ceo-out-of-243000</a> <br/><br/><br/></p><p>This podcast is for informational purposes only and is not intended to replace professional legal, financial or insurance advice. We are not responsible for any losses, damages, or liabilities that may arise from the use of this podcast. The content and views expressed are those of the host and guests.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1068769/episodes/7434562-show-me-the-money-business-email-compromise-explained.mp3" length="12161077" type="audio/mpeg" />
    <itunes:author>Ranson Burkette &amp; Tony Anscombe</itunes:author>
    <guid isPermaLink="false">Buzzsprout-7434562</guid>
    <pubDate>Fri, 22 Jan 2021 12:00:00 -0800</pubDate>
    <itunes:duration>1011</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>3</itunes:season>
    <itunes:episode>2</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>CES 2021: Bring on the gadgets</itunes:title>
    <title>CES 2021: Bring on the gadgets</title>
    <itunes:summary><![CDATA[The Consumer Electronics Show (CES) is now in its 54th year and ESET is there to check out all the action. Our hosts Ranson and Tony invite ESET Security Researcher Cameron Camp to join the podcast and share some of the cool and innovative things he’s seeing at CES. From the 56-inch infotainment screen in the new Mercedes-Benz to the eye-popping advancements in robotics and computing power, this show is truly back to its muscle-flexing form. So how secure are these new gadgets? Listen to Spea...]]></itunes:summary>
    <description><![CDATA[<p>The Consumer Electronics Show (CES) is now in its 54th year and ESET is there to check out all the action. Our hosts Ranson and Tony invite ESET Security Researcher Cameron Camp to join the podcast and share some of the cool and innovative things he’s seeing at CES. From the 56-inch infotainment screen in the new Mercedes-Benz to the eye-popping advancements in robotics and computing power, this show is truly back to its muscle-flexing form. So how secure are these new gadgets? Listen to Speakeasy Security as we break it all down from CES 2021</p><p><b>Links:</b><br/>Router Swarms Invade your home: <a href='https://www.welivesecurity.com/2021/01/13/ces-2021-router-swarms-invade-home/'>https://www.welivesecurity.com/2021/01/13/ces-2021-router-swarms-invade-home/</a></p><p>This podcast is for informational purposes only and is not intended to replace professional legal, financial or insurance advice. We are not responsible for any losses, damages, or liabilities that may arise from the use of this podcast. The content and views expressed are those of the host and guests.</p>]]></description>
    <content:encoded><![CDATA[<p>The Consumer Electronics Show (CES) is now in its 54th year and ESET is there to check out all the action. Our hosts Ranson and Tony invite ESET Security Researcher Cameron Camp to join the podcast and share some of the cool and innovative things he’s seeing at CES. From the 56-inch infotainment screen in the new Mercedes-Benz to the eye-popping advancements in robotics and computing power, this show is truly back to its muscle-flexing form. So how secure are these new gadgets? Listen to Speakeasy Security as we break it all down from CES 2021</p><p><b>Links:</b><br/>Router Swarms Invade your home: <a href='https://www.welivesecurity.com/2021/01/13/ces-2021-router-swarms-invade-home/'>https://www.welivesecurity.com/2021/01/13/ces-2021-router-swarms-invade-home/</a></p><p>This podcast is for informational purposes only and is not intended to replace professional legal, financial or insurance advice. We are not responsible for any losses, damages, or liabilities that may arise from the use of this podcast. The content and views expressed are those of the host and guests.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1068769/episodes/7278859-ces-2021-bring-on-the-gadgets.mp3" length="23870099" type="audio/mpeg" />
    <itunes:author>Ranson Burkette &amp; Tony Anscombe</itunes:author>
    <guid isPermaLink="false">Buzzsprout-7278859</guid>
    <pubDate>Thu, 14 Jan 2021 08:00:00 -0800</pubDate>
    <itunes:duration>1987</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>3</itunes:season>
    <itunes:episode>1</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Security flaws in smart sex toys!</itunes:title>
    <title>Security flaws in smart sex toys!</title>
    <itunes:summary><![CDATA[ESET researchers have discovered connected sex toys can be vulnerable to cyberattacks. At least they were, until our team shared their findings with us on this podcast. So, what toys were found to be vulnerable and how can they be exploited? And what are the best ways to avoid risking an attack? Tune in to this episode of Speakeasy Security as our hosts speak directly with Cecilia and Denise, the security researchers who uncovered these vulnerabilities. Cheers! This podcast is for information...]]></itunes:summary>
    <description><![CDATA[<p>ESET researchers have discovered connected sex toys can be vulnerable to cyberattacks. At least they were, until our team shared their findings with us on this podcast. So, what toys were found to be vulnerable and how can they be exploited? And what are the best ways to avoid risking an attack? Tune in to this episode of Speakeasy Security as our hosts speak directly with Cecilia and Denise, the security researchers who uncovered these vulnerabilities. Cheers!</p><p>This podcast is for informational purposes only and is not intended to replace professional legal, financial or insurance advice. We are not responsible for any losses, damages, or liabilities that may arise from the use of this podcast. The content and views expressed are those of the host and guests.</p>]]></description>
    <content:encoded><![CDATA[<p>ESET researchers have discovered connected sex toys can be vulnerable to cyberattacks. At least they were, until our team shared their findings with us on this podcast. So, what toys were found to be vulnerable and how can they be exploited? And what are the best ways to avoid risking an attack? Tune in to this episode of Speakeasy Security as our hosts speak directly with Cecilia and Denise, the security researchers who uncovered these vulnerabilities. Cheers!</p><p>This podcast is for informational purposes only and is not intended to replace professional legal, financial or insurance advice. We are not responsible for any losses, damages, or liabilities that may arise from the use of this podcast. The content and views expressed are those of the host and guests.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1068769/episodes/6659317-security-flaws-in-smart-sex-toys.mp3" length="20499941" type="audio/mpeg" />
    <itunes:author>Ranson Burkette &amp; Tony Anscombe</itunes:author>
    <guid isPermaLink="false">Buzzsprout-6659317</guid>
    <pubDate>Thu, 03 Dec 2020 08:00:00 -0800</pubDate>
    <itunes:duration>1706</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>2</itunes:season>
    <itunes:episode>10</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Safe Online Holiday Shopping Tips</itunes:title>
    <title>Safe Online Holiday Shopping Tips</title>
    <itunes:summary><![CDATA[As the holiday season kicks into high gear, Black Friday and sales promotions are inescapable. Cybercriminals are taking note of the increase in online shopping this season, and our hosts Ranson and Tony share their tips for transacting safely. If you’re considering purchasing your gifts online this year, then you don’t want to miss this episode of Speakeasy Security.      Links:   https://www.bttoronto.ca/videos/safe-online-shopping-tips-with-tony-anscombe/    T...]]></itunes:summary>
    <description><![CDATA[<p>As the holiday season kicks into high gear, Black Friday and sales promotions are inescapable. Cybercriminals are taking note of the increase in online shopping this season, and our hosts Ranson and Tony share their tips for transacting safely. If you’re considering purchasing your gifts online this year, then you don’t want to miss this episode of Speakeasy Security.   </p><p> </p><p><b>Links: </b> </p><p><a href='https://www.bttoronto.ca/videos/safe-online-shopping-tips-with-tony-anscombe/'>https://www.bttoronto.ca/videos/safe-online-shopping-tips-with-tony-anscombe/</a> </p><p> </p><p>This podcast is for informational purposes only and is not intended to replace professional legal, financial or insurance advice. We are not responsible for any losses, damages, or liabilities that may arise from the use of this podcast. The content and views expressed are those of the host and guests.</p>]]></description>
    <content:encoded><![CDATA[<p>As the holiday season kicks into high gear, Black Friday and sales promotions are inescapable. Cybercriminals are taking note of the increase in online shopping this season, and our hosts Ranson and Tony share their tips for transacting safely. If you’re considering purchasing your gifts online this year, then you don’t want to miss this episode of Speakeasy Security.   </p><p> </p><p><b>Links: </b> </p><p><a href='https://www.bttoronto.ca/videos/safe-online-shopping-tips-with-tony-anscombe/'>https://www.bttoronto.ca/videos/safe-online-shopping-tips-with-tony-anscombe/</a> </p><p> </p><p>This podcast is for informational purposes only and is not intended to replace professional legal, financial or insurance advice. We are not responsible for any losses, damages, or liabilities that may arise from the use of this podcast. The content and views expressed are those of the host and guests.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1068769/episodes/6465319-safe-online-holiday-shopping-tips.mp3" length="13113711" type="audio/mpeg" />
    <itunes:author>Ranson Burkette &amp; Tony Anscombe</itunes:author>
    <guid isPermaLink="false">Buzzsprout-6465319</guid>
    <pubDate>Fri, 20 Nov 2020 08:00:00 -0800</pubDate>
    <itunes:duration>1090</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>2</itunes:season>
    <itunes:episode>9</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title> Scams. Scams. Scams. Everywhere there’s scams.</itunes:title>
    <title> Scams. Scams. Scams. Everywhere there’s scams.</title>
    <itunes:summary><![CDATA[Are people still falling for romance scams on social media? You would be surprised by the findings revealed in the latest report by the Federal Trade Commission (FTC). Individuals have lost a reported $117 million to scams in the first six months of 2020, and with the holiday season rapidly approaching, there are no signs that point to a slow down. Join us on this week’s episode of Speakeasy Security and learn about the latest scams targeting individuals and how to not fall victim to them. Ch...]]></itunes:summary>
    <description><![CDATA[<p>Are people still falling for romance scams on social media? You would be surprised by the findings revealed in the latest report by the Federal Trade Commission (FTC). Individuals have lost a reported $117 million to scams in the first six months of 2020, and with the holiday season rapidly approaching, there are no signs that point to a slow down. Join us on this week’s episode of Speakeasy Security and learn about the latest scams targeting individuals and how to not fall victim to them. Cheers! <br/><br/><b>Links:</b> <br/>FTC 2nd Quarter Report on Scams: <a href='https://www.ftc.gov/news-events/blogs/data-spotlight/2020/10/scams-starting-social-media-proliferate-early-2020'>https://www.ftc.gov/news-events/blogs/data-spotlight/2020/10/scams-starting-social-media-proliferate-early-2020</a> </p><p>San Diego Oasis Technology Fair – Identity Theft: <a href='https://www.youtube.com/watch?v=oceVN2KCOTI'>https://www.youtube.com/watch?v=oceVN2KCOTI</a> </p><p>This podcast is for informational purposes only and is not intended to replace professional legal, financial or insurance advice. We are not responsible for any losses, damages, or liabilities that may arise from the use of this podcast. The content and views expressed are those of the host and guests.</p>]]></description>
    <content:encoded><![CDATA[<p>Are people still falling for romance scams on social media? You would be surprised by the findings revealed in the latest report by the Federal Trade Commission (FTC). Individuals have lost a reported $117 million to scams in the first six months of 2020, and with the holiday season rapidly approaching, there are no signs that point to a slow down. Join us on this week’s episode of Speakeasy Security and learn about the latest scams targeting individuals and how to not fall victim to them. Cheers! <br/><br/><b>Links:</b> <br/>FTC 2nd Quarter Report on Scams: <a href='https://www.ftc.gov/news-events/blogs/data-spotlight/2020/10/scams-starting-social-media-proliferate-early-2020'>https://www.ftc.gov/news-events/blogs/data-spotlight/2020/10/scams-starting-social-media-proliferate-early-2020</a> </p><p>San Diego Oasis Technology Fair – Identity Theft: <a href='https://www.youtube.com/watch?v=oceVN2KCOTI'>https://www.youtube.com/watch?v=oceVN2KCOTI</a> </p><p>This podcast is for informational purposes only and is not intended to replace professional legal, financial or insurance advice. We are not responsible for any losses, damages, or liabilities that may arise from the use of this podcast. The content and views expressed are those of the host and guests.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1068769/episodes/6130723-scams-scams-scams-everywhere-there-s-scams.mp3" length="13651958" type="audio/mpeg" />
    <itunes:author>Ranson Burkette &amp; Tony Anscombe</itunes:author>
    <guid isPermaLink="false">Buzzsprout-6130723</guid>
    <pubDate>Fri, 30 Oct 2020 08:00:00 -0700</pubDate>
    <itunes:duration>1135</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>2</itunes:season>
    <itunes:episode>8</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Is your palm your new password?  </itunes:title>
    <title>Is your palm your new password?  </title>
    <itunes:summary><![CDATA[Join us this week on Speakeasy Security as Ranson and Tony discuss yet another development in biometrics, the Amazon One. Our hosts have a look at the new tech deployed by Amazon while also examine its commercial applications. We take a trip down memory lane and have a look back at the progress of biometrics in everything from fingerprint scanners to iris/retinal scanning. Grab a beer and enjoy this episode of Speakeasy Security.  Link: Amazon One  This podcast is for informational purpo...]]></itunes:summary>
    <description><![CDATA[<p>Join us this week on Speakeasy Security as Ranson and Tony discuss yet another development in biometrics, the Amazon One. Our hosts have a look at the new tech deployed by Amazon while also examine its commercial applications. We take a trip down memory lane and have a look back at the progress of biometrics in everything from fingerprint scanners to iris/retinal scanning. Grab a beer and enjoy this episode of Speakeasy Security.<br/><br/>Link: <a href='https://one.amazon.com/'>Amazon One</a> </p><p>This podcast is for informational purposes only and is not intended to replace professional legal, financial or insurance advice. We are not responsible for any losses, damages, or liabilities that may arise from the use of this podcast. The content and views expressed are those of the host and guests.</p>]]></description>
    <content:encoded><![CDATA[<p>Join us this week on Speakeasy Security as Ranson and Tony discuss yet another development in biometrics, the Amazon One. Our hosts have a look at the new tech deployed by Amazon while also examine its commercial applications. We take a trip down memory lane and have a look back at the progress of biometrics in everything from fingerprint scanners to iris/retinal scanning. Grab a beer and enjoy this episode of Speakeasy Security.<br/><br/>Link: <a href='https://one.amazon.com/'>Amazon One</a> </p><p>This podcast is for informational purposes only and is not intended to replace professional legal, financial or insurance advice. We are not responsible for any losses, damages, or liabilities that may arise from the use of this podcast. The content and views expressed are those of the host and guests.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1068769/episodes/5900536-is-your-palm-your-new-password.mp3" length="16215796" type="audio/mpeg" />
    <itunes:author>Ranson Burkette &amp; Tony Anscombe</itunes:author>
    <guid isPermaLink="false">Buzzsprout-5900536</guid>
    <pubDate>Fri, 16 Oct 2020 08:00:00 -0700</pubDate>
    <itunes:duration>1349</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>2</itunes:season>
    <itunes:episode>7</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Cybersecurity Awareness Month 2020</itunes:title>
    <title>Cybersecurity Awareness Month 2020</title>
    <itunes:summary><![CDATA[This week our hosts kick off Cybersecurity Awareness Month with a special guest. Ranson and Tony welcome Kelvin Coleman, the executive director of the National Cyber Security Alliance (NCSA) to discuss how his organization is taking the lead to educate and empower the global digital society. Kelvin shares details about this month’s theme, “Do Your Part. #BeCyberSmart” and how you can get involved and support this great initiative. Grab a drink and enjoy this week’s episode. Cheers!  Link...]]></itunes:summary>
    <description><![CDATA[<p>This week our hosts kick off Cybersecurity Awareness Month with a special guest. Ranson and Tony welcome Kelvin Coleman, the executive director of the National Cyber Security Alliance (NCSA) to discuss how his organization is taking the lead to educate and empower the global digital society. Kelvin shares details about this month’s theme, “Do Your Part. #BeCyberSmart” and how you can get involved and support this great initiative. Grab a drink and enjoy this week’s episode. Cheers! </p><p><b>Links</b></p><p>National Cyber Security Alliance: <a href='https://staysafeonline.org/'>https://staysafeonline.org/</a> </p><p>NCSA Twitter: <a href='https://twitter.com/StaySafeOnline'>@StaySafeOnline</a>  </p><p>This podcast is for informational purposes only and is not intended to replace professional legal, financial or insurance advice. We are not responsible for any losses, damages, or liabilities that may arise from the use of this podcast. The content and views expressed are those of the host and guests.</p>]]></description>
    <content:encoded><![CDATA[<p>This week our hosts kick off Cybersecurity Awareness Month with a special guest. Ranson and Tony welcome Kelvin Coleman, the executive director of the National Cyber Security Alliance (NCSA) to discuss how his organization is taking the lead to educate and empower the global digital society. Kelvin shares details about this month’s theme, “Do Your Part. #BeCyberSmart” and how you can get involved and support this great initiative. Grab a drink and enjoy this week’s episode. Cheers! </p><p><b>Links</b></p><p>National Cyber Security Alliance: <a href='https://staysafeonline.org/'>https://staysafeonline.org/</a> </p><p>NCSA Twitter: <a href='https://twitter.com/StaySafeOnline'>@StaySafeOnline</a>  </p><p>This podcast is for informational purposes only and is not intended to replace professional legal, financial or insurance advice. We are not responsible for any losses, damages, or liabilities that may arise from the use of this podcast. The content and views expressed are those of the host and guests.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1068769/episodes/5667583-cybersecurity-awareness-month-2020.mp3" length="27357065" type="audio/mpeg" />
    <itunes:author>Ranson Burkette &amp; Tony Anscombe</itunes:author>
    <guid isPermaLink="false">Buzzsprout-5667583</guid>
    <pubDate>Thu, 01 Oct 2020 08:00:00 -0700</pubDate>
    <itunes:duration>2277</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>2</itunes:season>
    <itunes:episode>6</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>true</itunes:explicit>
  </item>
  <item>
    <itunes:title>The Cybercrime Support Network, explained…</itunes:title>
    <title>The Cybercrime Support Network, explained…</title>
    <itunes:summary><![CDATA[Our hosts Ranson and Tony invite Kristin Judge, CEO and founder of Cybercrime Support Network (CSN) and Fraudsupport.org, to join this week’s episode of Speakeasy Security. With the spike in cybercrime activity, Kristin drops by the podcast to discuss what her organizations are doing to support victims of cybercrime. Whether you’re a victim of a cleverly executed romance scam or have been personally affected by ransomware, Kristin shares her three golden rules for spotting a cybercrime, what ...]]></itunes:summary>
    <description><![CDATA[<p>Our hosts Ranson and Tony invite Kristin Judge, CEO and founder of Cybercrime Support Network (CSN) and Fraudsupport.org, to join this week’s episode of Speakeasy Security. With the spike in cybercrime activity, Kristin drops by the podcast to discuss what her organizations are doing to support victims of cybercrime. Whether you’re a victim of a cleverly executed romance scam or have been personally affected by ransomware, Kristin shares her three golden rules for spotting a cybercrime, what information cybercriminals find valuable, and the law enforcement resources available to help. </p><p>Kristin Judge LinkedIn: <a href='https://www.linkedin.com/in/kristin-judge-1108b624/'>https://www.linkedin.com/in/kristin-judge-1108b624/</a> </p><p>Cybercrime Support Network (CSN): <a href='https://cybercrimesupport.org/'>https://cybercrimesupport.org/</a> </p><p>Fraudsupport.org: <a href='https://fraudsupport.org/'>https://fraudsupport.org/</a> </p><p>Scamspotter: <a href='https://scamspotter.org/'>https://scamspotter.org/</a> </p><p>This podcast is for informational purposes only and is not intended to replace professional legal, financial or insurance advice. We are not responsible for any losses, damages, or liabilities that may arise from the use of this podcast. The content and views expressed are those of the host and guests.</p>]]></description>
    <content:encoded><![CDATA[<p>Our hosts Ranson and Tony invite Kristin Judge, CEO and founder of Cybercrime Support Network (CSN) and Fraudsupport.org, to join this week’s episode of Speakeasy Security. With the spike in cybercrime activity, Kristin drops by the podcast to discuss what her organizations are doing to support victims of cybercrime. Whether you’re a victim of a cleverly executed romance scam or have been personally affected by ransomware, Kristin shares her three golden rules for spotting a cybercrime, what information cybercriminals find valuable, and the law enforcement resources available to help. </p><p>Kristin Judge LinkedIn: <a href='https://www.linkedin.com/in/kristin-judge-1108b624/'>https://www.linkedin.com/in/kristin-judge-1108b624/</a> </p><p>Cybercrime Support Network (CSN): <a href='https://cybercrimesupport.org/'>https://cybercrimesupport.org/</a> </p><p>Fraudsupport.org: <a href='https://fraudsupport.org/'>https://fraudsupport.org/</a> </p><p>Scamspotter: <a href='https://scamspotter.org/'>https://scamspotter.org/</a> </p><p>This podcast is for informational purposes only and is not intended to replace professional legal, financial or insurance advice. We are not responsible for any losses, damages, or liabilities that may arise from the use of this podcast. The content and views expressed are those of the host and guests.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1068769/episodes/5561335-the-cybercrime-support-network-explained.mp3" length="20298678" type="audio/mpeg" />
    <itunes:author></itunes:author>
    <guid isPermaLink="false">Buzzsprout-5561335</guid>
    <pubDate>Thu, 24 Sep 2020 08:00:00 -0700</pubDate>
    <itunes:duration>1689</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>2</itunes:season>
    <itunes:episode>5</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Apple Watch 6 and Amazon Halo - could they be used for Healthtortion?</itunes:title>
    <title>Apple Watch 6 and Amazon Halo - could they be used for Healthtortion?</title>
    <itunes:summary><![CDATA[In this episode our hosts take on fitness devices, trackers and apps that record and capture health data and much more. Earlier this week Apple announced the Apple Watch 6, which features a bevy of new capabilities including a new sensor capable of measuring blood oxygenation levels. This comes on the heels of the Amazon Halo announcement which can also capture a variety of physical and health data. What should you know about how your data is being used and what concerns should you have if yo...]]></itunes:summary>
    <description><![CDATA[<p>In this episode our hosts take on fitness devices, trackers and apps that record and capture health data and much more. Earlier this week Apple announced the Apple Watch 6, which features a bevy of new capabilities including a new sensor capable of measuring blood oxygenation levels. This comes on the heels of the Amazon Halo announcement which can also capture a variety of physical and health data. What should you know about how your data is being used and what concerns should you have if you are wearing a fitness tracker? Tune in to this week’s episode of Speakeasy Security and find out. Cheers! </p><p>This podcast is for informational purposes only and is not intended to replace professional legal, financial or insurance advice. We are not responsible for any losses, damages, or liabilities that may arise from the use of this podcast. The content and views expressed are those of the host and guests.</p>]]></description>
    <content:encoded><![CDATA[<p>In this episode our hosts take on fitness devices, trackers and apps that record and capture health data and much more. Earlier this week Apple announced the Apple Watch 6, which features a bevy of new capabilities including a new sensor capable of measuring blood oxygenation levels. This comes on the heels of the Amazon Halo announcement which can also capture a variety of physical and health data. What should you know about how your data is being used and what concerns should you have if you are wearing a fitness tracker? Tune in to this week’s episode of Speakeasy Security and find out. Cheers! </p><p>This podcast is for informational purposes only and is not intended to replace professional legal, financial or insurance advice. We are not responsible for any losses, damages, or liabilities that may arise from the use of this podcast. The content and views expressed are those of the host and guests.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1068769/episodes/5475010-apple-watch-6-and-amazon-halo-could-they-be-used-for-healthtortion.mp3" length="15968360" type="audio/mpeg" />
    <itunes:author></itunes:author>
    <guid isPermaLink="false">Buzzsprout-5475010</guid>
    <pubDate>Thu, 17 Sep 2020 08:00:00 -0700</pubDate>
    <itunes:duration>1328</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>2</itunes:season>
    <itunes:episode>4</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Evacuation orders! Preparing your tech to go.</itunes:title>
    <title>Evacuation orders! Preparing your tech to go.</title>
    <itunes:summary><![CDATA[On this episode of Speakeasy Security, Ranson and Tony discuss how to prepare your digital devices in the event of an emergency evacuation. As fires continue to ravage communities across California and with other parts of the U.S. facing hurricanes and flooding, mandatory evacuations are forcing thousands of Americans to pack up and leave with little warning. What considerations should be made when preparing your tech to go? Join our hosts as they explain the steps you can take to be prepared...]]></itunes:summary>
    <description><![CDATA[<p>On this episode of Speakeasy Security, Ranson and Tony discuss how to prepare your digital devices in the event of an emergency evacuation. As fires continue to ravage communities across California and with other parts of the U.S. facing hurricanes and flooding, mandatory evacuations are forcing thousands of Americans to pack up and leave with little warning. What considerations should be made when preparing your tech to go? Join our hosts as they explain the steps you can take to be prepared. </p><p><b>LINKS</b> </p><ul><li>WeLiveSecurity: <a href='https://www.welivesecurity.com/2016/02/04/encryption-101-useful/'>Encryption 101</a>  </li><li>Cal Fire: <a href='https://www.fire.ca.gov/resources/'>Resources</a> </li><li>Wildfire: <a href='https://www.readyforwildfire.org/prepare-for-wildfire/go-evacuation-guide/pre-evacuation-preparation'>Pre-evacuation preparation <br/></a> </li></ul><p>This podcast is for informational purposes only and is not intended to replace professional legal, financial or insurance advice. We are not responsible for any losses, damages, or liabilities that may arise from the use of this podcast. The content and views expressed are those of the host and guests.</p>]]></description>
    <content:encoded><![CDATA[<p>On this episode of Speakeasy Security, Ranson and Tony discuss how to prepare your digital devices in the event of an emergency evacuation. As fires continue to ravage communities across California and with other parts of the U.S. facing hurricanes and flooding, mandatory evacuations are forcing thousands of Americans to pack up and leave with little warning. What considerations should be made when preparing your tech to go? Join our hosts as they explain the steps you can take to be prepared. </p><p><b>LINKS</b> </p><ul><li>WeLiveSecurity: <a href='https://www.welivesecurity.com/2016/02/04/encryption-101-useful/'>Encryption 101</a>  </li><li>Cal Fire: <a href='https://www.fire.ca.gov/resources/'>Resources</a> </li><li>Wildfire: <a href='https://www.readyforwildfire.org/prepare-for-wildfire/go-evacuation-guide/pre-evacuation-preparation'>Pre-evacuation preparation <br/></a> </li></ul><p>This podcast is for informational purposes only and is not intended to replace professional legal, financial or insurance advice. We are not responsible for any losses, damages, or liabilities that may arise from the use of this podcast. The content and views expressed are those of the host and guests.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1068769/episodes/5179186-evacuation-orders-preparing-your-tech-to-go.mp3" length="20583644" type="audio/mpeg" />
    <itunes:author>Ranson Burkette &amp; Tony Anscombe</itunes:author>
    <guid isPermaLink="false">Buzzsprout-5179186</guid>
    <pubDate>Fri, 28 Aug 2020 08:00:00 -0700</pubDate>
    <itunes:duration>1713</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>2</itunes:season>
    <itunes:episode>3</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Back to school on the couch!</itunes:title>
    <title>Back to school on the couch!</title>
    <itunes:summary><![CDATA[The school year is right around the corner and for many students this means the return of remote learning. Ranson and Tony discuss what returning to virtual classrooms means for the millions of students heading back to school. With students expected to spend more time learning online than ever before, our hosts discuss recent developments in California and across the US where getting connected is a priority. From the tech and tools needed to the steps taken to prepare for the new normal, catc...]]></itunes:summary>
    <description><![CDATA[<p>The school year is right around the corner and for many students this means the return of remote learning. Ranson and Tony discuss what returning to virtual classrooms means for the millions of students heading back to school. With students expected to spend more time learning online than ever before, our hosts discuss recent developments in California and across the US where getting connected is a priority. From the tech and tools needed to the steps taken to prepare for the new normal, catch this week’s episode of Speakeasy Security and find out what you should know as students head back to school. </p><p><b>Links</b></p><p><b>San Jose Schools &amp; ATT Provide Broadband to students: </b><a href='https://sanjosespotlight.com/san-jose-att-invest-in-free-internet-access-for-students/'>https://sanjosespotlight.com/san-jose-att-invest-in-free-internet-access-for-students/</a> </p><p><b>Pew Research on internet broadband: </b><a href='https://www.pewresearch.org/internet/fact-sheet/internet-broadband/'>https://www.pewresearch.org/internet/fact-sheet/internet-broadband/</a> </p><p><b>Nashville and connectivity issues :</b><a href='https://www.tennessean.com/story/news/education/2020/08/04/metro-nashville-public-schools-start-school-year-virtual-technology/5560082002/'>https://www.tennessean.com/story/news/education/2020/08/04/metro-nashville-public-schools-start-school-year-virtual-technology/5560082002/</a> </p><p> </p><p>This podcast is for informational purposes only and is not intended to replace professional legal, financial or insurance advice. We are not responsible for any losses, damages, or liabilities that may arise from the use of this podcast. The content and views expressed are those of the host and guests.</p>]]></description>
    <content:encoded><![CDATA[<p>The school year is right around the corner and for many students this means the return of remote learning. Ranson and Tony discuss what returning to virtual classrooms means for the millions of students heading back to school. With students expected to spend more time learning online than ever before, our hosts discuss recent developments in California and across the US where getting connected is a priority. From the tech and tools needed to the steps taken to prepare for the new normal, catch this week’s episode of Speakeasy Security and find out what you should know as students head back to school. </p><p><b>Links</b></p><p><b>San Jose Schools &amp; ATT Provide Broadband to students: </b><a href='https://sanjosespotlight.com/san-jose-att-invest-in-free-internet-access-for-students/'>https://sanjosespotlight.com/san-jose-att-invest-in-free-internet-access-for-students/</a> </p><p><b>Pew Research on internet broadband: </b><a href='https://www.pewresearch.org/internet/fact-sheet/internet-broadband/'>https://www.pewresearch.org/internet/fact-sheet/internet-broadband/</a> </p><p><b>Nashville and connectivity issues :</b><a href='https://www.tennessean.com/story/news/education/2020/08/04/metro-nashville-public-schools-start-school-year-virtual-technology/5560082002/'>https://www.tennessean.com/story/news/education/2020/08/04/metro-nashville-public-schools-start-school-year-virtual-technology/5560082002/</a> </p><p> </p><p>This podcast is for informational purposes only and is not intended to replace professional legal, financial or insurance advice. We are not responsible for any losses, damages, or liabilities that may arise from the use of this podcast. The content and views expressed are those of the host and guests.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1068769/episodes/4971956-back-to-school-on-the-couch.mp3" length="16014828" type="audio/mpeg" />
    <itunes:author>Ranson Burkette &amp; Tony Anscombe</itunes:author>
    <guid isPermaLink="false">Buzzsprout-4971956</guid>
    <pubDate>Thu, 13 Aug 2020 08:00:00 -0700</pubDate>
    <itunes:duration>1332</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>2</itunes:season>
    <itunes:episode>2</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Hostage-ware. The hack of Blackbaud</itunes:title>
    <title>Hostage-ware. The hack of Blackbaud</title>
    <itunes:summary><![CDATA[Ranson and Tony are back as Speakeasy Security returns for another season. This week, our hosts dig into a recent hack of Blackbaud that has affected universities, non-profits and charity organizations around the world...and the attackers nearly got away with it! What happened with this attack that Tony labels “Hostage-ware” and how did the attackers take only a subset of data? With data breaches showing no signs of slowing down, this episode of Speakeasy Security goes right to the core of wh...]]></itunes:summary>
    <description><![CDATA[<p>Ranson and Tony are back as Speakeasy Security returns for another season. This week, our hosts dig into a recent hack of Blackbaud that has affected universities, non-profits and charity organizations around the world...and the attackers nearly got away with it! What happened with this attack that Tony labels “Hostage-ware” and how did the attackers take only a subset of data? With data breaches showing no signs of slowing down, this episode of Speakeasy Security goes right to the core of why cybercriminals are continuing to target organizations and their end-users. <br/><br/>BBC story: <a href='https://www.bbc.com/news/technology-53528329'>https://www.bbc.com/news/technology-53528329</a> <br/>Blackbaud statement:  <a href='https://www.blackbaud.com/securityincident'>https://www.blackbaud.com/securityincident</a> <br/>Ventura College Foundation data breach notification: <a href='https://oag.ca.gov/privacy/databreach/list'>https://oag.ca.gov/privacy/databreach/list</a></p><p>This podcast is for informational purposes only and is not intended to replace professional legal, financial or insurance advice. We are not responsible for any losses, damages, or liabilities that may arise from the use of this podcast. The content and views expressed are those of the host and guests.</p>]]></description>
    <content:encoded><![CDATA[<p>Ranson and Tony are back as Speakeasy Security returns for another season. This week, our hosts dig into a recent hack of Blackbaud that has affected universities, non-profits and charity organizations around the world...and the attackers nearly got away with it! What happened with this attack that Tony labels “Hostage-ware” and how did the attackers take only a subset of data? With data breaches showing no signs of slowing down, this episode of Speakeasy Security goes right to the core of why cybercriminals are continuing to target organizations and their end-users. <br/><br/>BBC story: <a href='https://www.bbc.com/news/technology-53528329'>https://www.bbc.com/news/technology-53528329</a> <br/>Blackbaud statement:  <a href='https://www.blackbaud.com/securityincident'>https://www.blackbaud.com/securityincident</a> <br/>Ventura College Foundation data breach notification: <a href='https://oag.ca.gov/privacy/databreach/list'>https://oag.ca.gov/privacy/databreach/list</a></p><p>This podcast is for informational purposes only and is not intended to replace professional legal, financial or insurance advice. We are not responsible for any losses, damages, or liabilities that may arise from the use of this podcast. The content and views expressed are those of the host and guests.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1068769/episodes/4856681-hostage-ware-the-hack-of-blackbaud.mp3" length="18778688" type="audio/mpeg" />
    <itunes:author>Ranson Burkette &amp; Tony Anscombe</itunes:author>
    <guid isPermaLink="false">Buzzsprout-4856681</guid>
    <pubDate>Thu, 06 Aug 2020 08:00:00 -0700</pubDate>
    <itunes:duration>1562</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>2</itunes:season>
    <itunes:episode>1</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Twitter hacked! Are you next? </itunes:title>
    <title>Twitter hacked! Are you next? </title>
    <itunes:summary><![CDATA[With Twitter being hacked last week, Ranson and Tony analyze the latest develops in true Speakeasy Security style – over a cold beer! In this episode, our hosts uncover details about this landmark attack including how it happened, why the attackers selected high-profile Twitter accounts, and how the attackers made money from this hack. You don’t want to miss the season 1 finale of Speakeasy Security.   LINKS  Mashable - Twitter Hack: https://mashable.com/article/slack-key-to-twitter...]]></itunes:summary>
    <description><![CDATA[<p>With Twitter being hacked last week, Ranson and Tony analyze the latest develops in true Speakeasy Security style – over a cold beer! In this episode, our hosts uncover details about this landmark attack including how it happened, why the attackers selected high-profile Twitter accounts, and how the attackers made money from this hack. You don’t want to miss the season 1 finale of Speakeasy Security.  </p><p><b>LINKS</b> </p><p>Mashable - Twitter Hack: <a href='https://mashable.com/article/slack-key-to-twitter-hack/'>https://mashable.com/article/slack-key-to-twitter-hack/</a> </p><p>Twitter Blog: <a href='https://blog.twitter.com/en_us/topics/company/2020/an-update-on-our-security-incident.html'>https://blog.twitter.com/en_us/topics/company/2020/an-update-on-our-security-incident.html</a> </p><p> </p><p>This podcast is for informational purposes only and is not intended to replace professional legal, financial or insurance advice. We are not responsible for any losses, damages, or liabilities that may arise from the use of this podcast. The content and views expressed are those of the host and guests.</p>]]></description>
    <content:encoded><![CDATA[<p>With Twitter being hacked last week, Ranson and Tony analyze the latest develops in true Speakeasy Security style – over a cold beer! In this episode, our hosts uncover details about this landmark attack including how it happened, why the attackers selected high-profile Twitter accounts, and how the attackers made money from this hack. You don’t want to miss the season 1 finale of Speakeasy Security.  </p><p><b>LINKS</b> </p><p>Mashable - Twitter Hack: <a href='https://mashable.com/article/slack-key-to-twitter-hack/'>https://mashable.com/article/slack-key-to-twitter-hack/</a> </p><p>Twitter Blog: <a href='https://blog.twitter.com/en_us/topics/company/2020/an-update-on-our-security-incident.html'>https://blog.twitter.com/en_us/topics/company/2020/an-update-on-our-security-incident.html</a> </p><p> </p><p>This podcast is for informational purposes only and is not intended to replace professional legal, financial or insurance advice. We are not responsible for any losses, damages, or liabilities that may arise from the use of this podcast. The content and views expressed are those of the host and guests.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1068769/episodes/4676837-twitter-hacked-are-you-next.mp3" length="20399951" type="audio/mpeg" />
    <itunes:author>Ranson Burkette &amp; Tony Anscombe</itunes:author>
    <guid isPermaLink="false">Buzzsprout-4676837</guid>
    <pubDate>Thu, 23 Jul 2020 08:00:00 -0700</pubDate>
    <itunes:duration>1697</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>1</itunes:season>
    <itunes:episode>10</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Cutting the cable TV cord and securing streaming</itunes:title>
    <title>Cutting the cable TV cord and securing streaming</title>
    <itunes:summary><![CDATA[This week our hosts discuss cutting the cord, specifically the cable TV cord. Increasingly, US citizens are abandoning cable and switching to streaming services. What are the security implications of ditching cable? Is it possible to eliminate cable and save money at the same time? What is a mesh network of routers and how to set one up? Tony and Ranson discuss their cable-free home setups and invite you to join them for a drink on this week’s episode of Speakeasy Security.    Links...]]></itunes:summary>
    <description><![CDATA[<p>This week our hosts discuss cutting the cord, specifically the cable TV cord. Increasingly, US citizens are abandoning cable and switching to streaming services. What are the security implications of ditching cable? Is it possible to eliminate cable and save money at the same time? What is a mesh network of routers and how to set one up? Tony and Ranson discuss their cable-free home setups and invite you to join them for a drink on this week’s episode of Speakeasy Security. </p><p> </p><p><b>Links: </b> </p><p><b>BGR Study: </b><a href='https://bgr.com/2019/05/09/cord-cutting-statistics-2019/'>https://bgr.com/2019/05/09/cord-cutting-statistics-2019/</a> </p><p> </p><p>This podcast is for informational purposes only and is not intended to replace professional legal, financial or insurance advice. We are not responsible for any losses, damages, or liabilities that may arise from the use of this podcast. The content and views expressed are those of the host and guests.</p>]]></description>
    <content:encoded><![CDATA[<p>This week our hosts discuss cutting the cord, specifically the cable TV cord. Increasingly, US citizens are abandoning cable and switching to streaming services. What are the security implications of ditching cable? Is it possible to eliminate cable and save money at the same time? What is a mesh network of routers and how to set one up? Tony and Ranson discuss their cable-free home setups and invite you to join them for a drink on this week’s episode of Speakeasy Security. </p><p> </p><p><b>Links: </b> </p><p><b>BGR Study: </b><a href='https://bgr.com/2019/05/09/cord-cutting-statistics-2019/'>https://bgr.com/2019/05/09/cord-cutting-statistics-2019/</a> </p><p> </p><p>This podcast is for informational purposes only and is not intended to replace professional legal, financial or insurance advice. We are not responsible for any losses, damages, or liabilities that may arise from the use of this podcast. The content and views expressed are those of the host and guests.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1068769/episodes/4598564-cutting-the-cable-tv-cord-and-securing-streaming.mp3" length="23877894" type="audio/mpeg" />
    <itunes:author>Ranson Burkette &amp; Tony Anscombe</itunes:author>
    <guid isPermaLink="false">Buzzsprout-4598564</guid>
    <pubDate>Thu, 16 Jul 2020 14:00:00 -0700</pubDate>
    <itunes:duration>1987</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>1</itunes:season>
    <itunes:episode>9</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Beat the heat and block cyber criminals this summer. </itunes:title>
    <title>Beat the heat and block cyber criminals this summer. </title>
    <itunes:summary><![CDATA[Traveling this summer? It’s a good idea to do a quick check of your digital devices to ensure they’re protected against cybercriminals. Our hosts Ranson and Tony discuss how to safeguard your devices prior to traveling and provide great tips for when you’ve reached your destination. Grab a beverage and learn how you can be prepared to travel on this week’s Speakeasy Security podcast. Safe travels!   Links  NCSA Travel Guide: https://lqz672gt11i33308z3oiv786-wpengine.netdna-ssl....]]></itunes:summary>
    <description><![CDATA[<p>Traveling this summer? It’s a good idea to do a quick check of your digital devices to ensure they’re protected against cybercriminals. Our hosts Ranson and Tony discuss how to safeguard your devices prior to traveling and provide great tips for when you’ve reached your destination. Grab a beverage and learn how you can be prepared to travel on this week’s Speakeasy Security podcast. Safe travels! </p><p> <b>Links</b> </p><p>NCSA Travel Guide: <a href='https://lqz672gt11i33308z3oiv786-wpengine.netdna-ssl.com/wp-content/uploads/2020/04/CyberTrip-Advisor_-Vacation.pdf'>https://lqz672gt11i33308z3oiv786-wpengine.netdna-ssl.com/wp-content/uploads/2020/04/CyberTrip-Advisor_-Vacation.pdf</a> </p><p> </p><p>This podcast is for informational purposes only and is not intended to replace professional legal, financial or insurance advice. We are not responsible for any losses, damages, or liabilities that may arise from the use of this podcast. The content and views expressed are those of the host and guests.</p>]]></description>
    <content:encoded><![CDATA[<p>Traveling this summer? It’s a good idea to do a quick check of your digital devices to ensure they’re protected against cybercriminals. Our hosts Ranson and Tony discuss how to safeguard your devices prior to traveling and provide great tips for when you’ve reached your destination. Grab a beverage and learn how you can be prepared to travel on this week’s Speakeasy Security podcast. Safe travels! </p><p> <b>Links</b> </p><p>NCSA Travel Guide: <a href='https://lqz672gt11i33308z3oiv786-wpengine.netdna-ssl.com/wp-content/uploads/2020/04/CyberTrip-Advisor_-Vacation.pdf'>https://lqz672gt11i33308z3oiv786-wpengine.netdna-ssl.com/wp-content/uploads/2020/04/CyberTrip-Advisor_-Vacation.pdf</a> </p><p> </p><p>This podcast is for informational purposes only and is not intended to replace professional legal, financial or insurance advice. We are not responsible for any losses, damages, or liabilities that may arise from the use of this podcast. The content and views expressed are those of the host and guests.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1068769/episodes/4407731-beat-the-heat-and-block-cyber-criminals-this-summer.mp3" length="20447699" type="audio/mpeg" />
    <itunes:author>Ranson Burkette &amp; Tony Anscombe</itunes:author>
    <guid isPermaLink="false">Buzzsprout-4407731</guid>
    <pubDate>Wed, 01 Jul 2020 19:00:00 -0700</pubDate>
    <itunes:duration>1701</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>1</itunes:season>
    <itunes:episode>8</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Porn is at your kid’s digital door! Need Parental Controls?</itunes:title>
    <title>Porn is at your kid’s digital door! Need Parental Controls?</title>
    <itunes:summary><![CDATA[On this episode of Speakeasy Security, Ranson and Tony discuss the sensitive topic of parental controls. What do parental controls really accomplish? How can you ensure they are blocking inappropriate content, monitoring online behavior or setting limits on a child’s screen time? What is the recommended ratio of tech to education when it comes to keeping your kids safe online? Our hosts answer these questions and much more on this week’s episode of Speakeasy Security podcast.  Links shar...]]></itunes:summary>
    <description><![CDATA[<p>On this episode of Speakeasy Security, Ranson and Tony discuss the sensitive topic of parental controls. What do parental controls really accomplish? How can you ensure they are blocking inappropriate content, monitoring online behavior or setting limits on a child’s screen time? What is the recommended ratio of tech to education when it comes to keeping your kids safe online? Our hosts answer these questions and much more on this week’s episode of Speakeasy Security podcast. </p><p><b>Links shared: </b> </p><p>Common sense media: <a href='https://www.commonsensemedia.org/'>https://www.commonsensemedia.org/</a> </p><p>Stopbullying: <a href='https://www.stopbullying.gov/'>https://www.stopbullying.gov/</a> <br/><br/>Keep it Real Online: <a href='https://www.keepitrealonline.govt.nz/'>https://www.keepitrealonline.govt.nz/</a> </p><p>This podcast is for informational purposes only and is not intended to replace professional legal, financial or insurance advice. We are not responsible for any losses, damages, or liabilities that may arise from the use of this podcast. The content and views expressed are those of the host and guests.</p>]]></description>
    <content:encoded><![CDATA[<p>On this episode of Speakeasy Security, Ranson and Tony discuss the sensitive topic of parental controls. What do parental controls really accomplish? How can you ensure they are blocking inappropriate content, monitoring online behavior or setting limits on a child’s screen time? What is the recommended ratio of tech to education when it comes to keeping your kids safe online? Our hosts answer these questions and much more on this week’s episode of Speakeasy Security podcast. </p><p><b>Links shared: </b> </p><p>Common sense media: <a href='https://www.commonsensemedia.org/'>https://www.commonsensemedia.org/</a> </p><p>Stopbullying: <a href='https://www.stopbullying.gov/'>https://www.stopbullying.gov/</a> <br/><br/>Keep it Real Online: <a href='https://www.keepitrealonline.govt.nz/'>https://www.keepitrealonline.govt.nz/</a> </p><p>This podcast is for informational purposes only and is not intended to replace professional legal, financial or insurance advice. We are not responsible for any losses, damages, or liabilities that may arise from the use of this podcast. The content and views expressed are those of the host and guests.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1068769/episodes/4309766-porn-is-at-your-kid-s-digital-door-need-parental-controls.mp3" length="22302800" type="audio/mpeg" />
    <itunes:author>Ranson Burkette &amp; Tony Anscombe</itunes:author>
    <guid isPermaLink="false">Buzzsprout-4309766</guid>
    <pubDate>Wed, 24 Jun 2020 18:00:00 -0700</pubDate>
    <itunes:duration>1856</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>1</itunes:season>
    <itunes:episode>7</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>OMG! Another data breach! </itunes:title>
    <title>OMG! Another data breach! </title>
    <itunes:summary><![CDATA[Think that data breaches have slowed down? Think again. Tony and Ranson discuss the alarming rate at which data breaches have been occurring and how some of the best-known companies in the world have been affected. What actions consumers can take to limit their exposure? Listen to this week’s episode and learn how to proactively protect your data.    Links mentioned  IBM and Ponemon Institute Cost of a Data Breach Study: https://www.ibm.com/security/data-breach  Haveibeenp...]]></itunes:summary>
    <description><![CDATA[<p>Think that data breaches have slowed down? Think again. Tony and Ranson discuss the alarming rate at which data breaches have been occurring and how some of the best-known companies in the world have been affected. What actions consumers can take to limit their exposure? Listen to this week’s episode and learn how to proactively protect your data.   </p><p><b>Links mentioned</b> </p><p>IBM and Ponemon Institute Cost of a Data Breach Study: <a href='https://www.ibm.com/security/data-breach'>https://www.ibm.com/security/data-breach</a> </p><p>Haveibeenpwnd: <a href='https://haveibeenpwned.com/'>https://haveibeenpwned.com/</a> </p><p>State of California Attorney General list of Data Breaches: <a href='https://oag.ca.gov/privacy/databreach/list'>https://oag.ca.gov/privacy/databreach/list</a> </p><p> </p><p> </p><p>This podcast is for informational purposes only and is not intended to replace professional legal, financial or insurance advice. We are not responsible for any losses, damages, or liabilities that may arise from the use of this podcast. The content and views expressed are those of the host and guests.</p>]]></description>
    <content:encoded><![CDATA[<p>Think that data breaches have slowed down? Think again. Tony and Ranson discuss the alarming rate at which data breaches have been occurring and how some of the best-known companies in the world have been affected. What actions consumers can take to limit their exposure? Listen to this week’s episode and learn how to proactively protect your data.   </p><p><b>Links mentioned</b> </p><p>IBM and Ponemon Institute Cost of a Data Breach Study: <a href='https://www.ibm.com/security/data-breach'>https://www.ibm.com/security/data-breach</a> </p><p>Haveibeenpwnd: <a href='https://haveibeenpwned.com/'>https://haveibeenpwned.com/</a> </p><p>State of California Attorney General list of Data Breaches: <a href='https://oag.ca.gov/privacy/databreach/list'>https://oag.ca.gov/privacy/databreach/list</a> </p><p> </p><p> </p><p>This podcast is for informational purposes only and is not intended to replace professional legal, financial or insurance advice. We are not responsible for any losses, damages, or liabilities that may arise from the use of this podcast. The content and views expressed are those of the host and guests.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1068769/episodes/4216919-omg-another-data-breach.mp3" length="17838279" type="audio/mpeg" />
    <itunes:author>Ranson Burkette &amp; Tony Anscombe</itunes:author>
    <guid isPermaLink="false">Buzzsprout-4216919</guid>
    <pubDate>Thu, 18 Jun 2020 08:00:00 -0700</pubDate>
    <itunes:duration>1484</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>1</itunes:season>
    <itunes:episode>6</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>What are the risks of running old tech? </itunes:title>
    <title>What are the risks of running old tech? </title>
    <itunes:summary><![CDATA[On this week’s episode of ESET’s Speakeasy Security podcast, hosts Ranson and Tony welcome distinguished researcher Aryeh Goretsky to the show and discuss the risks of using old systems and technology. Aryeh has over 30 years of experience within the cybersecurity industry and shares his concerns, insights and advice for those running older versions of software or devices.   Whether you’re curious about the cyber threats targeting older systems or want to know more about the importance o...]]></itunes:summary>
    <description><![CDATA[<p>On this week’s episode of ESET’s Speakeasy Security podcast, hosts Ranson and Tony welcome distinguished researcher Aryeh Goretsky to the show and discuss the risks of using old systems and technology. Aryeh has over 30 years of experience within the cybersecurity industry and shares his concerns, insights and advice for those running older versions of software or devices.  </p><p>Whether you’re curious about the cyber threats targeting older systems or want to know more about the importance of upgrades and backing up your data, share this with your friends who notoriously run older versions (ahem, Tony!) </p><p>This podcast is for informational purposes only and is not intended to replace professional legal, financial or insurance advice. We are not responsible for any losses, damages, or liabilities that may arise from the use of this podcast. The content and views expressed are those of the host and guests.</p>]]></description>
    <content:encoded><![CDATA[<p>On this week’s episode of ESET’s Speakeasy Security podcast, hosts Ranson and Tony welcome distinguished researcher Aryeh Goretsky to the show and discuss the risks of using old systems and technology. Aryeh has over 30 years of experience within the cybersecurity industry and shares his concerns, insights and advice for those running older versions of software or devices.  </p><p>Whether you’re curious about the cyber threats targeting older systems or want to know more about the importance of upgrades and backing up your data, share this with your friends who notoriously run older versions (ahem, Tony!) </p><p>This podcast is for informational purposes only and is not intended to replace professional legal, financial or insurance advice. We are not responsible for any losses, damages, or liabilities that may arise from the use of this podcast. The content and views expressed are those of the host and guests.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1068769/episodes/4122509-what-are-the-risks-of-running-old-tech.mp3" length="13447823" type="audio/mpeg" />
    <itunes:author>Ranson Burkette &amp; Tony Anscombe</itunes:author>
    <guid isPermaLink="false">Buzzsprout-4122509</guid>
    <pubDate>Thu, 11 Jun 2020 08:00:00 -0700</pubDate>
    <itunes:duration>1118</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>1</itunes:season>
    <itunes:episode>5</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>COVID-19 Contact Tracing Apps </itunes:title>
    <title>COVID-19 Contact Tracing Apps </title>
    <itunes:summary><![CDATA[This week, Ranson and Tony discuss the history of contact tracing as it relates to infectious diseases and address how it’s being done in the digital age. Our hosts address the technological advancements with contact tracing made possible by Apple &amp; Google through mobile phone applications.  This episode also covers privacy implications and considerations when these apps are developed by commercial or government organizations. Grab a frosty beverage and join this week’s episode of Sp...]]></itunes:summary>
    <description><![CDATA[<p>This week, Ranson and Tony discuss the history of contact tracing as it relates to infectious diseases and address how it’s being done in the digital age. Our hosts address the technological advancements with contact tracing made possible by Apple &amp; Google through mobile phone applications.  This episode also covers privacy implications and considerations when these apps are developed by commercial or government organizations. Grab a frosty beverage and join this week’s episode of Speakeasy Security! <br/><br/>LINKS: </p><p>U.S. Center for Disease Control: <a href='https://www.cdc.gov/coronavirus/2019-ncov/php/open-america/contact-tracing-resources.html'>https://www.cdc.gov/coronavirus/2019-ncov/php/open-america/contact-tracing-resources.html</a> </p><p>U.K. National Health Services: <a href='https://www.nhsinform.scot/illnesses-and-conditions/infections-and-poisoning/coronavirus-covid-19/test-and-protect/coronavirus-covid-19-contact-tracing'>https://www.nhsinform.scot/illnesses-and-conditions/infections-and-poisoning/coronavirus-covid-19/test-and-protect/coronavirus-covid-19-contact-tracing</a> </p><p>This podcast is for informational purposes only and is not intended to replace professional legal, financial or insurance advice. We are not responsible for any losses, damages, or liabilities that may arise from the use of this podcast. The content and views expressed are those of the host and guests.</p>]]></description>
    <content:encoded><![CDATA[<p>This week, Ranson and Tony discuss the history of contact tracing as it relates to infectious diseases and address how it’s being done in the digital age. Our hosts address the technological advancements with contact tracing made possible by Apple &amp; Google through mobile phone applications.  This episode also covers privacy implications and considerations when these apps are developed by commercial or government organizations. Grab a frosty beverage and join this week’s episode of Speakeasy Security! <br/><br/>LINKS: </p><p>U.S. Center for Disease Control: <a href='https://www.cdc.gov/coronavirus/2019-ncov/php/open-america/contact-tracing-resources.html'>https://www.cdc.gov/coronavirus/2019-ncov/php/open-america/contact-tracing-resources.html</a> </p><p>U.K. National Health Services: <a href='https://www.nhsinform.scot/illnesses-and-conditions/infections-and-poisoning/coronavirus-covid-19/test-and-protect/coronavirus-covid-19-contact-tracing'>https://www.nhsinform.scot/illnesses-and-conditions/infections-and-poisoning/coronavirus-covid-19/test-and-protect/coronavirus-covid-19-contact-tracing</a> </p><p>This podcast is for informational purposes only and is not intended to replace professional legal, financial or insurance advice. We are not responsible for any losses, damages, or liabilities that may arise from the use of this podcast. The content and views expressed are those of the host and guests.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1068769/episodes/4036457-covid-19-contact-tracing-apps.mp3" length="20811223" type="audio/mpeg" />
    <itunes:author>Ranson Burkette &amp; Tony Anscombe</itunes:author>
    <guid isPermaLink="false">Buzzsprout-4036457</guid>
    <pubDate>Thu, 04 Jun 2020 10:00:00 -0700</pubDate>
    <itunes:duration>1732</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>1</itunes:season>
    <itunes:episode>4</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Happy birthday, GDPR! Protecting personal data for 2 years and counting. </itunes:title>
    <title>Happy birthday, GDPR! Protecting personal data for 2 years and counting. </title>
    <itunes:summary><![CDATA[In this week’s episode of the Speakeasy Security podcast, our hosts Ranson Burkette and Tony Anscombe celebrate the General Data Protection Regulation (GDPR) 2-year anniversary. This legislation created a sea change across the globe for protecting consumer privacy and holds organizations and companies accountable. Ranson and Tony cover the implications of GDPR, regional adaptations of the legislation and share how consumers can potentially limit their exposure. They discuss this and more...al...]]></itunes:summary>
    <description><![CDATA[<p>In this week’s episode of the Speakeasy Security podcast, our hosts Ranson Burkette and Tony Anscombe celebrate the General Data Protection Regulation (GDPR) 2-year anniversary. This legislation created a sea change across the globe for protecting consumer privacy and holds organizations and companies accountable. Ranson and Tony cover the implications of GDPR, regional adaptations of the legislation and share how consumers can potentially limit their exposure. They discuss this and more...all while enjoying a beer! <br/><br/><b>Links mentioned</b> </p><p>ESET Corporate Blog - <b>Two today! The second anniversary of GDPR</b> <br/>Link: <a href='https://www.eset.com/us/about/newsroom/corporate-blog/two-today-the-second-anniversary-of-gdpr/'>https://www.eset.com/us/about/newsroom/corporate-blog/two-today-the-second-anniversary-of-gdpr/</a> </p><p>WeLiveSecurity – <b>Is ‘global privacy’ an oxymoron?</b>   <br/>Link: <a href='https://www.welivesecurity.com/2020/04/14/is-global-privacy-an-oxymoron/'>https://www.welivesecurity.com/2020/04/14/is-global-privacy-an-oxymoron/</a> </p><p>WeLiveSecurity - <b>Two years later, has GDPR fulfilled its promise?</b>  </p><p>Link: <a href='https://www.welivesecurity.com/2020/05/25/two-years-later-has-gdpr-fulfilled-its-promise/'>https://www.welivesecurity.com/2020/05/25/two-years-later-has-gdpr-fulfilled-its-promise/</a> </p><p> </p><p>This podcast is for informational purposes only and is not intended to replace professional legal, financial or insurance advice. We are not responsible for any losses, damages, or liabilities that may arise from the use of this podcast. The content and views expressed are those of the host and guests.</p>]]></description>
    <content:encoded><![CDATA[<p>In this week’s episode of the Speakeasy Security podcast, our hosts Ranson Burkette and Tony Anscombe celebrate the General Data Protection Regulation (GDPR) 2-year anniversary. This legislation created a sea change across the globe for protecting consumer privacy and holds organizations and companies accountable. Ranson and Tony cover the implications of GDPR, regional adaptations of the legislation and share how consumers can potentially limit their exposure. They discuss this and more...all while enjoying a beer! <br/><br/><b>Links mentioned</b> </p><p>ESET Corporate Blog - <b>Two today! The second anniversary of GDPR</b> <br/>Link: <a href='https://www.eset.com/us/about/newsroom/corporate-blog/two-today-the-second-anniversary-of-gdpr/'>https://www.eset.com/us/about/newsroom/corporate-blog/two-today-the-second-anniversary-of-gdpr/</a> </p><p>WeLiveSecurity – <b>Is ‘global privacy’ an oxymoron?</b>   <br/>Link: <a href='https://www.welivesecurity.com/2020/04/14/is-global-privacy-an-oxymoron/'>https://www.welivesecurity.com/2020/04/14/is-global-privacy-an-oxymoron/</a> </p><p>WeLiveSecurity - <b>Two years later, has GDPR fulfilled its promise?</b>  </p><p>Link: <a href='https://www.welivesecurity.com/2020/05/25/two-years-later-has-gdpr-fulfilled-its-promise/'>https://www.welivesecurity.com/2020/05/25/two-years-later-has-gdpr-fulfilled-its-promise/</a> </p><p> </p><p>This podcast is for informational purposes only and is not intended to replace professional legal, financial or insurance advice. We are not responsible for any losses, damages, or liabilities that may arise from the use of this podcast. The content and views expressed are those of the host and guests.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1068769/episodes/3942968-happy-birthday-gdpr-protecting-personal-data-for-2-years-and-counting.mp3" length="20509666" type="audio/mpeg" />
    <itunes:author>Ranson Burkette &amp; Tony Anscombe</itunes:author>
    <guid isPermaLink="false">Buzzsprout-3942968</guid>
    <pubDate>Fri, 29 May 2020 08:00:00 -0700</pubDate>
    <itunes:duration>1707</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>1</itunes:season>
    <itunes:episode>3</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Zooming under the microscope to your home router</itunes:title>
    <title>Zooming under the microscope to your home router</title>
    <itunes:summary><![CDATA[What would be the best way to ensure the privacy and security of a video meeting? During this episode of Cyber Speakeasy, Ranson and Tony discuss video conferencing services and the steps that can be taken to protect video meetings. In addition to addressing Zoom bombing, favored video conferencing platforms, and securing your home router, our hosts share insights about virtual conferences and network bandwidth considerations.  This podcast is for informational purposes only and is not i...]]></itunes:summary>
    <description><![CDATA[<p>What would be the best way to ensure the privacy and security of a video meeting? During this episode of Cyber Speakeasy, Ranson and Tony discuss video conferencing services and the steps that can be taken to protect video meetings. In addition to addressing Zoom bombing, favored video conferencing platforms, and securing your home router, our hosts share insights about virtual conferences and network bandwidth considerations. </p><p>This podcast is for informational purposes only and is not intended to replace professional legal, financial or insurance advice. We are not responsible for any losses, damages, or liabilities that may arise from the use of this podcast. The content and views expressed are those of the host and guests.</p>]]></description>
    <content:encoded><![CDATA[<p>What would be the best way to ensure the privacy and security of a video meeting? During this episode of Cyber Speakeasy, Ranson and Tony discuss video conferencing services and the steps that can be taken to protect video meetings. In addition to addressing Zoom bombing, favored video conferencing platforms, and securing your home router, our hosts share insights about virtual conferences and network bandwidth considerations. </p><p>This podcast is for informational purposes only and is not intended to replace professional legal, financial or insurance advice. We are not responsible for any losses, damages, or liabilities that may arise from the use of this podcast. The content and views expressed are those of the host and guests.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1068769/episodes/3832433-zooming-under-the-microscope-to-your-home-router.mp3" length="24705204" type="audio/mpeg" />
    <itunes:author>Ranson Burkette &amp; Tony Anscombe</itunes:author>
    <guid isPermaLink="false">Buzzsprout-3832433</guid>
    <pubDate>Thu, 21 May 2020 08:00:00 -0700</pubDate>
    <itunes:duration>2056</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>1</itunes:season>
    <itunes:episode>2</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>These Crazy COVID-19 Times</itunes:title>
    <title>These Crazy COVID-19 Times</title>
    <itunes:summary><![CDATA[During the inaugural of the ESET Podcast, Cyber Speak Easy, hosts Ranson Burkette and Tony Anscombe introduce us to the unfolding world of cyberthreats occurring during the COVID-19 pandemic. Tony highlights that the public need to be more vigilant about their security than ever as Phishing Emails and Business Email Compromise are on the rise. Tony also ranks the three (3) most important items to protect from COVID-19 scammers and the number one thing people should learn from scammers. This p...]]></itunes:summary>
    <description><![CDATA[<p>During the inaugural of the ESET Podcast, Cyber Speak Easy, hosts Ranson Burkette and Tony Anscombe introduce us to the unfolding world of cyberthreats occurring during the COVID-19 pandemic.</p><p>Tony highlights that the public need to be more vigilant about their security than ever as Phishing Emails and Business Email Compromise are on the rise. Tony also ranks the three (3) most important items to protect from COVID-19 scammers and the number one thing people should learn from scammers.</p><p>This podcast is for informational purposes only and is not intended to replace professional legal, financial or insurance advice. We are not responsible for any losses, damages, or liabilities that may arise from the use of this podcast. The content and views expressed are those of the host and guests.</p>]]></description>
    <content:encoded><![CDATA[<p>During the inaugural of the ESET Podcast, Cyber Speak Easy, hosts Ranson Burkette and Tony Anscombe introduce us to the unfolding world of cyberthreats occurring during the COVID-19 pandemic.</p><p>Tony highlights that the public need to be more vigilant about their security than ever as Phishing Emails and Business Email Compromise are on the rise. Tony also ranks the three (3) most important items to protect from COVID-19 scammers and the number one thing people should learn from scammers.</p><p>This podcast is for informational purposes only and is not intended to replace professional legal, financial or insurance advice. We are not responsible for any losses, damages, or liabilities that may arise from the use of this podcast. The content and views expressed are those of the host and guests.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1068769/episodes/3684070-these-crazy-covid-19-times.mp3" length="10100308" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/o766pczliiab2cvgvx940vhoaetx?.jpg" />
    <itunes:author>Ranson Burkette &amp; Tony Anscombe</itunes:author>
    <guid isPermaLink="false">Buzzsprout-3684070</guid>
    <pubDate>Thu, 14 May 2020 16:00:00 -0700</pubDate>
    <itunes:duration>839</itunes:duration>
    <itunes:keywords>ESET, CyberSecurity, Malware, Privacy, IOT</itunes:keywords>
    <itunes:season>1</itunes:season>
    <itunes:episode>1</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
</channel>
</rss>
