Harris and Scott are comedians, music lovers, and friends. Where do they differ? Harris loves Phish, and Scott does not. On Analyze Phish, Harris navigates the vast landscape of Phish's catalogue to find entry points for Scott while trying to explain the live Phish experience without the use of illegal substances.
…
continue reading
A podcast to celebrate the music.
…
continue reading
Join PhiSho as he gives his thoughts on current events on the culture. | follow @PhiShoHub on Instagram and Twitter for more.
…
continue reading
Highlights from the latest Phish show. Reactions and reviews. Call-in with couch tour tales and donut reviews.
…
continue reading
Podcast by PHish
…
continue reading
Ready to change how you think about cybersecurity? Every other week, Mimecast’s Brian Pinnock and Alice Jeffrey are joined by a special guest for tales of risk, reward and just a dash of ridiculousness. Whether it’s a tech expert who is not your average CIO or an expert from a field you wouldn’t expect, we’ll be exploring the lesser seen side of cybersecurity – to learn how we can all improve in the fight to stay safe.
…
continue reading
“The Phishing Report” is about technology and safely using these tools in today’s world. Whether you are in a big business, small business, governmental agency or nonprofit organization, protecting yourself from online harm and protecting your identity from theft is pretty important. Max Gibbard, from TeamLogic IT, in collaboration with special guests and subject matter experts in the cybersecurity arena, will share current research and best practices from across the industry. Each episode w ...
…
continue reading
The definitive retrospective of one of music’s most memorable festivals, Phish’s Big Cypress. In December of 1999, Phish drew an estimated 80,000 to the Big Cypress Indian Reservation in Florida’s Everglades, making this festival the largest Millennium Eve concert on earth. We look back on the festival 20 years later—and examine the legacy for Phish and the music world. Hosted and narrated by Jesse Jarnow, this five-episode series draws on interviews with members of Phish and its crew, fan m ...
…
continue reading
1
Exposing Shortcomings in Cybersecurity Leadership and why we need more Dana Scullys
33:49
33:49
Redă mai târziu
Redă mai târziu
Liste
Like
Plăcut
33:49
In this episode of Phishy Business, we talk about the improper mindset of not thinking about security until after you have been breached, and some of the major problems this can cause. We do this through the lens of SIEM, ethical hacking, and a focus on the need for leadership in teaching organizations how to be secure. We also discuss how some IT …
…
continue reading
1
Built-In Bias: Existing Real-World Inequality in AI and Other Technology
34:31
34:31
Redă mai târziu
Redă mai târziu
Liste
Like
Plăcut
34:31
In this episode of Phishy Business, we talk about various important discussions around AI, including the concerning issue of built-in bias and stereotypes. Imagine AI thinking that all doctors must be male, and all nurses must be female? Well, according to ChatGPT, they are. Our special guest is Ivana Bartoletti, Global Privacy Officer at Wipro. Iv…
…
continue reading
1
Protecting Shoes: Balancing Cybersecurity Strategy and Business Success at Dr Martens
31:51
31:51
Redă mai târziu
Redă mai târziu
Liste
Like
Plăcut
31:51
In this episode of Phishy Business, we talk about how today's cybersecurity strategy needs to focus on risk while still allowing smooth operation of the business. We also discuss how cybersecurity must involve the board so that business goals and cyber strategy align. Our special guest is Theo Botha, Global Information Security Officer at Dr. Marte…
…
continue reading
1
CIS Roundtable – Keeping the Public Sector Secure
35:47
35:47
Redă mai târziu
Redă mai târziu
Liste
Like
Plăcut
35:47
In this episode of Phishy Business, we feature a roundtable discussion with three members from the Center for Internet Security. Mimecast CMO Norman Guadagno hosts this wide-ranging discussion that covers many topics including cybersecurity trends in the public sector and why information sharing is essential to keeping our connected world safe. Our…
…
continue reading
1
What has ESG got to do with Cybersecurity?
34:30
34:30
Redă mai târziu
Redă mai târziu
Liste
Like
Plăcut
34:30
In this episode of Phishy Business, we talk about environmental, social, and governance, commonly known throughout the corporate world as ESG, and how cybersecurity fits into corporate sustainability. Our special guest is Garyn Rapson who is a partner and the head of ESG at African law firm Webber Wentzel. Garyn manages a team of nine lawyers that …
…
continue reading
1
CIOs Should think like Entrepreneurs on Dragon’s Den
32:51
32:51
Redă mai târziu
Redă mai târziu
Liste
Like
Plăcut
32:51
In this episode of Phishy Business, we talk about some of the cybersecurity trends and worries facing today’s global CIOs. Our special guest is Martin Wallgren who is the CIO of global logistics and shipping company, Gulf Agency Company, headquartered in Dubai. Martin says he is an entrepreneurial tech nerd with a business mindset who does business…
…
continue reading
1
Proud Hackers: Understanding Criminal Minds
34:22
34:22
Redă mai târziu
Redă mai târziu
Liste
Like
Plăcut
34:22
In this episode of Phishy Business, we talk about the psychology behind crime, particularly cybercrime and white-collar crime. We delve into the reasons why most cybercriminals are roaming free and don’t get caught, yet deep down, really want to tell their story. Our special guest is Mark T. Hoffmann, a crime and intelligence analyst and business p…
…
continue reading
1
Keeping Threats ‘At-Bay’ – Normalizing Cyber Insurance as Part of Business
26:48
26:48
Redă mai târziu
Redă mai târziu
Liste
Like
Plăcut
26:48
In this episode of Phishy Business, we bring you a special recording from the show floor at RSA Conference. Hosted by Mimecast’s CMO Norman Guadagno, this episode delves into cyber insurance and how managing risk has had to adapt to the modern digital economy. You’ll learn exactly what cyber insurance is, why it’s important and how insurers should …
…
continue reading
1
RSAC Part 2: CISO trends + thinking differently about tradeshows
44:13
44:13
Redă mai târziu
Redă mai târziu
Liste
Like
Plăcut
44:13
In part two of this special RSA episode Mimecast CMO, Norman Guadagno, interviews another four guests live from the conference show floor. We talk about how cybersecurity has changed over the years, bringing more diversity to the industry and how exactly one becomes a CISO. Our guests for part two: Julian Waits, SVP business development at Rapid7 (…
…
continue reading
1
ChatGPT buzz + much more from the RSAC show floor
51:52
51:52
Redă mai târziu
Redă mai târziu
Liste
Like
Plăcut
51:52
In this episode of Phishy Business, Mimecast CMO and guest host Norman Guadagno, chats to four different people at this year’s RSA Conference in San Francisco. Our guests were interviewed in our very own podcast recording studio at the Mimecast booth. In part one of this two-part episode, we learn more about our guests' roles, their companies, and …
…
continue reading
1
Using Criminal Skills for Good - a Memoir of a Burglar for Hire
33:32
33:32
Redă mai târziu
Redă mai târziu
Liste
Like
Plăcut
33:32
In this episode of Phishy Business, we discuss social engineering, the professional con game of burglary for hire, and different aspects of how this very specialized skill can impact organizations and individuals. Our special guest is Jenny Radcliffe, who was our very first interview on the podcast and made a return appearance in our episode on job…
…
continue reading
1
It’s Time to Retire the Risk Management Profession
34:31
34:31
Redă mai târziu
Redă mai târziu
Liste
Like
Plăcut
34:31
In this episode of Phishy Business, we discuss some important ways to think about and look at risk and how its more about making decisions than assessing threats. Our special guest is Stefan Gershater, Director of Risk at Burberry. Stefan is a risk management expert, a biochemist, and a navy veteran. Stefan says that as a risk expert, he tries to m…
…
continue reading
1
Why Security Professionals Should Consider Career Coaching
32:09
32:09
Redă mai târziu
Redă mai târziu
Liste
Like
Plăcut
32:09
In this episode of Phishy Business, we discuss career coaching, looking at what it is, and how it can benefit all professionals, including those in the cybersecurity space. We delve into the differences between coaching and mentoring and discuss what to expect when working with a career coach. Our special guests are executive coach and mentor Fiona…
…
continue reading
1
Scary Smart AI? Or the Potential to Be a Force for Good?
44:37
44:37
Redă mai târziu
Redă mai târziu
Liste
Like
Plăcut
44:37
In this episode of Phishy Business, we discuss what can be a very scary side of AI – when bots start thinking for themselves. We delve into some examples of this actually happening, but also look at the good AI is providing humankind. Our special guest is Mo Gawdat, former chief business officer at Google X and bestselling author of the books Solve…
…
continue reading
1
Work Inspired – What’s Possible in Shaping Corporate Culture
25:25
25:25
Redă mai târziu
Redă mai târziu
Liste
Like
Plăcut
25:25
In this episode of Phishy Business, we discuss the idea of Work Inspired, a corporate culture where employees all love to work because it turns out that happy employees are very good for business. Our special guest is Aron Ain, award-winning, retired CEO of UKG, formerly known as Kronos. Aron now serves as Executive Chair of the UKG Board of Direct…
…
continue reading
1
Cyber Extortion – The Next Evolution of Ransomware
33:54
33:54
Redă mai târziu
Redă mai târziu
Liste
Like
Plăcut
33:54
In this episode of Phishy Business, we discuss the very definition of ransomware and how it can be an overused and underdefined concept. We also take a closer look at the world of threat research. Our special guest is former professional hacker Charl van der Walt, Head of Security Research at Orange CyberDefense, who now spends his time asking and …
…
continue reading
1
Marketing as Customer Experience – Be an Active Listener
33:11
33:11
Redă mai târziu
Redă mai târziu
Liste
Like
Plăcut
33:11
In this episode of Phishy Business, we discuss how cybersecurity marketing, sales, and support are for the most part inadequate, and how there can be a big disconnect between how marketers market and how technology professionals buy. We talk more about how marketing should consider the customer experience and how marketing departments should not on…
…
continue reading
In this bonus episode of Phishy Business, we continue to recognize the value of the work of cybersecurity professionals. Join us as Peter Coroneos, Founder and Executive Chairman of Cybermindz.org, takes us through a 10-minute meditation aimed at lowering stress. This is a just a taste of the whole Cybermindz protocol, and worth a try!…
…
continue reading
1
Cybermindz – Hope in a Burnt-Out Sector
29:51
29:51
Redă mai târziu
Redă mai târziu
Liste
Like
Plăcut
29:51
In this episode of Phishy Business, we honor and recognize the value of the work of those professionals who spend their days defending people and organizations from cyberattacks by taking a close look at one of the biggest problems the industry faces today: worker burnout and the associated mental health issues. Join us as we discuss how while many…
…
continue reading
1
Criminals are like water, adapting to new circumstances
34:45
34:45
Redă mai târziu
Redă mai târziu
Liste
Like
Plăcut
34:45
In this episode of Phishy Business, we discuss how criminals are like water because of how they flow, and adapt around obstacles and security measures, always looking for a way in no matter what security professionals put in their way. You’ll learn more about how well-thought-out cybersecurity strategies, tools, and responses can be, especially in …
…
continue reading
1
Risk, Risk, Risk…and Beer: What Keeps the Cyber C-Suite Up at Night
36:17
36:17
Redă mai târziu
Redă mai târziu
Liste
Like
Plăcut
36:17
In this episode of Phishy Business, we find out everything you may have wanted to ask your CISO or CIO but were too afraid to ask. Two very experienced information technology leaders delve deeper into the roles they play in keeping their organizations safe while balancing the nos and yesses they deal in every day. You’ll learn a lot more about that…
…
continue reading
In this episode of Phishy Business, we take a look at data, which some have called the new gold or the new oil and discuss why it really is something more like the new uranium because it has such a huge potential to impact society, just like uranium did in the 20th century. And just like uranium, data can be used for good, and for bad. Join us as w…
…
continue reading
In this episode of Phishy Business, we take a look at AI. We talk on the fact that the stigma of AI running amok in Terminator-fashion is a myth we must dispel in the face of all the good AI can do in protecting the world - from cyberattacks to helping with climate change. We also talk about the other major challenges that AI can be used to solve g…
…
continue reading
1
Beyond Awareness Training: How to Improve User Behavior
33:48
33:48
Redă mai târziu
Redă mai târziu
Liste
Like
Plăcut
33:48
In this episode of Phishy Business, we take a look at how cybersecurity awareness training needs to go beyond just having users sit through training, but in fact, has to work to change user behavior. Listen in to learn more about the importance of cybersecurity awareness training at organizations of all sizes across the globe and how, with today’s …
…
continue reading
1
Shining a Light on Bots: The Good and the Bad
30:20
30:20
Redă mai târziu
Redă mai târziu
Liste
Like
Plăcut
30:20
In this episode of Phishy Business, we take a look at bots. Listen in to learn more about what bots are, and what they do. Also, learn what can make them good…and what can make them bad. It would seem the answer lies within the intent of the person deploying them. Our special guests are Cyril Noel-Tagoe, Principal Security Researcher at Netacea, an…
…
continue reading
1
The Billion Dollar Cryptocurrency Scam
31:25
31:25
Redă mai târziu
Redă mai târziu
Liste
Like
Plăcut
31:25
In this episode of Phishy Business, we take a look at what has been called the smartest and biggest scam of the 21st century, OneCoin, a cryptocurrency that brought in $4 billion in investments via multi-level marketing and proved to be nothing but a scheme that made one woman who is still on the run very rich. This wasn’t a backroom con, but in fa…
…
continue reading
1
Closing the cybersecurity skills gap through education and opportunity
32:38
32:38
Redă mai târziu
Redă mai târziu
Liste
Like
Plăcut
32:38
In this episode of Phishy Business, we take a look at the skills shortage being faced by IT departments when it comes to hiring cybersecurity experts and how the Absa Cybersecurity Academy is working with its partner, the Maharishi Institute, to assist in helping marginalized South African youth to become certified cybersecurity experts. Together, …
…
continue reading
1
Actors, tabletop exercises, and insider threats
30:55
30:55
Redă mai târziu
Redă mai târziu
Liste
Like
Plăcut
30:55
In this episode of Phishy Business, we take a look at cyber crisis exercises and insider threats. Our special guest is Lisa Forte, an expert on running cyber crisis exercises and training high-risk staff on insider threats and social engineering, who was named one of the top 30 female cybersecurity leaders by SC Magazine. Lisa works hard to simulat…
…
continue reading
1
The Internet Tattoo Effect and common sense online safety
33:41
33:41
Redă mai târziu
Redă mai târziu
Liste
Like
Plăcut
33:41
In this episode of Phishy Business, we take a look at ways for children and teens to stay safe while online. Our special guest is Emma Sadleir, a leading expert in social media law who educates individuals and organizations about the legal, disciplinary, and reputational risks of social media. Emma is also the co-author of Selfies, Sex, and Smartph…
…
continue reading
1
Advanced Persistent Threat Groups: Preparing Instead of Hoping
25:29
25:29
Redă mai târziu
Redă mai târziu
Liste
Like
Plăcut
25:29
In this episode of Phishy Business, we take a look at advanced persistent threat groups, also known as APT Groups. Special guest Krijn de Mik, Incident Response and Intelligence Lead at Hunt & Hackett, where he specializes in investigations, forensic analysis, and tracking threat actors and threat actor groups, gives his insight on how organization…
…
continue reading
1
Quantum Computing: Qubits, Algorithms, and Cybersecurity?
28:57
28:57
Redă mai târziu
Redă mai târziu
Liste
Like
Plăcut
28:57
In this episode of Phishy Business, we delve into the current and future state of quantum computing, and make some predictions about how it will impact cybersecurity and the world in general. Just how cybersecurity doesn’t just impact organizations, but is something that every user should be thinking about, quantum computing is going to have a wide…
…
continue reading
1
The Lazarus Heist: From Phishing Emails to Half a Ton of Cash
25:22
25:22
Redă mai târziu
Redă mai târziu
Liste
Like
Plăcut
25:22
The Lazarus Heist: From Phishing Emails to Half a Ton of Cash In this episode of Phishy Business, we sit down with Geoff White, investigative journalist, host of The Lazarus Heist Podcast, and now, author of The Lazarus Heist book, which tells the incredible true stories of some of the most high-profile cyberattacks in the world. In The Lazarus Hei…
…
continue reading
1
A Real Life Phishy Business: Jobfished, catfished by your boss?
33:21
33:21
Redă mai târziu
Redă mai târziu
Liste
Like
Plăcut
33:21
In this episode of Phishy Business, we dig into the viral BBC documentary called Jobfished, which tells the story of an alleged con that tricked a pool of design workers into working for a fake agency…for free! Special guests Catrin Nye, the investigative journalist who broke the story, and renowned people hacker and social engineer Jenny Radcliffe…
…
continue reading
1
Hacker life: Insights into hacking, penetration testing, and more
31:49
31:49
Redă mai târziu
Redă mai târziu
Liste
Like
Plăcut
31:49
In this episode of Phishy Business, we speak to Elger Jonker who has been active as an ethical hacker and penetration tester for quite a few years. Elger is now in the process of setting up one of the world’s largest hacker camps and conferences. In addition to speaking with Elger about this exciting new event, we also discuss his tips and tricks t…
…
continue reading
1
Making cybersecurity a business priority - the World Economic Forum’s Global Cybersecurity Outlook 2022
35:29
35:29
Redă mai târziu
Redă mai târziu
Liste
Like
Plăcut
35:29
This week, we speak to Algirde Pipikaite, cybersecurity strategy lead at the World Economic Forum, about their Global cybersecurity outlook report findings, including some concerning misperceptions between business and IT leaders on cybersecurity matters. Our wide-ranging discussion covers the reasons why having a resilient business is good for pro…
…
continue reading
Imagine being the CEO of tech company. Now imagine your company gets hacked; not once… but twice. This is what happened to our guest, Scott Schober, a CEO, best-selling author of the book ‘Hacked Again’ and cybersecurity educator. We discuss how his company got breached, his mission to educate other business leaders on good cyber hygiene, and - cru…
…
continue reading
1
Being ‘always on’ earned our guest a front row seat to the best tech stories of the last few decades
36:26
36:26
Redă mai târziu
Redă mai târziu
Liste
Like
Plăcut
36:26
Ever wonder what it is like to be at THE iPhone launch with Steve Jobs or to interview Elon Musk? Our guest this week has done both those things, and so much more. Rory Cellan Jones is the former tech correspondent at the BBC, and now author of ‘Always on – hope and fear in the smartphone era’. We cover everything from his best stories from his yea…
…
continue reading
1
Starting small to succeed – two inspiring women with a bright future
30:15
30:15
Redă mai târziu
Redă mai târziu
Liste
Like
Plăcut
30:15
On the 8th of March every year, we celebrate International Women’s Day, an opportunity to recognise all the inspiring and resilient women across the world. In this week’s episode, we interview two of our own colleagues: Dimakatso Makinta and Sebenzile Sibisi. These incredible women have both overcome huge challenges to get to where they are today. …
…
continue reading
1
Giving orders can get you in big trouble – intent-based leadership tales
27:26
27:26
Redă mai târziu
Redă mai târziu
Liste
Like
Plăcut
27:26
We speak to Captain David Marquet best-selling author, creator of Intent-based leadership and former commander of nuclear-powered submarines for the US Navy. We talk about his career and how that shaped his views on leadership. We discuss his philosophy of intent-based leadership, his commitment to give control to and treat his team as leaders. Thi…
…
continue reading
1
Recovering from a cyberattack, openness, snacks and memory sticks
35:38
35:38
Redă mai târziu
Redă mai târziu
Liste
Like
Plăcut
35:38
This week, we speak to one of the most well-known leaders in the tech sector, Adam Banks. Adam is the former Group CTO & CIO at A.P Moller Maersk and lead the recovery from the most expensive cyberattack in history. We discuss what happened, how he drove the recovery, the importance of being open when experiencing a cyber incident, recognising that…
…
continue reading
1
Workhorses, kidnappings, and ransomware
34:13
34:13
Redă mai târziu
Redă mai târziu
Liste
Like
Plăcut
34:13
In this episode we speak to Marc Brandner, partner at SmartRiskSolutions a risk and crisis management consultancy. He served as an officer of the German Special Forces (KSK) in various command assignments in Germany and abroad. He now supports customers both in crisis prevention and in the architecture of holistic and seamless security management. …
…
continue reading
1
Chasing cybercriminals across borders – the world of digital forensics
31:27
31:27
Redă mai târziu
Redă mai târziu
Liste
Like
Plăcut
31:27
This week we speak with Danny Myburgh, a digital forensics expert and the managing Director of Cyanre - The Digital Forensic Lab. He was responsible for establishing the National Computer Crime Investigation Unit for the South African Police Service and was trained by the FBI and the French Police. We chat about the current state of the threat land…
…
continue reading
1
Cartoon eyes, and other cybersecurity awareness training techniques
36:34
36:34
Redă mai târziu
Redă mai târziu
Liste
Like
Plăcut
36:34
This week we speak to Mike Gruen, CISO and CTO and Dr. Daniel Glaser, a neuroscientist, about how humour can help in learning. We talk about how to build effective cybersecurity awareness programmes, how to positively harness our innate fear of being judged, and that cyber resilience is everybody’s responsibility. In ‘Cartoon eyes, and other cybers…
…
continue reading
1
Our guest may enjoy being naked, but you should have your brand covered
30:59
30:59
Redă mai târziu
Redă mai târziu
Liste
Like
Plăcut
30:59
This week we speak with Mike Sharman, the owner and co-founder of Retroviral Digital Communications and RetroActive Digital, and the author of the best-selling book, The Best Dick: A Candid Account of Building a $1m Business. We discuss the importance of brand reputation, what goes into building a strong brand and how organisations can maintain the…
…
continue reading
1
The New Normal in cyber security, an interview with Michelle Price by The Economist Impact
39:22
39:22
Redă mai târziu
Redă mai târziu
Liste
Like
Plăcut
39:22
BONUS EPISODE In this bonus episode of our Phishy Business podcast, Michelle Price, CEO of AustCyber an independent, not for profit, government funded Australian cyber security growth network, is interviewed by the Economist Impact about how organisations can effectively plan for the future and its cybersecurity environment that seems to be changin…
…
continue reading
1
Small company – Big cybersecurity issues
24:06
24:06
Redă mai târziu
Redă mai târziu
Liste
Like
Plăcut
24:06
This week we speak with Achim von Michel, the press secretary of the German Association of Small and Medium Businesses. We discuss the need for SMBs to take cyber security seriously, some of the challenges these types of companies face such as skills shortages and bureaucracy, as well as the benefits of working for smaller companies. In ‘Small comp…
…
continue reading
1
How data protection relates to cyber security, an interview with Kerissa Varma by The Economist Impact
31:39
31:39
Redă mai târziu
Redă mai târziu
Liste
Like
Plăcut
31:39
BONUS EPISODE In this bonus episode of our Phishy Business podcast, Kerissa Varma, Group CISO of Old Mutual Limited, is interviewed by the Economist Impact about data protection and how this related to cyber security, a podcast commissioned by Mimecast. About Phishy Business Fed up with the same old cybersecurity stories? Come with us on a journey …
…
continue reading
1
Teenagers and cybercrime – the draw of malice and money?
30:37
30:37
Redă mai târziu
Redă mai târziu
Liste
Like
Plăcut
30:37
Listen to this interesting episode featuring how law enforcement tries to prevent young offenders from making a career in cybercrime. We speak to Floor Jansen, team leader of the offender prevention squad of the Dutch police, and British offender prevention expert Gregory Francis about young cybercrime offenders. We discuss their sometimes surprisi…
…
continue reading
1
The impact of ransomware, an interview with Prof. Ciaran Martin by The Economist Impact
32:28
32:28
Redă mai târziu
Redă mai târziu
Liste
Like
Plăcut
32:28
BONUS EPISODE In this bonus episode of our Phishy Business podcast, professor Ciaran Martin, the former founding CEO of the UK National Cyber Security Centre (NCSC) and current Professor of Practice in the Management of Public Organisations at the University of Oxford is interviewed by the Economist Impact about ransomware and other interesting top…
…
continue reading
This week we speak to Ciaran Martin, the former founding CEO of the UK National Cyber Security Centre (NCSC) and current Professor of Practice in the Management of Public Organisations at the University of Oxford. We discuss how the NCSC got started, how they communicate cyber threats to the general public without infantilising them, the need for s…
…
continue reading