PodcastsTechnologiesPlaintext with Rich

Plaintext with Rich

Rich Greene
Plaintext with Rich
Dernier épisode

10 épisodes

  • Plaintext with Rich

    Ransomware Starts With Access And Ends With Leverage

    30/1/2026 | 8 min
    Your screens don’t go dark first they go quiet. We walk through how modern ransomware begins with access, not chaos, and why double extortion flipped the incentives: attackers steal sensitive data, then encrypt to amplify pressure. That shift turns incidents into business crises that touch legal, communications, customer trust, and sometimes survival.

    We unpack the boring but true entry points phishing, password reuse, exposed remote access, lagging patches, and over-privileged vendors and show how patient operators stage data theft before any ransom note appears. You’ll hear how today’s crews operate like a supply chain, from initial access brokers to negotiators, and why understanding that structure helps you break the attack at practical seams. Then we lay out a plain text defense starter kit: immutable, tested backups; multi-factor authentication on what matters; urgent patching for internet-facing systems; reduced administrative sprawl; and network segmentation to limit blast radius.

    When the worst happens, acting deliberately beats reacting emotionally. We share a concise incident playbook: isolate systems, preserve evidence, involve experienced responders and legal early, confirm what was accessed and exfiltrated, and communicate with verified facts. We also tackle the hard question should you pay? with honest trade-offs and a focus on building options before you ever face that decision. Finally, we clear away myths: small targets are still targets, antivirus isn’t a strategy, and backups don’t fix data leaks.

    If this breakdown helps, subscribe, share it with someone who would benefit, and tell us what security topic you want next we read and respond to every message.
    Is there a topic/term you want me to discuss next? Text me!!
  • Plaintext with Rich

    IoT Security Made Simple: Protecting The Devices You Forgot You Own

    23/1/2026 | 7 min
    Your house didn’t suddenly become unsafe it became chatty. Doorbells, cameras, smart TVs, speakers, and even “just a light bulb” are small computers that inherit real risk the moment they join your Wi‑Fi. We unpack how convenience-first design leads to weak defaults, vague support lifespans, and devices that quietly age while the internet around them gets smarter. No scare tactics, just a clear look at how attackers actually operate at scale and why most compromises happen without anyone specifically targeting you.

    We map the three most common outcomes when IoT goes sideways: silent botnets that borrow your bandwidth, footholds that let attackers probe the rest of your network, and data exposure through patterns, logs, and metadata. Then we shift into a practical, high‑impact starter kit built for homes and small offices. You’ll learn how to inventory your devices, apply firmware updates that stick, set long unique passwords, and separate networks so a weak gadget cannot wander into your work laptop. We also cover trimming unnecessary features remote access, voice controls, cloud links to reduce your attack surface without losing what you actually use.

    To wrap it up, we bust stubborn myths: you are not too boring to hack, a light bulb is still a networked computer, and antivirus won’t save devices that cannot run it. The real win is attention over fear. With a little structure and occasional maintenance, you stop being the easiest option and keep the convenience you bought these gadgets for. If this breakdown helps, subscribe, share it with a friend who needs a safer smart home, and leave a quick review so more people can find the show.
    Is there a topic/term you want me to discuss next? Text me!!
  • Plaintext with Rich

    Cloud Security Without The Panic

    16/1/2026 | 7 min
    A breach without a break-in sounds strange until you realize the cloud rarely fails with drama it fails with defaults. We walk through why identity has replaced the physical perimeter, how ordinary configuration decisions create extraordinary risks, and what actually happens once an attacker lands. No scare tactics, just a clear path from common pitfalls to practical fixes you can deploy this week.

    We start by translating the cloud into plain terms: rented compute, storage, and identity systems you control through configuration. From there, we map the usual failure modes public buckets, over-permissioned roles, secrets sprawled across repos and chats, and powerful accounts without MFA. We also explain shadow cloud, where teams spin up SaaS and resources beyond central oversight, and why weak monitoring means the first alert often comes from a bill or a phone call, not your console. When attackers get in, they follow a simple playbook: take data, abuse compute for crypto mining, and establish persistence by adding users, keys, and altered logs.

    You’ll leave with a focused starter kit to prevent most incidents: enforce MFA on admins, email, and SSO; apply least privilege with time-bound elevation; replace long-lived secrets with short-lived tokens and managed identities; make storage private by default; and turn on logging with high-signal alerts for new admins, disabled MFA, unusual locations, and large downloads. We then go deeper into hardening workloads, pruning unused services, limiting inbound access, and treating APIs like locked doors with authentication, rate limits, and validation. Finally, we show how policy-as-code and cloud posture tools create guardrails that block unsafe deployments before they happen, acknowledging that speed and pressure are constants and designing for containment.

    If this breakdown clarified your next steps, follow the show, share it with a teammate who owns a risky bucket, and leave a quick review so more builders can secure their cloud without the panic.
    Is there a topic/term you want me to discuss next? Text me!!
  • Plaintext with Rich

    From Shared Secrets To Secure Proof: Why Passkeys Win

    09/1/2026 | 8 min
    Your name or username doesn’t unlock an account—reused secrets do. We dig into why the internet’s copy‑and‑paste approach to passwords keeps failing and show how passkeys flip the model from disclosure to proof. With a device‑bound private key and simple gestures like a tap or a glance, sign‑ins get faster while phishing and credential stuffing lose their fuel. No more shared secrets to steal, replay, or resell.

    We walk through what passwordless really means, not the hype: identity proven with something you have and something you are, anchored by public‑key cryptography. You’ll hear why phishing resistance comes from origin binding, how passkeys eliminate reuse, and where support tickets drop when resets vanish. Then we slow down on the trade‑offs. Device loss and account recovery are the new attack surface, so we break down the real risks—weak backups, stale phone numbers, and social engineering at support—and how to close those gaps without adding friction.

    To get you moving, we share a practical plan: protect core accounts starting with email, then Apple, Google, or Microsoft, your password manager, and financial logins. Turn on passkeys where offered, keep strong MFA where they aren’t, prefer apps or hardware keys over SMS, and lock down recovery with verified contacts, backup codes, and at least one additional trusted device. Along the way, we debunk common myths—no, sites don’t keep your biometrics; no, passwordless isn’t a magic shield; yes, daily use is simpler than passwords while planning shifts to recovery.

    Ready to trade memorized secrets for proof and speed? Subscribe, share this episode with someone who needs a safer login, and leave a review to tell us which account you’ll upgrade first.
    Is there a topic/term you want me to discuss next? Text me!!
  • Plaintext with Rich

    How AI Deepfakes Hijack Instincts And What To Do Next

    02/1/2026 | 6 min
    A familiar voice calls. The phrase you’ve heard a hundred times lands with urgency. Your gut says act now wire the money, share the code, approve the access. That reflex once kept work moving and families safe. Today, AI can borrow the voice, mimic the cadence, and ride your instincts for sixty seconds. That’s long enough to cause real harm.

    We dive into the mechanics of modern deepfakes: how a few public breadcrumbs voicemails, Zoom clips, social videos train models to sound and look convincing. We walk through the most common attack plays, from the fake CEO pushing a confidential transfer to the distressed relative with a broken phone and a new number, to the video meeting that feels legit just long enough to ask for credentials. The pattern isn’t perfection; it’s urgency. The goal isn’t to fool you forever; it’s to rush you past verification.

    Then we shift from fear to action. We share a four-step playbook that works at home and at work: slow down urgent requests, verify on a second channel, create no-exception rules for money and access, and assume audio and video can be faked until proven otherwise. Along the way, we reframe trust itself. Voices and faces used to be reliable signals; AI has broken that assumption. Your senses aren’t failing you’re just receiving synthetic input, which means trust must be paired with process.

    By the end, you’ll have clear, repeatable habits that lower risk without slowing life to a crawl. Think of it as adding friction exactly where attackers need speed. If this resonated, share it with someone who handles approvals or transfers, and tell us: what out-of-band check will you implement this week? Subscribe, leave a review, and send your security questions we read every note and reply.
    Is there a topic/term you want me to discuss next? Text me!!

Plus de podcasts Technologies

À propos de Plaintext with Rich

Cybersecurity is an everyone problem. So why does it always sound like it’s only for IT people?Each week, Rich takes one topic, from phishing to ransomware to how your phone actually tracks you, and explains it in plain language in under ten minutes or less. No buzzwords. No condescension. Just the stuff you need to know to stay safer online, explained like you’re a smart person who never had anyone break it down properly. Because you are!
Site web du podcast

Écoutez Plaintext with Rich, Comptoir IA 🎙️🧠🤖 ou d'autres podcasts du monde entier - avec l'app de radio.fr

Obtenez l’app radio.fr
 gratuite

  • Ajout de radios et podcasts en favoris
  • Diffusion via Wi-Fi ou Bluetooth
  • Carplay & Android Auto compatibles
  • Et encore plus de fonctionnalités

Plaintext with Rich: Podcasts du groupe

Applications
Réseaux sociaux
v8.4.0 | © 2007-2026 radio.de GmbH
Generated: 2/4/2026 - 8:49:15 AM