Jack Recider
๐ค SpeakerAppearances Over Time
Podcast Appearances
This episode is sponsored by ThreatLocker. Ransomware, supply chain attacks, and zero-day exploits can strike without warning, leaving your business's sensitive data and digital assets vulnerable. But imagine a world where your cybersecurity strategy could prevent these threats. That's the power of ThreatLocker Zero Trust Endpoint Protection Platform.
ThreatLocker implements a proactive, deny-by-default approach to cybersecurity, blocking every action, process, and user unless specifically authorized by your team. This least-privileged strategy mitigates the exploitation of trusted applications and ensures 24-7, 365 protection for your organization.
ThreatLocker implements a proactive, deny-by-default approach to cybersecurity, blocking every action, process, and user unless specifically authorized by your team. This least-privileged strategy mitigates the exploitation of trusted applications and ensures 24-7, 365 protection for your organization.
The core of ThreatLocker is its Protect Suite, including application, allow listing, ring fencing, and network control. Additional tools like the ThreatLocker detect EDR, storage control, elevation control, and configuration manager enhance your cybersecurity posture and streamline internal IT and security operations.
The core of ThreatLocker is its Protect Suite, including application, allow listing, ring fencing, and network control. Additional tools like the ThreatLocker detect EDR, storage control, elevation control, and configuration manager enhance your cybersecurity posture and streamline internal IT and security operations.
To learn more about how ThreatLocker can help mitigate unknown threats in your digital environment and align your organization with respected compliance frameworks, visit ThreatLocker.com. That's ThreatLocker.com. So what should we call you? Evil Mog is fine. Okay, we'll call you Evil Mog. How do you get that name? Where does that come from?
To learn more about how ThreatLocker can help mitigate unknown threats in your digital environment and align your organization with respected compliance frameworks, visit ThreatLocker.com. That's ThreatLocker.com. So what should we call you? Evil Mog is fine. Okay, we'll call you Evil Mog. How do you get that name? Where does that come from?
IRC, I remember those days. We were young then. Did you do any stupid things when you were young and on IRC?
IRC, I remember those days. We were young then. Did you do any stupid things when you were young and on IRC?
A stern knock sounded urgent and menacing. He opened the door and saw the police were standing at his front door.
A stern knock sounded urgent and menacing. He opened the door and saw the police were standing at his front door.
Okay, so hold on a second. I've pirated. Mm-hmm. And I've done some freaking. The cops never came to my house. It sounds like you might have done more than that or went over the line.
Okay, so hold on a second. I've pirated. Mm-hmm. And I've done some freaking. The cops never came to my house. It sounds like you might have done more than that or went over the line.
They were... Did they work at all? Because I can't even imagine this work.
They were... Did they work at all? Because I can't even imagine this work.
When I was a teenager, I didn't understand how credit cards worked at all. Like, in my head, it just seemed like 16 random numbers. And if you knew those 16 numbers, could you buy stuff? Yeah. So I thought, okay, let's test that theory. As a teen, I went to a website, put in 16 random numbers just to see what happened.
When I was a teenager, I didn't understand how credit cards worked at all. Like, in my head, it just seemed like 16 random numbers. And if you knew those 16 numbers, could you buy stuff? Yeah. So I thought, okay, let's test that theory. As a teen, I went to a website, put in 16 random numbers just to see what happened.
I thought if it worked, I'd have no idea whose number I just used and I could just say I typed the wrong number if they asked me. But no matter how many 16-digit credit card numbers I put into a website, it never worked. Every one was an invalid number. Apparently, it's more complicated than just that.
I thought if it worked, I'd have no idea whose number I just used and I could just say I typed the wrong number if they asked me. But no matter how many 16-digit credit card numbers I put into a website, it never worked. Every one was an invalid number. Apparently, it's more complicated than just that.
Eva Mogg loved flying planes when he was a kid and signed up for junior glider classes taught by the Canadian military.