Episodes

  • Henry Kissineger´s World order
    Jan 10 2026

    Henry Kissineger´s World order

    Show More Show Less
    22 mins
  • How to steal a network, how own a shadow
    Jan 6 2026

    How to steal a network, how own a shadow

    Show More Show Less
    14 mins
  • How to steal a continent
    Jan 3 2026

    How to steal a continent

    Show More Show Less
    12 mins
  • AI, Forensics, Law Emerging Technology and Legal Implications
    Dec 30 2025


    AI, Forensics, Law_ Emerging Technology and Legal Implications

    Show More Show Less
    16 mins
  • The Behavioral Table of Elements Reference.
    Dec 22 2025

    The Behavioral Table of Elements Reference.

    Show More Show Less
    12 mins
  • Review of ¨Steal a Network¨ how to Identity vulnerabilities
    Dec 21 2025

    Review of ¨Steal a Network¨ how to Identity vulnerabilities

    Show More Show Less
    18 mins
  • Crypto Market Manipulation: Spotting the Trick
    Oct 9 2025

    The provided source discusses various forms of market manipulation within the cryptocurrency space, specifically targeting retail investors. It highlights how a select group, referred to as "smart money" – comprising institutional players and elite traders – exploits the predictable patterns and emotional responses of individual traders. The video explains specific manipulation tactics such as "scam wicks" or "stop hunts," where prices are artificially driven to liquidate traders' positions, and the problematic practices of market makers on listing days, who can create an illusion of demand and volatility. Furthermore, the source exposes the prevalence of "wash trading," an artificial inflation of trading volume to mislead investors, offering insights into how to identify and protect oneself from these deceptive schemes.

    Show More Show Less
    16 mins
  • Why CISOs Fail: Elevating Cybersecurity Leadership
    Sep 17 2025

    This collection of excerpts from "Why CISOs Fail, 2nd" by Barak Engel offers a critical examination of the Chief Information Security Officer (CISO) role and the broader cybersecurity landscape. The text highlights how CISOs often struggle due to a focus on technology over business context, leading to miscommunications, ineffective strategies, and a perception as "fear merchants" rather than strategic partners. Engel argues for a reimagined CISO who understands business objectives, influences sales, and manages risk as an integral part of organizational growth, rather than merely enforcing compliance or technical controls. The book also critiques common industry practices, such as rigid compliance models and ineffective password policies, advocating instead for pragmatic, human-centered security approaches and recognizing that some losses are an inevitable part of doing business. Ultimately, it emphasizes the importance of communication, business acumen, and strategic integration for a CISO's success and overall organizational security.

    Show More Show Less
    26 mins