PodParley PodParley
The Safety Brief cover art

All Episodes

The Safety Brief — 68 episodes

#
Title
1

When Ransomware Grounds the Skies: Lessons from the Collins Aerospace Attack on European Airports

2

Security Everywhere: Protecting Beyond the Office Walls

3

Inside the Stack: The Tools That Stop Threats Before They Strike

4

Cloud Control: Who’s Watching Your SaaS?

5

Inbox Infiltration: Stopping Cyberattacks Before They Hit Send

6

EDR Killers: The Silent Assassins of Endpoint Security

7

Cyber Turbulence: The Rise of Airline Attacks

8

Empowering Partners Through Security-First Enablement

9

Security Budget ROI: Measuring What Didn't Happen

10

Eyes Everywhere: Surveillance Tech in the Modern Workplace

11

AI Meeting Notetakers: Silent Stalkers in Your Zoom Calls

12

Patchwork or Protection? Avoiding Frankenstein Security

13

Quantum Threats: Are Today’s Defenses Ready for Tomorrow?

14

Silent but Deadly: The Danger of Undetected Breaches

15

Evaluating Industry Progress – Security, Reliability, and User Experience in Focus

16

Cloud Chaos: Cybersecurity Strategies for Surviving Service Outages

17

The Digital Moat: Why Firewalls Are Still Essential in 2025

18

Cyber Hygiene – The Security Practices Your Business Can’t Ignore in 2025

19

Into the Deep: Exposing the Risks of Deep Seek

20

TikTok Ban and Data Privacy: Lessons from the Rise of Rednote

21

Data Breach Survival Guide: What Happens Next?

22

Protection Perfected: The Managed Security Advantage

23

New Year, New Threats: Strengthening Your Defenses for 2025

24

Tis the Season for Phishing: How to Avoid Holiday Scams

25

Holiday Tech Safety: Securing Your New Devices from Day One

26

Holiday Cybersecurity Checklist: Staying Secure in the Season of Giving

27

Thankfulness in Cybersecurity: Partnering for Success with BLOKWORX

28

Counting Our Cyber Blessings: Essential Tools and Technologies

29

Vampire Data Leaks: Slowly Draining the life from Your Business

30

Botnets and Zombie Networks

31

Ghosts in the Machine: Uncovering Hidden Threats

32

Exploiting Chaos: How Bad Actors Take Advantage of Natural Disasters

33

The IoT Invasion: Protecting Your Network from Connected Device Threats

34

The Lebanon Incident and the Threat of Communication Systems

35

Emerging Threats in Mobile Security: Protecting Devices and Applications

36

The BLOKWORX Toolbelt: Unpacking Our Cyber Defense Arsenal

37

Cultivating Cybersecurity Culture

38

Leading the Charge: How BLOKWORX is Redefining Cybersecurity

39

Detection Security: Essential Layer or Optional Add-On?

40

Back to School Cybersecurity: Protecting Students in the Digital Age

41

The Safety Brief: Community-Driven Defense

42

The Critical Role of Testing and Vetting

43

The Dark Web: Unveiling the Hidden Cyber Underworld

44

Mental Health and Cybersecurity in the Workplace

45

The Safety Brief: The Latest Cyber Threats and Trends What You Need to Know

46

The Safety Brief: Cybersecurity Legislation and Compliance

47

The Safety Brief: Secure Remote Work Practices

48

The Safety Brief: Cookie Crumbs and Cache Security

49

The Safety Brief: Protecting Privacy in AI

50

The Safety Brief: Mastering Password Managers and Email Protection

51

The Safety Brief: The Hidden Price of Free Apps (Your Data for Dollars)

52

The Safety Brief: Fully Managed Security vs. Self-Managed Tools

53

The Safety Brief: Understanding the Difference Between Prevention, Mitigation, and Remediation

54

The Safety Brief: Incident response and management

55

The Safety Brief: Prevention VS. EDR

56

Social Engineering

57

From Reaction to Prevention with BLOKWORX

58

Misconfiguration: and how it can be the downfall of cybersecurity strategies.

59

The Safety Brief: Vulnerability Scans vs Penetration Testing

60

The Safety Brief: Year Review and Predictions

61

Cybersecurity End-User Bootcamp: The Safety Brief: Phishing Red Flags

62

The Safety Brief: Prevention + Detection and Response

63

The Safety Brief: Holiday Online Shopping

64

Cybersecurity End-User Bootcamp: Recognizing Red Flags in Email, Phone, and Online Behavior

65

365 Days of Awareness: Beyond October’s Spotlight

66

Foundations of BLOKWORX: Exploring Core Values in Action

67

Automation With Human Validation

68

Insider Threats:Protecting the Most Attacked Threat Vector