Home
Categories
EXPLORE
True Crime
Comedy
Business
Society & Culture
Sports
History
News
About Us
Contact Us
Copyright
© 2024 PodJoint
00:00 / 00:00
Sign in

or

Don't have an account?
Sign up
Forgot password
https://is1-ssl.mzstatic.com/image/thumb/Podcasts211/v4/04/23/4f/04234f17-3ed1-b752-250d-554bac5014d0/mza_11397316299310858090.png/600x600bb.jpg
Techsplainers by IBM
IBM
44 episodes
15 hours ago

Introducing the Techsplainers by IBM podcast, your new podcast for quick, powerful takes on today’s most important AI and tech topics. Each episode brings you bite-sized learning designed to fit your day, whether you’re driving, exercising, or just curious for something new.


This is just the beginning. Tune in every weekday at 6 AM ET for fresh insights, new voices, and smarter learning.

Show more...
Technology
Education,
Business
RSS
All content for Techsplainers by IBM is the property of IBM and is served directly from their servers with no modification, redirects, or rehosting. The podcast is not affiliated with or endorsed by Podjoint in any way.

Introducing the Techsplainers by IBM podcast, your new podcast for quick, powerful takes on today’s most important AI and tech topics. Each episode brings you bite-sized learning designed to fit your day, whether you’re driving, exercising, or just curious for something new.


This is just the beginning. Tune in every weekday at 6 AM ET for fresh insights, new voices, and smarter learning.

Show more...
Technology
Education,
Business
https://files.casted.us/476de845-987e-4e18-86ac-b09150bc4a82.png
What is social engineering?
Techsplainers by IBM
10 minutes
1 month ago
What is social engineering?

This episode of Techsplainers explores social engineering—cyber attacks that use psychological manipulation rather than technical hacking to compromise security. The podcast examines how attackers impersonate trusted entities and exploit emotions like fear, greed, and curiosity to trick victims. Listeners will discover various attack methods, including different types of phishing, baiting, tailgating, quid pro quo scams, scareware, and watering hole attacks. The discussion shows how these tactics allow cybercriminals to bypass security controls through human vulnerabilities, illustrated with examples from Nigerian prince scams to fake virus warnings. The episode concludes with practical defense strategies, including security awareness training, multi-factor authentication, and advanced detection technologies to protect against these increasingly sophisticated threats.


Find more information at https://www.ibm.com/think/podcasts/techsplainers.


Narrated by Bryan Clark

Techsplainers by IBM

Introducing the Techsplainers by IBM podcast, your new podcast for quick, powerful takes on today’s most important AI and tech topics. Each episode brings you bite-sized learning designed to fit your day, whether you’re driving, exercising, or just curious for something new.


This is just the beginning. Tune in every weekday at 6 AM ET for fresh insights, new voices, and smarter learning.