『Plaintext with Rich』のカバーアート

Plaintext with Rich

Plaintext with Rich

著者: Rich Greene
無料で聴く

概要

Cybersecurity is an everyone problem. So why does it always sound like it’s only for IT people?


Each week, Rich takes one topic, from phishing to ransomware to how your phone actually tracks you, and explains it in plain language in under ten minutes or less. No buzzwords. No condescension. Just the stuff you need to know to stay safer online, explained like you’re a smart person who never had anyone break it down properly. Because you are!

© 2026 Plaintext with Rich
エピソード
  • Why Security Fails When Everyone Is Right
    2026/02/27

    Hard truth: security often fails when everyone is doing their best. We explore how a chain of reasonable choices wider access to unblock a task, a quick exception to meet a deadline, one more tool to feel “covered” quietly drifts systems away from safety until a small shock exposes a large weakness. No villains, no recklessness, just incentives that reward momentum over friction and patterns that compound risk in the background.

    We dig into four recurring culprits: temporary decisions that never expire, blurred ownership that leaves gaps no one feels responsible for, trust that’s too broad and amplifies impact, and complexity without clarity where logs, alerts, and dashboards exist but don’t drive action. Along the way, we explain why incidents rarely arrive with drama and instead show up as confusion teams unsure what’s affected, who decides, or what can be safely shut down turning a technical problem into an organizational one.

    Then we shift to solutions that actually work in modern environments. You’ll hear a design-first starter kit: make ownership explicit for every system, treat access like inventory with regular reviews and expiry, reduce silent permissions, and design for human reality by building guardrails that assume context switches, rushed work, and fatigue. We emphasize using fewer tools with a clearer purpose, aligning incentives so the safest action is also the easiest action, and measuring clarity and recovery not just delivery speed. The takeaway is simple and powerful: resilience comes from systems that prevent mistakes from becoming disasters, built quietly and intentionally.

    If this conversation helped, share it with someone who would benefit, and send us the next security topic you want translated into plain text. Subscribe, leave a review, and tell us where your team sees drift starting we’re listening.

    Is there a topic/term you want me to discuss next? Text me!!

    YouTube more your speed? → https://links.sith2.com/YouTube
    Apple Podcasts your usual stop? → https://links.sith2.com/Apple
    Neither of those? Spotify’s over here → https://links.sith2.com/Spotify
    Prefer reading quietly at your own pace? → https://links.sith2.com/Blog
    Join us in The Cyber Sanctuary (no robes required) → https://links.sith2.com/Discord
    Follow the human behind the microphone → https://links.sith2.com/linkedin
    Need another way to reach me? That’s here → https://linktr.ee/rich.greene

    続きを読む 一部表示
    7 分
  • Zero Trust, Explained In Plain Text
    2026/02/20

    A breach that looks like a normal login can slip past the loudest alarms. That simple truth reshaped how we think about defense and led us to a clearer model: access is the attack surface, and trust must be earned every time. We unpack zero trust in plain language, showing how to move from implied safety behind a perimeter to conditional, per-request decisions that scale across cloud, remote work, and vendor ecosystems.

    We start with the core signals that drive better decisions: identity that’s verified beyond passwords using strong multi-factor authentication; device posture that proves a system is updated, encrypted, and managed; and least privilege that connects people only to what they need right now. From there, we add segmentation to contain failures and reduce lateral movement. Along the way, we contrast traditional VPNs with zero trust network access, highlighting why connecting users to applications not entire networks shrinks blast radius and adapts access as risk changes.

    Then we get tactical with a zero trust starter kit you can apply without a full rebuild. Separate daily and admin accounts, map your real access paths across SSO, cloud consoles, remote management, and vendor portals, enforce baseline device standards, and narrow connectivity around crown jewels like finance platforms, production, and admin consoles. We close by clearing common myths: zero trust isn’t “trust no one,” it isn’t a product you buy once, and it’s not just for large enterprises. Smaller teams often gain the most because a single compromised account can be devastating.

    If this breakdown helps you see your environment more clearly, follow the show, share it with someone who’s on the hook for security outcomes, and leave a quick review to tell us what to tackle next.

    Is there a topic/term you want me to discuss next? Text me!!

    続きを読む 一部表示
    8 分
  • How Supply Chain Attacks Turn Trust Into Exposure
    2026/02/13

    Your defenses can be flawless and still fail when the breach starts upstream. We unpack how modern supply chains software updates, cloud services, MSPs, contractors, and open source libraries turn everyday trust into an attack surface, and what it takes to build resilience without grinding work to a halt. From tampered updates to phished third-party accounts and poisoned dependencies, we map the repeat patterns that let one supplier compromise ripple into hundreds of customers, and explain why these intrusions look like routine business rather than obvious threats.

    We keep it plain and practical with a starter kit designed for high impact: identify your crown jewels so protection has focus, list the vendors who hold your data or access, enforce least privilege ruthlessly, and treat vendor logins like production keys with mandatory MFA. Then, level up with targeted visibility monitor unusual vendor behavior such as new locations, large downloads, permission spikes, or disabled controls and move fast on critical patches for shared components, because common libraries create common urgency. We also cover the questions that separate security theater from reality: MFA by default, patch timelines for critical CVEs, incident notification practices, role-based access, and SSO support.

    Contracts matter, so put expectations in writing: breach notification windows, required controls, and clear ownership. And when all else fails, tested backups are the difference between disaster and a brief interruption restore drills turn plans into confidence. Smaller teams aren’t spared; they often depend on more third-party tools and get caught in the collateral damage when a popular vendor is hit. You can’t control every supplier, but you can control access, monitoring, and recovery. List your vendors, enforce MFA on every vendor account, limit access aggressively, and verify backups by doing a real restore. If this breakdown helps, subscribe, share it with a teammate, and leave a quick review so others can find it too.

    Is there a topic/term you want me to discuss next? Text me!!

    続きを読む 一部表示
    8 分
まだレビューはありません