<?xml version="1.0" encoding="UTF-8"?>
<?xml-stylesheet type="text/xsl" href="https://blog.darkboxsecurity.com/wp-content/plugins/seriously-simple-podcasting/templates/feed-stylesheet.xsl"?><rss version="2.0"
	 xmlns:content="http://purl.org/rss/1.0/modules/content/"
	 xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	 xmlns:dc="http://purl.org/dc/elements/1.1/"
	 xmlns:atom="http://www.w3.org/2005/Atom"
	 xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	 xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	 xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd"
	 xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0"
	 xmlns:podcast="https://podcastindex.org/namespace/1.0"
	>
		<channel>
		<title>The DarkBox Archive</title>
		<atom:link href="https://blog.darkboxsecurity.com/feed/podcast/the-darkbox-archive/" rel="self" type="application/rss+xml"/>
		<link>https://blog.darkboxsecurity.com/series/the-darkbox-archive/</link>
		<description>A show that keeps cybersecurity simple but informative. We provide information security information for businesses and personal life.</description>
		<lastBuildDate>Mon, 01 Jul 2024 15:28:05 +0000</lastBuildDate>
		<language>en-US</language>
		<copyright>© 2024 DarkBox Security Systems</copyright>
		<itunes:subtitle>Cybersecurity Talk from DarkBox Security Systems</itunes:subtitle>
		<itunes:author>DarkBox Security Systems</itunes:author>
		<itunes:type>episodic</itunes:type>
		<itunes:summary>A show that keeps cybersecurity simple but informative. We provide information security information for businesses and personal life.</itunes:summary>
		<itunes:owner>
			<itunes:name>The DarkBox Archive</itunes:name>
		</itunes:owner>
		<itunes:explicit>false</itunes:explicit>
		<itunes:image href="https://blog.darkboxsecurity.com/wp-content/uploads/2024/06/Podcast-Cover-Art.png"></itunes:image>
			<image>
				<url>https://blog.darkboxsecurity.com/wp-content/uploads/2024/06/Podcast-Cover-Art.png</url>
				<title>The DarkBox Archive</title>
				<link>https://blog.darkboxsecurity.com/series/the-darkbox-archive/</link>
			</image>
		<itunes:category text="Technology">
		</itunes:category>
		<itunes:category text="Business">
							</itunes:category>
		<itunes:category text="Technology">
							</itunes:category>
		<googleplay:author><![CDATA[DarkBox Security Systems]]></googleplay:author>
						<googleplay:description>A show that keeps cybersecurity simple but informative. We provide information security information for businesses and personal life.</googleplay:description>
			<googleplay:explicit>No</googleplay:explicit>
			<googleplay:image href="https://blog.darkboxsecurity.com/wp-content/uploads/2024/06/Podcast-Cover-Art.png"></googleplay:image>
			<podcast:locked>yes</podcast:locked>
		<podcast:guid>8a9aed10-6252-5e7a-9583-8bb23e3094a7</podcast:guid>
		
		<!-- podcast_generator="SSP by Castos/3.4.0" Seriously Simple Podcasting plugin for WordPress (https://wordpress.org/plugins/seriously-simple-podcasting/) -->
		<generator>https://wordpress.org/?v=6.9.4</generator>

<item>
	<title>Kaspersky was banned</title>
	<link>https://blog.darkboxsecurity.com/podcast/kaspersky-was-banned/</link>
	<pubDate>Mon, 24 Jun 2024 13:13:54 +0000</pubDate>
	<dc:creator><![CDATA[DarkBox Security Systems]]></dc:creator>
	<guid isPermaLink="false">https://blog.darkboxsecurity.com/?post_type=podcast&#038;p=490</guid>
	<description><![CDATA[<p>In this episode of the DarkBox Archive, we discuss the US government's recent ban on Kaspersky cybersecurity products for businesses and individuals. We delve into the background of Kaspersky, a major Moscow-based cybersecurity provider, and the reasons behind the ban, including concerns about potential exploitation by Russian intelligence agencies.</p>



<p>We explain the implications for users and businesses, noting that federal agencies have 90 days to remove Kaspersky software, while private businesses and individuals are advised to avoid using Kaspersky products. </p>



<p>The discussion concludes with an analysis of what this situation means for the future of cybersecurity, emphasizing the importance of trust and transparency in the industry, and suggesting that other countries might re-evaluate their use of foreign cybersecurity products.</p>



<p><a href="https://darkboxsecurity.com/discord" data-type="link" data-id="https://darkboxsecurity.com/discord">Join on us on our Discord Server</a></p>]]></description>
	<itunes:subtitle><![CDATA[In this episode of the DarkBox Archive, we discuss the US governments recent ban on Kaspersky cybersecurity products for businesses and individuals. We delve into the background of Kaspersky, a major Moscow-based cybersecurity provider, and the reasons b]]></itunes:subtitle>
	<content:encoded><![CDATA[<p>In this episode of the DarkBox Archive, we discuss the US government's recent ban on Kaspersky cybersecurity products for businesses and individuals. We delve into the background of Kaspersky, a major Moscow-based cybersecurity provider, and the reasons behind the ban, including concerns about potential exploitation by Russian intelligence agencies.</p>



<p>We explain the implications for users and businesses, noting that federal agencies have 90 days to remove Kaspersky software, while private businesses and individuals are advised to avoid using Kaspersky products. </p>



<p>The discussion concludes with an analysis of what this situation means for the future of cybersecurity, emphasizing the importance of trust and transparency in the industry, and suggesting that other countries might re-evaluate their use of foreign cybersecurity products.</p>



<p><a href="https://darkboxsecurity.com/discord" data-type="link" data-id="https://darkboxsecurity.com/discord">Join on us on our Discord Server</a></p>]]></content:encoded>
	<enclosure url="https://blog.darkboxsecurity.com/podcast-download/490/kaspersky-was-banned.mp3" length="24525652" type="audio/mpeg"></enclosure>
	<itunes:summary><![CDATA[In this episode of the DarkBox Archive, we discuss the US government's recent ban on Kaspersky cybersecurity products for businesses and individuals. We delve into the background of Kaspersky, a major Moscow-based cybersecurity provider, and the reasons behind the ban, including concerns about potential exploitation by Russian intelligence agencies.



We explain the implications for users and businesses, noting that federal agencies have 90 days to remove Kaspersky software, while private businesses and individuals are advised to avoid using Kaspersky products. 



The discussion concludes with an analysis of what this situation means for the future of cybersecurity, emphasizing the importance of trust and transparency in the industry, and suggesting that other countries might re-evaluate their use of foreign cybersecurity products.



Join on us on our Discord Server]]></itunes:summary>
	<itunes:image href="https://blog.darkboxsecurity.com/wp-content/uploads/2024/06/Podcast-Cover-Art.png"></itunes:image>
	<image>
		<url>https://blog.darkboxsecurity.com/wp-content/uploads/2024/06/Podcast-Cover-Art.png</url>
		<title>Kaspersky was banned</title>
	</image>
	<itunes:explicit>false</itunes:explicit>
	<itunes:block>no</itunes:block>
	<itunes:duration>25:33</itunes:duration>
	<itunes:author><![CDATA[DarkBox Security Systems]]></itunes:author>	<googleplay:description><![CDATA[In this episode of the DarkBox Archive, we discuss the US government's recent ban on Kaspersky cybersecurity products for businesses and individuals. We delve into the background of Kaspersky, a major Moscow-based cybersecurity provider, and the reasons behind the ban, including concerns about potential exploitation by Russian intelligence agencies.



We explain the implications for users and businesses, noting that federal agencies have 90 days to remove Kaspersky software, while private businesses and individuals are advised to avoid using Kaspersky products. 



The discussion concludes with an analysis of what this situation means for the future of cybersecurity, emphasizing the importance of trust and transparency in the industry, and suggesting that other countries might re-evaluate their use of foreign cybersecurity products.



Join on us on our Discord Server]]></googleplay:description>
	<googleplay:image href="https://blog.darkboxsecurity.com/wp-content/uploads/2024/06/Podcast-Cover-Art.png"></googleplay:image>
	<googleplay:explicit>No</googleplay:explicit>
	<googleplay:block>no</googleplay:block>
</item>

<item>
	<title>Cybersecurity Incident Response</title>
	<link>https://blog.darkboxsecurity.com/podcast/cybersecurity-incident-response/</link>
	<pubDate>Mon, 24 Jun 2024 13:04:51 +0000</pubDate>
	<dc:creator><![CDATA[DarkBox Security Systems]]></dc:creator>
	<guid isPermaLink="false">https://blog.darkboxsecurity.com/?post_type=podcast&#038;p=488</guid>
	<description><![CDATA[<p>In this episode of the DarkBox Archive podcast, we discuss the critical topic of incident response in cybersecurity. We define incident response as a structured approach to managing the aftermath of a security breach, with the goal of limiting damage and reducing recovery time and costs. The discussion covers the importance of incident response, emphasizing that a proper plan can minimize the impact of attacks and protect sensitive data.</p>



<p>We outline the key steps in incident response: Preparation, Identification, Containment, Eradication, Recovery, and Lessons Learned. Each step is detailed, highlighting the need for a well-developed plan, effective detection, damage control, thorough eradication of threats, careful recovery, and post-incident analysis.</p>



<p>We also share best practices, including regularly updating and testing the incident response plan, fostering cybersecurity awareness, using automated monitoring tools, establishing clear communication protocols, and staying informed about the latest threats.</p>



<p><a href="https://darkboxsecurity.com/discord" data-type="link" data-id="https://darkboxsecurity.com/discord">Join us on our Discord Server</a></p>]]></description>
	<itunes:subtitle><![CDATA[In this episode of the DarkBox Archive podcast, we discuss the critical topic of incident response in cybersecurity. We define incident response as a structured approach to managing the aftermath of a security breach, with the goal of limiting damage and]]></itunes:subtitle>
	<content:encoded><![CDATA[<p>In this episode of the DarkBox Archive podcast, we discuss the critical topic of incident response in cybersecurity. We define incident response as a structured approach to managing the aftermath of a security breach, with the goal of limiting damage and reducing recovery time and costs. The discussion covers the importance of incident response, emphasizing that a proper plan can minimize the impact of attacks and protect sensitive data.</p>



<p>We outline the key steps in incident response: Preparation, Identification, Containment, Eradication, Recovery, and Lessons Learned. Each step is detailed, highlighting the need for a well-developed plan, effective detection, damage control, thorough eradication of threats, careful recovery, and post-incident analysis.</p>



<p>We also share best practices, including regularly updating and testing the incident response plan, fostering cybersecurity awareness, using automated monitoring tools, establishing clear communication protocols, and staying informed about the latest threats.</p>



<p><a href="https://darkboxsecurity.com/discord" data-type="link" data-id="https://darkboxsecurity.com/discord">Join us on our Discord Server</a></p>]]></content:encoded>
	<enclosure url="https://blog.darkboxsecurity.com/podcast-download/488/cybersecurity-incident-response.mp3" length="21528916" type="audio/mpeg"></enclosure>
	<itunes:summary><![CDATA[In this episode of the DarkBox Archive podcast, we discuss the critical topic of incident response in cybersecurity. We define incident response as a structured approach to managing the aftermath of a security breach, with the goal of limiting damage and reducing recovery time and costs. The discussion covers the importance of incident response, emphasizing that a proper plan can minimize the impact of attacks and protect sensitive data.



We outline the key steps in incident response: Preparation, Identification, Containment, Eradication, Recovery, and Lessons Learned. Each step is detailed, highlighting the need for a well-developed plan, effective detection, damage control, thorough eradication of threats, careful recovery, and post-incident analysis.



We also share best practices, including regularly updating and testing the incident response plan, fostering cybersecurity awareness, using automated monitoring tools, establishing clear communication protocols, and staying informed about the latest threats.



Join us on our Discord Server]]></itunes:summary>
	<itunes:image href="https://blog.darkboxsecurity.com/wp-content/uploads/2024/06/Podcast-Cover-Art.png"></itunes:image>
	<image>
		<url>https://blog.darkboxsecurity.com/wp-content/uploads/2024/06/Podcast-Cover-Art.png</url>
		<title>Cybersecurity Incident Response</title>
	</image>
	<itunes:explicit>false</itunes:explicit>
	<itunes:block>no</itunes:block>
	<itunes:duration>22:26</itunes:duration>
	<itunes:author><![CDATA[DarkBox Security Systems]]></itunes:author>	<googleplay:description><![CDATA[In this episode of the DarkBox Archive podcast, we discuss the critical topic of incident response in cybersecurity. We define incident response as a structured approach to managing the aftermath of a security breach, with the goal of limiting damage and reducing recovery time and costs. The discussion covers the importance of incident response, emphasizing that a proper plan can minimize the impact of attacks and protect sensitive data.



We outline the key steps in incident response: Preparation, Identification, Containment, Eradication, Recovery, and Lessons Learned. Each step is detailed, highlighting the need for a well-developed plan, effective detection, damage control, thorough eradication of threats, careful recovery, and post-incident analysis.



We also share best practices, including regularly updating and testing the incident response plan, fostering cybersecurity awareness, using automated monitoring tools, establishing clear communication protocols, and staying inform]]></googleplay:description>
	<googleplay:image href="https://blog.darkboxsecurity.com/wp-content/uploads/2024/06/Podcast-Cover-Art.png"></googleplay:image>
	<googleplay:explicit>No</googleplay:explicit>
	<googleplay:block>no</googleplay:block>
</item>

<item>
	<title>The Dangers of Phishing</title>
	<link>https://blog.darkboxsecurity.com/podcast/the-dangers-of-phishing/</link>
	<pubDate>Fri, 21 Jun 2024 14:00:38 +0000</pubDate>
	<dc:creator><![CDATA[DarkBox Security Systems]]></dc:creator>
	<guid isPermaLink="false">https://blog.darkboxsecurity.com/?post_type=podcast&#038;p=480</guid>
	<description><![CDATA[<p>We discuss the dangers of phishing and give ways to protect yourself. Phishing has evolved overtime and has become more difficult to detect. It is considered the number one way companies get breached.</p>



<p>If you would like to interact with us and expand the discussion please <a href="https://darkboxsecurity.com/discord" data-type="link" data-id="https://darkboxsecurity.com/discord">join us on Discord.</a></p>]]></description>
	<itunes:subtitle><![CDATA[We discuss the dangers of phishing and give ways to protect yourself. Phishing has evolved overtime and has become more difficult to detect. It is considered the number one way companies get breached.



If you would like to interact with us and expand t]]></itunes:subtitle>
	<content:encoded><![CDATA[<p>We discuss the dangers of phishing and give ways to protect yourself. Phishing has evolved overtime and has become more difficult to detect. It is considered the number one way companies get breached.</p>



<p>If you would like to interact with us and expand the discussion please <a href="https://darkboxsecurity.com/discord" data-type="link" data-id="https://darkboxsecurity.com/discord">join us on Discord.</a></p>]]></content:encoded>
	<enclosure url="https://blog.darkboxsecurity.com/podcast-download/480/the-dangers-of-phishing.mp3" length="36784084" type="audio/mpeg"></enclosure>
	<itunes:summary><![CDATA[We discuss the dangers of phishing and give ways to protect yourself. Phishing has evolved overtime and has become more difficult to detect. It is considered the number one way companies get breached.



If you would like to interact with us and expand the discussion please join us on Discord.]]></itunes:summary>
	<itunes:image href="https://blog.darkboxsecurity.com/wp-content/uploads/2024/06/Podcast-Cover-Art.png"></itunes:image>
	<image>
		<url>https://blog.darkboxsecurity.com/wp-content/uploads/2024/06/Podcast-Cover-Art.png</url>
		<title>The Dangers of Phishing</title>
	</image>
	<itunes:explicit>false</itunes:explicit>
	<itunes:block>no</itunes:block>
	<itunes:duration>38:19</itunes:duration>
	<itunes:author><![CDATA[DarkBox Security Systems]]></itunes:author>	<googleplay:description><![CDATA[We discuss the dangers of phishing and give ways to protect yourself. Phishing has evolved overtime and has become more difficult to detect. It is considered the number one way companies get breached.



If you would like to interact with us and expand the discussion please join us on Discord.]]></googleplay:description>
	<googleplay:image href="https://blog.darkboxsecurity.com/wp-content/uploads/2024/06/Podcast-Cover-Art.png"></googleplay:image>
	<googleplay:explicit>No</googleplay:explicit>
	<googleplay:block>no</googleplay:block>
</item>

<item>
	<title>Why cybersecurity is important</title>
	<link>https://blog.darkboxsecurity.com/podcast/why-cybersecurity-is-important/</link>
	<pubDate>Thu, 20 Jun 2024 17:51:21 +0000</pubDate>
	<dc:creator><![CDATA[DarkBox Security Systems]]></dc:creator>
	<guid isPermaLink="false">https://blog.darkboxsecurity.com/?post_type=podcast&#038;p=479</guid>
	<description><![CDATA[<p>Join our<a href="https://darkboxsecurity.com/discord" data-type="link" data-id="https://darkboxsecurity.com/discord"> Discord channel here.</a></p>



<p>Our first episode of our cybersecurity podcast. We discuss why cybersecurity is so important and give some advice on how to improve your cybersecurity if you are a business or for personal life.</p>]]></description>
	<itunes:subtitle><![CDATA[Join our Discord channel here.



Our first episode of our cybersecurity podcast. We discuss why cybersecurity is so important and give some advice on how to improve your cybersecurity if you are a business or for personal life.]]></itunes:subtitle>
	<content:encoded><![CDATA[<p>Join our<a href="https://darkboxsecurity.com/discord" data-type="link" data-id="https://darkboxsecurity.com/discord"> Discord channel here.</a></p>



<p>Our first episode of our cybersecurity podcast. We discuss why cybersecurity is so important and give some advice on how to improve your cybersecurity if you are a business or for personal life.</p>]]></content:encoded>
	<enclosure url="https://blog.darkboxsecurity.com/podcast-download/479/why-cybersecurity-is-important.mp3" length="20806612" type="audio/mpeg"></enclosure>
	<itunes:summary><![CDATA[Join our Discord channel here.



Our first episode of our cybersecurity podcast. We discuss why cybersecurity is so important and give some advice on how to improve your cybersecurity if you are a business or for personal life.]]></itunes:summary>
	<itunes:image href="https://blog.darkboxsecurity.com/wp-content/uploads/2024/06/Podcast-Cover-Art.png"></itunes:image>
	<image>
		<url>https://blog.darkboxsecurity.com/wp-content/uploads/2024/06/Podcast-Cover-Art.png</url>
		<title>Why cybersecurity is important</title>
	</image>
	<itunes:explicit>false</itunes:explicit>
	<itunes:block>no</itunes:block>
	<itunes:duration>21:40</itunes:duration>
	<itunes:author><![CDATA[DarkBox Security Systems]]></itunes:author>	<googleplay:description><![CDATA[Join our Discord channel here.



Our first episode of our cybersecurity podcast. We discuss why cybersecurity is so important and give some advice on how to improve your cybersecurity if you are a business or for personal life.]]></googleplay:description>
	<googleplay:image href="https://blog.darkboxsecurity.com/wp-content/uploads/2024/06/Podcast-Cover-Art.png"></googleplay:image>
	<googleplay:explicit>No</googleplay:explicit>
	<googleplay:block>no</googleplay:block>
</item>
	</channel>
</rss>
