Plaintext with Rich
Cybersecurity is an everyone problem. So why does it always sound like it’s only for IT people?
Each week, Rich takes one topic, from phishing to ransomware to how your phone actually tracks you, and explains it in plain language in under ten minutes or less. No buzzwords. No condescension. Just the stuff you need to know to stay safer online, explained like you’re a smart person who never had anyone break it down properly. Because you are!
Podcasting since 2025 • 14 episodes
Plaintext with Rich
Latest Episodes
Why Security Fails When Everyone Is Right
Hard truth: security often fails when everyone is doing their best. We explore how a chain of reasonable choices wider access to unblock a task, a quick exception to meet a deadline, one more tool to feel “covered” quietly drifts systems away f...
•
Season 1
•
Episode 14
•
7:01
Zero Trust, Explained In Plain Text
A breach that looks like a normal login can slip past the loudest alarms. That simple truth reshaped how we think about defense and led us to a clearer model: access is the attack surface, and trust must be earned every time. We unpack zero tru...
•
Season 1
•
Episode 13
•
7:53
How Supply Chain Attacks Turn Trust Into Exposure
Your defenses can be flawless and still fail when the breach starts upstream. We unpack how modern supply chains software updates, cloud services, MSPs, contractors, and open source libraries turn everyday trust into an attack surface, and what...
•
Season 1
•
Episode 12
•
7:41
How Phishing Wins By Borrowing Your Emotions
Most breaches don’t start with malware. They start with a feeling. We explore why social engineering works so well in ordinary moments, and how attackers lean on urgency, authority, and fear to push quick clicks, rushed approvals, and hasty pay...
•
Season 1
•
Episode 11
•
8:59
Ransomware Starts With Access And Ends With Leverage
Your screens don’t go dark first they go quiet. We walk through how modern ransomware begins with access, not chaos, and why double extortion flipped the incentives: attackers steal sensitive data, then encrypt to amplify pressure. That shift t...
•
Season 1
•
Episode 10
•
8:26