Plaintext with Rich
Cybersecurity is an everyone problem. So why does it always sound like it’s only for IT people?
Each week, Rich takes one topic, from phishing to ransomware to how your phone actually tracks you, and explains it in plain language in under ten minutes or less. No buzzwords. No condescension. Just the stuff you need to know to stay safer online, explained like you’re a smart person who never had anyone break it down properly. Because you are!
Episodes
18 episodes
Linux vs. Windows vs. macOS: Where Security Actually Differs
People love to ask which operating system is the most secure. That's the wrong shape of question. Each one is designed for a different job, and that shapes how it gets attacked.This episode clears up what Linux actually is, how it compar...
•
Season 1
•
Episode 18
•
7:58
APIs: The Control Points Hiding Inside Every App
You tap a button and a ride shows up. You check out online and your bank approves it in seconds. It feels automatic. But nothing in software is automatic. Something received a request, decided it was valid, did some work, and sent back a respon...
•
Season 1
•
Episode 17
•
7:05
Securing AI at Work: What the Chat Box Actually Touches
At 4:47 p.m., someone pastes a customer escalation into an AI assistant and asks it to rewrite the tone. The reply is perfect. It also includes a private note from the internal thread. No breach. No attacker. Just a new workflow that doesn't kn...
•
Season 1
•
Episode 16
•
7:45
AI Is an Umbrella Word (And That's the Problem)
Every company says they're using AI. Some mean chatbots. Some mean automation. Some mean statistics with a new logo. If everything is AI, the word stops meaning anything.This episode untangles what people actually mean when they say "AI"...
•
Season 1
•
Episode 15
•
7:36
Why Security Fails When Everyone Is Right
The access made sense. The exception was justified. The shortcut saved time. Each decision worked on its own. And somehow, together, they added up to failure.This episode tackles the uncomfortable truth that most security failures aren't...
•
Season 1
•
Episode 14
•
7:01
Zero Trust: What It Actually Means Beyond the Buzzword
The breach didn't come through a broken firewall. It walked in through a valid login. Nothing exploded. Nothing looked suspicious at first. Someone just signed in and kept going.This episode clears up what Zero Trust actually is and what...
•
Season 1
•
Episode 13
•
7:53
Supply Chain Cybersecurity: When the Breach Starts Upstream
You can lock down every system you own. Patch everything. Train everyone. And still lose control, because the failure didn't start with you. It started somewhere upstream.This episode breaks down supply chain cybersecurity by explaining ...
•
Season 1
•
Episode 12
•
7:41
Phishing and Social Engineering: Why the Strongest Defense Is Being Slower
You don't need to break a system if someone will open it for you. You don't need malware if a message feels urgent enough. Most modern breaches don't start with code. They start with a conversation.This episode breaks down phishing and s...
•
Season 1
•
Episode 11
•
8:59
Ransomware and Double Extortion: Why Backups Alone Don't Save You Anymore
You don't get locked out first. You get watched. Someone maps your systems quietly, copies your data quietly, and waits until they're sure you can't avoid the conversation. Only then do the screens go dark.This episode breaks down how ra...
•
Season 1
•
Episode 10
•
8:26
IoT Security: Why Every Smart Device Is a Computer That Inherits Risk
Your house didn't suddenly become unsafe. It just became chatty. Little devices, quietly talking to the internet, all day, all night. Most of them were never meant to be guarded.This episode explains IoT security by starting with a trans...
•
Season 1
•
Episode 9
•
7:48
Cloud Security: Why Identity and Configuration Are the Real Perimeter
Nothing broke. Nothing crashed. No alarms went off. Someone clicked a box, someone skipped a setting, someone assumed the default was safe. And the cloud did exactly what it was told.This episode explains cloud security by starting with ...
•
Season 1
•
Episode 8
•
7:35
Passkeys and Passwordless Login: Why Shared Secrets Are the Problem
You don't lose access to an account because someone knows your name. You lose access because they reused something you were told to keep secret. For years, the internet has worked on copying secrets and then acting surprised when copies escape....
•
Season 1
•
Episode 7
•
8:39
Quantum Computing and Encryption: Why "Harvest Now, Decrypt Later" Matters
Some secrets are meant to stay secret for decades. Medical histories. Legal records. Trade agreements. Now imagine someone copying all of it today. Not to read it. Just to wait. Because someday, the lock changes.This episode explains wha...
•
Season 1
•
Episode 6
•
8:26
The Dark Web: Where Stolen Data Gets a Price Tag
When your data is taken, it doesn't fall into a void. It moves. It gets packaged. It gets priced. And while you're changing a password, someone else is deciding how many times they can reuse your name.This episode strips away the mytholo...
•
Season 1
•
Episode 5
•
6:44
Identity Theft: Why Data Breaches Don't Stay Abstract
Nobody needs to take anything from your pocket to steal your identity. They don't need your wallet or your phone. They just need information that already exists, and most of it didn't come from you.This episode breaks down how identity t...
•
Season 1
•
Episode 4
•
6:09
AI Deepfakes: When Trust Becomes the Attack Surface
Someone calls you, sounds exactly like your boss, uses the phrases they always use, and says they need help right now. You don't hesitate. But what if the voice is real and the person isn't?This episode breaks down AI deepfakes: audio, v...
•
Season 1
•
Episode 3
•
6:02
What Cybersecurity Actually Is (And Why It's Everyone's Job)
You lock your doors at night. Not because you expect a break-in. Because the world is messy and you'd rather sleep. Cybersecurity is the digital version of that decision.This episode strips cybersecurity all the way down to what it actua...
•
Season 1
•
Episode 2
•
6:11
Plaintext with Rich: Security and Tech Without the Jargon
Most tech talk feels like it was written for someone else. Too many acronyms, too much fear, and not enough clarity. That changes here.This is the first episode of Plaintext with Rich, and it lays out a simple promise: short, story-drive...
•
Season 1
•
Episode 1
•
4:05