Afleveringen

  • NEW! Text Us Direct Here!

    Richard Hollis of Risk Crew in London joins Cyber Crime Junkies studio discussing key topics: why cybersecurity efforts usually fail and customers or enemies online.

    Video episode: https://youtu.be/QQ8l1PaDaUI

    Topics:
    💡how cybersecurity efforts usually fail,
    💡customers or enemies online
    💡best practices for businesses to limit cyber liability,
    💡new ways to protect business from cyber crime,
    💡newest methods to limit cyber liability,
    💡newest security expert insight


    Try KiteWorks today at www.KiteWorks.com

    Don't Miss our Video on this Exciting KiteWorks Offer!

    Click the link above or text 904-867-4468, 2014652: and leave your message!

    You can now text our Podcast Studio direct. Ask questions, suggest guests and stories. 

    We Look Forward To Hearing From You!




    Try KiteWorks today at www.KiteWorks.com

    Don't miss this Video on it!

    The Most Secure Managed File Transfer System. 

    Custom handmade Women's Clothing, Plushies & Accessories at Blushingintrovert.com. Portions of your purchase go to Mental Health Awareness efforts.

    Watch Video Episodes! And Please...Subscribe to our YouTube Channel. Want to help us out? Leave us a 5-Star review on Apple Podcast Reviews. Submit Your Questions Direct and Find out more www.CyberCrimeJunkies.com Stay up-to-date on Cybersecurity with VIGILANCE Newsletter. Want Gear? We love our Small Business Sponsor, BlushingIntrovert.com. has it all. Women’s clothing, cool accessories supporting Mental Health Research. https://blushingintrovert.com







  • NEW! Text Us Direct Here!

    Don't miss the video interview for details: https://youtu.be/-G7hbLGDK9o

    Steve Orrin, Federal CTO for Intel, discusses secrets inside zero trust and r latest cyber security concerns. He is a recognized security leader and public speaker. Steve has orchestrated projects for federal government agencies on Security and AI. Steve is a key advisor in emerging technologies to the Public Sector, Defense, and Intelligence communities.

    Key topics: latest cyber security concerns, Global Cyber Security Strategy, zero trust small business and national security, zero trust and national security, zero trust in critical infrastructure, zero trust in supply chain, zero trust in small business, secrets inside zero trust, how us cyber security strategy effects allies, driving change in cyber security today, zero trust in cyber security today


    For more: CyberCrimeJunkies



    Try KiteWorks today at www.KiteWorks.com

    Don't Miss our Video on this Exciting KiteWorks Offer!

    Click the link above or text 904-867-4468, 2014652: and leave your message!

    You can now text our Podcast Studio direct. Ask questions, suggest guests and stories. 

    We Look Forward To Hearing From You!




    Try KiteWorks today at www.KiteWorks.com

    Don't miss this Video on it!

    The Most Secure Managed File Transfer System. 

    Custom handmade Women's Clothing, Plushies & Accessories at Blushingintrovert.com. Portions of your purchase go to Mental Health Awareness efforts.

    Watch Video Episodes! And Please...Subscribe to our YouTube Channel. Want to help us out? Leave us a 5-Star review on Apple Podcast Reviews. Submit Your Questions Direct and Find out more www.CyberCrimeJunkies.com Stay up-to-date on Cybersecurity with VIGILANCE Newsletter. Want Gear? We love our Small Business Sponsor, BlushingIntrovert.com. has it all. Women’s clothing, cool accessories supporting Mental Health Research. https://blushingintrovert.com







  • Zijn er afleveringen die ontbreken?

    Klik hier om de feed te vernieuwen.

  • NEW! Text Us Direct Here!

    Sam Buckenmaier, a senior cyber leader, join us on what leadership means today and what employers want in cybersecurity.


    We discussed: new approaches to enter the cybersecurity field, how to have effective communication internally in business, advice on cybersecurity careers from top recruiters, approaches to enter cybersecurity, and best practices for leveraging LinkedIn for your personal brand.

    🔔 Site, Research and Direct contact with Podcast team: https://cybercrimejunkies.com



    Try KiteWorks today at www.KiteWorks.com

    Don't Miss our Video on this Exciting KiteWorks Offer!

    Click the link above or text 904-867-4468, 2014652: and leave your message!

    You can now text our Podcast Studio direct. Ask questions, suggest guests and stories. 

    We Look Forward To Hearing From You!




    Try KiteWorks today at www.KiteWorks.com

    Don't miss this Video on it!

    The Most Secure Managed File Transfer System. 

    Custom handmade Women's Clothing, Plushies & Accessories at Blushingintrovert.com. Portions of your purchase go to Mental Health Awareness efforts.

    Watch Video Episodes! And Please...Subscribe to our YouTube Channel. Want to help us out? Leave us a 5-Star review on Apple Podcast Reviews. Submit Your Questions Direct and Find out more www.CyberCrimeJunkies.com Stay up-to-date on Cybersecurity with VIGILANCE Newsletter. Want Gear? We love our Small Business Sponsor, BlushingIntrovert.com. has it all. Women’s clothing, cool accessories supporting Mental Health Research. https://blushingintrovert.com







  • NEW! Text Us Direct Here!

    What we all need to know about How Psychology Affects Security. Psychology of Online Security. Topics:

    behind scenes cyber criminals, best ways to protect business from cyber crime, cyber crime gang discussions, exposing cyber crime gangs, exposing secrets of cyber crime gangs, how can we spot fraud in business, how to limit liability from data breach, new insight on true cyber crime examples, risk and brand protection

    We wanted to explore in today’s episode what makes them tick. Why is it some organizations are only in the news for new products that they launch, people that they save or a new location that they’re opening. All positive things. But other organizations are in the news for reputation damaging data breach.

    Today we are going to explore the mind of a hacker and reset expectations of the language that we use. Hackers are not evil in fact there are several different types of hackers. Hackers are engineers and people that figure out how things work. Without them we wouldn’t have some of the greatest inventions and protections that we all take for granted every day.


    Try KiteWorks today at www.KiteWorks.com

    Don't Miss our Video on this Exciting KiteWorks Offer!

    Click the link above or text 904-867-4468, 2014652: and leave your message!

    You can now text our Podcast Studio direct. Ask questions, suggest guests and stories. 

    We Look Forward To Hearing From You!




    Try KiteWorks today at www.KiteWorks.com

    Don't miss this Video on it!

    The Most Secure Managed File Transfer System. 

    Custom handmade Women's Clothing, Plushies & Accessories at Blushingintrovert.com. Portions of your purchase go to Mental Health Awareness efforts.

    Watch Video Episodes! And Please...Subscribe to our YouTube Channel. Want to help us out? Leave us a 5-Star review on Apple Podcast Reviews. Submit Your Questions Direct and Find out more www.CyberCrimeJunkies.com Stay up-to-date on Cybersecurity with VIGILANCE Newsletter. Want Gear? We love our Small Business Sponsor, BlushingIntrovert.com. has it all. Women’s clothing, cool accessories supporting Mental Health Research. https://blushingintrovert.com







  • NEW! Text Us Direct Here!

    Video Episode here!

    Jon DiMaggio, Senior Security Strategist with https://analyst1.com and former NSA analyst, author of The Art of Cyber Warfare (https://a.co/d/72qKbc4) joins us for an exclusive discussion on the cyber crime take down story of LOCKBIT.

    Chapters

    00:00 Introduction and Background08:10 Financial Aspects of Ransomware Operations24:33 Technical Skills and Criminal Intent39:46 The Self-Convening Justice System in the Criminal Underground48:31 The Importance of Effective Communication in Cybersecurity


    Try KiteWorks today at www.KiteWorks.com

    Don't Miss our Video on this Exciting KiteWorks Offer!

    Click the link above or text 904-867-4468, 2014652: and leave your message!

    You can now text our Podcast Studio direct. Ask questions, suggest guests and stories. 

    We Look Forward To Hearing From You!




    Try KiteWorks today at www.KiteWorks.com

    Don't miss this Video on it!

    The Most Secure Managed File Transfer System. 

    Custom handmade Women's Clothing, Plushies & Accessories at Blushingintrovert.com. Portions of your purchase go to Mental Health Awareness efforts.

    Watch Video Episodes! And Please...Subscribe to our YouTube Channel. Want to help us out? Leave us a 5-Star review on Apple Podcast Reviews. Submit Your Questions Direct and Find out more www.CyberCrimeJunkies.com Stay up-to-date on Cybersecurity with VIGILANCE Newsletter. Want Gear? We love our Small Business Sponsor, BlushingIntrovert.com. has it all. Women’s clothing, cool accessories supporting Mental Health Research. https://blushingintrovert.com







  • NEW! Text Us Direct Here!

    Experts Nick Mullen and Nick Oles discuss artificial intelligence and the impact of ai on business cyber risk. They share their personal stories of how they got into the field and highlight the importance of understanding the analogies between physical and cybersecurity controls.

    Nick Oles is author of How to Catch a Phish [email protected] https://thenetdefender.com/

    Nick Mullen is a CISSP, CCSP, PMP and Principal, at Sanguine Security Solutions.

    Chapters

    2:20 The Evolution of Deepfake Technology10:03 Breaking into Cyber for other fields. Origin Stories.33:16 Training Employees to Recognize and Respond to Deepfake Attacks42:11 Preventing Cyber Attacks: Key Practices46:45 Training Employees to Detect Phishing Emails53:24 Understanding the Human Attack Surface

    Key Topics: impact of ai on business cyber risk, how ai powered social engineering affects you, social impact of artificial intelligence, social engineering risks from new ai, how ai is changing cyber crime tactics, how ai is changing phishing tactics, how to measure new ai cyber risk, how ai increases cyber risk, h


    Try KiteWorks today at www.KiteWorks.com

    Don't Miss our Video on this Exciting KiteWorks Offer!

    Click the link above or text 904-867-4468, 2014652: and leave your message!

    You can now text our Podcast Studio direct. Ask questions, suggest guests and stories. 

    We Look Forward To Hearing From You!




    Try KiteWorks today at www.KiteWorks.com

    Don't miss this Video on it!

    The Most Secure Managed File Transfer System. 

    Custom handmade Women's Clothing, Plushies & Accessories at Blushingintrovert.com. Portions of your purchase go to Mental Health Awareness efforts.

    Watch Video Episodes! And Please...Subscribe to our YouTube Channel. Want to help us out? Leave us a 5-Star review on Apple Podcast Reviews. Submit Your Questions Direct and Find out more www.CyberCrimeJunkies.com Stay up-to-date on Cybersecurity with VIGILANCE Newsletter. Want Gear? We love our Small Business Sponsor, BlushingIntrovert.com. has it all. Women’s clothing, cool accessories supporting Mental Health Research. https://blushingintrovert.com







  • NEW! Text Us Direct Here!

    After years in the industry, inventing and exploring emerging technologies, Gideon Hazam, Co-Founder, COO and CSM at Memcyco, https://www.memcyco.com/home found a way to solve a problem outside the normal cybersecurity approaches. He joins us behind the scenes to discuss innovative ways to reduce website spoofing.

    Key Topics:

    new ways to reduce cyber risks in financial institutions,ways to prevent account take overs,innovative ways to reduce website spoofing, latest types of phishing, dangers of website spoofing, social engineering attacks against financial institutions,

    Chapters

    01:09 The Importance of Brand Protection04:01 The Impact of COVID-19 on Cybercrime06:28 Methods of Website Spoofing08:37 Account Takeover and Phishing09:30 Current Solutions and Challenges20:13 Expanding to Other Industries24:38 Alerting the Original Brand and Customers26:19 Real-Time Detection of Spoofed Sites27:46 Customer Alerts and Integration with Security Operations Centers30:51 Introduction to Memsico and its Integration with Risk and Fraud33:25 Challenges Faced by Organizations in Impersonation Attacks35:38 Focus on Brand Reputation and Customer Trust36:34 The Need for Protection Against Spoofing Attacks46:15 Marking and Tracing Stolen Credentials48:04 Uniqueness of Memsico and Patented Technology49:14 The Three Parts of Memsico's Platform: Detection, Protection, and Action


    Try KiteWorks today at www.KiteWorks.com

    Don't Miss our Video on this Exciting KiteWorks Offer!

    Click the link above or text 904-867-4468, 2014652: and leave your message!

    You can now text our Podcast Studio direct. Ask questions, suggest guests and stories. 

    We Look Forward To Hearing From You!




    Try KiteWorks today at www.KiteWorks.com

    Don't miss this Video on it!

    The Most Secure Managed File Transfer System. 

    Custom handmade Women's Clothing, Plushies & Accessories at Blushingintrovert.com. Portions of your purchase go to Mental Health Awareness efforts.

    Watch Video Episodes! And Please...Subscribe to our YouTube Channel. Want to help us out? Leave us a 5-Star review on Apple Podcast Reviews. Submit Your Questions Direct and Find out more www.CyberCrimeJunkies.com Stay up-to-date on Cybersecurity with VIGILANCE Newsletter. Want Gear? We love our Small Business Sponsor, BlushingIntrovert.com. has it all. Women’s clothing, cool accessories supporting Mental Health Research. https://blushingintrovert.com







  • NEW! Text Us Direct Here!

    The US has signed into new law the Ban of Tik Tok effective in January. What does this mean?

    Topics: US Tik Tok ban. What to know, online privacy andTik Tok, national security risks from social media, identity protection in light of TikTok, why social media platforms are national security risks, why social media platform is a national security threat, how social media platforms are security risks, laws on social media national security, and national security versus social media.


    Try KiteWorks today at www.KiteWorks.com

    Don't Miss our Video on this Exciting KiteWorks Offer!

    Custom handmade Women's Clothing, Plushies & Accessories at Blushingintrovert.com. Portions of your purchase go to Mental Health Awareness efforts.

    Watch Video Episodes! And Please...Subscribe to our YouTube Channel. Want to help us out? Leave us a 5-Star review on Apple Podcast Reviews. Submit Your Questions Direct and Find out more www.CyberCrimeJunkies.com Stay up-to-date on Cybersecurity with VIGILANCE Newsletter. Want Gear? We love our Small Business Sponsor, BlushingIntrovert.com. has it all. Women’s clothing, cool accessories supporting Mental Health Research. https://blushingintrovert.com







  • NEW! Text Us Direct Here!

    Chris Voss joins us to go INSIDE the famous negotiation model he created and share secrets behind Never Split the Difference, from the #1 Wall Street Journal best-selling book on Negotiation.

    Chris is the most decorated FBI hostage negotiator in history. He teaches his techniques at Harvard Law, Georgetown University, and others. He is the founder of the Black Swan Group.

    Key Takeaways

    The Importance of Proof of Life in NegotiationUsing Decreasing Incremental Change in BargainingHow Accusation Audits work, How Tactical Empathy and Espionage are used,modern ways to negotiate effectively,how to ask questions better using Never Split the Difference,how to negotiate with an enemy, how to discover unknowns in negotiationnew ways to convince someone of anything,and other secrets behind Never Split the Difference.

    Chapters

    00:00 Introduction to the Never Split the Difference Method02:15 Mastering the Never Split the Difference Method of Negotiation03:11 The Power of Active Listening and Tactical Empathy05:31 Uncovering Concealed Motivations and Undisclosed Needs07:22 The Importance of Proof of Life in Negotiations08:44 Using Decreasing Incremental Change in Bargaining10:41 Dealing with Aggressive Individuals and Building Agreement

    To grab your copy of Never Split The Difference you can buy it here (not an affiliate link). https://a.co/d/229P5UV

    To find more of Chris Voss and The Black Swan Group: https://www.blackswanltd.com/


    Try KiteWorks today at www.KiteWorks.com

    Don't Miss our Video on this Exciting KiteWorks Offer!

    Click the link above or text 904-867-4468, 2014652: and leave your message!

    You can now text our Podcast Studio direct. Ask questions, suggest guests and stories. 

    We Look Forward To Hearing From You!




    Custom handmade Women's Clothing, Plushies & Accessories at Blushingintrovert.com. Portions of your purchase go to Mental Health Awareness efforts.

    Watch Video Episodes! And Please...Subscribe to our YouTube Channel. Want to help us out? Leave us a 5-Star review on Apple Podcast Reviews. Submit Your Questions Direct and Find out more www.CyberCrimeJunkies.com Stay up-to-date on Cybersecurity with VIGILANCE Newsletter. Want Gear? We love our Small Business Sponsor, BlushingIntrovert.com. has it all. Women’s clothing, cool accessories supporting Mental Health Research. https://blushingintrovert.com







  • NEW! Text Us Direct Here!

    Chris Voss, founder of the Black Swan Group, joins us to share the story behind Never Split The Difference, the #1 Wall Street Journal best selling book on Negotiation.

    The most decorated FBI hostage negotiator in history, Chris Voss teaches his model Harvard Law, Georgetown University and others.

    Key Takeaways

    how never split the difference started,Optimal Timing for NegotiationsThe Neuroscience Behind Tactical Empathybest ways to collaborate in negotiations,ways to negotiate like your life depended on it,best ways to collaborate in negotiations,how to practice Never Split the Difference,benefits of using active listening and importance of body language in communications,and other top techniques in Never Split the Difference,

    Chapters

    00:00 Introduction to Chris Voss and the Black Swan Method03:34 Chris Voss's Background and the Documentary04:04 Chris Voss's Journey into Law Enforcement06:26 Mentors and Becoming a Hostage Negotiator09:22 The Foundation of the Black Swan Method14:14 Developing Tactical Empathy on a Suicide Hotline21:36 Practicing and Applying the Black Swan Method24:30 Optimal Timing for Negotiations28:22 Tactical Empathy with Adversaries32:40 Defining Tactical Empathy34:41 The Future of Tactical Empathy and Neuroscience

    To grab your copy of Never Split The Difference you can buy it here (not an affiliate link). https://a.co/d/229P5UV

    To find more of Chris Voss and The Black Swan Group: https://www.blackswanltd.com/


    Try KiteWorks today at www.KiteWorks.com

    Don't Miss our Video on this Exciting KiteWorks Offer!

    Click the link above or text 904-867-4468, 2014652: and leave your message!

    You can now text our Podcast Studio direct. Ask questions, suggest guests and stories. 

    We Look Forward To Hearing From You!




    Custom handmade Women's Clothing, Plushies & Accessories at Blushingintrovert.com. Portions of your purchase go to Mental Health Awareness efforts.

    Watch Video Episodes! And Please...Subscribe to our YouTube Channel. Want to help us out? Leave us a 5-Star review on Apple Podcast Reviews. Submit Your Questions Direct and Find out more www.CyberCrimeJunkies.com Stay up-to-date on Cybersecurity with VIGILANCE Newsletter. Want Gear? We love our Small Business Sponsor, BlushingIntrovert.com. has it all. Women’s clothing, cool accessories supporting Mental Health Research. https://blushingintrovert.com







  • NEW! Text Us Direct Here!

    Great discussion with Gabe Gambill. VP with Quorum.

    Topics discussed:

    best ways to limit cyber attack liability, brand protection with identification authentication, how to limit liability from cyber attacks, newest findings on ransomware cyber crime gangs, undercover findings on ransomware cyber crime gangs, pitfalls of data back ups, how to reduce risk of failed data back ups, importance of cyber leadership for brands, and true stories of horrific failed attempts following big disasters.


    Try KiteWorks today at www.KiteWorks.com

    Don't Miss our Video on this Exciting KiteWorks Offer!

    Click the link above or text 904-867-4468, 2014652: and leave your message!

    You can now text our Podcast Studio direct. Ask questions, suggest guests and stories. 

    We Look Forward To Hearing From You!




    Try KiteWorks today at www.KiteWorks.com

    Don't miss this Video on it!

    The Most Secure Managed File Transfer System. 

    Custom handmade Women's Clothing, Plushies & Accessories at Blushingintrovert.com. Portions of your purchase go to Mental Health Awareness efforts.

    Watch Video Episodes! And Please...Subscribe to our YouTube Channel. Want to help us out? Leave us a 5-Star review on Apple Podcast Reviews. Submit Your Questions Direct and Find out more www.CyberCrimeJunkies.com Stay up-to-date on Cybersecurity with VIGILANCE Newsletter. Want Gear? We love our Small Business Sponsor, BlushingIntrovert.com. has it all. Women’s clothing, cool accessories supporting Mental Health Research. https://blushingintrovert.com







  • NEW! Text Us Direct Here!

    When technology can do everything for us, what is left? Imagination. That is the intrigue in a soon-to-be-released book coming by Dr Lydia Kostopoulos, who holds a PHD in International Relations, Security and Political Science, having attended the Harvard Kennedy school for Cybersecurity. We discuss:

    ¡ ways to grow brands by adapting to emerging tech,¡ how to use imagination in brand growth,¡ risks in believing you are TOO BIG TO FAIL,¡ how AI is effecting brand imagination, ¡ how technology has changed society,

    Chapters

    02:44 The Significance of Cybersecurity and Cybercrime05:04 Exploring Web3 and Digital Ownership08:23 The State of Web3 and the Metaverse12:21 Digital Assets and NFTs15:08 Apple's Vision Pro and Avatar Technology19:20 Challenges and Risks in the Metaverse20:41 Convergence of Technologies and Convergence Literacy24:27 Emerging Technologies and Strategic Advisory Services26:46 The Importance of Convergence Literacy27:15 Navigating Exponential Advancements27:44 The Need for Packaging Solutions30:19 The Imagination Dilemma33:01 The Impact of Emerging Technologies36:16 Packaging and the Circular Economy40:08 The Imagination Dilemma: Explained52:49 Reimagining Business Focus53:42 Protecting Competitiveness


    Try KiteWorks today at www.KiteWorks.com

    Don't Miss our Video on this Exciting KiteWorks Offer!

    Click the link above or text 904-867-4468, 2014652: and leave your message!

    You can now text our Podcast Studio direct. Ask questions, suggest guests and stories. 

    We Look Forward To Hearing From You!




    Try KiteWorks today at www.KiteWorks.com

    Don't miss this Video on it!

    The Most Secure Managed File Transfer System. 

    Custom handmade Women's Clothing, Plushies & Accessories at Blushingintrovert.com. Portions of your purchase go to Mental Health Awareness efforts.

    Watch Video Episodes! And Please...Subscribe to our YouTube Channel. Want to help us out? Leave us a 5-Star review on Apple Podcast Reviews. Submit Your Questions Direct and Find out more www.CyberCrimeJunkies.com Stay up-to-date on Cybersecurity with VIGILANCE Newsletter. Want Gear? We love our Small Business Sponsor, BlushingIntrovert.com. has it all. Women’s clothing, cool accessories supporting Mental Health Research. https://blushingintrovert.com







  • NEW! Text Us Direct Here!

    Jamey Davidson, Partner at international law firm O’Hagan Meyer (https://ohaganmeyer.com). Jamey concentrates on top ways to reduce risk in cyber breach litigation, defending businesses in cyber breach class-action law suits and how to build defenses to reduce cyber breach liability.

    We discuss:

    ¡ How Cyber Breach Litigation Works

    ¡ Why Security Layers Help Defend Against Law Suits

    ¡ How Cyber Breach Liability Can Destroy Business

    ¡ How To Reduce Your Cyber Breach Liability


    Try KiteWorks today at www.KiteWorks.com

    Don't Miss our Video on this Exciting KiteWorks Offer!

    Click the link above or text 904-867-4468, 2014652: and leave your message!

    You can now text our Podcast Studio direct. Ask questions, suggest guests and stories. 

    We Look Forward To Hearing From You!




    Try KiteWorks today at www.KiteWorks.com

    Don't miss this Video on it!

    The Most Secure Managed File Transfer System. 

    Custom handmade Women's Clothing, Plushies & Accessories at Blushingintrovert.com. Portions of your purchase go to Mental Health Awareness efforts.

    Watch Video Episodes! And Please...Subscribe to our YouTube Channel. Want to help us out? Leave us a 5-Star review on Apple Podcast Reviews. Submit Your Questions Direct and Find out more www.CyberCrimeJunkies.com Stay up-to-date on Cybersecurity with VIGILANCE Newsletter. Want Gear? We love our Small Business Sponsor, BlushingIntrovert.com. has it all. Women’s clothing, cool accessories supporting Mental Health Research. https://blushingintrovert.com







  • NEW! Text Us Direct Here!

    From Rupert Murdoch's global entertainment ambition to a dead hacker found hanging from a tree in a park in Germany, this true cyber crime story spans over a decade in the cut-throat Satellite TV wars, involving colorful characters, pirates, big business, technology advances and failures and those who entered the darker side to try and get what they wanted.

    This is the true cyber crime story of TV Wars and Espionage. Pirates, a Dead Hacker. A Shocking Crime.


    Try KiteWorks today at www.KiteWorks.com

    Don't Miss our Video on this Exciting KiteWorks Offer!

    Click the link above or text 904-867-4468, 2014652: and leave your message!

    You can now text our Podcast Studio direct. Ask questions, suggest guests and stories. 

    We Look Forward To Hearing From You!




    Try KiteWorks today at www.KiteWorks.com

    Don't miss this Video on it!

    The Most Secure Managed File Transfer System. 

    Custom handmade Women's Clothing, Plushies & Accessories at Blushingintrovert.com. Portions of your purchase go to Mental Health Awareness efforts.

    Watch Video Episodes! And Please...Subscribe to our YouTube Channel. Want to help us out? Leave us a 5-Star review on Apple Podcast Reviews. Submit Your Questions Direct and Find out more www.CyberCrimeJunkies.com Stay up-to-date on Cybersecurity with VIGILANCE Newsletter. Want Gear? We love our Small Business Sponsor, BlushingIntrovert.com. has it all. Women’s clothing, cool accessories supporting Mental Health Research. https://blushingintrovert.com







  • NEW! Text Us Direct Here!

    This is the True Cyber Crime Story of “The Day the Lights Went Out at Sony Pictures” in 2014. Discussion about then events, what led to it, the formal findings and open questions remaining by experts. Hosts David Mauro and Mark Mosher explore their research with Special Guest, professional coach Rich Moore.

    Summary

    The conversation discusses the Sony Pictures cyberattack in 2014, exploring the various theories and implications of the breach. The hosts highlight the impact of the attack on Sony and the movie industry, as well as the broader implications for cybersecurity. They delve into the different theories surrounding the attack, including North Korea's involvement, insider activity, and stock manipulation. The conversation raises questions about the role of smaller organizations and the potential vulnerabilities they face. Overall, the discussion emphasizes the need for increased cybersecurity measures and awareness. The conversation explores different theories surrounding the Sony Pictures hack in 2014. The main theories discussed include: 1) North Korea as the sole perpetrator, 2) a disgruntled insider with connections to black hat hackers, 3) hacktivist groups like LulzSec and Anonymous, and 4) stock manipulation. The conversation highlights the inconsistencies and unanswered questions surrounding the official narrative that North Korea was solely responsible for the hack. The participants lean towards the theory that an insider with help from black hat hackers orchestrated the attack. They also discuss the possibility of stock manipulation and the involvement of hacktivist groups. The conversation concludes with the acknowledgment that there may be information that is not publicly available due to national security concerns.

    Chapters

    00:00 The Day the Lights Went Out at Sony


    Try KiteWorks today at www.KiteWorks.com

    Don't Miss our Video on this Exciting KiteWorks Offer!

    Click the link above or text 904-867-4468, 2014652: and leave your message!

    You can now text our Podcast Studio direct. Ask questions, suggest guests and stories. 

    We Look Forward To Hearing From You!




    Try KiteWorks today at www.KiteWorks.com

    Don't miss this Video on it!

    The Most Secure Managed File Transfer System. 

    Custom handmade Women's Clothing, Plushies & Accessories at Blushingintrovert.com. Portions of your purchase go to Mental Health Awareness efforts.

    Watch Video Episodes! And Please...Subscribe to our YouTube Channel. Want to help us out? Leave us a 5-Star review on Apple Podcast Reviews. Submit Your Questions Direct and Find out more www.CyberCrimeJunkies.com Stay up-to-date on Cybersecurity with VIGILANCE Newsletter. Want Gear? We love our Small Business Sponsor, BlushingIntrovert.com. has it all. Women’s clothing, cool accessories supporting Mental Health Research. https://blushingintrovert.com







  • NEW! Text Us Direct Here!

    Kurt Long CEO and founder of BUNKR (https://www.bunkr.life/) an affordable all-in-one app with secure messaging, password management, and secure file storage.

    We discuss new approaches to safe and private messaging apps, how to keep criminals out of your private data, and why online privacy is important to freedom.

    Chapters

    01:09 Kurt Long's Work at the Kennedy Space Center10:14 The Importance of Healthcare Security20:45 The Risks and Implications of Deepfake Technology25:51 Introduction to Bunker27:00 Bunker's Pricing and Affordability30:06 Bunker's Architecture and Zero Trust Approach34:33 Issues with Other Messaging Apps36:33 Balancing Privacy, Security, and Accountability44:00 Compliance and Finance49:31 Vision for Privacy, Security, and Accountability


    Try KiteWorks today at www.KiteWorks.com

    Don't Miss our Video on this Exciting KiteWorks Offer!

    Click the link above or text 904-867-4468, 2014652: and leave your message!

    You can now text our Podcast Studio direct. Ask questions, suggest guests and stories. 

    We Look Forward To Hearing From You!




    Try KiteWorks today at www.KiteWorks.com

    Don't miss this Video on it!

    The Most Secure Managed File Transfer System. 

    Custom handmade Women's Clothing, Plushies & Accessories at Blushingintrovert.com. Portions of your purchase go to Mental Health Awareness efforts.

    Watch Video Episodes! And Please...Subscribe to our YouTube Channel. Want to help us out? Leave us a 5-Star review on Apple Podcast Reviews. Submit Your Questions Direct and Find out more www.CyberCrimeJunkies.com Stay up-to-date on Cybersecurity with VIGILANCE Newsletter. Want Gear? We love our Small Business Sponsor, BlushingIntrovert.com. has it all. Women’s clothing, cool accessories supporting Mental Health Research. https://blushingintrovert.com







  • NEW! Text Us Direct Here!

    Nausheen Chen joins us. She is a wildly popular professional public speaking coach with clients like leaders at Google, Amazon and huge brands like Timberland and more.

    Check out her site:www.speaking.coach

    Nausheen has a free course we encourage you to check out! https://www.speaking.coach/free-course/

    She shares her insights on modern ways to improve presentation skills.

    From virtual (zoom etc) meetings to live public speaking in person, we touch on many little-known ways you can improve your communications.

    Topics:
    • why people fear public speaking,
    • is it possible to overcome fear of public speaking?
    • modern ways to improve communication skills ,
    • little known ways to overcome fear of public speaking,
    • dangers of certain beverages, lighting errors and sound mistakes,
    • Methodologies which help build authenticity and clarity

    Chapters
    • 00:00 Introduction and Background
    • 02:57 Discovering a Passion for Public Speaking
    • 09:00 The Importance of Effective Communication
    • 13:07 Challenges in Presentation Skills
    • 21:02 Techniques for Effective Communication
    • 25:07 Assisting Leaders in Communication
    • 25:36 The Importance of Authentic Confidence
    • 26:27 Coaching Introverts in Public Speaking
    • 28:54 Overcoming Filler Words
    • 30:00 The Impact of Comfort Level on Delivery
    • 32:49 The Role of Coffee and Energy Drinks
    • 34:23


    Try KiteWorks today at www.KiteWorks.com

    Don't Miss our Video on this Exciting KiteWorks Offer!

    Click the link above or text 904-867-4468, 2014652: and leave your message!

    You can now text our Podcast Studio direct. Ask questions, suggest guests and stories. 

    We Look Forward To Hearing From You!




    Try KiteWorks today at www.KiteWorks.com

    Don't miss this Video on it!

    The Most Secure Managed File Transfer System. 

    Custom handmade Women's Clothing, Plushies & Accessories at Blushingintrovert.com. Portions of your purchase go to Mental Health Awareness efforts.

    Watch Video Episodes! And Please...Subscribe to our YouTube Channel. Want to help us out? Leave us a 5-Star review on Apple Podcast Reviews. Submit Your Questions Direct and Find out more www.CyberCrimeJunkies.com Stay up-to-date on Cybersecurity with VIGILANCE Newsletter. Want Gear? We love our Small Business Sponsor, BlushingIntrovert.com. has it all. Women’s clothing, cool accessories supporting Mental Health Research. https://blushingintrovert.com







  • NEW! Text Us Direct Here!

    Are you real? What will Deepfake do to Security Risk? Shocking Examples. Summary

    In this conversation, Dino Mauro and Mark Mosher discuss the rise of deepfake technology and its implications for individuals, families, and organizations. They explore the real-world applications of deepfake, the advancements in technology, and the dangers it poses in terms of cybercrime. The conversation highlights the use of deepfake in cyberbullying, fraud, and social engineering attacks, as well as its potential to compromise organizations through fake employment interviews. The hosts also touch on the involvement of federal agencies and Congress in addressing the deepfake threat. The conversation emphasizes the need for awareness and vigilance in the face of this rapidly evolving technology.


    Topics:

    How Deep Fake Videos Increase Security Risks, why deep fake videos are dangerous, why deep fake videos increase security risks, new ways to reduce risks from deep fakes, dangers of synthetic media, new dangers of synthetic media, artificial intelligence risks in cyber security, new ways to reduce risk from deep fakes, new ways to reduce risk of deep fakes, how are deep fakes made, how are deep fake videos made, how are audio deep fakes made, how is ai making it harder to detect deep fakes, how ai is making it harder to detect deep fakes,

    Chapters

    00:00 Introduction: The Need for Secure Managed File Transfer
    05:12 Chapter 2: Deepfake's Real-World Applications and Damages
    12:58 Chapter 3: Deepfake in Fake Employment Interviews


    In this episode: Latest News on Deepfake. What We All Need to Know. Synthetic Media. We get into something cutting edge and a new emerging threat to our reality.

    You may not know the term Synthetic Media but you likely have heard of the phrase DEEPFAKE from social media and TV entertainment news. Today, it’s far beyond Photoshop an


    Try KiteWorks today at www.KiteWorks.com

    Don't Miss our Video on this Exciting KiteWorks Offer!

    Click the link above or text 904-867-4468, 2014652: and leave your message!

    You can now text our Podcast Studio direct. Ask questions, suggest guests and stories. 

    We Look Forward To Hearing From You!




    Custom handmade Women's Clothing, Plushies & Accessories at Blushingintrovert.com. Portions of your purchase go to Mental Health Awareness efforts.

    Watch Video Episodes! And Please...Subscribe to our YouTube Channel. Want to help us out? Leave us a 5-Star review on Apple Podcast Reviews. Submit Your Questions Direct and Find out more www.CyberCrimeJunkies.com Stay up-to-date on Cybersecurity with VIGILANCE Newsletter. Want Gear? We love our Small Business Sponsor, BlushingIntrovert.com. has it all. Women’s clothing, cool accessories supporting Mental Health Research. https://blushingintrovert.com







  • NEW! Text Us Direct Here!

    Paul Eckloff was a US Secret Service Agent for 23 years. Today we discuss how deep fake videos increase security risks. Topics include: artificial intelligence risks in cyber, new ways to reduce risk of deep fakes, how are deep fakes made, how are deep fake videos made, how are audio deep fakes made, and how is ai making it harder to detect deep fakes.

    Catch Video Episode with Sample Deep Fakes here: https://youtu.be/1yFFK6uHt0I?si=qP9F1_uIZ7q6qGSS

    Takeaways

    Sample deepfakes are played. Can you tell? Over 85% of those tested could not.Deepfake technology, created using techniques like GANs, diffusion models, and VAEs, can convincingly substitute one person's face or voice with another's.The advancement of deepfake technology poses risks such as impersonating executives, enhancing social engineering campaigns, avoiding detection in malware, and conducting reconnaissance for future attacks.The widespread availability and low cost of deepfake technology make it accessible to both legitimate businesses and threat actors, increasing the threat surface for organizations.The potential for deepfakes to manipulate and deceive individuals, especially children, is a grave concern.


    Chapters

    00:00 Introduction to Deepfake Technology and its Impact03:27 The Challenges of Detecting Deepfakes08:04 The Erosion of Trust: Seeing is No Longer Believing11:31 The Advancement of Deepfake Technology26:53 The Malicious Uses of Deepfake Technology36:17 The Risks of Deepfake Technology37:42 Consequences of Deepfakes40:38 Limitations of Deepfake Detec


    Try KiteWorks today at www.KiteWorks.com

    Don't Miss our Video on this Exciting KiteWorks Offer!

    Click the link above or text 904-867-4468, 2014652: and leave your message!

    You can now text our Podcast Studio direct. Ask questions, suggest guests and stories. 

    We Look Forward To Hearing From You!




    Try KiteWorks today at www.KiteWorks.com

    Don't miss this Video on it!

    The Most Secure Managed File Transfer System. 

    Custom handmade Women's Clothing, Plushies & Accessories at Blushingintrovert.com. Portions of your purchase go to Mental Health Awareness efforts.

    Watch Video Episodes! And Please...Subscribe to our YouTube Channel. Want to help us out? Leave us a 5-Star review on Apple Podcast Reviews. Submit Your Questions Direct and Find out more www.CyberCrimeJunkies.com Stay up-to-date on Cybersecurity with VIGILANCE Newsletter. Want Gear? We love our Small Business Sponsor, BlushingIntrovert.com. has it all. Women’s clothing, cool accessories supporting Mental Health Research. https://blushingintrovert.com







  • NEW! Text Us Direct Here!

    In this conversation, Dan Elliott, principal cybersecurity risk advisor at Zurich, discusses new ways leaders can assess their risk appetite.

    KEY TOPICS:

    ¡ how risk appetite effects your cyber security plans, ¡ explaining risk appetite in cyber security to leadership, ¡ how security planning involves risk appetite, ¡ new ways leaders can assess their risk appetite, ¡ how cyber insurance works, ¡ how cyber insurance is only one part of risk management, ¡ and risk management beyond cyber insurance.

    Chapters

    ¡ 00:00 Introduction and Role Explanation¡ 03:26 Transferring Risk and Risk Appetite¡ 06:01 The Complexity of Insurance and Risk Management¡ 07:41 Insurance as One Part of Risk¡ 08:10 The Impact of Breaches Beyond Insurance¡ 09:48 Career Journey: From Coding to Law Enforcement¡ 16:32 Concerns of Organizational Leaders¡ 20:22 Breakdown in Communication between Technology Leadership and the Board¡ 21:19 Explaining Risk Mitigation and Funding Needs¡ 22:46 Constantly Evolving Security Programs¡ 23:02 Challenges and Techniques in Fighting Breaches¡ 24:07 The Complexity of Cybersecurity Breaches¡ 25:13 The Priming Process and Research Involved in Breaches¡ 26:07 Measuring and Quantifying Risk in Cybersecurity¡ 27:03 Compliance vs. Cybersecurity¡ 28:03 The Importance of Cyber Risk Quantification¡ 29:11 The Role of Compliance and Security in the Financial Industry¡ 30:02 Preparing for a Data Breach: Incident Response Planning¡ 34:


    Try KiteWorks today at www.KiteWorks.com

    Don't Miss our Video on this Exciting KiteWorks Offer!

    Click the link above or text 904-867-4468, 2014652: and leave your message!

    You can now text our Podcast Studio direct. Ask questions, suggest guests and stories. 

    We Look Forward To Hearing From You!




    Try KiteWorks today at www.KiteWorks.com

    Don't miss this Video on it!

    The Most Secure Managed File Transfer System. 

    Custom handmade Women's Clothing, Plushies & Accessories at Blushingintrovert.com. Portions of your purchase go to Mental Health Awareness efforts.

    Watch Video Episodes! And Please...Subscribe to our YouTube Channel. Want to help us out? Leave us a 5-Star review on Apple Podcast Reviews. Submit Your Questions Direct and Find out more www.CyberCrimeJunkies.com Stay up-to-date on Cybersecurity with VIGILANCE Newsletter. Want Gear? We love our Small Business Sponsor, BlushingIntrovert.com. has it all. Women’s clothing, cool accessories supporting Mental Health Research. https://blushingintrovert.com