Afleveringen

  • NEW! Text Us Direct Here!

    David Mauro interviews Merry Marwig, a data privacy advocate, and Jeff Jockisch, founder of Obscure IQ, about how data brokers work and how to delete your data by discussing the intersection of privacy and personal data. They discuss the role of data brokers, the lack of transparency in data collection, and the potential risks of AI and deepfake technology.

    Click the link above and leave your message!

    You can now text our Podcast Studio direct. Ask questions, suggest guests and stories. 

    We Look Forward To Hearing From You!




    Custom handmade Women's Clothing, Plushies & Accessories at Blushingintrovert.com. Portions of your purchase go to Mental Health Awareness efforts.

    🎧 Subscribe now http://www.youtube.com/@cybercrimejunkiespodcast and never miss an episode!

    Follow Us:
    πŸ”— Website: https://cybercrimejunkies.com
    πŸ“± X/Twitter: https://x.com/CybercrimeJunky
    πŸ“Έ Instagram: https://www.instagram.com/cybercrimejunkies/

    Want to help us out? Leave us a 5-Star review on Apple Podcast Reviews.
    Listen to Our Podcast:
    πŸŽ™οΈ Apple Podcasts: https://podcasts.apple.com/us/podcast/cyber-crime-junkies/id1633932941
    πŸŽ™οΈ Spotify: https://open.spotify.com/show/5y4U2v51gztlenr8TJ2LJs?si=537680ec262545b3
    πŸŽ™οΈ Google Podcasts: http://www.youtube.com/@cybercrimejunkiespodcast

    Join the Conversation: πŸ’¬ Leave your comments and questions. TEXT THE LINK ABOVE . We'd love to hear your thoughts and suggestions for future episodes!

  • NEW! Text Us Direct Here!

    The Williams Woods Story. What Happens when Your Identity is Stolen.
    Video Episode: https://youtu.be/mBU3J-4vKww

    Click the link above and leave your message!

    You can now text our Podcast Studio direct. Ask questions, suggest guests and stories. 

    We Look Forward To Hearing From You!




    Custom handmade Women's Clothing, Plushies & Accessories at Blushingintrovert.com. Portions of your purchase go to Mental Health Awareness efforts.

    🎧 Subscribe now http://www.youtube.com/@cybercrimejunkiespodcast and never miss an episode!

    Follow Us:
    πŸ”— Website: https://cybercrimejunkies.com
    πŸ“± X/Twitter: https://x.com/CybercrimeJunky
    πŸ“Έ Instagram: https://www.instagram.com/cybercrimejunkies/

    Want to help us out? Leave us a 5-Star review on Apple Podcast Reviews.
    Listen to Our Podcast:
    πŸŽ™οΈ Apple Podcasts: https://podcasts.apple.com/us/podcast/cyber-crime-junkies/id1633932941
    πŸŽ™οΈ Spotify: https://open.spotify.com/show/5y4U2v51gztlenr8TJ2LJs?si=537680ec262545b3
    πŸŽ™οΈ Google Podcasts: http://www.youtube.com/@cybercrimejunkiespodcast

    Join the Conversation: πŸ’¬ Leave your comments and questions. TEXT THE LINK ABOVE . We'd love to hear your thoughts and suggestions for future episodes!

  • Zijn er afleveringen die ontbreken?

    Klik hier om de feed te vernieuwen.

  • NEW! Text Us Direct Here!

    Catch the Video episode: https://youtu.be/zMNsjSGT-yw

    Aaron Painter, former global executive at Microsoft, discusses the rising risks of deepfakes, how deep fake videos increase security risks, and how mobile-based identity verification helps like the new company he founded called Nametag.

    In this story David Mauro interviews Aaron and discusses identity verification challenges. We discuss how to reduce risk from multi factor authentication, explore mobile-based identity verification as well as how cryptography reduces cyber risk. This episode is a guide for how to reduce risk from multi factor authentication. See what Aaron’s new company NAMETAG can do for your company’s security at https://getnametag.com/

    Click the link above and leave your message!

    You can now text our Podcast Studio direct. Ask questions, suggest guests and stories. 

    We Look Forward To Hearing From You!




    Custom handmade Women's Clothing, Plushies & Accessories at Blushingintrovert.com. Portions of your purchase go to Mental Health Awareness efforts.

    🎧 Subscribe now http://www.youtube.com/@cybercrimejunkiespodcast and never miss an episode!

    Follow Us:
    πŸ”— Website: https://cybercrimejunkies.com
    πŸ“± X/Twitter: https://x.com/CybercrimeJunky
    πŸ“Έ Instagram: https://www.instagram.com/cybercrimejunkies/

    Want to help us out? Leave us a 5-Star review on Apple Podcast Reviews.
    Listen to Our Podcast:
    πŸŽ™οΈ Apple Podcasts: https://podcasts.apple.com/us/podcast/cyber-crime-junkies/id1633932941
    πŸŽ™οΈ Spotify: https://open.spotify.com/show/5y4U2v51gztlenr8TJ2LJs?si=537680ec262545b3
    πŸŽ™οΈ Google Podcasts: http://www.youtube.com/@cybercrimejunkiespodcast

    Join the Conversation: πŸ’¬ Leave your comments and questions. TEXT THE LINK ABOVE . We'd love to hear your thoughts and suggestions for future episodes!

  • NEW! Text Us Direct Here!

    Many leaders have concerns about employees using AI safely. We explain how to do so in this video. Today we sit with Bill Kleyman-founder of Apolo.us, a pioneer and leader in the space about his efforts for the safe use AI and how to reduce risks with employee use of AI.

    This is the story of Bill Kleyman and how AI can be used for good
    Find more here: https://www.apolo.us/

    Click the link above and leave your message!

    You can now text our Podcast Studio direct. Ask questions, suggest guests and stories. 

    We Look Forward To Hearing From You!




    Custom handmade Women's Clothing, Plushies & Accessories at Blushingintrovert.com. Portions of your purchase go to Mental Health Awareness efforts.

    🎧 Subscribe now http://www.youtube.com/@cybercrimejunkiespodcast and never miss an episode!

    Follow Us:
    πŸ”— Website: https://cybercrimejunkies.com
    πŸ“± X/Twitter: https://x.com/CybercrimeJunky
    πŸ“Έ Instagram: https://www.instagram.com/cybercrimejunkies/

    Want to help us out? Leave us a 5-Star review on Apple Podcast Reviews.
    Listen to Our Podcast:
    πŸŽ™οΈ Apple Podcasts: https://podcasts.apple.com/us/podcast/cyber-crime-junkies/id1633932941
    πŸŽ™οΈ Spotify: https://open.spotify.com/show/5y4U2v51gztlenr8TJ2LJs?si=537680ec262545b3
    πŸŽ™οΈ Google Podcasts: http://www.youtube.com/@cybercrimejunkiespodcast

    Join the Conversation: πŸ’¬ Leave your comments and questions. TEXT THE LINK ABOVE . We'd love to hear your thoughts and suggestions for future episodes!

  • NEW! Text Us Direct Here!

    How Equality Is Addressed in Cyber Security Field. We talk head-on about how equality is addressed in cyber security field. We address:, inequality in cyber security, ways to stop bias in cyber security, and the glass ceiling in cyber security. Lynn Dohm, head of Women in Cyber Security (WiCyS) and one of the top women in cyber security, joins us.

    Come learn benefits of attending security conferences, best ways to keep up to date on security news, and ways to stop bias in cyber security.

    Lynn DOHM https://www.linkedin.com/in/lynndohm/

    Click the link above and leave your message!

    You can now text our Podcast Studio direct. Ask questions, suggest guests and stories. 

    We Look Forward To Hearing From You!




    Custom handmade Women's Clothing, Plushies & Accessories at Blushingintrovert.com. Portions of your purchase go to Mental Health Awareness efforts.

    🎧 Subscribe now http://www.youtube.com/@cybercrimejunkiespodcast and never miss an episode!

    Follow Us:
    πŸ”— Website: https://cybercrimejunkies.com
    πŸ“± X/Twitter: https://x.com/CybercrimeJunky
    πŸ“Έ Instagram: https://www.instagram.com/cybercrimejunkies/

    Want to help us out? Leave us a 5-Star review on Apple Podcast Reviews.
    Listen to Our Podcast:
    πŸŽ™οΈ Apple Podcasts: https://podcasts.apple.com/us/podcast/cyber-crime-junkies/id1633932941
    πŸŽ™οΈ Spotify: https://open.spotify.com/show/5y4U2v51gztlenr8TJ2LJs?si=537680ec262545b3
    πŸŽ™οΈ Google Podcasts: http://www.youtube.com/@cybercrimejunkiespodcast

    Join the Conversation: πŸ’¬ Leave your comments and questions. TEXT THE LINK ABOVE . We'd love to hear your thoughts and suggestions for future episodes!

  • NEW! Text Us Direct Here!

    Video Episode: https://youtu.be/oH7FpvHOhVA

    This is the story of Matt Smallman, author of β€œUnlocking Your Call Centre”, about how call centers can be security risks. Our discussion gives exclusive insight into how biometrics fail in security, problems with voice authentication and explore military tactics and biometrics.

    We explore how to balance convenience with security, how to protect call centers from social engineering and ways to reduce cyber security risks in call centers without compromising the customer experience.

    Click the link above and leave your message!

    You can now text our Podcast Studio direct. Ask questions, suggest guests and stories. 

    We Look Forward To Hearing From You!




    Custom handmade Women's Clothing, Plushies & Accessories at Blushingintrovert.com. Portions of your purchase go to Mental Health Awareness efforts.

    🎧 Subscribe now http://www.youtube.com/@cybercrimejunkiespodcast and never miss an episode!

    Follow Us:
    πŸ”— Website: https://cybercrimejunkies.com
    πŸ“± X/Twitter: https://x.com/CybercrimeJunky
    πŸ“Έ Instagram: https://www.instagram.com/cybercrimejunkies/

    Want to help us out? Leave us a 5-Star review on Apple Podcast Reviews.
    Listen to Our Podcast:
    πŸŽ™οΈ Apple Podcasts: https://podcasts.apple.com/us/podcast/cyber-crime-junkies/id1633932941
    πŸŽ™οΈ Spotify: https://open.spotify.com/show/5y4U2v51gztlenr8TJ2LJs?si=537680ec262545b3
    πŸŽ™οΈ Google Podcasts: http://www.youtube.com/@cybercrimejunkiespodcast

    Join the Conversation: πŸ’¬ Leave your comments and questions. TEXT THE LINK ABOVE . We'd love to hear your thoughts and suggestions for future episodes!

  • NEW! Text Us Direct Here!

    Richard Hollis of Risk Crew in London joins Cyber Crime Junkies studio discussing key topics: why cybersecurity efforts usually fail and customers or enemies online.

    Video episode: https://youtu.be/QQ8l1PaDaUI

    Topics:
    πŸ’‘how cybersecurity efforts usually fail,
    πŸ’‘customers or enemies online
    πŸ’‘best practices for businesses to limit cyber liability,
    πŸ’‘new ways to protect business from cyber crime,
    πŸ’‘newest methods to limit cyber liability,
    πŸ’‘newest security expert insight

    Click the link above and leave your message!

    You can now text our Podcast Studio direct. Ask questions, suggest guests and stories. 

    We Look Forward To Hearing From You!




    Custom handmade Women's Clothing, Plushies & Accessories at Blushingintrovert.com. Portions of your purchase go to Mental Health Awareness efforts.

    🎧 Subscribe now http://www.youtube.com/@cybercrimejunkiespodcast and never miss an episode!

    Follow Us:
    πŸ”— Website: https://cybercrimejunkies.com
    πŸ“± X/Twitter: https://x.com/CybercrimeJunky
    πŸ“Έ Instagram: https://www.instagram.com/cybercrimejunkies/

    Want to help us out? Leave us a 5-Star review on Apple Podcast Reviews.
    Listen to Our Podcast:
    πŸŽ™οΈ Apple Podcasts: https://podcasts.apple.com/us/podcast/cyber-crime-junkies/id1633932941
    πŸŽ™οΈ Spotify: https://open.spotify.com/show/5y4U2v51gztlenr8TJ2LJs?si=537680ec262545b3
    πŸŽ™οΈ Google Podcasts: http://www.youtube.com/@cybercrimejunkiespodcast

    Join the Conversation: πŸ’¬ Leave your comments and questions. TEXT THE LINK ABOVE . We'd love to hear your thoughts and suggestions for future episodes!

  • NEW! Text Us Direct Here!

    Don't miss the video interview for details: https://youtu.be/-G7hbLGDK9o

    Steve Orrin, Federal CTO for Intel, discusses secrets inside zero trust and r latest cyber security concerns. He is a recognized security leader and public speaker. Steve has orchestrated projects for federal government agencies on Security and AI. Steve is a key advisor in emerging technologies to the Public Sector, Defense, and Intelligence communities.

    Key topics: latest cyber security concerns, Global Cyber Security Strategy, zero trust small business and national security, zero trust and national security, zero trust in critical infrastructure, zero trust in supply chain, zero trust in small business, secrets inside zero trust, how us cyber security strategy effects allies, driving change in cyber security today, zero trust in cyber security today


    For more: CyberCrimeJunkies


    Click the link above and leave your message!

    You can now text our Podcast Studio direct. Ask questions, suggest guests and stories. 

    We Look Forward To Hearing From You!




    Custom handmade Women's Clothing, Plushies & Accessories at Blushingintrovert.com. Portions of your purchase go to Mental Health Awareness efforts.

    🎧 Subscribe now http://www.youtube.com/@cybercrimejunkiespodcast and never miss an episode!

    Follow Us:
    πŸ”— Website: https://cybercrimejunkies.com
    πŸ“± X/Twitter: https://x.com/CybercrimeJunky
    πŸ“Έ Instagram: https://www.instagram.com/cybercrimejunkies/

    Want to help us out? Leave us a 5-Star review on Apple Podcast Reviews.
    Listen to Our Podcast:
    πŸŽ™οΈ Apple Podcasts: https://podcasts.apple.com/us/podcast/cyber-crime-junkies/id1633932941
    πŸŽ™οΈ Spotify: https://open.spotify.com/show/5y4U2v51gztlenr8TJ2LJs?si=537680ec262545b3
    πŸŽ™οΈ Google Podcasts: http://www.youtube.com/@cybercrimejunkiespodcast

    Join the Conversation: πŸ’¬ Leave your comments and questions. TEXT THE LINK ABOVE . We'd love to hear your thoughts and suggestions for future episodes!

  • NEW! Text Us Direct Here!

    Sam Buckenmaier, a senior cyber leader, join us on what leadership means today and what employers want in cybersecurity.


    We discussed: new approaches to enter the cybersecurity field, how to have effective communication internally in business, advice on cybersecurity careers from top recruiters, approaches to enter cybersecurity, and best practices for leveraging LinkedIn for your personal brand.

    πŸ”” Site, Research and Direct contact with Podcast team: https://cybercrimejunkies.com


    Click the link above and leave your message!

    You can now text our Podcast Studio direct. Ask questions, suggest guests and stories. 

    We Look Forward To Hearing From You!




    Custom handmade Women's Clothing, Plushies & Accessories at Blushingintrovert.com. Portions of your purchase go to Mental Health Awareness efforts.

    🎧 Subscribe now http://www.youtube.com/@cybercrimejunkiespodcast and never miss an episode!

    Follow Us:
    πŸ”— Website: https://cybercrimejunkies.com
    πŸ“± X/Twitter: https://x.com/CybercrimeJunky
    πŸ“Έ Instagram: https://www.instagram.com/cybercrimejunkies/

    Want to help us out? Leave us a 5-Star review on Apple Podcast Reviews.
    Listen to Our Podcast:
    πŸŽ™οΈ Apple Podcasts: https://podcasts.apple.com/us/podcast/cyber-crime-junkies/id1633932941
    πŸŽ™οΈ Spotify: https://open.spotify.com/show/5y4U2v51gztlenr8TJ2LJs?si=537680ec262545b3
    πŸŽ™οΈ Google Podcasts: http://www.youtube.com/@cybercrimejunkiespodcast

    Join the Conversation: πŸ’¬ Leave your comments and questions. TEXT THE LINK ABOVE . We'd love to hear your thoughts and suggestions for future episodes!

  • NEW! Text Us Direct Here!

    What we all need to know about How Psychology Affects Security. Psychology of Online Security. Topics:

    behind scenes cyber criminals, best ways to protect business from cyber crime, cyber crime gang discussions, exposing cyber crime gangs, exposing secrets of cyber crime gangs, how can we spot fraud in business, how to limit liability from data breach, new insight on true cyber crime examples, risk and brand protection

    We wanted to explore in today’s episode what makes them tick. Why is it some organizations are only in the news for new products that they launch, people that they save or a new location that they’re opening. All positive things. But other organizations are in the news for reputation damaging data breach.

    Today we are going to explore the mind of a hacker and reset expectations of the language that we use. Hackers are not evil in fact there are several different types of hackers. Hackers are engineers and people that figure out how things work. Without them we wouldn’t have some of the greatest inventions and protections that we all take for granted every day.

    Click the link above and leave your message!

    You can now text our Podcast Studio direct. Ask questions, suggest guests and stories. 

    We Look Forward To Hearing From You!




    Custom handmade Women's Clothing, Plushies & Accessories at Blushingintrovert.com. Portions of your purchase go to Mental Health Awareness efforts.

    🎧 Subscribe now http://www.youtube.com/@cybercrimejunkiespodcast and never miss an episode!

    Follow Us:
    πŸ”— Website: https://cybercrimejunkies.com
    πŸ“± X/Twitter: https://x.com/CybercrimeJunky
    πŸ“Έ Instagram: https://www.instagram.com/cybercrimejunkies/

    Want to help us out? Leave us a 5-Star review on Apple Podcast Reviews.
    Listen to Our Podcast:
    πŸŽ™οΈ Apple Podcasts: https://podcasts.apple.com/us/podcast/cyber-crime-junkies/id1633932941
    πŸŽ™οΈ Spotify: https://open.spotify.com/show/5y4U2v51gztlenr8TJ2LJs?si=537680ec262545b3
    πŸŽ™οΈ Google Podcasts: http://www.youtube.com/@cybercrimejunkiespodcast

    Join the Conversation: πŸ’¬ Leave your comments and questions. TEXT THE LINK ABOVE . We'd love to hear your thoughts and suggestions for future episodes!

  • NEW! Text Us Direct Here!

    Video Episode here!

    Jon DiMaggio, Senior Security Strategist with https://analyst1.com and former NSA analyst, author of The Art of Cyber Warfare (https://a.co/d/72qKbc4) joins us for an exclusive discussion on the cyber crime take down story of LOCKBIT.

    Chapters

    00:00 Introduction and Background08:10 Financial Aspects of Ransomware Operations24:33 Technical Skills and Criminal Intent39:46 The Self-Convening Justice System in the Criminal Underground48:31 The Importance of Effective Communication in Cybersecurity

    Click the link above and leave your message!

    You can now text our Podcast Studio direct. Ask questions, suggest guests and stories. 

    We Look Forward To Hearing From You!




    Custom handmade Women's Clothing, Plushies & Accessories at Blushingintrovert.com. Portions of your purchase go to Mental Health Awareness efforts.

    🎧 Subscribe now http://www.youtube.com/@cybercrimejunkiespodcast and never miss an episode!

    Follow Us:
    πŸ”— Website: https://cybercrimejunkies.com
    πŸ“± X/Twitter: https://x.com/CybercrimeJunky
    πŸ“Έ Instagram: https://www.instagram.com/cybercrimejunkies/

    Want to help us out? Leave us a 5-Star review on Apple Podcast Reviews.
    Listen to Our Podcast:
    πŸŽ™οΈ Apple Podcasts: https://podcasts.apple.com/us/podcast/cyber-crime-junkies/id1633932941
    πŸŽ™οΈ Spotify: https://open.spotify.com/show/5y4U2v51gztlenr8TJ2LJs?si=537680ec262545b3
    πŸŽ™οΈ Google Podcasts: http://www.youtube.com/@cybercrimejunkiespodcast

    Join the Conversation: πŸ’¬ Leave your comments and questions. TEXT THE LINK ABOVE . We'd love to hear your thoughts and suggestions for future episodes!

  • NEW! Text Us Direct Here!

    Experts Nick Mullen and Nick Oles discuss artificial intelligence and the impact of ai on business cyber risk. They share their personal stories of how they got into the field and highlight the importance of understanding the analogies between physical and cybersecurity controls.

    Nick Oles is author of How to Catch a Phish [email protected] https://thenetdefender.com/

    Nick Mullen is a CISSP, CCSP, PMP and Principal, at Sanguine Security Solutions.

    Chapters

    2:20 The Evolution of Deepfake Technology10:03 Breaking into Cyber for other fields. Origin Stories.33:16 Training Employees to Recognize and Respond to Deepfake Attacks42:11 Preventing Cyber Attacks: Key Practices46:45 Training Employees to Detect Phishing Emails53:24 Understanding the Human Attack Surface

    Key Topics: impact of ai on business cyber risk, how ai powered social engineering affects you, social impact of artificial intelligence, social engineering risks from new ai, how ai is changing cyber crime tactics, how ai is changing phishing tactics, how to measure new ai cyber risk, how ai increases cyber risk, how to measure new ai increased cyber risk, risks from ai deep fake explained, ai deep fake risks explained, dangers of synthetic media, Artificial Intelligence And

    Click the link above and leave your message!

    You can now text our Podcast Studio direct. Ask questions, suggest guests and stories. 

    We Look Forward To Hearing From You!




    Custom handmade Women's Clothing, Plushies & Accessories at Blushingintrovert.com. Portions of your purchase go to Mental Health Awareness efforts.

    🎧 Subscribe now http://www.youtube.com/@cybercrimejunkiespodcast and never miss an episode!

    Follow Us:
    πŸ”— Website: https://cybercrimejunkies.com
    πŸ“± X/Twitter: https://x.com/CybercrimeJunky
    πŸ“Έ Instagram: https://www.instagram.com/cybercrimejunkies/

    Want to help us out? Leave us a 5-Star review on Apple Podcast Reviews.
    Listen to Our Podcast:
    πŸŽ™οΈ Apple Podcasts: https://podcasts.apple.com/us/podcast/cyber-crime-junkies/id1633932941
    πŸŽ™οΈ Spotify: https://open.spotify.com/show/5y4U2v51gztlenr8TJ2LJs?si=537680ec262545b3
    πŸŽ™οΈ Google Podcasts: http://www.youtube.com/@cybercrimejunkiespodcast

    Join the Conversation: πŸ’¬ Leave your comments and questions. TEXT THE LINK ABOVE . We'd love to hear your thoughts and suggestions for future episodes!

  • NEW! Text Us Direct Here!

    After years in the industry, inventing and exploring emerging technologies, Gideon Hazam, Co-Founder, COO and CSM at Memcyco, https://www.memcyco.com/home found a way to solve a problem outside the normal cybersecurity approaches. He joins us behind the scenes to discuss innovative ways to reduce website spoofing.

    Key Topics:

    new ways to reduce cyber risks in financial institutions,ways to prevent account take overs,innovative ways to reduce website spoofing, latest types of phishing, dangers of website spoofing, social engineering attacks against financial institutions,

    Chapters

    01:09 The Importance of Brand Protection04:01 The Impact of COVID-19 on Cybercrime06:28 Methods of Website Spoofing08:37 Account Takeover and Phishing09:30 Current Solutions and Challenges20:13 Expanding to Other Industries24:38 Alerting the Original Brand and Customers26:19 Real-Time Detection of Spoofed Sites27:46 Customer Alerts and Integration with Security Operations Centers30:51 Introduction to Memsico and its Integration with Risk and Fraud33:25 Challenges Faced by Organizations in Impersonation Attacks35:38 Focus on Brand Reputation and Customer Trust36:34 The Need for Protection Against Spoofing Attacks46:15 Marking and Tracing Stolen Credentials48:04 Uniqueness of Memsico and Patented Technology49:14 The Three Parts of Memsico's Platform: Detection, Protection, and Action

    Click the link above and leave your message!

    You can now text our Podcast Studio direct. Ask questions, suggest guests and stories. 

    We Look Forward To Hearing From You!




    Custom handmade Women's Clothing, Plushies & Accessories at Blushingintrovert.com. Portions of your purchase go to Mental Health Awareness efforts.

    🎧 Subscribe now http://www.youtube.com/@cybercrimejunkiespodcast and never miss an episode!

    Follow Us:
    πŸ”— Website: https://cybercrimejunkies.com
    πŸ“± X/Twitter: https://x.com/CybercrimeJunky
    πŸ“Έ Instagram: https://www.instagram.com/cybercrimejunkies/

    Want to help us out? Leave us a 5-Star review on Apple Podcast Reviews.
    Listen to Our Podcast:
    πŸŽ™οΈ Apple Podcasts: https://podcasts.apple.com/us/podcast/cyber-crime-junkies/id1633932941
    πŸŽ™οΈ Spotify: https://open.spotify.com/show/5y4U2v51gztlenr8TJ2LJs?si=537680ec262545b3
    πŸŽ™οΈ Google Podcasts: http://www.youtube.com/@cybercrimejunkiespodcast

    Join the Conversation: πŸ’¬ Leave your comments and questions. TEXT THE LINK ABOVE . We'd love to hear your thoughts and suggestions for future episodes!

  • NEW! Text Us Direct Here!

    The US has signed into new law the Ban of Tik Tok effective in January. What does this mean?

    Topics: US Tik Tok ban. What to know, online privacy andTik Tok, national security risks from social media, identity protection in light of TikTok, why social media platforms are national security risks, why social media platform is a national security threat, how social media platforms are security risks, laws on social media national security, and national security versus social media.

    Click the link above and leave your message!

    You can now text our Podcast Studio direct. Ask questions, suggest guests and stories. 

    We Look Forward To Hearing From You!




    🎧 Subscribe now http://www.youtube.com/@cybercrimejunkiespodcast and never miss an episode!

    Follow Us:
    πŸ”— Website: https://cybercrimejunkies.com
    πŸ“± X/Twitter: https://x.com/CybercrimeJunky
    πŸ“Έ Instagram: https://www.instagram.com/cybercrimejunkies/

    Want to help us out? Leave us a 5-Star review on Apple Podcast Reviews.
    Listen to Our Podcast:
    πŸŽ™οΈ Apple Podcasts: https://podcasts.apple.com/us/podcast/cyber-crime-junkies/id1633932941
    πŸŽ™οΈ Spotify: https://open.spotify.com/show/5y4U2v51gztlenr8TJ2LJs?si=537680ec262545b3
    πŸŽ™οΈ Google Podcasts: http://www.youtube.com/@cybercrimejunkiespodcast

    Join the Conversation: πŸ’¬ Leave your comments and questions. TEXT THE LINK ABOVE . We'd love to hear your thoughts and suggestions for future episodes!

  • NEW! Text Us Direct Here!

    Chris Voss joins us to go INSIDE the famous negotiation model he created and share secrets behind Never Split the Difference, from the #1 Wall Street Journal best-selling book on Negotiation.

    Chris is the most decorated FBI hostage negotiator in history. He teaches his techniques at Harvard Law, Georgetown University, and others. He is the founder of the Black Swan Group.

    Key Takeaways

    The Importance of Proof of Life in NegotiationUsing Decreasing Incremental Change in BargainingHow Accusation Audits work, How Tactical Empathy and Espionage are used,modern ways to negotiate effectively,how to ask questions better using Never Split the Difference,how to negotiate with an enemy, how to discover unknowns in negotiationnew ways to convince someone of anything,and other secrets behind Never Split the Difference.

    Chapters

    00:00 Introduction to the Never Split the Difference Method02:15 Mastering the Never Split the Difference Method of Negotiation03:11 The Power of Active Listening and Tactical Empathy05:31 Uncovering Concealed Motivations and Undisclosed Needs07:22 The Importance of Proof of Life in Negotiations08:44 Using Decreasing Incremental Change in Bargaining10:41 Dealing with Aggressive Individuals and Building Agreement

    To grab your copy of Never Split The Difference you can buy it here (not an affiliate link). https://a.co/d/229P5UV

    To find more of Chris Voss and The Black Swan Group: https://www.blackswanltd.com/

    Click the link above and leave your message!

    You can now text our Podcast Studio direct. Ask questions, suggest guests and stories. 

    We Look Forward To Hearing From You!




    Custom handmade Women's Clothing, Plushies & Accessories at Blushingintrovert.com. Portions of your purchase go to Mental Health Awareness efforts.

    🎧 Subscribe now http://www.youtube.com/@cybercrimejunkiespodcast and never miss an episode!

    Follow Us:
    πŸ”— Website: https://cybercrimejunkies.com
    πŸ“± X/Twitter: https://x.com/CybercrimeJunky
    πŸ“Έ Instagram: https://www.instagram.com/cybercrimejunkies/

    Want to help us out? Leave us a 5-Star review on Apple Podcast Reviews.
    Listen to Our Podcast:
    πŸŽ™οΈ Apple Podcasts: https://podcasts.apple.com/us/podcast/cyber-crime-junkies/id1633932941
    πŸŽ™οΈ Spotify: https://open.spotify.com/show/5y4U2v51gztlenr8TJ2LJs?si=537680ec262545b3
    πŸŽ™οΈ Google Podcasts: http://www.youtube.com/@cybercrimejunkiespodcast

    Join the Conversation: πŸ’¬ Leave your comments and questions. TEXT THE LINK ABOVE . We'd love to hear your thoughts and suggestions for future episodes!

  • NEW! Text Us Direct Here!

    Chris Voss, founder of the Black Swan Group, joins us to share the story behind Never Split The Difference, the #1 Wall Street Journal best selling book on Negotiation.

    The most decorated FBI hostage negotiator in history, Chris Voss teaches his model Harvard Law, Georgetown University and others.

    Key Takeaways

    how never split the difference started,Optimal Timing for NegotiationsThe Neuroscience Behind Tactical Empathybest ways to collaborate in negotiations,ways to negotiate like your life depended on it,best ways to collaborate in negotiations,how to practice Never Split the Difference,benefits of using active listening and importance of body language in communications,and other top techniques in Never Split the Difference,

    Chapters

    00:00 Introduction to Chris Voss and the Black Swan Method03:34 Chris Voss's Background and the Documentary04:04 Chris Voss's Journey into Law Enforcement06:26 Mentors and Becoming a Hostage Negotiator09:22 The Foundation of the Black Swan Method14:14 Developing Tactical Empathy on a Suicide Hotline21:36 Practicing and Applying the Black Swan Method24:30 Optimal Timing for Negotiations28:22 Tactical Empathy with Adversaries32:40 Defining Tactical Empathy34:41 The Future of Tactical Empathy and Neuroscience

    To grab your copy of Never Split The Difference you can buy it here (not an affiliate link). https://a.co/d/229P5UV

    To find more of Chris Voss and The Black Swan Group: https://www.blackswanltd.com/

    Click the link above and leave your message!

    You can now text our Podcast Studio direct. Ask questions, suggest guests and stories. 

    We Look Forward To Hearing From You!




    Custom handmade Women's Clothing, Plushies & Accessories at Blushingintrovert.com. Portions of your purchase go to Mental Health Awareness efforts.

    🎧 Subscribe now http://www.youtube.com/@cybercrimejunkiespodcast and never miss an episode!

    Follow Us:
    πŸ”— Website: https://cybercrimejunkies.com
    πŸ“± X/Twitter: https://x.com/CybercrimeJunky
    πŸ“Έ Instagram: https://www.instagram.com/cybercrimejunkies/

    Want to help us out? Leave us a 5-Star review on Apple Podcast Reviews.
    Listen to Our Podcast:
    πŸŽ™οΈ Apple Podcasts: https://podcasts.apple.com/us/podcast/cyber-crime-junkies/id1633932941
    πŸŽ™οΈ Spotify: https://open.spotify.com/show/5y4U2v51gztlenr8TJ2LJs?si=537680ec262545b3
    πŸŽ™οΈ Google Podcasts: http://www.youtube.com/@cybercrimejunkiespodcast

    Join the Conversation: πŸ’¬ Leave your comments and questions. TEXT THE LINK ABOVE . We'd love to hear your thoughts and suggestions for future episodes!

  • NEW! Text Us Direct Here!

    Great discussion with Gabe Gambill. VP with Quorum.

    Topics discussed:

    best ways to limit cyber attack liability, brand protection with identification authentication, how to limit liability from cyber attacks, newest findings on ransomware cyber crime gangs, undercover findings on ransomware cyber crime gangs, pitfalls of data back ups, how to reduce risk of failed data back ups, importance of cyber leadership for brands, and true stories of horrific failed attempts following big disasters.

    Click the link above and leave your message!

    You can now text our Podcast Studio direct. Ask questions, suggest guests and stories. 

    We Look Forward To Hearing From You!




    Custom handmade Women's Clothing, Plushies & Accessories at Blushingintrovert.com. Portions of your purchase go to Mental Health Awareness efforts.

    🎧 Subscribe now http://www.youtube.com/@cybercrimejunkiespodcast and never miss an episode!

    Follow Us:
    πŸ”— Website: https://cybercrimejunkies.com
    πŸ“± X/Twitter: https://x.com/CybercrimeJunky
    πŸ“Έ Instagram: https://www.instagram.com/cybercrimejunkies/

    Want to help us out? Leave us a 5-Star review on Apple Podcast Reviews.
    Listen to Our Podcast:
    πŸŽ™οΈ Apple Podcasts: https://podcasts.apple.com/us/podcast/cyber-crime-junkies/id1633932941
    πŸŽ™οΈ Spotify: https://open.spotify.com/show/5y4U2v51gztlenr8TJ2LJs?si=537680ec262545b3
    πŸŽ™οΈ Google Podcasts: http://www.youtube.com/@cybercrimejunkiespodcast

    Join the Conversation: πŸ’¬ Leave your comments and questions. TEXT THE LINK ABOVE . We'd love to hear your thoughts and suggestions for future episodes!

  • NEW! Text Us Direct Here!

    When technology can do everything for us, what is left? Imagination. That is the intrigue in a soon-to-be-released book coming by Dr Lydia Kostopoulos, who holds a PHD in International Relations, Security and Political Science, having attended the Harvard Kennedy school for Cybersecurity. We discuss:

    Β· ways to grow brands by adapting to emerging tech,Β· how to use imagination in brand growth,Β· risks in believing you are TOO BIG TO FAIL,Β· how AI is effecting brand imagination, Β· how technology has changed society,

    Chapters

    02:44 The Significance of Cybersecurity and Cybercrime05:04 Exploring Web3 and Digital Ownership08:23 The State of Web3 and the Metaverse12:21 Digital Assets and NFTs15:08 Apple's Vision Pro and Avatar Technology19:20 Challenges and Risks in the Metaverse20:41 Convergence of Technologies and Convergence Literacy24:27 Emerging Technologies and Strategic Advisory Services26:46 The Importance of Convergence Literacy27:15 Navigating Exponential Advancements27:44 The Need for Packaging Solutions30:19 The Imagination Dilemma33:01 The Impact of Emerging Technologies36:16 Packaging and the Circular Economy40:08 The Imagination Dilemma: Explained52:49 Reimagining Business Focus53:42 Protecting Competitiveness

    Click the link above and leave your message!

    You can now text our Podcast Studio direct. Ask questions, suggest guests and stories. 

    We Look Forward To Hearing From You!




    Custom handmade Women's Clothing, Plushies & Accessories at Blushingintrovert.com. Portions of your purchase go to Mental Health Awareness efforts.

    🎧 Subscribe now http://www.youtube.com/@cybercrimejunkiespodcast and never miss an episode!

    Follow Us:
    πŸ”— Website: https://cybercrimejunkies.com
    πŸ“± X/Twitter: https://x.com/CybercrimeJunky
    πŸ“Έ Instagram: https://www.instagram.com/cybercrimejunkies/

    Want to help us out? Leave us a 5-Star review on Apple Podcast Reviews.
    Listen to Our Podcast:
    πŸŽ™οΈ Apple Podcasts: https://podcasts.apple.com/us/podcast/cyber-crime-junkies/id1633932941
    πŸŽ™οΈ Spotify: https://open.spotify.com/show/5y4U2v51gztlenr8TJ2LJs?si=537680ec262545b3
    πŸŽ™οΈ Google Podcasts: http://www.youtube.com/@cybercrimejunkiespodcast

    Join the Conversation: πŸ’¬ Leave your comments and questions. TEXT THE LINK ABOVE . We'd love to hear your thoughts and suggestions for future episodes!

  • NEW! Text Us Direct Here!

    Jamey Davidson, Partner at international law firm O’Hagan Meyer (https://ohaganmeyer.com). Jamey concentrates on top ways to reduce risk in cyber breach litigation, defending businesses in cyber breach class-action law suits and how to build defenses to reduce cyber breach liability.

    We discuss:

    Β· How Cyber Breach Litigation Works

    Β· Why Security Layers Help Defend Against Law Suits

    Β· How Cyber Breach Liability Can Destroy Business

    Β· How To Reduce Your Cyber Breach Liability

    Click the link above and leave your message!

    You can now text our Podcast Studio direct. Ask questions, suggest guests and stories. 

    We Look Forward To Hearing From You!




    Custom handmade Women's Clothing, Plushies & Accessories at Blushingintrovert.com. Portions of your purchase go to Mental Health Awareness efforts.

    🎧 Subscribe now http://www.youtube.com/@cybercrimejunkiespodcast and never miss an episode!

    Follow Us:
    πŸ”— Website: https://cybercrimejunkies.com
    πŸ“± X/Twitter: https://x.com/CybercrimeJunky
    πŸ“Έ Instagram: https://www.instagram.com/cybercrimejunkies/

    Want to help us out? Leave us a 5-Star review on Apple Podcast Reviews.
    Listen to Our Podcast:
    πŸŽ™οΈ Apple Podcasts: https://podcasts.apple.com/us/podcast/cyber-crime-junkies/id1633932941
    πŸŽ™οΈ Spotify: https://open.spotify.com/show/5y4U2v51gztlenr8TJ2LJs?si=537680ec262545b3
    πŸŽ™οΈ Google Podcasts: http://www.youtube.com/@cybercrimejunkiespodcast

    Join the Conversation: πŸ’¬ Leave your comments and questions. TEXT THE LINK ABOVE . We'd love to hear your thoughts and suggestions for future episodes!

  • NEW! Text Us Direct Here!

    From Rupert Murdoch's global entertainment ambition to a dead hacker found hanging from a tree in a park in Germany, this true cyber crime story spans over a decade in the cut-throat Satellite TV wars, involving colorful characters, pirates, big business, technology advances and failures and those who entered the darker side to try and get what they wanted.

    This is the true cyber crime story of TV Wars and Espionage. Pirates, a Dead Hacker. A Shocking Crime.

    Click the link above and leave your message!

    You can now text our Podcast Studio direct. Ask questions, suggest guests and stories. 

    We Look Forward To Hearing From You!




    Custom handmade Women's Clothing, Plushies & Accessories at Blushingintrovert.com. Portions of your purchase go to Mental Health Awareness efforts.

    🎧 Subscribe now http://www.youtube.com/@cybercrimejunkiespodcast and never miss an episode!

    Follow Us:
    πŸ”— Website: https://cybercrimejunkies.com
    πŸ“± X/Twitter: https://x.com/CybercrimeJunky
    πŸ“Έ Instagram: https://www.instagram.com/cybercrimejunkies/

    Want to help us out? Leave us a 5-Star review on Apple Podcast Reviews.
    Listen to Our Podcast:
    πŸŽ™οΈ Apple Podcasts: https://podcasts.apple.com/us/podcast/cyber-crime-junkies/id1633932941
    πŸŽ™οΈ Spotify: https://open.spotify.com/show/5y4U2v51gztlenr8TJ2LJs?si=537680ec262545b3
    πŸŽ™οΈ Google Podcasts: http://www.youtube.com/@cybercrimejunkiespodcast

    Join the Conversation: πŸ’¬ Leave your comments and questions. TEXT THE LINK ABOVE . We'd love to hear your thoughts and suggestions for future episodes!