Afleveringen

  • NEW! Text Us Direct Here!

    In today's cyber flash point, we show you how to digest recent data breaches and how to take action against cyber crime.

    Have you ever wondered how a single cyberattack can cripple an entire industry? Or how businesses can recover from such a devastating blow? Ever realize the cyber security risks from SaaS platforms? Today we dive into the gripping tale of the ransomware attacks on CDK Global, a leading provider of dealer management systems (DMS) for car dealerships across North America.

    Accelerate your CMMC 2.0 compliance and address federal zero-trust requirements with Kiteworks' universal, secure file sharing platform made for every organization, and helpful to defense contractors.

    Visit kiteworks.com to get started. 

    ๐ŸŽง Subscribe now http://www.youtube.com/@cybercrimejunkiespodcast and never miss an episode!

    Follow Us:
    ๐Ÿ”— Website: https://cybercrimejunkies.com
    ๐Ÿ“ฑ X/Twitter: https://x.com/CybercrimeJunky
    ๐Ÿ“ธ Instagram: https://www.instagram.com/cybercrimejunkies/

    Want to help us out? Leave us a 5-Star review on Apple Podcast Reviews.
    Listen to Our Podcast:
    ๐ŸŽ™๏ธ Apple Podcasts: https://podcasts.apple.com/us/podcast/cyber-crime-junkies/id1633932941
    ๐ŸŽ™๏ธ Spotify: https://open.spotify.com/show/5y4U2v51gztlenr8TJ2LJs?si=537680ec262545b3
    ๐ŸŽ™๏ธ Google Podcasts: http://www.youtube.com/@cybercrimejunkiespodcast

    Join the Conversation: ๐Ÿ’ฌ Leave your comments and questions. TEXT THE LINK ABOVE . We'd love to hear your thoughts and suggestions for future episodes!

  • NEW! Text Us Direct Here!

    Former FBI Special Agent who served with the FBIโ€™s original Cyber Crime division, well respected public speaker, author and TV consultant on personal cybersecurity education Scott Augenbaum joins David Mauro in the studio.

    We discuss: how a cyber security mindset works, how fbi fights cyber crime, personal cybersecurity education, cyber security mindset, individual user audits, how to educate users, and how cyber crime is like the mafia.

    https://CYBERSECURITYMINDSET.com

    Accelerate your CMMC 2.0 compliance and address federal zero-trust requirements with Kiteworks' universal, secure file sharing platform made for every organization, and helpful to defense contractors.

    Visit kiteworks.com to get started. 

    We're thrilled to introduce Season 5 Cyber Flash Points to show what latest tech news means to online safety with short stories helping spread security awareness and the importance of online privacy protection.

    "Cyber Flash Points" โ€“ your go-to source for practical and concise summaries.

    So, tune in and welcome to "Cyber Flash Pointsโ€

    ๐ŸŽง Subscribe now http://www.youtube.com/@cybercrimejunkiespodcast and never miss an episode!

    Follow Us:
    ๐Ÿ”— Website: https://cybercrimejunkies.com
    ๐Ÿ“ฑ X/Twitter: https://x.com/CybercrimeJunky
    ๐Ÿ“ธ Instagram: https://www.instagram.com/cybercrimejunkies/

    Want to help us out? Leave us a 5-Star review on Apple Podcast Reviews.
    Listen to Our Podcast:
    ๐ŸŽ™๏ธ Apple Podcasts: https://podcasts.apple.com/us/podcast/cyber-crime-junkies/id1633932941
    ๐ŸŽ™๏ธ Spotify: https://open.spotify.com/show/5y4U2v51gztlenr8TJ2LJs?si=537680ec262545b3
    ๐ŸŽ™๏ธ Google Podcasts: http://www.youtube.com/@cybercrimejunkiespodcast

    Join the Conversation: ๐Ÿ’ฌ Leave your comments and questions. TEXT THE LINK ABOVE . We'd love to hear your thoughts and suggestions for future episodes!

  • Zijn er afleveringen die ontbreken?

    Klik hier om de feed te vernieuwen.

  • NEW! Text Us Direct Here!

    Richard Hollis of Risk Crew (https://www.riskcrew.com) in London joins Cyber Crime Junkies studio (https://cybercrimejunkies.com) for exclusive discussion on: cyber security differences between US versus UK, how cybersecurity efforts usually fail and Difference between customers or enemies.

    Don't miss the video episode: https://youtu.be/5jjlJx_EyXI

    Accelerate your CMMC 2.0 compliance and address federal zero-trust requirements with Kiteworks' universal, secure file sharing platform made for every organization, and helpful to defense contractors.

    Visit kiteworks.com to get started. 

    We're thrilled to introduce Season 5 Cyber Flash Points to show what latest tech news means to online safety with short stories helping spread security awareness and the importance of online privacy protection.

    "Cyber Flash Points" โ€“ your go-to source for practical and concise summaries.

    So, tune in and welcome to "Cyber Flash Pointsโ€

    ๐ŸŽง Subscribe now http://www.youtube.com/@cybercrimejunkiespodcast and never miss an episode!

    Follow Us:
    ๐Ÿ”— Website: https://cybercrimejunkies.com
    ๐Ÿ“ฑ X/Twitter: https://x.com/CybercrimeJunky
    ๐Ÿ“ธ Instagram: https://www.instagram.com/cybercrimejunkies/

    Want to help us out? Leave us a 5-Star review on Apple Podcast Reviews.
    Listen to Our Podcast:
    ๐ŸŽ™๏ธ Apple Podcasts: https://podcasts.apple.com/us/podcast/cyber-crime-junkies/id1633932941
    ๐ŸŽ™๏ธ Spotify: https://open.spotify.com/show/5y4U2v51gztlenr8TJ2LJs?si=537680ec262545b3
    ๐ŸŽ™๏ธ Google Podcasts: http://www.youtube.com/@cybercrimejunkiespodcast

    Join the Conversation: ๐Ÿ’ฌ Leave your comments and questions. TEXT THE LINK ABOVE . We'd love to hear your thoughts and suggestions for future episodes!

  • NEW! Text Us Direct Here!

    Mishaal Khan, Best-selling Author of The Phantom CISO, Founder of Operation Privacy, and vCISO at Mindsight, joins David Mauro to discuss: how to keep your digital footprint safe, how to improve your digital hygiene, and how everyone is responsible for cyber security.

    https://www.phantomciso.com/

    https://www.operationprivacy.com/

    Accelerate your CMMC 2.0 compliance and address federal zero-trust requirements with Kiteworks' universal, secure file sharing platform made for every organization, and helpful to defense contractors.

    Visit kiteworks.com to get started. 

    We're thrilled to introduce Season 5 Cyber Flash Points to show what latest tech news means to online safety with short stories helping spread security awareness and the importance of online privacy protection.

    "Cyber Flash Points" โ€“ your go-to source for practical and concise summaries.

    So, tune in and welcome to "Cyber Flash Pointsโ€

    ๐ŸŽง Subscribe now http://www.youtube.com/@cybercrimejunkiespodcast and never miss an episode!

    Follow Us:
    ๐Ÿ”— Website: https://cybercrimejunkies.com
    ๐Ÿ“ฑ X/Twitter: https://x.com/CybercrimeJunky
    ๐Ÿ“ธ Instagram: https://www.instagram.com/cybercrimejunkies/

    Want to help us out? Leave us a 5-Star review on Apple Podcast Reviews.
    Listen to Our Podcast:
    ๐ŸŽ™๏ธ Apple Podcasts: https://podcasts.apple.com/us/podcast/cyber-crime-junkies/id1633932941
    ๐ŸŽ™๏ธ Spotify: https://open.spotify.com/show/5y4U2v51gztlenr8TJ2LJs?si=537680ec262545b3
    ๐ŸŽ™๏ธ Google Podcasts: http://www.youtube.com/@cybercrimejunkiespodcast

    Join the Conversation: ๐Ÿ’ฌ Leave your comments and questions. TEXT THE LINK ABOVE . We'd love to hear your thoughts and suggestions for future episodes!

  • NEW! Text Us Direct Here!

    Kurt Long, founder and CEO of a privacy-based messaging app BUNKR (https://www.bunkr.life/) join David Mauro to discuss: how civil discourse helps our country, Newest Ways To Take Control Over Data Privacy, and why protecting online privacy is important.

    Summary
    The conversation explores the topics of data privacy, government surveillance, and underreporting of crimes. Kurt Long, CEO of Bunker and an expert in privacy and information security, discusses the risks associated with leaving a digital footprint and the increasing power of governments in surveillance.

    He highlights the non-enforcement of laws and under-reporting of crimes by global governments, putting citizens at risk. The conversation also touches on the balance between privacy and surveillance, the impact of uncontrolled immigration, and the need for civil discourse and transparency in government actions.

    The conversation explores the correlation between underreported crime and the development of technology solutions. It delves into the challenges faced by law enforcement agencies in infiltrating criminal activities and how the tech industry has responded by creating encrypted and private platforms. The discussion also highlights the rise of cybercrime on platforms like the dark web and the importance of valuing personal privacy.

    The need for enforcement of existing laws and regulations, especially in areas like data privacy and security, is emphasized. The conversation concludes with practical best practices for individuals, including password management, reducing attack surfaces, and using secure communication tools.

    Accelerate your CMMC 2.0 compliance and address federal zero-trust requirements with Kiteworks' universal, secure file sharing platform made for every organization, and helpful to defense contractors.

    Visit kiteworks.com to get started. 

    We're thrilled to introduce Season 5 Cyber Flash Points to show what latest tech news means to online safety with short stories helping spread security awareness and the importance of online privacy protection.

    "Cyber Flash Points" โ€“ your go-to source for practical and concise summaries.

    So, tune in and welcome to "Cyber Flash Pointsโ€

    ๐ŸŽง Subscribe now http://www.youtube.com/@cybercrimejunkiespodcast and never miss an episode!

    Follow Us:
    ๐Ÿ”— Website: https://cybercrimejunkies.com
    ๐Ÿ“ฑ X/Twitter: https://x.com/CybercrimeJunky
    ๐Ÿ“ธ Instagram: https://www.instagram.com/cybercrimejunkies/

    Want to help us out? Leave us a 5-Star review on Apple Podcast Reviews.
    Listen to Our Podcast:
    ๐ŸŽ™๏ธ Apple Podcasts: https://podcasts.apple.com/us/podcast/cyber-crime-junkies/id1633932941
    ๐ŸŽ™๏ธ Spotify: https://open.spotify.com/show/5y4U2v51gztlenr8TJ2LJs?si=537680ec262545b3
    ๐ŸŽ™๏ธ Google Podcasts: http://www.youtube.com/@cybercrimejunkiespodcast

    Join the Conversation: ๐Ÿ’ฌ Leave your comments and questions. TEXT THE LINK ABOVE . We'd love to hear your thoughts and suggestions for future episodes!

  • NEW! Text Us Direct Here!

    We're thrilled to introduce Season 5 Cyber Flash Points to show what latest tech news means to online safety with short stories helping spread security awareness and the importance of online privacy protection.

    A fresh, exciting twist to our podcast this season! "Cyber Flash Points" โ€“ your go-to source for practical and concise summaries.

    So, tune in, stay secure, and enjoy our new bite-sized practical segments

    Welcome to the future of cyber awareness and news โ€“ welcome to season 5 of CCJ and welcome to "Cyber Flash Pointsโ€

    Hey before you go did you know over 80% of our YT viewers do not subscribe? What is the deal with that?! Itโ€™s free. We donโ€™t sell your data, contact you or spam you, so do us a very important favor and SUBSCRIBE to our YouTube channel @CyberCrimeJunkiesPodcast: http://www.youtube.com/@cybercrimejunkiespodcast

    Accelerate your CMMC 2.0 compliance and address federal zero-trust requirements with Kiteworks' universal, secure file sharing platform made for every organization, and helpful to defense contractors.

    Visit kiteworks.com to get started. 

    ๐ŸŽง Subscribe now http://www.youtube.com/@cybercrimejunkiespodcast and never miss an episode!

    Follow Us:
    ๐Ÿ”— Website: https://cybercrimejunkies.com
    ๐Ÿ“ฑ X/Twitter: https://x.com/CybercrimeJunky
    ๐Ÿ“ธ Instagram: https://www.instagram.com/cybercrimejunkies/

    Want to help us out? Leave us a 5-Star review on Apple Podcast Reviews.
    Listen to Our Podcast:
    ๐ŸŽ™๏ธ Apple Podcasts: https://podcasts.apple.com/us/podcast/cyber-crime-junkies/id1633932941
    ๐ŸŽ™๏ธ Spotify: https://open.spotify.com/show/5y4U2v51gztlenr8TJ2LJs?si=537680ec262545b3
    ๐ŸŽ™๏ธ Google Podcasts: http://www.youtube.com/@cybercrimejunkiespodcast

    Join the Conversation: ๐Ÿ’ฌ Leave your comments and questions. TEXT THE LINK ABOVE . We'd love to hear your thoughts and suggestions for future episodes!

  • NEW! Text Us Direct Here!

    David Mauro interviews Merry Marwig, a data privacy advocate, and Jeff Jockisch, founder of Obscure IQ, about how data brokers work and how to delete your data by discussing the intersection of privacy and personal data. They discuss the role of data brokers, the lack of transparency in data collection, and the potential risks of AI and deepfake technology.

    Accelerate your CMMC 2.0 compliance and address federal zero-trust requirements with Kiteworks' universal, secure file sharing platform made for every organization, and helpful to defense contractors.

    Visit kiteworks.com to get started. 

    We're thrilled to introduce Season 5 Cyber Flash Points to show what latest tech news means to online safety with short stories helping spread security awareness and the importance of online privacy protection.

    "Cyber Flash Points" โ€“ your go-to source for practical and concise summaries.

    So, tune in and welcome to "Cyber Flash Pointsโ€

    ๐ŸŽง Subscribe now http://www.youtube.com/@cybercrimejunkiespodcast and never miss an episode!

    Follow Us:
    ๐Ÿ”— Website: https://cybercrimejunkies.com
    ๐Ÿ“ฑ X/Twitter: https://x.com/CybercrimeJunky
    ๐Ÿ“ธ Instagram: https://www.instagram.com/cybercrimejunkies/

    Want to help us out? Leave us a 5-Star review on Apple Podcast Reviews.
    Listen to Our Podcast:
    ๐ŸŽ™๏ธ Apple Podcasts: https://podcasts.apple.com/us/podcast/cyber-crime-junkies/id1633932941
    ๐ŸŽ™๏ธ Spotify: https://open.spotify.com/show/5y4U2v51gztlenr8TJ2LJs?si=537680ec262545b3
    ๐ŸŽ™๏ธ Google Podcasts: http://www.youtube.com/@cybercrimejunkiespodcast

    Join the Conversation: ๐Ÿ’ฌ Leave your comments and questions. TEXT THE LINK ABOVE . We'd love to hear your thoughts and suggestions for future episodes!

  • NEW! Text Us Direct Here!

    The Williams Woods Story. What Happens when Your Identity is Stolen.
    Video Episode: https://youtu.be/mBU3J-4vKww

    Accelerate your CMMC 2.0 compliance and address federal zero-trust requirements with Kiteworks' universal, secure file sharing platform made for every organization, and helpful to defense contractors.

    Visit kiteworks.com to get started. 

    We're thrilled to introduce Season 5 Cyber Flash Points to show what latest tech news means to online safety with short stories helping spread security awareness and the importance of online privacy protection.

    "Cyber Flash Points" โ€“ your go-to source for practical and concise summaries.

    So, tune in and welcome to "Cyber Flash Pointsโ€

    ๐ŸŽง Subscribe now http://www.youtube.com/@cybercrimejunkiespodcast and never miss an episode!

    Follow Us:
    ๐Ÿ”— Website: https://cybercrimejunkies.com
    ๐Ÿ“ฑ X/Twitter: https://x.com/CybercrimeJunky
    ๐Ÿ“ธ Instagram: https://www.instagram.com/cybercrimejunkies/

    Want to help us out? Leave us a 5-Star review on Apple Podcast Reviews.
    Listen to Our Podcast:
    ๐ŸŽ™๏ธ Apple Podcasts: https://podcasts.apple.com/us/podcast/cyber-crime-junkies/id1633932941
    ๐ŸŽ™๏ธ Spotify: https://open.spotify.com/show/5y4U2v51gztlenr8TJ2LJs?si=537680ec262545b3
    ๐ŸŽ™๏ธ Google Podcasts: http://www.youtube.com/@cybercrimejunkiespodcast

    Join the Conversation: ๐Ÿ’ฌ Leave your comments and questions. TEXT THE LINK ABOVE . We'd love to hear your thoughts and suggestions for future episodes!

  • NEW! Text Us Direct Here!

    Catch the Video episode: https://youtu.be/zMNsjSGT-yw

    Aaron Painter, former global executive at Microsoft, discusses the rising risks of deepfakes, how deep fake videos increase security risks, and how mobile-based identity verification helps like the new company he founded called Nametag.

    In this story David Mauro interviews Aaron and discusses identity verification challenges. We discuss how to reduce risk from multi factor authentication, explore mobile-based identity verification as well as how cryptography reduces cyber risk. This episode is a guide for how to reduce risk from multi factor authentication. See what Aaronโ€™s new company NAMETAG can do for your companyโ€™s security at https://getnametag.com/

    Accelerate your CMMC 2.0 compliance and address federal zero-trust requirements with Kiteworks' universal, secure file sharing platform made for every organization, and helpful to defense contractors.

    Visit kiteworks.com to get started. 

    We're thrilled to introduce Season 5 Cyber Flash Points to show what latest tech news means to online safety with short stories helping spread security awareness and the importance of online privacy protection.

    "Cyber Flash Points" โ€“ your go-to source for practical and concise summaries.

    So, tune in and welcome to "Cyber Flash Pointsโ€

    ๐ŸŽง Subscribe now http://www.youtube.com/@cybercrimejunkiespodcast and never miss an episode!

    Follow Us:
    ๐Ÿ”— Website: https://cybercrimejunkies.com
    ๐Ÿ“ฑ X/Twitter: https://x.com/CybercrimeJunky
    ๐Ÿ“ธ Instagram: https://www.instagram.com/cybercrimejunkies/

    Want to help us out? Leave us a 5-Star review on Apple Podcast Reviews.
    Listen to Our Podcast:
    ๐ŸŽ™๏ธ Apple Podcasts: https://podcasts.apple.com/us/podcast/cyber-crime-junkies/id1633932941
    ๐ŸŽ™๏ธ Spotify: https://open.spotify.com/show/5y4U2v51gztlenr8TJ2LJs?si=537680ec262545b3
    ๐ŸŽ™๏ธ Google Podcasts: http://www.youtube.com/@cybercrimejunkiespodcast

    Join the Conversation: ๐Ÿ’ฌ Leave your comments and questions. TEXT THE LINK ABOVE . We'd love to hear your thoughts and suggestions for future episodes!

  • NEW! Text Us Direct Here!

    Many leaders have concerns about employees using AI safely. We explain how to do so in this video. Today we sit with Bill Kleyman-founder of Apolo.us, a pioneer and leader in the space about his efforts for the safe use AI and how to reduce risks with employee use of AI.

    This is the story of Bill Kleyman and how AI can be used for good
    Find more here: https://www.apolo.us/

    Accelerate your CMMC 2.0 compliance and address federal zero-trust requirements with Kiteworks' universal, secure file sharing platform made for every organization, and helpful to defense contractors.

    Visit kiteworks.com to get started. 

    We're thrilled to introduce Season 5 Cyber Flash Points to show what latest tech news means to online safety with short stories helping spread security awareness and the importance of online privacy protection.

    "Cyber Flash Points" โ€“ your go-to source for practical and concise summaries.

    So, tune in and welcome to "Cyber Flash Pointsโ€

    ๐ŸŽง Subscribe now http://www.youtube.com/@cybercrimejunkiespodcast and never miss an episode!

    Follow Us:
    ๐Ÿ”— Website: https://cybercrimejunkies.com
    ๐Ÿ“ฑ X/Twitter: https://x.com/CybercrimeJunky
    ๐Ÿ“ธ Instagram: https://www.instagram.com/cybercrimejunkies/

    Want to help us out? Leave us a 5-Star review on Apple Podcast Reviews.
    Listen to Our Podcast:
    ๐ŸŽ™๏ธ Apple Podcasts: https://podcasts.apple.com/us/podcast/cyber-crime-junkies/id1633932941
    ๐ŸŽ™๏ธ Spotify: https://open.spotify.com/show/5y4U2v51gztlenr8TJ2LJs?si=537680ec262545b3
    ๐ŸŽ™๏ธ Google Podcasts: http://www.youtube.com/@cybercrimejunkiespodcast

    Join the Conversation: ๐Ÿ’ฌ Leave your comments and questions. TEXT THE LINK ABOVE . We'd love to hear your thoughts and suggestions for future episodes!

  • NEW! Text Us Direct Here!

    How Equality Is Addressed in Cyber Security Field. We talk head-on about how equality is addressed in cyber security field. We address:, inequality in cyber security, ways to stop bias in cyber security, and the glass ceiling in cyber security. Lynn Dohm, head of Women in Cyber Security (WiCyS) and one of the top women in cyber security, joins us.

    Come learn benefits of attending security conferences, best ways to keep up to date on security news, and ways to stop bias in cyber security.

    Lynn DOHM https://www.linkedin.com/in/lynndohm/

    Accelerate your CMMC 2.0 compliance and address federal zero-trust requirements with Kiteworks' universal, secure file sharing platform made for every organization, and helpful to defense contractors.

    Visit kiteworks.com to get started. 

    We're thrilled to introduce Season 5 Cyber Flash Points to show what latest tech news means to online safety with short stories helping spread security awareness and the importance of online privacy protection.

    "Cyber Flash Points" โ€“ your go-to source for practical and concise summaries.

    So, tune in and welcome to "Cyber Flash Pointsโ€

    ๐ŸŽง Subscribe now http://www.youtube.com/@cybercrimejunkiespodcast and never miss an episode!

    Follow Us:
    ๐Ÿ”— Website: https://cybercrimejunkies.com
    ๐Ÿ“ฑ X/Twitter: https://x.com/CybercrimeJunky
    ๐Ÿ“ธ Instagram: https://www.instagram.com/cybercrimejunkies/

    Want to help us out? Leave us a 5-Star review on Apple Podcast Reviews.
    Listen to Our Podcast:
    ๐ŸŽ™๏ธ Apple Podcasts: https://podcasts.apple.com/us/podcast/cyber-crime-junkies/id1633932941
    ๐ŸŽ™๏ธ Spotify: https://open.spotify.com/show/5y4U2v51gztlenr8TJ2LJs?si=537680ec262545b3
    ๐ŸŽ™๏ธ Google Podcasts: http://www.youtube.com/@cybercrimejunkiespodcast

    Join the Conversation: ๐Ÿ’ฌ Leave your comments and questions. TEXT THE LINK ABOVE . We'd love to hear your thoughts and suggestions for future episodes!

  • NEW! Text Us Direct Here!

    Video Episode: https://youtu.be/oH7FpvHOhVA

    This is the story of Matt Smallman, author of โ€œUnlocking Your Call Centreโ€, about how call centers can be security risks. Our discussion gives exclusive insight into how biometrics fail in security, problems with voice authentication and explore military tactics and biometrics.

    We explore how to balance convenience with security, how to protect call centers from social engineering and ways to reduce cyber security risks in call centers without compromising the customer experience.

    Accelerate your CMMC 2.0 compliance and address federal zero-trust requirements with Kiteworks' universal, secure file sharing platform made for every organization, and helpful to defense contractors.

    Visit kiteworks.com to get started. 

    We're thrilled to introduce Season 5 Cyber Flash Points to show what latest tech news means to online safety with short stories helping spread security awareness and the importance of online privacy protection.

    "Cyber Flash Points" โ€“ your go-to source for practical and concise summaries.

    So, tune in and welcome to "Cyber Flash Pointsโ€

    ๐ŸŽง Subscribe now http://www.youtube.com/@cybercrimejunkiespodcast and never miss an episode!

    Follow Us:
    ๐Ÿ”— Website: https://cybercrimejunkies.com
    ๐Ÿ“ฑ X/Twitter: https://x.com/CybercrimeJunky
    ๐Ÿ“ธ Instagram: https://www.instagram.com/cybercrimejunkies/

    Want to help us out? Leave us a 5-Star review on Apple Podcast Reviews.
    Listen to Our Podcast:
    ๐ŸŽ™๏ธ Apple Podcasts: https://podcasts.apple.com/us/podcast/cyber-crime-junkies/id1633932941
    ๐ŸŽ™๏ธ Spotify: https://open.spotify.com/show/5y4U2v51gztlenr8TJ2LJs?si=537680ec262545b3
    ๐ŸŽ™๏ธ Google Podcasts: http://www.youtube.com/@cybercrimejunkiespodcast

    Join the Conversation: ๐Ÿ’ฌ Leave your comments and questions. TEXT THE LINK ABOVE . We'd love to hear your thoughts and suggestions for future episodes!

  • NEW! Text Us Direct Here!

    Richard Hollis of Risk Crew in London joins Cyber Crime Junkies studio discussing key topics: why cybersecurity efforts usually fail and customers or enemies online.

    Video episode: https://youtu.be/QQ8l1PaDaUI

    Topics:
    ๐Ÿ’กhow cybersecurity efforts usually fail,
    ๐Ÿ’กcustomers or enemies online
    ๐Ÿ’กbest practices for businesses to limit cyber liability,
    ๐Ÿ’กnew ways to protect business from cyber crime,
    ๐Ÿ’กnewest methods to limit cyber liability,
    ๐Ÿ’กnewest security expert insight

    Accelerate your CMMC 2.0 compliance and address federal zero-trust requirements with Kiteworks' universal, secure file sharing platform made for every organization, and helpful to defense contractors.

    Visit kiteworks.com to get started. 

    We're thrilled to introduce Season 5 Cyber Flash Points to show what latest tech news means to online safety with short stories helping spread security awareness and the importance of online privacy protection.

    "Cyber Flash Points" โ€“ your go-to source for practical and concise summaries.

    So, tune in and welcome to "Cyber Flash Pointsโ€

    ๐ŸŽง Subscribe now http://www.youtube.com/@cybercrimejunkiespodcast and never miss an episode!

    Follow Us:
    ๐Ÿ”— Website: https://cybercrimejunkies.com
    ๐Ÿ“ฑ X/Twitter: https://x.com/CybercrimeJunky
    ๐Ÿ“ธ Instagram: https://www.instagram.com/cybercrimejunkies/

    Want to help us out? Leave us a 5-Star review on Apple Podcast Reviews.
    Listen to Our Podcast:
    ๐ŸŽ™๏ธ Apple Podcasts: https://podcasts.apple.com/us/podcast/cyber-crime-junkies/id1633932941
    ๐ŸŽ™๏ธ Spotify: https://open.spotify.com/show/5y4U2v51gztlenr8TJ2LJs?si=537680ec262545b3
    ๐ŸŽ™๏ธ Google Podcasts: http://www.youtube.com/@cybercrimejunkiespodcast

    Join the Conversation: ๐Ÿ’ฌ Leave your comments and questions. TEXT THE LINK ABOVE . We'd love to hear your thoughts and suggestions for future episodes!

  • NEW! Text Us Direct Here!

    Don't miss the video interview for details: https://youtu.be/-G7hbLGDK9o

    Steve Orrin, Federal CTO for Intel, discusses secrets inside zero trust and r latest cyber security concerns. He is a recognized security leader and public speaker. Steve has orchestrated projects for federal government agencies on Security and AI. Steve is a key advisor in emerging technologies to the Public Sector, Defense, and Intelligence communities.

    Key topics: latest cyber security concerns, Global Cyber Security Strategy, zero trust small business and national security, zero trust and national security, zero trust in critical infrastructure, zero trust in supply chain, zero trust in small business, secrets inside zero trust, how us cyber security strategy effects allies, driving change in cyber security today, zero trust in cyber security today


    For more: CyberCrimeJunkies


    Accelerate your CMMC 2.0 compliance and address federal zero-trust requirements with Kiteworks' universal, secure file sharing platform made for every organization, and helpful to defense contractors.

    Visit kiteworks.com to get started. 

    We're thrilled to introduce Season 5 Cyber Flash Points to show what latest tech news means to online safety with short stories helping spread security awareness and the importance of online privacy protection.

    "Cyber Flash Points" โ€“ your go-to source for practical and concise summaries.

    So, tune in and welcome to "Cyber Flash Pointsโ€

    ๐ŸŽง Subscribe now http://www.youtube.com/@cybercrimejunkiespodcast and never miss an episode!

    Follow Us:
    ๐Ÿ”— Website: https://cybercrimejunkies.com
    ๐Ÿ“ฑ X/Twitter: https://x.com/CybercrimeJunky
    ๐Ÿ“ธ Instagram: https://www.instagram.com/cybercrimejunkies/

    Want to help us out? Leave us a 5-Star review on Apple Podcast Reviews.
    Listen to Our Podcast:
    ๐ŸŽ™๏ธ Apple Podcasts: https://podcasts.apple.com/us/podcast/cyber-crime-junkies/id1633932941
    ๐ŸŽ™๏ธ Spotify: https://open.spotify.com/show/5y4U2v51gztlenr8TJ2LJs?si=537680ec262545b3
    ๐ŸŽ™๏ธ Google Podcasts: http://www.youtube.com/@cybercrimejunkiespodcast

    Join the Conversation: ๐Ÿ’ฌ Leave your comments and questions. TEXT THE LINK ABOVE . We'd love to hear your thoughts and suggestions for future episodes!

  • NEW! Text Us Direct Here!

    Sam Buckenmaier, a senior cyber leader, join us on what leadership means today and what employers want in cybersecurity.


    We discussed: new approaches to enter the cybersecurity field, how to have effective communication internally in business, advice on cybersecurity careers from top recruiters, approaches to enter cybersecurity, and best practices for leveraging LinkedIn for your personal brand.

    ๐Ÿ”” Site, Research and Direct contact with Podcast team: https://cybercrimejunkies.com


    Accelerate your CMMC 2.0 compliance and address federal zero-trust requirements with Kiteworks' universal, secure file sharing platform made for every organization, and helpful to defense contractors.

    Visit kiteworks.com to get started. 

    We're thrilled to introduce Season 5 Cyber Flash Points to show what latest tech news means to online safety with short stories helping spread security awareness and the importance of online privacy protection.

    "Cyber Flash Points" โ€“ your go-to source for practical and concise summaries.

    So, tune in and welcome to "Cyber Flash Pointsโ€

    ๐ŸŽง Subscribe now http://www.youtube.com/@cybercrimejunkiespodcast and never miss an episode!

    Follow Us:
    ๐Ÿ”— Website: https://cybercrimejunkies.com
    ๐Ÿ“ฑ X/Twitter: https://x.com/CybercrimeJunky
    ๐Ÿ“ธ Instagram: https://www.instagram.com/cybercrimejunkies/

    Want to help us out? Leave us a 5-Star review on Apple Podcast Reviews.
    Listen to Our Podcast:
    ๐ŸŽ™๏ธ Apple Podcasts: https://podcasts.apple.com/us/podcast/cyber-crime-junkies/id1633932941
    ๐ŸŽ™๏ธ Spotify: https://open.spotify.com/show/5y4U2v51gztlenr8TJ2LJs?si=537680ec262545b3
    ๐ŸŽ™๏ธ Google Podcasts: http://www.youtube.com/@cybercrimejunkiespodcast

    Join the Conversation: ๐Ÿ’ฌ Leave your comments and questions. TEXT THE LINK ABOVE . We'd love to hear your thoughts and suggestions for future episodes!

  • NEW! Text Us Direct Here!

    What we all need to know about How Psychology Affects Security. Psychology of Online Security. Topics:

    behind scenes cyber criminals, best ways to protect business from cyber crime, cyber crime gang discussions, exposing cyber crime gangs, exposing secrets of cyber crime gangs, how can we spot fraud in business, how to limit liability from data breach, new insight on true cyber crime examples, risk and brand protection

    We wanted to explore in todayโ€™s episode what makes them tick. Why is it some organizations are only in the news for new products that they launch, people that they save or a new location that theyโ€™re opening. All positive things. But other organizations are in the news for reputation damaging data breach.

    Today we are going to explore the mind of a hacker and reset expectations of the language that we use. Hackers are not evil in fact there are several different types of hackers. Hackers are engineers and people that figure out how things work. Without them we wouldnโ€™t have some of the greatest inventions and protections that we all take for granted every day.

    Accelerate your CMMC 2.0 compliance and address federal zero-trust requirements with Kiteworks' universal, secure file sharing platform made for every organization, and helpful to defense contractors.

    Visit kiteworks.com to get started. 

    We're thrilled to introduce Season 5 Cyber Flash Points to show what latest tech news means to online safety with short stories helping spread security awareness and the importance of online privacy protection.

    "Cyber Flash Points" โ€“ your go-to source for practical and concise summaries.

    So, tune in and welcome to "Cyber Flash Pointsโ€

    ๐ŸŽง Subscribe now http://www.youtube.com/@cybercrimejunkiespodcast and never miss an episode!

    Follow Us:
    ๐Ÿ”— Website: https://cybercrimejunkies.com
    ๐Ÿ“ฑ X/Twitter: https://x.com/CybercrimeJunky
    ๐Ÿ“ธ Instagram: https://www.instagram.com/cybercrimejunkies/

    Want to help us out? Leave us a 5-Star review on Apple Podcast Reviews.
    Listen to Our Podcast:
    ๐ŸŽ™๏ธ Apple Podcasts: https://podcasts.apple.com/us/podcast/cyber-crime-junkies/id1633932941
    ๐ŸŽ™๏ธ Spotify: https://open.spotify.com/show/5y4U2v51gztlenr8TJ2LJs?si=537680ec262545b3
    ๐ŸŽ™๏ธ Google Podcasts: http://www.youtube.com/@cybercrimejunkiespodcast

    Join the Conversation: ๐Ÿ’ฌ Leave your comments and questions. TEXT THE LINK ABOVE . We'd love to hear your thoughts and suggestions for future episodes!

  • NEW! Text Us Direct Here!

    Video Episode here!

    Jon DiMaggio, Senior Security Strategist with https://analyst1.com and former NSA analyst, author of The Art of Cyber Warfare (https://a.co/d/72qKbc4) joins us for an exclusive discussion on the cyber crime take down story of LOCKBIT.

    Chapters

    00:00 Introduction and Background08:10 Financial Aspects of Ransomware Operations24:33 Technical Skills and Criminal Intent39:46 The Self-Convening Justice System in the Criminal Underground48:31 The Importance of Effective Communication in Cybersecurity

    Accelerate your CMMC 2.0 compliance and address federal zero-trust requirements with Kiteworks' universal, secure file sharing platform made for every organization, and helpful to defense contractors.

    Visit kiteworks.com to get started. 

    We're thrilled to introduce Season 5 Cyber Flash Points to show what latest tech news means to online safety with short stories helping spread security awareness and the importance of online privacy protection.

    "Cyber Flash Points" โ€“ your go-to source for practical and concise summaries.

    So, tune in and welcome to "Cyber Flash Pointsโ€

    ๐ŸŽง Subscribe now http://www.youtube.com/@cybercrimejunkiespodcast and never miss an episode!

    Follow Us:
    ๐Ÿ”— Website: https://cybercrimejunkies.com
    ๐Ÿ“ฑ X/Twitter: https://x.com/CybercrimeJunky
    ๐Ÿ“ธ Instagram: https://www.instagram.com/cybercrimejunkies/

    Want to help us out? Leave us a 5-Star review on Apple Podcast Reviews.
    Listen to Our Podcast:
    ๐ŸŽ™๏ธ Apple Podcasts: https://podcasts.apple.com/us/podcast/cyber-crime-junkies/id1633932941
    ๐ŸŽ™๏ธ Spotify: https://open.spotify.com/show/5y4U2v51gztlenr8TJ2LJs?si=537680ec262545b3
    ๐ŸŽ™๏ธ Google Podcasts: http://www.youtube.com/@cybercrimejunkiespodcast

    Join the Conversation: ๐Ÿ’ฌ Leave your comments and questions. TEXT THE LINK ABOVE . We'd love to hear your thoughts and suggestions for future episodes!

  • NEW! Text Us Direct Here!

    Experts Nick Mullen and Nick Oles discuss artificial intelligence and the impact of ai on business cyber risk. They share their personal stories of how they got into the field and highlight the importance of understanding the analogies between physical and cybersecurity controls.

    Nick Oles is author of How to Catch a Phish [email protected] https://thenetdefender.com/

    Nick Mullen is a CISSP, CCSP, PMP and Principal, at Sanguine Security Solutions.

    Chapters

    2:20 The Evolution of Deepfake Technology10:03 Breaking into Cyber for other fields. Origin Stories.33:16 Training Employees to Recognize and Respond to Deepfake Attacks42:11 Preventing Cyber Attacks: Key Practices46:45 Training Employees to Detect Phishing Emails53:24 Understanding the Human Attack Surface

    Key Topics: impact of ai on business cyber risk, how ai powered social engineering affects you, social impact of artificial intelligence, social engineering risks from new ai, how ai

    Accelerate your CMMC 2.0 compliance and address federal zero-trust requirements with Kiteworks' universal, secure file sharing platform made for every organization, and helpful to defense contractors.

    Visit kiteworks.com to get started. 

    We're thrilled to introduce Season 5 Cyber Flash Points to show what latest tech news means to online safety with short stories helping spread security awareness and the importance of online privacy protection.

    "Cyber Flash Points" โ€“ your go-to source for practical and concise summaries.

    So, tune in and welcome to "Cyber Flash Pointsโ€

    ๐ŸŽง Subscribe now http://www.youtube.com/@cybercrimejunkiespodcast and never miss an episode!

    Follow Us:
    ๐Ÿ”— Website: https://cybercrimejunkies.com
    ๐Ÿ“ฑ X/Twitter: https://x.com/CybercrimeJunky
    ๐Ÿ“ธ Instagram: https://www.instagram.com/cybercrimejunkies/

    Want to help us out? Leave us a 5-Star review on Apple Podcast Reviews.
    Listen to Our Podcast:
    ๐ŸŽ™๏ธ Apple Podcasts: https://podcasts.apple.com/us/podcast/cyber-crime-junkies/id1633932941
    ๐ŸŽ™๏ธ Spotify: https://open.spotify.com/show/5y4U2v51gztlenr8TJ2LJs?si=537680ec262545b3
    ๐ŸŽ™๏ธ Google Podcasts: http://www.youtube.com/@cybercrimejunkiespodcast

    Join the Conversation: ๐Ÿ’ฌ Leave your comments and questions. TEXT THE LINK ABOVE . We'd love to hear your thoughts and suggestions for future episodes!

  • NEW! Text Us Direct Here!

    After years in the industry, inventing and exploring emerging technologies, Gideon Hazam, Co-Founder, COO and CSM at Memcyco, https://www.memcyco.com/home found a way to solve a problem outside the normal cybersecurity approaches. He joins us behind the scenes to discuss innovative ways to reduce website spoofing.

    Key Topics:

    new ways to reduce cyber risks in financial institutions,ways to prevent account take overs,innovative ways to reduce website spoofing, latest types of phishing, dangers of website spoofing, social engineering attacks against financial institutions,

    Chapters

    01:09 The Importance of Brand Protection04:01 The Impact of COVID-19 on Cybercrime06:28 Methods of Website Spoofing08:37 Account Takeover and Phishing09:30 Current Solutions and Challenges20:13 Expanding to Other Industries24:38 Alerting the Original Brand and Customers26:19 Real-Time Detection of Spoofed Sites27:46 Customer Alerts and Integration with Security Operations Centers30:51 Introduction to Memsico and its Integration with Risk and Fraud33:25 Challenges Faced by Organizations in Impersonation Attacks35:38 Focus on Brand Reputation and Customer Trust36:34 The Need for Protection Against Spoofing Attacks46:15 Marking and Tracing Stolen Credentials48:04 Uniqueness of Memsico an

    Accelerate your CMMC 2.0 compliance and address federal zero-trust requirements with Kiteworks' universal, secure file sharing platform made for every organization, and helpful to defense contractors.

    Visit kiteworks.com to get started. 

    We're thrilled to introduce Season 5 Cyber Flash Points to show what latest tech news means to online safety with short stories helping spread security awareness and the importance of online privacy protection.

    "Cyber Flash Points" โ€“ your go-to source for practical and concise summaries.

    So, tune in and welcome to "Cyber Flash Pointsโ€

    ๐ŸŽง Subscribe now http://www.youtube.com/@cybercrimejunkiespodcast and never miss an episode!

    Follow Us:
    ๐Ÿ”— Website: https://cybercrimejunkies.com
    ๐Ÿ“ฑ X/Twitter: https://x.com/CybercrimeJunky
    ๐Ÿ“ธ Instagram: https://www.instagram.com/cybercrimejunkies/

    Want to help us out? Leave us a 5-Star review on Apple Podcast Reviews.
    Listen to Our Podcast:
    ๐ŸŽ™๏ธ Apple Podcasts: https://podcasts.apple.com/us/podcast/cyber-crime-junkies/id1633932941
    ๐ŸŽ™๏ธ Spotify: https://open.spotify.com/show/5y4U2v51gztlenr8TJ2LJs?si=537680ec262545b3
    ๐ŸŽ™๏ธ Google Podcasts: http://www.youtube.com/@cybercrimejunkiespodcast

    Join the Conversation: ๐Ÿ’ฌ Leave your comments and questions. TEXT THE LINK ABOVE . We'd love to hear your thoughts and suggestions for future episodes!

  • NEW! Text Us Direct Here!

    The US has signed into new law the Ban of Tik Tok effective in January. What does this mean?

    Topics: US Tik Tok ban. What to know, online privacy andTik Tok, national security risks from social media, identity protection in light of TikTok, why social media platforms are national security risks, why social media platform is a national security threat, how social media platforms are security risks, laws on social media national security, and national security versus social media.

    Accelerate your CMMC 2.0 compliance and address federal zero-trust requirements with Kiteworks' universal, secure file sharing platform made for every organization, and helpful to defense contractors.

    Visit kiteworks.com to get started. 

    ๐ŸŽง Subscribe now http://www.youtube.com/@cybercrimejunkiespodcast and never miss an episode!

    Follow Us:
    ๐Ÿ”— Website: https://cybercrimejunkies.com
    ๐Ÿ“ฑ X/Twitter: https://x.com/CybercrimeJunky
    ๐Ÿ“ธ Instagram: https://www.instagram.com/cybercrimejunkies/

    Want to help us out? Leave us a 5-Star review on Apple Podcast Reviews.
    Listen to Our Podcast:
    ๐ŸŽ™๏ธ Apple Podcasts: https://podcasts.apple.com/us/podcast/cyber-crime-junkies/id1633932941
    ๐ŸŽ™๏ธ Spotify: https://open.spotify.com/show/5y4U2v51gztlenr8TJ2LJs?si=537680ec262545b3
    ๐ŸŽ™๏ธ Google Podcasts: http://www.youtube.com/@cybercrimejunkiespodcast

    Join the Conversation: ๐Ÿ’ฌ Leave your comments and questions. TEXT THE LINK ABOVE . We'd love to hear your thoughts and suggestions for future episodes!