Episodes
James Potter, CEO of DSE, joins us in the studio for great conversation and exclusive insight on The Aftermath of Data Breaches: Navigating Reputational Damage and Protecting Your Brand Image. Reputational Harm from Data Breaches, Cybersecurity Reputation Management and Operational Leadership. Find more on DSE here: https://www.dse.team/ Topics discussed:• Target Breach & Surprises most don't know about• ...
Published 08/30/24
Cyber Flash Point on the following topics: how ransomware kills in real life, latest cyber crime news, top cyber crime news, when ransomware kills in real life, best ways to keep up to date on security news, best ways to protect business from cyber crime, breaking cyber crime news, breaking cyber crime news to know, cyber crime global news today, cyber crime news we all need to know, cyber crime real life cases, cyber security news this w...
Published 08/25/24
Today we discuss how deep fake videos increase security risks. Topics include: artificial intelligence risks in cyber, new ways to reduce risk of deep fakes, how are deep fakes made, how are deep fake videos made, how are audio deep fakes made, and how is ai making it harder to detect deep fakes.TakeawaysSample deepfakes are played. Can you tell? Over 85% of those tested could not.Deepfake technology, created using techniques like GANs, diffusion models, and VAEs, can convincingly subst...
Published 08/23/24
When technology can do everything for us, what is left? Imagination. That is the intrigue in a soon-to-be-released book coming by Dr Lydia Kostopoulos, who holds a PHD in International Relations, Security and Political Science, having attended the Harvard Kennedy school for Cybersecurity. We discuss: Harnessing Emerging Tech: Imagination and AI in Brand Growth, and the Perils of 'Too Big to Fail".· ways to grow brands by adapting to emerging tech,· how ...
Published 08/21/24
Panel discussion with international leaders part of the Silicon Valley Think Tank, Tortora Brayda AI & Cyber Institute Task Force. Find out and join the Think Tank: https://www.tortorabrayda.org/homeChapters00:00 Introduction to the Challenges of Securing Critical Infrastructure03:11 Vulnerabilities and Weaknesses in Critical Infrastructure10:03 Challenges Faced by Small to Mid-Sized Critical Infrastructure Organizations17:05 The Impact of Ransomware Attacks on Critical Infrastructure27:2...
Published 08/17/24
We discuss How ransomware can kill and ways to build security resilience with Chris Loehr, SVP of Solis Security. Send us a textGet peace of mind. Get Competitive-Get NetGain. Contact NetGain today at 844-777-6278 or reach out online at www.NETGAINIT.com Imagine setting yourself apart from the competition because your organization is always secure, always available, and always ahead of the curve. That’s NetGain Technologies – your total one source for cybersecurity, IT suppo...
Published 08/16/24
Today's Cyber Flash Point is about The Dark Side - New Ways AI is used in Social Engineering. We review AI risks in social engineering, How Deep Fake Videos Increase Security Risks, and new ways to reduce risk of deep fakes.Send us a textGet peace of mind. Get Competitive-Get NetGain. Contact NetGain today at 844-777-6278 or reach out online at www.NETGAINIT.com Imagine setting yourself apart from the competition because your organization is always secure, always available, and a...
Published 08/11/24
Rob Black, a security educator and Fractional CISO, joins us to discuss the best ways for quantifying cyber security and why it is crucial for small and medium-sized business owners. David Mauro interviews Rob Black, the founder of Fractional CISO, about his journey in the cybersecurity industry and the challenges faced by medium-sized businesses. They discuss the importance of translating cybersecurity into business terms, the need for internal communication and making the case to leade...
Published 08/11/24
We interview Ron Eddings, CEO of Hacker Valley Media, about his journey into cybersecurity and the Power of Storytelling in Cybersecurity.Send us a textGet peace of mind. Get Competitive-Get NetGain. Contact NetGain today at 844-777-6278 or reach out online at www.NETGAINIT.com Imagine setting yourself apart from the competition because your organization is always secure, always available, and always ahead of the curve. That’s NetGain Technologies – your total one source fo...
Published 08/09/24
Audit Armor: Enhancing Compliance with Security Insights - Featuring Expert Paul Perry. How to Improve Compliance Audits with Security in Mind Paul is a CPA, a Member of the Warren Averett firm and practice leader of the Security, Risk and Controls Group. Paul and his team @ Warren Averett focus on cybersecurity, risk assessments, internal controls & internal for major clients across the globe.We spoke about How to Improve Compliance Audits with Security in Mind.A practi...
Published 08/06/24
Join us as Cody Kretsinger shares his journey from the blind arrogance of youth and dark side of hacking to his evolution into the brilliant, community thought leader and leading-edge cybersecurity provider. It’s a unique perspective on protecting against cybercrime and understanding Modus operandi.Chapters00:00 Introduction to Cybercrime and Hacking07:00 The Thrill of Finding Vulnerabilities13:40 The Role of the NSA in Cybersecurity18:24 The Sony Pictures Hack: Exposing Laughable Secur...
Published 08/03/24
This Cyber Flash Point addresses the question: Do Social Media Companies Protect Children. We review New Laws passed to hold social media companies accountable for protecting children and discuss the YAHOO BOYS. SummaryThe conversation covers two main themes: online privacy protection for children and the use of deepfake technology in financial sextortion scams. The first theme discusses two bills, the Social Media Privacy Protection Act and the Children and Teens Online Privacy Pro...
Published 08/02/24
Cybercrime Junkies Podcast interviews former NATO specialist and international intelligence expert, Nadja El Fertasi, about the role played by emotional intelligence in cyber security and Emotional Intelligence in AI.We discuss emotional firewalls, learning EQ (emotional intelligence) and how it can stop social engineering attacks, how international law enforcement leverages Emotional Intelligence, and how it can be learned and trained.Find more on Nadja here: https://www.thrivewitheq.com/Sen...
Published 08/02/24
We interview Steve Orrin, the CTO of Intel, who essentially make the chips (brains) of most computers on the planet. We discuss these topics: Controlling AI Ethically, how to control AI ethically, what are the ethical considerations of AI, use of AI in cybersecurity, use of AI in cybercrime, deep fakes, zero trust and more. There is a special discussion inside so don't miss it!Send us a textGet peace of mind. Get Competitive-Get NetGain. Contact NetGain today at 844-777-6278 or rea...
Published 08/01/24
Former Spy and intelligence officer, Shawnee Delaney, join us. She is the founder and CEO of Vaillance Group (https://www.vaillancegroup.com) and spent nearly a decade with the Defense Intelligence Agency (DIA) as a decorated Clandestine Services Officer conducting Human Intelligence (HUMINT) operations all over the world. She served four combat zone tours in Iraq and Afghanistan as a Case Officer and Detachment Chief and served as a Supervisory Branch Chief in Europe. Chapters&nbsp...
Published 07/30/24
NEW! Text Us Direct Here!Gabe Gambill, international technology expert with Quorum (https://get.quorum.com/) who leads executives to understand what happens when data back ups fail and how to plan accordingly. SummaryIn this conversation, Dino Mauro interviews Gabe Gimble, Vice President of Products and Technical Operations at Quorum, about his journey into technology and cybersecurity. They discuss the challenges of patching vulnerabilities, the importance of data backup and...
Published 07/28/24
NEW! Text Us Direct Here!Philippe Humeau joins us to discuss new crowdsourcing approaches to security. Phillippe is a former Hacker and Founder of CrowdSec, an crowd-sourced WAZE-Like Security platform. Learn more here: https://crowdsec.netHave a Guest idea or Story for us to Cover? Text Us today. Click the link above and leave your message!You can now text our Podcast Studio direct. Ask questions, suggest guests and stories. We Look Forward To Hearing From You! A word from our Spon...
Published 07/27/24
NEW! Text Us Direct Here!We interview Joseph Brunsman of the Brunsman Group, a thought leader in cybersecurity insurance. They discuss the liability in data breaches and the changes happening in the cybersecurity insurance industry. They also explore the impact of AI on cyber insurance and the importance of accurate application and underwriting processes. The conversation highlights the increasing scrutiny from regulators and the potential personal liability for CEOs and executives. The ...
Published 07/26/24
NEW! Text Us Direct Here!How would you know if a seemingly perfect employee was actually an imposter? Behind this facade was a North Korean operative, a meticulously trained spy. In Cyber Flash Point we cover Breaking News on Insider Threats to US Organizations.Topics: Insider Threats to US Organizations, how to reduce insider threats, top cyber flash points, Insider Threat, how the DRPK uses it workers for cybercrime, common insider risks in security, new types of insider risks in security, ...
Published 07/24/24
NEW! Text Us Direct Here!We discuss true cyber crimes of When Gamers Start Swatting: Violence for Hire Online.Have a Guest idea or Story for us to Cover? Text Us today. Click the link above and leave your message!You can now text our Podcast Studio direct. Ask questions, suggest guests and stories. We Look Forward To Hearing From You! A word from our Sponsor-Kiteworks. Accelerate your CMMC 2.0 compliance and address federal zero-trust requirements with Kiteworks' universal, secure file s...
Published 07/21/24
NEW! Text Us Direct Here!SummaryThis conversation shines a light on the dark web, discussing its purpose, dangers, and what is available on it. It explores the increase in dark web activity and the sale of stolen data, including passwords and personal information. The conversation also delves into the operations of cybercrime gangs and their recruitment of cyber mercenaries. It highlights the role of anonymity and encryption in the dark web and provides cautionary tales of individuals who hav...
Published 07/20/24
NEW! Text Us Direct Here!We Speak with expert, Dr Abbie Marono on cognitive neuroscience, Brain Reactions During Social Engineering. We discuss the science of social engineering, brain reactions during social engineering, and brain reactions during phishing. Find out more about Dr Marono, her research and findings at https://www.abbiemarono.com/ Have a Guest idea or Story for us to Cover? Text Us today. Click the link above and leave your message!You can now text our Podcast Studio ...
Published 07/19/24
NEW! Text Us Direct Here!We explore the motives of cyber criminals, examples of cyber crime gang activities, risks of physical harm from ransomware, understanding cyber crime motive, and why its important to understand cyber crime MO (Modus Operandi). Overview of the MO (Modus Operandi) of REVIL, CONTI, HIVE, DARKSIDE and other ransomware gangs and how they drive their operations. This allows us to better defend ourselves and the organizations brands we serve. Have a Guest idea or S...
Published 07/16/24
NEW! Text Us Direct Here!SummaryThis episode explores the true cybercrime story of Michael Calce, also known as Mafia Boy, who was responsible for taking down major websites like Yahoo, E-Trade, eBay, and more during the dot com bubble. Michael's journey into hacking began when he received his first computer at the age of six and became fascinated with the idea of controlling and commanding it. He joined an elite Russian hacker group called TNT and used their resources to carry out his attack...
Published 07/15/24
NEW! Text Us Direct Here!Crypto News, Cyber flash point about self-proclaimed Bitcoin killer, OneCoin. rise and fall of crypto star FBI most wanted, Ruja Ignatova. To Submit a TIP and Potentially collect the new $5 Million Reward, you can submit a tip online at www.tips.FBI.gov Or Call 1-800-CALL-FBIThe rise and fall of ONE COIN and the hunt for Ruja Ignatova is a story of a massive cryptocurrency Ponzi scheme that attracted over $4 billion in investments. Dr. Ruja Ignatova, the cha...
Published 07/13/24