show episodes
 
Artwork

1
Practical AI

Practical AI LLC

icon
Unsubscribe
icon
Unsubscribe
Monthly+
 
Making artificial intelligence practical, productive & accessible to everyone. Practical AI is a show in which technology professionals, business people, students, enthusiasts, and expert guests engage in lively discussions about Artificial Intelligence and related topics (Machine Learning, Deep Learning, Neural Networks, GANs, MLOps, AIOps, LLMs & more). The focus is on productive implementations and real-world scenarios that are accessible to everyone. If you want to keep up with the lates ...
  continue reading
 
Official Website: https://psysecure.com/podcast/ Welcome to The Lockdown. Privacy doesn’t have to be all-or-nothing. The inability to attain extreme levels of privacy shouldn’t deter one from taking any protective measures at all. The show is hosted by Ray Heffer, an expert in the field of privacy and cybersecurity, with each episode touching on a range of topics such as data privacy, password management, and secure browsing habits. Tin-foil hats are optional!
  continue reading
 
The Expert Podcast brings you firsthand narratives from experts across diverse industries, including private investigators, general contractors and builders, insurance agencies, vehicle specialists, lawyers, and many others.
  continue reading
 
Cybermidnight Club– Hackers, Cyber Security and Cyber Crime is a trailblazing podcast by Alberto Daniel Hill, an expert in cybersecurity and the first person in Uruguay to serve prison for a computer-related crime. A crime he isn’t guilty of, perhaps one which never happened. Join Alberto as he dives deep into the world of hackers and cybersecurity in his riveting podcast. In this series, Alberto provides firsthand insights into the dark web and expert analysis of cybersecurity issues that a ...
  continue reading
 
Cybersecurity guru Steve Gibson joins Leo Laporte every Tuesday. Steve and Leo break down the latest cybercrime and hacking stories, offering a deep understanding of what's happening and how to protect yourself and your business. Security Now is a must listen for security professionals every week. Records live every Tuesday at 4:30pm Eastern / 1:30pm Pacific / 20:30 UTC.
  continue reading
 
Stay ahead of the latest cybersecurity trends with Cyberside Chats—your go-to cybersecurity podcast for breaking news, emerging threats, and actionable solutions. Whether you’re a cybersecurity pro or an executive who wants to understand how to protect your organization, cybersecurity experts Sherri Davidoff and Matt Durrin will help you understand and proactively prepare for today’s top cybersecurity threats, AI-driven attack and defense strategies, and more!
  continue reading
 
Artwork

1
Dirty South Security Podcast

VerSprite Cybersecurity

icon
Unsubscribe
icon
Unsubscribe
Monthly
 
Welcome to the Dirty South Security Podcast! 🌍🔒 Join us as we dive into the hottest takes and latest trends in cybersecurity from around the globe. Whether you're a seasoned professional or just curious about the digital world's inner workings, our podcast offers insightful discussions, expert interviews, and thought-provoking analysis on the most pressing security issues today. Stay ahead of the curve with our no-nonsense approach to all things cybersecurity. Subscribe now and never miss an ...
  continue reading
 
Artwork

1
ThreatCast

Threatscape

icon
Unsubscribe
icon
Unsubscribe
Monthly
 
Stay informed with our exclusive interviews featuring industry experts, who share their valuable insights, expert opinions, and practical strategies to safeguard yourself and your organisation from cyber threats. In each episode, we shed light on cybersecurity trends, emerging technologies, and notable incidents shaping our digital world. Tune in to ThreatCast and embark on a journey to fortify your digital resilience.
  continue reading
 
Sunny’s Silver Linings is a Top MSP Channel Podcast hosted by the CEO of IT By Design, Sunny Kaila. Sunny and his guests cover a wide range of MSP and Talent-based topics, including MSP services, cybersecurity, customer service, and strategies to achieve growth and success in the channel. Listen now to take your business to the next level! https://hubs.ly/Q02DrxnQ0
  continue reading
 
Artwork

1
Cyber Defense Radio

Cyber Defense Magazine

icon
Unsubscribe
icon
Unsubscribe
Monthly+
 
The world's leading cyber security podcast, hosted by Gary Miliefsky, an internationally recognized cybersecurity expert, bestselling author, keynote speaker and Publisher of Cyber Defense Magazine. Gain new insights into cybersecurity from our always free monthy publication, no strings attached. Subscribe here: https://www.cyberdefensemagazine.com/free-subscription/ Hosted by Ausha. See ausha.co/privacy-policy for more information.
  continue reading
 
Artwork

1
CMMC Academy

Armada Cyber Defense LLC

icon
Unsubscribe
icon
Unsubscribe
Weekly+
 
CMMC Academy is a podcast dedicated to helping businesses understand and achieve Cybersecurity Maturity Model Certification (CMMC) compliance. Each episode offers practical insights, expert advice, and the latest updates for organizations supporting the federal government.
  continue reading
 
Stay ahead of cyberthreats with expert insights and practical security . Led by an ensemble cast of industry thought leaderss offering in-depth analysis and practical advice to fortify your organization's defenses.
  continue reading
 
Artwork

1
Shared Security

Tom Eston, Scott Wright, Kevin Johnson

icon
Unsubscribe
icon
Unsubscribe
Weekly
 
Shared Security is your premier cybersecurity and privacy podcast where we explore the bonds shared between people and technology. Join industry experts Tom Eston, Scott Wright, and Kevin Johnson as they deliver the latest news, actionable tips, expert guidance, and insightful interviews with top cybersecurity and privacy specialists. Stay informed and take control of your online security and privacy in today's interconnected world. Tune in every week to discover invaluable insights, strateg ...
  continue reading
 
“Secure & Simple” demystifies governance and compliance challenges faced by consultants, as well as professionals acting as fractional CISOs in companies. The podcast is hosted by Dejan Kosutic, an expert in cybersecurity governance, ISO 27001, NIS2, and DORA. The episodes present topics in an easy-to-understand way and provide you with insight you won’t be able to find elsewhere. To provide comments, suggest topics for the next episodes, or express your interest in participating in the show ...
  continue reading
 
The HIP Podcast is the premier podcast for cybersecurity pros charged with defending hybrid identity environments. Hosted by 15-time Microsoft MVP and Active Directory security expert, Sean Deuby. Presented by Semperis: the pioneers of identity-driven cyber resilience for the hybrid enterprise.
  continue reading
 
Welcome to the Tactical Cyber Podcast, where we transform strategic cyber insights into actionable tactics for everyday implementation. Join your hosts, retired FBI Supervisory Special Agent Darren Mott, and Risk Advisory Practice Leader at Warren Averett, Paul Perry. Together, they bring decades of experience from the front lines of cybersecurity and risk management to help business owners and individuals take the actions that will keep their business and personal digital data safe. Each ep ...
  continue reading
 
Artwork

1
Daily Cyber Threat Brief

Simply Cyber Media Group

icon
Unsubscribe
icon
Unsubscribe
Daily
 
The stories that matter most to #cybersecurity insiders, analysts, and business leaders. Delivered every weekday. Gain expert insights on what you need to takeaway from each story, and why. Learn and laugh at the same time with #TeamSC. Join us live at 8 AM Eastern every weekday morning at https://simplycyber.io/streams. I’m Gerald Auger, Ph.D., a cybersecurity professional, college professor, and content creator with over two decades of expertise in GRC cybersecurity. This field is collabor ...
  continue reading
 
Artwork

1
The Daily Threat

QIT Solutions

icon
Unsubscribe
icon
Unsubscribe
Weekly+
 
Welcome to "The Daily Threat" podcast, your daily dose of curated content around cybersecurity news, advice, and best practices. With the increasing frequency of cyber attacks and data breaches, it's more important than ever to stay informed and prepared. This podcast provides you with the latest updates on cybersecurity threats and trends, along with expert insights and practical advice to help you protect yourself and your organization. Our team of cybersecurity experts scours the latest n ...
  continue reading
 
Hosted by Brett Gallant, founder of Adaptive Office Solutions, The Adaptive Mindset is the podcast for entrepreneurs and leaders ready to embrace change, overcome limiting beliefs, and grow both personally and professionally. Through compelling stories, expert insights, and actionable strategies, each episode empowers you to adapt, lead, and thrive in a rapidly changing world. From mindset shifts to business resilience and cybersecurity, this is your go-to resource for unlocking your full po ...
  continue reading
 
Artwork

1
Techstrong Gang

Techstrong Group

icon
Unsubscribe
icon
Unsubscribe
Daily
 
Techstrong Gang is your go-to weekday show on Techstrong TV and your favorite podcast platform, bringing together a rotating lineup of top thought leaders and technologists to break down the biggest stories and trends shaping the tech world. Hosted by industry veterans Alan Shimel, Mike Vizard, Mitchell Ashley, Jon Swartz, Lisa Martin, Tracy Ragan, Sulagna Saha, Anne Ahola Ward, Bonnie Schneider, and more, the show dives deep into everything from DevOps and cybersecurity to AI and cloud inno ...
  continue reading
 
Want to hear what industry experts really think about the cyber threats they face? ShadowTalk is a weekly cybersecurity podcast, made by practitioners for practitioners, featuring analytical insights on the latest cybersecurity news and threat research. Threat Intelligence Analyst Kim Bromley brings over 15 years of experience in threat intelligence across the public and private sectors. Kim and her guests provide practical perspectives on the week’s top cybersecurity news and share knowledg ...
  continue reading
 
Brought to you by IT Audit Labs. Trusted cyber security experts and their guests discuss common security threats, threat actor techniques and other industry topics. IT Audit Labs provides organizations with the leverage of a network of partners and specialists suited for your needs. ​ We are experts at assessing security risk and compliance, while providing administrative and technical controls to improve our clients’ data security. Our threat assessments find the soft spots before the bad g ...
  continue reading
 
Artwork

1
The I.T. Career Podcast

The Bearded I.T. Dad - Dakota Snow

icon
Unsubscribe
icon
Unsubscribe
Monthly+
 
Empowering Your IT Career Journey – From the first step to success! With a passion for technology and a mission to uplift others, I’m here to guide you through the dynamic IT industry. Whether you're just starting or looking to advance, you’ve found a community dedicated to your growth. Advice & Insights: From Help Desk to Director of Network Operations in 3 years, I share strategies to fast-track your career. Expert Conversations: Gain exclusive insights from industry leaders. Let’s make IT ...
  continue reading
 
Welcome to Cyber Insights, the podcast that bridges the worlds of networking and cybersecurity. From cutting-edge innovations in enterprise connectivity to the latest in digital defense, we break down the buzzwords and bring you actionable insights to secure and scale your systems. Whether you're an IT professional, business leader, or tech enthusiast, join us as we explore the critical intersection of networks and security, featuring expert conversations, industry trends, and real world str ...
  continue reading
 
Artwork

1
To The Point - Cybersecurity

Forcepoint | Global Cybersecurity Leader | Security. Simplified.

icon
Unsubscribe
icon
Unsubscribe
Monthly+
 
Stay ahead in the dynamic world of cybersecurity with "To the Point Cybersecurity." This podcast offers in-depth discussions on the latest cyber threats, trends, and technologies impacting businesses, governments, and communities globally. Listeners will gain insights into how emerging technologies, such as AI and frameworks like data governance and expanded global cyber regulations, are shaping modern security practices. The podcast also provides practical strategies for navigating the ever ...
  continue reading
 
Cyber Sentinel is your go-to podcast for expert insights into cybersecurity, digital privacy, and cutting-edge tech—featuring voices from pioneering companies like https://menavpn1.com/ . Hosted by Alex Carter of ByteShield, each episode features in-depth conversations with developers, ethical hackers, and privacy advocates working on the front lines of digital defense. Whether you’re a tech enthusiast, policy wonk, or developer, Cyber Sentinel brings you the knowledge and perspectives you n ...
  continue reading
 
Artwork

1
Cybersecurity Sense

LBMC Cybersecurity

icon
Unsubscribe
icon
Unsubscribe
Monthly
 
Welcome to Cybersecurity Sense, the podcast where real-world security meets practical insights. Hosted by LBMC’s Andy Kerr and Kyle Hinterberg, this show goes beyond compliance checklists to explore the fast-moving world of cybersecurity.
  continue reading
 
Artwork
 
Welcome to the Security Weekly Podcast Network, your all-in-one source for the latest in cybersecurity! This feed features a diverse lineup of shows, including Application Security Weekly, Business Security Weekly, Paul's Security Weekly, Enterprise Security Weekly, and Security Weekly News. Whether you're a cybersecurity professional, business leader, or tech enthusiast, we cover all angles of the cybersecurity landscape. Tune in for in-depth panel discussions, expert guest interviews, and ...
  continue reading
 
Artwork

1
Privacy Please

Cameron Ivey

icon
Unsubscribe
icon
Unsubscribe
Monthly+
 
Tune into "Privacy Please," where hosts Cam and Gabe engage with privacy and security professionals around the planet. They bring expert insights to the table and break down complicated tech stuff everyone can understand.
  continue reading
 
Secure Talk reviews the latest threats, tips, and trends on security, innovation, and compliance. Host Justin Beals interviews leading privacy, security and technology executives to discuss best practices related to IT security, data protection and compliance. Based in Seattle, he previously served as the CTO of NextStep and Koru, which won the 2018 Most Impactful Startup award from Wharton People Analytics. He is the creator of the patented Training, Tracking & Placement System and the auth ...
  continue reading
 
This is the show for IT leaders looking to move fast, optimize costs, and protect against the latest security threats in their IT environments. In each episode, discussions tackle one aspect of IT, from cloud computing and digital workplace to modern infrastructure and cybersecurity. If you're looking to stay ahead in the game, enhance your organizational agility, and secure your digital assets, you've come to the right place.
  continue reading
 
elliTek's Automation Know-How is a quarterly podcast that takes you beyond the buzzwords to explore how real automation solutions are applied in real manufacturing environments. Hosted by Brandon Ellis, owner of elliTek and automation expert, each episode dives into the practical side of industrial automation — from hardware and software to integration strategies and IIoT — all grounded in how these technologies work on the factory floor. Whether you're an engineer, plant manager, or just au ...
  continue reading
 
Artwork
 
Tech with Newton is an informative technology podcast for tech enthusiasts, newcomers to tech, tech professionals, and anyone looking to break into the industry. It is a podcast committed to educating and empowering technology careers worldwide. In each episode, the host, Newton, a seasoned IT consultant, explores the latest interesting technology news, trends, insights, and innovations, as well as career development tips and tricks to turbocharge careers in tech.
  continue reading
 
The Practical 365 Podcast is a fortnightly newscast on all things Microsoft 365 including Microsoft Teams, Azure AD, Exchange, SharePoint, OneDrive, Windows, Intune and any hot topics that are worth a deep-dive to help you learn more and get the real-world view. Your hosts are Microsoft MVPs Steve Goodman, Paul Robichaux and Quest's Bastiaan Verdonk, who will share their expert opinions on the talk of the week, and Q&A with special guests.
  continue reading
 
Welcome to PCN Podcasts! In Check with Fintech is our series which focuses on all things related to payments, fintech, blockchain, cybersecurity, and e-commerce. Our other series Work It Out focuses on the stories of leaders and experts with a wide range of insights for our audience. From start-ups to global brands, we dive into the ins and out of their industries to work out their formulas for success.
  continue reading
 
Artwork

1
The TechTual Talk

Henri Davis, The Radcast Network

icon
Unsubscribe
icon
Unsubscribe
Monthly+
 
Introducing The Techtual Talk - the ultimate podcast for exploring the exciting world of technology and promoting diversity in the industry! Join us as we delve into the many avenues available in tech, including non-technical roles, and shine a spotlight on the representation of African Americans and other people of color in this space. We believe that every child, regardless of their background, should have the opportunity to discover and pursue a fulfilling career in technology. With The T ...
  continue reading
 
Dive into the heart of cybersecurity with "The Other Side of the Firewall & Ask A CISSP" podcasts, where the spotlight shines on diversity and excellence within the tech realm. As the digital world expands, the voices shaping its future become ever more crucial. Our mission? To celebrate and amplify the stories of People of Color who've not just climbed the ladder but shattered ceilings along the way to senior and C-suite echelons. Join us on a journey beyond the conventional, as we engage w ...
  continue reading
 
Artwork
 
Step into the world of digital forensics, mobile forensics, OSINT, and cybersecurity with The Cyber Sleuth Show! Hosted by Kevin DeLong, this podcast dives deep into the ever-evolving landscape of digital investigations, featuring expert guests, cutting-edge tools, real-world case insights, and, of course, the occasional terrible dad joke. From law enforcement investigators and forensic analysts to OSINT specialists and cybersecurity pros, we uncover the latest trends, techniques, and challe ...
  continue reading
 
Artwork

1
AI or Not

Pamela Isom

icon
Unsubscribe
icon
Unsubscribe
Monthly+
 
Welcome to "AI or Not," the podcast where digital transformation meets real-world wisdom, hosted by Pamela Isom. With over 25 years of guiding the top echelons of corporate, public and private sectors through the ever-evolving digital landscape, Pamela, CEO and Founder of IsAdvice & Consulting LLC, is your expert navigator in the exploration of artificial intelligence, innovation, cyber, data, and ethical decision-making. This show demystifies the complexities of AI, digital disruption, and ...
  continue reading
 
Artwork

1
Wild Ducks

Jerry Cuomo

icon
Unsubscribe
icon
Unsubscribe
Monthly
 
Join Jerry Cuomo, IBM Fellow and tech innovator, on Wild Ducks, a podcast that provides a personal and behind-the-scenes look at emerging tech trends, including AI, cybersecurity, quantum computing, and blockchain. Inspired by Thomas J. Watson Jr.'s wild duck analogy, this podcast celebrates unconventional thinkers who challenge the status quo. Enjoy a mix of expert interviews and engaging fictional guests as they explore how these technologies transform industries and empower individuals. S ...
  continue reading
 
Loading …
show series
 
Welcome back to To the Point Cybersecurity Podcast, brought to you by Forcepoint! In this week’s episode, hosts Rachael Lyon and Jonathan Knepher are joined—once again—by the remarkable Maria Roat, former US Deputy Federal Chief Information Officer and past CIO of the Small Business Administration. With over three decades of federal IT and cybersec…
  continue reading
 
Cybercriminals are exploiting outdated routers to build massive proxy networks that hide malware operations, fraud, and credential theft—right under the radar of enterprise defenses. In this episode, Sherri and Matt unpack the FBI’s May 2025 alert, the role of TheMoon malware, and how the Faceless proxy service industrializes anonymity for hire. Le…
  continue reading
 
🎙️ New Episode of Cyber Defense Radio is LIVE! 🎥 Hosted by Gary @Miliefsky, Publisher of @CyberDefenseMag In this powerful interview, Namrata Barpanda, Staff InfoSecurity Engineer at ServiceNow and an award-winning Women in Cyber, shares her personal journey into cybersecurity and her frontline insights from the threat landscape. We explore vital c…
  continue reading
 
The stories that matter most to #cybersecurity insiders, analysts, and business leaders. Delivered every day. Check out Barricade Cyber for #incidentresponse, #ransomware protection, and business recovery services: https://barricadecyber.com Check out John Strand's Pay What You Can Antisyphon Training: https://simplycyber.io/antisyphon Allow what y…
  continue reading
 
The stories that matter most to #cybersecurity insiders, analysts, and business leaders. Delivered every day. Check out Barricade Cyber for #incidentresponse, #ransomware protection, and business recovery services: https://barricadecyber.com Check out John Strand's Pay What You Can Antisyphon Training: https://simplycyber.io/antisyphon Allow what y…
  continue reading
 
Learn how you can work with me one on one to secure a $90K+ cybersecurity role: link: https://techtualconsulting.tech/video-training ------------------------------------------------------------------------------------ In this episode, HD and CyberShortiee break down CrowdStrike's recent layoffs, Change HealthCare's breach update, major cybersecurit…
  continue reading
 
Alan, Mike, Jon, Teri Robinson and Futurum Group analyst Guy Currier dive into the growing feud between Apple and President Donald Trump before discussing the latest controversy to engulf the U.S. Cybersecurity and Infrastructure Security Agency (CISA).Then the gang turns its attention to a move by Salesforce to acquire Convergence.ai to shore up i…
  continue reading
 
Sponsor: Netskope (www.netskope.com) On Location at CISO XC ATX: www.cisoxc.com THPC EP64 – CISO XC Austin: Veterans, Mid-Market Cyber & Responsible AI In this special episode recorded live at CISO XC’s inaugural Austin event, host David Malicoat brings you ground-level conversations with leaders shaping modern cybersecurity—from national defense t…
  continue reading
 
In this episode of the podcast, the hosts discuss the emergence of a new botnet that is launching targeted DDoS attacks on the gaming industry. They explore the implications of these attacks, particularly focusing on the financial impact on both large and small gaming companies. The conversation highlights the sophistication of the botnet and the c…
  continue reading
 
Segment 1: Fastly Interview In this week's interview segment, we talk to Marshall Erwin about the state of cybersecurity, particularly when it comes to third party risk management, and whether we're ready for the next big SolarWinds or Crowdstrike incident. These big incidents have inspired executive orders, the Secure by Design initiative, and eve…
  continue reading
 
In this episode, we explore Mark Zuckerberg's bold claim that AI friends will replace human friendships, and discuss the potential implications of a world where technology mediates our connections. We also update listeners on the recent developments in the 23andMe bankruptcy case and what it means for former customers. Joining the conversation is c…
  continue reading
 
In this episode of The Other Side of the Firewall podcast, hosts Ryan Williams Sr., Shannon Tynes, and Chris Abacon discuss their personal updates, including vacations, media consumption, and music recommendations. Chris shares his experience in Costa Rica, emphasizing the beauty of the rainforest and the benefits of a technology detox. The convers…
  continue reading
 
Takeaways #Personnelsecurity is crucial for organisations and individuals. There is a significant talent shortage in the #cybersecurityindustry. #AI can enhance security measures but cannot replace human instinct. Outsourcing security functions can be beneficial for smaller organisations. The pressure on cybersecurity roles is immense and can lead …
  continue reading
 
Takeaways #Cloudmarketplaces function like a digital mall for various services. Continuous monitoring and detection of threats are essential. Legislation like NIST 2 and Dora impacts cloud security practices. Zero trust methodology is advised in securing cloud connections. Regular penetration testing and vulnerability management are necessary. Data…
  continue reading
 
Alan, Mike and Jon dive into the $1 billion acquisition of Neon, a provider of serverless database platform, made this week by Databricks. Then the gang discusses how robotic process automation (RPA) is evolving in the age of artificial intelligence (AI) following an Automation Anywhere event before musing about the impact open source software and …
  continue reading
 
The assertion that Mexican drug cartels have engineered and deployed their own sophisticated, independent cellular networks to circumvent governmental surveillance, as detailed in the primary source article 1, presents a significant development in the operational capabilities of transnational criminal organizations. This report offers an exhaustive…
  continue reading
 
📌 Episode Highlights: A $300 million Ponzi scam in Canada shows how third parties—especially banks—can unknowingly assist fraudsters. Victims discovered a bank allegedly made it easier for the scammer to operate. The Royal Bank of Canada (RBC) is being sued for not performing proper oversight. Banks and professionals (accountants, attorneys, advert…
  continue reading
 
🎙️ Podcast Episode Discover what inheritance hijacking is and how it happens within families or among close connections. Understand how people may manipulate, forge, or steal assets intended for you or others. Learn about the motivations behind inheritance theft — jealousy, greed, entitlement, or outside influence. Real-life examples: Forging prope…
  continue reading
 
Stolen Star Power: How Lana Rose's Online Life Fuels Romance Scams A significant challenge in this analysis is the current inaccessibility of the live Instagram profile @lanarose786. Consequently, this assessment relies on data from third-party analytics providers such as HypeAuditor , publicly accessible information from platforms including YouTub…
  continue reading
 
Episode Description: Learn how recent efforts have made court-ordered title processes more visible and accepted by government agencies. Discover how DMVs are now more likely to provide accurate guidance instead of turning people away due to missing paperwork. Understand how the court-ordered title process helps when a bonded title isn’t possible or…
  continue reading
 
In This Episode: 🚨 Breaking news: Major crackdown on the Montana LLC loophole used for vehicle tax evasion. 📌 Car and Driver Magazine reports enforcement actions have begun in multiple states, including Utah and California. 🔍 What is the Montana LLC loophole? A method used to avoid state taxes and inspections by registering vehicles under a Montana…
  continue reading
 
In This Episode: How AI is rapidly advancing, improving its capabilities every few months Real-world applications of AI in: Production Programming Content creation (audio and video) Sales conversations and customer service The growing use of AI agents in online and phone-based sales Why sales roles—once among the highest-paid positions—are now bein…
  continue reading
 
In this episode, we cover: What it means to be “upside down” on a car loan or out of equity Why dealerships may refuse trade-ins when your car loan balance is higher than the car’s value Hidden add-ons in your original loan that may be removable: GAP insurance Maintenance contracts Extended warranties Service repair agreements Undercoating or rust …
  continue reading
 
Podcast Episode Show Notes What is a stolen inheritance? When a deceased person’s will directs assets or money to specific heirs, but others take more than their fair share or more than they were entitled to, this is considered a stolen inheritance. It is essentially theft of assets from legitimate heirs. Why is it important? The will represents th…
  continue reading
 
Podcast Episode Show Notes / Description Did you know up to 20% of the balance on your existing car loan might be removed from what you owe? When purchasing a vehicle, extra interest charges or "add-ons" may have been included in your loan without you realizing it. Common add-ons include: Gap insurance Force-placed insurance VSI insurance Service m…
  continue reading
 
Anomalous Health Incidents: An In-Depth Examination of the “Havana Syndrome” PhenomenonI. The Emergence of a Medical Mystery: Unexplained Health Incidents The perplexing saga of what became popularly known as “Havana Syndrome” began to unfold against a backdrop of shifting geopolitical tides. Its emergence not only presented a novel medical challen…
  continue reading
 
📌 Episode Highlights: Why third-party restitution is one of the most effective strategies for fraud victims. Scammers often don’t have the full amount to return—here’s how third parties come into play. Many large client recoveries have included contributions from third parties who weren’t directly involved in the scam but played a role in enabling …
  continue reading
 
🎙 Episode Show Notes / Description: Real-life example of a major bank being forced to repay victims of a Ponzi scheme. Even though banks aren’t the scammers, they can still be held accountable under certain conditions. If a bank failed to follow its own procedures or neglected basic fraud prevention practices, it could be considered liable. The cor…
  continue reading
 
🎙️ Podcast Episode 🚗 What is the 25-Year Import Exemption Rule? Allows vehicles that are 25 years old or older to be imported into the U.S. These vehicles are exempt from typical import requirements from the EPA, DOT, and U.S. Customs. Designed for enthusiast vehicles that don’t meet modern U.S. safety/emissions standards. ⚠️ Important Distinction …
  continue reading
 
In this episode, Newton sits down with Therese Miclot, a leadership consultant and co-author of The Facilitation Advantage, a practical guide for tech leaders and tech engineers seeking to enhance their confidence, communication, and influence. The focus of this conversation is on Facilitation—a critical yet often overlooked skill that can signific…
  continue reading
 
This week in the security news: Android catches up to iOS with its own lockdown mode Just in case, there is a new CVE foundation Branch privilege injection attacks My screen is vulnerable The return of embedded devices to take over the world - 15 years later Attackers are going after MagicINFO Hacking Starlink Mitel SIP phones can be hacked Reversi…
  continue reading
 
This episode features a compelling conversation covering personal stories and insights into the world of cybersecurity and the challenges individuals face when navigating its complexities and interacting with legal systems. The discussion centers around the experiences of guests, including Alberto Daniel Hill, who shares his remarkable and difficul…
  continue reading
 
Takeaways #Databackups are essential for business continuity. The 3-2-1 backup #strategy is crucial for data protection. Testing backup systems is necessary to ensure data recovery. Businesses should back up all critical data sets. #AI can assist in data classification for backups. Avoid keeping backups in the same location as primary data. Underst…
  continue reading
 
The stories that matter most to #cybersecurity insiders, analysts, and business leaders. Delivered every day. Check out Barricade Cyber for #incidentresponse, #ransomware protection, and business recovery services: https://barricadecyber.com Check out John Strand's Pay What You Can Antisyphon Training: https://simplycyber.io/antisyphon Allow what y…
  continue reading
 
In the latest episode of the TechSpective Podcast, Errol Weiss, Chief Security Officer at Health-ISAC, joins me to dive into a timely and thought-provoking conversation on how cybersecurity collaboration is changing—especially when it comes to public and private sector relationships. […] The post A New Reality for Cybersecurity Collaboration appear…
  continue reading
 
What’s the secret to building an unstoppable MSP in today’s fast-moving tech world? In this episode, Peter Melby, CEO of New Charter Technologies, breaks down how top MSPs are shifting from reactive IT support to proactive business problem-solvers. Discover why the future belongs to those who ask better questions, embrace AI with purpose, and treat…
  continue reading
 
Takeaways #DDoS can mimic legitimate traffic, making detection difficult. #Botnets are often created from compromised IoT devices. Motivations for DDoS attacks range from hacktivism to personal grievances. Residential IP proxy networks complicate DDoS defense. #AI is increasingly being used in both attacks and defenses. The future of cybersecurity …
  continue reading
 
Mike, Jon, Anne Ahola Ward and Robert Reeves discuss the degree to which graphics processing units (GPUs) have become chips that are being exchanged in a larger international trade negotiation before delving into why Pope Leo IV seems to be warming up to the ethical use of artificial intelligence (AI). Then the gang takes a look at the implications…
  continue reading
 
Resources: https://linktr.ee/ReliaQuestShadowTalk Join host Kim along with intelligence analysts Joey and Hayden as they discuss: ReliaQuest's Forecast for How US Policy will Impact Russia-linked Cyber Threats Infostealers Spread by Fake AI Video Generators Kickidler Abuse by Ransomware Groups FBI Takedown of Huge Botnet Kim Bromley: Senior Cyber T…
  continue reading
 
The stories that matter most to #cybersecurity insiders, analysts, and business leaders. Delivered every day. Check out Barricade Cyber for #incidentresponse, #ransomware protection, and business recovery services: https://barricadecyber.com Check out John Strand's Pay What You Can Antisyphon Training: https://simplycyber.io/antisyphon Allow what y…
  continue reading
 
Alan, Mike, Mitch, Chris Blask and Jules Okafor dive into cybersecurity spending levels that are projected to reach $288 billion before discussing an OpenText report that suggests 2.8% of endpoints are infected with malware. Then the gang turns its attention to the need for more cost efficient approaches to storing data that might be enabled by syn…
  continue reading
 
In this episode, the hosts discuss Google's recent settlement of $1.375 billion over unauthorized tracking and biometric data collection. They explore the implications of privacy laws in the U.S., the risk management strategies of tech companies, and the value of data in today's economy. The conversation highlights the challenges of regulating tech…
  continue reading
 
In the leadership and communications section, How CISOs can talk cybersecurity so it makes sense to executives, Firms to spend more on GenAI than security in 2025, Europe leads shift from cyber security ‘headcount gap’ to skills-based hiring, and more! Next, pre-recorded interviews from RSAC Conference 2025, including: This segment is sponsored by …
  continue reading
 
Loading …

Quick Reference Guide

Listen to this show while you explore
Play