DIY Cyber Guy is for anyone that wants to keep hackers out of their computers. The DIY Cyber Guy, David W. Schropfer, interviews with the world's leading cyber security experts to give you easy-to-understand tips, tactics and tools to protect your invaluable data, and your irreplaceable reputation online.
…
continue reading
Thought leaders and experts Max Aulakh (Ignyte) and Joel Yonts (Secure Robotics) cover subjects such as the development of AI, cyber security and the how the future looks in terms of cyber risk.
…
continue reading
CSIAC's Mission Mission Statement CSIAC is chartered to leverage the best practices and expertise from government, industry, and academia in order to promote technology domain awareness and solve the most critically challenging scientific and technical problems in the following areas: Cybersecurity and Information Assurance, Software Engineering, Modeling and Simulation, and Knowledge Management/Information Sharing.
…
continue reading
Security Unlocked explores the technology and people powering Microsoft's Security solutions. In each episode, Microsoft Security evangelists Nic Fillingham and Natalia Godyla take a closer look at the latest innovations in threat intelligence, security research, and data science, with a special focus on demystifying artificial intelligence and machine learning. Be sure to listen in and follow us! Hosted on Acast. See acast.com/privacy for more information.
…
continue reading
Quantum Computing is based on the science of quantum mechanics, which will be 100 years old next year. Find out how quantum is impacting your life today, and how . With Dr. Paul Cadden-Zimansky @bardcollege #IYQ2025By Extra Something Media
…
continue reading
1
#64 - How to Avoid New FedEx and UPS Phishing Scams
23:59
23:59
Play later
Play later
Lists
Like
Liked
23:59
Researchers at Abnormal Security have observed an increase in phishing scams impersonating FedEx and UPS. Find out what you can do with our guests Israel Mazin and Ori Mazin from Memcyco.By Extra Something Media
…
continue reading
1
#63 - New Concerns About Two-Factor Authentication
26:13
26:13
Play later
Play later
Lists
Like
Liked
26:13
Should phone reps be Identity Investivators? Can all reps be trusted to keep hackers out of your accounts? In this episode learn about new, goverment ID-based methods that will keep your accounts safe with our guest expert, Aaron Painter (@aaronpa) CEO of Nametag, Inc.By Extra Something Media
…
continue reading
In this episode of the Emerging Cyber Risk podcast, Joel and Max explore Anthropic's responsible AI scaling policy. They discuss the practicality and strategic nature of the framework, which aims to ensure the safety of AI models as they push the boundaries of capabilities. They highlight the commitments made by Anthropic and the public disclosure …
…
continue reading
1
Joel's Book Review (Secure Intelligent Machines)
35:04
35:04
Play later
Play later
Lists
Like
Liked
35:04
On this episode of the Emerging Cyber Risk podcast, we Joel's latest book, "Secure Intelligent Machines". The podcast is brought to you by Ignyte and Secure Robotics, where we share our expertise on cyber risk and AI to help you prepare for the risk management of emerging technologies. We are your hosts, Max Aulakh and Joel Yonts. This podcast epis…
…
continue reading
On this episode of the Emerging Cyber Risk podcast, we cover the recent meeting that President Biden had with some of the top AI cybersecurity leaders in the industry. The podcast is brought to you by Ignyte and Secure Robotics, where we share our expertise on cyber risk and AI to help you prepare for the risk management of emerging technologies. W…
…
continue reading
On this episode of the Emerging Cyber Risk podcast, we discuss the AI planning that is going into 2024 and how this may affect our business. The podcast is brought to you by Ignyte and Secure Robotics, where we share our expertise on cyber risk and AI to help you prepare for the risk management of emerging technologies. We are your hosts, Max Aulak…
…
continue reading
1
The Intersection of AI and the Military: A Discussion with Taylor Johnston, Former Chief of Innovation for the U.S. Air Force
31:39
31:39
Play later
Play later
Lists
Like
Liked
31:39
On this episode of the Emerging Cyber Risk podcast, our guest is Taylor Johnston, Chief Operations Officer at the USF Institute of Applied Engineering and former Chief of Innovation for the United States Air Force. Join us as we investigate the integration of artificial intelligence and automation into the air force and the wider military. Tune in …
…
continue reading
1
The Biden Administration Hands the Safety & Security of AI to Industry Leaders!
35:04
35:04
Play later
Play later
Lists
Like
Liked
35:04
On this episode of the Emerging Cyber Risk podcast, we cover the recent meeting that President Biden had with some of the top AI cybersecurity leaders in the industry. The podcast is brought to you by Ignyte and Secure Robotics, where we share our expertise on cyber risk and AI to help you prepare for the risk management of emerging technologies. W…
…
continue reading
1
Navigating the Legal Challenges of Artificial Intelligence with Scott Koller of Baker & Hostetler LLP
38:31
38:31
Play later
Play later
Lists
Like
Liked
38:31
On this episode of the Emerging Cyber Risk podcast, our guest is Scott Koller, a skilled privacy and data security attorney and Partner at Baker & Hostetler LLP. Join us as we navigate the legal challenges posed by artificial intelligence (AI), delving into the associated risks and possible future solutions. We further explore the ownership and cop…
…
continue reading
1
Exploring the Adoption of AI in the Defense Industry with Ron Fehlen of L3Harris Technologies
35:42
35:42
Play later
Play later
Lists
Like
Liked
35:42
On this episode of the Emerging Cyber Risk podcast, our guest is Ron Fehlen, VP and GM of USAF Programs and Broadband Communication Systems at L3Harris Technologies, the trusted disruptor for the global aerospace and defense industry. The podcast is brought to you by Ignyte and Secure Robotics, where we share our expertise on cyber risk and AI to h…
…
continue reading
1
Exploring the Intersection of Cyber Security and AI: Insights from Phil Harris of IDC
37:41
37:41
Play later
Play later
Lists
Like
Liked
37:41
On this episode of the Emerging Cyber Risk podcast, our guest is Phil Harris, Research Director, Cyber Security Risk Management Services at IDC, the premier global marketing intelligence platform. The podcast is brought to you by Ignyte and Secure Robotics, where we share our expertise on cyber risk and AI to help you prepare for the risk managemen…
…
continue reading
1
Transparency and Collaboration: Driving AI Adoption in the Military and Government with Aaron McCray of the US Navy
44:14
44:14
Play later
Play later
Lists
Like
Liked
44:14
On this episode of the Emerging Cyber Risk podcast, our guest is Aaron McCray, a twenty-six-year veteran of the U.S. Navy. The podcast is brought to you by Ignyte and Secure Robotics, where we share our expertise on cyber risk and AI to help you prepare for the risk management of emerging technologies. We are your hosts, Max Aulakh and Joel Yonts. …
…
continue reading
1
Leveraging AI for Risk Management: Insights from Laura Whitt Winyard, VP of Security and IT at Hummingbird
30:13
30:13
Play later
Play later
Lists
Like
Liked
30:13
On this episode of the Emerging Cyber Risk podcast, our guest is Laura Whitt Winyard, VP of Security and IT at Hummingbird. The podcast is brought to you by Ignyte and Secure Robotics, where we share our expertise on cyber risk and AI to help you prepare for the risk management of emerging technologies. We are your hosts, Max Aulakh and Joel Yonts.…
…
continue reading
1
Navigating the Intersection of AI and Healthcare with Christopher Rogers
47:55
47:55
Play later
Play later
Lists
Like
Liked
47:55
Today's guest is Christopher Rogers, COO at Carenet Health. In this episode, we discuss how healthcare companies and consumers should navigate the intersection of AI and healthcare. We cover multiple touchpoints, including AI's potential benefits and pitfalls in healthcare and the importance of using it responsibly. We also examine the need for col…
…
continue reading
1
Incorporating AI in Risk Management: Challenges and Potential Benefits with Jeff Lowder, Co-Founder of The Society of Information Risk Analysts
41:53
41:53
Play later
Play later
Lists
Like
Liked
41:53
Today's guest is Jeff Lowder, the Co-Founder and Past President of The Society of Information Risk Analysts, a society dedicated to continually improving the practice of information risk analysis. Our discussion today focuses on the emerging cyber risks and ethical concerns associated with AI in enterprise risk management, highlighting the challeng…
…
continue reading
1
Challenges in Developing, Democratizing, and Adopting AI with Dr. Amit Shah, Founder and President of GNS-AI LLC
38:57
38:57
Play later
Play later
Lists
Like
Liked
38:57
Today's guest is Dr. Amit Shah, Founder and President of GNA-AI LLC, a data science/ML/AI consulting business specializing in building data-based decision support systems. Our discussion focuses on the challenges in developing and adopting AI solutions, unifying democratized models, and the challenge of developing FDA-compliant models for the healt…
…
continue reading
1
Managing Cyber Security Challenges in the Retail Space with Ganjar Imansantosa, VP and CISO at Tropical Smoothie Cafe
39:50
39:50
Play later
Play later
Lists
Like
Liked
39:50
Today's guest is Ganjar Imansantosa, VP and CISO at Tropical Smoothie Cafe, a nationally franchised quick-service restaurant.We discuss the challenges and solutions of implementing cybersecurity protocols in a shared risk environment between the brand and the franchisee. Ganjar covers multiple touchpoints, including managing cyber security in a sha…
…
continue reading
1
Opportunities and Challenges of AI in Cybersecurity with Phil Agcaoili, Entrepreneur and Former CISO at Elavon, Cox, and VeriSign
43:15
43:15
Play later
Play later
Lists
Like
Liked
43:15
Our guest today is Phil Agcaoili, who is a recent Entrepreneur and a former Chief Information Security Officer at Dell. Together, we discuss the impact of AI on cybersecurity, compliance, and the workforce. Phil shares valuable insights on aligning emerging risks with technological advancements with protection software. Phil is an expert in cyberse…
…
continue reading
1
Emerging Cyber Risks and Zero Trust with Paul Miller, Zero Trust Architecture Expert at Appian Logic
38:33
38:33
Play later
Play later
Lists
Like
Liked
38:33
Our guest today is Paul Miller, Zero Trust Architecture Expert at Appian Logic, a management consulting and IT security company. They unpack zero trust and ZTNA as a security shield, formulation of a national cybersecurity document, driving awareness and change at companies, and the legacy lag at companies that prevent the adoption of zero trust ar…
…
continue reading
1
The Need to Bring Cybersecurity Front and Center in the Healthcare Industry with Bill Scandrett, Chief Information Security Officer at Allina Health
20:36
20:36
Play later
Play later
Lists
Like
Liked
20:36
Our guest today is Bill Scandrett, Chief Information Security Officer at Allina Health. Our discussion pivots around the awareness and implementation of cybersecurity protocols in the healthcare industry. The discussion focuses on oversight of the FDA on medical devices, best practices in operationalizing GRC, managing third-party risk, and protect…
…
continue reading
1
Episode Zero - An Introduction to the Emerging Cyber Risk Podcast
12:29
12:29
Play later
Play later
Lists
Like
Liked
12:29
Welcome to the first episode of the Emerging Cyber Risk podcast, brought to you by Ignyte and Secure Robotics, where we share our expertise on cyber risk and AI to help you prepare for the risk management of emerging technologies. We are your hosts, Max Aulakh and Joel Yonts.By Brittany Carr
…
continue reading
1
#62 - Ransomware Hits The Brakes At Ferrari - Protect Your Network Now
20:52
20:52
Play later
Play later
Lists
Like
Liked
20:52
Hackers speed off with Ferrari data in a #ransomware attack. See how to stop an attack before it happens, with Greg Edwards, CEO @CanauriBy Extra Something Media
…
continue reading
1
#61 - How to Make Sure that Your IT Provider Is Not A Ransomware Target
19:01
19:01
Play later
Play later
Lists
Like
Liked
19:01
If you use a managed service provider (MSP) to manage your company's IT needs, learn how to hold these businesses accountable for keeping your services, and your data, secure from hackers. With Yaniv Bar-Dayan, CEO of @vulcancyberBy Extra Something Media
…
continue reading
1
#60 - How Lessons Learned by Large Companies Can Help YOU Keep Your Cloud Data Secure
14:21
14:21
Play later
Play later
Lists
Like
Liked
14:21
Uber just had another data breach. Learn from their mistakes, and the mistakes of other larege corporations, to find out how to keep your data safe and secure, even if you store it in the cloud. Our guest is cybersecurity expert and CEO of Dig Security, Dan Benjamin.By Extra Something Media
…
continue reading
1
#59 - Effects of Twitter's Massive Data Breach (And What You Can Do)
25:39
25:39
Play later
Play later
Lists
Like
Liked
25:39
Hackers are using the recent Twitter breach, combined with the other 4,100 data breaches in 2022, to steal identities. Learn about new systems like #DSPM to mitigate your company's sprawling data. With Flow Security CEO, Jonathan Roizin.By Extra Something Media
…
continue reading
1
#58 - Samsung Customer Data Hacked - What You Need To Do
22:20
22:20
Play later
Play later
Lists
Like
Liked
22:20
Hackers stole Samsung's customer data from a US-based facility. Were you affected? What sis Samsung disclose? What should you do? With guest Javvad Malik, Lead Security Awareness Advocate at KnowBe4.By Extra Something Media
…
continue reading
1
#57 - Hackers are Using Personal Smartphones and Emails as a Backdoor Into Your Employer
25:34
25:34
Play later
Play later
Lists
Like
Liked
25:34
Phishing attacks have evolved. Hackers have found new ways to use private messaging apps, personal email accounts, and personal smartphones to attack- not just you - but your employer. Keep your job, and get a FREE voucher for SlashNext, by listening to this episode.By Extra Something Media
…
continue reading
1
#56 - The Best Cybersecurity Defense (And It’s Not Found In Technology)
26:28
26:28
Play later
Play later
Lists
Like
Liked
26:28
Why do you wear a seatbelt? Is it because of protection, or the penalty for not doing it? Adopt the culture of cybersecurity for both of these reasons. Hear why from our guest, cybersecurity researcher and author, Kai Roer.By Extra Something Media
…
continue reading
Serious vulnerabilities have just been patched in Apple products. If you own an Apple iPhone, iPad, or Macbook, listen to this episode to find out what happened, and what to do.By Extra Something Media
…
continue reading
1
#54 - Developing a Digital Vision in Education
34:57
34:57
Play later
Play later
Lists
Like
Liked
34:57
Preparing students for success in a digital world requires educators, administrators and parents to, directly and indirectly, educate students. With digital education expert Al Kingsley.By Extra Something Media
…
continue reading
1
#53 - Cybersecurity and the Future of Education
37:25
37:25
Play later
Play later
Lists
Like
Liked
37:25
What is the future of education, and how does cybersecurity impact Education differently? How can student data be used to help predict the future success of a student, and how can universities keep student information private in the world of sophisticated cyber-attacks? Our guest is Dr. Punya Mishra, Associate Dean of Scholarship & Innovation and P…
…
continue reading
1
#52 - New Privacy Law for People Who Live in Connecticut, and Any Company That Serves Them
6:47
6:47
Play later
Play later
Lists
Like
Liked
6:47
If you are a customer in Connecticut, you should to understand this. But if you sell to any customers in Connecticut, you NEED to understand this.By Extra Something Media
…
continue reading
1
#51 - How Hackers Can Steal Your Cryptocurrency from Your Mobile Phone
10:19
10:19
Play later
Play later
Lists
Like
Liked
10:19
New report from Trend Micro details how hackers steal your money and your passwords. Learn how to stop them.By Extra Something Media
…
continue reading
The success of crypto inspired dozens of other cryptocurrencies like Ethereum, Tether, and Dogecoin. Today, people worldwide use cryptocurrencies to buy things, sell things, and make investments. One thing is certain; digital currencies are here to stay, no matter how many times you have to explain what a bitcoin is. Unfortunately, it also created …
…
continue reading
Ransomware attacks have never been so successful. The returns from these attacks are soaring and only becoming easier to conduct. In chapter two of the Microsoft Digital Defense Report, the growing threat of cybercrime is covered in great detail. As we continue to go over the MDDR, it's more apparent than ever that the cybercrime economy and servic…
…
continue reading
Everything is exciting and new when you're a kid, and curiosity inspires many of us to branch out and try new things. For some, that means drawing from our imagination or trying all kinds of sports. And for others it means spending days at the library, checking out books on modem communications, and eventually hacking into the local dial-up communi…
…
continue reading
Disinformation refers to the calculated use of false information to influence others and has been a steadily growing form of information warfare. Unfortunately, disinformation is everywhere these days, often hidden in plain sight. Criminals will also adapt and take advantage of technologies, such as AI and deepfakes, to increase the effectiveness o…
…
continue reading
Microsoft works around the clock to protect their customers, no matter what product they’re using, Microsoft or otherwise. In some instances Microsoft teams up with other companies, creating an all-star cybersecurity team, to handle newly discovered vulnerabilities. It helps everyone stay more secure, and of course, that's the ultimate goal, right?…
…
continue reading
In December 2020, Microsoft began sharing information with the cybersecurity industry on a group of Russia-based hackers who gained access to multiple enterprises through vulnerable software code, stolen passwords, compromised on-premises servers, and minted SAML tokens. In this supply chain attack, hackers could access the SolarWinds code, slip ma…
…
continue reading
We are back, covering more of the 2021 Microsoft Digital Defense Report, and this time we’re taking a deep dive into chapter five on Hybrid Workforce Security and Zero Trust. Zero Trust means precisely what it sounds like, never assuming any device or identity is secure; it's like having major trust issues, but in a professional way. With most busi…
…
continue reading
The way most people operate online these days, what would you even consider private anymore? We are so quick to share details about our job, home, friends, and family without even thinking about how much personal info we're giving away. Privacy and user agreements are a part of almost everyone's life at this point, and what do you know about them? …
…
continue reading
The newfound popularity of the internet in the nineties spurned an obsession with hacking. Unfortunately, most movies believed that it wasn't possible to show real hacking and still be entertaining; hence all the awkward video game graphics and characters living in sketchy basements regularly yelling out, "We're in!" while pounding on their keyboar…
…
continue reading
1
The 2021 Microsoft Digital Defense Report
39:22
39:22
Play later
Play later
Lists
Like
Liked
39:22
Okay, look, we know you plan on reading the entire 2021 MDDR at some point. But you're busy. Life gets in the way. We get it. Who has the time! Well, we've got the time, but that's beside the point, and honestly... fortunate for you. We've read the report front to back and have decided to cover some of it today on the podcast, but you'll still need…
…
continue reading
What would you say is the most personal possession that you own? Most would say their cell phone... unless you still have a few journals from high school. And if you do, this is your reminder that it might be time to let those go. It's become increasingly apparent lately how much info our phones collect from us, from the first app you check in the …
…
continue reading
You're back home celebrating the holidays with friends and family, sharing stories, catching up, and discussing your plans for the year ahead. Next thing you know, that cousin who wouldn't stop sending you emails about the "future of bitcoin" and coin mining kicks the door open, and he's ready to spread some holiday knowledge. Oh yeah, he's also go…
…
continue reading
Do you have a data science or engineering background? If so, you're in luck. If not, you're also in luck because today's guest found a way to make a few complex subjects understandable for everyone. The first of many topics... Fuzzy hashing. It might sound like an adorable, adventurous Muppet character, but I promise you the reason behind it is not…
…
continue reading
Juan Hardoy leads an international team of investigators, analysts, and lawyers inside the Digital Crimes Unit who share a joint mission to protect customers and promote trust in Microsoft technologies. Hearing that might take your imagination to a place where Juan is deputized to fight crime in digital space, and you wouldn't be completely wrong. …
…
continue reading
Have you ever thought about a career in threat intelligence or cyber security? Possibly finishing school with a degree in computer programming and feel overwhelmed with what to do next? Don't worry; we've all experienced this. Maybe not specifically with computer programming, but the figuring it out aspect. You could be ending active military servi…
…
continue reading
It's finally Friday. You successfully made it through another week and the weekend is so close you can taste it. You pour yourself a bowl of your favorite cereal, but before you can get that first bite your phone rings. It's a random number, but for some reason you're feeling chatty and decide to answer. Unfortunately, it's a robot that somehow kno…
…
continue reading