Socializing Cybersecurity. Translating Cyber into business terms. Newest AI, Social Engineering and Ransomware Attack Insight to Protect Businesses and Reduce Risk. Latest Cyber News from the Dark web, research and insider info. Interviews of Global Technology Leaders, sharing True Cyber Crime stories and advice on how to manages cyber risk. Find all content at www.CyberCrimeJunkies.com and videos on YouTube @CyberCrimeJunkiesPodcast
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Unlocking Unity: The Power of Civil Discourse and Protecting Online Privacy in America
1:01:49
1:01:49
Play later
Play later
Lists
Like
Liked
1:01:49
NEW! Text Us Direct Here! Kurt Long, founder and CEO of a privacy-based messaging app BUNKR (https://www.bunkr.life/) join David Mauro to discuss: how civil discourse helps our country, Newest Ways To Take Control Over Data Privacy, and why protecting online privacy is important. Summary The conversation explores the topics of data privacy, governm…
…
continue reading
NEW! Text Us Direct Here! We're thrilled to introduce Season 5 Cyber Flash Points to show what latest tech news means to online safety with short stories helping spread security awareness and the importance of online privacy protection. A fresh, exciting twist to our podcast this season! "Cyber Flash Points" – your go-to source for practical and co…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Safeguarding Your Privacy: How to Delete Your Data
1:00:43
1:00:43
Play later
Play later
Lists
Like
Liked
1:00:43
NEW! Text Us Direct Here! David Mauro interviews Merry Marwig, a data privacy advocate, and Jeff Jockisch, founder of Obscure IQ, about how data brokers work and how to delete your data by discussing the intersection of privacy and personal data. They discuss the role of data brokers, the lack of transparency in data collection, and the potential r…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Caught: The Williams Woods Identity Theft Story - A Shocking Twist.
43:49
43:49
Play later
Play later
Lists
Like
Liked
43:49
NEW! Text Us Direct Here! The Williams Woods Story. What Happens when Your Identity is Stolen. Video Episode: https://youtu.be/mBU3J-4vKww Accelerate your CMMC 2.0 compliance and address federal zero-trust requirements with Kiteworks' universal, secure file sharing platform made for every organization, and helpful to defense contractors. Visit kite…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Identity Crisis: Aaron Painter on Mobile ID Verification, Cryptography, and Reducing Cyber Risk
52:45
52:45
Play later
Play later
Lists
Like
Liked
52:45
NEW! Text Us Direct Here! Catch the Video episode: https://youtu.be/zMNsjSGT-yw Aaron Painter, former global executive at Microsoft, discusses the rising risks of deepfakes, how deep fake videos increase security risks, and how mobile-based identity verification helps like the new company he founded called Nametag. In this story David Mauro intervi…
…
continue reading
NEW! Text Us Direct Here! Many leaders have concerns about employees using AI safely. We explain how to do so in this video. Today we sit with Bill Kleyman-founder of Apolo.us, a pioneer and leader in the space about his efforts for the safe use AI and how to reduce risks with employee use of AI. This is the story of Bill Kleyman and how AI can be …
…
continue reading
![Artwork](/static/images/128pixel.png)
1
How To Measure Inclusion and Equality. Overcoming Bias in Cyber
44:42
44:42
Play later
Play later
Lists
Like
Liked
44:42
NEW! Text Us Direct Here! How Equality Is Addressed in Cyber Security Field. We talk head-on about how equality is addressed in cyber security field. We address:, inequality in cyber security, ways to stop bias in cyber security, and the glass ceiling in cyber security. Lynn Dohm, head of Women in Cyber Security (WiCyS) and one of the top women in …
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Phone Rings. It's A Social Engineer Callling.
59:36
59:36
Play later
Play later
Lists
Like
Liked
59:36
NEW! Text Us Direct Here! Video Episode: https://youtu.be/oH7FpvHOhVA This is the story of Matt Smallman, author of “Unlocking Your Call Centre”, about how call centers can be security risks. Our discussion gives exclusive insight into how biometrics fail in security, problems with voice authentication and explore military tactics and biometrics. W…
…
continue reading
NEW! Text Us Direct Here! Richard Hollis of Risk Crew in London joins Cyber Crime Junkies studio discussing key topics: why cybersecurity efforts usually fail and customers or enemies online. Video episode: https://youtu.be/QQ8l1PaDaUI Topics: 💡how cybersecurity efforts usually fail, 💡customers or enemies online 💡best practices for businesses to li…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Zero Trust, SMB & National Security. INTEL CTO Exclusive.
1:03:01
1:03:01
Play later
Play later
Lists
Like
Liked
1:03:01
NEW! Text Us Direct Here! Don't miss the video interview for details: https://youtu.be/-G7hbLGDK9o Steve Orrin, Federal CTO for Intel, discusses secrets inside zero trust and r latest cyber security concerns. He is a recognized security leader and public speaker. Steve has orchestrated projects for federal government agencies on Security and AI. St…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
New Approaches to Enter the Cybersecurity Field
53:02
53:02
Play later
Play later
Lists
Like
Liked
53:02
NEW! Text Us Direct Here! Sam Buckenmaier, a senior cyber leader, join us on what leadership means today and what employers want in cybersecurity. We discussed: new approaches to enter the cybersecurity field, how to have effective communication internally in business, advice on cybersecurity careers from top recruiters, approaches to enter cyberse…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
New Insight on True Cyber Crime Examples.
56:01
56:01
Play later
Play later
Lists
Like
Liked
56:01
NEW! Text Us Direct Here! What we all need to know about How Psychology Affects Security. Psychology of Online Security. Topics: behind scenes cyber criminals, best ways to protect business from cyber crime, cyber crime gang discussions, exposing cyber crime gangs, exposing secrets of cyber crime gangs, how can we spot fraud in business, how to lim…
…
continue reading
NEW! Text Us Direct Here! Video Episode here! Jon DiMaggio, Senior Security Strategist with https://analyst1.com and former NSA analyst, author of The Art of Cyber Warfare (https://a.co/d/72qKbc4) joins us for an exclusive discussion on the cyber crime take down story of LOCKBIT. Chapters 00:00 Introduction and Background 08:10 Financial Aspects of…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Impact of AI on Business Cyber Risk
1:11:24
1:11:24
Play later
Play later
Lists
Like
Liked
1:11:24
NEW! Text Us Direct Here! Experts Nick Mullen and Nick Oles discuss artificial intelligence and the impact of ai on business cyber risk. They share their personal stories of how they got into the field and highlight the importance of understanding the analogies between physical and cybersecurity controls. Nick Oles is author of How to Catch a Phish…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Innovative Ways to Reduce Website Spoofing
1:00:45
1:00:45
Play later
Play later
Lists
Like
Liked
1:00:45
NEW! Text Us Direct Here! After years in the industry, inventing and exploring emerging technologies, Gideon Hazam, Co-Founder, COO and CSM at Memcyco, https://www.memcyco.com/home found a way to solve a problem outside the normal cybersecurity approaches. He joins us behind the scenes to discuss innovative ways to reduce website spoofing. Key Topi…
…
continue reading
NEW! Text Us Direct Here! The US has signed into new law the Ban of Tik Tok effective in January. What does this mean? Topics: US Tik Tok ban. What to know, online privacy andTik Tok, national security risks from social media, identity protection in light of TikTok, why social media platforms are national security risks, why social media platform i…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
How Secrets in Hostage Negotiation created Never Split The Difference. Pt 2.
30:37
30:37
Play later
Play later
Lists
Like
Liked
30:37
NEW! Text Us Direct Here! Chris Voss joins us to go INSIDE the famous negotiation model he created and share secrets behind Never Split the Difference, from the #1 Wall Street Journal best-selling book on Negotiation. Chris is the most decorated FBI hostage negotiator in history. He teaches his techniques at Harvard Law, Georgetown University, and …
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Inside Story of Chris Voss and Never Split The Difference Pt 1
38:07
38:07
Play later
Play later
Lists
Like
Liked
38:07
NEW! Text Us Direct Here! Chris Voss, founder of the Black Swan Group, joins us to share the story behind Never Split The Difference, the #1 Wall Street Journal best selling book on Negotiation. The most decorated FBI hostage negotiator in history, Chris Voss teaches his model Harvard Law, Georgetown University and others. Key Takeaways how never s…
…
continue reading
NEW! Text Us Direct Here! When technology can do everything for us, what is left? Imagination. That is the intrigue in a soon-to-be-released book coming by Dr Lydia Kostopoulos, who holds a PHD in International Relations, Security and Political Science, having attended the Harvard Kennedy school for Cybersecurity. We discuss: · ways to grow brands …
…
continue reading
![Artwork](/static/images/128pixel.png)
1
How to Save Yourself. Ransomware, Back ups and more.
1:00:04
1:00:04
Play later
Play later
Lists
Like
Liked
1:00:04
NEW! Text Us Direct Here! Great discussion with Gabe Gambill. VP with Quorum. Topics discussed: best ways to limit cyber attack liability, brand protection with identification authentication, how to limit liability from cyber attacks, newest findings on ransomware cyber crime gangs, undercover findings on ransomware cyber crime gangs, pitfalls of d…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Lawyer's Unleashed. Top Ways to Reduce Risk in Cyber Breach Litigation.
1:05:18
1:05:18
Play later
Play later
Lists
Like
Liked
1:05:18
NEW! Text Us Direct Here! Jamey Davidson, Partner at international law firm O’Hagan Meyer (https://ohaganmeyer.com). Jamey concentrates on top ways to reduce risk in cyber breach litigation, defending businesses in cyber breach class-action law suits and how to build defenses to reduce cyber breach liability. We discuss: · How Cyber Breach Litigati…
…
continue reading
NEW! Text Us Direct Here! From Rupert Murdoch's global entertainment ambition to a dead hacker found hanging from a tree in a park in Germany, this true cyber crime story spans over a decade in the cut-throat Satellite TV wars, involving colorful characters, pirates, big business, technology advances and failures and those who entered the darker si…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
The Story Behind the Sony Data Breach 2014
49:25
49:25
Play later
Play later
Lists
Like
Liked
49:25
NEW! Text Us Direct Here! This is the True Cyber Crime Story of “The Day the Lights Went Out at Sony Pictures” in 2014. Discussion about then events, what led to it, the formal findings and open questions remaining by experts. Hosts David Mauro and Mark Mosher explore their research with Special Guest, professional coach Rich Moore. Summary The con…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
New Ways to Take Control Over Data Privacy with Kurt Long.
58:24
58:24
Play later
Play later
Lists
Like
Liked
58:24
NEW! Text Us Direct Here! Kurt Long CEO and founder of BUNKR (https://www.bunkr.life/) an affordable all-in-one app with secure messaging, password management, and secure file storage. We discuss new approaches to safe and private messaging apps, how to keep criminals out of your private data, and why online privacy is important to freedom. Chapter…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Modern Ways to Improve Presentation Skills with Nausheen Chen.
52:56
52:56
Play later
Play later
Lists
Like
Liked
52:56
NEW! Text Us Direct Here! Nausheen Chen joins us. She is a wildly popular professional public speaking coach with clients like leaders at Google, Amazon and huge brands like Timberland and more. Check out her site:www.speaking.coach Nausheen has a free course we encourage you to check out! https://www.speaking.coach/free-course/ She shares her insi…
…
continue reading