show episodes
 
Artwork
 
Explore the critical world of information security, innovation, and compliance with expert guests. Learn about the latest threats, tips, and trends in the rapidly evolving cybersecurity environment.
  continue reading
 
Are you overwhelmed by all of the "cyber" security threats and potential solutions? Learn how to protect yourself and all of your devices from evil hackers, viruses, ransomware, fraud, account hijacking and more! Let us be your guide to security and privacy online. We’ll help you understand how attackers are bypassing security and practical ways to protect yourself online. Whether you are a seasoned technology geek, or just had your first experience with a virus on your PC, this podcast is f ...
  continue reading
 
Are you overwhelmed by all of the "cyber" security threats and potential solutions? Learn how to protect yourself and all of your devices from evil hackers, viruses, ransomware, fraud, account hijacking and more! Let us be your guide to security and privacy online. We’ll help you understand how attackers are bypassing security and practical ways to protect yourself online. Whether you are a seasoned technology geek, or just had your first experience with a virus on your PC, this podcast is f ...
  continue reading
 
Artwork

1
CISO Talk

Techstrong Group

Unsubscribe
Unsubscribe
Monthly+
 
What keeps CISOs up at night? What are the vexing challenges CISOs face today and tomorrow? We frequently learn the most from others in similar security roles to our own. Join us in this bi-weekly video series with your hosts, Mitch Ashley, CTO Techstrong Group/Principal Techstrong Research, and Jennifer Minella, founder and principal advisor of Viszen Security, as they engage with leading security leaders and experts about the latest cybersecurity topics.
  continue reading
 
Artificial Intelligence, cloud computing, collaboration and devices such as smartphones and tablets are changing how we work. This podcast will help business and IT leaders understand what's new and how to create best practices for adopting disruptive technologies and services in the workplace.
  continue reading
 
Want less clutter in your business, home, and digital life? Join brilliant podcaster and multi-non-awarding winning writer W.P. Norman every week and learn how to systematize your life and business, as well as get rid of the clutter from your desks, closets, business, fill in the blank, mobile phones, and computers. Each podcast contains at least one succulent and non-cliche actionable, disruptive, totally awesome, granular, deep dive tip that will help you declutter your home, your mind, yo ...
  continue reading
 
Loading …
show series
 
By the time Ken understood what happened, his similar-looking identity thief had walked off with $8,000. In this episode, we learn about a vulnerability courtesy the DMV and what an enterprising identity thief was able to do with it. Eva Velasquez from the Identity Theft Resource Center offers tips on safeguarding yourself. Plus: the pros and cons …
  continue reading
 
As technology is integrated deeper into classrooms, the lines between education and data privacy have been destroyed by for-profit data miners. This week, privacy advocate Shannon Edwards reveals how educational apps harvest sensitive information from children, commodify their data, and what parents can do to fight it. Learn more about your ad choi…
  continue reading
 
Whim wanted to teach overseas. While based on the coast of Portugal, she was offered a teaching position from two employers. She didn’t know that she was about to end up with no job at all, narrowly avoiding getting taken for a bundle of dough. Also in this episode: Adam continues to hack Beau in every way imaginable. Learn more about your ad choic…
  continue reading
 
How do we predict the future? In our respective technology and security fields we are often asked to prognosticate on “what’s next?”. Understanding current trends is certainly helpful but what if you could reach far into the future and describe humanity and our relative progress? In this week's episode of SecureTalk we host an Associate Professor o…
  continue reading
 
The isolation caused by the Covid pandemic led to record pet adoptions, and more than usual activity online. It was like chum to sharks for scammers who flooded social media accounts with adoption opportunities for popular breeds. This week’s guest, Holly got in touch with us about her friend Carl who joins us too to talk about his St. Bernard-size…
  continue reading
 
Elizabeth Warren put the kibosh on bad banking practices with her vision for the Consumer Financial Protection Bureau and now, with the Digital Consumer Protection Commission Act, she’s taking on Big Data. She joined us to talk about reigning in the Wild West of online life. Learn more about your ad choices. Visit megaphone.fm/adchoices…
  continue reading
 
There are tens of millions of small and medium-size businesses in the United States alone, and depending on their state incorporation, many are in danger of business identity theft. Andy Pham is an American hero by many standards, for sure with regard to the right to become wildly successful. He’s truly living the American Dream. Having grown up in…
  continue reading
 
Like many of us, Joyce spent hours during the Covid lockdown connecting with friends by playing games online--in her case a MahJong app. Imagine her surprise when using a legitimate app to find a scammer trying to empty her entire bank account. The most likely culprit? You will rethink your game time when you hear what it was. Learn more about your…
  continue reading
 
We’ve all been there. You see something perfect online, you do all the clicks and then think, “Wait, was that legit?” Scam-lite transactions are the way of the web these days, whether it’s direct-from-manufacturer or super-sticky subscriptions, we have your back. Learn more about your ad choices. Visit megaphone.fm/adchoices…
  continue reading
 
Kristen Bride’s 16-year-old son died by suicide after being cyberbullied on Snapchat. Setting her sites on anonymous messaging apps that intentionally traumatize children, Bride heads to Washington DC to fight for change. Learn more about your ad choices. Visit megaphone.fm/adchoicesBy Loud Tree Media
  continue reading
 
Immediately following his AWS re:Inforce 2024 Keynote talk, AWS CISO Chris Betz joins Mitch Ashley on CISO Talk. Chris shares his comprehensive approach to security, including creating a culture of security, AWS chip security, secure programming languages like Rust, securing AI and the data AI uses, and more. Mitch considers Chris Betz an example o…
  continue reading
 
Recent collaborative actions by U.S. and international law enforcement against ransomware rings such as LockBit, BlackCat, and Ragnar Locker serve as a critical wake-up call for CISOs and security leaders. These operations highlight ransomware’s sophistication and pervasive nature, emphasizing the need for robust incident response measures that may…
  continue reading
 
Ransomware is a type of malware that allows hackers to commandeer data on a device or an entire network. Increasingly, the threat actors behind these crimes set their sites on mission critical targets. We talked about it with renowned cybersecurity expert Keren Elazari this week. Learn more about your ad choices. Visit megaphone.fm/adchoices…
  continue reading
 
From handshake deals to digital pat-downs, the rental market is filled with great opportunities (that is, for scammers). Our very own producer, Andrew Steven recently got some first-hand experience when he and his partner tried to find a new place. Learn more about your ad choices. Visit megaphone.fm/adchoices…
  continue reading
 
AI is everywhere – in the news, on our devices, assisting us, making life easier for us, and for criminals, too, harnessing AI to swindle people more efficiently. What’s next? We dive into the dark side of AI and ask two experts: Could AI commit the perfect crime? Learn more about your ad choices. Visit megaphone.fm/adchoices…
  continue reading
 
Did you know that you can activate malware on your computer just by looking at an image posted in the comments of an online discussion? We're big on good cyber hygiene. Our first episode provides an important life lesson: Always use a burner computer to troll your enemies. And of course beware of evil clowns. Check out Roy’s story about the time he…
  continue reading
 
Max McCoy stumbled on a $47 million swindle that starts just north of the Oklahoma panhandle and bounces to Australia before things get really confusing in a haze of small town corruption, secretive law enforcement and competing theories. Learn more about your ad choices. Visit megaphone.fm/adchoices…
  continue reading
 
Growing up in the shadow of child identity theft can be a struggle. For Axton Betz-Hamilton, her discovery of the culprit led to the shock of a lifetime. In the second installment of this two-part episode, we examine the massive financial and emotional toll of finding out a loved one wasn’t all that they seemed, and how to recover. Also discussed: …
  continue reading
 
By the time most people find out that they’ve been the victim of child identity theft, their credit is trashed. That’s what happened to Axton Betz-Hamilton. And like most victims of child identity theft, she was targeted by someone she knew. In the first installment of this two-part episode, the mystery of who stole Axton’s identity unravels in a v…
  continue reading
 
Paul Raffile was in national security and corporate threat assessment before (almost) running human exploitation investigations for a major social media company (therein lies this week’s tale). He talked with us about this "silent epidemic” and vanishing job offers. Learn more about your ad choices. Visit megaphone.fm/adchoices…
  continue reading
 
Beth sent more than $26,000 to a man she met on Tinder. It was a romance scam, but one that brought complex storytelling, nuanced psychology and even acting skills to bear in a way that shocked even us. Check out this week’s episode to hear just how “good” romance scammers can be. Learn more about your ad choices. Visit megaphone.fm/adchoices…
  continue reading
 
Kara Swisher has been covering Silicon Valley since the early days, and she’s made a ton of enemies the old fashioned way (by telling the truth about the new robber barons of our digital lives). In a new memoir called Burn Book, she pulls the curtain back on a world run by powerful babies. Learn more about your ad choices. Visit megaphone.fm/adchoi…
  continue reading
 
Elizabeth Warren put the kibosh on bad banking practices with her vision for the Consumer Financial Protection Bureau and now, with the Digital Consumer Protection Commission Act, she’s taking on Big Data. She joined us to talk about reigning in the Wild West of online life. Learn more about your ad choices. Visit megaphone.fm/adchoices…
  continue reading
 
Becky Holmes loves DMing with scammers. When it comes to romance scammers, she will do whatever it takes, pursuing them to the great delight of her fans on social media. From flings with A-listers to the lantern-jawed soldier with a heart of gold, Becky's on a mission to unravel the weird world of online swindler love. Learn more about your ad choi…
  continue reading
 
Erin West is the Deputy District Attorney in Santa Clara County, California, and the founder of Project Shamrock. Whether she’s prosecuting eye-popping SIM-swap money grabs or putting large-scale pig butchering operations out of business, her stories and experience can help you stay safer. Learn more about your ad choices. Visit megaphone.fm/adchoi…
  continue reading
 
No one is immune from being scammed. Just ask Tarah Wheeler, founder and CEO of Red Queen Dynamics, a company that specializes in keeping people scam-free. While onboarding a new hire, a process she put in place stopped a scammer despite a serious cyber misstep. “What the Hack with Adam Levin” is available wherever you get your podcasts. If you lik…
  continue reading
 
Who better to talk to about pan-African crime syndicates than someone tasked with shutting them down? From drug mules and sextortion to romance scams and spearphishing, this week’s talk with Secret Service Agent “Mark” pulls back the curtain on Black Axe and other crime rings operating worldwide. “What the Hack with Adam Levin” is available whereve…
  continue reading
 
Every part of life that comes in contact with the Internet is tracked, packed and sold to a a seemingly infinite network of data brokers. Caitlin Sarian AKA Cybersecurity Girl joined us this week to discuss why scrubbing your information is trickier than it sounds and what you can do about it. “What the Hack with Adam Levin” is available wherever y…
  continue reading
 
Think you’re too savvy to get scammed? Author and activist Cory Doctorow explains how we’re all one muffaletta and a malfunctioning jet door away from falling prey to the most basic of cons. He joins us this week to talk about that and to fill us in about his new book, “The Bezzle.” “What the Hack with Adam Levin” is available wherever you get your…
  continue reading
 
Presley Rhodes makes a living posting what she calls “the subtle art of the thirst trap.” Popular on Instagram, she uses that platform to draw her most parched followers to OnlyFans where she can get paid. But what happens when a scammer buys access to those images? Nothing good. To hear what happened (and try to figure it out) we talked to someone…
  continue reading
 
CISO Talk finishes 2023 with a year-end review hosted by Mitch Ashley (Techstrong Research) and Jennifer Minella (Viszen Security), joined by Allison Miller (executive security leader) and Dan Glass (CISO, NTT DATA). Our cyber leaders reflect on the rapid rise of generative AI (and whether it lives up to its billing), the career and legal risks of …
  continue reading
 
Anton Chuvakin, security advisor at Office of the CISO at Google Cloud and former Gartner distinguished analyst, joins Mitch and JJ to discuss AI and its security implications, software supply chain security and moving and securing workloads in the cloud, including its similarities and differences from operating in traditional data centers.…
  continue reading
 
SNAP food assistance is a lifeline for more than 40 million Americans experiencing food insecurity. In a growing trend, criminals are targeting major security lapses in SNAP fund distribution, stealing millions in aid, so we asked this week’s guests how we can put a stop to it. “What the Hack with Adam Levin” is available wherever you get your podc…
  continue reading
 
Brett Johnson has been called the Godfather of cyber crime. He was on the FBI’s most-wanted list. And he was on What the Hack before! He returns for a freewheeling conversation about what’s new in cybercrime, how it’s changed and wants you to know how to better protect your digital life. “What the Hack with Adam Levin” is available wherever you get…
  continue reading
 
Romance scammers spend a lot of time on dating apps, but they almost never meet their targets in person. Christina’s Mr. Right moved quickly. Charming in-person, he lived in the same area and worked in the same industry. It was only after she committed to building a new life with him in Florida that everything began to fall apart. “What the Hack wi…
  continue reading
 
Privacy matters for most of us, but it can be a matter of life and death for some especially when it comes to stalkerware. Electronic Frontier Foundation director of cybersecurity Eva Galperin joined us this week to teach us about the way too common software that can be used to track your every move. “What the Hack with Adam Levin” is available whe…
  continue reading
 
Tim Byrne’s vintage industrial furniture designs are a staple for A-Listers and designers around the world, which puts him in the sites of scammers–whether the target is time, money or goods. Listen as we learn how Byrne’s keen eye for the masterpiece lurking in a hunk of old factory equipment helps him spot thieves before they can strike. “What th…
  continue reading
 
Ever wonder why facial recognition is so accurate? Well, one reason is the shocking amount of personal data it needs (think: all the world’s snapshots), and that’s why Vermont Attorney General Charity Clark is taking aim at the industry behind that technology. We also review Charity’s top scams to watch for this year, and other topics near and dear…
  continue reading
 
Retired attorney Marjorie Bloom was minding her own business online when a tech support scam redirected her straight to cybercrime hell. Hear how she lost more than $600,000 in this harrowing tale of a scam turducken. “What the Hack with Adam Levin” is available wherever you get your podcasts. If you like it, consider rating us on your favorite pod…
  continue reading
 
Criminologist David Maimon is in the business of finding out what we should be scared of. Just when you thought analog bill paying was safe, we learned that check scams are on the rise. And you guessed it: Because artificial intelligence and digital tools are making them way too easy. “What the Hack with Adam Levin” is available wherever you get yo…
  continue reading
 
From a pig butchering scam that cost $450,000 to a real estate scam that almost cost a whole lot more, 2023 kept us guessing. With stories sometimes tragic, sometimes funny, and always informative, we’re celebrating the New Year with a look back at some of our favorite moments from the past twelve months. “What the Hack with Adam Levin” is availabl…
  continue reading
 
When it comes to scams, we usually focus on the How rather than the Why. This week, we spoke to psychologist Dan Simons, co-author of Nobody’s Fool to find out why we’re all much easier marks than we like to think. “What the Hack with Adam Levin” is available wherever you get your podcasts. If you like it, consider rating us on your favorite podcas…
  continue reading
 
Many romance scams are smash-and-grab operations, but some scammers play the long game. Author, actress, life coach and cabaret singer Donna Hayes met her dream man online, but after a seemingly perfect courtship and almost $200K in cash changing hands, she discovered the truth. Learn more about your ad choices. Visit megaphone.fm/adchoices…
  continue reading
 
Shark Week doesn’t have anything on the Christmas scam season. Whether you’re buying something or selling something, there’s a scammer waiting to rob you blind. But there are ways to stay safe. File this week’s episode under: “You can’t say we didn’t warn you.” Learn more about your ad choices. Visit megaphone.fm/adchoices…
  continue reading
 
How dangerous is the internet for children? According to Marija Manojlovic, it’s even worse than we imagined. This week we chart the dangerous freeways and dark alleys of the internet, the hazards they pose specifically to children and what you can do to protect them. Learn more about your ad choices. Visit megaphone.fm/adchoices…
  continue reading
 
With a million followers and several books on kitten care, Hannah Shaw is no stranger to interview requests and the technical issues to which they often give rise. But when a podcaster helped her navigate a “problem” in her Meta settings, Kitten Lady was hacked. Hear how her eye for deceit and nimble action saved the day. Learn more about your ad c…
  continue reading
 
On this week’s episode a veteran journalist helps us explore our usual beat from a new point of view. CBS Washington Correspondent Major Garrett is the host of “Agent of Betrayal: The Double Life of Robert Hanssen” and an absolutely stellar guide as we parse the similarities and differences between spies and hackers. Learn more about your ad choice…
  continue reading
 
Loading …

Quick Reference Guide