Cyber Crime Junkies Host David Mauro public
[search 0]
More
Download the App!
show episodes
 
Artwork

1
Cyber Crime Junkies

Cyber Crime Junkies. Host David Mauro.

Unsubscribe
Unsubscribe
Weekly+
 
Socializing Cybersecurity. Translating Cyber into business terms. Newest AI, Social Engineering and Ransomware Attack Insight to Protect Businesses and Reduce Risk. Latest Cyber News from the Dark web, research and insider info. Interviews of Global Technology Leaders, sharing True Cyber Crime stories and advice on how to manages cyber risk. Find all content at www.CyberCrimeJunkies.com and videos on YouTube @CyberCrimeJunkiesPodcast
  continue reading
 
Loading …
show series
 
NEW! Text Us Direct Here! Crypto News, Cyber flash point about self-proclaimed Bitcoin killer, OneCoin. rise and fall of crypto star FBI most wanted, Ruja Ignatova. To Submit a TIP and Potentially collect the new $5 Million Reward, you can submit a tip online at www.tips.FBI.gov Or Call 1-800-CALL-FBI The rise and fall of ONE COIN and the hunt for …
  continue reading
 
NEW! Text Us Direct Here! Joining us is Matthew Rosenquist, a renowned CISO, Cybersecurity leader and strategist, about the role of security leadership, cultural differences on data privacy, importance of choosing trustworthy vendors, and how to stop zero day attacks. Connect with Matthew: Webpage: www.cybersecurityinsights.us LinkedIn: https://www…
  continue reading
 
NEW! Text Us Direct Here! In today's cyber flash point, we show you how to digest recent data breaches and how to take action against cyber crime. Have you ever wondered how a single cyberattack can cripple an entire industry? Or how businesses can recover from such a devastating blow? Ever realize the cyber security risks from SaaS platforms? Toda…
  continue reading
 
NEW! Text Us Direct Here! Former FBI Special Agent who served with the FBI’s original Cyber Crime division, well respected public speaker, author and TV consultant on personal cybersecurity education Scott Augenbaum joins David Mauro in the studio. We discuss: how a cyber security mindset works, how fbi fights cyber crime, personal cybersecurity ed…
  continue reading
 
NEW! Text Us Direct Here! Richard Hollis of Risk Crew (https://www.riskcrew.com) in London joins Cyber Crime Junkies studio (https://cybercrimejunkies.com) for exclusive discussion on: cyber security differences between US versus UK, how cybersecurity efforts usually fail and Difference between customers or enemies. Don't miss the video episode: ht…
  continue reading
 
NEW! Text Us Direct Here! Mishaal Khan, Best-selling Author of The Phantom CISO, Founder of Operation Privacy, and vCISO at Mindsight, joins David Mauro to discuss: how to keep your digital footprint safe, how to improve your digital hygiene, and how everyone is responsible for cyber security. https://www.phantomciso.com/ https://www.operationpriva…
  continue reading
 
NEW! Text Us Direct Here! Kurt Long, founder and CEO of a privacy-based messaging app BUNKR (https://www.bunkr.life/) join David Mauro to discuss: how civil discourse helps our country, Newest Ways To Take Control Over Data Privacy, and why protecting online privacy is important. Summary The conversation explores the topics of data privacy, governm…
  continue reading
 
NEW! Text Us Direct Here! We're thrilled to introduce Season 5 Cyber Flash Points to show what latest tech news means to online safety with short stories helping spread security awareness and the importance of online privacy protection. A fresh, exciting twist to our podcast this season! "Cyber Flash Points" – your go-to source for practical and co…
  continue reading
 
NEW! Text Us Direct Here! David Mauro interviews Merry Marwig, a data privacy advocate, and Jeff Jockisch, founder of Obscure IQ, about how data brokers work and how to delete your data by discussing the intersection of privacy and personal data. They discuss the role of data brokers, the lack of transparency in data collection, and the potential r…
  continue reading
 
NEW! Text Us Direct Here! The Williams Woods Story. What Happens when Your Identity is Stolen. Video Episode: https://youtu.be/mBU3J-4vKww Accelerate your CMMC 2.0 compliance and address federal zero-trust requirements with Kiteworks' universal, secure file sharing platform made for every organization, and helpful to defense contractors. Visit kite…
  continue reading
 
NEW! Text Us Direct Here! Catch the Video episode: https://youtu.be/zMNsjSGT-yw Aaron Painter, former global executive at Microsoft, discusses the rising risks of deepfakes, how deep fake videos increase security risks, and how mobile-based identity verification helps like the new company he founded called Nametag. In this story David Mauro intervi…
  continue reading
 
NEW! Text Us Direct Here! Many leaders have concerns about employees using AI safely. We explain how to do so in this video. Today we sit with Bill Kleyman-founder of Apolo.us, a pioneer and leader in the space about his efforts for the safe use AI and how to reduce risks with employee use of AI. This is the story of Bill Kleyman and how AI can be …
  continue reading
 
NEW! Text Us Direct Here! How Equality Is Addressed in Cyber Security Field. We talk head-on about how equality is addressed in cyber security field. We address:, inequality in cyber security, ways to stop bias in cyber security, and the glass ceiling in cyber security. Lynn Dohm, head of Women in Cyber Security (WiCyS) and one of the top women in …
  continue reading
 
NEW! Text Us Direct Here! Video Episode: https://youtu.be/oH7FpvHOhVA This is the story of Matt Smallman, author of “Unlocking Your Call Centre”, about how call centers can be security risks. Our discussion gives exclusive insight into how biometrics fail in security, problems with voice authentication and explore military tactics and biometrics. W…
  continue reading
 
NEW! Text Us Direct Here! Richard Hollis of Risk Crew in London joins Cyber Crime Junkies studio discussing key topics: why cybersecurity efforts usually fail and customers or enemies online. Video episode: https://youtu.be/QQ8l1PaDaUI Topics: 💡how cybersecurity efforts usually fail, 💡customers or enemies online 💡best practices for businesses to li…
  continue reading
 
NEW! Text Us Direct Here! Don't miss the video interview for details: https://youtu.be/-G7hbLGDK9o Steve Orrin, Federal CTO for Intel, discusses secrets inside zero trust and r latest cyber security concerns. He is a recognized security leader and public speaker. Steve has orchestrated projects for federal government agencies on Security and AI. St…
  continue reading
 
NEW! Text Us Direct Here! Sam Buckenmaier, a senior cyber leader, join us on what leadership means today and what employers want in cybersecurity. We discussed: new approaches to enter the cybersecurity field, how to have effective communication internally in business, advice on cybersecurity careers from top recruiters, approaches to enter cyberse…
  continue reading
 
NEW! Text Us Direct Here! What we all need to know about How Psychology Affects Security. Psychology of Online Security. Topics: behind scenes cyber criminals, best ways to protect business from cyber crime, cyber crime gang discussions, exposing cyber crime gangs, exposing secrets of cyber crime gangs, how can we spot fraud in business, how to lim…
  continue reading
 
NEW! Text Us Direct Here! Video Episode here! Jon DiMaggio, Senior Security Strategist with https://analyst1.com and former NSA analyst, author of The Art of Cyber Warfare (https://a.co/d/72qKbc4) joins us for an exclusive discussion on the cyber crime take down story of LOCKBIT. Chapters 00:00 Introduction and Background 08:10 Financial Aspects of…
  continue reading
 
NEW! Text Us Direct Here! Experts Nick Mullen and Nick Oles discuss artificial intelligence and the impact of ai on business cyber risk. They share their personal stories of how they got into the field and highlight the importance of understanding the analogies between physical and cybersecurity controls. Nick Oles is author of How to Catch a Phish…
  continue reading
 
NEW! Text Us Direct Here! After years in the industry, inventing and exploring emerging technologies, Gideon Hazam, Co-Founder, COO and CSM at Memcyco, https://www.memcyco.com/home found a way to solve a problem outside the normal cybersecurity approaches. He joins us behind the scenes to discuss innovative ways to reduce website spoofing. Key Topi…
  continue reading
 
NEW! Text Us Direct Here! The US has signed into new law the Ban of Tik Tok effective in January. What does this mean? Topics: US Tik Tok ban. What to know, online privacy andTik Tok, national security risks from social media, identity protection in light of TikTok, why social media platforms are national security risks, why social media platform i…
  continue reading
 
NEW! Text Us Direct Here! Chris Voss joins us to go INSIDE the famous negotiation model he created and share secrets behind Never Split the Difference, from the #1 Wall Street Journal best-selling book on Negotiation. Chris is the most decorated FBI hostage negotiator in history. He teaches his techniques at Harvard Law, Georgetown University, and …
  continue reading
 
NEW! Text Us Direct Here! Chris Voss, founder of the Black Swan Group, joins us to share the story behind Never Split The Difference, the #1 Wall Street Journal best selling book on Negotiation. The most decorated FBI hostage negotiator in history, Chris Voss teaches his model Harvard Law, Georgetown University and others. Key Takeaways how never s…
  continue reading
 
NEW! Text Us Direct Here! When technology can do everything for us, what is left? Imagination. That is the intrigue in a soon-to-be-released book coming by Dr Lydia Kostopoulos, who holds a PHD in International Relations, Security and Political Science, having attended the Harvard Kennedy school for Cybersecurity. We discuss: · ways to grow brands …
  continue reading
 
NEW! Text Us Direct Here! Great discussion with Gabe Gambill. VP with Quorum. Topics discussed: best ways to limit cyber attack liability, brand protection with identification authentication, how to limit liability from cyber attacks, newest findings on ransomware cyber crime gangs, undercover findings on ransomware cyber crime gangs, pitfalls of d…
  continue reading
 
Loading …

Quick Reference Guide