podcast
details
.com
Print
Share
Look for any podcast host, guest or anyone
Search
Showing episodes and shows of
The Small Business CyberSecurity Guy
Shows
The Small Business Cyber Security Guy | Cybersecurity for SMB & Startups
Reverse Benchmarking: Learn from the Biggest Cyber Faceplants
What if the best way to protect your business isn't copying what the successful companies do, but avoiding what the failures did wrong? Welcome to reverse benchmarking, the cybersecurity equivalent of learning from other people's face-plants so you don't repeat them. In this episode, Noel and Mauven flip traditional benchmarking on its head. Instead of asking "what are the best companies doing?", they explore the far more revealing question: "what did the disasters get catastrophically wrong?" From the Target breach via an HVAC vendor to ransomware attacks on UK holiday parks, the hosts dissect spectacular cybersecurity failures...
2025-12-01
25 min
The Small Business Cyber Security Guy | Cybersecurity for SMB & Startups
Reverse Benchmarking: Learn from the Biggest Cyber Faceplants
What if the best way to protect your business isn't copying what the successful companies do, but avoiding what the failures did wrong? Welcome to reverse benchmarking, the cybersecurity equivalent of learning from other people's face-plants so you don't repeat them. In this episode, Noel and Mauven flip traditional benchmarking on its head. Instead of asking "what are the best companies doing?", they explore the far more revealing question: "what did the disasters get catastrophically wrong?" From the Target breach via an HVAC vendor to ransomware attacks on UK holiday parks, the hosts dissect spectacular cybersecurity failures...
2025-12-01
25 min
The Small Business Cyber Security Guy | Cybersecurity for SMB & Startups
Prison for Negligent Directors? Rebooting UK Cyber Enforcement
In this provocative second instalment of the accountability series, hosts Noel Bradford and Mauven MacLeod lay out a detailed proposal for a UK cybersecurity enforcement regime that balances protection for small businesses with personal liability for negligent directors. They compare the current weak regulatory approach to the Health and Safety Executive model, cite international evidence from Singapore, and explore why criminal consequences — up to fines, disqualification and, in extreme cases, prison — might be necessary to change boardroom behaviour. The episode explains a three-tier framework: Tier 1 (micro and small businesses) protected by Cyber Essentials and criminal liability only for...
2025-11-24
37 min
The Small Business Cyber Security Guy | Cybersecurity for SMB & Startups
Prison for Negligent Directors? Rebooting UK Cyber Enforcement
In this provocative second instalment of the accountability series, hosts Noel Bradford and Mauven MacLeod lay out a detailed proposal for a UK cybersecurity enforcement regime that balances protection for small businesses with personal liability for negligent directors. They compare the current weak regulatory approach to the Health and Safety Executive model, cite international evidence from Singapore, and explore why criminal consequences — up to fines, disqualification and, in extreme cases, prison — might be necessary to change boardroom behaviour. The episode explains a three-tier framework: Tier 1 (micro and small businesses) protected by Cyber Essentials and criminal liability only for...
2025-11-24
37 min
The Small Business Cyber Security Guy | Cybersecurity for SMB & Startups
When Ransomware Kills: Should Directors Face Prison for Cyber Negligence?
What happens when business negligence causes serious harm to thousands of people? If a faulty ladder injures someone, directors face prison time. If forty million people have their data stolen due to poor security, they receive a strongly worded letter. In this provocative first episode of our two-part series, Noel and Mauven examine the shocking disparity between health and safety enforcement and cybersecurity regulation in the UK. We compare the HSE's tough approach (prison sentences, director liability, millions in fines) with the ICO's gentle touch (guidance, occasional fines, zero criminal consequences). With 40 million voter records...
2025-11-17
42 min
The Small Business Cyber Security Guy | Cybersecurity for SMB & Startups
When Ransomware Kills: Should Directors Face Prison for Cyber Negligence?
What happens when business negligence causes serious harm to thousands of people? If a faulty ladder injures someone, directors face prison time. If forty million people have their data stolen due to poor security, they receive a strongly worded letter. In this provocative first episode of our two-part series, Noel and Mauven examine the shocking disparity between health and safety enforcement and cybersecurity regulation in the UK. We compare the HSE's tough approach (prison sentences, director liability, millions in fines) with the ICO's gentle touch (guidance, occasional fines, zero criminal consequences). With 40 million voter records...
2025-11-17
42 min
Family IT Guy Podcast
Sora: Why This New AI App Is a Predator’s Dream - What Parents Need to Know
456,000 sextortion reports in 2024. OpenAI's new Sora app combines 3 dangers that make this threat worse. OpenAI just released Sora, an AI video generation app being rolled out to teens. As a 30-year cybersecurity expert, I'm calling it a silver platter for predators. This video breaks down exactly why Sora is different from other social media apps and what specific dangers parents need to understand. - Why Sora's cameo feature creates permanent biometric data risks your family can't reverse - 65,000 AI-generated deepfake sextortion cases happened in 2024...
2025-11-12
04 min
Software Process and Measurement Cast
🔐AI, the Future of Work, and Cybersecurity, A Conversation with Ephraim Ebstein, SPaMCAST 878
AI, the Future of Work, and Cybersecurity Are Intertwined! Why it matters: Business processes are being transformed, yielding opportunities and RISKS - leaders should be aware. Bio: Ephraim Ebstein is the CEO and Co-founder of FIT Solutions, LLC. Ephraim is not just another cybersecurity guy-he's a $30M entrepreneur who built two national companies from the ground up, and now helps business leaders turn tech headaches into growth engines. .IG: @kingspear @fitsolutionsllc Ephraim Ebstein | LinkedIn https://fitsolutions.biz/ Web Mastering Work Intake sponsors SPaMCAST! Starting Everything Means Finishing Nothing One big thing: Poor work entry means delivering less. Why it matters...
2025-11-09
41 min
Family IT Guy Podcast
Getting Hired in Cybersecurity: What Hiring Managers Actually Look For (with Orlando Padilla)
Are you or your child interested in cybersecurity? Before spending $25K on a bootcamp, watch this conversation with an offensive security expert. Orlando Padilla shares brutal truths about breaking into the field - from bootcamp scams to what hiring managers actually want. In this conversation, you'll learn: - Why expensive bootcamps often fail to deliver job placement - How AI has completely changed tech hiring (and what to do about it) - How a chemistry major with no...
2025-11-08
1h 30
Family IT Guy Podcast
Roblox CEO on Fox News: ’400 AI Systems’ - I Tested It and Found Sexual Content
Roblox CEO claimed 'gold standard safety.' As a cybersecurity expert who tested it, here's what he didn't say on Fox News. I created an 8-year-old account with maximum parental controls active. Within 60 minutes, I found sexual content passing all filters. With 40 million children under 13 using this platform daily, every parent needs to understand what's actually happening - and why Roblox refuses to implement features that would genuinely protect kids. What I discovered: Sexual content in 'Public Bathroom Simulator' within 1 hour of testing Court-documented...
2025-11-06
04 min
Family IT Guy Podcast
Roblox Is Rated 12+ But Partners With Barbie and SpongeBob - Here’s What Parents Need to Know
Roblox announced 100 safety updates, but do they fix the fundamental problem? Here's what every parent needs to know. You may have heard about Roblox's new safety updates and wondered: "Does this finally make it safe for my kids?" You're not alone. With 40 million children under 13 playing Roblox every day, understanding what these updates actually address—and what they don't—is critical for making informed decisions about your family's safety. I'm Ben Gillenwater, the Family IT Guy. I've spent 30 years in cybersecurity, including time at the NSA, and I'm...
2025-10-14
05 min
The Small Business Cyber Security Guy | Cybersecurity for SMB & Startups
Extra Credit: The Corrections, The Code, and The Safeguarding Bombshell
We were wrapping up our interview with Tammy Buchanan about the Kido nursery breach when she said: "Actually, there were some really important points I forgot to make." So we grabbed another cup of tea, broke out the custard creams, and kept recording. Then, during the tea break, Graham discovered something on Twitter: VX-Underground, a credible malware research collective, had posted a screenshot of what appears to be a Kido GitHub repository containing API code. Files that typically contain system credentials. A potential smoking gun. In Part 2, Tammy reveals what was missed in P...
2025-10-13
35 min
The Small Business Cyber Security Guy | Cybersecurity for SMB & Startups
Extra Credit: The Corrections, The Code, and The Safeguarding Bombshell
We were wrapping up our interview with Tammy Buchanan about the Kido nursery breach when she said: "Actually, there were some really important points I forgot to make." So we grabbed another cup of tea, broke out the custard creams, and kept recording. Then, during the tea break, Graham discovered something on Twitter: VX-Underground, a credible malware research collective, had posted a screenshot of what appears to be a Kido GitHub repository containing API code. Files that typically contain system credentials. A potential smoking gun. In Part 2, Tammy reveals what was missed in P...
2025-10-13
35 min
CS4NE
Episode 20 - Cybersecurity with Kim Ingraham-Beck
In this solo episode of CS4NE, host Kimberly Ingraham-Beck shares her journey into cybersecurity education and why it has become one of her biggest passions. She highlights the critical demand for cybersecurity professionals, explores free classroom-ready resources from Cyber.org, TeachCyber.org, and CodeHS, and recommends professional learning opportunities like free bootcamps and certificates. With practical tips for both new and experienced teachers, Kimberly encourages educators to integrate cybersecurity into their curriculum and inspire the next generation of digital defenders.
2025-10-09
03 min
CS4NE
Episode 17 - NDE Curriculum with Special Guest Lucas Hartman
In this episode of CS4NE, hosts Guy Trainin and Kimberly Ingraham-Beck interview Lucas Hartman, an instructor at Metropolitan Community College and former high school computer science teacher. Lucas discusses the curriculum he developed for the Nebraska Department of Education to support the state’s new computer science graduation requirement. The course includes six engaging, hands-on modules that cover everything from digital citizenship and cybersecurity to computational thinking and programming, and it's designed to be accessible for teachers and students of all experience levels. Lucas highlights the flexibility, open-access nature, and teacher-friendly structure of the curriculum—making it a valu...
2025-10-09
17 min
Family IT Guy Podcast
2 Red Flags That Cover 90% of Online Threats to Children
The fastest-growing crime against children isn't happening at parks or schools - it's happening through anonymous online chat. Focus on just 2 digital dangers: addictive algorithms that steal attention, and anonymous chat that enables predators. This framework will change how you evaluate every app and platform for your kids. VIDEO NOTES: - 10,000+ monthly sextortion cases on Snapchat alone - Predators use games like Roblox to target children - "Bottomless feeds" are designed to capture attention ...
2025-09-29
03 min
The Small Business Cyber Security Guy | Cybersecurity for SMB & Startups
When Teen Hackers Test Your Defences: Lessons from the School Yard to the Boardroom
Join hosts Noel Bradford and Mauven McLeod in this Back-to-School special of the Small Business Cybersecurity Guy podcast as they trace a line from 1980s schoolroom mischief to modern, large-scale breaches that put millions of students and small organisations at risk. Through recollections of early BBC Model B and Novell-era antics, the episode uses real recent incidents to expose how weak passwords, written credentials and opportunistic insiders create systemic security failures. The episode unpacks headline-making investigations and statistics — including the ICO analysis showing that students are behind a majority of school data breaches, the PowerSchool compromise that af...
2025-09-29
41 min
The Small Business Cyber Security Guy | Cybersecurity for SMB & Startups
When Teen Hackers Test Your Defences: Lessons from the School Yard to the Boardroom
Join hosts Noel Bradford and Mauven McLeod in this Back-to-School special of the Small Business Cybersecurity Guy podcast as they trace a line from 1980s schoolroom mischief to modern, large-scale breaches that put millions of students and small organisations at risk. Through recollections of early BBC Model B and Novell-era antics, the episode uses real recent incidents to expose how weak passwords, written credentials and opportunistic insiders create systemic security failures. The episode unpacks headline-making investigations and statistics — including the ICO analysis showing that students are behind a majority of school data breaches, the PowerSchool compromise that af...
2025-09-29
41 min
Family IT Guy Podcast
Simple Fix for YouTube Kids Dangers - Cybersecurity Expert Shows How
30-year cybersecurity expert reveals why YouTube Kids isn't actually safe and what parents can do about it. My child's experience with nightmare-inducing content led me to research solutions that actually work. As both a cybersecurity professional and a dad, I've discovered that YouTube Kids has three major problems: addictive algorithmic design, inappropriate content infiltration, and low awareness of protective features. NOTES FROM THIS VIDEO: - YouTube Kids algorithms are designed to capture attention indefinitely - Sexual and violent content appears despite "...
2025-09-26
02 min
The Small Business Cyber Security Guy | Cybersecurity for SMB & Startups
£80M Blow: How Teenagers and One Phone Call Bankrupted Co-op's Cybersecurity
Co-op's CEO has just confirmed that their cybersecurity disaster cost £80 million. The attackers? Teenagers are using basic social engineering. In this Hot Takes episode, we break down how "We've contained the incident" turned into an £80 million earnings wipeout, and why the final bill could reach £400-500 million once legal claims are settled. This isn't just another breach story - it's a wake-up call for every UK business owner who thinks "it won't happen to us." Key Topics Covered The Attack Breakdown [0:30] April 2024 attack by the Scattered Spider group Social engineering, not sophisticated exploits 6.5 million mem...
2025-09-25
08 min
The Small Business Cyber Security Guy | Cybersecurity for SMB & Startups
£80M Blow: How Teenagers and One Phone Call Bankrupted Co-op's Cybersecurity
Co-op's CEO has just confirmed that their cybersecurity disaster cost £80 million. The attackers? Teenagers are using basic social engineering. In this Hot Takes episode, we break down how "We've contained the incident" turned into an £80 million earnings wipeout, and why the final bill could reach £400-500 million once legal claims are settled. This isn't just another breach story - it's a wake-up call for every UK business owner who thinks "it won't happen to us." Key Topics Covered The Attack Breakdown [0:30] April 2024 attack by the Scattered Spider group Social engineering, not sophisticated exploits 6.5 million mem...
2025-09-25
08 min
The Small Business Cyber Security Guy | Cybersecurity for SMB & Startups
81 Security Patches + Windows 10’s Final Countdown: What Every Business Owner Must Know
September 2025 Patch Tuesday: Critical Business Update Special Edition with Graham Falkner Microsoft's September Patch Tuesday brings 81 security fixes, including 9 critical vulnerabilities already being exploited by attackers. This episode provides essential business guidance for small business owners navigating these updates safely and efficiently. Key Topics Covered: Business impact of 81 security vulnerabilities Four critical threats affecting small businesses SharePoint Server active exploitation campaigns Network authentication bypass vulnerabilities 7-day practical deployment strategy Windows 10 end-of-life planning (October 14th deadline) Cyber Essentials compliance requirements Critical Action Items: Days 1-2: Assess SharePoint installations and document processing...
2025-09-11
12 min
The Small Business Cyber Security Guy | Cybersecurity for SMB & Startups
81 Security Patches + Windows 10’s Final Countdown: What Every Business Owner Must Know
September 2025 Patch Tuesday: Critical Business Update Special Edition with Graham Falkner Microsoft's September Patch Tuesday brings 81 security fixes, including 9 critical vulnerabilities already being exploited by attackers. This episode provides essential business guidance for small business owners navigating these updates safely and efficiently. Key Topics Covered: Business impact of 81 security vulnerabilities Four critical threats affecting small businesses SharePoint Server active exploitation campaigns Network authentication bypass vulnerabilities 7-day practical deployment strategy Windows 10 end-of-life planning (October 14th deadline) Cyber Essentials compliance requirements Critical Action Items: Days 1-2: Assess SharePoint installations and document processing...
2025-09-11
12 min
The Small Business Cyber Security Guy | Cybersecurity for SMB & Startups
Electoral Commission: 40 Million Hacked, Zero Fines - But Small Businesses Pay Thousands for Less
Episode Summary The Electoral Commission suffered a 14-month data breach affecting 40 million UK voters, yet faced zero ICO enforcement action. Meanwhile, small businesses receive crushing GDPR fines for minor infractions. This explosive episode exposes dangerous double standards leaving SMBs vulnerable while government bodies escape accountability. The Shocking Facts Breach Duration: 14 months (August 2021 - October 2022) Affected People: 40 million UK voters' data accessible Attack Method: ProxyShell vulnerabilities - patches available months before breach Attribution: Chinese state-affiliated actors (APT31) ICO Response: "No enforcement action taken" Security Failures That Would Destroy Small Businesses ...
2025-09-09
13 min
The Small Business Cyber Security Guy | Cybersecurity for SMB & Startups
Electoral Commission: 40 Million Hacked, Zero Fines - But Small Businesses Pay Thousands for Less
Episode Summary The Electoral Commission suffered a 14-month data breach affecting 40 million UK voters, yet faced zero ICO enforcement action. Meanwhile, small businesses receive crushing GDPR fines for minor infractions. This explosive episode exposes dangerous double standards leaving SMBs vulnerable while government bodies escape accountability. The Shocking Facts Breach Duration: 14 months (August 2021 - October 2022) Affected People: 40 million UK voters' data accessible Attack Method: ProxyShell vulnerabilities - patches available months before breach Attribution: Chinese state-affiliated actors (APT31) ICO Response: "No enforcement action taken" Security Failures That Would Destroy Small Businesses ...
2025-09-09
13 min
The Small Business Cyber Security Guy | Cybersecurity for SMB & Startups
60% of Small Businesses DIE After Cyberattacks - Are You Next?
🚨 SHOCKING: 60% of Small Businesses Shut Down Forever After Cyberattacks 96% of hackers target YOUR business, not big corporations. Think you're too small to be a target? Think again. Noel and Mauven reveal the brutal truth about cybersecurity that could save your business - or expose why you're already at risk. 💀 The Terrifying Reality: 82% of ransomware attacks target businesses under 1,000 employees Small business employees face 350% MORE attacks than enterprise workers Average cyber incident costs UK businesses £362,000 Only 17% of small businesses have cyber insurance 🛡️ What Y...
2025-09-08
26 min
The Small Business Cyber Security Guy | Cybersecurity for SMB & Startups
60% of Small Businesses DIE After Cyberattacks - Are You Next?
🚨 SHOCKING: 60% of Small Businesses Shut Down Forever After Cyberattacks 96% of hackers target YOUR business, not big corporations. Think you're too small to be a target? Think again. Noel and Mauven reveal the brutal truth about cybersecurity that could save your business - or expose why you're already at risk. 💀 The Terrifying Reality: 82% of ransomware attacks target businesses under 1,000 employees Small business employees face 350% MORE attacks than enterprise workers Average cyber incident costs UK businesses £362,000 Only 17% of small businesses have cyber insurance 🛡️ What Y...
2025-09-08
26 min
The Small Business Cyber Security Guy | Cybersecurity for SMB & Startups
48 Hours to Zero: How Ransomware Destroyed a 158-Year Business
K&P Logistics — 158 years in business — wiped out in 48 hours by ransomware. Noel Bradford and Maurven MacLeod unpack that real-world catastrophe to show small businesses how the same fate can be avoided. If you run a local shop, agency or family firm and think cybersecurity is either incomprehensible or unaffordable, this episode is for you. Noel Bradford, with 40 years of experience in corporate security, and Maurven MacLeod, a former government cyber analyst who tracked nation-state actors, introduce themselves and explain why attackers are increasingly targeting customer databases and other easy-to-access systems. They describe common threat vectors and the...
2025-09-01
01 min
The Small Business Cyber Security Guy | Cybersecurity for SMB & Startups
48 Hours to Zero: How Ransomware Destroyed a 158-Year Business
K&P Logistics — 158 years in business — wiped out in 48 hours by ransomware. Noel Bradford and Maurven MacLeod unpack that real-world catastrophe to show small businesses how the same fate can be avoided. If you run a local shop, agency or family firm and think cybersecurity is either incomprehensible or unaffordable, this episode is for you. Noel Bradford, with 40 years of experience in corporate security, and Maurven MacLeod, a former government cyber analyst who tracked nation-state actors, introduce themselves and explain why attackers are increasingly targeting customer databases and other easy-to-access systems. They describe common threat vectors and the...
2025-09-01
01 min
The Small Business Cyber Security Guy | Cybersecurity for SMB & Startups
The Shocking Truth About What Actually Works in Small Business Cybersecurity
After 17 episodes covering everything from basic password security to nation-state threats targeting corner shops, Noel and Mauven reveal what actually works, what consistently fails, and why most businesses are fighting 2019 threats with 2015 thinking while facing 2025 attack methods. 🎯 Shocking Revelations: 42% of business applications are unauthorised Shadow IT - Your parallel digital infrastructure you never knew existed Multi-factor authentication stops 90% of credential attacks - Yet businesses still resist this free silver bullet AI systems now write custom malware faster than humans can patch - Deepfakes fool CEOs, psychological manipulation targets individuals Supply chain attacks make YOU liable for eve...
2025-08-25
48 min
The Small Business Cyber Security Guy | Cybersecurity for SMB & Startups
The Shocking Truth About What Actually Works in Small Business Cybersecurity
After 17 episodes covering everything from basic password security to nation-state threats targeting corner shops, Noel and Mauven reveal what actually works, what consistently fails, and why most businesses are fighting 2019 threats with 2015 thinking while facing 2025 attack methods. 🎯 Shocking Revelations: 42% of business applications are unauthorised Shadow IT - Your parallel digital infrastructure you never knew existed Multi-factor authentication stops 90% of credential attacks - Yet businesses still resist this free silver bullet AI systems now write custom malware faster than humans can patch - Deepfakes fool CEOs, psychological manipulation targets individuals Supply chain attacks make YOU liable for eve...
2025-08-25
48 min
The 10 Minute Cyber Fix
When AI Turns Against You
Episode SummaryAI-powered cybercriminals are now targeting UK small businesses with unprecedented sophistication, making artificial intelligence threats the top security concern for 35% of SMEs in 2025. Host Lucy Harper breaks down how criminals weaponise machine learning against businesses and provides a five-step action plan to defend against deepfakes, AI-generated phishing, and automated attacks that traditional security cannot detect.What You'll LearnAI-Powered Cyber Attacks: How criminals use machine learning to create personalised, sophisticated attacks that bypass traditional security measures and target UK SMEs specifically.Technical Threat Landscape: The mechanics behind AI-generated phishing...
2025-08-22
12 min
Family IT Guy Podcast
Roblox Banned the Guy Who Got 6 Predators Arrested - Here’s What Parents Need to Know
I'm a cybersecurity expert who worked with the NSA. I'm also a dad. When I tested Roblox as an 8-year-old with MAXIMUM parental controls, I found sexual content within minutes. Roblox just banned Schlep - who got 6 predators arrested. Now 100,000 people have signed a petition. Congress is involved. Louisiana's Attorney General wants them shut down. Their new "safety" video https://youtu.be/cuPGe99m8zs ? It's not about protecting your kids. It's about protecting their stock price.
2025-08-22
03 min
The 10 Minute Cyber Fix
PayPal's 16 Million User NIGHTMARE - Your Business Is Next
Episode SummaryCybercriminals are selling alleged PayPal credentials for nearly 16 million users on dark web forums, highlighting the devastating reality of credential stuffing attacks targeting UK businesses daily. Hosts Lucy Harper and Graham break down why this threat represents far more than just another data breach and provide an emergency action plan for protecting your business from automated credential attacks.What You'll LearnWhy the alleged PayPal credential dump likely comes from infostealer malware rather than a company breachHow credential stuffing attacks work and why they're particularly dangerous for UK SMEsThe devastating financial impact...
2025-08-21
09 min
The 10 Minute Cyber Fix
Workday Breach: The Rise of Voice Phishing Attacks
Episode SummaryHR giant Workday falls victim to ShinyHunters' sophisticated social engineering campaign, exposing how simple phone calls can bypass enterprise-grade security. Host Lucy Harper breaks down the attack methods and provides actionable defence strategies for UK businesses facing this escalating threat.What You'll LearnHow the ShinyHunters group uses voice phishing to breach major corporations including Workday, Google, and AdidasThe technical methods behind social engineering attacks targeting Salesforce and CRM systemsWhy UK SMEs face higher risk and the four hundred thousand pound ransom already paid by one victimFour immediate action steps to protect...
2025-08-20
10 min
The 10 Minute Cyber Fix
Why Your Managed Service Provider Could Destroy Your Business This Week
Episode SummaryCISA warns of active exploitation targeting N-able N-central RMM platforms used by UK managed service providers. Host Lucy Harper breaks down the critical vulnerabilities affecting thousands of businesses and provides immediate action steps for SME protection.What You'll LearnCVE-2025-8875 and CVE-2025-8876 vulnerabilities enabling complete network takeover through MSP toolsHow deserialization attacks and command injection work using simple analogiesWhy UK SMEs face cascading risks through compromised MSP relationships worth fifty-two billion poundsFour immediate actions to verify MSP security and protect business operationsEmergency timeline with CISA's August 20th federal deadline for...
2025-08-19
10 min
The Small Business Cyber Security Guy | Cybersecurity for SMB & Startups
AI Cyber Threats Target Small Business - insights from DefCon 33 & Black Hat 2025
🎧 Latest Episode Alert | Fresh intelligence from DefCon 33 reveals how AI-enhanced cyber threats to small business are accelerating rapidly. Techniques demonstrated in Las Vegas are targeting UK businesses within weeks. 🚨 Critical Cyber Threats to Small Business AI-Powered Social Engineering 85% success rates against security professionals AI psychological profiling from social media Voice synthesis for CEO impersonation attacks Multi-month fake identity campaigns Supply Chain Cyber Threats Coordinated ecosystem attacks across suppliers AI mapping of business relationships MSP compromises affecting 200+ networks Hardware backdoors surviving firmware updates Automated Attack Evolution 6-hour vulnerability-to-exploit timeline 88% evasion of tradit...
2025-08-18
46 min
The Small Business Cyber Security Guy | Cybersecurity for SMB & Startups
AI Cyber Threats Target Small Business - insights from DefCon 33 & Black Hat 2025
🎧 Latest Episode Alert | Fresh intelligence from DefCon 33 reveals how AI-enhanced cyber threats to small business are accelerating rapidly. Techniques demonstrated in Las Vegas are targeting UK businesses within weeks. 🚨 Critical Cyber Threats to Small Business AI-Powered Social Engineering 85% success rates against security professionals AI psychological profiling from social media Voice synthesis for CEO impersonation attacks Multi-month fake identity campaigns Supply Chain Cyber Threats Coordinated ecosystem attacks across suppliers AI mapping of business relationships MSP compromises affecting 200+ networks Hardware backdoors surviving firmware updates Automated Attack Evolution 6-hour vulnerability-to-exploit timeline 88% evasion of tradit...
2025-08-18
46 min
The 10 Minute Cyber Fix
The Fortinet Vulnerability Crisis
Episode SummaryHost Lucy Harper breaks down why this latest FortiNet incident should represent the final straw in a relentless pattern of Fortinet vulnerabilities and provides a comprehensive action plan for UK businesses to conduct strategic vendor risk assessments.What You'll LearnHow 780 coordinated IP addresses targeted Fortinet SSL VPNs in the largest recorded attack campaignGreyNoise's 80% correlation between attack surges and vulnerability disclosures within 6 weeksThe systematic pattern across Multiple CVE exploitationsWhy UK SMEs face catastrophic risk multiplication through managed service provider compromisesComplete 4-step action plan ending with strategic vendor risk assessment for firewall replacement
2025-08-18
10 min
The 10 Minute Cyber Fix
When File Compression Becomes Business Decompression: The WinRAR Zero-Day Crisis
Episode SummaryA critical zero-day vulnerability in WinRAR (CVE-2025-8088) is being actively exploited by Russian-aligned criminal groups targeting UK businesses through malicious email attachments. Host Lucy Harper breaks down how two sophisticated threat actors are using this flaw to deploy ransomware and provides immediate steps to protect your business.What You'll LearnHow the WinRAR zero-day vulnerability allows criminals to hide malware in innocent-looking file attachmentsWhy RomCom and Paper Werewolf threat actors are targeting UK financial, manufacturing, and logistics companiesThe devastating business impact of path traversal attacks that bypass traditional email...
2025-08-16
11 min
The 10 Minute Cyber Fix
When File Compression Becomes Business Decompression: The WinRAR Zero-Day Crisis
Episode SummaryA critical zero-day vulnerability in WinRAR (CVE-2025-8088) is being actively exploited by Russian-aligned criminal groups targeting UK businesses through malicious email attachments. Host Lucy Harper breaks down how two sophisticated threat actors are using this flaw to deploy ransomware and provides immediate steps to protect your business.What You'll LearnHow the WinRAR zero-day vulnerability allows criminals to hide malware in innocent-looking file attachmentsWhy RomCom and Paper Werewolf threat actors are targeting UK financial, manufacturing, and logistics companiesThe devastating business impact of path traversal attacks that bypass traditional email securityFour immediate...
2025-08-15
11 min
The 10 Minute Cyber Fix
When Your Webcam Becomes the Weapon
Episode SummaryCybersecurity researchers reveal how thousands of trusted Lenovo webcams can be remotely converted into persistent BadUSB attack weapons that survive complete system wipes. Host Lucy Harper breaks down the BadCam vulnerability (CVE-2025-4371) and provides immediate protection strategies for UK businesses using affected devices.What You'll LearnHow the BadCam vulnerability allows remote conversion of Lenovo webcams into BadUSB attack devicesWhy firmware-level attacks operate below traditional security detection and survive system rebuildsThe financial and operational impact on UK SMEs using vulnerable Lenovo 510 FHD and Performance FHD webcamsFour immediate action steps to audit...
2025-08-14
10 min
The 10 Minute Cyber Fix
August 2025 Patch Tuesday Security Update Roundup: 107 Microsoft Flaws Plus Critical Industry Patches
Episode SummaryMicrosoft's August 2025 Patch Tuesday delivers 107 vulnerability fixes including one actively exploited zero-day, while critical updates from Adobe, Google, Cisco, and WinRAR address zero-day attacks across the software ecosystem. Host Lucy Harper breaks down the coordinated multi-vendor security response and provides immediate deployment guidance for UK businesses.What You'll LearnMicrosoft's 107 vulnerabilities including CVE-2025-53779 Kerberos zero-day under active exploitationCritical Office application flaws in Word, Excel, and Exchange Server affecting business operationsMulti-vendor security crisis involving Adobe AEM Forms, WinRAR, Android Qualcomm chips, and Cisco infrastructureEmergency deployment strategies for coordinating updates across multiple technology...
2025-08-13
10 min
The 10 Minute Cyber Fix
UK Becomes Europe's Prime Malware Target
Episode SummaryNew research reveals the UK has become the third most targeted country globally for malware attacks, with over 103 million incidents hitting British businesses in Q2 2025. Host Lucy Harper explains why the UK has become Europe's biggest cybersecurity target and provides immediate protection steps on Microsoft Patch Tuesday. What You'll LearnWhy the UK faces over 1 million daily malware attacks, ranking #1 in EuropeHow APC virus targets business automation systems for maximum disruptionWhy Britain's digital economy makes it a prime criminal targetFour immediate action steps to protect against malware infiltrationWhich website...
2025-08-12
12 min
The Small Business Cyber Security Guy | Cybersecurity for SMB & Startups
When Your Safety Net Becomes the Target
🚨 Episode 11: When Your Safety Net Becomes the TargetBackup Security Under Fire + Business Email Compromise Reality Check Your backups aren't protecting you anymore—they're the primary target. In this explosive double-header episode, we expose why 94% of ransomware attacks now target backup systems first, and how Business Email Compromise enables these devastating attacks. 🎯 What You'll Learn:Backup Reality Check: Why "immutable" storage isn't, and cloud sync ≠ backup protection Cloud Provider Truth Bomb: Neither Microsoft nor Google guarantee your data integrity BEC Epidemic: How £35+ billion in global losses connect to backup destruction Modern Attack Chains: Email compromise → reconnaissance → backup annihila...
2025-08-11
31 min
The Small Business Cyber Security Guy | Cybersecurity for SMB & Startups
When Your Safety Net Becomes the Target
🚨 Episode 11: When Your Safety Net Becomes the TargetBackup Security Under Fire + Business Email Compromise Reality Check Your backups aren't protecting you anymore—they're the primary target. In this explosive double-header episode, we expose why 94% of ransomware attacks now target backup systems first, and how Business Email Compromise enables these devastating attacks. 🎯 What You'll Learn:Backup Reality Check: Why "immutable" storage isn't, and cloud sync ≠ backup protection Cloud Provider Truth Bomb: Neither Microsoft nor Google guarantee your data integrity BEC Epidemic: How £35+ billion in global losses connect to backup destruction Modern Attack Chains: Email compromise → reconnaissance → backup annihila...
2025-08-11
31 min
The 10 Minute Cyber Fix
NVidia Under Siege: Critical Server Patches That Can't Wait
Episode SummaryCritical vulnerabilities in NVIDIA's Triton Inference Server allow complete AI system takeover through sophisticated vulnerability chaining. Host Lucy Harper breaks down how attackers can steal proprietary AI models, manipulate responses, and use compromised servers as network pivot points, providing emergency patch guidance for UK businesses deploying artificial intelligence infrastructure. What You'll LearnHow three chained vulnerabilities (CVE-2025-23319, CVE-2025-23320, CVE-2025-23334) enable complete AI server takeoverWhy NVIDIA Triton's Python backend becomes the entry point for sophisticated AI infrastructure attacksThe business impact of AI model theft, data manipulation, and intellectual property compromise4...
2025-08-11
12 min
Family IT Guy Podcast
Why Your 10-Year-Old Can’t Stop Scrolling (Bottomless Feeds Explained)
Your child's app addiction isn't accidental—it's engineered. Former NSA cybersecurity expert explains the "bottomless feed" design that creates chemical addiction in developing brains. In this 2-minute breakdown, discover: - What bottomless feeds actually are (0:00) - The hidden business model keeping kids hooked (0:26) - Why it's literally "digital drugs" with real brain chemistry (0:45) - The doom scrolling trap adults fall into (1:17) - How to protect your family starting today (1:36) As a parent my...
2025-08-09
02 min
The 10 Minute Cyber Fix
TikTok Shop's AI-Powered Million-Pound Crypto Heist
Episode SummaryUK businesses face a sophisticated new threat as criminals deploy artificial intelligence to industrialize fraud through TikTok Shop. Host Lucy Harper exposes the "FraudOnTok" campaign that's already stolen over £900,000 through 15,000 fake websites, weaponized AI-generated content, and advanced malware specifically designed to hunt cryptocurrency wallets on personal devices that connect to business systems. What You'll LearnHow the "FraudOnTok" campaign uses AI to create convincing fake influencer videos at industrial scaleWhy SparkKitty malware specifically targets screenshots to steal cryptocurrency wallet recovery phrasesHow OAuth token theft bypasses traditional password security and multi-factor authenticationThe business r...
2025-08-08
10 min
The Small Business Cyber Security Guy | Cybersecurity for SMB & Startups
White House CIO Insights Part 3 - Advanced Threats & AI
In the final part of our White House CIO Insights series, we explore the cutting-edge AI-powered threats that are transforming cybersecurity. Our special guest Sarah Chen, who heads up AI threat research at a leading UK cybersecurity firm, reveals how artificial intelligence is being weaponized by criminals - and what small businesses can do to defend themselves. From deepfakes that fool CEOs to AI that writes custom malware in real-time, discover why traditional security approaches are failing and what you need to implement today to protect your business against tomorrow's threats. What You'll Learn ...
2025-08-04
45 min
The Small Business Cyber Security Guy | Cybersecurity for SMB & Startups
White House CIO Insights Part 3 - Advanced Threats & AI
In the final part of our White House CIO Insights series, we explore the cutting-edge AI-powered threats that are transforming cybersecurity. Our special guest Sarah Chen, who heads up AI threat research at a leading UK cybersecurity firm, reveals how artificial intelligence is being weaponized by criminals - and what small businesses can do to defend themselves. From deepfakes that fool CEOs to AI that writes custom malware in real-time, discover why traditional security approaches are failing and what you need to implement today to protect your business against tomorrow's threats. What You'll Learn ...
2025-08-04
45 min
The 10 Minute Cyber Fix
When Your Firewall Becomes the Threat - Monday 4th August 2025
Breaking: Critical SonicWall Vulnerability Threatens UK Small BusinessesArctic Wolf researchers identified a surge in ransomware attacks targeting SonicWall devices since July 15th, 2025. The Akira ransomware gang exploits a zero-day vulnerability bypassing traditional security measures, affecting thousands of UK SMEs.Why This Attack Is Different:90-minute deployment: Initial breach to full encryption in under 2 hoursBypasses security: Compromises updated devices with MFA enabledMassive scale: 300,000+ SonicWall appliances vulnerable, 210,000 unpatchedSophisticated infrastructure: Uses established hosting providersLong-term campaign: Patterns traced to October 2024Impact on UK Small Business:SonicWall devices are popular among UK SMEs for...
2025-08-04
09 min
Aviation Week's Check 6 Podcast
Why Are Cybersecurity Risks Rising For Aerospace And Defense? | Sponsored By Shift5
As competition between the United States and adversary nations intensifies, cybersecurity risks for aerospace and defense are rising. Listen in to this sponsored podcast as Josh Lospinoso, CEO and Co-Founder of Shift5, and David Forbes, who leads Cyber Physical Defense at Booz Allen Hamilton, explain the nature of the cyber security threat, the stakes involved and how to mitigate it. Learn more here
2025-08-04
24 min
The Small Business Cyber Security Guy | Cybersecurity for SMB & Startups
Help Desk MFA Reset Fails: Scattered Spider vs. UK Retail
Episode Description Join Noel Bradford and Graham Falkner for another cybersecurity hot take as they dive into the alarming world of help desk social engineering attacks. This episode exposes how the notorious Scattered Spider group has weaponized basic human helpfulness to devastating effect, turning your friendly IT support into the front door for ransomware attacks. From MGM's $100 million disaster to the recent wave of UK retail breaches (M&S, Co-op, Harrods), discover how teenagers armed with nothing more than convincing accents and sob stories are outsmarting million-pound security systems. Spoiler alert: it's not the tech...
2025-07-31
08 min
The Small Business Cyber Security Guy | Cybersecurity for SMB & Startups
Help Desk MFA Reset Fails: Scattered Spider vs. UK Retail
Episode Description Join Noel Bradford and Graham Falkner for another cybersecurity hot take as they dive into the alarming world of help desk social engineering attacks. This episode exposes how the notorious Scattered Spider group has weaponized basic human helpfulness to devastating effect, turning your friendly IT support into the front door for ransomware attacks. From MGM's $100 million disaster to the recent wave of UK retail breaches (M&S, Co-op, Harrods), discover how teenagers armed with nothing more than convincing accents and sob stories are outsmarting million-pound security systems. Spoiler alert: it's not the tech...
2025-07-31
08 min
The Small Business Cyber Security Guy | Cybersecurity for SMB & Startups
Cyber Essentials - White House Security Principles for UK Small Business
Part 2 of White House CIO Insights Series | ~38 minutes How do you implement White House-level security without White House-level budgets? Building on insights from former White House CIO Theresa Payton's interview with Scammer Payback, Noel and Mauven explore the UK's Cyber Essentials framework - translating enterprise security principles into achievable small business requirements. The Five Cyber Essentials Controls: Boundary Firewalls - Your digital perimeter defense Secure Configuration - Closing manufacturer security gaps Access Control & MFA - 90% credential attack prevention Malware Protection - Beyond traditional antivirus Security Update Management - Systematic patching ...
2025-07-28
42 min
The Small Business Cyber Security Guy | Cybersecurity for SMB & Startups
Cyber Essentials - White House Security Principles for UK Small Business
Part 2 of White House CIO Insights Series | ~38 minutes How do you implement White House-level security without White House-level budgets? Building on insights from former White House CIO Theresa Payton's interview with Scammer Payback, Noel and Mauven explore the UK's Cyber Essentials framework - translating enterprise security principles into achievable small business requirements. The Five Cyber Essentials Controls: Boundary Firewalls - Your digital perimeter defense Secure Configuration - Closing manufacturer security gaps Access Control & MFA - 90% credential attack prevention Malware Protection - Beyond traditional antivirus Security Update Management - Systematic patching ...
2025-07-28
42 min
The Small Business Cyber Security Guy | Cybersecurity for SMB & Startups
White House CIO Insights - The Threat Landscape Small Business Faces
What's scarier - protecting the President or a small business in Manchester? Former White House CIO Theresa Payton says they face exactly the same sophisticated threats now. Runtime: 36 minutes | Series: Part 1 of 3 | Hosts: Noel Bradford & Mauven MacLeodKey Topics Covered Nation-state targeting: North Korea (vengeful), Iran (cyber mercenaries), Russia (everything), China (supply chains) "Verify and never trust" - Evolution from Reagan's "trust but verify" for modern threats Island hopping attacks - Small businesses as stepping stones to larger targets White House security principles scaled for small business budgets Multi-factor authentication - 90% effective against credential attacks Supply chain...
2025-07-21
38 min
The Small Business Cyber Security Guy | Cybersecurity for SMB & Startups
White House CIO Insights - The Threat Landscape Small Business Faces
What's scarier - protecting the President or a small business in Manchester? Former White House CIO Theresa Payton says they face exactly the same sophisticated threats now. Runtime: 36 minutes | Series: Part 1 of 3 | Hosts: Noel Bradford & Mauven MacLeodKey Topics Covered Nation-state targeting: North Korea (vengeful), Iran (cyber mercenaries), Russia (everything), China (supply chains) "Verify and never trust" - Evolution from Reagan's "trust but verify" for modern threats Island hopping attacks - Small businesses as stepping stones to larger targets White House security principles scaled for small business budgets Multi-factor authentication - 90% effective against credential attacks Supply chain...
2025-07-21
38 min
The Small Business Cyber Security Guy | Cybersecurity for SMB & Startups
McDonalds’ SuperSized Cyber Screw Up
Show Guide: When Basics Break - Special Bonus Episode Duration: 9 minutes | Type: Special Episode Episode Summary McDonald's password "123456" exposed 64 million job applications. M&S lost £300M to a phone call. Our full team dissects how basic security failures are destroying major brands and what small businesses must learn. Featured Team Noel Bradford - Lead Host Mauven MacLeod - Ex-NCSC Specialist Oliver Sterling - Cybersecurity Veteran Dr. Sarah Chen - AI Security Researcher Key Segments & Timestamps 🍟 McDonald's AI Disaster (0:00-3:00) Paradox.ai hiring bot secu...
2025-07-10
12 min
The Small Business Cyber Security Guy | Cybersecurity for SMB & Startups
McDonalds’ SuperSized Cyber Screw Up
Show Guide: When Basics Break - Special Bonus Episode Duration: 9 minutes | Type: Special Episode Episode Summary McDonald's password "123456" exposed 64 million job applications. M&S lost £300M to a phone call. Our full team dissects how basic security failures are destroying major brands and what small businesses must learn. Featured Team Noel Bradford - Lead Host Mauven MacLeod - Ex-NCSC Specialist Oliver Sterling - Cybersecurity Veteran Dr. Sarah Chen - AI Security Researcher Key Segments & Timestamps 🍟 McDonald's AI Disaster (0:00-3:00) Paradox.ai hiring bot secu...
2025-07-10
12 min
The Small Business Cyber Security Guy | Cybersecurity for SMB & Startups
Shadow IT - The Unauthorised Technology That’s Already Inside Your Business
Shadow IT: The Unauthorised Technology Inside Your Business 42% of business applications are unauthorised Shadow IT. Your employees have built hackers a data highway while trying to be helpful. What You'll Learn Detection Methods: DNS monitoring, MDM, endpoint audits, ThreatLocker solutions GDPR Nightmare: Why Shadow IT makes data subject access requests impossible Real Examples: 17 project management tools in one 12-person company Management Strategies: Control without becoming a digital dictator Immediate Actions Audit DNS logs for unknown cloud domains Check business credit cards for unauthorised SaaS subscriptions Ask employees "How do you actually do this job?" ...
2025-07-07
27 min
The Small Business Cyber Security Guy | Cybersecurity for SMB & Startups
Shadow IT - The Unauthorised Technology That’s Already Inside Your Business
Shadow IT: The Unauthorised Technology Inside Your Business 42% of business applications are unauthorised Shadow IT. Your employees have built hackers a data highway while trying to be helpful. What You'll Learn Detection Methods: DNS monitoring, MDM, endpoint audits, ThreatLocker solutions GDPR Nightmare: Why Shadow IT makes data subject access requests impossible Real Examples: 17 project management tools in one 12-person company Management Strategies: Control without becoming a digital dictator Immediate Actions Audit DNS logs for unknown cloud domains Check business credit cards for unauthorised SaaS subscriptions Ask employees "How do you actually do this job?" ...
2025-07-07
27 min
B2B Synergy - The Power Partners USA Podcast
Inside Managed IT Services with Guy Shurki owner of Shur-Net Solutions
Send us Text Message Shout Out!SHOW NOTES AND TIME STAMPSIn this episode of B2B Synergy, the Power Partners, USA podcast, host Alan Armijo introduces Guy Shurki owner of Shur-Net Solutions Inc., a new Power Partner USA member. Guy shares insights into his journey of transforming his IT business into a Managed Service Provider (MSP) over the past two decades detailing how they take over clients' network management, including installation, cloud integration, cybersecurity, and strategic IT planning. He highlights the collaborative nature of his work, acting as the IT department for...
2025-04-07
43 min
CS4NE
Episode 13 - Nullfy Special Guests Zaid Kakish and Tom Knudsen
In this episode of CS4NE, hosts Guy Trainin and Kimberly Ingraham-Beck speak with Zaid Kakish and Tom Knudsen, student leaders from Nullify, a student-run cybersecurity club at the University of Nebraska Omaha. The guests share their experiences in cybersecurity, their passion for hands-on learning, and the goals of Nullify, which include making cybersecurity accessible and fun through events like Capture the Flag (CTF) competitions. They emphasize the importance of building community connections, offering industry talks, and creating engaging opportunities for both high school and college students. The episode highlights how critical cybersecurity has become across all sectors, the...
2025-03-25
18 min
CS4NE
Episode 12 - Cybersecurity Tips - Special Guest Anthony Kava
In this episode of CS4NE, Guy Trainin and Kimberly Ingraham-Beck sit down with Anthony Kava, a digital forensics expert and deputy with the Pottawattamie County Sheriff's Office, to explore the critical role of cybersecurity in today's digital landscape. Anthony shares his journey into cybersecurity, his work in cyber forensics and crime investigations, and practical advice for educators and students alike. The discussion highlights the importance of understanding technology's layers, developing soft skills, and adopting a "hacker mindset" of curiosity and problem-solving. Packed with insights, resources, and tips, this episode underscores the growing significance of cybersecurity for everyone in...
2025-01-15
14 min
Car Dealership Guy Podcast
The Boutique "Dealership" Selling Supercars to the Ultra-Elite | John Temerian, CEO of CURATED
Welcome to the Car Dealership Guy Podcast. In this episode, I speak with John Temerian, CEO of CURATED, a Miami-based boutique dealership specializing in rare, vintage supercars and catering to the ultra-elite. We discuss how a lifelong obsession with supercars turned into an impressive business, his wild search for "blue chip" cars, and how he became the go-to car concierge for the rich and powerful looking to build world-class car collections.This episode of the Car Dealership Guy Podcast is brought to you by:CDK Global - Empowering dealers...
2024-12-05
57 min
CS4NE
Episode 7 - CodeHS - Special Guest Steve Gardner
In this episode of "CS4NE - Computer Science for Nebraska," hosts Guy Trainin and Kimberly Ingraham-Beck discuss the benefits of using CodeHS for teaching computer science. After attending the ISTE and CSTA conferences, Kimberly shares insights from an interview with Steve Gardner, the Chief Revenue Officer of CodeHS. They explore CodeHS’s offerings, including their comprehensive K-12 curriculum, the alignment with Nebraska standards, and the flexibility of their platform, which allows for both free and paid versions. The hosts also dive into a hands-on demonstration of CodeHS, showcasing the platform's features, including cybersecurity, cryptography, and system administration modules, an...
2024-11-05
09 min
ApeCast: Stories from the Yacht Club
Episode 009 | MichaelK - BAYC#115 | Cybersecurity Guy, BD Manager, Entrepreneur
Summary: MichaelK, a cybersecurity expert and business development manager for Consensys, shares his remarkable journey. Starting as an entrepreneur at a young age, Michael quickly built and exited several web2 companies before diving into the world of web3. He joined WalletGuard fueled by his passion for the industry and willingness to work for free early on, which helped him forge strong connections and find success. Michael emphasized the importance of having a team with the same vision and the significance of onboarding new users into the crypto space without focusing on monetary gains.
2024-10-07
1h 00
10 Minute HealthBizCast
Album 8, Track 1: Rapid, Incremental Change
Welcome to Album 8 of The 10 Minute HealthBizCast! On this album, we tackle “Incremental, Revolutionary Change.” Is that even a thing? Listen to find out. For our opening track, we interview BaxterLee (https://www.linkedin.com/in/baxter-lee-9950086/), an expert on cyber security issues and the CFO at Clearwater (www.clearwatersecurity.com), about the wave of cybersecurity attacks on healthcare, how it affects care delivery, and ways that the industry can and is responding. #healthcareleadership #healthcarecybersecurity #healthbizcast #changinghealthcare #cybersecurity
2024-09-25
11 min
Car Dealership Guy Podcast
#121 The imminent evolution of AI in car dealerships, Best uses cases of AI in dealerships, How he's transforming 50% of US franchise dealers | Devin Daly, Co-Founder & CEO of Impel
Welcome to the Car Dealership Guy Podcast. In this episode, I'm speaking with Devin Daly, CEO of Impel where we discuss: The imminent evolution of AI in car dealerships, BTS of his recent $100M acquisition, How he's transforming 50% of all US franchise dealers, The best use cases for AI in car dealerships and much more!This episode of the Car Dealership Guy Podcast is brought to you by:CDK Global - CDK will once again be streaming its annual industry conference CDK Connect 2024 on October 22.This year’s...
2024-09-24
33 min
TechSpective Podcast
Exploring the Future of Cybersecurity in a SaaS-Driven World
TechSpective Podcast Episode 135 In the latest episode of the TechSpective Podcast, I had the pleasure of sitting down with Guy Guzner, co-founder and CEO of Savvy Security. With nearly three decades of experience in cybersecurity, Guy shares his insights into the rapidly evolving landscape of digital threats, particularly in the context of SaaS (Software as a Service) applications. The conversation dives deep into the challenges that modern organizations face as they navigate the complex world of SaaS sprawl. As businesses increasingly rely on SaaS solutions to drive productivity and innovation, the risks associated with identity management and security grow exponentially. G...
2024-08-17
50 min
Car Dealership Guy Podcast
#109 Most costly mistakes dealers are making, Why the FTC is coming after car prices, Top 3 "sleeper" risks in the car biz | Brad Miller, Head of Legal for ComplyAuto
Welcome to the Car Dealership Guy Podcast. In this episode, I'm speaking with Brad Miller, Head of Legal at ComplyAuto where we discuss: The most costly mistakes dealers are making, Why the FTC is coming after car dealers, Top 3 "sleeper" risks in the car biz and much more.This episode of the Car Dealership Guy Podcast is brought to you by:OPENLANE - The world’s best online dealer marketplace for used cars, bringing you exclusive inventory, simple transactions, and better outcomes. New to OPENLANE? Sign up now and re...
2024-08-13
41 min
Cybersecurity Standup
Zero Trust Masterclass with Jason Garbis
Hey everyone, welcome back to "Cybersecurity Stand Up," your favorite spot for all things cybersecurity. Today, we’re coming at you live from the lively Tics Booth at South Moscone. We've got the amazing Jason Garbis with us, and trust us, you don’t want to miss this! Jason’s the go-to guy for all things Zero Trust. He’s been at it for nearly a decade, and he's here to drop some serious knowledge. We'll chat about the Secure by Design initiative, striking the right balance between compliance and actual security, and his two must...
2024-07-09
14 min
AI Unchained
Ai_029 - New Tools and Major Moves in AI
Open AI signals that they are the surveillance leviathon we suspected they always were. Anthropic's Claude 3.5 may be even better than ChatGPT. I explore and detail out some new tools and build new tiny apps to recreate some of the incredible features of the Apple AI announcements, but in a local, open source way. A cybersecurity disaster in Microsoft's announcement of their new OS "feature" Recall and why it may be the worst thing for security and privacy in a very long time. And much more in today's episode, on New Tools and Major Moves in AI. L...
2024-07-04
1h 33
Bitcoin Audible
Ai_029 - New Tools and Major Moves in AI
Open AI signals that they are the surveillance leviathon we suspected they always were. Anthropic's Claude 3.5 may be even better than ChatGPT. I explore and detail out some new tools and build new tiny apps to recreate some of the incredible features of the Apple AI announcements, but in a local, open source way. A cybersecurity disaster in Microsoft's announcement of their new OS "feature" Recall and why it may be the worst thing for security and privacy in a very long time. And much more in today's episode, on New Tools and Major Moves in AI. L...
2024-07-04
1h 33
Cubic Lighthouse
Mastering Crisis Management in Cybersecurity with Marie Emmanuelle Py
In this episode, Marie Emmanuelle discusses her extensive experience in crisis management across various high-stakes environments, including the military, naval ships, aircraft carriers, and nuclear plants, and how these principles apply to cybersecurity. She emphasizes that effective crisis management requires more than technical skills; it demands preparation, teamwork, and strategic thinking. Emmanuelle highlights the importance of diverse, well-trained teams that understand individual strengths and can communicate and adapt under pressure. She also stresses the psychological aspects of crisis management, such as managing fear and stress. Her insights underline that the fundamentals of crisis management are universal, whether dealing with...
2024-06-04
13 min
Cubic Lighthouse
Must Read “See Yourself in Cyber” | Book Review with Author Ed Adams
Join us for an insightful review of the book "See Yourself in Cyber: Security Careers Beyond Hacking" by the esteemed author and security expert, Ed Adams. In this engaging discussion, we delve into the challenges and opportunities within the cybersecurity industry, exploring topics such as breaking misconceptions about cybersecurity, addressing the talent crisis, and the crucial role of diversity and inclusion. Discover valuable insights into evolving cybersecurity careers and how individuals can navigate their paths in this dynamic field. Whether you're a newcomer seeking to break into cybersecurity or a hiring manager looking to optimise talent acquisition...
2024-05-28
27 min
Cubic Lighthouse
Navigating the DORA Series: Unraveling Third-Party Risks and Resilience in Cybersecurity
Immerse yourself in the dynamic realm of third-party risk management with our newest video with Pierre Noel in the DORA Series! Engage in a compelling dialogue as we unravel the intricacies of evaluating, overseeing, and alleviating risks tied to third-party collaborations. From emphasizing comprehensive risk assessment to navigating the complexities of fourth-party dependencies, accompany us on this exploration to enhance cybersecurity resilience. Seize invaluable perspectives from seasoned industry professionals!
2024-05-21
24 min
Cubic Lighthouse
Navigating Cybersecurity: Stefanie Drysdale’s Executive Protection Revolution
In today's episode, we're diving into the critical realm of executive digital protection with cybersecurity expert Stefanie Drysdale, who holds the senior vice president position at Precient. We're exploring the sophisticated measures that top-level executives can implement to safeguard their online presence, leveraging Precient's advanced assessments and proprietary tools. Stefanie provides invaluable insights into the intricate process of securing one's digital footprint.Throughout our conversation, Stefanie offers a glimpse into Precient's operational dynamics, global outreach, and potential future expansions, while underscoring the paramount importance of proactive individual initiatives in mitigating digital risks.If you're intrigued...
2024-04-15
28 min
Cubic Lighthouse
Navigating Cybersecurity Recruitment: Aligning Talent with Tech's Evolving Landscape
Welcome back to another episode of the Cubic Lighthouse Podcast! Today, we've got a special guest, Juliette Kasko. She is a seasoned cybersecurity executive recruitment specialist from Singapore. Juliette dives deep into her transition from corporate sales to executive search consulting, the intricacies of retained executive searches, and the differences between various types of recruiters. Juliette will also be sharing her insights on the emerging Ukraine Tech Ecosystem, discussing the impact of AI in the recruitment process, and shedding light on the growing complexity of matching CVs to job criteria. Whether you're a candidate navigating your career j...
2024-04-03
1h 08
Cubic Lighthouse
Navigating the Dynamic Landscape of Cybersecurity: Lessons from an Experienced CISO
In this episode, Guy Marong interviews Nick Vigier, a seasoned CISO based in New York City. Nick shares his extensive experience and insights into the world of cybersecurity, spanning over 20 years. The conversation dives into the evolution of Nick's career, from his initial role in network engineering at the New York Stock Exchange to his current position as the CSO at Oscar Health. He discusses the transformative moments, challenges, and diverse experiences that have shaped his understanding of the complex and multifaceted field of security. Guy and Nick also touch on the importance of storytelling in showcasing the value...
2024-03-22
27 min
The Red-Bearded Risk Guy
Cybersecurity Programs: A Modern Business Must- Have Pt 1 W/ Jack Myers
Cybersecurity Programs: A Modern Business Must- Have W/ @Jack Myers (he/him) Parts 1 and 2 are live!!!In this 2 part episode, Jack Myers, The Sales & Marketing Director of @Convergence Networks and I talk about this growing threat business of all sizes. He gives a good overview of the recent #oregondmv data breach, which affected millions of Oregonian's information. It was part of a larger attack on #MOVEit, which may have affected as many as 46 million privacy records. Jack shares insights on the most common types of attacks we're seeing and the most co...
2023-09-05
51 min
The Red-Bearded Risk Guy
Cybersecurity Programs: A Modern Business Must- Pt 2 W/ Jack Myers
In this 2 part episode, Jack Myers, The Sales & Marketing Director of @Convergence Networks and I talk about this growing threat business of all sizes. He gives a good overview of the recent #oregondmv data breach, which affected millions of Oregonian's information. It was part of a larger attack on #MOVEit, which may have affected as many as 46 million privacy records. Jack shares insights on the most common types of attacks we're seeing and the most common vulnerability, which is #peopleWe talk about the various ways a breach affects small businesses, with one th...
2023-09-05
39 min
The Security Guy and CIA Spy PodBroadcast by Robert Siciliano and Peter Warmka
Water hacks, child blackmail and death by TikTok. #35
In this episode, Peter Warmka and Robert Siciliano dive into the critical topic of water supply security. They shed light on the alarming incident of hackers leaking over 721 million passwords in 2022. Additionally, they address the disturbing issue of sexual predators hijacking children's webcams and the tragic case of a teenager's death from the Benadryl Challenge, which TikTok claims to have never witnessed such content trend before. Episode's keynotes/comments/links: EPA stresses the need for improved water cybersecurity https://www.securitymagazine.com/articles/99041-epa-stresses-the-need-for-improved-water-cybersecurity Report: H...
2023-06-02
30 min
IoT Security Podcast
The IoT Security Challenge: How Steven Edwards Tackles the Extended IoT Attack Surface
When Steven Edwards, an IT Guy turned Security Analyst, discovered the unexpected challenge of securing an expansive attack surface that includes refrigerators, vending machines, and scanners across multiple private address spaces, he had to be tenacious and curious to protect his organization from attack."No matter what the tragedy is, it's beholden upon us to learn from it, to grow and improve. And I think we have done that in a lot of ways." - Steven EdwardsIn this episode, Brian Contos and John Vecchi talk with Steven Edwards. Steven Edwards was a "Regular IT...
2023-03-21
31 min
IoT Security Podcast
When Ransomware Hits During a Health Emergency
Jeffrey Vinson, Senior VP and CISO at Harris Health System, has held leadership positions for much of his life, from military to federal to state government. It was a natural progression for him to move from IT to what he calls a “Pure Cyber Guy.” Vinson joins Brian and John on the show today to answer the question, “What makes up your special forces in cyber?”In healthcare, it’s about saving lives, and cybersecurity is a patient safety issue. Vinson talks about the balancing act between patient safety and data privacy, HIPPA compliance, and legisl...
2022-12-27
48 min
IoT Security Podcast
Cybercriminals and Nation-States Look to IoT as the New Frontline
Richard Stiennon, Chief Research Analyst for IT-Harvest, joins us for The Return: Episode 2. Author of the recent Security Yearbook 2022, Richard started his career before cyber was cyber, a story he originally shared with Brian on a walk along some train tracks. How does a guy go from an ISP start-up to Gartner to IT-Harvest and being a bestselling author?Richard started IT-Harvest to literally harvest data, and that’s resulted in his latest project, an app for data obsessives called the Analyst Dashboard. He talks about what it took to get there and some surprising results he’s di...
2022-11-29
52 min
NorCal and Shill
Donglu
Send us a textEpisode 43: Show Notes.The deeper you dive into the world of NFTs, the more you’ll discover it’s not just about selling. It’s about relationships and community too. Today, we are joined by digital concept artist and art director, Donglu Yu. With over 14 years of entertainment industry experience, Donglu has racked up an impressive work portfolio. She has helped bring to life video games such as Assassin’s Creed (3, Brotherhood, Black Flag, and Valhalla), Deus Ex: Human Revolution, and Far Cry 4. Donglu also worked on the video game fil...
2022-07-07
53 min
Online! With Amr The Internet Guy 🌎 Helping business owners be more successful online ✔✔
Online with Amr The Internet Guy Episode 31! How to protect yourself and your business from Cyber criminals, with Scott Schober
🎧This is Online with Amr The Internet Guy! The show focuses on entrepreneurs and business owners, helping them become more successful in conducting their business on the web without being stuck with Technology 😱, getting a headache, pulling their hairs out, or buying expensive software!My guest today is Scott Schober, Scott is an innovator and Wireless expert from New Jersey, he is the President and CEO of Berkeley Varitronics Systems a provider of advanced, world-class wireless test and security solutions.He is the author of three best-selling security books...
2022-03-17
58 min
The Security Guy and CIA Spy PodBroadcast by Robert Siciliano and Peter Warmka
The world's most powerful cyberweapon #16
Robert Siciliano and Peter Warmka discuss the world's most powerful cyberweapon, which is spyware used by governments around the world. They dig into a shooting where nine police officers killed an unarmed citizen. They discuss social media scams such as romance scams and investment scams are making bad guys big bucks. And they bring attention to social media hoaxes revolving around claiming thieves handing out drugged masks to rob houses and why it's bad news to share false information like this. Episode's keynotes / comments / links: The Battle for the World’s Most Powerful Cy...
2022-02-18
33 min
The Security Guy and CIA Spy PodBroadcast by Robert Siciliano and Peter Warmka
40 billion wreckage being compromised in 2021! #15
Robert Siciliano and Peter Warmka discuss 40 billion wreckage being compromised in 2021, it’s getting worse and it’s not getting any better. The FBI sent out a bulletin Malicious USB drives are being posted to businesses. Russia Arrests REvil Ransomware Gang Responsible for High-Profile Cyber Attacks and Police warn of parking meter phishing. Episode’s links: 🔗 More than 40 billion records exposed in 2021: https://securityboulevard.com/2022/01/more-than-40-billion-records-exposed-in-2021/ 🔗 Malicious USB drives are being posted to businesses: https://www.tripwire.com/state-of-security/security-data-protection/malicious-usb-drives-are-being-posted-to-businesses/ 🔗 Russia Arrests REvil Ransomware Gang Responsible for...
2022-02-04
27 min
The Security Guy and CIA Spy PodBroadcast by Robert Siciliano and Peter Warmka
Grab crimes happening in malls and affluent high-end stores across the country! #14
Robert Siciliano and Peter Warmka dive into all of the recent smash and grab crimes that have been happening in malls and in affluent high-end stores across the country. These particular crimes have also included home invasions resulting in murder and they discussed the proliferation of gun sales as a result. The Apple AirTag has become a smash hit, but there is a tremendous amount of fear, uncertainty and doubt regarding its privacy, security and its implications for stalking. Credit card fraud is always on top of people's minds, and Peter and Robert provide a positive perspective. ...
2022-01-14
28 min
The Customer Acquisition Experience
Aron Skversky | Do the leg work when optimizing your PPC campaigns
In this episode, I get to speak with Aron Skversky. Aron and I worked together ages ago in K Logic, where we helped companies like Outbrain, Cloudinary, & Datorama make their PPC dreams come true.Since then, Aron has worked in-house and at agencies, building marketing strategies and executing upon them for some of the top B2B startups in Israel.Aron is currently the Director of Acquisition at Pentera, a successful cybersecurity company that gives companies the ability to automatically validate that all their security controls are working properly. Aaron is responsible for ensuring that...
2022-01-12
32 min
The Security Guy and CIA Spy PodBroadcast by Robert Siciliano and Peter Warmka
What can the recent Astroworld Festival tragedy teach us about safety? #11
What can the recent Astroworld Festival tragedy teach us about safety? Robert Siciliano and Peter Warmka discuss the awful AstroWorld tragedy where eight people were unnecessarily killed and how "duty of care" needs to be exercised not just by companies but by individuals. They cover numerous data breaches including the recent Robin Hood data breach and what data breach notification laws mean for you or your small business. They also discussed the awesome and awful story of the missing teen rescued after making a hand gesture she learned from TikTok to signal for help. Finally...
2021-11-19
41 min
The Qubit Guy's Podcast
Itan Barmes, Quantum Lead at Deloitte Nederland
My guest today is Itan Barmes, Quantum Lead at Deloitte Nederland. Itan and I spoke about a new World Economic Forum initiative on quantum computing, the impact of quantum on cybersecurity and much more. We hope you enjoy this episode. Please let us know how we did by emailing hello@classiq.io
2021-09-13
18 min
The Security Guy and CIA Spy PodBroadcast by Robert Siciliano and Peter Warmka
Stay on top of what is new and ahead of what is next on all things tech, digital literacy and security. #1
Welcome to The Security Guy & CIA Spy, the podcast where Security Expert Robert Siciliano and former CIA Intelligence Officer Peter Warnka talk openly about outsmarting hackers, scammers, and other cybercriminals! With every episode, we will expose personal security vulnerabilities, cybercrime, analyze the victim’s circumstances, and teach you how to become the toughest target possible for various online threats! Because when The Security Guy meets CIA Spy, hackers and attackers have nowhere to hide! Let’s dive in, and help you skyrocket your security awareness! Episode's keynotes / comments Math correction: according to IBM's report the cost...
2021-06-19
35 min