podcast
details
.com
Print
Share
Look for any podcast host, guest or anyone
Search
Showing episodes and shows of
The Small Business CyberSecurity Guy
Shows
CS4NE
Episode 20 - Cybersecurity with Kim Ingraham-Beck
In this solo episode of CS4NE, host Kimberly Ingraham-Beck shares her journey into cybersecurity education and why it has become one of her biggest passions. She highlights the critical demand for cybersecurity professionals, explores free classroom-ready resources from Cyber.org, TeachCyber.org, and CodeHS, and recommends professional learning opportunities like free bootcamps and certificates. With practical tips for both new and experienced teachers, Kimberly encourages educators to integrate cybersecurity into their curriculum and inspire the next generation of digital defenders.
2025-10-09
03 min
CS4NE
Episode 17 - NDE Curriculum with Special Guest Lucas Hartman
In this episode of CS4NE, hosts Guy Trainin and Kimberly Ingraham-Beck interview Lucas Hartman, an instructor at Metropolitan Community College and former high school computer science teacher. Lucas discusses the curriculum he developed for the Nebraska Department of Education to support the state’s new computer science graduation requirement. The course includes six engaging, hands-on modules that cover everything from digital citizenship and cybersecurity to computational thinking and programming, and it's designed to be accessible for teachers and students of all experience levels. Lucas highlights the flexibility, open-access nature, and teacher-friendly structure of the curriculum—making it a valu...
2025-10-09
17 min
Family IT Guy Podcast
Simple Fix for YouTube Kids Dangers - Cybersecurity Expert Shows How
30-year cybersecurity expert reveals why YouTube Kids isn't actually safe and what parents can do about it. My child's experience with nightmare-inducing content led me to research solutions that actually work. As both a cybersecurity professional and a dad, I've discovered that YouTube Kids has three major problems: addictive algorithmic design, inappropriate content infiltration, and low awareness of protective features. NOTES FROM THIS VIDEO: - YouTube Kids algorithms are designed to capture attention indefinitely - Sexual and violent content appears despite "...
2025-09-26
02 min
The Small Business Cyber Security Guy | UK Cybersecurity for SMB & Startups
81 Security Patches + Windows 10’s Final Countdown: What Every Business Owner Must Know
September 2025 Patch Tuesday Show NotesSeptember 2025 Patch Tuesday: Critical Business UpdateSpecial Edition with Graham Falkner Microsoft's September Patch Tuesday brings 81 security fixes, including 9 critical vulnerabilities already being exploited by attackers. This episode provides essential business guidance for small business owners navigating these updates safely and efficiently. Key Topics Covered:Business impact of 81 security vulnerabilities Four critical threats affecting small businesses SharePoint Server active exploitation campaigns Network authentication bypass vulnerabilities 7-day practical deployment strategy Windows 10 end-of-life planning (October 14th deadline) Cyber Essentials compliance requirements Critical Action Items:Days 1-2: Assess SharePoint installations and document processing systems Days 3...
2025-09-11
12 min
The Small Business Cyber Security Guy | UK Cybersecurity for SMEs & Startups
Electoral Commission: 40 Million Hacked, Zero Fines - But Small Businesses Pay Thousands for Less
Episode SummaryThe Electoral Commission suffered a 14-month data breach affecting 40 million UK voters, yet faced zero ICO enforcement action. Meanwhile, small businesses receive crushing GDPR fines for minor infractions. This explosive episode exposes dangerous double standards leaving SMBs vulnerable while government bodies escape accountability.The Shocking FactsBreach Duration: 14 months (August 2021 - October 2022)Affected People: 40 million UK voters' data accessibleAttack Method: ProxyShell vulnerabilities - patches available months before breachAttribution: Chinese state-affiliated actors (APT31)ICO Response: "No enforcement action taken"Security Failures That Would Destroy Small BusinessesDefault passwords...
2025-09-09
13 min
The Small Business Cyber Security Guy | UK Cybersecurity for SMB & Startups
Electoral Commission: 40 Million Hacked, Zero Fines - But Small Businesses Pay Thousands for Less
Episode Summary The Electoral Commission suffered a 14-month data breach affecting 40 million UK voters, yet faced zero ICO enforcement action. Meanwhile, small businesses receive crushing GDPR fines for minor infractions. This explosive episode exposes dangerous double standards leaving SMBs vulnerable while government bodies escape accountability. The Shocking Facts Breach Duration: 14 months (August 2021 - October 2022) Affected People: 40 million UK voters' data accessible Attack Method: ProxyShell vulnerabilities - patches available months before breach Attribution: Chinese state-affiliated actors (APT31) ICO Response: "No enforcement action taken" Security Failures That Would Destroy Small Businesses ...
2025-09-09
13 min
The Small Business Cyber Security Guy | UK Cybersecurity for SMEs & Startups
60% of Small Businesses DIE After Cyberattacks - Are You Next?
🚨 SHOCKING: 60% of Small Businesses Shut Down Forever After Cyberattacks96% of hackers target YOUR business, not big corporations. Think you're too small to be a target? Think again.Noel and Mauven reveal the brutal truth about cybersecurity that could save your business - or expose why you're already at risk.💀 The Terrifying Reality:82% of ransomware attacks target businesses under 1,000 employeesSmall business employees face 350% MORE attacks than enterprise workersAverage cyber incident costs UK businesses £362,000Only 17% of small businesses have cyber insurance🛡️ What Yo...
2025-09-08
26 min
The Small Business Cyber Security Guy | UK Cybersecurity for SMB & Startups
60% of Small Businesses DIE After Cyberattacks - Are You Next?
🚨 SHOCKING: 60% of Small Businesses Shut Down Forever After Cyberattacks 96% of hackers target YOUR business, not big corporations. Think you're too small to be a target? Think again. Noel and Mauven reveal the brutal truth about cybersecurity that could save your business - or expose why you're already at risk. 💀 The Terrifying Reality: 82% of ransomware attacks target businesses under 1,000 employees Small business employees face 350% MORE attacks than enterprise workers Average cyber incident costs UK businesses £362,000 Only 17% of small businesses have cyber insurance 🛡️ What Y...
2025-09-08
26 min
The Small Business Cyber Security Guy | UK Cybersecurity for SMEs & Startups
The Shocking Truth About What Actually Works in Small Business Cybersecurity
After 17 episodes covering everything from basic password security to nation-state threats targeting corner shops, Noel and Mauven reveal what actually works, what consistently fails, and why most businesses are fighting 2019 threats with 2015 thinking while facing 2025 attack methods.🎯 Shocking Revelations:42% of business applications are unauthorised Shadow IT - Your parallel digital infrastructure you never knew existedMulti-factor authentication stops 90% of credential attacks - Yet businesses still resist this free silver bulletAI systems now write custom malware faster than humans can patch - Deepfakes fool CEOs, psychological manipulation targets individualsSupply chain attacks make YOU liable for everyone - Protecting cli...
2025-08-25
48 min
The Small Business Cyber Security Guy | UK Cybersecurity for SMB & Startups
The Shocking Truth About What Actually Works in Small Business Cybersecurity
After 17 episodes covering everything from basic password security to nation-state threats targeting corner shops, Noel and Mauven reveal what actually works, what consistently fails, and why most businesses are fighting 2019 threats with 2015 thinking while facing 2025 attack methods. 🎯 Shocking Revelations: 42% of business applications are unauthorised Shadow IT - Your parallel digital infrastructure you never knew existed Multi-factor authentication stops 90% of credential attacks - Yet businesses still resist this free silver bullet AI systems now write custom malware faster than humans can patch - Deepfakes fool CEOs, psychological manipulation targets individuals Supply chain attacks make YOU liable for eve...
2025-08-25
48 min
The 10 Minute Cyber Fix
When AI Turns Against You
Episode SummaryAI-powered cybercriminals are now targeting UK small businesses with unprecedented sophistication, making artificial intelligence threats the top security concern for 35% of SMEs in 2025. Host Lucy Harper breaks down how criminals weaponise machine learning against businesses and provides a five-step action plan to defend against deepfakes, AI-generated phishing, and automated attacks that traditional security cannot detect.What You'll LearnAI-Powered Cyber Attacks: How criminals use machine learning to create personalised, sophisticated attacks that bypass traditional security measures and target UK SMEs specifically.Technical Threat Landscape: The mechanics behind AI-generated phishing...
2025-08-22
12 min
Family IT Guy Podcast
Roblox Banned the Guy Who Got 6 Predators Arrested - Here’s What Parents Need to Know
I'm a cybersecurity expert who worked with the NSA. I'm also a dad. When I tested Roblox as an 8-year-old with MAXIMUM parental controls, I found sexual content within minutes. Roblox just banned Schlep - who got 6 predators arrested. Now 100,000 people have signed a petition. Congress is involved. Louisiana's Attorney General wants them shut down. Their new "safety" video https://youtu.be/cuPGe99m8zs ? It's not about protecting your kids. It's about protecting their stock price.
2025-08-22
03 min
The 10 Minute Cyber Fix
PayPal's 16 Million User NIGHTMARE - Your Business Is Next
Episode SummaryCybercriminals are selling alleged PayPal credentials for nearly 16 million users on dark web forums, highlighting the devastating reality of credential stuffing attacks targeting UK businesses daily. Hosts Lucy Harper and Graham break down why this threat represents far more than just another data breach and provide an emergency action plan for protecting your business from automated credential attacks.What You'll LearnWhy the alleged PayPal credential dump likely comes from infostealer malware rather than a company breachHow credential stuffing attacks work and why they're particularly dangerous for UK SMEsThe devastating financial impact...
2025-08-21
09 min
The 10 Minute Cyber Fix
Workday Breach: The Rise of Voice Phishing Attacks
Episode SummaryHR giant Workday falls victim to ShinyHunters' sophisticated social engineering campaign, exposing how simple phone calls can bypass enterprise-grade security. Host Lucy Harper breaks down the attack methods and provides actionable defence strategies for UK businesses facing this escalating threat.What You'll LearnHow the ShinyHunters group uses voice phishing to breach major corporations including Workday, Google, and AdidasThe technical methods behind social engineering attacks targeting Salesforce and CRM systemsWhy UK SMEs face higher risk and the four hundred thousand pound ransom already paid by one victimFour immediate action steps to protect...
2025-08-20
10 min
The 10 Minute Cyber Fix
Why Your Managed Service Provider Could Destroy Your Business This Week
Episode SummaryCISA warns of active exploitation targeting N-able N-central RMM platforms used by UK managed service providers. Host Lucy Harper breaks down the critical vulnerabilities affecting thousands of businesses and provides immediate action steps for SME protection.What You'll LearnCVE-2025-8875 and CVE-2025-8876 vulnerabilities enabling complete network takeover through MSP toolsHow deserialization attacks and command injection work using simple analogiesWhy UK SMEs face cascading risks through compromised MSP relationships worth fifty-two billion poundsFour immediate actions to verify MSP security and protect business operationsEmergency timeline with CISA's August 20th federal deadline for...
2025-08-19
10 min
The Small Business Cyber Security Guy | UK Cybersecurity for SMB & Startups
AI Cyber Threats Target Small Business - insights from DefCon 33 & Black Hat 2025
🎧 Latest Episode Alert | Fresh intelligence from DefCon 33 reveals how AI-enhanced cyber threats to small business are accelerating rapidly. Techniques demonstrated in Las Vegas are targeting UK businesses within weeks. 🚨 Critical Cyber Threats to Small Business AI-Powered Social Engineering 85% success rates against security professionals AI psychological profiling from social media Voice synthesis for CEO impersonation attacks Multi-month fake identity campaigns Supply Chain Cyber Threats Coordinated ecosystem attacks across suppliers AI mapping of business relationships MSP compromises affecting 200+ networks Hardware backdoors surviving firmware updates Automated Attack Evolution 6-hour vulnerability-to-exploit timeline 88% evasion of tradit...
2025-08-18
46 min
The Small Business Cyber Security Guy | UK Cybersecurity for SMEs & Startups
AI Cyber Threats Target Small Business - insights from DefCon 33 & Black Hat 2025
🎧 Latest Episode Alert | Fresh intelligence from DefCon 33 reveals how AI-enhanced cyber threats to small business are accelerating rapidly. Techniques demonstrated in Las Vegas are targeting UK businesses within weeks.🚨 Critical Cyber Threats to Small BusinessAI-Powered Social Engineering85% success rates against security professionalsAI psychological profiling from social mediaVoice synthesis for CEO impersonation attacksMulti-month fake identity campaignsSupply Chain Cyber ThreatsCoordinated ecosystem attacks across suppliersAI mapping of business relationshipsMSP compromises affecting 200+ networksHardware backdoors surviving firmware updatesAutomated Attack Evolution6-hour vulnerability-to-exploit timeline88% evasion of traditional antivirusCustom malware for each targetCybercrime-as-a-Service platfo...
2025-08-18
46 min
The 10 Minute Cyber Fix
The Fortinet Vulnerability Crisis
Episode SummaryHost Lucy Harper breaks down why this latest FortiNet incident should represent the final straw in a relentless pattern of Fortinet vulnerabilities and provides a comprehensive action plan for UK businesses to conduct strategic vendor risk assessments.What You'll LearnHow 780 coordinated IP addresses targeted Fortinet SSL VPNs in the largest recorded attack campaignGreyNoise's 80% correlation between attack surges and vulnerability disclosures within 6 weeksThe systematic pattern across Multiple CVE exploitationsWhy UK SMEs face catastrophic risk multiplication through managed service provider compromisesComplete 4-step action plan ending with strategic vendor risk assessment for firewall replacement
2025-08-18
10 min
The 10 Minute Cyber Fix
When File Compression Becomes Business Decompression: The WinRAR Zero-Day Crisis
Episode SummaryA critical zero-day vulnerability in WinRAR (CVE-2025-8088) is being actively exploited by Russian-aligned criminal groups targeting UK businesses through malicious email attachments. Host Lucy Harper breaks down how two sophisticated threat actors are using this flaw to deploy ransomware and provides immediate steps to protect your business.What You'll LearnHow the WinRAR zero-day vulnerability allows criminals to hide malware in innocent-looking file attachmentsWhy RomCom and Paper Werewolf threat actors are targeting UK financial, manufacturing, and logistics companiesThe devastating business impact of path traversal attacks that bypass traditional email...
2025-08-16
11 min
The 10 Minute Cyber Fix
When File Compression Becomes Business Decompression: The WinRAR Zero-Day Crisis
Episode SummaryA critical zero-day vulnerability in WinRAR (CVE-2025-8088) is being actively exploited by Russian-aligned criminal groups targeting UK businesses through malicious email attachments. Host Lucy Harper breaks down how two sophisticated threat actors are using this flaw to deploy ransomware and provides immediate steps to protect your business.What You'll LearnHow the WinRAR zero-day vulnerability allows criminals to hide malware in innocent-looking file attachmentsWhy RomCom and Paper Werewolf threat actors are targeting UK financial, manufacturing, and logistics companiesThe devastating business impact of path traversal attacks that bypass traditional email securityFour immediate...
2025-08-15
11 min
The 10 Minute Cyber Fix
When Your Webcam Becomes the Weapon
Episode SummaryCybersecurity researchers reveal how thousands of trusted Lenovo webcams can be remotely converted into persistent BadUSB attack weapons that survive complete system wipes. Host Lucy Harper breaks down the BadCam vulnerability (CVE-2025-4371) and provides immediate protection strategies for UK businesses using affected devices.What You'll LearnHow the BadCam vulnerability allows remote conversion of Lenovo webcams into BadUSB attack devicesWhy firmware-level attacks operate below traditional security detection and survive system rebuildsThe financial and operational impact on UK SMEs using vulnerable Lenovo 510 FHD and Performance FHD webcamsFour immediate action steps to audit...
2025-08-14
10 min
The 10 Minute Cyber Fix
August 2025 Patch Tuesday Security Update Roundup: 107 Microsoft Flaws Plus Critical Industry Patches
Episode SummaryMicrosoft's August 2025 Patch Tuesday delivers 107 vulnerability fixes including one actively exploited zero-day, while critical updates from Adobe, Google, Cisco, and WinRAR address zero-day attacks across the software ecosystem. Host Lucy Harper breaks down the coordinated multi-vendor security response and provides immediate deployment guidance for UK businesses.What You'll LearnMicrosoft's 107 vulnerabilities including CVE-2025-53779 Kerberos zero-day under active exploitationCritical Office application flaws in Word, Excel, and Exchange Server affecting business operationsMulti-vendor security crisis involving Adobe AEM Forms, WinRAR, Android Qualcomm chips, and Cisco infrastructureEmergency deployment strategies for coordinating updates across multiple technology...
2025-08-13
10 min
The 10 Minute Cyber Fix
UK Becomes Europe's Prime Malware Target
Episode SummaryNew research reveals the UK has become the third most targeted country globally for malware attacks, with over 103 million incidents hitting British businesses in Q2 2025. Host Lucy Harper explains why the UK has become Europe's biggest cybersecurity target and provides immediate protection steps on Microsoft Patch Tuesday. What You'll LearnWhy the UK faces over 1 million daily malware attacks, ranking #1 in EuropeHow APC virus targets business automation systems for maximum disruptionWhy Britain's digital economy makes it a prime criminal targetFour immediate action steps to protect against malware infiltrationWhich website...
2025-08-12
12 min
The Small Business Cyber Security Guy | UK Cybersecurity for SMEs & Startups
When Your Safety Net Becomes the Target
🚨 Episode 11: When Your Safety Net Becomes the TargetBackup Security Under Fire + Business Email Compromise Reality CheckYour backups aren't protecting you anymore—they're the primary target. In this explosive double-header episode, we expose why 94% of ransomware attacks now target backup systems first, and how Business Email Compromise enables these devastating attacks.🎯 What You'll Learn:Backup Reality Check: Why "immutable" storage isn't, and cloud sync ≠ backup protectionCloud Provider Truth Bomb: Neither Microsoft nor Google guarantee your data integrityBEC Epidemic: How £35+ billion in global losses connect to backup destructionModern Attack Chains: Email compromise → reconnaissance → backup annihilationWhat Actually Works: Third-pa...
2025-08-11
31 min
The Small Business Cyber Security Guy | UK Cybersecurity for SMB & Startups
When Your Safety Net Becomes the Target
🚨 Episode 11: When Your Safety Net Becomes the TargetBackup Security Under Fire + Business Email Compromise Reality Check Your backups aren't protecting you anymore—they're the primary target. In this explosive double-header episode, we expose why 94% of ransomware attacks now target backup systems first, and how Business Email Compromise enables these devastating attacks. 🎯 What You'll Learn:Backup Reality Check: Why "immutable" storage isn't, and cloud sync ≠ backup protection Cloud Provider Truth Bomb: Neither Microsoft nor Google guarantee your data integrity BEC Epidemic: How £35+ billion in global losses connect to backup destruction Modern Attack Chains: Email compromise → reconnaissance → backup annihila...
2025-08-11
31 min
The 10 Minute Cyber Fix
NVidia Under Siege: Critical Server Patches That Can't Wait
Episode SummaryCritical vulnerabilities in NVIDIA's Triton Inference Server allow complete AI system takeover through sophisticated vulnerability chaining. Host Lucy Harper breaks down how attackers can steal proprietary AI models, manipulate responses, and use compromised servers as network pivot points, providing emergency patch guidance for UK businesses deploying artificial intelligence infrastructure. What You'll LearnHow three chained vulnerabilities (CVE-2025-23319, CVE-2025-23320, CVE-2025-23334) enable complete AI server takeoverWhy NVIDIA Triton's Python backend becomes the entry point for sophisticated AI infrastructure attacksThe business impact of AI model theft, data manipulation, and intellectual property compromise4...
2025-08-11
12 min
Family IT Guy Podcast
We’re Winning Against Child Predators (And They’re Mad About It)
We're disrupting sextortion operations worldwide - and the criminals are getting desperate. Here's what every parent needs to know. As a 30-year cybersecurity expert and father, I'm seeing firsthand how education about online predators is making criminals less effective. In this video, I explain why scammers are trying to infiltrate my content and, more importantly, share the exact conversation you need to have with your kids tonight. What you'll learn: - Why education is the best defense against sextortion - Specific...
2025-08-09
03 min
Family IT Guy Podcast
Why Your 10-Year-Old Can’t Stop Scrolling (Bottomless Feeds Explained)
Your child's app addiction isn't accidental—it's engineered. Former NSA cybersecurity expert explains the "bottomless feed" design that creates chemical addiction in developing brains. In this 2-minute breakdown, discover: - What bottomless feeds actually are (0:00) - The hidden business model keeping kids hooked (0:26) - Why it's literally "digital drugs" with real brain chemistry (0:45) - The doom scrolling trap adults fall into (1:17) - How to protect your family starting today (1:36) As a parent my...
2025-08-09
02 min
The 10 Minute Cyber Fix
TikTok Shop's AI-Powered Million-Pound Crypto Heist
Episode SummaryUK businesses face a sophisticated new threat as criminals deploy artificial intelligence to industrialize fraud through TikTok Shop. Host Lucy Harper exposes the "FraudOnTok" campaign that's already stolen over £900,000 through 15,000 fake websites, weaponized AI-generated content, and advanced malware specifically designed to hunt cryptocurrency wallets on personal devices that connect to business systems. What You'll LearnHow the "FraudOnTok" campaign uses AI to create convincing fake influencer videos at industrial scaleWhy SparkKitty malware specifically targets screenshots to steal cryptocurrency wallet recovery phrasesHow OAuth token theft bypasses traditional password security and multi-factor authenticationThe business r...
2025-08-08
10 min
The 10 Minute Cyber Fix
Critical Android GPU Vulnerability - Update today!
Episode SummaryGoogle's August 2025 Android security update finally patches CVE-2025-27038, a critical Qualcomm Adreno GPU vulnerability that cybercriminals have been actively exploiting since June. What You'll LearnWhy CVE-2025-27038 represents a fundamental shift in mobile threat landscapes targeting business environmentsHow GPU driver exploitations operate with minimal system impact while maintaining persistent device accessThe three-month vulnerability window that left millions of UK business devices exposed to commercial spyware5 immediate actions your business must take to protect against actively exploited Android vulnerabilitiesWhy graphics processing units are becoming preferred attack vectors for advanced persistent threat...
2025-08-07
12 min
The 10 Minute Cyber Fix
Microsoft's October 2025 Perfect Storm - 69 days and counting: Prepare Your Business Now
Episode SummaryUK businesses face an unprecedented crisis: three major Microsoft changes hitting simultaneously on October 14th, 2025 - just 69 days away. Host Lucy Harper breaks down the "Perfect Storm" that could bankrupt unprepared SMEs and provides an emergency action plan for survival.What You'll LearnWhy October 14th, 2025 represents the biggest technology threat to UK SMEs since WannaCryThe three simultaneous Microsoft changes that create a "perfect storm" scenarioReal cost calculations: why this could represent 200-700% of your annual profit5-step emergency survival plan you must start TODAYSector-specific impacts for manufacturing, retail, and...
2025-08-06
10 min
The Small Business Cyber Security Guy | UK Cybersecurity for SMEs & Startups
White House CIO Insights Part 3 - Advanced Threats & AI
In the final part of our White House CIO Insights series, we explore the cutting-edge AI-powered threats that are transforming cybersecurity. Our special guest Sarah Chen, who heads up AI threat research at a leading UK cybersecurity firm, reveals how artificial intelligence is being weaponized by criminals - and what small businesses can do to defend themselves.From deepfakes that fool CEOs to AI that writes custom malware in real-time, discover why traditional security approaches are failing and what you need to implement today to protect your business against tomorrow's threats.What You'll Learn...
2025-08-04
45 min
The Small Business Cyber Security Guy | UK Cybersecurity for SMB & Startups
White House CIO Insights Part 3 - Advanced Threats & AI
In the final part of our White House CIO Insights series, we explore the cutting-edge AI-powered threats that are transforming cybersecurity. Our special guest Sarah Chen, who heads up AI threat research at a leading UK cybersecurity firm, reveals how artificial intelligence is being weaponized by criminals - and what small businesses can do to defend themselves. From deepfakes that fool CEOs to AI that writes custom malware in real-time, discover why traditional security approaches are failing and what you need to implement today to protect your business against tomorrow's threats. What You'll Learn ...
2025-08-04
45 min
The 10 Minute Cyber Fix
When Your Firewall Becomes the Threat - Monday 4th August 2025
Breaking: Critical SonicWall Vulnerability Threatens UK Small BusinessesArctic Wolf researchers identified a surge in ransomware attacks targeting SonicWall devices since July 15th, 2025. The Akira ransomware gang exploits a zero-day vulnerability bypassing traditional security measures, affecting thousands of UK SMEs.Why This Attack Is Different:90-minute deployment: Initial breach to full encryption in under 2 hoursBypasses security: Compromises updated devices with MFA enabledMassive scale: 300,000+ SonicWall appliances vulnerable, 210,000 unpatchedSophisticated infrastructure: Uses established hosting providersLong-term campaign: Patterns traced to October 2024Impact on UK Small Business:SonicWall devices are popular among UK SMEs for...
2025-08-04
09 min
Aviation Week's Check 6 Podcast
Why Are Cybersecurity Risks Rising For Aerospace And Defense? | Sponsored By Shift5
As competition between the United States and adversary nations intensifies, cybersecurity risks for aerospace and defense are rising. Listen in to this sponsored podcast as Josh Lospinoso, CEO and Co-Founder of Shift5, and David Forbes, who leads Cyber Physical Defense at Booz Allen Hamilton, explain the nature of the cyber security threat, the stakes involved and how to mitigate it. Learn more here
2025-08-04
24 min
The Small Business Cyber Security Guy | UK Cybersecurity for SMEs & Startups
Help Desk MFA Reset Fails: Scattered Spider vs. UK Retail
Episode DescriptionJoin Noel Bradford and Graham Falkner for another cybersecurity hot take as they dive into the alarming world of help desk social engineering attacks. This episode exposes how the notorious Scattered Spider group has weaponized basic human helpfulness to devastating effect, turning your friendly IT support into the front door for ransomware attacks.From MGM's $100 million disaster to the recent wave of UK retail breaches (M&S, Co-op, Harrods), discover how teenagers armed with nothing more than convincing accents and sob stories are outsmarting million-pound security systems. Spoiler alert: it's not the tech...
2025-07-31
08 min
The Small Business Cyber Security Guy | UK Cybersecurity for SMB & Startups
Help Desk MFA Reset Fails: Scattered Spider vs. UK Retail
Episode Description Join Noel Bradford and Graham Falkner for another cybersecurity hot take as they dive into the alarming world of help desk social engineering attacks. This episode exposes how the notorious Scattered Spider group has weaponized basic human helpfulness to devastating effect, turning your friendly IT support into the front door for ransomware attacks. From MGM's $100 million disaster to the recent wave of UK retail breaches (M&S, Co-op, Harrods), discover how teenagers armed with nothing more than convincing accents and sob stories are outsmarting million-pound security systems. Spoiler alert: it's not the tech...
2025-07-31
08 min
The Small Business Cyber Security Guy | UK Cybersecurity for SMEs & Startups
Cyber Essentials - White House Security Principles for UK Small Business
Part 2 of White House CIO Insights Series | ~38 minutesHow do you implement White House-level security without White House-level budgets? Building on insights from former White House CIO Theresa Payton's interview with Scammer Payback, Noel and Mauven explore the UK's Cyber Essentials framework - translating enterprise security principles into achievable small business requirements.The Five Cyber Essentials Controls:Boundary Firewalls - Your digital perimeter defenseSecure Configuration - Closing manufacturer security gapsAccess Control & MFA - 90% credential attack preventionMalware Protection - Beyond traditional antivirusSecurity Update Management - Systematic patchingKey Takeaways:Real...
2025-07-28
42 min
The Small Business Cyber Security Guy | UK Cybersecurity for SMB & Startups
Cyber Essentials - White House Security Principles for UK Small Business
Part 2 of White House CIO Insights Series | ~38 minutes How do you implement White House-level security without White House-level budgets? Building on insights from former White House CIO Theresa Payton's interview with Scammer Payback, Noel and Mauven explore the UK's Cyber Essentials framework - translating enterprise security principles into achievable small business requirements. The Five Cyber Essentials Controls: Boundary Firewalls - Your digital perimeter defense Secure Configuration - Closing manufacturer security gaps Access Control & MFA - 90% credential attack prevention Malware Protection - Beyond traditional antivirus Security Update Management - Systematic patching ...
2025-07-28
42 min
The Small Business Cyber Security Guy | UK Cybersecurity for SMEs & Startups
White House CIO Insights - The Threat Landscape Small Business Faces
What's scarier - protecting the President or a small business in Manchester? Former White House CIO Theresa Payton says they face exactly the same sophisticated threats now.Runtime: 36 minutes | Series: Part 1 of 3 | Hosts: Noel Bradford & Mauven MacLeodKey Topics CoveredNation-state targeting: North Korea (vengeful), Iran (cyber mercenaries), Russia (everything), China (supply chains)"Verify and never trust" - Evolution from Reagan's "trust but verify" for modern threatsIsland hopping attacks - Small businesses as stepping stones to larger targetsWhite House security principles scaled for small business budgetsMulti-factor authentication - 90% effective against credential attacksSupply chain vulnerabilities - Every vendor...
2025-07-21
38 min
The Small Business Cyber Security Guy | UK Cybersecurity for SMB & Startups
White House CIO Insights - The Threat Landscape Small Business Faces
What's scarier - protecting the President or a small business in Manchester? Former White House CIO Theresa Payton says they face exactly the same sophisticated threats now. Runtime: 36 minutes | Series: Part 1 of 3 | Hosts: Noel Bradford & Mauven MacLeodKey Topics Covered Nation-state targeting: North Korea (vengeful), Iran (cyber mercenaries), Russia (everything), China (supply chains) "Verify and never trust" - Evolution from Reagan's "trust but verify" for modern threats Island hopping attacks - Small businesses as stepping stones to larger targets White House security principles scaled for small business budgets Multi-factor authentication - 90% effective against credential attacks Supply chain...
2025-07-21
38 min
The Small Business Cyber Security Guy | UK Cybersecurity for SMEs & Startups
McDonalds' SuperSized Cyber Screw Up
Show Guide: When Basics Break - Special Bonus EpisodeDuration: 9 minutes | Type: Special EpisodeEpisode SummaryMcDonald's password "123456" exposed 64 million job applications. M&S lost £300M to a phone call. Our full team dissects how basic security failures are destroying major brands and what small businesses must learn.Featured TeamNoel Bradford - Lead HostMauven MacLeod - Ex-NCSC SpecialistOliver Sterling - Cybersecurity VeteranDr. Sarah Chen - AI Security ResearcherKey Segments & Timestamps🍟 McDonald's AI Disaster (0:00-3:00)Paradox.ai hiring bot secured with "123456" passwordIDOR vuln...
2025-07-10
12 min
The Small Business Cyber Security Guy | UK Cybersecurity for SMB & Startups
McDonalds’ SuperSized Cyber Screw Up
Show Guide: When Basics Break - Special Bonus Episode Duration: 9 minutes | Type: Special Episode Episode Summary McDonald's password "123456" exposed 64 million job applications. M&S lost £300M to a phone call. Our full team dissects how basic security failures are destroying major brands and what small businesses must learn. Featured Team Noel Bradford - Lead Host Mauven MacLeod - Ex-NCSC Specialist Oliver Sterling - Cybersecurity Veteran Dr. Sarah Chen - AI Security Researcher Key Segments & Timestamps 🍟 McDonald's AI Disaster (0:00-3:00) Paradox.ai hiring bot secu...
2025-07-10
12 min
The Small Business Cyber Security Guy | UK Cybersecurity for SMEs & Startups
Shadow IT - The Unauthorised Technology That's Already Inside Your Business
Shadow IT: The Unauthorised Technology Inside Your Business42% of business applications are unauthorised Shadow IT. Your employees have built hackers a data highway while trying to be helpful.What You'll LearnDetection Methods: DNS monitoring, MDM, endpoint audits, ThreatLocker solutionsGDPR Nightmare: Why Shadow IT makes data subject access requests impossibleReal Examples: 17 project management tools in one 12-person companyManagement Strategies: Control without becoming a digital dictatorImmediate ActionsAudit DNS logs for unknown cloud domainsCheck business credit cards for unauthorised SaaS subscriptionsAsk employees "How do you actually do this job?"K...
2025-07-07
27 min
The Small Business Cyber Security Guy | UK Cybersecurity for SMB & Startups
Shadow IT - The Unauthorised Technology That’s Already Inside Your Business
Shadow IT: The Unauthorised Technology Inside Your Business 42% of business applications are unauthorised Shadow IT. Your employees have built hackers a data highway while trying to be helpful. What You'll Learn Detection Methods: DNS monitoring, MDM, endpoint audits, ThreatLocker solutions GDPR Nightmare: Why Shadow IT makes data subject access requests impossible Real Examples: 17 project management tools in one 12-person company Management Strategies: Control without becoming a digital dictator Immediate Actions Audit DNS logs for unknown cloud domains Check business credit cards for unauthorised SaaS subscriptions Ask employees "How do you actually do this job?" ...
2025-07-07
27 min
The Small Business Cyber Security Guy | UK Cybersecurity for SMEs & Startups
Special Briefing - Middle East Cybersecurity Threats to UK SMBs
Five days ago, it was Israel versus Iran. Over the weekend, American B-2 bombers dropped 14 bunker-busters on Iranian nuclear facilities. Today, your small business became a target in a war you're not even fighting. If you run a UK business using American tech services, and almost certainly yours does, we are talking Microsoft 365 and Google Drive to name 2, this fifteen minute briefing could save you from digital destruction.
2025-06-24
16 min
The Small Business Cyber Security Guy | UK Cybersecurity for SMEs & Startups
Patch Tuesday and the Relentless Race
This episode unpacks the global impact of Patch Tuesday, its evolution, and the chaos it tamed in cybersecurity. Noel and Mauven explore why patch management matters now more than ever and how attackers are always just one step behind—or sometimes ahead. Real stories and practical insights make sense of updates that affect every device in your business.
2025-06-16
32 min
Joy of Architecture
Architecture Pattern Series: Security Patterns
This podcast episode offers an in-depth analysis of essential security patterns for cloud-native and microservices architectures. It thoroughly examines Zero Trust Architecture (ZTA), defining it as a "never trust, always verify" model crucial for modern distributed IT environments, and discussing its core principles, benefits, and trade-offs. The episode also explores Defense in Depth (DiD), a multi-layered cybersecurity strategy that complements ZTA by establishing redundant controls across various components to enhance resilience. Finally, it delves into Identity Federation, explaining how it enables streamlined and secure access across multiple distinct systems through centralized identity management, often leveraging protocols like SAML and...
2025-06-14
26 min
Joy of Architecture
Zero Trust Architecture: Principles, Implementation, and Future Trajectories
Zero Trust Architecture (ZTA) is a cybersecurity paradigm that shifts from traditional perimeter-based defenses to a model of "never trust, always verify," mandating continuous authentication and authorization for every user, device, and application attempting to access resources, regardless of location. This approach is driven by the rise of cloud computing, remote work, and increasingly sophisticated cyber threats that render older security models inadequate. Key components of ZTA include robust identity and access management (IAM), micro-segmentation of networks, endpoint security, application and data-centric controls, and comprehensive visibility and analytics, all governed by a dynamic policy engine. Implementing ZTA involves a...
2025-06-03
54 min
B2B Synergy - The Power Partners USA Podcast
Inside Managed IT Services with Guy Shurki owner of Shur-Net Solutions
Send us Text Message Shout Out!SHOW NOTES AND TIME STAMPSIn this episode of B2B Synergy, the Power Partners, USA podcast, host Alan Armijo introduces Guy Shurki owner of Shur-Net Solutions Inc., a new Power Partner USA member. Guy shares insights into his journey of transforming his IT business into a Managed Service Provider (MSP) over the past two decades detailing how they take over clients' network management, including installation, cloud integration, cybersecurity, and strategic IT planning. He highlights the collaborative nature of his work, acting as the IT department for...
2025-04-07
43 min
CS4NE
Episode 13 - Nullfy Special Guests Zaid Kakish and Tom Knudsen
In this episode of CS4NE, hosts Guy Trainin and Kimberly Ingraham-Beck speak with Zaid Kakish and Tom Knudsen, student leaders from Nullify, a student-run cybersecurity club at the University of Nebraska Omaha. The guests share their experiences in cybersecurity, their passion for hands-on learning, and the goals of Nullify, which include making cybersecurity accessible and fun through events like Capture the Flag (CTF) competitions. They emphasize the importance of building community connections, offering industry talks, and creating engaging opportunities for both high school and college students. The episode highlights how critical cybersecurity has become across all sectors, the...
2025-03-25
18 min
Check Point Tips and Tricks
Tips and Tricks 2024 #20 - When Every Second Counts: Cybersecurity Incident Respons
This is an audio version of our YouTube content.
2025-02-18
28 min
CS4NE
Episode 12 - Cybersecurity Tips - Special Guest Anthony Kava
In this episode of CS4NE, Guy Trainin and Kimberly Ingraham-Beck sit down with Anthony Kava, a digital forensics expert and deputy with the Pottawattamie County Sheriff's Office, to explore the critical role of cybersecurity in today's digital landscape. Anthony shares his journey into cybersecurity, his work in cyber forensics and crime investigations, and practical advice for educators and students alike. The discussion highlights the importance of understanding technology's layers, developing soft skills, and adopting a "hacker mindset" of curiosity and problem-solving. Packed with insights, resources, and tips, this episode underscores the growing significance of cybersecurity for everyone in...
2025-01-15
14 min
Car Dealership Guy Podcast
The Boutique "Dealership" Selling Supercars to the Ultra-Elite | John Temerian, CEO of CURATED
Welcome to the Car Dealership Guy Podcast. In this episode, I speak with John Temerian, CEO of CURATED, a Miami-based boutique dealership specializing in rare, vintage supercars and catering to the ultra-elite. We discuss how a lifelong obsession with supercars turned into an impressive business, his wild search for "blue chip" cars, and how he became the go-to car concierge for the rich and powerful looking to build world-class car collections.This episode of the Car Dealership Guy Podcast is brought to you by:CDK Global - Empowering dealers...
2024-12-05
57 min
CS4NE
Episode 7 - CodeHS - Special Guest Steve Gardner
In this episode of "CS4NE - Computer Science for Nebraska," hosts Guy Trainin and Kimberly Ingraham-Beck discuss the benefits of using CodeHS for teaching computer science. After attending the ISTE and CSTA conferences, Kimberly shares insights from an interview with Steve Gardner, the Chief Revenue Officer of CodeHS. They explore CodeHS’s offerings, including their comprehensive K-12 curriculum, the alignment with Nebraska standards, and the flexibility of their platform, which allows for both free and paid versions. The hosts also dive into a hands-on demonstration of CodeHS, showcasing the platform's features, including cybersecurity, cryptography, and system administration modules, an...
2024-11-05
09 min
ApeCast: Stories from the Yacht Club
Episode 009 | MichaelK - BAYC#115 | Cybersecurity Guy, BD Manager, Entrepreneur
Summary: MichaelK, a cybersecurity expert and business development manager for Consensys, shares his remarkable journey. Starting as an entrepreneur at a young age, Michael quickly built and exited several web2 companies before diving into the world of web3. He joined WalletGuard fueled by his passion for the industry and willingness to work for free early on, which helped him forge strong connections and find success. Michael emphasized the importance of having a team with the same vision and the significance of onboarding new users into the crypto space without focusing on monetary gains.
2024-10-07
1h 00
10 Minute HealthBizCast
Album 8, Track 1: Rapid, Incremental Change
Welcome to Album 8 of The 10 Minute HealthBizCast! On this album, we tackle “Incremental, Revolutionary Change.” Is that even a thing? Listen to find out. For our opening track, we interview BaxterLee (https://www.linkedin.com/in/baxter-lee-9950086/), an expert on cyber security issues and the CFO at Clearwater (www.clearwatersecurity.com), about the wave of cybersecurity attacks on healthcare, how it affects care delivery, and ways that the industry can and is responding. #healthcareleadership #healthcarecybersecurity #healthbizcast #changinghealthcare #cybersecurity
2024-09-25
11 min
Car Dealership Guy Podcast
#121 The imminent evolution of AI in car dealerships, Best uses cases of AI in dealerships, How he's transforming 50% of US franchise dealers | Devin Daly, Co-Founder & CEO of Impel
Welcome to the Car Dealership Guy Podcast. In this episode, I'm speaking with Devin Daly, CEO of Impel where we discuss: The imminent evolution of AI in car dealerships, BTS of his recent $100M acquisition, How he's transforming 50% of all US franchise dealers, The best use cases for AI in car dealerships and much more!This episode of the Car Dealership Guy Podcast is brought to you by:CDK Global - CDK will once again be streaming its annual industry conference CDK Connect 2024 on October 22.This year’s...
2024-09-24
33 min
The News Guy
Nye Technical Services Transforms Modern Surveillance With Security Camera Installation
Nye Technical Services is on a mission to revolutionize security solutions for homes and businesses in Pittsburgh. As security threats continue to evolve, they are leading the way with cutting-edge security camera installation services. With their advanced surveillance cameras, properties can now enjoy 24/7 protection that leaves nothing to chance. Nye takes a personalized approach, ensuring that their security systems are tailored to safeguard properties and provide peace of mind. The demand for advanced surveillance camera installation is rising, and Nye Technical Services is at the forefront of this growing trend. Their goal is to provide long-lasting, reliable security solutions...
2024-09-17
00 min
Home Tech – The Average Guy Network
Christian Johnson with the Effects of CrowdStrike and Software Reliability – HGG622
Christian Johnson joins me this week as we talk about home technology trends, starting with seasonal changes and their effects on our gardens. We discuss AI’s role in enhancing podcast show notes and dive into cybersecurity, highlighting a recent CrowdStrike incident that underscores software reliability issues. As Christian prepares for fatherhood, we look forward to ‘baby tech’ innovations for new parents and debate operating system security vulnerabilities among Windows, Mac, and Linux. We conclude by reflecting on the human elements of technology and celebrate Christian’s upcoming role as a parent and principal engineer. Thanks for listening! Full show notes, t...
2024-09-14
1h 13
The Average Guy Network
Christian Johnson with the Effects of CrowdStrike and Software Reliability – HGG622
Christian Johnson joins me this week as we talk about home technology trends, starting with seasonal changes and their effects on our gardens. We discuss AI’s role in enhancing podcast show notes and dive into cybersecurity, highlighting a recent CrowdStrike incident that underscores software reliability issues. As Christian prepares for fatherhood, we look forward to ‘baby tech’ innovations for new parents and debate operating system security vulnerabilities among Windows, Mac, and Linux. We conclude by reflecting on the human elements of technology and celebrate Christian’s upcoming role as a parent and principal engineer. Thanks for listening! Full show notes, t...
2024-09-14
1h 13
The Average Guy Network
Christian Johnson with the Effects of CrowdStrike and Software Reliability – HGG622
Christian Johnson joins me this week as we talk about home technology trends, starting with seasonal changes and their effects on our gardens. We discuss AI’s role in enhancing podcast show notes and dive into cybersecurity, highlighting a recent CrowdStrike incident that underscores software reliability issues. As Christian prepares for fatherhood, we look forward to ‘baby tech’ innovations for new parents and debate operating system security vulnerabilities among Windows, Mac, and Linux. We conclude by reflecting on the human elements of technology and celebrate Christian’s upcoming role as a parent and principal engineer. Thanks for listening! Full show notes, t...
2024-09-14
1h 13
TAG Podcasts – The Average Guy Network
Christian Johnson with the Effects of CrowdStrike and Software Reliability – HGG622
Christian Johnson joins me this week as we talk about home technology trends, starting with seasonal changes and their effects on our gardens. We discuss AI’s role in enhancing podcast show notes and dive into cybersecurity, highlighting a recent CrowdStrike incident that underscores software reliability issues. As Christian prepares for fatherhood, we look forward to ‘baby tech’ innovations for new parents and debate operating system security vulnerabilities among Windows, Mac, and Linux. We conclude by reflecting on the human elements of technology and celebrate Christian’s upcoming role as a parent and principal engineer. Thanks for listening! Full show notes, t...
2024-09-14
1h 13
The Optimization Guy
Flexible Office Spaces
Welcome to Workspace Wonders, hosted by Danielle Wallace! In today’s episode, we dive deep into the realm of flexible office spaces, exploring why they’re becoming the go-to choice for modern businesses. Here’s what you can expect: Defining Flexible Office Spaces: We break down the concept of coworking environments and serviced offices, highlighting their appeal with short-term leases, ready-to-use amenities, and collaborative atmospheres.The San Antonio Surge: Discover why San Antonio is emerging as a hotspot for flexible office spaces. From its robust economy in sectors like healthcare and cybersecurity to its lower...
2024-08-20
07 min
TechSpective Podcast
Exploring the Future of Cybersecurity in a SaaS-Driven World
TechSpective Podcast Episode 135 In the latest episode of the TechSpective Podcast, I had the pleasure of sitting down with Guy Guzner, co-founder and CEO of Savvy Security. With nearly three decades of experience in cybersecurity, Guy shares his insights into the rapidly evolving landscape of digital threats, particularly in the context of SaaS (Software as a Service) applications. The conversation dives deep into the challenges that modern organizations face as they navigate the complex world of SaaS sprawl. As businesses increasingly rely on SaaS solutions to drive productivity and innovation, the risks associated with identity management and security grow exponentially. G...
2024-08-17
50 min
Car Dealership Guy Podcast
#109 Most costly mistakes dealers are making, Why the FTC is coming after car prices, Top 3 "sleeper" risks in the car biz | Brad Miller, Head of Legal for ComplyAuto
Welcome to the Car Dealership Guy Podcast. In this episode, I'm speaking with Brad Miller, Head of Legal at ComplyAuto where we discuss: The most costly mistakes dealers are making, Why the FTC is coming after car dealers, Top 3 "sleeper" risks in the car biz and much more.This episode of the Car Dealership Guy Podcast is brought to you by:OPENLANE - The world’s best online dealer marketplace for used cars, bringing you exclusive inventory, simple transactions, and better outcomes. New to OPENLANE? Sign up now and re...
2024-08-13
41 min
Cybersecurity Standup
Zero Trust Masterclass with Jason Garbis
Hey everyone, welcome back to "Cybersecurity Stand Up," your favorite spot for all things cybersecurity. Today, we’re coming at you live from the lively Tics Booth at South Moscone. We've got the amazing Jason Garbis with us, and trust us, you don’t want to miss this! Jason’s the go-to guy for all things Zero Trust. He’s been at it for nearly a decade, and he's here to drop some serious knowledge. We'll chat about the Secure by Design initiative, striking the right balance between compliance and actual security, and his two must...
2024-07-09
14 min
AI Unchained
Ai_029 - New Tools and Major Moves in AI
Open AI signals that they are the surveillance leviathon we suspected they always were. Anthropic's Claude 3.5 may be even better than ChatGPT. I explore and detail out some new tools and build new tiny apps to recreate some of the incredible features of the Apple AI announcements, but in a local, open source way. A cybersecurity disaster in Microsoft's announcement of their new OS "feature" Recall and why it may be the worst thing for security and privacy in a very long time. And much more in today's episode, on New Tools and Major Moves in AI. L...
2024-07-04
1h 33
Bitcoin Audible
Ai_029 - New Tools and Major Moves in AI
Open AI signals that they are the surveillance leviathon we suspected they always were. Anthropic's Claude 3.5 may be even better than ChatGPT. I explore and detail out some new tools and build new tiny apps to recreate some of the incredible features of the Apple AI announcements, but in a local, open source way. A cybersecurity disaster in Microsoft's announcement of their new OS "feature" Recall and why it may be the worst thing for security and privacy in a very long time. And much more in today's episode, on New Tools and Major Moves in AI. L...
2024-07-04
1h 33
Cubic Lighthouse
From Chaos to Triumph: Inside Sony Pictures' Epic Battle Against a Destructive Nation-state Cyberattack
In this insightful discussion, Stevan Bernard, former Executive VP of Global Protection Services at Sony Pictures Entertainment, recounts the harrowing experience of navigating the unprecedented cyberattack on Sony Pictures in 2014. From the initial breach to the aftermath, he shares valuable lessons in crisis management, resilience, and business continuity. Discover how the company responded to the devastating wiper malware attack, collaborated with law enforcement, managed communication with stakeholders, and rebuilt the organization's digital infrastructure. This real-world account offers crucial insights for businesses aiming to fortify their cybersecurity strategies and safeguard against modern threats.S...
2024-06-11
25 min
Cubic Lighthouse
Mastering Crisis Management in Cybersecurity with Marie Emmanuelle Py
In this episode, Marie Emmanuelle discusses her extensive experience in crisis management across various high-stakes environments, including the military, naval ships, aircraft carriers, and nuclear plants, and how these principles apply to cybersecurity. She emphasizes that effective crisis management requires more than technical skills; it demands preparation, teamwork, and strategic thinking. Emmanuelle highlights the importance of diverse, well-trained teams that understand individual strengths and can communicate and adapt under pressure. She also stresses the psychological aspects of crisis management, such as managing fear and stress. Her insights underline that the fundamentals of crisis management are universal, whether dealing with...
2024-06-04
13 min
Cubic Lighthouse
Must Read “See Yourself in Cyber” | Book Review with Author Ed Adams
Join us for an insightful review of the book "See Yourself in Cyber: Security Careers Beyond Hacking" by the esteemed author and security expert, Ed Adams. In this engaging discussion, we delve into the challenges and opportunities within the cybersecurity industry, exploring topics such as breaking misconceptions about cybersecurity, addressing the talent crisis, and the crucial role of diversity and inclusion. Discover valuable insights into evolving cybersecurity careers and how individuals can navigate their paths in this dynamic field. Whether you're a newcomer seeking to break into cybersecurity or a hiring manager looking to optimise talent acquisition...
2024-05-28
27 min
Cubic Lighthouse
Navigating the DORA Series: Unraveling Third-Party Risks and Resilience in Cybersecurity
Immerse yourself in the dynamic realm of third-party risk management with our newest video with Pierre Noel in the DORA Series! Engage in a compelling dialogue as we unravel the intricacies of evaluating, overseeing, and alleviating risks tied to third-party collaborations. From emphasizing comprehensive risk assessment to navigating the complexities of fourth-party dependencies, accompany us on this exploration to enhance cybersecurity resilience. Seize invaluable perspectives from seasoned industry professionals!
2024-05-21
24 min
Cubic Lighthouse
Navigating Cybersecurity: Stefanie Drysdale’s Executive Protection Revolution
In today's episode, we're diving into the critical realm of executive digital protection with cybersecurity expert Stefanie Drysdale, who holds the senior vice president position at Precient. We're exploring the sophisticated measures that top-level executives can implement to safeguard their online presence, leveraging Precient's advanced assessments and proprietary tools. Stefanie provides invaluable insights into the intricate process of securing one's digital footprint.Throughout our conversation, Stefanie offers a glimpse into Precient's operational dynamics, global outreach, and potential future expansions, while underscoring the paramount importance of proactive individual initiatives in mitigating digital risks.If you're intrigued...
2024-04-15
28 min
Cubic Lighthouse
Navigating Cybersecurity Recruitment: Aligning Talent with Tech's Evolving Landscape
Welcome back to another episode of the Cubic Lighthouse Podcast! Today, we've got a special guest, Juliette Kasko. She is a seasoned cybersecurity executive recruitment specialist from Singapore. Juliette dives deep into her transition from corporate sales to executive search consulting, the intricacies of retained executive searches, and the differences between various types of recruiters. Juliette will also be sharing her insights on the emerging Ukraine Tech Ecosystem, discussing the impact of AI in the recruitment process, and shedding light on the growing complexity of matching CVs to job criteria. Whether you're a candidate navigating your career j...
2024-04-03
1h 08
Cubic Lighthouse
Navigating the Dynamic Landscape of Cybersecurity: Lessons from an Experienced CISO
In this episode, Guy Marong interviews Nick Vigier, a seasoned CISO based in New York City. Nick shares his extensive experience and insights into the world of cybersecurity, spanning over 20 years. The conversation dives into the evolution of Nick's career, from his initial role in network engineering at the New York Stock Exchange to his current position as the CSO at Oscar Health. He discusses the transformative moments, challenges, and diverse experiences that have shaped his understanding of the complex and multifaceted field of security. Guy and Nick also touch on the importance of storytelling in showcasing the value...
2024-03-22
27 min
שיחות בין DBAs
פרק 165 - יש לנו זמן לדבר על זמן כל הזמן
גיא ואיתן בתוכנית שכולה עניין של זמן. קישורים רלוונטים: הרצאה של עדי כוהן על Temporal Tables שימושים שגויים בפונקציות תאריך - מאת גרי רשף מיפוי של טבלאות שלא בשימוש כולל תמיכה בריסטרטים - מאת אריק רואש פוסטים של פול רנדל לגבי Wait Statistics: SQL Server Wait Statistics: Tell me where it hurts Capturing wait statistics for a period of time Collect Wait Stats Regularly - by Michael J. Swart Ledger in Azure SQL Managed Instance now GA הרצאות במיטאפ: Querying the data lake options (Nov 29) Navigating Large Data in PowerBI (Dec 5) Unlocking the Magic of Databricks (Dec 20) Seamless Analysis: Unleashing Azure Synapse’s Power (Dec 27) Cybersecurity Shield for CIO's - Protecting Your Database Assets
2023-12-03
33 min
The Red-Bearded Risk Guy
What the Heck is MarTech? Part 2
In part 2, Kathleen shares her insights on making use of new technologies such as ChatGPT and other AI technologies. Companies can’t afford to not at least be experimenting with these technologies. From there, shift our focus to risk management and compliance issues surrounding marketing and your website. We talk about everything from privacy to ADA/WCAG compliance, to cybersecurity. Complying with things like ADA can be part of your marketing growth strategy. Not doing it doesn’t only put you at risk of compliance issues. You’re...
2023-10-03
46 min
The Red-Bearded Risk Guy
Cybersecurity Programs: A Modern Business Must- Pt 2 W/ Jack Myers
In this 2 part episode, Jack Myers, The Sales & Marketing Director of @Convergence Networks and I talk about this growing threat business of all sizes. He gives a good overview of the recent #oregondmv data breach, which affected millions of Oregonian's information. It was part of a larger attack on #MOVEit, which may have affected as many as 46 million privacy records. Jack shares insights on the most common types of attacks we're seeing and the most common vulnerability, which is #peopleWe talk about the various ways a breach affects small businesses, with one th...
2023-09-05
39 min
The Red-Bearded Risk Guy
Cybersecurity Programs: A Modern Business Must- Have Pt 1 W/ Jack Myers
Cybersecurity Programs: A Modern Business Must- Have W/ @Jack Myers (he/him) Parts 1 and 2 are live!!!In this 2 part episode, Jack Myers, The Sales & Marketing Director of @Convergence Networks and I talk about this growing threat business of all sizes. He gives a good overview of the recent #oregondmv data breach, which affected millions of Oregonian's information. It was part of a larger attack on #MOVEit, which may have affected as many as 46 million privacy records. Jack shares insights on the most common types of attacks we're seeing and the most co...
2023-09-05
51 min
The Security Guy and CIA Spy PodBroadcast by Robert Siciliano and Peter Warmka
Water hacks, child blackmail and death by TikTok. #35
In this episode, Peter Warmka and Robert Siciliano dive into the critical topic of water supply security. They shed light on the alarming incident of hackers leaking over 721 million passwords in 2022. Additionally, they address the disturbing issue of sexual predators hijacking children's webcams and the tragic case of a teenager's death from the Benadryl Challenge, which TikTok claims to have never witnessed such content trend before. Episode's keynotes/comments/links: EPA stresses the need for improved water cybersecurity https://www.securitymagazine.com/articles/99041-epa-stresses-the-need-for-improved-water-cybersecurity Report: H...
2023-06-02
30 min
The Security Guy and CIA Spy PodBroadcast by Robert Siciliano and Peter Warmka
From trading data on the dark web to deepfakes: The high-stakes world of cybersecurity. #34
In this episode, Peter Warmka and Robert Siciliano discuss an International sting that brings down a major dark web marketplace, Top Salary for Cybercriminals Can Exceed $1M and Twitter 2FA changes. They also talk about how to avoid maybe getting locked out of your account and Can YOU spot a deepfake from a real person? World's first 'certified' deep fake warns viewers not to trust everything they see online. Episode's keynotes / comments / links: International sting brings down major dark web marketplace https...
2023-04-21
28 min
The Security Guy and CIA Spy PodBroadcast by Robert Siciliano and Peter Warmka
TikTok ban, $6 fake identity, and causes of mass shootings. #33
In this episode, Peter Warmka and Robert Siciliano discuss A Top LastPass Engineer's Home PC Got Pwned by a Hacker's Keylogger. They also talk about U.S. House panel to vote next month on possible TikTok ban, Nearly all U.S. mass shooter attackers were male and faced major life stressor report finds, 'Take It Down:' a tool for teens to remove explicit images and How $6 Can Buy Hacked Social Media & Streaming Accounts From the Dark Web. Show links: A Top LastPass Engineer's H...
2023-03-24
27 min
IoT Security Podcast
The IoT Security Challenge: How Steven Edwards Tackles the Extended IoT Attack Surface
When Steven Edwards, an IT Guy turned Security Analyst, discovered the unexpected challenge of securing an expansive attack surface that includes refrigerators, vending machines, and scanners across multiple private address spaces, he had to be tenacious and curious to protect his organization from attack."No matter what the tragedy is, it's beholden upon us to learn from it, to grow and improve. And I think we have done that in a lot of ways." - Steven EdwardsIn this episode, Brian Contos and John Vecchi talk with Steven Edwards. Steven Edwards was a "Regular IT...
2023-03-21
31 min
The Security Guy and CIA Spy PodBroadcast by Robert Siciliano and Peter Warmka
Cybersecurity Resolutions for 2023. #31
In this episode, Peter Warmka and Robert Siciliano discuss 2023 New Years Cyber Security Resolutions and a New violent crime trend: Jugging! Episode's keynotes/comments/links New Years Cyber Security Resolutions https://fraud.org/new-years-resolutions/ New crime trend: jugging https://www.axios.com/2022/12/16/jugging-crime-trend-police-mugging-iphones Resources: Protect Now CSI Protection: Cyber Social Identity and Personal Protection e-learning certification https://protectnowllc.com/csi-protection-certification/ Hire Robert to speak live at your event https://protectnowllc.com/contact-us/ Peter Warmka is a retired se...
2023-01-13
31 min
IoT Security Podcast
When Ransomware Hits During a Health Emergency
Jeffrey Vinson, Senior VP and CISO at Harris Health System, has held leadership positions for much of his life, from military to federal to state government. It was a natural progression for him to move from IT to what he calls a “Pure Cyber Guy.” Vinson joins Brian and John on the show today to answer the question, “What makes up your special forces in cyber?”In healthcare, it’s about saving lives, and cybersecurity is a patient safety issue. Vinson talks about the balancing act between patient safety and data privacy, HIPPA compliance, and legisl...
2022-12-27
48 min
IoT Security Podcast
Cybercriminals and Nation-States Look to IoT as the New Frontline
Richard Stiennon, Chief Research Analyst for IT-Harvest, joins us for The Return: Episode 2. Author of the recent Security Yearbook 2022, Richard started his career before cyber was cyber, a story he originally shared with Brian on a walk along some train tracks. How does a guy go from an ISP start-up to Gartner to IT-Harvest and being a bestselling author?Richard started IT-Harvest to literally harvest data, and that’s resulted in his latest project, an app for data obsessives called the Analyst Dashboard. He talks about what it took to get there and some surprising results he’s di...
2022-11-29
52 min
NorCal and Shill
Donglu
Send us a textEpisode 43: Show Notes.The deeper you dive into the world of NFTs, the more you’ll discover it’s not just about selling. It’s about relationships and community too. Today, we are joined by digital concept artist and art director, Donglu Yu. With over 14 years of entertainment industry experience, Donglu has racked up an impressive work portfolio. She has helped bring to life video games such as Assassin’s Creed (3, Brotherhood, Black Flag, and Valhalla), Deus Ex: Human Revolution, and Far Cry 4. Donglu also worked on the video game fil...
2022-07-07
53 min
The Security Guy and CIA Spy PodBroadcast by Robert Siciliano and Peter Warmka
Russia weighs the risks of launching cyberattacks against the West! #17
Robert Siciliano and Peter Warmka discuss Russia weighs the risks of launching cyberattacks against the West and how Russia may be primed to hack America’s infrastructure. They dive into how data-wiping software is found on ‘hundreds’ of Ukrainian computers and how to protect yourself against a cyberattack as the Russia-Ukraine crisis escalates. Episode's keynotes / comments / links: 🔗 Russia weighs risks of launching cyberattacks against the West: https://thehill.com/policy/cybersecurity/596782-russia-weighs-risks-of-launching-cyberattacks-against-the-west?rl=1 🔗 Russia may be primed to hack America’s infrastructure: https://finance.yahoo.com/news/russia-may-be-primied-to-hack-americas-infrastructure-182256545.html 🔗 Data-w...
2022-03-18
29 min
Online! With Amr The Internet Guy 🌎 Helping business owners be more successful online ✔✔
Episode 31, Online with Amr The Internet Guy! How to protect yourself and your business from Cyber criminals, with Scott Schober
🎧This is Online with Amr The Internet Guy! The show focuses on entrepreneurs and business owners, helping them become more successful in conducting their business on the web without being stuck with Technology 😱, getting a headache, pulling their hairs out, or buying expensive software!My guest today is Scott Schober, Scott is an innovator and Wireless expert from New Jersey, he is the President and CEO of Berkeley Varitronics Systems a provider of advanced, world-class wireless test and security solutions.He is the author of three best-selling security books...
2022-03-17
58 min
The Security Guy and CIA Spy PodBroadcast by Robert Siciliano and Peter Warmka
The world's most powerful cyberweapon #16
Robert Siciliano and Peter Warmka discuss the world's most powerful cyberweapon, which is spyware used by governments around the world. They dig into a shooting where nine police officers killed an unarmed citizen. They discuss social media scams such as romance scams and investment scams are making bad guys big bucks. And they bring attention to social media hoaxes revolving around claiming thieves handing out drugged masks to rob houses and why it's bad news to share false information like this. Episode's keynotes / comments / links: The Battle for the World’s Most Powerful Cy...
2022-02-18
33 min
The Security Guy and CIA Spy PodBroadcast by Robert Siciliano and Peter Warmka
40 billion wreckage being compromised in 2021! #15
Robert Siciliano and Peter Warmka discuss 40 billion wreckage being compromised in 2021, it’s getting worse and it’s not getting any better. The FBI sent out a bulletin Malicious USB drives are being posted to businesses. Russia Arrests REvil Ransomware Gang Responsible for High-Profile Cyber Attacks and Police warn of parking meter phishing. Episode’s links: 🔗 More than 40 billion records exposed in 2021: https://securityboulevard.com/2022/01/more-than-40-billion-records-exposed-in-2021/ 🔗 Malicious USB drives are being posted to businesses: https://www.tripwire.com/state-of-security/security-data-protection/malicious-usb-drives-are-being-posted-to-businesses/ 🔗 Russia Arrests REvil Ransomware Gang Responsible for...
2022-02-04
27 min
The Security Guy and CIA Spy PodBroadcast by Robert Siciliano and Peter Warmka
Grab crimes happening in malls and affluent high-end stores across the country! #14
Robert Siciliano and Peter Warmka dive into all of the recent smash and grab crimes that have been happening in malls and in affluent high-end stores across the country. These particular crimes have also included home invasions resulting in murder and they discussed the proliferation of gun sales as a result. The Apple AirTag has become a smash hit, but there is a tremendous amount of fear, uncertainty and doubt regarding its privacy, security and its implications for stalking. Credit card fraud is always on top of people's minds, and Peter and Robert provide a positive perspective. ...
2022-01-14
28 min
The Customer Acquisition Experience
Aron Skversky | Do the leg work when optimizing your PPC campaigns
In this episode, I get to speak with Aron Skversky. Aron and I worked together ages ago in K Logic, where we helped companies like Outbrain, Cloudinary, & Datorama make their PPC dreams come true.Since then, Aron has worked in-house and at agencies, building marketing strategies and executing upon them for some of the top B2B startups in Israel.Aron is currently the Director of Acquisition at Pentera, a successful cybersecurity company that gives companies the ability to automatically validate that all their security controls are working properly. Aaron is responsible for ensuring that...
2022-01-12
32 min
The Security Guy and CIA Spy PodBroadcast by Robert Siciliano and Peter Warmka
What can the recent Astroworld Festival tragedy teach us about safety? #11
What can the recent Astroworld Festival tragedy teach us about safety? Robert Siciliano and Peter Warmka discuss the awful AstroWorld tragedy where eight people were unnecessarily killed and how "duty of care" needs to be exercised not just by companies but by individuals. They cover numerous data breaches including the recent Robin Hood data breach and what data breach notification laws mean for you or your small business. They also discussed the awesome and awful story of the missing teen rescued after making a hand gesture she learned from TikTok to signal for help. Finally...
2021-11-19
41 min
The Qubit Guy's Podcast
Itan Barmes, Quantum Lead at Deloitte Nederland
My guest today is Itan Barmes, Quantum Lead at Deloitte Nederland. Itan and I spoke about a new World Economic Forum initiative on quantum computing, the impact of quantum on cybersecurity and much more. We hope you enjoy this episode. Please let us know how we did by emailing hello@classiq.io
2021-09-13
18 min
The Security Guy and CIA Spy PodBroadcast by Robert Siciliano and Peter Warmka
Stay on top of what is new and ahead of what is next on all things tech, digital literacy and security. #1
Welcome to The Security Guy & CIA Spy, the podcast where Security Expert Robert Siciliano and former CIA Intelligence Officer Peter Warnka talk openly about outsmarting hackers, scammers, and other cybercriminals! With every episode, we will expose personal security vulnerabilities, cybercrime, analyze the victim’s circumstances, and teach you how to become the toughest target possible for various online threats! Because when The Security Guy meets CIA Spy, hackers and attackers have nowhere to hide! Let’s dive in, and help you skyrocket your security awareness! Episode's keynotes / comments Math correction: according to IBM's report the cost...
2021-06-19
35 min