podcast
details
.com
Print
Share
Look for any podcast host, guest or anyone
Search
Showing episodes and shows of
The Small Business CyberSecurity Guy
Shows
The Small Business Cyber Security Guy | Cybersecurity for SMB & Startups
Locked In: Palantir, Microsoft and the Hidden Political Risk in Your Cloud
Picture this: you’re a minister in Europe and Washington quietly asks for a peek. Your emails, drafts and cabinet notes aren’t in a secret vault — they live on someone else’s servers. This episode opens on that impossible, very real moment and follows the ripple effects: threats of sanctions, a neutral Switzerland walking away from Palantir, and the uncomfortable truth that the UK handed that very company the keys to its health, defence and policing systems. We meet the players: Noel Bradford, the Small Business Cybersecurity Guy, who’s spent four decades turning tape backups into survi...
2026-02-23
27 min
The Small Business Cyber Security Guy | Cybersecurity for SMB & Startups
Locked In: Palantir, Microsoft and the Hidden Political Risk in Your Cloud
Picture this: you’re a minister in Europe and Washington quietly asks for a peek. Your emails, drafts and cabinet notes aren’t in a secret vault — they live on someone else’s servers. This episode opens on that impossible, very real moment and follows the ripple effects: threats of sanctions, a neutral Switzerland walking away from Palantir, and the uncomfortable truth that the UK handed that very company the keys to its health, defence and policing systems. We meet the players: Noel Bradford, the Small Business Cybersecurity Guy, who’s spent four decades turning tape backups into survi...
2026-02-23
27 min
The Small Business Cyber Security Guy | Cybersecurity for SMB & Startups
Edge Devices Under Siege — 393 Days of Unnoticed Access
In this episode of Small Business Cybersecurity Guy, host Maurven McLeod and guest Dr Corinne Jefferson (former US government intelligence analyst turned London-based consultant) unpack Google Threat Intelligence’s alarming report on the Defence Industrial Base (DIB) and explain exactly why it matters to small and medium-sized businesses. They move straight from the uncomfortable headline — Chinese state-linked hackers averaging 393 days of dwell time inside victim networks — to practical implications for 50–80 person companies across manufacturing, logistics, and software supply chains. Topics covered include clear definitions (APT, UNC), the distinction between edge devices and endpoints, why firewalls and VPN applianc...
2026-02-16
22 min
The Small Business Cyber Security Guy | Cybersecurity for SMB & Startups
Edge Devices Under Siege — 393 Days of Unnoticed Access
In this episode of Small Business Cybersecurity Guy, host Maurven McLeod and guest Dr Corinne Jefferson (former US government intelligence analyst turned London-based consultant) unpack Google Threat Intelligence’s alarming report on the Defence Industrial Base (DIB) and explain exactly why it matters to small and medium-sized businesses. They move straight from the uncomfortable headline — Chinese state-linked hackers averaging 393 days of dwell time inside victim networks — to practical implications for 50–80 person companies across manufacturing, logistics, and software supply chains. Topics covered include clear definitions (APT, UNC), the distinction between edge devices and endpoints, why firewalls and VPN applianc...
2026-02-16
22 min
The Small Business Cyber Security Guy | Cybersecurity for SMB & Startups
Four Campaigns, One Nightmare: How 2026's Attacks Bypass Every Small-Business Defence
In this urgent episode of Small Business Cybersecurity Guy, hosts Mauven MacLeod and Graham Falkner join the notably fed-up Noel Bradford to unpack four simultaneous, high‑impact campaigns that emerged between late January and early February 2026. We walk listeners through detailed research from Trellix, Securonix, Rapid7 and Microsoft and explain why these attacks matter to every small business — even if you think you’re too small to be a target. We open with APT28 (Fancy Bear) exploiting CVE‑2026‑21509: a weaponised Office document that triggers on open, drops an Outlook backdoor (MiniDoor/NotDoor) and a C++ implant (Beardshell) injected i...
2026-02-09
28 min
The Small Business Cyber Security Guy | Cybersecurity for SMB & Startups
Four Campaigns, One Nightmare: How 2026's Attacks Bypass Every Small-Business Defence
In this urgent episode of Small Business Cybersecurity Guy, hosts Mauven MacLeod and Graham Falkner join the notably fed-up Noel Bradford to unpack four simultaneous, high‑impact campaigns that emerged between late January and early February 2026. We walk listeners through detailed research from Trellix, Securonix, Rapid7 and Microsoft and explain why these attacks matter to every small business — even if you think you’re too small to be a target. We open with APT28 (Fancy Bear) exploiting CVE‑2026‑21509: a weaponised Office document that triggers on open, drops an Outlook backdoor (MiniDoor/NotDoor) and a C++ implant (Beardshell) injected i...
2026-02-09
28 min
CS4NE
Episode 28 - Cyber Hygiene and Cybersecurity Classroom Activities
In this episode of CS4NE, Kimberly Ingraham-Beck shares engaging classroom activities focused on password security, cyber hygiene, and real-world data breaches. She walks through tools like Security.org’s password checker and HaveIBeenPwned to help students explore password strength and understand the risks of reused or weak passwords. Using hands-on experiments, visualizations, and discussions, Kimberly demonstrates how to help students grasp why length and uniqueness matter more than symbols alone, and how breaches often occur without users doing anything wrong. These activities empower students to protect themselves online and spark meaningful conversations about cybersecurity.
2026-01-19
11 min
The Small Business Cyber Security Guy | Cybersecurity for SMB & Startups
Who’s in Charge When Ransomware Hits? Building Your Incident Response Team
In this episode of Small Business Cybersecurity Guy, hosts Mauven MacLeod, Noel Bradford and Graham Falkner walk you through Module One of their six-part incident response plan series: building your response team. Through the real-world Katie Roberts case study (name changed), they show why independence matters when a breach hits — and how an unbiased incident manager can quickly uncover the truth, coordinate response, and save a business from far worse outcomes. Topics covered include the four core incident roles (external incident manager, technical lead, business continuity coordinator, communications lead), how to find and contract an ext...
2026-01-19
30 min
The Small Business Cyber Security Guy | Cybersecurity for SMB & Startups
Who’s in Charge When Ransomware Hits? Building Your Incident Response Team
In this episode of Small Business Cybersecurity Guy, hosts Mauven MacLeod, Noel Bradford and Graham Falkner walk you through Module One of their six-part incident response plan series: building your response team. Through the real-world Katie Roberts case study (name changed), they show why independence matters when a breach hits — and how an unbiased incident manager can quickly uncover the truth, coordinate response, and save a business from far worse outcomes. Topics covered include the four core incident roles (external incident manager, technical lead, business continuity coordinator, communications lead), how to find and contract an ext...
2026-01-19
30 min
UnixGuy Cyber Security Career
Reality of being a Cyber Security Content Creator! (ft. Cybersecurity girl)
In this episode I'm joined with one of the biggest cyber security content creators in the world: "Cybersecurity girl" (Caitlin Sarian). With a combined following of nearly 2Million followers, we explore what it's like to be a professional cyber security content creator. Is it really a viable career? How can you become a cyber security content creator? Caitlin shares all her secrets with us!Follow Caitlin (Cybersecurity Girl) on Instagram: https://www.instagram.com/cybersecuritygirl/Caitlin (Cybersecurity Girl) Website: https://www.cybersecuritygirl.com/
2026-01-18
35 min
Sec Guy
CompTIA 2026 Cert Refresh Deep Dive
Welcome back to the Sec Guy Channel – your go-to resource for IT and cybersecurity certifications! 🛡️ In this video, we’re doing a deep dive into the BIG changes CompTIA is rolling out in 2026, including: ✅ The brand-new Xpert Series certifications ✅ Crossover certs like SecAI+ for AI-driven security ✅ Updates to A+, Network+, and Security+ that reflect today’s tech trends If you’re planning to get certified in 2026 or want to stay ahead of the curve, this is the video you need! 🔑 What We Cover: Expert Series Explained: What makes these advanced certs differe...
2026-01-14
20 min
Sec Guy
CompTIA SecAI+ Domain 1: AI Fundamentals & Neural Networks Explained
Master AI Fundamentals for the CompTIA SecAI+, Security+, CISSP, and CEH. In this lesson, we break down the "Artificial Brain"—from Neural Networks and Weights to the Transformer architecture that powers ChatGPT. Welcome back to the Sec Guy Channel and the next step on your journey to becoming a cybersecurity professional! 🛡️ While this is the absolute foundation for the CompTIA SecAI+ (Domain 1), this knowledge is now critical for every security role. You cannot secure what you do not understand. Today, we move beyond the buzzwords to understand the actual architecture of AI—because you can't write a policy fo...
2026-01-14
07 min
Sec Guy
Ep 01: The SecAI+ Blueprint – AI Security, Exam Specs, & The Future of Defense
The rules of cybersecurity have changed. Attackers are using generative AI to write polymorphic malware and craft uncatchable phishing emails. Defenders must learn to fight back at machine speed.In this inaugural episode of the Sec Guy Podcast, we kick off our full audio course for the CompTIA Security AI+ (SecAI+) certification. We break down exactly what this new exam covers, why it’s critical for your career, and how to start thinking like an AI defender.In this episode, we cover:The Threat Landscape: How GenAI has shifted the battlefield from human-speed to ma...
2026-01-14
05 min
Sec Guy
Welcome to the Sec Guy Podcast: Your Cybersecurity Journey Starts Here
Welcome to the inaugural episode of the Sec Guy Podcast!In a world full of noise, complex jargon, and gatekeeping, finding a clear path into the cybersecurity industry can be tough. This podcast is here to change that. Hosted by "The Sec Guy," a seasoned IT professional and veteran, this show is dedicated to breaking down complex security concepts into actionable, real-world advice.In this episode, we cover:The Mission: Why we are moving beyond theory to focus on real-world application.Who this is for: Whether you are studying for your CompTIA Security+, exploring...
2026-01-14
01 min
The Small Business Cyber Security Guy | Cybersecurity for SMB & Startups
UK Government Admits Cyber Chaos — 28% of Systems ‘Cannot Be Defended’: What SMBs Need to Know
In this episode of the Small Business Cybersecurity Guy, host Noel Bradford is joined by Mauven McLeod and Graham Falkner to unpack the Cabinet Office’s January 2026 Government Cyber Action Plan — a blunt, 100‑page admission that the UK government’s cybersecurity posture is “critically high” risk and that many of its own targets are unachievable. The trio break down the report’s headline findings, case studies of high‑profile failures, and why this matters to you even if you’ve never worked with government. Key revelations from the Plan covered in the episode include: roughly 28% of government IT is legacy and c...
2026-01-12
27 min
The Small Business Cyber Security Guy | Cybersecurity for SMB & Startups
UK Government Admits Cyber Chaos — 28% of Systems ‘Cannot Be Defended’: What SMBs Need to Know
In this episode of the Small Business Cybersecurity Guy, host Noel Bradford is joined by Mauven McLeod and Graham Falkner to unpack the Cabinet Office’s January 2026 Government Cyber Action Plan — a blunt, 100‑page admission that the UK government’s cybersecurity posture is “critically high” risk and that many of its own targets are unachievable. The trio break down the report’s headline findings, case studies of high‑profile failures, and why this matters to you even if you’ve never worked with government. Key revelations from the Plan covered in the episode include: roughly 28% of government IT is legacy and c...
2026-01-12
27 min
UnixGuy Cyber Security Career
How to Learn Identity & Access Management?
In this episode we explore the world of Identity and Access Management (IAM) with someone with over 25 years of experience in Cyber Security. Meet Abbas Kudrati, a cyber security professional who currently help organisations with their IAM problems, and an overall great guy!Follow Abbas Kudrati on LinkedIn: https://www.linkedin.com/in/akudrati/Resources Mentioned by Abbas:https://www.abbasworld.comhttps://medium.com/@abbask/agentic-ai-a-paradigm-shift-in-cybersecurity-operations-soc-1078d186cbf2https://www.microsoft.com/en-us/security/blog/2020/08/31/cybersecurity-skills-become-ciso/
2026-01-06
35 min
The Small Business Cyber Security Guy | Cybersecurity for SMB & Startups
Facepalm Retrospective: 2025’s Greatest Cyber Fails — From 123456 to the Louvre
Welcome to the Small Business Cybersecurity Guy Christmas Special with host Noel Bradford and guests Mauven MacLeod and Graham Falkner. This episode is a rapid-fire, often hilarious and sometimes horrifying roundup of the most spectacular cyber security disasters of 2025, told with a no-nonsense focus on what small businesses should learn from them. We open with the MacHire fiasco: security researchers discovered an admin account on McDonald’s AI hiring chatbot (Paradox.ai/Olivia) protected by the password "123456," exposing up to 64 million applicant records. The researchers reported the flaw; no known mass theft occurred, but the episode underlines ve...
2025-12-22
21 min
The Small Business Cyber Security Guy | Cybersecurity for SMB & Startups
Facepalm Retrospective: 2025’s Greatest Cyber Fails — From 123456 to the Louvre
Welcome to the Small Business Cybersecurity Guy Christmas Special with host Noel Bradford and guests Mauven MacLeod and Graham Falkner. This episode is a rapid-fire, often hilarious and sometimes horrifying roundup of the most spectacular cyber security disasters of 2025, told with a no-nonsense focus on what small businesses should learn from them. We open with the MacHire fiasco: security researchers discovered an admin account on McDonald’s AI hiring chatbot (Paradox.ai/Olivia) protected by the password "123456," exposing up to 64 million applicant records. The researchers reported the flaw; no known mass theft occurred, but the episode underlines ve...
2025-12-22
21 min
The Small Business Cyber Security Guy | Cybersecurity for SMB & Startups
Reverse Benchmarking: Learn from the Biggest Cyber Faceplants
What if the best way to protect your business isn't copying what the successful companies do, but avoiding what the failures did wrong? Welcome to reverse benchmarking, the cybersecurity equivalent of learning from other people's face-plants so you don't repeat them. In this episode, Noel and Mauven flip traditional benchmarking on its head. Instead of asking "what are the best companies doing?", they explore the far more revealing question: "what did the disasters get catastrophically wrong?" From the Target breach via an HVAC vendor to ransomware attacks on UK holiday parks, the hosts dissect spectacular cybersecurity failures...
2025-12-01
25 min
The Small Business Cyber Security Guy | Cybersecurity for SMB & Startups
Reverse Benchmarking: Learn from the Biggest Cyber Faceplants
What if the best way to protect your business isn't copying what the successful companies do, but avoiding what the failures did wrong? Welcome to reverse benchmarking, the cybersecurity equivalent of learning from other people's face-plants so you don't repeat them. In this episode, Noel and Mauven flip traditional benchmarking on its head. Instead of asking "what are the best companies doing?", they explore the far more revealing question: "what did the disasters get catastrophically wrong?" From the Target breach via an HVAC vendor to ransomware attacks on UK holiday parks, the hosts dissect spectacular cybersecurity failures...
2025-12-01
25 min
The Small Business Cyber Security Guy | Cybersecurity for SMB & Startups
When Ransomware Kills: Should Directors Face Prison for Cyber Negligence?
What happens when business negligence causes serious harm to thousands of people? If a faulty ladder injures someone, directors face prison time. If forty million people have their data stolen due to poor security, they receive a strongly worded letter. In this provocative first episode of our two-part series, Noel and Mauven examine the shocking disparity between health and safety enforcement and cybersecurity regulation in the UK. We compare the HSE's tough approach (prison sentences, director liability, millions in fines) with the ICO's gentle touch (guidance, occasional fines, zero criminal consequences). With 40 million voter records...
2025-11-17
42 min
The Small Business Cyber Security Guy | Cybersecurity for SMB & Startups
When Ransomware Kills: Should Directors Face Prison for Cyber Negligence?
What happens when business negligence causes serious harm to thousands of people? If a faulty ladder injures someone, directors face prison time. If forty million people have their data stolen due to poor security, they receive a strongly worded letter. In this provocative first episode of our two-part series, Noel and Mauven examine the shocking disparity between health and safety enforcement and cybersecurity regulation in the UK. We compare the HSE's tough approach (prison sentences, director liability, millions in fines) with the ICO's gentle touch (guidance, occasional fines, zero criminal consequences). With 40 million voter records...
2025-11-17
42 min
Family IT Guy Podcast
Sora: Why This New AI App Is a Predator’s Dream - What Parents Need to Know
456,000 sextortion reports in 2024. OpenAI's new Sora app combines 3 dangers that make this threat worse. OpenAI just released Sora, an AI video generation app being rolled out to teens. As a 30-year cybersecurity expert, I'm calling it a silver platter for predators. This video breaks down exactly why Sora is different from other social media apps and what specific dangers parents need to understand. - Why Sora's cameo feature creates permanent biometric data risks your family can't reverse - 65,000 AI-generated deepfake sextortion cases happened in 2024...
2025-11-12
04 min
Family IT Guy Podcast
Getting Hired in Cybersecurity: What Hiring Managers Actually Look For (with Orlando Padilla)
Are you or your child interested in cybersecurity? Before spending $25K on a bootcamp, watch this conversation with an offensive security expert. Orlando Padilla shares brutal truths about breaking into the field - from bootcamp scams to what hiring managers actually want. In this conversation, you'll learn: - Why expensive bootcamps often fail to deliver job placement - How AI has completely changed tech hiring (and what to do about it) - How a chemistry major with no...
2025-11-08
1h 30
The Small Business Cyber Security Guy | Cybersecurity for SMB & Startups
Extra Credit: The Corrections, The Code, and The Safeguarding Bombshell
We were wrapping up our interview with Tammy Buchanan about the Kido nursery breach when she said: "Actually, there were some really important points I forgot to make." So we grabbed another cup of tea, broke out the custard creams, and kept recording. Then, during the tea break, Graham discovered something on Twitter: VX-Underground, a credible malware research collective, had posted a screenshot of what appears to be a Kido GitHub repository containing API code. Files that typically contain system credentials. A potential smoking gun. In Part 2, Tammy reveals what was missed in P...
2025-10-13
35 min
The Small Business Cyber Security Guy | Cybersecurity for SMB & Startups
Extra Credit: The Corrections, The Code, and The Safeguarding Bombshell
We were wrapping up our interview with Tammy Buchanan about the Kido nursery breach when she said: "Actually, there were some really important points I forgot to make." So we grabbed another cup of tea, broke out the custard creams, and kept recording. Then, during the tea break, Graham discovered something on Twitter: VX-Underground, a credible malware research collective, had posted a screenshot of what appears to be a Kido GitHub repository containing API code. Files that typically contain system credentials. A potential smoking gun. In Part 2, Tammy reveals what was missed in P...
2025-10-13
35 min
CS4NE
Episode 20 - Cybersecurity with Kim Ingraham-Beck
In this solo episode of CS4NE, host Kimberly Ingraham-Beck shares her journey into cybersecurity education and why it has become one of her biggest passions. She highlights the critical demand for cybersecurity professionals, explores free classroom-ready resources from Cyber.org, TeachCyber.org, and CodeHS, and recommends professional learning opportunities like free bootcamps and certificates. With practical tips for both new and experienced teachers, Kimberly encourages educators to integrate cybersecurity into their curriculum and inspire the next generation of digital defenders.
2025-10-09
03 min
The Small Business Cyber Security Guy | Cybersecurity for SMB & Startups
When Teen Hackers Test Your Defences: Lessons from the School Yard to the Boardroom
Join hosts Noel Bradford and Mauven McLeod in this Back-to-School special of the Small Business Cybersecurity Guy podcast as they trace a line from 1980s schoolroom mischief to modern, large-scale breaches that put millions of students and small organisations at risk. Through recollections of early BBC Model B and Novell-era antics, the episode uses real recent incidents to expose how weak passwords, written credentials and opportunistic insiders create systemic security failures. The episode unpacks headline-making investigations and statistics — including the ICO analysis showing that students are behind a majority of school data breaches, the PowerSchool compromise that af...
2025-09-29
41 min
The Small Business Cyber Security Guy | Cybersecurity for SMB & Startups
When Teen Hackers Test Your Defences: Lessons from the School Yard to the Boardroom
Join hosts Noel Bradford and Mauven McLeod in this Back-to-School special of the Small Business Cybersecurity Guy podcast as they trace a line from 1980s schoolroom mischief to modern, large-scale breaches that put millions of students and small organisations at risk. Through recollections of early BBC Model B and Novell-era antics, the episode uses real recent incidents to expose how weak passwords, written credentials and opportunistic insiders create systemic security failures. The episode unpacks headline-making investigations and statistics — including the ICO analysis showing that students are behind a majority of school data breaches, the PowerSchool compromise that af...
2025-09-29
41 min
Family IT Guy Podcast
Simple Fix for YouTube Kids Dangers - Cybersecurity Expert Shows How
30-year cybersecurity expert reveals why YouTube Kids isn't actually safe and what parents can do about it. My child's experience with nightmare-inducing content led me to research solutions that actually work. As both a cybersecurity professional and a dad, I've discovered that YouTube Kids has three major problems: addictive algorithmic design, inappropriate content infiltration, and low awareness of protective features. NOTES FROM THIS VIDEO: - YouTube Kids algorithms are designed to capture attention indefinitely - Sexual and violent content appears despite "...
2025-09-26
02 min
The Small Business Cyber Security Guy | Cybersecurity for SMB & Startups
£80M Blow: How Teenagers and One Phone Call Bankrupted Co-op's Cybersecurity
Co-op's CEO has just confirmed that their cybersecurity disaster cost £80 million. The attackers? Teenagers are using basic social engineering. In this Hot Takes episode, we break down how "We've contained the incident" turned into an £80 million earnings wipeout, and why the final bill could reach £400-500 million once legal claims are settled. This isn't just another breach story - it's a wake-up call for every UK business owner who thinks "it won't happen to us." Key Topics Covered The Attack Breakdown [0:30] April 2024 attack by the Scattered Spider group Social engineering, not sophisticated exploits 6.5 million mem...
2025-09-25
08 min
The Small Business Cyber Security Guy | Cybersecurity for SMB & Startups
£80M Blow: How Teenagers and One Phone Call Bankrupted Co-op's Cybersecurity
Co-op's CEO has just confirmed that their cybersecurity disaster cost £80 million. The attackers? Teenagers are using basic social engineering. In this Hot Takes episode, we break down how "We've contained the incident" turned into an £80 million earnings wipeout, and why the final bill could reach £400-500 million once legal claims are settled. This isn't just another breach story - it's a wake-up call for every UK business owner who thinks "it won't happen to us." Key Topics Covered The Attack Breakdown [0:30] April 2024 attack by the Scattered Spider group Social engineering, not sophisticated exploits 6.5 million mem...
2025-09-25
08 min
The Small Business Cyber Security Guy | Cybersecurity for SMB & Startups
81 Security Patches + Windows 10’s Final Countdown: What Every Business Owner Must Know
September 2025 Patch Tuesday: Critical Business Update Special Edition with Graham Falkner Microsoft's September Patch Tuesday brings 81 security fixes, including 9 critical vulnerabilities already being exploited by attackers. This episode provides essential business guidance for small business owners navigating these updates safely and efficiently. Key Topics Covered: Business impact of 81 security vulnerabilities Four critical threats affecting small businesses SharePoint Server active exploitation campaigns Network authentication bypass vulnerabilities 7-day practical deployment strategy Windows 10 end-of-life planning (October 14th deadline) Cyber Essentials compliance requirements Critical Action Items: Days 1-2: Assess SharePoint installations and document processing...
2025-09-11
12 min
The Small Business Cyber Security Guy | Cybersecurity for SMB & Startups
81 Security Patches + Windows 10’s Final Countdown: What Every Business Owner Must Know
September 2025 Patch Tuesday: Critical Business Update Special Edition with Graham Falkner Microsoft's September Patch Tuesday brings 81 security fixes, including 9 critical vulnerabilities already being exploited by attackers. This episode provides essential business guidance for small business owners navigating these updates safely and efficiently. Key Topics Covered: Business impact of 81 security vulnerabilities Four critical threats affecting small businesses SharePoint Server active exploitation campaigns Network authentication bypass vulnerabilities 7-day practical deployment strategy Windows 10 end-of-life planning (October 14th deadline) Cyber Essentials compliance requirements Critical Action Items: Days 1-2: Assess SharePoint installations and document processing...
2025-09-11
12 min
The Small Business Cyber Security Guy | Cybersecurity for SMB & Startups
Electoral Commission: 40 Million Hacked, Zero Fines - But Small Businesses Pay Thousands for Less
Episode Summary The Electoral Commission suffered a 14-month data breach affecting 40 million UK voters, yet faced zero ICO enforcement action. Meanwhile, small businesses receive crushing GDPR fines for minor infractions. This explosive episode exposes dangerous double standards leaving SMBs vulnerable while government bodies escape accountability. The Shocking Facts Breach Duration: 14 months (August 2021 - October 2022) Affected People: 40 million UK voters' data accessible Attack Method: ProxyShell vulnerabilities - patches available months before breach Attribution: Chinese state-affiliated actors (APT31) ICO Response: "No enforcement action taken" Security Failures That Would Destroy Small Businesses ...
2025-09-09
13 min
The Small Business Cyber Security Guy | Cybersecurity for SMB & Startups
Electoral Commission: 40 Million Hacked, Zero Fines - But Small Businesses Pay Thousands for Less
Episode Summary The Electoral Commission suffered a 14-month data breach affecting 40 million UK voters, yet faced zero ICO enforcement action. Meanwhile, small businesses receive crushing GDPR fines for minor infractions. This explosive episode exposes dangerous double standards leaving SMBs vulnerable while government bodies escape accountability. The Shocking Facts Breach Duration: 14 months (August 2021 - October 2022) Affected People: 40 million UK voters' data accessible Attack Method: ProxyShell vulnerabilities - patches available months before breach Attribution: Chinese state-affiliated actors (APT31) ICO Response: "No enforcement action taken" Security Failures That Would Destroy Small Businesses ...
2025-09-09
13 min
The Small Business Cyber Security Guy | Cybersecurity for SMB & Startups
60% of Small Businesses DIE After Cyberattacks - Are You Next?
🚨 SHOCKING: 60% of Small Businesses Shut Down Forever After Cyberattacks 96% of hackers target YOUR business, not big corporations. Think you're too small to be a target? Think again. Noel and Mauven reveal the brutal truth about cybersecurity that could save your business - or expose why you're already at risk. 💀 The Terrifying Reality: 82% of ransomware attacks target businesses under 1,000 employees Small business employees face 350% MORE attacks than enterprise workers Average cyber incident costs UK businesses £362,000 Only 17% of small businesses have cyber insurance 🛡️ What Y...
2025-09-08
26 min
The Small Business Cyber Security Guy | Cybersecurity for SMB & Startups
60% of Small Businesses DIE After Cyberattacks - Are You Next?
🚨 SHOCKING: 60% of Small Businesses Shut Down Forever After Cyberattacks 96% of hackers target YOUR business, not big corporations. Think you're too small to be a target? Think again. Noel and Mauven reveal the brutal truth about cybersecurity that could save your business - or expose why you're already at risk. 💀 The Terrifying Reality: 82% of ransomware attacks target businesses under 1,000 employees Small business employees face 350% MORE attacks than enterprise workers Average cyber incident costs UK businesses £362,000 Only 17% of small businesses have cyber insurance 🛡️ What Y...
2025-09-08
26 min
The Small Business Cyber Security Guy | Cybersecurity for SMB & Startups
The Shocking Truth About What Actually Works in Small Business Cybersecurity
After 17 episodes covering everything from basic password security to nation-state threats targeting corner shops, Noel and Mauven reveal what actually works, what consistently fails, and why most businesses are fighting 2019 threats with 2015 thinking while facing 2025 attack methods. 🎯 Shocking Revelations: 42% of business applications are unauthorised Shadow IT - Your parallel digital infrastructure you never knew existed Multi-factor authentication stops 90% of credential attacks - Yet businesses still resist this free silver bullet AI systems now write custom malware faster than humans can patch - Deepfakes fool CEOs, psychological manipulation targets individuals Supply chain attacks make YOU liable for eve...
2025-08-25
48 min
The Small Business Cyber Security Guy | Cybersecurity for SMB & Startups
The Shocking Truth About What Actually Works in Small Business Cybersecurity
After 17 episodes covering everything from basic password security to nation-state threats targeting corner shops, Noel and Mauven reveal what actually works, what consistently fails, and why most businesses are fighting 2019 threats with 2015 thinking while facing 2025 attack methods. 🎯 Shocking Revelations: 42% of business applications are unauthorised Shadow IT - Your parallel digital infrastructure you never knew existed Multi-factor authentication stops 90% of credential attacks - Yet businesses still resist this free silver bullet AI systems now write custom malware faster than humans can patch - Deepfakes fool CEOs, psychological manipulation targets individuals Supply chain attacks make YOU liable for eve...
2025-08-25
48 min
The 10 Minute Cyber Fix
When AI Turns Against You
Episode SummaryAI-powered cybercriminals are now targeting UK small businesses with unprecedented sophistication, making artificial intelligence threats the top security concern for 35% of SMEs in 2025. Host Lucy Harper breaks down how criminals weaponise machine learning against businesses and provides a five-step action plan to defend against deepfakes, AI-generated phishing, and automated attacks that traditional security cannot detect.What You'll LearnAI-Powered Cyber Attacks: How criminals use machine learning to create personalised, sophisticated attacks that bypass traditional security measures and target UK SMEs specifically.Technical Threat Landscape: The mechanics behind AI-generated phishing...
2025-08-22
12 min
Family IT Guy Podcast
Roblox Banned the Guy Who Got 6 Predators Arrested - Here’s What Parents Need to Know
I'm a cybersecurity expert who worked with the NSA. I'm also a dad. When I tested Roblox as an 8-year-old with MAXIMUM parental controls, I found sexual content within minutes. Roblox just banned Schlep - who got 6 predators arrested. Now 100,000 people have signed a petition. Congress is involved. Louisiana's Attorney General wants them shut down. Their new "safety" video https://youtu.be/cuPGe99m8zs ? It's not about protecting your kids. It's about protecting their stock price.
2025-08-22
03 min
The 10 Minute Cyber Fix
PayPal's 16 Million User NIGHTMARE - Your Business Is Next
Episode SummaryCybercriminals are selling alleged PayPal credentials for nearly 16 million users on dark web forums, highlighting the devastating reality of credential stuffing attacks targeting UK businesses daily. Hosts Lucy Harper and Graham break down why this threat represents far more than just another data breach and provide an emergency action plan for protecting your business from automated credential attacks.What You'll LearnWhy the alleged PayPal credential dump likely comes from infostealer malware rather than a company breachHow credential stuffing attacks work and why they're particularly dangerous for UK SMEsThe devastating financial impact...
2025-08-21
09 min
The 10 Minute Cyber Fix
Workday Breach: The Rise of Voice Phishing Attacks
Episode SummaryHR giant Workday falls victim to ShinyHunters' sophisticated social engineering campaign, exposing how simple phone calls can bypass enterprise-grade security. Host Lucy Harper breaks down the attack methods and provides actionable defence strategies for UK businesses facing this escalating threat.What You'll LearnHow the ShinyHunters group uses voice phishing to breach major corporations including Workday, Google, and AdidasThe technical methods behind social engineering attacks targeting Salesforce and CRM systemsWhy UK SMEs face higher risk and the four hundred thousand pound ransom already paid by one victimFour immediate action steps to protect...
2025-08-20
10 min
The 10 Minute Cyber Fix
Why Your Managed Service Provider Could Destroy Your Business This Week
Episode SummaryCISA warns of active exploitation targeting N-able N-central RMM platforms used by UK managed service providers. Host Lucy Harper breaks down the critical vulnerabilities affecting thousands of businesses and provides immediate action steps for SME protection.What You'll LearnCVE-2025-8875 and CVE-2025-8876 vulnerabilities enabling complete network takeover through MSP toolsHow deserialization attacks and command injection work using simple analogiesWhy UK SMEs face cascading risks through compromised MSP relationships worth fifty-two billion poundsFour immediate actions to verify MSP security and protect business operationsEmergency timeline with CISA's August 20th federal deadline for...
2025-08-19
10 min
The Small Business Cyber Security Guy | Cybersecurity for SMB & Startups
AI Cyber Threats Target Small Business - insights from DefCon 33 & Black Hat 2025
🎧 Latest Episode Alert | Fresh intelligence from DefCon 33 reveals how AI-enhanced cyber threats to small business are accelerating rapidly. Techniques demonstrated in Las Vegas are targeting UK businesses within weeks. 🚨 Critical Cyber Threats to Small Business AI-Powered Social Engineering 85% success rates against security professionals AI psychological profiling from social media Voice synthesis for CEO impersonation attacks Multi-month fake identity campaigns Supply Chain Cyber Threats Coordinated ecosystem attacks across suppliers AI mapping of business relationships MSP compromises affecting 200+ networks Hardware backdoors surviving firmware updates Automated Attack Evolution 6-hour vulnerability-to-exploit timeline 88% evasion of tradit...
2025-08-18
46 min
The Small Business Cyber Security Guy | Cybersecurity for SMB & Startups
AI Cyber Threats Target Small Business - insights from DefCon 33 & Black Hat 2025
🎧 Latest Episode Alert | Fresh intelligence from DefCon 33 reveals how AI-enhanced cyber threats to small business are accelerating rapidly. Techniques demonstrated in Las Vegas are targeting UK businesses within weeks. 🚨 Critical Cyber Threats to Small Business AI-Powered Social Engineering 85% success rates against security professionals AI psychological profiling from social media Voice synthesis for CEO impersonation attacks Multi-month fake identity campaigns Supply Chain Cyber Threats Coordinated ecosystem attacks across suppliers AI mapping of business relationships MSP compromises affecting 200+ networks Hardware backdoors surviving firmware updates Automated Attack Evolution 6-hour vulnerability-to-exploit timeline 88% evasion of tradit...
2025-08-18
46 min
The 10 Minute Cyber Fix
The Fortinet Vulnerability Crisis
Episode SummaryHost Lucy Harper breaks down why this latest FortiNet incident should represent the final straw in a relentless pattern of Fortinet vulnerabilities and provides a comprehensive action plan for UK businesses to conduct strategic vendor risk assessments.What You'll LearnHow 780 coordinated IP addresses targeted Fortinet SSL VPNs in the largest recorded attack campaignGreyNoise's 80% correlation between attack surges and vulnerability disclosures within 6 weeksThe systematic pattern across Multiple CVE exploitationsWhy UK SMEs face catastrophic risk multiplication through managed service provider compromisesComplete 4-step action plan ending with strategic vendor risk assessment for firewall replacement
2025-08-18
10 min
The 10 Minute Cyber Fix
When File Compression Becomes Business Decompression: The WinRAR Zero-Day Crisis
Episode SummaryA critical zero-day vulnerability in WinRAR (CVE-2025-8088) is being actively exploited by Russian-aligned criminal groups targeting UK businesses through malicious email attachments. Host Lucy Harper breaks down how two sophisticated threat actors are using this flaw to deploy ransomware and provides immediate steps to protect your business.What You'll LearnHow the WinRAR zero-day vulnerability allows criminals to hide malware in innocent-looking file attachmentsWhy RomCom and Paper Werewolf threat actors are targeting UK financial, manufacturing, and logistics companiesThe devastating business impact of path traversal attacks that bypass traditional email...
2025-08-16
11 min
The 10 Minute Cyber Fix
When File Compression Becomes Business Decompression: The WinRAR Zero-Day Crisis
Episode SummaryA critical zero-day vulnerability in WinRAR (CVE-2025-8088) is being actively exploited by Russian-aligned criminal groups targeting UK businesses through malicious email attachments. Host Lucy Harper breaks down how two sophisticated threat actors are using this flaw to deploy ransomware and provides immediate steps to protect your business.What You'll LearnHow the WinRAR zero-day vulnerability allows criminals to hide malware in innocent-looking file attachmentsWhy RomCom and Paper Werewolf threat actors are targeting UK financial, manufacturing, and logistics companiesThe devastating business impact of path traversal attacks that bypass traditional email securityFour immediate...
2025-08-15
11 min
The 10 Minute Cyber Fix
When Your Webcam Becomes the Weapon
Episode SummaryCybersecurity researchers reveal how thousands of trusted Lenovo webcams can be remotely converted into persistent BadUSB attack weapons that survive complete system wipes. Host Lucy Harper breaks down the BadCam vulnerability (CVE-2025-4371) and provides immediate protection strategies for UK businesses using affected devices.What You'll LearnHow the BadCam vulnerability allows remote conversion of Lenovo webcams into BadUSB attack devicesWhy firmware-level attacks operate below traditional security detection and survive system rebuildsThe financial and operational impact on UK SMEs using vulnerable Lenovo 510 FHD and Performance FHD webcamsFour immediate action steps to audit...
2025-08-14
10 min
The 10 Minute Cyber Fix
August 2025 Patch Tuesday Security Update Roundup: 107 Microsoft Flaws Plus Critical Industry Patches
Episode SummaryMicrosoft's August 2025 Patch Tuesday delivers 107 vulnerability fixes including one actively exploited zero-day, while critical updates from Adobe, Google, Cisco, and WinRAR address zero-day attacks across the software ecosystem. Host Lucy Harper breaks down the coordinated multi-vendor security response and provides immediate deployment guidance for UK businesses.What You'll LearnMicrosoft's 107 vulnerabilities including CVE-2025-53779 Kerberos zero-day under active exploitationCritical Office application flaws in Word, Excel, and Exchange Server affecting business operationsMulti-vendor security crisis involving Adobe AEM Forms, WinRAR, Android Qualcomm chips, and Cisco infrastructureEmergency deployment strategies for coordinating updates across multiple technology...
2025-08-13
10 min
The 10 Minute Cyber Fix
UK Becomes Europe's Prime Malware Target
Episode SummaryNew research reveals the UK has become the third most targeted country globally for malware attacks, with over 103 million incidents hitting British businesses in Q2 2025. Host Lucy Harper explains why the UK has become Europe's biggest cybersecurity target and provides immediate protection steps on Microsoft Patch Tuesday. What You'll LearnWhy the UK faces over 1 million daily malware attacks, ranking #1 in EuropeHow APC virus targets business automation systems for maximum disruptionWhy Britain's digital economy makes it a prime criminal targetFour immediate action steps to protect against malware infiltrationWhich website...
2025-08-12
12 min
The 10 Minute Cyber Fix
NVidia Under Siege: Critical Server Patches That Can't Wait
Episode SummaryCritical vulnerabilities in NVIDIA's Triton Inference Server allow complete AI system takeover through sophisticated vulnerability chaining. Host Lucy Harper breaks down how attackers can steal proprietary AI models, manipulate responses, and use compromised servers as network pivot points, providing emergency patch guidance for UK businesses deploying artificial intelligence infrastructure. What You'll LearnHow three chained vulnerabilities (CVE-2025-23319, CVE-2025-23320, CVE-2025-23334) enable complete AI server takeoverWhy NVIDIA Triton's Python backend becomes the entry point for sophisticated AI infrastructure attacksThe business impact of AI model theft, data manipulation, and intellectual property compromise4...
2025-08-11
12 min
Family IT Guy Podcast
Why Your 10-Year-Old Can’t Stop Scrolling (Bottomless Feeds Explained)
Your child's app addiction isn't accidental—it's engineered. Former NSA cybersecurity expert explains the "bottomless feed" design that creates chemical addiction in developing brains. In this 2-minute breakdown, discover: - What bottomless feeds actually are (0:00) - The hidden business model keeping kids hooked (0:26) - Why it's literally "digital drugs" with real brain chemistry (0:45) - The doom scrolling trap adults fall into (1:17) - How to protect your family starting today (1:36) As a parent my...
2025-08-09
02 min
The 10 Minute Cyber Fix
TikTok Shop's AI-Powered Million-Pound Crypto Heist
Episode SummaryUK businesses face a sophisticated new threat as criminals deploy artificial intelligence to industrialize fraud through TikTok Shop. Host Lucy Harper exposes the "FraudOnTok" campaign that's already stolen over £900,000 through 15,000 fake websites, weaponized AI-generated content, and advanced malware specifically designed to hunt cryptocurrency wallets on personal devices that connect to business systems. What You'll LearnHow the "FraudOnTok" campaign uses AI to create convincing fake influencer videos at industrial scaleWhy SparkKitty malware specifically targets screenshots to steal cryptocurrency wallet recovery phrasesHow OAuth token theft bypasses traditional password security and multi-factor authenticationThe business r...
2025-08-08
10 min
UnixGuy Cyber Security Career
Cyber Security Education & Awareness specialty.
Most people assume that cybersecurity is only for technical experts, coders, or ethical hackers. In this episode, we dismantle that myth and reveal one of the fastest and most accessible pathways into the industry: Security Education and Awareness.If you are someone who has no technical degree, no IT background, and no coding experience, this episode will open your eyes to a part of cybersecurity that is rarely talked about, yet growing rapidly.Host Abed is joined by Chantel, a cybersecurity awareness specialist who has worked in some of Australia's biggest organisations...
2025-08-07
27 min
The Small Business Cyber Security Guy | Cybersecurity for SMB & Startups
White House CIO Insights Part 3 - Advanced Threats & AI
In the final part of our White House CIO Insights series, we explore the cutting-edge AI-powered threats that are transforming cybersecurity. Our special guest Sarah Chen, who heads up AI threat research at a leading UK cybersecurity firm, reveals how artificial intelligence is being weaponized by criminals - and what small businesses can do to defend themselves. From deepfakes that fool CEOs to AI that writes custom malware in real-time, discover why traditional security approaches are failing and what you need to implement today to protect your business against tomorrow's threats. What You'll Learn ...
2025-08-04
45 min
The Small Business Cyber Security Guy | Cybersecurity for SMB & Startups
White House CIO Insights Part 3 - Advanced Threats & AI
In the final part of our White House CIO Insights series, we explore the cutting-edge AI-powered threats that are transforming cybersecurity. Our special guest Sarah Chen, who heads up AI threat research at a leading UK cybersecurity firm, reveals how artificial intelligence is being weaponized by criminals - and what small businesses can do to defend themselves. From deepfakes that fool CEOs to AI that writes custom malware in real-time, discover why traditional security approaches are failing and what you need to implement today to protect your business against tomorrow's threats. What You'll Learn ...
2025-08-04
45 min
The 10 Minute Cyber Fix
When Your Firewall Becomes the Threat - Monday 4th August 2025
Breaking: Critical SonicWall Vulnerability Threatens UK Small BusinessesArctic Wolf researchers identified a surge in ransomware attacks targeting SonicWall devices since July 15th, 2025. The Akira ransomware gang exploits a zero-day vulnerability bypassing traditional security measures, affecting thousands of UK SMEs.Why This Attack Is Different:90-minute deployment: Initial breach to full encryption in under 2 hoursBypasses security: Compromises updated devices with MFA enabledMassive scale: 300,000+ SonicWall appliances vulnerable, 210,000 unpatchedSophisticated infrastructure: Uses established hosting providersLong-term campaign: Patterns traced to October 2024Impact on UK Small Business:SonicWall devices are popular among UK SMEs for...
2025-08-04
09 min
The Small Business Cyber Security Guy | Cybersecurity for SMB & Startups
Help Desk MFA Reset Fails: Scattered Spider vs. UK Retail
Episode Description Join Noel Bradford and Graham Falkner for another cybersecurity hot take as they dive into the alarming world of help desk social engineering attacks. This episode exposes how the notorious Scattered Spider group has weaponized basic human helpfulness to devastating effect, turning your friendly IT support into the front door for ransomware attacks. From MGM's $100 million disaster to the recent wave of UK retail breaches (M&S, Co-op, Harrods), discover how teenagers armed with nothing more than convincing accents and sob stories are outsmarting million-pound security systems. Spoiler alert: it's not the tech...
2025-07-31
08 min
The Small Business Cyber Security Guy | Cybersecurity for SMB & Startups
Help Desk MFA Reset Fails: Scattered Spider vs. UK Retail
Episode Description Join Noel Bradford and Graham Falkner for another cybersecurity hot take as they dive into the alarming world of help desk social engineering attacks. This episode exposes how the notorious Scattered Spider group has weaponized basic human helpfulness to devastating effect, turning your friendly IT support into the front door for ransomware attacks. From MGM's $100 million disaster to the recent wave of UK retail breaches (M&S, Co-op, Harrods), discover how teenagers armed with nothing more than convincing accents and sob stories are outsmarting million-pound security systems. Spoiler alert: it's not the tech...
2025-07-31
08 min
The Small Business Cyber Security Guy | Cybersecurity for SMB & Startups
Cyber Essentials - White House Security Principles for UK Small Business
Part 2 of White House CIO Insights Series | ~38 minutes How do you implement White House-level security without White House-level budgets? Building on insights from former White House CIO Theresa Payton's interview with Scammer Payback, Noel and Mauven explore the UK's Cyber Essentials framework - translating enterprise security principles into achievable small business requirements. The Five Cyber Essentials Controls: Boundary Firewalls - Your digital perimeter defense Secure Configuration - Closing manufacturer security gaps Access Control & MFA - 90% credential attack prevention Malware Protection - Beyond traditional antivirus Security Update Management - Systematic patching ...
2025-07-28
42 min
The Small Business Cyber Security Guy | Cybersecurity for SMB & Startups
Cyber Essentials - White House Security Principles for UK Small Business
Part 2 of White House CIO Insights Series | ~38 minutes How do you implement White House-level security without White House-level budgets? Building on insights from former White House CIO Theresa Payton's interview with Scammer Payback, Noel and Mauven explore the UK's Cyber Essentials framework - translating enterprise security principles into achievable small business requirements. The Five Cyber Essentials Controls: Boundary Firewalls - Your digital perimeter defense Secure Configuration - Closing manufacturer security gaps Access Control & MFA - 90% credential attack prevention Malware Protection - Beyond traditional antivirus Security Update Management - Systematic patching ...
2025-07-28
42 min
The Small Business Cyber Security Guy | Cybersecurity for SMB & Startups
White House CIO Insights - The Threat Landscape Small Business Faces
What's scarier - protecting the President or a small business in Manchester? Former White House CIO Theresa Payton says they face exactly the same sophisticated threats now. Runtime: 36 minutes | Series: Part 1 of 3 | Hosts: Noel Bradford & Mauven MacLeodKey Topics Covered Nation-state targeting: North Korea (vengeful), Iran (cyber mercenaries), Russia (everything), China (supply chains) "Verify and never trust" - Evolution from Reagan's "trust but verify" for modern threats Island hopping attacks - Small businesses as stepping stones to larger targets White House security principles scaled for small business budgets Multi-factor authentication - 90% effective against credential attacks Supply chain...
2025-07-21
38 min
The Small Business Cyber Security Guy | Cybersecurity for SMB & Startups
White House CIO Insights - The Threat Landscape Small Business Faces
What's scarier - protecting the President or a small business in Manchester? Former White House CIO Theresa Payton says they face exactly the same sophisticated threats now. Runtime: 36 minutes | Series: Part 1 of 3 | Hosts: Noel Bradford & Mauven MacLeodKey Topics Covered Nation-state targeting: North Korea (vengeful), Iran (cyber mercenaries), Russia (everything), China (supply chains) "Verify and never trust" - Evolution from Reagan's "trust but verify" for modern threats Island hopping attacks - Small businesses as stepping stones to larger targets White House security principles scaled for small business budgets Multi-factor authentication - 90% effective against credential attacks Supply chain...
2025-07-21
38 min
The Small Business Cyber Security Guy | Cybersecurity for SMB & Startups
McDonalds’ SuperSized Cyber Screw Up
Show Guide: When Basics Break - Special Bonus Episode Duration: 9 minutes | Type: Special Episode Episode Summary McDonald's password "123456" exposed 64 million job applications. M&S lost £300M to a phone call. Our full team dissects how basic security failures are destroying major brands and what small businesses must learn. Featured Team Noel Bradford - Lead Host Mauven MacLeod - Ex-NCSC Specialist Oliver Sterling - Cybersecurity Veteran Dr. Sarah Chen - AI Security Researcher Key Segments & Timestamps 🍟 McDonald's AI Disaster (0:00-3:00) Paradox.ai hiring bot secu...
2025-07-10
12 min
The Small Business Cyber Security Guy | Cybersecurity for SMB & Startups
McDonalds’ SuperSized Cyber Screw Up
Show Guide: When Basics Break - Special Bonus Episode Duration: 9 minutes | Type: Special Episode Episode Summary McDonald's password "123456" exposed 64 million job applications. M&S lost £300M to a phone call. Our full team dissects how basic security failures are destroying major brands and what small businesses must learn. Featured Team Noel Bradford - Lead Host Mauven MacLeod - Ex-NCSC Specialist Oliver Sterling - Cybersecurity Veteran Dr. Sarah Chen - AI Security Researcher Key Segments & Timestamps 🍟 McDonald's AI Disaster (0:00-3:00) Paradox.ai hiring bot secu...
2025-07-10
12 min
The Small Business Cyber Security Guy | Cybersecurity for SMB & Startups
Shadow IT - The Unauthorised Technology That’s Already Inside Your Business
Shadow IT: The Unauthorised Technology Inside Your Business 42% of business applications are unauthorised Shadow IT. Your employees have built hackers a data highway while trying to be helpful. What You'll Learn Detection Methods: DNS monitoring, MDM, endpoint audits, ThreatLocker solutions GDPR Nightmare: Why Shadow IT makes data subject access requests impossible Real Examples: 17 project management tools in one 12-person company Management Strategies: Control without becoming a digital dictator Immediate Actions Audit DNS logs for unknown cloud domains Check business credit cards for unauthorised SaaS subscriptions Ask employees "How do you actually do this job?" ...
2025-07-07
27 min
B2B Synergy - The Power Partners USA Podcast
Inside Managed IT Services with Guy Shurki owner of Shur-Net Solutions
Send us Text Message Shout Out!SHOW NOTES AND TIME STAMPSIn this episode of B2B Synergy, the Power Partners, USA podcast, host Alan Armijo introduces Guy Shurki owner of Shur-Net Solutions Inc., a new Power Partner USA member. Guy shares insights into his journey of transforming his IT business into a Managed Service Provider (MSP) over the past two decades detailing how they take over clients' network management, including installation, cloud integration, cybersecurity, and strategic IT planning. He highlights the collaborative nature of his work, acting as the IT department for...
2025-04-07
43 min
CS4NE
Episode 13 - Nullfy Special Guests Zaid Kakish and Tom Knudsen
In this episode of CS4NE, hosts Guy Trainin and Kimberly Ingraham-Beck speak with Zaid Kakish and Tom Knudsen, student leaders from Nullify, a student-run cybersecurity club at the University of Nebraska Omaha. The guests share their experiences in cybersecurity, their passion for hands-on learning, and the goals of Nullify, which include making cybersecurity accessible and fun through events like Capture the Flag (CTF) competitions. They emphasize the importance of building community connections, offering industry talks, and creating engaging opportunities for both high school and college students. The episode highlights how critical cybersecurity has become across all sectors, the...
2025-03-25
18 min
CS4NE
Episode 12 - Cybersecurity Tips - Special Guest Anthony Kava
In this episode of CS4NE, Guy Trainin and Kimberly Ingraham-Beck sit down with Anthony Kava, a digital forensics expert and deputy with the Pottawattamie County Sheriff's Office, to explore the critical role of cybersecurity in today's digital landscape. Anthony shares his journey into cybersecurity, his work in cyber forensics and crime investigations, and practical advice for educators and students alike. The discussion highlights the importance of understanding technology's layers, developing soft skills, and adopting a "hacker mindset" of curiosity and problem-solving. Packed with insights, resources, and tips, this episode underscores the growing significance of cybersecurity for everyone in...
2025-01-15
14 min
Car Dealership Guy Podcast
The Boutique "Dealership" Selling Supercars to the Ultra-Elite | John Temerian, CEO of CURATED
Welcome to the Car Dealership Guy Podcast. In this episode, I speak with John Temerian, CEO of CURATED, a Miami-based boutique dealership specializing in rare, vintage supercars and catering to the ultra-elite. We discuss how a lifelong obsession with supercars turned into an impressive business, his wild search for "blue chip" cars, and how he became the go-to car concierge for the rich and powerful looking to build world-class car collections.This episode of the Car Dealership Guy Podcast is brought to you by:CDK Global - Empowering dealers...
2024-12-05
57 min
10 Minute HealthBizCast
Album 8, Track 1: Rapid, Incremental Change
Welcome to Album 8 of The 10 Minute HealthBizCast! On this album, we tackle “Incremental, Revolutionary Change.” Is that even a thing? Listen to find out. For our opening track, we interview BaxterLee (https://www.linkedin.com/in/baxter-lee-9950086/), an expert on cyber security issues and the CFO at Clearwater (www.clearwatersecurity.com), about the wave of cybersecurity attacks on healthcare, how it affects care delivery, and ways that the industry can and is responding. #healthcareleadership #healthcarecybersecurity #healthbizcast #changinghealthcare #cybersecurity
2024-09-25
11 min
TechSpective Podcast
Exploring the Future of Cybersecurity in a SaaS-Driven World
TechSpective Podcast Episode 135 In the latest episode of the TechSpective Podcast, I had the pleasure of sitting down with Guy Guzner, co-founder and CEO of Savvy Security. With nearly three decades of experience in cybersecurity, Guy shares his insights into the rapidly evolving landscape of digital threats, particularly in the context of SaaS (Software as a Service) applications. The conversation dives deep into the challenges that modern organizations face as they navigate the complex world of SaaS sprawl. As businesses increasingly rely on SaaS solutions to drive productivity and innovation, the risks associated with identity management and security grow exponentially. G...
2024-08-17
50 min
Car Dealership Guy Podcast
#109 Most costly mistakes dealers are making, Why the FTC is coming after car prices, Top 3 "sleeper" risks in the car biz | Brad Miller, Head of Legal for ComplyAuto
Welcome to the Car Dealership Guy Podcast. In this episode, I'm speaking with Brad Miller, Head of Legal at ComplyAuto where we discuss: The most costly mistakes dealers are making, Why the FTC is coming after car dealers, Top 3 "sleeper" risks in the car biz and much more.This episode of the Car Dealership Guy Podcast is brought to you by:OPENLANE - The world’s best online dealer marketplace for used cars, bringing you exclusive inventory, simple transactions, and better outcomes. New to OPENLANE? Sign up now and re...
2024-08-13
41 min
The Tech Guy
AI companies stealing data illegally Now ! The tech Guy podcast EP-5
In this week podcast i covered the topics from AI companies stealing data from Youtube videos illegally , microsoft pcs going down because of cybersecurity company crowdstrike . Links - proofnews article :- https://www.proofnews.org/youtube-ai-search/ proof news video :- https://youtu.be/od9lve4SvqI?si=aHjmz5xO6ovpE4bd
2024-07-20
1h 23
Cybersecurity Standup
Zero Trust Masterclass with Jason Garbis
Hey everyone, welcome back to "Cybersecurity Stand Up," your favorite spot for all things cybersecurity. Today, we’re coming at you live from the lively Tics Booth at South Moscone. We've got the amazing Jason Garbis with us, and trust us, you don’t want to miss this! Jason’s the go-to guy for all things Zero Trust. He’s been at it for nearly a decade, and he's here to drop some serious knowledge. We'll chat about the Secure by Design initiative, striking the right balance between compliance and actual security, and his two must...
2024-07-09
14 min
AI Unchained
Ai_029 - New Tools and Major Moves in AI
Open AI signals that they are the surveillance leviathon we suspected they always were. Anthropic's Claude 3.5 may be even better than ChatGPT. I explore and detail out some new tools and build new tiny apps to recreate some of the incredible features of the Apple AI announcements, but in a local, open source way. A cybersecurity disaster in Microsoft's announcement of their new OS "feature" Recall and why it may be the worst thing for security and privacy in a very long time. And much more in today's episode, on New Tools and Major Moves in AI. L...
2024-07-04
1h 33
Bitcoin Audible
Ai_029 - New Tools and Major Moves in AI
Open AI signals that they are the surveillance leviathon we suspected they always were. Anthropic's Claude 3.5 may be even better than ChatGPT. I explore and detail out some new tools and build new tiny apps to recreate some of the incredible features of the Apple AI announcements, but in a local, open source way. A cybersecurity disaster in Microsoft's announcement of their new OS "feature" Recall and why it may be the worst thing for security and privacy in a very long time. And much more in today's episode, on New Tools and Major Moves in AI. L...
2024-07-04
1h 33
Cubic Lighthouse
Mastering Crisis Management in Cybersecurity with Marie Emmanuelle Py
In this episode, Marie Emmanuelle discusses her extensive experience in crisis management across various high-stakes environments, including the military, naval ships, aircraft carriers, and nuclear plants, and how these principles apply to cybersecurity. She emphasizes that effective crisis management requires more than technical skills; it demands preparation, teamwork, and strategic thinking. Emmanuelle highlights the importance of diverse, well-trained teams that understand individual strengths and can communicate and adapt under pressure. She also stresses the psychological aspects of crisis management, such as managing fear and stress. Her insights underline that the fundamentals of crisis management are universal, whether dealing with...
2024-06-04
13 min
Cubic Lighthouse
Must Read “See Yourself in Cyber” | Book Review with Author Ed Adams
Join us for an insightful review of the book "See Yourself in Cyber: Security Careers Beyond Hacking" by the esteemed author and security expert, Ed Adams. In this engaging discussion, we delve into the challenges and opportunities within the cybersecurity industry, exploring topics such as breaking misconceptions about cybersecurity, addressing the talent crisis, and the crucial role of diversity and inclusion. Discover valuable insights into evolving cybersecurity careers and how individuals can navigate their paths in this dynamic field. Whether you're a newcomer seeking to break into cybersecurity or a hiring manager looking to optimise talent acquisition...
2024-05-28
27 min
Cubic Lighthouse
Navigating the DORA Series: Unraveling Third-Party Risks and Resilience in Cybersecurity
Immerse yourself in the dynamic realm of third-party risk management with our newest video with Pierre Noel in the DORA Series! Engage in a compelling dialogue as we unravel the intricacies of evaluating, overseeing, and alleviating risks tied to third-party collaborations. From emphasizing comprehensive risk assessment to navigating the complexities of fourth-party dependencies, accompany us on this exploration to enhance cybersecurity resilience. Seize invaluable perspectives from seasoned industry professionals!
2024-05-21
24 min
Cubic Lighthouse
Navigating Cybersecurity: Stefanie Drysdale’s Executive Protection Revolution
In today's episode, we're diving into the critical realm of executive digital protection with cybersecurity expert Stefanie Drysdale, who holds the senior vice president position at Precient. We're exploring the sophisticated measures that top-level executives can implement to safeguard their online presence, leveraging Precient's advanced assessments and proprietary tools. Stefanie provides invaluable insights into the intricate process of securing one's digital footprint.Throughout our conversation, Stefanie offers a glimpse into Precient's operational dynamics, global outreach, and potential future expansions, while underscoring the paramount importance of proactive individual initiatives in mitigating digital risks.If you're intrigued...
2024-04-15
28 min
Cubic Lighthouse
Navigating Cybersecurity Recruitment: Aligning Talent with Tech's Evolving Landscape
Welcome back to another episode of the Cubic Lighthouse Podcast! Today, we've got a special guest, Juliette Kasko. She is a seasoned cybersecurity executive recruitment specialist from Singapore. Juliette dives deep into her transition from corporate sales to executive search consulting, the intricacies of retained executive searches, and the differences between various types of recruiters. Juliette will also be sharing her insights on the emerging Ukraine Tech Ecosystem, discussing the impact of AI in the recruitment process, and shedding light on the growing complexity of matching CVs to job criteria. Whether you're a candidate navigating your career j...
2024-04-03
1h 08
Cubic Lighthouse
Navigating the Dynamic Landscape of Cybersecurity: Lessons from an Experienced CISO
In this episode, Guy Marong interviews Nick Vigier, a seasoned CISO based in New York City. Nick shares his extensive experience and insights into the world of cybersecurity, spanning over 20 years. The conversation dives into the evolution of Nick's career, from his initial role in network engineering at the New York Stock Exchange to his current position as the CSO at Oscar Health. He discusses the transformative moments, challenges, and diverse experiences that have shaped his understanding of the complex and multifaceted field of security. Guy and Nick also touch on the importance of storytelling in showcasing the value...
2024-03-22
27 min
The Red-Bearded Risk Guy
Cybersecurity Programs: A Modern Business Must- Pt 2 W/ Jack Myers
In this 2 part episode, Jack Myers, The Sales & Marketing Director of @Convergence Networks and I talk about this growing threat business of all sizes. He gives a good overview of the recent #oregondmv data breach, which affected millions of Oregonian's information. It was part of a larger attack on #MOVEit, which may have affected as many as 46 million privacy records. Jack shares insights on the most common types of attacks we're seeing and the most common vulnerability, which is #peopleWe talk about the various ways a breach affects small businesses, with one th...
2023-09-05
39 min
The Red-Bearded Risk Guy
Cybersecurity Programs: A Modern Business Must- Have Pt 1 W/ Jack Myers
Cybersecurity Programs: A Modern Business Must- Have W/ @Jack Myers (he/him) Parts 1 and 2 are live!!!In this 2 part episode, Jack Myers, The Sales & Marketing Director of @Convergence Networks and I talk about this growing threat business of all sizes. He gives a good overview of the recent #oregondmv data breach, which affected millions of Oregonian's information. It was part of a larger attack on #MOVEit, which may have affected as many as 46 million privacy records. Jack shares insights on the most common types of attacks we're seeing and the most co...
2023-09-05
51 min
The Security Guy and CIA Spy PodBroadcast by Robert Siciliano and Peter Warmka
Water hacks, child blackmail and death by TikTok. #35
In this episode, Peter Warmka and Robert Siciliano dive into the critical topic of water supply security. They shed light on the alarming incident of hackers leaking over 721 million passwords in 2022. Additionally, they address the disturbing issue of sexual predators hijacking children's webcams and the tragic case of a teenager's death from the Benadryl Challenge, which TikTok claims to have never witnessed such content trend before. Episode's keynotes/comments/links: EPA stresses the need for improved water cybersecurity https://www.securitymagazine.com/articles/99041-epa-stresses-the-need-for-improved-water-cybersecurity Report: H...
2023-06-02
30 min
IoT Security Podcast
The IoT Security Challenge: How Steven Edwards Tackles the Extended IoT Attack Surface
When Steven Edwards, an IT Guy turned Security Analyst, discovered the unexpected challenge of securing an expansive attack surface that includes refrigerators, vending machines, and scanners across multiple private address spaces, he had to be tenacious and curious to protect his organization from attack."No matter what the tragedy is, it's beholden upon us to learn from it, to grow and improve. And I think we have done that in a lot of ways." - Steven EdwardsIn this episode, Brian Contos and John Vecchi talk with Steven Edwards. Steven Edwards was a "Regular IT...
2023-03-21
31 min
IoT Security Podcast
When Ransomware Hits During a Health Emergency
Jeffrey Vinson, Senior VP and CISO at Harris Health System, has held leadership positions for much of his life, from military to federal to state government. It was a natural progression for him to move from IT to what he calls a “Pure Cyber Guy.” Vinson joins Brian and John on the show today to answer the question, “What makes up your special forces in cyber?”In healthcare, it’s about saving lives, and cybersecurity is a patient safety issue. Vinson talks about the balancing act between patient safety and data privacy, HIPPA compliance, and legisl...
2022-12-27
48 min
IoT Security Podcast
Cybercriminals and Nation-States Look to IoT as the New Frontline
Richard Stiennon, Chief Research Analyst for IT-Harvest, joins us for The Return: Episode 2. Author of the recent Security Yearbook 2022, Richard started his career before cyber was cyber, a story he originally shared with Brian on a walk along some train tracks. How does a guy go from an ISP start-up to Gartner to IT-Harvest and being a bestselling author?Richard started IT-Harvest to literally harvest data, and that’s resulted in his latest project, an app for data obsessives called the Analyst Dashboard. He talks about what it took to get there and some surprising results he’s di...
2022-11-29
52 min
NorCal and Shill
Donglu
Send us a textEpisode 43: Show Notes.The deeper you dive into the world of NFTs, the more you’ll discover it’s not just about selling. It’s about relationships and community too. Today, we are joined by digital concept artist and art director, Donglu Yu. With over 14 years of entertainment industry experience, Donglu has racked up an impressive work portfolio. She has helped bring to life video games such as Assassin’s Creed (3, Brotherhood, Black Flag, and Valhalla), Deus Ex: Human Revolution, and Far Cry 4. Donglu also worked on the video game fil...
2022-07-07
53 min
Online 🌐 With Amr The Internet Guy, Helping business owners become more successful online
Online with Amr The Internet Guy Episode 31, How to protect yourself and your business from Cyber criminals, with Scott Schober
🎧This is Online with Amr The Internet Guy! The show focuses on entrepreneurs and business owners, helping them become more successful in conducting their business on the web without being stuck with Technology 😱, getting a headache, pulling their hairs out, or buying expensive software!My guest today is Scott Schober,Scott is an innovator and Wireless expert from New Jersey, he is the President and CEO of Berkeley Varitronics Systems a provider of advanced, world-class wireless test and security solutions.He is the author of three best-selling security books: Hacked Again (based on personal experi...
2022-03-17
58 min
Online 🌐 With Amr The Internet Guy, Helping business owners become more successful online
Online with Amr The Internet Guy Episode 31! How to protect yourself and your business from Cyber criminals, with Scott Schober
🎧This is Online with Amr The Internet Guy! The show focuses on entrepreneurs and business owners, helping them become more successful in conducting their business on the web without being stuck with Technology 😱, getting a headache, pulling their hairs out, or buying expensive software!My guest today is Scott Schober, Scott is an innovator and Wireless expert from New Jersey, he is the President and CEO of Berkeley Varitronics Systems a provider of advanced, world-class wireless test and security solutions.He is the author of three best-selling security books...
2022-03-17
58 min
The Security Guy and CIA Spy PodBroadcast by Robert Siciliano and Peter Warmka
What can the recent Astroworld Festival tragedy teach us about safety? #11
What can the recent Astroworld Festival tragedy teach us about safety? Robert Siciliano and Peter Warmka discuss the awful AstroWorld tragedy where eight people were unnecessarily killed and how "duty of care" needs to be exercised not just by companies but by individuals. They cover numerous data breaches including the recent Robin Hood data breach and what data breach notification laws mean for you or your small business. They also discussed the awesome and awful story of the missing teen rescued after making a hand gesture she learned from TikTok to signal for help. Finally...
2021-11-19
41 min