POPULARITY
Join J. Richard Jones as he sits down to speak with Jean-François Séguin, Head, Security Line of Business, ADGA about cybersecurity and the upcoming CPCSC certification process and how it will affect Canadian businesses. With over 27 years of experience in the public and private security industry, Jean-François has established himself as a leader in risk management, public safety, compliance, systems & technology, cybersecurity, and crisis management. His extensive background includes developing and implementing robust security protocols, managing large-scale security operations, and leading cross-functional teams to ensure organizational resilience. Jean-François's commitment to excellence and innovation has consistently driven ADGA's success in delivering security solutions tailored to meet the evolving needs of their security and defence sector customers. Since 1967, ADGA Group has been a steadfast industry partner for Canada's defence and security sector. ADGA Group helps the Canadian Armed Forces, government, and industry clients fulfill their strategic and operational mandates by delivering advanced technical capabilities in: Agile software development Integrated security solutions Value-added Program Management Proudly Canadian-owned and operated, ADGA is committed to safeguarding Canadians, both domestic and international. In this episode: What ADGA does for security solutions Taking cybersecurity seriously The Canadian Program for Cyber Security Certification (CPCSC) CPCSC requirements Cybersecurity certification's impact on defence vendors Preparing for Canada's mandatory cybersecurity certification And more!
In the buzzing atmosphere of the RSA conference in San Francisco, key players in the cybersecurity industry gathered to discuss the evolving landscape of technology and data security. Among them was Nanhi Singh, the General Manager for the application security business of Imperva, who shared insights on how organizations are redefining cybersecurity to achieve better business outcomes.Embracing Technology for Business SuccessThe theme of this year's conference, "The Art of Possible," resonated with Nahnhi Singh as she highlighted the shifting perspectives of executives and organizations towards leveraging technology and cybersecurity to drive business growth. In a conversation with Sean Martin, host of the Redefining Cybersecurity podcast on ITSP magazine, Nanhi discussed the critical role of CIOs and CISOs in not only securing digital experiences but also enabling business innovations.Navigating the Complexities of Application EnvironmentsAs organizations embark on their digital transformation journeys, the complexities of modern application environments come to the forefront. Nanhi emphasized the prevalence of APIs in connecting various systems and the challenges of securing these connections amidst cloud migrations and hybrid infrastructures. Imperva's API security solutions were highlighted as essential tools in providing visibility and protection against potential threats.Addressing Concerns of API-Driven AttacksThe conversation delved into the rising concern of API-driven attacks, with Nanhi underscoring the importance of identifying and mitigating threats posed by advanced bots targeting organizations across different industries. By leveraging Imperva's advanced bot protection solutions and a comprehensive security portfolio, organizations can fortify their defenses against evolving cyber threats.Empowering Organizations with Comprehensive Security SolutionsWith the recent acquisition of Imperva by Thales, Nanhi Singh showcased the combined strength of their security offerings, encompassing application security, API security, advanced bot protection, data security, encryption, key management, and identity and access management solutions. This holistic approach enables organizations to protect their data and applications across diverse environments and technologies.Driving Operational Efficiency and FocusIn a landscape where security teams are stretched thin and faced with cost constraints, Imperva's solutions aim to enhance operational efficiency and empower teams to concentrate on strategic security initiatives. By automating security controls and collaborating closely with customers to mitigate threats, Imperva ensures that organizations can operate securely and effectively in a rapidly evolving digital ecosystem.Securing Applications AnywhereAs applications are deployed across multiple cloud providers and environments, the need to secure them anywhere becomes paramount. Imperva's commitment to safeguarding applications and APIs regardless of their deployment location reinforces the idea that security should be intrinsic to every aspect of an organization's digital infrastructure.ConclusionThe engaging dialogue between Nanhi Singh and Sean Martin offered valuable insights into the current cybersecurity landscape and the imperative for organizations to adapt proactively to emerging threats. By embracing the art of what is possible in cybersecurity, businesses can not only safeguard their digital assets but also unlock new opportunities for growth and innovation. Imperva's comprehensive security solutions stand as a beacon of trust and efficacy in an ever-evolving cybersecurity landscape.Stay tuned for more insightful conversations and updates from Imperva at the RSA Conference, and continue following our coverage to stay abreast of the latest trends and developments in cybersecurity.Thank you for joining us in this exploration of cybersecurity and business resilience.Learn more about Imperva: https://itspm.ag/imperva277117988Note: This story contains promotional content. Learn more.Guest: Nanhi Singh, Chief Customer Officer and GM Application Security at Imperva [@Imperva]On LinkedIn | https://www.linkedin.com/in/nanhi-singh-aa51371On Twitter | https://twitter.com/NanhiSingh14ResourcesLearn more and catch more stories from Imperva at https://www.itspmagazine.com/directory/impervaView all of our RSA Conference Coverage: https://www.itspmagazine.com/rsa-conference-usa-2024-rsac-san-francisco-usa-cybersecurity-event-infosec-conference-coverageAre you interested in telling your story?https://www.itspmagazine.com/telling-your-story
In the buzzing atmosphere of the RSA conference in San Francisco, key players in the cybersecurity industry gathered to discuss the evolving landscape of technology and data security. Among them was Nanhi Singh, the General Manager for the application security business of Imperva, who shared insights on how organizations are redefining cybersecurity to achieve better business outcomes.Embracing Technology for Business SuccessThe theme of this year's conference, "The Art of Possible," resonated with Nahnhi Singh as she highlighted the shifting perspectives of executives and organizations towards leveraging technology and cybersecurity to drive business growth. In a conversation with Sean Martin, host of the Redefining Cybersecurity podcast on ITSP magazine, Nanhi discussed the critical role of CIOs and CISOs in not only securing digital experiences but also enabling business innovations.Navigating the Complexities of Application EnvironmentsAs organizations embark on their digital transformation journeys, the complexities of modern application environments come to the forefront. Nanhi emphasized the prevalence of APIs in connecting various systems and the challenges of securing these connections amidst cloud migrations and hybrid infrastructures. Imperva's API security solutions were highlighted as essential tools in providing visibility and protection against potential threats.Addressing Concerns of API-Driven AttacksThe conversation delved into the rising concern of API-driven attacks, with Nanhi underscoring the importance of identifying and mitigating threats posed by advanced bots targeting organizations across different industries. By leveraging Imperva's advanced bot protection solutions and a comprehensive security portfolio, organizations can fortify their defenses against evolving cyber threats.Empowering Organizations with Comprehensive Security SolutionsWith the recent acquisition of Imperva by Thales, Nanhi Singh showcased the combined strength of their security offerings, encompassing application security, API security, advanced bot protection, data security, encryption, key management, and identity and access management solutions. This holistic approach enables organizations to protect their data and applications across diverse environments and technologies.Driving Operational Efficiency and FocusIn a landscape where security teams are stretched thin and faced with cost constraints, Imperva's solutions aim to enhance operational efficiency and empower teams to concentrate on strategic security initiatives. By automating security controls and collaborating closely with customers to mitigate threats, Imperva ensures that organizations can operate securely and effectively in a rapidly evolving digital ecosystem.Securing Applications AnywhereAs applications are deployed across multiple cloud providers and environments, the need to secure them anywhere becomes paramount. Imperva's commitment to safeguarding applications and APIs regardless of their deployment location reinforces the idea that security should be intrinsic to every aspect of an organization's digital infrastructure.ConclusionThe engaging dialogue between Nanhi Singh and Sean Martin offered valuable insights into the current cybersecurity landscape and the imperative for organizations to adapt proactively to emerging threats. By embracing the art of what is possible in cybersecurity, businesses can not only safeguard their digital assets but also unlock new opportunities for growth and innovation. Imperva's comprehensive security solutions stand as a beacon of trust and efficacy in an ever-evolving cybersecurity landscape.Stay tuned for more insightful conversations and updates from Imperva at the RSA Conference, and continue following our coverage to stay abreast of the latest trends and developments in cybersecurity.Thank you for joining us in this exploration of cybersecurity and business resilience.Learn more about Imperva: https://itspm.ag/imperva277117988Note: This story contains promotional content. Learn more.Guest: Nanhi Singh, Chief Customer Officer and GM Application Security at Imperva [@Imperva]On LinkedIn | https://www.linkedin.com/in/nanhi-singh-aa51371On Twitter | https://twitter.com/NanhiSingh14ResourcesLearn more and catch more stories from Imperva at https://www.itspmagazine.com/directory/impervaView all of our RSA Conference Coverage: https://www.itspmagazine.com/rsa-conference-usa-2024-rsac-san-francisco-usa-cybersecurity-event-infosec-conference-coverageAre you interested in telling your story?https://www.itspmagazine.com/telling-your-story
Join us for an insightful discussion on why diversity matters in cybersecurity roles with Joshua Copeland, Director of Enterprise Security with Bose Corporation! Have you ever wondered why diversity is crucial in the cybersecurity sector? Curious about the tangible benefits it brings to your organization? Look no further! Josh Copeland, a seasoned expert in cybersecurity and diversity advocate, will be sharing his invaluable insights, strategies, and real-world experiences in our upcoming recording session. In a rapidly evolving digital landscape, diversity isn't just a buzzword; it's a game-changer. Discover how diverse teams bolster innovation, problem-solving, and overall resilience in the face of cyber threats. Don't miss out on this opportunity to gain actionable knowledge and perspectives that can revolutionize your approach to hiring in cybersecurity! Stay tuned for updates and sneak peeks leading up to the event. Spread the word and let's make strides together towards a more inclusive and secure future! hashtag#Cybersecurity hashtag#DiversityMatters hashtag#Innovation hashtag#InfoSec hashtag#Tech hashtag#Empowerment hashtag#CyberAware hashtag#InclusiveTech hashtag#JoshCopeland hashtag#ExpertInsights
Guests: Linda Gray Martin, Vice President at RSA Conference [@RSAConference]On LinkedIn | https://www.linkedin.com/in/linda-gray-martin-223708/On Twitter | https://twitter.com/LindaJaneGrayBritta Glade, Senior Director, Content & Curation at RSA Conference [@RSAConference]On LinkedIn | https://www.linkedin.com/in/britta-glade-5251003/On Twitter | https://twitter.com/brittaglade____________________________Hosts: Sean Martin, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining CyberSecurity Podcast [@RedefiningCyber]On ITSPmagazine | https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/sean-martinMarco Ciappelli, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining Society PodcastOn ITSPmagazine | https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli____________________________Episode NotesWelcome to the kickoff of our comprehensive coverage for RSA Conference 2024, a pivotal gathering that unites minds from all corners of cybersecurity under one expansive theme: The Art of Possible. This year, we're breaking down the walls of impossibility, bringing the power of imagination, humanity, innovation and community into the realm of cybersecurity and beyond.The Fabric of CreativityIn an engaging exchange between the On Location Coverages hosts Sean Martin and Marco Ciappelli, the conversation begins with a reflection on what's possible. Martin and Ciappelli, in a funny exchange bring forth the concept of the "plausible impossible," a creative doctrine that pushes the boundaries of our imagination and challenges the limits of reality. This theme strongly correlates with this year's RSA Conference, focused on exploring the myriad potentials within the cybersecurity landscape.Tradition Meets InnovationA tradition that Sean and Marco hold dear is the annual inclusion of Linda Gray Martin and Britta Glade, central figures in the orchestration of the RSA Conference. Their participation signifies the commencement of a profound exploration into cybersecurity trends, themes, and innovative ideas set to shape the future. The conversation warmly unfolds to welcome these pivotal voices, shedding light on the central theme, "The Art of Possible," and its implications for the global cybersecurity community.Bridging Ideas and ImplementationThe discourse navigates through various aspects of the conference, from keynote speakers to new tracks, emphasizing the commitment to diversity, advancement, and community. With over 2,700 submissions and a broad spectrum of sessions, the RSA Conference stands as a testament to what becomes attainable when different minds unite in pursuit of a shared vision.Among the highlights, Linda Gray Martin and Britta Glade touch upon the essence of community at the conference, illustrating how collective effort can transcend traditional barriers, fostering innovation and progress. The introduction of new programs, such as the Next Stage Expo, reaffirms the conference's dedication to nurturing growth at every level, providing a stepping stone for emerging companies.Forging Ahead: The Exploration ContinuesAs we venture closer to RSA Conference 2024, set against the backdrop of San Francisco's iconic Moscone Center, the anticipation builds for what promises to be an extraordinary congregation of cybersecurity's brightest. From groundbreaking keynotes by industry visionaries to immersive track sessions that traverse the unknown, the conference is a beacon for those eager to explore the vastness of what's achievable.A Journey AwaitsFor newcomers and veterans alike, RSA Conference 2024 is more than an event; it's an expedition into the heart of innovation, an opportunity to witness the unfolding of the art of possible firsthand. With thoughtful preparation and an open mind, attendees are poised to discover insights that could redefine the trajectory of cybersecurity and beyond.As we inch closer to May 2024, the excitement is palpable, with much left to uncover. This year's RSA Conference is not just a event; it's a convergence of ideas, a celebration of potential, and most importantly, a gathering of a community that believes fiercely in the art of turning the impossible into the possible.Join us, as we step into a realm where imagination meets reality, at RSA Conference 2024.Be sure to follow our Coverage Journey and subscribe to our podcasts!____________________________Follow our RSA Conference USA 2024 coverage: https://www.itspmagazine.com/rsa-conference-usa-2024-rsac-san-francisco-usa-cybersecurity-event-infosec-conference-coverageOn YouTube:
Guests: Linda Gray Martin, Vice President at RSA Conference [@RSAConference]On LinkedIn | https://www.linkedin.com/in/linda-gray-martin-223708/On Twitter | https://twitter.com/LindaJaneGrayBritta Glade, Vice President, Content & Curation at RSA Conference [@RSAConference]On LinkedIn | https://www.linkedin.com/in/britta-glade-5251003/On Twitter | https://twitter.com/brittaglade____________________________Hosts: Sean Martin, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining CyberSecurity Podcast [@RedefiningCyber]On ITSPmagazine | https://www.itspmagazine.com/sean-martinMarco Ciappelli, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining Society PodcastOn ITSPmagazine | https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli____________________________Episode NotesWelcome to the kickoff of our comprehensive coverage for RSA Conference 2024, a pivotal gathering that unites minds from all corners of cybersecurity under one expansive theme: The Art of Possible. This year, we're breaking down the walls of impossibility, bringing the power of imagination, humanity, innovation and community into the realm of cybersecurity and beyond.The Fabric of CreativityIn an engaging exchange between the On Location Coverages hosts Sean Martin and Marco Ciappelli, the conversation begins with a reflection on what's possible. Martin and Ciappelli, in a funny exchange bring forth the concept of the "plausible impossible," a creative doctrine that pushes the boundaries of our imagination and challenges the limits of reality. This theme strongly correlates with this year's RSA Conference, focused on exploring the myriad potentials within the cybersecurity landscape.Tradition Meets InnovationA tradition that Sean and Marco hold dear is the annual inclusion of Linda Gray Martin and Britta Glade, central figures in the orchestration of the RSA Conference. Their participation signifies the commencement of a profound exploration into cybersecurity trends, themes, and innovative ideas set to shape the future. The conversation warmly unfolds to welcome these pivotal voices, shedding light on the central theme, "The Art of Possible," and its implications for the global cybersecurity community.Bridging Ideas and ImplementationThe discourse navigates through various aspects of the conference, from keynote speakers to new tracks, emphasizing the commitment to diversity, advancement, and community. With over 2,700 submissions and a broad spectrum of sessions, the RSA Conference stands as a testament to what becomes attainable when different minds unite in pursuit of a shared vision.Among the highlights, Linda Gray Martin and Britta Glade touch upon the essence of community at the conference, illustrating how collective effort can transcend traditional barriers, fostering innovation and progress. The introduction of new programs, such as the Next Stage Expo, reaffirms the conference's dedication to nurturing growth at every level, providing a stepping stone for emerging companies.Forging Ahead: The Exploration ContinuesAs we venture closer to RSA Conference 2024, set against the backdrop of San Francisco's iconic Moscone Center, the anticipation builds for what promises to be an extraordinary congregation of cybersecurity's brightest. From groundbreaking keynotes by industry visionaries to immersive track sessions that traverse the unknown, the conference is a beacon for those eager to explore the vastness of what's achievable.A Journey AwaitsFor newcomers and veterans alike, RSA Conference 2024 is more than an event; it's an expedition into the heart of innovation, an opportunity to witness the unfolding of the art of possible firsthand. With thoughtful preparation and an open mind, attendees are poised to discover insights that could redefine the trajectory of cybersecurity and beyond.As we inch closer to May 2024, the excitement is palpable, with much left to uncover. This year's RSA Conference is not just a event; it's a convergence of ideas, a celebration of potential, and most importantly, a gathering of a community that believes fiercely in the art of turning the impossible into the possible.Join us, as we step into a realm where imagination meets reality, at RSA Conference 2024.Be sure to follow our Coverage Journey and subscribe to our podcasts!____________________________Follow our RSA Conference USA 2024 coverage: https://www.itspmagazine.com/rsa-conference-usa-2024-rsac-san-francisco-usa-cybersecurity-event-infosec-conference-coverageOn YouTube:
Hey there cyber enthusiasts! Ever wondered how to transform your digital space into a fortress of security? Well, buckle up, because we've crafted the ultimate guide to help you declutter, fortify, and defend your digital realm. Our mission: to make cybersecurity engaging and effective, without drowning you in techno-jargon. Check out these key points we've covered: Wi-Fi Wonders: Unveiling the mysteries of Wi-Fi security to ensure your online activities remain secure from prying eyes. Password Power: Dive into the world of password protection, unlocking the secrets to crafting robust and memorable passwords. Software Safeguard: Explore the essential software tools that act as your digital bodyguards, fending off potential cyber threats. Cyber-Consciousness: Elevate your awareness with insights into cyber threats, ensuring you gain confidence while navigating the digital landscape. Privacy Protocols: Delve into the importance of online privacy and learn practical tips to keep your personal information under wraps. Data Defense: Uncover strategies to defend your precious data from the clutches of cyber villains, ensuring it stays in safe hands. Phishing Filters: Equip yourself with the knowledge to recognize and thwart phishing attempts, safeguarding your digital identity. Firewall Fortifications: Understand the role of firewalls in fortifying your digital perimeter against cyber intruders. Antivirus Arsenal: Explore the world of antivirus protection and discover how to choose the right tools to keep your system healthy. Secure Surfing: Decode the mysteries of HTTPS, ensuring your online interactions occur within a secure, encrypted environment. Multi-Layered Security: Embrace the power of 2FA and MFA, adding an extra layer of defense to your digital life. Ready to embark on a digital detox journey? Our step-by-step guide not only frees up digital space but also ensures your online life is fortified against cyber threats. Say goodbye to data clutter and hello to cyber resilience. Your digital spa retreat awaits—refresh, renew, and revitalize your cyber world!
In the vast landscape of the digital world, safeguarding your online presence is paramount. Welcome to another episode of TechTalk with Craig Peterson, where today, we unravel the secrets to fortifying your digital realm with "The Ultimate Cybersecurity First-Aid Kit." Decrypting Wi-Fi Woes Our journey begins with the cornerstone of your digital fortress: Wi-Fi encryption. No secret stays safe forever, and that includes your Wi-Fi password. We delve into the importance of encrypting your Wi-Fi, ensuring that your digital stronghold remains impenetrable. Password Party Extravaganza "abc123" just won't cut it in the ever-evolving world of cyber threats. Join us for a Password Party Extravaganza, where we explore revolutionary approaches to crafting and managing passwords. Bid farewell to weak links and embrace the new era of digital passcodes. Software Wardrobe Upgrade Much like updating your wardrobe, keeping your software fresh and secure is essential. We discuss the significance of regular software updates, and adopting a fashion-forward approach to digital safety. It's time to elevate your software game and stay ahead in the cybersecurity-style game. Data Backup Ballet Our cyber journey gracefully transitions into the realm of data backup. Learn the art of the Data Backup Ballet, where we emphasize the importance of moonwalking through cyber threats with meticulously backed-up data. Your digital performance deserves a standing ovation, not a cyber mishap. Cyber-Aware Workforce The frontline against phishing invasions is your very own workforce. Discover strategies to keep your staff cyber-aware, creating a formidable defense against phishing scams. After all, in this digital age, knowledge is power, and a well-informed team is your best asset. MFA Magic Unleashed Two proofs are better than one, especially when it comes to securing your digital kingdom. Unleash the magic of Multi-Factor Authentication (MFA) and elevate your security with a double-proof shield. We explore why MFA is a game-changer in the world of cybersecurity. Firewall & Antivirus Heroes Firewalls and antivirus tools aren't just buzzwords; they're your digital heroes. Join us in celebrating their crucial roles in safeguarding your online presence. It's time to go beyond the terminology and understand how these digital guardians actively protect your digital realm. HTTPS Secure Safari Navigating the web should be a secure delight. We dive into the importance of HTTPS and how it enhances your online browsing experience. Secure your digital safari, ensuring each click is a step into a safe and encrypted cyberspace. Phishing Vigilantes Unleashed Become a phishing vigilante with our insights on spotting scams before they bite. Learn the art of being a Phishing Watchdog, and never fall victim to deceptive online tactics. If it seems phishing, don't be dishin'; empower yourself to recognize and combat these digital threats. Incident Response Elegance No cybersecurity strategy is complete without a touch of elegance. We discuss the creation of Incident Response Plans, your stylish safety nets for cyber mishaps. It's time to weave a safety net that adds sophistication to your digital defense strategy. Latte-Fueled Cyber Control Take control of your online presence like never before. Grab a refreshed latte, settle in, and let's navigate the digital landscape with confidence. We wrap up our cybersecurity journey with a well-brewed cyber alert, ensuring that every click is a conscious step towards a secure digital future. Join us in this episode of Tech Talk with Craig Peterson, where we decode the intricacies of the digital realm, empowerment is protection. Stay secure, stay informed! Learn more on how to secure your business: The Cybersecurity First-Aid Kit: Immediate Actions for Small Business Owners You can also catch Craig at the following stations and channels: With Jim Polito at 0836 on Tuesdays WTAG AM 580 - FM 94.9 Talk 1200 News Radio 920 & 104.7 FM WHJJ NewsRadio 560 WHYN WXTK Craigs Show Airs 0600 Saturday and Sunday With Jeff Katz 1630 - Tuesdays WRVA 96.1 FM, 1140 AM WGAN Matt Gagnon 0730 Wednesdays Craigs Show Airs 1700 Saturday WGIR 610 & News Radio 96.7 Chris Ryan 0730 Mondays Craigs Show Airs 1130 Saturday On the Internet: Tune-In (WGAN) Radio.com (WRVA) iHeartRadio (WGIR, WTAG, and other stations)
In today's episode, Nathan Abbott, Information Systems Manager with the Tennessee Comptroller of the Treasury – Division of Local Government Audit, provides an in-depth overview of cybersecurity and speaks to why it is important for school districts to ensure that the appropriate safeguards are in place to protect their digital assets. Show Notes: Below are a few websites mentioned during today's podcast that may be helpful to reference when learning more about cybersecurity: https://www.cisa.gov/ https://comptroller.tn.gov/office-functions/la/resources/cyberaware.html https://www.tn.gov/cybersecurity.html https://www.cisecurity.org/ms-isac
Guest: Dr. Ryan Ko, Professor of Cybersecurity, University of Queensland [@UQ_News]On Twitter | https://twitter.com/ryan_kl_koOn LinkedIn |https://www.linkedin.com/in/ryan-ko-38894824/________________________________Host: Mansi ThakarOn ITSPmagazine
Quantum computers are coming real soon, are you prepared? In this episode, Darnley describes what Quantum computing is about, the breakthrough of the future of computing, and the dangers of quantum computing. The future is now.
With currently layoffs and downsizing, is the tech boom finally over?In this episode, Darnley explains recent layoffs at silicon valley, the media's thirst over Elon Musk Twitter acquisition, and the protests at Foxconn's iPhone city and the impacts of cheap labour in the technology landscape.
What does geopolitical have to do with cybersecurity?Do we fully understand the effects of our world events that affect the security of cyber-space?In this episode of the fifth season, Darnley discusses the fragility of our world in 2022 due to various geopolitical events that correlate to the increase of cyber-crime and events that will affect us all.
Has Google created sentient Artificial Intelligence? According to a suspended Google Engineer, Blake Lemoine, may of been the first whistle blower of humans finally creating sentient artificial intelligence. What are some of the moral dilemma that can ensue with this, and is Google covering this up to reduce public panic? Darnley talks about the moral implications of artificial life - Listen more here.
Do you have an IT Jack of all trades?Do you know Jack may be hurting your business?In this episode, learn about how these people or organizations can end up hurting your business in the long run. Understand what to look out for in order to stay cyber secure and not get destroyed after a cyber attack.
We've all been guilty before, but it is not 2000 anymore. In a recent study, even during World Password Day, a massive number of people are still using their pet's name or information easily available online as their passwords. Listen more here or or your favourite podcast platform.
Are you still using Google Chrome? Do you even care about your online privacy?In this episode, Darnley discusses the data eating monster Google Chrome on how it's time has come even as the most powerful search engine company, Google takes a massive market share of browser dominance. Listen now in why you need to ditch Chrome and seek better alternatives to this browser.
Do you travel abroad? Do you know your data is being tracked, stolen or used against your will?In this episode, Darnley discusses that foreign intelligence collection activities are running wild and you need to do something about it. Stop making security assumptions, understand what to do while travelling abroad. Making the right preparations will mitigate any harm to you, your place of employment and your country. Listen to more here or on your favourite podcast platform.
LinkedIn has become a household phishing favourite for cyber criminals in 2022. In this episode, Darnley explains why LinkedIn phishing attacks have increased over 200% in the last quarter of 2022, he pulls skeletons out of the closet, and how to protect yourself and your business from phishing attacks.
Did you hear about that plane that got hacked? or was it the airline?In this episode, Darnley discusses the vulnerabilities of the aviation industry, top 5 cyber attacks against major airlines, developing news on an airline.
Panasonic is under attack, yet again. Why can such a big tech giant fail cybersecurity a second time?In this episode, Darnley discusses these breaches along with some stats and tips on how to properly protect businesses against the onslaught in cyberspace. Learn about the rise in attacks, Zero trust and how this affects both big and small business.
WhatsApp messages spoofed to target unsuspecting victims. What does the Russian Centre For Road Safety have to do with this?In this episode, Darnley discusses the latest news of cyber attackers spoofing WhatsApp messages to get victims to download malware that steals sensitive information. Listen more here
When the world ends, what will happen to the internet? How will we communicate?A prepper created a new form of internet, a simplier and robust internet that enables mass communication during troubled times. Darnley explains how it works, how easy it is and what relevancy does this have during today's global events.
About our Guests:Dr Tommy Van Steenhttps://www.universiteitleiden.nl/en/staffmembers/tommy-van-steen#tab-1 Dominic Vogelhttps://ca.linkedin.com/in/domvogelcyber.sc Papers or resources mentioned in this episode:Van Steen, T., Norris, E., Atha, K., & Joinson, A. (2020). What (if any) behaviour change techniques do government-led cybersecurity awareness campaigns use?. Journal of Cybersecurity, 6 (1)https://academic.oup.com/cybersecurity/article-abstract/6/1/tyaa019/6032830Michie S, Richardson M, Johnston M, Abraham C, Francis J, Hardeman W, Eccles MP, Cane J, Wood CE. The behavior change technique taxonomy (v1) of 93 hierarchically clustered techniques: building an international consensus for the reporting of behavior change interventions. Ann Behav Med. 2013 Aug;46(1):81-95. doi: 10.1007/s12160-013-9486-6. PMID: 23512568.https://pubmed.ncbi.nlm.nih.gov/23512568/Canada Revenue Agency, Be Scam Smart – Tax Refundhttps://www.youtube.com/watch?v=lGNb7JCElzY&list=PLWsWrJHQSlisHkd5uCkyfaO3x2h4P2rsq&index=2 Other:The Behaviour Change Wheel organizes the taxonomy into a way that allows it to be used as a tool during the design and implementation of tools. You can find a presentation from Dr Susan Mitchie, presenting that approach in this video https://www.youtube.com/watch?v=2-KvaIsb0fMThanks to Domenic Vogel's son for providing some background ambience during the interview. Its always amazing how the sound of a child playing helps adults to remember to play too.
The European Union passed legislation recently that targets big data, threatens to remove app encryption in order to cross-talk to smaller apps. What does this mean for Europeans? Madness? Are we going backwards in our encryption methods or are we moving forward? Are the Chinese doing it better?
How far can cyber war take us? Is Anonymous paving the way of next-level cyber warfare?The hacker group Anonymous has been taking up digital arms against the Russian Federation over it's invasion of Ukraine over a month ago. What sorts of pain has Anon inflected to Russia? In this Episode, Darnley discusses the hacks recorded by this effective hacker group along with what is next in this cyber war?
"We will collect your keystroke patterns and rhythms - we will add your biological data to the Communist Party of China, resistance is futile" In this episode, Darnley discusses the dangers of using an app on your mobile devices. Understand the actual information TikTok is collecting from your device, your children, and your browsing habits. Is this another way for the Chinese Communist Party to infiltrate western society? Listen to more in this podcast.
How far has artificial intelligence become? Will they wipe out human beings?In this episode, part 2 of AI series, Darnley discusses the challenges with today's AI taking over the world but the real threat to advanced AI in the near future. According to PwC and Elon Musk - this is not too far away for us all
Fake news is spread faster than light speed.In this episode, Darnley discusses what misinformation, disinformation, and malinformation means to you our democratic society as a whole. Some thought provoking questions to ask yourself while viewing content so that you are not one of the 75% of people that believe in fake news.
How far advanced has Artificial Intelligence become? In this part 1 of this topic, Darnley explains his personal experience with AI, discusses what a top researcher recently said, align with the moral complications of introducing advanced AI into human society.
TrickBot is up to it's old tricks again - by taking down banks during a politically sensitive moment. Coincidence? I think not!In this current latest-news unfolding event, Darnley discusses what TrickBot is, how it disrupted some major Canadian banks during a sensitive political time. It also targeted over 60 Financial and Technology companies, such as Amazon, American Express, JP Morgan Chase, Microsoft, Navy Federal Credit Union, Paypal, RBC, Yahoo, etc.
Data Privacy getting you down? Is it too confusing to start? In this episode, Darnley discusses 5 tips of starting or enhancing your security and privacy Program for your business. Most security pro's would agree that majority of businesses are still ill-equipped to ensure protection of their customer's data. This is why ransomware is still a highly profitable scheme and is only getting worse as the year goes on. Listen here on the tips to ensure your privacy protection.
Cyber threats can attack you from right under your nose. Why?In this episode, Darnley describes the significant increase of fileless attacks and it is almost ridiculous levels of threats that exist out in cyber space today. Listen to what living off the land now means.
As we move towards a greener future, we may meet our demise anyway.Cyber criminals love to attack critical infrastructure and we are about to hand them the silver platter. In this episode, Darnley discusses the main issues of green energy and why current technologies are antiquated and outdated. Should we wait until people get hurt or killed before we rethink our posture or should we do something about it today? Listen to more here
Do you store everything in the cloud?Is your entire business in the cloud?Do you trust Amazon/Google/Microsoft anymore?In this episode, Darnley discusses the next wave of vulnerabilities that makes you second guess the merit of relying on the public cloud for your protection. Amazon Web Services (AWS) was found to have a massive vulnerability that Microsoft made in the not too distant past. Listen here for more.
The space race 2.0 is happening right now, how long until we hear about a satellite being hacked in space? Would this be a page out of SkyNet's handbook? We have entered a new era of space exploration, corporations are leading the race to make us multi-planetary along with the technology required to make that happen. In 2022, will we now hear about a hacked satellite? Listen to more in this episode
Google Alphabet is fined from French privacy watchdog CNILHackers actively exploit Google Docs that could affect millions. Are these signs of companies not taking privacy seriously or should there be bigger changes for these tech giants? Find out more here
Do you feel FAT32? Do you have excess digital fat around your life? It is 2022 and it is time to lose some of that weight, learn 5 different ways to reduce your digital fat while feeling better about yourself in the future. Darnley discusses how data is collected, and what you can do about it. It is never too late to have a new years resolution.Brokers Discussed In Podcast:Acxiom, Equifax, Expridan, Oracle, Epsilon
2021 in Cyber Security was quite a ride.From all sorts of attacks, vulnerabilities, ransomware, threat actors, pipeline shut down, water treatments plant attack, Zero day attack, and remote work. This episode is a review in the past year of some notable attacks that happened in the security landscape. Darnley explains why he is not looking forward to 2022 as this could be the year of human fatalities due to these cyber attacks.
When do sex robots become a podcast? With the Covid-19 pandemic, the increased demand of intimacy during lockdowns became better known and the industry provides.Will these sex dolls become another Amazon Alexa, Cortana, or Google Home? Listen to this podcast for more.
What happened to Darnley? Why The Grinch Stole Your Data?As we enter the Holiday season full swing, cyber criminals are quick at trying to make your holidays as uncomfortable as possible. With the explosive online sales this year, one of your employees are bound to mess up. Learn how to protect your organization from those digital grinches this holiday season.
On December 7, Amazon Web Services went down affecting thousands of businesses and people who were unable to use some services. Amazon prime delivery services were delayed and videos were not able to stream.How will humanity venture further into digital bliss without high speed access?
Looking to break into the field of cybersecurity? Special guest Dr. Michael Hart, Assistant Professor of Computer Information Science at Minnesota State University, Mankato, gives his best advice! Nathan sits down with Dr. Hart to chat about the job market, skills needed for the field, recommended coursework, degrees, and certifications, and a plethora of other resources to get started. Plan your path to landing your dream cybersecurity career! This episode concludes with news stories including a data breach at electronics company Panasonic and a cyberattack on Ohio-based DNA Diagnostics Center. ________________ News Sources: Story 1: Seals, Tara. "Panasonic's Data Breach Leaves Open Questions." Threatpost, 30 November 2021, https://threatpost.com/panasonic-data-breach-questions/176660/ Story 2: Toulas, Bill. "DNA Testing Firm Discloses Data Breach Affecting 2.1 Million People." Bleeping Computer, 30 November 2021, https://www.bleepingcomputer.com/news/security/dna-testing-firm-discloses-data-breach-affecting-21-million-people/
The internet took the world by storm, and with it came a variety of cybercrimes that you should know about. From identity theft to cyber stalking, Ham and Nathan run through some of the most common cybercrimes that affect millions of people a year. Learn top risks to look out for in order to avoid falling victim to criminals. This episode concludes with news from expert Mercy, including a recent cyberattack on wind turbine manufacturer Vestas Wind Systems, a confirmed data breach on internet domain registrar GoDaddy, and an up and coming TSA PreCheck membership scam. _______________ News Sources: Story 1: Toulas, Bill. "Wind Turbine Giant Vestas' Data Compromised in Cyberattack." Bleeping Computer, 22 November 2021, https://www.bleepingcomputer.com/news/security/wind-turbine-giant-vestas-data-compromised-in-cyberattack/ Story 2: Seals, Tara. "GoDaddy's Latest Breach Affects 1.2M Customers." Threatpost, 22 November 2021, https://threatpost.com/godaddys-latest-breach-customers/176530/ Story 3: Toulas, Bill. "Fake TSA PreCheck Sites Scam US Travelers with Fake Renewals." Bleeping Computer, 19 November 2021, https://www.bleepingcomputer.com/news/security/fake-tsa-precheck-sites-scam-us-travelers-with-fake-renewals/
Elon Musk's Starlink and Google cloud are joining forces to provide Starlink internet users faster internet speeds, greater connectivity along with low latency. Is this the partnership that everyone wants for the future of the internet?
The world largest domain registrar was attacked with over 1 Million accounts stolen affecting roughly 20 million Go Daddy users. Listen to this episode to learn ways to protect your credentials from cyber criminals.
Whether you're an aspiring crypto enthusiast, a skeptic, or just plain curious – learn the basics of what cryptocurrency is and some of the potential risks. Find out what crypto coins really are, some interesting examples, and how they're used. From Bitcoin to Dogecoin, Nathan and Ham walk you through this intriguing world with basic facts and personal anecdotes. Plus, find out top risks you should watch out for, including scams, cryptojacking, and mining. This episode concludes with news from expert Mercy, including a TikTok scam targeting influencers, an update on the Robinhood data breach, and hundreds of WordPress sites hacked for a cryptocurrency ransom. _______________ News Sources: Story 1: Montalbano, Elizabeth. "Phishing Scam Aims to Hijack TikTok 'Influencer' Accounts." Threatpost, 17 November 2021, https://threatpost.com/phishing-scam-tiktok-influencer/176391/ Story 2: Abrams, Lawrence. "7 Million Robinhood User Email Addresses for Sale on Hacker Forum." Bleeping Computer, 15 November 2021, https://www.bleepingcomputer.com/news/security/7-million-robinhood-user-email-addresses-for-sale-on-hacker-forum/ Story 3: Toulas, Bill. "WordPress Sites Are Being Hacked in Fake Ransomware Attacks." Bleeping Computer, 16 November 2021, https://www.bleepingcomputer.com/news/security/wordpress-sites-are-being-hacked-in-fake-ransomware-attacks/
Is the future finally here? Does anyone remember the Nintendo Power Glove?In this episode, Darnley reveals the prototype Meta (Facebook) is currently designing for the metaverse. This haptic glove will define the way we live and work once it hits mass market. Listen to more here
Rewind to see how the past has influenced the present and fast forward to see what the future could bring with special guest expert Jeff Hall of Truvantis, a cybersecurity company. Nathan sits down with Jeff to chat about his experiences in the changing field of cybersecurity, including changes in the internet, the job landscape, and college degrees since he entered. The two also discuss the reality of cyberwarfare and new trends for the future including innovation in artificial intelligence and machine learning. This episode concludes with news stories from expert Mercy, including a cyberattack on trading company Robinhood, a phishing attack targeting Microsoft 365 and Google users, and the exciting new availability of Mozilla Firefox in the Microsoft Windows Store. ________________ News Sources: Story 1: Abrams, Lawrence. "Robinhood Discloses Data Breach Impacting 7 Million Customers." Bleeping Computer, 8 November 2021, https://www.bleepingcomputer.com/news/security/robinhood-discloses-data-breach-impacting-7-million-customers/ "Robinhood Announces Data Security Incident (Update)." Robinhood, 16 November 2021, https://blog.robinhood.com/news/2021/11/8/data-security-incident Story 2: Iyer, Abhishek. "A Pointed Spoof: Proofpoint Credential Phishing." Armorblox, 4 November 2021, https://www.armorblox.com/blog/proofpoint-credential-phishing/ Seals, Tara. "Proofpoint Phish Harvests Microsoft O365, Google Logins." Threatpost, 5 November 2021, https://threatpost.com/proofpoint-phish-microsoft-o365-google-logins/176038/ Story 3: Warren, Tom. "Mozilla's Firefox Browser Arrives in the Windows Store." The Verge, 9 November 2021, https://www.theverge.com/2021/11/9/22771845/mozilla-firefox-microsoft-store-windows-download
The secret to staying secure? Check for and protect from risks! Nathan and Ham cover the basics on how to get started. From identifying to preventing security threats, find out just how important assessing your risks can be. This quick episode walks you through the essential steps for finding security risks in your daily life and preventing incidents from occurring. This episode concludes with news from expert Mercy, including Google Chrome Malware targeting Windows machines and an announcement from Facebook about the deletion of its face recognition system. ________________ News Sources: Story 1: Iwamaye, Andrew. "Sneaking Through Windows: Infostealer Malware Masquerades as Windows Application." Rapid7, 28 October 2021, https://www.rapid7.com/blog/post/2021/10/28/sneaking-through-windows-infostealer-malware-masquerades-as-windows-application/ Montalbano, Elizabeth. "Google Chrome is Abused to Deliver Malware as 'Legit' Win 10 App." Threat Post, 29 October 2021, https://threatpost.com/chrome-deliver-malware-as-legit-win-10-app/175884/ Story 2: Abrams, Lawrence. "Facebook to Delete 1 Billion Faceprints in Face Recognition Shutdown." Bleeping Computer, 2 November 2021, https://www.bleepingcomputer.com/news/technology/facebook-to-delete-1-billion-faceprints-in-face-recognition-shutdown/
Have you ever wondered about the cloud? Have you even imagined it?In this episode. Darnley discusses what the cloud really is and why they are prone to cyber attacks today. Why the supply chain is important along with layers of protection that ensures your privacy today.
With the recent Facebook/ Meta announcement, human existence as we know it is going to change. In this podcast, Darnley will talk about the new digital world that we will soon be subject to - bad or good. Is this Metaverse be met with optimism or pessimism?
Wondering where to start with backing up your data? Nathan and Ham have you covered with the basics. Learn about what exactly a backup is, what the cloud really means, and other types of backups like hard drives. Nathan and Ham walk through the pros and cons of each and answer the question – do you really need to back up your data? Hear personal stories of sulfur pits and corrupted hard drives from Ham, plus learn about the different types of data and who can access them.This episode concludes with news from expert Mercy about a recent Craigslist phishing scam and more malicious Android apps._______________News Sources:Story 1:Bracken, Becky. "Attackers Hijack Craigslist Emails to Bypass Security, Deliver Malware." Threat Post, 26 October 2021, https://threatpost.com/attackers-hijack-craigslist-email-malware/175754/Story 2:Toulas, Bill. "Millions of Android Users Targeted in Subscription Fraud Campaign." Bleeping Computer, 25 October 2021, https://www.bleepingcomputer.com/news/security/millions-of-android-users-targeted-in-subscription-fraud-campaign/Montalbano, Elizabeth. "Millions of Android Users Scammed in SMS Fraud Driven by Tik-Tok Ads." Threat Post, 26 October 2021, https://threatpost.com/android-scammed-sms-fraud-tik-tok/175739/
Have you ever looked up at the night sky and wonder about all the hacking that has gone on in our world? I do, but I also think about those media worthy hacks over the last 20 years that has disclosed some interesting clues that maybe we are not alone. You may consider this podcast an X-File, but I talk about some notable hacks that has shaken up the UFO community at large.
Explore the world of ethical hacking with special guest Brad Ammerman, an industry expert. Nathan sits down with Brad to chat about what it's really like working as a penetration tester. From hacking into computer systems to breaking into physical locations, Brad and his team are hired to help find holes in clients' security, so they can resolve issues and stay safe. Hear exclusive on-the-job stories from Brad's career and get inside advice on some of the top security pitfalls that everyday people fall victim to. _______________ News Sources: Story 1: Claburn, Thomas. "WhatsApp's Got Your Back(ups) with Encryption for Stored Messages." The Register, 14 October 2021, https://www.theregister.com/2021/10/14/whatsapps_backups_encryption/ Story 2: Abrams, Lawrence. "Acer Hacked Twice in a Week by the Same Threat Actor." Bleeping Computer, 19 October 2021, https://www.bleepingcomputer.com/news/security/acer-hacked-twice-in-a-week-by-the-same-threat-actor/ Story 3: Gatlan, Sergiu. "Man Gets 7 Years in Prison for Hacking 65K Health Care Employees." Bleeping Computer, 19 October 2021, https://www.bleepingcomputer.com/news/security/man-gets-7-years-in-prison-for-hacking-65k-health-care-employees/
Tune in to learn about the "internet iceberg," an analogy to help put into perspective the vastness of the internet and its three main parts – the surface web, the deep web, and the dark web. Nathan and Ham define each one and discuss the perils of the dark web. Find out what goes on in some of the most hidden parts of the internet, and hear Ham's personal story about a frightening experience. The episode concludes with news from Mercy on a recent malware disguised as an Android app, a Verizon phishing scam, and a cyberattack on a Japanese company. _________________________ News Sources: Story 1: Sharma, Ax. "Photo Editor Android App Still Sitting on Google Play Store is Malware." Bleeping Computer, 12 October 2021, https://www.bleepingcomputer.com/news/security/photo-editor-android-app-still-sitting-on-google-play-store-is-malware/ Story 2: Riley, Duncan. "Sneaky New Phishing Campaign Uses a Math Symbol in the Verizon Logo." SiliconANGLE, 12 October 2021, https://siliconangle.com/2021/10/12/sneaky-new-phishing-campaign-uses-math-symbol-verizon-logo/ "Verizon Phishing Scam Targets Customers Through a Text Message." DataBreaches.net, 11 October 2021, https://www.databreaches.net/verizon-phishing-scam-targets-customers-through-a-text-message/ Story 3: Greig, Jonathan. "Olympus Suffers Second Cyberattack in 2021." ZDNet, 12 October 2021, https://www.zdnet.com/article/olympus-announces-second-cyberattack-in-2021/
October is Cybersecurity Month, do you know where your data is?In this podcast, there are no ghosts, only education on how to protect you, your data and your privacy while surfing on the information super highway. This is the month of digital and security reflection for ourselves and our business.
Don't you love seeing the northern lights? Is it not a sight of beauty?Behind that wall of green lights there is a monster lurking behind it to end the very thing we love - the internet. In this podcast, Darnley discusses what a solar storm is, which country is most affected and how to mitigate the problem.
Tune in to find out what exactly ransomware is, who these attackers are, and why and how they do it. Nathan and Ham discuss recent large attacks by groups such as REvil and WannaCry. Hear about the far-reaching effects these attacks can have and how people and businesses can protect themselves. The episode concludes with a chat about cybersecurity tactics such as cyber insurance and ransomware negotiators. Both are ways that businesses can protect themselves in the event of a ransomware attack. Lastly, hear the latest news on ransomware attacks and more from Mercy. News Sources: Story 1: Vaas, Lisa. "Crystal Valley Farm Coop Hit with Ransomware." ThreatPost, 22 September 2021, https://threatpost.com/crystal-valley-farm-coop-hit-with-ransomware/174928/ Story 2: Gatlan, Sergiu. "Transnational Fraud Ring Stole Millions from Army Members, Veterans." Bleeping Computer, 3 October 2021, https://www.bleepingcomputer.com/news/security/transnational-fraud-ring-stole-millions-from-army-members-veterans/ Story 3: Quach, Katyanna. "Google to Auto-Enroll 150m Users, 2m YouTubers with Two-Factor Authentication." The Register, 6 October 2021, https://www.theregister.com/2021/10/06/google_twofactor_authentication/
Ta-da! Windows released a new operating system - Windows 11. What does this mean for cybersecurity? Are they going to pull this off or royally get attacked?
Tune in to hear Nathan and Ham discuss how to #BeCyberAware with the basics of cybersecurity. Learn about the Four P's – phishing, passwords, patching, and protect your devices – to help you stay safe. Plus, Nathan and Ham both share interesting personal stories about their encounters with cybercrime and they give their top tips on how to avoid falling into the traps of hackers. Get an insight into cybersecurity terminology you may have never even heard of, like a “whaling” and “zero-day vulnerability.”This episode is ended with a segment of current news and events given by Mercy. She covers updates including new malware that hunts gaming accounts, an information leak from a far-right militia, and two more dangerous malware targeting Android and Mac devices._______News Sources:Story 1:Bracken, Becky. “Gamers Beware: Malware Hunts Steam, Epic and EA Origin Accounts.” ThreatPost, 28 September 2021, https://threatpost.com/gamers-malware-steam-epic-ea-origin-accounts/175081/Story 2:Thomson, Iain. “Emails, chat logs, more leaked online from far-right militia linked to US Capitol riot.” The Register, 28 September 2021, https://www.theregister.com/2021/09/28/in_brief_security/Story 3:Seals, Tara. “TangleBot Malware Reaches Deep into Android Device Functions.” ThreatPost, 24 September 2021, https://threatpost.com/tanglebot-malware-device-functions/174999/
Nathan: REvil. They just hit for a $70 million ransomware attack. Ham: Oh, my word, you've been. You've been naming off these attackers who are these people?Nathan: Know, if you're a potential target, know why you're a potential target, where you're vulnerable and what they're going to be going for. It always goes back to safe. Clicking .Ham: I never knew cyber insurance is actually a thing. Can I bundle it with my car? My ATV.Nathan: Hey everybody. My name's Nathan, a student on the information security team here at Minnesota state university Mankato. And I'll be your resident expert on all things cybersecurity for our second season of the CyberAware podcast. Ham: Hey, what's happening guys? I'm Noah "Ham" Adamson, just a regular guy here on a journey becoming more cyber aware alongside the experts, Mercy: and I'm Mercy, a student and cybersecurity specialists on the information security team alongside Nathan.I'll be your go to for breaking news and trends happening in the cyber-verse and beyond each week ,Nathan: We'll walk you through the cyber security world from the basics of personal security, fascinating topics like ransomware, the dark web, and hacking. Ham: We'll even be joined by some special guest experts. Join us as we uncover what you need to know to stay secure Mercy: coming this October, you're on the lookout for season two of the cyberware podcast.
We all have a common enemy - hackers.They are attempting to steal our data everyday by attacking our email systems.In this episode, Darnley gives you all the goods in protecting and hardening your email. By utilizing truth, industry advice, along with 10 tips to protect yourself from being hacked. Email is not secure, learn how to protect yourself in this podcast. Support the show (https://www.paypal.com/biz/fund?id=DE9JJEXYBZVQA)
The mass exodus from WhatsApp to Signal stirred some major questions: Is Signal any safer? Could signal get breached? Why are famous people advocating using this app?Find out in this episode. Oh, and Lucifer makes a guest appearance...Support the show (https://www.paypal.com/biz/fund?id=DE9JJEXYBZVQA)
Host Karl talked to James Norrie from CyberconIQ. CyberconIQ takes a new approach to educating users about security - based on their demonstrated behavior. As we've all seen, pure education has limited success. This program helps users alter their behavior. Guest Dr. James Norrie is a Professor of Strategy and Cybersecurity and former Dean of the Graham School of Business at York College of Pennsylvania. He is the author of six books, multiple journal articles and is a sought-after expert, frequent media commentator and national newspaper op-ed guest writer. Internationally known, his areas of research interest delve into the intersection of society and technology and the clash this can create, particularly as cybercrime has become a ferocious problem. In addition to his academic role, he is the Founder and CEO of CyberconIQ, a firm committed to changing the global cybersecurity conversation from fear to hope. He conducts, presents and publishes industry-related research and consults globally to prominent companies concerning cybersecurity, information privacy and security, and economic crime detection and prevention methods. He lives in York, PA. cyberconIQ mitigates cyber risk by leveraging CYBERology™ – the intersection of cybersecurity and psychology, which is the foundation of our solutions. Related Links: https://cyberconiq.com/ https://www.facebook.com/cyberconiq https://www.instagram.com/cybercon_iq/ https://www.linkedin.com/company/51683023/admin/ :-)
Are you under information over load?Do you feel your organization will not keep up with all these cyber attacks?In this episode, Darnley explains the importance of keeping a grassroots approach while considering your businesses best interests in hand.Want to see the video podcast, visit Darn IT Podcast on YouTube!Support the show (https://www.paypal.com/biz/fund?id=DE9JJEXYBZVQA)
You may know that your data is used against you, but do you know to what extent? Living in 2021 may seem like a pipe dream from 100 years ago, but to what cost to our privacy?In this episode, Darnley discusses the different between Privacy vs. Secrecy, why you close the door when you go to the toilet, and why privacy is a human right. Tune in to the thought provoking podcast.Support the show (https://www.paypal.com/biz/fund?id=DE9JJEXYBZVQA)
Do you have preconceived notions of cybersecurity?Do you think a technical problem requires a technical solution?Did you know that majority of cyberattacks are caused by human error?In this podcast, Darnley discusses the fundamentals of why cybersecurity needs to be managed, not only for the CISO. It takes a village to build a proper cybersecurity ecosystem.Support the show (https://www.paypal.com/biz/fund?id=DE9JJEXYBZVQA)
The majority of employees feel cybersecurity is not their job, not their problem, nor their responsibility. I'm here to tell you that you are wrong. In 2021, today's cybersecurity responsibilities lay on all of our hands. IT/security departments alike are drowning in various responsibilities, ignorance is one of them. In this podcast, Darnley will discuss why human error is one of the most common root causes of data breaches, how to build a 5-way cyber-secure work environment culture, what we should do while working from home, and a note to leaders. Support the show (https://www.paypal.com/biz/fund?id=DE9JJEXYBZVQA)
Wow, what a year. 2020 is a year for the history books. What did it mean for cybersecurity?In this podcast, Darnley discusses the year of the Corona Virus and its effect on the world and our cybersecurity world. Discussion over recent Solarwinds attack, Twitter, and Zoom attacks that made headlines over 2020. What lies ahead for us in 2021? Listen to predictions here. [New for 2021: Look for the video podcast on you YouTube, stay tuned!]Support the show (https://www.paypal.com/biz/fund?id=DE9JJEXYBZVQA)
In this episode, Darnley discusses the surge of technology and online use since March 2020. The increased expenditures on technology have equated to more people using technology and spending time online - which creates a bigger gold mine for cybercriminals.Learn why the "new normal" makes it easier for hackers to infiltrate your network to cause chaos.Support the show (https://www.paypal.com/biz/fund?id=DE9JJEXYBZVQA)
MavLABS is a service available to students and faculty that allows remote access to specialized lab computers that offer software like ArcGIS, CAD programs, programming editors, database servers, Microsoft Access, geography labs, and more. Sherwin explains how MavLABS works using remote access technology and how you can securely access this service from your personal device.One important piece of advice that you should follow when using MavLABS is to avoid shutting down the lab computer that you are remotely accessing, as that will require an employee to manually turn the computer back on in the lab on campus. Instead of shutting down, simply just log out of the accessed system after use. Lastly, take note that MavLABS is offline nightly from 12 am to 5 am for maintenance. If you experience issues with MavLABS or have questions, submit a ticket to IT Solutions.In the second half of the podcast, Raj and Sherwin provide insight on the security features of Zoom, one of the most important of which is the ability to password-protect your meetings. They also cover the recent overhaul of documentation and policies that Zoom underwent to mitigate “Zoom-bombing” issues. Raj explains his preference for Zoom over other video calling platforms, stating that he enjoys Zoom's functionality and simplicity.All faculty, staff, and students have access to a premium Zoom account, which offers more features than the free version and is more secure – so be sure to always log in with your StarID using our secure MinnState portal at http://minnstate.zoom.us/
Did you know the demand for cloud security applications has increased since the beginning of the work from home narratives?In this episode, Darnley discusses the importance of cloud transition, the risk associated, and 8 tips to prepare for a cloud security model for various kinds of businesses. The jump to the cloud has become more cultural than technological. Support the show (https://www.paypal.com/biz/fund?id=DE9JJEXYBZVQA)
Multi-factor authentication is a powerful security tool that creates layered protection by requiring users to sign in using more than one verification method, which helps prevent cybercriminals from gaining access to your personal information. Different ways to authenticate may include an authenticator app, a text message, a code generator, or even a call on your phone. Raj explains his preferences when it comes to multi-factor authentication and also recounts a personal story about a time when multi-factor authentication saved his account from a breach! Sherwin and Raj both highly recommend using multi-factor authentication on all your accounts, especially with the increase in remote working and learning.Multi-factor authentication is available for your University Office 365 account, including all related apps like Outlook, OneDrive, and more. Extra security is just a click away! Follow our easy set-up instructions, which include helpful images to guide you through the process.
In this short, Quick Tips episode, Sherwin and Raj share five simple ways to stay cybersafe. They delve into the Four P's of Cybersecurity, starting with the topic of phishing emails. They explain how to spot them and what to avoid in order to keep yourself and your information safe. They also touch on passwords, giving important tips such as using the appropriate character length and variety as well as how to maximize security of accounts by keeping usernames and passwords unique for each. Next, the duo discusses patching, which is all about keeping your devices and software up to date. They give suggestions on how to keep up with security patches in order to defend against malware. They also share a combination of important steps that can be implemented to further protect your devices, such as logging out after use, being aware of shoulder surfing, avoiding public Wi-Fi, and more. Lastly, Raj and Sherwin cover a variety of useful resources that are available on the CyberAware website to help you stay safe.
In this episode of the CyberAware Podcast, host Sherwin discusses with guest speaker Joey Kleinow the topic of cybersecurity tools and operating systems. Joey is an upcoming graduate majoring in computer information technology at Minnesota State University, Mankato and is currently employed as a cybersecurity analyst.
Are you a believer that by installing a firewall you are fully protected?In this episode. Darnley discusses why only thinking about your perimeter device can lead to your demise via other threat landscapes. Darnley also discusses 8 reasons why the firewall will end up failing you. Do you feel that the cybercriminals are going to after your businesses crown jewels? Listen more to this latest episode. Support the show (https://www.paypal.com/biz/fund?id=DE9JJEXYBZVQA)
Have you ever been attacked, digitally? In this episode, Darnley shares his personal story of being attacked by Russian hackers recently and discusses ways you can protect yourself in this digital turbulence. Even people within the cybersecurity industry are not immune to attacks, learn 10 ways to protect yourself.Support the show (https://www.paypal.com/biz/fund?id=DE9JJEXYBZVQA)
Casting from the Dark Web, it's off the record with Darnley G. A raw podcast where you sit down with the CEO and discuss all things cybersecurity. This special edition podcast is a free-form unscripted show dedicated in talking about anything. Listen to this episode for cybersecurity fatigue, reducing cybersecurity budgets, and much more! Support the show (https://www.paypal.com/biz/fund?id=DE9JJEXYBZVQA)
Ever wondered what is is?Do you feel like a bunch of professionals are just super paranoid?In this episode, Darnley explains what Zero Trust is, why it is important, and five ways to consider when implementing zero-trust models. Strive for the importance in securing your network infrastructure without the worries of users or computers falling through the cracks. Support the show (https://www.paypal.com/biz/fund?id=DE9JJEXYBZVQA)
In this episode of the CyberAware Podcast, host Sherwin discusses with guest speaker Nate Johnson the topic of research and cybersecurity vulnerabilities. Nate is a penetration tester and is a co-host for another podcast series on YouTube called the Irongeek Cast. Nate delves into his undergraduate research topic, which was proximity radio frequency identification (RFID) in card reader lock systems. For example, the technology that is used with Mav Cards. He also researched the security flaws and the encryption within card reader lock systems using open source coding. Nate then lays out a comparison between RFID and NFC (Near Field Communication) and how variable band frequencies play a major role in these systems. Nate also shares with Sherwin his study abroad experience in the Netherlands and how NFC is very common there, ranging from identification to payments at almost every location. Nate moves on to talk more about his current research, giving insight on security tactics used to prevent physical bypass on RFID and NFC card reader lock systems. Nate illustrates his experience as a penetration tester and he sheds more light on faculty and student research on cybersecurity. Interestingly, Nate and Sherwin then pivot the conversation to discuss the latest Pentagon speculated UFO sightings and go on to imagine the security methods that could have been used to evade radar spotters. Nate then shares his public presentation experience in front of industry professionals, explaining how having expertise in recent advancements can even sometimes give you an edge over someone who has decades of experience in the industry. Finally, he suggests to incoming students some important coursework for pursuing cybersecurity from a Minnesota State University, Mankato alumni's point of view.
With a growing user base with Tik Tok, greater alarm bells are being sounded as the majority of users are forgetting that this application is built inside China, which means a communist country has the ability to intercept and use the data.In this episode, Darnley will speak about his personal opinion about Tik Tok, the issues faced when using the application and how to best deal with this application on a security standpoint. Support the show (https://www.paypal.com/biz/fund?id=DE9JJEXYBZVQA)
In this episode of the CyberAware Podcast, our hosts, Raj and Sherwin, discuss with special guest Mubasser Kamal focused mainly on cyberpunks. Mubassir graduated from Minnesota State University, Mankato two years ago with a masters degree in IT and he has been currently working for a penetration testing company based in Minneapolis as a security consultant. The podcast is all about cyberpunks which simply put forward means individuals into cybertheft & other malicious criminal activities in the cyberworld. The first major example of cyberpunk they discuss is phishing and how there has been an upsurge in SMS phishing and the number of victims during this COVID-19 timeline. They provide insights to cross-site request forgery and SQL injection which turn out to be some of the common exploits. They elaborate on penetration testing further and how institutions implement it effectively to test their cyber infrastructure like mobile and web applications to name some and to evade exploits like remote code execution attacks. They also talk about tools like ‘Netcat' that they use for troubleshooting the exploits while they poke around different servers. They talk more about ‘mercenary' hackers implemented and sponsored by Governments and corporations around the world to conduct cyber-attacks & espionage too. They explain how these hackers have high-end targets and many of the times bait people close to their target to hack into, essentially implementing these innocent people as passive cyberpunks. They then give some tips to stay cybersecure like always checking the links (URL), getting back to the institution involved directly to check the validity of the e-mail or SMS or call they received, securing home networks better using WPA passwords, performing regular firmware updates on devices like routers, etc. Finally they take you through a typical day in life of an Information security analyst and the tasks they perform on a daily basis.
Summary of episode 4:In this episode of the CyberAware Podcast, Raj and Sherwin speak with special guest Michael Menne, the Chief Information Security Officer (CISO) at Minnesota State University, Mankato. With 28 years of experience in IT, Michael shares his thoughts on cybersecurity and how things have changed throughout the years. Michael gives insight into what his job as a CISO entails, how organizations assess security risks, and how students can pursue a career as a CISO. The group also discusses other frequently asked questions, including how IT Solutions and the security team reacted to the COVID-19 pandemic.During the second half of the podcast, Raj, Sherwin, and Michael discuss what it means to outsource security services and how outsourcing can impact higher education organizations specifically. The group also chats about the process of implementing new technology to enhance cybersecurity, and the pros and cons of spending University resources on these projects. Lastly, Michael shares his thoughts on security regarding the Internet of things and smart devices, like smart speakers. The group ends with a few quick tips on how to stay up to date with current cybersecurity issues, including following the newsfeed on our CyberAware website or contacting Michael Menne.CyberAware Website: https://mankato.mnsu.edu/cyberaware Contact Michael Menne: https://mankato.mnsu.edu/it-solutions/about-it-solutions/it-solutions-staff/michael-menne/
In this first episode of the CyberAware Podcast, our hosts, Raj and Sherwin, delve into the world of cybersecurity to uncover the basics of phishing and patching – two of the Four P's of cybersecurity. Dr. Veltsos, a professor in Computer Information Science at Minnesota State University, Mankato, joins Sherwin and Raj to discuss phishing attacks in the current COVID-19 climate. They share helpful tips on how to spot phishing messages, how to avoid falling victim to them, and how to report them. Dr. Veltsos also answers cybersecurity questions frequently asked by students and staff and shares his best advice on how to get involved with cybersecurity in everyday life.During the second half of the podcast, the group discusses the importance of patching your devices, or keeping software and firmware up to date. Sherwin, Raj, and Dr. Veltsos address how updating devices on a regular basis can help increase security and reduce the risk of a cyberattack. Lastly, helpful tips on staying safe while working and learning from home, including how to be secure while using remote desktop capabilities and how to avoid Zoom-bombing, are shared. The group wraps up the podcast with a final discussion on how the transition to online learning has affected students and professors.Dr. Veltsos: Twitter: @DrInfoSechttps://twitter.com/DrInfoSecLinkedin:https://www.linkedin.com/in/chrisveltsos/MNSU Cybersecurity news, events, and resources : https://mankato.mnsu.edu/it-solutions/CyberAware-CyberSecurity/MNSU Report Phishing Link:https://mankato.mnsu.edu/it-solutions/help-support/explore-support-articles/report-office-365-spam/Resources Dr. Veltsos says you should be aware of~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~Internet Crime Complaint Center (IC3) | Cyber Actors Take Advantage of COVID-19 Pandemic to Exploit Increased Use of Virtual Environments https://www.ic3.gov/media/2020/200401.aspxOpen DNS config for Windows: https://support.opendns.com/hc/en-us/articles/228007207-Windows-10-ConfigurationOpen DNS config for Mac: https://support.opendns.com/hc/en-us/articles/228006927-Configuration-for-Macintosh-OSX-computersFree and Low Cost Online Cybersecurity Learning Content | NIST https://www.nist.gov/itl/applied-cybersecurity/nice/resources/online-learning-content
In the second episode of the CyberAware Podcast, our hosts, Raj and Sherwin, delve into the world of cybersecurity to uncover the basics of passwords and device protection – the last of the two P's of cybersecurity. Brad Ammerman, an adjunct professor in Computer Information Science at Minnesota State University, Mankato, joins Sherwin and Raj in discussing best password tips and how to keep your devices safe.Bradley AmmermanLinkedin: https://www.linkedin.com/in/bradammermanMusic by our host Sherwin Bothello.
In this episode of the CyberAware Podcast, our hosts, Raj and Sherwin, discuss cybersecurity awareness during COVID-19. Mike Hedlund, the President of the Information Security Student Organization (ISSO) at Minnesota State University, Mankato, joins Sherwin and Raj to share his thoughts on vulnerabilities that have heightened due to COVID-19. Together, they delve into the topics of browser extensions, phishing and scams related to COVID-19, and the recent transition to online working, teaching, and learning. Mike shares his personal experiences and gives advice on how to keep up with work and school online.In the second half of the podcast, the group shares their thoughts on certifications in the information security industry. They also chat about ISSO's experience at the 2020 Collegiate Cyber Defense Competition in Alexandria, Minnesota. Mike shares his team's experience in competing in the hypothetical scenario to correct vulnerabilities in systems at risk of being breached. The group wraps up the podcast with a quick discussion on ISSO's future ideas for hosting information security events, like hackathons, and how COVID-19 has affected their plans.
Who is Darnley? Why is he leading these podcasts?In this episode, Darnley explains why he got into cybersecurity/IT at the start which evolved him into creating Darn IT Group. Hear about his previous experiences and the specific date that he started the march into cyber awareness for small to medium businesses.
Are you hearing in the news about Zoom? Do you use it on a daily basis to work?Have no fear, in this episode, Darnley discusses ten ways to harden your Zoom application to attempt to decrease the vulnerabilities of your meetings falling into the wrong hands, or ears.
Email is the fastest way that cybercriminals target individuals or organizations. The general rule of thumb is to trust no-one, even if it may seem legitimate. Today's podcast, illustrates the need to be aware of the threats that come with operating over email.
Why is nothing working in cybersecurity? In this episode, Darnley takes the gloves off and talks about some of the issues with cybersecurity from the outside-in approach.
In this episode, Darnley discusses the 5 things you can do to put yourself in a better security position. These methods are simple, easy, and you don't have to be a cyber expert to implement these things today!
October is Cyber Security Awareness month - this month we talk about various cyber risks and vulnerabilities that we could experience while interacting over the internet. This turned into a world-wide initiative due to the increasing threats and attacks against everyone. Cyber awareness is key in protecting yourself against cybercrime. In this podcast, Darnley talks about why this month is important and what you can do to better arm yourself.
In this episode I chat with Former United States Most Wanted Brett 'GOllumfun' Johnson referred to by the United States Secret Service as "The Original Internet Godfather. Mr Johnson was a central figure in the Cybercrime world for almost 20 years. He build and was the leader of 'ShadowCrew', the precursor to today's darknet markets. He was instrumental in development many ares of online fraud while helping design, implement and refined modern identity theft, account take over fraud, card not present, IRS Tax fraud and countless other social engineering attacks and breaches and hacking operations. Brett shares openly and honestly his backstory, being on the United States Most Wanted to turning it all around and now working with Business, Organisations and Individuals across the world helping them protect themselves against Cybercrime. We chat about the types of Cybercrime which people need to be aware of as well as simple things which people can do to help protect themselves. Brett chats about what is know as the;Surface WebDeep WebDark WebBrett explains the different motivations of cybercrime as well as the rise of 'Fake' reviews online & how they influence who you buy from and what you buy online.
October is National Cyber Security Month. Let's celebrate this Halloween as Defenders of Security with these cybersecurity tips. Read the original post: https://tenta.com/blog/post/2018/10/cyber-security-awareness-month?utm_source=podcast Keep in touch! ✉️ hello@tenta.com
We are #CyberAware is the tag for the National Cybersecurity Awareness Month campaign. Each year this campaign is run by the National Cybersecurity Alliance. In 2018, Kardon, Security First IT, and HMWH are all signed up to be champions and publish information for the campaign. Today, we will review what these campaigns are about and how you can use these and more like them to augment your education program. More at HelpMeWithHIPAA.com/176
Tune into Herjavec Group's Cybersecurity Cast to hear various Herjavec Group team members - from marketing to sales to tech - for their best advice on how consumers and enterprises can stay safe online. The onus of securing important data, whether corporate or personal, is on everyone. From entry-level employees to the boardroom, it is critical that businesses invest the time necessary to educate their employees on how to maintain a safer digital presence. To learn the best practices for consumers and enterprises to stay safe online, listen to the episode now.