Attack on a computer system
POPULARITY
Categories
Send us a textIn this episode, Joe sits down with Brian Long, CEO of Adaptive Security, to delve into the evolving landscape of cybersecurity, focusing on the alarming rise of AI-powered social engineering attacks. Brian shares insights from his extensive experience, highlighting the sophisticated tactics used by attackers, including deep fake technology and AI agents. They discuss the challenges organizations face in adapting to these threats and the importance of awareness and robust security controls. Tune in to learn about the future of cybersecurity and how companies can better prepare for the next wave of digital threats.00:00 Introduction to Security Challenges04:08 AI-Powered Social Engineering Threats09:45 The Opaque Nature of Cybersecurity Incidents14:08 Deep Fakes and Their Evolution18:48 Hiring Risks in the Age of Deep Fakes23:00 The Future of Cyber Threats and Anarchy28:04 The Arms Race: AI Detection vs. Deepfakes32:49 Preparing for the Future: Awareness and Training39:26 The Evolving Threat Landscape: Beyond Traditional Securityhttps://www.adaptivesecurity.com/https://www.linkedin.com/in/brianclong/Support the showFollow the Podcast on Social Media! Tesla Referral Code: https://ts.la/joseph675128 YouTube: https://www.youtube.com/@securityunfilteredpodcast Instagram: https://www.instagram.com/secunfpodcast/Twitter: https://twitter.com/SecUnfPodcast Affiliates➡️ OffGrid Faraday Bags: https://offgrid.co/?ref=gabzvajh➡️ OffGrid Coupon Code: JOE➡️ Unplugged Phone: https://unplugged.com/Unplugged's UP Phone - The performance you expect, with the privacy you deserve. Meet the alternative. Use Code UNFILTERED at checkout*See terms and conditions at affiliated webpages. Offers are subject to change. These are affiliated/paid promotions.
When Hackers Target Schools: Defending K–12 from Cyber ThreatsPart of ZeroNow's Conversations expert panel discussion series, this session examines the growing cybersecurity threats facing today's schools—and how education leaders can defend against them. As districts become increasingly digital, they've also become prime targets for ransomware, phishing, and data breaches that can disrupt learning and compromise sensitive student information.Our panel of cybersecurity specialists, technology directors, and public safety experts will explore real-world attacks, lessons learned, and proactive strategies to build cyber resilience across K–12 systems. Attendees will gain actionable insights on risk assessment, incident response planning, staff training, and leveraging federal resources to protect networks and data.GuestsAntoinette KingAntoinette King, CISSP, PSP, has more than two decades of experience in the security industry, working in integration, manufacturing, and consulting. Antoinette founded Credo Cyber Consulting in 2020 with the goal of providing her clients with a holistic perspective on security, bridging the gap between the physical and cybersecurity domains with a focus on data privacy and protection. Her first book, The Digital Citizen's Guide to Cybersecurity: How to Stay Safe and Empowered Online, hit the Amazon Best Sellers list for all its categories in the first 48 hours of release. Her latest book, co-authored with Michelle Kreiger and released in October 2025, From Chalk Dust to Digital Trust: A Guide in Data Privacy and Security for K-12 Leaders, was #1 in Cloud-Based Computing books in the first week of release.Nathan Shanks Nathan Shanks is a seasoned executive and visionary leader with over two decades of experience in the technology and cybersecurity sectors. Currently serving as the General Manager of Global Cyber, Video, Software, and Access Management (VS&A) Professional Services at Motorola Solutions, Nathan drives the strategy and growth of mission-critical services, with a strong emphasis on protecting and securing software that protects communities and empowersenterprises worldwide. This requires leveraging the latest use of AI along with traditional proven techniques.Dr. Marnie HazeltonDr. Marnie Hazelton is a nationally recognized leader in educational equity, civic engagement, and transformative district leadership. She is the proud recipient of the NJ Visionary Superintendent Award and Leading Now's Civic Leadership in the Superintendency Award (2025), honoring her innovative and community-centered approach to student success.Under Dr. Hazelton's leadership, Englewood has accelerated post-pandemic academic recovery, with reading proficiency rising and all student subgroups exceeding growth targets. She has strengthened partnerships with community organizations and city agencies, created a District Community Liaison role, and launched inclusive initiatives such as the annual Back to School Fair.Her visionary efforts include the creation of a Cyber Café to enhance digital access and collaboration, and a state-of-the-art CTE Cosmetology Room that expands hands-on career readiness opportunities for students.With over $17 million in competitive grants secured throughout her career, Dr. Hazelton has led initiatives that close achievement gaps, expand advanced coursework, and promote restorative and dual-language learning. Recognized by the NAACP and as a NASS Superintendent of the Year finalist, Dr. Hazelton's leadership reflects excellence, equity, and the transformative power of education.
While our team is out on winter break, please enjoy this episode of Threat Vector from our partners at Palo Alto Networks. In this episode of Threat Vector, host David Moulton talks with Wendi Whitmore, Chief Security Intelligence Officer at Palo Alto Networks, about the increasing scale of China-linked cyber threats and the vulnerabilities in outdated OT environments. Wendi shares critical insights on how nation-state threats have evolved, why AI must be part of modern defense strategies, and the importance of real-time intelligence sharing. They also dive into scenario planning as a key to resilience. If you want to know how cybersecurity leaders are preparing for the next wave of threats, this episode is a must-listen. From the show: ASEAN Entities in the Spotlight: Chinese APT Group Targeting Preparing for a Secure Paris 2024 Unit 42 Predicts the Year of Disruption and Other Top Threats in 2025 FBI talks about how China is testing AI in cyberattacks Hear more from Wendi Whitmore on Threat Vector: Episode 5: From Nation States to Cybercriminals Join the conversation on our social media channels: Website: https://www.paloaltonetworks.com/ Threat Research: https://unit42.paloaltonetworks.com/ Facebook: https://www.facebook.com/LifeatPaloAltoNetworks/ LinkedIn: https://www.linkedin.com/company/unit42/ YouTube: @paloaltonetworks Twitter: https://twitter.com/PaloAltoNtwks About Threat Vector Threat Vector by Palo Alto Networks is your premier podcast for security thought leadership. Join us as we explore pressing cybersecurity threats, robust protection strategies, and the latest industry trends. The podcast features in-depth discussions with industry leaders, Palo Alto Networks experts, and customers, providing crucial insights for security decision-makers. Whether you're looking to stay ahead of the curve with innovative solutions or understand the evolving cybersecurity landscape, Threat Vector equips you with the knowledge needed to safeguard your organization. Palo Alto Networks Palo Alto Networks enables your team to prevent successful cyberattacks with an automated approach that delivers consistent security across the cloud, network, and mobile. http://paloaltonetworks.com Learn more about your ad choices. Visit megaphone.fm/adchoices
A major data exposure tied to PornHub has raised serious questions about privacy, trust, and how personal information can surface in ways users never expect. In this episode of Darnley's Cyber Café, we break down what happened, why it matters beyond adult websites, and what this incident reveals about data handling in the modern internet economy.If you think this kind of breach doesn't affect you, or that sensitive platforms operate differently, this is a conversation you'll want to hear. Pull up a chair, grab a coffee, and let's talk about the side of data privacy no one likes to admit exists.Click here to send future episode recommendationSupport the showSubscribe now to Darnley's Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape.
Our guest on this week's episode is Jason Schenker, president of Prestige Economics and chairman of the Futurist Institute. In what has become an annual tradition, one of our nation's leading economists joins us to review the economy of 2025 and preview economic trends for 2026. He also focuses on supply chains and the prospects for the material handling market in the year ahead.When it comes to managing risk in the new year, companies can expect much of the same as we've seen this year, according to a recent report from risk and claims administration company Sedgwick. Victoria Kickham shares how the report examines risks across industries and aims to help companies navigate evolving trends.The labor market is changing fast, whether we're talking about the unemployment rate, job creation, turnover, a skilled labor shortage, or artificial intelligence. And this week Ben Ames reports on new research that lays out four major themes on what employers are going to have to do to keep themselves staffed up in 2026. But many workers are concerned that their employers won't prepare them properly for the many changes they will face in their jobs. Supply Chain Xchange also offers a podcast series called Supply Chain in the Fast Lane. It is co-produced with the Council of Supply Chain Management Professionals. A new series is now available on Top Threats to our Supply Chains. It covers topics including Geopolitical Risks, Economic Instability, Cybersecurity Risks, Threats to energy and electric grids; Supplier Risks, and Transportation Disruptions Go to your favorite podcast platform to subscribe and to listen to past and future episodes. The podcast is also available at www.thescxchange.com.Articles and resources mentioned in this episode:Prestige EconomicsReport: just 3% of executives say trade policies are positively affecting their businessRandstad points to growing skills gap as humans adopt AIVisit Supply Chain XchangeListen to CSCMP and Supply Chain Xchange's Supply Chain in the Fast Lane podcastSend feedback about this podcast to podcast@agilebme.comThis podcast episode is sponsored by: ID LabelOther linksAbout DC VELOCITYSubscribe to DC VELOCITYSign up for our FREE newslettersAdvertise with DC VELOCITY
Welcome to the CanadianSME Small Business Podcast, hosted by Maheen Bari, where we explore strategic insights and innovative solutions empowering businesses to grow with clarity and confidence. Today, we're stepping into the world of product marketing and cybersecurity, focusing on how human-centric storytelling helps businesses build trust in a threat-filled digital landscape.Our guest is Shruti Verma, Product Marketing Manager and GTM Lead at NULLZEC, the cybersecurity startup behind IsolateX, an AI-powered zero-trust browser designed to protect businesses from human-error cyberattacks. Shruti is also the host of Behind the Brief and a passionate storyteller committed to making complex tech simple and actionable.Key Highlights:Simplifying Cybersecurity: Shruti explains how shifting messaging from threats to trust reshaped Nullzec's product positioning. PMM in Startup Growth: She breaks down how product marketing drives a startup's GTM strategy even before a full marketing team exists. AI CISO in Your Browser: She discusses how IsolateX prevents human-error attacks while keeping workflows simple and seamless. Trust and Adoption: Shruti shares insights from leading the beta launch and engaging early adopters through story-driven communication. Future of PMM + AI: She outlines how AI is evolving the Product Marketing role and Nullzec's long-term vision for business security.Special Thanks to Our Partners:RBC: https://www.rbcroyalbank.com/dms/business/accounts/beyond-banking/index.htmlUPS: https://solutions.ups.com/ca-beunstoppable.html?WT.mc_id=BUSMEWAGoogle: https://www.google.ca/A1 Global College: https://a1globalcollege.ca/ADP Canada: https://www.adp.ca/en.aspxFor more expert insights, visit www.canadiansme.ca and subscribe to the CanadianSME Small Business Magazine. Stay innovative, stay informed, and thrive in the digital age!Disclaimer: The information shared in this podcast is for general informational purposes only and should not be considered as direct financial or business advice. Always consult with a qualified professional for advice specific to your situation.
Cyber threats are evolving faster than ever, with attackers targeting the human element and leveraging AI to outsmart businesses. Gar O’Hara, Senior Director of Sales Engineering at Mimecast, breaks down why Southeast Asia is a hotspot for attacks, and the key moves organisations should make in 2026 to stay secure. Produced and presented by Audrey SiekSee omnystudio.com/listener for privacy information.
Cybersecurity is essential for every practice that relies on technology. In this episode, guest Kaitlin Upchurch, Senior Vice President and Cyber & Tech Practice Leader at Lockton, addresses the cybersecurity questions practices are—and are not—thinking about. She explains why cybersecurity risks are often misunderstood, what makes health care a prime target, and why insurance alone is not enough. Tune in to understand your cyber exposure, the biggest threats facing practices today, and the first steps to strengthen your protection beyond buying a policy. Chapters00:00 Intro00:47 Banter04:25 Guest background10:20 Tell us about Lockton.13:40 Do medical practices need cybersecurity?18:40 What are cybersecurity misconceptions?20:48 What are some cybersecurity threats?25:00 How can medical practices avoid cybersecurity issues?26:37 Access+27:16 Legal Takeaways28:45 OutroWatch full episodes of our podcast on our YouTube channel: https://www.youtube.com/@byrdadatto Stay connected for the latest business and health care legal updates:WebsiteFacebookInstagramLinkedIn
As satellite networks, autonomous vessels, and global flight operations become increasingly interconnected, the final frontier is fast becoming the newest front line. So why is space emerging as the next major cyber battleground? On Industry Insight, Lynlee Foo speaks to Patrick Trinkler, CEO & Co-Founder of CYSEC to find out what this shift mean for Singapore.See omnystudio.com/listener for privacy information.
Nosipho Radebe is in conversation with Muhammad Ali, Managing Director at World Wide Industrial & Systems Engineers (WWISE)See omnystudio.com/listener for privacy information.
Cybercrime Magazine was a media partner at Black Hat Europe 2025, where we met with leaders from some of the industry's hottest companies, including OX Security. In this episode, host Amanda Glassner is joined by Chris Lindsey, Field CTO at OX, to discuss the company's presence at the London-based event and his perspective on cybersecurity in Europe and across the globe. • For more on cybersecurity, visit us at https://cybersecurityventures.com
Lawmakers in the US have reintroduced a bipartisan bill to help commercial satellite owners and operators defend against growing cybersecurity threats to satellites. Satellite manufacturer K2 Space has raised $250 million in Series C funding at a $3 billion valuation. Fortastra has emerged from stealth and has raised over $8 million in seed financing, and more. Remember to leave us a 5-star rating and review in your favorite podcast app. Be sure to follow T-Minus on LinkedIn and Instagram. T-Minus Guest Elysia Segal brings us the Space Traffic Report from NASASpaceflight.com. Selected Reading Lawmakers revive satellite cybersecurity bill to shield commercial space systems from rising threats - Industrial Cyber K2 Space Raises $250M at $3B Valuation to Roll Out a New Class of High-Capability Satellites Strength Among the Stars: Fortastra Emerges to Build Maneuverable Spacecraft for National Security New Orders Signed With MBDA For Over 35m€- Avio NASA Selects Two Heliophysics Missions for Continued Development NASA JPL Unveils Rover Operations Center for Moon, Mars Missions Share your feedback. What do you think about T-Minus Space Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show. Want to hear your company in the show? You too can reach the most influential leaders and operators in the industry. Here's our media kit. Contact us at space@n2k.com to request more info. Want to join us for an interview? Please send your pitch to space-editor@n2k.com and include your name, affiliation, and topic proposal. T-Minus is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc. Learn more about your ad choices. Visit megaphone.fm/adchoices
"Spear phishing is a direct attack." Connect With Our SponsorsGreyFinch - https://greyfinch.com/jillallen/A-Dec - https://www.a-dec.com/orthodonticsSmileSuite - https://getsmilesuite.com/ Summary In this conversation, Gary Salman, CEO of Black Talon Security, discusses the critical importance of cybersecurity in the dental and orthodontic fields. He shares insights on the evolution of cyber threats, particularly focusing on social engineering and phishing attacks. Gary emphasizes the need for comprehensive training for dental staff to recognize and prevent these threats. He also highlights the significance of understanding cyber risk ratings and the role of AI in enhancing cybersecurity measures. The discussion concludes with practical advice for practices to safeguard patient data and navigate the complexities of modern cybersecurity challenges. Connect With Our Guest Black Talon Security - https://www.blacktalonsecurity.com/ Takeaways Gary has over 33 years of experience in dental technology.He emphasizes the importance of cybersecurity in practices.Social engineering is a major threat, often leading to phishing attacks.Training staff is crucial as 60% of cyber attacks result from human error.Spear phishing is a targeted attack that can compromise email accounts.Antivirus software may not detect legitimate software used by hackers.Cybersecurity requires a proactive approach, similar to healthcare.Understanding cyber risk ratings is essential for practices.AI can enhance cybersecurity but requires due diligence.Practices must be aware of their vulnerabilities and take action.Chapters 00:00 Introduction02:02 Gary Salman's Background and Black Talon Security06:33 Understanding Social Engineering Attacks14:14 Preventative Measures and Training25:58 Understanding Cyber Risk in Dental Practices27:52 The Importance of Cyber Risk Ratings28:19 Known Exploitable Vulnerabilities and Network Security33:13 AI in Healthcare: Benefits and Risks36:09 Best Practices for Using AI in Practices38:49 Final Thoughts and Contact Information Episode Credits: Hosted by Jill AllenProduced by Jordann KillionAudio Engineering by Garrett LuceroAre you ready to start a practice of your own? Do you need a fresh set of eyes or some advice in your existing practice?Reach out to me- www.practiceresults.com. If you like what we are doing here on Hey Docs! and want to hear more of this awesome content, give us a 5-star Rating on your preferred listening platform and subscribe to our show so you never miss an episode. New episodes drop every Thursday!
Ekco, one of Europe's leading security-first managed service providers, has announced the results of new research which reveals that one-in-five (22%) consumers in Ireland are purchasing fewer items online because they fear cyberattacks. For the same reason, 19% say they have started to pay in-person, in cash, when they can. The research, commissioned by Ekco and carried out by Censuswide, surveyed 1,000 adults in the Republic of Ireland, exploring their attitudes to online spending as the volume of cyberattacks and scams continues to rise. It comes at a time when major fashion retailers are considering a return to the high street after declining footfall, exacerbated by the pandemic, drove both shoppers and retailers online. The research suggests that cyber fears could drive more to physical stores this festive season. Despite year-on-year growth in online spending, just 30% of those surveyed believe they know how to check if a retailer's website is safe or not. In fact, in the last 12 months, more than one-in-10 (14%) have entered their payment details on a fraudulent website, thinking it was legitimate, while 26% have found themselves on a fake website which was attempting to mirror a real one. Ekco's research suggests that the constant desire for convenience could be making consumers less focused on security. When offered, 31% opt to store payment details on websites to save time during the check-out process, and the same percentage have payment details stored on multiple websites. However, many consumers are unforgiving when retailers suffer a cyberattack. In the last 12 months, a quarter (25%) of consumers have avoided purchasing from, or using the services of, a retailer because it suffered a cyberattack. Two-thirds (66%) say they would stop shopping with a retailer permanently if their data was stolen in a breach, even if no money was taken. Conor Scolard, Director of Cyber Resilience at Ekco, said: "Our research shows that while consumers want a hassle-free shopping experience - with conveniences such as having their payment details stored - they are also concerned about the security of their information. It is vital that retailers have the robust infrastructure in place that enables them to assure customers that their data is safe, regardless of how they choose to pay: in-person in cash, or online (with or without stored card details). "As we have entered the busiest time of the year for shopping, retailers need to ensure that their systems can both stay onlineand protect customers' data from cyberattacks. Our research highlights that a cyberattack will not only have a negative impact on operations, but it can also cause lasting damage to a business's reputation. In addition, shoppers evidently lack confidence in identifying safe websites from compromised or fraudulent ones, which will undoubtedly lead to hesitation. The retail sector must consider this and its own role in providing convenience and confidence." See more stories here.
Carl Quintanilla, Sara Eisen, and Michael Santoli kicked off the hour with a debate on where the Fed stands when it comes to a possible rate cut this afternoon - before former Fed Vice Chair and current Wharton Professor Alan Blinder gave his take. Plus: hear a wide-ranging interview with Ares CEO Michael Arougheti, spanning markets to what he calls a strong outlook for M&A... Also in focus: the team checked in with the CEO of one company that just partnered with the Department of Defense to stop growing AI cyber threats - and got the latest from Washington as GOP members sound the alarm on Nvidia's China sales. And last in the hour: catch an interview with the CEO of Magnum Ice Cream, talking demand and growth ahead on the heels of a new listing at the New York Stock Exchange. Squawk on the Street Disclaimer Hosted by Simplecast, an AdsWizz company. See pcm.adswizz.com for information about our collection and use of personal data for advertising.
Welcome back to "Forcepoint," a podcast where we dive deep into the critical and evolving world of cybersecurity. In today's riveting episode, hosts Vince Spina and Rachael Lyon sit down with Maggie Miller, a cybersecurity reporter for Politico, to unpack some of the most pressing cyber threats we face today. From the notorious Ticketmaster hack during Taylor Swift's ticket sales to the geopolitical cyber issues involving heavyweights like China and Israel, Maggie provides a comprehensive overview of the current cyber landscape. We'll explore the bipartisan effort needed to safeguard US infrastructure, including the vulnerabilities of our satellite systems, and the intricate dynamics of election security poised to affect the upcoming U.S. presidential election. Maggie also sheds light on the disinformation campaigns waged by nation-states and the role of AI in shaping public perception. And, with her unique background and serendipitous journey into cybersecurity journalism, we'll get a glimpse into her fascinating career path. To cap it off, we'll discuss the UN's controversial cyber treaty and its global implications. Don't miss out on this engaging episode brimming with insights and expert opinions on the state of cybersecurity. Stick around until the end for some light-hearted moments and a reminder to subscribe to "Forcepoint." For links and resources discussed in this episode, please visit our show notes at https://www.forcepoint.com/govpodcast/e362
Lori Gorman, deputy insurance commissioner, North Carolina, said harder markets and emerging risks are spurring companies to seek customized coverage. Gorman spoke with AM Best TV at the Vermont Captive Insurance Association Conference, Burlington.
This episode of Cybersecurity Today, hosted by Jim Love, delves into various cybersecurity threats and latest news. Topics include 'living off the land' attacks using Microsoft's native utilities, spoofing Calendly invites for phishing Google and Meta credentials, a significant breach at the University of Pennsylvania linked to Oracle E-Business Suite vulnerabilities, and findings on AI jailbreaks tied to syntactic patterns by researchers from MIT, Northeastern University, and Meta. The episode emphasizes the ongoing challenges and evolving strategies in cybersecurity. 00:00 Introduction and Sponsor Message 00:43 Living Off the Land Attacks Explained 03:41 Fake Calendly Invites and Phishing Campaigns 05:47 Oracle Breach and Its Implications 07:55 AI Jailbreaks and Syntax Hacking 11:27 Conclusion and Final Thoughts
A new report out of ETH Zürich that sheds light on a spike in cyber activity targeting space-related organizations during the Gaza War. A Soyuz rocket has been rolled out to its launch pad at the Baikonur Cosmodrome in Kazakhstan to begin counting down to a Thanksgiving Day liftoff. South Korea's Nuri rocket is scheduled to lift off at approximately 12:55 am on Thursday, according to the Korea Aerospace Administration, and more. Remember to leave us a 5-star rating and review in your favorite podcast app. Be sure to follow T-Minus on LinkedIn and Instagram. Selected Reading New Report Warns Space Sector Faces Rising Cyber Threats Amid Modern Conflicts - Orbital Today Soyuz Rocket Rolls Out as Cygnus Parks Away from Station - NASA First nighttime Nuri rocket launch creates excitement throughout Jeolla as local businesses benefit Professor Chan Heum Park's Team at Hallym University Chuncheon Sacred Heart Hospital Sends Their Self-Developed "BioCabinet" to Space Aboard Nuri Rocket AST SpaceMobile Expands Manufacturing Footprint in Both Texas and Florida, Accelerates Next-Generation BlueBird Production Intuitive Machines Expands Manufacturing Capabilities at Houston Spaceport Supporting Growing Space Infrastructure Programs Vast and the Colombian Space Agency Sign Memorandum of Understanding (MOU) to Advance Space Cooperation in Latin America Vast and the Maldives Space Research Organisation Sign Memorandum of Understanding to Engage Republic of Maldives Space Industry Spire Global's Hyperspectral Microwave Sounder Completes Environmental Testing BlackSky Quickly Delivers First Very High-Resolution Images from Third Gen-3 Satellite Less Than 24 Hours Following Launch Amentum Reports Strong Fourth Quarter and Fiscal Year 2025 Results Share your feedback. What do you think about T-Minus Space Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show. Want to hear your company in the show? You too can reach the most influential leaders and operators in the industry. Here's our media kit. Contact us at space@n2k.com to request more info. Want to join us for an interview? Please send your pitch to space-editor@n2k.com and include your name, affiliation, and topic proposal. T-Minus is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc. Learn more about your ad choices. Visit megaphone.fm/adchoices
Aon's Brent Rieth discusses the ripple effects of the Cyber Information Security Act (CISA) not being renewed, warning that insurers now face a major data gap in assessing … Read More » The post EP. 109: The Future of Cyber Risk Without CISA: How Insurers and Businesses Can Adapt appeared first on Insurance Journal TV.
Aon's Brent Rieth discusses the ripple effects of the Cyber Information Security Act (CISA) not being renewed, warning that insurers now face a major data gap in assessing … Read More » The post EP. 109: The Future of Cyber Risk Without CISA: How Insurers and Businesses Can Adapt appeared first on Insurance Journal TV.
Aon's Brent Rieth discusses the ripple effects of the Cyber Information Security Act (CISA) not being renewed, warning that insurers now face a major data gap in assessing … Read More » The post EP. 109: The Future of Cyber Risk Without CISA: How Insurers and Businesses Can Adapt appeared first on Insurance Journal TV.
The rise of artificial intelligence (AI) in cyber attacks is prompting small and medium-sized businesses (SMBs) to adopt managed detection and response (MDR) services and explore autonomous security operations centers (SOCs). Research from TechAisle indicates that awareness of MDR among SMBs increased from 39% in 2023 to 61% in 2025, with 89% of mid-market firms prioritizing cyber resilience. This shift is driven by the need for effective security operations that do not rely on in-house expertise, as AI-driven threats evolve faster than traditional defenses can respond.A report from UpGuard highlights the prevalence of shadow AI, revealing that 68% of security leaders use unauthorized AI tools, with 90% of them bypassing corporate governance. This disconnect between security protocols and employee behavior underscores the need for organizations to adapt their governance strategies. Additionally, a significant cyber attack attributed to a Chinese state-sponsored group demonstrated AI's capability to autonomously conduct reconnaissance and data exfiltration, marking a shift in threat actor tactics.Retail executives are increasingly concerned about their employees' ability to identify genuine cyber threats, with 44% reporting a rise in cyber attacks. Despite this awareness, only 25% feel prepared for AI-driven incidents. The report emphasizes the necessity for retailers to adopt a resilience-focused approach, including improved application security and identity controls, to mitigate risks associated with sophisticated cyber threats. This highlights a broader trend across industries where reliance on employee training alone is insufficient to combat evolving threats.For Managed Service Providers (MSPs), these developments present both challenges and opportunities. The increasing complexity of cyber threats necessitates a shift towards operational models that prioritize continuous verification and behavioral analysis over traditional detection methods. MSPs can leverage this moment to guide organizations in developing effective cybersecurity strategies that address the preparedness gap, ensuring that clients are equipped to handle the evolving landscape of AI-driven attacks. Four things to know today00:00 AI-Powered Attacks Accelerate as SMB Security Transitions Toward Autonomous SOC Models, Exposing a Governance Gap Around Shadow AI06:43 Retail Executives Report Rising AI-Driven Threats and Low Preparedness, Underscoring the Shift from User Training to Resilience08:50 Stealthier North Korean Campaigns and a Fragmented Ransomware Ecosystem Signal Rising Detection Challenges for MSPs11:49 Cork's New Vantage Platform Targets Unified MSP Risk Validation — But Its Visibility Metrics Demand Scrutiny This is the Business of Tech. Supported by: https://mailprotector.com/mspradio/
In this episode of the Cyber Uncut podcast, David Hollingworth catches up with Proofpoint's chief strategy officer, Ryan Kalember, and vice president of systems engineering for the APJ region, Adrian Covich, while attending the Proofpoint Protect Tour in Melbourne. The three talk about the high-level trends and concerns they're seeing from CISOs both in Australia and abroad and the very real challenges of dealing with a fast-paced and ever-evolving threat landscape. Enjoy the episode, The Cyber Uncut team
In this episode of The Digital Executive, host Brian Thomas welcomes Yakir Golan, CEO and Co-founder of Kovrr, a global leader in cyber and AI risk quantification. Drawing from his early career in Israeli intelligence and later roles in software, hardware, and product management, Yakir explains how his background shaped his holistic approach to understanding complex, interconnected risk systems.Yakir breaks down why quantifying AI and cyber risk—rather than relying on subjective, color-coded scoring—is becoming essential for enterprise leaders, boards, and regulators. He explains how Kovrr's new AI Risk Assessment and Quantification module helps organizations model real financial exposure, understand high-impact “tail risks,” and align security, GRC, and finance teams around a shared, objective language.Looking ahead, Yakir discusses how global regulation, including the EU AI Act, is accelerating the need for measurable, defensible risk management. He outlines a future where AI risk quantification becomes a board-level expectation and a foundation for resilient, responsible innovation. Through Kovrr's mission, Yakir aims to equip enterprises with the same level of intelligence-driven decision making once reserved for national security—now applied to the rapidly evolving digital risk landscape.If you liked what you heard today, please leave us a review - Apple or Spotify.See Privacy Policy at https://art19.com/privacy and California Privacy Notice at https://art19.com/privacy#do-not-sell-my-info.
In this episode of Compliance Unfiltered, The CU Guys dive into the challenges and strategies for retailers as they gear up for the holiday season. With cyber threats on the rise, particularly AI-driven attacks, the duo discusses the importance of proactive measures, employee training, and maintaining PCI compliance. They also explore the impact of seasonal hiring and the need for vigilance in protecting sensitive data. Tune in to learn how retailers can navigate the bustling holiday period while safeguarding their operations.
Cyberthreats are everywhere, and while they may be inevitable, their impact can be manageable. Institutions who are prepared for cybersecurity disruptions are proactive and collaborative about their response. This episode of the Forward Thinking Podcast features FCCS SVP of Marketing and Communications Stephanie Barton, Lisa Parrinello, FCCS VP of Risk Management & Insurance Services and Naomi Baumann, FCCS VP of Claims & Insurance Services. Together they discuss how Farm Credit's Captive Insurance Company is helping institutions strengthen their cyberdefenses and what boards of directors need to know to stay ahead of the cybersecurity game. Episode Insights Include: The bigger picture of cyberthreats Cyberthreats used to be considered an IT-only problem, but that isn't the case anymore. These enterprise-wide issues demand board-level attention. Ransomware, extortion, targeted financial systems and AI deep-fake impersonations are some of today's biggest cyberthreats. The goal today isn't just protection, it's resilience. A prepared institution can respond and recover from cyberthreats no matter where they hit. The role of Farm Credit's Captive Insurance Company As the captive, they provide institutions cyber insurance and management services that go beyond what commercial insurance markets can offer. They offer tailored protection designed specifically for the unique cooperative structure of Farm Credit. Collaborative claims management proactively responds to any incident or threat of incident. Their strategic access to commercial markets allows them to purchase insurance as well. Over the years, Captive has saved an average of $50 million in insurance coverage. Consistent system-wide learning whenever instances occur. Resilience tools and strategies Resilience requires a multi-layered approach based on assents and security needs. Threat detection and response pinpoint vulnerability, endpoint detection, and tabletop exercises. Human-centric risk management and ongoing employee training are critical for cyber risk management. Employees and people are always going to be the weakest link in cybersecurity. Data protection and resilience in communications in sensitive information need to be encrypted and backup tested. Cybersecurity is not an impenetrable armor, it is an anatomy with multiple systems working together to respond and continue operating in a culture of proactive risk management. The pivotal role of the board Directors need to prioritize an approved annual cyber risk manual. Ongoing development and maintenance of a robust program is essential. Boards should receive quarterly reports on threats, vulnerabilities and mitigation actions. Cyber oversight needs to be integrated into business technology planning. FCA should be notified within 36 hours of any cyber incident. The culture of cybersecurity Institutions build resilience when everyone is involved. Third party oversight and engagement with cyber-focused legal counsel is crucial. Most breeches don't happen in bad systems, they happen when good people let down their guard. Muscle memory kicks in when crisis hits, but only when preparation has occurred. Ultimately, cybersecurity is everyone's business. This podcast is powered by FCCS. Resources Connect with Lisa Parrinello — Lisa Parrinello Connect with Naomi Baumann — Naomi Baumann Get in touch info@fccsconsulting.com "The goal isn't just protection – it's resilience." — Naomi Baumann "The Captive provides consistent system-wide learning whenever instances occur." — Lisa Parrinello "Human-centric risk management and ongoing employee training are critical for cyber risk management." — Naomi Baumann "Employees and people are always going to be the weakest link in cybersecurity." — Naomi Baumann "Even without a deep technical knowledge, boards can strengthen resilience by asking the right questions and staying engaged." — Lisa Parrinello "Institutions build resilience when everyone is involved." — Naomi Baumann Resilience is just as much about people as it is about systems." — Naomi Baumann
In this episode of Cybersecurity Today, host David Shipley covers the latest threats in the cybersecurity landscape. Highlights include the emergence of the quantum root redirect (QRR) phishing kit, a sophisticated automated phishing platform targeting Microsoft 365 credentials across 90 countries. The hospitality industry is also being hit with a new 'click fix' phishing campaign, compromising booking systems and targeting hotel guests. Researchers discover new vulnerabilities in ChatGPT, exposing private data via indirect prompt injection attacks. Additionally, the University of Pennsylvania confirms a massive data breach, highlighting the risks of not implementing comprehensive MFA protocols. Stay informed with the latest cybersecurity news and insights to protect your organization. Cybersecurity Today would like to thank Meter for their support in bringing you this podcast. Meter delivers a complete networking stack, wired, wireless and cellular in one integrated solution that's built for performance and scale. You can find them at Meter.com/cst 00:00 Introduction and Sponsor Message 00:46 Quantum Root Redirect: A New Phishing Threat 03:47 Click Fix Phishing Attacks on Hotels 07:58 ChatGPT Vulnerabilities and AI Security Risks 11:37 University of Pennsylvania Data Breach 15:12 Conclusion and Call to Action
We speak with Deepen Desai, Chief Security Officer & Executive Vice President of Cyber & AI Engineering at Zscaler on the latest zero trust and AI innovations empowering organisations to secure their digital transformation journeys and stay ahead of evolving threats.With nearly two decades of expertise in cybersecurity, Deepen is regarded as a pioneer in advancing threat intelligence, secure product development, and enterprise protection. Beyond his scope of leading cyber and AI engineering, Deepen also oversees the ThreatLabz team, a world-class security research group focused on identifying emerging threats, analyzing vulnerabilities, and delivering actionable insights to protect organizations at Zscaler. Under his leadership, Zscaler's award-winning zero-trust architecture continues to evolve, providing businesses with robust defenses against sophisticated attack vectors like ransomware, phishing, and advanced malware.Before joining Zscaler, Deepen held key security leadership positions at Dell SonicWALL, where he helped develop cutting-edge security solutions and strategies for businesses navigating an increasingly complex threat landscape. His breadth of experience in fields like security operations, threat research, and compliance has established him as a respected authority in the industry.#ZL2025 #zerotrustsecurity #mysecuritytv #zscaler
The conversation explores how cybersecurity is integral to space operations, drawing parallels with traditional air defense strategies. Blount discusses the historical context of cybersecurity in space, the role of international law, and the challenges posed by non-state actors. He emphasizes the need for a holistic approach to cybersecurity that includes both space-based and terrestrial components, and the importance of international cooperation in addressing these challenges.Blount warns of the increasing threats from cyber-attacks on space assets and the need for robust legal frameworks to ensure accountability and security. He calls for the development of comprehensive cybersecurity strategies that integrate space and cyberspace, ensuring resilience against a wide range of threats.How can nations protect their space assets from cyber threats? What role does international law play in governing space cybersecurity? How should countries collaborate to enhance global space security?Episode ContributorsP. J. Blount is assistant professor of space law at Durham University. He is also a visiting scholar at Mae Fah Luang University in Chiang Rai, Thailand. Previously, he served as a Lecturer in Law at Cardiff University, an adjunct professor for the LL.M. in the Air and Space Law at the University of Mississippi School of Law, a Postdoctoral Researcher at the University of Luxembourg, an adjunct professor at Montclair State University, and a Visiting Scholar at the Beijing Institute of Technology School of Law. Tejas Bharadwaj is a senior research analyst with the Technology and Society Program at Carnegie India. He focuses on space law and policies and also works on areas related to AI in military domain, Defence tech and Cybersecurity. Every two weeks, Interpreting India brings you diverse voices from India and around the world to explore the critical questions shaping the nation's future. We delve into how technology, the economy, and foreign policy intertwine to influence India's relationship with the global stage.As a Carnegie India production, hosted by Carnegie scholars, Interpreting India, a Carnegie India production, provides insightful perspectives and cutting-edge by tackling the defining questions that chart India's course through the next decade.Stay tuned for thought-provoking discussions, expert insights, and a deeper understanding of India's place in the world.Don't forget to subscribe, share, and leave a review to join the conversation and be part of Interpreting India's journey.
The Cyber Security and infrastructure security agency has been sounding the alarm about cyber threats to us critical infrastructure like power and water systems. CISA officials are particularly concerned about hackers targeting so called operational technology or OT systems. Targeting of those systems could pose major health and safety risks. For more on what the agency is doing to combat those threats. Federal News Network's Justin Doubleday spoke with the OT cyber lead at CISA, Matt Rogers.See Privacy Policy at https://art19.com/privacy and California Privacy Notice at https://art19.com/privacy#do-not-sell-my-info.
Today, we've got Amadou Kane of VicOne live from Austin, TX, at the NMFTA Cybersecurity Conference to talk about the real risks facing transportation, from hackers targeting ELDs and Class 8 trucks to supply chain vulnerabilities that could disrupt the entire freight network! We dive into how attackers manipulate GPS data, hijack vehicle controls, and even exploit EV chargers to threaten infrastructure, how fleets can fight back with onboard intrusion detection systems, real-time monitoring, and tighter OEM and supplier vetting through Software Bills of Materials (SBOMs), why vehicle security isn't just IT security, how cost-cutting at the OEM level creates risk, and what proactive measures the industry must take to protect drivers, assets, and national security! About Amadou Kane Amadou Kane is a Sr. Solution Engineer and the North America Technical Lead at VicOne. With extensive experience in the automotive industry, previously spearheaded Wistron NeWeb's V2X programs in North America and served as the Automotive Business Development Manager, specializing in connectivity and ADAS. Amadou brings a wealth of expertise in developing innovative solutions to address the evolving challenges in automotive technology. He holds a Bachelor of Electrical Engineering and a Master's of Electrical and Computer Engineering, as well as an MBA from the University of Detroit Mercy. Connect with Amadou Website: https://vicone.com/ LinkedIn: https://www.linkedin.com/in/amadoukn/
In this episode of Cybersecurity Today, host Jim Love sits down with Graham Barrie a CISO and white hat hacker, to discuss the critical importance of cybersecurity for small and medium-sized businesses. From the moment Berry fell in love with technology through a Tandy TRS 80 to his current role helping businesses secure their data, this conversation covers the evolution of cybersecurity. They delve into how Berry assists businesses in understanding cybersecurity risks, communicating effectively with clients, and preparing for and recovering from cyber incidents. This episode is packed with insightful stories, practical advice, and a deep dive into the realities of cybersecurity for businesses of all sizes. 00:00 The Urgency of Cybersecurity 00:33 Introduction to the Podcast 01:00 Meet Graham Berry: A White Hat Hacker 01:31 Graham's Journey into Technology 04:04 From Technology to Cybersecurity 05:49 The Reality of Cyber Threats for Small Businesses 10:44 The Importance of Cyber Insurance 14:23 Engaging with Clients on Cybersecurity 17:08 Turning Around a Reluctant Client 20:10 The Growing Demand for Cyber Coverage 22:12 Third Party Risk Management 22:50 Effective Tabletop Exercises 23:58 Engaging Executives in Cybersecurity 26:43 Importance of Cyber Insurance 28:33 Successful Recovery Stories 34:16 Challenges with AI in Security 38:57 Looking Forward in Security 40:21 Conclusion and Farewell
How secure is your trucking operation against cyberattacks? Are you confident your team could spot a phishing email or fake shipper domain before it costs you thousands? Today, listen to cybersecurity expert Melanie Padron speaking about the growing threat landscape in transportation! We discuss why small and mid-sized carriers are prime targets, often hit hardest because they lack dedicated security resources, how AI-powered tools are helping companies stay ahead of evolving cyber risks, and practical solutions: employee training, incident response plans, vendor vetting, and partnering with cybersecurity professionals who understand trucking operations. The key message? “Trust but verify.” As National Cybersecurity Awareness Month reminds us, education and consistency are your best defense. Whether you run one truck or a 500-unit fleet, acquire strategies from this episode to secure your business and protect the future of the industry. About Melanie Padron Melanie Padron is a risk management expert and cybersecurity speaker who has made it her mission to protect trucking companies from cyber threats. She's been right there in the trenches when ransomware attacks hit, helping pick up the pieces after systems are encrypted and ransom demands arrive. After spending over 20 years in the insurance industry helping businesses recover from disasters, Melanie has shifted her focus to something she's even more passionate about: stopping those disasters from happening in the first place through proactive cybersecurity. Her connection to trucking is personal. Growing up working in her family's convenience stores, she watched the steady stream of trucks that kept their gas tanks filled and shelves stocked. Her uncle and aunt were owner-operators who crossed the country delivering freight, giving her firsthand insight into the dedication and sacrifice required to build a trucking business. Working with veteran-owned IT Architeks, Melanie helps trucking leaders secure their fleets and leverage AI to become more efficient and profitable. Her approach is simple: when trucking companies truly understand their risk, real protection begins. One company at a time, she's working to build cyber resilience in the trucking industry. Connect with Melanie Website: https://www.itarchiteks.com/ LinkedIn: https://www.linkedin.com/in/melanie-padron/
____________Podcast Redefining Society and Technology Podcast With Marco Ciappellihttps://redefiningsocietyandtechnologypodcast.com ____________Host Marco CiappelliCo-Founder & CMO @ITSPmagazine | Master Degree in Political Science - Sociology of Communication l Branding & Marketing Advisor | Journalist | Writer | Podcast Host | #Technology #Cybersecurity #Society
Water systems—once considered too small or obscure to be hacked—are now squarely in the crosshairs of cyber actors. In recent months, Bluefield Research has tracked a surge of cyber activity targeting water and wastewater utilities around the world, from the U.S. Cybersecurity and Infrastructure Security Agency's (CISA) release of 32 new control system advisories to Poland's launch of a national cybersecurity framework for water utilities. In this episode of The Future of Water, Bluefield's Barcelona-based Maria Cardenal and Boston-based Leigh Ramsey join host Reese Tisdale to unpack one of the most pressing—and overlooked—threats facing the water sector: cybersecurity. Our water experts explore where these threats are emerging, how utilities are responding, and what the next phase of digital resilience looks like. Key discussion points include: What's really at stake when critical infrastructure is under attack The biggest vulnerabilities in today's water systems—from legacy hardware to weak IT–OT segmentation Real-world examples from the U.S., Norway, and Poland that show how cyberattacks on operational assets are evolving How governments are responding—including Poland's US$1.1 billion cybersecurity initiative for water and wastewater systems How smaller utilities are managing cybersecurity with limited resources The role of new regulations—from the EU's NIS2 Directive to state-level initiatives in the U.S. Why cybersecurity must become part of asset management and workforce training, not an afterthought If you enjoy listening to The Future of Water Podcast, please tell a friend or colleague, and if you haven't already, please click to follow this podcast wherever you listen. If you'd like to be informed of water market news, trends, perspectives and analysis from Bluefield Research, subscribe to Waterline, our weekly newsletter published each Wednesday. Related Research & Analysis: Poland Strengthens Cybersecurity in the Water Sector Cybersecurity Alerts Highlight Water HMI Vulnerabilities
Today on the Social-Engineer Podcast: The Security Awareness Series, Chris is joined by Carter Zupancich. Chris and Carter explore the evolving landscape of social engineering threats, focusing on the rise of vishing attacks and the role of AI in enhancing these tactics. Their discussion underscores the importance of empowering employees as a human firewall and the need for continuous education and testing to strengthen organizational security. [Oct 20, 2025] 00:00 - Intro 00:31 - Carter Zupancich Intro - Website: https://carterzupancich.com/ 01:30 - Intro Links: - Social-Engineer.com - http://www.social-engineer.com/ - Managed Voice Phishing - https://www.social-engineer.com/services/vishing-service/ - Managed Email Phishing - https://www.social-engineer.com/services/se-phishing-service/ - Adversarial Simulations - https://www.social-engineer.com/services/social-engineering-penetration-test/ - Social-Engineer channel on SLACK - https://social-engineering-hq.slack.com/ssb - CLUTCH - http://www.pro-rock.com/ - innocentlivesfoundation.org - http://www.innocentlivesfoundation.org/ 03:35 - Tools, Tactics and Procedures 05:19 - Tech Advances 08:16 - The Classics 10:01 - The Need for Testing 12:16 - Callback Phishing 17:26 - Setting Expectations 21:56 - Approved Language 23:56 - Verify! 25:16 - Empowerment 26:17 - And Now a Horrible Story 28:47 - Investing In Employees 31:19 - Wrap Up & Outro - www.social-engineer.com - www.innocentlivesfoundation.org
In the fourth instalment in our Expert Insights series on cyber threats and security for 2025, we are joined once again by Edward Millington, of CariSec Global, which is headquartered in Barbados. In this conversation, Edward discusses, among other things: * current trends in cybersecurity; * whether there are well-defined paths to pursue specific cybersecurity-related disciplines or specialities; * availability of suitable talent in the security job market; and * tactics Caribbean countries should be employing to be more prepared and resilient to cyber threats. The episode, show notes and links to some of the things mentioned during the episode can be found on the ICT Pulse Podcast Page (www.ict-pulse.com/category/podcast/) Enjoyed the episode? Do rate the show and leave us a review! Also, connect with us on: Facebook – https://www.facebook.com/ICTPulse/ Instagram – https://www.instagram.com/ictpulse/ Twitter – https://twitter.com/ICTPulse LinkedIn – https://www.linkedin.com/company/3745954/admin/ Join our mailing list: http://eepurl.com/qnUtj Music credit: The Last Word (Oui Ma Chérie), by Andy Narrell Podcast editing support: Mayra Bonilla Lopez ---------------
How is the transition to passkeys going in 2025?
The Export-Import Bank of the United States (EXIM) facilitates trades of exports of goods and services and, in doing so, deals with massive troves of data. From the Billington Cybersecurity Summit, EXIM CISO, Chief Privacy Officer, and Deputy Chief AI Officer Darren Death tells CyberCast that his agency is centralizing data about user access and behavior to detect potential cyber threats. Death says that balancing cybersecurity with privacy remains a challenge, especially in complex IT ecosystems involving financial institutions. He stresses the need to “shift left” by embedding privacy and security requirements early in the development lifecycle and include business leaders in conversations about cybersecurity, privacy and usability. He also says that the EXIM is using generative AI to simulate incident response scenarios, escalating threats to test team readiness. Death adds that EXIM is positioning AI as a force multiplier rather than a job threat.
In this episode of Cybersecurity Today, host David Shipley discusses several major events, including the FBI's takedown of the Breach Forums portal. This site was associated with a significant Salesforce data breach and extortion campaign led by groups like Shiny Hunters and Scattered Lapses Hunters. Oracle users are also warned about a new critical vulnerability in the E-Business Suite, which could allow unauthorized data access without requiring login credentials. Additionally, the resurgence of the Asuru botnet, leveraging compromised IoT devices to execute large-scale DDoS attacks, raises concerns. The episode emphasizes the need for immediate patching and robust security measures by organizations and consumers alike. A positive note highlights a cybersecurity awareness initiative by the Indiana Toll Road. 00:00 FBI Takes Down Breach Forums 03:42 Oracle E-Business Suite Vulnerability 07:39 Massive Botnet Threatening US Networks 11:04 Community Cybersecurity Awareness 11:47 Conclusion and Sign-Off
Manufacturers are operating in a world where insurance markets are anything but stable, and the stakes have never been higher. In this episode, Risk Management Consultant Katie Hensley joins host Leisa Fox to demystify the shifting Property & Casualty landscape. From the shrinking property market to nuclear liability verdicts, Katie explains how manufacturers can adapt, update valuations, manage open recommendations, and strengthen communication to protect themselves against emerging risks. The conversation ranges from property, business interruption, and E&O, to workers' compensation, fleet, cyber, and management liability. Katie emphasizes proactive risk management, smarter use of data, and a team-based approach to claims and compliance. Whether you're a business owner, risk manager, or operations leader, you'll leave this episode with actionable insights to help your company weather today's insurance challenges while positioning for tomorrow's opportunities. Find this show on your favorite app: https://iowapodcast.com/katie-hensley
In this episode of 'Cybersecurity Today: Our Month in Review,' host Jim welcomes a panel including Tammy Harper from Flair, Laura Payne from White Tuque, and David Shipley, CEO of Beauceron Securities. The discussion kicks off with an overview of their plans for Cybersecurity Month, including reviving the MapleSEC show and the CIO of the Year awards. David shares his experiences at SECTOR, Canada's largest cybersecurity conference, discussing the importance of security awareness training and the risks of irresponsible tech journalism on public perception. The panel also delves into the resurgence of the Clop ransomware group, their shift to data extortion, and their exploitation of vulnerabilities in Oracle EBS applications. Laura highlights a concerning case of insider threats at RBC, emphasizing the importance of process-driven controls. The episode also touches on the human side of cybersecurity, particularly the impact of romance scams and the growing violence in cybercrime. The panelists underscore the need for improved security awareness and the role of AI in identifying scams. Tammy, Laura, and David conclude by discussing the role of insider threats and the ethical boundaries in cybercrime, sharing insights from recent real-world cases. 00:00 Introduction and Panelist Introductions 00:43 Cybersecurity Month Initiatives 02:46 Security Awareness and Phishing Training 04:03 Impact of Irresponsible Tech Journalism 08:27 AI and Cybersecurity: Hype vs. Reality 10:43 Conference Experiences and Networking 18:33 Clop Ransomware and Data Extortion 23:45 Tammy's Insights on Clop's Tactics 24:58 Scattered Lasus and Cyber Warfare 26:32 Media Savvy Cybercriminals 31:36 Human Impact of Cyber Scams 37:17 Insider Threats and Security Awareness 43:21 Physical Security and Cyber Threats 48:33 Cybercrime Targeting Children 50:58 Conclusion and Upcoming Topics
Small businesses have become the number one target for cyber attacks, yet most entrepreneurs don't realize how vulnerable they are until it's too late. One attack could wipe out years of growth and instantly damage customer trust. In this episode, presented by Bitdefender, Ramon explains why cybersecurity is essential for small business owners and how they can protect their business from today's digital threats without hiring an IT team or becoming a tech expert. In this episode, Hala and Ramon will discuss: (00:00) Introduction (03:03) Entrepreneurship Lessons and Personal Branding (06:09) Public Speaking Strategies to Build Influence (09:51) Why Small Businesses are at Risk of Cyber Threats (12:21) Common Cyber Attacks and How to Prevent Them (18:37) Cyber Attack Scenarios and What to Do (28:49) How Creator Entrepreneurs Build Audience Trust (33:15) How Entrepreneurs Profit by Embracing Failure Ramon Ray is a serial entrepreneur, bestselling author, keynote speaker, and small business expert. He is the publisher of ZoneofGenius.com and has spoken to global audiences on major stages, including SXSW, VeeCon, and the Aspire Tour. As Bitdefender's Small Business Ambassador, Ramon helps entrepreneurs protect their businesses against cybersecurity threats. Sponsored By: Bitdefender Ultimate Small Business Security: Save 30% when you go to bitdefender.com/profiting Resources Mentioned: Ramon's Book, The Celebrity CEO: bit.ly/CelebCEO Ramon's Website: zoneofgenius.com Active Deals - youngandprofiting.com/deals Key YAP Links Reviews - ratethispodcast.com/yap YouTube - youtube.com/c/YoungandProfiting LinkedIn - linkedin.com/in/htaha Instagram - instagram.com/yapwithhala Social + Podcast Services: yapmedia.com Transcripts - youngandprofiting.com/episodes-new Disclaimer: This episode is a paid partnership with Bitdefender. Sponsored content helps support our podcast and continue bringing valuable insights to our audience. Entrepreneurship, Entrepreneurship Podcast, Business, Business Podcast, Self Improvement, Self-Improvement, Personal Development, Starting a Business, Strategy, Investing, Sales, Selling, Psychology, Productivity, Entrepreneurs, AI, Artificial Intelligence, Technology, Marketing, Negotiation, Money, Finance, Side Hustle, Startup, Mental Health, Career, Leadership, Mindset, Health, Growth Mindset, Passive Income, Online Business, Solopreneur, Founder, Networking
Send us a textIn this episode of Joey Pinz Discipline Conversations, Joey sits down with Scott Fuhriman, cybersecurity veteran and leader at Inveri, live from the MSP Summit in Orlando.Scott shares his 25+ years of cybersecurity experience, explaining how Inveri's runtime integrity technology, born from NSA research, helps MSPs and MSSPs detect hidden in-memory attacks, rootkits, and advanced threats that traditional tools miss. He highlights why protecting this overlooked layer is crucial to preserving revenue, preventing churn, and maintaining customer trust.The conversation also touches on Scott's personal discipline journey — from starting as a young PC tech overwhelmed by information to building a career through self-study, mentorship, and consistency. He and Joey discuss how MSPs can choose the right vendors, strengthen their security stacks, and enable long-term resilience in a competitive market.
Show Featured Sponsor: Precision Holsters:These guys have a lifetime, no questioned asked 100% guarantee. They are makers of high-quality holsters, belts, and magazine pouches. Visit them at: Precision Holsters and use code “seekAWS” for a discount. In this episode of the American Warrior Show, Rich Brown is joined by Andrew Frisbie (Practical Cyber Defense) to dig into the threats America faces in cyberspace—and how we must respond.
Cybersecurity has been on the Government Accountability Office's (GAO) high-risk list since 1997. Federal agencies struggle with issues like cyber hygiene, cyber workforce shortages and strategic execution. While agencies put strategies in place to secure their systems, the implementation and execution can be ineffective, according to GAO Managing Director of IT and Cybersecurity Nick Marinos. Marinos says that evolving threats have reshaped the cybersecurity landscape over the years in government, making evolution a moving target. Agencies are adjusting their workforces accordingly, he says, but is is difficult to keep pace with emerging technology. He underscores the urgency of streamlining federal hiring processes to prevent losing top talent to faster-moving private sector opportunities.
Alexander Schlager, CEO of Aiceberg.ai, discusses the intersection of artificial intelligence (AI) and cybersecurity, emphasizing the importance of securing AI-powered workflows. Aiceberg employs traditional machine learning techniques to safeguard generative AI systems, providing a deterministic and explainable approach to security. This method allows organizations to understand how their AI systems operate and ensures that they can trace and audit the decisions made by these systems, which is crucial in an era where AI incidents may lead to legal challenges.The conversation highlights the need for organizations to establish robust governance frameworks as they adopt AI technologies. Schlager points out that many businesses are still grappling with basic cybersecurity measures, which complicates their ability to implement effective AI governance. He stresses that organizations must assess their existing security postures and ensure that they are prepared for the rapid deployment of agentic AI, which allows non-technical users to create and manage AI workflows independently.Schlager provides concrete examples of how Aiceberg's technology is integrated into real-world applications, such as in the banking sector, where AI workflows may involve third-party interactions. He explains that Aiceberg monitors these interactions to classify and respond to potential security threats, ensuring that organizations can demonstrate compliance and safety in the event of an incident. This proactive approach to security is essential for maintaining trust and accountability in AI systems.Finally, the discussion touches on the broader implications of AI adoption, including the potential for improved customer experiences across various industries. Schlager notes that while AI can enhance service delivery, organizations must navigate the challenges of user expectations and the maturity of their AI implementations. By focusing on customer service and experience, companies can unlock significant value from their AI investments, but they must also prioritize security and governance to mitigate risks. All our Sponsors: https://businessof.tech/sponsors/ Do you want the show on your podcast app or the written versions of the stories? Subscribe to the Business of Tech: https://www.businessof.tech/subscribe/Looking for a link from the stories? The entire script of the show, with links to articles, are posted in each story on https://www.businessof.tech/ Support the show on Patreon: https://patreon.com/mspradio/ Want to be a guest on Business of Tech: Daily 10-Minute IT Services Insights? Send Dave Sobel a message on PodMatch, here: https://www.podmatch.com/hostdetailpreview/businessoftech Want our stuff? Cool Merch? Wear “Why Do We Care?” - Visit https://mspradio.myspreadshop.com Follow us on:LinkedIn: https://www.linkedin.com/company/28908079/YouTube: https://youtube.com/mspradio/Facebook: https://www.facebook.com/mspradionews/Instagram: https://www.instagram.com/mspradio/TikTok: https://www.tiktok.com/@businessoftechBluesky: https://bsky.app/profile/businessof.tech Hosted by Simplecast, an AdsWizz company. See pcm.adswizz.com for information about our collection and use of personal data for advertising.
➡ Stay Ahead of Cyber Threats with AI-Driven Vulnerability Management with Maze:https://mazehq.com/ In this conversation, I speak with Harry about how AI is transforming vulnerability management and application security. We explore how modern approaches can move beyond endless reports and generic fixes, toward real context-aware workflows that actually empower developers and security teams. We talk about: The Real Problem in Vulnerability ManagementWhy remediation—not just prioritization—remains the toughest challenge, and how AI can help bridge the gap between vulnerabilities and the developers who need to fix them. Context, Ownership, and VelocityHow linking vulnerabilities to the right applications and teams inside their daily tools (like GitHub) reduces friction, speeds up patching, and improves security without slowing developers down. AI Agents and the Future of SecurityWhy we should think of AI agents as “extra eyes and hands,” and how they’re reshaping everything from threat detection to system design, phishing campaigns, and organizational defense models. Attackers Move FirstHow attackers are already building unified world models of their targets using AI, and why defenders need to match (or exceed) this intelligence to stay ahead. From Days to MinutesWhy the tolerance for vulnerability windows is shrinking fast, and how automation and AI are pushing us toward a future where hours—or even minutes—make the difference. Subscribe to the newsletter at:https://danielmiessler.com/subscribe Join the UL community at:https://danielmiessler.com/upgrade Follow on X:https://x.com/danielmiessler Follow on LinkedIn:https://www.linkedin.com/in/danielmiessler Chapters: 00:00 – Welcome and Harry’s Background01:07 – The Real Problem: Remediation vs. Prioritization04:31 – Breaking Down Vulnerability Context and Threat Intel05:46 – Connecting Vulnerabilities to Developers and Workflows08:01 – Why Traditional Vulnerability Management Fails10:29 – Startup Lessons and The State of AI Agents13:26 – DARPA’s AI Cybersecurity Competition14:29 – System Design: Deterministic Code vs. AI16:05 – How the Product Works and Data Sources18:01 – AI as “Extra Eyes and Hands” in Security20:20 – Breaking Barriers: Rethinking Scale with AI23:22 – Building World Models for Defense (and Attack)25:22 – Attackers Move Faster: Why Context Matters27:04 – Phishing at Scale with AI Agents31:24 – Shrinking Windows of Vulnerability: From Days to Minutes32:47 – What’s Next for Harry’s Work34:13 – Closing ThoughtsBecome a Member: https://danielmiessler.com/upgradeSee omnystudio.com/listener for privacy information.
- Anniversary of Japanese Surrender and U.S. Occupation (0:10) - Trump's Tariffs and the International Emergency Economic Powers Act (2:34) - Impact of Trump's Tariffs on U.S. Allies and Global Relations (9:21) - Challenges of Shifting Manufacturing to the U.S. (10:02) - AI and Knowledge Mining (14:07) - Trump's Criticism of Operation Warp Speed and Vaccines (24:27) - The Future of Medicine and AI (30:09) - Economic and Political Implications of Trump's Policies (48:20) - Interview with Don Brown on Power Grid Security (48:40) - Strategies for Securing the Power Grid (1:16:29) - Challenges of Depending on Foreign Manufacturers (1:19:14) - Rising Domestic Tensions and Power Grid Vulnerabilities (1:23:35) - Legislation and Cyber Threats (1:30:16) - Protecting Against EMP and Solar Threats (1:32:37) - Preparedness and Personal Responsibility (1:37:42) - Final Thoughts and Recommendations (1:41:12) For more updates, visit: http://www.brighteon.com/channel/hrreport NaturalNews videos would not be possible without you, as always we remain passionately dedicated to our mission of educating people all over the world on the subject of natural healing remedies and personal liberty (food freedom, medical freedom, the freedom of speech, etc.). Together, we're helping create a better world, with more honest food labeling, reduced chemical contamination, the avoidance of toxic heavy metals and vastly increased scientific transparency. ▶️ Every dollar you spend at the Health Ranger Store goes toward helping us achieve important science and content goals for humanity: https://www.healthrangerstore.com/ ▶️ Sign Up For Our Newsletter: https://www.naturalnews.com/Readerregistration.html ▶️ Brighteon: https://www.brighteon.com/channels/hrreport ▶️ Join Our Social Network: https://brighteon.social/@HealthRanger ▶️ Check In Stock Products at: https://PrepWithMike.com