POPULARITY
Categories
From the archives: Host Talmage Boston interviews Malcolm Gladwell, author of seven New York Times bestsellers, about his book Revenge of the Tipping Point: Overstories, Superspreaders, and the Rise of Social Engineering. (Recorded December 2024 in Dallas.) Learn more about your ad choices. Visit podcastchoices.com/adchoices
Today on the Social-Engineer Podcast: The Security Awareness Series, Chris is joined by Carter Zupancich. Chris and Carter explore the evolving landscape of social engineering threats, focusing on the rise of vishing attacks and the role of AI in enhancing these tactics. Their discussion underscores the importance of empowering employees as a human firewall and the need for continuous education and testing to strengthen organizational security. [Oct 20, 2025] 00:00 - Intro 00:31 - Carter Zupancich Intro - Website: https://carterzupancich.com/ 01:30 - Intro Links: - Social-Engineer.com - http://www.social-engineer.com/ - Managed Voice Phishing - https://www.social-engineer.com/services/vishing-service/ - Managed Email Phishing - https://www.social-engineer.com/services/se-phishing-service/ - Adversarial Simulations - https://www.social-engineer.com/services/social-engineering-penetration-test/ - Social-Engineer channel on SLACK - https://social-engineering-hq.slack.com/ssb - CLUTCH - http://www.pro-rock.com/ - innocentlivesfoundation.org - http://www.innocentlivesfoundation.org/ 03:35 - Tools, Tactics and Procedures 05:19 - Tech Advances 08:16 - The Classics 10:01 - The Need for Testing 12:16 - Callback Phishing 17:26 - Setting Expectations 21:56 - Approved Language 23:56 - Verify! 25:16 - Empowerment 26:17 - And Now a Horrible Story 28:47 - Investing In Employees 31:19 - Wrap Up & Outro - www.social-engineer.com - www.innocentlivesfoundation.org
Is there anything real left on the internet? Neil deGrasse Tyson and co-hosts Chuck Nice and Gary O'Reilly explore deepfakes, scams, and cybercrime with the Director of Threat Research at Bitdefender, Bogdan Botezatu. Scams are a trillion-dollar industry; keep your loved ones safe with Bitdefender: https://bitdefend.me/90-StarTalkNOTE: StarTalk+ Patrons can listen to this entire episode commercial-free here: https://startalkmedia.com/show/deepfakes-and-the-war-on-truth-with-bogdan-botezatu/Thanks to our Patrons Bubbalotski, Oskar Yazan Mellemsether, Craig A, Andrew, Liagadd, William ROberts, Pratiksha, Corey Williams, Keith, anirao, matthew, Cody T, Janna Ladd, Jen Richardson, Elizaveta Nikitenko, James Quagliariello, LA Stritt, Rocco Ciccolini, Kyle Jones, Jeremy Jones, Micheal Fiebelkorn, Erik the Nerd, Debbie Gloom, Adam Tobias Lofton, Chad Stewart, Christy Bradford, David Jirel, e4e5Nf3, John Rost, cluckaizo, Diane Féve, Conny Vigström, Julian Farr, karl Lebeau, AnnElizabeth, p johnson, Jarvis, Charles Bouril, Kevin Salam, Alex Rzem, Joseph Strolin, Madelaine Bertelsen, noel jimenez, Arham Jain, Tim Manzer, Alex, Ray Weikal, Kevin O'Reilly, Mila Love, Mert Durak, Scrubbing Bubblez, Lili Rose, Ram Zaidenvorm, Sammy Aleksov, Carter Lampe, Tom Andrusyna, Raghvendra Singh Bais, ramenbrownie, cap kay, B Rhodes, Chrissi Vergoglini, Micheal Reilly, Mone, Brendan D., Mung, J Ram, Katie Holliday, Nico R, Riven, lanagoeh, Shashank, Bradley Andrews, Jeff Raimer, Angel velez, Sara, Timothy Criss, Katy Boyer, Jesse Hausner, Blue Cardinal, Benjamin Kedwards, Dave, Wen Wei LOKE, Micheal Sacher, Lucas, Ken Kuipers, Alex Marks, Amanda Morrison, Gary Ritter Jr, Bushmaster, thomas hennigan, Erin Flynn, Chad F, fro drick, Ben Speire, Sanjiv VIJ, Sam B, BriarPatch, and Mario Boutet for supporting us this week. Subscribe to SiriusXM Podcasts+ to listen to new episodes of StarTalk Radio ad-free and a whole week early.Start a free trial now on Apple Podcasts or by visiting siriusxm.com/podcastsplus. Hosted by Simplecast, an AdsWizz company. See pcm.adswizz.com for information about our collection and use of personal data for advertising.
My guest today is Dan Wang. Dan is a technology analyst and author who spent six years living in China studying its manufacturing ecosystem and tech development, best known for his new book Breakneck. Dan offers the most nuanced framework I've encountered for understanding US-China competition. We explore a critical asymmetry: it's far harder for the US to rebuild manufacturing capacity than for China to improve scientific research, with profound implications for AI, national security, and investment returns. For investors, Dan explains the "ByteDance problem"—why exceptional Chinese companies trade at massive discounts due to Communist Party unpredictability and geopolitical risks. He argues China is a "high agency" society that executes relentlessly while America deliberates endlessly, yet also reveals the societal cost. We discuss innovation, state capacity, and investing across both superpowers. Please enjoy my conversation with Dan Wang. For the full show notes, transcript, and links to mentioned content, check out the episode page here. ----- This episode is brought to you by Ramp. Ramp's mission is to help companies manage their spend in a way that reduces expenses and frees up time for teams to work on more valuable projects. Go to Ramp.com/invest to sign up for free and get a $250 welcome bonus. – This episode is brought to you by Ridgeline. Ridgeline has built a complete, real-time, modern operating system for investment managers. It handles trading, portfolio management, compliance, customer reporting, and much more through an all-in-one real-time cloud platform. Head to ridgelineapps.com to learn more about the platform. – This episode is brought to you by AlphaSense. AlphaSense has completely transformed the research process with cutting-edge AI technology and a vast collection of top-tier, reliable business content. Invest Like the Best listeners can get a free trial now at Alpha-Sense.com/Invest and experience firsthand how AlphaSense and Tegus help you make smarter decisions faster. ----- Editing and post-production work for this episode was provided by The Podcast Consultant (https://thepodcastconsultant.com). Show Notes: (00:00:00) Welcome to Invest Like the Best (00:05:55) China's Engineering State and Social Engineering (00:12:15) US-China Competition: Innovation and Manufacturing (00:19:41) The Future of US and China: Technological and Economic Perspectives (00:25:22) Cultural and Work Ethic Comparisons (00:39:09) Investing in China: Opportunities and Risks (00:44:43) Future Equilibrium States Between US and China (00:48:32) China's High Agency and Infrastructure (00:49:58) Lawyerly Tendencies in US Society (00:53:41) Comparing US and Chinese Societal Structures (00:57:59) China's Historical Lessons and Future Prospects (01:10:39) AI and Technological Competition (01:15:30) Vertical Integration in Chinese Companies (01:26:39) The Kindest Thing
Fraudsters have evolved again – this time with check fraud because they have found a way to bypass payee positive pay. So now what? Keep listening. Check out my website www.debrarrichardson.com if you need help implementing authentication techniques, internal controls, and best practices to prevent fraudulent payments, regulatory fines or bad vendor data. Check out the Vendor Process Training Center for 116+ hours of weekly live and on-demand training for the Vendor team. Links mentioned in the podcast + other helpful resources: Federal Reserve Board: How Criminals Commit Check Fraud Using Stolen Business Identities Training: Validations to Prevent Check Payment Fraud - Your Accounts System/ERP, The Bank and Your Vendor Team Get the Vendor Callback Confirmation Toolkit(TM) Today: https://training.debrarrichardson.com/course/callback-confirmation-toolkitCustomized Vendor Validations Session: https://debrarrichardson.com/vendor-validation-sessionFree Download: Vendor Validation Reference List with Resource Links https://debrarrichardson.com/vendor-validation-downloadVendor Process Training Center - https://training.debrarrichardson.comCustomized Fraud Training: https://training.debrarrichardson.com/customized-fraud-training Free Live and On-Demand Webinars: https://training.debrarrichardson.com/webinarsVendor Master File Clean-Up: https://www.debrarrichardson.com/cleanupYouTube Channel: https://www.youtube.com/channel/UCqeoffeQu3pSXMV8fUIGNiw More Podcasts/Blogs/Webinars www.debrarrichardson.comMore ideas? Email me at debra@debrarrichardson.com Music Credit: www.purple-planet.com
Mary welcomes first time guest to the podcast Pastor/Dr. Richard Schmidt to discuss current events. Richard has been an avid student of the Word of God for over 45 years. After giving his life to Christ during a Chicago revival meeting, he immediately immersed himself into evangelism and the study of Scripture, graduating with both a B.S. and M.A. in Pastoral Theology/Christian Education. Early in his ministry, Rich traveled with Evangelist Joe Boyd and preached in various churches and venues, including Chicago's Pacific Garden Mission. Upon college graduation and ordination, Rich and his wife, Valori, moved to Milwaukee, WI to church plant. After the church plant was successfully merged with another, Rich joined the Milwaukee County Sheriff's Office to support his young family, while simultaneously serving as an Assistant Pastor. He is currently the pastor of Union Grove Baptist Church just south of Milwaukee and an in-demand speaker. Today we chat about the rampant lawlessness in our nation and how we got here politically and prophetically. We also look at the current peace initiative in Israel, and what are we to expect when there's a victory lap going on, but we all know that Israel's enemies haven't truly had a change of heart. We talk about AI, and its troubling encroachment into Europe. China we expect to be a police state, but why are other nations looking so similar? A full hour with a very sharp brother in Christ. Stand Up For The Truth Videos: https://rumble.com/user/CTRNOnline & https://www.youtube.com/channel/UCgQQSvKiMcglId7oGc5c46A
Today we are joined by Jay Izso. Jay is a high-energy mindset and resilience coach, keynote speaker, bestselling author, and media personality. Known as “Coach Jay,” he helps people shift their thinking, master their mindset, and unlock their potential in business and life. Drawing on his background in psychology and years of coaching leaders, entrepreneurs, and athletes, Jay blends humor, science, and real-world stories that resonate with audiences everywhere. As the host of A New Direction and Real Estate Right Now, he's built a reputation for engaging conversations that inspire action, growth, and results. [Oct 13, 2025] 00:00 - Intro 00:53 - Intro Links - Social-Engineer.com - http://www.social-engineer.com/ - Managed Voice Phishing - https://www.social-engineer.com/services/vishing-service/ - Managed Email Phishing - https://www.social-engineer.com/services/se-phishing-service/ - Adversarial Simulations - https://www.social-engineer.com/services/social-engineering-penetration-test/ - Social-Engineer channel on SLACK - https://social-engineering-hq.slack.com/ssb - CLUTCH - http://www.pro-rock.com/ - innocentlivesfoundation.org - http://www.innocentlivesfoundation.org/ 01:58 - Jay Izso Intro 02:48 - Lessons From the Farm - Book: Lessons From the Farm - Jay Izso 09:11 - Kindness as a Core Value 14:37 - MasterClass Ad 16:16 - The Electric Fence 23:24 - I'll Figure It Out 29:16 - Losing Your Ego 34:40 - The Gift of Servitude 37:07 - 100% Rule 38:14 - I Was Wrong 39:17 - Find Jay Izso Online - LinkedIn: https://www.linkedin.com/in/coach-jay/ 40:14 - Book Recommendations - Human Hacking - Christopher Hadnagy - Iron-Sharpened Leadership - John L. Gronski - Success Mindsets - Ryan Gottfredson - The Creator Mindset - Nir Bashan 42:11 - Mentors 45:29 - Wrap Up & Outro - www.social-engineer.com - www.innocentlivesfoundation.org
Every window you open on the web may also be a window into your life tracking your behavior, emotions, thoughts, even choices. Every search, every map query, every site page, every trivia, every Gmail login feeds into the same machine. Chrome isn't just a browser, it's a portal to surveillance. We trace how Google is used to collect your data and feed it into AI models learning from us in real-time. Is there a way to get privacy back? The answer to that is shared at the end.
If one of your vendor validations is checking with the State of your vendor but find that the vendor is not registered with the State of their address….now what? Keep listening. Check out my website www.debrarrichardson.com if you need help implementing authentication techniques, internal controls, and best practices to prevent fraudulent payments, regulatory fines or bad vendor data. Check out the Vendor Process Training Center for 116+ hours of weekly live and on-demand training for the Vendor team. Links mentioned in the podcast + other helpful resources: Find States Your Vendor is Registered In: Open Corporates Free Download: 5 Steps to Improve Your Vendor Callback Process https://training.debrarrichardson.com/confirmationGet the Vendor Callback Confirmation Toolkit(TM) Today: https://training.debrarrichardson.com/course/callback-confirmation-toolkitCustomized Vendor Validations Session: https://debrarrichardson.com/vendor-validation-sessionFree Download: Vendor Validation Reference List with Resource Links https://debrarrichardson.com/vendor-validation-downloadVendor Process Training Center - https://training.debrarrichardson.comCustomized Fraud Training: https://training.debrarrichardson.com/customized-fraud-training Free Live and On-Demand Webinars: https://training.debrarrichardson.com/webinarsVendor Master File Clean-Up: https://www.debrarrichardson.com/cleanupYouTube Channel: https://www.youtube.com/channel/UCqeoffeQu3pSXMV8fUIGNiw More Podcasts/Blogs/Webinars www.debrarrichardson.comMore ideas? Email me at debra@debrarrichardson.com Music Credit: www.purple-planet.com
Jeremy Maldonado breaks down cybersecurity fundamentals from a real-world IT operations perspective. From phishing and social engineering to patching best practices and zero trust, Jeremy shares practical insights to help you protect your organization — starting with your own behavior.He covers:Why the human factor is still your biggest vulnerabilityThe basics of zero trust in everyday communicationSocial engineering red flags to watch forHow to think strategically about patch prioritizationWhy most orgs still struggle with timely patchingTips for human-controlled automation using the Automox consoleWhether you're new to cybersecurity or want to tighten your patching strategy, this episode gives you a tactical refresh on where to focus your attention.
Send us a text
From high-speed rail to electric cars to batteries to AI, it's clear that China can operate with incredible speed at massive scale. Can the US still compete?We sat down with Dan Wang, a Research Fellow at the Hoover Institution and the author of “Breakneck: China's Quest to Engineer the Future” to discuss. Timecodes: 0:00 Introduction1:36 Lawyers vs. Engineers: Cultural and Economic Differences4:06 Urban and Rural Life: Comparing Infrastructure7:20 Barriers to Progress: Regulation and Governance11:00 Industrial Policy and Public-Private Partnerships14:20 The Double-Edged Sword of Legal and Engineering Mindsets16:50 Social Engineering and Policy in China23:00 Competition, Intellectual Property, and Business Culture27:10 Manufacturing, Scale, and Global Supply Chains36:00 Lessons from Japan and Korea41:30 Complacency, Quality, and the Future of Competition48:45 Strategic Resources and Industrial Policy54:00 Foreign Policy: Engineering Diplomacy vs. Alliances59:00 Taiwan, Demographics, and the Future of US-China Relations Resources:Follow Dan on X: https://x.com/danwwangRead Dan's blog: https://danwang.co/Buy Breakneck on Amazon: https://www.amazon.com/dp/1324106034/Follow Steven on X: https://x.com/stevesi Stay Updated:Find a16z on XFind a16z on LinkedInListen to the a16z Podcast on SpotifyListen to the a16z Podcast on Apple PodcastsFollow our host: https://twitter.com/eriktorenberg Please note that the content here is for informational purposes only; should NOT be taken as legal, business, tax, or investment advice or be used to evaluate any investment or security; and is not directed at any investors or potential investors in any a16z fund. a16z and its affiliates may maintain investments in the companies discussed. For more details please see a16z.com/disclosures. Hosted by Simplecast, an AdsWizz company. See pcm.adswizz.com for information about our collection and use of personal data for advertising.
Former DreamWorks animator, Andrew Young, exposes how beloved animated films have become tools of social engineering, subtly shifting from character-driven stories to politically charged narratives that undermine family values and traditional storytelling. We trace Andrew's journey from Hollywood success to cultural whistleblower as he reveals how the animation, media, & education industries now shape young minds and foster division through ideological agendas. The conversation culminates with Andrew's advocacy to combat online child exploitation, highlighting the dangers of sextortion, Section 230, and the urgent need to protect children in the digital age. This episode is a must-listen for parents, educators, & creators determined to defend truth, creativity, and the hearts of the next generation. Andrew Young is a former professional animator turned child advocate. He currently works for Porn Harms, a National Center on Sexual Exploitation (NCOSE) initiative to raise awareness of the public health harms of porn - exposing the connection between porn and all forms of sexual exploitation. Porn Harms/Research archives offer the most comprehensive look at available research on pornography. NCOSE Porn Harms engages the public and change policies with projects such as the Dirty Dozen list, the Safe Schools Safe Libraries initiative, and No Vacancy for Exploitation. Discussed in this Episode: Andrew's Full Story: Social Engineering in Animation No Escape Room Documentary SCHOOL TO HOMESCHOOL RESOURCES: FREE MONTHLY WEDNESDAY WORKSHOP: CLICK HERE Sign Up for the School to Homeschool Newsletter Private Mentoring with Janae: Schedule a Free Discovery Call School to Homeschool YouTube Channel Etsy Store: Shop for Homeschooling Swag *Please note that some of the links included in this article are Amazon affiliate links. CONNECT with US Join the Private Facebook Group Learn more about School to Homeschool Contact Janae: schooltohomeschool1@gmail.com
Many automation software platforms including email to invoicing have artificial intelligence embedded in them. You may not think that email or invoicing software can help fight fraud in the vendor process, but yes they can and here's how... Keep listening. Check out my website www.debrarrichardson.com if you need help implementing authentication techniques, internal controls, and best practices to prevent fraudulent payments, regulatory fines or bad vendor data. Check out the Vendor Process Training Center for 116+ hours of weekly live and on-demand training for the Vendor team. Links mentioned in the podcast + other helpful resources: Free Download: 5 Steps to Improve Your Vendor Callback Process https://training.debrarrichardson.com/confirmationGet the Vendor Callback Confirmation Toolkit(TM) Today: https://training.debrarrichardson.com/course/callback-confirmation-toolkitCustomized Vendor Validations Session: https://debrarrichardson.com/vendor-validation-sessionFree Download: Vendor Validation Reference List with Resource Links https://debrarrichardson.com/vendor-validation-downloadVendor Process Training Center - https://training.debrarrichardson.comCustomized Fraud Training: https://training.debrarrichardson.com/customized-fraud-training Free Live and On-Demand Webinars: https://training.debrarrichardson.com/webinarsVendor Master File Clean-Up: https://www.debrarrichardson.com/cleanupYouTube Channel: https://www.youtube.com/channel/UCqeoffeQu3pSXMV8fUIGNiw More Podcasts/Blogs/Webinars www.debrarrichardson.comMore ideas? Email me at debra@debrarrichardson.com Music Credit: www.purple-planet.com
Which techniques and methods use by threat actors are bypassing security parametersReducing your cyber risk - using lessons learned from recent high-profile attacksStrategies to protect your service desk against identity-based attacksThom Langford, Host, teissTalkhttps://www.linkedin.com/in/thomlangford/Paul Holland, Cyber Capability Manager, Royal Mailhttps://www.linkedin.com/in/paulinfosec/Lukas Weber, Senior Vice President, AlixPartnershttps://www.linkedin.com/in/lukaswebr/Rebecca Stephenson, Specialist Lead Lecturer, Highlands Collegehttps://www.linkedin.com/in/creative-minds-in-cyber/Darren James, Senior Product Manager, Specopshttps://www.linkedin.com/in/darren-james-91055310
Adam Swart — CEO of Crowds on Demand — joins the show to reveal the mechanics on how modern movements are manufactured. He explains how fake protests, paid participants and manufactured online followers are used to seed real engagement, create the illusion of consensus, and drive actual street and media action. If you've ever wondered why certain narratives explode overnight or why social momentum sometimes feels engineered, this episode shows you the playbook.We dig into:– How organizers buy attention and simulate grassroots energy.– Why fake consensus persuades real people to act.– The tools and platforms used to manufacture reality online and on the ground.– Real-world examples and the downstream effects on media, politics, and public perception.– Practical ways listeners can spot engineered movements and protect their newsfeeds and their minds from manipulation.This is essential listening for anyone who wants to understand — and resist — the mechanics behind manufactured movements, manipulation and mind controlYou can see more at CrowdsOnDemand.com
An in-depth conversation with a ethical hacker about the perils caused by Social Engineering, data harvesting and hacking. Follow Anonymous and learn more about his services on Instagram and X:Instagram: https://www.instagram.com/anon_cysec/X: https://x.com/Code4_CyberSecWebsite: https://code4cybersecurity.com/***** Across The Socials @TheAndresSegovia & Twitter/X @_AndresSegovia https://TheAndresSegovia.com To hear more, visit theandressegovia.substack.com
Get ready for a wild ride on this episode of *The Pour Horsemen Podcast*!
Cybersecurity isn't just about firewalls and passwords anymore. It's an all-out battle where hackers run businesses with customer support desks, insider threats can be disguised as your newest hire, and artificial intelligence is both the weapon and the shield. In this special episode of IT Visionaries, host Chris Brandt switches roles and sits in the hot seat while Lacey Peace, host of Experts of Experience, interviews him about the three biggest cyber threats IT leaders must prepare for in 2025. From the rise of ransomware-as-a-service to North Korean nationals infiltrating U.S. companies, and AI reshaping the entire security landscape, Chris reveals what's really happening behind the scenes of today's most dangerous attacks. With stories from his career building high-security facilities — including an EMP-shielded data center buried under a mountain — Chris shares the lessons that every business leader needs to hear about resilience, recovery, and why it's no longer a matter of “if” but “when.” Don't miss this candid and eye-opening conversation. Watch the full episode now and learn how to protect your organization before it's too late. Key Moments: 00:00: Lacey Peace Interviews Chris Brandt04:45 Cyber Extortion and Ransomware08:17 Supply Chain Attacks18:20 Creating an Isolated Recovery Environment20:08 Threat Number Two: IT Worker Attacks22:14 The Rise of Phishing Attacks27:26 The Evolution of Social Engineering30:19 The Role of AI in Cybersecurity33:01 Challenges in Reporting Cyber Incidents33:46 The Complexity of Cyber Incident Recovery34:45 The Role of Governments in Cybersecurity -- This episode of IT Visionaries is brought to you by Meter - the company building better networks. Businesses today are frustrated with outdated providers, rigid pricing, and fragmented tools. Meter changes that with a single integrated solution that covers everything wired, wireless, and even cellular networking. They design the hardware, write the firmware, build the software, and manage it all so your team doesn't have to. That means you get fast, secure, and scalable connectivity without the complexity of juggling multiple providers. Thanks to meter for sponsoring. Go to meter.com/itv to book a demo.---Mission.org is a media studio producing content alongside world-class clients. Learn more at mission.org Hosted by Simplecast, an AdsWizz company. See pcm.adswizz.com for information about our collection and use of personal data for advertising.
⬥GUEST⬥Aunshul Rege, Director at The CARE Lab at Temple University | On Linkedin: https://www.linkedin.com/in/aunshul-rege-26526b59/⬥CO-HOST⬥Julie Haney, Computer scientist and Human-Centered Cybersecurity Program Lead, National Institute of Standards and Technology | On LinkedIn: https://www.linkedin.com/in/julie-haney-037449119/⬥HOST⬥Host: Sean Martin, Co-Founder at ITSPmagazine and Host of Redefining CyberSecurity Podcast | On LinkedIn: https://www.linkedin.com/in/imsmartin/ | Website: https://www.seanmartin.com⬥EPISODE NOTES⬥Cybersecurity Is for Everyone — If We Teach It That WayCybersecurity impacts us all, yet most people still see it as a tech-centric domain reserved for experts in computer science or IT. Dr. Aunshul Rege, Associate Professor in the Department of Criminal Justice at Temple University, challenges that perception through her research, outreach, and education programs — all grounded in community, empathy, and human behavior.In this episode, Dr. Rege joins Sean Martin and co-host Julie Haney to share her multi-layered approach to cybersecurity awareness and education. Drawing from her unique background that spans computer science and criminology, she explains how understanding human behavior is critical to understanding and addressing digital risk.One powerful initiative she describes brings university students into the community to teach cyber hygiene to seniors — a demographic often left out of traditional training programs. These student-led sessions focus on practical topics like scams and password safety, delivered in clear, respectful, and engaging ways. The result? Not just education, but trust-building, conversation, and long-term community engagement.Dr. Rege also leads interdisciplinary social engineering competitions that invite students from diverse academic backgrounds — including theater, nursing, business, and criminal justice — to explore real-world cyber scenarios. These events prove that you don't need to code to contribute meaningfully to cybersecurity. You just need curiosity, communication skills, and a willingness to learn.Looking ahead, Temple University is launching a new Bachelor of Arts in Cybersecurity and Human Behavior — a program that weaves in community engagement, liberal arts, and applied practice to prepare students for real-world roles beyond traditional technical paths.If you're a security leader looking to improve awareness programs, a university educator shaping the next generation, or someone simply curious about where you fit in the cyber puzzle, this episode offers a fresh perspective: cybersecurity works best when it's human-first.⬥SPONSORS⬥ThreatLocker: https://itspm.ag/threatlocker-r974⬥RESOURCES⬥Dr. Aunshul Rege is an Associate Professor here, and much of her work is conducted under this department: https://liberalarts.temple.edu/academics/departments-and-programs/criminal-justiceTemple Digital Equity Plan (2022): https://www.phila.gov/media/20220412162153/Philadelphia-Digital-Equity-Plan-FINAL.pdfTemple University Digital Equity Center / Digital Access Center: https://news.temple.edu/news/2022-12-06/temple-launches-digital-equity-center-north-philadelphiaNICE Cybersecurity Workforce Framework: https://www.nist.gov/itl/applied-cybersecurity/nice/nice-framework-resource-center⬥ADDITIONAL INFORMATION⬥✨ More Redefining CyberSecurity Podcast:
If you are in this age group (or not) and looking for a job…..Keep listening. Check out my website www.debrarrichardson.com if you need help implementing authentication techniques, internal controls, and best practices to prevent fraudulent payments, regulatory fines or bad vendor data. Check out the Vendor Process Training Center for 116+ hours of weekly live and on-demand training for the Vendor team. Links mentioned in the podcast + other helpful resources: VMF Tip of the Week Video: Is It A Scam? The BBB Scam Tracker May Be Able to Tell You https://youtu.be/y_d6QVlqcSYBBB Scam Tracker: https://www.bbb.org/scamtrackerBBB Scam HQ: https://www.bbb.org/all/scamtips BBB New Scam Alert Emails (Sign-Up): https://signup.e2ma.net/signup/1900156/1902645/Get the Vendor Callback Confirmation Toolkit(TM) Today: https://training.debrarrichardson.com/course/callback-confirmation-toolkitCustomized Vendor Validations Session: https://debrarrichardson.com/vendor-validation-sessionFree Download: Vendor Validation Reference List with Resource Links https://debrarrichardson.com/vendor-validation-downloadVendor Process Training Center - https://training.debrarrichardson.comCustomized Fraud Training: https://training.debrarrichardson.com/customized-fraud-training Free Live and On-Demand Webinars: https://training.debrarrichardson.com/webinarsVendor Master File Clean-Up: https://www.debrarrichardson.com/cleanupYouTube Channel: https://www.youtube.com/channel/UCqeoffeQu3pSXMV8fUIGNiw More Podcasts/Blogs/Webinars www.debrarrichardson.comMore ideas? Email me at debra@debrarrichardson.com Music Credit: www.purple-planet.com
⬥GUEST⬥Aunshul Rege, Director at The CARE Lab at Temple University | On Linkedin: https://www.linkedin.com/in/aunshul-rege-26526b59/⬥CO-HOST⬥Julie Haney, Computer scientist and Human-Centered Cybersecurity Program Lead, National Institute of Standards and Technology | On LinkedIn: https://www.linkedin.com/in/julie-haney-037449119/⬥HOST⬥Host: Sean Martin, Co-Founder at ITSPmagazine and Host of Redefining CyberSecurity Podcast | On LinkedIn: https://www.linkedin.com/in/imsmartin/ | Website: https://www.seanmartin.com⬥EPISODE NOTES⬥Cybersecurity Is for Everyone — If We Teach It That WayCybersecurity impacts us all, yet most people still see it as a tech-centric domain reserved for experts in computer science or IT. Dr. Aunshul Rege, Associate Professor in the Department of Criminal Justice at Temple University, challenges that perception through her research, outreach, and education programs — all grounded in community, empathy, and human behavior.In this episode, Dr. Rege joins Sean Martin and co-host Julie Haney to share her multi-layered approach to cybersecurity awareness and education. Drawing from her unique background that spans computer science and criminology, she explains how understanding human behavior is critical to understanding and addressing digital risk.One powerful initiative she describes brings university students into the community to teach cyber hygiene to seniors — a demographic often left out of traditional training programs. These student-led sessions focus on practical topics like scams and password safety, delivered in clear, respectful, and engaging ways. The result? Not just education, but trust-building, conversation, and long-term community engagement.Dr. Rege also leads interdisciplinary social engineering competitions that invite students from diverse academic backgrounds — including theater, nursing, business, and criminal justice — to explore real-world cyber scenarios. These events prove that you don't need to code to contribute meaningfully to cybersecurity. You just need curiosity, communication skills, and a willingness to learn.Looking ahead, Temple University is launching a new Bachelor of Arts in Cybersecurity and Human Behavior — a program that weaves in community engagement, liberal arts, and applied practice to prepare students for real-world roles beyond traditional technical paths.If you're a security leader looking to improve awareness programs, a university educator shaping the next generation, or someone simply curious about where you fit in the cyber puzzle, this episode offers a fresh perspective: cybersecurity works best when it's human-first.⬥SPONSORS⬥ThreatLocker: https://itspm.ag/threatlocker-r974⬥RESOURCES⬥Dr. Aunshul Rege is an Associate Professor here, and much of her work is conducted under this department: https://liberalarts.temple.edu/academics/departments-and-programs/criminal-justiceTemple Digital Equity Plan (2022): https://www.phila.gov/media/20220412162153/Philadelphia-Digital-Equity-Plan-FINAL.pdfTemple University Digital Equity Center / Digital Access Center: https://news.temple.edu/news/2022-12-06/temple-launches-digital-equity-center-north-philadelphiaNICE Cybersecurity Workforce Framework: https://www.nist.gov/itl/applied-cybersecurity/nice/nice-framework-resource-center⬥ADDITIONAL INFORMATION⬥✨ More Redefining CyberSecurity Podcast:
In cybersecurity, identity has become the primary attack vector. We explore identity in CXOTalk 892, with the CEO of RSA Security, Rohit Ghai, who explains how stolen credentials, social engineering, and AI-enabled impersonation break defenses. And what boards, CISOs, and executives must do now.What you'll learn:-- Why credential theft remains the #1 initial access vector and what “phishing resistant” MFA actually requires-- How attackers bypass MFA via help desk social engineering and voice impersonation, and how to stop it-- Managing identity across the joiner–mover–leaver lifecycle to close high-risk gaps-- The “assume breach” mindset: zero trust, least privilege, and blast radius reduction-- The CISO's evolving mandate: business vs. technology, board communication, and risk quantification-- AI in cyber: sword, shield, and attack surface, and the changing economics of attack vs. defense-- Ransomware beyond backups: data theft, response playbooks, and legal/PR readinessWho should watch:Board members, CEOs, CISOs, CIOs, and security leaders who seek clear actions to improve resilience without slowing the business.
Welcome back to To the Point Cybersecurity! In this episode, hosts Rachael Lyon and Jonathan Knepher continue their fascinating conversation with Dr. Margaret Cunningham, Technical Director of Security and AI Strategy at Darktrace. With a background in applied experimental psychology and deep expertise in human-centered security, Dr. Cunningham dives into the real-world challenges and opportunities facing today's cybersecurity professionals. Together, they tackle everything from the simplicity—and sometimes the limitations—of “safe words” for security, to the complexities of measuring team performance and the persistent struggle to balance risk and resilience. Dr. Cunningham challenges the industry's tendency to fixate on failures instead of celebrating successes, and she discusses the real impact AI and automation are having—both helpful and misleading—on cognitive workloads, security processes, and human expertise. Whether you're curious about the human side of security, the changing landscape of AI in cybersecurity, or are just looking for practical ways to spark positive change in your organization, this episode is packed with thought-provoking insights and actionable advice. So sit back and join us for a candid conversation that will leave you questioning how we define success in security and how we can all prepare for an AI-driven future. For links and resources discussed in this episode, please visit our show notes at https://www.forcepoint.com/govpodcast/e351
Cybercriminals are exploiting X's Grok AI to bypass ad protections and spread malware to millions—while researchers discover your home Wi-Fi can now monitor your heart rate. This week's news breakdown covers the attack vectors you need to know about. Join co-hosts Joshua Schmidt, Eric Brown, and Nick Mellem as they dive into the latest cybersecurity developments that could impact your organization tomorrow. From social media malvertising to biometric data harvesting through everyday devices, these aren't distant threats—they're happening now. Key Topics Covered: How cybercriminals are weaponizing Grok AI for malvertising campaigns Why 10-15% of employees access risky content at work (and what to do about it) Wi-Fi devices that can detect heart rates from 10 feet away—privacy implications Amazon's Project Kuiper vs. Starlink: What 1GB satellite internet means for security Practical defenses: YubiKeys, browser isolation, and network redundancy strategies Don't wait until your organization is the next headline. IT leaders need to stay ahead of evolving threats, and this episode delivers critical insights to help protect your business. Like, share, and subscribe for more in-depth security discussions! #cybersecurity #infosec #grok #malware #starlink #wifi #privacy #ITsecurity
NCSAM Week 1 - Social Engineering: A Cybersecurity Perspective
I asked ChatGPT what vendor onboarding professionals have been searching for in the past week – and one of the blaring results was how to onboard vendors faster. I have five tips to speed up the vendor process….Keep listening. Check out my website www.debrarrichardson.com if you need help implementing authentication techniques, internal controls, and best practices to prevent fraudulent payments, regulatory fines or bad vendor data. Check out the Vendor Process Training Center for 116+ hours of weekly live and on-demand training for the Vendor team. Links mentioned in the podcast + other helpful resources: Vendor Process Training Center: AVM Vendor Toolkit (Substitute Forms, Vendor Banking Form)Vendor Banking Form (Separate Purchase): https://debrarrichardson.com/store/vendor-banking-form-template Get the Vendor Callback Confirmation Toolkit(TM) Today: https://training.debrarrichardson.com/course/callback-confirmation-toolkitCustomized Vendor Validations Session: https://debrarrichardson.com/vendor-validation-sessionFree Download: Vendor Validation Reference List with Resource Links https://debrarrichardson.com/vendor-validation-downloadVendor Process Training Center - https://training.debrarrichardson.comCustomized Fraud Training: https://training.debrarrichardson.com/customized-fraud-training Free Live and On-Demand Webinars: https://training.debrarrichardson.com/webinarsVendor Master File Clean-Up: https://www.debrarrichardson.com/cleanupYouTube Channel: https://www.youtube.com/channel/UCqeoffeQu3pSXMV8fUIGNiw More Podcasts/Blogs/Webinars www.debrarrichardson.comMore ideas? Email me at debra@debrarrichardson.com Music Credit: www.purple-planet.com
Welcome back to To the Point Cybersecurity Podcast! In this week's episode, hosts Rachael Lyon and Jonathan Knepher are joined by the brilliant Dr. Margaret Cunningham, Technical Director for Security and AI Strategy at Darktrace. With a PhD in Applied Experimental Psychology and multiple patents to her name, Dr. Cunningham is a leading voice in human-centered security, behavioral analytics, and the ever-evolving intersection of people and technology. Together, the trio dives into the fast-changing landscape of AI-driven threats—think voice cloning, deepfakes, and sophisticated social engineering attacks that challenge every notion of trust and identity. From the real-world dangers of phone scams using cloned voices, to high-profile incidents like the Coinbase insider threat and the rise of groups like Scattered Spider, you'll hear stories that illuminate both the risks and solutions shaping today's enterprise security. They explore the future (and limits) of authentication, the importance—and pitfalls—of data collection, and why behavioral analytics are more crucial than ever in spotting anomalies. Dr. Cunningham also shares insights on transparency, industry responses, and the human factors that make cybersecurity so complex and fascinating. For links and resources discussed in this episode, please visit our show notes at https://www.forcepoint.com/govpodcast/e350
Enjoy these back to back throwback episodes! Doors of Perception is available now on Amazon Prime!https://watch.amazon.com/detail?gti=amzn1.dv.gti.8a60e6c7-678d-4502-b335-adfbb30697b8&ref_=atv_lp_share_mv&r=webDoors of Perception official trailerhttps://youtu.be/F-VJ01kMSII?si=Ee6xwtUONA18HNLZIndependent Media Token https://www.independentmediatoken.com/Patreon https://patreon.com/forbiddenknowledgenews?utm_medium=unknown&utm_source=join_link&utm_campaign=creatorshare_creator&utm_content=copyLinkMerchhttps://fknstore.net/Start your microdosing journey with BrainsupremeGet 15% off your order here!!https://brainsupreme.co/FKN15Book a free consultation with Jennifer Halcame Emailjenniferhalcame@gmail.comFacebook pagehttps://www.facebook.com/profile.php?id=61561665957079&mibextid=ZbWKwLWatch The Forbidden Documentary: Occult Louisiana on Tubi: https://link.tubi.tv/pGXW6chxCJbC60 PurplePowerhttps://go.shopc60.com/FORBIDDEN10/or use coupon code knowledge10FKN Link Treehttps://linktr.ee/FKNlinksForbidden Knowledge Network https://forbiddenknowledge.news/ Make a Donation to Forbidden Knowledge News https://www.paypal.me/forbiddenknowledgenehttps://buymeacoffee.com/forbiddenJohnny Larson's artworkhttps://www.patreon.com/JohnnyLarsonSign up on Rokfin!https://rokfin.com/fknplusPodcastshttps://www.spreaker.com/show/forbiddenAvailable on all platforms Support FKN on Spreaker https://spreaker.page.link/KoPgfbEq8kcsR5oj9FKN ON Rumblehttps://rumble.com/c/FKNpGet Cory Hughes books!Lee Harvey Oswald In Black and White https://www.amazon.com/dp/B0FJ2PQJRMA Warning From History Audio bookhttps://buymeacoffee.com/jfkbook/e/392579https://www.buymeacoffee.com/jfkbookhttps://www.amazon.com/Warning-History-Cory-Hughes/dp/B0CL14VQY6/ref=mp_s_a_1_1?crid=72HEFZQA7TAP&keywords=a+warning+from+history+cory+hughes&qid=1698861279&sprefix=a+warning+fro%2Caps%2C121&sr=8-1https://coryhughes.org/YouTube https://youtube.com/@fknclipspBecome Self-Sufficient With A Food Forest!!https://foodforestabundance.com/get-started/?ref=CHRISTOPHERMATHUse coupon code: FORBIDDEN for discountsOur Facebook pageshttps://www.facebook.com/forbiddenknowledgenewsconspiracy/https://www.facebook.com/FKNNetwork/Instagram @forbiddenknowledgenews1@forbiddenknowledgenetworkXhttps://x.com/ForbiddenKnow10?t=uO5AqEtDuHdF9fXYtCUtfw&s=09Email meforbiddenknowledgenews@gmail.comsome music thanks to:https://www.bensound.com/Become a supporter of this podcast: https://www.spreaker.com/podcast/forbidden-knowledge-news--3589233/support.
professorjrod@gmail.comCybersecurity isn't just about firewalls and antivirus software—it's about understanding the complex interplay between technical systems and human psychology. In this continuation of our Security+ series, we explore the multifaceted world of attack surfaces, threat vectors, and social engineering techniques that cybercriminals employ.We start by breaking down what constitutes an attack surface—those vulnerable points where unauthorized users might attempt to breach your systems. From physical hardware and network components to applications and human elements, each represents a potential entry point for attackers. We then explore the pathways attackers use to exploit these vulnerabilities, from vulnerable software and network vectors to more devious approaches like lure-based and message-based vectors.The episode takes a deep dive into social engineering—the art of manipulating human behavior rather than exploiting technical flaws. Through real-world examples, including my own experience with an attempted password reset scam, we demonstrate how attackers use techniques like impersonation, pretexting, phishing, and business email compromise to bypass even the most sophisticated security systems. One of my students shared how his sister's company lost $10,000 when an attacker impersonated the vacationing CEO and requested a wire transfer—a stark reminder that human vulnerabilities often pose the greatest security risk.Whether you're studying for Security+ certification or simply want to better protect yourself and your organization, this episode provides essential insights into the psychological aspects of cybersecurity. Understanding these concepts is crucial not just for IT professionals, but for everyone who uses digital technology. Have you ever encountered a social engineering attempt? How did you recognize and respond to it?Support the showIf you want to help me with my research please e-mail me.Professorjrod@gmail.comIf you want to join my question/answer zoom class e-mail me at Professorjrod@gmail.comArt By Sarah/DesmondMusic by Joakim KarudLittle chacha ProductionsJuan Rodriguez can be reached atTikTok @ProfessorJrodProfessorJRod@gmail.com@Prof_JRodInstagram ProfessorJRod
Do you have a non-vendor team member performing the confirmation call? I don't recommend that certain steps are put into place to reduce the potential for both internal and external fraud. What are they?Keep listening. Check out my website www.debrarrichardson.com if you need help implementing authentication techniques, internal controls, and best practices to prevent fraudulent payments, regulatory fines or bad vendor data. Check out the Vendor Process Training Center for 116+ hours of weekly live and on-demand training for the Vendor team. Links mentioned in the podcast + other helpful resources: Get the Vendor Callback Confirmation Toolkit(TM) Today: https://training.debrarrichardson.com/course/callback-confirmation-toolkitCustomized Vendor Validations Session: https://debrarrichardson.com/vendor-validation-sessionFree Download: Vendor Validation Reference List with Resource Links https://debrarrichardson.com/vendor-validation-downloadVendor Process Training Center - https://training.debrarrichardson.comCustomized Fraud Training: https://training.debrarrichardson.com/customized-fraud-training Free Live and On-Demand Webinars: https://training.debrarrichardson.com/webinarsVendor Master File Clean-Up: https://www.debrarrichardson.com/cleanupYouTube Channel: https://www.youtube.com/channel/UCqeoffeQu3pSXMV8fUIGNiw More Podcasts/Blogs/Webinars www.debrarrichardson.comMore ideas? Email me at debra@debrarrichardson.com Music Credit: www.purple-planet.com
To try everything Brilliant has to offer for free for a full 30 days, visit https://brilliant.org/davidbombal or scan the QR code onscreen – You'll also get 20% off an annual premium subscription. In this 2025 deep-dive, David Bombal sits down with John Hammond to map the real state of hacking: classic ransomware/infostealers meet AI-assisted malware (including code that leverages LLMs). We unpack the ClickFix and FileFix social-engineering patterns, fake CAPTCHA and “save/upload” flows that trick users into running payloads, and the practical Windows mitigations (policy/registry ideas) you should know. John shares why he estimates 20–30% of attacks now have some AI touch, how social engineering scales, and where defenders can push back. For your career, he argues opportunities are expanding: use CTFs, show your work on GitHub/video, and consider OSCP for signaling. He also introduces Just Hacking Training (JHT), handson hack-alongs, archived CTFs, free upskill challenges, and pay-what-you-want courses with industry all-stars. What you'll learn: • How ClickFix/FileFix actually trick users • Realistic mitigation tactics you can apply • The current role of AI in malware • Career roadmap: CTFs → OSCP → portfolio • Where to get hands-on: JHT resources // John Hammond's SOCIALS // YouTube: / @_johnhammond X: https://x.com/_johnhammond LinkedIn: / johnhammond010 Discord: / discord Instagram: / _johnhammond TikTok: / johnhammond010 GitHub: https://github.com/JohnHammond Humble Bundle: https://www.humblebundle.com/?partner... Just Hacking Training: https://www.justhacking.com/ ClickFix Website: https://clickfix-wiki.github.io/ // YouTube video REFERENCE // Linux got hacked with this AI Image: • Linux got Hacked with this AI image! Hackers trick everyone to run malware (FileFix): • hackers trick everyone to run malware (Fil... OSINT Tools to track you down: • OSINT tools to track you down. You cannot ... // David's SOCIAL // Discord: discord.com/invite/usKSyzb Twitter: www.twitter.com/davidbombal Instagram: www.instagram.com/davidbombal LinkedIn: www.linkedin.com/in/davidbombal Facebook: www.facebook.com/davidbombal.co TikTok: tiktok.com/@davidbombal YouTube: / @davidbombal Spotify: open.spotify.com/show/3f6k6gE... SoundCloud: / davidbombal Apple Podcast: podcasts.apple.com/us/podcast... // MY STUFF // https://www.amazon.com/shop/davidbombal // SPONSORS // Interested in sponsoring my videos? Reach out to my team here: sponsors@davidbombal.com // MENU // 0:00 - Coming up 0:58 - Intro & Current State of Hacking 03:42 - Brilliant Advert 05:14 - The Wave of AI Attacks 07:43 - Click(Fix) Hack 10:10 - FileFix: The Future Hacks 11:14 - Current Affairs & Social Engineering 15:17 - Raising Awareness 19:18 - Security Research 20:51 - Is There a Future for Younger People in This Industry? 22:54 - What Should I Do to Get There? 24:11 - Recommended Certifications 26:34 - Where Do I Start? 28:26 - About John Hammond's Work 31:12 - Outro Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel! Disclaimer: This video is for educational purposes only.
"If we ever get to the point where nobody's arguing about Bitcoin, I would be afraid that that's because nobody cares anymore and Bitcoin is actually dead or dying." In this episode of THE Bitcoin Podcast, Bitcoin technologist Jameson Lopp (Casa co-founder & CSO) joins Walker America to cut through today's Bitcoin noise: filter wars, spam on Bitcoin, standardness vs. consensus, the real risks (social engineering vs wrench attacks), and how to actually secure generational wealth with family multi-sig. We also dive into the quantum computing threat—timelines, soft-fork options, migration game theory, and why coordination (not cryptography alone) will be the hard part. Plus: culture/politics, ossification, and how debates keep Bitcoin antifragile. FOLLOW JAMESON: NOSTR: https://primal.net/lopp X: https://x.com/lopp WEB: https://www.lopp.net/ If you enjoy THE Bitcoin Podcast you can help support the show by doing the following: FOLLOW ME (Walker) on @WalkerAmerica on X | @TitcoinPodcast on X | Nostr Personal (walker) | Nostr Podcast (Titcoin) | Instagram Subscribe to THE Bitcoin Podcast (and leave a review) on Fountain | YouTube | Spotify | Rumble | EVERYWHERE ELSE ***** THE Bitcoin Podcast Partners: > http://bitbox.swiss/walker -- use promo code WALKER for 5% off the Bitcoin-only Bitbox02 hardware wallet. > GET FOLD ($10 in bitcoin): https://use.foldapp.com/r/WALKER
Is racial profiling always wrong, even if used by an AI to decrease crime? Should we use AI to judge criminal cases, recommend sentences for the guilty, or decide parole for prisoners?Chapters:[00:00] Introduction to AI in Crime Fighting[00:12] Thought Experiment: The Looting Scenario[06:32] Predictive Policing and AI[10:13] Debating the Ethics of AI in Law Enforcement[23:26] Affirmative Action and Racial Profiling[37:51] Balancing Crime Reduction and Social Engineering[39:00] AI in Sentencing: Benefits and Challenges[40:08] Algorithmic Transparency and Legal Implications[43:15] The Opaque Jury Argument[47:44] Fairness vs. Accuracy in Legal Decisions[57:25] Philosophical Implications of Opaque Decision-Making
Free speech is under attack in almost every country on the planet. Google, YouTube, and Big Tech are working with powerful figures behind the scenes to limit what you can see, hear, and read—an attempt to steer your thoughts, your spending, and your sovereignty. Tech entrepreneur Ray Vahey, founder of BitChute, joins me to share his journey fighting to keep the internet free for your children and mine.You can support his misstion at https://Bitchute.com
Tariffs are here and many vendor team members may be busier than ever with how they have caused changes in the vendor process. There may be additional validations involved in four areas…Keep listening. Check out my website www.debrarrichardson.com if you need help implementing authentication techniques, internal controls, and best practices to prevent fraudulent payments, regulatory fines or bad vendor data. Check out the Vendor Process Training Center for 116+ hours of weekly live and on-demand training for the Vendor team. Links mentioned in the podcast + other helpful resources: Customized Vendor Validations Session: https://debrarrichardson.com/vendor-validation-sessionVendor Process Training Center - https://training.debrarrichardson.comCustomized Fraud Training: https://training.debrarrichardson.com/customized-fraud-training Free Live and On-Demand Webinars: https://training.debrarrichardson.com/webinarsVendor Master File Clean-Up: https://www.debrarrichardson.com/cleanupYouTube Channel: https://www.youtube.com/channel/UCqeoffeQu3pSXMV8fUIGNiw More Podcasts/Blogs/Webinars www.debrarrichardson.comMore ideas? Email me at debra@debrarrichardson.com Music Credit: www.purple-planet.com
Don't let your small business fall victim to devastating cyber attacks! Expert joins us t discuss AI Risks exposed. We explore how hackers use AI to target small businesses. From AI Social engineering to data theft, learn what you need to know to protect your business from cyber threats. Send us a textGrowth without Interruption. Get peace of mind. Stay Competitive-Get NetGain. Contact NetGain today at 844-777-6278 or reach out online at www.NETGAINIT.com Support the show
Cybersecurity Today: Navigating AI Advancements and Future Trends In this episode of 'Cybersecurity Today,' host Jim Love and panelists Tammy Harper, Laura Payne, and David Shipley discuss recent developments in cybersecurity, shifting focus to AI's impact on the industry. They explore emerging threats such as AI-generated ransomware and the efficiency of exploiting vulnerabilities using AI. The conversation emphasizes the need for improved policy and regulation, the role of MFA in safeguarding systems, and the implications of youth unemployment due to AI disruption. Predictions for the coming year include the necessity for better legislation, ethical considerations in AI deployment, and the continued importance of maintaining fundamental cybersecurity measures amidst rapid technological advances. 00:00 Introduction and Overview 00:36 Meet the Panelists 02:32 New Cybersecurity Awareness Platform 05:07 Biometric Guidance and Privacy 13:04 AI-Driven Exploits and Security Challenges 22:21 Hack Back Legislation Debate 30:21 MFA Implementation and Insurance Implications 36:30 Understanding the Role of Underwriting in Insurance 36:58 The Importance of Cybersecurity in Insurance 37:43 Scenarios and Broker Consultations 38:57 The Scattered Spiders and Cybersecurity Threats 43:07 Youth Unemployment and Cybersecurity 44:43 The Rise of Social Engineering 47:47 AI and Its Implications 49:28 The Future of AI and Cybersecurity 50:45 Challenges and Solutions in AI Security 51:09 Final Thoughts and Recommendations
I discuss the hiring practices of the Talawanda School District and their failure to engage in proper background checks and how this led to the hiring of a sexual deviant named Joseph Hall, to be the director of student services. I also discuss the Minneapolis False Flag and the actors present, the social engineering of the week and other education news. Book Websites: https://www.moneytreepublishing.com/shop PROMO CODE: “AEFM” for 10% OFF https://armreg.co.uk PROMO CODE: "americaneducationfm" for 15% off all books and products. (I receive no kickbacks). Q posts book: https://drive.proton.me/urls/JJ78RV1QP8#yCO0wENuJQPH
This week, our hosts Dave Bittner, Joe Carrigan, and Maria Varmazis (also host of the T-Minus Space Daily show) are sharing the latest in social engineering scams, phishing schemes, and criminal exploits that are making headlines. We start with some follow up, this time involving a surprising new flock of chickens and a listener note from Belgium. Via Peter Janssen, as he's seen the same fake “employee discount” scams we covered, only this time targeting backpacks and other products. Dave's story is on a new “podcast imposter” scam, where fake invites trick business owners and influencers into giving remote access so attackers can hijack their accounts. Joe's got a story on Workday disclosing a breach after attackers used social engineering to infiltrate a third-party CRM system, and why this matters given Workday's wide use as the front end for so many companies' HR departments. Maria brings two quick hits this week: a fake FedEx text scam making the rounds, and a look at whether covering kids' faces with emojis in photos really protects their privacy — or if it's more illusion than protection. On today's catch of the day, Dave got a text claiming he's been recommended for a high-paying, no-experience-needed YouTube job—classic signs of a scam promising easy money and “free training.” Complete our annual audience survey before August 31. Resources and links to stories: Dumbest Friend Just Bought 20 Chickens Executives Warned About Celebrity Podcast Scams Workday Discloses Data Breach Following CRM-Targeted Social Engineering Attack Will covering your child's face with an emoji actually protect their privacy? Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@n2k.com.
If you're looking for a low-cost vendor validation step to deter fraud – I have one for you in today's episode. Keep listening. Check out my website www.debrarrichardson.com if you need help implementing authentication techniques, internal controls, and best practices to prevent fraudulent payments, regulatory fines or bad vendor data. Check out the Vendor Process Training Center for 116+ hours of weekly live and on-demand training for the Vendor team. Links mentioned in the podcast + other helpful resources: Article: How to Vet Suppliers and Avoid Fake Vendor Scams https://www.bitdefender.com/en-gb/blog/hotforsecurity/how-to-vet-suppliers-and-avoid-fake-vendor-scamsCustomized Vendor Validations Session: https://debrarrichardson.com/vendor-validation-sessionVendor Process Training Center - https://training.debrarrichardson.comCustomized Fraud Training: https://training.debrarrichardson.com/customized-fraud-training Free Live and On-Demand Webinars: https://training.debrarrichardson.com/webinarsVendor Master File Clean-Up: https://www.debrarrichardson.com/cleanupYouTube Channel: https://www.youtube.com/channel/UCqeoffeQu3pSXMV8fUIGNiw More Podcasts/Blogs/Webinars www.debrarrichardson.comMore ideas? Email me at debra@debrarrichardson.com Music Credit: www.purple-planet.com
Prepare to have your perception of reality shattered as we dive deep into Adam Curtis's mind-bending revelation about how power structures have created a fake world. Through classified documents, whistleblower testimonies, and hidden historical connections, we expose how banks, politicians, and tech giants have constructed an artificial reality to maintain control. From the rise of algorithmic manipulation to the manufactured consent of modern media, discover how society has been deliberately pushed into accepting a fabricated version of truth. This explosive episode reveals the hidden architects behind our synthetic reality, the psychological warfare being waged on global consciousness, and how the very fabric of our perceived world has been carefully engineered to keep humanity in a perpetual state of confusion and compliance.
NATO wants to add “security forces in Ukraine. Why? For a false flag to then attack Russia? Time will tell. Also, more declasses are coming. I also talk tax exemptions, schools use of Yonder pouches for cell phones, the money that is wasted and how it's larger-scale social engineering. New Substack article too. Book Websites: https://www.moneytreepublishing.com/shop PROMO CODE: “AEFM” for 10% OFF https://armreg.co.uk PROMO CODE: "americaneducationfm" for 15% off all books and products. (I receive no kickbacks). Q posts book: https://drive.proton.me/urls/JJ78RV1QP8#yCO0wENuJQPH
Validating vendor information and checking that they are not on any applicable sanction lists is a part of your vendor on-boarding process, but what about after the on-boarding process? Today's episode is a webinar that not only has a five-step process for recurring vendor validations, but lots of five downloads to help you get started. Keep listening. Check out my website www.debrarrichardson.com if you need help implementing authentication techniques, internal controls, and best practices to prevent fraudulent payments, regulatory fines or bad vendor data. Check out the Vendor Process Training Center for 116+ hours of weekly live and on-demand training for the Vendor team. Links mentioned in the podcast + other helpful resources: On-Demand Webinar: Recurring Vendor Validations: Ensure Post-Onboarding Compliance https://training.debrarrichardson.com/course/september2024Free Download: Vendor Validation Reference List with Resource Links https://debrarrichardson.com/vendor-validation-downloadCustomized Vendor Validations Session: https://debrarrichardson.com/vendor-validation-sessionVendor Process Training Center - https://training.debrarrichardson.comCustomized Fraud Training: https://training.debrarrichardson.com/customized-fraud-training Free Live and On-Demand Webinars: https://training.debrarrichardson.com/webinarsVendor Master File Clean-Up: https://www.debrarrichardson.com/cleanupYouTube Channel: https://www.youtube.com/channel/UCqeoffeQu3pSXMV8fUIGNiw More Podcasts/Blogs/Webinars www.debrarrichardson.comMore ideas? Email me at debra@debrarrichardson.com Music Credit: www.purple-planet.com
At DEF CON's Social Engineering Village, contestants have 22 minutes to charm real employees at real companies into revealing real details that could lead to a breach. We step inside the booth to see how persuasion, improv, and psychology fuel both ethical hacking and the rise of cybercrime worldwide. Learn more about your ad choices. Visit megaphone.fm/adchoices
Dr Drew, coming-of-age icon for Generation X, joins the program to examine the profound cultural changes shaping our world. We discuss what these shifts mean for our future—and how they're fundamentally impacting young people in ways that cannot be ignored. From the crushing economic conditions facing the younger generation to the unrealistic expectations society places on them, Dr. Drew breaks down the cultural and financial pressures fueling today's mental health crisis. This is a powerful, insightful conversation you won't want to miss.Follow Dr. Drew at https://DrDrew.com
Glenn and Eric Meder return for another powerful and eye-opening conversation—this time diving into one of the most fundamental freedoms under attack: your free will. In this episode, we break down how manipulation of the masses—through propaganda, surveillance, engineered scarcity, and social conditioning—is being used to strip you of your options. And when your options are taken away, your free agency disappears. Free will cannot exist without choice.We also explore how modern social constructs, from gender ideology to algorithmic censorship and digital nudging, are being used to reshape the minds of children and adults alike. It's all part of a broader plan to fragment identity, dissolve autonomy, and normalize submission to centralized control. Glenn and Eric—two deeply knowledgeable experts on the weaponization of the surveillance state—lay out how this system was built, how it's being deployed, and what you can do to reclaim your sovereignty. This is not just about technology. It's about you, your children, and the future of human freedom.Sign up for the FREE “Exit the Surveillance State” Webinar:https://event.webinarjam.com/register/306/8yo53fqk
On the Schmooze Podcast: Leadership | Strategic Networking | Relationship Building
I'm pleased to interview one of our Biz Book Pub Hub Partners. Our Hub Partners are experts who support entrepreneurs along their author journey. Today's guest is a book marketing strategist. If book marketing feels like a never-ending to-do list, you're not alone. She works with nonfiction authors—especially business owners, coaches, and consultants—who want to grow their impact and income through their books without feeling like they've sold their soul to sales. Instead of chasing short-term accolades like bestseller status, she helps authors shift toward strategies that feel good and build long-term results: clarifying their message, deepening reader relationships, and building community around their ideas. Through her Buzzworthy Book Experience and signature BEES Marketing Method, she helps authors create visibility, authority, and income, with strategies that feel authentic, not exhausting. Her approach centers on simplicity and alignment with your values, whether you're launching your first book or reimagining your next move. Please join me in welcoming Judy Baker. In this episode, we discuss the following:
Ethical hacker Rachel Tobac joins us to answer a juicy question: How would she hack someone reasonably security savvy like Matt?
Welcome to the Social-Engineer Podcast: The Doctor Is In Series – where we will discuss understandings and developments in the field of psychology. In today's episode, Chris and Abbie explore the complexities of attraction and the concept of love at first sight. They discuss the biochemical responses associated with attraction, the importance of understanding cognitive biases, and the role of familiarity in relationships. [Aug 4, 2025] 00:00 - Intro 00:35 - Dr. Abbie Maroño Intro 01:15 - Intro Links - Social-Engineer.com - http://www.social-engineer.com/ - Managed Voice Phishing - https://www.social-engineer.com/services/vishing-service/ - Managed Email Phishing - https://www.social-engineer.com/services/se-phishing-service/ - Adversarial Simulations - https://www.social-engineer.com/services/social-engineering-penetration-test/ - Social-Engineer channel on SLACK - https://social-engineering-hq.slack.com/ssb - CLUTCH - http://www.pro-rock.com/ - innocentlivesfoundation.org - http://www.innocentlivesfoundation.org/ 03:14 - The Topic of the Day: Love at First Sight 03:22 - Pulling Apart the Fairy Tale 04:26 - Knowledge is Power 05:49 - Why Can't This Be Love? 07:12 - More Than a Feeling 09:28 - May Impair Your Ability 10:59 - The Rickety Bridge Study 13:20 - Head or Heart? 15:04 - Cognitive Biases 16:16 - The Halo Effect 17:19 - Prototypical Matching 18:51 - I Want You to Want Me 21:54 - Retrospective Bias 23:34 - Feels Like Home 28:44 - Keep One Eye Open 30:32 - A Responsibility to Self-Awareness 32:53 - Wrap Up 33:11 - Next Month: Intuition 33:31 - Outro - www.social-engineer.com - www.innocentlivesfoundation.org Find us online: - LinkedIn: linkedin.com/in/dr-abbie-maroño-phd - Instagram: @DoctorAbbieofficial - LinkedIn: linkedin.com/in/christopherhadnagy References: Dutton, D. G., & Aron, A. P. (1974). Some evidence for heightened sexual attraction under conditions of high anxiety. Journal of Personality and Social Psychology, 30(4), 510–517. Fisher, H. E., Aron, A., & Brown, L. L. (2006). Romantic love: A mammalian brain system for mate choice. Philosophical Transactions of the Royal Society B: Biological Sciences, 361(1476), 2173–2186. Fletcher, G. J. O., Simpson, J. A., & Thomas, G. (2000). The measurement of perceived relationship quality components: A confirmatory factor analytic approach. Personality and Social Psychology Bulletin, 26(3), 340–354. Hazan, C., & Shaver, P. (1987). Romantic love conceptualized as an attachment process. Journal of Personality and Social Psychology, 52(3), 511–524. Marazziti, D., & Canale, D. (2004). Hormonal changes when falling in love. Psychoneuroendocrinology, 29(7), 931–936. Nisbett, R. E., & Wilson, T. D. (1977). The halo effect: Evidence for unconscious alteration of judgments. Journal of Personality and Social Psychology, 35(4), 250–256. Sprecher, S., & Metts, S. (1989). Development of the "Romantic Beliefs Scale" and examination of the effects of gender and gender-role orientation. Journal of Social and Personal Relationships, 6(4), 387–411. Sternberg, R. J. (1986). A triangular theory of love. Psychological Review, 93(2), 119–135. Zeki, S. (2007). The neurobiology of love. FEBS Letters, 581(14), 2575–2579. Zsok, F., Haucke, M., De Wit, C., & Barelds, D. P. (2017). What kind of love is love at first sight? An empirical investigation. Personal Relationships, 24(4), 869–885.