DIY Cyber Guy, hosted by David W. Schropfer, offers a approachable exploration of cybersecurity, emerging technologies (like AI and Quantum Computing) for all knowledge levels. Through dynamic podcasts, expert interviews, and engaging blog posts, DIY Cyber Guy provides practical, easy-to-apply tips to stay ahead of tech trends and protect your digital world. Whether you're curious about cutting-edge tech or looking to secure your online life, DIY Cyber Guy makes complex topics both fun and a ...
…
continue reading
Cryptojack Podcasts
Thought leaders and experts Max Aulakh (Ignyte) and Joel Yonts (Secure Robotics) cover subjects such as the development of AI, cyber security and the how the future looks in terms of cyber risk.
…
continue reading
CSIAC's Mission Mission Statement CSIAC is chartered to leverage the best practices and expertise from government, industry, and academia in order to promote technology domain awareness and solve the most critically challenging scientific and technical problems in the following areas: Cybersecurity and Information Assurance, Software Engineering, Modeling and Simulation, and Knowledge Management/Information Sharing.
…
continue reading
Security Unlocked presents The BlueHat Podcast From 2020 to 2022, Security Unlocked, hosted by Nic Fillingham and Natalia Godyla, explored the technology and people powering Microsoft's Security solutions. Today, the Security Unlocked feed brings you new episodes from The BlueHat Podcast where hosts Nic Fillingham and Wendy Zenone speak with security researchers, responders, hackers and industry leaders, both inside and outside of Microsoft, working to secure the planet's technology and crea ...
…
continue reading
1
#90: The Discord Breach ā Could it Happen to You?
24:17
24:17
Play later
Play later
Lists
Like
Liked
24:17Complyance CEO Richa Kaul discusses how third parties can expose sensitive data (passports, IDs) and provides actionable steps to prevent loss and protect revenue.By Extra Something Media
…
continue reading
1
#89 ā Is The Expanding Quantum Computing Workforce Your Next Career Move?
36:45
36:45
Play later
Play later
Lists
Like
Liked
36:45Do you think Quantum Computing jobs are just for PhD's and physics geniuses? Not anymore. Your current SaaS, business, or marketing skills are desperately needed to build this new industry. Izhar Medalsy tells us how to jump careers, and why the new quantum computing industry is already exciting.By Extra Something Media
…
continue reading
1
#88 ā Why We Need Quantum Sensing to Support GPS
35:00
35:00
Play later
Play later
Lists
Like
Liked
35:00Someone threatened a world leadser's flight by jamming her plane's GPS system. In Episode 88 of DIY Cyber Guy, David Schropfer and Q-CTRL's Aravind Ratnam reveal how quantum sensing could make global navigation jam-proof and redefine aviation safety using a the earth's natural magnetic field.By Extra Something Media
…
continue reading
1
#87: How to Use AI to Create a Competitive Advantage Without Losing Control
24:22
24:22
Play later
Play later
Lists
Like
Liked
24:22AI can fuel your edgeāor leak your data. In this episode, RealVNC CPO/CTO Neil Gad joins David to unpack zero-trust, workspace segmentation, and why 94% of orgs saw identity/access incidents last year. Learn concrete steps to harness AI without losing control.By Extra Something Media
…
continue reading
1
#86: Are You Drowning In Account Sprawl, And Don't Know It?
23:16
23:16
Play later
Play later
Lists
Like
Liked
23:16Are you sure every login in your company is legit? Cybersecurity leader Matt Topper exposes the hidden chaos of account sprawlāwhere forgotten logins and shadow SaaS tools quietly drain budgets and open doors for hackers. Learn how simple, free steps can tighten security and save thousands.By Extra Something Media
…
continue reading
1
#85 ā What Happens When A Fortune 5 Company Fails Cybersecurity 101
19:26
19:26
Play later
Play later
Lists
Like
Liked
19:26Even Fortune 5 firms fail at Cybersecurity 101. Paul Tracey discusses how small businesses and even home users can block the same attacks.By Extra Something Media
…
continue reading
1
#84 - Is Your Data Secure When You Use AI?
28:52
28:52
Play later
Play later
Lists
Like
Liked
28:52Is Your Data Secure When You Use AI? Navy intel veteran, engineer, and attorney Cordell Robinson reveals how AI handles your data, what to share, and practical steps to protect privacy, comply with standards, and avoid mistakes.By Extra Something Media
…
continue reading
1
#83 - Zero Cost Pathway to American Cybersecurity
27:44
27:44
Play later
Play later
Lists
Like
Liked
27:44Frustrated by cybersecurity losses? Guest Larry Clinton, President of the Internet Security Alliance (ISA) proposes a zero-cost solution. By eliminating redundant regulations and creating a tuition-for-service program, we can enhance our defenses and train 10,000 new cyber pros annually.By Extra Something Media
…
continue reading
1
#82 - The Phishing Paradox: Why Security Training Might Be Making You MORE Vulnerable
34:14
34:14
Play later
Play later
Lists
Like
Liked
34:14Discover the surprising reason security training may be making you an easy target for hackers, and the better way to fight back. With CyberHoot CEO Craig Taylor.By Extra Something Media
…
continue reading
1
#81 ā Picking the Right Balance between Security and User Satisfaction
22:59
22:59
Play later
Play later
Lists
Like
Liked
22:59Strict security vs. smooth user experienceācan you have both? Hear David W. Schropfer & Daniel DeGroff tackle CIAM, FusionAuth's evolution, and real-world trade-offs.By Extra Something Media
…
continue reading
1
#80- Are you keeping up with Data Governance post-AI?
26:21
26:21
Play later
Play later
Lists
Like
Liked
26:21AI is reshaping data governanceāand raising big compliance questions. David W. Schropfer and Anthony Woodward unpack risks, silos, and solutions on DIY Cyber Guy.By Extra Something Media
…
continue reading
1
#79 - AI and CCTV: Yes, it's here. No, it's not Big Brother (yet)
35:52
35:52
Play later
Play later
Lists
Like
Liked
35:52Can AI spot threats without spying on you? Loretta AI's Galvin Widjaja joins DIY Cyber Guy to reveal how smart surveillance protects privacyāno facial recognition required.By Extra Something Media
…
continue reading
1
Hunting Variants: Finding the Bugs Behind the Bug
39:51
39:51
Play later
Play later
Lists
Like
Liked
39:51In this episode of The BlueHat Podcast, host Nic Fillingham is joined by George Hughey from Microsoft who returns to discuss his Blue Hat India talk on variant hunting, explaining how MSRC uses submission data from hacking competitions like Pwn2Own and Tianfu Cup to uncover additional security vulnerabilities in Windows. George shares how incentiveā¦
…
continue reading
1
#78- Cybercriminals Aggressively Shifting to Easier Targets: Small & Medium Businesses
33:53
33:53
Play later
Play later
Lists
Like
Liked
33:53The average ransomware claim is down, but incidents are up. What does that mean? Threat actors are targeting smaller businesses, and Business Email Compromise (BEC) is the attack of choice. With Dan Candee @CorkCyber.By Extra Something Media
…
continue reading
Marcus Fontoura (CTO of Microsoft's Azure Core) discusses why AI may not reduce dev team sizes but instead raises quality expectations, just like spell check did for writing.By Extra Something Media
…
continue reading
1
Securing Redirections with Mike Macelletti
41:22
41:22
Play later
Play later
Lists
Like
Liked
41:22In this episode of The BlueHat Podcast, host Nic Fillingham and Wendy Zenone are joined by Mike Macelletti from Microsoftās MSRC Vulnerabilities and Mitigations team to explore Redirection Guard, a powerful mitigation designed to tackle a long-standing class of file path redirection vulnerabilities in Windows. Mike shares how his interest in securiā¦
…
continue reading
1
#76 ā Using AI in Cybersecurity: Best Practices for Small/Medium Businesses
27:53
27:53
Play later
Play later
Lists
Like
Liked
27:53AI is transforming cybersecurity in businesses of every size. In Ep. 76 of DIY Cyber Guy, RAD Security's Jimmy Mesta explains how AI tools fight phishing, cut costs & boost IT.By Extra Something Media
…
continue reading
1
Ignore Ram Shankar Siva Kumarās Previous Directions
39:15
39:15
Play later
Play later
Lists
Like
Liked
39:15In this episode of The BlueHat Podcast, host Nic Fillingham and Wendy Zenone share Ram Shankar Siva Kumarās dynamic keynote from BlueHat India 2025, where he explores the evolving threat landscape of AI through the lens of the Microsoft AI Red Team. From adversarial machine learning to psychosocial harms and persuasive AI, Ram highlights real-worldā¦
…
continue reading
1
Protecting AI at the Edge with David Weston
38:36
38:36
Play later
Play later
Lists
Like
Liked
38:36In this episode of The BlueHat Podcast, host Nic Fillingham and Wendy Zenone share David Westonās keynote from BlueHat India 2025. David explores the growing role of on-device AI in Windows, the security risks it introduces, and how Microsoft is rethinking architecture to defend against new threats like model tampering, data exfiltration, and AI-poā¦
…
continue reading
1
#75 - The Dark Side of AI: When will Autonomous AI Cyber Weapons Begin?
34:02
34:02
Play later
Play later
Lists
Like
Liked
34:02AI is changing security fastāhear how Deep Sentinel stops crime in real time and why AI scams are the next big threat. Must-listen for staying ahead! With DeepSentinel CEO and AI expert Dave Selinger.By Extra Something Media
…
continue reading
In this episode of The BlueHat Podcast, host Nic Fillingham and Wendy Zenone are joined by Felix Boulet fresh off his participation in Zero Day Quest. Felix talks about his unique journey from industrial maintenance to becoming a full-time vulnerability researcher, and how that background fuels his passion for hacking and bug bounty work. He explaiā¦
…
continue reading
In this episode of The BlueHat Podcast, host Nic Fillingham and Wendy Zenone are joined by Marco Ivaldi, co-founder and technical director of HN Security, a boutique company specializing in offensive security services, shares his journey from hacking as a teenager in the '80s to becoming a key figure in the security research community. With nearly ā¦
…
continue reading
1
From Facebook-Phished to MVR Top 5 with Dhiral Patel
41:07
41:07
Play later
Play later
Lists
Like
Liked
41:07In this episode of The BlueHat Podcast, host Nic Fillingham and Wendy Zenone are joined by Dhiral Patel, Senior Security Engineer at ZoomInfo and one of MSRCās Most Valuable Researchers (MVR). Dhiral shares how a hacked Facebook account sparked his passion for ethical hacking. From web development to penetration testing, Dhiral has become a top bugā¦
…
continue reading
Can AI act as your compliance officer and protect your privacy? On episode #74, personal.ai co-founder Suman Kanuganti talks AI personas, data security & the future of private, personal AI products.By Extra Something Media
…
continue reading
1
AI & the Hunt for Hidden Vulnerabilities with Tobias Diehl
33:53
33:53
Play later
Play later
Lists
Like
Liked
33:53In this episode of The BlueHat Podcast, host Nic Fillingham and Wendy Zenone are joined by security researcher Tobias Diehl, a top contributor to the Microsoft Security Research Center (MSRC) leaderboards and a Most Valuable Researcher. Tobias shares his journey from IT support to uncovering vulnerabilities in Microsoft products. He discusses his pā¦
…
continue reading
1
#73 - The Practical Side of NFT's and Blockchain - How to Create Your Own Opportunities
21:30
21:30
Play later
Play later
Lists
Like
Liked
21:30Forget the complex technology - learn how to create opportunities and make real income from your digital work product without learning blockchain! With author and entrepreneur Debbie Soon.By Extra Something Media
…
continue reading
1
#72 - Why the Future of Business Relies on Quantum & AI
32:10
32:10
Play later
Play later
Lists
Like
Liked
32:10By Extra Something Media
…
continue reading
1
#71 - The 80/20 Rule of AI: How to Save Time and Boost Productivity
25:01
25:01
Play later
Play later
Lists
Like
Liked
25:01Learn how the 80/20 rule of AI boosts productivity! Save time on emails, SOPs, and sales with ChatGPT, Google Gemini, & Copilot. More at DIYCyberGuide.com. With AI Coach Jonathan Mast.By Extra Something Media
…
continue reading
1
#70 - How to Save Money by Talking to Your Tech Team
25:39
25:39
Play later
Play later
Lists
Like
Liked
25:39You know time and money can be wasted on any project if you don't know what to ask your team during the process. Tech Teams are no exception. With technology expert and author Douglas Squirrel.By Extra Something Media
…
continue reading