DIY Cyber Guy, hosted by David W. Schropfer, offers a approachable exploration of cybersecurity, emerging technologies (like AI and Quantum Computing) for all knowledge levels. Through dynamic podcasts, expert interviews, and engaging blog posts, DIY Cyber Guy provides practical, easy-to-apply tips to stay ahead of tech trends and protect your digital world. Whether you're curious about cutting-edge tech or looking to secure your online life, DIY Cyber Guy makes complex topics both fun and a ...
…
continue reading
Cryptojack Podcasts
Thought leaders and experts Max Aulakh (Ignyte) and Joel Yonts (Secure Robotics) cover subjects such as the development of AI, cyber security and the how the future looks in terms of cyber risk.
…
continue reading
CSIAC's Mission Mission Statement CSIAC is chartered to leverage the best practices and expertise from government, industry, and academia in order to promote technology domain awareness and solve the most critically challenging scientific and technical problems in the following areas: Cybersecurity and Information Assurance, Software Engineering, Modeling and Simulation, and Knowledge Management/Information Sharing.
…
continue reading
Security Unlocked presents The BlueHat Podcast From 2020 to 2022, Security Unlocked, hosted by Nic Fillingham and Natalia Godyla, explored the technology and people powering Microsoft's Security solutions. Today, the Security Unlocked feed brings you new episodes from The BlueHat Podcast where hosts Nic Fillingham and Wendy Zenone speak with security researchers, responders, hackers and industry leaders, both inside and outside of Microsoft, working to secure the planet's technology and crea ...
…
continue reading
1
#87: How to Use AI to Create a Competitive Advantage Without Losing Control
24:22
24:22
Play later
Play later
Lists
Like
Liked
24:22AI can fuel your edge—or leak your data. In this episode, RealVNC CPO/CTO Neil Gad joins David to unpack zero-trust, workspace segmentation, and why 94% of orgs saw identity/access incidents last year. Learn concrete steps to harness AI without losing control.By Extra Something Media
…
continue reading
1
#86: Are You Drowning In Account Sprawl, And Don't Know It?
23:16
23:16
Play later
Play later
Lists
Like
Liked
23:16Are you sure every login in your company is legit? Cybersecurity leader Matt Topper exposes the hidden chaos of account sprawl—where forgotten logins and shadow SaaS tools quietly drain budgets and open doors for hackers. Learn how simple, free steps can tighten security and save thousands.By Extra Something Media
…
continue reading
1
#85 – What Happens When A Fortune 5 Company Fails Cybersecurity 101
19:26
19:26
Play later
Play later
Lists
Like
Liked
19:26Even Fortune 5 firms fail at Cybersecurity 101. Paul Tracey discusses how small businesses and even home users can block the same attacks.By Extra Something Media
…
continue reading
1
#84 - Is Your Data Secure When You Use AI?
28:52
28:52
Play later
Play later
Lists
Like
Liked
28:52Is Your Data Secure When You Use AI? Navy intel veteran, engineer, and attorney Cordell Robinson reveals how AI handles your data, what to share, and practical steps to protect privacy, comply with standards, and avoid mistakes.By Extra Something Media
…
continue reading
1
#83 - Zero Cost Pathway to American Cybersecurity
27:44
27:44
Play later
Play later
Lists
Like
Liked
27:44Frustrated by cybersecurity losses? Guest Larry Clinton, President of the Internet Security Alliance (ISA) proposes a zero-cost solution. By eliminating redundant regulations and creating a tuition-for-service program, we can enhance our defenses and train 10,000 new cyber pros annually.By Extra Something Media
…
continue reading
1
#82 - The Phishing Paradox: Why Security Training Might Be Making You MORE Vulnerable
34:14
34:14
Play later
Play later
Lists
Like
Liked
34:14Discover the surprising reason security training may be making you an easy target for hackers, and the better way to fight back. With CyberHoot CEO Craig Taylor.By Extra Something Media
…
continue reading
1
#81 – Picking the Right Balance between Security and User Satisfaction
22:59
22:59
Play later
Play later
Lists
Like
Liked
22:59Strict security vs. smooth user experience—can you have both? Hear David W. Schropfer & Daniel DeGroff tackle CIAM, FusionAuth's evolution, and real-world trade-offs.By Extra Something Media
…
continue reading
1
#80- Are you keeping up with Data Governance post-AI?
26:21
26:21
Play later
Play later
Lists
Like
Liked
26:21AI is reshaping data governance—and raising big compliance questions. David W. Schropfer and Anthony Woodward unpack risks, silos, and solutions on DIY Cyber Guy.By Extra Something Media
…
continue reading
1
#79 - AI and CCTV: Yes, it's here. No, it's not Big Brother (yet)
35:52
35:52
Play later
Play later
Lists
Like
Liked
35:52Can AI spot threats without spying on you? Loretta AI's Galvin Widjaja joins DIY Cyber Guy to reveal how smart surveillance protects privacy—no facial recognition required.By Extra Something Media
…
continue reading
1
Hunting Variants: Finding the Bugs Behind the Bug
39:51
39:51
Play later
Play later
Lists
Like
Liked
39:51In this episode of The BlueHat Podcast, host Nic Fillingham is joined by George Hughey from Microsoft who returns to discuss his Blue Hat India talk on variant hunting, explaining how MSRC uses submission data from hacking competitions like Pwn2Own and Tianfu Cup to uncover additional security vulnerabilities in Windows. George shares how incentive…
…
continue reading
1
#78- Cybercriminals Aggressively Shifting to Easier Targets: Small & Medium Businesses
33:53
33:53
Play later
Play later
Lists
Like
Liked
33:53The average ransomware claim is down, but incidents are up. What does that mean? Threat actors are targeting smaller businesses, and Business Email Compromise (BEC) is the attack of choice. With Dan Candee @CorkCyber.By Extra Something Media
…
continue reading
Marcus Fontoura (CTO of Microsoft's Azure Core) discusses why AI may not reduce dev team sizes but instead raises quality expectations, just like spell check did for writing.By Extra Something Media
…
continue reading
1
Securing Redirections with Mike Macelletti
41:22
41:22
Play later
Play later
Lists
Like
Liked
41:22In this episode of The BlueHat Podcast, host Nic Fillingham and Wendy Zenone are joined by Mike Macelletti from Microsoft’s MSRC Vulnerabilities and Mitigations team to explore Redirection Guard, a powerful mitigation designed to tackle a long-standing class of file path redirection vulnerabilities in Windows. Mike shares how his interest in securi…
…
continue reading
1
#76 – Using AI in Cybersecurity: Best Practices for Small/Medium Businesses
27:53
27:53
Play later
Play later
Lists
Like
Liked
27:53AI is transforming cybersecurity in businesses of every size. In Ep. 76 of DIY Cyber Guy, RAD Security's Jimmy Mesta explains how AI tools fight phishing, cut costs & boost IT.By Extra Something Media
…
continue reading
1
Ignore Ram Shankar Siva Kumar’s Previous Directions
39:15
39:15
Play later
Play later
Lists
Like
Liked
39:15In this episode of The BlueHat Podcast, host Nic Fillingham and Wendy Zenone share Ram Shankar Siva Kumar’s dynamic keynote from BlueHat India 2025, where he explores the evolving threat landscape of AI through the lens of the Microsoft AI Red Team. From adversarial machine learning to psychosocial harms and persuasive AI, Ram highlights real-world…
…
continue reading
1
Protecting AI at the Edge with David Weston
38:36
38:36
Play later
Play later
Lists
Like
Liked
38:36In this episode of The BlueHat Podcast, host Nic Fillingham and Wendy Zenone share David Weston’s keynote from BlueHat India 2025. David explores the growing role of on-device AI in Windows, the security risks it introduces, and how Microsoft is rethinking architecture to defend against new threats like model tampering, data exfiltration, and AI-po…
…
continue reading
1
#75 - The Dark Side of AI: When will Autonomous AI Cyber Weapons Begin?
34:02
34:02
Play later
Play later
Lists
Like
Liked
34:02AI is changing security fast—hear how Deep Sentinel stops crime in real time and why AI scams are the next big threat. Must-listen for staying ahead! With DeepSentinel CEO and AI expert Dave Selinger.By Extra Something Media
…
continue reading
In this episode of The BlueHat Podcast, host Nic Fillingham and Wendy Zenone are joined by Felix Boulet fresh off his participation in Zero Day Quest. Felix talks about his unique journey from industrial maintenance to becoming a full-time vulnerability researcher, and how that background fuels his passion for hacking and bug bounty work. He explai…
…
continue reading
In this episode of The BlueHat Podcast, host Nic Fillingham and Wendy Zenone are joined by Marco Ivaldi, co-founder and technical director of HN Security, a boutique company specializing in offensive security services, shares his journey from hacking as a teenager in the '80s to becoming a key figure in the security research community. With nearly …
…
continue reading
1
From Facebook-Phished to MVR Top 5 with Dhiral Patel
41:07
41:07
Play later
Play later
Lists
Like
Liked
41:07In this episode of The BlueHat Podcast, host Nic Fillingham and Wendy Zenone are joined by Dhiral Patel, Senior Security Engineer at ZoomInfo and one of MSRC’s Most Valuable Researchers (MVR). Dhiral shares how a hacked Facebook account sparked his passion for ethical hacking. From web development to penetration testing, Dhiral has become a top bug…
…
continue reading
Can AI act as your compliance officer and protect your privacy? On episode #74, personal.ai co-founder Suman Kanuganti talks AI personas, data security & the future of private, personal AI products.By Extra Something Media
…
continue reading
1
AI & the Hunt for Hidden Vulnerabilities with Tobias Diehl
33:53
33:53
Play later
Play later
Lists
Like
Liked
33:53In this episode of The BlueHat Podcast, host Nic Fillingham and Wendy Zenone are joined by security researcher Tobias Diehl, a top contributor to the Microsoft Security Research Center (MSRC) leaderboards and a Most Valuable Researcher. Tobias shares his journey from IT support to uncovering vulnerabilities in Microsoft products. He discusses his p…
…
continue reading
1
#73 - The Practical Side of NFT's and Blockchain - How to Create Your Own Opportunities
21:30
21:30
Play later
Play later
Lists
Like
Liked
21:30Forget the complex technology - learn how to create opportunities and make real income from your digital work product without learning blockchain! With author and entrepreneur Debbie Soon.By Extra Something Media
…
continue reading
1
#72 - Why the Future of Business Relies on Quantum & AI
32:10
32:10
Play later
Play later
Lists
Like
Liked
32:10By Extra Something Media
…
continue reading
1
#71 - The 80/20 Rule of AI: How to Save Time and Boost Productivity
25:01
25:01
Play later
Play later
Lists
Like
Liked
25:01Learn how the 80/20 rule of AI boosts productivity! Save time on emails, SOPs, and sales with ChatGPT, Google Gemini, & Copilot. More at DIYCyberGuide.com. With AI Coach Jonathan Mast.By Extra Something Media
…
continue reading
1
#70 - How to Save Money by Talking to Your Tech Team
25:39
25:39
Play later
Play later
Lists
Like
Liked
25:39You know time and money can be wasted on any project if you don't know what to ask your team during the process. Tech Teams are no exception. With technology expert and author Douglas Squirrel.By Extra Something Media
…
continue reading
1
#69 – Post-Holiday Retail Fraud Roundup, and How To Stop Fraud In 2025
32:01
32:01
Play later
Play later
Lists
Like
Liked
32:01Online fraud exploded by 692% last holiday season. Many types of online fraud can fought with Blockchain, but what about physical goods? Listen to our interview with Blockchain Expert and Entrepreneur Noam Krasniansky.By Extra Something Media
…
continue reading
1
#68 - The Misconceptions of AI - What Everybody Needs to Know
42:13
42:13
Play later
Play later
Lists
Like
Liked
42:13Everyone, in every job, will be impacted by AI, but maybe not in the way you think. Listen to this insightful interview with AI expert Nada Sanders, Ph.D., Professor at Northeastern University and prolific author.By Extra Something Media
…
continue reading
1
#67 -"Computer Use" AI: What Is It, and What Jobs Will Be Impacted?
21:42
21:42
Play later
Play later
Lists
Like
Liked
21:42AI has entered into a new category called Computer Use AI. Listen to this episode to discover what it means, who will use it, and which jobs could be affected. With Dan Van Dyke from EMarketer.By Extra Something Media
…
continue reading