Search a title or topic

Over 20 million podcasts, powered by 

Player FM logo

Cyber Awareness Podcasts

show episodes
 
Artwork

1
Cyber Crime Junkies

Cyber Crime Junkies. Host David Mauro.

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly+
 
Translating Cyber into Plain Terms. Newest AI, Social Engineering, and Ransomware Attack Insight to Protect Businesses and Reduce Risk. Latest Cyber News from the Dark web, research, and insider info. Interviews of Global Technology Leaders, sharing True Cyber Crime stories and advice on how to manage cyber risk. Find all content at www.CyberCrimeJunkies.com and videos on YouTube @CyberCrimeJunkiesPodcast
  continue reading
 
Cyber defenders, listen up! The CYFIRMA Research podcast has some juicy intel on the latest cyber threats that are lurking in the shadows. Tune in to this security briefing to stay on top of emerging threats and be ready to tackle digital risk like never before.
  continue reading
 
Artwork

1
Darnley's Cyber Café

Darnley's Cyber Café

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
Embark on a journey with us as we explore the realms of cybersecurity, IT security, business, news, technology, and the interconnected global geopolitical landscape. Tune in, unwind with your preferred cup of java (not script), and engage in thought-provoking discussions that delve into the dynamic evolution of the world around us.
  continue reading
 
The Awareness Angle makes cybersecurity make sense. Hosted by Anthony and Luke, we break down the biggest cyber stories of the week. From phishing scams and AI fraud to major data breaches and the sneaky ways people get hacked, we explain what’s going on and why it matters. But this isn’t just another tech podcast. We focus on the human side of cybersecurity. How scams actually work, why people fall for them, and what we can all do to stay safer online. You’ll get practical tips, real-world ...
  continue reading
 
Artwork

1
The Cyber Sleuth Show

Cyber Social Hub

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Step into the world of digital forensics, mobile forensics, OSINT, and cybersecurity with The Cyber Sleuth Show! Hosted by Kevin DeLong, this podcast dives deep into the ever-evolving landscape of digital investigations, featuring expert guests, cutting-edge tools, real-world case insights, and, of course, the occasional terrible dad joke. From law enforcement investigators and forensic analysts to OSINT specialists and cybersecurity pros, we uncover the latest trends, techniques, and challe ...
  continue reading
 
Confused about the latest cybercrime in the news? Overwhelmed by trying to figure out if an incident applies to you? Want to learn simple, actionable steps to keep you and your family safe online? Introducing Bee Cyber Fit, a podcast for the Yale University community and beyond. We’ll cut through the cyber mumbo jumbo and make cybersecurity awareness easy to digest. Every two weeks we’ll share compelling cyber stories, make sense of buzzwords and share a simple call to action. Scammers are e ...
  continue reading
 
Artwork

1
Simply Defensive

Simply Cyber Media Group

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
Join us for Simply Defensive, a podcast dedicated to exploring the world of defensive cybersecurity through the lens of real-world experts. In each episode, we'll interview leading professionals from the cybersecurity industry, delving into their experiences, challenges, and innovative solutions. Whether you're a seasoned cybersecurity veteran or just starting to learn about the field, Simply Defensive offers valuable insights and practical advice to help you stay ahead of the curve. Tune in ...
  continue reading
 
Artwork
 
Welcome to my Cyber Security Podcast. To give you a better idea of what you can expect, I’ll be covering a wide range of topics in the cyber security field, including what you can do to protect yourself from cyber threats. This podcast is for everyone, from the most experienced cybersecurity professional to the complete beginner. So stay tuned for the latest updates in cyber security!
  continue reading
 
Explore the life of a security leader with NetSPI Field Chief Information Security Officer (CISO) Nabil Hannan. Hear how CISOs with diverse expertise tackle the challenges and opportunities that come with life on the frontlines of cybersecurity.
  continue reading
 
Cyber Security happens all over the world. This podcast is focused on Cyber Security from the Asian perspective. Listen to interviews, discussions, insights and get to the issues that matters most, affecting business from the cyber perspective around the region. The episodes on this podcast is shorter than your drive home!
  continue reading
 
Artwork
 
Cyber Security, data breaches, Hackers, Chief Information Security Officers, Talking Cyber Security (formerly 'The Australian CISO') is a podcast for anyone interested in Cyber Security. Hear about data breaches, cyber news, how security personnel 'tick', how to answer questions at an interview, lessons learnt while doing the security role, how security people network, how they succeed etc. Use the email address [email protected] to make comments, pose questions or even ask to be on ...
  continue reading
 
Artwork

1
The CyberDap Podcast

Daniel Agyemang Prempeh - TheCyberDap

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Safeguarding Your Business in the Digital Age Welcome to The Cyberdap Podcast, your go-to resource for navigating the complex world of cybersecurity tailored specifically for small and medium business owners. In an era where digital threats lurk around every corner, staying ahead of cyber attacks is paramount to the success and security of your business. Join us as we delve deep into the ever-evolving landscape of cybersecurity, shedding light on the latest threats, vulnerabilities, and atta ...
  continue reading
 
Artwork

1
Simplifying Cyber

Aaron Pritz, Cody Rivers

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
This show features an interactive discussion, expert hosts, and guests focused on solving cyber security and privacy challenges in innovative and creative ways. Our goal is for our audience to learn and discover real, tangible, usable ideas that don't require a huge budget to accomplish. Shows like “How It’s Made” have become popular because they explain complicated or largely unknown things in easy terms. This show brings the human element to cyber security and privacy.
  continue reading
 
Welcome to our podcast. In each episode we dive into cyber security and management of your security efforts. We'll help you succeed with frameworks, templates, and experts who have tried it before. There's plenty of podcasts about technology and cyber security. So that's not us. Instead, we'll focus on the human aspect of cyber security and processes and frameworks you can use to create effect security work in your company. Your host is Anders Bryde Thornild from www.cyberpilot.io. Each epis ...
  continue reading
 
Artwork

1
UAB TechKnow

University of Alabama at Birmingham

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Welcome to UAB TechKnow! We are here to help the UAB community better connect with technology on campus. We introduce tips to keep you secure and cover things like new software and updates.
  continue reading
 
Welcome to the Re-Thinking the Human Factor podcast. It’s a podcast for information security professionals, where we will be asking our guests to share thoughts and insights on security awareness, behaviour and culture. Our guests come, predominately, from outside of the security industry. They all specialise in elements of awareness, behaviour and culture, or they have effectively tackled similar challenges, in their own industry or careers. The one thing that unites them all is their willi ...
  continue reading
 
The IT Business Podcast is a show for MSPs (Managed Service Providers) and IT Professionals providing business network support and managed services. The podcast aims to provide actionable advice and tips that help IT businesses survive and grow in the competitive tech industry. The podcast features guest interviews with seasoned IT professionals, business owners, vendors and industry leaders who share their experiences, insights, and strategies for success. These discussions often cover topi ...
  continue reading
 
The Voice of Cybersecurity for MSPs & MSSPs! The CyberCall is the weekly podcast where cybersecurity meets business reality. Hosted by Andrew Morgan, Founder of Right of Boom, this is the go-to show for Managed Service Providers (MSPs), virtual CISOs (vCISOs), and IT leaders navigating the complex world of cyber risk, compliance, and AI. Each episode features raw, practical conversations with the sharpest minds in cybersecurity—from operators in the trenches to CISOs, researchers, policymake ...
  continue reading
 
Welcome to The Cyber Insider by Emsisoft. In our monthly episodes we take you behind the scenes of the cyber world with exclusive interviews, insights, and expert analysis. Tune in to stay ahead of the game. Have questions, suggestions, or stories to share? We'd love to hear from you! Email: [email protected] Twitter: @emsisoft Facebook: @Emsisoft
  continue reading
 
Without trust, society stagnates, economies decline, and businesses fail. This podcast series keeps abreast of the latest trends and challenges in cyber and physical security with interviews, event updates, industry suppliers & government initiatives.
  continue reading
 
Artwork

1
Better in Bavaria

U.S. Army Garrison Bavaria

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
U.S. Army Garrison Bavaria's Better in Bavaria podcast, where we share stories and highlight the people behind them - the Soldiers and Army civilians who support our readiness mission all while making our community a great place to work, live and raise a family. - Hosted by Linda A. Read and Andreas Kreuzer - Produced by Kayla Overton, Natalie Simmel, and Ella Händel
  continue reading
 
Artwork

1
The Cyber Queens Podcast

Maril Vernon, Erika Eakins, and Amber Devilbiss

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
“WHERE ARE THE WOMEN IN CYBER?” The Landscape In 2022 the cyber security field still consists of 24% women and only 2.2% LGBTQ+ minorities. Long-perpetuated gender, age, and demographic biases held by the ‘Baby Boomer’ and Gen-X groups have led to a severe gap in the representation and advancement of women and minorities in this field. Millennials entered the workforce and attempted to forge a new way by asking for small changes; but definitely conceding others. Currently the Boomers/Gen-X a ...
  continue reading
 
What's in the SOSS? features the sharpest minds in security as they dig into the challenges and opportunities that create a recipe for success in making software more secure. Get a taste of all the ingredients that make up secure open source software (SOSS) and explore the latest trends at the intersection of AI and security, vulnerability management, and threat assessments. Each episode of What's in the SOSS? is packed with valuable insight designed to foster collaboration and promote stron ...
  continue reading
 
🎙️ Dive into the world of cybersecurity with Cubic Lighthouse Podcast - your expert companion in navigating the latest developments and crucial topics in the field. We dissect complexities, provide strategic insights, and ensure you stay abreast of cutting-edge trends. Whether you're a seasoned professional or a cybersecurity enthusiast, join us for concise expertise and actionable intelligence to enhance your security posture. 🌐🔐
  continue reading
 
Artwork

1
Unspoken Security

Unspoken Security

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Unspoken Security is a raw and gritty podcast for security professionals who are looking to understand the most important issues related to making the world a safer place, including intelligence-driven security, risks and threats in the digital and physical world, and discussions related to corporate culture, leadership, and how world events impact all of us on and off our keyboards. In each episode, host AJ Nash engages with a range of industry experts to dissect current trends, share pract ...
  continue reading
 
Artwork

1
Cybility Savvy

Michala Liavaag

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Bite-sized information about cybersecurity for not-for-profit boards and leaders. In each episode we help leaders of not-for-profits to understand the information security risks to their organisations and they leave with at least one actionable insight that they can put into practice. It also features interviews with not-for-profit leaders sharing their cybersecurity journey, insights and lessons learned.
  continue reading
 
Artwork
 
A podcast where I speak with people about their career path. Focusing on their decisions, success, advice, key traits, career moves, mentoring and listening to interesting stories. This podcast is an interesting perspective on how careers can take a linear path to success, but all often career paths take a zig-zag path. Fun Stuff to learn about. Enjoy!
  continue reading
 
Artwork

1
unsuitable on Rea Radio

Rea & Associates

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Designed to challenge old-school business practices and the traditional business suit culture, on unsuitable on Rea Radio you'll hear industry professionals speak about meaningful, modern solutions to help you enhance your company’s growth. Hosted by Doug Houser.
  continue reading
 
The BCI Podcast features conversations with business continuity & resilience professionals from around the world offering insight and guidance on current affairs topics affecting businesses around the globe, as well as tips and insight into career development within the industry.
  continue reading
 
Artwork

4
A Tale of Two Hygienists Podcast

Andrew Johnston, RDH - One of the Two Dental Hygienists

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly+
 
Welcome to the world's #1 dental hygiene podcast! You will get up-to-date information with some real life application. Andrew and his panel of cohosts are exactly where you are, dental professionals looking to get better! We may not be experts, but we will do our best to get them on the show! Please rate and review us on iTunes or your favorite podcast app and enjoy the show!
  continue reading
 
Artwork
 
Join us at the intersection of networking and security! Whether you’re fending off ransomware attacks, securing remote workers, hunting for rogue IoT devices, or gearing up for your latest compliance audit, Packet Protector provides practical information that IT and infrastructure pros can put to work. Every episode covers the latest security headlines and then drills into essential topics to provide technical and strategic insights on wired and wireless network security, access control, clo ...
  continue reading
 
Unhackable - a virtually impossible state of being only made plausible through consistent cybersecurity best practices by everyone simultaneously. This is Unhackable, the authoritative Security podcast about deception and personal security. Can you ever be truly Unhackable? No, nobody can. But every episode is designed to help you move forward using actionable cybersecurity best practices that are within reach of everyone. We help you take the steps needed to solve your most important Cybers ...
  continue reading
 
Closing The Gender Pay Gap is the podcast for thoughtful HR leaders in technology and cybersecurity companies who want to do more to develop and retain their female talent. Sharing tips, techniques and talent pipeline strategies to help technology companies do more to attract, develop and retain female talent to strengthen the female talent pipeline and close the gender pay gap. From promotions to pay cheques, latest figures reveal men are still out-earning women at work in the technology se ...
  continue reading
 
Loading …
show series
 
This week on The Awareness Angle Interviews, Anthony chats with Lori Steuart—a cybersecurity marketer with a passion for storytelling, content that resonates, and turning awareness from a box-tick into something people actually care about. From synthesisers to password managers, from yoga habits to ransomware planning, Lori brings a refreshingly hu…
  continue reading
 
The vast number of companies affected by ransomware attacks highlights the urgent need to ramp up educational work on cybercrime, according to a Fraud Advisory Panel trustee. The business community needs to be educated extensively on how to tackle cyber threats, said Lee Fitzgerald, Barclays International Fraud Risk Strategy Director. Published: 26…
  continue reading
 
Picture this: you’re scrolling through social media, trying to piece together clues for a case, but the sheer volume of posts, profiles, and comments is overwhelming. Sound familiar? That’s why you need to tune into this episode of The Cyber Sleuth Show with Kevin DeLong and Josh Janow, CEO of SMI Aware. Josh pulls back the curtain on how his team …
  continue reading
 
In this episode of Cyber Crime Junkies, host Dean Mauro explores listener question of who do hackers target the most. He explains the real truth about cyber crime, recent examples of Cyber crime This year, Small business cyber attacks, and he evaluates FBI IC3 Report 2025 Send us a text Growth without Interruption. Get peace of mind. Stay Competiti…
  continue reading
 
Joining us is Matthew Rosenquist, a massively followed thought leader and Top Voice. A renowned CISO, Cybersecurity leader and strategist, we discuss the role of security leadership, cultural differences on data privacy, importance of choosing trustworthy vendors, and how to stop zero day attacks. Send us a text Growth without Interruption. Get pea…
  continue reading
 
Are you tired of customers dreading compliance and security talk? In this episode, I chat with Jared Casner of Blacksmith InfoSec, who’s making compliance accessible for every MSP and SMB. Discover their “paint-by-numbers” approach to policy management, seamless ConnectWise integrations, and how their flexible platform creates new revenue streams f…
  continue reading
 
CYFIRMA exposes Octalyn Forensic Toolkit, a malicious GitHub-hosted tool masquerading as a legitimate forensic utility. In reality, it functions as a credential stealer with Telegram-based C2, targeting browser data, crypto wallets, Discord, and VPN configs. Built with Delphi and C++, Octalyn enables even low-skilled actors to exfiltrate sensitive …
  continue reading
 
In this episode, I get the inside scoop from Reese Tuttle, whose passion for stopping cybercrime is rooted in family and real-world experience. We discuss AP2T Labs’ patent-pending training platform: from social media and business-based attacks to text, voice, and even physical mail scams. Reese details how their “edu moments” and instant feedback …
  continue reading
 
Join me and Kip Fanta as we reveal how MSPs can break free from the “vendor” label and become true business partners. Learn why strategic management, AI-powered insights, and a collaborative approach are the keys to thriving in today’s IT landscape. Kip shares how their two-sided platform enables both MSPs and clients to collaborate, capture ideas,…
  continue reading
 
Clinicians often do not pay attention to cyber security... thats for the owners and managers, right? Wrong! Cyber criminals have become so sophisticated, they can target anyone in the team and not in the way you think they might. Give this episode a listen with Paul Murphy to find out your role in keeping your patients safe and secure in their dent…
  continue reading
 
Stay ahead with CYFIRMA’s Monthly Ransomware Report – June 2025. June saw 463 ransomware victims globally, a 15% decline from May. Qilin led the threat landscape, exploiting Fortinet flaws and adding legal pressure tactics. New players like Fog and Anubis adopted stealthy, modular toolkits and file-wipers for maximum damage. Emerging groups Teamxxx…
  continue reading
 
I'm your host Gary Nowak and I am honored to have as a guest a young man who has served our country with 5 years in the military. Adam Mowl is a self proclaimed Renaissance man with a great foundation for life and very strong character. Career Background: Served at a Marine for 5 years and spent 1 year in Afghanistan tracking high value targets Sin…
  continue reading
 
Dr. Sergio Sanchez—former leader and advisor at Apple, The Vatican, Activision and medical doctor—exposes how cybercriminals are using AI in healthcare and AI Social Engineering to clone voices, fake identities, and empty your savings without a trace. But that’s just the beginning… In this mind-blowing episode, we dive into: · The dark side of AI (…
  continue reading
 
There’s lots of juicy stories in our monthly security news roundup. The Scattered Spider hacking group makes effective use of social engineering to target MSPs, Microsoft pushes for better Windows resiliency by rethinking kernel access policies for third-party endpoint security software, and the US Justice Department files indictments against alleg…
  continue reading
 
Curious how today’s top MSPs are saving hours on QBRs and strategic planning? Alex Markov of Strategy Overview shares the inside scoop on their AI-powered platform, IT Glue integration, and how real-world feedback drives innovation. Alex reveals the major updates since last year—including automated QBRs with Arya, expanded reporting for Office 365,…
  continue reading
 
Join CRob as he sits down with Ram Iyengar, OpenSSF's India community representative, to explore the unique challenges and opportunities of promoting open source security in one of the world's largest developer communities. Ram shares his journey from computer science professor to developer evangelist, discusses the launch of LF India, and reveals …
  continue reading
 
New Threat Model: Zero-Click Compromise via File Rendering Automation RenderShock introduces a powerful new attack framework that leverages trusted file previewing, indexing, and sync mechanisms to trigger payloads — without exploits, macros, or even opening the file. Key Highlights: Zero-click execution using passive system features. Payloads deli…
  continue reading
 
In this episode of The CyberCall, we're cutting through the noise and rethinking the true purpose of the vCISO role. It’s not just about frameworks, policies, and tech stacks, it’s about tying risk to business outcomes (risk to revenue). The vCISO’s true value goes way beyond compliance checklists and technical jargon; it’s about being a business p…
  continue reading
 
Albeit older statistics (from 2012) state that 91% of adults have had tooth decay and more recent statistics show almost half of adults over 30 years old have periodontal disease. At the same time in 2019 we had 87% of children see the dentist and 65% of adults went to the dentist. If people are going to the dentist, why do we still have crazy high…
  continue reading
 
CYFIRMA Research's latest report explores a fake "Free VPN for PC" app hosted on GitHub, delivering a packed DLL payload using obfuscated Base64 hidden in junk strings. It uses P/Invoke to load a hidden DLL, executes GetGameData, and injects into legit processes like MSBuild.exe. Packed, evasive, and anti-debug. Link to the Research Report: https:/…
  continue reading
 
Are you tired of chasing cold leads and competing with dozens of MSPs for the same customer? In this episode, I chat with Skofi, the mastermind behind Find My IT Partner, who’s on a mission to reinvent how IT providers and SMBs connect. We talk about the power of curated matches, the importance of trust, and why his platform is more “cyber matchmak…
  continue reading
 
This week on The Awareness Angle, Anthony Davis and Luke Pettigrew dive into a week full of sharp turns—from a teen hacker forcing Microsoft to rethink its bounty program, to hackers hijacking a decades-old video game to take control of PCs. Also in the mix: 64 million job seekers exposed by a single password, suspicious Google Ads requests, Instag…
  continue reading
 
Today we are joined by Doug Thorpe. Doug is an experienced leadership coach, business advisor, and speaker who focuses on helping small to mid-size business owners and executives develop their leadership capabilities. With decades of experience in banking, finance, and business management, Thorpe transitioned to coaching and advisory services to he…
  continue reading
 
If you manage care about protecting yourself, your loved ones—and your organization-- this episode offers actionable takeaways you can use today. This is part of our official Cyber Crime Junkies podcast series—subscribe wherever you listen! ✅ **Don’t forget to like, subscribe, and hit the bell 🔔.** 💬 Comment your “worst phishing attempt” below—I’ll…
  continue reading
 
David Mauro and DeWayne Hart explore the critical aspects of building a cyber security mindset, understanding cyber security awareness, internet governance in cyber security, and importance of culture in cybersecurity. Send us a text Growth without Interruption. Get peace of mind. Stay Competitive-Get NetGain. Contact NetGain today at 844-777-6278 …
  continue reading
 
Scott Augenbaum, retired FBI Agent in the Cyber Division shares his truths framework about the FBI vs Cyber Crime and the fbi perspective of cyber crime. Topics: fbi perspective of cyber crime, fbi view of cyber crime, explaining the fbi stance on cyber crime, lessons learned from fbi on cyber crime, lessons on cyber crime from fbi, war between the…
  continue reading
 
We often discuss the need for saliva on the microscopic level as it relates to oral and systemic connections. Let's pull back just a bit to see a more basic issue - digestion. Salivary flow is essential in so many ways and its our role to provide practical solutions. Dr. Gatta joins the show today to discuss what solutions he recommends to patients…
  continue reading
 
Get ready for an insightful conversation with Bhadri Varadarajan of HitWit, a PitchIT finalist at IT Nation Connect 2025. We dive into the nuts and bolts of AI-powered knowledge sharing, from onboarding and interactive learning to customer engagement and support. Bhadri explains how HitWit’s platform helps MSPs deliver fast, knowledgeable responses…
  continue reading
 
Are you tired of feeling lost when it comes to MSP sales? This episode brings you the game-changing insights of Jean Templin, co-founder of NAYAK, who’s on a mission to help IT pros sell better, smarter, and faster. Learn how AI-driven coaching and emotional intelligence can transform your sales process and give you the confidence to close more dea…
  continue reading
 
Why does security awareness training so often fail? In this episode of Unspoken Security, host AJ Nash welcomes Living Security CEO Ashley M. Rose to discuss this common issue. They explore how compliance-driven, "check-the-box" training creates a false sense of security. This old model relies on vanity metrics and rituals instead of reducing actua…
  continue reading
 
Ever wondered what happens when a global IT giant acquires a renowned marketing firm? Tune in as Heather Simek and I unpack the Kaseya-TMT deal and its real impact on MSPs. From the inside scoop on industry rumors to how this move reshapes marketing, peer groups, and community, Heather brings her signature candor and expertise. Plus, we share stori…
  continue reading
 
Cybercrime Junkies Podcast interviews former NATO specialist and international intelligence expert, Nadja El Fertasi, about the role played by emotional intelligence in cyber security and Emotional Intelligence in AI. We discuss emotional firewalls, learning EQ (emotional intelligence) and how it can stop social engineering attacks, how internation…
  continue reading
 
Growing up, braces were always wires and brackets and sometimes, for those lucky ones, headgear. Today the landscape looks much different and dental hygienists are often leading the discussions with patients, advocating for ortho treatment. On this episode, Dr. Ilan Abramowitz gives us insight to the raging battle of which is better: Clear Aligners…
  continue reading
 
Are you an MSP owner still stuck handling procurement late into the night? In this episode, Rayanne Buchianico reveals how ABC Solutions’ new outsourced procurement service can give you your time—and your weekends—back. Hear how her team’s hands-on, white-labeled solution integrates seamlessly with your PSA, keeps your margins intact, and lets you …
  continue reading
 
Ever struggled to get your clients to care about cybersecurity? Adam Anderson from ThreatCaptain shares how their platform helps MSPs translate complex cyber risks into clear financial impacts that business leaders understand. Find out how one MSP turned a simple simulation into $7,000 in new monthly revenue, and why talking dollars and cents is th…
  continue reading
 
Supply chain attacks doubled according to the 2025 Verizon DBIR. This week the channel awakens to Ingram Micro being attacked by the SafePay Ransomware group. Incident Response (IR) expert, Chris Loehr, EVP of Solis joins The CyberCall, to share perspective on the GlobalProtect VPN compromise. That’s why today on today's CyberCall, we’re talking ab…
  continue reading
 
I'm your host Gary Nowak and today I've had the great honor of reconnecting with a former colleague and extremely successful consultant @Greg Tucker Career Background: Award winning CXO, CMO, Chief Customer Officer Chief Journey mapper, heling companies better understand the customer journey Self employed with his highly successful consulting compa…
  continue reading
 
CYFIRMA uncovers a sophisticated phishing campaign by APT36 (Transparent Tribe) leveraging Linux-specific malware on BOSS Linux systems (widely used by Indian government agencies). Attackers use malicious .desktop files to deploy stealthy ELF binaries while distracting users with fake PowerPoint files. Stay vigilant and safeguard critical infrastru…
  continue reading
 
The Ingram Micro cyber incident sent shockwaves through the IT world, but it’s more than just a headline—it’s a wake-up call for MSPs and IT providers everywhere. In this episode, I’m joined by Michael Crean to discuss the real impact, the lessons we all need to learn, and why compassion and community matter most when crisis hits. Let’s turn disrup…
  continue reading
 
Ever wish you could turn those low-fit contracts into real cash—or acquire new clients without the headaches of traditional M&A? Matt Yesbeck, co-founder of MSPX, reveals how his platform is turning managed service contracts into currency. Hear the story behind the first marketplace designed for MSPs to buy, sell, and value contracts, and learn how…
  continue reading
 
Periodontal re-evaluation timing is essential for all therapeutic hygiene procedures... but when should this be done? We have heard a range of recommendations but listen in as Katrina breaks it down based on the case type! Resources: More Fast Facts: https://www.ataleoftwohygienists.com/fast-facts/ Katrina Sanders Website: https://www.katrinasander…
  continue reading
 
This week on The Awareness Angle, Anthony Davis and Luke Pettigrew unpack everything from text scams and AI scrapers to school shutdowns and insider threats. It’s a mix of the strange, the serious, and the preventable, plus a few thoughts on whether changing the Blue Screen of Death was really necessary. Episode note - In this episode, we mention t…
  continue reading
 
Loading …
Copyright 2025 | Privacy Policy | Terms of Service | | Copyright
Listen to this show while you explore
Play