Translating Cyber into Plain Terms. Newest AI, Social Engineering, and Ransomware Attack Insight to Protect Businesses and Reduce Risk. Latest Cyber News from the Dark web, research, and insider info. Interviews of Global Technology Leaders, sharing True Cyber Crime stories and advice on how to manage cyber risk. Find all content at www.CyberCrimeJunkies.com and videos on YouTube @CyberCrimeJunkiesPodcast
…
continue reading
Cyber Crime Junkies. Host David Mauro Podcasts
Titania Jordan. Best-selling author, CMO of Bark, and regular TV Guest on national TV shows, Titania Jordan, joins us to discuss Parenting in a Tech World. We discuss: Common misconceptions and Parental Challenges today The Role and Responsibilities Social Media companies have and should have Best Practices and Practical Suggestion to manage the te…
…
continue reading

1
Protecting your Identity and Brand. Expert Panel Discussion.
46:55
46:55
Play later
Play later
Lists
Like
Liked
46:55New Episode with Special Guest John McLaughlin. Keeping your brand out of the news from a reputation-damaging data breach is top priority for sound leadership. Keeping criminal hackers out of your private information and stopping them from having unauthorized access to data they have no right to access, often depends on one critical factor: identif…
…
continue reading

1
Biggest Cyber Insurance Mistakes To Avoid
58:02
58:02
Play later
Play later
Lists
Like
Liked
58:02Joined by Joseph Brunsman discussing how to avoid cyber insurance mistakes, biggest cyber insurance mistakes to avoid, and how to transfer risk for SMBs. Send us a text Growth without Interruption. Get peace of mind. Stay Competitive-Get NetGain. Contact NetGain today at 844-777-6278 or reach out online at www.NETGAINIT.com Support the show 🔥New Sp…
…
continue reading
This conversation explores the rapid advancements of AI in healthcare, emphasizing the importance of compliance and the risks associated with shadow AI. It discusses the necessity of prompt training for safe AI usage, the evolving threats of ransomware and social engineering, and the implications of deepfakes in cybersecurity. The conversation conc…
…
continue reading

1
How Self Sovereign Identity Can Protect You Online
1:04:56
1:04:56
Play later
Play later
Lists
Like
Liked
1:04:56Joe Casanova joins us. Joe is the founder and CEO of Furlough, a thriving digital ecosystem of more than 20k entrepreneurs, brand owners, marketers, and digital pros that fosters career-upskilling and business growth via collaboration. Joe has a decade of experience helping brands to grow and innovate across the e-commerce, influencer, tech, and be…
…
continue reading

1
How the FBI fights Cyber Crime. Four Truths.
58:42
58:42
Play later
Play later
Lists
Like
Liked
58:42Ever wondered what really happens in a cyber crime manhunt and take-down? What the FBI actually does in cybersecurity? How they help the publc? Today we got the rare chance to sit down with Special Agent with the FBI’s Cyber Crime Division (RET.), Scott Augenbaum. He shares practical ways how to protect yourself online. His model called the Four (4…
…
continue reading

1
AI Risks EXPOSED--How Hackers Use AI Today
1:05:02
1:05:02
Play later
Play later
Lists
Like
Liked
1:05:02Don't let your small business fall victim to devastating cyber attacks! Expert joins us t discuss AI Risks exposed. We explore how hackers use AI to target small businesses. From AI Social engineering to data theft, learn what you need to know to protect your business from cyber threats. Send us a text Growth without Interruption. Get peace of mind…
…
continue reading

1
AI and Your Privacy. Digital Citizenship Today.
1:02:31
1:02:31
Play later
Play later
Lists
Like
Liked
1:02:31This is the story of AI and Your Privacy. Digital Citizenship Today. Antoinette King, Author of the book Digital Citizens Guide to Cybersecurity. She is the founder of Credo Cyber Consulting, LLC, who has over 20 years of experience in the security industry, from physical security to digital security. Grab her book: https://www.amazon.com/Digital-C…
…
continue reading

1
🔥Marketing Warfare: How A New Framework is IGNITING Small Business Growth
54:42
54:42
Play later
Play later
Lists
Like
Liked
54:42David Mauro and co-host Zach Moskow engage with Kevin McGrew, author of 'The New Rules of Marketing Warfare.' They discuss the intersection of marketing and leadership, emphasizing the importance of frameworks in business strategy. Kevin shares insights on the SMAC framework (Shoot, Move, Adapt, Communicate) and how it can help businesses navigate …
…
continue reading

1
Ransomware Negotiations EXPOSED: Inside Cyber Hostage Deals with Kurtis Minder
1:00:43
1:00:43
Play later
Play later
Lists
Like
Liked
1:00:43Kurtis Minder, seasoned ransomware negotiator, shares insights into the complex world of cybercrime negotiations. He discusses the psychological aspects of negotiating with cybercriminals, the role of AI in both offense and defense, and the importance of understanding the motivations behind cybercrime. The conversation also touches on the evolving …
…
continue reading

1
Crypto Fraud Exposed - How Cyber Crime Turns Violent
32:34
32:34
Play later
Play later
Lists
Like
Liked
32:34This is the true cyber crime story of Lamborghini Carjackers Lured by a $243M Cyber heist, a dive into crypto fraud cases and how cyber crime turns violent. This episode explores the dramatic rise and fall of Ray Diaz, a young man entangled in a world of cybercrime, luxury, and violence. It delves into the consequences of doxxing, the ruthless natu…
…
continue reading

1
Higher Education under Cyber Attack. Clemson CISO John Hoyt.
56:47
56:47
Play later
Play later
Lists
Like
Liked
56:47John Hoyt, the CISO of Clemson University, shares his journey into cybersecurity and discusses the top cyber risks in higher education. He recounts his first experience with an ethical hacker and how it sparked his interest in the field. Hoyt emphasizes the importance of cyber resiliency and preparedness in the face of evolving threats. We discuss …
…
continue reading
We are joined today by special guest, former FBI special agent Nancy Aguilar, who had worked the Boston Marathon Bombing and other high-profile investigations. She is also the host and creator of Baddass in heels: https://badassinheels.com/ We discuss: FBI Profiling and negotiation, FBI Profiling and counter terrorism, and other key topics: how fbi…
…
continue reading

1
Social Media Crimes EXPOSED🚨Internet Safety
59:22
59:22
Play later
Play later
Lists
Like
Liked
59:22They thought they found love… Instead, they walked straight into a digital slaughterhouse. In this shocking episode of Cyber Crime Junkies, host Dean Mauro and Dr. Sergio Sanchez expose the dark world of pig butchering scams — where victims are “fattened up” with trust before being bled dry financially and emotionally. We reveal: · The $1M “Brad Pi…
…
continue reading

1
From RUSSIA with Love. JAILED Hacker SPILLS Powerful Secrets!
1:13:47
1:13:47
Play later
Play later
Lists
Like
Liked
1:13:47In this exclusive interview, a former ransomware hacker reveals the shocking truth behind a devastating supply chain attack that brought a major organization to its knees. From the initial breach to the final ransom demand, our insider shares never-before-heard secrets about the tactics, techniques, and procedures used to pull off the heist. You wo…
…
continue reading
Maril Vernon joins us, sharing her inspiring story and how she became Top Hacker this year. Without a technical background she transformed her career and broker into cybersecurity, becoming a 1-person Purple Team. Topics: how to become a top hacker for business, how to become a top woman in cyber security, ways to break into cyber security from mar…
…
continue reading
The dangers that lurk on the Dark Web. Many people who have visited have said they have seen things they never wanted to see. We take you there. We explain why it’s so important for everyone to know what’s there since we provide a roadmap to you, your family and the brands we all serve These are the true crime stories about what happens when we shi…
…
continue reading

1
Modern Ways to Improve Presentation Skills with Nausheen Chen.
50:55
50:55
Play later
Play later
Lists
Like
Liked
50:55Nausheen Chen joins us. She is a wildly popular professional public speaking coach with clients like leaders at Google, Amazon and huge brands like Timberland and more. Check out her site:www.speaking.coach Nausheen has a free course we encourage you to check out! https://www.speaking.coach/free-course/ She shares her insights on modern ways to imp…
…
continue reading

1
Horror Stories Of When Data Back-ups Fail
56:49
56:49
Play later
Play later
Lists
Like
Liked
56:49Shocking stories from a global leader Gabe Gambill with Quorum covering horror stories of when data back ups fail, saving yourself when data back ups fail, and how to get back data after ransomware. Send us a text Growth without Interruption. Get peace of mind. Stay Competitive-Get NetGain. Contact NetGain today at 844-777-6278 or reach out online …
…
continue reading

1
Cyber Careers Demystified. What Employers Want.
1:16:51
1:16:51
Play later
Play later
Lists
Like
Liked
1:16:51Cybersecurity expert, teacher and coach, TJ Houston, joins us to discuss what employers want for cybersecurity careers, and share real ways how to start a career in cybersecurity with no experience, how to get entry level cybersecurity job and other insights. We cover career options in cybersecurity, how to start a career in cybersecurity with no e…
…
continue reading

1
Harnessing Emerging Tech: Imagination and AI in Brand Growth, and the Perils of 'Too Big to Fail"
56:44
56:44
Play later
Play later
Lists
Like
Liked
56:44When technology can do everything for us, what is left? Imagination. That is the intrigue in a soon-to-be-released book coming by Dr Lydia Kostopoulos, who holds a PHD in International Relations, Security and Political Science, having attended the Harvard Kennedy school for Cybersecurity. We discuss: Harnessing Emerging Tech: Imagination and AI in …
…
continue reading

1
What Makes A GREAT Leader Today? Secret Communication Skills Revealed.
58:41
58:41
Play later
Play later
Lists
Like
Liked
58:41In today's fast-paced and ever-changing world, leadership is more crucial than ever. But what makes a GREAT leader in this new era? Is it their ability to adapt to change, their capacity to inspire and motivate their team, or their willingness to take calculated risks? We'll explore the key characteristics and qualities that define a GREAT leader i…
…
continue reading

1
Shadows Within: A Spy Unmasks How Insider Risk Affects Cyber Security
55:07
55:07
Play later
Play later
Lists
Like
Liked
55:07Former Spy and intelligence officer, Shawnee Delaney, join us. She is the founder and CEO of Vaillance Group (https://www.vaillancegroup.com) and spent nearly a decade with the Defense Intelligence Agency (DIA) as a decorated Clandestine Services Officer conducting Human Intelligence (HUMINT) operations all over the world. She served four combat zo…
…
continue reading
Jospeh Hudson, Director of Growth at TCM Security join sus in the studio. An experienced recruiter, former teacher, involved parent and thought-leader in the cyber security space Joe shares insight into how to avoid land minds in job searching. Topics: landminds in job searching, land minds in job searching, job searching in security, job searching…
…
continue reading

1
Insider Secrets--Top 5 Human Resource Strategy and Leadership Skills
55:19
55:19
Play later
Play later
Lists
Like
Liked
55:19Host Dean Mauro interviews Amy Cappellanti-Wolf, CHRO with Dayforce, an experienced Chief Human Resources Officer, discussing the importance of AI in HR, HR Technology, Human Resource Strategy and Leadership Skills. Send us a text Growth without Interruption. Get peace of mind. Stay Competitive-Get NetGain. Contact NetGain today at 844-777-6278 or …
…
continue reading