Learn how to break into cybersecurity, build new skills and move up the career ladder. Each week on the Cyber Work Podcast, host Chris Sienko sits down with thought leaders from Carbon Black, IBM, CompTIA and others to discuss the latest cybersecurity workforce trends.
…
continue reading
Cyber Security Consultant Podcasts
Weekly information security podcast airing Monday mornings hosted by Oscar Minks and Brad Nigh. In a unique focus on protecting personal information, Oscar and Brad discuss information security as an issue that includes cyber security, physical security, as well as administrative controls. Oscar is the CTO of FRSecure and heads technical services and operations at the company. Brad is the Principal Security Consultant and a 20+ year veteran of the industry.
…
continue reading

1
CISSP Cyber Training Podcast - CISSP Training Program
Shon Gerber, vCISO, CISSP, Cybersecurity Consultant and Entrepreneur
Join Shon Gerber on his weekly CISSP Cyber Training podcast, where his extensive 23-year background in cybersecurity shines through. With a rich history spanning corporate sectors, government roles, and academic positions, Shon imparts the essential insights and advice necessary to conquer the CISSP exam. His expertise is not just theoretical; as a CISSP credential holder since 2009, Shon translates his deep understanding into actionable training. Each episode is packed with invaluable secur ...
…
continue reading
The Expert Podcast brings you firsthand narratives from experts across diverse industries, including private investigators, general contractors and builders, insurance agencies, vehicle specialists, lawyers, and many others.
…
continue reading
Thuis aan de keukentafel praat Roel Rens met Microsoft- en IT-experts over actuele IT-topics.
…
continue reading
Interested in staying safe online or a cyber security professional? Leading cyber security consultant and advisor, Beverley Roche talks to global experts, academics and researchers to provide insights on the issues impacting the cyber security profession and our connected life. If you're interested in updates on current professional practice or protecting your online experience against criminal or unauthorised access, this podcast will help you with tips to protect your online identity and data.
…
continue reading
What are today’s most pressing criminal trends and how are compliance experts adapting to counter those threats? As financial crimes become increasingly sophisticated, compliance can no longer be just a checkbox. It’s emerged as a transformative force in every industry, reshaping practices in ethics, risk management, money laundering and cyber security. Introducing BCG on Compliance, a biweekly podcast from Boston Consulting Group where we dive deep into the minds driving that change. Hosted ...
…
continue reading
This podcast is dedicated for those who want to stay up to date with the Cybersecurity Maturity Model Certification news. It utilizes Notebook LM to synthesize news articles from Jun Cyber's blog as well as other official CMMC documentation and produces a podcast. Podcast Description Disclaimer: The content presented in CMMC News is generated by AI and is intended for informational and educational purposes only. It should not be taken as official guidance for Cybersecurity Maturity Model Cer ...
…
continue reading

1
Reduce Cyber Risk Podcast - Cyber Security Made Simple
Shon Gerber, vCISO, CISSP, Cyber Security Consultant, Author and Entrepreneur
Shon Gerber from the Reduce Cyber Risk podcast provides valuable insights, guidance, and training to you each week that only a senior cyber security expert and vCISO can perform. Shon has over 23+ years of experience in cyber security from large corporations, government, and as a college professor. Shon provides you the information, knowledge, and training needed to help protect your company from cyber security threats. Shon weekly provides cyber security training topics covering: Insider Th ...
…
continue reading
If you’re a managed security provider (MSP), managed security service provider (MSSP), virtual CISO, or a cybersecurity professional looking for insights and advice on ways to build bridges with your clients (or vice versa), look no further than Cyber for Hire | The Managed Security Podcast! Presented in partnership with MSSP Alert and ChannelE2E, Cyber for Hire, is a weekly 60-minute podcast (in two 30-minute segments) hosted by Ryan Morris, Principal Consultant at Morris Management Partner ...
…
continue reading
If you’re a managed security provider (MSP), managed security service provider (MSSP), virtual CISO, or a cybersecurity professional looking for insights and advice on ways to build bridges with your clients (or vice versa), look no further than Cyber for Hire | The Managed Security Podcast! Presented in partnership with MSSP Alert and ChannelE2E, Cyber for Hire, is a weekly 60-minute podcast (in two 30-minute segments) hosted by Ryan Morris, Principal Consultant at Morris Management Partner ...
…
continue reading
The Abstract Forward Cyber Strategy Podcast is a show where we interview security, technology, and business leaders. Our goal is to shine a light on the tactics, tools, and strategy that will improve organizational security and operational efficiency – this includes breaking the corporate bureaucratic status quo which plagues organizations. Disclaimer: This podcast does not represent the views of former or current employers and/or clients. This podcast will make every reasonable effort to ve ...
…
continue reading
The Cyber Consulting Room Podcast and Meetup Network is your gateway to a world of knowledge and collaboration in the ever-evolving realm of cyber security and consulting. Our podcast, hosted by Gordon Draper, brings you in-depth interviews with industry leaders, experts, and trailblazers, offering invaluable insights, strategies, and experiences. From award-winning professionals to those paving the way for diversity in the field, we delve into the most pressing issues and emerging trends. B ...
…
continue reading
Looking for a career in cybersecurity, Information Technology, web design, programming? We interview the leaders in the field to give you the best information to make the decision. As an instructor of cybersecurity, I discuss the challenges and the benefits with practitioners in their fields of expertise to assist students in getting into the field they desire. As someone that has faced the same challenges, I want to make sure that you do not have the same issues.
…
continue reading
Secret weapon podcast to the Law Firm Owner, Managing Partner, Legal Admin, Office Manager and IT Director on marketing, motivation, legal tech, security, work-life balance, business growth and much more.Expert advice from your colleagues who have already tackled the challenges you’ve going through right now. Their advice will help your law firm be competitive, keep your attorneys & staff productive and help you get and keep clients.Subscribe and stop going at it alone to keep your Law Firm ...
…
continue reading
LegalFuel is the official Florida Bar Podcast. This monthly series is brought to you by The Practice Resource Center of The Florida Bar and will feature esteemed leaders in law discussing new and innovative topics. Its purpose is to help members of The Florida Bar as well as attorneys from other states run better practices and provide better legal services to their clients. Disclaimer: The views expressed by the participants of this program are their own and do not represent the views of, no ...
…
continue reading
CISOs insiders is open conversations I’m having with leading CISOs in the industry. We’ll be talking about what makes them ticks, their biggest accomplishments and flagrant failures, their favorite drinks and what it is they like in vendors as well as dislike in vendors. We’ll try to tap into the mind of the person behind the role and hopefully have some fun while doing so. Join us for a light talk.
…
continue reading
It’s easy to get lost in the space that is cybersecurity which encompasses dozens of specialty areas that can be further segmented into more than 50 career roles. Andrew Hoffritz, a cybersecurity enthusiast and professional, interviews a diverse selection of cybersecurity-minded professionals worldwide each month and pulls back the curtain on how to break into the cybersecurity field, discussing unique skills and why cybersecurity is a continuously growing field. Each episode contains powerf ...
…
continue reading
The Tech Leaders Podcast brings you candid conversations with established technology leaders, at some of the world's most incredible organisations. From the challenges of sustainable growth, through to continuous innovation and everything in-between. These are the behind-the-scenes stories and personal anecdotes of inspirational leaders at the forefront of the digital revolution.
…
continue reading
Dive deep into the dynamic marketing realm in the digital age with The Backstory on Marketing and AI, hosted by Guy Powell, the visionary President of ProRelevant Marketing Solutions. This enlightening podcast is your gateway to understanding the intricate interplay between data-driven marketing strategies and cutting-edge AI technologies. Each episode brings to the table candid and insightful conversations with some of the industry's most influential leaders and analytics experts. They shar ...
…
continue reading
Welcome to "Defending Digital Frontiers," a podcast dedicated to the fascinating, ever-evolving world of cybersecurity. Your guides on this digital journey are Andrei Lyskov, a seasoned data scientist with a passion for all things tech, and Eli Farhood, a veteran in digital risk management and finance. Andrei Lyskov, currently CEO of gnos.ai, an AI first cybersecurity consulting company and Eli Farhood worked at financial institutions like HSBC, Refco and Wells Fargo before falling victim to ...
…
continue reading
Introducing The Techtual Talk - the ultimate podcast for exploring the exciting world of technology and promoting diversity in the industry! Join us as we delve into the many avenues available in tech, including non-technical roles, and shine a spotlight on the representation of African Americans and other people of color in this space. We believe that every child, regardless of their background, should have the opportunity to discover and pursue a fulfilling career in technology. With The T ...
…
continue reading
Kitecast features interviews with security, IT, compliance, and risk management leaders and influencers, highlighting best practices, trends, and strategic analysis and insights.
…
continue reading
Bringing you the latest news, views and experiences in Technology, Talent and Transformational change hosted by CTO, Author and leading Tech For Good advocate Prof. Sally Eaves @sallyeaves. With weekly episodes and an inspiring diversity of guests from some of the most pioneering organisations, projects and people of our time, this is Your engaging space to learn from C-Suite to Student, CIO to Academic and Enterprise to SME. Our shows focus on the latest innovations in emergent technology i ...
…
continue reading
Brief conversations with entrepreneurs, innovators, and company founders
…
continue reading
Welcome to the PRMA Risk Ready podcast, the show for Risk Management Professionals in the High Net Worth Space.
…
continue reading
Upgrade Your Future with actionable advice from the world’s most brilliant minds in technology and human science. Join multi-million dollar business founder, leadership coach, neuroscience junkie, and Navy Seal wannabe Javier Guerra. Each episode, we're sharing powerful advice from global thought leaders. Presented by: TechHuman.com
…
continue reading

1
The Electric Revolution: How EVs Went from Niche to Must-Have
3:13
3:13
Play later
Play later
Lists
Like
Liked
3:13Episode Description Are electric vehicles finally hitting their stride in mainstream America? According to Auto blog, many states are seeing significant acceleration in EV purchases and registrations. But this cultural shift comes with complex considerations that every potential buyer should understand. Key Topics Covered: EV Adoption Trends - Grow…
…
continue reading

1
Digital Witnesses: Unlocking the Secret Data Your Car Has Been Recording About You
4:45
4:45
Play later
Play later
Lists
Like
Liked
4:45Episode Description Your car knows more about you than you think. Every modern vehicle comes equipped with a black box system that records detailed data about your driving habits, passenger activity, and vehicle operations - and this information can be extracted and analyzed by forensic experts. Key Topics Covered: Vehicle Black Box Basics - How mo…
…
continue reading

1
The Invisible Attack Surface: Why 87% of Data Breaches Start Where You're Not Looking
4:38
4:38
Play later
Play later
Lists
Like
Liked
4:38Episode Description Discover how cybercriminals are exploiting the devices you never suspected could be security risks. From apartment building intercoms to smoke detectors, learn why every connected device in your business could be an open door for hackers. Key Points Covered: Real-World Attack Example: Apartment building hacked through intercom s…
…
continue reading

1
The Cyber Talent Crisis: Building Your Security Dream Team Without Breaking the Bank
4:02
4:02
Play later
Play later
Lists
Like
Liked
4:02Episode Description Explore the ongoing cybersecurity skills shortage and discover innovative solutions for efficient cyber protection staffing. Learn how companies are leveraging shared cyber talent through insurance partnerships to address the talent crisis without breaking budgets. Key Topics Covered The Persistent Cybersecurity Skills Gap Ongoi…
…
continue reading

1
Battery Detective: The Complete Guide to Checking Your EV's Health, Range, and Lifespan
4:25
4:25
Play later
Play later
Lists
Like
Liked
4:25Episode Description As electric vehicles become a larger percentage of the used car market, evaluating a used EV requires a completely different approach than traditional gasoline vehicles. While gas cars have multiple components to inspect (engine, transmission, brakes), electric vehicles have one critical component that represents 60-80% of the v…
…
continue reading

1
The Blind Spots That Kill Businesses: 7 Hidden Risks Every Entrepreneur Ignores
5:16
5:16
Play later
Play later
Lists
Like
Liked
5:16Episode Description Cyber liability insurance is heating up in the commercial space, but there are hidden risks that even insurance brokers sometimes overlook. This episode reveals critical third-party cyber risks that could devastate your business and how to protect yourself from threats you didn't even know existed. Key Points Covered: Third-Part…
…
continue reading

1
The 72-Hour Rule: How One Simple Trick Helped Me Recover $15,000 From Romance Scammers (And How You Can Too)
6:18
6:18
Play later
Play later
Lists
Like
Liked
6:18Episode Description Discover why looking beyond the scammer is crucial for fraud recovery. Learn how major US banks are inadvertently enabling foreign scammers and what legal options you have as a victim. This episode reveals the third-party liability strategies used in major fraud cases and how you can apply them to your situation. Key Topics Cove…
…
continue reading

1
Shell Game: How Montana's Anonymous LLCs Became America's Favorite Money Laundering Loophole
4:51
4:51
Play later
Play later
Lists
Like
Liked
4:51Episode Description The Montana LLC vehicle registration scheme is heating up as multiple states launch investigations and crackdowns on out-of-state residents using Montana LLCs to dodge taxes and registration fees. This episode explores how states are fighting back with new technology and enforcement measures. Key Points Covered: The Growing Inve…
…
continue reading

1
Bonded Titles Decoded: Your Step-by-Step Guide to Getting a Surety Bond When You Can't Prove Car Ownership
3:03
3:03
Play later
Play later
Lists
Like
Liked
3:03Episode Description Learn the complete process of obtaining a surety bond for a bonded title when you can't prove car ownership. This episode breaks down everything you need to know about getting a title bond, from costs to where to buy one instantly online. Key Topics Covered What is a surety bond for vehicle titles? Certificate from a bonding age…
…
continue reading

1
Trapped by Paper Trail: The Hidden Bureaucracy That's Holding Your Car Hostage
4:03
4:03
Play later
Play later
Lists
Like
Liked
4:03Episode Description Frustrated with DMV runarounds and endless paperwork when trying to get your car title? There's actually a method to their madness. In this episode, we dive deep into why the DMV makes it so difficult to obtain vehicle titles and how their bureaucratic processes are designed to protect you, previous owners, and prevent fraud. We…
…
continue reading

1
Ep. 186 The Honest Truth about Security+, Govtech, & working helpdesk Ft. Symone Beez
1:50:48
1:50:48
Play later
Play later
Lists
Like
Liked
1:50:48book one on one time with me here: https://calendly.com/techtuaulconsulting ------------------------------------------------------------------------------------ In this episode of The TechTual Talk, @symonebeez shares her real journey into tech, dispels common misconceptions about breaking into the industry, talks about the value of hard work and r…
…
continue reading

1
CCT 273: Mastering CISSP Exam Questions - Five Challenging Scenarios
25:58
25:58
Play later
Play later
Lists
Like
Liked
25:58Send us a text Check us out at: https://www.cisspcybertraining.com Get access to 360 FREE CISSP Questions: https://www.cisspcybertraining.com/offers/dzHKVcDB/checkout Get access to my FREE CISSP Self-Study Essentials Videos: https://www.cisspcybertraining.com/offers/KzBKKouv A catastrophic data loss incident involving South Yorkshire Police serves …
…
continue reading

1
Leading Through Uncertainty: A Crisis Playbook for Compliance Leaders with Satnam Lehal
21:43
21:43
Play later
Play later
Lists
Like
Liked
21:43In compliance, moments of uncertainty can define careers and reshape organizations. But what does it take to make sound judgments under intense pressure? How do you steer a team through a crisis without overpromising or losing trust? To explore these questions, our guest host and BCG senior executive Bernhard Gehra, is joined by senior compliance p…
…
continue reading

1
From stealing servers to saving lives: Working in red teaming | Jim Broome
56:50
56:50
Play later
Play later
Lists
Like
Liked
56:50Get your FREE Cybersecurity Salary Guide: https://www.infosecinstitute.com/form/cybersecurity-salary-guide-podcast/?utm_source=youtube&utm_medium=podcast&utm_campaign=podcast Jim Broome of Direct Defense has been doing red teaming since before it became a term — back when a "pentest" meant $25,000, no questions asked and walking out with a server u…
…
continue reading

1
CCT 272: Confidentiality, Integrity, Availability, Authenticity, and Nonrepudiation (CISSP Domain 1.2)
41:58
41:58
Play later
Play later
Lists
Like
Liked
41:58Send us a text Check us out at: https://www.cisspcybertraining.com/ Get access to 360 FREE CISSP Questions: https://www.cisspcybertraining.com/offers/dzHKVcDB/checkout Get access to my FREE CISSP Self-Study Essentials Videos: https://www.cisspcybertraining.com/offers/KzBKKouv The core principles of cybersecurity aren't just theoretical concepts—the…
…
continue reading

1
Beyond the Algorithm: Why Human Creativity and Connection Will Always Matter in an AI World
4:16
4:16
Play later
Play later
Lists
Like
Liked
4:16Episode Description In this thought-provoking episode, we explore how to remain productive, successful, and valuable in an AI-dominated future. While artificial intelligence continues to advance rapidly, there are still uniquely human qualities that will always matter in the marketplace and in life. Key Topics Covered Historical Context of Technolo…
…
continue reading

1
Silent Killer: How Salt Corrosion is Secretly Destroying EV Batteries from the Inside Out
4:58
4:58
Play later
Play later
Lists
Like
Liked
4:58Episode Description Discover the hidden threat that could destroy your electric vehicle investment overnight. While traditional car corrosion takes years to develop, salt water can render an EV battery completely worthless in a fraction of the time. Learn why this invisible damage is more dangerous than you think and how to protect your investment.…
…
continue reading

1
The Psychology of Freedom: How Everett Dean Martin Redefined Liberty in Modern Society
4:05
4:05
Play later
Play later
Lists
Like
Liked
4:05Episode Description Discover how a 100-year-old book can predict today's political and cultural conflicts. We explore Everett Dean Martin's groundbreaking 1930 work "Liberty" and how its insights remain startlingly relevant to our current social turmoil. Key Topics Covered Historical parallels - Why the political and cultural conflicts of today mir…
…
continue reading

1
The AI Career Paradox: Why Your Next Promotion Might Depend on the Robot You're Afraid Will Replace You
4:04
4:04
Play later
Play later
Lists
Like
Liked
4:04Episode Description In this thought-provoking episode, we explore the dual nature of AI's impact on the workplace and your career trajectory. While artificial intelligence promises unprecedented economic growth and productivity gains over the next decade, the critical question remains: who will actually benefit from this transformation? Key Topics …
…
continue reading

1
The Hidden Exit Strategy: Step-by-Step Guide to Car Loan Short Sales and Lien Releases
2:19
2:19
Play later
Play later
Lists
Like
Liked
2:19Episode Description Learn about the comprehensive car short sale process with our new free guide! This episode covers everything you need to know about vehicle short sales, from lean releases to magistrate requests. Key Topics Covered Free Car Short Sale Guide Available Six-step process for vehicle short sales Step-by-step PDF instructions with exa…
…
continue reading

1
The Hidden Goldmine: How to Legally Claim Abandoned Vehicle Titles and Turn Rust into Cash
2:44
2:44
Play later
Play later
Lists
Like
Liked
2:44Episode Description This week we dive deep into the mechanics lien and storage lien process for automotive facilities dealing with abandoned vehicles on their property. Learn the essential six-step process to legally obtain titles for vehicles that have been left behind, allowing you to sell them or take ownership to recover unpaid repair costs. Ke…
…
continue reading

1
The Next Digital Storm: Why a Massive Ransomware Wave Is Building and How to Prepare
3:00
3:00
Play later
Play later
Lists
Like
Liked
3:00Key Takeaways Don't be fooled by the quiet - Just because cyber attacks haven't been prominent in recent news doesn't mean the threat has disappeared Government agencies are sounding the alarm - CIA, Department of Justice, and FBI are warning about a serious new wave of ransomware attacks New threat on the horizon - The Medusa ransomware platform i…
…
continue reading

1
The $50,000 Email That Never Came: How One Text Message Saved a Home Purchase from Wire Transfer Fraud
3:59
3:59
Play later
Play later
Lists
Like
Liked
3:59Episode Description Wire transfer fraud has become the most common cybercrime targeting the real estate industry, with scammers stealing millions from unsuspecting home buyers. The American Land Title Association is now warning realtors, mortgage companies, and title companies about these sophisticated scams where criminals hijack email conversatio…
…
continue reading

1
Ep. 185 IT Helpdesk helped Triple his income
1:38:12
1:38:12
Play later
Play later
Lists
Like
Liked
1:38:12Learn how you can work with me one on one to secure a $90K+ cybersecurity role: https://techtualconsulting.tech/video-training ------------------------------------------------------------------------------------ In this episode of The TechTual Talk, HD interviews Tavis Mitchell, a former coaching client who tripled his salary by leveraging help des…
…
continue reading

1
CCT 271: Configuration Management (CISSP Domain 7.3)
34:03
34:03
Play later
Play later
Lists
Like
Liked
34:03Send us a text Check us out at: https://www.cisspcybertraining.com/ Get access to 360 FREE CISSP Questions: https://www.cisspcybertraining.com/offers/dzHKVcDB/checkout Get access to my FREE CISSP Self-Study Essentials Videos: https://www.cisspcybertraining.com/offers/KzBKKouv Dive deep into the critical world of configuration management with Sean G…
…
continue reading

1
The Hidden Architecture: How Elite Family Offices Build Their Professional Dream Teams
4:12
4:12
Play later
Play later
Lists
Like
Liked
4:12What You'll Learn in This Episode: Family Office Fundamentals - Understanding what a family office is and why wealthy individuals create these professional management teams Core Professional Team Structure - The essential roles including attorneys, accountants, tax experts, domestic staff managers, and project managers Beyond the Ultra-Wealthy - Ho…
…
continue reading

1
The AI Takeover Myth: Why Your Job Isn't Doomed (But Your Skills Need an Upgrade)
5:24
5:24
Play later
Play later
Lists
Like
Liked
5:24Key Points Discussed: Corporate AI Warning: A CEO from Lemonade (fintech/cyber insurance company) warns that most companies will fail the "AI test" - but this applies far beyond insurance to every industry The Longevity vs. Immortality Principle: Just because your company has been around for decades doesn't guarantee survival - adaptation is key to…
…
continue reading

1
Trapped by Paper: How to Break Free When Someone Puts a Bogus Lien on Your Car Title
4:05
4:05
Play later
Play later
Lists
Like
Liked
4:05Episode Description Learn the step-by-step process to dispute and remove invalid liens from your vehicle title. While we primarily focus on motor vehicle liens, these same principles apply to real estate liens as well. Get expert guidance on identifying fraudulent liens and taking action to clear your title. Important Disclaimer: We are not attorne…
…
continue reading

1
Beyond Firewalls: The New Arsenal of Cyber Defense Strategies Every Business Needs Now
2:57
2:57
Play later
Play later
Lists
Like
Liked
2:57Episode Description Discover how cyber liability insurance has evolved beyond traditional coverage to become a comprehensive cyber defense strategy. Learn how the right insurance provider can serve as your external IT security department, offering proactive threat monitoring, vulnerability alerts, and incident response teams—all while potentially c…
…
continue reading

1
The 3-Second Security Breach: Why Your 'Secure' System Is Already Compromised
4:01
4:01
Play later
Play later
Lists
Like
Liked
4:01Episode Description Discover how hackers easily infiltrate your "secure" systems and what you can do about it. This episode reveals the shocking truth about cybersecurity vulnerabilities and explores why cyber insurance might be your best defense in 2025. Key Topics Covered: How Hacks Begin - All cyberattacks start with finding weak points in your …
…
continue reading

1
The $10 Million Question: Why Cyber Liability Just Became Every CEO's Worst Nightmare
2:27
2:27
Play later
Play later
Lists
Like
Liked
2:27Episode Description Business leaders face countless risks daily, but recent surveys reveal a shocking truth: cyber threats now rank as the #1 concern for CEOs worldwide - surpassing even climate risk and traditional business hazards. Despite this alarming reality, less than 30% of companies have adequate cyber liability insurance protection, while …
…
continue reading

1
When Traditional Insurance Walks Away: How Parametric Coverage Fills the Gap in Abandoned Markets
4:00
4:00
Play later
Play later
Lists
Like
Liked
4:00Episode Description What happens when insurance carriers abandon entire markets due to natural disasters? From fire insurance in California to flood coverage in Florida, traditional insurers are pulling out of high-risk areas, leaving property owners scrambling for alternatives. This episode explores parametric insurance - an innovative solution th…
…
continue reading

1
Trapped in Your Trade-In: The Hidden Crisis of Negative Equity and Your Path to Freedom
3:41
3:41
Play later
Play later
Lists
Like
Liked
3:41Episode Description In this episode, we dive deep into the complex world of negative equity car loans and explore a critical strategy that many consumers overlook: validating the legitimacy of your original auto loan. If you're underwater on your car loan, owing more than your vehicle is worth, or struggling with unaffordable payments, this episode…
…
continue reading

1
When Algorithms Become Influencers: How AI is Secretly Shaping What You See, Share, and Believe on Social Media
3:24
3:24
Play later
Play later
Lists
Like
Liked
3:24Episode Description Dive deep into the world of artificial intelligence and its growing influence on social media platforms. This episode explores why tech companies are betting big on AI, how AI agents are reshaping digital workflows, and what this means for both consumers and the workforce. Key Topics Covered: Why Tech Companies Are Pushing AI So…
…
continue reading

1
Unsecurity Episode 244: Journey to Pen Testing w/ Morgan Trust
32:48
32:48
Play later
Play later
Lists
Like
Liked
32:48We're back! Pen Tester and Team Ambush member Morgan Trust walks us through his journey into the cybersecurity field. With a can-do approach, Morgan discusses how he has developed professionally, expanding his expertise across public speaking and competitive hacking. His presentation, "The New Era of Deception: AI, Deep Fakes, and The Dark Web" has…
…
continue reading

1
#117: "ITAM is the first thing I do in a new company" - Renata Vincoletto, CISO at Civica
54:54
54:54
Play later
Play later
Lists
Like
Liked
54:54Join us this week for The Tech Leaders Podcast, where Gareth sits down with Renata Vincoletto, CISO at Civica. After facing a deeply shocking setback, Renata chose resilience over resentment. Inspired by her mentor, she pushed forward, rising through the ranks to ultimately lead cybersecurity strategy for Civica, working on high-stakes government a…
…
continue reading

1
The Hidden Fortune Hunt: How to Uncover Secret Trusts, Missing Wills, and Lost Family Assets
5:27
5:27
Play later
Play later
Lists
Like
Liked
5:27Episode Show Notes The Hidden Trust Problem: Assets are often diverted improperly when trusts are concealed from rightful beneficiaries who should receive distributions Why Trusts Stay Hidden: Trust agreements are typically private documents maintained by law firms, grantors, or trustees - not filed in public records like wills When You Might Be Mi…
…
continue reading

1
The AI Deception: Why 40% of 'AI Companies' Are Just Marketing Machines
2:54
2:54
Play later
Play later
Lists
Like
Liked
2:54Episode Description Dive deep into the growing trend of companies falsely claiming to use artificial intelligence to attract investors, customers, and talent. We explore real cases of AI fraud, the parallels to the dot-com era's WWW hype, and how to protect yourself from these deceptive practices. Key Points Covered: AI as the new internet hype - H…
…
continue reading

1
The Inheritance Thieves: When Your Own Family Becomes the Enemy
3:39
3:39
Play later
Play later
Lists
Like
Liked
3:39Episode Description When family members turn against each other over money, the results can be devastating. In this episode, we explore the dark side of inheritance disputes using the high-profile case of Jimmy Buffett's $275 million estate battle as a cautionary tale. Learn how to protect yourself when greed tears families apart and discover the w…
…
continue reading

1
The Hidden Price Tag: What Banks Actually Charge for Account Searches (And How to Avoid Getting Ripped Off)
8:48
8:48
Play later
Play later
Lists
Like
Liked
8:48What You'll Learn in This Episode: What is an asset search and why you might need one - From lawsuit collections to divorce proceedings, estate matters, and due diligence for business transactions Common reasons people hire investigators for asset searches: Collecting on won lawsuits and judgments Verifying someone has assets before suing them Divo…
…
continue reading

1
Digital Ghosts: The Hidden World of 'Deleted' Data and How Forensic Experts Retrieve What You Thought Was Gone Forever
3:47
3:47
Play later
Play later
Lists
Like
Liked
3:47What You'll Learn in This Episode: What is Digital Forensics? - The process of extracting records from any electronic device including computers, phones, tablets, and even vehicles with computerized memory Beyond What You See - Understanding that your devices store far more information than what appears on your screen, including data you thought wa…
…
continue reading

1
From Crypto Victim to Victory: The Step-by-Step Guide to Recovering Your Stolen Digital Assets
3:54
3:54
Play later
Play later
Lists
Like
Liked
3:54Episode Description Discover how crypto scammers DO get caught and learn about the powerful legal strategy of third-party liability that could help you recover your stolen digital assets. In this episode, we break down a major Treasury Department bust that recovered $200 million in victim losses and reveal how you can identify potential recovery ta…
…
continue reading

1
Scam Recovery 101: How to Fight Back and Reclaim Your Money
7:19
7:19
Play later
Play later
Lists
Like
Liked
7:19Episode Description This episode explores a shocking case where a former Hollywood, Florida commissioner lost $2 million to an online crypto scam, revealing crucial insights about scam recovery, victim psychology, and third-party liability. We break down how sophisticated scammers target even experienced professionals and examine the role banks and…
…
continue reading

1
Why Hackers Are Stealing Encrypted Data Now To Decrypt Later | David Close
44:27
44:27
Play later
Play later
Lists
Like
Liked
44:27Get your FREE Cybersecurity Salary Guide: https://www.infosecinstitute.com/form/cybersecurity-salary-guide-podcast/?utm_source=youtube&utm_medium=podcast&utm_campaign=podcast David Close, Chief Solutions Architect at Futurex, discusses the reality facing our digital world: quantum computing will soon break the encryption protecting everything from …
…
continue reading
Episode Show Notes: Bill Gates predicts a future with only a two-day work week. Sounds good at first—until you realize AI could replace humans for most jobs. Is this a good or bad thing? Good if you still have a stable income. Bad if you only get paid for two days a week—how will bills get paid? The future of work remains uncertain. Discussion from…
…
continue reading

1
Maxed Out: Why Car Loan Payments Are Breaking American Budgets
3:14
3:14
Play later
Play later
Lists
Like
Liked
3:14Episode Show Notes Even Walmart is feeling the pinch — their CEO reports consumers are financially stressed, leading to a $22 billion drop in value due to lower spending. If Walmart shoppers are cutting back, it signals a wider economic strain affecting all sectors. Used car values are dropping, putting high-interest, high-balance car loans at grea…
…
continue reading

1
Underwater and Upside Down: Why Millions of Car Owners Owe More Than Their Cars Are Worth
3:53
3:53
Play later
Play later
Lists
Like
Liked
3:53Episode Description In this episode, we explore the growing car loan crisis affecting millions of Americans. With 20% of car loan holders paying over $1,000 monthly and auto loan debt becoming the second-largest consumer debt in the US, we discuss practical solutions including car short sales as an alternative to repossession. Key Topics Covered Th…
…
continue reading

1
When Dealers Lie: How Hidden Fraud Could Make Your Car Loan Legally Void
5:27
5:27
Play later
Play later
Lists
Like
Liked
5:27Episode Description Ever wonder if that stack of paperwork you signed at the dealership was actually legitimate? In this eye-opening episode, we dive deep into the 16 federal rules and regulations that car dealerships MUST follow to create a valid car loan - and what happens when they don't. What You'll Learn The 16 Critical Rules: Discover the spe…
…
continue reading