Updates on the latest cybersecurity threats to businesses, data breach disclosures, and how you can secure your firm in an increasingly risky time.
…
continue reading
Sound like a tech pro, even if you’re not! Award-winning popular host Kim Komando is your secret weapon. Kim is in a class all her own. Her widely successful radio show is heard on over 500 stations in the United States and internationally in 175 different countries. Kim has millions of fans who love her down-to-earth, deeply relatable, and easy-to-understand way of talking about consumer tech. Every episode is loaded with the scoop about the latest gadgets, online security, social media tre ...
…
continue reading
Secure Talk reviews the latest threats, tips, and trends on security, innovation, and compliance. Host Justin Beals interviews leading privacy, security and technology executives to discuss best practices related to IT security, data protection and compliance. Based in Seattle, he previously served as the CTO of NextStep and Koru, which won the 2018 Most Impactful Startup award from Wharton People Analytics. He is the creator of the patented Training, Tracking & Placement System and the auth ...
…
continue reading
Tripwire’s cybersecurity podcast features 20-minute conversations with the people who protect people from cyber threats. Hosted by Tripwire’s VP of Product Management and Strategy, Tim Erlin, each episode brings on a new guest to explore the evolving threat landscape, technology trends, and cybersecurity best practices.
…
continue reading
Hosted by commercial + insurance mediator and arbitrator, Jean Lawler, this podcast draws on Jean's years of experience as a private practice attorney and neutral to provide insights and information relevant to resolving legal disputes outside of a courtroom, and features interviews with legal and dispute resolution industry leaders--attorneys, mediators, and arbitrators.
…
continue reading
The Cyberlaw Podcast is a weekly interview series and discussion offering an opinionated roundup of the latest events in technology, security, privacy, and government. It features in-depth interviews of a wide variety of guests, including academics, politicians, authors, reporters, and other technology and policy newsmakers. Hosted by cybersecurity attorney Stewart Baker, whose views expressed are his own.
…
continue reading
The Los Angeles Times uncovered a covert electioneering campaign involving over 500 social media creators. Here's the scoop.By Kim Komando
…
continue reading

1
Cybersecurity Updates: CEO Legal Troubles, Global Cyber Rules, Microsoft Fix Issues, and AI at B-Side SF
8:49
8:49
Play later
Play later
Lists
Like
Liked
8:49In this episode of 'Cybersecurity Today', host David Shipley covers multiple key stories: Veritaco CEO Jeffrey Bowie is charged with attempting to infect a hospital with malware. Global Chief Information Security Officers (CISOs) call on world governments to harmonize cybersecurity regulations. Issues arise with Microsoft's recent 'Mystery Folder' …
…
continue reading
Turns out, tons of people still don’t know how to do it. If that’s you, here’s the quick fix for iPhone and Android.By Kim Komando
…
continue reading
Motorola unveiled a completely new Razr flip phone. But this time, the phone comes with Perplexity A.I. baked in.By Kim Komando
…
continue reading
Ever post a pic online? There's a good chance it was scraped and added to an AI dataset. Check this site to find out.By Kim Komando
…
continue reading
Two teens started flipping discarded items from landfills. Now they run a seven-figure resale business.By Kim Komando
…
continue reading

1
Understanding SaaS Security: Insights, Challenges, and Best Practices
38:05
38:05
Play later
Play later
Lists
Like
Liked
38:05In this episode of Cybersecurity Today, host Jim Love delves into the topic of SaaS (Software as a Service) security. Sharing his early experiences promoting SaaS, Jim elaborates on its inevitable rise due to cost-effectiveness and shared development resources. The episode highlights security concerns with SaaS, such as shadow IT and weak access co…
…
continue reading
Looking for a way to get in touch with someone online? Try these pro tips.By Kim Komando
…
continue reading
Older Americans lost nearly $5 billion to scams last year. Don’t let it happen to your loved ones.By Kim Komando
…
continue reading

1
Record-Breaking Cybercrime Losses and Data Breaches in 2024
9:45
9:45
Play later
Play later
Lists
Like
Liked
9:45In this episode of Cybersecurity Today, host David Shipley discusses the FBI's report on cybercrime losses in 2024, which reached a record $16.6 billion, marking a 33% increase from the previous year. The report highlights major types of cyber crimes such as phishing, spoofing, extortion, and investment fraud, with older adults being significantly …
…
continue reading
Not a fan of the grocery run? Use these quick tech tricks to stay organized, save money, and skip the hassle.By Kim Komando
…
continue reading
Who will lead the Catholic Church next? ChatGPT, Gemini, and Grok all have guesses — but they can’t seem to agree.By Kim Komando
…
continue reading
A Michigan mom thought she found the perfect home to rent on Facebook. Instead, she walked into a scam that cost her $2,500.By Kim Komando
…
continue reading

1
Cybersecurity Today: Virtual Employees, AI Security Agents, and CVE Program Updates
7:47
7:47
Play later
Play later
Lists
Like
Liked
7:47In this episode of 'Cybersecurity Today,' host Jim Love discusses various pressing topics in the realm of cybersecurity. Highlights include Anthropic's prediction on AI-powered virtual employees and their potential security risks, Microsoft’s introduction of AI security agents to mitigate workforce gaps and analyst burnout, and a pivotal court ruli…
…
continue reading
Always feel like you're being watched or listened to? You are. But here's the part no one wants to admit…By Kim Komando
…
continue reading
A photo of Mark Zuckerberg shows tape over his laptop camera and mic. There’s a good reason you might want to do the same.By Kim Komando
…
continue reading

1
Beyond the Blinky Lights: Why Security Governance Drives Technology with Bryant Tow
46:50
46:50
Play later
Play later
Lists
Like
Liked
46:50In this eye-opening episode of SecureTalk, host Justin Beals welcomes Bryant Tow, Chief Security Officer at LeapFrog Services, to discuss why technology alone can't solve cybersecurity challenges. Bryant reveals how the "Ring of Security" concept shows that up to half of your attack surface lies outside of technology—in governance, policies, people…
…
continue reading
Providers want you to lock in a long-term deal. But with speeds rising and prices falling, you could end up paying more than you should.By Kim Komando
…
continue reading
List your ingredients and it’ll come up with a recipe. Salad dressings, full meals, and more.By Kim Komando
…
continue reading