Cybersecurity. Privacy. Blockchain. Unfiltered. The Efani Features Podcast is your trusted guide to the evolving world of digital security. Hosted by Mark Kreitzman of Efani, each episode dives deep into the critical issues shaping our digital future - from SIM swap threats and mobile privacy to crypto security and blockchain innovation. Join leading experts, ethical hackers, founders, and privacy advocates as we unpack real-world threats, explore cutting-edge solutions, and share practical ...
…
continue reading
Sim Swapping Attacks Podcasts
The Business of Cybersecurity is a podcast from the Tech Talks Network that explores where security and business strategy converge. Hosted by Neil C. Hughes, creator of the Tech Talks Daily Podcast, this series examines how today’s enterprises are managing cyber risk while still moving fast and innovating. Through insightful conversations with industry leaders, CISOs, product strategists, and security architects, the podcast brings clarity to the real-world decisions shaping cybersecurity in ...
…
continue reading
SipCyber: Where Great Coffee Meets Essential Cybersecurity What happens when a former special education teacher turned Minnesota State Cybersecurity Coordinator sits down with a perfect cup of coffee? You get cybersecurity advice that's actually approachable. Jen Lotze from IT Audit Labs brings you SipCyber — the podcast that pairs cozy coffee shop discoveries with decaffeinated cybersecurity tips. No jargon. No fear-mongering. Just practical ways to protect yourself, your family, and your o ...
…
continue reading
1
SIM Swap Attacks: How Criminals Steal Your Phone Number
2:22
2:22
Play later
Play later
Lists
Like
Liked
2:22What if a criminal could steal your phone number and use it to break into every account you own? That's exactly what happens in a SIM swap attack—and it's more common than you think. In this episode of SipCyber, host Jen Lotze explains how attackers trick mobile carriers into transferring your phone number to their device, bypassing multi-factor au…
…
continue reading
1
Property Fraud: How to Stop Criminals from Stealing Your Home
2:40
2:40
Play later
Play later
Lists
Like
Liked
2:40What if someone could steal your house without ever stepping foot on your property? It happened to Graceland—and it could happen to you. In this episode of SipCyber, host Jen Lotze breaks down the growing threat of property fraud while sipping coffee at the vintage-inspired Maqua Coffee in Roseville, MN. Property fraud isn't just about stolen credi…
…
continue reading
1
$3M XRP Stolen: How One Wallet Mistake Wiped Out Brandon LaRoque’s Life Savings
43:00
43:00
Play later
Play later
Lists
Like
Liked
43:00Imagine waking up to find your entire crypto portfolio, 1.2 million XRP, gone overnight. That’s exactly what happened to Brandon LaRoque, a longtime XRP investor who lost $3 million in a single hack. In this emotional and brutally honest episode of the Efani Features Podcast, host Mark Kreitzman sits down with Brandon to unpack one of the most deva…
…
continue reading
1
Corelight’s Brian Dye on Outsmarting AI-Powered Attackers
27:34
27:34
Play later
Play later
Lists
Like
Liked
27:34In today’s digital battlefield, prevention is no longer enough. Firewalls and endpoint protection might keep the doors locked, but attackers are slipping in through the windows. In this episode of Tech Talks Daily, I sit down with Brian Dye, CEO of Corelight, to explore how the cybersecurity game has changed and why network detection and response (…
…
continue reading
1
Credit Cards vs Debit: Your First Line of Cyber Defense
2:22
2:22
Play later
Play later
Lists
Like
Liked
2:22What if your coffee habit could teach you one of the smartest cybersecurity moves for protecting your money? In this episode of SipCyber, host Jen Lotze takes us on a virtual trip to Nomad Coffee Bar in Enfield, Ireland—a dreamy, pink-hued sanctuary—to deliver a financial security tip that every traveler, parent, and online shopper needs to hear. J…
…
continue reading
1
The Scary Truth About Default Privacy Settings
3:15
3:15
Play later
Play later
Lists
Like
Liked
3:15Enjoying coffee at a cozy booth in Greenbridge Coffee got me thinking: why don't our social media profiles feel as secure as this space? The uncomfortable truth is that most apps default to "public"—meaning strangers can see your posts, photos, and even your real-time location. In this episode of SipCyber, we're breaking down how to lock down your …
…
continue reading
1
SEC-Compliant Mobile Archiving: How Efani + Smarsh Are Solving the Billion-Dollar Messaging Problem
19:26
19:26
Play later
Play later
Lists
Like
Liked
19:26Financial institutions are getting hit with billions in fines — not because of fraud, but because of non-compliant mobile communication. In this episode of the Efani Features Podcast, host Mark Kreitzman is joined by Mark Meyer, Partner Manager at Smarsh/TeleMessage, to break down a growing crisis: why SEC-regulated firms are struggling to archive …
…
continue reading
1
Don't Get Hooked: Recognize Phishing Scams in Seconds
2:39
2:39
Play later
Play later
Lists
Like
Liked
2:39What if that urgent email from "Amazon" isn't from Amazon at all? Before you click that link, you need to know what to look for—because phishing scams have gotten scary good, and they're counting on you to act fast without thinking twice. In this episode of SipCyber, host Jen Lotze visits Waystone Coffee in River Falls, WI, to share a simple but po…
…
continue reading
1
Keep Your Data Safe With this Public Wi-Fi Tip
3:11
3:11
Play later
Play later
Lists
Like
Liked
3:11Think public Wi-Fi is harmless? Think again. In this episode of SipCyber, host Jen Lotze breaks down exactly why connecting to that coffee shop network is like broadcasting your most sensitive information to everyone around you. Discover why your phone's 5G connection is actually safer than that "free" airport Wi-Fi, and learn the one simple habit …
…
continue reading
1
Turning Cyber Risk Into Revenue: FortMesa’s Advantage for IT Providers & MSPs
15:29
15:29
Play later
Play later
Lists
Like
Liked
15:29In this episode of the Efani Features Podcast, host Mark Kreitzman speaks with Matthew Fisch, founder of FortMesa, about how managed service providers (MSPs), IT consultants, and cybersecurity professionals can transform compliance burdens into business opportunities — while helping clients meet insurance, regulatory, and security demands in 2025. …
…
continue reading
1
Experian’s AI Fraud Report: SIM Swaps, Voice Cloning, and Smarter Countermeasures
28:36
28:36
Play later
Play later
Lists
Like
Liked
28:36Experian’s Chief Product Officer for Identity and Fraud in the UK and Ireland, Paul Weathersby, joins me to unpack how criminals are using generative tools to fabricate documents, clone voices, perfect phishing at scale, and stitch together synthetic identities. We dig into the sharp rise in SIM swap attacks, why eSIM provisioning can accelerate ta…
…
continue reading
1
Perfect Lattes, Perfect Credit Scores, Perfect Targets
4:19
4:19
Play later
Play later
Lists
Like
Liked
4:19What happens when you combine the perfect latte with life-changing cybersecurity advice? Welcome to the very first episode of SipCyber! Jennifer Lotze kicks things off at Backstory Coffee Roasters in St. Paul, Minnesota—a hometown hero just three minutes from IT Audit Labs that's roasting beans and building community. But here's the kicker: while y…
…
continue reading
1
Welcome to SipCyber: A New Podcast from IT Audit Labs
1:25
1:25
Play later
Play later
Lists
Like
Liked
1:25We're thrilled to announce SipCyber, a new podcast presented by IT Audit Labs. Meet Jen Lotze, our newest team member who brings an incredible journey: special education teacher → school district tech leader → Minnesota Cybersecurity State Coordinator → IT Audit Labs. SipCyber is our newest addition to The Audit Podcast family, combining: Coffee sh…
…
continue reading
1
Faraday Bags & Digital Privacy in 2025: Why GoDark Bags Are a Must-Have
25:24
25:24
Play later
Play later
Lists
Like
Liked
25:24Turning off your phone doesn’t mean you’ve disappeared. In this episode of the Efani Features Podcast, host Mark Kreitzman sits down with Todd Ariss, physicist and CEO of GoDark Bags, to explore one of the most powerful - yet misunderstood — tools for modern privacy: the Faraday bag. Todd shares the origin story behind GoDark, how he applied decade…
…
continue reading
1
DeFi Hacks, Backdoors & Web3 Security: How CertiK Protects Crypto Projects
21:41
21:41
Play later
Play later
Lists
Like
Liked
21:41Crypto adoption is rising - but so are the hacks. In this episode of the Efani Features Podcast, host Mark Kreitzman sits down with Mikhail Yerganjiev, Business Development Manager at CertiK, the world’s largest Web3 security firm. Mikhail breaks down how billions of dollars in crypto are being lost to smart contract exploits, phishing scams, and p…
…
continue reading
1
Qualys CEO Sumedh Thakar on Moving From SOC to ROC
33:51
33:51
Play later
Play later
Lists
Like
Liked
33:51Qualys CEO Sumedh Thakar joins me to unpack what cyber risk management really looks like when budgets are tight, signals are noisy, and AI is changing the game. Sumedh’s journey started in Pune with parents who prized education above everything. He arrived in the US with one hundred dollars, joined Qualys as one of its first software engineers, and…
…
continue reading
1
Tangem x Efani: Bulletproof Crypto Security, SIM Protection & Exclusive Wallet Offer
33:36
33:36
Play later
Play later
Lists
Like
Liked
33:36Hardware wallets don’t need to be clunky, complex, or intimidating. In this episode of the Efani Features Podcast, host Mark Kreitzman sits down with David Wulschner, Brand Ambassador at Tangem, to dive deep into one of the most secure and beginner-friendly hardware wallets on the market. David shares the incredible story of how Tangem built a near…
…
continue reading
1
Maximize Your Bitcoin’s Potential: Yield, Loans, and More with GOAT.Network
24:57
24:57
Play later
Play later
Lists
Like
Liked
24:57Holding Bitcoin is smart. Putting it to work is smarter. In this episode of the Efani Features Podcast, host Mark Kreitzman talks with Kevin Liu, co-founder and CEO of GOAT.Network, a Layer 2 protocol designed to unlock real-world yield and utility for Bitcoin holders — without giving up custody or compromising security. Bitcoin is often called "di…
…
continue reading
1
Escape Big Tech: Glenn Meder’s Blueprint for Digital Freedom (Privacy Academy)
18:09
18:09
Play later
Play later
Lists
Like
Liked
18:09If you think privacy is dead, think again. In this critical episode of the Efani Features Podcast, host Mark Kreitzman sits down with Glenn Meder, founder of Privacy Academy, to discuss the rising threat of digital surveillance and what you can actually do to protect your liberty. From data brokers and corporate spyware to government-backed digital…
…
continue reading
1
Wipe Your Personal Info Off the Internet with Optery (And Why It Matters More Than Ever)
18:02
18:02
Play later
Play later
Lists
Like
Liked
18:02Your name, your phone number, your home address — all of it is probably being sold right now. In this episode of the Efani Features Podcast, host Mark Kreitzman sits down with Paul Mander, Head of Product at Optery, to uncover just how exposed your personal data really is — and what you can do to reclaim it. Optery is on a mission to delete your se…
…
continue reading
1
Don’t Let a Cyberattack Destroy Your Business: Prevention, Recovery & the $0 Hack Strategy
25:47
25:47
Play later
Play later
Lists
Like
Liked
25:47In his return to the Efani Features Podcast, Corey White, CEO and co-founder of Cyvatar, joins host Mark Kreitzman (GM at Efani) to sound the alarm for small and medium-sized businesses navigating a terrifying new cyber reality. Ransomware attacks are up 149%, yet most businesses are cutting cybersecurity spend. That’s a recipe for disaster — and C…
…
continue reading
1
CyberArk Explains Why Machine Identities Are the New Attack Surface
34:11
34:11
Play later
Play later
Lists
Like
Liked
34:11What happens when there are 100 machine identities for every human one in your organisation? This is not a prediction for the future. It is the world we are already operating in, and the implications are profound. In this episode of Business of Cybersecurity, I speak with David Higgins, Senior Director at CyberArk, about how AI agents, autonomous s…
…
continue reading
1
GrapheneOS, DeGoogled Phones & the Above Phone Privacy Stack
29:24
29:24
Play later
Play later
Lists
Like
Liked
29:24In this episode of the Efani Features Podcast, host Mark Kreitzman sits down with Hakeem Anwar, founder and CEO of Above Phone, to explore one of the most important frontiers in personal security: your phone. Most people don’t realize their smartphones are surveillance devices—tracking location, listening to conversations, and feeding data to Big T…
…
continue reading
1
What Is Ripple (XRP)? Tokenization, Utility & Value with Crypto Sensei
56:56
56:56
Play later
Play later
Lists
Like
Liked
56:56In this value-packed episode of the Efani Features Podcast, host Mark Kreitzman sits down with Robert Doyle—better known as Crypto Sensei - one of the most respected voices in the XRP and Ripple ecosystem. If you've ever wondered what makes Ripple different, how XRP might power the future of finance, or what tokenization of real-world assets actual…
…
continue reading
1
What is GrapheneOS and the Ghost Phone? Interview with Mark37.com
32:47
32:47
Play later
Play later
Lists
Like
Liked
32:47In this eye-opening episode of the Efani Features Podcast, host Mark Kreitzman sits down with Sean Patrick Tario, founder of Mark37.com, to explore a crucial topic in digital privacy: GrapheneOS and the so-called “Ghost Phone.” As mobile hacks and surveillance threats grow, more people are looking for alternatives to iPhones and Google-powered Andr…
…
continue reading
1
Cypherock X1: The Most Secure Hardware Wallet with Non-Custodial Inheritance
27:16
27:16
Play later
Play later
Lists
Like
Liked
27:16In this episode of the Efani Features Podcast, host Mark Kreitzman welcomes Rohan Agarwal, co-founder and CEO of Cypherock, for an in-depth conversation on one of the most innovative hardware wallets in the crypto space: the Cypherock X1. Rohan shares the origin story of Cypherock, sparked by personal loss of funds during the 2018 crypto downturn. …
…
continue reading
1
How Abnormal AI Detects Threats Before They Hit the Inbox
26:53
26:53
Play later
Play later
Lists
Like
Liked
26:53In this episode, I sat down with Mike Britton, CIO at Abnormal AI to explore the increasingly urgent overlap between AI governance and cybersecurity. With AI accelerating faster than regulation, and attackers already using these tools for harm, Mike offers a pragmatic take on what needs to happen next. We dig into the realities of regulating AI in …
…
continue reading
1
PreSend.io: Reinventing Security in Crypto Transactions (Efani Promo Inside)
22:25
22:25
Play later
Play later
Lists
Like
Liked
22:25Sending crypto across blockchains shouldn’t feel like playing roulette with your funds. In this episode of the Efani Features Podcast, host Mark Kreitzman sits down with Drew Wolfer, co-founder and CEO of PreSend.io, to explore how his company is solving one of the most frustrating problems in crypto — accidental loss of funds during blockchain tra…
…
continue reading
1
How Casa Secures Bitcoin & Ethereum with Cold Storage (Promo Code Inside)
21:47
21:47
Play later
Play later
Lists
Like
Liked
21:47In this episode of the Efani Features Podcast, host Mark Kreitzman sits down with Nick Neuman, CEO of Casa, to dive deep into one of the most pressing issues in crypto today: secure, user-friendly self-custody. If you've ever worried about losing your seed phrase, hardware wallet, or access to your digital assets — this conversation is for you. Nic…
…
continue reading
1
How Cyvatar.ai Delivers Effortless Cybersecurity for Businesses of All Sizes
23:19
23:19
Play later
Play later
Lists
Like
Liked
23:19Welcome to the debut episode of the Efani Features Podcast, hosted by Mark Kreitzman, GM at Efani – the leader in secure mobile services. In this premiere episode, Mark sits down with Corey White, Founder and CEO of Cyvatar.ai, to discuss how his company is redefining cybersecurity for small and medium-sized businesses (SMBs). With nearly 30 years …
…
continue reading
1
Clari: Why RevOps Is the Hidden Weapon in Cybersecurity’s AI Arms Race
29:21
29:21
Play later
Play later
Lists
Like
Liked
29:21In this episode of The Business of Cybersecurity, I’m joined by John Queally, Senior Director of Revenue Operations at Clari, for a conversation that goes far beyond spreadsheets and pipeline forecasts. We explore why RevOps has become mission-critical for cybersecurity firms facing escalating threats, intense market pressure, and growing expectati…
…
continue reading
1
From Complexity to Clarity: Cyber Resilience with Cloudflare’s Christian Reilly
28:38
28:38
Play later
Play later
Lists
Like
Liked
28:38In this episode of The Business of Cybersecurity, I’m joined by Christian Reilly, Field CTO for EMEA at Cloudflare, to unpack what real-world cyber resilience looks like across industries and what’s holding many organisations back. From legacy systems in healthcare and education to cloud-native agility in gaming and fintech, Christian explains why …
…
continue reading
1
Resilience Over Panic: Rethinking Ransomware with Trevor Dearing of Illumio
23:09
23:09
Play later
Play later
Lists
Like
Liked
23:09In this episode of The Business of Cybersecurity, I speak with Trevor Dearing, Director of Critical Infrastructure at Illumio, to unpack some eye-opening truths from their latest ransomware report. We explore why more than half of global companies still have to halt operations when ransomware strikes and why so many UK businesses remain reluctant t…
…
continue reading
1
Zscaler on Building Cyber Resilience from the Ground Up
26:21
26:21
Play later
Play later
Lists
Like
Liked
26:21When I spoke with Mark Lluic, CEO in Residence at Zscaler, on the Business of Cybersecurity podcast, we didn't spend time rehashing the basics. We looked at how leadership thinking must evolve. If your security posture is still built for light rain, what happens when a hurricane hits? Mark has spent years helping organizations rethink security from…
…
continue reading
1
Immersive Labs’ Max Vetter on Closing the Skills Gap Across Cyber Teams
31:59
31:59
Play later
Play later
Lists
Like
Liked
31:59Are junior cybersecurity professionals outpacing their senior colleagues in readiness for modern threats? In this episode of The Business of Cybersecurity, Neil C. Hughes sits down with Max Vetter, Vice President of Cyber at Immersive Labs, to examine a surprising trend: less experienced team members are consistently completing more difficult train…
…
continue reading
1
Legacy Tech Meets Modern Threats as Kyndryl Rethinks Cybersecurity
26:42
26:42
Play later
Play later
Lists
Like
Liked
26:42Legacy systems are everywhere, quietly powering core operations in some of the world’s largest enterprises. But behind that familiarity is risk. In this episode of The Business of Cybersecurity, Paul Savill, Global Practice Leader of Networking and Edge Compute at Kyndryl, joins me to break down why aging infrastructure is becoming a major liabilit…
…
continue reading
1
Imperva on the Bot Surge Behind Half of Global Internet Activity
32:21
32:21
Play later
Play later
Lists
Like
Liked
32:21Nearly half of all internet traffic is now generated by non-human sources, and a growing share of that activity is driven by increasingly sophisticated bots. In this episode of The Business of Cybersecurity, Neil is joined by Lynn Marks, Senior Product Manager at Imperva, to break down the findings from the latest Bad Bot Report and explore what bu…
…
continue reading
1
IGEL at the Edge of Cybersecurity Transformation
24:09
24:09
Play later
Play later
Lists
Like
Liked
24:09Recorded live at IGEL Now & Next 2025 in Miami, this conversation with John Walsh, Field CTO for Critical Sectors at IGEL, explores how organizations can rethink edge security through a preventative lens. With decades of experience in high-assurance environments, John shares how zero trust is moving from theory into applied strategy and why endpoin…
…
continue reading
1
Fortinet on Making Cybersecurity a Business Priority
25:22
25:22
Play later
Play later
Lists
Like
Liked
25:22What happens when a country aims to carve its own cybersecurity regulatory path post-Brexit while the rest of the region moves toward harmonized frameworks like the EU’s NIS2 directive? In this episode of The Business of Cybersecurity Podcast, we unpack the evolving conversation around the UK’s Cyber Security and Resilience Bill with Ricardo Ferrei…
…
continue reading
1
The Shadow API Threat Explained by Akamai Technologies
29:02
29:02
Play later
Play later
Lists
Like
Liked
29:02What does it take to protect financial institutions when they're the number one global target for DDoS attacks? In this episode of The Business of Cybersecurity, Neil C. Hughes welcomes Richard Meeus, Director of Security Technology and Strategy EMEA at Akamai Technologies, to explore insights from Akamai's latest State of the Internet (SOTI) repor…
…
continue reading
1
Thales Data Threat Report Revals Risks to Critical Infrastructure
38:27
38:27
Play later
Play later
Lists
Like
Liked
38:27What happens when the digital systems powering our national energy, water, and healthcare services become the next frontline in cybersecurity? As smart grids, connected utilities, and cloud-first operations rapidly reshape critical infrastructure, the threats facing these systems are evolving just as quickly. In this episode, Tony Burton, Managing …
…
continue reading
1
The Real Meaning of Zero Trust with Its Creator
44:25
44:25
Play later
Play later
Lists
Like
Liked
44:25What does it really mean to trust nothing and verify everything? In this first episode of The Business of Cybersecurity, Neil is joined by John Kindervag—the creator of the Zero Trust cybersecurity model for a conversation that redefines how we think about protecting digital systems. John shares the untold story behind the creation of Zero Trust, f…
…
continue reading