Cyber Crime Junkies  By  cover art

Cyber Crime Junkies

By: Cyber Crime Junkies. Host David Mauro.
  • Summary

  • Socializing Cybersecurity. Translating Cyber into business terms. Newest AI, Social Engineering and Ransomware Attack Insight to Protect Businesses and Reduce Risk. Latest Cyber News from the Dark web, research and insider info. Interviews of Global Technology Leaders, sharing True Cyber Crime stories and advice on how to manages cyber risk.

    Find all content at www.CyberCrimeJunkies.com and videos on YouTube @CyberCrimeJunkiesPodcast

    © 2024 David Mauro & Cyber Crime Junkies
    Show more Show less
activate_primeday_promo_in_buybox_DT
Episodes
  • Crowdsourcing Firewalls & Network Security. Magic of Crowdsourcing Approaches To Security.
    Jul 27 2024

    NEW! Text Us Direct Here!

    Philippe Humeau joins us to discuss new crowdsourcing approaches to security. Phillippe is a former Hacker and Founder of CrowdSec, an crowd-sourced WAZE-Like Security platform.

    Learn more here: https://crowdsec.net

    Accelerate your CMMC 2.0 compliance and address federal zero-trust requirements with Kiteworks' universal, secure file sharing platform made for every organization, and helpful to defense contractors.

    Visit kiteworks.com to get started.

    We're thrilled to introduce Season 5 Cyber Flash Points to show what latest tech news means to online safety with short stories helping spread security awareness and the importance of online privacy protection.

    "Cyber Flash Points" – your go-to source for practical and concise summaries.

    So, tune in and welcome to "Cyber Flash Points”

    🎧 Subscribe now http://www.youtube.com/@cybercrimejunkiespodcast and never miss an episode!

    Follow Us:
    🔗 Website: https://cybercrimejunkies.com
    📱 X/Twitter: https://x.com/CybercrimeJunky
    📸 Instagram: https://www.instagram.com/cybercrimejunkies/

    Want to help us out? Leave us a 5-Star review on Apple Podcast Reviews.
    Listen to Our Podcast:
    🎙️ Apple Podcasts: https://podcasts.apple.com/us/podcast/cyber-crime-junkies/id1633932941
    🎙️ Spotify: https://open.spotify.com/show/5y4U2v51gztlenr8TJ2LJs?si=537680ec262545b3
    🎙️ Google Podcasts: http://www.youtube.com/@cybercrimejunkiespodcast

    Join the Conversation: 💬 Leave your comments and questions. TEXT THE LINK ABOVE . We'd love to hear your thoughts and suggestions for future episodes!

    Show more Show less
    50 mins
  • Are you at Risk? Personal Liability Cyber Breaches.
    Jul 26 2024

    NEW! Text Us Direct Here!

    We interview Joseph Brunsman of the Brunsman Group, a thought leader in cybersecurity insurance. They discuss the liability in data breaches and the changes happening in the cybersecurity insurance industry. They also explore the impact of AI on cyber insurance and the importance of accurate application and underwriting processes. The conversation highlights the increasing scrutiny from regulators and the potential personal liability for CEOs and executives.

    The episode concludes with a discussion on the SolarWinds breach and the need for businesses to take cybersecurity seriously. In this conversation, Dino Mauro and Joseph Brunsman discuss the importance of cyber insurance and the potential risks and liabilities that businesses face in the event of a cyber breach. They emphasize the need for businesses to proactively plan and implement cybersecurity measures to mitigate these risks. They also highlight the changing landscape of cyber insurance policies and the need for businesses to stay informed about exclusions and coverage limitations. The conversation concludes with the reminder that businesses should consult with subject matter experts and develop a comprehensive cybersecurity roadmap.

    Chapters

    • 00:00 Introduction to Cybersecurity Insurance
    • 02:18 Changes in the Insurance Industry
    • 06:11 Importance of Accurate Application Process
    • 09:34 Personal Liability for CEOs and Executives
    • 13:54 Regulatory Scrutiny and Enforcement Actions
    • 19:40 Lessons from the SolarWinds Breach
    • 26:54 The Changing Landscape of Cyber Insurance
    • 27:23 Addressing Legacy Hardware and Software Exclusions
    • 35:05 Understanding the L

    Accelerate your CMMC 2.0 compliance and address federal zero-trust requirements with Kiteworks' universal, secure file sharing platform made for every organization, and helpful to defense contractors.

    Visit kiteworks.com to get started.

    We're thrilled to introduce Season 5 Cyber Flash Points to show what latest tech news means to online safety with short stories helping spread security awareness and the importance of online privacy protection.

    "Cyber Flash Points" – your go-to source for practical and concise summaries.

    So, tune in and welcome to "Cyber Flash Points”

    🎧 Subscribe now http://www.youtube.com/@cybercrimejunkiespodcast and never miss an episode!

    Follow Us:
    🔗 Website: https://cybercrimejunkies.com
    📱 X/Twitter: https://x.com/CybercrimeJunky
    📸 Instagram: https://www.instagram.com/cybercrimejunkies/

    Want to help us out? Leave us a 5-Star review on Apple Podcast Reviews.
    Listen to Our Podcast:
    🎙️ Apple Podcasts: https://podcasts.apple.com/us/podcast/cyber-crime-junkies/id1633932941
    🎙️ Spotify: https://open.spotify.com/show/5y4U2v51gztlenr8TJ2LJs?si=537680ec262545b3
    🎙️ Google Podcasts: http://www.youtube.com/@cybercrimejunkiespodcast

    Join the Conversation: 💬 Leave your comments and questions. TEXT THE LINK ABOVE . We'd love to hear your thoughts and suggestions for future episodes!

    Show more Show less
    56 mins
  • Cyber Flash Point. Breaking News on Insider Threats to US Organizations
    Jul 24 2024

    NEW! Text Us Direct Here!

    How would you know if a seemingly perfect employee was actually an imposter? Behind this facade was a North Korean operative, a meticulously trained spy. In Cyber Flash Point we cover Breaking News on Insider Threats to US Organizations.

    Topics: Insider Threats to US Organizations, how to reduce insider threats, top cyber flash points, Insider Threat, how the DRPK uses it workers for cybercrime, common insider risks in security, new types of insider risks in security, stories of insider risks in cyber security, containment, vetting processes, security monitoring

    Accelerate your CMMC 2.0 compliance and address federal zero-trust requirements with Kiteworks' universal, secure file sharing platform made for every organization, and helpful to defense contractors.

    Visit kiteworks.com to get started.

    🎧 Subscribe now http://www.youtube.com/@cybercrimejunkiespodcast and never miss an episode!

    Follow Us:
    🔗 Website: https://cybercrimejunkies.com
    📱 X/Twitter: https://x.com/CybercrimeJunky
    📸 Instagram: https://www.instagram.com/cybercrimejunkies/

    Want to help us out? Leave us a 5-Star review on Apple Podcast Reviews.
    Listen to Our Podcast:
    🎙️ Apple Podcasts: https://podcasts.apple.com/us/podcast/cyber-crime-junkies/id1633932941
    🎙️ Spotify: https://open.spotify.com/show/5y4U2v51gztlenr8TJ2LJs?si=537680ec262545b3
    🎙️ Google Podcasts: http://www.youtube.com/@cybercrimejunkiespodcast

    Join the Conversation: 💬 Leave your comments and questions. TEXT THE LINK ABOVE . We'd love to hear your thoughts and suggestions for future episodes!

    Show more Show less
    24 mins

What listeners say about Cyber Crime Junkies

Average customer ratings
Overall
  • 5 out of 5 stars
  • 5 Stars
    1
  • 4 Stars
    0
  • 3 Stars
    0
  • 2 Stars
    0
  • 1 Stars
    0
Performance
  • 5 out of 5 stars
  • 5 Stars
    1
  • 4 Stars
    0
  • 3 Stars
    0
  • 2 Stars
    0
  • 1 Stars
    0
Story
  • 5 out of 5 stars
  • 5 Stars
    1
  • 4 Stars
    0
  • 3 Stars
    0
  • 2 Stars
    0
  • 1 Stars
    0

Reviews - Please select the tabs below to change the source of reviews.