• Crowdsourcing Firewalls & Network Security. Magic of Crowdsourcing Approaches To Security.
    Jul 27 2024

    NEW! Text Us Direct Here!

    Philippe Humeau joins us to discuss new crowdsourcing approaches to security. Phillippe is a former Hacker and Founder of CrowdSec, an crowd-sourced WAZE-Like Security platform.

    Learn more here: https://crowdsec.net

    Accelerate your CMMC 2.0 compliance and address federal zero-trust requirements with Kiteworks' universal, secure file sharing platform made for every organization, and helpful to defense contractors.

    Visit kiteworks.com to get started.

    We're thrilled to introduce Season 5 Cyber Flash Points to show what latest tech news means to online safety with short stories helping spread security awareness and the importance of online privacy protection.

    "Cyber Flash Points" – your go-to source for practical and concise summaries.

    So, tune in and welcome to "Cyber Flash Points”

    🎧 Subscribe now http://www.youtube.com/@cybercrimejunkiespodcast and never miss an episode!

    Follow Us:
    🔗 Website: https://cybercrimejunkies.com
    📱 X/Twitter: https://x.com/CybercrimeJunky
    📸 Instagram: https://www.instagram.com/cybercrimejunkies/

    Want to help us out? Leave us a 5-Star review on Apple Podcast Reviews.
    Listen to Our Podcast:
    🎙️ Apple Podcasts: https://podcasts.apple.com/us/podcast/cyber-crime-junkies/id1633932941
    🎙️ Spotify: https://open.spotify.com/show/5y4U2v51gztlenr8TJ2LJs?si=537680ec262545b3
    🎙️ Google Podcasts: http://www.youtube.com/@cybercrimejunkiespodcast

    Join the Conversation: 💬 Leave your comments and questions. TEXT THE LINK ABOVE . We'd love to hear your thoughts and suggestions for future episodes!

    Show more Show less
    50 mins
  • Are you at Risk? Personal Liability Cyber Breaches.
    Jul 26 2024

    NEW! Text Us Direct Here!

    We interview Joseph Brunsman of the Brunsman Group, a thought leader in cybersecurity insurance. They discuss the liability in data breaches and the changes happening in the cybersecurity insurance industry. They also explore the impact of AI on cyber insurance and the importance of accurate application and underwriting processes. The conversation highlights the increasing scrutiny from regulators and the potential personal liability for CEOs and executives.

    The episode concludes with a discussion on the SolarWinds breach and the need for businesses to take cybersecurity seriously. In this conversation, Dino Mauro and Joseph Brunsman discuss the importance of cyber insurance and the potential risks and liabilities that businesses face in the event of a cyber breach. They emphasize the need for businesses to proactively plan and implement cybersecurity measures to mitigate these risks. They also highlight the changing landscape of cyber insurance policies and the need for businesses to stay informed about exclusions and coverage limitations. The conversation concludes with the reminder that businesses should consult with subject matter experts and develop a comprehensive cybersecurity roadmap.

    Chapters

    • 00:00 Introduction to Cybersecurity Insurance
    • 02:18 Changes in the Insurance Industry
    • 06:11 Importance of Accurate Application Process
    • 09:34 Personal Liability for CEOs and Executives
    • 13:54 Regulatory Scrutiny and Enforcement Actions
    • 19:40 Lessons from the SolarWinds Breach
    • 26:54 The Changing Landscape of Cyber Insurance
    • 27:23 Addressing Legacy Hardware and Software Exclusions
    • 35:05 Understanding the L

    Accelerate your CMMC 2.0 compliance and address federal zero-trust requirements with Kiteworks' universal, secure file sharing platform made for every organization, and helpful to defense contractors.

    Visit kiteworks.com to get started.

    We're thrilled to introduce Season 5 Cyber Flash Points to show what latest tech news means to online safety with short stories helping spread security awareness and the importance of online privacy protection.

    "Cyber Flash Points" – your go-to source for practical and concise summaries.

    So, tune in and welcome to "Cyber Flash Points”

    🎧 Subscribe now http://www.youtube.com/@cybercrimejunkiespodcast and never miss an episode!

    Follow Us:
    🔗 Website: https://cybercrimejunkies.com
    📱 X/Twitter: https://x.com/CybercrimeJunky
    📸 Instagram: https://www.instagram.com/cybercrimejunkies/

    Want to help us out? Leave us a 5-Star review on Apple Podcast Reviews.
    Listen to Our Podcast:
    🎙️ Apple Podcasts: https://podcasts.apple.com/us/podcast/cyber-crime-junkies/id1633932941
    🎙️ Spotify: https://open.spotify.com/show/5y4U2v51gztlenr8TJ2LJs?si=537680ec262545b3
    🎙️ Google Podcasts: http://www.youtube.com/@cybercrimejunkiespodcast

    Join the Conversation: 💬 Leave your comments and questions. TEXT THE LINK ABOVE . We'd love to hear your thoughts and suggestions for future episodes!

    Show more Show less
    56 mins
  • Cyber Flash Point. Breaking News on Insider Threats to US Organizations
    Jul 24 2024

    NEW! Text Us Direct Here!

    How would you know if a seemingly perfect employee was actually an imposter? Behind this facade was a North Korean operative, a meticulously trained spy. In Cyber Flash Point we cover Breaking News on Insider Threats to US Organizations.

    Topics: Insider Threats to US Organizations, how to reduce insider threats, top cyber flash points, Insider Threat, how the DRPK uses it workers for cybercrime, common insider risks in security, new types of insider risks in security, stories of insider risks in cyber security, containment, vetting processes, security monitoring

    Accelerate your CMMC 2.0 compliance and address federal zero-trust requirements with Kiteworks' universal, secure file sharing platform made for every organization, and helpful to defense contractors.

    Visit kiteworks.com to get started.

    🎧 Subscribe now http://www.youtube.com/@cybercrimejunkiespodcast and never miss an episode!

    Follow Us:
    🔗 Website: https://cybercrimejunkies.com
    📱 X/Twitter: https://x.com/CybercrimeJunky
    📸 Instagram: https://www.instagram.com/cybercrimejunkies/

    Want to help us out? Leave us a 5-Star review on Apple Podcast Reviews.
    Listen to Our Podcast:
    🎙️ Apple Podcasts: https://podcasts.apple.com/us/podcast/cyber-crime-junkies/id1633932941
    🎙️ Spotify: https://open.spotify.com/show/5y4U2v51gztlenr8TJ2LJs?si=537680ec262545b3
    🎙️ Google Podcasts: http://www.youtube.com/@cybercrimejunkiespodcast

    Join the Conversation: 💬 Leave your comments and questions. TEXT THE LINK ABOVE . We'd love to hear your thoughts and suggestions for future episodes!

    Show more Show less
    24 mins
  • Ethical AI: Controlling AI Ethically while Navigating Cybercrime
    Jul 24 2024

    NEW! Text Us Direct Here!

    We interview Steve Orrin, the CTO of Intel, who essentially make the chips (brains) of most computers on the planet. We discuss these topics: Controlling AI Ethically, how to control AI ethically, what are the ethical considerations of AI, use of AI in cybersecurity, use of AI in cybercrime, deep fakes, zero trust and more.

    There is a special discussion inside so don't miss it!

    Accelerate your CMMC 2.0 compliance and address federal zero-trust requirements with Kiteworks' universal, secure file sharing platform made for every organization, and helpful to defense contractors.

    Visit kiteworks.com to get started.

    We're thrilled to introduce Season 5 Cyber Flash Points to show what latest tech news means to online safety with short stories helping spread security awareness and the importance of online privacy protection.

    "Cyber Flash Points" – your go-to source for practical and concise summaries.

    So, tune in and welcome to "Cyber Flash Points”

    🎧 Subscribe now http://www.youtube.com/@cybercrimejunkiespodcast and never miss an episode!

    Follow Us:
    🔗 Website: https://cybercrimejunkies.com
    📱 X/Twitter: https://x.com/CybercrimeJunky
    📸 Instagram: https://www.instagram.com/cybercrimejunkies/

    Want to help us out? Leave us a 5-Star review on Apple Podcast Reviews.
    Listen to Our Podcast:
    🎙️ Apple Podcasts: https://podcasts.apple.com/us/podcast/cyber-crime-junkies/id1633932941
    🎙️ Spotify: https://open.spotify.com/show/5y4U2v51gztlenr8TJ2LJs?si=537680ec262545b3
    🎙️ Google Podcasts: http://www.youtube.com/@cybercrimejunkiespodcast

    Join the Conversation: 💬 Leave your comments and questions. TEXT THE LINK ABOVE . We'd love to hear your thoughts and suggestions for future episodes!

    Show more Show less
    54 mins
  • When Gamers Start Swatting: Violence for Hire Online
    Jul 21 2024

    NEW! Text Us Direct Here!

    We discuss true cyber crimes of When Gamers Start Swatting: Violence for Hire Online.

    Accelerate your CMMC 2.0 compliance and address federal zero-trust requirements with Kiteworks' universal, secure file sharing platform made for every organization, and helpful to defense contractors.

    Visit kiteworks.com to get started.

    We're thrilled to introduce Season 5 Cyber Flash Points to show what latest tech news means to online safety with short stories helping spread security awareness and the importance of online privacy protection.

    "Cyber Flash Points" – your go-to source for practical and concise summaries.

    So, tune in and welcome to "Cyber Flash Points”

    🎧 Subscribe now http://www.youtube.com/@cybercrimejunkiespodcast and never miss an episode!

    Follow Us:
    🔗 Website: https://cybercrimejunkies.com
    📱 X/Twitter: https://x.com/CybercrimeJunky
    📸 Instagram: https://www.instagram.com/cybercrimejunkies/

    Want to help us out? Leave us a 5-Star review on Apple Podcast Reviews.
    Listen to Our Podcast:
    🎙️ Apple Podcasts: https://podcasts.apple.com/us/podcast/cyber-crime-junkies/id1633932941
    🎙️ Spotify: https://open.spotify.com/show/5y4U2v51gztlenr8TJ2LJs?si=537680ec262545b3
    🎙️ Google Podcasts: http://www.youtube.com/@cybercrimejunkiespodcast

    Join the Conversation: 💬 Leave your comments and questions. TEXT THE LINK ABOVE . We'd love to hear your thoughts and suggestions for future episodes!

    Show more Show less
    54 mins
  • Secrets Found In The Dark Web
    Jul 20 2024

    NEW! Text Us Direct Here!

    Summary

    This conversation shines a light on the dark web, discussing its purpose, dangers, and what is available on it. It explores the increase in dark web activity and the sale of stolen data, including passwords and personal information. The conversation also delves into the operations of cybercrime gangs and their recruitment of cyber mercenaries. It highlights the role of anonymity and encryption in the dark web and provides cautionary tales of individuals who have been caught and arrested for their involvement in cybercrime.

    Takeaways

    • The dark web is a hidden part of the internet that allows for anonymity and access to illegal activities.
    • Stolen data, including passwords and personal information, is readily available for sale on the dark web.
    • Cybercrime gangs operate like cartels, recruiting cyber mercenaries for specific tasks in campaigns.
    • The dark web is a breeding ground for cyber attacks, including ransomware and social engineering.
    • Law enforcement agencies face challenges in tracking down individuals on the dark web due to encryption and anonymity.

    Sound Bites

    • "Shining a light on the dark web"
    • "Double extortion: locking down data and demanding ransom"
    • "Rent-A-Hacker: hiring cyber criminals for various tasks"

    Chapters

    • 00:00 Introduction to the Dark Web
    • 07:24 The Significance of the Dark Web
    • 11:46 The Sale of Stolen Data
    • 19:19 Inside Cybercrime Gangs
    • 23:28 Recruitment of Cyber Mercenaries
    • 37:44 Challenges in Tracking Down Dark Web Criminals




    Accelerate your CMMC 2.0 compliance and address federal zero-trust requirements with Kiteworks' universal, secure file sharing platform made for every organization, and helpful to defense contractors.

    Visit kiteworks.com to get started.

    We're thrilled to introduce Season 5 Cyber Flash Points to show what latest tech news means to online safety with short stories helping spread security awareness and the importance of online privacy protection.

    "Cyber Flash Points" – your go-to source for practical and concise summaries.

    So, tune in and welcome to "Cyber Flash Points”

    🎧 Subscribe now http://www.youtube.com/@cybercrimejunkiespodcast and never miss an episode!

    Follow Us:
    🔗 Website: https://cybercrimejunkies.com
    📱 X/Twitter: https://x.com/CybercrimeJunky
    📸 Instagram: https://www.instagram.com/cybercrimejunkies/

    Want to help us out? Leave us a 5-Star review on Apple Podcast Reviews.
    Listen to Our Podcast:
    🎙️ Apple Podcasts: https://podcasts.apple.com/us/podcast/cyber-crime-junkies/id1633932941
    🎙️ Spotify: https://open.spotify.com/show/5y4U2v51gztlenr8TJ2LJs?si=537680ec262545b3
    🎙️ Google Podcasts: http://www.youtube.com/@cybercrimejunkiespodcast

    Join the Conversation: 💬 Leave your comments and questions. TEXT THE LINK ABOVE . We'd love to hear your thoughts and suggestions for future episodes!

    Show more Show less
    51 mins
  • Mind Games: Exploring Brain Reactions in Social Engineering
    Jul 19 2024

    NEW! Text Us Direct Here!

    We Speak with expert, Dr Abbie Marono on cognitive neuroscience, Brain Reactions During Social Engineering. We discuss the science of social engineering, brain reactions during social engineering, and brain reactions during phishing.

    Find out more about Dr Marono, her research and findings at https://www.abbiemarono.com/



    Accelerate your CMMC 2.0 compliance and address federal zero-trust requirements with Kiteworks' universal, secure file sharing platform made for every organization, and helpful to defense contractors.

    Visit kiteworks.com to get started.

    We're thrilled to introduce Season 5 Cyber Flash Points to show what latest tech news means to online safety with short stories helping spread security awareness and the importance of online privacy protection.

    "Cyber Flash Points" – your go-to source for practical and concise summaries.

    So, tune in and welcome to "Cyber Flash Points”

    🎧 Subscribe now http://www.youtube.com/@cybercrimejunkiespodcast and never miss an episode!

    Follow Us:
    🔗 Website: https://cybercrimejunkies.com
    📱 X/Twitter: https://x.com/CybercrimeJunky
    📸 Instagram: https://www.instagram.com/cybercrimejunkies/

    Want to help us out? Leave us a 5-Star review on Apple Podcast Reviews.
    Listen to Our Podcast:
    🎙️ Apple Podcasts: https://podcasts.apple.com/us/podcast/cyber-crime-junkies/id1633932941
    🎙️ Spotify: https://open.spotify.com/show/5y4U2v51gztlenr8TJ2LJs?si=537680ec262545b3
    🎙️ Google Podcasts: http://www.youtube.com/@cybercrimejunkiespodcast

    Join the Conversation: 💬 Leave your comments and questions. TEXT THE LINK ABOVE . We'd love to hear your thoughts and suggestions for future episodes!

    Show more Show less
    54 mins
  • Inside the Mind: Unveiling Cyber Criminals' Motives and the Real-World Dangers of Ransomware
    Jul 16 2024

    NEW! Text Us Direct Here!

    We explore the motives of cyber criminals, examples of cyber crime gang activities, risks of physical harm from ransomware, understanding cyber crime motive, and why its important to understand cyber crime MO (Modus Operandi).

    Overview of the MO (Modus Operandi) of REVIL, CONTI, HIVE, DARKSIDE and other ransomware gangs and how they drive their operations. This allows us to better defend ourselves and the organizations brands we serve.

    Accelerate your CMMC 2.0 compliance and address federal zero-trust requirements with Kiteworks' universal, secure file sharing platform made for every organization, and helpful to defense contractors.

    Visit kiteworks.com to get started.

    We're thrilled to introduce Season 5 Cyber Flash Points to show what latest tech news means to online safety with short stories helping spread security awareness and the importance of online privacy protection.

    "Cyber Flash Points" – your go-to source for practical and concise summaries.

    So, tune in and welcome to "Cyber Flash Points”

    🎧 Subscribe now http://www.youtube.com/@cybercrimejunkiespodcast and never miss an episode!

    Follow Us:
    🔗 Website: https://cybercrimejunkies.com
    📱 X/Twitter: https://x.com/CybercrimeJunky
    📸 Instagram: https://www.instagram.com/cybercrimejunkies/

    Want to help us out? Leave us a 5-Star review on Apple Podcast Reviews.
    Listen to Our Podcast:
    🎙️ Apple Podcasts: https://podcasts.apple.com/us/podcast/cyber-crime-junkies/id1633932941
    🎙️ Spotify: https://open.spotify.com/show/5y4U2v51gztlenr8TJ2LJs?si=537680ec262545b3
    🎙️ Google Podcasts: http://www.youtube.com/@cybercrimejunkiespodcast

    Join the Conversation: 💬 Leave your comments and questions. TEXT THE LINK ABOVE . We'd love to hear your thoughts and suggestions for future episodes!

    Show more Show less
    51 mins