Security Tips we all want to know. John Young

Security Tips we all want to know. John Young

Security Tips we all want to know. . Security expert, John Young a/k/a JohnE Upgrade shares his stories on having federal agents tracking him for years for hacking events and transformed into being a white-hat IT leader for McDonnell Douglas/Boeing C-17 program and serving 20+ years in leadership at IBM. Don't miss this informative episode with author of best selling book, "Don’t Hack! How to Kick Hackers to The Curb" a 781 pager packed cybersecurity fundamentals, but with person...

Jaksot(285)

Cyber Crime-Biggest Threat to Critical Infrastructure. Unmasking Top Cyber Threats Today To US Critical Infrastructure

Cyber Crime-Biggest Threat to Critical Infrastructure. Unmasking Top Cyber Threats Today To US Critical Infrastructure

Panel discussion with international leaders part of the Silicon Valley Think Tank, Tortora Brayda AI & Cyber Institute Task Force. Find out and join the Think Tank: https://www.tortorabrayda.org/home Chapters 00:00 Introduction to the Challenges of Securing Critical Infrastructure03:11 Vulnerabilities and Weaknesses in Critical Infrastructure10:03 Challenges Faced by Small to Mid-Sized Critical Infrastructure Organizations17:05 The Impact of Ransomware Attacks on Critical Infrastructure2...

27 Huhti 1h 36min

New Alert. 🚨 Don't Fall For The New Google Subpoena🚨

New Alert. 🚨 Don't Fall For The New Google Subpoena🚨

📬 Would you fall for a fake Google subpoena? 🛡️ What if it passed every security check — and looked 100% real? 🚨 A new phishing tactic is slipping past traditional defenses — and it’s terrifyingly convincing. 🕵️‍♂️ Recent reports reveal cybercriminals are sending fake emails that mimic legal subpoenas from Google. ✅ No misspellings ✅ No suspicious links ✅ No obvious red flags They’re polished. They pass filters. And they’re designed to fool even the cautious. 📌 These emails aren’t just ...

25 Huhti 1min

Zero Trust, SMB & National Security. INTEL CTO Exclusive.

Zero Trust, SMB & National Security. INTEL CTO Exclusive.

Don't miss the video interview for details: https://youtu.be/-G7hbLGDK9o Steve Orrin, Federal CTO for Intel, discusses secrets inside zero trust and r latest cyber security concerns. He is a recognized security leader and public speaker. Steve has orchestrated projects for federal government agencies on Security and AI. Steve is a key advisor in emerging technologies to the Public Sector, Defense, and Intelligence communities. Key topics: latest cyber security concerns, Global Cyber S...

25 Huhti 1h 1min

Secrets To Cyber Crime Discussions. Ransomware Negotiations Unleashed.

Secrets To Cyber Crime Discussions. Ransomware Negotiations Unleashed.

David Mauro interviews ransomware negotiator, George Just, a former VP at Oracle and current CRO at Digital Asset Redemption (https://www.digitalassetredemption.com/), about how to deal with online extortion, understanding ransomware payments, and we uncover secrets to cyber crime discussions you need to know. Chapters 00:00 The Reality of Cybercrime02:00 Introduction to Ransomware Negotiation03:04 The Journey into Cybersecurity06:13 Understanding Ransomware Attacks09:00 The Art of Negotiatio...

24 Huhti 57min

How start a career in cybersecurity today. Josh Mason

How start a career in cybersecurity today. Josh Mason

Discussed how start a career in cybersecurity today with military veteran and security teacher, trainer and expert, Josh Mason. Covering what employers want in cybersecurity, new approaches to enter cyber security, how transition fro military into cybersecurity today, new approaches to enter cybersecurity, how start a career in cybersecurity today, effective communication for security internally in business, new approaches to enter the cybersecurity field, and best ways to keep up to date on ...

21 Huhti 55min

Zero Trust. Social Engineering. Ron Woerner.

Zero Trust. Social Engineering. Ron Woerner.

Zero Trust. New Approaches to Social Engineering. Video Episode: https://youtu.be/U-RiapHidco We discuss new approaches to understanding zero trust and new approaches to understanding social engineering with Ron Woerner. Ron is a Keynote Speaker, Tedx Speaker, Author, Security Community Leader, CEO of Cyber-AAA, Professor of Cyber Studies, CISO, Hacker and Veteran, and also works with VetSec (https://veteransec.org/), a non-profit that helps military build their cybersecurity ca...

20 Huhti 43min

 Oracle Breach 2025 🎯 How Hackers Attack

Oracle Breach 2025 🎯 How Hackers Attack

In early 2025, Oracle faced two significant cybersecurity breaches that exposed sensitive data and raised serious concerns about its security practices. The first breach involved outdated Cerner servers, compromising healthcare data, while the second targeted an inactive legacy system, leading to the theft of client credentials. Both incidents highlighted critical vulnerabilities in Oracle's infrastructure and the importance of timely detection and response. The aftermath included a class act...

19 Huhti 35min

Hunting Down Hackers. John Hammond Exclusive.

Hunting Down Hackers. John Hammond Exclusive.

Hunting Down Hackers. True Crime Stories with Huntress/YouTube Leader John Hammond. Video episode here: https://youtu.be/CMOu0o9FvFQ Examples with advice from top security content creator JOHN HAMMOND. Understanding the Cyber Crime Mind To Protect Business, top security content creator insight, recent true cyber crime examples, new findings on cyber crime gangs including EXCLUSIVE DISCUSSION ON BLACK CAT RANSOMWARE GANG and Anatomy of a Social Engineering attack. Topics: understandi...

17 Huhti 1h

Suosittua kategoriassa Politiikka ja uutiset

aikalisa
rss-ootsa-kuullut-tasta
tervo-halme
ootsa-kuullut-tasta-2
politiikan-puskaradio
rss-podme-livebox
otetaan-yhdet
rss-vaalirankkurit-podcast
et-sa-noin-voi-sanoo-esittaa
the-ulkopolitist
politbyroo
rss-kovin-paikka
rikosmyytit
rss-merja-mahkan-rahat
rss-kuka-mina-olen
rss-raha-talous-ja-politiikka
rss-tasta-on-kyse-ivan-puopolo-verkkouutiset
radio-antro
rss-kaikki-uusiksi
rss-hyvaa-huomenta-bryssel