
Cyber Crime-Biggest Threat to Critical Infrastructure. Unmasking Top Cyber Threats Today To US Critical Infrastructure
Panel discussion with international leaders part of the Silicon Valley Think Tank, Tortora Brayda AI & Cyber Institute Task Force. Find out and join the Think Tank: https://www.tortorabrayda.org/home Chapters 00:00 Introduction to the Challenges of Securing Critical Infrastructure03:11 Vulnerabilities and Weaknesses in Critical Infrastructure10:03 Challenges Faced by Small to Mid-Sized Critical Infrastructure Organizations17:05 The Impact of Ransomware Attacks on Critical Infrastructure2...
27 Huhti 1h 36min

New Alert. 🚨 Don't Fall For The New Google Subpoena🚨
📬 Would you fall for a fake Google subpoena? 🛡️ What if it passed every security check — and looked 100% real? 🚨 A new phishing tactic is slipping past traditional defenses — and it’s terrifyingly convincing. 🕵️♂️ Recent reports reveal cybercriminals are sending fake emails that mimic legal subpoenas from Google. ✅ No misspellings ✅ No suspicious links ✅ No obvious red flags They’re polished. They pass filters. And they’re designed to fool even the cautious. 📌 These emails aren’t just ...
25 Huhti 1min

Zero Trust, SMB & National Security. INTEL CTO Exclusive.
Don't miss the video interview for details: https://youtu.be/-G7hbLGDK9o Steve Orrin, Federal CTO for Intel, discusses secrets inside zero trust and r latest cyber security concerns. He is a recognized security leader and public speaker. Steve has orchestrated projects for federal government agencies on Security and AI. Steve is a key advisor in emerging technologies to the Public Sector, Defense, and Intelligence communities. Key topics: latest cyber security concerns, Global Cyber S...
25 Huhti 1h 1min

Secrets To Cyber Crime Discussions. Ransomware Negotiations Unleashed.
David Mauro interviews ransomware negotiator, George Just, a former VP at Oracle and current CRO at Digital Asset Redemption (https://www.digitalassetredemption.com/), about how to deal with online extortion, understanding ransomware payments, and we uncover secrets to cyber crime discussions you need to know. Chapters 00:00 The Reality of Cybercrime02:00 Introduction to Ransomware Negotiation03:04 The Journey into Cybersecurity06:13 Understanding Ransomware Attacks09:00 The Art of Negotiatio...
24 Huhti 57min

How start a career in cybersecurity today. Josh Mason
Discussed how start a career in cybersecurity today with military veteran and security teacher, trainer and expert, Josh Mason. Covering what employers want in cybersecurity, new approaches to enter cyber security, how transition fro military into cybersecurity today, new approaches to enter cybersecurity, how start a career in cybersecurity today, effective communication for security internally in business, new approaches to enter the cybersecurity field, and best ways to keep up to date on ...
21 Huhti 55min

Zero Trust. Social Engineering. Ron Woerner.
Zero Trust. New Approaches to Social Engineering. Video Episode: https://youtu.be/U-RiapHidco We discuss new approaches to understanding zero trust and new approaches to understanding social engineering with Ron Woerner. Ron is a Keynote Speaker, Tedx Speaker, Author, Security Community Leader, CEO of Cyber-AAA, Professor of Cyber Studies, CISO, Hacker and Veteran, and also works with VetSec (https://veteransec.org/), a non-profit that helps military build their cybersecurity ca...
20 Huhti 43min

Oracle Breach 2025 🎯 How Hackers Attack
In early 2025, Oracle faced two significant cybersecurity breaches that exposed sensitive data and raised serious concerns about its security practices. The first breach involved outdated Cerner servers, compromising healthcare data, while the second targeted an inactive legacy system, leading to the theft of client credentials. Both incidents highlighted critical vulnerabilities in Oracle's infrastructure and the importance of timely detection and response. The aftermath included a class act...
19 Huhti 35min

Hunting Down Hackers. John Hammond Exclusive.
Hunting Down Hackers. True Crime Stories with Huntress/YouTube Leader John Hammond. Video episode here: https://youtu.be/CMOu0o9FvFQ Examples with advice from top security content creator JOHN HAMMOND. Understanding the Cyber Crime Mind To Protect Business, top security content creator insight, recent true cyber crime examples, new findings on cyber crime gangs including EXCLUSIVE DISCUSSION ON BLACK CAT RANSOMWARE GANG and Anatomy of a Social Engineering attack. Topics: understandi...
17 Huhti 1h






















