
Rise And Fall of Crypto Star. FBI most wanted, Ruja Ignatova. Crypto News.
Crypto News, Cyber flash point about self-proclaimed Bitcoin killer, OneCoin. rise and fall of crypto star FBI most wanted, Ruja Ignatova. To Submit a TIP and Potentially collect the new $5 Million Reward, you can submit a tip online at www.tips.FBI.gov Or Call 1-800-CALL-FBI The rise and fall of ONE COIN and the hunt for Ruja Ignatova is a story of a massive cryptocurrency Ponzi scheme that attracted over $4 billion in investments. Dr. Ruja Ignatova, the charismatic founder ...
15 Mar 38min

AI Exposed. Latest Social Engineering Business Cyber Risk.
Experts Nick Mullen and Nick Oles discuss artificial intelligence and the impact of ai on business cyber risk. They share their personal stories of how they got into the field and highlight the importance of understanding the analogies between physical and cybersecurity controls. Nick Oles is author of How to Catch a Phish nick@thenetdefender.com https://thenetdefender.com/ Nick Mullen is a CISSP, CCSP, PMP and Principal, at Sanguine Security Solutions. Chapters...
13 Mar 1h 9min

Innovative Ways to Reduce Website Spoofing
After years in the industry, inventing and exploring emerging technologies, Gideon Hazam, Co-Founder, COO and CSM at Memcyco, https://www.memcyco.com/home found a way to solve a problem outside the normal cybersecurity approaches. He joins us behind the scenes to discuss innovative ways to reduce website spoofing. Key Topics: new ways to reduce cyber risks in financial institutions,ways to prevent account take overs,innovative ways to reduce website spoofing, latest types of ...
8 Mar 58min

Unmasking Invisible Threats: Quantifying Cyber Security
Rob Black, a security educator and Fractional CISO, joins us to discuss the best ways for quantifying cyber security and why it is crucial for small and medium-sized business owners. David Mauro interviews Rob Black, the founder of Fractional CISO, about his journey in the cybersecurity industry and the challenges faced by medium-sized businesses. They discuss the importance of translating cybersecurity into business terms, the need for internal communication and making the case to lea...
7 Mar 1h 3min

Phone Rings. It's A Social Engineer Callling.
Video Episode: https://youtu.be/oH7FpvHOhVA This is the story of Matt Smallman, author of “Unlocking Your Call Centre”, about how call centers can be security risks. Our discussion gives exclusive insight into how biometrics fail in security, problems with voice authentication and explore military tactics and biometrics. We explore how to balance convenience with security, how to protect call centers from social engineering and ways to reduce cyber security risks in call centers with...
1 Mar 57min

Quantum AI: What You Need to Know NOW!
Quantum AI: What You Need to Know NOW! 🚨🔐 Quantum computing is revolutionizing cybersecurity—are we ready? In this Cyber Crime Junkies episode, we uncover how quantum tech could break encryption, threaten sensitive data, and reshape industries. But is it all bad? Discover the risks, the opportunities, and what businesses must do now to stay ahead. ⚡ Quantum Threats & Solutions 🔑 Why Encryption May Soon Be Obsolete 🚀 How to Prepare for the Quantum Era Don't get left behind—watch now! 🔥 #...
28 Feb 31min

War Games. In Business.
This is the story of Lester Chng, CISSP and the Art of How To Use War Games In Business. Topics discussed: how to use war games in business, understanding war game exercises in business, leveraging war games in business, how to use war games in security, how to use war games in cyber security, war games in cyber security, how war games are like table top exercises, importance of operational resilience in business, what is operational resilience. Lester’s LinkedIn profile- https://www.linked...
28 Feb 45min

New Ways Leaders Can Assess Their Risk Appetite
In this conversation, Dan Elliott, principal cybersecurity risk advisor at Zurich, discusses new ways leaders can assess their risk appetite. KEY TOPICS: · how risk appetite effects your cyber security plans, · explaining risk appetite in cyber security to leadership, · how security planning involves risk appetite, · new ways leaders can assess their risk appetite, · h...
26 Feb 52min






















