Security Tips we all want to know. John Young

Security Tips we all want to know. John Young

Security Tips we all want to know. . Security expert, John Young a/k/a JohnE Upgrade shares his stories on having federal agents tracking him for years for hacking events and transformed into being a white-hat IT leader for McDonnell Douglas/Boeing C-17 program and serving 20+ years in leadership at IBM. Don't miss this informative episode with author of best selling book, "Don’t Hack! How to Kick Hackers to The Curb" a 781 pager packed cybersecurity fundamentals, but with person...

Episoder(286)

🚨New FBI Alert🚨Got a DM from the “FBI” on Telegram?

🚨New FBI Alert🚨Got a DM from the “FBI” on Telegram?

📲 Got a DM from the “FBI” on Telegram? 🚨 Did someone named “Jaimie Quin” claim they run IC3? ⚠️ It’s a scam. Full stop. The FBI just issued an alert warning the public: They are NOT direct messaging victims on Telegram or any other social media app. A scammer posing as “Jaimie Quin” is pretending to be the head of the FBI’s Internet Crime Complaint Center (IC3) — and reaching out to individuals claiming they’ve been hacked or need help. 🚫 It’s a fraudulent scheme designed to gain your trust...

27 Apr 1min

Cyber Crime-Biggest Threat to Critical Infrastructure. Unmasking Top Cyber Threats Today To US Critical Infrastructure

Cyber Crime-Biggest Threat to Critical Infrastructure. Unmasking Top Cyber Threats Today To US Critical Infrastructure

Panel discussion with international leaders part of the Silicon Valley Think Tank, Tortora Brayda AI & Cyber Institute Task Force. Find out and join the Think Tank: https://www.tortorabrayda.org/home Chapters 00:00 Introduction to the Challenges of Securing Critical Infrastructure03:11 Vulnerabilities and Weaknesses in Critical Infrastructure10:03 Challenges Faced by Small to Mid-Sized Critical Infrastructure Organizations17:05 The Impact of Ransomware Attacks on Critical Infrastructure2...

27 Apr 1h 36min

New Alert. 🚨 Don't Fall For The New Google Subpoena🚨

New Alert. 🚨 Don't Fall For The New Google Subpoena🚨

📬 Would you fall for a fake Google subpoena? 🛡️ What if it passed every security check — and looked 100% real? 🚨 A new phishing tactic is slipping past traditional defenses — and it’s terrifyingly convincing. 🕵️‍♂️ Recent reports reveal cybercriminals are sending fake emails that mimic legal subpoenas from Google. ✅ No misspellings ✅ No suspicious links ✅ No obvious red flags They’re polished. They pass filters. And they’re designed to fool even the cautious. 📌 These emails aren’t just ...

25 Apr 1min

Zero Trust, SMB & National Security. INTEL CTO Exclusive.

Zero Trust, SMB & National Security. INTEL CTO Exclusive.

Don't miss the video interview for details: https://youtu.be/-G7hbLGDK9o Steve Orrin, Federal CTO for Intel, discusses secrets inside zero trust and r latest cyber security concerns. He is a recognized security leader and public speaker. Steve has orchestrated projects for federal government agencies on Security and AI. Steve is a key advisor in emerging technologies to the Public Sector, Defense, and Intelligence communities. Key topics: latest cyber security concerns, Global Cyber S...

25 Apr 1h 1min

Secrets To Cyber Crime Discussions. Ransomware Negotiations Unleashed.

Secrets To Cyber Crime Discussions. Ransomware Negotiations Unleashed.

David Mauro interviews ransomware negotiator, George Just, a former VP at Oracle and current CRO at Digital Asset Redemption (https://www.digitalassetredemption.com/), about how to deal with online extortion, understanding ransomware payments, and we uncover secrets to cyber crime discussions you need to know. Chapters 00:00 The Reality of Cybercrime02:00 Introduction to Ransomware Negotiation03:04 The Journey into Cybersecurity06:13 Understanding Ransomware Attacks09:00 The Art of Negotiatio...

24 Apr 57min

How start a career in cybersecurity today. Josh Mason

How start a career in cybersecurity today. Josh Mason

Discussed how start a career in cybersecurity today with military veteran and security teacher, trainer and expert, Josh Mason. Covering what employers want in cybersecurity, new approaches to enter cyber security, how transition fro military into cybersecurity today, new approaches to enter cybersecurity, how start a career in cybersecurity today, effective communication for security internally in business, new approaches to enter the cybersecurity field, and best ways to keep up to date on ...

21 Apr 55min

Zero Trust. Social Engineering. Ron Woerner.

Zero Trust. Social Engineering. Ron Woerner.

Zero Trust. New Approaches to Social Engineering. Video Episode: https://youtu.be/U-RiapHidco We discuss new approaches to understanding zero trust and new approaches to understanding social engineering with Ron Woerner. Ron is a Keynote Speaker, Tedx Speaker, Author, Security Community Leader, CEO of Cyber-AAA, Professor of Cyber Studies, CISO, Hacker and Veteran, and also works with VetSec (https://veteransec.org/), a non-profit that helps military build their cybersecurity ca...

20 Apr 43min

 Oracle Breach 2025 🎯 How Hackers Attack

Oracle Breach 2025 🎯 How Hackers Attack

In early 2025, Oracle faced two significant cybersecurity breaches that exposed sensitive data and raised serious concerns about its security practices. The first breach involved outdated Cerner servers, compromising healthcare data, while the second targeted an inactive legacy system, leading to the theft of client credentials. Both incidents highlighted critical vulnerabilities in Oracle's infrastructure and the importance of timely detection and response. The aftermath included a class act...

19 Apr 35min

Populært innen Politikk og nyheter

giver-og-gjengen-vg
aftenpodden
aftenpodden-usa
forklart
popradet
fotballpodden-2
stopp-verden
det-store-bildet
dine-penger-pengeradet
bt-dokumentar-2
nokon-ma-ga
frokostshowet-pa-p5
rss-gukild-johaug
rss-dannet-uten-piano
aftenbla-bla
e24-podden
rss-ness
rss-penger-polser-og-politikk
lydartikler-fra-aftenposten
rss-borsmorgen-okonominyhetene