
How Self Sovereign Identity Can Protect You Online
Joe Casanova joins us. Joe is the founder and CEO of Furlough, a thriving digital ecosystem of more than 20k entrepreneurs, brand owners, marketers, and digital pros that fosters career-upskilling and business growth via collaboration. Joe has a decade of experience helping brands to grow and innovate across the e-commerce, influencer, tech, and beauty spaces, and now uses his expertise as a mentor for entrepreneurs and brand owners, helping them to scale their business, brand, and/or career....
8 Sep 1h 4min

How the FBI fights Cyber Crime. Four Truths.
Ever wondered what really happens in a cyber crime manhunt and take-down? What the FBI actually does in cybersecurity? How they help the publc? Today we got the rare chance to sit down with Special Agent with the FBI’s Cyber Crime Division (RET.), Scott Augenbaum. He shares practical ways how to protect yourself online. His model called the Four (4) Truths is an insightful framework. Gain an FBI Perspective to protecting yourself online. This is the story of former FBI special agent Sco...
6 Sep 58min

AI Risks EXPOSED--How Hackers Use AI Today
Don't let your small business fall victim to devastating cyber attacks! Expert joins us t discuss AI Risks exposed. We explore how hackers use AI to target small businesses. From AI Social engineering to data theft, learn what you need to know to protect your business from cyber threats. Send us a text Growth without Interruption. Get peace of mind. Stay Competitive-Get NetGain. Contact NetGain today at 844-777-6278 or reach out online at www.NETGAINIT.com  ...
4 Sep 1h 5min

AI and Your Privacy. Digital Citizenship Today.
This is the story of AI and Your Privacy. Digital Citizenship Today. Antoinette King, Author of the book Digital Citizens Guide to Cybersecurity. She is the founder of Credo Cyber Consulting, LLC, who has over 20 years of experience in the security industry, from physical security to digital security. Grab her book: https://www.amazon.com/Digital-Citizens-Guide-Cybersecurity-Empowered/dp/1956464220 Send us a text Growth without Interruption. Get peace of mind. Stay Competitive-Get NetG...
4 Sep 1h 2min

🔥Marketing Warfare: How A New Framework is IGNITING Small Business Growth
David Mauro and co-host Zach Moskow engage with Kevin McGrew, author of 'The New Rules of Marketing Warfare.' They discuss the intersection of marketing and leadership, emphasizing the importance of frameworks in business strategy. Kevin shares insights on the SMAC framework (Shoot, Move, Adapt, Communicate) and how it can help businesses navigate challenges. The conversation also explores the impact of AI on marketing, the necessity of adaptability, and the future of business leadership in a...
31 Aug 54min

Ransomware Negotiations EXPOSED: Inside Cyber Hostage Deals with Kurtis Minder
Kurtis Minder, seasoned ransomware negotiator, shares insights into the complex world of cybercrime negotiations. He discusses the psychological aspects of negotiating with cybercriminals, the role of AI in both offense and defense, and the importance of understanding the motivations behind cybercrime. The conversation also touches on the evolving landscape of ransomware as a service and the implications for businesses and national security. Send us a text Growth without Interruption. Get pea...
30 Aug 1h

Crypto Fraud Exposed - How Cyber Crime Turns Violent
This is the true cyber crime story of Lamborghini Carjackers Lured by a $243M Cyber heist, a dive into crypto fraud cases and how cyber crime turns violent. This episode explores the dramatic rise and fall of Ray Diaz, a young man entangled in a world of cybercrime, luxury, and violence. It delves into the consequences of doxxing, the ruthless nature of cybercriminal networks like the COM, and the failed kidnapping plot that led to a shocking $243 million cryptocurrency heist. The narra...
29 Aug 32min

Higher Education under Cyber Attack. Clemson CISO John Hoyt.
John Hoyt, the CISO of Clemson University, shares his journey into cybersecurity and discusses the top cyber risks in higher education. He recounts his first experience with an ethical hacker and how it sparked his interest in the field. Hoyt emphasizes the importance of cyber resiliency and preparedness in the face of evolving threats. We discuss topics including how is higher education targeted for cyber crime, top tactics used in social engineering, cost effective practices to limit cyber ...
26 Aug 56min






















