Ransomware Gang TAKE DOWN: Secrets from the Dark Web.

Ransomware Gang TAKE DOWN: Secrets from the Dark Web.

Expert Security Researcher, Jon DiMaggio, former National Security Agency (NSA) analyst, takes us under cover on the Dark Web, providing us insight in plain terms on: ransomware explained for small business and ransomware risks for small business, how cyber attacks stay undetected, how intelligence gathering is critical to security, secrets of cyber crime gangs, how stolen data is sold by cyber criminals, andunderstanding the hacker mind.Don’t miss Jon’s book, The Ar...

Episoder(310)

AI's NOT the Villain | Your Cybersecurity Flaws Are the BIG STARS!

AI's NOT the Villain | Your Cybersecurity Flaws Are the BIG STARS!

Have you ever noticed how we keep telling ourselves cyber risk is a “future problem” right up until it walks in the front door wearing a name badge? Because in this episode, we’re not talking about Ho...

24 Jan 47min

Most Wanted Dark Web Hackers. Truth about Scattered Spider.

Most Wanted Dark Web Hackers. Truth about Scattered Spider.

🚨 New episode 🚨 David Mauro exposes The COM, Scattered Spider and BLACK CAT ransomware gang. Covering topics: most wanted dark web hackers, to catch a thief, truth about scattered spider, most wante...

22 Jan 46min

Cyber Crime-Biggest Threat to Critical Infrastructure. Unmasking Top Cyber Threats Today To US Critical Infrastructure

Cyber Crime-Biggest Threat to Critical Infrastructure. Unmasking Top Cyber Threats Today To US Critical Infrastructure

Panel discussion with international leaders part of the Silicon Valley Think Tank, Tortora Brayda AI & Cyber Institute Task Force. Find out and join the Think Tank: https://www.tortorabrayda.org/home ...

22 Jan 1h 36min

Higher Education under Cyber Attack. Clemson CISO John Hoyt.

Higher Education under Cyber Attack. Clemson CISO John Hoyt.

John Hoyt, the CISO of Clemson University, shares his journey into cybersecurity and discusses the top cyber risks in higher education. He recounts his first experience with an ethical hacker and how ...

17 Jan 56min

Secrets Found In The Dark Web

Secrets Found In The Dark Web

Summary This conversation shines a light on the dark web, discussing its purpose, dangers, and what is available on it. It explores the increase in dark web activity and the sale of stolen data, inclu...

15 Jan 48min

The Threat WITHIN | Psychological Cybersecurity

The Threat WITHIN | Psychological Cybersecurity

Questions? Text our Studio direct. We read these and when helpful we give a special shout out for those to contact us. Growth without Interruption. Get peace of mind. Stay Competitive-Get NetGain. Con...

10 Jan 48min

Deepfake Attacks, Voice Cloning, and Why AI Social Engineering Works

Deepfake Attacks, Voice Cloning, and Why AI Social Engineering Works

Why modern cybercrime targets trust, urgency, and decision-making instead of systems Deepfake Attacks, Voice Cloning, and Why AI Social Engineering Works Traditional fraud used to feel obvious: misspe...

10 Jan 48min

How Parents Can Protect Children Online.

How Parents Can Protect Children Online.

Titania Jordan. Best-selling author, CMO of Bark, and regular TV Guest on national TV shows, Titania Jordan, joins us to discuss Parenting in a Tech World. We discuss: Common misconceptions and Par...

8 Jan 55min

Populært innen Business og økonomi

stopp-verden
lydartikler-fra-aftenposten
dine-penger-pengeradet
e24-podden
rss-borsmorgen-okonominyhetene
rss-penger-polser-og-politikk
finansredaksjonen
pengepodden-2
utbytte
rss-sunn-okonomi
livet-pa-veien-med-jan-erik-larssen
morgenkaffen-med-finansavisen
tid-er-penger-en-podcast-med-peter-warren
pengesnakk
lederpodden
stormkast-med-valebrokk-stordalen
okonomiamatorene
rss-heftye-moter-flinke-folk
rss-markedspuls-2
rss-fa-makro