
The Intersection of Technology and Domestic Violence with Audace Garnett
The advent of technology has created both advantages and challenges for people trying to protect themselves from harmful situations. Being aware of the capabilities of the technology around us, the da...
3 Jan 202432min

4 Ways to Reduce Cybercrime with Roger Grimes
Social engineering has become so creative and clever with the ways scammers are trying to infiltrate your world. AI and deep fakes are only going to make things worse. Over the past 30 years, fighting...
27 Dec 202353min

Fake vs. Taken-Over Accounts with Jason Kent and Will Glazier
As we approach the next season, threat actors will be keeping a close eye on dating apps. These apps have become a prime target for threat actors due to the size of the market expanding to over 300 mi...
20 Dec 202345min

The Changing World of Data Breaches with Troy Hunt
Everyone who's on the internet is exposed to risk. Every time you set up a new account or app, you create another place where your data can be hacked or breached. This makes your differing passwords c...
13 Dec 202352min

When Conservatorships Go Wrong with Diane Dimond
As people age and their physical and mental health declines, conservatorships are often considered. If you're not careful, the entire estate can be spent on management costs and abuse can occur. There...
6 Dec 202337min

5 Things to Teach Your Kids About Predators with Michael Buraimoh
Many parents assume that their children will never be groomed by a predator and then miss the opportunity to educate their kids on the techniques that are used. Every child, regardless of gender, can ...
29 Nov 202332min

The Evolution of Digital Identity with Philipp Pointner
Currently we have hard copy passports and driver's licenses, but as our digital identities evolve, we may find ourselves with a worldwide digital standardized way of proving who we are. Today's guest ...
22 Nov 202351min

Preventing and Reporting Cyber Attacks with Robert Karas
Cyber criminals are growing in their attack planning. CISA is continuing training their teams to look for vulnerabilities and help out not only the government, but other entities secure their networks...
15 Nov 202339min





















