Podcast
The World of Scambaiting, Preventing Social Media Account Takeovers, Network Wrenches Hacked
Tom Eston | | account takeover, account takeovers, Bosch Rexroth Handheld Nutrunner, Cyber Security, Cybersecurity, Data Privacy, Digital Privacy, Episodes, Fraud, Information Security, Infosec, Internet of things, iot, Kitboga, Malware, Phishing, Podcast, Podcasts, Privacy, Rachel Tobac, Ransomware, Scam Baiting, Scambaiting, Scammer Payback, scammers, Scams, security, social engineering, social media, technology, Twitter, Weekly Edition, X
In Episode 313, hosts Tom and Scott discuss the world of scambaiting, discussing what it is, the tactics used, and its effectiveness in stopping scammers. They talk about popular channels like Scammer ...
Security training: Necessary investment or overrated expense?⎥Mel Reyes (Global CEO, CIO, CISO, & CTO with 30 years of experience)
Explore whether security training is a necessary investment or an expense, how to effectively measure the ROI & how to strike the right balance ...
Ardent Health Services Breach
In a recent podcast interview with Cybercrime Magazine's Host, Heather Engel, Scott Schober, Cyber Expert, Author, and CEO of Berkeley Varitronics Systems, discusses the recent breach of Ardent Health Services and Epic, ...
Ohio’s New Social Media Law, Meta’s Link History Feature, 175 Million Passcode Guesses
Tom Eston | | Apple, brute-force attack, children, Cyber Security, Cybersecurity, Data Privacy, Digital Privacy, Episodes, facebook, Information Security, Infosec, Instagram, iPhone, Link History, Meta, Ohio, Ohio Social Media Law, Ottawa, passcode, Passcodes, Podcast, Podcasts, Privacy, security, social media, technology, Teenagers, Weekly Edition
In episode 312, Tom and Scott discuss the implications of a new law in Ohio that may require parental consent for children under 16 using social media, including the pros and cons ...
What is ASPM: A breakdown of the current state and its future⎥James Berthoty (Security at PagerDuty)
Explore what is ASPM, what's wrong with its current state, what’s missing from Gartner's perspective, and what ASPM might look like in the future ...
Most Advanced iPhone Exploit Ever, Google’s $5 Billion Settlement, Apple’s Journal App
Tom Eston | | api, Apple, Cyber Security, Cybersecurity, Data Privacy, Digital Privacy, Episodes, Exploit, google, Google Privacy Lawsuit, Information Security, Infosec, ios, iPhone, iPhone Exploit, Journal, Journaling, Mobile, Mobile App, New Year, Podcast, Podcasts, Privacy, security, technology, Weekly Edition
In this episode, we discuss the most sophisticated iPhone exploit ever, Google’s agreement to settle a $5 billion lawsuit about tracking users in ‘incognito’ mode, and a new iOS app, Journal. The ...
SCADA systems: How secure are the systems running our infrastructure?⎥Malav Vyas (Security Researcher at Palo Alto Networks)
Explore whether APIs introduce more security risks than benefits to SCADA systems, how hard it is to secure SCADA, and key future challenges ...
The Three Keys to Success in Cybersecurity
Tom | | career, Careers, communication, Communication Skills, Continuous Learning, Cyber Security, Cybersecurity, Cybersecurity Careers, Cybersecurity Industry, Data Privacy, Digital Privacy, education, empathy, future, Information Security, Infosec, Key Lessons, Leadership, Learning, Podcast, Podcasts, Privacy on the Internetz, security, speaking, Teaching, Teaching Others, technology
One of the big questions that I often get is: How does someone become successful in a cybersecurity career? In this blog I want to share with you the three key lessons ...
The Three Keys to Success in Cybersecurity
Tom Eston | | career, Careers, communication, Communication Skills, Continuous Learning, Cyber Security, Cybersecurity, Cybersecurity Careers, Cybersecurity Industry, Data Privacy, Digital Privacy, education, empathy, Episodes, future, Information Security, Infosec, Key Lessons, Learning, Podcast, Podcasts, Privacy, security, speaking, Teaching, Teaching Others, technology, Weekly Edition
In this episode, host Tom Eston shares the three key lessons he’s learned over his 18-year career in cybersecurity: effective communication, continuous learning, and empathy. He talks about the importance of understanding ...
The Year in Review and 2024 Predictions
Tom Eston | | 2023, 2024, AI, Barbie movie, Cyber Security, Cybersecurity, Data Privacy, Digital Privacy, Episodes, Happy New Year, Information Security, Infosec, legislation, MA, Mergers and Aquisitions, New Year, Phishing, Podcast, Podcasts, predictions, Privacy, Ransomware, security, technology, TikTok, TikTok Ban, Twitter, Weekly Edition, X
In our last episode of the year, we replay our predictions for 2023 reviewing what we got right and what we didn’t. We cover various topics, such as Twitter’s influence, the future ...