Overwhelmed by CMMC? It doesn't have to be an expensive nightmare. Learn about assessments, timelines, and practical steps to achieve compliance without the jargon.
…
continue reading
Our experiences inspired the creation of The CMMC Compliance Guide Podcast and its accompanying resources. The podcast began as a way to share what we learned through real-world challenges—like helping that aerospace machine shop—and to provide accessible education for businesses navigating DoD cybersecurity requirements. The CMMC Compliance Guide Podcast breaks down complex topics like NIST 800-171 and CMMC into actionable, easy-to-understand steps. Whether you’re a subcontractor struggling ...
…
continue reading
https://petronellatech.com and our sponsor at https://compliancearmor.com present Cybersecurity and Compliance with Craig Petronella Podcast. Learn the latest on the CMMC 2.0, DFARS, NIST, HIPAA, GDPR, ISO27001 and more. Learn about the most current IT security threats in ransomware, phishing, business email compromise, cybercrime tactics, cyberheist schemes, and social engineering scams, as well as tips and tricks from leading professionals to help you prevent hackers from penetrating your ...
…
continue reading
1
Dissecting a System Security Plan That Passed with Flying Colors (Part 1)
9:25
9:25
Redă mai târziu
Redă mai târziu
Liste
Like
Plăcut
9:25
ATX Defense generated the content and narration for this episode using Google's NotebookLM and this description using Gemini Advanced. The speakers are Artificial Intelligence. The source material for this episode is a modified version of ATX Defense’s System Security Plan that removes operational details but retains key takeaways. This SSP success…
…
continue reading
1
A Digital War or an Unreasonable Ask for SMB's? (WARNING: SOAPBOX EPISODE)
49:57
49:57
Redă mai târziu
Redă mai târziu
Liste
Like
Plăcut
49:57
Submit any questions you would like answered on the podcast! In this thought-provoking episode of the CMMC Compliance Guide Podcast, Brooke and Austin Justice tackle a question that’s top of mind for many small and medium-sized businesses in the defense supply chain: Is CMMC a necessary defense in a digital war, or an unreasonable burden on SMBs? K…
…
continue reading
1
CMMC Enclaves: A Subcontractor's Path to Compliance
15:30
15:30
Redă mai târziu
Redă mai târziu
Liste
Like
Plăcut
15:30
ATX Defense generated the content and narration for this episode using Google's NotebookLM and this description using Gemini Advanced. The speakers are Artificial Intelligence. The source material for this episode is an ATX Defense whitepaper about secure CMMC enclaves for subcontractors. CMMC compliance is a major hurdle for subcontractors in the …
…
continue reading
1
Navigating the 48 CFR Rule: Essential Insights for DoD Contractors on CMMC 2.0 Compliance
37:05
37:05
Redă mai târziu
Redă mai târziu
Liste
Like
Plăcut
37:05
Submit any questions you would like answered on the podcast! In this in-depth discussion, Austin and Brooke Justice from Justice IT Consulting break down the critical updates and challenges associated with the new 48 CFR proposed rule for CMMC 2.0 compliance. Learn about the key differences from previous regulations, the most significant hurdles Do…
…
continue reading
1
32 CFR Rule Explained: Key Compliance Guide for DoD Contractors
52:31
52:31
Redă mai târziu
Redă mai târziu
Liste
Like
Plăcut
52:31
Submit any questions you would like answered on the podcast! Are you a DoD contractor navigating the complexities of the 32 CFR Rule? In this video, we break down the key aspects of the 32 CFR Rule, explaining how it impacts defense contractors and the steps you need to take to stay compliant. Whether you're new to the defense industry or need a re…
…
continue reading
1
How It All Began: The CMMC Compliance Guide Podcast Origin Story
18:43
18:43
Redă mai târziu
Redă mai târziu
Liste
Like
Plăcut
18:43
Submit any questions you would like answered on the podcast! In this special episode, we take you behind the scenes to explore the origin story of the CMMC Compliance Guide Podcast. Join hosts, Austin and Brooke Justice as they share how the podcast began, its mission to help defense contractors navigate the complexities of CMMC compliance, and wha…
…
continue reading
1
October 2024 CyberAB Town Hall Recap: CMMC 2.0 Updates You Can't Miss!
15:14
15:14
Redă mai târziu
Redă mai târziu
Liste
Like
Plăcut
15:14
Submit any questions you would like answered on the podcast! In this episode, Brooke and Austin Justice dive into the latest CyberAB townhall update, sharing key insights for defense contractors. Stay informed on the latest CMMC developments, compliance changes, and how they could impact your business. Whether you're navigating CMMC 2.0 or simply t…
…
continue reading
1
A Conversation with an Assessor ft. Chris Silvers
1:08:45
1:08:45
Redă mai târziu
Redă mai târziu
Liste
Like
Plăcut
1:08:45
Submit any questions you would like answered on the podcast! In this special episode of the CMMC Compliance Guide Podcast, hosts Brooke and Austin Justice are joined by Chris Silvers, one of less than 100 individuals officially certified as both a Certified CMMC Provisional Assessor and Instructor. With over 25 years of cybersecurity experience, Ch…
…
continue reading
1
November 2024 CyberAB Town Hall Recap: Essential CMMC 2.0 Updates for Defense Contractors
32:00
32:00
Redă mai târziu
Redă mai târziu
Liste
Like
Plăcut
32:00
Submit any questions you would like answered on the podcast! In this episode, Brooke and Austin Justice dive into the latest CyberAB townhall update, sharing key insights for defense contractors. Stay informed on the latest CMMC developments, compliance changes, and how they could impact your business. Whether you're navigating CMMC 2.0 or simply t…
…
continue reading
1
The Great Cloud Heist: Navigating Microsoft's Security Storm and the Case for Google Workspace
20:41
20:41
Redă mai târziu
Redă mai târziu
Liste
Like
Plăcut
20:41
ATX Defense generated the content and narration for this episode using Google's NotebookLM and this description using Gemini Advanced. The speakers are Artificial Intelligence. The source materials for this episode are: Department of Homeland Security Review of the Summer 2023 Microsoft Exchange Online Intrusion and Google Workspace: A More Secure …
…
continue reading
1
Google Workspace for CMMC Level 2 Compliance
21:07
21:07
Redă mai târziu
Redă mai târziu
Liste
Like
Plăcut
21:07
ATX Defense generated the content and narration for this episode using Google's NotebookLM and this description using Gemini Advanced. The speakers are Artificial Intelligence. The only source material is ATX Defense's Google Workspace CMMC Level 2 Implementation Guide located at https://cmmcguide.atxdefense.com Join us as we take a deep dive into …
…
continue reading
1
The CMMC Final Rule: What Small Businesses Need to Know
13:08
13:08
Redă mai târziu
Redă mai târziu
Liste
Like
Plăcut
13:08
The content for this episode was generated using Google's NotebookLM and voiced by artificial intelligence. The only source material is the CMMC Final Rule. This episode is an essential introduction to the CMMC Final Rule for small businesses. We cover everything from self-assessments and POA&Ms to the role of C3PAOs. Get practical advice on implem…
…
continue reading
1
Mastering Digital Parenting: Navigating Cybersecurity and Privacy for Your Family
1:14:07
1:14:07
Redă mai târziu
Redă mai târziu
Liste
Like
Plăcut
1:14:07
Lunch and Learn Presentation Hosted by Craig Petronella. Video Available at https://youtu.be/OIuxhkb-Njk - Imagine a world where your family's online interactions are as secure as fort Knox, yet as open as a summer's day in the park. That's the reality we're aiming for in this gripping discussion on digital safety. In this episode, we illuminate th…
…
continue reading
1
Mastering Cybersecurity: Strategies, Predictive Solutions, and Simplifying Protection for Businesses with Bala Ramaya
52:39
52:39
Redă mai târziu
Redă mai târziu
Liste
Like
Plăcut
52:39
Unlock the mysteries of cybersecurity and learn to navigate the complexities of compliance with expert insights from Bala Ramaya, CEO of ISSquared. This episode takes you on a journey through the evolving world of managed service providers, shedding light on how IA Squared transformed itself into a cybersecurity force. Bala not only shares the comp…
…
continue reading
1
Navigating the Complexities of API Protection and Compliance
53:55
53:55
Redă mai târziu
Redă mai târziu
Liste
Like
Plăcut
53:55
Unlock the secrets to ironclad API security with Jeremy Snyder of Firetail as we navigate the often treacherous terrain of digital safety. Peering into the murky depths of API exploitation, Jeremy brings clarity to how Firetail's cutting-edge tools not only bolster developers' efforts in constructing impenetrable APIs but also stand guard, thwartin…
…
continue reading
1
Elevating Airline Safety with Next-Gen Cybersecurity Measures
46:06
46:06
Redă mai târziu
Redă mai târziu
Liste
Like
Plăcut
46:06
Prepare to navigate the turbulent skies of cybersecurity with Sige Brody, CTO of Optinine, as we unpack the pressing dangers and defenses within the aviation sector. Discover how Optinine's managed cloud computing services are revolutionizing the way airlines protect their most valuable assets, with a focus on robust disaster recovery and business …
…
continue reading
1
Navigating the Perils of Crypto: Breaches, Security, and Safeguarding Your Digital Assets
43:54
43:54
Redă mai târziu
Redă mai târziu
Liste
Like
Plăcut
43:54
Imagine discovering that the very foundations of your financial security have been compromised by one of the most infamous crypto-heists in history. That's the chilling tale we unravel from the 2016 Bitfinex breach, with a staggering $4.5 billion at stake. We join forces with cybersecurity experts and dive into the cutting-edge blockchain forensics…
…
continue reading
1
Clashing Titans of Tech and the Rising Tide of Hacking
42:20
42:20
Redă mai târziu
Redă mai târziu
Liste
Like
Plăcut
42:20
Join Blake Rea and Craig Petronella as we unwrap the latest tech and cybersecurity developments faster than you can tear through holiday gift wrapping. From the FBI's tactical strike against the Black Cat ransomware group to the Xfinity data breach leaving millions on edge, we cover it all. We also weigh the consequences of vengeful IT maneuvers in…
…
continue reading
1
Navigating Cryptocurrency Security: Sim Swaps, Vendor Risks and Assertive Measures
39:24
39:24
Redă mai târziu
Redă mai târziu
Liste
Like
Plăcut
39:24
What if you could protect your cryptocurrency from hackers with just a few simple security measures? That's what we're diving into today in our exploration of the fascinating yet terrifying world of SIM Swaps and cryptocurrency security. We'll shed light on a real-life cautionary tale of a victim who lost his cryptocurrency to these cunning cyber c…
…
continue reading
1
Unraveling The Complexities Of Cybersecurity, Compliance And Bitcoin Wallet Security
1:01:00
1:01:00
Redă mai târziu
Redă mai târziu
Liste
Like
Plăcut
1:01:00
Do you think you're up-to-date with cybersecurity and compliance? This episode will uncover some surprising facts that you may not be aware of. Firstly, we'll be unravelling the complex challenges that healthcare organizations face, especially when dealing with outdated medical equipment. We'll look at a real-life case where a hospital was hacked, …
…
continue reading
1
Cybersecurity Threats, AI Impacts on Jobs and its Role in the Future of Electric Vehicles
37:52
37:52
Redă mai târziu
Redă mai târziu
Liste
Like
Plăcut
37:52
Are you prepared for the digital dangers lurking in your computer, or the profound impacts of artificial intelligence on our lives? This episode arms you with knowledge of the latest cybersecurity threats, from North Korean state-linked nation group hacking Mac computers, to phishing scams and vulnerabilities in class action lawsuits. We also delve…
…
continue reading
1
Guarding Against the Inevitable: Strategies for Cybersecurity and Prevention
34:52
34:52
Redă mai târziu
Redă mai târziu
Liste
Like
Plăcut
34:52
Hold onto your security blankets folks! Are we ever secure enough in this digital age? Get a grip on the pulse-raising lawsuit from the SEC against SolarWinds and the unexpected ban from the Canadian government on WeChat and Kaspersky. We harness the power of hindsight, looking back at how this enormous breach happened and what could have been done…
…
continue reading
1
Navigating the Stormy Seas of Cybersecurity and Social Media Evolution
23:12
23:12
Redă mai târziu
Redă mai târziu
Liste
Like
Plăcut
23:12
Are you prepared to navigate the rocky terrain of today's cybersecurity landscape? This episode is your compass, guiding you through the treacherous twists and turns of tech threats, from the OKTA breach to the leaking of NSA classified data to Russia and the sneaky Microsoft bug within Active Directory and Azure. We don't tiptoe around the controv…
…
continue reading
1
Unraveling BlackTech: A Deep Dive into Advanced Persistent Threats and Network Security
17:05
17:05
Redă mai târziu
Redă mai târziu
Liste
Like
Plăcut
17:05
What if you had a front-row seat to one of the most riveting stories in cybersecurity today? Join us as we unravel the story of the Chinese state-sponsored Advanced Persistent Threat, BlackTech, and their exploitation of the Cisco Zero Day CVE 2023-20109. We dissect their strategy of modifying router firmware on Cisco routers, maintaining a stealth…
…
continue reading
1
Unmasking the Xenomorph: An In-Depth Discussion on Android Security and Cybersecurity
49:01
49:01
Redă mai târziu
Redă mai târziu
Liste
Like
Plăcut
49:01
Do you know how to protect your device from the Xenomorph Banking Trojan? Join us as we dive into the murky waters of Android security threats with our enlightening guest, Blake Rea. We unmask the frightening reality of this new Trojan, aimed solely at Android users. With a chilling focus on over 35 financial institutions and some crypto wallets, t…
…
continue reading
1
MGM Cyber Attack, Personal and Business Cybersecurity Tips and Tricks
53:47
53:47
Redă mai târziu
Redă mai târziu
Liste
Like
Plăcut
53:47
MGM Cyber Attack, Personal and Business Cybersecurity Tips and Tricks. According to Okta, Hackers who breached MGM and Caesars also hit 3 other firms. Learn cybersecurity tips and tricks you can use to security harden yourselves and your business. Support the show - Call 877-468-2721 or visit https://petronellatech.com Please visit YouTube and Link…
…
continue reading
1
How To Choose A Cybersecurity Provider, Penetration Test Pricing, Zero Trust and The Latest Tips On FTX Crypto Exchange Hack
30:27
30:27
Redă mai târziu
Redă mai târziu
Liste
Like
Plăcut
30:27
How To Choose A Cybersecurity Provider. Learn tips on what to ask for and what to look for. Penetration Tests vs. Vulnerability Scans, Pricing, Zero Trust Technology and The Latest Takeaways from the recent FTX Crypto Exchange Hack. Support the show - Call 877-468-2721 or visit https://petronellatech.com Please visit YouTube and LinkedIn and be sur…
…
continue reading
1
What will happen to my Ethereum after Ethereum's Merge - Blockchain - Zero Trust Solutions - PTG-Podcast-September-7-2022
39:38
39:38
Redă mai târziu
Redă mai târziu
Liste
Like
Plăcut
39:38
What will happen to my Ethereum after Ethereum's Merge? Blockchain Solutions and use cases - Zero Trust Solutions - PTG-Podcast-September-7-2022 Visit https://ComplianceArmor.com for the latest in Cybersecurity and Training. NO INVESTMENT ADVICE The Content is for informational purposes only, you should not construe any such information or other ma…
…
continue reading
1
Teaching Your Kids to NOT Get Hacked
45:54
45:54
Redă mai târziu
Redă mai târziu
Liste
Like
Plăcut
45:54
With everything going on on the internet, navigating the digital waters of the internet with your children can be a real challenge. You want to may sure they are safe and that they don't get hacked, but how? In this episode, we give you practical tips and tricks to help keep your kids (and their devices) safe from hackers! Hosts: Craig, Erin, and B…
…
continue reading
1
How the COVID Pandemic Paved the Way for the Cybersecurity Pandemic
55:08
55:08
Redă mai târziu
Redă mai târziu
Liste
Like
Plăcut
55:08
Hackers have no shame. Any opportunity they think they can exploit will be exploited. That includes a global pandemic that has taken the lives of millions of people around the world. The death and destruction are of no consequence to these bad actors and with millions of workers working remotely, hackers have a field day. Did your business go remot…
…
continue reading
1
**Breaking Cybersecurity News Raw & Unfiltered** Teaching Your Kids How NOT to Get Hacked
56:18
56:18
Redă mai târziu
Redă mai târziu
Liste
Like
Plăcut
56:18
***In order to get the breaking cyber news to you guys FAST we are posting these right after the live broadcast! If you prefer your news more filtered, keep an eye out for the edited posting tomorrow!*** With everything going on on the internet, navigating the digital waters of the internet with your children can be a real challenge. You want to ma…
…
continue reading
1
Is a Job in Cybersecurity Right for You? A Day in the Life of a Cybersecurity Expert
31:54
31:54
Redă mai târziu
Redă mai târziu
Liste
Like
Plăcut
31:54
In this episode, we talk about what a day in the life of a cybersecurity firm looks like, and what kind of mindset it takes to be successful in this industry. Are you thinking of making a switch? Do you know a young person who is looking for career advice? Listen in, and find out if it's right for you! Hosts: Blake and Erin Support the show - Call …
…
continue reading
1
**Breaking Cybersecurity News Raw & Unfiltered** How the COVID Pandemic Paved the Way for the Cybersecurity Pandemic
1:05:57
1:05:57
Redă mai târziu
Redă mai târziu
Liste
Like
Plăcut
1:05:57
***In order to get the breaking cyber news to you guys FAST we are posting these right after the live broadcast! If you prefer your news more filtered, keep an eye out for the edited posting tomorrow!*** Hackers have no shame. Any opportunity they think they can exploit will be exploited. That includes a global pandemic that has taken the lives of …
…
continue reading
1
The REAL Reason the US is Behind the Curve in Cybersecurity
50:28
50:28
Redă mai târziu
Redă mai târziu
Liste
Like
Plăcut
50:28
Sometimes it seems as if America is ALWAYS the target of cybersecurity attacks. And that's because it kinda is! But what remakes the US such an attractive target? It's a complicated answer with multiple reasons - some that aren't too surprising, and others that may be harder to spot. But one thing is for sure: We in the US, collectively, need to ta…
…
continue reading
1
Historically Significant Hacks and How YOUR Business Can Avoid This List
41:31
41:31
Redă mai târziu
Redă mai târziu
Liste
Like
Plăcut
41:31
We've all seen the news and read the headlines - Hackers aren't going anywhere anytime soon! In fact, quite the opposite is true... So what can YOU do to keep your company's name out of the papers? Listen in and find out! Hosts: Erin and Blake Support the show - Call 877-468-2721 or visit https://petronellatech.com Please visit YouTube and LinkedIn…
…
continue reading
1
**Breaking Cybersecurity News Raw & Unfiltered** What is a "Zero-Trust" Framework, and is it Right for Your Business?
49:21
49:21
Redă mai târziu
Redă mai târziu
Liste
Like
Plăcut
49:21
***In order to get the breaking cyber news to you guys FAST we are posting these right after the live broadcast! If you prefer your news more filtered, keep an eye out for the edited posting tomorrow!*** With the rash of cyberscams and a huge portion of the workforce going remote, there has been a lot of talk about implementing a "Zero-Trust Framew…
…
continue reading
1
Compliance Regs You Should be Following that Nobody Tells You About (And Craig Catches a Gator!)
1:08:31
1:08:31
Redă mai târziu
Redă mai târziu
Liste
Like
Plăcut
1:08:31
Today we welcome Craig back! Not only do we get to hear about Compliance regulations you're probably subject to but unaware of, but we also get to hear Craig's harrowing tail of 'Gator wrestling in the murky waters of North Carolina! Link: Craig Reels in a Gator in Arapahoe, NC! Host: Craig Co-Hosts: BJ, Blake, and Erin Support the show - Call 877-…
…
continue reading
1
Don't Get Cybersecurity Insurance (Until You Listen to this Podcast)!
1:16:28
1:16:28
Redă mai târziu
Redă mai târziu
Liste
Like
Plăcut
1:16:28
Hackers aren't going anywhere, any time soon, so a lot of companies are (wisely!) looking into cyberinsurance. However, not all companies know what they need to do to get cyberinsurance, or they try to use it as a replacement for ACTUAL cybersecurity. On today's podcast, we discuss the right (and wrong) ways to get cyberinsurance for your business.…
…
continue reading
1
The REAL Reason Your Hardware Keeps Breaking When You WFH (HINT: It's You. You're the Reason.)
37:59
37:59
Redă mai târziu
Redă mai târziu
Liste
Like
Plăcut
37:59
With the great shift in 2020 from working in offices to working from home, a lot of regular IT maintenance duties have fallen through the cracks. In this episode, Dwight from PTG has practical tips and tricks to help us (non-IT) work-from-home employees keep our hardware and devices from completely falling apart! Link: How to take good care of your…
…
continue reading
1
10 Cybersecurity Facts that Shock Even Security Experts
49:28
49:28
Redă mai târziu
Redă mai târziu
Liste
Like
Plăcut
49:28
We told you the top cybersecurity myths that you need to forget immediately; now we are going to let you in on the shocking reality that is the cyber realm. From insidious Russian viruses to the vast amount of simple human error, nothing is what it seems in the digital age! Link: Top 50 Cybersecurity Statistics, Figures and Facts Hosts: Blake, Dwig…
…
continue reading
1
**Raw & Unfiltered** Compliance Regs You Should be Following that Nobody Tells You About (And Craig Reels in a GATOR!!)
1:23:36
1:23:36
Redă mai târziu
Redă mai târziu
Liste
Like
Plăcut
1:23:36
***In order to get the breaking cyber news to you guys FAST we are posting these right after the live broadcast! If you prefer your news more filtered, keep an eye out for the edited posting tomorrow!*** Today we welcome Craig back! Not only do we get to hear about Compliance regulations you're probably subject to but unaware of, but we also get to…
…
continue reading
1
Ten Cybersecurity Myths You Need to Forget Right Now
41:38
41:38
Redă mai târziu
Redă mai târziu
Liste
Like
Plăcut
41:38
We have seen and heard it all! On today's podcast, we discuss the most common cybersecurity myths and misconceptions that are out there. You won't want to miss this! Links: 10 cybersecurity myths you need to stop believing Hosts: Blake, Dwight, & Erin Support the show - Call 877-468-2721 or visit https://petronellatech.com Please visit YouTube and …
…
continue reading
1
Help Us Welcome (Back) Dwight!
32:45
32:45
Redă mai târziu
Redă mai târziu
Liste
Like
Plăcut
32:45
On today's podcast, the PTG talks with their newest tech, Dwight, about not only his past experiences but also what he has learned along away. With over 30 years of IT/Cybersecurity/MSP experience (which includes working with PTG over a decade ago), we know he will add a lot of value to the team... We are thrilled to welcome him back! Hosts: BJ, Bl…
…
continue reading
1
Computers and Timepieces: An Interview with Blake from PTG
44:36
44:36
Redă mai târziu
Redă mai târziu
Liste
Like
Plăcut
44:36
Today the PTG team talks about what PTG's Blake and Russia's Putin apparently have in common: an obsession with watches! We know this because Putin "confiscated" rare watches in response to Switzerland condemning Russia's invasion of Ukraine and Blake explains why watches are still so sought after, even with smartphones and smartwatches being as pr…
…
continue reading
1
Are All Hackers Sociopaths? Why Bad Actors Exploit Tragedy for Personal Gain
27:46
27:46
Redă mai târziu
Redă mai târziu
Liste
Like
Plăcut
27:46
In today's episode, we discuss the psychological impact of hackers not having to see their victims face-to-face, as well as the impact solar flares can have on digital devices, and the importance of a steady flow of power to avoid frying your devices. Link: https://cybernews.com/cyber-war/russian-aviation-authority-switches-to-paper-after-losing-65…
…
continue reading
1
From Zero-Trust to Zero-Day: An Interview with PreVeil's Compliance Wizard, Noël Vestal
47:25
47:25
Redă mai târziu
Redă mai târziu
Liste
Like
Plăcut
47:25
In today's podcast, PreVeil's compliance manager, Noël Vestal, discusses how using Zero-Trust end-to-end encryption helps fight the Zero-Day attacks that are all the rage today, and why having trusted vendors is crucial when implementing compliance standards, especially when a government contract is on the line. Compliance takes hard work - even wi…
…
continue reading
1
**Breaking Cybersecurity News Raw & Unfiltered** From Zero-Trust to Zero-Day: An Interview with PreVeil's Compliance Wizard, Noël Vestal
54:03
54:03
Redă mai târziu
Redă mai târziu
Liste
Like
Plăcut
54:03
***In order to get the breaking cyber news to you guys FAST we are posting these right after the live broadcast! If you prefer your news more filtered, keep an eye out for the edited posting tomorrow!*** In today's podcast, PreVeil's compliance manager, Noël Vestal, discusses how using Zero-Trust end-to-end encryption helps fight the Zero-Day attac…
…
continue reading
1
How NOT to be a Vishing Victim
28:32
28:32
Redă mai târziu
Redă mai târziu
Liste
Like
Plăcut
28:32
A number of Morgan Stanley clients fell victim to a Vishing scam. "What is a vishing scam?" you ask… Great question! But if Morgan Stanley wasn't breached (this time), how exactly did the hackers know who to target? Join the PTG team, along with Jamel from Gatekeeper, as we explore these questions and discuss what actions you can take to keep yours…
…
continue reading
1
**Breaking Cybersecurity News Raw & Unfiltered** Are All Hackers Sociopaths? Why Bad Actors Exploit Tragedy for Personal Gain
34:29
34:29
Redă mai târziu
Redă mai târziu
Liste
Like
Plăcut
34:29
***In order to get the breaking cyber news to you guys FAST we are posting these right after the broadcast! If you prefer your news more filtered, keep an eye out for the edited posting tomorrow!*** In today's episode, we discuss the psychological impact of hackers not having to see their victims face-to-face, as well as the impact solar flares can…
…
continue reading
1
03-25-22_Is Coinbase as Much of a Hot Mess as it Seems?
27:57
27:57
Redă mai târziu
Redă mai târziu
Liste
Like
Plăcut
27:57
If you are a massive crypto exchange and tens of thousands of accounts are hacked, is it the tens of thousands of users' fault, or is it possible that maybe the company's cyber hygiene isn't passing the "sniff" test? Join the PTG team as they discuss the hacks and explore what exactly is going on. Links: https://www.reuters.com/business/finance/coi…
…
continue reading