Cybersecurity Today Podcast Por Jim Love arte de portada

Cybersecurity Today

Cybersecurity Today

De: Jim Love
Escúchala gratis

Updates on the latest cybersecurity threats to businesses, data breach disclosures, and how you can secure your firm in an increasingly risky time. Política y Gobierno
Episodios
  • The Evolving Landscape of Cybersecurity Training: Effective Strategies and Misleading Headlines
    Aug 23 2025

    In this episode of Cybersecurity Today, host Jim Love explores the complex dynamics of cybersecurity training with guests Michael Joyce and David Shipley. They discuss the importance of continuous awareness and the temporal decay of training effects. The conversation highlights the critical balance between training frequency and effectiveness, with data suggesting that monthly phishing simulations and quarterly training interventions offer optimal results. Despite recent headlines claiming phishing training is ineffective, the discussion underscores the nuanced understanding required to navigate cybersecurity education. The episode also delves into academic versus business perspectives, emphasizing the importance of empirical research and critical thinking in developing effective cybersecurity strategies.

    00:00 Understanding Human Vigilance and Awareness Decay
    00:33 Introduction to Cybersecurity Today
    00:46 Meet the Experts: Michael Joyce and David Shipley
    01:39 Exploring the Human-Centric Cybersecurity Partnership
    03:38 The Role of Liberal Arts in Cybersecurity
    04:23 Challenges in Cybersecurity: Technology vs. Human Behavior
    06:34 The Importance of Independent Research in Cybersecurity
    12:30 Analyzing Cybersecurity Awareness Month
    18:32 Phishing Simulations and Security Fatigue
    23:14 The Impact of Training on Phishing Awareness
    39:38 Experimenting with Phishing Training Frequency
    39:51 Critiques and Insights on Cybersecurity Training
    41:51 Optimal Training Intervals and Their Impact
    43:23 The Role of Awareness in Cybersecurity
    44:13 Understanding Phishing Reporting and Skills Decay
    45:22 Ethical Considerations in Phishing Simulations
    46:38 New Data on Why People Click Phishing Links
    55:52 The Importance of Psychological Safety
    57:23 Debunking Misleading Headlines on Phishing Training
    01:05:44 The Complexity of Cybersecurity Research
    01:16:41 Final Thoughts and Recommendations

    Más Menos
    1 h y 23 m
  • Cybersecurity Today: Massive Data Exposures, Microsoft Failures, and PayPal Breach Claims
    Aug 22 2025

    In this episode of Cybersecurity Today, host Jim Love covers a range of recent cybersecurity incidents. A major privacy failure has hit Elon Musk's Grok chatbot, exposing over 370,000 private conversations with sensitive information. Microsoft's recent security update has caused SSD and HDD failures, complicating data recovery. Hackers have exploited Microsoft's own login infrastructure to create phishing traps, making it difficult for users to spot fake login pages. The leader of the Wrapper Bot DDoS gang has been arrested following a detailed investigation. Finally, a hacker group claims to have 15.8 million PayPal credentials, although these claims are disputed by PayPal and security researchers. Jim also invites listeners to share their thoughts and comments through various contact methods.

    00:00 Agro Leak Exposes 370,000 Chats
    02:22 Microsoft Scrambles to Fix SSD Failures
    03:52 Hackers Hijack Microsoft Infrastructure
    05:40 Leader of Wrapper Bot DDoS Gang Arrested
    07:14 Hackers Claim 15.8 Million PayPal Logins Stolen
    08:34 Conclusion and Contact Information

    Más Menos
    9 m
  • Cybersecurity Breaches: Salesforce, Workday, and Critical Infrastructure Hacked
    Aug 20 2025

    In today's episode of 'Cybersecurity Today,' hosted by Jim Love, we cover several key issues in the cybersecurity landscape. Firstly, a breach involving Workday and social engineering attacks targeting Salesforce customers is discussed. Next, the risks posed by a recent Windows update potentially causing data corruption on SSDs and HDDs are highlighted. We also delve into a critical infrastructure breach where Russian hackers remotely accessed a Norwegian dam's control system. Additionally, the episode covers Google's vulnerabilities in its AI and Gmail services, and finally, Apple's significant privacy victory against the UK’s backdoor encryption mandate. The episode concludes with a call for listener support through donations to sustain the program.

    00:00 Introduction and Headlines
    00:23 Workday Data Breach Explained
    02:15 Windows Update Issues
    04:05 Norwegian Dam Cyber Attack
    05:49 Google's Security Challenges
    07:12 Apple's Privacy Victory
    08:19 Conclusion and Listener Support

    Más Menos
    9 m
Todas las estrellas
Más relevante  
It is obvious that the person reporting has worked in this field. As he is reporting, the way the story is delivered is told in the exact manner that someone who as seen the ridiculous Cyber hygiene of some of these companies that should know better it perfect. You can often hear the smile on his face. I cannot tell you how much this resonates with me as a person that has screamed the importance of some of these routine and minor prevention methods that could stop these attacks.

Love your delivery!

Se ha producido un error. Vuelve a intentarlo dentro de unos minutos.

This is a great podcast for those looking to stay up to date with recent developments in cyber security.

Awesome!

Se ha producido un error. Vuelve a intentarlo dentro de unos minutos.