Unlock the future of cybersecurity with the "Dr. Zero Trust Podcast" on all podcasting platforms! Join me as we delve into Zero Trust Security, redefining how we protect data and networks. Explore frameworks, threat prevention, identity management, exclusive interviews, and emerging tech. Whether you're a pro or just curious, trust me– this podcast is where those who value honesty and real insights go for their cybersecurity insights! Tune in on Spotify, Google, or ITunes now. #DrZeroTrustPo ...
…
continue reading
20-year FBI Special Agent provides cyber-related insight and education for individuals and businesses. This podcast includes discussions on historical FBI cyber and counterintelligence cases and discusses current cybercrime issues.
…
continue reading
The ISACA Podcast gives you insight into the latest regulations, trends and threats experienced by information systems auditors and governance and security professionals. Whether you are beginning your career or have decades of experience, the ISACA Podcast can help you be better equipped to address industry challenges and embrace opportunities.
…
continue reading
Sol'd Out! Unofficial Podcast of the Austin Sol.
…
continue reading

1
The CyBur Guy Podcast 2025 Ep3 - Dr. Chase Cunningham
33:29
33:29
Play later
Play later
Lists
Like
Liked
33:29In this episode I welcome back Dr. Chase Cunningham to discuss his Demo-Force partnership with Forescout and he graciously lets me grill him on the new National Cyber Director and Deep seek. For my soapbox item, refer to his article: https://www.theregister.com/2025/02/13/fbi_cisa_unforgivable_buffer_overflow/?td=rt-3a Give a listen, tell a friend.…
…
continue reading
In this conversation, Dr. Zero Trust discusses the current state of cybersecurity, focusing on leadership appointments, the confusion surrounding cyber threat naming, emerging threats, and the intersection of espionage and cybercrime. He critiques the lack of operational expertise in cybersecurity leadership, highlights the challenges posed by evol…
…
continue reading
In this conversation, Dr. Zero Trust, Anne Saunders, and Jack discuss the complexities of cybersecurity, particularly in the context of IoT and operational technology. They explore the vast attack surface presented by IoT devices, the challenges of securing these devices, and the importance of embedding security into the design of technology. The d…
…
continue reading

1
The CyBUr Guy Podcast 2/5/25 - Protecting the Seniors in your life with Paige Hanson
42:30
42:30
Play later
Play later
Lists
Like
Liked
42:30In this episode, I am joined by Paige Hanson on SecureLabs to talk about protecting seniors from cyber threats and scams. This is a wide-ranging conversation with lots of good resources. Share it with the seniors and senior caregivers in your life. Give a listen, tell a friend. Resources mentioned in this episode: https://seniorresourceconnectors.c…
…
continue reading
The CyBUr Guy Podcast is BACK - for REAL this time. Darren explains the plan for the podcast moving forward, the creation of www.goldshieldcyber.com, and introduces a new part of the podcast for those who like rants called the "Soapbox." Give a listen, tell a friend, let me know what you think at [email protected] or at linkedin.com/in/darrenm…
…
continue reading
In this conversation, Dr. Zero Trust discusses various aspects of cybersecurity, including recent ransomware threats, the implications of AI and deepfake technology, and the importance of adopting a Zero Trust security framework. He also critiques the Biden administration's cybersecurity measures and highlights the ongoing challenges posed by stole…
…
continue reading
In this conversation, Dr. Zero Trust discusses various aspects of cybersecurity, focusing on ransomware attacks, their impact on educational institutions, challenges in the cybersecurity workforce, emerging startups, government initiatives, financial implications of data breaches, and the effectiveness of cybersecurity labeling programs. The discus…
…
continue reading
The prevalence of ransomware and the security concerns associated with AI have made the role of cybersecurity professionals vital for enterprise success. The complex security landscape can make cybersecurity jobs stressful, but enterprises can take steps to retain cybersecurity talent and ensure enterprise assets are protected. In this podcast, Jus…
…
continue reading
In this conversation, Dr. Zero Trust reflects on the state of cybersecurity as the new year begins, discussing the persistent issues of phishing, social engineering, and weak passwords that continue to plague the industry. He reviews significant cyber incidents from the previous year, including data breaches and legal developments, while also shari…
…
continue reading
In this conversation, I discussed various aspects of cybersecurity, including the manipulation of narratives through social media, the implications of leadership structures within Cyber Command and the NSA, personal liability for cybersecurity leaders, emerging trends for 2025, and significant supply chain vulnerabilities. The discussion also refle…
…
continue reading

1
Examining Authentication in the Deepfake Era with Dr. Chase Cunningham
38:28
38:28
Play later
Play later
Lists
Like
Liked
38:28Given the dynamic nature of cyberthreats and the ever-expanding digital ecosystem, authentication is more critical than ever. In this episode, ISACA director of professional practices and innovation discusses a new content piece titled, "Examining Authentication in the Deepfake Era" with author Dr. Chase Cunningham. Their conversation of the paper …
…
continue reading
In this conversation, I discussed various cybersecurity reports, highlighting the increasing risks associated with AI, human behavior, and organizational vulnerabilities. He emphasizes the need for better security practices, the implications of recent data breaches, and the importance of updated cybersecurity legislation. The conversation also touc…
…
continue reading

1
Safely and Responsibly Using Emerging Health Technology
25:10
25:10
Play later
Play later
Lists
Like
Liked
25:10Emerging healthcare technologies have the potential to revolutionize healthcare and accessibility-related concerns, but these advancements are not without risk. To maximize the value and minimize the harms associated with emerging health technologies, it is critical to address ethical, privacy, and societal concerns to ensure that these technologie…
…
continue reading
In this conversation, I discussed the ongoing cybersecurity talent crisis, highlighting qualified individuals seeking employment and the systemic issues contributing to the hiring problem. He delves into recent cybersecurity incidents, their financial implications, and the impact of identity security on consumer behavior. The discussion also touche…
…
continue reading
In this conversation, Dr. Zero Trust and Kevin Brink discuss the challenges and innovations in implementing Zero Trust security frameworks, particularly within the Department of Defense (DoD). Kevin shares insights on the need for automation in Zero Trust assessments to overcome the limitations of manual processes, emphasizing the importance of emp…
…
continue reading
In this conversation, I discussed various aspects of cybersecurity, including recent TSA regulations, stock market trends related to cybersecurity companies, emerging threats from AI-driven phishing scams, the importance of veteran employment in the cybersecurity field, rising salaries and stress levels among cybersecurity professionals, and the ne…
…
continue reading
In this episode of the Dr. Zero Trust podcast, hosts James Pham and Oz Wasserman from Opsin discuss the implications of generative AI in the context of cybersecurity and Zero Trust principles. They explore the evolution of AI, the risks associated with generative AI, and how Opsin aims to secure sensitive data while leveraging AI for productivity. …
…
continue reading
I discussed various topics related to #cybersecurity, including CISA's new international cyber security plan, the appointment of a new CISO at UnitedHealthcare, the progress of federal agencies in implementing #zerotrust, and the evolving landscape of hacking influenced by #AI. The discussion also touches on a serious hacking incident involving The…
…
continue reading
In this conversation, I discuss the ineffectiveness of compliance violations and fines in changing corporate behavior regarding cybersecurity. I present data showing that fines are often negligible compared to company revenues, making them merely a cost of doing business. I argue for a reevaluation of negligence in cybersecurity and emphasizes the …
…
continue reading
In this conversation, I discuss various cybersecurity incidents and trends affecting organizations, including CrowdStrike's stock performance, foreign influence in U.S. elections, cybersecurity failures at Sellafield, and the impact of cyber incidents on critical infrastructure. The conversation also covers recent breaches at ADT and American Water…
…
continue reading
In this conversation, I discuss various cybersecurity topics, including investment strategies in cybersecurity stocks, vulnerabilities in vehicle security, the implications of AI vulnerabilities, the rise of cyber threats related to social media scandals, workforce development initiatives in cybersecurity, the risks posed by North Korean cyber acto…
…
continue reading
Den Jones talks about why he is launching 909 Cyber for smb's and other businesses. He and I chat about how to address critical strategic shortfalls for organizations and he runs us through how he put Zero Trust in place while at Adobe! Don't miss this one!
…
continue reading
The conversation delves into various pressing cybersecurity issues, including a recent attack on Hezbollah involving explosive pagers, the implications of cyber warfare, election interference by Iranian hackers, the severe impact of ransomware on healthcare, and the ongoing challenges of data privacy. The discussion also critiques the effectiveness…
…
continue reading
SAP systems are treated differently than many other enterprise applications from a cybersecurity perspective. Most SAP security teams are siloed and left to meet security objectives on their own. Since SAP is so integral to organizations, it is unusual for SAP security objectives to not be on the radar of an existing 24/7 cybersecurity team executi…
…
continue reading
In this conversation, Myself and Aaron Shah from Cybermaxx discuss the complexities of cybersecurity, emphasizing the importance of understanding both offensive and defensive strategies. We explore the dichotomy in cyber operations, the adversarial mindset, and the common misconceptions clients have about their risk levels. The discussion also cove…
…
continue reading
In this conversation, I discuss various topics including music licensing, the recent school shooting in Georgia, the impact of cyber security breaches on corporate reputation, the glitch in Chase Bank ATMs, the warning from Warren Buffett about cyber insurance losses, Chinese hackers exploiting software bugs, the launch of a cyber incident reportin…
…
continue reading
In this podcast episode, DrZeroTrust discusses various cybersecurity topics, including a partnership between G2 and security vendors, a cryptocurrency scam that led to the collapse of a Kansas bank, weaknesses in the FBI's cybersecurity practices, a breach at National Public Data, the state of phishing training, the use of AI chatbots by police off…
…
continue reading
In this conversation, I discuss various topics including the US Army's failed $11 million marketing deal with the UFL and Dwayne 'The Rock' Johnson, the state of ransomware in state and local government organizations, the Mimecast Global Threat Intelligence Report, the reliance on a few tech companies for critical aspects of the economy, the need f…
…
continue reading

1
Book Chat: Soft Skills and Architecting Success with Evgeniy Kharam
28:56
28:56
Play later
Play later
Lists
Like
Liked
28:56Evgeniy, the author of a book on soft skills in technology sales, discusses the importance of soft skills in the tech industry. He emphasizes the need for curiosity, the ability to overcome fear, and the importance of practicing soft skills outside of work. Evgeniy also talks about the flaws in the way conferences are organized and suggests a more …
…
continue reading
What should we know about the "possible" DDoS hit on the Trump X broadcast? What does another breach of billions of records mean? Even if it's got criminal record and background information? Uh oh. And more on this one!
…
continue reading
In this conversation, I interview Gentry Lane, CEO and founder of Nemesis Global, about cybersecurity and the challenges faced in the industry. They discuss the lack of leadership and strategy in national cybersecurity, the need for a global, interoperable system platform for early detection and threat recognition, and the ineffectiveness of curren…
…
continue reading
Was my full body scan MRI worth it? IBM's data breach report is out, what should we pay attention to. Did Crowdstrike's issue reveal more about how fragile our connected world is? And are Deepfakes protected speech? Lot's to discuss on this one!
…
continue reading
What are Non-Human Identities, and why should we care? What does a 4 time CISO have to say about this issue? Does Zero Trust stand up to his scrutiny? Don't miss this one!
…
continue reading

1
The CyBUr Guy Podcast: Let me help your business get a litte Cyber Safer!
5:40
5:40
Play later
Play later
Lists
Like
Liked
5:40In this micro-pod I make an offer for pretty much any business or organization interested in getting Cyber Safer. Give a listen, tell a friend. Contact me at [email protected] or follow me at linkedin.com/in/darrenmott.By Darren J. Mott
…
continue reading

1
What Enterprises Need to Know About ChatGPT and Cybersecurity
21:44
21:44
Play later
Play later
Lists
Like
Liked
21:44Many people are pondering whether generative artificial intelligence (AI) tool ChatGPT is a friend or a foe. In this ISACA podcast episode, Camelot Secure Director of Solutions Engineering Zachary Folks discusses not only his view of how ChatGPT can be considered an evolution of the encyclopedia, but importantly how it is aiding cybersecurity profe…
…
continue reading
DDoS hosts get arrested, but is it really a legit punishment? Cisco has an issue with remote access and a level 10 vuln, uh oh! Deepfakes are up over 1000% in countries with elections in 2024! And Snowflake adds MFA, after their issue, hurray! Buckle up!
…
continue reading
In this conversation I discuss the Confucius Institute, cybersecurity search engines, ransomware defense evasion tactics, the GOP platform on protecting critical infrastructure, the OpenAI breach, cybersecurity concerns in the automotive industry, the White House's push for increased cyber funds, and the healthcare industry's pushback against cyber…
…
continue reading

1
The CyBUr Guy Podcast - The CSRB Stinks (No Kidding)
6:52
6:52
Play later
Play later
Lists
Like
Liked
6:52Thanks to Corey Munson for making this article known to me. https://www.propublica.org/article/cyber-safety-board-never-investigated-solarwinds-breach-microsoft?mod=djemCybersecruityPro&tpl=cs Needless to say the Cyber Safety Review Board is about useless....who could have predicted? Oh wait, I think I did! Give a listen, tell a friend.…
…
continue reading
New "listening" sites in Cuba, uh oh. Is Temu a threat, it is from China. OpenSSH has some serious issues. Will the Supreme Court affect our cyber security posture? TeamViewer gets hit as well. Buckle up!
…
continue reading

1
The CyBUr Guy Podcast - Who is the "GET CYBER SMART" book for?
4:04
4:04
Play later
Play later
Lists
Like
Liked
4:04In the first of what I hope is an increasing library of micro podcasts, I explain who my new book "Get Cyber Smart, A user-friendly guide to keeping your family, your business, and yourself safe online" is intended for. Give a listen, tell a friend. Email me at [email protected] Darren J. Mott
…
continue reading

1
A CyBur Guy Podcast Special - Protecting Seniors with Scott Augenbaum
48:42
48:42
Play later
Play later
Lists
Like
Liked
48:42The CyBUr Guy Podcast is back with a special on "Protecting Seniors". Darren is joined by fellow retired FBI Special Agent Darren Mott to discuss the growing problem of seniors being scammed online. They discuss the problem and provide solutions. Give a listen, tell a friend.By Darren J. Mott
…
continue reading
Did Microsoft's leadership really say they don't have to play by China's rules? Did they potentially lie in front of Congress? Have you ever read the book that is guiding Chinese cyber warfare strategy? I'll tell you where it is. Those important points and WHOLE lot more on this one.
…
continue reading

1
Weekly(ish) Cybersecurity and Zero Trust Market Analysis
28:49
28:49
Play later
Play later
Lists
Like
Liked
28:49US government contracts pay big fine for doing "no no's" on cyber, why isn't that happening more often? A crime related database was hacked and leaked, not good for those who filed complaints. Microsoft's CEO took a beating on Capitol Hill for the companies issues with security, ouch. And more on this one!…
…
continue reading
What does it mean to be Breach Ready? A CISO tells me all about his views on this. How should we think about micro-segmentation? Is it really that hard to do right? Where should controls be applied to help limit lateral movement? Can software really help you be ready for an 8K filing with the SEC?
…
continue reading

1
Weekly(ish) Cybersecurity and Zero Trust Market Analysis
21:15
21:15
Play later
Play later
Lists
Like
Liked
21:15What does it take to really get hit hard for a "cyber" crime? Deepfake the President and find out. Why is it a risk to have a single vendor running all government IT systems? And how does that seem like "fair" competition as required by law? What is skill based hiring for cyber and is that a good thing? Check this episode out!…
…
continue reading
Welcome to Episode 4 of "The Cyber Standard Podcast"! Join host Ameet Jugnauth, Vice President of the London Chapter of ISACA, as he delves into the world of cybersecurity standardization. In this episode, titled "Becoming a License Body," Ameet is joined by esteemed guests Bryan Lillie, Strategic Technical Lead at the UK Cyber Security Council, an…
…
continue reading
What should we know about micro-segmentation? How important is a policy engine to Zero Trust enterprises? Where does the focus for network controls need to be? And more on this one!
…
continue reading

1
Weekly(ish) Cybersecurity and Zero Trust Market Analysis
31:03
31:03
Play later
Play later
Lists
Like
Liked
31:03Was that Nigerian prince who wanted to share his money with you real? The US DoJ files paperwork on a Russian Lockbit "mastermind", so what? How much is it going to take before we see real action based on the aggression we see from our adversaries? Those and more on this one! Don't miss it!
…
continue reading
What is cyber GRC? Why do we need to concern ourselves with it? Can any business do this? How can a business achieve smart compliance? Does AI introduce risk to the process or benefit it? Lots of great stuff here with Cypago.
…
continue reading

1
InfoBlox and Meerkats - What You Should Know
27:54
27:54
Play later
Play later
Lists
Like
Liked
27:54Meerkats are dangerous, I guess. Especially in DNS. Yeah, that Meerkat. Why should we know about this type of attack? How does China play in here? Where is the risk? Does this type of attack merit increased concern?
…
continue reading