Sometimes it feels like every new technology we adopt comes with a new risk we didn’t see coming. From AI and data breaches to phishing scams and ransomware, it’s clear we live in a time when cybersecurity isn’t just a tech issue, it’s a human issue.
Your Car Is Spying On You What It’s Collecting and Who It’s Telling
Andrea Amico is one of the leading voices in automotive data privacy and someone who’s spent years uncovering the hidden ways cars collect, store, and share our information. He breaks down how connected cars work, what’s actually being tracked, and why it matters not just for your privacy, but for your safety and finances too.
Fighting Child Exploitation
When it comes to protecting children online, that line gets especially thin. Debbie Garner is a retired Special Agent in charge with the Georgia Bureau of Investigation and former commander of the state’s Internet Crimes Against Children Task Force. For years she led efforts to track down online predators and bring justice to survivors. These days she’s working in the private sector, serving on the boards of Raven and Revere Technologies, pushing for smarter tech solutions and stronger training to support those still on the front lines.
Reclaiming the Internet
Cory Doctorow is a science fiction author, activist, and journalist. He is the author of many books and most recently, Picks and Shovels, The Bezel, and The Lost Cause, a solar punk science fiction novel of hope amidst the climate change emergency. Cory talks about the slow decline of online platforms and has spent decades fighting for digital rights, fair tech policy and a better, freer internet.
Security Gaps Hackers Exploit
Our guest today is Aaron Painter, CEO of Nametag, a company leading the charge in next-generation identity verification. After witnessing firsthand how easily identity theft could unravel lives—especially during the shift to remote everything—he founded Nametag to answer a critical question: how can we know who’s really behind the screen? Deep fakes and social engineering have moved beyond clever tricks and become powerful tools that bad actors are using to infiltrate businesses, breach accounts, and dismantle trust at scale.
Cyber Warfare
Cyber warfare is no longer something that happens behind closed doors or in some far-off digital corner. It’s happening now—and reshaping the rules of conflict in real time. Drone strikes controlled by apps, ransomware attacks on hospitals—today’s battleground is just as likely to be online as on the ground.
DDoS Attacks
Scammers are getting smarter, understanding the psychology behind social engineering and the challenges companies face every day can help keep networks secure. This episode will show how to anticipate these threats and secure networks against ever-changing vulnerabilities.
Safe AI Implementation
Red models associated with AI technologies highlight real-world vulnerabilities and the importance of proactive security measures. It is vital to educate users about how to explore the challenges and keep AI systems secure. Today’s guest is Dr. Aditya Sood.
The Art of Espionage
What makes someone betray their country? It’s rarely just about money. In this episode, you’ll hear from a retired CIA officer who spent 25 years recruiting foreign spies by tapping into something deeper than greed. Jim Lawler shares real stories from his career in human intelligence, where persuasion was built on empathy, trust, and understanding what truly drives people.
Understanding Ransomware and Defense Strategies
When it comes to cybersecurity, most people think about firewalls, passwords, and antivirus software. But what about the attackers themselves? Understanding how they operate is just as important as having the right defenses in place. That’s where Paul Reid comes in. Paul shares insights from his 25+ years in cybersecurity, including his experience tracking nation-state attackers, analyzing ransomware-as-a-service, and why cybercrime has become such a highly organized industry.
Privacy and Surveillance
Josh isn’t your typical privacy advocate. As the creator behind the website and YouTube channel “All Things Secured”, his passion for digital privacy was forged through nearly 20 years living abroad, much of it in China. In our revealing conversation, Josh pulls back the curtain on what government surveillance actually feels like from the inside. He shares how these experiences transformed a personal survival strategy into a mission to help others protect themselves in our increasingly watched world.
Navigating Data Brokering and Privacy
In a world where data is more important than ever, understanding how it is acquired, shared, and misused is critical. This data powers targeted marketing, scams, and even identity theft. But what can be done to regain control of personal privacy? Today we’re diving deep into this topic with cybersecurity expert Darius Belejevas, who has spent years assisting folks in removing their data from these digital marketplaces. He is the head of Incogni and Surfshark.
Be Your Own Fraud Prevention Hero
Getting defrauded is common. It happens everywhere but it’s underreported because of embarrassment. If you’re a victim of fraud the sooner you report the more likely you are to get a better outcome. ’m pleased to welcome Marc Evans, a seasoned financial crimes detective and co-founder of Fraud Hero, who has spent over a decade investigating fraud schemes that affect everyday people.
Empowering the Vulnerable
In cybersecurity, we need to understand the mindset of hacking, which is not ethics. We also need to realize that even if we have cybersecurity experts get hacked, there is no reason to feel embarrassed or ashamed when it happens to us. In today’s show we’re going deep into the world of cybersecurity with one of the industry’s most seasoned experts, Sam Curry.
How Not to Money with Joel Larsgaard
Today’s guest Joel Larsgaard has been helping people take control of their finances for over 15 years. As the co-host of How To Money and a weekly radio show Joel breaks down the often confusing world of personal finance. His passion for financial literacy comes from personal experience and he’s been recognized for his work including being on the Forbes Advisory Board.
Brushing Scams with Venkat Margapuri
Scams come in many forms but receiving a freebie from a scammer doesn’t make sense. If something shows up at your door that you didn’t order, should you be worried? Brushing scams are becoming more common and while they may seem harmless at first they can be a gateway to fraud, identity theft and financial loss.
Ransomware, Phishing and Fraud With Bryce Austin
Cybersecurity isn’t just a concern for large corporations. It’s vital for businesses of all sizes. Bryce Austin is the CEO of TCE Strategy, a cybersecurity advisory firm. They provide vulnerability scans, penetration tests, fractional CISO services, and incident response services. He is also a professional speaker on ransomware. Bryce is the fractional CISO to many companies, including one on the S&P 500.
CISOs: The Ultimate Stress Test With Jill Knesek
With all the shifts in cybersecurity, it’s crucial to find ways to attract new talent to close the growing skills gap. CISOs now juggle complex systems managed at multiple levels and handle burnout amongst many other responsibilities. Today’s guest is Jill Knesek. Jill is the Chief Information Security Officer for Blackline, a company that does financial SaaS solutions.
AI, Automation, and the Future of Cybersecurity With Mike Lyborg
With the increase in targeted cyber attacks, it’s more important than ever for organizations to quickly identify and respond to threats. AI is helping security teams by acting as virtual analysts, handling much of the investigation work. However, human oversight is still essential for the final steps and judgment.
Cybersecurity Training from Boring to Engaging With Howard Goodman
Building a security culture and staying ahead of modern threats has never been more important. Today’s guest is Howard Goodman, Senior Technical Director at Skybox Security. We discuss organizational challenges, best practices, and the future of cybersecurity.
Next-Gen Account Security with Christiaan Brand
With phishing and password breaches on the rise, passkeys could offer a more secure, user-friendly solution that could reshape how we protect our online identities. Today’s guest is Christiaan Brand. Christiaan is the co-founder of Entersekt, a financial services security firm and a key player at Google in their security and identity teams.
5 Key Cybersecurity Elements with Kelly Hood
How do phishing scams, AI-powered attacks, and strategic governance intersect? Together, they’re redefining the future of cybersecurity. Organizations are navigating a mix of challenges and implementing innovative solutions to proactively address today’s threats.
Identity Crimes (Theft, Compromise & Misuse) with Mona Terry
It’s important to be cautious when sharing personal information, and to verify identities before responding to requests for sensitive data. Mona Terry analyzes victim experiences to create ITRC’s Identity Report and to provide information about new and ongoing trends in identity crimes.
Why Resolutions Fail with Dr. Leslie Becker-Phelps
We often put off changes and schedule them to start on January 1st. Many of these idealistic resolutions fail shortly after beginning, so it is important to be thoughtful when planning so that you can set yourself up for success.