The Human Side of Cyber Security with Jessica Barker

The cyber security circle of information will always have some human involvement and raising awareness in how systems were designed, developed, used, and abused is critical. Today’s guest is Dr. Jessica Barker. Jessica is an award winning leader in the human side of cyber security and has delivered face to face awareness sessions to over 50,000 people. She is a best selling author, international keynote speaker, media commentator, and serves on numerous boards, including the UK government’s Cyber Security Advisory Board. 

The Impact of the Metaverse with Mark van Rijmenam

With all of the AI advances and the metaverse, people will face the decision on how to embrace the technology because it will become unavoidable. Today’s guest is Dr. Mark van Rijmenam. Mark is The Digital Speaker. He is a leading strategic futurist who thinks about how technology changes organizations, society, and the metaverse. Mark is an international keynote speaker, five time author, and entrepreneur. He is the founder of Datafloq and the author of the book Step Into the Metaverse. His mission is to help organizations and governments benefit from the innovative emerging technology while ensuring that it is done ethically and responsibly. Recently he founded the Digital Futures Institute which focuses on ensuring a fair digital future for everyone. 

The Constantly Evolving Subject of Cyber Security with Stephen Cobb

There’s always risk when using technology, but your perception of the exposure will determine how active you are at minimizing the danger. Today’s guest is Stephen Cobb. Stephen is a best-selling author and award winning technologist with over 30 years experience in digital security and data privacy. He has authored more than a dozen textbooks on PC and LAN security as well as software usage. As a CISSP since 1996, he co-founded two successful security startups and earned a Master’s in security and risk management. Stephen now researches harm caused by the abuse of digital technology.

Minimizing Damage From Cyberattacks with Stuart Madnick

Many use the internet considering it more like a walk in the park rather than realizing it is more like a trip down a dark alley. Today’s guest is Stuart Madnick. Professor Madnick has been a faculty member at MIT since 1972. He has served as the head of MIT’s IT group for more than 20 years. During that time, the group has been consistently rated number 1 in the nation among schools for information technology programs. Dr. Madnick is a prolific writer and author or co-author of over 380 books, articles, or technical reports and textbooks. He has a degree in Electronic Engineering, Management, and Computer Science from MIT. He has been a visiting professor at Harvard University and six additional countries.

The Impact of Cyberbullying with Tina Meier

It is easy for people to create fake online profiles and say or do whatever they want as a cyberbully. They often don’t think through the possible consequences of their actions. Today’s guest is Tina Meier. Tina is the Executive Director of The Megan Meier Foundation. Her life was forever changed on October 16, 2006 when Tina’s 13 year old daughter Megan Taylor Meier took her own life after being cyberbullied by an adult neighbor posing as a fictitious boy named Josh Evans. Her belief is that if there is even just one child that struggles with bullying, cyberbullying, or self-harm, that is one too many and we must be there to help and support them.

Online Security: Just Hope for the Best with Steve Gibson

When the internet began, trust was implied. But today, how can you know who or what to trust on the web? Today’s guest is Steve Gibson. Steve has participated in the PC industry since its inception. He authored InfoWorld’s top rated Tech Talk column for eight years and he produces the TWiT Network’s weekly Security Now podcast in its 17th year. He developed a working replacement for the username and password site known as QRL and is best known for his 35 year old SpinRite mass storage and data recovery and maintenance utility which he continues to develop. 

How Secure is “In the Cloud?” with Randall Magiera

Today’s guest is Dr. Randall Magiera. Dr. Magiera is a cybersecurity professional with over 15 years of experience in security management, change management, risk analysis, intrusion prevention and detection systems, and vulnerability assessments. He has a doctorate of science in cybersecurity, multiple advanced degrees in cybersecurity and technology, and certifications too numerous to list.

Cyber Security Awareness with Jake Moore

Jake Moore is a cybersecurity specialist for ESET, Europe’s number one internet security and anti-virus company. In 2016, he was asked to implement cybersecurity advisers in order to make local communities more aware of ever-increasing cybersecurity threats. Jake shares many experiences working in digital forensics and cybersecurity. We also discuss simple things you can do to keep cybercriminals away and social media accounts safe.

Trust and Encryption with Casey Crane

The S in HTTPS doesn’t always mean safe. In this episode, I talk with Casey Crane about trust and encryption. We discussed many practical ways for you to avoid being a victim of a scam. Prevention, and knowledge can help stop many attacks before they even begin.

Ransomware with Craig MacAlpine and Joel Witts

Ransomware is a type of malware that gets installed on your machine and it locks all of your files so you can’t access them. It spreads very quickly through your computer and you may be unable to access crucial programs and files. Often you get a message from the attackers requesting money or your data will be leaked or deleted. Craig and Joel share their expert insights on how to prevent these attacks.

Identity Theft with Dana Mantilia

Identity theft comes in many forms. Each year there are over 9 million identity victims. Dana Mantilia is here to talk about identity theft, data breaches, and best practices for protecting you, your family, and your business. Dana shares several practical tips and best practices that you can put in place today to help protect against identity theft.

Website Attacks with John Graham-Cumming and Evan Johnson

Our guests on today’s show are John Graham and Evan Johnson. We talk about attacks on websites, distributed denial of service attacks, and how to protect your own website. If you want to keep your website up and running without skipping a beat, this is a must-listen episode.

close

Copy and paste this code to display the image on your site

Privacy Policy

Your privacy is important to us. To better protect your privacy we provide this notice explaining our online information practices and the choices you can make about the way your information is collected and used. To make this notice easy to find, we make it available on every page of our site.

The Way We Use Information

We use email addresses to confirm registration upon the creation of a new account.

We use return email addresses to answer the email we receive. Such addresses are not used for any other purpose and are not shared with outside parties.

On occasion, we may send email to addresses of registered users to inform them about changes or new features added to our site.

We use non-identifying and aggregate information to better design our website and to share with advertisers. For example, we may tell an advertiser that X number of individuals visited a certain area on our website, or that Y number of men and Z number of women filled out our registration form, but we would not disclose anything that could be used to identify those individuals.

Finally, we never use or share the personally identifiable information provided to us online in ways unrelated to the ones described above.

Our Commitment To Data Security

To prevent unauthorized access, maintain data accuracy, and ensure the correct use of information, we have put in place appropriate physical, electronic, and managerial procedures to safeguard and secure the information we collect online.

Affiliated sites, linked sites, and advertisements

CGP Holdings, Inc. expects its partners, advertisers, and third-party affiliates to respect the privacy of our users. However, third parties, including our partners, advertisers, affiliates and other content providers accessible through our site, may have their own privacy and data collection policies and practices. For example, during your visit to our site you may link to, or view as part of a frame on a CGP Holdings, Inc. page, certain content that is actually created or hosted by a third party. Also, through CGP Holdings, Inc. you may be introduced to, or be able to access, information, Web sites, advertisements, features, contests or sweepstakes offered by other parties. CGP Holdings, Inc. is not responsible for the actions or policies of such third parties. You should check the applicable privacy policies of those third parties when providing information on a feature or page operated by a third party.

While on our site, our advertisers, promotional partners or other third parties may use cookies or other technology to attempt to identify some of your preferences or retrieve information about you. For example, some of our advertising is served by third parties and may include cookies that enable the advertiser to determine whether you have seen a particular advertisement before. Through features available on our site, third parties may use cookies or other technology to gather information. CGP Holdings, Inc. does not control the use of this technology or the resulting information and is not responsible for any actions or policies of such third parties.

We use third-party advertising companies to serve ads when you visit our website. These companies may use information (not including your name, address, email address, or telephone number) about your visits to this and other websites in order to provide advertisements about goods and services of interest to you. For information about their specific privacy policies please contact the advertisers directly.

Please be careful and responsible whenever you are online. Should you choose to voluntarily disclose Personally Identifiable Information on our site, such as in message boards, chat areas or in advertising or notices you post, that information can be viewed publicly and can be collected and used by third parties without our knowledge and may result in unsolicited messages from other individuals or third parties. Such activities are beyond the control of CGP Holdings, Inc. and this policy.

Changes to this policy

CGP Holdings, Inc. reserves the right to change this policy at any time. Please check this page periodically for changes. Your continued use of our site following the posting of changes to these terms will mean you accept those changes. Information collected prior to the time any change is posted will be used according to the rules and laws that applied at the time the information was collected.