Episodes
-
Join us as we delve into the European Data Protection Board's (EDPB) 2024 Annual Report to understand how they championed data protection in a year marked by significant technological and regulatory shifts. This episode will cover the key milestones and priorities outlined in the EDPB's 2024-2027 Strategy, designed to strengthen, modernise, and harmonise data protection across Europe
www.compliancehub.wiki/edpb-2024-navigating-the-complexities-of-data-protection-in-a-rapidly-evolving-digital-landscape
-
Join us as we delve into the key findings of the FBI's 2024 Internet Crime Complaint Center (IC3) Annual Report. This year marks the 25th anniversary of IC3, which serves as the primary destination for the public to report cyber-enabled crime and fraud. The report reveals a staggering new record for losses reported to IC3, totaling $16.6 billion in 2024. This represents a 33 percent increase from 2023. We'll explore the most impactful crime types by reported loss, including Investment fraud ($6.57 billion), Business Email Compromise ($2.77 billion), and Tech Support scams ($1.46 billion), which are collectively responsible for the bulk of reported losses. A major factor contributing to these losses is the increasing use of cryptocurrency, which served as a descriptor in 149,686 complaints and was associated with $9.3 billion in losses in 2024, a 66% increase in losses. We'll also examine the significant impact on different age groups, noting that individuals over the age of 60 suffered the most losses ($4.885 billion) and submitted the most complaints (147,127). For this age group, Investment fraud ($1.834 billion) and Tech Support scams ($982 million) resulted in the highest reported losses, and cryptocurrency was referenced in 33,369 complaints with over $2.8 billion in losses. The episode will also touch upon the IC3's core functions including collection, analysis, public awareness, and referrals, its role in partnering with law enforcement and the private sector, and notable efforts like the IC3 Recovery Asset Team which assists in freezing funds for victims of fraudulent transactions, demonstrating a 66% success rate in 2024, and Operation Level Up, which successfully notified victims of cryptocurrency investment fraud, resulting in estimated savings
breached.company/the-2024-ic3-report-record-cybercrime-losses-highlight-escalating-digital-threats
-
Episodes manquant?
-
Navigate the complex cybersecurity landscape of Q2 and Summer 2025 as we delve into the escalating convergence of AI-driven cyberattacks, the persistent vulnerabilities of the expanding Internet of Things (IoT), and the challenges of establishing robust security and governance frameworks. Based on recent Q1 2025 incident data and expert projections, this episode explores the weaponization of AI in phishing, malware, and social engineering, the continued exploitation of poorly secured IoT devices, and the evolving tactics of ransomware and state-sponsored actors. We'll also discuss the crucial need for proactive defense, AI-augmented security, and adaptation to a fragmenting global regulatory environment.
breached.company/strategic-cybersecurity-outlook-ai-iot-and-threat-actor-convergence-in-q2-summer-2025
-
The first four months of 2025 witnessed an alarming surge in global cybersecurity incidents, with ransomware attacks reaching unprecedented levels. Join us as we dissect the key trends, including the evolution of ransomware tactics like double extortion, the increasing sophistication of social engineering fueled by AI and deepfakes, and the persistent exploitation of software vulnerabilities. We'll delve into major incidents like the crippling attack on Change Healthcare and the record-breaking Bybit cryptocurrency theft, highlighting the most targeted sectors such as healthcare, education, government, and manufacturing. Finally, we'll examine how organizations, law enforcement, and the evolving global regulatory environment, with key legislation like the EU's NIS2 and DORA, are grappling with this escalating cyber threat.
breached.company/global-cybersecurity-incident-review-january-april-2025
-
This podcast delves into the NIST Privacy Framework 1.1, a voluntary tool developed to help organizations identify and manage privacy risk while fostering innovation and protecting individuals' privacy. We explore its three core components: Core, Organizational Profiles, and Tiers, and how they enable organizations to understand, assess, prioritize, and communicate their privacy activities. Learn how to use this framework to build customer trust, meet compliance obligations, and facilitate dialogue about privacy practices.
www.compliancehub.wiki/navigating-the-complex-world-of-privacy-with-the-nist-privacy-framework-1-1
-
Dive into the dynamic world of offensive cybersecurity with insights from leading experts and real-world scenarios. We explore the critical role of techniques like penetration testing, adversary simulation, and red team exercises in proactively identifying vulnerabilities and strengthening defenses against evolving cyber threats. Understand how adopting an adversarial mindset and employing continuous assessment methodologies are essential for navigating today's complex threat landscape and building a resilient security posture.
www.securitycareers.help/dont-just-scan-test-choosing-the-right-penetration-testing-partner
https://cisomarketplace.services
https://generatepolicy.com
-
Explore the rapidly evolving landscape where artificial intelligence intersects with criminality and societal risks. Drawing on expert research, this podcast delves into the transformative potential of AI-enabled crime, from sophisticated financial fraud using deepfakes to the generation of child sexual abuse material, and the challenges this poses for law enforcement. We also examine the critical need for robust AI incident reporting mechanisms, as proposed with standardized key components for documenting AI-related harms and near misses. Join us as we unpack the threats, the defenses, and the policy reforms necessary to navigate this complex new frontier.
breached.company/navigating-the-ai-frontier-confronting-ai-enabled-crime-through-robust-incident-reporting
https://airiskassess.com
https://cisomarketplace.services
-
We delve into the urgent need for organizations to prepare for the era of quantum computing, which threatens to break today's standard encryption methods. We examine the "harvest now, break later" (HNDL) threat, where malicious actors are already collecting encrypted data for future decryption by quantum computers. Drawing upon information from sources like NIST and expert analysis, we discuss the development and standardization of quantum-resistant cryptographic algorithms such as CRYSTALS-Kyber (ML-KEM) and CRYSTALS-Dilithium (ML-DSA). We provide CISOs and cybersecurity professionals with key strategic considerations for a successful quantum-safe transition, including conducting a comprehensive cryptographic inventory and quantum risk assessment (QRA), prioritizing systems for migration, engaging with vendors, and fostering crypto agility. Join us as we navigate the challenges and opportunities of this critical cybersecurity revolution and help you take the necessary quantum leap to secure your future.
www.securitycareers.help/the-quantum-clock-is-ticking-your-guide-to-navigating-the-post-quantum-cryptography-era
https://quantumsecurity.ai
https://risk.quantumsecurity.ai/
-
Explore the escalating threats posed by artificial intelligence incidents, sophisticated disinformation campaigns like the Doppelgänger network targeting nations from France to Israel, and the cyber espionage activities of threat actors such as UAC-0050 and UAC-0006 as revealed by Intrinsec's analysis. We delve into the tactics, infrastructure, and narratives employed in these digital battlegrounds, drawing insights directly from recent intelligence reports. Understand the key components of AI incident reporting, the disinformation narratives amplified across different countries, and the evolving techniques of cyber intrusion sets targeting critical infrastructure and institutions. Join us as we unpack the complex landscape of AI risks, influence operations, and cyber warfare.
breached.company/the-unseen-frontlines-navigating-the-intertwined-threats-of-ai-incidents-disinformation-and-cyber-espionage
-
This podcast we are exploring the critical cybersecurity challenges facing today's interconnected urban environments. We delve into the evolving threats arising from smart city infrastructure and the Internet of Things (IoT), including ransomware attacks on critical infrastructure, the expanded attack surface created by interconnected devices, and strategies for building cyber resilience. Join us as we discuss best practices for municipalities, the importance of public trust, and the role of AI in both cyberattacks and defense. Stay informed and learn how we can collectively protect the future of our smart cities.
www.securitycareers.help/navigating-the-cyber-threat-landscape-of-smart-cities
https://cybersafe.city
https://risk.secureiotoffice.world
https://risk.secureiot.house
-
Is your attack surface spiraling out of control with multi-cloud, SaaS, and third-party integrations? Join us as we delve into how AI-powered automation is becoming critical for modern Attack Surface Management (ASM). We'll explore the challenges organizations face in achieving comprehensive visibility and how AI provides viable solutions for enhanced asset discovery, proactive threat detection, intelligent risk prioritization, and faster incident response. Learn how AI acts as a force multiplier in cybersecurity, enabling a shift from reactive to proactive defense against evolving cyber threats.
www.securitycareers.help/why-ai-powered-attack-surface-management-is-your-new-strategic-imperative
https://risk.quantumsecurity.ai/
https://airiskassess.com/
-
Welcome to Deep Dive, where we tackle complex topics head-on. In this episode, we delve into the fascinating and increasingly concerning world of deepfakes: AI-generated audio and visual content designed to deceive. We'll explore the technology behind deepfakes, from face-swapping to voice cloning the threats they pose to individuals, organizations, and even democratic processes and the ongoing efforts to detect and mitigate this emerging challenge. Join us as we break down the science fiction of today into the cybersecurity reality of tomorrow.
www.myprivacy.blog/the-deepfake-dilemma-navigating-the-age-of-ai-generated-deception
-
In a world increasingly shaped by digital interactions and artificial intelligence, online scams are becoming more sophisticated and pervasive. Scam Savvy delves into the tactics employed by fraudsters, from exploiting emotions in charity and romance scams to leveraging AI for deepfakes and personalized phishing attacks. We unmask these deceptive practices and equip you with the knowledge to protect yourself in the evolving landscape of online crime.
www.scamwatchhq.com/navigating-the-digital-deception-understanding-and-avoiding-online-scams-in-the-age-of-ai
https://identityrisk.myprivacy.blog
-
This podcast dives into the critical world of vulnerability disclosure programs (VDPs), exploring how organizations and security researchers work together to identify and address security weaknesses. We'll examine the core principles that underpin effective VDPs, including establishing clear reporting channels and defined scopes, the importance of timely responses and good-faith engagement, and the crucial role of safe harbor provisions. We'll also delve into modern best practices such as automation in triage, integration with security workflows, adherence to coordinated vulnerability disclosure (CVD) norms, and the benefits of transparency in building community trust. Join us to understand how VDPs are becoming a strategic necessity for cyber resilience, fostering a collaborative security ecosystem.
www.hackernoob.tips/diving-deep-a-researchers-guide-to-navigating-vulnerability-disclosure-programs
www.securitycareers.help/establishing-a-vulnerability-disclosure-program-a-cisos-perspective
https://irmaturityassessment.com
https://cyberinsurancecalc.com
-
Navigating the complex landscape of U.S. state data privacy laws can be challenging. Join us as we break down the key aspects of these regulations, including consumer rights, business obligations, data breach notification requirements, and enforcement trends. We'll explore the nuances of laws like the California Consumer Privacy Act (CCPA), the Virginia Consumer Data Protection Act (CDPA), the Colorado Privacy Act (CPA), and emerging legislation like the New York Privacy Act (if passed), helping businesses and consumers understand their rights and responsibilities in an ever-evolving digital world.
www.compliancehub.wiki/navigating-the-maze-an-in-depth-look-at-u-s-state-data-privacy-laws
https://globalcompliancemap.com
https://cisomarketplace.services
-
Explore the exciting future of cryptocurrency payments through the lens of cybersecurity and privacy. We delve into the potential benefits and significant risks, offering insights into best practices and the crucial role of regulation in this evolving landscape.
www.myprivacy.blog/navigating-the-crypto-landscape-an-in-depth-look-at-privacy-in-the-future-of-paymentswww.compliancehub.wiki/navigating-the-crossroads-compliance-and-privacy-in-the-cryptocurrency-realm
-
This podcast delves into the critical aspects of data privacy laws like GDPR and the Connecticut Data Privacy Law, alongside the essential Payment Card Industry Data Security Standard (PCI DSS) compliance for e-commerce success. We explore how retailers can craft clear privacy policies, manage user consent effectively, and implement stringent security measures to protect customer data and ensure secure online transactions in the evolving digital landscape. Join us for insights on building customer trust through adherence to regulations and best practices in digital retail security.
www.compliancehub.wiki/navigating-the-complexities-of-compliance-in-digital-retail-a-comprehensive-guide
-
Dive deep into the rapidly evolving landscape of AI-powered cyberattacks with insights from cutting-edge research, including the framework for evaluating AI cyber capabilities developed by Google DeepMind. Explore how AI is shifting the balance between offense and defense in cybersecurity, potentially lowering the cost and complexity of sophisticated attacks while demanding new strategies for protection. Join us as we unpack the key findings, potential future threats, and essential considerations for safeguarding your digital world in the age of increasingly capable AI adversaries.
breached.company/the-ai-cyberattack-horizon-understanding-the-emerging-threat
https://airiskassess.com
https://globalcompliancemap.com
-
Delve into the principles and practical applications of Zero Trust Architecture (ZTA), a modern cybersecurity paradigm that moves away from traditional perimeter-based security by embracing the core tenet of "never trust, always verify". Learn about the key components, tenets, and benefits of ZTA, as well as strategies for implementation in today's complex and distributed IT environments, including cloud, remote users, and diverse devices.
https://www.zerotrustciso.com
www.securitycareers.help/building-a-career-in-a-zero-trust-world-understanding-the-foundational-principles-of-modern-cybersecurity
-
Explore the critical cybersecurity challenges facing the financial services industry today, from the increased risk of data breaches and sophisticated cyber attacks to emerging threats like quantum computing and client-side vulnerabilities. Drawing insights from the cutting-edge solutions featured in the CYBERTECH100, we delve into innovative technologies like AI-powered threat detection, behavioral biometrics, post-quantum cryptography, and centralized access management that are revolutionizing how financial institutions protect their assets and customers. Join us as we unpack the complexities of the digital finance landscape and discover how to stay ahead of evolving cyber risks.
www.compliancehub.wiki/navigating-the-digital-maze-a-comprehensive-guide-to-e-commerce-compliance
- Montre plus