Brought to you by IT Audit Labs. Trusted cyber security experts and their guests discuss common security threats, threat actor techniques and other industry top...
Cybersecurity Insights 2025: Big Data, AI, and Staying Ahead of Attacks
Discover the hidden risks of browser extensions, cybersecurity incidents, and more with hosts Eric Brown and Nick Mellum. In this episode, we dive into the dangers of tools like Honey, the fallout from Proton’s global outage, and the ingenious tactics used by cybercriminals to target unsuspecting users. Eric and Nick also share their insights on using big data to enhance security, the role of AI in addressing threats, and practical tips for staying ahead of the ever-changing tech landscape in 2025. We'll cover: The surprising risks behind popular browser extensions like Honey Lessons from Proton’s global outage and the importance of preparation How cybercriminals use voice phishing to exploit tech giants Practical steps to improve organizational security and educate users Balancing security and accessibility in modern systems From practical advice to thought-provoking insights, this episode delivers actionable takeaways for anyone navigating today’s tech landscape. #Cybersecurity #TechNews #DataPrivacy #RiskManagement #DigitalSafety
--------
36:55
Big Data Meets Cybersecurity: Expert Insights from Wade Baker
Dive into the transformative power of data in cybersecurity in this must-watch episode with Wade Baker, where cutting-edge insights meet real-world applications. Hear from The Audit Team as we discover how massive data sets are reshaping risk management, AI’s evolving role in combating cyber threats, and the surprising insights data can unveil about security incidents. We also dive into ransomware trends, phishing techniques, the ethics of AI, and the critical role of storytelling in decision-making, with some fun nods to fantasy swords along the way. In this episode, we discuss: Using big data to tackle cybersecurity challenges Ransomware and phishing trends The ethical debate around AI in security Unique discoveries from security data analysis Practical strategies for influencing decision-makers Catch this insightful conversation and stay ahead of the cybersecurity curve. Like, share, and subscribe for more expert discussions on the latest security trends! #Cybersecurity #DataAnalytics #RiskManagement
--------
51:57
Cybersecurity in Travel: Tips, Tools, and Tales with Matthew Wold
Join us for an eye-opening discussion on cybersecurity in travel with ethical hacker Matthew Wold from Ramsey County. Matthew shares how his passion for cybersecurity took root at Ramsey County, leading to collaborations with co-hosts Eric Brown and Nick Mellem. We kick things off with a lighthearted chat about survival items on a deserted island, setting the stage for a lively and insightful conversation.From RFID shields to OMG cables, we unpack practical tips for protecting your digital and personal safety while traveling. Learn how to navigate risks like compromised USB ports, hidden cameras in hotel rooms, and data privacy challenges across borders. With advice on VPNs, securing SIM cards, managing passwords, and safeguarding luggage, this episode is packed with essential strategies to ensure your travel experiences remain secure and worry-free.
--------
38:57
Cracking Gmail and SEO Poisoning: Inside the Latest Cyber Threats
From Gmail 2FA bypass warnings to SEO poisoning campaigns, we’re diving into the latest cybersecurity headlines reshaping the industry. We explore how attackers are using hyper-specific search terms—like the legality of Bengal cats—to deliver malware and manipulate search results. Plus, we discuss advancements in AI-powered behavioral analytics, from cutting down false alerts to streamlining incident response. With real-world insights and actionable tips, this episode is packed with must-know updates for IT professionals navigating today’s ever-evolving threat landscape. In this episode, we'll discuss: Gmail session cookie theft and bypassing two-factor authentication. SEO poisoning campaigns delivering malware via niche search terms. AI-driven behavioral analytics improving incident response. Real-world social engineering and user behavior risks. Balancing usability and security with tools like passkeys. Thanks for tuning into The Audit. Subscribe on Spotify, Apple Podcasts, or YouTube to stay informed on the latest in cybersecurity. Don’t forget to follow us on social media and share with your network! #CybersecurityNews #2FA #BehavioralAnalytics #IncidentResponse #SEOPoisoning #ITSecurity #DataProtection
--------
38:10
Social Engineering to AI Ethics: Wild West Hackin’ Fest 2024
In this episode of The Audit, we dive into key takeaways from a top cybersecurity event. From IoT hacking and RFID bypasses to AI governance and vishing bots, we explore the tools and strategies shaping security. Plus, real-world lessons, social engineering insights, and a few unexpected laughs—because security isn’t always all business. In This Episode We’ll Cover: RFID hacking and social engineering insights from WWHF. Cameron’s IoT hacking training highlights. AI advancements and governance takeaways. Challenges with regulations and compliance in cybersecurity. Project management lessons inspired by Elon Musk. Thanks for joining us for this glimpse into one of the year’s most unique cybersecurity events. Don’t forget to subscribe and share this episode with your team—we’ll see you at the next conference. #WWHackinFest #InfoSecConferences #Cybersecurity #AIThreats #IoTSecurity #SocialEngineering
Brought to you by IT Audit Labs. Trusted cyber security experts and their guests discuss common security threats, threat actor techniques and other industry topics. IT Audit Labs provides organizations with the leverage of a network of partners and specialists suited for your needs.We are experts at assessing security risk and compliance, while providing administrative and technical controls to improve our clients’ data security. Our threat assessments find the soft spots before the bad guys do, identifying likelihood and impact, while our security control assessments rank the level of maturity relative to the size of the organization.