The Global Scam Battle with David Bittner

Cybercrime continues to evolve in sophistication and scale, with attackers running their operations much like businesses. From ransomware gangs with customer support desks to AI-generated phishing campaigns that erase traditional red flags, scams are becoming harder to detect and stop. In this episode, David Bittner, host of the CyberWire Daily Podcast, shares his perspective on […]

Before the Fraud Tsunami Hits with Ritesh Kotak

Ritesh Kotak is a cybersecurity analyst, an Ontario lawyer, and a tech innovator who’s worked with Fortune 500 companies and served in policing, where he helped start one of Canada’s first municipal cybercrime units. He’s got a BBA, MBA, and JD, all focused on privacy, cybercrime, and the way emerging tech impacts everyday life.

Hidden Dangers of AI in Cybersecurity with Aviad Hasnis

Whether you’re the CISO of a Fortune 500 company or you’re running a small team with Bob, the go-to tech person juggling 18 other tasks, this episode is packed with practical insights to help you avoid the next big cybersecurity headache. While AI might be reshaping the cybersecurity landscape, staying secure still comes down to thoughtful planning, human judgment, and making sure someone you trust has your back.

Security Gaps Hackers Exploit with Aaron Painter

Our guest today is Aaron Painter, CEO of Nametag, a company leading the charge in next-generation identity verification. After witnessing firsthand how easily identity theft could unravel lives—especially during the shift to remote everything—he founded Nametag to answer a critical question: how can we know who’s really behind the screen? Deep fakes and social engineering have moved beyond clever tricks and become powerful tools that bad actors are using to infiltrate businesses, breach accounts, and dismantle trust at scale.

Ransomware, Phishing and Fraud with Bryce Austin

Cybersecurity isn’t just a concern for large corporations. It’s vital for businesses of all sizes. Bryce Austin is the CEO of TCE Strategy, a cybersecurity advisory firm. They provide vulnerability scans, penetration tests, fractional CISO services, and incident response services. He is also a professional speaker on ransomware. Bryce is the fractional CISO to many companies, including one on the S&P 500.

Next-Gen Account Security with Christiaan Brand

With phishing and password breaches on the rise, passkeys could offer a more secure, user-friendly solution that could reshape how we protect our online identities. Today’s guest is Christiaan Brand. Christiaan is the co-founder of Entersekt, a financial services security firm and a key player at Google in their security and identity teams.

5 Key Cybersecurity Elements with Kelly Hood

How do phishing scams, AI-powered attacks, and strategic governance intersect? Together, they’re redefining the future of cybersecurity. Organizations are navigating a mix of challenges and implementing innovative solutions to proactively address today’s threats.

Digital Deception: What Lies Ahead with Perry Carpenter

Perry Carpenter is an award-winning author, podcaster, and speaker with over two decades in cybersecurity, focusing on how cyber criminals exploit human behavior. As the Chief Human Risk Management Strategist at KnowBe4, Perry helps build robust, human-centric defenses against social engineering-based threats.

Safety Can’t Be an Afterthought with Kris Burkhardt

Most businesses rely on some type of software, either for scheduling, payment, banking, customer lists, or something else. It’s important to know where this information is stored and what would happen if that software was hacked or you weren’t able to access it. Today’s guest is Kris Burkhardt. As Accenture’s Chief Information Security Officer, Kris leads a team of over 800 security experts charged with protecting company client and customer data. 

Tax Scams with Richard Gilbert

Today’s guest is Richard Gilbert. Richard is the Director of the Examination Division with the North Carolina Department of Revenue. He has been with the department for over 25 years. He is a licensed CPA and has received his Bachelor’s of Business Administration from North Carolina Central University.

Preventing and Reporting Cyber Attacks with Robert Karas

Cyber criminals are growing in their attack planning. CISA is continuing training their teams to look for vulnerabilities and help out not only the government, but other entities secure their networks and products. Today’s guest is Robert Karas. Rob came to the Cybersecurity and Infrastructure Security Agency in 2010. He has over 30 years experience in the information security field and significant experience in building nationally recognized security platforms. At CISA, Rob built the Cyber Hygiene Program, risk and vulnerability assessments, and penetration testing programs. He has also created the Cyber Defense Education training programs to address industry challenges. Rob was also recognized by Cyber Patriot as Mentor of the Year.

Psychological Security with Adam Anderson

Adam Anderson is chairman of the board and founder for Hook Security and a serial cybersecurity entrepreneur. He is one of the founders of the Psychological Security Movement. Psychological Security or “Psy-Sec,” was born to create new technologies and processes to help build resilient human minds that can resist manipulations through technology.

Ransomware with Craig MacAlpine and Joel Witts

Ransomware is a type of malware that gets installed on your machine and it locks all of your files so you can’t access them. It spreads very quickly through your computer and you may be unable to access crucial programs and files. Often you get a message from the attackers requesting money or your data will be leaked or deleted. Craig and Joel share their expert insights on how to prevent these attacks.

close

Copy and paste this code to display the image on your site

Privacy Policy

Your privacy is important to us. To better protect your privacy we provide this notice explaining our online information practices and the choices you can make about the way your information is collected and used. To make this notice easy to find, we make it available on every page of our site.

The Way We Use Information

We use email addresses to confirm registration upon the creation of a new account.

We use return email addresses to answer the email we receive. Such addresses are not used for any other purpose and are not shared with outside parties.

On occasion, we may send email to addresses of registered users to inform them about changes or new features added to our site.

We use non-identifying and aggregate information to better design our website and to share with advertisers. For example, we may tell an advertiser that X number of individuals visited a certain area on our website, or that Y number of men and Z number of women filled out our registration form, but we would not disclose anything that could be used to identify those individuals.

Finally, we never use or share the personally identifiable information provided to us online in ways unrelated to the ones described above.

Our Commitment To Data Security

To prevent unauthorized access, maintain data accuracy, and ensure the correct use of information, we have put in place appropriate physical, electronic, and managerial procedures to safeguard and secure the information we collect online.

Affiliated sites, linked sites, and advertisements

CGP Holdings, Inc. expects its partners, advertisers, and third-party affiliates to respect the privacy of our users. However, third parties, including our partners, advertisers, affiliates and other content providers accessible through our site, may have their own privacy and data collection policies and practices. For example, during your visit to our site you may link to, or view as part of a frame on a CGP Holdings, Inc. page, certain content that is actually created or hosted by a third party. Also, through CGP Holdings, Inc. you may be introduced to, or be able to access, information, Web sites, advertisements, features, contests or sweepstakes offered by other parties. CGP Holdings, Inc. is not responsible for the actions or policies of such third parties. You should check the applicable privacy policies of those third parties when providing information on a feature or page operated by a third party.

While on our site, our advertisers, promotional partners or other third parties may use cookies or other technology to attempt to identify some of your preferences or retrieve information about you. For example, some of our advertising is served by third parties and may include cookies that enable the advertiser to determine whether you have seen a particular advertisement before. Through features available on our site, third parties may use cookies or other technology to gather information. CGP Holdings, Inc. does not control the use of this technology or the resulting information and is not responsible for any actions or policies of such third parties.

We use third-party advertising companies to serve ads when you visit our website. These companies may use information (not including your name, address, email address, or telephone number) about your visits to this and other websites in order to provide advertisements about goods and services of interest to you. For information about their specific privacy policies please contact the advertisers directly.

Please be careful and responsible whenever you are online. Should you choose to voluntarily disclose Personally Identifiable Information on our site, such as in message boards, chat areas or in advertising or notices you post, that information can be viewed publicly and can be collected and used by third parties without our knowledge and may result in unsolicited messages from other individuals or third parties. Such activities are beyond the control of CGP Holdings, Inc. and this policy.

Changes to this policy

CGP Holdings, Inc. reserves the right to change this policy at any time. Please check this page periodically for changes. Your continued use of our site following the posting of changes to these terms will mean you accept those changes. Information collected prior to the time any change is posted will be used according to the rules and laws that applied at the time the information was collected.