show episodes
 
Fraudsters and fraud managers are locked in a never-ending war. So what's our goal with the Cat and Mouse Podcast? To provide insights into the psychology of those who attack and exploit systems, hear true-life examples of the thrills and frustrations of risk management. Plus, of course, to share entertaining, insightful, and actionable stories to improve your strategies against fraud. See acast.com/privacy for privacy and opt-out information.
 
You're in the right place for the real and unpolished truth about fraud, crime, scams and threats to your bottom line. Episodes include conversations with notorious criminals, victims and FBI agents that get to the bottom of it. From their jaw-dropping stories you'll discover how to spot fraud, crime, scams and detect lies so you protect yourself from personal and business losses. Your host Traci Brown is the Fraud-Busting Body Language Expert. She's spent the last 20 years reading people an ...
 
In this podcast, Highmark explores topics that are transforming how health care is delivered, used and paid for. Hear from experts on innovations in the health industry like using artificial intelligence to detect fraud, supporting the well-being of communities by considering social determinants of health, expanding access through provider partnerships and leveraging analytics to understand consumer trends. Each episode is hosted by a member of Highmark’s leadership team. For more informatio ...
 
In a time when change is a constant, asking the big questions and tackling the challenging issues are key to paving a way for the future. Join host Whitney Fitzsimmons as she discusses a range of topics such as science, sport, leadership, current affairs and culture with global change makers on issues and ideas that affect businesses, communities, societies and the world.
 
TigerGraph is a platform for advanced analytics and machine learning on connected data. Based on the industry’s first and only distributed native graph database, TigerGraph’s proven technology supports advanced analytics and machine learning applications. In this podcast, you'll hear from TigerGraph leaders and subject matter experts, partners, customers, and industry experts all about how graph technology is changing the face of business and technology today. Visit our website, www.tigergra ...
 
Tech Nest is the proptech podcast where we discover all the latest in proptech by interviewing the innovators and leaders from startup that are challenging the way we buy, sell, and invest in real estate. When you listen to Tech Nest, you'll get in-depth interviews and discussions each week, focused on uncovering trends in proptech and how startups are transforming the real estate landscape. Don't miss an episode, subscribe today!
 
A comedian and metalhead examine some of the most heinous true crimes, mind bending conspiracy theories and supernatural occult happenings, then find a death metal song with lyrics that sync up with the events every week. You can expect top notch research, hilarious antics from absurd points of view, and a comedic take making the terrible history of humanity a little more palatable. Kristofer Pierce and Buddy Loyd are Death Metal Detectives NEW EPISODES EACH FRIDAY
 
We live in a time when technology is changing faster than ever before, and transforming the way we live and interact with the world. The question is: how do we keep up? In this podcast we interview technologists to hear their tips on how to learn, adapt, and succeed in this ever-changing world of tech.
 
End Time World News Is an independent and alternative media organization dedicated to finding the truth, and Issues facing Christians and Non Christians in the world everyday. For questions, prayer request or more information about this podcast please contact endtimeworldnews@protonmail.com, All Donations Welcome PayPal: https://www.paypal.com/paypalme/ericerb1 Venmo: https://www.venmo.com/u/Eric-Erb1 Cash App: https://cash.app/$ericerblive
 
D
Data Privacy Detective

1
Data Privacy Detective

Joe Dehner - Global Data Privacy Lawyer

Unsubscribe
Unsubscribe
Monthly
 
Data privacy is the footprint of our existence. It is our persona beyond ourselves, with traces of us scattered from birth certificates, Social Security numbers, shopping patterns, credit card histories, photographs, mugshots and health records. In a digital world, where memory is converted to 0’s and 1’s, then instantly transformed into a reproduction even in 3D, personal data is an urgent personal and collective subject. Those who wish to live anonymous lives must take extraordinary measur ...
 
On September 28, 2012, Massachusetts state chemist Annie Dookhan was arrested and charged with obstruction of justice and falsification of academic records. Approximately four months later another chemist, Sonja Farak, was arrested for using the drugs she was supposed to be testing and the Massachusetts Drug Lab Scandal was born. Hosts Jamie Folk and Ilyas Rona will be exploring the William H Hinton, UMass Amherst and State Police crime labs associated with this scandal and speak with the la ...
 
Loading …
show series
 
Lithuania's NKSC warns of increased DDoS threat. Limited Russian success in the cyber phases of its hybrid war. Another warning of spyware in use against targets in Italy and Kazakhstan. Hey, critical infrastructure operators: CISA’s got tabletop exercises for you. Kevin Magee from Microsoft has advice for recent grads. A look back the year since C…
 
Holding over a decade of experience at the U.S. Department of Homeland Security, Lloyd has helped combat identity fraud, theft, and criminal organizations for much of his career. Now at the biggest social media platform in the world, he helps mitigate potential risks on the platform. Alongside our host Jimmy Fong, Lloyd details: His learnings from …
 
Reviewing Russian cyber campaigns in the war against Ukraine, and the complexity of Ukraine's IT Army. ICEFALL advice and reactions. Carole Theriault looks at Hollywood’s relationship with VPNs. Robert M. Lee from Dragos provides a rundown on Pipedream. And CISA updates its Cloud Security Technical Reference Architecture. For links to all of today'…
 
Fancy Bear sighted in Ukrainian in-boxes. Why Russian cyberattacks against Ukraine have fallen short of expectations. ToddyCat APT is active in European and Asian networks. ICEFALL ICS vulnerabilities described. CISA issues ICS vulnerability advisories. Europol makes nine collars. Andrea Little Limbago from Interos on The global state of data prote…
 
We hear from a caller that after numerous red flags has reason to believe her ex-boyfriend is a cannibal. She tells us in detail about the uncomfortable events that lead to this theory. Then we talk to a caller who’s ex-girlfriend is maintaining a friendship with his grandma even after they’ve broken up, a caller who is cheating on his girlfriend w…
 
In this episode of The Art of Dental Finance and Management podcast, Art meets with Michael Dinsio of Next Level Consultants to discuss what steps dentists need to take to start up or purchase a new dental practice. Some of the key takeaways from this episode include how to: • Engage PPOs • Develop marketing strategies • Hire and retain a dental te…
 
Crypto scammers are outsmarting the FBI. Crypto Currency Expert Erica Stanford fills us in on the $25B true crime scam and the founder of it who’s been illuding capture since 2017. Is she missing, faked her death or get plastic surgery to conceal her identity? And we’ll hear how to spot a crypto currency scam before you invest so you don’t end up b…
 
The controlled demolition of FOOD and ENERGY infrastructure is now under way… prepare or get crushed Article Link: https://www.naturalnews.com/2022-06-20-controlled-demolition-of-food-and-energy-infrastructure.html Order While Supplies Last Storable Food Emergency Survival Food Survival Items Water Filtration Survival Coffee Sprouting Seeds Air Pur…
 
A Cyberattack is suspected of causing false alarms in Israel. Risk surface assessments. Renewed warning of the potential security risks of fitness apps. Cyber options may grow more attractive to Russia as kinetic operations stall. DDoS in St. Petersburg. Ben Yeling details a Senate bill restricting the sale of location data. Our guest is Jon Check …
 
Learn more about Dwellwell and Dan Dwellwell is the first and only comprehensive “check engine light” for homes. This patent-pending technology senses and alerts residential property owner-operators to irregularities in core building systems’ performance, providing early detection of issues before they lead to system failure or devolve to catastrop…
 
As we break to observe the Juneteenth holiday, our team thought you might like to try a sample of a CyberWire Pro podcast called Interview Selects. These podcasts are a series of extended interviews, exclusives, and a curated selection of our most engaging and informative interviews over the years, featuring cyber security professionals, journalist…
 
A caller struggles with being seen only as “The Guy Who Wears Hawaiian Shirts”, we discuss the various ways he might be able to expand upon his identity. Afterward a confides that she may be using her current partner as a "rebound." Then a caller and I discuss his longstanding fear of ceiling fans, a caller who admits to spitting in a customer's fo…
 
Lauren Van Wazer, Vice President, Global Public Policy and Regulatory Affairs for Akamai Technologies, shares her story as she followed her own North Star and landed where she is today. She describes her career path, highlighting how she went from working at AT&T to being able to work in the White House. She shares how she is a coach and a leader t…
 
Edward Wu, senior principal data scientist at ExtraHop, joins Dave to discuss the company's research, "A Technical Analysis of How Spring4Shell Works." ExtraHop first noticed chatter from social media in March of 2022 on a new remote code execution (RCE) vulnerability and immediately started tracking the issue. In the research, it describes how the…
 
4 Out of 5 COVID-19 deaths in Canada since mid-February are from the vaccinated population Article Link: https://www.naturalnews.com/2022-06-17-majority-of-covid-deaths-canada-are-vaccinated.html Order While Supplies Last Storable Food Emergency Survival Food Survival Items Water Filtration Survival Coffee Sprouting Seeds Air Purification Deals of …
 
Malibot is an info stealer masquerading as a coin miner. "Hermit" spyware is being used by nation-state security services. Fabricated evidence is planted in Indian computers. The US takes down a criminal botnet. The British Home Secretary signs the Assange extradition order. We wind up our series of RSA Conference interviews with David London from …
 
A waitress with an MBA and $50k in student loan debt, a state psychologist with $880,000 in student loan debt. What happens when they can’t pay it back? Is it fraud? Or is it something else? Did the government set them up to fail? Student Loan Bankruptcy lawyer DJ Rausa knows his way around the system and puts helps his clients avoid financial ruin…
 
Interpol coordinates international enforcement action against scammers. A new version of IceXLoader is observed. Exploiting versioning limits to render files inaccessible. Reflections on the first large-scale hybrid war. Kelly Shortridge from Fastly on why behavioral science and economics matters for InfoSec. Patrick Orzechowski from DeepWatch on R…
 
Traci and Super Producer Alex talk about their new video project, the Amber Herd and Johnny Depp Trial, What the Body Language of Lee Harvey Oswald reveals, The REAL story behind Amazon’s Alexa, PPP loan fraud and lots more true crime. Watch Traci’s new video here: https://youtu.be/q9XYejSsJ4Y Help us keep the show going! Donate by buying us a coff…
 
The Hertzbleed side-channel issue affects Intel and AMD processors. An Iranian spearphishing campaign prospected former Israeli officials. Patch Tuesday notes. A look at software bills of materials. Russia routes occupied Ukraine's Internet traffic through Russia. Intercepts in the hybrid war: the odd and the ugly. Deepen Desai from ZScaler joins u…
 
Dealing with the GRU's exploitation of the Follina vulnerabilities. SeaFlower uses stolen seed phrases to rifle cryptocurrency wallets. Ukraine moves sensitive data abroad. Anonymous claims to have hacked Russia's drone suppliers and to have hit sensitive targets in Belarus. Rick Howard reports on an NSA briefing at the RSA Conference. Our guest is…
 
More about Mathias and Baselane Mathias co-founded Baselane together with Thorben Scheidger and Jad Yaghi with the goal of building modern financial technology to help the 11 million individual landlords and real estate investors in the US grow their rental investment portfolios, and to make real estate investing more accessible to new investors. W…
 
Protecting and using personal information has focused on computer and software technology. With the Internet of Things (IoT), the Edge has arrived – the place where devices and traditional data infrastructure connect. Niranjan Maka takes us on a tour of the Edge and explains what it means to enterprises and individuals and the risks the Edge create…
 
A Chinese APT deploys a new cyberespionage tool. Hacktivism roils India after a politician's remarks about the Prophet. Ukraine reports a "massive" spam campaign against the country's media organizations. A Russian court fines Wikimedia for "disinformation." From the NSA’s Cybersecurity Collaboration Center our guests are Morgan Adamski and Josh Za…
 
Healthy young people now dying en masse across Australia, and the corporate media still won’t dare mention vaccines Article Link: https://www.naturalnews.com/2022-06-12-healthy-young-people-now-dying-en-masse-across-australia.html Order While Supplies Last Storable Food Emergency Survival Food Survival Items Water Filtration Survival Coffee Sprouti…
 
A caller tells me about a neighbor who is causing him a good deal of stress. We get into the complexities of acting with kindness even toward someone you dislike. Afterwards we hear from a man who is trying to escape his mundane day job at Carvanna and become a school principal. We discuss his uncomfortable experiences with school growing up. Then …
 
Luke is back to discuss the recent news that he has reached an agreement with the state of Massachusetts for 14 million dollars to cover costs associated with the wrongful conviction of 31 thousand drug lab victims. We discuss the settlement and how it came about and the potential of future settlements with the state.…
 
Deepen Desai, Global Chief Information Security Officer at Zscaler, shares his story as a doctor that treats computer viruses. He describes how he got into the security field and his work with Zscaler. He says what it's like learning and growing in this field and shares great advice for people who are up and coming in the field. Deepen describes wo…
 
Danny Adamitis from Lumen's Black Lotus Labs, joins Dave to discuss new developments in the WSL attack surface. Since September 2021, Black Lotus Labs have been monitoring malware repositories as a part of their proactive threat hunting process. Danny shares how researchers discovered a series of suspicious ELF files compiled for Debian Linux . The…
 
Looking at Russia's hybrid war as a cautionary example. Russia warns, again, that it will meet cyberattacks with appropriate retaliation. (China says "us too.") NSA and FBI warn of nation-state cyber threats. SentinelOne finds a Chinese APT that's been operating, quietly, for a decade. "Unpatchable" vulnerability in Apple chips reported. We’ve got …
 
Steve Moffatt visits us to share his insights on how fraudsters are gaining specialized knowledge about specific companies, growing concerns around pen-testing smaller businesses before launching full-scale attacks on bigger ones and developing a strategy to succeed safely at phenomenal speed (90% payment approval rate in under 25 seconds!) See aca…
 
Andrew Quemere from The Mass Dump comes on and reviews the state of public records and transparency laws in Massachusetts. Andrew has been submitting public records for 11 years and has seen first hand law enforcement officials knowingly violate the public records law. We get into that plus other drug lab related topics on this episode of Rigged.…
 
What’s at stake as Congress considers a national data privacy law? The National Restaurant Association is the U.S.’ leading trade association for the restaurant and foodservice industry, representing thousands of members from the largest chain to solo providers. Brennan Duckett, its Director of Technology and Innovation Policy, discusses the key is…
 
Another hacked broadcast in a hybrid war. Hunting forward as an exercise in threat intelligence collection and sharing. Cyber threats to the US midterm elections. Phishing for cryptocurrency. FakeCrack delivers a malicious payload to the unwary. Vacations are back. So is travel-themed phishbait. Ann Johnson from Microsoft shares insights on the tre…
 
On this episode we look at the importance of disability and diversity. We speak to experts in the field and understand how businesses can benefit from employing people from a wide range of backgrounds. Host Whitney Fitzsimmons speaks to KPMG Director David Kay about his work advising on the implementation of the National Disability Insurance Scheme…
 
US officials continue to rate the threat of Russian cyberattack as high. Civilians in cyber war. Broadcast interference and propaganda. A Joint CISA/FBI warning of Chinese cyberespionage. What gets a vulnerability into the Known Exploited Vulnerabilities Catalog? Andrea Little Limbago from Interos and Mike Sentonas from Crowdstrike join us with pre…
 
A caller discusses his gambling addiction that started in high school and how its affected him over the course of his life. Then we hear from a caller who’s living in a tent in the woods after being kicked out of his parent’s house, and how he’s adapting to his situation. Later we talk to a caller about her short-lived professional porn career and …
 
This joint Cybersecurity Advisory describes the ways in which People’s Republic of China state-sponsored cyber actors continue to exploit publicly known vulnerabilities in order to establish a broad network of compromised global infrastructure. These actors use the network to exploit a wide variety of targets worldwide, including public and private…
 
No matter what’s going on with the stock market or economy, it’s important for people to follow an established financial plan. When investing long term, markets will always fluctuate, so when you set goals, develop a plan and follow it through. It will help you grow your wealth despite volatility in the market. In this episode of The Art of Dental …
 
Loading …

Quick Reference Guide

Copyright 2022 | Sitemap | Privacy Policy | Terms of Service
Google login Twitter login Classic login