loader from loading.io

Artificial Intelligence: Cyber AI is the new Tesla of Security

Cyber Security America

Release Date: 10/17/2023

Governor Pat McCory:  Cyber Challenges in Government show art Governor Pat McCory: Cyber Challenges in Government

Cyber Security America

Join us for an illuminating journey into the world of cybersecurity and governance as we sit down with former Governor Pat McCrory, the 74th Governor of North Carolina. In this captivating episode, Governor McCrory offers his invaluable leadership insights on the pressing issue of cybersecurity, particularly within the context of state and local government. Discover how the decentralized nature of government at various levels is adapting to the ever-evolving digital landscape. Governor McCrory's extensive experience in public service provides a unique perspective on the challenges...

info_outline
Cybersecurity Training: A 101st Airborne Veteran's Journey show art Cybersecurity Training: A 101st Airborne Veteran's Journey

Cyber Security America

In episode 29, host Joshua Nicholson welcomes Dennis Kraft, a Penn State graduate and former United States Army Captain who served with the 101st Airborne Division Air Assault in Afghanistan from 2010 to 2011.

info_outline
Securing E-Learning in a New World: Spoilage & Deepfakes show art Securing E-Learning in a New World: Spoilage & Deepfakes

Cyber Security America

Welcome to episode 28 of the Cyber Security America podcast with your host Joshua R. Nicholson (https://www.linkedin.com/in/joshuanicholson/). He is excited to welcome Dayle Alsbury (https://www.linkedin.

info_outline
Measuring Cybersecurity Risks: The Relevance of GRC show art Measuring Cybersecurity Risks: The Relevance of GRC

Cyber Security America

Welcome to our latest podcast episode (Episode 27), where Joshua R. Nicholson (https://www.linkedin.com/in/joshuanicholson/) embarks on an insightful journey through the dynamic world of #cybersecurity.

info_outline
Operational Threat Intelligence: How does that work? show art Operational Threat Intelligence: How does that work?

Cyber Security America

Welcome to the 26th episode of "How do you managed an operational threat intelligence program?" In this installment, Joshua Nicholson (https://www.linkedin.

info_outline
Cybersecurity in the Middle East: Operations Challenges & Threats show art Cybersecurity in the Middle East: Operations Challenges & Threats

Cyber Security America

"Welcome to Episode 25 of the podcast, where we dive deep into the intriguing world of cybersecurity in the Middle East. In this installment, we're exploring the unique operational challenges faced by foreign companies operating in the region.

info_outline
Managed Services: DeepSeas' Breakthrough in MDR+ Capabilities show art Managed Services: DeepSeas' Breakthrough in MDR+ Capabilities

Cyber Security America

Welcome to **Cyber Security America**, your ultimate hub for all things cybersecurity in the digital era. I'm your host, Joshua Nicholson (https://www.linkedin.

info_outline
Building a Cybersecurity Career: The Journey to CISO, Part II show art Building a Cybersecurity Career: The Journey to CISO, Part II

Cyber Security America

Welcome to Episode 23 of Cyber Security America, where we delve deeper into the world of cybersecurity careers in part 2 of our special series, "Building a Cybersecurity Career: The Journey to CISO.

info_outline
Cybersecurity Solutions: Innovative cutting edge problem-solving show art Cybersecurity Solutions: Innovative cutting edge problem-solving

Cyber Security America

Welcome to today's episode! In contrast to our previous discussions on #artificialintelligence, #cloudsecurity, and #burnout, we are taking a different approach today.

info_outline
Artificial Intelligence: Automating SOC Workflows - Salem Cyber show art Artificial Intelligence: Automating SOC Workflows - Salem Cyber

Cyber Security America

Welcome to the Cybersecurity America Podcast! In episode 21, we have an exciting lineup of topics that cover critical insights from the DeepSeas (https://www.deepseas.

info_outline
 
More Episodes
Welcome to our podcast, where we explore the fascinating world of generative AI and its profound impact on various fields. Join us as we delve into the intricate details of different models designed for specific tasks, such as text generation, native speech processing, and image/video generation. We also address the pressing concerns surrounding privacy and security in the realm of AI technologies, including the potential risks of phishing emails and deep fake attacks. #malware #informationsecurity #infosec #windows #cyberattack #ciso (https://www.linkedin.com/in/joshuanicholson/) YouTube Channel: https://www.youtube.com/channel/UCp94j2q_-F4SwvxgQYI_8Cg Podcast Home Site: https://www.voiceamerica.com/show/4125 In our discussions on text generation, we thoroughly examine popular models like ChatGPT, Bard, Lama, and Bloom, shedding light on the distinctions between closed-source, open-source, and academic models. Additionally, we emphasize the significance of leveraging open-source models from platforms like Hugging Face, while carefully considering the implications for cybersecurity. Discover how organizations can effectively navigate the use of AI models to protect their data and privacy. In this week's Intelligence report, we highlight notable cyber-attacks, including the insidious Akira ransomware and the successful neutralization of the Snake malware by the FBI. We delve into the details of the recent attack on Bluefield University, ensuring you stay informed on the latest developments in cybersecurity. Follow our insightful discussions on topics like AI, machine learning, and enterprise security, as we unveil the crucial intersections between these fields. The Akira ransomware has ruthlessly targeted and breached the security of 16 companies across diverse industries. Employing an encrypt-and-ransom tactic, they demand exorbitant sums of money from their victims. To intensify the pressure, the gang has created a unique data leaks site with a captivating 1980s retro aesthetic. Visitors to the site must navigate using console commands, adding an intriguing dimension to their illicit activities. The leaked data ranges from sizes as small as 5.9 GB to a staggering 259 gigabytes. Ransom demands vary from $200,000 to multimillion-dollar figures, with provisions for lower amounts if the target companies solely wish to prevent the leak of their stolen data. We also revisit the multinational operations that successfully neutralized the Snake malware, a highly sophisticated cyber espionage tool developed by Russia's Federal Security Service (FSB), known as Turla. This covert P2P network of infected computers spanned across 50 countries and targeted government research networks, research facilities, journalists, small businesses, media organizations, and critical infrastructure segments within the United States. #GenerativeAI #PrivacyConcerns #Cybersecurity #AIModels #Ransomware #Malware #FBI #Snake #Podcast #Tech #CybersecurityAwareness