DIY Cyber Guy
ఛానెల్ వివరాలు
DIY Cyber Guy
DIY Cyber Guy, hosted by David W. Schropfer, offers a approachable exploration of cybersecurity, emerging technologies (like AI and Quantum Computing) for all knowledge levels. Through dynamic podcasts, expert interviews, and engaging blog posts, DIY Cyber Guy provides practical, easy-to-apply tips...
ఇటీవలి ఎపిసోడ్లు
85 ఎపిసోడ్లు
#86: Are You Drowning In Account Sprawl, And Don’t Know It?
Are you sure every login in your company is legit? Cybersecurity leader Matt Topper exposes the hidden chaos of account sprawl—where forgotten logins...

#85 – What Happens When A Fortune 5 Company Fails Cybersecurity 101
Even Fortune 5 firms fail at Cybersecurity 101. Paul Tracey discusses how small businesses and even home users can block the same attacks.

#84 - Is Your Data Secure When You Use AI?
Is Your Data Secure When You Use AI? Navy intel veteran, engineer, and attorney Cordell Robinson reveals how AI handles your data, what to share, and...

#83 - Zero Cost Pathway to American Cybersecurity
Frustrated by cybersecurity losses? Guest Larry Clinton, President of the Internet Security Alliance (ISA) proposes a zero-cost solution. By eliminati...

#82 - The Phishing Paradox: Why Security Training Might Be Making You MORE Vulnerable
Discover the surprising reason security training may be making you an easy target for hackers, and the better way to fight back. With CyberHoot CEO Cr...

#81 – Picking the Right Balance between Security and User Satisfaction
Strict security vs. smooth user experience—can you have both? Hear David W. Schropfer & Daniel DeGroff tackle CIAM, FusionAuth’s evolution, and real-w...

#80- Are you keeping up with Data Governance post-AI?
AI is reshaping data governance—and raising big compliance questions. David W. Schropfer and Anthony Woodward unpack risks, silos, and solutions on DI...

#79 - AI and CCTV: Yes, it’s here. No, it’s not Big Brother (yet)
Can AI spot threats without spying on you? Loretta AI’s Galvin Widjaja joins DIY Cyber Guy to reveal how smart surveillance protects privacy—no facial...

#78- Cybercriminals Aggressively Shifting to Easier Targets: Small & Medium Businesses
The average ransomware claim is down, but incidents are up. What does that mean? Threat actors are targeting smaller businesses, and Business Email...

#77 Limitations for AI: Hype vs. Reality
Marcus Fontoura (CTO of Microsoft's Azure Core) discusses why AI may not reduce dev team sizes but instead raises quality expectations, just like spel...

#76 – Using AI in Cybersecurity: Best Practices for Small/Medium Businesses
AI is transforming cybersecurity in businesses of every size. In Ep. 76 of DIY Cyber Guy, RAD Security's Jimmy Mesta explains how AI tools fight phish...

#75 - The Dark Side of AI: When will Autonomous AI Cyber Weapons Begin?
AI is changing security fast—hear how Deep Sentinel stops crime in real time and why AI scams are the next big threat. Must-listen for staying ahead!...

#74 - Is Privacy Incompatible With AI?
Can AI act as your compliance officer and protect your privacy?
On episode #74, personal.ai co-founder Suman Kanuganti talks AI personas, data...

#73 - The Practical Side of NFT's and Blockchain - How to Create Your Own Opportunities
Forget the complex technology - learn how to create opportunities and make real income from your digital work product without learning blockchain! Wit...

#72 - Why the Future of Business Relies on Quantum & AI

#71 - The 80/20 Rule of AI: How to Save Time and Boost Productivity
Learn how the 80/20 rule of AI boosts productivity! Save time on emails, SOPs, and sales with ChatGPT, Google Gemini, & Copilot. More at DIYCyberGuide...

#70 - How to Save Money by Talking to Your Tech Team
You know time and money can be wasted on any project if you don't know what to ask your team during the process. Tech Teams are no exception. With tec...

#69 – Post-Holiday Retail Fraud Roundup, and How To Stop Fraud In 2025
Online fraud exploded by 692% last holiday season. Many types of online fraud can fought with Blockchain, but what about physical goods? Listen to ou...

#68 - The Misconceptions of AI - What Everybody Needs to Know
Everyone, in every job, will be impacted by AI, but maybe not in the way you think. Listen to this insightful interview with AI expert Nada Sanders,...

#67 -“Computer Use” AI: What Is It, and What Jobs Will Be Impacted?
AI has entered into a new category called Computer Use AI. Listen to this episode to discover what it means, who will use it, and which jobs could be...

#66 - The Quantum Computing Advantage is Closer Than You Think
The Quantum Computing Advantage is closer than you think. Find out what can be done today, and what to expect tomorrow, with our guest, Dr. Krysta Svo...

#65 – Demystifying Quantum Computing
Quantum Computing is based on the science of quantum mechanics, which will be 100 years old next year. Find out how quantum is impacting your life tod...

#64 - How to Avoid New FedEx and UPS Phishing Scams
Researchers at Abnormal Security have observed an increase in phishing scams impersonating FedEx and UPS. Find out what you can do with our guests Isr...

#63 - New Concerns About Two-Factor Authentication
Should phone reps be Identity Investivators? Can all reps be trusted to keep hackers out of your accounts? In this episode learn about new, goverment...

#62 - Ransomware Hits The Brakes At Ferrari - Protect Your Network Now
Hackers speed off with Ferrari data in a #ransomware attack. See how to stop an attack before it happens, with Greg Edwards, CEO @Canauri

#61 - How to Make Sure that Your IT Provider Is Not A Ransomware Target
If you use a managed service provider (MSP) to manage your company's IT needs, learn how to hold these businesses accountable for keeping your service...

#60 - How Lessons Learned by Large Companies Can Help YOU Keep Your Cloud Data Secure
Uber just had another data breach. Learn from their mistakes, and the mistakes of other larege corporations, to find out how to keep your data safe a...

#59 - Effects of Twitter's Massive Data Breach (And What You Can Do)
Hackers are using the recent Twitter breach, combined with the other 4,100 data breaches in 2022, to steal identities. Learn about new systems like #D...

#58 - Samsung Customer Data Hacked - What You Need To Do
Hackers stole Samsung's customer data from a US-based facility. Were you affected? What sis Samsung disclose? What should you do? With guest Javvad...

#57 - Hackers are Using Personal Smartphones and Emails as a Backdoor Into Your Employer
Phishing attacks have evolved. Hackers have found new ways to use private messaging apps, personal email accounts, and personal smartphones to attack-...

#56 - The Best Cybersecurity Defense (And It’s Not Found In Technology)
Why do you wear a seatbelt? Is it because of protection, or the penalty for not doing it? Adopt the culture of cybersecurity for both of these reason...

#55 - Update Apple Devices Now
Serious vulnerabilities have just been patched in Apple products. If you own an Apple iPhone, iPad, or Macbook, listen to this episode to find out wha...

#54 - Developing a Digital Vision in Education
Preparing students for success in a digital world requires educators, administrators and parents to, directly and indirectly, educate students. With...

#53 - Cybersecurity and the Future of Education
What is the future of education, and how does cybersecurity impact Education differently? How can student data be used to help predict the future su...

#52 - New Privacy Law for People Who Live in Connecticut, and Any Company That Serves Them
If you are a customer in Connecticut, you should to understand this. But if you sell to any customers in Connecticut, you NEED to understand this.

#51 - How Hackers Can Steal Your Cryptocurrency from Your Mobile Phone
New report from Trend Micro details how hackers steal your money and your passwords. Learn how to stop them.

#50 - You Are On The Front Lines Of A Cyber War, And It Just Escalated
Ransomware has become a mature industry, and it is waging war on vulnerable companies with cash in the bank. Find out what you can do, with cybersecur...

#49 - How To Detect Data Tampering
Ransomware is increasing, and it is the worst form of data tampering. Find out new ways to understand, detect, and prevent data tampering before it i...

#48 - Five Steps to Landing Your First Cybersecurity Job
Experienced developer and educator Bobby Davis, Jr. simplifies the process of landing your first cybersecurity job in 5 simple steps.

#47 - How SMB's Can Be More Productive and Resilient Using the Cloud
Learn how your small or medium-size business can be more productive and resilient using the cloud.