logo
episode-header-image
May 2022
26m 29s

Preventing Digital Fraud & Scams

Microsoft
About this episode
Lou Manousos, an acknowledged expert in internet security and VP of Product in Microsoft Security, joins Ann Johnson on this week's episode of Afternoon Cyber Tea. Lou has been developing enterprise protection technology for more than 15 years and is currently the CEO of Risk IQ. He also spearheaded a new approach to using intelligence to help companies prot ... Show More
Up next
Apr 14
Tony Sager: The Case for Cyber Hygiene First
Tony Sager, Senior VP & Chief Evangelist, Center for Internet Security, joins Ann on this week’s episode of Afternoon Cyber Tea to discuss how the accelerating pace of technology, AI, and global software dependencies are reshaping the cybersecurity landscape. He shares why the in ... Show More
31m 29s
Mar 31
Cybersecurity at Sea: Protecting the Global Supply Chain
Fabio Catassi, Chief Information Officer at Mediterranean Shipping Company (MSC) joins Ann on this week’s episode of Afternoon Cyber Tea to discuss the unique cybersecurity challenges of pr(otecting global shipping infrastructure. He shares how digital systems, vessels, satellite ... Show More
27m 43s
Mar 17
Code War with Allie Mellen
Allie Mellen, cybersecurity analyst and author, joins Ann on this week’s episode of Afternoon Cyber Tea to discuss her new book Code War: How Nations Hack, Spy, and Shape the Digital Battlefield. Allie explores how cyber conflict is deeply connected to geopolitics, history, and n ... Show More
28m 56s
Recommended Episodes
Dec 2024
Stopping Deepfake Threats Through Identity Verification
In this episode, Aaron Painter, CEO at Nametag, joins me in discussing the Deepfake fraud phenomenon and how organizations and individuals should protect themselves from such scams. A recent study conducted by finance software provider Medius finds that over 53% of businesses in ... Show More
33m 28s
Apr 2025
Stopping Social Engineered Vishing Attacks Before They Start
Social engineering continues to be the primary gateway for cyberattacks, responsible for nearly 80% of fraud and ransomware incidents. And notably, 1 in 4 of these social engineering attacks originate via phone calls. Yet many enterprises continue to leave their phone systems exp ... Show More
41m 52s
Jan 2022
Saving the Day: Becoming a Cybersecurity Superhero
You’ve probably got a security system for your building, with locks on your doors and safes for your important documents. But criminals don’t just try to take what’s in your cash register anymore. As the world shifts increasingly online, there are more and more opportunities for ... Show More
23m 10s
Nov 2024
FBI fights fake news.
The FBI flags fake videos claiming to be from the agency. Okta patches an authentication bypass vulnerability. Microsoft confirms Windows Server 2025 Blue Screen of Death issues. Scammers exploit DocuSign’s APIs to send fake invoices that bypass spam filters. Hackers use smart co ... Show More
31m 54s
Oct 2025
The $25M Zoom Call: How Deepfakes Are Rewriting the Rules of Trust, Featuring KnowBe4's Erich Kron
<p>A Hong Kong employee sits through what seems like a routine video call with colleagues and the CFO. Everything looks normal. Then comes the urgent wire transfer request. $25 million later, the horrifying truth emerges: every face on that call was fake, generated by AI.</p> <p> ... Show More
38m 18s
Feb 2025
PAN-ic mode: The race to secure PAN-OS.
Palo Alto Networks confirms a recently patched firewall vulnerability is being actively exploited. CISA warns of an actively exploited iOS vulnerability. Juniper Networks has issued a critical security advisory for an API authentication bypass vulnerability. The acting commission ... Show More
29m 23s
Jun 2025
Managing online security throughout the decades.
tail spinning
43m 9s