logo
episode-header-image
May 2022
26m 29s

Preventing Digital Fraud & Scams

Microsoft
About this episode
Lou Manousos, an acknowledged expert in internet security and VP of Product in Microsoft Security, joins Ann Johnson on this week's episode of Afternoon Cyber Tea. Lou has been developing enterprise protection technology for more than 15 years and is currently the CEO of Risk IQ. He also spearheaded a new approach to using intelligence to help companies prot ... Show More
Up next
Feb 17
Dawn Song: When AI Becomes the Hacker and the Defender
Dawn Song, Professor of Computer Science at UC Berkeley, joins Ann on this week’s episode of Afternoon Cyber Tea to explore how AI is rapidly reshaping the threat landscape. Dawn shares research from projects like Cyber Gym, demonstrating how frontier AI models are increasingly c ... Show More
26m 44s
Feb 3
Trust Is Patient Well-being: Rob Suárez on Cybersecurity in Healthcare
Rob Suárez, Vice President and Chief Information Security Officer at CareFirst BlueCross BlueShield joins Ann on this week’s episode of Afternoon Cyber Tea. In the conversation, Rob shares how his career path and personal philosophy have shaped a mission-driven approach to cybers ... Show More
27m 1s
Jan 20
The New Reality of the CISO Role
David Gee, a veteran CISO, CIO, board advisor, and author, joins Ann Johnson, CVP of Cybersecurity, Microsoft, on this week’s episode of Afternoon Cyber Tea. Drawing on decades of experience and insights from his books, Gee explores the gap between theory and reality for security ... Show More
26m 39s
Recommended Episodes
Dec 2024
Stopping Deepfake Threats Through Identity Verification
In this episode, Aaron Painter, CEO at Nametag, joins me in discussing the Deepfake fraud phenomenon and how organizations and individuals should protect themselves from such scams. A recent study conducted by finance software provider Medius finds that over 53% of businesses in ... Show More
33m 28s
Apr 2025
Stopping Social Engineered Vishing Attacks Before They Start
Social engineering continues to be the primary gateway for cyberattacks, responsible for nearly 80% of fraud and ransomware incidents. And notably, 1 in 4 of these social engineering attacks originate via phone calls. Yet many enterprises continue to leave their phone systems exp ... Show More
41m 52s
Jan 2022
Saving the Day: Becoming a Cybersecurity Superhero
You’ve probably got a security system for your building, with locks on your doors and safes for your important documents. But criminals don’t just try to take what’s in your cash register anymore. As the world shifts increasingly online, there are more and more opportunities for ... Show More
23m 10s
Nov 2024
FBI fights fake news.
The FBI flags fake videos claiming to be from the agency. Okta patches an authentication bypass vulnerability. Microsoft confirms Windows Server 2025 Blue Screen of Death issues. Scammers exploit DocuSign’s APIs to send fake invoices that bypass spam filters. Hackers use smart co ... Show More
31m 54s
Feb 2025
PAN-ic mode: The race to secure PAN-OS.
Palo Alto Networks confirms a recently patched firewall vulnerability is being actively exploited. CISA warns of an actively exploited iOS vulnerability. Juniper Networks has issued a critical security advisory for an API authentication bypass vulnerability. The acting commission ... Show More
29m 23s
Jun 2025
Managing online security throughout the decades.
tail spinning
43m 9s