
Sign up to save your podcasts
Or


Hello everyone and welcome back. In this episode, we are here with Roger Grimes, Data-Driven Defense Evangelist at KnowBe4, cybersecurity architect, and Author.
Roger first made his debut on the podcast in 2020, when he unlocked the truth and disproved assumptions about multifactor authentication. We are excited to welcome Roger back to discuss his new book, "Ransomware Protection Playbook," in which he outlines a practical roadmap to protect your networks against one of the most insidious and damaging cyber threats, ransomware!
In today's episode, learn why the Zero Trust method is the future of computer security and how ransomware attacks better equip companies for future attacks. Be a part of our discussion as we uncover the secrets behind cryptocurrencies, Web 3.0, NFTs, cybercriminal safe havens, dynamic DNS services, network access brokers, and AI bots.
Are you ready to explore the uncharted territories of the dark web? We sure are. Listen in today.
As a CIO and Business IT Leader here are some wins you will get by listening:
Resources
Ransomware Protection (Book)
Kevin Mitnick
Hacking Multifactor Authentication
Whitepapers called Fix the Internet. To receive and read email: [email protected]
By Bill MurphyHello everyone and welcome back. In this episode, we are here with Roger Grimes, Data-Driven Defense Evangelist at KnowBe4, cybersecurity architect, and Author.
Roger first made his debut on the podcast in 2020, when he unlocked the truth and disproved assumptions about multifactor authentication. We are excited to welcome Roger back to discuss his new book, "Ransomware Protection Playbook," in which he outlines a practical roadmap to protect your networks against one of the most insidious and damaging cyber threats, ransomware!
In today's episode, learn why the Zero Trust method is the future of computer security and how ransomware attacks better equip companies for future attacks. Be a part of our discussion as we uncover the secrets behind cryptocurrencies, Web 3.0, NFTs, cybercriminal safe havens, dynamic DNS services, network access brokers, and AI bots.
Are you ready to explore the uncharted territories of the dark web? We sure are. Listen in today.
As a CIO and Business IT Leader here are some wins you will get by listening:
Resources
Ransomware Protection (Book)
Kevin Mitnick
Hacking Multifactor Authentication
Whitepapers called Fix the Internet. To receive and read email: [email protected]