
Sign up to save your podcasts
Or


Learn more or contact us: https://huttanholdingllc.com/
This week’s deep dive unpacks the alarming rise of cyber threats where trust meets vulnerability. From AI-generated phishing scams and fake software updates to systemic public sector failures and massive vendor breaches, we explore how cybercriminals are weaponizing digital trust at every level. Case studies include the Uvalde, TX ransomware attack, the Salesloft-Salesforce supply chain breach, and critical infrastructure risks tied to IoT. Plus, we highlight emerging defenses like C2PA digital watermarking and Apple’s new memory protections.
Discover how small businesses, schools, and enterprises alike can rethink defenses, strengthen vendor risk management, and stay ahead in an increasingly hostile cyber landscape.
By Turnkey Cybersecurity and Privacy SolutionsLearn more or contact us: https://huttanholdingllc.com/
This week’s deep dive unpacks the alarming rise of cyber threats where trust meets vulnerability. From AI-generated phishing scams and fake software updates to systemic public sector failures and massive vendor breaches, we explore how cybercriminals are weaponizing digital trust at every level. Case studies include the Uvalde, TX ransomware attack, the Salesloft-Salesforce supply chain breach, and critical infrastructure risks tied to IoT. Plus, we highlight emerging defenses like C2PA digital watermarking and Apple’s new memory protections.
Discover how small businesses, schools, and enterprises alike can rethink defenses, strengthen vendor risk management, and stay ahead in an increasingly hostile cyber landscape.