Success Takes Time So Get Off Your LAZY ASS | Chris Ciezak

Listen to the podcast here: About Chris:   Christopher is a First generation American of Polish descent. Passionate father, leader, entrepreneur, restaurant/food professional on a mission to make a positive impact on myself and those around me. Watch the episode here: Success Takes Time So Get Off Your LAZY ASS | Chris Ciezak It’s a special […]

The War Between Facebook and Apple – Scott Schober | CYBER Edition

Listen to the podcast here: About Scott: Scott Schober is the President and CEO of Berkeley Varitronics Systems, a 49-year-old, New Jersey-based provider of advanced, world-class wireless test and security solutions. He is the author of three best-selling security books: Hacked Again, Cybersecurity is Everybody’s Business, and Senior Cyber. Scott is a highly sought-after author […]

Why Your Product Launch Formula Will Fail | Richard Mallion

Listen to the podcast here: About Richard: Richard Mallion is a speaker, high-level business consultant, serial entrepreneur and philanthropist who has been in the venture capital and eCommerce industry for over 25 years. Richard has a degree in finance and has dedicated his life to his children’s academic and sports achievements. Richard has traveled all […]

Business Email Compromise: Everybody is at risk | Loop Holes in Email Compromises: How do you protect your business? / CyberSecurity Economics: How to know you’re at risk? – Geoffrey Simpson | CYBER Edition

Listen to the podcast here: About Geoffrey: PhD Candidate in Computer Science at the University of Tulsa. Area of research is Identifying Malicious Domain names. My research falls into the domain of Security Economics, which looks at the economics around cyber crime, both from the attacker and defender points of view. — Watch the episode […]

It’s the Not Sexy Things That Cause the Most Damage in Your Data Breach

When a breach occurs, what do you think causes the most damage? The answer is simpler than you think. New technologies like machine learning, artificial intelligence, and IoT have driven the scale and complexity of cyberattacks. If you are a business owner, you have every reason to be concerned as the threat of a possible […]