The Audit 2025: Deepfakes, Quantum & AI That Changed Everything
In this special year-end episode, Joshua Schmidt revisits the most mind-bending moments from The Audit's 2025 season. From Justin Marciano and Paul Vann demonstrating live deepfakes in real-time (yes, they actually did it on camera) to Bill Harris explaining how Google's quantum experiments suggest parallel universes, to Alex Bratton's urgent warning about the AI adoption […]
Best Cyber Defense Tips for 2025 in One Coffee Break
Looking back at the cybersecurity lessons that made the biggest difference this year? Jen breaks down the 9 most powerful, actionable steps you've learned through SipCyber – the security moves that drastically reduce your risk without requiring a tech degree. From credit freezes to SIM swap protection, these aren't theoretical tips – they're the defenses […]
Gaming to Cybersecurity: How AI Agents Fight Alert Overload
What if you could hire an army of AI security analysts that work 24/7 investigating alerts so your human team can focus on what actually matters? Edward Wu, founder and CEO of DropZone AI, joins The Audit crew to reveal how large language models are transforming security operations—and why the future of cyber defense looks […]
Holiday Shopping Scams: 4 Ways Hackers Target You
The holidays aren't just busy for shoppers—they're prime hunting season for cybercriminals. While you're wrapping gifts and booking flights, threat actors are unwrapping your financial data at gas pumps, coffee shops, and fake charity sites. In this holiday edition of SipCyber, host Jen Lotze breaks down four critical defensive strategies to protect your cash, cards, […]
AI Isn’t Your Child’s Friend – What Parents Need to Know
AI companions are becoming digital "friends" to our children—and that's a serious problem. When kids start treating AI like a trusted companion instead of a tool, we're seeing real harm: emotional manipulation, self-worth issues, and even incidents of self-harm. These agents don't have feelings, can't understand ethics, and are simply mirrors reflecting collected human data. […]
Critical Infrastructure: Everything is Connected and Vulnerable
When hackers target the systems controlling your water, power, and transportation, the consequences go far beyond data breaches—people can die. Leslie Carhartt, Technical Director of Incident Response at Dragos, pulls back the curtain on one of cybersecurity’s most critical blind spots: industrial control systems that keep society running but remain dangerously exposed. What You’ll Learn: […]
AI Safety 101: Manipulation, Hallucinations & Defense
The tools we trust most can deceive us fastest. In this episode of SipCyber, Jen Lotze brings insights straight from Wild West Hackin' Fest—one of the premier ethical hacking conferences—to Wabasha Brewing in St. Paul, MN. Fresh off an AI cybersecurity course, Jen breaks down two critical vulnerabilities in the AI tools millions of us […]
Scams Exploiting Trust: Quishing & Pig Butchering
Trust is essential in our daily lives—but it's also what scammers exploit most. In this episode of SipCyber, Jen Lotze visits Central Park Coffee in Owatonna, MN, to discuss two evolving scams that prey on human trust: quishing (QR code fraud) and pig butchering (romance investment scams). From fake QR codes on restaurant tables to […]
Red Team Warfare: A Navy Cyber Officer’s Inside Look at Military Offensive Operations
What if your security team is playing defense while hackers play offense 24/7? Foster Davis, former Navy cyber warfare officer and founder of BreachBits, breaks down why traditional penetration tests become obsolete in weeks—and how continuous red teaming changes the game. From hunting pirates in the Indian Ocean to defending critical infrastructure, Foster shares hard-earned […]
Smishing & Vishing: The Scams Hiding in Your Messages
That urgent text about a package delivery? That call from "your bank"? They might be scams designed to steal your personal information. In this episode of SipCyber, Jen Lotze breaks down smishing (SMS phishing) and vishing (voice phishing)—two increasingly common tactics scammers use to bypass your email filters and catch you off guard. ☕ Featured […]