Cybersecurity News: Elon’s Audits, Finland’s Tabletop Security, & AI Threats
Think audits are just paperwork? Think again. They’re the frontline defense against security gaps, data breaches, and unchecked access. In this episode of The Audit, we break down how Elon Musk’s unexpected access to FEMA’s sensitive data underscores the critical role of audits in organizational security. We reveal how regular audits and third-party reviews expose […]
Social Engineering Tactics & Defense Strategies with Alethe Denis
You’re Being Hacked Right Now—And You Don’t Even Know It Ever wonder how cybercriminals manipulate human behavior to breach even the most secure organizations? In this episode of The Audit, Eric Brown and Nick Mellum sit down with renowned social engineer and penetration tester Alethe Denis to break down real-world hacking techniques, red team […]
Cybersecurity Insights 2025: Big Data, AI, and Staying Ahead of Attacks
Discover the hidden risks of browser extensions, cybersecurity incidents, and more with hosts Eric Brown and Nick Mellum. In this episode, we dive into the dangers of tools like Honey, the fallout from Proton’s global outage, and the ingenious tactics used by cybercriminals to target unsuspecting users. Eric and Nick also share their insights on […]
Big Data Meets Cybersecurity: Expert Insights from Wade Baker
Dive into the transformative power of data in cybersecurity in this must-watch episode with Wade Baker, where cutting-edge insights meet real-world applications. Hear from The Audit Team as we discover how massive data sets are reshaping risk management, AI’s evolving role in combating cyber threats, and the surprising insights data can unveil about security […]
Cybersecurity in Travel: Tips, Tools, and Tales with Matthew Wold
Join us for an eye-opening discussion on cybersecurity in travel with ethical hacker Matthew Wold from Ramsey County. Matthew shares how his passion for cybersecurity took root at Ramsey County, leading to collaborations with co-hosts Eric Brown and Nick Mellem. We kick things off with a lighthearted chat about survival items on a deserted island, […]
Cracking Gmail and SEO Poisoning: Inside the Latest Cyber Threats
From Gmail 2FA bypass warnings to SEO poisoning campaigns, we’re diving into the latest cybersecurity headlines reshaping the industry. We explore how attackers are using hyper-specific search terms—like the legality of Bengal cats—to deliver malware and manipulate search results. Plus, we discuss advancements in AI-powered behavioral analytics, from cutting down false alerts to streamlining […]
Social Engineering to AI Ethics: Wild West Hackin’ Fest 2024
In this episode of The Audit, we dive into key takeaways from a top cybersecurity event. From IoT hacking and RFID bypasses to AI governance and vishing bots, we explore the tools and strategies shaping security. Plus, real-world lessons, social engineering insights, and a few unexpected laughs—because security isn’t always all business. In This Episode […]
AI & Emerging Tech for a Better Future with Marsha Maxwell
In this episode, we dive into emerging tech with Marsha Maxwell, co-founder of If These Lands Could Talk and Head of Innovation at Atlanta International School. Marsha shares insights on empowering indigenous and underserved communities through AI and VR, the ethical challenges of integrating AI, and the importance of digital inclusion. We discuss the impact […]
Building Resilient, Secure Software: Lessons from DevSecOps Experts
Building secure software isn't optional—It's critical. Here’s how you can do it right! In this episode of The Audit presented by IT Audit Labs, we’re joined by Francis Ofungwu, CEO of DevSecFlow, to break down the urgent topic of software security. Together with Nick Mellom and Bill Harris, we dive into the common security […]
Real-World Cybersecurity: Need to Know Now Insights from a CISO
In this episode of The Audit by IT Audit Labs, we sit down for an in-depth conversation with Eric Brown to explore the crucial topic of personal information security. Eric breaks down essential strategies for protecting your data, starting with freezing your credit, leveraging password managers, and implementing multi-factor authentication. He also dives into […]