
Insights from recent episode analysis
Audience Interest
Podcast Focus
Publishing Consistency
Platform Reach
Insights are generated by CastFox AI using publicly available data, episode content, and proprietary models.
Most discussed topics
Brands & references
Est. Listeners
Based on iTunes & Spotify (publisher stats).
- Per-Episode Audience
Est. listeners per new episode within ~30 days
25,001 - 50,000 - Monthly Reach
Unique listeners across all episodes (30 days)
75,001 - 150,000 - Active Followers
Loyal subscribers who consistently listen
15,001 - 40,000
Market Insights
Platform Distribution
Reach across major podcast platforms, updated hourly
Total Followers
—
Total Plays
—
Total Reviews
—
* Data sourced directly from platform APIs and aggregated hourly across all major podcast directories.
On the show
From 14 epsHost
Recent guests
Recent episodes
Shadows Within: A Spy Unmasks How Insider Risk Affects Cyber Security
May 5, 2026
57m 51s
Insider Threats | When the Hacker Already Has a Badge
May 2, 2026
20m 22s
US Secret Service in Action. Exclusive.
May 1, 2026
51m 54s
Why Hackers Love When You Deploy Agentic AI
Apr 28, 2026
53m 31s
This New Rule Can DESTROY Your Sales Overnight: CMMC's Wide Reach
Apr 27, 2026
42m 25s
Social Links & Contact
Official channels & resources
Official Website
Login
RSS Feed
Login
| Date | Episode | Topics | Guests | Brands | Places | Keywords | Sponsor | Length | |
|---|---|---|---|---|---|---|---|---|---|
| 5/5/26 | ![]() Shadows Within: A Spy Unmasks How Insider Risk Affects Cyber Security✨ | insider riskcyber security+4 | Shawnee Delaney | Vaillance GroupDefense Intelligence Agency | — | cyber securityinsider threat+5 | — | 57m 51s | |
| 5/2/26 | ![]() Insider Threats | When the Hacker Already Has a Badge✨ | insider threatscyber security+3 | — | Cyber Crime JunkiesCybercrime Junkies+4 | — | insider threatscyber security+3 | — | 20m 22s | |
| 5/1/26 | US Secret Service in Action. Exclusive.✨ | cybersecurityprivacy+3 | Paul Eckloff | US Secret ServiceLexis/Nexis Risk Solutions+1 | — | cybersecurityUS Secret Service+3 | — | 51m 54s | |
| 4/28/26 | Why Hackers Love When You Deploy Agentic AI✨ | cybercrimecybersecurity+3 | Matthew Rosenquist | Cyber Crime Junkies | — | cybercrimecybersecurity+3 | — | 53m 31s | |
| 4/27/26 | This New Rule Can DESTROY Your Sales Overnight: CMMC's Wide Reach✨ | CMMC 2.0small businesses+4 | — | Department of DefenseCMMC+1 | — | CMMCcybersecurity+6 | — | 42m 25s | |
| 4/26/26 | ![]() Ransomware Negotiations EXPOSED: Inside Cyber Hostage Deals with Kurtis Minder✨ | ransomwarecybercrime+4 | Kurtis Minder | — | — | ransomwarecyber negotiations+3 | — | 1h 03m 27s | |
| 4/24/26 | ![]() AI in Healthcare-Hope or HYPE?✨ | AI in healthcarecompliance+5 | — | AIhealthcare+5 | — | AIhealthcare+6 | — | 1h 19m 53s | |
| 4/23/26 | ![]() Baby Al Capone. New Wave of Online Violence Stories.✨ | True CrimeCybersecurity+3 | — | Dark Web | — | Baby Al CaponeSwatting+5 | — | 55m 09s | |
| 4/22/26 | ![]() New Ways to Take Control Over Data Privacy with Kurt Long.✨ | data privacysecure messaging+3 | Kurt Long | BUNKRKennedy Space Center+1 | — | data privacysecure messaging+3 | — | 59m 07s | |
| 4/19/26 | ![]() Stop Taking Bad Advice. An Open Letter To The World✨ | cybersecuritynation-state hackers+3 | — | — | — | cybercrimehacking+3 | — | 3m 26s | |
Want analysis for the episodes below?Free for Pro Submit a request, we'll have your selected episodes analyzed within an hour. Free, at no cost to you, for Pro users. | |||||||||
| 4/17/26 | ![]() Understanding Ransomware Gangs: Key Information✨ | ransomwarecybercrime+3 | Jon DiMaggio | LockBitCyber Crime Junkies | — | ransomwareLockBit+5 | — | 47m 51s | |
| 4/15/26 | ![]() CHAOS | Cybersecurity Predictions You Need to Know NOW✨ | cybersecuritycybercrime+4 | — | Cyber Crime Junkies | — | cybersecuritycybercrime+5 | — | 35m 55s | |
| 4/12/26 | ![]() Why Hackers Target YOU. Dark Web EXPOSED.✨ | hackingdark web+3 | Jeremy Samide | Blackwired | — | hackersdark web+4 | — | 1h 00m 44s | |
| 4/10/26 | Super AI Exposed | Should Humanity Surrender Control?✨ | AItechno-thriller+4 | Dr. Sergio Sanchez | AppleVatican+1 | — | AItechno-thriller+5 | — | 57m 10s | |
| 4/10/26 | ![]() Can Brett Johnson Help You SPOT Fraud Before it's Too Late? | Can Brett Johnson Help You SPOT Fraud Before it's Too Late? Brett Johnson joins us to talk about spotting fraud before its too late. We discuss how to limit cyber risk for small business, ways to identify refund fraud, AI implications in cyber security today, best policies to limit cyber liability and how can we spot fraud in business. We discuss how to protect families online, latest security expert insight, password management, and Deepfake technologies. Questions? Text our... | 49m 40s | ||||||
| 4/8/26 | ![]() AI Exposed. Latest Social Engineering Business Cyber Risk. | Experts Nick Mullen and Nick Oles discuss artificial intelligence and the impact of ai on business cyber risk. They share their personal stories of how they got into the field and highlight the importance of understanding the analogies between physical and cybersecurity controls. Nick Oles is author of How to Catch a Phish nick@thenetdefender.com https://thenetdefender.com/ Nick Mull Questions? Text our Studio direct. We read these and when helpful we give a special sh... | 1h 12m 07s | ||||||
| 4/5/26 | ![]() Biggest Cyber Insurance Mistakes To Avoid | Joined by Joseph Brunsman discussing how to avoid cyber insurance mistakes, biggest cyber insurance mistakes to avoid, and how to transfer risk for SMBs. Questions? Text our Studio direct. We read these and when helpful we give a special shout out for those to contact us. New non-fiction Book Series is out! Moving Target: The Art of Online Camouflage drops April 14.Moving Target: The Obedient Machine drops April 21.Book 3 -- Ghost and the Machine -- out soon!4 years. 400+ interviews. ... | 1h 00m 46s | ||||||
| 4/3/26 | ![]() FBI Most Wanted. Ruja Ignatova. Story of OneCoin. | This is the True Cyber Crime Story of Ruja Ignatova A/K/A The Crypto Queen, on the FBI’s Top 10 MOST WANTED. She is wanted and remains at large. It's alleged to be the single largest Crypto currency Ponzi scheme in history. Three main players, Ruja Ignatova (The Crypto Queen), her brother Konstantin and Sebastian Greenwood (the public face of ONECOIN and ONELIFE) wreaked havoc on the world amassing over $4 Billion dollars for a crypto currency that never even existed. They sold out Wembly Sta... | 34m 09s | ||||||
| 4/1/26 | ![]() How Business Can Transfer Cyber Risk | In this conversation, Jeff Severino and Nathan Borghardt discuss the importance of cyber insurance for small businesses. They share their background and approach to cyber insurance, emphasizing the need for risk transfer. They highlight 12 low-cost measures that small businesses can implement to reduce their cyber risk. The conversation also explores the costs and consequences of cyber attacks, the sophistication of cyber criminals, and the future of cyber insurance. The speakers stres... | 42m 32s | ||||||
| 4/1/26 | ![]() Moving Target. Trilogy Released. | New non-fiction Book Series is out! Moving Target: The Art of Online Camouflage drops April 14.Moving Target: The Obedient Machine drops April 21.Book 3 -- Ghost and the Machine -- out soon!4 years. 400+ interviews. Available on Amazon. We are all Stevie Parker. Questions? Text our Studio direct. We read these and when helpful we give a special shout out for those to contact us. New non-fiction Book Series is out! Moving Target: The Art of Online Camouflage drops April 14.Mov... | 2m 17s | ||||||
| 3/29/26 | ![]() How To Not Become a Victim of Cyber Crime. | I spent years interviewing FBI agents, ransomware negotiators, former hackers, and intelligence officers on my podcast. And I wrote a book that translates everything they told me into plain English — through a story that is going to make you recognize yourself on every page. It is called Moving Target: A trilogy and the first 2 books are available now on amazon. Link below Questions? Text our Studio direct. We read these and when helpful we give a special shout out for those to contact us. Ne... | 2m 30s | ||||||
| 3/29/26 | ![]() Dark Sword Zero Day Leaked Millions of iPhones At Risk TODAY! | New Episode🔥New Episode🔥This episode dives deep into the recent availability of Dark Sword, a potent zero click attack tool previously used by Russian intelligence, now accessible to criminals. We discuss the severe implications for cybersecurity as this zero day exploit, requiring no download, offers unfettered access to mobile devices. Join us to understand the risks of phone hacking and how it impacts your digital safety. Chapters 00:00 Russian Intelligence Exploit Goes Public on GitHub 0... | 17m 46s | ||||||
| 3/29/26 | ![]() The Aftermath. Navigating Reputations and Protecting Your Brand Image | James Potter, CEO of DSE, joins us in the studio for great conversation and exclusive insight on The Aftermath of Data Breaches: Navigating Reputational Damage and Protecting Your Brand Image. Reputational Harm from Data Breaches, Cybersecurity Reputation Management and Operational Leadership. Find more on DSE here: https://www.dse.team/ Topics discussed: • Target Breach & Surprises most don't know about • &nb... | 52m 23s | ||||||
| 3/28/26 | ![]() Cybersecurity and Society | Insights from Lux Blox Inventor Mike Acerra | New Episode🔥New Episode🔥This thought-provoking video explores the intricacies of human biology, detailing the trillions of unconscious decisions our bodies make daily, from immune responses to cell division. It raises questions about the nature of consciousness and free will within these automatic processes. The discussion also touches on neuroscience and decision making, offering a unique perspective on human autonomy. In this engaging interview, host David Dean Mauro speaks with Mike Acerr... | 1h 03m 04s | ||||||
| 3/27/26 | ![]() Anthem & Equifax Breaches: What's Actually Happening? (Part 2) | Inside Espionage What Every American Should Know. Inside Truth Behind Data Breaches. There is a bigger story behind some breaches: 1. the Anthem Breach, 2. The Equifax breach, 3. the breach of the OPM (Office of Personnel Management) for the US govt, and 4. Marriott International. The Impact of Chinese Espionage on US Businesses and Innovation Inside Espionage: What Every American Should Know Questions? Text our Stud... | 31m 53s | ||||||
Showing 25 of 325
Sponsor Intelligence
Sign in to see which brands sponsor this podcast, their ad offers, and promo codes.
Chart Positions
1 placement across 1 market.
Chart Positions
1 placement across 1 market.
















