meta_pixel
Tapesearch Logo
Log in
CyberWire Daily

The changing face of fraud. [CISO Perspectives]

CyberWire Daily

N2K Networks, Inc.

Daily News, Tech News, News, Technology

4.6 • 1K Ratings

🗓️ 11 November 2025

⏱️ 37 minutes

🧾️ Download transcript

Summary

Fraud has always been a consistent challenge. As the world has continued to become increasingly interconnected and as new technologies have become widely available, threat actors have continued to evolve their tactics. In this episode of CISO Perspectives, host ⁠Kim Jones⁠ sits down with Mel Lanning from the Better Business Bureau to discuss fraud and how it has been evolving in recent years. From exploiting cryptocurrencies to utilizing emerging technologies, Kim and Mel look into how threat actors are changing and refining tactics in the current threat landscape. This episode of N2K Pro's CISO Perspectives podcast is brought to you by our sponsor, Meter. Meter provides a full-stack, enterprise-grade networking solution—wired, wireless, and cellular—designed, deployed, and managed end-to-end. From hardware to software, ISP to security, Meter delivers seamless, secure, and scalable connectivity for modern business environments. Learn more about ⁠Meter⁠. Want more CISO Perspectives? Check out a companion ⁠⁠blog post⁠⁠ by our very own Ethan Cook, where he breaks down key insights, shares behind-the-scenes context, and highlights research that complements this episode. Learn more about your ad choices. Visit megaphone.fm/adchoices

Transcript

Click on a timestamp to play from that location

0:00.0

You're listening to the Cyberwire Network, powered by N2K.

0:09.5

This exclusive N2K Pro subscriber-only episode of CISO Perspectives has been unlocked for all Cyberwire listeners through the generous support of Meter,

0:23.1

building full-stack zero-trust networks from the ground up.

0:25.1

Trusted by security and network leaders everywhere,

0:28.0

meter delivers fast, secure by design,

0:30.5

and scalable connectivity

0:31.9

without the frustration, friction,

0:34.6

complexity, and cost

0:36.1

of managing an endless proliferation of vendors and tools.

0:40.3

Meter gives your enterprise a complete networking stack, secure wired, wireless, and cellular

0:46.3

in one integrated solution built for performance, resilience, and scale.

0:51.6

Go to meter.com slash CISOP today to learn more and book your demo.

0:57.5

That's M-E-T-E-R.com slash C-I-S-O-P.

1:06.7

I am, by nature, a sheepdog in the way that Dave Grossman defined the term in his essay.

1:16.5

I have an overly developed sense of justice and a need to keep bad things from happening to good people.

1:23.2

This is why I soldiered for many years when there were lucrative opportunities to do other things, and why I chose cybersecurity when I hung up my Army Greens.

1:33.4

So when a friend asked me several years ago why security professionals do what they do, I told her what has since become known as my single mom at Walmart story.

1:44.6

Picture a single mom shopping at Walmart.

1:47.8

She is staying just above the poverty line simply through hard work, determination, and personal resolve.

1:54.1

Her kids don't wear new clothes, but they are always neat and clean.

1:58.3

Their bellies are never empty, if only through the three jobs she works.

2:03.7

It's shopping day. She's clipped her coupons throughout the week and is trying to get her

...

Please login to see the full transcript.

Disclaimer: The podcast and artwork embedded on this page are from N2K Networks, Inc., and are the property of its owner and not affiliated with or endorsed by Tapesearch.

Generated transcripts are the property of N2K Networks, Inc. and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.

Copyright Š Tapesearch 2025.