<?xml version="1.0" encoding="UTF-8"?>
<?xml-stylesheet type="text/xsl" href="https://media.rss.com/style.xsl"?>
<rss xmlns:podcast="https://podcastindex.org/namespace/1.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:psc="http://podlove.org/simple-chapters" xmlns:atom="http://www.w3.org/2005/Atom" xml:lang="en" version="2.0">
  <channel>
    <title><![CDATA[Cyber (in)Sanity]]></title>
    <link>https://rss.com/podcasts/cyberinsanity</link>
    <atom:link href="https://media.rss.com/cyberinsanity/feed.xml" rel="self" type="application/rss+xml"/>
    <atom:link rel="hub" href="https://pubsubhubbub.appspot.com/"/>
    <description><![CDATA[<p>Goliath Cyber Security Group's Angelo Longo and Andrew Berkuta co-host a new podcast "Cyber (in)Sanity". Throughout this podcast, they will review and explain cyber security musts and current events. With over 20 years of experience from both hosts, Cyber (in)Sanity aims to clarify all your questions, concerns, and things you might not even know about. </p>]]></description>
    <generator>RSS.com 2026.401.141116</generator>
    <lastBuildDate>Fri, 17 Apr 2026 13:22:11 GMT</lastBuildDate>
    <language>en</language>
    <copyright><![CDATA[Goliath Cuber Security Group 2023]]></copyright>
    <itunes:image href="https://media.rss.com/cyberinsanity/20231109_051140_ca7dd469177bfe3d778cddbd0b569c91.jpg"/>
    <podcast:guid>2f4aea0e-27f4-5c8a-a5ed-81ddf5fd5c91</podcast:guid>
    <image>
      <url>https://media.rss.com/cyberinsanity/20231109_051140_ca7dd469177bfe3d778cddbd0b569c91.jpg</url>
      <title>Cyber (in)Sanity</title>
      <link>https://rss.com/podcasts/cyberinsanity</link>
    </image>
    <podcast:locked>yes</podcast:locked>
    <podcast:license>Goliath Cuber Security Group 2023</podcast:license>
    <itunes:author>Cyber (in)Sanity</itunes:author>
    <itunes:owner>
      <itunes:name>Cyber (in)Sanity</itunes:name>
    </itunes:owner>
    <itunes:explicit>false</itunes:explicit>
    <itunes:type>episodic</itunes:type>
    <itunes:category text="News">
      <itunes:category text="Tech News"/>
    </itunes:category>
    <itunes:category text="Business">
      <itunes:category text="Management"/>
    </itunes:category>
    <podcast:medium>podcast</podcast:medium>
    <item>
      <title><![CDATA[Season 2 Teaser ]]></title>
      <itunes:title><![CDATA[Season 2 Teaser ]]></itunes:title>
      <description><![CDATA[<p>Things are changing in the world of cyber security, and Goliath Cyber Security is here to tell you all about it.</p><p></p><p>Join us on Cyber (in)Sanity as we discuss what's coming up and our season 2 teaser. </p><p></p><p>#CyberSecuritySeries #TechnologyTrends #CyberDefense #TechPodcast #CyberSecurityAwareness #DigitalSafety #CyberThreats #PodcastDiscussion #PodcastEpisode</p><p>For expert insights and consultation, reach out to the Goliath Cyber Security team:</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="mailto:sales@goliathsec.com">sales@goliathsec.com</a></p><p>(239) 898-0429</p><p>For podcast inquiries: <a target="_blank" rel="noopener noreferrer nofollow" href="mailto:media@goliathsec.com">media@goliathsec.com</a></p>]]></description>
      <link>https://rss.com/podcasts/cyberinsanity/1549485</link>
      <enclosure url="https://content.rss.com/episodes/236842/1549485/cyberinsanity/2024_06_29_16_23_46_f11b0a70-7981-4163-8b09-9b5106742ba8.mp3" length="9252102" type="audio/mpeg"/>
      <guid isPermaLink="false">3be9f88e-4939-4d6e-960f-d53eeb15d49d</guid>
      <itunes:duration>536</itunes:duration>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <podcast:season>2</podcast:season>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Sat, 29 Jun 2024 16:24:17 GMT</pubDate>
      <itunes:image href="https://media.rss.com/cyberinsanity/ep_cover_20240629_040643_9c2ace3d1b4e4fcfd876d9d2ec634bc8.png"/>
    </item>
    <item>
      <title><![CDATA[Episode 17- Be My Neighbor (Guest Nathan Knottingham)]]></title>
      <itunes:title><![CDATA[Episode 17- Be My Neighbor (Guest Nathan Knottingham)]]></itunes:title>
      <description><![CDATA[<p>In the newest episode of Cyber (in)Sanity, hosts Andrew Berkuta and Angelo Longo are joined by Nathan Knottingham from Be My Neighbor mortgage broker, diving into recent threats to the Financial Sector and sharing security insights. With financial data becoming increasingly vulnerable to cyber threats, Knottingham provides valuable expertise on emerging risks and practical strategies for safeguarding sensitive information. Together, they emphasize the importance of vigilance and proactive security measures, including encryption protocols, data protection strategies, and employee training programs. Listeners gain actionable steps to enhance their digital resilience in the face of evolving cyber threats, making this episode essential listening for anyone in the Financial Sector seeking to bolster their defenses.</p><p>#CyberSecuritySeries #TechnologyTrends #CyberDefense #TechPodcast #CyberSecurityAwareness #DigitalSafety #CyberThreats #PodcastDiscussion #PodcastEpisode</p><p>For expert insights and consultation, reach out to the Goliath Cyber Security team:</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="mailto:sales@goliathsec.com">sales@goliathsec.com</a></p><p>(239) 898-0429</p><p>For podcast inquiries: <a target="_blank" rel="noopener noreferrer nofollow" href="mailto:media@goliathsec.com">media@goliathsec.com</a></p>]]></description>
      <link>https://rss.com/podcasts/cyberinsanity/1478069</link>
      <enclosure url="https://content.rss.com/episodes/236842/1478069/cyberinsanity/2024_05_14_00_18_30_a911a205-13fe-4f9c-869c-83248f03565d.mp3" length="59453508" type="audio/mpeg"/>
      <guid isPermaLink="false">5189cfac-c969-4e2c-8e7e-dd5c148847f2</guid>
      <itunes:duration>3696</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Tue, 14 May 2024 00:18:43 GMT</pubDate>
      <itunes:image href="https://media.rss.com/cyberinsanity/ep_cover_20240514_120527_3c3f9090562764540e0f0653b554073a.png"/>
    </item>
    <item>
      <title><![CDATA[Episode 16- What's the Password?]]></title>
      <itunes:title><![CDATA[Episode 16- What's the Password?]]></itunes:title>
      <description><![CDATA[<p>In the latest episode of Cyber (in)Sanity, hosts Andrew Berkuta and Angelo Longo explore digital security in 2024 when talking about strong passwords, the value of password managers, and two-factor authentication. They discuss the significance of robust passwords and offer practical tips for creating and managing them effectively. Additionally, they highlight the benefits of password managers in centralizing and encrypting passwords to minimize security risks. The episode also delves into the concept of two-factor authentication as an extra layer of defense against unauthorized access. With expert guidance from your hosts, listeners gain actionable steps to enhance their digital resilience in today's evolving cyber threat landscape.</p><p>Tune in to Cyber (in)Sanity for invaluable insights and practical advice to safeguard personal and organizational data.</p><p>#CyberSecuritySeries #TechnologyTrends #CyberDefense #TechPodcast #CyberSecurityAwareness #DigitalSafety #CyberThreats #PodcastDiscussion #PodcastEpisode</p><p>For expert insights and consultation, reach out to the Goliath Cyber Security team:</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="mailto:sales@goliathsec.com">sales@goliathsec.com</a></p><p>(239) 898-0429</p><p>For podcast inquiries: <a target="_blank" rel="noopener noreferrer nofollow" href="mailto:media@goliathsec.com">media@goliathsec.com</a></p>]]></description>
      <link>https://rss.com/podcasts/cyberinsanity/1455444</link>
      <enclosure url="https://content.rss.com/episodes/236842/1455444/cyberinsanity/2024_04_27_20_56_49_bed0cbef-648f-47d6-9046-15ce88bb3a3a.mp3" length="47778107" type="audio/mpeg"/>
      <guid isPermaLink="false">2d442b31-7312-4b89-a38f-20e9effcfbf7</guid>
      <itunes:duration>2817</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Sat, 27 Apr 2024 20:56:56 GMT</pubDate>
      <itunes:image href="https://media.rss.com/cyberinsanity/ep_cover_20240427_080425_92e2111ab315e18e68ff517ccaab0d35.png"/>
    </item>
    <item>
      <title><![CDATA[Episode 15- Why Me?]]></title>
      <itunes:title><![CDATA[Episode 15- Why Me?]]></itunes:title>
      <description><![CDATA[<p>In this episode of Cyber (in)Sanity Podcast, hosts Andrew Berkuta and Angelo Longo delve into the intricate world of hacking in "Why Me?". They dissect the various types of hackers, from ethical white-hats to profit-driven black-hats, and even nation-states wielding cyber capabilities for geopolitical gain. By unraveling the complexities of individual hackers, groups, and nation-states, the podcast sheds light on the evolving cyber threat landscape, urging listeners to stay vigilant in today's digital age.</p><p>#CyberSecuritySeries #TechnologyTrends #CyberDefense #TechPodcast #CyberSecurityAwareness #DigitalSafety #CyberThreats #PodcastDiscussion #PodcastEpisode</p><p>For expert insights and consultation, reach out to the Goliath Cyber Security team:</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="mailto:sales@goliathsec.com">sales@goliathsec.com</a></p><p>(239) 898-0429</p><p>For podcast inquiries: <a target="_blank" rel="noopener noreferrer nofollow" href="mailto:media@goliathsec.com">media@goliathsec.com</a></p>]]></description>
      <link>https://rss.com/podcasts/cyberinsanity/1436876</link>
      <enclosure url="https://content.rss.com/episodes/236842/1436876/cyberinsanity/2024_04_15_00_18_08_89f1728b-e50e-4188-9ba5-c9108e02ada9.mp3" length="45972340" type="audio/mpeg"/>
      <guid isPermaLink="false">11b0f81f-2460-48bb-9af4-7e352fcb0c03</guid>
      <itunes:duration>2592</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Mon, 15 Apr 2024 00:36:32 GMT</pubDate>
      <itunes:image href="https://media.rss.com/cyberinsanity/ep_cover_20240415_120434_8c343e02e4b12089b9debf3fac078b82.png"/>
    </item>
    <item>
      <title><![CDATA[Episode 14- People, Process, and Technology (Part 3.2 of 3) with guest Dave Marcus]]></title>
      <itunes:title><![CDATA[Episode 14- People, Process, and Technology (Part 3.2 of 3) with guest Dave Marcus]]></itunes:title>
      <description><![CDATA[<p>In the climactic finale of our three-part series "People, Process, and Technology," Cyber (in)Sanity Podcast hosts Andrew Berkuta and Angelo Longo are joined by cybersecurity expert Dave Marcus from Intel. This episode delves into the critical role of technology in cybersecurity, exploring emerging trends and the challenges they pose. Dave shares insights on leveraging advancements to fortify cyber defenses. The conversation underscores the necessity of proactive technological integration within cybersecurity frameworks. Listeners gain valuable predictions and recommendations for navigating the evolving threat landscape, ensuring a holistic approach to safeguarding SMBs.</p><p>#CyberSecuritySeries #TechnologyTrends #CyberDefense #TechPodcast #CyberSecurityAwareness #DigitalSafety #CyberThreats #PodcastDiscussion #PodcastEpisode</p><p>For expert insights and consultation, reach out to the Goliath Cyber Security team:</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="mailto:sales@goliathsec.com">sales@goliathsec.com</a></p><p>(239) 898-0429</p><p>For podcast inquiries: <a target="_blank" rel="noopener noreferrer nofollow" href="mailto:media@goliathsec.com">media@goliathsec.com</a></p>]]></description>
      <link>https://rss.com/podcasts/cyberinsanity/1425905</link>
      <enclosure url="https://content.rss.com/episodes/236842/1425905/cyberinsanity/2024_04_07_02_33_18_d26ee38a-d272-4e89-bcb6-f4725ed84d3f.mp3" length="66686439" type="audio/mpeg"/>
      <guid isPermaLink="false">f7eb852e-5804-4a51-bf58-cc347e21c43a</guid>
      <itunes:duration>3615</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Sun, 07 Apr 2024 02:33:58 GMT</pubDate>
      <itunes:image href="https://media.rss.com/cyberinsanity/ep_cover_20240407_020442_a0788cdf5711a0bb93b302ec6c8a2eaf.png"/>
    </item>
    <item>
      <title><![CDATA[Episode 13- People, Process, and Technology (Part 3.1 of 3)]]></title>
      <itunes:title><![CDATA[Episode 13- People, Process, and Technology (Part 3.1 of 3)]]></itunes:title>
      <description><![CDATA[<p>In the electrifying conclusion of our three-part series "People, Process, and Technology," cybersecurity experts and co-hosts of Goliath Cyber Security’s Cyber (in)Sanity Podcast, Andrew Berkuta and Angelo Longo, dive deep into the technological backbone of cybersecurity, illuminating how these tools transform mere mortals into digital superheroes akin to the iconic Batman. Just as Bruce Wayne relies on his arsenal of gadgets to combat crime, cybersecurity professionals harness cutting-edge technology to defend against digital threats and protect sensitive data..</p><p>As we embark on this thrilling journey, we uncover the critical importance of technology in the cybersecurity landscape. These tools are the bedrock of modern cyber defense strategies, from advanced threat detection systems to sophisticated encryption algorithms.</p><p>Join us in understanding how these technology tools integrate seamlessly with people and processes, so that organizations can fortify their defenses, protect sensitive data, and ensure the longevity of their operations. For in the world of cybersecurity, it's not just about donning the cape and mask – it's about harnessing the power of technology to become the digital defenders our organizations need.</p><p>#Goliath #cybersecurity #CyberInSanity #CyberDefenseTools #ProtectYourData #CyberResilience #TechnologyIntegration #CyberThreatDetection #GuardiansOfTheDigitalRealm #CyberSecurityPodcast</p><p>For expert insights and consultation, reach out to the Goliath Cyber Security team:</p><p><a href="mailto:sales@goliathsec.com">sales@goliathsec.com</a></p><p>(239) 898-0429Episode 13- People, Process, and Technology (Part 3.1 of 3)</p>]]></description>
      <link>https://rss.com/podcasts/cyberinsanity/1381257</link>
      <enclosure url="https://content.rss.com/episodes/236842/1381257/cyberinsanity/2024_03_09_15_56_43_6945c70c-7a44-4506-9177-b2c5803d3dc5.mp3" length="58834616" type="audio/mpeg"/>
      <guid isPermaLink="false">2590adfd-935c-40d3-b94b-425bbbbababe</guid>
      <itunes:duration>3395</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Sat, 09 Mar 2024 15:57:46 GMT</pubDate>
      <itunes:image href="https://media.rss.com/cyberinsanity/ep_cover_20240309_030315_9af8c2bd3a4edb560720a4d00d840dfb.png"/>
    </item>
    <item>
      <title><![CDATA[Episode 12- Dr.Rick Kiper in People, Process, and Technology(Part 2.2) x This is Not Like the Movies]]></title>
      <itunes:title><![CDATA[Episode 12- Dr.Rick Kiper in People, Process, and Technology(Part 2.2) x This is Not Like the Movies]]></itunes:title>
      <description><![CDATA[<p>In an engaging episode from our three-part series "People, Process, and Technology," cybersecurity enthusiasts and Cyber (in)Sanity Podcast co-hosts Andrew Berkuta and Angelo Longo have the honor of sitting down with Dr. Rick Kiper, a distinguished former FBI forensic agent turned academic. This special segment shines a light on the fascinating world of the forensic process and its critical role in cybersecurity.</p><p>Dr. Kiper, with his rich background in law enforcement and digital forensics, brings an unparalleled depth of knowledge to the table. The discussion kicks off with an exploration of the evolution of cyber security in forensics, tracing its roots from traditional crime scene investigation to its pivotal role in modern digital environments. Dr. Kiper emphasizes how forensics is a cornerstone in unraveling the digital breadcrumbs left behind in cyber incidents.</p><p>This episode is a must-listen for anyone interested in the behind-the-scenes that powers the fight against cybercrime, offering valuable lessons on the integration of forensics into comprehensive cybersecurity strategies.</p><p>#Forensics #CyberSecuritySeries #DigitalForensics #CyberCrimeInvestigation #TechPodcast #CyberSecurityAwareness #DigitalSafety #CyberThreats #PodcastDiscussion #PodcastEpisode</p><p>For expert insights and consultation, reach out to the Goliath Cyber Security team:</p><p><a href="mailto:sales@goliathsec.com">sales@goliathsec.com</a></p><p>(239) 898-0429</p><p>For podcast inquiries: <a href="mailto:media@goliathsec.com">media@goliathsec.com</a></p>]]></description>
      <link>https://rss.com/podcasts/cyberinsanity/1371108</link>
      <enclosure url="https://content.rss.com/episodes/236842/1371108/cyberinsanity/2024_03_03_00_58_15_a517ef76-bb26-4a28-9d55-2a99bf86e041.mp3" length="53629771" type="audio/mpeg"/>
      <guid isPermaLink="false">55ccbb7d-ef73-4132-a100-674ffeab5c1b</guid>
      <itunes:duration>3070</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>true</itunes:explicit>
      <pubDate>Sun, 03 Mar 2024 00:59:21 GMT</pubDate>
      <itunes:image href="https://media.rss.com/cyberinsanity/ep_cover_20240303_120346_9ce3e16a619f86e2d8db130af4336b84.png"/>
    </item>
    <item>
      <title><![CDATA[Episode 11- People, Process, and Technology (Part 2 of 3)]]></title>
      <itunes:title><![CDATA[Episode 11- People, Process, and Technology (Part 2 of 3)]]></itunes:title>
      <description><![CDATA[<p>In the second installment of our three-part series, "People, Process, and Technology," cybersecurity aficionados and hosts of the Cyber (in)Sanity Podcast, Andrew Berkuta and Angelo Long, channel the wisdom of Agatha Christie's Hercule Poirot, emphasizing the importance of method and order in evaluating company processes. As we continue our exploration, we shift our focus towards the intricate realm of processes within cybersecurity frameworks. It's imperative for companies to ensure clarity in their processes, particularly regarding their approach to cybersecurity.</p><p>Join us as we delve deeper into the backbone of organizational efficiency – processes. Keeping with Christie's famed detective, we'll uncover the clues hidden within company procedures, ensuring they align seamlessly with cybersecurity objectives.</p><p>Tune in as we navigate the labyrinth of processes, shedding light on their pivotal role in safeguarding digital assets against evolving cyber threats..</p><p>#CyberSecuritySeries #PeopleProcessTechnology #MethodAndOrder #CyberProcesses #CyberSecurityFramework #TechPodcast #CyberSecurityAwareness #DigitalSafety #CyberThreats #PodcastDiscussion #PodcastEpisode</p><p>For expert insights and consultation, reach out to the Goliath Cyber Security team:</p><p><a href="mailto:sales@goliathsec.com">sales@goliathsec.com</a></p><p>(239) 898-0429</p><p>For podcast inquiries:<a href="mailto:media@goliathsec.com">media@goliathsec.com</a></p>]]></description>
      <link>https://rss.com/podcasts/cyberinsanity/1356538</link>
      <enclosure url="https://content.rss.com/episodes/236842/1356538/cyberinsanity/2024_02_22_02_06_08_2055ec79-7e3d-41b9-905b-37056da75c5e.mp3" length="53939896" type="audio/mpeg"/>
      <guid isPermaLink="false">75a4c2df-5ced-4b4c-a15e-ff621668d9a5</guid>
      <itunes:duration>3090</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Thu, 22 Feb 2024 19:10:21 GMT</pubDate>
      <itunes:image href="https://media.rss.com/cyberinsanity/ep_cover_20240222_020235_7925617563732323d67463ddc0c22e3f.png"/>
    </item>
    <item>
      <title><![CDATA[Episode 10- People, Process, and Technology (Part 1 of 3)]]></title>
      <itunes:title><![CDATA[Episode 10- People, Process, and Technology (Part 1 of 3)]]></itunes:title>
      <description><![CDATA[<p>WELCOME to our three-part series, titled "People, Process, and Technology," cybersecurity experts and your Cyber (in)Sanity Podcast co-hosts, Andrew Berkuta and Angelo Long, embark on a journey into the intricate dynamics of  dealing with <strong>People, Process, and Technology</strong>. Join us as we unravel the crucial role individuals play in cybersecurity, dissecting their impact on organizational processes and technological safeguards. From human error to insider threats, we delve into the complexities of human behavior in safeguarding digital assets. Tune in for an enlightening discussion on navigating the human element within the cybersecurity landscape.</p><p>#CyberSecuritySeries #PeopleProcessTechnology #HumanElement #CyberRisk #TechPodcast #CyberSecurityAwareness #DigitalSafety #CyberThreats #PodcastDiscussion #PodcastEpisode</p><p>For expert insights and consultation, reach out to the Goliath Cyber Security team:</p><p><a href="mailto:sales@goliathsec.com">sales@goliathsec.com</a></p><p>(239) 898-0429</p><p>For podcast inquiries:<a href="mailto:media@goliathsec.com">media@goliathsec.com</a></p>]]></description>
      <link>https://rss.com/podcasts/cyberinsanity/1350389</link>
      <enclosure url="https://content.rss.com/episodes/236842/1350389/cyberinsanity/2024_02_18_01_07_05_7b7d9ffb-f532-45af-93c1-60bb5bfd7364.mp3" length="53939896" type="audio/mpeg"/>
      <guid isPermaLink="false">76be9c3c-a2d4-446f-93c5-9fad648fb42b</guid>
      <itunes:duration>3090</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Thu, 22 Feb 2024 01:50:29 GMT</pubDate>
      <itunes:image href="https://media.rss.com/cyberinsanity/ep_cover_20240218_010232_561961c345e498b8d3d7a70f9d1ce5f8.png"/>
    </item>
    <item>
      <title><![CDATA[Episode 9- Let's Talk Tokenization with Rixon Technologies with Guest Justin Hatcher]]></title>
      <itunes:title><![CDATA[Episode 9- Let's Talk Tokenization with Rixon Technologies with Guest Justin Hatcher]]></itunes:title>
      <description><![CDATA[<p>Welcome back to another episode by Goliath Cyber Security's podcast, Cyber (in)Sanity! </p><p>In this week's episode, hosts Andrew Berkuta and Angelo Longo engage in a riveting conversation with Justin Hatcher from Rixon Technologies, a pioneering partner of Goliath in the realm of cybersecurity. The spotlight is on data tokenization, a cutting-edge approach to safeguarding sensitive information. Join your favorite duo as they unravel the mysteries behind tokenization, delving into its mechanics and shedding light on its crucial role in the digital defense landscape.</p><p>Discover the intricacies of Rixon Technologies' collaboration with Goliath, as the discussion unfolds around the latest advancements in data protection. From the fundamentals of tokenization to its real-world applications, navigate the complexities of this cybersecurity strategy. Moreover, the episode explores the ethical dimensions emerging from the rise of tokenization providers, raising thought-provoking questions about the responsible use of technology.</p><p>Stay tuned for valuable insights, industry trends, and the convergence of cybersecurity and ethical considerations. Don't miss this episode that goes beyond the surface, providing a deep dive into the world of tokenization and its implications for the ever-evolving cyber landscape. Subscribe now for a dose of Cyber (in)Sanity!</p><p>To get a one-on-one with the Goliath Cyber Security team:</p><p><a href="mailto:sales@goliathsec.com">sales@goliathsec.com</a></p><p>(239)898-0429</p><p>#Cybersecurity #Rixon #Technologies #tokenization #CISO #PodcastTalks #SecurityInsights #TechPodcast #Top10Podcast #PodcastLife #InfoSecPodcast #CyberSecurityTalk #TechPodcast #DataProtection #PodcastersOfIG #CyberAware #DigitalDefense #PodcastCommunity #InfoSecInsights</p>]]></description>
      <link>https://rss.com/podcasts/cyberinsanity/1326918</link>
      <enclosure url="https://content.rss.com/episodes/236842/1326918/cyberinsanity/2024_02_01_04_42_43_a0c3f513-39b1-4f0b-a4f1-b078882fd0f7.mp3" length="52849064" type="audio/mpeg"/>
      <guid isPermaLink="false">3a0e97e5-ef87-4173-99fd-deb4376f5711</guid>
      <itunes:duration>2750</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Thu, 01 Feb 2024 04:43:32 GMT</pubDate>
      <itunes:image href="https://media.rss.com/cyberinsanity/ep_cover_20240201_040203_0c8c9bac14ffda687b83247c8d61ec5d.png"/>
    </item>
    <item>
      <title><![CDATA[Episode 8- What is Goliath Cyber Security? A Conversation with CEO and Founder Dave Ackley]]></title>
      <itunes:title><![CDATA[Episode 8- What is Goliath Cyber Security? A Conversation with CEO and Founder Dave Ackley]]></itunes:title>
      <description><![CDATA[<p>In this week’s episode for Cyber (In)Sanity, hosts Andrew Berkuta and Angelo Longo talk with Dave, the Founder and CEO of Goliath Cyber Security. The discussion revolves around the inception of Goliath and sheds light on the unique, holistic, and comprehensive approach the company has adopted in the cybersecurity industry.</p><p>Dave highlights that Goliath addresses a crucial gap in the market by offering a holistic cybersecurity solution. The company focuses on establishing robust relationships with the businesses they serve, setting it apart from others in the industry. Goliath emphasizes intentional partnerships, providing businesses with the assurance that they can excel without constant concerns about cyber threats. Seriously, you just gotta let Goliath take care of Cyber. It's what they do best!</p><p>To get a one-on-one with the Goliath Cyber Security team:</p><p><a href="mailto:sales@goliathsec.com">sales@goliathsec.com</a></p><p>(239)898-0429</p><p>#GoliathCyberSecurity #CyberSecurityTalk #PodcastDiscussion #GoliathCyber #DigitalSecurity #TechTalks #BusinessProtection #InfoSecInsights #HolisticSecurity #CyberInnovation #PodcastHighlights #spotifypodcasts #applepodcasts #toppodcast #youttubepodcasts</p>]]></description>
      <link>https://rss.com/podcasts/cyberinsanity/1313670</link>
      <enclosure url="https://content.rss.com/episodes/236842/1313670/cyberinsanity/2024_01_24_02_37_06_541a4f2f-88d4-4020-a845-ddf8db4200bd.mp3" length="44805163" type="audio/mpeg"/>
      <guid isPermaLink="false">05531b67-f778-498e-aba0-f9b35f33e9cf</guid>
      <itunes:duration>2631</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Thu, 25 Jan 2024 05:01:06 GMT</pubDate>
      <itunes:image href="https://media.rss.com/cyberinsanity/ep_cover_20240124_020135_8bd51062faa7c14be829fc147fcaac3a.jpg"/>
    </item>
    <item>
      <title><![CDATA[Episode 7 - A Conversation with Rebecca Rakoski, Cyber Attorney]]></title>
      <itunes:title><![CDATA[Episode 7 - A Conversation with Rebecca Rakoski, Cyber Attorney]]></itunes:title>
      <description><![CDATA[<p>In this episode of Cyber (in)Sanity, hosts Andrew Berkuta and Angelo Longo delve into the world of cybersecurity with special guest Rebecca Rakoski, a renowned cyber attorney and co-founder of XPAN Law Partners. The conversation revolves around best legal practices when collaborating with CISOs and companies, providing invaluable insights for navigating the cyber legal landscape. Tune in for -hypothetical- expert advice, strategic perspectives, and a deep dive into the intersection of law and cybersecurity. Stay informed and cyber-savvy with this compelling episode!</p><p>To get a one-on-one with the Goliath Cyber Security team:</p><p><a href="mailto:sales@goliathsec.com">sales@goliathsec.com</a></p><p>(239)898-0429</p><p>#Cybersecurity #LegalPerspective #CISO #InfoSec #XPANLawPartners #PodcastTalks #CyberLaw #SecurityInsights #TechPodcast #Top10Podcast</p>]]></description>
      <link>https://rss.com/podcasts/cyberinsanity/1296925</link>
      <enclosure url="https://content.rss.com/episodes/236842/1296925/cyberinsanity/2024_01_11_03_01_45_2997772c-a9ba-418a-87ba-5148a6b75afd.mp3" length="44688135" type="audio/mpeg"/>
      <guid isPermaLink="false">68f1d970-982e-45a7-8f66-857182b985b2</guid>
      <itunes:duration>2624</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>true</itunes:explicit>
      <pubDate>Thu, 11 Jan 2024 05:01:46 GMT</pubDate>
      <itunes:image href="https://media.rss.com/cyberinsanity/ep_cover_20240111_030118_36ff305707a123e22beae48d8d080cbf.jpg"/>
    </item>
    <item>
      <title><![CDATA[Episode 6- This is Not Like the Movies Series: AI (Artificial Intelligence)]]></title>
      <itunes:title><![CDATA[Episode 6- This is Not Like the Movies Series: AI (Artificial Intelligence)]]></itunes:title>
      <description><![CDATA[<p>In this podcast episode, cybersecurity experts Andrew Berkuta and Angelo Longo delve into the fascinating portrayal of AI in movies versus the reality we face. From sci-fi dreams to real-world considerations, we explore how AI differs from cinematic depictions. Uncover the cautionary aspects of AI implementation in our lives and the importance of ethical considerations. Join us for an eye-opening discussion on the intersection of fiction and reality in the AI realm.</p><p>#AIinMovies #RealityCheck #EthicalAI #CyberSecurity #TechPodcast #ArtificialIntelligence #TechTalk #FutureTech #AIReality #PodcastDiscussion #PodcastEpisode</p><p>#CyberSecurity #InfoSec #DataProtection #CyberAware #PrivacyMatters #SecureTech #DigitalSecurity #CyberThreats #OnlineSafety #InfoSecAwareness</p><p>To get a one-on-one with the Goliath Cyber Security team:</p><p><a href="mailto:sales@goliathsec.com">sales@goliathsec.com</a></p><p>(239)898-0429</p><p>To contact the podcast: <a href="mailto:media@goliathsec.com">media@goliathsec.com</a></p>]]></description>
      <link>https://rss.com/podcasts/cyberinsanity/1273314</link>
      <enclosure url="https://content.rss.com/episodes/236842/1273314/cyberinsanity/2023_12_20_23_40_11_40cc8ae1-6e84-4db8-9489-e5b9fb564f6b.mp3" length="55109529" type="audio/mpeg"/>
      <guid isPermaLink="false">ba7dd4eb-c54b-4f85-aad8-d31b009e2ba5</guid>
      <itunes:duration>3275</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Wed, 20 Dec 2023 23:40:47 GMT</pubDate>
      <itunes:image href="https://media.rss.com/cyberinsanity/ep_cover_20231220_111235_f456ba12ca90c765339c90708f13ddf6.jpg"/>
    </item>
    <item>
      <title><![CDATA[Episode 5- But I Didn't Know! ]]></title>
      <itunes:title><![CDATA[Episode 5- But I Didn't Know! ]]></itunes:title>
      <description><![CDATA[<p>In this podcast episode, cybersecurity experts Andrew Berkuta and Angelo Longo talk about the common excuses companies often use to avoid taking security seriously. They break down the real-world impacts of neglecting cybersecurity, including the classic excuse, "But I didn't know." Explore companies' typical vulnerabilities and learn how these excuses can harm businesses at all levels. Join the conversation for practical tips on strengthening your digital defenses and why having a cybersecurity-first mindset is crucial in today's connected business world. #Cybersecurity #DigitalSecurity #PodcastEpisode</p><p>To get a one-on-one with the Goliath Cyber Security team:</p><p><a href="mailto:sales@goliathsec.com">sales@goliathsec.com</a></p><p>(239)898-0429</p><p>To contact the podcast: <a href="mailto:media@goliathsec.com">media@goliathsec.com</a></p>]]></description>
      <link>https://rss.com/podcasts/cyberinsanity/1265700</link>
      <enclosure url="https://content.rss.com/episodes/236842/1265700/cyberinsanity/2023_12_14_13_55_53_128c523e-bc46-4a1f-a685-50baf14e11fa.mp3" length="35516439" type="audio/mpeg"/>
      <guid isPermaLink="false">f26f69dd-07f6-47b6-8a46-3cce83b4fa1d</guid>
      <itunes:duration>2051</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Thu, 14 Dec 2023 13:56:36 GMT</pubDate>
      <itunes:image href="https://media.rss.com/cyberinsanity/ep_cover_20231214_011232_2a75e20c9c07da6c31a4c4ed13234d5e.jpg"/>
    </item>
    <item>
      <title><![CDATA[Episode 4- A Conversation with Chuck Layton ]]></title>
      <itunes:title><![CDATA[Episode 4- A Conversation with Chuck Layton ]]></itunes:title>
      <description><![CDATA[<p>In this insightful episode of Cyber (in)Sanity, host Andrew Berkuta and co-host Angelo Longo are joined by Chuck Layton, a seasoned cybersecurity leader with a rich background, ranging from NASA to Alvin Community College. The discussion delves into Chuck's extensive experience as a leader within the cybersecurity realm, shedding light on the strategies that have defined his successful tenure.</p><p>Chuck reflects on the critical role of leadership in cybersecurity teams and shares key insights into the challenges and triumphs faced throughout his career. Listeners gain valuable perspectives on the importance of incorporating service-oriented principles at the core of leadership styles, a philosophy Chuck attributes to his sustained success in the industry.</p><p>The podcast explores Chuck's journey from high-profile positions, such as those at NASA, to his impactful role at Alvin Community College. Listeners are treated to a comprehensive overview of the significant projects and initiatives Chuck has spearheaded, providing a glimpse into the evolving landscape of cybersecurity.</p><p>As the conversation unfolds, Chuck discusses the intricacies of managing and leading a cybersecurity team, offering practical advice for aspiring leaders in the field. The episode emphasizes the lasting impact of service-centric leadership, making it clear why Chuck finds it challenging to relinquish his passion for the industry after many years of dedicated service.</p><p>Tune in for a journey that will undoubtedly have a lasting impact on your digital landscape!</p><p>To get a one-on-one with the Goliath Cyber Security team:</p><p><a href="mailto:sales@goliathsec.com">sales@goliathsec.com</a></p><p>(239)898-0429</p><p>To contact the podcast: <a href="mailto:media@goliathsec.com">media@goliathsec.com</a></p>]]></description>
      <link>https://rss.com/podcasts/cyberinsanity/1245190</link>
      <enclosure url="https://content.rss.com/episodes/236842/1245190/cyberinsanity/2023_11_29_22_35_45_879c8da5-35e1-45bd-ab14-1eebe3aa5d0f.mp3" length="47891374" type="audio/mpeg"/>
      <guid isPermaLink="false">072c8bbd-f575-45bb-9ba4-d4c68548a792</guid>
      <itunes:duration>2824</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Thu, 30 Nov 2023 05:00:28 GMT</pubDate>
      <itunes:image href="https://media.rss.com/cyberinsanity/ep_cover_20231129_101108_1d560821c05023aa79a570ab85f83cbc.jpg"/>
    </item>
    <item>
      <title><![CDATA[Episode 3- Data Categorization or Root Canal? Which is Worse?]]></title>
      <itunes:title><![CDATA[Episode 3- Data Categorization or Root Canal? Which is Worse?]]></itunes:title>
      <description><![CDATA[<p>To get a one-on-one with the Goliath Cyber Security team:</p><p><a href="mailto:sales@goliathsec.com">sales@goliathsec.com</a></p><p>(239)898-0429</p><p>To contact the podcast: <a href="mailto:media@goliathsec.com">media@goliathsec.com</a></p>]]></description>
      <link>https://rss.com/podcasts/cyberinsanity/1238475</link>
      <enclosure url="https://content.rss.com/episodes/236842/1238475/cyberinsanity/2023_11_24_17_53_38_77317e35-6370-4a73-a7d4-278a4b0e22af.mp3" length="25652288" type="audio/mpeg"/>
      <guid isPermaLink="false">17ddac46-8ddf-47f7-aff9-14727cdded10</guid>
      <itunes:duration>1603</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Fri, 24 Nov 2023 17:54:27 GMT</pubDate>
      <itunes:image href="https://media.rss.com/cyberinsanity/ep_cover_20231124_051131_9e2ed587044c8bd7b5542e2e49292a0f.jpg"/>
    </item>
    <item>
      <title><![CDATA[Episode 2- Black Friday Shopping Bliss, Security Miss]]></title>
      <itunes:title><![CDATA[Episode 2- Black Friday Shopping Bliss, Security Miss]]></itunes:title>
      <description><![CDATA[<p>On this episode of Cyber (in)Sanity, Andrew and Angelo give listeners tips for the holiday season to protect their information and their business and give consumers tips on how to protect their sensitive information and purchases best.</p><p>Poem by Andrew Berkuta below:</p><p>T’was the night before Black Friday, computers unpatched,</p><p>Hacker’s hands are all wringing, and schemes are all hatched.</p><p>Online merchants all ready to sell services and wares,</p><p>Unknowingly sighted in nefarious crosshairs.</p><p>Be mindful and careful, take protection in forethought,</p><p>Or unknowingly, quickly in snares you are caught.</p><p>With Goliath podcast, the Holiday mix,</p><p>Take warning and knowledge for your purchasing picks!</p><p>To get a one-on-one with the Goliath Cyber Security team:</p><p><a href="mailto:sales@goliathsec.com">sales@goliathsec.com</a></p><p>(239)898-0429</p><p>To contact the podcast:</p><p>media@goliathsec.com</p>]]></description>
      <link>https://rss.com/podcasts/cyberinsanity/1226026</link>
      <enclosure url="https://content.rss.com/episodes/236842/1226026/cyberinsanity/2023_11_16_20_22_15_411c552e-ad8e-4a17-b4bb-07e08f02ae11.mp3" length="45262515" type="audio/mpeg"/>
      <guid isPermaLink="false">97af5097-23ac-45cf-90ad-e80ded08a0f3</guid>
      <itunes:duration>2828</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Thu, 16 Nov 2023 21:06:57 GMT</pubDate>
      <itunes:image href="https://media.rss.com/cyberinsanity/ep_cover_20231116_081146_70f52564afbbd2ba4ad374ee2c216d1d.jpg"/>
    </item>
    <item>
      <title><![CDATA[Episode 1 - Security Journey: How Do I Start?]]></title>
      <itunes:title><![CDATA[Episode 1 - Security Journey: How Do I Start?]]></itunes:title>
      <description><![CDATA[<p>In this episode of Goliath's Cyber (in)Sanity podcast, co-hosts Andrew Berkuta and Angelo Longo introduce where to start in the cyber security journey and discuss how to prioritize the main things you and/or your company needs.</p><p>To get a one-on-one with the Goliath Cyber Security team:</p><p><a href="mailto:sales@goliathsec.com">sales@goliathsec.com</a></p><p>(239)898-0429</p><p>To contact the podcast:</p><p>media@goliathsec.com</p>]]></description>
      <link>https://rss.com/podcasts/cyberinsanity/1211848</link>
      <enclosure url="https://content.rss.com/episodes/236842/1211848/cyberinsanity/2023_11_09_17_30_19_a7df0011-16a5-4fe4-a49d-67f82d7dd75b.mp3" length="33515355" type="audio/mpeg"/>
      <guid isPermaLink="false">5f2d1955-2438-48fb-84c7-4dcccbd38c01</guid>
      <itunes:duration>2094</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Thu, 09 Nov 2023 17:54:31 GMT</pubDate>
      <itunes:image href="https://media.rss.com/cyberinsanity/ep_cover_20231109_051158_59a35dd23cd7a74e3d680e60b0bd6eee.jpg"/>
    </item>
  </channel>
</rss>