Podcasts about Computer security

The protection of computer systems from theft or damage

  • 196PODCASTS
  • 1,192EPISODES
  • 46mAVG DURATION
  • 1MONTHLY NEW EPISODE
  • Apr 10, 2025LATEST
Computer security

POPULARITY

20172018201920202021202220232024

Categories



Best podcasts about Computer security

Show all podcasts related to computer security

Latest podcast episodes about Computer security

The Course
Episode 144 - Fred Chong: "Never been a day I thought this was the wrong job."

The Course

Play Episode Listen Later Apr 10, 2025 27:24 Transcription Available


Professor Fred Chong is the Seymour Goodman Professor of Computer Architecture and is also a fellow of the Institute of Electrical and Electronics Engineers. In this episode of the Course, Professor Chong shares how he witnessed the evolution of computers and A.I., while finding a niche, quantum computing and computer architecture, for himself to dive into as a research pathway.  As a faculty member at the University of Chicago, he finds joy, meaning and impact in teaching and guiding students. Tune in to listen to Professor's career story.

CERIAS Security Seminar Podcast
Stanislav Kruglik, Querying Twice: How to Ensure We Obtain the Correct File in a Private Information Retrieval Protocol

CERIAS Security Seminar Podcast

Play Episode Listen Later Jan 15, 2025 43:47


Private Information Retrieval (PIR) is a cryptographic primitive that enables a client to retrieve a record from a database hosted by one or more untrusted servers without revealing which record was accessed. It has a wide range of applications, including private web search, private DNS, lightweight cryptocurrency clients, and more. While many existing PIR protocols assume that servers are honest but curious, we explore the scenario where dishonest servers provide incorrect answers to mislead clients into retrieving the wrong results.We begin by presenting a unified classification of protocols that address incorrect server behavior, focusing on the lowest level of resistance—verifiability—which allows the client to detect if the retrieved file is incorrect. Despite this relaxed security notion, verifiability is sufficient for several practical applications, such as private media browsing.Later on, we propose a unified framework for polynomial PIR protocols, encompassing various existing protocols that optimize download rate or total communication cost. We introduce a method to transform a polynomial PIR into a verifiable one without increasing the number of servers. This is achieved by doubling the queries and linking the responses using a secret parameter held by the client. About the speaker: Stanislav Kruglik has been a Research Fellow at the School of Physical and Mathematical Sciences, Nanyang Technological University, Singapore, since April 2022. He earned a Ph.D. in the theoretical foundations of computer science from the Moscow Institute of Physics and Technology, Russia, in February 2022. He is an IEEE Senior Member and a recipient of the Simons Foundation Scholarship. With over 40 scientific publications, his work has appeared in top-tier venues, including IEEE Transactions on Information Forensics and Security and the European Symposium on Research in Computer Security. His research interests focus on information theory and its applications, particularly in data storage and security.

Late Night Linux Extra
Linux Dev Time – Episode 114

Late Night Linux Extra

Play Episode Listen Later Dec 29, 2024 23:21


We explore the line between developer and sysadmin and come to the conclusion that despite the clear difference between the roles, there is a lot of crossover when it comes to skills and character traits.   The Six Dumbest Ideas in Computer Security       Support us on Patreon and get an ad-free RSS... Read More

Late Night Linux All Episodes
Linux Dev Time – Episode 114

Late Night Linux All Episodes

Play Episode Listen Later Dec 29, 2024 23:21


We explore the line between developer and sysadmin and come to the conclusion that despite the clear difference between the roles, there is a lot of crossover when it comes to skills and character traits.   The Six Dumbest Ideas in Computer Security       Support us on Patreon and get an ad-free RSS... Read More

Cybercrime Magazine Podcast
YTCracker: Hacking Like it's 1999. Computer Security is His First Love.

Cybercrime Magazine Podcast

Play Episode Listen Later Dec 16, 2024 2:14


Bryce Case Jr., otherwise known as YTCracker, is an American rapper from La Mirada, California, according to Wikipedia. His stage name derives from having formerly been a black hat hacker. Case is best known for his contributions to the hacking community along with nerdcore hip hop subculture. During his criminal career, he became known for defacing the webpages of several federal and municipal government websites in the United States, as well as several in the private industry at the age of 17. Case performs as an MC and a DJ under the name YTCracker and he runs an independent record label, Nerdy South Records. YTCracker tells Cybercrime Magazine that computer security is his first love. Learn more about YTCracker at https://en.wikipedia.org/wiki/YTCracker. Visit YTCracker's official website at https://ytcracker.com/v2020.

Morning Crew
Computer Security News You May Have Missed...

Morning Crew

Play Episode Listen Later Dec 13, 2024 9:25


While the tragic assassination of UnitedHealth CEO Andrew Witty gripped the nation, monumental advancements in the world of computer security and AI quietly unfolded. Jeff Carney with Dark Horse IT has more info on these developments:See omnystudio.com/listener for privacy information.

The BradCast w/ Brad Friedman
'BradCast' 11/25/2024 (Encore: Computer Security Experts Urge Harris to Seek Hand-Counts Due to Voting System Breaches, with Dr. Duncan Buell)

The BradCast w/ Brad Friedman

Play Episode Listen Later Nov 25, 2024 58:08


Neurocareers: How to be successful in STEM?
Brainwave Authentication & Neurotech Security with Violeta Tulceanu

Neurocareers: How to be successful in STEM?

Play Episode Listen Later Nov 22, 2024 86:09


What if your brainwaves could unlock doors, sign documents, and protect your most sensitive information without ever touching a keypad or fingerprint scanner? Welcome to a mind-bending episode of Neurocareers: Doing the Impossible! hosted by me, Milena Korostenskaja, a neurocareers coach and your guide into the world of neurotech! Today, I'm delighted to interview Violeta Tulceanu, a pioneering researcher from KU Leuven, Belgium, who stands at the forefront of brainwave authentication and neurotechnology security. In this episode, we dive deep into a world where your thoughts could become the next frontier in cybersecurity. But here's the kicker: what if your brain password revealed more than your identity? What if it exposed secrets about your emotions, health, or mental state? The stakes are incredibly high, and Violeta is here to unravel the fascinating—and complex—possibilities of using the human mind as a digital signature. Together, we'll discuss the career challenges she's encountered in this cutting-edge field, explore the ethical dilemmas of mind security, and tackle the technological hurdles of making brainwave authentication reliable and secure. Violeta will also share her insights into the evolving world of neuroethics and the philosophical questions that arise when we treat thoughts as credentials. Prepare to be amazed and maybe slightly unsettled as we journey into the thrilling—and sometimes unnerving—future of brain-computer interfaces and digital security. Tune in to Neurocareers: Doing the Impossible! Join us as we unlock the secrets of the mind with Violeta Tulceanu! This episode is a must-listen for anyone curious about the ever-evolving intersection of neuroscience, technology, and cybersecurity. About the Podcast Guest: Affiliation: Violeta Tulceanu is a doctoral researcher at KU Leuven, in the Computer Security and Industrial Cryptography (COSIC) department, working under the supervision of prof. Bart Preneel. KU Leuven, ESAT/COSIC, Kasteelpark Arenberg 10, bus 2452, B-3001 Leuven-Heverlee, Belgium. Violeta has a cryptography, neuroscience, AI background, and a dash of philosophy. Her research focuses on brainwave authentication, decoding and formally modeling thoughts, emotions, and cognitive processes, security of neurotechnologies and neurorights, pre-clinical diagnosis and monitoring of the collective mind, the applications of neurotechnologies in state security, the role of neurosemantics and neurotech in group 'war games,' creating dissent, rebellion and establishing or challenging the legitimacy of leadership. Also, she has an interest in brain-to-brain communications.  If you are interested in collaboration, I look forward to hearing from you! Contact information: vtulcean@esat.kuleuven.be Job opening for master student: https://www.ntxl.org/positions/microcontroller-expert---medtronic About the Podcast Host: The Neurocareers podcast is brought to you by The Institute of Neuroapproaches (https://www.neuroapproaches.org/) and its founder, Milena Korostenskaja, Ph.D. (Dr. K), a career coach for people in neuroscience and neurotechnologies. As a professional coach with a background in neurotech and Brain-Computer Interfaces, Dr. K understands the unique challenges and opportunities job applicants face in this field and can provide personalized coaching and support to help you succeed. Here's what you'll get with one-on-one coaching sessions from Dr. K: Identification and pursuit of career goals Guidance on job search strategies, resume, and cover letter development Neurotech / neuroscience job interview preparation and practice Networking strategies to connect with professionals in the field of neuroscience and neurotechnologies Ongoing support and guidance to help you stay on track and achieve your goals You can always schedule a free neurocareer consultation/coaching session with Dr. K at https://neuroapproaches.as.me/free-neurocareer-consultation Subscribe to our Nerocareers Newsletter to stay on top of all our cool neurocareers news at updates https://www.neuroapproaches.org/neurocareers-news © 2024 Neurocareers: Doing the Impossible! All rights reserved.  

The BradCast w/ Brad Friedman
'BradCast' 11/14/2024 (Computer Security Experts Urge Harris to Seek Hand-Counts Due to Voting System Breaches, with Guest Dr. Duncan Buell)

The BradCast w/ Brad Friedman

Play Episode Listen Later Nov 15, 2024 58:00


Behind the Investigation with Atlanta News First
FBI seeing increase in online personal information | Behind the Investigation

Behind the Investigation with Atlanta News First

Play Episode Listen Later Oct 31, 2024 7:55


FBI Atlanta is seeing a substantial increase in computer cookie thefts. Atlanta News First Investigates talks with Joe Zadik, FBI supervisory special agent, on how you can take more steps to protect your online personal information from thieves.

Michigan Minds
Validation and verification for elections

Michigan Minds

Play Episode Listen Later Oct 11, 2024 25:21


In this episode of the Michigan Minds podcast, J. Alex Halderman—Bredt Family Professor of Engineering and director of the Center for Computer Security and Society—discusses weak points in the U.S. electoral system and how to fix them, as well as the results of investigations following the 2020 election. Hosted on Acast. See acast.com/privacy for more information.

Sarah Westall - Business Game Changers
Massive Media Coverup for Years: The Truth about Walz – Its EXTREME w/ Rep. Hudson & Senator Lucero

Sarah Westall - Business Game Changers

Play Episode Listen Later Sep 7, 2024 42:04


Representative Walter Hudson and Senator Eric Lucero from Minnesota join the program to share their eye opening personal experience with Tim Walz. The media protected him with an ongoing operation that created a shield so the people did not know what really was going on. This conversation exposes the truth. You can follow Walter Hudson at https://www.hudsonformn.com/ or on TwitterX at @WalterHudson. You can follow Eric Lucero at https://www.ericlucero.com/ or on TwitterX at @EricLuceroMN Links mentioned in the show: Nano Soma: Try the Amazing Nano Soma line of products and receive a 10% discount at https://iwantmyhealthback.com/sarah MasterPeace: Remove Heavy Metals including Graphene Oxide and Plastics at https://masterpeacebyhcs.com/my-account/uap/?ref=11308 Miles Franklin: Learn more how you can convert your IRA or buy precious metals by emailing info@MilesFranklin.com - tell them ‘Sarah sent me” and get the best service and prices in the country. Consider subscribing: Follow on TwitterX @Sarah_Westall Follow on my Substack at SarahWestall.Substack.com See Important Proven Solutions to Keep Your from getting sick even if you had the mRNA Shot - Dr. Nieusma MUSIC CREDITS: “In Epic World” by Valentina Gribanova, licensed for broad internet media use, including video and audio     See on Bastyon | Bitchute | Brighteon | Clouthub | Odysee | Rumble | Youtube | Tube.Freedom.Buzz   Biography Senator Eric Lucero Eric Lucero presently serves in the Minnesota Legislature as a member of the State House of Representatives. Eric was first elected in 2014 serving the eastern Wright County cities of Albertville, Hanover, Otsego, St. Michael, and the Wright County portion of Dayton. Eric's professional background includes over 20 years in the information technology and cyber security fields. He owns a consulting firm assisting organizations of all sizes with information security projects. Eric is also a former seven-year college instructor having taught Computer Security, Computer Forensics, Voice & Data Communications, and other courses. ​Eric cares about people and has spent his entire adult life working hard to give back. ​Eric's academic background includes an MBA from the Carlson School of Management at the University of Minnesota, Bachelor of Applied Science in Computer Forensics and Bachelor of Science in Law Enforcement with Minors in Mathematics and Psychology all from Metropolitan State University, and a Computer Networking Design and Development Degree from NEI College of Technology.   Biography Representative Walter Hudson Prior to being elected to his first term as your state representative, Walter served the residents of Albertville, Minnesota on their city council for seven years. He lives with his wife Carrie and two sons. Walter advocates for justice and public policy as a media commentator. He formerly hosted 'Closing Argument with Walter Hudson' on Twin Cities News Talk AM 1130, contributed extensively to PJ Media, and served as an associate editor with the David Horowitz Freedom Center. From his own words: My father wasn't like those around him. He grew up in Detroit in a neighborhood which imposed limits. He was told he would never amount to anything. Any aspiration was mocked. Any goal undermined. But my dad persevered. He believed that he could create a better life for himself and his family if he cut against the grain, worked harder, went to school, took risks, and made moves. For a couple years of my early childhood, I never saw him, because he worked overnight, slept during the day, and attended trade school in the afternoon. His effort eventually paid off. He moved up from airline stock clerk to commercial airplane mechanic, working for what was then Northwest Airlines and would become Delta. When his moment came, he jumped at the opportunity to move us from Detroit to the airline's h...

BSD Now
574: Hypervisor Determination

BSD Now

Play Episode Listen Later Aug 29, 2024 60:38


Antithesis: Pioneering Deterministic Hypervisors with FreeBSD and Bhyve, Our slowly growing Unix monoculture, The six dumbest ideas in computer security (2005), Video Edition notes on OpenBSD, Full-featured email server running OpenBSD, ever heard of teaching a case study of Initial Unix?, and more NOTES This episode of BSDNow is brought to you by Tarsnap (https://www.tarsnap.com/bsdnow) and the BSDNow Patreon (https://www.patreon.com/bsdnow) Headlines Antithesis: Pioneering Deterministic Hypervisors with FreeBSD and Bhyve (https://freebsdfoundation.org/antithesis-pioneering-deterministic-hypervisors-with-freebsd-and-bhyve/) Our slowly growing Unix monoculture (https://utcc.utoronto.ca/~cks/space/blog/sysadmin/OurGrowingUnixMonoculture) News Roundup The six dumbest ideas in computer security (2005) (http://ranum.com/security/computer_security/editorials/dumb/index.html) + HN Thread (https://news.ycombinator.com/item?id=34513806) Video Edition notes on OpenBSD (https://www.tumfatig.net/2024/video-edition-notes-on-openbsd/) Full-featured email server running OpenBSD (https://dataswamp.org/~solene/2024-07-24-openbsd-email-server-setup.html) Anyone ever heard of teaching a case study of Initial Unix? (https://www.tuhs.org/pipermail/tuhs/2024-July/030407.html) Tarsnap This weeks episode of BSDNow was sponsored by our friends at Tarsnap, the only secure online backup you can trust your data to. Even paranoids need backups. Feedback/Questions 574 - extrowerk - dumb ideas in computer security (https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/574/feedback/extrowerk%20-%20dumb%20ideas%20in%20computer%20security.md) 574 - Ep 569: on deprecation and support (https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/574/feedback/Ep%20569%3A%20on%20deprecation%20and%20support) Send questions, comments, show ideas/topics, or stories you want mentioned on the show to feedback@bsdnow.tv (mailto:feedback@bsdnow.tv) Join us and other BSD Fans in our BSD Now Telegram channel (https://t.me/bsdnow)

BSD Now
572: Where's my backup?

BSD Now

Play Episode Listen Later Aug 15, 2024 60:14


OpenBSD Workstation for the People, Bridging Networks Across VPS With Wireguard and VXLAN on FreeBSD, Updating FreeBSD the Manual Way, Part of (computer) security is convincing people that it works, Where's my backup?, Vi and Vim: A Brief Overview, and more NOTES This episode of BSDNow is brought to you by Tarsnap (https://www.tarsnap.com/bsdnow) and the BSDNow Patreon (https://www.patreon.com/bsdnow) Headlines OpenBSD Workstation for the People (https://www.tumfatig.net/2024/openbsd-workstation-for-the-people/) Bridging Networks Across VPS With Wireguard and VXLAN on FreeBSD (https://it-notes.dragas.net/2024/07/15/bridging-networks-across-vps-wireguard-vxlan-freebsd/?utm_source=bsdweekly) News Roundup Updating FreeBSD the Manual Way (https://blog.feld.me/posts/2024/07/updating-freebsd-the-manual-way/) Part of (computer) security is convincing people that it works (https://utcc.utoronto.ca/~cks/space/blog/tech/SecurityNeedsToConvince) Where's my backup? (https://dan.langille.org/2024/07/16/wheres-my-backup/) Vi and Vim: A Brief Overview (https://machaddr.substack.com/p/vi-and-vim-a-brief-overview) Hello FreeBSD (https://garrido.io/posts/2024/07/21/hello-freebsd/) Beastie Bits DeadBSD #5 EnigmOS (https://www.youtube.com/watch?v=bPkX5UypCAQ) THE WORKSTATION YOU WANTED IN 1990, IN YOUR POCKET (https://hackaday.com/2024/07/03/the-workstation-you-wanted-in-1990-in-your-pocket/) Tarsnap This weeks episode of BSDNow was sponsored by our friends at Tarsnap, the only secure online backup you can trust your data to. Even paranoids need backups. Feedback/Questions Johnny - Nyxt (https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/572/feedback/Johnny%20-%20Nyxt.md) Send questions, comments, show ideas/topics, or stories you want mentioned on the show to feedback@bsdnow.tv (mailto:feedback@bsdnow.tv) Join us and other BSD Fans in our BSD Now Telegram channel (https://t.me/bsdnow)

The Changelog
The six dumbest ideas in computer security (News)

The Changelog

Play Episode Listen Later Jul 15, 2024 8:14


Marcus J. Ranum's 2005 post on dumb ideas in computer security still holds up, Barry Jones argues why story points are useless, Posting is an HTTP client as a TUI, Varnish ceator Poul-Henning Kamp (phk) reflects on ten years of working on the HTTP cache & es-tookit is a major upgrade to Lodash.

Changelog News
The six dumbest ideas in computer security

Changelog News

Play Episode Listen Later Jul 15, 2024 8:14


Marcus J. Ranum's 2005 post on dumb ideas in computer security still holds up, Barry Jones argues why story points are useless, Posting is an HTTP client as a TUI, Varnish ceator Poul-Henning Kamp (phk) reflects on ten years of working on the HTTP cache & es-tookit is a major upgrade to Lodash.

Changelog Master Feed
The six dumbest ideas in computer security (Changelog News #103)

Changelog Master Feed

Play Episode Listen Later Jul 15, 2024 8:14


Marcus J. Ranum's 2005 post on dumb ideas in computer security still holds up, Barry Jones argues why story points are useless, Posting is an HTTP client as a TUI, Varnish ceator Poul-Henning Kamp (phk) reflects on ten years of working on the HTTP cache & es-tookit is a major upgrade to Lodash.

Software Engineering Institute (SEI) Podcast Series
Developing a Global Network of Computer Security Incident Response Teams (CSIRTs)

Software Engineering Institute (SEI) Podcast Series

Play Episode Listen Later Jun 21, 2024 30:51


Cybersecurity risks aren't just a national concern. In this podcast from the Carnegie Mellon University Software Engineering Institute (SEI), the CERT division's Tracy Bills, senior cybersecurity operations researcher and team lead, and James Lord, security operations technical manager, discuss the SEI's work developing Computer Security Incident Response Teams (CSIRTs) across the globe.

CBC Newfoundland Morning
Curing annoying hacks: A computer security and privacy expert tells us how safe the province's new online health records system is

CBC Newfoundland Morning

Play Episode Listen Later Jun 20, 2024 8:47


Earlier this week on Newfoundland Morning, we heard from NL Health Services about a new online portal for accessing your own health records. It's an addition to the My Gov NL online service, where you can also renew your driver's license and vehicle registration. We asked an expert how safe our information will be when it's stored there. Jonathan Anderson is an associate professor in the Department of Electrical and Computer Engineering at Memorial University in St. John's. He spoke with the CBC's Elizabeth Whitten.

The Nonlinear Library
AF - Access to powerful AI might make computer security radically easier by Buck Shlegeris

The Nonlinear Library

Play Episode Listen Later Jun 8, 2024 9:21


Welcome to The Nonlinear Library, where we use Text-to-Speech software to convert the best writing from the Rationalist and EA communities into audio. This is: Access to powerful AI might make computer security radically easier, published by Buck Shlegeris on June 8, 2024 on The AI Alignment Forum. People talk about model weight security being really hard and crucial around the advent of AGI. (E.g. RAND report, Leopold; see here for some distinctions in these thread models that I think are important.) But I think that the thinking on this has not been sufficiently attentive to the fact that during that crucial time period, by assumption we'll have access to powerful AIs. I think that such access might make security wildly easier, by a bunch of different mechanisms, some of which I'll describe in this post. The story I'm telling here is pretty different from the main story I've heard people talk about in the past about AIs helping with computer security, which is that AIs can help with hardening software and other infrastructure. Though I agree that that seems really useful and important, here I'm not talking about AIs automating the process of security research, I'm talking about AI making it affordable to adopt policies that improve security in the organization but that wouldn't work (because they'd be too labor-intensive or lead to who-guards-the-guards problems) if you just had humans. In this post I'm going to be ignoring problems related to AIs themselves trying to cause security failures. There are two ways that such AIs affect this situation: The techniques I describe in this post could also be used, AI-control style, to use trusted models to reduce the risk of security failures caused by untrusted models. You can basically just replace "humans" by "untrusted models" everywhere in the text below. When applying these techniques to reduce risk from humans, you have to worry that these techniques will be sabotaged by scheming models. I'll ignore that possibility in this post, and talk about ways that you can improve security using AIs that are assumed not to be intentionally trying to subvert these security measures (which we call " trusted"). If you're worried about your models scheming, you'll have to do some other stuff too (mostly various sting operations), but I think the arguments in this post still mostly hold up. I'll talk about this more in future. I'm going to focus on insider threats here; most threats from outside humans involve first gaining access to impersonation of some insider. Much of this post came out of thinking about the question "how could AI control techniques be applied to humans, instead of AIs"? I don't think these arguments are an airtight case for "SL5 security will be trivial". But they do seem like a plausible hypothesis under which infosec will end up being quite simple to resolve, if labs decide it's an important priority. Four strategies for using powerful AI to improve security Monitoring As your humans take actions, you configure your system to have an AI that looks at these actions and then flags them for further review if they seem suspicious. If the actions seem potentially catastrophic, then the AI might even flag them before they can run. Concretely, I'm imagining that instead of being allowed to directly run any command you write in the bash console of the computer you're working on, whenever you write a command, it and the surrounding context are shown to an AI, which is charged with deciding how suspicious the action is. If it is very suspicious, the AI blocks the command and sends an alert to someone else at the company who is supposed to look it over. If the action is just somewhat suspicious, then it flags it for further review but does not block the action or alert the user. This is somewhat similar to using multi-party authorization. But with abundant AI labor, we could be more comprehensive, with fewer false positives and fewer false negatives, and evaluating a much grea...

2024
Novità ChatGPT e Google – Chat Control – Pehi

2024

Play Episode Listen Later May 17, 2024


Settimana ricca di novità. Con Roberto Pezzali, esperto di tecnologia della redazione di Dday.it parliamo di quelle presentate al Google I/O e di come l’azienda sta affrontando l’era dell’Intelligenza artificiale (o come è stata definita la Gemini era). Poi le novità di OpenAI: ChatGPT 4o “migliora l’interazione, ha una minore latenza, e questa è una grossa differenza a livello di esperienza utente” spiega Enrico Bertino, Chief Technology Officer di Indigo.ai. Con Stefano Zanero, professore di Computer Security e Digital Forensics and Cybercrime del Politecnico di Milano, parliamo di Chat Control, un progetto della Commissione europea che vorrebbe imporre alle piattaforme di messaggistica un controllo preventivo su tutte le comunicazioni private dei cittadini per rintracciare l’eventuale presenza di materiale pedopornografico. Ma il sistema potrebbe creare più problemi che vantaggi sostengono oltre 300, tra docenti, esperti e ricercatori, che hanno scritto alla Commissione.In occasione di Venditalia, l’esposizione della Distribuzione Automatica, è stata presentata Pehi, una soluzione che permette di pagare avvisi PagoPA direttamente dalla macchinetta. Sono già 70 mila quelle abilitate su 830 mila vending machine operative sul territorio nazionale (primo Paese in Europa e secondo al mondo dopo il Giappone). Enrico Pagliarini ne ha parlato con Massimo Trapletti, Presidente di Confida (Associazione Italiana Distribuzione Automatica); Corrado Passera, amministratore delegato di Banca Illimity e Maurizio Fatarella, Direttore generale di Pago PA.Infine, una ricerca del Politecnico di Milano, scelto da Meta per analizzare il peso economico e il valore sociale delle tecnologie immersive. Luca Salvioli del Sole24ORE ne ha parlato con Giuliano Noci, docente di Strategia e Marketing al Politecnico e direttore scientifico dello studio.E come sempre in Digital News le notizie di innovazione e tecnologia più importanti della settimana.

The Treasury Update Podcast
Coffee Break Session #110: What Is a Botnet?

The Treasury Update Podcast

Play Episode Listen Later May 16, 2024 7:27


In today's podcast, we'll hear from Christin Cifaldi, Director of Product Development & Analytics, on the topic of botnets in cyber security. What is a botnet, and what role does it play in the security landscape? Listen in to learn more.

Fraternity Foodie Podcast by Greek University
Joel Dubin: How can college students evaluate potential employers to avoid dysfunctional companies?

Fraternity Foodie Podcast by Greek University

Play Episode Listen Later Mar 30, 2024 32:31


Joel Dubin is a retired cybersecurity consultant turned humor author and foreign languages enthusiast. "The 7 Habits of Highly Dysfunctional Companies" was inspired by stupidity he observed at companies who sabotage not only their security but their business, as well. The 7 Habits are the most common problems he saw at screwed up companies around the world. This isn't a typical business book. It's a humor book poking fun at office politics, bureaucracy and toxic work environments, all ingredients of successful dysfunctional companies. It's sort of an anti-manual of how not to run a business. Joel is the author of both editions of The Little Black Book of Computer Security and has an MBA from the Kellogg School of Management at Northwestern University and a master's degree in journalism from Columbia University. In episode 438 of the Fraternity Foodie Podcast, we find out why Joel chose Northwestern University for his undergraduate and MBA, why he decided to write the book, "The 7 Habits of Highly Dysfunctional Companies", how college students can evaluate potential employers to avoid dysfunctional companies, why so many companies are bad at customer service, how we can make companies more efficient, how we can eliminate unnecessary meetings that could have been emails, how companies can retain their best employees, and what Joel's thoughts are on remote employees. Enjoy!

Culture and Leadership Connections  Podcast
Liz Jaluague – The Amazing Power of Mentorship and Gratitude

Culture and Leadership Connections Podcast

Play Episode Listen Later Feb 14, 2024 27:40


Every person needs a mentor for personal and career growth.Bio:Liz Jaluague is a Toronto-based cybersecurity engineer and Canadian Army reservist. She earned a BSc in Biochemistry and a postgraduate certificate in Computer Security and Digital Forensics, and has been a non-profit leader in seven different organizations since the age of 19, currently volunteering with a NFP cybersecurity organization. She believes in the power of mentorship from her own experiences, Liz consistently commits her time to guiding others along their professional paths. Links:LinkedIn: https://www.linkedin.com/in/existentializm/ Quotes:“When you're constantly learning different skills, you kind of remember that everybody is a different level, and it's a humbling experience.”Episode Highlights:On today's episode, we delve into the captivating story of Liz Jaluague. From navigating cultural experiences to challenging conventional career paths, Liz shares her journey of resilience, determination, and growth. She shares insights into the ethical implications of cybersecurity, the power of mentorship, and the impact of cultural influences on leadership. Childhood Memories:Liz grew up in a Filipino family in Toronto. She had a great understanding of both English and Tagalog. In Tagalog, there are suffixes that one uses when addressing people older than them to show respect. At some point, Liz started questioning why she wasn't accorded the same respect as a young person. She dropped the suffixes, and it caused her issues with her parents. A year or two down the line, her parents came to term with it. Later in her own life, she came to value the respect accorded to elders and now sees both sides of the issue.Cultural Influences:Growing up, Liz had a desire to learn new things and really valued the learning culture. She was able to grasp a lot of new things but learned later on that she couldn't ace everything and became more selective with her learning and more humble in her approach to others.Liz's parents had her much later in life which gave her an opportunity to learn from her older cousins.Influential Groups:After university, Liz volunteered in several NFP organizations, currently with a cybersecurity non-profit. Looking back at her leadership journey with the NFPs, Liz realized that the people she most admired had a sense of purpose, and in every job, she connected with the mission and vision of the organization. Liz vividly remembers a time when she was in Las Vegas for a conference and she recognized one of the sponsors. She walked up to him and thanked him for giving her the opportunity to make friends working in that organization. The simple act of gratitude gave Liz a mentor.Personality and Temperaments:Liz describes herself as a pessimistic optimist. By nature, she looked at things glass half empty since her family didn't have a lot of material means. On the flip side, Liz learned to adapt and understand that things always work out in the end.Cultural Epiphanies:In Belgium and the Netherlands, Liz began to consider cultural differences through the experience of a glass of water in restaurants and different types of door locks in AirBNBs. What brings out the best in Liz?:Liz loves working with people who are authentically themselves. She is not a fan of hierarchy. Soapbox Moment:Do you have a question on cybersecurity? Liz invites you to send her a message on LinkedIn, and she will be more than willing to answer the question.Support the show

Command+Shift+Left
E14: Super Developers & Natures Nuances

Command+Shift+Left

Play Episode Listen Later Jan 11, 2024 48:18


In this episode, we explore the intersection of individual ingenuity and nature-inspired technology. We discuss the solo development of the 1999 hit RollerCoaster Tycoon in Assembly language, delve into the quirky origins and comparisons of K3s and K8s in tech, and examine the early days of computer security with the first password hacks. Lastly, we look at how biomimicry has influenced technological advancements, showcasing the seamless blend of nature's designs with modern innovation.Stay updated with new weekly episodes every Thursday – and don't forget to subscribe! For more behind-the-scenes content, follow us @justshiftleft on Facebook, Instagram, Twitter, and LinkedIn.

The Nonlinear Library
LW - Biosecurity Culture, Computer Security Culture by jefftk

The Nonlinear Library

Play Episode Listen Later Aug 30, 2023 4:00


Welcome to The Nonlinear Library, where we use Text-to-Speech software to convert the best writing from the Rationalist and EA communities into audio. This is: Biosecurity Culture, Computer Security Culture, published by jefftk on August 30, 2023 on LessWrong. While I've only worked in biosecurity for about a year and my computer security background consists of things I picked up while working on other aspects of software engineering, the cultures seem incredibly different. Some examples of good computer security culture that would be bad biosecurity culture: Openness and full disclosure. Write blog posts with deep detail on how vulnerabilities were found, with the goal of teaching others how to find similar ones in the future. Keep details quiet for a few months if need be to give vendors time to fix but after, say, 90 days go public. Breaking things to fix them. Given a new system, of course you should try to compromise it. If you succeed manually, make a demo that cracks it in milliseconds. Make (and publish!) fuzzers and other automated vulnerability search tools. Enthusiastic curiosity and exploration. Noticing hints of vulnerabilities and digging into them to figure out how deep they go is great. If someone says "you don't need to know that" ignore them and try to figure it out for yourself. This is not how computer security has always been, or how it is everywhere, and people in the field are often fiercely protective of these ideals against vendors that try to hide flaws or silence researchers. And overall my impression is that this culture has been tremendously positive in computer security. Which means that if you come into the effective altruism corner of biosecurity with a computer security background and see all of these discussions of "information hazards", people discouraging trying to find vulnerabilities, and people staying quiet about dangerous things they've discovered it's going to feel very strange, and potentially rotten. So here's a framing that might help see things from this biosecurity perspective. Imagine that the Morris worm never happened, nor Blaster, nor Samy. A few people independently discovered SQL injection but kept it to themselves. Computer security never developed as a field, even as more and more around us became automated. We have driverless cars, robosurgeons, and simple automated agents acting for us, all with the security of original Sendmail. And it's all been around long enough that the original authors have moved on and no one remembers how any of it works. Someone who put in some serious effort could cause immense distruction, but this doesn't happen because the people who have the expertise to cause havoc have better things to do. Introducing modern computer security culture into this hypothetical world would not go well! Most of the cultural differences trace back to what happens once a vulnerability is known. With computers: The companies responsible for software and hardware are in a position to fix their systems, and disclosure has helped build a norm that they should do this promptly. People who are writing software can make changes to their approach to avoid creating similar vulnerabilities in the future. End users have a wide range of effective and reasonably cheap options for mitigation once the vulnerability is known. But with biology there is no vendor, a specific fix can take years, a fully general fix may not be possible, and mitigation could be incredibly expensive. The culture each field needs is downstream from these key differences. Overall this is sad: we could move faster if we could all just talk about what we're most concerned about, plus cause prioritization would be simpler. I wish we were in a world where we could apply the norms from computer security! But different constraints lead to different solutions, and the level of caution I see in biorisk seems about right given these constraints. (Note that when I talk about "good biosecurity culture" I'm desc...

@BEERISAC: CPS/ICS Security Podcast Playlist
Nuclear Explained – Computer Security in the Nuclear World

@BEERISAC: CPS/ICS Security Podcast Playlist

Play Episode Listen Later Jul 16, 2023 22:41


Podcast: Nuclear Explained (LS 28 · TOP 10% what is this?)Episode: Nuclear Explained – Computer Security in the Nuclear WorldPub date: 2023-07-11Digital technologies support operations and automation at facilities handling nuclear material or other radioactive material, potentially leading to increased operational efficiency, reduced labour costs, and better safety and security. However, digital innovations may also pose threats and risks, underscoring the need for robust computer security within a nuclear security regime. What does information and computer security look like in the nuclear world? What are the latest trends within the computer security community? How often do cyberattacks occur?The podcast and artwork embedded on this page are from International Atomic Energy Agency, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.

Nuclear Explained
Nuclear Explained – Computer Security in the Nuclear World

Nuclear Explained

Play Episode Listen Later Jul 11, 2023


Digital technologies support operations and automation at facilities handling nuclear material or other radioactive material, potentially leading to increased operational efficiency, reduced labour costs, and better safety and security. However, digital innovations may also pose threats and risks, underscoring the need for robust computer security within a nuclear security regime. What does information and computer security look like in the nuclear world? What are the latest trends within the computer security community? How often do cyberattacks occur?

ITSPmagazine | Technology. Cybersecurity. Society
Securing Bridges | A Live Stream Podcast With Alyssa Miller | Guest: Kevin Johnson | Episode 43

ITSPmagazine | Technology. Cybersecurity. Society

Play Episode Listen Later Jun 26, 2023 47:31


ITSPmagazine | Technology. Cybersecurity. Society
A Conversation with Adam Shostack @done_With_That | Securing Bridges Podcast With Alyssa Miller | Episode 40

ITSPmagazine | Technology. Cybersecurity. Society

Play Episode Listen Later May 12, 2023 45:12


ITSPmagazine | Technology. Cybersecurity. Society
A Conversation with Chris Roberts @sidragon1 | Securing Bridges Podcast With Alyssa Miller | Episode 38

ITSPmagazine | Technology. Cybersecurity. Society

Play Episode Listen Later Apr 21, 2023 48:48


The Future of Security Operations
Material Security's Ryan Noon: Building & marketing a differentiated cybersecurity solution without spreading FUD

The Future of Security Operations

Play Episode Listen Later Mar 28, 2023 35:43


In this episode of Future of Security Operations, Thomas speaks with Ryan Noon, Founder and CEO of Material Security, a company that protects the email of high-risk VIPs and top global organizations. A serial entrepreneur and an expert on cloud security, Ryan previously ran infrastructure teams at Dropbox after it acquired his last company, Parastructure. Before that, he helped build a company spun out of Stanford by the Department of Defense. A graduate of Stanford, Ryan holds degrees in Computer Science and Computer Security. Topics include: Ryan's first startup experience and the decision to launch his first company, Parastructure Getting acquired by Dropbox and what he enjoyed most about working there Ryan's journey from a hobbyist to a thought leader and founder in cybersecurity, taking a critical eye towards every system, and why Ryan sees himself as “a builder, a creator, and an optimist than a true security engineer” How the Russian government's interference in the 2016 U.S. presidential election impacted his perspective on cybersecurity and helped him realize the power of APIs Why email is such an excellent target for cyber attackers and how Material Security secures data within inboxes What founders should focus on in the first year, the importance of product management, and how Material secured its early adopters, including customers like Stripe, Databricks, and Lift, so quickly How to help your product to stand out, and why he believes it's important to avoid FUD tactics in cybersecurity What Ryan has learned from working with the world's leading security teams and how the best teams bridge gaps to win Ryan's thoughts on the uncertain global economic climate, its impacts, and how Material's conservative approach has allowed them to maintain a relatively lean team The future of security operations and what trends Ryan believes will continue - doing more with less and leveraging better infrastructure and tools that enable you to go deeper with your existing tech stack Resources: LinkedIn

Interviews: Tech and Business
AI and Cybersecurity: A CTO Perspective

Interviews: Tech and Business

Play Episode Listen Later Mar 20, 2023 45:35


#cybersecurity #aiCXOTalk host Michael Krigsman interviews Michal Pechoucek, CTO of Gen and AI researcher, on the impact of AI on cybersecurity.In this insightful discussion, the two participants explore the evolving relationship between AI and cybersecurity. The conversation covers a range of topics, from AI and machine learning (ML) tools in cyber defense and penetration testing to A/B testing in cyber attacks. The conversation also covers the challenges of AI and cybersecurity research and the maturity of AI-powered tools in the field. The conversation culminates in valuable advice for Chief Information Security Officers (CISOs) and Chief Information Officers (CIOs), as well as thoughts on the future of AI in cybersecurity, including the potential for cognitive attacks and the spread of misinformation.The conversation includes these topics:► Early applications of AI and deep learning in cybersecurity► Consumer cybersecurity and AI-enabled defenses► Evolving cybersecurity threats and cognitive attacks► AI and deep learning: Defending against automated attacks► Signature-based AI and deep learning to scale malware detection► The challenge of building AI for diverse cybersecurity threats► Importance of AI explainability in cybersecurity► AI-enabled cognitive attacks, identity theft, and the future of cybersecurity► AI to detect phishing attacks: Large language models and classification► Importance of AI in Cybersecurity for Boards of Directors► Bridging the gap between cybersecurity experts and boards► Personal data protection: Tips for better cybersecurity hygiene► Algorithm manipulation and privacy concerns; Algorithm manipulation and privacy► AI and ML tools in cyber defense and penetration testing► A/B testing in cyber attacks► AI recommendations on data collection► Challenges in AI and cybersecurity research► Advice for Chief Information Security Officers (CISO) and Chief Information Officers (CIO)► Future of AI in cybersecurity: cognitive attacks and misinformationJoin our community: https://www.cxotalk.com/subscribeRead the complete transcript: https://www.cxotalk.com/episode/ai-cybersecurity-cto-perspectiveMichal Pechoucek leads the core technology, innovation and R&D teams driving security engines as well as Gen's technology vision for human centered digital safety and beyond. He is also responsible for the company's scientific research in the fields of Artificial Intelligence, machine learning, and cybersecurity. He previously served as CTO of Avast.Before joining Avast, Mr. Pechoucek spent over twenty years as a professor at the Czech Technical University (CTU) in Prague, during which he founded the Artificial Intelligence Center in 2001. Mr. Pechoucek has authored more than 400 high impact publications and contributed numerous innovative AI applications to research in computer science.While pursuing his academic career, Mr. Pechoucek co-founded several technology start-ups including cybersecurity firm Cognitive Security (acquired by CISCO in 2013), AgentFly Technologies, which specializes in controlling autonomous aircraft traffic, and Blindspot Solutions, which develops AI for industrial applications (acquired by Adastra Group in 2017). He directed the R&D Center for AI and Computer Security at CISCO Systems and worked as a strategist in the CISCO Security CTO office. He is also a venture partner with Evolution Equity Partners, a VC firm specialized in cybersecurity. Michal Pechoucek co-founded the prg.ai initiative aiming to transform Prague into a world-class AI super hub. He sits on the board of several AI startups and as an early investor supports Czech AI ecosystem.Michal graduated from University of Edinburgh and gained his PhD in Artificial Intelligence at CTU in Prague. He also worked as a visiting professor at the University of Southern California, University of Edinburgh, State University of New York at Binghamton and University of Calgary.He sits on the boards of several education oriented non-for-profits, is a long-time sponsor of People in Need Foundation and Memory of Nation and sits on the board of Denik N, Czech daily newspaper.

ITSPmagazine | Technology. Cybersecurity. Society
Conversation With Jess Vachon @infosec_jess | Securing Bridges Podcast With Alyssa Miller | Episode 37

ITSPmagazine | Technology. Cybersecurity. Society

Play Episode Listen Later Mar 10, 2023 44:16


Guest: Jess Vachon, Chief Information Security Officer, Context Labs BV [@contextlabsbv]On Mastodon | https://infosec.exchange/@infosec_jessOn Twitter | https://twitter.com/infosec_jessOn LinkedIn | https://www.linkedin.com/in/jessvachon1/________________________________Host: Alyssa MillerOn ITSPmagazine  

Federal Contracting Made Easy's podcast
How To HIDE RECENT Apps in macOS Ventura

Federal Contracting Made Easy's podcast

Play Episode Listen Later Feb 22, 2023 2:29


In this podcast, we will discuss how to hide recent apps in macOS Ventura, the latest version of the operating system. If you're someone who values privacy and wants to keep your recent activity away from prying eyes, then this is the podcast for you. We will walk you through step-by-step instructions on how to hide your recent apps, ensuring that your sensitive information is not accessible to others. We will also discuss the reasons why you might want to hide your recent apps and the potential risks of leaving your recent activity exposed. Whether you're using your Mac for personal or professional use, this podcast will provide you with the information you need to safeguard your privacy and protect your sensitive information.

ITSPmagazine | Technology. Cybersecurity. Society
Conversation With Jerry Bell, @jerry On InfoSec.Exchange (Mastodon) | Securing Bridges Podcast With Alyssa Miller | Episode 35

ITSPmagazine | Technology. Cybersecurity. Society

Play Episode Listen Later Feb 10, 2023 48:41


Guest: Jerry Bell, VP and CISO, IBM Public Cloud [@IBM | @IBMcloud] and founder & co-host of the Defensive Security Podcast [@defensivesec]On Mastodon | https://infosec.exchange/@jerryOn Twitter | https://twitter.com/MaliciouslinkOn LinkedIn | https://www.linkedin.com/in/maliciouslink/InfoSec.Exchange | https://infosec.exchange/home________________________________Host: Alyssa MillerOn ITSPmagazine  

ITSPmagazine | Technology. Cybersecurity. Society
Conversation With Tricia Howard @TriciaKicksSaaS | Securing Bridges Podcast With Alyssa Miller | Episode 34

ITSPmagazine | Technology. Cybersecurity. Society

Play Episode Listen Later Jan 27, 2023 45:27


Guest: Tricia Howard, Senior Technical Writer II at Akamai Technologies [@Akamai]On Mastodon | https://infosec.exchange/@triciakickssaasOn Twitter | https://twitter.com/TriciaKicksSaaSOn LinkedIn | http://linkedin.com/in/triciakickssaasWebsite | https://triciakickssaas.com/________________________________Host: Alyssa MillerOn ITSPmagazine  

ITSPmagazine | Technology. Cybersecurity. Society
A Conversation With Helen Patton @CisoHelen | Securing Bridges Podcast With Alyssa Miller | Episode 33

ITSPmagazine | Technology. Cybersecurity. Society

Play Episode Listen Later Jan 9, 2023 49:08


GuestHelen PattonChief Information Security Officer, Cisco Security Business Group [@CiscoSecure], Cisco [@Cisco]On Mastodon | https://infosec.exchange/@cisohelenOn Twitter | https://twitter.com/CisoHelenOn LinkedIn | https://www.linkedin.com/in/helenpatton/Website | https://www.cisohelen.com/HostAlyssa MillerOn ITSPmagazine  

ITSPmagazine | Technology. Cybersecurity. Society
A Conversation With Bill Diekmann @bdiekmann | Securing Bridges Podcast With Alyssa Miller | Episode 32

ITSPmagazine | Technology. Cybersecurity. Society

Play Episode Listen Later Dec 16, 2022 45:26


ITSPmagazine | Technology. Cybersecurity. Society
A Conversation With Josh Nickels @Imlordofthering | Securing Bridges Podcast With Alyssa Miller | Episode 31

ITSPmagazine | Technology. Cybersecurity. Society

Play Episode Listen Later Dec 9, 2022 45:54


GuestJosh NickelsCyber Security Engineer at Dematic [@DematicGlobal]On Mastodon | https://infosec.exchange/@ImlordoftheringOn Twitter | https://twitter.com/imlordoftheringOn LinkedIn | https://www.linkedin.com/in/josh-nickels/HostAlyssa MillerOn ITSPmagazine  

ITSPmagazine | Technology. Cybersecurity. Society
A Conversation With Gina Yacone @gina_yacone | Securing Bridges Podcast With Alyssa Miller | Episode 30

ITSPmagazine | Technology. Cybersecurity. Society

Play Episode Listen Later Dec 2, 2022 47:06


National Day Calendar
November 30, 2022 - National Mason Jar Day | Computer Security Day

National Day Calendar

Play Episode Listen Later Nov 30, 2022 3:30


Welcome to November 30, 2022 on the National Day Calendar. Today we celebrate safety in the kitchen and online. Believe it or not, before patent #22186, home canning wasn't safe. Thanks to John Landis Mason, a tinsmith from New Jersey, the “Improvement on Screw-Neck Bottles,” made it possible to preserve produce right at home. The Mason Jar changed the way we pickle and pack food from our garden and those bumper crops from the Farmer's Market. They also make a cool holiday gift when you layer dry ingredients for baked goods or other treats for the DIY enthusiasts on your list. On National Mason Jar Day enjoy this versatile vessel and all the gifts it can hold for the ones you love.   With so many people shopping online these days it's important to remember that hackers are surfing the internet as well. Unfortunately, the season for deals is also big for identity theft. So while you're getting your holiday shopping underway, pay special attention to your online security. Nothing will keep you completely safe, but there are some simple steps you can take to protect yourself. As tempting as it may be, don't use public wifi to do your shopping and use strong passwords for your online accounts. Be sure to keep your software updated and firewalls in place. On Computer Security Day, take a few minutes to check that you're browsing the web safely so that you have one less thing to worry about during the holidays.  I'm Anna Devere and I'm Marlo Anderson. Thanks for joining us as we Celebrate Every Day. Learn more about your ad choices. Visit megaphone.fm/adchoices

ITSPmagazine | Technology. Cybersecurity. Society
A Conversation With Maril Vernon @shewhohacks | Securing Bridges Podcast With Alyssa Miller | Episode 29

ITSPmagazine | Technology. Cybersecurity. Society

Play Episode Listen Later Nov 19, 2022 47:26


GuestMaril Vernon"One Woman Purple Team" | Co-founder of The Cyber Queens Podcast | Purple Team Lead/Sr SE | Social Engineer | Physical Pentest | CTI | Administrative Officer- Offensive Ops @ CSFI | MSCSIAOn Twitter | https://twitter.com/shewhohacksOn LinkedIn | https://www.linkedin.com/in/marilvernon/HostAlyssa MillerOn ITSPmagazine  

ITSPmagazine | Technology. Cybersecurity. Society
A Conversation With Lesley Carhart @hacks4pancakes | Securing Bridges Podcast With Alyssa Miller | Episode 28

ITSPmagazine | Technology. Cybersecurity. Society

Play Episode Listen Later Nov 11, 2022 45:38


GuestLesley CarhartDirector of ICS Cybersecurity Incident Response at Dragos [@DragosInc]On Twitter | https://twitter.com/hacks4pancakesOn LinkedIn | https://www.linkedin.com/in/lcarhart/Website | https://tisiphone.net/HostAlyssa MillerOn ITSPmagazine  

ITSPmagazine | Technology. Cybersecurity. Society
A Conversation With Eric J. Belardo | Securing Bridges Podcast With Alyssa Miller | Episode 27

ITSPmagazine | Technology. Cybersecurity. Society

Play Episode Listen Later Nov 3, 2022 51:42


GuestEric J. Belardo, The "Cyber Papa"Founder at Raices Cyber Org [@RaicesCyberOrg]On Twitter | https://twitter.com/ebelardo73On LinkedIn | https://www.linkedin.com/in/ebelardo/On YouTube | https://www.youtube.com/EricBelardoCyberHostAlyssa MillerOn ITSPmagazine  

All the Hacks
Action List: Everything You Can Do To Protect Your Identity, Accounts, Credit and Family.

All the Hacks

Play Episode Listen Later Sep 16, 2022 40:59


#78: In this episode, Chris breaks down the specific actions you can take to protect yourself and your family online. That includes protecting your devices, credit, financial accounts, logins and more. Additionally he covers finding and removing all your personal data from the web. It also includes a brief conversation with Rob Shavell (@robshavell) from DeleteMe about why it's so hard to find and remove your personal info from the internet.Full Show Notes: https://www.allthehacks.com/security-action-list Partner DealsPacaso: Free early access to listings and $2,500+ in closing creditsAthletic Greens: Free 1 year supply of Vitamin D and 5 free travel packsBlockFi: Exclusive bonus of up to $250 freeDeleteMe: 20% off removing your personal info from the web Selected Links From The EpisodeProtecting Your DevicesEnable FileVault on MacDevice Encryption on WindowsVeraCryptCreate a disk image using Disk Utility on MacCryptomatorBoxcryptorCloudFlare's 1.1.1.1 and WarpExpressVPNiCloud Private RelayLogins1PasswordGmail Task Specific Emails (with +)YubiKey 5C NFC Security KeyOTP Auth AppAuthy AppGoogle's Advanced Protection Programhave i been pwned?Credit + Financial AccountsFree Annual Credit ReportsExperian's Free Credit MonitoringCreditKarmaChase Credit JourneyFreeze Your Credit: Experian | Transunion | Equifax | Chex | InnovisOpt Out PrescreenRemoving Personal InfoDeleteMe - Automate Removing Your Personal DataGitHub Data Broker Opt-Out ListRemove Outdated Content Tools: Google | BingBlur Home on Google/Apple/Bing MapsRemove Marketing Data: Axciom | LexisNexisGoogle New Options for Removing PIIStop unsolicited mail with DMAchoiceDoNotCall RegistryFull Show NotesProtecting your devices (1:23)Securing your logins and passwords (5:30)Locking down your credit and financial accounts (15:58)Removing your personal data online (21:01)Interview with Rob Shavell from DeleteMe (25:18)Protecting your home and home address (39:54)SponsorsPacasoPacaso is the modern way to buy and own a second home in over 40 world-class destinations. Each home is set up in an LLC, so you can buy as little as 1/8 of the property. And then Pacaso handles everything, from expert interior design to ongoing management, dedicated local support, and equitable, app-based scheduling – making ownership simple and turnkey.To get a free Pacaso Access account, which includes early access to new listings and up to $10,000 in credit towards closing costs, go to allthehacks.com/pacasoDeleteMeDeleteMe is a simple subscription, privacy service for reducing unwanted personal information exposed on the public Web. They'll remove your cell phone #, address, email, family members and more from hundreds of data broker websites and then continuously scan for new data that shows up and get that removed as well. On average DeleteMe finds and removes over 2,000 pieces of data for a customer in their first two years.Get 20% off a plan for you or your entire family at allthehacks.com/deletemeBlockFiThis episode is brought to you by BlockFi. If you're interested in Crypto, BlockFi is one of the best ways to get started, letting you easily buy, sell and store your crypto assets. After signing up and linking your bank account, you can instantly trade a variety of cryptocurrencies and store them all in a secure wallet that lets you control and transfer your holdings however you want. You can also set up recurring transfers so you can dollar cost average your crypto investments over time.Or if you want another way to put your crypto investing on autopilot, there's the BlockFi Crypto Rewards Credit Card. While 1.5% cash back isn't the best in the market, that cash back is automatically invested into Bitcoin, Ethereum or whatever cryptocurrency you want. If you want to check out BlockFi, you can get an exclusive bonus of up to $250 free when you sign at allthehacks.com/blockfiAthletic GreensAthletic Greens is a foundational nutrition drink designed to remove the friction from covering the daily nutritional needs of a modern diet. It combines more than 9 essential nutrition products into one convenient and great-tasting drink, giving you an easy and efficient way to get your daily multivitamin, multimineral, probiotic, prebiotic, functional greens blend, immune support complex and more. It contains no GMOs, no harmful ingredients and no artificial colors or sweeteners.Right now, Athletic Greens is going to give you a free 1 year supply of immune-supporting Vitamin D and 5  free travel packs with your first purchase at allthehacks.com/athleticgreensConnect with All the HacksAll the Hacks: Newsletter | Website | Facebook | EmailChris Hutchins: Twitter | Instagram | Website | LinkedIn