Podcasts about data encryption

Process of converting plaintext to ciphertext

  • 54PODCASTS
  • 68EPISODES
  • 28mAVG DURATION
  • ?INFREQUENT EPISODES
  • Feb 20, 2025LATEST
data encryption

POPULARITY

20172018201920202021202220232024


Best podcasts about data encryption

Latest podcast episodes about data encryption

Engines of Our Ingenuity
The Engines of Our Ingenuity 2424: The National Institute of Standards and Technology

Engines of Our Ingenuity

Play Episode Listen Later Feb 20, 2025 3:50


ResearchPod
Audible Barcodes – A Symphony of Data

ResearchPod

Play Episode Listen Later Oct 9, 2024 8:23 Transcription Available


Barcodes and QR codes have become ubiquitous sights in our current information age.Soorya Annadurai, an independent researcher and software engineer at Microsoft in the USA, has developed a solution for these situations: audible barcodes, or ‘AuraCodes', enabling the encoding and decoding of digital information through the medium of sound.Read more in Research OutreachRead the original research: doi.org/10.1007/978-981-99-3758-5_9

Leaders Of Transformation | Leadership Development | Conscious Business | Global Transformation
509: Data Privacy, AI and Women in Tech with Amruta Moktali

Leaders Of Transformation | Leadership Development | Conscious Business | Global Transformation

Play Episode Listen Later Sep 3, 2024 35:21 Transcription Available


What do you need to know about data privacy and generative AI? In this informative episode we explore the dynamic world of data privacy and generative AI with Amruta Moktali, Chief Product Officer at Skyflow - the world's first and only data privacy vault delivered as an API. Amruta's impressive career trajectory spans leading roles at industry giants like Microsoft, Salesforce, and Cleo, culminating in her current position where she champions data privacy solutions. Listen as she shares invaluable insights on the importance of safeguarding original data, the impact of generative AI, and the growing presence of women in technology. Join us as Amruta unpacks the intricacies of data privacy vaults, offers strategies to manage data responsibly, and discusses the challenges unique to remote work environments. Whether you're a business leader, tech enthusiast, or advocate for diversity in the workplace, this episode offers a wealth of knowledge and actionable advice. What We Discuss in This Episode Amruta's journey from product design to tech leadership. The importance of data privacy in the era of generative AI. Major challenges organizations face in maintaining control over shared data. The balance between using original data and ensuring consent and compliance with privacy regulations. Overview of how Skyflow's data privacy vault secures sensitive information. The impact of diversity and inclusion on tech innovation and decision-making. Strategies for companies to ensure AI models are trained with unbiased data. Risks associated with data breaches and proactive prevention measures. The representation of women in tech and encouraging more diverse talent in STEM fields. Podcast Highlights 0:00 – How Amruta found her passion in data privacy. 5:32 - Protecting your data in the context of generative AI. 8:14 - Privacy policies, consent, and the originality of data. 11:29 - Challenges of maintaining control over shared data. 14:55 - Skyflow's solution for securing sensitive data. 19:22 - Diversity and inclusion's impact on tech innovation. 23:17 - Ensuring equitable training data for AI models. 27:06 - Proactive measures to prevent data breaches. 30:45 - Encouraging diverse talent in tech. Favorite Quotes On Data Security: “Privacy policies and regulations are not just boxes to tick—they're about safeguarding the originality and integrity of data.” On Diversity in Tech: “It's not enough to have a seat at the table; genuine inclusion means actively listening and valuing diverse perspectives.” On Proactive Measures: “The repercussions of a data breach are far-reaching; investing in proactive security measures is crucial for protecting both reputation and trust.”   Episode Show Notes and Resources: https://leadersoftransformation.com/podcast/business/509-data-privacy-ai-and-women-in-tech-with-amruta-moktali/ Check out our complete library of episodes and other leadership resources here: https://leadersoftransformation.com ________

The Founder Hour
Max Levchin | Co-Founder of PayPal and Affirm

The Founder Hour

Play Episode Listen Later Aug 6, 2024 75:54


In this episode of The Founder Hour, we have an insightful conversation with Max Levchin, a true trailblazer in the tech world. Max's journey began in Ukraine, where he grew up in a family of scientists who instilled in him a deep respect for knowledge and discovery. After his family relocated to Crimea to escape the fallout from the Chernobyl disaster, Max discovered his passion for programming at a young age. With no computer at his disposal, he began teaching himself to code by writing programs on paper.In 1991, Max's family moved to the U.S., settling in Chicago. It was here that he found his footing at the University of Illinois Urbana-Champaign, a pivotal moment that set the stage for his future success. Immersed in the early internet scene, Max's path eventually led him to Silicon Valley, where a chance meeting with Peter Thiel at Stanford's lecture halls sparked the creation of what would become PayPal. Initially conceived as a secure way to store and transfer encrypted data, PayPal evolved into a groundbreaking online payment system that transformed the way we conduct financial transactions.Max takes us through the early days of PayPal, sharing stories of tackling complex challenges like document encryption and fraud prevention. But his entrepreneurial journey didn't stop there. He went on to found Slide, and later Affirm, a company dedicated to providing honest financial products that align with consumers' best interests. Throughout the conversation, Max discusses his guiding philosophy of HVF—hard, valuable, and fun—and how it shapes his approach to building companies that aim to make a positive impact on the world.We also explore Max's thoughts on the future of technology, exploring AI's potential, the evolving landscape of fintech, and the importance of aligning financial interests with customers. Tune in to uncover the story of an engineer at heart, a visionary leader, and a man who continues to shape the future of finance and technology.***CHA-CHING! Customers are rushing to your store. Do you have a point-of-sale system you can trust or is it (ahem) a real P.O.S.? You need Shopify for retail.Shopify POS is your command center for your retail store. From accepting payments to managing inventory, Shopify has EVERYTHING you need to sell in person. Get hardware that fits your business. Take payments by smartphone, transform your tablet into a point-of-sale system, or use Shopify's POS Go mobile device for a battle-tested solution.Plus, Shopify's award-winning help is there to support your success every step of the way.Do retail right with Shopify. Sign up for a one-dollar-per-month trial period at www.shopify.com/founderhour. Once again, go to www.shopify.com/founderhour to take your retail business to the next level today.***It's 2024 - are you still using your personal phone number for your startup?One of the most common founder mistakes we see is using your personal phone for business. OpenPhone makes it super easy to get business phone numbers for your team. It works through a beautiful app on your phone or computer, and integrates with CRMs like HubSpot and Salesforce.Here's a feature we love: With OpenPhone's AI-powered call transcripts and summaries, you can have a summary of your phone call with action items right when you hang up. No more note-taking, or forgotten to-do's.What's more, every employee that's sharing that phone number with you has access to it, too. Total recall across your entire team. OpenPhone is already affordable at a starting price of $15/user/month. But, The Founder Hour listeners can get 20% off for 6 months. And if you have existing numbers with another service, OpenPhone will port them over at no extra charge.Head to https://www.openphone.com/founder to start your free trial and get 20% off!***The Founder Hour is brought to you by Outer. Outer makes the world's most beautiful, comfortable, innovative, and high-quality outdoor furniture - ALL from sustainable materials - and is the ONLY outdoor furniture with a patented built-in cover to make protecting it effortless. From teak chairs to fire pit tables, everything Outer makes has the look and feel of what you'd expect at a 5-star resort, for less than you'd pay at a big box store for something that won't last.For a limited time, get 10% off at www.liveouter.com/thefounderhour. Terms and conditions apply. ***Follow The Founder Hour on:Instagram | www.instagram.com/thefounderhourTwitter/X | www.x.com/thefounderhourLinkedIn | www.linkedin.com/company/thefounderhourYouTube | www.youtube.com/@thefounderhour

Reimagining Cyber
Connected Car Chaos - Ep 102

Reimagining Cyber

Play Episode Listen Later Jun 19, 2024 31:12 Transcription Available


In this podcast episode, hosts Rob Aragao and Stan Wisseman are joined by Arun DeSouza, a renowned expert in connected vehicle security and former CISO at leading automotive companies. Arun begins by highlighting the critical challenges facing connected vehicles, emphasizing the importance of security by design throughout the development lifecycle. He stresses the need for rigorous vulnerability assessments and penetration testing to prevent vulnerabilities that could lead to remote hacking or data breaches.Arun discusses the vital role of infrastructure connectivity and encryption in securing data transmission between vehicles and the cloud. He emphasizes the necessity of secure over-the-air software updates to patch vulnerabilities promptly. Addressing the risks associated with peripheral devices connected to vehicles, Arun advocates for robust system interface protections and micro-segmentation strategies to isolate critical systems from non-critical ones.Privacy and data security emerge as central concerns, with Arun emphasizing the importance of adhering to privacy-by-design principles. He discusses the implications of GDPR-like standards for protecting sensitive data collected by connected vehicles and underscores the need for user consent frameworks in data handling practices.The conversation extends to the complex automotive supply chain ecosystem, where Arun stresses the importance of implementing robust security measures across third-party suppliers. He highlights the role of continuous security assessments and collaborative efforts within the supply chain to mitigate cybersecurity risks effectively.Concluding the episode, Arun offers practical advice for consumers considering connected vehicles, suggesting they seek transparency from manufacturers regarding cybersecurity features. He encourages leveraging industry networks and expert advice to make informed decisions about vehicle purchases in 2024.Join us for an insightful exploration of the evolving landscape of connected vehicle security.Follow or subscribe to the show on your preferred podcast platform.Share the show with others in the cybersecurity world.Get in touch via reimaginingcyber@gmail.com

Absolute Business Mindset podcast
Protecting Your Business: The Importance of Cybersecurity in the Digital Age

Absolute Business Mindset podcast

Play Episode Listen Later May 30, 2024 9:52


In this riveting episode of the Business Growth Talks podcast with Mark Hayward, listeners are invited to delve deep into the critical realm of cybersecurity. As the digital landscape continues to evolve, the protection of data becomes paramount, not just for large corporations but for smaller businesses and solo entrepreneurs as well. Our episode serves as a clarion call for heightened vigilance and robust security tactics in the increasingly treacherous cyber domain.Data is today's unparalleled digital treasure, and its safeguarding is central to the discourse in this episode. The conversation cuts through the complexity of cybersecurity challenges, presenting the stark realities faced by businesses in the growth stage. The narrative is interwoven with engaging insights and actionable strategies, emphasizing the indispensability of cybersecurity in the modern business framework.Key discussions illuminate the pressing threats posed by cybercriminals and rogue states alike, while also decreeing the transformative power of AI and automation in fortifying cyber defenses. Furthermore, the role of governments and the essential actions they must undertake to buttress the private sector against digital dangers are thoughtfully examined.Key Takeaways:Cybersecurity is a critical concern for all businesses, not just large corporations but also small businesses and solo entrepreneurs, who are often highly vulnerable to attacks.With data being an invaluable asset in the digital era, robust cybersecurity measures are an absolute necessity for the survival and success of a business.AI and automation play a crucial role in the defense against cyber threats, offering small businesses advanced protection without the need for extensive in-house expertise.Rogue state-sponsored cyber activities, such a those attributed to China and Russia, add a layer of complexity to cybersecurity and highlight the need for international cooperation.Governments can significantly contribute to cybersecurity efforts by creating safer digital environments through legislation, resources, and support for small businesses.Support the Show.Do you want to be a guest on multiple podcasts as a service go to:www.podcastintroduction.comFind more details about the podcast and my coaching business on:www.businessgrowthtalks.comDo you want to be a podcaster? Sign up onwww.abmpodcastcourse.co.ukFind me onLinkedIn - https://www.linkedin.com/in/mark-hayw...Facebook - https://www.facebook.com/markjhayward​

ITSPmagazine | Technology. Cybersecurity. Society
Embracing Data-Centric Security | A Brand Story Conversation From RSA Conference 2024 | A Seclore Story with Vishal Gupta | On Location Coverage with Sean Martin and Marco Ciappelli

ITSPmagazine | Technology. Cybersecurity. Society

Play Episode Listen Later May 7, 2024 13:09


Amidst the buzzing atmosphere of RSA Conference 2024, Sean Martin, host an On Location Brand Story With ITSPmagazine, engages in a thought-provoking discussion with Vishal Gupta, co-founder of Seclore. The theme of this year's conference, the Art of Possible, sets the stage for a conversation that unravels the critical role of data in driving business innovation and success.Protecting Data in the New Technological LandscapeVishal Gupta sheds light on the importance of ensuring that security and collaboration align seamlessly, emphasizing that CISOs and security teams must work in harmony to foster a secure yet conducive business environment. In a world where data sprawls across diverse platforms and devices, the focus on data protection emerges as a paramount necessity to mitigate risks and safeguard critical assets.Shifting from Infrastructure to Data ProtectionThe dialogue navigates towards a fundamental shift from traditional infrastructure protection to data-centric security. Gupta highlights the challenges that arise when enterprises grapple with securing an ever-expanding volume of data across varied networks, devices, and applications. The conversation underscores the significance of transitioning towards a data-centric approach to address the inherent vulnerabilities in contemporary cybersecurity frameworks.Enabling Secure Data Collaboration with SecloreBy introducing the innovative concept of embedding security, privacy, and compliance directly into the data itself, Seclore revolutionizes the paradigm of data sharing and collaboration. Gupta elucidates how organizations can enforce personalized security policies, regulate data access, and monitor data interactions in real-time to prevent unauthorized usage and ensure data integrity.Navigating the Path to Data-Centric SecurityAs enterprises embark on the journey towards data-centric security, Gupta emphasizes the importance of meticulous planning and strategic implementation. By focusing on targeted use cases and achieving early wins, organizations can gradually scale their data protection initiatives and cultivate a culture of data-centricity within their operations.The enriching discussion between Sean Martin and Vishal Gupta showcases the transformative potential of data-centric security solutions in the realm of cybersecurity. For further insights and collaboration opportunities with Seclore, connect with them on LinkedIn, on their website, or meet them at upcoming industry events.Learn more about Seclore: https://itspm.ag/seclore-km6r Note: This story contains promotional content. Learn more.Guest: Vishal Gupta, CEO, Seclore [@secloretech]On LinkedIn | https://www.linkedin.com/in/jiguptaji/ResourcesLearn more and catch more stories from Seclore: https://www.itspmagazine.com/directory/secloreView all of our RSA Conference Coverage: https://www.itspmagazine.com/rsa-conference-usa-2024-rsac-san-francisco-usa-cybersecurity-event-infosec-conference-coverageAre you interested in telling your story?https://www.itspmagazine.com/telling-your-story

Redefining CyberSecurity
Embracing Data-Centric Security | A Brand Story Conversation From RSA Conference 2024 | A Seclore Story with Vishal Gupta | On Location Coverage with Sean Martin and Marco Ciappelli

Redefining CyberSecurity

Play Episode Listen Later May 7, 2024 13:09


Amidst the buzzing atmosphere of RSA Conference 2024, Sean Martin, host an On Location Brand Story With ITSPmagazine, engages in a thought-provoking discussion with Vishal Gupta, co-founder of Seclore. The theme of this year's conference, the Art of Possible, sets the stage for a conversation that unravels the critical role of data in driving business innovation and success.Protecting Data in the New Technological LandscapeVishal Gupta sheds light on the importance of ensuring that security and collaboration align seamlessly, emphasizing that CISOs and security teams must work in harmony to foster a secure yet conducive business environment. In a world where data sprawls across diverse platforms and devices, the focus on data protection emerges as a paramount necessity to mitigate risks and safeguard critical assets.Shifting from Infrastructure to Data ProtectionThe dialogue navigates towards a fundamental shift from traditional infrastructure protection to data-centric security. Gupta highlights the challenges that arise when enterprises grapple with securing an ever-expanding volume of data across varied networks, devices, and applications. The conversation underscores the significance of transitioning towards a data-centric approach to address the inherent vulnerabilities in contemporary cybersecurity frameworks.Enabling Secure Data Collaboration with SecloreBy introducing the innovative concept of embedding security, privacy, and compliance directly into the data itself, Seclore revolutionizes the paradigm of data sharing and collaboration. Gupta elucidates how organizations can enforce personalized security policies, regulate data access, and monitor data interactions in real-time to prevent unauthorized usage and ensure data integrity.Navigating the Path to Data-Centric SecurityAs enterprises embark on the journey towards data-centric security, Gupta emphasizes the importance of meticulous planning and strategic implementation. By focusing on targeted use cases and achieving early wins, organizations can gradually scale their data protection initiatives and cultivate a culture of data-centricity within their operations.The enriching discussion between Sean Martin and Vishal Gupta showcases the transformative potential of data-centric security solutions in the realm of cybersecurity. For further insights and collaboration opportunities with Seclore, connect with them on LinkedIn, on their website, or meet them at upcoming industry events.Learn more about Seclore: https://itspm.ag/seclore-km6r Note: This story contains promotional content. Learn more.Guest: Vishal Gupta, CEO, Seclore [@secloretech]On LinkedIn | https://www.linkedin.com/in/jiguptaji/ResourcesLearn more and catch more stories from Seclore: https://www.itspmagazine.com/directory/secloreView all of our RSA Conference Coverage: https://www.itspmagazine.com/rsa-conference-usa-2024-rsac-san-francisco-usa-cybersecurity-event-infosec-conference-coverageAre you interested in telling your story?https://www.itspmagazine.com/telling-your-story

Smartphone Nation
How Credit on UPI is making Credit more Trustworthy and Accessible Ft. Anup Agrawal

Smartphone Nation

Play Episode Listen Later Mar 26, 2024 30:13


In the last episode of Smartphone Nation, Niveditha and Utsav speak to Anup Agrawal Co-founder of Kiwi about how credit on UPI will educate Indians on the benefits of using credit, leading to a more economically sound future for all. Anup also shared with us his vision for the future and what impact he believes credit accessibility could possibly make. We also discover that Niveditha and Utsav are on opposite sides of the ‘credit spectrum'.Tune in to this fun conversation about the benefits of credit and how important it is to be accessible to all, especially the Next Half Billion.See omnystudio.com/listener for privacy information.

CISSP Cyber Training Podcast - CISSP Training Program
CCT 122: CISSP Deep Dive: Uncovering Data Encryption, Loss Prevention, and Code Obfuscation Strategies (D2.6)

CISSP Cyber Training Podcast - CISSP Training Program

Play Episode Listen Later Mar 11, 2024 44:54 Transcription Available


Embarking on a new chapter in my cybersecurity journey, I can't wait to share the depth of insights that come with stepping into the consulting realm. The world of cybersecurity is ever-evolving, and I'm here to navigate this complex landscape with you, offering the expertise you need to protect your data in today's digital battleground. From deciphering the states of data to unveiling the encryption methods that keep your information safe, this episode is a goldmine for anyone serious about mastering cybersecurity, whether for the CISSP exam or the harsh realities of the industry.Have you ever considered how data encryption and loss prevention go hand-in-hand? We dissect the nuances of data in transit, weighing the benefits of end-to-end encryption against the relative vulnerabilities within internal networks. Furthermore, exploring the Tor network opens up a discussion about the trade-offs between user anonymity and the potential for identity exposure. Tackling these complex issues, we also touch on the intricacies of managing digital rights and information access, with real-world examples that bring these concepts to life for our listeners.Wrapping up, we pull back the curtain on the shadowy realm of code obfuscation, a technique that keeps the prying eyes of attackers at bay, yet can be a double-edged sword in malware defense. I share my thoughts on the careful balance required to implement obfuscation effectively, without falling into a labyrinth of confusion that could stifle your team's productivity. Join us for this deep dive into the world of cybersecurity, where practical knowledge meets real-world applications, all aimed at fortifying your defenses in the digital age.Gain access to 30 FREE CISSP Exam Questions each and every month by going to FreeCISSPQuestions.com and sign-up to join the team for Free.

Smartphone Nation
How a Company Leverages an Inclusive Workforce to Drive Tech Innovations Globally, ft. Radha Basu

Smartphone Nation

Play Episode Listen Later Feb 27, 2024 38:07


In this episode, our hosts Nivedita and Utsav chat with Radha Basu, CEO of iMerit to know about iMerit's 'two feet planted on the ground' mission, where the two primary focuses are on creating an inclusive workforce, and leveraging the power of this inclusive workforce to revolutionise the AI and ML landscape with automation, annotation, and analytics for global enterprises. Tune in to this enlightening conversation, and learn more about iMerit's vision for a more inclusive and empowered future, especially for the underserved segments of India, and the Next Half Billion. A special thanks to Omidyar Network India for making this season possible. To know how ONI is partnering bold and purpose-driven entrepreneurs who are working to improve the lives of India's Next Half Billion, visit omidyarnetwork.in You can listen and subscribe to Smartphone Nation on the IVM Podcasts App and on all major audio platforms. Do follow IVM Podcasts on social media. We are @IVMPodcasts on Facebook, Twitter, & Instagram.  Do share the word with your folks!See omnystudio.com/listener for privacy information.

Smartphone Nation
How Privacy Tech is Evolving to become more People Centric ft. Abilash Soundararajan

Smartphone Nation

Play Episode Listen Later Feb 20, 2024 41:31


Introducing a new and refreshed edition of Smartphone Nation! Join hosts Niveditha and Utsav as they engage with entrepreneurs, unraveling their journeys, and stories of impact.In this episode, Abilash Soundararajan, the founder and CEO of PrivaSapien, discusses the online dangers in our increasingly connected world, emphasising the need for better protection and privacy. He advocates for online privacy as a fundamental right, rejecting the notion that it should come with cost implications.Tune in for an insightful exploration of technology's impact on privacy, and the crucial pursuit of a safer digital space, especially for the Next Half Billion. A special thanks to Omidyar Network India for making this season possible. To know how ONI is partnering bold and purpose-driven entrepreneurs who are working to improve the lives of India's Next Half Billion, visit omidyarnetwork.in You can listen and subscribe to Smartphone Nation on the IVM Podcasts App and on all major audio platforms. Do follow IVM Podcasts on social media. We are @IVMPodcasts on Facebook, Twitter, & Instagram.  Do share the word with your folks!See omnystudio.com/listener for privacy information.

Smartphone Nation
How Privacy Tech is Helping Safeguard Online Spaces

Smartphone Nation

Play Episode Listen Later Dec 5, 2023 23:37


Navigating the internet can be intimidating, especially given that we don't always know who can access our data. While some of us may pause briefly to think before accepting the cookies and terms on a website or app, many of us freely agree to them – without fully understanding how our data will be used. This makes it easier for potential scammers to exploit our data, and use it against us.Tune in to this episode to discover how companies like PrivaSapien are helping make the internet a safer space with their privacy-enhancing technology. This podcast is also available in Tamil and Hindi. A special thanks to Omidyar Network India for making this season possible. To know how ONI is partnering bold and purpose-driven entrepreneurs who are working to improve the lives of India's Next Half Billion, visit omidyarnetwork.in You can listen and subscribe to Smartphone Nation on the IVM Podcasts App and on all major audio platforms. Do follow IVM Podcasts on social media. We are @IVMPodcasts on Facebook, Twitter, & Instagram.  Do share the word with your folks!See omnystudio.com/listener for privacy information.

The Azure Security Podcast
Episode 87: Advances in Always Encrypted and Transparent Data Encryption

The Azure Security Podcast

Play Episode Listen Later Nov 15, 2023 21:07


In this episode, Michael talks with his colleagues Pieter Vanhove and Mirek Sztajno about updates to Always Encrypted and Transparent Data Encryption in SQL Server and Azure SQL DB.

ITSPmagazine | Technology. Cybersecurity. Society
Cyber Shadows Over Serenity—Part 3 | A Musing On the Future of Cybersecurity and Humanity with Sean Martin and TAPE3 | Read by TAPE3

ITSPmagazine | Technology. Cybersecurity. Society

Play Episode Listen Later Nov 11, 2023 6:10


In this series, ‘Cyber Shadows Over Serenity,' we unravel the tales of three emblematic small businesses that stand as pillars in the peaceful community, each facing the dark storm of a ransomware attack that sought to shroud their digital realms in chaos. In Part 3, witness the Baker family's battle against a crippling ransomware attack at The Sweet Retreet and discover how Clay Creationz, a haven of creativity, navigates the uncharted waters of the digital world. This juxtaposition of resilience and naivety presents a striking narrative on the importance of digital vigilance in today's interconnected age. Join us as we unfold these compelling stories, each offering unique insights and lessons on cybersecurity. Subscribe now to follow the continuing journey of "Cyber Shadows Over Serenity" and learn how even the most tranquil towns are not immune to digital shadows.________This fictional story represents the results of an interactive collaboration between Human Cognition and Artificial Intelligence.Enjoy, think, share with others, and subscribe to "The Future of Cybersecurity" newsletter on LinkedIn.Sincerely, Sean Martin and TAPE3________Sean Martin is the host of the Redefining CyberSecurity Podcast, part of the ITSPmagazine Podcast Network—which he co-founded with his good friend Marco Ciappelli—where you may just find some of these topics being discussed. Visit Sean on his personal website.TAPE3 is the Artificial Intelligence for ITSPmagazine, created to function as a guide, writing assistant, researcher, and brainstorming partner to those who adventure at and beyond the Intersection Of Technology, Cybersecurity, And Society. Visit TAPE3 on ITSPmagazine.

Redefining CyberSecurity
Cyber Shadows Over Serenity—Part 3 | A Musing On the Future of Cybersecurity and Humanity with Sean Martin and TAPE3 | Read by TAPE3

Redefining CyberSecurity

Play Episode Listen Later Nov 11, 2023 6:10


In this series, ‘Cyber Shadows Over Serenity,' we unravel the tales of three emblematic small businesses that stand as pillars in the peaceful community, each facing the dark storm of a ransomware attack that sought to shroud their digital realms in chaos. In Part 3, witness the Baker family's battle against a crippling ransomware attack at The Sweet Retreet and discover how Clay Creationz, a haven of creativity, navigates the uncharted waters of the digital world. This juxtaposition of resilience and naivety presents a striking narrative on the importance of digital vigilance in today's interconnected age. Join us as we unfold these compelling stories, each offering unique insights and lessons on cybersecurity. Subscribe now to follow the continuing journey of "Cyber Shadows Over Serenity" and learn how even the most tranquil towns are not immune to digital shadows.________This fictional story represents the results of an interactive collaboration between Human Cognition and Artificial Intelligence.Enjoy, think, share with others, and subscribe to "The Future of Cybersecurity" newsletter on LinkedIn.Sincerely, Sean Martin and TAPE3________Sean Martin is the host of the Redefining CyberSecurity Podcast, part of the ITSPmagazine Podcast Network—which he co-founded with his good friend Marco Ciappelli—where you may just find some of these topics being discussed. Visit Sean on his personal website.TAPE3 is the Artificial Intelligence for ITSPmagazine, created to function as a guide, writing assistant, researcher, and brainstorming partner to those who adventure at and beyond the Intersection Of Technology, Cybersecurity, And Society. Visit TAPE3 on ITSPmagazine.

ITSPmagazine | Technology. Cybersecurity. Society
Cyber Shadows Over Serenity—Part 2 | A Musing On the Future of Cybersecurity and Humanity with Sean Martin and TAPE3 | Read by TAPE3

ITSPmagazine | Technology. Cybersecurity. Society

Play Episode Listen Later Nov 9, 2023 6:37


In this series, ‘Cyber Shadows Over Serenity,' we unravel the tales of three emblematic small businesses that stand as pillars in the peaceful community, each facing the dark storm of a ransomware attack that sought to shroud their digital realms in chaos. In Part 2, we pick up where we left off in Chapter 1 last time to re-enter the realm of Lexicon Hayven. Here, we find ourselves amidst Eleanor's meticulous preparations to guard against cyber malevolence. When we last visited, we discovered a well-scripted disaster recovery plan, a narrative etched with diligence and foresight, awaiting its execution.________This fictional story represents the results of an interactive collaboration between Human Cognition and Artificial Intelligence.Enjoy, think, share with others, and subscribe to "The Future of Cybersecurity" newsletter on LinkedIn.Sincerely, Sean Martin and TAPE3________Sean Martin is the host of the Redefining CyberSecurity Podcast, part of the ITSPmagazine Podcast Network—which he co-founded with his good friend Marco Ciappelli—where you may just find some of these topics being discussed. Visit Sean on his personal website.TAPE3 is the Artificial Intelligence for ITSPmagazine, created to function as a guide, writing assistant, researcher, and brainstorming partner to those who adventure at and beyond the Intersection Of Technology, Cybersecurity, And Society. Visit TAPE3 on ITSPmagazine.

Redefining CyberSecurity
Cyber Shadows Over Serenity—Part 2 | A Musing On the Future of Cybersecurity and Humanity with Sean Martin and TAPE3 | Read by TAPE3

Redefining CyberSecurity

Play Episode Listen Later Nov 9, 2023 6:37


In this series, ‘Cyber Shadows Over Serenity,' we unravel the tales of three emblematic small businesses that stand as pillars in the peaceful community, each facing the dark storm of a ransomware attack that sought to shroud their digital realms in chaos. In Part 2, we pick up where we left off in Chapter 1 last time to re-enter the realm of Lexicon Hayven. Here, we find ourselves amidst Eleanor's meticulous preparations to guard against cyber malevolence. When we last visited, we discovered a well-scripted disaster recovery plan, a narrative etched with diligence and foresight, awaiting its execution.________This fictional story represents the results of an interactive collaboration between Human Cognition and Artificial Intelligence.Enjoy, think, share with others, and subscribe to "The Future of Cybersecurity" newsletter on LinkedIn.Sincerely, Sean Martin and TAPE3________Sean Martin is the host of the Redefining CyberSecurity Podcast, part of the ITSPmagazine Podcast Network—which he co-founded with his good friend Marco Ciappelli—where you may just find some of these topics being discussed. Visit Sean on his personal website.TAPE3 is the Artificial Intelligence for ITSPmagazine, created to function as a guide, writing assistant, researcher, and brainstorming partner to those who adventure at and beyond the Intersection Of Technology, Cybersecurity, And Society. Visit TAPE3 on ITSPmagazine.

ITSPmagazine | Technology. Cybersecurity. Society
Navigating the Privacy Maze: Mozilla's Vehicle Privacy Report Sparks a Drive | A BlackCloak Brand Story with Chris Pierson and Ingrid Gliottone

ITSPmagazine | Technology. Cybersecurity. Society

Play Episode Listen Later Oct 18, 2023 37:07


The recent report by Mozilla, shedding light on the privacy concerns around modern vehicles, struck a chord. Notably, every car brand reviewed, including behemoths like Ford, Volkswagen, and Toyota, flunked the privacy test. This revelation steered a fascinating conversation with Chris Pierson and Ingrid Gliottone from BlackCloak during a brand story recording for the Redefining Society podcast. Our focus veered towards the lurking privacy and security issues tied to the modern, tech-savvy vehicles we so casually entrust with our data.The modern car is no longer just a mode of transport—it's a smart gadget, a data hub on wheels. But as the wheels spin, so does the reel of our personal information, weaving into the vast web of data, ready for harvest by not just the car makers, but a string of 'they' – the infotainment system providers, app developers, network providers, and possibly cyber rogues. The conversation took a deeper dive as Chris, the CEO of BlackCloak, elucidated the firm's mission—shielding corporate executives and key personnel from personal cyber threats that could ricochet back to the corporations.The Mozilla report is an alarm bell, underscoring the high time to separate the wheat from the chaff in terms of what data is essential for functionality and what merely serves as a gold mine for advertisers or a hunting ground for cyber-attackers. This blend of privacy and security, or the lack thereof, is a cocktail we are forced to sip, as Ingrid pointed out the lack of clarity presented to buyers at the point of sale concerning the privacy policies tied to these vehicles.The promise of tech advancements in vehicles is dazzling—better shocks for off-roaders, safety features to prevent accidents during a sudden snooze, and so on. Yet, as Chris highlighted, there's a dark side. Some policies mentioned collecting data about one's sex life and genetic information— a far cry from the basic expectations of privacy.As the conversation with BlackCloak unrolled, the blend of excitement and concern was palpable. The question now is not about halting the march of technology but steering it towards a path where privacy and security are not the passengers but co-drivers.The findings from the Mozilla report and insights from BlackCloak are not just food for thought, but a call to action. It is crucial to reckon with the reality of the modern-day vehicles doubling as data hubs and to steer the conversation towards a road where transparency, consent, and security are the landmarks. I urge you to dive into BlackCloak's offerings to explore how they are redefining the security landscape, ensuring the privacy and security of your personal digital realm, including that computer on wheels parked in your driveway. Visit BlackCloak to discover what they offer in shielding the modern-day knights from the unseen arrows of the digital world.Guests:Chris Pierson, Founder and CEO of BlackCloak [@BlackCloakCyber]On Linkedin | https://www.linkedin.com/in/drchristopherpierson/On Twitter | https://twitter.com/drchrispiersonIngrid Gliottone, Chief Experience Officer of BlackCloak [@BlackCloakCyber]On LinkedIn | https://www.linkedin.com/in/ingridgliottone/ResourcesLearn more about BlackCloak and their offering: https://itspm.ag/itspbcwebAre you interested in telling your story?https://www.itspmagazine.com/telling-your-story

Redefining CyberSecurity
Navigating the Privacy Maze: Mozilla's Vehicle Privacy Report Sparks a Drive | A BlackCloak Brand Story with Chris Pierson and Ingrid Gliottone

Redefining CyberSecurity

Play Episode Listen Later Oct 18, 2023 37:07


The recent report by Mozilla, shedding light on the privacy concerns around modern vehicles, struck a chord. Notably, every car brand reviewed, including behemoths like Ford, Volkswagen, and Toyota, flunked the privacy test. This revelation steered a fascinating conversation with Chris Pierson and Ingrid Gliottone from BlackCloak during a brand story recording for the Redefining Society podcast. Our focus veered towards the lurking privacy and security issues tied to the modern, tech-savvy vehicles we so casually entrust with our data.The modern car is no longer just a mode of transport—it's a smart gadget, a data hub on wheels. But as the wheels spin, so does the reel of our personal information, weaving into the vast web of data, ready for harvest by not just the car makers, but a string of 'they' – the infotainment system providers, app developers, network providers, and possibly cyber rogues. The conversation took a deeper dive as Chris, the CEO of BlackCloak, elucidated the firm's mission—shielding corporate executives and key personnel from personal cyber threats that could ricochet back to the corporations.The Mozilla report is an alarm bell, underscoring the high time to separate the wheat from the chaff in terms of what data is essential for functionality and what merely serves as a gold mine for advertisers or a hunting ground for cyber-attackers. This blend of privacy and security, or the lack thereof, is a cocktail we are forced to sip, as Ingrid pointed out the lack of clarity presented to buyers at the point of sale concerning the privacy policies tied to these vehicles.The promise of tech advancements in vehicles is dazzling—better shocks for off-roaders, safety features to prevent accidents during a sudden snooze, and so on. Yet, as Chris highlighted, there's a dark side. Some policies mentioned collecting data about one's sex life and genetic information— a far cry from the basic expectations of privacy.As the conversation with BlackCloak unrolled, the blend of excitement and concern was palpable. The question now is not about halting the march of technology but steering it towards a path where privacy and security are not the passengers but co-drivers.The findings from the Mozilla report and insights from BlackCloak are not just food for thought, but a call to action. It is crucial to reckon with the reality of the modern-day vehicles doubling as data hubs and to steer the conversation towards a road where transparency, consent, and security are the landmarks. I urge you to dive into BlackCloak's offerings to explore how they are redefining the security landscape, ensuring the privacy and security of your personal digital realm, including that computer on wheels parked in your driveway. Visit BlackCloak to discover what they offer in shielding the modern-day knights from the unseen arrows of the digital world.Guests:Chris Pierson, Founder and CEO of BlackCloak [@BlackCloakCyber]On Linkedin | https://www.linkedin.com/in/drchristopherpierson/On Twitter | https://twitter.com/drchrispiersonIngrid Gliottone, Chief Experience Officer of BlackCloak [@BlackCloakCyber]On LinkedIn | https://www.linkedin.com/in/ingridgliottone/ResourcesLearn more about BlackCloak and their offering: https://itspm.ag/itspbcwebAre you interested in telling your story?https://www.itspmagazine.com/telling-your-story

DBAOCM Podcast
EP686 - O que é o Oracle Transparent Data Encryption (TDE)?

DBAOCM Podcast

Play Episode Listen Later Aug 21, 2023 20:48


EP686 - O que é o Oracle Transparent Data Encryption (TDE)?   Entre no nosso canal do Telegram para receber conteúdos Exclusivos sobre Banco de dados Oracle:   https://t.me/joinchat/AAAAAEb7ufK-90djaVuR4Q

Risk & Repeat
Risk & Repeat: Are data extortion attacks ransomware?

Risk & Repeat

Play Episode Listen Later Jul 20, 2023


Ransomware gangs are focusing more on data theft and extortion, while skipping the encryption of networks. But should these attacks still be considered ransomware?

InfosecTrain
Challenges and Benefits of Application Security

InfosecTrain

Play Episode Listen Later Jul 3, 2023 4:45


Companies update their data center security regularly, but well-defined Application Security policies are required to protect from cyberattacks, and it even makes the company stay one step ahead of cybercriminals. Application Security has become the most critical concern for companies taking a reactive approach to information security and Application Security. Companies are readily trying to take all the preventive measures to overcome the challenges of Application Security. What is Application Security? Application Security is the process of developing, deploying, and testing an application's security features to prevent security vulnerabilities from threats. It defines the security measures required at the application level to protect the application code and data from cyberattacks. Application Security includes software, hardware, and procedures to mitigate security vulnerabilities. Data Encryption, Antivirus, Firewalls, etc., are used to prevent unauthorized access to the application. It also includes security considerations during the application development and designing stage. It also helps implement various security policies and approaches to protect the application even after the deployment. View More: Challenges and Benefits of Application Security

Blue Security
Apple Rapid Security, Data Encryption, Layoffs & Insider Risk

Blue Security

Play Episode Listen Later May 15, 2023 30:37


On this week's episode, Adam and Andy talk about Apple's new Rapid Security update for iOS and Android. They also talk about different ways to encrypt data for protection. Finally, with layoffs still happening, they talk about how workforce reductions can have an impact on your security posture and how to be prepared for this. ------------------------------------------- Youtube Video Link: ⁠⁠⁠⁠https://youtu.be/KM5fvWH8EVY⁠ ------------------------------------------- Documentation: ⁠https://support.apple.com/en-us/HT201224 ------------------------------------------- Contact Us: Website: ⁠⁠⁠⁠⁠⁠⁠⁠⁠https://bluesecuritypod.com⁠⁠⁠⁠⁠⁠⁠⁠⁠ Twitter: ⁠⁠⁠⁠⁠⁠⁠⁠⁠https://twitter.com/bluesecuritypod⁠⁠⁠⁠⁠⁠⁠⁠⁠ Linkedin: ⁠⁠⁠⁠⁠⁠⁠⁠⁠https://www.linkedin.com/company/bluesecpod⁠⁠⁠⁠⁠⁠⁠⁠⁠ Youtube: ⁠⁠⁠⁠⁠⁠⁠⁠⁠https://www.youtube.com/c/BlueSecurityPodcast⁠⁠⁠⁠⁠⁠⁠⁠⁠ Twitch: ⁠⁠⁠⁠⁠⁠⁠⁠⁠https://www.twitch.tv/bluesecuritypod⁠⁠⁠⁠⁠⁠⁠⁠⁠ ------------------------------------------- Andy Jaw Mastodon: ⁠⁠⁠⁠⁠⁠⁠⁠⁠https://infosec.exchange/@ajawzero⁠⁠⁠⁠⁠⁠⁠⁠⁠ Twitter: ⁠⁠⁠⁠⁠⁠⁠⁠⁠https://twitter.com/ajawzero⁠⁠⁠⁠⁠⁠⁠⁠⁠ LinkedIn: ⁠⁠⁠⁠⁠⁠⁠⁠⁠https://www.linkedin.com/in/andyjaw/⁠⁠⁠⁠⁠⁠⁠⁠⁠ Email: ⁠⁠⁠⁠⁠⁠⁠⁠⁠andy@bluesecuritypod.com⁠⁠⁠⁠⁠⁠⁠⁠⁠ ------------------------------------------- Adam Brewer Twitter: ⁠⁠⁠⁠⁠⁠⁠⁠⁠https://twitter.com/ajbrewer⁠⁠⁠⁠⁠⁠⁠⁠⁠ LinkedIn: ⁠⁠⁠⁠⁠⁠⁠⁠⁠https://www.linkedin.com/in/adamjbrewer/⁠⁠⁠⁠⁠⁠⁠⁠⁠ Email: ⁠⁠⁠⁠⁠⁠⁠⁠⁠adam@bluesecuritypod.com --- Send in a voice message: https://podcasters.spotify.com/pod/show/blue-security-podcast/message

TWiT Bits (MP3)
FLOSS Clip: What is ZAMA?

TWiT Bits (MP3)

Play Episode Listen Later Apr 12, 2023 5:17


Rand Hindi joins Doc Searls and Dan Lynch on FLOSS Weekly to discuss encryption and Zama.ai. Here's an explanation on what Zama is. For more, check out FLOSS Weekly: https://twit.tv/floss/727 Hosts: Doc Searls and Dan Lynch Guest: Dr Rand Hindi You can find more about TWiT and subscribe to our podcasts at https://podcasts.twit.tv/ Sponsor: GO.ACILEARNING.COM/TWIT

TWiT Bits (Video HD)
FLOSS Clip: What is ZAMA?

TWiT Bits (Video HD)

Play Episode Listen Later Apr 12, 2023 5:18


Rand Hindi joins Doc Searls and Dan Lynch on FLOSS Weekly to discuss encryption and Zama.ai. Here's an explanation on what Zama is. For more, check out FLOSS Weekly: https://twit.tv/floss/727 Hosts: Doc Searls and Dan Lynch Guest: Dr Rand Hindi You can find more about TWiT and subscribe to our podcasts at https://podcasts.twit.tv/ Sponsor: GO.ACILEARNING.COM/TWIT

Tcast
The TARTLE Intelligence: Harnessing the Power of Data for AI Advancements

Tcast

Play Episode Listen Later Apr 7, 2023 13:04


Exploring TARTLE, a global real-time human intelligence and analysis platform Discussing the importance of ethically sourced, encrypted first-party data for AI   TARTLE: A Secure Global Marketplace for Data Offering tools for sourcing initial training sets and targeted real-person model feedback Providing visualization and analysis tools for intelligence-driven decisions in AI Understanding the peer-to-peer approach for unlocking zero and first-party data   Comprehensive Consumer Profile Datasets for Machine Learning and AI Specializing in model training sets and feedback tailored to specific needs Harnessing a diverse range of datasets from globally distributed members Ensuring top-notch data harvesting and evaluation by humans Seamless API Integration for Quality Real-time Data   Discussing TARTLE's D2C Infrastructure and Strategy for model training sets Exploring the availability of unique and newly created data sets, including photos, audio, video recordings, and texts State-of-the-art Data Encryption and Marketplace Technologies Ensuring ethical creation and extraction of bespoke training data for AI systems Protecting data integrity and privacy   The Importance of Clean Data for Data Scientists Acknowledging the potential consequences of bad data, such as project shutdowns and AI bias Defining clean data as unbiased, error-free, and representative of the population Emphasizing the need for ethical data collection methods and best practices   Conclusion Reiterating the value of TARTLE's data-driven solutions for AI Encouraging the use of ethically sourced, secure, and comprehensive data for successful AI implementation For More Information Click Here   TCAST Live is an education, business, and technology video podcast that informs listeners and viewers on the best practices, theory, and technical functions of the TARTLE exchange system and how it is designed to serve society with the highest and best intentions.   The show is hosted by Co-Founder & Source Data Pioneer Alexander McCaig and Co-Host CMO Jason Rigby.   TARTLE is free to join, forever and can be accessed at WWW.TARTLE.CO

Ben's Community Commentary Space
Black Tech Building Episode 166 Data-Encryption Technologies

Ben's Community Commentary Space

Play Episode Listen Later Mar 27, 2023 49:56


Data-Encryption Technologies  --- Send in a voice message: https://podcasters.spotify.com/pod/show/ben-uko/message

Voice of Veritas Podcast
Take Regulatory Requirements Further with Data Encryption, Immutability, and Isolation

Voice of Veritas Podcast

Play Episode Listen Later Jan 31, 2023 29:04


Meeting industry regulations is essential for protecting your organizational data and assets. However, Veritas advocates for taking these requirements further and isolating your data to become one of the 30% of organizations that fully recover after an attack. Join us for this next episode of Voice of Veritas and learn more about best practices in encryption and the value of implementing an air-gap solution. Resources referenced: Zero Trust Fundamentals Practical Example of Zero Trust Framework NetBackup Anomaly Detection Configuration (White Paper) Anomaly Detection in Action Fortifying Your Perimeter (White Paper) Fortify Your Perimeter: Stop the Spread of Ransomware Dead in its Tracks | VeritasSee omnystudio.com/listener for privacy information.

Daily 5 Minute Headlines
Apple Plans To Beef Up iCloud Data Encryption & More

Daily 5 Minute Headlines

Play Episode Listen Later Dec 8, 2022


Listen to the December 8th, 2022 daily headline round-up and find all the top news that you need to know.

Engines of Our Ingenuity
Engines of Our Ingenuity 2426: Charles Dow

Engines of Our Ingenuity

Play Episode Listen Later Nov 30, 2022 3:54


The Cloudcast
Queryable Data Encryption

The Cloudcast

Play Episode Listen Later Aug 21, 2022 36:03


Kenneth White (@kennwhite, Security Principle @MongoDB) talks about the causes of internal breaches, querying encrypted data vs encryption-at-rest, and database evolutions.SHOW: 644CLOUD NEWS OF THE WEEK - http://bit.ly/cloudcast-cnotwCHECK OUT OUR NEW PODCAST - "CLOUDCAST BASICS"SHOW SPONSORS:Streamline on-call, collaboration, incident management, and automation with a free 30-day trial of Lightstep Incident Response, built on ServiceNow. Listeners of The Cloudcast will also receive a free Lightstep Incident Response T-shirt after firing an alert or incident.Pay for the services you use, not the number of people on your team with Lightstep Incident Response. Try free for 30 days. Fire an alert or incident today and receive a free Lightstep Incident Response t-shirt.Granulate, an Intel company - Autonomous, continuous, workload optimizationgMaestro from Granulate - Kubernetes cost optimization, made easyDatadog Security Solution: Modern Monitoring and SecurityStart investigating security threats before it affects your customers with a free 14 day Datadog trial. Listeners of The Cloudcast will also receive a free Datadog T-shirt.SHOW NOTES:MongoDB Queryable EncryptionWired article with more backgroundMongoDB World presentation from June 2022Product page with FAQ & DocumentationPodcast interview with The New Stack from MDBW in JuneTopic 1 - Welcome to the show. You have quite a distinguished career in security and cryptography-adjacent. Tell us a little bit about your background, and what you focus on at MongoDB?Topic 2 - Unfortunately, we're hearing about more and more attacks that have an internal origination. From a security and cryptography perspective, what typically breaks down to allow this to happen? Topic 3 - MongoDB has recently launched a database that enables querying encrypted data. Give us some background on how this new concept came into being. Topic 4 - What are the technology components involved in making this happen - on the database side, on the application side, on the key management side? Topic 5 - What are some of the application use-cases where this new database technology makes sense?Topic 6 - How can people start exploring this technology? Is it available in both the software and SaaS offerings?FEEDBACK?Email: show at the cloudcast dot netTwitter: @thecloudcastnet

Federal Drive with Tom Temin
If you thought encryption was complicated now, wait 'til quantum computing

Federal Drive with Tom Temin

Play Episode Listen Later Jun 7, 2022 20:17


The big fear in the data encryption community is the advent of quantum computing. Computers so powerful they can crack any algorithm. The National Institute of Standards and Technology is in the midst of choosing among algorithms those its experts deem most resistant to quantum, as it develops post-quantum cryptography standards. Here with some pointers for federal IT security practitioners who want to better understand this technology, Federal News Network's Tom Temin spoke with the head of quantum cybersecurity at a company called Quantinuum, Duncan Jones.

TWiT Bits (MP3)
FLOSS Clip: Can You Encrypt WebRTC?

TWiT Bits (MP3)

Play Episode Listen Later Apr 1, 2022 4:39


Lorenzo Miniero of Meetecho and Janus WebRTC speaks with Jonathan Bennett and Doc Searls on FLOSS Weekly about securing WebRTC streams with encryption and SecureRTP. For more, check out FLOSS Weekly: https://twit.tv/floss/674 Hosts: Doc Searls and Jonathan Bennett Guest: Lorenzo Miniero You can find more about TWiT and subscribe to our podcasts at https://podcasts.twit.tv/

TWiT Bits (Video HD)
FLOSS Clip: Can You Encrypt WebRTC?

TWiT Bits (Video HD)

Play Episode Listen Later Apr 1, 2022 4:41


Lorenzo Miniero of Meetecho and Janus WebRTC speaks with Jonathan Bennett and Doc Searls on FLOSS Weekly about securing WebRTC streams with encryption and SecureRTP. For more, check out FLOSS Weekly: https://twit.tv/floss/674 Hosts: Doc Searls and Jonathan Bennett Guest: Lorenzo Miniero You can find more about TWiT and subscribe to our podcasts at https://podcasts.twit.tv/

Darn IT Podcast
New EU Rules Threaten Big Data Encryption

Darn IT Podcast

Play Episode Listen Later Mar 31, 2022 8:43


The European Union passed legislation recently that targets big data, threatens to remove app encryption in order to cross-talk to smaller apps. What does this mean for Europeans? Madness? Are we going backwards in our encryption methods or are we moving forward? Are the Chinese doing it better? 

The SynAckFinAck Podcast
Data Encryption In Cyber Security with Jon McLachlan

The SynAckFinAck Podcast

Play Episode Listen Later Feb 9, 2022 33:03


In recent years, encryption has become an essential tool for cybersecurity and data protection. It's also one of the most important aspects of any business today - especially when it comes to cloud databases. Encryption will protect your data from being stolen or intercepted by third parties and maintain your privacy by ensuring your information is only accessible by the intended recipient and not by anyone else. There are many different types of encryption methods, but they all use similar principles, which Jon will cover in-depth in this episode. Join the conversation with Jon McLachlan as he shares about encryption in cyber security and data protection to provide you with tools to protect your data in order to avoid potential threats like cybercrime or data breaches. Jon is the co-founder and CEO of Peacemakr and the host of The Security podcast of Silicon Valley, and he has been in technology, cyber, and startups for a very long time.       Tune in!   During this episode, you will learn about; [00:06] A bit about Jon's career background  [01:41] Jon's earliest inclination in tech, software, and security  [03:29] Going from traditional computer science programming to security [06:21] Jon's experience working with Apple as a young graduate [08:48] What is software product security and examples [09:04] Jon's transition from Apple to his startup company   [13:07] Building encryption system for your data protection  [16:17] End-to-end encryption keys management system    [20:02] Peacemakr and what they do in the encryption space [22:15] Self-driving encryption data security system [23:24] Management of encryptions keys in your applications [26:17] The future of security and the kind of scales to develop today [29:17] Get involved and participate to build your passion  [30:13] Jon's podcast, The Security podcast of Silicon Valley [31:49] How to reach out and connect with Jon Notable Quotes Encryption gives you the power to control who sees your data Building encryption into a product is building a system that controls the distribution and access to its keys. Exploring will help you do your passion justice. We all share something, but we arrive at our destination using different paths. If you want something, go for it, there's never going to be a right time. Connect with Jon McLachlan Website: https://peacemakr.io/ Email: jon@peacemakr.io LinkedIn: https://www.linkedin.com/company/peacemakr-io Twitter: https://twitter.com/peacemakr4          

Google Cloud Reader
Trust Google Cloud more with ubiquitous data encryption

Google Cloud Reader

Play Episode Listen Later Nov 30, 2021 5:29


Original blog postMore episodes at feeds.transistor.fm/google-cloud-readerPlease see our documentation for more information and reach out via this form to get started or with comments or questionsMore articles at cloud.google.com/blog

Cybersecurity FOREVER
#183: Data Encryption: A Demonstration!!

Cybersecurity FOREVER

Play Episode Listen Later Jan 30, 2021 9:58


Today I will discuss: 1. What is data encryption? 2. What is symmetric & asymmetric encryption? 3. Data encryption demonstration. Watch

Super Happy Dragon Lucky
Michael de la Garza, Dr. Al Carlson, and Phil Abraham talk cybersecurity and blockchain with Joe

Super Happy Dragon Lucky

Play Episode Listen Later Jan 26, 2021 61:59


Polymorphic Cipher Encryption?Dragonchain | Den | Twitter | LinkedIn | Telegram| GitHub | Facebook | YouTube | RealDenizens | JoeBlockchain services and solutionshttps://dragonchain.com/business/Try our platform and build blockchain applications in any coding languagehttps://dragonchain.com/blockchain-platform Social ChannelsWatch Super Happy Dragon Lucky live on YouTube each Thursday:https://www.youtube.com/channel/UC2_StJYNWFrQz2wiL8n6hoADen:https://den.social/l/dragonden/Twitterhttps://twitter.com/dragonchaingang/ Telegramhttps://t.me/dragontalk/ Facebookhttps://facebook.com/Dragonchaingang/ Reddithttps://www.reddit.com/r/dragonchain/ Support the show (https://www.dragonchain.com)Support the show (https://www.dragonchain.com)

Cybersecurity FOREVER
#125 : A Demonstration Of Data Encryption!

Cybersecurity FOREVER

Play Episode Listen Later Nov 22, 2020 11:42


Today I will discuss: 1. What is the importance of Data Encryption? 2. How can you protect your valuable data through encryption? 3. Demonstration of the open-sourced Veracrypt encryption? Watch

Building a Big Data Platform from 0 to 1
13 How to choose data encryption strategies

Building a Big Data Platform from 0 to 1

Play Episode Listen Later Nov 18, 2020 4:58


CISO Talks
Why Have Organizations Been So Slow With Adopting Data Encryption? | CISO Talks

CISO Talks

Play Episode Listen Later Oct 21, 2020 11:29


In this episode of CISO Talks, we speak with CEO of Atakama, Daniel Gallancy about data encryption and how organizations have taken a lot of time to adopt this philosophy and bring it into the mainstream within cybersecurity. Daniel Gallancy: https://www.linkedin.com/in/gallancy/ https://www.atakama.com/ Also available on: IGTV: https://www.instagram.com/instalepide... Spotify: https://spoti.fi/2N0XGXR iTunes: https://apple.co/2N0sO9P Follow us on Social Media: LinkedIn - http://bit.ly/2FWHKoM Twitter - http://bit.ly/2FWNO0C Instagram - http://bit.ly/2FWMxXj Facebook - http://bit.ly/2FXb2Ue

The Tech Guy (Video HI)
Leo Laporte - The Tech Guy: 1712

The Tech Guy (Video HI)

Play Episode Listen Later Jul 20, 2020 131:39


Creating a Virtual Choir Using Zoom or YouTube? Encrypting your data, unable to reformat ones' backup drives, issues with the password manager in Chrome, darn cats and messing up your desktop, the best Linux distro's to try, troubleshooting an iDrive permissions issue, and more of your calls! Host: Leo Laporte Guests: Sam Abuelsamid and Chris Marquardt Download or subscribe to this show at https://twit.tv/shows/the-tech-guy. For detailed show notes, visit techguylabs.com. Sponsors: LastPass.com/twit GetRoman.com/TECHGUY

The Tech Guy (Video HD)
Leo Laporte - The Tech Guy: 1712

The Tech Guy (Video HD)

Play Episode Listen Later Jul 20, 2020 131:39


Creating a Virtual Choir Using Zoom or YouTube? Encrypting your data, unable to reformat ones' backup drives, issues with the password manager in Chrome, darn cats and messing up your desktop, the best Linux distro's to try, troubleshooting an iDrive permissions issue, and more of your calls! Host: Leo Laporte Guests: Sam Abuelsamid and Chris Marquardt Download or subscribe to this show at https://twit.tv/shows/the-tech-guy. For detailed show notes, visit techguylabs.com. Sponsors: LastPass.com/twit GetRoman.com/TECHGUY

The Tech Guy (Video LO)
Leo Laporte - The Tech Guy: 1712

The Tech Guy (Video LO)

Play Episode Listen Later Jul 20, 2020 131:39


Creating a Virtual Choir Using Zoom or YouTube? Encrypting your data, unable to reformat ones' backup drives, issues with the password manager in Chrome, darn cats and messing up your desktop, the best Linux distro's to try, troubleshooting an iDrive permissions issue, and more of your calls! Host: Leo Laporte Guests: Sam Abuelsamid and Chris Marquardt Download or subscribe to this show at https://twit.tv/shows/the-tech-guy. For detailed show notes, visit techguylabs.com. Sponsors: LastPass.com/twit GetRoman.com/TECHGUY

Ask The Tech Guys (Audio)
Leo Laporte - The Tech Guy: 1712

Ask The Tech Guys (Audio)

Play Episode Listen Later Jul 20, 2020 131:39


Creating a Virtual Choir Using Zoom or YouTube? Encrypting your data, unable to reformat ones' backup drives, issues with the password manager in Chrome, darn cats and messing up your desktop, the best Linux distro's to try, troubleshooting an iDrive permissions issue, and more of your calls! Host: Leo Laporte Guests: Sam Abuelsamid and Chris Marquardt Download or subscribe to this show at https://twit.tv/shows/the-tech-guy. For detailed show notes, visit techguylabs.com. Sponsors: LastPass.com/twit GetRoman.com/TECHGUY

Ask The Tech Guy (Video HI)
ATG 29: How to Encrypt Your Data for Cloud Storage

Ask The Tech Guy (Video HI)

Play Episode Listen Later Mar 23, 2020 9:00


Leo Laporte explains how to secure your data in the cloud by encrypting files before upload. pCloud: https://www.pcloud.com/ Cryptomator: https://cryptomator.org/ Host: Leo Laporte Download or subscribe to this show at https://twit.tv/shows/ask-the-tech-guy Sponsor: LastPass.com/twit

Ask The Tech Guy (MP3)
ATG 29: How to Encrypt Your Data for Cloud Storage

Ask The Tech Guy (MP3)

Play Episode Listen Later Mar 23, 2020 9:00


Leo Laporte explains how to secure your data in the cloud by encrypting files before upload. pCloud: https://www.pcloud.com/ Cryptomator: https://cryptomator.org/ Host: Leo Laporte Download or subscribe to this show at https://twit.tv/shows/ask-the-tech-guy Sponsor: LastPass.com/twit

Ask The Tech Guy (Video HD)
ATG 29: How to Encrypt Your Data for Cloud Storage

Ask The Tech Guy (Video HD)

Play Episode Listen Later Mar 23, 2020 9:00


Leo Laporte explains how to secure your data in the cloud by encrypting files before upload. pCloud: https://www.pcloud.com/ Cryptomator: https://cryptomator.org/ Host: Leo Laporte Download or subscribe to this show at https://twit.tv/shows/ask-the-tech-guy Sponsor: LastPass.com/twit

Ask The Tech Guy (Video LO)
ATG 29: How to Encrypt Your Data for Cloud Storage

Ask The Tech Guy (Video LO)

Play Episode Listen Later Mar 23, 2020 9:00


Leo Laporte explains how to secure your data in the cloud by encrypting files before upload. pCloud: https://www.pcloud.com/ Cryptomator: https://cryptomator.org/ Host: Leo Laporte Download or subscribe to this show at https://twit.tv/shows/ask-the-tech-guy Sponsor: LastPass.com/twit

KCSB
Apples Data Encryption Plans (aired 2/6)

KCSB

Play Episode Listen Later Mar 11, 2020 3:11


A revisit to KCSB's Roger Nguyen's coverage of Apples plans to end data encryption. The tech giant Apple dropped plans to allow end-to-end encryption of their backups on the company’s iCloud service for users. This came amid several high-profile disputes with the United States Federal Bureau of Investigation.

Caveat
The practical concerns of data encryption.

Caveat

Play Episode Listen Later Feb 12, 2020 44:00


Dave shares a story about the government compelling some tech giants to help find a WhatsApp drug dealer, Ben follows developments on the ClearView facial recognition story that the New York Times recently broke, and later in the show, our conversation with Tommy Ross. He serves as Senior Director of Policy, BSA | The Software Alliance, and we’re going to be discussing encryption and law enforcement access to data. Links to stories: Feds Order Massive Number Of Tech Giants To Help Hunt Down One WhatsApp Meth Dealer Google, YouTube, Venmo and LinkedIn send cease-and-desist letters to facial recognition app that helps law enforcement NEMA's Manufacturer Disclosure Statement for Medical Device Security Thanks to our sponsor, KnowBe4.  

American Banker Podcast
BofA’s Bessant on responsible AI, cyberattacks and data encryption

American Banker Podcast

Play Episode Listen Later Apr 23, 2019 15:21


Cathy Bessant, Bank of America’s chief operations and technology officer, offers her takeaways from the first meeting of the Council on the Responsible Use of Artificial Intelligence. She also discusses some challenges banks are facing with cyberattacks and data encryption.

The Pure Report
Have It All: End-to-End Data Encryption With Data Reduction

The Pure Report

Play Episode Listen Later Mar 22, 2019 29:18


Historically host data encryption and array data reduction are like oil and water – they simply don't mix. But not any longer. Hear from Vaughn Stewart, Pure VP Alliances, and Blake Wood, Thales Director of Business Development, about a new joint solution announcement -- Vormetric Transparent Encryption for Efficient Storage – the IT and security industries' first end-to-end data encryption framework that realizes storage array data reduction. This new capability removes the compromise between encryption and storage efficiency, providing the granular access controls security professionals have come to expect from Thales combined with the industry-leading data reduction technologies from Pure Storage. For more information, check out: https://go.thalesesecurity.com/rs/480-LWA-970/images/pure-storage-and-thales-esecurity-sb.pdf

Backchat
Race politics and data encryption laws

Backchat

Play Episode Listen Later Aug 18, 2018 27:11


Earlier this week, Queensland senator Fraser Anning used his maiden speech in parliament to call for an end to Muslim immigration in Australia, invoking the "final solution to the immigration problem." We discuss what Anning's speech reflects to the state of race politics in Australia. Later, we chat to Lyndsey Jackson, Chair of Electronic Frontiers Australia, about a new law proposal which would create a process where the government would be able to access your encrypted data. She discusses the draft laws and how it would impact on our privacy. See omnystudio.com/listener for privacy information.

Track Changes
Privacy, Data Encryption and the Law

Track Changes

Play Episode Listen Later Jun 25, 2018 25:59


  Virtual vs. Physical Privacy: This week Paul Ford and Rich Ziade talk about privacy around your data and devices. We talk about search warrants, argue about the systemic problems of the prison system, and look into the ways that encrypted messaging is influencing our laws. We also get a preview into Rich’s life as a lawyer! [audio player] ►iTunes/►SoundCloud/►Overcast/►Stitcher/►MP3 /►RSS 2:38— Paul: “Anybody can sue you for anything, at any time. So you need to be buttoned up, but also plan for that.” 4:48 — Paul: “In the future, if you ever want to start a business, buddy up with a lawyer. That’s my advice.” 9:42 — Rich:There’s laws right up to the constitution that protect our privacy in terms of our homes; our information. 14:07 — Rich: “How do you feel about technology that exists, that doesn’t allow for that next step?”  16:55— Paul: “I dont actually see a fundemental difference between a virtual entity (like a communication network) and a physical space (like this guy’s house).” 18:20— Paul: “It’s very hard to ban end-to-end encryption, if people want it”. 19:41 — Rich: “Privacy is sacred, and it should be respected, unless there is enough reason to infringe on it because a greater good is being threatened or harm is being inflicted in some way.” LINKS Fact Pattern Probable Cause Signal Telegram Track Changes is the weekly technology and culture podcast from Postlight, hosted by Paul Ford and Rich Ziade. Production, show notes and transcripts by EDITAUDIO. Podcast logo and design by Will Denton of Postlight.  

WIRED Security: News, Advice, and More
‘Significant' FBI Error Reignites Data Encryption Debate

WIRED Security: News, Advice, and More

Play Episode Listen Later May 24, 2018 5:42


Law enforcement agencies including the FBI have long criticized data encryption as a threat to their ability to fight crime. They argue that encryption allows bad actors to "go dark," impeding agents' ability to access the data of suspects, even with court orders or warrants. After years of raising the alarm about the going dark problem, though, officials have yet to convince privacy advocates that undermining encryption protections would do more good than harm.

Security Intelligence Podcast
[Encore] What You Need To Know About Data Encryption Right Now

Security Intelligence Podcast

Play Episode Listen Later May 17, 2018 16:48


With mere days left until GDPR (General Data Protection Regulation) comes into force, now is the perfect time to revisit our December 2017 podcast on data encryption. Whether you’re working toward GDPR compliance, considering cloud migration or just looking for best practices to get encryption right, take 16 minutes and listen to this podcast with special guest Chase Cunningham, Principal Analyst Serving Security and Risk Professionals at Forrester Research. To learn more, read the white paper, "Guard Your Organization’s Data with Intelligent IBM Encryption" [ibm.co/2AuNXWB].

Security Intelligence Podcast
What You Need to Know about Data Encryption Right Now

Security Intelligence Podcast

Play Episode Listen Later Dec 12, 2017 16:58


Data encryption does not need to be difficult, but there's admittedly more to it than just turning on the encryption faucet. If you’re working toward GDPR readiness, considering cloud migration or just looking for best practices to get encryption right, take 13 minutes and listen to this podcast with special guest Chase Cunningham, Principal Analyst Serving Security and Risk Professionals at Forrester Research. To learn more, read the white paper, "Guard Your Organization’s Data with Intelligent IBM Encryption" [https://ibm.co/2AuNXWB].

The Changelog
Managing Secrets Using Vault

The Changelog

Play Episode Listen Later Feb 17, 2017 73:56 Transcription Available


Seth Vargo, the Director of Technical Advocacy at HashiCorp, joined the show to talk about managing secrets with their open source product called Vault which lets you centrally secure, store, and tightly control access to secrets across distributed infrastructure and applications. We talked about Seth’s back story into open source, use cases, what problem it solves, key features like Data Encryption, why they choose to write it in Go, and how they build tooling around the open core model.

Changelog Master Feed
Managing Secrets Using Vault (The Changelog #239)

Changelog Master Feed

Play Episode Listen Later Feb 17, 2017 73:56 Transcription Available


Seth Vargo, the Director of Technical Advocacy at HashiCorp, joined the show to talk about managing secrets with their open source product called Vault which lets you centrally secure, store, and tightly control access to secrets across distributed infrastructure and applications. We talked about Seth’s back story into open source, use cases, what problem it solves, key features like Data Encryption, why they choose to write it in Go, and how they build tooling around the open core model.

Adelaide .NET User Group Podcast
Data Encryption using .Net and SQL Server AND Building an Army of $10 Robots with HTML 5 and NodeJS

Adelaide .NET User Group Podcast

Play Episode Listen Later Apr 13, 2016


This is a recording of our April 2016 meeting. First up, we have our regular What's New segment with Ryan Spears, then we have two presentations. The first is from Duncan Greaves about "Data Encryption using .Net and SQL Server", and then finally we have Dr Tom Tilley on "Building an Army of $10 Robots with HTML 5 and Node.js"

Don't Let It Go...Unheard
Justice As Endangered Species: Encryption, 'Billy Budd,' & the Unity of Rights

Don't Let It Go...Unheard

Play Episode Listen Later Mar 18, 2016 93:00


Show discussing news, politics and culture from the perspective of Ayn Rand's philosophy, Objectivism. Hosted by Amy Peikoff.

CTOBOB Podcast
CTOBOB Technology Podcast 015 – Data encryption in the cloud with PerfectCloud.io

CTOBOB Podcast

Play Episode Listen Later May 8, 2015 12:18


CTOBOB TECHNOLOGY PODCAST Host: Bob Pellerin Guest: Mayukh Gon of PerfectCloud.io Topic: Encyption in the cloud Episode 015 Description CTOBOB podcast’s Bob Pellerin discusses data encyption, single sign-on and security in the cloud with Mayukh Gon of PerfectCloud.io.

UKFast - Corporate Film Production
Encryption Box on Importance of Data Encryption

UKFast - Corporate Film Production

Play Episode Listen Later Mar 7, 2014 2:57


Encryption Box Technical director, Phil Smith, explained why a programme like EncryptionBox will prove to be a life-saver for companies the world over. "It is absolutely vital to encrypt your data; we're at the stage where data loss is pandemic. A lot of businesses are being attacked by hackers, some of which charge as much as £4000 to return files back to their owners. Likewise, the Information Commissioners Office (ICO) are clamping down on British organisations that lose data," he said. "People aren't taking on board how important it is to encrypt. Top end businesses think they're secure and won't be attacked -- but the MoJ losing all their prisoners' details prove this isn't true. And SMEs are burying their heads in the sand thinking they won't be a target. "Everyone is a target. Hackers don't care whose data they steal, as long as they can sell it for thousands of pounds. There is nothing out there on the market that can protect data as well as EncryptionBox. Our level of encryption is so advanced, and is completely unique; there is nothing else as powerful." EncryptionBox uses several dual hexacore servers to store and safely encrypt all its users' data. It also employs terabytes of storage, secure firewalls and encrypted backup services to ensure no single point of failure. Phil said: "As well as our backups and firewalls, we need the speed and robustness that UKFast provide because if we get several clients hitting the system at once and uploading masses of files, we need to be able to handle that pressure, and we've never been let down yet. "It's also vital to us to host with a company that boasts security accreditations and that was one of the main things that attracted us to UKFast. In fact, UKFast ticked all the boxes; it holds the right security accreditations, owns its own data centres and run entirely from the UK. "When we visited the data centre, we were blown away by the quality of service UKFast offer." Phil sees a bright future for EncryptionBox, and is confident that the work ethic, care and high quality of technology provided by UKFast means the service will always be supported and secure. He said: "UKFast is an example of the way an organisation should be run. The staff have not been able to go far enough for us, and everybody has jumped on board in support of what we are doing. "I am 100% confident UKFast will be by our side every step of the way on our journey. Maybe one day, we'll be building a data centre together."

NetApp TV Studios
Brocade: Fibre Channel Data Encryption

NetApp TV Studios

Play Episode Listen Later Dec 18, 2008 6:32


NetApp and Brocade experts discuss ways to strengthen data centers with storage security solutions that protect critical data.