Process of converting plaintext to ciphertext
POPULARITY
Episode: 2424 The National Institute of Standards and Technology. Today, we measure things.
Barcodes and QR codes have become ubiquitous sights in our current information age.Soorya Annadurai, an independent researcher and software engineer at Microsoft in the USA, has developed a solution for these situations: audible barcodes, or ‘AuraCodes', enabling the encoding and decoding of digital information through the medium of sound.Read more in Research OutreachRead the original research: doi.org/10.1007/978-981-99-3758-5_9
Leaders Of Transformation | Leadership Development | Conscious Business | Global Transformation
What do you need to know about data privacy and generative AI? In this informative episode we explore the dynamic world of data privacy and generative AI with Amruta Moktali, Chief Product Officer at Skyflow - the world's first and only data privacy vault delivered as an API. Amruta's impressive career trajectory spans leading roles at industry giants like Microsoft, Salesforce, and Cleo, culminating in her current position where she champions data privacy solutions. Listen as she shares invaluable insights on the importance of safeguarding original data, the impact of generative AI, and the growing presence of women in technology. Join us as Amruta unpacks the intricacies of data privacy vaults, offers strategies to manage data responsibly, and discusses the challenges unique to remote work environments. Whether you're a business leader, tech enthusiast, or advocate for diversity in the workplace, this episode offers a wealth of knowledge and actionable advice. What We Discuss in This Episode Amruta's journey from product design to tech leadership. The importance of data privacy in the era of generative AI. Major challenges organizations face in maintaining control over shared data. The balance between using original data and ensuring consent and compliance with privacy regulations. Overview of how Skyflow's data privacy vault secures sensitive information. The impact of diversity and inclusion on tech innovation and decision-making. Strategies for companies to ensure AI models are trained with unbiased data. Risks associated with data breaches and proactive prevention measures. The representation of women in tech and encouraging more diverse talent in STEM fields. Podcast Highlights 0:00 – How Amruta found her passion in data privacy. 5:32 - Protecting your data in the context of generative AI. 8:14 - Privacy policies, consent, and the originality of data. 11:29 - Challenges of maintaining control over shared data. 14:55 - Skyflow's solution for securing sensitive data. 19:22 - Diversity and inclusion's impact on tech innovation. 23:17 - Ensuring equitable training data for AI models. 27:06 - Proactive measures to prevent data breaches. 30:45 - Encouraging diverse talent in tech. Favorite Quotes On Data Security: “Privacy policies and regulations are not just boxes to tick—they're about safeguarding the originality and integrity of data.” On Diversity in Tech: “It's not enough to have a seat at the table; genuine inclusion means actively listening and valuing diverse perspectives.” On Proactive Measures: “The repercussions of a data breach are far-reaching; investing in proactive security measures is crucial for protecting both reputation and trust.” Episode Show Notes and Resources: https://leadersoftransformation.com/podcast/business/509-data-privacy-ai-and-women-in-tech-with-amruta-moktali/ Check out our complete library of episodes and other leadership resources here: https://leadersoftransformation.com ________
In this episode of The Founder Hour, we have an insightful conversation with Max Levchin, a true trailblazer in the tech world. Max's journey began in Ukraine, where he grew up in a family of scientists who instilled in him a deep respect for knowledge and discovery. After his family relocated to Crimea to escape the fallout from the Chernobyl disaster, Max discovered his passion for programming at a young age. With no computer at his disposal, he began teaching himself to code by writing programs on paper.In 1991, Max's family moved to the U.S., settling in Chicago. It was here that he found his footing at the University of Illinois Urbana-Champaign, a pivotal moment that set the stage for his future success. Immersed in the early internet scene, Max's path eventually led him to Silicon Valley, where a chance meeting with Peter Thiel at Stanford's lecture halls sparked the creation of what would become PayPal. Initially conceived as a secure way to store and transfer encrypted data, PayPal evolved into a groundbreaking online payment system that transformed the way we conduct financial transactions.Max takes us through the early days of PayPal, sharing stories of tackling complex challenges like document encryption and fraud prevention. But his entrepreneurial journey didn't stop there. He went on to found Slide, and later Affirm, a company dedicated to providing honest financial products that align with consumers' best interests. Throughout the conversation, Max discusses his guiding philosophy of HVF—hard, valuable, and fun—and how it shapes his approach to building companies that aim to make a positive impact on the world.We also explore Max's thoughts on the future of technology, exploring AI's potential, the evolving landscape of fintech, and the importance of aligning financial interests with customers. Tune in to uncover the story of an engineer at heart, a visionary leader, and a man who continues to shape the future of finance and technology.***CHA-CHING! Customers are rushing to your store. Do you have a point-of-sale system you can trust or is it (ahem) a real P.O.S.? You need Shopify for retail.Shopify POS is your command center for your retail store. From accepting payments to managing inventory, Shopify has EVERYTHING you need to sell in person. Get hardware that fits your business. Take payments by smartphone, transform your tablet into a point-of-sale system, or use Shopify's POS Go mobile device for a battle-tested solution.Plus, Shopify's award-winning help is there to support your success every step of the way.Do retail right with Shopify. Sign up for a one-dollar-per-month trial period at www.shopify.com/founderhour. Once again, go to www.shopify.com/founderhour to take your retail business to the next level today.***It's 2024 - are you still using your personal phone number for your startup?One of the most common founder mistakes we see is using your personal phone for business. OpenPhone makes it super easy to get business phone numbers for your team. It works through a beautiful app on your phone or computer, and integrates with CRMs like HubSpot and Salesforce.Here's a feature we love: With OpenPhone's AI-powered call transcripts and summaries, you can have a summary of your phone call with action items right when you hang up. No more note-taking, or forgotten to-do's.What's more, every employee that's sharing that phone number with you has access to it, too. Total recall across your entire team. OpenPhone is already affordable at a starting price of $15/user/month. But, The Founder Hour listeners can get 20% off for 6 months. And if you have existing numbers with another service, OpenPhone will port them over at no extra charge.Head to https://www.openphone.com/founder to start your free trial and get 20% off!***The Founder Hour is brought to you by Outer. Outer makes the world's most beautiful, comfortable, innovative, and high-quality outdoor furniture - ALL from sustainable materials - and is the ONLY outdoor furniture with a patented built-in cover to make protecting it effortless. From teak chairs to fire pit tables, everything Outer makes has the look and feel of what you'd expect at a 5-star resort, for less than you'd pay at a big box store for something that won't last.For a limited time, get 10% off at www.liveouter.com/thefounderhour. Terms and conditions apply. ***Follow The Founder Hour on:Instagram | www.instagram.com/thefounderhourTwitter/X | www.x.com/thefounderhourLinkedIn | www.linkedin.com/company/thefounderhourYouTube | www.youtube.com/@thefounderhour
In this podcast episode, hosts Rob Aragao and Stan Wisseman are joined by Arun DeSouza, a renowned expert in connected vehicle security and former CISO at leading automotive companies. Arun begins by highlighting the critical challenges facing connected vehicles, emphasizing the importance of security by design throughout the development lifecycle. He stresses the need for rigorous vulnerability assessments and penetration testing to prevent vulnerabilities that could lead to remote hacking or data breaches.Arun discusses the vital role of infrastructure connectivity and encryption in securing data transmission between vehicles and the cloud. He emphasizes the necessity of secure over-the-air software updates to patch vulnerabilities promptly. Addressing the risks associated with peripheral devices connected to vehicles, Arun advocates for robust system interface protections and micro-segmentation strategies to isolate critical systems from non-critical ones.Privacy and data security emerge as central concerns, with Arun emphasizing the importance of adhering to privacy-by-design principles. He discusses the implications of GDPR-like standards for protecting sensitive data collected by connected vehicles and underscores the need for user consent frameworks in data handling practices.The conversation extends to the complex automotive supply chain ecosystem, where Arun stresses the importance of implementing robust security measures across third-party suppliers. He highlights the role of continuous security assessments and collaborative efforts within the supply chain to mitigate cybersecurity risks effectively.Concluding the episode, Arun offers practical advice for consumers considering connected vehicles, suggesting they seek transparency from manufacturers regarding cybersecurity features. He encourages leveraging industry networks and expert advice to make informed decisions about vehicle purchases in 2024.Join us for an insightful exploration of the evolving landscape of connected vehicle security.Follow or subscribe to the show on your preferred podcast platform.Share the show with others in the cybersecurity world.Get in touch via reimaginingcyber@gmail.com
In this riveting episode of the Business Growth Talks podcast with Mark Hayward, listeners are invited to delve deep into the critical realm of cybersecurity. As the digital landscape continues to evolve, the protection of data becomes paramount, not just for large corporations but for smaller businesses and solo entrepreneurs as well. Our episode serves as a clarion call for heightened vigilance and robust security tactics in the increasingly treacherous cyber domain.Data is today's unparalleled digital treasure, and its safeguarding is central to the discourse in this episode. The conversation cuts through the complexity of cybersecurity challenges, presenting the stark realities faced by businesses in the growth stage. The narrative is interwoven with engaging insights and actionable strategies, emphasizing the indispensability of cybersecurity in the modern business framework.Key discussions illuminate the pressing threats posed by cybercriminals and rogue states alike, while also decreeing the transformative power of AI and automation in fortifying cyber defenses. Furthermore, the role of governments and the essential actions they must undertake to buttress the private sector against digital dangers are thoughtfully examined.Key Takeaways:Cybersecurity is a critical concern for all businesses, not just large corporations but also small businesses and solo entrepreneurs, who are often highly vulnerable to attacks.With data being an invaluable asset in the digital era, robust cybersecurity measures are an absolute necessity for the survival and success of a business.AI and automation play a crucial role in the defense against cyber threats, offering small businesses advanced protection without the need for extensive in-house expertise.Rogue state-sponsored cyber activities, such a those attributed to China and Russia, add a layer of complexity to cybersecurity and highlight the need for international cooperation.Governments can significantly contribute to cybersecurity efforts by creating safer digital environments through legislation, resources, and support for small businesses.Support the Show.Do you want to be a guest on multiple podcasts as a service go to:www.podcastintroduction.comFind more details about the podcast and my coaching business on:www.businessgrowthtalks.comDo you want to be a podcaster? Sign up onwww.abmpodcastcourse.co.ukFind me onLinkedIn - https://www.linkedin.com/in/mark-hayw...Facebook - https://www.facebook.com/markjhayward
Amidst the buzzing atmosphere of RSA Conference 2024, Sean Martin, host an On Location Brand Story With ITSPmagazine, engages in a thought-provoking discussion with Vishal Gupta, co-founder of Seclore. The theme of this year's conference, the Art of Possible, sets the stage for a conversation that unravels the critical role of data in driving business innovation and success.Protecting Data in the New Technological LandscapeVishal Gupta sheds light on the importance of ensuring that security and collaboration align seamlessly, emphasizing that CISOs and security teams must work in harmony to foster a secure yet conducive business environment. In a world where data sprawls across diverse platforms and devices, the focus on data protection emerges as a paramount necessity to mitigate risks and safeguard critical assets.Shifting from Infrastructure to Data ProtectionThe dialogue navigates towards a fundamental shift from traditional infrastructure protection to data-centric security. Gupta highlights the challenges that arise when enterprises grapple with securing an ever-expanding volume of data across varied networks, devices, and applications. The conversation underscores the significance of transitioning towards a data-centric approach to address the inherent vulnerabilities in contemporary cybersecurity frameworks.Enabling Secure Data Collaboration with SecloreBy introducing the innovative concept of embedding security, privacy, and compliance directly into the data itself, Seclore revolutionizes the paradigm of data sharing and collaboration. Gupta elucidates how organizations can enforce personalized security policies, regulate data access, and monitor data interactions in real-time to prevent unauthorized usage and ensure data integrity.Navigating the Path to Data-Centric SecurityAs enterprises embark on the journey towards data-centric security, Gupta emphasizes the importance of meticulous planning and strategic implementation. By focusing on targeted use cases and achieving early wins, organizations can gradually scale their data protection initiatives and cultivate a culture of data-centricity within their operations.The enriching discussion between Sean Martin and Vishal Gupta showcases the transformative potential of data-centric security solutions in the realm of cybersecurity. For further insights and collaboration opportunities with Seclore, connect with them on LinkedIn, on their website, or meet them at upcoming industry events.Learn more about Seclore: https://itspm.ag/seclore-km6r Note: This story contains promotional content. Learn more.Guest: Vishal Gupta, CEO, Seclore [@secloretech]On LinkedIn | https://www.linkedin.com/in/jiguptaji/ResourcesLearn more and catch more stories from Seclore: https://www.itspmagazine.com/directory/secloreView all of our RSA Conference Coverage: https://www.itspmagazine.com/rsa-conference-usa-2024-rsac-san-francisco-usa-cybersecurity-event-infosec-conference-coverageAre you interested in telling your story?https://www.itspmagazine.com/telling-your-story
Amidst the buzzing atmosphere of RSA Conference 2024, Sean Martin, host an On Location Brand Story With ITSPmagazine, engages in a thought-provoking discussion with Vishal Gupta, co-founder of Seclore. The theme of this year's conference, the Art of Possible, sets the stage for a conversation that unravels the critical role of data in driving business innovation and success.Protecting Data in the New Technological LandscapeVishal Gupta sheds light on the importance of ensuring that security and collaboration align seamlessly, emphasizing that CISOs and security teams must work in harmony to foster a secure yet conducive business environment. In a world where data sprawls across diverse platforms and devices, the focus on data protection emerges as a paramount necessity to mitigate risks and safeguard critical assets.Shifting from Infrastructure to Data ProtectionThe dialogue navigates towards a fundamental shift from traditional infrastructure protection to data-centric security. Gupta highlights the challenges that arise when enterprises grapple with securing an ever-expanding volume of data across varied networks, devices, and applications. The conversation underscores the significance of transitioning towards a data-centric approach to address the inherent vulnerabilities in contemporary cybersecurity frameworks.Enabling Secure Data Collaboration with SecloreBy introducing the innovative concept of embedding security, privacy, and compliance directly into the data itself, Seclore revolutionizes the paradigm of data sharing and collaboration. Gupta elucidates how organizations can enforce personalized security policies, regulate data access, and monitor data interactions in real-time to prevent unauthorized usage and ensure data integrity.Navigating the Path to Data-Centric SecurityAs enterprises embark on the journey towards data-centric security, Gupta emphasizes the importance of meticulous planning and strategic implementation. By focusing on targeted use cases and achieving early wins, organizations can gradually scale their data protection initiatives and cultivate a culture of data-centricity within their operations.The enriching discussion between Sean Martin and Vishal Gupta showcases the transformative potential of data-centric security solutions in the realm of cybersecurity. For further insights and collaboration opportunities with Seclore, connect with them on LinkedIn, on their website, or meet them at upcoming industry events.Learn more about Seclore: https://itspm.ag/seclore-km6r Note: This story contains promotional content. Learn more.Guest: Vishal Gupta, CEO, Seclore [@secloretech]On LinkedIn | https://www.linkedin.com/in/jiguptaji/ResourcesLearn more and catch more stories from Seclore: https://www.itspmagazine.com/directory/secloreView all of our RSA Conference Coverage: https://www.itspmagazine.com/rsa-conference-usa-2024-rsac-san-francisco-usa-cybersecurity-event-infosec-conference-coverageAre you interested in telling your story?https://www.itspmagazine.com/telling-your-story
In the last episode of Smartphone Nation, Niveditha and Utsav speak to Anup Agrawal Co-founder of Kiwi about how credit on UPI will educate Indians on the benefits of using credit, leading to a more economically sound future for all. Anup also shared with us his vision for the future and what impact he believes credit accessibility could possibly make. We also discover that Niveditha and Utsav are on opposite sides of the ‘credit spectrum'.Tune in to this fun conversation about the benefits of credit and how important it is to be accessible to all, especially the Next Half Billion.See omnystudio.com/listener for privacy information.
Embarking on a new chapter in my cybersecurity journey, I can't wait to share the depth of insights that come with stepping into the consulting realm. The world of cybersecurity is ever-evolving, and I'm here to navigate this complex landscape with you, offering the expertise you need to protect your data in today's digital battleground. From deciphering the states of data to unveiling the encryption methods that keep your information safe, this episode is a goldmine for anyone serious about mastering cybersecurity, whether for the CISSP exam or the harsh realities of the industry.Have you ever considered how data encryption and loss prevention go hand-in-hand? We dissect the nuances of data in transit, weighing the benefits of end-to-end encryption against the relative vulnerabilities within internal networks. Furthermore, exploring the Tor network opens up a discussion about the trade-offs between user anonymity and the potential for identity exposure. Tackling these complex issues, we also touch on the intricacies of managing digital rights and information access, with real-world examples that bring these concepts to life for our listeners.Wrapping up, we pull back the curtain on the shadowy realm of code obfuscation, a technique that keeps the prying eyes of attackers at bay, yet can be a double-edged sword in malware defense. I share my thoughts on the careful balance required to implement obfuscation effectively, without falling into a labyrinth of confusion that could stifle your team's productivity. Join us for this deep dive into the world of cybersecurity, where practical knowledge meets real-world applications, all aimed at fortifying your defenses in the digital age.Gain access to 30 FREE CISSP Exam Questions each and every month by going to FreeCISSPQuestions.com and sign-up to join the team for Free.
In this episode, our hosts Nivedita and Utsav chat with Radha Basu, CEO of iMerit to know about iMerit's 'two feet planted on the ground' mission, where the two primary focuses are on creating an inclusive workforce, and leveraging the power of this inclusive workforce to revolutionise the AI and ML landscape with automation, annotation, and analytics for global enterprises. Tune in to this enlightening conversation, and learn more about iMerit's vision for a more inclusive and empowered future, especially for the underserved segments of India, and the Next Half Billion. A special thanks to Omidyar Network India for making this season possible. To know how ONI is partnering bold and purpose-driven entrepreneurs who are working to improve the lives of India's Next Half Billion, visit omidyarnetwork.in You can listen and subscribe to Smartphone Nation on the IVM Podcasts App and on all major audio platforms. Do follow IVM Podcasts on social media. We are @IVMPodcasts on Facebook, Twitter, & Instagram. Do share the word with your folks!See omnystudio.com/listener for privacy information.
Introducing a new and refreshed edition of Smartphone Nation! Join hosts Niveditha and Utsav as they engage with entrepreneurs, unraveling their journeys, and stories of impact.In this episode, Abilash Soundararajan, the founder and CEO of PrivaSapien, discusses the online dangers in our increasingly connected world, emphasising the need for better protection and privacy. He advocates for online privacy as a fundamental right, rejecting the notion that it should come with cost implications.Tune in for an insightful exploration of technology's impact on privacy, and the crucial pursuit of a safer digital space, especially for the Next Half Billion. A special thanks to Omidyar Network India for making this season possible. To know how ONI is partnering bold and purpose-driven entrepreneurs who are working to improve the lives of India's Next Half Billion, visit omidyarnetwork.in You can listen and subscribe to Smartphone Nation on the IVM Podcasts App and on all major audio platforms. Do follow IVM Podcasts on social media. We are @IVMPodcasts on Facebook, Twitter, & Instagram. Do share the word with your folks!See omnystudio.com/listener for privacy information.
Navigating the internet can be intimidating, especially given that we don't always know who can access our data. While some of us may pause briefly to think before accepting the cookies and terms on a website or app, many of us freely agree to them – without fully understanding how our data will be used. This makes it easier for potential scammers to exploit our data, and use it against us.Tune in to this episode to discover how companies like PrivaSapien are helping make the internet a safer space with their privacy-enhancing technology. This podcast is also available in Tamil and Hindi. A special thanks to Omidyar Network India for making this season possible. To know how ONI is partnering bold and purpose-driven entrepreneurs who are working to improve the lives of India's Next Half Billion, visit omidyarnetwork.in You can listen and subscribe to Smartphone Nation on the IVM Podcasts App and on all major audio platforms. Do follow IVM Podcasts on social media. We are @IVMPodcasts on Facebook, Twitter, & Instagram. Do share the word with your folks!See omnystudio.com/listener for privacy information.
In this episode, Michael talks with his colleagues Pieter Vanhove and Mirek Sztajno about updates to Always Encrypted and Transparent Data Encryption in SQL Server and Azure SQL DB.
In this series, ‘Cyber Shadows Over Serenity,' we unravel the tales of three emblematic small businesses that stand as pillars in the peaceful community, each facing the dark storm of a ransomware attack that sought to shroud their digital realms in chaos. In Part 3, witness the Baker family's battle against a crippling ransomware attack at The Sweet Retreet and discover how Clay Creationz, a haven of creativity, navigates the uncharted waters of the digital world. This juxtaposition of resilience and naivety presents a striking narrative on the importance of digital vigilance in today's interconnected age. Join us as we unfold these compelling stories, each offering unique insights and lessons on cybersecurity. Subscribe now to follow the continuing journey of "Cyber Shadows Over Serenity" and learn how even the most tranquil towns are not immune to digital shadows.________This fictional story represents the results of an interactive collaboration between Human Cognition and Artificial Intelligence.Enjoy, think, share with others, and subscribe to "The Future of Cybersecurity" newsletter on LinkedIn.Sincerely, Sean Martin and TAPE3________Sean Martin is the host of the Redefining CyberSecurity Podcast, part of the ITSPmagazine Podcast Network—which he co-founded with his good friend Marco Ciappelli—where you may just find some of these topics being discussed. Visit Sean on his personal website.TAPE3 is the Artificial Intelligence for ITSPmagazine, created to function as a guide, writing assistant, researcher, and brainstorming partner to those who adventure at and beyond the Intersection Of Technology, Cybersecurity, And Society. Visit TAPE3 on ITSPmagazine.
In this series, ‘Cyber Shadows Over Serenity,' we unravel the tales of three emblematic small businesses that stand as pillars in the peaceful community, each facing the dark storm of a ransomware attack that sought to shroud their digital realms in chaos. In Part 3, witness the Baker family's battle against a crippling ransomware attack at The Sweet Retreet and discover how Clay Creationz, a haven of creativity, navigates the uncharted waters of the digital world. This juxtaposition of resilience and naivety presents a striking narrative on the importance of digital vigilance in today's interconnected age. Join us as we unfold these compelling stories, each offering unique insights and lessons on cybersecurity. Subscribe now to follow the continuing journey of "Cyber Shadows Over Serenity" and learn how even the most tranquil towns are not immune to digital shadows.________This fictional story represents the results of an interactive collaboration between Human Cognition and Artificial Intelligence.Enjoy, think, share with others, and subscribe to "The Future of Cybersecurity" newsletter on LinkedIn.Sincerely, Sean Martin and TAPE3________Sean Martin is the host of the Redefining CyberSecurity Podcast, part of the ITSPmagazine Podcast Network—which he co-founded with his good friend Marco Ciappelli—where you may just find some of these topics being discussed. Visit Sean on his personal website.TAPE3 is the Artificial Intelligence for ITSPmagazine, created to function as a guide, writing assistant, researcher, and brainstorming partner to those who adventure at and beyond the Intersection Of Technology, Cybersecurity, And Society. Visit TAPE3 on ITSPmagazine.
In this series, ‘Cyber Shadows Over Serenity,' we unravel the tales of three emblematic small businesses that stand as pillars in the peaceful community, each facing the dark storm of a ransomware attack that sought to shroud their digital realms in chaos. In Part 2, we pick up where we left off in Chapter 1 last time to re-enter the realm of Lexicon Hayven. Here, we find ourselves amidst Eleanor's meticulous preparations to guard against cyber malevolence. When we last visited, we discovered a well-scripted disaster recovery plan, a narrative etched with diligence and foresight, awaiting its execution.________This fictional story represents the results of an interactive collaboration between Human Cognition and Artificial Intelligence.Enjoy, think, share with others, and subscribe to "The Future of Cybersecurity" newsletter on LinkedIn.Sincerely, Sean Martin and TAPE3________Sean Martin is the host of the Redefining CyberSecurity Podcast, part of the ITSPmagazine Podcast Network—which he co-founded with his good friend Marco Ciappelli—where you may just find some of these topics being discussed. Visit Sean on his personal website.TAPE3 is the Artificial Intelligence for ITSPmagazine, created to function as a guide, writing assistant, researcher, and brainstorming partner to those who adventure at and beyond the Intersection Of Technology, Cybersecurity, And Society. Visit TAPE3 on ITSPmagazine.
In this series, ‘Cyber Shadows Over Serenity,' we unravel the tales of three emblematic small businesses that stand as pillars in the peaceful community, each facing the dark storm of a ransomware attack that sought to shroud their digital realms in chaos. In Part 2, we pick up where we left off in Chapter 1 last time to re-enter the realm of Lexicon Hayven. Here, we find ourselves amidst Eleanor's meticulous preparations to guard against cyber malevolence. When we last visited, we discovered a well-scripted disaster recovery plan, a narrative etched with diligence and foresight, awaiting its execution.________This fictional story represents the results of an interactive collaboration between Human Cognition and Artificial Intelligence.Enjoy, think, share with others, and subscribe to "The Future of Cybersecurity" newsletter on LinkedIn.Sincerely, Sean Martin and TAPE3________Sean Martin is the host of the Redefining CyberSecurity Podcast, part of the ITSPmagazine Podcast Network—which he co-founded with his good friend Marco Ciappelli—where you may just find some of these topics being discussed. Visit Sean on his personal website.TAPE3 is the Artificial Intelligence for ITSPmagazine, created to function as a guide, writing assistant, researcher, and brainstorming partner to those who adventure at and beyond the Intersection Of Technology, Cybersecurity, And Society. Visit TAPE3 on ITSPmagazine.
The recent report by Mozilla, shedding light on the privacy concerns around modern vehicles, struck a chord. Notably, every car brand reviewed, including behemoths like Ford, Volkswagen, and Toyota, flunked the privacy test. This revelation steered a fascinating conversation with Chris Pierson and Ingrid Gliottone from BlackCloak during a brand story recording for the Redefining Society podcast. Our focus veered towards the lurking privacy and security issues tied to the modern, tech-savvy vehicles we so casually entrust with our data.The modern car is no longer just a mode of transport—it's a smart gadget, a data hub on wheels. But as the wheels spin, so does the reel of our personal information, weaving into the vast web of data, ready for harvest by not just the car makers, but a string of 'they' – the infotainment system providers, app developers, network providers, and possibly cyber rogues. The conversation took a deeper dive as Chris, the CEO of BlackCloak, elucidated the firm's mission—shielding corporate executives and key personnel from personal cyber threats that could ricochet back to the corporations.The Mozilla report is an alarm bell, underscoring the high time to separate the wheat from the chaff in terms of what data is essential for functionality and what merely serves as a gold mine for advertisers or a hunting ground for cyber-attackers. This blend of privacy and security, or the lack thereof, is a cocktail we are forced to sip, as Ingrid pointed out the lack of clarity presented to buyers at the point of sale concerning the privacy policies tied to these vehicles.The promise of tech advancements in vehicles is dazzling—better shocks for off-roaders, safety features to prevent accidents during a sudden snooze, and so on. Yet, as Chris highlighted, there's a dark side. Some policies mentioned collecting data about one's sex life and genetic information— a far cry from the basic expectations of privacy.As the conversation with BlackCloak unrolled, the blend of excitement and concern was palpable. The question now is not about halting the march of technology but steering it towards a path where privacy and security are not the passengers but co-drivers.The findings from the Mozilla report and insights from BlackCloak are not just food for thought, but a call to action. It is crucial to reckon with the reality of the modern-day vehicles doubling as data hubs and to steer the conversation towards a road where transparency, consent, and security are the landmarks. I urge you to dive into BlackCloak's offerings to explore how they are redefining the security landscape, ensuring the privacy and security of your personal digital realm, including that computer on wheels parked in your driveway. Visit BlackCloak to discover what they offer in shielding the modern-day knights from the unseen arrows of the digital world.Guests:Chris Pierson, Founder and CEO of BlackCloak [@BlackCloakCyber]On Linkedin | https://www.linkedin.com/in/drchristopherpierson/On Twitter | https://twitter.com/drchrispiersonIngrid Gliottone, Chief Experience Officer of BlackCloak [@BlackCloakCyber]On LinkedIn | https://www.linkedin.com/in/ingridgliottone/ResourcesLearn more about BlackCloak and their offering: https://itspm.ag/itspbcwebAre you interested in telling your story?https://www.itspmagazine.com/telling-your-story
The recent report by Mozilla, shedding light on the privacy concerns around modern vehicles, struck a chord. Notably, every car brand reviewed, including behemoths like Ford, Volkswagen, and Toyota, flunked the privacy test. This revelation steered a fascinating conversation with Chris Pierson and Ingrid Gliottone from BlackCloak during a brand story recording for the Redefining Society podcast. Our focus veered towards the lurking privacy and security issues tied to the modern, tech-savvy vehicles we so casually entrust with our data.The modern car is no longer just a mode of transport—it's a smart gadget, a data hub on wheels. But as the wheels spin, so does the reel of our personal information, weaving into the vast web of data, ready for harvest by not just the car makers, but a string of 'they' – the infotainment system providers, app developers, network providers, and possibly cyber rogues. The conversation took a deeper dive as Chris, the CEO of BlackCloak, elucidated the firm's mission—shielding corporate executives and key personnel from personal cyber threats that could ricochet back to the corporations.The Mozilla report is an alarm bell, underscoring the high time to separate the wheat from the chaff in terms of what data is essential for functionality and what merely serves as a gold mine for advertisers or a hunting ground for cyber-attackers. This blend of privacy and security, or the lack thereof, is a cocktail we are forced to sip, as Ingrid pointed out the lack of clarity presented to buyers at the point of sale concerning the privacy policies tied to these vehicles.The promise of tech advancements in vehicles is dazzling—better shocks for off-roaders, safety features to prevent accidents during a sudden snooze, and so on. Yet, as Chris highlighted, there's a dark side. Some policies mentioned collecting data about one's sex life and genetic information— a far cry from the basic expectations of privacy.As the conversation with BlackCloak unrolled, the blend of excitement and concern was palpable. The question now is not about halting the march of technology but steering it towards a path where privacy and security are not the passengers but co-drivers.The findings from the Mozilla report and insights from BlackCloak are not just food for thought, but a call to action. It is crucial to reckon with the reality of the modern-day vehicles doubling as data hubs and to steer the conversation towards a road where transparency, consent, and security are the landmarks. I urge you to dive into BlackCloak's offerings to explore how they are redefining the security landscape, ensuring the privacy and security of your personal digital realm, including that computer on wheels parked in your driveway. Visit BlackCloak to discover what they offer in shielding the modern-day knights from the unseen arrows of the digital world.Guests:Chris Pierson, Founder and CEO of BlackCloak [@BlackCloakCyber]On Linkedin | https://www.linkedin.com/in/drchristopherpierson/On Twitter | https://twitter.com/drchrispiersonIngrid Gliottone, Chief Experience Officer of BlackCloak [@BlackCloakCyber]On LinkedIn | https://www.linkedin.com/in/ingridgliottone/ResourcesLearn more about BlackCloak and their offering: https://itspm.ag/itspbcwebAre you interested in telling your story?https://www.itspmagazine.com/telling-your-story
EP686 - O que é o Oracle Transparent Data Encryption (TDE)? Entre no nosso canal do Telegram para receber conteúdos Exclusivos sobre Banco de dados Oracle: https://t.me/joinchat/AAAAAEb7ufK-90djaVuR4Q
Ransomware gangs are focusing more on data theft and extortion, while skipping the encryption of networks. But should these attacks still be considered ransomware?
Companies update their data center security regularly, but well-defined Application Security policies are required to protect from cyberattacks, and it even makes the company stay one step ahead of cybercriminals. Application Security has become the most critical concern for companies taking a reactive approach to information security and Application Security. Companies are readily trying to take all the preventive measures to overcome the challenges of Application Security. What is Application Security? Application Security is the process of developing, deploying, and testing an application's security features to prevent security vulnerabilities from threats. It defines the security measures required at the application level to protect the application code and data from cyberattacks. Application Security includes software, hardware, and procedures to mitigate security vulnerabilities. Data Encryption, Antivirus, Firewalls, etc., are used to prevent unauthorized access to the application. It also includes security considerations during the application development and designing stage. It also helps implement various security policies and approaches to protect the application even after the deployment. View More: Challenges and Benefits of Application Security
On this week's episode, Adam and Andy talk about Apple's new Rapid Security update for iOS and Android. They also talk about different ways to encrypt data for protection. Finally, with layoffs still happening, they talk about how workforce reductions can have an impact on your security posture and how to be prepared for this. ------------------------------------------- Youtube Video Link: https://youtu.be/KM5fvWH8EVY ------------------------------------------- Documentation: https://support.apple.com/en-us/HT201224 ------------------------------------------- Contact Us: Website: https://bluesecuritypod.com Twitter: https://twitter.com/bluesecuritypod Linkedin: https://www.linkedin.com/company/bluesecpod Youtube: https://www.youtube.com/c/BlueSecurityPodcast Twitch: https://www.twitch.tv/bluesecuritypod ------------------------------------------- Andy Jaw Mastodon: https://infosec.exchange/@ajawzero Twitter: https://twitter.com/ajawzero LinkedIn: https://www.linkedin.com/in/andyjaw/ Email: andy@bluesecuritypod.com ------------------------------------------- Adam Brewer Twitter: https://twitter.com/ajbrewer LinkedIn: https://www.linkedin.com/in/adamjbrewer/ Email: adam@bluesecuritypod.com --- Send in a voice message: https://podcasters.spotify.com/pod/show/blue-security-podcast/message
Rand Hindi joins Doc Searls and Dan Lynch on FLOSS Weekly to discuss encryption and Zama.ai. Here's an explanation on what Zama is. For more, check out FLOSS Weekly: https://twit.tv/floss/727 Hosts: Doc Searls and Dan Lynch Guest: Dr Rand Hindi You can find more about TWiT and subscribe to our podcasts at https://podcasts.twit.tv/ Sponsor: GO.ACILEARNING.COM/TWIT
Rand Hindi joins Doc Searls and Dan Lynch on FLOSS Weekly to discuss encryption and Zama.ai. Here's an explanation on what Zama is. For more, check out FLOSS Weekly: https://twit.tv/floss/727 Hosts: Doc Searls and Dan Lynch Guest: Dr Rand Hindi You can find more about TWiT and subscribe to our podcasts at https://podcasts.twit.tv/ Sponsor: GO.ACILEARNING.COM/TWIT
Exploring TARTLE, a global real-time human intelligence and analysis platform Discussing the importance of ethically sourced, encrypted first-party data for AI TARTLE: A Secure Global Marketplace for Data Offering tools for sourcing initial training sets and targeted real-person model feedback Providing visualization and analysis tools for intelligence-driven decisions in AI Understanding the peer-to-peer approach for unlocking zero and first-party data Comprehensive Consumer Profile Datasets for Machine Learning and AI Specializing in model training sets and feedback tailored to specific needs Harnessing a diverse range of datasets from globally distributed members Ensuring top-notch data harvesting and evaluation by humans Seamless API Integration for Quality Real-time Data Discussing TARTLE's D2C Infrastructure and Strategy for model training sets Exploring the availability of unique and newly created data sets, including photos, audio, video recordings, and texts State-of-the-art Data Encryption and Marketplace Technologies Ensuring ethical creation and extraction of bespoke training data for AI systems Protecting data integrity and privacy The Importance of Clean Data for Data Scientists Acknowledging the potential consequences of bad data, such as project shutdowns and AI bias Defining clean data as unbiased, error-free, and representative of the population Emphasizing the need for ethical data collection methods and best practices Conclusion Reiterating the value of TARTLE's data-driven solutions for AI Encouraging the use of ethically sourced, secure, and comprehensive data for successful AI implementation For More Information Click Here TCAST Live is an education, business, and technology video podcast that informs listeners and viewers on the best practices, theory, and technical functions of the TARTLE exchange system and how it is designed to serve society with the highest and best intentions. The show is hosted by Co-Founder & Source Data Pioneer Alexander McCaig and Co-Host CMO Jason Rigby. TARTLE is free to join, forever and can be accessed at WWW.TARTLE.CO
Data-Encryption Technologies --- Send in a voice message: https://podcasters.spotify.com/pod/show/ben-uko/message
Meeting industry regulations is essential for protecting your organizational data and assets. However, Veritas advocates for taking these requirements further and isolating your data to become one of the 30% of organizations that fully recover after an attack. Join us for this next episode of Voice of Veritas and learn more about best practices in encryption and the value of implementing an air-gap solution. Resources referenced: Zero Trust Fundamentals Practical Example of Zero Trust Framework NetBackup Anomaly Detection Configuration (White Paper) Anomaly Detection in Action Fortifying Your Perimeter (White Paper) Fortify Your Perimeter: Stop the Spread of Ransomware Dead in its Tracks | VeritasSee omnystudio.com/listener for privacy information.
Listen to the December 8th, 2022 daily headline round-up and find all the top news that you need to know.
Episode: 2426 The National Institute of Standards and Technology. Today, an “average” guy.
Kenneth White (@kennwhite, Security Principle @MongoDB) talks about the causes of internal breaches, querying encrypted data vs encryption-at-rest, and database evolutions.SHOW: 644CLOUD NEWS OF THE WEEK - http://bit.ly/cloudcast-cnotwCHECK OUT OUR NEW PODCAST - "CLOUDCAST BASICS"SHOW SPONSORS:Streamline on-call, collaboration, incident management, and automation with a free 30-day trial of Lightstep Incident Response, built on ServiceNow. Listeners of The Cloudcast will also receive a free Lightstep Incident Response T-shirt after firing an alert or incident.Pay for the services you use, not the number of people on your team with Lightstep Incident Response. Try free for 30 days. Fire an alert or incident today and receive a free Lightstep Incident Response t-shirt.Granulate, an Intel company - Autonomous, continuous, workload optimizationgMaestro from Granulate - Kubernetes cost optimization, made easyDatadog Security Solution: Modern Monitoring and SecurityStart investigating security threats before it affects your customers with a free 14 day Datadog trial. Listeners of The Cloudcast will also receive a free Datadog T-shirt.SHOW NOTES:MongoDB Queryable EncryptionWired article with more backgroundMongoDB World presentation from June 2022Product page with FAQ & DocumentationPodcast interview with The New Stack from MDBW in JuneTopic 1 - Welcome to the show. You have quite a distinguished career in security and cryptography-adjacent. Tell us a little bit about your background, and what you focus on at MongoDB?Topic 2 - Unfortunately, we're hearing about more and more attacks that have an internal origination. From a security and cryptography perspective, what typically breaks down to allow this to happen? Topic 3 - MongoDB has recently launched a database that enables querying encrypted data. Give us some background on how this new concept came into being. Topic 4 - What are the technology components involved in making this happen - on the database side, on the application side, on the key management side? Topic 5 - What are some of the application use-cases where this new database technology makes sense?Topic 6 - How can people start exploring this technology? Is it available in both the software and SaaS offerings?FEEDBACK?Email: show at the cloudcast dot netTwitter: @thecloudcastnet
The big fear in the data encryption community is the advent of quantum computing. Computers so powerful they can crack any algorithm. The National Institute of Standards and Technology is in the midst of choosing among algorithms those its experts deem most resistant to quantum, as it develops post-quantum cryptography standards. Here with some pointers for federal IT security practitioners who want to better understand this technology, Federal News Network's Tom Temin spoke with the head of quantum cybersecurity at a company called Quantinuum, Duncan Jones.
Lorenzo Miniero of Meetecho and Janus WebRTC speaks with Jonathan Bennett and Doc Searls on FLOSS Weekly about securing WebRTC streams with encryption and SecureRTP. For more, check out FLOSS Weekly: https://twit.tv/floss/674 Hosts: Doc Searls and Jonathan Bennett Guest: Lorenzo Miniero You can find more about TWiT and subscribe to our podcasts at https://podcasts.twit.tv/
Lorenzo Miniero of Meetecho and Janus WebRTC speaks with Jonathan Bennett and Doc Searls on FLOSS Weekly about securing WebRTC streams with encryption and SecureRTP. For more, check out FLOSS Weekly: https://twit.tv/floss/674 Hosts: Doc Searls and Jonathan Bennett Guest: Lorenzo Miniero You can find more about TWiT and subscribe to our podcasts at https://podcasts.twit.tv/
The European Union passed legislation recently that targets big data, threatens to remove app encryption in order to cross-talk to smaller apps. What does this mean for Europeans? Madness? Are we going backwards in our encryption methods or are we moving forward? Are the Chinese doing it better?
In recent years, encryption has become an essential tool for cybersecurity and data protection. It's also one of the most important aspects of any business today - especially when it comes to cloud databases. Encryption will protect your data from being stolen or intercepted by third parties and maintain your privacy by ensuring your information is only accessible by the intended recipient and not by anyone else. There are many different types of encryption methods, but they all use similar principles, which Jon will cover in-depth in this episode. Join the conversation with Jon McLachlan as he shares about encryption in cyber security and data protection to provide you with tools to protect your data in order to avoid potential threats like cybercrime or data breaches. Jon is the co-founder and CEO of Peacemakr and the host of The Security podcast of Silicon Valley, and he has been in technology, cyber, and startups for a very long time. Tune in! During this episode, you will learn about; [00:06] A bit about Jon's career background [01:41] Jon's earliest inclination in tech, software, and security [03:29] Going from traditional computer science programming to security [06:21] Jon's experience working with Apple as a young graduate [08:48] What is software product security and examples [09:04] Jon's transition from Apple to his startup company [13:07] Building encryption system for your data protection [16:17] End-to-end encryption keys management system [20:02] Peacemakr and what they do in the encryption space [22:15] Self-driving encryption data security system [23:24] Management of encryptions keys in your applications [26:17] The future of security and the kind of scales to develop today [29:17] Get involved and participate to build your passion [30:13] Jon's podcast, The Security podcast of Silicon Valley [31:49] How to reach out and connect with Jon Notable Quotes Encryption gives you the power to control who sees your data Building encryption into a product is building a system that controls the distribution and access to its keys. Exploring will help you do your passion justice. We all share something, but we arrive at our destination using different paths. If you want something, go for it, there's never going to be a right time. Connect with Jon McLachlan Website: https://peacemakr.io/ Email: jon@peacemakr.io LinkedIn: https://www.linkedin.com/company/peacemakr-io Twitter: https://twitter.com/peacemakr4
Original blog postMore episodes at feeds.transistor.fm/google-cloud-readerPlease see our documentation for more information and reach out via this form to get started or with comments or questionsMore articles at cloud.google.com/blog
Today I will discuss: 1. What is data encryption? 2. What is symmetric & asymmetric encryption? 3. Data encryption demonstration. Watch
Polymorphic Cipher Encryption?Dragonchain | Den | Twitter | LinkedIn | Telegram| GitHub | Facebook | YouTube | RealDenizens | JoeBlockchain services and solutionshttps://dragonchain.com/business/Try our platform and build blockchain applications in any coding languagehttps://dragonchain.com/blockchain-platform Social ChannelsWatch Super Happy Dragon Lucky live on YouTube each Thursday:https://www.youtube.com/channel/UC2_StJYNWFrQz2wiL8n6hoADen:https://den.social/l/dragonden/Twitterhttps://twitter.com/dragonchaingang/ Telegramhttps://t.me/dragontalk/ Facebookhttps://facebook.com/Dragonchaingang/ Reddithttps://www.reddit.com/r/dragonchain/ Support the show (https://www.dragonchain.com)Support the show (https://www.dragonchain.com)
Today I will discuss: 1. What is the importance of Data Encryption? 2. How can you protect your valuable data through encryption? 3. Demonstration of the open-sourced Veracrypt encryption? Watch
In this episode of CISO Talks, we speak with CEO of Atakama, Daniel Gallancy about data encryption and how organizations have taken a lot of time to adopt this philosophy and bring it into the mainstream within cybersecurity. Daniel Gallancy: https://www.linkedin.com/in/gallancy/ https://www.atakama.com/ Also available on: IGTV: https://www.instagram.com/instalepide... Spotify: https://spoti.fi/2N0XGXR iTunes: https://apple.co/2N0sO9P Follow us on Social Media: LinkedIn - http://bit.ly/2FWHKoM Twitter - http://bit.ly/2FWNO0C Instagram - http://bit.ly/2FWMxXj Facebook - http://bit.ly/2FXb2Ue
Creating a Virtual Choir Using Zoom or YouTube? Encrypting your data, unable to reformat ones' backup drives, issues with the password manager in Chrome, darn cats and messing up your desktop, the best Linux distro's to try, troubleshooting an iDrive permissions issue, and more of your calls! Host: Leo Laporte Guests: Sam Abuelsamid and Chris Marquardt Download or subscribe to this show at https://twit.tv/shows/the-tech-guy. For detailed show notes, visit techguylabs.com. Sponsors: LastPass.com/twit GetRoman.com/TECHGUY
Creating a Virtual Choir Using Zoom or YouTube? Encrypting your data, unable to reformat ones' backup drives, issues with the password manager in Chrome, darn cats and messing up your desktop, the best Linux distro's to try, troubleshooting an iDrive permissions issue, and more of your calls! Host: Leo Laporte Guests: Sam Abuelsamid and Chris Marquardt Download or subscribe to this show at https://twit.tv/shows/the-tech-guy. For detailed show notes, visit techguylabs.com. Sponsors: LastPass.com/twit GetRoman.com/TECHGUY
Creating a Virtual Choir Using Zoom or YouTube? Encrypting your data, unable to reformat ones' backup drives, issues with the password manager in Chrome, darn cats and messing up your desktop, the best Linux distro's to try, troubleshooting an iDrive permissions issue, and more of your calls! Host: Leo Laporte Guests: Sam Abuelsamid and Chris Marquardt Download or subscribe to this show at https://twit.tv/shows/the-tech-guy. For detailed show notes, visit techguylabs.com. Sponsors: LastPass.com/twit GetRoman.com/TECHGUY
Creating a Virtual Choir Using Zoom or YouTube? Encrypting your data, unable to reformat ones' backup drives, issues with the password manager in Chrome, darn cats and messing up your desktop, the best Linux distro's to try, troubleshooting an iDrive permissions issue, and more of your calls! Host: Leo Laporte Guests: Sam Abuelsamid and Chris Marquardt Download or subscribe to this show at https://twit.tv/shows/the-tech-guy. For detailed show notes, visit techguylabs.com. Sponsors: LastPass.com/twit GetRoman.com/TECHGUY
Listen to the trailer for the new cybersecurity podcast series hosted by CDW and Cisco, Get IT: Cybersecurity insights for the forseeable future. Episodes coming soon!
Leo Laporte explains how to secure your data in the cloud by encrypting files before upload. pCloud: https://www.pcloud.com/ Cryptomator: https://cryptomator.org/ Host: Leo Laporte Download or subscribe to this show at https://twit.tv/shows/ask-the-tech-guy Sponsor: LastPass.com/twit
Leo Laporte explains how to secure your data in the cloud by encrypting files before upload. pCloud: https://www.pcloud.com/ Cryptomator: https://cryptomator.org/ Host: Leo Laporte Download or subscribe to this show at https://twit.tv/shows/ask-the-tech-guy Sponsor: LastPass.com/twit
Leo Laporte explains how to secure your data in the cloud by encrypting files before upload. pCloud: https://www.pcloud.com/ Cryptomator: https://cryptomator.org/ Host: Leo Laporte Download or subscribe to this show at https://twit.tv/shows/ask-the-tech-guy Sponsor: LastPass.com/twit
Leo Laporte explains how to secure your data in the cloud by encrypting files before upload. pCloud: https://www.pcloud.com/ Cryptomator: https://cryptomator.org/ Host: Leo Laporte Download or subscribe to this show at https://twit.tv/shows/ask-the-tech-guy Sponsor: LastPass.com/twit
A revisit to KCSB's Roger Nguyen's coverage of Apples plans to end data encryption. The tech giant Apple dropped plans to allow end-to-end encryption of their backups on the company’s iCloud service for users. This came amid several high-profile disputes with the United States Federal Bureau of Investigation.
Dave shares a story about the government compelling some tech giants to help find a WhatsApp drug dealer, Ben follows developments on the ClearView facial recognition story that the New York Times recently broke, and later in the show, our conversation with Tommy Ross. He serves as Senior Director of Policy, BSA | The Software Alliance, and we’re going to be discussing encryption and law enforcement access to data. Links to stories: Feds Order Massive Number Of Tech Giants To Help Hunt Down One WhatsApp Meth Dealer Google, YouTube, Venmo and LinkedIn send cease-and-desist letters to facial recognition app that helps law enforcement NEMA's Manufacturer Disclosure Statement for Medical Device Security Thanks to our sponsor, KnowBe4.
Cathy Bessant, Bank of America’s chief operations and technology officer, offers her takeaways from the first meeting of the Council on the Responsible Use of Artificial Intelligence. She also discusses some challenges banks are facing with cyberattacks and data encryption.
Historically host data encryption and array data reduction are like oil and water – they simply don't mix. But not any longer. Hear from Vaughn Stewart, Pure VP Alliances, and Blake Wood, Thales Director of Business Development, about a new joint solution announcement -- Vormetric Transparent Encryption for Efficient Storage – the IT and security industries' first end-to-end data encryption framework that realizes storage array data reduction. This new capability removes the compromise between encryption and storage efficiency, providing the granular access controls security professionals have come to expect from Thales combined with the industry-leading data reduction technologies from Pure Storage. For more information, check out: https://go.thalesesecurity.com/rs/480-LWA-970/images/pure-storage-and-thales-esecurity-sb.pdf
Earlier this week, Queensland senator Fraser Anning used his maiden speech in parliament to call for an end to Muslim immigration in Australia, invoking the "final solution to the immigration problem." We discuss what Anning's speech reflects to the state of race politics in Australia. Later, we chat to Lyndsey Jackson, Chair of Electronic Frontiers Australia, about a new law proposal which would create a process where the government would be able to access your encrypted data. She discusses the draft laws and how it would impact on our privacy. See omnystudio.com/listener for privacy information.
Virtual vs. Physical Privacy: This week Paul Ford and Rich Ziade talk about privacy around your data and devices. We talk about search warrants, argue about the systemic problems of the prison system, and look into the ways that encrypted messaging is influencing our laws. We also get a preview into Rich’s life as a lawyer! [audio player] ►iTunes/►SoundCloud/►Overcast/►Stitcher/►MP3 /►RSS 2:38— Paul: “Anybody can sue you for anything, at any time. So you need to be buttoned up, but also plan for that.” 4:48 — Paul: “In the future, if you ever want to start a business, buddy up with a lawyer. That’s my advice.” 9:42 — Rich:There’s laws right up to the constitution that protect our privacy in terms of our homes; our information. 14:07 — Rich: “How do you feel about technology that exists, that doesn’t allow for that next step?” 16:55— Paul: “I dont actually see a fundemental difference between a virtual entity (like a communication network) and a physical space (like this guy’s house).” 18:20— Paul: “It’s very hard to ban end-to-end encryption, if people want it”. 19:41 — Rich: “Privacy is sacred, and it should be respected, unless there is enough reason to infringe on it because a greater good is being threatened or harm is being inflicted in some way.” LINKS Fact Pattern Probable Cause Signal Telegram Track Changes is the weekly technology and culture podcast from Postlight, hosted by Paul Ford and Rich Ziade. Production, show notes and transcripts by EDITAUDIO. Podcast logo and design by Will Denton of Postlight.
Law enforcement agencies including the FBI have long criticized data encryption as a threat to their ability to fight crime. They argue that encryption allows bad actors to "go dark," impeding agents' ability to access the data of suspects, even with court orders or warrants. After years of raising the alarm about the going dark problem, though, officials have yet to convince privacy advocates that undermining encryption protections would do more good than harm.
With mere days left until GDPR (General Data Protection Regulation) comes into force, now is the perfect time to revisit our December 2017 podcast on data encryption. Whether you’re working toward GDPR compliance, considering cloud migration or just looking for best practices to get encryption right, take 16 minutes and listen to this podcast with special guest Chase Cunningham, Principal Analyst Serving Security and Risk Professionals at Forrester Research. To learn more, read the white paper, "Guard Your Organization’s Data with Intelligent IBM Encryption" [ibm.co/2AuNXWB].
Data encryption does not need to be difficult, but there's admittedly more to it than just turning on the encryption faucet. If you’re working toward GDPR readiness, considering cloud migration or just looking for best practices to get encryption right, take 13 minutes and listen to this podcast with special guest Chase Cunningham, Principal Analyst Serving Security and Risk Professionals at Forrester Research. To learn more, read the white paper, "Guard Your Organization’s Data with Intelligent IBM Encryption" [https://ibm.co/2AuNXWB].
Seth Vargo, the Director of Technical Advocacy at HashiCorp, joined the show to talk about managing secrets with their open source product called Vault which lets you centrally secure, store, and tightly control access to secrets across distributed infrastructure and applications. We talked about Seth’s back story into open source, use cases, what problem it solves, key features like Data Encryption, why they choose to write it in Go, and how they build tooling around the open core model.
Seth Vargo, the Director of Technical Advocacy at HashiCorp, joined the show to talk about managing secrets with their open source product called Vault which lets you centrally secure, store, and tightly control access to secrets across distributed infrastructure and applications. We talked about Seth’s back story into open source, use cases, what problem it solves, key features like Data Encryption, why they choose to write it in Go, and how they build tooling around the open core model.
This is a recording of our April 2016 meeting. First up, we have our regular What's New segment with Ryan Spears, then we have two presentations. The first is from Duncan Greaves about "Data Encryption using .Net and SQL Server", and then finally we have Dr Tom Tilley on "Building an Army of $10 Robots with HTML 5 and Node.js"
Show discussing news, politics and culture from the perspective of Ayn Rand's philosophy, Objectivism. Hosted by Amy Peikoff.
CTOBOB TECHNOLOGY PODCAST Host: Bob Pellerin Guest: Mayukh Gon of PerfectCloud.io Topic: Encyption in the cloud Episode 015 Description CTOBOB podcast’s Bob Pellerin discusses data encyption, single sign-on and security in the cloud with Mayukh Gon of PerfectCloud.io.
Encryption Box Technical director, Phil Smith, explained why a programme like EncryptionBox will prove to be a life-saver for companies the world over. "It is absolutely vital to encrypt your data; we're at the stage where data loss is pandemic. A lot of businesses are being attacked by hackers, some of which charge as much as £4000 to return files back to their owners. Likewise, the Information Commissioners Office (ICO) are clamping down on British organisations that lose data," he said. "People aren't taking on board how important it is to encrypt. Top end businesses think they're secure and won't be attacked -- but the MoJ losing all their prisoners' details prove this isn't true. And SMEs are burying their heads in the sand thinking they won't be a target. "Everyone is a target. Hackers don't care whose data they steal, as long as they can sell it for thousands of pounds. There is nothing out there on the market that can protect data as well as EncryptionBox. Our level of encryption is so advanced, and is completely unique; there is nothing else as powerful." EncryptionBox uses several dual hexacore servers to store and safely encrypt all its users' data. It also employs terabytes of storage, secure firewalls and encrypted backup services to ensure no single point of failure. Phil said: "As well as our backups and firewalls, we need the speed and robustness that UKFast provide because if we get several clients hitting the system at once and uploading masses of files, we need to be able to handle that pressure, and we've never been let down yet. "It's also vital to us to host with a company that boasts security accreditations and that was one of the main things that attracted us to UKFast. In fact, UKFast ticked all the boxes; it holds the right security accreditations, owns its own data centres and run entirely from the UK. "When we visited the data centre, we were blown away by the quality of service UKFast offer." Phil sees a bright future for EncryptionBox, and is confident that the work ethic, care and high quality of technology provided by UKFast means the service will always be supported and secure. He said: "UKFast is an example of the way an organisation should be run. The staff have not been able to go far enough for us, and everybody has jumped on board in support of what we are doing. "I am 100% confident UKFast will be by our side every step of the way on our journey. Maybe one day, we'll be building a data centre together."
NetApp and Brocade experts discuss ways to strengthen data centers with storage security solutions that protect critical data.