Podcasts about intel security

American global computer security software company

  • 55PODCASTS
  • 71EPISODES
  • 40mAVG DURATION
  • ?INFREQUENT EPISODES
  • Dec 6, 2023LATEST
intel security

POPULARITY

20172018201920202021202220232024


Best podcasts about intel security

Latest podcast episodes about intel security

Interviews: Tech and Business
What is an Enterprise Web Browser?

Interviews: Tech and Business

Play Episode Listen Later Dec 6, 2023 39:10


In the rapidly evolving landscape of enterprise technology, consumer web browsers have become front doors to the enterprise, serving as the critical pathway for corporate data and applications. This shift from consumer to enterprise technology has created a host of security, privacy, and productivity issues related to browsers.To gain deeper insights into this transformation, we spoke with Mike Fey, CEO of Island.io, for a focused discussion on the emergent field of enterprise web browsers, an area increasingly critical in business technology strategy.*The discussion highlights three core points:**Enterprise-Specific Design:* Mike Fey elaborates on the development of Island's enterprise browser, emphasizing its core purpose to serve the unique balance of security, functionality, and user experience needed in business settings.*Consumer Web Browser Challenges and Limitations:* Fey identifies key limitations of traditional web browsers in the enterprise context. He explains how enterprise browsers address these issues by offering advanced security, efficient data management, and business process integration.*Productivity and Efficiency Opportunities:* The enterprise browser is presented not just as a technological innovation, but as a strategic business tool. Fey discusses its role in enhancing productivity, simplifying enterprise operations, and meeting the evolving tech demands of modern businesses.Watch on the site and read transcript: https://www.cxotalk.com/episode/what-is-an-enterprise-web-browserMike Fey leads Island as co-founder and CEO, relying on his extensive experience in cyber security, enterprise software and cloud technology. Fey served as president and chief operating officer at Symantec and prior to joining Symantec, he served as president and chief operating officer of Blue Coat, leading all product and go-to-market functions at both organizations. While at Blue Coat, Fey led the company to aggressive growth, resulting in its acquisition by Symantec for $4.7 billion in 2016.Prior to that, Fey was executive vice president and general manager for enterprise products at McAfee and chief technology officer of Intel Security playing a pivotal role in Intel's acquisition of McAfee for $7.7 billion in 2010. He co-author of Security Battleground: An Executive Field Manual, providing a playbook for security obligated executives coping with the new realities of cyber security responsibilities to the board.#cxotalk #enterprisebrowser #webbrowser #enterprise

Cyber Security Weekly Podcast
Episode 387 - Digital Devices at Risk – Understanding and Countering Firmware Threats

Cyber Security Weekly Podcast

Play Episode Listen Later Dec 5, 2023


Dr. Yuriy Bulygin is the CEO and founder of Eclypsium, the digital supply chain security company that helps organizations protect their critical hardware, firmware, and software. Prior to Eclypsium, Yuriy was Chief Threat Researcher and led the Microprocessor Security Analysis team at Intel Corporation, as well as the Advanced Threat Research team at Intel Security. He is also the creator of CHIPSEC, the popular open-source firmware and hardware supply chain security assessment framework. When enterprises started using CHIPSEC to find vulnerabilities, discover compromised firmware, or just poke around hardware systems, Yuriy founded Eclypsium with Alex Bazhaniuk. Since then Eclypsium has been on a mission to protect devices from supply chain risks.In this interview, Yuriy highlights the potential vulnerabilities in the firmware (software running the hardware) in today's digital devices, and the risk posed by threat actors.Using a typical PC as an example, which involves contributions from over 265 suppliers, each with its components and code, he notes the ubiquity of software, and liken the supply chain of such a device to a “Wild West”:“at any point in the supply chain, at any of those links in the supply chain, a compromise may happen”, and “ all of these components and all the code that is developed by those suppliers and vendors has vulnerabilities.”He elaborated that “even if it's OK now … 3 months from now, it can be compromised because of those vulnerabilities.”To give an example, he referenced the recently discovered threat in the wild – “BlackLotus”, an evolution of threats based on open-source frameworks – e.g. Lojax, MosaicRegressor, Moon bounce - discovered in the past 3 to 4 years. He highlighted the characteristics of such threats:• These UEFI compromises allow attackers to compromise equipment remotely, for access or persistent malware installation. • They cannot be removed by reinstalling operating system or reimaging or even replacing the hard drive.• BlackLotus exploitation of the UEFI system vulnerabilities, particularly the Secure Boot - a fundamental security feature adopted by modern operating systems - sets it apart as an advanced threat, marking the first instance of such threats discovered "in the wild."He explained that compromising firmware is attractive for threat actors for many reasons:• Stay hidden: Detection and protection controls operate at the software application level and above, but there is no equivalent for firmware.• Achieve "Persistence" - where traditional mitigation measures cannot remove the malware/threats.• Simplicity – for example, exploiting firmware vulnerabilities to gain access is much simpler than developing a very complicated exploit chain.• Gain high privileges – Remain hidden and persistent while gaining high level of privileges.To mitigate against malicious firmware implants, Yuriy suggested, (a) assess the supply chain risks (e.g. potential vulnerabilities and threats introduced during procurement and deployment), (b) continuous monitoring of system integrity, (c) implement specialized technologies designed for malicious firmware detection. Recorded at Singapore International Cyber Week / Govware 2023 – 18th October 2023, 3pm.#mysecuritytv #govware #sicw

The Engineering Leadership Podcast
Strategies for creating efficient orgs & getting the most out of your eng team w/ Jamie Tischart #150

The Engineering Leadership Podcast

Play Episode Listen Later Oct 10, 2023 51:18


Jamie Tischart, CTO @ Bettercloud, discusses how to identify inefficiencies within your eng org & strategies for creating more efficient teams! He shares his experience at Bettercloud as one of several concurrent senior hires & why he discovered that coordination is key when hiring multiple new senior hires at once. We also chat about strategies for identifying / removing barriers that are getting in the way of your eng team's success, making / communicating meaningful decisions, identifying inefficiencies that come up within cross-functional relationships, and frameworks for turning communication from your org's greatest area of inefficiency to an asset.ABOUT JAMIE TISCHARTJamie Tischart serves as the Chief Technology Officer, where he is responsible for the broader technology strategy of the business as well as the day-to-day leadership of development, quality and architecture teams for the BetterCloud product suite.Jamie brings nearly three decades of experience leading technology and product teams through periods of rapid growth and product transformation. Most recently, he served as GM and VP, Software Engineering of the Marketing & Growth BU at Twilio where he was responsible for defining the product and technical strategy while focusing on the customer experience and driving highly reliable solutions for Twilio's customers.Previously, Tischart was VP, Technical Operations at SendGrid where he led the company's Global Data Center and DevOps strategies across the business. Prior to that, he served as CTO of the Security-as-a-Service business at McAfee where he led the creation of Intel Security's future generation Cloud solutions. He has also held leadership roles at a number of other prominent technology companies including Intel. Jamie holds an MBA from Aspen University and B.A from St. Lawrence College."The biggest value for us is to move purposely and slowly and hear what is going on before we make decisions. The second was, what is the biggest problem that we are coming in to solve? Like why were each of us hired? It came down to, and this was difficult for a couple of the department heads was, 'Look, the biggest problem isn't in your area. I'm sorry. Yes. Let's put together a plan of how do we improve and what do we focus on in your group? But quite frankly, the focus is going to be in this area.' That was difficult for people to accept.”- Jamie Tischart   Check out Jellyfish's Scenario Planner to help you accelerate your development!With Jellyfish's Scenario Planner, you can analyze tradeoffs, and optimize resources - to ensure your highest priority initiatives meet your delivery goals and deadlines!To learn more about how Scenario Planner can help you better accelerate, predict & plan your software delivery

The Sure Shot Entrepreneur
US-India Startup Ecosystem is Booming

The Sure Shot Entrepreneur

Play Episode Listen Later Sep 12, 2023 31:33


Priya Ramachandran, founder and managing partner at Foster Ventures, recounts her remarkable odyssey from the tech world in India to her venture capital journey in the heart of Silicon Valley. She candidly discusses her evolution as a VC, starting as an angel investor, and passionately elaborates on the core values and principles that underpin the foundation of Foster Ventures. Priya also expresses her enthusiasm for the imminent surge of innovation poised to emerge from the dynamic cross-border US-India startup ecosystem.In this episode, you'll learn:[2:42] The advantages and responsibilities of angel investing[9:25] Key considerations when choosing an investor in the pre-seed to seed stage[14:27] The path to achieving startup success: crafting a precise problem statement, building with integrity, and maintaining agility during implementation.[18:58] Founder's dilemma: balancing speed with the importance of doing things right[27:19] Fostering a robust US-India startup ecosystem will take true community buildingThe non-profit organization that Priya is passionate about: SaaSBOOMiAbout Priya RamachandranPriya Priya Ramachandran is the Founder and Managing Partner of Foster Ventures. As an Operator and a GTM expert, Priya works with cross-border companies and helps entrepreneurs with product market fit, international market entry advice and introductions. Before starting Foster Ventures, Priya was with BoldCap, BetterCloud, Coupa, Intel Security and LogiGear Corporation leading various strategic operational roles with a focus on Product Strategy, Customer Strategy & Adoption and Customer Success. Priya is also an active mentor at SaaSBOOMi with a focus on enabling and empowering cross-border founders.About Foster VenturesFoster Ventures is a Silicon Valley-based early-stage venture capital firm with a focus on B2B Enterprise SaaS. As an operator-led VC, Foster works with early-stage startups, supporting founders building global products. Portfolio companies include vitrina, rocketlane, atomicwork, lyric, SimpliContract among others.Subscribe to our podcast and stay tuned for our next episode.

Leading Innovation
The Life-Changing Practice of Paying Attention: Paul Angone

Leading Innovation

Play Episode Listen Later Jun 5, 2023 47:36


Whether you know it or not, there is a war happening right now for your attention. How are you directing your attention and focus at work and in life? Or are you losing the battle to distractions? Paying attention is a lost art and if you're going to fully engage your day, your goals, and your people, you should employ the intentional strategies from Paul Angone, author of Listen to Your Day. In this episode we discuss what prompted him to write the book, how to pay attention to people, and the different generations in the workforce. About Paul AngonePaul Angone is one of the leading voices in the nation on getting generations to work better together.He is the best-selling author of the new book 101 Questions You Need to Ask in Your Twenties: (and let's be honest, your thirties too),  101 Secrets For Your Twenties and All Groan Up: Searching For Self, Faith, and a Freaking Job!, a sought-after national keynote speaker for corporations and keynote speaker for colleges and universities, and the creator of AllGroanUp.com, which has been read by millions of people in 190 countries.Paul is also an organizational consultant, trainer, and Millennial influencer who specializes in helping companies attract, retain, develop, and harness the best strengths of the Millennial and Gen Z generations. Paul has been honored to work with amazing companies like Intel Security, Wells Fargo, and Aflac through speaking engagements and Millennial influencer branding and awareness campaigns.Paul also has created a cutting-edge proprietary process to assist organizations in attracting, retaining, and motivating the younger workforce, called “Millennial Mapping”.Paul is a media spokesperson on the unique challenges facing the Gen Z and Millennial generations, and has done hundreds of radio, TV, and podcast interviews. Paul frequently contributes, and has been featured, in publications such as Bloomberg, Chicago Tribune, Business Insider, Huffington Post, EntreLeadership, Relevant Magazine, etcera.  

To The Point - Cybersecurity
Time for the Cyber Walls to Come Down with Eric Trexler

To The Point - Cybersecurity

Play Episode Listen Later Jan 17, 2023 53:51


This week we welcome back to the podcast former co-host Eric Trexler, Senior Vice President, U.S. Public Sector at Palo Alto Networks. We examine some hot security topics for the year ahead including growing prevalence of AI/ML automation used for preventative security, continued evolution and impact of ransomware (Did you know the average dwell time is 28 days?!), increasing adoption of people/process/technology approaches, industry consolidation, state and local cybergrants coming online and the opportunities those open up, Zero Trust pros and cons, attack surface management and what's been learned about cyberwarfare from the Ukraine conflict.   Eric Trexler, Senior Vice President, US Public Sector, Palo Alto Networks Eric joined Palo Alto Networks in September of 2022 and oversees the US Public Sector business. Most recently, Eric Trexler was the Vice President of Sales, Global Governments and Critical Infrastructure at Forcepoint. Eric was responsible for Global Go To Market operations to include all components of sales, sales enablement, and field and product marketing. While at Forcepoint, Eric's team doubled the size of the business over a five year period to nearly $400M in annual sales and strategically moved a large part of the business to the Public Cloud. Eric has nearly 30 years of experience in technology across the public and private sectors, including Department of Defense, Civilian, and Intelligence communities, along with International governments. Eric has combined his sales savvy and technical skills with practical knowledge of leadership fundamentals to solve global cybersecurity issues for his customers and the business. Prior to Forcepoint, Eric was the executive director for Civilian and National Security Programs at McAfee (formerly Intel Security). Earlier in his career, Eric worked at [Salesforce.com](http://Salesforce.com "‌"), EMC, and Sybase. He spent four years as an Airborne Ranger with the U.S. Army specializing in communications. Eric holds a Master's Degree in Business Administration and a Bachelor's of Science in Marketing from the University of Maryland at College Park. He was the co-host of the award winning “To The Point Cybersecurity” podcast with over 200 weekly episodes covering various cybersecurity topics, and he regularly writes bylines for cybersecurity and national periodicals. For links and resources discussed in this episode, please visit our show notes at https://www.forcepoint.com/govpodcast/e216

Futurum Tech Podcast
Data Protection is Driving New Business Opportunities

Futurum Tech Podcast

Play Episode Listen Later Dec 14, 2022 36:06


On this episode of the Futurum Tech Webcast – Interview Series, Futurum principal analyst Daniel Newman is joined by Brian Richardson, Security Marketing Lead for Intel Data Center & AI (DCAI) Marketing Product Strategy. Their conversation takes a look at the security market and what enterprise IT leaders need to be aware of for the future. In our conversation, we discussed the following: What role Intel is playing with security in today's business market How Intel's approach to security is influenced by their mindset, technology, and assurance policy How Intel is contributing to the global ecosystem Intel's latest innovations Recommendations for enterprise IT leaders for the future It was a great conversation on a timely topic, and one you won't want to miss. To learn more about Intel, check out their website here. This webcast is sponsored by Intel. 

To The Point - Cybersecurity
World's First Cyber War with Rachael Lyon and Eric Trexler

To The Point - Cybersecurity

Play Episode Listen Later Jun 28, 2022 49:43


This week Rachael and Eric discuss the recently published "Defending Ukraine: Early Lessons from the Cyber War" report from Microsoft and the accompanying blog post by Microsoft President and Vice Chair Brad Smith. They share insights and raise lingering questions on the report's findings and the five conclusions Microsoft framed from the war's first four months. They also briefly share insights from the June 2022 cyberdefense research report "The IT Army of Ukraine" from Stefan Soesanto of the Center for Security Studies in Zurich. So much to unpack in this week's episode! There will definitely be follow-on episodes with key players from these reports that you won't want to miss! Host Rachael Lyon Rachael Lyon brings her journalistic curiosity and more than 20 years in technology working with global industry leaders and innovative start-ups to dig into today's cyber news and trends impacting us all. Co-host Eric Trexler Eric Trexler is Vice President of Sales, Global Governments, Forcepoint. Eric has more than 21 years of experience in the technology industry with both the public and private sectors including the DoD, Civilian, and Intelligence components. Prior to joining Forcepoint, Eric was the Executive Director for Civilian and National Security Programs at McAfee, formerly Intel Security. Prior to joining McAfee in 2010, he managed multi-million dollar accounts at Salesforce.com, EMC Corporation and Sybase, Inc. Eric served as an Airborne Ranger with the United States Army for four years, specializing in communications. He holds a bachelor's degree in marketing and an MBA with a concentration in strategy, both from the University of Maryland at College Park. LinkedIn https://www.linkedin.com/in/eric-trexler-8b6b39/ https://www.linkedin.com/in/rachaellyon/ For links and resources discussed in this episode, please visit our show notes at https://www.forcepoint.com/govpodcast/e187

Comparative Agility
Comparative Software Security with Brook Schoenfield and Dr. James Ransome

Comparative Agility

Play Episode Listen Later Jun 27, 2022 29:08


In this episode we talk with Brook Schoenfield and Dr. James Ransome about the Comparative Software Security capability and how it can help your teams build security into their product development practices. Brook S.E. Schoenfield is the author of Secrets Of A Cyber Security Architect (Auerbach, 2019) and Securing Systems: Applied Security Architecture and Threat Models (CRC Press, 2015). Building In Security At Agile Speed (with James Ransome, Auerbach, 2021), focuses on software security for continuous development practices and DevOps. Brook helps clients with their software security and secure design practices. He mentors technical leaders to effectively deliver security strategy. He is a technical leader and advisor to Resilient Software Security, LLC and True Positives, LLC. Previously, he technically led product security architecture at McAfee (Intel), Cisco Engineering, IT security architecture at Autodesk, and Web and Application security for Cisco Infosec. He is a founding member of IEEE's Center for Secure Design and is a featured Security Architect at the Bletchley Park Museum of Computing. He is the originator of Baseline Application Vulnerability Assessment (BAVA), Just Good Enough Risk Rating (JGERR), Architecture, Threats, Attack Surfaces and Mitigations (ATASM) and developer-centric security. He contributed to Core Software Security (CRC Press, 2014), and co-authored The Threat Modeling Manifesto (2020), Avoiding the Top 10 Security Design Flaws (IEEE, 2014) and Tactical Threat Modeling (SAFECode, 2017). Dr. James Ransome, PhD, CISSP, CISM is the Chief Scientist for CYBERPHOS, an early stage cybersecurity startup. Most recently, James was the Senior Director of Security Development Lifecycle Engineering for Intel's Product Assurance and Security (IPAS). In that capacity, he led a team of SDL engineers, architects, and product security experts to drive and implement security practices across the company. Prior to that, James was the Senior Director of Product Security and PSIRT at Intel Security (formerly McAfee). James's career includes leadership positions in the private and public sectors. He served in three chief information security officer (CISO) roles at Applied Materials, Autodesk, and Qwest Communications and four chief security officer (CSO) positions at Pilot Network Services, Exodus Communications, Exodus Communications—Cable and Wireless Company, and Cisco Collaborative Software Group. Before entering the corporate world, He worked in government service for 23 years supporting the U.S. intelligence community, federal law enforcement, and the Department of Defense. --- Send in a voice message: https://podcasters.spotify.com/pod/show/comparativeagility/message

To The Point - Cybersecurity
Eric Trexler and Rachael Lyon Live from Cabo

To The Point - Cybersecurity

Play Episode Listen Later May 31, 2022 29:12


This week co-hosts Eric and Rachael are coming to you live from Cabo San Lucas! They cover hot topics including CyberWire's new CISA Cybersecurity alerts, the impact of ransomware on a 157 year-old university in Illinois, Colonial Pipeline's nearly $1M proposed fine by the Department of Transportation Pipeline and Hazardous Materials Safety Administration and the recent surge in tractor hacking! Rachael Lyon Rachael Lyon brings her journalistic curiosity and more than 20 years in technology working with global industry leaders and innovative start-ups to dig into today's cyber news and trends impacting us all. Eric Trexler Eric Trexler is Vice President of Sales, Global Governments, Forcepoint. Eric has more than 21 years of experience in the technology industry with both the public and private sectors including the DoD, Civilian, and Intelligence components. Prior to joining Forcepoint, Eric was the Executive Director for Civilian and National Security Programs at McAfee, formerly Intel Security. Prior to joining McAfee in 2010, he managed multi-million dollar accounts at Salesforce.com, EMC Corporation and Sybase, Inc. Eric served as an Airborne Ranger with the United States Army for four years, specializing in communications. He holds a bachelor's degree in marketing and an MBA with a concentration in strategy, both from the University of Maryland at College Park. For links and resources discussed in this episode, please visit our show notes at https://www.forcepoint.com/govpodcast/e183

Dragonz | Artes Marciales y Deportes de Contacto
1093 | Van Damme en Bollywood y otras noticias "marciales"...

Dragonz | Artes Marciales y Deportes de Contacto

Play Episode Listen Later May 5, 2022 46:38


"No dejes nunca de luchar, pero nunca luches en vano”. (Jesús Grandío). Hoy nuestro programa se lo dedicamos a todos los que se vuelven locos creando una contraseña que no se les olvide... ¡y luego la ponen en todas sus Apps! porque hoy es... ¡el Dia Internacional de la Contraseña! El primer jueves del mes de mayo se celebra el Día Mundial de la Contraseña, una fecha que pretende concienciar al usuario de la importancia que tiene establecer contraseñas y claves seguras y robustas, ya que éstas son la llave de nuestra información personal. El origen de esta fecha parte del investigador en seguridad Mark Burnett que en su libro Perfect Passwords (2005) anima a las personas a establecer un nivel de seguridad alto en la elección y uso de las contraseñas, y propuso celebrar un día para concienciar sobre ello. Inspirado en esta idea, Intel Security tuvo la iniciativa de declarar un Día Mundial de la Contraseña, que se celebraría el primer jueves de mayo, desde el año 2013. ¿Y qué tenemos en nuestro programa de hoy? Pues un poco de todo, artes marciales tradicionales, Mma y sobre todo... ¡MUCHO CINE MARCIAL!

Cybersecurity: Amplified And Intensified
64 - Inside Intel Security with Tom Garrison & Camille Morhardt

Cybersecurity: Amplified And Intensified

Play Episode Listen Later Apr 28, 2022 29:52


Tom Garrison is Vice President and General Manager of Client Security Strategy & Initiatives at Intel Corporation   Camille Morhadt is Director, Security Initiatives and Communications, Intel   You can listen in on their podcast at https://cybersecurityinside.com/  This episode is available on YouTube: https://www.youtube.com/watch?v=iFDfcT7lqE8 Shiva Maharaj https://www.linkedin.com/in/shivamaharaj https://twitter.com/kontinuummsp https://www.kontinuum.com/ https://www.buymeacoffee.com/shivaemm --- Support this podcast: https://anchor.fm/amplifiedandintensified/support

Screaming in the Cloud
Security Challenges and Working for President Biden with Jackie Singh

Screaming in the Cloud

Play Episode Listen Later Sep 30, 2021 41:45


About JackieJackie Singh is an Information Security professional with more than 20 years of hacking experience, beginning in her preteen years. She began her career in the US Army, and deployed to Iraq in 2003. Jackie subsequently spent several years in Iraq and Africa in cleared roles for the Department of Defense.Since making the shift to the commercial world in 2012, Jackie has held a number of significant roles in operational cybersecurity, including Principal Consultant at Mandiant and FireEye, Global Director of Incident Response at Intel Security and McAfee, and CEO/Cofounder of a boutique consultancy, Spyglass Security.Jackie is currently Director of Technology and Operations at the Surveillance Technology Oversight Project (S.T.O.P.), a 501(C)(3), non-profit advocacy organization and legal services provider. S.T.O.P. litigates and advocates to abolish local governments' systems of mass surveillance.Jackie lives in New York City with her partner, their daughters, and their dog Ziggy.Links: Disclose.io: https://disclose.io Twitter: https://twitter.com/hackingbutlegal TranscriptAnnouncer: Hello, and welcome to Screaming in the Cloud with your host, Chief Cloud Economist at The Duckbill Group, Corey Quinn. This weekly show features conversations with people doing interesting work in the world of cloud, thoughtful commentary on the state of the technical world, and ridiculous titles for which Corey refuses to apologize. This is Screaming in the Cloud.Corey: This episode is sponsored in part by our friends at VMware. Let's be honest—the past year has been far from easy. Due to, well, everything. It caused us to rush cloud migrations and digital transformation, which of course means long hours refactoring your apps, surprises on your cloud bill, misconfigurations and headache for everyone trying manage disparate and fractured cloud environments. VMware has an answer for this. With VMware multi-cloud solutions, organizations have the choice, speed, and control to migrate and optimizeapplications seamlessly without recoding, take the fastest path to modern infrastructure, and operate consistently across the data center, the edge, and any cloud. I urge to take a look at vmware.com/go/multicloud. You know my opinions on multi cloud by now, but there's a lot of stuff in here that works on any cloud. But don't take it from me thats: VMware.com/go/multicloud and my thanks to them again for sponsoring my ridiculous nonsense.Corey: This episode is sponsored in part by “you”—gabyte. Distributed technologies like Kubernetes are great, citation very much needed, because they make it easier to have resilient, scalable, systems. SQL databases haven't kept pace though, certainly not like no SQL databases have like Route 53, the world's greatest database. We're still, other than that, using legacy monolithic databases that require ever growing instances of compute. Sometimes we'll try and bolt them together to make them more resilient and scalable, but let's be honest it never works out well. Consider Yugabyte DB, its a distributed SQL database that solves basically all of this. It is 100% open source, and there's not asterisk next to the “open” on that one. And its designed to be resilient and scalable out of the box so you don't have to charge yourself to death. It's compatible with PostgreSQL, or “postgresqueal” as I insist on pronouncing it, so you can use it right away without having to learn a new language and refactor everything. And you can distribute it wherever your applications take you, from across availability zones to other regions or even other cloud providers should one of those happen to exist. Go to yugabyte.com, thats Y-U-G-A-B-Y-T-E dot com and try their free beta of Yugabyte Cloud, where they host and manage it for you. Or see what the open source project looks like—its effortless distributed SQL for global apps. My thanks to Yu—gabyte for sponsoring this episode.Corey: Welcome to Screaming in the Cloud. I'm Corey Quinn. The best part about being me—well, there's a lot of great things about being me, but from my perspective, the absolute best part is that I get to interview people on the show who have done awesome and impressive things. Therefore by osmosis, you tend to assume that I'm smart slash know-what-the-living-hell-I'm-talking-about. This is proveably untrue, but that's okay.Even when I say it outright, this will fade into the depths of your mind and not take hold permanently. Today is, of course, no exception. My guest is Jackie Singh, who's an information security professional, which is probably the least interesting way to describe who she is and what she does. Most recently, she was a senior cybersecurity staffer at the Biden campaign. Thank you so much for joining me. What was that like?Jackie: Thank you so much for having me. What was that like? The most difficult and high-pressure, high-stress job I've ever had in my life. And, you know, I spent most of my early 20s in Iraq and Africa. [laugh].Corey: It's interesting, you're not the first person to make the observation that, “Well, I was in the military, and things are blowing up all around, and what I'm doing next to me is like—‘oh, the site is down and can't show ads to people?' Bah, that's not pressure.” You're going the other direction. It's like, yeah, this was higher stress than that. And that right there is not a common sentiment.Jackie: I couldn't anticipate, when I was contacted for the role—for which I had applied to through the front door like everyone else, sent in my resume, thought it looked pretty cool—I didn't expect to be contacted. And when I was interviewed and got through the interviews and accepted the role, I still did not properly anticipate how this would change my life and how it would modify my life in the span of just a few months; I was on the campaign for five to six months.Corey: Now, there's a couple of interesting elements to this. The first is it's rare that people will say, “Oh, I had a job for five to six months,” and, a, put it on their resume because that sounds like, “Ah, are you one of those job-hopper types?” But when you go into a political campaign, it's very clearly, win or lose, we're out of jobs in November. Ish. And that is something that is really neat from the perspective of career management and career planning. Usually is, “Hey, do you want a six-month job?” It's, “Why? Because I'm going to rage quit at the end of it. That seems a little on the weird side.” But with a campaign, it's a very different story. It seems like a different universe in some respects.Jackie: Yes, absolutely. It was different than any other role I'd ever had. And being a political dilettante, [laugh] essentially, walking into this, I couldn't possibly anticipate what that environment would be like. And, frankly, it is a bit gatekept in the sense that if you haven't participated on a campaign before, you really don't have any idea what to expect, and they're all a bit different to, like, their own special snowflake, based on the people who are there, and the moment in time during which you are campaigning, and who you are campaigning for. And it really does change a perspective on civic life and what you can do with your time if you chose to spend it doing something a little bigger than your typical TechOps.Corey: It also is a great answer, too, when people don't pay close enough attention. “So, why'd you leave your last job?” “He won.” Seems like a pretty—Jackie: [laugh].Corey: —easy answer to give, on some level.Jackie: Yes, absolutely. But imagine the opposite. Imagine if our candidate had lost, or if we had had data walk out the door like in 2016. The Democratic National Convention was breached in 2016 and some unflattering information was out the door, emails were hacked. And so it was difficult to anticipate… what we had control over and how much control we could actually exert over the process itself, knowing that if we failed, the repercussions would be extremely severe.Corey: It's a different story than a lot of InfoSec gigs. Companies love to talk like it is the end of the universe if they wind up having a data breach, in some effect. They talk about that the world ends because for them it kind of does because you have an ablative CSO who tries to also armor themselves with ablative interns that they can blame—if your SolarWinds. But the idea being that, “Oh yeah, if we get breached we are dunzo.”And it's, first, not really. Let's not inflate the risks here. Let's be honest; we're talking about something like you're a retailer; if you get breached, people lose a bunch of credit card numbers, the credit card companies have to reissue it to everyone, you get slapped with a fine, and you get dragged in the press, but statistically, look at your stock price a year later, it will be higher than at the time of the breach in almost every case. This is not the end of the world. You're talking about something though that has impacts that have impossible-to-calculate repercussions.We're talking about an entire administration shift; US foreign policy, domestic policy, how the world works and functions is in no small part tied to data security. That's a different level of stress than I think most security folks, if you get them honest enough, are going to admit that, yeah, what I do isn't that important from an InfoSec perspective. What you did is.Jackie: I appreciate that, especially having worked in the military. Since I left the military, I was always looking for a greater purpose and a larger mission to serve. And in this instance, the scope of work was somewhat limited, but the impact of failing would have been quite wide-ranging, as you've correctly identified. And walking into that role, I knew there was a limited time window to get the work done. I knew that as we progressed and got closer and closer to election day, we would have more resources, more money rolls in, more folks feel secure in the campaign and understand what the candidate stands for, and want to pump money into the coffers. And so you're also in an interesting situation because your resourcing is increasing, proportional to the threat, which is very time-bound.Corey: An inherent challenge is that unlike in a corporate environment, in many respects, where engineers can guard access to things and give the business clear lines of access to things and handle all of it in the background, one of the challenges with a campaign is that you are responsible for data security in a variety of different ways, and the interfaces to that data explode geometrically and to people with effectively no level whatsoever of technical sophistication. I'm not talking about the candidate necessarily—though that's of course, a concern—but I'm talking organizers, I'm talking volunteers, I'm talking folks who are lifelong political operatives, but they tend not to think in terms of, “Oh, I should enable multi-factor authentication on everything that I have,” because that is not what they are graded on; it's pass-fail. So, it's one of those things where it is not the number one priority for anyone else in your organization, but it is yours and you not only have to get things into fighting shape, you have to furthermore convince people to do the things that get them there. How do you approach that?Jackie: Security awareness [laugh] in a nutshell. We were lucky to work with Bob Lord, who is former CSO at Yahoo, OAuth, Rapid7, and has held a number of really important roles that were very wide in their scope, and responsible for very massive data sets. And we were lucky enough to, in the democratic ecosystem, have a CSO who really understood the nature of the problem, and the way that you described it just now is incredibly apt. You're working with folks that have no understanding or very limited understanding of what the threat actors were interested in breaching the campaign, what their capability set is, and how they might attempt to breach an organization. But you also had some positives out of that.When you're working with a campaign that is distributed, your workforce is distributed, and your systems are also distributed. And when you lose that centralization that many enterprises rely on to get the job done, you also reduce opportunities for attackers to compromise one system or one user and move laterally. So, that was something that we had working for us. So, security awareness was incredibly important. My boss worked on that quite a bit.We had an incredible IT help desk who really focused on connecting with users and running them through a checklist so everyone in the campaign had been onboarded with a specific set of capabilities and an understanding of what the security setup was and how to go about their business in a secure way. And luckily, very good decisions had been made on the IT side prior to the security team joining the organization, which set the stage for a strong architecture that was resistant to attack. So, I think a lot of the really solid decisions and security awareness propagation had occurred prior to myself and my boss joining the campaign.Corey: One of the things that I find interesting is that before you started that role—you mentioned you came in through the front door, which personally I've never successfully gotten a job like that; I always have to weasel my way in because I have an eighth-grade education and my resume—Jackie: [laugh].Corey: —well, tenure-wise, kind of, looks like a whole bunch of political campaigns. And that's fine, but before that, you were running your own company that was a focused security consultancy. Before that, your resume is a collection of impressive names. You were a principal consultant at Mandiant, you were at Accenture. You know what you're talking about.You were at McAfee slash Intel. You've done an awful lot of corporate world stuff. What made you decide to just wake up one day and decide, “You know what sounds awesome? Politics because the level of civil discourse there is awesome, and everyone treats everyone with respect and empathy, and no one gets heated or makes ridiculous arguments and the rest. That's the area I want to go into.” What flipped that switch for you?Jackie: If I'm completely honest, it was pure boredom. [laugh]. I started my business, Spyglass Security, with my co-founder, Jason [Shore 00:11:11]. And our purpose was to deliver boutique consulting services in a way that was efficient, in a way that built on prior work, and in a way that helped advance the security maturity of an organization without a lot of complex terminology, 150-page management consulting reports, right? What are the most effective operational changes we can make to an organization in how they work, in order to lead to some measurable improvement?And we had a good success at the New York City Board of Elections where we were a subcontractor to a large security firm. And we were in there for about a year, building them a vulnerability management program, which was great. But generally speaking, I have found myself bored with having the same conversations about cybersecurity again and again, at the startup level and really even at the enterprise level. And I was looking for something new to do, and the role was posted in a Slack that I co-founded that is full of digital forensics and information security folks, incident responders, those types of people.And I didn't hear of anyone else applying for the role. And I just thought, “Wow, maybe this is the kind of opportunity that I won't see again.” And I honestly sent my resume and didn't expect to hear anything back, so it was incredible to be contacted by the chief information security officer about a month after he was hired.Corey: One of the things that made it very clear that you were doing good work was the fact that there was a hit piece taken out on you in one of the absolute worst right-wing rags. I didn't remember what it was. It's one of those, oh, I'd been following you on Twitter for a bit before that, but it was one of those okay, but I tend to shortcut to figuring out who I align with based upon who yells at them. It's one of those—to extend it a bit further—I'm lazy, politically speaking. I wind up looking at two sides yelling at each other, I find out what side the actual literal flag-waving Nazis are on, and then I go to the other side because I don't ever want someone to mistake me for one of those people. And same story here. It's okay, you're clearly doing good work because people have bothered to yell at you in what we will very generously term ‘journalism.'Jackie: Yeah, I wouldn't refer to any of those folks—it was actually just one quote-unquote journalist from a Washington tabloid who decided to write a hit piece the week after I announced on Twitter that I'd had this role. And I took two months or so to think about whether I would announce my position at the campaign. I kept it very quiet, told a couple of my friends, but I was really busy and I wasn't sure if that was something I wanted to do. You know, as an InfoSec professional, that you need to keep your mouth shut about most things that happened in the workplace, period. It's a sensitive type of role and your discretion is critical.But Kamala really changed my mind. Kamala became the nominee and, you know, I have a similar background to hers. I'm half Dominican—my mother's from the Dominican Republic and my father is from India, so I have a similar background where I'm South Asian and Afro-Caribbean—and it just felt like the right time to bolster her profile by sharing that the Biden campaign was really interested in putting diverse candidates in the world of politics, and making sure that people like me have a seat at the table. I have three young daughters. I have a seven-year-old, a two-year-old, and a one-year-old.And the thing I want for them to know in their heart of hearts is that they can do anything they want. And so it felt really important and powerful for me to make a small public statement on Twitter about the role I had been in for a couple of months. And once I did that, Corey, all hell broke loose. I mean, I was suddenly the target of conspiracy theorists, I had people trying to reach out to me in every possible way. My LinkedIn messages, it just became a morass of—you know, on one hand, I had a lot of folks congratulate me and say nice things and provide support, and on the other, I just had a lot of, you know, kind of nutty folks reach out and have an idea of what I was working to accomplish that maybe was a bit off base.So yeah, I really wasn't surprised to find out that a right-wing or alt-right tabloid had attempted to write a hit piece on me. But at the end of the day, I had to keep moving even though it was difficult to be targeted like that. I mean, it's just not typical. You don't take a job and tell people you got a job, [laugh] and then get attacked for it on the national stage. It was really unsurprising on one hand, yet really quite shocking on another; something I had to adjust to very quickly. I did cry at work. I did get on the phone with legal and HR and cry like a baby. [laugh].Corey: Oh, yeah.Jackie: Yeah. It was scary.Corey: I guess this is an example of my naivete, but I do not understand people on the other side of the issue of InfoSec for a political campaign—and I want to be clear, I include that to every side of an aisle—I think there are some quote-unquote, “Political positions” that are absolutely abhorrent, but I also in the same breath will tell you that they should have and deserve data security and quality InfoSec representation. In a defensive capacity, to be clear. If you're—“I'm the offensive InfoSec coordinator for a campaign,” that's a different story. And we can have a nuanced argument about that.Jackie: [laugh].Corey: Also to be very clear, for the longest time—I would say almost all of my career until a few years ago—I was of the impression whatever I do, I keep my politics to myself. I don't talk about it in public because all I would realistically be doing is alienating potentially half of my audience. And what shifted that is two things. One of them, for me at least, is past a certain point, let's be very clear here: silence is consent. And I don't ever want to be even mistaken at a glance for being on the wrong side of some of these issues.On another, it's, I don't accept, frankly, that a lot of the things that are currently considered partisan are in fact, political issues. I can have a nuanced political debate on either side of the aisle on actual political issues—talking about things like tax policy, talking about foreign policy, talking about how we interact with the world, and how we fund things we care about and things that we don't—I can have those discussions. But I will not engage and I will not accept that, who gets to be people is a political issue. I will not accept that treating people with respect, regardless of how high or low their station, is a political issue. I will not accept that giving voice to our worst darkest impulses is a political position.I just won't take it. And maybe that makes me a dreamer. I don't consider myself a political animal. I really don't. I am not active in local politics. Or any politics for that matter. It's just, I will not compromise on treating people as people. And I never thought, until recently, that would be a political position, but apparently, it is.Jackie: Well, we were all taught the golden rule is children.Corey: There's a lot of weird things that were taught as children that it turns out, don't actually map to the real world. The classic example of that is sharing. It's so important that we teach the kids to share, and always share your toys and the rest. And now we're adults, how often do we actually share things with other people that aren't members of our immediate family? Turns out not that often. It's one of those lessons that ideally should take root and lead into being decent people and expressing some form of empathy, but the actual execution of it, it's yeah, sharing is not really a thing that we value in society.Jackie: Not in American society.Corey: Well, there is that. And that's the challenge, is we're always viewing the world through the lens of our own experiences, both culturally and personally, and it's easy to fall into the trap that is pernicious and it's always there, that our view of the world is objective and correct, and everyone else is seeing things from a perspective that is not nearly as rational and logical as our own. It's a spectrum of experience. No one wakes up in the morning and thinks that they are the villain in the story unless they work for Facebook's ethics department. It's one of those areas of just people have a vision of themselves that they generally try to live up to, and let's be honest people fell in love with one vision of themselves, it's the cognitive dissonance thing where people will shift their beliefs instead of their behavior because it's easier to do that, and reframe the narrative.It's strange how we got to this conversation from a starting position of, “Let's talk about InfoSec,” but it does come back around. It comes down to understanding the InfoSec posture of a political campaign. It's one of those things that until I started tracking who you were and what you were doing, it wasn't something really crossed my mind. Of course, now you think about, of course there's a whole InfoSec operation for every campaign, ever. But you don't think about it; it's behind the scenes; it's below the level of awareness that most people have.Now, what's really interesting to me, and I'm curious if you can talk about this, is historically the people working on the guts of a campaign—as it were—don't make public statements, they don't have public personas, they either don't use Twitter or turn their accounts private and the rest during the course of the campaign. You were active and engaging with people and identifying as someone who is active in the Biden campaign's InfoSec group. What made you decide to do that?Jackie: Well, on one hand, it did not feel useful to cut myself off from the world during the campaign because I have so many relationships in the cybersecurity community. And I was able to leverage those by connecting with folks who had useful information for me; folks outside of your organization often have useful information to bring back, for example, bug bounties and vulnerability disclosure programs that are established by companies in order to give hackers a outlet. If you find something on hardwarestore.com, and you want to share that with the company because you're a white hat hacker and you think that's the right thing to do, hopefully, there's some sort of a structure for you to be able to do that. And so, in the world of campaigning, I think information security is a relatively new development.It has been, maybe, given more resources in this past year on the presidential level than ever before. I think that we're going to continue to see an increase in the amount of resources given to the information security department on every campaign. But I'm also a public person. I really do appreciate the opportunity to interact with my community, to share and receive information about what it is that we do and what's happening in the world and what affects us from tech and information security perspective.Corey: It's just astonishing for me to see from the outside because you are working on something that is foundationally critically important. Meanwhile, people working on getting people to click ads or whatnot over at Amazon have to put ‘opinions my own' in their Twitter profile, whereas you were very outspoken about what you believe and who you are. And that's a valuable thing.Jackie: I think it's important. I think we often allow corporations to dictate our personality, we allow our jobs to dictate our personality, we allow corporate mores to dictate our behavior. And we have to ask ourselves who we want to be at the end of the day and what type of energy we want to put out into the world, and that's a choice that we make every day. So, what I can say is that it was a conscious decision. I can say that I worked 14 hours a day, or something, for five, six months. There were no weekends; there was no time off; there were a couple of overnights.Corey: “So, what do you get to sleep?” “November.”Jackie: Yeah. [laugh]. My partner took care of the kids. He was an absolute beast. I mean, he made sure that the house ran, and I paid no attention to it. I was just not a mom for those several months, in my own home.Corey: This episode is sponsored by our friends at Oracle HeatWave is a new high-performance accelerator for the Oracle MySQL Database Service. Although I insist on calling it “my squirrel.” While MySQL has long been the worlds most popular open source database, shifting from transacting to analytics required way too much overhead and, ya know, work. With HeatWave you can run your OLTP and OLAP, don't ask me to ever say those acronyms again, workloads directly from your MySQL database and eliminate the time consuming data movement and integration work, while also performing 1100X faster than Amazon Aurora, and 2.5X faster than Amazon Redshift, at a third of the cost. My thanks again to Oracle Cloud for sponsoring this ridiculous nonsense. Corey: Back in 2019, I gave a talk at re:Invent—which is always one of those things that's going to occasion comment—and the topic that we covered was building a vulnerability disclosure program built upon the story of a vulnerability that I reported into AWS. And it was a decent enough experience that I suggested at some point that you should talk about this publicly, and they said, “You should come talk about it with us.” And I did and it was a blast. But it suddenly became very clear, during the research for that talk and talking to people who've set those programs up is that look, one way or another, people are going to find vulnerabilities in what you do and how you do them. And if you don't give them an easy way to report them to you, that's okay.You'll find out about them in other scenarios when they're on the front page of the New York Times. So, you kind of want to be out there and accessible to people. Now, there's a whole story we can go into about the pros and cons of things like bug bounties and the rest, and of course, it's a nuanced issue, but the idea of at least making it easy for people to wind up reporting things from that perspective is one of those key areas of outreach. Back in the early days of InfoSec, people would explore different areas of systems that they had access to, and very often they were charged criminally. Intel wound up having charges against one of their—I believe it was their employee or something, who wound up founding something and reporting it in an ethical way.The idea of doing something like that is just ludicrous. You're in that space a lot more than I am. Do you still see that sort of chilling effect slash completely not getting it when someone is trying to, in good faith, report security issues? Or has the world largely moved on from that level of foolishness?Jackie: Both. The larger organizations that have mature security programs, and frankly, the organizations that have experienced a significant public breach, the organizations that have experienced pain are those that know better at this point and realize they do need to have a program, they do need to have a process and a procedure, and they need to have some kind of framework for folks to share information with them in a way that doesn't cause them to respond with, “Are you extorting me? Is this blackmail?” As a cybersecurity professional working at my own security firm and also doing security research, I have reported dozens of vulnerabilities that I've identified, open buckets, for example. My partner at Spyglass and I built a SaaS application called Data Drifter a few years ago.We were interviewed by NBC about this and NBC followed up on quite a few of our vulnerability disclosures and published an article. But what the software did was look for open buckets on Azure, AWS, and GCP and provide an analyst interface that allows a human to trawl through very large datasets and understand what they're looking at. So, for example, one of the finds that we had was that musical.ly—musical-dot-L-Y, which was purchased by TikTok, eventually—had a big, large open bucket with a lot of data, and we couldn't figure out how to report it properly. And they eventually took it down.But you really had to try to understand what you were looking at; if you have a big bucket full of different data types, you don't have a name on the bucket, and you don't know who it belongs to because you're not Google, or Amazon, or Microsoft, what do you do with this information? And so we spent a lot of time trying to reconcile open buckets with their owners and then contacting those owners. So, we've received a gamut of ranges of responses to vulnerability disclosure. On one hand, there is an established process at an organization that is visible by the way they respond and how they handle your inquiry. Some folks have ticketing systems, some folks respond directly to you from the security team, which is great, and you can really see and get an example of what their routing is inside the company.And then other organizations really have no point of reference for that kind of thing, and when something comes into either their support channels or even directly into the cybersecurity team, they're often scrambling for an effective way to respond to this. And it could go either way; it could get pretty messy at times. I've been threatened legally and I've been accused of extortion, even when we weren't trying to offer some type of a service. I mean, you really never walk into a vulnerability disclosure scenario and then offer consulting services because they are going to see it as a marketing ploy and you never want to make that a marketing ploy. I mean, it's just not… it's not effective and it's not ethical, it's not the right thing to do.So, it's been interesting. [laugh]. I would recommend, if you are a person listening to this podcast who has some sort of pull in the information security department at your organization, I would recommend that you start with disclose.io, which was put together by Casey John Ellis and some other folks over at Bugcrowd and some other volunteers. It's a really great starting point for understanding how to implement a vulnerability disclosure program and making sure that you are able to receive the information in a way that prevents a PR disaster.Corey: My approach is controversial—I know this—but I believe that the way that you're approaching this was entirely fatally flawed, of trying to report to people that they have an open S3 bucket. The proper way to do it is to upload reams of data to it because my operating theory is that they're going to ignore a politely worded note from a security researcher, but they're not going to ignore a $4 million surprise bill at the end of the month from AWS. That'll get fixed tout suite. To be clear to the audience, I am kidding on this. Don't do it. There's a great argument that you can be charged criminally for doing such a thing. I'm kidding. It's a fun joke. Don't do it. I cannot stress that enough. We now go to Jackie for her laughter at that comment.Jackie: [laugh].Corey: There we go.Jackie: I'm on cue. Well, a great thing about Data Drifter, that SaaS application that allowed analysts to review the contents of these open buckets, was that it was all JavaScript on the client-side, and so we weren't actually hosting any of that data ourselves. So, they must have noticed some transfer fees that were excessive, but if you're not looking at security and you have an infrastructure that isn't well monitored, you may not be looking at costs either.Corey: Costs are one of those things that are very aligned spiritually with security. It's a trailing function that you don't care about until right after you really should have cared about it. With security, it's a bit of a disaster when it hits, whereas with those surprise bills, “Oh, okay. We wasted some money.” That's usually, a, not front-page material and, b, it's okay, let's be responsible and fix that up where it makes sense, but it's something that is never a priority. It's never a ‘summon the board' story for anything short of complete and utter disaster. So, I do feel a sense of spiritual alignment here.Jackie: [laugh]. I can see that. That makes perfect sense.Corey: Before we call this an episode, one other area that you've been active within is something called ‘threat modeling.' What is it?Jackie: So, threat modeling is a way to think strategically about cybersecurity. You want to defend, effectively, by understanding your organization as a collection of people, and you want to help non-technical staff support the cybersecurity program. So, the way to do that is potentially to give a human-centric focus to threat modeling activities. Threat modeling is a methodology for linking humans to an effective set of prioritized defenses for the most likely types of adversaries that they might face. And so essentially the process is identifying your subject and defining the scope of what you would like to protect.Are you looking to protect this person's personal life? Are you exclusively protecting their professional life or what they're doing in relation to an organization? And you want to iterate through a few questions and document an attack tree. Then you would research some tactics and vulnerabilities, and implement defensive controls. So, in a nutshell, we want to know what assets does your subject have or have access to, that someone might want to spy, steal, or harm; you want to get an idea of what types of adversaries you can expect based on those assets or accesses that they have, and you then want to understand what tactics those adversaries are likely to use to compromise those assets or accesses, and you then transform that into the most effective defenses against those likely tactics.So, using that in practice, you would typically build an attack tree that starts with the human at the center and lists out all of their assets and accesses. And then off of those, each of those assets or accesses, you would want to map out their adversary personas. So, for example, if I work at a bank and I work on wire transfers, my likely adversary would be a financially motivated cybercriminal, right? Pretty standard stuff. And we want to understand what are the methods that these actors are going to employ in order to get the job done.So, in a common case, in a business email compromised context, folks might rely on a signer at a company to sign off on a wire transfer, and if the threat actor has an opportunity to gain access to that person's email address or the mechanism by which they make that approval, then they may be able to redirect funds to their own wallet that was intended for someone else or a partner of the company. Adversaries tend to employ the least difficult approach; whatever the easiest way in is what they're going to employ. I mean, we spend a lot of time in the field of information security and researching the latest vulnerabilities and attack paths and what are all the different ways that a system or a person or an application can be compromised, but in reality, the simplest stuff is usually what works, and that's what they're looking for. They're looking for the easiest way in. And you can really observe that with ransomware, where attackers are employing a spray and pray methodology.They're looking for whatever they can find in terms of open attack surface on the net, and then they're targeting organizations based on who they can compromise after the fact. So, they don't start with an organization in mind, they might start with a type of system that they know they can easily compromise and then they look for those, and then they decide whether they're going to ransomware that organization or not. So, it's really a useful way, when you're thinking about human-centric threat modeling, it's really a useful way to completely map your valuables and your critical assets to the most effective ways to protect those. I hope that makes sense.Corey: It very much does. It's understanding the nature of where you start, where you stop, what is reasonable, what is not reasonable. Because like a lot of different areas—DR, for example—security is one of those areas you could hurl infinite money into and still never be done. It's where do you consider it reasonable to start? Where do you consider it reasonable to stop? And without having an idea of what the model of threat you're guarding against is, the answer is, “All the money,” which it turns out, boards are surprisingly reluctant to greenlight.Jackie: Absolutely. We have a recurring problem and information security where we cannot measure return on investment. And so it becomes really difficult to try to validate a negative. It's kind of like the TSA; the TSA can say that they've spent a lot of money and that nothing has happened or that any incidents have been limited in their scope due to the work that they've done, but can we really quantify the amount of money that DHS has absorbed for the TSA's mission, and turned that into a really wonderful and measurable understanding of how we spent that money, and whether it was worth it? No, we can't really. And so we're always struggling with that insecurity, and I don't think we'll have an answer for it in the next ten years or so.Corey: No, I suspect not, on some level. It's one of those areas where I think the only people who are really going to have a holistic perspective on this are historians.Jackie: I agree.Corey: And sadly I'm not a cloud historian; I'm a cloud economist, a completely different thing I made up.Jackie: [laugh]. Well, from my perspective, I think it's a great title. And I agree with your thought about historians, and I look forward to finding out how they felt about what we did in the information security space, both political and non-political, 20, 30, and 40 years from now.Corey: I hope to live long enough to see that. Jackie, thank you so much for taking the time to speak with me today. If people want to learn more about what you're up to and how you view things, where can they find you?Jackie: You can find me on Twitter at @hackingbutlegal.Corey: Great handle. I love it.Jackie: Thank you so much for having me.Corey: Oh, of course. It is always great to talk with you. Jackie Singh, principal threat analyst, and incident responder at the Biden campaign. Obviously not there anymore. I'm Cloud Economist Corey Quinn and this is Screaming in the Cloud. If you've enjoyed this podcast, please leave a five-star review on your podcast provider of choice, whereas if you've hated this podcast, please leave a five-star review on your podcast platform of choice along with a comment expressing an incoherent bigoted tirade that you will, of course, classify as a political opinion, and get you evicted from said podcast provider.Corey: If your AWS bill keeps rising and your blood pressure is doing the same, then you need The Duckbill Group. We help companies fix their AWS bill by making it smaller and less horrifying. The Duckbill Group works for you, not AWS. We tailor recommendations to your business and we get to the point. Visit duckbillgroup.com to get started.Announcer: This has been a HumblePod production. Stay humble.

Mentor Me
#16 Paul Angone: Questions in Your 20's and How to Navigate Your 20's

Mentor Me

Play Episode Listen Later Jul 5, 2021 38:25


In this episode of the Mentor Me Podcast, I had the pleasure of sitting down with Paul Angone. Paul Angone is one of the leading voices in the nation on helping millennials navigate all of life's questions and decisions. Paul is also a leading voice on getting generations to work better together. Paul is the best-selling author of the new book 101 Questions You Need to Ask in Your Twenties: (and let's be honest, your thirties too), 101 Secrets For Your Twenties and All Groan Up: Searching For Self, Faith, and a Freaking Job!, a well-renowned national keynote speaker for corporations and keynote speaker for colleges and universities, and the creator of AllGroanUp.com, which has been read by millions of people in 190 countries. Paul is also an organizational consultant, trainer, and Millennial influencer who specializes in helping companies attract, retain, develop, and harness the best strengths of the Millennial and Gen Z generations. Paul has been honored to work with amazing companies like Intel Security, Wells Fargo, and Aflac through speaking engagements and Millennial influencer branding and awareness campaigns. I hope you enjoy this episode of the Mentor Me Podcast! --- Send in a voice message: https://anchor.fm/mentormepod/message Support this podcast: https://anchor.fm/mentormepod/support

youngadults.today
Stop Believing Lies and Own Your Defining Decade with Paul Angone

youngadults.today

Play Episode Listen Later Jun 21, 2021 37:34


PAUL ANGONE is the best-selling author of a number of books including 25 Lies Twentysomethings Need to Stop Believing: How to Get Unstuck and Own Your Defining Decade a sought-after national keynote speaker for corporations and keynote speaker for colleges and universities, and the creator of AllGroanUp.com, which has been read by millions of people in 190 countries. Paul is also an organizational consultant, trainer, and Millennial influencer who specializes in helping companies attract, retain, develop, and harness the best strengths of the Millennial and Gen Z generations. Paul has been honored to work with amazing companies like Intel Security, Wells Fargo, and Aflac through speaking engagements and Millennial influencer branding and awareness campaigns. Paul is a frequent media speaker on Gen Z and Millennial generations, and has done hundreds of radio, TV, and podcast interviews.

First News with Jimmy Cefalo
06-09-21 Intel and Security Failures

First News with Jimmy Cefalo

Play Episode Listen Later Jun 9, 2021 4:55


Dr. Alex Crowther is a retired Army Colonel and expert on national security at FIU's Institute for Public Policy. Senate report on Intel & Security failures in the lead up to Jan 6th.

Moments of Clarity
Episode 38 - "Happy Families" with Dr Justin Coulson

Moments of Clarity

Play Episode Listen Later May 8, 2021 54:07


Today on Moments of Clarity, I speak with Dr Justin Coulson.   We speak about parenting, education and society. In particular we focus on the overly prescribed lives of kids, their need for autonomy, the role of fun and play, how to show more love to our families, how covid removed our illusion of control, mental health, pressure to succeed in a failed meritocracy, ideas of success vs societal reality, the difference between schools and the home, our unkind society, the problem with discipline and behaviour management, our habits, some psychological Distancing strategies and a moment of clarity.   Dr Justin Coulson is a four-time best-selling author, sought-after keynote speaker (in person and virtual), podcast co-host with his wife Kylie, founder and CEO of Happy Families and father to six daughters. His focus in life is improving wellness at work, home and schools, and helping equip people with the relationship skills they need to flourish in life. Justin is known for his research-based content with easy-to-adopt strategies and solutions for corporate staff, parents, educators and students. With these tools, they can improve their wellbeing, engagement, mindset and relationships. Justin uses hilarious, heart-warming and sometimes heart-breaking stories from his own life as a parent to illustrate his points and to make his talks come alive – onstage or onscreen. This is why clients consistently acknowledge Justin as one of the best speakers they have listened to, and invite him back again and again. Justin is also sought after by the media for his wellbeing, relationships and parenting expertise. He has been published and is a contributor to The New York Times and appears regularly in all of Australia’s major news outlets for television, radio, and print. He’s a TEDx speaker and has worked with many of Australia’s biggest brands including the Commonwealth Bank, Intel Security, ANZ, IHG, Club Med and many, many more. He has also served as a consultant to the Australian Government’s Raising Children Network, and the Office of the e-Safety Commissioner, Life Education and others. Justin created Happy Families to help others transform their relationships, and their lives, for the better. Happy Families does this by offering a number of free resources such as blogs and podcasts and premium content such as books, ebooks and a membership which includes webinars, a book club, Q&A sessions, and many more features. Check out Justin’s work! Keynote on How To Raise an Independent, Free-Thinking Child on Goalcast: youtube.com/watch?v=Krnq1wFsJmE Happy Families Podcast happyfamilies.com.au/podcasts/ Happy Families resources and memberships Happyfamilies.com.au To book Justin for your next event or webinar, please email caroline@justincoulson.com or click here: happyfamilies.com.au/speaking/ for further information. www.happyfamilies.com.au www.justincoulson.com   Time Stamps Introduction 0:00 - 5:27 Part 1 5:28 - 53:26 Outro 53:27 - 54:07   Moments of Clarity Instagram: @momentsofclaritypodcast Facebook: @momentsofclaritypodcast Twitter: @BarneyMOC Email: momentsofclaritypodcast@gmail.com   Podcast by Matthew Sortino Music by Christian Prochilo Artwork by Michael Chrisanthopoulos

The WEInvested Podcast
Vibrant Communications: The Media Maven ft Paris Tyler

The WEInvested Podcast

Play Episode Listen Later Feb 3, 2021 53:37


Paris Tyler is an award-winning PR and communications specialist with more than 13 years of industry experience, lending my expertise to some of the country's most recognized consumer brands and campaigns including got milk?, McDonald's, ConAgra Foods, CIROC Vodka, Bad Boy Entertainment and Intel Security. As the founder of Vibrant Communications, Paris is committed to helping businesses create dynamic narratives that speak to every consumer while impacting culture. From producing an epic launch event to securing coverage of a new partnership, she helps clients take risks through big ideas that will push the envelope and garner results. --- This episode is sponsored by · Anchor: The easiest way to make a podcast. https://anchor.fm/app

Broken Silicon
79. AMD Zen 3 v Intel Comet Lake, Renoir v Tiger Lake, TSMC v Samsung | The x86 Crown

Broken Silicon

Play Episode Listen Later Dec 16, 2020 100:02


At the start of 2020, Intel was already being regarded as the underdog…and yet “underdog” doesn’t say the half of it. Tom & Dan look back at a year that truly saw the rise of AMD, and the disillusionment of many gaming trends that just did not pan out this year… [SPONSOR: https://www.cdkoffers.com/] 25% software discount code: brokensilicon 3% discount code for everything: dieshrink Win10 pro oem key 13$: https://bit.ly/2Wdfghh Win10 Home oem key 11$: https://bit.ly/3dsbSFi Win10 pro oem key FOR 2PC 20$: https://bit.ly/36DFHAB Office 2019 key 29$: https://bit.ly/2WdfBAz Win10 pro oem+Office 2019 41$: https://bit.ly/3ea83Vo 0:00 Setting the stage for 2020 9:26 When did Intel start to feel like an Underdog? 13:11 A lot of people said “Zen 2 isn’t that great for gamers” last year… 20:35 Is it a good thing that the gaming community grew in 2020? 26:15 Intel’s Loss of Prestige with their “i7” and “i9” branding 32:41 People don’t talk about Intel Security anymore, should they? 42:41 The Unprecedented Demand for Gaming Hardware in 2020 50:19 Why RDNA2, Ampere, Console launches are different situations 56:19 Intel Xe & Alder Lake – The hype for 2021 Intel Products 1:03:36 AMD Renoir vs Intel Tiger Lake – the battle for mobile 1:15:14 Can Intel comeback in 2021?(Tiger Lake vs CZN & VGH) 1:22:19 Can RDNA 3 fully take the performance crown? 1:28:44 Google Stadia Hype Vs Reality, The Silly TFLOPS Debate https://youtu.be/22SIp7iiRP0 https://youtu.be/F4NNh6UUqCQ https://youtu.be/EA3kdQ8bML4 https://www.techspot.com/review/1940-amd-ryzen-9-3950x/ https://youtu.be/YrsE0DmMATQ https://www.csoonline.com/article/3530306/design-flaw-could-compromise-intel-platform-security-features-researchers-warn.html https://youtu.be/xVgHg4neDqk https://youtu.be/1PDiFr0UhtQ https://www.mooreslawisdead.com/post/nvidia-s-ultimate-play https://www.pcgamesn.com/stadia/google-stadia-cant-kill-pc-gaming https://www.pcgamer.com/phil-spencer-says-microsoft-is-competing-with-google-and-amazon-not-sony/

Broken Silicon
73. AMD Zen 3 Market Share, Intel Margins, RDNA 2 Cache Efficiency | Server Engineer

Broken Silicon

Play Episode Listen Later Nov 3, 2020 101:41


Can AMD hit 50% market share in servers? How threatened are Intel’s margins? How big of a deal is Infinity Cache for Big Navi’s efficiency? All of this and much more is discussed with a returning fan favorite guest on Broken Silicon! [SPONSOR: https://www.cdkoffers.com/] 25% software discount code: brokensilicon 3% discount code for everything: dieshrink Win10 pro oem key 13$: https://bit.ly/2Wdfghh Win10 Home oem key 11$: https://bit.ly/3dsbSFi Win10 pro oem key FOR 2PC 20$: https://bit.ly/36DFHAB Office 2019 key 29$: https://bit.ly/2WdfBAz Win10 pro oem+Office 2019 41$: https://bit.ly/3ea83Vo 0:00 Intro - Who is our anonymous guest? 3:11 Intel Security 2019 – the real cause of 14nm capacity problems… 9:51 Is AMD worth switching to from Intel yet in the server market? 14:56 Does Zen 3 change the competitive landscape? 18:46 How much of the server market can AMD take? 29:28 As a company, how competitive is AMD w/ Intel going in 2021? 32:11 Intel’s has Margin & Security Problems in 2021 40:56 Professional AMD Graphics Card Competitiveness with Nvidia 48:50 Why isn't there better protected from Over the Air Hacking? 52:30 What upcoming gen is most exciting? Zen 4? SPR? Mega APU? 1:00:49 AMD buying Xilinx, Nvidia buying ARM 1:08:44 RISC-V 1:14:02 Intel 7nm prospects, & how Intel actually their customers… 1:23:20 Docker & Hardware Independent Software 1:24:44 EPYC Cache Efficiency, & what it could mean for Big Navi… 1:29:00 Is the R9 3950X an ok substitute for low core-count EPYC? Previous Episode: https://youtu.be/Fh95scsUX_M https://wccftech.com/amd-zen-3-epyc-milan-cpus-up-to-20-faster-than-zen-2-epyc-rome/ https://www.anandtech.com/show/15984/hot-chips-2020-live-blog-next-gen-intel-xeon-ice-lakesp-930am-pt https://www.amd.com/en/processors/epyc-7002-series https://www.theverge.com/2020/6/18/21295326/microsoft-project-xcloud-xbox-series-x-servers-hardware-2021 https://www.thefpsreview.com/2020/05/20/nvidia-drops-tesla-name-from-data-center-gpus-to-avoid-confusion-with-elon-musks-electric-car-company/#:~:text=As%20Heise%20reports%2C%20the%20company,is%20simply%20called%20the%20GA100. https://www.anandtech.com/show/16202/amd-reveals-the-radeon-rx-6000-series-rdna2-starts-at-the-highend-coming-november-18th/2

Networking With Michelle | Personal Connection, Influential Network

Paris Tyler is an award-winning PR and communications specialist with more than 13 years of industry experience, lending my expertise to some of the country's most recognized consumer brands and campaigns including got milk?, McDonald’s, ConAgra Foods, CIROC Vodka, Bad Boy Entertainment, and Intel Security. As the founder of Vibrant Communications, she's committed to helping businesses create dynamic narratives that speak to every consumer while impacting culture. From producing an epic launch event to securing coverage of a new partnership, Paris helps clients take risks through big ideas that will push the envelope and garner results.  In this episode we discuss: Why is the black dollar important to these corporations? What is multi-cultural marketing? Compare and contrast the conversation about marketing to the black community before the current climate.  How should we make decisions when it comes to spending our money? Contact Paris: Vibrant Communications IG: Vibrant Communications Sponsors:  Market My Market Interserver – web hosting Contact Michelle: Website: African-American Marketing Association Instagram: @AAMAHouston Website: Michelle Ngome Instagram: @MichelleNgome Donations: Cash app $mngome25 or paypal.me/MichelleNgome

Welcome to the
Wilbur Wannacry LIVES! Ransomware Experts Christiaan Beek@ McAfee, Dave Piscitello@Interisle Consulting Group

Welcome to the "The CyberHero Adventures: Defenders of the Digital Universe" Show!

Play Episode Listen Later Jun 18, 2020 49:19


Our first guest is Christaan Beek. He manages threat intelligence research within McAfee's Office of the CTO. He leads research in advanced attacks and assists in cyberattack take-down operations. In previous roles, Beek was Director of Threat Intelligence in McAfee Labs and Director of Incident Response and Forensics at Foundstone, Intel Security’s forensic services arm.Our next guest is Dave Piscitello. Dave has been involved in Internet technology for over 40 years. He has authored books on internet and remote access, including Understanding Voice over Internet Protocol Security. Dave publishes articles regularly on security, DNS, anti-phishing, malware, Internet policy and privacy. He maintains a highly active, insightful, and entertaining info site as The Security Skeptic. Dave is a Partner at Interisle Consulting Group.Our guests will share their incredible experiences dealing with ransomware and related cybercrime. Watch and learn about real-life stories of ransomware answering three questions,1. What happened?2. What were the consequences?3. What were the lessons learned?You'll enjoy hearing about how cyber criminals are leveraging Covid-19 to deploy ransomware which sectors are the MOST vulnerable and why, should a victim pay the ransom?All of that and more on today's show.We hope this helps...Gary Berman 

How to Transform
17. The Consultant School-Transitions with Paul Angone

How to Transform

Play Episode Listen Later Jun 9, 2020 26:16


In this episode of The Consultant School presented by The Genysys Group Ray and Amy welcome author and speaker Paul Angone.   Paul Angone is the best-selling author of 101 Secrets For Your Twenties, 101 Questions You Need to Ask in Your Twenties, and is a leading keynote speaker and consultant on helping generations work better together. Paul has worked with and spoken for companies, such as Intel Security, Wells Fargo, Stewart Title, and Aflac. Paul has also been featured in and written for, publications such as Bloomberg, Chicago Tribune, Forbes, Business Insider, Relevant Magazine, The Times (UK), and AARP.   

Small Biz Matters
Small businesses’ top technology challenges with remote working

Small Biz Matters

Play Episode Listen Later Jun 8, 2020 25:07


Small Biz Matters – a half hour program each week where you can work ON your business rather than IN it.with Alexi Boyd, broadcaster, advocate and small business owner.Date: 9 June 2020 Small business, with all it’s adaptability and pivotability were generally able to move quickly to our new cosy, home based locations to run our businesses. But did any of us realise this would throw up a whole truckload of problems which we would need help with? Bandwidth management, cybersecurity and adapting the ways we collaborate are just some of the problems universally faced by small business with the shift to remote working. How do I maximise my internet accessibility from home? Am I more vulnerable to cyberhackers in this new location? And does this change my relationship with key stakeholders like employees, contractors and clients? CISCO has been supporting small businesses for years with these issues but they too had to evolve at full speed to keep up with the pace of this change, working alongside businesses to understand their needs and how to solve them.  Luke Power brings with him a deep understanding of SMBs as the Head of Small Business Aust & NZ at Cisco and he’s here to share with us some practical strategies which will help you move past these remote working problems and get back to what you do best. Welcome to the show Luke. Topics we’ll be covering: The evolution of tech - tech has up until now been about solving individual problems. Now it’s all about moving forward and tech leading the way to help them grow. Now big companies have had to pivot to understand the entire platform which needs to be offered. Now it’s all about Collaboration. How do SMBs communicate internally and with their clients? They’re on the run, how do they use the tech platforms to solve their problems? COVID meant everyone had to scramble to get organised to work from home. Banking, hardware, internet connection How did CISCO quickly adapt? How did the enquiries change? Essentially, they behaved like a small business. Bandwidth management - what are the simple controls and infrastructure you can implement to ensure there are systems in place Well managed network - updating your legacy technology. Prioritise your computer over other devices Learn how to manage your device online when offsite Think about where your wireless technology is located The reality the tech and platform has improved compared to a couple of years ago Example is a mesh network which allows for better coverage Cybersecurity - Have we seen an increase in cybercrime activity? Mobile devices, reduced focused, remote working has increased our vulnerability.  BUT we’ve learned a lot in the last few years The fact is Firewalls are not good enough because other users have access. Visibility is crucial Two step authenticators (e.g. Duo) Has there been a shift in the way small business is being attacked? No, it’s all about the data. Ransomware is still a large risk. Look into data loss prevention Cyber hygiene - are you using the same laptop as others in the household? Be aware Collaboration - what’s some of the advice you’re giving the small business Take a step back and ask yourself how can I be more efficient and collaborate better? Think about the new customer journeys. Reflect on how you’re communicating with them? Who exactly do you collaborate with in my business circle? Go through each of the pathways and map it out?   About Luke Power Luke Power is the Head of Small Business & Distribution of Australia and New Zealand. As part of his role, Luke is accountable for the overall vision, strategy and operations of Cisco’s high-growth Small Business segment within Australia and New Zealand. Ultimately, working to deliver the best technology solutions to small businesses, with Cisco’s IT solutions that are secure, simple and flexible. Luke has worked as a Sales Leader for 20 years, starting his career in a local computer store helping people with their IT issues, and since with experience from companies such as Intel Security, Avaya, Nortel Networks, Cisco Systems, Acer and Silicon Computers.

Do Life Better Podcast
112: Dr Justin Coulson: Building Resilience (Part 2)

Do Life Better Podcast

Play Episode Listen Later May 31, 2020 33:22


Today’s episode is the second half of the chat with Dr Justin Coulson. You might remember we just finished talking about the importance of sharing family stories, and now we dive deeper into the ways you can build your own resilience and that of your children, students or other young people. Make sure you stick around for the story Justin shares at the end of this episode, it's one of the most inspirational real-life examples of resilience that I have heard for a long time. Dr Justin Coulson of Happy Families has many journal articles and scholarly book chapters, as well as several books and ebooks about parenting, including the 21 Days to a Happier Family (Harper Collins, 2016) and 9 Ways to a Resilient Child (Harper Collins, 2017). Justin is also a highly sought-after international speaker delivering keynote speeches and workshops to boost wellbeing and improve relationships for parents, teachers, students and employees and students. He has worked with The Commonwealth Bank, American Express, the Office of the Children's E-safety Commissioner, The Federal Government's Department of Social Services, Life Education, and hundreds of schools. Justin is an Honorary Fellow at the Centre for Positive Psychology in the Graduate School of Education at the University of Melbourne. He is a consultant to the Federal Government's Office of the Children's e-Safety Commissioner, and has acted (and continues to act) in an advisory capacity to well-known organisations including Beyond Blue, the Raising Children Network, Life Education, Intel Security, and the Alannah and Madeline Foundation. In addition, Justin is consistently sought after by the media for his expertise. He writes a weekly advice column for Sydney’s Daily Telegraph, appears regularly on The Project, the TODAY Show, Studio 10, Mornings and several radio stations around the nation. He is also the parenting expert at kidspot.com.au, Australia’s number one parenting website. During this chat, Justin shares: - the importance of Psychological flexibility and how to develop it - why what you resist persists and what to do instead - an inspiring story of the incredible power of resilience that had both of us choking up As a heads up, you will notice a background noise while Justin is talking and it sounds like static, it is actually the rain outside his window … it was absolutely bucketing down when we did the recording. Given all the good stuff he talks about during this chat, I’m sure you won’t even notice it after a while. You can connect with Dr. Justin Coulson at www.happyfamilies.com.au and on instagram @ drjustincoulson. Remember to share this episode with your friends and family who would also find this helpful. You can follow me on Instagram at @davejorna (www.instagram.com/davejorna) and @dolifebetterpodcast (www.instagram.com/dolifebetterpodcast). To contact us about retreats, leadership training and workshops visit www.projecthatch.com.au or email us at hello@projecthatch.com.au. Remember to subscribe to, rate and review the podcast to help spread the do life better message. Now, go out there and do your life even better.

Do Life Better Podcast
111: Dr Justin Coulson: Building Resilience (Part 1)

Do Life Better Podcast

Play Episode Listen Later May 24, 2020 33:50


If your resilience is being tested more than ever right now, you're not alone. I know that mine is too! Just recently, I discovered some ways of building resilience that I hadn't considered very much beforehand, and these came from today's guest, Dr. Justin Coulson. I enjoyed chatting with Justin so much that we went longer than expected, and I don't want you to miss any of his powerful, actionable tips, so I've split the chat into two episodes. This is the first half. Dr Justin Coulson of Happy Families has many journal articles and scholarly book chapters, as well as several books and ebooks about parenting, including the 21 Days to a Happier Family (Harper Collins, 2016) and 9 Ways to a Resilient Child (Harper Collins, 2017). Justin is also a highly sought-after international speaker delivering keynote speeches and workshops to boost wellbeing and improve relationships for parents, teachers, students and employees and students. He has worked with The Commonwealth Bank, American Express, the Office of the Children's E-safety Commissioner, The Federal Government's Department of Social Services, Life Education, and hundreds of schools. Justin is an Honorary Fellow at the Centre for Positive Psychology in the Graduate School of Education at the University of Melbourne. He is a consultant to the Federal Government's Office of the Children's e-Safety Commissioner, and has acted (and continues to act) in an advisory capacity to well-known organisations including Beyond Blue, the Raising Children Network, Life Education, Intel Security, and the Alannah and Madeline Foundation. In addition, Justin is consistently sought after by the media for his expertise. He writes a weekly advice column for Sydney’s Daily Telegraph, appears regularly on The Project, the TODAY Show, Studio 10, Mornings and several radio stations around the nation. He is also the parenting expert at kidspot.com.au, Australia’s number one parenting website. In this episode, Dr. Justin Coulson shares: - the power of creating productive routines while working from home - the importance of prizing your time and what that means - stopping yourself from distraction and increasing self discipline - the link between resilience and sharing family stories and creating meaning from your life You can connect with Dr. Justin Coulson at www.happyfamilies.com.au and on instagram @ drjustincoulson. Remember to share this episode with your friends and family who would also find this helpful. You can follow me on Instagram at @davejorna (www.instagram.com/davejorna) and @dolifebetterpodcast (www.instagram.com/dolifebetterpodcast). To contact us about retreats, leadership training and workshops visit www.projecthatch.com.au or email us at hello@projecthatch.com.au. Remember to subscribe to, rate and review the podcast to help spread the do life better message. Now, go out there and create a great day.

This Week in Linux
This Week in Linux 97: Firefox, Darktable, Manjaro on Pinebook Pro, AMD & Intel Security Issues

This Week in Linux

Play Episode Listen Later Mar 16, 2020 55:00


On this episode of This Week in Linux, we’re going to be talking about some new releases from Firefox and Darktable. We’ve got a bunch of Distro News this week related to Manjaro, Mabox Linux, LibreELEC, Clonezilla, NuTyX, and Arya Linux. Then we’re going to talk about what the Open Source community is doing to… Read more

Broken Silicon
25. Intel Security in 2019 | Server Engineer Interview

Broken Silicon

Play Episode Listen Later Dec 11, 2019 115:10


Another interview with an anonymous Server Engineer. We discuss Intel’s (lack of) security, the future of server tech, and more! [NOTE: This was an anonymous phone call, some audio issues] 1) 4:42 How important is the cost to run a server vs Start-up costs? 2) 11:00 Software Maturity & Intel’s Security Problems 3) 12:58 Spectre and Foreshadow 4) 21:03 NetCat broke the camel’s back… 5) 39:29 Does Optane or the “Intel Package” matter? 6) 41:57 AMD’s past failures, and their future success… 7) 49:20 Are Intel’s Security problems over? 8) 59:55 AMD vs Intel Branch Prediction & Threads 9) 1:07:20 How should we approach Hardware Security? 10) 1:11:55 Is Intel better positioned for the future? 11) 1:20:50 Do Intel’s Professional GPU’s sound interesting? 12) 1:26:05 2700X and 9900K as server chips… 13) 1:39:00 Remember how great Broadwell was… 14) 1:48:00 Best Wishes for UFD Tech

TechSperience
Episode 19: Intel Hardware and Software Enabled Security and the Security First Pledge

TechSperience

Play Episode Listen Later Oct 22, 2019 28:13


Episode 19 is a continuation of the TechSperience Cyber Security Series as we have a candid discussion with Marc Sadinsky, Partner Manager for Intel.  Discussions focus on Intel's VPro chip set and how it can be used to protect end user devices.  What is the Intel Security first pledge and what does it mean to the end user?  New technologies and integration of security capabilities - learn where Intel heading and learn what you may or may not know about Intel Vpro Chipset and why it's such a critical component of endpoint security. You can read the transcript for this episode here.

Chatbots and Digital Marketing Hosted by Karl Schuckert
Episode 12 with Chris Ormiston from Intel Security to Google Search Algorithm to Viagra OMG yes Viagra!

Chatbots and Digital Marketing Hosted by Karl Schuckert

Play Episode Listen Later Apr 5, 2019 27:56


Interview with Successful Agency and SaaS developer Chris Ormiston who had humble early 1998 beginnings from working with Intel Security to Google's Search Algorithm to Viagra OMG yes Viagra! Selling Viagra online... Fully legal and quite a funny story too... --- This episode is sponsored by · Anchor: The easiest way to make a podcast. https://anchor.fm/app

Channel Edge
Ep. 21 - Larry Walsh: Sorry, Fresh Out of Silver Bullets

Channel Edge

Play Episode Listen Later Feb 20, 2019 44:27


Larry Walsh is one of the most recognizable figures in the IT channel and security communities, and is considered one of the more forward-thinking leaders in the industry. A seasoned journalist, analyst, author, and industry commentator, Walsh is also the founder of Channelnomics, which is a leading provider of IT channel news and analysis. A specialist in the development and execution of channel programs, disruptive sales models, and growth strategies for companies of all sizes, from start-ups to Fortune 500 organizations, Walsh has worked with a roster of diverse technology players, including Ingram Micro, Intel Security, SAP, and Verizon.

Space Javelin
SJ086: the iMac at 20, the Mac mini, Google Duplex, rumors, Intel, security, iPhone rumors and more

Space Javelin

Play Episode Listen Later May 14, 2018 60:23


A little catching up and a whole lot of new shenanigans, cadets -- that's what's in store for you this week! Mike and Charles reminisce about last Sunday's iMac anniversary, ponder the future of the Mac mini (and the Mac generally), have a 100 percent human-led discussion on Google Duplex, go over all the 2018 iPhone rumors, digest some Munster cheese, fret over security, get Steamed, belittle Microsoft, and generally break through the BS and ballyhoo. There's a lot more to come, cadets, so stay tuned!

As Told By Nomads
353: 101 Questions You Need To Ask In Your Twenties With Paul Angone

As Told By Nomads

Play Episode Listen Later Apr 6, 2018 51:53


Today's episode is with Paul Angone. Paul is one of the leading voices in the nation to, and for, the Millennial generation.He is the best-selling author of 101 Secrets For Your Twenties and All Groan Up: Searching For Self, Faith, and a Freaking Job!, a sought-after national keynote speaker for corporations and keynote speaker for colleges and universities, and the creator of AllGroanUp.com, which has been read by millions of people in 190 countries.Paul is also an organizational consultant, trainer, and Millennial influencer who specializes in helping companies attract, retain, develop, and harness the best strengths of the Millennial generation. Paul has been honored to work with amazing companies like Intel Security, Wells Fargo, and Aflac through speaking engagements and Millennial influencer branding and awareness campaigns.In today's episode we dive into his new book, 101 Questions You Need to Ask in Your Twenties Book and discuss the pertinent questions millennials need to ask themselves. These questions, he believes set the table for their success. It was a really fun episode and I hope you enjoy it!Resources Mentioned In The Episode101 Questions You Need to Ask in Your Twenties Book: https://www.amazon.com/dp/0802416918/ref=sspa_dk_detail_3All Groan Up Website: www.allgroanup.comPersonal Website: http://paulangone.com/ See acast.com/privacy for privacy and opt-out information.

millennials wells fargo twenties aflac paul angone intel security allgroanup secrets for your twenties freaking job
The Essential Apple Podcast
Essential Apple Podcast 79: We talk to Bob ‘Dr Mac' LeVitus

The Essential Apple Podcast

Play Episode Listen Later Mar 13, 2018 76:57


Recorded 11th March 2018 This week Android decided join Apple in adopting HEIF (which has to be good news for everyone). TunnelBear sadly got taken over by McAffee (who I did not know are half owned by Intel) and there is news of a forthcoming documentary on Apple's spinoff General Magic that was a glorious failure! To talk about this stuff and much much more we are joined by a huge Mac luminary... the most eminent, the incredibly prolific, the legendary Bob 'Dr Mac' LeVitus. PLUS there is a special surprise offer from Dr Mac himself for listeners of this podcast to sign up for his “Working Smarter for Mac Users” courses with a 60% discount! On this week's show: DR MAC'S WORKING SMARTER SPECIAL OFFER Simply go to Working Smarter for Mac Users and sign up to either the short course or the full course and use the code save60 at the checkout before 1st April 2018 and get a whopping 60% OFF the list price! Even if you don't want to sign up for a course you can get the free weekly tips newsletter here APPLE General Magic documentary sheds light on Apple spinout's glorious failure – Cult of Mac TECHNOLOGY Android also adds HEIF image compression to their platform – Android Developers Blog SECURITY McAfee acquires VPN provider TunnelBear – VentureBeat I didn't know this however: "The company was purchased by Intel in February 2011 and became part of the Intel Security division. On September 7, 2016, Intel announced a strategic deal with TPG Capital to convert Intel Security into a joint venture between both companies called McAfee. That deal closed on April 3, 2017. Thoma Bravo took a minority stake in the new company, and Intel maintains a 49% stake." WORTH-A-CHIRP / ESSENTIAL TIPS 33mail.com as recommended by Andi J. Never give out your real email ever again! Nemo's Hardware Store (41:12) Saddleback Leather Company The Photographer's Case (the one with the long leather strap) is $39 for the 7 and 8. and the Plus version is $43 – Amazon The Hands Free Case is $29 for the 8 and $34 for the 8+ Social Media and Slack You can follow us on: EssentialApple.com / Pinecast / Twitter / Facebook / Google Plus / Slack – ask us for an invite any way you can get hold of us. Also a big SHOUT OUT to the members of the Slack room without whom we wouldn't have half the stories we actually do – we thank you all for your contributions and engagement. You can always help us out with a few pennies by using our Amazon Affiliate Link so we get a tiny kickback on anything you buy after using it. If you really like the show that much and would like to make a regular donation then please consider joining our Patreon or using the Pinecast Tips Jar (which accepts one off or regular donations) And a HUGE thank you to the patrons who already do. Support The Essential Apple Podcast by contributing to their Tip Jar: https://tips.pinecast.com/jar/essential-apple-show This podcast is powered by Pinecast.

Craig Peterson's Tech Talk
AS HEARD ON: WGIR - Intel CEO Sells Stock - Will North Korea Attack This Week - Intel Security Flaw

Craig Peterson's Tech Talk

Play Episode Listen Later Jan 8, 2018 6:49


A flaw on Intel chips going back decades has hit the news and is making Intel-installed devices vulnerable. Craig joins Jack Heath today to discuss how this vulnerability can affect users and what we can do to prevent it. More tech updates over at CraigPeterson.com --- More stories and tech updates at: www.craigpeterson.com Don't miss an episode from Craig. Subscribe and give us a rating: www.craigpeterson.com/itunes Follow me on Twitter for the latest in tech at: www.twitter.com/craigpeterson For questions, call or text: 855-385-5553

Talkradio Countdown
State Marijuana laws VS Feds, Iranian Protests, Intel Security Crisis

Talkradio Countdown

Play Episode Listen Later Jan 6, 2018 53:31


The Talkradio Count Down Show surveys a wide variety of people in and outside the industry to determine what's uppermost in the minds of talk radio listeners. In cooperation with Michael Harrison of Talkers Magazine, the bible of talkradio.

Computer America
Mike Cermak, Techguy.org Joins Us To Talk Major Intel Security Flaw/Performance

Computer America

Play Episode Listen Later Jan 3, 2018 61:00


Both Segments: Mike Cermak. Techguy.org The site has grown from a simple site of common solutions to a whole community of people trying to help others. We learn and share and see a lot more than tech support come out of the site every day. I like to think that we make some small difference in the world. Even in this day of complicated software, spyware and viruses, our great team of Moderators and volunteers help to make computing a little easier for everyone who visits. With more than 100 new users registering every day, Tech Support Guy shows no sign of stopping.   Today's Topics Include: Google Library Asparations Unsecured Android Apps Roombas On The Prowl Intel Security Flaw For full show notes, check out ComputerAmerica.com!

Macworld
Episode 587: iPhone battery troubles, Intel security issues, hating on Face ID

Macworld

Play Episode Listen Later Jan 3, 2018 41:25


Apple comes clean about CPU slowdowns and offers a killer battery replacement deal. Also, why Apple won’t buy Netflix, and our troubles with Face ID.

The Lawfare Podcast
Cybersecurity in the Trump Administration

The Lawfare Podcast

Play Episode Listen Later Mar 18, 2017 92:36


President Donald Trump has pledged to end the defense sequester and make the development of defensive and offensive cyber capabilities a White House priority, but the contours of U.S. cyber policy under the new administration have yet to be set—in fact, the administration still hasn't released its much-heralded Executive Order on cybersecurity, though several drafts have been leaked. So what should we expect to see from the new administration regarding cybersecurity? To answer that question, we're bringing you audio from a conference hosted by Lawfare with the Hoover Institution in Washington and Intel Security and featuring a keynote address from Steve Grobman, Chief Technology Officer at Intel, along with a panel discussion on cybersecurity and Congress moderated by Carrie Johnson of NPR with Hill staffers including Brett DeWitt, Hope Goins, Allen Souza, Michael Bahar, and Brett Freedman. 

The CyberWire
Nation-states or criminal gangs? Update on Polish banking attacks. And an update on RSA.

The CyberWire

Play Episode Listen Later Feb 15, 2017 14:49


In today's podcast we consider the difficulty of distinguishing nation-state hacks from criminal capers. It's not always clear, and sometimes it's a distinction without a difference. But in any case, many call for international norms of cyber conflict. Waterholes and catphish. Ben Yelin reviews President Obama's security legacy. Steve Grobman from Intel Security on the challenges of changing course. RSA is at its midpoint; we offer some of what we're hearing on the floor about false alarms, where to draw the perimeter, and concerns about the Internet-of-things.

Peggy Smedley Show
01/04/17 Cybersecurity Predictions for 2017

Peggy Smedley Show

Play Episode Listen Later Jan 4, 2017 12:53


Peggy says 93% of organizations are unable to triage all potential cyber threats, according to an Intel Security report. She explains that in general organizations were unable to investigate security alerts in 2016, but real progress can be made in 2017.

Peggy Smedley Show
01/04/17 Credit Score for Security

Peggy Smedley Show

Play Episode Listen Later Jan 4, 2017 14:52


Bruce Snell, cybersecurity and privacy director, Intel Security, says IoT security isn't where it needs to be, and security is too often an afterthought. He explains he would like to see an independent auditing body created to put together a credit score for security—and maybe there would be a stamp on the front of the box, but we would need to make consumers aware of that.

Peggy Smedley Show
01/04/17 Heightening Cybersecurity

Peggy Smedley Show

Play Episode Listen Later Jan 4, 2017 14:49


Bruce Snell, cybersecurity and privacy director, Intel Security, says cybersecurity means different things to different people. He encourages making cybersecurity a part of a training process and he says there needs to be a shift in thinking about security in day-to-day life.

Peggy Smedley Show
01/04/17 Heightening Cybersecurity

Peggy Smedley Show

Play Episode Listen Later Jan 4, 2017 14:49


Bruce Snell, cybersecurity and privacy director, Intel Security, says cybersecurity means different things to different people. He encourages making cybersecurity a part of a training process and he says there needs to be a shift in thinking about security in day-to-day life.

Peggy Smedley Show
01/04/17 Credit Score for Security

Peggy Smedley Show

Play Episode Listen Later Jan 4, 2017 14:52


Bruce Snell, cybersecurity and privacy director, Intel Security, says IoT security isn't where it needs to be, and security is too often an afterthought. He explains he would like to see an independent auditing body created to put together a credit score for security—and maybe there would be a stamp on the front of the box, but we would need to make consumers aware of that.

Peggy Smedley Show
01/04/17 Cybersecurity Predictions for 2017

Peggy Smedley Show

Play Episode Listen Later Jan 4, 2017 12:53


Peggy says 93% of organizations are unable to triage all potential cyber threats, according to an Intel Security report. She explains that in general organizations were unable to investigate security alerts in 2016, but real progress can be made in 2017.

AWS re:Invent 2016
SAC327: No More Ransomware: How Europol, the Dutch Police, and AWS Are Helping Millions Deal with Cybercrime

AWS re:Invent 2016

Play Episode Listen Later Dec 24, 2016 48:00


Come to this session to learn how Europol, the Dutch police, Intel Security, and Kaspersky Lab have come together in an unprecedented collaboration of government and private-sector organizations. Open source ransomware code makes it easier to lock victims’ computers and encrypt their data, resulting in an alarming increase of cyber ransom. In response www.nomoreransom.org was created with the additional cooperation of AWS and Barracuda Web Application Firewall. Learn what tools are available to retrieve encrypted data and take a peek under the hood of this mission-critical website in the fight against ransomware. Perhaps because the site opposes ransomware, it has already received a number of attacks. Learn how AWS and Intel worked to rebuff these persistent assaults.

Risk & Repeat
Risk & Repeat: Breaking down the Intel Security sale

Risk & Repeat

Play Episode Listen Later Sep 13, 2016


In this Risk & Repeat podcast, SearchSecurity editors discuss the $3.1 billion Intel Security sale and what it means for the infosec industry, the McAfee brand and Intel.

Risk & Repeat
Risk & Repeat: Breaking down the Intel Security sale

Risk & Repeat

Play Episode Listen Later Sep 13, 2016


In this Risk & Repeat podcast, SearchSecurity editors discuss the $3.1 billion Intel Security sale and what it means for the infosec industry, the McAfee brand and Intel.

The Feed with Amber Mac & Michael B
TF062 - Intel Security's Mark Hocking on using biometrics and more for safer password management.

The Feed with Amber Mac & Michael B

Play Episode Listen Later Aug 30, 2016 50:57


We talk to Mark Hocking about saying goodbye to master passwords for safer surfing.  Plus, Amanda Cosco from Electric Runway talks about being fashion forward with wearable tech (and how it could save your life).  Finally, @Brittlestar shares his Flipagram love and why it could be the next big social app.

IoT Time Podcast
IoT Time Podcast Ep. 51 Intel Security

IoT Time Podcast

Play Episode Listen Later Aug 25, 2016 43:18


In this episode of the IoT Time Podcast, Ken Briodagh, Editorial Director at IoT Evolution (iotevolutionworld.com), sits down at the IoT Evolution Expo (iotevolutionexpo.com) with Gary Davis, Chief Consumer Security Evangelist, Intel, and Carl Ford, CEO, Crossfire Media, to talk about how the IoT can make security a part of its DNA and why that needs to happen as soon as possible. This episode is sponsored by Genius NY, a technology incubator offing more than $1 million in funding. Visit http://www.geniusny.com for more. Tweet @KenBriodagh & @IoTEvolution.

ceo dna intel iot editorial director time podcast gary davis intel security chief consumer security evangelist genius ny ken briodagh iot evolution iot evolution expo
La Nube de BLU Radio
Siga estas recomendaciones para identificar amenazas cuando navega en Internet

La Nube de BLU Radio

Play Episode Listen Later May 27, 2016 7:39


Intel Security realizó un estudio llamado ‘Dieta de seguridad on-line' para que la gente aprenda a identificar las amenazas a la hora de navegar en Internet. See omnystudio.com/listener for privacy information.

Tecla Cualquiera
Dos gatos siameses y un perro salchicha

Tecla Cualquiera

Play Episode Listen Later May 17, 2016 34:30


Tecla Cualquiera es un podcast sobre Internet: Tomás Balmaceda y Martín Garabal nos presentan historias reales de la vida virtual. Esta vez nos enfrentamos al pavoroso drama de las contraseñas: tu mail, tu homebanking y tus redes sociales pueden no estar a salvo por usar un password horrible, como "batman", "123456" o "password". Hablamos con expertos de Google e Intel Security para cambiar tu vida. Además: Internet of Things y JavaScript de la mano de Fundación Telefónica y música y realidad junto a VRTIFY.

The Lawfare Podcast
Intel Security's Chris Young on Cybersecurity and a Debate on Using Data to Protect Data

The Lawfare Podcast

Play Episode Listen Later Apr 30, 2016 93:50


Intel Security's Chris Young gives a talk on the current cybersecurity landscape. And we hold a debate on using Big Data to protect personal privacy, featuring Daniel Weitzner of MIT, Laura Donahue of Georgetown Law, Susan Hennessey of Brookings and Lawfare, Greg Nojeim of the Center for Democracy and Technology, and David Hoffman of Intel: Is Big Data just a privacy threat? Or is it part of the solution too?

AT&T ThreatTraq
ThreatTraq #190 - You May Save Yourself From The Bear This Time

AT&T ThreatTraq

Play Episode Listen Later Apr 18, 2016 57:27


AT&T Data Security Analysts, along with Rob Gresham of Intel Security, discuss ransomware, Dridex, Firefox vulnerabilities, and the Internet Weather Report. Originally recorded April 11, 2016.

Locked Down - Security Podcast
Episode 3 - In conversation with Raj Samani VP, CTO for EMEA, Intel Security

Locked Down - Security Podcast

Play Episode Listen Later Mar 1, 2016 13:36


There are forces of nature and there are forces for change. Seldom do you get both in one package. Raj Samani is one of those packages. Intel's authority on security, globally recognised and accepted as one of the most gifted speakers of his generation, Raj gives us the benefit of appearing on this show. We've recorded before a few years ago at another security show and I count him as a valued friend. This show more than any other deserves your attention. Theres a reason he has twice packed RSAC this year both at the CSA conference on Monday and then today in his keynote. He gets it. A visionary looking ahead at the challenges we face in security and the positive force for good that building the right practical controls can mean to the journey we're jointly on as we try to embrace that transformation. Sit back, relax, listen to Raj as he and I put the world to rights as best we can.

DevSecOps Podcast Series
Equal Respect: Women in Technology with Chenxi Wang

DevSecOps Podcast Series

Play Episode Listen Later Feb 25, 2016 13:37


Chenxi Wang has had a diverse career in the technology industry, Before her current position as Chief Strategy Officer at Twistlock, she was Vice President, Cloud Security & Strategy at CipherCloud, Vice President, Strategy and Market Intelligence at Intel Security, and Vice President at Forrester Research. Along the way, she has worked on technology education initiatives and is currently at work on Equal Respect, a movement to stop the objectification of women in technology. In this interview, I spoke with Chenxi about her upcoming sessions at RSA Conference 2016, her work on the Equal Respect initiative, and her passion for software security education.

The Cybersecurity Podcast
Hack the Toaster, Cyber National Guard & Why L0pht Didn't Shutter the Internet

The Cybersecurity Podcast

Play Episode Listen Later Jan 14, 2016 46:15


Chris Wysopal a.k.a Weld Pond, chief technology officer of application security firm Veracode, joins The Cybersecurity Podcast to discuss the suspected cyberattack on the Ukrainian power grid, ways to increase transparency about cybersecurity expertise at publicly-traded companies, and why the L0pht hacking collective he once belonged to didn't want to shut down the Internet back in the 1990s just to prove to senators it could. Also joining New America's Peter Singer and Passcode's Sara Sorcher is Chris Young, general manager of Intel Security. They talk about the unconventional cyberthreats emerging from the booming Internet of Things, the challenges posed by ransomware, and his ideas for a future Cyber National Guard.

Cyber, cyber...
Cyber, Cyber… EXTRA

Cyber, cyber...

Play Episode Listen Later Nov 17, 2015


Zapraszamy do wysłuchania kolejnego podcastu. W dzisiejszym odcinku Mirosław Maj (Fundacja Bezpieczna Cyberprzestrzeń) rozmawia z Michałem Przygodą (Intel Security) na temat:   Botnetu Beebone oraz funkcjonowania threat intelligence lab od kuchni. Bardzo ciekawa rozmowa, serdecznie zapraszamy.   RSS: https://www.cybsecurity.org/feed/podcast/ iTunes: https://itunes.apple.com/pl/podcast/cyber-cyber…/id988807509?mt=2 O zdjęciu botnetu Beebone mogliśmy się więcej dowiedzieć podczas konferencji SECURITY CASE STUDY 2015 , wówczas to gościliśmy Raja SAMANI (Intel Security), który wygłosił prelekcję na More

Inside the Datacenter - Connected Social Media
Defending the Data Center with Intel Security Technologies – Intel Chip Chat – Episode 417

Inside the Datacenter - Connected Social Media

Play Episode Listen Later Oct 30, 2015


In this Intel Chip Chat audio podcast with Allyson Klein: In this livecast from the Intel Developer Forum (IDF) in San Francisco Ravi Varanasi, General Manager of Cloud Security Solutions at Intel stops by to talk about how Intel is enabling a hardware root of trust to fortify data center security. He describes how Intel […]

Intel Chip Chat
Defending the Data Center with Intel Security Technologies – Intel® Chip Chat episode 417

Intel Chip Chat

Play Episode Listen Later Oct 28, 2015 8:47


In this livecast from the Intel Developer Forum (IDF) in San Francisco Ravi Varanasi, General Manager of Cloud Security Solutions at Intel stops by to talk about how Intel is enabling a hardware root of trust to fortify data center security. He describes how Intel® Cloud Integrity Technology (CIT) uses Intel® Trusted Execution Technology (TXT) and Intel® Trusted Platform Module (TPM) to perform integrity checks that form a chain of trust that runs from system boot, all the way to the VMs & the workloads that run on the platform. Ravi also mentions the Data Security Appliance (DSA) which provides data deduplication, compression and encryption while allowing the enterprise to retain control and ownership over their data.

Cyber, cyber...
Cyber, Cyber… – 7 – iOS

Cyber, cyber...

Play Episode Listen Later Sep 25, 2015


Zapraszamy do wysłuchania kolejnego podcastu. Piotr Boetzel (Intel Security), Adam Haertle (UPC Polska) i Mirosław Maj (Fundacja Bezpieczna Cyberprzestrzeń) komentują ostatnie wydarzenia ze świata bezpieczeństwa teleinformatycznego. Dziś główne tematy to:   – XCODEGHOST – atak na App Store poprzez pakiet deweloperski i w konsekwencji infekcje aplikacji w sklepie Apple – SYNfulKnock – dziurawy firmware Cisco, pozwalający na zdalne przejęcie kontroli i dostęp More

MomTalkRadio's Podcast
Travel Safety Tips

MomTalkRadio's Podcast

Play Episode Listen Later Aug 13, 2015 39:06


This week on Mom Talk Radio, Dr. Shoshana Bennett, clicnical psychologist, shares the difference between the baby blues and postpartum depression. Spotlight on Moms features Pebbles Thompson of IgniteLight.org. Dental Hygienist, Carol Jahn, RDH, MS, shares why flossing is so important and how water flossing works. Online Safety Expert at Intel Security, Stacey Connor, shares travel safety tips. Mark Cheverton, author of Invasion of the Overworld, addresses the sensitive topic of bullying.

Intel Chip Chat
Streamline Your Digital Life with True Key™ by Intel Security – Intel® Chip Chat episode 380

Intel Chip Chat

Play Episode Listen Later Apr 22, 2015 10:02


In this archive of a livecast from Mobile World Congress Mark Hocking, Vice President & General Manager of Safe Identity at Intel Security, stops by to talk about the new True Key™ product by Intel Security that is providing a solution to address a universal pain point for computing users around the globe, passwords. Mark discusses how True Key is innovating the way people log in to websites and applications by using personal biometrics and password storage so that you can automatically and securely sign in to your digital life without having to struggle with numerous passwords. To learn more, visit www.truekey.com.

CERIAS Security Seminar Podcast
Michelle Dennedy, Symposium/Michelle Dennedy, Intel

CERIAS Security Seminar Podcast

Play Episode Listen Later Mar 25, 2015 54:27


We will discuss how the known practives and inspirations of the past can enlighten our path forward into the uncertain seas of Big Data, Clouds and Things that absorb data and even talk back. Privacy engineering as a set of methodologies and cross disciplinary field of inquiry is another theme that I will present and students and attendees can grow. About the speaker: Michelle Finneran Dennedy currently serves as VP and Chief Privacy Officer at Intel Security. She is responsible for the development and implementation of Intel Security data privacy policies and practices, working across business groups to drive data privacy excellence across the security continuum. Before joining Intel Security, Michelle founded The iDennedy Project, a public service organization to address privacy needs in sensitive populations, such as children and the elderly, and emerging technology paradigms. Michelle is also a founder and editor in chief of a new media site—TheIdentityProject.com—that was started as an advocacy and education site, currently focused on the growing crime of Child ID theft. Michelle was the Vice President for Security & Privacy Solutions for the Oracle Corporation. This team worked closely with customers to enable them to proceed with the confidence that information is protected and accelerated as an asset. Before the Oracle acquisition of Sun, Michelle was Chief Data Governance Officer within the Cloud Computing division at Sun Microsystems, Inc. Michelle worked closely with Sun's business, technical and legal teams to create the best data governance policies and processes possible for cloud computing in order to build trust for cloud environments through vendor transparency. Michelle also served as Sun's Chief Privacy Officer. Michelle is a sought-after and provocative public speaker, evangelizing new approaches and business justifications for soundly-defined, transparent security and privacy policies and systems that protect healthy, safe global businesses. Michelle has a JD from Fordham University School of Law and a BS degree with university honors from The Ohio State University. In 2009, she was awarded the Goodwin Procter-IAPP Vanguard award for lifetime achievement and the EWF – CSO Magazine Woman of Influence award for work in the privacy and security fields.

Intel Chip Chat
The Current State of Mobile and IoT Security – Intel® Chip Chat episode 374

Intel Chip Chat

Play Episode Listen Later Mar 18, 2015 11:03


In this archive of a livecast from Mobile World Congress in Barcelona, Gary Davis (twitter.com/garyjdavis), Chief Consumer Security Evangelist at Intel Security stops by to talk about the current state of security within the mobile and internet of things industry. He emphasizes how vulnerable many wearable devices and smart phones can be to cyber criminal attacks and discusses easy ways to help ensure that your personal information can be protected on your devices. To learn more visit: www.intelsecurity.com or http://home.mcafee.com

Chip Chat
Intel Chip Chat - Live from Mobile World Congress 2015 - Day 2

Chip Chat

Play Episode Listen Later Mar 3, 2015 75:00


On day two of livecasting from Mobile World Congress in Barcelona, Chip Chat will have interviews with executives from Intel, Openet, Procera Networks, Amartus, and Intel Security and they’ll be discussing everything from telecom network transformation to the state of mobile and IoT security. MWC is one of the largest shows in the mobile space with more than 80,000 attendees and many major announcements and product launches expected. Allyson will be live on the ground to discuss the latest trends and topics in the telecom industry.

Chip Chat
Intel Chip Chat - Live from Mobile World Congress 2015

Chip Chat

Play Episode Listen Later Mar 2, 2015 62:00


This broadcast of the Intel Chip Chat Podcast will be live from Mobile World Congress in Barcelona, where more than 80,000 attendees will get the latest news in the mobile and telecom space. We’ll have interviews with executives from Intel Security, Juniper Networks, ASOCS, Alcatel-Lucent and Ericsson and they’ll be chatting about everything from network functions virtualization to open source industry initiatives.

Intel Chip Chat
Network Security Challenges and Solutions – Intel® Chip Chat episode 329

Intel Chip Chat

Play Episode Listen Later Aug 24, 2014 7:24


Bikram Gupta, a Senior Product Manager at Intel, stops by to talk about the Intel® Security suite of solutions including PC/mobile phone, security management, firewall and network security. With the move of many network appliances to software defined, security also migrating to new software defined security solutions. Bikram also discusses the rise of intelligent applications that leverage SDN and how those will be secured in the future. For more information, visit: http://networkbuilders.intel.com/.

Bletchley Park
Sir John Scarlett - McAfee Cyber Security Exhibit Launch

Bletchley Park

Play Episode Listen Later Jun 30, 2014 7:24


June 2014 McAfee, part of Intel Security, today announced the official opening of its international Cyber Security Exhibition and Computer Learning Zone at Bletchley Park, as part of its five-year collaborative partnership with the home of the World War Two Codebreakers. Sir John Scarlett gave a speech on the impact and importance of Bletchley Park, online safety and the role of women in Cyber Security. Picture: ©shaunarmstrong/mubsta.com #BPark, #Bletchleypark, #enigma, #McAfee, #AudioMo,

Inside IT
Inside IT: A Principles-Based Approach to Privacy at Intel

Inside IT

Play Episode Listen Later Jan 7, 2014


IT Best Practices: Episode 66 – Technological advances in our connected world are pressing businesses to re-examine privacy policies everywhere. That’s certainly true at Intel, where Stuart Tyler is a Senior Privacy Analyst in the Intel Security and Privacy office. In this podcast Tyler tells us about the historic roots of today’s privacy principles, how […]