POPULARITY
I am honored to welcome Mr Finance Himself David Keller, CMT, Chief Market Strategist at StockCharts.com, Inc. . We discuss #gamestopstock & more.Andrew Fox , founder & CEO of Charge Enterprises Inc .Misconceptions around micro-mobility that are preventing wide-scale adoption are among our topics.
I am honored to welcome Dennis McKesey President & Lead Consultant at In Our Best Interest, LLC discussing how they helping #educators meet the challenges of #Remote learning. Dennis appears in the critically-acclaimed documentary, “Waiting for Superman,” directed by Davis Guggenheim as well as the book, “Whatever It Takes,” by Paul Tough.Also joining me is Mark Testoni CEO SAP National Security Services (SAP NS2) Mark Testoni is among the nation’s leading experts in the application of technology to solve problems in government and industry, especially in the U.S. national security space.
Join me on the #techzone tomorrow as I welcome Ben Arnold from the The NPD Group with some Data on #virtualreality #trends & Stephen Ewell from the Consumer Technology Association #Foundation talking about their new #pitch #competition sponsored by AARP.Dets on pitch competition here: https://lnkd.in/gkisdhr
The awesome Sarah Brown Director, Event Communications at Consumer Technology Association . Check out the latest updates #CES2021.
Gary Shapiro, President & CEO at the Consumer Technology Association gives us a preview & a Breaking announcement!Also!! Steve Koenig, VP, Research at the Consumer Technology Association joins the party getting us #CES Ready!!
Mike McCarthy Vice President Sales, North America at StarLeaf stops by to chat about on how they're bringing people together to work better, wherever they are, with enterprise-grade video meetings.Also!! Steve Murphy CEO at Epicor Software helps all not to neglect building trust and a relationship with CD & R remotely during #COVID-19, and advice for others looking to do the same.
From eCommerce threats, to security concerns in connected speakers, Fortinet researchers discuss the top evolving threats of 2020, heading into the new year.
The Internet of Things (IOT) has expanded incredibly quickly. Believe it or not there are over 25 billion IOT devices on the planet right now. That’s right, billion with a ‘b’. More than three times the number of people. These devices include obvious things like fitbits, smartwatches, smart thermostats and things that aren’t so obvious like refrigerators and cordless drills. All these are constantly generating data, mountains of it actually. Information like your heartrate when jogging or how quickly you drain the battery in your drill you got last Father’s Day is being collected and stored somewhere. The challenge isn’t figuring out how to collect more data, it’s figuring out how to make the best use of the data we already have. There are three basic levels of data. One of course is just the raw data, everything getting collected by all of these devices. Another is what is called meta-data, the data about the data. The best and most well-known example of meta-data is all the information that gets attached to your digital photos. That includes things like the time and place where it was taken and even (sometimes) the people in the photo. Finally, there is the transformed or processed data, data that has gone through some sort of process to make the information usable on a larger scale. To help with that last part, artificial intelligence/machine learning (AI/ML) has been rushing to keep up with the growth of IOT. Lots of progress has already been made with over 5 billion of the 25 billion IOT devices having onboard AI/ML. What’s the advantage? Onboard AI/ML helps get things processed faster, rather than waiting for a server to collate and analyze the data. Also, if the device detects signs of trouble, the user can be made aware of it sooner. Of course, processing data from groups still requires that the data be collected elsewhere for processing, but for the individual, this could be a literal life saver. Not that AI/ML is always used as it should be. Too often it’s used as an infallible prediction tool, a way of generalizing individuals. There are uses for that, but the problem lies in how these computer models are often treated as infallible oracles, even when broken down to the individual level. You can obviously get away with that with groups. However, when applied specifically to me or you, these things tend to break down. Just because we’ve always gone along with a certain group to by the latest smartphone, doesn’t mean you will when the next model comes out. If the AI/ML software detects a break from the pattern like that, it will either ignore it or spend time and resources reanalyzing data or gathering more in order to explain the deviation. TARTLE has a novel approach to this kind of situation. Instead of spending a lot of time, energy and resources creating software to figure out why you didn’t go to the latest Marvel movie on opening day like you normally do, we thought we just might (brace yourself), ask you. That’s right, we, or the client purchasing your data through TARTLE would simply say, “The data you sell us shows that you normally get together with your friends and go see superhero movies on opening day. This time, you waited three weeks and apparently went by yourself. Any particular reason?” We don’t have to guess, and even better, you don’t have to answer. If you decide you are just fine keeping your reasons to yourself, you are free to do so. That’s the beauty of TARTLE, you get to decide what and when to share and why. Yes, that even applies to IOT devices, just include compatible devices on your TARTLE account and you then have control over the data those devices are sending out. Not so much as a byte goes out without your say so. TARTLE puts you back in control. What’s your data worth? cast is brought to you by TARTLE. A global personal data marketplace that allows users to sell their personal information anonymously when they want to, while allowing buyers to access clean ready to analyze data sets on digital identities from all across the globe. The show is hosted by Co-Founder and Source Data Pioneer Alexander McCaig and Head of Conscious Marketing Jason Rigby. What's your data worth? Find out at ( https://tartle.co/ ) Watch the podcast on YouTube ( https://www.youtube.com/channel/UC46qT-wHaRzUZBDTc9uBwJg ) Like our Facebook Page ( https://www.facebook.com/TARTLEofficial/ ) Follow us on Instagram ( https://www.instagram.com/tartle_official/ ) Follow us on Twitter ( https://twitter.com/TARTLEofficial ) Spread the word!
My Pro #photographers and #photolovers you will love my Guest Rick Voight with #Vividpix who will be talking about their software that makes it easy to restore photos.Are you in the Service Industry? Check out our Interview with CEO of #Picnic Clayton Wood as he talks about the effects that Robotics could play in relation to this field. It's a can't miss for my #techy fam!
In this episode of BK Cyber Bytes, John Rondini and Todd Dishman discuss IOT devices and major breaches that have occurred with them over the past few years. They also cover legislative updates, including recent the recent IOT legislation in California and Oregon, and framework updates that have occurred over the past few years, with a focus on 2019.
Neustar bolsters fraud detection capabilities with Trustid, almost half of containers in production have vulnerabilities, BlackBerry offers its security technology to IoT device makers, and Radware to acquire ShieldSquare for expansion of its cloud security portfolio! Full Show Notes: https://wiki.securityweekly.com/ES_Episode121 Visit http://securityweekly.com/esw for all the latest episodes!
Neustar bolsters fraud detection capabilities with Trustid, almost half of containers in production have vulnerabilities, BlackBerry offers its security technology to IoT device makers, and Radware to acquire ShieldSquare for expansion of its cloud security portfolio! Full Show Notes: https://wiki.securityweekly.com/ES_Episode121 Visit http://securityweekly.com/esw for all the latest episodes!
This week, we welcome Tony Cole, Chief Technology Officer at Attivo Networks for an interview! Tony joins us to discuss the cyber deception in the enterprises today, and gives a brief history of deception and its applicability to cybersecurity! In the Enterprise News, Neustar bolsters fraud detection capabilities with Trustid, almost half of containers in production have vulnerabilities, BlackBerry offers its security technology to IoT device makers, and Radware to acquire ShieldSquare for expansion of its cloud security portfolio! Full Show Notes: https://wiki.securityweekly.com/ES_Episode121 Visit https://www.securityweekly.com/esw for all the latest episodes! Follow us on Twitter: https://www.twitter.com/securityweekly Like us on Facebook: https://www.facebook.com/secweekly
This week, we welcome Tony Cole, Chief Technology Officer at Attivo Networks for an interview! Tony joins us to discuss the cyber deception in the enterprises today, and gives a brief history of deception and its applicability to cybersecurity! In the Enterprise News, Neustar bolsters fraud detection capabilities with Trustid, almost half of containers in production have vulnerabilities, BlackBerry offers its security technology to IoT device makers, and Radware to acquire ShieldSquare for expansion of its cloud security portfolio! Full Show Notes: https://wiki.securityweekly.com/ES_Episode121 Visit https://www.securityweekly.com/esw for all the latest episodes! Follow us on Twitter: https://www.twitter.com/securityweekly Like us on Facebook: https://www.facebook.com/secweekly
Michael Santarcangelo joined by special guest Ron Gula from Gula Tech Adventures, talk with Chris Brenton about how do you take someone with a basic level certification and give them access to the tool? Full Show Notes: https://wiki.securityweekly.com/BSWEpisode99
Michael Santarcangelo returns! Michael is joined by Matt Alderman and Ron Gula to interview Chris Brenton. They discuss what is threat hunting, what does this actually mean, is there a level of maturity required (organization, security team, individuals)? Full Show Notes: https://wiki.securityweekly.com/BSWEpisode99
Michael Santarcangelo joined by special guest Ron Gula from Gula Tech Adventures, talk with Chris Brenton about how do you take someone with a basic level certification and give them access to the tool? Full Show Notes: https://wiki.securityweekly.com/BSWEpisode99
Michael Santarcangelo returns! Michael is joined by Matt Alderman and Ron Gula to interview Chris Brenton. They discuss what is threat hunting, what does this actually mean, is there a level of maturity required (organization, security team, individuals)? Full Show Notes: https://wiki.securityweekly.com/BSWEpisode99
Beacon analysis is an integral part of threat hunting. If you are not looking for beacons you take the chance of missing compromised IoT devices or anything that does not have a threat mitigation agent installed. I'll talk about what makes beacon hunting so hard, and how the open source tool RITA can simplify the process. ***Powerpoint Slides in Full Show Notes*** Full Show Notes: https://wiki.securityweekly.com/Episode574 Visit our website: http://securityweekly.com Follow us on Twitter: https://www.twitter.com/securityweekly
Fear and Loathing at the SOHO border and the IoT. Today's show is about devices phoning home and the risk that presents to you. So, since a lot of traffic is based in TCP, most soho equipment uses a simple approach to inbound traffic which is to say, it's blocked with the exception of packets which have their ACK bits set. Full Show Notes: https://wiki.securityweekly.com/SDL_Episode70 Visit our website: http://securedigitallife.com Follow us on Twitter: https://www.twitter.com/securediglife