Podcasts about Privacy

Share on
Share on Facebook
Share on Twitter
Share on Reddit
Copy link to clipboard

The ability of an individual or group to seclude themselves, or information about themselves

  • 6,495PODCASTS
  • 19,111EPISODES
  • 37mAVG DURATION
  • 8DAILY NEW EPISODES
  • Oct 21, 2021LATEST
Privacy

POPULARITY

20112012201320142015201620172018201920202021


Best podcasts about Privacy

Show all podcasts related to privacy

Latest podcast episodes about Privacy

Paul's Security Weekly TV
Excited About PCI DSS 4.0? What to Expect & How to Prepare, Part 2 - Chris Pin - SCW #91

Paul's Security Weekly TV

Play Episode Listen Later Oct 21, 2021 45:51


We're getting closer to the Q1 2022 release of PCI DSS 4.0, which is expected to differ from the current PCI DSS 3.2.1 version in a few key ways. This includes giving organizations more options in how they become compliant, along with customized implementation. In this podcast, Chris Pin, VP of Privacy and Compliance at PKWARE, will discuss what customized implementation means for organizations, additional changes to 4.0, and why they're important. And, while PCI 3.2.1 won't be retired until 2024, it's a good idea for companies to get started now with their 4.0 compliance strategy. After all, the road to compliance could be a long one, and 2025 will be here before we know it!    Visit https://www.securityweekly.com/scw for all the latest episodes! Show Notes: https://securityweekly.com/scw91

Paul's Security Weekly TV
Excited about PCI DSS 4.0? What to Expect & How to Prepare, Part 1 - Chris Pin - SCW #91

Paul's Security Weekly TV

Play Episode Listen Later Oct 20, 2021 34:08


We're getting closer to the Q1 2022 release of PCI DSS 4.0, which is expected to differ from the current PCI DSS 3.2.1 version in a few key ways. This includes giving organizations more options in how they become compliant, along with customized implementation. In this podcast, Chris Pin, VP of Privacy and Compliance at PKWARE, will discuss what customized implementation means for organizations, additional changes to 4.0, and why they're important. And, while PCI 3.2.1 won't be retired until 2024, it's a good idea for companies to get started now with their 4.0 compliance strategy. After all, the road to compliance could be a long one, and 2025 will be here before we know it!    Visit https://www.securityweekly.com/scw for all the latest episodes! Show Notes: https://securityweekly.com/scw91

The New Yorker: Poetry
Forrest Gander Reads Ada Limón

The New Yorker: Poetry

Play Episode Listen Later Oct 20, 2021 31:22


Forrest Gander joins Kevin Young to read “Privacy,” by Ada Limón, and his own poem “Post-Fire Forest.” Gander is a Chancellor of the Academy of American Poets, a member of the American Academy of Arts and Sciences, and the winner of a Pulitzer Prize for his collection “Be With.”

Black Women Heal Show
It‘s a thin line: censorship, over-sharing, and maintaining privacy online

Black Women Heal Show

Play Episode Listen Later Oct 20, 2021 59:09


With the online world's influence over everyday people, it's becoming increasingly difficult to maintain privacy in a world full of over-sharers. What we know to be normal was once inconceivable and unheard of.  How far is too far when sharing your life online? How do we build safe spaces when censoring notable public figures from the black and brown community is society's way of controlling us?  In this episode, the ladies discuss censorship, oversharing online, and how to protect our children from forced information their young minds aren't able to comprehend yet. Help us better serve you by taking our show survey. We promise it won't take more than five minutes! We appreciate you, family, Tap here  Time Stamps:  00:00:00- Intro 00:03:18-Censorship and its effects on black voices. 00:08:28-Doing it for the culture. 00:18:48- The sexual grooming of our children. 00:24:20- Is hell really worse than the abuse of children? 00:3703:-Over-sharing and privacy online. Ways to support the show: -Follow on IG and tag us to let us know if you enjoyed today's episode! Important Shit: -Write to us at blackwomenhealpod@gmail.com with your questions or anonymously for BWH-Two Cents with letters about your own life experiences for a possible feature on the show!!!      

New Classical Tracks with Julie Amacher
ARC Ensemble honors composer Dmitri Klebanov

New Classical Tracks with Julie Amacher

Play Episode Listen Later Oct 20, 2021 19:40


ARC Ensemble – Chamber Works by Dmitri Klebanov (Chandos)  Jump to giveaway form “It is very interesting that every composer tells a different story of overcoming difficulties,” said Simon Wynberg, who is the artistic director for the Arc Ensemble. “It's about planting a flag in the ground and producing marvelous work. It's a really exciting kind of project.” Chamber works by Dmitri Klebanov is the fifth recording from the group's Music and Exile series, and it features the Jewish Ukrainian composer Dimitri Klebanov How did the Yuri Klebanov contribute to this album full of his father's music? “He had amazing insights into his father's life. He had anecdotes and letters and notes between Shostakovich his father from when he was a boy. There were all sorts of things that he could tell me about the repertoire and about Dimitri Klebanov's life. We corresponded for years. “It was a real shock when he suddenly passed. I know he was really looking forward to the release of the CD because it was the first time in 30 years that a commercial release of his father's music had happened. “The album tracks his progress and compositional style. It starts with his fourth quartet, which was completed after the war, and it includes his piano trio and fifth quartet. The later work is more advanced harmonically than the pervious two works.” Watch now To hear the rest of my conversation, click on the extended interview above, or download the extended podcast on iTunes or wherever you get your podcasts. Giveaway Giveaway You must be 13 or older to submit any information to American Public Media/Minnesota Public Radio. The personally identifying information you provide will not be sold, shared, or used for purposes other than to communicate with you about things like our programs, products and services. See Terms of Use and Privacy. This giveaway is subject to the Official Giveaway Rules. Resources ARC Ensemble – Chamber Works by Dmitri Klebanov (Amazon) ARC Ensemble – Chamber Works by Dmitri Klebanov (Royal Conservatory Music Store) ARC Ensemble (official site)

INSPIRE GOD'S PEOPLE, The Podcast
EP 141 | He Took His Shirt Off

INSPIRE GOD'S PEOPLE, The Podcast

Play Episode Listen Later Oct 20, 2021 43:58


On today's Quick Take Lavell Neal joins the show and topics include Lack of Privacy isn't Normal Opportunity vs Handout He Took His Shirt Off Bewitched  Visit JWil on Instagram: www.instagram.com/mr_bellwether (@Mr_Bellwether) Donate to IGP via Paypal : Send to jermainewilsonmusic@yahoo.com Listen to today's show and past episodes by visiting www.inspiregodspeople.com/podcast Listen to IGP on Apple Podcasts: https://podcasts.apple.com/us/podcast/inspire-gods-people-the-podcast/id1438530566 Email Jay at Jermainewilsonmusic@gmail.com Add JWilMusic to your Apple Music playlist https://music.apple.com/kn/artist/jwilmusic/558161868 Stream More JWilMusic at www.jermainewilson.bandcamp.com

Ask Noah Show
Episode 255: Decrypting Privacy with Dr. Andy Yen

Ask Noah Show

Play Episode Listen Later Oct 20, 2021 56:22


Dr. Andy Yen joins us this hour to discuss the latest features of Proton. We ask Andy about the Proton user, a French suspect that was arrested for squatting. Did ProtonMail do it's job in protecting privacy? -- During The Show -- 00:45 - Thunderbolt Dock - Aaron Lenovo Thunderbolt Dock Affiliate (http://www.amazon.com/dp/B07M6S81CM/?tag=minddripmedia-20) 05:00 - POE Access Points - Mark UniFi AC Pro AP (https://www.newegg.com/ubiquiti-uap-ac-pro/p/N82E16833664026) WifiAnalyzer (https://f-droid.org/en/packages/com.vrem.wifianalyzer/) Approximately 50ft apart/20DB Signal Separation TP Link Omada (https://www.tp-link.com/us/business-networking/ceiling-mount-access-point/) 11:30 - Locally Managed WiFi 6 AP - Eric UniFi Cloudkey (https://store.ui.com/collections/unifi-accessories/products/unifi-cloudkey) UniFi Docker Controller (https://github.com/linuxserver/docker-unifi-controller) UniFI AP 6 lite (https://store.ui.com/products/unifi-ap-6-lite) Ruckus (https://www.commscope.com/product-type/enterprise-networking/wireless-access-points/indoor/) 16:30 - Audio Hardware Recommendations - Rick Balanced vs Unbalanced (https://www.aviom.com/blog/balanced-vs-unbalanced/) Studio Hub (https://studiohub.com/adapters/) Volumio (https://volumio.org/) 23:00 - Ham Radio SDR Application - Charlie SDR++ (Open Source crossplatform Ham Radio/SDR program) SDR++ Sourcecode (https://github.com/AlexandreRouma/SDRPlusPlus) YouTube Video (https://www.youtube.com/watch?v=rNhh9eueYZg) 23:40 Pick of the Week Bash Crawl (https://gitlab.com/slackermedia/bashcrawl) 24:40 Gadget of the Week Bangle Smart Watch (https://www.omgubuntu.co.uk/2021/09/bangle-js-2-is-a-hackable-open-source-smartwatch-that-runs-javascript) 25:40 Andy Yen/Protonmail Interview Proton Calendar Open Source Third Party Audits Surveillance based advertising Climate Activist Arrest Situation Email vs VPN privacy Operational Security/Threat Modeling Privacy Decrypted (https://protonmail.com/blog/introducing-privacy-decrypted/) What is next for Protonmail? 51:00 PinePhone Pro Released Pine64 Blog Post (https://www.pine64.org/2021/10/15/october-update-introducing-the-pinephone-pro/) PC Mag Article (https://www.pcmag.com/news/pinephone-pro-399-linux-smartphone-launches) 53:30 Ubuntu 21.10 Released XDA Article (https://www.xda-developers.com/ubuntu-21-10-arrives/) -- The Extra Credit Section -- For links to the articles and material referenced in this week's episode check out this week's page from our podcast dashboard! This Episode's Podcast Dashboard (http://podcast.asknoahshow.com/255) Phone Systems for Ask Noah provided by Voxtelesys (http://www.voxtelesys.com/asknoah) Join us in our dedicated chatroom #GeekLab:linuxdelta.com on Matrix (https://element.linuxdelta.com/#/room/#geeklab:linuxdelta.com) -- Stay In Touch -- Find all the resources for this show on the Ask Noah Dashboard Ask Noah Dashboard (http://www.asknoahshow.com) Need more help than a radio show can offer? Altispeed provides commercial IT services and they're excited to offer you a great deal for listening to the Ask Noah Show. Call today and ask about the discount for listeners of the Ask Noah Show! Altispeed Technologies (http://www.altispeed.com/) Contact Noah live [at] asknoahshow.com -- Twitter -- Noah - Kernellinux (https://twitter.com/kernellinux) Ask Noah Show (https://twitter.com/asknoahshow) Altispeed Technologies (https://twitter.com/altispeed) Special Guests: Dr. Andy Yen and Steve Ovens.

Thinking Crypto Interviews & News
Luke Mulks Interview - Brave & Basic Attention Token (BAT) - Brave Talk & Search, Crypto Market

Thinking Crypto Interviews & News

Play Episode Listen Later Oct 19, 2021 49:45


Luke Mulks is the VP of Business operations at Brave and Basic Attention token. We talk about the latest items with the Brave browser such as Talk, Brave Search, Brave 1.30 supports Microsoft Edge's protocol on Windows. We also touch on Bitcoin and the crypto market.https://twitter.com/lukemulkshttps://brave.com/

Microsoft Mechanics Podcast
AI-based Privacy Management for Microsoft 365

Microsoft Mechanics Podcast

Play Episode Listen Later Oct 19, 2021 13:21


Get started with Microsoft's new AI-based privacy management solution for Microsoft 365, which applies intelligence to quickly assess your organization's privacy risks and help anyone working with personal data make the right decisions. Alym Rayani, General Manager for Microsoft 365 Compliance and Privacy, joins Jeremy Chapman to show how you can automate subject rights requests for Microsoft 365 data and ensure integration with your existing solutions using our API. Privacy requirements universally impact organizations as more privacy regulations are introduced around the globe. And just like security is a top priority, privacy needs to be too. Now you can build a privacy resilient organization where everybody working with personal data is empowered to be part of the solution. For admins- We've tailored the experience to what privacy teams care about to proactively identify and protect against common privacy risks. For privacy managers- We've built automation for processing subject rights requests at scale, and at quality, whether you're using our built-in experience or tools from a partner. For users- Understand privacy risks in the moment, or even in the context of your work with data. ► QUICK LINKS: 00:00 - Introduction 02:19 - See how it works: Everyday user experience 05:41 - Admin experience 08:00 - Policies 10:20 - Subject rights requests 12:38 - Wrap up ► Link References: Get started with a trial experience at https://aka.ms./TryPrivacyManagement Find guidance geared towards admins, data officers, and data workers at https://aka.ms/PrivacyManagementDocs ► Unfamiliar with Microsoft Mechanics? We are Microsoft's official video series for IT. You can watch and share valuable content and demos of current and upcoming tech from the people who build it at #Microsoft. Subscribe to our YouTube: https://www.youtube.com/c/MicrosoftMechanicsSeries?sub_confirmation=1 Join us on the Microsoft Tech Community: https://techcommunity.microsoft.com/t5/microsoft-mechanics-blog/bg-p/MicrosoftMechanicsBlog Watch or listen via podcast here: https://microsoftmechanics.libsyn.com/website ► Keep getting this insider knowledge, join us on social: Follow us on Twitter: https://twitter.com/MSFTMechanics Follow us on LinkedIn: https://www.linkedin.com/company/microsoft-mechanics/

Security In Five Podcast
Episode 1083 - Best Of 2021 - Password Generation Guidelines Per NIST

Security In Five Podcast

Play Episode Listen Later Oct 19, 2021 8:52


This episode is one of the top downloaded episodes of 2021. Password Guidelines Per NIST. New shows return Tuesday, Oct. 26th, 2021. Be aware, be safe. Get ExpressVPN, Secure Your Privacy And Support The Show Become A Patron! Patreon Page *** Support the podcast with a cup of coffee *** - Ko-Fi Security In Five —————— Where you can find Security In Five —————— Security In Five Reddit Channel r/SecurityInFive Binary Blogger Website Security In Five Website Security In Five Podcast Page - Podcast RSS Twitter @securityinfive iTunes, YouTube, TuneIn, iHeartRadio,

Random but Memorable
Secure Sharing Mug Collection

Random but Memorable

Play Episode Listen Later Oct 19, 2021 45:19


PSST! Want to know a secret? You can now securely share 1Password items with anyone! Tune in to learn more about our new secure sharing tool and how it will transform your digital life. We also go behind-the-scenes with Beyer and Nick to discover how they created the browser experience for iOS15 and what the future holds for 1Password in the browser.Plus, it's us vs the memorable password generator for our last ever Three Word Password, and Matt randomly, but memorably, shows off his royal mug collection. Don't say we don't spoil you. ☕️

Surveillance Report
Are Custom ROMs ACTUALLY better for privacy? - Surveillance Report 59

Surveillance Report

Play Episode Listen Later Oct 19, 2021 29:29


There's new research regarding the privacy of Android ROMs from manufactures compared to LineageOS & /e/OS, tune in to learn more! Welcome to the Surveillance Report - featuring Techlore & The New Oil to keep you updated on the newest security & privacy news. This report most notably recaps a win regarding Amazon Ring, Snapchat hunting people down, and more! Support The Podcast The New Oil Support Methods: https://thenewoil.xyz/links.html Techlore Support Methods: https://techlore.tech/support.html Timestamps 00:00 Introduction01:11 Data Breaches03:33 Company News13:33 Research & Beginning of Android/Lineage/E Coverage!19:58 Politics22:10 FOSS News24:56 Misfits SR59 Sources: https://github.com/techlore/channel-content/blob/master/Surveillance%20Report%20Sources/SR59.md Main Sites Techlore Website: https://techlore.tech The New Oil Website: https://thenewoil.xyz/ Surveillance Report Podcast: https://www.surveillancereport.tech/

Of Record | A Guide to Digital Marketing
Oh, You Wanted that? Better Luck Next Year | Weekly Digital Marketing Update 10/18

Of Record | A Guide to Digital Marketing

Play Episode Listen Later Oct 18, 2021 34:30


Digital Ad Market Update: 10/06 - 10/18 2021Matt and Joe team up and breakdown the biggest holiday shopping news so far. Tune in for everything marketing, tech, and culture related - all in 35 minutes or less.Top Stories:Shipping delays are just what the holidays needed. We're breaking down why this holiday season might look different than those of the past.Apple and Facebook's Privacy battle has come to a conclusion and were clueing you in on how your holiday shopping might change.Articles Mentioned:Shipping Delays: https://cnb.cx/3BWtJR4

Chad Hartman
How much privacy should Sheletta's son get?

Chad Hartman

Play Episode Listen Later Oct 18, 2021 14:38


Sheletta's son Andrew is a remarkable kid, and he's asking for a little privacy as concerns his texting. Should he get it? Laura Oakes and the listeners weighed in. See omnystudio.com/listener for privacy information.

The Clark Howard Podcast
10.18.21 Restaurants and the Labor Shortage / Privacy vs Telematics Tracking Drivers.

The Clark Howard Podcast

Play Episode Listen Later Oct 18, 2021 29:20


Restaurants and the service industries overall are enduring severe labor shortages for all to see. This is creating high anxiety. Patience is a virtue. / 16 years into telematics, only 2% of drivers allow themselves to be tracked. Do you want your every move tracked while driving? How one major insurer is pushing for it, plus, a tale of Tesla's driver-assist testing. Ask Clark topics include: Why You Should Never Use a Debit Card To Pay for Anything - Clark / Submit a complaint | Consumer Financial Protection Bureau / 6 Best Ways To Send Money Online / Term Life vs. Whole Life Insurance / The Best Term Life Insurance Companies / MyChart | Powered by Epic / How To Prevent, Report and Repair Identity Theft Want more money advice? Sign up for Clark's free daily newsletter! Free Advice: Clark's Consumer Action Center Learn more about your ad choices. Visit megaphone.fm/adchoices

The Dan Abrams Podcast
The Dan Abrams Podcast with Mike Florio

The Dan Abrams Podcast

Play Episode Listen Later Oct 18, 2021 43:05


Mike Florio, founder of ProFootballTalk.com and author of the upcoming book "Playmakers: How the NFL Really Works (And Doesn't)," joins Dan to discuss Jon Gruden's leaked emails and subsequent resignation as coach of the Las Vegas Raiders.

Security In Five Podcast
Epsiode 1082 - A Scary Case Of Prior Employee Tech Revenge

Security In Five Podcast

Play Episode Listen Later Oct 18, 2021 8:05


This episode talks about a story out of Australia where a former employee accessed the former employer's systems. What was deleted could have cost people's lives but was caught before any damage was done. Be aware, be safe. Get ExpressVPN, Secure Your Privacy And Support The Show Become A Patron! Patreon Page *** Support the podcast with a cup of coffee *** - Ko-Fi Security In Five —————— Where you can find Security In Five —————— Security In Five Reddit Channel r/SecurityInFive Binary Blogger Website Security In Five Website Security In Five Podcast Page - Podcast RSS Twitter @securityinfive iTunes, YouTube, TuneIn, iHeartRadio,

Monero Talk
Ethan Lou on his Crypto Journey to North Korea

Monero Talk

Play Episode Listen Later Oct 18, 2021 55:00


If you enjoyed the show & would like to support us, a donation of any size would be greatly appreciated and would mean so much! XMR Donations Accepted (type in MoneroTalk.crypto in your CakeWallet send address field): 49GdSCVTTE4TaDknDFn95QGc3mn3g7JZiPKX6QM7ZpuE5cscRFuGNhnjATKnjDHY7tNUQMM63n24uPYbj1AXFBk5KUPnDrL OR you can also help support the channel by purchasing a bag of delicious Guatemalan Coffee! Check out https://gratuitas.org/ to buy a bag & if you enjoy what you taste, send a Monero tip directly to the farmers that grew, harvested, prepared, and roasted your beans! Check out our new Gratutias Ad: https://www.youtube.com/watch?v=FVJq-SzAlow TODAY'S

Above Board
The episode where we initially think there's nothing new, but in actuality a whole ton of things are new

Above Board

Play Episode Listen Later Oct 18, 2021 40:40


Sometimes Jack and Paul feel like every day is groundhog day, and that not much changes day-to-day. But in reality, lots has been launched, updated, changed, and made progress on. Including: a content survey, a new freelance writer, Fathom NFTs, open-sourcing a Fathom project, disabling MRR emails and how we think about support as it relates to growth.

Good Morning Liberty
No Liberty Without Privacy / Live from Freer Future Fest 2021

Good Morning Liberty

Play Episode Listen Later Oct 17, 2021 76:39


How do tyrannical governments establish and maintain their power? They have to control the population, and to do that they must remove your privacy rights. "No Liberty Without Privacy" was brought to you by People United for Privacy. Go to unitedforprivacy.com to get involved. This speech was recorded last weekend at Freer Future Fest in Nashville, TN. Learn more about your ad choices. Visit megaphone.fm/adchoices

Terra Bites
Shade Protocol: An Array of Privacy-Preserving Decentralized Applications

Terra Bites

Play Episode Listen Later Oct 16, 2021 37:09


*Disclaimer: not advice. See more below* Learn more about Shade Protocol: https://shadeprotocol.io/ Read the whitepaper: https://shadeprotocol.io/pdf/Shade2.pdf 1:19 How Shade Protocol started and vision 7:30 Shade bringing stability to other ecosystems 12:23 Shade working towards building a more stabilized and robust DeFi currency 18:08 Shade Protocol functionality and overview 25:17 Details on Shade airdrop 31:02 Where Luna stakers claim Shade airdrop *** Stay up to date with Terra Bites, the place to get news, interviews, and explainers on the Terra DeFi Crypto Ecosystem. Reach out to hello@terrabit.es or @TerraBitesPod on Telegram. Vote for the Terra Bites validator using Terra Station or https://station.terra.money​ Follow us on Twitter at https://twitter.com/TerraBitesPod​ and add Terra Bites to your favorite podcast app at http://terrabit.es​ *Disclaimer: Terra Bites is for informational and educational purposes only. Nothing on this show is advice - no financial, tax, legal, or any other kind of advice. Nothing we say is an inducement to make a particular investment or follow a particular strategy. Anything you invest in is at your own risk; do your own research and consult with professionals.*

Monero Talk
MONEROTOPIA

Monero Talk

Play Episode Listen Later Oct 16, 2021 77:18


If you enjoyed the show & would like to support us, a donation of any size would be greatly appreciated and would mean so much! XMR Donations Accepted (Type in monerotalk.crypto in Cake Wallet): 49GdSCVTTE4TaDknDFn95QGc3mn3g7JZiPKX6QM7ZpuE5cscRFuGNhnjATKnjDHY7tNUQMM63n24uPYbj1AXFBk5KUPnDrL OR you can also help support the channel by purchasing a bag of delicious Guatemalan Coffee! Check out https://gratuitas.org/ to buy a bag & if you enjoy what you taste, send a Monoero tip directly to the farmers that grew, harvested, prepared, and roasted your beans! MONEROTOPIA

Getting Simple
#54: Bytes — NFTs and Digital Art

Getting Simple

Play Episode Listen Later Oct 16, 2021 30:31


Host Nono Martínez Alonso and Aziz Barbar on non-fungible tokens (NFTs), blockchain, cryptocurrencies, and digital art. Listen to this episode to learn about non-fungible tokens (NFTs). Note that cryptocurrencies and stock options are highly volatile markets, and you shouldn't make financial decisions based on this episode. Nono hosts the Getting Simple podcast, sketches things that call his attention, writes stories about enjoying a slower life, and records live streams and tutorials on creative coding and machine intelligence. Aziz is an architect and design technologist. He occasionally teaches design courses on computation and the built environment. Favorite quotes 'Beeple is looking at his whole body of work as it's presented on Instagram as a kind of Duchampian readymade' —Noah Davis Links Beeple (@beeple_crap) Christie's Foundation.app - “We're bringing digital creators, crypto natives, and collectors together to move culture forward." R//Motherboard by @maxwellstep Nifty Gateway - Owned by Gemini (Tyler and Cameron Winklevoss) Ethereum “Minting” and “Gas” “Drops” MetaMask Metapurse WalletConnect Beeple: A Visionary Digital Artist at the Forefront of NFTs Jack Dorsey sells his first tweet ever as an NFT for over $2.9 million Vignesh Sundaresan, known as MetaKovan, on paying $69 million for Beeple NFT Cardano Zcash People mentioned Mike Winkelmann @beeple_crap Vignesh Sundaresan @MetaKovan Vitalik Buterin Outline Getting familiar with NFTs. [01:55] The cultural significance of NFTs. [05:22] The $69 million dollar auction that exploded the NFT world. [08:35] NFTs allow for a much clearer history of ownership. [11:44] There are thousands of cryptocurrencies that operate in different ways. [13:54] NFTs are created inside the Ethereum chain. [14:44] Privacy in the blockchain. [16:34] Minting an artwork costs money. [18:23] The environmental impact of crypto transactions. [21:05] Artists make limited drops to build hype around their work. [22:22] Moving from Proof of Work to Proof of Stake. [23:42] Have you bought an NFT yet? [26:02] You're not going to create value out of thin air. [28:04] Wrapping up. [29:41] Submit a question about this or previous episodes. I'd love to hear from you. Join the Discord community. Meet other curious minds. If you enjoy the show, would you please consider leaving a short review on Apple Podcasts/iTunes? It takes less than 60 seconds and really helps. Show notes, transcripts, and past episodes at gettingsimple.com/podcast. The cover image is a derivative from Imaginibus' picture of a museum frame. Follow Nono Twitter.com/nonoesp Instagram.com/nonoesp Facebook.com/nonomartinezalonso YouTube.com/nonomartinezalonso

Joint Effort with Des Moines Orthopaedic Surgeons
All Things Sleep: Routines, Deprivation, and Conditions with Monica Hoffman, MD

Joint Effort with Des Moines Orthopaedic Surgeons

Play Episode Listen Later Oct 15, 2021 27:53


Sleep medicine is a medical specialty focusing on the diagnosis and treatment of sleep conditions and disorders. Sleep apnea is a disorder where breathing repeatedly starts and stops while sleeping. Insomnia is a condition where falling and staying asleep becomes difficult. Sleep deprivation is when an individual does not get the required amount of sleep.  About Monica Hoffman, MD Monica Hoffman, MD joins The Iowa Clinic after 11 years of practicing sleep medicine both in private practice and the Army. She is excited to continue building The Iowa Clinic's Sleep Medicine program and offer comprehensive sleep medicine care to patients. Dr. Hoffman has always been fascinated by sleep and the fact that we spend almost 1/3 of our lives asleep. She enjoys how new discoveries in the science of sleep medicine continue to improve treatment for sleep disorders. To her, some of the most rewarding aspects of being a physician are improving the lives of patients and teaching medical students and residents. Outside of the clinic, Dr. Hoffman enjoys spending time with family, volunteering at church and her daughters' school, skiing, biking, and reading. This podcast represents Dr. Barron Bremner and Dr. Jason Sullivan's opinions and their guests on the show. The content here should not be taken as medical advice. The content here is for informational purposes only, and because each person is so unique, please consult your healthcare professional for any medical questions. Views and opinions expressed in the podcast and website are our own and do not represent that of our places of work. While we make every effort to ensure that the information we share is accurate, we welcome any comments, suggestions, or corrections of errors. Privacy is of the utmost importance to us. All people, places, and scenarios mentioned in the podcast have been changed to protect patient confidentiality. This podcast should not be used in any legal capacity whatsoever, including but not limited to establishing a "standard of care" in a legal sense or as a basis for expert witness testimony. No guarantee is given regarding the accuracy of any statements or opinions made on the podcast or website. In no way does listening, reading, emailing, or interacting on social media with our content establish a doctor-patient relationship.

Security In Five Podcast
Episode 1081 - Security In Five Is Now On Wisdom App

Security In Five Podcast

Play Episode Listen Later Oct 15, 2021 6:16


Security In Five is now a Top Mentor on the new Widsom App. This episode talks about the new venture and how it will be providing different content than the podcast. Wisdom App - https://www.joinwisdomapp.com/ Be aware, be safe. Get ExpressVPN, Secure Your Privacy And Support The Show Become A Patron! Patreon Page *** Support the podcast with a cup of coffee *** - Ko-Fi Security In Five —————— Where you can find Security In Five —————— Security In Five Reddit Channel r/SecurityInFive Binary Blogger Website Security In Five Website Security In Five Podcast Page - Podcast RSS Twitter @securityinfive iTunes, YouTube, TuneIn, iHeartRadio,

adsventure.de - Facebook & Social Media Advertising Podcast
Die Zukunft personalisierter Werbung auf Facebook - Interview mit Ramona Dold (iOS Serie Teil 6/x) - #46

adsventure.de - Facebook & Social Media Advertising Podcast

Play Episode Listen Later Oct 15, 2021 29:49


Let's talk Privacy! Im Rahmen unserer iOS Serie starten wir gemeinsam mit Facebook eine neue Miniserie über die Zukunft von Personalisierung auf Facebook. In der ersten Folge sprechen wir dazu mit Ramona Dold von Facebook. Ramona klärt auf, welche Auswirkungen und Herausforderungen das iOS Update für Werbetreibende mit sich gebracht hat und was du nun tun kannst, um weiter performant zu bleiben. Außerdem sprechen wir über die Zukunft von personalisierter Werbung auf Facebook und was es mit “Privacy-Enhancing Technologies” auf sich hat.

The Sharyl Attkisson Podcast
The Amish Covid Experience, Herd Immunity, and Fighting Propaganda

The Sharyl Attkisson Podcast

Play Episode Listen Later Oct 14, 2021 17:43


The fascinating story about the Amish Covid 19 experience, natural immunity, and going up against the mob of propagandists trying to keep you from learning these facts.Subscribe to my two podcasts: “The Sharyl Attkisson Podcast” and “Full Measure After Hours.” Leave a review, subscribe and share with your friends!Order “Slanted: How the News Media Taught Us to Love Censorship and Hate Journalism” by Sharyl Attkisson at Harper Collins, Amazon, Barnes & Noble, Books a Million, IndieBound, Bookshop!Visit JustTheNews.com, SharylAttkisson.com and www.FullMeasure.news for original reporting. Do your own research. Make up your own mind. Think for yourself.See Privacy Policy at https://art19.com/privacy and California Privacy Notice at https://art19.com/privacy#do-not-sell-my-info.

Hashmap on Tap
#94 Data Accessibility & Privacy Engineering with Danielle Beringer of Gretel.ai

Hashmap on Tap

Play Episode Listen Later Oct 14, 2021 52:34


Danielle Beringer is Director of Technical Partnerships at Gretel.ai, an open-source, privacy engineering as a service allowing you to synthesize and transform your data quickly and securely. Gretel just closed a $50M B round and Danielle shares how they are delivering great outcomes with synthetics while reshaping how people are working with sensitive data and PII datasets. Listen in to hear how Gretel is tackling the challenges of data sharing and accessibility to data, and what they are planning for the future. Show Notes: https://gretel.ai/ https://docs.gretel.ai/ https://gretel.ai/blog https://gretel.ai/media Why privacy by design matters more than ever: https://gretel.ai/blog/why-privacy-by-design-matters-more-than-ever On Tap for today's episode: Green Matcha Latte from Bellocq and Pique Tea Crystals - Passion Fruit Green Contact Us: https://www.hashmapinc.com/reach-out

Healthy Wealthy & Smart
561: Schellie Percudani & Rebecca Rakoski: The Importance of Cybersecurity

Healthy Wealthy & Smart

Play Episode Listen Later Oct 14, 2021 37:13


In this episode, Managing Partner of XPAN Law Partners, Rebecca Rakoski, and Senior Account Manager at Contango IT, Schellie Percudani, talk about cybersecurity, especially for small businesses. Today, Rebecca and Schellie talk about business privacy and security practices, cost-effective steps that you can take to protect your business, and the importance of cybersecurity insurance. Why do small businesses have to worry about cybersecurity? Hear about ransomware attacks and how to react to them, data privacy laws and how they impact your business, and the value of hiring lawyers, all on today's episode of The Healthy, Wealthy & Smart Podcast.   Key Takeaways “What we all have in common between the small businesses and the large businesses is we're all human.” “You're only as good as your last backup.” “You can't have privacy without security.” “You definitely don't want to be fudging any kind of information. You definitely want transparency.” There are four basic things that you can do as a business owner: enable multi-factor authentication, provide security awareness training, monitor and patch your systems, and enable software and hardware encryption. “Encryption is your Get Out Of Jail Free card in most jurisdictions.” “60% of small businesses will go out of business within 6 months of a data breach without liability insurance.” “The first thing that businesses need to do is take a proactive posture.” “If you look at data breaches, if it's not caused by an employee in the company, it's caused by an employee at one of their vendors.” “Make sure you put yourself in a legally defensible position.”   More About Schellie Percudani Schellie is a Senior Account Manager at Contango IT located in Midtown, Manhattan. With 75 people, Contango IT services their clients through 4 key areas of technology. IT Service/Support - We offer unlimited onsite and remote support for all covered users and devices with up to 60-90 second response time. In that same fixed monthly price, we also include asset management, budgeting breakdowns, disaster recovery planning, compliance requirement review and planning, technology road mapping, and a lot more. IT Infrastructure / Cabling - Moving offices? Contango IT handles the technology side of the move through Cabling and IT setup. Cybersecurity - 45 people strictly in Cybersecurity keeps Contango IT on top of the biggest buzz In technology. Risk? Compliance? Reach out, looking to help in any way possible. Even if it is just second opinion or advice. Custom Programming - Front-end or Back-end development, Android, iOS, Web-based and much more. Winners of the Microsoft Best Use of Technology Award and the NYU Stern New Venture Competition Any technology questions, reach out! With hundreds of clients over 4 services, Contango IT has seen it before.   More About Rebecca Rakoski Rebecca L. Rakoski is the managing partner at XPAN Law Partners. Rebecca counsels and defends public and private corporations, and their boards, during data breaches and responds to state/federal regulatory compliance and enforcement actions. As an experienced litigator, Rebecca has handled hundreds of matters in state and federal courts. Rebecca skilfully manages the intersection of state, federal, and international regulations that affect the transfer, storage, and collection of data to aggressively mitigate her client's litigation risks. Rebecca is on the Board of Governors for Temple University Health Systems, and an adjunct professor at Drexel University's Thomas R. Kline School of Law and Rowan University.   Suggested Keywords Healthy, Wealthy, Smart, Cybersecurity, Small Business, Privacy, Security, IT, Insurance, Legal, Hacking, Ransomware, Malware, Data, Technology, Data Breaches, Encryption   To learn more, follow Schellie and Rebecca at: Website:          https://www.contangoit.com                         https://xpanlawpartners.com Twitter:            @XPANLawPartners                         @RRakoskiesq Instagram:       @schellie00 LinkedIn:         Schellie Percudani                         Rebecca Rakoski, Esq.   Subscribe to Healthy, Wealthy & Smart: Website:                      https://podcast.healthywealthysmart.com Apple Podcasts:          https://podcasts.apple.com/us/podcast/healthy-wealthy-smart/id532717264 Spotify:                        https://open.spotify.com/show/6ELmKwE4mSZXBB8TiQvp73 SoundCloud:               https://soundcloud.com/healthywealthysmart Stitcher:                       https://www.stitcher.com/show/healthy-wealthy-smart iHeart Radio:               https://www.iheart.com/podcast/263-healthy-wealthy-smart-27628927   Read the Full Transcript Here:  00:02 Hello, Rebecca and Shelly, welcome to the podcast. I'm very excited to have you on to talk all about cybersecurity. So welcome, welcome.   00:13 Thank you for having us.   00:14 Yes, thank you. And   00:16 so this cybersecurity this for me as a small business owner, is brand new to me. Although it probably shouldn't be, but it is, but that's why we're talking about it today. But before we get into it, can you guys give a little bit more detail about yourself and what you do so if the listeners understand why I'm talking to you guys today?   00:41 So I, Rebecca McCroskey, I'm a co founder and managing partner of x Pam law partners, we're a boutique cybersecurity and domestic and international data privacy law firm, which is a really fancy way of saying we help organizations with their cybersecurity, and data privacy needs, right? I have been a practicing attorney for almost four years. I hate to admit that sometimes I'm like, I'm dating myself. But what's great is we really help businesses, small startups, all the way that big multinational corporations because right now businesses are it's, it's really a brave new world that we're facing today. And businesses are getting attacked literally from all different sides. And so we started x pant to really help businesses understand what their legal obligations are, and what their legal liabilities are. And I tell my clients, my job is to avoid those problems for you, or do my best or put you in the best position to address them if and when it becomes an issue. So that's   01:48 what I do in a nutshell. Great, thanks, Shelly. How about you?   01:53 Yes, my name is Shelly perky. Donnie, I am an account manager with contango it and we help businesses and our end organizations if I could speak, we help them manage their day to day it to help build a strong security posture. We also help them with cybersecurity, we have 45 people strictly in cybersecurity, we have 25 penetration testers, eight ethical hackers. So we have a strong, you know, posture to help businesses build a posture so that they at the end, I wouldn't say that they're not going to be attacked, but they are prepared for anything that could happen. And so we help them with that. Got it.   02:43 Well, thank you both for being here to talk about this, because we are seeing more and more things in the news lately about ransomware and cyber attacks. And so oftentimes, we think of that as only happening to the big businesses, right? So why should small businesses, which a lot of listeners that listen to this podcast, are entrepreneurs or small business owners? Why should we have to worry about this?   03:10 So, you know, from a legal perspective, obviously, anybody who's ever come into contact with the legal system knows, it's not just for large businesses. So from a legal perspective, you're going to be subjected to liability from your people who whose information you're collecting, call them data subjects, you can, you're going to have contractual obligations with your vendors and third parties that you use and share data with. So put that and then just put that aside for a moment, then you also have small businesses have a reputation. And in the small business community, I am myself a small business, I'm a small law firm, Chief law firm. And you know, your reputation is everything. And so part of your reputation nowadays is how you're handling security and privacy. What are you doing the data. And so it's really important for small businesses to realize it's not just the big guys, we hear about them in the news, the colonial pipelines and the JPS foods and the Equifax is of the world. What you don't know is that every single day law firms like mine are getting a call from small businesses going help. We just clicked on a bad link, we just got ransomware, what do we do? And that happens all the time. It really you hear about the big guys, but it's the little guys that are really, you know, bearing the brunt of it, I think.   04:32 Now, I would agree. And what we all have in common between the small businesses and the large businesses is we're all human. And like Rebecca said, it's human error. Somebody clicked on an email, and they didn't know you know, they weren't trained. Hey, this is a spoofing and phishing email. This is what they look like, this is what you need to look for. And so that's where we come in, and it's we're all human and we all make mistakes. It's just no Like, you know, you this is what to look out for.   05:04 Got it. And so what are some of the issues facing businesses today, when it comes to cybersecurity?   05:12 What ransomware is obviously one of the biggest issues, right. And for your listeners who don't know what ransomware is, it is, what happens is somebody clicks on a bad link, download the bad, you know, attachment to a file, and the ransomware is downloaded to the system. Depending on how sophisticated the hackers are, they can either deploy it immediately, which means your system starts to, they start to encrypt your files, or it can be that they sit in there and wait for Oh, I don't know, the most inopportune moment that your business has. And then they deploy the ransomware. I've had clients where they deploy ransomware, or they first delete backups before they deploy the ransomware to really add insult to injury there. So but so that's one of the big things and then the your entire system gets encrypted and you can't unencrypted it without the encryption key which you then have to pay for the ransom part of it. And, you know, we hear about the big ransoms, again, the 4.4 million from colonial the 11 million from JBS. But you know, I was speaking with a colleague the other day, and a law firm got ransomware for $50,000. Now, that's a lot to a small business, it's a lot to any business, but they try to make it it's almost like it's commercials with what they think that they can afford and pay and so that they'll pay because they want you to pay the ransom. So that's I think, I think that's probably the   06:35 number one I would say so too. And then you now you're on their list, because you've paid your   06:41 SIR now. Wow, they paid   06:44 from now you're on a list of this hacker of like, Well, you know, was easy to get in before. Yeah. So let's see how we can get in again.   06:55 Right? Oh, my goodness. Hang in and you know Rebecca's right.   06:59 And that's where you know, also patching and monitoring your systems having a good strong it. posture is important. Because they see that stuff, they see little inklings of, Oh, well, something's going on here. somebody's trying to get in, you know, so they can see that. And you know, you're only as good as your last backup, and where is your backup being stored? And you know, is that in a secure location? Because if not, guess what? It doesn't matter. Because your information is gone.   07:33 Oh, my gosh, yeah, that makes so much more sense. Now, even just explaining what ransomware is. I didn't realize so they hold the encryption key ransom. And that's what you're paying for.   07:46 Correct you in order to get your data back, you have to pay to get the encryption key. And people think Well, okay, so I'll pay the ransom. And I'll get the encryption. I'll get the encryption key. And it's like, like magic? Yeah. You do, to some extent, although there used to be honor amongst thieves. It's not always the case anymore. No. But the other thing is to keep in mind encryption is not perfect. So you're not going to get it back exactly the way it was before. And a lot of laws have been changed now. So the fact that you were ransomware, it is in and of itself, a reportable event for a data breach. So that's another aspect to it. I mean, we're talking more about the technical aspects with the ransomware. But this is the other part where you know, I always say like, ransomware is like three explosions. The first one, oh, my God, my computer has exploded, but yeah, my computer's, what do I do? And then the second one, which is how are we going to, you know, get back up and running. And then the third is really the legal liability that flows from it and holding it together.   08:55 Also to I mean, Rebecca, are you finding that now, too, they're not only holding it, they're selling the data? Yeah. So they're still older data copied it, they're giving you back access to it, but now they're gonna sell it?   09:12 Yes. So what it comes down to is yes,   09:15 there's a lot to do. At that point to now you've got to tell your clients, hey, I've been   09:23 hacked. And that's where that whole reputation part comes in, you know, where you're, you know, these are people who are interesting information to you data. You know, I mean, as a law firm, we obviously hold our clients data. But you know, if you're a business, you could be holding personal information of your clients and business partners. You could be holding sensitive data on your employees or social security, financial information, information about their beneficiaries, which could be kids and things like that. So it really is a problem that just expands exponentially. It's a rabbit Well, I guess you're falling down that rabbit hole for a while.   10:04 You're like Alice in Wonderland.   10:07 Right? Oh, my gosh. Well, now you mentioned Rebecca about laws? And does that? Could you talk a little bit more about like certain data privacy laws and how that works? And if you're a small business, what does that mean?   10:24 Sure, so different. So there are two sets of laws that you need to really be businesses need to be concerned about, right. So one of them are your your data breach notification laws, which won't really be triggered unless and until there is a data breach, there are 50 states, there are 50 different laws, it's super fun for businesses who have to deal with us, then you have data privacy laws, and because nobody can seem to get their act together to come up with a federal law, we are stuck with, again, a patchwork of laws. So different states have passed different laws. And that is in and around a data subjects rights, about the data that's being collected about from them. So for example, California has a law, Virginia passed the law, Colorado passed a law recently, I know there's a proposed one in New Jersey in New York, Pennsylvania, Texas. So you name the state, and it's probably considering Washington State has tried to have made several passes into data privacy law. And what's interesting about this privacy laws is it they're usually, there's usually a threshold, sometimes small businesses will meet that threshold, but you need to understand that and it's all about the data that you're collecting. So the data you're collecting is going to trigger or not trigger requirements under some of these laws. That same data is the attractive nuisance, if you will, to the hacker they want to, they want to so you know, I always say you can't have privacy without security. So they really do go hand in glove.   12:00 What would be like an app if you know this at the top of your head, but an example of data privacy law from one of those states that has them on the books like what would be an example.   12:13 So California has the California consumer Privacy Act, the ccpa, which was amended in November, when the good citizens of California had a ballot initiative to pass the California Privacy Rights Act or the cpra. And those types of so in and around that you have different rights, the right to deletion, the right to correction, or right to a ratio of three, you know, the right to be forgotten is what's commonly known as, or just some of the rights that you're entitled to. And so businesses that fall under the within the purview of the ccpa, which is in effect right now, the cpra, which will go into effect in 2023. And so if you are a data subject, and the business is is under those laws, you can, you know, say to the pay, I want to know what you're doing with my data, hey, I need you to correct or delete my data. And the business has a set statutory period of time to respond to that data subject Access Request. It's about transparency. So anybody who saw all those updated privacy policies online, that's all driven by privacy laws, there's one in Europe called the GDPR, the general data protection regulation. And it really is in and around transparency, and data collection, storage and sharing practices. So that's, I could go much deeper, but I don't want to put anyone to sleep as I talk about loss.   13:42 I think I think that's really helpful just so that people get an idea of like, well, I don't even know what that is, you know, and if you're a small business owner, you've got a million other things on your plate, because you probably don't have a dedicated IT department, you don't have a dedicated cybersecurity department, oftentimes, you're a solopreneur. Or maybe you have less than 10 employees, you know, so all of a sudden, all of this stuff has to come on to somebody. So I think just getting an awareness out there that it exists, is really important so that you can maybe look it up in your own individual state.   14:20 Yeah, and one thing I would say and I know that this is a problem amongst entrepreneurs and startup is within the startup community is that they think well, we can do this ourselves. We can like cut and paste the privacy policy online and somebody Shelley's laughing at me over here. But you know, the purpose of these laws is to provide information about what that business is doing with data. So if you're borrowing it from somebody else, you could be in trouble twice because you're now you're not accurately reflecting what your laws are, what you're doing with the data. And you've basically taken this information and maybe obligating yourself under other laws of regular So for people who are listening, I know nobody likes talking to lawyers. I swear we're not that bad. But hiring a dedicated privacy or security attorney who understands this is really important because you told what to, you know, have an Ono moment on top of it. Oh, no moment when you're you know,   15:19 exactly. You definitely were Rebecca Sade is absolutely correct. There are people that do that they try to manipulate it and do it themselves. What they don't realize is once you're hacked, it's not just, Oh, no, they've got my information. Now I have to pay this ransomware. But guess what, oh, if you weren't following those privacy acts, you're also gonna get fined on that data, too. So you definitely don't want to be fudging any kind of information. You definitely want transparency.   15:47 Yeah. So hire lawyer. I'm a big fan of lawyers. I hire lawyers for for everything, because I don't I'm not a lawyer. I don't know how to do any of it. And I want to make sure that I am protected. So I 100% get it. Now, what? So we're talking about the pitfalls of what could happen if you have a breach, or issues facing businesses. So what can businesses do to help with cyber security? What are some things we can have in place to give us some protection and peace of mind?   16:20 Well, I would like to answer that this is Shelley, I'm someone who's there for simple and very effective basics that you could do as a business owner. And they're very cost effective. In fact, you know, you already have some of them in hand, as far as like Microsoft Office 365, all you have to do is enable your multiple factor authentication, that's a huge one, it's like leaving your light on in your house, if you're going out to dinner, they're gonna move on to the next house, because you have that layer of protection. And then, you know, security awareness training, educating your employees, educating yourself a lot of spoofing and phishing email looks like, that's huge that you know, it, it makes them aware. And that also, you know, it shows your employees that you're protecting them, you're protecting your clients, you know, it shows stability. And then also, you know, monitoring and patching your systems, you know, making sure that someone has an eye on what's going on. I'm looking for those little ticks that someone may be trying to get into your system, because a lot of people that you can have websites, you can tell by is your website going slower, that's usually a sign that someone might be trying to hack into your system. You know, so it's little things like that. And then also, you know, software and hardware encryption, that's a huge one. A lot of people, I know we have all our devices, it's our fingerprint or face that opens it. But if your hardware is not encrypted, they could just steal your laptop, pull out the hard drive, plug it in somewhere else, and guess what the data is theirs. And it's just the simple things that can help a business.   18:10 Yeah, so So to recap, the multiple factor identification that I get, and I do security awareness training, what what are these emails look like? What not to click on? monitoring and patching systems? So when you say patching systems, what exactly does that mean?   18:27 Well, that's where someone is patching in and they're, you know, they're making sure that your system is secure. And it's going somewhere in that secure like firewall, everything like that. So that is exactly   18:39 the basic there. There are systems like so for example, the Equifax data breach was a vulnerability in an Apache struts operating system. And when they found this vulnerability, it was it was a problem. People write code, people make mistakes, you need to fix it. Once they discovered the problem. They went, they were like, Oh, you need to apply this patch. It basically fixes the code. Well, if you don't apply the patch, if you don't have somebody who can help you do that you're not you're leaving your back door   19:11 open or even Yeah, or even like software, like it needs to be updated. So they're patching and updating, they're constantly monitoring, updating any software so like have you ever had where your phone doesn't work and because you haven't upgraded your system? Well that's kind of like it is for monitoring and patching. They make sure that everything is up to date everything is to code   19:34 right because if you're not patching and updating like Shelly said, you can actually leave a hole Yeah, and you're not the it's a lot easier for them to get in because you would not that system isn't being supported anymore by the Microsoft's or the Googles because they've moved on. You got to move on with them. Otherwise, you're you're gonna have a problem.   19:52 Got it. Got it. Okay, that makes a lot more sense.   19:55 They could do that themselves. Like oh, I can do this. I can do this. But as they're growing Their business, they don't have time to focus on that. And that's how little cracks happen.   20:04 Got it? Okay, that makes a lot of sense. And number four was making sure that your software and your hardware was encrypted. Right? And does that. I mean, this might be a stupid question. But does it come that way?   20:19 No, that's not a stupid question. I mean, a lot of us think that because, you know, I mean, we're on a computer right now that if I shut it and locked it, I opened it again, I could put my finger on it, it would open it, I wouldn't have to type my password in. But if my hard drive wasn't encrypted, didn't have that same protection on it, where someone could steal it, and then just pull out the hard drive, because these people are very talented, plug in the hard drive. So you need to make sure that your hard drive has that same protection with your fingerprint of code that, you know that if they would have to, they wouldn't plug it in somewhere else, they're gonna have to know that code, because it's not going to work.   21:06 Keep in mind, too, that encryption, like we're always talking about is, in most jurisdictions, if you have an encrypted hard drive, if even if they get it, they can't access it. It's not a data breach. So I like to say encryption is your get out of jail free card in most jurisdictions, okay. There are 50 of them. There's a lot, but in most of them, that's your get out of jail free card. So it's one of the biggest, that multifactor I guess, are probably two of the biggest bang for your buck. There they are. And how do you   21:37 know if your software and hardware is in is encrypted? Again, perhaps another silly question, but I just don't know.   21:43 So first of all, I don't encrypt my own hard drive. I know a lot about technology. But I, you know, I don't go to my dentist for brain surgery. professionals, who are IT professionals, like Shelley's company, and I say, here, encrypt my hard drive, and they take care of it for you. So having it's really important   22:06 night. Yeah, I can. And does that literally mean you hand your computer over to someone and say, encrypt my hard drive? Not necessarily No, no, okay.   22:16 No, no, no, a lot of times what you know, like our text can do, they can come in, they can work in remotely in and you know, just like when they have when we monitor and patch, they do it remotely. You know, if you don't even know what's going on. It's just and it shouldn't, it shouldn't interrupt your day, it should then to wreck your workflow. It should be seamless. And usually, you know, it's something that, you know, our techs are very, you know, highly educated, I love text, I always think, Oh, my gosh, what they do is so cool, because they can just, they can fix everything, and they just go in and they're they're magicians.   22:56 Got it? Got it. Okay, how it should be you.   22:59 I mean, a lot of times, and this is true, too. I think Rebecca, a lot of rules now are making sure that you actually have a credible IT team. Because if you don't, you can now get fined. Or   23:14 Yeah, there are different laws where you can if you're not doing the things you're supposed to be doing, if you're not monitoring if you don't have your asset, you know, management, those kinds of things. I mean, one of the classic examples of that is is HIPAA. Now they don't say you have to have it on teaching but they do say you have to encrypt your heart you know, encryption, or they say you show it or they say you have to monitor monitor your devices and let's face facts, do you want to be I don't want to be monitoring my devices, I want my IT guys or gals to be monitoring my devices, I want to be practicing law. So that's the beauty of it is that it's it's Charlie says it's running seamlessly in the background, and you're doing what you should be doing much with running   23:55 your business. Got it? All right. Now let's move on to so let's say you have all of this in place. You've done your basics for cybersecurity. Do you have to have cyber security insurance? Or can you just say, Well, I did all this. So what do I need the insurance for? No,   24:15 that's like driving around without your seatbelt on. Like, you know, I, I frequently wanted to ram the car in front of me, but I don't I don't do that. So cyber insurance. When I will tell you this as when I started my own law firm. The first thing I bought was malpractice insurance. The second thing I bought was cyber liability, a separate standalone cyber liability policy. They are getting more expensive, but for a small business depending on the data you're collecting, they can be very reasonable. But I sleep at night because I know that if something goes horribly wrong, it's there. All of the things you're doing. me that all The good cyber practices that Shelly and I have been talking about that just means they're going to cover you when the when the stuff hits the fan. Because if you're not doing all of that, you've probably told they've sent you a questionnaire with your cyber liability policy and you filled it out and you're like, Oh, do I have multi factor authentication? Oh sure. I encrypt my hard drive. If you lie to them, they don't cover you. But if you're doing all these good cyber practices, and you have insurance, it's you know that every single one of my clients first thing I ask, Where is your data? What is it doing? Where is your cyber liability policy? Those are the   25:35 those are the big three Yeah. Okay. To help you too, because how are you going to get that money out? Right, how do you get that money back? How do you recoup your business? I mean $50,000 is a lot Oh yeah. And you know, you're a small business and yeah, you you could take a hit you can take a loan but wouldn't it be better if somebody covered it for you it's kind of like you You get a car accident you know, it was like that rental car where your car is getting fixed. You would like to get a new car that new car smell   26:11 Yeah, cyber liability insurance is absolutely critical for small business every this statistic might be a little bit old, but I will pull it out anyway for just as an example 60% of small businesses will go out of business within six months of a data breach without live liability insurance. So that's an I know that statistic has gone up it's a it's a little stale, but I think that's about a year old and every year they put out new stats I just haven't brushed up on my statistics today. But   26:41 well that is true because as many business owners as I talked to in everything, you would not believe how many of them I've had friends that had successful businesses and everything was going great. They got hacked, and they just couldn't recoup the money that they need it breaks my heart because they never thought it would happen to them because they weren't trading money they weren't doing anything like that. It was just common goods like e commerce that they were just like, yeah, and then something happened.   27:09 I mean, I get a call at least once a week from a crime business person literally tears I don't know what am I going to do? I have a little bit of a policy or something. It's like a rider on my my general liability policy, but now it's going out because it runs out like that and so quick, and they're like now what do I do? I don't I don't have an answer for them. They're gonna have to you know, they have to pay for it out of pocket. A lot of them can't It is really heartbreaking.   27:37 Yeah. Oh my goodness. Well, so you know, we talked about some issues facing businesses today. basics for cybersecurity, the need for cybersecurity liability, which I am in the process of getting after speaking with Celli a couple of weeks ago, so I'm there I'm doing it I'm in. You don't have to I You don't have to tell me twice when it comes to important insurances, I will get it. So is there anything else that you guys wanted to let the listeners know when it comes to cybersecurity for their businesses?   28:14 Um, I think the first thing that businesses need to do is take a proactive posture. So doing the technical things that Shelley's talking about, shoring up some of their legal obligations, like I'm talking about with, you know, appropriate privacy policies, contract language and things like that. The other thing is, they have to also be aware of their vendors, which I think is another big issue facing organizations if you look at data breaches, it's not caused by an employee in the company it's caused by an employee at one of their vendors. And so you know, it's a big issue and so I would say that for all small businesses, all of the technical aspects and then make sure your your legal, you put yourself in a legally defensible position because unfortunately, these things are going to happen. And you want to make sure that you not just survive but thrive after after an event like this.   29:09 Yeah, and I agree with Rebecca, those are the key things that you need to do as a business owner, but it's also helping yourself to educate been growing your business and I know at times it can be scary because like, Oh my goodness, I got to talk to a lawyer. That's more money. Oh, I gotta have someone you know, outsource it person. When I've had my cousin, he knows computers, he knows everything. You know, everything's going but if you're looking to move your business to that next level, and you're looking to flourish, you really just like anything else, you need to make sure you understand and you are doing what is required of you to do to help your business flourish.   29:53 Got it. Well, this was great. I mean, hopefully people listening to this, it will set a match under them. To get them to really take a look at this in their business because like you said when you're a small business owner you've got a million things going on. But this is super important and I think something that people really need to focus on so I thank you for bringing this topic to me Shelly and for bringing Rebecca on because I think this is really great and I do hope that all the listeners out there will now start to take a better look at their businesses and are they protected Do they have the right things in place so thank you thank you now where can people find you? if they have questions? If God forbid they have a breach and they need a lawyer or they need someone to help do an IT assessment of their business so where can people find you? So   30:47 I obviously have a website expand law partners com Also you can follow us on Twitter and on LinkedIn please connect you can connect connect with me personally and my business we put out for small businesses out there who have a lot of questions we are constantly pushing out different topics raising issues bringing attention to different ones so please act x Pam law partners connect with us and hopefully will will provide you with some of that information that Shelley was talking about   31:23 excellent Shelly Go ahead.   31:24 You can reach me at contango it calm is our website I can also link in with me you know I love to meet new people and I always like to offer any kind of advice or second opinions I can help with if I if there's anyone I can point you into the direction to you know help your business I would love to do that.   31:46 Excellent. Shelley is a great super connector for sure. So definitely reach out to them now ladies one last question and I asked everyone this is knowing where you are now in your life in your career. What advice would you give to your younger self?   32:01 see somebody asked me this I'm gonna have to steal from my prior answer was start my law firm earlier. I wish I had done it earlier. I cherish the time I spent at a large law firm but I love what I do now. I love helping businesses so this I would do it earlier. So amazing. I would become an ethical hacker. Love that. I want to change my answer. That's a great answer. I love it.   32:35 I love it. Well, ladies, thank you so much for coming on the podcast sharing all this vitally important information. I do appreciate it. Thank you so much for having us. Pleasure and everyone. Thank you for listening. Reach out to these ladies if you are a small business because you may need some cyber help. Thank you for listening, have a great couple of days and stay healthy, wealthy and smart.

Security In Five Podcast
Episode 1080 - Jon Gruden Email Scandal Should Be A Lesson To Everyone

Security In Five Podcast

Play Episode Listen Later Oct 14, 2021 6:42


The recent scandal in the NFL and past emails should be a reminder that the Internet is forever. This episode talks about how security awareness programs, companies and parents need to make that message more clear. Be aware, be safe. Get ExpressVPN, Secure Your Privacy And Support The Show Become A Patron! Patreon Page *** Support the podcast with a cup of coffee *** - Ko-Fi Security In Five —————— Where you can find Security In Five —————— Security In Five Reddit Channel r/SecurityInFive Binary Blogger Website Security In Five Website Security In Five Podcast Page - Podcast RSS Twitter @securityinfive iTunes, YouTube, TuneIn, iHeartRadio,

Monero Talk
Timothy Picciott on Why Monero is in his Portfolio

Monero Talk

Play Episode Listen Later Oct 14, 2021 92:01


If you enjoyed the show & would like to support us, a donation of any size would be greatly appreciated and would mean so much! XMR Donations Accepted (type in MoneroTalk.crypto in your CakeWallet send address field): 49GdSCVTTE4TaDknDFn95QGc3mn3g7JZiPKX6QM7ZpuE5cscRFuGNhnjATKnjDHY7tNUQMM63n24uPYbj1AXFBk5KUPnDrL OR you can also help support the channel by purchasing a bag of delicious Guatemalan Coffee! Check out https://gratuitas.org/ to buy a bag & if you enjoy what you taste, send a Monero tip directly to the farmers that grew, harvested, prepared, and roasted your beans! Check out our new Gratutias Ad: https://www.youtube.com/watch?v=FVJq-SzAlow TODAY'S

The State of Us
Apple Will Scan Phone Images & Broadband Gets Big Government Push

The State of Us

Play Episode Listen Later Oct 14, 2021 38:51


Apple plans to develop software that will detect images of child pornography stored on iPhones. Justin and Lance discuss if this software will infringe on your privacy and ask if a stable internet connection is a utility in American society. tags: tsou, justin weller, lance jackson, internet, privacy, data, apple, technology, safety, software, government, utility

Plausibly Live! - The Official Podcast of The Dave Bowman Show

As you may have heard, I do not believe that the “religious exemption” is going to hold water when it comes to refusal to get the COVID-19 vaccination*. Consequently, the question I have tried to find an answer to is simply what is a better argument against the vaccine mandate? As a libertarian leaning Conservative, I like the position of privacy. What is between myself and my medical professional is between myself and my medical professional. It is literally none of your business, and it is certainly not the business of government (at any level). To paraphrase Thomas Jefferson, how does my vaccination status in any way effect you? If you want the shot, get it. Unless the government is lying about the efficacy and effectiveness of the vaccine, my status cannot possibly effect you. The problem with this argument is that it relies on several Supreme Court rulings which in turn, are grounded in some rather questionable Constitutional logic. Even more concerning is that the case that finally underpins the idea of medical privacy is facing multiple challenges in this years Supreme Court term. Depending on how the High Court rules on those cases, it is conceivable that medical privacy could go the way of the Plessy ruling… *In short, no major religious group expresses anything opposing vaccinations in general as a part of its doctrinal statements. In short, it's not intellectually honest to claim an exemption in the name of faith based on a belief that is not held by a given faith. See What The Frock – Absurd Arguments (In Pirate) and Crab Rangoon's for further discussion.

Linux For Everyone
Episode 54: An Invasion of Privacy

Linux For Everyone

Play Episode Listen Later Oct 13, 2021 85:17


The brand new L4E Show is here! Jason, Jerry and Schykle talk about their recent passion projects, then get into a somewhat disturbing conversation about the creeping invasion of our online privacy. Plus, a Software Spotlight and a proper introduction to our new co-hosts! WATCH THE NEW VIDEO VERSION HERE (https://youtu.be/EPM3_ZkEKGM). ☁️ Special thanks to this video's sponsor, LINODE! We're building a few sites and new community features over at Linode, and can't wait to unveil them. Go to https://Linode.com/LinuxForEveryone, and get a $100 credit towards your own awesome projects.

Security In Five Podcast
Episode 1079 - Be Careful Of The Gimmicky Features Of iPhone

Security In Five Podcast

Play Episode Listen Later Oct 13, 2021 5:46


Mobile devices, Andriod and Apple specifically, have features to help everyone use their devices. Some of these features can be used by anyone but if use improperly can leave your phone wide open and bypass other security controls you have in place. This episode talks about some of these that are being made popular on social media. Be aware, be safe. Get ExpressVPN, Secure Your Privacy And Support The Show Become A Patron! Patreon Page *** Support the podcast with a cup of coffee *** - Ko-Fi Security In Five —————— Where you can find Security In Five —————— Security In Five Reddit Channel r/SecurityInFive Binary Blogger Website Security In Five Website Security In Five Podcast Page - Podcast RSS Twitter @securityinfive iTunes, YouTube, TuneIn, iHeartRadio,

Reset
The future of healthcare might not include privacy

Reset

Play Episode Listen Later Oct 13, 2021 9:34


Telehealth and virtual care boomed during the pandemic. Same with technological advancements in consumer and medical-grade health devices. Together, they may lead to a future with better, more accessible healthcare — if outdated and insufficient privacy laws don't continue to lag behind. Recode's Sara Morrison explains This episode was made by:  Host: Rani Molla  Engineer: Paul Robert Mounsey Support Recode Daily by making a financial contribution to Vox! bit.ly/givepodcasts Learn more about your ad choices. Visit podcastchoices.com/adchoices

MotoGP™ Podcast: Last On The Brakes
Joan Mir: pressure, privacy and building your career from zero

MotoGP™ Podcast: Last On The Brakes

Play Episode Listen Later Oct 13, 2021 32:32


Here he is! A rider who needs no introduction: reigning World Champion Joan Mir. But as a self-confessed private person in a very public sphere, it's Mir as you've probably never heard him before as the number 36 takes us from his beginnings as a rider to the top of the MotoGP world. Making his way through the junior categories and having to win every season to make an impression, the Suzuki rider talks us through the true meaning of pressure – and learning to enjoy racing – as well as how he has changed, or maybe not so much, since winning the title. See acast.com/privacy for privacy and opt-out information.

U.S. National Privacy Legislation Podcast
Pondering Privacy with FTC Commissioner (with Christine Wilson)

U.S. National Privacy Legislation Podcast

Play Episode Listen Later Oct 13, 2021 38:30


Contact us:Jerry Buckley | jbuckley@buckleyfirm.comJody Westby | westby@globalcyberrisk.comADCG | info@adcg.org

Tales from the Crypt
Citadel Dispatch e41 - bitcoin privacy discussion with @stephanlivera at the nashville bitcoin meetup

Tales from the Crypt

Play Episode Listen Later Oct 12, 2021 69:09


Discussion at the Nashville Bitcoin Meetup. https://www.meetup.com/nashville-bitcoin/ EPISODE: 41 BLOCK: 704718 PRICE: 1794 sats per dollar TOPICS: bitcoin privacy discussion, KYC/AML, coinjoin, lightning, fee market, mining, circular economy, ransomware @stephanlivera: https://twitter.com/stephanlivera @nashbitcoiners: https://twitter.com/nashbitcoiners Streamed live every tuesday: https://citadeldispatch.com twitch: https://twitch.tv/citadeldispatch​ bitcointv: https://bitcointv.com/video-channels/citadeldispatch/videos telegram: https://t.me/citadeldispatch​ support the show: https://tippin.me/@odell stream sats to the show: https://podcastindex.org/apps join the sphinx tribe: https://tribes.sphinx.chat/t/citadeldispatch

Aspen Ideas to Go
Whose Job Is It to Protect Your Online Data?

Aspen Ideas to Go

Play Episode Listen Later Oct 12, 2021 56:00


When you tick a box on an online privacy notice, just how much personal information are you giving away? Is the tradeoff worthwhile? When it comes to data, the relationship between companies and consumers is uneven — customers are getting a raw deal because there's no limit on what a company can collect. Whose job is it to regulate this space and better protect consumers' data? Tom Wilson, CEO of Allstate, thinks the federal government should step in with a digital Bill of Rights that would increase transparency. Jen King, Privacy and Data Policy Fellow at the Stanford Institute for Human-Centered Artificial Intelligence, believes one (among many) solutions is data trusts. They speak with Kristine Gloria, director of artificial intelligence for Aspen Digital, about large-scale solutions and what consumers can do today to better protect themselves online.

Citadel Dispatch
Citadel Dispatch e41 - bitcoin privacy discussion with @stephanlivera at the nashville bitcoin meetup

Citadel Dispatch

Play Episode Listen Later Oct 12, 2021 69:09


Discussion at the Nashville Bitcoin Meetup. https://www.meetup.com/nashville-bitcoin/ EPISODE: 41 BLOCK: 704718 PRICE: 1794 sats per dollar TOPICS: bitcoin privacy discussion, KYC/AML, coinjoin, lightning, fee market, mining, circular economy, ransomware @stephanlivera: https://twitter.com/stephanlivera @nashbitcoiners: https://twitter.com/nashbitcoiners Streamed live every tuesday: https://citadeldispatch.com twitch: https://twitch.tv/citadeldispatch​ bitcointv: https://bitcointv.com/video-channels/citadeldispatch/videos podcast: https://anchor.fm/citadeldispatch​ telegram: https://t.me/citadeldispatch​ support the show: https://tippin.me/@odell stream sats to the show: https://podcastindex.org/apps join our sphinx tribe: https://tribes.sphinx.chat/t/citadeldispatch

Sittadel Podcast
31 - Pegasus Spyware

Sittadel Podcast

Play Episode Listen Later Oct 12, 2021 44:33


We know your location, see your pictures, listen in on your microphone, and even get into your encrypted chat. But we only use that for good! (Okay, except for that one time...) Are we fighting fire with fire or becoming the very thing we defend against? Israeli based cyber intelligence company NSO Group is a billion-dollar business that helps law enforcement agencies and governments learn everything about innocent and guilty citizens alike in the name of protecting the virtuous. Cyber weapons like Pegasus represent a moral tradeoff. The intended use is to curb human trafficking or intervene before violent crimes are committed, but it comes at the cost of invading the privacy of good-doing citizens. We're quick to accept this risk when weapons are wielded by the armed forces that defend countries, but the NSO Group is motivated by profits as much as any other private company. What we called spyware in the 90s has become the way modern advertising works, and that lets platform holders more finely target the spaghetti they throw at the wall. Now it's angel hair pasta, and everything is sticking. The ethics of doing business today are directly tied to the ethics of cybersecurity. As Nate discusses in the episode, he often finds himself caught between the creative ambition of an artist and catering to what will sell. To pay the bills, Nate has to sacrifice a bit of creative freedom. When companies profit from circumventing the security systems that keep us safe, it's a much greater sacrifice. This is not a new challenge, but privacy has entered a new frontier of technological reliance. In this episode, we discuss zero day vulnerabilities, Pegasus Spyware, NSO Group, Edward Snowden, Spysweeper, Privacy concerns, mobile security, law enforcement, wardriving, and WIFI security. Use our contact form or tweet us @sittadelpodcast to start the conversation on how Mobile Device Management (MDM) solutions can play a role in protecting your information (and if you're a business, there's a good chance you're already paying for one you've never set up).

FuturesInFocus
Amy Webb - The Future of Privacy

FuturesInFocus

Play Episode Listen Later Oct 12, 2021 35:30


Amy Webb is a rare breed of industry-respected thinker (Thinkers 50 Radar award winner in 2018), author (The Big Nine and The Signals Are Talking), and somebody prepared to look at signals in the world now and draw out what possible challenges, opportunities, and discussions we need to have that are new in order for humankind to thrive by 2030The control and ownership of AI patents, development of IP, and people are very much centered on the Big Nine (it includes Amazon, Microsoft, IBM, Google, Facebook). In effect, the capital base for an AI or data-centered global economy sits in the hands of just nine organizations. This could be very scary as it throws up new ideas, debates, and even lexicography that is not very present in the way we think today.For example, should person A be presented with a different price for the same product as person B depending on their profile or online data? This could range from the price of toilet paper to even maybe healthcare.

Security In Five Podcast
Episode 1078 - Google To Turn On Multi-Factor For 150 Million Users

Security In Five Podcast

Play Episode Listen Later Oct 12, 2021 5:58


Google announced they are enabling multi-factor authentication on 150 million Google users by the end of the year. This episode goes into the details and why multi-factor is here to stay. Source: https://blog.google/technology/safety-security/a-simpler-and-safer-future-without-passwords/ Be aware, be safe. Get ExpressVPN, Secure Your Privacy And Support The Show Become A Patron! Patreon Page *** Support the podcast with a cup of coffee *** - Ko-Fi Security In Five —————— Where you can find Security In Five —————— Security In Five Reddit Channel r/SecurityInFive Binary Blogger Website Security In Five Website Security In Five Podcast Page - Podcast RSS Twitter @securityinfive iTunes, YouTube, TuneIn, iHeartRadio,

Tcast
I Think, Therefore I Earn: Selling Your Data on the TARTLE Marketplace

Tcast

Play Episode Listen Later Oct 12, 2021 19:32


With all the technology that we have today, imagine how all the most important and meaningful parts of your life have been condensed into a bunch of data packets. Now that people are becoming more aware of how all-encompassing our online presence has become, we are on the cusp of changing the way we deal with our information. This won't be an easy task and even the most advanced countries are still taking their first steps in redistributing the power of data sharing to the people. However, we are confident about our capacity to push this forward and help in the work of spreading awareness. In this episode, we discuss how the TARTLE marketplace is designed to help restore equilibrium to data management and sharing. Reclaiming Your Data: These days, data is more than just the information needed to access certain websites and applications. It's what companies, and even some governments, use to provide a tailored experience. This covers our ad preferences, history, and the connections that we make.  When you think of how much data you create, you're bound to wonder: do I create data, or does data create me? In the status quo, people do not have a lot of control over their own information. Our lack of awareness when it comes to what we can do with the data we create has given social media platforms a prime advantage: they can profit off of our interests, social circles, and movements.  While the European Union's GDPR and an overall trend towards increased data awareness around the world is helping alleviate the situation, it's not enough to help people take the next step forward. We all deserve a platform where we can practice taking initiative and having active ownership over our own data to help expedite the process. TARTLE is a marketplace that operates around the clock and is available around the world. We are offering a nonprofit platform that empowers individuals on the ground to practice autonomy and self-sovereignty. On the TARTLE marketplace, you are fully responsible for your information. It's our way of helping bring back power to the people. Turning Your Thoughts Into Passive Income: What if you could earn passive income for your thoughts? Technology is capable of shaping the way we think and act in the same way that we are capable of using technology for our own gain. With this in mind, TARTLE created a way for you to place all your data on a secure platform— with the added benefit of having it siloed in there as well. There is plenty of potential in how we express ourselves. Data is always in your possession and as long as you're online, it's growing. It does not discriminate as well because regardless of your location, ethnicity, or personal beliefs, technology will still maintain a profile of who you are and what you like doing as a digital citizen.  But if so much potential exists, why don't we feel like we're doing anything groundbreaking with our smartphones? This is because the power we have over our information has been seized by other actors: corporations and even governments. It's high time we took it upon ourselves to restore a balance within that system. To parallel it in other scenarios, there is a need for equilibrium in plenty of natural systems. We need balance in our climate, our physical and mental wellbeing, thermodynamics, energy, and more because too much of anything can become dangerous. This is what inspired us to create TARTLE: the need to provide a supportive structure that people and communities on the ground could grow off of. “If there's no balance, then there's no real learning that can happen here,” Alexander argued, “There's no real fair exchange occurring.” The TARTLE platform recognizes that everyone is equal in the creation of information and that everyone has the equal opportunity to earn off of it. Closing Thoughts: How Data Can Make Us Better People: Data is capable of making us better people because it breaks down preconceived notions and barriers to communication that we may have had of others. Often, opportunities to connect are limited to certain geographical areas or social classes.  Here is a way we can all participate in a flexible, antifragile free market that will bend and grow seamlessly with continued human interaction. The TARTLE platform will learn from how we compile our data and who we choose to sell it to. The more we use TARTLE to facilitate data sharing, the higher our chances of communing with other people from vastly different backgrounds and fostering understanding as a natural byproduct of our own efforts.  This is how we evolve. What's your data worth? www.tartle.co   Tcast is brought to you by TARTLE. A global personal data marketplace that allows users to sell their personal information anonymously when they want to, while allowing buyers to access clean ready to analyze data sets on digital identities from all across the globe.   The show is hosted by Co-Founder and Source Data Pioneer Alexander McCaig and Head of Conscious Marketing Jason Rigby.   What's your data worth?   Find out at: https://tartle.co/   YouTube: https://www.youtube.com/c/TARTLE   Facebook: https://www.facebook.com/TARTLEofficial/   Instagram: https://www.instagram.com/tartle_official/   Twitter: https://twitter.com/TARTLEofficial   Spread the word!

WashingTECH Tech Policy Podcast with Joe Miller
Privacy Legislation at the State Level with Justin Brookman (Ep. 253)

WashingTECH Tech Policy Podcast with Joe Miller

Play Episode Listen Later Oct 12, 2021 15:37


With Federal privacy regulation leaving much to be desired, it has fallen to individual states to make up the gap and establish their own privacy rules. This approach is problematic for many reasons, which is why Justin Brookman is on the show today. Correction: The name of the individual Joe referenced in the intro is Alex Stamos, from the Stanford Internet Observatory, not John Stamos as was stated in the episode Consumer Privacy Has a Home a Consumer Reports Justin Brookman is with Consumer Reports where he's the head of tech policy. He wrote an excellent paper several months ago on state privacy regulation (you can read it here). Justin is the Director, Consumer Privacy and Technology Policy, for Consumers Union, the policy and advocacy arm of Consumer Reports. In this new privacy role at CR, he will help the organization continue its groundbreaking work to shape the digital marketplace in a way that empowers consumers and puts their data privacy and security needs first. This work includes using CR research to identify critical gaps in consumer privacy, data security, and technology law and policy, as well as building strategies to expand the use and influence of the new Digital Standard  being developed by CR and partner organizations to evaluate the privacy and security of products and services. The Politics of Privacy If you keep up with the news of the day, you know that right now, everybody has had it with big tech companies, like Facebook. Consumers, politicians, the media and other businesses have been sounding off about the pitfalls of having big tech intrude into our lives. It's brought about a lot of policy proposals, but no comprehensive legislation that is likely to pass at the Federal level. This gaping hole has been filled in by the privacy legislation that is popping up at the state level. Legislation State By State As is often the case, California is one of the first states to come forward with privacy legislation of its own. The California Consumer Privacy Act has already been amended to make the legislation stronger than the original bill. Virginia also came forward with a bill, and Colorado quickly followed suit. We're also currently seeing legislative battles in New York and Washington State over privacy, and the proposals are really all over the place. The Federal Role of Privacy The Federal government has basically taken a hands off approach to the privacy legislation popping up around the country. Because all of the privacy laws ultimately center around the first amendment, the Federal government is reluctant to play a heavy handed role in the laws that are cropping up throughout the country. There have been some challenges to legislation around the first amendment and some have been rejected, as the judiciary is reluctant to regulate companies. Consumers vs. Businesses vs. Government Consumers don't want Facebook or their ISPs to track their every move and collect data on them. At the same time, the government doesn't want private data collected to be in the hands of these companies and outside of the reach of government agencies.  Many states are willing to take a more aggressive approach to privacy in light of the massive data breaches that consumers have experienced in recent years. Where are we now While it's clear that aggressive action needs to be taken to prevent data breaches, it's going to take regulatory agencies some time to catch up because Federal legislation moves so slowly.  Much of the existing legislation is unwieldy for the consumer. Whether it relies on a physical opt out by consumers or it goes state by state, it's just not that easy for consumers to actually protect themselves with the current regulations. State legislatures do not have the staff or the expertise to create the kind of legislation that is needed for consumers to truly be protected. We need to find a balance between what can effectively protect consumers, but also allow businesses to function in a way that doesn't put consumers at risk. Resources: Connect with Justin on Twitter @justinbrookman

Analyse Asia with Bernard Leong
Technology Past, Present & Future with Benedict Evans

Analyse Asia with Bernard Leong

Play Episode Listen Later Oct 11, 2021 58:11


In episode 346, Benedict Evans shares his perspectives on the history and trends of technology. Benedict explores the different narratives spanning across the mobile wars between Apple & Google, generational shifts in digital transformation of enterprises, the challenges of app stores and digital advertising & privacy. Last but not least, he asks the key questions on what's next for technology.   There's some industries where 10 years time is the next product cycle. There's some industries where, you know what your rent's going to be in 10 years time. There's other technology: 10 years is right on the edge of science fiction.  You really don't know what you know, anything beyond 10 years, you really don't know what's going to happen, except there'll be more stuff. - Benedict Evans Podcast Information: The show is hosted and produced by Bernard Leong (@bernardleong, Linkedin) and Carol Yin (@CarolYujiaYin, LinkedIn). Sound credits for the intro and end music: "Run it" by DJ Snake, Rick Ross and Rich Brian

Firewalls Don't Stop Dragons Podcast

Today I have the great honor and pleasure of speaking with two luminaries in the field of privacy: Michelle Finneran Dennedy and Melanie Ensign. Between them, they have decades of experience managing privacy processes, policies, technology and communications within dozens of big name tech companies. I get their unique perspective on data privacy and the evolution of how these companies approach the problem of collecting and managing your data. Are things getting better or worse? How can companies earn the trust of their customers? Is data the new oil? And is it an asset or a liability? How can we have social media like Facebook and privacy at the same time? NOTE: I captured WAY more content from these two than I could fit into this one podcast. To get the full interview, become a patron! (And nab yourself a kick-butt challenge coin, too!) Michelle Dennedy was the first CPO for many global IT infrastructure companies including Oracle, McAfee, Intel & Cisco. Michelle is now a partner at Privatus.online and CEO at a Privacy Engineering startup in stealth mode. She is the co-author of The Privacy Engineer's Manifesto and The Privacy Engineer's Companion.  Melanie Ensign is the CEO of Discernible, helping cybersecurity & privacy teams better communicate with business leaders and consumers. She is also part of the DEF CON leadership team. Further Info Discernable: https://discernibleinc.com/ Privatus: https://privatus.online/ The Privacy Engineer's Manifesto: https://www.amazon.com/Privacy-Engineers-Manifesto-Getting-Policy/dp/1430263555 The Rise of Privacy Tech (TROPT): https://www.riseofprivacytech.com/ Privacy is Power (book): https://firewallsdontstopdragons.com/privacy-is-power-review/ The Social Dilemma: https://www.thesocialdilemma.com/ The challenge coin promotion is BACK!! https://firewallsdontstopdragons.com/my-challenge-coins-are-back/Would you like me to speak to your group about security and/privacy? http://bit.ly/Firewalls-SpeakerGenerate secure passphrases! https://d20key.com/#/

The Lawfare Podcast
Adam Klein and Benjamin Wittes on FISA

The Lawfare Podcast

Play Episode Listen Later Oct 11, 2021 60:51


Two weeks ago, the Department of Justice's Office of Inspector General released a report on the FBI's mishandling of Foreign Intelligence Surveillance Act applications. It's the latest in a string of Inspector General reports and other documents to talk about the process. To go through the latest report, why the process is so important and what it all means, Jacob Schulz sat down on Lawfare Live with Lawfare editor-in-chief Benjamin Wittes, and Adam Klein, the former chairman of the Privacy and Civil Liberties Oversight Board, who is now at the University of Texas at Austin's Strauss Center as director of the program on Technology, Security, and Global Affairs. They discussed what's in the latest report, what to make of it and how to think about reforms to the process in general.Support this show http://supporter.acast.com/lawfare. See acast.com/privacy for privacy and opt-out information.