POPULARITY
The UK has demanded a backdoor to iCloud that could affect Apple users worldwide…and Apple can't talk about it. DeepSeek is sending information to ByteDance-controlled servers. Chuck Joiner, David Ginsburg, Jeff Butts, Marty Jencius, Ben Roethig, Web Bixby, and Eric Bolden dig in to both of these security-related topics and why they should matter to you. The panel also covers a recommendation about what not to do with your passwords. MacVoices is supported byTake Control Books: The Answers You Need Now, From Leading Experts. Start your library now. Show Notes: Chapters: 00:05 UK Security Demands and Apple 02:09 Apple's Legal and PR Crisis 05:52 The Backdoor Debate 06:15 Risks of a Security Backdoor 07:52 DeepSeq Data Concerns 15:12 The DeepSeq Controversy 17:54 Password Security Myths 30:11 The Importance of Passwords 31:26 Corporate Use of AI Tools 32:27 Balancing Security and Convenience Links: British government secretly ordered Apple to create a worldwide iCloud backdoor https://9to5mac.com/2025/02/07/british-government-secretly-ordered-apple-to-create-a-worldwide-icloud-backdoor/ U.K. orders Apple to let it spy on users' encrypted accounts https://archive.is/EzboV#selection-539.0-539.60 UK demands access to Apple users' encrypted data https://www.bbc.com/news/articles/c20g288yldko DeepSeek iOS app sends data unencrypted to ByteDance-controlled servers https://arstechnica.com/security/2025/02/deepseek-ios-app-sends-data-unencrypted-to-bytedance-controlled-servers/ Changing Your Passwords Isn't the Security Measure You Think It Is https://lifehacker.com/tech/changing-your-passwords-isnt-the-security-measure-you-think-it-is Take Control of Your Passwords by Joe Kissell https://www.takecontrolbooks.com/passwords/ Guests: Web Bixby has been in the insurance business for 40 years and has been an Apple user for longer than that.You can catch up with him on Facebook, Twitter, and LinkedIn. Eric Bolden is into macOS, plants, sci-fi, food, and is a rural internet supporter. You can connect with him on Twitter, by email at embolden@mac.com, on Mastodon at @eabolden@techhub.social, on his blog, Trending At Work, and as co-host on The Vision ProFiles podcast. Jeff Butts writes for XDA Develpers and groovyPost. Contact him on X as @clefmeister and on Instagram as @recoveringphoenix72. David Ginsburg is the host of the weekly podcast In Touch With iOS where he discusses all things iOS, iPhone, iPad, Apple TV, Apple Watch, and related technologies. He is an IT professional supporting Mac, iOS and Windows users. Visit his YouTube channel at https://youtube.com/daveg65 and find and follow him on Twitter @daveg65 and on Mastodon at @daveg65@mastodon.cloud. Dr. Marty Jencius has been an Associate Professor of Counseling at Kent State University since 2000. He has over 120 publications in books, chapters, journal articles, and others, along with 200 podcasts related to counseling, counselor education, and faculty life. His technology interest led him to develop the counseling profession ‘firsts,' including listservs, a web-based peer-reviewed journal, The Journal of Technology in Counseling, teaching and conferencing in virtual worlds as the founder of Counselor Education in Second Life, and podcast founder/producer of CounselorAudioSource.net and ThePodTalk.net. Currently, he produces a podcast about counseling and life questions, the Circular Firing Squad, and digital video interviews with legacies capturing the history of the counseling field. This is also co-host of The Vision ProFiles podcast. Generally, Marty is chasing the newest tech trends, which explains his interest in A.I. for teaching, research, and productivity. Marty is an active presenter and past president of the NorthEast Ohio Apple Corp (NEOAC). Ben Roethig has been in the Apple Ecosystem since the System 7 Days. He is the a former Associate Editor with Geek Beat, Co-Founder of The Tech Hangout and Deconstruct and currently shares his thoughts on RoethigTech. Contact him on Twitter and Mastodon.l Support: Become a MacVoices Patron on Patreon http://patreon.com/macvoices Enjoy this episode? Make a one-time donation with PayPal Connect: Web: http://macvoices.com Twitter: http://www.twitter.com/chuckjoiner http://www.twitter.com/macvoices Mastodon: https://mastodon.cloud/@chuckjoiner Facebook: http://www.facebook.com/chuck.joiner MacVoices Page on Facebook: http://www.facebook.com/macvoices/ MacVoices Group on Facebook: http://www.facebook.com/groups/macvoice LinkedIn: https://www.linkedin.com/in/chuckjoiner/ Instagram: https://www.instagram.com/chuckjoiner/ Subscribe: Audio in iTunes Video in iTunes Subscribe manually via iTunes or any podcatcher: Audio: http://www.macvoices.com/rss/macvoicesrss Video: http://www.macvoices.com/rss/macvoicesvideorss
Timestamps: 6:32 - Race car driving & building a business 11:55 - How NordPass stood out in the market 23:10 - Catering to customers vs staying focused 31:32 - From Lithuania to the world 43:54 - Is Lithuania a startup-friendly country? Resources mentioned: Blackbox Thinking, Matthew Syed Click here to enjoy three months of NordPass Business for free with the code “swisspreneur”. About Jonas Karklys: Jonas Karklys is the co-founder of Nord Security, and the CEO of its password management company NordPass. He holds a BA in Business Administration and Management from Vilnius University, but before his university studies he was already an accomplished race car driver and had also run Infosport, a Lithuanian sports news website. After university, Jonas went on to co-found 50Garage and invest in F-1.LT before co-founding Nord Security and launching NordPass. NordPass is a password management solution, part of Nord Security, the world's leading cybersecurity company and the creator of NordVPN, NordLayer, NordLocker, and other well- known products in the market. Currently with offices/representatives in 26 markets, Nord Security offers its services globally, and is Lithuania's second unicorn. Don't forget to give us a follow on Twitter, Instagram, Facebook and Linkedin, so you can always stay up to date with our latest initiatives. That way, there's no excuse for missing out on live shows, weekly giveaways or founders' dinners.
Today's guest is Ketan, a well-known Bitcoin security expert based out of Australia who amongst many things, is an advocate for privacy and running your own node. In this episode, we spoke about the importance of privacy and what you can do to fundamentally secure your Bitcoin stack. With great power comes great responsibility, and self-custody is indeed a great responsibility. If you're keen to learn about some of the basic things you can do to up your security game, this is the episode for you. 00:00 - Why privacy matters and what you can do 17:29 - Social engineering attacks 36:32 - Hot wallet vs Cold wallet 40:14 - Four reasons to run your own node 45:11 - Different node options For more commentary on the world of Bitcoin and what makes it different to crypto, follow me on X at @Dale21M or the show at @whybitcoinshow, or visit www.thewhybitcoinshow.com for more episodes. Thanks to K3tan for coming on the show – you can follow his work on X at @_k3tan, or visit his website https://shop.ministryofnodes.com/ and his YouTube channel for setting up your own node https://www.youtube.com/ministryofnodes --- Send in a voice message: https://podcasters.spotify.com/pod/show/whybitcoinshow/message
Join us for another insightful exploration of artificial intelligence in today's world. In this episode, your hosts Rob Scott and Kevin Kieller dive into the latest AI news and discuss the implications of recent developments with a very special guest, Dr. Joseph Williams, ICT Sector Lead and Tech Policy Advisor to Governor Inslee.What's on Today's Show?AI News Review: We break down the most recent headlines including Apple's M4 chip making iPads AI-ready, a UK firm's record-breaking funding for autonomous vehicles, widespread corporate adoption of Microsoft's Copilot, and the buzz around Microsoft's new AI model.AI Minute with Kevin: Kevin Kieller demystifies the term "LLMs" (Large Language Models). What are they and why should you care?In-Depth Discussion: Dr. Joseph Williams shares his insights on AI security, privacy concerns, and the legal landscape affecting both individuals and corporations.Like, Subscribe, and Share: If you find today's discussion enlightening, don't forget to like, subscribe, and share this video. Connect with us on socials (links below) and share your thoughts and questions.Connect with Rob Scott and Kevin Kieller on socials here:Rob ScottLinkedInTwitterKevin KiellerLinkedInTwitter
In this episode, Meredith and Angela talk about how we can help ourselves be supportable and use technology safely in the World Language classroom. EdTechWorld - https://twitter.com/EdTecWorld Meredith White - https://twitter.com/techMEWithyou Dr. Angela Burgess - https://twitter.com/DrBurgessEdTech Wayside - https://www.waysidepublishing.com/podcasts
Sponsor by SEC Playground --- Support this podcast: https://podcasters.spotify.com/pod/show/chillchillsecurity/support
It's no surprise that Gen X, Millennials, and Gen Z see and use technology very differently. For some, it's been an evolution, but a growing number of people in the workforce have simply never known anything else. This can have a significant impact on the way each generation sees crucial subjects such as cyber security.The Gen X generation is what experts often refer to as “digital immigrants.” Technology wasn't always a part of their work, and they've had to adapt over the years. They often learned about cyber threats by falling victim to them and have had to develop their own tricks and habits since cyber security departments were rare when they entered the workforce.Millennials are in an odd situation technology-wise. They weren't all digital natives, and while most had computers at home, social media was a later addition to their lives. In terms of work, however, they are definitely digital natives, and computers have always been present in their workplaces.The definition of digital native truly starts with Gen Z. In most cases, members of Gen Z generation don't remember a time when technology wasn't a major fix of their lives. However, a large portion of their exposure to technology has been through smartphones. They embrace new platforms faster than other generations but are often less well-versed with desktops. They communicate primarily through social media platforms such as Snapchat, often exchanging their username instead of their phone number when they meet someone new. However, growing up with technology doesn't mean you automatically understand it. In fact, it seems like it might have been too normalized for their generation.Gen Z's technological knowledge is heavily influenced by smartphones and social media applications, making them ill-equipped to detect phishing attacks via email or spoofed websites. They are also the most likely generation to ignore mandated IT updates until the last minute and reuse passwords for personal and work accounts. They often have had less cyber security training than other generations and feel much more secure online overall. So how do we help a generation who loves technology – but may not be fully aware of some of the pitfalls or ‘dark-side' of social media and other tools. Find out more in this episode as Cyber Security and Privacy Expert Kaushik Pandya explains: What is the difference between Cybersecurity and Privacy? Why have these topics gained so much attention and what are the implications on Gen Z generation? What are some the basic tips to become more cyber secure? What can employers do create good security and privacy habits into Gen Z employees. How do they sustain these habits? Find Us OnlineKaushik Pandya : LinkedIn , WebsiteNikhil: Website, Linkedin, Youtube & Book
In this episode, Amir Bormand interviews Prabhath Karanth (PK), the Global Head of Security & Trust at Navan, an all-in-one travel and expense management SaaS platform. They discuss the growth and evolution of the security function and how it interacts with engineering and technology. PK shares insights into how security is scaling and taking on more functions, with everything becoming "as a code." The conversation also covers the role of PK's team in relation to their other peers. Highlights: [00:02:02] Security in hypergrowth companies. [00:03:56] Emerging Technologies and Security. [00:08:31] Embracing AI technology. [00:11:11] Privacy risks in document summarization. [00:16:52] Emerging AI Testing Companies. [00:17:54] Connecting with experts. Prabhath Karanth is the Global Head of Security & Trust at Navan, where he oversees product and platform security, detection and response, enterprise security, security architecture, engineering, and GRC & Trust functions. Prior to joining Navan, Prabhath oversaw cybersecurity at Adobe during the company's cloud journey and hyper-growth trajectory from $30B to $300B. With 18+ years of experience in the industry, he also has a passion for working with startups and sitting on boards of directors to advise on product & business strategy, market positioning, governance, and solving security and business problems at scale. --- Thank you so much for checking out this episode of The Tech Trek, and we would appreciate it if you would take a minute to rate and review us on your favorite podcast player. Want to learn more about us? Head over at https://www.elevano.com Have questions or want to cover specific topics with our future guests? Please message me at https://www.linkedin.com/in/amirbormand (Amir Bormand)
Legal, Security, and Privacy are cut from the same cloth — but it's common to see friction between these teams. How can GCs and in-house leaders bridge this gap to form productive working relationships?Join us as we dive into the incredible journey of Celaena Powder, VP of Legal at Seismic, as she weighs in on forming unbeatable GC-CISO duos, supporting an enterprise sales motion at a company, nurturing meaningful relationships with Sales AEs to drive business impact, and more.We also discuss strategies for transforming the perception of Legal, building a high-performing legal team, and fostering a culture of growth and support.Tune in now to uncover a goldmine of actionable advice and a behind-the-scenes look into how Celaena leads Legal at Seismic.Read detailed summary: https://www.spotdraft.com/podcast/episode-6Topics:Introduction: 00:00Finding inspiration for what you want to do in your career: 02:44Accelerating professional growth when working in small teams: 11:13Going in-house and becoming VP of Legal at Seismic: 14:08Transforming the perception of Legal within the org: 18:28Setting your legal team up for success: 22:30Navigating enterprise sales as a legal team: 26:22Leveraging privacy education to drive revenue generation: 32:54Nurturing productive relationships between Legal and Sales AEs: 35:33The intersection of the Legal and Security functions: 41:02Bridging the gap between Legal, Security, and Privacy: 45:00How the GC's role will evolve with tech and AI evolution: 54:21Advice for younger attorneys: 57:30Connect with us:Celaena Powder - https://www.linkedin.com/in/celaenapowder/Tyler Finn - https://www.linkedin.com/in/tylerhfinnSpotDraft - https://www.linkedin.com/company/spotdraftSpotDraft is a leading CLM platform that solves your end-to-end contract management issues. Visit https://www.spotdraft.com to learn more.
We're excited to have recently achieved ISO 27001 certification, the internationally recognised standard for data security! Power Diary's Co-Founders, Paul Adler (CTO) and Damien Adler (Head of Customer Success) share why this is vital in the current cyber environment. Prepare to dive into the ISO 27001 security standards and discover how Power Diary's security and privacy measures can help you meet your professional obligations, comply with regulations and give you peace of mind.
This episode features “the expert in ChatGPT”, Stephan Jou. He is CTO of Security Analytics at OpenText Cybersecurity. “The techniques that we are developing are becoming so sophisticated and scalable that it's really become the only viable method to detect increasingly sophisticated and subtle attacks when the data volumes and velocity are so huge. So think about nation state attacks where you have very advanced adversaries that are using uncommon tools that won't be on any sort of blacklist.”“In the past five years or so, I've become increasingly interested in the ethical and responsible application of AI. Pure AI is kind of like pure math. It's neutral. It doesn't have an angle to it, but applied AI is a different story. So all of a sudden you have to think about the implications of your AI product, the data that you're using, and whether your AI product can be weaponized or misled.” “You call me the expert in ChatGPT. I sort of both love it and hate it. I love it because people like me are starting to get so much attention and I hate it because it's sort of highlighted some areas of potential risk associated with AI that people are only start now starting to realize.”“I'm very much looking forward to using technologies that can understand code and code patterns and how code gets assembled together and built into a product in a human-like way to be able to sort of detect software vulnerabilities. That's a fascinating area of development and research that's going on right now in our labs.”“[on AI poisoning] The good news is, this is very difficult to do in practice. A lot of the papers that we see on AI poisoning, they're much more theoretical than they are practical.”Rate and review the show on Apple Podcasts.Share the show with others in the cybersecurity world.Get in touch via reimaginingcyber@gmail.com
AI has quickly become pervasive in all our lives. But, how can it impact us? Consider a couple of examples. Lensa is an app that takes real photos and uses AI to make art images from them. Millions have used it. Others are concerned about the related privacy and intellectual property rights problems it creates. Lensa uses a huge open-source collection of data to train its AI that contains than 5 billion publicly accessible images that it categorizes as “research.” However, it not only includes copyrighted work, but also personal medical records and images, as well as disturbing images of violence and sexual abuse, many from police reports. This creates privacy, copyright and other intellectual property rights, legal and compliance concerns. Another AI tool, ChatGPT, surpassed 100 million users early in 2023 and is creating a large and growing number of concerns about security, privacy, intellectual property and legal risks. Use of artificial intelligence (AI) is predicted to grow by more than 25% each year for the next five years and could contribute over $15 trillion to the global economy by 2030. Many questions need to be answered about AI! Listen in to hear my conversation with Pamela Gupta about a wide range of AI issues. • Who is ensuring the AI algorithms are secure? And accurate? • What happens if someone's private photos show up incorporated into an AI generated image? • What are the privacy risks? • What are the security risks? • What are the ethical considerations for AI use? • What are the dangers of biased AI? • What are the “Essential Trusted AI Pillars”? Pamela answers these and many more questions. See more about Pamela Gupta at https://www.outsecure.com/. #PamelaGupta #AI #ArtificialIntelligence #ChatGPT #Lensa #Privacy #PrivacyManagement #RiskManagement #CyberSecurity #DataSecurity #Cybercrime #PersonalData #Awareness #Education #Cybercriminals
AI has quickly become pervasive in all our lives. But, how can it impact us? Consider a couple of examples. Lensa is an app that takes real photos and uses AI to make art images from them. Millions have used it. Others are concerned about the related privacy and intellectual property rights problems it creates. Lensa uses a huge open-source collection of data to train its AI that contains than 5 billion publicly accessible images that it categorizes as “research.” However, it not only includes copyrighted work, but also personal medical records and images, as well as disturbing images of violence and sexual abuse, many from police reports. This creates privacy, copyright and other intellectual property rights, legal and compliance concerns. Another AI tool, ChatGPT, surpassed 100 million users early in 2023 and is creating a large and growing number of concerns about security, privacy, intellectual property and legal risks. Use of artificial intelligence (AI) is predicted to grow by more than 25% each year for the next five years and could contribute over $15 trillion to the global economy by 2030. Many questions need to be answered about AI! Listen in to hear my conversation with Pamela Gupta about a wide range of AI issues. • Who is ensuring the AI algorithms are secure? And accurate? • What happens if someone's private photos show up incorporated into an AI generated image? • What are the privacy risks? • What are the security risks? • What are the ethical considerations for AI use? • What are the dangers of biased AI? • What are the “Essential Trusted AI Pillars”? Pamela answers these and many more questions. See more about Pamela Gupta at https://www.outsecure.com/. #PamelaGupta #AI #ArtificialIntelligence #ChatGPT #Lensa #Privacy #PrivacyManagement #RiskManagement #CyberSecurity #DataSecurity #Cybercrime #PersonalData #Awareness #Education #Cybercriminals
Amidst an explosion of digital and virtual care, the healthcare industry has become increasingly more vulnerable to cybersecurity attacks. While we continue to collaborate on innovative diagnostic and treatment solutions, creating novel approaches to data marketplaces, the industry still remains subject to the threat of bad actors. As CEO of Cleawater Compliance, Steve Cagle is responsible for leading the company's strategic growth, helping organizations identify and reduce risks associated with valuable data and technology transformation. In this episode, Steve shares the importance of security, privacy, and compliance for early stage healthcare companies as they embark on building and implementing solutions for a better future.
On today's episode of UTLRadio, we look at Madison Square Garden's use of facial recognition software and its policy on banning lawyers who are connected to law firms that are suing the venue. Don't miss this episode, and make sure you are subscribed to the podcast so that you are notified of future episodes. Share with friends and Subscribe!! Subscribe on Apple Podcast https://podcasts.apple.com/us/podcast... Subscribe on Stitcher https://www.stitcher.com/podcast/unde... Subscribe on iHeart Radio https://www.iheart.com/podcast/256-ut... Subscribe on Spotify http://ow.ly/hPa850EEJZK Subscribe on Google http://ow.ly/dHcP50EEK0v Don't forget to subscribe to the YouTube Channel! UTLRadio: http://www.UTLRadio.com Legal: http://www.pjlesq.com Twitter: @pjllaw Facebook: https://www.facebook.com/undertanding... Tel.: (201) 904-2211 E-Mail: info@UTLRadio.com E-Mail: pl@pjlesq.com Don't miss this episode of Understanding the Law Radio (UTLRadio)! Want to listen to an episode that you missed? No problem, all episodes are available on iTunes and on our website, www.utlradio.com Make sure that you subscribe to the podcast on iTunes so you know when new episodes are available. Please note: This podcast is for informational purposes only. The statements and opinions contained in this podcast do not constitute legal advice. Additionally, listening to this podcast does not create an attorney/client relationship. If you have a legal issue or concern, you should consult with an attorney in your state.
Third-party health apps can help patients manage chronic diseases, log vital signs, and take charge of their health. But these apps often fall outside of HIPAA's purview, leaving them in a regulatory gray area. Tina Grande, executive vice president for policy at the Healthcare Leadership Council and chair of the Confidentiality Coalition, Robert Tennant, vice president of federal affairs at the WEDI, and Marilyn Zigmund Luke, vice president at AHIP, discuss third-party health app privacy and security risks.
This is the audio-only version of our twice-weekly cyber security talk show, teissTalk. Join us twice a week for free by visiting www.teiss.co.uk/teisstalkThe panel discussion is titledteissTalk: Is your hybrid security awareness programme helping or harming your organisation?Phishing campaigns up, data breaches down: do security awareness programmes work?Security awareness training that meets the needs of a hybrid workforceFocusing hybrid awareness programmes to deliver positive security-related behavioursThis episode is hosted by Thom Langfordhttps://www.linkedin.com/in/thomlangford/?originalSubdomain=ukOscar O'Connor, Chief Storyteller, Oscar O'Connor & Cohttps://www.linkedin.com/in/oscaroconnor/?originalSubdomain=ukSimon Mair, Head of Security Privacy & Information Security, Brewin Dolphinhttps://www.linkedin.com/in/simonmair/?originalSubdomain=ukKeil Hubert, Associate Principal, Security Human Risk Management, OCChttps://www.linkedin.com/in/khubert/
What are the causes of cyber-attacks? In Stratcom Talks, Prof. Eerke Boiten discusses the effects of digitalisation, which has reached a new level with the pandemic, on cyber security. Prof. Boiten provides an analysis of the European Union's General Data Protection Regulation for Stratcom Talks audience while discussing data protection impact assessment in potential cyber-attacks. *Eerke Boiten is a Professor in Cyber Security. He spent the first twenty years of his research career, first in the Netherlands and then in the UK, on mathematics and logic-based methods to guarantee and verify the accuracy of software. He started working for the Cyber Technology Institute, which was designated as the NCSC/EPSRC Academic Centre of Excellence in Cyber Security Research in 2019. His current research projects are in privacy impact assessment, refinement, cybercrime, and cyber intelligence sharing. Siber saldırıların nedenleri nelerdir? Prof. Eerke Boiten, pandemi ile birlikte yeni bir seviyeye gelen dijitalleşmenin siber güvenlik üzerindeki etkilerini Stratcom Talks yayınında anlatıyor. Prof. Boiten olası siber saldırılarda veri koruma etki değerlendirmesine değinirken Avrupa Birliği Genel Veri Koruma Tüzüğünü Stratcom Talks dinleyicileri için değerlendiriyor. *Eerke Boiten, siber güvenlik profesörü. Araştırma kariyerinin ilk yirmi yılını önce Hollanda'da ve ardından Birleşik Krallık'ta, yazılımın doğruluğunu garanti etmek ve doğrulamak için matematik ve mantığa dayalı yöntemler üzerinde geçirdi. 2019 yılında NCSC/EPSRC Siber Güvenlik Araştırmaları Akademik Mükemmeliyet Merkezi statüsünü alan Siber Teknoloji Enstitüsünde göreve başladı. Mevcut araştırma projeleri; gizlilik etki değerlendirmesi, siber suç ve siber istihbarat paylaşımı üzerinedir.
Power Diary Co-founders Damien Adler, Head of Customer Success, and Paul Adler, Head of Product Development, are co-hosting to give you more clarity about security and privacy. They cover how Power Diary keeps its data safe, and what you can do in your practice to ensure that nothing falls through the cracks. You REALLY don't want to miss this. Why Security? Compliance, Regulations & Privacy at Power Diary Common Security and Privacy Questions Security at Power Diary Security Measures that Health Practices Should Have in Place
We continue to see an increase in professionals with liberal arts backgrounds transitioning to careers in technology. In this episode we discuss a few topics that can help make that change.Regardless of your background or what educational path you initially went down, there is a place for you in the tech industry! In this episode, we speak with Jessica Chang, classically trained violist and technical program manager, about how she got to where she is today and pieces of advice that we can all take with us into our next career venture! We discuss work/life balance, covering, standing up for yourself, and much more.[NOTE: this episode was recorded on April 2, 2021]________________________________GuestJessica ChangSr. Behavioral Engineer, Security & Privacy at RobinhoodOn Linkedin | https://www.linkedin.com/in/jessicatchangOn Twitter | https://twitter.com/jessicatchang________________________________ HostsAngela MarafinoOn ITSPmagazine
Microsoft's M365 solution includes a growing and evolving number of security solutions. These include MFA, Exchange On-Line Protection, Advanced Threat Protection and others, some new, some improved. This podcast will be an overview of the solutions in M365 today, solutions that are either baked in to our existing M365 licenses at no additional cost or available at a nominal cost, that offer the possibility to retire and displace more expensive 3rd party solutions. Moderator: @Mark Manoukian - IT Director, Kegler, Brown, Hill & Ritter Speaker: Paul Edlund - Chief Technologist - Midwest, Microsoft Recorded on 03-04-2022
Dr. Jack Fitzsimons (Oblivious AI) gives a high-level introduction to the technologies that can either exploit or protect your data privacy. If you'd like to survey the landscape of data privacy-preserving technologies (from someone who's building the tech) this is a good place to start! #datascience #privacy #ai 0:00 - Coming up... 3:24 - Introduction 6:20 - Data privacy and privacy enhancing technologies 13:00 - History of privacy enhancing technologies 19:54 - Differential privacy: Hiding the influence of a single data point 22:52 - Trading data utility for data privacy 38:32 - Tracking algorithms and how they decide user preferences 42:04 - Preserving privacy: Anonymizing data & VPNs 50:17 - Exploration vs Exploitation: Combining best of multiple domains to tackle problems 54:13 - Federated learning, input and output privacy of data 58:45 - Balancing data privacy vs data-driven personalization 1:05:50 - What should data scientists/statisticians debate?
As technology continues to advance, there are so many ways for hackers to access your data, whether you're working remotely or in an office. Knowing how to protect yourself is imperative for Business Owners and Business Brokers alike. Tune in for details on how cloud based virtual data rooms can be a gamechanger for you. Vault Rooms virtual data rooms enable worldwide clients to safely collect, share, and track business critical documents on the Vault Rooms platform. Listen as Vault Rooms' Kathy Olson, a former business owner herself, describes the importance of a seamless, supported, and secure data environment. Host: Cress V. Diglio Guest: Kathy Olson, Director of Sales and Marketing at Vault Rooms
Alcyr from Mosyle is back again to discuss Security & Privacy and how they are utilising Encrypted DNS with customers. Hosts: Tom Bridge - @tbridge777 Guests: Alcyr Araujo Links: https://mosyle.com Movember 2021 Movember Donate Sponsors: Kandji Halp VMware Workspace One Watchman Monitoring If you're interested in sponsoring the Mac Admins Podcast, please email podcast@macadmins.org for more information. Get the latest about the Mac Admins Podcast, follow us on Twitter! We're @MacAdmPodcast! The Mac Admins Podcast has launched a Patreon Campaign! Our named patrons this month include Weldon Dodd, Damien Barrett, Justin Holt, Chad Swarthout, William Smith, Stephen Weinstein, Seb Nash, Dan McLaughlin, Joe Sfarra, Nate Cinal, Jon Brown, Dan Barker, Tim Perfitt, Ashley MacKinlay, Tobias Linder Philippe Daoust, AJ Potrebka, Adam Burg, & Hamlin Krewson
In deze aflevering bespreken we samen met Danny de recent gelanceerde Apple Macbook Pro, offboarding van gebruikers en UX design rondom security en privacy. 1:40 - Offboarding van gebruikers - https://uxdesign.cc/offboarding-saying-goodbye-with-grace-942cf010c223 8:23 - De nieuwe Macbook Pro van Apple - https://www.apple.com/nl/macbook-pro-14-and-16/ 23:35 - UXtools survey - https://uxtools.co/survey 26:51 - UX Design en security/privacy - https://www.codemotion.com/magazine/dev-hub/security-manager/ux-design-enhance-data-security/ 46:55 - Apple's keynote - https://www.apple.com/apple-events/october-2021/ 59:35 - Richard Jewell - https://www.netflix.com/title/81211846 61:00 - Facebook Metaverse - https://tweakers.net/nieuws/188762/meta-kondigt-nieuwe-metaverse-ontwikkelingen-aan-tijdens-event.html 64:08 - James May: Our man in Japan - https://www.amazon.com/James-May-Our-Japan-Season/dp/B0875YQS3V 65:10 - James May's Cars of the People - https://www.amazon.com/James-Mays-Cars-People/dp/B00N1Q5Q22
Allison Miller, CISO at Reddit, discusses the challenges across stakeholders from end-users to service providers in addressing the nexus of Security, Privacy and Trust? Should they be equally weighted? In what circumstances does the need for one outweigh the need for the others? What does the future hold for our efforts to find the right balance between them? Show Notes: https://securityweekly.com/csp41 This segment is sponsored by Cybereason. Visit https://www.cybereason.com/cisostories to learn more about them! Visit https://securityweekly.com/csp for all the latest episodes! Follow us on Twitter: https://www.twitter.com/cyberleaders Follow us on LinkedIn: https://www.linkedin.com/company/cybersecuritycollaborative/
More about the Online Graduate Programs: https://www.albanylaw.edu/graduate/online-graduate-programs Recorded Sept. 29, 2021. Moderated by Antony Haynes - Associate Dean for Strategic Initiatives, Director of Cybersecurity and Privacy Law, Associate Professor at Albany Law School Panelists Deborah Snyder - Former NYS Chief Information Officer (Retired), Adjunct Professor SUNY Albany Allen Brandt '19 LL.M. - Executive Director and Associate General Counsel, Chief Privacy Officer at Depository Trust & Clearing Corporation, Adjunct Professor at Albany Law School Tony Ogden - Chief Legal and Administrative Officer at Bates Group The threats in cyberspace have shifted – cybercriminals are increasingly targeting critical business assets, supply chains, hybrid infrastructures and IoT systems. They are keeping corporations, governments, and individuals on high alert. At the same time, the ways business is done is also changing as innovation continues to forward, employees are working in new ways, and remote connectivity is being used on a larger scale than expected. These changes have created challenges. New ways of thinking, new strategies that leverage technology, and simple and integrated cybersecurity can help organizations stay ahead. KEY TAKEAWAYS: Applying the lessons from a global pandemic to the new workforce/workspace paradigm How to take a proactive approach to security and privacy without hindering innovation The CISO's role in leading fast-paced organizational change Strategies for attracting and developing the talent you need
Rebecca Herold is CEO and co-founder of Privacy and Security Brainiacs. She's also a Ponemon Institute fellow and the CEO and founder of Rebecca Harold LLC, a cloud-based privacy and security firm. She is currently finishing her 20th published book on information security and privacy. In this episode of Cybersecurity Unplugged, Herold discusses: The gap in cybersecurity education and how to incorporate information and cybersecurity, as well as privacy, into public school curriculum; How to fully and successfully address privacy whether from the lens of compliance, governance or the intersection between the need for privacy and the need for security; The Internet of Medical Things, deadly exposure of connected medical devices and predictions for the future of medical device security.
Sometimes, technology drives societal changes, and sometimes society has to harness the power of technology and redefine its purpose. When it comes to privacy, this may be the case. Honestly, the only way forward.GuestsLourdes TurrechaOn Linkedin
Data Transformers Podcast Security, Privacy, Integrity, Transparency for AI Systems – Pamela Gupta Play Episode Pause Episode Mute/Unmute Episode Rewind 10 Seconds 1x Fast Forward 30 seconds 00:00 / 00:24:13 Subscribe Share Apple Podcasts Google Podcasts Spotify Stitcher RSS Feed Share Link Embed
This week reads like a https://www.007.com/ movie (we like the " How To Drive Like James Bond… That is, if you have £3M to spare" section): from across the world, nation state spies are revealed, huge hacking exploits that provided access into 80% of the US Fortune 500 come to light, insecure kit at the doctor's office and schools hacking students phones with hardware that was and probably should still be in the domain of the spies are all exposed. Yes, despite the meteor showers overhead, we stay with our feet planted firmly on terra firm with this update, and we think you will love the detail. And finally this yarn ends by knitting in an opportunity for you to play phisherman/phisherwoman, engaging in some role playing/threat modeling around how you might compromise someone through email, in order to understand the small changes in your own behavior that will keep you much safer. It's all here so let's get cracking! --- Send in a voice message: https://anchor.fm/rps5/message
Our weekly installment of tech news analysis includes Palo Alto's $420 million purchase of CloudGenix, Zoom's very bad week for security and privacy, Cisco Live going virtual, updates on professional development opportunities, and more on Network Break from the Packet Pushers.
Our weekly installment of tech news analysis includes Palo Alto's $420 million purchase of CloudGenix, Zoom's very bad week for security and privacy, Cisco Live going virtual, updates on professional development opportunities, and more on Network Break from the Packet Pushers.
Our weekly installment of tech news analysis includes Palo Alto's $420 million purchase of CloudGenix, Zoom's very bad week for security and privacy, Cisco Live going virtual, updates on professional development opportunities, and more on Network Break from the Packet Pushers.
"Make no mistake: the EARN IT Act is a vehicle to undermine end-to-end encryption." - Elliot Harmon A very important episode on a topic that people need to be aware of. There is a bill in Congress, one of the continuous attempts for the past 25 or so years, that will create enormous collateral damage to our freedom of speech, and privacy online. Not to mention putting the many abuses of surveillances capitalism on steroids. An excellent article from the EFF breaks it all down. "The price of liberty is eternal vigilance." - Thomas Jefferson Please take just a moment and visit the original article to send a message to your representative. Ot might not make an enormous difference, but what do they do if they hear from no one? Support the EFF for fighting the good fight for online security and free speech! https://www.eff.org/deeplinks/2020/03/graham-blumenthal-bill-attack-online-speech-and-security Take Action: https://act.eff.org/action/protect-our-speech-and-security-online-reject-the-graham-blumenthal-bill Another great article from BitcoinMagazine giving more insight into the problem written by Dave Hollerith: https://bitcoinmagazine.com/articles/earn-it-the-us-anti-encryption-bill-that-threatens-private-speech-online Swan Bitcoin is almost live! They are the best place to DCA your sat stacking! A Bitcoin-only company built by true Bitcoiners. You'll get $5 free sats by using the referral below as well as sending $5 to the show! https://www.swanbitcoin.com?grsf=fijswv --- Send in a voice message: https://podcasters.spotify.com/pod/show/bitcoinaudible/message
Bruce Schneier (@schneierblog) is an internationally renowned security technologist, called a "security guru" by The Economist. [spreaker type=player resource="episode_id=23930254" width="100%" height="80px" theme="light" playlist="false" playlist-continuous="false" autoplay="false" live-autoplay="false" chapters-image="true" episode-image-position="right" hide-logo="true" hide-likes="false" hide-comments="false" hide-sharing="false" hide-download="true"]
Join Horangi in our pilot episode of Ask A CISO! Mark Fuentes looks at the typical data privacy challenges and then shows how a security-first approach helps organizations achieve their compliance goals efficiently.
At least one Internet of Things (IoT), or “smart”, device, is already used by each person within the large majority of the population. The number of IoT devices are growing exponentially, and soon every member of the population will own a few to many IoT devices each. IoT devices inherently bring privacy, safety and security risks to those using them, and attached in some way to them. Some risks, such as those created by medical devices, smart homes, smart grids and smart vehicles and roads literally could result in death. What are these data and systems security, privacy and safety risks? What needs to be done to mitigate those risks? Why aren't device makers building security, privacy and safety controls into these devices? Listen in to hear Abhik Chaudhuri, author of the book “Internet of Things, for Things and by Things” discuss these and many more IoT security, privacy and safety topics with Rebecca.
The government is trying to build a single sign-on identity management capability for federal services. This is the fourth attempt. But it seems off to a better start than the first three tries. The General Services Administration launched the Login.gov platform in April. Five agencies are already testing it. The system saw a spike in user accounts in this month. Joel Minton, the director of the Login.gov platform run by GSA's 18F group, tells Executive Editor Jason Miller about how 18F is hoping to drive privacy, security and usability enough to give citizens confidence in using federal services on Federal Drive with Tom Temin.
Hudson Institute hosted Representative Mike Pompeo of Kansas, a senior member of the House Permanent Select Committee on Intelligence, for a conversation on the enduring relevance of the USA PATRIOT Act intelligence programs.
It's a new episode of the Charlie Tonic Hour and we're loading up with topics this week. After a fun Discourse Intercourse catching you up on the events of the week, Charlie takes you to school, just a bit, for a reminder about protecting yourself on the internet following a Lifehacker article. From there Ginny discusses the changing landscape of gay rights, marijuana legislation and the whole contraceptive kerfuffle. We close out with a missed opportunity for a smokey beer and a bit of reggae to ease your day. All in all a solid one as we return to our classic show format post-Derby City.