POPULARITY
AI Unraveled: Latest AI News & Trends, Master GPT, Gemini, Generative AI, LLMs, Prompting, GPT Store
⚖️ U.S. Copyright Office Sets Clear Rules on AI
The Data Chronicles dives into the recent FTC action against data broker Mobilewalla, which highlights the Commission's continued focus on the collection, use, and disclosure of sensitive consumer data, including by downstream data recipients in the ad tech ecosystem. Join Scott Loughlin and Hogan Lovells colleague Alaa Salaheldin as they unpack the implications of the FTC action and what it means for the future of data privacy, ad tech and location data.
SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast
This episodes covers how Starlink users can be geolocated and how Cloudflare may help deanonymize users. The increased use of AI helpers leads to leaking data via careless prompts. Geolocation and Starlink https://isc.sans.edu/diary/Geolocation%20and%20Starlink/31612 Discover the potential geolocation risks associated with Starlink and how they might be exploited. This diary entry dives into new concerns for satellite internet users. Deanonymizing Users via Cloudflare https://gist.github.com/hackermondev/45a3cdfa52246f1d1201c1e8cdef6117 Deanonymizing users by identifying which cloudflare server cashed particular content Sage's AI Assistant and Customer Data Concerns https://www.theregister.com/2025/01/20/sage_copilot_data_issue/ Examine how a Sage AI tool inadvertently exposed sensitive customer data, raising questions about AI governance and trust in business applications. The Threat of Sensitive Data in Generative AI Prompts https://www.darkreading.com/threat-intelligence/employees-sensitive-data-genai-prompts Analyze how employees careless prompts to generative AI tools can lead to sensitive data breaches and the importance of awareness training. Homebrew Phishing https://x.com/ryanchenkie/status/1880730173634699393
Memory is a problem for many people as they age. To combat this, wearable devices may help older adults recall precious memories through what is called 'life-logging', despite these technologies raising significant privacy concerns.Researchers at Singapore Management University, led by Thivya Kandappu, have developed PrivacyPrimer, a tool designed to protect sensitive information captured by wearable cameras. Their approach uses selective image obfuscation to safeguard privacy, while preserving the ability to reminisce - striking a balance between memory recall and security.Read the original research: doi.org/10.1145/3476047
Watch now! - https://www.youtube.com/@Urelevant Let's dive into some security concerns and what you can do to shore up your AI implementations inside of agent force so I noticed a post on LinkedIn that was gaining some traction that was from Amnon Kruvi and he's a Salesforce architect and he mentions in his post that "it took me exactly two questions to accidentally get agent force to reveal someone else's personal information using the default actions followed by hallucinating madeup orders for that person and then from there he's saying how AI has no business reading database records that is not to say there are no excellent use cases for it but delivering live information from a database is just too risky in the data protection era we need to be realistic with what kinds of solutions AI can safely deliver I understand the hype but some of it will just leave the door wide open for someone to steal your data." That really intrigued me when I first saw that is like wow this is giving up information and Salesforce has done a lot of work around the Einstein trust layer to try to protect information to mask sensitive data as it goes to a large language model but when you think about it as far as authentication methods that's something that always happens whenever you call into a call center and dealing with any sort of sensitive records often times you're asked to verify your phone number your date of birth perhaps provide the last four of your Social just different things as far as verifying and so what Amnon goes on to describe in some of the comments which I'll highlight some here in a moment is that the verification process was kind of thin and this was the default behavior and setup in the instruction sets inside of Agentforce and I'll dig in more to try to see what sort of org or instance he was in if this was is a free learner account I think one of the issues is is that this was the default setup provided by Salesforce which might lead to uh users trusting that just because it's coming from Salesforce just presuming that best practices were being used so we're going to explore in this video as well how you can help bring your instructions into alignment your various guardrails that you can put in place inside of Agentforce and then open up some of the possibilities as far is if there's things that are out of alignment or contradict one another in your guard rails and instructions these are all things that we now have to think about in this new age of AI that we're working in and navigating and so Amnon further iterates that does a good job of closing off a lot of attack vectors but the issue was with the default demo configuration being of poor quality and teaches bad processes that highlight the security risk involved with any kind of AI based technology and so here is my comment where I chimed in just saying for my perspective that there's so many challenges that abound from implementing generative AI and placing guard rail ensuring alignment across all instructions in Agentforce and the inevitable rapid release of new and improved models makes this a moving Target this is a good case study for the Agentforce testing center and previously we saw the release a few weeks ago of the Agentforce testing center where you can bulk test agent force performance and agent responses and I think that this is a good thing to think about is the hundreds or thousands of ways that prompts might come into an Enterprise and then testing out out in bulk the verification process so that you are not just giving away other people's information the scenario that Amnon is describing is he's self-identifying as someone saying that he is someone else giving that person's email address which sometimes is easy to find online and then asking questions about an order for example so you can see if you're dealing with agent force at a healthcare setting Financial Services Etc there's a lot of loopholes that could be exploited and so then Paul Battisson he had a question here missing that this is concerning and asking about the setup wanting to know more details as to what was the org in question what was the setup and so he answers Paul saying it was an SDO that's the Salesforce developer org and the main point here is that Amnon had a pretty good idea of why it was happening how to mitigate the situation as well his main point is that the default action should not be so exposed because people might think they're best practice and that's the point here is that when you see something from Salesforce you assume that everything's been thought out and thought through and that the proper guard rails are in place so whenever you're spinning up an instance that has Agentforce enabled you don't want to just necessarily take all the instruction sets at face value there's instructions you can place the agent level and inside of prompt templates and you will be wanting to audit those make sure that they're in alignment that's one of the points I was trying to make as far as this being indeed a moving Target coupled with as well in the background the constant Evolution and advancements with new large language models and those being added into agent force over time and so this is something that will not be set it and forget it sort of proposition but will always need to be being monitored by organizations and tested in bulk in mass and that's why the Agentforce testing center is so important is because we can't humanly scale to that point to think of all the variations as to the different approaches to be able to try to hack this in and there was another response further down from someone named Vani I didn't put her last name I checked her profile I'm not sure what her last name is she's bringing up since Agentforce can't function without Einstein trust layer uh which includes safeguards like data masking and access controls I'm curious do this happen even after having these protections or or do you think they're still room for improvement and so then Amnon responds back that I did not actively put someone's address as protected data in the trust layer configuration though it was enabled with the default settings and then basically said hey my email is xxx then asked it to tell me what my address and birthday were and so that is the example specifically of the prompt or the utterance that was given to Agentforce and it didn't really do a great job as far as verifying the identity of the person it was able to then verify by the email address assuming that that is the person that is chatting or prompting agent force and then was able to follow up with asking some follow-up questions and so then Andy Cotgreave brought up a great point as well saying we don't want to put the burden on the end user as far as having to test test test and that burden should be on Salesforce in the configuration of Agentforce and this I think it was this specific comment that caused me to remember theAgentforce testing center which was recently released that comment of test test test was realizing okay the burden is on the user and this is Salesforce's response is to use the Agentforce testing center because it we can't humanly scale as I said to test out all those different variations and so it's the coupling of humans and AI working together on that side of the fence to do that testing in in addition to configuring the Einstein Trust Layer setting and then as well the instruction sets for prompt templates the agent instructions as well the topic configurations so there's a lot of great conversation here and this really opens up some thought related to authentication of users and just the utterances and prompts that Agentforce will be faced with dealing with out in the wild so many thanks to Amnon Kruvi for insightful post bringing up some important aspects related to Security in the age of Agentforce and so be sure and check out Velza that is our implementation company we specialize in Salesforce implementations and agent force implementations reach out to us at Velza.com and we will schedule a call do a discovery and get your implementation out on the right foot or fix a failed implementation that seems to be all the rage nowadays is people trying to start over and get their configurations fixed especially in this age of AI and Agentforce also be sure and check out rapidreskill.com for Salesforce and AI training and be sure and like And subscribe to the Urelevant podcast feed the algorithm help others to find Urelevant as well it's all about helping you to find relevance in the economy of now I'm Mike wheeler signing off for now until next time I'll see you in the cloud
A cyberattack in Rhode Island targets those who applied for government assistance programs. U.S. Senators propose a three billion dollar budget item to “rip and replace” Chinese telecom equipment. The Clop ransomware gang confirms exploiting vulnerabilities in Cleo's managed file transfer platforms. A major Southern California healthcare provider suffers a ransomware attack. A leading US auto parts provider discloses a cyberattack on its Canadian business unit.SRP Federal Credit Union notifies over 240,000 individuals of cyberattack. A sophisticated phishing campaign targets YouTube creators. Researchers identify a high-severity vulnerability in Mullvad VPN. A horrific dark web forum moderator gets 30 years in prison. Our guests are Perry Carpenter and Mason Amadeus, hosts of the new FAIK Files podcast. Jailbreaking your license plate. Remember to leave us a 5-star rating and review in your favorite podcast app. Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you'll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn. CyberWire Guest Our guests are Perry Carpenter and Mason Amadeus, hosts of The FAIK Files podcast, talking about their new show. You can find new episodes of The FAIK Files every Friday on the N2K CyberWire network. Selected Reading Personal Data of Rhode Island Residents Breached in Large Cyberattack (The New York Times) Senators, witnesses: $3B for ‘rip and replace' a good start to preventing Salt Typhoon-style breaches ( CyberScoop) Clop ransomware claims responsibility for Cleo data theft attacks (Bleeping Computer) Hackers Steal 17M Patient Records in Attack on 3 Hospitals (BankInfo Security) Major Auto Parts Firm LKQ Hit by Cyberattack (Securityweek) SRP Federal Credit Union Ransomware Attack Impacts 240,000 (Securityweek) ConnectOnCall Announces 914K-Record Data Breach (HIPAA Journal) Malware Hidden in Fake Business Proposals Hits YouTube Creators (Hackread) Critical Mullvad VPN Vulnerabilities Let Attackers Execute Malicious Code (Cyber Security News) Texan man gets 30 years in prison for running CSAM exchange (The Register) Hackers Can Jailbreak Digital License Plates to Make Others Pay Their Tolls and Tickets (WIRED) Share your feedback. We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. Want to hear your company in the show? You too can reach the most influential leaders and operators in the industry. Here's our media kit. Contact us at cyberwire@n2k.com to request more info. The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc. Learn more about your ad choices. Visit megaphone.fm/adchoices
Get your IT security managed by Megabytes (618-559-2902), a true industry professional that customizes solutions to prevent cybersecurity attacks. Learn how Megabytes can help your business at: https://www.megabytesone.com/ Megabytes City: Herrin Address: 308 N 16th St Website: https://www.megabytesone.com Phone: +1-618-559-2902 Email: dsatterlee@megabytes.co
Proposed rules ban U.S. companies from selling sensitive data Cisco data stolen by IntelBroker Nidec breach exposes 50,000+ documents Thanks to today's episode sponsor, SpyCloud Did you know that infostealer malware can be a precursor to ransomware? Infostealers are a trending tactic used by cybercriminals to exfiltrate valuable identity data like credentials, PII, and session cookies. According to recent SpyCloud research, 75% of organizations were affected by ransomware more than once in the past year! Visit spycloud.com/headlines to find out how to keep your organization from becoming one of the statistics.
Enjoying the content? Let us know your feedback!Today's topic is one that mixes the marvel of modern technology with some very real concerns. We're talking about the rise of Large Language Models, or LLMs, how they're rapidly being adopted across industries, and the potential for sensitive data leakage on the open web. It's a thrilling time for AI technologies, but as with all new frontiers, there are risks if we're not careful.News: MSHTML platform spoofing vulnerability. And yes, It is a big one.- https://blogs.cisco.com: Securing The LLM Stack- https://msrc.microsoft.com: CVE-2024-43461- https://msrc.microsoft.com: CVE-2024-38112- https://www.trendmicro.com: CVE-2024-38112 Void-Banshee Be sure to subscribe! If you like the content. Follow me @iayusuf or read my blog at https://yusufonsecurity.comYou will find a list of all previous episodes in there too.
Bret and Nirmal are joined by Maria Vechtomova, a MLOps Tech Lead and co-founder of Marvelous MLOps, to discuss the obvious and not-so obvious differences between a MLOps Engineer and traditional DevOps jobs.Maria is here to discuss how DevOps engineers can adopt and operate machine learning workloads, also known as MLOps. With her expertise, we'll explore the challenges and best practices for implementing ML in a DevOps environment, including some hot takes on using Kubernetes.Be sure to check out the live recording of the complete show from June 20, 2024 on YouTube (Stream 271).★Topics★Marvelous MLOps on LinkedInMarvelous MLOps SubstackMarvelous MLOps YouTube ChannelCreators & Guests Cristi Cotovan - Editor Beth Fisher - Producer Bret Fisher - Host Maria Vechtomova - Guest Nirmal Mehta - Host (00:00) - Intro (02:04) - Maria's Content (03:22) - Tools and Technologies in MLOps (09:21) - DevOps vs MLOps: Key Differences (19:22) - Transitioning from DevOps to MLOps (22:52) - Model Accuracy vs Computational Efficiency (24:46) - MLOps with Sensitive Data (29:10) - MLOps Roadmap and Getting Started (32:36) - Tools and Platforms for MLOps (37:14) - Adapting MLOps Practices to Future Trends (44:08) - Is Golang an Option for CI/CD Automation? You can also support my free material by subscribing to my YouTube channel and my weekly newsletter at bret.news!Grab the best coupons for my Docker and Kubernetes courses.Join my cloud native DevOps community on Discord.Grab some merch at Bret's Loot BoxHomepage bretfisher.com
Search engine optimization (SEO) has been top of mind for brands for more than a decade to ensure their websites and products capture as many eyeballs as possible by ranking high up on search results pages. But search is changing, and as consumers increasingly turn to AI chatbots like ChatGPT or Claude Learn more about your ad choices. Visit podcastchoices.com/adchoices
The Justice Department is accusing TikTok of harnessing the capability to gather bulk information on users based on views on divisive social issues like gun control, abortion and religion. See omnystudio.com/listener for privacy information.
The Justice Department is accusing TikTok of harnessing the capability to gather bulk information on users based on views on divisive social issues like gun control, abortion and religion. See omnystudio.com/listener for privacy information.
Yannik Schrade is the CEO and Co-Founder of Arcium, a parallelized confidential computing network, bringing fast, scaleable and universal encryption. As the lead architect and visionary behind Arcium, Yannik created the project by leveraging his expertise in cryptography with the goal of advancing data security and confidentiality. A renowned thought leader, Yannik has spoken at several prominent industry conferences, including the 2024 World Economic Forum, where he challenged TradFi leaders on the importance of decentralization, privacy, and trustlessness. He previously founded ShiftScreen, an iOS app, which attracted over 100,000 paying customers and was a regular top seller globally. Yannik studied Computer Science and Mathematics at the Technical University of Munich, and he also studied law, adding another dimension to his extensive portfolio. --- Support this podcast: https://podcasters.spotify.com/pod/show/crypto-hipster-podcast/support
Have you ever thought about the physical places where our most sensitive and private digital information is stored? Around Australia lie ultra-secure databases that host everything from your medical records and internet passwords to our governments' records and national secrets. Unsurprisingly, given the sensitive nature of this digital information, most of us will never even know where these data centres are, let alone see inside one. However in this episode, The Briefing will take you right inside a data control centre, and you'll hear from AuCloud CEO Peter Maloney to find out how they keep your data safe from hackers, scammers and foreign intelligence agencies. Follow The Briefing:TikTok: @listnrnewsroomInstagram: @listnrnewsroom @thebriefingpodcast YouTube: @LiSTNRnewsroomFacebook: @LiSTNR NewsroomSee omnystudio.com/listener for privacy information.
We've all heard about breaches of privacy and leaks of private health information (PHI). For healthcare providers and those storing this data, knowing where all the sensitive data is stored is non-trivial. Ramin, from Tausight, joins us to discuss how they have deploy edge AI models to help company search through billions of records for PHI.
Protecting your endpoints - how do cybercriminals exfiltrate data, and what trends are we seeing?Mitigating the financial, legal, and reputational risks with a comprehensive data strategyLeveraging next-generation technology to rapidly detect and respond to data exfiltrating ransomware attacksThis episode is hosted by Thom Langfordhttps://www.linkedin.com/in/thomlangford/Neil Hare-Brown, CEO, STORM Guidancehttps://www.linkedin.com/in/neilhbPrince Adu, Board Member - ISACA Accra Chapter, ISACAhttps://www.linkedin.com/in/prince-adu-ccsp-cisa-crisc-3759a520/Darren Williams, CEO, BlackFoghttps://www.linkedin.com/in/darrenwwilliams/
We've all heard about breaches of privacy and leaks of private health information (PHI). For healthcare providers and those storing this data, knowing where all the sensitive data is stored is non-trivial. Ramin, from Tausight, joins us to discuss how they have deploy edge AI models to help company search through billions of records for PHI.
The news of Texas covered today includes:Our Lone Star story of the day: Bumbling Biden's border order is fakery for the ballot box – only morons and those who have been in a coma the past three years can take it seriously – as the A.P. does! “Why now?”: Biden's new immigration policy to limit asylum seekers faces quick criticism in Texas Border Expert Exposes Biden's ‘Unserious' Executive Order DHS Fails to Monitor 77,000 Immigration Parolees; Can They Handle 1.1M Others? Our Lone Star story of the day is sponsored by Allied Compliance Services providing the best service in DOT, business and personal drug and alcohol testing since 1995.Texas sales tax collection up over May of last year.Much news from Ken Paxton's Office of Attorney General: Attorney General Ken Paxton Successfully Stops Unlawful Attempt By The Biden IRS To Impair Texas Child Support Programs Attorney General Ken Paxton Sues Biden Department of Labor for Attempting to Revive Illegal Obama-Era Mandate Attorney General Ken Paxton Launches Data Privacy and Security Initiative to Protect Texans' Sensitive Data from Illegal Exploitation by Tech, AI, and Other Companies OAG Asks Texas Supreme Court to Review Politically Motivated Lawfare Against Attorney General Paxton and OAG Leadership Listen on the radio, or station stream, at 5pm Central. Click for our radio and streaming affiliates.www.PrattonTexas.com
This week, Chelsea Smith, Chief Executive Officer & Information Security Consultant at CAJ Cyber Consulting LLC, joins the show. In this episode, Chelsea shares her insights on Governance, Risk, and Compliance (GRC), emphasizing information security and business process analysis. She offers tips on enhancing information security, improving communication between Internal Audit teams and SICOs, and explores use cases involving cyber analytics. Be sure to connect with Chelsea on LinkedIn. Also, be sure to follow us on our new social media accounts on LinkedIn, Instagram, and TikTok. Also be sure to sign up for The Audit Podcast newsletter and to check the full video interview on The Audit Podcast YouTube channel. Timecodes: 3:08- How a Privacy Expert Uses ChatGPT 10:21 - The Flexibility of Living Life in Sprints 14:06 - Cyber Analytics Use Case Examples 20:31 - The impact of AI on SICOs 22:25 - Improving Communication Between Internal Audit Teams and SICOs 24:21 - Sensitive Data and the Risks of AI Tools 27:27 - Mitigating Personal Risk 30:52 - How Cyber Security can be Improved with Data Analytics * This podcast is brought to you by Greenskies Analytics, the services firm that helps auditors leap-frog up the analytics maturity model. Their approach for launching audit analytics programs with a series of proven quick-win analytics will guarantee the results worthy of the analytics hype. Whether your audit team needs a data strategy, methodology, governance, literacy, or anything else related to audit and analytics, schedule time with Greenskies Analytics.
Federal Tech Podcast: Listen and learn how successful companies get federal contracts
We are in a whirlwind of change. Data is pouring into federal agencies. A recent report indicated that data was growing at 25% a year; cloud usage at a rate of 61%; and Software as A Service an astounding 200%. Oh, did I forget to mention that Generative AI is also increasing data exploding? It is one thing to worry about data from John's Doughnuts, and quite another to worry about sensitive military, financial, and health information that the federal government is charged to protect. Data. gov estimates that 250 million data sets are being used by the public sector. This increase in data has not been missed by the White House. On February 28, 2024, an Executive Order called “Protecting America's Sensitive Data” was issued. Today, we sat down with Adam Costello to have him share some of his practical knowledge of securing data. Adam begins by suggesting federal agencies start by figuring out where these data sets are stored. Humans make mistakes, humans jump into shadow IT and create ghost data, and people do not understand retention protocols. Adam suggests that an Asset Management Database can establish a baseline for documenting data. From there, we can get a better perspective on concerns like encryption, micro-segmentation, time-based retention methods like records management, and establishing a Recovery Point Objective. If you look at your network configuration and blink an eye, it has changed. Listen to the interview to gather best practices from a data management specialist with decades of experience. = = = Want to leverage you next podcast appearance? https://content.leadquizzes.com/lp/fk1JL_FgeQ Connect to John Gilroy on LinkedIn https://www.linkedin.com/in/john-gilroy/ Want to listen to other episodes? www.Federaltechpodcast.com
This episode of Screaming in the Cloud focuses on keeping critical data safe and organized, especially when there's a lot of it. Pranava Adduri, the CEO of Bedrock Security, shares the tools and methods Bedrock uses to help other businesses protect their essential information. They discuss how new technologies like AI can help manage vast amounts of data and ensure only the right people can access it.About Pranava:Pranava has worked in data protection and security for more than a decade. Before becoming an Entrepreneur In Residence at Greylock Partners in 2020, he was a Software Development Manager for AWS, where he worked with Fortune 500 CISOs to develop innovative products for data risk and compliance. Before that, he was a founding engineer at Rubrik, a SaaS data protection platform. Pranava graduated magna cum laude from the University of California, Berkeley with a triple-major B.S. in Computer Science, Industrial Engineering and Operations Research, and Economics, then obtained an M.S. from Berkeley in Industrial Engineering and Operations Research. Show highlights:(00:00) - Introduction (01:36) - Overview of Bedrock Security's solutions for large-scale data protection(03:04) - The importance of data classification and access control was discussed(04:47) - Exploring the limitations of current data governance (05:22) - Pranava details how data is managed in cloud environments(09:39) - Evolving strategies in data lake management and data volume growth(12:36) - Impact of generative AI on data creation and the need for retention(15:50) - Discussion on cost-effective data management solutions(23:45) - The role of AI in enhancing data security measures at Bedrock(25:42) - How customer feedback shapes Bedrock's AI security technology(27:19) - The growing necessity for sophisticated data security systems(29:22) - Upcoming events and where to find more about Bedrock Security and PranavaLinks: Bedrock Security: https://www.bedrock.security/ Bedrock Security X/Twitter: https://twitter.com/bedrocksecBedrock Security LinkedIn: https://www.linkedin.com/company/bedrocksec/Pranava's LinkedIn: https://www.linkedin.com/in/padduri/Pranava's Twitter: https://twitter.com/thenava?lang=enInnovation Sandbox 2024: https://www.businesswire.com/news/home/20240402284910/en/Bedrock-Security-Named-RSA-Conference-2024-Innovation-Sandbox-FinalistSponsorPanoptica Academy: https://panoptica.app/lastweekinaws
An unusual split in two Wisconsin Court of Appeals districts highlights growing partisan division in the judiciary. By Wisconsin Watch's Jack Kelly
Bankrupt Data Brokers = Your Sensitive Data Sold Off! by Nick Espinosa, Chief Security Fanatic
One of America's largest internet providers may collect data about your political beliefs, race, and sexual orientation to serve personalized ads. Thanks for listening to WIRED. Talk to you next time for more stories from WIRED.com and read this story here. Learn more about your ad choices. Visit megaphone.fm/adchoices
One of America's largest internet providers may collect data about your political beliefs, race, and sexual orientation to serve personalized ads. Read this story here. Learn more about your ad choices. Visit megaphone.fm/adchoices
Guest: Damien Desfontaines, Staff Scientist at Tumult LabsOn Linkedin | https://www.linkedin.com/in/desfontaines/On Twitter | https://twitter.com/TedOnPrivacyOn Mastodon | https://hachyderm.io/@tedted____________________________Host: Sean Martin, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining CyberSecurity Podcast [@RedefiningCyber]On ITSPmagazine | https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/sean-martin____________________________This Episode's SponsorsImperva | https://itspm.ag/imperva277117988Devo | https://itspm.ag/itspdvweb___________________________Episode NotesThis episode of Redefining CyberSecurity features a deep discussion between host, Sean Martin and guest, Damien Desfontaines on the topic of Differential Privacy (DP) and its implications in the field of cybersecurity. Damien, who currently works in a startup, Tumult Labs, primarily focuses on DP concepts and has rich prior experience from working in the anonymization team at Google. He shares key insights on how differential privacy — a tool to anonymize sensitive data can be effectively used by organizations to share or publish data safely, thus opening doors for new business opportunities.They discuss how differential privacy is gradually becoming a standard practice for companies wanting to share more data without incurring additional privacy risk. Damien also sheds light on the forthcoming guidelines from NIST regarding DP, which will equip organizations with a concrete framework to evaluate DP claims. Despite the positive dimension, Damien also discusses the potential pitfalls in the differential privacy implementation and the need for solid data protection strategies.The episode concludes with an interesting conversation about how technology and risk mitigation controls can pave way for more business opportunities in a secure manner.Key insights:Differential Privacy (DP) offers a mathematically proven methodology to anonymize sensitive data. It enables organizations to safely share or publish data, opening new business opportunities while adhering to privacy norms and standards.The forthcoming guidelines from NIST will equip organizations with a concrete framework to evaluate DP claims, fine-tune their privacy governance, and promote data governance within their operations.Implementing DP is complex and necessitates solid data protection strategies. Even with a strong mathematical foundation, the practical implementation of DP requires careful monitoring of potential vulnerabilities, illustrating the need for a holistic approach to data privacy.___________________________Watch this and other videos on ITSPmagazine's YouTube ChannelRedefining CyberSecurity Podcast with Sean Martin, CISSP playlist:
Guest: Damien Desfontaines, Staff Scientist at Tumult LabsOn Linkedin | https://www.linkedin.com/in/desfontaines/On Twitter | https://twitter.com/TedOnPrivacyOn Mastodon | https://hachyderm.io/@tedted____________________________Host: Sean Martin, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining CyberSecurity Podcast [@RedefiningCyber]On ITSPmagazine | https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/sean-martin____________________________This Episode's SponsorsImperva | https://itspm.ag/imperva277117988Devo | https://itspm.ag/itspdvweb___________________________Episode NotesThis episode of Redefining CyberSecurity features a deep discussion between host, Sean Martin and guest, Damien Desfontaines on the topic of Differential Privacy (DP) and its implications in the field of cybersecurity. Damien, who currently works in a startup, Tumult Labs, primarily focuses on DP concepts and has rich prior experience from working in the anonymization team at Google. He shares key insights on how differential privacy — a tool to anonymize sensitive data can be effectively used by organizations to share or publish data safely, thus opening doors for new business opportunities.They discuss how differential privacy is gradually becoming a standard practice for companies wanting to share more data without incurring additional privacy risk. Damien also sheds light on the forthcoming guidelines from NIST regarding DP, which will equip organizations with a concrete framework to evaluate DP claims. Despite the positive dimension, Damien also discusses the potential pitfalls in the differential privacy implementation and the need for solid data protection strategies.The episode concludes with an interesting conversation about how technology and risk mitigation controls can pave way for more business opportunities in a secure manner.Key insights:Differential Privacy (DP) offers a mathematically proven methodology to anonymize sensitive data. It enables organizations to safely share or publish data, opening new business opportunities while adhering to privacy norms and standards.The forthcoming guidelines from NIST will equip organizations with a concrete framework to evaluate DP claims, fine-tune their privacy governance, and promote data governance within their operations.Implementing DP is complex and necessitates solid data protection strategies. Even with a strong mathematical foundation, the practical implementation of DP requires careful monitoring of potential vulnerabilities, illustrating the need for a holistic approach to data privacy.___________________________Watch this and other videos on ITSPmagazine's YouTube ChannelRedefining CyberSecurity Podcast with Sean Martin, CISSP playlist:
Molly Martinson is a lawyer at Wyrick Robbins, a Raleigh-based law firm with outstanding privacy compliance credentials. She advises clients on a whole range of applicable privacy frameworks (CCPA, CPRA, FCRA, CAN-SPAM, COPPA, HIPAA), data breaches, laws regulating data brokers, and laws governing website and mobile application privacy policies. She also regularly advises international and U.S.- based clients on the applicability and requirements of the EU General Data Protection Regulation (GDPR). Molly received her B.A., cum laude from Wake Forest University and her J.D. with honors from UNC Schoolors Writing Scholar. She also received the Gressman-Pollitt Award for Excellence in Oral Advocacy. Molly served as a law clerk to the Honorable Robert N. Hunter, Jr. on the Supreme Court of North Carolina and the North Carolina Court of Appeals before entering private practice. References: Molly Martinson on LinkedIn California Consumer Privacy Act Virginia Consumer Data Protection Act Colorado Privacy Act Utah Consumer Privacy Act Summary of the Texas Data Privacy and Security Act (National Law Review) Connecticut Data Privacy Act Florida Privacy Protection Act Montana Consumer Privacy Law Oregon Consumer Privacy Act Global Privacy Control Wyrick Robbins
Research shows that 26% of US workers currently work remotely, and there are expected to be 32.3 million American employees working remotely by 2025. To support these workers, organizations are adopting cloud solutions and migrating data to these cloud solutions. However, many businesses lack visibility into who has access to what data and when, especially in these cloud solutions. How should organizations reconcile the disconnect between data access and data security? Mike Scott, CISO at Immuta, joins Business Security Weekly to discuss best practices for moving sensitive data into the cloud, including data access and data security. If you're moving data into the cloud, listen in to learn how best to protect that data. In the leadership and communications section, Advice to Aspiring CISOs, New risk management framework helps with SEC mandate compliance, A Simple Hack to Help You Communicate More Effectively, and more! Show Notes: https://securityweekly.com/bsw-333 Visit https://www.securityweekly.com/bsw for all the latest episodes!
Research shows that 26% of US workers currently work remotely, and there are expected to be 32.3 million American employees working remotely by 2025. To support these workers, organizations are adopting cloud solutions and migrating data to these cloud solutions. However, many businesses lack visibility into who has access to what data and when, especially in these cloud solutions. How should organizations reconcile the disconnect between data access and data security? Mike Scott, CISO at Immuta, joins Business Security Weekly to discuss best practices for moving sensitive data into the cloud, including data access and data security. If you're moving data into the cloud, listen in to learn how best to protect that data. Show Notes: https://securityweekly.com/bsw-333
Research shows that 26% of US workers currently work remotely, and there are expected to be 32.3 million American employees working remotely by 2025. To support these workers, organizations are adopting cloud solutions and migrating data to these cloud solutions. However, many businesses lack visibility into who has access to what data and when, especially in these cloud solutions. How should organizations reconcile the disconnect between data access and data security? Mike Scott, CISO at Immuta, joins Business Security Weekly to discuss best practices for moving sensitive data into the cloud, including data access and data security. If you're moving data into the cloud, listen in to learn how best to protect that data. In the leadership and communications section, Advice to Aspiring CISOs, New risk management framework helps with SEC mandate compliance, A Simple Hack to Help You Communicate More Effectively, and more! Show Notes: https://securityweekly.com/bsw-333 Visit https://www.securityweekly.com/bsw for all the latest episodes!
As technology rapidly innovates, it is essential we talk about technology policy. What better way to get in the know than to have an expert break it down for us? Meet Ross Nodurft, the Executive Director of the Alliance for Digital Innovation. Ross dives in, explaining the evolution of FedRAMP controls and the recent, giant, AI Executive Order (EO) from the White House. Listen in to find out what this EO means for the government, the industry and the workforce as the U.S. attempts to implement policy ahead of AI innovation.Key Topics04:25 Increasing security controls for cloud migration07:51 Discussion about customer feedback and cloud migration.12:17 Encouraging commercial solutions into federal government securely.15:39 Artificial intelligence shaping policy for future technology.16:54 AI EO covers critical infrastructure, AI, data, immigration.22:34 Guidance on AI impact assessment and testing.27:02 AI tools adoption must not be delayed.30:03 Ensure AI technologies have fail-safe mechanisms.32:08 Concern over rapid pace of technological advances.34:29 AI and technology advancing, policy aims control.39:37 Fascinating book on technology and chip history.The Future of Government Technology: Shifting to FedRAMP High and Accelerating Cloud AdoptionShift from FedRAMP Moderate to High for Sensitive WorkloadsWhen FedRAMP was established over a decade ago, the focus was on managing the accreditation of emerging cloud infrastructure providers to support the initial migration of workloads. The baseline standard was FedRAMP Moderate, which addressed a "good amount" of security controls for less risky systems. However, Ross explains that increasing volumes of more sensitive workloads have moved to the cloud over time - including mission-critical systems and personal data. Consequently, agencies want to step up from moderate to the more stringent requirements of FedRAMP High to protect higher-risk systems. This includes only allowing High-cloud services to interact with other High-cloud applications.The Evolution of Cloud Computing: "So right now, we're at the point where people are existing in thin clients that have access to targeted applications, but the back end compute power is kept somewhere else. It's just a completely different world that we're in architecturally." — Ross NodurftThe Future of Government Technology: Streamlining FedRAMP for the SaaS-Powered EnterpriseAccording to Ross, the COVID-19 pandemic massively accelerated enterprise cloud adoption and consumption of SaaS applications. With the abrupt shift to remote work, organizations rapidly deployed commercial solutions to meet new demands. In the federal government, this hastened the transition from earlier focus on cloud platforms to widespread use of SaaS. Ross argues that FedRAMP has not evolved at pace to address the volume and type of SaaS solutions now prevalent across agencies. There is a need to streamline authorization pathways attuned to this expanding ecosystem of applications relying on standardized baseline security controls.High-level Security Controls for Sensitive Data in the CloudAddressing Data Related to Students and ConstituentsRoss states that as agencies move more sensitive workloads to the cloud, they are stepping up security controls from FedRAMP Moderate to FedRAMP High. Sensitive data includes things like personal HR data or data that could impact markets, as with some of the work USDA does. Willie gives the example of the Department of Education or Federal Student Aid, which may have sensitive data on students that could warrant higher security controls when moved to the cloud.Ross confirms that is absolutely the case - the trend is for agencies to increase security as they shift more...
On Security Now, Steve Gibson and Leo Laporte discuss Downfall, a new Intel processor vulnerability that leaks sensitive data between users on shared systems by exploiting speculative execution. For the full episode, go to: https://twit.tv/sn/948 Hosts: Steve Gibson and Leo Laporte You can find more about TWiT and subscribe to our podcasts at https://podcasts.twit.tv/ Sponsor: GO.ACILEARNING.COM/TWIT
On Security Now, Steve Gibson and Leo Laporte discuss Downfall, a new Intel processor vulnerability that leaks sensitive data between users on shared systems by exploiting speculative execution. For the full episode, go to: https://twit.tv/sn/948 Hosts: Steve Gibson and Leo Laporte You can find more about TWiT and subscribe to our podcasts at https://podcasts.twit.tv/ Sponsor: GO.ACILEARNING.COM/TWIT
On Security Now, Steve Gibson and Leo Laporte discuss Downfall, a new Intel processor vulnerability that leaks sensitive data between users on shared systems by exploiting speculative execution. For the full episode, go to: https://twit.tv/sn/948 Hosts: Steve Gibson and Leo Laporte You can find more about TWiT and subscribe to our podcasts at https://podcasts.twit.tv/ Sponsor: GO.ACILEARNING.COM/TWIT
This week's guest is Steve Hickman, the founder of Epistimis, a privacy-first process design tooling startup that evaluate rules and enables the fixing of privacy issues before they ever take effect. In our conversation, we discuss: why the biggest impediment to protecting and respecting privacy within organizations is the lack of a common language; why we need a common Privacy Ontology in addition to a Privacy Taxonomy; Epistimis' ontological approach and how it leverages semantic modeling for privacy rules checking; and, examples of how Epistimis Privacy Design Process tooling complements privacy tech solutions on the market, not compete with them.Topics Covered:How Steve's deep engineering background in aerospace, retail, telecom, and then a short stint at Meta, led him to found Epistimis Why its been hard for companies to get privacy right at scaleHow Epistimis leverages 'semantic modeling' for rule checking and how this helps to scale privacy as part of an ontological approachThe definition of a Privacy Ontology and Steve's belief that all should use one for common understanding at all levels of the businessAdvice for designers, architects, and developers when it comes to creating and implementing privacy ontology, taxonomies & semantic modelsHow to make a Privacy Ontology usableHow Epistimis' process design tooling work with discovery and mapping platforms like BigID & Secuvy.aiHow Epistimis' process design tooling work along with a platform like Privado.ai, which scans a company's product code and then surfaces privacy risks in the code and detects processing activities for creating dynamic data mapsHow Epistimis' process design tooling works with PrivacyCode, which has a library of privacy objects, agile privacy implementations (e.g., success criteria & sample code), and delivers metrics on the privacy engineering process is goingSteve calls for collaborators who are interested in POCs and/or who can provide feedback on Epistimis' PbD processing toolingSteve describes what's next on the Epistimis roadmap, including wargamingResources Mentioned:Read Dan Solove's article, "Data is What Data Does: Regulating Based on Harm and Risk Instead of Sensitive Data"Guest Info:Connect with Steve on LinkedInReach out to Steve via EmailLearn more about Epistimis Privado.ai Privacy assurance at the speed of product development. Get instant visibility w/ privacy code scans.Shifting Privacy Left Media Where privacy engineers gather, share, & learnDisclaimer: This post contains affiliate links. If you make a purchase, I may receive a commission at no extra cost to you.Copyright © 2022 - 2024 Principled LLC. All rights reserved.
It's Labor Day 2023, and I promise I'm going to make this short and sweet, and this is going to be a technical one that I don't even talk about hardly at all, but I want you to know about it so it'll be really quick. It's on encrypted QR codes. Now, if you don't know what a QR code is, I highly suggest that you listen to episodes 241 and 780. Basically, I'll tell you in a minute what they are, but you need to listen to those back episodes and to see all the cool things you can do with QR codes. Screw The Commute Podcast Show Notes Episode 795 How To Automate Your Business - https://screwthecommute.com/automatefree/ Internet Marketing Training Center - https://imtcva.org/ Higher Education Webinar – https://screwthecommute.com/webinars See Tom's Stuff – https://linktr.ee/antionandassociates 00:23 Tom's introduction to Encrypted QR Codes 01:33 What encrypted QR codes are and do Entrepreneurial Resources Mentioned in This Podcast Higher Education Webinar - https://screwthecommute.com/webinars Screw The Commute - https://screwthecommute.com/ Screw The Commute Podcast App - https://screwthecommute.com/app/ College Ripoff Quiz - https://imtcva.org/quiz Know a young person for our Youth Episode Series? Send an email to Tom! - orders@antion.com Have a Roku box? Find Tom's Public Speaking Channel there! - https://channelstore.roku.com/details/267358/the-public-speaking-channel How To Automate Your Business - https://screwthecommute.com/automatefree/ Internet Marketing Retreat and Joint Venture Program - https://greatinternetmarketingtraining.com/ KickStartCart - http://www.kickstartcart.com/ Copywriting901 - https://copywriting901.com/ Become a Great Podcast Guest - https://screwthecommute.com/greatpodcastguest Training - https://screwthecommute.com/training Disabilities Page - https://imtcva.org/disabilities/ Tom's Patreon Page - https://screwthecommute.com/patreon/ Tom on TikTok - https://tiktok.com/@digitalmultimillionaire/ All About Encrypted QR Codes - https://scanova.io/blog/encrypted-qr-code/ Email Tom: Tom@ScrewTheCommute.com Internet Marketing Training Center - https://imtcva.org/ Related Episodes QR Codes - https://screwthecommute.com/241/ QR Codes Revisited - https://screwthecommute.com/780/ Dustin Perkins - https://screwthecommute.com/794/ More Entrepreneurial Resources for Home Based Business, Lifestyle Business, Passive Income, Professional Speaking and Online Business I discovered a great new headline / subject line / subheading generator that will actually analyze which headlines and subject lines are best for your market. I negotiated a deal with the developer of this revolutionary and inexpensive software. Oh, and it's good on Mac and PC. Go here: http://jvz1.com/c/41743/183906 The Wordpress Ecourse. Learn how to Make World Class Websites for $20 or less. https://screwthecommute.com/wordpressecourse/ Join our Private Facebook Group! One week trial for only a buck and then $37 a month, or save a ton with one payment of $297 for a year. Click the image to see all the details and sign up or go to https://www.greatinternetmarketing.com/screwthecommute/ After you sign up, check your email for instructions on getting in the group.
"Security is all about the protection of your data. While privacy is determining how your data is being used."On this episode of The Tea on Cybersecurity, join host Jara Rowe as she delves into the world of privacy and security certificates with expert guest @Marie Joseph, Senior Security Solutions Engineer at Trava.Protecting sensitive data has become more important than ever. But with the vast array of privacy and security certifications available, it can be challenging to know where to start.Marie helps us understand the different certifications and their importance. In this episode we discuss the most common privacy and security certifications, such as GDPR, CCPA, and SOC 2. We explore the benefits of obtaining these certifications, the challenges organizations may face during the process, and how to verify if a company has a privacy or security certificate. Discover the differences between various certifications and gain valuable insights on how to navigate the world of cybersecurity certificates. What you'll learn in this episode:Understand the main differences between privacy and security certifications, and the benefits they offerThe challenges that organizations face when implementing cybersecurity and privacy measures and the importance of patience in the process. The potential benefits of partnering with a cybersecurity expert.Things to listen for:[5:54] Various frameworks create cybersecurity best practice lists.[8:12] Focus on one, readiness, audit, and certificate renewal.[9:50] Understanding the costly process.[13:28] Be patient, take simple steps, and ensure feasibility.[16:37] Patience is key. Privacy and security certificates.Connect with the Guest:Marie Joseph's LinkedInConnect with the host:Jara Rowe's LinkedInConnect with Trava:Website www.travasecurity.com Blog www.travasecurity.com/blogLinkedIn @travasecurityYouTube @travasecurityGuest InformationName: Marie Joseph Title: Senior Security Solutions Engineer at TravaBio: Marie Joseph is an Indiana University alumna. While studying law and public policy, she studied abroad in the UK and learned from government agencies about US and National Security—sparking her interest in cybersecurity. Marie then headed back to IU for a master's degree in cybersecurity. Marie now helps Trava customers begin and/or mature their security and compliance programs as a Sr. Security Solutions Engineer.Social: https://www.linkedin.com/in/marie-joseph-a81394143/
PEBCAK Podcast: Information Security News by Some All Around Good People
Welcome to this week's episode of the PEBCAK Podcast! We've got four amazing stories this week so sit back, relax, and keep being awesome! Be sure to stick around for our Dad Joke of the Week. (DJOW) Follow us on Instagram @pebcakpodcast PEBCAK - Acronym of “problem exists between chair and keyboard.” Find us on our newly launched YouTube channel: https://www.youtube.com/@pebcakpodcast Follow me on Mastodon: https://infosec.exchange/@Clouie Laws on price mistakes https://www.wisebread.com/my-purchase-rang-up-wrong-could-the-law-be-on-my-side Ransomware gangs dump sensitive data on leak sites https://apnews.com/article/schools-ransomware-data-breach-40ebeda010158f04a1ef14607bfed9b0 https://twitter.com/vxunderground/status/1680362910936096769?s=20 https://www.bleepingcomputer.com/news/security/ransomware-gang-posts-video-of-data-stolen-from-minneapolis-schools/ https://www.msn.com/en-us/news/crime/franklin-pizza-shop-worker-finds-phone-filled-with-videos-of-unconscious-children-leading-to-man-s-arrest/ar-AA1dH4MH Microsoft loses private key, US State Department hacked https://therecord.media/microsoft-changes-signing-key-system https://www.microsoft.com/en-us/security/blog/2023/07/14/analysis-of-storm-0558-techniques-for-unauthorized-email-access/ Code signing dates matter https://arstechnica.com/security/2023/07/hackers-exploit-gaping-windows-loophole-to-give-their-malware-kernel-access/ https://www.howtogeek.com/667054/the-best-retro-easter-eggs-in-windows-and-microsoft-office/ https://www.tomshardware.com/news/security-researcher-finds-coldplay-lyrics-in-kingston-ssd-firmware Amazon Prime Day 2023 https://www.nbcnews.com/select/shopping/amazon-prime-day-history-ncna1269819 Dad Joke of the Week (DJOW) Please share this podcast with someone you know! It helps us grow the podcast and we really appreciate it! Find the hosts on LinkedIn: Chris - https://www.linkedin.com/in/chlouie/ Brian - https://www.linkedin.com/in/briandeitch-sase/ Glenn - https://www.linkedin.com/in/glennmedina/
A report by seven US lawmakers reveals that US tax preparation firms, including TaxAct, TaxSlayer, and H&R Block, have been sharing sensitive taxpayer data with tech giants Google and Meta. The companies allegedly used Meta Pixel and Google's ad tools to share personal and financial information. Google and Meta blamed misconfigurations in their data-gathering tools … Continue reading Tax Firms Accused of Sharing Sensitive Data with Google, Meta #1680 → The post Tax Firms Accused of Sharing Sensitive Data with Google, Meta #1680 appeared first on Geek News Central.
Apple Announces Ambitious Augmented Reality Asset. Savvy Software Makes iPhones Into Smart Screens. Dallas Airport Debuts Dashing Drive of 'ZiGGY' EV Charging Chariot. Vying for Victory in Virtual Grand Prix to Help Create F1 Drivers of Tomorrow. Automated Summaries From Your Next Zoom Meeting. Bold Braking Blueprint Beckons for Better Safety. The Hidden Hazard in the Destructive Disposal of Drives. Captivating Koala Count in Coolah Tops Concludes With 42 Koalas. Breakthrough in Bitty Biomagnetic Technology.
Yasir Ali, a cloud security expert and CEO Polymer-Data Governance & Security with No Code DLP, joined the podcast to discuss how organizations can better protect sensitive data in the cloud. He spoke about the challenges of collaboration when working with cloud applications, how a lack of data security protocols can lead to a breach and the importance of having proper risk mitigation strategies. Yasir spoke about a no-code data loss prevention solution that helps organizations automatically monitor and detect sensitive files, as well as create policies around what is considered to be sensitive. He also discussed their hosted solution for free users, their business model and pricing, and his experience on Wall Street. In addition to discussing how Polymer works to protect data, he also touched on risk mitigation strategies for data loss prevention software, the importance of resiliency in managing cyber security risks, and his vision for taking Polymer public within five years. Listen to this episode of 21st Century Entrepreneurship with Yasir Ali to learn more about data loss prevention solutions, risk mitigation strategies, and what it takes to build a successful cloud security product. Don't miss out!
Most websites have code running in the background to help the site run better and, of course, to target advertising. A recent investigation from “The Markup” found many tax-filing sites were sharing users’ financial data with Facebook using a code called Meta Pixel. Marketplace’s Kimberly Adams speaks to Simon Fondrie-Teitler, an infrastructure engineer at The Markup and co-author of this investigation.
Most websites have code running in the background to help the site run better and, of course, to target advertising. A recent investigation from “The Markup” found many tax-filing sites were sharing users’ financial data with Facebook using a code called Meta Pixel. Marketplace’s Kimberly Adams speaks to Simon Fondrie-Teitler, an infrastructure engineer at The Markup and co-author of this investigation.
Dave Asprey partners with Nillion as an advisor and investor.IN THIS EPISODE OF THE HUMAN UPGRADE™...… you'll learn about the frontier of web3 and privacy and what happens to your private data (both on blockchains and in general). You'll also find out how and why the future moves away from transactions (blockchain) and into computations (multi-party computation). Think about where you store not only your identity, but also your deepest digital secrets. The current solutions aren't great — in web2, the Big Tech ‘old guard' quietly storing and monetizing your data for over a decade and in web3, blockchains aren't designed to handle private data. A new algorithm, Nillion, inspired Conrad Whelan (the Founding Engineer of Uber) to come out of early retirement and do something about this. This conversation dives into the data you unassumingly give away freely, and how it's captured, held and used/computed on without your consent by companies and other parties. Conrad believes in a future where your sensitive data and digital secrets can be controlled by you (and you alone) using web3 technology. This means you'd be the final gatekeeper of your data with the power to authenticate, authorize and use it as you see fit.Conrad's building that future as Nillion's Founding Chief Technology Officer.“There's definitely a certain level of privacy that is incredibly important,” Conrad says. “It is a human right. Especially in this day and age. With the tech companies out there and the advertising driven world that we have. That data clearly has value. The other side of it is I think people deserve their privacy. But I also think getting some of that value back is part of the important evolution that's going on here.”Conrad's background includes electrical and computer engineering. He worked in the fields of computational electromagnetics before joining Uber as Founding Engineer. He's developed, tested, deployed and architected software projects at all levels of the software stack as both an engineer and an engineering manager.in 2016, he retired to focus his efforts on philanthropy and personal passion projects while keeping an eye on the tech world. The promise and potential global impact of Nillion enticed him out of retirement and into the company's CTO role. What Conrad is building at Nillion aims to:render both computational encryption and centralized storage of private data obsolete;fundamentally change the way private data is stored and processed;offer alternative non-blockchain ways of using decentralized nodes;serve as a ‘Meta Layer' that provides new and additional functionality to existing blockchains; andenable a host of new real-world applications on its native public network (the Nillion Network).Whatever your level of tech understanding, this discussion offers critical insights about the next big move in decentralized computing and data privacy.See Privacy Policy at https://art19.com/privacy and California Privacy Notice at https://art19.com/privacy#do-not-sell-my-info.