Podcast appearances and mentions of Tarah Wheeler

American cybersecurity executive and diversity activist

  • 25PODCASTS
  • 29EPISODES
  • 44mAVG DURATION
  • ?INFREQUENT EPISODES
  • Apr 22, 2025LATEST
Tarah Wheeler

POPULARITY

20172018201920202021202220232024


Best podcasts about Tarah Wheeler

Latest podcast episodes about Tarah Wheeler

What the Hack with Adam Levin
Episode 179: Tarah Wheeler and Deviant Ollam Reveal Security's Weakest Link

What the Hack with Adam Levin

Play Episode Listen Later Dec 10, 2024 37:39


Tarah Wheeler lost her security badge. Deviant Ollam picked his way into "secure" spaces. Together, they show how humans make or break security and why layering defenses is key to surviving inevitable mistakes. What happens when security fails because of us? Two experts dive into the blind spots in physical, digital, and human security—and why fixing them starts with being honest about our mistakes. Learn more about your ad choices. Visit megaphone.fm/adchoices

security reveal deviants weakest link deviant ollam tarah wheeler
Cybersecurity Where You Are
Episode 96: Making Continuous Compliance Actionable for SMBs

Cybersecurity Where You Are

Play Episode Listen Later Aug 14, 2024 43:09


In episode 96 of Cybersecurity Where You Are, co-hosts Sean Atkinson and Tony Sager are joined by Tarah Wheeler, CEO of Red Queen Dynamics.Together, they discuss ongoing efforts to translate continuous compliance into something actionable for small- to medium-sized businesses (SMBs).Here are some highlights from our episode:03:11. The philosophy behind a business model focused on continuous compliance for SMBs17:44. How the Fog of More complicates security and compliance for the "cyber-underserved"30:56. How the industry can navigate the multiple-framework issue and streamline complianceResourcesFollow Tarah on LinkedInEpisode 95: AI Augmentation and Its Impact on Cyber DefenseImplementation Guide for Small- and Medium-Sized Enterprises CIS Controls IG1Build a Robust Continuous Audit Program in 10 StepsHow Prioritized Security Controls Break Through the Fog of MoreIf you have some feedback or an idea for an upcoming episode of Cybersecurity Where You Are, let us know by emailing podcast@cisecurity.org.

What the Hack with Adam Levin
Episode 142: Tarah Wheeler Narrowly Avoids Getting Got

What the Hack with Adam Levin

Play Episode Listen Later Apr 2, 2024 48:13


No one is immune from being scammed. Just ask Tarah Wheeler, founder and CEO of Red Queen Dynamics, a company that specializes in keeping people scam-free. While onboarding a new hire, a process she put in place stopped a scammer despite a serious cyber misstep.  “What the Hack with Adam Levin” is available wherever you get your podcasts. If you like it, consider rating us on your favorite podcast service or writing a review. It really helps people find the show. Learn more about your ad choices. Visit megaphone.fm/adchoices

Unspoken Security
How the Hell Are Small Businesses Supposed to Be Cyber-Compliant?

Unspoken Security

Play Episode Listen Later Jan 8, 2024 54:45


In this episode of Unspoken Security (sponsored by ZeroFox), AJ Nash (VP & Distinguished Fellow of Intelligence, ZeroFox) is joined by Tarah Wheeler, who is not only the CEO at Red Queen Dynamics, but also a Senior Fellow for Global Cyber Policy at the Council on Foreign Relations and Advisory Board Member for the Electronic Frontier Foundation (EFF).Tarah and AJ discuss some of the ongoing challenges facing small businesses as they attempt to defend themselves and their customers against cyber threats. Of particular interest in this conversation, Tarah has some passionate thoughts about a new Federal Trade Commission (FTC) regulation regarding breach reporting that is set to go into effect in May 2024. You're definitely going to want to hear what she has to say on this!(Spoiler Alert: Things are about to get a lot harder for small businesses!)Lastly, as with all episodes of Unspoken Security, AJ asks his guests to reveal something they had never talked about before (something "unspoken"). Tarah struggled with this one a bit (partially because she already shared a great secret earlier in the show) before giving a very cool answer that led to AJ and Tarah planning a road trip together.What a way to finish the show!

Town Hall Seattle Civics Series
329. Jennifer Pahlka with Tarah Wheeler: Outdated Policymaking in the Digital Age

Town Hall Seattle Civics Series

Play Episode Listen Later Sep 18, 2023 69:18


These days, it feels like customer service has been nearly all digitized. While confusion over ticket orders and lost packages can be frustrating, one space where it feels necessary for technology to hit the mark is health and wellness care. While online services and rapidly evolving technology should be making this process more fluid, moments like the crash of Healthcare.gov in 2013, as well as the shaky and muddled attempt for online services to provide benefits during COVID, call the effectiveness of this technology into question. But what is the reason for such outdated and inefficient systems when it comes to providing vital aid for people? Former deputy chief technology officer, Jennifer Pahlka, responds to this query in her new book Re-coding America: Why Government Is Failing in the Digital Age and How We Can Do Better. Pahlka argues that the government is stuck in an industrial-era culture, in which lofty goals set by the elite will often take years to be fully set in place. As time passes, the technology that these policies plan to implement is shockingly out of date. Pahlka makes the case that we must stop trying to move government onto new technology, but instead offer alternative methods to relying on outdated infrastructures. Join Jennifer Pahlka at Town Hall as she considers what it would mean to truly “recode” American government. Jennifer Pahlka is the former deputy chief technology officer of the United States and the founder of Code for America, a nonprofit that believes government can work for people in the digital age. Pahlka is the winner of a Skoll Award for Social Entrepreneurship, among others, and has been selected by Wired magazine as one of the people who have most shaped technology and society in the past twenty-five years. Tarah Wheeler is senior fellow for global cyber policy at the Council on Foreign Relations (CFR). She is also an information security executive, social scientist in the area of international conflict, and author of the best-selling book Women In Tech: Take Your Career to The Next Level With Practical Advice And Inspiring Stories. Recoding America: Why Government Is Failing in the Digital Age and How We Can Do Better Third Place Books

What the Hack with Adam Levin
Episode 63: Freewheeling with Cyber Red Queen Tarah Wheeler

What the Hack with Adam Levin

Play Episode Listen Later Sep 19, 2022 47:24


Red Queen Dynamics founder Tarah Wheeler knows a thing or two about smashing norms in the cybersecurity industry. But as a human being, she also has some experience being compromised. You'll definitely want to tune in as she tells us about her own goal as a cybersecurity executive, and how she practices cybersecurity in her own life.  Learn more about your ad choices. Visit megaphone.fm/adchoices

How to Fix the Internet
Pay a Hacker, Save a Life

How to Fix the Internet

Play Episode Listen Later Dec 7, 2021 28:22


Join us for a live chat as hosts Cindy and Danny speak with cybersecurity expert Tarah Wheeler on Thursday Dec 9th at 2pm PT. They will continue the conversation that started on this episode of the podcast, exploring how we can incentivize computer security and fix computer crime laws: https://www.eff.org/tarahchat======================There are flaws in the tech we use everyday- from little software glitches to big data breaches, and security researchers often know about them before we do. Getting those issues fixed is not always as straightforward as it should be. It's not always easy to bend a corporation's ear, and companies may ignore the threat for liability reasons putting us all at risk. Technology and cybersecurity expert Tarah Wheeler joins Cindy Cohn and Danny O'Brien to explain how she thinks security experts can help build a more secure internet. On this episode, you'll learn:About the human impact of security vulnerabilities—and how unpatched flaws can change or even end lives;How to reconsider the popular conception of hackers, and understand their role in helping build a more secure digital world;How the Computer Fraud and Abuse Act (CFAA), a law that is supposed to punish computer intrusion, has been written so broadly that it now stifles security researchers;What we can learn from the culture around airplane safety regulation—including transparency and blameless post-mortems;How we can align incentives, including financial incentives, to improve vulnerability reporting and response;How the Supreme Court case Van Buren helped security researchers by ensuring that the CFAA couldn't be used to prosecute someone for merely violating the terms of service of a website or application;How a better future would involve more collaboration and transparency among both companies and security researchers.This podcast is supported by the Alfred P. Sloan Foundation's Program in Public Understanding of Science and Technology.Resources: ResourcesConsumer Data Privacy:Equifax Data Breach Update: Backsliding (EFF)EFF's Recommendations for Consumer Data Privacy Laws (EFF)Strengthen California's Next Consumer Data Privacy Initiative (EFF)Ransomware:A Hospital Hit by Hackers, a Baby in Distress: The Case of the First Alleged Ransomware Death (WSJ)FAQ: DarkSide Ransomware Group and Colonial Pipeline (EFF)Computer Fraud and Abuse Act (CFAA):CFAA and Security Researchers (EFF)Van Buren is a Victory Against Overbroad Interpretations of the CFAA, and Protects Security Researchers (EFF)Van Buren v. United States (SCOTUS)EFF CFAA Revisions – Penalties and Access (EFF)Computer Fraud and Abuse Act and Reform (EFF)Electoral Security:Election Security (EFF)This work is licensed under a Creative Commons Attribution 4.0 International License. Additional music is used under creative commons licence from CCMixter includes: http://dig.ccmixter.org/files/admiralbob77/59533Warm Vacuum Tube  by Admiral Bob (c) copyright 2019 Licensed under a Creative Commons Attribution (3.0) license. http://dig.ccmixter.org/files/admiralbob77/59533 Ft: starfroschhttp://dig.ccmixter.org/files/snowflake/59564rr4Come Inside by Snowflake (c) copyright 2019 Licensed under a Creative Commons Attribution (3.0) license. http://dig.ccmixter.org/files/snowflake/59564 Ft: Starfrosch, Jerry Spoon, Kara Square, spinningmerkabahttp://dig.ccmixter.org/files/djlang59/37792Drops of H2O ( The Filtered Water Treatment ) by J.Lang (c) copyright 2012 Licensed under a Creative Commons Attribution (3.0) license. http://dig.ccmixter.org/files/djlang59/37792 Ft: Airtonehttp://dig.ccmixter.org/files/airtone/59721reCreation by airtone (c) copyright 2019 Licensed under a Creative Commons Attribution (3.0) license. http://dig.ccmixter.org/files/airtone/59721

Berlin Security Beat
Episode 08: “Cyber (In-)Security”

Berlin Security Beat

Play Episode Listen Later Jun 29, 2021 22:15


Tarah Wheeler, a Cyber Project Fellow at the Belfer Center for Science and International Affairs at Harvard University's Kennedy School of Government, and an expert on information security and international conflict, joins Dr. Katharina Emschermann, Deputy Director at the Centre for International Security, to talk about cyber security. They discuss: • the difference between cyber espionage and cyber war, • whether deterrence can work in cyberspace, • what the cyber future of warfare will look like, • and what that entails for military planning and procurement.

Narativ Live with Zev Shalev (Audio)
Cyber Threat Assessment with Tarah Wheeler Part 2

Narativ Live with Zev Shalev (Audio)

Play Episode Listen Later May 31, 2021 31:49


In Part 2 of our conversations with cyber warfare expert Tarah Wheeler, Zev Shalev and Noel Casler discuss the antidote to disinformation and the steps you can take to keep your family and home safe. Learn more about your ad choices. Visit megaphone.fm/adchoices

Narativ Live with Zev Shalev
Cyber Threat Assessment with Tarah Wheeler Part 1

Narativ Live with Zev Shalev

Play Episode Listen Later May 31, 2021 38:06


Lately it seems a week doesn't go by without some sort of significant cyber attack on US federal infrastructure. Zev Shalev and Noel Casler are joined by Tarah Wheeler, a cyber warfare expert to break down the severity of the recent attacks and Andrew Laufer to discuss the empaneling of a grand jury in the case against Trump Org.

Narativ Live with Zev Shalev
Cyber Threat Assessment with Tarah Wheeler Part 2

Narativ Live with Zev Shalev

Play Episode Listen Later May 31, 2021 34:30


In Part 2 of our conversations with cyber warfare expert Tarah Wheeler, Zev Shalev and Noel Casler discuss the antidote to disinformation and the steps you can take to keep your family and home safe.

Narativ Live with Zev Shalev (Audio)
Cyber Threat Assessment with Tarah Wheeler Part 1

Narativ Live with Zev Shalev (Audio)

Play Episode Listen Later May 31, 2021 38:06


Lately it seems a week doesn't go by without some sort of significant cyber attack on US federal infrastructure. Zev Shalev and Noel Casler are joined by Tarah Wheeler, a cyber warfare expert to break down the severity of the recent attacks and Andrew Laufer to discuss the empaneling of a grand jury in the case against Trump Org. Learn more about your ad choices. Visit megaphone.fm/adchoices

Gresham College Lectures
Cyber War Crimes

Gresham College Lectures

Play Episode Listen Later Mar 30, 2021 46:00


Cyberwar is not waged on physical battlefields following rules of engagement. Aggressors worry less about collateral damage, in part because they aren't forced to confront the sight of an enemy bleeding to death before their eyes. Instead, their victim might be someone with a pacemaker 3000 miles away. We have no words yet for this kind of crime, but there is no doubt that the moment someone targets civilians, whether with a cyberweapon or surface to air missiles, they become a war criminal.In partnership with the Fulbright Commission A lecture by Tarah Wheeler 30 MarchThe transcript and downloadable versions of the lecture are available from the Gresham College website: https://www.gresham.ac.uk/lectures-and-events/cyberwar-crimesGresham College has been giving free public lectures since 1597. This tradition continues today with all of our five or so public lectures a week being made available for free download from our website. There are currently over 2,000 lectures free to access or download from the website.Website: http://www.gresham.ac.uk Twitter: http://twitter.com/GreshamCollege Facebook: https://www.facebook.com/greshamcollege Instagram: http://www.instagram.com/greshamcollege

MalwareTech Podcast
SolarWinds Hack, DoorDash IPO, Robinhood Sued (Christmas Special)

MalwareTech Podcast

Play Episode Listen Later Dec 24, 2020 57:23


Featuring: Dr Tran, Tarah Wheeler, Deviant Ollam

Berkman Klein Center for Internet and Society: Audio Fishbowl
Covid State of Play: Building a Public Sector Health Intelligence Capability

Berkman Klein Center for Internet and Society: Audio Fishbowl

Play Episode Listen Later Dec 18, 2020 62:09


Tracking the spread of COVID-19 has proved critical to efforts to contain the virus, but to do so, public health officials need to collect and utilize large amounts of data. Tarah Wheeler, Cyber Project Fellow at the Belfer Center for Science and International Affairs at Harvard University‘s Kennedy School of Government, joins Dr. Margaret Bourdeaux and Professor Jonathan Zittrain, co-chairs of the Berkman Klein Center’s Digital Pandemic Response Working Group, to investigate how the United States Public Health System can do this differently and responsibly.

The Current
How did the US government get hacked?

The Current

Play Episode Listen Later Dec 16, 2020 12:53


Hackers gained access to U.S. government systems in a months-long act of cyberespionage. While the full extent of the security breach is still being determined, Tarah Wheeler explains the third-party software vulnerability that enabled the hack, and what the incoming Biden administration's priorities should be to meet a higher bar for U.S. cybersecurity. Show notes and transcript: https://brook.gs/2WsRJrT  Subscribe to Brookings podcasts on Apple or Google podcasts, or on Spotify. Send feedback email to BCP@Brookings.edu, and follow us and tweet us at @policypodcasts on Twitter. The Current is part of the Brookings Podcast Network.

Down the Security Rabbithole Podcast
DtSR Episode 422 - TPA Blurry Ethical Lines

Down the Security Rabbithole Podcast

Play Episode Listen Later Nov 23, 2020 43:11


Prologue: This week is a TREAT for you Down the Security Rabbithole Podcast listeners. Before she does her keynote on the topic, you'll get to hear Tarah Wheeler's take on the graying lines of privacy, security, and ethics. Just because we can ... does that mean we should? Lots of interesting discussions, and some totally nerdy and pedantic references you'll want to listen to a few times. Week 3 of OpenText's Enfuse Conference 2020 is kicking off with Tarah's keynote, and if you haven't checked in, or signed on, maybe this will convince you! Give her keynote a listen... Guest Tarah Wheeler LinkedIn: https://www.linkedin.com/in/tarah/ Twitter: https://twitter.com/tarah

Caveat
If there's cyberwar, are there cyber war crimes?

Caveat

Play Episode Listen Later May 6, 2020 38:49


Dave has the story of a US appeals court asking why a Facebook encryption order should remain sealed, Ben takes a look at the effects of GDPR, and later in the show our conversation with Tarah Wheeler, she is a Cybersecurity Policy Fellow at New America, we spoke about why the world desperately needs digital a Geneva Convention. While this show covers legal topics, and Ben is a lawyer, the views expressed do not constitute legal advice. For official legal advice on any of the topics we cover, please contact your attorney. Links to stories: U.S. appeals court asks why Facebook encryption order should stay sealed Europe’s Privacy Law Hasn’t Shown Its Teeth, Frustrating Advocates Got a question you'd like us to answer on our show? You can send your audio file to caveat@thecyberwire.com or simply leave us a message at (410) 618-3720. Hope to hear from you.  Thanks to our sponsor, KnowBe4.

Ruby Rogues
RR 370: How I Built Timeasure with Eliav Lavi

Ruby Rogues

Play Episode Listen Later Jul 10, 2018 48:20


Panel: David Richards Dave Kimura Eric Berry Catherine Meyers Special Guests: Eliav Lavi In this episode of Ruby Rogues, the panel talks to Eliav Lavi about his article How I Built Timeasure. Eliav works for Riskified where he is a back-end developer working with Ruby mostly and recently some Scala. In the past, he studied music but  had always been into technology from a young age. They talk about how got to where he is today, what the developer scene is like in Israel, and Timeasure. They talk about what this gem is, why they decided to create it, and more! In particular, we dive pretty deep on: Eliav intro Studied music originally Risk analyst at Riskified Company started on Ruby on Rails Been a professional developer for the last year and a half Self-taught programmer Used blogs and books to learn How welcoming and helpful the Ruby community is What’s the developer scene like in Israel? Rails and JavaScript jobs common in Israel English as the common denominator for code What is Timeasure? Needed a way to measure the run-time of code Safe to use in production Easy DSL Did you look at other gems first before creating this? Used NewRelic originally How is the data stored? What to do with all the collected measurements? NewRelic Insights Ruby Prof And much, much more! Links: How I Built Timeasure Riskified Ruby Scala Ruby on Rails Timeasure NewRelic NewRelic Insights Ruby Prof Eliav’s Medium Eliav’s GitHub @eliavlavi Riskified’s GitHub Sponsors Sentry Digital Ocean FreshBooks Picks: David Make Your Life a Story Worth Reading by Jake Wilder Dave Sun Catchers Eric Golf Catherine Women in Tech: Take Your Career to the Next Level by Tarah Wheeler Eliav Andy Warhol Museum

All Ruby Podcasts by Devchat.tv
RR 370: How I Built Timeasure with Eliav Lavi

All Ruby Podcasts by Devchat.tv

Play Episode Listen Later Jul 10, 2018 48:20


Panel: David Richards Dave Kimura Eric Berry Catherine Meyers Special Guests: Eliav Lavi In this episode of Ruby Rogues, the panel talks to Eliav Lavi about his article How I Built Timeasure. Eliav works for Riskified where he is a back-end developer working with Ruby mostly and recently some Scala. In the past, he studied music but  had always been into technology from a young age. They talk about how got to where he is today, what the developer scene is like in Israel, and Timeasure. They talk about what this gem is, why they decided to create it, and more! In particular, we dive pretty deep on: Eliav intro Studied music originally Risk analyst at Riskified Company started on Ruby on Rails Been a professional developer for the last year and a half Self-taught programmer Used blogs and books to learn How welcoming and helpful the Ruby community is What’s the developer scene like in Israel? Rails and JavaScript jobs common in Israel English as the common denominator for code What is Timeasure? Needed a way to measure the run-time of code Safe to use in production Easy DSL Did you look at other gems first before creating this? Used NewRelic originally How is the data stored? What to do with all the collected measurements? NewRelic Insights Ruby Prof And much, much more! Links: How I Built Timeasure Riskified Ruby Scala Ruby on Rails Timeasure NewRelic NewRelic Insights Ruby Prof Eliav’s Medium Eliav’s GitHub @eliavlavi Riskified’s GitHub Sponsors Sentry Digital Ocean FreshBooks Picks: David Make Your Life a Story Worth Reading by Jake Wilder Dave Sun Catchers Eric Golf Catherine Women in Tech: Take Your Career to the Next Level by Tarah Wheeler Eliav Andy Warhol Museum

Devchat.tv Master Feed
RR 370: How I Built Timeasure with Eliav Lavi

Devchat.tv Master Feed

Play Episode Listen Later Jul 10, 2018 48:20


Panel: David Richards Dave Kimura Eric Berry Catherine Meyers Special Guests: Eliav Lavi In this episode of Ruby Rogues, the panel talks to Eliav Lavi about his article How I Built Timeasure. Eliav works for Riskified where he is a back-end developer working with Ruby mostly and recently some Scala. In the past, he studied music but  had always been into technology from a young age. They talk about how got to where he is today, what the developer scene is like in Israel, and Timeasure. They talk about what this gem is, why they decided to create it, and more! In particular, we dive pretty deep on: Eliav intro Studied music originally Risk analyst at Riskified Company started on Ruby on Rails Been a professional developer for the last year and a half Self-taught programmer Used blogs and books to learn How welcoming and helpful the Ruby community is What’s the developer scene like in Israel? Rails and JavaScript jobs common in Israel English as the common denominator for code What is Timeasure? Needed a way to measure the run-time of code Safe to use in production Easy DSL Did you look at other gems first before creating this? Used NewRelic originally How is the data stored? What to do with all the collected measurements? NewRelic Insights Ruby Prof And much, much more! Links: How I Built Timeasure Riskified Ruby Scala Ruby on Rails Timeasure NewRelic NewRelic Insights Ruby Prof Eliav’s Medium Eliav’s GitHub @eliavlavi Riskified’s GitHub Sponsors Sentry Digital Ocean FreshBooks Picks: David Make Your Life a Story Worth Reading by Jake Wilder Dave Sun Catchers Eric Golf Catherine Women in Tech: Take Your Career to the Next Level by Tarah Wheeler Eliav Andy Warhol Museum

The Women in Tech Show: A Technical Podcast
Cybersecurity with Tarah Wheeler

The Women in Tech Show: A Technical Podcast

Play Episode Listen Later Dec 5, 2017


In 2017, sensitive information from 140 million consumers in the United States was stolen as part of the Equifax data breach. We see this happen in different companies for example Yahoo and most recently Uber. Tarah Wheeler, Cybersecurity fellow at New America explains what the Equifax breach was, its impact, and why the breach wasn't handled correctly. Tarah explained how to set up an effective incident response and incident detection system. We also talked about incident response teams and what they're in charge of.

Women in Business & Technology
005 - Live from Microsoft Ignite!

Women in Business & Technology

Play Episode Listen Later Sep 27, 2017 36:11


In this episode, we are live from Microsoft Ignite, where we joined more than 20,000 IT professionals in Orlando, Florida. In an interview with Information Security professional and author Tarah Wheeler, she gives us insight into her book, Women in Tech, and teases a few upcoming projects. We also get to hear from the force behind the Women in Business & Technology track at Microsoft Ignite, Dawn Conner. We wrap up the show with a discussion on the cultural sensitivity around name pronunciation. Please subscribe, rate, and share this episode. Send any and all feedback to WIBT@microsoft.com, or tweet @MicrosoftWomen.

Paul's Security Weekly TV
Tara Wheeler, Symantec - Startup Security Weekly #51

Paul's Security Weekly TV

Play Episode Listen Later Aug 23, 2017 36:32


Tarah Wheeler, entrepreneur and hacker extraordinaire, joins us to discuss her startup journey, some of the issues facing the security industry, and more! Full Show Notes: https://wiki.securityweekly.com/SSWEpisode51 Visit http://securityweekly.com/category/ssw/ for all the latest episodes!

entrepreneur wheeler symantec tarah wheeler startup security weekly sswepisode51 visit
Paul's Security Weekly
Startup Security Weekly #51 - Whiskey For Gold Diggers

Paul's Security Weekly

Play Episode Listen Later Aug 21, 2017 72:45


Tarah Wheeler joins us. In the news, how much your startup needs to raise, 6 steps to surviving 3 years, documenting failures, and more on this episode of Startup Security Weekly! Full Show Notes: https://wiki.securityweekly.com/SSWEpisode51 Visit https://www.securityweekly.com for all the latest episodes!

Business Security Weekly (Audio)
Startup Security Weekly #51 - Whiskey For Gold Diggers

Business Security Weekly (Audio)

Play Episode Listen Later Aug 21, 2017 72:45


Tarah Wheeler joins us. In the news, how much your startup needs to raise, 6 steps to surviving 3 years, documenting failures, and more on this episode of Startup Security Weekly! Full Show Notes: https://wiki.securityweekly.com/SSWEpisode51 Visit https://www.securityweekly.com for all the latest episodes!

Business Security Weekly (Video)
Tara Wheeler, Symantec - Startup Security Weekly #51

Business Security Weekly (Video)

Play Episode Listen Later Aug 21, 2017 36:32


Tarah Wheeler, entrepreneur and hacker extraordinaire, joins us to discuss her startup journey, some of the issues facing the security industry, and more! Full Show Notes: https://wiki.securityweekly.com/SSWEpisode51 Visit http://securityweekly.com/category/ssw/ for all the latest episodes!

entrepreneur wheeler symantec tarah wheeler startup security weekly sswepisode51 visit
Bitch Team Alpha
Ladies of Industry 012: Tarah Wheeler Van Vlack

Bitch Team Alpha

Play Episode Listen Later Feb 8, 2015 41:57


Listen in as Tarah and I chat about her kickstarter for an amazing new book called Women in Tech: The Book, as well as her history in the tech industry and advice she has for women seeking to do the same. Also, some nerdy Star Trek and smutty book talk.