Podcasts about tech security

  • 49PODCASTS
  • 66EPISODES
  • 31mAVG DURATION
  • 1MONTHLY NEW EPISODE
  • Mar 30, 2025LATEST

POPULARITY

20172018201920202021202220232024


Best podcasts about tech security

Latest podcast episodes about tech security

Sales vs. Marketing
Lessons - Fixing Human Error in Cybersecurity | Theresa Payton - Former White House CIO

Sales vs. Marketing

Play Episode Listen Later Mar 30, 2025 11:29


➡️ Like The Podcast? Leave A Rating: https://ratethispodcast.com/successstory  In this "Lessons" episode, Theresa Payton, former White House CIO, shares how predictable human behavior creates vulnerabilities in cybersecurity and why conventional defenses often fall short. Learn why routine security measures are exploited by sophisticated social engineering and how designing innovative, personalized protocols can disrupt attackers and strengthen digital defenses. ➡️ Show Linkshttps://successstorypodcast.com  YouTube: https://youtu.be/bH8DwhGUg0cApple: https://podcasts.apple.com/us/podcast/theresa-payton-cybersecurity-expert-author-former-white/id1484783544Spotify: https://open.spotify.com/episode/5DLZKqN89CTRVXW2Hi3Pq5➡️ Watch the Podcast on YouTubehttps://www.youtube.com/c/scottdclary 

Karma Comment Chameleon
r/TalesFromTechSupport - This CEO's Idea of "HIGH TECH" Security Was A DISASTER!

Karma Comment Chameleon

Play Episode Listen Later Mar 9, 2025 17:43


In this episode of the Karma Stories Podcast, Rob shares six intriguing tales from the 'Tales from Tech Support' subreddit. The stories include a tech support worker juggling 12 hours of work in under seven, an IBM operator with toaster-like skills, compatibility issues between a KVM and keyboards, the pitfalls of cheap tech and lost data, a CEO's ill-conceived high-tech solution, and a client unable to grasp the complexities of automated permissions. Each story highlights the challenges and humorous situations tech support personnel face in their daily work. Join us for a deep dive into these real-life tech support adventures!Submit your own stories to KarmaStoriesPod@gmail.com.Karma Stories is available on all major Podcasting Platforms and on YouTube under the @KarmaStoriesPodcast handle. We cover stories from popular Reddit Subreddits like Entitled Parents, Tales From Tech Support, Pro Revenge and Malicious Compliance. You can find new uploads here every single day of the week!Rob's 3D Printing Site: https://Dangly3D.comBecome a supporter of this podcast: https://www.spreaker.com/podcast/karma-stories--5098578/support.

Mehr als Schall und Rauch
Vom Nachtwächter zur High-Tech-Security

Mehr als Schall und Rauch

Play Episode Listen Later Feb 9, 2025 21:51


In dieser Folge von „Mehr als Schall und Rauch“ spricht Host Ralf-Wolfgang Lothert mit Sascha Kiss, Direktor beim österreichischen Wachdienst ÖWD, über die Herausforderungen und Entwicklungen im Bereich Sicherheit. Von der Balance zwischen Tradition und Innovation über den Einfluss von Digitalisierung und Künstlicher Intelligenz bis hin zu den Anforderungen an Sicherheitsunternehmen in Krisenzeiten – diese Episode gibt spannende Einblicke in eine Branche, die weit mehr ist als nur „Schall und Rauch“.Für Fragen und weiterführende Informationen schreiben Sie bitte an CCAllgemein@jti.com

KRMG In-Depth
KRMG In Depth: New high tech security features to be deployed at Tulsa State Fair

KRMG In-Depth

Play Episode Listen Later Sep 25, 2024 2:54


Tulsa County Sheriff Vic Regalado says cameras will be enhanced with facial recognition capabilities, and a drone dog will be tested as well.

Cyber Crime Junkies
Hacking with Bryan Seely. Exposing Big Tech Security Flaws.

Cyber Crime Junkies

Play Episode Listen Later Aug 27, 2024 66:40 Transcription Available


Bryan Seely joins us is a refreshing and hilariously entertaining episode. Bryan is a world-famous cyber security expert, ethical hacker and former U.S. Marine. He is known for his book (Web of Lies) and for intercepting calls to the U.S. Secret Service & FBI, as well as finding major exploits at LinkedIn and several government 3-Letter agencies. Connect with Bryan: www.bryanseely.comSend us a Text Message.Get peace of mind. Get Competitive-Get NetGain. Contact NetGain today at 844-777-6278 or reach out online at www.NETGAINIT.com Imagine setting yourself apart from the competition because your organization is always secure, always available, and always ahead of the curve. That's NetGain Technologies – your total one source for cybersecurity, IT support, and technology planning. Have a Guest idea or Story for us to Cover? You can now text our Podcast Studio direct. Text direct (904) 867-4466. A word from our Sponsor-Kiteworks. Accelerate your CMMC 2.0 compliance and address federal zero-trust requirements with Kiteworks' universal, secure file sharing platform made for every organization, and helpful to defense contractors. Visit kiteworks.com to get started.

The Unique CPA
The Intersection of Tech Security and Accounting

The Unique CPA

Play Episode Listen Later Jun 11, 2024 44:31 Transcription Available


Bridging the Gap Conference 2024 is July 22–24, 2024, is Rosemont, Illinois, and on Episode 160 of The Unique CPA, Randy interviews Andrew Lassise, founder of Tech4Accountants, now a part of Rightworks, a platinum sponsor of the conference. Andrew and Rightworks specialize in cybersecurity and compliance in accounting. With their expertise, they help firms establish WISPs, Written Information Security Plans, aid them in navigating the FTC Safeguards Rule, educate on cybersecurity best practices, and more. WISPs are not optional for almost anyone with a PTIN, so tune in to learn what you need to do to safeguard yourself, and your clients. Get the full show notes and more resources at TheUniqueCPA.com

ITSPmagazine | Technology. Cybersecurity. Society
Winning Approach for Tech, Security, and Operations | A Conversation with Petri Kuivala | The Soulful CXO Podcast with Dr. Rebecca Wynn

ITSPmagazine | Technology. Cybersecurity. Society

Play Episode Listen Later May 14, 2024 31:36


Mornings with Neil Mitchell
MCG to get high-tech security upgrade

Mornings with Neil Mitchell

Play Episode Listen Later Mar 4, 2024 3:51


Artificial intelligence security scanners will soon be fully implemented across the MCG after being trialled at the Boxing Day test and during Taylor's three-day concert last month.See omnystudio.com/listener for privacy information.

The Clark Howard Podcast
01.23.24 QR Codes: A Tech Security Warning / Save On Cell Service Abroad

The Clark Howard Podcast

Play Episode Listen Later Jan 23, 2024 28:36


QR Codes have become fertile ground for criminals to load viruses and steal from you. Know how to avoid this now prevalent hazard. Also today, the big cell phone companies have made it incredibly expensive to use your phone when traveling outside the U.S. Hear Clark's latest advice on how to handle this. QR Code Warning: Segment 1 Ask Clark: Segment 2 International Calling: Segment 3 Ask Clark: Segment 4 Mentioned on the show: NYTimes.com: That QR Code You're About to Scan Could Be Risky, F.T.C. Warns How QR codes work and what makes them dangerous – a computer scientist explains — The Conversation Scammers hide harmful links in QR codes to steal your information Is Temu Legit? 4 Things To Know Credit Karma Review: Free Credit Score and More at Your Fingertips How To Monitor Your Credit Dividend Reinvestment Plans (DRIPs) - Stocks - Investopedia How to Make a Disposable Razor Last 12 Months NYT - Come Home With Memories, Not a Shocking Phone Bill The Best International Phone Plans Travel Insurance: What You Need To Know Before You Buy InsureMyTrip Review: Why We Like It and How to Use It Cancel for Any Reason Trip Insurance: Should You Buy It? What Is an HSA Account and How Does It Work? Clark.com resources Episode transcripts Community.Clark.com Clark.com daily money newsletter Consumer Action Center Free Helpline: 636-492-5275 Learn more about your ad choices: megaphone.fm/adchoices Learn more about your ad choices. Visit megaphone.fm/adchoices

Chicago's Afternoon News with Steve Bertrand
Howard Tullman on why you shouldn't gamble on tech security

Chicago's Afternoon News with Steve Bertrand

Play Episode Listen Later Sep 26, 2023


Howard Tullman, general managing partner for G2T3V, LLC and for the Chicago High Tech Investors, LLC, joins Lisa Dent to talk about his latest article in INC Magazine on why the cyberattacks in Las Vegas are a reminder that you can’t be passive about protecting your digital assets. This conversation with Howard Tullman is sponsored by Career […]

Design Your Wedding Business
Build Your Tech Security Starter Pack with Elizabeth Sheils

Design Your Wedding Business

Play Episode Listen Later Sep 25, 2023 35:54


As business owners in the digital age, we are constantly surrounded by screens. From the computers in our offices to the smartphones in our pockets, it seems as though we're always connected, but have you taken measures to protect your business privacy and ensure your personal safety? In this episode of Design Your Wedding Business, we are discussing the often overlooked yet extremely vital steps to build a tech security starter pack that keeps out hackers, viruses, and other unwanted intruders. Our guest, Elizabeth Sheils, is sharing five easy-to-implement steps to safeguard sensitive information in your business and on behalf of your clients so you can sleep better at night.Co-founder of Rock Paper Coin, Elizabeth Sheils never pictured a career in tech, but that's where her wedding planning career led her. In 2018, Elizabeth and her sister-in-law Nora launched Rock Paper Coin, the first-ever software to bring together event planners, couples, and vendors into one system for managing contracts, paying invoices, and sharing documents. Topics covered in this episode include:Best practices for storing passwords and sensitive informationWhat to do if your website or social media has been compromisedHow to make your accounts difficult to hack Let's upgrade your tech security today and protect you from future attacks. I would love to connect on Facebook: www.facebook.com/DesignYourWeddingBusiness & Instagram: www.instagram.com/design_your_wedding_business!Resources Mentioned:Check Out Rock Paper Coin: https://rockpapercoin.com/ Follow @rockpapercoin on Instagram: https://www.instagram.com/rockpapercoin/ Follow Rock Paper Coin on Facebook: https://www.facebook.com/rockpapercoin Show notes available at: designyourweddingbusiness.com/design-your-wedding-business-podcast/Want to find out which of the 8 CEO's your business needs you to be and the tasks that will benefit you the most? Take the 2 minute quiz and find out now: https://bit.ly/DWYBQuiz

KRDO Newsradio 105.5 FM, 1240 AM 92.5 FM
Jim Ryan - Low-tech, High-Tech Security Methods Being Deployed on U.S./Mexico Border - June 12, 2023 - KRDO's Morning News

KRDO Newsradio 105.5 FM, 1240 AM 92.5 FM

Play Episode Listen Later Jun 12, 2023 4:18


ABC News Correspondent Jim Ryan talks about the coming slate of border-security measures that will be a mix of next-generation technology couples with very basic physics.

KRDO Newsradio 105.5 FM • 1240 AM • 92.5 FM
Jim Ryan - Low-tech, High-Tech Security Methods Being Deployed on U.S./Mexico Border - June 12, 2023 - KRDO's Morning News

KRDO Newsradio 105.5 FM • 1240 AM • 92.5 FM

Play Episode Listen Later Jun 12, 2023 4:18


ABC News Correspondent Jim Ryan talks about the coming slate of border-security measures that will be a mix of next-generation technology couples with very basic physics.

Reimagining Cyber
49. All Aboard! Next Stop - The Future of Cyber Resilience!

Reimagining Cyber

Play Episode Listen Later Mar 8, 2023 24:40 Transcription Available


The guest this week is Dr Ron Ross,  Fellow at the National Institute of Standards and Technology.  He currently leads the NIST System Security Engineering Project (SSE) The jumping off point for this episode are two of his special publications-- SP 810-160 Volume 1 (updated Nov 22) , ‘Engineering Trustworthy Systems' which describes a basis for establishing principles, concepts, activities & tasks for engineering trustworthy secure systems.-  SP 810-160 Volume 2 – ‘Developing Cyber-Resilient Systems: A Systems Security Engineering Approach' which focuses on cyber resiliency engineeringKey quotes:"We live and die by information technology, whether that's a classic I.T. system, whether it's an operational technology like a power plant, SCADA system, part of the power grid, whether it's an I.O.T. device. The common denominator on all of these systems is that they're driven by software and firmware, and a lot of that code is not as trustworthy as it needs to be. So given that that's the deck that we've been dealt, how do we deal with that on a day-to-day basis? And that was really the driving force behind the two volumes of 800-160.""The more information you have about the susceptibility of your system to these specific threats or vulnerabilities, and you can take those off the table, then that's always a good thing to do. Things like cyber-hygiene, I call it the basic blocking and tackling. And you know, if you can take 80% of the attacks off the table, you don't ever stop the attacks but that then still leaves the other 20%, and that's where cyber resiliency has to step up. But definitely with AI and machine learning our ability to understand threats and what they can do and how we can stop them is going to increase by orders of magnitude. But in complex systems, even that order of magnitude improvement is never going to be enough. And that leads us to the rest of our discussion today." "We've kind of come to the conclusion that sophisticated adversaries -  I'm not talking about the ones that we can stop with cyber hygiene, the 80%, but I'm talking about the 10-20% on the upper end -  what happens when they get through your initial lines of defences, which are characterized by penetration resistance? Well now the bad guys are inside the house. Well, what if they came in the front door and then every room in your house there was a vault or a safe? That would be analogous to a security domain for each room in your house. And if you have the ability to add whatever safeguards and countermeasures you think are needed for that particular domain, assuming some of your valuables are more important than others, then you can tailor those controls and those safeguards to the specific criticality of the data or the valuables that you would like to and we're seeing those kinds of approaches now." "It's not just about one aspect or one safeguard or one strategy. This is a multi-dimensional strategy with lots of different moving parts that are discussed in our cyber resiliency guideline, and are actually executed in a good engineering process that gives consumers a lot better hope of being able to operate those systems under attack and having a system that they have a confidence that they can recover and restore that system, even if it's in a degraded, debilitated state, they can get back to some sense of normal operations and not have the entire business or mission go under. "Rate and review the show on Apple Podcasts.Share the show with others in the cybersecurity world.Get in touch via reimaginingcyber@gmail.com

Reimagining Cyber
EXTRA! SEC Cyber rules forcing Corporate Boards to pivot

Reimagining Cyber

Play Episode Listen Later Mar 1, 2023 15:03 Transcription Available


The 2022 Security and Exchange Commission's cyber security proposals are expected to kick in the next few weeks. However, are the boardrooms ready?  Worryingly, some  reports suggest that the majority should be having last minute panic attacks. In this edition of  Reimagining Cyber Extra, Rob Aragao and Stan will be addressing discussing what corporate boards and CISOs need to be doingSome key quotes:"There's this  vernacular that gets thrown around from a technology perspective that doesn't always jive to what the business or a board member for that matter is understanding""The rule is designed to compel boards that haven't been taking cybersecurity seriously to do so. But I do think it's also created some trepidation or some concern between the board of directors and those that are in the front lines, the CISOs or the directors of information security. I think it puts some tension on those relationships. And some uncertainties as far as who's going to actually do that reporting effectively""The role of the CISO is going to change even further than what we've seen. As an example, the CISO reports to the CIO in some cases, and in other cases it reports to other parts of the business. This is going to push it really, I would think, for most organizations to completely rethink where the CISO reporting structure is." "I hope [it brings] a  greater understanding on the stresses and the pressures on the CISO and the information security organization and what they have to deal with every day.  Hopefully the board will give them the resources they need. I'm not saying that they aren't funding security. Many times they are, but they need to take the actions to help build in that resilience into the organization. And hopefully they get enough awareness of the topic area and the understanding of the vocabulary to be able to have true conversations about where to best fill in those gaps."Rate and review the show on Apple Podcasts.Share the show with others in the cybersecurity world.Get in touch via reimaginingcyber@gmail.com

Reimagining Cyber
48. U.S. strategy to develop a superior cybersecurity workforce

Reimagining Cyber

Play Episode Listen Later Feb 22, 2023 23:21 Transcription Available


‘We have to counterbalance that cliche view that working in cyber means you are in your hoodie in the basement”There's something about being in demand that makes you feel warm inside. So, if you are in cybersecurity, you should have something of a spring in your step. As anyone in the industry knows, the cybersecurity talent gap in the US is growing. For example, the latest data available on the CyberSeek website shows that in the public sector alone there were over 45,000 online job listings for cybersecurity-related positions between January and December 2022So, what is to be done? In this episode of Reimagining Cyber Rob and Stan look at one of the ways the U.S. government is dealing with the issue. The National Science Foundation's CyberCorps Scholarship for Service Program is “unique program designed to recruit and train the next generation of information technology professionals, industrial control system security professionals, and security managers to meet the needs of the cybersecurity mission for Federal, State, local, and tribal governments.”Rob and Stan talk to Dr Victor Piotrowski, the lead programme director about the ins and outs of the program, its growing success, and the hurdles the program has overcome and still faces.Links:CyberCorps Scholarship for Servicesfs.opm.gov/CyberSeek data:www.cyberseek.org/heatmap.html2021 SFS Biennial Report:2021 SFS Biennial Report (nsf.gov)How to get the federal government to pay for your cybersecurity degree: How to get the federal government to pay for your cybersecurity degree | FortuneRate and review the show on Apple Podcasts.Share the show with others in the cybersecurity world.Get in touch via reimaginingcyber@gmail.com

Reimagining Cyber
Cyber Scams Breaking Hearts - A Valentine's Special

Reimagining Cyber

Play Episode Listen Later Feb 8, 2023 16:55 Transcription Available


Valentine's Day is (almost) upon us, and Stan and Rob are marking this celebration of love by looking at online dating scams. Romantic, yes?!Their guest is Dan Winchester, co-founder of Scamalytics. Scamalytics has a focus on helping dating sites automatically remove scammers from their sites in real-time.Talking points:- How scammers affect a dating sites business model   “Most dating services are trying to move as many of their users as possible over to a subscription. You're not going to pay a subscription when the product you're subscribing to looks like it's just full of junk and scammers”- On collecting data to prevent fraud  “There's a tension between privacy and safety. Users want to feel safe, but they also want to make sure that their privacy is respected. So you need to really be figuring out what's the minimum amount of data you can use in order to prevent the maximum amount of fraud.”- Relationships with service providers  “We often have quite a tricky relationship with the service providers themselves because they may not be taking as much action as we would like when fraud happens on their networks. And you know, some of these companies are obviously massive and it's quite hard to get them to really deal with these issues.”- On AI/machine learning  “We do a lot of machine learning stuff within Scamalytics, but I would always add a cautionary note that we find that the domain knowledge is way, way more useful than machine learning because when you're dealing with fraud, you've really got to be attuned to false positives and it's so easy for machine learning systems to get into false positive feedback loops and things like that.”Rate and review the show on Apple Podcasts.Share the show with others in the cybersecurity world.Get in touch via reimaginingcyber@gmail.com

Reimagining Cyber
Sharing a stage with cybersecurity's big names - Reimagining Cyber EXTRA

Reimagining Cyber

Play Episode Listen Later Jan 4, 2023 17:57 Transcription Available


As usual, Stan's been rubbing shoulders with the top names in cyber security...In this episode we hear about his participation in the Government Innovation Show - 'Transforming Government Through Technology-Driven Initiatives'Rob and Stan react to talks given by:- James Burd, Chief Privacy Officer for the Cybersecurity and Infrastructure Security Agency- Dr Diana Janosek, Deputy Director of Compliance at the National Security AgencyPLUS:- Recession, what recession? With cybersecurity budgets expected to rise in 2023, Rob and Stan give their thoughts on why.- Have you heard of Youtube? Apparently it's quite popular. Reimagining Cyber is the latest convert, and the show can be found here:www.youtube.com/@CyberReswww.youtube.com/watch?v=PoVifXTIM…Ndcdjin-l2qxkAIwZ

Reimagining Cyber
EXTRA! Hackers hit COVID relief benefits, Microsoft & Ukraine, data breach at LastPass & WhatsApp

Reimagining Cyber

Play Episode Listen Later Dec 14, 2022 11:35 Transcription Available


In this EXTRA! episode Rob and Stan talk about:- Secret Service reports of Chinese hackers stealing tens of millions of dollars worth of U.S. COVID relief benefits since 2020.- Microsoft's help for Ukraine- What the latest data breach means for LastPass' business.- Data breach at WhatsApp

Reimagining Cyber
CREST Americas Chair talks collaboration with OWASP to launch OVS

Reimagining Cyber

Play Episode Listen Later Dec 7, 2022 27:04


On this week's episode of Reimagining Cyber about launching the OWASP Verification Standard (OVS), Stan Wisseman and Rob Aragao talk with Tom Brennan, CIO for Mandelbaum Barrett law firm and North America Executive Director for CREST. The three of them talk about the history of CREST, the new OWASP Verification Standard (OVS), and its connection with the OWASP Application Security Verification Standard (ASVS).CREST was established in 2006 as an international non-profit organization that represents the global cyber security industry. The organization's goal is to help create a secure digital world for all by quality assuring its members and delivering professional certifications to the cyber security industry through a rigorous quality assurance process so others can have confidence in the cyber security services they consume. CREST Americas offers programs across six cyber security communities, which include: government, regulators, buying community, service suppliers, training and academia, and professional bodies.Recently, CREST collaborated with the Open Web Application Security Project, better known as OWASP, to launch the OWASP Verification Standard (OVS). OVS is a new quality assurance standard for the global AppSec industry. It is designed to provide mobile and web app developers with superior security assurance and accredited organizations with improved access to the expanding application development industry. Brennan gave an overview of OVS's ability to execute and deliver assessments related to the different levels of the OWASP Application Security Verification Standard (ASVS). ASVS provides a source for testing web application technical controls and provide developers a list of secure development requirements. Its aim is to normalize the variety of coverage and level of rigor accessible in the market to verify web application security by using a commercially workable open standard. By including ASVS, CREST was able to support the open-source community to build and support global standards.Brennan believes that OVS is useful to many organizations, as long as they meet the qualifications needed. It gives you the opportunity to conduct assessments against existing codebases and determine where issues may exist before the buyer gets involved in code quality issues or licensing problems. Brennan also goes to say that “OVS allows not only the Americas, but for organizations around the world [to] demonstrate taking something that is a global, acceptable best practice by the OWASP individuals and experts… [so it] can be utilized in a commercial way very easily and quite honestly very accepted.” OVS is providing a global standard of expectations for consumers of software.

IoT For All Podcast
IoT Security Landscape in 2022 | WISeKey's Steve Clark | Internet of Things Podcast

IoT For All Podcast

Play Episode Listen Later Oct 27, 2022 22:20


Steve begins by introducing himself and his company before giving a high-level overview of the evolution of IoT security he's witnessed in his 15 years of working in the field. He then moves into a discussion about what companies should consider and the advice he would provide for adopters. Steve also touches on challenges in the industry and what identity as a basis is for security.​​For 15 years, Steve has been influencing the design of secure semiconductors for secure applications at WISeKey, Lynx Corporation, and Atmel/Microchip. He is an innovator with expertise in IoT Architecture, Blockchain, PKI, Anti-Counterfeit, and Privacy. As a Security Technologist at WISeKey, Steve has written patents and been involved in shaping the semiconductor features to conform to the changing security landscape. In the IoT industry, he has been involved with setting security standards as a member of the Security Working Groups, including Wi SUN FAN, Open Connectivity Foundation (OCF), and Industrial Internet Consortium (IIC). Most recently, he worked with NIST's National Cybersecurity Center of Excellence on the Trusted IoT Network Layer Onboarding project.WISeKey (NASDAQ: WKEY; SIX Swiss Exchange: WIHN) is a leading global cybersecurity company currently deploying large-scale digital identity ecosystems for people and objects using Blockchain, AI, and IoT, respecting the Human as the Fulcrum of the Internet. WISeKey microprocessors secure the pervasive computing shaping today's Internet of Everything. WISeKey IoT has an installed base of over 1.6 billion microchips in virtually all IoT sectors (connected cars, smart cities, drones, agricultural sensors, anti-counterfeiting, smart lighting, servers, computers, mobile phones, crypto tokens, etc.).Their technology is Trusted by the OISTE/WISeKey's Swiss-based cryptographic Root of Trust (“RoT”). It provides secure authentication and identification for the Internet of Things and Blockchain in both physical and virtual environments. The WISeKey RoT serves as a common trust anchor to ensure the integrity of online transactions among objects and between objects and people.

Reimagining Cyber
Do a little dance… Time for some SLSA!

Reimagining Cyber

Play Episode Listen Later Oct 11, 2022 24:56 Transcription Available


On this week's episode of Reimagining Cyber, hosts Stan Wisseman and Rob Aragao welcomed guest Dan Lorenc, founder and CEO of Chainguard Inc., to talk about SLSA, software supply chain security risks, and his opinions on Software Bill of Materials (SBOMs).

Around Town with @ColaMayor
#20 - From a Humble Start of Guard Dog Rental to High Tech Security: A Conversation with Local Business Leader Mark Wesley from AMAROK

Around Town with @ColaMayor

Play Episode Listen Later Sep 28, 2022 43:27


I sit down with local business leader Mark Wesley of AMAROK Ultimate Perimeter Security to talk about growing business in Columbia, river floating, company culture, and more.

IoT For All Podcast
The Importance of Global Standard for IoT Security | ioXt Alliance's Grace Burkard | Internet of Things Podcast

IoT For All Podcast

Play Episode Listen Later Sep 20, 2022 21:37


Grace introduces herself and the company before diving into more specifics of what the alliance offers. She describes how the certification process works and the importance of third-party testing. Grace then discusses who can join the alliance and the goals they have moving forward. She wraps up the podcast by talking high-level about the challenges she's seen in the IoT industry regarding security.Grace Burkard, Director of Operations at ioXt Alliance, spearheads ioXt's overall efforts in setting baseline security requirements to build a safer IoT world. Through her work with stakeholders and various international regulatory organizations like PSA Certified and NIST, Grace plays a crucial role in harmonizing and standardizing security and privacy requirements, product compliance programs, and public transparency of those requirements and programs.ioXt is the Global Standard for IoT Security. Founded by leading technology and product manufacturing firms, ioXt is the only industry-led, global IoT product security and certification program. Through the ioXt Certification Program, IoT product manufacturers and developers can gain formal certification to the ioXt global standard. The certification profiles encompass ioXt Alliance's Security Pledge, which is the result of industries working together to set security standards that bring security, upgradability, and transparency to the market and directly into the hands of consumers. The program measures a product by each of the eight ioXt principles with clear guidelines for quantifying the appropriate level of security needed for a specific product. Once approved, the ioXt SmartCert informs end-users, retailers, and ecosystem partners that a product is secure. Products with the ioXt SmartCert give consumers and retailers greater confidence in a highly connected world.

Tech Minimalism
Simplifying your tech security

Tech Minimalism

Play Episode Listen Later Jul 28, 2022 6:04


In today's world, your online security is vitally important to your privacy. So having everything, from your online accounts to your Mac, iPhone, and other Apple devices, safe and secure should be vitally important to you too!Minimalist Password: https://minimalistpassword.comBitwarden: https://bitwarden.comVideo: https://www.macjunky.com/post/simplifying-your-tech-securityPodcast: https://www.macjunky.com/podcast?e=3ca7a8fcNewsletter: https://macjunky.com/newsletter– – – – – – – – – – – – – – – – – – – – – – – – – – – – – –Support the channelKo-fi: https://ko-fi.com/macjunkyOdysee: https://odysee.com/@macjunkyBMaC: https://buymeacoff.ee/macjunkyConnect on social mediaTwitter: https://twitter.com/macjunkyInstagram: https://instagram.com/macjunkyLinkedIn: https://linkedin.com/company/macjunkyFacebook: https://facebook.com/macjunkyYoutube: https://youtube.com/macjunkyPinterest: https://pinterest.com/macjunkyTumblr: https://macjunky.tumblr.comReddit: https://reddit.com/r/macjunkyVero: https://vero.co/macjunky ★ Support this podcast ★

IoT For All Podcast
How IoT Security is Evolving | Crypto Quantique's Shahram Mossayebi

IoT For All Podcast

Play Episode Listen Later Jul 26, 2022 25:16


They open the podcast with a high-level overview of the current IoT landscape then Shahram gives advice on how to approach security and overcome common roadblocks in the industry. He then goes into greater detail about protecting yourself in the IoT journey, how root of trust works, and where he sees the future of IoT security heading. Ryan and Shahram wrap up the podcast with a conversation about how this niche has changed during the pandemic. Before founding Crypto Quantique, Shahram worked as a self-employed cybersecurity consultant and security solutions architect at CyNation, a risk management company. Of his current role, he says, “After years working in the cybersecurity industry, I have seen how companies are continually choosing between expensive and complex security or highly scaled systems without meaningful protection. Recognizing the need for a holistic solution that is easy-to-use at scale yet delivers robust and reliable security for everything from connected cars to high-end consumer goods, I founded Crypto Quantique.” Shahram, who lives in London, holds an MSc in Information Security and a Ph.D. in Post-Quantum Cryptography, both from Royal Holloway, University of London.Crypto Quantique is a London-based company with a scalable architecture for quickly and securely connecting IoT devices to the cloud. Their architecture has two complementary, but independent elements QDID, a hardware IP that generates random, unique, unforgeable identities and cryptographic keys on-demand in silicon, and QuarkLink, a universal IoT security platform for connecting devices to in-house or cloud servers.

Crypto Hipster Podcast
Tech, security and global crypto growth insights with Samy Karim Binance Smart Chain Ecosystem

Crypto Hipster Podcast

Play Episode Listen Later Jul 26, 2022 32:29


Samy Karim is a Binance Smart Chain Ecosystem Coordinator.He's ex-consenSys and plays a major role in supporting projects building on top of BSC.He's all about tech, security and global crypto growth. --- Support this podcast: https://anchor.fm/crypto-hipster-podcast/support

Reimagining Cyber
Aligning cybersecurity with startup business goals

Reimagining Cyber

Play Episode Play 16 sec Highlight Listen Later Jul 12, 2022 26:37 Transcription Available


Ty Sbano, CISO for Vercel, shares his unique perspective on running the security business in the start-up space, from how to approach the interview process, how to gain trust early, and how to remain focused on the right priorities. Rob and Stan ask Ty:- how he engages and makes  plan and prioritises- the approaches he's  taken- setting expectations- metrics he works to- how much time  is spent is on the organisational side versus what you're providing, as a service or product?- instilling a positive culture- how can we evolve what we've been doing for four decades on cybersecurity to address today and tomorrow's new threats.

Bite Size Sales
137: Ian Bramson, Global Head of Industrial Cybersecurity at ABS Group, talks about the 3 shifts coming in industrial and operational tech security

Bite Size Sales

Play Episode Listen Later Jun 14, 2022 31:16


Cyber security for operational technology and industrial systems is a hot topic right now. The security of these systems is important to the critical revenue generation parts of companies and also to governments and countries.In this episode, Ian Bramson, Global Head of Industrial Cybersecurity at ABS Group, talked at RSA about the 3 shifts coming in this space and we are giving you a sneak peak today. Ian discusses the importance of market drivers, how industrial cyber hygiene will be a competitive advantage, how OT is taking domain priority, and much more.Tune in to learn:What services IT companies should offerThe difference between buying services and technologies for the customerHow competition wins over complianceIf you are a sales leader at a startup, or you're in the sales team, and you're searching for your repeatable scalable sales process to grow sales faster, then please get in touch with me at andrew@unstoppable.do or you can also go to my site at www.unstoppable.do.Sign up for our newsletter (https://www.salesbluebird.com)We want your questions and topic suggestions for future episodes. Send them to  andrew@unstoppable.do or send us a voice/video at https://zipmessage.com/unstoppableFollow Ian Bramson on LinkedIn: https://www.linkedin.com/in/ianbramsonSupport the show

Cybersecurity Quiz
Tim Hooks, IT Director Talks Tech, Security & Dedication

Cybersecurity Quiz

Play Episode Listen Later Jun 14, 2022 29:34


It's people like our guest Tim Hooks that keep law firms like his,  Isaac Wiles & Burkholder in Columbus, OH operating securely with minimal downtime all the while giving his lawyers and staffers and incredible user-experience.Tim represents the often unsung heroes of our law firms, the IT staffers.For most law firm IT staff, it's a forgotten, thankless job often working nights, weekends, holidays and getting calls sometimes late into the evenings.But like most, he's dedicated to keep his firm safe and running smooth.Join us in recognizing Tim for a job well done.Watch our past shows: https://www.youtube.com/c/NoLawFirmLeftBehindListen to our Podcast: https://www.splice.net/podcasts/Need IT or Cybersecurity help for your law firm, connect with us at www.splice.net/contact

dot tech Podcast by Form3
Ep 30 .tech - Security scanning using tfsec

dot tech Podcast by Form3

Play Episode Listen Later Apr 26, 2022 22:20


Our  .tech series invites guests inside and outside of Form3, discussing current trends in the engineering world alongside shedding light into some of the engineering practices here at Form3. Get in touch with us via this short form if you'd like to be  a podcast guest. Interested in joining Form3? Check out our careers site. 

SecurPod
Reviewing the PSA Tech Security Mission

SecurPod

Play Episode Listen Later Mar 9, 2022 18:32


Learning about the mission and goals of PSA Tech will answer many of the questions integrators deal with every day. The vision of the organization is to “be the rising tide.” Learn what challenges integrators are facing and what emerging technologies will take off in 2022. This podcast is a conversation with Matt Barnette of PSA. He was named the chief executive officer about a year ago, and is preparing for an in-person forum in Denver, May 16-19. He talks about how membership in PSA is a benefit for integrators, and how it might impact end users. Matt shares a wealth of knowledge not only from leading PSA, but from his many years involved in the security industry.

Cyber Pro Podcast
#154 - Tom Kirkham - CEO/Marketing Director - Iron Tech Security

Cyber Pro Podcast

Play Episode Listen Later Jan 13, 2022 11:11


Tom discusses the upcoming cyber pandemic. He shares his knowledge and experience amassed over 40 years in technology. Tom shares his love of heist films, and how being able to get into the mind of a criminal like that can help people have success in this industry. He explains why having an infosec specialist on your team is imperative. He goes into the difference between IT and Infosec, and why you need both. Tom talks about what makes a great MSSP.   Connect with Tom: https://www.linkedin.com/in/tomkirkham/ Visit Tom's personal website: https://tomkirkham.com/  Visit IronTech Security: https://irontechsecurity.com/  Visit Kirkhma.IT: https://www.kirkham.it/    Visit Short Arms website: https://www.shortarmsolutions.com/    You can follow us at: Linked In: https://www.linkedin.com/company/shortarmsolutions  YouTube: https://www.youtube.com/channel/UCjUNoFuy6d1rouj_SBg3Qkw/featured  Twitter: https://twitter.com/ShortArmSAS

Cyber Pro Podcast
#154 - Tom Kirkham - CEO/Marketing Director - Iron Tech Security

Cyber Pro Podcast

Play Episode Listen Later Jan 13, 2022 11:10


Tom discusses the upcoming cyber pandemic. He shares his knowledge and experience amassed over 40 years in technology. Tom shares his love of heist films, and how being able to get into the mind of a criminal like that can help people have success in this industry. He explains why having an infosec specialist on your team is imperative. He goes into the difference between IT and Infosec, and why you need both. Tom talks about what makes a great MSSP.   Connect with Tom: https://www.linkedin.com/in/tomkirkham/ Visit Tom's personal website: https://tomkirkham.com/  Visit IronTech Security: https://irontechsecurity.com/  Visit Kirkhma.IT: https://www.kirkham.it/    Visit Short Arms website: https://www.shortarmsolutions.com/    You can follow us at: Linked In: https://www.linkedin.com/company/shortarmsolutions  YouTube: https://www.youtube.com/channel/UCjUNoFuy6d1rouj_SBg3Qkw/featured  Twitter: https://twitter.com/ShortArmSAS

The Irish Tech News Podcast
Tech, security and global crypto growth insights with Samy Karim Binance Smart Chain Ecosystem

The Irish Tech News Podcast

Play Episode Listen Later Dec 17, 2021 33:03


About Samy Karim Samy Karim is a Binance Smart Chain Ecosystem Coordinator.He's ex-consenSys and plays a major role in supporting projects building on top of BSC.He's all about tech, security and global crypto growth. Jamil Hasan is a crypto and blockchain focused podcast host at the Irish Tech News and spearheads our weekend content “The Crypto Corner” where he interviews founders, entrepreneurs and global thought leaders. Prior to his endeavors into the crypto-verse in July 2017, Jamil built an impressive career as a data, operations, financial, technology and business analyst and manager in Corporate America, including twelve years at American International Group and its related companies. Since entering the crypto universe, Jamil has been an advisor, entrepreneur, investor and author. His books “Blockchain Ethics: A Bridge to Abundance” (2018) and “Re-Generation X” (2020) not only discuss the benefits of blockchain technology, but also capture Jamil's experience on how he has transitioned from being a loyal yet downsized former corporate employee to a self sovereign individual. With over ninety podcasts under his belt since he joined our team in February 2021, and with four years of experience both managing his own crypto portfolio and providing crypto guidance and counsel to select clients, Jamil continues to seek opportunities to help others navigate this still nascent industry. Jamil's primary focus outside of podcast hosting is helping former corporate employees gain the necessary skills and vision to build their own crypto portfolios and create wealth for the long-term.

The Bottom Line on KCLR
#087: The Bottom Line - Global Minimum Tax Rate, HR during a Pandemic, Cyber Security & E-Commerce.

The Bottom Line on KCLR

Play Episode Listen Later Apr 26, 2021 46:04


Eamon Quinn, Business Editor at the Irish Examiner spoke with John about the global minimum tax rate that has been proposed by the US and the potential implications for the Irish Economy.Security Risk Advisors is a US headquartered IT and Tech security company that in 2019 established its European Headquarters in Kilkenny. Claire McInerney Brown recently caught up with Lar Conroy, Senior Operations Manager at Security Risk Advisors to chat about the company, the work they do and to get some tips on protecting your businesses IT and Tech Security.  After over a year of remote working and revolutionary changes in work practices, John spoke with Mary Cullen Founder and Manging Director of Insight HR to discuss what have been the pros and cons, the risks and opportunities for employers and employees and also to understand what are some of the challenges that we may face with a return to the office. RedSky Europe are an e-commerce fulfilment company based in Kilkenny, Ken Byrne, Founder and CEO at Redsky Europe first spoke with John this time last year at the start of the pandemic. One year on, John caught up with Ken to hear what the past year had been like for his organisation. With thanks to O'Neill Foley, Produced by Deirdre Dromey.To contact the show, email: thebottomline@kclr96fm.com 

Beyond the Uniform
BTU #389 - Founding a high-tech security company (Christian White)

Beyond the Uniform

Play Episode Listen Later Mar 22, 2021 53:10


About this Episode: After serving in the Army for 6.5 years, Christian founded an advisory and technology firm focused on helping High-Growth Technology Companies build, manage, and certify their Security, Privacy, and Compliance programs. He has quickly grown his company - risk3sixty - to over 20 employees and it seems like they are just getting started. In this interview we talk about character, we talk about being a steward of a company, we talk about the differences in leadership in and out of uniform, about long-term thinking, finding a co-founder and much more.   About Christian: Christian White is the Managing Director and Co-Founder of risk3sixty, an advisory and technology firm focused on helping High-Growth Technology Companies build, manage, and certify their Security, Privacy, and Compliance programs. He is a graduate of West Point, and a 6.5 year Army veteran, most recently serving as Company Commander in Fort Campbell. He holds an MBA from the Georgia Institute of Technology.

The Female Founders Network
Founding a Tech Security Start-Up and Tips on Fundraising with Lee Kappon

The Female Founders Network

Play Episode Listen Later Feb 21, 2021 30:38


Today we're speaking with Lee Kappon, the CEO and founder of Suridata AI. Lee is based in Tel Aviv, Israel and in this episode, we hear how growing up in Israel shaped Lee to become the fearless founder she is today. From channelling the Israeli “Chutzpah” to Lee's advice on the essential steps for getting VC funding and finding the right VC for your company, there are many great takeaways from our conversation that will be food for thought for your business. We hope you enjoy this episode, and if you do - please leave us a review wherever you listen to your podcasts. https://www.suridata.ai/

CapitalGeek
Mike Roth, CEO and Founder of Evo Security and IAM GEEK

CapitalGeek

Play Episode Listen Later Feb 16, 2021 43:24


Mike is an engineer, former private equity fund founder and manager turned serial tech entrepreneur. His life-long passion of using creativity, innovation, and perspective shifts to solve hard problems with elegant solutions is what has defined his career across multiple industries. He believes nothing is out of reach if you're willing to convert thoughts into action and stay laser-focused on the belief that a new reality is constrained only by a bit of time. For more information on today's episode, visit https://capitalgeek.io/Connect with us:Josh's LinkedIn Josh's TwitterJosh's FacebookMike's LinkedInLeave Some Feedback: Did you enjoy this episode? If so, please leave a short review. Links Mentioned In Today's Episode: https://www.evosecurity.com/https://elsewhere.partners/   

Smart Women, Smart Power
Tech Security, Innovation, and Amazon

Smart Women, Smart Power

Play Episode Listen Later Dec 9, 2020 33:01


Host Beverly Kirk talks to Teresa Carlson, vice president of Amazon Web Services (AWS) Worldwide Public Sector. They discuss current tech trends, the impact of the Covid-19 pandemic on innovation, and her efforts to support women in tech. 

Smart Women, Smart Power
Tech Security, Innovation, and Amazon

Smart Women, Smart Power

Play Episode Listen Later Dec 9, 2020 33:01


Host Beverly Kirk talks to Teresa Carlson, vice president of Amazon Web Services (AWS) Worldwide Public Sector. They discuss current tech trends, the impact of the Covid-19 pandemic on innovation, and her efforts to support women in tech. 

The High Conflict Co-Parenting Podcast
Episode 115 Cyber and Tech Security and High Conflict

The High Conflict Co-Parenting Podcast

Play Episode Listen Later Dec 3, 2020 53:35


In this episode Brook has a special guest Patric McClory, who is the CEO of several high tech startups and who has an overarching perspective on cyber and internet security. We will be discussing ways to help protect you cyber space for you and you family and to help you relax and worry about other things. Enjoy!!!

Data Security and Privacy with the Privacy Professor
How Poor Tech Security & Misinformation Upend Elections

Data Security and Privacy with the Privacy Professor

Play Episode Listen Later Mar 7, 2020 58:40


Listen in to hear Rebecca speak with elections security expert Theresa Payton about elections security, safeguarding voting machines, and the types of attempts to disrupt or even change the results of elections. Some of the topics covered include: • What are some key points to understand about the tech and other problems in the Iowa caucuses? • In what ways do nation states, and other malicious actors, try to manipulate elections results? • How can voters recognize manipulation campaigns? • What favorite online marketing tool is being widely used to spread misinformation during election seasons? • How are social media posts and hashtags used to damage elections? • How do social media influencers profit from meddling in elections? • And many more!

Hoax Busters: Conspiracy or just Theory?
Call 591-Veni, Vidi, Vici, Virtually

Hoax Busters: Conspiracy or just Theory?

Play Episode Listen Later Feb 4, 2020


Science is true, whether you believe it or not...Intro Hold Music Snippet: Monkey Paw by Phono Pony,Deuce Juicer(Jay Dyer jays analysis.com)Passwords, Tech Security, Sandy Hook, Nuke Bomb,Wuhan Virus,Immigration, Quarantine, Anti-Vaxxers, Vaccines, Meat causing Pandemics, Kelita Calls in, Everything The Communist Chinese Government Says is Suddenly True, Firearms in Europe, Conspiracy Theory Land, Pro-Vaxxer La La Land Thinking, Autism and Vaccines, Vaccines as Ritual, Natural Immunity, HPV Cervical Cancer, Vaccines and Cancer Rates, MS or Polio, Plausible Deniability, Doctors are the Number One Killer, Barbara Starfield, Mid Space Art Calls In, Taxation, Author C. Clark, Childhoods End, Mind Control the Frankfurt School and Cybernetics, The Monetary System, Homogenization, Animal Rights, Amherst College, PC Policing, NPCs, Trauma Based Mind Control, Lenon Honor, Cold Case Files, Crashes and Catastrophe, Drive(film).Violence in Video Games.hoaxbusterscall.coDeuce Juicer(Jay Dyer jays analysis.com)Passwords, Tech Security, Sandy Hook, Nuke Bomb,Wuhan Virus,Immigration, Quarantine, Anti-Vaxxers, Vaccines, Meat causing Pandemics, Kelita Calls in, Everything The Communist Chinese Government Says is Suddenly True, Firearms in Europe, Conspiracy Theory Land, Pro-Vaxxer La La Land Thinking, Autism and Vaccines, Vaccines as Ritual, Natural Immunity, HPV Cervical Cancer, Vaccines and Cancer Rates, MS or Polio, Plausible Deniability, Doctors are the Number One Killer, Barbara Starfield, Mid Space Art Calls In, Taxation, Author C. Clark, Childhoods End, Mind Control the Frankfurt School and Cybernetics, The Monetary System, Homogenization, Animal Rights, Amherst College, PC Policing, NPCs, Trauma Based Mind Control, Lenon Honor, Cold Case Files, Crashes and Catastrophe, Drive(film).Violence in Video Games.hoaxbusterscall.co

Brilliance Security Magazine Podcast
Applying High Tech Security Technology for SMBs

Brilliance Security Magazine Podcast

Play Episode Listen Later Jan 30, 2020 6:49


Security technology will allow us to implement some pretty amazing defenses. The brightest technology minds around the world examine new and existing threats and vulnerabilities. Each new exploit brings the industry's defensive methods and strategies to a sharper point. One of the practical problems that continually surfaces in security technology is one of application. It does little good to devise highly technical defensive solutions if they are, in the end, too complicated for average businesses to deploy and manage. Listen to what we learned about one company that addresses this problem every effectively. --- This episode is sponsored by · Anchor: The easiest way to make a podcast. https://anchor.fm/app

Tech For Granted
Episode 11: RIP Uyinene - Tech & Security

Tech For Granted

Play Episode Listen Later Sep 10, 2019 57:52


Uyinene Mrwetyana was tragically killed after she was reported missing in late August 2019. It subsequently emerged that she was allegedly kidnapped, raped, and murdered by a post office employee where she went to fetch a package. On this episode, we discuss how software developers can provide secure, safe solutions that prevent crime. We also discuss Glovo's marketing strategy, the increase of food delivery apps within Nairobi (Kenya) and whether it's wise to market a company prematurely. Listen and enjoy! --- This episode is sponsored by · Anchor: The easiest way to make a podcast. https://anchor.fm/app Support this podcast: https://anchor.fm/techforgranted/support

Data Security and Privacy with the Privacy Professor
Small Business Risks, Careers, Mueller Report, CPU Vulns and More!

Data Security and Privacy with the Privacy Professor

Play Episode Listen Later Apr 30, 2019 54:51


In this episode Rebecca answers some of the questions received from show listeners and discusses some recent news items. A very wide range of topics are covered, some of which include: • What are cybersecurity lessons found within the Mueller report? • What are the top 3 things a small business owner should be doing to secure client data? • Who should be concerned about Embedded POSReady 2009? • What are the challenges to eliminating CPU vulnerabilities from Spectre and Meltdown? • What are the best paid information security careers? • How can consumers deal with increasingly frequent credit card breaches at online sites? • What is a new Microsoft security configuration baseline setting that surprised many? Tune in to hear Rebecca discuss these topics and more.

Data Security and Privacy with the Privacy Professor
China Tech, Reusing Old Devices, Accessing Patient Data and More!

Data Security and Privacy with the Privacy Professor

Play Episode Listen Later Apr 16, 2019 55:40


In this episode Rebecca answers some questions received from show listeners and her Privacy Professor Tips readers. A wide range of topics are covered, such as: • How many voting machines were attacked during the USA 2016 elections? Will they continue? • Should listeners be concerned that wireless China tech may have surveillance built in? Or tech from other countries? • What happened at Mar-a-Lago with the USB thumb drives with malware them? • What happens to patient data when a clinic closes? • What are red flags that popular tech gadgets, like iPads, have security problems? • Is it safe to give children old phones or other tech to use? • How can people tell if skimmers are in ATMs or self-pay devices? • How can locations for those using Gmail or other email services be removed? • What popular retail check-out system is no longer being supported, leaving millions of retailers & their customers vulnerable? Tune in to hear Rebecca discuss these topics and more.

Ed Tech Weekly
ETW - Episode 96 - FBI Issues an Ed Tech Security Warning

Ed Tech Weekly

Play Episode Listen Later Sep 21, 2018 14:08


In this episode, Kristy and Ricky talk about the ed tech news of the week including the FBI's most recent Public Service Announcement regarding the security concerns surrounding ed tech.

Executive Protection and Secure Transportation Podcast
Schools are Spending Billions on High-Tech Security

Executive Protection and Secure Transportation Podcast

Play Episode Listen Later May 24, 2018 8:12


Larry Snow with the Secure Transportation and Executive Protection News for Thursday, May 24th, 2018. In Vehicle News From DigitalTrends.Com BMW racing to patch 14 security vulnerabilities found in its cars Chinese researchers discovered 14 vulnerabilities on the onboard computers of a number of BMW vehicles, leading the automaker to begin issuing security patches over-the-air and through dealer networks. These flaws affect the infotainment unit, telematics controls, and the wireless communications systems on BMW's i Series, X1 sDrive, 5 Series, and 7 Series models dating as far back as 2012. Four of the discovered vulnerabilities require hackers to have physical USB access to the car, while six of the vulnerabilities can be exploited remotely. The last four vulnerabilities require physical access to the car's computer. Read More  =========================== In Technology News Schools are spending billions on high-tech security. But are students any safer? From NBCNews.Com With each new school shooting the routine of death and grief grows numbingly familiar, and so does the inescapable question: Is there any way for schools to stop them? School districts trying to avoid becoming next on the list are urgently chasing answers, with an increasing number staking their hopes on high-tech security systems originally developed for the military, police and private industry. Read More   ==   From DigitalTrends.Com Uber shutters self-driving project in Arizona two months after fatal accident Uber is ending its self-driving program in Arizona, focusing its efforts instead on existing operations in Pittsburgh and San Francisco, where the company has its headquarters. Read More    ============================= In Business of Executive Protection News From Lexology.Com Tomorrow, May 25, Europe's General Data Protection Regulation (GDPR) will go into effect, imposing new obligations on companies that market to, track, or handle the personal data of Europeans—whether or not those companies are in Europe.  For any company doing business in the EU (and any company that might have EU personal data in its databases), the GDPR is one of the most significant regulatory changes of the past several years.  Even companies that are not directly subject to the GDPR are likely to be asked to represent that they are GDPR compliant when acting as a vendor to organizations to which the regulations do apply. Read More   ========================== This flash briefing is brought to you by the International Security Driver Association. The ISDA serves its members by supporting an international forum of protection professionals who share their knowledge and experience for the education and benefit of the membership. Whether you are exploring a career in executive protection, new to the profession, honing your expertise, or an established security executive, ISDA offers its Members benchmark educational, networking, and marketing programs. For more information about the ISDA membership, articles related to secure transportation, security, and executive protection, go to isdacenter.org. Thanks for listening to the Security Driver and Executive Protection News flash briefing.

Lagniappe Legends
Youtube HQ shooting, Tech Security

Lagniappe Legends

Play Episode Listen Later Apr 9, 2018 12:07


Youtube HQ shooting, Tech Security --- Support this podcast: https://anchor.fm/lagniappelegends/support

Marsha Collier & Marc Cohen Techradio by Computer and Technology Radio / wsRadio
03/31/18 This Week's News in Tech: Security, Tesla, Space X, Facebook, IoT, Microsoft Tech Support, Creation Crate Part 1

Marsha Collier & Marc Cohen Techradio by Computer and Technology Radio / wsRadio

Play Episode Listen Later Apr 9, 2018 30:01


NYC Secure, Security Breaches, Tesla, Space X, Facebook, Microdoft Tech Support NEWS: NYC Secure App to protect WiFi; My Fitness Pal app breach affects 150 million; Elon Musk news: Tesla recalls 123,000 Model S - questioning the math; Space X network; Facebook delaying their new Home speaker TIPS: Getting Tech Support from Microsoft; How to get faster Hotel WiFi

Marsha Collier & Marc Cohen Techradio by Computer and Technology Radio / wsRadio
03/31/18 This Week's News in Tech: Security, Tesla, Space X, Facebook, IoT, Microsoft Tech Support, Creation Crate Part 2

Marsha Collier & Marc Cohen Techradio by Computer and Technology Radio / wsRadio

Play Episode Listen Later Apr 9, 2018 28:12


iOS 11.3 news and review; New iPad; Clapper History and home automation; Review: "Creation Crate"; Star Wars Mega toy

Cleveland's Morning News with Wills and Snyder
Wills & Snyder: Cavs Thomas Great Debut In WIN Over T-Blazers - Celtics Tonight-Get Rid Of Old Tech-Security Handbook-Trump Tweet Bigger Nuke Button-Congress Back to Work

Cleveland's Morning News with Wills and Snyder

Play Episode Listen Later Jan 3, 2018 27:30


Bill and Mike got your Wednesday warm with Cavs Thomas Great Debut In WIN Over T-Blazers - Celtics Tonight-Get Rid Of Old Tech-Security Handbook-Trump Tweet Bigger Nuke Button-Congress Back to Work

The Final Straw Radio
Tech Security, Doxxing, Encryption

The Final Straw Radio

Play Episode Listen Later Sep 10, 2017 78:03


The Main Event This week Bursts spoke with William Budington, a digital security expert, about various topics under that heading. We spoke about: encryption for texting, email and mobile devices operating systems; about anonymity on the internet; safer practices with social media; doxxing; and more. The conversation was ranging and a bit thick at times due to Bursts very specific style of posing questions. Thusly, the notes will be very long with lots of links embedded for further reading on the topic, posted in the Further Reading section below. If there are other topics around security that you'd like to hear discussed on this show, drop us an email at thefinalstrawradio@riseup.net and we'll mull it over. This chat was by no means the end of a conversation. The practices and tools we talked about here are meant to keep you SAFER, but can't promise your safety. But hopefully some of these words can get more of us to take our digital hygiene more seriously! Announcements Political Prisoner Herman Bell Assaulted We received this notice after the show aired, but hope that folks read these notes and get this info. Herman Bell is one of the New York 3, the same group of defendants as Jalil Muntaqim, who we featured an interview with in our last episode: Black Panther Party political prisoner Herman Bell was viciously assaulted by guards at Great Meadow Correctional Facility (Comstock) on September 5, 2017. While being “escorted” by a guard back to his housing unit, a guard struck Herman, age 69, in the face causing his glasses to drop to the floor. This same guard then repeatedly punched Herman about the face, head and body. Responding to a commotion, 5-6 other guards arrived and joined in the assault. One of them was able to knee Herman in the chest causing two cracked ribs. Another guard took out a bottle of mace and sprayed it all over Herman's face, eyes and mouth. Herman was then taken to the prison infirmary. X-rays have confirmed fractured ribs. Herman's left eye is damaged from the mace and blows. He has bruises to his body and is suffering headaches, a sign of a possible concussion. Herman Bell has now been charged with “assault on staff”. Defying common sense, they allege that Herman, for no apparent reason, slapped the guard escorting him. He did this, they claim, in a location out of the view of all inmates but in the presence of other guards. He is now in the Special Housing Unit (box) at Five Points Correctional Facility where he was transferred after the incident. Herman Bell has not had a disciplinary violation in over 20 years. He was scheduled to begin a three day family visit with his wife a few days after the incident, their first such visit in over 2 1/2 years. In addition he is to appear before the parole board, for the 8th time, in February 2018. Herman has, however, been the target of guard harassment due to his political background. Visitors report that guards processing them and in the visiting room comment that they are visiting a “cop killer” or “terrorist”. Some guards have been seen passing around the book “Badge of the Assassin” written by Herman's prosecutor. At this time, we are encouraging everyone to take the time to write to Herman or send him a get-well card, so that the authorities know we are paying attention and are concerned for Herman. Stay tuned for updates as we develop this campaign. Herman Bell's new address is: Herman Bell #79C0262 Five Points Cor. Fac. P.O. Box 119 Romulus, N.Y. 14541​ 2018 Certain Days Calendar I'd like to quickly announce that the 2018 Certain Days: Freedom For Political Prisoners Calendar has just been posted as ready for pre-order. The calendar is a joint fundraising and educational project between outside organizers in Montreal, Toronto, and New York, in partnership with three political prisoners being held in maximum-security prisons in New York State: David Gilbert, Robert Seth Hayes and Herman Bell. The proceeds from Certain Days 2018 will be divided among these groups: Addameer Prisoners Support and Human Rights Association (Palestine), Release Aging People in Prison (RAPP) and other groups in need. More info on the project and where to sign up is at certaindays.org T-Shirt Designs For all you artistically minded listeners out there, who would like to see their art worn by people (potentially) all over the world, The Final Straw is looking for tshirt desgins! If you like the show, or love it, or just think it's ok-ish but like to make designs then this challenge is for you. We will be accepting submissions until the (end of November), and lest you think this is a one way street, the winner of this challenge will recieve a special prize from each of us (Bursts and William) of a personal and one of a kind mixtape which will include all sorts of audio goodies. Runners up will also get prizes, so never fear there's no heirarchy here. Want in?? Just email your submission and any relevant info to thefinalstrawradio@riseup.net and keep your ears peeled for the winner announcement. Show Notes begin in vain For a starter on COINTELPRO, check out the wikipedia page on the topic. The Whisper Systems (Signal) case referenced concerning user data disclosure to government is explained by WS folks. Also, here's a link to Weapons of Math Destruction, the book by Cathy O'Neil that William references. Doxxing Anti-Repression Committee in the Bay deals with, among other things, doxxing by the far right in order to build charges against anti-racists. Discord Chat logs leaked from the Far Right prior to and after #Charlottesville on Unicorn Riot. Oh Crap! What Now? digital security page Time to Beef Up Defense Against Far Right Doxxing Equality Labs released this dope guide to safer practices which overlaps with a lot of the interview and links presented here In case it's too late, check out Crash Override Network‘s guide to post-Doxxing mitigation Bigger Toolkits That One Privacy Site The EFF‘s Security Self Defense Guide Riseup‘s offerings on safer practices and tools Device Safety Your Phone is a Cop part one and two On the topic of vulnerability markets, zerodium.com/program.html got brought up. Specific Tools PGP Enigmail for is an add-on to the Thunderbird email client that makes creating a pgp key set easier. The Onion Router (TOR) produced this really great package for safer browsing called the Torbrowser package. TAILS is a portable operating system so you can operate a computer and leave less traces Signal is a phone app for end-to-end encryption available for iphones, android phones and desktops. HTTPSEverywhere is a useful add-on for your web browser VPNs One VPN intro, including links to clients you can use, can be found at riseup VPN services to check out https://www.mullvad.net/ https://www.privateinternetaccess.com/ Online Presence One tool mentioned to help minimize your online presence is DeleteMe by ABINE.com Data Brokers you may want to scrub yourself from include: Spokeo BeenVerified PeekYou PeopleFinders Various other nefarious tech the state and non-state actors may deploy IMSI catchers, or phone spoofers, include the name-brand Stingray. The ACLU has this little site that allows you to see what law enforcement agencies they know to have (and probably use) them! In reference to the Automatic License Plate Readers mentioned by William, here's an article on the subject Playlist here

The Ars Technicast
Ars Live Episode 10: tech, security and immigration

The Ars Technicast

Play Episode Listen Later Feb 23, 2017 44:11


Ars Technica's podcast continues with a series of live discussions about today's science, tech and culture recorded at Longitude, Oakland's premier tiki bar. Ars Technica's Cyrus Farivar and Annalee Newitz spoke with UC Hastings law professor Ahmed Ghappour, an expert in national security and cybersecurity, about what exactly are your rights at the border, and should you really hand over your social media passwords to a customs agent? Learn more about your ad choices. Visit podcastchoices.com/adchoices

Class Bytes News Cast
2017 01 04 Yahoo Dies, Alexa Murder, Stop Ransomeware & Computer Tech Security News

Class Bytes News Cast

Play Episode Listen Later Feb 17, 2017 7:56


Quick NewsCast for Jan-04-2017 Topics discussed: Ransomfree https://ransomfree.cybereason.com/ 8-bitguy - NES Zapper https://www.youtube.com/watch?v=Nu-Hoj4EIjU Amazon Alexa murder warrent http://www.foxnews.com/tech/2016/12/28/amazon-alexa-data-wanted-in-murder-investigation.html People are staying with Yahoo - despite security concerns http://www.sfchronicle.com/business/article/Plenty-of-users-sticking-with-Yahoo-despite-data-10827710.php VPN Pen testing lab with Kali Linux & pfSense http://resources.infosecinstitute.com/setting-up-a-vpn-based-penetration-testing-lab/ Help out the EFF! https://www.eff.org/

Through the Noise
#240 National Tech Security Coalition - Patrick Gaul

Through the Noise

Play Episode Listen Later Jan 30, 2017 55:04


As our reliance on technology grows, our need for information security continues to evolve and so we've invited Patrick Gaul, Executive Director of the National Technology Security Coalition to join us on Through the Noise. We address "Security fatigue," a troubling problem for professionals who work to keep corporations and organizations safe from hackers and industrial espionage. If you've wondered if your organization is equipped to deal of the rapidly changing technological landscape, Patrick Gaul's decades of experience are a great place to start. 

The Options Insider Radio Network
Trading Tech Talk 2: Hackers and Rogue Algos

The Options Insider Radio Network

Play Episode Listen Later Feb 13, 2014 60:24


Trading Tech Talk 2: Hackers and Rogue Algos Hot Topics in Tech: Security of Financial Platforms Should we expect more attacks in the future? Is this the new norm going forward? What sort of realistic uptime expectations should institutional clients, end users of exchanges and vendors have in this environment? Are we approaching a point where retail clients should maintain multiple brokerage account to ensure access at all times? While the recent OPRA problem was limited to NASDAQ OMX, it highlights the issue of the entire industry fixating around a single point of failure. What risks does that pose to the marketplace? How do we address that as an industry? Rogue algos are not just the domain of equities and options anymore; futures are now under attack as well.   The Inbox: We're taking your questions Question from Amac:  Is there a way for small traders to see or get access to big options shows via IM? Seems like I am missing much of the picture. Question from T. NorvinUESTION:  What exactly is a sweep order? Can a sweep be used to lift liquidity without moving markets? I.e. Buy 10 on all vs. 100 on one exchange? The Lightning Round: A minute to win it Should customer open multiple brokerage accounts to avoid security risks? The industry will have a backup/alternate to OPRA in place by the end of 2014 - Yea or Nay? Will every major derivatives exchange experience some sort of systems outage/glitch in 2014? Will microwave transmission gain a foothold in the U.S. financial markets in 2014?

Trading Tech Talk
Trading Tech Talk 2: Hackers and Rogue Algos

Trading Tech Talk

Play Episode Listen Later Feb 12, 2014 60:24


Trading Tech Talk 2: Hackers and Rogue Algos Hot Topics in Tech: Security of Financial Platforms Should we expect more attacks in the future? Is this the new norm going forward? What sort of realistic uptime expectations should institutional clients, end users of exchanges and vendors have in this environment? Are we approaching a point where retail clients should maintain multiple brokerage account to ensure access at all times? While the recent OPRA problem was limited to NASDAQ OMX, it highlights the issue of the entire industry fixating around a single point of failure. What risks does that pose to the marketplace? How do we address that as an industry? Rogue algos are not just the domain of equities and options anymore; futures are now under attack as well. The Inbox: We’re taking your questions Question from Amac: Is there a way for small traders to see or get access to big options shows via IM? Seems like I am missing much of the picture. Question from T. Norvin: What exactly is a sweep order? Can a sweep be used to lift liquidity without moving markets? I.e. Buy 10 on all vs. 100 on one exchange? The Lightning Round: A minute to win it Should customer open multiple brokerage accounts to avoid security risks? The industry will have a backup/alternate to OPRA in place by the end of 2014 - Yea or Nay? Will every major derivatives exchange experience some sort of systems outage/glitch in 2014? Will microwave transmission gain a foothold in the U.S. financial markets in 2014?

Connecting Tech with Evan Gilmore
April 27, 2010 - Android News, Tech Security, and Chinese Concert Pianists

Connecting Tech with Evan Gilmore

Play Episode Listen Later Apr 27, 2010


On today's show, Android is the main topic. There's lots of news related to Google's OS, as well as some stories of tech security breaches to make us more paranoid than we already are. Links from today's show are below: • Update: Google Navigation isn't coming to the iphone just yet • Android market has over 50,000 apps • The Nexus One isn't coming to Verizon, Google Recommends HTC incredible instead • Auto app updates in Android 2.2 • Blippy leaks users' credit card numbers • Photocopiers may be retaining your private documents • Lang Lang plays an iPad at Davies Symphony Hall in San Francisco