Firewall public
[search 0]
Plus

Téléchargez l'application!

show episodes
 
F
Firewall

1
Firewall

Firewall

Unsubscribe
Unsubscribe
Chaque semaine+
 
Tech, politics and culture are the subjects of Bradley Tusk's free-wheeling, twice-weekly podcast. He brings you inside the room where entrepreneurs, investors, policy makers, strategists and journalists reveal what's really on their minds.
 
Join Mike Krupka and Davin Bateman from OccamSec as they dive into various Information Security topics with members of our team as well as experts from the greater worldwide security community. We'll discuss and debate security issues and trends while infusing some fun along the way. From novice to professional, Burned by the Firewall is meant to be a quick, accessible and valuable podcast experience for all.
 
A new podcast powered by Experian Partner Solutions. Join hosts Cody Gredler and Morgan Grevey as they speak with leading security experts and share their unique experiences and insights to keep listeners—and their identities—safe from cybersecurity threats.
 
Loading …
show series
 
Facebook had a horrible, no-good, very bad week. Not only did Facebook, Instagram and WhatsApp go completely offline for about six hours, a whistleblower came forward to show the world what most of us already knew: Facebook values money over its users’ well being. And I have another story that backs that up, as well – one that you almost surely did…
 
Join Mike as he speaks with Vince Hoang, CISO, Office of Enterprise Technology Services for the State of Hawaii! Vince discusses his roots in system administration, his transition to networking to enter into the security world, and how he made his way to his current role with the State of Hawaii. The duo discuss some of the challenges that are face…
 
Ransomware infections have been rampant in recent months. But typically, we hear more about the aftermath then what leads to a successful attack. In this episode we get the other angle. Sophos VP of Managed Threat Operations Mat Gangwer shares the multi-week story of an attack, from unpatched vulnerability to execution. The responsible ransomware c…
 
Today I have the great honor and pleasure of speaking with two luminaries in the field of privacy: Michelle Finneran Dennedy and Melanie Ensign. Between them, they have decades of experience managing privacy processes, policies, technology and communications within dozens of big name tech companies. I get their unique perspective on data privacy an…
 
I admit it. I’m an Apple fan. Are they perfect? Definitely not. But in most cases, they’re actually trying to be good. And at the end of the day, their business model doesn’t rely on hoovering up your personal data. Apple just released a big update to its devices, iOS 15, and it’s got some really cool security and privacy features. I’ll tell you al…
 
Zero-trust is the hot term in network security in 2021. But one reason it's so highly sought out is that many don't know exactly what it means. We called on Fortinet Senior Director of Product Marketing Peter Newton to shed some light on the subject. Peter discusses what makes a zero-trust network philosophy, what steps a company should take to pla…
 
Apple was set to roll out controversial new on-device scanning technology in iOS 15 last week, but thanks to pushback from groups like the Electronic Frontier Foundation and people like you, Apple has since thought better of it and backed down. It’s not clear when or if these “child safety” features will come to iPhones, but in the meantime we can …
 
It’s really easy to complain about the sadly insecure state of many of our products and services, but the fact is that doing security right is hard – even when you’re trying to get it right. Part of the problem is that there are just so many things to secure, even on a single product or service. Today we’re going to discuss several recent security …
 
Many if not most workers began working from home in March of 2020, and while the numbers have shifted since, a significant portion are still doing at least some remote work. But according to a survey, neither the remote workers or their company IT staff are too happy about the cybersecurity of it all. For our featured topic this episode, we dive in…
 
Lisa Quigley, a former Hill staffer and advocate for poverty programs, joins Bradley to discuss the Biden administration's $3.5 trillion spending package — which pieces of it represent major structural change and which throw money at business as usual. Plus, the latest on Apple, why there could be an exodus from Austin and tips on how to do a milli…
 
Ever paired your phone to a rental car? Did you erase all the data from the last car you sold or turned in at the end of your lease? Do you know what data you car is sending to the cloud wireless right now? Cars have become a privacy nightmare. Andrea Amico is the founder of a company called Privacy 4 Cars and today he’ll help us understand all the…
 
For many people, privacy is just a vague concept. But it can literally be a matter of life and death. It deserves your attention, your consideration and (crucially) your support. Technology has vastly improved our daily lives, but some of it also threatens to undermine our basic human rights and even our democracy/society. We need to understand the…
 
What will it take for Wall Street and Washington to get smart about crypto and the future of currency? Bradley sits down with crypto guru Anthony Pompliano to talk about why "a native currency of the Internet" is so frightening to legacy players — and so unstoppable. "I wouldn't want to be the person who's short the industry," says Pomp, "whether I…
 
Mike is joined by Matthew Mauzy, Emergency Response Technology Manger at UNC Chapel Hill and Chief at South Orange Rescue Squad, to discuss the challenges that the higher education and public safety sectors face now, how the last 18 months have reshaped the operating models, and the threats (and opportunities) that are on the horizon as we move int…
 
We previewed cyber security policy under President Biden at the beginning of 2021. But a lot of big things have happened in cybersecurity since then, making now seem a pretty good time to check in on where things stand. So we brought in an expert to help: NextGov's Mariam Baksh. Mariam tells us about the latest developments from the White House rel…
 
Computers are supposed to be completely predictable. When you tell it to do something, it should do exactly that – over and over again, if necessary – in the same way, with the same result. This is the nature of computer programming. But this predictability can allow computer criminals to interrupt a computer’s processing and divert it to do nefari…
 
The best start-ups are grounded in timeless values, argues Michael Eisenberg, general partner and co-founder of the Israeli venture firm Aleph and the author of the new book The Tree of Life and Prosperity: 21st Century Business Principles from the Book of Genesis. "This is not corporate charity," Eisenberg tells Bradley. "We can build large busine…
 
Or maybe not. Once upon a time, September was to mark the great return-to-the-office moment, but how's that looking? Bradley breaks down what the work-from-anywhere revolution means for employees, entrepreneurs and policymakers. Plus a quick analysis on how the "mod quad" dust-up and the messy exit from Afghanistan are affecting the Biden agenda.…
 
How far would you go to protect your children from sexual predators? How much privacy would you give up to try to prevent the sharing of child pornography? We are now faced squarely with those questions because Apple has just announced some new initiatives that it believes will curb the viewing and sharing of pornographic images. But we need to be …
 
While ransomware has taken center stage for several months now, bad actors aren’t resting on their laurels with existing tools. Threatpost Senior Editor Tara Seals joins us to discuss a newly discovered malware, dubbed Chaos. We talk about what it resembles, what it may do, and why you should be worried. Plus, Tara tells us why the Friends reunion …
 
Loading …

Guide de référence rapide

Google login Twitter login Classic login