Unraveling the technology that affects us all but that few of us understand, in a format to give you a basic understanding in the time it takes to drive to and from the grocery store.
As I've said before, I get a lot of "studies" and "surveys" from cybersecurity firms with breathless and urgent warnings about a coming cyber-pocalypse of one sort or another. Funny thing, it's alway…
The DDoS attack on X.com this week provided a certain amount of schadenfreude for people less than enamored by Elon Musk. It also rang alarm bells in the cybersecurity community as that style of atta…
I get a lot of "studies" about the state of cybersecurity and most of them are poorly done. In Episode 10.8 I talked about one I like, from Huntress and the week it came out I got pitched another re…
Artificial Intelligence is all the rage right now with broad claims about how it is going to change the world as we know it. I have my doubts about the hype and so does Bob Ackerman, the granddaddy o…
Today we are talking about insurance and government regulation... No! Wait! It's good stuff so bear with us.
As the US administration seems intent on dismantling government protections in cybersecutiy…
Phishing attacks are on the rise again with the help of sophisticated generative-AI tools. But new defenses and increased wariness among potential victims are blunting the potential for widespread ha…
I am very far behind in writing stories and making podcasts. The events since January 20 have made it difficult to keep up. But today, while walking downtown I came across a brand-new independent boo…
This week, we are talking to a lawyer. Maryam Meseha is a founding partner of Pierson Ferdinand LLC, a relatively new and large firm dedicated to digital security.
In the first few weeks of the year,…
I've had several discussions about the nature of censorship, the freedom of speech and moderation and I came to the realization that most people have no idea what sociial media moderation is. So I di…
James Bore is a cybersecurity consultant, speaker and publisher based in the UK. He has a refined sense of cynicism that clicks with my own, so we've been chatting back and forth for several months o…
For about two years, the team at Cyber Protection Magazine has debated whether Meta platforms (Facebook, Instagram and *shudder* WhatsApp) were valuable or even necessary for the reach of our magazin…
We open a new year and a new season with our friend, Ian Thornton-Trump, chief information security officer at the MSSP Inversion6 and in 30 minutes we take on some pretty meaty subjects.
First we d…
The available guests for this last podcast of the year dried up pretty quickly so I thought I would give some closing thoughts on a big issue facing the world: Trust and the lack of it.
Also, our las…
Our friends at Fletch provide a grand slam of threats for Thanksgiving week, covering Apple, Android, AWS and Microsoft vulnerabilities
No regular podcast this week but we will be back next week with…
This is part two of our mashup of recent surveys. This time we talk with Tom Tovar, CEO of Appdome about their comprehensive annual survey of consumer attitudes regarding security in digital technolo…
This week, a two-parter. I’m still trying to make sense of all the surveys and studies sent to me. Between trying to figure out if they are plagiarized, use inadequate samples, are a lame attempt at …
I received more than dozen studies and reports on the "state of cybersecurity" all with different foci depending on the company that was pushing the document. It seems like they are replacing press r…
Here's our top three threat reports for the week. Hackers are targeting gambling apps on mobile devices and obsolete Microsoft products. Thanks to the folks at Fletch for the info
Our friends at Fletch.AI dropped a bunch of threat reports this week, here's what we see as the top three.