Unraveling the technology that affects us all but that few of us understand, in a format to give you a basic understanding in the time it takes to drive to and from the grocery store.
The week after #RSAC2022 seems to be a good time to start a new season of Crucial Tech, so here we go.
I talked to a lot of people at the conference about how to keep foreign agents out of your netwo…
I'm going to the RSA Conference in San Francisco this week, so I didn't do a full episode yet. This is a preview of what's to come so stay tuned.
The realities of cyberattacks are not going away. Based on what we know, we have no idea how big the problem is because a lot of individuals and organizations just don’t report attacks. Conservativel…
Joe Basques and I took our time to talk about personal priorities in cybersecurity and in the process we ended up talking about secure browsers, privacy, abortion, state surveillance and recalling re…
The SEC is considering requiring corporations provide a board seat to the CISOs. It's something I've seen as long overdue especially considering how security illiterate most boards are. And in the st…
Woke up this morning to the news that high-flying quantum cryptography company, Arqit, is being hit with fraud lawsuits in the UK and US throwing shade on the viability of its technology. In preparat…
Much of the West has feared Russian aggression since the Cuban Missile Crisis 1962. Then it was their technologically superior military. Most recently it’s been their vaunted cyber warfare capabiliti…
This is the day you should not just THINK about backing up your data, but actually DO it. It really isn’t that hard. It can be done while you re getting a cup of coffee. It can be done automatically,…
If you aren't a regular reader of Cyber Protection Magazine, shame on you. But this podcast might change your habits. We've created a list of secure messaging apps for you in the accompanying article…
Cyber warfare has been an open secret for many years, but the conflict in Ukraine has brought it out into the open and includes more than government-sponsored hacking. Anonymous took out the broadcas…
The security of our schools is always a concern. Many have been targeted by criminals with ransomware, so when a PR rep talked me into an interview on "What teachers need to know about cybersecurity?…
Social Media companies have no real incentive to reduce the vitriol that fills their servers. The fact is that content that makes people angry is what drives engagement... and engagement means advert…
Biometrics is something of a broad topic because it relates to any piece of information about you connected to your body that can be used to identify you. That includes fingerprints, DNA, eyes, voice…
Personal data isn’t just about your name, phone number, credit cards and social security numbers. It’s also about your online habits. All that stuff is recorded, filed and analyzed by various compani…
This was one of the scarier interviews I’ve done on this podcast. I’m talking with Paul Smith, country manager for Sweeft Digital, a UK agency helping companies manage their digital presence, includi…
Welcome to the first episode of our fifth season and the first of 2022. Last year ended in a flurry of announcements, disasters, progress and new technology designed to keep us more secure and our la…
At the 58th annual Design Automation Conference in San Francisco, it seemed, at long last that the semiconductor industry is considering making their products secure, if only because they are being f…
A few weeks ago we did a video demonstration of the Fletch.ai on the Cyber Protection Magazine Youtube channel, but wanted to share just the audio portion in this week's podcast because it's a solid …
We interviewed Jen Caltrider of the Mozilla Foundation about the fifth annual Privacy Not Included list the foundation publishes annually and if you are thinking of buying some electronics as gifts o…