Unraveling the technology that affects us all but that few of us understand, in a format to give you a basic understanding in the time it takes to drive to and from the grocery store.
This interview with Warren Savage, guest researcher t the University of Maryland in IoT security is a follow up to an interview I did with him last year at the @DesignCon conference in Santa Clara. I…
2021 is quickly becoming the year we realize that supply chains are what make the developed world. SolarWinds, the Suez Canal, the worldwide semiconductor shortage, and the “snowpocalypse” in Texas h…
We talk to Harry Haramis, GM of Prime Key, about public key infrastructure (PKI) and certificate authority (CA), which may be the most boring technologies you come in contact with, but are foundation…
We started looking into insurance coverage for cyber attacks a few weeks ago and contacted analyst Maxine Holt of Omdium about it. And then more questions came after the talk. So this episode is a pa…
Securing an organization's data isn't easy, or cheap, but relatively tiny section of the cyber-protection industry, known as content disarm and reconstruction (CDR) might be a solid beginning. If onl…
If you are a small business hoping for a grant from California to stay alive during the COVID-19 lockdown, you need to listen to this podcast. The state has chosen to work with third-party financial …
There is important stuff in tech, and then there is stupid stuff. And lately the stupid stuff has been a bit more interesting. We take a look at four or the more interesting stupid stories.
For about 10 years the conventional wisdom about #ransomware was to just pay it and start improving your security. According to John Flory III, CISO for Harbor Networks, that just doesn’t work anymor…
As soon as the SolarWinds breach hit the news, press releases started pouring out of the cyber security industry with claims that their products or services would have prevented the breach, but talki…
We were going to do this after the first, but the queue is getting long with 2021 interviews and articles for Cybersecurity-Magazine.com so here's our Christmas gift to you.
Legislation, litigation,…
Before we get into be thankful of stuff on Thursday we need to get one thing off of our chest, namely the wasteful use of time and money spent on corporate awards programs that are nothing more than …
President-elect Joe Biden has been catching flack for stating that we will transition out of fossil fuel in favor of green energy, but that has less to do with government regulation and more to do wi…
In part three of this series, we take a look at the debate over Section 230 in Title II of the Federal Communications Act that is targeting social media political bias and discuss why it is a misdire…
In part two of our miniseries on journalism in a digital world, we take a look at the causes of bias in the press. Some of that is legitimate, but a lot of it is just personal perception and crowd th…
It is popular to say you don't trust the news media. Some of that distrust is valid, but few people can actually identify why. Joe Basques and I decided to do a deep dive into the subject in this epi…
Next week, on Crucial Tech, more about journalism and digital content than you've ever known.
I have talked to a lot of companies developing digital security devices and systems. Virus scans catch about 50 percent of the attacks at best but don't stop them from happening. Network equipment an…
Bob Frankston is an e engineer whose work has arguable been more responsible for how most people interact with the internet. You probably have never heard of him... but I have. After following Bob Fr…
Even the most security-conscious people and organizations get hacked, so it's not always something you can stop. We go back to talk with #Sectigo's VP of IoT security, Alan Grau to talk about how a s…