"Data at Rest" is an accessible but informed discussion of current concepts, best practices, and personal experiences in computer security, network security, and information security overall, including interviews with expert guests and the history of each topic.
Recorded in front of a live audience at UNC CAUSE in October, 2022!
The Zero Trust Framework raises valid questions about risk reduction. But, as one CISO used to say, "we have to trust someone even…
Charlie and Michael are joined by Drew Trumbull, Incident Handling Team Lead for UNC Chapel Hill's Information Security Office, to talk about the latest threats we see and what folks should do if the…
Security and privacy are often mentioned hand-in-hand in our industry, but they're actually very different fields with different considerations and concerns--and the policies applying to one are not …
Charlie and Michael have discussed communicating security risks and strategies to older users and at-risk users, but what about students and younger users? We welcome guests Lila Davidson and Louise …
Anyone who works in information security knows that we, perhaps more than any other IT sector, are reliant on a forest of vendors, each promising the moon and often duplicating others' capabilities. …
Contact us:
Musical credit:
Pixelland Kevin MacLeod (incompet…
Charlie and Michael discuss what "blockchain" means, its slightly mysterious history, its best-known applications, and their unfiltered opinions on the anciliary effects of some uses of this otherwis…
Charlie and Michael take a conversational look at a few fundamentals of security it never hurts to revisit and review.
Contact us:
Musical credit:
Pixelland Kevin MacLeod (incompet…
Online and phone-based scams are everywhere. Do you keep getting phone calls about your car's extended warranty? Do you get text messages offering to buy your house? Or did a seller in an online stor…
Mobile Security is an evergreen concern and it only gets bigger and more mystifying. Charlie and Michael welcome back unofficial co-host Jared Perdue to discuss wireless and mobile security now and i…
Social media can feel like a nonstop shouting match. But what if you found out half the screaming voices aren't even real people but are, in fact, bots designed to make you feel alienated, angry, and…
Join Charlie and Michael as they present to UNC CAUSE 2020 about ways to create meaningful connections and continue to develop user awareness in an era of teleconferencing and telecommuting.
Contact …
Listen in as Charlie and Michael present at InfoSeCon 2020 on what to consider when relocating a workforce en masse and then get left without adult supervision for the last few minutes of the panel. …
SCADA systems are the computers that control industrial systems in the real world. That may sound like a dry topic, but it's chock full of risk and fascinating stories, some of them ripped from very …
Many of us have people in our lives who may be particularly vulnerable to information security risks. How do we help those folks stay safer online, avoid scams, and otherwise protect themselves? Char…
Free and Open-Source Software is popular, but are they secure? The answer is: yes, maybe. Join Charlie, Michael, and Casey as we discuss how to navigate participating in the innovation of FOSS while …
Join us as we discuss 2020: A Year That Existed!
Musical credit:
Pixelland Kevin MacLeod (incompetech.com) Licensed under Creative Commons: By Attribution 3.0 License http://creativecommons.org/licen…
Our second request of the season! Close out Season Three with Charlie and Michael as they discuss the concept of "shadow IT," the dangers it presents, and why there's that saying about a road paved i…
A panel of folks from across the University discuss Gene Kim's The Unicorn Project.
Musical credit:
Pixelland Kevin MacLeod (incompetech.com) Licensed under Creative Commons: By Attribution 3.0 Licen…