"Data at Rest" is an accessible but informed discussion of current concepts, best practices, and personal experiences in computer security, network security, and information security overall, including interviews with expert guests and the history of each topic.
Michael goes down the rabbit hole of the history of modern networks and network security, and Charlie and Michael discuss different network-based attacks and how to defend against them.
Musical cred…
Charlie and Michael are joined by three of their colleagues - Tiffany, Glenn, and Drew - to talk about the different roles in UNC Chapel Hill's Information Security Office and how those roles interse…
Charlie and Michael had the honor of presenting a talk at the Hackers on Planet Earth 2020 conference. This one's on how to welcome new folks into the information security industry and some specific …
Charlie and Michael talk to our office's resident members of CLOUD FORCE(!) about cloud security.
Musical credit:
Pixelland Kevin MacLeod (incompetech.com) Licensed under Creative Commons: By Attribu…
Our colleague and listener Mark requested we cover Biometrics, and Michael loved reading up on this topic! Join in while Michael meanders down the twisting road of the history of trying to use people…
Charlie and Michael wrap up the "Zoomisode" mini-season with an Episode X all about what's coming in Season 3!
Scam emails playing on COVID-19 concerns to steal charitable donations, relief payments, or your credentials: they're happening, and are simply the most recent example in the long history of what are…
Join us for a quick, straightforward discussion of simple steps you can take to reduce risk if you're one of the many people now working from home - and perhaps doing so for the first time.
Links for…
Charlie and Michael recap and revisit the season and a couple of follow-up items, then preview Season Three!
Reminder: we're doing a book club episode in Season Three! Read The Unicorn Project if you…
Jared Perdue joins Charlie and Michael talk about the risks to keep in mind when travelling: “burn books,” encryption concerns, and legal risks.
Travel Safely with Technology (safecomputing.unc.edu)
Charlie and Michael are joined by colleagues and partners from around campus - Bryan Andregg (IT Security & Systems Manager, UNC Gillings School of Public Health), Mark Ingram (IT Infrastructure & Su…
Data at Rest 02x04: Project Management
Brenda Carpen, MBA PMP, IT Project Manager for ITS Infrastructure & Operations, joins Charlie and Michael to discuss the history of project management, current …
Data at Rest 02x03: Disinformation
Charlie and Michael are joined by Professor Deen Freelon of UNC’s Hussman School of Journalism and Media and UNC’s Center for Internet, Technology, and Public Life,…
Data at Rest 02x02 - Internet of Things
Charlie and Michael discuss the history of people connecting unexpected devices to the Internet, how to secure them, and what to do when your dog camera goes t…
Data at Rest 02x01 - Communications & Social Media
Kate Hash, UNC ITS Assistant Vice Chancellor for Customer Experience and Engagement and ITS Chief of Staff, joins Charlie and Michael for a discussi…
Data at Rest 01x09: 2019 End of Year Special
Join us for a discussion of the trends and big stories from Information Security in 2019, our predictions for 2020, and a fun history lesson on the origin…
Data at Rest - Episode 01x08: Episode X
Welcome to the end of Season One! We give some updates on earlier episodes and topics, talk about Season Two, and get in a few laughs before signing off. Thank…
Data at Rest - Episode 01x07: Popular Culture
Movies and TV! How is Information Security represented in popular culture? What movies or shows or comics or books influenced us to get into this field? …
Data at Rest - Episode 01x06: Ethical Hacking
Is there such a thing as "ethical hacking"? What does it mean? How can you gain the benefits of it, and what should you keep in mind if you engage with o…
Data at Rest - Episode 01x05: Working in Information Security
How did we get started in Information Security? If you're in Information Security, what certifications are good to advance your career? A…