Feb 15, 2020 | Applications, Best Practices, Business, CEO, Compliance, credential stealing, Hacking, Internet, Intricate Data Systems, Legacy Systems, Patching, Radio Show, Radio_Show, Regulatory Compliance, Regulatory Frameworks, Security, Security, Security Alerts, Shadow-IT, Software, Software As A Service, Software Manufacturers, Technology, Third - Party, third-world, Threats, Updates
Shadow-IT: Employees putting Business at Risk There are robust computers in every employee’s possession. And they carry them everywhere. Yes, I am talking about their cellphones. On these devices, they can download 1000’s of apps. These apps allow them to create...
Aug 6, 2018 | Podcast, Radio Show
Uber drivers live streaming rides. Drone Assassination Attempt in Venuezula.: AS HEARD ON: News Radio 610 NH Today [08-06-2018] http://traffic.libsyn.com/cptt/2018-00-00-AS_HEARD-2018-08-06-wgir-uber_drivers_live_streaming-drone_assasination_attempt.mp3 DOWNLOAD...
Aug 4, 2018 | Business, Internet, Radio Show, Security
Ridesharing livestreams on Twitch raise privacy worries (update: Uber cuts access) When you step into a ridesharing car, you probably assume that whatever you do inside the vehicle won’t be recorded for posterity. But what if it turned out that you were not only...