Aug 18, 2024 | Cloud
đ Today, we’re going to unravel the mysteries of cloud computing. It’s time to bust some myths and get to the truth about the cloud. So, grab your digital surfboard, and let’s ride the waves of cloud knowledge! What’s the Cloud Anyway?...
Apr 30, 2021 | Apple, Automation, Automotive, Best Practices, Big Tech, Business, Cloud, Cloud, Cloud Vendors, CPU, Critical data, Cybercrime, Data, Databases, Emotet, FCC, Government, Hackers, Hacking, iMac, Internet, Laptops, Law Enforcement, Mac Pro, MacBook, Monitoring, News, Podcast, Police, Proprietary Design, Radio Show, Radio_Show, Ransomware, Ransomware, Security, Security, Security Alerts, Show Notes, Skyrocketing Ransoms, SpaceX, Starlink, Technology, Unsecured
Read. Learn. Share. Tech Talk Show Notes May 1, 2021 Lyft is getting out of the self-driving business Lyft has sold its self-driving division to a Toyota subsidiary called Woven Planet for $550 millionâthe latest sign that it takes deep pockets to compete in the...
Feb 24, 2021 | Cloud Jacking
Our businesses had to rush to get employees and contractors working from home. But at what cost? I examine the latest example, the attempted poisoning of an entire town. What can businesses do to help ensure their ability to survive storms, computer failures, and...
Jan 29, 2021 | Applications, Automation, Automotive, Big Tech, browsers, Chrome, Cloud, Cloud Jacking, Cyber breaches, Cybercrime, Cybersecurity, Data Aggregator, Data Brokers, DIA, Dragnet, Edge, GeoFence Warrants, Government, Hackers, Hacking, Hacks, Internet, Law Enforcement, Location Data, Malware, Nationstates, North Korea, Passwords, Privacy, Radio Show, Radio_Show, safety, Security, Security, Show Notes, Spyware, Technology, trojans
Read. Learn. Share TECH TALK SHOW NOTES January 30, 2021 Cloud Jacking: The Bold New World of Enterprise Cybersecurity Those with their finger on the pulse of emerging cybersecurity threats are already aware that there’s a new danger in town: cloud jacking. The...
Apr 25, 2020 | Applications, Business, Cloud, Collaboration Tools, Cybercrime, Cybersecurity, Hackers, Hacking, Internet, misconfigured environments, Patching, Radio Show, Radio_Show, Security, Security Alerts, Technology, Technology, Updates, Zoom
Your Zoom Account is Worth One âCopperâ to Hackers Zoom has gained popularity during this pandemicâs require shelter in their homes. However its widespread use has unveiled to many the privacy and security issues inherent in this platform. These inherent...
Apr 18, 2020 | Anti-Virus, Applications, Artificial Intelligence, Asset Management, Attack Vectors, Audit Logs, audit logs, Big Tech, browsers, Business, Cloud, Cloud, Compliance, Computers, Cyber breaches, Cyber Insurance, cyberattacks, Cybercrime, Cybersecurity, Data Assets, Data Loss, Data Storage, Databases, Domain Name Service, Incident Response, industrial espionage, Information Technology, Internet, Internet Infrastructure, Networking, Patches, Patching, Privacy, Radio Show, Radio_Show, Regulatory Frameworks, Security, Security Alerts, Software, Software Manufacturers, Technology, Technology, Third-Party, Updates, Updates, Web Tools
Time to Invest in Cybersecurity Every company no matter the size is at high risk for a cyberattack. With more and more third party and cloud business applications run the larger the risks which means that they must prepare for the next evolution of cybercrime. Much...