Apr 2, 2021 | Access Controls, Anti-Spoofing, Bitcoin, Business, Cryptocurrency, Fairphone, Federal Reserve Notes, Government, Hacking, Malware, News, Personally Identifiable Information, Podcast, Qualcomm, Radio Show, Radio_Show, RDP, Security, Security Alerts, Semi-Conductor, Show Notes, SMS, Supply Chains, Technology, Tesla, Twitter, Vulnerabilities
Read. Learn. Share. Tech Talk Show Notes April 3, 2021 Teen who hacked Twitter accounts of Musk, Obama for Bitcoin gets 3 years in prison The hacker behind last year’s big Twitter hack has just been sentenced to hard-time. Graham Ivan Clark, the teenage hacker who...
Mar 5, 2021 | Access Controls, anonymity, Attack Vectors, Best Practices, Big Tech, Breaches, Business, Chromebook, Coinseed, Compliance, CPU, CPU, credentials, Cryptocurrency, Cyber Liability, Cybersecurity, Google, Government, Hacking, Internet, Malware, News, Passwords, Patching, Podcast, Radio Show, Radio_Show, Security, Security, Show Notes, Social Media, Social Media, Social Networking, SolarWinds, Technology, Updates, Vulnerabilities, WhatsApp, Zero Trust
Read. Learn. Share. Tech Talk Show Notes March 6, 2021 Embracing a Zero Trust Security Model As cybersecurity professionals defend increasingly dispersed and complex enterprise networks from sophisticated cyber threats, embracing a Zero Trust security model and the...
Feb 19, 2021 | Access Controls, Apple, Applications, Apps, Artificial Intelligence, Attack Vectors, Authentication, Big Tech, Bitcoin, Breaches, Business, Credentials, Cryptocurrency, Cryptocurrency, Cryptomining, Cyber breaches, cyberattacks, Cybercrime, Cybersecurity, Employees, Financial, Firewalls, Google, Google, Google Play Store, Government, Hackers, Hacking, Human Element, Infrastructure, Internet, Legacy Systems, Malware, Malware, Microsoft, Microsoft, Monitoring, NASA, Networking, News, Patches, Podcast, President Joe Biden, Radio Show, Radio_Show, Regulatory Frameworks, Security, Security Alerts, Show Notes, Software, Technology, Technology, trojans, updates and patches, Utilities, Vulnerabilities, Windows (Microsoft), Zero Trust
Read. Learn. Share Tech Talk Show Notes February 20. 2021 Breached water plant employees used the same TeamViewer password and no firewall The Florida water treatment facility whose computer system experienced a potentially hazardous computer breach last week used an...
May 2, 2020 | Access Controls, Business, Corporate Reputation, Cybercrime, Cybersecurity, Dark Web, Data Loss, Employees, Exploits, Hacking Tools, Inside Information, Internet, Malicious Insider, Marketplace, Radio Show, Radio_Show, Security, Technology
Malicious Insiders Monetize Their Knowlege Using Dark Web Have you considered that you may have those inside your business who would do you harm? Cybercrime is no longer for hackers. The dark web has provided an outlet for information supplied by insiders to raise...
Apr 4, 2020 | Access Controls, Attack Vectors, Business, Cybercrime, Cybersecurity, Government, Hackers, Internet, intrusion tactics, Malware, Mobile, Networking, Privacy, Radio Show, Radio_Show, Regulatory Compliance, Remote-Work, Security, Technology, Technology, Vulnerabilities, Zero Trust, Zero-Day
Introducing Zero-Trust Access Working remotely has been a reality for many knowledge workers for many years, enabled by the growth and development of the Internet, Wi-Fi connectivity, and mobile computing devices. Indeed, it was this trend that powered the...
Mar 7, 2020 | Access Controls, Anonymity, Applications, Best Practices, Business, Compliance, Critical data, Data Loss, DNS over HTTPS (DoH), Domain Name Service, Employees, Executives, Filtering, Internet, Intricate Data Systems, Patching, Policies and Procedures, Privacy, Radio Show, Radio_Show, Regulatory Compliance, Security, Security, Security Alerts, Technology, Technology, TOR, Updates
DNS over HTTPS (DoH) is not the Panacea the Marketers Are Leading you to Believe Mozilla Firefox is promoting its new DNS over HTTPS (DoH) as a privacy-preserving method, but in reality, it is changing how DNS works. Its not the magical user privacy cure but marketing...