Mar 24, 2023 | Credentials, Cyber Security, Cybercrime, Podcast
https://craigpeterson.com/warfare/the-road-to-machine-learning-wars/36388/ First up, I have some sobering news. Almost all of our personal information has likely been stolen at one point or another. This could include our names, addresses,...
Feb 23, 2023 | Authentication, Best Practices, Business, credentials, Credentials, Cyber Security, Cybersecurity, Hacking, ID Theft, Microsoft, Microsoft, Password Managers, Passwords, Passwords, Privacy, Security, Security, stolen identity, Technology, Threats, Windows (Microsoft)
Locking down your files with a strong password is like putting a virtual lock on your front door. It helps protect your personal or sensitive information from prying eyes, cyber-attacks, or theft. Whether you’re sharing your computer with others or working in a...
Feb 22, 2021 | 5G, Announcements, App Store, Apple, Apps, Big Tech, Business, Cable Companies, Comcast, Comcast, Computers, Credentials, Critical data, Cryptocurrency, Cyber breaches, Cybercrime, Cybersecurity, data sharing, Drones, Drones, Executive Orders, Facebook, Facebook, Facial Recognition, Facial Recognition, False Positives, Government, Government, Hackers, Hacking, Hacking, Hacks, Intellectual Property Theft, Internet, Internet Service Providers, Location Data, Machine Learning, Malware, Malware, Media, Microsoft, Nationstates, Navigation, Netflix, Netflix, News, Online, predictive algorithms, President Joe Biden, Privacy, Radio Show, Radio_Show, Ransomware, Ransomware, Ransomware, Remote-Work, Security, Security, Show Notes, Social Media, Social Networking, Software Manufacturers, Streaming Entertainment, Surveillance, Technology, Technology, Third-Party, Tracking, Uncategorized, United States, Vulnerabilities, Warfare
Read. Learn. Share TECH TALK SHOW NOTES February 6, 2021 Drone Swarms Are Getting Too Fast For Humans To Fight, U.S. General Warns General John Murray, head of Army Futures Command, told a webinar audience at the Center for Strategic & International Studies that...
Feb 19, 2021 | Access Controls, Apple, Applications, Apps, Artificial Intelligence, Attack Vectors, Authentication, Big Tech, Bitcoin, Breaches, Business, Credentials, Cryptocurrency, Cryptocurrency, Cryptomining, Cyber breaches, cyberattacks, Cybercrime, Cybersecurity, Employees, Financial, Firewalls, Google, Google, Google Play Store, Government, Hackers, Hacking, Human Element, Infrastructure, Internet, Legacy Systems, Malware, Malware, Microsoft, Microsoft, Monitoring, NASA, Networking, News, Patches, Podcast, President Joe Biden, Radio Show, Radio_Show, Regulatory Frameworks, Security, Security Alerts, Show Notes, Software, Technology, Technology, trojans, updates and patches, Utilities, Vulnerabilities, Windows (Microsoft), Zero Trust
Read. Learn. Share Tech Talk Show Notes February 20. 2021 Breached water plant employees used the same TeamViewer password and no firewall The Florida water treatment facility whose computer system experienced a potentially hazardous computer breach last week used an...
Apr 28, 2020 | Credentials, Features, iHeart, Passwords
Generate strong passwords/passphrases Hi. Craig Peterson here with a blink into secure passwords. Many businesses insist that their eight character passwords are secure because they force complexity requirements, and frequent password updates. Not true. These...