Mar 5, 2021 | Access Controls, anonymity, Attack Vectors, Best Practices, Big Tech, Breaches, Business, Chromebook, Coinseed, Compliance, CPU, CPU, credentials, Cryptocurrency, Cyber Liability, Cybersecurity, Google, Government, Hacking, Internet, Malware, News, Passwords, Patching, Podcast, Radio Show, Radio_Show, Security, Security, Show Notes, Social Media, Social Media, Social Networking, SolarWinds, Technology, Updates, Vulnerabilities, WhatsApp, Zero Trust
Read. Learn. Share. Tech Talk Show Notes March 6, 2021 Embracing a Zero Trust Security Model As cybersecurity professionals defend increasingly dispersed and complex enterprise networks from sophisticated cyber threats, embracing a Zero Trust security model and the...
Feb 26, 2021 | Advertising, Anti-Virus, Apple, Apple, Automation, Automotive, Best Practices, Big Tech, Biological Viruses, browsers, Business, cell phones, Chrome, Chrome Browser, Computers, Coronavirus, Covid-19, Cyber breaches, Cybercrime, CyberTraining, Electric Grid, Employee Training, Employees, Encryption, Energy, Environment, Google, Google, Government, Hackers, Hacking, Hacks, Internet, MacBook, Malware, Malware, News, Phishing, Phishing, Podcast, Privacy, Radio Show, Radio_Show, Security, Security, Show Notes, Smishing, Spyware, Sustainable fuels, Technology, trojans, Vishing, Zero-Day
Read. Learn. Share Tech Talk Show Notes February 27, 2021 This Basic Math Shows How Wind Energy Failures Contributed To Texas’s Deadly Power Loss Why did Texas lose power? Math — apolitical, non-ideological, and sometimes cruel math. During such an extreme cold for...
Feb 12, 2021 | Anti-Trust, Artificial Intelligence, Best Practices, Big Tech, browsers, Business, Chrome, Chrome Browser, Congress, Consumer, Cybersecurity, Dark Web, Facial Recognition, Google, Government, Hacking, Hacks, Internet, Legislation, Radio Show, Radio_Show, scalpers, Security, Security, Show Notes, Tech Overlords, Technology, Zero Trust
Read. Learn. Share Tech Talk Show Notes February 13. 2021 Strengthening Zero Trust Architecture The invention of the term “Zero Trust” is generally credited to former Forrester analyst John Kindervag more than a decade ago. Although it’s not new, the...
Dec 25, 2020 | Agencies, Android, Apple, Apps, Backdoor, Backdoors, Best Practices, Big Tech, Business, CPU, cyberattacks, Cybercrime, Cybersecurity, FBI, Google, Google Play Store, Government, Hackers, Hacking, Hacking, Internet, Law Enforcement, Malicious Apps, Malware, Microsoft, Microsoft, Mobile, Nationstates, Networking, Proprietary Design, Radio Show, Radio_Show, Ransomware, Ransomware, Ransomware, Russia, Security, Security, Show Notes, Technology, third-world, VPN, VPN
Tech Talk Show Notes December 20 -26, 2020 Google Removed Shady Android VPN App That Allowed MiTM Attacks Google has recently removed a shady Android VPN App from the Play Store. Identified as SuperVPN Free VPN Client, this app boasted 100 million installs and had...
Dec 4, 2020 | Agencies, Amazon, Amazon platform, Anti-Virus, Attack Vectors, Best Practices, Big Tech, cyberattacks, Facial Recognition, Google, Government, Incident Response, Information Technology, Internet, IRS, Malware, Radio Show, Radio_Show, Ransomware, School Districts, Security, Show Notes, Technology, Third-Party resellers
Tech Talk Show Notes November 29 – December 5, 2020 Gaming Over the Holidays? 7 Important Security Tips It’s the most wonderful time of the year for hackers to target home gamers. Gamers are typically on the younger side and more trusting and comfortable...
May 16, 2020 | Best Practices, Business, Cyber breaches, Cybercrime, Cybersecurity, Hackers, Hacking, Hacking, Hacks, Internet, Radio Show, Radio_Show, Security, Security, Technology, WordPress
Cybercriminals Ramp-Up and Zero-In on WordPress Sites It is a new cyber target – WordPress. It is a popular website creation platform that powers almost a third of all websites on the internet. WordPress sites are under attack and the attempted attacks...