Feb 15, 2020 | Applications, Best Practices, Business, CEO, Compliance, credential stealing, Hacking, Internet, Intricate Data Systems, Legacy Systems, Patching, Radio Show, Radio_Show, Regulatory Compliance, Regulatory Frameworks, Security, Security, Security Alerts, Shadow-IT, Software, Software As A Service, Software Manufacturers, Technology, Third - Party, third-world, Threats, Updates
Shadow-IT: Employees putting Business at Risk There are robust computers in every employee’s possession. And they carry them everywhere. Yes, I am talking about their cellphones. On these devices, they can download 1000’s of apps. These apps allow them to create...
Aug 6, 2018 | Podcast, Radio Show
Uber drivers live streaming rides. Drone Assassination Attempt in Venuezula.: AS HEARD ON: News Radio 610 NH Today [08-06-2018] http://traffic.libsyn.com/cptt/2018-00-00-AS_HEARD-2018-08-06-wgir-uber_drivers_live_streaming-drone_assasination_attempt.mp3 DOWNLOAD...
Aug 4, 2018 | Business, Internet, Radio Show, Security
Ridesharing livestreams on Twitch raise privacy worries (update: Uber cuts access) When you step into a ridesharing car, you probably assume that whatever you do inside the vehicle won’t be recorded for posterity. But what if it turned out that you were not only...
Jan 13, 2018 | Business, Security, Technology
Uber developed secret system to lock down staff computers in a police raid Uber developed a secret system called Ripley that would lock down staff computers in the event of a police raid, preventing officials from accessing company data. The ride-sharing company used...