Firewall halka açık
[search 0]
Daha fazla

Download the App!

show episodes
 
Tech, politics and culture are the subjects of Bradley Tusk's free-wheeling, twice-weekly podcast. He brings you inside the room where entrepreneurs, investors, policy makers, strategists and journalists reveal what's really on their minds.
 
Join Mike Krupka and Davin Bateman from OccamSec as they dive into various Information Security topics with members of our team as well as experts from the greater worldwide security community. We'll discuss and debate security issues and trends while infusing some fun along the way. From novice to professional, Burned by the Firewall is meant to be a quick, accessible and valuable podcast experience for all.
 
Loading …
show series
 
Mike is joined by Matthew Mauzy, Emergency Response Technology Manger at UNC Chapel Hill and Chief at South Orange Rescue Squad, to discuss the challenges that the higher education and public safety sectors face now, how the last 18 months have reshaped the operating models, and the threats (and opportunities) that are on the horizon as we move int…
 
It’s really easy to complain about the sadly insecure state of many of our products and services, but the fact is that doing security right is hard – even when you’re trying to get it right. Part of the problem is that there are just so many things to secure, even on a single product or service. Today we’re going to discuss several recent security …
 
Many if not most workers began working from home in March of 2020, and while the numbers have shifted since, a significant portion are still doing at least some remote work. But according to a survey, neither the remote workers or their company IT staff are too happy about the cybersecurity of it all. For our featured topic this episode, we dive in…
 
Lisa Quigley, a former Hill staffer and advocate for poverty programs, joins Bradley to discuss the Biden administration's $3.5 trillion spending package — which pieces of it represent major structural change and which throw money at business as usual. Plus, the latest on Apple, why there could be an exodus from Austin and tips on how to do a milli…
 
Ever paired your phone to a rental car? Did you erase all the data from the last car you sold or turned in at the end of your lease? Do you know what data you car is sending to the cloud wireless right now? Cars have become a privacy nightmare. Andrea Amico is the founder of a company called Privacy 4 Cars and today he’ll help us understand all the…
 
For many people, privacy is just a vague concept. But it can literally be a matter of life and death. It deserves your attention, your consideration and (crucially) your support. Technology has vastly improved our daily lives, but some of it also threatens to undermine our basic human rights and even our democracy/society. We need to understand the…
 
What will it take for Wall Street and Washington to get smart about crypto and the future of currency? Bradley sits down with crypto guru Anthony Pompliano to talk about why "a native currency of the Internet" is so frightening to legacy players — and so unstoppable. "I wouldn't want to be the person who's short the industry," says Pomp, "whether I…
 
We previewed cyber security policy under President Biden at the beginning of 2021. But a lot of big things have happened in cybersecurity since then, making now seem a pretty good time to check in on where things stand. So we brought in an expert to help: NextGov's Mariam Baksh. Mariam tells us about the latest developments from the White House rel…
 
Computers are supposed to be completely predictable. When you tell it to do something, it should do exactly that – over and over again, if necessary – in the same way, with the same result. This is the nature of computer programming. But this predictability can allow computer criminals to interrupt a computer’s processing and divert it to do nefari…
 
The best start-ups are grounded in timeless values, argues Michael Eisenberg, general partner and co-founder of the Israeli venture firm Aleph and the author of the new book The Tree of Life and Prosperity: 21st Century Business Principles from the Book of Genesis. "This is not corporate charity," Eisenberg tells Bradley. "We can build large busine…
 
Or maybe not. Once upon a time, September was to mark the great return-to-the-office moment, but how's that looking? Bradley breaks down what the work-from-anywhere revolution means for employees, entrepreneurs and policymakers. Plus a quick analysis on how the "mod quad" dust-up and the messy exit from Afghanistan are affecting the Biden agenda.…
 
How far would you go to protect your children from sexual predators? How much privacy would you give up to try to prevent the sharing of child pornography? We are now faced squarely with those questions because Apple has just announced some new initiatives that it believes will curb the viewing and sharing of pornographic images. But we need to be …
 
While ransomware has taken center stage for several months now, bad actors aren’t resting on their laurels with existing tools. Threatpost Senior Editor Tara Seals joins us to discuss a newly discovered malware, dubbed Chaos. We talk about what it resembles, what it may do, and why you should be worried. Plus, Tara tells us why the Friends reunion …
 
Join Mike as he speaks with Major General (Ret.) Suzanne Vares-Lum from Indo-Pacific Command, the largest and oldest combatant command in the US Military. The first female Army General of Native Hawaiian Ancestry, she served as the Mobilization Assistant to the Commander prior to her retirement, and the duo discuss how cyber has shaped the nation a…
 
Everybody in Bradley's text group of political strategists has been bemoaning, lamenting and lambasting the US withdrawal from Afghanistan. Everyone, that is, except Bradley. He argues that there was never going to be a clean, orderly way to get out and that our government must discount social-media-fueled outrage if it intends to make wise, durabl…
 
Are hackers born or are they made? What is the essence of a true hacker? Today I explore these topics and more with the founder of both DEFCON and Black Hat, Jeff Moss – also known as The Dark Tangent. I also ask Jeff why we seem to suck at cybersecurity, what his top tips are for staying safe online, when DEFCON evolved to be bigger than its found…
 
What is a hacker, exactly? What does it mean to hack something? With all the ransomware attacks and election meddling in the headlines, it’s easy to paint all hackers with a broad brush as malicious, self-serving computer criminals. And to be clear, many computer criminals are definitely hackers (some aren’t). But the real definition of hacker, the…
 
It would be surprising if Covid didn't get the attention of the leading terrorist organizations, argues Bradley, and that opens up a whole new world of worry. Plus, he breaks down the dark soap opera in Albany and what Washington can do to put the US on top in crypto.Firewall tarafından oluşturuldu
 
Blake Resnick invented Brinc Drones’ first product after a mass shooting in his hometown of Las Vegas. The 21-year-old founder tells Bradley about cold-calling the cops, embedding with SWAT teams and developing a technology that helps them peacefully resolve the most dangerous situations. And that’s just a glimmer, he says, of the potential for dro…
 
Mike and Davin are joined by Nick Ponniah, Co-Founder and Chief Risk Officer of Tapico. The trio discuss life in the finance world, what considerations a startup must take in this day and age, and also share some stories from both their personal and professional lives. The link to the Guardrails paper discussed during the episode is available below…
 
Ransomware takes center stage in SonicWall's Mid-Year Update to its 2021 Cyber Threat Report. Out in late July, the report outlines just how bad the ransomware situation currently is, and Brook Chelmo joins us to take a closer look. We also discuss other highlights including positive news about malware in general and non-standard ports, as well as …
 
Bradley returns to the helm of Firewall with some micro insights — about, among other things, the proper footwear for sightseeing in Greece — and some macro observations about the course of human evolution. Are we getting smarter and more civilized, or are we doomed to make the same mistakes over and over again?…
 
Every time you load a web page, your personal data is being shared with thousands of companies. The ad spaces on the page are being auctioned off to the highest bidder in fractions of a second. The Irish Council for Civil Liberties calls this the biggest data breach in histor, and is suing the ad tech companies on your behalf to stop this needlessl…
 
Jordan Nof, the co-founder and managing partner of Tusk Venture Partners, and Michaela Balderston, Tusk's head of comms, analyze emerging trends in the VC world. The best new companies he's seeing, Jordan says, "are not necessarily chasing an incumbent and trying to do a specific thing better. It's 'How do we flip this entire industry on its head. …
 
Your phone number is arguably as strong a personal identifier as your social security number, passport number or email address. These are things we almost never change any more – meaning that it’s an identifier for life. Our cell phones contain a ton of personal information, including our locations (not just now, but over time). Today I’ll help you…
 
Catharine Dockery launched Vice Ventures after discovering that certain lucrative industries — sex, booze, drugs — are out of bounds for traditional VCs. Five hundred cold emails later, she's got a $25 million fund and an enviable portfolio. She talks about growing up in the West Village, where her dad tended bar at the Corner Bistro, and how she l…
 
Davin and Mike speak with John Quigg, advisor for OccamSec and Senior Advisor at Spurrier Capital Partners. John brings his decades of experience standing up US Cyber Command, serving as McAfee’s Federal Principal Cyber Strategist, and as the Army Space Program’s Program Manager to the chat. The trio talk about supply chain, previous major breaches…
 
We've turned 50, as in 50 episodes old, yet cybersecurity hasn't aged a day since we started. Ok, maybe that's not true. We take a look back over our half a hundred's worth of podcasts, spotlighting some top clips, and seeing where things stand with them now. Highlights include a pre-pandemic prediction of work from home security issues, our first …
 
Loading …

Hızlı referans rehberi

Google login Twitter login Classic login