Podcasts
In his podcast series “Crucial Tech”, our correspondent from Silicon Valley, Lou Covey, explores and explains trending cybersecurity topics in detail. And if he can’t explain it, his guests most definitely can.
We’re happy to feature this series here at Cyber Protection Magazine. Enjoy this series of podcast – and make sure to check back regularly for the latest episode.
How security researchers are fueling cybercrime, and more from Black Hat 2021
I attended Black Hat 2021 virtually again this year and wrap it up in this grab bag of issues including #AI ethics, #cybercrime legislation, #ransomware growth and control, and building #cybersecurity community to compact the organization of cybercrime. Grab a coffee and take 25 minutes to get up to speed.Have we reached Peak ransomware? George Finney says, probably not
I interviewed George Finney, chief information security officer for Southern Methodist University, a couple of weeks ago for a Cyber Protection Magazine article about the state of ransomware. It wasn't encouraging. But George is a very nice guy who also helps people and companies get their act together regarding good security practices. The entire conversation was illuminating, even though I had to do it over my iPad due to a tech glitch. Ah the modern digital age....A look inside the editorial process of Cyber Protection Magazine
For a journalist to decide what to cover and when takes some discussion and this week we decided to do our editorial meeting in a public setting so you can see how we pick what to report. In this episode, Joe Basques, Patrick Boch and Lou Covey look at the changing paradigm of Ransomware, the ethics of paying ransoms, Webscraping, Amazon Sidewalk and the state of security jobs.Special episode: Revital Libfrand of OdiX on tech opportunities for women
This week the WomenTech Global Conference (#WTGC2021 ) is happening on the web and we thought it would be a good idea to interview a leader in the security industry, Revital Libfran of OdiX about her career and opportunities in #cybersecurity. Plus it gives us a chance to plug this great conference. Sign up at www.womentech.net and learn more.Hacking is not spoofing, plus a case study
I had two conversations this week about spoofing attempts that turned into educational moments. There will be more to learn here at Cyberprotection-magazine.com but this revealed a lot.It's Earth Day. Are your batteries exploding?
Lithium-ion batteries are in almost all electronics, all electric vehicles and are expanding through the power grids worldwide to store energy during system outages. They are crucial to continued operation of “green” data centers. When you talk about renewable energy, you have to talk about where lithium-ion batteries fit in the discussion. That’s not necessarily a good thing. Lithium-ion technology is fraught with social, environmental, and security downsides. Forced child labor, the lack of effective recyclability, potential poisonous fires and explosions and complex, imminently hackable control systems are all aspects of the industry that just won’t be going away soon. But there is hope. There are alternatives. This is the subject of this episode of Crucial Tech. We talk to Jack Pouchet, Vice President of marketing for Natron Energy, a company manufacturing a sodium-ion battery that lacks all the downsides of its lithium cousin and offers significant upsides that we need. The good news is that it looks like this technology will be going into large-scale production just before the Lithium-ion technology collapses under its own weight.Supply chain headaches abound along with potential fixes
This interview with Warren Savage, guest researcher at the University of Maryland in IoT security, is a follow up to an interview I did with him last year at the @DesignCon conference in Santa Clara. In the interview and his keynote at the show, he talked about how vulnerable the electronics supply chain was. A year later we are stuck in a semiconductor supply chain slowdown and one of the reasons is the inability to secure it. Things haven't gotten much better but Savage sees progress. This is part two of a series on supply chain.Boring technology can be the most important to understand
We talk to Harry Haramis, GM of Prime Key, about public key infrastructure (PKI) and certificate authority (CA), which may be the most boring technologies you come in contact with, but are foundational to keeping you secure on the internet and even in your car. The problem is that few companies will let you know what they are doing about managing those things and if it is done badly, you are screwed. Time to start tasing questions.CDR: another security acronymn that you need in your arsenal
Securing an organization's data isn't easy, or cheap, but relatively tiny section of the cyber-protection industry, known as content disarm and reconstruction (CDR) might be a solid beginning. If only they would spend enough on marketing to build awareness. We open the fourth season on Crucial tech with Taeil Goh, CTO of OPSWAT, about his companies threat detection and removal technology and why he ain't rich yet.The launch of Cyber Protection Magazine
Season 3 concludes with Joe Basques interviews Lou Covey and Patrick Boch, co-editors of the recently launched Cyber Protection Magazine, an international joint project between the Footwasher Media in the US and Fabogi in Germany. The new publication will focus on practical implementation of cybersecurity for businessmen and the non-technical among us.Stupid Stuff in Tech
Technology has a lot of wondrous things going on but it has it’s fair share of stupid things as well. We took a moment to look at four of the more stupid things in tech of the past two weeks in the new year.Airgap Networks: an absolute defense?
We talk to a lot of companies developing digital security devices and systems. Virus scans catch about 50 percent of the attacks but don't stop them from happening. Network solutions are too expensive and do little to protect against people doing stupid things behind the firewall. It has really seemed hopeless for a while and very frustrating. Then we ran across Airgap.io It's affordable, scalable, and it stops ransomware from spreading throughout all connected devices in the network.Phisihing threatens US elections
Between January and August 2020, The number of phishing sites detected by Google rose by more than 200,000 to 1,892,980.“When you get that all too familiar barrage of spam emails, social engineers are betting that if you’re a MAGA supporter who received spoofed emails pitching progressive candidates or causes, you’ll click unsubscribe ,” says Adam Levin, founder of Cyberscout. Levin explained that the emails are rigged to download malware, ransomware, or access your accounts when you click unsubscribe." The dramatic increase is giving rise to an entire sub-industry dedicated to zero-trust technologies that are slowly coming to market. Maybe too slowly for the 2020 election cycle. We talked to two of them: Zero Fox and Airgap Networks