In his podcast series “Crucial Tech”, our correspondent from Silicon Valley, Lou Covey, explores and explains trending cybersecurity topics in detail. And if he can’t explain it, his guests most definitely can.
We’re happy to feature this series here at Cyber Protection Magazine. Enjoy this series of podcast – and make sure to check back regularly for the latest episode.
A look inside the editorial process of Cyber Protection MagazineFor a journalist to decide what to cover and when takes some discussion and this week we decided to do our editorial meeting in a public setting so you can see how we pick what to report. In this episode, Joe Basques, Patrick Boch and Lou Covey look at the changing paradigm of Ransomware, the ethics of paying ransoms, Webscraping, Amazon Sidewalk and the state of security jobs.
Special episode: Revital Libfrand of OdiX on tech opportunities for womenThis week the WomenTech Global Conference (#WTGC2021 ) is happening on the web and we thought it would be a good idea to interview a leader in the security industry, Revital Libfran of OdiX about her career and opportunities in #cybersecurity. Plus it gives us a chance to plug this great conference. Sign up at www.womentech.net and learn more.
Hacking is not spoofing, plus a case studyI had two conversations this week about spoofing attempts that turned into educational moments. There will be more to learn here at Cyberprotection-magazine.com but this revealed a lot.
It's Earth Day. Are your batteries exploding?Lithium-ion batteries are in almost all electronics, all electric vehicles and are expanding through the power grids worldwide to store energy during system outages. They are crucial to continued operation of “green” data centers. When you talk about renewable energy, you have to talk about where lithium-ion batteries fit in the discussion. That’s not necessarily a good thing. Lithium-ion technology is fraught with social, environmental, and security downsides. Forced child labor, the lack of effective recyclability, potential poisonous fires and explosions and complex, imminently hackable control systems are all aspects of the industry that just won’t be going away soon. But there is hope. There are alternatives. This is the subject of this episode of Crucial Tech. We talk to Jack Pouchet, Vice President of marketing for Natron Energy, a company manufacturing a sodium-ion battery that lacks all the downsides of its lithium cousin and offers significant upsides that we need. The good news is that it looks like this technology will be going into large-scale production just before the Lithium-ion technology collapses under its own weight.
Supply chain headaches abound along with potential fixesThis interview with Warren Savage, guest researcher at the University of Maryland in IoT security, is a follow up to an interview I did with him last year at the @DesignCon conference in Santa Clara. In the interview and his keynote at the show, he talked about how vulnerable the electronics supply chain was. A year later we are stuck in a semiconductor supply chain slowdown and one of the reasons is the inability to secure it. Things haven't gotten much better but Savage sees progress. This is part two of a series on supply chain.
Boring technology can be the most important to understandWe talk to Harry Haramis, GM of Prime Key, about public key infrastructure (PKI) and certificate authority (CA), which may be the most boring technologies you come in contact with, but are foundational to keeping you secure on the internet and even in your car. The problem is that few companies will let you know what they are doing about managing those things and if it is done badly, you are screwed. Time to start tasing questions.
CDR: another security acronymn that you need in your arsenalSecuring an organization's data isn't easy, or cheap, but relatively tiny section of the cyber-protection industry, known as content disarm and reconstruction (CDR) might be a solid beginning. If only they would spend enough on marketing to build awareness. We open the fourth season on Crucial tech with Taeil Goh, CTO of OPSWAT, about his companies threat detection and removal technology and why he ain't rich yet.
The launch of Cyber Protection MagazineSeason 3 concludes with Joe Basques interviews Lou Covey and Patrick Boch, co-editors of the recently launched Cyber Protection Magazine, an international joint project between the Footwasher Media in the US and Fabogi in Germany. The new publication will focus on practical implementation of cybersecurity for businessmen and the non-technical among us.
Stupid Stuff in TechTechnology has a lot of wondrous things going on but it has it’s fair share of stupid things as well. We took a moment to look at four of the more stupid things in tech of the past two weeks in the new year.
Airgap Networks: an absolute defense?We talk to a lot of companies developing digital security devices and systems. Virus scans catch about 50 percent of the attacks but don't stop them from happening. Network solutions are too expensive and do little to protect against people doing stupid things behind the firewall. It has really seemed hopeless for a while and very frustrating. Then we ran across Airgap.io It's affordable, scalable, and it stops ransomware from spreading throughout all connected devices in the network.
Phisihing threatens US electionsBetween January and August 2020, The number of phishing sites detected by Google rose by more than 200,000 to 1,892,980.
“When you get that all too familiar barrage of spam emails, social engineers are betting that if you’re a MAGA supporter who received spoofed emails pitching progressive candidates or causes, you’ll click unsubscribe ,” says Adam Levin, founder of Cyberscout. Levin explained that the emails are rigged to download malware, ransomware, or access your accounts when you click unsubscribe." The dramatic increase is giving rise to an entire sub-industry dedicated to zero-trust technologies that are slowly coming to market. Maybe too slowly for the 2020 election cycle. We talked to two of them: Zero Fox and Airgap Networks