Podcasts
BTS #23 – Closing The Supply Chain Visibility Gap – Dr. Olga Livingston
Short of ripping everything apart (hardware and software) and inspecting the components, which is very time-consuming, how do we solve the visibility gap in various supply chains? Dr. Olga Livingston from CISA ...
Strategic Decision-Making: Balancing Budgets and Security
TechSpective Podcast Episode 124 Cybersecurity is cyclical. Over the past two decades that I have been working in and writing about security, the market has gone from an array of point ...
The Problem of Victim Blaming in Cybersecurity: Empathy, Responsibility & Ethical Practices
In this episode of the Shared Security Podcast, we discuss the concerning issue of victim-blaming in cybersecurity with special guest, Andra Zaharia, host of the Cyber Empathy and We Think We Know ...
Secure Your iPhone: Exploring Stolen Device Protection
In this episode, host Tom Eston provides a detailed explanation of the ‘Stolen Device Protection’ for iPhones – a new security feature by Apple. This feature triggers enhanced security factors such as ...
BTS #22 – SBOMs and Supply Chains – Allan Friedman
We sit down with the father of the SBOM, Allan Friedman, to discuss examples of where we really need SBOMs, how to operationalize SBOMs, and how to identify and deal with bad ...
The World of Scambaiting, Preventing Social Media Account Takeovers, Network Wrenches Hacked
In Episode 313, hosts Tom and Scott discuss the world of scambaiting, discussing what it is, the tactics used, and its effectiveness in stopping scammers. They talk about popular channels like Scammer ...
Ohio’s New Social Media Law, Meta’s Link History Feature, 175 Million Passcode Guesses
In episode 312, Tom and Scott discuss the implications of a new law in Ohio that may require parental consent for children under 16 using social media, including the pros and cons ...
BTS #21 – Supply Chain Risk Management – David Vaughn
We talk about Supply Chain Risk Management in the context of the cloud and US federal government with David Vaughn. Show Notes The post BTS #21 - Supply Chain Risk Management - ...
Most Advanced iPhone Exploit Ever, Google’s $5 Billion Settlement, Apple’s Journal App
In this episode, we discuss the most sophisticated iPhone exploit ever, Google’s agreement to settle a $5 billion lawsuit about tracking users in ‘incognito’ mode, and a new iOS app, Journal. The ...
The Three Keys to Success in Cybersecurity
One of the big questions that I often get is: How does someone become successful in a cybersecurity career? In this blog I want to share with you the three key lessons ...