The Cyberlaw Podcast is a weekly interview series and discussion offering an opinionated roundup of the latest events in technology, security, privacy, and government. It features in-depth interviews of a wide variety of guests, including academics, politicians, authors, reporters, and other technology and policy newsmakers. Hosted by cybersecurity attorney Stewart Baker, whose views expressed are his own.
…
continue reading
מפגשים עם האנשים בחזית הגנת הסייבר לתעשייה ותשתיות קריטיות Meetings with the people at the forefront of cyber defense for industry and critical infrastructure ICS SCADA OT IoT
…
continue reading
Forcepoint’s To The Point Cybersecurity Podcast covers the latest cyber news, threats, and trends impacting the federal government and world at large.
…
continue reading
Exploit brokers is dedicated to tech and hacking news commentary, hacking tutorials, and cyber security topics. Exploit brokers brings the knowledge of hacking to you. We review data breaches, malware infections, Botnet events, and other notable hacking events to learn how to better defend against it by getting in the mind of hackers. #cybersecurity #hackingnews #cybersec #whitehat
…
continue reading
Looking for privacy insights? Trends? This podcast will help you with insights into the world of privacy by understanding how influencers are thinking about privacy in business, innovation, and new technologies. You will learn by listening to fellow industry experts and influencers. Ranked in Top #5 or Top #10 of most rankings. Follow our podcast on www.fit4privacy.com/podcast and blog at www.fit4privacy.com/blog Visit us at www.fit4privacy.com for courses and practice exams to prepare for C ...
…
continue reading
An In-Character Shadowrun Podcast
…
continue reading
The most important stories in Bitcoin and cryptocurrency covered by the Protos newsroom every week. Follow us on Twitter — @Protos Hosted on Acast. See acast.com/privacy for more information.
…
continue reading
There are great stories in the security industry that aren’t being told. Fascinating people who fly below the radar and aren’t being heard. We know because we encounter them in hallways, hotel lobbies and just about everywhere imaginable across the globe. Everytime we think “I wish I had recorded that conversation so that everyone could hear it…” Our goal with Security Voices is to provide a place for clear-headed dialogue with great people that’s unencumbered by the hyperbole and shouting t ...
…
continue reading
In the digital era, information and the social media platforms used to spread it have become weapons of choice for those seeking to short circuit American democracy. Yahoo News' new weekly podcast Bots & Ballots explores the intersection of politics and technology as told by those in Washington, DC, and Silicon Valley trying to prevent a repeat of the infiltration of the 2016 presidential election. See acast.com/privacy for privacy and opt-out information.
…
continue reading
1
Everyday Users Combating 'Divide and Conquer' Tactics with Cyberware
14:11
14:11
Play later
Play later
Lists
Like
Liked
14:11
Join Philippe Humeau and Punit Bhatia on the FIT4PRIVACY Podcast as they tackle the challenge of everyday cyberware threats that aim to 'divide and conquer' businesses. In this insightful trailer for Episode 108, Season 5, discover practical advice and strategies on how individuals and companies can protect their data from these pervasive threats. …
…
continue reading
1
The Fourth Antitrust Shoe Drops, on Apple This Time
46:25
46:25
Play later
Play later
Lists
Like
Liked
46:25
The Biden administration has been aggressively pursuing antitrust cases against Silicon Valley giants like Amazon, Google, and Facebook. This week it was Apple’s turn. The Justice Department (joined by several state AGs) filed a gracefully written complaint accusing Apple of improperly monopolizing the market for “performance smartphones.” The mark…
…
continue reading
1
How Can ChatGPT Transform Privacy In A Positive Way
11:36
11:36
Play later
Play later
Lists
Like
Liked
11:36
ChatGPT and technologies like this can be used in many way. On a positive use, can ChatGPT help transform privacy? Punit Bhatia is joined by Jan Anisimowicz to discuss exactly this. This is an extract from the full episode of The FIT4PRIVACY Podcast. If you like this, you would enjoy the full episode. If this is your first time, the FIT4PRIVACY Pod…
…
continue reading
This week, Audra is joined by Mark Montgomery, senior director of the FDD’s Center on Cyber and Technology Innovation and director of the CSC 2.0. Today’s discussion focuses on the progress made implementing the recommendations of the Cyberspace Solarium Commission’s 2020 report and securing critical infrastructure more broadly, including insights …
…
continue reading
1
Social Speech and the Supreme Court
1:00:16
1:00:16
Play later
Play later
Lists
Like
Liked
1:00:16
The Supreme Court is getting a heavy serving of first amendment social media cases. Gus Hurwitz covers two that made the news last week. In the first, Justice Barrett spoke for a unanimous court in spelling out the very factbound rules that determine when a public official may use a platform’s tools to suppress critics posting on his or her social …
…
continue reading
1
Moty Cristal CEO @NEST on ransomware negotiation with hackers/attack groups: flipping the other side
1:01:21
1:01:21
Play later
Play later
Lists
Like
Liked
1:01:21
נחשון פינקו מארח את מוטי קריסטל מנכ"ל חברת אנ.אי.אס.טי. (אסטרטגיות מו"מ) מי שהתחיל את דרכו כנושא ונותן בצוותי המו״מ המדיני של לשכת ראש הממשלה רבין וכיום מבכירי מנהלי המשא ומתן בעולם במשברי סייבר ומפתח תורת המשא ומתן כתחום אקדמאי, בשיחה על ניהול מו"מ במצבי משבר בכלל ומשברי סייבר בפרט. איך מנהלים מו"מ מבלי לדבר (טונציה) או לראות (שפת גוף) את הצד השני…
…
continue reading
1
Preventing Sales of Personal Data to Adversary Nations
31:52
31:52
Play later
Play later
Lists
Like
Liked
31:52
This bonus episode of the Cyberlaw Podcast focuses on the national security implications of sensitive personal information. Sales of personal data have been largely unregulated as the growth of adtech has turned personal data into a widely traded commodity. This, in turn, has produced a variety of policy proposals – comprehensive privacy regulation…
…
continue reading
1
AI, Cybersecurity, Privacy and OpenSource with Philippe Humeau and Punit Bhatia in the FIT4PRIVACY Podcast E108 S5
24:52
24:52
Play later
Play later
Lists
Like
Liked
24:52
In an era where digital threats loom large, how do AI,cybersecurity, and open-source innovations intersect to redefine our approach to privacy? Join us in this riveting episode of the FIT4PRIVACY Podcast,where Philippe Humeau and Punit Bhatia delve into the dynamics of cutting-edge cybersecurity strategies. Discover the role of multiplayer firewall…
…
continue reading
1
Dr Chuck Freilich Senior researcher @INSS on Iranian cyber threat & strategy effects on October 7th
52:15
52:15
Play later
Play later
Lists
Like
Liked
52:15
נחשון פינקו מארח את ד"ר צ'ק פרייליך, לשעבר סגן ראש המועצה לביטחון לאומי וכיום חוקר בכיר במכון למחקרי ביטחון לאומי, בעקבות פרסום מחקרו מזכר 231 על איום הסייבר האירני, בשיחה על אסטרטגיית הסייבר האירנית בכלל ועליית האיום המיידי על מדינת ישראל מאז ה-7 באוקטובר Nachshon Pincu hosts Dr. Chuck Freilich, former deputy head of the Israeli National Security …
…
continue reading
1
The National Cybersecurity Strategy – How Does it Look After a Year?
56:30
56:30
Play later
Play later
Lists
Like
Liked
56:30
Kemba Walden and Stewart revisit the National Cybersecurity Strategy a year later. Sultan Meghji examines the ransomware attack on Change Healthcare and its consequences. Brandon Pugh reminds us that even large companies like Google are not immune to having their intellectual property stolen. The group conducts a thorough analysis of a "public opti…
…
continue reading
1
Innovation in Cybersecurity—Getting Beyond the Buzzwords with guest Audra Simons
27:24
27:24
Play later
Play later
Lists
Like
Liked
27:24
This week Eric and Arika discuss the process of creating real innovation in cybersecurity with Audra Simons, Director of Forcepoint’s Innovations Labs. For links and resources discussed in this episode, please visit our show notes at https://www.forcepoint.com/govpodcast/e276
…
continue reading
1
Regulating personal data for national security
53:10
53:10
Play later
Play later
Lists
Like
Liked
53:10
The United States is in the process of rolling out a sweeping regulation for personal data transfers. But the rulemaking is getting limited attention because it targets transfers to our rivals in the new Cold War – China, Russia, and their allies. Adam Hickey, whose old office is drafting the rules, explains the history of the initiative, which ste…
…
continue reading
1
HN29 - No Honor Among Thieves: The Internal Conflict of Black Cat Ransomware
25:43
25:43
Play later
Play later
Lists
Like
Liked
25:43
Dive into the dark world of cybercrime with our latest episode on Exploit Brokers, where we unravel the complexities of the Black Cat ransomware group and its fallout with Change Healthcare and UnitedHealth Group. Witness the intricacies of digital extortion, the inner workings of cybercriminal networks, and the colossal impact on the healthcare se…
…
continue reading
1
Udi Roth CISO @Mekorot Israel National Water Company on cyber defiance in critical OT infrastructure
59:36
59:36
Play later
Play later
Lists
Like
Liked
59:36
נחשון פינקו מארח את אודי רוט הסיסו האגדי של חברת מקורות, מוותיקי הסיסויים בישראל, עם וותק וניסיון של מעל עשרים שנים בניהול אבטחת סייבר במערכות תפעוליות ואבט"מ, בשיחה על ההתמודדות היום יומית מול איומים גדלים והולכים מצד מדינות וקבוצות תקיפה במערכת מורכבת השנייה בגודלה רק לחברת חשמל. מה השתנה אם בכלל מאז ה-7 באוקטובר ואלו שינויים נדרשים בתפיסת ההגנה.…
…
continue reading
1
The Evolution of Cybersecurity from 1980 to Today w/ Former CIA Executive Mark Kelton - E015
20:46
20:46
Play later
Play later
Lists
Like
Liked
20:46
…
continue reading
1
Auditing AI with Stefan Preuss and Punit Bhatia in The FIT4Privacy Podcast E107 S5
28:31
28:31
Play later
Play later
Lists
Like
Liked
28:31
Auditing AI with Stefan Preuss and Punit Bhatiain The FIT4Privacy Podcast E107 S5 Artificial intelligence is transforming our lives. Is it even possible to audit AI? How do we audit it? Discover answers to these questions in a conversation between Stefan Preuss and Punit Bhatia. ABOUT THE GUEST Stefan Preuss heads up the Emerging Technologies Audit…
…
continue reading
1
HN28 - Ransomware Alert: Black Cat's Bold Move Against UnitedHealth
20:02
20:02
Play later
Play later
Lists
Like
Liked
20:02
In this gripping episode of Exploit Brokers, we dive deep into the shadows of cyberspace to uncover the resurgence of the notorious Black Cat ransomware group. Following their recent high-profile attack on UnitedHealth's technology unit, Optum, which disrupted prescription deliveries across the United States, Black Cat has declared war against the …
…
continue reading
1
Cyberwar, Social Media’s Future and Passing the Mic with Peter W. Singer
47:10
47:10
Play later
Play later
Lists
Like
Liked
47:10
Joining us this week is Peter W. Singer, a New York Times bestselling author of books including Ghost Fleet, LikeWar and the techno-thriller Burn In. He shares details on the New America volunteer, non-profit organization and its awesome #SharetheMicinCyber program helping to bring diversity of thought to the cybersecurity front lines. We also disc…
…
continue reading
1
Chen Girat CISO @IEC about cyber defiance in wartime on the most significant Israeli infrastructure
1:07:52
1:07:52
Play later
Play later
Lists
Like
Liked
1:07:52
נחשון פינקו מארח את חן גיראט הסיסו של חברת חשמל לישראל שהתחיל את דרכו בסייבר ב-770 (הרשות הממלכתית לאבטחת מידע) וניהל את האגף המבצעי במערך הסייבר. בשיחה על הגנה על התשתית הקריטית הגדולה ביותר בישראל בכלל ובזמן מלחמה בפרט. ואיך הפכתי ממראיין למרואיין 😊 Nachshon Pincu hosts Chen Girat, the CISO of the Israel Electric Company (IEC), who started his ca…
…
continue reading
1
HN27 - Massive Ransomware Empire Crumbles: Inside the Fall of LockBit
24:23
24:23
Play later
Play later
Lists
Like
Liked
24:23
In this explosive episode of Exploit Brokers, we delve into the groundbreaking takedown of LockBit, one of the most formidable names in the ransomware arena. With law enforcement agencies from the US, EU, and beyond joining forces, this rare international operation has sent shockwaves through the cybercrime world. From arrests in Ukraine and France…
…
continue reading
Artificial intelligence is transforming our lives. How can we audit it? Perhaps, can we use AI to audit itself? This is a trailer from the full episode that will be released next week. So, remember to watch or listen to the fullepisode of the FIT4Privacy Podcast next week. You can listen to The FIT4PRIVACY Podcast conversations at Anchor, iTunes, S…
…
continue reading
We begin this episode with Paul Rosenzweig describing major progress in teaching AI models to do text-to-speech conversions. Amazon flagged its new model as having “emergent” capabilities in handling what had been serious problems – things like speaking with emotion, or conveying foreign phrases. The key is the size of the training set, but Amazon …
…
continue reading
1
Demystifying Security’s Wizards With Tony Sager
1:01:50
1:01:50
Play later
Play later
Lists
Like
Liked
1:01:50
Joining the podcast this week is Tony Sager, Senior Vice President and Chief Evangelist for the Center of Internet Security and shares insights from his 45+ years on the security front lines, including 34 years at the NSA. Risk was a big theme of the discussion particularly looking at risk through a similar lens as we view other risky domains, such…
…
continue reading
On the latest episode of The Cyberlaw Podcast, guest host Brian Fleming, along with panelists Jane Bambauer, Gus Hurwitz, and Nate Jones, discuss the latest U.S. government efforts to protect sensitive personal data, including the FTC’s lawsuit against data broker Kochava and the forthcoming executive order restricting certain bulk sensitive data f…
…
continue reading
1
Ethics in the World of AI & Privacy with Bianca Lopes and Punit Bhatia in The FIT4Privacy Podcast E106 S5
31:20
31:20
Play later
Play later
Lists
Like
Liked
31:20
Ethics in the world of AI. In this thought-provoking episode of The FIT4Privacy Podcast, we're delighted to host a vital conversation between two experts Bianca Lopes and Punit Bhatia. Delving into the complexities and challenges of ethical AI, our discussion navigates through the realms of data privacy, and the broader societal implications of rap…
…
continue reading
1
HN26 - AI and Cyber Attacks: Unveiling the Tactics of Nation State Hackers
18:01
18:01
Play later
Play later
Lists
Like
Liked
18:01
Welcome back to Exploit Brokers, where we delve deep into the world of cybersecurity, AI, and the digital battlegrounds of our time. In this episode, we're exploring a topic that sounds like it's straight out of a sci-fi movie, but is unfolding in real life: the integration of AI into military and cyber warfare by nation states. With an unprecedent…
…
continue reading
1
So Many Cyber Scams with names like Pig Butchering with Jennifer Cook
43:01
43:01
Play later
Play later
Lists
Like
Liked
43:01
Joining us this week is Jennifer Cook, Senior Director of Marketing at the National Cybersecurity Alliance and we discuss all the hot and trending online scams facing consumers today including the growing prevalence of romance scams ($1.3B in losses last year!), job seeker scams, tax fraud scams, sextortion, and the latest scam making the rounds – …
…
continue reading
1
Itay Yanovski & Nimrod Luria Founders @IO01 on OT Cyber-Physical System CPS for Visibility & Control
1:02:53
1:02:53
Play later
Play later
Lists
Like
Liked
1:02:53
נחשון פינקו מארח את איתי ינובסקי ונמרוד לוריא מייסדי אי אוו אפס אחד, שניהם ידועים בתעשיית הסייבר הישראלית כיזמים מצליחים עם סטארטאפים בתחום אבטחת הסייבר שלהם לאורך העשורים האחרונים, ועדיין משתדלים להיות מתחת לראדר, בשיחה על הגנת סייבר למערכות תפעוליות ועל החשיבות של הכשרה מעשית למי שרוצים להצטרף לתחום מהן מערכות סייבר-פיזיות (סי.פי.אס) מדוע על התעש…
…
continue reading
1
Roni Roytman Co-founder & CEO @INTENSITY about Cyberwar since October 7th: OT cyber attacks are here
1:09:35
1:09:35
Play later
Play later
Lists
Like
Liked
1:09:35
נחשון פינקו מארח את רוני רויטמן מומחה לניהול משברי סייבר, יזם סדרתי, מייסד שותף ומנכ"ל בחברות העוסקות באבטחת סייבר וניהול משברים. בשיחה על המלחמה הקברנטית שנמצאת בעצימות שיא מאז ה-7 באוקטובר. התקפות על כול המגזרים, גם חלקן של מערכות תפעוליות לא נגרע Nachshon Pincu hosts Roni Roytman, an expert in cyber crisis management and serial entrepreneur, co-…
…
continue reading
1
Is it Scary or Opportunistic? How is the Data World?
7:23
7:23
Play later
Play later
Lists
Like
Liked
7:23
The ethics of artificial intelligence is the branch of the ethics of technology specific to artificially intelligent systems. Ethics in technology-what are the ethical concerns of AI? This is a trailer from full episode that will be released next week. So, remember to watch or listen to the full episode of the FIT4Privacy Podcast next week. You can…
…
continue reading
1
Startup follow-up: Alexander Tartakovsky founder & CEO @iOT365 on OT cybersec defense change mindset
55:21
55:21
Play later
Play later
Lists
Like
Liked
55:21
Nachshon Pincu Hosts Alexander Tartakovsky the founder and CEO of iOT365 OT Cyber Security Platform delivered as a SAAS. We discussed changing the mindset for traditional and innovative OT infrastructure as part of Industry 4.0, Open PLC, and digital twin technologies. Why should IDS and SIEM for OT cybersecurity Not be on two different platforms? …
…
continue reading
It was a week of serious cybersecurity incidents paired with unimpressive responses. As Melanie Teplinsky reminds us, the U.S. government has been agitated for months about China’s apparent strategic decision to hold U.S. infrastructure hostage to cyberattack in a crisis. Now the government has struck back at Volt Typhoon, the Chinese threat actor …
…
continue reading
1
Predicting Cyber Insurance and AI Futures with Josephine Wolff
51:42
51:42
Play later
Play later
Lists
Like
Liked
51:42
This week we dive into the hot topic of cyber insurance with Dr. Josephine Wolff, Associate Professor of Cybersecurity Policy at Tufts University The Fletcher School and author of the book “You’ll See This Message When it is Too Late: The Legal and Economic Aftermath of Cybersecurity Breaches” (MIT Press 2018). We explore the dynamic industry of cy…
…
continue reading
1
Data Governance and Protection Standard of India (DGPSI) with Naavi and Punit Bhatia in The FIT4Privacy Podcast E105 S5
40:00
40:00
Play later
Play later
Lists
Like
Liked
40:00
Data Governance and Protection Standard of India (DGPSI) is now becoming available. And, this will facilitate compliance with privacy laws especially Digital Personal Data Protection Bill of India. In this episode, Punit Bhatia has a conversation with India’s finest data privacy expert Vijayashankar Nagarajarao, commonly known as Naavi. They both t…
…
continue reading
1
HN25 - Hacking Havoc: How Fulton County Became a Real-Life Cyberwar Zone
16:01
16:01
Play later
Play later
Lists
Like
Liked
16:01
Dive into the eye-opening world of cybersecurity as we dissect the recent cyber attack and Hacking Havoc that has plunged Fulton County into turmoil. Witness the frightening resemblance between fictional cyber threats depicted in shows like Mr. Robot and the stark reality facing our digital infrastructures today. This episode of Exploit Brokers tak…
…
continue reading
1
Going Deep on Deep Fakes—Plus a Bonus Interview with Rob Silvers on the Cyber Safety Review Board.
1:12:14
1:12:14
Play later
Play later
Lists
Like
Liked
1:12:14
It was a big week for deep fakes generated by artificial intelligence. Sultan Meghji, who’s got a new AI startup, walked us through three stories that illustrate the ways AI will lead to more confusion about who’s really talking to us. First, a fake Biden robocall urged people not to vote in the New Hampshire primary. Second, a bot purporting to of…
…
continue reading
1
"Roided-out Sitting Duck" Part Two with Juan Andres Guerrero-Saade
38:03
38:03
Play later
Play later
Lists
Like
Liked
38:03
Want to know what this week’s episode title means? Listen to our two-part episode with Juan Andrés Guerrero Saade (aka JAGS), principal researcher at SentinelOne and Adjunct Professor of Strategic Studies at Johns Hopkins School of Advanced International Studies (SAIS). JAGS takes us on an exciting and educational ride through his research efforts …
…
continue reading
1
MBA-Business & Cyber program @Ono Academic College: Adv Rami Tamam hosts practical Law & cyber panel
1:31:14
1:31:14
Play later
Play later
Lists
Like
Liked
1:31:14
היה לי לכבוד להיות מוזמן על ידי עו"ד רמי תמם, ראש ההתמחות בתואר שני במנהל עסקים וסייבר במכללה האקדמית אונו להרצות ולהשתתף בפאנל פרקטיקה של משפט וסייבר לסטודנטים בתוכנית הייחודית It was an honor to be invited by Adv Rami Tamam from Ono Academic College to lecture and be part of an expert panel about practical cyber and law to the students of the MBA…
…
continue reading
1
Digital Personal Data Protection Bill of India
7:27
7:27
Play later
Play later
Lists
Like
Liked
7:27
Let us learn about Digital Personal Data Protection Bill of India with Naavi and ask him some questions. Is Privacy a fundamental right in India? How is this right protected in India? What is the country’s privacy landscape? This is a trailer from full episode that will be released next week. So, remember to watch or listen to the full episode of t…
…
continue reading
1
HN24 - Sandwich Data Breach Alert: Jason's Deli & Subway Under Attack
20:19
20:19
Play later
Play later
Lists
Like
Liked
20:19
🔒 Dive into the world of cybersecurity as we uncover the latest threats facing businesses in today's digital landscape. In this video, we dissect the Jason's Deli data breach, shedding light on the dangers of credential stuffing attacks. Discover how hackers exploit weak password habits and gain access to personal data, leaving thousands of custome…
…
continue reading
1
High Court, High Stakes for Cybersecurity
44:56
44:56
Play later
Play later
Lists
Like
Liked
44:56
The Supreme Court heard argument last week in two cases seeking to overturn the Chevron doctrine that defers to administrative agencies in interpreting the statutes that they administer. The cases have nothing to do with cybersecurity, but Adam Hickey thinks they’re almost certain to have a big effect on cybersecurity policy. That’s because Chevron…
…
continue reading