show episodes
 
Welcome To The Intersection Of Technology, Cybersecurity, And Society. Join our podcast conversations as we journey into the past, the present, and the future, and explore the relationship between technology and humanity. Together we are going to find out what it means to live in a society where everything is connected, and the only constant is change. Knowledge is power — now more than ever. ITSPmagazine is a free online publication that focuses on technology and the influence that it has o ...
 
Loading …
show series
 
As humans, we tend to take things for granted. Sure, there are always advances in technology, and life, in general, seems to be getting "easier" — but that's not always the case for everyone. Technology can and should be so much more than that. We must constantly remind ourselves that there is nothing magic about it. We are the ones that imagine, b…
 
While online games can be a healthy coping strategy, they can also pose some risks as cyber-attackers lurk looking for loot. Game security expert Etay Maor explains what you need to know to stay safe. Tune in to learn: Which platforms are most used by gamers How criminal launder money through games How predators fool players and even groom them, es…
 
Kim Nguyen talks about her story about what made her want to get into computer science and discusses some of the speed bumps she has encountered during school and how she is doing to prepare her life for success post-college. Kim Nguyen's story illustrates that we all come from a different path when entering the cyber workforce. We all bring a uniq…
 
Now that you know what bots are, where they originate, what good they can do, and the harm they can cause, it's time to understand how to implement a strategy to fight back and contain the damage they can bring. Businesses can be negatively affected by they do not have to. In part 1 of this 2-part series, we explore the source of bots: who writes t…
 
Think of a high school club, and you might think about a group of young students meeting regularly to engage in a common topic. Accurate, but the Del Norte High School's Team Optix 3749 Club builds robots and competes with them. This, and so much more. At its core, the purpose behind Team Optix 3749 is to provide an environment for students to lear…
 
We hear from the leader of a SaaS company that has successfully set up an effective responsible disclosure program (RDP). Tom Kuzler, CEO of email marketing platform is no stranger to this crucial relationship with the security research community, and walks us through how an RDP has worked for his company. You'll learn: why it's important to set up…
 
A lot can be done by CSOs/CISOs to maximize value and reduce risks when working with PR/media. However, the path forward is not always straightforward. What are the common hiccups, screw-ups, and give-ups? As part of our ongoing "CISO functional relationships" series, in today's episode, we look at the role of PR and the media as a function of esta…
 
The third-party ecosystems of today’s organizations have become more complex, more digital, and more extensive than ever before. The need for an accurate picture of your vendor’s security posture is greater than ever, with public and private sector organizations reporting a surge in cyber-attacks, and at the same time, continuing to experience and …
 
In this episode JJ and Dexter Ang explore the latest in gesture control using human machine interfaces and talk about how this technology can help us all to live our best life. Drawing on his expertise in Human Computer Interaction and mechanical engineering, Dexter leads the development of the next generation of patented nerve-sensing electroneuro…
 
John Jackson is a Senior Application Security Engineer by day and security researcher and hacker advocate in his spare time. John discusses his path into application security and hacking. He discusses how hackers should not be viewed as the bad guys and are the truly heroes. Guest John Jackson, Founder of Sakura Samurai (@johnjhacking on Twitter) H…
 
In this third episode, the group discusses the value of taking some time to reflect on the definition and desired outcome for the business process being implemented as you begin to execute and get it into the hands of the end user. Many found that ignoring or bypassing user acceptance training as part of the process could make things that much hard…
 
The Your Everyday Cyber audience has questions and we have answers: welcome to our special “Ask Us Anything” episode, crafted especially for you, our listener. Tune in to hear our answers to these questions: How do you find guests for the podcast? Why did you decide to focus on the Everyday consumer? What’s your favorite part about being in cyber s…
 
"Perhaps the most underused person in healthcare is the patient." — Prof. David Cutler | A quote that reminds us that any Healthcare system should be patient-centric — built for and around it. In our societies, this is not the case, but technology can help create such a system. We all know that we should be moving away from a system that prioritize…
 
In this episode, we meet with George Tang to discuss professional certifications. What tips or tricks do you use to prepare for Certification exams? How to prioritize the certifications you want to obtain? All of these questions and more will be answered during this episode. We are thankful you are here, please enjoy. Guest George Tang, Principal S…
 
Bots have been around for a very long time. At its basic level, a bot is merely a script that can automate a computer task on behalf of the human; as such, it can do good things or bad things. Like most technology, the line is thin and blurry. It can get ugly too. Bots have also come a long way since their inception. They can provide automated cust…
 
In this episode of Tech Done Different, we chat with serial entrepreneur Josh Little, CEO and Founder of Volley App. In his pursuit of solving the disaster that is overwhelming calendars and neverending video meetings, Josh has learned a few things about how to solve problems worth solving. You'll learn: that 93% of communication is nonverbal why t…
 
Is there such a thing as human morality that can help us distinguish between good and evil. Or, is it influenced by cultures? Nowadays, we talk quite a bit about ethics because technology amplifies the issue: AI, algorithms, privacy, security, and surveillance. The meaning of life? Bathing at the beach naked or fully dressed? Was Big Brother right …
 
When businesses rely on their own infrastructure to protect their customers' products and services, security analysts are left with very little room for error and no time to waste. Long waiting times on database search results is most certainly not a good thing. Many might be skeptical that the latest and greatest methods and technologies can meet …
 
During this episode, we meet with the brilliant and extremely humble JR who has over 15 years of experience in the cyber space. She talks about her unique experience going from medical work to now be working in the cyber threat space where she now works with Cyber Crime, Human Intel and so much more. Anyone considering getting into the cyber threat…
 
Virtual and Augmented Reality solutions are racing forward to the future! In this episode we explore the impact these technologies are having on the future of work, edtech and the human experience. JJ Snow is joined by Cortney Harding, Founder and CEO of Friends with Holograms, an entrepreneur and social impact technologist who is using her powers …
 
When thinking of pentesting, you think of computers, networks, and other technologies, but there are pentesters that specialize in hacking humans and buildings. During this episode, Crystal shares how she got into physical pentesting and social engineering coming from a military career. Guest Crystal, Social Engineer, Physical Pentester, Veteran (@…
 
Nowadays, every company is pretty much a technology company, and as such, they all should have some understanding of quality assurance (QA). Also, an understanding of information security would be nice. The question is, how and where do these two worlds collide? And, is that security world AppSec or DevSecOps? Or is it something completely differen…
 
Cybersecurity is a complex topic to understand. A plethora of standards, frameworks, processes, tools, conferences, presentations, courses, and even certifications may help but can also be a bit overwhelming. This is where the community comes in. Understanding the threats and the risk faced by a university is one thing; understanding the high educa…
 
Thank you for joining us for another candid conversation with one very special guest who's very well known in the industry: none other than Tanya Janca: she's an author, a CEO, a startup founder, a programmer, a hacker, and a philanthropist. In this episode, we're going to touch upon some really special aspects about who Tanya is and how she is mak…
 
Looking for signs of fraud and the loss of intellectual property or customer data is not the same. What's the difference? What's the overlap? Are there organizations set up to do both well? Glad you asked. You will find the answers by listening to this podcast. As organizations take their journey on a digital transformation and move to the cloud, m…
 
In this episode of Tech Done Different, we chat with Dr Wanda Toro Turini, who shares insights about how to adapt in order to make sure that a given piece of innovative tech can best service the market. You'll learn: why you gotta listen to what the marketplace is telling you why you need strategy in order to wield the power of technology why (and …
 
Brazilian hacker Filipi Pires discusses hacking, community, mentoring, and learning. During this episode Phillip Wylie and his guest Filipi Pires discusses hacking, community, mentoring, and learning how to become a hacker. Filipi shares his path of going from a non-technical sales role and his path to becoming a hacker. Guest Filipi Pires, Securit…
 
How good of a dish are you going to get when you use bad ingredients? Are you going to blame the recipe? Some people would, and by doing so, they would keep baking bad cooks and blaming the recipe for it. Algorithms work the same. You give AI bad data, you get bad results. The metaphor works well until you realize that, when you end up with a lousy…
 
If we don't open our eyes and think about how we are all different—in so many ways—we will never truly understand that our personal quality of life and behaviors affects that of the group and society we are part of. Is technology helping diversity and inclusivity? Join this conversation with our guest, Becca Lory Hector, as she helps us open our ey…
 
Tanya Janca walks us through how her need for community inspired her to develop one of her own. Join us for an inclusive conversation on how to navigate a male-dominated field and how to create your own success. Tanya Janca, also known as SheHacksPurple, is the author of ‘Alice and Bob Learn Application Security’. She is also the founder of We Hack…
 
In this episode, JJ is joined by Samuel Bertram to discuss the impact that robotics, AI and new plant cultivation technologies will have on conservation and the future of global food production. Food security and conservation issues associated with current industrial farming practices have been a continuing concern due to increased risks from pollu…
 
Upon coming across a Tweet, curiosity quickly rose for what network security fundamentals actually are these days. Have the networks changed so much that "Network Security 101" no longer applies? The best way to find out is to take a walk down memory lane. The most apparent change to the network landscape comes in the form of the cloud, with "every…
 
It may be hard to believe, but data doesn’t just magically appear; it is generated by apps, services, AND, well, all of it, by humans. Storage systems and databases do not magically show up on the scene either; they have to be built and hosted to handle the scenarios encapsulated in the business requirements, desired user experience, and data secur…
 
In this episode of Tech Done Different, you'll hear from a tech entrepreneur who has hit all of the dream milestones: started a company, obtained massive funding, sold the company for over $550m. Brian Requarth, Founder of Latitude and author of Viva The Entrepreneur takes you behind the scenes of how to start and scale a successful tech business. …
 
Need—Innovation—Change—Growth—Mistakes—Fixes—Results—Sprawl—Trim—Repeat. This path seems like the standard road for most businesses, but the truth is that there is no predetermined way to success for any organization. However, there is one clear and a common path to failure—not preparing for, expecting, nor embracing change. "The art of simplicity …
 
When we received the invitation to be part of the event co-hosted by Hacking Is Not A Crime & the Red Team Village, we wanted to do our part by sharing the stories of the non-profit groups involved, and presenting them to our magazine, podcast, and radio audience. It is an honor and a privilege to introduce to all of you some our old and new friend…
 
When we received the invitation to be part of the event co-hosted by Hacking Is Not A Crime & the Red Team Village, we wanted to do our part by sharing the stories of the non-profit groups involved, and presenting them to our magazine, podcast, and radio audience. It is an honor and a privilege to introduce to all of you some our old and new friend…
 
Let's face it, hacking got a bad reputation—it has been in the making for over 30 years, it got worse, and we have to change that. Humans want to have it simple; they want to define things as bad or good, white or black, heaven or hell—but there is so much more in between. ITSPmagazine has always taken a firm stand on the differentiation between ha…
 
There are many things to ponder when planning for a multi-factor authentication (MFA) project. They all can be positioned between two extremes: how to get away without implementing it at all, and multi-locking everything, everywhere, 365 - 24/7. Obviously, the two extremes aren't the correct answer—they never are—so what does that big vast middle g…
 
During this episode, Erika and Jax talk about life hacks, time blocking, and goal setting. You will enjoy listening to a relaxed conversation while learning more about your hosts and what keeps them at the top of their game as high performers within cybersecurity. Do you have a burning question, reach out to us on our social media platforms. We lov…
 
Helena founded Glimpse at Y Combinator (the startup accelerator that spun out Airbnb, DoorDash, Dropbox, etc). Listen along as she discusses her untraditional journey to where she is today! From dropping out of Duke to pivoting days before pitching in front of investors during Demo Day, Helena has an incredible mindset towards taking risks and bein…
 
In this episode of Tech Done Different, we sit down with one of the most inspiring guests yet. Marcus Bullock shares his journey from incarceration to tech entrepreneur, showing us all why and how to be grateful for the lives we get to live every day, and how to apply that gratitude to overcome our many difficulties You'll learn: why gratitude help…
 
When climbing to reach the summit for the business, a security management failure can happen at any moment, resulting in missed opportunities or lost revenue. The good news? Your logs have the solutions. We're not only talking about finding the solution to fix problems when it is too late. We're talking about focusing the resources on knowing the b…
 
Who hasn't heard grandparents say something like: back in my days, life was simpler, better, safer. That's probably—kinda—true. But as time goes by, looking back, even one generation has to take into consideration the technology variable. It is all another story—this one, to be exact. In this Audio Signals episode, we talk with Sonia Livingstone, a…
 
When defined and executed well, a Center of Excellence can be more than a model or process to follow; it can set the bar for the organization by which each part can play a role in making things better. It's not automatic—it requires dedication—and customization. When an organization embarks on its journey to transform how they do business both exte…
 
Meet George Tang and Chloé Messdaghi as we dig into the ugly truth of burnout in the cyber industry. We discuss what burnout means to us while providing the listeners, you, some helpful tips to help keep you from hitting burnout. What tips or tricks do you use to avoid burnout? What does self-care look like? What is life hacks can we use to support…
 
When is a building more than just a thing, and it becomes smart? When it can adjust to the needs of its tenants, occupants, workers, and guests, that's when. In this podcast, we learn what this means and how our spaces should adapt to us and not the other way around. Please listen as Sean chats with designer Todd Boucher to discuss this and the fut…
 
The human resources department within any organization is well-positioned to feel the pulse and monitor a company's culture—teams, divisions, and the organization as a whole. Because of this, it could be the ideal ally to the InfoSec team. But is it? Let's find out. Consider the lifecycle of an employee. The initial company awareness, gaining famil…
 
In this episode of Tech Done Different, we hear from compliance expert AJ Yawn. Perhaps the most surprising takeaway from this dynamic chat with a guru in compliance? Security and compliance are not the same thing. Yet, done properly, compliance can be a powerful driver for security. Listen in to learn: why compliance reports should get better over…
 
Security information and event management (SIEM) solutions have evolved quite a bit over the years. Yet, for most, much of what they do and how they tend to do it have not really matured to a point where they can take a lot of the burden off of the security consultant’s shoulders. In this conversation, we speak with Jason Mical, Cyber Security Evan…
 
Loading …

Quick Reference Guide

Copyright 2021 | Sitemap | Privacy Policy | Terms of Service
Google login Twitter login Classic login