show episodes
 
Artwork

1
Data @ Rest

UNC Chapel Hill's & UNC Fayetteville State's Information Security Offices

Unsubscribe
Unsubscribe
Monthly
 
"Data at Rest" is an accessible but informed discussion of current concepts, best practices, and personal experiences in computer security, network security, and information security overall, including interviews with expert guests and the history of each topic.
  continue reading
 
SAM is the leading provider of cloud-native security and intelligence services for unmanaged networks and IoTs, covering upwards of 500 million connected devices globally. With its powerful and intuitive AI technology, SAM addresses the challenges of our hyperconnected world, in which an explosion of IoT devices exposes potential attack surfaces for companies and consumers alike. SAM's device-agnostic software provides deep ​network visibility to not only protect against sophisticated cyber- ...
  continue reading
 
Loading …
show series
 
Are high-end smart devices reshaping the way we live? This episode of SAMiBits explores the characteristics of premium IoT households, uncovering valuable insights and strategies for Internet Service Providers to improve their users’ experience while creating additional business opportunities. Join us as Nadav Liebermann, SAM’s VP of Innovation and…
  continue reading
 
This episode of SAMiBits dives into the ins and outs of the IoT vulnerability challenge, specifically looking at how it impacts home and small office users and the ISPs serving them. With the growing number of connected smart devices through gateways, understanding potential threats and solutions is crucial. SAM's VP of Innovation and Data, Nadav L…
  continue reading
 
Recorded in front of a live audience at UNC CAUSE in October, 2022! The Zero Trust Framework raises valid questions about risk reduction. But, as one CISO used to say, "we have to trust someone eventually, right?" Or do we? Universities, are built on a philosophy of openness and enrichment of public understanding. How do we preserve the public's tr…
  continue reading
 
Charlie and Michael are joined by Drew Trumbull, Incident Handling Team Lead for UNC Chapel Hill's Information Security Office, to talk about the latest threats we see and what folks should do if they think they might have been targeted successfully by them, plus the importance of compassion and empathy in our field. There are also side discussions…
  continue reading
 
As ISPs move their services to the cloud, ensuring privacy and security becomes crucial. With the rising number of connected smart devices putting customers' personal data at risk, ISPs must safeguard against security threats and adhere to privacy regulations to protect their users effectively. In this episode of SAMiBits, SAM’s Chief Information S…
  continue reading
 
The IoT ecosystem is exploding: Many of today’s smart homes or small offices contain 20 connected IoT devices or more. While anti-virus software protects customers’ PCs, it does not cover the rest of the network and IoT devices. Therefore, how can ISPs help their customers manage and secure all of that and get more for their network investment? In …
  continue reading
 
Security and privacy are often mentioned hand-in-hand in our industry, but they're actually very different fields with different considerations and concerns--and the policies applying to one are not necessarily meant to address those of the other. Charlie and Michael welcome Kim Stahl, Senior Policy and Process Lead for UNC Chapel Hill's Informatio…
  continue reading
 
Charlie and Michael have discussed communicating security risks and strategies to older users and at-risk users, but what about students and younger users? We welcome guests Lila Davidson and Louise Flinn from the UNC Chapel Hill ITS Communications team to discuss things to consider when we do outreach focusing on students and others on the cusp of…
  continue reading
 
Anyone who works in information security knows that we, perhaps more than any other IT sector, are reliant on a forest of vendors, each promising the moon and often duplicating others' capabilities. Join Charlie and Michael for a frank discussion of the best and worst parts of managing those vendor relationships and what we look to gain from them. …
  continue reading
 
In this SAMiBits episode, SAM’s CRO, Pirjo Tuomi, explores how – and why – ISPs should incorporate digital security when creating meaningful customer offerings. We’ll look at a handful of crucial insights on the topic and will study SAM’s customer success stories to illustrate why bundling security is key to building trust with customers and leads …
  continue reading
 
We were especially honoured to be joined by Katherine Gronberg of NightDragon for this episode to discuss IoT security and specifically IoT security for homes and small businesses. Katherine is the Head of Government Services at NightDragon, which is an investment company focusing on the cybersecurity, security, and privacy risk sectors. Katherine …
  continue reading
 
In recent years, low-tier SMBs and SOHOs have become popular targets for cyber-attacks. What does this mean for telcos seeking protection for their small business clients? In this episode of SAMiBits, SAM’s VP Strategic Alliances, David Jurgens, talks through some of the most prevalent threats faced by modern SMBs and SOHOs and offers advice on how…
  continue reading
 
This episode dives into multiple aspects of deep network visibility: The potential that it unlocks for businesses, the ways in which it helps businesses serve their customers, and the challenges of gaining and maintaining it. We’re here to tell you that your business has much to gain from seeing network-connected devices as well as understanding th…
  continue reading
 
Charlie and Michael discuss what "blockchain" means, its slightly mysterious history, its best-known applications, and their unfiltered opinions on the anciliary effects of some uses of this otherwise fascinating technology! Contact us: dataatrest@unc.edu Musical credit: Pixelland Kevin MacLeod (incompetech.com) Licensed under Creative Commons: By …
  continue reading
 
Online and phone-based scams are everywhere. Do you keep getting phone calls about your car's extended warranty? Do you get text messages offering to buy your house? Or did a seller in an online store offer you a refund if you took down your one-star review Charlie and Michael dive deep into the murkier end of the pool! Links: Scam Alerts (Federal …
  continue reading
 
There's been a lot of talk about election security for nearly two years now, most of it rife with conspiracy theories, misinformation, and disinformation. But what are the real risks to elections, and how do we mitigate them? Links: Election Security: Rumor vs. Reality (CISA.gov) North Carolina State Board of Elections Contact us: dataatrest@unc.ed…
  continue reading
 
Mobile Security is an evergreen concern and it only gets bigger and more mystifying. Charlie and Michael welcome back unofficial co-host Jared Perdue to discuss wireless and mobile security now and in the future! Links: Wireless Security Trends/CISO Cheat Sheet (excerpt from Jennifer Minella's talk) https://lastpass.unc.edu How to Keep Your Mobile …
  continue reading
 
Social media can feel like a nonstop shouting match. But what if you found out half the screaming voices aren't even real people but are, in fact, bots designed to make you feel alienated, angry, and afraid? By coincidence, this episode was published the same day a deal to purchase Twitter was put on hold due to this very concern! Contact us: dataa…
  continue reading
 
Join Charlie and Michael as they present to UNC CAUSE 2020 about ways to create meaningful connections and continue to develop user awareness in an era of teleconferencing and telecommuting. Contact us: dataatrest@unc.edu Musical credit: Pixelland Kevin MacLeod (incompetech.com) Licensed under Creative Commons: By Attribution 3.0 License http://cre…
  continue reading
 
Listen in as Charlie and Michael present at InfoSeCon 2020 on what to consider when relocating a workforce en masse and then get left without adult supervision for the last few minutes of the panel. Link to the video in the show notes! Watch the Video: Data@Rest at InfoSeCon 2020 Contact us: dataatrest@unc.edu Musical credit: Pixelland Kevin MacLeo…
  continue reading
 
SCADA systems are the computers that control industrial systems in the real world. That may sound like a dry topic, but it's chock full of risk and fascinating stories, some of them ripped from very recent headlines! Links: "Someone tried to poison Oldmsar's water supply during hack, sheriff says" (Tampa Bay Times) "Running a fake power plant on th…
  continue reading
 
Many of us have people in our lives who may be particularly vulnerable to information security risks. How do we help those folks stay safer online, avoid scams, and otherwise protect themselves? Charlie, Michael, and Casey discuss this and offer some tips & tricks! Links: STOP. THINK. CONNECT. (CISA) Contact us: dataatrest@unc.edu Musical credit: P…
  continue reading
 
Free and Open-Source Software is popular, but are they secure? The answer is: yes, maybe. Join Charlie, Michael, and Casey as we discuss how to navigate participating in the innovation of FOSS while staying safe. Links: How to check a hash Contact us: dataatrest@unc.edu Musical credit: Pixelland Kevin MacLeod (incompetech.com) Licensed under Creati…
  continue reading
 
Our second request of the season! Close out Season Three with Charlie and Michael as they discuss the concept of "shadow IT," the dangers it presents, and why there's that saying about a road paved in good intentions. Musical credit: Pixelland Kevin MacLeod (incompetech.com) Licensed under Creative Commons: By Attribution 3.0 License http://creativ…
  continue reading
 
Michael goes down the rabbit hole of the history of modern networks and network security, and Charlie and Michael discuss different network-based attacks and how to defend against them. Musical credit: Pixelland Kevin MacLeod (incompetech.com) Licensed under Creative Commons: By Attribution 3.0 License http://creativecommons.org/licenses/by/3.0/…
  continue reading
 
Charlie and Michael are joined by three of their colleagues - Tiffany, Glenn, and Drew - to talk about the different roles in UNC Chapel Hill's Information Security Office and how those roles intersect. Musical credit: Pixelland Kevin MacLeod (incompetech.com) Licensed under Creative Commons: By Attribution 3.0 License http://creativecommons.org/li…
  continue reading
 
Charlie and Michael had the honor of presenting a talk at the Hackers on Planet Earth 2020 conference. This one's on how to welcome new folks into the information security industry and some specific resources we recommend to folks who want to learn more, beginners or otherwise. You can even watch the video version, including live Q&A! Musical credi…
  continue reading
 
Our colleague and listener Mark requested we cover Biometrics, and Michael loved reading up on this topic! Join in while Michael meanders down the twisting road of the history of trying to use people's bodies to authenticate their identities. Musical credit: Pixelland Kevin MacLeod (incompetech.com) Licensed under Creative Commons: By Attribution 3…
  continue reading
 
Charlie and Michael wrap up the "Zoomisode" mini-season with an Episode X all about what's coming in Season 3! The Unicorn Project @ Bookshop.org Data@Rest on Facebook Data@Rest on Twitter safecomputing.unc.edu Musical credit: Pixelland Kevin MacLeod (incompetech.com) Licensed under Creative Commons: By Attribution 3.0 License http://creativecommon…
  continue reading
 
Scam emails playing on COVID-19 concerns to steal charitable donations, relief payments, or your credentials: they're happening, and are simply the most recent example in the long history of what are called "disaster scams." Join Charlie and Michael for a discussion of a famous recent example, how to spot a scam, how to protect yourself against it,…
  continue reading
 
Join us for a quick, straightforward discussion of simple steps you can take to reduce risk if you're one of the many people now working from home - and perhaps doing so for the first time. Links for show notes: safecomputing.unc.edu patching.unc.edu SANS' Top 5 Steps to Securely Work from Home SANS' Security Awareness Deployment Guide - Securely W…
  continue reading
 
Charlie and Michael recap and revisit the season and a couple of follow-up items, then preview Season Three! Reminder: we're doing a book club episode in Season Three! Read The Unicorn Project if you want to join in! Safecomputing.unc.edu Musical credit: Pixelland Kevin MacLeod (incompetech.com) Licensed under Creative Commons: By Attribution 3.0 L…
  continue reading
 
Jared Perdue joins Charlie and Michael talk about the risks to keep in mind when travelling: “burn books,” encryption concerns, and legal risks. Travel Safely with Technology (safecomputing.unc.edu) Safecomputing.unc.edu Musical credit: Pixelland Kevin MacLeod (incompetech.com) Licensed under Creative Commons: By Attribution 3.0 License http://crea…
  continue reading
 
Charlie and Michael are joined by colleagues and partners from around campus - Bryan Andregg (IT Security & Systems Manager, UNC Gillings School of Public Health), Mark Ingram (IT Infrastructure & Support Manager, University Development), Rob Noel (College of Arts & Sciences, Gemini), Jared Perdue (Security Operations Analyst), Tiffany Temple (CISS…
  continue reading
 
Data at Rest 02x04: Project Management Brenda Carpen, MBA PMP, IT Project Manager for ITS Infrastructure & Operations, joins Charlie and Michael to discuss the history of project management, current techniques, and how applying its concepts can make our work better, less stressful, and more secure. Plus, we decide to do a book club! BOOK CLUB BOOK:…
  continue reading
 
Data at Rest 02x03: Disinformation Charlie and Michael are joined by Professor Deen Freelon of UNC’s Hussman School of Journalism and Media and UNC’s Center for Internet, Technology, and Public Life, to discuss disinformation campaigns on the Internet and how to spot the warning signs that information might not be authentic. Plus: Potemkin villages…
  continue reading
 
Data at Rest 02x02 - Internet of Things Charlie and Michael discuss the history of people connecting unexpected devices to the Internet, how to secure them, and what to do when your dog camera goes to war with your doorbell. (OK, we’re kidding about that last part – or are we?) 3133t SNAX0rZ (Wayback Machine) Ambient Orb (Wikipedia) Future Shock (G…
  continue reading
 
Data at Rest 02x01 - Communications & Social Media Kate Hash, UNC ITS Assistant Vice Chancellor for Customer Experience and Engagement and ITS Chief of Staff, joins Charlie and Michael for a discussion of effective communications strategies, managing social media, and TWO history lessons to ring in Season Two! Links: Hulk Hogan's Theme Song (YouTub…
  continue reading
 
Data at Rest - Episode 01x07: Popular Culture Movies and TV! How is Information Security represented in popular culture? What movies or shows or comics or books influenced us to get into this field? And if you're concerned about your own information security practices, and how you can reduce the risk to yourself and to your computer at home, what a…
  continue reading
 
Data at Rest - Episode 01x06: Ethical Hacking Is there such a thing as "ethical hacking"? What does it mean? How can you gain the benefits of it, and what should you keep in mind if you engage with one? And if you're interested, how can you hack yourself for fun, education, and profit? Special guest: Jared Perdue. Hacking for Dummies (Goodreads) Re…
  continue reading
 
Data at Rest - Episode 01x05: Working in Information Security How did we get started in Information Security? If you're in Information Security, what certifications are good to advance your career? And if you're not in Information Security, how can you get in? Special guest: Larry Fritsche. The Cuckoo's Egg (Goodreads)…
  continue reading
 
Data at Rest - Episode 01x04: Perimeter Security What is the "perimeter" of your network, and how has the definition of that concept changed over time? Also: the history of several physical and geographical border walls through history (spoiler: they don't seem to work) and what the new metaphorical border of the network will be going forward. Spec…
  continue reading
 
Loading …

Quick Reference Guide