"Data at Rest" is an accessible but informed discussion of current concepts, best practices, and personal experiences in computer security, network security, and information security overall, including interviews with expert guests and the history of each topic.
…
continue reading
SAM is the leading provider of cloud-native security and intelligence services for unmanaged networks and IoTs, covering upwards of 500 million connected devices globally. With its powerful and intuitive AI technology, SAM addresses the challenges of our hyperconnected world, in which an explosion of IoT devices exposes potential attack surfaces for companies and consumers alike. SAM's device-agnostic software provides deep network visibility to not only protect against sophisticated cyber- ...
…
continue reading
1
Connected Lifestyles: Serving High-End IoT Homes
10:19
10:19
Play later
Play later
Lists
Like
Liked
10:19
Are high-end smart devices reshaping the way we live? This episode of SAMiBits explores the characteristics of premium IoT households, uncovering valuable insights and strategies for Internet Service Providers to improve their users’ experience while creating additional business opportunities. Join us as Nadav Liebermann, SAM’s VP of Innovation and…
…
continue reading
1
IoT Vulnerabilities: Navigating the Patching Challenge
12:59
12:59
Play later
Play later
Lists
Like
Liked
12:59
This episode of SAMiBits dives into the ins and outs of the IoT vulnerability challenge, specifically looking at how it impacts home and small office users and the ISPs serving them. With the growing number of connected smart devices through gateways, understanding potential threats and solutions is crucial. SAM's VP of Innovation and Data, Nadav L…
…
continue reading
1
D@R 06x05 - UNC CAUSE 2022 - Open Doors, Zero Trust
44:07
44:07
Play later
Play later
Lists
Like
Liked
44:07
Recorded in front of a live audience at UNC CAUSE in October, 2022! The Zero Trust Framework raises valid questions about risk reduction. But, as one CISO used to say, "we have to trust someone eventually, right?" Or do we? Universities, are built on a philosophy of openness and enrichment of public understanding. How do we preserve the public's tr…
…
continue reading
1
D@R 06x04 - Incident Handling Revisited (COBRAAAAAAAAAA!)
49:04
49:04
Play later
Play later
Lists
Like
Liked
49:04
Charlie and Michael are joined by Drew Trumbull, Incident Handling Team Lead for UNC Chapel Hill's Information Security Office, to talk about the latest threats we see and what folks should do if they think they might have been targeted successfully by them, plus the importance of compassion and empathy in our field. There are also side discussions…
…
continue reading
1
The Privacy-Security Paradox: Protecting Customer Data in the Cloud
8:41
8:41
Play later
Play later
Lists
Like
Liked
8:41
As ISPs move their services to the cloud, ensuring privacy and security becomes crucial. With the rising number of connected smart devices putting customers' personal data at risk, ISPs must safeguard against security threats and adhere to privacy regulations to protect their users effectively. In this episode of SAMiBits, SAM’s Chief Information S…
…
continue reading
1
Balancing Customer Satisfaction & Business Growth: Navigating Device, Cloud & Network Protection
10:56
10:56
Play later
Play later
Lists
Like
Liked
10:56
The IoT ecosystem is exploding: Many of today’s smart homes or small offices contain 20 connected IoT devices or more. While anti-virus software protects customers’ PCs, it does not cover the rest of the network and IoT devices. Therefore, how can ISPs help their customers manage and secure all of that and get more for their network investment? In …
…
continue reading
1
D@R 06x03 - Privacy, Policy, and Privacy Policies
37:36
37:36
Play later
Play later
Lists
Like
Liked
37:36
Security and privacy are often mentioned hand-in-hand in our industry, but they're actually very different fields with different considerations and concerns--and the policies applying to one are not necessarily meant to address those of the other. Charlie and Michael welcome Kim Stahl, Senior Policy and Process Lead for UNC Chapel Hill's Informatio…
…
continue reading
1
D@R 06x02 - Communicating with Students & Young Users
37:53
37:53
Play later
Play later
Lists
Like
Liked
37:53
Charlie and Michael have discussed communicating security risks and strategies to older users and at-risk users, but what about students and younger users? We welcome guests Lila Davidson and Louise Flinn from the UNC Chapel Hill ITS Communications team to discuss things to consider when we do outreach focusing on students and others on the cusp of…
…
continue reading
Anyone who works in information security knows that we, perhaps more than any other IT sector, are reliant on a forest of vendors, each promising the moon and often duplicating others' capabilities. Join Charlie and Michael for a frank discussion of the best and worst parts of managing those vendor relationships and what we look to gain from them. …
…
continue reading
In this SAMiBits episode, SAM’s CRO, Pirjo Tuomi, explores how – and why – ISPs should incorporate digital security when creating meaningful customer offerings. We’ll look at a handful of crucial insights on the topic and will study SAM’s customer success stories to illustrate why bundling security is key to building trust with customers and leads …
…
continue reading
1
IoT Security International Regulation & Trends
14:58
14:58
Play later
Play later
Lists
Like
Liked
14:58
We were especially honoured to be joined by Katherine Gronberg of NightDragon for this episode to discuss IoT security and specifically IoT security for homes and small businesses. Katherine is the Head of Government Services at NightDragon, which is an investment company focusing on the cybersecurity, security, and privacy risk sectors. Katherine …
…
continue reading
1
How Network Service Providers Secure Micro-Business & SOHO Clients
11:25
11:25
Play later
Play later
Lists
Like
Liked
11:25
In recent years, low-tier SMBs and SOHOs have become popular targets for cyber-attacks. What does this mean for telcos seeking protection for their small business clients? In this episode of SAMiBits, SAM’s VP Strategic Alliances, David Jurgens, talks through some of the most prevalent threats faced by modern SMBs and SOHOs and offers advice on how…
…
continue reading
This episode dives into multiple aspects of deep network visibility: The potential that it unlocks for businesses, the ways in which it helps businesses serve their customers, and the challenges of gaining and maintaining it. We’re here to tell you that your business has much to gain from seeing network-connected devices as well as understanding th…
…
continue reading
1
Data at Rest 05x07 - Episode X for Season Five
6:36
6:36
Play later
Play later
Lists
Like
Liked
6:36
Charlie and Michael share a couple of updates and discuss the history--and future--of the show. See y'all in the fall! Contact us: dataatrest@unc.edu Musical credit: Pixelland Kevin MacLeod (incompetech.com) Licensed under Creative Commons: By Attribution 3.0 License http://creativecommons.org/licenses/by/3.0/…
…
continue reading
Charlie and Michael discuss what "blockchain" means, its slightly mysterious history, its best-known applications, and their unfiltered opinions on the anciliary effects of some uses of this otherwise fascinating technology! Contact us: dataatrest@unc.edu Musical credit: Pixelland Kevin MacLeod (incompetech.com) Licensed under Creative Commons: By …
…
continue reading
1
Data at Rest 05x05 - A Security Refresher
16:21
16:21
Play later
Play later
Lists
Like
Liked
16:21
Charlie and Michael take a conversational look at a few fundamentals of security it never hurts to revisit and review. Contact us: dataatrest@unc.edu Musical credit: Pixelland Kevin MacLeod (incompetech.com) Licensed under Creative Commons: By Attribution 3.0 License http://creativecommons.org/licenses/by/3.0/…
…
continue reading
Online and phone-based scams are everywhere. Do you keep getting phone calls about your car's extended warranty? Do you get text messages offering to buy your house? Or did a seller in an online store offer you a refund if you took down your one-star review Charlie and Michael dive deep into the murkier end of the pool! Links: Scam Alerts (Federal …
…
continue reading
There's been a lot of talk about election security for nearly two years now, most of it rife with conspiracy theories, misinformation, and disinformation. But what are the real risks to elections, and how do we mitigate them? Links: Election Security: Rumor vs. Reality (CISA.gov) North Carolina State Board of Elections Contact us: dataatrest@unc.ed…
…
continue reading
1
Data at Rest 05x02 - Mobile Security with Jared Perdue
42:03
42:03
Play later
Play later
Lists
Like
Liked
42:03
Mobile Security is an evergreen concern and it only gets bigger and more mystifying. Charlie and Michael welcome back unofficial co-host Jared Perdue to discuss wireless and mobile security now and in the future! Links: Wireless Security Trends/CISO Cheat Sheet (excerpt from Jennifer Minella's talk) https://lastpass.unc.edu How to Keep Your Mobile …
…
continue reading
Social media can feel like a nonstop shouting match. But what if you found out half the screaming voices aren't even real people but are, in fact, bots designed to make you feel alienated, angry, and afraid? By coincidence, this episode was published the same day a deal to purchase Twitter was put on hold due to this very concern! Contact us: dataa…
…
continue reading
1
Data at Rest 04x05 - Beyond Zoom - Security Outreach - UNC CAUSE 2020
24:57
24:57
Play later
Play later
Lists
Like
Liked
24:57
Join Charlie and Michael as they present to UNC CAUSE 2020 about ways to create meaningful connections and continue to develop user awareness in an era of teleconferencing and telecommuting. Contact us: dataatrest@unc.edu Musical credit: Pixelland Kevin MacLeod (incompetech.com) Licensed under Creative Commons: By Attribution 3.0 License http://cre…
…
continue reading
1
Data at Rest 04x04 - Beyond BYOD - InfoSeCon 2020
36:41
36:41
Play later
Play later
Lists
Like
Liked
36:41
Listen in as Charlie and Michael present at InfoSeCon 2020 on what to consider when relocating a workforce en masse and then get left without adult supervision for the last few minutes of the panel. Link to the video in the show notes! Watch the Video: Data@Rest at InfoSeCon 2020 Contact us: dataatrest@unc.edu Musical credit: Pixelland Kevin MacLeo…
…
continue reading
SCADA systems are the computers that control industrial systems in the real world. That may sound like a dry topic, but it's chock full of risk and fascinating stories, some of them ripped from very recent headlines! Links: "Someone tried to poison Oldmsar's water supply during hack, sheriff says" (Tampa Bay Times) "Running a fake power plant on th…
…
continue reading
1
Data at Rest 04x02 - Security Concerns for Vulnerable Users
13:17
13:17
Play later
Play later
Lists
Like
Liked
13:17
Many of us have people in our lives who may be particularly vulnerable to information security risks. How do we help those folks stay safer online, avoid scams, and otherwise protect themselves? Charlie, Michael, and Casey discuss this and offer some tips & tricks! Links: STOP. THINK. CONNECT. (CISA) Contact us: dataatrest@unc.edu Musical credit: P…
…
continue reading
1
Data at Rest 04x01 - Free & Open-Source Software
21:58
21:58
Play later
Play later
Lists
Like
Liked
21:58
Free and Open-Source Software is popular, but are they secure? The answer is: yes, maybe. Join Charlie, Michael, and Casey as we discuss how to navigate participating in the innovation of FOSS while staying safe. Links: How to check a hash Contact us: dataatrest@unc.edu Musical credit: Pixelland Kevin MacLeod (incompetech.com) Licensed under Creati…
…
continue reading
Join us as we discuss 2020: A Year That Existed! Musical credit: Pixelland Kevin MacLeod (incompetech.com) Licensed under Creative Commons: By Attribution 3.0 License http://creativecommons.org/licenses/by/3.0/By UNC Information Security Office
…
continue reading
Our second request of the season! Close out Season Three with Charlie and Michael as they discuss the concept of "shadow IT," the dangers it presents, and why there's that saying about a road paved in good intentions. Musical credit: Pixelland Kevin MacLeod (incompetech.com) Licensed under Creative Commons: By Attribution 3.0 License http://creativ…
…
continue reading
1
Data at Rest 03x07: Book Club - The Unicorn Project
38:40
38:40
Play later
Play later
Lists
Like
Liked
38:40
A panel of folks from across the University discuss Gene Kim's The Unicorn Project. Musical credit: Pixelland Kevin MacLeod (incompetech.com) Licensed under Creative Commons: By Attribution 3.0 License http://creativecommons.org/licenses/by/3.0/By UNC Chapel Hill's Information Security Office
…
continue reading
Michael goes down the rabbit hole of the history of modern networks and network security, and Charlie and Michael discuss different network-based attacks and how to defend against them. Musical credit: Pixelland Kevin MacLeod (incompetech.com) Licensed under Creative Commons: By Attribution 3.0 License http://creativecommons.org/licenses/by/3.0/…
…
continue reading
1
Data at Rest 03x05: What Does an Information Security Office Do?
23:06
23:06
Play later
Play later
Lists
Like
Liked
23:06
Charlie and Michael are joined by three of their colleagues - Tiffany, Glenn, and Drew - to talk about the different roles in UNC Chapel Hill's Information Security Office and how those roles intersect. Musical credit: Pixelland Kevin MacLeod (incompetech.com) Licensed under Creative Commons: By Attribution 3.0 License http://creativecommons.org/li…
…
continue reading
1
Data at Rest 03x04: HOPE 2020 - Be Kind to the N00bz
27:41
27:41
Play later
Play later
Lists
Like
Liked
27:41
Charlie and Michael had the honor of presenting a talk at the Hackers on Planet Earth 2020 conference. This one's on how to welcome new folks into the information security industry and some specific resources we recommend to folks who want to learn more, beginners or otherwise. You can even watch the video version, including live Q&A! Musical credi…
…
continue reading
Charlie and Michael talk to our office's resident members of CLOUD FORCE(!) about cloud security. Musical credit: Pixelland Kevin MacLeod (incompetech.com) Licensed under Creative Commons: By Attribution 3.0 License http://creativecommons.org/licenses/by/3.0/By UNC Chapel Hill's Information Security Office
…
continue reading
Our colleague and listener Mark requested we cover Biometrics, and Michael loved reading up on this topic! Join in while Michael meanders down the twisting road of the history of trying to use people's bodies to authenticate their identities. Musical credit: Pixelland Kevin MacLeod (incompetech.com) Licensed under Creative Commons: By Attribution 3…
…
continue reading
Charlie and Michael wrap up the "Zoomisode" mini-season with an Episode X all about what's coming in Season 3! The Unicorn Project @ Bookshop.org Data@Rest on Facebook Data@Rest on Twitter safecomputing.unc.edu Musical credit: Pixelland Kevin MacLeod (incompetech.com) Licensed under Creative Commons: By Attribution 3.0 License http://creativecommon…
…
continue reading
1
Data at Rest 02x10 - Zoomisode 2 - Disaster Scams
23:33
23:33
Play later
Play later
Lists
Like
Liked
23:33
Scam emails playing on COVID-19 concerns to steal charitable donations, relief payments, or your credentials: they're happening, and are simply the most recent example in the long history of what are called "disaster scams." Join Charlie and Michael for a discussion of a famous recent example, how to spot a scam, how to protect yourself against it,…
…
continue reading
1
Data at Rest 02x09 - Zoomisode 1 - Securely Working from Home
15:52
15:52
Play later
Play later
Lists
Like
Liked
15:52
Join us for a quick, straightforward discussion of simple steps you can take to reduce risk if you're one of the many people now working from home - and perhaps doing so for the first time. Links for show notes: safecomputing.unc.edu patching.unc.edu SANS' Top 5 Steps to Securely Work from Home SANS' Security Awareness Deployment Guide - Securely W…
…
continue reading
Charlie and Michael recap and revisit the season and a couple of follow-up items, then preview Season Three! Reminder: we're doing a book club episode in Season Three! Read The Unicorn Project if you want to join in! Safecomputing.unc.edu Musical credit: Pixelland Kevin MacLeod (incompetech.com) Licensed under Creative Commons: By Attribution 3.0 L…
…
continue reading
1
Data at Rest 02x06: Traveling Safely With Technology
25:41
25:41
Play later
Play later
Lists
Like
Liked
25:41
Jared Perdue joins Charlie and Michael talk about the risks to keep in mind when travelling: “burn books,” encryption concerns, and legal risks. Travel Safely with Technology (safecomputing.unc.edu) Safecomputing.unc.edu Musical credit: Pixelland Kevin MacLeod (incompetech.com) Licensed under Creative Commons: By Attribution 3.0 License http://crea…
…
continue reading
1
Data at Rest 02x05: Gamification of Information Security
1:02:34
1:02:34
Play later
Play later
Lists
Like
Liked
1:02:34
Charlie and Michael are joined by colleagues and partners from around campus - Bryan Andregg (IT Security & Systems Manager, UNC Gillings School of Public Health), Mark Ingram (IT Infrastructure & Support Manager, University Development), Rob Noel (College of Arts & Sciences, Gemini), Jared Perdue (Security Operations Analyst), Tiffany Temple (CISS…
…
continue reading
Data at Rest 02x04: Project Management Brenda Carpen, MBA PMP, IT Project Manager for ITS Infrastructure & Operations, joins Charlie and Michael to discuss the history of project management, current techniques, and how applying its concepts can make our work better, less stressful, and more secure. Plus, we decide to do a book club! BOOK CLUB BOOK:…
…
continue reading
Data at Rest 02x03: Disinformation Charlie and Michael are joined by Professor Deen Freelon of UNC’s Hussman School of Journalism and Media and UNC’s Center for Internet, Technology, and Public Life, to discuss disinformation campaigns on the Internet and how to spot the warning signs that information might not be authentic. Plus: Potemkin villages…
…
continue reading
Data at Rest 02x02 - Internet of Things Charlie and Michael discuss the history of people connecting unexpected devices to the Internet, how to secure them, and what to do when your dog camera goes to war with your doorbell. (OK, we’re kidding about that last part – or are we?) 3133t SNAX0rZ (Wayback Machine) Ambient Orb (Wikipedia) Future Shock (G…
…
continue reading
1
Data at Rest 02x01 - Communications & Social Media
51:03
51:03
Play later
Play later
Lists
Like
Liked
51:03
Data at Rest 02x01 - Communications & Social Media Kate Hash, UNC ITS Assistant Vice Chancellor for Customer Experience and Engagement and ITS Chief of Staff, joins Charlie and Michael for a discussion of effective communications strategies, managing social media, and TWO history lessons to ring in Season Two! Links: Hulk Hogan's Theme Song (YouTub…
…
continue reading
1
Data at Rest 01x09: 2019 End of Year Special
41:48
41:48
Play later
Play later
Lists
Like
Liked
41:48
Data at Rest 01x09: 2019 End of Year Special Join us for a discussion of the trends and big stories from Information Security in 2019, our predictions for 2020, and a fun history lesson on the origin of a common New Year's celebration technique!By UNC Chapel Hill's Information Security Office
…
continue reading
Data at Rest - Episode 01x08: Episode X Welcome to the end of Season One! We give some updates on earlier episodes and topics, talk about Season Two, and get in a few laughs before signing off. Thanks for listening - see you next season!By UNC Chapel Hill's Information Security Office
…
continue reading
1
Data at Rest 01x07: Popular Culture!
1:06:48
1:06:48
Play later
Play later
Lists
Like
Liked
1:06:48
Data at Rest - Episode 01x07: Popular Culture Movies and TV! How is Information Security represented in popular culture? What movies or shows or comics or books influenced us to get into this field? And if you're concerned about your own information security practices, and how you can reduce the risk to yourself and to your computer at home, what a…
…
continue reading
Data at Rest - Episode 01x06: Ethical Hacking Is there such a thing as "ethical hacking"? What does it mean? How can you gain the benefits of it, and what should you keep in mind if you engage with one? And if you're interested, how can you hack yourself for fun, education, and profit? Special guest: Jared Perdue. Hacking for Dummies (Goodreads) Re…
…
continue reading
1
Data at Rest 01x05: Working in Information Security
54:50
54:50
Play later
Play later
Lists
Like
Liked
54:50
Data at Rest - Episode 01x05: Working in Information Security How did we get started in Information Security? If you're in Information Security, what certifications are good to advance your career? And if you're not in Information Security, how can you get in? Special guest: Larry Fritsche. The Cuckoo's Egg (Goodreads)…
…
continue reading
1
Data at Rest 01x04: Perimeter Security
1:00:23
1:00:23
Play later
Play later
Lists
Like
Liked
1:00:23
Data at Rest - Episode 01x04: Perimeter Security What is the "perimeter" of your network, and how has the definition of that concept changed over time? Also: the history of several physical and geographical border walls through history (spoiler: they don't seem to work) and what the new metaphorical border of the network will be going forward. Spec…
…
continue reading
Data at Rest - Episode 01x03: Threat Detection What is a threat? What is an exploit? Plus: the history and evolution of how we think about "insider" threats versus "outsider" threats. The Orange Book (PDF) James Anderson (obituary at IEEE) Dorothy Denning (Wikipedia) Peter Neumann (Wikipedia) Clipper Chip (Wikipedia)…
…
continue reading