Crucial Tech

Crucial Tech

By Lou Covey

Unraveling the technology that affects us all but that few of us understand, in a format to give you a basic understanding in the time it takes to drive to and from the grocery store.
Available on
Apple Podcasts Logo
Overcast Logo
Pocket Casts Logo
RadioPublic Logo
Spotify Logo
Currently playing episode

Episode 10.3 - James Bore on our fascination with shiny objects

Crucial TechJan 17, 2025
00:00
27:18
Episode 10.21 - Netacea and stopping malicious bots

Episode 10.21 - Netacea and stopping malicious bots

During @RSAC Conference in April I met with Matthew Gracey-McMinn, VP of Threat Services for Netacea and we talked about the damage malicious bots can do. His company is one of a handful of companies dedicated to protecting users against that threat, in particular media companies. It was a short conversation and I decided it was worth going into a bit more depth.

May 29, 202522:16
Episode 10:20: Zero Trust is simple, but complex: A conversatiion with RegScale CISO

Episode 10:20: Zero Trust is simple, but complex: A conversatiion with RegScale CISO

Last week, Dr. Zero Trust, AKA Dr. Chase Cunningham, posted in Linked in that he was fed up with people who say they don’t understand Zero Trust. To a certain extent, I feel his frustration.

Journalists understand the concept. We have a decades-old saying, “If your mother says she loves you, check it out.” It doesn’t get more zero trust than that.

The problem is that while it’s easy to understand as a concept, it isn’t easy to build a zero trust infrastructure, especially with the misleading gobbledygook most cybersecurity companies put out. Cunningham says there are hundred of books and articles on the subject. He’s right, of course. The question is, which one do you choose? 


At the RSAC Conference, I sat down and briefly talked with Dale Hoak, CISO for RegScale, about how easy it is to understand Zero Trust but how complex it can be to pull it off. RegScale does government regulation compliance (GRC) and has only been around since 2021, but I found several competitors who promote themselves by saying “when you’re tired of RegScale, come see us.” I find that a ringing endorsement of the company.

So I called Dale up and said I wanted a longer talk about the issue of Zero Trust and where GRC fits in. We also spent some time talking about how the US federal government seems to be stepping away from cybersecurity regulations. I’ll be doing a larger story about that later, but this conversation is a good start.


May 21, 202530:13
Episode 10.19 - The "key" to security could be in your hands

Episode 10.19 - The "key" to security could be in your hands

Physical authentication keys are a common trope in movies, TV and spy thrillers and they have been around for almost 20 years. But they are still hard to find in real life. We talked with Alex Summerer, head of authentication for Swissbit, which is a relatively new player in the field, headquartered in ...of course, Switzerland. Frankly, after talking with him I'm wondering why I haven't bought one of these things.

May 15, 202521:20
Episode 10.18 - Battle of the bots: stealing student aid

Episode 10.18 - Battle of the bots: stealing student aid

Still digging through dozens of hours of recordings and pages of notes from #RSAC_Conference last week. But while looking into the issue of bots, both good and bad, discovered a fairly recent story about how scammers use bots to steal financial ait. And as I always say, if I don't know about something, I know someone who does. So I called up an old friend, Craig Mosher, who teaches history and political science about what he has experienced with fake students and how to deal with them.

May 09, 202514:04
Episode 10.17 - Bruce Schneier gives a stunning prediction on AI at RSAC Conference, and how deep risk goes

Episode 10.17 - Bruce Schneier gives a stunning prediction on AI at RSAC Conference, and how deep risk goes

This was another exhausting #RSAC in San Francisco but I think I'm finally getting a handle on it. There will be more to come, but Bruce Schneier gave a keynote on Tuesday that I think bodes well for journalism.

And we had a visit with our friend at Safety National Insurance, Spencer Timmel, about just how far insurance can cover cybersecurity wweaknesses.

May 03, 202524:27
Episode 10.16 - RSAC preview, Government doing good and bad PR

Episode 10.16 - RSAC preview, Government doing good and bad PR

This is a short episode previewing what I'll be doing at RSAC 2025 next week, kudos to the California Franchise Tax Board, and a how-to on working with the press.

Apr 25, 202511:53
Episode 10.15 - Divorce the orange git!

Episode 10.15 - Divorce the orange git!

There comes a moment in many abusive relationships, when observant friends encourage the abused party to leave the abuser.

I consider myself a friend of the cybersecurity industry, aside from its bad marketing practices, I see it as important to the well-being of society worldwide. And that’s why I say now, it’s time to leave the federal government, at least for the next two years.

The actions persecuting Chris Krebs and SentinelOne for merely for doing their jobs without political bias, demonstrate that no amount of money is worth working with the Trump administration.

I spend much of the past week unsuccessfully trying to get members of the US cyber industry to comment publicly on this issue. I was able to get public comment from a few outside the country. Some of that can be found in my piece this week on Cyber Protection Magazine. This podcast is with one of the commenters, James Bore, a British cybersecurity consultant and speaker. He says what everyone is thinking.

It’s time to divorce the orange git.

Apr 16, 202518:57
Episode 10.14 - Encryption, Insurance and why you should care
Apr 10, 202528:26
Episode 10.13 - The AI bubble and how it affects cybersecurity
Apr 05, 202526:43
Episode 10.12 - Encryption is all around us, until it isn't

Episode 10.12 - Encryption is all around us, until it isn't

The "Signalgate" scandal has raised the issue of encryption to a broader audience in the past week.  On the plus side, many sources say that 95% of digital traffic is encrypted now, compared to 43% in 2014, but most people have no idea that their personal data is being encrypted. It’s one of those invisible technologies that touch many people.

But there is a basic fact, that a lot of stuff that should be secured, isn’t because users don’t know they have to turn it on  For example, WhatsApp, the messenger platform from Meta, advertises that they have end to end encryption, but they don’t tell you that you have to turn it on to get that benefit. 

So that brings us to today.  What is encryption? Why do we need it and where does it come into play.  We talk with Luigi Caramico, CTO and founder of DataKrypto, a company dedicated to encryption. And not just encryption but fully homomorphic encryption, an important step forward in protecting our data

Mar 28, 202518:26
Episode 10.11 - The problem with surveys

Episode 10.11 - The problem with surveys

As I've said before, I get a lot of "studies" and "surveys" from cybersecurity firms with breathless and urgent warnings about a coming cyber-pocalypse of one sort or another. Funny thing, it's always about something that they supposedly defend against. As I started writing this note, I got another one.

I did one podcast about a survey from Huntress about phishing in February, which was actually pretty good. Then I did one a couple of weeks ago about a less-than-good survey from iProov. Well, my partner in Germany, Patrick Boch, wanted to get into the fun and we decided to talk about two more of these that were also less-than-good from HiddenLayer and Ontinue. No, we didn't interview representatives from either company on this one. We were just having some fun at, unfortunately, their expense.

Here are some of the highlights of our discussion.

  • Many cybersecurity surveys lack scientific rigor, often using small, potentially biased samples (e.g., 250 IT decision-makers)
  • Reports frequently make vague assumptions or present data in ways that may exaggerate threats or market demand
  • Deep fake attacks, while concerning, are currently not as prevalent or successful in cybercrime as often portrayed
  • The Verizon Data Breach Investigation Report (DBIR) is considered a gold standard for its concrete terms and unbiased approach
Mar 24, 202528:54
Episode 10.10 - The X DDoS attack was avoidable, and it's not over
Mar 14, 202522:28
Episode 10.9 - How bad marketing obscures the problems of deepfakes and identity theft

Episode 10.9 - How bad marketing obscures the problems of deepfakes and identity theft

I get a lot of "studies" about the state of cybersecurity and most of them are poorly done. In Episode 10.8 I talked about one I like, from Huntress and the week it came out I got pitched another report from iProov that was, well, less than well done. And as much as I tried to help them focus on reality, the more they pushed back.

Again, this is not a knock on what the company does, which is to ensure the veracity of biometric identity, but it is a good example of how cybersecurity companies spend too little and on the wrong efforts to get their story out.

Mar 07, 202523:30
Episode 10.7 - Bob Ackerman, Generative AI, and Universal Basic Income

Episode 10.7 - Bob Ackerman, Generative AI, and Universal Basic Income

Artificial Intelligence is all the rage right now with broad claims about how it is going to change the world as we know it. I have my doubts about the hype and so does Bob Ackerman, the granddaddy of cybersecurity venture capital, founder and managing director of AllegisCyber Capital (for the past 29 years) and cofounder of the cyber incubator, DataTribe in Maryland.

I always enjoy chatting with Bob because he sees the nuts and bolts of tech advancements and isn’t the kind of investor to get swayed by the glitz of questionable marketing. In this session, we discussed how AI is starting to displace high-paying jobs like computer coding and legal work, raising concerns about who will be left to buy the AI subscriptions and services. While there will be short-term disruption, he thinks AI will ultimately enable new industries and use cases that create new jobs and economic opportunities. Surprisingly enough, he believes the transition may require policies like universal basic income to support displaced workers.

We also discussed the demographic challenges facing countries like the US and Europe, with aging populations and declining birth rates straining social welfare systems. dAI and automation may help address labor shortages, but also raise questions about how to fund programs like Social Security and Medicare long-term.

More importantly, Bob thinks that the people who invested in AI early will to lose their shirts.

Check it out.

Feb 21, 202527:50
Episode 10.6 - DORA, Insurance and the state of international regulations
Feb 13, 202523:29
Episode 10.8 - Phishing on the rise, but there is hope
Feb 07, 202521:00
A reminder of where we come from

A reminder of where we come from

I am very far behind in writing stories and making podcasts. The events since January 20 have made it difficult to keep up. But today, while walking downtown I came across a brand-new independent book store That had a copy of a book dedicated to Martin Luther King Jr.'s "Dream" speech.

I attended that event, with my mother, when I was 11. It was a foundational moment for me. It is when I became "woke." When I saw that book, I knew I had to buy it for my grandchildren, because being two generations separated from that moment is too far. I needed to bring it forward for them, so I bought the book for them and intend to read it to them and help them understand how important the dream is for them as well, especially today.

This isn't a political issue for me. It is how I want to model my life. It does afect my politics, but it also affects my view of family, friends, neighbors, theology, and the world. If you choose to listen to me read this speech, I thank you for taking the time. My thanks extends even to those who are offended by it, as long as they listen to it. It is important to hear, even 60+ years after the fact. Only by repeating it can we learn from it.

Feb 04, 202518:30
Episode 10.5 - Lawyers and insurance companies stand firm on security

Episode 10.5 - Lawyers and insurance companies stand firm on security

This week, we are talking to a lawyer. Maryam Meseha is a founding partner of Pierson Ferdinand LLC, a relatively new and large firm dedicated to digital security.

In the first few weeks of the year, the new US administration has castrated the governmental infrastructure to make sure corporation keep customer data safe, especially in the area of retail fraud. It’s law firms, like Pierson Ferdinand and insurance companies, like our sponsor Safety National that are stepping up to remind companies that maintaining g a strong security posture is a good idea. We appreciate that sentiment. Hope it works.

Jan 31, 202527:46
Episode 10.4 - How moderation works (It ain't what you think)
Jan 21, 202511:36
Episode 10.3 - James Bore on our fascination with shiny objects

Episode 10.3 - James Bore on our fascination with shiny objects

James Bore is a cybersecurity consultant, speaker and publisher based in the UK. He has a refined sense of cynicism that clicks with my own, so we've been chatting back and forth for several months on various subjects and decided it's probably time to record some of our interaction.

Today, we are looking at the preferred marketing practice (shiny objects) of sewing fear, uncertainty and doubt to get people to buy their products. It drives us both nuts. The issue is not limited to cybersecurity, but it is prevalent in the industry. I'm guessing this conversation will resonate with many of you. Our hope is that our marketing listeners will rethink some strategies,

Jan 17, 202527:18
Episode 10.2 - Bye bye, Zuck

Episode 10.2 - Bye bye, Zuck

For about two years, the team at Cyber Protection Magazine has debated whether Meta platforms (Facebook, Instagram and *shudder* WhatsApp) were valuable or even necessary for the reach of our magazine. For two years, I've been outvoted every time. Instead, I unilaterally decided to divorce from the platforms.

Providentially, Mark Zuckerberg made two announcements in as many weeks that made the decision unanimous. We are leaving Meta behind for good. Instead, we will remain on Linkedin and join Mastodon and Bluesky this year.

This podcast is the recording of the conversation my co-founder, Patrick Boch, and I had on the "momentous" decision, which also drifted into the issue of what constituted valid information.

Check it out.

Jan 09, 202525:13
Episode 10.1 - China, oligarchs and tradewars with Lou and Ian

Episode 10.1 - China, oligarchs and tradewars with Lou and Ian

We open a new year and a new season with our friend, Ian Thornton-Trump, chief information security officer at the MSSP Inversion6 and in 30 minutes we take on some pretty meaty subjects.

First we discuss how China strategically infiltrated technology systems in the US and other countries as a geopolitical message rather than attacks. He discusses the challenges of securing complex, interconnected systems and the need for proactive defense.

Next we review the rise of corporate power and influence and how the increasing wealth and influence of individuals like Elon Musk is disrupting the traditional balance of power in democracies. The ethical concerns around wealthy individuals wielding disproportionate political influence could result in something the oligarchs are not expecting.

Finally, we review potential trade wars and the possibility of Canada and Mexico joining the BRICS alliance.

2025 is going to be bumpy but very interesting.

Jan 02, 202535:33
Episode 9.11 - Who do you Trust?

Episode 9.11 - Who do you Trust?

The available guests for this last podcast of the year dried up pretty quickly so I thought I would give some closing thoughts on a big issue facing the world: Trust and the lack of it.

Also, our last threat reports courtesy of Fletch.ai

Dec 06, 202415:44
Threat report for Thanksgiving week

Threat report for Thanksgiving week

Our friends at Fletch provide a grand slam of threats for Thanksgiving week, covering Apple, Android, AWS and Microsoft vulnerabilities

No regular podcast this week but we will be back next week with a possible new way to abuse AI.

Nov 27, 202405:11
Episode 9.10 - Are consumers getting fed up with security?

Episode 9.10 - Are consumers getting fed up with security?

This is part two of our mashup of recent surveys. This time we talk with Tom Tovar, CEO of Appdome about their comprehensive annual survey of consumer attitudes regarding security in digital technology. The good news is there is a groundswell of security "consciousness" regarding the subject. The bad news is the consumers are not confident that corporations even care.

Nov 21, 202428:43
Episode 9.9 - The mental toll cause by AI

Episode 9.9 - The mental toll cause by AI

This week, a two-parter. I’m still trying to make sense of all the surveys and studies sent to me. Between trying to figure out if they are plagiarized, use inadequate samples, are a lame attempt at self-promotion or are actually good data is almost a full-time job. Luckily I got a couple of good ones this month and am doing another mashup.

Today’s interview is with Frank Teruel, CFO of Arkose Labs. We are talking about a finding in their latest survey showing that managers and developers of apps are dealing with no small amount of stress I how to deal with adversarial AIs. Later this week, I hope to post a second interview of where consumers are in this mess. Then I’ll wrap it up next week with an article that looks into the potential of actually controlling the damage cause by AI.

Also, an abbreviated threat report from the folks at Fletch.ai.

Nov 20, 202425:13
Episode 9.8 - Top threat reports and a preview of what's coming

Episode 9.8 - Top threat reports and a preview of what's coming

This episode includes our weekly top cyber threats with help from Fletch and this week Cyjax, and a shot interview with cybersecurity contrarian James Bore, a consultant in the UK with a kindred spirit. The interview is introducing the theme for Cyber Protection Magazine next year. Put up or shut up.

The past decade has been filled with optimism in the tech sector about what they thought they could accomplish. Social media companies thought they could democratize the internet and provide a public square for free speech. Hardware companies thought they could, make computers so fast they could replace the human brain. AI companies thought they could make a computer program smarter than humans. And cybersecurity companies were positive that if every company would use their products they could stop cybercrime.

None of that is close to being true. In some cases it has proven to be absolutely false.

So we are going to spend a lot of time debunking assumptions and looking at what needs doing.

Nov 15, 202413:39
Episode 9.7 - How to boost customer confidence in security
Nov 05, 202426:20
Special episode: Threat reports for Nov 5
Nov 04, 202407:13
Special episode: Top three threat reports for the week

Special episode: Top three threat reports for the week

Our friends at Fletch.AI dropped a bunch of threat reports this week, here's what we see as the top three.

Oct 28, 202405:26
Episode 9.6 - FHE starts getting serious

Episode 9.6 - FHE starts getting serious

I bet you never heard of FHE. Me neither. Then I got a pitch about it. Tried to ignore it because I had never herd of it, but they were insistent. Turns out to be interesting.

Fully homomorphic encryption, or FHE, has been talked about for about five years but not it has its very own industry association and NIST is starting to take it very seriously. It doesn't eliminate quantum encryption standards, but it might be a better defense against nation state attempts to break the strongest modern encryption, although I still think that's more a fever dream than a potential reality.

One of the members of the new association with the unfortunate name of FHETCH, Niobium put me in front of the chief product officer, Jorge Myszne, to give me the lowdown on this tech.

Oct 24, 202432:24
Special episode -Threat reports for October 21
Oct 21, 202408:27
Episode 9.5 - Pig butchering: It's not just for breakfast
Oct 04, 202422:32
Episode 9.4 - Digital tech is hitting the physical wall

Episode 9.4 - Digital tech is hitting the physical wall

Firts, apologies for the sound quality. Tried out a new microphone and I definitely do not like it. Going back to the tried and true. But it stands as an example of what we are talking about today. When people from one discipline start talking about moving into another discipline where they lack expertise, things go haywire. Such is the case with the digital world and energy production.

The big news this week is Microsoft plans to open up Three Mile Island Nuclear power plant to power their planned AI datacenter. Joe Basques and I have a frank discussion about how the AI/Social Media/Internet industry just lacks the knowledge of how to do this right and with the current path, chaos is bound to reign,


Sep 27, 202433:02
Episode 9.3 - AI and telemarkeing: Marriage from Hell?
Sep 20, 202417:17
Episode 9.2 - Innocence is not a defense against online fraud
Sep 12, 202424:37
Episode 9.1 - Getting serious about PQC
Sep 06, 202439:10
Episode 8.23 - Fixing marketing in Tech
Aug 22, 202418:11
Episode 8.22 - Social engineering affects nations
Aug 09, 202432:34
Episode 8.21 - Have we reached peak ransomware? One lawyer's view
Aug 02, 202421:00
Episode 8.20 - Crowdstrike: who's at fault?
Jul 25, 202422:23
Episode 8.19 -- Are we losing the data war, Part 2

Episode 8.19 -- Are we losing the data war, Part 2

In the first part of this series we provided a potential solution to the out-of-control growth of data theft, for individuals that could be most at risk. Today we talk to John Meyer, senior director at Cornerstone Advisors, to help us understand just how bad the situation is.

For example, ner the end, John states quite flatly that everyone whould just assume their social security number is being sold en masse by criminals. And there is nothing we can do about it.

Think about that.

Jul 05, 202433:32
Episode 8.18 -- Are we losing the data war? Part 1
Jul 03, 202417:32
Journalism needs a kick in the a**

Journalism needs a kick in the a**

I was absolutely livid watching the presidential debate last night, and not because of the performance of the debaters, who did exactly as I expected. I was severely disturbed by the lack of professionalism of the moderators, Jake Tapper and Dana Bash. I was relieved to find today, that several other journalists were equally concerned about their failure to moderate a debate.

But this came as a capper to another interesting result: The release of Julian Assange, ersatz journalist.

We -- and I mean my profession -- need to seriously consider effective certification of journalists, just like we do with doctors, lawyers, plumbers and pretty much everyone else, which can be revoked for incompetence of ethicaly failures.

Jun 28, 202418:54
Episode 8.17 - Elder fraud: bigger than you think and not how you think.

Episode 8.17 - Elder fraud: bigger than you think and not how you think.

An article in CNN began this podcast and connected story. What we found out about elder fraud kinda blew our mind. Like the fact that in the U.S. it is three times bigger in scope and cost than ransomware. And who are the most vulnerable was a real surprise.

Jun 20, 202426:14
Episode 8.16 - Avoiding election scams

Episode 8.16 - Avoiding election scams

The problem with election security is not a failure of the technology to keep the vote honest, it's the lack of technology available to individual voters to reduce fraud. We talked with YouMail CEO Alex Quilici about how some SPAM-mail technology can help, but also what kind of dangers there are that voters should be aware of.

Jun 18, 202416:54
Episode 8.15 -- Old man yells at clouds during grad week

Episode 8.15 -- Old man yells at clouds during grad week

I went to a high school graduation for the first time in decades. What I saw and heard filled me with compassion and concern for the next generation.

Jun 10, 202421:48
Episode 8.14 -- Generative AI is accelerating phishing attacks

Episode 8.14 -- Generative AI is accelerating phishing attacks

This week we talked to SlashNext's CEO Patrick Harr and Field CTO Stephen Kowski regarding a study about the growth of criminal activity using generative AI

SlashNext’s State of Phishing Report claimed a 1,265% increase in malicious phishing emails and a 967% increase in credential phishing between Q4 2022 to Q3 2023. . While ransomware attacks get all the publicity, the reality is phishing is a much bigger problem for a much larger portion of the populace.


May 30, 202420:11
Episode 8.13 - Finding gold in Metomic survey

Episode 8.13 - Finding gold in Metomic survey

Cyber Protection Magazine gets a lot of marketing materials described as studies, surveys, and reports. The flow of those documents increases as major trade shows approach. For example, in the two months leading up to the RSA Conference, we received 56 before we stopped counting. More have come in since but it is now a trickle. We read each one. Luckily, our chief editor can read at 6,000 words per minute. He still grits his teeth whenever he reads the email pitch.

That doesn’t mean all turn into content on our pages because, for the most part, the information contained within is not news. Much can be expressed in a few sentences like, “C-level executives are concerned about data breaches” and “Cybercrime to cost more than $9 trillion by 2025.” In the first instance, our response is, “No kidding?” The second instance is just wrong with no evidence to support it. As often as we tell company representatives, they still produce the same banal and inaccurate assumptions.

About half the time, the “study” was not done by the company pitching the document, but by someone else with a specific twist highlighting the pitching company’s capabilities. For example, we recently received a copy of a “report” about the Cybersecurity and Infrastructure Security Agency’s (CISA) Known Exploited Vulnerabilities (KEV) Catalog. It is a monstrously large document, remarkably distilled by a private company into a report that, wondrously, pointed to the company’s products as a solution to the problems notated in the report.

Because these documents rarely provide insight but are meant to validate product claims, they are little more than advertising masquerading as information and that puts them in the junk pile. That, however, is not always the case.

Occasionally, we get truly independent research that, for the most part, says nothing new. But buried in the obvious and the inaccurate, is a nugget of truly interesting data. It’s not enough to make an entire story, although it makes for an interesting LinkedIn post. In our review of the bland cornucopia of data received over the past two months, we saw enough nuggets to see a larger story. There is more to come in the next weeks, but we want to start with this interview with Metomic CEO, Rich Vibert. Their recently released survey on CISO opinions in the UK and US had a lot of obvious statements, but we found a couple of nuggets… and what could be an interesting vein for future discussions.

May 23, 202420:51
Episode 8.12 - Madison Horn wants to increase Congress' tech IQ

Episode 8.12 - Madison Horn wants to increase Congress' tech IQ

A few people know that I am something of a political junkie. I did some presidential campaigning in high school, then I got into journalism and covered national politics during Watergate. I'm less focused on it now but anyone can drag me into a conversation about it

A few weeks ago I got a call from the press secretary for Madison Horn, who is running for the US Congress out of the 5th Oklahoma congressional district, asking if I wanted to interview her.

Really? Why does a candidate in Oklahoma want to talk to a cybersecurity journalist in California. I was intrigued, so “sure.” Ms. Horn, who also ran for the US Senate a couple of years ago, is optimistic about the state (which is a positive thing) and, to the point, she’s a white-hat hacker who founded a pen-testing company. So there is the hook.

We talked for about 30 minutes and she educated me on some of the more positive things about her state and, in particular, the political leanings of her district. More importantly, we talk about how our legislators need to be tech-savvy.

May 17, 202428:47