The potential of nuclear warfare is being eclipsed by the potential of cyber warfare as the ender of civilization, so I guess their is that upside. No, seriously, it's becoming apparent to rogue nations that cyber warfare is more effective, cheaper and has less chance for retaliation than a nuclear strike. We talk to cyber warfare experience Pano Yannakogeorgos from New York University about the potential devastation from cyber attack. A more in depth article on the subject is coming next week on Cyberprotection Magazine
When you peel back all the layers, digital marketing and consumer tracking on social media apps presents the most significant security flaw in our digital world. Apple's giving individual IoS users control over that decision is a big step forward into making us all safer. It also removes a lot of the hype and fraud that comes from unrestricted tracking. Joe Basques and Lou Covey answer a user question about the significance of the new feature.
Lithium-ion batteries are in almost all electronics, all electric vehicles and are expanding through the power grids worldwide to store energy during system outages. They are crucial to continued operation of “green” data centers. When you talk about renewable energy, you have to talk about where lithium-ion batteries fit in the discussion.
That’s not necessarily a good thing.
Lithium-ion technology is fraught with social, environmental, and security downsides. Forced child labor, the lack of effective recyclability, potential poisonous fires and explosions and complex, imminently hackable control systems are all aspects of the industry that just won’t be going away soon. But there is hope. There are alternatives.
This is the subject of this episode of Crucial Tech. We talk to Jack Pouchet, Vice President of marketing for Natron Energy, a company manufacturing a sodium-ion battery that lacks all the downsides of its lithium cousin and offers significant upsides that we need. The good news is that it looks like this technology will be going into large-scale production just before the Lithium-ion technology collapses under its own weight.
This interview with Warren Savage, guest researcher t the University of Maryland in IoT security is a follow up to an interview I did with him last year at the @DesignCon conference in Santa Clara. In the interview and his keynote at the show, he talked about how vulnerable the electronics supply chain was. A year later we are stuck in a semiconductor supply chain slowdown and one of the reasons is the inability to secure it. Things haven't gotten much better but Savage sees progress. This is part two of a series on supply chain.
2021 is quickly becoming the year we realize that supply chains are what make the developed world. SolarWinds, the Suez Canal, the worldwide semiconductor shortage, and the “snowpocalypse” in Texas has shown us that one glitch can wipe out our standard of living for weeks, months and years. With that in mind we start a series of podcasts and articles in cyberprotection-magazine.com on the supply chain, with special focus on semiconductor security. Stay until the end. You will learn something and get pissed off.
We talk to Harry Haramis, GM of Prime Key, about public key infrastructure (PKI) and certificate authority (CA), which may be the most boring technologies you come in contact with, but are foundational to keeping you secure on the internet and even in your car. The problem is that few companies will let you know what they are doing about managing those things and if it is done badly, you are screwed. Time to start tasing questions.
We started looking into insurance coverage for cyber attacks a few weeks ago and contacted analyst Maxine Holt of Omdium about it. And then more questions came after the talk. So this episode is a part of additional coverage you will see in Cyber Protection Magazine and additional podcasts. It's the complex, but we are going to try to make it understandable.
Securing an organization's data isn't easy, or cheap, but relatively tiny section of the cyber-protection industry, known as content disarm and reconstruction (CDR) might be a solid beginning. If only they would spend enough on marketing to build awareness. We open the fourth season on Crucial tech with Taeil Goh, CTO of OPSWAT, about his companies threat detection and removal technology and why he ain't rich yet. Read the full story of Cyber Protection Magazine
Season 3 concludes with Joe Basques interviews Lou Covey and Patrick Boch, co-editors of the recently launched Cyber Protection Magazine (www.cyberprotection-magazine.com), an international joint project between the Footwasher Media in the US and Fabogi in Germany. The new publication will focus on practical implementation of cybersecurity for businessmen and the non-technical among us.
If you are a small business hoping for a grant from California to stay alive during the COVID-19 lockdown, you need to listen to this podcast. The state has chosen to work with third-party financial institutions to transfer the funds to banks, but those organizations are asking applicants to violate basic good practices for maintaining security. Moreover, some business banks have internal security mechanisms that prevent the connections being made between the state and the banks. You can do this safely, but you need to take precautions. We give your those precautions in this podcast.
For about 10 years the conventional wisdom about #ransomware was to just pay it and start improving your security. According to John Flory III, CISO for Harbor Networks, that just doesn’t work anymore. In our interview with Flory he explains why it is absolutely necessary to go on offense now and hunt the hackers down. He gives us a preview of a case he worked on with international law enforcement that resulted in the arrest, extradition and prosecution of a ransomware ring. We will hear more from Flory in the coming weeks but his recommendations can bear fruit as hackers become more brazen.
As soon as the SolarWinds breach hit the news, press releases started pouring out of the cyber security industry with claims that their products or services would have prevented the breach, but talking to people in the trenches, that is a dangerous claim to believe. The truth is, human error and intention can defeat any security protocol or technology. We talked to Matthew Rosenquist and Steve Hanna about the only way to deal with security: vigilance.
We were going to do this after the first, but the queue is getting long with 2021 interviews and articles for Cybersecurity-Magazine.com so here's our Christmas gift to you.
Legislation, litigation, public opinion and technology are combining in 2021 to put the breaks on #disinformation and #Trumpism next year and the foreseeable future. It looks bad for social media but good for print journalism. That makes this a happy Christmas as fare as we are concerned.
Thanks for the support this year. We've grown 400 percent in listenership a engagement. Looking for great things in the coming year.
Before we get into be thankful of stuff on Thursday we need to get one thing off of our chest, namely the wasteful use of time and money spent on corporate awards programs that are nothing more than a naked attempt to build valuable mailing lists and take money from startups that they can't afford or leave them vulnerable to a corporate raider. And there are no more blatant efforts than the Red Herring 100.
President-elect Joe Biden has been catching flack for stating that we will transition out of fossil fuel in favor of green energy, but that has less to do with government regulation and more to do with market forces. And in the case of hydrogen, we cannot decouple that clean energy from fossil fuel extraction. We look at this in a short podcast because it is that simple.
In part three of this series, we take a look at the debate over Section 230 in Title II of the Federal Communications Act that is targeting social media political bias and discuss why it is a misdirected controversy, and how it might restore the fortunes of and trust in #MSM. We will conclude the series with a couple of tools to help you create your own mental filter on what you see online.
In part two of our miniseries on journalism in a digital world, we take a look at the causes of bias in the press. Some of that is legitimate, but a lot of it is just personal perception and crowd think. The bias most of us see is actually a mirror image of our own. We talk about some of the ways you can combat bias but we admit it may be beyond one's desire to seek balanced news. THERE WILL BE A PART THREE! In the meantime, consider becoming a sponsor so I can get rid of the ads
It is popular to say you don't trust the news media. Some of that distrust is valid, but few people can actually identify why. Joe Basques and I decided to do a deep dive into the subject in this episode... that went so long we had to make it a multiparter. There may even be a part 3. In this day and time we need all the help we can get to find the truth and randomly cutting off reliable sources of information is self-defeating.
I have talked to a lot of companies developing digital security devices and systems. Virus scans catch about 50 percent of the attacks at best but don't stop them from happening. Network equipment and software services are way too expensive and do very little to protect against people doing stupid things behind the firewall. It has really seemed hopeless for a while and very frustrating.
Then I ran across Airgap.io. Holy crap. Is this what I've been searching for? It's affordable, scalable from a home network to a #Fortune100 company, and it stops ransomware from spreading throughout all connected devices in the network.
Bob Frankston is an e engineer whose work has arguable been more responsible for how most people interact with the internet. You probably have never heard of him... but I have. After following Bob Frankston's IEEE column off and on since 2013 we were thrown together earlier this year on social media and was absolutely star struck when he agreed to this interview about 5G networks. As I suspected, 5G is more about marketing than technology, but it is also about getting around net neutrality. Listen and learn.
Even the most security-conscious people and organizations get hacked, so it's not always something you can stop. We go back to talk with #Sectigo's VP of IoT security, Alan Grau to talk about how a security training from got hacked through a common phishing scam, how deep the flaws in our technology are and finally, how Sectigo is helping companies make secure technology.
Between January 1 and August 23, The number of phishing sites detected by Google rose by more than 200,000 to 1,892,980. Three years ago there were less than 560,000.
“When you get that all too familiar barrage of spam emails, social engineers are betting that if you’re a MAGA supporter who received spoofed emails pitching progressive candidates or causes, you’ll click unsubscribe about as fast as a progressive will if they’re on the receiving end of a MAGA blast,” says Adam Levin, founder of Cyberscout. Levin explained that the emails are rigged to download malware, ransomware, or access your accounts when you click unsubscribe."
The dramatic increase is giving rise to an entire sub-industry dedicated to #zero-trust technologies that are slowly coming to market. Maybe too slowly for the 2020 election cycle. We talked to two of them: Zero Fox and Airgap Networks
We have a few episodes this month talking about drastic changes in advertising and marketing and until this week, it looked like everything was under control... until Facebook admitted this week that the changes are going to severely hamper their ability to send those creepy targeted advertising posts your way. And that's going to affect their revenues.
You have probably seen notifications during web searches the tell you that the website you are visiting will use “cookies” to “give you a better search experience.” or some sort of nonsense, and you click “OK” just to get on with it. You might know what cookies are, other than a delicious snack, but most people don’t. In this episode, we are going to tell you what they are, how they work, and why you should pay more attention to them. We also interview Content marketing specialist Adam Helweh of Secret Sushi regarding how the digital marketing industry is adapting to the changes in technology and legislation.
You may have heard of quantum computers. You may actually think they are mostly hype. They are. We won't see them come into real use for a decade. In the meantime, people are freaking out over how they can be used to makes us all less safe. The good news is some companies, like Sectigo, are working on ways to make sure we are all safe when they actually become a reality. So grab a coffee and listen to our take on quantum computer security.
We have the means and ability to take this pandemic down to nothing, but we all need to cooperate, be smart about it, and be ready to give up things that don't really exist, like #privacy. #Contact_tracing needs the cooperation of companies like #Google and #Apple even if it means they let us know exactly how much data they are collecting on us. Let's face reality and get out of this alive
In our last episode we reported on presentations at BlackHat USA 2020 about election interference. In this second part, we look specifically at the Russian and Chinese approaches to disinformation campaigns and how it is less technology hacking and more about strategic use of social media.
Our first re-run of the season is going back to our report on election hacking, a two-parter, that doesn't dwell on the technology of elections as much as how they can be influenced. For several years we have heard about how technologically vulnerable our elections systems are, but it turns out that physically hacking a system is a lot harder and yields insignificant fruit in national elections. It is much easier to sway voters with disinformation.
Are you concerned about how social media seems to know exactly what you are thinking about? Are you’re that they are listening to you and your friends on mobile devices? Well, they don’t and they aren’t. You’ve been freely telling them what your concerns are and what you want to buy. But all that may be coming to an end. Find out how in the next episode of Crucial Tech.
We thought we would be able to wrap up the last three episodes featuring Tim Bajarin and Matthew Rosenquist, but then life happened and more AI disasters occurred. This is yet another launching point for our coverage of surveillance technology.
Last week, we had @TimBajarin give a fairly pessimistic view of the future of #AI and #facial recognition. This week we bring in the positives (sort of) with security and AI guru @MatthewRosenquist. This technology is probably inevitable but to make it a global issue we are going to either have to give up some freedom and privacy, or we are going to have to work hard to fix the deficiencies. either way, the combination of this and the last two episodes will make you well informed enough to be the expert in most conversations even if you aren't an engineer.
By the time we finished last week's episode on security settings a lot happened. So I started making some calls to those who know what was going on. This week, we talk to the Analyst di tutti Analysts, Tim Bajarin of Creative Strategies about ethics, facial recognition and AI, why it's so hard to do any of that well, and how Apple's announcement of iOS 14 is so earth-shaking.
My business partner, Joe Basques called me up and started asking questions about #Facebook security, which morphed into #AI, which moved into #facial_recognition. So we decided to start from the beginning of the conversation and record it. You will find out some tricks about how you can make your Facebook experience safer, what Facebook can actually track even when you think you are secure, and what the future holds for you in a corporate surveillance state.
However, the subject got even more interesting in the days following our talk so this becomes part one of a broader discussion with industry luminaries. So, get ready. It's going to be an interesting ride.
I'm deep into writing a book with Richard Bach, a security guru from the UK, on the ethical development of #AI technology and have found that there are really not a lot of books offering practical guidelines for ethical thought in engineering. There are lots of books about why it's important and about ethical lapses, so maybe it's time for an Ethics for Dummies (Boy, am I qualified). In my research, I came across Jamais Cascio, a general futurist who does a lot of work with the Institute for the Future (www.iftf.org, @iftf) and who has a lot to say about the subject. Out of a very long conversation I culled these 30 minutes. The rest is going in the book. I imagine your brain will hurt by the time it's over.
Last week I talked about the importance of tracking apps to help do contact tracing for the #Coronavirus epidemic and after I did that podcast I signed up for a study to get tested myself and I signed up for one of the apps (I chose one from Johns Hopkins University.) You can also see this podcast on Youtube so you can see what I am using and how I set it up. I am a big believer in controlling what you allow to go out on the internet but I'm also a big believer in being a responsible citizen. Sharing personal data during this time is a responsible act. I'm sure this will make you a bit nervous and have comments, which you can leave on www.Anchor.fm or wherever this shows up on social media. Let's have a civil discussion.
In the last episode, we looked at changes in how tech media and businesses are changing during the #COVID19 #pandemic and how @FootwasherMedia has been predicting these changes for decades. We've also had our thoughts about entertainment and #venturecapital are going to change, but we kept that to ourselves because we aren't entertainers nor are we investors. But we do know some people who are and in this interview with Fabrizio Capobianco of @MinervaNetworks we take a look at how the current crisis is changing that, as well.
Joe Basques and I have been working in the tech world and media for several decades. We have often warned clients of what was to come and that they should be ready for it and almost universally we have been ignored or ridiculed. The funny thing is within 3-5 years things we warned of have come true, like the slow death of tech media and the rise of social media to replace it. Each time companies have raced and struggled to adapt. the #COVID19 #pandemic has rushed even more of our predictions to the forefront, including #videoconferencing, #telemedicine, and #digitalmigration of the #economy. We are taking a moment to gloat but also to remind you that everything has changed and probably for the better. Part 2 will look at changes in #venturecapital, #investment and #entertainment
In this episode, we talk to Steve Hanna from the Trusted Computing Group (@TrustedComputin) to talk about the organization's work in making computing secure. You probably haven't heard of them, but their standards form much of the #security basis for the #IoT. Steve is VERY accomplished and a very nice guy. In fact, it was kinda like talking to Mr. Rogers about technology so it was knowledgeable and comforting all at the same time.
Remember, if you'd like to leave a comment, listen to this podcast at Anchor.fm and record your question or comment in the app. You might be a star guest in a future episode or have the right suggestion for one.
When searching the web, do you ever get a request to renew or accept a certificate? Yeah, you have but you probably had no idea what it was about. It's kind of important, it should be more widespread and there are a few companies involved in the process. One of them is @Keyfactor. They would like to be more widespread, I can assure you. Listen in and maybe you can push your providers to look into them. #security #authenticatiion
I hope that headling caught your attention. It should. We hear a lot about how the US government is watching us, but the information that Edward Snowden said was being collected on us pails in comparison to what Google, Facebook, Amazon and Microsoft are allowing other corporations and foreign governments to collect from us. And those companies are getting paid to allow them that access even if they aren't saving and sharing that data for themselves. What's more, there is little you can do to stop it except for eliminated digital devices from your life. But there are things you can do to limit it. This commercial-free episode may be the most important information you need right now.
This week I found opt that is it probably less likely that the government is watching you than Amazon is. More importantly, to law enforcement you may not exist at all. Check out how tech firms are helping the good guys catch the bad guys.
The title is a bit melodramatic but history shows us that nothing devised by man lasts forever and, thanks to state, national and international laws as well as new technology, the hegemony of Amazon, Facebook, Ebay and Google over retail may be coming to an end. We talk to the CEO www.maikeinc.com and look at the increasingly hostile environment facing online behemoths.
The Internet of Things (IoT) is growing faster than the original internet. Cisco Systems predicts that internet-connected devices will represent 75 percent of all the internet traffic in less than 10 years, and Gartner predicts that there will be five times more IoT devices in use than there are people on the planet. But more than 90 percent of all those devices are easily hackable and will remain so for the foreseeable future. There are some companies working hard to fix the problem but until manufacturers decide to start designing for security, it's going to be a long road, indeed.
You've probably heard of the data privacy laws in the EU and California but you might not know what they do for you. A lot. We talk to an international expert, Patrick O'Keeffe on the subject of privacy and regulation, You need to meet this guy. He's the real deal.
It has been a bad couple of years for Facebook and it isn't getting easier. This week, we look at social networks that do not have advertising and don't sell your information to anyone. In fact, they don't even collect it. Both ways that all social media platforms have traditionally made their money. We talk to David Glassco, CEO of one of those networks, Neone (nay o nay) and their pay-for -play paradigm. Will it work? Only you have that answer.
Happy New Year and welcome back after the holiday break. This season on Crucial Tech we will be looking at changes in social media, consumer privacy laws, new security challenges for the common man and more, but today we kick-off the first in a random series on cryptocurrency and blockchain technology with two friends, Joe Basques and Matthew Rosenquist. As always, donations will help us eliminate advertising and you can make audio comments on the Anchor.fm platform that could make you a star on a future episode
After two months of holiday partying, travel, illness and unavailable interviewees I'm ready to kick off the new year with a big portfolio. We'll be looking at Cryptocurrency, social media, renewable energy, security, threats to the 2020 election, Russia, private social media and a bun ch more. Here's a short preview. And check out my book, The Stupid Side of Renewables now available on Amazon. You can leave a message here.
I'm starting to to do something I have long dreaded: start talking about cryptocurrency. We introduce the concept and the problem about talking about it in the opening and then we get into something that explains why companies are moving to automation... and it is more than just greed. I'd like to hear from you about this episode. you can leave a message here.
I had a chance to interview a handful of Finnish tech start-ups at the 2019 TechCrunch Disrupt in San Francisco and was m,ore then pleasantly surprised by what I heard. There are many reports about how Finnish publlc education is exceptional but exporting all the techniques are difficult for a variety of reasons. The technology I saw changes that.
You m ight want to be ready to turn up the sound in a couple of the interviews, because the Finns are often softspoken and there was a lot of background noise and electronic interference in Moscone Hall, but it is all worth the listen, especially if you care about education.
Josel L:orenzo, VP of product development for Axiado and an AI guru talks about the different levels of autonomous vehicles and whether humans can have any actual presence in controlling them. This is the last of 4 parts
We went to San Jose to talk to Chet Babbla, vice president for automotive technology for Arm Ltd., about a new consortium focused on autonomous vehicles. Cooperation in a multi-faceted and challenging technology like autonomous vehicles is a good idea. But in this case, do we have enough knowledge about the components needed to make a dent?
We're starting this three part series with Rik turner, principal analyst at Ovum, a british analysis firm, to get a history of how long vehicle automation has been with us, where it is today and how far we have to go before we have what we think is just on the horizon.
Catfishing is the biggest scam on the internet. It is not easy to get out of it once you fall into the trap and it is very embarrasing, but it can be done with a minimum of effort, some patience and honest self-reflection., But avoiding it is very easy. Thism episode is brought to you without commercial interruption. So chip in at https://anchor.fm/crucialtech.
We are starting season two of Crucial Tech with a look at security-conscious culture. A few months ago I met Jarno Limnell (@jarnolim), CEO of Tosibox (https://www.tosibox.com) to talk about cyber security . This seemed like a good time to trot out the interview considering the increasing occurrence of cyber attacks around the world. So why is Scandanavia, and Finland in particular so secure. You might be surprised that it isn't just technology.
This week we talked with Ugan Naidoo who, besides having a pretty neat name, is the CTO of Inetco, a Vancouver, BC company that monitors financial transactions for banks and large retailers worldwide. This is a pretty technical discussion, but once you hear it, you will understand how not paying attention to this ussue is costing you and everyone else, money.
Hackers can appropriate you computer system to make money on cryptocurrency without you knowing it's happening. It's annoying but not bad for individuals like you and me. For big corporations and governments it can be lethal.
I wrote a column in EEWeb.com a few weeks ago talking about the security issues developing in open source software, Linux in particular. And old friend popped up in the discussion. Meet Bill Weiberg. We will probably be hearing more from him in the future/
In this episode we learn about certificates, securing Industrial Internet of Things (IIoT), botnets, DDOS, secure boot... It's jam packed. We interview Alan Grau, CTO of the Icon Labs division of Sectigo.
Thanks to the late, great Alfonso Bedoya for the headline
I've been aware of a marketing technology for sometime and have been thinking about doing a podcast on them, but recent issues in the European Union over the General Data Protection Regulations (GDPR) and similar legislation in a dozen states in the US made it crucial to all of us now. Businesses rely on telemarketing to deliver "qualified leads" to them. But they don't actually work as claimed. This technology could make telemarketers obsolete and end the annoying calls without regulation.
This is an interview I did a few months ago with Matt Rosequist, former senior security analyst for Intel. It's a wide ranging interview that cov ers a lot of issues you may not be aware is affecting you.
Government hearings are all the rage now for tech CEOs trying to justify massive breaches in privacy, security and basic trust within their markets. The discussion on how to make sure development of new tech, especially in artificial intelligence is bubbly to the surface. Maija-Riita Ollilie, an ethics scholar in Finland, was our guest this week with a view on how ethics will develop naturally with adoption of technology.
A few weeks ago I met Lisa Jiggetts, founder and president of the Women's Society of Cyberjutsu, dedicated to helping young women start careers in cyber security. A fascinating and important effort. Check out the website at https://womenscyberjutsu.org.
A few weeks ago I interviewed Forresters senior analyst Amy DeMartine about her predictions for cyber security in 2019. Now that I have a chance to publish it, two of those predictions have already come true and it is just mid April. And the reasons for the growth of cybercrime are sitting in out pockets.
The Green New Deal in Congress is going to be debated for at least two years and I thought it was worth tying in a tech angle to the debate. We interview Evan Johnson, CTO of Hytech Power in Redmond, Washington about how his technology can actually make this happen with a minimum of fuss and a maximum of results.
BTW, If you listen to this podcast on Anchor.fm, you can leave messages, ask questions and make recommendations for inclusion in future episodes. Otherwise you can contact me on the Footwasher Media Facebook page, on my Linkedin page, or on Twitter @newtechpress.
Artificial intelligence (AI) is a major theme in technology news, investment and science fiction and the conventional wisdom is that it can be very dangerous. Is that true? Maybe not. In this episode we talk to Axel Kloth, CTO of Axiado Corporation, about the potential dangers of AI and the potential benefits.
It's been a busy week with ransomware at the top of the list. How can we stop it? Maybe with artificial intelligence (AI) applied directly to hardware. We are back with Axiado's CEO Ashok Babbar for the second in three episodes about AI
The European Unions General Data Protection Regulations and the California Consumer Protection Act do not apply to the hardware manufacturers that suppy equipment to the companies that collect and store our personal data...yet. Eventually someone is going to figure out that our data is vulnberable in the hardware and will want to sue the hardware companies. We talked to Axiado Corporation CEO Ashok Babbar about how difficult it is to secure data on current hardware, and what we have to do to secure it.
The last week of February was a bad one for digital security and we thought it would be a good time to start this podcast, focusing on the biggest news of the weeK: The Cloudborne vulnerability in cloud servers... all of them.