
Crucial Tech
By Lou Covey

Crucial TechNov 12, 2021

Episode 7:13 -- How companies can assure customers their data is safe
Telesign is part of a growing security niche market dedicated to providing the infrastructure companies need to keep customer data safe. We talked with company CMO Kristi Melani about how the industry needs to educated not just corporations but the users in what is available to them.

Episode 7.12 -- Data for All by John K. Thompson: A book review
This episode is our very first book review. I edited Data for All late last year and had my eyes open to both the massive amount of customer data collected by almost every corporation in the world, and the amount of digital waste produced by the effort. There is also a mini-review of Not with a Bug, but with a Sticker. These are two books that if you read them (and they are both easy reading) will make you sound like an expert in AI and data science in any gathering of people. That may not be a good thing but I enjoy it.

Episode 7:11 -- Rohit Ghai on the promise and problem of generative AI
#GenerativeAI was front and center at the RSA Conference 2023 in San Francisco. Companies were either promoting it as a means of improving security or warning against it as a security weakness. It was even the keynote on Tuesday by RSA CEO Rohit Ghai, who took a neutral position that leaned positive on its potential.
But as he spoke, for the most part, glowingly about the AI age we are entering there were some questions that arose. So we contacted him through his PR agency and he graciously accepted an interview appointment to answer those questions. Our focus was, primarily, on the ethical use of generative AI and the failure of the tech industry to live up to its own stated ethics. The conversation was frank and illuminating.

Episode 7.10--What's up with Generative AI
You cannot spit without hitting a news story about generative AI (AKA ChatGPT, Bard, etc.). Some of the news is good, some of it bad, and all of it fairly confusing. Cyber Protection Magazine has been digging through the detritus and find what really is good or bad about it and today we continue that with an interview with a very smart man: Dr. James Norrie, a full-time professor in the Management, Marketing, and Entrepreneurship department at York University and founder of the cybersecurity company CyberconIQ. He holds advanced degrees in cybersecurity and intelligence analysis, copyright law, and project management. And he has a very specific take on generative AI.

Episode 7.9 -- Getting to the bottom of the TikTok issue
TikTok has been in the news for quite a while, but at Cyber Protection Magazine, we are pretty sure we aren't getting the whole story, so we are starting a series of articles and podcasts to get to the bottom of the issue, starting with this episode.
We talk to Ian Thornton-Trump -- raconteur, iconoclast, cyberwarrior, and CISO for Cyjax -- and he, as usual, has a lot to say. As you listen you will find that the real problem is not in the app, but in ourselves... and in bad algorithm design.
Also, this is an ad-free episode. If you want to support the work we are doing, go to Cyber Protection Magazine and donate to the cause. The button is on the bottom of the page.

Episode 7:8 - Advertising isn't what you think
You can't talk in polite company about politics or religion, but everyone can talk about how they hate advertising. And for good reason. I take a break from discussing technology to rant about what tech companies do to get you to buy their stuff, and why you don;t trust them.

Episode 7.7 -- Sextortion is a thing. How big a thing is questionable. But it is scummy
“Sextortion” is a popular theme in media and the news, but it may or may not be a big deal. No one can really come up with a consensus about what it is and how widespread it is. It’s even difficult to pin down whether it is a crime. We talked with Ken Kuglin from Digital Forensics Corporation, a cybersecurity firm in Ohio, about how to deal with the attacks and their free services to educate people about how to avoid or deal with sextortion.

Episode 7.6 -- Axiado seeks to crowd source a "data lake" for comprehensive cyb ersecurity
Cybersecurity has a healthier and older relationship with artificial intelligence (AI) than pretty much any other industry niche. That’s because the information available on cyber threats is better vetted than 90 percent of what is fed into ChatGPT and the Google and Microsoft versions of generative AI. But putting that data to use in security is not that easy… yet.
Cyber Protection Magazine has been tasing with companies for several weeks as we study the constructive uses of AI in security, and try to find a way through the hype. We interviewed the CEO of one company recently, Gopi Sirineni of Axiado. They are about to launch a security co-processor driven by a unique AI that will be based on the Sirineni calls a “data lake” of attack schemes. This information is a “living” database that will constantly be updated. But to make sure it is as comprehensive as possible, they are enlisting the help of the worldwide cybersecurity community. To participate, you can contact Axiado through their website, on the corporate Linkedin page, or to Sirineni directly. More will be available at the magazine in the next two weeks.

Episode 7.5 - That IRS agent that called you is a criminal
Vishing, short for "voice phishing," is on the rise again. But then, it’s been rising almost exponentially for the past two years. Last summer various organizations were reporting anywhere between 500-650 percent increases over the previous six quarters. Now, as US citizens prepare their tax returns, the scam is getting another bump. We had a chat with Brian McDonald, director of product development and Mutare, about their technology and the problem of vishing.

Episode 7.4 -- Avoid being a big, stationary target
Being a security company that gets hit with a data breach or malware attack is embarrassing, besides the fact that it scares the hell out of your customers. But the current tech fad of "decentralization" has a pretty good lesson for anyone thinking about establishing a security operations center, virtual or otherwise. We talked with the CEO of Dispel about how they've been decentralizing security operations in infrastructure clients for years now.

Episode 7.3 -- All things Data Privacy!
If you're like us, #dataprivacyweek snuck up on you and almost got by before you knew it. But we were still busy. This podcast includes an interview with Brandon Rogers, a senior security engineer at Halo Security, an attack surface management company, who discusses the rash of data breaches at T-Mobile over the past couple of years and what they SHOULD be doing about it (Note, T-Mobile has not responded to requests for input), and then we have our first All Hands discussion with the team at Cyber Protection Magazine as we talk about the larger issues of data privacy.

Episode 7:2 -- Diversity and Civil Rights Progress with Rockwell's Nicole Darden Ford
It's Martin Luther King day today, which is an important holiday for me. This interview was incredibly satisfying because it demonstrates how far we've come since Dr. King Spoke in Washington DC in 1963. We have a long way to go, but this is a celebration of what is being accomplished.

Marketing and Media: Most of what you know is wrong
To kick off the new year and our seventh season, Joe Basques and I tackle the conundrum of distrust in media and why marketing doesn't work the way it's supposed to in the technology world.

Episode 6:19 - End of the Year finale with Ian Thornton-Trump
For the second year we are publishing predictions for 2023 in Cyber Protection Magazine by asking people and organizations to submit a brief, one-paragraph statement. Our friend and Cyjax CISO sent an entire presentation. And it was fun and scary all at the same time.,So we went with it. Check out the other predictions on the magazine and let us know what you think.

Episode 6.18 - Account takeover attacks are inevitable
A personal bank account was hacked this week, but because I was getting regular alerts from my bank we kept the damage at a minimum. As luck would have it, I had scheduled this interview with Bruno Farinelli of Clearsale who explained how even when you do everything you can to keep your finances safe, criminals have a way to get around your protections.

Episode 6.17 - Avoid Black Friday deals. Enjoy your time off
Guess what? Black Friday doesn't give you good deals and the ones you may be looking at may be scams. Take 15 minutes and get smart.

Episode 6.16 - The future of democracy, technology and media
A few weeks ago I was on a panel at San Jose State, #yesyoucan, about the future of democracy and how it intersects with technology and media. It went over an hour, which twice longer than what I normally do, but it included Harry Hursti speaking on election security and Sari Stenfors regarding a "hopeful future." After what we've been through the past few months, it might help.

Episode 6.15 - As tech investors cower, Cybersecurity looks like a good bet
You've read the headlines about the stock market and the tech sector in particular. Self-proclaimed genius tech bros are hemorrhaging wealth, portfolios are crashing. But while the cybersecurity industry isn't completely unaffected, it is still attracting billions in new investment and private equity acquisitions. We talk to Brad LaPorte of Lionfish Advisors about why investments are falling in tech and why cyber is the new darling.

Episode 6.14 - Are we turning the tide on cybercrime? Depends on who you talk to
I'm working on a story about some interesting numbers regarding the state of cyber crime. The number seem to indicate that, overall, we might be making progress on reducing it, though not eliminating it. But to be sure I've spent the past two weeks talking to experts about the numbers who are totally pessimistic and doubtful. One of them is Gerry Kennedy, CEO of Observatory Strategic Management, an organization that advises industry and governments about insurance issues. In our discussion he recommended other sources, which will be included in the article on Cyber Protection Magazine.

Episode 6:13 - Finally, some good news is coming
Want some good news about technology? Stay tuned

Episode 6.12 -- Quad9: Where you should start your cybersecurity program
I was pleasantly introduced to a non-profit cybersecurity company this week. Quad9 was established 6 years ago with the goal of reducing human error as the source of breaches, which makes of more than 90 percent of all successful cyberattacks. And they do it for free. Their website (www.quad9.com) has a lot of easy to understand and use tools to block malicious actors from accessing your systems and data. Check it out.

Episode 6:11 -- Office Phishing and the three Ms with Adam Levine
The most innocuous things can be open invitations to criminbals to hack your data, or infiltrate your company. Adam Levine, cybersecurity podcaster and founder of Credit.com talked with Crucial Tech about "office phishing" and the "three M's" of personal cyber protection.

Episode 6:10 -- Quantum Computing: Not Just for Stealing Secrets
Quantum computing is often in the news, mostly about how it's going to destroy the world as nation states bust the hardest encryptions around so they can steal national and corporate secrets. However, there are no quantum computers available today that can actually accomplish the task and, thankfully, there are whole industries popping up to deal with the worst aspects of the tech while encouraging some good things. We talked with Eric Garcell of Classiq, one of the companies dedicated to protecting quantum computing intellectual property, about why quantum computers are a good thing and that, in some cases, are doing good things now.

Episode 6.9 - Hybrid Vishing. It's such a thing.
I get a new report from a different research company almost every week about the state of cybersecurity. Most of them say the same thing, but I do read them all the way through. Recently received a report from a company called HelpSystems, a cybersecurity services company that works with some pretty big name companies and they issued a report that got me yawning almost immediately. But their research subsidiaries, Agari and PhishLabs, buried a couple of items that perked up my ears so I said yes to an interview. What follows is a 30-minute discussion about the report focusing on a couple of areas, hybrid vishing, and vulnerabilities criminals are using to target Office 365 users. John Wilson, senior fellow for threat research went on to talk about which email platforms are most popular for criminals and how criminal activity using cryptocurrency is on the rise. You can get a copy of the report here.big-name

Episode 6.8 Virtru offers privacy in period trackers
Period and ovulation trackers have been around for quite a while but they are not, for the most part, privacy forward. In fact, according to the Mozilla foundation, only a few even have privacy policies. That is problematic for women in states that are criminalizing abortion where they are subpoenaing records of women even searching for options. Virtru, a security software company decided to fix that problem at and Def Con 2022 the demonstrated a concept app that put complete control of access to the data in the hands of the user. In preparation for Women's Equality Day on August 26, we talked with the team leader that developed the app, Cassandra Bailey, and the senior vice president of product strategy, Rob McDonald about the process. Unfortunately, they have no plans to make the app available to the public but have put the building blocks on Git Hub for app developers to run with. You can see a demonstration of it here. Maybe somebody out there will make a secure app.

Episode 6.7 - Bruce Schneier on Cryptocurrency and Blockchain. It's not pretty.

Episode 6.6 - A Quantum Cryptography Primer from SandboxAQ
Quantum computing has been in the news for some time but most people don't know why they should care. They should. Jack Hidary, CEO of SandboxAQ explains why.

Episode 6.5 - Passwords. I hate them. You hate them. Can’t quit them.
Even the promising announcements from Apple and Google about the end of passwords is going to take a long time to spread through the user base. But the technology exists to make them disappear if only we weren’t so stubborn about using them. We talked to Boian Simic, CEO of HYPR, a company making true passwordless tech… that is yet available to anyone but the wealthiest among us.

Ep. 6-4 -- Roblox and other MMO games vulnerable to lateral attacks
The wildly popular massive-multiplayer online games don't make the news much for big security breaches, but it appears they are vulnerable to lateral attacks that can steal data and abuse children. The companies that run these platforms tend to blame the users for breaching security. We spent some time with Raj Dodhiawala, CEO of Remediant, a cybersecurity SaaS company that defends networks against lateral attacks. He was pretty hard on companies that expect users to protect the network. Look for a larger article on game platform breaches in Cyber Protection Magazine

Ep. 6.3 - Those who ignore history are the most likely to be hacked.
One of my favorite security gurus, Ian Thornton-Trump sent me a text recently about the top-five security failures in recent history that we have yet to learn from. So I decided to call him and ask what he meant. It's worth listening to.

Ep. 6.2 - The Metaverse for Education is here... but not yet
The Metaverse can be used for immersive education that can engage students and enhance the experiential aspects of education. It certainly makes for more interesting field trips. But the potential for disaster looms. Luckily there are some, while recognizing the upsides of the technology, who take a very realistic view of the potential downsides. One of them is Jaime Donnelly.
Donnelly is an author, and speaker on immersive technology for education. She’s also the engagement director for Identity Automation, a company dedicated to identity and access management tools for K-12 and universities. She is also a great promoter for the future of immersive technology for education.
We sat down to chat about her extensive collection of VR goggles and her realistic expectations. She makes an old curmudgeon feel a bit better about the future.

Ep. 6-1 Defending against imposters at RSAC2022
The week after #RSAC2022 seems to be a good time to start a new season of Crucial Tech, so here we go.
I talked to a lot of people at the conference about how to keep foreign agents out of your network and some of what I learned is in a larger article in Cyber Protection Magazine, but.I went to someone who wasn't there -- Grant Wernick, CEO of #Fletch -- to chat about the problem, how to find them and how to stop them from doing real damage. Grant gave me a view into how you can find them and root them out once they infiltrate.

RSAC preview and tips
I'm going to the RSA Conference in San Francisco this week, so I didn't do a full episode yet. This is a preview of what's to come so stay tuned.

Episode 5.14 - A starting place for the most vulnerable to cyber attack
The realities of cyberattacks are not going away. Based on what we know, we have no idea how big the problem is because a lot of individuals and organizations just don’t report attacks. Conservatively, Cyber Protection Magazine estimates that half of all the attacks are unreported. More knowledgeable people than us say it's more like 90 per cent. As we have reported in past podcasts, that is likely due to a combination of complacency and just not knowing what to do.
We talked to Emil Sayegh, CEO of Ntirety, a company that helps small to midsize organizations reach security compliance with best practices and new privacy legislation. Ntirety is one of dozens of similar companies that are doing quite well. Sayegh claims they have 2400 customers, which is impressive in and of itself. But 2400 customers is a long way from any one industry being protected. Even 240,000 would be a drop in the bucket. That doesn’t mean you have to be their customer, or a customer of any competitor to get started. Sayegh outlined a five-point plan in our discussion. Grab a coffee and have a listen.

Ep. 5:13 -- Ending cybersecurity complacency is the cure for cybercrime
Joe Basques and I took our time to talk about personal priorities in cybersecurity and in the process we ended up talking about secure browsers, privacy, abortion, state surveillance and recalling recent podcasts with Chase Cunningham and Supreet Manchanda. The upshot is we are entering a time where personal responsibility remains the single biggest determinant of vulnerability. Don't skip over and don't ignore this episode. Your finances, personal privacy and the fate of the nation is is your hands.

Ep. 5:12 - Blazing the Trail to Zero Trust
Well, Dr. Chase Cunningham, Chief Strategy Officer (CSO) at Ericom Software, has created something that might help. It's an online market map listing the applications and solution providers for Zero Trust. We spent some time talking about how he developed it and how it can help people and organizations navigate the Zero Trust rapids.

Ep. 5:11 Venture Capitalists Can Improve Security
The SEC is considering requiring corporations provide a board seat to the CISOs. It's something I've seen as long overdue especially considering how security illiterate most boards are. And in the start-up world that literacy needs to start with venture capitalists. I decided to talk to one of my favorite entrepreneurial investors, Supreet Manchanda, and ask him what he thought an investor's role in security would be.

Ep. 5:10 - Arqit lawsuit roils quantum crypto industry
Woke up this morning to the news that high-flying quantum cryptography company, Arqit, is being hit with fraud lawsuits in the UK and US throwing shade on the viability of its technology. In preparation for an article on the news for Cyber Protection Magazine I had a chat with Gerry Kennedy, CEO of Observatory Holdings, about the importance of the case not only for future standardization but to companies looking to keep data safe when quantum computing becomes a thing.

Episode 5.9: "Nukes! Cyberwar! Russians!"... Calm down. It isn't that bad.
Much of the West has feared Russian aggression since the Cuban Missile Crisis 1962. Then it was their technologically superior military. Most recently it’s been their vaunted cyber warfare capabilities. This podcast episode is about the one positive coming out of the Ukraine war: the Russians are not as scary as we thought they were. Oh, they are still scary, but scary like a feral, rabid house cat, rather than a man-eating tiger.
The genesis of this interview was a Linkedin post by Ian Thornton-Trump, who is something of a celebrity in the cybersecurity world. Ian is a certified IT professional with 25 years of experience in IT security and information technology.
His post in Linked in, essentially said, “Russian cyber warfare? Meh.” That intrigued me so I sent him a private message and asked him to elaborate, and boy did he. So I invited him on the podcast. Turns out he’s a fan. Who knew?
Be prepared to be encouraged.

Guess what!? Today is World Backup Day!
This is the day you should not just THINK about backing up your data, but actually DO it. It really isn’t that hard. It can be done while you re getting a cup of coffee. It can be done automatically, and it can be done for free for most people. We spent a bit of time outlining all ways it can be done without muss or fuss.

Episode 5.7 -- Gerry Kennedy weighs in on secure messaging apps
If you aren't a regular reader of Cyber Protection Magazine, shame on you. But this podcast might change your habits. We've created a list of secure messaging apps for you in the accompanying article with this podcast. And because we started with the article instead of the podcast, the details are there. But we decided to call Gerry Kennedy, CEO of Observatory Holdings and get a reality check on our qualifications for the list. He said we were on the right track but got into some detail. Gerry's company advises companies and insurance firms on how to mitigate liability and security is a big focus for them.

Special Episode: Open Warfare in the Cyber World
Cyber warfare has been an open secret for many years, but the conflict in Ukraine has brought it out into the open and includes more than government-sponsored hacking. Anonymous took out the broadcast network, Russia Today (RT) with a massive DDoS attack, and the Russian Duma and several military servers were similarly hit within the past 48 hours. Meanwhile, Ukrainian hackers aligned with Russia have been attacking the Ukrainian infrastructure, hoping to get on the payroll of the GRU.
We talked with Dr. Pano Yannakogeorgos of NYU’s Center for Global Affairs about the relative preparedness of NATO countries for attacks from Russia and it's surrogates as well as the extent of guerrilla-type warfare from unaligned hackers on both sides.

Episode 5.6 -- Schools may be more secure than your business
The security of our schools is always a concern. Many have been targeted by criminals with ransomware, so when a PR rep talked me into an interview on "What teachers need to know about cybersecurity?" I thought it was a good idea. That interview didn't work out but I remembered I knew a guy. Kyle Brumbaugh is the Director of Technology and Innovation at the Redwood City School District and has been an educator for decades. We had a great talk about how his district had prepared for the pandemic lockdown without actually knowing it was coming. More importantly, they took steps to make sure that the teachers didn't need to worry about security. It's a message of hope for the future.

Episode 5.5 -- Bile sells... at least for now, but not for long
Social Media companies have no real incentive to reduce the vitriol that fills their servers. The fact is that content that makes people angry is what drives engagement... and engagement means advertising revenue. It also makes a profitable hunting ground for cybercriminals. But that might not be the case over the next few years. Joe Basques and Lou Covey sit down to consider the sea change that is coming for social content. They look at the social media companies claim they are nothing more than telecommunication companies and court cases that may change how libel laws are applied.
This conversation happened before the New York judge dismissed Sara Palin's libel suit against the New York Times, but in his dismissal, he set up an appeal that could go to the Supreme Court, exactly what Lou and Joe are predicting.

Episode 5.4 -- Don't put your data in one basket
Biometrics is something of a broad topic because it relates to any piece of information about you connected to your body that can be used to identify you. That includes fingerprints, DNA, eyes, voice, faces, and even medical and dental records. As a result, biometrics are a hub for personal security, identity theft and government surveillance. Protecting that stuff is kind of important. The problem is that companies tend to keep their data in just one or two places and that makes it attractive to criminals. The bigger it is the bigger the potential payday.
Last October we talked about Upheaval's approach to decentralization and this week we are talking to Frances Zelazny of the startup Anonybit which takes a different approach to the problem but for biometrics alone.

Episode 5.3--Collecting some personal data is a good thing
Personal data isn’t just about your name, phone number, credit cards and social security numbers. It’s also about your online habits. All that stuff is recorded, filed and analyzed by various companies, including your employers. That data can identify who you are and are as much a part of your digital identity as your user name and password. In fact, that data might be more accurate than your password. But whether a company is employing that kind of protection is a question that needs asking.

Episode 5.2: US privacy laws are entirely inadequate
This was one of the scarier interviews I’ve done on this podcast. I’m talking with Paul Smith, country manager for Sweeft Digital, a UK agency helping companies manage their digital presence, including compliance with UK and Europe privacy regulations in the UK and Europe. He confirmed many of the concerns I have about the US versions of the GDPR, which do more to regulate whether users can stop companies from selling personal data than they do the companies collecting it. Bottom line is, each of us has to take care of ourselves. Our governments are not going to.

Episode 5.1: New engineering discipline predicted for 2022
Welcome to the first episode of our fifth season and the first of 2022. Last year ended in a flurry of announcements, disasters, progress and new technology designed to keep us more secure and our last two interviews tied well into each other. We talked separately with Matt Morris, CISO at 1898 & Company, and Will Ruby, COO of FortifyIQ, and found that what Matt predicts is, in essence, the business model of Fortify IQ. So we glued them together. Patrick Boch handled the talk with Matt and Lou Covey spoke with Will at a live event, fully masked, in December (hence the muffled voices). Altogether we think this is a positive way to start the new season. Happy New Year.

Semiconductor industry gets dragged into security
At the 58th annual Design Automation Conference in San Francisco, it seemed, at long last that the semiconductor industry is considering making their products secure, if only because they are being forced to. Standards organizations, not the least being the National Institute of Science and Technology, are creating mandatory minimums forcing hardware companies to force their chip suppliers to consider closing gaping holes before they go to manufacturing rather than create patches. At one of the technical sessions, your reporter asked a question that got the conversation going in a direction we all need to hear. And so we end our fourth season of Crucial Tech. See you in the new year.

Episode 4:24 - Fletch provides an early Christmas gift (audio only version)
A few weeks ago we did a video demonstration of the Fletch.ai on the Cyber Protection Magazine Youtube channel, but wanted to share just the audio portion in this week's podcast because it's a solid tech gift for Christmas. Check it out.

Episode 4:22b - Mozilla wants to show you where "Privacy is Not Included"
We interviewed Jen Caltrider of the Mozilla Foundation about the fifth annual Privacy Not Included list the foundation publishes annually and if you are thinking of buying some electronics as gifts or for yourself, you might think about referring to the list at www.privacynotincluded.org. Let us know if you ever consider privacy features when you are gift shopping.

Episode 4:23a - Mozilla Foundation lets you know when "privacy not included"
For the past five years, the Mozilla Foundation has published reviews of products rated on their relative privacy aspects. The least private products are labelled "Very, Very creepy. We interviewed Jen Caltrider, Mozilla's lead in their Privacy Not Included Division and found what makes a product or service creepy. Hint: the better the price, the creepier it becomes.
This will be available on Spotify in video or on all other platforms in audio only.

Episode 4:22 - Quantum computing is not really here, yet. But companies are getting ready for it
Quantum computing is one of those technologies that causes hyperbole, confusion, and concern. A lot of the discussion is not much more than wishful thinking or uninformed fear. For most people, it will not affect them in their lifetime. That’s not to say it isn’t something to completely ignore.
We talked to Alan Grau, VP of business development for the startup company PQShield in this week’s episode of Crucial Tech to get an overview of where we are in quantum security and what their company has to offer.

Episode 4:21 – Upheaval's Ironweave might actually fix data security with blockchain
It is a rare thing when a company claims to be the first to do something and actually is the first. Rarer still is when that company is actually solving a significant problem with their product. Upheaval (upheaval.io) appears to be among those rarities with a data security platform that prevents data theft, intrusion and could solve the problem of social media privacy. This interview may be the most encouraging thing that has happened in data security in a long time and has earned them membership Cyber Protection Magazine’s “Holy Grail of Cybersecurity” rolls.

Episode 4:20 -- Why does bad marketing happen to good products?
The tech world sees marketing as a necessary “evil” and does it poorly. The cybersecurity industry sees it as a mystery but duplicates what the tech world does, so their efforts are generally poor and clueless.
Good marketing explains the reason budgeting a particular product is a good idea and where that product is most useful. Mediocre marketing looks for the lowest hanging fruit when the ripest fruit is at the top of the tree. Journalists have to cut through mediocre marketing to make that reason clear to the customer. This is why I don’t like writing about product introductions. What is more interesting is the process of discovering why the product exists and who can best use it. That’s why I decided to take this interview with XM Cyber. They have good technology. They have mediocre marketing like pretty much everyone else in the tech world. I thought it might help to see how the sausage is made.

Episode 4:19--Phishing, smishing. Only you can stop it because Facebook sure ain't gonna
Had a fun conversation with Tim Callan, chief compliance officer at Sectigo on the un-fun topic of phishing, smishing and whether social media platforms even want to stop allowing criminals to scam their users. There is hope... just not from Facebook. See more at www.cyberprotection-magazine.com

Episode 4:18 - Convincing Real Estate Luddites to adopt good security
I've spent some long, frustrating hours trying to convince realtors to adopt proven technology. I can't imagine how difficult it must be, then, to convince them to practice good digital hygiene. David Moffat is trying to. We spent few minutes talking about how the industry's attitude can make everyone less safe.

Episode 4.17 - Modern vehicles, especially EVs, are rife with security holes
I few weeks ago I was mercilessly cajoled by a PR firm to talk to the chief marketing officer of Sepio Systems, Bentsi ben Atar about their products and services. I don't do product announcements but I do talk about the problems the products were created to solve. So Bentsi and I talked for a while about how prevalent the potential for hacking modern vehicles is. And, apparently, public EV charging stations are a slam dunk for hackers. I hope this doesn't ruin your weekend.

Episode 4.16 - Apple's porn scan is bad, unless you think it is good
The term “slippery slope” is applied to a lot of hypothetical outcomes of everything from legislation to technology. In the case of Apple monitoring the use of products and services for distributing child pornography it appears there are more than one or those lubricated hillsides.
At Cyber Protection Magazine we are internally debating the benefit/risk ratio of this decision and decided to air our thoughts in real time in this episode of Crucial Tech. US editor Lou Covey thinks the GDPR, CCPA and a host of other potential legislation has already begun a slide toward government control of technology. On the other hand, EU editor Patrick Boch thinks Apple’s decision in the impetus. In either case, one has to decide whether making it difficult for child abusers to pursue their kink is worth the potential loss of privacy, or if privacy is an absolute right.

Episode 4:16 - How security researchers are fueling cybercrime, and more from Black Hat 2021
I attended Black Hat 2021 virtually again this year and wrap it up in this grab bag of issues including #AI ethics, #cybercrime legislation, #ransomware growth and control, and building #cybersecurity community to compact the organization of cybercrime. Grab a coffee and take 25 minutes to get up to speed.

Have we reached Peak ransomware? George Finney says, probably not
I interviewed George Finney, chief information security officer for Southern Methodist University, a couple of weeks ago for a Cyber Protection Magazine article about the state of ransomware. It wasn't encouraging. But George is a very nice guy who also helps people and companies get their act together regarding good security practices. The entire conversation was illuminating, even though I had to do it over my iPad due to a tech glitch. Ah the modern digital age....

Episode 4.14 -- How marketing makes it harder to buy products intelligently: A rant
I'm being bombarded with companies trying to get me to interview them about product announcements. If I can figure out a theme to put them in context I will do it. The past couple of weeks though, it's been almost impossible. But I needed to get a podcast out and this is it.

Episode 4:13 - Search for the Holy Grail in Security: Penetration Testing with Ronin-Pentest
This episode of Crucial Tech is the beginning of a search for Holy Grail of cybersecurity: Products and services that actually make us safer without breaking the budget. There is no one company that delivers everything, but we found one that provides the crucial service of penetration testing that can give a small business a starting point for securing their data with both automated tools and enhanced with professional services cost below $100. Ronin Pentest offers an automated, web-based tool that can be used by anyone to go through the top 10 vulnerabilities as listed by the Open Web Application Security Project (OWASP).

Ep. 4-12: To pay the ransom or not to pay? That is one of the questions
For a journalist to decide what to cover and when takes some discussion and this week we decided to do our editorial meeting in a public setting so you can see how we pick what to report. In this episode, Joe Basques, Patrick Boch and Lou Covey look at the changing paradigm of Ransomware, the ethics of paying ransoms, Webscraping, Amazon Sidewalk and the state of security jobs.

Episode 4:11 - That time when the business world got serious about cybercrime
Cybercrime has been with us for a while, but the business world saw it as a minor annoyance. Luckily, the criminal world kept the cost low, requiring small ransom amounts and cash cards as a delivery mechanism. #Cryptocurrency kicked the demands up because it was easier to demand more money and easier to hide the money trail. Big ransomware demands hit the news and infrastructure was threatened. But in 2020 and 2021, law enforcement figured out some ways to track those criminals down. Extraditions began and ransoms were recovered. The gloves are coming off and CEOs find themselves squarely in the crosshairs of regulators and stakeholders along with the criminals. In September 2020, Gartner Research predicted that CEOs would be held criminally and fiscally liable for cyberattacks that harmed people physically if the company had not taken basic precautions to prevent it. We talk with Mathieu Gorge, CEO of VigiTrust and author of the Cyber Elephant in the Boardroom, about what CEOs need to be investing in to keep themselves out of jail.

Special episode: Revital Libfrand of OdiX on tech opportunities for women
This week the WomenTech Global Conference ( #WTGC2021 ) is happening on the web and we thought it would be a good idea to interview a leader in the security industry, Revital Libfran of OdiX about her career and opportunities in #cybersecurity. Plus it gives us a chance to plug this great conference. Sign up at www.womentech.net and learn more.

Episode 4:10--Truth in marketing: It doesn't have to be that hard
After several decades working in and with marketing professionals we've learned a couple of things about how marketing is done. One of the more important lessons is that marketers make their jobs much harder than it needs to be. And maybe one of the worst offenders is in the world of #cybersecurity. Patrick Boch, my cofounder of Cyber Protection Magazine, share some of our frustrations insights on how companies can promote their products and services more effectively. It really isn't that hard.

Episode 4:9--Hacking is not spoofing, plus a case study

Episode 4:8 -- How I learned to fear my computer and ignore the bomb
The potential of nuclear warfare is being eclipsed by the potential of cyber warfare as the ender of civilization, so I guess their is that upside. No, seriously, it's becoming apparent to rogue nations that cyber warfare is more effective, cheaper and has less chance for retaliation than a nuclear strike. We talk to cyber warfare experience Pano Yannakogeorgos from New York University about the potential devastation from cyber attack. A more in depth article on the subject is coming next week on Cyberprotection Magazine

Ep. 4:7 -- The massive upside of Apple's transparent tracking feature
When you peel back all the layers, digital marketing and consumer tracking on social media apps presents the most significant security flaw in our digital world. Apple's giving individual IoS users control over that decision is a big step forward into making us all safer. It also removes a lot of the hype and fraud that comes from unrestricted tracking. Joe Basques and Lou Covey answer a user question about the significance of the new feature.

Ep. 4:6 -- It's Earth Day. Are your batteries exploding?
Lithium-ion batteries are in almost all electronics, all electric vehicles and are expanding through the power grids worldwide to store energy during system outages. They are crucial to continued operation of “green” data centers. When you talk about renewable energy, you have to talk about where lithium-ion batteries fit in the discussion.
That’s not necessarily a good thing.
Lithium-ion technology is fraught with social, environmental, and security downsides. Forced child labor, the lack of effective recyclability, potential poisonous fires and explosions and complex, imminently hackable control systems are all aspects of the industry that just won’t be going away soon. But there is hope. There are alternatives.
This is the subject of this episode of Crucial Tech. We talk to Jack Pouchet, Vice President of marketing for Natron Energy, a company manufacturing a sodium-ion battery that lacks all the downsides of its lithium cousin and offers significant upsides that we need. The good news is that it looks like this technology will be going into large-scale production just before the Lithium-ion technology collapses under its own weight.

Episode 4.5 -- Supply chain headaches abound along with potential fixes
This interview with Warren Savage, guest researcher t the University of Maryland in IoT security is a follow up to an interview I did with him last year at the @DesignCon conference in Santa Clara. In the interview and his keynote at the show, he talked about how vulnerable the electronics supply chain was. A year later we are stuck in a semiconductor supply chain slowdown and one of the reasons is the inability to secure it. Things haven't gotten much better but Savage sees progress. This is part two of a series on supply chain.

Episode 4.4: The year we became painfully aware of the supply chain
2021 is quickly becoming the year we realize that supply chains are what make the developed world. SolarWinds, the Suez Canal, the worldwide semiconductor shortage, and the “snowpocalypse” in Texas has shown us that one glitch can wipe out our standard of living for weeks, months and years. With that in mind we start a series of podcasts and articles in cyberprotection-magazine.com on the supply chain, with special focus on semiconductor security. Stay until the end. You will learn something and get pissed off.

Episode 4.3 -- Boring technology can be the most important to understand.
We talk to Harry Haramis, GM of Prime Key, about public key infrastructure (PKI) and certificate authority (CA), which may be the most boring technologies you come in contact with, but are foundational to keeping you secure on the internet and even in your car. The problem is that few companies will let you know what they are doing about managing those things and if it is done badly, you are screwed. Time to start tasing questions.

Episode 4.2 -- Cyber insurance may be a good idea... or not
We started looking into insurance coverage for cyber attacks a few weeks ago and contacted analyst Maxine Holt of Omdium about it. And then more questions came after the talk. So this episode is a part of additional coverage you will see in Cyber Protection Magazine and additional podcasts. It's the complex, but we are going to try to make it understandable.

Episode 4.1 -- CDR: another security acronymn that you need in your arsenal
Securing an organization's data isn't easy, or cheap, but relatively tiny section of the cyber-protection industry, known as content disarm and reconstruction (CDR) might be a solid beginning. If only they would spend enough on marketing to build awareness. We open the fourth season on Crucial tech with Taeil Goh, CTO of OPSWAT, about his companies threat detection and removal technology and why he ain't rich yet. Read the full story of Cyber Protection Magazine

Episode 3:20 The launch of Cyber Protection Magazine

Episode 3:19 -- California small business grant program is a security nightmare
If you are a small business hoping for a grant from California to stay alive during the COVID-19 lockdown, you need to listen to this podcast. The state has chosen to work with third-party financial institutions to transfer the funds to banks, but those organizations are asking applicants to violate basic good practices for maintaining security. Moreover, some business banks have internal security mechanisms that prevent the connections being made between the state and the banks. You can do this safely, but you need to take precautions. We give your those precautions in this podcast.

Episode 3:18 --Stupid stuff in tech
There is important stuff in tech, and then there is stupid stuff. And lately the stupid stuff has been a bit more interesting. We take a look at four or the more interesting stupid stories.

Episode 3:17 The hackers won't let you go. Time to go after them
For about 10 years the conventional wisdom about #ransomware was to just pay it and start improving your security. According to John Flory III, CISO for Harbor Networks, that just doesn’t work anymore. In our interview with Flory he explains why it is absolutely necessary to go on offense now and hunt the hackers down. He gives us a preview of a case he worked on with international law enforcement that resulted in the arrest, extradition and prosecution of a ransomware ring. We will hear more from Flory in the coming weeks but his recommendations can bear fruit as hackers become more brazen.

Episode 3:16 Human error can still defeat any cyber security technology
As soon as the SolarWinds breach hit the news, press releases started pouring out of the cyber security industry with claims that their products or services would have prevented the breach, but talking to people in the trenches, that is a dangerous claim to believe. The truth is, human error and intention can defeat any security protocol or technology. We talked to Matthew Rosenquist and Steve Hanna about the only way to deal with security: vigilance.

Episode 3:15-- 2021 is looking good for controlling disinformation
We were going to do this after the first, but the queue is getting long with 2021 interviews and articles for Cybersecurity-Magazine.com so here's our Christmas gift to you.
Legislation, litigation, public opinion and technology are combining in 2021 to put the breaks on #disinformation and #Trumpism next year and the foreseeable future. It looks bad for social media but good for print journalism. That makes this a happy Christmas as fare as we are concerned.
Thanks for the support this year. We've grown 400 percent in listenership a engagement. Looking for great things in the coming year.

Episode 3:14 -- A steaming crock of corporate awards programs
Before we get into be thankful of stuff on Thursday we need to get one thing off of our chest, namely the wasteful use of time and money spent on corporate awards programs that are nothing more than a naked attempt to build valuable mailing lists and take money from startups that they can't afford or leave them vulnerable to a corporate raider. And there are no more blatant efforts than the Red Herring 100.

Episode 3:13 --The catch 22 about hydrogen economy: It needs fossil fuel
President-elect Joe Biden has been catching flack for stating that we will transition out of fossil fuel in favor of green energy, but that has less to do with government regulation and more to do with market forces. And in the case of hydrogen, we cannot decouple that clean energy from fossil fuel extraction. We look at this in a short podcast because it is that simple.

Episode 3:12 -- What's wrong with Journalism today? Part 3
In part three of this series, we take a look at the debate over Section 230 in Title II of the Federal Communications Act that is targeting social media political bias and discuss why it is a misdirected controversy, and how it might restore the fortunes of and trust in #MSM. We will conclude the series with a couple of tools to help you create your own mental filter on what you see online.

Episode 3:11 -- What's wrong with journalism? Look in a mirror
In part two of our miniseries on journalism in a digital world, we take a look at the causes of bias in the press. Some of that is legitimate, but a lot of it is just personal perception and crowd think. The bias most of us see is actually a mirror image of our own. We talk about some of the ways you can combat bias but we admit it may be beyond one's desire to seek balanced news. THERE WILL BE A PART THREE! In the meantime, consider becoming a sponsor so I can get rid of the ads

Episode 3.10--What's wrong with Journalism?
It is popular to say you don't trust the news media. Some of that distrust is valid, but few people can actually identify why. Joe Basques and I decided to do a deep dive into the subject in this episode... that went so long we had to make it a multiparter. There may even be a part 3. In this day and time we need all the help we can get to find the truth and randomly cutting off reliable sources of information is self-defeating.

What's wrong with Journalism today?
Next week, on Crucial Tech, more about journalism and digital content than you've ever known.

Ep.3.9--Airgap.io: the Holy grail of ubiquitous digital security?
I have talked to a lot of companies developing digital security devices and systems. Virus scans catch about 50 percent of the attacks at best but don't stop them from happening. Network equipment and software services are way too expensive and do very little to protect against people doing stupid things behind the firewall. It has really seemed hopeless for a while and very frustrating.
Then I ran across Airgap.io. Holy crap. Is this what I've been searching for? It's affordable, scalable from a home network to a #Fortune100 company, and it stops ransomware from spreading throughout all connected devices in the network.

Episode 3.8--A piece of living history explains 5G without hype
Bob Frankston is an e engineer whose work has arguable been more responsible for how most people interact with the internet. You probably have never heard of him... but I have. After following Bob Frankston's IEEE column off and on since 2013 we were thrown together earlier this year on social media and was absolutely star struck when he agreed to this interview about 5G networks. As I suspected, 5G is more about marketing than technology, but it is also about getting around net neutrality. Listen and learn.

Ep. 3.7 - Sometimes, a digital breach just isn't your fault
Even the most security-conscious people and organizations get hacked, so it's not always something you can stop. We go back to talk with #Sectigo's VP of IoT security, Alan Grau to talk about how a security training from got hacked through a common phishing scam, how deep the flaws in our technology are and finally, how Sectigo is helping companies make secure technology.

Episode 3.6: Phishing is on the rise and it threatens the 2020 Election in the US
Between January 1 and August 23, The number of phishing sites detected by Google rose by more than 200,000 to 1,892,980. Three years ago there were less than 560,000.
“When you get that all too familiar barrage of spam emails, social engineers are betting that if you’re a MAGA supporter who received spoofed emails pitching progressive candidates or causes, you’ll click unsubscribe about as fast as a progressive will if they’re on the receiving end of a MAGA blast,” says Adam Levin, founder of Cyberscout. Levin explained that the emails are rigged to download malware, ransomware, or access your accounts when you click unsubscribe."
The dramatic increase is giving rise to an entire sub-industry dedicated to #zero-trust technologies that are slowly coming to market. Maybe too slowly for the 2020 election cycle. We talked to two of them: Zero Fox and Airgap Networks

UPDATE!!!!! SOCIAL MEDIA ADVERTISING IS IN BIG TROUBLE
We have a few episodes this month talking about drastic changes in advertising and marketing and until this week, it looked like everything was under control... until Facebook admitted this week that the changes are going to severely hamper their ability to send those creepy targeted advertising posts your way. And that's going to affect their revenues.

Ep. 3-4: Wanna Cookie? You have more control over what companies do with your data then you think

Ep. 3-3 Quantum computing is a security nightmare, but making it safe is a priority for Sectigo
You may have heard of quantum computers. You may actually think they are mostly hype. They are. We won't see them come into real use for a decade. In the meantime, people are freaking out over how they can be used to makes us all less safe. The good news is some companies, like Sectigo, are working on ways to make sure we are all safe when they actually become a reality. So grab a coffee and listen to our take on quantum computer security.

Ep. 2:23 Using technology to stop a pandemic

Episode 3.2: BlackHat wrap up on how foreign elections are being hacked Part 2
In our last episode we reported on presentations at BlackHat USA 2020 about election interference. In this second part, we look specifically at the Russian and Chinese approaches to disinformation campaigns and how it is less technology hacking and more about strategic use of social media.

How hostile states are hacking elections, Part 1
Our first re-run of the season is going back to our report on election hacking, a two-parter, that doesn't dwell on the technology of elections as much as how they can be influenced. For several years we have heard about how technologically vulnerable our elections systems are, but it turns out that physically hacking a system is a lot harder and yields insignificant fruit in national elections. It is much easier to sway voters with disinformation.

Cookies, Black Hat Conference and the coming third season
Are you concerned about how social media seems to know exactly what you are thinking about? Are you’re that they are listening to you and your friends on mobile devices? Well, they don’t and they aren’t. You’ve been freely telling them what your concerns are and what you want to buy. But all that may be coming to an end. Find out how in the next episode of Crucial Tech.

Episode 2:29 - Recap on AI and facial recognition, and an update
We thought we would be able to wrap up the last three episodes featuring Tim Bajarin and Matthew Rosenquist, but then life happened and more AI disasters occurred. This is yet another launching point for our coverage of surveillance technology.

Episode 2:28 Matthew Rosenquist talks ethics, facial recognition and the potential benefits of AI
Last week, we had @TimBajarin give a fairly pessimistic view of the future of #AI and #facial recognition. This week we bring in the positives (sort of) with security and AI guru @MatthewRosenquist. This technology is probably inevitable but to make it a global issue we are going to either have to give up some freedom and privacy, or we are going to have to work hard to fix the deficiencies. either way, the combination of this and the last two episodes will make you well informed enough to be the expert in most conversations even if you aren't an engineer.

Episode 2:27 Tim Bajarin, ethics, facial recognition, AI, and how Apple is keeping us safe
By the time we finished last week's episode on security settings a lot happened. So I started making some calls to those who know what was going on. This week, we talk to the Analyst di tutti Analysts, Tim Bajarin of Creative Strategies about ethics, facial recognition and AI, why it's so hard to do any of that well, and how Apple's announcement of iOS 14 is so earth-shaking.

Episode 20:26 How to keep Facebook secure, facial recognition technology, and so much more
My business partner, Joe Basques called me up and started asking questions about #Facebook security, which morphed into #AI, which moved into #facial_recognition. So we decided to start from the beginning of the conversation and record it. You will find out some tricks about how you can make your Facebook experience safer, what Facebook can actually track even when you think you are secure, and what the future holds for you in a corporate surveillance state.
However, the subject got even more interesting in the days following our talk so this becomes part one of a broader discussion with industry luminaries. So, get ready. It's going to be an interesting ride.

Episode 2:25 Ethical technology development is not easy but has become crucial
I'm deep into writing a book with Richard Bach, a security guru from the UK, on the ethical development of #AI technology and have found that there are really not a lot of books offering practical guidelines for ethical thought in engineering. There are lots of books about why it's important and about ethical lapses, so maybe it's time for an Ethics for Dummies (Boy, am I qualified). In my research, I came across Jamais Cascio, a general futurist who does a lot of work with the Institute for the Future (www.iftf.org, @iftf) and who has a lot to say about the subject. Out of a very long conversation I culled these 30 minutes. The rest is going in the book. I imagine your brain will hurt by the time it's over.

Ep. 2:24 A follow up on contact tracing and putting my money where my mouth is
Last week I talked about the importance of tracking apps to help do contact tracing for the #Coronavirus epidemic and after I did that podcast I signed up for a study to get tested myself and I signed up for one of the apps (I chose one from Johns Hopkins University.) You can also see this podcast on Youtube so you can see what I am using and how I set it up. I am a big believer in controlling what you allow to go out on the internet but I'm also a big believer in being a responsible citizen. Sharing personal data during this time is a responsible act. I'm sure this will make you a bit nervous and have comments, which you can leave on www.Anchor.fm or wherever this shows up on social media. Let's have a civil discussion.

Ep. 2:22 We told you so, Part 2: venture capital and entertainment changes
In the last episode, we looked at changes in how tech media and businesses are changing during the #COVID19 #pandemic and how @FootwasherMedia has been predicting these changes for decades. We've also had our thoughts about entertainment and #venturecapital are going to change, but we kept that to ourselves because we aren't entertainers nor are we investors. But we do know some people who are and in this interview with Fabrizio Capobianco of @MinervaNetworks we take a look at how the current crisis is changing that, as well.

Ep. 2:21 Hey, we told you so, Part 1
Joe Basques and I have been working in the tech world and media for several decades. We have often warned clients of what was to come and that they should be ready for it and almost universally we have been ignored or ridiculed. The funny thing is within 3-5 years things we warned of have come true, like the slow death of tech media and the rise of social media to replace it. Each time companies have raced and struggled to adapt. the #COVID19 #pandemic has rushed even more of our predictions to the forefront, including #videoconferencing, #telemedicine, and #digitalmigration of the #economy. We are taking a moment to gloat but also to remind you that everything has changed and probably for the better. Part 2 will look at changes in #venturecapital, #investment and #entertainment

Ep. 2:20 Trusted Computing Group: You've never heard of them but their work is keeping us safe online
In this episode, we talk to Steve Hanna from the Trusted Computing Group (@TrustedComputin) to talk about the organization's work in making computing secure. You probably haven't heard of them, but their standards form much of the #security basis for the #IoT. Steve is VERY accomplished and a very nice guy. In fact, it was kinda like talking to Mr. Rogers about technology so it was knowledgeable and comforting all at the same time.
Remember, if you'd like to leave a comment, listen to this podcast at Anchor.fm and record your question or comment in the app. You might be a star guest in a future episode or have the right suggestion for one.

Episode 2:19 What the hell are certificates and why you should care.
When searching the web, do you ever get a request to renew or accept a certificate? Yeah, you have but you probably had no idea what it was about. It's kind of important, it should be more widespread and there are a few companies involved in the process. One of them is @Keyfactor. They would like to be more widespread, I can assure you. Listen in and maybe you can push your providers to look into them. #security #authenticatiion

Episode 2:18 Digital corporations are selling your data to foreign governments
I hope that headling caught your attention. It should. We hear a lot about how the US government is watching us, but the information that Edward Snowden said was being collected on us pails in comparison to what Google, Facebook, Amazon and Microsoft are allowing other corporations and foreign governments to collect from us. And those companies are getting paid to allow them that access even if they aren't saving and sharing that data for themselves. What's more, there is little you can do to stop it except for eliminated digital devices from your life. But there are things you can do to limit it. This commercial-free episode may be the most important information you need right now.

Episode 2:17 Fingerprints? Probably not.
This week I found opt that is it probably less likely that the government is watching you than Amazon is. More importantly, to law enforcement you may not exist at all. Check out how tech firms are helping the good guys catch the bad guys.

Episode 2:16 The coming death of Amazon?
The title is a bit melodramatic but history shows us that nothing devised by man lasts forever and, thanks to state, national and international laws as well as new technology, the hegemony of Amazon, Facebook, Ebay and Google over retail may be coming to an end. We talk to the CEO www.maikeinc.com and look at the increasingly hostile environment facing online behemoths.

Episode 2:15 - The vulnerability of the internet of things
The Internet of Things (IoT) is growing faster than the original internet. Cisco Systems predicts that internet-connected devices will represent 75 percent of all the internet traffic in less than 10 years, and Gartner predicts that there will be five times more IoT devices in use than there are people on the planet. But more than 90 percent of all those devices are easily hackable and will remain so for the foreseeable future. There are some companies working hard to fix the problem but until manufacturers decide to start designing for security, it's going to be a long road, indeed.

Ep. 2.14 - GDPR and CCPA are changing social media for the better
You've probably heard of the data privacy laws in the EU and California but you might not know what they do for you. A lot. We talk to an international expert, Patrick O'Keeffe on the subject of privacy and regulation, You need to meet this guy. He's the real deal.

Ep. 2:13 - The rise of private social networks
It has been a bad couple of years for Facebook and it isn't getting easier. This week, we look at social networks that do not have advertising and don't sell your information to anyone. In fact, they don't even collect it. Both ways that all social media platforms have traditionally made their money. We talk to David Glassco, CEO of one of those networks, Neone (nay o nay) and their pay-for -play paradigm. Will it work? Only you have that answer.

Ep. 2:12 Cryptocurrency is vague, possibly corrupt ... and inevitable
Happy New Year and welcome back after the holiday break. This season on Crucial Tech we will be looking at changes in social media, consumer privacy laws, new security challenges for the common man and more, but today we kick-off the first in a random series on cryptocurrency and blockchain technology with two friends, Joe Basques and Matthew Rosenquist. As always, donations will help us eliminate advertising and you can make audio comments on the Anchor.fm platform that could make you a star on a future episode

Buckle up for 2020, it's gonna be a bumpy ride
After two months of holiday partying, travel, illness and unavailable interviewees I'm ready to kick off the new year with a big portfolio. We'll be looking at Cryptocurrency, social media, renewable energy, security, threats to the 2020 election, Russia, private social media and a bun ch more. Here's a short preview. And check out my book, The Stupid Side of Renewables now available on Amazon. You can leave a message here.

Cryptocurrency, Mysterious Market forces and BS
I'm starting to to do something I have long dreaded: start talking about cryptocurrency. We introduce the concept and the problem about talking about it in the opening and then we get into something that explains why companies are moving to automation... and it is more than just greed. I'd like to hear from you about this episode. you can leave a message here.

Bringing Finnish education tech to the US
I had a chance to interview a handful of Finnish tech start-ups at the 2019 TechCrunch Disrupt in San Francisco and was m,ore then pleasantly surprised by what I heard. There are many reports about how Finnish publlc education is exceptional but exporting all the techniques are difficult for a variety of reasons. The technology I saw changes that.
You m ight want to be ready to turn up the sound in a couple of the interviews, because the Finns are often softspoken and there was a lot of background noise and electronic interference in Moscone Hall, but it is all worth the listen, especially if you care about education.

Where did we go wrong on Autonomous Vehicles? Part 4, finale
Josel L:orenzo, VP of product development for Axiado and an AI guru talks about the different levels of autonomous vehicles and whether humans can have any actual presence in controlling them. This is the last of 4 parts

Where did we go wrong on autonomous vehicles, part 3
We went to San Jose to talk to Chet Babbla, vice president for automotive technology for Arm Ltd., about a new consortium focused on autonomous vehicles. Cooperation in a multi-faceted and challenging technology like autonomous vehicles is a good idea. But in this case, do we have enough knowledge about the components needed to make a dent?

Where did we go wrong on autonomous vehicles?: Part 2
Besides the difficulty in getting the technology to work, we still have a significant problem in making autonomous vehicle safe from hackers. We talk with Matthew Rosenquist, cybersecurity guru.

Where did we go wrong on autonomous vehicles, part 1
We're starting this three part series with Rik turner, principal analyst at Ovum, a british analysis firm, to get a history of how long vehicle automation has been with us, where it is today and how far we have to go before we have what we think is just on the horizon.

Preview: Where did we go wrong with autonomous vehicles
Friday, September 27 we will start a three-part series on the state of autonomous vehicles. Tune in and find out the 411

Special episode: Catfishing and what to do about it
Catfishing is the biggest scam on the internet. It is not easy to get out of it once you fall into the trap and it is very embarrasing, but it can be done with a minimum of effort, some patience and honest self-reflection., But avoiding it is very easy. Thism episode is brought to you without commercial interruption. So chip in at https://anchor.fm/crucialtech.

Catphishing and what you can do about it

Why is Scandanavia the most secure place in the world?
We are starting season two of Crucial Tech with a look at security-conscious culture. A few months ago I met Jarno Limnell (@jarnolim), CEO of Tosibox (https://www.tosibox.com) to talk about cyber security . This seemed like a good time to trot out the interview considering the increasing occurrence of cyber attacks around the world. So why is Scandanavia, and Finland in particular so secure. You might be surprised that it isn't just technology.

Episode 19: What banks are doing... and not doing to protect your funds
This week we talked with Ugan Naidoo who, besides having a pretty neat name, is the CTO of Inetco, a Vancouver, BC company that monitors financial transactions for banks and large retailers worldwide. This is a pretty technical discussion, but once you hear it, you will understand how not paying attention to this ussue is costing you and everyone else, money.

Cryptojacking: It's a thing
Hackers can appropriate you computer system to make money on cryptocurrency without you knowing it's happening. It's annoying but not bad for individuals like you and me. For big corporations and governments it can be lethal.

Bill and Lou's excellent adventure in Linux and IoT security
I wrote a column in EEWeb.com a few weeks ago talking about the security issues developing in open source software, Linux in particular. And old friend popped up in the discussion. Meet Bill Weiberg. We will probably be hearing more from him in the future/

Certificates? We don't got to show you any stinkin' certificates!
In this episode we learn about certificates, securing Industrial Internet of Things (IIoT), botnets, DDOS, secure boot... It's jam packed. We interview Alan Grau, CTO of the Icon Labs division of Sectigo.
Thanks to the late, great Alfonso Bedoya for the headline

Ep. 1-15 Dishonest telemarketing, Consumer privacy laws and a way to deal with them effectively

The standard you never heard of: GlobalPlatforms... and more
This episode is packed into 40 minutes with news of the week, an interview with the director of Global Platforms and much more. This is stuff you need to know.

Don't trust a company to keep you safe
This is an interview I did a few months ago with Matt Rosequist, former senior security analyst for Intel. It's a wide ranging interview that cov ers a lot of issues you may not be aware is affecting you.

Squirrels are the greatest threat to the internet and the power grid
Yes, you read that right. The biggest threat to our infrastructure are cute, furry rodents. We interview the CEO of Critter Guard who is saving the world one pole at a time.

Ethics in tech: It is a thing
Government hearings are all the rage now for tech CEOs trying to justify massive breaches in privacy, security and basic trust within their markets. The discussion on how to make sure development of new tech, especially in artificial intelligence is bubbly to the surface. Maija-Riita Ollilie, an ethics scholar in Finland, was our guest this week with a view on how ethics will develop naturally with adoption of technology.

A good path for STEM careers for women
A few weeks ago I met Lisa Jiggetts, founder and president of the Women's Society of Cyberjutsu, dedicated to helping young women start careers in cyber security. A fascinating and important effort. Check out the website at https://womenscyberjutsu.org.

The Arrest of Assange: What is it all about?
Julian Assange was arrested last week in London. Some call it the death of free journalism, but it might be something else. And what it reveals about your personal security is probably more important.

A special edition of Crucial Tech: the arrest of Assange

Cyber predictions from Forresters are scary
A few weeks ago I interviewed Forresters senior analyst Amy DeMartine about her predictions for cyber security in 2019. Now that I have a chance to publish it, two of those predictions have already come true and it is just mid April. And the reasons for the growth of cybercrime are sitting in out pockets.

The Green New Deal isn't as bad... or as good as you have heard
The Green New Deal in Congress is going to be debated for at least two years and I thought it was worth tying in a tech angle to the debate. We interview Evan Johnson, CTO of Hytech Power in Redmond, Washington about how his technology can actually make this happen with a minimum of fuss and a maximum of results.
BTW, If you listen to this podcast on Anchor.fm, you can leave messages, ask questions and make recommendations for inclusion in future episodes. Otherwise you can contact me on the Footwasher Media Facebook page, on my Linkedin page, or on Twitter @newtechpress.

Artificial Intelligence: Good or Bad?
Artificial intelligence (AI) is a major theme in technology news, investment and science fiction and the conventional wisdom is that it can be very dangerous. Is that true? Maybe not. In this episode we talk to Axel Kloth, CTO of Axiado Corporation, about the potential dangers of AI and the potential benefits.

Applying artificial intelligence in hardware for security

Creating decoys to catch and stop hackers
Dr. Prasad Calyam at the University of Missouri is working with a team of researchers to create a novel way of stopping hackers from staling data or installing malware in cloud-based systems.

Will hardware companies survive digital protection legislation

The big hole in the cloud
The last week of February was a bad one for digital security and we thought it would be a good time to start this podcast, focusing on the biggest news of the weeK: The Cloudborne vulnerability in cloud servers... all of them.