Tech Security عمومی
[search 0]
بیشتر
برنامه را دانلود کنید!
show episodes
 
Artwork

1
Cookies: Tech Security & Privacy

Princeton University School of Engineering and Applied Science

icon
Unsubscribe
icon
icon
Unsubscribe
icon
ماهیانه
 
Technology has transformed our lives, but there are hidden tradeoffs we make as we take advantage of these new tools. Cookies, as you know, can be a tasty snack -- but they can also be something that takes your data. This podcast is presented by the Princeton University School of Engineering and Applied Science.
  continue reading
 
Artwork

1
Security Tech Talk

Steve Kenny, Axis Communications

icon
Unsubscribe
icon
icon
Unsubscribe
icon
ماهیانه
 
We talk to security industry leaders, disruptors, and innovators with strong views and opinions on the future of topics like physical security, smart buildings, artificial intelligence, cybersecurity and more. We dig into the latest tech trends, explore how security is shaping the world, and delve into those tricky regulations (like NIS2, the Cyber Resilience Act, the EU Artificial Intelligence Act, the UK's Product Security, Telecommunications, Infrastructure Act and more) that keep everyon ...
  continue reading
 
Loading …
show series
 
Steve invites SecureLogiq’s Ben Yoxall to explore the transformative power of optimized storage solutions in video surveillance and security systems. Ben talks about how these innovations not only drive cost efficiency but also align with sustainability goals, offering a competitive edge in today's eco-conscious market. Delve into the evolving IT i…
  continue reading
 
In this episode seasoned expert in the physical security industry Baldvin Gislason Bern, discusses the critical transformation of cybersecurity regulations and compliance. The conversation delves into Baldwvin's journey from researcher to cybersecurity pioneer, highlighting the industry's pivotal shift towards cybersecurity – starting in 2014. Key …
  continue reading
 
Join us as Florian Matusek, Director of AI Strategy at Genetec, takes us on a journey into the evolving role of artificial intelligence in the security industry. Florian and Steve shed light on how AI has transitioned from its early days to today's sophisticated generative models. Emphasizing AI as a tool to augment human capabilities, rather than …
  continue reading
 
In this episode of "Security Tech Talk," cybersecurity expert Mike Gillespie delves into the intricate relationship between cybersecurity legislation and business practices. With over 35 years of experience, Mike provides a critical analysis of the gap between legislative intentions and their practical implementation in the business world. The epis…
  continue reading
 
Tertius Woldaardt, a leading authority in architecture engineering and business development for Axis Communications, brings his profound insight into the security sector in the Middle East, a landscape ripe with opportunity and fraught with unique challenges. With nearly two decades of rich experience, Tertius helps us navigate through the transfor…
  continue reading
 
In this episode we delve into the transformative journey of Smart Spaces, led by CEO and co-founder Dan Drogman. From its inception as a software consultancy in 2010, to its current status as a trailblazer in the PropTech industry – Smart Spaces has been at the forefront of integrating cutting-edge technologies to enhance modern office environments…
  continue reading
 
Veteran security industry expert Jamie Donald from Axis Communications shares his wisdom on the fast-evolving landscape of security technology. With nearly three decades of industry experience, Jamie takes us through the journey from a fragmented market to a more unified, consolidated one. We delve into the strategic importance of open ecosystems a…
  continue reading
 
What if the cities of tomorrow could offer more than just a promise of technological advancement, but a tangible improvement in the quality of urban life? Steve welcomes Andrea Sorri to share insights on how smart cities are evolving, with lessons drawn from the established frameworks of European metropolises and new opportunities in the Middle Eas…
  continue reading
 
In this episode we are joined by Corin Dennison, an expert with extensive experience in law enforcement and retail security. Together, we delve into the pressing challenges facing the retail industry, including the rise of retail-specific violence and the economic implications of crime. Despite widespread security measures, criminals remain undeter…
  continue reading
 
Welcome to Security Tech Talk, the podcast where we redefine the future of security. Hosted by Steve Kenny, an industry leader from Axis Communications, this show is your gateway to cutting-edge security technology and innovative strategies. Whether you're in physical or cyber security, this podcast is designed to inspire and inform. Join us as we …
  continue reading
 
Does anyone actually read privacy policies? What's in them, and why can't we usually understand them? On our second season finale, we’ll talk with Professor Lorrie Cranor, director of the CyLab Usable Privacy and Security Laboratory at Carnegie-Mellon University. The lab brings together more than 100 faculty from across campus to study security and…
  continue reading
 
Annette Zimmermann makes the provocative argument that there are times it might be better to take cutting-edge artificial intelligence tools and leave them unused. Annette is a political philosopher working on the ethics of artificial intelligence and machine learning. She’s a technology and human rights fellow at the Carr Center for Human Rights P…
  continue reading
 
Kevin Lee recently co-wrote a fascinating study about how easy it is for an attacker to gain control of another person’s cell phone. From there, the attacker can use the phone’s multi-factor authentication tool – usually a security code provided over a text message -- to do all kinds of damage, including making unauthorized purchases. As part of th…
  continue reading
 
Are online learning platforms really secure? Mihir Kshirsagar co-wrote a paper that spells out in startling detail everything you’ve wondered about -- but didn’t want to know -- about how online platforms are allowing students to have their personal data exploited as the students use them for online learning. And he discusses the one mistake instru…
  continue reading
 
How can you can improve your privacy in your everyday use of web browsers, email, text messaging and other apps? Our guest is David Sherry, the chief information security officer here at Princeton. He’s responsible for shoring up security at this Ivy League campus of more than 15,000 people. He has 20 years of experience in information security man…
  continue reading
 
Today’s guests have written a study about the Google Search engine, and the subtle – and not-so-subtle – ways in which it shows its bias, and in many ways perpetuates tired old stereotypes. Orestis Papakyriakopoulos is a postdoctoral research associate at Princeton’s Center for Information Technology Policy. His research showcases political issues …
  continue reading
 
As a chief computer architect at Hewlett-Packard in the 1980s, Ruby Lee was a leader in changing the way computers are built, simplifying their core instructions so they could do more. And she revolutionized the way computers use multimedia. If you’ve watched a video or streamed music on your computer or smart phone, Ruby had a lot to do with makin…
  continue reading
 
To kick off our second season, we’re honored to welcome Barton Gellman, Princeton Class of 1982. Bart has won multiple Pulitzer Prizes, including for his groundbreaking work with The Washington Post in 2013 to reveal widespread surveillance by the National Security Agency. The stories showed that even though they weren’t the targets, law-abiding Am…
  continue reading
 
5 predictions for 2017 - Increased attack vectors through IOT, social media will become a bigger target for cybercrime, finally there will be an increase in digital security awareness and the introduction of war game type scenarios, zero days will become more targeted and harder to disrupt, people will start to countermand conveniance with security…
  continue reading
 
CVST-4/25/10 – Join Cisco Certified expert John Friedrich as he gives out weekly tips involving Cisco Voice and Security related concepts! Visit dynacomp.com for the show notes! This podcast is produced by TechJives.net – Chris Popeتوسط admin
  continue reading
 
Loading …

راهنمای مرجع سریع

در حین کاوش به این نمایش گوش دهید
پخش