Join Glenn Goodman and Roger Smith each episode for an easy going chat about your online and data security and privacy protection. Feel free to ask a question or submit comment or other to [email protected]
…
continue reading
Technology has transformed our lives, but there are hidden tradeoffs we make as we take advantage of these new tools. Cookies, as you know, can be a tasty snack -- but they can also be something that takes your data. This podcast is presented by the Princeton University School of Engineering and Applied Science.
…
continue reading
We talk to security industry leaders, disruptors, and innovators with strong views and opinions on the future of topics like physical security, smart buildings, artificial intelligence, cybersecurity and more. We dig into the latest tech trends, explore how security is shaping the world, and delve into those tricky regulations (like NIS2, the Cyber Resilience Act, the EU Artificial Intelligence Act, the UK's Product Security, Telecommunications, Infrastructure Act and more) that keep everyon ...
…
continue reading
An online network about educating, entertaining and encouraging your dance with Technology!
…
continue reading
An online network about educating, entertaining and encouraging your dance with Technology!
…
continue reading
Steve invites SecureLogiq’s Ben Yoxall to explore the transformative power of optimized storage solutions in video surveillance and security systems. Ben talks about how these innovations not only drive cost efficiency but also align with sustainability goals, offering a competitive edge in today's eco-conscious market. Delve into the evolving IT i…
…
continue reading
In this episode seasoned expert in the physical security industry Baldvin Gislason Bern, discusses the critical transformation of cybersecurity regulations and compliance. The conversation delves into Baldwvin's journey from researcher to cybersecurity pioneer, highlighting the industry's pivotal shift towards cybersecurity – starting in 2014. Key …
…
continue reading
Join us as Florian Matusek, Director of AI Strategy at Genetec, takes us on a journey into the evolving role of artificial intelligence in the security industry. Florian and Steve shed light on how AI has transitioned from its early days to today's sophisticated generative models. Emphasizing AI as a tool to augment human capabilities, rather than …
…
continue reading
In this episode of "Security Tech Talk," cybersecurity expert Mike Gillespie delves into the intricate relationship between cybersecurity legislation and business practices. With over 35 years of experience, Mike provides a critical analysis of the gap between legislative intentions and their practical implementation in the business world. The epis…
…
continue reading
Tertius Woldaardt, a leading authority in architecture engineering and business development for Axis Communications, brings his profound insight into the security sector in the Middle East, a landscape ripe with opportunity and fraught with unique challenges. With nearly two decades of rich experience, Tertius helps us navigate through the transfor…
…
continue reading
In this episode we delve into the transformative journey of Smart Spaces, led by CEO and co-founder Dan Drogman. From its inception as a software consultancy in 2010, to its current status as a trailblazer in the PropTech industry – Smart Spaces has been at the forefront of integrating cutting-edge technologies to enhance modern office environments…
…
continue reading
Veteran security industry expert Jamie Donald from Axis Communications shares his wisdom on the fast-evolving landscape of security technology. With nearly three decades of industry experience, Jamie takes us through the journey from a fragmented market to a more unified, consolidated one. We delve into the strategic importance of open ecosystems a…
…
continue reading
What if the cities of tomorrow could offer more than just a promise of technological advancement, but a tangible improvement in the quality of urban life? Steve welcomes Andrea Sorri to share insights on how smart cities are evolving, with lessons drawn from the established frameworks of European metropolises and new opportunities in the Middle Eas…
…
continue reading
In this episode we are joined by Corin Dennison, an expert with extensive experience in law enforcement and retail security. Together, we delve into the pressing challenges facing the retail industry, including the rise of retail-specific violence and the economic implications of crime. Despite widespread security measures, criminals remain undeter…
…
continue reading
Welcome to Security Tech Talk, the podcast where we redefine the future of security. Hosted by Steve Kenny, an industry leader from Axis Communications, this show is your gateway to cutting-edge security technology and innovative strategies. Whether you're in physical or cyber security, this podcast is designed to inspire and inform. Join us as we …
…
continue reading
Does anyone actually read privacy policies? What's in them, and why can't we usually understand them? On our second season finale, we’ll talk with Professor Lorrie Cranor, director of the CyLab Usable Privacy and Security Laboratory at Carnegie-Mellon University. The lab brings together more than 100 faculty from across campus to study security and…
…
continue reading

1
When It’s Best to Let A.I. Go Unused: Annette Zimmermann, Harvard University and University of York
48:44
Annette Zimmermann makes the provocative argument that there are times it might be better to take cutting-edge artificial intelligence tools and leave them unused. Annette is a political philosopher working on the ethics of artificial intelligence and machine learning. She’s a technology and human rights fellow at the Carr Center for Human Rights P…
…
continue reading
Kevin Lee recently co-wrote a fascinating study about how easy it is for an attacker to gain control of another person’s cell phone. From there, the attacker can use the phone’s multi-factor authentication tool – usually a security code provided over a text message -- to do all kinds of damage, including making unauthorized purchases. As part of th…
…
continue reading
Are online learning platforms really secure? Mihir Kshirsagar co-wrote a paper that spells out in startling detail everything you’ve wondered about -- but didn’t want to know -- about how online platforms are allowing students to have their personal data exploited as the students use them for online learning. And he discusses the one mistake instru…
…
continue reading
How can you can improve your privacy in your everyday use of web browsers, email, text messaging and other apps? Our guest is David Sherry, the chief information security officer here at Princeton. He’s responsible for shoring up security at this Ivy League campus of more than 15,000 people. He has 20 years of experience in information security man…
…
continue reading

1
How Search Engines Show Their Bias: Orestis Papakyriakopoulos, Princeton University, and Arwa Michelle Mboya, MIT
39:16
Today’s guests have written a study about the Google Search engine, and the subtle – and not-so-subtle – ways in which it shows its bias, and in many ways perpetuates tired old stereotypes. Orestis Papakyriakopoulos is a postdoctoral research associate at Princeton’s Center for Information Technology Policy. His research showcases political issues …
…
continue reading
As a chief computer architect at Hewlett-Packard in the 1980s, Ruby Lee was a leader in changing the way computers are built, simplifying their core instructions so they could do more. And she revolutionized the way computers use multimedia. If you’ve watched a video or streamed music on your computer or smart phone, Ruby had a lot to do with makin…
…
continue reading
To kick off our second season, we’re honored to welcome Barton Gellman, Princeton Class of 1982. Bart has won multiple Pulitzer Prizes, including for his groundbreaking work with The Washington Post in 2013 to reveal widespread surveillance by the National Security Agency. The stories showed that even though they weren’t the targets, law-abiding Am…
…
continue reading
Episode 030 - 04/08/2017توسط Aussie Tech Heads
…
continue reading
What social signals are YOU giving the bad guys? Does it Pay to Have Cyber Insurance for Your Organisation?توسط Aussie Tech Heads
…
continue reading
Episode 028 - 08/07/2017توسط Aussie Tech Heads
…
continue reading
Episode 027 - 26/06/2017توسط Aussie Tech Heads
…
continue reading
Artificial Intelligenceتوسط Aussie Tech Heads
…
continue reading
How to prove your Cybersecurity is working CIA hacking tools and Wikileaks Don't get scammed by online stores Dodgey popupsتوسط Aussie Tech Heads
…
continue reading
Episode 024 - 03/03/2017توسط Aussie Tech Heads
…
continue reading
Scamsتوسط Aussie Tech Heads
…
continue reading
Basic settings after bringing home a brand new routerتوسط Aussie Tech Heads
…
continue reading
Fake News Social Engineering Whalingتوسط Aussie Tech Heads
…
continue reading
Episode 020 - 30/12/2016توسط Aussie Tech Heads
…
continue reading
5 predictions for 2017 - Increased attack vectors through IOT, social media will become a bigger target for cybercrime, finally there will be an increase in digital security awareness and the introduction of war game type scenarios, zero days will become more targeted and harder to disrupt, people will start to countermand conveniance with security…
…
continue reading
How to start a career in IT Security with or without a Uni degreeتوسط Aussie Tech Heads
…
continue reading
DDOS Attack on dyn.com What is a DDOS and why did it happen? What are the consequences of the attack? How can this attack happen and how can it be stopped in the future?توسط Aussie Tech Heads
…
continue reading
Ransomwareتوسط Aussie Tech Heads
…
continue reading
The Census failتوسط Aussie Tech Heads
…
continue reading
Episode 014 - 12/05/2016توسط Aussie Tech Heads
…
continue reading
Episode 013 - 03/05/2016توسط Aussie Tech Heads
…
continue reading
Episode 012 - 15/04/2016توسط Aussie Tech Heads
…
continue reading
Penetration Testing - How When Why Whatتوسط Aussie Tech Heads
…
continue reading
Testing Your Defencesتوسط Aussie Tech Heads
…
continue reading
Why are hackers after your mobile device BYOD - Bring Your Own Device Security, the FBI and Appleتوسط Aussie Tech Heads
…
continue reading
how small business can level the playing field against their competition using technology Patch management 3 D Printingتوسط Aussie Tech Heads
…
continue reading
Business Continuityتوسط Aussie Tech Heads
…
continue reading
Basic Web Securityتوسط Aussie Tech Heads
…
continue reading
Episode 004 - 23/11/2015توسط Aussie Tech Heads
…
continue reading
Backup and Restoreتوسط Aussie Tech Heads
…
continue reading
Securing your home and small business. Passwords and very interesting conversation about modems/routers. Remember 'Digital Security is my problem'.توسط Aussie Tech Heads
…
continue reading
Episode 001 - 08/09/2015توسط Aussie Tech Heads
…
continue reading
CVST-4/25/10 – Join Cisco Certified expert John Friedrich as he gives out weekly tips involving Cisco Voice and Security related concepts! Visit dynacomp.com for the show notes! This podcast is produced by TechJives.net – Chris Popeتوسط admin
…
continue reading
“Promo for our new podcast Today in Security! Featuring our very own Tech News guy, Niko Depofi!توسط admin
…
continue reading