Artwork

محتوای ارائه شده توسط Elizabeth Lash and Liz Lash. تمام محتوای پادکست شامل قسمت‌ها، گرافیک‌ها و توضیحات پادکست مستقیماً توسط Elizabeth Lash and Liz Lash یا شریک پلتفرم پادکست آن‌ها آپلود و ارائه می‌شوند. اگر فکر می‌کنید شخصی بدون اجازه شما از اثر دارای حق نسخه‌برداری شما استفاده می‌کند، می‌توانید روندی که در اینجا شرح داده شده است را دنبال کنید.https://fa.player.fm/legal
Player FM - برنامه پادکست
با برنامه Player FM !

Death Metal and Dr. Seuss: A Discussion with Jason Wool, Privacy and Cybersecurity Expert

39:45
 
اشتراک گذاری
 

Manage episode 222547209 series 2300193
محتوای ارائه شده توسط Elizabeth Lash and Liz Lash. تمام محتوای پادکست شامل قسمت‌ها، گرافیک‌ها و توضیحات پادکست مستقیماً توسط Elizabeth Lash and Liz Lash یا شریک پلتفرم پادکست آن‌ها آپلود و ارائه می‌شوند. اگر فکر می‌کنید شخصی بدون اجازه شما از اثر دارای حق نسخه‌برداری شما استفاده می‌کند، می‌توانید روندی که در اینجا شرح داده شده است را دنبال کنید.https://fa.player.fm/legal

I had the great pleasure of speaking with Jason Wool, an erudite and witty cybersecurity and privacy lawyer at ZwillGen, a boutique Internet and technology law firm. In this episode, we talk about Jason’s 2018 article on cryptographic hashing, what the heck that is, and how it relates to data breach notification laws. We also chat about his propensity for Disney songs and death metal, and the twist of fate that took Jason from his role in reviewing rate regulation as a “NERC-FERC lawyer” (oh-so-Seussian!) to a cybersecurity and privacy advisor.

And, as always, what we talk about when we talk about lawyers: Jason and I chat about his favorite bar in Adams Morgan, DC (sadly, now closed) and his propensity for putting Steely Dan on the jukebox....

You can find Jason’s article, “Does the Cryptographic Hashing of Passwords Qualify for Statutory Breach Notification Safe Harbor?” published by the Journal of Cyber Law and Warfare, here, and his bio and additional (32 or so!) publications here, and here. (Although he does claim to sing a cappella, I can’t guarantee you can find a recording of him anywhere!)

To read up on some of the other sources Jason references as reading material, you can read up on Steven Levy’s history of cryptography, here, and the article by his friend Andy Greenberg, about scary jeep hacking, here.

  continue reading

12 قسمت

Artwork
iconاشتراک گذاری
 
Manage episode 222547209 series 2300193
محتوای ارائه شده توسط Elizabeth Lash and Liz Lash. تمام محتوای پادکست شامل قسمت‌ها، گرافیک‌ها و توضیحات پادکست مستقیماً توسط Elizabeth Lash and Liz Lash یا شریک پلتفرم پادکست آن‌ها آپلود و ارائه می‌شوند. اگر فکر می‌کنید شخصی بدون اجازه شما از اثر دارای حق نسخه‌برداری شما استفاده می‌کند، می‌توانید روندی که در اینجا شرح داده شده است را دنبال کنید.https://fa.player.fm/legal

I had the great pleasure of speaking with Jason Wool, an erudite and witty cybersecurity and privacy lawyer at ZwillGen, a boutique Internet and technology law firm. In this episode, we talk about Jason’s 2018 article on cryptographic hashing, what the heck that is, and how it relates to data breach notification laws. We also chat about his propensity for Disney songs and death metal, and the twist of fate that took Jason from his role in reviewing rate regulation as a “NERC-FERC lawyer” (oh-so-Seussian!) to a cybersecurity and privacy advisor.

And, as always, what we talk about when we talk about lawyers: Jason and I chat about his favorite bar in Adams Morgan, DC (sadly, now closed) and his propensity for putting Steely Dan on the jukebox....

You can find Jason’s article, “Does the Cryptographic Hashing of Passwords Qualify for Statutory Breach Notification Safe Harbor?” published by the Journal of Cyber Law and Warfare, here, and his bio and additional (32 or so!) publications here, and here. (Although he does claim to sing a cappella, I can’t guarantee you can find a recording of him anywhere!)

To read up on some of the other sources Jason references as reading material, you can read up on Steven Levy’s history of cryptography, here, and the article by his friend Andy Greenberg, about scary jeep hacking, here.

  continue reading

12 قسمت

همه قسمت ها

×
 
Loading …

به Player FM خوش آمدید!

Player FM در سراسر وب را برای یافتن پادکست های با کیفیت اسکن می کند تا همین الان لذت ببرید. این بهترین برنامه ی پادکست است که در اندروید، آیفون و وب کار می کند. ثبت نام کنید تا اشتراک های شما در بین دستگاه های مختلف همگام سازی شود.

 

راهنمای مرجع سریع