Podcasts
Microsoft Lost Its Keys, Voice Cloning Scams, The Biden-Harris Cybersecurity Labeling Program
In this episode, we discuss the recent Microsoft security breach where China-backed hackers gained access to numerous email inboxes, including those of several federal government agencies, using a stolen Microsoft signing key ...
First Ban on Selling Location Data, Prohibiting Password Managers, Real-Time Crime Center Concerns
In this episode we discuss how Massachusetts lawmakers are pushing a groundbreaking bill to ban the buying and selling of location data from mobile devices. This legislation raises vital questions about consumer ...
Meta’s Threads and Your Privacy, Airline Reservation Scams, IDOR Srikes Back
In this episode, we explore the rise of Threads, a new social media app developed by Meta, which has already attracted 10 million users in just seven hours. However, there’s a catch ...
Reducing Risk and Building Trust with Data Privacy
TechSpective Podcast Episode 113 Do you have a right to privacy? Should you–as a consumer or individual–have control over your personal data, which companies are allowed to collect or access it, ...
MOVEit Cyberattack, The Problem with Password Rotations, Military Alert on Free Smartwatches
Several major organizations, including British Airways and the BBC, fell victim to the recent MOVEit cyberattack. We discuss the alarming trend of hackers targeting trusted suppliers to gain access to customer data, ...
FIRESIDE CHAT: Outrageous phone bills stun businesses targeted for ‘SMS toll fraud’
SMS toll fraud is spiking. I learned all about the nuances of deploying – and defending – these insidious attacks in a recent visit with Arkose Labs CEO, Kevin Gosschalk, who explained ...
Security Podcasting, Hacking Stories, and The State of Firmware Security with Paul Asadoorian
Paul Asadoorian, OG security podcaster and host of the popular Paul’s Security Weekly podcast, joins us in this episode to talk about his career as one of the original security podcasters. Paul’s ...
Granting the Right Access at the Right Time to Get the Job Done Securely
TechSpective Podcast Episode 111 Identity plays a pivotal role for cybersecurity. Threat actors have a variety of tools and methods to crack and compromise credentials, which is why many attacks are–from ...
The FTC’s Complaint Against Ring, Detecting Malware Infected Apps, America’s Most Cybersecure Companies
The FTC charged Ring, the Amazon-owned home security camera company, for compromising customer privacy and having inadequate security measures. Employees accessed private videos, while hackers exploited vulnerabilities and now Ring needs to ...
How to trust open source software: A conversation with OpenSSF’s Naveen Srinivasan
For software engineers to keep up with the pace of software delivery in the world of continuous delivery/continuous integration (CI/CD), they rely on open source codebases to meet deadlines and create a ...