InSecurity

InSecurity

InSecurity with Matt Stephenson... Show More

Episodes

Wah Lum Kung Fu: Hacking Cosplay at San Diego Comicon Every once in awhile the InSecurity Podcast takes a walk with the word “hack” to other parts of existence.   Yeah yeah… hard to believe that there are actual things out there besides cybersecurity…   In this special episode,  Matt Stephenson will be talking with some folks who are hacking what could already be considered a hack. If we know our audience, it is a fair bet to say ... Read more

Share
Mark as Played
July 15, 2019 60 min

Chuck Brooks: Examining the Future I'm the operator With my pocket calculator I am adding And subtracting I'm controlling And composing By pressing down a special key It plays… Kraftwerk: Pocket Calculator, 1981 Computer World How about this for a picture of the present with a look to the future… What if I told you that chatbots will power 85 percent of customer service by 2020… McKinsey Global Institute did a study that found 2... Read more

Share
Mark as Played

Cheryl Biswas: Diversifying Cybersecuity     You better watch out Oh, what you wish for It better be worth it So much to die for Hey, so glad you could make it Yeah, now you've really made it Hey, there's only us left now  --Hole – 1997, Celebrity Skin What if I told that… compared to men, higher percentages of women cybersecurity professionals are reaching some of the most sought after positions in security. Among the security wo... Read more

Share
Mark as Played

Jeff Tang: Demystifying “Fileless” Malware       The only difference between a hacker and a remote systems administrator is who is employing them  -- Unknown   Want to hear some numbers that might scare you? Or… they might confirm what you already know. Or… they might just be numbers.   63% of IT security professionals say the frequency of attacks has gone up over the past 12 months, according to Ponemon's 2018 State of Endpoint Se... Read more

Share
Mark as Played

Brian Fanzo - How Artificial Intelligence is Transforming the World Siri… begin podcast Alexa… where my Amazonians at? Cortana? You still around? Tay… why do you hate people? Friday? Jarvis? Ultron? SKYNET?!?!?!   “AI will accelerate the end of ownership.” Today, we don’t own movies or music anymore—we subscribe to Netflix or Spotify. Tomorrow, we won’t own products anymore—we’ll subscribe to them. Tien Tzuo, CEO & Founder, Zuora ... Read more

Share
Mark as Played
June 17, 2019 60 min

Joseph Menn: Cult of the Dead Cow: How the Original Hacking Supergroup Might Just Save the World Cult of the Dead Cow Mudge DilDog Sir Dystic Oxblood Ruffin Lord Digital Mixter Psychedelic Warlord You might not know who they are but they changed your life more than Lewis Rainieri, the I-pod and YouTube put together. Have you ever seen Hackers? The Net? Antitrust? Sneakers? If you’re a subscriber to the InSecurity podcast… odds are ... Read more

Share
Mark as Played

BlueKeep: It’s Not Just About The Worm In the last week, you have likely heard and read stories about the security vulnerability BlueKeep. It has been said to be capable of being exploited for the initiation of self-replicating worm as destructive as WannaCry. As of June 1, over 1M computers may be at risk. But is the danger really about The Worm? Or is it more about millions of endpoints providing direct ingress into networks wo... Read more

Share
Mark as Played

Theresa Payton: Inside the War to Hijack Elections The velocity of social sharing, the power of recommendation algorithms, the scale of social networks, and the accessibility of media manipulation technology has created an environment where pseudo-events, half-truths, and outright fabrications thrive. Edward Murrow has been usurped by Alex Jones. But we’ve known this for a while… Renee DiResta; The Return of Fake News—and Lessons... Read more

Share
Mark as Played

Jay Prassl: Patch Your $#!% Are ALL of Your Apps and OSes up to date? Are you sure? How can you tell? An American Dental Association study in 2008 found that if you don’t brush your teeth you COULD DIE. The ADA recommends brushing your teeth twice a day for 4 minutes each time. What the hell does that have to do with anything? Stick around… According to Ponemon, nearly half of all companies they surveyed had suffered a breach. 57%... Read more

Share
Mark as Played

Kim Crawley: We Need a Diversity of Brains in this World The National Autism Association states that Autism is a bio-neurological developmental disability that generally appears before the age of 3. Autism impacts the normal development of the brain in the areas of social interaction, communication skills, and cognitive function.  Since autism was first diagnosed in the U.S. the incidence has climbed to a rate of 1 in 59 children... Read more

Share
Mark as Played

Tom Pace: How Much is an Ounce of Prevention Really Worth? According to the Verizon Data Breach Investigations report, 4% of people will click on any given phishing campaign. You have 16 minutes until the first click A savvy user will report the phishing campaign within 28 minutes… In those 12 minutes, someone on the other side of the world could take your entire corporate database hostage. Then offer to sell it back to you for th... Read more

Share
Mark as Played

Richard Stiennon: The IT Security Industry: A Complete History We here at InSecurity have a question… Why Hasn’t Anyone Catalogued the Entirety of the IT Security Industry? Why hasn’t the Cybersecurity industry gotten better at protecting all the things? There are SO many companies offering variations on existing solutions or brand new solutions… but the threats remain and the bad actors continue to be successful. Outside of The I... Read more

Share
Mark as Played

The BlackBerry Cylance 2019 Threat Report   The Cylance 2019 Threat Report represents the company’s piece of the overall cybersecurity puzzle It details the trends observed and the insights gained, and the threats Cylance’s consulting team, research team, and customers encountered over the past year Cylance shares this report in the hope that you will put it to good use in our collective ght against the rising tide of cyber attack... Read more

Share
Mark as Played

Roy Christopher: Dead Precedents… How Hip-Hop Defines the Future   I have absolute control of the record. The thing was, you’re not supposed to touch the middle of the vinyl. DJs are going to hate you. People are going to hate you. You’re going to ruin these records. I decided… that this… was the only way to do this.  -- Grandmaster Flash   Let’s push the talk about hacking shall we? Hacking is about finding the vulnerable spots i... Read more

Share
Mark as Played

Jeremiah Cornelius: Virtualization… the Trend Has Become the Standard Do you belive that my being stronger or faster has anything to do with my muscles in this place? You think that's _air_ you're breathing now? Today’s question: What Happens when you Assume Virtual Security? Virtual Machines were originally created to solve the problems of managing PC systems with mostly Windows operating systems, as a replacement for more resili... Read more

Share
Mark as Played

Rob Capps: 22 Years in the Trenches of Tech Jounalism   If I'd written all the truth I knew for the past ten years, about 600 people - including me - would be rotting in prison cells from Rio to Seattle today. Absolute truth is a very rare and dangerous commodity in the context of professional journalism.  -- Hunter S Thompson Today’s question: Can we assess the future of tech by examining it’s past? To do that, it would be worth... Read more

Share
Mark as Played

My Awesome InSecurity Podcast Mixtape: RSA Edition! RSA 2019 was another grand and glorious mess! 50,000+ attendees, vendors, journalists and who knows who else stormed San Francisco for seven days to look, listen, learn and who knows what else. We had time to sit down with a wide swath of people. We found CEOs, Engineers, Global Ambassadors and even a CIO of the White House! How bout that? Kick back and the perspectives this grou... Read more

Share
Mark as Played

Charles Eagan and Eric Cornelius: BlackBerry and Cylance Just Makes Sense Is a Terminator T-800 an endpoint? Is Voltron an endpoint? Could we have prevented a lot of damage to the Earth if Tony Stark had just installed a BlackBerry Cylance endpoint protection solution on the Iron Legion? In this week’s episode of InSecurity, Matt Stephenson chats with BlackBerry CTO Charles Eagan and BlackBerry Cylance CPO Eric Cornelius... two peo... Read more

Share
Mark as Played
February 25, 2019 45 min

Rick Holland: Analysts Make the Best CISOs In this week’s episode of InSecurity, Matt Stephenson has a chat with Rick Holland, CISO at Digital Shadows. Rick took a unique path to the CISO role, following a distinguished career as an analyst at Forrester. They touch on a myriad of subjects including Rick’s Security and Risk Playbook for CISOs Rick Holland is hard to miss online. You can hear him regularly on the Award Winning podcas... Read more

Share
Mark as Played

Greg Silberman: Keep Ya Nose Out My Business   Are the neighbors watching? Is the mail man watching me And I don't feel safe anymore Oh what a mess! I wonder who's watching me now Who? The I.R.S.?!?!       -- Rockwell, Somebody’s Watching Me, 1984 Privacy is fundamentally about the ethical and responsible handling of personal data - from initial collection to eventual deletion. It is about understanding the context under which dat... Read more

Share
Mark as Played

Chat About InSecurity

Popular Podcasts

The Ron Burgundy Podcast
The Ron Burgundy Podcast
Will Ferrell reprises his role as Ron Burgundy in his brand new Ron Burgundy Podcast! Each episode has a different theme in which Ron engages in conversation with another notable person on the topic at hand.
Atlanta Monster / Monster: The Zodiac Killer
Atlanta Monster / Monster: The Zodiac Killer
Atlanta Monster / Monster: The Zodiac KillerFrom Tenderfoot TV and HowStuffWorks, 'Monster: The Zodiac Killer' dives into one of the most notorious, unsolved serial killing sprees in history.
The Joe Rogan Experience
The Joe Rogan Experience
Joe Rogan's Weekly Podcast