Dave talks about Ring Doorbell Cameras and how law enforcement can access the video from each camera in their area.
Dave talking about the trend in online doctor's visits and how soon you'll be able to start having in home appointments!
Dave talking about emergency communications during rescue situations, natural disasters and other issues.
Dave talks about GeoTagging photos on a mobile device and the potential security threats it could cause. Also, do robots have feelings?
Today we interview William and Steve from Cyber Defense Technologies, a government and private industry security contractor. We'll talk about secure design, defense in depth and much more!
Dave The IT Guy discussing wearable tech leaking private data.
My review of the week at hacker summer camp of 2019!
BlackHat 2019 Interview with MalwareBytes Lab Director Adam Kujawa. We spoke about how MalwareBytes protects, researches and mitigates threats that we all face.
Interview during BlackHat 2019 with BugCrowd CSO David Baker. We discussed bounty hunting, emerging threats and more!
Gabrielle Hempel Interview from BlackHat 2019 - Discussing women in the Cybersecurity field
Dave The IT Guy appearing on the Tampa Morning Show talking about medical device hacking
Dave The IT Guy talking about smart home devices and the security problems they pose in your home. Is everything being said in your home being recorded and uploaded somewhere else? Yes, it is.
Dave The IT Guy (me!) talks about using electronics on public WiFi and how to protect yourself.
Dave (me the host of BYOS Radio) being interviewed on Tampa, Florida WFLA's morning show. I will be an ongoing guest at 8:20AM EST every Monday. They are part of the iHeartRadio family of stations and can be heard over the air and on the iHeartRadio app.
We're talking about how hyperconverged infrastructure can make a big difference in even small and medium sized businesses.
We're going to talk about SIEM, monitoring, why do it, what to do, and some of the tools to do it with.
Introduction to blockchain and how it can be used across multiple industries.
We're going to help prepare you for the upcoming season of conferences at RSA, Blackhat, Defcon, BSides and many others.
HaveIBeenPwned.com founder and security researcher Troy Hunt is my guest for tonight's entire episode!
What are the primary differences between hardware and software encryption capabilities? We're also talking with Zaia from the UK based iStorage company.