Synopsis
Daily-ish (M--F) musings about security and privacy and how it impacts our communities. What questions should as technologists be asking as we build?Watch the show at https://4mn.ca/mwm-video
Episodes
-
Google+ & Infrastructure Monitoring
11/10/2018 Duration: 05minGoogle recently conducted a complete security & privacy review of various APIs associated with Google+. The result? The service is shutting down and they found a vulnerability. Did they take the proper steps in disclosing the issue?
-
Evidence, Accusations, and Motivation
09/10/2018 Duration: 07minWith the Bloomberg report on hardware hacking looking more in doubt, more and more politics are coming into play. Anytime you evaluate news, it's important to look at things objectively. Here are a few tips around evaluating cybersecurity news.
-
Bloomberg, Supermicro, and Hardware Supply Chain Attacks
05/10/2018 Duration: 06minBloomberg has an absolutely earth shattering report citing a hardware supply chain attack that—they say—impacted several big names. Here's why this type of attack is so difficult to defend against but also near impossible to execute.
-
Following Up On Tough News
04/10/2018 Duration: 05minReflecting back on my keynote at SecTor in Toronto where I delivered some tough new to a roomful of security professionals. Here's what worked and what could've been better!
-
How To Deliver Tough News
03/10/2018 Duration: 04minSometimes you have to deliver really bad news. It's not your fault, but you're the one on the hook. How do you deliver it? How do you deliver it without getting mired into the downside?
-
National Cybersecurity Awareness Month
02/10/2018 Duration: 06minOctober is National Cybersecurity Awareness Month (#NCSAM). Look for tons of great content online as the community comes together—globally, not just nationally—to try and raise awareness of cybersecurity and privacy issues.
-
50 Million Facebook Accounts Hacked?!?
01/10/2018 Duration: 07min50 million Facebook accounts were hacked. Facebook responded quickly to the issue but could've done better communicating throughout. Here's what you need to know about the hack.
-
Facebook, Shadow Profiles, & Data Brokers
28/09/2018 Duration: 06minA recent study proved that Facebook uses more information about you than you realize. Behind the scenes, Facebook compiles "shadow profiles" from various sources in order to better target ads...anyone surprised?
-
End-to-end Encryption & WhatsApp
27/09/2018 Duration: 04minIn the recent dust up with the founders of WhatsApp, you might have heard the term "end-to-end encryption". What is it? What does it means for you? Why was it frustrating efforts to data mine and monetize WhatsApp?
-
Amazon Alexa Everywhere
26/09/2018 Duration: 07minAmazon announced a host of new "Alexa enabled" devices last week. What are the implications for your privacy at home?
-
What Do You Look To Get Out Of Conferences?
21/09/2018 Duration: 05minConferences are usually jam packed with great content. So much so that it can be hard to prepare for them and get the most out of them. What do you look for in a conference? How can I help?
-
Security Is A Quality Issue
18/09/2018 Duration: 05minSecurity is a quality issue. Except we don't treat it that way and that's costing us dearly.
-
The Basic Basics
17/09/2018 Duration: 05minWith the initial set of cybersecurity basics segments done, I'm think it's worth moving to a "basics" basics series. The goal would be to help everyone understand how the internet works, how email is structure, etc. Thoughts?
-
Cybersecurity Basics #12 - Bolt-on vs Built-in
14/09/2018 Duration: 07minBuilt-in security is always best. That's "security by design" but when that fails (due to mistakes, oversight, humans), built-in security steps up...or, um, in.
-
Cybersecurity Basics #11a - Risk Assessments Redux
13/09/2018 Duration: 07minIn your personal life you're assessing risk constantly whether you know it or not. In the digital world the same thing happens BUT you probably don't have the required context to make an informed decision.
-
Cybersecurity Basics #11 - Risk Assessments & Pen Tests
12/09/2018 Duration: 07minRisk assessments are useful when kept in context and continually updated. A penetration test (or pen test) is when your system undergoes a "friendly" attack with the idea of find issues before cybercriminals do. Together they are a strong set of practices to help you defences.
-
Cybersecurity Basics #10 - Personally Identifiable Information
07/09/2018 Duration: 06minPersonally identifiable information (PII) and Personal Health Information (PHI) are critical concepts. They help identify information that needs additional safeguards and care.
-
Cybersecurity Basics #9 - Attack Attribution
06/09/2018 Duration: 05minWho did it? It's a powerful question and the answer to "What is attack attribution?"
-
Cybersecurity Basics #8 - Authentication, Authorization, & Need To Know
05/09/2018 Duration: 07minAuthentication and authorization are two critical concepts that are intertwined. Understanding the difference and their purpose is key to understanding cybersecurity.
-
Cybersecurity Basics #7 - Hackers & Cybercriminals
04/09/2018 Duration: 05minHackers and cybercriminals are all "malicious actors". While you may not know who is attacking a system, having a better understanding of common motivations is important.