This episode’s guest is Bay Area based security researcher MG. He joins the podcast to share his work experimenting with various HID (Human Interface Devices) attacks using USB drives and cables. MG has also made news recently for disclosing a vulnerability in the Amazon Key smart lock technology and shares his experience developing the proof of concept and eventually sharing it with Amazon’s security team.
This episode is an interview with intelligence analyst Judy Towers and Michael Goedekr, CEO of hackdefnet, conducted over the summer at DEFCON 25 in Las Vegas (2017). Judy and Michael share their thoughts on threat intelligence, risk analysis, dealing with C suite executives and more.
This episode my guest is Laurie Segall senior technology correspondent for CNN and editor-at-large for CNN Tech.
Laurie is host of CNN’s first CNNgo original, Mostly Human with Laurie Segall, a 6-part investigative docuseries, exploring sex, love, death & humanity through the lens of tech.
Mostly Human follows Laurie around the world as she tackles the uncomfortable questions about our increasingly complicated relationship with technology. She examines the power modern technology holds, while exposing the darker side.
The full Mostly Human series streams exclusively on CNNgo.
You can access the series for free through CNNgo on Apple TV, Roku, Amazon FireTV, and Android TV.
It is also available on CNN.com, and CNN’s iOS and Android apps.
Using thousands of texts, tweets and Facebook posts, a woman creates a digital version of her best friend … after he died. Artificial intelligence and years of social media data allowed her to create a bot that responds like her best friend, jokes like him, and blurs the lines between man and machine. This is death in the digital age.
An investigation into the first person deemed dangerous enough to kill… because of his ability to tweet. We explore the life and death of Junaid Hussain, the ISIS hacker who ushered in a new era of terror, mainly due to his social media celebrity. We infiltrate hacker circles in Vegas, explore undercover operations, and have a dangerous run-in outside his hometown, to understand how he went from computer nerd to third most dangerous member of ISIS.
Westworld, or real world? From people falling in love with robots to sex dolls who now have, “AI brains,” our relationship with tech is getting…complicated. We explore a sexual assault in the virtual world and Minority Report technology being used in a high security psychiatric ward. It’s too controversial for the US and will blow your mind.
Dig into the myth of Silicon Valley – where heroes are hailed and success celebrated. Silicon Valley has a secret they don’t want you to know about. Much of the creative genius, the brainiac success stories are also associated with depression and bi-polar disorder. Is there a price to creative genius?
Explore the human impact of a hack that exposed 36 million potential cheaters. Behind the hack, there were suicides, broken families. We introduce you to the human impact of Ashley Madison and take our viewers inside the War Room of Ashley Madison where there were millions of dollars on the table, death threats, and a ticking time bomb that would explode with society’s secrets. We’ll also look at the company’s secret: their ability to program algorithms that would make you more likely to click-for-affair.
A look at why the most powerful people in tech are stepping away from the products they’ve built. In a place where algorithms play god, we explore the soul searching Silicon Valley is doing. The biggest CEO’s are raising the alarm bells and wondering – have we entered the singularity? Who’s in control… man or machine?
Another year, another wave of security incidents and threat models to keep the cybersecurity industry busy. So there was plenty to discuss and share as the InfoSec community flocked to San Francisco for the annual RSA Conference last month.
A view from the escalator as I descend into the bowels of RSAC 2017.
As always, the latest trends in the industry were addressed. Large data breaches, quickly growing threat models, security education, political hacking, and the risks posed by the Internet of Things were common threads throughout many of the keynotes, sessions, workshops, expos, and general chatter among attendees.
RSAC has more of a trade show feel compared to other security conferences so I’ve learned over the years that it’s best to approach the conference as an opportunity to meet and network with industry experts. This year I spent less time attending the talks and more time meeting with the players in the industry who are there to make deals and form partnerships.
Throughout the week I was lucky to catch up with several industry professionals representing some of the top tier firms in the cybersecurity sector who shared their take on the challenges and trends facing cybersecurity firms, their clients, and end users.
This episode of the podcast features interviews collected at RSAC 2017.
Next Wed at 10 am PDT/ 1pm EDT (March 22, 2017) I will be moderating a BrightTALK webinar on the recent “Vault 7” CIA document leaks titled WikiLeaks Vault 7: Facts, Fiction & Implications with distinguished panelists Jake Kouns, (Risk Based Security), Kenesa Ahmad (WISP) and more to be announced.
This episode is on Dataminr, a New York-based startup, which is authorized to analyze the entire Twitter “Firehose” of all live tweets and offer clients advanced social media analytics as a service in the form of digests and news updates.
Exclusive access to information and data feeds, which include Twitter’s raw live tweets, allows Dataminr to filter the data to identify important events and business trends as they unfold and also act as an early warning system for major events like terrorist attacks, natural disasters and other public emergencies.
Dataminr is Twitter’s only data partner that is also allowed to resell the complete stream of tweets and their clients include large hedge funds, mainstream news outlets, public relations firms, publicly traded corporations and major government entities including, law enforcement and intelligence agencies.
The DHS, FBI, and CIA have used the service to help with tracking criminals and terrorists, but have also drawn the ire of the ACLU, who have challenged the use of Dataminr’s services by government agencies to monitor domestic protests.