NBTV: Your Money; Your Data; Your Life. Welcome to the worlds of Digital Privacy, Tech, Scientific Innovation, and Cryptocurrency. NBTV is hosted by Naomi Brockwell: tech journalist, producer for 19-times emmy award-winning journalist John Stossel, and host of Coindesk daily show "The Hash".
…
continue reading
Beyond Downtime: The Verito Advantage is the podcast for tax and accounting professionals who refuse to let IT issues interrupt their business. Hosted by the experts behind Verito.com, each episode explores the real risks behind "good enough" technology and how to build a firm that just works. Securely. Join us as we dive into real-world stories, compliance must-knows (like the FTC Safeguards Rule, IRS Pub 4557, WISP), and emerging tech shaping the future of financial practices. From ransomw ...
…
continue reading
CDW Canada Tech Talks: Discussing the Latest Technology Innovations Experts from CDW and our partners tackle hot topics including generative AI, FinOps, the new cybersecurity landscape and more.
…
continue reading
https://youtu.be/1g0RzOGxe40 Step-by-Step Privacy Hardening: Apple is better than Microsoft and Google when it comes to privacy—but they still collect way too much of your data. If you want the strongest digital privacy, Linux is the gold standard. But if you're not ready to make the switch just yet, you can still dramatically improve your Mac’s pr…
…
continue reading

1
Thomson Reuters Synergy 2024 - Jatin Narang | Verito Technologies | Beyond Downtime
13:21
13:21
Play later
Play later
Lists
Like
Liked
13:21In our debut episode of Beyond Downtime: The Verito Advantage, we take you back to Thomson Reuters SYNERGY 2024, where industry leaders gathered to discuss the future of tax and accounting technology. Recorded live at last year’s event, this conversation is packed with more relevant insights than ever, from preparing your firm for the FTC Safeguard…
…
continue reading
https://youtu.be/11P6DdI8HOo https://odysee.com/@NaomiBrockwell:4/Extensions:6 You installed them to make life easier. But some browser extensions are doing a lot more than blocking ads or autofilling passwords. They’re reading every keystroke. Tracking every site. Harvesting your data—and in some cases, handing it over to foreign governments or dr…
…
continue reading
https://youtu.be/tzTtF3vOiq0 https://odysee.com/@NaomiBrockwell:4/dont-migrate-from-backup:f Every time we upgrade our devices, we face a choice: migrate everything from the old one or start fresh. While transferring data may seem convenient, it also means hauling along unnecessary ‘digital exhaust’—outdated apps, clutter, and potential privacy ris…
…
continue reading
https://youtu.be/Zo9qHqTDcgM https://odysee.com/@NaomiBrockwell:4/Graphene-Install:e Your phone is a tracking device. But it doesn’t have to be. One of the best ways to reclaim your privacy is to ditch iOS and stock Android and install GrapheneOS instead. This guide is a step-by-step tutorial on converting a Pixel phone to GrapheneOS, tweaking key …
…
continue reading

1
The UK Govt Just Killed Your iCloud Privacy – Here's What to Do
12:20
12:20
Play later
Play later
Lists
Like
Liked
12:20https://youtu.be/AuqOzn9GWTU https://odysee.com/@NaomiBrockwell:4/UK-Vs-Apple:a In an unprecedented attack on global privacy, the UK government secretly ordered Apple to create a backdoor into its Advanced Data Protection (ADP)—the encryption tool designed to protect your most sensitive iCloud data. Instead of quietly complying, Apple publicly disa…
…
continue reading
https://youtu.be/NXuRlvJI2N8 https://odysee.com/@NaomiBrockwell:4/signal-usernames:7 Did you know you can use Signal without sharing your phone number with other users? Signal introduced usernames last year, but many people still don’t realize how they work—some mistake them for their profile name, and figuring out how to share or search for userna…
…
continue reading
https://youtu.be/rKnoP30Q6Ig https://odysee.com/@NaomiBrockwell:4/Car-hacking:d Security researcher Sam Curry reveals shocking flaws in internet-connected vehicles, exposing how they can be hacked and why your car may not be as private as you think. 00:00 Car Hacking Doesn’t Seem Real 01:13 How Sam Got Into Car Hacking 04:55 Why Connected Cars Are …
…
continue reading
In this episode, Martin Bazinet and Joseph Reele join KJ to discuss why data centres both private and public are growing at such a rapid rate. As we see the surge of demand how do large organizations keep pace with power and cooling demands and how can we translate that into guidance for our private data centres and our edge deployments? At scale h…
…
continue reading
https://youtu.be/UgXjxQsyk4w https://odysee.com/@NaomiBrockwell:4/privacy-101:3 In today’s hyper-connected world, our personal information is being collected, shared, and sold—often without our knowledge or consent. But here’s the good news: you can fight back. More people than ever are waking up to the importance of digital privacy and taking acti…
…
continue reading
https://youtu.be/E9iPKu1v7os https://odysee.com/@NaomiBrockwell:4/year-in-censorship:f On Dec 31st, 2024 I was invited on to Al Jazeera to discuss internet censorship, the new Australian ban on children under 16 from accessing social media, and whether banning TikTok will help prevent the spreading of misinformation. 00:00 Everyone Is Trying to Hij…
…
continue reading

1
How Women Are Reshaping the Tech Landscape
1:10:51
1:10:51
Play later
Play later
Lists
Like
Liked
1:10:51In this episode, we dive into the transformative impact of women in tech — breaking barriers, driving innovation and reshaping the tech landscape. Our host, KJ Burke, sits down with Sandi Jones, IT Operations Leader, Interac Corp., who has had a long, successful tech industry career spanning multiple organizations. Together, they explore the challe…
…
continue reading
https://youtu.be/MtHKGaDA30g https://odysee.com/@NaomiBrockwell:4/Techno-optimism:b It’s easy to feel pessimistic, even hopeless, about the future of privacy in a world so deeply intertwined with technology. This is because we’ve been tricked into thinking that powerful technology can only be wielded by powerful entities who want to spy on us. But …
…
continue reading

1
“I Have Nothing to Hide” – The Dangerous Myth About Privacy
18:25
18:25
Play later
Play later
Lists
Like
Liked
18:25https://youtu.be/Hcqh0ZSza50 https://odysee.com/@NaomiBrockwell:4/nothing-to-Hide-v7-ODYSEE-20241213-001:a “I have nothing to hide”. It’s become a default response from many to overreaching surveillance. When did privacy start being about having something to hide? It used to simply be about having the right to decide for ourselves who gets access t…
…
continue reading

1
How to Empower Your Organization with AI Tools
1:04:46
1:04:46
Play later
Play later
Lists
Like
Liked
1:04:46In this episode, host KJ Burke is joined by Kelly LaForest, Consultant, Microsoft Cloud, Professional Services and Brian Matthews, Head of Services Strategy & Development, Digital Workspace, CDW Canada, to discuss AI tools that empower our individual coworkers. As we see more AI capabilities being baked in to applications and as more organizations …
…
continue reading
https://youtu.be/PPnFJ8PeSsY https://odysee.com/@NaomiBrockwell:4/faraday-bags:0 Our phones and laptops are like personal tracking devices, constantly emitting signals that map our every move. But what if you could take back control of your privacy without ditching your tech? Enter Faraday bags—a simple yet powerful tool to block unwanted tracking.…
…
continue reading
https://youtu.be/vUQLkHK7eNI https://odysee.com/@NaomiBrockwell:4/Byron-Tau:1 Your favorite apps might be secretly selling your location and personal data. Governments and shady corporations are buying data from brokers to track your every move—no warrants required. In this interview, I sit down with Byron Tau, author of Means of Control, to uncove…
…
continue reading

1
How to Get the Most out of the Technology You Purchase
57:32
57:32
Play later
Play later
Lists
Like
Liked
57:32In this episode, host KJ Burke is joined by Adam Diallo, Senior Manager Customer Success, CDW Canada and Amanda Frank, Senior Manager Customer Success, CDW Canada to discuss how services organizations and technology providers continue to change the way they help customers, ensuring they have success throughout the full lifecycle of technology.To le…
…
continue reading
https://youtu.be/CVeZfM0pVyU https://odysee.com/@NaomiBrockwell:4/Local-LLM:d AI chatbots are taking over the world. But if you want to guarantee your privacy when using them, running an LLM locally is going to be your best bet. In this video I collaborate with The Hated One to show you how, and to explain some AI terminology so that you understand…
…
continue reading

1
The Internet Has Changed. Privacy Was Left Behind.
42:11
42:11
Play later
Play later
Lists
Like
Liked
42:11https://youtu.be/sb6u-TpV-JA https://odysee.com/@NaomiBrockwell:4/BRENDAN-EICH:9 As we rushed into the Web 2 era, privacy was left behind. There was a naive view that users could consent to something that was impossible to understand. The result was tracking and monitoring of every activity. I chatted to Brendan Eich, the creator of JavaScript, Co-…
…
continue reading

1
Criminalizing Privacy (Al Jazeera Interview)
7:21
7:21
Play later
Play later
Lists
Like
Liked
7:21https://youtu.be/wcKtnnzsQGk https://odysee.com/@NaomiBrockwell:4/content-moderation:9 In this interview from Al Jazeera on October 16th, 2024; I discuss the current state of global privacy legislation, ways that we can encourage free speech without censorship, and strategies for the future of privacy around the world. 00:00 We Are Getting to a Rea…
…
continue reading

1
The Spyware Governments Use to Silence Dissent
52:49
52:49
Play later
Play later
Lists
Like
Liked
52:49https://youtu.be/07-IsfTMujo https://odysee.com/@NaomiBrockwell:4/Pegasus:d7 Journalists, activists, and human rights defenders are being targeted and silenced daily by authoritarian governments that fear losing power. One of the deadliest tools used against them is Pegasus—a powerful cyber-surveillance weapon that puts lives at risk. In this inter…
…
continue reading
https://youtu.be/0PbL1GeClQI https://odysee.com/@NaomiBrockwell:4/Surveillance-watch:2 The surveillance industry operates by design in a shrouded, opaque manner. It's intentionally difficult for the public to understand the vast and intricate network of companies, subsidiaries, partnerships, affiliations, and even the financial backers of data brok…
…
continue reading
https://youtu.be/NciVkd6ddPo https://odysee.com/@NaomiBrockwell:4/Zimmermann:f In the early 90s, Phil Zimmermann, the godfather of privacy, released a groundbreaking encryption program called Pretty Good Privacy, or PGP. This software allowed people to protect their email communications with robust encryption. The government then investigated Phil …
…
continue reading
https://youtu.be/rriStH1eTH0 https://odysee.com/@NaomiBrockwell:4/Private-AI:f AI is already deeply integrated into our daily digital activities, whether we realize it or not, but it's a double-edged sword: On the one hand it can skyrocket our productivity and skillset. On the other, there are often serious privacy concerns to using it. Do you want…
…
continue reading
https://youtu.be/T32XfRSaC0w https://odysee.com/@NaomiBrockwell:4/disappearing-messages:5 In today’s digital world, nothing is truly secure. Imagine waking up to find that a hacker had posted every conversation you’ve ever had online. We don't need to keep a permanent trail of all of our digital conversations, that could be hacked at any time, and …
…
continue reading

1
Why End Users Are Cybersecurity's Weakest Link
58:32
58:32
Play later
Play later
Lists
Like
Liked
58:32In this episode, host KJ Burke is joined by guests Daniel Pinsky, CSO & Head of Information Security, CDW Canada and David Shipley, CEO and Cofounder, Beauceron Security Inc. to discuss the need to educate our users on cybersecurity best practices and how we can build a security minded organization. To learn more, visit cdw.ca…
…
continue reading
https://youtu.be/4sfIBRTcRpU https://odysee.com/@NaomiBrockwell:4/HIPAA:7 Most people think that HIPAA means that their medical records are kept private. But what if I told you that HIPAA doesn’t protect your privacy at all? This is our first video in a series about medical privacy, specifically looking at legislation that stripped individuals of t…
…
continue reading

1
Bonus Episode - Charting the Course: Hybrid Multicloud Strategies and AI Adoption in Canada
55:12
55:12
Play later
Play later
Lists
Like
Liked
55:12In this episode, host KJ Burke and guest Jim Love discuss some of the insights coming out of the 2024 Hybrid Cloud Report.To learn more, visit cdw.caBy Jim Love
…
continue reading
https://youtu.be/aXhXkXcMXyM https://odysee.com/@NaomiBrockwell:4/Fish:e28 What do Fish and Privacy have in common? This video will explain. Our expectations of privacy have shifted dramatically in the past few decades. What was once considered outrageous overreach has become normal, and we've lost sight of what a healthy amount of privacy even loo…
…
continue reading

1
The State of HPC and AI in the Canadian Federal Government
1:40:31
1:40:31
Play later
Play later
Lists
Like
Liked
1:40:31What are some of the traditional uses cases for HPC and AI that the Federal Government uses currently? · What are some of the identified use cases that have been difficult to implement? · What challenges have stalled those implementations historically? · How has the current state of HPC and AI changed so that some of those use cases can now be real…
…
continue reading
https://youtu.be/s9Ux8DFgMSM https://odysee.com/@NaomiBrockwell:4/ditch-sms:1 Most of our conversations are digital, and our privacy hinges on our ability to convince others to use a private messaging platform. Getting friends and family to switch isn't easy though! Here are some strategies you can try, ranging from educational methods, to downrigh…
…
continue reading
https://youtu.be/c0ZAPaRddfo https://odysee.com/@NaomiBrockwell:4/Fingerprint-unlock:e Should you use fingerprint unlock on your device? The answer is not going to be the same for everyone. In this video, I look at the benefits and tradeoffs of using fingerprint readers, and try to compare the security of fingerprint unlock vs a pin or password. A …
…
continue reading

1
A Different Take on Data Privacy, AI, and AI management
55:11
55:11
Play later
Play later
Lists
Like
Liked
55:11Up until recently access to AI was really restricted to fewer people. The need for specialized tools, knowledge and technology created hurdles that many organizations were not able to clear. How have you seen access to AI and the perceived value of AI change across different consumers? One of the ways we have been segmenting generative AI with cust…
…
continue reading

1
Secure Your Files with Encrypted Containers!
15:17
15:17
Play later
Play later
Lists
Like
Liked
15:17https://youtu.be/xILGdtI9NPo https://odysee.com/@NaomiBrockwell:4/Veracrypt:9 Our devices contain a treasure trove of private information. We have sensitive work documents, cherished family photos, archives of private communications. You can keep these digital files safe by using encrypted containers, which are secure digital vaults that will help …
…
continue reading
https://youtu.be/FloGxOlMSyI https://odysee.com/@NaomiBrockwell:4/Phone-Contacts:9 The humble Contact List in our phone is a goldmine of data. Each contact is filled with the personal information like names, numbers, email addresses, home addresses, birthdays, work details and social media information. It’s the kind of information that data brokers…
…
continue reading

1
Computing with giants: How supercomputers are different
1:16:35
1:16:35
Play later
Play later
Lists
Like
Liked
1:16:35What has the role of supercomputers been historically? Has the advent of GPU clusters changed the role of HPC? How is the technology changing to meet new needs of researchers and organizations? As we look at supercomputing across different verticals, what parts of the technology and software stack stay similar and where does that stack depart from …
…
continue reading
https://youtu.be/pA0zYTmi5ck https://odysee.com/@NaomiBrockwell:4/car-privacy-part-3:1 We now know that the data collection in modern cars is out of control -- The question is, how does that data even leave your car? And what, if anything, can you do to stop it? That's what we cover in this video, Part 3 of our car privacy series: SIM cards, WiFi, …
…
continue reading
https://youtu.be/x6jxxcv-d4Q https://open.lbry.com/@NaomiBrockwell:4/privacy-screen:c A privacy screen is an ESSENTIAL privacy tool for every tool box. In this video I explain what a privacy screen is, how the technology works, how to apply one to your devices, and go over important tips -- especially if you have a fingerprint reader on your phone …
…
continue reading

1
How to Augment Your IT Team with Managed Services
45:58
45:58
Play later
Play later
Lists
Like
Liked
45:58Why do organizations use staff augmentation and managed services? How do you differentiate and decide between filling roles that are internal, external consulting or managed services? What are some of the considerations that management focuses on when they build a plan to leverage managed services? What makes a good managed services partner? What a…
…
continue reading

1
Stop Your Apps Secretly Talking To Each Other!
15:23
15:23
Play later
Play later
Lists
Like
Liked
15:23Did you know that apps on your phone can see which other apps you have installed? And that apps can talk to each other and share information, without you realizing? In this video we show you how to stop apps communicating with each other, and look at the scoped storage and sandboxing of apps in GrapheneOS, and what it does and doesn't protect again…
…
continue reading
https://youtu.be/Ff9pmaSdZV8 https://odysee.com/@NaomiBrockwell:4/selling-your-car:6 Cars are no longer dumb machines -- They're smart devices with hundreds of computers bolted on top that collect information about our activities. Some car companies have even explicitly said in their privacy policies that they collect information about your sexual …
…
continue reading
In this episode, we discuss smart retail innovations and how they lead to a better and more cost-effective environment for retail storefrontsTo learn more, visit cdw.caBy CDW Canada
…
continue reading
https://youtu.be/-1khYr697jM https://open.lbry.com/@NaomiBrockwell:4/Adv-Data-Protection:e Thanks to powerful marketing, privacy is something we’ve come to immediately associate with Apple. But your iCloud is probably NOT as private as you think. Last year, Apple added E2EE for iCloud backups, with a tool called "Advanced Data Protection”. This set…
…
continue reading
https://youtu.be/VaUsJvUMUgE https://open.lbry.com/@NaomiBrockwell:4/OSINT-photos:8 Every picture and video you post spills secrets about you, maybe even revealing where you live. The process of connecting all these dots of our online activities is a practice known as Open Source Intelligence, or OSINT. It's the practice of using all the informatio…
…
continue reading
https://youtu.be/C0CyuDEuLsE https://open.lbry.com/@NaomiBrockwell:4/Financial-surveillance:e Financial privacy has practically vanished over the last 50 years. Most people are in denial about it, and still believe that their relationship with their bank or their credit union is confidential -- the reality couldn’t be further from that. In this vid…
…
continue reading
In this episode, we discuss technology innovations impacting the way patients are cared for, where they are cared for, and how effective that care ultimately is. The current state of healthcare. Where are we at and what is currently in flight as far as technology innovation that we are seeing? How is innovation in technology changing the way patien…
…
continue reading
https://youtu.be/0RhCrb8OCjw https://open.lbry.com/@NaomiBrockwell:4/Impact-of-surveillance:b The current state of privacy is bad. Surveillance today is pervasive, and the effects of this surveillance on the fabric of society is profound. We need to make sure we’re fully aware of the consequences of creating a world without privacy. If we want to r…
…
continue reading

1
Stop Your Programs Reporting Your Activity with Little Snitch
13:35
13:35
Play later
Play later
Lists
Like
Liked
13:35https://youtu.be/_0EiqiPuR4Q https://open.lbry.com/@NaomiBrockwell:4/Little-Snitch:7 Our computers constantly talk to servers across the internet without us realizing, sharing information about our activities. Most of us don't even realize how many programs are silently connecting to the internet and sharing data. It usually happens without our exp…
…
continue reading
In this episode, we discuss... The hardware ecosystem from device to data centre and platform NPUs and endpoints Cloud platforms for AI Access to tools Future of AI – Multimodal – Multisensory - sora To learn more, visit cdw.caBy CDW Canada
…
continue reading