Artwork

Player FM - Internet Radio Done Right
Checked 19d ago
Added three years ago
Content provided by Insights Into Things. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Insights Into Things or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://ppacc.player.fm/legal.
Player FM - Podcast App
Go offline with the Player FM app!
icon Daily Deals

Insights Into Technology: Episode 24 "Signed, Sealed, Encrypted...and Still Screwed" (AUDIO)

50:01
 
Share
 

Manage episode 474238638 series 3352756
Content provided by Insights Into Things. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Insights Into Things or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://ppacc.player.fm/legal.

In this episode of Insights into Technology, host Joseph Whalen delves into the challenges facing the tech industry today. We kick things off with a look at how cybercriminals are exploiting Microsoft's trusted signing service to disguise malware as legitimate software, highlighting the cracks in current security measures. Learn why enterprises need to recalibrate their detection algorithms to spot potentially dangerous applications.

Next, we explore the significant implications of 23andMe's bankruptcy. With millions of customers' genetic data at risk, discover what this means for privacy and why consumers should act now to safeguard their information. We discuss the broader issue of genetic data commodification in the corporate world.

Finally, the episode covers the FCC's probe into Chinese tech companies allegedly bypassing US bans, and how this impacts national security. We end with insights into the National Vulnerabilities Database backlog and what enterprises must do to keep up with the ever-evolving cyber threat landscape, illustrating the urgent need for adaptive and proactive security measures.

  continue reading

530 episodes

Artwork
iconShare
 
Manage episode 474238638 series 3352756
Content provided by Insights Into Things. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Insights Into Things or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://ppacc.player.fm/legal.

In this episode of Insights into Technology, host Joseph Whalen delves into the challenges facing the tech industry today. We kick things off with a look at how cybercriminals are exploiting Microsoft's trusted signing service to disguise malware as legitimate software, highlighting the cracks in current security measures. Learn why enterprises need to recalibrate their detection algorithms to spot potentially dangerous applications.

Next, we explore the significant implications of 23andMe's bankruptcy. With millions of customers' genetic data at risk, discover what this means for privacy and why consumers should act now to safeguard their information. We discuss the broader issue of genetic data commodification in the corporate world.

Finally, the episode covers the FCC's probe into Chinese tech companies allegedly bypassing US bans, and how this impacts national security. We end with insights into the National Vulnerabilities Database backlog and what enterprises must do to keep up with the ever-evolving cyber threat landscape, illustrating the urgent need for adaptive and proactive security measures.

  continue reading

530 episodes

All episodes

×
 
Join host Joseph Whalen in Episode 28 of "Insights into Technology," as we explore the latest in cyber threats and innovations. Discover how Windows Defender was tricked by DefendNOT, an ingenious tool using an undocumented API to shut down vital security protections. We'll also dive into the recent Pwn2Own Berlin 2025 competition, where hackers walked away with over a million dollars after uncovering 28 zero-day vulnerabilities. Additionally, learn about the record-setting DDoS attack handled by Google's Project Shield and the evolving threat landscape with IoT devices. The episode also highlights the use of AI in enhancing phishing attempts targeting U.S. government officials and discusses Congress's move to diversify the cybersecurity workforce. Finally, we touch on cutting-edge developments in vulnerability management as we examine the proposed Likely Exploited Vulnerabilities (LEV) metric and its potential to reshape patch prioritization. Tune in for these topics and more on "Insights into Technology." Listen and subscribe for your weekly tech news essentials!…
 
Join host Joseph Whalen in Episode 28 of "Insights into Technology," as we explore the latest in cyber threats and innovations. Discover how Windows Defender was tricked by DefendNOT, an ingenious tool using an undocumented API to shut down vital security protections. We'll also dive into the recent Pwn2Own Berlin 2025 competition, where hackers walked away with over a million dollars after uncovering 28 zero-day vulnerabilities. Additionally, learn about the record-setting DDoS attack handled by Google's Project Shield and the evolving threat landscape with IoT devices. The episode also highlights the use of AI in enhancing phishing attempts targeting U.S. government officials and discusses Congress's move to diversify the cybersecurity workforce. Finally, we touch on cutting-edge developments in vulnerability management as we examine the proposed Likely Exploited Vulnerabilities (LEV) metric and its potential to reshape patch prioritization. Tune in for these topics and more on "Insights into Technology." Listen and subscribe for your weekly tech news essentials!…
 
In this episode of Insights into Technology, we explore the latest cybersecurity threats and solutions shaping the tech world. Discover the implications of a groundbreaking proof of concept that shows how ransomware could potentially hide in your CPU's microcode, evading traditional security measures. We also delve into the UK's initiative for secure software development and discuss the new vulnerabilities uncovered in Intel processors that threaten data privacy. Join us as we address pressing concerns about IoT devices being turned into malicious proxies, and find out how Microsoft is introducing new features to enhance security during Teams meetings. Stay informed and prepare to safeguard your tech environment against emerging cyber threats.…
 
In this episode of Insights into Technology, we explore the latest cybersecurity threats and solutions shaping the tech world. Discover the implications of a groundbreaking proof of concept that shows how ransomware could potentially hide in your CPU's microcode, evading traditional security measures. We also delve into the UK's initiative for secure software development and discuss the new vulnerabilities uncovered in Intel processors that threaten data privacy. Join us as we address pressing concerns about IoT devices being turned into malicious proxies, and find out how Microsoft is introducing new features to enhance security during Teams meetings. Stay informed and prepare to safeguard your tech environment against emerging cyber threats.…
 
Join us on this week's episode of Insights into Technology, where we unravel the chaos caused by the latest Windows security update gone wrong, and explore how Apple's AirPlay is vulnerable to attack, putting millions of devices at risk. Discover how Cloudflare is heroically defending against unprecedented DDoS assaults, and delve into the brewing tension between tech giants OpenAI and Microsoft over AI's future. Plus, learn about Mastercard's AI-powered shopping assistant that's redefining online retail. With the backdrop of these technological upheavals, we'll guide you through the current landscape of innovation and its challenges.…
 
Join us on this week's episode of Insights into Technology, where we unravel the chaos caused by the latest Windows security update gone wrong, and explore how Apple's AirPlay is vulnerable to attack, putting millions of devices at risk. Discover how Cloudflare is heroically defending against unprecedented DDoS assaults, and delve into the brewing tension between tech giants OpenAI and Microsoft over AI's future. Plus, learn about Mastercard's AI-powered shopping assistant that's redefining online retail. With the backdrop of these technological upheavals, we'll guide you through the current landscape of innovation and its challenges.…
 
In this week's episode of Insights into Technology, host Joseph Whalen delves into the latest cybersecurity threats and advancements. The FBI warns against using free online PDF converters due to risks of malware infections and ransomware attacks. Companies are advised to ban unsolicited converters and train employees on handling sensitive documents. We also explore the European Commission's significant $1.3 billion investment in cybersecurity and AI under the Digital Europe Program, aimed at strengthening the EU's digital infrastructure and resilience. In the healthcare sector, the FDA's increasing role in medical device cybersecurity is discussed, highlighting the need for improved security measures as more devices become vulnerable to cyber threats.…
 
In this week's episode of Insights into Technology, host Joseph Whalen delves into the latest cybersecurity threats and advancements. The FBI warns against using free online PDF converters due to risks of malware infections and ransomware attacks. Companies are advised to ban unsolicited converters and train employees on handling sensitive documents. We also explore the European Commission's significant $1.3 billion investment in cybersecurity and AI under the Digital Europe Program, aimed at strengthening the EU's digital infrastructure and resilience. In the healthcare sector, the FDA's increasing role in medical device cybersecurity is discussed, highlighting the need for improved security measures as more devices become vulnerable to cyber threats.…
 
In this episode of Insights into Technology, host Joseph Whalen delves into the challenges facing the tech industry today. We kick things off with a look at how cybercriminals are exploiting Microsoft's trusted signing service to disguise malware as legitimate software, highlighting the cracks in current security measures. Learn why enterprises need to recalibrate their detection algorithms to spot potentially dangerous applications. Next, we explore the significant implications of 23andMe's bankruptcy. With millions of customers' genetic data at risk, discover what this means for privacy and why consumers should act now to safeguard their information. We discuss the broader issue of genetic data commodification in the corporate world. Finally, the episode covers the FCC's probe into Chinese tech companies allegedly bypassing US bans, and how this impacts national security. We end with insights into the National Vulnerabilities Database backlog and what enterprises must do to keep up with the ever-evolving cyber threat landscape, illustrating the urgent need for adaptive and proactive security measures.…
 
In this episode of Insights into Technology, host Joseph Whalen delves into the challenges facing the tech industry today. We kick things off with a look at how cybercriminals are exploiting Microsoft's trusted signing service to disguise malware as legitimate software, highlighting the cracks in current security measures. Learn why enterprises need to recalibrate their detection algorithms to spot potentially dangerous applications. Next, we explore the significant implications of 23andMe's bankruptcy. With millions of customers' genetic data at risk, discover what this means for privacy and why consumers should act now to safeguard their information. We discuss the broader issue of genetic data commodification in the corporate world. Finally, the episode covers the FCC's probe into Chinese tech companies allegedly bypassing US bans, and how this impacts national security. We end with insights into the National Vulnerabilities Database backlog and what enterprises must do to keep up with the ever-evolving cyber threat landscape, illustrating the urgent need for adaptive and proactive security measures.…
 
In this episode, Sam Whalen delves into the troubling news of significant layoffs at Destiny developer Bungie, affecting around 220 employees. He discusses the potential reasons behind these job cuts and their impact on the company and the gaming industry. On a lighter note, Sam explores what's in store for Xbox fans at the upcoming Gamescom 2024, highlighting the exciting line-up of games set to be showcased. Additionally, he shares his thoughts on the Concord open beta, expressing surprise at its engaging gameplay despite initial skepticism. Finally, he dives into the world of The Witcher 3, reviewing the Hearts of Stone expansion and sharing his admiration for the franchise's storytelling excellence.…
 
In this episode, Sam Whalen delves into the troubling news of significant layoffs at Destiny developer Bungie, affecting around 220 employees. He discusses the potential reasons behind these job cuts and their impact on the company and the gaming industry. On a lighter note, Sam explores what's in store for Xbox fans at the upcoming Gamescom 2024, highlighting the exciting line-up of games set to be showcased. Additionally, he shares his thoughts on the Concord open beta, expressing surprise at its engaging gameplay despite initial skepticism. Finally, he dives into the world of The Witcher 3, reviewing the Hearts of Stone expansion and sharing his admiration for the franchise's storytelling excellence.…
 
Join Sam Whalen in the latest episode of No Credits Rolled as he sips his morning coffee and dives into the gaming world’s hottest topics. First up, a detailed commentary on Apex Legends' contentious Battle Pass changes which spurred significant community backlash, forcing Respawn to reconsider their approach. Followed by an enthusiastic preview of Marvel Rivals—an upcoming hero shooter from NetEase Games, where Sam shares his first-hand beta experience. Discover how this game might just challenge established titans with its Marvel magic and gameplay innovations. Whether you’re an Apex veteran or a Marvel enthusiast, this episode has insights for everyone.…
 
Join Sam Whalen in the latest episode of No Credits Rolled as he sips his morning coffee and dives into the gaming world’s hottest topics. First up, a detailed commentary on Apex Legends' contentious Battle Pass changes which spurred significant community backlash, forcing Respawn to reconsider their approach. Followed by an enthusiastic preview of Marvel Rivals—an upcoming hero shooter from NetEase Games, where Sam shares his first-hand beta experience. Discover how this game might just challenge established titans with its Marvel magic and gameplay innovations. Whether you’re an Apex veteran or a Marvel enthusiast, this episode has insights for everyone.…
 
In this episode of Insights into Technology, we delve into the world of AI, exploring its security risks and compliance challenges. Host Joseph Whalen addresses the concerns raised by Meredith Whitaker regarding agentic AI’s need for extensive data access and the associated privacy vulnerabilities. We also discuss X’s massive cyberattack and the implications of Sean Plancky's nomination as the head of CISA, highlighting how these events underscore significant cybersecurity vulnerabilities. The episode further explores the intricacies of human programmers in an AI-driven world, featuring insights from IBM's CEO on AI's role as a collaborative tool rather than a replacement. We round off with a fascinating historical journey of AI, from Alan Turing's groundbreaking ideas to today’s deep learning models, and the impact of AI on enterprises.…
 
Loading …

Welcome to Player FM!

Player FM is scanning the web for high-quality podcasts for you to enjoy right now. It's the best podcast app and works on Android, iPhone, and the web. Signup to sync subscriptions across devices.

 

icon Daily Deals
icon Daily Deals
icon Daily Deals

Quick Reference Guide

Copyright 2025 | Privacy Policy | Terms of Service | | Copyright
Listen to this show while you explore
Play