3/26/2019 – Fax Tech and Machines: The Achilles Heels of Cybersecurity with Eric Nelson
3/12/2019 – Amazing Cryptography and Codebreaker Pioneer: Elizebeth Friedman with Bruce Sussman
3/5/2019 – Huge Risks From SaaS Orgs With No Test Regions or Change Controls
2/19/2019 – No Change Control is Like Playing with Fire in a Dynamite Factory
1/8/2019 – 2019 Information Security Forecast: Worldwide and In Colombia
12/11/2018 – Is Anonymization Possible with Current Technologies?
11/27/2018 – IOT Security, Privacy and Safety
10/30/2018 – Information Security and Privacy Questions from Listeners
10/16/2018 – Answering Questions from Listeners for Cyber Security Awareness
10/9/2018 – Pen Tests and Vulnerability Scans: Advice, Experience and Case Studies
6/19/2018 – Separating Facts from Fiction in Digital Forensics
1/22/2019 – GDPR, Data Privacy Day and The Need for Privacy
12/4/2018 ‐ FTC Influences on Privacy Sanctions and Regulations
11/20/2018 – GDPR: Using Legitimate Interests as a Lawful Basis for Processing
11/13/2018 – Government Hacking and Surveillance: Activities, Tools and Laws
8/21/2018 – Unifying GDPR With US Laws Compliance
6/12/2018 – GDPR: Debunking Personal Data and Applicability Myths
5/15/2018 – Who's Eavesdropping on You? Government Surveillance and Laws
3/16/2018 – Privacy and Security Incident Response Mistakes Organizations Make
2/16/2018 – EU GDPR Sanity: Practical Advice for Effective Compliance
8/28/2018 – Advice for CyberSecurity and Privacy Threats, Challenges and Careers
7/31/2018 – Education and Advice for Successful Information Security Careers
5/22/2018 – Why Do Women Leave IT Careers?
4/20/2018 – The Path of This Privacy Expert Led to Many World Icons
4/13/2018 – IT and Privacy Career Trends and Tips for Success
4/6/2018 – Association Memberships Build Data Security and Privacy Careers
3/30/2018 – Many Areas of InfoSec and Privacy Expertise? Make Them Your Career!
9/18/2018 – Cyber Terrorism Defense at Home and While Traveling
8/7/2018 – Physical Fails for Information Security and Privacy
5/29/2018 – Swatting Dangers and Defenses
3/2/2018 – Balancing Privacy with Safety when Using Body Cams
2/26/2019 – Is AI a Friend or Foe to Information Security and Privacy?
10/23/2018 – Security Views from an Elections Official and Voting Security Expert
10/2/2018 – Turning A Blind Eye Does Not Fix Voting Security Vulnerabilities
9/11/2018 – Voting Systems Security and Risk Limiting Audits
7/24/2018 – Are US Voting Systems and Voter Registration Data Secure?
6/26/2018 – Are Our Voting and Elections Processes Secure?
2/5/2019 – Will Australias Encryption Law Kill Privacy in Name of Safety?
7/17/2018 – Are Encryption Backdoors Really Necessary for National Security?
7/3/2018 – Encryption Trends Around the World
1/29/2019 – Will You Sacrifice Your Privacy When Purchasing Cannabis?
6/5/2018 – DNA Forensics Can Solve Crimes. Are There Also Privacy Risks?
1/26/2018 – Medical Cannabis Patient Privacy and Data Security
3/9/2018 – Uberveillance:Would You Embed Constant Surveillance In Your Body?
9/4/2018 – The Philippines BPO Industry Goal to be World Leader in Privacy
2/12/2019 – Backdoors in Cybersecurity Tools Gives Privacy Only to Outlaws
1/15/2019 – Data Security and Privacy Ethics in Computing
8/14/2018 – Fighting International Cybercrime and Cyber Security Threats
7/10/2018 – Curious Cases of Catphishing Executives and IT Pros
5/8/2018 – Honey Sticks and Honey Points: Not-So-Sweet Cyber Crook Tools
5/1/2018 – Why Nation States and Cybercrooks Love Wi-Fi
3/23/2018 – Is Hacking Ever Ethical? A Professional Hacker Explains!
2/23/2018 – Identity Fraud and Theft: Don't Be a Victim!
2/9/2018 – The Ghosts of Government in Our Machines: The CIA and Surveillance
2/2/2018 – Computer Hacking Crimes and Prosecutions
3/19/2019 – Children's Online Cyberbullying, Privacy and Cybersecurity with Parry Aftab
12/18/2018 – More Needs to Be Done to Protect Student and Teacher Privacy
11/6/2018 – New Toolkit to Mitigate Teacher and Student Privacy Risks