Quantcast
Channel: Data Security and Privacy with the Privacy Professor
Browsing latest articles
Browse All 240 View Live

Cybercrime Trends and Changes in Past 3 Decades

According to Cybersecurity Ventures research, sponsored by Herjavec Group, cybercrime damages will be Dollor 6 trillion By 2021, up from Dollor 3 trillion in 2015. What are the biggest cybercrime...

View Article



White hat hacking & security break-in testing & ethics

A recent incident occurred in central Iowa where security vendor, Coalfire, employees were arrested for breaking/entering and robbery of a county government building. After the arrest it was determined...

View Article

Professional ethics and technology in the cyber age

Executives, tech, data & cyber security, and privacy professionals face situations testing their ethics every day. Just a few issues include: • Profit maximization at any cost, including privacy...

View Article

The Criticality of Change Control Management in Cloud Services

Recently the CEO of a cloud services business for compliance & information security shrugged off the problems he has on an ongoing basis with his SaaS cloud site where he does not have change...

View Article

Diving into the Dark Net

Many listeners have sent questions over the past two years about the dark web • What is the dark web? Is it the same as the dark net? How is it different from the deep web? • Is it legal to go into the...

View Article


How Biased and Malicious AI Can Do Harm

Listen in to my chat with artificial intelligence expert Davi Ottenheimer about not only the potential benefits of AI, but also the risks to information security, privacy and safety when flawed, biased...

View Article

How Poor Tech Security & Misinformation Upend Elections

Listen in to hear Rebecca speak with elections security expert Theresa Payton about elections security, safeguarding voting machines, and the types of attempts to disrupt or even change the results of...

View Article

How Rob Sand Caught the Criminal Who Committed the Largest Lottery Fraud in...

Hear Rebecca speak with Rob Sand, the lawyer who used his tech savvy as the Asst Attorney General for Iowa to successfully prosecute Eddie Tipton, who committed the largest & longest occurring...

View Article


Why Weakening Encryption for Law Enforcement Access is a Bad Idea

Efforts are increasing in the US & worldwide to force tech companies to build encryption that would “allow only law enforcement and government” groups to get into encrypted files &...

View Article


Legislating Weak Encryption is Stupid and Dangerous

The value of strong encryption cannot be overstated, but yet the efforts from lawmakers to force tech companies to create weak encryption has been put into overdrive. Bruce Schneier has been a vocal...

View Article

Voting by Mail Security: Busting Myths and Explaining Facts

In the midst of a deadly pandemic mail-in voting would be the safest way to vote. However, many warn that voting by mail will lead to wide-spread fraud and lost votes. Is this true, or are they...

View Article

COVID-19 Contact Tracing: Privacy & Security Risks

Tech giants & startups are quickly releasing “cutting edge” COVID-19 tracing tools. Some states have built their own tracing tools. COVID-19 tracing is absolutely necessary to get the pandemic...

View Article

Surveillance Pandemic: How Tech Giants Collect & Use Personal Data for...

Since 2018 Rebecca has invited many tech giants to explain if & how they are collecting & selling personal data to govt & other entities to profile & target subsets of populations while...

View Article


Data Proves Voting Fraud is Rare; Don’t Believe Conspiracy Theories Claiming...

Voter fraud conspiracy theories have reached a fever pitch. There are even claims that mail-in ballots are “a scam.” What’s the truth? Voting security experts & researchers Jennifer Kavanagh &...

View Article

How Cybercriminals Take Advantage of the COVID-19 Pandemic

With 2020 being the year of the global COVID-19 pandemic, it has also become the year of globally widespread working from home offices, and attending school online from home. Cybercrime is increasing...

View Article


How A Trail-Blazing STEM Mentor Is Revolutionizing Cybersecurity

The numbers of women & people of color are still a woefully small percentage of the IT and cyber/data/network/applications security workforce. Such lack of diversity results in weak and flawed IT,...

View Article

Holding Privacy Events in a Pandemic World

For Data Privacy Day month Rebecca is speaking with Kim Hakim, CEO & Founder of FutureCon Events, about how she handled needing to move...almost overnight!...all her 2020 conferences to being...

View Article


Healthcare CISOs: Securing Patient Data & HIPAA Compliance

Health data is considered personal data gold to cybercrooks. Hospitals, clinics and telehealth situations involve a lot of complexity that brings many threats and vulnerabilities to patient data. • Is...

View Article

Fighting US Elections & Campaigns Interference with Cybersecurity

There continue to be more lessons to learn from the past 8+ years of election cycles in the US. Lessons that can be applied throughout the world, about the need to build in strong security and privacy...

View Article

Voter Fraud Facts No One is Talking About…Until Now

In 2021 there have been at least 253 voting bills proposed in at least 43 US states. These bills are restricting voting methods, times, and even criminalizing such practices as the provision of food...

View Article

Defending Against Nation-State Hacking & Cyber Warfare Attacks

There have been many news reports in the past several months about nation-state espionage, and in particular nation-state cyberthreats and cybersecurity warfare attacks. So, what exactly are...

View Article


Data Pipelines & Data Lakes Security & Compliance Answers & Info

What are “high-speed streaming analytics data pipelines”? What is the function of a data pipeline? Are there more security risks associated with data pipelines, or less, compared to VPN transmissions,...

View Article


4th Amendment Does Not Give LE the Right to Access Encrypted Data

The recent take-down of 300 criminal syndicates in more than 100 countries by the DoJ, selling their own 12,000 encrypted devices and services to which they had the decryption keys, has resurrected the...

View Article

The BOM Episode! DBOMs! SBOMs! And...Supply Chain Cybersecurity!

Before the Solarwinds hack made global news daily for many weeks starting in December, 2020, most of the public had never heard the term “supply chain,” let alone know about the inherent data and cyber...

View Article

Demystifying Cyber Insurance: Facts to Get the Right Coverage!

Listen to this episode to learn from Judy Selby, a worldwide recognized and award-winning cyber insurance expert, about the considerations to take into account for different types of cyber insurance,...

View Article


Software Development Security Practices Suck! Wise Up Now!

Why do so many business leaders insist on using unsecure systems and software development practices? Often to skimp on IT budgets and to race to production. Or leaders with marketing expertise, but no...

View Article

Protecting Aviation Critical Infrastructure from Cyber Attacks

The US Transportation Security Administration (TSA) recently announced they are requiring critical US airport operators, passenger aircraft operators, and all-cargo aircraft operators to designate...

View Article

Who's Responsible for BPO Contact Center Privacy & Cybersecurity?

Rebecca discusses the importance of call/contact center and customer service privacy and cybersecurity practices with privacy law and business process outsourcing (BPO) expert, Jon Bello. Often the...

View Article

How to Fix the Log4j Problem & Prevent Similar Types of Incidents

The Log4j security vulnerability is likely a result of insufficient secure coding and/or testing practices for software that is used in billions of devices worldwide. This vulnerability is now being...

View Article



A Synthetic Data Deep Dive: Privacy Protector, Foe or Other?

Synthetic data has increasingly been in the news in recent years. It is being used for many purposes, such as training artificial intelligence (AI) models, and for more thoroughly testing software. It...

View Article

Transportation Cybersecurity & Privacy: Highway to Digital Hell?

There have been many reports about over-the-road trucking delays causing problems throughout the full supply chain and delaying deliveries of critical products throughout all industries. However, what...

View Article

What Do UNIX, Linux & Dirty Pipe Have in Common? Listen To Hear!

A lot of news has been released lately about the Dirty Pipe vulnerability in the Linux OS. How is this related to UNIX? Listen in to hear Rik Farrow, the world’s most experienced and knowledgeable...

View Article

How Stalkers & Assaulters Track & Find Victims with IoT Tech

Assaulters and stalkers are increasingly using technologies to target, surveil, and attack their victims. IoT tech in particular is increasingly being used. • What types of IoT tech are being used to...

View Article


Catching KGB Hackers with 75¢ and a 2400 Baud Modem

Nation state hackers have been trying to get into the secrets stored on computers for decades. The Russian KGB has been trying, and often succeeding, to hack into computer systems before there was a...

View Article

IoT Data Creates Frankenstein Profiles Claiming to Be You

There are an estimated 20 – 30 billion “smart” internet of things (IoT) devices currently used in the world. Most of them are listening devices, meaning everything heard within the vicinity of the...

View Article

Secure Coding Fixes the Top 25 Most Dangerous Software Weaknesses

In the news every day are security incidents and privacy breaches caused by software programming errors, sloppy practices, lack of sufficient testing, and many other engineering-, coding-, and...

View Article


Action is Necessary to Improve Voting & Elections Security!

Many claims have been, and still are being, made about elections and voting security, more than ever since the 2020 election. Some claim there was widespread “voting fraud.” While no process or...

View Article


“Wacky Tobaccy” Laws, Privacy & Security!

At this time in our current enlightened period in history, we're actually not enlightened with regard to cannabis benefits, medicinal uses, how to debunk disinformation that has been being spread since...

View Article

Let’s Stop the Robocall Scammers!

Everyone is inundated with robocalls! Many of them are legitimate, such as those providing notifications about environmental threats such as hurricanes and tornadoes. And those giving alerts about...

View Article

Privacy & Cybersecurity for Your Life During the Holidays

Are you armed with the privacy and security knowledge and awareness necessary to identify all the holiday scams and cybercrooks that emerge and try not only new scams and crimes, but also all the same...

View Article

A Cybersecurity Expert’s Real Life Identity Theft Experience

Everyone is a target for identity thieves. Even the most brilliant cybersecurity and privacy experts. Why? One significant reason is because when those organizations and individuals who possess and use...

View Article


Dobbs Leak, Airtags, Spam, Spoofed Email, & Data Privacy Day!

It has been almost three years since Rebecca has done a show answering listener questions; it is time she did another one! In this episode she answers a wide range of questions. Some of the questions...

View Article

“Romance Scammers Have Used My Photos Since 2016”

Bryan Denny served as an officer in the U.S. Army for 26 years. In 2016, Bryan’s photos were stolen and used to build thousands of fake profiles. Kathy Waters has logged over 4,000 volunteer hours...

View Article


AI Challenges & Risks: Security, Privacy, Bias & Ethics

AI has quickly become pervasive in all our lives. But, how can it impact us? Consider a couple of examples. Lensa is an app that takes real photos and uses AI to make art images from them. Millions...

View Article

IoT Stalking, IoT Jewelry, JuiceJacking, AI, CheckWashing & More!

In this episode Rebecca continues answering a few more of the hundreds of questions she has received from listeners and readers throughout the past few months, covering a wide range of topics. Some of...

View Article


Individuals & Businesses: Mitigate! Those! Risks!

Everyone is at risk of cybercrime, privacy breaches, and associated physical risks. Individuals in their personal lives, as well as businesses and their employees within work areas…which are often in...

View Article

GDPR Compliance Stats Everyone, Everywhere, Needs to Know!

The EU General Data Protection Regulation (GDPR) has been in effect for 5 years now. What have been the impacts to organizations who must comply? What have been the penalties applied? And for what...

View Article

A Romance Scammer Took All My Dying Mother's Money

April describes the horrific harms that romance scammers caused her mother while terminally ill with cancer, and Kathy describes the upcoming World Romance Scam Prevention Day that her organization...

View Article

Need More Privacy? Write the Privacy Law We All Need!

Do you see a need for more privacy in certain areas of your life? Or within certain industries? Or throughout society? Well, don’t just sit there; get up offa that thing, and get that new privacy law...

View Article


The History, Mystery, and Rise of AI at CornCon!

Dr. John Johnson describes why he created the wildly popular cybersecurity conference, CornCon! It was first held in 2015, in Davenport, Iowa on the banks of the Mississippi River. He also describes...

View Article

Browsing latest articles
Browse All 240 View Live




Latest Images