Medical Cannabis Patient Privacy and Data Security
Most people assume that their data is safe in cannabis stores & medical cannabis dispensaries. Or they believe if they pay in cash there will be no record of their cannabis purchase. Those are...
View ArticleComputer Hacking Crimes and Prosecutions
In recent months self-proclaimed “cybersecurity experts” have posted cybercrime history timelines in online outlets but left out some of the most significant cases that impacted all subsequent...
View ArticleThe Ghosts of Government in Our Machines: The CIA and Surveillance
Hacking from Russia, China and other nation states has been going on for a very long time. And, it will continue to be in the news as more types of tech creates more ways to hack, and as more data is...
View ArticleEU GDPR Sanity: Practical Advice for Effective Compliance
On May 25, 2018, the EU General Data Protection Regulation (GDPR) goes into effect, bringing with it some significant changes to how organizations were protecting personal information under the EU Data...
View ArticleIdentity Fraud and Theft: Don't Be a Victim!
In this episode we discuss a long-time problem, since before the use of smartphones, and even before personal computers existed, but one that is getting progressively worse. Identity theft. With many...
View ArticleBalancing Privacy with Safety when Using Body Cams
Body cameras can provide great benefit for capturing what really happens in various situations and support accountability for the actions of those wearing them. But there are also privacy risks for...
View ArticleUberveillance:Would You Embed Constant Surveillance In Your Body?
There are increasingly more initiatives to make humans passive participants within the Internet of Things (IoT) by implanting a wide variety of computers and computer chips within them. Science fiction...
View ArticlePrivacy and Security Incident Response Mistakes Organizations Make
Privacy breaches and security incidents are occurring more often and are increasingly involving larger amounts of personal data. Why are security incidents continuing to increase? For a variety of...
View ArticleIs Hacking Ever Ethical? A Professional Hacker Explains!
What comes to your mind when I say “hacking”? What comes to your mind when I say “hacker”? It’s likely very different to each of you. But would you ever consider hacking to be ethical? In this episode...
View ArticleMany Areas of InfoSec and Privacy Expertise? Make Them Your Career!
Many information security & privacy pros and career advisors give advice that you should focus on one specialty to be successful. While that may be best for some, I can testify that it does not...
View ArticleAssociation Memberships Build Data Security and Privacy Careers
In this episode we discuss information security and privacy careers and ways to support professional growth. In particular we discuss the benefits for building professional capabilities, of networking,...
View ArticleIT and Privacy Career Trends and Tips for Success
I’ve had many listeners, from high school up through those who were past their 70s, contact me, saying they were inspired to follow their interests into a tech, information security and/or privacy...
View ArticleThe Path of This Privacy Expert Led to Many World Icons
What do Harry S. Truman, Gloria Steinem, Fidel Castro, Jimmy Hoffa, and Antonin Scalia have in common? Tune in to hear Robert Ellis Smith explain the answer! He will also discuss many other famous...
View ArticleEncore: EU GDPR Sanity: Practical Advice for Effective Compliance
On May 25, 2018, the EU General Data Protection Regulation (GDPR) goes into effect, bringing with it some significant changes to how organizations were protecting personal information under the EU Data...
View ArticleWhy Nation States and Cybercrooks Love Wi-Fi
In April it was widely reported, throughout worldwide news outlets, that Russian hackers were working to infiltrate as many wi-fi networks throughout the world as possible; for the general public as...
View ArticleHoney Sticks and Honey Points: Not-So-Sweet Cyber Crook Tools
Most think of cybercrooks coming from far-away places through the internet. But what many don’t consider is HOW they got a pathway into our computing devices & networks. Often those pathways were...
View ArticleWho's Eavesdropping on You? Government Surveillance and Laws
The US government recently released its annual report of surveillance activities, including the numbers of individuals about whom data was collected. It reveals that NSA tripled metadata collection...
View ArticleWhy Do Women Leave IT Careers?
In this episode we discuss how to encourage women into STEM careers, IT in particular, and motivate them to stay. This most definitely is NOT a man versus women issue! Some of the greatest supporters...
View ArticleSwatting Dangers and Defenses
A Kansas man was killed in a swatting incident in December, 2017. A central Iowa woman was a swatting victim in May, 2018. In April, 2018: A swatting incident occurred in Arlington, TX; there were 3...
View ArticleDNA Forensics Can Solve Crimes. Are There Also Privacy Risks?
Those DNA ancestry kits are very popular. But how accurate are they? Can they really pinpoint the country where your ancestors came from? And with whom do ancestry businesses share that data? Was that...
View Article
More Pages to Explore .....