Cyber Security
Telegram is NOT an Encrypted Messaging App, Must-See Documentaries
Tom Eston | | arrest, Class Action Park, Cyber Security, Cybersecurity, Data Privacy, Digital Privacy, Documentary, E2E, EFF, encryption, end-to-end encryption, Episodes, france, Information Security, Infosec, LuLaRich, LuLaRoe, messaging, OSINT, Pavlov Durov, Podcast, Podcasts, Privacy, security, social media, technology, Telegram
In this episode, we explore the recent arrest of Telegram founder Pavel Durov in France and discuss the app’s encryption claims. Is Telegram truly an encrypted messaging app? Joining the conversation is ...
Top 5 Cyber Security Companies in Mumbai
As businesses increasingly rely on technology, the role of cyber security companies has become essential. In Mumbai, cybersecurity firms are growing in importance as they help defend against rising cyber threats like ...
Navigating SEBI’s 2024 Updated Cybersecurity Framework: Key Revisions
The Securities and Exchange Board of India (SEBI) has issued a notification regarding the Cybersecurity and Cyber Resilience Framework for Market Infrastructure Institutions (MIIs). This framework mandates MIIs to establish robust cybersecurity ...
Google’s Monopoly: The Debate Heats Up, Amazon Alexa Privacy Tips
Tom Eston | | Alexa, amazon, black hat, Black Hat USA, Cyber Security, Cybersecurity, Data Privacy, DEF CON, Digital Privacy, Episodes, google, Information Security, Infosec, Justice, las vegas, Monopoly, Podcast, Podcasts, Privacy, privacy settings, security, technology, US Justice Department, USJD, Weekly Edition
This week, we discuss Google’s recent accusation by the U.S. Justice Department for being a monopoly and its implications for privacy and cybersecurity. We also cover essential privacy settings for Alexa smart ...
SEC’s Cybersecurity Mandate: A New Era of Executive Liability and the Power of CCM
The Securities and Exchange Commission (SEC) has sent shockwaves through the corporate world over the last year with its groundbreaking cybersecurity rules. These rules place executives and board members directly in the ...
A Comprehensive Outlook on OT Asset Inventory Management
Cybersecurity concerns in operational environments have also heightened the importance of asset inventory management. The November 2023 Aliquippa water plant in Pennsylvania cyberattack, which managed to access and shut down a pressure ...
Leveraging OT Asset Inventory for Operational Excellence: The Benefits
To put it in simple words, it’s an all-inclusive catalog of all your hardware, software, and network components. Far from being just a list, this inventory is the backbone of efficient operations, ...
The Inefficiency of People-Search Removal Tools, Massive Data Breach Impacting U.S. Citizens
Tom Eston | | Confidently, Consumer Reports, Cyber Security, Cybersecurity, Data breach, Data Privacy, DeleteMe, Digital Privacy, EasyOptOuts, Episodes, Hackers, idx, Information Security, Infosec, Kanary, Optery, People Search, People-Search Removal Tool, Podcast, Podcasts, Privacy, Privacy Law, privacy laws, ReputationDefender, security, social security number, ssn, technology, US Privacy Law, Weekly Edition
In episode 342, we discuss the effectiveness of people-search removal tools like DeleteMe and Reputation Defender, based on a study by Consumer Reports. We also cover how almost every American’s social security ...
How Kratikal’s GDPR Compliance Services Will Help Secure Businesses?
The internet’s widespread availability has changed the world. It has transformed how we talk to each other and get things done every day. We can now share files, pay bills, and shop ...
SBOMs Critical to Software Supply Chain Security
Deb Radcliff | | Cyber Security, DevSecOps, DevSecOps adoption, SBOM, software supply chain, TalkSecure Blog
By Deb Radcliff, DevSecOps analyst and editor of CodeSecure’s TalkSecure educational content (syndicated at Security Boulevard & YouTube)LAS VEGAS – One day before the Black Hat Briefings started in Vegas last week, a group of experts met at ...