59 min

It Depends Great Security Debate

    • Technology

A wide range of cause and effect discussion in this week's episode.
What happens when a cellphone gets compromised for one purpose and has unrelated, follow-on consequences? Will there be material impact from the recent decrees, executive orders and vocal support by President Biden that additional focus is required on information security, ransomware and corruption? What are the downstream impacts of paying, and not paying a ransom and what happens if they are prohibited by law? Is doing the mininum amount of security OK, or is the minimum not really the required minimum? And more on the security position on data lakes, too.
Join Erik, Brian and Dan as they count their pieces of flair and determine if we are the right fit to keep working at Flingers.
Support The Great Security Debate
Links:
How Jeff Bezos' Phone Was Likely Hacked by Saudi Crown Prince MBSWatch The Dissident | Prime VideoSaudi Arabia claims anti-corruption purge recouped $100bn | Saudi Arabia | The GuardianHow to opt out of (or into) Amazon’s Sidewalk network - The VergePost | Feed | LinkedIn - It’s time for security teams to embrace security data lakesHacking Airplanes - Schneier on SecuritySolarWinds lawsuit expands to include private equity ownersSupreme Court narrows Computer Fraud and Abuse Act: Misusing access not quite the same as breaking in • The RegisterSupreme Court sides with police officer who improperly searched license plate database - CNNPoliticsPost | Feed | LinkedIn - Fundamentals of Security > Shiny TechnologyAmazon.com: Office Space [Blu-ray]: Jennifer Aniston, Ron Livingston, Mike Judge: Movies & TVPost | Feed | LinkedIn - Security Debta...

A wide range of cause and effect discussion in this week's episode.
What happens when a cellphone gets compromised for one purpose and has unrelated, follow-on consequences? Will there be material impact from the recent decrees, executive orders and vocal support by President Biden that additional focus is required on information security, ransomware and corruption? What are the downstream impacts of paying, and not paying a ransom and what happens if they are prohibited by law? Is doing the mininum amount of security OK, or is the minimum not really the required minimum? And more on the security position on data lakes, too.
Join Erik, Brian and Dan as they count their pieces of flair and determine if we are the right fit to keep working at Flingers.
Support The Great Security Debate
Links:
How Jeff Bezos' Phone Was Likely Hacked by Saudi Crown Prince MBSWatch The Dissident | Prime VideoSaudi Arabia claims anti-corruption purge recouped $100bn | Saudi Arabia | The GuardianHow to opt out of (or into) Amazon’s Sidewalk network - The VergePost | Feed | LinkedIn - It’s time for security teams to embrace security data lakesHacking Airplanes - Schneier on SecuritySolarWinds lawsuit expands to include private equity ownersSupreme Court narrows Computer Fraud and Abuse Act: Misusing access not quite the same as breaking in • The RegisterSupreme Court sides with police officer who improperly searched license plate database - CNNPoliticsPost | Feed | LinkedIn - Fundamentals of Security > Shiny TechnologyAmazon.com: Office Space [Blu-ray]: Jennifer Aniston, Ron Livingston, Mike Judge: Movies & TVPost | Feed | LinkedIn - Security Debta...

59 min

Top Podcasts In Technology

Lex Fridman Podcast
Lex Fridman
All-In with Chamath, Jason, Sacks & Friedberg
All-In Podcast, LLC
Acquired
Ben Gilbert and David Rosenthal
The Neuron: AI Explained
The Neuron
TED Radio Hour
NPR
Dwarkesh Podcast
Dwarkesh Patel