Data Security and Privacy with the Privacy Professor

Data Security and Privacy with the Privacy Professor

88 episodes

There are more information security and privacy threats than ever before. As more technologies emerge, more surveillance tactics are used, and more artificial intelligence systems are deployed, cybersecurity and privacy risks grow exponentially. Rebecca has spent her entire career working to improve information security and privacy protections, by not only raising awareness of the issues within businesses and other types of organizations, but also by raising the awareness of these risks in the public and helping them to understand how to better protect their own personal data, allowing them to take their privacy protections into their own hands. Rebecca offers information about these existing and emerging security and privacy risks and provides fresh insights into the impacts of exploiting these risks, and gives guidance, tips, expert advice and news, with fascinating guests, to help all organizations, and the general public, understand what they need to do to mitigate these risks.

Podcasts

The History, Mystery, and Rise of AI at CornCon!

Published: Oct. 7, 2023, 7 a.m.
Duration: 56 minutes 6 seconds

Listed in: Technology

Need More Privacy? Write the Privacy Law We All Need!

Published: Sept. 2, 2023, 7 a.m.
Duration: 57 minutes 27 seconds

Listed in: Technology

A Romance Scammer Took All My Dying Mother's Money

Published: Aug. 5, 2023, 7 a.m.
Duration: 54 minutes 56 seconds

Listed in: Technology

GDPR Compliance Stats Everyone, Everywhere, Needs to Know!

Published: July 1, 2023, 7 a.m.
Duration: 54 minutes 7 seconds

Listed in: Technology

Individuals & Businesses: Mitigate! Those! Risks!

Published: June 3, 2023, 7 a.m.
Duration: 55 minutes 28 seconds

Listed in: Technology

IoT Stalking, IoT Jewelry, JuiceJacking, AI, CheckWashing & More!

Published: May 6, 2023, 7 a.m.
Duration: 55 minutes 5 seconds

Listed in: Technology

AI Challenges & Risks: Security, Privacy, Bias & Ethics

Published: April 1, 2023, 7 a.m.
Duration: 57 minutes 1 second

Listed in: Technology

Romance Scammers Have Used My Photos Since 2016

Published: March 4, 2023, 8 a.m.
Duration: 54 minutes 41 seconds

Listed in: Technology

Dobbs Leak, Airtags, Spam, Spoofed Email, & Data Privacy Day!

Published: Feb. 4, 2023, 8 a.m.
Duration: 53 minutes 56 seconds

Listed in: Technology

A Cybersecurity Experts Real Life Identity Theft Experience

Published: Jan. 7, 2023, 8 a.m.
Duration: 55 minutes 41 seconds

Listed in: Technology

Privacy & Cybersecurity for Your Life During the Holidays

Published: Dec. 3, 2022, 8 a.m.
Duration: 54 minutes 58 seconds

Listed in: Technology

Lets Stop the Robocall Scammers!

Published: Nov. 5, 2022, 7 a.m.
Duration: 56 minutes 33 seconds

Listed in: Technology

Wacky Tobaccy Laws, Privacy & Security!

Published: Oct. 1, 2022, 7 a.m.
Duration: 56 minutes 34 seconds

Listed in: Technology

Action is Necessary to Improve Voting & Elections Security!

Published: Sept. 3, 2022, 7 a.m.
Duration: 54 minutes 41 seconds

Listed in: Technology

Secure Coding Fixes the Top 25 Most Dangerous Software Weaknesses

Published: Aug. 6, 2022, 7 a.m.
Duration: 54 minutes 52 seconds

Listed in: Technology

IoT Data Creates Frankenstein Profiles Claiming to Be You

Published: July 2, 2022, 7 a.m.
Duration: 53 minutes 57 seconds

Listed in: Technology

Catching KGB Hackers with 75 and a 2400 Baud Modem

Published: June 4, 2022, 7 a.m.
Duration: 55 minutes 36 seconds

Listed in: Technology

How Stalkers & Assaulters Track & Find Victims with IoT Tech

Published: May 7, 2022, 7 a.m.
Duration: 51 minutes 18 seconds

Listed in: Technology

What Do UNIX, Linux & Dirty Pipe Have in Common? Listen To Hear!

Published: April 2, 2022, 7 a.m.
Duration: 55 minutes

Listed in: Technology

Transportation Cybersecurity & Privacy: Highway to Digital Hell?

Published: March 5, 2022, 8 a.m.
Duration: 55 minutes 1 second

Listed in: Technology

A Synthetic Data Deep Dive: Privacy Protector, Foe or Other?

Published: Feb. 5, 2022, 8 a.m.
Duration: 55 minutes 33 seconds

Listed in: Technology

How to Fix the Log4j Problem & Prevent Similar Types of Incidents

Published: Jan. 8, 2022, 8 a.m.
Duration: 51 minutes 48 seconds

Listed in: Technology

Who's Responsible for BPO Contact Center Privacy & Cybersecurity?

Published: Dec. 4, 2021, 8 a.m.
Duration: 56 minutes 35 seconds

Listed in: Technology

Protecting Aviation Critical Infrastructure from Cyber Attacks

Published: Nov. 6, 2021, 7 a.m.
Duration: 56 minutes 7 seconds

Listed in: Technology

Software Development Security Practices Suck! Wise Up Now!

Published: Oct. 2, 2021, 7 a.m.
Duration: 54 minutes 3 seconds

Listed in: Technology

Demystifying Cyber Insurance: Facts to Get the Right Coverage!

Published: Sept. 9, 2021, 7 a.m.
Duration: 56 minutes 23 seconds

Listed in: Technology

The BOM Episode! DBOMs! SBOMs! And...Supply Chain Cybersecurity!

Published: Aug. 7, 2021, 7 a.m.
Duration: 54 minutes 59 seconds

Listed in: Technology

4th Amendment Does Not Give LE the Right to Access Encrypted Data

Published: July 3, 2021, 7 a.m.
Duration: 55 minutes 14 seconds

Listed in: Technology

Data Pipelines & Data Lakes Security & Compliance Answers & Info

Published: June 5, 2021, 7 a.m.
Duration: 53 minutes 20 seconds

Listed in: Technology

Defending Against Nation-State Hacking & Cyber Warfare Attacks

Published: May 1, 2021, 7 a.m.
Duration: 54 minutes 13 seconds

Listed in: Technology

Voter Fraud Facts No One is Talking About...Until Now

Published: April 3, 2021, 7 a.m.
Duration: 55 minutes 53 seconds

Listed in: Technology

Fighting US Elections & Campaigns Interference with Cybersecurity

Published: March 6, 2021, 8 a.m.
Duration: 56 minutes 51 seconds

Listed in: Technology

Healthcare CISOs: Securing Patient Data & HIPAA Compliance

Published: Feb. 6, 2021, 8 a.m.
Duration: 55 minutes 45 seconds

Listed in: Technology

Holding Privacy Events in a Pandemic World

Published: Jan. 2, 2021, 8 a.m.
Duration: 57 minutes 10 seconds

Listed in: Technology

How A Trail-Blazing STEM Mentor Is Revolutionizing Cybersecurity

Published: Dec. 5, 2020, 8 a.m.
Duration: 57 minutes 53 seconds

Listed in: Technology

How Cybercriminals Take Advantage of the COVID-19 Pandemic

Published: Nov. 7, 2020, 8 a.m.
Duration: 56 minutes 2 seconds

Listed in: Technology

Data Proves Voting Fraud is Rare; Dont Believe Conspiracy Theories Claiming Otherwise

Published: Oct. 3, 2020, 7 a.m.
Duration: 56 minutes 42 seconds

Listed in: Technology

Surveillance Pandemic: How Tech Giants Collect & Use Personal Data for Profiling & Huge Profits

Published: Sept. 5, 2020, 7 a.m.
Duration: 56 minutes 12 seconds

Listed in: Technology

COVID-19 Contact Tracing: Privacy & Security Risks

Published: Aug. 1, 2020, 7 a.m.
Duration: 57 minutes 36 seconds

Listed in: Technology

Voting by Mail Security: Busting Myths and Explaining Facts

Published: July 11, 2020, 7 a.m.
Duration: 59 minutes 38 seconds

Listed in: Technology

Legislating Weak Encryption is Stupid and Dangerous

Published: June 6, 2020, 7 a.m.
Duration: 54 minutes 9 seconds

Listed in: Technology

Why Weakening Encryption for Law Enforcement Access is a Bad Idea

Published: May 2, 2020, 7 a.m.
Duration: 55 minutes 35 seconds

Listed in: Technology

How Rob Sand Caught the Criminal Who Committed the Largest Lottery Fraud in History

Published: April 4, 2020, 7 a.m.
Duration: 54 minutes 11 seconds

Listed in: Technology

How Poor Tech Security & Misinformation Upend Elections

Published: March 7, 2020, 8 a.m.
Duration: 58 minutes 40 seconds

Listed in: Technology

How Biased and Malicious AI Can Do Harm

Published: Feb. 1, 2020, 8 a.m.
Duration: 57 minutes 16 seconds

Listed in: Technology

Diving into the Dark Net

Published: Jan. 4, 2020, 8 a.m.
Duration: 56 minutes 2 seconds

Listed in: Technology

The Criticality of Change Control Management in Cloud Services

Published: Dec. 7, 2019, 8 a.m.
Duration: 55 minutes 44 seconds

Listed in: Technology

Professional ethics and technology in the cyber age

Published: Nov. 2, 2019, 7 a.m.
Duration: 57 minutes 16 seconds

Listed in: Technology

White hat hacking & security break-in testing & ethics

Published: Oct. 5, 2019, 7 a.m.
Duration: 56 minutes 15 seconds

Listed in: Technology

Cybercrime Trends and Changes in Past 3 Decades

Published: Sept. 7, 2019, 7 a.m.
Duration: 56 minutes 20 seconds

Listed in: Technology

Voting Security, Malware as Art, Ransomware, Breaches plus More

Published: May 21, 2019, 7 a.m.
Duration: 56 minutes 53 seconds

Listed in: Technology

Security and Privacy Careers Opportunities, Advice and Experiences

Published: May 14, 2019, 7 a.m.
Duration: 56 minutes 40 seconds

Listed in: Technology

Cybersecurity Lessons from the Mueller Report

Published: May 7, 2019, 7 a.m.
Duration: 56 minutes 45 seconds

Listed in: Technology

Small Business Risks, Careers, Mueller Report, CPU Vulns and More!

Published: April 30, 2019, 7 a.m.
Duration: 54 minutes 51 seconds

Listed in: Technology

Hotel Data Security and Privacy

Published: April 23, 2019, 7 a.m.
Duration: 58 minutes 11 seconds

Listed in: Technology

China Tech, Reusing Old Devices, Accessing Patient Data and More!

Published: April 16, 2019, 7 a.m.
Duration: 55 minutes 40 seconds

Listed in: Technology

GDPR: Implementing Data Subject Access and Rights

Published: April 9, 2019, 7 a.m.
Duration: 46 minutes 13 seconds

Listed in: Technology

Continuing the Cannabis Security and Privacy Risks Conversation

Published: April 2, 2019, 7 a.m.
Duration: 55 minutes 6 seconds

Listed in: Technology

Fax Tech and Machines: The Achilles Heels of Cybersecurity

Published: March 26, 2019, 7 a.m.
Duration: 56 minutes 41 seconds

Listed in: Technology

Childrens Online Cyberbullying, Privacy and Cybersecurity

Published: March 19, 2019, 7 a.m.
Duration: 55 minutes 35 seconds

Listed in: Technology

Amazing Cryptography and Codebreaker Pioneer: Elizebeth Friedman

Published: March 12, 2019, 7 a.m.
Duration: 57 minutes 9 seconds

Listed in: Technology

Huge Risks From SaaS Orgs With No Test Regions or Change Controls

Published: March 5, 2019, 8 a.m.
Duration: 53 minutes 31 seconds

Listed in: Technology

Is AI a Friend or Foe to Information Security and Privacy?

Published: Feb. 26, 2019, 8 a.m.
Duration: 56 minutes 46 seconds

Listed in: Technology

No Change Control is Like Playing with Fire in a Dynamite Factory

Published: Feb. 19, 2019, 8 a.m.
Duration: 56 minutes 15 seconds

Listed in: Technology

Backdoors in Cybersecurity Tools Gives Privacy Only to Outlaws

Published: Feb. 12, 2019, 8 a.m.
Duration: 57 minutes 32 seconds

Listed in: Technology

Will Australias Encryption Law Kill Privacy in Name of Safety?

Published: Feb. 5, 2019, 8 a.m.
Duration: 57 minutes 33 seconds

Listed in: Technology

Will You Sacrifice Your Privacy When Purchasing Cannabis?

Published: Jan. 29, 2019, 8 a.m.
Duration: 58 minutes 56 seconds

Listed in: Technology

GDPR, Data Privacy Day and The Need for Privacy

Published: Jan. 22, 2019, 8 a.m.
Duration: 56 minutes 30 seconds

Listed in: Technology

Data Security and Privacy Ethics in Computing

Published: Jan. 15, 2019, 8 a.m.
Duration: 56 minutes 21 seconds

Listed in: Technology

2019 Information Security Forecast: Worldwide and In Colombia

Published: Jan. 8, 2019, 8 a.m.
Duration: 56 minutes 26 seconds

Listed in: Technology

Encore: Medical Cannabis Patient Privacy and Data Security

Published: Jan. 1, 2019, 8 a.m.
Duration: 57 minutes 43 seconds

Listed in: Technology

More Needs to Be Done to Protect Student and Teacher Privacy

Published: Dec. 18, 2018, 8 a.m.
Duration: 58 minutes 54 seconds

Listed in: Technology

Is Anonymization Possible with Current Technologies?

Published: Dec. 11, 2018, 8 a.m.
Duration: 56 minutes 41 seconds

Listed in: Technology

FTC Influences on Privacy Sanctions and Regulations

Published: Dec. 4, 2018, 8 a.m.
Duration: 58 minutes 27 seconds

Listed in: Technology

IOT Security, Privacy and Safety

Published: Nov. 27, 2018, 8 a.m.
Duration: 56 minutes 38 seconds

Listed in: Technology

GDPR: Using Legitimate Interests as a Lawful Basis for Processing

Published: Nov. 20, 2018, 8 a.m.
Duration: 55 minutes 47 seconds

Listed in: Technology

Government Hacking and Surveillance: Activities, Tools and Laws

Published: Nov. 13, 2018, 8 a.m.
Duration: 54 minutes 30 seconds

Listed in: Technology

New Toolkit to Mitigate Teacher and Student Privacy Risks

Published: Nov. 6, 2018, 8 a.m.
Duration: 57 minutes 34 seconds

Listed in: Technology

Information Security and Privacy Questions from Listeners

Published: Oct. 30, 2018, 7 a.m.
Duration: 57 minutes 10 seconds

Listed in: Technology

Security Views from an Elections Official and Voting Security Expert

Published: Oct. 23, 2018, 7 a.m.
Duration: 55 minutes 2 seconds

Listed in: Technology

Answering Questions from Listeners for Cyber Security Awareness

Published: Oct. 16, 2018, 7 a.m.
Duration: 56 minutes 25 seconds

Listed in: Technology

Pen Tests and Vulnerability Scans: Advice, Experience and Case Studies

Published: Oct. 9, 2018, 7 a.m.
Duration: 57 minutes 2 seconds

Listed in: Technology

Turning A Blind Eye Does Not Fix Voting Security Vulnerabilities

Published: Oct. 2, 2018, 7 a.m.
Duration: 56 minutes 47 seconds

Listed in: Technology

Encore: Are Encryption Backdoors Really Necessary for National Security?

Published: Sept. 25, 2018, 7 a.m.
Duration: 56 minutes 21 seconds

Listed in: Technology

Cyber Terrorism Defense at Home and While Traveling

Published: Sept. 18, 2018, 7 a.m.
Duration: 56 minutes 58 seconds

Listed in: Technology

Voting Systems Security and Risk Limiting Audits

Published: Sept. 11, 2018, 7 a.m.
Duration: 57 minutes 28 seconds

Listed in: Technology

The Philippines BPO Industry Goal to be World Leader in Privacy

Published: Sept. 4, 2018, 7 a.m.
Duration: 55 minutes 38 seconds

Listed in: Technology

Advice for CyberSecurity and Privacy Threats, Challenges and Careers

Published: Aug. 28, 2018, 7 a.m.
Duration: 56 minutes 37 seconds

Listed in: Technology

Unifying GDPR With US Laws Compliance

Published: Aug. 21, 2018, 7 a.m.
Duration: 56 minutes 55 seconds

Listed in: Technology

Fighting International Cybercrime and Cyber Security Threats

Published: Aug. 14, 2018, 7 a.m.
Duration: 56 minutes 55 seconds

Listed in: Technology

Physical Fails for Information Security and Privacy

Published: Aug. 7, 2018, 7 a.m.
Duration: 57 minutes 56 seconds

Listed in: Technology

Education and Advice for Successful Information Security Careers

Published: July 31, 2018, 7 a.m.
Duration: 58 minutes 10 seconds

Listed in: Technology

Are US Voting Systems and Voter Registration Data Secure?

Published: July 24, 2018, 7 a.m.
Duration: 57 minutes 3 seconds

Listed in: Technology

Are Encryption Backdoors Really Necessary for National Security?

Published: July 17, 2018, 7 a.m.
Duration: 56 minutes 21 seconds

Listed in: Technology

Curious Cases of Catphishing Executives and IT Pros

Published: July 10, 2018, 7 a.m.
Duration: 55 minutes 31 seconds

Listed in: Technology

Encryption Trends Around the World

Published: July 3, 2018, 7 a.m.
Duration: 58 minutes 16 seconds

Listed in: Technology

Are Our Voting and Elections Processes Secure?

Published: June 26, 2018, 7 a.m.
Duration: 58 minutes 21 seconds

Listed in: Technology

Separating Facts from Fiction in Digital Forensics

Published: June 19, 2018, 7 a.m.
Duration: 57 minutes 35 seconds

Listed in: Technology

GDPR: Debunking Personal Data and Applicability Myths

Published: June 12, 2018, 7 a.m.
Duration: 57 minutes 32 seconds

Listed in: Technology

DNA Forensics Can Solve Crimes. Are There Also Privacy Risks?

Published: June 5, 2018, 7 a.m.
Duration: 57 minutes 26 seconds

Listed in: Technology

Swatting Dangers and Defenses

Published: May 29, 2018, 7 a.m.
Duration: 58 minutes 9 seconds

Listed in: Technology

Why Do Women Leave IT Careers?

Published: May 22, 2018, 7 a.m.
Duration: 56 minutes 24 seconds

Listed in: Technology

Who's Eavesdropping on You? Government Surveillance and Laws

Published: May 15, 2018, 7 a.m.
Duration: 57 minutes 16 seconds

Listed in: Technology

Honey Sticks and Honey Points: Not-So-Sweet Cyber Crook Tools

Published: May 8, 2018, 7 a.m.
Duration: 58 minutes 21 seconds

Listed in: Technology

Why Nation States and Cybercrooks Love Wi-Fi

Published: May 1, 2018, 7 a.m.
Duration: 55 minutes 54 seconds

Listed in: Technology

Encore: EU GDPR Sanity: Practical Advice for Effective Compliance

Published: April 27, 2018, 7 a.m.
Duration: 56 minutes 18 seconds

Listed in: Technology

The Path of This Privacy Expert Led to Many World Icons

Published: April 20, 2018, 7 a.m.
Duration: 55 minutes 52 seconds

Listed in: Technology

IT and Privacy Career Trends and Tips for Success

Published: April 13, 2018, 7 a.m.
Duration: 57 minutes 24 seconds

Listed in: Technology

Association Memberships Build Data Security and Privacy Careers

Published: April 6, 2018, 7 a.m.
Duration: 56 minutes 4 seconds

Listed in: Technology

Many Areas of InfoSec and Privacy Expertise? Make Them Your Career!

Published: March 30, 2018, 7 a.m.
Duration: 56 minutes 50 seconds

Listed in: Technology

Is Hacking Ever Ethical? A Professional Hacker Explains!

Published: March 23, 2018, 7 a.m.
Duration: 56 minutes 21 seconds

Listed in: Technology

Privacy and Security Incident Response Mistakes Organizations Make

Published: March 16, 2018, 7 a.m.
Duration: 56 minutes 1 second

Listed in: Technology

Uberveillance:Would You Embed Constant Surveillance In Your Body?

Published: March 9, 2018, 8 a.m.
Duration: 55 minutes 59 seconds

Listed in: Technology

Balancing Privacy with Safety when Using Body Cams

Published: March 2, 2018, 8 a.m.
Duration: 57 minutes 27 seconds

Listed in: Technology

Identity Fraud and Theft: Don't Be a Victim!

Published: Feb. 23, 2018, 8 a.m.
Duration: 57 minutes 4 seconds

Listed in: Technology

EU GDPR Sanity: Practical Advice for Effective Compliance

Published: Feb. 16, 2018, 8 a.m.
Duration: 56 minutes 18 seconds

Listed in: Technology

The Ghosts of Government in Our Machines: The CIA and Surveillance

Published: Feb. 9, 2018, 8 a.m.
Duration: 56 minutes 45 seconds

Listed in: Technology

Computer Hacking Crimes and Prosecutions

Published: Feb. 2, 2018, 8 a.m.
Duration: 55 minutes 32 seconds

Listed in: Technology

Medical Cannabis Patient Privacy and Data Security

Published: Jan. 26, 2018, 8 a.m.
Duration: 57 minutes 43 seconds

Listed in: Technology