Posts for Podcasts

What Are the Real Benefits of Zero-Trust Security?

What Are the Real Benefits of Zero-Trust Security? In the modern cybersecurity landscape, zero-trust approaches to security have become popular for organizations looking to protect valuable data. But why has this approach not made its way to individual cybersecurity protections—that is, why is this approach more valuable to organizations and…

Continue Reading

Artificial Intelligence and Cybersecurity

As the utilization of artificial intelligence becomes increasingly prevalent, it is no surprise that AI plays an enormous role in both cyberattacks as well as cybersecurity. However, exactly how AI works in cybersecurity is rarely discussed: what are the benefits of artificial intelligence integration, and how does this combat the…

Continue Reading

The “Why” Behind Cybersecurity

Consumers of every stripe are told that deploying home cybersecurity protection measures is an important component of good cyber hygiene. But despite the importance of cybersecurity protection, we rarely stop to ask ourselves: What do we need our cybersecurity to protect? As a result, most home cybersecurity protection is grounded…

Continue Reading

How to Judge a Company by Its Cybersecurity Practices

When it comes to choosing organizations to share your personal data with, it can often feel like your options are few and far between. This is because many of the services we use (such as healthcare) require the consenting exchange of personal data. However, just because your data must be…

Continue Reading

Tips for Staying Cyber-Safe

With the overwhelming number of bad actors looking to profit off your personal information, it can often feel like there is no way to protect your data privacy. However, just because you are a target by cybercriminals does not mean that you cannot take proactive steps to guard against attacks.…

Continue Reading

Why Is Multi-Factor Authentication Important? 

Responsible for securing institutions, all the way from colleges to banks, multi-factor authentication is a layered approach to securing individuals’ data. Yet despite its importance, many users do not understand the principles behind multi-factor authentication or how it differs from the ubiquitous two-factor identification. In this episode, we will discuss…

Continue Reading

Voter Files and Public Elections

With the Cambridge Analytica scandal of 2016, the role of voter information was suddenly thrust into the political spotlight. In the years since, we have become increasingly aware of the ways in which our voter files can be manipulated and sold to the highest bidder. But what is a voter…

Continue Reading

Remote Work and Cybersecurity

It’s no secret that the past few years have changed how we view the workplace. With more employees than ever working from home, traditional concerns around privacy have fundamentally changed. So where does that leave you? How can you and your organization stay vigilant as new remote workers create new…

Continue Reading

Personal Profiles and Public Safety

How much information is too much information to share when experiencing a public safety emergency? When communicating with a call center, it can be easy to forget critical information in the heat of the moment. But what if you could proactively share that information with operators in advance of emergencies?…

Continue Reading

What You Need to Know About Biometrics

Biometrics measure users’ physical characteristics to verify their identity. Biometrics may be physiological traits, such as fingerprints and eyes, or behavioral characteristics, such as the unique way you’d complete a security-authentication puzzle. They can be more secure than simply using passwords, but they are not immune to privacy and security…

Continue Reading