S5, E208 - Microsoft's Cybersecurity Crisis: A Battle for Trust in the Cloud Era
Privacy Please
by Cameron Ivey
3d ago
Rumor has it, in privacy, we discover how a damning federal report has exposed serious lapses in the tech titan's security armor, leaving businesses and individuals to question their trust in the cloud. As Microsoft faces a breach with Chinese fingerprints and a culture of shrugged shoulders towards security investments, we're unpacking what it all means for the future of enterprise safety. Buckle up as we explore the ramifications for Amazon Web Services and Google Cloud, who might just dance in the rain of Microsoft's storm. Listen in as we highlight the Cybersecurity Review Board's urgent ..read more
Visit website
S5, E207 - Delving into the American Privacy Rights Act Unfiltered
Privacy Please
by Cameron Ivey
1w ago
Hold onto your hats because we're cracking open the American Privacy Rights Act – a piece of legislation that's causing quite the stir. Will it be the superhero the privacy community has been waiting for, or is it a wolf in sheep's clothing? We dissect the nitty-gritty from data minimization to opt-out rights and ponder the act's potential global ripple effects on data protection.  Support the show ..read more
Visit website
S5, E206 - Rumor Has It in Privacy - Go Get Yo Monies
Privacy Please
by Cameron Ivey
2w ago
Join us for a our new short Rumor Has It in Privacy.  As I walk you through the labyrinth of class action settlements that could put money back in your pocket. This episode is a treasure map, leading you to the X that marks the spot on significant payouts from big-name companies that might owe you more than just an apology. From Verizon's sneaky fees to Subaru's gear-grinding mishaps and the fiery engines of Kia and Hyundai, I'll be your guide on this solo expedition to reclaim what's yours. Support the show ..read more
Visit website
S5, E205 - Exploring the Privacy & Cybersecurity Risks of Large Language Models
Privacy Please
by Cameron Ivey
3w ago
Prepare to have your mind expanded as we navigate the complex labyrinth of large language models and the cybersecurity threats they harbor. We dissect a groundbreaking paper that exposes how AI titans are susceptible to a slew of sophisticated cyber assaults, from prompt hacking to adversarial attacks and the less discussed but equally alarming issue of gradient exposure. As the conversation unfolds, we unravel the unnerving potential for these intelligent systems to inadvertently spill the beans on confidential training data, a privacy nightmare that transcends academic speculation and poses ..read more
Visit website
S5, E204 - Trust in the Age of Transparent Online Feedback
Privacy Please
by Cameron Ivey
3w ago
Our discussion takes a turn towards the skepticism now cast over Glassdoor and similar platforms. With anonymity in jeopardy, what's the true weight of an online review? We explore the pitfalls of anonymous comments devoid of context and the importance of leaning on personal networks for the real scoop on companies. The conversation doesn't shy away from the hard questions – it's a prompt for you to scrutinize digital platforms and their promises, urging a proactive stance on personal research. By the end of this thought-provoking dialogue, you'll be inspired to engage in deeper discussions an ..read more
Visit website
S5, E204 - Exploring the Privacy & Cybersecurity Risks of Large Language Models
Privacy Please
by Cameron Ivey
1M ago
Prepare to have your mind expanded as we navigate the complex labyrinth of large language models and the cybersecurity threats they harbor. We dissect a groundbreaking paper that exposes how AI titans are susceptible to a slew of sophisticated cyber assaults, from prompt hacking to adversarial attacks and the less discussed but equally alarming issue of gradient exposure. As the conversation unfolds, we unravel the unnerving potential for these intelligent systems to inadvertently spill the beans on confidential training data, a privacy nightmare that transcends academic speculation and poses ..read more
Visit website
S5, E203 - Trust in the Age of Transparent Online Feedback
Privacy Please
by Cameron Ivey
1M ago
Our discussion takes a turn towards the skepticism now cast over Glassdoor and similar platforms. With anonymity in jeopardy, what's the true weight of an online review? We explore the pitfalls of anonymous comments devoid of context and the importance of leaning on personal networks for the real scoop on companies. The conversation doesn't shy away from the hard questions – it's a prompt for you to scrutinize digital platforms and their promises, urging a proactive stance on personal research. By the end of this thought-provoking dialogue, you'll be inspired to engage in deeper discussions an ..read more
Visit website
S5, E203 - Is Privacy at Risk in the Age of Artificial Intelligence?
Privacy Please
by Cameron Ivey
1M ago
This week on Privacy Please, we'll dissect the challenges that technologists face in harmonizing AI and privacy in their systems, and consider the state of AI governance laws that are shaping our digital future. Plus, get ready for a tale that hits close to home, shedding light on real-world privacy concerns that could affect any of us. Support the show ..read more
Visit website
S5, E202 - The Next Chapter for NIST Cybersecurity Framework: Governance
Privacy Please
by Cameron Ivey
1M ago
Could the addition of 'Govern' to the NIST Cybersecurity Framework 2.0 be the game-changer in how we approach cybersecurity governance?  We unravel the significant evolution of the framework, now bolstering enterprise risk management with a holistic approach that's essential for any organization, big or small. We dissect the interplay of the six functions—Identify, Protect, Detect, Respond, Recover, and the new kid on the block, Govern—and how this integration across the entire lifecycle of protection can redefine the conventional cybersecurity steps. No stone is left unturned as we debat ..read more
Visit website
S5, E202 - The Next Chapter in Cybersecurity Strategies
Privacy Please
by Cameron Ivey
2M ago
Could the addition of 'Govern' to the NIST Cybersecurity Framework 2.0 be the game-changer in how we approach cybersecurity governance?  We unravel the significant evolution of the framework, now bolstering enterprise risk management with a holistic approach that's essential for any organization, big or small. We dissect the interplay of the six functions—Identify, Protect, Detect, Respond, Recover, and the new kid on the block, Govern—and how this integration across the entire lifecycle of protection can redefine the conventional cybersecurity steps. No stone is left unturned as we debat ..read more
Visit website

Follow Privacy Please on FeedSpot

Continue with Google
Continue with Apple
OR