Data @ Rest
33 FOLLOWERS
"Data at Rest" is an accessible but informed discussion of current concepts, best practices, and personal experiences in computer security, network security, and information security overall, including interviews with expert guests and the history of each topic.
Data @ Rest
9M ago
Recorded in front of a live audience at UNC CAUSE in October, 2022!
The Zero Trust Framework raises valid questions about risk reduction. But, as one CISO used to say, "we have to trust someone eventually, right?" Or do we? Universities, are built on a philosophy of openness and enrichment of public understanding. How do we preserve the public's trust while securing our resources, and is there a philosophical discussion to have around doing so?
Contact us:
dataatrest@unc.edu
Musical credit:
Pixelland Kevin MacLeod (incompetech.com) Licensed under Creative Commons: By Attribution 3.0 License ht ..read more
Data @ Rest
9M ago
Charlie and Michael are joined by Drew Trumbull, Incident Handling Team Lead for UNC Chapel Hill's Information Security Office, to talk about the latest threats we see and what folks should do if they think they might have been targeted successfully by them, plus the importance of compassion and empathy in our field. There are also side discussions of Michael's history as an employee of COBRA. Remember, every career is a journey.
Contact us:
dataatrest@unc.edu
Musical credit:
Pixelland Kevin MacLeod (incompetech.com) Licensed under Creative Commons: By Attribution 3.0 License http://creativeco ..read more
Data @ Rest
1y ago
Security and privacy are often mentioned hand-in-hand in our industry, but they're actually very different fields with different considerations and concerns--and the policies applying to one are not necessarily meant to address those of the other. Charlie and Michael welcome Kim Stahl, Senior Policy and Process Lead for UNC Chapel Hill's Information Technology Services, to discuss privacy, policy, and privacy policies.
Contact us:
dataatrest@unc.edu
Musical credit:
Pixelland Kevin MacLeod (incompetech.com) Licensed under Creative Commons: By Attribution 3.0 License http://creativecommons ..read more
Data @ Rest
1y ago
Charlie and Michael have discussed communicating security risks and strategies to older users and at-risk users, but what about students and younger users? We welcome guests Lila Davidson and Louise Flinn from the UNC Chapel Hill ITS Communications team to discuss things to consider when we do outreach focusing on students and others on the cusp of their professional lives.
Contact us:
dataatrest@unc.edu
Musical credit:
Pixelland Kevin MacLeod (incompetech.com) Licensed under Creative Commons: By Attribution 3.0 License http://creativecommons.org/licenses/by/3.0 ..read more
Data @ Rest
1y ago
Anyone who works in information security knows that we, perhaps more than any other IT sector, are reliant on a forest of vendors, each promising the moon and often duplicating others' capabilities. Join Charlie and Michael for a frank discussion of the best and worst parts of managing those vendor relationships and what we look to gain from them.
Contact us:
dataatrest@unc.edu
Musical credit:
Pixelland Kevin MacLeod (incompetech.com) Licensed under Creative Commons: By Attribution 3.0 License http://creativecommons.org/licenses/by/3.0 ..read more
Data @ Rest
1y ago
Welcome to Episode Zero of Data at Rest, an information security podcast intended to present accessible, informed discussions of various topics in computer, network, and information security. If you're curious about what to do when you receive a phishing email, the history of threat detection, or pop culture representations of the industry overall, this is the podcast for you!
Most episodes feature an expert guest, a history lesson, and a discussion of the current state of the topic.
All episodes of Season One release on September 16th, 2019. We hope you enjoy listening!
-The Data @ Rest Team ..read more
Data @ Rest
1y ago
Charlie and Michael discuss what "blockchain" means, its slightly mysterious history, its best-known applications, and their unfiltered opinions on the anciliary effects of some uses of this otherwise fascinating technology!
Contact us:
dataatrest@unc.edu
Musical credit:
Pixelland Kevin MacLeod (incompetech.com) Licensed under Creative Commons: By Attribution 3.0 License http://creativecommons.org/licenses/by/3.0 ..read more
Data @ Rest
1y ago
Charlie and Michael take a conversational look at a few fundamentals of security it never hurts to revisit and review.
Contact us:
dataatrest@unc.edu
Musical credit:
Pixelland Kevin MacLeod (incompetech.com) Licensed under Creative Commons: By Attribution 3.0 License http://creativecommons.org/licenses/by/3.0 ..read more
Data @ Rest
1y ago
There's been a lot of talk about election security for nearly two years now, most of it rife with conspiracy theories, misinformation, and disinformation. But what are the real risks to elections, and how do we mitigate them?
Links:
Election Security: Rumor vs. Reality (CISA.gov)
North Carolina State Board of Elections
Contact us:
dataatrest@unc.edu
Musical credit:
Pixelland Kevin MacLeod (incompetech.com) Licensed under Creative Commons: By Attribution 3.0 License http://creativecommons.org/licenses/by/3.0 ..read more
Data @ Rest
1y ago
Mobile Security is an evergreen concern and it only gets bigger and more mystifying. Charlie and Michael welcome back unofficial co-host Jared Perdue to discuss wireless and mobile security now and in the future!
Links:
Wireless Security Trends/CISO Cheat Sheet (excerpt from Jennifer Minella's talk)
https://lastpass.unc.edu
How to Keep Your Mobile Devices Secure (article by Jared Perdue at its.unc.edu
Contact us:
dataatrest@unc.edu
Musical credit:
Pixelland Kevin MacLeod (incompetech.com) Licensed under Creative Commons: By Attribution 3.0 License http://creativecommons.org/licenses/by/3.0 ..read more