Chapters
Transcript
Episode notes
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22
Introduction
00:00 • 2min
What's Going on in the Cyber Security Community?
01:37 • 2min
The Supply Chain of Network Routers
03:39 • 3min
Have You Actually Inspected Your Computers?
06:36 • 2min
Is There a Way to Compromise Devices?
09:01 • 2min
How to Turn Gmail End-to-End Encryption on ASAP
10:38 • 2min
What Is End-to-End Encryption on an Email Service?
12:39 • 2min
Antenn Encryption
15:07 • 2min
Is Gmail Having a Confidential Mode?
17:08 • 2min
Cryptography - What's It All About?
19:06 • 2min
Is the App Secure?
20:43 • 2min
Are You Aware of What You're Sharing With Others?
22:54 • 2min
Are You Proactive With Your Security?
24:29 • 2min
Cell Phone Forensics - What's the Biggest Breakdown?
26:50 • 2min
Cell Phone Forensics - Is There a Hacker?
29:06 • 3min
How Do You Move 1.7 Terabytes?
32:04 • 3min
What's the Benefit of Leakage?
35:14 • 2min
Was Time a Part of the Attack?
36:56 • 2min
Hacker in the Federal Talk - Is There a Hacking Problem?
38:27 • 3min
Is There a Problem With Complexity Requirements?
41:03 • 2min
Password Audits - What's the Problem?
42:51 • 2min
Are You Seeing 6,000 Inactive Accounts?
44:45 • 6min