Chapters
Transcript
Episode notes
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29
Introduction
00:00 • 4min
How to Be a Successful Computer Programmer
03:34 • 2min
The History of Computer Programming
05:24 • 4min
The Evolution of the Hacker Wars
09:14 • 4min
The Evolution of the Hacking Scene
13:13 • 2min
The Economic Espionage of China
15:03 • 4min
The Progress of China's Chips Act
19:06 • 2min
The Importance of a Smart Strategy for the United States
20:42 • 3min
The Threat Landscape in the US
23:40 • 4min
The Cost of Data Weaponization
27:12 • 2min
The Potential Revenue of Ransomware Data Extraction
29:33 • 2min
The US Is the Primary Target for Data Weaponization
31:03 • 3min
The Pain of Data Leaks
34:03 • 2min
The Double-Edged Sword: Avoiding Breach
36:04 • 3min
How to Stop a Breach With Machine Learning
39:17 • 4min
The Power of Zero Days in Cybersecurity
43:32 • 5min
The Russia-Ukraine Situation Playing Out
48:49 • 5min
The Role of Cyber in Geopolitics
53:53 • 2min
The Threat of Disinformation Misinformation in the US Election
55:37 • 4min
The Rise of Deep Fakes on Social Media
59:13 • 2min
How to Discern if a File Is Not Real
01:01:23 • 2min
The Problem With Social Media Trolls
01:03:09 • 3min
The Scariest Cyber Related Attack That Was Prevented
01:06:31 • 2min
The 2016 Hacks
01:08:50 • 4min
The Russians and the US Election
01:13:17 • 2min
The Threat of Bias
01:14:59 • 2min
Fancy Bear, Cozy Bear: A Crypto Name System
01:16:43 • 2min
The Importance of Understanding the Origin of Threats
01:19:02 • 5min
The Importance of Threat Hunting
01:23:46 • 2min