Data Security and Privacy with the Privacy Professor

There are more information security and privacy threats than ever before. As more technologies emerge, more surveillance tactics are used, and more artificial intelligence systems are deployed, cybersecurity and privacy risks grow exponentially. Rebecca has spent her entire career working to improve information security and privacy protections, by not only raising awareness of the issues within businesses and other types of organizations, but also by raising the awareness of these risks in the public and helping them to understand how to better protect their own personal data, allowing them to take their privacy protections into their own hands. Rebecca offers information about these existing and emerging security and privacy risks and provides fresh insights into the impacts of exploiting these risks, and gives guidance, tips, expert advice and news, with fascinating guests, to help all organizations, and the general public, understand what they need to do to mitigate these risks.

The History, Mystery, and Rise of AI at CornCon!

Dr. John Johnson describes why he created the wildly popular cybersecurity conference, CornCon! It was first held in 2015, in Davenport, Iowa on the banks of the Mississippi River.

10-07
56:06

A Romance Scammer Took All My Dying Mother's Money

April describes the horrific harms that romance scammers caused her mother while terminally ill with cancer, and Kathy describes the upcoming World Romance Scam Prevention Day that her organization established. A must-listen-to episode!

08-05
54:56

GDPR Compliance Stats Everyone, Everywhere, Needs to Know!

The EU General Data Protection Regulation (GDPR) has been in effect for 5 years now.

07-01
54:07

Individuals & Businesses: Mitigate! Those! Risks!

Everyone is at risk of cybercrime, privacy breaches, and associated physical risks.

06-03
55:28

IoT Stalking, IoT Jewelry, JuiceJacking, AI, CheckWashing & More!

In this episode Rebecca continues answering a few more of the hundreds of questions she has received from listeners and readers throughout the past few months, covering a wide range of topics.

05-06
55:05

AI Challenges & Risks: Security, Privacy, Bias & Ethics

AI has quickly become pervasive in all our lives. But, how can it impact us? Consider a couple of examples. Lensa is an app that takes real photos and uses AI to make art images from them. Millions have used it.

04-01
57:01

“Romance Scammers Have Used My Photos Since 2016”

Bryan Denny served as an officer in the U.S. Army for 26 years. In 2016, Bryan’s photos were stolen and used to build thousands of fake profiles.

03-04
54:41

Dobbs Leak, Airtags, Spam, Spoofed Email, & Data Privacy Day!

It has been almost three years since Rebecca has done a show answering listener questions; it is time she did another one! In this episode she answers a wide range of questions.

02-04
53:56

A Cybersecurity Expert’s Real Life Identity Theft Experience

Everyone is a target for identity thieves. Even the most brilliant cybersecurity and privacy experts.

01-07
55:41

Let’s Stop the Robocall Scammers!

Everyone is inundated with robocalls! Many of them are legitimate, such as those providing notifications about environmental threats such as hurricanes and tornadoes. And those giving alerts about missing persons.

11-05
56:33

Action is Necessary to Improve Voting & Elections Security!

Many claims have been, and still are being, made about elections and voting security, more than ever since the 2020 election. Some claim there was widespread “voting fraud.

09-03
54:41

Secure Coding Fixes the Top 25 Most Dangerous Software Weaknesses

In the news every day are security incidents and privacy breaches caused by software programming errors, sloppy practices, lack of sufficient testing, and many other engineering-, coding-, and programming-related reasons.

08-06
54:52

IoT Data Creates Frankenstein Profiles Claiming to Be You

There are an estimated 20 – 30 billion “smart” internet of things (IoT) devices currently used in the world.

07-02
53:57

Catching KGB Hackers with 75¢ and a 2400 Baud Modem

Nation state hackers have been trying to get into the secrets stored on computers for decades.

06-04
55:36

How Stalkers & Assaulters Track & Find Victims with IoT Tech

Assaulters and stalkers are increasingly using technologies to target, surveil, and attack their victims. IoT tech in particular is increasingly being used.

05-07
51:18

What Do UNIX, Linux & Dirty Pipe Have in Common? Listen To Hear!

A lot of news has been released lately about the Dirty Pipe vulnerability in the Linux OS.

04-02
55:00

Transportation Cybersecurity & Privacy: Highway to Digital Hell?

There have been many reports about over-the-road trucking delays causing problems throughout the full supply chain and delaying deliveries of critical products throughout all industries.

03-05
55:01

Mgh

You've been lazy lately😉

12-11 Reply

Recommend Channels