Persec Podcast #12 – Mobile Device Security
This week on iPhone 8 release day, we dive into topics involving mobile device security. Sorry for Ken’s cold and gravely voice.
This week on iPhone 8 release day, we dive into topics involving mobile device security. Sorry for Ken’s cold and gravely voice.
This week, Zach and Ken take a quick detour to provide some updates on the Equifax breach and then dive into various methods of secure digital communications. Trigger warning: small amounts of tin foil present.
Zach and Ken get hacked. We discuss the Equifax breach and strategies for minimizing, mitigating, and preventing similar situations.
Zach and Ken take a brief overview of backups – one of our favorite topics. We discuss methods, technologies, and best practices to ensure your data stays safe!
Zach and Ken get back to business discussing VPN technologies, options, and considerations. We kept a straight face through this one.
Ken, high on a concoction of drugs due to recent injustices in the dental profession, joins Zach for some incoherent rambling on robots, AI, and the corporate plot to sap and impurify our precious personal data. Not sure about this one, folks.
In our most controversial show yet, we discuss the predominant internet company in the world: Google. We briefly cover our mutual history with the company, our admiration, fears, and what to do about it. Regardless if you’re a Googlebot or not, let us know what you think. We tried to play it fair :/.
We tried something different in this episode. Briefly straying away from our topic focused shows, we had a long discussion about our experiences with IT – on both sides of the equation. We complain about users and IT folks a like. Hate it? Let us know.
Join us as Zach and Ken take a pass at the technology that keeps us all safe on the web: encryption. We talk about some Australian idiocy, symmetric vs asymmetric, the big bad NSA, and some other topics. It’s a bit nerdy but we had a lot of fun.
Ken and Zach dive in to the gritty details of identification and authentication on the web. We cover important foundational topics such as hashing, salting, two-factor authentication and best practices to protect yourself. Pull up a chair, grab a coke, and give us a listen.