Peggy addresses the latest Pokémon GO craze and says it has brought up some serious safety and privacy issues.
Paul Sakamoto, COO, Savari, explains the company’s mission is to save lives with its V2X (Vehicle-to-Everything) communications technology.
Scott Meyer, CEO, Ghostery, explains privacy is by design and is really dependent on how a product is built.
Kevin Du, IEEE senior member, professor of electrical engineering and computer science, Syracuse University, explains 80% of Web applications have vulnerabilities and there is no way to protect systems 100%.
Deidre Diamond, founder and CEO, CyberSN and founder, Brainbabe, says when it comes to cyber security awareness, corporations have to step up their game.
Mahbubul Alam, CTO/CMO, Movimento Group, says any time you have wireless technology, it cannot go without security.
Stu Sjouwerman, founder and CEO, KnowBe4, says the moment you have a website or email, you become a target for cyber criminals.
Peggy discusses the fatal accident involving a Tesla Model S in autopilot mode and says we cannot stop innovation because we are afraid, instead we must learn from our mistakes when leveraging technology.
Kim Jones, director, cybersecurity education consortium, Arizona State University, explains the goal of the consortium is talent creation and talent enrichment.
Kevin Curran, senior lecturer, computer science, University of Ulster, says ransomware is the worst thing to hit the industry in a long time.
Travis Smith, senior security research engineer, Tripwire, says humans have an emotional connection to their data which is why ransomware is so successful.
Peggy explains there are many different kinds of ransomware and says fear is the reason it is so effective.
Paul Lipman, CEO, Bullguard, explains consumers recognize there is a problem with Internet of Things security, but have a limited set of options to really do anything about with it.
Peggy addresses a recent 2016 NowSecure Mobile Security which says 25% of mobile apps have at least one high-risk security flaw.
Krish Kupathil, CEO, Mobiliya Technologies, says security cannot be stressed enough when it comes to IoT (Internet of Things).
Alex Herceg, analyst, Lux Research, says in terms of privacy some of the data and devices can listen to things we are saying and know where people are in a retail store, and we need consumers to understand what the privacy implications are.
Joe Wiesenfelder, executive editor, Cars.com, says consumers are not concerned about hackers wirelessly breaking into cars, and that surprised him that it was even possible because automobiles are not evolving as quickly and are risk averse.
Peggy addresses the recent hack of the Fraternal Order of Police, and warns that we will need to be on the lookout for cyber criminals who change or manipulate data, not just steal it.
Larry Ponemon, chairman and founder, Ponemon Institute, and member of the Visual Privacy Advisory Council, says visual hacking is where the bad guy observes surfing that is on your screen or printed material; it is anything you can gather visually and then used for nefarious purposes.
Herman Yau, cofounder and CEO, Tend, says the product is created to address some of the key problems for home security.
Aike Müller, cofounder, Keezel, says the device is a portable Internet security device and it protects you on Wi-Fi networks.
Luc Darmon, chief marketing officer, Decawave, says it has been designing an exciting technology and integrating it into a single chip.
Peggy says there are some hackers on our side, trying to do some positive things and ‘ethical hacking.’ On the automotive side, she asks, however: How can people guarantee these white-hat hackers are ethical when they have to think like the bad guys?
Matt Duffy, vice president of marketing, connected products and customers, LogMeIn, explains security is of the utmost importance with anything that has to do with connectivity, but particularly in the IoT.
Peggy says cyber criminals are not resting and everyone needs to focus on cybersecurity.
Peggy explains the latest research from Hewlett-Packard involving smartwatch security finds smartwatches are highly vulnerable to attacks, and that 100% of the smartwatches HP tested exhibited security flaws.
Juan Lazcano, vice president of M2M, North American Gemalto, says Gemalto supports deployment of M2M and IoT (Internet of Things) in regards to security through three basic elements including the device with credentials and data; ensure communication between device and backend is secure; and on the server side by having the same type of mechanism when securing and keeping information in safe place.
Melani Griffith, executive vice president of business development, Penthera Partners, explains how its software manages the delivery of content via consumer devices and touches on the importance of Internet security.
Peggy looks at two new security reports, one of which says that cyber criminals often get money using dated techniques that indicate companies need to be more prepared.
Peggy asks the question, if legitimate Websites such as Forbes can be compromised by a watering hole attack to deliver malware, is there any way to be safe online?
In the wake of the recent Premera hacking, Peggy evaluates the total damages caused to date and calls for CEOs to focus more attention to cybercrime threats.
As the connected-car market is predicted to explode, Peggy discusses the inevitably of hacking and questions with whom the liability lay.
Are companies doing enough with their IoT (Internet of Things) data to see an acceptable ROI? Peggy asks this, and more, on this week’s show.
With hackers working so hard to find ingenious ways to access our personal information, why make their jobs any easier, remarks Peggy as she discusses a recent survey on password behavior.
Ransomware is fast becoming the cyber extortionists’ tool of choice.
Deidre Diamond, CEO and founder, Cyber Security Network, says CEOs and company leaders need to realize the threat of cybercrime is real, and hire their cybersecurity professionals accordingly.
Scott Schober, president and CEO, Berkeley Varitronics Systems, says drones could vastly improve the process of online shopping and delivery, but could just as easily be used for acts of remote terrorism and hacking.
Seth Danberry, president and cofounder, Grid32, says businesses need to gauge their security systems with penetrative tests before any weaknesses are exploited by hackers.
With the recent announcement that Gemalto SIM cards were hacked by the governments of America and the United Kingdom, Peggy wonders what could possibly justify such a mass invasion of privacy.
Jim Drylie, Ph.D., executive director School of Criminal Justice & Public Administration College of Business & Public Management, Kean University, says that ignoring the problem is only making it worse; the key to cybersecurity is proactivity and preparation.
Scott Schober, president and CEO, Berkeley Varitronics Systems, continues his discussion with Peggy, this time explaining the potential weakness of our critical infrastructure to cyber threats.
In a special edition of The Peggy Smedley Show coming live from CWC15, Scott Schober, president and CEO, Berkeley Varitronics Systems, lists cybersecurity tips that are simple to implement, and may save you a lot of hassle and money.
BYOD (bring your own device) offers many conveniences to company employees, but it also presents risks to company networks.
Brian Zaugg, director of information security, Authentic8 Inc., explains the architectural principles underlying cyber security, and the practical risks presented my M2M and IoT.
Jim Drylie, Ph.D., executive director School of Criminal Justice & Public Administration College of Business & Public Management, Kean University, says executives are ignoring the problem of cyber security, and if they continue to do so the results will be catastrophic.
For two years, they watched and waited for opportunities to siphon money.