-
Eddy Lazzarin and Zoran Basich
Today’s episode is all about crypto security — that is, the new mindsets and the new strategies for storing crypto assets safely while also allowing holders control and access.
(As a reminder, none of the following should be taken as investment advice, please see a16z.com/disclosures for more important information.)
We’ve covered security trends more broadly a ton in our content, which you can find at a16z.com/security, as well as crypto-related trends including NFTs, and the creator and ownership economies.
But as more people enter crypto lately — thanks to the boom in NFTs, decentralized finance, and much more — we share specific best practices and options for securing crypto as well as discussing how it all fits this next evolution of the internet: web3.
Our expert today is a16z crypto data scientist Eddy Lazzarin, who joins host Zoran Basich. He covers practical approaches ranging from passwords to crypto wallets and what users can do; the evolution of crypto briefly; and the big picture mindset shifts involved here as well.
-
Joel de la Garza, Das Rush, and Tom Hofmann
How ransomware works, from the anatomy of a hack to how the groups operate; the role of nation-states, insurers, and regulators; and what to do if your stuff is taken hostage...
-
Steven Adair, Joel de la Garza, and Sonal Chokshi
In this special “3x”-long episode of our (otherwise shortform) news analysis show 16 Minutes, we cover the SolarWinds hack, one of the largest known hacks of all time... and the ripple effects are only now starting to be revealed, especially given latest news reports from the U.S. government. What actually happened, when does the timeline really begin? We help cut through the headline fatigue of it in this "anatomy of a hack" teardown -- the who, what, where, when, how -- from the chess moves to the step by step long game.
-
Joel de la Garza, Ali Yahya, Zoran Basich, and Sonal Chokshi
We're back to covering multiple items on our show 16 Minutes -- which covers the news, occasional explainers, and teases apart what's hype/ what's real -- as well as where we are on the long arc of innovation.
-
Rajeev Venkayya and Jorge Conde
WHEN are we going to have a COVID-19 vaccine, and how the heck are we going from 12 years of vaccine development compressed into 12 months or so? What will and won’t be compromised here, and where do new technologies (like mRNA) come in? Where will vaccines likely be distributed first; who will and won't get them initially; how do we maintain not just safety and efficacy of vaccines but trust and transparency when it comes to mis/information? We may actually see the emergence of a "Neo Anti-Vaxxer"... but we may also be entering a renaissance for vaccinology after this pandemic.
-
Andy Coravos, Beau Woods, and Hanne Winarsky
Many don’t realize we even need to think about the possibility of security hacks when it comes to things like pacemakers, insulin pumps, and more. But when bits and bytes meet flesh and blood, security becomes literally a life or death concern. So what are the issues and risks we need to be aware of in exposing security vulnerabilities in connected biomedical devices?
-
Joel de la Garza and Sonal Chokshi
In this week's episode of 16 Minutes on the News with Joel de la Garza, in conversation with Sonal Chokshi, we discuss the security and privacy concerns around Apple and Google’s approach, called "privacy-safe contact tracing". Yet technology is not the biggest part of this discussion; it’s also about rights, cultures, and values... and the bigger questions around what happens when people are "transformed into cellphone signals".
-
Nicholas Christakis and Jorge Conde
Going from rapid warning to early detection through social network sensors can make all the difference when it comes to contagion/ the spread of disease and pandemics. Can we get public health bio surveillance without sacrificing privacy and agency?
-
Joel de la Garza, Joe Sullivan, and Das Rush
As the responsibility of CSOs has expanded, the role has moved from technical IT to the boardroom. How do the best CSOs prepare for and respond to a crisis, from redteaming to comms? What responsibility should cloud & SaaS vendors, not to mention the government, have in security and data breaches?