-
Nitin Natarajan is the deputy director of CISA (Cybersecurity and Infrastructure Security Agency), and has extensive experience in the cybersecurity space, including overseeing critical infrastructure for the U.S. Nation...
How ransomware works, from the anatomy of a hack to how the groups operate; the role of nation-states, insurers, and regulators; and what to do if your stuff is taken hostage...
From business email compromise to SIM ports, cyberattacks have shifted from networks to you. And it’s been an incredibly profitable pivot, with cyberhackers like GandCrab claiming earnings of $2.5M per week. How ca...
The recent Capital One data hack and breach that compromised sensitive information for 106 million people, including 140,000 Social Security numbers and 80,000 bank account numbers, was executed by a single hacker who ex...
As the responsibility of CSOs has expanded, the role has moved from technical IT to the boardroom. How do the best CSOs prepare for and respond to a crisis, from redteaming to comms? What responsibility should cloud & SaaS vendors, not to mention the government, have in security and data breaches?
Nitin Natarajan is the deputy director of CISA (Cybersecurity and Infrastructure Security Agency), and has extensive experience in the cybersecurity space, including overseeing critical infrastructure for the U.S. Nation...
Today’s episode is all about crypto security — that is, the new mindsets and the new strategies for storing crypto assets safely while also allowing holders control and access. (As a reminder, none of the following should be taken as investment advice, please see a16z.com/disclosures for more important information.) We’ve covered security trends more broadly a ton in our content, which you can find at a16z.com/security, as well as crypto-related trends including NFTs, and the creator and ownership economies. But as more people enter crypto lately — thanks to the boom in NFTs, decentralized finance, and much more — we share specific best practices and options for securing crypto as well as discussing how it all fits this next evolution of the internet: web3. Our expert today is a16z crypto data scientist Eddy Lazzarin, who joins host Zoran Basich. He covers practical approaches ranging from passwords to crypto wallets and what users can do; the evolution of crypto briefly; and the big picture mindset shifts involved here as well.
How ransomware works, from the anatomy of a hack to how the groups operate; the role of nation-states, insurers, and regulators; and what to do if your stuff is taken hostage...
In this special “3x”-long episode of our (otherwise shortform) news analysis show 16 Minutes, we cover the SolarWinds hack, one of the largest known hacks of all time... and the ripple effects are only now starting to be revealed, especially given latest news reports from the U.S. government. What actually happened, when does the timeline really begin? We help cut through the headline fatigue of it in this "anatomy of a hack" teardown -- the who, what, where, when, how -- from the chess moves to the step by step long game.
We're back to covering multiple items on our show 16 Minutes -- which covers the news, occasional explainers, and teases apart what's hype/ what's real -- as well as where we are on the long arc of innovation.
WHEN are we going to have a COVID-19 vaccine, and how the heck are we going from 12 years of vaccine development compressed into 12 months or so? What will and won’t be compromised here, and where do new technologies (like mRNA) come in? Where will vaccines likely be distributed first; who will and won't get them initially; how do we maintain not just safety and efficacy of vaccines but trust and transparency when it comes to mis/information? We may actually see the emergence of a "Neo Anti-Vaxxer"... but we may also be entering a renaissance for vaccinology after this pandemic.
Many don’t realize we even need to think about the possibility of security hacks when it comes to things like pacemakers, insulin pumps, and more. But when bits and bytes meet flesh and blood, security becomes literally a life or death concern. So what are the issues and risks we need to be aware of in exposing security vulnerabilities in connected biomedical devices?
In this week's episode of 16 Minutes on the News with Joel de la Garza, in conversation with Sonal Chokshi, we discuss the security and privacy concerns around Apple and Google’s approach, called "privacy-safe contact tracing". Yet technology is not the biggest part of this discussion; it’s also about rights, cultures, and values... and the bigger questions around what happens when people are "transformed into cellphone signals".
Going from rapid warning to early detection through social network sensors can make all the difference when it comes to contagion/ the spread of disease and pandemics. Can we get public health bio surveillance without sacrificing privacy and agency?
As the responsibility of CSOs has expanded, the role has moved from technical IT to the boardroom. How do the best CSOs prepare for and respond to a crisis, from redteaming to comms? What responsibility should cloud & SaaS vendors, not to mention the government, have in security and data breaches?
Nitin Natarajan is the deputy director of CISA (Cybersecurity and Infrastructure Security Agency), and has extensive experience in the cybersecurity space, including overseeing critical infrastructure for the U.S. Nation...