Scott Aurnou joins Jim Blasingame to report on IBM’s use of their Watson super-computer as a resource to help with quicker responses to cyber-security threats.
Scott Aurnou joins Jim Blasingame to reveal some of the tricky issues that arise when you overlay the constitution, specifically the 4th and 5th amendments, and your digital rights.
Scott Aurnou joins Jim Blasingame to reveal some of the challenges you and law enforcement have when trying to protect us from cyber-criminals and terrorists while preserving our civil rights.
Scott Aurnou joins Jim Blasingame to reveal some of the challenges the Internet of things is creating as we seek convenience in a very dangerous world.
Scott Aurnou joins Jim Blasingame to reveal some of what he had to go through in order to get the very difficult CISSP credential in cyber-security, and why that’s good for Jim’s audience.
Scott Aurnou joins Jim Blasingame to discuss what is known about the Russian involvement in the 2016 election, including the different elements of intrusion, and to conclude that they did try to influence the results.
Scott Aurnou joins Jim Blasingame to reveal the world of the Internet of Things, and why he thinks it could become a very dangerous exposure to cyber-attacks.
Scott Aurnou joins Jim Blasingame to reveal some of the information security practices to apply, including how to avoid becoming a victim of credit card skimmers when you check out in retail stores.
Scott Aurnou joins Jim Blasingame to report on the new information security document for small business, and why he recommends you read it, plus a Facebook instant messenger threat to avoid.
Scott Aurnou joins Jim Blasingame to recommend reviewing where your organization could be exposed to threats against your information, digital and online assets, and activity.