Home
Categories
EXPLORE
True Crime
Comedy
Society & Culture
Business
Sports
News
Health & Fitness
About Us
Contact Us
Copyright
© 2024 PodJoint
00:00 / 00:00
Sign in

or

Don't have an account?
Sign up
Forgot password
https://is1-ssl.mzstatic.com/image/thumb/Podcasts221/v4/03/52/1e/03521e45-0c6d-9dde-52bd-ef051b653309/mza_14822785934780596798.jpg/600x600bb.jpg
Privacy Please
Cameron Ivey
265 episodes
6 days ago
Send us a text We look back at 2025’s privacy and security reality: useful AI where data was ready, repeating breach patterns, and infrastructure limits that slowed the hype. We call out backdoors, weak 2FA, and the shift toward passkeys, decentralization, and owning more of our stack. • AI succeeds when data, process and governance are mature • Power, chips and cost constraints limit AI growth • SALT Typhoon shows backdoor risk and patching failures • SMS 2FA remains weak while passkeys gai...
Show more...
Tech News
Comedy,
Technology,
News
RSS
All content for Privacy Please is the property of Cameron Ivey and is served directly from their servers with no modification, redirects, or rehosting. The podcast is not affiliated with or endorsed by Podjoint in any way.
Send us a text We look back at 2025’s privacy and security reality: useful AI where data was ready, repeating breach patterns, and infrastructure limits that slowed the hype. We call out backdoors, weak 2FA, and the shift toward passkeys, decentralization, and owning more of our stack. • AI succeeds when data, process and governance are mature • Power, chips and cost constraints limit AI growth • SALT Typhoon shows backdoor risk and patching failures • SMS 2FA remains weak while passkeys gai...
Show more...
Tech News
Comedy,
Technology,
News
https://is1-ssl.mzstatic.com/image/thumb/Podcasts221/v4/03/52/1e/03521e45-0c6d-9dde-52bd-ef051b653309/mza_14822785934780596798.jpg/600x600bb.jpg
S6, E248 - Inside the Walls: Military's Stark Warning on Network Compromise
Privacy Please
11 minutes
5 months ago
S6, E248 - Inside the Walls: Military's Stark Warning on Network Compromise
Send us a text The US military has issued a stark warning to all forces to operate under the assumption that their networks have been compromised by Salt Typhoon, a sophisticated threat actor with ties to the Chinese government. This breach highlights the urgency for organizations to adopt Zero Trust principles as cyber warfare becomes the new battlefield. • Zero Trust is a framework, not a single product or technology • The first tenant of Zero Trust is treating networks as already compromi...
Privacy Please
Send us a text We look back at 2025’s privacy and security reality: useful AI where data was ready, repeating breach patterns, and infrastructure limits that slowed the hype. We call out backdoors, weak 2FA, and the shift toward passkeys, decentralization, and owning more of our stack. • AI succeeds when data, process and governance are mature • Power, chips and cost constraints limit AI growth • SALT Typhoon shows backdoor risk and patching failures • SMS 2FA remains weak while passkeys gai...