Home
Categories
EXPLORE
True Crime
Comedy
Business
Society & Culture
History
Sports
Technology
About Us
Contact Us
Copyright
© 2024 PodJoint
00:00 / 00:00
Sign in

or

Don't have an account?
Sign up
Forgot password
https://is1-ssl.mzstatic.com/image/thumb/Podcasts221/v4/03/52/1e/03521e45-0c6d-9dde-52bd-ef051b653309/mza_14822785934780596798.jpg/600x600bb.jpg
Privacy Please
Cameron Ivey
265 episodes
6 days ago
Send us a text We look back at 2025’s privacy and security reality: useful AI where data was ready, repeating breach patterns, and infrastructure limits that slowed the hype. We call out backdoors, weak 2FA, and the shift toward passkeys, decentralization, and owning more of our stack. • AI succeeds when data, process and governance are mature • Power, chips and cost constraints limit AI growth • SALT Typhoon shows backdoor risk and patching failures • SMS 2FA remains weak while passkeys gai...
Show more...
Tech News
Comedy,
Technology,
News
RSS
All content for Privacy Please is the property of Cameron Ivey and is served directly from their servers with no modification, redirects, or rehosting. The podcast is not affiliated with or endorsed by Podjoint in any way.
Send us a text We look back at 2025’s privacy and security reality: useful AI where data was ready, repeating breach patterns, and infrastructure limits that slowed the hype. We call out backdoors, weak 2FA, and the shift toward passkeys, decentralization, and owning more of our stack. • AI succeeds when data, process and governance are mature • Power, chips and cost constraints limit AI growth • SALT Typhoon shows backdoor risk and patching failures • SMS 2FA remains weak while passkeys gai...
Show more...
Tech News
Comedy,
Technology,
News
https://is1-ssl.mzstatic.com/image/thumb/Podcasts221/v4/03/52/1e/03521e45-0c6d-9dde-52bd-ef051b653309/mza_14822785934780596798.jpg/600x600bb.jpg
S6, E259 - Patch Tool Turns Predator
Privacy Please
10 minutes
2 months ago
S6, E259 - Patch Tool Turns Predator
Send us a text In this episode of Privacy Please, host Cameron Ivey discusses significant security threats, including a critical vulnerability in Microsoft's WSUS, a major data breach at the University of Pennsylvania, and the emergence of sophisticated malware known as Glassworm. The conversation highlights the importance of cybersecurity measures and the potential consequences of negligence in IT security. Support the show
Privacy Please
Send us a text We look back at 2025’s privacy and security reality: useful AI where data was ready, repeating breach patterns, and infrastructure limits that slowed the hype. We call out backdoors, weak 2FA, and the shift toward passkeys, decentralization, and owning more of our stack. • AI succeeds when data, process and governance are mature • Power, chips and cost constraints limit AI growth • SALT Typhoon shows backdoor risk and patching failures • SMS 2FA remains weak while passkeys gai...