Home
Categories
EXPLORE
True Crime
Comedy
Society & Culture
Business
Sports
News
Health & Fitness
About Us
Contact Us
Copyright
© 2024 PodJoint
00:00 / 00:00
Sign in

or

Don't have an account?
Sign up
Forgot password
https://is1-ssl.mzstatic.com/image/thumb/Podcasts211/v4/ac/b1/14/acb11479-b940-5587-8756-0471b45c56d6/mza_11528295852167454444.jpg/600x600bb.jpg
The IT Privacy and Security Weekly Update.
R. Prescott Stearns Jr.
338 episodes
3 days ago
Into year six for this award-winning, light-hearted, lightweight IT privacy and security podcast that spans the globe in terms of issues covered, with topics that draw in everyone from executive to newbie, to tech specialist. Your investment of between 15 and 20 minutes a week will bring you up to speed on half a dozen current IT privacy and security stories from around the world to help you improve the management of your own privacy and security.
Show more...
Tech News
News
RSS
All content for The IT Privacy and Security Weekly Update. is the property of R. Prescott Stearns Jr. and is served directly from their servers with no modification, redirects, or rehosting. The podcast is not affiliated with or endorsed by Podjoint in any way.
Into year six for this award-winning, light-hearted, lightweight IT privacy and security podcast that spans the globe in terms of issues covered, with topics that draw in everyone from executive to newbie, to tech specialist. Your investment of between 15 and 20 minutes a week will bring you up to speed on half a dozen current IT privacy and security stories from around the world to help you improve the management of your own privacy and security.
Show more...
Tech News
News
https://d3t3ozftmdmh3i.cloudfront.net/staging/podcast_uploaded_nologo/8957130/8957130-1736896711510-320cd6d6a9b8c.jpg
EP 267.5 Deep Dive. A Wrench in the IT Privacy and Security Weekly Update for November 18th., 2025
The IT Privacy and Security Weekly Update.
14 minutes 48 seconds
1 month ago
EP 267.5 Deep Dive. A Wrench in the IT Privacy and Security Weekly Update for November 18th., 2025

This week's security landscape is defined by three converging vectors: the expansion of threats into physical and environmental domains, persistent vulnerabilities in core digital infrastructure, and the escalating strategic battle over data, privacy, and artificial intelligence.The lines between digital and physical threats are dissolving, forcing a new risk calculus where leaders must model non-traditional, high-impact consequences. This is evident in the rise of physical coercion against cryptocurrency holders, known as 'wrench attacks,' and in corporate extortion campaigns. Checkout.com’s response—publicly refusing a ransom and instead donating the demanded sum to cybersecurity research at Carnegie Mellon and Oxford—demonstrates that integrity under real-world pressure is now a critical security posture. This new risk paradigm also encompasses environmental stability, with Iceland formally classifying the potential collapse of the AMOC ocean current as a national security risk. While these real-world threats demand new security paradigms, they are compounded by persistent weaknesses in the foundational digital infrastructure they often target.Foundational technologies continue to exhibit critical weaknesses that are being exploited with increasing subtlety. A simple enumeration flaw exposed 3.5 billion WhatsApp phone numbers—a vulnerability Meta was warned about using the exact same technique in 2017 but dismissed. In the software supply chain, a massive npm incident saw over 150,000 packages poisoned not with overt malware, but through nuanced incentive abuse. This trend culminates in the browser itself, which has become the primary theater for stealth attacks like session hijacking that render traditional perimeter defenses obsolete. This effectively redefines the enterprise perimeter, demanding a strategic pivot from network-centric to identity-centric security models. The pervasiveness of these foundational weaknesses is directly fueling a large-scale strategic response, escalating the battle over data control, user privacy, and AI.This strategic tug-of-war over data and dominance is now intensifying. On one side, legal challenges from the ACLU and EFF target pervasive surveillance networks like Flock's license plate readers. On the other, a push for user empowerment is gaining momentum through privacy-centric technologies. Windows 11's expanded native support for passkeys and Google's new Private AI Compute platform signal a market shift toward giving users greater control over their data and authentication. This conflict extends to the geopolitical stage, where the US and China are now engaged in an AI 'cold war,' racing for supremacy in a technology that will redefine global power.Security is now a multi-front concern where digital infrastructure, physical safety, and geopolitical strategy are inextricably linked.

The IT Privacy and Security Weekly Update.
Into year six for this award-winning, light-hearted, lightweight IT privacy and security podcast that spans the globe in terms of issues covered, with topics that draw in everyone from executive to newbie, to tech specialist. Your investment of between 15 and 20 minutes a week will bring you up to speed on half a dozen current IT privacy and security stories from around the world to help you improve the management of your own privacy and security.