Strike Graph
Strike Graph
  • 216
  • 42 225
From Cryptography to Web 3 powered by Blockchain with David Holtzman
The state of networked computing systems today relies heavily on a networking architecture designed and implemented by people like David Hotlzman, our guest on Secure Talk. But what if our current “world wide web” was just the progenitor of an n-dimension “internet stack”? Does Web 3 offer the opportunity to evolve a seemingly monolithic internet?
In this episode of SecureTalk, host Justin Beals interviews David Holtzman, the brains behind the global domain name registration system and a former NSA analyst. They delve into the history and evolution of the DNS, discussing how it transformed from a single 'host.txt' file to a robust global system impacting millions of domain names. David shares his thoughts on decentralization, the potential of blockchain technology, and the future of cybersecurity in the wake of quantum computing. They also touch on the implications of AI, the cyclical nature of tech fads, and the importance of innovative yet secure solutions in today's rapidly evolving cyber environment. This episode is a must-listen for cybersecurity experts interested in the complex interplay between technology, governance, and security.
Переглядів: 4

Відео

Behind the Ballot: Election Security Insights with Mark Listes [Full Video]
Переглядів 104 години тому
It is election season in the United States and there continues to be a lot of FUD around the security of our elections. We decided to sit down with an expert to discuss election security and how citizens here in the United States should consider this civic event. Join host Justin Beals and guest Mark Listes as they delve into the critical topic of election security. Mark, CEO of Pendulum and fo...
Behind the Ballot: Election Security Insights with Mark Listes
Переглядів 1519 годин тому
It is election season in the United States and there continues to be a lot of FUD around the security of our elections. We decided to sit down with an expert to discuss election security and how citizens here in the United States should consider this civic event. Join host Justin Beals and guest Mark Listes as they delve into the critical topic of election security. Mark, CEO of Pendulum and fo...
Secure Talk - Bruce Schneier
Переглядів 1221 годину тому
Secure Talk - Bruce Schneier
The Human Toll of Jobs / Security with Danny Goodwin & Edward Schwarzschild
Переглядів 1314 днів тому
In this episode of Secure Talk, host Justin Beals sits down with Danny Goodwin and Ed Schwarzschild, the authors of the book 'Job / Security: A Composite Portrait of the Expanding American Security Industry'. They delve into the multifaceted world of security work, bridging personal experiences and professional insights. Goodwin, a professor and chair of the Department of Art and Art History, a...
Secure Talk - Sheryl Hsu
Переглядів 121 день тому
Secure Talk - Sheryl Hsu
Hack to Learn: Integrating Humanities into Cybersecurity with Aaron Mauro
Переглядів 3014 днів тому
How do we predict the future? In our respective technology and security fields we are often asked to prognosticate on “what’s next?”. Understanding current trends is certainly helpful but what if you could reach far into the future and describe humanity and our relative progress? In this week's episode of SecureTalk we host an Associate Professor of Digital Media at Brock University, to discuss...
Redefining Cybersecurity Strategies
Переглядів 514 днів тому
In this episode of Secure Talk, Justin Beals, founder and CEO of Strike Graph, hosts Bruce Schneier, a renowned security technologist, author, and lecturer at the Harvard Kennedy School. Schneier discusses his book 'A Hacker's Mind,' sharing insights into the psychology of security, societal impacts of cybersecurity, and how businesses can better align security practices with human psychology. ...
Security Threats from the Chrome Web Store with Sheryl Hsu
Переглядів 514 днів тому
Have you ever wondered how secure your browser extensions really are? On our latest Secure Talk episode join us for a discussion with Sheryl Hsu, a researcher from Stanford Empirical Security Research Group. We discuss their recent paper “What is in the Chrome Web Store? Investigating Security-Noteworthy Browser Extensions.” Sheryl and the team at the Stanford Empirical Security Research Group ...
Unraveling the Layers of HIPAA: A Deep Dive into Data Security with Iliana Peters
Переглядів 314 днів тому
In this episode of SecureTalk, host Justin Beals, CEO of StrikeGraph, discusses the complexities of HIPAA, data privacy, and healthcare security with expert Ileana Peters, a shareholder at Polsinelli. Once a leader in regulatory enforcement for US Health and Human Services she talks with Justin on how to manage compliance. Peters shares insights from her extensive experience at the Department o...
Navigating HIPAA Compliance with Confidence
Переглядів 214 днів тому
In December 2023 the U.S. Department of Health and Human Services reported that the medical data of more than 88 million people was exposed in the first ten months of 2023. A 2018 Trustwave Global Security Reported that a single healthcare record would receive an average of $250.15 when sold, 50 times more valuable than a stolen credit card. 92% of stolen patient records were criminally acquire...
Crisis Fighting: How to plan a successful security incident
Переглядів 1314 днів тому
It seems a new security crisis is emerging at a weekly pace. The emergence of critical security breaches, data exposures and digital infrastructure failures has vastly accelerated in the last 5 years. What happens when your job is to operate in a crisis? Join us for the next episode of Secure Talk where we sit down with Vice Admiral Mike LeFevre (ret.) the CEO of Concentric Security and Roderic...
Creating the dark web: How the TOR browser was invented
Переглядів 1614 днів тому
What software do radical techno-libertarians, the CIA, Privacy Advocates, the US State Department and Cyber Criminals use every day? The TOR Browser. In this compelling episode of SecureTalk, Justin Beals, the Founder and CEO of Strike Graph, discusses the book ‘Tor: From the Dark Web to the Future of Privacy’ with its author, Ben Collier, a Lecturer in Digital Methods at the University of Edin...
Cyber Threat Intelligence: Getting to know the adversary
Переглядів 614 днів тому
"They're not trying to be gracious here. They're trying to make as much money as they can with that personal data.” - Mary D'Angelo Join us for this Secure Talk podcast to unmask the activity of cyber criminals on the dark web. Mary D’Angelo, an expert in Cyber Threat Intelligence, helps us “follow the money” and understand the aggressive tactics being used by threat actors to steal and monetiz...
The #1 Vulnerability in Cybersecurity is Us.
Переглядів 314 днів тому
98% of cyberattacks rely on social engineering. An average business organization faces over 700 social engineering attacks annually. And 90% of data breach incidents target the human element to gain access to sensitive business information. How can understanding human psychology help your cybersecurity defense? On the latest SecureTalk, I engage in a profound conversation with Dr. Abbie Marono,...
Hacking a Nation: Alejandro Caceres’ Bold Attack on North Korea
Переглядів 2114 днів тому
Hacking a Nation: Alejandro Caceres’ Bold Attack on North Korea
Mastering the Role of CISO: Advice from Todd Fitzgerald
Переглядів 1114 днів тому
Mastering the Role of CISO: Advice from Todd Fitzgerald
Dynamic Data Safety: Purandar Das on Encryption and Beyond
Переглядів 114 днів тому
Dynamic Data Safety: Purandar Das on Encryption and Beyond
Strike Graph | Automate evidence testing with VerifyAI
Переглядів 783 місяці тому
Strike Graph | Automate evidence testing with VerifyAI
Decoding Cyber Resilience: Insights from Absolute Security's Christy Wyatt
Переглядів 714 днів тому
Decoding Cyber Resilience: Insights from Absolute Security's Christy Wyatt
A Perfect Fit: Using risk to get the right sized security with Christopher Hodson.
Переглядів 1814 днів тому
A Perfect Fit: Using risk to get the right sized security with Christopher Hodson.
The Algorithmic Mirror: Reflecting on Data’s Role in Modern Life
Переглядів 3614 днів тому
The Algorithmic Mirror: Reflecting on Data’s Role in Modern Life
Navigating Cyber Threats: FBI Perspectives on Protecting Business and Family
Переглядів 1314 днів тому
Navigating Cyber Threats: FBI Perspectives on Protecting Business and Family
Hacking the Human OS: Insights from Social Engineering Expert Christopher Hadnagy
Переглядів 1614 днів тому
Hacking the Human OS: Insights from Social Engineering Expert Christopher Hadnagy
Reputation as a risk: understanding the security threat of harmful narratives
Переглядів 2614 днів тому
Reputation as a risk: understanding the security threat of harmful narratives
Decoding Disaster: An Analysis of Four Pivotal Cybersecurity Breaches
Переглядів 1914 днів тому
Decoding Disaster: An Analysis of Four Pivotal Cybersecurity Breaches
Mastering Cyber Shadows: Alex Cox's Take On LockBit's Resilience And The Role Of Threat Intelligence
Переглядів 2514 днів тому
Mastering Cyber Shadows: Alex Cox's Take On LockBit's Resilience And The Role Of Threat Intelligence
Preventing phishing and ransomware: how Raffaele Mautone is safeguarding mid-size businesses
Переглядів 714 днів тому
Preventing phishing and ransomware: how Raffaele Mautone is safeguarding mid-size businesses
The Accountant Turned FBI Agent: Paul Bingham’s Contribution to Cybersecurity
Переглядів 1214 днів тому
The Accountant Turned FBI Agent: Paul Bingham’s Contribution to Cybersecurity
Working with Strike Graph
Переглядів 1626 місяців тому
Working with Strike Graph