Archives for Richard Steinnon

1609 Earables and Scamming the Dark Web

[vc_row][vc_column][vc_single_image image=”12056″ img_size=”large” alignment=”center” title=”Earables”][vc_separator color=”black” border_width=”3″][vc_cta h2=”Find us on iTunes by subscribing to “Internet Advisor-Podcast Feed“”]

Don’t forget to follow us on Facebook for more information during the week.

[/vc_cta][vc_separator color=”black” border_width=”3″][vc_column_text]

Show Notes:

Hour 1

[/vc_column_text][/vc_column][/vc_row][vc_row][vc_column width=”1/2″][vc_single_image image=”12057″ img_size=”large”][vc_column_text]Richard StiennonRichard Stiennon, chief Analyst at IT-Harvest and an internationally recognized security expert joined us to give his feedback on the RSA conference just concluded in San Francisco.

Richard also shared his analysis of Project Cumulus, a “honey pot” developed by security firm Bitglass to attract hackers in the deep web to steal tainted data and then follow them to see where they went.

Click Here to Listen to Richard Stiennon on RSA[/vc_column_text][/vc_column][vc_column width=”1/2″][vc_single_image image=”12055″ img_size=”large” alignment=”right”][vc_column_text]Jack Wallen_Heidi's Pick SixJack Wallen is a renowned columnist for TechRepublic who recently published a fascinating article entitled, “Earables, the Next Big Thing”. It turns out that the ear canal is a far better place to be harvesting biometrical information, listening to music and gathering fitness data.  That is just the beginning of what will be a wild ride in the next decade and we are all invited to “stick it in your ear!” ;-D

Click Here to Listen to Jack Wallen


Read More

Halloween Special: Cyberwar and Poisoned Downloads

[vc_row][vc_column][vc_separator color=”black” border_width=”3″][vc_cta h2=”Click Here to Download This Week’s Podcast”]

Halloween Special: Cyber War & Poisoned Download

[/vc_cta][vc_separator color=”black” border_width=”3″][vc_column_text]

Show Notes:

Hour 1

[/vc_column_text][/vc_column][/vc_row][vc_row][vc_column width=”1/2″][vc_single_image image=”10601″ img_size=”full” alignment=”center”][/vc_column][vc_column width=”1/2″][vc_column_text]
Richard StiennonRichard Stiennon
has been a frequent guest on the Internet Advisor when it comes to all things cyber security.  Richard is a security expert and industry analyst, known for shaking up the industry and providing actionable guidance to vendors and end users. He recently relaunched the security blog ThreatChaos.com and is the founder of IT-Harvest, an independent analyst firm that researches the 1,200 IT security vendors. He was Chief Marketing Officer for Fortinet, Inc. the leading UTM vendor. Prior to that he was VP Threat Research at Webroot Software.

Click Here to Listen to Richard Stiennon[/vc_column_text][/vc_column][/vc_row][vc_row][vc_column width=”1/2″][vc_column_text]CalCal Carson is our resident expert on all things Apple.  The Apple TV that is just arriving is one of the most anticipated devices to be launched by the folks from Cupertino.  The question is: Has Apple been able to shake up the set top market that so far seems to be owned by Roku’s excellent 4th generation device.  Cal will give us the highlights and the challenges behind the new Apple …


Read More

TrustPipe Offers New Security Solution for $5/Year

There are four key metrics for evaluating computer security solutions; TrustPipe provides greater than 10X improvements across all four:

  1. ACCURACY — In years of testing and real-world usage, there have been zero false positives (acceptable traffic blocked) and zero false negatives: no device protected by TrustPipe has eversuffered a remote root compromise. (but…)
    We’ve caught every “zero-day” event (a “new” attack vector) since we began testing – even ones no other technology detected. (but…)
    We are unaware of any other technology that can support these claims.
  2. EFFICIENCY — TrustPipe’s footprint is actually more than two orders of magnitude smaller than traditional solutions. And its impact on overall system performance is nearly undetectable.
  3. RESILIENCE — TrustPipe automatically adapts to changes in the threat environment, in real time. Within minutes of detecting a true zero-day event, the entire global hive of TrustPipes is inoculated against it.
  4. COST — TrustPipe’s technology allows us to operate far more efficiently as a business. We do not require the teams of people most security technologies need to stay current. And by keeping the team small and focused, we didn’t have to raise the large amounts of capital most security companies require

Read More