Artwork

Inhalt bereitgestellt von Dr. Stan Stahl and Julie Morris, Dr. Stan Stahl, and Julie Morris. Alle Podcast-Inhalte, einschließlich Episoden, Grafiken und Podcast-Beschreibungen, werden direkt von Dr. Stan Stahl and Julie Morris, Dr. Stan Stahl, and Julie Morris oder seinem Podcast-Plattformpartner hochgeladen und bereitgestellt. Wenn Sie glauben, dass jemand Ihr urheberrechtlich geschütztes Werk ohne Ihre Erlaubnis nutzt, können Sie dem hier beschriebenen Verfahren folgen https://de.player.fm/legal.
Player FM - Podcast-App
Gehen Sie mit der App Player FM offline!

54: When policy is YEARS behind today's digital world

12:02
 
Teilen
 

Manage episode 399062110 series 3437085
Inhalt bereitgestellt von Dr. Stan Stahl and Julie Morris, Dr. Stan Stahl, and Julie Morris. Alle Podcast-Inhalte, einschließlich Episoden, Grafiken und Podcast-Beschreibungen, werden direkt von Dr. Stan Stahl and Julie Morris, Dr. Stan Stahl, and Julie Morris oder seinem Podcast-Plattformpartner hochgeladen und bereitgestellt. Wenn Sie glauben, dass jemand Ihr urheberrechtlich geschütztes Werk ohne Ihre Erlaubnis nutzt, können Sie dem hier beschriebenen Verfahren folgen https://de.player.fm/legal.

“Unfortunately, the technology underpinning our critical infrastructure is inherently insecure because of DECADES of software developers NOT BEING HELD LIABLE for defective technology. That has led to incentives where FEATURES and SPEED to market have been prioritized AGAINST SECURITY, leading our nation VULNERABLE to cyber invasion. That has to stop,” Jen Easterly, CISA

The policy we need is YEARS behind the current technology, and utterly inadequate to protect citizens against threats and scams.

We lack protections and bear the brunt of the damage.

Two clear examples -

1: SIM swapping.

A bad actor was able to convince a telecommunications store to transfer a phone number to a new device by impersonating the owner. This allowed the criminal to:

- Access private account information and steal money.

- Gain all those 2FA codes sent via text message.

- Gain access to their social media accounts, email accounts... what other apps are on your phone?

Should telecom companies be held responsible for failures that enable financial crimes?

2: Deepfakes and nonconsensual graphic images.

The growing threat of manipulated media - widespread technology usage to generate fake but realistic graphic images and no legal consequences.

While Taylor Swift's massive fan base is championing federal penalties for these deepfake images, we drag our feet in spite of the urgent need for policy reforms to protect individuals from harmful uses of emerging technologies that currently have little oversight.

Listen to this 15-min episode of #LiveOnCyber with Stan Stahl, PhD and Julie Michelle Morris and let's talk today's problems and potential solutions.

  continue reading

56 Episoden

Artwork
iconTeilen
 
Manage episode 399062110 series 3437085
Inhalt bereitgestellt von Dr. Stan Stahl and Julie Morris, Dr. Stan Stahl, and Julie Morris. Alle Podcast-Inhalte, einschließlich Episoden, Grafiken und Podcast-Beschreibungen, werden direkt von Dr. Stan Stahl and Julie Morris, Dr. Stan Stahl, and Julie Morris oder seinem Podcast-Plattformpartner hochgeladen und bereitgestellt. Wenn Sie glauben, dass jemand Ihr urheberrechtlich geschütztes Werk ohne Ihre Erlaubnis nutzt, können Sie dem hier beschriebenen Verfahren folgen https://de.player.fm/legal.

“Unfortunately, the technology underpinning our critical infrastructure is inherently insecure because of DECADES of software developers NOT BEING HELD LIABLE for defective technology. That has led to incentives where FEATURES and SPEED to market have been prioritized AGAINST SECURITY, leading our nation VULNERABLE to cyber invasion. That has to stop,” Jen Easterly, CISA

The policy we need is YEARS behind the current technology, and utterly inadequate to protect citizens against threats and scams.

We lack protections and bear the brunt of the damage.

Two clear examples -

1: SIM swapping.

A bad actor was able to convince a telecommunications store to transfer a phone number to a new device by impersonating the owner. This allowed the criminal to:

- Access private account information and steal money.

- Gain all those 2FA codes sent via text message.

- Gain access to their social media accounts, email accounts... what other apps are on your phone?

Should telecom companies be held responsible for failures that enable financial crimes?

2: Deepfakes and nonconsensual graphic images.

The growing threat of manipulated media - widespread technology usage to generate fake but realistic graphic images and no legal consequences.

While Taylor Swift's massive fan base is championing federal penalties for these deepfake images, we drag our feet in spite of the urgent need for policy reforms to protect individuals from harmful uses of emerging technologies that currently have little oversight.

Listen to this 15-min episode of #LiveOnCyber with Stan Stahl, PhD and Julie Michelle Morris and let's talk today's problems and potential solutions.

  continue reading

56 Episoden

Wszystkie odcinki

×
 
Loading …

Willkommen auf Player FM!

Player FM scannt gerade das Web nach Podcasts mit hoher Qualität, die du genießen kannst. Es ist die beste Podcast-App und funktioniert auf Android, iPhone und im Web. Melde dich an, um Abos geräteübergreifend zu synchronisieren.

 

Kurzanleitung