How our cellphone location data can save us from a COVID-19 recession

Can Our Cellphone Location Data Save Us from a COVID-19 Recession

By now, it’s clear that COVID-19 has become a significant threat to public health globally, prompting many governments to undertake draconian measures to contain or... Details
FYI: You can trick image-recog AI into, say, mixing up cats and dogs – by abusing scaling code to poison training data

Tricking Image Recognition AI by Poisoning Training Data

If you've ever attended one of my neural network talks, you know that I point out that what neural networks learn is not what you... Details
Introduction to the Azure Sphere Security Service

Introduction to the Azure Sphere Security Service

Because of Azure Sphere Security Service, a.k.a. "AS3" (aka.ms/iotshow/azuresphere), Azure Sphere devices are more secure when they're connected. Caitie McCaffrey, leading the Azure Sphere Security... Details
Secure Access to Your API Server with Authorized IP Ranges in AKS

Secure Access to Your API Server with Authorized IP Ranges in AKS

In Kubernetes, the API server is the central way to interact and manage the cluster. To improve cluster security in Azure Kubernetes Server, Ruchika Gupta... Details
Why Your People Are Still Your Best Cyber-Defense

Why Your People Are Still Your Best Cyber-Defense

Ann Johnson, Corporate Vice President, Cybersecurity Solutions Group, Microsoft, speaks at RSA Conference. As organizations digitally transform, access to artificial intelligence and machine learning powered... Details
Connect and Deliver Services Privately on Azure with Azure Private Link

Connect and Deliver Services Privately on Azure with Azure Private Link

Narayan Anamalai joins Donovan Brown to introduce Azure Private Link. In this episode, Narayan demonstrates how you can secure Azure PaaS resources and your Azure... Details
Cheap DIY WiFi Cameras & Cloud Free Home Automation

Cheap DIY WiFi Cameras & Cloud Free Home Automation

This time on Hak5, Glytch walks you through building your own cost effective and secure wireless cameras, as well as options for cloud-free home automation... Details
Let’s Talk IoT Security

Let’s Talk IoT Security

In this fascinating episode, watch how Ofir Barzilay, Principal Engineering Manager for IoT Security, demonstrates a brute force attack (https://aka.ms/iotshow/ascforiot) on a Raspberry Pi IoT... Details
How to Build an Active Directory Hacking Lab

How to Build an Active Directory Hacking Lab

The Cyber Mentor  explores the how and why you should build an Active Directory Lab in this cyber-security filled tutorial video. Details
Confessions of an Nespresso Money Mule

Confessions of an Nespresso Money Mule

At the recent DEFCONConference, Nina Kollars explains her experience buying Nespresso coffee capsules. In 2018 I somewhat innocently bought very expensive coffee (Nespresso capsules) online... Details