Data @ Rest

UNC Chapel Hill's Information Security Office & UNC Fayetteville State's Information Security Office

Data @ Rest

A Technology and Education podcast

Good podcast? Give it some love!
Data @ Rest

UNC Chapel Hill's Information Security Office & UNC Fayetteville State's Information Security Office

Data @ Rest

Episodes
Data @ Rest

UNC Chapel Hill's Information Security Office & UNC Fayetteville State's Information Security Office

Data @ Rest

A Technology and Education podcast
Good podcast? Give it some love!
Rate Podcast

Episodes of Data @ Rest

Mark All
Search Episodes...
Recorded in front of a live audience at UNC CAUSE in October, 2022! The Zero Trust Framework raises valid questions about risk reduction. But, as one CISO used to say, "we have to trust someone eventually, right?" Or do we? Universities, are b
Charlie and Michael are joined by Drew Trumbull, Incident Handling Team Lead for UNC Chapel Hill's Information Security Office, to talk about the latest threats we see and what folks should do if they think they might have been targeted success
Security and privacy are often mentioned hand-in-hand in our industry, but they're actually very different fields with different considerations and concerns--and the policies applying to one are not necessarily meant to address those of the oth
Charlie and Michael have discussed communicating security risks and strategies to older users and at-risk users, but what about students and younger users? We welcome guests Lila Davidson and Louise Flinn from the UNC Chapel Hill ITS Communicat
Anyone who works in information security knows that we, perhaps more than any other IT sector, are reliant on a forest of vendors, each promising the moon and often duplicating others' capabilities. Join Charlie and Michael for a frank discussi
Charlie and Michael share a couple of updates and discuss the history--and future--of the show. See y'all in the fall! Contact us: dataatrest@unc.edu Musical credit: Pixelland Kevin MacLeod (incompetech.com) Licensed under Creative Commons: By
Charlie and Michael discuss what "blockchain" means, its slightly mysterious history, its best-known applications, and their unfiltered opinions on the anciliary effects of some uses of this otherwise fascinating technology! Contact us: dataatr
Charlie and Michael take a conversational look at a few fundamentals of security it never hurts to revisit and review. Contact us: dataatrest@unc.edu Musical credit: Pixelland Kevin MacLeod (incompetech.com) Licensed under Creative Commons: By
Online and phone-based scams are everywhere. Do you keep getting phone calls about your car's extended warranty? Do you get text messages offering to buy your house? Or did a seller in an online store offer you a refund if you took down your on
There's been a lot of talk about election security for nearly two years now, most of it rife with conspiracy theories, misinformation, and disinformation. But what are the real risks to elections, and how do we mitigate them? Links: Election Se
Mobile Security is an evergreen concern and it only gets bigger and more mystifying. Charlie and Michael welcome back unofficial co-host Jared Perdue to discuss wireless and mobile security now and in the future! Links: Wireless Security Trends
Social media can feel like a nonstop shouting match. But what if you found out half the screaming voices aren't even real people but are, in fact, bots designed to make you feel alienated, angry, and afraid?  By coincidence, this episode was pu
Join Charlie and Michael as they present to UNC CAUSE 2020 about ways to create meaningful connections and continue to develop user awareness in an era of teleconferencing and telecommuting. Contact us: dataatrest@unc.edu Musical credit: Pixell
Listen in as Charlie and Michael present at InfoSeCon 2020 on what to consider when relocating a workforce en masse and then get left without adult supervision for the last few minutes of the panel. Link to the video in the show notes! Watch th
SCADA systems are the computers that control industrial systems in the real world. That may sound like a dry topic, but it's chock full of risk and fascinating stories, some of them ripped from very recent headlines! Links: "Someone tried to po
Many of us have people in our lives who may be particularly vulnerable to information security risks. How do we help those folks stay safer online, avoid scams, and otherwise protect themselves? Charlie, Michael, and Casey discuss this and offe
Free and Open-Source Software is popular, but are they secure? The answer is: yes, maybe. Join Charlie, Michael, and Casey as we discuss how to navigate participating in the innovation of FOSS while staying safe.  Links: How to check a hash Con
Join us as we discuss 2020: A Year That Existed! Musical credit: Pixelland Kevin MacLeod (incompetech.com) Licensed under Creative Commons: By Attribution 3.0 License http://creativecommons.org/licenses/by/3.0/
Our second request of the season! Close out Season Three with Charlie and Michael as they discuss the concept of "shadow IT," the dangers it presents, and why there's that saying about a road paved in good intentions. Musical credit: Pixelland
A panel of folks from across the University discuss Gene Kim's The Unicorn Project. Musical credit: Pixelland Kevin MacLeod (incompetech.com) Licensed under Creative Commons: By Attribution 3.0 License http://creativecommons.org/licenses/by/3.0
Michael goes down the rabbit hole of the history of modern networks and network security, and Charlie and Michael discuss different network-based attacks and how to defend against them.  Musical credit: Pixelland Kevin MacLeod (incompetech.com)
Charlie and Michael are joined by three of their colleagues - Tiffany, Glenn, and Drew - to talk about the different roles in UNC Chapel Hill's Information Security Office and how those roles intersect.  Musical credit: Pixelland Kevin MacLeod
Charlie and Michael had the honor of presenting a talk at the Hackers on Planet Earth 2020 conference. This one's on how to welcome new folks into the information security industry and some specific resources we recommend to folks who want to l
Charlie and Michael are joined by Dennis Schmidt, UNC Chapel Hill's Chief Information Security Officer, to discuss foreign influence, intellectual property, and how to safeguard the University's work.  Musical credit: Pixelland Kevin MacLeod (i
Charlie and Michael talk to our office's resident members of CLOUD FORCE(!) about cloud security. Musical credit: Pixelland Kevin MacLeod (incompetech.com) Licensed under Creative Commons: By Attribution 3.0 License http://creativecommons.org/l
Rate
Contact This Podcast

Join Podchaser to...

  • Rate podcasts and episodes
  • Follow podcasts and creators
  • Create podcast and episode lists
  • & much more

Unlock more with Podchaser Pro

  • Audience Insights
  • Contact Information
  • Demographics
  • Charts
  • Sponsor History
  • and More!
Pro Features