Scott Aurnou

Interviews with Scott Aurnou RSS Feed

How the government cyber-security forces guard the U.S. election
Scott Aurnou joins Jim Blasingame to report on how the government cyber-security entities break down the election process into three different elements and strategies.
Scott Aurnou joins Jim Blasingame to report on how the government cyber-security entities break down the election process into three different elements and strategies.
Scott Aurnou joins Jim Blasingame to report on the evolution of ransomware, including an increased focus on small businesses, plus how to deal with such an attack, from prevention to paying.
Scott Aurnou joins Jim Blasingame to discuss the increased ransomware attacks on small businesses, and how to avoid becoming a victim.
Scott Aurnou joins Jim Blasingame to reveal how to prevent potential cyber-security challenges that are created when employees work from home over non-secure networks and with family computers.
Scott Aurnou joins Jim Blasingame to reveal that the cyber-intrusion by these three countries uses websites and social media to create acrimony between Americans, not to help one candidate or the other.
Scott Aurnou joins Jim Blasingame to discuss how Big Tech, like Facebook, Twitter, etc. are complying with the 20th century Communications Decency Act in the much more complicated 3rd decade of the 21st century.
Scott Aurnou joins Jim Blasingame to report on a recent outbreak of the networks and data of small cities being held hostage for ransom by cyber-criminals, and what they have to do to save themselves.
Scott Aurnou joins Jim Blasingame to reveal how Facebook and Twitter made the decision to not allow “state” actors from other countries to set up accounts that produce un-American content.
Scott Aurnou joins Jim Blasingame to reveal how Facebook helped law enforcement arrest an elusive purveyor of online child pornography.