Interviews RSS Feed

Category: Technology, Blockchain, Cryptocurrency

Christian Espinosa
Christian Espinosa joins Jim Blasingame to discuss the concept of a supply chain cyber-breach, how small businesses could become the weak link that exposes larger customers, and how to avoid that threat.
Myron Ebell
Myron Ebell joins Jim Blasingame to report on the exposure the U.S. power grid has and why it’s exposed to an enemy attack or a natural event that could take it down.
Myron Ebell
Brian Fielkow
Brian Fielkow joins Myron Ebell and Jim Blasingame to report on his experience and what he knows about what caused the Texas electric grid to go down during the recent historic winter storm.
Nick Rossmann
Nick Rossmann joins Jim Blasingame to report on the IBM cyber threat index with shows more brand URLs are being spoofed to trick unsuspecting users to click on a link that takes them to an online threat.
Nick Rossmann
Nick Rossmann joins Jim Blasingame to report on the IBM X-Force Threat Intelligence Index, which reveals the increase in pandemic-related threats to all levels of Internet users.
Caleb Barlow
Caleb Barlow joins Jim Blasingame to reveal some of the steps to take to avoid becoming a ransomware victim, including having redundant files and systems, so you’re in a position to not pay the ransom.
Christophe Uzureau
Christophe Uzureau joins Jim Blasingame to report on how blockchain technology is being used more and more in the global supply chain, and will be used in the future for such applications as health care records and election integrity.
Elizabeth Rusch
Elizabeth Rusch joins Jim Blasingame to discuss whether making voter ID and adding technology such as blockchain to the language of HR-1 would make it more palatable to the bill’s opposition.
Kam Attwal  Kaila
Kam Attwal Kaila joins Jim Blasingame to discuss the issues around women in the technology sector, and why there is great reason to believe the current gender imbalance will be increasingly reconciled.
John Shier
John Shier joins Jim Blasingame to tell the story about a ransomware attack on a real business, including how they got in, how they got out of it, and what we can learn from this costly experience.

Browse by category