2024 Calendar
TechTalk Daily

Cybersecurity

Quantum Cybersecurity Threats: Quantum Cyber Attacks

CyberTalk TV Interview with Rex M. Lee

We take a deeper dive into the quantum computing revolution where the stakes couldn’t be higher. A single quantum computer holds the power to dismantle all modern encryption systems.

See More

After CrowdStrike Outage, Companies and Governments Reassess Risks of Using Cloud

By Kevin Stocklin Featuring Security Advisor - Rex M. Lee 

As companies and government agencies around the world scramble to restore their computer systems following this month’s global outage from a faulty software update, questions are being raised about whether proper protocols for updates were followed.

See More

Cybersecurity Best Practices Part 2: How to Secure Your Smartphone!

By: Rex M. Lee for My Smart Privacy 

Rex M. Lee, Security Advisor/Tech Journalist, gives an interview for CyberTalk TV on how to secure your smartphone.

See More

Cybersecurity Threats & Best Practices Part 1

By: Rex M. Lee for My Smart Privacy 

In this fascinating interview security advisor Rex M. Lee is interviewed by CyberTalk TV’s Merle Garrison regarding cybersecurity threat vectors and actors, plus best practices and solutions.

See More

Understanding Zero Trust Security with Darren Olson, WeSecure

By: Rex M. Lee for My Smart Privacy 

Rex M. Lee, Security Advisor, interviews WeSecure CTO, Darren Olson, who explains Zero Trust security, for Smart Africa. 

See More

Tech-Based Hybrid Warfare Part 2: Risk Factors & Attack Vectors

By: Rex M. Lee for My Smart Privacy 

Freedom of The Press host, Merle Garrison, interviews security advisor Rex M. Lee, My Smart Privacy regarding Tech-Based Hybrid Warfare which is "Warfare Without Rules Where Everyone Connected to the Internet is a Target".

See More

Security Advisor, Rex M. Lee Speaking at GC3B in Ghana, Africa

TechTalk Summits Security Advisor Rex M. Lee, My Smart Privacy, will be speaking at the GC3B Global Conference on Cyber Capacity Building centered on global cybersecurity threats.

The Global Conference on Cyber Capacity Building (GC3B) is a first-of-its-kind flagship gathering of leaders, decision-makers, and experts across borders and sectors working toward effective, sustainable, and inclusive stewardship of international cooperation for cyber resilient development in the era of digital interdependence.

See More

Tech-Based Hybrid Warfare Part 1: Cost of a Data Breach and Weaponized Apps, Social Media, and AI

Security Advisor, Rex M. Lee, interview with CyberTalk TV

Freedom of The Press host, Merle Garrison, interviews security advisor Rex M. Lee, My Smart Privacy regarding Tech-Based Hybrid Warfare which is "Warfare Without Rules Where Everyone Connected to the Internet is a Target".

In Part 1, Merle and Rex discuss the cost of a data breach, plus how smartphones, operating systems, apps, social media platforms, and generative AI can be compromised by Big Tech, nation-state threat actors, and criminal organizations.

See More

Negative Consequences from Clicking on “I Agree” Understanding App, Social Media, and AI Terms of Service

By Rex M. Lee, Security Advisor 

Before consumers of technology can understand the terms of service they are accepting when they click on “I Agree,” it is important for the consumer to understand that Alphabet (Google), Apple, and Microsoft are in the “Information Trafficking Industry”.

See More

International Cybersecurity Standards Do Not Address Surveillance Capitalism

By Rex M. Lee, Security Advisor, My Smart Privacy

Cybersecurity compliance, such as ISO 27001, GDPR & CCPA, do not address endpoint security and privacy threats posed by Surveillance Capitalism employed by Alphabet (Google), Apple, and Microsoft.

See More