Trust Safety In Numbers openbaar
[search 0]
Meer
Download the App!
show episodes
 
NEW EPISODES!! At The Digital Trust & Safety Insider Podcast, we chat with people on all sides of the fraud fight: hackers, Secret Service agents, risk analysts, and reformed fraudsters-turned-business consultants. In an era when high-profile account takeovers and global malware attacks lead the headlines, Sift is the leader in Digital Trust & Safety. offering end-to-end intelligent automation to help businesses proactively stop fraud and achieve rapid growth without risk.
  continue reading
 
Data privacy is the footprint of our existence. It is our persona beyond ourselves, with traces of us scattered from birth certificates, Social Security numbers, shopping patterns, credit card histories, photographs, mugshots and health records. In a digital world, where memory is converted to 0’s and 1’s, then instantly transformed into a reproduction even in 3D, personal data is an urgent personal and collective subject. Those who wish to live anonymous lives must take extraordinary measur ...
  continue reading
 
Artwork
 
Hello! This is the Aware and Prepared podcast. I'm your host, Mandi Pratt, a trained domestic violence advocate. I teach women and vulnerable populations how to be street smart. I'm a mom with a gnarly backstory from almost two decades ago. The FBI showed up at my door one day to alert me that my abusive ex had become wanted for multiple bank robberies. Our story was in the news (a few times). I was tired of feeling vulnerable and learned how to keep myself and my son safer.I wish when I was ...
  continue reading
 
Loading …
show series
 
Two major data privacy developments from September 2024: a Staff Report from the FTC and California’s new statute about brain data. Tune in to Episode as the Data Privacy Detective provides meaning beneath the headlines. Neither of these was front page stuff. But each is more newsworthy than what company was sued for a data breach or whose privacy …
  continue reading
 
Send us a text Elicia delves deeper into the abuse she endured and and how it affected her adult life. After leaving her abusive relationship and moving out she struggled with the trauma and feelings of guilt instilled by those around her. She explains how her abuser’s manipulation made her doubt herself for years, and it wasn’t until she reflected…
  continue reading
 
When clouds gather, we prepare for storms, sometimes hurricanes. In a data world that is increasingly multi-cloud, how can we protect data that is ever more susceptible to attack by mal-actors? Enter Identity Orchestration (IO) and Identity and Access Management (IAM). Eric Olden, author of “Identity Orchestration for Dummies” - https://www.strata.…
  continue reading
 
Send us a text Elicia recounts how her experience of being groomed and abused by a martial arts instructor when she was growing up severely impacted her self-esteem, mental health, and life trajectory. Hear things to be aware of to prevent this sort of experience and how she got her power back. Elicia turned around her story for good to prevent and…
  continue reading
 
Today’s automobiles and trucks are more than transport vehicles. Filled with computer technology,cars and trucks are data collectors and transmitters - and a potential way for hackers to steal personal information and invade privacy. The expansive use of technology in vehicles creates risks of identity theft, invasion of privacy, and even the abili…
  continue reading
 
Send us a text What if you could carry peace of mind in your car, ready to help you navigate any emergency life throws your way? In this special episode I’m joined by a very important guest—my dad, Larry, a former Marine Corps officer with over 20 years of experience and a background in corporate-level security. Building on last week's discussion a…
  continue reading
 
Send us a text "Survival Mom" shares her experiences with natural disasters like Hurricane Harvey, which left her and her neighbors without power for days. She explains how having backup energy sources, like generators and power banks, helped her household stay safe and comfortable. She also gives practical advice on storing food, water, and key it…
  continue reading
 
Tune in for our August 2024 roundtable about three hot data privacy developments. Yugo Nagashima and Brio St. Amour join the Data Privacy Detective to plumb meaning beneath the headlines: The Netherland Data Protection Authority fines Uber 290 million Euros for data transfers of sensitive private information. Minnesota adopts a data privacy code. D…
  continue reading
 
Send us a text Intuition is a survival tool that helps us sense danger by picking up on subtle clues from our surroundings. Mandi shares a practical example of being alone at a gas station at night, explaining how these gut feelings can guide us to take protective actions, such as the ones she shared. Mandi also highlights that intuition isn't just…
  continue reading
 
We turn our magnifying glass to what some August 2024 headlines call the biggest data breach in history. One report said the entire population of the United States, Canada, and United Kingdom was hacked, with up to 2.9 billion people’s identities at risk. On closer inspection, it appears that 2.9 billion rows of data were packaged and posted for sa…
  continue reading
 
Send us a text My son’s social security number was stolen in 2018, the theft led to legal challenges, including filing a police report and dealing with credit bureaus to secure the account. The host emphasizes the anxiety of such situations and the importance of taking preventative measures to protect personal information. Hear practical advice for…
  continue reading
 
Microsoft announced at an April 2024 IAPP conference a preview offering called Microsoft Priva. Described as a platform that helps organizations automate how they handle and deal with personal information, Priva aims to “streamline compliance across on-premises, hybrid and multicloud environments.” https://www.microsoft.com/en-us/security/business/…
  continue reading
 
Send us a text Financial sextortion occurs when someone is blackmailed after sharing intimate photos or videos online, often with someone they believe to be a trusted friend or partner. The episode shares info from EndTab.org highlighting chilling statistics, with most victims being young men and boys. This has tragic results. We also explore how t…
  continue reading
 
Calendar scheduling—it can be simplified with third-party apps that schedule meeting times without a lot of back and forth. But third-party apps that do such scheduling entail significant privacy risks and choices. Using Calendly as an example, we explore in Episode 178 what happens when we allow a third-party app to connect through our IT platform…
  continue reading
 
Send us a text Dangers of online deception, particularly catfishing scams from romance scammers, are shared as the host reads insights from guest Adam Dodge, who specializes in combating tech-enabled abuse through his organization, EndTAB. Hear the evolution of catfishing tactics, now incorporating advanced AI technologies like deepfakes and voice …
  continue reading
 
Join Brion St. Amour, Yugo Nagashima, and the Detective to review three top data privacy developments from July 2024. Our monthly review focuses on these topics: Automobiles - Are they spying on us without our consent? A letter from Senators Wyden and Markey to the U.S. Federal Trade Commission (FTC) asks for transparency and data protection from a…
  continue reading
 
Send us a text What are the risks and implications of sharing digital access with partners? Introduction to Digital Entanglement: The blend of personal and digital lives in relationships. Potential risks of sharing digital access with partners. Study by Malwarebytes: Examining digital sharing behaviors in relationships. Key findings: High Rates of …
  continue reading
 
It’s time for standards about data provenance. Unless information is reliable and trustworthy - and able to be used properly - datasets hold doubtful value. Yet, datasets are the foundation of Artificial Intelligence. Standards for the provenance of data are thus essential, as Episode 175 explored. Enter the June 2024 release of Data Provenance Sta…
  continue reading
 
Artificial intelligence is not new. But now an acronym in common usage, AI is dominating markets, politics, industry, and our attention. And its use affects personal privacy. Let’s take a couple examples. Bathsheba was the mother of Solomon in Torah and biblical days. Solomon’s father was King David. tIf you ask Google’s Gemini what ethnicity was B…
  continue reading
 
When the Chairs of Senate and House committees, one a Democrat and one a Republican, agree on a comprehensive and thorough federal data privacy statute, one might guess it will be enacted - or at least move forward to votes on amendments and packaged into a final form. Proposed by House Energy & Commerce Committee Chair Cathy McMorris Rodgers and S…
  continue reading
 
Send us a text Afraid you’ll freeze when in danger or in an awkward social situation? Returning guest, Britt Frank, LSCSW, SEP and Mandi discuss the often-overlooked freeze response, exploring its biological basis and the associated feelings of shame. They highlight that freezing is a natural, uncontrollable reaction and stress the importance of se…
  continue reading
 
Send us a text Does the statement “I Love You” match with loving behavior of respect, patience, etc? In this podcast episode, Dr. Jill Murray emphasizes that love should be seen as a consistent behavior rather than merely a feeling or words. She highlights the importance of evaluating actions over verbal expressions in relationships and underscores…
  continue reading
 
The U.S. Defense Department is forcing its contractors and subcontractors to upgrade their cybersecurity practices through CMMC version 2.0. CMMC is shorthand for Cybersecurity Maturity Model Certification. This affects virtually all suppliers to DOD that deal in Controlled Unclassified Information. 2.0 sets demanding cybersecurity standards in an …
  continue reading
 
Send us a text DRAMA DETOX! Dr. Jill Murray realized her life was filled with chaotic and drama-filled relationships. Determined to change, she made the drastic decision to cut out all toxic relationships, including some family members and friends. She apologized for her past dishonesty about her seemingly perfect life and embraced a period of lone…
  continue reading
 
Vermont joined the “we have a data privacy code” group - almost a third of U.S. states now with a statute devoted to personal data privacy. Illinois modifies its code on biometrics to soften business costs of compliance. DataGrail’s 2024 Data Privacy Trends report focuses on a surge in data subject requests. Join Yugo Nagashima of Frost Brown Todd,…
  continue reading
 
Send us a text What is THE main issue affecting teens today? In Dr. Jill Murray’s answer: social media. She says platforms like Instagram can create unrealistic expectations and contribute to depression and anxiety. Dr. Jill suggests limiting social media use and encouraging teens to be present in their own lives. Excessive social media use isolate…
  continue reading
 
Privacy statements - how can one be written that applies globally? That seems like an impossible, even hopeless, challenge. Laws change regularly, even within countries and groupings like the EU. Rules differ. There are no “international” laws making data privacy a commonly regulated matter. This episode presents an approach to a comprehensive data…
  continue reading
 
Send us a text SUMMARY Slow DOWN to live safer! Today Mandi talks about the mind body connection - the importance of addressing both mental and physical health in the body to break the cycle of stress and calm our nervous system so we can live safer with more peace! LESSONS LEARNED Importance of Slowing Down: Slowing down is crucial for safety and …
  continue reading
 
Skimming—once defined as an internal business fraud of insiders taking money off the top of a company’s cash flow. E-skimming - the growing theft of personal digital information to steal funds and benefits from individuals. A May 22, 2024 New York Times report focused on how food stamp holders are victimized by crime rings when their benefit cards …
  continue reading
 
Send us a text Hear some of the unresolved aspects of Mica Miller’s death and the behavior of her abuser, Pastor JP Miller. The first part updates listeners on the inconsistencies in Micah’s death, as shared by her family. The second part delves deeper into JP Miller’s abusive patterns and broader behaviors seen in similar individuals. This part al…
  continue reading
 
Send us a text SUMMARY #JusticeForMica - This episode delves into the tragic case of Mica Miller, the wife of Pastor John Paul Miller. She was found deceased with a “self-inflicted” gunshot wound shortly after having divorce papers and a no-contact order served to her husband. Despite the medical examiner ruling it as a self-inflicted gunshot wound…
  continue reading
 
How do organizations convert leads into revenue? How can they do this effectively while being privacy-conscious, not bombarding people with unwanted cold calls or messages? In Episode 169, the Data Privacy Detective converses with Thomas Ryan, CEO and founder of Bigly Sales. https://biglysales.com. Learn how the sales industry is undergoing rapid t…
  continue reading
 
Send us a text SUMMARY Learn a few self defense tips and tools I have not heard of before with Dr. Manny Tau, such as avoiding phone distractions, using flashlights at night, and considering self-defense tools like tasers, etc. Communities can come together to learn and be able to support individuals facing threats. Let’s get back to family dinners…
  continue reading
 
Progress towards a U.S. federal data privacy code? Consider the APRA, a bipartisan congressional effort in that direction - and its hot spots and chances. Learn about the Maryland Online Data Privacy Act and how it challenges big tech’s preferences. Discover what Max Schremms, AI, and birthdays have in common. Episode 169 explores these topics from…
  continue reading
 
Send us a text SUMMARY What are the behaviors indicative of potential danger? Is it smack talk or a credible threat? Listen in with today’s guest, Dr. Manny Tau, as he shares insights on identifying and addressing threats of targeted violence. Learn the lessons and resources shared so we can identify a credible threat and have actionable skills on …
  continue reading
 
In April 2024 Colorado became the first U.S. state to declare neural data - what goes on in our brains - to be “sensitive data” subject to its Privacy Act. Neural data will be treated the same as medical and other sensitive data such as fingerprints and facial images. The law will permit individuals to access, delete and correct their neural data. …
  continue reading
 
Send us a text SUMMARY In this episode, the host and guest - Dr. Manny Tau, a seasoned threat assessment expert, discuss the case of Elliot Rodger, an active shooter responsible for a tragic rampage in Isla Vista (USCB area of Santa Barbara). Dr. Tau highlights Rodger's entitlement, narcissism, and lack of empathy as contributing factors to his vio…
  continue reading
 
For about ten years, Estonia has pioneered a digital ID system for its 1.3 million citizens. Every Estonian receives a digital identity at birth or later. Estonians use this e-ID for a host of interactions with government and the private sector. The e-ID is not guarded zealously like a U.S. Social Security number. Instead, it is a kind of public ke…
  continue reading
 
Our medical and health data are valuable - both to promote public health and to enrich data brokers selling our sensitive personal information without our consent. HIPAA is the U.S. federal statute intended to safeguard our medical information - but it does not cover many of the ways our information is released and shared, with unintended consequen…
  continue reading
 
Send us a text SUMMARY This podcast episode concludes the series in practical ways to stay safer while out and about shopping and running errands. In this episode, Mandi addresses parking lot safety (getting in and out of your car, loading up groceries, etc.) Listen to the practical tips shared and enjoy a safer life! LESSONS LEARNED 1 = Be mindful…
  continue reading
 
Episode 164 covers three March 2024 developments: Florida bans social media platform accounts of children under 14 - and more; Illinois modifies its pioneering biometrics laws; and President Biden and the House of Representatives act together about the sale of personal information to countries “of concern.” Consider how social media platforms are a…
  continue reading
 
Send us a text SUMMARY Self-defense on the road! LIsten and start to feel empowered to lessen your chances of becoming a victim. Covering a range of practical strategies, the discussion emphasizes many simple things one may choose to do to wisely prevent and respond to various scenarios. Improve your safety out and about and feel more safe! Enjoy! …
  continue reading
 
Identity Orchestration - the difference between Identity and ID. Join Gerry Gebel, IT veteran, now Head of Standards at Strata Identity - https://strata.io. Gerry leads an effort to develop Identity Query Language, a policy orchestration standard. Strata Identity pioneered the concept of Identity Orchestration, which helps organizations integrate a…
  continue reading
 
Send us a text SUMMARY This episode discusses a tragic incident of road rage in Southern California in which a six-year-old boy named Aiden was fatally shot while his mother was driving on the freeway. YES, the killer was caught and is serving a long sentence in prison! Mandi expresses sympathy for the victims and aims to raise awareness about the …
  continue reading
 
From the day of birth, and perhaps even earlier, we become public data subjects. Without our express consent, our personal information is collected and poured out like salt from a shaker because of public records laws. There has been little federal attention to this for 50 years, and state laws vary. Tune in for an exploration of many ways in which…
  continue reading
 
Send us a text SUMMARY Current Crime Trend = theft of purses and wallets at a specific grocery store in California. Hear actionable advice to safeguard personal belongings, drawing attention to tactics used by these thieves. How to minimize risks and stay safer while out and about. Enjoy! LESSONS LEARNED Lesson 1 = Instead of putting the purse / ba…
  continue reading
 
Send us a text SUMMARY In this podcast episode, Mandi announces the rebranding of her podcast to "Aware and Prepared" and shares why. She states the podcast is now one year old and shares statistics on the podcast's listenership. The top 10 episodes from the past year are listed. Mandi then introduces three games to improve situational awareness th…
  continue reading
 
Privacy - “freedom from unauthorized invasion,” says Webster’s Collegiate Dictionary, or “the quality or state of being apart from company or observation.” The Detective did not authorize an online onslaught. But every day my computer and phone are bombarded with unsolicited ads and messages. My digital space is invaded by demands for my attention.…
  continue reading
 
Send us a text SUMMARY In celebration of International Women's Day, your host shares with you what she would tell her 15 year old self. Listen in and see if some of these things you also would tell younger you! And what else can we impart to our younger generation to help prevent harm and encourage a brighter life filled with peace? RESOURCES Book …
  continue reading
 
Join Yugo Nagashima, data privacy and technology attorney at Frost Brown Todd, as he and the Data Privacy Detective discusses two major topics from February 2024. Learn how DoorDash and California settled a dispute under California’s privacy law that raises important issues for business and consumers. DoorDash was accused of failing to inform custo…
  continue reading
 
Loading …

Korte handleiding