Caveat cover art

All Episodes

Caveat — 344 episodes

#
Title
1

Trump’s AI Preemption Playbook.

2

All rise for the Chatrie.

3

Section 702 survives for now.

4

Anthropic vs Washington.

5

Privatizing cyberspace.

6

Reversing the risk label.

7

Round three: The fight over AI preemption.

8

Section 702: The debate continues.

9

The SBOM where it happens.

10

The Pentagon's AI ultimatum.

11

Trump's tariff battle.

12

Wired for the future.

13

Another week, another AI story.

14

The algorithm is writing the rulebook now.

15

Compliance in the age of surveillance.

16

The expanding reach of surveillance.

17

Consent is not optional.

18

Your data, your rules.

19

The existing state of regulation. [CISOP]

20

Caveat Live: FBI and KU Cybersecurity Conference.

21

Cyber lessons from the frontlines.

22

One nation, two AI futures.

23

Jumping into a time machine.

24

Red, white, and for you page.

25

AI arms race meets nation-state mayhem.

26

Where are we going with warrantless searches?

27

Face to face with controversy.

28

Cybersecurity on the ballot in California.

29

Regulation takeaways with Ethan Cook. [CISO Perspectives]

30

How North Korea strikes and survives.

31

The existing state of regulation. [CISO Perspectives]

32

Ghosts on screen.

33

From alerts to aborts.

34

AI on the witness stand.

35

Red, white, and for you page.

36

Decrypting the future.

37

HR1 and the future of U.S. tech security

38

Two seconds to safer online spaces.

39

Ransomware readiness at risk.

40

Installment plans for your privacy.

41

Governments go on the offensive

42

Protecting or policing?

43

Trump’s AI race against China.

44

The clock’s ticking and the bots are clicking.

45

Cybersecurity in the states.

46

Who’s the boss of AI?

47

A nation divided can’t stand secure.

48

Cyber offense in the hot seat.

49

Answering the cybersecurity call.

50

The art of the breakup: Trump’s antitrust surge.

51

Deep in the tech of Texas.

52

When AI serves up trouble.

53

Take it down or shut it down?

54

Diving deep into critical infrastructure.

55

iSpy and iDefy.

56

The AI policy divide.

57

Big tech, big trouble, and a dash of DORA.

58

The Trump administration’s policy shift.

59

Caveat Live: FBI and KU Cybersecurity Conference.

60

A make-or-break moment for businesses.

61

When secret plans hit the wrong inbox.

62

Turning CISA’s recommendations into action.

63

The tug-of-war over safety and free speech.

64

The path forward for mergers and monopolies.

65

TikTok’s last dance?

66

A HIPAA shake-up?

67

The AI policy divide.

68

The future of software security standards.

69

Where are we going with warrantless searches?

70

Breaking the SaaS paradigm.

71

The path forward for mergers and monopolies.

72

Cybersecurity’s role in safeguarding leadership.

73

High-tech tales of Law and Order.

74

Navigating laws for civilian cyber corps.

75

The year AI regulation hits the U.S.

76

Living in the shadow of AI borders.

77

The intersection of gender, control, and harm.

78

The next frontier in national security.

79

Can regulations keep up with rapid innovation?

80

Reactions to the presidential election.

81

A new tune for privacy.

82

Cyber momentum in motion.

83

The Golden State's AI gamble.

84

The FOCAL approach for federal agencies.

85

A nice-to-have turns into a must-have.

86

The Global Race for the 21st Century [Special Edition]

87

Mythical beasts, real threats.

88

The race for the twenty-first century.

89

Securing the final frontier.

90

The battle between tech giants and legal systems.

91

Spreading false narratives.

92

Chevron Deference no more.

93

The cost of identity.

94

Navigating laws for civilian cyber corps.

95

The next frontier in national security.

96

Blue screens of death: A deep dive into the Microsoft CrowdStrike outage.

97

The startup leading AI security in the UK.

98

The cybersecurity prescription healthcare needs.

99

Encore: Where oh where in the world is that information?

100

High-tech tales of Law and Order.

101

Encore: Laws, lawsuits, and privacy.

102

The end of an era.

103

Answering the cybersecurity call.

104

EFF takes on Texas' digital ID law.

105

A mission to fortify software supply chains.

106

The battle for trade secrets and national security.

107

Safeguarding against disinformation.

108

The building blocks of AI governance.

109

Navigating cybersecurity's regulatory maze.

110

Discussions revisited.

111

Is a department of space in the future?

112

The ins and outs of being a good cyber lawyer.

113

Inside the DOJ’s antitrust complaint against Apple.

114

The creating of a new American surveillance state.

115

China's harmonious counterplay to US hacking accusations.

116

A breakdown of the latest on the Maritime Executive Order.

117

Election defense 2024.

118

Decoding democracy: AI's role in privacy and elections.

119

AI and privacy concerns.

120

Looking to other countries when regulating AI.

121

Encore: Cybersecurity and SMEs.

122

Guarding the ballot box.

123

Two viewpoints on the National Cybersecurity Strategy. [Special Edition]

124

Exploring the cosmic frontier: Unveiling the future of space law.

125

Combatting the privacy pandemic.

126

Swatting gets out of control.

127

Encore: The U.S. and China's cyber relationship.

128

Having your CISOs back.

129

Diversity driving success.

130

North Korea's evolving cyber program.

131

Critical challenges for critical infrastructure.

132

Encore: Inside the largest data breaches in world history.

133

Bolstering economic security.

134

Transforming the cyber risk environment.

135

AI all around.

136

Privacy landscapes for children.

137

Getting on track with DNS.

138

Issues in cybersecurity policy.

139

Encore: The relationship between organizations and their data.

140

Challenges in the cyber industry.

141

Make your mark CISOs.

142

Europe leading the way on data privacy and data sharing.

143

Laws outpace compliance programs.

144

Compliance can't wait.

145

Where oh where in the world is that information?

146

ChatGPT: The ban chronicles.

147

Encore: Follow the money along the blockchain.

148

Roll out the red carpet for cyber regulations.

149

A darkside to AI.

150

The cost of identity.

151

Laws, lawsuits, and privacy.

152

To pay, or not to pay, that is the question.

153

Encore: Opening up from Congress's point of view.

154

The power of global networks.

155

IT companies sweep in to aid Ukraine.

156

GDPR turns 5.

157

What would it take to change a law?

158

It's a generations thing.

159

A hand in crafting cybersecurity legislation.

160

Being on top of your data consent.

161

Your approach to efficient security compliance.

162

Encore: The Supreme Court's supreme security breach.

163

The U.S. Government and a cybersecurity budget.

164

Addressing National Cyber Strategy.

165

Insurable cyberattacks?

166

Measuring the competitive advantage of compliance.

167

The technology challenges of national archives regulations.

168

A blueprint of the CCPA.

169

Encore: The ever-evolving cybersecurity field.

170

Cybersecurity and SMEs.

171

The stand up of U.S. Cyber Command.

172

Data privacy around the world.

173

Surveillance and the threat to press freedom.

174

Safely and securely moving to the cloud.

175

Are there complications with digitizing healthcare?

176

The relationship between organizations and their data.

177

New year, new data privacy.

178

Inside the largest data breaches in world history.

179

Encore: Do copyright laws threaten the open market?

180

Diversity, equity, and inclusion in the workplace.

181

The promise of equal digital identity.

182

Follow the money along the blockchain.

183

Patching healthcare cybersecurity risks.

184

Privacy Briefing: Notes on the Ducktail information stealer. Increased VPN demand during the World Cup. [CW Pro]

185

Ensuring privacy is baked in every step of the way.

186

Security in elections.

187

Privacy Compliance and Culture.

188

How is misinformation impacting people online?

189

The push back on cyber reporting regulations.

190

Do copyright laws threaten the open market?

191

Should Safe Harbor laws be enacted country-wide?

192

Breaking down the Gramm-Leach-Bliley Act.

193

How will cybersecurity insurance change in the coming years?

194

Prioritizing data, security, and observability.

195

Edward Snowden and whistleblower ethics.

196

Twitter's data privacy battle.

197

Encore: Let's talk about Facebook's research.

198

The U.S. and China's cyber relationship.

199

Is privacy included?

200

What would a federal privacy act mean for brands?

201

Ethically gaining and maintaining users.

202

The Supreme Court's supreme security breach.

203

Could new privacy police alter views on cybersecurity?

204

Is the American Innovation and Online Choice Act beneficial?

205

The future of cyber legislation.

206

What new major cyber regulatory changes are coming?

207

The strength of cybersecurity in America.

208

Encore: Pay the ransom anyway regardless of payment ban?

209

Cybersecurity and data protection at the forefront of legal disputes.

210

Reliving a scandal's past.

211

The ever-evolving cybersecurity field.

212

Let's talk about data privacy compliance fatigue.

213

Modernizing healthcare regulation?

214

A new executive order on cybersecurity.

215

What's next in the new era of Cyber Disclosures?

216

Does security and identity go hand in hand?

217

Digging deeper into the civil fraud initiative.

218

Opening up from Congress's point of view.

219

Why the EARN IT Act matters to you.

220

The reluctance to use offensive cyber tools.

221

The call for robust security in the broadband rollout.

222

Location data is the foundation of our modern economy.

223

The False Claims Act (FCA) as it relates to cybersecurity.

224

Balancing port security and protecting the supply chain.

225

Developer challenges in privacy preserving.

226

The shift toward corporate governance.

227

How the "Wild West" of open source could be in trouble.

228

Compliance regulation in the payment security world.

229

Will privacy and security reach equilibrium?

230

AI is transforming surveillance.

231

CyberWire Pro Privacy Briefing from 12/20/2021.

232

Considering policy on ransomware payments.

233

The rapidly changing landscape of cyber insurance.

234

Maximizing our power to do good online while minimizing risks.

235

Privacy is about power.

236

Misdirection and layering with a con in the middle. [Hacking Humans Goes to the Movies]

237

Facebook whistleblower testimony reveals gaps in legal system.

238

Let's go to the movies. [Hacking Humans Goes to the Movies]

239

Regulators are looking for easy solutions, but there are none.

240

There's some data: use it or keep it safe?

241

The Merman Borgnine Conjecture aka cybersecurity ethics.

242

Government agencies have different obligations on keeping data.

243

Protecting local officials from doxxing and threats.

244

Let's talk about Facebook's research.

245

Internet communications are the latest wiretapping class action trend.

246

Pay the ransom anyway regardless of payment ban?

247

Threading the needle on consumer privacy laws.

248

Taking up the challenge of cyber citizenship.

249

Apple CSAM: well-intentioned, slippery slope.

250

Getting tough with the adversary.

251

Convergence of government and private sector in national security.

252

An important consumer protection law you may not know about.

253

Hacking back from a policy perspective: a bad idea.

254

Healthcare cyber insurance is no longer an option.

255

Encore: A pandemic is a perfect environment for disinformation to thrive.

256

Difficulties and biases of online proctored exams.

257

Can individual liberties keep up with technology?

258

Federal standing in identity theft cases.

259

Private companies are not subject to the First Amendment.

260

Data privacy laws are failing.

261

The normalization of data leaks.

262

To pay or not to pay? Ransomware negotiation.

263

Many do not trust their banks and banking apps.

264

Privacy sector shift under the Biden administration.

265

Privacy as a competitive advantage.

266

Cyber insurance: still a work in progress.

267

Impacts of the U.S.'s digital divide.

268

Breaches are a near certainty.

269

Regulation of the Internet is evolving.

270

HITECH Act: Pushing the healthcare industry toward electronic medical records.

271

Virginia privacy law and what it means for you.

272

Amazon Marketplace: You've got to be there.

273

Unregulated IoT devices: What could go wrong?

274

Microtargeting as information warfare.

275

Internet of Bodies (IoB) devices: technology is advancing much quicker than regulations can.

276

Privacy has become almost a fundamental right.

277

Covid's effects on medical privacy.

278

The new US Administration should focus on these data privacy points.

279

The intersection of law, technology and risk.

280

The attempted insurrection, Congressional cybersecurity, and data ethics.

281

Diversity has to be part of the mission in cybersecurity.

282

Encore: Dressing for privacy.

283

Encore: EU-US Privacy Shield invalidated.

284

Interim cybersecurity compliance rule prior to CMMC with some privacy thrown in.

285

We don't know what we need, until we do with facial recognition.

286

A pandemic is a perfect environment for disinformation to thrive.

287

Defining digital sovereignty: there's no such place as cyberspace.

288

Protecting the integrity of information and maintaining privacy.

289

Playing into the hands of our adversaries.

290

Elizabeth Wharton: Strong shoulders for someone else to stand on. [Legal] [Career Notes]

291

IoT device risk: can legislation keep up?

292

The Malware Mash!

293

The tools have changed, but the tactics have remained basically the same.

294

No fruit of the poisonous tree.

295

EU-US Privacy Shield invalidated.

296

Rigging the game. [Caveat]

297

U.S. COVID-19 research efforts at risk.

298

Generating more data with value we don't understand.

299

Technology that allows cops to track your phone.

300

Your own data used against you.

301

Privacy: once you give it away, it’s very hard to get back.

302

Exploring the cultural values of personal privacy. [Caveat]

303

Understanding the right technical assistance model for your organization.

304

CCPA impact on businesses.

305

There is a trust gap.

306

Need affects change.

307

The evolution of the internet.

308

Diversity in contact tracing.

309

The power of the pen.

310

Law takes time.

311

Huawei statements are not as strong as before.

312

Policy is a mess.

313

Code is law.

314

Building public trust.

315

Cybersecurity at the global, national, and state levels.

316

Pushing the CCPA.

317

Tech and cyber competition with China.

318

The different implications of surveillance.

319

Privacy is a human right.

320

If there's cyberwar, are there cyber war crimes?

321

You will pay for that one way or another.

322

You don't own your photos.

323

Where there's a will, there's a loophole.

324

Heat maps and surveillance temptations.

325

Never let a crisis go to waste.

326

Can smart surveillance keep us safe?

327

Dressing for privacy.

328

Technology always moves quicker than policy.

329

Get that thing off my car.

330

Just gimme some truth.

331

The practical concerns of data encryption.

332

And the heat goes on.

333

There is no back door.

334

Cell phone tracking and the future of data value.

335

The quiet, behind-the-scenes work of the FBI.

336

The cyber resiliency of White House operations.

337

Helping us understand HIPAA.

338

Moving the needle in the federal space.

339

Compliance, regulation and small businesses.

340

Lessons learned from environmental legislation.

341

Slowly awakening to the problems we face.

342

The legislation can only do so much.

343

Privacy and biometric data.

344

Crowdsourced private surveillance.