Home
Categories
EXPLORE
True Crime
Comedy
Society & Culture
Business
Sports
History
News
About Us
Contact Us
Copyright
© 2024 PodJoint
00:00 / 00:00
Sign in

or

Don't have an account?
Sign up
Forgot password
https://is1-ssl.mzstatic.com/image/thumb/Podcasts123/v4/73/4a/4b/734a4bca-d661-3126-acd3-60574a0e47cb/mza_1343282517000009416.jpg/600x600bb.jpg
Lex Cybernetica Podcast
The Federmann Cyber Security Center – Cyber Law Program
26 episodes
8 months ago
Show more...
Technology
RSS
All content for Lex Cybernetica Podcast is the property of The Federmann Cyber Security Center – Cyber Law Program and is served directly from their servers with no modification, redirects, or rehosting. The podcast is not affiliated with or endorsed by Podjoint in any way.
Show more...
Technology
https://is1-ssl.mzstatic.com/image/thumb/Podcasts123/v4/73/4a/4b/734a4bca-d661-3126-acd3-60574a0e47cb/mza_1343282517000009416.jpg/600x600bb.jpg
Lex Cybernetica Interview E05 – Prof. David Maimon
Lex Cybernetica Podcast
38 minutes 23 seconds
6 years ago
Lex Cybernetica Interview E05 – Prof. David Maimon
Prof. David Maimon is the guest of this episode of Lex Cybernetica, Prof. Maimon is an Associate Professor in the department of Criminology and Criminal Justice at Georgia State University. His research interests include cyber-enabled and cyber-dependent crimes and experimental research methods. His current research focuses on computer hacking and the progression of system trespassing events, online deception and fraud, computer networks vulnerabilities to cyber attacks, and decision-making process in cyberspace. In his interview, Maimon points the finger at cybersecurity companies and experts who don’t use evidence based proof to their tools’ effectiveness, and says there’s not enough good data - it’s either questionable or not the right data at all - to independently evaluate it, thus making us potentially more unprotected against, and as a result more susceptible to, cyberthreats than we thought. Maimon also talks about the different cybersecurity practices people use in different situations, and how hackers can be nudged to leave an infiltrated system before they damage it. This episode of Lex Cybernetica, hosted by Ido Kenan.
Lex Cybernetica Podcast