Home
Categories
EXPLORE
True Crime
Comedy
Society & Culture
Business
Sports
History
Music
About Us
Contact Us
Copyright
© 2024 PodJoint
00:00 / 00:00
Sign in

or

Don't have an account?
Sign up
Forgot password
https://is1-ssl.mzstatic.com/image/thumb/Podcasts126/v4/be/38/94/be38941f-5ceb-164e-5829-168358c116eb/mza_3010391423302999579.jpg/600x600bb.jpg
The Wolfcast
Michael Waitze Media
35 episodes
1 day ago
Definitive Conversations on Digital Risks, Parametric Insurance, and Other Interesting Topics
Show more...
Management
Business
RSS
All content for The Wolfcast is the property of Michael Waitze Media and is served directly from their servers with no modification, redirects, or rehosting. The podcast is not affiliated with or endorsed by Podjoint in any way.
Definitive Conversations on Digital Risks, Parametric Insurance, and Other Interesting Topics
Show more...
Management
Business
https://d3t3ozftmdmh3i.cloudfront.net/production/podcast_uploaded_episode400/14690021/14690021-1663811868113-e21d15a23f833.jpg
EP 30 - Dan Draper - CEO and Founder of CipherStash - Simple Protections Don’t Do the Job Anymore
The Wolfcast
51 minutes 34 seconds
3 years ago
EP 30 - Dan Draper - CEO and Founder of CipherStash - Simple Protections Don’t Do the Job Anymore

The Wolfcast learned a lot from its discussion with Dan Draper, the Founder and CEO of CipherStash.  CipherStash uses a searchable encryption scheme that enables data to be searchable even while it remains encrypted.  This gives data high-level protection without compromising usability.

Some of the topics that Dan covered:

  • What he learned while working for the Australian government
  • Learning how to code on a BBC Micro
  • Working for a startup in New York
  • The increased scope of security attacks
  • The necessity to improve cybersecurity awareness
  • IBM’s report on The Cost of a Data Breach
  • An analogy to F1 racing
  • Separating access to the infrastructure from access to the data

Other titles we considered for this episode:

  1. The Good Guys Are Doing That to Simulate What the Bad Guys are Doing
  2. Undifferentiated Heavy Lifting
  3. If Only It Was That Simple
  4. Now Our Interests Are Actually Aligned
  5. The Most Vulnerable Part of the System Is the Human

Some other interesting links:

  • The Effect of Google Search on Software Security
  • The Impact of Information Sources on Code Security

This podcast is supported by Riskwolf.

The Wolfcast
Definitive Conversations on Digital Risks, Parametric Insurance, and Other Interesting Topics