Powered by RND
PodcastsTechnologyPriviso Live

Priviso Live

Anthony Olivier
Priviso Live
Latest episode

Available Episodes

5 of 61
  • Priviso Live Episode 59: Supply chain chaos
    The numbers are staggering: five weeks of production halted. Three major UK plants shut down. 5,000 businesses impacted across the supply chain. A projected loss of £1.9 billion. This isn't a hypothetical scenario—it's the reality Jaguar Land Rover faced following a Category 3 cyber-attack, with full recovery not expected until January 2026. In this week's episode of Priviso Live, Lyn, Stephen, and John unpack what this incident means for organizations everywhere—especially in South Africa, where cyber threats are rising but reporting remains dangerously incomplete. *Key insights we explore:* The IT-to-OT cascade: How an IT system attack triggered a complete manufacturing shutdown, demonstrating the critical convergence between information technology and operational technology. Supply chain vulnerability: When a single major player falls, thousands of dependent businesses face potential collapse—regardless of their own cybersecurity posture. The South African context: With only a fraction of security incidents being reported under POPIA, many organizations are underestimating their exposure and regulatory obligations. Historical lessons from Operation Aurora: Why the patterns we're seeing today were foreshadowed in 2009, but the scale and systemic nature of risk have fundamentally changed. *The bottom line?* Cyber risk is no longer just an IT problem—it's an enterprise-level crisis that demands board attention, supply chain mapping, and realistic worst-case planning. Are you prepared for a multi-week shutdown? Do you know your critical dependencies? Is your breach notification process ready? Listen now to understand what the Jaguar Land Rover incident means for your organization's cyber resilience strategy. 🎧 Subscribe on Apple, Spotify, YouTube, or your preferred platform. #CyberSecurity #SupplyChain #POPIA #RiskManagement #SouthAfrica
    --------  
    12:01
  • Priviso Live Episode 58: Giovanni Soro
    In this week's episode, we unpack: ✅ The F5 Breach Reality Check – Source code stolen, vulnerability intel compromised, and US regulators issuing emergency directives. If you run F5 gear (or your suppliers do), this is your wake-up call. We break down the immediate actions: inventory, logging, patching, and the vendor contract clauses you should've had in place yesterday. ✅ AI's Shadow IT Problem – Fresh data reveals 43% of employees are pasting sensitive work data—client info, internal docs—into AI tools without approval. It's not just awareness; it's a control gap. We discuss DLP guardrails, AI use registers, prompt-injection testing, and how POPIA compliance intersects with chatbot usage. ✅ When AI Safety Fails – The heartbreaking lawsuit against OpenAI following 16-year-old Adam Raine's suicide raises urgent questions about guardrail design, safety interventions, and legal liability. If you deploy customer-facing AI, age-gating and escalation protocols aren't optional anymore. ✅ History Matters: Giovanni Soro – Before Turing, before Enigma, there was Venice's master cryptanalyst in 1506. Soro built the world's first formal code-breaking bureau—complete with entrance exams, frequency analysis, and diplomatic cipher systems. His legacy? A blueprint for organised information security that endures today.
    --------  
    10:03
  • Priviso Live Episode 57: The 5 Stages of Breach Grief
    What happens when 40% of the world's computers are about to lose security support? Join Stephen and John on Priviso Live as they tackle the Windows 10 end-of-support crisis that's unfolding right now in October 2025. With hundreds of millions of devices still running an operating system that's about to stop receiving patches, are we witnessing the birth of the next Windows XP nightmare? But that's just the beginning. The hosts dive into a startling report from the Centre for Democracy and Technology revealing that teenagers are forming emotional—and even romantic—relationships with AI chatbots. With 19% of high school students reporting romantic relationships with AI and 42% using them for companionship, we're exploring uncharted territory. Is this harmless support or a concerning trend? The episode also examines Microsoft's innovative approach to cybersecurity leadership with their distributed Deputy CISO model, and unpacks the creepy new "Pixnapping" attack that's stealing data from Android devices without needing any special permissions. And for the grand finale? A brutally honest (and hilarious) breakdown of the Five Stages of Corporate Breach Grief—PR Edition. From denial and blame-shifting to the inevitable "stock price has left the chat" moment, Stephen and John expose the predictable playbook companies follow when responding to security incidents. It's comedy gold with a painful truth: the gap between what security teams know and what PR departments admit "could power a small city." Whether you're managing IT infrastructure, concerned about teen technology use, or just love hearing security professionals call out corporate doublespeak, this episode delivers insights, advice, and laughs in equal measure.
    --------  
    17:57
  • Priviso Live Episode 56: Ada Lovelace
    Think your organisation has until 2038 to worry about the next Y2K? Think again. The Year 2038 problem isn't just lurking in the future—it's already breaking systems today. Any software calculating dates beyond 2038, from 30-year mortgages to long-term infrastructure planning, could be falling over this bug right now. In Episode 56 of Priviso Live, Lyn, John, and Stephen tackle the critical intersection of legacy vulnerabilities and cutting-edge AI threats. We explore OpenAI's latest threat intelligence report, revealing over 40 networks using AI for malicious purposes—from sophisticated phishing campaigns to deceptive employment schemes. The scary part? Low-skilled criminals are now "punching above their weight" thanks to AI's force multiplier effect. We also dive into Google's massive Gemini Enterprise rollout and what it means for corporate security. When you're giving AI access to data across Box, Microsoft, and Salesforce, the productivity gains are real—but so is the attack surface. But here's where it gets fascinating: we travel back to Victorian England to meet Ada Lovelace, whose work on Charles Babbage's Analytical Engine laid the groundwork for everything we're grappling with today. She didn't just write the first computer program—she envisioned a future where machines could create art, process language, and be creative partners. Sound familiar? As we celebrate Ada Lovelace Day on October 14th, her "poetical science"—combining logic and imagination—feels more relevant than ever. 💼 Need expert guidance on security, risk, or ICT legislation? Contact Priviso Consulting at [email protected] #CyberSecurity #AI #ThreatIntelligence #AdaLovelace #Y2K38 #InfoSec #RiskManagement
    --------  
    22:14
  • Priviso Live Episode 55: One year in
    Join Lyn, John, and Stephen as they celebrate one year of Priviso Live with an action-packed anniversary episode that cuts through the noise of cybersecurity, privacy law, and emerging tech threats. What You'll Discover: - The Johannesburg CCTV controversy comes full circle. Remember that heavy-handed by-law forcing residents to register private security cameras? We revisit what happened when citizens fought back—and won. - The UK's digital ID debate takes an authoritarian turn as the government dismisses 2.7 million petition signatures. - YouTube's massive $24.5 million settlement with President Trump raises uncomfortable questions: Are we creating a two-tiered content moderation system where power trumps policy? And what does this mean for platform accountability? - Closer to home, ransomware strikes a South African HVAC company, exposing the hidden risks in third-party vendors. We connect the dots between this attack and broader threats facing African government agencies, including urgent warnings about SARS eFiling compromises during tax season. But it's not all doom and gloom. - Kenya's pioneering digital credentials initiative offers a glimpse of how blockchain technology could revolutionise education verification across Africa, eliminating fraud while improving accessibility. Main Topic: Do phishing simulations actually work? We examine the surprising research on whether those fake attack emails make staff safer—or just more anxious. Spoiler: The answer depends entirely on how you do them. Subscribe to Priviso Live on Apple, Spotify, Samsung, iHeartRadio, or YouTube. For security, risk, or ICT legislation advice, contact [email protected]. Stay informed. Stay secure. Stay ahead.
    --------  
    34:15

More Technology podcasts

About Priviso Live

Your dose of tips about all things Information Security, ICT Legislation and Risk. South African podcast.
Podcast website

Listen to Priviso Live, Darknet Diaries and many other podcasts from around the world with the radio.net app

Get the free radio.net app

  • Stations and podcasts to bookmark
  • Stream via Wi-Fi or Bluetooth
  • Supports Carplay & Android Auto
  • Many other app features
Social
v7.23.11 | © 2007-2025 radio.de GmbH
Generated: 11/6/2025 - 11:32:05 AM