Insights Into Technology
A podcast exploring the latest in computers, networking, home automation, mobile computing and all things technology related. Our hosts will take a deeper dive into the latest and greatest in tech trends, and give you the information you need to enable your tech centric world.
Episodes

Tuesday Feb 04, 2025
"Cyber Hygiene and Meta's Purge"
Tuesday Feb 04, 2025
Tuesday Feb 04, 2025
In this episode of Insights into Technology, we delve into the booming enrollment in CISA's cyber hygiene program, highlighting the significant 201% increase and its impact on the cybersecurity landscape. Discover how critical infrastructure sectors are embracing proactive measures to mitigate vulnerabilities and enhance security postures.
We also explore the rise of FunkSec, a new ransomware group utilizing AI-generated malware, posing a unique threat with their low ransom demands and innovative use of technology. Learn about the implications of such AI-driven tactics on enterprise security and the increasing risks in the cybersecurity realm.
Lastly, we discuss Meta's recent performance-based workforce adjustments and President Biden's executive order to expand AI infrastructure with a focus on data centers and clean energy. Understand the potential shifts in enterprise computing and the ongoing evolution of AI in the tech industry.

Tuesday Feb 04, 2025
"CyberTrust or Bust"
Tuesday Feb 04, 2025
Tuesday Feb 04, 2025
In Episode 14 of Insights into Technology, host Joseph Whalen delves into the revolutionary rollout of Cybertrust labels set for 2025. This initiative aims to enhance consumer confidence by certifying smart devices with rigorous cybersecurity standards. Listeners will learn about the implications for IoT safety, as the average U.S. household juggles 21 connected devices, presenting high risks for cyber attacks.
The episode also covers recent cybersecurity incidents, including a significant breach at the U.S. Treasury attributed to Chinese state-sponsored hackers, highlighting vulnerabilities within federal systems. Additionally, Whalen discusses the legal challenges faced by T-Mobile following a massive data breach, emphasizing the importance of robust cybersecurity practices for large corporations.
Explore the tensions between rising cybersecurity measures and existing vulnerabilities, the economic impact on consumers, and the broader geopolitical implications of state-sponsored cyber operations in this engaging and informative episode.

Tuesday Feb 04, 2025
"U.S. Under CyberSeige and the Year in Review"
Tuesday Feb 04, 2025
Tuesday Feb 04, 2025
This episode explores pressing cybersecurity issues, highlighting the alarming breaches in U.S. telecommunications attributed to inadequate security measures and federal mandates complicating the scenario. Joseph Whelan discusses the implications of these breaches and the cyclical blame game between telecoms and the government, accentuating the need for better cybersecurity practices.
Additionally, the episode delves into major incidents involving companies like Cisco and the U.S. Treasury Department, showcasing the vulnerabilities within public-facing resources and trusted third-party services. The conversation shifts towards the complexities surrounding data security, emphasizing the pressing need for stringent access controls and the ongoing challenges enterprises face in securing their infrastructures.
Furthermore, the podcast takes a closer look at technological advancements in AI and the regulatory shifts in cybersecurity measures, analyzing their impact on various industries. This comprehensive review provides insights into the evolving landscape of technology and cybersecurity, urging listeners to reconsider their approach to data protection and risk management.

Tuesday Feb 04, 2025
"UnitedHealth Takes Another Hit"
Tuesday Feb 04, 2025
Tuesday Feb 04, 2025
In this episode of Insights into Technology, host Joseph Whalen dives into the week's top tech news stories. First, explore the implications of UnitedHealth's AI-driven insurance claims chatbot being exposed online, raising cybersecurity concerns and public trust issues.
Next, discover how the U.S. Supreme Court's decision not to hear an ISP challenge paves the way for New York's $15 broadband law, potentially reshaping internet access across the country and closing the digital divide.
Finally, learn about Seagate's groundbreaking 32TB hard drive using heat-assisted magnetic recording (HAMR) technology, marking a significant leap in data storage capacity and efficiency for enterprises and cloud computing.

Tuesday Feb 04, 2025
"The Salt Typhoon Saga and CMMC"
Tuesday Feb 04, 2025
Tuesday Feb 04, 2025
In this riveting episode of Insights into Technology, host Joseph Whalen delves into the ongoing "Salt Typhoon" cyber espionage saga, exploring the sophisticated tactics employed by China-linked cyber actors to breach U.S. telecom infrastructures.
As national security hangs in the balance, We highlight the urgent need for robust encryption and rapid response strategies. The discussion extends to the introduction of CMMC 2.0, as organizations brace for heightened security standards set to protect government data and critical U.S. infrastructure.
Join us as we assess the stakes of global cyber conflicts and investigate if legislative measures can keep up with advancing threats.

Tuesday Feb 04, 2025
"Lost Logs and a Look at NIST Frameworks"
Tuesday Feb 04, 2025
Tuesday Feb 04, 2025
In this episode, we dive into critical tech news of the week. Learn why Cloudflare's recent log loss incident highlights the vulnerabilities in large-scale data management and how mobile apps are secretly targeting millions. Discover the implications of Rockstar 2FA's phishing attacks on Microsoft 365 users and unravel the ongoing challenges with legacy system vulnerabilities.
We also discuss how nation-state espionage is influencing cybersecurity measures in light of recent attacks on U.S. telecommunications. To wrap up, we provide insights into Intel's recent leadership transition amid financial challenges and its impact on the semiconductor market.
Join us for a comprehensive overview of the intersections between technology, security, and corporate strategy.

Tuesday Feb 04, 2025
"Microsoft 362? And a look at Industry Specific Frameworks"
Tuesday Feb 04, 2025
Tuesday Feb 04, 2025
In this episode of Insights into Technology, our host, Joseph Whalen, takes us through this week's tech news highlights, focusing on the major Microsoft 365 outage that left many businesses in disarray. We discuss how Microsoft’s internal update created chaos and what this means for the reliability of critical cloud infrastructure as companies increasingly rely on digital solutions.
Also, we delve into the recent troubles with Microsoft's Windows 11 updates, particularly affecting gaming, and how this has raised questions about the importance of compatibility testing in tech development.
The episode further explores a significant data breach affecting major insurers Geico and Travelers, illustrating the ongoing struggles and financial implications businesses face with cybersecurity breaches. Another key topic includes the security vulnerabilities found in Palo Alto Network's firewalls, compromising organizations' defenses.
Finally, we highlight international efforts against cybercrime, showcasing a successful Interpol operation that led to over a thousand arrests, marking a pivotal step in global cyber security enforcement.
Join us for an in-depth look at these issues and more, as we provide insights and discuss how businesses can better prepare and react to such challenges in the tech landscape.

Tuesday Feb 04, 2025
"CISA Shakeups and a Deep Dive Into Cybersecurity Frameworks"
Tuesday Feb 04, 2025
Tuesday Feb 04, 2025
In Episode 8 of Insights into Technology, host Joseph Whalen delves into the top security threats businesses may face in 2025 according to Google's forecast. Highlighting AI's duality in cybersecurity both as a tool and a threat, the episode explores how state-sponsored cyberattacks and ransomware are evolving.
Furthermore, the podcast examines the significant leadership transition at CISA amidst increasing cybersecurity challenges, particularly focusing on recent attacks by Chinese state-sponsored hackers. Whalen ponders on the implications of this change during such critical times.
The episode also evaluates vulnerabilities within essential infrastructure like the water systems, emphasizing the dire need for improved cybersecurity measures. Discover how regulatory approaches by the DOJ might reshape Google's dominant position in the tech industry.
Tune in for an insightful journey through today's critical cybersecurity landscape and hear about Microsoft's new security initiative post-CrowdStrike incident.

Tuesday Feb 04, 2025
"Fake Fines and Real Risks"
Tuesday Feb 04, 2025
Tuesday Feb 04, 2025
In this week's episode of Insights into Technology, host Joseph Whalen delves into the dramatic tech news making headlines. We kick off with a staggering story from Russia, where a court has slapped Google with an astronomical fine of 20 undecillion rubles. This unprecedented penalty raises questions about the complexities of international tech regulations and the ongoing battle between sovereign nations and global tech giants.
Next, we explore the digital battlefield of disinformation. U.S. agencies have exposed a Russian-backed campaign using fake videos to influence American elections, highlighting the growing challenge of combating foreign interference and the role of AI in detecting misinformation.
We then shift focus to cybersecurity threats as Chinese hackers exploit vulnerabilities in Microsoft 365 through the Quad 7 botnet. Discover the implications for home and enterprise security and the measures organizations must take to safeguard their networks.
In a surprising turn, we examine Microsoft's delayed release of a controversial feature that aims to capture user activity on Windows PCs. Privacy concerns and public outcry have led to multiple postponements, sparking a debate on the balance between innovation and security.
Lastly, we touch on the ethical and practical dimensions of AI in technology. From the potential of AI-driven cybersecurity advancements to the risks posed by consumer apps with embedded malware, we navigate the complex landscape of emerging tech and its impact on global trust and regulation.
Join us for these stories and more as we explore the evolving intersection of technology, politics, and ethics.

Tuesday Feb 04, 2025
“The Expense Of Security, And Who’s Forking Around With Linux”
Tuesday Feb 04, 2025
Tuesday Feb 04, 2025
Welcome to Episode 6 of Insights into Technology, where host Joseph Whalen dives into the week's most pressing tech news. This episode, titled "The Expense of Security and Who's Forking Around with Linux?" explores a variety of topics ranging from Apple's ambitious bug bounty program to the latest developments in AI security.
First, we discuss Apple's significant bug bounty initiative, offering up to $1 million to researchers who can identify vulnerabilities in their upcoming AI cloud platform. This move marks a notable shift for Apple, known for its closed systems, as they aim to enhance security while maintaining their strong stance on user privacy.
The episode also covers a deepfake attack on cybersecurity firm Wiz, highlighting the growing threat of AI-generated deceptions in corporate environments. The discussion underscores the importance of insider awareness and new technologies to combat these sophisticated attacks.
Additionally, we examine the impact of the EU's Network and Information Security (NIS2) directive on businesses, forcing many to reallocate resources to ensure compliance. The challenges of unfunded mandates and the strain on IT budgets are critically analyzed.
We also delve into the repercussions of Penn State's $1.25 million fine for failing to meet cybersecurity standards in federal contracts, illustrating the high stakes of compliance and the necessity of proactive cybersecurity strategies.
The episode wraps up with an intriguing look at Russia's response to being excluded from the Linux kernel community, and the potential splintering of the open-source ecosystem as a result.
Join us for these stories and more as we navigate the ever-evolving landscape of technology, security, and innovation.