By: Rex M. Lee for My Smart Privacy
Rex M. Lee, Security Advisor/Tech Journalist, gives an interview for CyberTalk TV on how to secure your smartphone.
By: Rex M. Lee for My Smart Privacy
Rex M. Lee, Security Advisor/Tech Journalist, gives an interview for CyberTalk TV on how to secure your smartphone.
By: Rex M. Lee for My Smart Privacy
In this fascinating interview security advisor Rex M. Lee is interviewed by CyberTalk TV’s Merle Garrison regarding cybersecurity threat vectors and actors, plus best practices and solutions.
By: Rex M. Lee for My Smart Privacy
Rex M. Lee, Security Advisor, interviews WeSecure CTO, Darren Olson, who explains Zero Trust security, for Smart Africa.
By: Rex M. Lee for My Smart Privacy
Freedom of The Press host, Merle Garrison, interviews security advisor Rex M. Lee, My Smart Privacy regarding Tech-Based Hybrid Warfare which is "Warfare Without Rules Where Everyone Connected to the Internet is a Target".
TechTalk Summits Security Advisor Rex M. Lee, My Smart Privacy, will be speaking at the GC3B Global Conference on Cyber Capacity Building centered on global cybersecurity threats.
The Global Conference on Cyber Capacity Building (GC3B) is a first-of-its-kind flagship gathering of leaders, decision-makers, and experts across borders and sectors working toward effective, sustainable, and inclusive stewardship of international cooperation for cyber resilient development in the era of digital interdependence.
Security Advisor, Rex M. Lee, interview with CyberTalk TV
Freedom of The Press host, Merle Garrison, interviews security advisor Rex M. Lee, My Smart Privacy regarding Tech-Based Hybrid Warfare which is "Warfare Without Rules Where Everyone Connected to the Internet is a Target".
In Part 1, Merle and Rex discuss the cost of a data breach, plus how smartphones, operating systems, apps, social media platforms, and generative AI can be compromised by Big Tech, nation-state threat actors, and criminal organizations.
By Rex M. Lee, Security Advisor
Before consumers of technology can understand the terms of service they are accepting when they click on “I Agree,” it is important for the consumer to understand that Alphabet (Google), Apple, and Microsoft are in the “Information Trafficking Industry”.
By Rex M. Lee, Security Advisor, My Smart Privacy
Cybersecurity compliance, such as ISO 27001, GDPR & CCPA, do not address endpoint security and privacy threats posed by Surveillance Capitalism employed by Alphabet (Google), Apple, and Microsoft.
CyberTalk TV Interview with Rex M. Lee
Global superpowers are competing on a new battleground: artificial intelligence (AI). But how far does global competition lag behind U.S. development? Will AI be used for tech-based hybrid warfare posing security and privacy threats to end users, including businesses that adopt the use of AI? NTD spoke to Rex Lee, cybersecurity adviser at My Smart Privacy, for more.
By Rex M. Lee
During the proliferation of the internet in the 1990s, the internet was decentralized enabling free trade and commerce on an equal basis where content creators were free to publish anything at will.
Although the internet today is still theoretically decentralized, we cannot discount the fact that the internet, artificial intelligence (AI), and connected technology have been centralized by a handful of multinational corporations that include Google, Apple, and Microsoft.