
Sign up to save your podcasts
Or
With the release of the Pandora Papers, news reports are filled with stories derived from computer files once thought to be hidden from public scrutiny. While the source of the Pandora Papers leak isn't yet known, the pattern of leaked computer files shaping international relations has become increasingly common as information migrates to "the cloud." In addition to the Pandora Papers, the release of the Panama Papers revealed banking secrets of many international leaders, frequently suggesting involvement in activities they would have preferred not be made public. James Shires discussed the political role of "hack and leak" operations, many of which involve cloud-based data, in his article in Vol. 3/Iss. 4 of Texas National Security Review (our special issue on cyber competition). In this week's episode of Horns of a Dilemma, Christina Morillo, a cyber security expert with substantial experience in the private sector, discusses the nuts and bolts of cloud security. While the discussion is a bit more technically detailed than many episodes of the podcast, listeners will find that having a better understanding of how cloud security works will help them better to understand the context in which events like the release of the Pandora Papers, hack and leak operations, and even cloud-based attacks on computer control and data acquisition systems all take place. This talk was sponsored by the Strauss Center at the University of Texas, Austin, and hosted by Wendy Nather, a senior cyber security fellow at the Strauss Center.
4.6
133133 ratings
With the release of the Pandora Papers, news reports are filled with stories derived from computer files once thought to be hidden from public scrutiny. While the source of the Pandora Papers leak isn't yet known, the pattern of leaked computer files shaping international relations has become increasingly common as information migrates to "the cloud." In addition to the Pandora Papers, the release of the Panama Papers revealed banking secrets of many international leaders, frequently suggesting involvement in activities they would have preferred not be made public. James Shires discussed the political role of "hack and leak" operations, many of which involve cloud-based data, in his article in Vol. 3/Iss. 4 of Texas National Security Review (our special issue on cyber competition). In this week's episode of Horns of a Dilemma, Christina Morillo, a cyber security expert with substantial experience in the private sector, discusses the nuts and bolts of cloud security. While the discussion is a bit more technically detailed than many episodes of the podcast, listeners will find that having a better understanding of how cloud security works will help them better to understand the context in which events like the release of the Pandora Papers, hack and leak operations, and even cloud-based attacks on computer control and data acquisition systems all take place. This talk was sponsored by the Strauss Center at the University of Texas, Austin, and hosted by Wendy Nather, a senior cyber security fellow at the Strauss Center.
259 Listeners
1,078 Listeners
796 Listeners
763 Listeners
146 Listeners
205 Listeners
698 Listeners
138 Listeners
210 Listeners
401 Listeners
103 Listeners
211 Listeners
393 Listeners
412 Listeners
257 Listeners