
Sign up to save your podcasts
Or


Once a data breach has taken place, your data can be sold and resold and resold again. It's important to know how to proactively protect your personal information. Today's guest is Kevin Roundy. Dr. Roundy received his Ph.D. from the University of Wisconsin where he developed tools by which malware can be analyzed both with detailed statistical analysis techniques and dynamic instrumentation. He has collaboratively developed threat detection tools and has offered several research publications and patents. He also has a background in machine learning and database systems.
Show Notes:Thanks for joining us on Easy Prey. Be sure to subscribe to our podcast on iTunes and leave a nice review.
Links and Resources:
By Chris Parker4.7
3030 ratings
Once a data breach has taken place, your data can be sold and resold and resold again. It's important to know how to proactively protect your personal information. Today's guest is Kevin Roundy. Dr. Roundy received his Ph.D. from the University of Wisconsin where he developed tools by which malware can be analyzed both with detailed statistical analysis techniques and dynamic instrumentation. He has collaboratively developed threat detection tools and has offered several research publications and patents. He also has a background in machine learning and database systems.
Show Notes:Thanks for joining us on Easy Prey. Be sure to subscribe to our podcast on iTunes and leave a nice review.
Links and Resources:
37,525 Listeners

21,195 Listeners

11,790 Listeners

10,748 Listeners

131 Listeners

8,046 Listeners

1,089 Listeners

1,908 Listeners

47,327 Listeners

349 Listeners

4,697 Listeners

2,140 Listeners

7,984 Listeners

19,671 Listeners

1 Listeners