2024 Calendar

Cybersecurity

Cybersecurity Best Practices Part 2: How to Secure Your Smartphone!

By: Rex M. Lee for My Smart Privacy 

Rex M. Lee, Security Advisor/Tech Journalist, gives an interview for CyberTalk TV on how to secure your smartphone.

See More

Cybersecurity Threats & Best Practices Part 1

By: Rex M. Lee for My Smart Privacy 

In this fascinating interview security advisor Rex M. Lee is interviewed by CyberTalk TV’s Merle Garrison regarding cybersecurity threat vectors and actors, plus best practices and solutions.

See More

Understanding Zero Trust Security with Darren Olson, WeSecure

By: Rex M. Lee for My Smart Privacy 

Rex M. Lee, Security Advisor, interviews WeSecure CTO, Darren Olson, who explains Zero Trust security, for Smart Africa. 

See More

Tech-Based Hybrid Warfare Part 2: Risk Factors & Attack Vectors

By: Rex M. Lee for My Smart Privacy 

Freedom of The Press host, Merle Garrison, interviews security advisor Rex M. Lee, My Smart Privacy regarding Tech-Based Hybrid Warfare which is "Warfare Without Rules Where Everyone Connected to the Internet is a Target".

See More

Security Advisor, Rex M. Lee Speaking at GC3B in Ghana, Africa

TechTalk Summits Security Advisor Rex M. Lee, My Smart Privacy, will be speaking at the GC3B Global Conference on Cyber Capacity Building centered on global cybersecurity threats.

The Global Conference on Cyber Capacity Building (GC3B) is a first-of-its-kind flagship gathering of leaders, decision-makers, and experts across borders and sectors working toward effective, sustainable, and inclusive stewardship of international cooperation for cyber resilient development in the era of digital interdependence.

See More

Tech-Based Hybrid Warfare Part 1: Cost of a Data Breach and Weaponized Apps, Social Media, and AI

Security Advisor, Rex M. Lee, interview with CyberTalk TV

Freedom of The Press host, Merle Garrison, interviews security advisor Rex M. Lee, My Smart Privacy regarding Tech-Based Hybrid Warfare which is "Warfare Without Rules Where Everyone Connected to the Internet is a Target".

In Part 1, Merle and Rex discuss the cost of a data breach, plus how smartphones, operating systems, apps, social media platforms, and generative AI can be compromised by Big Tech, nation-state threat actors, and criminal organizations.

See More

Negative Consequences from Clicking on “I Agree” Understanding App, Social Media, and AI Terms of Service

By Rex M. Lee, Security Advisor 

Before consumers of technology can understand the terms of service they are accepting when they click on “I Agree,” it is important for the consumer to understand that Alphabet (Google), Apple, and Microsoft are in the “Information Trafficking Industry”.

See More

International Cybersecurity Standards Do Not Address Surveillance Capitalism

By Rex M. Lee, Security Advisor, My Smart Privacy

Cybersecurity compliance, such as ISO 27001, GDPR & CCPA, do not address endpoint security and privacy threats posed by Surveillance Capitalism employed by Alphabet (Google), Apple, and Microsoft.

See More

AI Used for Unrestricted Warfare

CyberTalk TV Interview with Rex M. Lee

Global superpowers are competing on a new battleground: artificial intelligence (AI). But how far does global competition lag behind U.S. development? Will AI be used for tech-based hybrid warfare posing security and privacy threats to end users, including businesses that adopt the use of AI? NTD spoke to Rex Lee, cybersecurity adviser at My Smart Privacy, for more.

See More

Internet & Tech Decentralization

By Rex M. Lee

During the proliferation of the internet in the 1990s, the internet was decentralized enabling free trade and commerce on an equal basis where content creators were free to publish anything at will.

Although the internet today is still theoretically decentralized, we cannot discount the fact that the internet, artificial intelligence (AI), and connected technology have been centralized by a handful of multinational corporations that include Google, Apple, and Microsoft.

See More