Secure Talk reviews the latest threats, tips, and trends on security, innovation, and compliance. Host Justin Beals interviews leading privacy, security and technology executives to discuss best practices related to IT security, data protection and compliance. Based in Seattle, he previously served as the CTO of NextStep and Koru, which won the 2018 Most Impactful Startup award from Wharton People Analytics. He is the creator of the patented Training, Tracking & Placement System and the auth ...
…
continue reading
Seattle Contractor Podcasts
CRD Design Build is a residential remodeling company located in Seattle Washington. Their motto “Don’t live with it. Love it.” has inspired the company to share their advice and knowledge surrounding remodeling with homeowners around the country. Covering everything from Seattle building codes, surviving construction, the do’s and dont’s, and design tips/trends. Join host Kennadie on an educational journey to learn all the ins and outs of getting the house of your dreams. No unforeseen circu ...
…
continue reading
Seattle Contractor and owner of Amyworks, Amy Ecklund, and homeowner and DIY'er Alicia Healey discuss a broad range of home repair, remodeling and home appliance issues. Topics, guests and your questions! Lighthearted, humorous and frank discussion to demystify your home! The first episodes were recorded in late 2019 right before COVID restrictions hit the United States. We're back with NEW episodes starting in June 2021! Send your home repair, remodeling or home appliance questions to askam ...
…
continue reading
Dunn Lumber is a locally-owned family business serving the home improvement and hardware needs of the city of Seattle since 1907. We're dedicated to giving our customers access not only to the highest quality materials, but also to cutting edge industry knowledge. Our Dunn Lumber podcast episodes highlight our vendors, products, and expert advice. We hope you'll give them a listen! Dunn Lumber: Building Success Together.
…
continue reading
1
Inside CMMC Implementation: What November 10th Means for Defense Contractors | Secure Talk with Bob Kolasky
55:38
55:38
Play later
Play later
Lists
Like
Liked
55:38Bob Kolasky walked the halls where CMMC was built. As founding director of CISA's National Risk Management Center, he watched this policy evolve from concept to pilot program to federal law—surviving three presidential administrations because the need never changed. On November 10, 2025, that policy becomes mandatory reality for every defense contr…
…
continue reading
1
Beyond Big Cities: Understanding Cybersecurity in Mid-Sized Communities | with Lars Kruse
51:57
51:57
Play later
Play later
Lists
Like
Liked
51:57When we think about cybersecurity, images of tech giants and major financial centers come to mind—but what about the towns where most of us actually live? This SecureTalk episode with cybersecurity researcher Lars Kruse explores an often-overlooked question: how do communities of 20,000-100,000 residents protect themselves in an increasingly digita…
…
continue reading
1
Preparing for the Quantum Era: Why Blockchain is Leading the Charge | James Stephens
46:19
46:19
Play later
Play later
Lists
Like
Liked
46:19By Justin Beals
…
continue reading
1
Breaking Cybersecurity's 12 Hidden Paradigms: A Futurist's Guide to Security Evolution with Heather Vescent
52:38
52:38
Play later
Play later
Lists
Like
Liked
52:38Discover how strategic foresight is revolutionizing cybersecurity thinking. In this compelling SecureTalk episode, renowned futurist Heather Vescent reveals the 12 invisible paradigms that have shaped our entire approach to cybersecurity - and why breaking them could transform how we defend digital systems. Back in 2017, Vescent applied strategic f…
…
continue reading
1
AI Coding Hype vs Reality: The 2025 AI Code Security Report with Chris Wysopal
46:36
46:36
Play later
Play later
Lists
Like
Liked
46:36In a converted hat factory in 1990s Boston, a group of hackers worked through the night to techno beats and Soul Coughing, driven by a simple philosophy: "smarter beats bigger." One of them, Chris Wysopal, would later stand before Congress and deliver a stark warning—a small group of dedicated hackers could bring down the entire internet in 30 minu…
…
continue reading
1
The Invisible Majority: How Social Media Erases 90% of Voices | Dr. Claire Robertson
44:08
44:08
Play later
Play later
Lists
Like
Liked
44:0890% of Twitter users are represented by only 3% of tweets. When you scroll through your feed and form opinions about what "people are saying" about politics, you're not seeing the voices of nine out of ten users. You're seeing the loudest, most extreme 10% who create 97% of all political content on the platform. In this episode of SecureTalk, host …
…
continue reading
1
An Identity Crisis: How AI Agents Are Redefining Enterprise Security | with Rishi Bhargava
41:13
41:13
Play later
Play later
Lists
Like
Liked
41:13The cybersecurity landscape just shifted permanently, and most organizations aren't ready. While CISOs struggle with alert fatigue from 40+ security tools, a new threat vector is emerging that makes traditional identity management obsolete: AI agents acting autonomously across enterprise systems. Join Secure Talk host Justin Beals for a critical co…
…
continue reading
1
The Insider Threat: How a US Soldier Planned for Years to Kill His Own Unit
55:05
55:05
Play later
Play later
Lists
Like
Liked
55:05The most dangerous threats don't break down the door - they already have the keys. March 23, 2003, Kuwait: Command Sergeant Major Bart Womack was loading ammunition and watching Tiger Woods play golf at 1 AM when a grenade rolled into his tent. What followed was every leader's worst nightmare - discovering that one of your own had been planning to …
…
continue reading
1
Machines Running Amok: We've Created More Than We Can Secure with Oded Hareven
45:12
45:12
Play later
Play later
Lists
Like
Liked
45:12Machines Running Amok: We've Created More Than We Can Secure Twenty years ago, you could count the servers in your data center. Today, we've unleashed an army of digital entities that's spiraling beyond our control. For every human employee, there are 50-100 machine identities operating in your environment—containers, serverless functions, and auto…
…
continue reading
1
Open Source vs Commercial: How "Winning Culture" Has Made Us More Vulnerable | Greg Epstein
1:00:00
1:00:00
Play later
Play later
Lists
Like
Liked
1:00:00Open Source vs Commercial: How "Winning Culture" Has Made Us More Vulnerable | Greg Epstein Silicon Valley's shift from collaborative open-source principles to winner-take-all commercial dominance hasn't just changed business models—it's made us fundamentally more vulnerable. When companies prioritize winning everything over building secure, collab…
…
continue reading
1
Securing AI at Enterprise Scale: Lessons from Walmart's Transformation with Tobias Yergin
44:22
44:22
Play later
Play later
Lists
Like
Liked
44:22When one of the world's largest enterprises deploys AI across 10,000+ developers, the security challenges are unlike anything most organizations have faced. In this episode of SecureTalk, we explore the critical security and strategic considerations for deploying AI tools at enterprise scale with Tobias Yergin, who led AI transformation initiatives…
…
continue reading
1
Special Episode: The Secure Talk Security Awareness Training 2025 (With HIPAA!)
1:11:17
1:11:17
Play later
Play later
Lists
Like
Liked
1:11:17SecureTalk 2025 Security Awareness Training | Complete Compliance Guide Welcome to SecureTalk's comprehensive 2025 Security Awareness Training video! This annually updated training is designed to help organizations meet their security compliance requirements while building a strong security culture. 🎯 What You'll Learn: Social Engineering & AI-Enha…
…
continue reading
1
The Security Leader Who Predicted AI Would Replace His Own Team (And Why He's Right) with Satyam Patel
42:02
42:02
Play later
Play later
Lists
Like
Liked
42:02🌙 THE MIDNIGHT SECURITY GUARDIAN: A CISO'S ORIGIN STORY At 2 AM, most people are dreaming. Satyam Patel is wide awake, sending texts to his security team: "Are we secure? Did we patch that server? Is MFA enabled on that service account?" This isn't insomnia—it's the origin story of how a "big firewall guy" transformed into one of cybersecurity's mo…
…
continue reading
1
Can Cybersecurity be "Agile"? with Brian Wagner
46:02
46:02
Play later
Play later
Lists
Like
Liked
46:02Can Security be “Agile”? with Brian Wagner In this comprehensive interview, Brian Wagner, CTO at Revenir and former AWS security executive, shares insights from his new book "Redefining Information Security" and explains why the cybersecurity industry needs a fundamental shift in approach. With over 20 years of experience leading security transform…
…
continue reading
1
The AI Creator's Confession: "I Built Google Translate to Unite People. It's Now Tearing Us Apart" with De Kai
44:18
44:18
Play later
Play later
Lists
Like
Liked
44:18What happens when you realize your life's work is being used to destroy what you hoped to create? Meet De Kai - the man who helped build Google Translate, Siri, and modern AI systems. In 1990s Hong Kong, he dreamed of AI that could bridge cultural divides. Thirty years later, he experienced his "Oppenheimer moment" - the same machine learning he pi…
…
continue reading
1
Securing Society Through Data Kindness: How Cooperation Becomes Our Best Defense with Aram Sinnreich and Jesse Gilbert
53:36
53:36
Play later
Play later
Lists
Like
Liked
53:36Episode Description: Every device around you is collecting data about you and everyone you interact with. Amazon Echo recordings are being subpoenaed in murder trials. Period tracking apps are being used to prosecute women. Ancestry websites are revealing family secrets. We're participants in the largest social experiment in human history—and we ne…
…
continue reading
1
The Quantum Security Precipice: Why Michele Mosca is Building Cryptographic Resilience Before It's Too Late
51:34
51:34
Play later
Play later
Lists
Like
Liked
51:34***Are you attending the Gartner GRC Summit? If so, come along on our Sunset Trip on June 10, 2025. Register here! https://www.strikegraph.com/boat-party-2025?utm_source=secure-talk&utm_medium=podcast&utm_campaign=gartner-boat-party Episode Description: When quantum computing pioneer Michele Mosca met Peter Shor in the 1990s, he thought quantum com…
…
continue reading
1
National Security in Crisis How Geopolitical Chaos Threatens Cybersecurity & Democracy" SecureTalk with Mike LeFever
48:14
48:14
Play later
Play later
Lists
Like
Liked
48:14In this riveting episode of SecureTalk, host Justin Beals welcomes back decorated military leader and security expert Mike LeFever, Executive Vice President of National Security at Concentric, to discuss the intersection of physical security, geopolitical instability, and the future of national defense. From the polarization of American politics to…
…
continue reading
1
How Russian Disinformation Networks Are Poisoning AI Chatbots | SecureTalk with NewsGuard Experts
43:28
43:28
Play later
Play later
Lists
Like
Liked
43:28Episode Summary: In this eye-opening episode of Secure Talk, host Justin Beals investigates how foreign disinformation campaigns have evolved to target AI systems. NewsGuard researchers McKenzie Sadeghi and Isis Blachez reveal their groundbreaking investigation into the Moscow-based Pravda network that has successfully infiltrated Western AI chatbo…
…
continue reading
1
The Future of APIs in the Age of AI Agents A Conversation with Postman's Sam Chehab
46:01
46:01
Play later
Play later
Lists
Like
Liked
46:01In this episode of SecureTalk, host Justin Beals explores the evolving world of API technology and security with Sam Chehab, Head of Security at Postman - the platform used by over 35 million developers and 90% of Fortune 500 companies. Episode Insights: Postman's Strategic Position: Learn why Sam joined Postman in September 2024 and how they're po…
…
continue reading
1
Beyond the Blinky Lights: Why Security Governance Drives Technology with Bryant Tow
46:50
46:50
Play later
Play later
Lists
Like
Liked
46:50In this eye-opening episode of SecureTalk, host Justin Beals welcomes Bryant Tow, Chief Security Officer at LeapFrog Services, to discuss why technology alone can't solve cybersecurity challenges. Bryant reveals how the "Ring of Security" concept shows that up to half of your attack surface lies outside of technology—in governance, policies, people…
…
continue reading
1
From Burning Servers to Enterprise Resilience: The Evolution of Internet Security With Akamai
45:39
45:39
Play later
Play later
Lists
Like
Liked
45:39In this eye-opening episode of SecureTalk, host Justin Beals welcomes Joe Gronemeyer, Solutions Engineer at Akamai Technologies, for a masterclass in how internet security has evolved from basic content delivery to sophisticated edge protection powering 30% of global web traffic. From stories of literally burning servers in 1999 to today's quantum-…
…
continue reading
1
"There's No Such Thing as Crypto Crime": Nick Furneaux on Blockchain Investigation, Digital Forensics, and the Future of Cryptocurrency
48:25
48:25
Play later
Play later
Lists
Like
Liked
48:25In this eye-opening episode of SecureTalk, host Justin Beals sits down with Nick Furneaux, renowned cryptocurrency investigator and author of the provocatively titled book "There's No Such Thing as Crypto Crime." Furneaux shares his extensive expertise on blockchain technology, cryptocurrency investigations, and the evolving landscape of digital fi…
…
continue reading
1
Hijacking AI Memory: Inside Johann Rehberger's ChatGPT Security Breakthrough
46:29
46:29
Play later
Play later
Lists
Like
Liked
46:29In this eye-opening episode of SecureTalk, host Justin Beals interviews Johann Rehberger, a seasoned cybersecurity expert and Red Team Director at Electronic Arts, about his groundbreaking discovery of a critical vulnerability in ChatGPT's memory system. Johann shares how his security background and curiosity about AI led him to uncover the "SPAIWA…
…
continue reading
1
Predicting Data Breach Risk: How Mathematical Privacy Is Revolutionizing Data Sharing with Simson Garfinkel
48:39
48:39
Play later
Play later
Lists
Like
Liked
48:39What if there was a way to precisely predict the risk of a major data breach when sharing information? In this illuminating episode of Secure Talk, Justin Beals sits down with Simson Garfinkel, renowned computer scientist, journalist, and author who helped implement differential privacy for the U.S. Census Bureau's 2020 census. As a fellow of the A…
…
continue reading
1
The Future of CMMC: Surviving the new Federal Security Landscape with Former NRMC Director Bob Kolasky
46:04
46:04
Play later
Play later
Lists
Like
Liked
46:04How do you secure a nation? Hint: look for the risks to the most critical infrastructure. In this critical episode of SecureTalk, host Justin Beals sits down with Robert Kolasky, former founding director of the National Risk Management Center at DHS and current Senior VP for Critical Infrastructure at Exiger. As the new administration implements sw…
…
continue reading
1
Redefining Personhood: The Legal and Ethical Challenges of an Advanced General Intelligence with James Boyle
48:55
48:55
Play later
Play later
Lists
Like
Liked
48:55In a groundbreaking conversation on SecureTalk, legal scholar James Boyle explores the complex landscape of artificial intelligence and biological innovation, challenging our understanding of personhood and consciousness. Drawing from his recent book “The Line: Artificial Intelligence and the Future of Personhood”, Boyle dissects the potential futu…
…
continue reading
1
How Do You Get 10,000 Developers To Write Secure Code? With Dimitry Shvartsman
44:03
44:03
Play later
Play later
Lists
Like
Liked
44:03If you've ever found yourself frustrated watching deadlines slip by as your development team waits on yet another security review, you're not alone. In today's competitive landscape, companies are caught in a difficult balancing act: move quickly to deliver the features customers want or slow down to ensure those features don't introduce vulnerabil…
…
continue reading
1
AI Therapy: Should we believe Silicon Valley's Bold Claim at Solving Mental Health? With Daniel Oberhaus
51:15
51:15
Play later
Play later
Lists
Like
Liked
51:15In this episode of SecureTalk, Justin Beals welcomes Daniel Oberhaus, the author of Silicon Shrink, to discuss the revolutionary and controversial integration of artificial intelligence (AI) in mental health care. Daniel demystifies the central theme of his book, explaining the concept of Silicon Shrink and exploring how AI tools are increasingly b…
…
continue reading
1
From Arab Spring Frontlines to Cybersecurity Frontiers: A Naval Officer's Journey with Terence Bennett
45:08
45:08
Play later
Play later
Lists
Like
Liked
45:08Terence Bennet watched from the deck of the USS Paul Hamilton as the Arab Spring unfolded. As a naval officer, he realized that his battlefield awareness was limited by good intelligence. Intelligence drove good decision-making. And in an area of conflict, good decision-making is the difference between mission success and failure. In this episode o…
…
continue reading
1
The AI wars and what DeepSeek means to AI and Security
48:50
48:50
Play later
Play later
Lists
Like
Liked
48:50In our latest SecureTalk episode, Justin Beals gathers Micah Spieler, Chief Product Officer, and Josh Bullers, Head of AI, to explore the multifaceted world of AI and cybersecurity. With the recent release of DeepSeek-r1, the AI marketplace has been thrown into turmoil. It has rocked the hubris of Silicon Valley and questioned the validity and valu…
…
continue reading
1
What Matters Next: Decision Making in a Rapidly Changing World with Kate O'Neill.
54:46
54:46
Play later
Play later
Lists
Like
Liked
54:46In this episode of Secure Talk, host Justin Beals welcomes Kate O'Neill, a passionate tech humanist dedicated to crafting technology solutions that genuinely prioritize people. Together, they explore the key themes of Kate's books, “Tech Humanist” and 'What Matters Next: A Leader's Guide to Making Human-Friendly Tech Decisions in a World That's Mov…
…
continue reading
1
Unveiling the Secrets of Cryptography with Panos Louridas: Early Computing, Encryption, and Modern Challenges
43:32
43:32
Play later
Play later
Lists
Like
Liked
43:32In this episode of SecureTalk, host Justin Beals warmly welcomes Panos Louridas for an insightful discussion on the history, evolution, and future of cryptography. Panos has deep expertise and authored a book called "Cryptography" that helps explain the history of keeping secrets, important innovations in the field and the mathematical functions of…
…
continue reading
1
From Botnets to AI Health: Michael Tiffany’s Mission to Empower Personal Data Sovereignty
44:59
44:59
Play later
Play later
Lists
Like
Liked
44:59In 2000 the internet was expanding at an astronomical rate. Consumers were logging in via dial-up modems by the hundreds of millions and businesses were racing to maximize their footprint in the digital world. A hacker named Onel de Guzman living in the Philippines had been playing with a script called “I Love You”. Distributed via email, it could …
…
continue reading
1
Cryptography, Quantum Computing, and the Future of Security with Dr. Bill Anderson
50:40
50:40
Play later
Play later
Lists
Like
Liked
50:40Without the ability to keep secrets, our internet would fail. Without effective cryptography the internet would never have graduated from the hobbyist interest. And we have great examples of networks without effective encryption like the worldwide HAM radio operators. I’ve been utilizing cryptography in the development of web applications since my …
…
continue reading
1
Inventing Threat Intelligence: The Story Behind Eldon Sprickerhoff's Startup Success
44:01
44:01
Play later
Play later
Lists
Like
Liked
44:01Eldon Spickerhoff founded eSentire in 2001. He had been a Senior Information Security Engineer for ING Prime after completing his academic work at Waterloo University. At the time the cybersecurity solutions marketplace was primarily a services offering, focusing on vulnerability scanning. The team at eSentire realized that the tools deployed in vu…
…
continue reading
1
The Cybersecurity Maturity Model (CMMC) has arrived! with Stephen Ferrell
31:06
31:06
Play later
Play later
Lists
Like
Liked
31:06In this episode of Secure Talk, Justin welcomes Stephen Ferrell, a cybersecurity expert and Chief Strategy Officer of Strike Graph, to discuss the significant changes in the compliance landscape brought about by the Cybersecurity Maturity Model Certification (CMMC). They explore the recent finalization of the CMMC rule, its implications for the def…
…
continue reading
1
Unlocking AI’s Potential Privately, Safely and Responsibly with Dan Clarke
52:35
52:35
Play later
Play later
Lists
Like
Liked
52:35Privacy laws in our modern computing era have been around for well over twenty years. The conversation around appropriate privacy measures and effective governance of data has matured quite nicely since the early days of the Internet. While breaches do continue to happen, laws like GDPR, HIPAA and CCPA have helped set expectations for ethical and e…
…
continue reading
1
Innovative Approaches to Cyber Security Awareness Training with Craig Taylor
49:25
49:25
Play later
Play later
Lists
Like
Liked
49:25In this episode of Secure Talk, host Justin Beals, CEO and founder of Strike Graph, discusses cybersecurity awareness training with Craig Taylor, CEO and co-founder of CyberHoot. They explore the evolution and significance of security training, particularly in light of the rising number of phishing attacks. Taylor shares insights from his extensive…
…
continue reading
1
The Evolution of Identity Management with Eric Olden
48:20
48:20
Play later
Play later
Lists
Like
Liked
48:20In this episode of Secure Talk we discuss the evolution of identity management with Eric Olden, co-founder and CEO of Strata Identity. Identity Management is at the heart of secure computing practices. And the requirements placed on it are ever-growing. Get it wrong, and you will expose the ‘crown jewels’ of your business. Today, many solutions rel…
…
continue reading
1
Fairy Tales and Firewalls: Bridging Myths with Modern Security
48:56
48:56
Play later
Play later
Lists
Like
Liked
48:56Cybersecurity is complicated; weird acronyms, massive risks and arcane skills. How do we teach or learn about cybersecurity in human ways? In this episode of SecureTalk, host Justin Beals is joined by cybersecurity researcher Luca Viganò to discuss his innovative approach to demystifying cybersecurity concepts using fairy tales. Luca shares his pas…
…
continue reading
1
Application Security Management and the new SBOM with Idan Plotnik
48:49
48:49
Play later
Play later
Lists
Like
Liked
48:49In this episode of SecureTalk, host Justin Beals speaks with Idan Plotnik, co-founder and CEO of Apiiro, about the complexities of application security and innovation. They discuss Idan's career, which began with his early interest in secure computing as an engineer for the Israeli Defence Force. Later, while at Microsoft, Idan was frustrated by th…
…
continue reading
1
Privacy Reforms We Need Now with James B. Rule
44:21
44:21
Play later
Play later
Lists
Like
Liked
44:21It’s easy to consider privacy as a technology issue, or a legal challenge. But our concepts of privacy have a lot to do with what type of community we would all like to live in. What happens when we consider privacy a right as opposed to a commodity? Join us on Secure Talk for an in-depth exploration of the complex world of privacy with esteemed so…
…
continue reading
1
Is Technology a Religion? with Greg Epstein
53:53
53:53
Play later
Play later
Lists
Like
Liked
53:53Have you ever felt like tech fandom was turning into a cult? A tech founder ‘preached’ that they heralded a new paradigm for humanity? AI will change everything, Cryptocurrency will make you rich, the ‘Singularity’ is coming! Elon Musk, Sam Altman, Steve Jobs, Bill Gates, etc are raised up as the new messiah by thousands of worshipers. Is it really…
…
continue reading
1
Enterprise Security from Healthcare to GE: Accountability, Strategy, and Value Creation with Bob Chaput
52:19
52:19
Play later
Play later
Lists
Like
Liked
52:19My first SOC 2 audit as a Chief Technology Officer felt like performance art. Here we were, dancing to the tune of an auditor that had never built a web application, let alone a business. So many of their playbooks were repeated from other businesses and didn’t make us more secure. When we were done I was certainly glad to show off our new ‘certifi…
…
continue reading
1
Forging the future of security with Rey Kirton at Forgepoint Capital
44:06
44:06
Play later
Play later
Lists
Like
Liked
44:06In the never-ending vortex of Silicon Valley's hype cycle, it's easy to get lost in the sea of superficial success stories and forget that true innovation often requires patience, persistence, and a willingness to disrupt the status quo – not just a fancy logo or a tweet from a billionaire CEO. Inside of the froth however, there are investors and v…
…
continue reading
1
Ethics and Innovation in Medical AI: A Conversation with Dr. Paul Campbell
49:05
49:05
Play later
Play later
Lists
Like
Liked
49:05"If you torture the data long enough, it will confess to anything" said Ronald Coase. Certainly the advent of AI has created some spectacular progress and failures. In the realm of patient care AI tools can have a powerful impact and there is little room for error. How do professionals in the Medical Device and Medical Software space prepare their …
…
continue reading
1
Cyber Warfare and National Cyber Defense with Jason Healey
45:46
45:46
Play later
Play later
Lists
Like
Liked
45:46Much of the United States' progress since World War II on the global stage is due to a powerful partnership between private industry and the US government. The internet itself was a DARPA research project now turned into an economic juggernaut. How do we feed and support this powerful partnership? In this episode of SecureTalk, host Justin Beals we…
…
continue reading
1
Making Security a Part of Product Development with Naomi Buckwalter
43:03
43:03
Play later
Play later
Lists
Like
Liked
43:03I’ve participated or led technology product teams for 25 years. And engaging in effective security practices was three simple activities: least privileges, change management and network/server configurations. But in an ever-changing security environment, how do security leaders engage product teams in effective practices? Join us on Secure Talk wit…
…
continue reading
1
From Cryptography to Web 3 powered by Blockchain with David Holtzman
49:56
49:56
Play later
Play later
Lists
Like
Liked
49:56The state of networked computing systems today relies heavily on a networking architecture designed and implemented by people like David Hotlzman, our guest on Secure Talk. But what if our current “world wide web” was just the progenitor of an n-dimension “internet stack”? Does Web 3 offer the opportunity to evolve a seemingly monolithic internet? …
…
continue reading