Posts filed under "Podcast"

Today in Cybersecurity: Virtualization Security

Once an organization begins employing virtualization, they become less secure unless they utilize fault tolerance to keep things running in the event... [read more]

Today in Cybersecurity: Insider versus Outsider Threats

Threats come from inside through employees or vendors, and from the outside through hackers or infected websites. Both types of threats should... [read more]

Today in Cybersecurity: Physical Security

Physical security has to do with all aspects of making sure that information systems are protected from anything in their physical environment.... [read more]

Today in Cybersecurity: Honeypots

A honeypot is a computer on a network that is deliberately vulnerable, in order to lure attackers away from other more critical... [read more]

Today in Cybersecurity: Separation of Duties

Separation of duties, together with the principle of least privilege, are two important areas to address in order to reduce or eliminate... [read more]

Today in Cybersecurity: The Principle of Least Privilege

An individual should only be given the least amount of privilege necessary to do their job. Granting more access than is necessary... [read more]

Today in Cybersecurity: Access Control

Access control is applied to packets on a network, connections between computers, and users and their ability to access files and folders... [read more]

Today in Cybersecurity: The Cloud

What is the cloud? Where is it located? How is our data protected while in the cloud? What happens when there is... [read more]

Today in Cybersecurity: Penetration Testing

Penetration testing is a process in which we try to infiltrate computers or devices on a network from the outside or the... [read more]

Today in Cybersecurity: Baselining

Baselining is a technique we use to enhance our security and alert us that something is not right and may need further... [read more]

Today in Cybersecurity: Disaster Recovery and Business Continuity

Disaster recovery is part of business continuity, and is concerned with getting essential services for the organization up and running as fast... [read more]

Today in Cybersecurity: Passwords

Passwords are the single most common thing we use to authenticate ourselves to a computer system. But it is surprising how little... [read more]

Today in Cybersecurity: Zero-day Attacks

A zero-day attack is a malware attack that is so new it is not recognized by signature-based anti-virus software, and is therefore... [read more]

Today in Cybersecurity: Computer Forensics

Computer forensics is a set of processes used to acquire and analyze digital evidence. This is useful in determining how malware entered... [read more]

Today in Cybersecurity: Risk Assessment

A risk assessment is used to identify assets within an organization, determine the threats to those assets, evaluate the probabilities of the... [read more]

Today in Cybersecurity: Encryption

Encryption is a process where we take information that is readable and make it unreadable. Symmetric encryption uses one key to encrypt... [read more]

Today in Cybersecurity: Backups

James Antonakos of the National Cybersecurity Institute explains the importance of performing backups on a regular basis, testing the backups to make... [read more]

Today in Cybersecurity: Social Engineering

James Antonakos of the National Cybersecurity Institute explains social engineering. This technique is essentially clever lying or deception, where one human tricks... [read more]

Today in Cybersecurity: Layered Security

Security must be built in layers, with each layer providing a different measure of security, such as hardware, software, and even human... [read more]

Today in Cybersecurity: Authentication

Authentication is how a human proves who he or she is to a computer, using one or more of the following: something... [read more]