Player FM - Internet Radio Done Right
Checked 9M ago
Agregado hace cuarenta y siete semanas
Contenido proporcionado por Rocheston LLC. and Haja Mo. Todo el contenido del podcast, incluidos episodios, gráficos y descripciones de podcast, lo carga y proporciona directamente Rocheston LLC. and Haja Mo o su socio de plataforma de podcast. Si cree que alguien está utilizando su trabajo protegido por derechos de autor sin su permiso, puede seguir el proceso descrito aquí https://es.player.fm/legal.
Player FM : aplicación de podcast
¡Desconecta con la aplicación Player FM !
¡Desconecta con la aplicación Player FM !
Podcasts que vale la pena escuchar
PATROCINADO
Hilde Mosse comes from one of the wealthiest families in Berlin and stands to inherit an enormous fortune. But she longs for something more meaningful than the luxurious lifestyle her family provides. So Hilde decides to pursue her dream of becoming a doctor. As the Nazis take power in Germany and the Mosse family is forced to flee, Dr. Hilde Mosse lands in New York having nearly lost everything.. She finds her calling treating the mental health of Black youth – and the symptoms of a racist system. In addition to photographs, school records, and correspondence spanning Hilde Mosse’s entire lifetime, the Mosse Family Collection in the LBI Archives includes the diaries she kept between 1928 and 1934, from the ages of 16-22. Hilde’s papers are just part of the extensive holdings related to the Mosse Family at LBI. Learn more at lbi.org/hilde . Exile is a production of the Leo Baeck Institute, New York and Antica Productions. It’s narrated by Mandy Patinkin. This episode was written by Lauren Armstrong-Carter. Our executive producers are Laura Regehr, Rami Tzabar, Stuart Coxe, and Bernie Blum. Our producer is Emily Morantz. Research and translation by Isabella Kempf. Voice acting by Hannah Gelman. Sound design and audio mix by Philip Wilson. Theme music by Oliver Wickham. Please consider supporting the work of the Leo Baeck Institute with a tax-deductible contribution by visiting lbi.org/exile2025 . The entire team at Antica Productions and Leo Baeck Institute is deeply saddened by the passing of our Executive Producer, Bernie Blum. We would not have been able to tell these stories without Bernie's generous support. Bernie was also President Emeritus of LBI and Exile would not exist without his energetic and visionary leadership. We extend our condolences to his entire family. May his memory be a blessing. This episode of Exile is made possible in part by a grant from the Conference on Jewish Material Claims Against Germany, which is supported by the German Federal Ministry of Finance and the Foundation Remembrance, Responsibility and Future.…
Firewalls, IDS and Web Servers - Episode 6 : Logically Speaking: Leveraging Log Management for Security
Manage episode 416198273 series 3566023
Contenido proporcionado por Rocheston LLC. and Haja Mo. Todo el contenido del podcast, incluidos episodios, gráficos y descripciones de podcast, lo carga y proporciona directamente Rocheston LLC. and Haja Mo o su socio de plataforma de podcast. Si cree que alguien está utilizando su trabajo protegido por derechos de autor sin su permiso, puede seguir el proceso descrito aquí https://es.player.fm/legal.
…
continue reading
239 episodios
Manage episode 416198273 series 3566023
Contenido proporcionado por Rocheston LLC. and Haja Mo. Todo el contenido del podcast, incluidos episodios, gráficos y descripciones de podcast, lo carga y proporciona directamente Rocheston LLC. and Haja Mo o su socio de plataforma de podcast. Si cree que alguien está utilizando su trabajo protegido por derechos de autor sin su permiso, puede seguir el proceso descrito aquí https://es.player.fm/legal.
…
continue reading
239 episodios
Todos los episodios
×
1 Mastering Cloud Security Essentials - Episode 8 : Guarding the Google Cloud: Strategies for GCP Security 4:12

1 Mastering Cloud Security Essentials - Episode 7 : Azure’s Armor: Best Practices for Microsoft’s Cloud 4:38

1 Mastering Cloud Security Essentials - Episode 6 : Navigating the Nimbus: Securing AWS Environments 4:32

1 Mastering Cloud Security Essentials - Episode 5 : Dual Keys to the Kingdom: The Power of 2FA in Cloud Security 4:14

1 Mastering Cloud Security Essentials - Episode 4 : Fortresses in the Sky: Implementing Cloud Firewalls 4:33

1 Mastering Cloud Security Essentials - Episode 3 : The Gatekeepers of the Cloud: IAM Fundamentals 4:33

1 Mastering Cloud Security Essentials - Episode 2 : Orchestrating Safety: Docker and Kubernetes Security 4:56

1 Mastering Cloud Security Essentials - Episode 1 : Lifting the Fog: An Intro to Cloud Security Fundamentals 4:21

1 Internet of Things (IoT) Security - Episode 8 : The Future of IoT Security: Trends and Innovations to Watch 4:12

1 Internet of Things (IoT) Security - Episode 7 : IoT in Healthcare: Safeguarding Medical Devices and Patient Data 4:38

1 Internet of Things (IoT) Security - Episode 6 : Patch and Protect: The Role of Updates in IoT Security 4:32

1 Internet of Things (IoT) Security - Episode 5 : IoT and Privacy: Balancing Innovation with User Rights 4:14

1 Internet of Things (IoT) Security - Episode 4 : Building a Fortified IoT Ecosystem: Best Practices for Businesses 4:33

1 Internet of Things (IoT) Security - Episode 3 : The Dark Side of Convenience: Vulnerabilities in IoT 4:33

1 Internet of Things (IoT) Security - Episode 2 : Securing Your Smart Home: Practical Steps for Protection 4:56

1 Internet of Things (IoT) Security - Episode 1 : The Rise of IoT: Navigating a Connected World 4:21

1 Zero Trust Architecture - Episode 6 : Zero Trust in Action: Success Stories and Lessons Learned 4:38

1 Zero Trust Architecture - Episode 5 : Continuous Monitoring and Analytics: The Watchful Eyes of Zero Trust 4:22

1 Zero Trust Architecture - Episode 4 : Securing the Castle: Network Segmentation and Micro-segmentation in Zero 4:57

1 Zero Trust Architecture - Episode 3 : The Role of Identity in Zero Trust: From Users to Devices 4:57

1 Zero Trust Architecture - Episode 1 : The Zero Trust Philosophy: A New Blueprint for Security 4:14

1 Firewalls, IDS and Web Servers - Episode 7 : Standing Guard: Continuous Monitoring and Incident Response 4:05

1 Firewalls, IDS and Web Servers - Episode 6 : Logically Speaking: Leveraging Log Management for Security 4:01

1 Firewalls, IDS and Web Servers - Episode 5 : Behind Enemy Lines: Penetration Testing Your Web Server 4:39

1 Firewalls, IDS and Web Servers - Episode 4 : Patchwork Security: The Art of Vulnerability Management 4:06

1 Firewalls, IDS and Web Servers - Episode 3 : The Guardian at the Gates: Web Application Firewalls (WAF) 4:35

1 Firewalls, IDS and Web Servers - Episode 2 : Intruder Alerts: Setting Up Web Server Intrusion Detection Systems 4:23

1 Firewalls, IDS and Web Servers - Episode 1 : Castle Walls: Erecting Robust Web Server Defenses 4:15

1 Web Application Attacks - Episode 9 : Infiltration Tactics: Uncovering Component Vulnerabilities 4:11

1 Web Application Attacks - Episode 8 : Impersonation Games: The Dangers of Phishing Attacks in Web Security 4:10

1 Web Application Attacks - Episode 7 : Crashing the Gates: Defending Against Distributed Denial of Service (DDoS) 4:29

1 Web Application Attacks - Episode 6 : Broken Access: Elevating Privileges and Breaking Control 4:06

1 Web Application Attacks - Episode 4 : Identity Theft: Unraveling Cross-Site Request Forgery (CSRF) 4:21

1 Web Application Attacks - Episode 1 : Diving into the Digital Abyss: Intro to Web App Attacks 2:59

1 Vulnerability Management - Episode 8 : Learning from the Battlefield: Real-World Case Studies in Vulnerability Management 4:27

1 Vulnerability Management - Episode 7 : Crafting a Cyber-Resilient Culture: Education and Awareness 4:15

1 Vulnerability Management - Episode 6 : Tools of the Trade: Essential Technology for Vulnerability Management 4:13

1 Vulnerability Management - Episode 5 : Closing the Gates: Strategies for Mitigating Identified Vulnerabilities 4:02

1 Vulnerability Management - Episode 4 : Cyberthreat Intelligence: Navigating the Digital Threat Landscape 4:13

1 Vulnerability Management - Episode 3 : The Penetration Test Playbook: Simulating Cyber Attacks 4:40

1 Vulnerability Management - Episode 2 : The Risk Radar: Mastering Risk Assessment in Cybersecurity 4:21

1 Vulnerability Management - Episode 1 : Unveiling the Shadows: Introduction to Vulnerability Assessment 4:39

1 Secure Software Development - Episode 7 : Secure by Design: Embedding Security in Architecture 4:29

1 Secure Software Development - Episode 5 : Continuous Integration and Continuous Deployment (CI/CD) Security 4:22

1 Secure Software Development - Episode 3 : Writing Secure Code: Best Practices and Avoidable Pitfalls 4:17

1 Ransomware Attacks - Episode 10 : Fostering Security Culture: Leadership’s Role in Mitigating Ransomware 4:31

1 Ransomware Attacks - Episode 9 : Next-Gen Defenses: AI and Machine Learning in Combatting Ransomware Attacks 4:42

1 Ransomware Attacks - Episode 8 : Intelligence-Driven Defense: Utilizing Threat Intelligence in Ransomware Prevention 4:30

1 Ransomware Attacks - Episode 7 : The Aftermath: Legal and Judiciary Dimensions of Ransomware Attacks 4:26

1 Ransomware Attacks - Episode 6 : Bouncing Back Ransomware Recovery and Business Continuity Planning 4:36

1 Ransomware Attacks - Episode 5 : Endpoint Guardianship: Essential Security Against Ransomware Intrusions 4:33

1 Ransomware Attacks - Episode 4 : Early Warning Systems: Tools for Detecting and Responding to Ransomware 4:47

1 Ransomware Attacks - Episode 3 : Empowering the Frontline: Employee Training Against Ransomware Threats 4:34

1 Ransomware Attacks - Episode 2 : Fortifying Foundations: Building Resilient Infrastructures Against Ransomware 4:45

1 Quantum Computing - Episode 3 : Breaking Codes, Building Futures: Quantum Computing and Encryption 4:18

1 Data Protection and Privacy - Episode 3 : The Privacy Paradox: Balancing Convenience and Confidentiality 4:24

1 Phishing Attacks - Episode 7 : Practicing the Drill: Phishing Attack Simulations in Organizations 3:58

1 Phishing Attacks - Episode 5 : Fortifying Your Digital Defenses: Phishing Prevention Techniques 4:06

1 Red and Blue Teams Penetration Testing - Episode 6 : Lessons from the Field: Real-World Red and Blue Team Operations 4:35

1 Red and Blue Teams Penetration Testing - Episode 5 : MITRE ATT&CK Framework: Decoding Adversary Tactics and Techniques 4:35

1 Red and Blue Teams Penetration Testing - Episode 4 : Playing the Cyber Chess Game: Red and Blue Team Exercises Explained 4:31

1 Red and Blue Teams Penetration Testing - Episode 3 : Fortifying the Digital Fort: Blue Team Defense Strategies 4:12

1 Red and Blue Teams Penetration Testing - Episode 2 : The Arsenal of the Red Team: Tools and Tactics for Breaching Defenses 5:09

1 Red and Blue Teams Penetration Testing - Episode 1 : Introduction to Red and Blue Teams: The Cyber Yin and Yang 4:30

1 NIST Framework: A Guide for Organizations - Episode 6 : Resilience and Recovery with NIST: Exploring the ‘Recover’ Function 4:45

1 NIST Framework: A Guide for Organizations - Episode 5 : Rapid Response with NIST: Navigating the ‘Respond’ Function 5:01

1 NIST Framework: A Guide for Organizations - Episode 4 : NIST’s Vigilant Eye: Mastering the ‘Detect’ Function 4:46

1 NIST Framework: A Guide for Organizations - Episode 3 : Fortifying Defenses with NIST: The ‘Protect’ Function 4:45

1 NIST Framework: A Guide for Organizations - Episode 2 : NIST in Action: The ‘Identify’ Function Unveiled 4:16

1 NIST Framework: A Guide for Organizations - Episode 1 : Decoding NIST: An Introduction to the Cybersecurity Framework 4:45

1 Network Security - Episode 8 : The Human Element: Cultivating a Culture of Security Awareness 4:31

1 Network Security - Episode 7 : VPN and Remote Access Security: Connecting Safely from a Distance 4:35

1 Network Security - Episode 5 : Defending Against the Dark Arts: Anti-Virus and Anti-Malware Strategies 4:09

1 Incident Response and Cyber Forensics - Episode 8 : The Future of Cyber Defense: Innovative Approaches to Incident Response 4:58

1 Incident Response and Cyber Forensics - Episode 7 : War stories from the Frontlines: Real-world Incident Response Tale 4:13

1 Incident Response and Cyber Forensics - Episode 6 : Legal Eagles: Navigating the Legalities of Cyber Incidents 4:16

1 Incident Response and Cyber Forensics - Episode 5 : Rebuilding and Recovery: Post-Incident Restoration Strategies 4:30

1 Incident Response and Cyber Forensics - Episode 4 : Contain and Eradicate: Halting Cyber Threats in Their Tracks 4:14

1 Incident Response and Cyber Forensics - Episode 3 : Tracing the Untraceable: Advanced Tracking in Cyber Forensics 4:37

1 Incident Response and Cyber Forensics - Episode 2 : The Digital Detective: Fundamentals of Cyber Forensics 4:36

1 Incident Response and Cyber Forensics - Episode 1 : First Response: The Golden Hour of Cyber Incident Management 4:16

1 Endpoint Security - Episode 7 : Cloud and Mobile Endpoints: Securing Devices in the Cloud Era 4:08

1 Endpoint Security - Episode 6 : Endpoint Security Hygiene: Best Practices for Users and Administrators 4:27

1 Endpoint Security - Episode 5 : The Zero Trust Model: Securing Endpoints in a Perimeterless World 4:13

1 Endpoint Security - Episode 3 : Navigating the BYOD Landscape: Security Challenges and Solutions 4:31

1 Cybersecurity Fundamentals for Dummies - Episode 8 : Cyber Hygiene: Maintaining a Healthy Digital Lifestyle 3:40

1 Cybersecurity Fundamentals for Dummies - Episode 7 : Beyond Passwords: Exploring Multi-Factor Authentication 4:12

1 Cybersecurity Fundamentals for Dummies - Episode 6 : Securing the Fort: Introduction to Home Network Security 4:38

1 Cybersecurity Fundamentals for Dummies - Episode 5 : Social Media Safeguarding: Privacy in the Public Sphere 4:19

1 Cybersecurity Fundamentals for Dummies - Episode 4 : Phishing for Trouble: Identifying Deceptive Emails 4:21

1 Cybersecurity Fundamentals for Dummies - Episode 3 : Digital Armour: The Basics of Online Protection 4:58

1 Cybersecurity Fundamentals for Dummies - Episode 2 : The Villains of the Virtual World: Common Cyber Threats 4:27

1 Cybersecurity Fundamentals for Dummies - Episode 1 : Entering the Matrix: Understanding Cybersecurity 4:13

1 DevSecOps in Organizations - Episode 3 : Beyond Deployment: Security in Operations and Beyond 4:59

1 DevSecOps in Organizations - Episode 2 : Building the Bridge: Integrating Security into Development 4:00

1 Cyber Law and Ethics - Episode 6 : The Dark Web and Legal Boundaries: Navigating the Underbelly 4:16

1 Cyber Law and Ethics - Episode 5 : Intellectual Property in the Cyber Age: Protecting Your Digital Assets 4:41

1 Cyber Threat Intelligence - Episode 8 : Building a Resilient Organization: Strategies for Effective Threat Intelligence 4:43

1 Cyber Threat Intelligence - Episode 7 : Cyber Espionage and Nation-State Actors: Uncovering Digital Spies 4:55

1 Cyber Threat Intelligence - Episode 6 : AI & Machine Learning: The Future of Cyber Threat Detection 4:41

1 Cyber Threat Intelligence - Episode 5 : The Human Factor: Social Engineering and Psychological Warfare 4:49

1 Cyber Threat Intelligence - Episode 3 : Anatomy of a Cyber Attack: From Infiltration to Resolution 5:09

1 Cyber Threat Intelligence - Episode 2 : The Art of Predictive Intelligence: Foreseeing Digital Threats 4:27

1 Cyber Threat Intelligence - Episode 1 : The ABCs of Cyber Threat Intelligence: Foundations Unveiled 4:40

1 Encryption and Cryptography - Episode 7 : Securing the Connection: The Mechanics of TLS Security 4:07

1 Encryption and Cryptography - Episode 6 : Quantum Quest: The Future of Cryptography in a Quantum World 4:00

1 Encryption and Cryptography - Episode 4 : Hashing It Out: The Role of Hash Functions in Cryptography 4:06

1 Encryption and Cryptography - Episode 3: Asymmetric Adventures: Exploring Public Key Cryptography 4:12

1 Encryption and Cryptography - Episode 2: Unlocking Symmetry: The Essentials of Symmetric Encryption 3:54

1 Encryption and Cryptography - Episode 1: Secrets of the Ages: A Historical Journey through Cryptography 3:59

1 Cybersecurity Framework, Laws and Governance- Episode 8: From Reporting to Recovery: Incident Management and Legal Compliance 4:34

1 Cybersecurity Framework, Laws and Governance- Episode 7: Governance and Culture: Embedding Compliance into Corporate DNA 4:34

1 Cybersecurity Framework, Laws and Governance- Episode 6: Crossing Borders: Compliance in Data Transfers and European Cyber Laws 4:13

1 Cybersecurity Framework, Laws and Governance- Episode 5: Navigating PCI-DSS: Securing Financial Transactions 4:24

1 Cybersecurity Framework, Laws and Governance- Episode 4: HIPAA in Action: Protecting Patient Data in the Healthcare Sector 4:34

1 Cybersecurity Framework, Laws and Governance- Episode 3: ISO 27001 and Beyond: International Standards for Cybersecurity Excellence 4:36

1 Cybersecurity Framework, Laws and Governance- Episode 2: Deciphering NIST Frameworks: A Blueprint for Cyber Resilience 4:14

1 Cybersecurity Framework, Laws and Governance- Episode 1: Unveiling Cybersecurity Laws: Global Landscape and Essential Principles 4:23

1 Chief Information Security Officers - Episode 8 : The Future of Cybersecurity Leadership: Trends and Predictions 4:09

1 Chief Information Security Officers - Episode 7 : Innovation vs. Security: Striking the Right Balance 4:19

1 Chief Information Security Officers - Episode 6 : The Art of Cyber Diplomacy: Building Alliances for Collective Defense 4:12

1 Chief Information Security Officers - Episode 5 : Cyber Crisis Management: Leading Through the Storm 4:37

1 Chief Information Security Officers - Episode 4 : Navigating the Regulatory Waters: Compliance as a Strategic Advantage 4:21

1 Chief Information Security Officers - Episode 3 : The Human Element: Cultivating a Security-First Culture 4:23

1 Chief Information Security Officers - Episode 2 : Building Resilient Organizations: Strategies for Cyber Readiness 4:35

1 Chief Information Security Officers - Episode 1 : The CISO’s Playbook: Leading Cybersecurity in the Modern Enterprise 4:16

1 Cyber Security Data Breaches - Episode 8 : Future-Proofing Your Organization: Emerging Technologies in Cybersecurity 3:52
In the final episode of the series, discover emerging technologies and innovative practices that could redefine cybersecurity. Gain insights on how AI, machine learning, and blockchain could help in preventing future breaches.
What can be learned from past data breaches? This episode looks at case studies to extract valuable lessons and practical actions that businesses can implement to fortify their defenses.

1 Cyber Security Data Breaches - Episode 6 : Recovery and Remediation: Strategies for Bounce Back 4:09
Explore the recovery phase following a breach, where organizations work to restore operations and strengthen systems. Experts share best practices for remediation and preventing future attacks.

1 Cyber Security Data Breaches - Episode 5 : Responding to the Crisis: Initial Steps to Recovery 3:49
We assess the financial, operational, and regulatory implications of data breaches. Industry experts discuss real-world examples to highlight direct and indirect costs associated with breached data.
Once inside, how does malware spread within a system, and what determines the scope of a breach? This episode examines the progression of a breach internally within organizations and what controls can contain the proliferation.
Delve into the specifics of how cyber attackers gain access to systems. This episode explores various entry points like phishing, poor authentication, and software vulnerabilities, providing insights on strengthening these potential weak spots.
This episode uncovers how breaches can often go unnoticed and discusses the vital signs that signal a potential breach. Experts weigh in on effective detection tools and strategies to identify suspicious activities before they escalate.

1 Blockchain - Episode 9 : A Deep Dive into Bitcoin, the Dark web, Ransomware and Other Illicit Payments Using Bitcoin in the Dark web 4:27
After detecting a breach, immediate response is crucial. This episode guides listeners through the first steps in launching an effective incident response, including containment strategies and stakeholder communication.

1 Artificial Intelligence - Episode 9: Mirrors and Smoke: The AI Illusions of Deep Fake and Fake News 4:10

1 Artificial Intelligence - Episode 8: The Frontier of Artificial Intelligence and Machine Learning 4:26

1 Artificial Intelligence - Episode 6: The Ethical Matrix: Navigating the Moral Quandaries of AI 4:26

1 Artificial Intelligence - Episode 4: Through the Looking Glass, Facial Recognition and Beyond 4:16

1 Cyber Forensics - Episode 7: The Fascinating Convergence of Cyber Security and Digital Forensics 4:48
Bienvenido a Player FM!
Player FM está escaneando la web en busca de podcasts de alta calidad para que los disfrutes en este momento. Es la mejor aplicación de podcast y funciona en Android, iPhone y la web. Regístrate para sincronizar suscripciones a través de dispositivos.