Player FM - Internet Radio Done Right
Checked 11M ago
Agregado hace uno año
Contenido proporcionado por Rocheston LLC. and Haja Mo. Todo el contenido del podcast, incluidos episodios, gráficos y descripciones de podcast, lo carga y proporciona directamente Rocheston LLC. and Haja Mo o su socio de plataforma de podcast. Si cree que alguien está utilizando su trabajo protegido por derechos de autor sin su permiso, puede seguir el proceso descrito aquí https://es.player.fm/legal.
Player FM : aplicación de podcast
¡Desconecta con la aplicación Player FM !
¡Desconecta con la aplicación Player FM !
Podcasts que vale la pena escuchar
PATROCINADO
AI and Generative AI are transforming cybersecurity by enhancing threat detection and response. These technologies offer unmatched accuracy and efficiency, making them crucial for protecting sensitive data. As cyber threats evolve, integrating AI into security strategies is essential. This week, Dave, Esmee and Rob talk to Corence Klop, CISO at the Rabobank, about the expanding role of AI and Generative AI in cybersecurity, and how to begin integrating these technologies into your organization. TLDR 04:45 Rob is confused about wrong AI information for a hotel booking 08:20 Conversation with Corence 33:40 How can you identify the state of flow for your end-user in agile practices? 40:50 Going to the swimming pool and disco with your daughter Guest Corence Klop: https://www.linkedin.com/in/corenceklop/ Hosts Dave Chapman: https://www.linkedin.com/in/chapmandr/ Esmee van de Giessen: https://www.linkedin.com/in/esmeevandegiessen/ Rob Kernahan: https://www.linkedin.com/in/rob-kernahan/ Production Marcel van der Burg: https://www.linkedin.com/in/marcel-vd-burg/ Dave Chapman: https://www.linkedin.com/in/chapmandr/ Sound Ben Corbett: https://www.linkedin.com/in/ben-corbett-3b6a11135/ Louis Corbett: https://www.linkedin.com/in/louis-corbett-087250264/ ' Cloud Realities' is an original podcast from Capgemini…
Firewalls, IDS and Web Servers - Episode 7 : Standing Guard: Continuous Monitoring and Incident Response
Manage episode 416198272 series 3566023
Contenido proporcionado por Rocheston LLC. and Haja Mo. Todo el contenido del podcast, incluidos episodios, gráficos y descripciones de podcast, lo carga y proporciona directamente Rocheston LLC. and Haja Mo o su socio de plataforma de podcast. Si cree que alguien está utilizando su trabajo protegido por derechos de autor sin su permiso, puede seguir el proceso descrito aquí https://es.player.fm/legal.
…
continue reading
239 episodios
Manage episode 416198272 series 3566023
Contenido proporcionado por Rocheston LLC. and Haja Mo. Todo el contenido del podcast, incluidos episodios, gráficos y descripciones de podcast, lo carga y proporciona directamente Rocheston LLC. and Haja Mo o su socio de plataforma de podcast. Si cree que alguien está utilizando su trabajo protegido por derechos de autor sin su permiso, puede seguir el proceso descrito aquí https://es.player.fm/legal.
…
continue reading
239 episodios
Toate episoadele
×
1 Mastering Cloud Security Essentials - Episode 8 : Guarding the Google Cloud: Strategies for GCP Security 4:12

1 Mastering Cloud Security Essentials - Episode 7 : Azure’s Armor: Best Practices for Microsoft’s Cloud 4:38

1 Mastering Cloud Security Essentials - Episode 6 : Navigating the Nimbus: Securing AWS Environments 4:32

1 Mastering Cloud Security Essentials - Episode 5 : Dual Keys to the Kingdom: The Power of 2FA in Cloud Security 4:14

1 Mastering Cloud Security Essentials - Episode 4 : Fortresses in the Sky: Implementing Cloud Firewalls 4:33

1 Mastering Cloud Security Essentials - Episode 3 : The Gatekeepers of the Cloud: IAM Fundamentals 4:33

1 Mastering Cloud Security Essentials - Episode 2 : Orchestrating Safety: Docker and Kubernetes Security 4:56

1 Mastering Cloud Security Essentials - Episode 1 : Lifting the Fog: An Intro to Cloud Security Fundamentals 4:21

1 Internet of Things (IoT) Security - Episode 8 : The Future of IoT Security: Trends and Innovations to Watch 4:12

1 Internet of Things (IoT) Security - Episode 7 : IoT in Healthcare: Safeguarding Medical Devices and Patient Data 4:38

1 Internet of Things (IoT) Security - Episode 6 : Patch and Protect: The Role of Updates in IoT Security 4:32

1 Internet of Things (IoT) Security - Episode 5 : IoT and Privacy: Balancing Innovation with User Rights 4:14

1 Internet of Things (IoT) Security - Episode 4 : Building a Fortified IoT Ecosystem: Best Practices for Businesses 4:33

1 Internet of Things (IoT) Security - Episode 3 : The Dark Side of Convenience: Vulnerabilities in IoT 4:33

1 Internet of Things (IoT) Security - Episode 2 : Securing Your Smart Home: Practical Steps for Protection 4:56
T
The Rocheston Cybersecurity Podcast

1 Internet of Things (IoT) Security - Episode 1 : The Rise of IoT: Navigating a Connected World 4:21
T
The Rocheston Cybersecurity Podcast

1 Zero Trust Architecture - Episode 6 : Zero Trust in Action: Success Stories and Lessons Learned 4:38
T
The Rocheston Cybersecurity Podcast

1 Zero Trust Architecture - Episode 5 : Continuous Monitoring and Analytics: The Watchful Eyes of Zero Trust 4:22
T
The Rocheston Cybersecurity Podcast

1 Zero Trust Architecture - Episode 4 : Securing the Castle: Network Segmentation and Micro-segmentation in Zero 4:57
T
The Rocheston Cybersecurity Podcast

1 Zero Trust Architecture - Episode 3 : The Role of Identity in Zero Trust: From Users to Devices 4:57
T
The Rocheston Cybersecurity Podcast

T
The Rocheston Cybersecurity Podcast

1 Zero Trust Architecture - Episode 1 : The Zero Trust Philosophy: A New Blueprint for Security 4:14
T
The Rocheston Cybersecurity Podcast

1 Firewalls, IDS and Web Servers - Episode 7 : Standing Guard: Continuous Monitoring and Incident Response 4:05
T
The Rocheston Cybersecurity Podcast

1 Firewalls, IDS and Web Servers - Episode 6 : Logically Speaking: Leveraging Log Management for Security 4:01
T
The Rocheston Cybersecurity Podcast

1 Firewalls, IDS and Web Servers - Episode 5 : Behind Enemy Lines: Penetration Testing Your Web Server 4:39
T
The Rocheston Cybersecurity Podcast

1 Firewalls, IDS and Web Servers - Episode 4 : Patchwork Security: The Art of Vulnerability Management 4:06
T
The Rocheston Cybersecurity Podcast

1 Firewalls, IDS and Web Servers - Episode 3 : The Guardian at the Gates: Web Application Firewalls (WAF) 4:35
T
The Rocheston Cybersecurity Podcast

1 Firewalls, IDS and Web Servers - Episode 2 : Intruder Alerts: Setting Up Web Server Intrusion Detection Systems 4:23
T
The Rocheston Cybersecurity Podcast

1 Firewalls, IDS and Web Servers - Episode 1 : Castle Walls: Erecting Robust Web Server Defenses 4:15
T
The Rocheston Cybersecurity Podcast

1 Web Application Attacks - Episode 9 : Infiltration Tactics: Uncovering Component Vulnerabilities 4:11
Bienvenido a Player FM!
Player FM está escaneando la web en busca de podcasts de alta calidad para que los disfrutes en este momento. Es la mejor aplicación de podcast y funciona en Android, iPhone y la web. Regístrate para sincronizar suscripciones a través de dispositivos.