DIRECTORY

  • Alerts
  • APTs
  • Blog
  • Books
  • Certifications
  • Cheat Sheets
  • Courses
  • Cyber Briefing
  • CyberDecoded
  • CyberReview
  • CyberStory
  • CyberTips
  • Definitions
  • Domains
  • Entertainment
  • FAQ
  • Frameworks
  • Hardware Tools
  • Incidents
  • Malware
  • News
  • Papers
  • Podcasts
  • Quotes
  • Reports
  • Tools
  • Threats
  • Tutorials
No Result
View All Result
  • Login
  • Register
  • Cyber Citizens
  • Cyber Professionals
  • Institutions
CyberMaterial
Get Help
  • Cyber Citizens
  • Cyber Professionals
  • Institutions
CyberMaterial
No Result
View All Result
Get Help
CyberMaterial
Home Entertainment

401 Access Denied Podcast

Reading Time: 3 mins read
in Entertainment, Insider Threat, Podcast, Ransomware

Podcast Overview

Welcome to the 401 Access Denied Podcast, where we dissect what’s really going on in today’s world of cyber security. Topics range from finding a job in cyber security, to dealing with insider threats, to going inside the mind of a hacker, and more.

Bi-weekly, Thycotic’s ethical hacker Joseph Carson and the cyber security training experts from Cybrary will share their insights along with our special guests.

Highlighted Episodes:

Ep. 1: Busting Password Myths

With World Password Day upon us, individuals of all backgrounds and varying levels of cybersecurity hygiene will be confronted with the same question – are my current personal (or corporate) security measures enough? Today’s episode will take listeners through a journey of best practices, horror stories, debunked myths, visions of a passwordless future, misconceptions, and just how challenging it really is to crack them.

 

Episode 7: International Cyber Warfare: How Real is the Threat? Part 1

Joseph Carson and Mike Gruen are joined today by special guest Josh Lospinoso, former Cyber Officer of the US Army as they discuss definitions and methods of international cyber warfare. Is there accountability for governments who use private companies and contractors to handle their dirty work? How often do attackers get caught and how long does it take to find out what has been compromised? We’ll discuss all this and more in this 2-part episode.

Episode 8: International Cyber Warfare: How Real is the Threat? Part 2

Josh Lospinoso joins us again for part 2 of our international cyber warfare conversation with Joseph Carson and Mike Gruen. This time we focus on zero-day vulnerabilities and the moral complexities that need to be considered. How do you train personnel to know where the line should be drawn and when they should hold back some of the cyber tools in their arsenal?

Episode 23 (Ransomware Rundown with Dan Lohrmann)

Ransomware is one of the biggest threats facing organizations today. It impacts businesses both financially and in regard to productivity. Mike and Joe are joined by Dan Lohrmann, Chief Strategist & Chief Security Officer at Security Mentor with past experience with Lockheed Martin, the NSA, and the State of Michigan. We cover the gamut from data encryption to the latest ransomware attacks and even cyber insurance. Plus, guidance on the steps you should take now to prepare before becoming a victim.

LISTEN ALL EPISODES

Tags: Insider ThreatPasswords - IAM - Credentials - Login SecurityPodcastsRansomwareRansomware Podcasts
ADVERTISEMENT

Related Posts

Enterprise Mobility Insights — Podcast

Enterprise Mobility Insights — Podcast

April 24, 2023
Find my Phone – Documentary

Find my Phone – Documentary

April 24, 2023
Portsmouth Computer Group — Podcast

Portsmouth Computer Group — Podcast

April 24, 2023
Digital Forensic Survival Podcast

Digital Forensic Survival Podcast

April 24, 2023

More Articles

News

DOJ seizes $112M in stolen cryptocurrency

April 4, 2023
Podcast

Understanding Cyber – Podcast

March 6, 2023
Alerts

ABB security advisory (AV22-408)

July 22, 2022

Amazon Fake Reviews Scam Exposed in Data Breach

May 7, 2021
Incidents

Toyota to Resume Ops after Cyberattack

February 28, 2022
Document

The GDPR: New opportunities, New obligations

March 23, 2022
Alerts

DocuSign Brand Impersonation Attack Bypasses Security Measures

February 1, 2023
Alerts

Massive Phishing Campaigns Target India Banks’ Clients

November 9, 2022
Load More

Security through data

Cybersecurity Domains

  • API Security
  • Business Continuity
  • Career Development
  • Compliance
  • Cryptography
  • HSM
  • KPIs / KRIs
  • Penetration Testing
  • Shift Left
  • Vulnerability Scan

Emerging Technologies

  • 5G
  • Artificial Intelligence
  • Blockchain
  • Cryptocurrency
  • Deepfake
  • E-Commerce
  • Healthcare
  • IoT
  • Quantum Computing

Frameworks

  • CIS Controls
  • CCPA
  • GDPR
  • NIST
  • 23 NYCRR 500
  • HIPAA

Repository

  • Books
  • Certifications
  • Definitions
  • Documents
  • Entertainment
  • Quotes
  • Reports

Threats

  • APTs
  • DDoS
  • Insider Threat
  • Malware
  • Phishing
  • Ransomware
  • Social Engineering

© 2023 | CyberMaterial | All rights reserved.

World’s #1 Cybersecurity Repository

  • About
  • Legal and Privacy Policy
  • Site Map
No Result
View All Result
  • Audience
    • Cyber Citizens
    • Cyber Professionals
    • Institutions
  • Highlights
    • Blog
    • CyberDecoded
    • Cyber Review
    • CyberStory
    • CyberTips
  • Cyber Risks
    • Alerts
    • Attackers
    • Domains
    • Incidents
    • Threats
  • Opportunities
    • Events
    • Jobs
  • Repository
    • Books
    • Certifications
    • Cheat Sheets
    • Courses
    • Definitions
    • Frameworks
    • Games
    • Hardware Tools
    • Memes
    • Movies
    • Papers
    • Podcasts
    • Quotes
    • Reports
  • Report Cyber Incident
  • GET HELP

Subscribe to our newsletter

© 2022 Cybermaterial - Security Through Data .

Welcome Back!

Sign In with Google
Sign In with Linked In
OR

Forgotten Password? Sign Up

Create New Account!

Sign Up with Google
Sign Up with Linked In
OR

All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In

Add New Playlist

This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy and Cookie Policy.