Venafi solutions architect Steve Judd talks about the rookie mistakes new cybersecurity students make and how to combat issues that arise when deciding your cybersecurity specialization. – Get your FREE…
Browsing CategorySecurity News
What is the Pentagon’s zero-trust policy: An overview | Cyber Work Podcast
Venafi solutions architect Steve Judd talks about what the Pentagon’s zero-trust policy is all about: its parameters, directives and what tight deadlines mean for people implementing changes. – Get your…
Cybersecurity leaders need to be communicators | Cyber Work Podcast | #shorts
Venafi solutions architect Steve Judd says everyone has to do security. No matter the level of your technical skill, cybersecurity leaders need to be good communicators first and foremost. –…
Prilex modification now targeting contactless credit card transactions
Kaspersky discovers three new variants of the Prilex PoS malware capable of blocking contactless NFC transactions on an infected device.
How to set up a digital forensics lab | Cyber Work Hacks
Infosec Skills author and Paraben founder and CEO Amber Schroader talks about how to quickly and inexpensively set up your own home digital forensics lab. 0:00 – Creating your digital…
Inside the Pentagon’s new zero-trust policy | Guest Steve Judd
Venafi solutions architect Steve Judd talks about the recent directive from the Pentagon that a zero-trust policy be implemented at the Department of Defense in the next four years. Is…
Come to the dark side: hunting IT professionals on the dark web
We have analyzed more than 800 IT job ads and resumes on the dark web. Here is what the dark web job market looks like.
Biggest and weirdest cybercrime trends of 2022 | Cyber Work Podcast
Paul Giorgi of XM Cyber talks about some of the biggest — and weird — cybercrime incidents of 2022. – Get your FREE cybersecurity training resources: https://www.infosecinstitute.com/free – View Cyber…
Learning from recent cybersecurity attacks | Cyber Work Podcast
Paul Giorgi of XM Cyber talks about how even with various breaches, damages and failures, there’s always something to be learned from the experience. – Get your FREE cybersecurity training…
Developer accounts a treasure trove if breached | Cyber Work Podcast | #shorts
Paul Giorgi says because developers are “lazy in a good way,” that their circumventing of 2-factor authentication for expediency’s sake means their account, should they get breached, is a treasure…