One of the questions that are often posed to cybersecurity professionals is "Why should I listen to you?" In this episode of The Cyber Pros Exchange, Dustin Brewer and I tell you why your cyber team is always applicable to your operations!
0 Comments
On the most recent episode of ISACA's Cyber Pros, Dustin Brewer and I discuss the interesting mindset that is sometimes seen in the field of cybersecurity, mainly, that it isn't real! We debunk this during our conversation and even share some fun stories while we're at it! Enjoy!
Is your home printer or fax machine an IOT device? You bet it is! Dubbed ‘Faxploit’, research has shown how cyber criminals can infiltrate any home or corporate network by exploiting wireless printers and fax machines. A fax numbers is all it takes to launch this type of attack.
The computer chip shortage resulting from the COVID-19 pandemic may sound like a mere supply chain issue, but the ramifications of it have also been felt in the cybersecurity sector. In this episode of the ISACA® Podcast, sponsored by ESET, security experts Dustin Brewer and Frank Downs explore the impact of the ongoing computer chip shortage and discuss what makes it a concern from both a security and a business operations perspective.
Cryptocurrency has helped make blockchain technology mainstream, lauded by the general public for its decentralizing capabilities and in the cybersecurity space due to its integrity and self auditing. In this episode of the ISACA® Podcast, sponsored by ESET, security experts Dustin Brewer and Frank Downs discuss how and why cryptocurrency has been so widely adopted and predict where they think it will go next.
Remote access tools can be an IT blessing, allowing tech support to quickly and remotely troubleshoot computer problems while reducing the need for lengthy conversations with confused employees. But just as remote access can be used for good, malicious cyberactors can leverage it to cause financial or even biological harm. In this episode of the ISACA® Podcast, security experts Dustin Brewer and Frank Downs explore different ways remote access tools can be exploited and how it can be avoided.
With today’s advanced cloud capabilities, cybersecurity is an obvious priority at many organizations. But that can leave physical security diminished or outright neglected. In this episode of the podcast, security experts Dustin Brewer and Frank Downs discuss what makes it so important to secure physical assets and how enterprises can do so effectively.
APTS are typically driven by experienced cyberactors, significant funding and a target that possesses extremely sensitive data. The depth of these threats means that virtually no enterprise is immune, even those which have implemented highly sophisticated cybersecurity measures. In this podcast, ISACA® security experts Dustin Brewer and Frank Downs discuss how to identify APTs, what makes them unique and how any organization can fall victim to such a threat.
Phishing emails and dangerous links are among the most pervasive threats to cybersecurity, capable of targeting everyone from seemingly impenetrable government organizations to college students’ university email accounts. The COVID-19 pandemic has only worsened the malware problem, as malicious hackers attempt to impersonate health authorities to steal personal information through social engineering. In this podcast, ISACA security experts Dustin Brewer and Frank Downs discuss malware: what it is, what forms it can take and how it spreads.
Once a technological marvel, the idea of a wireless connection to the Internet has become so engrained in the digital world that it is hard to fathom a time when that was not the case. But just because Wi-Fi has gone mainstream does not mean it is static. In this episode of the Cyber Pros Exchange series, security experts Dustin Brewer and Frank Downs consider the history of Wi-Fi, how it reached its position today and why it’s so important that it be secured properly.
|