Episodes
-
Today we have discussed successful and unsuccessful breaches. Today's guest Seth Melendez. 1. Dell Customer Database Compromised 2. Library of Congress's MFA Fended Off October Breach 3. Some other smaller issues 4. Next topics... Stay tuned. Your host TheCybersecurityInsider
-
The CybersecurityInsider is hosting two guests for a free and unscripted conversation about Cybersecurity.
Tonight guests: Steve and Seth.
We have discussed AI and how business should embrace it before it's too late for them. Why clients don't listen and fix their Cybersecurity issues. Is it money, time, expertise or something else?
Assessments, GRC, and the new upcoming Microsoft Windows server 2025 with AI support too.
@TheCybersecurityInsider
Yigal Behar
-
Missing episodes?
-
Seven Cybersecurity challenges will continue to evolve and present new threats to individuals, businesses, and governments alike. Here are some of the major cybersecurity challenges expected in 2024.
1. Ransomware attacks have become increasingly common in recent years, with attackers using trusted tools to create tools that will encrypt organizations' data and demand a ransom in exchange for the decryption key. We can expect to see more targeted ransomware attacks, where attackers will seek out vulnerable organizations and demand larger ransoms. This means that organizations will need to invest in stronger backup and recovery mechanisms, as well as advanced threat detection and response solutions to prevent ransomware attacks from spreading across their networks.
2. Deepfakes and Disinformation: As deepfake technology continues to advance, it becomes easier for cybercriminals to create convincing fake videos, audio, and images that could be used for social engineering attacks or spreading disinformation.
3. Artificial Intelligence (AI)-based Cyberattacks: Cybercriminals are using AI and machine learning algorithms to develop more effective attack strategies and evade traditional security measures, making it harder for organizations to detect and prevent cyberattacks.
4. Advanced Persistent Threats (APTs): Cybercriminals will develop increasingly sophisticated and targeted attacks that can bypass traditional security measures. These APTs could be motivated by espionage, financial gain, or political objectives.
5. Internet of Things (IoT) Security: As the number of interconnected devices grows exponentially, so does the potential for vulnerabilities in IoT infrastructure. Hackers will likely target these weak points to launch large-scale attacks on connected networks and systems.
6. Growing Threats to Critical Infrastructure: As more critical infrastructure becomes connected and reliant on technology, the potential for catastrophic cyberattacks on power grids, water systems, and other vital services increases.
7. Legal and Regulatory Challenges: The rapidly evolving nature of cyber threats may create challenges for lawmakers and regulators in keeping up with new risks and developing effective policies to address them.
@TheCybersecurityInsider
Yigal Behar
-
This time it's a free conversation with my friends Steve and Seth bringing some new thoughts to you.
Ransomware
Backup And Recovery
NIST 800
and other subjects.
Thanks for watching
@TheCybersecurityInsider
Host - Yigal Behar
www.TheCybersecurityInsider.com
-
Welcome to the thecybersecurity insider podcast. In today's episode, we'll be discussing the cybersecurity challenges that organizations are likely to face in 2023. From advanced persistent threats to artificial intelligence-based attacks, we'll be exploring the most pressing security risks that organizations need to be aware of.
1. Advanced Persistent Threats Artificial Intelligence and Machine Learning-Based Attacks
2. Internet of Things (IoT) Security
3. Cloud Security Ransomware
4. Conclusion:
In conclusion, the cybersecurity challenges that organizations will face in 2023 are diverse and complex, with cyber threats continuing to evolve at an unprecedented pace. To protect their networks and data, organizations will need to invest in advanced security technologies, such as AI and ML, as well as stronger IoT, cloud, and ransomware defenses.
By staying vigilant and investing in the right security measures, organizations can mitigate these risks and protect themselves against the threats of 2023 and beyond.
Thanks for tuning in to the cybersecurity insider podcast, and we'll see you next time.
#TheCybersecurityInsider
Your Host: Yigal Behar
www.TheCybersecurityInsider.com
-
Welcome to this episode on backup and restore!
In today's digital age, we rely heavily on technology to store and access our valuable data. Whether it's personal files, business documents, or creative content, losing this information can be a nightmare. That's where backup and restore come into play. By backing up our data, we ensure that it's stored in a safe location and can be retrieved in case of an unexpected event, such as a hardware failure or a cyber attack.
In this podcast, we'll dive deeper into the importance of backup and restore, and look at a real case that we handled few months ago. Whether you're a content creator, a business owner, or just someone who wants to protect their digital assets, this episode is for you.
Let's get started!
Thank you for watching!
Yigal Behar - Host
#TheCybersecurityInsider
-
Here are some news that you need to know as a network admin, business owner and anyone that security is important.
* Microsoft to Block Messages From...On-Premises Exchange
* QNAP OS Vulnerabilities Affect 80,000 Devices
* WooCommerce Payments WordPress Plugin Authentication Bypass Vulnerability
* Outlook App Vulnerability
Thanks for watching!
The CybersecurityInsider
www.thecybersecurityinsider.com
Host - Yigal Behar
-
Seeing it on the news and stories from friends is one thing but when facing it for real is another one. Join me to this special case study and learn not to repeat mistakes. The Cybersecurityinsider Yigal Behar - Host [email protected] www.2Secure.biz
-
Are you ready? do you have a plan to recover?
What should you have in there?
The CybersecurityInsider
Yigal Behar - Host
-
Chrome and Edge
Sophos Firewall
Okta Breach
UPS Security
Apple Fixes -Day Vul
Are you patching ? you better be!
The CybersecurityInsider
Yigal Behar - Host
-
Urgent Google Chrome and Microsoft Edge Security flow.
Here is a blog post:
https://www.2secure.biz/2022/03/chrome-urgent-security-flow-update/
Thank you for listening
The CybersecurityInsider
Host _ Yigal Behar
Questions?
-
The Russia / Ukraine War.
Simple steps that two of customers took after listening/ watching Eps 27. Questions?
The CybersecurityInsider
Host - Yigal Behar [email protected]
-
TheCybersecurityInsider Ep 28 Russia Vs. Ukraine War
Talking about the upcoming threats due t this war and how the financial markets can influence the common man but also how that will effect cybersecurity spending, affecting security posture.
#thecybersecurityinsider #2securecorp #yigalbehar #stevemagnani #cybersecurity #russia #ukraine #cyberthreats #ransomware
This time I'm hosting Steve Magnani.
TheCybersecurityInsider
Host: Yigal Behar
2Secure Corp
www.2secure.biz
-
Talking about the war between Russia and Ukraine, the focus is Cybersecurity...
TheCybersecurityInsider
Yigal Behar-Host
2Secure Corp
www.2secure.biz
#2securecorp #thecybersecurityinsider #yigalbehar #cybersecurity #cyberwar #war #russia #Ukraine
-
This time we had JC Gillard @corix as our guest.
How do you start a Cybersecurity?
Cloud
Supply Chain & MSP
Digital Transformation - nothing new there...
Use of shadowIIT Dropbox
and more...
The Cybersecurity Insider
Yigal Behar - Host
-
This time we had Karla Refolld talking about Cybersecurity Intelligence and why it's important to have it. Thanks Karla! TheCybersecurityInsider Host: Yigal Behar
-
This time we had Gordon Coyle our Cybersecurity insurance expert talking about ... secu err no Insurance policies for Cyber incidents.
What to look for and how to shop for best policy.
-
Do you risk assessment, what is it?
When?
Talking about vulnerabilities and much more.
-
The CybersecurityInsider Podcasts are back!!
- Show more