Geek Speak - Tech Talks with Envision IT Envision IT
-
- Technology
This podcast is for business leaders and technology experts who like to stay on top of the latest security news and listen to interviews with insightful industry leaders. Episodes will be a combination of two different formats. We’ll be featuring Coffee Break length podcasts inspired by our monthly webinar series, Envision IT Coffee Breaks, where we take a deep dive into technology hot topics. We’ll build upon that month’s webinar topic by interviewing a Subject Matter Expert to gain even more perspective. Separately, our Espresso Shots will be short, impactful podcasts focused on all things security. As business leaders and technology experts we have to recognize the increasing importance of IT security in the rapidly changing technology landscape.
-
Episode 57: Top Ten Cybersecurity Misconfigurations: Unrestricted Code Execution
Join us over the next ten weeks as we discuss the top ten cybersecurity misconfigurations and review ways you can keep your organization safe from cyberattacks! In this episode we'll discuss one of the ten ways: Unrestricted Code Execution.
Connect with us:
https://www.linkedin.com/company/envisionitllc
marketing@envisionitllc.com -
Episode 56: Top Ten Cybersecurity Misconfigurations: Poor Credential Hygiene
Join us over the next ten weeks as we discuss the top ten cybersecurity misconfigurations and review ways you can keep your organization safe from cyberattacks! In this episode we'll discuss one of the ten ways: Poor Credential Hygiene.
Connect with us:
https://www.linkedin.com/company/envisionitllc
marketing@envisionitllc.com -
Episode 55: Insufficient Access Control Lists (ACLs) on Network Shares and Services
Join us over the next ten weeks as we discuss the top ten cybersecurity misconfigurations and review ways you can keep your organization safe from cyberattacks! In this episode we'll discuss one of the ten ways: Insufficient Access Control Lists (ACLs) on Network Shares and Services
Connect with us:
https://www.linkedin.com/company/envisionitllc
marketing@envisionitllc.com -
Episode 54: Top Ten Cybersecurity Misconfigurations: Weak or Misconfigured Multifactor Authentication (MFA) Methods
Join us over the next ten weeks as we discuss the top ten cybersecurity misconfigurations and review ways you can keep your organization safe from cyberattacks! In this episode we'll discuss one of the ten ways: Weak or Misconfigured Multifactor Authentication (MFA) Methods. MFA is an important layer of protection that helps keep your information safe from bad actors.
Connect with us:
https://www.linkedin.com/company/envisionitllc
marketing@envisionitllc.com -
Episode 53: Top Ten Cybersecurity Misconfigurations: Bypass of System Access Controls
Join us over the next ten weeks as we discuss the top ten cybersecurity misconfigurations and review ways you can keep your organization safe from cyberattacks! In this episode we'll discuss one of the ten ways: Bypass of System Access Controls.
Connect with us:
https://www.linkedin.com/company/envisionitllc marketing@envisionitllc.com -
Episode 52: Top Ten Cybersecurity Misconfigurations: Poor Patch Management
Join us over the next ten weeks as we discuss the top ten cybersecurity misconfigurations and review ways you can keep your organization safe from cyberattacks! In this episode we'll discuss one of the ten ways: Poor Patch Management. Implementing proper patch management is an important step to keeping your information safe from bad actors
Connect with us:
https://www.linkedin.com/company/envisionitllc
marketing@envisionitllc.com