24 Folgen

Cyber Watch by Silent Breach

Silent Breach is a cyber security company that specializes in network security and digital asset protection. Companies are compromised on a daily basis, resulting in direct financial losses, customer loyalty erosion, reputational harm, and sometimes triggering significant fines and penalties.

Silent Breach aims to protect your business and keep it safe.

Cyber Watch Silent Breach

    • Technologie

Cyber Watch by Silent Breach

Silent Breach is a cyber security company that specializes in network security and digital asset protection. Companies are compromised on a daily basis, resulting in direct financial losses, customer loyalty erosion, reputational harm, and sometimes triggering significant fines and penalties.

Silent Breach aims to protect your business and keep it safe.

    A Brief History of Cryptography

    A Brief History of Cryptography

    90% of the world's data was generated in the last two years. To keep pace with this massive proliferation of data creation and transmission, cryptographers have been working overtime to engineer increasingly complex encryption techniques.

    • 10 Min.
    Why the US Government Failed Their Cybersecurity Audit and What to Do About It

    Why the US Government Failed Their Cybersecurity Audit and What to Do About It

    From NASA to the State Department, federal agencies are relying on outdated systems, ignoring mandatory security patches and failing to protect classified data.  

    CISA has finally released its highly anticipated Cross-Sector Cybersecurity Performance Goals in collaboration with DHS, NIST and numerous industry leaders.

    • 11 Min.
    Five Things to Look for When Choosing an MSSP

    Five Things to Look for When Choosing an MSSP

    According to recent reports, Managed Security Service expenditures are set to double to nearly $50 billion in 2023.         As the tech industry continues to mature and cybersecurity skills shortages climb to record highs, many firms are turning to Managed Security Service Providers (or MSSPs) to help shore up internal security gaps. But this is only half the story; the truth is that there are a number of advantages that MSSPs provide over traditional in-house IT departments.

    Also, with the cost of cybercrime set to top $5 trillion over the next five years, an incredible number of cybersecurity firms have been founded in the last few years. So, how do you sift through these countless listings and pick out the perfect fit? Here are Silent Breach's top tips on how to filter out the static and discover the real talent.

    • 9 Min.
    Transition to DevSecOps and Harden Your Web App Security in Five Steps

    Transition to DevSecOps and Harden Your Web App Security in Five Steps

    A) What is DevSecOps and how can you benefit from it?

    B) Top 5 tips from pentesters on how to harden your Web App security

    • 11 Min.
    An Introduction to Next-Gen Penetration Testing

    An Introduction to Next-Gen Penetration Testing

    The penetration test, or as it is fondly nicknamed, the pentest, has been a security staple for decades. But is it time for an upgrade?      As security breaches and budgets continue to bloom, many firms are looking for ways to boost their security preparedness by taking advantage of the latest innovations in AI, DevOps, and security analytics. In this episode, we'll discuss five of the latest updates to the classic penetration test, helping you decide which, if any, are a good fit for your business.

    • 7 Min.
    9 Steps to Reducing Your Attack Surface

    9 Steps to Reducing Your Attack Surface

    Adoption of technologies such as Internet of Things devices (IoT), cloud applications, complex digital supply chains, open-source code, and more have resulted in the expansion of organization's attack surfaces and exposure to breaches.

    Now more than ever, organizations require increased visibility into how their digital environment looks from an external perspective. Viewing your attack surface the same way as a hacker is the best way to spot and remediate attack vectors and security vulnerabilities before they can be exploited.

    Generally, the larger the surface, the more entry points there are for hackers to gain unauthorized access to your organization. For that reason, it's critical to institute tools and practices to reduce your exposure as much as possible and ensure proper management and continuous monitoring.

    • 9 Min.

Top‑Podcasts in Technologie

Passwort - der Podcast von heise security
Dr. Christopher Kunz, Sylvester Tremmel
The TED AI Show
TED
Lex Fridman Podcast
Lex Fridman
13 Minutes to the Moon
BBC World Service
Flugforensik - Abstürze und ihre Geschichte
Flugforensik
Apfelfunk
Malte Kirchner & Jean-Claude Frick