57 episodes

This podcast is for business leaders and technology experts who like to stay on top of the latest security news and listen to interviews with insightful industry leaders. Episodes will be a combination of two different formats. We’ll be featuring Coffee Break length podcasts inspired by our monthly webinar series, Envision IT Coffee Breaks, where we take a deep dive into technology hot topics. We’ll build upon that month’s webinar topic by interviewing a Subject Matter Expert to gain even more perspective. Separately, our Espresso Shots will be short, impactful podcasts focused on all things security. As business leaders and technology experts we have to recognize the increasing importance of IT security in the rapidly changing technology landscape.

Geek Speak - Tech Talks with Envision IT Envision IT

    • Technology

This podcast is for business leaders and technology experts who like to stay on top of the latest security news and listen to interviews with insightful industry leaders. Episodes will be a combination of two different formats. We’ll be featuring Coffee Break length podcasts inspired by our monthly webinar series, Envision IT Coffee Breaks, where we take a deep dive into technology hot topics. We’ll build upon that month’s webinar topic by interviewing a Subject Matter Expert to gain even more perspective. Separately, our Espresso Shots will be short, impactful podcasts focused on all things security. As business leaders and technology experts we have to recognize the increasing importance of IT security in the rapidly changing technology landscape.

    Episode 57: Top Ten Cybersecurity Misconfigurations: Unrestricted Code Execution

    Episode 57: Top Ten Cybersecurity Misconfigurations: Unrestricted Code Execution

    Join us over the next ten weeks as we discuss the top ten cybersecurity misconfigurations and review ways you can keep your organization safe from cyberattacks! In this episode we'll discuss one of the ten ways: Unrestricted Code Execution.
     
    Connect with us: 
    https://www.linkedin.com/company/envisionitllc 
    marketing@envisionitllc.com 

    • 3 min
    Episode 56: Top Ten Cybersecurity Misconfigurations: Poor Credential Hygiene

    Episode 56: Top Ten Cybersecurity Misconfigurations: Poor Credential Hygiene

    Join us over the next ten weeks as we discuss the top ten cybersecurity misconfigurations and review ways you can keep your organization safe from cyberattacks! In this episode we'll discuss one of the ten ways: Poor Credential Hygiene.
     
    Connect with us:  
    https://www.linkedin.com/company/envisionitllc
    marketing@envisionitllc.com

    • 3 min
    Episode 55: Insufficient Access Control Lists (ACLs) on Network Shares and Services

    Episode 55: Insufficient Access Control Lists (ACLs) on Network Shares and Services

    Join us over the next ten weeks as we discuss the top ten cybersecurity misconfigurations and review ways you can keep your organization safe from cyberattacks! In this episode we'll discuss one of the ten ways: Insufficient Access Control Lists (ACLs) on Network Shares and Services
     
    Connect with us:  
    https://www.linkedin.com/company/envisionitllc  
    marketing@envisionitllc.com

    • 3 min
    Episode 54: Top Ten Cybersecurity Misconfigurations: Weak or Misconfigured Multifactor Authentication (MFA) Methods

    Episode 54: Top Ten Cybersecurity Misconfigurations: Weak or Misconfigured Multifactor Authentication (MFA) Methods

    Join us over the next ten weeks as we discuss the top ten cybersecurity misconfigurations and review ways you can keep your organization safe from cyberattacks! In this episode we'll discuss one of the ten ways: Weak or Misconfigured Multifactor Authentication (MFA) Methods. MFA is an important layer of protection that helps keep your information safe from bad actors.
     
    Connect with us: 
    https://www.linkedin.com/company/envisionitllc  
    marketing@envisionitllc.com

    • 3 min
    Episode 53: Top Ten Cybersecurity Misconfigurations: Bypass of System Access Controls

    Episode 53: Top Ten Cybersecurity Misconfigurations: Bypass of System Access Controls

    Join us over the next ten weeks as we discuss the top ten cybersecurity misconfigurations and review ways you can keep your organization safe from cyberattacks! In this episode we'll discuss one of the ten ways: Bypass of System Access Controls. 
     
    Connect with us: 
    https://www.linkedin.com/company/envisionitllc  marketing@envisionitllc.com

    • 3 min
    Episode 52: Top Ten Cybersecurity Misconfigurations: Poor Patch Management

    Episode 52: Top Ten Cybersecurity Misconfigurations: Poor Patch Management

    Join us over the next ten weeks as we discuss the top ten cybersecurity misconfigurations and review ways you can keep your organization safe from cyberattacks! In this episode we'll discuss one of the ten ways: Poor Patch Management. Implementing proper patch management is an important step to keeping your information safe from bad actors
     
    Connect with us:
    https://www.linkedin.com/company/envisionitllc 
    marketing@envisionitllc.com

    • 4 min

Top Podcasts In Technology

DataFramed
DataCamp
Inteligencia Artificial
Pocho Costa
Money Travels
Visa Direct
Microsoft Partnerpodden
Microsoft
Acquired
Ben Gilbert and David Rosenthal
Ask The Tech Guys (Audio)
TWiT