DiscoverThe CybersecurityInsider
The CybersecurityInsider
Claim Ownership

The CybersecurityInsider

Author: Yigal Behar

Subscribed: 5Played: 51
Share

Description

Hello everyone!

We created this channel to promote a better world by improving digital security and privacy. This is done by better education and information that anyone can use on a daily basis providing simple guidance.

I welcome feedback, so if you have an idea please let me know by posting it inside the videos or by an email to:
Podcast@thecybersecurityinsider.com
I’m your host - Yigal Behar
47 Episodes
Reverse
The CybersecurityInsider is hosting two guests for a free and unscripted conversation about Cybersecurity. Tonight guests: Steve and Seth. We have discussed AI and how business should embrace it before it's too late for them. Why clients don't listen and fix their Cybersecurity issues. Is it money, time, expertise or something else? Assessments, GRC, and the new upcoming Microsoft Windows server 2025 with AI support too.  @TheCybersecurityInsider  Yigal Behar podcast@TheCybersecurityInsider.com  
Seven Cybersecurity challenges will continue to evolve and present new threats to individuals, businesses, and governments alike. Here are some of the major cybersecurity challenges expected in 2024. 1. Ransomware attacks have become increasingly common in recent years, with attackers using trusted tools to create tools that will encrypt organizations' data and demand a ransom in exchange for the decryption key. We can expect to see more targeted ransomware attacks, where attackers will seek out vulnerable organizations and demand larger ransoms. This means that organizations will need to invest in stronger backup and recovery mechanisms, as well as advanced threat detection and response solutions to prevent ransomware attacks from spreading across their networks.   2. Deepfakes and Disinformation: As deepfake technology continues to advance, it becomes easier for cybercriminals to create convincing fake videos, audio, and images that could be used for social engineering attacks or spreading disinformation.   3. Artificial Intelligence (AI)-based Cyberattacks: Cybercriminals are using AI and machine learning algorithms to develop more effective attack strategies and evade traditional security measures, making it harder for organizations to detect and prevent cyberattacks.   4. Advanced Persistent Threats (APTs): Cybercriminals will develop increasingly sophisticated and targeted attacks that can bypass traditional security measures. These APTs could be motivated by espionage, financial gain, or political objectives.   5. Internet of Things (IoT) Security: As the number of interconnected devices grows exponentially, so does the potential for vulnerabilities in IoT infrastructure. Hackers will likely target these weak points to launch large-scale attacks on connected networks and systems.   6. Growing Threats to Critical Infrastructure: As more critical infrastructure becomes connected and reliant on technology, the potential for catastrophic cyberattacks on power grids, water systems, and other vital services increases.   7. Legal and Regulatory Challenges: The rapidly evolving nature of cyber threats may create challenges for lawmakers and regulators in keeping up with new risks and developing effective policies to address them.   @TheCybersecurityInsider Yigal Behar podcast@thecybersecurityinsider.com
This time it's a free conversation with my friends Steve and Seth bringing some new thoughts to you. Ransomware Backup And Recovery NIST 800 and other subjects. Thanks for watching @TheCybersecurityInsider Host - Yigal Behar PodCast@TheCybersecurityInsider.com www.TheCybersecurityInsider.com
Welcome to the thecybersecurity insider podcast. In today's episode, we'll be discussing the cybersecurity challenges that organizations are likely to face in 2023. From advanced persistent threats to artificial intelligence-based attacks, we'll be exploring the most pressing security risks that organizations need to be aware of. 1. Advanced Persistent Threats Artificial Intelligence and Machine Learning-Based Attacks 2. Internet of Things (IoT) Security 3. Cloud Security Ransomware 4. Conclusion: In conclusion, the cybersecurity challenges that organizations will face in 2023 are diverse and complex, with cyber threats continuing to evolve at an unprecedented pace. To protect their networks and data, organizations will need to invest in advanced security technologies, such as AI and ML, as well as stronger IoT, cloud, and ransomware defenses. By staying vigilant and investing in the right security measures, organizations can mitigate these risks and protect themselves against the threats of 2023 and beyond. Thanks for tuning in to the cybersecurity insider podcast, and we'll see you next time. #TheCybersecurityInsider Your Host: Yigal Behar www.TheCybersecurityInsider.com podcast@TheCybersecurityInsider.com
Welcome to this episode on backup and restore! In today's digital age, we rely heavily on technology to store and access our valuable data. Whether it's personal files, business documents, or creative content, losing this information can be a nightmare. That's where backup and restore come into play. By backing up our data, we ensure that it's stored in a safe location and can be retrieved in case of an unexpected event, such as a hardware failure or a cyber attack. In this podcast, we'll dive deeper into the importance of backup and restore, and look at a real case that we handled few months ago. Whether you're a content creator, a business owner, or just someone who wants to protect their digital assets, this episode is for you. Let's get started! Thank you for watching! Yigal Behar - Host #TheCybersecurityInsider podcast@TheCybersecurityInsider.com
Here are some news that you need to know as a network admin, business owner and anyone that security is important. * Microsoft to Block Messages From...On-Premises Exchange * QNAP OS Vulnerabilities Affect 80,000 Devices * WooCommerce Payments WordPress Plugin Authentication Bypass Vulnerability * Outlook App Vulnerability Thanks for watching! The CybersecurityInsider www.thecybersecurityinsider.com Host - Yigal Behar
Seeing it on the news and stories from friends is one thing but when facing it for real is another one. Join me to this special case study and learn not to repeat mistakes. The Cybersecurityinsider Yigal Behar - Host podcast@thecybersecurityinsider.com www.2Secure.biz
Are you ready? do you have a plan to recover? What should you have in there?   The CybersecurityInsider Yigal Behar - Host podcast@thecybersecurityinsider.com  
The CybersecurityInsider Ep 32 Globant Breach by Lapsus$ 70gb and certificates were leaked. Linux Dirty Pipe effect QNAP OpenSSL effects QNAP and Palo Alto Networks Microsoft IE11 is being retired in June   The CybersecurityInsider Host - Yigal Behar PodCast@thecybersecurityinsider.com
Chrome and Edge Sophos Firewall Okta Breach UPS Security Apple Fixes -Day Vul   Are you patching ? you better be! The CybersecurityInsider Yigal Behar - Host PodCast@TheCybersecurityInsider.com
Urgent Google Chrome and Microsoft Edge Security flow.   Here is a blog post: https://www.2secure.biz/2022/03/chrome-urgent-security-flow-update/ Thank you for listening The CybersecurityInsider Host _ Yigal Behar Questions? Yigal@TheCybersecurityInsider.com  
The Russia / Ukraine War. Simple steps that two of customers took after listening/ watching Eps 27. Questions? The CybersecurityInsider Host - Yigal Behar yigal@thecybersecurityinsider.com
TheCybersecurityInsider Ep 28 Russia Vs. Ukraine War Talking about the upcoming threats due t this war and how the financial markets can influence the common man but also how that will effect cybersecurity spending, affecting security posture. #thecybersecurityinsider #2securecorp #yigalbehar #stevemagnani #cybersecurity #russia #ukraine #cyberthreats #ransomware   This time I'm hosting Steve Magnani. TheCybersecurityInsider Host: Yigal Behar 2Secure Corp www.2secure.biz  
Talking about the war between Russia and Ukraine, the focus is Cybersecurity...   TheCybersecurityInsider Yigal Behar-Host 2Secure Corp www.2secure.biz  #2securecorp #thecybersecurityinsider #yigalbehar #cybersecurity #cyberwar #war #russia #Ukraine
This time we had JC Gillard @corix as our guest. How do you start a Cybersecurity? Cloud Supply Chain & MSP Digital Transformation - nothing new there... Use of shadowIIT Dropbox and more... The Cybersecurity Insider Yigal Behar - Host
This time we had Karla Refolld talking about Cybersecurity Intelligence and why it's important to have it. Thanks Karla! TheCybersecurityInsider Host: Yigal Behar
This time we had Gordon Coyle our Cybersecurity insurance expert talking about ... secu err no Insurance policies for Cyber incidents. What to look for and how to shop for best policy.
Do you risk assessment, what is it? When? Talking about vulnerabilities and much more.
The CybersecurityInsider Podcasts are back!!
With Microsoft, SolarWinds and Now with Kaseya. Supply chain attacks are on the rise and companies should pay attention to 3rd parties having access to various systems.   This is a great challenge!   TheCyberSecurityInsider Yigal Behar podcast@TheCyberSecurityInsider.com  
loading
Comments 
loading
Download from Google Play
Download from App Store