DiscoverThe Cyberalarm Podcast
The Cyberalarm Podcast
Claim Ownership

The Cyberalarm Podcast

Author: SecureMe2 Cyber Security

Subscribed: 1Played: 0
Share

Description

Welcome to the Cyberalarm Podcast. My name is Julia and I will guide you in the upcoming episodes through several topics which may be of interest to you. All the topics are closely related to cybersecurity and will help you make the right decisions. Thanks for listening.
10 Episodes
Reverse
In this episode, we will talk about the risks of abandoned IT systems. This element of forgotten ICT equipment is often overlooked. This encompasses devices that were once connected but are no longer actively managed because they have simply been overlooked. What appears as a harmless oversight can, however, bring unexpected risks.
We are going to talk about CTI: Cyber Threat Intelligence. Our product Cyberalarm depends heavily on CTI to alert our customers when malicious traffic or behavior is detected. We use an enormous number of sources to collect data from all over the world to keep you as safe as possible. But what is this data called CTI?
What are the span or mirror ports security companies often use to get data off a network?
What is MFA and why should you use it.
6 - GDPR and NIS-2

6 - GDPR and NIS-2

2023-12-1305:14

This time we will talk about European legislation. To be more precise. We will give you some context around the GDPR and the upcoming NIS-2 regulation. 
5 - SIEM and SOC

5 - SIEM and SOC

2023-12-0605:39

This is Julia, and I am going to talk about the difference between a SIEM and a SOC. Just like the episode about logging, monitoring and detection, we see many people, mostly management, talking about SIEM and SOC as if it is the same thing. Which it is not. They are two entirely different terms but are often used in a combination. So what is the difference?
This podcast is going to talk about the difference between logging, monitoring, and detection. They're not just technical jargon; they're pillars of a secure and efficient IT environment. It's crucial for managers, especially those not steeped in IT knowledge, to understand these concepts.
This episode explains why vulnerability management should be a priority in your cybersecurity activities. Every patch and update you do minimizes the risk of an intrusion.
2 - Cyberalarm

2 - Cyberalarm

2023-11-1504:20

What is Cyberalarm. A short introduction about the focus-product of SecureMe2. More info? Contact us via www.secureme2.eu
Welcome to the Cyberalarm Podcast. My name is Julia and I will guide you in the upcoming episodes through several topics which may be of interest to you. All the topics are closely related to cybersecurity. They can be on a high level about laws and regulations but also very technical about dialogues, flows, and packets on a network. Just pick and choose the topics that interest you.
Comments