The Cyberalarm Podcast

Welcome to the Cyberalarm Podcast. My name is Julia and I will guide you in the upcoming episodes through several topics which may be of interest to you. All the topics are closely related to cybersecurity and will help you make the right decisions. Thanks for listening.

10 - Forgotten Equipment

In this episode, we will talk about the risks of abandoned IT systems. This element of forgotten ICT equipment is often overlooked. This encompasses devices that were once connected but are no longer actively managed because they have simply been overlooked. What appears as a harmless oversight can, however, bring unexpected risks.

03-06
03:40

9 - Cyber Threat Intelligence (CTI)

We are going to talk about CTI: Cyber Threat Intelligence. Our product Cyberalarm depends heavily on CTI to alert our customers when malicious traffic or behavior is detected. We use an enormous number of sources to collect data from all over the world to keep you as safe as possible. But what is this data called CTI?

02-16
06:12

8 - SPAN or Mirror ports

What are the span or mirror ports security companies often use to get data off a network?

02-08
04:49

7 - Multi Factor Authentication

What is MFA and why should you use it.

01-03
03:00

6 - GDPR and NIS-2

This time we will talk about European legislation. To be more precise. We will give you some context around the GDPR and the upcoming NIS-2 regulation. 

12-13
05:14

5 - SIEM and SOC

This is Julia, and I am going to talk about the difference between a SIEM and a SOC. Just like the episode about logging, monitoring and detection, we see many people, mostly management, talking about SIEM and SOC as if it is the same thing. Which it is not. They are two entirely different terms but are often used in a combination. So what is the difference?

12-06
05:39

4 - Logging, Monitoring and Detection

This podcast is going to talk about the difference between logging, monitoring, and detection. They're not just technical jargon; they're pillars of a secure and efficient IT environment. It's crucial for managers, especially those not steeped in IT knowledge, to understand these concepts.

11-29
04:57

3 - Vulnerability Management

This episode explains why vulnerability management should be a priority in your cybersecurity activities. Every patch and update you do minimizes the risk of an intrusion.

11-22
03:24

2 - Cyberalarm

What is Cyberalarm. A short introduction about the focus-product of SecureMe2. More info? Contact us via www.secureme2.eu

11-15
04:20

1 - The Cyberalarm Podcast - Intro

Welcome to the Cyberalarm Podcast. My name is Julia and I will guide you in the upcoming episodes through several topics which may be of interest to you. All the topics are closely related to cybersecurity. They can be on a high level about laws and regulations but also very technical about dialogues, flows, and packets on a network. Just pick and choose the topics that interest you.

11-10
01:14

Recommend Channels