In this week’s episode, we discuss how businesses and users can “think like hackers” with Ted Harrington, author of Hackable: How to do Application Security Right and renowned “ethical hacker.”
Subscribe: Apple Podcasts | Android | Google Podcasts | Stitcher | TuneIn | RSS
Listen, CISOs, we KNOW how hard it is to manage your security posture. With often DOZENS of different security technologies that vary in process, application, and responding to, wouldn't it be nice if you had security baked into your actual server hardware?
HPE's Gen10 servers offer exactly that. As Utah's biggest HPE Platinum Partner, VLCM believes that your server infrastructure should be your strongest defense. Protect your enterprise with innovations in firmware protection, malware detection, and firmware recovery - right down to the silicon. Learn more about the servers that transform your business at vlcm.com/gen10.
Over 12 billion dollars has been lost to spear phishing and account takeover. Target attacks carry no malicious payload and are able to bypass email gateways.
Barracuda Sentinel uses AI to outsmart the attackers and protect your business and data.
With Barracuda Sentinel, you can block threats that are already in your inbox (not just the incoming ones), you can stay a step ahead of attackers with AI-based threat detection, and you can stop wasting time managing static security rules with this silent, zero-administration tool.
Check out vlcm.com/barracuda-sentinel to find out how you can save your company from a hacker's 12 billion dollar business.
CYBER24 is a podcast and website designed to bridge the knowledge gap between cybersecurity experts, business leaders and policy makers. We talk with experts who share their knowledge in an easily understandable format designed to arm public and private sector leaders with the information they need to protect their organization.
VLCM’s Cybersecurity Team offers leading industry expertise to design, implement, and support the right cybersecurity solutions. VLCM’S Cybersecurity architects Get IT Right by implementing layered security strategies, and partner with a wide range of industry-leading IT security vendors to develop the best cybersecurity defense for your unique organization.