loader from loading.io

Cloud Security: AWS Essentials, Challenges, Best Practices

Cyber Security America

Release Date: 10/05/2023

Governor Pat McCory:  Cyber Challenges in Government show art Governor Pat McCory: Cyber Challenges in Government

Cyber Security America

Join us for an illuminating journey into the world of cybersecurity and governance as we sit down with former Governor Pat McCrory, the 74th Governor of North Carolina. In this captivating episode, Governor McCrory offers his invaluable leadership insights on the pressing issue of cybersecurity, particularly within the context of state and local government. Discover how the decentralized nature of government at various levels is adapting to the ever-evolving digital landscape. Governor McCrory's extensive experience in public service provides a unique perspective on the challenges...

info_outline
Cybersecurity Training: A 101st Airborne Veteran's Journey show art Cybersecurity Training: A 101st Airborne Veteran's Journey

Cyber Security America

In episode 29, host Joshua Nicholson welcomes Dennis Kraft, a Penn State graduate and former United States Army Captain who served with the 101st Airborne Division Air Assault in Afghanistan from 2010 to 2011.

info_outline
Securing E-Learning in a New World: Spoilage & Deepfakes show art Securing E-Learning in a New World: Spoilage & Deepfakes

Cyber Security America

Welcome to episode 28 of the Cyber Security America podcast with your host Joshua R. Nicholson (https://www.linkedin.com/in/joshuanicholson/). He is excited to welcome Dayle Alsbury (https://www.linkedin.

info_outline
Measuring Cybersecurity Risks: The Relevance of GRC show art Measuring Cybersecurity Risks: The Relevance of GRC

Cyber Security America

Welcome to our latest podcast episode (Episode 27), where Joshua R. Nicholson (https://www.linkedin.com/in/joshuanicholson/) embarks on an insightful journey through the dynamic world of #cybersecurity.

info_outline
Operational Threat Intelligence: How does that work? show art Operational Threat Intelligence: How does that work?

Cyber Security America

Welcome to the 26th episode of "How do you managed an operational threat intelligence program?" In this installment, Joshua Nicholson (https://www.linkedin.

info_outline
Cybersecurity in the Middle East: Operations Challenges & Threats show art Cybersecurity in the Middle East: Operations Challenges & Threats

Cyber Security America

"Welcome to Episode 25 of the podcast, where we dive deep into the intriguing world of cybersecurity in the Middle East. In this installment, we're exploring the unique operational challenges faced by foreign companies operating in the region.

info_outline
Managed Services: DeepSeas' Breakthrough in MDR+ Capabilities show art Managed Services: DeepSeas' Breakthrough in MDR+ Capabilities

Cyber Security America

Welcome to **Cyber Security America**, your ultimate hub for all things cybersecurity in the digital era. I'm your host, Joshua Nicholson (https://www.linkedin.

info_outline
Building a Cybersecurity Career: The Journey to CISO, Part II show art Building a Cybersecurity Career: The Journey to CISO, Part II

Cyber Security America

Welcome to Episode 23 of Cyber Security America, where we delve deeper into the world of cybersecurity careers in part 2 of our special series, "Building a Cybersecurity Career: The Journey to CISO.

info_outline
Cybersecurity Solutions: Innovative cutting edge problem-solving show art Cybersecurity Solutions: Innovative cutting edge problem-solving

Cyber Security America

Welcome to today's episode! In contrast to our previous discussions on #artificialintelligence, #cloudsecurity, and #burnout, we are taking a different approach today.

info_outline
Artificial Intelligence: Automating SOC Workflows - Salem Cyber show art Artificial Intelligence: Automating SOC Workflows - Salem Cyber

Cyber Security America

Welcome to the Cybersecurity America Podcast! In episode 21, we have an exciting lineup of topics that cover critical insights from the DeepSeas (https://www.deepseas.

info_outline
 
More Episodes
Welcome to another episode of Cyber Security America with your host, Joshua Nicholson (https://www.linkedin.com/in/joshuanicholson/). In this episode, we delve into the world of cloud computing and its impact on cybersecurity. We explore the major cloud platforms such as AWS, Azure, and GCP, along with their deployment and service models. Discover the benefits of cloud computing, including Infrastructure as a Service (IAAS), Platform as a Service (PAAS), and Software as a Service (SAAS). Podcast Home Site: (https://www.voiceamerica.com/show/4125), YouTube Channel: (https://www.youtube.com/channel/UCp94j2q_-F4SwvxgQYI_8Cg) We also tackle the characteristics of cloud computing, including on-demand self-service, broad network access, resource pooling, rapid elasticity, measured service, virtualization, service-oriented architecture (SOA), grid computing, and utility computing. Gain insights into how these characteristics shape the cloud security landscape. This week's Intel briefing covers two critical vulnerabilities: CVE-2023-28771 affecting week's ZyWALL/USG series firmware and CVE-202-2868, a remote command injection vulnerability resulting from incomplete input validation of user-specified dot tar files. Furthermore, we dive into the fascinating topic of conducting Incident Response (IR) in the cloud versus on-premises. Explore the six major differences between these environments and understand the unique challenges and considerations for cloud-based IR. Joining us as our special guest is Martin Brough (Senior Manager of Cyber Defense Operations @ ARM semiconductors). He is a seasoned information security professional with over 20 years of experience. Martin's expertise spans various domains, including secure communications systems, email security, malware analysis, SIEM system logging, and cloud-based threat hunting. He is particularly well-versed in the field of Incident Response, with extensive knowledge in security design, training, and detection and response playbook writing. Martin has shared his insights at renowned conferences such as Def Con, Blackhat, and DerbyCon, and he has contributed to notable security publications like PenTest Magazine and Cyber Defense Magazine. Tune in as we explore the intricate world of cloud computing and its impact on cybersecurity. Stay informed and gain valuable insights on how to secure your cloud infrastructure effectively. This episode is a must-listen for both security professionals and enthusiasts alike. Remember to subscribe to Cyber Security America for more captivating discussions on the latest trends and challenges in the ever-evolving world of cybersecurity. Sponsored by (www.deepseas.com) #CyberSecurity #CloudComputing #AWS #Azure #GCP #IAAS #PAAS #SAAS #CloudSecurity #Virtualization #SOA #GridComputing #UtilityComputing #IncidentResponse #CloudIR #OnPremiseIR #InformationSecurity #Podcast #CyberSecurityAmerica #CybersecurityPodcast #DeepSeasSponsor