loader from loading.io

Geek Speak - Tech Talks with Envision IT

This podcast is for business leaders and technology experts who like to stay on top of the latest security news and listen to interviews with insightful industry leaders. Episodes will be a combination of two different formats. We’ll be featuring Coffee Break length podcasts inspired by our monthly webinar series, Envision IT Coffee Breaks, where we take a deep dive into technology hot topics. We’ll build upon that month’s webinar topic by interviewing a Subject Matter Expert to gain even more perspective. Separately, our Espresso Shots will be short, impactful podcasts focused on all things security. As business leaders and technology experts we have to recognize the increasing importance of IT security in the rapidly changing technology landscape.

info_outline Episode 57: Top Ten Cybersecurity Misconfigurations: Unrestricted Code Execution 05/23/2024
info_outline Episode 56: Top Ten Cybersecurity Misconfigurations: Poor Credential Hygiene 05/16/2024
info_outline Episode 55: Insufficient Access Control Lists (ACLs) on Network Shares and Services 04/30/2024
info_outline Episode 54: Top Ten Cybersecurity Misconfigurations: Weak or Misconfigured Multifactor Authentication (MFA) Methods 04/16/2024
info_outline Episode 53: Top Ten Cybersecurity Misconfigurations: Bypass of System Access Controls 04/05/2024
info_outline Episode 52: Top Ten Cybersecurity Misconfigurations: Poor Patch Management 03/14/2024
info_outline Episode 51: Top Ten Cybersecurity Misconfigurations: Lack of Network Segmentation 03/01/2024
info_outline Episode 50: Top Ten Cybersecurity Misconfigurations: Insufficient Internal Network Monitoring 02/21/2024
info_outline Episode 49: Top Ten Cybersecurity Misconfigurations: Improper Separation of User and Administrator Privilege 02/14/2024
info_outline Episode 48: Top Ten Cybersecurity Misconfigurations: Default Configurations of Software and Applications. 01/31/2024
info_outline Episode 47: Top Ten Cybersecurity Misconfigurations: Intro 01/08/2024
info_outline Episode 46: 15 Ways to Protect your Business from a Cyber Attack: SIEM/Log Management 09/20/2023
info_outline Episode 45: 15 Ways to Protect your Business from a Cyber Attack: Cyber Insurance 09/14/2023
info_outline Episode 44: 15 Ways to Protect your Business from a Cyber Attack: Web Gateway Security 08/25/2023
info_outline Episode 43: 15 Ways to Protect your Business from a Cyber Attack: Mobile Device Security 08/17/2023
info_outline Episode 42: 15 Ways to Protect your Business from a Cyber Attack: Encryption 08/10/2023
info_outline Episode 41: 15 Ways to Protect your Business from a Cyber Attack: Dark Web Research 08/04/2023
info_outline Episode 40: 15 Ways to Protect your Business from a Cyber Attack: Computer Updates 07/25/2023
info_outline Episode 39: 15 Ways to Protect your Business from a Cyber Attack: EDR 07/20/2023
info_outline Episode 38: 15 Ways to Protect your Business from a Cyber Attack: Backups 07/07/2023
info_outline Episode 37: 15 Ways to Protect your Business from a Cyber Attack: SAT 06/29/2023
info_outline Episode 36: 15 Ways to Protect your Business from a Cyber Attack: MFA 06/22/2023
info_outline Episode 35: 15 Ways to Protect your Business from a Cyber Attack: Spam Emails 06/13/2023
info_outline Episode 34: 15 Ways to Protect your Business from a Cyber Attack: Firewalls 06/08/2023
info_outline Episode 33: 15 Ways to Protect your Business from a Cyber Attack: Passwords 06/01/2023
info_outline Episode 32: 15 Ways to Protect your Business from a Cyber Attack: Security Assessments 05/23/2023
info_outline Episode 31: 15 Ways to Protect your Business from a Cyber Attack: Introduction 05/17/2023
info_outline Episode 30: The Role of AI and Machine Learning in the Cybersecurity Landscape 02/08/2023
info_outline Episode 29: LastPass Security Incident and Recommendations 01/04/2023
info_outline Episode 28: Log4J and Exchange Server Issues 01/12/2022
 
share