Preview Mode Links will not work in preview mode

Security In Five Podcast

Aug 31, 2017

The next control in the Top 20 Critical Security Control series is number 12, Boundary Defense. Your perimeter is your wall. All data flows in and out of that and you need to be able to monitor, alert and react to it. Boundary Defense is like the walls of a castle, they aren't very useful if they are not built properly...


Aug 30, 2017

Security teams are most often looked to after the fact. CISOs and security leaders need to be closer, if not involved, with the strategic planning for the business. If the security teams do not know how the business works or the direction it's going then it makes their jobs more difficult to build a security program for...


Aug 29, 2017

The next control in the Top 20 Critical Security Controls is number 11, Network Device Configurations. Much like your workstations and servers you need to maintain and control configurations for the components that drive your network. This episode goes into the details.

Be aware, be...


Aug 28, 2017

Celebrities are high targets for hackers. Finances, reputation, and data that will always be popular are the reasons. In the recent celebrity hacking situation another series of highly personal photographs were leaked. 

We can look at situations like this and learn from them to help us and others not be a victim. This...


Aug 25, 2017

As the internet connected devices grow in our homes it is becoming more important to keep track of them. This episode goes into the need of keeping an inventory of all your home devices and why.

The partner episode that ties into this is episode 30 that goes over the importance of checking your...