While cutting-edge augmented intelligence (AI) technologies are becoming increasingly adept defending against cyber threats, the human factor remains indispensable. Listen to gain a deeper understanding of how to effectively combine human expertise and advanced technologies to fortify your cybersecurity posture. 0:00 Introduction 0:22 Augmented Intelligence Explained 1:58 Enhancing Human Capabilities 3:31 AI in Cybersecurity 5:49 Role of Human Analysts 9:01 Practical Tips and Challenges 20:00 Summary and Final Thoughts
Scale Smart: Modern Storage for AI Workloads
Investing in scalable storage for AI workloads isn’t just an operational decision—it’s a strategic one. In this TECH Talk, special guest Bjorn Kolbeck, CEO at Quobyte, shares practical insights to ensure the infrastructure that fuels your AI initiatives is set up for success. 0:00 Introduction 0:24 Quobyte Overview 1:28 The AI Infrastructure Journey 2:56 Data Growth Across Industries 8:07 Scaling Storage as You Grow 10:01 Scalable Storage as a Service… Read More
Breach, Repeat: Understanding Recurrent Cyberattacks
When it comes to cybersecurity, the adage “lightning never strikes the same place twice” doesn’t apply. The reality is 80% of ransomware victims get targeted again. With a second attack on Change Healthcare making the news, we unpack why businesses that suffer an initial cyberattack are frequently targeted again, regardless of company size or industry. And, more importantly, what you can do to protect your business. 0:00 Introduction 0:31 Airplane… Read More
Prepare to be Hacked: A Strategic Cybersecurity Planning Session
Traditional security tools only spring into action after a breach, highlighting a critical gap in many organizations’ defenses. This oversight emphasizes the need for a dual approach, one that not only responds to incidents but also anticipates them. In this TECH Talk, we delve into how to craft a balanced cybersecurity framework that delivers both proactive and reactive defenses. Our goal is to equip business executives with the knowledge to… Read More
Feb. TECH Talk podcast—Ensuring Network Resilience & Cybersecurity in a Digital Era
In a world of distributed workers, data, and devices, networks are under more strain than ever. The need for robust network resilience and cybersecurity is critical. Network expert Ross Rehart shares insights into the challenges businesses face in securing their digital assets amidst the rapid pace of technological change.
Jan. 2024 TECH Talk – Cybersecurity in the Fast Lane
A year ago, generative AI caught most businesses by surprise. Listen for a heads up on the cybersecurity trends you can expect in 2024. Topics include: Generative AI Convergence of IT and Security Zero Trust Social Engineering Quantum Cryptography
2023 Cybersecurity Highlights – TECH Talk Year in Review
In 2023, organizations worldwide faced increasing sophistication of cyber-attacks…With generative AI as a powerful catalyst, the story of the year is not just change, but the acceleration of change. In a threat environment where getting breached isn’t a matter of if, but when, DataEndure’s monthly TECH Talks cover cybersecurity hot topics and insights to help businesses remain on secure footing. In this compilation podcast, we feature key year-end takeaways to… Read More
Nov. 2023 TECH Talk – Users Can’t Be Your First Line of Defense
93% of attacks come through email, and it only takes 1-click to create a ransomware situation. Inevitably, things are going to get through—which is why organizations can’t rely on their employees as a first line of defense. Getting breached isn’t a matter of if, it’s when. Employees should receive recurring training because testing isn’t enough. In this talk, we address the pressing need for businesses to: 1. Be prepared, and… Read More
Oct. 2023 TECH Talk – Data Exposure from Open Directory Listings
In this TECH Talk, we dive into recent Censys research: millions of files with potentially sensitive data have been exposed by 314,000 distinct internet-connected devices and servers with open directory listings. Open directories provide cybercriminals with a treasure map to a company’s sensitive information such as financial data, backups, network packet capture files, credential and authentication information—the potential for exploitation makes open directories a valuable target for adversaries. While this… Read More
Sept 2023 TECH Talk – MGM Breach: Preparing for the Inevitable
The MGM breach serves as a wake-up call for all organizations. If they can be breached, anyone can be breached. Back in the day, cybercriminals had to get their hands dirty—literally. They’d go dumpster diving for sensitive documents and information. Fast forward to today, and social networks have become the new treasure trove. In the case of MGM, it seems the hackers utilized social network engineering as a successful entry… Read More
- 1
- 2
- 3
- …
- 6
- Next Page »