Coming Soon…. The adoption of connected devices in medical practices and hospitals is rising quickly, improving operational efficiencies but also exposing networks to viruses and other threats. Our guest today […]
In the fast-paced, continually evolving landscape of privacy and cybersecurity, the need for legal and operational compliance remains constant. So how do you build a legal compliance program for […]
What’s next for network security? Who better to ask than the expert who’s helped define the space since 1985? Our next guest started his career developing security solutions at […]
Cutting-edge cybersecurity solutions are critical … but a successful cybersecurity strategy needs a more holistic approach. What does it mean to fully operationalize cybersecurity for your organization? Today on […]
Over and above layering solutions to detect and protect against a cyberattack, many companies also buy extra protection with cyber insurance to help them recover from a loss. But […]
Can the difference between a healthy, growing managed security services business and a stagnant one lie in a simple methodology? In episode 36, we invite Ryan O’Hara, CEO of […]
Who is Alan Turing? In his short lifetime, Alan Turing invented the computer on paper in the 1930s. Turing proved mathematically that it was possible to put symbols […]
We’re all well aware that a cyberattack can take a heavy toll on an organization’s financial and reputational status, but what about the emotional toll on the employees who’ve […]
“Unauthorized access” sounds like a line from the classic 1980s movie, Wargames. And you might be surprised to learn that the Computer Fraud & Abuse Act, or CFAA, was […]
It isn’t lost to us here at Cybersecurity Simplified that many of you listen and watch because you have a keen interest in cybersecurity work… you want to make […]
Our next guest has spent his career designing and building strong defenses, literally and technically. First, serving for more than 28 years in active-duty military and now as a […]
What do cybersecurity and ranching have in common? A bit of wrangling, a lot of bull and CISO Allan Alford, host of the Cyber Ranch podcast. Allan’s 20-year cybersecurity […]
If it isn’t enough that hospitals have been overrun with Covid patients during the pandemic, they also have been targeted by cybercriminals. Many have even been forced to cancel vital […]
Cybercriminals are escalating their attacks. What can you do? Take managed security to a higher level with SOAR – Security Orchestration, Automation and Response. In this episode of Cybersecurity Simplified, […]
In the cybersecurity war, there are no rules. The enemy has upped their game with more frequent and destructive attacks. What can you do? Take your cybersecurity defense to the […]
Cyberthreats are not only increasing but evolving. Keeping up is more than a full-time job. That’s why many business owners and IT leaders turn to cybersecurity experts. Should they be […]
Living on the edge means taking on risk, and that’s exactly what today’s special guest has done when it comes to network security. Instead of accepting the risks, he’s faced […]
In our last episode, we talked about why cybersecurity prevention is back in style. With remote work and mobile devices pushing critical workloads to the edge of the corporate network, […]
An ounce of prevention is worth a pound of cure – this tried-and-true advice was the guiding principle behind cybersecurity for years. But when the likelihood of being breached became […]
Cybersecurity is a growing national security and economic security imperative for the U.S. government. And the FBI is on the front lines as the lead federal agency investigating cyber-attacks. The […]
Build or buy. Insource or outsource. DIY or DIFY. This debate is one business leaders have over many functions – from marketing to accounting to HR. When it comes to […]
With Solarwinds, Colonial Pipeline and a rash of other alarming breaches, it’s no surprise that cybersecurity regulation is ramping up. In May, President Biden signed an Executive Order “Improving the […]
Cybercriminals are getting rich by literally holding corporate data and networks hostage. These so-called ransomware attacks are on the rise because they work. They’re hard to detect and almost impossible […]
Good help is hard to find. That’s especially true in cybersecurity. We need 3 million cybersecurity professionals to close the talent gap, according to the 2020 Cybersecurity Workforce Study conducted […]
Cloud-enabled anywhere work has been a boon to businesses of all sizes — improving productivity and, frankly, keeping companies up and running during COVID. It’s also been a bonanza for […]
Fixing software bugs is critical to keeping bad actors out. It’s a continuous process called Patch Management. While its purpose is to keep systems up to date, the practice itself […]
Recently, some cyber insurance companies have switched sides in the debate, refusing to reimburse ransomware payments to cybercriminals. In this episode of Cybersecurity Simplified, we’ll discuss this trend and what […]
You see it in the headlines every day— ransomware attacks disrupting businesses and the economy in a broader sense. 2020 was a bad year for ransomware attacks. 2021 is already […]
Cybersecurity is an IT issue, to be managed by the IT department. Right? Our guest on Cybersecurity Simplified, Mark Porter, CEO at High Wire Networks, will explain that’s only half […]
In this episode of Cybersecurity Simplified, we’ve invited a Security Operations expert to tell us how automation is the new weapon in the war on cybercrime.
Believe it or not – your employees are the primary accessories to cybercrime. In this episode of Cybersecurity Simplified, we’ll talk about how your employees are unwittingly putting your business […]
Cybersecurity is designed to stop or mitigate the fallout of cyberattacks. If it sounds like war, that’s because it is – only this one is 24/7 and the enemy is […]
In this episode of Cybersecurity Simplified, we’ll introduce you to the newest weapon in the war against cybercrime — Extended Detection & Response, or XDR.