• The Audit - Presented by IT Audit Labs

  • 著者: IT Audit Labs
  • ポッドキャスト

『The Audit - Presented by IT Audit Labs』のカバーアート

The Audit - Presented by IT Audit Labs

著者: IT Audit Labs
  • サマリー

  • Brought to you by IT Audit Labs. Trusted cyber security experts and their guests discuss common security threats, threat actor techniques and other industry topics.

    IT Audit Labs provides your organization with the leverage of a network of partners and specialists suited for your needs.

    We are experts at assessing security risk and compliance, while providing administrative and technical controls to improve our clients’ data security. Our threat assessments find the soft spots before the bad guys do, identifying likelihood and impact, while our security control assessments rank the level of maturity relative to the size of your organization.


    © 2024 The Audit - Presented by IT Audit Labs
    続きを読む 一部表示
activate_samplebutton_t1
エピソード
  • Inside the Hak5 Pineapple: Tools, Tips, and Real-World Applications
    2024/07/01

    Unlock the secrets behind the powerful HAC5 Pineapple tool in this episode of The Audit.

    Hosts Eric Brown and Nick Mellum, joined by Cameron Birkeland, explore the tool's functionalities and features, offering practical insights and real-world applications. Discover how the HAC5 Pineapple can enhance your cybersecurity measures, with discussions on model comparisons, security implications, and best practices.

    In this episode we’ll cover

    • What is the HAC5 Pineapple?
      Comparing the Tetra and Mark 7 models
    • Real-world uses and case studies for the Pineapple
    • Key security implications and best practices
    • Cool features of the Pineapple and a live demo
    • How to generate detailed reports with the Pineapple

    Join us for an engaging discussion packed with valuable information for cybersecurity professionals and enthusiasts alike. Don’t miss out on our latest insights and tips!

    #Cybersecurity #HAC5Pineapple #PenTesting #EthicalHacking #WiFiSecurity #CyberThreats

    続きを読む 一部表示
    34 分
  • Cybersecurity in the News: DDoS Attacks, Public Library Breach, Phishing and More
    2024/06/17

    Welcome to the latest episode of "The Audit," where we bring you the most pressing news, issues and insights in cybersecurity.

    In this live episode, we cover the recent ransomware attack on the Seattle Public Library, the $37 million theft from Coinbase Pro users, and the sophisticated gift card fraud by the Moroccan cybercrime group, Storm 0539. We share our insights on how these attacks happened, their impacts, and practical advice on how to protect yourself and your organization. We also explore a theoretical DNS bomb DDoS attack and the intriguing use of Flipper Zero devices to control wristbands at large events.

    • Seattle Public Library ransomware attack and its impact
    • $37 million phishing scam targeting Coinbase Pro users
    • Moroccan cybercrime group Storm 0539's gift card fraud
    • Potential threat of DNS bomb DDoS attack
    • Flipper Zero devices hijacking event wristbands

    Thanks for tuning in! Don't forget to like, subscribe, and share your thoughts in the comments.

    #CybersecurityNews #Cybersecurity #Ransomware #Phishing #ITSecurity #TechNews

    続きを読む 一部表示
    52 分
  • Quantum Computing's Impact on Cybersecurity with Bernie Leung
    2024/06/03

    Explore the intriguing intersection of quantum computing and cybersecurity... It’s closer than you think.

    In this episode, special guest Bernie Leung from Autodesk shares his expert insights on how quantum computing is reshaping the cybersecurity landscape. Discover the challenges and breakthroughs in encryption practices as Bernie breaks down complex concepts like the Shor Algorithm and discusses practical steps for adapting to this new era of cybersecurity.

    In this episode, we dive into:

    • The essentials of quantum computing and how it could revolutionize encryption.
    • Current encryption vulnerabilities that quantum computing could exploit.
    • An introduction to post-quantum cryptography and the new standards on the horizon.
    • Practical uses of quantum computing in cybersecurity today and what we might see in the future.
    • How governments and businesses are preparing for quantum threats, including updates in regulations and security protocols.

    This discussion is not just theoretical; it's a guide to understanding and preparing for the quantum leap in data protection.

    #QuantumComputing #FutureOfCybersecurity #Cybersecurity #InfoSec #PostQuantumCryptography

    続きを読む 一部表示
    38 分

あらすじ・解説

Brought to you by IT Audit Labs. Trusted cyber security experts and their guests discuss common security threats, threat actor techniques and other industry topics.

IT Audit Labs provides your organization with the leverage of a network of partners and specialists suited for your needs.

We are experts at assessing security risk and compliance, while providing administrative and technical controls to improve our clients’ data security. Our threat assessments find the soft spots before the bad guys do, identifying likelihood and impact, while our security control assessments rank the level of maturity relative to the size of your organization.


© 2024 The Audit - Presented by IT Audit Labs

The Audit - Presented by IT Audit Labsに寄せられたリスナーの声

カスタマーレビュー:以下のタブを選択することで、他のサイトのレビューをご覧になれます。